diff --git "a/test.json" "b/test.json"
new file mode 100644--- /dev/null
+++ "b/test.json"
@@ -0,0 +1,927 @@
+{"doc_id": "0803.0635", "revision_depth": "1", "before_revision": "Interaction graphs are a useful tool to investigate graphically the influence of feebacks in dynamical systems modelling complex systems with many interacting components in a non-spatial context. In [ 14 ] and [ 15 ] the authors showed with the help of a multi-scale anal- ysis that stochastic systems with infinite and finite degrees of freedom can be approximated by dynamical systems whose leading order time evolution is given by a combination of ordi- nary differential equations and Markov chains. The leading order term in these dynamical systems is called average dynamics and turns out to be an adequate concept to analyse such systemswith discrete and continuous state spaces. There are many complex systems that can be conveniently described inside such a state space setting, for example bio-molecular interactions. Both ODEs and Markov chains and their mutual interaction can be better understood and analysed through the introduction of the so called Interaction Graph, a con- cept originally invented for time-continuous dynamical systems [ 4 ]. In this paper the average dynamics is introduced as an heuristic tool to construct models of reaction networks with their qualitative properties explored in terms of connectivity properties of the Interaction Graphs for the ODEs, the Markov chain and the resulting average dynamics. In a second paper the question of stability, robustness and a possible modular structure of the complex system defined by the average dynamics is addressed .", "after_revision": "Time-continuous dynamical systems defined on graphs are often used to model complex systems with many interacting components in a non-spatial context. In the reverse sense attaching meaningful dynamics to given 'interaction diagrams' is a central bottleneck problem in many application areas, especially in cell biology where various such diagrams with different conventions describing molecular regulation are presently in use. In most situations these diagrams can only be interpreted by the use of both discrete and continuous variables during the modelling process, corresponding to both deterministic and stochastic hybrid dynamics. The conventions in genetics are well-known, and therefore we use this field for illustration purposes. In [ 25 ] and [ 26 ] the authors showed that with the help of a multi-scale analysis stochastic systems with both continuous variables and finite state spaces can be approximated by dynamical systems whose leading order time evolution is given by a combination of ordinary differential equations (ODEs) and Markov chains. The leading order term in these dynamical systems is called average dynamics and turns out to be an adequate concept to analyse a class of simplified hybrid systems. Once the dynamics is defifined the mutual interaction of both ODEs and Markov chains can be analysed through the (reverse) introduction of the so called Interaction Graph, a concept originally invented for time-continuous dynamical systems , see [ 5 ]. Here we transfer this graph concept to the average dynamics , which itself is introduced as an heuristic tool to construct models of reaction or contact networks. The graphical concepts introduced form the basis for any subsequent study of the qualitative properties of hybrid models in terms of connectivity and (feedback) loop formation .", "edit_actions": [{"type": "R", "before": "Interaction graphs are a useful tool to investigate graphically the influence of feebacks in dynamical systems modelling", "after": "Time-continuous dynamical systems defined on graphs are often used to model", "start_char_pos": 0, "end_char_pos": 120}, {"type": "A", "before": null, "after": "the reverse sense attaching meaningful dynamics to given 'interaction diagrams' is a central bottleneck problem in many application areas, especially in cell biology where various such diagrams with different conventions describing molecular regulation are presently in use. In most situations these diagrams can only be interpreted by the use of both discrete and continuous variables during the modelling process, corresponding to both deterministic and stochastic hybrid dynamics. The conventions in genetics are well-known, and therefore we use this field for illustration purposes. In", "start_char_pos": 199, "end_char_pos": 199}, {"type": "R", "before": "14", "after": "25", "start_char_pos": 202, "end_char_pos": 204}, {"type": "R", "before": "15", "after": "26", "start_char_pos": 213, "end_char_pos": 215}, {"type": "A", "before": null, "after": "that", "start_char_pos": 237, "end_char_pos": 237}, {"type": "R", "before": "anal- ysis that", "after": "analysis", "start_char_pos": 269, "end_char_pos": 284}, {"type": "R", "before": "infinite and finite degrees of freedom", "after": "both continuous variables and finite state spaces", "start_char_pos": 309, "end_char_pos": 347}, {"type": "R", "before": "ordi- nary differential equations", "after": "ordinary differential equations (ODEs)", "start_char_pos": 453, "end_char_pos": 486}, {"type": "R", "before": "such systemswith discrete and continuous state spaces. There are many complex systems that can be conveniently described inside such a state space setting, for example bio-molecular interactions. Both", "after": "a class of simplified hybrid systems. Once the dynamics is defifined the mutual interaction of both", "start_char_pos": 634, "end_char_pos": 834}, {"type": "R", "before": "and their mutual interaction can be better understood and", "after": "can be", "start_char_pos": 858, "end_char_pos": 915}, {"type": "A", "before": null, "after": "(reverse)", "start_char_pos": 937, "end_char_pos": 937}, {"type": "R", "before": "con- cept", "after": "concept", "start_char_pos": 989, "end_char_pos": 998}, {"type": "A", "before": null, "after": ", see", "start_char_pos": 1057, "end_char_pos": 1057}, {"type": "R", "before": "4", "after": "5", "start_char_pos": 1060, "end_char_pos": 1061}, {"type": "R", "before": "In this paper", "after": "Here we transfer this graph concept to", "start_char_pos": 1065, "end_char_pos": 1078}, {"type": "A", "before": null, "after": ", which itself", "start_char_pos": 1100, "end_char_pos": 1100}, {"type": "R", "before": "networks with their qualitative properties explored", "after": "or contact networks. The graphical concepts introduced form the basis for any subsequent study of the qualitative properties of hybrid models", "start_char_pos": 1168, "end_char_pos": 1219}, {"type": "R", "before": "properties of the Interaction Graphs for the ODEs, the Markov chain and the resulting average dynamics. In a second paper the question of stability, robustness and a possible modular structure of the complex system defined by the average dynamics is addressed", "after": "and (feedback) loop formation", "start_char_pos": 1245, "end_char_pos": 1504}], "sents_char_pos": [0, 195, 505, 688, 829, 1064, 1348]}
+{"doc_id": "0806.2989", "revision_depth": "1", "before_revision": "We present a simple agent-based model to study how the proximate triggering factor of a crash or a rally might relate to its fundamental mechanism, and vice versa. Our agents form opinions and invest , based on three sources of information, (i) public information, i.e. news, (ii) information from their \"friendship\" network , promoting imitation and (iii) private information. Agents use Bayesian learning to adapt their strategy according to the past relevance of the three sources of information . We find that rallies and crashes occur as amplifications of random lucky or unlucky streak of news, due to the feedback of these news on the agents' strategies into collective transient herding regimes. These ingredients provide a simple mechanism for the excess volatility documented in financial markets. Paradoxically, it is the attempt for investors to learn the level of relevance of the news on the price formation which leads to a dramatic amplification of the price volatility due to their collective search for the \"truth\" . A positive feedback loop is created by the two dominating mechanisms ( Bayesian learning and imitation) which, by reinforcing each other, result in rallies and crashes. The model offers a simple reconciliation of the two opposite (herding versus fundamental) proposals for the origin of crashes within a single framework and justifies the existence of two populations in the distribution of returns, exemplifying the concept that rallies and crashes are qualitatively different from the rest of the price moves.", "after_revision": "We present a simple agent-based model to study the development of a bubble and the consequential crash and investigate how their proximate triggering factor might relate to their fundamental mechanism, and vice versa. Our agents invest according to their opinion on future price movements, which is based on three sources of information, (i) public information, i.e. news, (ii) information from their \"friendship\" network and (iii) private information. Our bounded rational agents continuously adapt their trading strategy to the current market regime by weighting each of these sources of information in their trading decision according to its recent predicting performance . We find that bubbles originate from a random lucky streak of positive news, which, due to a feedback mechanism of these news on the agents' strategies develop into a transient collective herding regime. After this self-amplified exuberance, the price has reached an unsustainable high value, being corrected by a crash, which brings the price even below its fundamental value. These ingredients provide a simple mechanism for the excess volatility documented in financial markets. Paradoxically, it is the attempt for investors to adapt to the current market regime which leads to a dramatic amplification of the price volatility . A positive feedback loop is created by the two dominating mechanisms ( adaptation and imitation) which, by reinforcing each other, result in bubbles and crashes. The model offers a simple reconciliation of the two opposite (herding versus fundamental) proposals for the origin of crashes within a single framework and justifies the existence of two populations in the distribution of returns, exemplifying the concept that crashes are qualitatively different from the rest of the price moves.", "edit_actions": [{"type": "R", "before": "how the proximate triggering factor of a crash or a rally", "after": "the development of a bubble and the consequential crash and investigate how their proximate triggering factor", "start_char_pos": 47, "end_char_pos": 104}, {"type": "R", "before": "its", "after": "their", "start_char_pos": 121, "end_char_pos": 124}, {"type": "R", "before": "form opinions and invest ,", "after": "invest according to their opinion on future price movements, which is", "start_char_pos": 175, "end_char_pos": 201}, {"type": "D", "before": ", promoting imitation", "after": null, "start_char_pos": 325, "end_char_pos": 346}, {"type": "R", "before": "Agents use Bayesian learning to adapt their strategy according to the past relevance of the three", "after": "Our bounded rational agents continuously adapt their trading strategy to the current market regime by weighting each of these", "start_char_pos": 378, "end_char_pos": 475}, {"type": "A", "before": null, "after": "in their trading decision according to its recent predicting performance", "start_char_pos": 499, "end_char_pos": 499}, {"type": "R", "before": "rallies and crashes occur as amplifications of random lucky or unlucky streak of news, due to the feedback", "after": "bubbles originate from a random lucky streak", "start_char_pos": 515, "end_char_pos": 621}, {"type": "A", "before": null, "after": "positive news, which, due to a feedback mechanism of", "start_char_pos": 625, "end_char_pos": 625}, {"type": "R", "before": "into collective transient herding regimes.", "after": "develop into a transient collective herding regime. After this self-amplified exuberance, the price has reached an unsustainable high value, being corrected by a crash, which brings the price even below its fundamental value.", "start_char_pos": 663, "end_char_pos": 705}, {"type": "R", "before": "learn the level of relevance of the news on the price formation", "after": "adapt to the current market regime", "start_char_pos": 860, "end_char_pos": 923}, {"type": "D", "before": "due to their collective search for the \"truth\"", "after": null, "start_char_pos": 988, "end_char_pos": 1034}, {"type": "R", "before": "Bayesian learning", "after": "adaptation", "start_char_pos": 1108, "end_char_pos": 1125}, {"type": "R", "before": "rallies", "after": "bubbles", "start_char_pos": 1185, "end_char_pos": 1192}, {"type": "D", "before": "rallies and", "after": null, "start_char_pos": 1467, "end_char_pos": 1478}], "sents_char_pos": [0, 163, 377, 501, 705, 809, 1205]}
+{"doc_id": "0904.0631", "revision_depth": "1", "before_revision": "Glycosylation is a highly complex process to produce a diverse repertoire of cellular glycans that are frequently attached to proteins and lipids. Glycans participate in fundamental biological processes including protein folding and clearance, cell proliferation and apoptosis, development, immune response , and pathogenesis. As one of the major types of glycans, N-linked glycans are formed by sequential attachments of monosaccharides into proteins with the help of a limited number of enzymes. Many of these enzymes can accept multiple N-linked glycans as substrates, thus generating a large number of glycan intermediates and their intermingled pathways. Motivated by the quantitative methods developed in complex network research, we investigated the URLanization of such N-linked glycosylation pathways in mammalian cells. The N-linked glycosylation pathways were found to be extremely modular, while composed of cohesive topological modules all directly branched from the common upstream pathway of glycan synthesis. This unique structural property allows the glycan production between modules to be controlled in that upstream region. Although the enzymes involved in multiple glycan substrates indicate cross-talk between modules, the impact of the cross-talk on the module-specific enhancement of glycan synthesis could be confined within a moderate range by transcriptional-level control. Our findings give the experimentally-testable predictions for glycosylation processes, and can be potentially applied to the engineering of therapeutic glycoproteins .", "after_revision": "Glycosylation is a highly complex process to produce a diverse repertoire of cellular glycans that are attached to proteins and lipids. Glycans are involved in fundamental biological processes , including protein folding and clearance, cell proliferation and apoptosis, development, immune responses , and pathogenesis. One of the major types of glycans, N-linked glycans , is formed by sequential attachments of monosaccharides to proteins by a limited number of enzymes. Many of these enzymes can accept multiple N-linked glycans as substrates, thereby generating a large number of glycan intermediates and their intermingled pathways. Motivated by the quantitative methods developed in complex network research, we investigated the URLanization of such N-linked glycosylation pathways in mammalian cells. The N-linked glycosylation pathways are extremely modular, and are composed of cohesive topological modules that directly branch from a common upstream pathway of glycan synthesis. This unique structural property allows the glycan production between modules to be controlled by the upstream region. Although the enzymes act on multiple glycan substrates , indicating cross-talk between modules, the impact of the cross-talk on the module-specific enhancement of glycan synthesis may be confined within a moderate range by transcription-level control. The findings of the present study provide experimentally-testable predictions for glycosylation processes, and may be applicable to therapeutic glycoprotein engineering .", "edit_actions": [{"type": "D", "before": "frequently", "after": null, "start_char_pos": 103, "end_char_pos": 113}, {"type": "R", "before": "participate", "after": "are involved", "start_char_pos": 155, "end_char_pos": 166}, {"type": "A", "before": null, "after": ",", "start_char_pos": 203, "end_char_pos": 203}, {"type": "R", "before": "response", "after": "responses", "start_char_pos": 299, "end_char_pos": 307}, {"type": "R", "before": "As one", "after": "One", "start_char_pos": 328, "end_char_pos": 334}, {"type": "R", "before": "are", "after": ", is", "start_char_pos": 383, "end_char_pos": 386}, {"type": "R", "before": "into proteins with the help of", "after": "to proteins by", "start_char_pos": 439, "end_char_pos": 469}, {"type": "R", "before": "thus", "after": "thereby", "start_char_pos": 573, "end_char_pos": 577}, {"type": "R", "before": "were found to be", "after": "are", "start_char_pos": 867, "end_char_pos": 883}, {"type": "R", "before": "while", "after": "and are", "start_char_pos": 903, "end_char_pos": 908}, {"type": "R", "before": "all directly branched from the", "after": "that directly branch from a", "start_char_pos": 950, "end_char_pos": 980}, {"type": "R", "before": "in that", "after": "by the", "start_char_pos": 1120, "end_char_pos": 1127}, {"type": "R", "before": "involved in", "after": "act on", "start_char_pos": 1166, "end_char_pos": 1177}, {"type": "R", "before": "indicate", "after": ", indicating", "start_char_pos": 1205, "end_char_pos": 1213}, {"type": "R", "before": "could", "after": "may", "start_char_pos": 1326, "end_char_pos": 1331}, {"type": "R", "before": "transcriptional-level control. Our findings give the", "after": "transcription-level control. The findings of the present study provide", "start_char_pos": 1371, "end_char_pos": 1423}, {"type": "R", "before": "can be potentially applied to the engineering of therapeutic glycoproteins", "after": "may be applicable to therapeutic glycoprotein engineering", "start_char_pos": 1493, "end_char_pos": 1567}], "sents_char_pos": [0, 146, 327, 498, 660, 830, 1025, 1144, 1401]}
+{"doc_id": "0904.1426", "revision_depth": "1", "before_revision": " Asset backed securities have been extensively criticised for creating a moral hazard in loan issuance by removing any incentive on the lender to ensure that the recipient of such loans could repay them. However the inter-relationship between money and loans within the commercial banking system, also suggests that deeper systemic issues can accompany any form of unlimited commercial bank lending . This paper examines the question of why speculative demand for credit during credit bubbles is not naturally constrained by regulated limits within the banking system on the supply of loans. In particular, we propose an explanation for the current credit crisis, as a fundamental, systemic failure in the system of rules governing the behaviour of the reserve based banking system, which have resulted in the effective removal of central bank control over money and loan supply expansion. This situation has arisen from the presence of two 'bugs' in the underlying regulations controlling the banking system: securitized loans, which allow the sale of loans issued against fractional reserve controlled deposits to entities outside of the commercial banking system; and allowing debt instruments , in particular securitized loans to be part of bank equity capital reserves which are used for the purpose of regulating the total quantity of credit created by the banking system. We argue that the interaction of these two problems has led to unregulated growth in both the money and loan supplies, and to a dangerously destabilising imbalance between total money and loan supply growth, in that total lending from the commercial bank sector has increased at a faster rate than the accompanying money supply growth supporting it .", "after_revision": "Analysis of the 2007-8 credit crisis has concentrated on issues of relaxed lending standards, and the perception of irrational behaviour by speculative investors in real estate and other assets. Asset backed securities have been extensively criticised for creating a moral hazard in loan issuance and an associated increase in default risk, by removing the immediate lender's incentive to ensure that the underlying loans could be repaid. However significant monetary issues can accompany any form of increased commercial bank lending , and these appear to have been overlooked by this analysis. In this paper we propose a general explanation for credit crises based on an examination of the mechanics of the banking system, and in particular its internal controls on the supply of credit. We suggest that the current credit crisis is the result of multiple failures in the Basel regulatory framework, including the removal of central bank reserve requirements from some classes of deposit accounts within the banking system, allowing financial instruments representing debt to be used as regulatory capital, and in particular the introduction of securitized lending which effectively removed a previously implicit control over the total quantity of lending originating from the banking system. We further argue that the interaction of these problems has led to a destabilising imbalance between total money and loan supply growth, in that total lending sourced from the commercial bank sector increased at a faster rate than accompanying growth in the money supply. This not only created a multi-decade macro-economic debt spiral, but by increasing the ratio of debt to money within the monetary system acted to increase the risk of loan defaults, and consequentially reduce the overall stability of the banking system .", "edit_actions": [{"type": "A", "before": null, "after": "Analysis of the 2007-8 credit crisis has concentrated on issues of relaxed lending standards, and the perception of irrational behaviour by speculative investors in real estate and other assets.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "by removing any incentive on the lender", "after": "and an associated increase in default risk, by removing the immediate lender's incentive", "start_char_pos": 103, "end_char_pos": 142}, {"type": "R", "before": "recipient of such loans could repay them. However the inter-relationship between money and loans within the commercial banking system, also suggests that deeper systemic", "after": "underlying loans could be repaid. However significant monetary", "start_char_pos": 162, "end_char_pos": 331}, {"type": "R", "before": "unlimited", "after": "increased", "start_char_pos": 365, "end_char_pos": 374}, {"type": "R", "before": ". This paper examines the question of why speculative demand for credit during credit bubbles is not naturally constrained by regulated limits within the banking system on the supply of loans. In particular, we propose an explanation for the current credit crisis, as a fundamental, systemic failure in the system of rules governing the behaviour of the reserve based", "after": ", and these appear to have been overlooked by this analysis. In this paper we propose a general explanation for credit crises based on an examination of the mechanics of the", "start_char_pos": 399, "end_char_pos": 766}, {"type": "R", "before": "which have resulted in the effective removal of central bank control over money and loan supply expansion. This situation has arisen from the presence of two 'bugs' in the underlying regulations controlling the banking system: securitized loans, which allow the sale of loans issued against fractional reserve controlled deposits to entities outside of the commercial banking system; and allowing debt instruments , in particular securitized loans to be part of bank equity capital reserves which are used for the purpose of regulating the", "after": "and in particular its internal controls on the supply of credit. We suggest that the current credit crisis is the result of multiple failures in the Basel regulatory framework, including the removal of central bank reserve requirements from some classes of deposit accounts within the banking system, allowing financial instruments representing debt to be used as regulatory capital, and in particular the introduction of securitized lending which effectively removed a previously implicit control over the", "start_char_pos": 783, "end_char_pos": 1322}, {"type": "R", "before": "credit created by", "after": "lending originating from", "start_char_pos": 1341, "end_char_pos": 1358}, {"type": "A", "before": null, "after": "further", "start_char_pos": 1382, "end_char_pos": 1382}, {"type": "D", "before": "two", "after": null, "start_char_pos": 1419, "end_char_pos": 1422}, {"type": "R", "before": "unregulated growth in both the money and loan supplies, and to a dangerously", "after": "a", "start_char_pos": 1443, "end_char_pos": 1519}, {"type": "A", "before": null, "after": "sourced", "start_char_pos": 1610, "end_char_pos": 1610}, {"type": "D", "before": "has", "after": null, "start_char_pos": 1643, "end_char_pos": 1646}, {"type": "R", "before": "the accompanying money supply growth supporting it", "after": "accompanying growth in the money supply. This not only created a multi-decade macro-economic debt spiral, but by increasing the ratio of debt to money within the monetary system acted to increase the risk of loan defaults, and consequentially reduce the overall stability of the banking system", "start_char_pos": 1679, "end_char_pos": 1729}], "sents_char_pos": [0, 203, 400, 591, 889, 1166, 1378]}
+{"doc_id": "0904.4155", "revision_depth": "2", "before_revision": "This paper discovers fundamental principles of the backoff process that governs the performance of IEEE 802.11. We first %DIFDELCMD < {\\it %%% establish that the so-called mean field technique, which spins off a fixed point equation, is mathematically valid for use in performance analysis of 802.11. On the basis of this , succinct equations describing the backoff distribution as a function of the collision probability \\gamma are derived . In addition, the observation that the %DIFDELCMD < {\\it %%% entropy of the backoff process in 802.11 increases with the number of nodes leads us to see through a Poissonian character inherent in 802.11. However, it is also found that the %DIFDELCMD < {\\it %%% collision effect between nodes prevails over the %DIFDELCMD < {\\it %%% Poissonian aggregation effect in spite of its tendency to increase with the number of nodes. Based on these findings, we formulate the principle about the inter-transmission probability that lays a foundation for the short-term fairness analysis. Another principle discovered upon regular variation theory is that the per-packet backoff has a truncated%DIFDELCMD < {\\it %%% Pareto-type tail distribution with an exponent of (\\log \\gamma)/\\log m (m is the multiplicative factor). This reveals that the backoff process is heavy-tailed in the strict sense for m^2 \\gamma > 1, essentially due to collision. Moreover, we identify the%DIFDELCMD < {\\it %%% long-range dependence in 802.11 and show that the inter-transmission probability undergoes a dramatic change at \\gamma_0=1/m^2 and falls into two qualitatively distinct categories: either approximately Gaussian or %DIFDELCMD < {\\it %%% L\\'evy \\alpha-stable distribution with \\alpha \\in (1,2) entailing infinite variances,%DIFDELCMD < {\\it %%% leaning tendency, and%DIFDELCMD < {\\it %%% directional unfairness .", "after_revision": "This paper discovers fundamental principles of the backoff process that governs the performance of IEEE 802.11. We first %DIFDELCMD < {\\it %%% make a simplistic Palm interpretation of the Bianchi's formula and on the basis of which , succinct equations describing the backoff distribution as a function of the collision probability \\gamma are derived , which also correct a possible misunderstanding in the field. The observation that the %DIFDELCMD < {\\it %%% entropy of the backoff process in 802.11 increases with the number of nodes leads us to see through a Poissonian character inherent in 802.11. However, it is also found that the %DIFDELCMD < {\\it %%% collision effect between nodes prevails over the %DIFDELCMD < {\\it %%% Poissonian aggregation effect in spite of its tendency to increase with the number of nodes. Based on these findings, we formulate the principle about the inter-transmission probability that lays a foundation for the short-term fairness analysis. Another principle discovered upon regular variation theory is that the %DIFDELCMD < {\\it %%% backoff times have a truncated Pareto-type tail distribution with an exponent of (\\log \\gamma)/\\log m (m is the multiplicative factor). This reveals that the backoff process is heavy-tailed in the strict sense for m^2 \\gamma > 1, essentially due to collision. Moreover, we identify %DIFDELCMD < {\\it %%% long-range dependence in 802.11 through both of mathematical and empirical wavelet-based analyses and answer a riddle: the absence of long range dependence in aggregate total load. We also show that the inter-transmission probability undergoes a dramatic change at \\gamma_0=1/m^2 and falls into two qualitatively distinct categories: either approximately Gaussian or %DIFDELCMD < {\\it %%% L\\'evy \\alpha-stable distribution with \\alpha \\in (1,2) %DIFDELCMD < {\\it %%% %DIFDELCMD < {\\it %%% .", "edit_actions": [{"type": "D", "before": "establish", "after": null, "start_char_pos": 143, "end_char_pos": 152}, {"type": "R", "before": "that the so-called mean field technique, which spins off a fixed point equation, is mathematically valid for use in performance analysis of 802.11. On the basis of this", "after": "make a simplistic Palm interpretation of the Bianchi's formula and on the basis of which", "start_char_pos": 153, "end_char_pos": 321}, {"type": "R", "before": ". In addition, the", "after": ", which also correct a possible misunderstanding in the field. The", "start_char_pos": 441, "end_char_pos": 459}, {"type": "R", "before": "entropy", "after": "entropy", "start_char_pos": 503, "end_char_pos": 510}, {"type": "R", "before": "collision", "after": "collision", "start_char_pos": 703, "end_char_pos": 712}, {"type": "R", "before": "Poissonian aggregation", "after": "Poissonian aggregation", "start_char_pos": 774, "end_char_pos": 796}, {"type": "D", "before": "per-packet backoff has a truncated", "after": null, "start_char_pos": 1092, "end_char_pos": 1126}, {"type": "A", "before": null, "after": "backoff times have a truncated", "start_char_pos": 1148, "end_char_pos": 1148}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1400, "end_char_pos": 1403}, {"type": "R", "before": "and", "after": "through both of mathematical and empirical wavelet-based analyses and answer a riddle: the absence of long range dependence in aggregate total load. We also", "start_char_pos": 1457, "end_char_pos": 1460}, {"type": "D", "before": "entailing infinite variances,", "after": null, "start_char_pos": 1717, "end_char_pos": 1746}, {"type": "D", "before": "leaning", "after": null, "start_char_pos": 1768, "end_char_pos": 1775}, {"type": "D", "before": "tendency, and", "after": null, "start_char_pos": 1776, "end_char_pos": 1789}, {"type": "D", "before": "directional", "after": null, "start_char_pos": 1811, "end_char_pos": 1822}, {"type": "D", "before": "unfairness", "after": null, "start_char_pos": 1823, "end_char_pos": 1833}], "sents_char_pos": [0, 111, 300, 442, 645, 866, 1020, 1253, 1377]}
+{"doc_id": "0910.0165", "revision_depth": "1", "before_revision": "Although widely used in practice, the behavior and accuracy of the popular module identification technique called modularity maximization is not well understood . Here, we present a broad and systematic characterization of its performance in practical situations. First, we generalize and clarify the recently identified resolution limit phenomenon . Second, we show that the modularity function Q exhibits extreme degeneracies: that is, the modularity landscape admits an exponential number of distinct high-scoring solutions and does not typically exhibit a clear global maximum. Third, we derive the limiting behavior of the maximum modularity Q_max for infinitely modular networks, showing that it depends strongly on the size of the network and the number of module-like subgraphs it contains. Finally, using three real-world examples of metabolic networks , we show that the degenerate solutions can fundamentally disagree on the composition of even the largest modules. Together, these results significantly extend and clarify our understanding of this popular method. In particular, they explain why so manyheuristics perform well in practice at finding high-scoring partitions, why these heuristics can disagree on the composition of the identified modules , and how the estimated value of Q_max should be interpreted. Further, they imply that the output of any modularity maximization procedure should be interpreted cautiously in scientific contexts. We conclude by discussing avenues for mitigating these behaviors, such as combining information from many degenerate solutions or using generative models.", "after_revision": "Although widely used in practice, the behavior and accuracy of the popular module identification technique called modularity maximization is not well understood in practical contexts . Here, we present a broad characterization of its performance in such situations. First, we revisit and clarify the resolution limit phenomenon for modularity maximization . Second, we show that the modularity function Q exhibits extreme degeneracies: it typically admits an exponential number of distinct high-scoring solutions and typically lacks a clear global maximum. Third, we derive the limiting behavior of the maximum modularity Q_max for one model of infinitely modular networks, showing that it depends strongly both on the size of the network and on the number of modules it contains. Finally, using three real-world metabolic networks as examples , we show that the degenerate solutions can fundamentally disagree on many, but not all, partition properties such as the composition of the largest modules and the distribution of module sizes. These results imply that the output of any modularity maximization procedure should be interpreted cautiously in scientific contexts. They also explain why many heuristics are often successful at finding high-scoring partitions in practice and why different heuristics can disagree on the modular structure of the same network. We conclude by discussing avenues for mitigating some of these behaviors, such as combining information from many degenerate solutions or using generative models.", "edit_actions": [{"type": "A", "before": null, "after": "in practical contexts", "start_char_pos": 161, "end_char_pos": 161}, {"type": "D", "before": "and systematic", "after": null, "start_char_pos": 189, "end_char_pos": 203}, {"type": "R", "before": "practical", "after": "such", "start_char_pos": 243, "end_char_pos": 252}, {"type": "R", "before": "generalize", "after": "revisit", "start_char_pos": 275, "end_char_pos": 285}, {"type": "D", "before": "recently identified", "after": null, "start_char_pos": 302, "end_char_pos": 321}, {"type": "A", "before": null, "after": "for modularity maximization", "start_char_pos": 350, "end_char_pos": 350}, {"type": "R", "before": "that is, the modularity landscape", "after": "it typically", "start_char_pos": 431, "end_char_pos": 464}, {"type": "R", "before": "does not typically exhibit", "after": "typically lacks", "start_char_pos": 533, "end_char_pos": 559}, {"type": "A", "before": null, "after": "one model of", "start_char_pos": 659, "end_char_pos": 659}, {"type": "A", "before": null, "after": "both", "start_char_pos": 722, "end_char_pos": 722}, {"type": "A", "before": null, "after": "on", "start_char_pos": 754, "end_char_pos": 754}, {"type": "R", "before": "module-like subgraphs", "after": "modules", "start_char_pos": 769, "end_char_pos": 790}, {"type": "R", "before": "examples of metabolic networks", "after": "metabolic networks as examples", "start_char_pos": 836, "end_char_pos": 866}, {"type": "R", "before": "the composition of even the largest modules. Together, these results significantly extend and clarify our understanding of this popular method. In particular, they explain why so manyheuristics perform well in practice at finding high-scoring partitions, why these heuristics can disagree on", "after": "many, but not all, partition properties such as", "start_char_pos": 937, "end_char_pos": 1228}, {"type": "R", "before": "identified modules , and how the estimated value of Q_max should be interpreted. Further, they", "after": "largest modules and the distribution of module sizes. These results", "start_char_pos": 1252, "end_char_pos": 1346}, {"type": "A", "before": null, "after": "They also explain why many heuristics are often successful at finding high-scoring partitions in practice and why different heuristics can disagree on the modular structure of the same network.", "start_char_pos": 1467, "end_char_pos": 1467}, {"type": "A", "before": null, "after": "some of", "start_char_pos": 1517, "end_char_pos": 1517}], "sents_char_pos": [0, 163, 264, 352, 583, 803, 981, 1080, 1332, 1466]}
+{"doc_id": "1001.0656", "revision_depth": "1", "before_revision": "We develop a theoretical trading conditioning model subject to price volatility and return in terms of market psychological behavior, based on a volume-price probability wave distribution in which we use transaction volume probability to describe price volatility uncertainty and intensity. Applying the model to high frequent data test in China stock market, we have main findings as follows: 1) there are , in general, significant positive correlations between the rate of mean return and that of change in both trading conditioning intensity and the amount of transaction ; 2) they lack significance in spite of positive correlations in two time intervals right before and just after bubble crashes; and 3) there exists , particularly, significant negative correlation between the rate of mean return and that of change in trading conditioning intensity when SEE Composite Index is rising during bull market. The model and findings can help to well explain disposition effect and excessive trading, to time bubble crash, and to understand other anomalies in stock market.", "after_revision": "We develop a theoretical trading conditioning model subject to price volatility and return information in terms of market psychological behavior, based on analytical transaction volume-price probability wave distributions in which we use transaction volume probability to describe price volatility uncertainty and intensity. Applying the model to high frequent data test in China stock market, we have main findings as follows: 1) there is , in general, significant positive correlation between the rate of mean return and that of change in trading conditioning intensity ; 2) it lacks significance in spite of positive correlation in two time intervals right before and just after bubble crashes; and 3) it shows , particularly, significant negative correlation in a time interval when SSE Composite Index is rising during bull market. Our model and findings can test both disposition effect and herd behavior simultaneously, and explain excessive trading (volume) and other anomalies in stock market.", "edit_actions": [{"type": "A", "before": null, "after": "information", "start_char_pos": 91, "end_char_pos": 91}, {"type": "R", "before": "a", "after": "analytical transaction", "start_char_pos": 144, "end_char_pos": 145}, {"type": "R", "before": "distribution", "after": "distributions", "start_char_pos": 176, "end_char_pos": 188}, {"type": "R", "before": "are", "after": "is", "start_char_pos": 404, "end_char_pos": 407}, {"type": "R", "before": "correlations", "after": "correlation", "start_char_pos": 443, "end_char_pos": 455}, {"type": "D", "before": "both", "after": null, "start_char_pos": 510, "end_char_pos": 514}, {"type": "D", "before": "and the amount of transaction", "after": null, "start_char_pos": 546, "end_char_pos": 575}, {"type": "R", "before": "they lack", "after": "it lacks", "start_char_pos": 581, "end_char_pos": 590}, {"type": "R", "before": "correlations", "after": "correlation", "start_char_pos": 625, "end_char_pos": 637}, {"type": "R", "before": "there exists", "after": "it shows", "start_char_pos": 711, "end_char_pos": 723}, {"type": "R", "before": "between the rate of mean return and that of change in trading conditioning intensity when SEE", "after": "in a time interval when SSE", "start_char_pos": 773, "end_char_pos": 866}, {"type": "R", "before": "The", "after": "Our", "start_char_pos": 913, "end_char_pos": 916}, {"type": "R", "before": "help to well explain", "after": "test both", "start_char_pos": 940, "end_char_pos": 960}, {"type": "R", "before": "excessive trading, to time bubble crash, and to understand", "after": "herd behavior simultaneously, and explain excessive trading (volume) and", "start_char_pos": 984, "end_char_pos": 1042}], "sents_char_pos": [0, 291, 577, 703, 912]}
+{"doc_id": "1001.3003", "revision_depth": "1", "before_revision": "It is known that Heston's stochastic volatility model exhibits moment explosion, and that the critical moment s ^{* can be obtained by solving (numerically) a simple equation. This yields a leading order expansion for the implied volatility at large strikes: BS( k,T)^{2}T\\sim \\Psi (s ^* -1) \\times k (Roger Lee's moment formula). Motivated by recent \"tail-wing\" refinements of this moment formula, we first derive a novel tail expansion for the Heston density, sharpening previous work of Dr \\u{a}%DIFDELCMD < }%%% gulescu and Yakovenko [Quant. Finance 2, 6 (2002), 443--453], and then show the validity of a refined expansion of the type \\% BS( k,T) ^{2}T=( 1k^{1/2}+2+...)^{2}, where all constants are explicitly known as functions of s ^* , the Heston model parameters, spot vol and maturity T. In the case of the \"zero-correlation\" Heston model such an expansion was derived by Gulisashvili and Stein [Appl. Math. Opt. , DOI: 10.1007/s002450099085 ]. Our methods and results may prove useful beyond the Heston model: the entire quantitative analysis is based on affine principles ; at no point do we need knowledge of the (explicit, but cumbersome) closed form expression of the Fourier transform of \\log S_{T} (equivalently: Mellin transform of S_{T} \\% ) . Secondly, our analysis reveals a new parameter (\" \\textit{critical slope \" \\% ), defined in a model free manner, which drives the second and higher order terms in tail- and implied volatility expansions.", "after_revision": "It is known that Heston's stochastic volatility model exhibits moment explosion, and that the critical moment s _+ can be obtained by solving (numerically) a simple equation. This yields a leading order expansion for the implied volatility at large strikes: BS( k,T)^{2}T\\sim \\Psi (s _+ -1) \\times k (Roger Lee's moment formula). Motivated by recent \"tail-wing\" refinements of this moment formula, we first derive a novel tail expansion for the Heston density, sharpening previous work of }%DIFDELCMD < }%%% Dragulescu and Yakovenko [Quant. Finance 2, 6 (2002), 443--453], and then show the validity of a refined expansion of the type BS( k,T) ^{2}T=( 1k^{1/2}+2+...)^{2}, where all constants are explicitly known as functions of s _+ , the Heston model parameters, spot vol and maturity T. In the case of the \"zero-correlation\" Heston model such an expansion was derived by Gulisashvili and Stein [Appl. Math. Optim. 61, 3 (2010), 287--315 ]. Our methods and results may prove useful beyond the Heston model: the entire quantitative analysis is based on affine principles : at no point do we need knowledge of the (explicit, but cumbersome) closed form expression of the Fourier transform of \\log S_{T} \\ (equivalently: Mellin transform of S_{T} ); what matters is that these transforms satisfy ordinary differential equations of Riccati type . Secondly, our analysis reveals a new parameter (\" \\textit{critical slope \" ), defined in a model free manner, which drives the second and higher order terms in tail- and implied volatility expansions.", "edit_actions": [{"type": "R", "before": "^{*", "after": "_+", "start_char_pos": 112, "end_char_pos": 115}, {"type": "R", "before": "^*", "after": "_+", "start_char_pos": 285, "end_char_pos": 287}, {"type": "D", "before": "Dr", "after": null, "start_char_pos": 490, "end_char_pos": 492}, {"type": "D", "before": "\\u{a", "after": null, "start_char_pos": 493, "end_char_pos": 497}, {"type": "R", "before": "gulescu", "after": "Dragulescu", "start_char_pos": 516, "end_char_pos": 523}, {"type": "D", "before": "\\%", "after": null, "start_char_pos": 640, "end_char_pos": 642}, {"type": "R", "before": "^*", "after": "_+", "start_char_pos": 740, "end_char_pos": 742}, {"type": "R", "before": "Opt. , DOI: 10.1007/s002450099085", "after": "Optim. 61, 3 (2010), 287--315", "start_char_pos": 919, "end_char_pos": 952}, {"type": "R", "before": ";", "after": ":", "start_char_pos": 1085, "end_char_pos": 1086}, {"type": "A", "before": null, "after": "\\", "start_char_pos": 1216, "end_char_pos": 1216}, {"type": "R", "before": "\\% )", "after": "); what matters is that these transforms satisfy ordinary differential equations of Riccati type", "start_char_pos": 1258, "end_char_pos": 1262}, {"type": "R", "before": "critical slope", "after": "critical slope", "start_char_pos": 1323, "end_char_pos": 1337}, {"type": "D", "before": "\\%", "after": null, "start_char_pos": 1340, "end_char_pos": 1342}], "sents_char_pos": [0, 175, 330, 545, 674, 798, 912, 955, 1086]}
+{"doc_id": "1004.0965", "revision_depth": "1", "before_revision": "The Wako-Sait\\^o-Mu\\~noz-Eaton } (WSME) model initially introduced in the theory of protein folding can also model some epitaxial phenomena. The advantage of the model is that it admits exact solution in the general inhomogeneous case (Bruscolini and Pelizzola, 2002) which facilitates the modeling of realistic systems. A shortcoming of the model is that it accounts only for interactions within contiguous stretches of native bonds or atomic chains while neglecting interstretch (interchain) interactions. But due to the protein (or atomic chain) flexibility, the residues (atoms) separated by several non-native bonds along the sequence can become very close in the real space which usually causes their strong interaction. Thus, inclusion of non-WSME interactions into the model should make it more realistic and improve its performance. In this paper we augment the WSME model by arbitrary interactions of finite range along the sequence and solve it with the use of a transfer matrix technique. Our method makes it possible to exactly account for the interaction radii along the polypeptide chain which in the proteomics are classified as the medium-range interactions.", "after_revision": "The Wako-Sait \\^o}-Mu\\~noz-Eaton (WSME) model , initially introduced in the theory of protein folding , has also been used in modeling the RNA folding and some epitaxial phenomena. The advantage of this model is that it admits exact solution in the general inhomogeneous case (Bruscolini and Pelizzola, 2002) which facilitates the study of realistic systems. However, a shortcoming of this model is that it accounts only for interactions within contiguous stretches of native bonds or atomic chains while neglecting interstretch (interchain) interactions. But due to the biopolymer ( atomic chain) flexibility, the monomers (atoms) separated by several non-native bonds along the sequence can become closely spaced. This produces their strong interaction. The inclusion of non-WSME interactions into the model makes the model more realistic and improves its performance. In this study we add arbitrary interactions of finite range and solve the new model by means of the transfer matrix technique. We can therefore exactly account for the interactions with the radii along the chain which in the proteomics are classified as medium- and moderately long-range interactions.", "edit_actions": [{"type": "R", "before": "Wako-Sait\\^o-Mu\\~noz-Eaton", "after": "Wako-Sait", "start_char_pos": 4, "end_char_pos": 30}, {"type": "A", "before": null, "after": "\\^o", "start_char_pos": 31, "end_char_pos": 31}, {"type": "A", "before": null, "after": "-Mu\\~noz-Eaton", "start_char_pos": 32, "end_char_pos": 32}, {"type": "A", "before": null, "after": ",", "start_char_pos": 46, "end_char_pos": 46}, {"type": "R", "before": "can also model", "after": ", has also been used in modeling the RNA folding and", "start_char_pos": 101, "end_char_pos": 115}, {"type": "R", "before": "the", "after": "this", "start_char_pos": 159, "end_char_pos": 162}, {"type": "R", "before": "modeling", "after": "study", "start_char_pos": 291, "end_char_pos": 299}, {"type": "R", "before": "A shortcoming of the", "after": "However, a shortcoming of this", "start_char_pos": 322, "end_char_pos": 342}, {"type": "R", "before": "protein (or", "after": "biopolymer (", "start_char_pos": 524, "end_char_pos": 535}, {"type": "R", "before": "residues", "after": "monomers", "start_char_pos": 567, "end_char_pos": 575}, {"type": "R", "before": "very close in the real space which usually causes", "after": "closely spaced. This produces", "start_char_pos": 652, "end_char_pos": 701}, {"type": "R", "before": "Thus,", "after": "The", "start_char_pos": 728, "end_char_pos": 733}, {"type": "R", "before": "should make it", "after": "makes the model", "start_char_pos": 784, "end_char_pos": 798}, {"type": "R", "before": "improve", "after": "improves", "start_char_pos": 818, "end_char_pos": 825}, {"type": "R", "before": "paper we augment the WSME model by", "after": "study we add", "start_char_pos": 851, "end_char_pos": 885}, {"type": "R", "before": "along the sequence and solve it with the use of a", "after": "and solve the new model by means of the", "start_char_pos": 925, "end_char_pos": 974}, {"type": "R", "before": "Our method makes it possible to", "after": "We can therefore", "start_char_pos": 1002, "end_char_pos": 1033}, {"type": "R", "before": "interaction", "after": "interactions with the", "start_char_pos": 1058, "end_char_pos": 1069}, {"type": "D", "before": "polypeptide", "after": null, "start_char_pos": 1086, "end_char_pos": 1097}, {"type": "R", "before": "the medium-range", "after": "medium- and moderately long-range", "start_char_pos": 1146, "end_char_pos": 1162}], "sents_char_pos": [0, 141, 321, 508, 727, 842, 1001]}
+{"doc_id": "1009.4211", "revision_depth": "1", "before_revision": "We consider a stochastic volatility model with L\\'evy jumps for a log-return process Z=(Z _t) _{t %DIFDELCMD < \\ge %%% 0} of the form Z=U+X, where U=(U _t) _{t %DIFDELCMD < \\ge %%% 0} is a classical stochastic volatility process and X=(X _t) _{t %DIFDELCMD < \\ge %%% 0} is an independent L\\'evy process with absolutely continuous L\\'evy measure \\nu. Small-time expansions, of arbitrary polynomial order in time t , are obtained for the tails \\bbp(Z _t%DIFDELCMD < \\ge %%% \\geq } z), z>0, and for the call-option prices \\bbe(e^{z+Z _t } - 1)_+ , z\\neq 0, assuming smoothness conditions on the L\\'evy density away from the origin and a small-time large deviation principle on U. Our approach allows for a unified treatment of general payoff functions of the form \\phi (x){\\bf 1}_{x %DIFDELCMD < \\ge %%% z} for smooth functions \\phi and z>0. As a consequence of our tail expansions, the polynomial expansions in t of the transition densities f _t are obtained under rather mild conditions.", "after_revision": "We consider a stochastic volatility model with L\\'evy jumps for a log-return process Z=(Z _{t _{t %DIFDELCMD < \\ge %%% \\geq 0} of the form Z=U+X, where U=(U _{t _{t %DIFDELCMD < \\ge %%% \\geq 0} is a classical stochastic volatility process and X=(X _{t _{t %DIFDELCMD < \\ge %%% \\geq 0} is an independent L\\'evy process with absolutely continuous L\\'evy measure \\nu. Small-time expansions, of arbitrary polynomial order , in time-t , are obtained for the tails \\bbp(Z %DIFDELCMD < \\ge %%% _{t\\geq } z), z>0, and for the call-option prices \\bbe(e^{z+Z _{t } -1)_{+ , z\\neq 0, assuming smoothness conditions on the L\\'evy density away from the origin and a small-time large deviation principle on U. Our approach allows for a unified treatment of general payoff functions of the form \\varphi (x){\\bf 1}_{x %DIFDELCMD < \\ge %%% \\geq{ z} for smooth functions \\varphi and z>0. As a consequence of our tail expansions, the polynomial expansions in t of the transition densities f _{t mild conditions.", "edit_actions": [{"type": "R", "before": "_t)", "after": "_{t", "start_char_pos": 90, "end_char_pos": 93}, {"type": "A", "before": null, "after": "\\geq", "start_char_pos": 119, "end_char_pos": 119}, {"type": "R", "before": "_t)", "after": "_{t", "start_char_pos": 153, "end_char_pos": 156}, {"type": "A", "before": null, "after": "\\geq", "start_char_pos": 182, "end_char_pos": 182}, {"type": "R", "before": "_t)", "after": "_{t", "start_char_pos": 240, "end_char_pos": 243}, {"type": "A", "before": null, "after": "\\geq", "start_char_pos": 269, "end_char_pos": 269}, {"type": "R", "before": "in time t", "after": ", in time-t", "start_char_pos": 406, "end_char_pos": 415}, {"type": "D", "before": "_t", "after": null, "start_char_pos": 452, "end_char_pos": 454}, {"type": "A", "before": null, "after": "_{t", "start_char_pos": 475, "end_char_pos": 475}, {"type": "R", "before": "_t", "after": "_{t", "start_char_pos": 534, "end_char_pos": 536}, {"type": "R", "before": "- 1)_+", "after": "-1)_{+", "start_char_pos": 539, "end_char_pos": 545}, {"type": "R", "before": "\\phi", "after": "\\varphi", "start_char_pos": 764, "end_char_pos": 768}, {"type": "A", "before": null, "after": "\\geq{", "start_char_pos": 804, "end_char_pos": 804}, {"type": "R", "before": "\\phi", "after": "\\varphi", "start_char_pos": 829, "end_char_pos": 833}, {"type": "R", "before": "_t are obtained under rather", "after": "_{t", "start_char_pos": 945, "end_char_pos": 973}], "sents_char_pos": [0, 352, 842]}
+{"doc_id": "1011.5674", "revision_depth": "1", "before_revision": "Scheduling is a critical and challenging resource allocation mechanism for multi-hop wireless networks. It is well known that scheduling schemes that give a higher priority to the link with larger queue length can achieve high throughput performance. However, this queue-length-based approach could potentially suffer from large (even infinite) packet delays due to the well-known last packet problem, whereby packets may get excessively delayed due to lack of subsequent packet arrivals. Delay-based schemes have the potential to resolve this last packet problem by scheduling the link based on the delay for the packet has encountered. However, the throughput performance of delay-based schemes has largely been an open problem except in limited cases of single-hop networks. In this paper, we investigate delay-based scheduling schemes for multi-hop traffic scenarios . We view packet delays from a different perspective, and develop a scheduling scheme based on a new delay metric . Through rigorous analysis, we show that the proposed scheme achieves the optimal throughput performance. Finally , we conduct extensive simulations to support our analytical results, and show that the delay-based scheduler successfully removes excessive packet delays, while it achieves the same throughput region as the queuelength-based scheme.", "after_revision": "Scheduling is a critical and challenging resource allocation mechanism for multihop wireless networks. It is well known that scheduling schemes that favor links with larger queue length can achieve high throughput performance. However, these queue-length-based schemes could potentially suffer from large (even infinite) packet delays due to the well-known last packet problem, whereby packets belonging to some flows may be excessively delayed due to lack of subsequent packet arrivals. Delay-based schemes have the potential to resolve this last packet problem by scheduling the link based on the delay the packet has encountered. However, characterizing throughput-optimality of these delay-based schemes has largely been an open problem in multihop wireless networks ( except in limited cases where the traffic is single-hop .) In this paper, we investigate delay-based scheduling schemes for multihop traffic scenarios with fixed routes. We develop a scheduling scheme based on a new delay metric , and show that the proposed scheme achieves optimal throughput performance. Further , we conduct simulations to support our analytical results, and show that the delay-based scheduler successfully removes excessive packet delays, while it achieves the same throughput region as the queue-length-based scheme.", "edit_actions": [{"type": "R", "before": "multi-hop", "after": "multihop", "start_char_pos": 75, "end_char_pos": 84}, {"type": "R", "before": "give a higher priority to the link", "after": "favor links", "start_char_pos": 150, "end_char_pos": 184}, {"type": "R", "before": "this", "after": "these", "start_char_pos": 260, "end_char_pos": 264}, {"type": "R", "before": "approach", "after": "schemes", "start_char_pos": 284, "end_char_pos": 292}, {"type": "R", "before": "may get", "after": "belonging to some flows may be", "start_char_pos": 418, "end_char_pos": 425}, {"type": "D", "before": "for", "after": null, "start_char_pos": 606, "end_char_pos": 609}, {"type": "R", "before": "the throughput performance of", "after": "characterizing throughput-optimality of these", "start_char_pos": 647, "end_char_pos": 676}, {"type": "A", "before": null, "after": "in multihop wireless networks (", "start_char_pos": 730, "end_char_pos": 730}, {"type": "R", "before": "of", "after": "where the traffic is", "start_char_pos": 755, "end_char_pos": 757}, {"type": "R", "before": "networks.", "after": ".)", "start_char_pos": 769, "end_char_pos": 778}, {"type": "R", "before": "multi-hop traffic scenarios . We view packet delays from a different perspective, and", "after": "multihop traffic scenarios with fixed routes. We", "start_char_pos": 844, "end_char_pos": 929}, {"type": "R", "before": ". Through rigorous analysis, we", "after": ", and", "start_char_pos": 986, "end_char_pos": 1017}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1057, "end_char_pos": 1060}, {"type": "R", "before": "Finally", "after": "Further", "start_char_pos": 1093, "end_char_pos": 1100}, {"type": "D", "before": "extensive", "after": null, "start_char_pos": 1114, "end_char_pos": 1123}, {"type": "R", "before": "queuelength-based", "after": "queue-length-based", "start_char_pos": 1309, "end_char_pos": 1326}], "sents_char_pos": [0, 103, 250, 488, 637, 778, 873, 987, 1092]}
+{"doc_id": "1102.4293", "revision_depth": "1", "before_revision": "The process of comparison of computer generated protein structural models is an important element of protein structure prediction. It has many uses including model quality evaluation, selection of the final models from a large set of candidates or optimisation of parameters of energy functions used in template free modelling and refinement. Although many protein comparison methods are available online on numerous web servers, their ability to handle a large scale model comparison is often very limited. Most of the servers offer only a single pairwise structural comparison , and they usually do not provide a model-specific comparison with a fixed alignment between the models . To bridge the gap between the protein and model structure comparison we have developed the Protein Models Comparator (pm-cmp). To be able to deliver the scalability on demand and handle large comparison experiments the pm-cmp was implemented \"in the cloud\". Protein Models Comparator is a scalable web application for a fast distributed comparison of protein models with RMSD, GDT TS, TM-score and Q-score measures. It runs on the Google App Engine (GAE) cloud platform and is a showcase of how the emerging PaaS (Platform as a Service) technology could be used to simplify the development of scalable bioinformatics services through outsourcing of the setup and maintenance of the hardware infrastructure . The functionality of the web application has been made available over a programmable API , so that the experiment submission and results retrieval could be automated . Protein Models Comparator is free software released on the Affero GNU Public Licence and is available at: URL This article presents a large scale model-specific protein comparison web application and provides an insight into the GAE platform and its potential value for scientific computations .", "after_revision": "The comparison of computer generated protein structural models is an important element of protein structure prediction. It has many uses including model quality evaluation, selection of the final models from a large set of candidates or optimisation of parameters of energy functions used in template-free modelling and refinement. Although many protein comparison methods are available online on numerous web servers, they are not well suited for large scale model comparison : (1) they operate with methods designed to compare actual proteins, not the models of the same protein, (2) majority of them offer only a single pairwise structural comparison and are unable to scale up to a required order of thousands of comparisons . To bridge the gap between the protein and model structure comparison we have developed the Protein Models Comparator (pm-cmp). To be able to deliver the scalability on demand and handle large comparison experiments the pm-cmp was implemented \"in the cloud\". Protein Models Comparator is a scalable web application for a fast distributed comparison of protein models with RMSD, GDT TS, TM-score and Q-score measures. It runs on the Google App Engine (GAE) cloud platform and is a showcase of how the emerging PaaS (Platform as a Service) technology could be used to simplify the development of scalable bioinformatics services . The functionality of pm-cmp is accessible through API which allows a full automation of the experiment submission and results retrieval . Protein Models Comparator is free software released on the Affero GNU Public Licence and is available with its source code at: URL This article presents a new web application addressing the need for a large-scale model-specific protein structure comparison and provides an insight into the GAE (Google App Engine) platform and its usefulness in scientific computing .", "edit_actions": [{"type": "D", "before": "process of", "after": null, "start_char_pos": 4, "end_char_pos": 14}, {"type": "R", "before": "template free", "after": "template-free", "start_char_pos": 303, "end_char_pos": 316}, {"type": "R", "before": "their ability to handle a", "after": "they are not well suited for", "start_char_pos": 430, "end_char_pos": 455}, {"type": "R", "before": "is often very limited. Most of the servers", "after": ": (1) they operate with methods designed to compare actual proteins, not the models of the same protein, (2) majority of them", "start_char_pos": 485, "end_char_pos": 527}, {"type": "R", "before": ", and they usually do not provide a model-specific comparison with a fixed alignment between the models", "after": "and are unable to scale up to a required order of thousands of comparisons", "start_char_pos": 579, "end_char_pos": 682}, {"type": "D", "before": "through outsourcing of the setup and maintenance of the hardware infrastructure", "after": null, "start_char_pos": 1311, "end_char_pos": 1390}, {"type": "R", "before": "the web application has been made available over a programmable API , so that", "after": "pm-cmp is accessible through API which allows a full automation of", "start_char_pos": 1414, "end_char_pos": 1491}, {"type": "D", "before": "could be automated", "after": null, "start_char_pos": 1540, "end_char_pos": 1558}, {"type": "A", "before": null, "after": "with its source code", "start_char_pos": 1663, "end_char_pos": 1663}, {"type": "R", "before": "large scale", "after": "new web application addressing the need for a large-scale", "start_char_pos": 1696, "end_char_pos": 1707}, {"type": "R", "before": "comparison web application", "after": "structure comparison", "start_char_pos": 1731, "end_char_pos": 1757}, {"type": "A", "before": null, "after": "(Google App Engine)", "start_char_pos": 1795, "end_char_pos": 1795}, {"type": "R", "before": "potential value for scientific computations", "after": "usefulness in scientific computing", "start_char_pos": 1813, "end_char_pos": 1856}], "sents_char_pos": [0, 130, 342, 507, 684, 811, 942, 1100, 1392]}
+{"doc_id": "1103.1460", "revision_depth": "1", "before_revision": "The drawdown process Y= - X {\\em of a completely asymmetric L\\'{e}vy process X is given by X reflected at its running supremum X . In this paper we explicitly express the law of the sextuple (\\tau_a, _{\\tau_a,}X _{\\tau_a,}%DIFDELCMD < \\bar{X}%%% _{\\tau_a,Y_{\\tau_a-},Y_{\\tau_a}-a) } in terms of the scale function and the L\\'evy measure of X , where \\tau_a denotes the first-passage time of Y over the level a>0, \\bar{G}_{\\tau_a} is the time of the last supremum of X prior to \\tau_a and\\underline{X is the running infimum of\\unl X . We also explicitly identify the distribution of the drawup%DIFDELCMD < \\hat{Y}%%% _{\\tau_aat the moment \\tau_a, where }%DIFDELCMD < \\hat{Y} %%% = X-\\underline{X , and derive the probability of a large drawdown preceding a small rally. These results are applied to the Carr%DIFDELCMD < & %%% Wu \\mbox{%DIFAUXCMD \\cite{CarrWu }\\hspace{0pt}%DIFAUXCMD modelfor S}%DIFDELCMD < &%%% P 500. and supremum }\\ovl of X at \\tau_a and the undershoot a - Y_{\\tau_a-} and overshoot Y_{\\tau_a}-a of Y at \\tau_a. As application we obtain explicit expressions for the laws of a number of functionals of drawdowns and rallies in a completely asymmetric exponential L\\'{e}vy model.}", "after_revision": "The {\\em drawdown process Y of a completely asymmetric L\\'{e}vy process X is equal to X reflected at its running supremum X : Y = - X . In this paper we explicitly express ,} ,}%DIFDELCMD < \\bar{X}%%% ,Y_{\\tau_a-},Y_{\\tau_a}-a) } in terms of the scale function and the L\\'{e measure of X the law of the sextuple of the first-passage time of Y over the level a>0, the time \\bar{G}_{\\tau_a} of the last supremum of X prior to \\tau_a \\underline{ , the infimum\\unl X %DIFDELCMD < \\hat{Y}%%% at the moment \\tau_a, where }%DIFDELCMD < \\hat{Y} %%% \\underline{ %DIFDELCMD < & %%% }\\hspace{0pt}%DIFAUXCMD modelfor S}%DIFDELCMD < &%%% _{\\tau_a and supremum }\\ovl X_{\\tau_a of X at \\tau_a and the undershoot a - Y_{\\tau_a-} and overshoot Y_{\\tau_a}-a of Y at \\tau_a. As application we obtain explicit expressions for the laws of a number of functionals of drawdowns and rallies in a completely asymmetric exponential L\\'{e}vy model.}", "edit_actions": [{"type": "D", "before": "drawdown process Y=", "after": null, "start_char_pos": 4, "end_char_pos": 23}, {"type": "D", "before": "- X", "after": null, "start_char_pos": 24, "end_char_pos": 27}, {"type": "A", "before": null, "after": "drawdown", "start_char_pos": 33, "end_char_pos": 33}, {"type": "A", "before": null, "after": "process Y", "start_char_pos": 34, "end_char_pos": 34}, {"type": "R", "before": "given by", "after": "equal to", "start_char_pos": 84, "end_char_pos": 92}, {"type": "A", "before": null, "after": ": Y =", "start_char_pos": 131, "end_char_pos": 131}, {"type": "A", "before": null, "after": "- X", "start_char_pos": 132, "end_char_pos": 132}, {"type": "D", "before": "the law of the sextuple (\\tau_a,", "after": null, "start_char_pos": 171, "end_char_pos": 203}, {"type": "D", "before": "_{\\tau_a", "after": null, "start_char_pos": 204, "end_char_pos": 212}, {"type": "D", "before": "X", "after": null, "start_char_pos": 214, "end_char_pos": 215}, {"type": "D", "before": "_{\\tau_a", "after": null, "start_char_pos": 216, "end_char_pos": 224}, {"type": "D", "before": "_{\\tau_a", "after": null, "start_char_pos": 250, "end_char_pos": 258}, {"type": "R", "before": "L\\'evy", "after": "L\\'{e", "start_char_pos": 326, "end_char_pos": 332}, {"type": "R", "before": ", where \\tau_a denotes the", "after": "the law of the sextuple of the", "start_char_pos": 346, "end_char_pos": 372}, {"type": "A", "before": null, "after": "the time", "start_char_pos": 417, "end_char_pos": 417}, {"type": "D", "before": "is the time", "after": null, "start_char_pos": 435, "end_char_pos": 446}, {"type": "D", "before": "and", "after": null, "start_char_pos": 489, "end_char_pos": 492}, {"type": "D", "before": "X", "after": null, "start_char_pos": 503, "end_char_pos": 504}, {"type": "R", "before": "is the running infimum of", "after": ", the infimum", "start_char_pos": 505, "end_char_pos": 530}, {"type": "D", "before": ". We also explicitly identify the distribution of the drawup", "after": null, "start_char_pos": 537, "end_char_pos": 597}, {"type": "D", "before": "_{\\tau_a", "after": null, "start_char_pos": 621, "end_char_pos": 629}, {"type": "D", "before": "= X-", "after": null, "start_char_pos": 683, "end_char_pos": 687}, {"type": "D", "before": "X", "after": null, "start_char_pos": 698, "end_char_pos": 699}, {"type": "D", "before": ", and derive the probability of a large drawdown preceding a small rally. These results are applied to the Carr", "after": null, "start_char_pos": 700, "end_char_pos": 811}, {"type": "D", "before": "Wu \\mbox{%DIFAUXCMD \\cite{CarrWu", "after": null, "start_char_pos": 830, "end_char_pos": 862}, {"type": "R", "before": "P 500.", "after": "_{\\tau_a", "start_char_pos": 916, "end_char_pos": 922}, {"type": "A", "before": null, "after": "X_{\\tau_a", "start_char_pos": 942, "end_char_pos": 942}], "sents_char_pos": [0, 25, 284, 773, 1035]}
+{"doc_id": "1103.5458", "revision_depth": "2", "before_revision": "Single-nucleotide-resolution chemical mapping for structured RNA is being rapidly advanced by new chemistries, faster readouts, and coupling to computational algorithms. Recent tests have suggested that 2' -OH acylation data (SHAPE) can give near-zero error rates ( 0-4 \\%) in modeling RNA secondary structure. Here, we benchmark the method on six RNAs for which crystallographic data are available: tRNAphe and 5S rRNA from E. coli; the P4-P6 domain of the Tetrahymena group I ribozyme ; and ligand-bound domains from riboswitches for adenine, cyclic di-GMP, and glycine. SHAPE-directed modeling of these RNAs gave significant errors ( overall false negative rate of 17\\% ; false discovery rate of 21\\% ) , with at least one error in five of the six cases. Variations of data processing or modeling do not mitigate these errors. Instead, as evaluated by bootstrapping, the information content of SHAPE data appears insufficient to define these RNAs' structures. Thus, SHAPE-directed RNA modeling is not always accurate , and helix-by-helix confidence estimates, as described herein, may be critical for interpreting results from this powerful methodology.", "after_revision": "Single-nucleotide-resolution chemical mapping for structured RNA is being rapidly advanced by new chemistries, faster readouts, and coupling to computational algorithms. Recent tests have shown that selective 2' -hydroxyl acylation by primer extension (SHAPE) can give near-zero error rates ( 0-2 \\%) in modeling the helices of RNA secondary structure. Here, we benchmark the method using six molecules for which crystallographic data are available: tRNA(phe) and 5S rRNA from Escherichia coli, the P4-P6 domain of the Tetrahymena group I ribozyme , and ligand-bound domains from riboswitches for adenine, cyclic di-GMP, and glycine. SHAPE-directed modeling of these highly structured RNAs gave an overall false negative rate (FNR) of 17\\% and a false discovery rate (FDR) of 21\\% , with at least one helix prediction error in five of the six cases. Extensive variations of data processing , normalization, and modeling parameters did not significantly mitigate modeling errors. Only one varation, filtering out data collected with deoxyinosine triphosphate during primer extension, gave a modest improvement (FNR = 12\\%, and FDR = 14\\%). The residual structure modeling errors are explained by the insufficient information content of these RNAs' SHAPE data, as evaluated by a nonparametric bootstrapping analysis. Beyond these benchmark cases, bootstrapping suggests a low level of confidence (<50\\%) in the majority of helices in a previously proposed SHAPE-directed model for the HIV-1 RNA genome. Thus, SHAPE-directed RNA modeling is not always unambiguous , and helix-by-helix confidence estimates, as described herein, may be critical for interpreting results from this powerful methodology.", "edit_actions": [{"type": "R", "before": "suggested that", "after": "shown that selective", "start_char_pos": 188, "end_char_pos": 202}, {"type": "R", "before": "-OH acylation data", "after": "-hydroxyl acylation by primer extension", "start_char_pos": 206, "end_char_pos": 224}, {"type": "R", "before": "0-4", "after": "0-2", "start_char_pos": 266, "end_char_pos": 269}, {"type": "A", "before": null, "after": "the helices of", "start_char_pos": 286, "end_char_pos": 286}, {"type": "R", "before": "on six RNAs", "after": "using six molecules", "start_char_pos": 342, "end_char_pos": 353}, {"type": "R", "before": "tRNAphe", "after": "tRNA(phe)", "start_char_pos": 401, "end_char_pos": 408}, {"type": "R", "before": "E. coli;", "after": "Escherichia coli,", "start_char_pos": 426, "end_char_pos": 434}, {"type": "R", "before": ";", "after": ",", "start_char_pos": 488, "end_char_pos": 489}, {"type": "R", "before": "RNAs gave significant errors (", "after": "highly structured RNAs gave an", "start_char_pos": 607, "end_char_pos": 637}, {"type": "A", "before": null, "after": "(FNR)", "start_char_pos": 666, "end_char_pos": 666}, {"type": "R", "before": ";", "after": "and a", "start_char_pos": 675, "end_char_pos": 676}, {"type": "A", "before": null, "after": "(FDR)", "start_char_pos": 698, "end_char_pos": 698}, {"type": "D", "before": ")", "after": null, "start_char_pos": 707, "end_char_pos": 708}, {"type": "A", "before": null, "after": "helix prediction", "start_char_pos": 729, "end_char_pos": 729}, {"type": "R", "before": "Variations", "after": "Extensive variations", "start_char_pos": 762, "end_char_pos": 772}, {"type": "R", "before": "or modeling do not mitigate these errors. Instead, as evaluated by bootstrapping, the", "after": ", normalization, and modeling parameters did not significantly mitigate modeling errors. Only one varation, filtering out data collected with deoxyinosine triphosphate during primer extension, gave a modest improvement (FNR = 12\\%, and FDR = 14\\%). The residual structure modeling errors are explained by the insufficient", "start_char_pos": 792, "end_char_pos": 877}, {"type": "D", "before": "SHAPE data appears insufficient to define", "after": null, "start_char_pos": 901, "end_char_pos": 942}, {"type": "R", "before": "structures.", "after": "SHAPE data, as evaluated by a nonparametric bootstrapping analysis. Beyond these benchmark cases, bootstrapping suggests a low level of confidence (<50\\%) in the majority of helices in a previously proposed SHAPE-directed model for the HIV-1 RNA genome.", "start_char_pos": 955, "end_char_pos": 966}, {"type": "R", "before": "accurate", "after": "unambiguous", "start_char_pos": 1015, "end_char_pos": 1023}], "sents_char_pos": [0, 169, 311, 434, 489, 573, 676, 761, 833, 966]}
+{"doc_id": "1104.2156", "revision_depth": "1", "before_revision": "The network traffic matrix is a kind of flow-level Internet traffic data and is widely applied to network operation and management. It is a crucial problem to analyze the composition and structure of traffic matrix; some mathematical approaches such as Principal Component Analysis (PCA) were used to handle that problem . In this paper, we first argue that PCA performs poorly for analyzing traffic matrixes polluted by large volume anomalies, then propose a new composition model of the network traffic matrix. According to our model, structure analysis can be formally defined as decomposing a traffic matrix into low-rank, sparse, and noise sub-matrixes , which is equal to the Robust Principal Component Analysis (RPCA) problem defined in [13]. Based on the Relaxed Principal Component Pursuit (Relaxed PCP) method and the Accelerated Proximal Gradient (APG) algorithm, an iterative algorithm for decomposing a traffic matrix is presented, and our experiment results demonstrate its efficiency and flexibility . At last, further discussions on the deterministic traffic and the noise trafficare carried out. Our study gives a proper method for traffic matrix structure analysis, which has a defense against the pollution of large volume anomalies.", "after_revision": "The network traffic matrix is widely used in network operation and management. It is therefore of crucial importance to analyze the components and the structure of the network traffic matrix, for which several mathematical approaches such as Principal Component Analysis (PCA) were proposed . In this paper, we first argue that PCA performs poorly for analyzing traffic matrix that is polluted by large volume anomalies, and then propose a new decomposition model for the network traffic matrix. According to this model, we carry out the structural analysis by decomposing the network traffic matrix into three sub-matrices, namely, the deterministic traffic, the anomaly traffic and the noise traffic matrix , which is similar to the Robust Principal Component Analysis (RPCA) problem previously studied in [13]. Based on the Relaxed Principal Component Pursuit (Relaxed PCP) method and the Accelerated Proximal Gradient (APG) algorithm, we present an iterative approach for decomposing a traffic matrix , and demonstrate its efficiency and flexibility by experimental results. Finally, we further discuss several features of the deterministic and noise traffic . Our study develops a novel method for the problem of structural analysis of the traffic matrix, which is robust against pollution of large volume anomalies.", "edit_actions": [{"type": "R", "before": "a kind of flow-level Internet traffic data and is widely applied to", "after": "widely used in", "start_char_pos": 30, "end_char_pos": 97}, {"type": "R", "before": "a crucial problem", "after": "therefore of crucial importance", "start_char_pos": 138, "end_char_pos": 155}, {"type": "R", "before": "composition and structure of traffic matrix; some", "after": "components and the structure of the network traffic matrix, for which several", "start_char_pos": 171, "end_char_pos": 220}, {"type": "R", "before": "used to handle that problem", "after": "proposed", "start_char_pos": 293, "end_char_pos": 320}, {"type": "R", "before": "matrixes", "after": "matrix that is", "start_char_pos": 400, "end_char_pos": 408}, {"type": "A", "before": null, "after": "and", "start_char_pos": 445, "end_char_pos": 445}, {"type": "R", "before": "composition model of", "after": "decomposition model for", "start_char_pos": 465, "end_char_pos": 485}, {"type": "R", "before": "our model, structure analysis can be formally defined as decomposing a", "after": "this model, we carry out the structural analysis by decomposing the network", "start_char_pos": 527, "end_char_pos": 597}, {"type": "R", "before": "low-rank, sparse, and noise sub-matrixes", "after": "three sub-matrices, namely, the deterministic traffic, the anomaly traffic and the noise traffic matrix", "start_char_pos": 618, "end_char_pos": 658}, {"type": "R", "before": "equal", "after": "similar", "start_char_pos": 670, "end_char_pos": 675}, {"type": "R", "before": "defined", "after": "previously studied", "start_char_pos": 734, "end_char_pos": 741}, {"type": "R", "before": "an iterative algorithm", "after": "we present an iterative approach", "start_char_pos": 876, "end_char_pos": 898}, {"type": "R", "before": "is presented, and our experiment results", "after": ", and", "start_char_pos": 932, "end_char_pos": 972}, {"type": "A", "before": null, "after": "by experimental results. Finally, we further discuss several features of the deterministic and noise traffic", "start_char_pos": 1016, "end_char_pos": 1016}, {"type": "D", "before": "At last, further discussions on the deterministic traffic and the noise trafficare carried out.", "after": null, "start_char_pos": 1019, "end_char_pos": 1114}, {"type": "R", "before": "gives a proper method for traffic matrix structure analysis, which has a defense against the", "after": "develops a novel method for the problem of structural analysis of the traffic matrix, which is robust against", "start_char_pos": 1125, "end_char_pos": 1217}], "sents_char_pos": [0, 131, 215, 322, 513, 750, 1018, 1114]}
+{"doc_id": "1105.1004", "revision_depth": "1", "before_revision": "In this study, a two-state mechanochemical model is presented to describe the dynamic properties of microtubule (MT) growth in cells. The MT switches between two states, assembly state and disassembly state. In assembly state, the growth of microtubule includes two processes: GTP-tubulin binding to the tip of protofilament (PF) and conformational change of PF, during which the penultimate GTP is hydrolyzed and the first tubulin unit that curls out the MT surface is rearranged into MT surface using the energy released from GTP hydrolysis . In disassembly state, the shortening of microtubule is also described by two processes, the release of GDP-tibulin from the tip of PF and one new tubulin unit curls out from the MT surface. Switches between these two states, which are usually called rescue and catastrophe, happen stochastically with external force dependent rates. Using this two-state model with parameters obtained by fitting the recent experimental data, detailed properties of MT growth are obtained, we find that MT is mainly in assembly state, its mean growth velocity increases with external force and GTP-tubulin concentration, MT will shorten in average without external force. To know more about the external force and GTP concentration dependent MT growth properties , and for the sake of experimental verification of this two-state model, eight {\\it critical forces} are defined and numerically discussed.", "after_revision": "In this study, a two-state mechanochemical model is presented to describe the dynamic instability of microtubules (MTs) in cells. The MTs switches between two states, assembly state and disassembly state. In assembly state, the growth of MTs includes two processes: free GTP-tubulin binding to the tip of protofilament (PF) and conformation change of PF, during which the first tubulin unit which curls outwards is rearranged into MT surface using the energy released from the hydrolysis of GTP in the penultimate tubulin unit . In disassembly state, the shortening of MTs includes also two processes, the release of GDP-tibulin from the tip of PF and one new tubulin unit curls out of the MT surface. Switches between these two states, which are usually called rescue and catastrophe, happen stochastically with external force dependent rates. Using this two-state model with parameters obtained by fitting the recent experimental data, detailed properties of MT growth are obtained, we find that MT is mainly in assembly state, its mean growth velocity increases with external force and GTP-tubulin concentration, MT will shorten in average without external force. To know more about the external force and GTP-tubulin concentration dependent properties of MT growth , and for the sake of the future experimental verification of this two-state model, eleven {\\it critical forces} are defined and numerically discussed.", "edit_actions": [{"type": "R", "before": "properties of microtubule (MT) growth", "after": "instability of microtubules (MTs)", "start_char_pos": 86, "end_char_pos": 123}, {"type": "R", "before": "MT", "after": "MTs", "start_char_pos": 138, "end_char_pos": 140}, {"type": "R", "before": "microtubule", "after": "MTs", "start_char_pos": 241, "end_char_pos": 252}, {"type": "A", "before": null, "after": "free", "start_char_pos": 277, "end_char_pos": 277}, {"type": "R", "before": "conformational", "after": "conformation", "start_char_pos": 335, "end_char_pos": 349}, {"type": "D", "before": "penultimate GTP is hydrolyzed and the", "after": null, "start_char_pos": 381, "end_char_pos": 418}, {"type": "R", "before": "that curls out the MT surface", "after": "which curls outwards", "start_char_pos": 438, "end_char_pos": 467}, {"type": "R", "before": "GTP hydrolysis", "after": "the hydrolysis of GTP in the penultimate tubulin unit", "start_char_pos": 529, "end_char_pos": 543}, {"type": "R", "before": "microtubule is also described by", "after": "MTs includes also", "start_char_pos": 586, "end_char_pos": 618}, {"type": "R", "before": "from", "after": "of", "start_char_pos": 715, "end_char_pos": 719}, {"type": "R", "before": "GTP concentration dependent MT growth properties", "after": "GTP-tubulin concentration dependent properties of MT growth", "start_char_pos": 1243, "end_char_pos": 1291}, {"type": "A", "before": null, "after": "the future", "start_char_pos": 1314, "end_char_pos": 1314}, {"type": "R", "before": "eight", "after": "eleven", "start_char_pos": 1366, "end_char_pos": 1371}], "sents_char_pos": [0, 133, 207, 545, 735, 878, 1200]}
+{"doc_id": "1108.4886", "revision_depth": "1", "before_revision": "We study a stochastic, continuous-time model on a finite horizon for a firm that produces one goodutilizing production capacity (capital) . We model the capital as an Ito diffusion controlled by a nondecreasing process representing the cumulative investment. The firm 's optimal problem is to choose capital investment in order to maximize its expected total net profit . We derive some necessary and sufficient first order conditions for optimality and we characterize the optimal solution of the investment problem in terms of the \"base capacity \" process, i.e. the unique solution of a Representation Problem \\`a la Bank-El Karoui . Under Markovian assumption, we show that the base capacity is in fact deterministic and coincides with the free boundary of the optimal stopping problem naturally associated to the singular control one. For a Cobb-Douglas production function, if the diffusion's coefficients are constant, we are able to show that the free boundary is a continuous function of the time so to remove Assumption- Cfb%DIFDELCMD < ] %%% in Chiarolla and Haussmann (2009) .", "after_revision": "We study a stochastic, continuous time model on a finite horizon for a firm that produces a single good . We model the production capacity as an Ito diffusion controlled by a nondecreasing process representing the cumulative investment. The firm aims to maximize its expected total net profit by choosing the optimal investment process. That is a singular stochastic control problem. We derive some first order conditions for optimality and we characterize the optimal solution in terms of the base capacity process, i.e. the unique solution of a representation problem in the spirit of Bank and El Karoui (2004). We show that the base capacity is deterministic and it is identified with the free boundary of the associated optimal stopping problem , when the coefficients of the controlled diffusion are deterministic functions of time. This is a novelty in the literature on finite horizon singular stochastic control problems. As a subproduct this result allows us to obtain an integral equation for the free boundary %DIFDELCMD < ] %%% , which we explicitly solve in the infinite horizon case for a Cobb-Douglas production function and constant coefficients in the controlled capacity process .", "edit_actions": [{"type": "R", "before": "continuous-time", "after": "continuous time", "start_char_pos": 23, "end_char_pos": 38}, {"type": "R", "before": "one goodutilizing production capacity (capital)", "after": "a single good", "start_char_pos": 90, "end_char_pos": 137}, {"type": "R", "before": "capital", "after": "production capacity", "start_char_pos": 153, "end_char_pos": 160}, {"type": "R", "before": "'s optimal problem is to choose capital investment in order to", "after": "aims to", "start_char_pos": 268, "end_char_pos": 330}, {"type": "R", "before": ".", "after": "by choosing the optimal investment process. That is a singular stochastic control problem.", "start_char_pos": 370, "end_char_pos": 371}, {"type": "D", "before": "necessary and sufficient", "after": null, "start_char_pos": 387, "end_char_pos": 411}, {"type": "D", "before": "of the investment problem", "after": null, "start_char_pos": 491, "end_char_pos": 516}, {"type": "R", "before": "\"base capacity \"", "after": "base capacity", "start_char_pos": 533, "end_char_pos": 549}, {"type": "R", "before": "Representation Problem \\`a la Bank-El Karoui . Under Markovian assumption, we", "after": "representation problem in the spirit of Bank and El Karoui (2004). We", "start_char_pos": 589, "end_char_pos": 666}, {"type": "R", "before": "in fact deterministic and coincides", "after": "deterministic and it is identified", "start_char_pos": 698, "end_char_pos": 733}, {"type": "A", "before": null, "after": "associated", "start_char_pos": 764, "end_char_pos": 764}, {"type": "R", "before": "naturally associated to the singular control one. For a Cobb-Douglas production function, if the diffusion's coefficients are constant, we are able to show that", "after": ", when the coefficients of the controlled diffusion are deterministic functions of time. This is a novelty in the literature on finite horizon singular stochastic control problems. As a subproduct this result allows us to obtain an integral equation for", "start_char_pos": 790, "end_char_pos": 950}, {"type": "D", "before": "is a continuous function of the time so to remove Assumption-", "after": null, "start_char_pos": 969, "end_char_pos": 1030}, {"type": "D", "before": "Cfb", "after": null, "start_char_pos": 1031, "end_char_pos": 1034}, {"type": "R", "before": "in Chiarolla and Haussmann (2009)", "after": ", which we explicitly solve in the infinite horizon case for a Cobb-Douglas production function and constant coefficients in the controlled capacity process", "start_char_pos": 1053, "end_char_pos": 1086}], "sents_char_pos": [0, 139, 258, 371, 635, 839]}
+{"doc_id": "1110.4965", "revision_depth": "2", "before_revision": "In this paper we consider an optimal dividend problem for an insurance company which risk process evolves as a spectrally negative Levy process (in the absence of dividend payments). We assume that the management of the company controls timing and size of dividend payments. The objective is to maximize the sum of the expected cumulative discounted dividends received until the moment of ruin and a penalty payment at the moment of ruin which is an increasing function of the size of the shortfall at ruin; in addition, there may be a fixed cost for taking out dividends. We explicitly solve the corresponding optimal control problem. The solution rests on the characterization of the value-function as (i) the unique stochastic solution of the associated HJB equation and as (ii) the pointwise smallest stochastic supersolution . We show that the optimal value process admits a dividend-penalty decomposition as sum of a martingale (associated to the penalty payment at ruin) and a potential (associated to the dividend payments). We find also an explicit necessary and sufficient condition for optimality of a single dividend-band strategy, in terms of a particular Gerber-Shiu function. We analyze a number of concrete examples .", "after_revision": "This paper concerns an optimal dividend distribution problem for an insurance company which risk process evolves as a spectrally negative L\\'{e process (in the absence of dividend payments). The management of the company is assumed to control timing and size of dividend payments. The objective is to maximize the sum of the expected cumulative discounted dividend payments received until the moment of ruin and a penalty payment at the moment of ruin which is an increasing function of the size of the shortfall at ruin; in addition, there may be a fixed cost for taking out dividends. A complete solution is presented to the corresponding stochastic control problem. It is established that the value-function is the unique stochastic solution and the pointwise smallest stochastic supersolution of the associated HJB equation. Furthermore, a necessary and sufficient condition is identified for optimality of a single dividend-band strategy, in terms of a particular Gerber-Shiu function. A number of concrete examples are analyzed .", "edit_actions": [{"type": "R", "before": "In this paper we consider", "after": "This paper concerns", "start_char_pos": 0, "end_char_pos": 25}, {"type": "A", "before": null, "after": "distribution", "start_char_pos": 46, "end_char_pos": 46}, {"type": "R", "before": "Levy", "after": "L\\'{e", "start_char_pos": 132, "end_char_pos": 136}, {"type": "R", "before": "We assume that the", "after": "The", "start_char_pos": 184, "end_char_pos": 202}, {"type": "R", "before": "controls", "after": "is assumed to control", "start_char_pos": 229, "end_char_pos": 237}, {"type": "R", "before": "dividends", "after": "dividend payments", "start_char_pos": 351, "end_char_pos": 360}, {"type": "R", "before": "We explicitly solve the corresponding optimal", "after": "A complete solution is presented to the corresponding stochastic", "start_char_pos": 574, "end_char_pos": 619}, {"type": "R", "before": "The solution rests on the characterization of the", "after": "It is established that the", "start_char_pos": 637, "end_char_pos": 686}, {"type": "R", "before": "as (i)", "after": "is", "start_char_pos": 702, "end_char_pos": 708}, {"type": "R", "before": "of the associated HJB equation and as (ii)", "after": "and", "start_char_pos": 740, "end_char_pos": 782}, {"type": "R", "before": ". We show that the optimal value process admits a dividend-penalty decomposition as sum of a martingale (associated to the penalty payment at ruin) and a potential (associated to the dividend payments). We find also an explicit", "after": "of the associated HJB equation. Furthermore, a", "start_char_pos": 831, "end_char_pos": 1058}, {"type": "A", "before": null, "after": "is identified", "start_char_pos": 1094, "end_char_pos": 1094}, {"type": "R", "before": "We analyze a", "after": "A", "start_char_pos": 1193, "end_char_pos": 1205}, {"type": "A", "before": null, "after": "are analyzed", "start_char_pos": 1234, "end_char_pos": 1234}], "sents_char_pos": [0, 183, 275, 508, 573, 636, 832, 1033, 1192]}
+{"doc_id": "1110.6265", "revision_depth": "1", "before_revision": "In this paper the results of the BitTorrent measurement study are presented. Two sources of BitTorrent data were utilized: meta-data files that describe the content of resources shared by BitTorrent users and logs of the currently one of the most popular BitTorrent clients - %DIFDELCMD < \\muTorrent%%% .%DIFDELCMD < \\muTorrent %%% is based on { rather newly released UDP-based %DIFDELCMD < \\muTP %%% protocol that is claimed to be more efficient than TCP-based clients. Experimental data have been collected for fifteen days from the popular torrent-discovery site - URL (more than 30 000 torrent were captured and analysed ). During this period the activity and logs of unmodified version of %DIFDELCMD < \\muTorrent %%% client downloading sessions have been also captured. The obtained experimental results are swarm-oriented (not tracker-oriented as it has been usually researched)and allow to look at BitTorrent and its users from the exchanged resources perspective. Moreover, comparative analysis of the clients' connections with and without %DIFDELCMD < \\muTP %%% protocol is carried out to verify to what extent %DIFDELCMD < \\muTP %%% improves BitTorrent transmissions. To authors' best knowledge, none of the previous studies have addressed these issues.", "after_revision": "In this paper the results of the BitTorrent measurement study are presented. Two sources of BitTorrent data were utilized: meta-data files that describe the content of resources shared by BitTorrent users and the logs of one of the currently most popular BitTorrent clients - %DIFDELCMD < \\muTorrent%%% %DIFDELCMD < \\muTorrent %%% \\mu Torrent.{\\mu Torrent is founded upon a rather newly released UDP-based %DIFDELCMD < \\muTP %%% \\mu TP protocol that is claimed to be more efficient than TCP-based clients. Experimental data have been collected for fifteen days from the popular torrent-discovery site URL (more than 30 , 000 torrents were captured and analyzed ). During this period the activity and logs of an unmodified version of %DIFDELCMD < \\muTorrent %%% \\mu Torrent client downloading sessions have also been captured. The obtained experimental results are swarm-oriented (not tracker-oriented as has been previously researched), which has allowed us to look at BitTorrent and its users from an exchanged resources perspective. Moreover, comparative analysis of the clients' connections with and without %DIFDELCMD < \\muTP %%% \\mu TP protocol is carried out to verify to what extent %DIFDELCMD < \\muTP %%% \\mu TP improves BitTorrent transmissions. To the authors' best knowledge, none of the previous studies have addressed these issues.", "edit_actions": [{"type": "R", "before": "logs of the currently", "after": "the logs of", "start_char_pos": 209, "end_char_pos": 230}, {"type": "A", "before": null, "after": "currently", "start_char_pos": 242, "end_char_pos": 242}, {"type": "D", "before": ".", "after": null, "start_char_pos": 304, "end_char_pos": 305}, {"type": "R", "before": "is based on", "after": "\\mu", "start_char_pos": 333, "end_char_pos": 344}, {"type": "A", "before": null, "after": "Torrent.", "start_char_pos": 345, "end_char_pos": 345}, {"type": "A", "before": null, "after": "\\mu", "start_char_pos": 346, "end_char_pos": 346}, {"type": "A", "before": null, "after": "Torrent is founded upon a", "start_char_pos": 347, "end_char_pos": 347}, {"type": "A", "before": null, "after": "\\mu", "start_char_pos": 403, "end_char_pos": 403}, {"type": "A", "before": null, "after": "TP", "start_char_pos": 404, "end_char_pos": 404}, {"type": "D", "before": "-", "after": null, "start_char_pos": 570, "end_char_pos": 571}, {"type": "A", "before": null, "after": ",", "start_char_pos": 590, "end_char_pos": 590}, {"type": "R", "before": "torrent", "after": "torrents", "start_char_pos": 595, "end_char_pos": 602}, {"type": "R", "before": "analysed", "after": "analyzed", "start_char_pos": 621, "end_char_pos": 629}, {"type": "A", "before": null, "after": "an", "start_char_pos": 677, "end_char_pos": 677}, {"type": "A", "before": null, "after": "\\mu", "start_char_pos": 728, "end_char_pos": 728}, {"type": "A", "before": null, "after": "Torrent", "start_char_pos": 729, "end_char_pos": 729}, {"type": "R", "before": "been also", "after": "also been", "start_char_pos": 763, "end_char_pos": 772}, {"type": "R", "before": "it has been usually researched)and allow", "after": "has been previously researched), which has allowed us", "start_char_pos": 861, "end_char_pos": 901}, {"type": "R", "before": "the", "after": "an", "start_char_pos": 943, "end_char_pos": 946}, {"type": "A", "before": null, "after": "\\mu", "start_char_pos": 1079, "end_char_pos": 1079}, {"type": "A", "before": null, "after": "TP", "start_char_pos": 1080, "end_char_pos": 1080}, {"type": "A", "before": null, "after": "\\mu", "start_char_pos": 1153, "end_char_pos": 1153}, {"type": "A", "before": null, "after": "TP", "start_char_pos": 1154, "end_char_pos": 1154}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1193, "end_char_pos": 1193}], "sents_char_pos": [0, 76, 474, 632, 782, 979, 1189]}
+{"doc_id": "1112.6085", "revision_depth": "1", "before_revision": "We have studied the empirical distribution of cancellation positions through rebuilding the limit-order book using the order flow data of 23 liquid stocks traded on the Shenzhen Stock Exchange in the year 2003. We find that the probability density function (PDF) of relative price levels where cancellations allocate obeys the log-normal distribution. We then analyze the PDF of normalized relative price levels by removing the factor of order numbers stored at the price level, and find that the PDF has a power-law behavior in the tails for both buy and sell orders. When we focus on the probability distribution of cancellation positions at a certain price level, we find that the PDF increases rapidly in the front of the queue, and then fluctuates around a constat value until the end of the queue. In addtion, the PDF of cancellation positions can be fitted by the exponent function for both buy and sell orders .", "after_revision": "Order submission and cancellation are two constituent actions of stock trading behaviors in order-driven markets. Order submission dynamics has been extensively studied for different markets, while order cancellation dynamics is less understood. There are two positions associated with a cancellation, that is, the price level in the limit-order book (LOB) and the position in the queue at each price level. We study the profiles of these two order cancellation positions through rebuilding the limit-order book using the order flow data of 23 liquid stocks traded on the Shenzhen Stock Exchange in the year 2003. We find that the profiles of relative price levels where cancellations occur obey a log-normal distribution. After normalizing the relative price level by removing the factor of order numbers stored at the price level, we find that the profiles exhibit a power-law scaling behavior on the right tails for both buy and sell orders. When focusing on the order cancellation positions in the queue at each price level, we find that the profiles increase rapidly in the front of the queue, and then fluctuate around a constant value till the end of the queue. These profiles are similar for different stocks. In addition, the profiles of cancellation positions can be fitted by an exponent function for both buy and sell orders . These two kinds of cancellation profiles seem universal for different stocks investigated and exhibit minor asymmetry between buy and sell orders. Our empirical findings shed new light on the order cancellation dynamics and pose constraints on the construction of order-driven stock market models .", "edit_actions": [{"type": "R", "before": "We have studied the empirical distribution of", "after": "Order submission and cancellation are two constituent actions of stock trading behaviors in order-driven markets. Order submission dynamics has been extensively studied for different markets, while order cancellation dynamics is less understood. There are two positions associated with a cancellation, that is, the price level in the limit-order book (LOB) and the position in the queue at each price level. We study the profiles of these two order", "start_char_pos": 0, "end_char_pos": 45}, {"type": "R", "before": "probability density function (PDF)", "after": "profiles", "start_char_pos": 228, "end_char_pos": 262}, {"type": "R", "before": "allocate obeys the", "after": "occur obey a", "start_char_pos": 308, "end_char_pos": 326}, {"type": "R", "before": "We then analyze the PDF of normalized relative price levels", "after": "After normalizing the relative price level", "start_char_pos": 352, "end_char_pos": 411}, {"type": "R", "before": "and", "after": "we", "start_char_pos": 479, "end_char_pos": 482}, {"type": "R", "before": "PDF has", "after": "profiles exhibit", "start_char_pos": 497, "end_char_pos": 504}, {"type": "R", "before": "behavior in the", "after": "scaling behavior on the right", "start_char_pos": 517, "end_char_pos": 532}, {"type": "R", "before": "we focus on the probability distribution of cancellation positions at a certain", "after": "focusing on the order cancellation positions in the queue at each", "start_char_pos": 574, "end_char_pos": 653}, {"type": "R", "before": "PDF increases", "after": "profiles increase", "start_char_pos": 684, "end_char_pos": 697}, {"type": "R", "before": "fluctuates around a constat value until", "after": "fluctuate around a constant value till", "start_char_pos": 742, "end_char_pos": 781}, {"type": "R", "before": "In addtion, the PDF", "after": "These profiles are similar for different stocks. In addition, the profiles", "start_char_pos": 804, "end_char_pos": 823}, {"type": "R", "before": "the", "after": "an", "start_char_pos": 867, "end_char_pos": 870}, {"type": "A", "before": null, "after": ". These two kinds of cancellation profiles seem universal for different stocks investigated and exhibit minor asymmetry between buy and sell orders. Our empirical findings shed new light on the order cancellation dynamics and pose constraints on the construction of order-driven stock market models", "start_char_pos": 918, "end_char_pos": 918}], "sents_char_pos": [0, 210, 351, 568, 803]}
+{"doc_id": "1202.1358", "revision_depth": "1", "before_revision": "The fundamental law for protein folding is the %DIFDELCMD < {\\bf %%% Thermodynamic Principle : the amino acid sequence of a protein determines its native structure and the native structure has the minimum Gibbs free energy among all possible conformations of the protein. The very essential of the thermodynamic principle, a Gibbs free energy formula G( %DIFDELCMD < \\bX%%% ) for every possible conformation %DIFDELCMD < \\bX %%% of the protein , has never been theoretically formulated from the fundamental physical laws. We will apply quantum statistics to derive such a formula. The formula has two versions, the chemical balance version is: equation*%DIFDELCMD < } %%% G(%DIFDELCMD < \\bX%%% ) = \\mu_eN_e(%DIFDELCMD < \\bX%%% ) + \\sum_{i=1^H \\mu_i N_i(}%DIFDELCMD < \\bX%%% ), equation*%DIFDELCMD < } %%% where N_e(%DIFDELCMD < \\bX%%% ) is the mean number of electrons in the space included by the first hydration shell of%DIFDELCMD < \\bX%%% , \\mu_e is its chemical potential; the index i, 1%DIFDELCMD < \\le %%% i%DIFDELCMD < \\le %%% H, is the hydrophobicity classification of atoms. N_i(%DIFDELCMD < \\bX%%% ) is the mean number of water molecules in the first hydration layer that directly contact to the atoms with the hydrophobicity degree i; \\mu_i is the chemical potential. Label all atoms of hydrophobicity degree i by H_i and let M_\\bX be the molecular surface for the conformation%DIFDELCMD < \\bX%%% , defining M_{\\bX_i as the set of points in M_\\bX that are closer to atoms in H_i than any atoms in H_j, j }%DIFDELCMD < \\ne %%% i. Then the geometric version of G(%DIFDELCMD < \\bX%%% ) resembles to well-known surface area models , plus a volume term: equation*%DIFDELCMD < } %%% G(%DIFDELCMD < \\bX%%% ) = a\\mu_e V(\\Omega_\\bX)+ ad_w\\mu_eA(M_\\bX) + \\sum_{i=1^H\\nu_i \\mu_i A(M_{\\bX_i}), }%DIFDELCMD < \\quad %%% a , \\nu_i > 0, equation*%DIFDELCMD < } %%% where V(\\Omega_\\bX) is the volume of the domain \\Omega_\\bX enclosed by M_\\bX, d_w is the diameter of a water molecule, and A(M_\\bX) and A(M_{\\bX_i) are the areas of M_\\bX and M_{\\bX_i}} \\nablaxi .", "after_revision": "The fundamental law for protein folding is the %DIFDELCMD < {\\bf %%% Thermodynamic Principle : the amino acid sequence of a protein determines its native structure and the native structure has the minimum Gibbs free energy . If all chemical problems can be answered by quantum mechanics, there should be a quantum mechanics derivation of Gibbs free energy formula G( %DIFDELCMD < \\bX%%% X ) for every possible conformation %DIFDELCMD < \\bX %%% X of the protein . We apply quantum statistics to derive such a formula. %DIFDELCMD < } %%% %DIFDELCMD < \\bX%%% %DIFDELCMD < \\bX%%% ^H \\mu_i N_i(}%DIFDELCMD < \\bX%%% %DIFDELCMD < } %%% %DIFDELCMD < \\bX%%% %DIFDELCMD < \\bX%%% %DIFDELCMD < \\le %%% %DIFDELCMD < \\le %%% %DIFDELCMD < \\bX%%% %DIFDELCMD < \\bX%%% as the set of points in M_\\bX that are closer to atoms in H_i than any atoms in H_j, j }%DIFDELCMD < \\ne %%% %DIFDELCMD < \\bX%%% For simplicity, only monomeric self folding globular proteins are covered. We point out some immediate applications of the formula. We show that the formula explains the observed phenomena very well. It gives a unified explanation to both folding and denaturation; it explains why hydrophobic effect is the driving force of protein folding and clarifies the role played by hydrogen bonding; it explains the successes and deficients of various surface area models %DIFDELCMD < } %%% %DIFDELCMD < \\bX%%% . The formula also gives a clear kinetic force of the folding: Fi(X ) = ^H\\nu_i \\mu_i A(M_{\\bX_i}), }%DIFDELCMD < \\quad %%% %DIFDELCMD < } %%% ) are the areas of M_\\bX and M_{\\bX_i}} -\\nablaxi G(X). This also gives a natural way to perform the ab initio prediction of protein structure, minimizing G(X) by Newton's fastest desciending method .", "edit_actions": [{"type": "R", "before": "Thermodynamic Principle", "after": "Thermodynamic Principle", "start_char_pos": 69, "end_char_pos": 92}, {"type": "R", "before": "among all possible conformations of the protein. The very essential of the thermodynamic principle, a", "after": ". If all chemical problems can be answered by quantum mechanics, there should be a quantum mechanics derivation of", "start_char_pos": 223, "end_char_pos": 324}, {"type": "A", "before": null, "after": "X", "start_char_pos": 374, "end_char_pos": 374}, {"type": "A", "before": null, "after": "X", "start_char_pos": 430, "end_char_pos": 430}, {"type": "R", "before": ", has never been theoretically formulated from the fundamental physical laws. We will", "after": ". We", "start_char_pos": 446, "end_char_pos": 531}, {"type": "D", "before": "The formula has two versions, the chemical balance version is:", "after": null, "start_char_pos": 583, "end_char_pos": 645}, {"type": "D", "before": "equation*", "after": null, "start_char_pos": 646, "end_char_pos": 655}, {"type": "D", "before": "G(", "after": null, "start_char_pos": 674, "end_char_pos": 676}, {"type": "D", "before": ") = \\mu_eN_e(", "after": null, "start_char_pos": 696, "end_char_pos": 709}, {"type": "D", "before": ") + \\sum_{i=1", "after": null, "start_char_pos": 729, "end_char_pos": 742}, {"type": "D", "before": "),", "after": null, "start_char_pos": 776, "end_char_pos": 778}, {"type": "D", "before": "equation*", "after": null, "start_char_pos": 779, "end_char_pos": 788}, {"type": "D", "before": "where N_e(", "after": null, "start_char_pos": 807, "end_char_pos": 817}, {"type": "D", "before": ") is the mean number of electrons in the space included by the first hydration shell of", "after": null, "start_char_pos": 837, "end_char_pos": 924}, {"type": "D", "before": ", \\mu_e is its chemical potential; the index i, 1", "after": null, "start_char_pos": 944, "end_char_pos": 993}, {"type": "D", "before": "i", "after": null, "start_char_pos": 1014, "end_char_pos": 1015}, {"type": "D", "before": "H, is the hydrophobicity classification of atoms. N_i(", "after": null, "start_char_pos": 1036, "end_char_pos": 1090}, {"type": "D", "before": ") is the mean number of water molecules in the first hydration layer that directly contact to the atoms with the hydrophobicity degree i; \\mu_i is the chemical potential. Label all atoms of hydrophobicity degree i by H_i and let M_\\bX be the molecular surface for the conformation", "after": null, "start_char_pos": 1110, "end_char_pos": 1390}, {"type": "D", "before": ", defining M_{\\bX_i", "after": null, "start_char_pos": 1410, "end_char_pos": 1429}, {"type": "D", "before": "i. Then the geometric version of G(", "after": null, "start_char_pos": 1539, "end_char_pos": 1574}, {"type": "R", "before": ") resembles to well-known", "after": "For simplicity, only monomeric self folding globular proteins are covered. We point out some immediate applications of the formula. We show that the formula explains the observed phenomena very well. It gives a unified explanation to both folding and denaturation; it explains why hydrophobic effect is the driving force of protein folding and clarifies the role played by hydrogen bonding; it explains the successes and deficients of various", "start_char_pos": 1594, "end_char_pos": 1619}, {"type": "D", "before": ", plus a volume term:", "after": null, "start_char_pos": 1640, "end_char_pos": 1661}, {"type": "D", "before": "equation*", "after": null, "start_char_pos": 1662, "end_char_pos": 1671}, {"type": "D", "before": "G(", "after": null, "start_char_pos": 1690, "end_char_pos": 1692}, {"type": "A", "before": null, "after": ". The formula also gives a clear kinetic force of the folding: Fi(X", "start_char_pos": 1712, "end_char_pos": 1712}, {"type": "D", "before": "a\\mu_e V(\\Omega_\\bX)+ ad_w\\mu_eA(M_\\bX) + \\sum_{i=1", "after": null, "start_char_pos": 1717, "end_char_pos": 1768}, {"type": "D", "before": "a , \\nu_i > 0,", "after": null, "start_char_pos": 1820, "end_char_pos": 1834}, {"type": "D", "before": "equation*", "after": null, "start_char_pos": 1835, "end_char_pos": 1844}, {"type": "D", "before": "where V(\\Omega_\\bX) is the volume of the domain \\Omega_\\bX enclosed by M_\\bX, d_w is the diameter of a water molecule, and A(M_\\bX) and A(M_{\\bX_i", "after": null, "start_char_pos": 1863, "end_char_pos": 2009}, {"type": "A", "before": null, "after": "-", "start_char_pos": 2049, "end_char_pos": 2049}, {"type": "A", "before": null, "after": "G(X). This also gives a natural way to perform the ab initio prediction of protein structure, minimizing G(X) by Newton's fastest desciending method", "start_char_pos": 2058, "end_char_pos": 2058}], "sents_char_pos": [0, 271, 523, 582, 978, 1085, 1247, 1280, 1661]}
+{"doc_id": "1203.6631", "revision_depth": "1", "before_revision": "We explore the inversion of derivatives prices to obtain an implied probability measure on volatility's hidden state. Stochastic volatility is a hidden Markov model (HMM) , and HMMs ordinarily warrant filtering. However, derivative data is a set of conditional expectations that are already observed in the market, so rather than use filtering techniques we compute animplied distribution by inverting the market's option prices. Robustness is an issue when model parameters are probably unknown, but isn't crippling in practical settings because the data is sufficiently imprecise and prevents us from reducing the fitting error down to levels where parameter uncertainty will show . When applied to SPX data, the estimated model and implied distributions produce variance swap rates that are consistent with the VIX , and also pick up some of the monthly effects that occur from option expiration. We find that parsimony of the Heston model is beneficial because we are able to decipher behavior in estimated parameters and implied measures, whereas the richer Heston model with jumps produces a better fit but also has implied behavior that is less revealing .", "after_revision": "We formulate and analyze an inverse problem using derivatives prices to obtain an implied filtering density on volatility's hidden state. Stochastic volatility is the unobserved state in a hidden Markov model (HMM) and can be tracked using Bayesian filtering. However, derivative data can be considered as conditional expectations that are already observed in the market, and which can be used as input to an inverse problem whose solution is an implied conditional density on volatility. Our analysis relies on a specification of the martingale change of measure, which we refer to asseparability. This specification has a multiplicative component that behaves like a risk premium on volatility uncertainty in the market . When applied to SPX options data, the estimated model and implied densities produce variance-swap rates that are consistent with the VIX volatility index. The implied densities are relatively stable over time and pick up some of the monthly effects that occur due to the options' expiration, indicating that the volatility-uncertainty premium could experience cyclic effects due to the maturity date of the options .", "edit_actions": [{"type": "R", "before": "explore the inversion of", "after": "formulate and analyze an inverse problem using", "start_char_pos": 3, "end_char_pos": 27}, {"type": "R", "before": "probability measure", "after": "filtering density", "start_char_pos": 68, "end_char_pos": 87}, {"type": "A", "before": null, "after": "the unobserved state in", "start_char_pos": 143, "end_char_pos": 143}, {"type": "R", "before": ", and HMMs ordinarily warrant", "after": "and can be tracked using Bayesian", "start_char_pos": 172, "end_char_pos": 201}, {"type": "R", "before": "is a set of", "after": "can be considered as", "start_char_pos": 238, "end_char_pos": 249}, {"type": "D", "before": "so rather than use filtering techniques we compute an", "after": null, "start_char_pos": 316, "end_char_pos": 369}, {"type": "D", "before": "implied distribution", "after": null, "start_char_pos": 369, "end_char_pos": 389}, {"type": "R", "before": "by inverting the market's option prices. Robustness is an issue when model parameters are probably unknown, but isn't crippling in practical settings because the data is sufficiently imprecise and prevents us from reducing the fitting error down to levels where parameter uncertainty will show", "after": "and which can be used as input to an inverse problem whose solution is an implied conditional density on volatility. Our analysis relies on a specification of the martingale change of measure, which we refer to as", "start_char_pos": 390, "end_char_pos": 683}, {"type": "A", "before": null, "after": "separability", "start_char_pos": 683, "end_char_pos": 683}, {"type": "A", "before": null, "after": ". This specification has a multiplicative component that behaves like a risk premium on volatility uncertainty in the market", "start_char_pos": 683, "end_char_pos": 683}, {"type": "A", "before": null, "after": "options", "start_char_pos": 706, "end_char_pos": 706}, {"type": "R", "before": "distributions produce variance swap", "after": "densities produce variance-swap", "start_char_pos": 745, "end_char_pos": 780}, {"type": "R", "before": ", and also", "after": "volatility index. The implied densities are relatively stable over time and", "start_char_pos": 820, "end_char_pos": 830}, {"type": "R", "before": "from option expiration. We find that parsimony of the Heston model is beneficial because we are able to decipher behavior in estimated parameters and implied measures, whereas the richer Heston model with jumps produces a better fit but also has implied behavior that is less revealing", "after": "due to the options' expiration, indicating that the volatility-uncertainty premium could experience cyclic effects due to the maturity date of the options", "start_char_pos": 878, "end_char_pos": 1163}], "sents_char_pos": [0, 117, 212, 430, 685, 901]}
+{"doc_id": "1204.5055", "revision_depth": "1", "before_revision": "The aim of this paper is twofold: to provide a theoretical framework and to give further empirical support to Shiller's test of the appropriateness of prices in the stock market based on the Cyclically Adjusted Price Earnings (CAPE) ratio. We devote the first part of the paper to the empirical analysis and we show that the CAPE is a powerful predictor of future long run performances of the market not only for the U. S. but also for countries such as Belgium, France, Germany, Japan, the Netherlands, Norway, Sweden and Switzerland. We show four relevant empirical facts: i) the striking ability of the logarithmic averaged earning over price ratio to predict returns of the index, ii) how this evidence increases switching from returns to gross returns, iii) moving over different time horizons, the regression coefficients are constant in a statistically robust way, and iv) the poorness of the prediction when the precursor is adjusted with long term interest rate. In the second part we provide a theoretical justification of the empirical observations. Indeed we propose a simple model of the price dynamics in which the return growth depends on three components: a ) a momentum component, naturally justified in terms of agents' belief that expected returns are higher in bullish markets than in bearish ones ; b ) a fundamental component proportional to the log earnings over price ratio at time zero , from which the actual stock price may deviate as an effect of random external disturbances, and c ) a driving component ensuring the diffusive behaviour of stock prices. Under these assumptions, we are able to prove that , if we consider a sufficiently large number of periods, the expected rate of return and the expected gross return are linear in the initial time value of the log earnings over price ratio , and their variance goes to zero with rate of convergence equal to minus one .", "after_revision": "We present a simple dynamical model of stock index returns which is grounded on the ability of the Cyclically Adjusted Price Earning (CAPE) valuation ratio devised by Robert Shiller to predict long-horizon performances of the market . More precisely, we discuss a discrete time dynamics in which the return growth depends on three components: i ) a momentum component, naturally justified in terms of agents' belief that expected returns are higher in bullish markets than in bearish ones , ii ) a fundamental component proportional to the logarithmic CAPE at time zero . The initial value of the ratio determines the reference growth level , from which the actual stock price may deviate as an effect of random external disturbances, and iii ) a driving component which ensures the diffusive behaviour of stock prices. Under these assumptions, we prove that for a sufficiently large horizon the expected rate of return and the expected gross return are linear in the initial logarithmic CAPE , and their variance goes to zero with a rate of convergence consistent with the diffusive behaviour. Eventually this means that the momentum component may generate bubbles and crashes in the short and medium run, nevertheless the valuation ratio remains a good reference point of future long-run returns .", "edit_actions": [{"type": "R", "before": "The aim of this paper is twofold: to provide a theoretical framework and to give further empirical support to Shiller's test of the appropriateness of prices in the stock market based on the", "after": "We present a simple dynamical model of stock index returns which is grounded on the ability of the", "start_char_pos": 0, "end_char_pos": 190}, {"type": "R", "before": "Earnings", "after": "Earning", "start_char_pos": 217, "end_char_pos": 225}, {"type": "R", "before": "ratio. We devote the first part of the paper to the empirical analysis and we show that the CAPE is a powerful predictor of future long run", "after": "valuation ratio devised by Robert Shiller to predict long-horizon", "start_char_pos": 233, "end_char_pos": 372}, {"type": "R", "before": "not only for the U. S. but also for countries such as Belgium, France, Germany, Japan, the Netherlands, Norway, Sweden and Switzerland. We show four relevant empirical facts: i) the striking ability of the logarithmic averaged earning over price ratio to predict returns of the index, ii) how this evidence increases switching from returns to gross returns, iii) moving over different time horizons, the regression coefficients are constant in a statistically robust way, and iv) the poorness of the prediction when the precursor is adjusted with long term interest rate. In the second part we provide a theoretical justification of the empirical observations. Indeed we propose a simple model of the price", "after": ". More precisely, we discuss a discrete time", "start_char_pos": 400, "end_char_pos": 1106}, {"type": "R", "before": "a", "after": "i", "start_char_pos": 1172, "end_char_pos": 1173}, {"type": "R", "before": "; b", "after": ", ii", "start_char_pos": 1318, "end_char_pos": 1321}, {"type": "R", "before": "log earnings over price ratio", "after": "logarithmic CAPE", "start_char_pos": 1368, "end_char_pos": 1397}, {"type": "A", "before": null, "after": ". The initial value of the ratio determines the reference growth level", "start_char_pos": 1411, "end_char_pos": 1411}, {"type": "R", "before": "c", "after": "iii", "start_char_pos": 1510, "end_char_pos": 1511}, {"type": "R", "before": "ensuring", "after": "which ensures", "start_char_pos": 1534, "end_char_pos": 1542}, {"type": "R", "before": "are able to prove that , if we consider", "after": "prove that for", "start_char_pos": 1612, "end_char_pos": 1651}, {"type": "R", "before": "number of periods,", "after": "horizon", "start_char_pos": 1673, "end_char_pos": 1691}, {"type": "R", "before": "time value of the log earnings over price ratio", "after": "logarithmic CAPE", "start_char_pos": 1776, "end_char_pos": 1823}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1863, "end_char_pos": 1863}, {"type": "R", "before": "equal to minus one", "after": "consistent with the diffusive behaviour. Eventually this means that the momentum component may generate bubbles and crashes in the short and medium run, nevertheless the valuation ratio remains a good reference point of future long-run returns", "start_char_pos": 1884, "end_char_pos": 1902}], "sents_char_pos": [0, 239, 535, 971, 1060, 1319, 1583]}
+{"doc_id": "1206.3768", "revision_depth": "1", "before_revision": "In some Density Functional Theory based simulations each self-consistent cycle comprises dozens of large dense generalized eigenproblems. In a recent study , it was proposed to consider simulations as made of dozens of sequences of eigenvalue problems , where each sequence groups together eigenproblems with equal {\\bf k}-vectors and an increasing outer-iteration cycle index i. It was then demonstrated that successive eigenproblems in a sequence are strongly correlated to one another. In particular, by tracking the evolution of subspace angles between eigenvectors of successive eigenproblems, it was shown that these angles decrease noticeably after the first few iterations and become close to collinear . This last result suggests that we could manipulate the eigenvectors, solving for a specific eigenproblem in a sequence, as an approximate solution for the following eigenproblem. In the present work we present a set of preliminary results confirming this initial intuition. We provide numerical examples where opportunely selected block iterative solvers benefit from the reuse of eigenvectors by achieving a substantial speed-up. All the numerical tests are run employing sequences of eigenproblems extracted from simulations of real-world materials . The results presented here could eventually open the way to a widespread use of block iterative solvers in ab initio electronic structure codes even when dealing with dense eigenproblems .", "after_revision": "In Density Functional Theory simulations based on the LAPW method, each self-consistent cycle comprises dozens of large dense generalized eigenproblems. In contrast to real-space methods, eigenpairs solving for problems at distinct cycles have either been believed to be independent or at most very loosely connected. In a recent study \\mbox{%DIFAUXCMD DBB , it was proposed to revert this point of view and consider simulations as made of dozens of sequences of eigenvalue problems ; each sequence groups together eigenproblems with equal {\\bf k}-vectors and an increasing outer-iteration cycle index \\ell. From this different standpoint it was possible to demonstrate that, contrary to belief, successive eigenproblems in a sequence are strongly correlated with one another. In particular, by tracking the evolution of subspace angles between eigenvectors of successive eigenproblems, it was shown that these angles decrease noticeably after the first few iterations and become close to collinear : the closer to convergence the stronger the correlation becomes . This last result suggests that we can manipulate the eigenvectors, solving for a specific eigenproblem in a sequence, as an approximate solution for the following eigenproblem. In this work we present results that are in line with this intuition. First, we provide numerical examples where opportunely selected block iterative solvers benefit from the reuse of eigenvectors by achieving a substantial speed-up. We then develop a C language version of one of these algorithms and run a series of tests specifically focused on performance and scalability. All the numerical tests are carried out employing sequences of eigenproblems extracted from simulations of solid-state physics crystals . The results presented here could eventually open the way to a widespread use of block iterative solvers in ab initio electronic structure codes based on the LAPW approach .", "edit_actions": [{"type": "D", "before": "some", "after": null, "start_char_pos": 3, "end_char_pos": 7}, {"type": "R", "before": "based simulations", "after": "simulations based on the LAPW method,", "start_char_pos": 34, "end_char_pos": 51}, {"type": "A", "before": null, "after": "contrast to real-space methods, eigenpairs solving for problems at distinct cycles have either been believed to be independent or at most very loosely connected. In", "start_char_pos": 141, "end_char_pos": 141}, {"type": "A", "before": null, "after": "\\mbox{%DIFAUXCMD DBB", "start_char_pos": 157, "end_char_pos": 157}, {"type": "A", "before": null, "after": "revert this point of view and", "start_char_pos": 179, "end_char_pos": 179}, {"type": "R", "before": ", where", "after": ";", "start_char_pos": 255, "end_char_pos": 262}, {"type": "R", "before": "i. It was then demonstrated that", "after": "\\ell. From this different standpoint it was possible to demonstrate that, contrary to belief,", "start_char_pos": 380, "end_char_pos": 412}, {"type": "R", "before": "to", "after": "with", "start_char_pos": 476, "end_char_pos": 478}, {"type": "A", "before": null, "after": ": the closer to convergence the stronger the correlation becomes", "start_char_pos": 714, "end_char_pos": 714}, {"type": "R", "before": "could", "after": "can", "start_char_pos": 751, "end_char_pos": 756}, {"type": "R", "before": "the present", "after": "this", "start_char_pos": 899, "end_char_pos": 910}, {"type": "R", "before": "a set of preliminary results confirming this initial intuition. We", "after": "results that are in line with this intuition. First, we", "start_char_pos": 927, "end_char_pos": 993}, {"type": "A", "before": null, "after": "We then develop a C language version of one of these algorithms and run a series of tests specifically focused on performance and scalability.", "start_char_pos": 1148, "end_char_pos": 1148}, {"type": "R", "before": "run", "after": "carried out", "start_char_pos": 1177, "end_char_pos": 1180}, {"type": "R", "before": "real-world materials", "after": "solid-state physics crystals", "start_char_pos": 1248, "end_char_pos": 1268}, {"type": "R", "before": "even when dealing with dense eigenproblems", "after": "based on the LAPW approach", "start_char_pos": 1415, "end_char_pos": 1457}], "sents_char_pos": [0, 137, 382, 491, 716, 895, 990, 1147, 1270]}
+{"doc_id": "1211.0349", "revision_depth": "1", "before_revision": "MicroRNAs (miRNAs) play critical roles in modulating stem cell pluripotency and their differentiation, but the general fundamental mechanism remains largely unknown. This study systematically reveals the general roles of miRNAs in mouse pluripotent stem cells by analyzing a physical interaction network constructed from miRNA and protein binding data generated by next-generation sequencing . Generally, miRNAs vary their suppressor roles in different cellular developmental stages, a pluripotent stateor a differential state . During pluripotency , miRNAs primarily repress developmental processes while they inhibit metabolism in the differential state. Interestingly, in the pluripotent state, miRNAs do not directly regulate the pluripotent core activities but mediate extrinsic signal pathways associated with the pluripotency; however in the differential state, miRNAs directly repress the pluripotency. Mechanically , DNA methylation in enhancer regions mediates these miRNA activations. Together, under mediation by DNA methylation, miRNAs directly repress development but only modulate the pluripotent signal pathways in the pluripotent state; while in the developmental state miRNAs directly suppress both metabolism and pluripotency .", "after_revision": "MicroRNAs (miRNAs) critically modulate stem cell pluripotency and their differentiation, but the precise mechanistic mechanism remains largely unknown. This study systematically reveals the functional and mechanistic roles of miRNAs in mouse pluripotent stem cells by analyzing the genome-wide physical interactions between all activated miRNAs and their targets . Generally, miRNAs vary their physical targets and functions with the switch of pluripotency to differentiation state . During pluripotency miRNAs primarily and mechanistically target and repress developmental processes , but surprisingly miRNAs do not directly target the pluripotent core factors but only mediate extrinsic signal pathways associated with pluripotency. During differentiation miRNAs mechanistically inhibit metabolism and directly repress the pluripotency. Interestingly , DNA methylation in enhancer regions mediates these miRNA activations. Together, under mediation by DNA methylation, miRNAs directly repress development and mechanistically modulate the pluripotent signal pathways to help stem cells maintain pluripotency; yet miRNAs directly repress both pluripotency and metabolism to facilitate cell differentiation .", "edit_actions": [{"type": "R", "before": "play critical roles in modulating", "after": "critically modulate", "start_char_pos": 19, "end_char_pos": 52}, {"type": "R", "before": "general fundamental", "after": "precise mechanistic", "start_char_pos": 111, "end_char_pos": 130}, {"type": "R", "before": "general", "after": "functional and mechanistic", "start_char_pos": 204, "end_char_pos": 211}, {"type": "R", "before": "a physical interaction network constructed from miRNA and protein binding data generated by next-generation sequencing", "after": "the genome-wide physical interactions between all activated miRNAs and their targets", "start_char_pos": 273, "end_char_pos": 391}, {"type": "R", "before": "suppressor roles in different cellular developmental stages, a pluripotent stateor a differential state", "after": "physical targets and functions with the switch of pluripotency to differentiation state", "start_char_pos": 423, "end_char_pos": 526}, {"type": "R", "before": ", miRNAs primarily", "after": "miRNAs primarily and mechanistically target and", "start_char_pos": 549, "end_char_pos": 567}, {"type": "R", "before": "while they inhibit metabolism in the differential state. Interestingly, in the pluripotent state,", "after": ", but surprisingly", "start_char_pos": 600, "end_char_pos": 697}, {"type": "R", "before": "regulate", "after": "target", "start_char_pos": 721, "end_char_pos": 729}, {"type": "R", "before": "activities but", "after": "factors but only", "start_char_pos": 751, "end_char_pos": 765}, {"type": "R", "before": "the pluripotency; however in the differential state, miRNAs", "after": "pluripotency. During differentiation miRNAs mechanistically inhibit metabolism and", "start_char_pos": 816, "end_char_pos": 875}, {"type": "R", "before": "Mechanically", "after": "Interestingly", "start_char_pos": 911, "end_char_pos": 923}, {"type": "R", "before": "but only", "after": "and mechanistically", "start_char_pos": 1078, "end_char_pos": 1086}, {"type": "R", "before": "in the pluripotent state; while in the developmental state miRNAs directly suppress both metabolism and pluripotency", "after": "to help stem cells maintain pluripotency; yet miRNAs directly repress both pluripotency and metabolism to facilitate cell differentiation", "start_char_pos": 1128, "end_char_pos": 1244}], "sents_char_pos": [0, 165, 393, 528, 656, 833, 910, 995, 1153]}
+{"doc_id": "1212.1638", "revision_depth": "1", "before_revision": "In this paper, we focus on the scheduling problem in multi-channel wireless networks, e.g., the downlink of a single cell in fourth generation (4G) OFDM-based cellular networks. Our goal is to design efficient scheduling policies that can achieve provably good performance in terms of both throughput and delay, at a low complexity. While a recently developed scheduling policy, called Delay Weighted Matching (DWM) , has been shown to be \\log n) complexity hybrid scheduling policies are recently developed to guarantee } both rate-function delay-optimal (in the many-channel many-user asymptotic regime) and throughput-optimal (in general non-asymptotic setting), it has a high complexity O(n^5), which makes it impractical for modern OFDM systems . To address this issue, we first develop a simple greedy policy called Delay-based Queue-Side-Greedy (D-QSG ) with a lower complexity O(n ^3 ), and rigorously prove that D-QSG not only achieves throughput optimality, but also guarantees near-optimal rate-function-based delay performance. Specifically, the rate-function attained by D-QSG for any fixed integer threshold b>0, is no smaller than the maximum achievable rate-function by any scheduling policy for threshold b-1. Further, we develop another simple greedy policy called Delay-based Server-Side-Greedy (D-SSG) with an even lower complexity O(n^2), and show that D-SSG achieves the same performance as D-QSG. Thus, we are able to achieve a dramatic reduction in complexity (from O(n ^5) of DWM \\log n) of the hybrid policies } to O(n^2)) with a minimal drop in the delay performance. Finally, we conduct numerical simulations to validate our theoretical results in various scenarios. The simulation results show that our proposed greedy policies not only guarantee a near-optimal rate-function, but also empirically are virtually indistinguishable from the delay-optimal policy DWM .", "after_revision": "In this paper, we focus on the scheduling problem in multi-channel wireless networks, e.g., the downlink of a single cell in fourth generation (4G) OFDM-based cellular networks. Our goal is to design practical scheduling policies that can achieve provably good performance in terms of both throughput and delay, at a low complexity. While a class of O(n^{2.5 \\log n) complexity hybrid scheduling policies are recently developed to guarantee } both rate-function delay optimality (in the many-channel many-user asymptotic regime) and throughput optimality (in general non-asymptotic setting), their practical complexity is typically high . To address this issue, we develop a simple greedy policy called Delay-based Server-Side-Greedy (D-SSG ) with a lower complexity O(n ^2 ), and rigorously prove that D-SSG not only achieves throughput optimality, but also guarantees near-optimal rate-function-based delay performance. Specifically, the rate-function attained by D-SSG for any fixed integer threshold b>0, is no smaller than the maximum achievable rate-function by any scheduling policy for threshold b-1. Thus, we are able to achieve a reduction in complexity (from O(n ^{2.5 \\log n) of the hybrid policies } to O(n^2)) with a minimal drop in the delay performance. More importantly, in practice, D-SSG generally has a substantially lower complexity than the hybrid policies that typically have a large constant factor hidden in the O(\\cdot) notation. Finally, we conduct numerical simulations to validate our theoretical results in various scenarios. The simulation results show that D-SSG not only guarantees a near-optimal rate-function, but also empirically is virtually indistinguishable from delay-optimal policies .", "edit_actions": [{"type": "R", "before": "efficient", "after": "practical", "start_char_pos": 200, "end_char_pos": 209}, {"type": "R", "before": "recently developed scheduling policy, called Delay Weighted Matching (DWM) , has been shown to be", "after": "class of O(n^{2.5", "start_char_pos": 341, "end_char_pos": 438}, {"type": "R", "before": "delay-optimal", "after": "delay optimality", "start_char_pos": 542, "end_char_pos": 555}, {"type": "R", "before": "throughput-optimal", "after": "throughput optimality", "start_char_pos": 610, "end_char_pos": 628}, {"type": "R", "before": "it has a high complexity O(n^5), which makes it impractical for modern OFDM systems", "after": "their practical complexity is typically high", "start_char_pos": 666, "end_char_pos": 749}, {"type": "D", "before": "first", "after": null, "start_char_pos": 778, "end_char_pos": 783}, {"type": "R", "before": "Queue-Side-Greedy (D-QSG", "after": "Server-Side-Greedy (D-SSG", "start_char_pos": 834, "end_char_pos": 858}, {"type": "R", "before": "^3", "after": "^2", "start_char_pos": 889, "end_char_pos": 891}, {"type": "R", "before": "D-QSG", "after": "D-SSG", "start_char_pos": 921, "end_char_pos": 926}, {"type": "R", "before": "D-QSG", "after": "D-SSG", "start_char_pos": 1084, "end_char_pos": 1089}, {"type": "D", "before": "Further, we develop another simple greedy policy called Delay-based Server-Side-Greedy (D-SSG) with an even lower complexity O(n^2), and show that D-SSG achieves the same performance as D-QSG.", "after": null, "start_char_pos": 1227, "end_char_pos": 1419}, {"type": "D", "before": "dramatic", "after": null, "start_char_pos": 1451, "end_char_pos": 1459}, {"type": "R", "before": "^5) of DWM", "after": "^{2.5", "start_char_pos": 1494, "end_char_pos": 1504}, {"type": "A", "before": null, "after": "More importantly, in practice, D-SSG generally has a substantially lower complexity than the hybrid policies that typically have a large constant factor hidden in the O(\\cdot) notation.", "start_char_pos": 1595, "end_char_pos": 1595}, {"type": "R", "before": "our proposed greedy policies not only guarantee", "after": "D-SSG not only guarantees", "start_char_pos": 1729, "end_char_pos": 1776}, {"type": "R", "before": "are", "after": "is", "start_char_pos": 1828, "end_char_pos": 1831}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1865, "end_char_pos": 1868}, {"type": "R", "before": "policy DWM", "after": "policies", "start_char_pos": 1883, "end_char_pos": 1893}], "sents_char_pos": [0, 177, 332, 751, 1039, 1226, 1594, 1695]}
+{"doc_id": "1302.2063", "revision_depth": "1", "before_revision": "The financial crisis marked a paradigm shift, from traditional studies of individual risk to recent research on the \"systemicrisk\" generated by whole networks of institutions. However, the reverse effects of realized defaults on network topology are poorly understood. Here we analyze the Dutch interbank network over the period 1998-2008, ending with the global crisis. We find that many topological properties, after controlling for overall densityeffects, display an abrupt change in 2008, thus providing a clear but unpredictable signature of the crisis. By contrast, if the intrinsic heterogeneity of banks is controlled for, the same properties undergo a slow and continuous transition , gradually connecting the crisisperiod to a much earlier stationary phase. This early-warning signal begins in 2005 , and is preceded by an even earlier period of \"risk autocatalysis\" characterized by anomalous debt loops . These remarkable precursors are undetectable if the network is reconstructed from partial bank-specific information .", "after_revision": "The financial crisis clearly illustrated the importance of characterizing the level of `systemic' risk associated with an entire credit network, rather than with single institutions. However, the interplay between financial distress and topological changes is still poorly understood. Here we analyze the quarterly interbank exposures among Dutch banks over the period 1998-2008, ending with the crisis. After controlling for the link density, many topological properties display an abrupt change in 2008, providing a clear - but unpredictable - signature of the crisis. By contrast, if the heterogeneity of banks ' connectivity is controlled for, the same properties show a gradual transition to the crisis, starting in 2005 and preceded by an even earlier period during which anomalous debt loops presumably favored the underestimation of counter-party risk. These early-warning signals are undetectable if the network is reconstructed from partial bank-specific data, as routinely done. We discuss important implications for bank regulatory policies .", "edit_actions": [{"type": "R", "before": "marked a paradigm shift, from traditional studies of individual risk to recent research on the \"systemicrisk\" generated by whole networks of", "after": "clearly illustrated the importance of characterizing the level of `systemic' risk associated with an entire credit network, rather than with single", "start_char_pos": 21, "end_char_pos": 161}, {"type": "R", "before": "reverse effects of realized defaults on network topology are", "after": "interplay between financial distress and topological changes is still", "start_char_pos": 189, "end_char_pos": 249}, {"type": "R", "before": "Dutch interbank network", "after": "quarterly interbank exposures among Dutch banks", "start_char_pos": 289, "end_char_pos": 312}, {"type": "R", "before": "global crisis. We find that many topological properties, after controlling for overall densityeffects,", "after": "crisis. After controlling for the link density, many topological properties", "start_char_pos": 356, "end_char_pos": 458}, {"type": "D", "before": "thus", "after": null, "start_char_pos": 493, "end_char_pos": 497}, {"type": "R", "before": "but unpredictable", "after": "- but unpredictable -", "start_char_pos": 516, "end_char_pos": 533}, {"type": "D", "before": "intrinsic", "after": null, "start_char_pos": 579, "end_char_pos": 588}, {"type": "A", "before": null, "after": "' connectivity", "start_char_pos": 612, "end_char_pos": 612}, {"type": "R", "before": "undergo a slow and continuous transition , gradually connecting the crisisperiod to a much earlier stationary phase. This early-warning signal begins", "after": "show a gradual transition to the crisis, starting", "start_char_pos": 652, "end_char_pos": 801}, {"type": "R", "before": ", and is", "after": "and", "start_char_pos": 810, "end_char_pos": 818}, {"type": "R", "before": "of \"risk autocatalysis\" characterized by", "after": "during which", "start_char_pos": 854, "end_char_pos": 894}, {"type": "R", "before": ". These remarkable precursors", "after": "presumably favored the underestimation of counter-party risk. These early-warning signals", "start_char_pos": 916, "end_char_pos": 945}, {"type": "R", "before": "information", "after": "data, as routinely done. We discuss important implications for bank regulatory policies", "start_char_pos": 1022, "end_char_pos": 1033}], "sents_char_pos": [0, 175, 268, 370, 558, 768, 917]}
+{"doc_id": "1304.0368", "revision_depth": "1", "before_revision": "We propose an iterated Azema-Yor type embedding in the spirit of Azema and Yor, 1979%DIFDELCMD < ] %%% and Brown et al., 2001%DIFDELCMD < ] %%% for any given finite number n of probability measures which are in convex order and satisfy an additional technical assumption. In particular, our construction reproduces the stopping boundaries obtained in Madan and Yor , 2002 and Brown et al. , 2001a%DIFDELCMD < ]%%% . We demonstrate with a counterexample that our technical assumption is necessary and propose an extended embedding for n=3. As a by-product of our analysis we compute the law of the maximum at all the stopping times. This is used in our parallel work Henry-Labordere et al. , 2013 to establish extremal properties of our embedding and develop robust pricing and hedging of Lookback options given prices of call options with multiple intermediate maturities .", "after_revision": "We %DIFDELCMD < ] %%% %DIFDELCMD < ] %%% solve the n-marginal Skorokhod embedding problem for a continuous local martingale and a sequence of probability measures \\mu_1,...,\\mu_n which are in convex order and satisfy an additional technical assumption. Our construction is explicit and is a multiple marginal generalisation of the Azema and Yor (1979) solution. In particular, we recover the stopping boundaries obtained by Brown et al. (2001) and Madan and Yor ( 2002 %DIFDELCMD < ]%%% ). Our technical assumption is necessary for the explicit embedding, as demonstrated with a counterexample. We discuss extensions to the general case giving details when n=3. In our analysis we compute the law of the maximum at each of the n stopping times. This is used in Henry-Labordere et al. ( 2013 ) to show that the construction maximises the distribution of the maximum among all solutions to the n-marginal Skorokhod embedding problem. The result has direct implications for robust pricing and hedging of Lookback options .", "edit_actions": [{"type": "D", "before": "propose an iterated Azema-Yor type embedding in the spirit of", "after": null, "start_char_pos": 3, "end_char_pos": 64}, {"type": "D", "before": "Azema and Yor, 1979", "after": null, "start_char_pos": 65, "end_char_pos": 84}, {"type": "D", "before": "and", "after": null, "start_char_pos": 103, "end_char_pos": 106}, {"type": "D", "before": "Brown et al., 2001", "after": null, "start_char_pos": 107, "end_char_pos": 125}, {"type": "R", "before": "for any given finite number n", "after": "solve the n-marginal Skorokhod embedding problem for a continuous local martingale and a sequence", "start_char_pos": 144, "end_char_pos": 173}, {"type": "A", "before": null, "after": "\\mu_1,...,\\mu_n", "start_char_pos": 198, "end_char_pos": 198}, {"type": "A", "before": null, "after": "Our construction is explicit and is a multiple marginal generalisation of the Azema and Yor (1979) solution.", "start_char_pos": 273, "end_char_pos": 273}, {"type": "R", "before": "our construction reproduces", "after": "we recover", "start_char_pos": 289, "end_char_pos": 316}, {"type": "R", "before": "in", "after": "by Brown et al. (2001) and", "start_char_pos": 350, "end_char_pos": 352}, {"type": "R", "before": ",", "after": "(", "start_char_pos": 367, "end_char_pos": 368}, {"type": "D", "before": "and", "after": null, "start_char_pos": 374, "end_char_pos": 377}, {"type": "D", "before": "Brown et al. , 2001a", "after": null, "start_char_pos": 378, "end_char_pos": 398}, {"type": "R", "before": ". We demonstrate with a counterexample that our", "after": "). Our", "start_char_pos": 416, "end_char_pos": 463}, {"type": "R", "before": "and propose an extended embedding for", "after": "for the explicit embedding, as demonstrated with a counterexample. We discuss extensions to the general case giving details when", "start_char_pos": 498, "end_char_pos": 535}, {"type": "R", "before": "As a by-product of", "after": "In", "start_char_pos": 541, "end_char_pos": 559}, {"type": "R", "before": "all the", "after": "each of the n", "start_char_pos": 610, "end_char_pos": 617}, {"type": "D", "before": "our parallel work", "after": null, "start_char_pos": 650, "end_char_pos": 667}, {"type": "R", "before": ",", "after": "(", "start_char_pos": 691, "end_char_pos": 692}, {"type": "R", "before": "to establish extremal properties of our embedding and develop", "after": ") to show that the construction maximises the distribution of the maximum among all solutions to the n-marginal Skorokhod embedding problem. The result has direct implications for", "start_char_pos": 698, "end_char_pos": 759}, {"type": "D", "before": "given prices of call options with multiple intermediate maturities", "after": null, "start_char_pos": 807, "end_char_pos": 873}], "sents_char_pos": [0, 272, 540, 633]}
+{"doc_id": "1304.3962", "revision_depth": "1", "before_revision": "Stochastic modeling and simulation provide powerful predictive methods for the intrinsic understanding of fundamental mechanisms in complex biochemical networks. Typically such mathematical models involve networks of coupled jump stochastic processes with a large number of parameters that need to be suitably calibrated against experimental data. In this direction, the sensitivity analysis of the reaction network's parameters is a crucial mathematical and computational tool since it allows to infer information about the robustness and the identifiability of the model 's parameters. We develop a sensitivity analysis methodology suitable for complex stochastic reaction networks with a high number of parameters. The proposed approach is based on Information Theory and relies on the quantification of information loss due to parameter perturbations between time-series distributions , hence referred to as \"pathwise\". This is achieved by employing the rigorously-derived Relative Entropy Rate (RER), which is directly computable from the propensity functions. A key aspect of the method is that an associated pathwise Fisher Information Matrix (FIM) is defined, which in turn constitutes a gradient-free approach to quantify the parameter sensitivities. The study of the structure of the FIM which turns out to be block-diagonal reveals hidden parameter dependencies and sensitivities in reaction networks . The proposed method is tested and validated on two biochemical systems, namely: (a) the p53 reaction network where quasi-steady stochastic oscillations of the concentrations are observed and (b) an Epidermal Growth Factor Receptor (EGFR) model which is an example of a high-dimensional stochastic reaction network with more than 200 reactions and a corresponding number of parameters .", "after_revision": "Stochastic modeling and simulation provide powerful predictive methods for the intrinsic understanding of fundamental mechanisms in complex biochemical networks. Typically , such mathematical models involve networks of coupled jump stochastic processes with a large number of parameters that need to be suitably calibrated against experimental data. In this direction, the parameter sensitivity analysis of reaction networks is an essential mathematical and computational tool , yielding information regarding the robustness and the identifiability of model parameters. However, existing sensitivity analysis approaches such as variants of the finite difference method can have an overwhelming computational cost in models with a high-dimensional parameter space. We develop a sensitivity analysis methodology suitable for complex stochastic reaction networks with a large number of parameters. The proposed approach is based on Information Theory methods and relies on the quantification of information loss due to parameter perturbations between time-series distributions . For this reason, we need to work on path-space, i.e., the set consisting of all stochastic trajectories, hence the proposed approach is referred to as \"pathwise\". The pathwise sensitivity analysis method is realized by employing the rigorously-derived Relative Entropy Rate (RER), which is directly computable from the propensity functions. A key aspect of the method is that an associated pathwise Fisher Information Matrix (FIM) is defined, which in turn constitutes a gradient-free approach to quantifying parameter sensitivities. The structure of the FIM turns out to be block-diagonal , revealing hidden parameter dependencies and sensitivities in reaction networks .", "edit_actions": [{"type": "A", "before": null, "after": ",", "start_char_pos": 172, "end_char_pos": 172}, {"type": "A", "before": null, "after": "parameter", "start_char_pos": 372, "end_char_pos": 372}, {"type": "R", "before": "the reaction network's parameters is a crucial", "after": "reaction networks is an essential", "start_char_pos": 397, "end_char_pos": 443}, {"type": "R", "before": "since it allows to infer information about", "after": ", yielding information regarding", "start_char_pos": 480, "end_char_pos": 522}, {"type": "R", "before": "the model 's parameters.", "after": "model parameters. However, existing sensitivity analysis approaches such as variants of the finite difference method can have an overwhelming computational cost in models with a high-dimensional parameter space.", "start_char_pos": 565, "end_char_pos": 589}, {"type": "R", "before": "high", "after": "large", "start_char_pos": 693, "end_char_pos": 697}, {"type": "A", "before": null, "after": "methods", "start_char_pos": 773, "end_char_pos": 773}, {"type": "R", "before": ", hence", "after": ". For this reason, we need to work on path-space, i.e., the set consisting of all stochastic trajectories, hence the proposed approach is", "start_char_pos": 892, "end_char_pos": 899}, {"type": "R", "before": "This is achieved", "after": "The pathwise sensitivity analysis method is realized", "start_char_pos": 927, "end_char_pos": 943}, {"type": "R", "before": "quantify the", "after": "quantifying", "start_char_pos": 1225, "end_char_pos": 1237}, {"type": "D", "before": "study of the", "after": null, "start_char_pos": 1267, "end_char_pos": 1279}, {"type": "D", "before": "which", "after": null, "start_char_pos": 1301, "end_char_pos": 1306}, {"type": "R", "before": "reveals", "after": ", revealing", "start_char_pos": 1338, "end_char_pos": 1345}, {"type": "D", "before": ". The proposed method is tested and validated on two biochemical systems, namely: (a) the p53 reaction network where quasi-steady stochastic oscillations of the concentrations are observed and (b) an Epidermal Growth Factor Receptor (EGFR) model which is an example of a high-dimensional stochastic reaction network with more than 200 reactions and a corresponding number of parameters", "after": null, "start_char_pos": 1415, "end_char_pos": 1800}], "sents_char_pos": [0, 161, 348, 589, 719, 926, 1068, 1262, 1416]}
+{"doc_id": "1304.4929", "revision_depth": "1", "before_revision": "The embedding of the stock price return modeling problem in Le Cam's statistical experiments framework suggests strategies-probabilities, obtained from the traded stock prices in the time interval t0,T%DIFDELCMD < ]%%% , for the agent selling the stock 's European call option at t_0 and for the buyer who may exercise it at T . The nature of these probabilities is justified by the slight dependence of stock returns and the weak Efficient Market Hypothesis (Fama,1965) . When the transaction times are dense in [ t0 ,T] it is shown, with mild conditions, that under each of these probabilities log S_T/S_{t_0 divisible distribution and in particular normal distribution for \"calm\" stock ; S_t is the stock 's price at time t. The price of the stock's European option is the expected cost of the agent at t_0 obtained using the distribution of log S_T/S _{t_0 }. For calm stock, the price coincides with the Black-Scholes-Merton (B-S-M)price after translation. The strike price determined by the agent does not give arbitrage opportunity to the buyer. Additional results clarify volatility's role in the buyer's behavior and establish a connection between European option pricing and Bayes risk. The results justify the extensive use of the B-S-M price and provide traders with a new tool .", "after_revision": "A new method is proposed to obtain the risk neutral probability of share prices without stochastic calculus and price modeling, via an embedding of the price return modeling problem in Le Cam's statistical experiments framework %DIFDELCMD < ]%%% . Strategies-probabilities P_{t_0,n 's European call option at time t_0 and for the buyer who may exercise it in the future, at T; \\ n increases with the number of share's transactions in t_0, T . When the transaction times are dense in [ t_0 ,T] it is shown, with mild conditions, that under each of these probabilities \\log \\frac{S_T divisible distribution and in particular normal distribution for \"calm\" share ; S_t is the share 's price at time t. The price of the share's call is the limit of the expected values of the call's payoff under the translated P _{t_0 ,n }. It coincides for \"calm\" share prices with the Black-Scholes-Merton formula with variance not necessarily proportional to (T-t_0), thus confirming formula's universal validity without model assumptions. Additional results clarify volatility's role in the transaction and the behaviors of the trader and the buyer. Traders may use the pricing formulae after estimation of the unknown parameters .", "edit_actions": [{"type": "R", "before": "The", "after": "A new method is proposed to obtain the risk neutral probability of share prices without stochastic calculus and price modeling, via an", "start_char_pos": 0, "end_char_pos": 3}, {"type": "D", "before": "stock", "after": null, "start_char_pos": 21, "end_char_pos": 26}, {"type": "D", "before": "suggests strategies-probabilities, obtained from the traded stock prices in the time interval", "after": null, "start_char_pos": 103, "end_char_pos": 196}, {"type": "D", "before": "t0,T", "after": null, "start_char_pos": 197, "end_char_pos": 201}, {"type": "R", "before": ", for the agent selling the stock", "after": ". Strategies-probabilities P_{t_0,n", "start_char_pos": 219, "end_char_pos": 252}, {"type": "A", "before": null, "after": "time", "start_char_pos": 280, "end_char_pos": 280}, {"type": "R", "before": "at", "after": "in the future, at T; \\ n increases with the number of share's transactions in", "start_char_pos": 323, "end_char_pos": 325}, {"type": "A", "before": null, "after": "t_0,", "start_char_pos": 326, "end_char_pos": 326}, {"type": "D", "before": ". The nature of these probabilities is justified by the slight dependence of stock returns and the weak Efficient Market Hypothesis (Fama,1965)", "after": null, "start_char_pos": 329, "end_char_pos": 472}, {"type": "R", "before": "t0", "after": "t_0", "start_char_pos": 517, "end_char_pos": 519}, {"type": "R", "before": "log S_T/S_{t_0", "after": "\\log \\frac{S_T", "start_char_pos": 598, "end_char_pos": 612}, {"type": "R", "before": "stock", "after": "share", "start_char_pos": 685, "end_char_pos": 690}, {"type": "R", "before": "stock", "after": "share", "start_char_pos": 704, "end_char_pos": 709}, {"type": "R", "before": "stock's European option is the expected cost of the agent at t_0 obtained using the distribution of log S_T/S", "after": "share's call is the limit of the expected values of the call's payoff under the translated P", "start_char_pos": 747, "end_char_pos": 856}, {"type": "A", "before": null, "after": ",n", "start_char_pos": 863, "end_char_pos": 863}, {"type": "R", "before": "For calm stock, the price coincides", "after": "It coincides for \"calm\" share prices", "start_char_pos": 867, "end_char_pos": 902}, {"type": "R", "before": "(B-S-M)price after translation. The strike price determined by the agent does not give arbitrage opportunity to the buyer.", "after": "formula with variance not necessarily proportional to (T-t_0), thus confirming formula's universal validity without model assumptions.", "start_char_pos": 933, "end_char_pos": 1055}, {"type": "R", "before": "buyer's behavior and establish a connection between European option pricing and Bayes risk. The results justify the extensive use of", "after": "transaction and the behaviors of the trader and", "start_char_pos": 1108, "end_char_pos": 1240}, {"type": "R", "before": "B-S-M price and provide traders with a new tool", "after": "buyer. Traders may use the pricing formulae after estimation of the unknown parameters", "start_char_pos": 1245, "end_char_pos": 1292}], "sents_char_pos": [0, 330, 474, 692, 729, 964, 1055, 1199]}
+{"doc_id": "1307.2035", "revision_depth": "2", "before_revision": "We introduce a new solution concept for selecting optimal strategies in strategic form games which we call periodic strategies and the solution concept periodicity. As we will explicitly demonstrate, the periodicity solution concept has implications for non-trivial realistic games, which renders this solution concept very valuable. The most striking application of periodicity is that in mixed strategy strategic form games, we were able to find solutions that result to values for the utility function of each player , that are equal to the Nash equilibrium ones , with the difference that in the Nash strategiesplaying, the payoffs strongly depend on what the opponent plays, while in the periodic strategies case, the payoffs of each player are completely robust against what the opponent plays. We formally define and study periodic strategies in two player perfect information strategic form games , with pure strategies and generalize the results to include multiplayer games with perfect information. We prove that every non-trivial finite game has at least one periodic strategy, with non-trivial meaning a game with non-degenerate payoffs. In principle the algorithm we provide, holds true for every non-trivial game, because in degenerate games, inconsistencies can occur. In addition, we also address the incomplete information games in the context of Bayesian games, in which case generalizations of Bernheim's rationalizability offers us the possibility to embed the periodicity concept in the Bayesian games framework. Applying the algorithm of periodic strategies in the case where mixed strategies are used, we find some very interesting outcomes with useful quantitative features for some classes of games .", "after_revision": "We introduce a new solution concept , called periodicity, for selecting optimal strategies in strategic form games . This periodicity solution concept yields new insight into non-trivial games. In mixed strategy strategic form games, periodic solutions yield values for the utility function of each player that are equal to the Nash equilibrium ones . In contrast to the Nash strategies, here the payoffs of each player are robust against what the opponent plays. Sometimes, periodicity strategies yield higher utilities, and sometimes the Nash strategies do, but often the utilities of these two strategies coincide. We formally define and study periodic strategies in two player perfect information strategic form games with pure strategies and we prove that every non-trivial finite game has at least one periodic strategy, with non-trivial meaning non-degenerate payoffs. In some classes of games where mixed strategies are used, we identify quantitative features. Particularly interesting are the implications for collective action games, since there the collective action strategy can be incorporated in a purely non-cooperative context. Moreover, we address the periodicity issue when the players have a continuum set of strategies available .", "edit_actions": [{"type": "A", "before": null, "after": ", called periodicity,", "start_char_pos": 36, "end_char_pos": 36}, {"type": "R", "before": "which we call periodic strategies and the solution concept periodicity. As we will explicitly demonstrate, the", "after": ". This", "start_char_pos": 94, "end_char_pos": 204}, {"type": "R", "before": "has implications for", "after": "yields new insight into", "start_char_pos": 234, "end_char_pos": 254}, {"type": "R", "before": "realistic games, which renders this solution concept very valuable. The most striking application of periodicity is that in", "after": "games. In", "start_char_pos": 267, "end_char_pos": 390}, {"type": "R", "before": "we were able to find solutions that result to", "after": "periodic solutions yield", "start_char_pos": 428, "end_char_pos": 473}, {"type": "D", "before": ",", "after": null, "start_char_pos": 521, "end_char_pos": 522}, {"type": "R", "before": ", with the difference that in the Nash strategiesplaying, the payoffs strongly depend on what the opponent plays, while in the periodic strategies case, the payoffs", "after": ". In contrast to the Nash strategies, here the payoffs", "start_char_pos": 567, "end_char_pos": 731}, {"type": "D", "before": "completely", "after": null, "start_char_pos": 751, "end_char_pos": 761}, {"type": "A", "before": null, "after": "Sometimes, periodicity strategies yield higher utilities, and sometimes the Nash strategies do, but often the utilities of these two strategies coincide.", "start_char_pos": 802, "end_char_pos": 802}, {"type": "D", "before": ",", "after": null, "start_char_pos": 907, "end_char_pos": 908}, {"type": "R", "before": "generalize the results to include multiplayer games with perfect information. We", "after": "we", "start_char_pos": 934, "end_char_pos": 1014}, {"type": "D", "before": "a game with", "after": null, "start_char_pos": 1117, "end_char_pos": 1128}, {"type": "R", "before": "principle the algorithm we provide, holds true for every non-trivial game, because in degenerate games, inconsistencies can occur. In addition, we also address the incomplete information games in the context of Bayesian games, in which case generalizations of Bernheim's rationalizability offers us the possibility to embed the periodicity concept in the Bayesian games framework. Applying the algorithm of periodic strategies in the case where mixed strategies are used, we find some very interesting outcomes with useful quantitative features for some classes of games", "after": "some classes of games where mixed strategies are used, we identify quantitative features. Particularly interesting are the implications for collective action games, since there the collective action strategy can be incorporated in a purely non-cooperative context. Moreover, we address the periodicity issue when the players have a continuum set of strategies available", "start_char_pos": 1156, "end_char_pos": 1726}], "sents_char_pos": [0, 165, 334, 801, 1011, 1152, 1286, 1536]}
+{"doc_id": "1307.5319", "revision_depth": "1", "before_revision": "The aim of this work is to explore the possible types of phenomena that simple macroeconomic Agent-Based models (ABM) can reproduce. Our motivation is to understand the large macro-economic fluctuations observed in the \"Mark I\" ABM devised by D. Delli Gatti and collaborators. Our major finding is the existence of a first order (discontinuous) phase transition between a \"good economy\" where unemployment is low, and a \"bad economy\" where unemployment is high. We show that this transition is robust against many modifications of the model, and is induced by an asymmetry between the rate of hiring and the rate of firing of the firms. This asymmetry is induced , in Mark I, by the interest rate. As the interest rate increases, the firms become more and more reluctant to take further loans . The unemployment level remains small until a tipping point beyond which the economy suddenly collapses. If the parameters are such that the system is close to this transition, any small fluctuation is amplified as the system jumps between the two equilibria. We have also explored several natural extensions . One is to allow this hiring/firing propensity to depend on the financial fragility of firms . Quite interestingly, we find that in this case, the above transition survives but becomes second order. We also studied simple wage policies and confidence feedback effects, whereby higher unemployment increases the saving propensity of households. We observe several interesting effects, such as the appearance of acute endogenous crises, during which the unemployment rate shoots up before the economy recovers . We end the paper with general comments on the usefulness of ABMs to model macroeconomic phenomena, in particular in view of the time needed to reach a steady state .", "after_revision": "The aim of this work is to explore the possible types of phenomena that simple macroeconomic Agent-Based models (ABM) can reproduce. Our motivation is to understand the large macro-economic fluctuations observed in the \"Mark I\" ABM . Our central finding is the generic existence of a phase transition between a \"good economy\" where unemployment is low, and a \"bad economy\" where unemployment is high. We show that this transition is induced by an asymmetry between the rate of hiring and the rate of firing of the firms. This asymmetry is , in Mark I, due to the fact that as the interest rate increases, firms become more and more reluctant to take further loans and have to reduce their workforce . The unemployment level remains small until a tipping point , beyond which the economy suddenly collapses. If the parameters are such that the system is close to this transition, any small fluctuation is amplified as the system jumps between the two equilibria. We have explored several natural extensions of the model . One is to introduce a bankruptcy threshold, limiting the leverage of firms. This leads to a rich phase diagram with, in particular, a region where acute endogenous crises occur, during which the unemployment rate shoots up before the economy can recover. We allow the hiring/firing propensity to depend on the financial fragility of firms , and introduce simple wage update policies. This leads to inflation (in the \"good\" phase) or deflation (in the \"bad\" phase), but leaves the overall phase diagram of the model essentially unchanged. We have finally explored the effect of simple monetary policies that attempt to contain rising unemployment and defang crises . We end the paper with general comments on the usefulness of ABMs to model macroeconomic phenomena, in particular in view of the time needed to reach a steady state that raises the issue of ergodicity in these models .", "edit_actions": [{"type": "R", "before": "devised by D. Delli Gatti and collaborators. Our major", "after": ". Our central", "start_char_pos": 232, "end_char_pos": 286}, {"type": "A", "before": null, "after": "generic", "start_char_pos": 302, "end_char_pos": 302}, {"type": "D", "before": "first order (discontinuous)", "after": null, "start_char_pos": 318, "end_char_pos": 345}, {"type": "D", "before": "robust against many modifications of the model, and is", "after": null, "start_char_pos": 495, "end_char_pos": 549}, {"type": "D", "before": "induced", "after": null, "start_char_pos": 656, "end_char_pos": 663}, {"type": "R", "before": "by the interest rate. As", "after": "due to the fact that as", "start_char_pos": 677, "end_char_pos": 701}, {"type": "D", "before": "the", "after": null, "start_char_pos": 731, "end_char_pos": 734}, {"type": "A", "before": null, "after": "and have to reduce their workforce", "start_char_pos": 794, "end_char_pos": 794}, {"type": "A", "before": null, "after": ",", "start_char_pos": 856, "end_char_pos": 856}, {"type": "D", "before": "also", "after": null, "start_char_pos": 1065, "end_char_pos": 1069}, {"type": "A", "before": null, "after": "of the model", "start_char_pos": 1106, "end_char_pos": 1106}, {"type": "R", "before": "allow this", "after": "introduce a bankruptcy threshold, limiting the leverage of firms. This leads to a rich phase diagram with, in particular, a region where acute endogenous crises occur, during which the unemployment rate shoots up before the economy can recover. We allow the", "start_char_pos": 1119, "end_char_pos": 1129}, {"type": "R", "before": ". Quite interestingly, we find that in this case, the above transition survives but becomes second order. We also studied simple wage policies and confidence feedback effects, whereby higher unemployment increases the saving propensity of households. We observe several interesting effects, such as the appearance of acute endogenous crises, during which the unemployment rate shoots up before the economy recovers", "after": ", and introduce simple wage update policies. This leads to inflation (in the \"good\" phase) or deflation (in the \"bad\" phase), but leaves the overall phase diagram of the model essentially unchanged. We have finally explored the effect of simple monetary policies that attempt to contain rising unemployment and defang crises", "start_char_pos": 1201, "end_char_pos": 1615}, {"type": "A", "before": null, "after": "that raises the issue of ergodicity in these models", "start_char_pos": 1782, "end_char_pos": 1782}], "sents_char_pos": [0, 132, 276, 462, 637, 698, 796, 901, 1056, 1108, 1202, 1306, 1451, 1617]}
+{"doc_id": "1308.1449", "revision_depth": "1", "before_revision": "Living cells can sense their environment with high precision. Yet, the resources required for sensing with high precision is an open question. Here we address this question for both equilibrium and non-equilibrium systems. We find that in equilibrium systems the precision of sensing is fundamentally limited by the number of receptors; the signaling network that transmits the information from the receptors to the interior of the cell can never increase the precisionof sensing. We show that this limit arises from a fundamental trade-off between the removal of the extrinsic noise in the receptor state and the suppression of the intrinsic noise in the signaling network. We next prove that only non-equilibrium systems can lift this trade-off : They can integrate the receptor state over time while suppressing the intrinsic noise by using energy to store the receptor state into stable modification states of the readout molecules. We explicitly calculate the resources required for a canonical signaling motif, a push-pull network . We arrive at an analytical expression that shows that storing the state of the bound receptor over time requires at least one readout molecule to store the state and at least 4 kT of energy to store it reliably. Thus, each of the resources -- time, protein copy numbers, and energy -- limits sensing, and it is the limiting resource which places the fundamental limit on sensing .", "after_revision": "Living cells deploy many resources to sense their environments, including receptors, downstream signaling molecules, time and fuel. However, it is not known which resources fundamentally limit the precision of sensing, like weak links in a chain, and which can compensate each other, leading to trade-offs between them. We show by modeling that in equilibrium systems the precision is limited by the number of receptors; the downstream network can never increase precision. This limit arises from a trade-off between the removal of extrinsic noise in the receptor and intrinsic noise in the downstream network. Non-equilibrium systems can lift this trade-off by storing the receptor state over time in chemical modification states of downstream molecules. As we quantify for a push-pull network , this requires i) time and receptors; ii) downstream molecules; iii) energy (fuel turnover) to drive modification. These three resource classes cannot compensate each other, and it is the limiting class which sets the fundamental sensing limit. Within each class, trade-offs are possible. Energy allows a power-speed trade-off, while time can be traded against receptors .", "edit_actions": [{"type": "R", "before": "can sense their environment with high precision. Yet, the resources required for sensing with high precision is an open question. Here we address this question for both equilibrium and non-equilibrium systems. We find", "after": "deploy many resources to sense their environments, including receptors, downstream signaling molecules, time and fuel. However, it is not known which resources fundamentally limit the precision of sensing, like weak links in a chain, and which can compensate each other, leading to trade-offs between them. We show by modeling", "start_char_pos": 13, "end_char_pos": 230}, {"type": "R", "before": "of sensing is fundamentally", "after": "is", "start_char_pos": 273, "end_char_pos": 300}, {"type": "R", "before": "signaling network that transmits the information from the receptors to the interior of the cell", "after": "downstream network", "start_char_pos": 341, "end_char_pos": 436}, {"type": "R", "before": "the precisionof sensing. We show that this", "after": "precision. This", "start_char_pos": 456, "end_char_pos": 498}, {"type": "D", "before": "fundamental", "after": null, "start_char_pos": 519, "end_char_pos": 530}, {"type": "D", "before": "the", "after": null, "start_char_pos": 564, "end_char_pos": 567}, {"type": "R", "before": "state and the suppression of the", "after": "and", "start_char_pos": 600, "end_char_pos": 632}, {"type": "R", "before": "signaling network. We next prove that only non-equilibrium", "after": "downstream network. Non-equilibrium", "start_char_pos": 656, "end_char_pos": 714}, {"type": "R", "before": ": They can integrate", "after": "by storing", "start_char_pos": 747, "end_char_pos": 767}, {"type": "R", "before": "while suppressing the intrinsic noise by using energy to store the receptor state into stable", "after": "in chemical", "start_char_pos": 797, "end_char_pos": 890}, {"type": "R", "before": "the readout molecules. We explicitly calculate the resources required for a canonical signaling motif, a", "after": "downstream molecules. As we quantify for a", "start_char_pos": 914, "end_char_pos": 1018}, {"type": "R", "before": ". We arrive at an analytical expression that shows that storing the state of the bound receptor over time requires at least one readout molecule to store the state and at least 4 kT of energy to store it reliably. Thus, each of the resources -- time, protein copy numbers, and energy -- limits sensing, and", "after": ", this requires i) time and receptors; ii) downstream molecules; iii) energy (fuel turnover) to drive modification. These three resource classes cannot compensate each other, and", "start_char_pos": 1037, "end_char_pos": 1343}, {"type": "R", "before": "resource which places the fundamental limit on sensing", "after": "class which sets the fundamental sensing limit. Within each class, trade-offs are possible. Energy allows a power-speed trade-off, while time can be traded against receptors", "start_char_pos": 1363, "end_char_pos": 1417}], "sents_char_pos": [0, 61, 142, 222, 336, 480, 674, 936, 1038, 1250]}
+{"doc_id": "1308.6148", "revision_depth": "1", "before_revision": "We propose a modified algorithm - Multifractal Cross-Correlation Analysis (MFCCA) - that is able to consistently identify and quantify multifractal cross-correlations between two time series. Our motivation for introducing this algorithm is that the already existing methods like MF-DXA have serious limitations for most of the signals describing complex natural processes . The principal component of the related improvement is proper incorporation of the sign of fluctuations . We present a broad analysis of the model fractal stochastic processes as well as of the real-world signals and show that MFCCA is a robust tool and allows a reliable quantification of the cross-correlative structure of analyzed processes. We, in particular, analyze a relation between the generalized Hurst exponent and the MFCCA parameter \\lambda_q. This relation provides information about the character of potential multifractality in cross-correlations of the processes under study and thus enables selective insight into their dynamics . Using also an example of financial time series from the stock market we show that waiting times and price increments of the companies are multifractally cross-correlated but only for relatively large fluctuations, whereas the small ones could be considered mutually independent .", "after_revision": "We propose a novel algorithm - Multifractal Cross-Correlation Analysis (MFCCA) - that constitutes a consistent extension of the Detrended Cross-Correlation Analysis (DCCA) and is able to properly identify and quantify subtle characteristics of multifractal cross-correlations between two time series. Our motivation for introducing this algorithm is that the already existing methods like MF-DXA have at best serious limitations for most of the signals describing complex natural processes and often indicate multifractal cross-correlations when there are none . The principal component of the present extension is proper incorporation of the sign of fluctuations to their generalized moments. Furthermore, we present a broad analysis of the model fractal stochastic processes as well as of the real-world signals and show that MFCCA is a robust and selective tool at the same time, and therefore allows for a reliable quantification of the cross-correlative structure of analyzed processes. In particular, it allows one to identify the boundaries of the multifractal scaling and to analyze a relation between the generalized Hurst exponent and the multifractal scaling parameter \\lambda_q. This relation provides information about character of potential multifractality in cross-correlations and thus enables a deeper insight into dynamics of the analyzed processes than allowed by any other related method available so far. By using examples of time series from stock market, we show that financial fluctuations typically cross-correlate multifractally only for relatively large fluctuations, whereas small fluctuations remain mutually independent even at maximum of such cross-correlations. Finally, we indicate possible utility of MFCCA to study effects of the time-lagged cross-correlations .", "edit_actions": [{"type": "R", "before": "modified", "after": "novel", "start_char_pos": 13, "end_char_pos": 21}, {"type": "A", "before": null, "after": "constitutes a consistent extension of the Detrended Cross-Correlation Analysis (DCCA) and", "start_char_pos": 89, "end_char_pos": 89}, {"type": "R", "before": "consistently", "after": "properly", "start_char_pos": 101, "end_char_pos": 113}, {"type": "A", "before": null, "after": "subtle characteristics of", "start_char_pos": 136, "end_char_pos": 136}, {"type": "A", "before": null, "after": "at best", "start_char_pos": 294, "end_char_pos": 294}, {"type": "A", "before": null, "after": "and often indicate multifractal cross-correlations when there are none", "start_char_pos": 376, "end_char_pos": 376}, {"type": "R", "before": "related improvement", "after": "present extension", "start_char_pos": 410, "end_char_pos": 429}, {"type": "R", "before": ". We", "after": "to their generalized moments. Furthermore, we", "start_char_pos": 482, "end_char_pos": 486}, {"type": "R", "before": "tool and allows", "after": "and selective tool at the same time, and therefore allows for", "start_char_pos": 623, "end_char_pos": 638}, {"type": "R", "before": "We, in particular,", "after": "In particular, it allows one to identify the boundaries of the multifractal scaling and to", "start_char_pos": 723, "end_char_pos": 741}, {"type": "R", "before": "MFCCA", "after": "multifractal scaling", "start_char_pos": 808, "end_char_pos": 813}, {"type": "D", "before": "the", "after": null, "start_char_pos": 876, "end_char_pos": 879}, {"type": "D", "before": "of the processes under study", "after": null, "start_char_pos": 941, "end_char_pos": 969}, {"type": "R", "before": "selective insight into their dynamics . Using also an example of financial", "after": "a deeper insight into dynamics of the analyzed processes than allowed by any other related method available so far. By using examples of", "start_char_pos": 987, "end_char_pos": 1061}, {"type": "R", "before": "the stock market", "after": "stock market,", "start_char_pos": 1079, "end_char_pos": 1095}, {"type": "R", "before": "waiting times and price increments of the companies are multifractally cross-correlated but", "after": "financial fluctuations typically cross-correlate multifractally", "start_char_pos": 1109, "end_char_pos": 1200}, {"type": "R", "before": "the small ones could be considered mutually independent", "after": "small fluctuations remain mutually independent even at maximum of such cross-correlations. Finally, we indicate possible utility of MFCCA to study effects of the time-lagged cross-correlations", "start_char_pos": 1249, "end_char_pos": 1304}], "sents_char_pos": [0, 193, 378, 483, 722, 834]}
+{"doc_id": "1308.6256", "revision_depth": "1", "before_revision": "The target of this paper is consider to model the risky asset price in the Knightian uncertain financial market , and pricing the upper (bid) and lower (ask ) prices of the uncertain risk. The ] basic risky asset price model we construct here is drift uncertain and volatility uncertain , we describe such model by using general G-Brownian motion and call it as G-asset price system. We present the uncertain risk premium which is distributed with Max distributionN(%DIFDELCMD < [%%% \\underline{\\mu ,%DIFDELCMD < \\bar{\\mu}]%%% ,\\{0\\ closed form of bid and ask prices of the European contingent claim against risky asset with G-asset price system , and give the bid and ask prices are the viscosity solution to nonlinear HJB .Furthermore, we consider the main part of this paper, i.e., consider the risky asset on uncertain financial market with the price fluctuation as continuous path . We propose the G-conditional full support condition by using uncertain capacity, and the price path satisfying the G-conditional full support condition could be approximated by its G-consistent asset price system, and we derived that the bid and ask prices of the European contingent claim against such risky asset can be expressed by discounted of some conditional G-expectation of the claim. We give examples, such as G-Markovian processes and fractional G-Brownian , satisfying the G-conditional full support condition.", "after_revision": "The target of this paper is to consider model the risky asset price on the financial market under the Knightian uncertainty , and pricing the ask and bid prices of the uncertain risk. We use the nonlinear analysis tool, i.e., G-frame work 26], to construct the model of the risky asset price and bid-ask pricing for the European contingent claims under Knightian uncertain financial market. Firstly, we consider the basic risky asset price model on the uncertain financial market, which we construct here is the model with drift uncertain and volatility uncertain . We describe such model by using generalized G-Brownian motion and call it as G-asset price system. We present the uncertain risk premium which is %DIFDELCMD < [%%% \\underline{ %DIFDELCMD < \\bar{\\mu}]%%% uncertain and distributed with maximum distribution. We derive the closed form of bid-ask price of the European contingent claim against the underlying risky asset with G-asset price system as the discounted conditional G-expecation of the claim, and the bid and ask prices are the viscosity solutions to the nonlinear HJB equations .Furthermore, we consider the main part of this paper, i.e., consider the risky asset on the Knightian uncertain financial market with the price fluctuation shows as continuous trajectories . We propose the G-conditional full support condition by using uncertain capacity, and the risky asset price path satisfying the G-conditional full support condition could be approximated by its G-consistent asset price systems. We derive that the bid and ask prices of the European contingent claim against such risky asset under uncertain can be expressed by discounted of some conditional G-expectation of the claim. We give examples, such as G-Markovian processes and the geometric fractional G-Brownian motion 9 , satisfying the G-conditional full support condition.", "edit_actions": [{"type": "R", "before": "consider to", "after": "to consider", "start_char_pos": 28, "end_char_pos": 39}, {"type": "R", "before": "in the Knightian uncertain financial market", "after": "on the financial market under the Knightian uncertainty", "start_char_pos": 68, "end_char_pos": 111}, {"type": "R", "before": "upper (bid) and lower (ask )", "after": "ask and bid", "start_char_pos": 130, "end_char_pos": 158}, {"type": "R", "before": "The", "after": "We use the nonlinear analysis tool, i.e., G-frame work", "start_char_pos": 189, "end_char_pos": 192}, {"type": "A", "before": null, "after": "26", "start_char_pos": 193, "end_char_pos": 193}, {"type": "A", "before": null, "after": ", to construct the model of the risky asset price and bid-ask pricing for the European contingent claims under Knightian uncertain financial market. Firstly, we consider the", "start_char_pos": 194, "end_char_pos": 194}, {"type": "A", "before": null, "after": "on the uncertain financial market, which", "start_char_pos": 225, "end_char_pos": 225}, {"type": "A", "before": null, "after": "the model with", "start_char_pos": 247, "end_char_pos": 247}, {"type": "R", "before": ", we", "after": ". We", "start_char_pos": 289, "end_char_pos": 293}, {"type": "R", "before": "general", "after": "generalized", "start_char_pos": 323, "end_char_pos": 330}, {"type": "D", "before": "distributed with Max distributionN(", "after": null, "start_char_pos": 433, "end_char_pos": 468}, {"type": "D", "before": "\\mu", "after": null, "start_char_pos": 497, "end_char_pos": 500}, {"type": "D", "before": ",", "after": null, "start_char_pos": 501, "end_char_pos": 502}, {"type": "R", "before": ",\\{0\\", "after": "uncertain and distributed with maximum distribution. We derive the", "start_char_pos": 529, "end_char_pos": 534}, {"type": "R", "before": "bid and ask prices", "after": "bid-ask price", "start_char_pos": 550, "end_char_pos": 568}, {"type": "A", "before": null, "after": "the underlying", "start_char_pos": 610, "end_char_pos": 610}, {"type": "R", "before": ", and give", "after": "as the discounted conditional G-expecation of the claim, and", "start_char_pos": 649, "end_char_pos": 659}, {"type": "R", "before": "solution to nonlinear HJB", "after": "solutions to the nonlinear HJB equations", "start_char_pos": 701, "end_char_pos": 726}, {"type": "A", "before": null, "after": "the Knightian", "start_char_pos": 816, "end_char_pos": 816}, {"type": "R", "before": "as continuous path", "after": "shows as continuous trajectories", "start_char_pos": 871, "end_char_pos": 889}, {"type": "A", "before": null, "after": "risky asset", "start_char_pos": 981, "end_char_pos": 981}, {"type": "R", "before": "system, and we derived", "after": "systems. We derive", "start_char_pos": 1099, "end_char_pos": 1121}, {"type": "A", "before": null, "after": "under uncertain", "start_char_pos": 1208, "end_char_pos": 1208}, {"type": "A", "before": null, "after": "the geometric", "start_char_pos": 1340, "end_char_pos": 1340}, {"type": "A", "before": null, "after": "motion", "start_char_pos": 1363, "end_char_pos": 1363}, {"type": "A", "before": null, "after": "9", "start_char_pos": 1364, "end_char_pos": 1364}], "sents_char_pos": [0, 188, 385, 728, 891, 1287]}
+{"doc_id": "1310.4880", "revision_depth": "1", "before_revision": "Gait velocity has been consistently shown to be an important indicator and predictor of health status, especially in elderly populations. Gait velocity is often assessed clinically, but clinical assessments occur infrequently and thus do not allow optimal detection of key health changes when they occur. In this paper, we propose using the time it takes a person to move between rooms in their home - referred to as 'transition times' - estimated from passive infrared motion sensors installed in a patients own home to predict gait velocity. By using a support vector regression approach to model the relationship between transition times and observed gait velocities , we show that we can predict unobserved velocities accurately. In particular, we demonstrate that the proposed approach has an average error of 4 cm/sec using data collected over a 5 year period from 76 study participants monitored both in their own homes and within a clinical setting. The proposed method is simple and cost effective , and has advantages over competing approaches such as not requiring patients to wear a device or needing dedicated sensors to measure gait . Furthermore, this method provides substantially more frequent estimates of gait velocity than are provided by other approaches .", "after_revision": "Gait velocity has been consistently shown to be an important indicator and predictor of health status, especially in older adults. It is often assessed clinically, but the assessments occur infrequently and do not allow optimal detection of key health changes when they occur. In this paper, we show that the time gap between activations of a pair of Passive Infrared (PIR) motion sensors installed in the consecutively visited room pair carry rich latent information about a person's gait velocity. We name this time gap transition time and show that despite a six second refractory period of the PIR sensors, transition time can be used to obtain an accurate representation of gait velocity. Using a Support Vector Regression (SVR) approach to model the relationship between transition time and gait velocity , we show that gait velocity can be estimated with an average error less than 2.5 cm/sec . This is demonstrated with data collected over a 5 year period from 74 older adults monitored in their own homes . This method is simple and cost effective and has advantages over competing approaches such as : obtaining 20 to 100x more gait velocity measurements per day and offering the fusion of location-specific information with time stamped gait estimates. These advantages allow stable estimates of gait parameters (maximum or average speed, variability) at shorter time scales than current approaches. This also provides a pervasive in-home method for context-aware gait velocity sensing that allows for monitoring of gait trajectories in space and time .", "edit_actions": [{"type": "R", "before": "elderly populations. Gait velocity", "after": "older adults. It", "start_char_pos": 117, "end_char_pos": 151}, {"type": "R", "before": "clinical", "after": "the", "start_char_pos": 186, "end_char_pos": 194}, {"type": "D", "before": "thus", "after": null, "start_char_pos": 230, "end_char_pos": 234}, {"type": "R", "before": "propose using the time it takes a person to move between rooms in their home - referred to as 'transition times' - estimated from passive infrared", "after": "show that the time gap between activations of a pair of Passive Infrared (PIR)", "start_char_pos": 323, "end_char_pos": 469}, {"type": "R", "before": "a patients own home to predict", "after": "the consecutively visited room pair carry rich latent information about a person's gait velocity. We name this time gap transition time and show that despite a six second refractory period of the PIR sensors, transition time can be used to obtain an accurate representation of", "start_char_pos": 498, "end_char_pos": 528}, {"type": "R", "before": "By using a support vector regression", "after": "Using a Support Vector Regression (SVR)", "start_char_pos": 544, "end_char_pos": 580}, {"type": "R", "before": "times and observed gait velocities", "after": "time and gait velocity", "start_char_pos": 635, "end_char_pos": 669}, {"type": "R", "before": "we can predict unobserved velocities accurately. In particular, we demonstrate that the proposed approach has", "after": "gait velocity can be estimated with", "start_char_pos": 685, "end_char_pos": 794}, {"type": "R", "before": "of 4", "after": "less than 2.5", "start_char_pos": 812, "end_char_pos": 816}, {"type": "R", "before": "using", "after": ". This is demonstrated with", "start_char_pos": 824, "end_char_pos": 829}, {"type": "R", "before": "76 study participants monitored both", "after": "74 older adults monitored", "start_char_pos": 871, "end_char_pos": 907}, {"type": "R", "before": "and within a clinical setting. The proposed", "after": ". This", "start_char_pos": 927, "end_char_pos": 970}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1007, "end_char_pos": 1008}, {"type": "R", "before": "not requiring patients to wear a device or needing dedicated sensors to measure gait . Furthermore, this method provides substantially more frequent", "after": ": obtaining 20 to 100x more gait velocity measurements per day and offering the fusion of location-specific information with time stamped gait estimates. These advantages allow stable", "start_char_pos": 1062, "end_char_pos": 1210}, {"type": "R", "before": "velocity than are provided by other approaches", "after": "parameters (maximum or average speed, variability) at shorter time scales than current approaches. This also provides a pervasive in-home method for context-aware gait velocity sensing that allows for monitoring of gait trajectories in space and time", "start_char_pos": 1229, "end_char_pos": 1275}], "sents_char_pos": [0, 137, 304, 543, 733, 957, 1148]}
+{"doc_id": "1310.6873", "revision_depth": "2", "before_revision": "In the aftermath of the interbank market collapse of 2007-08, the scope of systemic risk research has broadened to encompass a wide range of channels , notably asset correlations, default contagion, illiquidity contagion, and asset firesales. In current models of systemic risk, two facets of contagion, namely funding illiquidity and insolvency , are treated as two distinct and separate phenomena. The main goal of the double cascade model we introduce is to integrate these two facets. In a default cascade, insolvency of a given bank will create a shock to the asset side of the balance sheet of each of its creditor banks . Under some circumstances, such \"downstream\" shocks can cause further insolvencies that may build up to create a global insolvency cascade. On the other hand, in a stress cascade, illiquidity that hits a given bank will create a shock to the liability side of the balance sheet of each of its debtor banks. Such \"upstream\" shocks can cause further illiquidity stresses that may build up to create a global illiquidity cascade. Our paper introduces a deliberately simplified network model of insolvency and illiquidity that can quantify how illiquidity or default of one bank influences the overall level of liquidity stress and default in the network. Under an assumption we call \"locally tree-like independence\", we derive large-network asymptotic cascade formulas. Results of numerical experiments then demonstrate that these asymptotic formulas agree qualitatively with Monte Carlo results for large finite networks, and quantitatively except when the system is placed in an exceptional \"knife-edge\" configuration. These experiments illustrate clearly our main conclusion that in financial networks , the average default probability is inversely related to strength of banks' stress response and therefore to the overall level of stress in the network.", "after_revision": "The scope of financial systemic risk research encompasses a wide range of channels and effects, including asset correlation shocks , default contagion, illiquidity contagion, and asset firesales. For example, insolvency of a given bank will create a shock to the asset side of the balance sheet of each of its creditor banks and under some circumstances, such \"downstream\" shocks can cause further insolvencies that may build up to create what is called an insolvency or default cascade. On the other hand, funding illiquidity that hits a given bank will create a shock to the liability side of the balance sheet of each of its debtor banks. Under some circumstances, such \"upstream\" shocks can cause illiquidity in further banks that may build up to create an illiquidity cascade. This paper introduces a deliberately simplified financial network model that combines the default and liquidity stress mechanisms into a \"double cascade mapping\". The progress and eventual result of the crisis is obtained by iterating this mapping to its fixed point. Unlike simpler models, this model can therefore quantify how illiquidity or default of one bank influences the eventual overall level of liquidity stress and default in the system. Large-network asymptotic cascade mapping formulas are derived that can be used for efficient network computations of the double cascade. Numerical experiments then demonstrate that these asymptotic formulas agree qualitatively with Monte Carlo results for large finite networks, and quantitatively except when the initial system is placed in an exceptional \"knife-edge\" configuration. The experiments clearly support the main conclusion that in the absence of fire sales , the average eventual level of defaults in a financial network is negatively related to the strength of banks' liquidity stress response and the eventual level of stress in the network.", "edit_actions": [{"type": "R", "before": "In the aftermath of the interbank market collapse of 2007-08, the scope of", "after": "The scope of financial", "start_char_pos": 0, "end_char_pos": 74}, {"type": "R", "before": "has broadened to encompass", "after": "encompasses", "start_char_pos": 98, "end_char_pos": 124}, {"type": "A", "before": null, "after": "and effects, including asset correlation shocks", "start_char_pos": 150, "end_char_pos": 150}, {"type": "D", "before": "notably asset correlations,", "after": null, "start_char_pos": 153, "end_char_pos": 180}, {"type": "R", "before": "In current models of systemic risk, two facets of contagion, namely funding illiquidity and insolvency , are treated as two distinct and separate phenomena. The main goal of the double cascade model we introduce is to integrate these two facets. In a default cascade, insolvency of a", "after": "For example, insolvency of a", "start_char_pos": 244, "end_char_pos": 527}, {"type": "R", "before": ". Under", "after": "and under", "start_char_pos": 628, "end_char_pos": 635}, {"type": "R", "before": "a global insolvency", "after": "what is called an insolvency or default", "start_char_pos": 740, "end_char_pos": 759}, {"type": "R", "before": "in a stress cascade,", "after": "funding", "start_char_pos": 788, "end_char_pos": 808}, {"type": "R", "before": "Such", "after": "Under some circumstances, such", "start_char_pos": 936, "end_char_pos": 940}, {"type": "R", "before": "further illiquidity stresses", "after": "illiquidity in further banks", "start_char_pos": 969, "end_char_pos": 997}, {"type": "R", "before": "a global", "after": "an", "start_char_pos": 1026, "end_char_pos": 1034}, {"type": "R", "before": "Our", "after": "This", "start_char_pos": 1056, "end_char_pos": 1059}, {"type": "R", "before": "network model of insolvency and illiquidity that can", "after": "financial network model that combines the default and liquidity stress mechanisms into a \"double cascade mapping\". The progress and eventual result of the crisis is obtained by iterating this mapping to its fixed point. Unlike simpler models, this model can therefore", "start_char_pos": 1103, "end_char_pos": 1155}, {"type": "A", "before": null, "after": "eventual", "start_char_pos": 1219, "end_char_pos": 1219}, {"type": "R", "before": "network. Under an assumption we call \"locally tree-like independence\", we derive large-network asymptotic cascade formulas. Results of numerical", "after": "system. Large-network asymptotic cascade mapping formulas are derived that can be used for efficient network computations of the double cascade. Numerical", "start_char_pos": 1273, "end_char_pos": 1417}, {"type": "A", "before": null, "after": "initial", "start_char_pos": 1585, "end_char_pos": 1585}, {"type": "R", "before": "These experiments illustrate clearly our", "after": "The experiments clearly support the", "start_char_pos": 1649, "end_char_pos": 1689}, {"type": "R", "before": "financial networks", "after": "the absence of fire sales", "start_char_pos": 1714, "end_char_pos": 1732}, {"type": "R", "before": "default probability is inversely related to", "after": "eventual level of defaults in a financial network is negatively related to the", "start_char_pos": 1747, "end_char_pos": 1790}, {"type": "A", "before": null, "after": "liquidity", "start_char_pos": 1810, "end_char_pos": 1810}, {"type": "R", "before": "therefore to the overall", "after": "the eventual", "start_char_pos": 1831, "end_char_pos": 1855}], "sents_char_pos": [0, 243, 400, 489, 629, 768, 935, 1055, 1281, 1396, 1648]}
+{"doc_id": "1310.8341", "revision_depth": "1", "before_revision": "Gene regulatory networks are commonly used for modeling biological processes and revealing underlying molecular mechanisms. The reconstruction of gene regulatory networks from observational data is a challenging task, especially , considering the large number of involved players (e.g. genes) and much fewer biological replicates available for analysis. Herein, we proposed a new statistical method of estimating the number of erroneous edges that strongly enhances the commonly used inference approaches. This method is based on special relationship between correlation and causality, and allows to identify and to remove approximately half of erroneous edges. Using the mathematical model of Bayesian networks and positive correlation inequalities we established a mathematical foundation for our method. Analyzing real biological datasets, we found a strong correlation between the results of our method and the commonly used false discovery rate (FDR) technique. Furthermore, the simulation analysis demonstrates that in large networks , our new method provides a more precise estimation of the proportion of erroneous links than FDR.", "after_revision": "Gene regulatory networks are commonly used for modeling biological processes and revealing underlying molecular mechanisms. The reconstruction of gene regulatory networks from observational data is a challenging task, especially considering the large number of players (e.g. genes) involved and the small number of biological replicates available for analysis. Herein, we propose a new statistical method for estimating the number of erroneous edges in reconstructed networks that strongly enhances commonly used inference approaches. This method is based on a special relationship between correlation and causality, and allows for the identification and to removal of approximately half of all erroneous edges. Using the mathematical model of Bayesian networks and positive correlation inequalities we establish a mathematical foundation for our method. Analyzing existing biological datasets, we find a strong correlation between the results of our method and the commonly used false discovery rate (FDR) technique. Furthermore, simulation analysis demonstrates that with large networks our new method provides a more accurate estimate of network error than FDR.", "edit_actions": [{"type": "D", "before": ",", "after": null, "start_char_pos": 229, "end_char_pos": 230}, {"type": "D", "before": "involved", "after": null, "start_char_pos": 263, "end_char_pos": 271}, {"type": "R", "before": "and much fewer", "after": "involved and the small number of", "start_char_pos": 293, "end_char_pos": 307}, {"type": "R", "before": "proposed", "after": "propose", "start_char_pos": 365, "end_char_pos": 373}, {"type": "R", "before": "of", "after": "for", "start_char_pos": 399, "end_char_pos": 401}, {"type": "A", "before": null, "after": "in reconstructed networks", "start_char_pos": 443, "end_char_pos": 443}, {"type": "D", "before": "the", "after": null, "start_char_pos": 467, "end_char_pos": 470}, {"type": "A", "before": null, "after": "a", "start_char_pos": 531, "end_char_pos": 531}, {"type": "R", "before": "to identify and to remove", "after": "for the identification and to removal of", "start_char_pos": 599, "end_char_pos": 624}, {"type": "A", "before": null, "after": "all", "start_char_pos": 647, "end_char_pos": 647}, {"type": "R", "before": "established", "after": "establish", "start_char_pos": 756, "end_char_pos": 767}, {"type": "R", "before": "real", "after": "existing", "start_char_pos": 820, "end_char_pos": 824}, {"type": "R", "before": "found", "after": "find", "start_char_pos": 849, "end_char_pos": 854}, {"type": "D", "before": "the", "after": null, "start_char_pos": 983, "end_char_pos": 986}, {"type": "R", "before": "in large networks ,", "after": "with large networks", "start_char_pos": 1025, "end_char_pos": 1044}, {"type": "R", "before": "precise estimation of the proportion of erroneous links", "after": "accurate estimate of network error", "start_char_pos": 1076, "end_char_pos": 1131}], "sents_char_pos": [0, 123, 353, 506, 664, 809, 969]}
+{"doc_id": "1311.0050", "revision_depth": "1", "before_revision": "Transcription of genes by RNA polymerase molecules is the focus of most forms of regulation of gene expression. Even though careful biochemical experimentation has revealed the molecular mechanisms of transcriptional regulation for a number of different promoters in vitro, the question of how transcription is regulated in live cells is still poorly understood. Recently experimental methods have been developed for counting the number of nascent RNA molecules in a single cell for a gene of interest. Here we show theoretically that measurements of the cell-to-cell variability in the number of nascent RNAs can be used to test different mechanisms of transcription initiation. In particular, we derive exact expressions for the first two moments of the distribution of nascent RNA molecules for an arbitrary mechanism of transcription initiation. These theoretical results are applied to published data on the nascent RNA distributions obtained for a collection of constitutively expressed yeast genes. We find that the data is not consistent with a one-step mechanism of initiation , which has been generally assumed . Instead, a two-step mechanism of initiation with both steps of equal duration is consistent with the available data. These findings for the yeast promoters highlight the utility of our theory for deciphering transcriptional dynamics in vivo .", "after_revision": "Transcription of genes is the focus of most forms of regulation of gene expression. Even though careful biochemical experimentation has revealed the molecular mechanisms of transcription initiation for a number of different promoters in vitro, the dynamics of this process in cells is still poorly understood. One approach has been to measure the transcriptional output (fluorescently labeled messenger RNAs or proteins) from single cells in a genetically identical population, which could then be compared to predictions from models that incorporate different molecular mechanisms of transcription initiation. However, this approach suffers from the problem, that processes downstream from transcription can affect the measured output and therefore mask the signature of stochastic transcription initiation on the cell-to-cell variability of the transcriptional outputs. Here we show theoretically that measurements of the cell-to-cell variability in the number of nascent RNAs provide a more direct test of the mechanism of transcription initiation. We derive exact expressions for the first two moments of the distribution of nascent RNA molecules and apply our theory to published data for a collection of constitutively expressed yeast genes. We find that the measured nascent RNA distributions are inconsistent with transcription initiation proceeding via one rate-limiting step , which has been generally inferred from measurements of cytoplasmic messenger RNA . Instead, we propose a two-step mechanism of initiation , which is consistent with the available data. These findings for the yeast promoters highlight the utility of our theory for deciphering transcriptional dynamics in vivo from experiments that count nascent RNA molecules in single cells .", "edit_actions": [{"type": "D", "before": "by RNA polymerase molecules", "after": null, "start_char_pos": 23, "end_char_pos": 50}, {"type": "R", "before": "transcriptional regulation", "after": "transcription initiation", "start_char_pos": 201, "end_char_pos": 227}, {"type": "R", "before": "question of how transcription is regulated in live", "after": "dynamics of this process in", "start_char_pos": 278, "end_char_pos": 328}, {"type": "R", "before": "Recently experimental methods have been developed for counting the number of nascent RNA molecules in a single cell for a gene of interest.", "after": "One approach has been to measure the transcriptional output (fluorescently labeled messenger RNAs or proteins) from single cells in a genetically identical population, which could then be compared to predictions from models that incorporate different molecular mechanisms of transcription initiation. However, this approach suffers from the problem, that processes downstream from transcription can affect the measured output and therefore mask the signature of stochastic transcription initiation on the cell-to-cell variability of the transcriptional outputs.", "start_char_pos": 363, "end_char_pos": 502}, {"type": "R", "before": "can be used to test different mechanisms of", "after": "provide a more direct test of the mechanism of", "start_char_pos": 610, "end_char_pos": 653}, {"type": "R", "before": "In particular, we", "after": "We", "start_char_pos": 680, "end_char_pos": 697}, {"type": "R", "before": "for an arbitrary mechanism of transcription initiation. These theoretical results are applied", "after": "and apply our theory", "start_char_pos": 794, "end_char_pos": 887}, {"type": "D", "before": "on the nascent RNA distributions obtained", "after": null, "start_char_pos": 906, "end_char_pos": 947}, {"type": "R", "before": "data is not consistent with a one-step mechanism of initiation", "after": "measured nascent RNA distributions are inconsistent with transcription initiation proceeding via one rate-limiting step", "start_char_pos": 1023, "end_char_pos": 1085}, {"type": "R", "before": "assumed", "after": "inferred from measurements of cytoplasmic messenger RNA", "start_char_pos": 1113, "end_char_pos": 1120}, {"type": "A", "before": null, "after": "we propose", "start_char_pos": 1132, "end_char_pos": 1132}, {"type": "R", "before": "with both steps of equal duration", "after": ", which", "start_char_pos": 1168, "end_char_pos": 1201}, {"type": "A", "before": null, "after": "from experiments that count nascent RNA molecules in single cells", "start_char_pos": 1365, "end_char_pos": 1365}], "sents_char_pos": [0, 111, 362, 502, 679, 849, 1005, 1122, 1240]}
+{"doc_id": "1312.2988", "revision_depth": "3", "before_revision": "Protein contacts contain important information for protein structure and functional study, but contact prediction is very challengingespecially for protein families without many sequence homologs. Recently evolutionary coupling (EC) analysis , which predicts contactsby analyzing residue co-evolution in a single target family, has made good progress due to better statistical and optimization techniques . Different from these single-family EC methods that focus on only a single protein family, this paper presents a joint multi-family EC analysis method that predicts contacts of one target family by jointly modeling residue co-evolution in itself and also (distantly) related familieswith divergent sequences but similar folds , and enforcing their co-evolution pattern consistency based upon their evolutionary distance . To implement this multi-family EC analysisstrategy, this paper presents a novel joint graphical lasso method to model a set of related protein families . In particular, we model a set of related families using a set of correlated multivariate Gaussian distributions, the inverse covariance matrix (or precision matrix) of each distribution encoding the contact pattern of one family. Then we co-estimate the precision matrices by maximizing the occurring probability of all the involved sequences , subject to the constraint that the matrices shall share similar patterns . Finally we solve this optimization problem using Alternating Direction Method of Multipliers (ADMM). Experiments show that joint multi-family EC analysis can reveal many more native contacts than single-family analysis even for a target family with 4000-5000 non-redundant sequence homologs, which makes many more protein families amenable to co-evolution-based structure and function prediction .", "after_revision": "Protein contacts contain important information for protein structure and functional study, but contact prediction from sequence remains very challenging. Both evolutionary coupling (EC) analysis and supervised machine learning methods are developed to predict contacts, making use of different types of information, respectively. This paper presents a group graphical lasso (GGL) method for contact prediction that integrates joint multi-family EC analysis and supervised learning . Different from existing single-family EC analysis that uses residue co-evolution information in only the target protein family, our joint EC analysis uses residue co-evolution in both the target family and its related families, which may have divergent sequences but similar folds . To implement joint EC analysis, we model a set of related protein families using Gaussian graphical models (GGM) and then co-estimate their precision matrices by maximum-likelihood , subject to the constraint that the precision matrices shall share similar residue co-evolution patterns. To further improve the accuracy of the estimated precision matrices, we employ a supervised learning method to predict contact probability from a variety of evolutionary and non-evolutionary information and then incorporate the predicted probability as prior into our GGL framework . Experiments show that our method can predict contacts much more accurately than existing methods, and that our method performs better on both conserved and family-specific contacts .", "edit_actions": [{"type": "R", "before": "is very challengingespecially for protein families without many sequence homologs. Recently", "after": "from sequence remains very challenging. Both", "start_char_pos": 114, "end_char_pos": 205}, {"type": "R", "before": ", which predicts contactsby analyzing residue co-evolution in a single target family, has made good progress due to better statistical and optimization techniques", "after": "and supervised machine learning methods are developed to predict contacts, making use of different types of information, respectively. This paper presents a group graphical lasso (GGL) method for contact prediction that integrates joint multi-family EC analysis and supervised learning", "start_char_pos": 242, "end_char_pos": 404}, {"type": "R", "before": "these", "after": "existing", "start_char_pos": 422, "end_char_pos": 427}, {"type": "R", "before": "methods that focus on only a single", "after": "analysis that uses residue co-evolution information in only the target", "start_char_pos": 445, "end_char_pos": 480}, {"type": "R", "before": "this paper presents a joint multi-family EC analysis method that predicts contacts of one target family by jointly modeling", "after": "our joint EC analysis uses", "start_char_pos": 497, "end_char_pos": 620}, {"type": "R", "before": "itself and also (distantly) related familieswith", "after": "both the target family and its related families, which may have", "start_char_pos": 645, "end_char_pos": 693}, {"type": "D", "before": ", and enforcing their co-evolution pattern consistency based upon their evolutionary distance", "after": null, "start_char_pos": 732, "end_char_pos": 825}, {"type": "R", "before": "this multi-family EC analysisstrategy, this paper presents a novel joint graphical lasso method to", "after": "joint EC analysis, we", "start_char_pos": 841, "end_char_pos": 939}, {"type": "R", "before": ". In particular, we model a set of related families using a set of correlated multivariate Gaussian distributions, the inverse covariance matrix (or precision matrix) of each distribution encoding the contact pattern of one family. Then we", "after": "using Gaussian graphical models (GGM) and then", "start_char_pos": 980, "end_char_pos": 1219}, {"type": "R", "before": "the", "after": "their", "start_char_pos": 1232, "end_char_pos": 1235}, {"type": "R", "before": "maximizing the occurring probability of all the involved sequences", "after": "maximum-likelihood", "start_char_pos": 1258, "end_char_pos": 1324}, {"type": "A", "before": null, "after": "precision", "start_char_pos": 1362, "end_char_pos": 1362}, {"type": "R", "before": "patterns", "after": "residue co-evolution patterns. To further improve the accuracy of the estimated precision matrices, we employ a supervised learning method to predict contact probability from a variety of evolutionary and non-evolutionary information and then incorporate the predicted probability as prior into our GGL framework", "start_char_pos": 1392, "end_char_pos": 1400}, {"type": "D", "before": "Finally we solve this optimization problem using Alternating Direction Method of Multipliers (ADMM).", "after": null, "start_char_pos": 1403, "end_char_pos": 1503}, {"type": "R", "before": "joint multi-family EC analysis can reveal many more native contacts than single-family analysis even for a target family with 4000-5000 non-redundant sequence homologs, which makes many more protein families amenable to co-evolution-based structure and function prediction", "after": "our method can predict contacts much more accurately than existing methods, and that our method performs better on both conserved and family-specific contacts", "start_char_pos": 1526, "end_char_pos": 1798}], "sents_char_pos": [0, 196, 232, 672, 827, 981, 1211, 1402]}
+{"doc_id": "1312.7012", "revision_depth": "1", "before_revision": "X-ray crystallography is the predominant method for obtaining atomic-scale information about biological macromolecules. Despite the success of the technique, obtaining well diffracting crystals still critically limits going from protein to structure. Practically , the crystallization process mainly proceeds through knowledge-informed empiricism. Better physico-chemical assistance remains elusive because of the large number of variables involved ; little microscopic guidance is available to identify solution conditions that promote crystallization. To help determine relationships between macromolecular properties and their crystallization propensity, we train statistical models on samples for 182 proteins supplied by the Northeast Structural Genomics Consortium. Gaussian Processes , which capture trends beyond the reach of linear statistical models, help us distinguish between two main physico-chemical mechanisms driving crystallization. One is characterized by low levels of side chain entropy and is extensively reported in the literature. The other identifies specific electrostatic interactions , not previously described in the crystallization context. Because evidence for two distinct mechanisms can be gleaned both from crystal contacts and from precursor macromolecular solution conditions , the model offers avenues for optimizing crystallization screens based on partial structural information or even from primary sequence analyses . The availability of crystallization data coupled with structural outcomes analyzed through complex statistical models will guide macromolecular crystallization toward a more rational basis.", "after_revision": "X-ray crystallography is the predominant method for obtaining atomic-scale information about biological macromolecules. Despite the success of the technique, obtaining well diffracting crystals still critically limits going from protein to structure. In practice , the crystallization process proceeds through knowledge-informed empiricism. Better physico-chemical understanding remains elusive because of the large number of variables involved , hence little guidance is available to systematically identify solution conditions that promote crystallization. To help determine relationships between macromolecular properties and their crystallization propensity, we have trained statistical models on samples for 182 proteins supplied by the Northeast Structural Genomics consortium. Gaussian processes , which capture trends beyond the reach of linear statistical models, distinguish between two main physico-chemical mechanisms driving crystallization. One is characterized by low levels of side chain entropy and has been extensively reported in the literature. The other identifies specific electrostatic interactions not previously described in the crystallization context. Because evidence for two distinct mechanisms can be gleaned both from crystal contacts and from solution conditions leading to successful crystallization , the model offers future avenues for optimizing crystallization screens based on partial structural information . The availability of crystallization data coupled with structural outcomes analyzed through state-of-the-art statistical models may thus guide macromolecular crystallization toward a more rational basis.", "edit_actions": [{"type": "R", "before": "Practically", "after": "In practice", "start_char_pos": 251, "end_char_pos": 262}, {"type": "D", "before": "mainly", "after": null, "start_char_pos": 293, "end_char_pos": 299}, {"type": "R", "before": "assistance", "after": "understanding", "start_char_pos": 372, "end_char_pos": 382}, {"type": "R", "before": "; little microscopic", "after": ", hence little", "start_char_pos": 449, "end_char_pos": 469}, {"type": "A", "before": null, "after": "systematically", "start_char_pos": 495, "end_char_pos": 495}, {"type": "R", "before": "train", "after": "have trained", "start_char_pos": 662, "end_char_pos": 667}, {"type": "R", "before": "Consortium. Gaussian Processes", "after": "consortium. Gaussian processes", "start_char_pos": 761, "end_char_pos": 791}, {"type": "D", "before": "help us", "after": null, "start_char_pos": 862, "end_char_pos": 869}, {"type": "R", "before": "is", "after": "has been", "start_char_pos": 1013, "end_char_pos": 1015}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1113, "end_char_pos": 1114}, {"type": "R", "before": "precursor macromolecular solution conditions", "after": "solution conditions leading to successful crystallization", "start_char_pos": 1268, "end_char_pos": 1312}, {"type": "A", "before": null, "after": "future", "start_char_pos": 1332, "end_char_pos": 1332}, {"type": "D", "before": "or even from primary sequence analyses", "after": null, "start_char_pos": 1420, "end_char_pos": 1458}, {"type": "R", "before": "complex statistical models will", "after": "state-of-the-art statistical models may thus", "start_char_pos": 1552, "end_char_pos": 1583}], "sents_char_pos": [0, 119, 250, 347, 450, 554, 772, 951, 1055, 1171, 1460]}
+{"doc_id": "1402.6533", "revision_depth": "1", "before_revision": "This research is a review and assay of literature data on the properties of DNA open states . The states result from large fluctuations of a duplex and have a great influence on a wide range of biochemical processes , including electric charge transfer in DNA . A comparative analysis of kinetic and thermodynamic experimental data on DNA open states has been performed for a wide temperature range . Apparent contradictions between the data of different experiments have been explained. Based on differences in thermodynamic properties and other characteristics three different types of DNA open states have been identified; a modern definition of the term \"open state\" has been given. A brief review of simple mathematical models of DNA has been presented; in most of the models the state of every base pair is defined by one or two variables. The central problems of investigation of heterogeneous DNA within the approaches of the level considered are examined. The roles of every model group in experimental data interpretation are discussed. Special emphasis is placed on the study of transfer and localization of base pair vibration energy in mechanical models. These processes have been shown to play a key role in heterogeneous duplex dynamics, and their theoretical treatment is critically important for the development of modern molecular biology and biophysics. The key features of theoretical approaches, that enabled description of various experimental data , have been considered. The future development of the models has been described, some particular details of their optimization have been suggested; probable ways of improving some experimental techniques have been proposed .", "after_revision": "Literature data on the properties of DNA open states are reviewed and analyzed. These states are formed as a result of strong DNA fluctuations and have a great impact on a number of biochemical processes ; among them is charge transfer in DNA , for example . A comparative analysis of experimental data on the kinetics and thermodynamics of DNA open states for a wide temperature range was carried out. Discrepancies between the results of various experiments have been explained. Three types of DNA open states are recognized based on their differences in thermodynamic properties and other characteristics . Besides, an up-to-date definition of the term \"open state\" is given. A review is carried out for simple mathematical models of DNA in most of which the state of one pair is described by one or two variables. The main problems arising in theoretical investigations of heterogeneous DNA in the framework of models of this level are considered. The role of each group of models in interpretation of experimental data is discussed. Special consideration is given to the studies of the transfer and localization of the nucleotide pairs oscillations' energy by mechanical models. These processes are shown to play a key role in the dynamics of a heterogeneous duplex. Their theoretical interpretation is proven to be very important for the development of modern molecular biology and biophysics. The main features of the theoretical approaches are considered which enabled describing various experimental data . Prospects of the models ' development are described, particular details of their optimization are suggested, and possible ways of modernization of some experimental techniques are discussed .", "edit_actions": [{"type": "R", "before": "This research is a review and assay of literature", "after": "Literature", "start_char_pos": 0, "end_char_pos": 49}, {"type": "R", "before": ". The states result from large fluctuations of a duplex", "after": "are reviewed and analyzed. These states are formed as a result of strong DNA fluctuations", "start_char_pos": 92, "end_char_pos": 147}, {"type": "R", "before": "influence on a wide range", "after": "impact on a number", "start_char_pos": 165, "end_char_pos": 190}, {"type": "R", "before": ", including electric", "after": "; among them is", "start_char_pos": 216, "end_char_pos": 236}, {"type": "A", "before": null, "after": ", for example", "start_char_pos": 260, "end_char_pos": 260}, {"type": "D", "before": "kinetic and thermodynamic", "after": null, "start_char_pos": 289, "end_char_pos": 314}, {"type": "A", "before": null, "after": "the kinetics and thermodynamics of", "start_char_pos": 336, "end_char_pos": 336}, {"type": "D", "before": "has been performed", "after": null, "start_char_pos": 353, "end_char_pos": 371}, {"type": "R", "before": ". Apparent contradictions between the data of different", "after": "was carried out. Discrepancies between the results of various", "start_char_pos": 401, "end_char_pos": 456}, {"type": "R", "before": "Based on", "after": "Three types of DNA open states are recognized based on their", "start_char_pos": 490, "end_char_pos": 498}, {"type": "R", "before": "three different types of DNA open states have been identified; a modern", "after": ". Besides, an up-to-date", "start_char_pos": 565, "end_char_pos": 636}, {"type": "R", "before": "has been", "after": "is", "start_char_pos": 673, "end_char_pos": 681}, {"type": "R", "before": "brief review of", "after": "review is carried out for", "start_char_pos": 691, "end_char_pos": 706}, {"type": "D", "before": "has been presented;", "after": null, "start_char_pos": 741, "end_char_pos": 760}, {"type": "R", "before": "the models the state of every base pair is defined", "after": "which the state of one pair is described", "start_char_pos": 772, "end_char_pos": 822}, {"type": "R", "before": "central problems of investigation of heterogeneous DNA within the approaches of the level considered are examined. The roles of every model group in experimental data interpretation are", "after": "main problems arising in theoretical investigations of heterogeneous DNA in the framework of models of this level are considered. The role of each group of models in interpretation of experimental data is", "start_char_pos": 852, "end_char_pos": 1037}, {"type": "R", "before": "emphasis is placed on the study of", "after": "consideration is given to the studies of the", "start_char_pos": 1057, "end_char_pos": 1091}, {"type": "R", "before": "base pair vibration energy in", "after": "the nucleotide pairs oscillations' energy by", "start_char_pos": 1121, "end_char_pos": 1150}, {"type": "R", "before": "have been", "after": "are", "start_char_pos": 1186, "end_char_pos": 1195}, {"type": "R", "before": "heterogeneous duplex dynamics, and their theoretical treatment is critically", "after": "the dynamics of a heterogeneous duplex. Their theoretical interpretation is proven to be very", "start_char_pos": 1224, "end_char_pos": 1300}, {"type": "R", "before": "key features of theoretical approaches, that enabled description of", "after": "main features of the theoretical approaches are considered which enabled describing", "start_char_pos": 1379, "end_char_pos": 1446}, {"type": "R", "before": ", have been considered. The future development", "after": ". Prospects", "start_char_pos": 1473, "end_char_pos": 1519}, {"type": "R", "before": "has been described, some", "after": "' development are described,", "start_char_pos": 1534, "end_char_pos": 1558}, {"type": "R", "before": "have been suggested; probable ways of improving", "after": "are suggested, and possible ways of modernization of", "start_char_pos": 1600, "end_char_pos": 1647}, {"type": "R", "before": "have been proposed", "after": "are discussed", "start_char_pos": 1677, "end_char_pos": 1695}], "sents_char_pos": [0, 93, 402, 489, 627, 688, 760, 847, 966, 1048, 1169, 1374, 1496, 1620]}
+{"doc_id": "1404.0410", "revision_depth": "1", "before_revision": "This paper addresses the question of non-arbitrage (precisely No-Unbounded-Profit-with-Bounded-Risk , NUPBR hereafter) after a specific random time. This study completes the one of Aksamit et al. \\mbox{%DIFAUXCMD aksamit/choulli/deng/jeanblanc ] the part after the random time under consideration. We restrict our attention to honest times, and we characterize the pairs of market and honest time for which the resulting model preserves the NUPBR property . Furthermore, we characterize the honest times that preserve the NUPBR property . These findings are essentially based on new stochastic results that are interesting in themselves. Furthermore, we construct explicitly local martingale deflators for a large class of processes .", "after_revision": "This paper quantifies the interplay between the non-arbitrage notion of No-Unbounded-Profit-with-Bounded-Risk ( NUPBR hereafter) and additional information generated by a random time. This study complements the one of Aksamit /Choulli/Deng/Jeanblanc 1] in which the authors studied similar topics for the case of stopping at the random time instead, while herein we are concerned with the part after the occurrence of the random time. Given that all the literature -up to our knowledge- proves that the NUPBR notion is always violated after honest times that avoid stopping times in a continuous filtration, herein we propose a new class of honest times for which the NUPBR notion can be preserved for some models. For this family of honest times, we elaborate two principal results. The first main result characterizes the pairs of initial market and honest time for which the resulting model preserves the NUPBR property , while the second main result characterizes the honest times that preserve the NUPBR property for any quasi-left continuous model. Furthermore, we construct explicitly \"the-after-tau\" local martingale deflators for a large class of initial models (i.e. models in the small filtration) that are already risk-neutralized .", "edit_actions": [{"type": "R", "before": "addresses the question of", "after": "quantifies the interplay between the", "start_char_pos": 11, "end_char_pos": 36}, {"type": "R", "before": "(precisely", "after": "notion of", "start_char_pos": 51, "end_char_pos": 61}, {"type": "R", "before": ",", "after": "(", "start_char_pos": 100, "end_char_pos": 101}, {"type": "R", "before": "after a specific", "after": "and additional information generated by a", "start_char_pos": 119, "end_char_pos": 135}, {"type": "R", "before": "completes", "after": "complements", "start_char_pos": 160, "end_char_pos": 169}, {"type": "R", "before": "et al. \\mbox{%DIFAUXCMD aksamit/choulli/deng/jeanblanc", "after": "/Choulli/Deng/Jeanblanc", "start_char_pos": 189, "end_char_pos": 243}, {"type": "A", "before": null, "after": "1", "start_char_pos": 244, "end_char_pos": 244}, {"type": "A", "before": null, "after": "in which the authors studied similar topics for the case of stopping at the random time instead, while herein we are concerned with", "start_char_pos": 246, "end_char_pos": 246}, {"type": "R", "before": "random time under consideration. We restrict our attention to honest times, and we characterize the pairs of", "after": "occurrence of the random time. Given that all the literature -up to our knowledge- proves that the NUPBR notion is always violated after honest times that avoid stopping times in a continuous filtration, herein we propose a new class of honest times for which the NUPBR notion can be preserved for some models. For this family of honest times, we elaborate two principal results. The first main result characterizes the pairs of initial", "start_char_pos": 266, "end_char_pos": 374}, {"type": "R", "before": ". Furthermore, we characterize the", "after": ", while the second main result characterizes the", "start_char_pos": 457, "end_char_pos": 491}, {"type": "R", "before": ". These findings are essentially based on new stochastic results that are interesting in themselves.", "after": "for any quasi-left continuous model.", "start_char_pos": 538, "end_char_pos": 638}, {"type": "A", "before": null, "after": "\"the-after-tau\"", "start_char_pos": 676, "end_char_pos": 676}, {"type": "R", "before": "processes", "after": "initial models (i.e. models in the small filtration) that are already risk-neutralized", "start_char_pos": 725, "end_char_pos": 734}], "sents_char_pos": [0, 148, 195, 298, 458, 539, 638]}
+{"doc_id": "1405.2512", "revision_depth": "2", "before_revision": "Consider a high-dimensional data set, such that for every data-point there is incomplete information. Each object in the data set represents a real entity, which models as a point in high-dimensional space. We assume that all real entities are embedded in the same space, which means they have the same dimension. We model the lack of information for a given object as affine subspace in R^d with dimension k . Our goal in this paper is to find clusters of objects . The main problem is to cope with the partial information . We studied a simple algorithm we callData clustering using flats minimum distances , using the following assumptions: 1) There are m clusters. 2) Each cluster is modeled as a ball in \\mathbb{R}^d . 3) Each cluster contains a \\frac{n{m}, k-dimensional affine subspaces . 4) All k-dimensional affine subspaces, which belong in the same cluster, are intersected with the ball of the cluster. 5) Each k-dimensional affine subspace, that belong to a cluster, is selected uniformly among all k-dimensional affine subspaces that intersect the ball's cluster. A data set that satisfy these assumptions will be called }\\textit{separable data . Our suggested algorithm calculates pair-wise projection of the data . We use probabilistic considerations to prove the algorithm correctness. These probabilistic results are of independent interest, as can serve to better understand the geometry of high dimensional objects.", "after_revision": "Consider a high-dimensional data set, in which for every data-point there is incomplete information. Each object in the data set represents a real entity, which is described by a point in high-dimensional space. We model the lack of information for a given object as an affine subspace in R^d whose dimension k is the number of missing features . Our goal in this study is to find clusters of objects where the main problem is to cope with partial information and high dimension. Assuming the data set is separable, namely, its emergence from clusters that can be modeled as a set of disjoint ball in \\mathbb{R}^d , we suggest a simple data clustering algorithm . {m}, k-dimensional affine subspaces . 4) All k-dimensional affine subspaces, which belong in the same cluster, are intersected with the ball of the cluster. 5) Each k-dimensional affine subspace, that belong to a cluster, is selected uniformly among all k-dimensional affine subspaces that intersect the ball's cluster. A data set that satisfy these assumptions will be called }\\textit{ Our suggested algorithm use the affine subspaces minimum distance and calculates pair-wise projection of the data achieving poly-logarithmic time complexity . We use probabilistic considerations to prove the algorithm 's correctness. These probabilistic results are of independent interest, and can serve to better understand the geometry of high dimensional objects.", "edit_actions": [{"type": "R", "before": "such that", "after": "in which", "start_char_pos": 38, "end_char_pos": 47}, {"type": "R", "before": "models as", "after": "is described by", "start_char_pos": 162, "end_char_pos": 171}, {"type": "D", "before": "assume that all real entities are embedded in the same space, which means they have the same dimension. We", "after": null, "start_char_pos": 210, "end_char_pos": 316}, {"type": "A", "before": null, "after": "an", "start_char_pos": 369, "end_char_pos": 369}, {"type": "R", "before": "with dimension k", "after": "whose dimension k is the number of missing features", "start_char_pos": 393, "end_char_pos": 409}, {"type": "R", "before": "paper", "after": "study", "start_char_pos": 429, "end_char_pos": 434}, {"type": "R", "before": ". The", "after": "where the", "start_char_pos": 466, "end_char_pos": 471}, {"type": "D", "before": "the partial information . We studied a simple algorithm we call", "after": null, "start_char_pos": 501, "end_char_pos": 564}, {"type": "D", "before": "Data clustering using flats minimum distances", "after": null, "start_char_pos": 564, "end_char_pos": 609}, {"type": "R", "before": ", using the following assumptions: 1) There are m clusters. 2) Each cluster is", "after": "partial information and high dimension. Assuming the data set is separable, namely, its emergence from clusters that can be", "start_char_pos": 610, "end_char_pos": 688}, {"type": "A", "before": null, "after": "set of disjoint", "start_char_pos": 702, "end_char_pos": 702}, {"type": "A", "before": null, "after": ", we suggest a simple data clustering algorithm", "start_char_pos": 724, "end_char_pos": 724}, {"type": "D", "before": "3) Each cluster contains a \\frac{n", "after": null, "start_char_pos": 727, "end_char_pos": 761}, {"type": "D", "before": "separable data", "after": null, "start_char_pos": 1147, "end_char_pos": 1161}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1162, "end_char_pos": 1163}, {"type": "A", "before": null, "after": "use the affine subspaces minimum distance and", "start_char_pos": 1188, "end_char_pos": 1188}, {"type": "A", "before": null, "after": "achieving poly-logarithmic time complexity", "start_char_pos": 1233, "end_char_pos": 1233}, {"type": "A", "before": null, "after": "'s", "start_char_pos": 1295, "end_char_pos": 1295}, {"type": "R", "before": "as", "after": "and", "start_char_pos": 1366, "end_char_pos": 1368}], "sents_char_pos": [0, 101, 206, 313, 467, 526, 669, 917, 1080, 1163, 1235, 1308]}
+{"doc_id": "1407.1135", "revision_depth": "2", "before_revision": "Quantitative modeling in biology can be difficult due to parameter value scarcity . An alternative is qualitative modeling since it requires few to no parameters. This article presents a qualitative modeling derived from boolean networks where fuzzy logic is used and where edges can be tuned. Fuzzy logic being continuous, its variables can be finely valued while remaining qualitative. To consider that some interactions are slower or weaker than other ones, edge states are computed to modulate in speed and strength the signal they convey. The proposed formalism is illustrated through its implementation on an example network. Simulations show that continuous results are produced, thus allowing fine analysis, and that modulating the signal conveyed by the edges allows their tuning according to knowledge about the interaction they model. The present work is expected to bring enhancements in the ability of qualitative models to simulate biological networks .", "after_revision": "Quantitative modeling in systems biology can be difficult due to the scarcity of quantitative details about biological phenomenons, especially at the subcellular scale . An alternative to escape this difficulty is qualitative modeling since it requires few to no quantitative information. Among the qualitative modeling approaches, the Boolean network formalism is one of the most popular. However, Boolean models allow variables to be valued at only true or false, which can appear too simplistic when modeling biological processes. Consequently, this work proposes a modeling approach derived from Boolean networks where fuzzy operators are used and where edges are tuned. Fuzzy operators allow variables to be continuous and then to be more finely valued than with discrete modeling approaches, such as Boolean networks, while remaining qualitative. Moreover, to consider that in a given biological network some interactions are slower and/or weaker relative to other ones, edge states are computed in order to modulate in speed and strength the signal they convey. The proposed formalism is illustrated through its implementation on a tiny sample of the epidermal growth factor receptor signaling pathway. The obtained simulations show that continuous results are produced, thus allowing finer analysis, and that modulating the signal conveyed by the edges allows their tuning according to knowledge about the modeled interactions, thus incorporating more knowledge. The proposed modeling approach is expected to bring enhancements in the ability of qualitative models to simulate the dynamics of biological networks while not requiring quantitative information .", "edit_actions": [{"type": "A", "before": null, "after": "systems", "start_char_pos": 25, "end_char_pos": 25}, {"type": "R", "before": "parameter value scarcity", "after": "the scarcity of quantitative details about biological phenomenons, especially at the subcellular scale", "start_char_pos": 58, "end_char_pos": 82}, {"type": "A", "before": null, "after": "to escape this difficulty", "start_char_pos": 100, "end_char_pos": 100}, {"type": "R", "before": "parameters. This article presents a qualitative modeling derived from boolean", "after": "quantitative information. Among the qualitative modeling approaches, the Boolean network formalism is one of the most popular. However, Boolean models allow variables to be valued at only true or false, which can appear too simplistic when modeling biological processes. Consequently, this work proposes a modeling approach derived from Boolean", "start_char_pos": 153, "end_char_pos": 230}, {"type": "R", "before": "logic is", "after": "operators are", "start_char_pos": 252, "end_char_pos": 260}, {"type": "R", "before": "can be", "after": "are", "start_char_pos": 282, "end_char_pos": 288}, {"type": "R", "before": "logic being continuous, its variables can be finely valued", "after": "operators allow variables to be continuous and then to be more finely valued than with discrete modeling approaches, such as Boolean networks,", "start_char_pos": 302, "end_char_pos": 360}, {"type": "R", "before": "To consider that", "after": "Moreover, to consider that in a given biological network", "start_char_pos": 390, "end_char_pos": 406}, {"type": "R", "before": "or weaker than", "after": "and/or weaker relative to", "start_char_pos": 436, "end_char_pos": 450}, {"type": "A", "before": null, "after": "in order", "start_char_pos": 488, "end_char_pos": 488}, {"type": "R", "before": "an example network. Simulations", "after": "a tiny sample of the epidermal growth factor receptor signaling pathway. The obtained simulations", "start_char_pos": 615, "end_char_pos": 646}, {"type": "R", "before": "fine", "after": "finer", "start_char_pos": 704, "end_char_pos": 708}, {"type": "R", "before": "interaction they model. The present work", "after": "modeled interactions, thus incorporating more knowledge. The proposed modeling approach", "start_char_pos": 825, "end_char_pos": 865}, {"type": "R", "before": "biological networks", "after": "the dynamics of biological networks while not requiring quantitative information", "start_char_pos": 949, "end_char_pos": 968}], "sents_char_pos": [0, 84, 164, 295, 389, 546, 634, 848]}
+{"doc_id": "1407.4992", "revision_depth": "1", "before_revision": "Background: With the ever increasing use of computational models in the biosciences, the need to efficiently and easily share models and reproduce the results of published studies is becoming more important. As part of this effort , various standards have been proposed that can be used to describe models, simulations, data or other essential information . These constitute various separate components that are required to reproduce a published scientific result. Results: In this work we describe the Open Modeling EXchange format (OMEX) that allows all the necessary information to be bundled together into one file . Together with the use of other COMBINE standard formats , OMEX is the basis of the COMBINE archive , a single file that supports the exchange of all the information necessary for a modeling and simulation experiment in biology. An OMEX file is a ZIP container that includes a manifest file, listing the content of the archive, an optional metadata file adding information about the archive and its content, and the files describing the model. The content of a COMBINE archive consists of files encoded in COMBINE standards whenever possible, but may include additional files defined by an Internet Media Type. Several tools supporting the COMBINE archive are available, either as independent libraries or embedded in modeling software. Conclusions: The COMBINE archive facilitates the reproduction of modeling and simulation experiments in biology by embedding all the relevant information in one file. Having all the information stored and exchanged at once also helps support building logs and audit trails. We anticipate that the COMBINE archive will become a significant help , as the domain moves to larger, more complex experiments such as multi-scale models URLans, URLanisms, and bioengineering.", "after_revision": "Background: With the ever increasing use of computational models in the biosciences, the need to share models and reproduce the results of published studies efficiently and easily is becoming more important. To this end , various standards have been proposed that can be used to describe models, simulations, data or other essential information in a consistent fashion . These constitute various separate components required to reproduce a given published scientific result. Results: We describe the Open Modeling EXchange format (OMEX) . Together with the use of other standard formats from the Computational Modeling in Biology Network (COMBINE) , OMEX is the basis of the COMBINE Archive , a single file that supports the exchange of all the information necessary for a modeling and simulation experiment in biology. An OMEX file is a ZIP container that includes a manifest file, listing the content of the archive, an optional metadata file adding information about the archive and its content, and the files describing the model. The content of a COMBINE Archive consists of files encoded in COMBINE standards whenever possible, but may include additional files defined by an Internet Media Type. Several tools that support the COMBINE Archive are available, either as independent libraries or embedded in modeling software. Conclusions: The COMBINE Archive facilitates the reproduction of modeling and simulation experiments in biology by embedding all the relevant information in one file. Having all the information stored and exchanged at once also helps in building activity logs and audit trails. We anticipate that the COMBINE Archive will become a significant help for modellers , as the domain moves to larger, more complex experiments such as multi-scale models URLans, URLanisms, and bioengineering.", "edit_actions": [{"type": "D", "before": "efficiently and easily", "after": null, "start_char_pos": 97, "end_char_pos": 119}, {"type": "A", "before": null, "after": "efficiently and easily", "start_char_pos": 180, "end_char_pos": 180}, {"type": "R", "before": "As part of this effort", "after": "To this end", "start_char_pos": 209, "end_char_pos": 231}, {"type": "A", "before": null, "after": "in a consistent fashion", "start_char_pos": 357, "end_char_pos": 357}, {"type": "D", "before": "that are", "after": null, "start_char_pos": 405, "end_char_pos": 413}, {"type": "A", "before": null, "after": "given", "start_char_pos": 438, "end_char_pos": 438}, {"type": "R", "before": "In this work we", "after": "We", "start_char_pos": 477, "end_char_pos": 492}, {"type": "D", "before": "that allows all the necessary information to be bundled together into one file", "after": null, "start_char_pos": 543, "end_char_pos": 621}, {"type": "R", "before": "COMBINE standard formats", "after": "standard formats from the Computational Modeling in Biology Network (COMBINE)", "start_char_pos": 655, "end_char_pos": 679}, {"type": "R", "before": "archive", "after": "Archive", "start_char_pos": 715, "end_char_pos": 722}, {"type": "R", "before": "archive", "after": "Archive", "start_char_pos": 1092, "end_char_pos": 1099}, {"type": "R", "before": "supporting the COMBINE archive", "after": "that support the COMBINE Archive", "start_char_pos": 1248, "end_char_pos": 1278}, {"type": "R", "before": "archive", "after": "Archive", "start_char_pos": 1385, "end_char_pos": 1392}, {"type": "R", "before": "support building", "after": "in building activity", "start_char_pos": 1594, "end_char_pos": 1610}, {"type": "R", "before": "archive", "after": "Archive", "start_char_pos": 1665, "end_char_pos": 1672}, {"type": "A", "before": null, "after": "for modellers", "start_char_pos": 1704, "end_char_pos": 1704}], "sents_char_pos": [0, 208, 359, 467, 623, 851, 1066, 1233, 1359, 1526, 1633]}
+{"doc_id": "1409.6773", "revision_depth": "1", "before_revision": "On a filtered probability space (\\Omega,\\mathcal{F,P,F=(F_t)_{0\\leq t\\leq T}), we consider stopper-stopper games }%DIFDELCMD < \\bar %%% C:=\\inf_{\\Rho\\tau\\in\\T}%DIFDELCMD < \\E[U(\\Rho(\\tau),\\tau)] %%% and%DIFDELCMD < \\underline %%% C:=\\sup_{\\Tau\\rho\\in\\T}%DIFDELCMD < \\E[U(\\Rho(\\tau),\\tau)] %%% in continuous time , where U(s,t) is \\mathcal{F_{s\\vee t}-measurable (this is the new feature of our stopping game ), }%DIFDELCMD < \\T %%% is the set of stopping times, and%DIFDELCMD < \\Rho%%% ,%DIFDELCMD < \\Tau%%% :%DIFDELCMD < \\T%%% \\mapsto%DIFDELCMD < \\T %%% satisfy certain non-anticipativity conditions. We show that%DIFDELCMD < \\bar %%% C=%DIFDELCMD < \\underline %%% C, by converting these problems into a corresponding Dynkin game .", "after_revision": ",P,F=(F_t)_{0\\leq t\\leq T}), we consider stopper-stopper games }%DIFDELCMD < \\bar %%% \\tau\\in\\T}%DIFDELCMD < \\E[U(\\Rho(\\tau),\\tau)] %%% %DIFDELCMD < \\underline %%% \\rho\\in\\T}%DIFDELCMD < \\E[U(\\Rho(\\tau),\\tau)] %%% _{s\\vee t}-measurable (this is the new feature of our stopping game ), }%DIFDELCMD < \\T %%% We consider a zero-sum continuous time stopping %DIFDELCMD < \\Rho%%% %DIFDELCMD < \\Tau%%% %DIFDELCMD < \\T%%% %DIFDELCMD < \\T %%% %DIFDELCMD < \\bar %%% %DIFDELCMD < \\underline %%% game in which the pay-off is revealed in the maximum of the two stopping times instead of the minimum, which is the case in Dynkin games .", "edit_actions": [{"type": "D", "before": "On a filtered probability space (\\Omega,\\mathcal{F", "after": null, "start_char_pos": 0, "end_char_pos": 50}, {"type": "D", "before": "C:=\\inf_{\\Rho", "after": null, "start_char_pos": 136, "end_char_pos": 149}, {"type": "D", "before": "and", "after": null, "start_char_pos": 199, "end_char_pos": 202}, {"type": "D", "before": "C:=\\sup_{\\Tau", "after": null, "start_char_pos": 230, "end_char_pos": 243}, {"type": "D", "before": "in continuous time , where U(s,t) is \\mathcal{F", "after": null, "start_char_pos": 293, "end_char_pos": 340}, {"type": "R", "before": "is the set of", "after": "We consider a zero-sum continuous time", "start_char_pos": 432, "end_char_pos": 445}, {"type": "D", "before": "times, and", "after": null, "start_char_pos": 455, "end_char_pos": 465}, {"type": "D", "before": ",", "after": null, "start_char_pos": 486, "end_char_pos": 487}, {"type": "D", "before": ":", "after": null, "start_char_pos": 508, "end_char_pos": 509}, {"type": "D", "before": "\\mapsto", "after": null, "start_char_pos": 528, "end_char_pos": 535}, {"type": "D", "before": "satisfy certain non-anticipativity conditions. We show that", "after": null, "start_char_pos": 555, "end_char_pos": 614}, {"type": "D", "before": "C=", "after": null, "start_char_pos": 636, "end_char_pos": 638}, {"type": "D", "before": "C, by converting these problems into a corresponding Dynkin", "after": null, "start_char_pos": 666, "end_char_pos": 725}, {"type": "A", "before": null, "after": "in which the pay-off is revealed in the maximum of the two stopping times instead of the minimum, which is the case in Dynkin games", "start_char_pos": 731, "end_char_pos": 731}], "sents_char_pos": [0, 138, 601]}
+{"doc_id": "1409.6789", "revision_depth": "2", "before_revision": "Direct detector device (DDD) cameras have revolutionized single particle electron cryomicroscopy (cryo-EM) of protein complexes . In addition to increasing the detective quantum efficiency with which images can be recorded , acquisition of DDD movies during exposures allows for correction of movement of the specimen, due both to instabilities in the specimen stage of the microscope and electron beam-induced movement. Unlike specimen stage drift, beam-induced movement is not always homogeneous within an image. Local correlation in the trajectories of nearby particles suggests that beam-induced motion is due to deformation of the ice layer. Algorithms have already been described that can correct movement of entire frames or large regions of frames at exposures of 2-3 e^{- rolling averages to be calculated from frames and fit linear trajectories for particles. Here we describe an algorithm that allows for individual < 1 MDa particle images to be aligned without frame averaging when imaged with 2.5 e^{- . The algorithm maximizes the overall correlation of the shifted frames with the sum of the shifted frames. The optimum in this single objective function is found efficiently by making use of analytically calculated derivatives of the function. Two additional measures are implemented to smooth estimates of particle trajectories . First , rapid changes in particle positions between frames are penalized . Second, weighted averaging of nearby trajectories ensures local correlation in trajectories. DDD movies of the\\textit{Saccharomyces cerevisiae V-ATPase are used to demonstrate that the algorithm is able to produce physically reasonable trajectories for a 900 kDa membrane protein complex .", "after_revision": "Direct detector device (DDD) cameras have revolutionized single particle electron cryomicroscopy (cryo-EM) . In addition to an improved camera detective quantum efficiency , acquisition of DDD movies allows for correction of movement of the specimen, due both to instabilities in the microscope specimen stage and electron beam-induced movement. Unlike specimen stage drift, beam-induced movement is not always homogeneous within an image. Local correlation in the trajectories of nearby particles suggests that beam-induced motion is due to deformation of the ice layer. Algorithms have already been described that can correct movement for large regions of frames and for > 1 MDa protein particles. Another algorithm allows individual < 1 MDa protein particle trajectories to be estimated, but requires rolling averages to be calculated from frames and fits linear trajectories for particles. Here we describe an algorithm that allows for individual < 1 MDa particle images to be aligned without frame averaging or linear trajectories . The algorithm maximizes the overall correlation of the shifted frames with the sum of the shifted frames. The optimum in this single objective function is found efficiently by making use of analytically calculated derivatives of the function. To smooth estimates of particle trajectories , rapid changes in particle positions between frames are penalized in the objective function and weighted averaging of nearby trajectories ensures local correlation in trajectories. \\textit{ This individual particle motion correction, in combination with weighting of Fourier components to account for increasing radiation damage in later frames, can be used to improve 3-D maps from single particle cryo-EM .", "edit_actions": [{"type": "D", "before": "of protein complexes", "after": null, "start_char_pos": 107, "end_char_pos": 127}, {"type": "R", "before": "increasing the", "after": "an improved camera", "start_char_pos": 145, "end_char_pos": 159}, {"type": "D", "before": "with which images can be recorded", "after": null, "start_char_pos": 189, "end_char_pos": 222}, {"type": "D", "before": "during exposures", "after": null, "start_char_pos": 251, "end_char_pos": 267}, {"type": "R", "before": "specimen stage of the microscope", "after": "microscope specimen stage", "start_char_pos": 352, "end_char_pos": 384}, {"type": "R", "before": "of entire frames or", "after": "for", "start_char_pos": 712, "end_char_pos": 731}, {"type": "R", "before": "at exposures of 2-3 e^{-", "after": "and for > 1 MDa protein particles. Another algorithm allows individual < 1 MDa protein particle trajectories to be estimated, but requires", "start_char_pos": 756, "end_char_pos": 780}, {"type": "R", "before": "fit", "after": "fits", "start_char_pos": 831, "end_char_pos": 834}, {"type": "R", "before": "when imaged with 2.5 e^{-", "after": "or linear trajectories", "start_char_pos": 989, "end_char_pos": 1014}, {"type": "R", "before": "Two additional measures are implemented to", "after": "To", "start_char_pos": 1260, "end_char_pos": 1302}, {"type": "D", "before": ". First", "after": null, "start_char_pos": 1345, "end_char_pos": 1352}, {"type": "R", "before": ". Second,", "after": "in the objective function and", "start_char_pos": 1420, "end_char_pos": 1429}, {"type": "D", "before": "DDD movies of the", "after": null, "start_char_pos": 1515, "end_char_pos": 1532}, {"type": "D", "before": "Saccharomyces cerevisiae", "after": null, "start_char_pos": 1540, "end_char_pos": 1564}, {"type": "R", "before": "V-ATPase are used to demonstrate that the algorithm is able to produce physically reasonable trajectories for a 900 kDa membrane protein complex", "after": "This individual particle motion correction, in combination with weighting of Fourier components to account for increasing radiation damage in later frames, can be used to improve 3-D maps from single particle cryo-EM", "start_char_pos": 1565, "end_char_pos": 1709}], "sents_char_pos": [0, 129, 420, 514, 646, 869, 1122, 1259, 1346, 1421, 1514]}
+{"doc_id": "1409.8268", "revision_depth": "1", "before_revision": "There have been many studies on malicious targeting of network nodes using degree, betweenness etc. We propose a new network metric, edge proximity, {\\cal P}_e, which demonstrates the importance of specific edges in a network, hitherto not captured by existing network metrics. Effects of removing edges with high {\\cal P}_e might initially seem inconspicuous but is eventually shown to be very harmful for the network. When compared to existing strategies, removal of edges by {\\cal P}_e , leads to remarkable increase of diameter and average path length in real and random networks till the first disconnection and beyond. {\\cal P}_e can be consistently used to rupture the network into two nearly equal parts, thus presenting a very potent strategy to greatly harm a network. Targeting by {\\cal P}_e causes notable efficiency loss in US and European power grid . {\\cal P}_e identifies proteins with essential cellular functions in protein-protein interaction networks. It pinpoints regulatory neural connections and important portions of the neural and brain networks respectively. Energy flow interactions identified by {\\cal P}_e form the backbone of long food web chains. Finally, we scrutinize the potential of {\\cal P}_e in edge controllability dynamics of directed networks.", "after_revision": " We propose a network metric, edge proximity, {\\cal P}_e, which demonstrates the importance of specific edges in a network, hitherto not captured by existing network metrics. The effects of removing edges with high {\\cal P}_e might initially seem inconspicuous but are eventually shown to be very harmful for networks. Compared to existing strategies, the removal of edges by {\\cal P}_e leads to a remarkable increase in the diameter and average shortest path length in undirected real and random networks till the first disconnection and well beyond. {\\cal P}_e can be consistently used to rupture the network into two nearly equal parts, thus presenting a very potent strategy to greatly harm a network. Targeting by {\\cal P}_e causes notable efficiency loss in U.S. and European power grid networks . {\\cal P}_e identifies proteins with essential cellular functions in protein-protein interaction networks. It pinpoints regulatory neural connections and important portions of the neural and brain networks , respectively. Energy flow interactions identified by {\\cal P}_e form the backbone of long food web chains. Finally, we scrutinize the potential of {\\cal P}_e in edge controllability dynamics of directed networks.", "edit_actions": [{"type": "D", "before": "There have been many studies on malicious targeting of network nodes using degree, betweenness etc.", "after": null, "start_char_pos": 0, "end_char_pos": 99}, {"type": "D", "before": "new", "after": null, "start_char_pos": 113, "end_char_pos": 116}, {"type": "R", "before": "Effects", "after": "The effects", "start_char_pos": 278, "end_char_pos": 285}, {"type": "R", "before": "is", "after": "are", "start_char_pos": 364, "end_char_pos": 366}, {"type": "R", "before": "the network. When compared", "after": "networks. Compared", "start_char_pos": 407, "end_char_pos": 433}, {"type": "A", "before": null, "after": "the", "start_char_pos": 458, "end_char_pos": 458}, {"type": "R", "before": ", leads to remarkable increase of", "after": "leads to a remarkable increase in the", "start_char_pos": 490, "end_char_pos": 523}, {"type": "A", "before": null, "after": "shortest", "start_char_pos": 545, "end_char_pos": 545}, {"type": "A", "before": null, "after": "undirected", "start_char_pos": 561, "end_char_pos": 561}, {"type": "A", "before": null, "after": "well", "start_char_pos": 620, "end_char_pos": 620}, {"type": "R", "before": "US", "after": "U.S.", "start_char_pos": 841, "end_char_pos": 843}, {"type": "A", "before": null, "after": "networks", "start_char_pos": 868, "end_char_pos": 868}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1076, "end_char_pos": 1076}], "sents_char_pos": [0, 99, 277, 419, 628, 782, 976, 1090, 1183]}
+{"doc_id": "1411.3075", "revision_depth": "1", "before_revision": "This paper studies Markovian asset pricing models where the underlying economic uncertainty follows a continuous-time Markov process X with a general state space ( namely, a Borel right process (BRP)) and the pricing kernel ( stochastic discount factor , state-price density ) is a positive semimartingale multiplicative functional of X. We establish uniqueness of a positive eigenfunction of the pricing operator such that X is recurrent under a new probability measure associated with this eigenfunction (recurrent eigenfunction). As an application , we prove uniqueness of the Hansen and Scheinkman (2009) factorization of the Markovian pricing kernel under the assumption of recurrence, and, as a special case, we extend the Recovery Theorem of Ross (2013) from discrete time, finite state irreducible Markov chains to recurrent Borel right processes. When a model is specified by given risk-neutral probabilities together with a given short rate function of the Markovian driver , we give three sufficient conditions for existence of a recurrent eigenfunction (and , hence, of a recurrent Hansen-Scheinkman factorization and Ross recovery) for specific classes of Markovian models and provide explicit examples of recurrent eigenfunctions, recurrent Hansen-Scheikman factorizations, and Ross recoveries in a number of models, including affine and quadratic diffusion models , some non-affine diffusion models, and an affine model with jumps. These examples show that the recurrence assumption, in addition to fixing uniqueness, rules out unstable economic dynamics, such as the risk-free rate asymptotically going to infinity or to a zero lower bound trap .", "after_revision": "This paper develops a spectral theory of Markovian asset pricing models where the underlying economic uncertainty follows a continuous-time Markov process X with a general state space ( Borel right process (BRP)) and the stochastic discount factor (SDF ) is a positive semimartingale multiplicative functional of X. A key result is the uniqueness theorem for a positive eigenfunction of the pricing operator such that X is recurrent under a new probability measure associated with this eigenfunction (recurrent eigenfunction). As economic applications , we prove uniqueness of the Hansen and Scheinkman (2009) factorization of the Markovian SDF corresponding to the recurrent eigenfunction, extend the Recovery Theorem of Ross (2013) from discrete time, finite state irreducible Markov chains to recurrent BRPs, and obtain the long maturity asymptotics of the pricing operator. When an asset pricing model is specified by given risk-neutral probabilities together with a short rate function of the Markovian state , we give sufficient conditions for existence of a recurrent eigenfunction and provide explicit examples in a number of important financial models, including affine and quadratic diffusion models and an affine model with jumps. These examples show that the recurrence assumption, in addition to fixing uniqueness, rules out unstable economic dynamics, such as the short rate asymptotically going to infinity or to a zero lower bound trap without possibility of escaping .", "edit_actions": [{"type": "R", "before": "studies", "after": "develops a spectral theory of", "start_char_pos": 11, "end_char_pos": 18}, {"type": "D", "before": "namely, a", "after": null, "start_char_pos": 164, "end_char_pos": 173}, {"type": "D", "before": "pricing kernel (", "after": null, "start_char_pos": 209, "end_char_pos": 225}, {"type": "R", "before": ", state-price density", "after": "(SDF", "start_char_pos": 253, "end_char_pos": 274}, {"type": "R", "before": "We establish uniqueness of", "after": "A key result is the uniqueness theorem for", "start_char_pos": 338, "end_char_pos": 364}, {"type": "R", "before": "an application", "after": "economic applications", "start_char_pos": 536, "end_char_pos": 550}, {"type": "R", "before": "pricing kernel under the assumption of recurrence, and, as a special case, we", "after": "SDF corresponding to the recurrent eigenfunction,", "start_char_pos": 640, "end_char_pos": 717}, {"type": "R", "before": "Borel right processes. When a", "after": "BRPs, and obtain the long maturity asymptotics of the pricing operator. When an asset pricing", "start_char_pos": 833, "end_char_pos": 862}, {"type": "D", "before": "given", "after": null, "start_char_pos": 934, "end_char_pos": 939}, {"type": "R", "before": "driver", "after": "state", "start_char_pos": 977, "end_char_pos": 983}, {"type": "D", "before": "three", "after": null, "start_char_pos": 994, "end_char_pos": 999}, {"type": "R", "before": "(and , hence, of a recurrent Hansen-Scheinkman factorization and Ross recovery) for specific classes of Markovian models and", "after": "and", "start_char_pos": 1065, "end_char_pos": 1189}, {"type": "D", "before": "of recurrent eigenfunctions, recurrent Hansen-Scheikman factorizations, and Ross recoveries", "after": null, "start_char_pos": 1216, "end_char_pos": 1307}, {"type": "A", "before": null, "after": "important financial", "start_char_pos": 1323, "end_char_pos": 1323}, {"type": "D", "before": ", some non-affine diffusion models,", "after": null, "start_char_pos": 1380, "end_char_pos": 1415}, {"type": "R", "before": "risk-free", "after": "short", "start_char_pos": 1584, "end_char_pos": 1593}, {"type": "A", "before": null, "after": "without possibility of escaping", "start_char_pos": 1662, "end_char_pos": 1662}], "sents_char_pos": [0, 337, 532, 855, 1144, 1447]}
+{"doc_id": "1411.4265", "revision_depth": "1", "before_revision": "After the release of the final accounting standards for impairment in July 2014 by the IASB, banks will face another significant methodological challenge after Basel 2. The presented work shares some first methodological thoughts and proposes ways how to approach underlying questions. It starts with a detailed discussion of the structural conservatism in the final standard. The exposure value outlined in the first exposure draft 2009 will be interpreted as a fair under amortized cost accounting and consequently provides a valid benchmark. Therefore the ED 2009 is used to quantify conservatism or hidden reserves in the actual implementation of the final standard and to separate operational side-effects from real risk impacts. The second part continues with a quantification of expected credit losses based on Impact of Risk instead of traditional cost of risk . An objective framework is suggested which allows for improved testing of forward looking credit risk estimates during credit cycles. This framework will prove useful to mitigate overly pro-cyclical provisioning and earnings volatility. Finally, an LGD monitoring and backtesting approach applicable for regulatory requirements and accounting standards is proposed. On basis of the NPL Backtest, which is part of the Impact of Risk concept , specific key risk indicators are introduced that allow for a detailed assessment of collections performance versus LGD in bucket 3.", "after_revision": "After the release of the final accounting standards for impairment in July 2014 by the IASB, banks will face the next significant methodological challenge after Basel 2. The presented work shares some first methodological thoughts and proposes ways how to approach underlying questions. It starts with a detailed discussion of the structural conservatism in the final standard. The exposure value as outlined in the IFRS 9 exposure draft (ED 2009 ) will be interpreted as an economically justified value under amortized cost accounting and provides the main methodological benchmark. Consequently, the ED 2009 can be used to quantify conservatism (ie hidden reserves) in the actual implementation of the final standard and to separate operational side-effects caused by the local implementation from actual credit risk impacts. The second part continues with a quantification of expected credit losses based on Impact of Risk instead of traditional cost of risk measures . An objective framework is suggested which allows for improved testing of forward looking credit risk estimates during credit cycles. This framework will prove useful to mitigate overly pro-cyclical provisioning and to reduce earnings volatility. Finally, an LGD monitoring and backtesting approach , applicable under regulatory requirements and accounting standards as well, is proposed. On basis of the NPL Backtest, part of the Impact of Risk framework , specific key risk indicators are introduced that allow for a detailed assessment of collections performance versus LGD in in NPL portfolio (bucket 3).", "edit_actions": [{"type": "R", "before": "another", "after": "the next", "start_char_pos": 109, "end_char_pos": 116}, {"type": "A", "before": null, "after": "as", "start_char_pos": 396, "end_char_pos": 396}, {"type": "R", "before": "first exposure draft", "after": "IFRS 9 exposure draft (ED", "start_char_pos": 413, "end_char_pos": 433}, {"type": "A", "before": null, "after": ")", "start_char_pos": 439, "end_char_pos": 439}, {"type": "R", "before": "a fair", "after": "an economically justified value", "start_char_pos": 463, "end_char_pos": 469}, {"type": "R", "before": "consequently provides a valid benchmark. Therefore", "after": "provides the main methodological benchmark. Consequently,", "start_char_pos": 506, "end_char_pos": 556}, {"type": "R", "before": "is", "after": "can be", "start_char_pos": 569, "end_char_pos": 571}, {"type": "R", "before": "or hidden reserves", "after": "(ie hidden reserves)", "start_char_pos": 602, "end_char_pos": 620}, {"type": "R", "before": "from real", "after": "caused by the local implementation from actual credit", "start_char_pos": 713, "end_char_pos": 722}, {"type": "A", "before": null, "after": "measures", "start_char_pos": 871, "end_char_pos": 871}, {"type": "A", "before": null, "after": "to reduce", "start_char_pos": 1089, "end_char_pos": 1089}, {"type": "R", "before": "applicable for", "after": ", applicable under", "start_char_pos": 1163, "end_char_pos": 1177}, {"type": "A", "before": null, "after": "as well,", "start_char_pos": 1227, "end_char_pos": 1227}, {"type": "D", "before": "which is", "after": null, "start_char_pos": 1271, "end_char_pos": 1279}, {"type": "R", "before": "concept", "after": "framework", "start_char_pos": 1307, "end_char_pos": 1314}, {"type": "R", "before": "bucket 3.", "after": "in NPL portfolio (bucket 3).", "start_char_pos": 1439, "end_char_pos": 1448}], "sents_char_pos": [0, 168, 285, 376, 546, 736, 873, 1006, 1110, 1240]}
+{"doc_id": "1411.4606", "revision_depth": "1", "before_revision": "Risk premium is one of main concepts in mathematical finance. It is a measure of the trade-offs investors make between return and risk and is defined by the excess return over the risk-free interest rate earned per one unit of risk of an asset . The purpose of this article is to find the upper and lower bounds of the risk premium of an asset based on the prices of options in the market . One of key assumptions to achieve this is that the market is Markovian. Under this assumption, we can transform the problem into a problem of a second-order differential equation and then obtain the upper and lower bounds by analyzing the differential equation.", "after_revision": "The risk premium is one of main concepts in mathematical finance. It is a measure of the trade-offs investors make between return and risk and is defined by the excess return relative to the risk-free interest rate that is earned from an asset per one unit of risk . The purpose of this article is to determine upper and lower bounds on the risk premium of an asset based on the market prices of options . One of the key assumptions to achieve this goal is that the market is Markovian. Under this assumption, we can transform the problem of finding the bounds into a second-order differential equation . We then obtain upper and lower bounds on the risk premium by analyzing the differential equation.", "edit_actions": [{"type": "R", "before": "Risk", "after": "The risk", "start_char_pos": 0, "end_char_pos": 4}, {"type": "R", "before": "over", "after": "relative to", "start_char_pos": 171, "end_char_pos": 175}, {"type": "R", "before": "earned", "after": "that is earned from an asset", "start_char_pos": 204, "end_char_pos": 210}, {"type": "D", "before": "of an asset", "after": null, "start_char_pos": 232, "end_char_pos": 243}, {"type": "R", "before": "find the", "after": "determine", "start_char_pos": 280, "end_char_pos": 288}, {"type": "R", "before": "of", "after": "on", "start_char_pos": 312, "end_char_pos": 314}, {"type": "A", "before": null, "after": "market", "start_char_pos": 357, "end_char_pos": 357}, {"type": "D", "before": "in the market", "after": null, "start_char_pos": 376, "end_char_pos": 389}, {"type": "A", "before": null, "after": "the", "start_char_pos": 399, "end_char_pos": 399}, {"type": "A", "before": null, "after": "goal", "start_char_pos": 432, "end_char_pos": 432}, {"type": "R", "before": "into a problem of a", "after": "of finding the bounds into a", "start_char_pos": 518, "end_char_pos": 537}, {"type": "R", "before": "and then obtain the", "after": ". We then obtain", "start_char_pos": 573, "end_char_pos": 592}, {"type": "A", "before": null, "after": "on the risk premium", "start_char_pos": 616, "end_char_pos": 616}], "sents_char_pos": [0, 61, 245, 391, 465]}
+{"doc_id": "1501.07473", "revision_depth": "1", "before_revision": "Stock prices will rarely follow the assumed model but, when stock's transaction times are dense in the interval t_0,T), they determine risk neutral probability (-ies) {\\cal P}^* for the stock price at time T . The remaining available risk neutral probabilities at T correspond to stock prices with different jumps-variability . The findings indicate that {\\cal P}^* may be a mixture. The necessary and suficient condition used to obtain {\\cal P}^* is related with the flow of information and concepts in Market Manipulation; it contributes in understanding the relation between market informational efficiency and the arbitrage-free option pricing methodology. {\\cal P}^*-price C for the stock's European call option expiring at T is also obtained. For \"calm\" stock prices, C coincides with the Black-Scholes-Merton price and confirms its universal validity without stock price modeling assumptions. Additional results for calm stock : a) show that volatility's role is fundamental in the call's transaction, b) clarify the behaviors of the trader and the call's buyerand c) confirm quantitatively that the buyer 's price carries an exponentially increasing volatility premium.", "after_revision": "The price of a stock will rarely follow the assumed model and a curious investor or a Regulatory Authority may wish to obtain a probability model the prices support. A risk neutral probability {\\cal P}^* for the stock 's price at time T is determined in closed form from the prices before T without assuming a price model . The findings indicate that {\\cal P}^* may be a mixture. Under mild conditions on the prices the necessary and sufficient condition to obtain {\\cal P}^* is the coincidence at T of the stock price ranges assumed by the stock's trader and buyer. This result clarifies the relation between market 's informational efficiency and the arbitrage-free option pricing methodology. It also shows that in an incomplete market there are risk neutral probabilities not supported by each stock and their use can be limited. {\\cal P}^*-price C for the stock's European call option expiring at T is obtained. Among other results it is shown for \"calm\" prices, like the log-normal, that i) C is the Black-Scholes-Merton price thus confirming its validity for various stock prices, ii) the buyer 's price carries an exponentially increasing volatility premium and its difference with C provides a measure of the market risk premium.", "edit_actions": [{"type": "R", "before": "Stock prices", "after": "The price of a stock", "start_char_pos": 0, "end_char_pos": 12}, {"type": "D", "before": "but, when stock's transaction times are dense in the interval", "after": null, "start_char_pos": 50, "end_char_pos": 111}, {"type": "R", "before": "t_0,T), they determine", "after": "and a curious investor or a Regulatory Authority may wish to obtain a probability model the prices support. A", "start_char_pos": 112, "end_char_pos": 134}, {"type": "D", "before": "(-ies)", "after": null, "start_char_pos": 160, "end_char_pos": 166}, {"type": "A", "before": null, "after": "'s", "start_char_pos": 192, "end_char_pos": 192}, {"type": "R", "before": ". The remaining available risk neutral probabilities at T correspond to stock prices with different jumps-variability", "after": "is determined in closed form from the prices before T without assuming a price model", "start_char_pos": 209, "end_char_pos": 326}, {"type": "R", "before": "The necessary and suficient condition used", "after": "Under mild conditions on the prices the necessary and sufficient condition", "start_char_pos": 385, "end_char_pos": 427}, {"type": "D", "before": "related with the flow of information and concepts in Market Manipulation; it contributes in understanding", "after": null, "start_char_pos": 452, "end_char_pos": 557}, {"type": "A", "before": null, "after": "coincidence at T of the stock price ranges assumed by the stock's trader and buyer. This result clarifies the", "start_char_pos": 562, "end_char_pos": 562}, {"type": "A", "before": null, "after": "'s", "start_char_pos": 587, "end_char_pos": 587}, {"type": "A", "before": null, "after": "It also shows that in an incomplete market there are risk neutral probabilities not supported by each stock and their use can be limited.", "start_char_pos": 664, "end_char_pos": 664}, {"type": "R", "before": "also obtained. For", "after": "obtained. Among other results it is shown for", "start_char_pos": 738, "end_char_pos": 756}, {"type": "R", "before": "stock prices, C coincides with", "after": "prices, like the log-normal, that i) C is", "start_char_pos": 764, "end_char_pos": 794}, {"type": "R", "before": "and confirms its universal validity without stock price modeling assumptions. Additional results for calm stock : a) show that volatility's role is fundamental in the call's transaction, b) clarify the behaviors of the trader and the call's buyerand c) confirm quantitatively that the buyer", "after": "thus confirming its validity for various stock prices, ii) the buyer", "start_char_pos": 826, "end_char_pos": 1116}, {"type": "A", "before": null, "after": "premium and its difference with C provides a measure of the market risk", "start_char_pos": 1173, "end_char_pos": 1173}], "sents_char_pos": [0, 328, 384, 525, 663, 752, 903]}
+{"doc_id": "1502.03455", "revision_depth": "1", "before_revision": "Software-defined networking (SDN) enables network and data center (DC) providers with a flexible management of networking resources . SDN is also an appropriate solution for network virtualization since in this way each network component can be placed in a software container . In this paper, we address some of the existing issues with the classic DC network topologies to be used in virtualized environment, and then investigate a group of DC network topologies with the capability of providing dynamic structures according to the service-level required depending on the active traffic in a virtual DC network. In particular, we propose three main approaches to modify the structure of a classic BCube topology used as a benchmark. The associated structural features and maximum achievable interconnected bandwidth of these modifications is studied for various routing scenarios. Finally, we run an extensive simulation program to check the performance of the proposed modified topologies in a simulation environment which considers failure of components and also traffic congestion. Our simulation experiments show the efficiency of the proposed modified topologies compared to the classic BCube in terms of the available bandwidth and failure resiliency , as expected .", "after_revision": "Network virtualization enables computing networks and data center (DC) providers to manage their networking resources in a flexible manner using software running on physical computers . In this paper, we address the existing issues with the classic DC network topologies in virtualized environment, and investigate a set of DC network topologies with the capability of providing dynamic structures according to the service-level required by the active traffic in a virtual DC network. In particular, we propose three main approaches to modify the structure of a classic BCube topology as a topology benchmark, and investigate their associated structural features and maximum achievable interconnected bandwidth for different routing scenarios. Finally, we run an extensive simulation program to check the performance of the proposed modified topologies in a simulation environment which considers failure analysis and also traffic congestion. Our simulation experiments , which are consistent to our design goals, show the efficiency of the proposed modified topologies comparing to the classic BCube in terms of bandwidth availability and failure resiliency .", "edit_actions": [{"type": "R", "before": "Software-defined networking (SDN) enables network", "after": "Network virtualization enables computing networks", "start_char_pos": 0, "end_char_pos": 49}, {"type": "R", "before": "with a flexible management of networking resources . SDN is also an appropriate solution for network virtualization since in this way each network component can be placed in a software container", "after": "to manage their networking resources in a flexible manner using software running on physical computers", "start_char_pos": 81, "end_char_pos": 275}, {"type": "D", "before": "some of", "after": null, "start_char_pos": 304, "end_char_pos": 311}, {"type": "D", "before": "to be used", "after": null, "start_char_pos": 371, "end_char_pos": 381}, {"type": "R", "before": "then investigate a group", "after": "investigate a set", "start_char_pos": 414, "end_char_pos": 438}, {"type": "R", "before": "depending on", "after": "by", "start_char_pos": 556, "end_char_pos": 568}, {"type": "R", "before": "used as a benchmark. The", "after": "as a topology benchmark, and investigate their", "start_char_pos": 713, "end_char_pos": 737}, {"type": "R", "before": "of these modifications is studied for various", "after": "for different", "start_char_pos": 817, "end_char_pos": 862}, {"type": "R", "before": "of components", "after": "analysis", "start_char_pos": 1043, "end_char_pos": 1056}, {"type": "A", "before": null, "after": ", which are consistent to our design goals,", "start_char_pos": 1113, "end_char_pos": 1113}, {"type": "R", "before": "compared", "after": "comparing", "start_char_pos": 1170, "end_char_pos": 1178}, {"type": "R", "before": "the available bandwidth", "after": "bandwidth availability", "start_char_pos": 1212, "end_char_pos": 1235}, {"type": "D", "before": ", as expected", "after": null, "start_char_pos": 1259, "end_char_pos": 1272}], "sents_char_pos": [0, 277, 612, 733, 881, 1085]}
+{"doc_id": "1503.00529", "revision_depth": "1", "before_revision": "Populations of species in ecosystems are constrained by the availability of resources within their environment. In effect this means that a growth of one population, needs to be balanced by the reduction in size of others. In neutral models of biodiversity all populations are assumed to change incrementally due to stochastic births and deaths of individuals. Here we propose and model another redistribution mechanism driven by abrupt collapses of the entire population of a single species freeing up resources for the remaining ones. This mechanism may be relevant for communities of bacteria, with strain-specific collapses caused e.g. by invading bacteriophages, or for other ecosystems where infectious diseases play an important role. The emergent property of the population dynamics in our system are cyclic \"diversity waves\" triggered by collapses of globally dominating populations. The population diversity in the environment peaks at the beginning of each wave and exponentially decreases afterwards. Population sizes in our system follow a bimodal distribution with the lower peak composed of the recently collapsed or the newly arrived species. In contrast to this, the upper peak of the distribution consists of the surviving species in the current diversity wave. The populations of the most abundant species in the upper peak exhibit a scale-free distribution with a nearly universal exponent of about 1.7. We show that our model is robust with respect to variations in dynamical rules including gradual redistribution of populations between subsequent collapses and variation in species' growth or collapse rates .", "after_revision": "Populations of species in ecosystems are often constrained by availability of resources within their environment. In effect this means that a growth of one population, needs to be balanced by comparable reduction in populations of others. In neutral models of biodiversity all populations are assumed to change incrementally due to stochastic births and deaths of individuals. Here we propose and model another redistribution mechanism driven by abrupt and severe collapses of the entire population of a single species freeing up resources for the remaining ones. This mechanism may be relevant e.g. for communities of bacteria, with strain-specific collapses caused e.g. by invading bacteriophages, or for other ecosystems where infectious diseases play an important role. The emergent dynamics of our system is cyclic \"diversity waves\" triggered by collapses of globally dominating populations. The population diversity peaks at the beginning of each wave and exponentially decreases afterwards. Species abundances are characterized by a bimodal time-aggregated distribution with the lower peak formed by populations of recently collapsed or newly introduced species, while the upper peak - species that has not yet collapsed in the current wave. In most waves both upper and lower peaks are composed of several smaller peaks. This URLanized hierarchical peak structure has a long-term memory transmitted across several waves. It gives rise to a scale-free tail of the time-aggregated population distribution with a universal exponent of 1.7. We show that diversity wave dynamics is robust with respect to variations in the rules of our model such as diffusion between multiple environments, species-specific growth and extinction rates, and bet-hedging strategies .", "edit_actions": [{"type": "R", "before": "constrained by the", "after": "often constrained by", "start_char_pos": 41, "end_char_pos": 59}, {"type": "R", "before": "the reduction in size", "after": "comparable reduction in populations", "start_char_pos": 190, "end_char_pos": 211}, {"type": "A", "before": null, "after": "and severe", "start_char_pos": 437, "end_char_pos": 437}, {"type": "A", "before": null, "after": "e.g.", "start_char_pos": 569, "end_char_pos": 569}, {"type": "R", "before": "property of the population dynamics in our system are", "after": "dynamics of our system is", "start_char_pos": 757, "end_char_pos": 810}, {"type": "D", "before": "in the environment", "after": null, "start_char_pos": 920, "end_char_pos": 938}, {"type": "R", "before": "Population sizes in our system follow a bimodal", "after": "Species abundances are characterized by a bimodal time-aggregated", "start_char_pos": 1015, "end_char_pos": 1062}, {"type": "R", "before": "composed of the", "after": "formed by populations of", "start_char_pos": 1096, "end_char_pos": 1111}, {"type": "R", "before": "the newly arrived species. In contrast to this,", "after": "newly introduced species, while", "start_char_pos": 1134, "end_char_pos": 1181}, {"type": "R", "before": "of the distribution consists of the surviving species", "after": "- species that has not yet collapsed", "start_char_pos": 1197, "end_char_pos": 1250}, {"type": "R", "before": "diversity wave. The populations of the most abundant species in the upper peak exhibit a", "after": "wave. In most waves both upper and lower peaks are composed of several smaller peaks. This URLanized hierarchical peak structure has a long-term memory transmitted across several waves. It gives rise to a", "start_char_pos": 1266, "end_char_pos": 1354}, {"type": "A", "before": null, "after": "tail of the time-aggregated population", "start_char_pos": 1366, "end_char_pos": 1366}, {"type": "D", "before": "nearly", "after": null, "start_char_pos": 1387, "end_char_pos": 1393}, {"type": "D", "before": "about", "after": null, "start_char_pos": 1416, "end_char_pos": 1421}, {"type": "R", "before": "our model", "after": "diversity wave dynamics", "start_char_pos": 1440, "end_char_pos": 1449}, {"type": "R", "before": "dynamical rules including gradual redistribution of populations between subsequent collapses and variation in species' growth or collapse rates", "after": "the rules of our model such as diffusion between multiple environments, species-specific growth and extinction rates, and bet-hedging strategies", "start_char_pos": 1490, "end_char_pos": 1633}], "sents_char_pos": [0, 111, 222, 360, 537, 743, 894, 1014, 1160, 1281, 1426]}
+{"doc_id": "1503.08809", "revision_depth": "1", "before_revision": "We study the optimisation and porting of the \"Modal\" code on Intel(R) Xeon(R) processors and /or Intel(R) Xeon Phi(TM) coprocessors using methods which should be applicable to more general compute bound codes. \"Modal\" is used by the Planck satellite experiment for constraining general non-Gaussian models of the early universe via the bispectrum of the cosmic microwave background . We focus on the hot-spot of the code which is the projection of bispectra from the end of inflation to spherical shell at decoupling which defines the CMB we observe . This code involves a three-dimensional inner product between two functions, one of which requires an integral, on a non-rectangular sparse domain . We show that by employing separable methods this calculation can be reduced to a one dimensional summation plus two integrations reducing the dimensionality from four to three. The introduction of separable functions also solves the issue of the domain allowing efficient vectorisation and load balancing. This method becomes unstable in certain cases and so we present a discussion of the optimisation of both approaches. By making bispectrum calculations competitive with those for the power spectrum we are now able to consider joint analysis for cosmological science exploitation of new data. We demonstrate speed-ups of over 100x, arising from a combination of algorithmic improvements and architecture-aware optimizations targeted at improving thread and vectorization behaviour. The resulting MPI/OpenMP code is capable of executing on clusters containing Intel(R) Xeon(R) processors and/or Intel(R) Xeon Phi(TM) coprocessors, with strong-scaling efficiency of 98.6\\% on up to 16 nodes. We find that a single coprocessor outperforms two processor sockets by a factor of 1.3x and that running the same code across a combination of processors and coprocessors improves performance-per-node by a factor of 3.38x .", "after_revision": "We present a case study describing efforts to optimise and modernise \"Modal\" , the simulation and analysis pipeline used by the Planck satellite experiment for constraining general non-Gaussian models of the early universe via the bispectrum (or three-point correlator) of the cosmic microwave background radiation . We focus on one particular element of the code : the projection of bispectra from the end of inflation to the spherical shell at decoupling , which defines the CMB we observe today . This code involves a three-dimensional inner product between two functions, one of which requires an integral, on a non-rectangular domain containing a sparse grid . We show that by employing separable methods this calculation can be reduced to a one-dimensional summation plus two integrations , reducing the overall dimensionality from four to three. The introduction of separable functions also solves the issue of the non-rectangular sparse grid. This separable method can become unstable in certain cases and so the slower non-separable integral must be calculated instead. We present a discussion of the optimisation of both approaches. We show significant speed-ups of ~ 100x, arising from a combination of algorithmic improvements and architecture-aware optimisations targeted at improving thread and vectorisation behaviour. The resulting MPI/OpenMP hybrid code is capable of executing on clusters containing processors and/or coprocessors, with strong-scaling efficiency of 98.6\\% on up to 16 nodes. We find that a single coprocessor outperforms two processor sockets by a factor of 1.3x and that running the same code across a combination of both microarchitectures improves performance-per-node by a factor of 3.38x . By making bispectrum calculations competitive with those for the power spectrum (or two-point correlator) we are now able to consider joint analysis for cosmological science exploitation of new data .", "edit_actions": [{"type": "R", "before": "study the optimisation and porting of the", "after": "present a case study describing efforts to optimise and modernise", "start_char_pos": 3, "end_char_pos": 44}, {"type": "R", "before": "code on Intel(R) Xeon(R) processors and /or Intel(R) Xeon Phi(TM) coprocessors using methods which should be applicable to more general compute bound codes. \"Modal\" is", "after": ", the simulation and analysis pipeline", "start_char_pos": 53, "end_char_pos": 220}, {"type": "A", "before": null, "after": "(or three-point correlator)", "start_char_pos": 347, "end_char_pos": 347}, {"type": "A", "before": null, "after": "radiation", "start_char_pos": 383, "end_char_pos": 383}, {"type": "R", "before": "the hot-spot", "after": "one particular element", "start_char_pos": 398, "end_char_pos": 410}, {"type": "R", "before": "which is", "after": ":", "start_char_pos": 423, "end_char_pos": 431}, {"type": "A", "before": null, "after": "the", "start_char_pos": 489, "end_char_pos": 489}, {"type": "A", "before": null, "after": ",", "start_char_pos": 520, "end_char_pos": 520}, {"type": "A", "before": null, "after": "today", "start_char_pos": 554, "end_char_pos": 554}, {"type": "R", "before": "sparse domain", "after": "domain containing a sparse grid", "start_char_pos": 689, "end_char_pos": 702}, {"type": "R", "before": "one dimensional", "after": "one-dimensional", "start_char_pos": 786, "end_char_pos": 801}, {"type": "R", "before": "reducing the", "after": ", reducing the overall", "start_char_pos": 834, "end_char_pos": 846}, {"type": "R", "before": "domain allowing efficient vectorisation and load balancing. This method becomes", "after": "non-rectangular sparse grid. This separable method can become", "start_char_pos": 951, "end_char_pos": 1030}, {"type": "R", "before": "we", "after": "the slower non-separable integral must be calculated instead. We", "start_char_pos": 1064, "end_char_pos": 1066}, {"type": "R", "before": "By making bispectrum calculations competitive with those for the power spectrum we are now able to consider joint analysis for cosmological science exploitation of new data. We demonstrate", "after": "We show significant", "start_char_pos": 1128, "end_char_pos": 1316}, {"type": "R", "before": "over", "after": "~", "start_char_pos": 1330, "end_char_pos": 1334}, {"type": "R", "before": "optimizations", "after": "optimisations", "start_char_pos": 1419, "end_char_pos": 1432}, {"type": "R", "before": "vectorization", "after": "vectorisation", "start_char_pos": 1466, "end_char_pos": 1479}, {"type": "A", "before": null, "after": "hybrid", "start_char_pos": 1516, "end_char_pos": 1516}, {"type": "D", "before": "Intel(R) Xeon(R)", "after": null, "start_char_pos": 1569, "end_char_pos": 1585}, {"type": "D", "before": "Intel(R) Xeon Phi(TM)", "after": null, "start_char_pos": 1604, "end_char_pos": 1625}, {"type": "R", "before": "processors and coprocessors", "after": "both microarchitectures", "start_char_pos": 1843, "end_char_pos": 1870}, {"type": "A", "before": null, "after": ". By making bispectrum calculations competitive with those for the power spectrum (or two-point correlator) we are now able to consider joint analysis for cosmological science exploitation of new data", "start_char_pos": 1922, "end_char_pos": 1922}], "sents_char_pos": [0, 209, 385, 556, 704, 881, 1010, 1127, 1301, 1490, 1699]}
+{"doc_id": "1504.04433", "revision_depth": "1", "before_revision": "As an important information for traffic condition evaluation, trip planning, transportation management, etc., average travel speed for a road means the average speed of vehicles travelling through this road in a given time duration. Traditional ways for collecting travel-speed oriented traffic data are always infrastructure-based and therefore financial costly (for example, cameras and loop detectors) . Differently, vehicular crowdsensing as an infrastructure-free way, can be used to collect data including real-time locations and velocities of vehicles for road travel speed estimation, which is a quite low-cost way. However, vehicular crowdsensing data is always coarse-grained. This coarseness can lead to the incompleteness of travel speed estimation . Aiming to handle the incompleteness problem as well as estimate travel speed accurately, in this paper, we propose an approach named STC in which spatial-temporal correlation among travel speeds of roads is leveraged. More specifically, in STC, we use cross correlation function to quantize the correlation among roads. Noticing the directional patterns of traffic feature diffusion , we novelly make the determination of the time lagging factor in cross correlation calculation self-adaptive by using vehicle tracking . Then, utilizing the local stationarity of cross correlation, we further reduce the problem of single-road travel speed vacancy completion to a minimization problem. Finally, we fill all the vacancies of travel speed for roads in a recursive way using the geomet-rical structure of road net. Elaborate experiments based on real taxi trace data show that STC can commendably settle the incompleteness problem of vehicle crowdsensing data based travel speed estimation and ensure the accuracy of estimated travel speed , in comparison with representative existing methods .", "after_revision": "As an important information for traffic condition evaluation, trip planning, transportation management, etc., average travel speed for a road means the average speed of vehicles travelling through this road in a given time duration. Traditional ways for collecting travel-speed oriented traffic data always depend on dedicated sensors and supporting infrastructures, and are therefore financial costly . Differently, vehicular crowdsensing as an infrastructure-free way, can be used to collect data including real-time locations and velocities of vehicles for road travel speed estimation, which is a quite low-cost way. However, vehicular crowdsensing data is always coarse-grained. This coarseness can lead to the incompleteness of travel speeds . Aiming to handle this problem as well as estimate travel speed accurately, in this paper, we propose an approach named STC that exploits the spatial-temporal correlation among travel speeds for roads by introducing the time-lagged cross correlation function . The time lagging factor describes the time consumption of traffic feature diffusion along roads. To properly calculate cross correlation , we novelly make the determination of the time lagging factor self-adaptive by recording the locations of vehicles at different roads . Then, utilizing the local stationarity of cross correlation, we further reduce the problem of single-road travel speed vacancy completion to a minimization problem. Finally, we fill all the vacancies of travel speed for roads in a recursive way using the geometric structure of road net. Elaborate experiments based on real taxi trace data show that STC can settle the incompleteness problem of vehicle crowdsensing data based travel speed estimation and ensure the accuracy of estimated travel speed better , in comparison with representative existing methods such as KNN, Kriging and ARIMA .", "edit_actions": [{"type": "R", "before": "are always infrastructure-based and", "after": "always depend on dedicated sensors and supporting infrastructures, and are", "start_char_pos": 300, "end_char_pos": 335}, {"type": "D", "before": "(for example, cameras and loop detectors)", "after": null, "start_char_pos": 363, "end_char_pos": 404}, {"type": "R", "before": "speed estimation", "after": "speeds", "start_char_pos": 744, "end_char_pos": 760}, {"type": "R", "before": "the incompleteness", "after": "this", "start_char_pos": 780, "end_char_pos": 798}, {"type": "R", "before": "in which", "after": "that exploits the", "start_char_pos": 900, "end_char_pos": 908}, {"type": "R", "before": "of roads is leveraged. More specifically, in STC, we use", "after": "for roads by introducing the time-lagged", "start_char_pos": 958, "end_char_pos": 1014}, {"type": "R", "before": "to quantize the correlation among roads. Noticing the directional patterns", "after": ". The time lagging factor describes the time consumption", "start_char_pos": 1042, "end_char_pos": 1116}, {"type": "A", "before": null, "after": "along roads. To properly calculate cross correlation", "start_char_pos": 1146, "end_char_pos": 1146}, {"type": "D", "before": "in cross correlation calculation", "after": null, "start_char_pos": 1210, "end_char_pos": 1242}, {"type": "R", "before": "using vehicle tracking", "after": "recording the locations of vehicles at different roads", "start_char_pos": 1260, "end_char_pos": 1282}, {"type": "R", "before": "geomet-rical", "after": "geometric", "start_char_pos": 1540, "end_char_pos": 1552}, {"type": "D", "before": "commendably", "after": null, "start_char_pos": 1646, "end_char_pos": 1657}, {"type": "A", "before": null, "after": "better", "start_char_pos": 1801, "end_char_pos": 1801}, {"type": "A", "before": null, "after": "such as KNN, Kriging and ARIMA", "start_char_pos": 1855, "end_char_pos": 1855}], "sents_char_pos": [0, 232, 406, 623, 686, 762, 980, 1082, 1284, 1449, 1575]}
+{"doc_id": "1504.06249", "revision_depth": "1", "before_revision": "Network biology approaches have over the last decade proven to be very useful for the integration and generation of functional hypothesis by providing a context for specific molecular components and processes. Recent experimental and computational techniques yield networksof increased size and sophistication. The study of these complex cellular networks is emerging as a new challenge in biology. A number of dimensionality reduction techniques for graphs have been developed to cope with complexity of networks . However, it is yet not clear to what extent information is lost or preserved when these techniques are applied to reduce the complexity of large networks . Here we therefore develop a rigorous framework, based on algorithmic information theory, to quantify the capability to preserve information when network motif analysis, graph spectra and sparsification methods respectively, are applied to over twenty different well-established networks. We find that the sparsification method is highly sensitive to deletion of edges leading to significant inconsistencies with respect to the loss of information and that graph spectral methods were the most irregular measure only capturing algebraic information in a condensed fashion but in that process largely lost the information content of the original networks. Our algorithmic information methodology therefore provides a rigorous framework enabling fundamental assessment and comparison between different methods for reducing the complexity of networks while preserving key structures in the networks thereby facilitating the identification of such core processes .", "after_revision": "To cope with the complexity of large networks, a number of dimensionality reduction techniques for graphs have been developed . However, the extent to which information is lost or preserved when these techniques are employed has not yet been clear . Here we develop a framework, based on algorithmic information theory, to quantify the extent to which information is preserved when network motif analysis, graph spectra and spectral sparsification methods are applied to over twenty different biological and artificial networks. We find that the spectral sparsification is highly sensitive to high number of edge deletion, leading to significant inconsistencies , and that graph spectral methods are the most irregular , capturing algebraic information in a condensed fashion but largely losing most of the information content of the original networks. However, the approach shows that network motif analysis excels at preserving the relative algorithmic information content of a network, hence validating and generalizing the remarkable fact that despite their inherent combinatorial possibilities, local regularities preserve information to such an extent that essential properties are fully recoverable across different networks to determine their family group to which they belong to (eg genetic vs social network). Our algorithmic information methodology thus provides a rigorous framework enabling a fundamental assessment and comparison between different data dimensionality reduction methods thereby facilitating the identification and evaluation of the capabilities of old and new methods .", "edit_actions": [{"type": "R", "before": "Network biology approaches have over the last decade proven to be very useful for the integration and generation of functional hypothesis by providing a context for specific molecular components and processes. Recent experimental and computational techniques yield networksof increased size and sophistication. The study of these complex cellular networks is emerging as a new challenge in biology. A", "after": "To cope with the complexity of large networks, a", "start_char_pos": 0, "end_char_pos": 400}, {"type": "D", "before": "to cope with complexity of networks", "after": null, "start_char_pos": 478, "end_char_pos": 513}, {"type": "R", "before": "it is yet not clear to what extent", "after": "the extent to which", "start_char_pos": 525, "end_char_pos": 559}, {"type": "R", "before": "applied to reduce the complexity of large networks", "after": "employed has not yet been clear", "start_char_pos": 619, "end_char_pos": 669}, {"type": "R", "before": "therefore develop a rigorous", "after": "develop a", "start_char_pos": 680, "end_char_pos": 708}, {"type": "R", "before": "capability to preserve information", "after": "extent to which information is preserved", "start_char_pos": 777, "end_char_pos": 811}, {"type": "R", "before": "sparsification methods respectively,", "after": "spectral sparsification methods", "start_char_pos": 859, "end_char_pos": 895}, {"type": "R", "before": "well-established", "after": "biological and artificial", "start_char_pos": 933, "end_char_pos": 949}, {"type": "R", "before": "sparsification method", "after": "spectral sparsification", "start_char_pos": 977, "end_char_pos": 998}, {"type": "R", "before": "deletion of edges", "after": "high number of edge deletion,", "start_char_pos": 1022, "end_char_pos": 1039}, {"type": "R", "before": "with respect to the loss of information", "after": ",", "start_char_pos": 1079, "end_char_pos": 1118}, {"type": "R", "before": "were", "after": "are", "start_char_pos": 1151, "end_char_pos": 1155}, {"type": "R", "before": "measure only", "after": ",", "start_char_pos": 1175, "end_char_pos": 1187}, {"type": "R", "before": "in that process largely lost", "after": "largely losing most of", "start_char_pos": 1247, "end_char_pos": 1275}, {"type": "A", "before": null, "after": "However, the approach shows that network motif analysis excels at preserving the relative algorithmic information content of a network, hence validating and generalizing the remarkable fact that despite their inherent combinatorial possibilities, local regularities preserve information to such an extent that essential properties are fully recoverable across different networks to determine their family group to which they belong to (eg genetic vs social network).", "start_char_pos": 1326, "end_char_pos": 1326}, {"type": "R", "before": "therefore", "after": "thus", "start_char_pos": 1367, "end_char_pos": 1376}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1416, "end_char_pos": 1416}, {"type": "R", "before": "methods for reducing the complexity of networks while preserving key structures in the networks", "after": "data dimensionality reduction methods", "start_char_pos": 1473, "end_char_pos": 1568}, {"type": "R", "before": "of such core processes", "after": "and evaluation of the capabilities of old and new methods", "start_char_pos": 1609, "end_char_pos": 1631}], "sents_char_pos": [0, 209, 310, 398, 515, 671, 959, 1325]}
+{"doc_id": "1507.00150", "revision_depth": "1", "before_revision": "Ligand diffusion through a protein interior is a fundamental process governing biological signaling and enzymatic catalysis. A complex topology of channels in proteins leads often to difficulties in modeling ligand escape pathways by classical molecular dynamics simulations. In this paper two novel memetic methods for searching the exit paths and cavity space exploration are proposed: Memory Enhanced Random Acceleration (MERA)Molecular Dynamics and Immune Algorithm (IA ). In MERA, a pheromone concept is introduced to optimize an expulsion force. In IA , hybrid learning protocols are exploited to predict ligand exit paths. They are tested on three protein channels with increasing complexity : M2 muscarinic GPCR receptor, enzyme nitrile hydrataseand heme-protein cytochrome P450cam. In these cases, the memetic methods outperform Simulated Annealing and Random Acceleration Molecular Dynamics . The proposed algorithms are general and appropriate in all problems where an accelerated transport of an object through a network of channels is studied .", "after_revision": "Ligand diffusion through proteins is a fundamental process governing biological signaling and enzymatic catalysis. The complex topology of protein tunnels results in difficulties with computing ligand escape pathways by standard molecular dynamics (MD) simulations. Here, two novel methods for searching of ligand exit pathways and cavity exploration are proposed: memory random acceleration MD (mRAMD), and memetic algorithms (MA ). In mRAMD, finding exit pathways is based on a non-Markovian biasing that is introduced to optimize the unbinding force. In MA , hybrid learning protocols are exploited to predict optimal ligand exit paths. The methods are tested on three proteins with increasing complexity of tunnels : M2 muscarinic receptor, nitrile hydratase, and cytochrome P450cam. In these cases, the proposed methods outperform standard techniques that are used currently to find ligand egress pathways . The proposed approach is general and appropriate for accelerated transport of an object through a network of protein tunnels .", "edit_actions": [{"type": "R", "before": "a protein interior", "after": "proteins", "start_char_pos": 25, "end_char_pos": 43}, {"type": "R", "before": "A", "after": "The", "start_char_pos": 125, "end_char_pos": 126}, {"type": "R", "before": "channels in proteins leads often to difficulties in modeling", "after": "protein tunnels results in difficulties with computing", "start_char_pos": 147, "end_char_pos": 207}, {"type": "R", "before": "classical molecular dynamics simulations. In this paper two novel memetic", "after": "standard molecular dynamics (MD) simulations. Here, two novel", "start_char_pos": 234, "end_char_pos": 307}, {"type": "R", "before": "the exit paths and cavity space", "after": "of ligand exit pathways and cavity", "start_char_pos": 330, "end_char_pos": 361}, {"type": "R", "before": "Memory Enhanced Random Acceleration (MERA)Molecular Dynamics and Immune Algorithm (IA", "after": "memory random acceleration MD (mRAMD), and memetic algorithms (MA", "start_char_pos": 388, "end_char_pos": 473}, {"type": "R", "before": "MERA, a pheromone concept", "after": "mRAMD, finding exit pathways is based on a non-Markovian biasing that", "start_char_pos": 480, "end_char_pos": 505}, {"type": "R", "before": "an expulsion", "after": "the unbinding", "start_char_pos": 532, "end_char_pos": 544}, {"type": "R", "before": "IA", "after": "MA", "start_char_pos": 555, "end_char_pos": 557}, {"type": "A", "before": null, "after": "optimal", "start_char_pos": 611, "end_char_pos": 611}, {"type": "R", "before": "They", "after": "The methods", "start_char_pos": 631, "end_char_pos": 635}, {"type": "R", "before": "protein channels", "after": "proteins", "start_char_pos": 656, "end_char_pos": 672}, {"type": "A", "before": null, "after": "of tunnels", "start_char_pos": 700, "end_char_pos": 700}, {"type": "R", "before": "GPCR receptor, enzyme nitrile hydrataseand heme-protein", "after": "receptor, nitrile hydratase, and", "start_char_pos": 717, "end_char_pos": 772}, {"type": "R", "before": "memetic methods outperform Simulated Annealing and Random Acceleration Molecular Dynamics", "after": "proposed methods outperform standard techniques that are used currently to find ligand egress pathways", "start_char_pos": 813, "end_char_pos": 902}, {"type": "R", "before": "algorithms are", "after": "approach is", "start_char_pos": 918, "end_char_pos": 932}, {"type": "R", "before": "in all problems where an", "after": "for", "start_char_pos": 957, "end_char_pos": 981}, {"type": "R", "before": "channels is studied", "after": "protein tunnels", "start_char_pos": 1038, "end_char_pos": 1057}], "sents_char_pos": [0, 124, 275, 476, 551, 630, 792, 904]}
+{"doc_id": "1507.08415", "revision_depth": "1", "before_revision": "We propose a new multiplex-based strategy to integrate different layers of genomic information and use them in a coordinate way to identify driving cancer genes. The multiplex networks that we consider combine transcription factor co-targeting, microRNA co-targeting, protein-protein interaction and gene co-expression networks. The rationale behind this choice is that gene coexpression and protein-protein interactions require a tight coregulation of the partners and that such a fine tuned regulation can be obtained only combining both the transcriptional and post-transcriptional layers of regulation. . To extract the relevant biological information from the multiplex we studied its partition into communities. To this end we applied a consensus clustering algorithm to the single-layer partitions obtained using state of art community detection methods , combined with a filtering preprocessing of the individual networks . Even if our procedure is valid in principle for any pathology in this work we concentrate in particular on the gastric, lung, pancreas and colorectal cancer and identified from the enrichment analysis of the multiplex communities a set of candidate driver cancer genes. Some of them were already known oncogenes while a few are new and represent the major result of our analysis . The combination of the different layers of information allowed us to extract from the multiplex indications on the regulatory pattern and the functional role of both the already known oncogenes and the new candidate driver genes.", "after_revision": "We propose a new multi-network-based strategy to integrate different layers of genomic information and use them in a coordinate way to identify driving cancer genes. The multi-networks that we consider combine transcription factor co-targeting, microRNA co-targeting, protein-protein interaction and gene co-expression networks. The rationale behind this choice is that gene co-expression and protein-protein interactions require a tight coregulation of the partners and that such a fine tuned regulation can be obtained only combining both the transcriptional and post-transcriptional layers of regulation. To extract the relevant biological information from the multi-network we studied its partition into communities. To this end we applied a consensus clustering algorithm based on state of art community detection methods . Even if our procedure is valid in principle for any pathology in this work we concentrate on gastric, lung, pancreas and colorectal cancer and identified from the enrichment analysis of the multi-network communities a set of candidate driver cancer genes. Some of them were already known oncogenes while a few are new . The combination of the different layers of information allowed us to extract from the multi-network indications on the regulatory pattern and functional role of both the already known and the new candidate driver genes.", "edit_actions": [{"type": "R", "before": "multiplex-based", "after": "multi-network-based", "start_char_pos": 17, "end_char_pos": 32}, {"type": "R", "before": "multiplex networks", "after": "multi-networks", "start_char_pos": 166, "end_char_pos": 184}, {"type": "R", "before": "coexpression", "after": "co-expression", "start_char_pos": 375, "end_char_pos": 387}, {"type": "D", "before": ".", "after": null, "start_char_pos": 607, "end_char_pos": 608}, {"type": "R", "before": "multiplex", "after": "multi-network", "start_char_pos": 665, "end_char_pos": 674}, {"type": "R", "before": "to the single-layer partitions obtained using", "after": "based on", "start_char_pos": 774, "end_char_pos": 819}, {"type": "D", "before": ", combined with a filtering preprocessing of the individual networks", "after": null, "start_char_pos": 861, "end_char_pos": 929}, {"type": "R", "before": "in particular on the", "after": "on", "start_char_pos": 1022, "end_char_pos": 1042}, {"type": "R", "before": "multiplex", "after": "multi-network", "start_char_pos": 1140, "end_char_pos": 1149}, {"type": "D", "before": "and represent the major result of our analysis", "after": null, "start_char_pos": 1264, "end_char_pos": 1310}, {"type": "R", "before": "multiplex", "after": "multi-network", "start_char_pos": 1399, "end_char_pos": 1408}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1451, "end_char_pos": 1454}, {"type": "D", "before": "oncogenes", "after": null, "start_char_pos": 1497, "end_char_pos": 1506}], "sents_char_pos": [0, 161, 328, 717, 931, 1201, 1312]}
+{"doc_id": "1510.03272", "revision_depth": "1", "before_revision": "In a great many of the contexts in which groups of cilia or flagella are found they exhibit synchronized behavior . This includes phase-locking , as seen in Chlamydomonas flagella {\\it , and metachronal wave formation in the ciliary arrays of Paramecium or in the respiratory cilia of URLanisms. Since the observations by Gray and Rothschild of phase synchrony of nearby swimming spermatozoa, it has been a working hypothesis that synchrony arises from hydrodynamic interactions between beating filaments. Recent work on the dynamics of physically separated pairs of flagella isolated from the multicellular alga Volvox {\\it has shown that hydrodynamic coupling alone is sufficient to produce synchrony. Moreover, when the flagellar power strokes are oriented in the same direction they synchronize in-phase, but when opposed they synchronize in antiphase. The situation is more complex when considering multiple flagellaon a single cell. Specifically, the unicellular biflagellate Chlamydomonasswims with opposing power strokes, yet synchronizes in phase in the familiar breaststroke. This indicates{\\it that a mechanism, internal to the cell, provides an additional flagellar coupling. Here we show that in comparison to the wildtype, markedly different synchronization states are found in Chlamydomonas mutants deficient in filamentary connections between basal bodies. Quantitative studies of complex flagellar coordination strategies found in quadri-, octo- and hexadecaflagellates reveal further evidence that intracellular couplings between flagellar basal bodies compete with hydrodynamic interactions to determine the precise form of flagellar synchronization in unicellular algae.", "after_revision": "Cilia and flagella often exhibit synchronized behavior ; this includes phase locking , as seen in {\\it Chlamydomonas , and metachronal wave formation in the respiratory cilia of URLanisms. Since the observations by Gray and Rothschild of phase synchrony of nearby swimming spermatozoa, it has been a working hypothesis that synchrony arises from hydrodynamic interactions between beating filaments. Recent work on the dynamics of physically separated pairs of flagella isolated from the multicellular alga {\\it Volvox has shown that hydrodynamic coupling alone is sufficient to produce synchrony. However, the situation is more complex in URLanisms bearing few flagella. We show that flagella of{\\it Chlamydomonas mutants deficient in filamentary connections between basal bodies display markedly different synchronization from the wild type. We perform micromanipulation on configurations of flagella and conclude that a mechanism, internal to the cell, must provide an additional flagellar coupling. In naturally occurring species with 4, 8, or even 16 flagella, we find diverse symmetries of basal body positioning and of the flagellar apparatus that are coincident with specific gaits of flagellar actuation, suggesting that it is a competition between intracellular coupling and hydrodynamic interactions that ultimately determines the precise form of flagellar coordination in unicellular algae.", "edit_actions": [{"type": "R", "before": "In a great many of the contexts in which groups of cilia or flagella are found they", "after": "Cilia and flagella often", "start_char_pos": 0, "end_char_pos": 83}, {"type": "R", "before": ". This includes phase-locking", "after": "; this includes phase locking", "start_char_pos": 114, "end_char_pos": 143}, {"type": "D", "before": "Chlamydomonas flagella", "after": null, "start_char_pos": 157, "end_char_pos": 179}, {"type": "A", "before": null, "after": "Chlamydomonas", "start_char_pos": 185, "end_char_pos": 185}, {"type": "D", "before": "ciliary arrays of Paramecium or in the", "after": null, "start_char_pos": 226, "end_char_pos": 264}, {"type": "D", "before": "Volvox", "after": null, "start_char_pos": 614, "end_char_pos": 620}, {"type": "A", "before": null, "after": "Volvox", "start_char_pos": 626, "end_char_pos": 626}, {"type": "R", "before": "Moreover, when the flagellar power strokes are oriented in the same direction they synchronize in-phase, but when opposed they synchronize in antiphase. The", "after": "However, the", "start_char_pos": 706, "end_char_pos": 862}, {"type": "R", "before": "when considering multiple flagellaon a single cell. Specifically, the unicellular biflagellate Chlamydomonasswims with opposing power strokes, yet synchronizes in phase in the familiar breaststroke. This indicates", "after": "in URLanisms bearing few flagella. We show that flagella of", "start_char_pos": 889, "end_char_pos": 1102}, {"type": "A", "before": null, "after": "Chlamydomonas", "start_char_pos": 1107, "end_char_pos": 1107}, {"type": "A", "before": null, "after": "mutants deficient in filamentary connections between basal bodies display markedly different synchronization from the wild type. We perform micromanipulation on configurations of flagella and conclude", "start_char_pos": 1108, "end_char_pos": 1108}, {"type": "R", "before": "provides", "after": "must provide", "start_char_pos": 1149, "end_char_pos": 1157}, {"type": "R", "before": "Here we show that in comparison to the wildtype, markedly different synchronization states are found in Chlamydomonas mutants deficient in filamentary connections between basal bodies. Quantitative studies of complex flagellar coordination strategies found in quadri-, octo- and hexadecaflagellates reveal further evidence that intracellular couplings between flagellar basal bodies compete with hydrodynamic interactions to determine", "after": "In naturally occurring species with 4, 8, or even 16 flagella, we find diverse symmetries of basal body positioning and of the flagellar apparatus that are coincident with specific gaits of flagellar actuation, suggesting that it is a competition between intracellular coupling and hydrodynamic interactions that ultimately determines", "start_char_pos": 1192, "end_char_pos": 1626}, {"type": "R", "before": "synchronization", "after": "coordination", "start_char_pos": 1657, "end_char_pos": 1672}], "sents_char_pos": [0, 115, 296, 506, 705, 858, 940, 1087, 1191, 1376]}
+{"doc_id": "1510.05858", "revision_depth": "1", "before_revision": "In this paper we consider a market model where there are two levels of information , the public information generated by the financial assets and a larger flow of information that contains additional knowledge about a death time of an insured. By using the expansion of filtration, the death uncertainty and its entailed risk are fully considered without any mathematical restriction. In this context, which catches real features such as correlation between market model and time of death, we address the risk-minimisation problem for a large class of equity-linked mortality and/or mortality contracts. The stochastic innovation, that we propose herein, consists of singling out three classes of martingales in the large filtration. One of these classes is generated by a new process, up to our knowledge, that has nice features. The three orthogonal martingale classes are vital pillars for establishing our optional martingale representation theorem, when (local ) martingales of the large filtration are stopped at the death time . This constitutes our first main original contribution, while the second main contribution lies in describing, as explicit as possible, the optimal strategy when hedging mortalityrisks using the optional martingale representation .", "after_revision": "This paper considers a market model with two levels of information . The public information generated by the financial assets , and a larger flow of information containing additional knowledge about a death time (random time/horizon) of an insured. By expanding the filtration, the death uncertainty and its entailed risk are fully considered without any mathematical restriction. In this context, which catches real features such as correlation between the market model and the time of death, we address the risk-minimization problem \\`a la F\\\"ollmer-Sondermann for a large class of equity-linked mortality contracts. The challenge in this setting, when no model specification for these securities nor for the death time is given, lies in finding the dynamics and the structures for the mortality/longevity securities used in the securitization. To overcome this obstacle, we elaborate our optional martingale representation results, which state that any local martingale in the large filtration stopped at the death time can be decomposed into several and precise orthogonal local martingales . This constitutes our first principal novel contribution. Thanks to this optional representation, we succeed to decompose the risk in some popular mortality and/or longevity securities into the sum of orthogonal risks using a risk basis. One of the components of this basis is a new martingale, in the large filtration, that possesses nice features. Hence, the dynamics of mortality and longevity securities used in the securitization is described without mortality specification, and this constitutes our second novel contribution. Our third main contribution resides in finding explicitly the risk-minimization strategy as well as the corresponding undiversified risk for a largest class of mortality/longevity linked liabilities with or without the mortality securitization .", "edit_actions": [{"type": "R", "before": "In this paper we consider", "after": "This paper considers", "start_char_pos": 0, "end_char_pos": 25}, {"type": "R", "before": "where there are", "after": "with", "start_char_pos": 41, "end_char_pos": 56}, {"type": "R", "before": ", the", "after": ". The", "start_char_pos": 83, "end_char_pos": 88}, {"type": "A", "before": null, "after": ",", "start_char_pos": 142, "end_char_pos": 142}, {"type": "R", "before": "that contains", "after": "containing", "start_char_pos": 176, "end_char_pos": 189}, {"type": "A", "before": null, "after": "(random time/horizon)", "start_char_pos": 230, "end_char_pos": 230}, {"type": "R", "before": "using the expansion of", "after": "expanding the", "start_char_pos": 249, "end_char_pos": 271}, {"type": "A", "before": null, "after": "the", "start_char_pos": 460, "end_char_pos": 460}, {"type": "A", "before": null, "after": "the", "start_char_pos": 478, "end_char_pos": 478}, {"type": "R", "before": "risk-minimisation problem", "after": "risk-minimization problem \\`a la F\\\"ollmer-Sondermann", "start_char_pos": 509, "end_char_pos": 534}, {"type": "D", "before": "and/or mortality", "after": null, "start_char_pos": 580, "end_char_pos": 596}, {"type": "R", "before": "stochastic innovation, that we propose herein, consists of singling out three classes of martingales in the large filtration. One of these classes is generated by a new process, up to our knowledge, that has nice features. The three orthogonal martingale classes are vital pillars for establishing our", "after": "challenge in this setting, when no model specification for these securities nor for the death time is given, lies in finding the dynamics and the structures for the mortality/longevity securities used in the securitization. To overcome this obstacle, we elaborate our", "start_char_pos": 612, "end_char_pos": 913}, {"type": "R", "before": "theorem, when (local ) martingales of", "after": "results, which state that any local martingale in", "start_char_pos": 949, "end_char_pos": 986}, {"type": "D", "before": "are", "after": null, "start_char_pos": 1008, "end_char_pos": 1011}, {"type": "A", "before": null, "after": "can be decomposed into several and precise orthogonal local martingales", "start_char_pos": 1038, "end_char_pos": 1038}, {"type": "R", "before": "main original contribution, while the second main contribution lies in describing, as explicit as possible, the optimal strategy when hedging mortalityrisks using the optional martingale representation", "after": "principal novel contribution. Thanks to this optional representation, we succeed to decompose the risk in some popular mortality and/or longevity securities into the sum of orthogonal risks using a risk basis. One of the components of this basis is a new martingale, in the large filtration, that possesses nice features. Hence, the dynamics of mortality and longevity securities used in the securitization is described without mortality specification, and this constitutes our second novel contribution. Our third main contribution resides in finding explicitly the risk-minimization strategy as well as the corresponding undiversified risk for a largest class of mortality/longevity linked liabilities with or without the mortality securitization", "start_char_pos": 1068, "end_char_pos": 1269}], "sents_char_pos": [0, 245, 386, 607, 737, 834, 1040]}
+{"doc_id": "1512.00267", "revision_depth": "1", "before_revision": "A fundamental result in metabolic pathway analysis states that every element of the flux cone can be written as a sum of elementary modes. The result is an immediate consequence of a theorem by Rockafellar which states that every element of a linear subspace can be written as a conformal sum (a sum without cancelations) of elementary vectors (support-minimal vectors). In this work, we extend the theorem to general polyhedral cones and polyhedra , thereby refining Minkowski's and Caratheodory 's theorems in polyhedral geometry. In general, elementary vectors need not be support-minimal ; in fact, they are conformally non-decomposable and form a unique minimal set of conformal generators. As an application, every flux mode can be decomposed into elementary modes without cancelations. Only such a decomposition is biochemically meaningful, in the sense that a reversible reaction cannot have different directions in the contributing elementary modes. We give elementary proofs for our mathematical results , in particular, we do not assume previous knowledge of polyhedral geometry. We define special cones arising from linear subspaces and nonnegativity conditions and use them to analyze general polyhedral cones and polyhedra .", "after_revision": "A fundamental result in metabolic pathway analysis states that every flux mode can be decomposed into a sum of elementary modes. However, only a decomposition without cancelations is biochemically meaningful, since a reversible reaction cannot have different directions in the contributing elementary modes. This essential requirement has been largely overlooked by the metabolic pathway community. Indeed, every flux mode can be decomposed into elementary modes without cancelations. The result is an immediate consequence of a theorem by Rockafellar which states that every element of a linear subspace is a conformal sum (a sum without cancelations) of elementary vectors (support-minimal vectors). In this work, we extend the theorem , first to \"subspace cones\" and then to general polyhedral cones and polyhedra . Thereby, we refine Minkowski's and Carath\\'eodory 's theorems , two fundamental results in polyhedral geometry. We note that, in general, elementary vectors need not be support-minimal , in fact, they are conformally non-decomposable and form a unique minimal set of conformal generators. Our treatment is mathematically rigorous, but suitable for systems biologists, since we give self-contained proofs for our results and use concepts motivated by metabolic pathway analysis. In particular, we study cones defined by linear subspaces and nonnegativity conditions - like the flux cone - and use them to analyze general polyhedral cones and polyhedra . Finally, we review applications of elementary vectors and conformal sums in metabolic pathway analysis .", "edit_actions": [{"type": "R", "before": "element of the flux cone can be written as", "after": "flux mode can be decomposed into", "start_char_pos": 69, "end_char_pos": 111}, {"type": "A", "before": null, "after": "However, only a decomposition without cancelations is biochemically meaningful, since a reversible reaction cannot have different directions in the contributing elementary modes. This essential requirement has been largely overlooked by the metabolic pathway community. Indeed, every flux mode can be decomposed into elementary modes without cancelations.", "start_char_pos": 139, "end_char_pos": 139}, {"type": "R", "before": "can be written as", "after": "is", "start_char_pos": 260, "end_char_pos": 277}, {"type": "R", "before": "to", "after": ", first to \"subspace cones\" and then to", "start_char_pos": 408, "end_char_pos": 410}, {"type": "R", "before": ", thereby refining", "after": ". Thereby, we refine", "start_char_pos": 450, "end_char_pos": 468}, {"type": "R", "before": "Caratheodory", "after": "Carath\\'eodory", "start_char_pos": 485, "end_char_pos": 497}, {"type": "A", "before": null, "after": ", two fundamental results", "start_char_pos": 510, "end_char_pos": 510}, {"type": "R", "before": "In", "after": "We note that, in", "start_char_pos": 535, "end_char_pos": 537}, {"type": "R", "before": ";", "after": ",", "start_char_pos": 594, "end_char_pos": 595}, {"type": "R", "before": "As an application, every flux mode can be decomposed into elementary modes without cancelations. Only such a decomposition is biochemically meaningful, in the sense that a reversible reaction cannot have different directions in the contributing elementary modes. We give elementary", "after": "Our treatment is mathematically rigorous, but suitable for systems biologists, since we give self-contained", "start_char_pos": 698, "end_char_pos": 979}, {"type": "R", "before": "mathematical results , in", "after": "results and use concepts motivated by metabolic pathway analysis. In", "start_char_pos": 995, "end_char_pos": 1020}, {"type": "R", "before": "do not assume previous knowledge of polyhedral geometry. We define special cones arising from", "after": "study cones defined by", "start_char_pos": 1036, "end_char_pos": 1129}, {"type": "A", "before": null, "after": "- like the flux cone -", "start_char_pos": 1176, "end_char_pos": 1176}, {"type": "A", "before": null, "after": ". Finally, we review applications of elementary vectors and conformal sums in metabolic pathway analysis", "start_char_pos": 1240, "end_char_pos": 1240}], "sents_char_pos": [0, 138, 371, 534, 595, 697, 794, 960, 1092]}
+{"doc_id": "1512.00268", "revision_depth": "2", "before_revision": "Background: The field of 3D chromatin interaction mapping is changing our point of view on the genome, paving the way for new insights into URLanization. Network analysis is a natural and powerful way of modelling chromatin interactions. Assortativity is a network property that has been widely used in the social sciences to measure the probability of nodes with similar values of a specific feature to interact preferentially . We propose a new approach, using Chromatin feature Assortativity (ChAs), to integrate the epigenomic landscape of a specific cell type with its chromatin interaction network . Results: We use high-resolution Promoter Capture Hi-C and Hi-Cap data as well as ChIA-PET data from embryonic stem cells to generate promoter-centered interaction networks. We calculate the presence of a collection of 78 chromatin features in the chromatin fragments constituting the nodes of the network. Based on the ChAs of these epigenomic features calculated in 4 different interaction networks , we find Polycomb Group proteins and associated histone marks to play a prominent role. Remarkably, in promoter-centered networks, we observe higher ChAs of the actively elongating form of RNA Polymerase 2 compared to inactive forms in interactions between promoters and other elements. Conclusions: Contacts amongst promoters and between promoters and other elements have different characteristic epigenomic features. Using ChAs we identify a possible role of the elongating form of RNAPII in enhancer activity . Our approach facilitates the study of multiple genome-wide epigenomic profiles, considering network topology and allowing for the comparison of any number of chromatin interaction networks.", "after_revision": " Network analysis is a powerful way of modeling chromatin interactions. Assortativity is a network property used in social sciences to identify factors affecting how people establish social ties . We propose a new approach, using chromatin assortativity to integrate the epigenomic landscape of a specific cell type with its chromatin interaction network and thus investigate which proteins or chromatin marks mediate genomic contacts. We use high-resolution Promoter Capture Hi-C and Hi-Cap data as well as ChIA-PET data from mouse embryonic stem cells to investigate promoter-centered chromatin interaction networks and calculate the presence of specific epigenomic features in the chromatin fragments constituting the nodes of the network. We estimate the association of these features to the topology of four chromatin interaction networks and identify features localized in connected areas of the network. Polycomb Group proteins and associated histone marks are the features with the highest chromatin assortativity in promoter-centred networks. We then ask which features distinguish contacts amongst promoters from contacts between promoters and other genomic elements. We observe higher chromatin assortativity of the actively elongating form of RNA Polymerase 2 (RNAPII) compared to inactive forms only in interactions between promoters and other elements. Contacts among promoters, and between promoters and other elements have different characteristic epigenomic features. We identify a possible role for the elongating form of RNAPII in mediating interactions among promoters, enhancers and transcribed gene bodies . Our approach facilitates the study of multiple genome-wide epigenomic profiles, considering network topology and allowing the comparison of chromatin interaction networks.", "edit_actions": [{"type": "D", "before": "Background: The field of 3D chromatin interaction mapping is changing our point of view on the genome, paving the way for new insights into URLanization.", "after": null, "start_char_pos": 0, "end_char_pos": 153}, {"type": "D", "before": "natural and", "after": null, "start_char_pos": 176, "end_char_pos": 187}, {"type": "R", "before": "modelling", "after": "modeling", "start_char_pos": 204, "end_char_pos": 213}, {"type": "R", "before": "that has been widely used in the", "after": "used in", "start_char_pos": 274, "end_char_pos": 306}, {"type": "R", "before": "measure the probability of nodes with similar values of a specific feature to interact preferentially", "after": "identify factors affecting how people establish social ties", "start_char_pos": 326, "end_char_pos": 427}, {"type": "R", "before": "Chromatin feature Assortativity (ChAs),", "after": "chromatin assortativity", "start_char_pos": 463, "end_char_pos": 502}, {"type": "R", "before": ". Results:", "after": "and thus investigate which proteins or chromatin marks mediate genomic contacts.", "start_char_pos": 604, "end_char_pos": 614}, {"type": "A", "before": null, "after": "mouse", "start_char_pos": 706, "end_char_pos": 706}, {"type": "R", "before": "generate", "after": "investigate", "start_char_pos": 731, "end_char_pos": 739}, {"type": "R", "before": "interaction networks. We", "after": "chromatin interaction networks and", "start_char_pos": 758, "end_char_pos": 782}, {"type": "R", "before": "a collection of 78 chromatin", "after": "specific epigenomic", "start_char_pos": 809, "end_char_pos": 837}, {"type": "R", "before": "Based on the ChAs of these epigenomic features calculated in 4 different interaction networks , we find", "after": "We estimate the association of these features to the topology of four chromatin interaction networks and identify features localized in connected areas of the network.", "start_char_pos": 913, "end_char_pos": 1016}, {"type": "R", "before": "to play a prominent role. Remarkably, in promoter-centered networks, we observe higher ChAs", "after": "are the features with the highest chromatin assortativity in promoter-centred networks. We then ask which features distinguish contacts amongst promoters from contacts between promoters and other genomic elements. We observe higher chromatin assortativity", "start_char_pos": 1070, "end_char_pos": 1161}, {"type": "A", "before": null, "after": "(RNAPII)", "start_char_pos": 1214, "end_char_pos": 1214}, {"type": "A", "before": null, "after": "only", "start_char_pos": 1242, "end_char_pos": 1242}, {"type": "R", "before": "Conclusions: Contacts amongst promoters", "after": "Contacts among promoters,", "start_char_pos": 1297, "end_char_pos": 1336}, {"type": "R", "before": "Using ChAs we", "after": "We", "start_char_pos": 1429, "end_char_pos": 1442}, {"type": "R", "before": "of", "after": "for", "start_char_pos": 1468, "end_char_pos": 1470}, {"type": "R", "before": "enhancer activity", "after": "mediating interactions among promoters, enhancers and transcribed gene bodies", "start_char_pos": 1504, "end_char_pos": 1521}, {"type": "R", "before": "for the comparison of any number", "after": "the comparison", "start_char_pos": 1646, "end_char_pos": 1678}], "sents_char_pos": [0, 153, 237, 429, 779, 912, 1095, 1296, 1428, 1523]}
+{"doc_id": "1512.02673", "revision_depth": "1", "before_revision": "Codes are widely used in many engineering applications to offer some form of reliability and fault tolerance. The high-level idea of coding is to exploit resource redundancy to deliver higher robustness against system noise. In large-scale systems there are several types of \"noise \" that can affect the performance of distributed machine learning algorithms : straggler nodes, system failures, or communication bottlenecks . Moreover, redundancy is abundant: a plethora of nodes, a lot of spare storage, etc . In this work, scratching the surface of \"codes for distributed computation,\" we provide theoretical insights on how coded solutions can achieve significant gains compared to uncoded ones. We focus on two of the most basic building blocks of distributed learning algorithms: matrix multiplication and data shuffling. For matrix multiplication, we use codes to leverage the plethora of nodes and alleviate the effects of stragglers. We show that if the number of workers is n, and the runtime of each subtask has an exponential tail, the optimal coded matrix multiplication is \\Theta(\\log n) times faster than the uncoded matrix multiplication. In data shuffling, we use codes to exploit the excess in storage and reduce communication bottlenecks . We show that when \\alpha is the fraction of the data matrix that can be cached at each worker, and n is the number of workers, coded shuffling \\emph{ reduces the communication cost by a factor \\Theta(\\alpha \\gamma(n) ) compared to uncoded shuffling, where \\gamma(n) is the ratio of the cost of unicasting n messages to n users to broadcasting a common message (of the same size) to n users. Our synthetic and Open MPI experiments on Amazon EC2 show that coded distributed algorithms can achieve significant speedups of up to 40\\% compared to uncoded distributed algorithms.", "after_revision": "Codes are widely used in many engineering applications to offer robustness against noise. In large-scale systems there are several types of noise that can affect the performance of distributed machine learning algorithms -- straggler nodes, system failures, or communication bottlenecks -- but there has been little interaction cutting across codes, machine learning, and distributed systems . In this work, we provide theoretical insights on how coded solutions can achieve significant gains compared to uncoded ones. We focus on two of the most basic building blocks of distributed learning algorithms: matrix multiplication and data shuffling. For matrix multiplication, we use codes to alleviate the effect of stragglers, and show that if the number of homogeneous workers is n, and the runtime of each subtask has an exponential tail, coded computation can speed up distributed matrix multiplication by a factor of \\log n. For data shuffling, we use codes to reduce communication bottlenecks, exploiting the excess in storage . We show that when a constant fraction \\alpha of the data matrix can be cached at each worker, and n is the number of workers, \\emph{coded shuffling reduces the communication cost by a factor of (\\alpha + \\frac{1 \\gamma(n) compared to uncoded shuffling, where \\gamma(n) is the ratio of the cost of unicasting n messages to n users to multicasting a common message (of the same size) to n users. For instance, \\gamma(n) \\simeq n if multicasting a message to n users is as cheap as unicasting a message to one user. We also provide experiment results, corroborating our theoretical gains of the coded algorithms.", "edit_actions": [{"type": "R", "before": "some form of reliability and fault tolerance. The high-level idea of coding is to exploit resource redundancy to deliver higher robustness against system", "after": "robustness against", "start_char_pos": 64, "end_char_pos": 217}, {"type": "R", "before": "\"noise \"", "after": "noise", "start_char_pos": 275, "end_char_pos": 283}, {"type": "R", "before": ":", "after": "--", "start_char_pos": 359, "end_char_pos": 360}, {"type": "R", "before": ". Moreover, redundancy is abundant: a plethora of nodes, a lot of spare storage, etc", "after": "-- but there has been little interaction cutting across codes, machine learning, and distributed systems", "start_char_pos": 424, "end_char_pos": 508}, {"type": "D", "before": "scratching the surface of \"codes for distributed computation,\"", "after": null, "start_char_pos": 525, "end_char_pos": 587}, {"type": "R", "before": "leverage the plethora of nodes and alleviate the effects of stragglers. We", "after": "alleviate the effect of stragglers, and", "start_char_pos": 870, "end_char_pos": 944}, {"type": "A", "before": null, "after": "homogeneous", "start_char_pos": 972, "end_char_pos": 972}, {"type": "R", "before": "the optimal coded matrix multiplication is \\Theta(\\log n) times faster than the uncoded matrix multiplication. In", "after": "coded computation can speed up distributed matrix multiplication by a factor of \\log n. For", "start_char_pos": 1044, "end_char_pos": 1157}, {"type": "R", "before": "exploit", "after": "reduce communication bottlenecks, exploiting", "start_char_pos": 1190, "end_char_pos": 1197}, {"type": "D", "before": "and reduce communication bottlenecks", "after": null, "start_char_pos": 1220, "end_char_pos": 1256}, {"type": "R", "before": "\\alpha is the fraction", "after": "a constant fraction \\alpha", "start_char_pos": 1277, "end_char_pos": 1299}, {"type": "D", "before": "that", "after": null, "start_char_pos": 1319, "end_char_pos": 1323}, {"type": "D", "before": "coded shuffling", "after": null, "start_char_pos": 1386, "end_char_pos": 1401}, {"type": "A", "before": null, "after": "coded shuffling", "start_char_pos": 1408, "end_char_pos": 1408}, {"type": "R", "before": "\\Theta(\\alpha", "after": "of (\\alpha + \\frac{1", "start_char_pos": 1452, "end_char_pos": 1465}, {"type": "D", "before": ")", "after": null, "start_char_pos": 1476, "end_char_pos": 1477}, {"type": "R", "before": "broadcasting", "after": "multicasting", "start_char_pos": 1589, "end_char_pos": 1601}, {"type": "R", "before": "Our synthetic and Open MPI experiments on Amazon EC2 show that coded distributed algorithms can achieve significant speedups of up to 40\\% compared to uncoded distributed", "after": "For instance, \\gamma(n) \\simeq n if multicasting a message to n users is as cheap as unicasting a message to one user. We also provide experiment results, corroborating our theoretical gains of the coded", "start_char_pos": 1650, "end_char_pos": 1820}], "sents_char_pos": [0, 109, 224, 425, 510, 698, 826, 941, 1154, 1258, 1649]}
+{"doc_id": "1603.02453", "revision_depth": "1", "before_revision": "The fidelity of DNA replication by DNA polymerase (DNAP) has long been an important issue in basic researches and application studies in biology. While numerous experiments have revealed details of the molecular structure and working mechanism of DNAP , theoretical studies of the fidelity issue are still lacking. Kinetic models which considered explicitly both the polymerase pathway and the exonuclease (proofreading ) pathway were proposed since 1970s', but so far there was no rigorous treatment of such models . In this paper, we propose a new kinetic model of the exonuclease proofreading mechanism, based on some recent experimental observations . We present a rigorous analytical treatment of the steady-state kinetic equations including higher-order terminal effects , and then apply the results to the fidelity problem of some real DNAPs . Our results show good agreements with previous intuitive estimate of some DNAPs' fidelity under bio-relevant conditions .", "after_revision": "The fidelity of DNA replication by DNA polymerase (DNAP) has long been an important issue in biology. While numerous experiments have revealed details of the molecular structure and working mechanism of DNAP which consists of both a polymerase site and an exonuclease (proofreading) site, there were quite few theoretical studies on the fidelity issue . The first model which explicitly considered both sites was proposed in 1970s' and the basic idea was widely accepted by later models. However, all these models did not systematically and rigorously investigate the dominant factor on DNAP fidelity, i.e, the higher-order terminal effects through which the polymerization pathway and the proofreading pathway coordinate to achieve high fidelity . In this paper, we propose a new and comprehensive kinetic model of DNAP based on some recent experimental observations , which includes previous models as special cases . We present a rigorous and unified treatment of the corresponding steady-state kinetic equations of any-order terminal effects, and derive analytical expressions for fidelity in terms of kinetic parameters under bio-relevant conditions. These expressions offer new insights on how the the higher-order terminal effects contribute substantially to the fidelity in an order-by-order way, and also show that the polymerization-and-proofreading mechanism is dominated only by very few key parameters. We then apply these results to calculate the fidelity of some real DNAPs , which are in good agreements with previous intuitive estimates given by experimentalists .", "edit_actions": [{"type": "D", "before": "basic researches and application studies in", "after": null, "start_char_pos": 93, "end_char_pos": 136}, {"type": "R", "before": ", theoretical studies of", "after": "which consists of both a polymerase site and an exonuclease (proofreading) site, there were quite few theoretical studies on", "start_char_pos": 252, "end_char_pos": 276}, {"type": "R", "before": "are still lacking. Kinetic models which considered explicitly both the polymerase", "after": ". The first model which explicitly considered both sites was proposed in 1970s' and the basic idea was widely accepted by later models. However, all these models did not systematically and rigorously investigate the dominant factor on DNAP fidelity, i.e, the higher-order terminal effects through which the polymerization", "start_char_pos": 296, "end_char_pos": 377}, {"type": "R", "before": "exonuclease (proofreading ) pathway were proposed since 1970s', but so far there was no rigorous treatment of such models", "after": "proofreading pathway coordinate to achieve high fidelity", "start_char_pos": 394, "end_char_pos": 515}, {"type": "A", "before": null, "after": "and comprehensive", "start_char_pos": 550, "end_char_pos": 550}, {"type": "R", "before": "the exonuclease proofreading mechanism,", "after": "DNAP", "start_char_pos": 568, "end_char_pos": 607}, {"type": "A", "before": null, "after": ", which includes previous models as special cases", "start_char_pos": 655, "end_char_pos": 655}, {"type": "R", "before": "analytical", "after": "and unified", "start_char_pos": 680, "end_char_pos": 690}, {"type": "A", "before": null, "after": "corresponding", "start_char_pos": 708, "end_char_pos": 708}, {"type": "R", "before": "including", "after": "of any-order terminal effects, and derive analytical expressions for fidelity in terms of kinetic parameters under bio-relevant conditions. These expressions offer new insights on how the the", "start_char_pos": 740, "end_char_pos": 749}, {"type": "R", "before": ", and then apply the results to the fidelity problem", "after": "contribute substantially to the fidelity in an order-by-order way, and also show that the polymerization-and-proofreading mechanism is dominated only by very few key parameters. We then apply these results to calculate the fidelity", "start_char_pos": 780, "end_char_pos": 832}, {"type": "R", "before": ". Our results show", "after": ", which are in", "start_char_pos": 852, "end_char_pos": 870}, {"type": "R", "before": "estimate of some DNAPs' fidelity under bio-relevant conditions", "after": "estimates given by experimentalists", "start_char_pos": 911, "end_char_pos": 973}], "sents_char_pos": [0, 145, 314, 517, 657, 853]}
+{"doc_id": "1603.06050", "revision_depth": "1", "before_revision": "Recently, the authors of (\\mbox{%DIFAUXCMD Ernst0pt%DIFAUXCMD ) empirically showed that over the 1958-2014 horizon, the returns of the MaxMedian S\\&P 500 portfolio (see \\mbox{%DIFAUXCMD thomp2}0pt%DIFAUXCMD ) substantially exceed both those of the market capitalization } weighted S\\&P 500 portfolio as well as those of the equally weighted S\\&P 500 portfolio .0pt%DIFAUXCMD , \\mbox{%DIFAUXCMD Uppal}0pt%DIFAUXCMD , \\mbox{%DIFAUXCMD Jacobs}0pt%DIFAUXCMD , \\mbox{%DIFAUXCMD Treynor}0pt%DIFAUXCMD ). However, rather surprisingly, portfolio allocation based on the seven simple transformations of John Tukey's ladder are nowhere to be found in the literature. } In this work, we find superior S\\&P 500 portfolio weighting strategies to that of the MaxMedian rule, calculated over an updated 1958-2015 time horizon . The portfolio weighting strategies we consider are the seven transformations of Tukey's transformational ladder (\\cite{Tukey2}): 1/x^2, 1/x, 1/\\sqrt{x}, \\log (x), \\sqrt{x,\\,\\, x,\\,\\, x^2} , x , x^2 (in our setting, x is the market capitalization weighted portfolio ) . We find that the 1/x^2 weighting strategy produces cumulative returns which significantly dominate all other portfolios, posting an annual geometric mean return of 20.889 \\\\%DIF < . In addition, we show that the 1/x^2 weighting strategy is superior to a 1/x weighting strategy, which is in turn superior to a 1/\\sqrt{x} weighted portfolio, and so forth, culminating with the x^2 transformation, whose cumulative returns are the lowest of the seven transformations of Tukey's transformational ladder. It is astonishing that the ranking of portfolio performance (from best to worst) precisely follows that of the late John Tukey's transformational ladder.\\end{abstract} %DIF > . Further, the 1/x^2 weighting strategy is superior to a 1/x weighting strategy, which is in turn superior to a 1/\\sqrt{x} weighted portfolio, and so forth, culminating with the x^2 transformation, whose cumulative returns are the lowest of the seven transformations of John Tukey's transformational ladder. Rather shockingly, the order of cumulative returns precisely follows that of John Tukey's transformational ladder. To the best of our knowledge, we are the first to discover this phenomenon.", "after_revision": "0pt%DIFAUXCMD ) empirically showed that over the 1958-2014 horizon, the returns of the MaxMedian S\\&P 500 portfolio (see \\mbox{%DIFAUXCMD thomp2}0pt%DIFAUXCMD ) substantially exceed both those of the market capitalization } Over the past half century, portfolio managers have carefully documented the advantages of the equally weighted S\\&P 500 portfolio as well as the often overlooked disadvantages of the market capitalization weighted S\\&P 500 portfolio (see \\mbox{%DIFAUXCMD Bloom0pt%DIFAUXCMD , \\mbox{%DIFAUXCMD Uppal}0pt%DIFAUXCMD , \\mbox{%DIFAUXCMD Jacobs}0pt%DIFAUXCMD , \\mbox{%DIFAUXCMD Treynor}0pt%DIFAUXCMD ). However, rather surprisingly, portfolio allocation based on the seven simple transformations of John Tukey's ladder are nowhere to be found in the literature. } In this work, we consider the S\\&P 500 portfolio over the 1958-2015 time horizon weighted using John Tukey's transformational ladder (\\cite{Tukey2}): 1/x^2, \\,\\, 1/x, \\,\\, 1/\\sqrt{x}, \\,\\, \\text{log (x), \\,\\, \\sqrt{x,\\,\\, x,\\,\\, x^2} , where x is the market capitalization weighted portfolio . We find that the 1/x^2 weighting strategy produces cumulative returns which significantly dominates all other portfolios, achieving an annual geometric mean return of 20.889 \\\\%DIF < . In addition, we show that the 1/x^2 weighting strategy is superior to a 1/x weighting strategy, which is in turn superior to a 1/\\sqrt{x} weighted portfolio, and so forth, culminating with the x^2 transformation, whose cumulative returns are the lowest of the seven transformations of Tukey's transformational ladder. It is astonishing that the ranking of portfolio performance (from best to worst) precisely follows that of the late John Tukey's transformational ladder.\\end{abstract} %DIF > . Further, the 1/x^2 weighting strategy is superior to a 1/x weighting strategy, which is in turn superior to a 1/\\sqrt{x} weighted portfolio, and so forth, culminating with the x^2 transformation, whose cumulative returns are the lowest of the seven transformations of John Tukey's transformational ladder. Rather shockingly, the order of cumulative returns precisely follows that of John Tukey's transformational ladder. To the best of our knowledge, we are the first to discover this phenomenon.", "edit_actions": [{"type": "D", "before": "Recently, the authors of (\\mbox{%DIFAUXCMD Ernst", "after": null, "start_char_pos": 0, "end_char_pos": 48}, {"type": "A", "before": null, "after": "Over the past half century, portfolio managers have carefully documented the advantages of the equally", "start_char_pos": 272, "end_char_pos": 272}, {"type": "R", "before": "those of the equally", "after": "the often overlooked disadvantages of the market capitalization", "start_char_pos": 312, "end_char_pos": 332}, {"type": "R", "before": ".", "after": "(see \\mbox{%DIFAUXCMD Bloom", "start_char_pos": 361, "end_char_pos": 362}, {"type": "R", "before": "find superior", "after": "consider the", "start_char_pos": 677, "end_char_pos": 690}, {"type": "R", "before": "weighting strategies to that of the MaxMedian rule, calculated over an updated", "after": "over the", "start_char_pos": 710, "end_char_pos": 788}, {"type": "R", "before": ". The portfolio weighting strategies we consider are the seven transformations of", "after": "weighted using John", "start_char_pos": 812, "end_char_pos": 893}, {"type": "A", "before": null, "after": "\\,\\,", "start_char_pos": 950, "end_char_pos": 950}, {"type": "A", "before": null, "after": "\\,\\,", "start_char_pos": 956, "end_char_pos": 956}, {"type": "R", "before": "\\log", "after": "\\,\\, \\text{log", "start_char_pos": 969, "end_char_pos": 973}, {"type": "R", "before": "\\sqrt{x", "after": "\\,\\, \\sqrt{x", "start_char_pos": 979, "end_char_pos": 986}, {"type": "A", "before": null, "after": "where", "start_char_pos": 1006, "end_char_pos": 1006}, {"type": "D", "before": ", x^2 (in our setting, x", "after": null, "start_char_pos": 1009, "end_char_pos": 1033}, {"type": "D", "before": ")", "after": null, "start_char_pos": 1082, "end_char_pos": 1083}, {"type": "R", "before": "dominate", "after": "dominates", "start_char_pos": 1176, "end_char_pos": 1184}, {"type": "R", "before": "posting", "after": "achieving", "start_char_pos": 1207, "end_char_pos": 1214}], "sents_char_pos": [0, 498, 657, 813, 1085, 1585, 1739, 2068, 2183]}
+{"doc_id": "1604.08278", "revision_depth": "1", "before_revision": "One of the key factors in -1 programmed ribosomal frameshifting (PRF) is a pseudoknot (PK) RNA . A number of single molecule experiments have been performed on PKs to decipher the mechanism of PRF. Motivated by the experiments, we performed simulations to describe the response of a PK over a range of mechanical forces (fs) and monovalent salt concentrations (Cs). The coarse-grained simulations quantitatively reproduces the multistep thermal melting . The free energy changes obtained in simulations are in excellent agreement with experiments , thus validating our model. The predicted phase diagram shows that a sequence of structural transitions, populating distinct intermediates, occur as f and C are changed . The stem-loop tertiary interactions rupture first followed by unfolding of the 3^{\\prime}-end hairpin (\\textrm{ U-I } \\textrm{ ). Finally, the 5^{\\prime}-end hairpin unravels producing a stretched state ( \\textrm{ I-F } \\textrm{ ). A theoretical analysis of the phase boundaries shows that the critical force for rupture scales as \\left(\\log C_{\\textrm{m}}\\right)^{\\alpha} with \\alpha=1\\,(0.5) for \\textrm{ U-I ( \\textrm{ \\textrm{ I-F } \\textrm{ ) transition. This relation is used to obtain the ion-preferential coefficients, which shows that ion-RNA interactions can be quantitatively measured in single molecule experiments . Our simulations predict a plausible link between the stability of the 5^{\\prime} hairpin and efficiency of PRF .", "after_revision": "Because of the potential link between -1 programmed ribosomal frameshifting (PRF) and response of a pseudoknot (PK) RNA to force, a number of single molecule pulling experiments have been performed on PKs to decipher the mechanism of PRF. Motivated in part by these experiments, we performed simulations using a coarse-grained model of RNA to describe the response of a PK over a range of mechanical forces (fs) and monovalent salt concentrations (Cs). The coarse-grained simulations quantitatively reproduce the multistep thermal melting observed in experiments, thus validating our model . The free energy changes obtained in simulations are in excellent agreement with experiments . By varying f and C, we calculated the phase diagram that shows a sequence of structural transitions, populating distinct intermediate states. As f and C are changed , the stem-loop tertiary interactions rupture first followed by unfolding of the 3^{\\prime}-end hairpin (\\textrm{ I } \\rightleftharpoons\\textrm{F ). Finally, the 5^{\\prime}-end hairpin unravels producing a extended state ( \\textrm{ E } \\rightleftharpoons\\textrm{I ). A theoretical analysis of the phase boundaries shows that the critical force for rupture scales as \\left(\\log C_{\\textrm{m}}\\right)^{\\alpha} with \\alpha=1\\,(0.5) for \\textrm{ E \\rightleftharpoons\\textrm{I ( \\textrm{ I } \\rightleftharpoons\\textrm{F ) transition. This relation is used to obtain the preferential ion-RNA interaction coefficient, which can be quantitatively measured in single molecule experiments , as done previously for DNA hairpins. A by product of our work is the suggestion that the frameshift efficiency is likely determined by the stability of the 5^{\\prime} -end hairpin that the ribosome first encounters during translation .", "edit_actions": [{"type": "R", "before": "One of the key factors in", "after": "Because of the potential link between", "start_char_pos": 0, "end_char_pos": 25}, {"type": "R", "before": "is", "after": "and response of", "start_char_pos": 70, "end_char_pos": 72}, {"type": "R", "before": ". A", "after": "to force, a", "start_char_pos": 95, "end_char_pos": 98}, {"type": "A", "before": null, "after": "pulling", "start_char_pos": 125, "end_char_pos": 125}, {"type": "R", "before": "by the", "after": "in part by these", "start_char_pos": 209, "end_char_pos": 215}, {"type": "A", "before": null, "after": "using a coarse-grained model of RNA", "start_char_pos": 254, "end_char_pos": 254}, {"type": "R", "before": "reproduces", "after": "reproduce", "start_char_pos": 414, "end_char_pos": 424}, {"type": "A", "before": null, "after": "observed in experiments, thus validating our model", "start_char_pos": 455, "end_char_pos": 455}, {"type": "R", "before": ", thus validating our model. The predicted phase diagram shows that", "after": ". By varying f and C, we calculated the phase diagram that shows", "start_char_pos": 550, "end_char_pos": 617}, {"type": "R", "before": "intermediates, occur as", "after": "intermediate states. As", "start_char_pos": 676, "end_char_pos": 699}, {"type": "R", "before": ". The", "after": ", the", "start_char_pos": 720, "end_char_pos": 725}, {"type": "R", "before": "U-I", "after": "I", "start_char_pos": 834, "end_char_pos": 837}, {"type": "A", "before": null, "after": "\\rightleftharpoons", "start_char_pos": 840, "end_char_pos": 840}, {"type": "A", "before": null, "after": "F", "start_char_pos": 848, "end_char_pos": 848}, {"type": "R", "before": "stretched state (", "after": "extended state (", "start_char_pos": 909, "end_char_pos": 926}, {"type": "R", "before": "I-F", "after": "E", "start_char_pos": 936, "end_char_pos": 939}, {"type": "A", "before": null, "after": "\\rightleftharpoons", "start_char_pos": 942, "end_char_pos": 942}, {"type": "A", "before": null, "after": "I", "start_char_pos": 950, "end_char_pos": 950}, {"type": "D", "before": "U-I", "after": null, "start_char_pos": 1129, "end_char_pos": 1132}, {"type": "R", "before": "(", "after": "E", "start_char_pos": 1133, "end_char_pos": 1134}, {"type": "A", "before": null, "after": "\\rightleftharpoons", "start_char_pos": 1135, "end_char_pos": 1135}, {"type": "A", "before": null, "after": "I", "start_char_pos": 1143, "end_char_pos": 1143}, {"type": "A", "before": null, "after": "(", "start_char_pos": 1144, "end_char_pos": 1144}, {"type": "R", "before": "I-F", "after": "I", "start_char_pos": 1154, "end_char_pos": 1157}, {"type": "A", "before": null, "after": "\\rightleftharpoons", "start_char_pos": 1160, "end_char_pos": 1160}, {"type": "A", "before": null, "after": "F", "start_char_pos": 1168, "end_char_pos": 1168}, {"type": "R", "before": "ion-preferential coefficients, which shows that", "after": "preferential", "start_char_pos": 1219, "end_char_pos": 1266}, {"type": "R", "before": "interactions", "after": "interaction coefficient, which", "start_char_pos": 1275, "end_char_pos": 1287}, {"type": "R", "before": ". Our simulations predict a plausible link between the", "after": ", as done previously for DNA hairpins. A by product of our work is the suggestion that the frameshift efficiency is likely determined by the", "start_char_pos": 1350, "end_char_pos": 1404}, {"type": "R", "before": "hairpin and efficiency of PRF", "after": "-end hairpin that the ribosome first encounters during translation", "start_char_pos": 1433, "end_char_pos": 1462}], "sents_char_pos": [0, 198, 367, 457, 578, 721, 851, 953, 1182, 1351]}
+{"doc_id": "1606.00101", "revision_depth": "2", "before_revision": "The capacity of cells URLanisms to respond in a repeatable manner to challenging conditions is limited by a finite number of pre-evolved adaptive responses. Beyond this capacity, exploratory dynamics can provide alternative means to cope with a much broader array of conditions. At the population level, exploration is implemented by mutations and selection over multiple generations. However, it is not known how exploration can lead to new phenotypes within the lifetime of a single cell . Here, we address this question by developing a network model of exploration in gene regulation. This model demonstrates the feasibility of adapting by temporal exploration. Exploration is initiated by failure to comply with a global constraint and is implemented by random sampling of available network configurations. It ceases if and when the system converges to a stable compliance with the constraint. Successful convergence depends crucially on network topology and is most efficient for scale-free connectivity. Convergence to an adapted phenotype in this class of networks is achieved without fine tuning of initial conditions or other model parameters, thus making it plausible for biological implementation . Experimental results have indeed shown that gene regulatory networks are characterized by this type of topology, suggesting a structural basis for exploratory adaptation .", "after_revision": "The capacity of cells URLanisms to respond to challenging conditions in a repeatable manner is limited by a finite repertoire of pre-evolved adaptive responses. Beyond this capacity, cells can use exploratory dynamics to cope with a much broader array of conditions. However, the process of adaptation by exploratory dynamics within the lifetime of a cell is not well understood. Here we demonstrate the feasibility of exploratory adaptation in a high-dimensional network model of gene regulation. Exploration is initiated by failure to comply with a constraint and is implemented by random sampling of network configurations. It ceases if and when the network reaches a stable state satisfying the constraint. We find that successful convergence (adaptation) in high dimensions requires outgoing network hubs and is enhanced by their auto-regulation. The ability of these empirically-validated features of gene regulatory networks to support exploratory adaptation without fine-tuning, makes it plausible for biological implementation .", "edit_actions": [{"type": "A", "before": null, "after": "to challenging conditions", "start_char_pos": 43, "end_char_pos": 43}, {"type": "D", "before": "to challenging conditions", "after": null, "start_char_pos": 67, "end_char_pos": 92}, {"type": "R", "before": "number", "after": "repertoire", "start_char_pos": 116, "end_char_pos": 122}, {"type": "R", "before": "exploratory dynamics can provide alternative means", "after": "cells can use exploratory dynamics", "start_char_pos": 180, "end_char_pos": 230}, {"type": "R", "before": "At the population level, exploration is implemented by mutations and selection over multiple generations. However, it is not known how exploration can lead to new phenotypes", "after": "However, the process of adaptation by exploratory dynamics", "start_char_pos": 280, "end_char_pos": 453}, {"type": "R", "before": "single cell . Here, we address this question by developing a", "after": "cell is not well understood. Here we demonstrate the feasibility of exploratory adaptation in a high-dimensional", "start_char_pos": 479, "end_char_pos": 539}, {"type": "D", "before": "exploration in", "after": null, "start_char_pos": 557, "end_char_pos": 571}, {"type": "D", "before": "This model demonstrates the feasibility of adapting by temporal exploration.", "after": null, "start_char_pos": 589, "end_char_pos": 665}, {"type": "D", "before": "global", "after": null, "start_char_pos": 719, "end_char_pos": 725}, {"type": "D", "before": "available", "after": null, "start_char_pos": 778, "end_char_pos": 787}, {"type": "R", "before": "system converges to a stable compliance with", "after": "network reaches a stable state satisfying", "start_char_pos": 838, "end_char_pos": 882}, {"type": "R", "before": "Successful convergence depends crucially on network topology and is most efficient for scale-free connectivity. Convergence to an adapted phenotype in this class of networks is achieved without fine tuning of initial conditions or other model parameters, thus making", "after": "We find that successful convergence (adaptation) in high dimensions requires outgoing network hubs and is enhanced by their auto-regulation. The ability of these empirically-validated features of gene regulatory networks to support exploratory adaptation without fine-tuning, makes", "start_char_pos": 899, "end_char_pos": 1165}, {"type": "D", "before": ". Experimental results have indeed shown that gene regulatory networks are characterized by this type of topology, suggesting a structural basis for exploratory adaptation", "after": null, "start_char_pos": 1209, "end_char_pos": 1380}], "sents_char_pos": [0, 157, 279, 385, 492, 588, 665, 811, 898, 1010]}
+{"doc_id": "1607.02481", "revision_depth": "3", "before_revision": "Bipartite networks are currently regarded as providing a major insight into URLanization of many real-world systems, unveiling the mechanisms driving the interactions which occur between distinct groups of nodes. One of the most important issues encountered when modeling bipartite networks is devising a way to obtain a (monopartite) projection on the layer of interest, which preserves the information encoded into the original bipartite structure as much as possible . In the present paper we propose an algorithm to obtain statistically-validated projections of bipartite networks, which implements a simple rule: in order for any two nodes to be linked, the number of shared neighbors must be statistically significant. Naturally, assessing the statistical significance of nodes similarity requires the definition of a proper statistical benchmark : here we consider a set of four null models, defined within the Exponential Random Graph framework. Our algorithm outputs a matrix of link-specific p-values, from which a validated projection can be straightforwardly obtained , upon running a multiple hypothesis test and retaining only the statistically-significant links . Finally, in order to test our method , we analyze an economic network (i.e. the countries-products World Trade Web representation) and a social network (i.e. the MovieLensdataset , collecting the users' ratings of a list of movies). In both cases non-trivial communities are detected . In the first case, while projecting the World Trade Web on the countries layer reveals modules of similarly-industrialized nations, projecting it on the products layer allows communities characterized by an increasing level of complexity to be detected; in the second case, projecting MovieLens on the films layer allows clusters of movies whose affinity cannot be fully accounted for by genre similarity to be individuated.", "after_revision": "Bipartite networks are currently regarded as providing a major insight into URLanization of many real-world systems, unveiling the mechanisms driving the interactions occurring between distinct groups of nodes. One of the most important issues encountered when modeling bipartite networks is devising a way to obtain a (monopartite) projection on the layer of interest, which preserves as much as possible the information encoded into the original bipartite structure . In the present paper we propose an algorithm to obtain statistically-validated projections of bipartite networks, according to which any two nodes sharing a statistically-significant number of neighbors are linked. Since assessing the statistical significance of nodes similarity requires a proper statistical benchmark , here we consider a set of four null models, defined within the exponential random graph framework. Our algorithm outputs a matrix of link-specific p-values, from which a validated projection is straightforwardly obtainable , upon running a multiple hypothesis testing procedure . Finally, we test our method on an economic network (i.e. the countries-products World Trade Web representation) and a social network (i.e. MovieLens , collecting the users' ratings of a list of movies). In both cases non-trivial communities are detected : while projecting the World Trade Web on the countries layer reveals modules of similarly-industrialized nations, projecting it on the products layer allows communities characterized by an increasing level of complexity to be detected; in the second case, projecting MovieLens on the films layer allows clusters of movies whose affinity cannot be fully accounted for by genre similarity to be individuated.", "edit_actions": [{"type": "R", "before": "which occur", "after": "occurring", "start_char_pos": 167, "end_char_pos": 178}, {"type": "A", "before": null, "after": "as much as possible", "start_char_pos": 388, "end_char_pos": 388}, {"type": "D", "before": "as much as possible", "after": null, "start_char_pos": 451, "end_char_pos": 470}, {"type": "R", "before": "which implements a simple rule: in order for", "after": "according to which", "start_char_pos": 587, "end_char_pos": 631}, {"type": "R", "before": "to be linked, the number of shared neighbors must be statistically significant. Naturally,", "after": "sharing a statistically-significant number of neighbors are linked. Since", "start_char_pos": 646, "end_char_pos": 736}, {"type": "D", "before": "the definition of", "after": null, "start_char_pos": 805, "end_char_pos": 822}, {"type": "R", "before": ":", "after": ",", "start_char_pos": 854, "end_char_pos": 855}, {"type": "R", "before": "Exponential Random Graph", "after": "exponential random graph", "start_char_pos": 919, "end_char_pos": 943}, {"type": "R", "before": "can be straightforwardly obtained", "after": "is straightforwardly obtainable", "start_char_pos": 1047, "end_char_pos": 1080}, {"type": "R", "before": "test and retaining only the statistically-significant links", "after": "testing procedure", "start_char_pos": 1118, "end_char_pos": 1177}, {"type": "R", "before": "in order to", "after": "we", "start_char_pos": 1189, "end_char_pos": 1200}, {"type": "R", "before": ", we analyze", "after": "on", "start_char_pos": 1217, "end_char_pos": 1229}, {"type": "R", "before": "the MovieLensdataset", "after": "MovieLens", "start_char_pos": 1338, "end_char_pos": 1358}, {"type": "R", "before": ". In the first case,", "after": ":", "start_char_pos": 1464, "end_char_pos": 1484}], "sents_char_pos": [0, 212, 472, 725, 954, 1179, 1412, 1465, 1719]}
+{"doc_id": "1607.02561", "revision_depth": "1", "before_revision": "Most modern database-backed applications are built using Object Relational Mapping (ORM) frameworks. While ORM frameworks ease application development by abstracting persistent data as objects, such convenience often comes with a performance cost. In this paper, we present OMAS , a tool that examines the application logic and its interaction with databases via the Ruby on Rails ORM framework. OMAS comes with a static program analyzer and a synthetic data and workload generator that profiles applications to understand their performance characteristics. With OMAS, we performed the first comprehensive study of real-world ORM framework-based applications, where we analyzed the performance and programming patterns across 26 open-source applications, covering domains such as forum , e-commerce, project management, blogging , etc. Based on our study, we make a number of observations and analyze their implications on the designof ORM frameworks and databases. Furthermore, we discuss new research topics in data management and software engineering that our study raises, and how OMAS can help in implementing them.", "after_revision": "Most modern database-backed web applications are built upon Object Relational Mapping (ORM) frameworks. While ORM frameworks ease application development by abstracting persistent data as objects, such convenience often comes with a performance cost. In this paper, we present CADO , a tool that analyzes the application logic and its interaction with databases using the Ruby on Rails ORM framework. CADO includes a static program analyzer , a profiler and a synthetic data generator to extract and understand application's performance characteristics. We used CADO to analyze the performance problems of 27 real-world open-source Rails applications, covering domains such as online forums , e-commerce, project management, blogs , etc. Based on the results, we uncovered a number of issues that lead to sub-optimal application performance, ranging from issuing queries, how result sets are used, and physical design. We suggest possible remedies for each issue, and highlight new research opportunities that arise from them.", "edit_actions": [{"type": "A", "before": null, "after": "web", "start_char_pos": 28, "end_char_pos": 28}, {"type": "R", "before": "using", "after": "upon", "start_char_pos": 52, "end_char_pos": 57}, {"type": "R", "before": "OMAS", "after": "CADO", "start_char_pos": 275, "end_char_pos": 279}, {"type": "R", "before": "examines", "after": "analyzes", "start_char_pos": 294, "end_char_pos": 302}, {"type": "R", "before": "via", "after": "using", "start_char_pos": 360, "end_char_pos": 363}, {"type": "R", "before": "OMAS comes with", "after": "CADO includes", "start_char_pos": 397, "end_char_pos": 412}, {"type": "A", "before": null, "after": ", a profiler", "start_char_pos": 439, "end_char_pos": 439}, {"type": "R", "before": "and workload generator that profiles applications to understand their", "after": "generator to extract and understand application's", "start_char_pos": 461, "end_char_pos": 530}, {"type": "R", "before": "With OMAS, we performed the first comprehensive study of", "after": "We used CADO to analyze the performance problems of 27", "start_char_pos": 560, "end_char_pos": 616}, {"type": "D", "before": "ORM framework-based applications, where we analyzed the performance and programming patterns across 26", "after": null, "start_char_pos": 628, "end_char_pos": 730}, {"type": "A", "before": null, "after": "Rails", "start_char_pos": 743, "end_char_pos": 743}, {"type": "R", "before": "forum", "after": "online forums", "start_char_pos": 783, "end_char_pos": 788}, {"type": "R", "before": "blogging", "after": "blogs", "start_char_pos": 823, "end_char_pos": 831}, {"type": "R", "before": "our study, we make", "after": "the results, we uncovered", "start_char_pos": 848, "end_char_pos": 866}, {"type": "R", "before": "observations and analyze their implications on the designof ORM frameworks and databases. Furthermore, we discuss new research topics in data management and software engineering that our study raises, and how OMAS can help in implementing", "after": "issues that lead to sub-optimal application performance, ranging from issuing queries, how result sets are used, and physical design. We suggest possible remedies for each issue, and highlight new research opportunities that arise from", "start_char_pos": 879, "end_char_pos": 1117}], "sents_char_pos": [0, 101, 248, 396, 559, 838, 968]}
+{"doc_id": "1610.01267", "revision_depth": "1", "before_revision": "Despite computation becomes much complex on data with unprecedented large-scale , we argue computers or smart devices should and will consistently provide information and knowledge to human being in the order of a few tens milliseconds. We coin a new term 10-millisecond computing to call attention to this class of workloads. Public reports indicate that internet service users are sensitive to the service or job-level response time outliers, so we propose a very simple but powerful metric-outlier proportion to characterize the system behaviors.The outlier proportion is defined as follows: for N completed requests or jobs, if M jobs or requests' latencies exceed the outlier limit t, e.g. 10 milliseconds, the outlier proportion is M/N. 10-millisecond computing raises many challenges for both software and hardware stacks. In this paper, as a case study we investigate the challenges raised for conventional operating systems. For typical latency-critical services running with Linux on a 40-core server - a main-stream server hardware system in near future , we found, when the outlier limit decreases, the outlier proportion of a single server will significantly deteriorate. Meanwhile, the outlier proportion is further amplified by the system scale, including the system core number . For a 1K-scale system , we surprisingly find that to reduce the service or job-level outlier proportion to 10\\%, running Linux (version 2.6.32) or LXC (version 0.7.5) or XEN (version 4.0.0), respectively, the outlier proportion of a single server needs to be reduced by 871X, 2372X, 2372X accordingly. We also conducted a list of experiments to reveal the current Linux systems still suffer from poor outlier performance, including Linux kernel version 3.17.4, Linux kernel version 2.6.35M, a modified version of 2.6.35 integrated with sloppy counters and two representative real time schedulers .", "after_revision": "Despite computation becomes much complex on data with an unprecedented scale , we argue computers or smart devices should and will consistently provide information and knowledge to human being in the order of a few tens milliseconds. We coin a new term 10-millisecond computing to call attention to this class of workloads. 10-millisecond computing raises many challenges for both software and hardware stacks. In this paper, using a typical workload-memcached on a 40-core server ( a main-stream server in near future ), we quantitatively measure 10-ms computing's challenges to conventional operating systems. For better communication, we propose a simple metric-outlier proportion to measure quality of service: for N completed requests or jobs, if M jobs or requests' latencies exceed the outlier threshold t , the outlier proportion is M/N . For a 1K-scale system running Linux (version 2.6.32) , LXC (version 0.7.5) or XEN (version 4.0.0), respectively, we surprisingly find that so as to reduce the service outlier proportion to 10\\% (10\\% users will feel QoS degradation), the outlier proportion of a single server has to be reduced by 871X, 2372X, 2372X accordingly. Also, we discuss the possible design spaces of 10-ms computing systems from perspectives of datacenter architectures, networking, OS and scheduling, and benchmarking .", "edit_actions": [{"type": "R", "before": "unprecedented large-scale", "after": "an unprecedented scale", "start_char_pos": 54, "end_char_pos": 79}, {"type": "D", "before": "Public reports indicate that internet service users are sensitive to the service or job-level response time outliers, so we propose a very simple but powerful metric-outlier proportion to characterize the system behaviors.The outlier proportion is defined as follows: for N completed requests or jobs, if M jobs or requests' latencies exceed the outlier limit t, e.g. 10 milliseconds, the outlier proportion is M/N.", "after": null, "start_char_pos": 327, "end_char_pos": 742}, {"type": "R", "before": "as a case study we investigate the challenges raised for conventional operating systems. For typical latency-critical services running with Linux", "after": "using a typical workload-memcached", "start_char_pos": 845, "end_char_pos": 990}, {"type": "R", "before": "-", "after": "(", "start_char_pos": 1011, "end_char_pos": 1012}, {"type": "D", "before": "hardware system", "after": null, "start_char_pos": 1034, "end_char_pos": 1049}, {"type": "A", "before": null, "after": "), we quantitatively measure 10-ms computing's challenges to conventional operating systems. For better communication, we propose a simple metric-outlier proportion to measure quality of service: for N completed requests or jobs, if M jobs or requests' latencies exceed the outlier threshold t", "start_char_pos": 1065, "end_char_pos": 1065}, {"type": "D", "before": "we found, when the outlier limit decreases,", "after": null, "start_char_pos": 1068, "end_char_pos": 1111}, {"type": "D", "before": "proportion of a single server will significantly deteriorate. Meanwhile, the outlier", "after": null, "start_char_pos": 1124, "end_char_pos": 1208}, {"type": "R", "before": "further amplified by the system scale, including the system core number", "after": "M/N", "start_char_pos": 1223, "end_char_pos": 1294}, {"type": "D", "before": ", we surprisingly find that to reduce the service or job-level outlier proportion to 10\\%,", "after": null, "start_char_pos": 1319, "end_char_pos": 1409}, {"type": "R", "before": "or", "after": ",", "start_char_pos": 1441, "end_char_pos": 1443}, {"type": "R", "before": "the outlier proportion", "after": "we surprisingly find that so as to reduce the service outlier proportion to 10\\% (10\\% users will feel QoS degradation), the outlier proportion", "start_char_pos": 1502, "end_char_pos": 1524}, {"type": "R", "before": "needs", "after": "has", "start_char_pos": 1544, "end_char_pos": 1549}, {"type": "R", "before": "We also conducted a list of experiments to reveal the current Linux systems still suffer from poor outlier performance, including Linux kernel version 3.17.4, Linux kernel version 2.6.35M, a modified version of 2.6.35 integrated with sloppy counters and two representative real time schedulers", "after": "Also, we discuss the possible design spaces of 10-ms computing systems from perspectives of datacenter architectures, networking, OS and scheduling, and benchmarking", "start_char_pos": 1599, "end_char_pos": 1892}], "sents_char_pos": [0, 236, 326, 549, 829, 933, 1185, 1296, 1598]}
+{"doc_id": "1610.08732", "revision_depth": "1", "before_revision": "In this paper we study the exponential functionals of the processes X with independent increments , namelyI\\_t = \\int \\_0 ^t\\exp(-X \\_s )ds, \\_, \\,\\, t\\geq 0, and alsoI\\_ \\infty = \\int \\_0 ^{\\infty}\\exp(-X \\_s )ds. When X is a semi-martingale with absolutely continuous characteristics, we derive necessary and sufficient conditions for the existence of the Laplace exponent of I\\_t, and also the sufficient conditions of finiteness of the Mellin transform {\\bf E}( I \\_t^{\\alpha \\alpha\\in\\mathbb{R} . We give a recurrent integral equations for this Mellin transform . Then we apply these recurrent formulas to calculate the moments. We present also the corresponding results for the exponentials of Levy processes, which hold under less restrictive conditions then in \\mbox{%DIFAUXCMD \\cite{BY}\\hspace{0pt}%DIFAUXCMD } . In particular, we obtain an explicit formula for the moments of I \\_t and I\\_ \\infty , and we precise the exact number of finite moments of I \\_ \\infty .", "after_revision": "In this paper we study the exponential functionals of the processes X with independent increments , namely I_t = \\int _0 ^t\\exp(-X _s )ds, _, \\,\\, t\\geq 0, and also I_{\\infty = \\int _0 ^{\\infty}\\exp(-X _s )ds. When X is a semi-martingale with absolutely continuous characteristics, we derive recurrent integral equations for Mellin transform {\\bf E}( I _t^{\\alpha \\alpha\\in\\mathbb{R} , of the integral functional I_t . Then we apply these recurrent formulas to calculate the moments. We present also the corresponding results for the exponential functionals of Levy processes, which hold under less restrictive conditions then in }\\hspace{0pt}%DIFAUXCMD } the paper of Bertoin, Yor (2005) . In particular, we obtain an explicit formula for the moments of I _t and I_{\\infty , and we precise the exact number of finite moments of I _{\\infty .", "edit_actions": [{"type": "R", "before": "namelyI\\_t", "after": "namely I_t", "start_char_pos": 100, "end_char_pos": 110}, {"type": "R", "before": "\\_0", "after": "_0", "start_char_pos": 118, "end_char_pos": 121}, {"type": "R", "before": "\\_s", "after": "_s", "start_char_pos": 132, "end_char_pos": 135}, {"type": "R", "before": "\\_,", "after": "_,", "start_char_pos": 141, "end_char_pos": 144}, {"type": "D", "before": "alsoI\\_", "after": null, "start_char_pos": 163, "end_char_pos": 170}, {"type": "R", "before": "\\infty", "after": "also I_{\\infty", "start_char_pos": 171, "end_char_pos": 177}, {"type": "R", "before": "\\_0", "after": "_0", "start_char_pos": 185, "end_char_pos": 188}, {"type": "R", "before": "\\_s", "after": "_s", "start_char_pos": 206, "end_char_pos": 209}, {"type": "R", "before": "necessary and sufficient conditions for the existence of the Laplace exponent of I\\_t, and also the sufficient conditions of finiteness of the", "after": "recurrent integral equations for", "start_char_pos": 297, "end_char_pos": 439}, {"type": "R", "before": "\\_t^{\\alpha", "after": "_t^{\\alpha", "start_char_pos": 468, "end_char_pos": 479}, {"type": "R", "before": ". We give a recurrent integral equations for this Mellin transform", "after": ", of the integral functional I_t", "start_char_pos": 500, "end_char_pos": 566}, {"type": "R", "before": "exponentials", "after": "exponential functionals", "start_char_pos": 684, "end_char_pos": 696}, {"type": "D", "before": "\\mbox{%DIFAUXCMD \\cite{BY", "after": null, "start_char_pos": 769, "end_char_pos": 794}, {"type": "A", "before": null, "after": "the paper of Bertoin, Yor (2005)", "start_char_pos": 820, "end_char_pos": 820}, {"type": "D", "before": "\\_t and I\\_", "after": null, "start_char_pos": 889, "end_char_pos": 900}, {"type": "R", "before": "\\infty", "after": "_t and I_{\\infty", "start_char_pos": 901, "end_char_pos": 907}, {"type": "D", "before": "\\_", "after": null, "start_char_pos": 965, "end_char_pos": 967}, {"type": "R", "before": "\\infty", "after": "_{\\infty", "start_char_pos": 968, "end_char_pos": 974}], "sents_char_pos": [0, 214, 568, 633]}
+{"doc_id": "1612.03812", "revision_depth": "1", "before_revision": "In this work we introduce a stochastic model to describe directional changes in the movement of swimming bacteria. We use the probability density function (PDF) of turn angles, measured on tumbling E. coli wild-type {\\it , to build a Langevin equation for the deflection of the bacterial body swimming in isotropic media. We solved analytically this equation by means of the Green function method and show that three parameters are sufficient to describe the movement: a characteristic time, the steady-state solution and a control parameter. We conclude that the tumble motion, which is manifested as abrupt turns, is primarily caused by the rotational boost generated by the flagellar motor and complementarily by the rotational diffusion introduced by noise. We show that , in the tumble motion , the deflection is a non-stationary stochastic processes during times where the tumble occurs. By tuning the control parameter our model is able to explain small turns of the bacteria around their centres of mass along the run. We show that the deflection during the run is an Ornstein-Uhlenbeck process, which for typical run times is stationary. We conclude that, along the run, the rotational boosts do not exist or are neglectable and that only the rotational diffusion remains. Thus we have a single model to explain the turns of the bacterium during the run or tumble movements, through a control parameter that can be tuned through a critical value that can explain the transition between the two turn behaviours. This model is also able to explain very satisfactory all available statistical experimental data, such as PDFs and average values of turning angles and times, of both run and tumble motions.", "after_revision": "In this work we introduce a stochastic model to describe directional changes in the movement of swimming bacteria. We use the probability density function (PDF) of turn angles, measured on tumbling wild-type {\\it E. coli , to build a Langevin equation for the deflection of the bacterial body swimming in isotropic media. We have solved this equation analytically by means of the Green function method and shown that three parameters are sufficient to describe the movement: the characteristic time, the steady-state solution and the control parameter. We conclude that the tumble motion, which is manifested as abrupt turns, is primarily caused by the rotational boost generated by the flagellar motor and complementarily by the rotational diffusion introduced by noise. We show that in the tumble motion the deflection is a non-stationary stochastic process during times at which the tumbling occurs. By tuning the control parameter our model is able to explain small turns of the bacteria around their centres of mass along the run. We show that the deflection during the run is an OrnsteinUhlenbeck process, which for typical run times is stationary. We conclude that, along the run, the rotational boosts do not exist and that only the rotational diffusion remains. Thus we have a single model to explain the turns of through a critical value that can explain the transition between the two turn behaviours. This model is the bacterium during the run or tumble movements, through a control parameter that can be tuned also able to explain in a very satisfactory way all available statistical experimental data, such as PDFs and average values of turning angles times, of both run and tumble motions.", "edit_actions": [{"type": "D", "before": "E. coli", "after": null, "start_char_pos": 198, "end_char_pos": 205}, {"type": "A", "before": null, "after": "E. coli", "start_char_pos": 221, "end_char_pos": 221}, {"type": "R", "before": "solved analytically this equation", "after": "have solved this equation analytically", "start_char_pos": 326, "end_char_pos": 359}, {"type": "R", "before": "show", "after": "shown", "start_char_pos": 402, "end_char_pos": 406}, {"type": "R", "before": "a", "after": "the", "start_char_pos": 470, "end_char_pos": 471}, {"type": "R", "before": "a", "after": "the", "start_char_pos": 523, "end_char_pos": 524}, {"type": "D", "before": ",", "after": null, "start_char_pos": 776, "end_char_pos": 777}, {"type": "D", "before": ",", "after": null, "start_char_pos": 799, "end_char_pos": 800}, {"type": "R", "before": "processes during times where the tumble", "after": "process during times at which the tumbling", "start_char_pos": 847, "end_char_pos": 886}, {"type": "R", "before": "Ornstein-Uhlenbeck", "after": "OrnsteinUhlenbeck", "start_char_pos": 1077, "end_char_pos": 1095}, {"type": "D", "before": "or are neglectable", "after": null, "start_char_pos": 1216, "end_char_pos": 1234}, {"type": "R", "before": "the bacterium during the run or tumble movements, through a control parameter that can be tuned through a", "after": "through a", "start_char_pos": 1335, "end_char_pos": 1440}, {"type": "A", "before": null, "after": "the bacterium during the run or tumble movements, through a control parameter that can be tuned", "start_char_pos": 1535, "end_char_pos": 1535}, {"type": "R", "before": "very satisfactory", "after": "in a very satisfactory way", "start_char_pos": 1557, "end_char_pos": 1574}, {"type": "D", "before": "and", "after": null, "start_char_pos": 1670, "end_char_pos": 1673}], "sents_char_pos": [0, 114, 322, 543, 762, 894, 1027, 1147, 1282, 1520]}
+{"doc_id": "1612.09183", "revision_depth": "1", "before_revision": "To this date, all methodologies for detecting plagiarism have focused on investigating the final digital \"outcome\", eg. a document or source code. Our novel approach takes the creation process into account using logged events . We look at interaction logs of an author with the software used for creation of the work. Detection relies on comparing histograms of command usages of multiple logs . A work is classified as plagiarism , if its log deviates too much from logs of \"honestly created\" works or if its log is too similar to another log. The technique supports detecting plagiarism for digital outcomes stemming from unique taskssuch as thesis as well as equal\\emph{ \\emph{ tasks such as assignments where the same problem sets are solved by many students. Evaluation focuses on the latter case using collected logs by an interactive development environment (IDE) from more than 60 students for three programming assignments.", "after_revision": "All methodologies for detecting plagiarism to date have focused on the final digital \"outcome\", such as a document or source code. Our novel approach takes the creation process into account using logged events collected by special software or by the macro recorders found in most office applications . We look at an author's interaction logs with the software used to create the work. Detection relies on comparing the histograms of multiple logs' command use . A work is classified as plagiarism if its log deviates too much from logs of \"honestly created\" works or if its log is too similar to another log. The technique supports the detection of plagiarism for digital outcomes that stem from\\emph{unique tasks, such as theses and\\emph{equal tasks such as assignments for which the same problem sets are solved by multiple students. Focusing on the latter case , we evaluate this approach using logs collected by an interactive development environment (IDE) from more than sixty students who completed three programming assignments.", "edit_actions": [{"type": "R", "before": "To this date, all", "after": "All", "start_char_pos": 0, "end_char_pos": 17}, {"type": "A", "before": null, "after": "to date", "start_char_pos": 57, "end_char_pos": 57}, {"type": "D", "before": "investigating", "after": null, "start_char_pos": 74, "end_char_pos": 87}, {"type": "R", "before": "eg.", "after": "such as", "start_char_pos": 117, "end_char_pos": 120}, {"type": "A", "before": null, "after": "collected by special software or by the macro recorders found in most office applications", "start_char_pos": 227, "end_char_pos": 227}, {"type": "R", "before": "interaction logs of an author", "after": "an author's interaction logs", "start_char_pos": 241, "end_char_pos": 270}, {"type": "R", "before": "for creation of", "after": "to create", "start_char_pos": 294, "end_char_pos": 309}, {"type": "R", "before": "histograms of command usages of multiple logs", "after": "the histograms of multiple logs' command use", "start_char_pos": 350, "end_char_pos": 395}, {"type": "D", "before": ",", "after": null, "start_char_pos": 433, "end_char_pos": 434}, {"type": "R", "before": "detecting", "after": "the detection of", "start_char_pos": 570, "end_char_pos": 579}, {"type": "R", "before": "stemming from unique taskssuch as thesis as well as equal", "after": "that stem from", "start_char_pos": 612, "end_char_pos": 669}, {"type": "A", "before": null, "after": "unique", "start_char_pos": 675, "end_char_pos": 675}, {"type": "A", "before": null, "after": "tasks, such as theses and", "start_char_pos": 676, "end_char_pos": 676}, {"type": "A", "before": null, "after": "equal", "start_char_pos": 682, "end_char_pos": 682}, {"type": "R", "before": "where", "after": "for which", "start_char_pos": 709, "end_char_pos": 714}, {"type": "R", "before": "many students. Evaluation focuses", "after": "multiple students. Focusing", "start_char_pos": 751, "end_char_pos": 784}, {"type": "R", "before": "using collected logs", "after": ", we evaluate this approach using logs collected", "start_char_pos": 804, "end_char_pos": 824}, {"type": "R", "before": "60 students for", "after": "sixty students who completed", "start_char_pos": 888, "end_char_pos": 903}], "sents_char_pos": [0, 147, 229, 319, 397, 546, 765]}
+{"doc_id": "1612.09379", "revision_depth": "1", "before_revision": "Assuming that mutation and fixation processes are reversible Markov processes, we prove that the equilibrium ensemble of sequences obeys a Boltzmann distribution with \\exp(4N_e m(1 - 1/(2N))), where m is a Malthusian fitness and N_e and N are the effective and actual population sizes. Combining this finding with the knowledge of protein folding, we derive a correspondence between protein fitness and folding free energy, i.e., 4N_e m (1 - 1/(2N)) and -\\Delta G_{ND}/k_B T_s , where \\Delta G_{ND} \\equiv G_N - G_D, G_N and G_D are the native and denatured free energies, and T_s is the effective temperatureof natural selection. In the preceding manuscript, we analyzed dimensionless free energy changes, \\Delta \\psi_N (= \\Delta G_N / k_B T_s ), due to single nucleotide mutations, for which the total interaction \\psi_N of a sequence was estimated from a multiple sequence alignment . Based on this analyis, we study the equilibrium state of protein stability in a monoclonal approximation, in which protein evolution proceeds with single amino acid substitutions fixed at a time in a population. The ensemble of proteins attains the equilibrium, \\psi_N= \\psi_N ^{eq, where the average of \\Delta \\psi} _{ N } over fixed mutants is equal to zero. Approximating the probability density function (PDF) of \\Delta \\psi_N by a log-normal distribution, the PDF of \\Delta \\psi _{N (\\simeq \\Delta\\Delta \\psi_{ND}) in fixed mutants is estimated. \\psi_N ^{eq} for 14 protein domains agree well with \\psi_N averaged over homologous sequences. The PDFs of } K_a/K_s, which is the ratio of nonsynonymous to synonymous substitution rate per site, at equilibrium confirm that T_s negatively correlates with the amino acid substitution rate. Contrary to the neutral theory, neutral selection is not significant even in fixed mutants .", "after_revision": "Assuming that mutation and fixation processes are reversible Markov processes, we prove that the equilibrium ensemble of sequences obeys a Boltzmann distribution with \\exp(4N_e m(1 - 1/(2N))), where m is a Malthusian fitness and N_e and N are the effective and actual population sizes. On the other hand, the probability distribution of sequences with maximum entropy that satisfies a given amino acid composition at each site and a given pairwise amino acid frequency at each site pair is a Boltzmann distribution with \\exp( - \\psi_N), where \\psi_N is represented as the sum of one body and pairwise potentials. A protein folding theory indicates that homologous sequences obey a canonical ensemble characterized by \\exp( -\\Delta G_{ND}/k_B T_s ) or by \\exp(- G_{N , where \\Delta G_{ND} \\equiv G_N - G_D, G_N and G_D are the native and denatured free energies, and T_s is selective temperature. Thus, 4N_e m (1 - 1 / (2N)), -\\Delta G_{ND k_B T_s , and -\\Delta \\psi_{ND . Based on , where the average of \\Delta \\psi} the analysis of the changes (\\Delta \\psi_N) of \\psi_N due to single nucleotide nonsynonymous substitutions, T_s, and then glass transition temperature T_g, and \\Delta G _{ ND } are estimated with reasonable values for 14 protein domains. In addition, approximating the probability density function (PDF) of \\Delta \\psi_N by a log-normal distribution, PDFs of \\Delta \\psi (\\simeq \\Delta\\Delta \\psi_{ND}) in fixed mutants is estimated. \\psi_N ^{eq} for 14 protein domains agree well with \\psi_N averaged over homologous sequences. The PDFs of } _N and K_a/K_s, which is the ratio of nonsynonymous to synonymous substitution rate per site, in all and in fixed mutants are estimated. It is confirmed that T_s negatively correlates with the average of K_a/K_s. Stabilizing mutations are significantly fixed by positive selection, and balance with destabilizing mutations fixed by random drift. Contrary to the neutral theory, the proportion of neutral selection is not large .", "edit_actions": [{"type": "R", "before": "Combining this finding with the knowledge of protein folding, we derive a correspondence between protein fitness and folding free energy, i.e., 4N_e m (1", "after": "On the other hand, the probability distribution of sequences with maximum entropy that satisfies a given amino acid composition at each site and a given pairwise amino acid frequency at each site pair is a Boltzmann distribution with \\exp(", "start_char_pos": 286, "end_char_pos": 439}, {"type": "R", "before": "1/(2N)) and", "after": "\\psi_N), where \\psi_N is represented as the sum of one body and pairwise potentials. A protein folding theory indicates that homologous sequences obey a canonical ensemble characterized by \\exp(", "start_char_pos": 442, "end_char_pos": 453}, {"type": "A", "before": null, "after": ") or by \\exp(- G_{N", "start_char_pos": 477, "end_char_pos": 477}, {"type": "R", "before": "the effective temperatureof natural selection. In the preceding manuscript, we analyzed dimensionless free energy changes, \\Delta \\psi_N (= \\Delta G_N", "after": "selective temperature. Thus, 4N_e m (1 - 1", "start_char_pos": 585, "end_char_pos": 735}, {"type": "A", "before": null, "after": "(2N)), -\\Delta G_{ND", "start_char_pos": 738, "end_char_pos": 738}, {"type": "R", "before": "), due to single nucleotide mutations, for which the total interaction \\psi_N of a sequence was estimated from a multiple sequence alignment", "after": ", and -\\Delta \\psi_{ND", "start_char_pos": 747, "end_char_pos": 887}, {"type": "D", "before": "this analyis, we study the equilibrium state of protein stability in a monoclonal approximation, in which protein evolution proceeds with single amino acid substitutions fixed at a time in a population. The ensemble of proteins attains the equilibrium, \\psi_N= \\psi_N ^{eq", "after": null, "start_char_pos": 899, "end_char_pos": 1171}, {"type": "A", "before": null, "after": "the analysis of the changes (\\Delta \\psi_N) of \\psi_N due to single nucleotide nonsynonymous substitutions, T_s, and then glass transition temperature T_g, and \\Delta G", "start_char_pos": 1207, "end_char_pos": 1207}, {"type": "R", "before": "N", "after": "ND", "start_char_pos": 1211, "end_char_pos": 1212}, {"type": "R", "before": "over fixed mutants is equal to zero. Approximating", "after": "are estimated with reasonable values for 14 protein domains. In addition, approximating", "start_char_pos": 1215, "end_char_pos": 1265}, {"type": "R", "before": "the PDF", "after": "PDFs", "start_char_pos": 1352, "end_char_pos": 1359}, {"type": "D", "before": "_{N", "after": null, "start_char_pos": 1375, "end_char_pos": 1378}, {"type": "A", "before": null, "after": "_N and", "start_char_pos": 1551, "end_char_pos": 1551}, {"type": "R", "before": "at equilibrium confirm", "after": "in all and in fixed mutants are estimated. It is confirmed", "start_char_pos": 1639, "end_char_pos": 1661}, {"type": "R", "before": "amino acid substitution rate.", "after": "average of K_a/K_s. Stabilizing mutations are significantly fixed by positive selection, and balance with destabilizing mutations fixed by random drift.", "start_char_pos": 1702, "end_char_pos": 1731}, {"type": "A", "before": null, "after": "the proportion of", "start_char_pos": 1764, "end_char_pos": 1764}, {"type": "R", "before": "significant even in fixed mutants", "after": "large", "start_char_pos": 1790, "end_char_pos": 1823}], "sents_char_pos": [0, 285, 631, 1101, 1251, 1441, 1536, 1731]}
+{"doc_id": "1701.01891", "revision_depth": "1", "before_revision": "In this paper we consider some insurance policies related with drawdown and drawup events of log-returns for an underlying asset modeled by a spectrally negative geometric L\\'evy process. We consider four contracts among which three were introduced in Zhang et al. (2013) for a geometric Brownian motion. The first one is an insurance contract where protection buyer pays a constant premium until the drawdown of fixed size of log-returns occurs. In return he/she receives certain insured amount at the drawdown epoch. Next insurance contract provides protection from any specified drawdown with a drawup contingency. This contract expires early if certain fixed drawup event occurs prior to fixed drawdown. The last two contracts are extensions of the previous ones by additional cancellable feature which allows an investor to terminate the contract earlier. We focus on two problems: calculating the fair premium p for the basic contracts and identifying the optimal stopping rule for the polices with cancellable feature. To do this we solve some two-sided exit problems related with the drawdown and the drawup of spectrally negative L\\'evy processes which is of own scientific interest. We also heavily rely on a theory of optimal stopping.", "after_revision": "In this paper we consider some insurance policies related to drawdown and drawup events of log-returns for an underlying asset modeled by a spectrally negative geometric L\\'evy process. We consider four contracts , three of which were introduced in Zhang et al. (2013) for a geometric Brownian motion. The first one is an insurance contract where the protection buyer pays a constant premium until the drawdown of fixed size of log-returns occurs. In return he/she receives a certain insured amount at the drawdown epoch. The next insurance contract provides protection from any specified drawdown with a drawup contingency. This contract expires early if a certain fixed drawup event occurs prior to the fixed drawdown. The last two contracts are extensions of the previous ones by an additional cancellation feature which allows the investor to terminate the contract earlier. We focus on two problems: calculating the fair premium p for the basic contracts and identifying the optimal stopping rule for the policies with the cancellation feature. To do this we solve some two-sided exit problems related to drawdown and drawup of spectrally negative L\\'evy processes , which is of independent mathematical interest. We also heavily rely on the theory of optimal stopping.", "edit_actions": [{"type": "R", "before": "with", "after": "to", "start_char_pos": 58, "end_char_pos": 62}, {"type": "R", "before": "among which three", "after": ", three of which", "start_char_pos": 215, "end_char_pos": 232}, {"type": "A", "before": null, "after": "the", "start_char_pos": 350, "end_char_pos": 350}, {"type": "A", "before": null, "after": "a", "start_char_pos": 474, "end_char_pos": 474}, {"type": "R", "before": "Next", "after": "The next", "start_char_pos": 521, "end_char_pos": 525}, {"type": "A", "before": null, "after": "a", "start_char_pos": 651, "end_char_pos": 651}, {"type": "A", "before": null, "after": "the", "start_char_pos": 695, "end_char_pos": 695}, {"type": "R", "before": "additional cancellable", "after": "an additional cancellation", "start_char_pos": 774, "end_char_pos": 796}, {"type": "R", "before": "an", "after": "the", "start_char_pos": 818, "end_char_pos": 820}, {"type": "R", "before": "polices with cancellable", "after": "policies with the cancellation", "start_char_pos": 996, "end_char_pos": 1020}, {"type": "R", "before": "with the drawdown and the", "after": "to drawdown and", "start_char_pos": 1087, "end_char_pos": 1112}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1160, "end_char_pos": 1160}, {"type": "R", "before": "own scientific", "after": "independent mathematical", "start_char_pos": 1173, "end_char_pos": 1187}, {"type": "R", "before": "a", "after": "the", "start_char_pos": 1222, "end_char_pos": 1223}], "sents_char_pos": [0, 187, 304, 447, 520, 619, 711, 864, 1029, 1197]}
+{"doc_id": "1703.00259", "revision_depth": "3", "before_revision": "We discuss a binary nature of funding impacts . Under some conditions, funding is either cost or benefit, i.e., one of the lending/borrowing rates does not play any role in pricing derivatives. When we price derivatives , considering different lending/borrowing rates leads to semi-linear BSDEs and PDEs, so we need to solve the equations numerically. However, once we can guarantee that only one of the rates affects pricing, we can recover linear equations and derive analytic formulae . Moreover, as a byproduct, our results explain how debt value adjustment (DVA) and funding benefits are different . It is often believed that DVA and funding benefits are overlapped but it will be shown that the two components are affected by different mathematical structures of derivative transactions. We will see later that FBA occurs where the payoff is non-increasing , but this relationship becomes weaken as the funding choices of underlying assets are transferred to repo markets.", "after_revision": "We discuss the binary nature of funding impact in derivative valuation . Under some conditions, funding is either a cost or a benefit, i.e., one of the lending/borrowing rates does not play a role in pricing derivatives. When derivatives are priced , considering different lending/borrowing rates leads to semi-linear BSDEs and PDEs, and thus it is necessary to solve the equations numerically. However, once it can be guaranteed that only one of the rates affects pricing, linear equations can be recovered and analytical formulae can be derived . Moreover, as a byproduct, our results explain how debt value adjustment (DVA) and funding benefits are dissimilar . It is often believed that considering both DVA and funding benefits results in a double-counting issue but it will be shown that the two components are affected by different mathematical structures of derivative transactions. We find that funding benefit is related to the decreasing property of the payoff function , but this relationship decreases as the funding choices of underlying assets are transferred to repo markets.", "edit_actions": [{"type": "R", "before": "a", "after": "the", "start_char_pos": 11, "end_char_pos": 12}, {"type": "R", "before": "impacts", "after": "impact in derivative valuation", "start_char_pos": 38, "end_char_pos": 45}, {"type": "R", "before": "cost or", "after": "a cost or a", "start_char_pos": 89, "end_char_pos": 96}, {"type": "R", "before": "any", "after": "a", "start_char_pos": 161, "end_char_pos": 164}, {"type": "R", "before": "we price derivatives", "after": "derivatives are priced", "start_char_pos": 199, "end_char_pos": 219}, {"type": "R", "before": "so we need", "after": "and thus it is necessary", "start_char_pos": 305, "end_char_pos": 315}, {"type": "R", "before": "we can guarantee", "after": "it can be guaranteed", "start_char_pos": 366, "end_char_pos": 382}, {"type": "R", "before": "we can recover linear equations and derive analytic formulae", "after": "linear equations can be recovered and analytical formulae can be derived", "start_char_pos": 427, "end_char_pos": 487}, {"type": "R", "before": "different", "after": "dissimilar", "start_char_pos": 593, "end_char_pos": 602}, {"type": "A", "before": null, "after": "considering both", "start_char_pos": 631, "end_char_pos": 631}, {"type": "R", "before": "are overlapped", "after": "results in a double-counting issue", "start_char_pos": 657, "end_char_pos": 671}, {"type": "R", "before": "will see later that FBA occurs where the payoff is non-increasing", "after": "find that funding benefit is related to the decreasing property of the payoff function", "start_char_pos": 798, "end_char_pos": 863}, {"type": "R", "before": "becomes weaken", "after": "decreases", "start_char_pos": 888, "end_char_pos": 902}], "sents_char_pos": [0, 47, 193, 351, 489, 604, 794]}
+{"doc_id": "1703.05475", "revision_depth": "1", "before_revision": "Graphs and network data are ubiquitous across a wide spectrum of scientific and application domains. Often in practice, an input graph can be considered as an observed snapshot of a (potentially continuous) hidden domain or process. Subsequent analysis, processing, and inferences are then performed on this observed graph. In this paper we advocate the perspective that an observed graph is often a noisy version of some discretized 1-skeleton of a hidden domain, and specifically we will consider the following natural network model: We assume that there is a true graph {G^*} which is a certain proximity graph for points sampled from a hidden domain X; while the observed graph G is an Erd\\\"{o}s-R\\'{e}nyi %DIFDELCMD < \\xspace %%% type perturbed version of {G^*}. Our network model is related to, and slightly generalizes, the much-celebrated small-world network model originally proposed by Watts and Strogatz. However, the main question we aim to answer is orthogonal to the usual studies of network models (which often focuses on characterizing / predicting behaviors and properties of real-world networks). Specifically, we aim to recover the metric structure of {G^*} (which reflects that of the hidden space X as we will show) from the observed graph G. Our main result is that a simple filtering process based on the Jaccard index can recover this metric within a multiplicative factor of 2 under our network model. Our work makes one step towards the general question of inferring structure of a hidden space from its observed noisy graph representation. In addition, our results also provide a theoretical understanding for Jaccard-Index-based denoising approaches.", "after_revision": "Graphs and network data are ubiquitous across a wide spectrum of scientific and application domains. Often in practice, an input graph can be considered as an observed snapshot of a (potentially continuous) hidden domain or process. Subsequent analysis, processing, and inferences are then performed on this observed graph. In this paper we advocate the perspective that an observed graph is often a noisy version of some discretized 1-skeleton of a hidden domain, and specifically we will consider the following natural network model: We assume that there is a true graph {G^*} which is a certain proximity graph for points sampled from a hidden domain X; while the observed graph G is an Erd\\\"{o}s-R\\'{e}nyi %DIFDELCMD < \\xspace %%% type perturbed version of {G^*}. Our network model is related to, and slightly generalizes, the much-celebrated small-world network model originally proposed by Watts and Strogatz. However, the main question we aim to answer is orthogonal to the usual studies of network models (which often focuses on characterizing / predicting behaviors and properties of real-world networks). Specifically, we aim to recover the metric structure of {G^*} (which reflects that of the hidden space X as we will show) from the observed graph G. Our main result is that a simple filtering process based on the Jaccard index can recover this metric within a multiplicative factor of 2 under our network model. Our work makes one step towards the general question of inferring structure of a hidden space from its observed noisy graph representation. In addition, our results also provide a theoretical understanding for Jaccard-Index-based denoising approaches.", "edit_actions": [], "sents_char_pos": [0, 100, 232, 323, 656, 767, 915, 1114, 1426, 1566]}
+{"doc_id": "1704.01221", "revision_depth": "2", "before_revision": "Network alignment (NA) aims to find a node mapping between compared networks in order to uncover highly similar ( i.e., conserved) network regions. Existing NA methods are homogeneous, i.e., they can deal only with networks containing nodes and edges of one type. However, due to increasing amounts of heterogeneous real-world network data with nodes and edges of different types, we extend three recent state-of-the-art homogeneous NA methods, WAVE, MAGNA++, and SANA, to allow for heterogeneous NA for the first time. We introduce several algorithmic novelties to achieve this . Namely, these existing NA methods compute homogeneous graphlet-based node similarities and then find high-scoring alignments with respect to these similarities, while simultaneously maximizing the number of conserved edges. Instead, we generalize homogeneous graphlets to their heterogeneous counterparts, which we then use to develop a new measure of heterogeneous node similarity. Also, we generalize S^3, a state-of-the-art measure of edge conservation for homogeneous NA, to its heterogeneous counterpart. Then, we find high-scoring alignments with respect to our heterogeneous node similarity and edge conservation measures. In evaluations on synthetic networks and real-world biological network data , our proposed heterogeneous NA methods lead to higher-quality alignments and better robustness to noise in the data than their homogeneous counterparts .", "after_revision": "Network alignment (NA) compares networks with the goal of finding a node mapping that uncovers highly similar ( conserved) network regions. Existing NA methods are homogeneous, i.e., they can deal only with networks containing nodes and edges of one type. Due to increasing amounts of heterogeneous network data with nodes or edges of different types, we extend three recent state-of-the-art homogeneous NA methods, WAVE, MAGNA++, and SANA, to allow for heterogeneous NA for the first time. We introduce several algorithmic novelties . Namely, these existing methods compute homogeneous graphlet-based node similarities and then find high-scoring alignments with respect to these similarities, while simultaneously maximizing the amount of conserved edges. Instead, we extend homogeneous graphlets to their heterogeneous counterparts, which we then use to develop a new measure of heterogeneous node similarity. Also, we extend S^3, a state-of-the-art measure of edge conservation for homogeneous NA, to its heterogeneous counterpart. Then, we find high-scoring alignments with respect to our heterogeneous node similarity and edge conservation measures. In evaluations on synthetic and real-world biological networks , our proposed heterogeneous NA methods lead to higher-quality alignments and better robustness to noise in the data than their homogeneous counterparts . The software and data from this work is available upon request .", "edit_actions": [{"type": "R", "before": "aims to find", "after": "compares networks with the goal of finding", "start_char_pos": 23, "end_char_pos": 35}, {"type": "R", "before": "between compared networks in order to uncover", "after": "that uncovers", "start_char_pos": 51, "end_char_pos": 96}, {"type": "D", "before": "i.e.,", "after": null, "start_char_pos": 114, "end_char_pos": 119}, {"type": "R", "before": "However, due", "after": "Due", "start_char_pos": 264, "end_char_pos": 276}, {"type": "D", "before": "real-world", "after": null, "start_char_pos": 316, "end_char_pos": 326}, {"type": "R", "before": "and", "after": "or", "start_char_pos": 351, "end_char_pos": 354}, {"type": "D", "before": "to achieve this", "after": null, "start_char_pos": 563, "end_char_pos": 578}, {"type": "D", "before": "NA", "after": null, "start_char_pos": 604, "end_char_pos": 606}, {"type": "R", "before": "number", "after": "amount", "start_char_pos": 778, "end_char_pos": 784}, {"type": "R", "before": "generalize", "after": "extend", "start_char_pos": 817, "end_char_pos": 827}, {"type": "R", "before": "generalize", "after": "extend", "start_char_pos": 973, "end_char_pos": 983}, {"type": "D", "before": "networks", "after": null, "start_char_pos": 1239, "end_char_pos": 1247}, {"type": "R", "before": "network data", "after": "networks", "start_char_pos": 1274, "end_char_pos": 1286}, {"type": "A", "before": null, "after": ". The software and data from this work is available upon request", "start_char_pos": 1440, "end_char_pos": 1440}], "sents_char_pos": [0, 147, 263, 519, 804, 963, 1090, 1210]}
+{"doc_id": "1705.05882", "revision_depth": "1", "before_revision": "We propose a continuous-time model of trading among risk-neutral agents with heterogeneous beliefs. Agents face quadratic costs-of-carry on their positions and as a consequence, their marginal valuation of the asset decreases when the magnitude of their position increases , as it would be the case for risk-averse agents. In the equilibrium models of investors with heterogeneous beliefs that followed the original work by Harrison and Kreps , investors are risk-neutral, short-selling is prohibited and agents face a constant marginal cost of carrying positions. The resulting resale option guarantees that the equilibrium price exceeds the price of the asset in a static buy-and-hold model where speculation is ruled out . Our model features three main novelties. First, increasing marginal costs entail that the price depends on the exogenous supply. Second, in addition to the resale option, agents may also value an option to delay, and this may cause the market to equilibrate \\emph{below the static buy-and-hold price. Third, we introduce the possibility of short-selling ; then the resale option for agents with short positions partly compensates the resale option for long agents. We characterize the unique equilibrium of our model through a Hamilton-Jacobi-Bellman equation of a novel form and use it to derive several comparative statics results .", "after_revision": "We propose a continuous-time model of trading with heterogeneous beliefs. Risk-neutral agents face quadratic costs-of-carry on positions and thus their marginal valuations decrease with the size of their position , as it would be the case for risk-averse agents. In the equilibrium models of heterogeneous beliefs that followed Harrison-Kreps , investors are risk-neutral, short-selling is prohibited and agents face constant marginal costs of carrying positions. The resulting resale option guarantees that the price exceeds the price of the asset when speculation is ruled out ; the difference is identified as a bubble. In our model increasing marginal costs entail that the price depends on asset supply. Second, agents also value an option to delay, and this may cause the market to equilibrate \\emph{ below the buy-and-hold price. Third, we introduce the possibility of short-selling . A Hamilton-Jacobi-Bellman equation of a novel form quantifies precisely the influence of the costs-of-carry on the price. An unexpected decrease in shorting costs may lead to the collapse of a bubble; this links the financial innovations that facilitated shorting of MBSs to the subsequent collapse of prices .", "edit_actions": [{"type": "D", "before": "among risk-neutral agents", "after": null, "start_char_pos": 46, "end_char_pos": 71}, {"type": "R", "before": "Agents", "after": "Risk-neutral agents", "start_char_pos": 100, "end_char_pos": 106}, {"type": "R", "before": "their positions and as a consequence, their marginal valuation of the asset decreases when the magnitude", "after": "positions and thus their marginal valuations decrease with the size", "start_char_pos": 140, "end_char_pos": 244}, {"type": "D", "before": "increases", "after": null, "start_char_pos": 263, "end_char_pos": 272}, {"type": "D", "before": "investors with", "after": null, "start_char_pos": 352, "end_char_pos": 366}, {"type": "R", "before": "the original work by Harrison and Kreps", "after": "Harrison-Kreps", "start_char_pos": 403, "end_char_pos": 442}, {"type": "R", "before": "a constant marginal cost", "after": "constant marginal costs", "start_char_pos": 517, "end_char_pos": 541}, {"type": "D", "before": "equilibrium", "after": null, "start_char_pos": 613, "end_char_pos": 624}, {"type": "R", "before": "in a static buy-and-hold model where", "after": "when", "start_char_pos": 662, "end_char_pos": 698}, {"type": "R", "before": ". Our model features three main novelties. First,", "after": "; the difference is identified as a bubble. In our model", "start_char_pos": 724, "end_char_pos": 773}, {"type": "R", "before": "the exogenous", "after": "asset", "start_char_pos": 833, "end_char_pos": 846}, {"type": "R", "before": "in addition to the resale option, agents may", "after": "agents", "start_char_pos": 863, "end_char_pos": 907}, {"type": "D", "before": "below", "after": null, "start_char_pos": 990, "end_char_pos": 995}, {"type": "R", "before": "the static", "after": "below the", "start_char_pos": 996, "end_char_pos": 1006}, {"type": "R", "before": "; then the resale option for agents with short positions partly compensates the resale option for long agents. We characterize the unique equilibrium of our model through a", "after": ". A", "start_char_pos": 1080, "end_char_pos": 1252}, {"type": "R", "before": "and use it to derive several comparative statics results", "after": "quantifies precisely the influence of the costs-of-carry on the price. An unexpected decrease in shorting costs may lead to the collapse of a bubble; this links the financial innovations that facilitated shorting of MBSs to the subsequent collapse of prices", "start_char_pos": 1302, "end_char_pos": 1358}], "sents_char_pos": [0, 99, 322, 564, 725, 766, 854, 1026, 1081, 1190]}
+{"doc_id": "1705.06479", "revision_depth": "3", "before_revision": "We investigate the dynamical effects of non-Gaussian asymmetric stable L\\'evy fluctuations on the evolution of the transcription factor activator in a genetic regulation system . The noisy fluctuations arise from the synthesis reaction rate . We compute two deterministic quantities, the mean first exit time (MFET) and the first escape probability (FEP), in order to examine the likelihood for transcriptions: The mean time scale for the system exits the low concentration state (the longer the exit time, the less likely for transcription) and the switch probability from low concentration states to high concentration states (corresponding to likelihood for transcription) . By focusing on the impact of skewness (i.e., non-symmetry) in the probability distributions of noise, we find that the fluctuations in the synthesis reaction rate lead to peculiar transitions to high concentrations and thus to possible transcriptions, such as realizing higher likelihood of transcription for larger positive skewness (i.e., asymmetry) index \\beta, causing a bifurcation for the likelihood of transcription at the critical non-Gaussianity index value \\alpha=1 (i.e., beyond which the likelihood for transcription suddenly increases ), and achieving a turning point at the threshold value \\beta \\approx 0.55 (i.e., beyond which the likelihood for transcription reversed for \\alpha values). The bifurcation and turning point phenomena do not occur in the symmetric noise case (\\beta =0). We conduct a series of numerical experiments about `regulating' the likelihood of gene transcription by tuning asymmetric stable L\\'evy noise indexes. These offer insights for possible ways of achieving gene regulation in experimental research.", "after_revision": "This work is devoted to investigating the evolution of concentration in a genetic regulation system , when the synthesis reaction rate is under additive and multiplicative asymmetric stable L\\'evy fluctuations . By focusing on the impact of skewness (i.e., non-symmetry) in the probability distributions of noise, we find that via examining the mean first exit time (MFET) and the first escape probability (FEP), the asymmetric fluctuations, interacting with nonlinearity in the system, lead to peculiar likelihood for transcription. This includes, in the additive noise case, realizing higher likelihood of transcription for larger positive skewness (i.e., asymmetry) index \\beta, causing a stochastic bifurcation at the non-Gaussianity index value \\alpha=1 (i.e., it is a separating point or line for the likelihood for transcription ), and achieving a turning point at the threshold value \\beta \\approx -0.5 (i.e., beyond which the likelihood for transcription suddenly reversed for \\alpha values). The stochastic bifurcation and turning point phenomena do not occur in the symmetric noise case (\\beta =0). While in the multiplicative noise case, non-Gaussianity index value \\alpha=1 is a separating point or line for both the mean first exit time (MFET) and the first escape probability (FEP). We also investigate the noise enhanced stability phenomenon. Additionally, we are able to specify the regions in the whole parameter space for the asymmetric noise, in which we attain desired likelihood for transcription. We have conducted a series of numerical experiments in `regulating' the likelihood of gene transcription by tuning asymmetric stable L\\'evy noise indexes. This work offers insights for possible ways of achieving gene regulation in experimental research.", "edit_actions": [{"type": "R", "before": "We investigate the dynamical effects of non-Gaussian asymmetric stable L\\'evy fluctuations on the evolution of the transcription factor activator", "after": "This work is devoted to investigating the evolution of concentration", "start_char_pos": 0, "end_char_pos": 145}, {"type": "R", "before": ". The noisy fluctuations arise from", "after": ", when", "start_char_pos": 177, "end_char_pos": 212}, {"type": "R", "before": ". We compute two deterministic quantities, the mean first exit time (MFET) and the first escape probability (FEP), in order to examine the likelihood for transcriptions: The mean time scale for the system exits the low concentration state (the longer the exit time, the less likely for transcription) and the switch probability from low concentration states to high concentration states (corresponding to likelihood for transcription)", "after": "is under additive and multiplicative asymmetric stable L\\'evy fluctuations", "start_char_pos": 241, "end_char_pos": 675}, {"type": "R", "before": "the fluctuations in the synthesis reaction rate", "after": "via examining the mean first exit time (MFET) and the first escape probability (FEP), the asymmetric fluctuations, interacting with nonlinearity in the system,", "start_char_pos": 793, "end_char_pos": 840}, {"type": "R", "before": "transitions to high concentrations and thus to possible transcriptions, such as", "after": "likelihood for transcription. This includes, in the additive noise case,", "start_char_pos": 858, "end_char_pos": 937}, {"type": "R", "before": "bifurcation for the likelihood of transcription at the critical", "after": "stochastic bifurcation at the", "start_char_pos": 1053, "end_char_pos": 1116}, {"type": "R", "before": "beyond which", "after": "it is a separating point or line for", "start_char_pos": 1161, "end_char_pos": 1173}, {"type": "D", "before": "suddenly increases", "after": null, "start_char_pos": 1207, "end_char_pos": 1225}, {"type": "R", "before": "0.55", "after": "-0.5", "start_char_pos": 1296, "end_char_pos": 1300}, {"type": "A", "before": null, "after": "suddenly", "start_char_pos": 1354, "end_char_pos": 1354}, {"type": "A", "before": null, "after": "stochastic", "start_char_pos": 1388, "end_char_pos": 1388}, {"type": "R", "before": "We conduct", "after": "While in the multiplicative noise case, non-Gaussianity index value \\alpha=1 is a separating point or line for both the mean first exit time (MFET) and the first escape probability (FEP). We also investigate the noise enhanced stability phenomenon. Additionally, we are able to specify the regions in the whole parameter space for the asymmetric noise, in which we attain desired likelihood for transcription. We have conducted", "start_char_pos": 1482, "end_char_pos": 1492}, {"type": "R", "before": "about", "after": "in", "start_char_pos": 1527, "end_char_pos": 1532}, {"type": "R", "before": "These offer", "after": "This work offers", "start_char_pos": 1633, "end_char_pos": 1644}], "sents_char_pos": [0, 178, 242, 677, 736, 1029, 1383, 1481, 1632]}
+{"doc_id": "1705.06595", "revision_depth": "1", "before_revision": "Telomeres, the nucleoprotein complexes at the termini of linear chromosomes, are essential roles for end-replication, end protection, and chromatin segregation. Each process represents an obstacle for genome stability. How these problems were overcome in evolution is unknown. We have found that the highly conserved Mre11 complex is involved in telomere structure and size homeostasis. We have characterized yeast telomere chromatin structure, phenotypic heritability, and telosome segregation in both wild-type [MRE11] and a specific class of mre11 mutants. Wild-type strains confer a telomere size of 300 bp of G+T simple sequence DNA . This DNA is embedded in a telosome: a micrococcal nuclease-resistant non-nucleosomal particle. The mre11A470Tmutation confers shorter 150 bp telomeric embedded within a telosome and is more resistant to micrococcal nuclease digestion than wild-type cells Interestingly, real-time qPCR suggests a lower or more transient binding of the mutant relative to the wild-type . Yet the introduction of wild-type Mre11 does not change the telomere size of the mutant cells and maintains the telosome structure of mutant cells. Similarly, the introduction of mre11A470T gene into a wild type genomic locus leads to a diffuse/wild-type chromatin phenotype. Our data show that telosomes predominantly restrict both MRE11 and mre11A470T telosomes exclusively to sister chromatids, suggesting conservative segregation. To show this, we used ectopic integration to characterize cells that carry either the MRE11 or mre11A470T alleles at the genomic g%DIFDELCMD < ] %%% site, and a second opposing mre11A470T or MRE11 allele, respectively, at an ectopic site. We find that segregation of MRE11 or mre11A470T telosomes is dependent primarily on its initial genotype, but not on any subsequent genotypic change supporting the conservative segregation of a replicating chromatid", "after_revision": "Telomeres, the nucleoprotein complexes at the termini of linear chromosomes, are essential for the processes of end replication, end-protection, and chromatin segregation. The Mre11 complex is involved in multiple cellular roles in DNA repair and structure in the regulation and function of telomere size homeostasis. In this study, we characterize yeast telomere chromatin structure, phenotypic heritability, and chromatin segregation in both wild-type [MRE11] and A470 motif alleles. MRE11 strains confer a telomere size of 300 base pairs of G+T irregular simple sequence repeats . This DNA and a portion of subtelomeric DNA is embedded in a telosome: an MNase-resistant non-nucleosomal particle. Chromatin immunoprecipitation shows a three to four-fold lower occupancy of Mre11A470T proteins than wild-type proteins in telosomes. Telosomes containing the Mre11A470T protein confer a greater resistance to MNase digestion than wild-type telosomes. The integration of a wild-type MRE11 allele into an ectopic locus in the genome of a mre11A470T mutant and the introduction of a mre11A470T %DIFDELCMD < ] %%% allele at an ectopic site in a wild-type strain lead to unexpectedly differing results. In each case, the replicated sister chromatids inherit telosomes containing only the protein encoded by the genomic mre11 locus, even in the presence of protein encoded by the opposing ectopic allele. We hypothesize that the telosome segregates by a conservative mechanism. These data support a mechanism for the linkage between sister chromatid replication and maintenance of either identical mutant or identical wild-type telosomes after replication of sister chromatids. These data suggest the presence of an active mechanism for chromatin segregation in yeast.", "edit_actions": [{"type": "R", "before": "roles for end-replication, end protection,", "after": "for the processes of end replication, end-protection,", "start_char_pos": 91, "end_char_pos": 133}, {"type": "R", "before": "Each process represents an obstacle for genome stability. How these problems were overcome in evolution is unknown. We have found that the highly conserved", "after": "The", "start_char_pos": 161, "end_char_pos": 316}, {"type": "R", "before": "telomere structure and", "after": "multiple cellular roles in DNA repair and structure in the regulation and function of telomere", "start_char_pos": 346, "end_char_pos": 368}, {"type": "R", "before": "We have characterized", "after": "In this study, we characterize", "start_char_pos": 387, "end_char_pos": 408}, {"type": "R", "before": "telosome", "after": "chromatin", "start_char_pos": 474, "end_char_pos": 482}, {"type": "R", "before": "a specific class of mre11 mutants. Wild-type", "after": "A470 motif alleles. MRE11", "start_char_pos": 525, "end_char_pos": 569}, {"type": "R", "before": "bp", "after": "base pairs", "start_char_pos": 608, "end_char_pos": 610}, {"type": "R", "before": "simple sequence DNA", "after": "irregular simple sequence repeats", "start_char_pos": 618, "end_char_pos": 637}, {"type": "A", "before": null, "after": "and a portion of subtelomeric DNA", "start_char_pos": 649, "end_char_pos": 649}, {"type": "R", "before": "a micrococcal nuclease-resistant", "after": "an MNase-resistant", "start_char_pos": 677, "end_char_pos": 709}, {"type": "R", "before": "The mre11A470Tmutation confers shorter 150 bp telomeric embedded within a telosome and is more resistant to micrococcal nuclease digestion than", "after": "Chromatin immunoprecipitation shows a three to four-fold lower occupancy of Mre11A470T proteins than", "start_char_pos": 736, "end_char_pos": 879}, {"type": "R", "before": "cells Interestingly, real-time qPCR suggests a lower or more transient binding of the mutant relative to the", "after": "proteins in telosomes. Telosomes containing the Mre11A470T protein confer a greater resistance to MNase digestion than", "start_char_pos": 890, "end_char_pos": 998}, {"type": "R", "before": ". Yet the introduction of", "after": "telosomes. The integration of a", "start_char_pos": 1009, "end_char_pos": 1034}, {"type": "D", "before": "Mre11 does not change the telomere size of the mutant cells and maintains the telosome structure of mutant cells. Similarly, the introduction of mre11A470T gene into a wild type genomic locus leads to a diffuse/wild-type chromatin phenotype. Our data show that telosomes predominantly restrict both", "after": null, "start_char_pos": 1045, "end_char_pos": 1343}, {"type": "A", "before": null, "after": "allele into an ectopic locus in the genome of a mre11A470T mutant", "start_char_pos": 1350, "end_char_pos": 1350}, {"type": "A", "before": null, "after": "the introduction of a", "start_char_pos": 1355, "end_char_pos": 1355}, {"type": "D", "before": "telosomes exclusively to sister chromatids, suggesting conservative segregation. To show this, we used ectopic integration to characterize cells that carry either the MRE11 or mre11A470T alleles at the genomic", "after": null, "start_char_pos": 1367, "end_char_pos": 1576}, {"type": "D", "before": "g", "after": null, "start_char_pos": 1577, "end_char_pos": 1578}, {"type": "R", "before": "site, and a second opposing mre11A470T or MRE11 allele, respectively, at an ectopic site. We find that segregation of MRE11 or mre11A470T telosomes is dependent primarily on its initial genotype, but not on any subsequent genotypic change supporting the conservative segregation of a replicating chromatid", "after": "allele at an ectopic site in a wild-type strain lead to unexpectedly differing results. In each case, the replicated sister chromatids inherit telosomes containing only the protein encoded by the genomic mre11 locus, even in the presence of protein encoded by the opposing ectopic allele. We hypothesize that the telosome segregates by a conservative mechanism. These data support a mechanism for the linkage between sister chromatid replication and maintenance of either identical mutant or identical wild-type telosomes after replication of sister chromatids. These data suggest the presence of an active mechanism for chromatin segregation in yeast.", "start_char_pos": 1597, "end_char_pos": 1902}], "sents_char_pos": [0, 160, 218, 276, 386, 559, 735, 1010, 1158, 1286, 1447, 1686]}
+{"doc_id": "1706.04867", "revision_depth": "1", "before_revision": "During the lifecycle of many enveloped viruses , a nucleocapsid core buds through the cell membrane to acquire an outer envelope of lipid membrane and viral glycoproteins. However, the nucleocapsid core is not required for assembly of infectious particles. To determine the role of the nucleocapsid , we perform coarse-grained computational modeling of budding in the presence and absence of a nucleocapsid. The simulations demonstrate that glycoprotein-directed budding leads to larger and more polydisperse particles than nucleocapsid-directed budding . This polydispersity is explained by a theoretical model for the competition between bending energy of the membrane and the glycoprotein shell. The simulations also show that the geometry of a budding particle impedes glycoprotein diffusion, which can result in a stalled, partially budded state. We present a phase diagram for morphologies of budded particles , which can be compared against experiments to establish bounds on whether budding is directed by glycoprotein or nucleocapsid interactions .", "after_revision": "During the alphavirus lifecycle , a nucleocapsid core buds through the cell membrane to acquire an outer envelope of lipid membrane and viral glycoproteins. However, the presence of a nucleocapsid core is not required for assembly of infectious particles. To determine the role of the nucleocapsid core, we develop a coarse-grained computational model with which we investigate budding dynamics as a function of glycoprotein and nucleocapsid interactions, as well as budding in the absence of a nucleocapsid. We find that there is a transition between glycoprotein-directed budding and nucleocapsid-directed budding which occurs above a threshold strength of nucleocapsid interactions. The simulations predict that glycoprotein-directed budding leads to significantly increased size polydispersity and particle polymorphism . This polydispersity can be qualitatively explained by a theoretical model accounting for the competition between bending energy of the membrane and the glycoprotein shell. The simulations also show that the geometry of a budding particle leads to a barrier to subunit diffusion, which can result in a stalled, partially budded state. We present a phase diagram for this and other morphologies of budded particles . Comparison of these structures against experiments could establish bounds on whether budding is directed by glycoprotein or nucleocapsid interactions . Although our model is motivated by alphaviruses, we discuss implications of our results for other enveloped viruses .", "edit_actions": [{"type": "R", "before": "lifecycle of many enveloped viruses", "after": "alphavirus lifecycle", "start_char_pos": 11, "end_char_pos": 46}, {"type": "A", "before": null, "after": "presence of a", "start_char_pos": 185, "end_char_pos": 185}, {"type": "R", "before": ", we perform", "after": "core, we develop a", "start_char_pos": 300, "end_char_pos": 312}, {"type": "R", "before": "modeling of", "after": "model with which we investigate budding dynamics as a function of glycoprotein and nucleocapsid interactions, as well as", "start_char_pos": 342, "end_char_pos": 353}, {"type": "D", "before": "presence and", "after": null, "start_char_pos": 369, "end_char_pos": 381}, {"type": "R", "before": "The simulations demonstrate", "after": "We find that there is a transition between glycoprotein-directed budding and nucleocapsid-directed budding which occurs above a threshold strength of nucleocapsid interactions. The simulations predict", "start_char_pos": 409, "end_char_pos": 436}, {"type": "R", "before": "larger and more polydisperse particles than nucleocapsid-directed budding", "after": "significantly increased size polydispersity and particle polymorphism", "start_char_pos": 481, "end_char_pos": 554}, {"type": "R", "before": "is", "after": "can be qualitatively", "start_char_pos": 577, "end_char_pos": 579}, {"type": "A", "before": null, "after": "accounting", "start_char_pos": 613, "end_char_pos": 613}, {"type": "R", "before": "impedes glycoprotein", "after": "leads to a barrier to subunit", "start_char_pos": 767, "end_char_pos": 787}, {"type": "A", "before": null, "after": "this and other", "start_char_pos": 885, "end_char_pos": 885}, {"type": "R", "before": ", which can be compared against experiments to", "after": ". Comparison of these structures against experiments could", "start_char_pos": 919, "end_char_pos": 965}, {"type": "A", "before": null, "after": ". Although our model is motivated by alphaviruses, we discuss implications of our results for other enveloped viruses", "start_char_pos": 1059, "end_char_pos": 1059}], "sents_char_pos": [0, 171, 257, 408, 556, 700, 853]}
+{"doc_id": "1707.08078", "revision_depth": "4", "before_revision": "I propose creation of a venture bank, able to multiply the capital of a venture capital firm by at least 47 times, without requiring access to the Federal Reserve or other central bank apart from settlement. This concept rests on insuring loans in order to create the capital required, and expand Tier 1 and 2 base capital. Profitability depends on overall portfolio performance, availability of default insurance notes , cost of default insurance , and the multiple of original capital (MOC) adopted by the venture bank. I propose a new derivative financial instrument, the Default Insurance Note (DIN ), to insure loans to venture investments. A DIN is similar to a credit default swap (CDS) but with a host of unique features. The features and operation of these new derivative instruments are outlined along with audit requirements. This instrument would be traded on open-outcry exchanges with special rules to ensure orderly operation of the market. It is the creation of public markets for DINs that makes possible the use of public market pricing to indirectly establish a market capitalization for the underlying venture-bank investment , which is the key to achieving regulatory acceptance of the fully-insured version of this proposal. That fully-insured version insulates the venture-bank from losses in most situations, and multiplies profitability quite dramatically in all scenarios. Ten year returns above 10X are attainable. I further propose a new feature for insurance type derivativeswhich is a clawback lien, here 77\\%, to be paid back to the underwriter to prevent perverse incentive . This proposal solves an old problem in banking, because it matches the term of the loan with the term of the investment. I show that both the venture investment and the DIN underwriting business are profitable.", "after_revision": "I propose creation of a venture bank, able to multiply the capital of a venture capital firm by at least 47 times, without requiring access to the Federal Reserve or other central bank apart from settlement. This concept rests on obtaining default swap instruments on loans in order to create the capital required, and expand Tier 1 and 2 base capital. Profitability depends on overall portfolio performance, availability of equity default swaps , cost of default swap , and the multiple of original capital (MOC) adopted by the venture bank. A new derivative financial instrument, the equity default swap (EDS ), to cover loans made as venture investments. An EDS is similar to a credit default swap (CDS) but with some unique features. The features and operation of these new derivative instruments are outlined along with audit requirements. This instrument would be traded on open-outcry exchanges with special features to ensure orderly operation of the market. It is the creation of public markets for EDSs that makes possible the use of public market pricing to indirectly provide a potential market capitalization for the underlying venture-bank investment . Full coverage insulates the venture-bank from losses in most situations, and multiplies profitability quite dramatically in all scenarios. Ten year returns above 20X are attainable. Further, a new feature for EDS derivatives, a clawback lien, closes out the equity default swap. Here it is optimized at 77\\%, and is to be paid back to the underwriter at a future date to prevent perverse incentive to deliberately fail. This new feature creates an Equity Default Clawback Swap (EDCS) which can be used safely. This proposal also solves an old problem in banking, because it matches the term of the loan with the term of the investment. I show that the venture-bank investment and the EDCS underwriting business are profitable.", "edit_actions": [{"type": "R", "before": "insuring", "after": "obtaining default swap instruments on", "start_char_pos": 230, "end_char_pos": 238}, {"type": "R", "before": "default insurance notes", "after": "equity default swaps", "start_char_pos": 396, "end_char_pos": 419}, {"type": "R", "before": "insurance", "after": "swap", "start_char_pos": 438, "end_char_pos": 447}, {"type": "R", "before": "I propose a", "after": "A", "start_char_pos": 522, "end_char_pos": 533}, {"type": "R", "before": "Default Insurance Note (DIN", "after": "equity default swap (EDS", "start_char_pos": 575, "end_char_pos": 602}, {"type": "R", "before": "insure loans to", "after": "cover loans made as", "start_char_pos": 609, "end_char_pos": 624}, {"type": "R", "before": "A DIN", "after": "An EDS", "start_char_pos": 646, "end_char_pos": 651}, {"type": "R", "before": "a host of", "after": "some", "start_char_pos": 703, "end_char_pos": 712}, {"type": "R", "before": "rules", "after": "features", "start_char_pos": 907, "end_char_pos": 912}, {"type": "R", "before": "DINs", "after": "EDSs", "start_char_pos": 997, "end_char_pos": 1001}, {"type": "R", "before": "establish a", "after": "provide a potential", "start_char_pos": 1069, "end_char_pos": 1080}, {"type": "R", "before": ", which is the key to achieving regulatory acceptance of the fully-insured version of this proposal. That fully-insured version", "after": ". Full coverage", "start_char_pos": 1146, "end_char_pos": 1273}, {"type": "R", "before": "10X", "after": "20X", "start_char_pos": 1422, "end_char_pos": 1425}, {"type": "R", "before": "I further propose", "after": "Further,", "start_char_pos": 1442, "end_char_pos": 1459}, {"type": "R", "before": "insurance type derivativeswhich is", "after": "EDS derivatives,", "start_char_pos": 1478, "end_char_pos": 1512}, {"type": "R", "before": "here", "after": "closes out the equity default swap. Here it is optimized at", "start_char_pos": 1530, "end_char_pos": 1534}, {"type": "A", "before": null, "after": "and is", "start_char_pos": 1541, "end_char_pos": 1541}, {"type": "A", "before": null, "after": "at a future date", "start_char_pos": 1577, "end_char_pos": 1577}, {"type": "R", "before": ". This proposal", "after": "to deliberately fail. This new feature creates an Equity Default Clawback Swap (EDCS) which can be used safely. This proposal also", "start_char_pos": 1608, "end_char_pos": 1623}, {"type": "R", "before": "both the venture", "after": "the venture-bank", "start_char_pos": 1743, "end_char_pos": 1759}, {"type": "R", "before": "DIN", "after": "EDCS", "start_char_pos": 1779, "end_char_pos": 1782}], "sents_char_pos": [0, 207, 323, 521, 645, 729, 836, 955, 1246, 1398, 1441, 1609, 1730]}
+{"doc_id": "1708.00062", "revision_depth": "1", "before_revision": "In banking practice, rating transition matrices have become the standard approach of deriving multi-year probabilities of default (PDs) from one-year PDs, with the latter normally being available from Basel ratings. Rating transition matrices have gained in importance with the newly adopted IFRS 9 accounting standard. Here, the multi-year PDs can be used to calculate the so-called expected credit losses (ECL) over the entire lifetime of relevant credit assets. A typical approach for estimating the rating transition matrices relies on calculating empirical rating migration counts and frequencies from rating history data. However, for small portfolios this approach often leads to zero counts and high count volatility, which makes the estimations unreliable and volatile , and can also produce counter-intuitive prediction patterns . This paper proposes a structural model which overcomes these problems. We retort to a plausible assumption of an autoregressive mean-reverting specification for the underlying ability-to-pay process. With only three parameters, this sparse process can describe well an entire typical rating transition matrix, provided the one-year PDs of the rating classes are specified (e. g. in the rating master scale). The transition probabilities produced by the structural approach are well-behaved . The approach reduces significantly the statistical degrees of freedom of the estimated transition probabilities, which makes the rating transition matrix significantly more reliable for small portfolios. The approach can be applied to data with as few as 50 observed rating transitions. Moreover, the approach can be efficiently applied for data consisting of continuous (undiscretized)PDs . In the IFRS9 context, the approach offers an additional merit of an easy way to account for the macroeconomic adjustments, which are required by the IFRS 9 accounting standard.", "after_revision": "In banking practice, rating transition matrices have become the standard approach of deriving multi-year probabilities of default (PDs) from one-year PDs, the latter normally being available from Basel ratings. Rating transition matrices have gained in importance with the newly adopted IFRS 9 accounting standard. Here, the multi-year PDs can be used to calculate the so-called expected credit losses (ECL) over the entire lifetime of relevant credit assets. A typical approach for estimating the rating transition matrices relies on calculating empirical rating migration counts and frequencies from rating history data. For small portfolios, however, this approach often leads to zero counts and high count volatility, which makes the estimations unreliable and unstable , and can also produce counter-intuitive prediction patterns such as non-parallel/crossing forward PD patterns . This paper proposes a structural model which overcomes these problems. We make a plausible assumption of an underlying autoregressive mean-reverting ability-to-pay process. With only three parameters, this sparse process can well describe an entire typical rating transition matrix, provided the one-year PDs of the rating classes are specified . The transition probabilities produced by the structural approach are well-behaved by design . The approach significantly reduces the statistical degrees of freedom of the estimated transition probabilities, which makes the rating transition matrix more reliable for small portfolios. The approach can be applied to data with as few as 50 observed rating transitions. Moreover, the approach can be efficiently applied to data consisting of continuous PDs (prior to rating discretization) . In the IFRS 9 context, the approach offers an additional merit : it can easily account for the macroeconomic adjustments, which are required by the IFRS 9 accounting standard.", "edit_actions": [{"type": "D", "before": "with", "after": null, "start_char_pos": 155, "end_char_pos": 159}, {"type": "R", "before": "However, for small portfolios", "after": "For small portfolios, however,", "start_char_pos": 628, "end_char_pos": 657}, {"type": "R", "before": "volatile", "after": "unstable", "start_char_pos": 769, "end_char_pos": 777}, {"type": "A", "before": null, "after": "such as non-parallel/crossing forward PD patterns", "start_char_pos": 839, "end_char_pos": 839}, {"type": "R", "before": "retort to", "after": "make", "start_char_pos": 916, "end_char_pos": 925}, {"type": "A", "before": null, "after": "underlying", "start_char_pos": 955, "end_char_pos": 955}, {"type": "D", "before": "specification for the underlying", "after": null, "start_char_pos": 986, "end_char_pos": 1018}, {"type": "R", "before": "describe well", "after": "well describe", "start_char_pos": 1095, "end_char_pos": 1108}, {"type": "R", "before": "(e. g. in the rating master scale).", "after": ".", "start_char_pos": 1215, "end_char_pos": 1250}, {"type": "A", "before": null, "after": "by design", "start_char_pos": 1333, "end_char_pos": 1333}, {"type": "R", "before": "reduces significantly", "after": "significantly reduces", "start_char_pos": 1349, "end_char_pos": 1370}, {"type": "D", "before": "significantly", "after": null, "start_char_pos": 1490, "end_char_pos": 1503}, {"type": "R", "before": "for", "after": "to", "start_char_pos": 1673, "end_char_pos": 1676}, {"type": "R", "before": "(undiscretized)PDs", "after": "PDs (prior to rating discretization)", "start_char_pos": 1707, "end_char_pos": 1725}, {"type": "R", "before": "IFRS9", "after": "IFRS 9", "start_char_pos": 1735, "end_char_pos": 1740}, {"type": "R", "before": "of an easy way to", "after": ": it can easily", "start_char_pos": 1790, "end_char_pos": 1807}], "sents_char_pos": [0, 215, 319, 464, 627, 841, 912, 1042, 1250, 1335, 1539, 1622]}
+{"doc_id": "1708.02691", "revision_depth": "1", "before_revision": "This article conerns the expressive power of depth in neural nets with ReLU activations . We prove that ReLU nets with width 2d+2 can approximate any continuous scalar function on the d-dimensional cube [0,1]^d arbitrarily well. We obtain quantitative depth estimates for such approximations . Our approach is based on the observation that ReLU nets are particularly well-suited for representing convex functions. Indeed, we give a constructive proof that ReLU nets with width d+1 can approximate any continuous convex function of d arbitrarily well. Moreover, when approximating convex, piecewise affine functions by width d+1 ReLU nets, we obtain matching upper and lower bounds on the required depth, proving that our construction is essentially optimal. ]", "after_revision": "This article concerns the expressive power of depth in neural nets with ReLU activations and bounded width. We are particularly interested in the following questions: what is the minimal width w_{\\text{min that ReLU nets of width w_{\\text{min can approximate any continuous function on the unit cube [0,1]^d aribitrarily well? For ReLU nets near this minimal width, what can one say about the depth necessary to approximate a given function? We obtain an essentially complete answer to these questions for convex functions . Our approach is based on the observation that , due to the convexity of the ReLU activation, ReLU nets are particularly well-suited for representing convex functions. In particular, we prove that ReLU nets with width d+1 can approximate any continuous convex function of d variables arbitrarily well. Moreover, when approximating convex, piecewise affine functions by such nets, we obtain matching upper and lower bounds on the required depth, proving that our construction is essentially optimal. These results then give quantitative depth estimates for the rate of approximation of any continuous scalar function on the d-dimensional cube 0,1]^d by ReLU nets with width d+3.", "edit_actions": [{"type": "R", "before": "conerns", "after": "concerns", "start_char_pos": 13, "end_char_pos": 20}, {"type": "R", "before": ". We prove", "after": "and bounded width. We are particularly interested in the following questions: what is the minimal width w_{\\text{min", "start_char_pos": 88, "end_char_pos": 98}, {"type": "R", "before": "with width 2d+2", "after": "of width w_{\\text{min", "start_char_pos": 114, "end_char_pos": 129}, {"type": "D", "before": "scalar", "after": null, "start_char_pos": 161, "end_char_pos": 167}, {"type": "R", "before": "d-dimensional", "after": "unit", "start_char_pos": 184, "end_char_pos": 197}, {"type": "R", "before": "arbitrarily well. We obtain quantitative depth estimates for such approximations", "after": "aribitrarily well? For ReLU nets near this minimal width, what can one say about the depth necessary to approximate a given function? We obtain an essentially complete answer to these questions for convex functions", "start_char_pos": 211, "end_char_pos": 291}, {"type": "R", "before": "ReLU", "after": ", due to the convexity of the ReLU activation, ReLU", "start_char_pos": 340, "end_char_pos": 344}, {"type": "R", "before": "Indeed, we give a constructive proof", "after": "In particular, we prove", "start_char_pos": 414, "end_char_pos": 450}, {"type": "A", "before": null, "after": "variables", "start_char_pos": 533, "end_char_pos": 533}, {"type": "R", "before": "width d+1 ReLU", "after": "such", "start_char_pos": 619, "end_char_pos": 633}, {"type": "A", "before": null, "after": "These results then give quantitative depth estimates for the rate of approximation of any continuous scalar function on the d-dimensional cube", "start_char_pos": 759, "end_char_pos": 759}, {"type": "A", "before": null, "after": "0,1", "start_char_pos": 760, "end_char_pos": 760}, {"type": "A", "before": null, "after": "^d by ReLU nets with width d+3.", "start_char_pos": 761, "end_char_pos": 761}], "sents_char_pos": [0, 89, 228, 293, 413, 551]}
+{"doc_id": "1708.08778", "revision_depth": "3", "before_revision": "Let G be a graph topological embedded in the plane and let \\mathcal A be an arrangement of pseudolines intersecting the drawing of G. An aligned drawing of G and \\mathcal A is a planar polyline drawing \\Gamma of G with an arrangement A of lines so that \\Gamma and A are homeomorphic to G and \\mathcal A . We show that if \\mathcal A is stretchable and every edge e either entirely lies on a pseudoline or intersects at most one pseudoline , then G and \\mathcal A have a straight-line aligned drawing. In order to prove these results , we strengthen the result of Da Lozzo et al., and prove that a planar graph G and a single pseudoline \\mathcal L have an aligned drawing with a prescribed convex drawing of the outer face. We also study the more general version of the problem where only a set of vertices is given and we need to determine whether they can be collinear. We show that the problem is \\mathcal{NP but fixed-parameter tractable.", "after_revision": "Let G be a graph that is topologically embedded in the plane and let \\mathcal{A be an arrangement of pseudolines intersecting the drawing of G. An aligned drawing of G and \\mathcal{A is a planar polyline drawing \\Gamma of G with an arrangement A of lines so that \\Gamma and A are homeomorphic to G and \\mathcal{A . We show that if \\mathcal{A is stretchable and every edge e either entirely lies on a pseudoline or it has at most one intersection with \\mathcal{A , then G and \\mathcal{A have a straight-line aligned drawing. In order to prove this result , we strengthen a result of Da Lozzo et al., and prove that a planar graph G and a single pseudoline \\mathcal{L have an aligned drawing with a prescribed convex drawing of the outer face. We also study the less restrictive version of the alignment problem with respect to one line, where only a set of vertices is given and we need to determine whether they can be collinear. We show that the problem is NP-complete but fixed-parameter tractable.", "edit_actions": [{"type": "R", "before": "topological", "after": "that is topologically", "start_char_pos": 17, "end_char_pos": 28}, {"type": "R", "before": "\\mathcal A", "after": "\\mathcal{A", "start_char_pos": 59, "end_char_pos": 69}, {"type": "R", "before": "\\mathcal A", "after": "\\mathcal{A", "start_char_pos": 162, "end_char_pos": 172}, {"type": "R", "before": "\\mathcal A", "after": "\\mathcal{A", "start_char_pos": 292, "end_char_pos": 302}, {"type": "R", "before": "\\mathcal A", "after": "\\mathcal{A", "start_char_pos": 321, "end_char_pos": 331}, {"type": "R", "before": "intersects", "after": "it has", "start_char_pos": 404, "end_char_pos": 414}, {"type": "R", "before": "pseudoline", "after": "intersection with \\mathcal{A", "start_char_pos": 427, "end_char_pos": 437}, {"type": "R", "before": "\\mathcal A", "after": "\\mathcal{A", "start_char_pos": 451, "end_char_pos": 461}, {"type": "R", "before": "these results", "after": "this result", "start_char_pos": 518, "end_char_pos": 531}, {"type": "R", "before": "the", "after": "a", "start_char_pos": 548, "end_char_pos": 551}, {"type": "R", "before": "\\mathcal L", "after": "\\mathcal{L", "start_char_pos": 635, "end_char_pos": 645}, {"type": "R", "before": "more general", "after": "less restrictive", "start_char_pos": 740, "end_char_pos": 752}, {"type": "R", "before": "problem", "after": "alignment problem with respect to one line,", "start_char_pos": 768, "end_char_pos": 775}, {"type": "R", "before": "\\mathcal{NP", "after": "NP-complete", "start_char_pos": 898, "end_char_pos": 909}], "sents_char_pos": [0, 304, 499, 721, 869]}
+{"doc_id": "1708.09850", "revision_depth": "2", "before_revision": "Investor trading networks are attracting growing attention in the financial market literature . In this paper, we propose three improvements to their analysis: information aggregation, transaction bootstrapping , and investor categorization. These components can be used individually or in combination. For information aggregation, we introduce a tractable multilayer aggregation procedure to integrate security-wise and time-wise information about investor category trading networks. We use transaction bootstrapping to capture the properties of the actual data generation process and to have a more robust statistical testing procedure . Investor categorization allows for inferring constant size networks and more observations for each node, which is important especially for less liquid securities. We apply this procedure by analyzing a unique data set of Finnish shareholders during the period 2004--2009. We find that households play a central role in investor networks, as they have the most synchronized trading. Furthermore, we observe that the window size used for averaging has a substantial effect on the number of inferred relationships. Importantly, the use of our proposed aggregation framework is not limited to the field of investor trading networks; in fact, it can be used for different non-financial applications, with both observable and inferred relationships, spanning a number of different information layers .", "after_revision": "Multilayer networks are attracting growing attention in many fields, including finance . In this paper, we develop a new tractable procedure for multilayer aggregation based on statistical validation, which we apply to investor networks. Moreover, we propose two other improvements to their analysis: transaction bootstrapping and investor categorization. The aggregation procedure can be used to integrate security-wise and time-wise information about investor trading networks, but it is not limited to finance. In fact, it can be used for different applications, such as gene, transportation, and social networks, were they inferred or observable. Additionally, in the investor network inference, we use transaction bootstrapping for better statistical validation . Investor categorization allows for constant size networks and having more observations for each node, which is important in the inference especially for less liquid securities. Furthermore, we observe that the window size used for averaging has a substantial effect on the number of inferred relationships. We apply this procedure by analyzing a unique data set of Finnish shareholders during the period 2004-2009. We find that households in the capital have high centrality in investor networks, which, under the theory of information channels in investor networks suggests that they are well-informed investors .", "edit_actions": [{"type": "R", "before": "Investor trading", "after": "Multilayer", "start_char_pos": 0, "end_char_pos": 16}, {"type": "R", "before": "the financial market literature", "after": "many fields, including finance", "start_char_pos": 62, "end_char_pos": 93}, {"type": "R", "before": "propose three", "after": "develop a new tractable procedure for multilayer aggregation based on statistical validation, which we apply to investor networks. Moreover, we propose two other", "start_char_pos": 114, "end_char_pos": 127}, {"type": "R", "before": "information aggregation, transaction bootstrapping ,", "after": "transaction bootstrapping", "start_char_pos": 160, "end_char_pos": 212}, {"type": "R", "before": "These components", "after": "The aggregation procedure", "start_char_pos": 242, "end_char_pos": 258}, {"type": "D", "before": "individually or in combination. For information aggregation, we introduce a tractable multilayer aggregation procedure", "after": null, "start_char_pos": 271, "end_char_pos": 389}, {"type": "R", "before": "category trading networks. We", "after": "trading networks, but it is not limited to finance. In fact, it can be used for different applications, such as gene, transportation, and social networks, were they inferred or observable. Additionally, in the investor network inference, we", "start_char_pos": 458, "end_char_pos": 487}, {"type": "R", "before": "to capture the properties of the actual data generation process and to have a more robust statistical testing procedure", "after": "for better statistical validation", "start_char_pos": 518, "end_char_pos": 637}, {"type": "D", "before": "inferring", "after": null, "start_char_pos": 675, "end_char_pos": 684}, {"type": "A", "before": null, "after": "having", "start_char_pos": 712, "end_char_pos": 712}, {"type": "A", "before": null, "after": "in the inference", "start_char_pos": 765, "end_char_pos": 765}, {"type": "D", "before": "We apply this procedure by analyzing a unique data set of Finnish shareholders during the period 2004--2009. We find that households play a central role in investor networks, as they have the most synchronized trading.", "after": null, "start_char_pos": 805, "end_char_pos": 1023}, {"type": "R", "before": "Importantly, the use of our proposed aggregation framework is not limited to the field of investor trading networks; in fact, it can be used for different non-financial applications, with both observable and inferred relationships, spanning a number of different information layers", "after": "We apply this procedure by analyzing a unique data set of Finnish shareholders during the period 2004-2009. We find that households in the capital have high centrality in investor networks, which, under the theory of information channels in investor networks suggests that they are well-informed investors", "start_char_pos": 1154, "end_char_pos": 1435}], "sents_char_pos": [0, 95, 241, 302, 484, 639, 804, 913, 1023, 1153, 1270]}
+{"doc_id": "1709.00765", "revision_depth": "2", "before_revision": "We consider the problem of how to construct a physical process over a state space X that applies some desired conditional distribution P to initial states to produce final states. This problem arises in various scenarios in thermodynamics of computation and nonequilibrium statistical physics (e.g., when designing processes to implement some desired computation, feedback-control protocol, or Maxwellian demon). It is known that there are classes of conditional distributions that cannot be implemented using any time-inhomogeneous master equation dynamics involving just the states in X. Here we show that any conditional distribution P can however be implemented if the master equation dynamics has access to additional \"hidden\" states , not in X . We investigate how the minimal number of such hidden states needed to implement some P in a thermodynamically reversible manner depends on P. We provide exact results in the special case of conditional distributions that represent single-valued functions. In the general case, we provide an upper bound on the needed number of hidden states in terms of the nonnegative rank of P. In particular, we show that if there are no constraints on what master equation we can construct, then having access to one extra binary degree of freedom ( doubling the total number of states ) is sufficient to carry out any P with zero entropy production. Our results also imply that for certain P that can be implemented without hidden states, having additional states available permits an implementation that generates less heat . These results can be seen as uncovering and investigating a novel type of cost of the physical resources needed to perform information processing---the size of a system's hidden state space .", "after_revision": "We consider the problem of how to construct a physical process over a finite state space X that applies some desired conditional distribution P to initial states to produce final states. This problem arises often in the thermodynamics of computation and nonequilibrium statistical physics more generally (e.g., when designing processes to implement some desired computation, feedback controller, or Maxwell demon). It was previously known that some conditional distributions cannot be implemented using any master equation that involves just the states in X. However, here we show that any conditional distribution P can in fact be implemented---if additional \"hidden\" states not in X are available. Moreover, we show that it is always possible to implement P in a thermodynamically reversible manner. We then investigate a novel cost of the physical resources needed to implement a given distribution P: the minimal number of hidden states needed to do so. We calculate this cost exactly for the special case where P represents a single-valued function, and provide an upper bound for the general case, in terms of the nonnegative rank of P. These results show that having access to one extra binary degree of freedom , thus doubling the total number of states , is sufficient to implement any P with a master equation in a thermodynamically reversible way, if there are no constraints on the allowed form of the master equation. (Such constraints can greatly increase the minimal needed number of hidden states.) Our results also imply that for certain P that can be implemented without hidden states, having hidden states permits an implementation that generates less heat .", "edit_actions": [{"type": "A", "before": null, "after": "finite", "start_char_pos": 70, "end_char_pos": 70}, {"type": "R", "before": "in various scenarios in", "after": "often in the", "start_char_pos": 201, "end_char_pos": 224}, {"type": "A", "before": null, "after": "more generally", "start_char_pos": 294, "end_char_pos": 294}, {"type": "R", "before": "feedback-control protocol, or Maxwellian", "after": "feedback controller, or Maxwell", "start_char_pos": 366, "end_char_pos": 406}, {"type": "R", "before": "is known that there are classes of conditional distributions that", "after": "was previously known that some conditional distributions", "start_char_pos": 418, "end_char_pos": 483}, {"type": "R", "before": "time-inhomogeneous master equation dynamics involving", "after": "master equation that involves", "start_char_pos": 516, "end_char_pos": 569}, {"type": "R", "before": "Here", "after": "However, here", "start_char_pos": 592, "end_char_pos": 596}, {"type": "R", "before": "however be implemented if the master equation dynamics has access to", "after": "in fact be implemented---if", "start_char_pos": 645, "end_char_pos": 713}, {"type": "D", "before": ",", "after": null, "start_char_pos": 741, "end_char_pos": 742}, {"type": "R", "before": ". We investigate how the", "after": "are available. Moreover, we show that it is always possible to implement P in a thermodynamically reversible manner. We then investigate a novel cost of the physical resources needed to implement a given distribution P: the", "start_char_pos": 752, "end_char_pos": 776}, {"type": "D", "before": "such", "after": null, "start_char_pos": 795, "end_char_pos": 799}, {"type": "R", "before": "implement some P in a thermodynamically reversible manner depends on P. We provide exact results in", "after": "do so. We calculate this cost exactly for", "start_char_pos": 824, "end_char_pos": 923}, {"type": "R", "before": "of conditional distributions that represent", "after": "where P represents a", "start_char_pos": 941, "end_char_pos": 984}, {"type": "R", "before": "functions. In the general case, we", "after": "function, and", "start_char_pos": 999, "end_char_pos": 1033}, {"type": "R", "before": "on the needed number of hidden states", "after": "for the general case,", "start_char_pos": 1057, "end_char_pos": 1094}, {"type": "R", "before": "In particular, we show that if there are no constraints on what master equation we can construct, then", "after": "These results show that", "start_char_pos": 1134, "end_char_pos": 1236}, {"type": "R", "before": "(", "after": ", thus", "start_char_pos": 1289, "end_char_pos": 1290}, {"type": "R", "before": ")", "after": ",", "start_char_pos": 1327, "end_char_pos": 1328}, {"type": "R", "before": "carry out", "after": "implement", "start_char_pos": 1346, "end_char_pos": 1355}, {"type": "R", "before": "zero entropy production.", "after": "a master equation in a thermodynamically reversible way, if there are no constraints on the allowed form of the master equation. (Such constraints can greatly increase the minimal needed number of hidden states.)", "start_char_pos": 1367, "end_char_pos": 1391}, {"type": "R", "before": "additional states available", "after": "hidden states", "start_char_pos": 1488, "end_char_pos": 1515}, {"type": "D", "before": ". These results can be seen as uncovering and investigating a novel type of cost of the physical resources needed to perform information processing---the size of a system's hidden state space", "after": null, "start_char_pos": 1567, "end_char_pos": 1758}], "sents_char_pos": [0, 180, 414, 591, 895, 1009, 1133, 1391, 1568]}
+{"doc_id": "1709.07122", "revision_depth": "1", "before_revision": "PageRank is a fundamental link analysis algorithm and a key representative of the performance of other graph algorithms and Sparse Matrix Vector (SpMV) multiplication. Calculating PageRank on sparse graphs generates large amount of random memory accesses resulting in low cache line utilization and poor use of memory bandwidth . In this paper, we present a novel Partition-Centric Processing Methodology (PCPM) that drastically reduces the amount of communication with DRAM and achieves high memory bandwidth. Similar to the state of the art Binning with Vertex-centric Gather-Apply-Scatter ( BVGAS) method, PCPM performs partition wise scatter and gather of updates with both phases enjoying full cache line utilization. However, BVGAS suffers from random memory accesses and redundant read/write of update values from nodes to their neighbors. In contrast, PCPM propagates single update from source node to all destinations in a partition, thus decreasing redundancy effectively. We make use of this characteristic to develop a novel bipartite Partition-Node Graph (PNG) data layout for PCPM, that enables streaming memory accesses, with very little generation overhead . We perform detailed analysis of PCPM and provide theoretical bounds on the amount of communication and random DRAM accesses. We experimentally evaluate our approach using 6 large graph datasets and demonstrate an average 2.7x speedup in execution time and 1.7x reduction in communication , compared to the state of the art . We also show that unlike the BVGAS implementation , PCPM is able to take advantage of intelligent node labeling that enhances locality in graphs, by further reducing the amount of communication with DRAM . Although we use PageRank as the target application in this paper, our approach can be applied to generic SpMV computation.", "after_revision": "PageRank is a fundamental link analysis algorithm that also functions as a key representative of the performance of Sparse Matrix-Vector (SpMV) multiplication. The traditional PageRank implementation generates fine granularity random memory accesses resulting in large amount of wasteful DRAM traffic and poor bandwidth utilization . In this paper, we present a novel Partition-Centric Processing Methodology (PCPM) to compute PageRank, that drastically reduces the amount of DRAM communication while achieving high sustained memory bandwidth. PCPM uses a Partition-centric abstraction coupled with the Gather-Apply-Scatter ( GAS) programming model. By carefully examining how a PCPM based implementation impacts communication characteristics of the algorithm, we propose several system optimizations that improve the execution time substantially. More specifically, we develop (1) a new data layout that significantly reduces communication and random DRAM accesses, and (2) branch avoidance mechanisms to get rid of unpredictable data-dependent branches . We perform detailed analytical and experimental evaluation of our approach using 6 large graphs and demonstrate an average 2.7x speedup in execution time and 1.7x reduction in communication volume , compared to the state-of-the-art . We also show that unlike other GAS based implementations , PCPM is able to further reduce main memory traffic by taking advantage of intelligent node labeling that enhances locality . Although we use PageRank as the target application in this paper, our approach can be applied to generic SpMV computation.", "edit_actions": [{"type": "R", "before": "and", "after": "that also functions as", "start_char_pos": 50, "end_char_pos": 53}, {"type": "R", "before": "other graph algorithms and Sparse Matrix Vector", "after": "Sparse Matrix-Vector", "start_char_pos": 97, "end_char_pos": 144}, {"type": "R", "before": "Calculating PageRank on sparse graphs generates large amount of", "after": "The traditional PageRank implementation generates fine granularity", "start_char_pos": 168, "end_char_pos": 231}, {"type": "R", "before": "low cache line utilization and poor use of memory bandwidth", "after": "large amount of wasteful DRAM traffic and poor bandwidth utilization", "start_char_pos": 268, "end_char_pos": 327}, {"type": "A", "before": null, "after": "to compute PageRank,", "start_char_pos": 412, "end_char_pos": 412}, {"type": "R", "before": "communication with DRAM and achieves high", "after": "DRAM communication while achieving high sustained", "start_char_pos": 452, "end_char_pos": 493}, {"type": "R", "before": "Similar to the state of the art Binning with Vertex-centric", "after": "PCPM uses a Partition-centric abstraction coupled with the", "start_char_pos": 512, "end_char_pos": 571}, {"type": "R", "before": "BVGAS) method, PCPM performs partition wise scatter and gather of updates with both phases enjoying full cache line utilization. However, BVGAS suffers from random memory accesses and redundant read/write of update values from nodes to their neighbors. In contrast, PCPM propagates single update from source node to all destinations in a partition, thus decreasing redundancy effectively. We make use of this characteristic to develop a novel bipartite Partition-Node Graph (PNG) data layout for PCPM, that enables streaming memory accesses, with very little generation overhead", "after": "GAS) programming model. By carefully examining how a PCPM based implementation impacts communication characteristics of the algorithm, we propose several system optimizations that improve the execution time substantially. More specifically, we develop (1) a new data layout that significantly reduces communication and random DRAM accesses, and (2) branch avoidance mechanisms to get rid of unpredictable data-dependent branches", "start_char_pos": 595, "end_char_pos": 1173}, {"type": "R", "before": "analysis of PCPM and provide theoretical bounds on the amount of communication and random DRAM accesses. We experimentally evaluate", "after": "analytical and experimental evaluation of", "start_char_pos": 1196, "end_char_pos": 1327}, {"type": "R", "before": "graph datasets", "after": "graphs", "start_char_pos": 1355, "end_char_pos": 1369}, {"type": "A", "before": null, "after": "volume", "start_char_pos": 1464, "end_char_pos": 1464}, {"type": "R", "before": "state of the art", "after": "state-of-the-art", "start_char_pos": 1483, "end_char_pos": 1499}, {"type": "R", "before": "the BVGAS implementation", "after": "other GAS based implementations", "start_char_pos": 1527, "end_char_pos": 1551}, {"type": "R", "before": "take", "after": "further reduce main memory traffic by taking", "start_char_pos": 1570, "end_char_pos": 1574}, {"type": "D", "before": "in graphs, by further reducing the amount of communication with DRAM", "after": null, "start_char_pos": 1637, "end_char_pos": 1705}], "sents_char_pos": [0, 167, 329, 511, 723, 847, 983, 1175, 1300, 1501]}
+{"doc_id": "1709.10483", "revision_depth": "1", "before_revision": "Voxel based analysis (VBA) of preclinical magnetic resonance images is widely used in neuroscience. Recent studies have highlighted the need for robust statistical analysis in neuroimaging , stability, and controlling error rates ; but a thorough examination of such effects is hindered by computational demands. Workflow optimization is often based on intuition and experience; while validation studies are scarce. While the main goal of many neuroscience questions is to understand the human brain, much of the current knowledge has been gained from small animal models, which replicate many genetic, structural, and connectivity aspects of the human brain. To increase throughput and reproducibility of small animal brain studies, we have developed a publicly shared VBA pipeline in a high-performance computing environment, called SAMBA. Increasing computational efficiency allowed us to produce VBA results in 1-3 days for large multidimensional arrays which previously took 1 month. To address the need for quantitative VBA validation we propose a framework consisting of morphological phantoms, and four quantitative metrics. We address several factors that impact VBA results, including registration parameters, and template construction strategies. Due to shorter processing times, we could explore multiple parameter sets, and VBA stability. We have used this framework to guide the selection of spatial registration parameters in a VBA study for a mouse model of epilepsy. We conclude that verifying the accuracy of VBA merits attention, and should be the focus of a broader effort within the community . By significantly reducing processing times, we were able to do a thorough evaluation of the variability and reliability of VBA results . The proposed framework promotes consistent quality assurance of VBA in preclinical neuroimaging; facilitating the creation and communication of robust results.", "after_revision": "While many neuroscience questions aim to understand the human brain, much current knowledge has been gained using animal models, which replicate genetic, structural, and connectivity aspects of the human brain. While voxel-based analysis (VBA) of preclinical magnetic resonance images is widely-used, a thorough examination of the statistical robustness , stability, and error rates is hindered by high computational demands of processing large arrays, and the many parameters involved. Thus, workflows are often based on intuition or experience, while preclinical validation studies remain scarce. To increase throughput and reproducibility of quantitative small animal brain studies, we have developed a publicly shared , high throughput VBA pipeline in a high-performance computing environment, called SAMBA. The increased computational efficiency allowed large multidimensional arrays to be processed in 1-3 days , a task that previously took ~ 1 month. To quantify the variability and reliability of preclinical VBA in rodent models, we propose a validation framework consisting of morphological phantoms, and four metrics. This addresses several sources that impact VBA results, including registration and template construction strategies. We have used this framework to inform the VBA workflow parameters in a VBA study for a mouse model of epilepsy. We also present initial efforts towards standardizing small animal neuroimaging data in a similar fashion with human neuroimaging. We conclude that verifying the accuracy of VBA merits attention, and should be the focus of a broader effort within the community . The proposed framework promotes consistent quality assurance of VBA in preclinical neuroimaging; facilitating the creation and communication of robust results.", "edit_actions": [{"type": "R", "before": "Voxel based", "after": "While many neuroscience questions aim to understand the human brain, much current knowledge has been gained using animal models, which replicate genetic, structural, and connectivity aspects of the human brain. While voxel-based", "start_char_pos": 0, "end_char_pos": 11}, {"type": "R", "before": "widely used in neuroscience. Recent studies have highlighted the need for robust statistical analysis in neuroimaging", "after": "widely-used, a thorough examination of the statistical robustness", "start_char_pos": 71, "end_char_pos": 188}, {"type": "R", "before": "controlling error rates ; but a thorough examination of such effects", "after": "error rates", "start_char_pos": 206, "end_char_pos": 274}, {"type": "R", "before": "computational demands. Workflow optimization is", "after": "high computational demands of processing large arrays, and the many parameters involved. Thus, workflows are", "start_char_pos": 290, "end_char_pos": 337}, {"type": "R", "before": "and experience; while validation studies are scarce. While the main goal of many neuroscience questions is to understand the human brain, much of the current knowledge has been gained from small animal models, which replicate many genetic, structural, and connectivity aspects of the human brain.", "after": "or experience, while preclinical validation studies remain scarce.", "start_char_pos": 363, "end_char_pos": 659}, {"type": "A", "before": null, "after": "quantitative", "start_char_pos": 706, "end_char_pos": 706}, {"type": "A", "before": null, "after": ", high throughput", "start_char_pos": 771, "end_char_pos": 771}, {"type": "R", "before": "Increasing", "after": "The increased", "start_char_pos": 844, "end_char_pos": 854}, {"type": "R", "before": "us to produce VBA results", "after": "large multidimensional arrays to be processed", "start_char_pos": 888, "end_char_pos": 913}, {"type": "R", "before": "for large multidimensional arrays which previously took", "after": ", a task that previously took ~", "start_char_pos": 926, "end_char_pos": 981}, {"type": "R", "before": "address the need for quantitative VBA validation", "after": "quantify the variability and reliability of preclinical VBA in rodent models,", "start_char_pos": 994, "end_char_pos": 1042}, {"type": "A", "before": null, "after": "validation", "start_char_pos": 1056, "end_char_pos": 1056}, {"type": "R", "before": "quantitative metrics. We address several factors", "after": "metrics. This addresses several sources", "start_char_pos": 1114, "end_char_pos": 1162}, {"type": "D", "before": "parameters,", "after": null, "start_char_pos": 1211, "end_char_pos": 1222}, {"type": "D", "before": "Due to shorter processing times, we could explore multiple parameter sets, and VBA stability.", "after": null, "start_char_pos": 1261, "end_char_pos": 1354}, {"type": "R", "before": "guide the selection of spatial registration", "after": "inform the VBA workflow", "start_char_pos": 1386, "end_char_pos": 1429}, {"type": "A", "before": null, "after": "also present initial efforts towards standardizing small animal neuroimaging data in a similar fashion with human neuroimaging. We", "start_char_pos": 1490, "end_char_pos": 1490}, {"type": "D", "before": ". By significantly reducing processing times, we were able to do a thorough evaluation of the variability and reliability of VBA results", "after": null, "start_char_pos": 1618, "end_char_pos": 1754}], "sents_char_pos": [0, 99, 231, 312, 378, 415, 659, 843, 990, 1135, 1260, 1354, 1486, 1619, 1756, 1853]}
+{"doc_id": "1710.03499", "revision_depth": "2", "before_revision": "Molecular motors play key roles URLanizing the interior of cells. An efficient motor in cargo transport would travel with a high speed and a minimal error in transport time (or distance ) while consuming minimal amount of energy. The travel distance and its variance of motor are, however, physically constrained by energy consumption, the principle of which has recently been formulated into the thermodynamic uncertainty relation , the product between the heat dissipated from a motor and the squared relative error in the displacement, has a minimal theoretical bound (Q \\geq 2 k_B T), which is approached when the time trajectory of the motor is maximally regular for a given amount of free energy input. Here, we use \\mathcal{Q} to quantify the transport efficiency of biological motors} . Here, we reinterpret the uncertainty measure (\\mathcal{Q) defined in the thermodynamic uncertainty relation such that a motor efficient in cargo transport is characterized with a small \\mathcal{Q} . } Analyses on the motility data from several types of molecular motors show that \\mathcal{Q} is a nonmonotic function of ATP concentration and load (f). For kinesin-1, \\mathcal{Q} \\muM is locally minimized at [ATP] \\approx 200 \\muM and f\\approx 4 pN. Remarkably, for the mutant with a longer neck-linker this local minimum vanishes , and the energetic cost to achieve the same precision as the wild-type increases significantly , which underscores the importance of molecular structure in transport properties. For the biological motors studied here , their value of \\mathcal{Q semi-optimized under the cellular condition ([ATP] \\approx 1 mM, f=0-1 pN). We find that among the motors, kinesin-1 at single molecule level is the most efficient in cargo transport .", "after_revision": "Molecular motors play pivotal roles URLanizing the interior of cells. A motor efficient in cargo transport would move along cytoskeletal filaments with a high speed and a minimal error in transport distance (or time ) while consuming a minimal amount of energy. The travel distance of the motor and its variance are, however, physically constrained by the free energy being consumed. A recently formulated thermodynamic uncertainty relation offers a theoretical framework for the energy-accuracy trade-off relation ubiquitous in biological processes. According to the relation, a measure \\mathcal{Q, the product between the heat dissipated from a motor and the squared relative error in the displacement, has a minimal theoretical bound (Q \\geq 2 k_B T), which is approached when the time trajectory of the motor is maximally regular for a given amount of free energy input. Here, we use \\mathcal{Q} to quantify the transport efficiency of biological motors} . ) defined in the thermodynamic uncertainty relation such that a motor efficient in cargo transport is characterized with a small \\mathcal{Q} . } Analyses on the motility data from several types of molecular motors reveal that \\mathcal{Q} is a complex function of ATP concentration and load (f). For kinesin-1, \\mathcal{Q} approaches the theoretical bound at f\\approx 4 pN and over a broad range of ATP concentration (1\\muM - 10 mM), and is locally minimized at [ATP] \\approx 200 \\muM . In stark contrast, this local minimum vanishes for a mutant that has a longer neck-linker , and the value of \\mathcal{Q , which underscores the importance of molecular structure . Transport efficiencies of the biological motors studied here are semi-optimized under the cellular condition ([ATP] \\approx 1 mM, f=0-1 pN). Our study indicates that among many possible directions of optimization, cytoskeletal motors are designed to operate at a high speed with a minimal error while leveraging their energy resources .", "edit_actions": [{"type": "R", "before": "key", "after": "pivotal", "start_char_pos": 22, "end_char_pos": 25}, {"type": "R", "before": "An efficient motor", "after": "A motor efficient", "start_char_pos": 66, "end_char_pos": 84}, {"type": "R", "before": "travel", "after": "move along cytoskeletal filaments", "start_char_pos": 110, "end_char_pos": 116}, {"type": "R", "before": "time (or distance", "after": "distance (or time", "start_char_pos": 168, "end_char_pos": 185}, {"type": "A", "before": null, "after": "a", "start_char_pos": 204, "end_char_pos": 204}, {"type": "A", "before": null, "after": "of the motor", "start_char_pos": 251, "end_char_pos": 251}, {"type": "D", "before": "of motor", "after": null, "start_char_pos": 269, "end_char_pos": 277}, {"type": "R", "before": "energy consumption, the principle of which has recently been formulated into the", "after": "the free energy being consumed. A recently formulated", "start_char_pos": 318, "end_char_pos": 398}, {"type": "A", "before": null, "after": "offers a theoretical framework for the energy-accuracy trade-off relation ubiquitous in biological processes. According to the relation, a measure \\mathcal{Q", "start_char_pos": 434, "end_char_pos": 434}, {"type": "D", "before": "Here, we reinterpret the uncertainty measure (\\mathcal{Q", "after": null, "start_char_pos": 797, "end_char_pos": 853}, {"type": "R", "before": "show", "after": "reveal", "start_char_pos": 1067, "end_char_pos": 1071}, {"type": "R", "before": "nonmonotic", "after": "complex", "start_char_pos": 1094, "end_char_pos": 1104}, {"type": "A", "before": null, "after": "approaches the theoretical bound at f\\approx 4 pN and over a broad range of ATP concentration (1", "start_char_pos": 1176, "end_char_pos": 1176}, {"type": "A", "before": null, "after": "- 10 mM), and", "start_char_pos": 1181, "end_char_pos": 1181}, {"type": "R", "before": "and f\\approx 4 pN. Remarkably, for the mutant with", "after": ". In stark contrast, this local minimum vanishes for a mutant that has", "start_char_pos": 1229, "end_char_pos": 1279}, {"type": "D", "before": "this local minimum vanishes", "after": null, "start_char_pos": 1301, "end_char_pos": 1328}, {"type": "R", "before": "energetic cost to achieve the same precision as the wild-type increases significantly", "after": "value of \\mathcal{Q", "start_char_pos": 1339, "end_char_pos": 1424}, {"type": "R", "before": "in transport properties. For", "after": ". Transport efficiencies of", "start_char_pos": 1483, "end_char_pos": 1511}, {"type": "R", "before": ", their value of \\mathcal{Q", "after": "are", "start_char_pos": 1547, "end_char_pos": 1574}, {"type": "R", "before": "We find that among the motors, kinesin-1 at single molecule level is the most efficient in cargo transport", "after": "Our study indicates that among many possible directions of optimization, cytoskeletal motors are designed to operate at a high speed with a minimal error while leveraging their energy resources", "start_char_pos": 1651, "end_char_pos": 1757}], "sents_char_pos": [0, 65, 230, 710, 1148, 1507, 1650]}
+{"doc_id": "1710.07989", "revision_depth": "1", "before_revision": "Mathematical models of the circulation continue to be an essential tool to study how the cardiovascular (CV) system maintains homeostasis. The utility of these models is ultimately limited by how much we can trust the accuracy of their predictions . The predictive capability of a model can be measured by uncertainty quantification (UQ). A challenge in implementing UQ procedures is that many published methods require that the model be identifiable . An identifiable model is one with a one-to-one mapping from the parameter space to the model output . In this paper we use a novel and reproducible methodology to calibrate a lumped-parameter CV model to left ventricular pressure and volume time series data from rats . Key steps in our methodology include using (1) literature and available data to define a set of nominal parameter values specific to each rat ; (2) sensitivity analysis and subset selection to determine a set of identifiable parameters; (3) optimization to find a point estimate for identifiable parameters; and (4) both frequentist and Bayesian UQ methods to assess the predictive capability of the model .", "after_revision": "Mathematical models are essential tools to study how the cardiovascular system maintains homeostasis. The utility of such models is limited by the accuracy of their predictions , which can be determined by uncertainty quantification (UQ). A challenge associated with the use of UQ is that many published methods assume that the underlying model is identifiable (e.g. that a one-to-one mapping exists from the parameter space to the model output ) . In this study we present a novel methodology that is used here to calibrate a lumped-parameter model to left ventricular pressure and volume time series data sets . Key steps include using (1) literature and available data to determine nominal parameter values ; (2) sensitivity analysis and subset selection to determine a set of identifiable parameters; (3) optimization to find a point estimate for identifiable parameters; and (4) frequentist and Bayesian UQ calculations to assess the predictive capability of the model . Our results show that it is possible to determine 5 identifiable model parameters that can be estimated to our experimental data from three rats, and that computed UQ intervals capture the measurement and model error .", "edit_actions": [{"type": "R", "before": "of the circulation continue to be an essential tool", "after": "are essential tools", "start_char_pos": 20, "end_char_pos": 71}, {"type": "D", "before": "(CV)", "after": null, "start_char_pos": 104, "end_char_pos": 108}, {"type": "R", "before": "these models is ultimately limited by how much we can trust", "after": "such models is limited by", "start_char_pos": 154, "end_char_pos": 213}, {"type": "R", "before": ". The predictive capability of a model can be measured", "after": ", which can be determined", "start_char_pos": 248, "end_char_pos": 302}, {"type": "R", "before": "in implementing UQ procedures", "after": "associated with the use of UQ", "start_char_pos": 351, "end_char_pos": 380}, {"type": "R", "before": "require that the model be identifiable . An identifiable model is one with", "after": "assume that the underlying model is identifiable (e.g. that", "start_char_pos": 412, "end_char_pos": 486}, {"type": "A", "before": null, "after": "exists", "start_char_pos": 508, "end_char_pos": 508}, {"type": "A", "before": null, "after": ")", "start_char_pos": 554, "end_char_pos": 554}, {"type": "R", "before": "paper we use a novel and reproducible methodology", "after": "study we present a novel methodology that is used here", "start_char_pos": 565, "end_char_pos": 614}, {"type": "D", "before": "CV", "after": null, "start_char_pos": 647, "end_char_pos": 649}, {"type": "R", "before": "from rats", "after": "sets", "start_char_pos": 713, "end_char_pos": 722}, {"type": "D", "before": "in our methodology", "after": null, "start_char_pos": 735, "end_char_pos": 753}, {"type": "R", "before": "define a set of", "after": "determine", "start_char_pos": 805, "end_char_pos": 820}, {"type": "D", "before": "specific to each rat", "after": null, "start_char_pos": 846, "end_char_pos": 866}, {"type": "D", "before": "both", "after": null, "start_char_pos": 1041, "end_char_pos": 1045}, {"type": "R", "before": "methods", "after": "calculations", "start_char_pos": 1074, "end_char_pos": 1081}, {"type": "A", "before": null, "after": ". Our results show that it is possible to determine 5 identifiable model parameters that can be estimated to our experimental data from three rats, and that computed UQ intervals capture the measurement and model error", "start_char_pos": 1131, "end_char_pos": 1131}], "sents_char_pos": [0, 138, 249, 338, 452, 556, 868, 961, 1032]}
+{"doc_id": "1710.09797", "revision_depth": "1", "before_revision": "Consider a countably infinite collection of coupled queuesrepresenting a large wireless network with a queue at each point of the d-dimensional integer grid . These queues have independent Poisson arrivals, but are coupled through their service rateswhich is the signal to interference ratio of wireless network theory. More precisely, the service discipline is translation invariant and of the processor sharing type,with the service rate in each queue slowed down, when the neighboring queues have a larger workload. The dynamics is infinite dimensional Markov, with each queue having a non compact state space . It is neither reversible nor asymptotically product form, as in the mean-field setting . Coupling and percolation techniques are first used to show that this dynamics has well defined trajectories. Coupling from the past techniques of the Loynes' type are then proposed to build its minimal stationary regime. This regime is the one obtained when starting from the all empty initial condition in the distant past. The rate conservation principle of Palm calculus is then used to identify the stability condition of this system, namely the condition on the interference sequence and arrival rates guaranteeing the finiteness of this minimal regime . Remarkably, the rate conservation principle also provides a closed form expression for its mean queue size. When the stability condition holds, this minimal solution is the unique stationary regime, provided it has finite second moments, and this is the case if the arrival rate is small enough . In addition, there exists a range of small initial conditions for which the dynamics is attracted to the minimal regime. Surprisingly however , there exists another range of larger though finite initial conditions for which the dynamics diverges, even though stability criterion holds.", "after_revision": "Consider a countably infinite collection of interacting queues, with a queue located at each point of the d-dimensional integer grid , having independent Poisson arrivals, but dependent service rates. The service discipline is of the processor sharing type,with the service rate in each queue slowed down, when the neighboring queues have a larger workload. The interactions are translation invariant in space and is neither of the Jackson Networks type, nor of the mean-field type . Coupling and percolation techniques are first used to show that this dynamics has well defined trajectories. Coupling from the past techniques are then proposed to build its minimal stationary regime. The rate conservation principle of Palm calculus is then used to identify the stability condition of this system, where the notion of stability is appropriately defined for an infinite dimensional process. We show that the identified condition is also necessary in certain special cases and conjecture it to be true in all cases . Remarkably, the rate conservation principle also provides a closed form expression for the mean queue size. When the stability condition holds, this minimal solution is the unique translation invariant stationary regime . In addition, there exists a range of small initial conditions for which the dynamics is attracted to the minimal regime. Nevertheless , there exists another range of larger though finite initial conditions for which the dynamics diverges, even though stability criterion holds.", "edit_actions": [{"type": "R", "before": "coupled queuesrepresenting a large wireless network", "after": "interacting queues,", "start_char_pos": 44, "end_char_pos": 95}, {"type": "A", "before": null, "after": "located", "start_char_pos": 109, "end_char_pos": 109}, {"type": "R", "before": ". These queues have", "after": ", having", "start_char_pos": 158, "end_char_pos": 177}, {"type": "R", "before": "are coupled through their service rateswhich is the signal to interference ratio of wireless network theory. More precisely, the", "after": "dependent service rates. The", "start_char_pos": 212, "end_char_pos": 340}, {"type": "D", "before": "translation invariant and", "after": null, "start_char_pos": 363, "end_char_pos": 388}, {"type": "R", "before": "dynamics is infinite dimensional Markov, with each queue having a non compact state space . It is neither reversible nor asymptotically product form, as in", "after": "interactions are translation invariant in space and is neither of the Jackson Networks type, nor of", "start_char_pos": 524, "end_char_pos": 679}, {"type": "R", "before": "setting", "after": "type", "start_char_pos": 695, "end_char_pos": 702}, {"type": "D", "before": "of the Loynes' type", "after": null, "start_char_pos": 848, "end_char_pos": 867}, {"type": "D", "before": "This regime is the one obtained when starting from the all empty initial condition in the distant past.", "after": null, "start_char_pos": 926, "end_char_pos": 1029}, {"type": "R", "before": "namely the condition on the interference sequence and arrival rates guaranteeing the finiteness of this minimal regime", "after": "where the notion of stability is appropriately defined for an infinite dimensional process. We show that the identified condition is also necessary in certain special cases and conjecture it to be true in all cases", "start_char_pos": 1144, "end_char_pos": 1262}, {"type": "R", "before": "its", "after": "the", "start_char_pos": 1352, "end_char_pos": 1355}, {"type": "R", "before": "stationary regime, provided it has finite second moments, and this is the case if the arrival rate is small enough", "after": "translation invariant stationary regime", "start_char_pos": 1445, "end_char_pos": 1559}, {"type": "R", "before": "Surprisingly however", "after": "Nevertheless", "start_char_pos": 1683, "end_char_pos": 1703}], "sents_char_pos": [0, 159, 320, 519, 615, 813, 925, 1029, 1372, 1561, 1682]}
+{"doc_id": "1710.10711", "revision_depth": "1", "before_revision": "We study fractional stochastic volatility models for the asset price , in which the volatility process is a positive continuous function \\sigma of a continuous fractional stochastic process B. The main result obtained in the present paper is a generalization of the large deviation principle for the log-price process due to M. Forde and H. Zhang. In their work, Forde and Zhang assume that the function \\sigma satisfies a global H\\\"{o is fractional Brownian motion, whereas in the present paper , the function \\sigma satisfies a very mild condition expressed in terms of a local modulus of continuity , while the process \\widehat{B} is a general Volterra type Gaussian process. Welder condition and the process }\\widehat{B} establish a small-noise large deviation principle for the log-price in a fractional stochastic volatility model, and under an additional condition of self-similarity of the process \\widehat{B}, derive a similar large deviation principle in the small-time regime. Using the latter result , we obtain asymptotic formulas for binary options, call and put options , and the implied volatility in the small-maturity small-log-moneyness regime .", "after_revision": "We study fractional stochastic volatility models for asset prices , in which the volatility process is a positive continuous function \\sigma of a continuous fractional stochastic process B. The main results obtained in the present paper are generalizations of small-noise and small-time large deviation principles for the log-price process due to Forde and Zhang. It is assumed in the present paper that the function \\sigma satisfies a relatively mild condition expressed in terms of its local modulus of continuity in L^2 , while the process \\widehat{B} is a Volterra type Gaussian process. The assumptions used by Forde and Zhang are more restrictive. It is supposed in their work that the function \\sigma satisfies the global H\\\"{older condition and the process }\\widehat{B} is fractional Brownian motion. In the present paper, we establish a small-noise large deviation principle for the log-price in a fractional stochastic volatility model, and under an additional assumption of the self-similarity of the process \\widehat{B}, derive a similar large deviation principle in the small-time regime. As an application , we obtain asymptotic formulas for binary options, call and put pricing functions , and the implied volatility in certain mixed regimes .", "edit_actions": [{"type": "R", "before": "the asset price", "after": "asset prices", "start_char_pos": 53, "end_char_pos": 68}, {"type": "R", "before": "result", "after": "results", "start_char_pos": 202, "end_char_pos": 208}, {"type": "R", "before": "is a generalization of the large deviation principle", "after": "are generalizations of small-noise and small-time large deviation principles", "start_char_pos": 239, "end_char_pos": 291}, {"type": "D", "before": "M. Forde and H. Zhang. In their work, Forde and Zhang assume that the function \\sigma satisfies a global H\\\"{o", "after": null, "start_char_pos": 325, "end_char_pos": 435}, {"type": "R", "before": "is fractional Brownian motion, whereas", "after": "Forde and Zhang. It is assumed", "start_char_pos": 436, "end_char_pos": 474}, {"type": "R", "before": ",", "after": "that", "start_char_pos": 496, "end_char_pos": 497}, {"type": "R", "before": "very", "after": "relatively", "start_char_pos": 530, "end_char_pos": 534}, {"type": "R", "before": "a", "after": "its", "start_char_pos": 572, "end_char_pos": 573}, {"type": "A", "before": null, "after": "in L^2", "start_char_pos": 602, "end_char_pos": 602}, {"type": "D", "before": "general", "after": null, "start_char_pos": 640, "end_char_pos": 647}, {"type": "R", "before": "We", "after": "The assumptions used by Forde and Zhang are more restrictive. It is supposed in their work that the function \\sigma satisfies the global H\\\"{o", "start_char_pos": 680, "end_char_pos": 682}, {"type": "A", "before": null, "after": "is fractional Brownian motion. In the present paper, we", "start_char_pos": 726, "end_char_pos": 726}, {"type": "R", "before": "condition of", "after": "assumption of the", "start_char_pos": 864, "end_char_pos": 876}, {"type": "R", "before": "Using the latter result", "after": "As an application", "start_char_pos": 990, "end_char_pos": 1013}, {"type": "R", "before": "options", "after": "pricing functions", "start_char_pos": 1079, "end_char_pos": 1086}, {"type": "R", "before": "the small-maturity small-log-moneyness regime", "after": "certain mixed regimes", "start_char_pos": 1119, "end_char_pos": 1164}], "sents_char_pos": [0, 192, 347, 679, 989]}
+{"doc_id": "1711.07677", "revision_depth": "1", "before_revision": "Understanding the structure of interactions between corporate firms is critical to identify risk concentration and the possible pathways of propagation of financial distress. In this paper we consider the in- teraction due to payments and, by investigating a large proprietary dataset of Italian firms, we characterize the topological properties of the payment network. We then focus on the relation between the net- work of payments and the risk of firms. We show the existence of an homophily of risk, i.e. the tendency of firms with similar risk pro- file to be statistically more connected among themselves. This effect is observed both when considering pairs of firms and when consider- ing communities or hierarchies identified in the network. By applying machine learning techniques, we leverage this knowledge to show that network properties of a node can be used to predict the missing rating of a firm . Our results suggest that risk assessment should take quan- titatively into account also the network of interactions among firms .", "after_revision": "This paper provides empirical evidences that corporate firms risk assessment could benefit from taking quantitatively into account the network of interactions among firms. Indeed, the structure of interactions between firms is critical to identify risk concentration and the possible pathways of propagation of financial distress. In this work, we consider the interactions by investigating a large proprietary dataset of payments among Italian firms. We first characterise the topological properties of the payment networks, and then we focus our attention on the relation between the network and the risk of firms. Our main finding is to document the existence of an homophily of risk, i.e. the tendency of firms with similar risk profile to be statistically more connected among themselves. This effect is observed when considering both pairs of firms and communities or hierarchies identified in the network. We leverage this knowledge to predict the missing rating of a firm using only network properties of a node by means of machine learning methods .", "edit_actions": [{"type": "R", "before": "Understanding the", "after": "This paper provides empirical evidences that corporate firms risk assessment could benefit from taking quantitatively into account the network of interactions among firms. Indeed, the", "start_char_pos": 0, "end_char_pos": 17}, {"type": "D", "before": "corporate", "after": null, "start_char_pos": 52, "end_char_pos": 61}, {"type": "R", "before": "paper", "after": "work,", "start_char_pos": 183, "end_char_pos": 188}, {"type": "R", "before": "in- teraction due to payments and,", "after": "interactions", "start_char_pos": 205, "end_char_pos": 239}, {"type": "R", "before": "Italian firms, we characterize", "after": "payments among Italian firms. We first characterise", "start_char_pos": 288, "end_char_pos": 318}, {"type": "R", "before": "network. We then focus", "after": "networks, and then we focus our attention", "start_char_pos": 361, "end_char_pos": 383}, {"type": "R", "before": "net- work of payments", "after": "network", "start_char_pos": 412, "end_char_pos": 433}, {"type": "R", "before": "We show", "after": "Our main finding is to document", "start_char_pos": 457, "end_char_pos": 464}, {"type": "R", "before": "pro- file", "after": "profile", "start_char_pos": 549, "end_char_pos": 558}, {"type": "R", "before": "both when considering", "after": "when considering both", "start_char_pos": 636, "end_char_pos": 657}, {"type": "D", "before": "when consider- ing", "after": null, "start_char_pos": 677, "end_char_pos": 695}, {"type": "R", "before": "By applying machine learning techniques, we", "after": "We", "start_char_pos": 750, "end_char_pos": 793}, {"type": "D", "before": "show that network properties of a node can be used to", "after": null, "start_char_pos": 821, "end_char_pos": 874}, {"type": "R", "before": ". Our results suggest that risk assessment should take quan- titatively into account also the network of interactions among firms", "after": "using only network properties of a node by means of machine learning methods", "start_char_pos": 912, "end_char_pos": 1041}], "sents_char_pos": [0, 174, 369, 456, 611, 749, 913]}
+{"doc_id": "1712.01790", "revision_depth": "2", "before_revision": "Network analysis has driven key developments in animal behavior research by providing quantitative methods to study the social structures of animal groups and populations. A recent advancement in network science,multilayer network analysis , the study of network structures of multiple interconnected 'layers' and associated dynamical processes, offers a novel way to represent and analyze animal behavior. It also helps strengthen the links between animal social behavior and broader ecological and evolutionary contexts and processes. In this article, we describe how to encode animal behavior data as different types of multilayer networks, and we link recently-developed multilayer methods to individual-, group-, population-, and evolutionary-level questions in behavioral ecology. We outline a variety of examples for how to apply multilayer methods in behavioral ecology research, including examples that demonstrate how taking a multilayer approach can alter inferences about social structure and the positions of individuals within such a structure. These new insights have consequences for ecological processes such as disease transmission. We also discuss caveats to undertaking multilayer network analysis in the study of animal social networks, and we outline methodological challenges for the application of these approaches. Multilayer network analysis offers a promising approach for tackling classical research questions from a new perspective, and it opens a plethora of new questions that have thus far been out of reach .", "after_revision": "Network analysis has driven key developments in animal behaviour research by providing quantitative methods to study the social structures of animal groups and populations. A recent formalism, known as multilayer network analysis, has advanced the study of multifaceted networked systems and offers a novel way to represent and analyse animal behaviour as connected `layers' of interactions. In this article, we outline the types of behavioural data and questions that may be suitable to study using multilayer network analysis. We detail several multilayer methods, which can provide new insights into questions about animal sociality at the individual-, group-, population-, and evolutionary-levels. We give examples for how to implement multilayer methods to demonstrate how taking a multilayer approach can alter inferences about social structure and the positions of individuals within such a structure. Finally, we discuss caveats to undertaking multilayer network analysis in the study of animal social networks, and we call attention to methodological challenges for the application of these approaches. Our aim is to instigate the study of new questions about animal sociality using the new toolbox of multilayer network analysis .", "edit_actions": [{"type": "R", "before": "behavior", "after": "behaviour", "start_char_pos": 55, "end_char_pos": 63}, {"type": "D", "before": "advancement in network science,", "after": null, "start_char_pos": 181, "end_char_pos": 212}, {"type": "D", "before": "multilayer network analysis", "after": null, "start_char_pos": 212, "end_char_pos": 239}, {"type": "R", "before": ",", "after": "formalism, known as multilayer network analysis, has advanced", "start_char_pos": 240, "end_char_pos": 241}, {"type": "R", "before": "network structures of multiple interconnected 'layers' and associated dynamical processes,", "after": "multifaceted networked systems and", "start_char_pos": 255, "end_char_pos": 345}, {"type": "R", "before": "analyze animal behavior. It also helps strengthen the links between animal social behavior and broader ecological and evolutionary contexts and processes.", "after": "analyse animal behaviour as connected `layers' of interactions.", "start_char_pos": 382, "end_char_pos": 536}, {"type": "R", "before": "describe how to encode animal behavior data as different types of multilayer networks, and we link recently-developed multilayer methods to", "after": "outline the types of behavioural data and questions that may be suitable to study using multilayer network analysis. We detail several multilayer methods, which can provide new insights into questions about animal sociality at the", "start_char_pos": 557, "end_char_pos": 696}, {"type": "R", "before": "evolutionary-level questions in behavioral ecology. We outline a variety of", "after": "evolutionary-levels. We give", "start_char_pos": 735, "end_char_pos": 810}, {"type": "R", "before": "apply multilayer methods in behavioral ecology research, including examples that", "after": "implement multilayer methods to", "start_char_pos": 831, "end_char_pos": 911}, {"type": "R", "before": "These new insights have consequences for ecological processes such as disease transmission. We also", "after": "Finally, we", "start_char_pos": 1059, "end_char_pos": 1158}, {"type": "R", "before": "outline", "after": "call attention to", "start_char_pos": 1265, "end_char_pos": 1272}, {"type": "R", "before": "Multilayer network analysis offers a promising approach for tackling classical research questions from a new perspective, and it opens a plethora", "after": "Our aim is to instigate the study", "start_char_pos": 1340, "end_char_pos": 1485}, {"type": "R", "before": "that have thus far been out of reach", "after": "about animal sociality using the new toolbox of multilayer network analysis", "start_char_pos": 1503, "end_char_pos": 1539}], "sents_char_pos": [0, 171, 406, 536, 786, 1058, 1150, 1339]}
+{"doc_id": "1712.02949", "revision_depth": "1", "before_revision": "\\Re{R} \\eps{\\varepsilon} \\Net{S} \\tldO{{O}} \\body{C} We revisit the problem of building weak%DIFDELCMD < \\eps%%% -nets for convex ranges over a point set in \\Re^d. Unfortunately, the known constructions of weak%DIFDELCMD < \\eps%%% -nets yields sets that are of size \\Omega(%DIFDELCMD < \\eps%%% ^{-d e^{c d^2} ) }%DIFDELCMD < \\Bigr.%%% , where c is some constant. We offer two alternative schemes that yield significantly smaller sets, and two related results, as follows: (A)Let%DIFDELCMD < \\Net %%% be a sample of size ] \\tldO(d ^2%DIFDELCMD < \\eps%%% ^{-1 , where \\tldO hides polylogarithmic terms. Given a convex body%DIFDELCMD < \\body%%% , via a separation oracle, the algorithm performs a small sequence of (oracle) stabbing queries (computed from%DIFDELCMD < \\Net%%% ) -- if none of the query points hits%DIFDELCMD < \\body%%% , then%DIFDELCMD < \\body %%% contains less than an%DIFDELCMD < \\eps%%% -fraction of the input points. The number of stabbing queries performed is O( d^2\\log%DIFDELCMD < \\eps%%% ^{-1 \\tldO(d ^9%DIFDELCMD < \\eps%%% ^{-1 is the first weak%DIFDELCMD < \\eps%%% -net related construction where all constants/bounds are polynomial in the dimension. (B) If one is allowed to expand the convex range before checking if it intersects the sample, then a sample of size%DIFDELCMD < \\Bigl.\\tldO%%% (%DIFDELCMD < \\eps%%% ^{-(d+1)/2), from the original point set, is sufficient to form a net. (C) We show a construction of weak }%DIFDELCMD < \\eps%%% -nets which have the following additional property: For a heavy body, there is a net point that stabs the body, and it is also a good centerpoint for the points contained inside the body. (D) We present a variant of a known algorithm for approximating a centerpoint, improving the running time from%DIFDELCMD < \\tldO%%% (d^9) to%DIFDELCMD < \\tldO%%% (d^7). Our analysis of this algorithmis arguably cleaner than the previous version .", "after_revision": "\\Re{R} \\eps{\\varepsilon} \\Net{S} \\tldO{{O}} \\body{C} We revisit %DIFDELCMD < \\eps%%% %DIFDELCMD < \\eps%%% %DIFDELCMD < \\eps%%% e^{c d^2} ) }%DIFDELCMD < \\Bigr.%%% %DIFDELCMD < \\Net %%% an algorithm of Clarkson etal CEMST96], that computes (roughly) a 1/(4d^2)-centerpoint in \\tldO(d %DIFDELCMD < \\eps%%% ^9) time, for a point set in \\Re^d , where \\tldO hides polylogarithmic terms. %DIFDELCMD < \\body%%% %DIFDELCMD < \\Net%%% %DIFDELCMD < \\body%%% %DIFDELCMD < \\body %%% %DIFDELCMD < \\eps%%% %DIFDELCMD < \\eps%%% We present an improved algorithm that computes (roughly) a 1/d^2-centerpoint with running time \\tldO(d %DIFDELCMD < \\eps%%% ^7). While the improvements are (arguably) mild, it is the first %DIFDELCMD < \\eps%%% %DIFDELCMD < \\Bigl.\\tldO%%% %DIFDELCMD < \\eps%%% ), from the original point set, is sufficient to form a net. (C) We show a construction of weak }%DIFDELCMD < \\eps%%% %DIFDELCMD < \\tldO%%% %DIFDELCMD < \\tldO%%% progress on this well known problem in over twenty years. The new algorithm is simpler, and the running time bound follows by a simple random walk argument, which we believe to be of independent interest. We also present several new applications of the improved centerpoint algorithm .", "edit_actions": [{"type": "D", "before": "the problem of building weak", "after": null, "start_char_pos": 64, "end_char_pos": 92}, {"type": "D", "before": "-nets for convex ranges over a point set in \\Re^d. Unfortunately, the known constructions of weak", "after": null, "start_char_pos": 113, "end_char_pos": 210}, {"type": "D", "before": "-nets yields sets that are of size \\Omega(", "after": null, "start_char_pos": 231, "end_char_pos": 273}, {"type": "D", "before": "^{-d", "after": null, "start_char_pos": 294, "end_char_pos": 298}, {"type": "D", "before": ", where c is some constant. We offer two alternative schemes that yield significantly smaller sets, and two related results, as follows: (A)Let", "after": null, "start_char_pos": 335, "end_char_pos": 478}, {"type": "R", "before": "be a sample of size", "after": "an algorithm of Clarkson etal", "start_char_pos": 500, "end_char_pos": 519}, {"type": "A", "before": null, "after": "CEMST96", "start_char_pos": 520, "end_char_pos": 520}, {"type": "A", "before": null, "after": ", that computes (roughly) a 1/(4d^2)-centerpoint in", "start_char_pos": 521, "end_char_pos": 521}, {"type": "D", "before": "^2", "after": null, "start_char_pos": 530, "end_char_pos": 532}, {"type": "R", "before": "^{-1", "after": "^9) time, for a point set in \\Re^d", "start_char_pos": 553, "end_char_pos": 557}, {"type": "D", "before": "Given a convex body", "after": null, "start_char_pos": 601, "end_char_pos": 620}, {"type": "D", "before": ", via a separation oracle, the algorithm performs a small sequence of (oracle) stabbing queries (computed from", "after": null, "start_char_pos": 642, "end_char_pos": 752}, {"type": "D", "before": ") -- if none of the query points hits", "after": null, "start_char_pos": 773, "end_char_pos": 810}, {"type": "D", "before": ", then", "after": null, "start_char_pos": 832, "end_char_pos": 838}, {"type": "D", "before": "contains less than an", "after": null, "start_char_pos": 861, "end_char_pos": 882}, {"type": "D", "before": "-fraction of the input points. The number of stabbing queries performed is O( d^2\\log", "after": null, "start_char_pos": 903, "end_char_pos": 988}, {"type": "R", "before": "^{-1", "after": "We present an improved algorithm that computes (roughly) a 1/d^2-centerpoint with running time", "start_char_pos": 1009, "end_char_pos": 1013}, {"type": "D", "before": "^9", "after": null, "start_char_pos": 1022, "end_char_pos": 1024}, {"type": "R", "before": "^{-1", "after": "^7). While the improvements are (arguably) mild, it", "start_char_pos": 1045, "end_char_pos": 1049}, {"type": "D", "before": "weak", "after": null, "start_char_pos": 1063, "end_char_pos": 1067}, {"type": "D", "before": "-net related construction where all constants/bounds are polynomial in the dimension. (B) If one is allowed to expand the convex range before checking if it intersects the sample, then a sample of size", "after": null, "start_char_pos": 1088, "end_char_pos": 1289}, {"type": "D", "before": "(", "after": null, "start_char_pos": 1317, "end_char_pos": 1318}, {"type": "D", "before": "^{-(d+1)/2", "after": null, "start_char_pos": 1339, "end_char_pos": 1349}, {"type": "D", "before": "-nets which have the following additional property: For a heavy body, there is a net point that stabs the body, and it is also a good centerpoint for the points contained inside the body. (D) We present a variant of a known algorithm for approximating a centerpoint, improving the running time from", "after": null, "start_char_pos": 1467, "end_char_pos": 1765}, {"type": "D", "before": "(d^9) to", "after": null, "start_char_pos": 1787, "end_char_pos": 1795}, {"type": "R", "before": "(d^7). Our analysis of this algorithmis arguably cleaner than the previous version", "after": "progress on this well known problem in over twenty years. The new algorithm is simpler, and the running time bound follows by a simple random walk argument, which we believe to be of independent interest. We also present several new applications of the improved centerpoint algorithm", "start_char_pos": 1817, "end_char_pos": 1899}], "sents_char_pos": [0, 163, 362, 600, 933, 1173, 1409, 1654, 1823]}
+{"doc_id": "1712.03448", "revision_depth": "1", "before_revision": "We introduce a Random Attention Model (RAM) allowing for a large class of stochastic consideration maps in the context of an otherwise canonical limited attention model for decision theory. The model relies on a new restriction on the unobserved, possibly stochastic consideration map, termedMonotonic Attention , which is intuitive and nests many recent contributions in the literature on limited attention. We develop revealed preference theory within RAM and obtain precise testable implications for observable choice probabilities. Using these results, we show that a set (possibly a singleton) of strict preference orderings compatible with RAM is identifiable from the decision maker's choice probabilities, and establish a representation of this identified set of unobserved preferencesas a collection of inequality constrains on her choice probabilities. Given this nonparametric identification result, we develop uniformly valid inference methods for the (partially) identifiable preferences. We showcase the performance of our proposed econometric methods using simulations, and provide general-purpose software implementation of our estimation and inference results in theR software package\\texttt{ramchoice . Our proposed econometric methods are computationally very fast to implement .", "after_revision": "This paper illustrates how one can deduce preference from observed choices when attention is not only limited but also random. In contrast to earlier approaches, we introduce a Random Attention Model (RAM) where we abstain from any particular attention formation, and instead consider a large class of nonparametric random attention rules. Our model imposes one intuitive condition, termed Monotonic Attention, which captures the idea that each consideration set competes for the decision-maker's attention. We then develop revealed preference theory within RAM and obtain precise testable implications for observable choice probabilities. Based on these theoretical findings, we propose econometric methods for identification, estimation, and inference of the decision maker's preferences. To illustrate the applicability of our results and their concrete empirical content in specific settings, we also develop revealed preference theory and accompanying econometric methods under additional nonparametric assumptions on the consideration set for binary choice problems. Finally, we provide general purpose software implementation of our estimation and inference results \\texttt{ , and showcase their performance using simulations .", "edit_actions": [{"type": "R", "before": "We", "after": "This paper illustrates how one can deduce preference from observed choices when attention is not only limited but also random. In contrast to earlier approaches, we", "start_char_pos": 0, "end_char_pos": 2}, {"type": "R", "before": "allowing for", "after": "where we abstain from any particular attention formation, and instead consider", "start_char_pos": 44, "end_char_pos": 56}, {"type": "D", "before": "stochastic consideration maps in the context of an otherwise canonical limited attention model for decision theory. The model relies on a new restriction on the unobserved, possibly stochastic consideration map, termed", "after": null, "start_char_pos": 74, "end_char_pos": 292}, {"type": "D", "before": "Monotonic Attention", "after": null, "start_char_pos": 292, "end_char_pos": 311}, {"type": "R", "before": ", which is intuitive and nests many recent contributions in the literature on limited", "after": "nonparametric random attention rules. Our model imposes one intuitive condition, termed Monotonic Attention, which captures the idea that each consideration set competes for the decision-maker's", "start_char_pos": 312, "end_char_pos": 397}, {"type": "A", "before": null, "after": "then", "start_char_pos": 412, "end_char_pos": 412}, {"type": "R", "before": "Using these results, we show that a set (possibly a singleton) of strict preference orderings compatible with RAM is identifiable from", "after": "Based on these theoretical findings, we propose econometric methods for identification, estimation, and inference of", "start_char_pos": 537, "end_char_pos": 671}, {"type": "R", "before": "choice probabilities, and establish a representation of this identified set of unobserved preferencesas a collection of inequality constrains on her choice probabilities. Given this nonparametric identification result, we develop uniformly valid inference methods for the (partially) identifiable preferences. We showcase the performance of our proposed econometric methods using simulations, and provide general-purpose", "after": "preferences. To illustrate the applicability of our results and their concrete empirical content in specific settings, we also develop revealed preference theory and accompanying econometric methods under additional nonparametric assumptions on the consideration set for binary choice problems. Finally, we provide general purpose", "start_char_pos": 693, "end_char_pos": 1113}, {"type": "D", "before": "in the", "after": null, "start_char_pos": 1178, "end_char_pos": 1184}, {"type": "D", "before": "R", "after": null, "start_char_pos": 1184, "end_char_pos": 1185}, {"type": "D", "before": "software package", "after": null, "start_char_pos": 1186, "end_char_pos": 1202}, {"type": "D", "before": "ramchoice", "after": null, "start_char_pos": 1210, "end_char_pos": 1219}, {"type": "R", "before": ". Our proposed econometric methods are computationally very fast to implement", "after": ", and showcase their performance using simulations", "start_char_pos": 1220, "end_char_pos": 1297}], "sents_char_pos": [0, 189, 408, 536, 863, 1002, 1221]}
+{"doc_id": "1712.08911", "revision_depth": "1", "before_revision": "In this paper we study the following problem: we are given a set of imprecise points modeled as parallel line segments , and we wish to place a point on each line segment such that the resulting point set maximizes /minimizes the size of the largest /smallest area k-gon. We first study the problem for the case k=3. We show that for a given set of parallel line segments of equal length the largest possible area triangle can be found in O(n \\log n) time , and for line segments of arbitrary length the problem can be solved in O(n ^2) time . Also, we show that the smallest largest-area triangle can be found in O(n^2 \\log n) time . As for finding smallest-area triangles, we show that finding the largest smallest-area triangle is NP-hard , but that the smallest possible area triangle for a set of arbitrary length parallel line segments can be found in O(n^2) time. Finally, we discuss to what extent our results can be generalized to larger values of k .", "after_revision": "Assume we are given a set of parallel line segments in the plane , and we wish to place a point on each line segment such that the resulting point set maximizes or minimizes the area of the largest or smallest triangle in the set. We analyze the complexity of the four resulting computational problems, and we show that three of them admit polynomial-time algorithms, while the fourth is NP-hard. Specifically, we show that maximizing the largest triangle can be done in O(n ^2) time (or in O(n \\log n) time for unit segments); minimizing the largest triangle can be done in O(n^2 \\log n) time ; maximizing the smallest triangle is NP-hard ; but minimizing the smallest triangle can be done in O(n^2) time. We also discuss to what extent our results can be generalized to polygons with k>3 sides .", "edit_actions": [{"type": "R", "before": "In this paper we study the following problem: we", "after": "Assume we", "start_char_pos": 0, "end_char_pos": 48}, {"type": "D", "before": "imprecise points modeled as", "after": null, "start_char_pos": 68, "end_char_pos": 95}, {"type": "A", "before": null, "after": "in the plane", "start_char_pos": 119, "end_char_pos": 119}, {"type": "R", "before": "/minimizes the size", "after": "or minimizes the area", "start_char_pos": 216, "end_char_pos": 235}, {"type": "R", "before": "/smallest area k-gon. We first study the problem for the case k=3. We show that for a given set of parallel line segments of equal length the largest possible area", "after": "or smallest triangle in the set. We analyze the complexity of the four resulting computational problems, and we show that three of them admit polynomial-time algorithms, while the fourth is NP-hard. Specifically, we show that maximizing the largest", "start_char_pos": 251, "end_char_pos": 414}, {"type": "R", "before": "found", "after": "done", "start_char_pos": 431, "end_char_pos": 436}, {"type": "R", "before": "\\log n) time , and for line segments of arbitrary length the problem can be solved", "after": "^2) time (or", "start_char_pos": 444, "end_char_pos": 526}, {"type": "R", "before": "^2) time . Also, we show that the smallest largest-area", "after": "\\log n) time for unit segments); minimizing the largest", "start_char_pos": 534, "end_char_pos": 589}, {"type": "R", "before": "found", "after": "done", "start_char_pos": 606, "end_char_pos": 611}, {"type": "R", "before": ". As for finding smallest-area triangles, we show that finding the largest smallest-area", "after": "; maximizing the smallest", "start_char_pos": 634, "end_char_pos": 722}, {"type": "R", "before": ", but that the smallest possible area triangle for a set of arbitrary length parallel line segments can be found", "after": "; but minimizing the smallest triangle can be done", "start_char_pos": 743, "end_char_pos": 855}, {"type": "R", "before": "Finally, we", "after": "We also", "start_char_pos": 872, "end_char_pos": 883}, {"type": "R", "before": "larger values of k", "after": "polygons with k>3 sides", "start_char_pos": 941, "end_char_pos": 959}], "sents_char_pos": [0, 272, 317, 544, 635, 871]}
+{"doc_id": "1801.00864", "revision_depth": "1", "before_revision": "Limitations in processing capabilities and memory of today's computers make spiking neuron-based (human) whole-brain simulations inevitably characterized by a compromise between bio-plausibility and computational cost. It translates into brain models composed of a reduced number of neurons and a simplified neuron's mathematical model . Taking advantage of the sparse character of brain-like computation, eventdriven technique allows us to carry out efficient simulation of large-scale Spiking Neural Networks (SNN). The recent Leaky Integrate-and-Fire with Latency (LIFL) spiking neuron model is event-driven compatible and exhibits some realistic neuronal features, opening new horizons in whole-brain modelling. In this paper we present FNS, a LIFL-based exact event-driven spiking neural network framework implemented in Java and oriented to wholebrain simulations. FNS combines spiking/synaptic whole-brain modelling with the event-driven approach, allowing us to define heterogeneous modules and multi-scale connectivity with delayed connections and plastic synapses , providing fast simulations at the same time. A novel parallelization strategy is also implemented in order to further speed up simulations . This paper presents mathematical models, software implementation and simulation routines on which FNS is based. Finally, a reduced brain network model (1400 neurons and 45000 synapses) is synthesized on the basis of real brain structural data, and the resulting model activity is compared with associated brain functional (source-space MEG) data . The conducted test shows a good matching between the activity of model and that of the emulated subject, in outstanding simulation times (about 20s for simulating 4s of activity with a normal PC). Dedicated sections of stimuli editing and output synthesis allow the neuroscientist to introduce and extract brain-like signals, respectively.. .", "after_revision": "Limitations in processing capabilities and memory of today's computers make spiking neuron-based (human) whole-brain simulations inevitably characterized by a compromise between bio-plausibility and computational cost. It translates into brain models composed of a reduced number of neurons and a simplified neuron's mathematical model , leading to the search for new simulation strategies . Taking advantage of the sparse character of brain-like computation, the event-driven technique could represent a way to carry out efficient simulation of large-scale Spiking Neural Networks (SNN). The recent Leaky Integrate-and-Fire with Latency (LIFL) spiking neuron model is event-driven compatible and exhibits some realistic neuronal features, opening new avenues for brain modelling. In this paper we introduce FNS, the first LIFL-based spiking neural network framework , which combines spiking/synaptic neural modelling with the event-driven approach, allowing us to define heterogeneous neuron modules and multi-scale connectivity with delayed connections and plastic synapses . In order to allow multi-thread implementations a novel parallelization strategy is also introduced . This paper presents mathematical models, software implementation and simulation routines on which FNS is based. Finally, a brain subnetwork is modeled on the basis of real brain structural data, and the resulting simulated activity is compared with associated brain functional (source-space MEG) data , demonstrating a good matching between the activity of the model and that of the experimetal data. This work aims to lay the groundwork for future event-driven based personalised brain models .", "edit_actions": [{"type": "A", "before": null, "after": ", leading to the search for new simulation strategies", "start_char_pos": 336, "end_char_pos": 336}, {"type": "R", "before": "eventdriven technique allows us", "after": "the event-driven technique could represent a way", "start_char_pos": 407, "end_char_pos": 438}, {"type": "R", "before": "horizons in whole-brain", "after": "avenues for brain", "start_char_pos": 682, "end_char_pos": 705}, {"type": "R", "before": "present FNS, a", "after": "introduce FNS, the first", "start_char_pos": 734, "end_char_pos": 748}, {"type": "D", "before": "exact event-driven", "after": null, "start_char_pos": 760, "end_char_pos": 778}, {"type": "R", "before": "implemented in Java and oriented to wholebrain simulations. FNS", "after": ", which", "start_char_pos": 812, "end_char_pos": 875}, {"type": "R", "before": "whole-brain", "after": "neural", "start_char_pos": 902, "end_char_pos": 913}, {"type": "A", "before": null, "after": "neuron", "start_char_pos": 992, "end_char_pos": 992}, {"type": "R", "before": ", providing fast simulations at the same time. A", "after": ". In order to allow multi-thread implementations a", "start_char_pos": 1076, "end_char_pos": 1124}, {"type": "R", "before": "implemented in order to further speed up simulations", "after": "introduced", "start_char_pos": 1164, "end_char_pos": 1216}, {"type": "R", "before": "reduced brain network model (1400 neurons and 45000 synapses) is synthesized", "after": "brain subnetwork is modeled", "start_char_pos": 1342, "end_char_pos": 1418}, {"type": "R", "before": "model", "after": "simulated", "start_char_pos": 1481, "end_char_pos": 1486}, {"type": "R", "before": ". The conducted test shows", "after": ", demonstrating", "start_char_pos": 1565, "end_char_pos": 1591}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1632, "end_char_pos": 1632}, {"type": "R", "before": "emulated subject, in outstanding simulation times (about 20s for simulating 4s of activity with a normal PC). Dedicated sections of stimuli editing and output synthesis allow the neuroscientist to introduce and extract brain-like signals, respectively..", "after": "experimetal data. This work aims to lay the groundwork for future event-driven based personalised brain models", "start_char_pos": 1655, "end_char_pos": 1908}], "sents_char_pos": [0, 218, 338, 518, 716, 871, 1122, 1218, 1330, 1566, 1764]}
+{"doc_id": "1801.01853", "revision_depth": "1", "before_revision": "Maximum Entropy models can be inferred from large data-sets to uncover how local interactions can generate collective dynamics . Here, we employ such methods to investigate the characteristics of neurons recorded by multielectrode arrays in the cortex of human and monkey throughout states of wakefulness and sleep . Taking advantage of the separation of cells into excitatory and inhibitory types, we construct a model including this biological feature. By comparing the performances of Maximum Entropy models at predicting neural activity in wakefulness and deep sleep, we identify the dominant interactions between neurons in each brain state. We find that during wakefulness, dominant functional interactions are pairwise while during sleep, interactions are population-wide . In particular, inhibitory cells are shown to be strongly tuned to the inhibitory population. This shows that Maximum Entropy models can be useful to analyze data-sets with excitatory and inhibitory cells, and can reveal the role of inhibitory cells URLanizing coherent dynamics in cerebral cortex.", "after_revision": "Maximum Entropy models can be inferred from large data-sets to uncover how collective dynamics emerge from local interactions . Here, such models are employed to investigate neurons recorded by multielectrode arrays in the human and monkey cortex . Taking advantage of the separation of excitatory and inhibitory neuron types, we construct a model including this distinction. This approach allows to shed light upon differences between excitatory and inhibitory activity across different brain states such as wakefulness and deep sleep, in agreement with previous findings. Additionally, Maximum Entropy models can also unveil novel features of neuronal interactions, which are found to be dominated by pairwise interactions during wakefulness, but are population-wide during deep sleep . In particular, inhibitory neurons are observed to be strongly tuned to the inhibitory population. Overall, we demonstrate Maximum Entropy models can be useful to analyze data-sets with classified neuron types, and to reveal the respective roles of excitatory and inhibitory neurons URLanizing coherent dynamics in the cerebral cortex.", "edit_actions": [{"type": "R", "before": "local interactions can generate collective dynamics", "after": "collective dynamics emerge from local interactions", "start_char_pos": 75, "end_char_pos": 126}, {"type": "R", "before": "we employ such methods to investigate the characteristics of", "after": "such models are employed to investigate", "start_char_pos": 135, "end_char_pos": 195}, {"type": "D", "before": "cortex of", "after": null, "start_char_pos": 245, "end_char_pos": 254}, {"type": "R", "before": "throughout states of wakefulness and sleep", "after": "cortex", "start_char_pos": 272, "end_char_pos": 314}, {"type": "D", "before": "cells into", "after": null, "start_char_pos": 355, "end_char_pos": 365}, {"type": "A", "before": null, "after": "neuron", "start_char_pos": 392, "end_char_pos": 392}, {"type": "R", "before": "biological feature. By comparing the performances of Maximum Entropy models at predicting neural activity in", "after": "distinction. This approach allows to shed light upon differences between excitatory and inhibitory activity across different brain states such as", "start_char_pos": 436, "end_char_pos": 544}, {"type": "R", "before": "we identify the dominant interactions between neurons in each brain state. We find that during wakefulness, dominant functional interactions", "after": "in agreement with previous findings. Additionally, Maximum Entropy models can also unveil novel features of neuronal interactions, which are found to be dominated by pairwise interactions during wakefulness, but", "start_char_pos": 573, "end_char_pos": 713}, {"type": "D", "before": "pairwise while during sleep, interactions are", "after": null, "start_char_pos": 718, "end_char_pos": 763}, {"type": "A", "before": null, "after": "during deep sleep", "start_char_pos": 780, "end_char_pos": 780}, {"type": "R", "before": "cells are shown", "after": "neurons are observed", "start_char_pos": 809, "end_char_pos": 824}, {"type": "R", "before": "This shows that", "after": "Overall, we demonstrate", "start_char_pos": 876, "end_char_pos": 891}, {"type": "R", "before": "excitatory and inhibitory cells, and can reveal the role of inhibitory cells", "after": "classified neuron types, and to reveal the respective roles of excitatory and inhibitory neurons", "start_char_pos": 955, "end_char_pos": 1031}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1064, "end_char_pos": 1064}], "sents_char_pos": [0, 128, 455, 647, 782, 875]}
+{"doc_id": "1801.07330", "revision_depth": "1", "before_revision": "We for the first time combine generated adversarial network (GAN) with wide-field light microscopy to achieve deep learning super-resolution under a large field of view (FOV). By appropriately adopting prior microscopy data in an adversarial training, the network can recover a high-resolution, accurate image of new specimen from its single low-resolution measurement. This capacity has been adequately demonstrated by imaging various types of samples, such as USAF resolution target, human pathological slides and fluorescence-labelled fibroblast cells . Their gigapixel, multi-color reconstructions verify a successful GAN-based single image super-resolution procedure. Furthermore, this deep learning-based imaging approach doesn;t necessarily introduce any change to the setup of a conventional wide-filed microscope, reconstructing large FOV ( about 95 mm^2 ), high-resolution ( about 1.7 {\\mu}m) image at a high speed ( in 1 second) . As a result, GAN-microscopy opens a new way to computationally overcome the general challenge of high-throughput , high-resolution microscopy that is originally coupled to the physical limitation of system's optics .", "after_revision": "We combine generative adversarial network (GAN) with light microscopy to achieve deep learning super-resolution under a large field of view (FOV). By appropriately adopting prior microscopy data in an adversarial training, the neural network can recover a high-resolution, accurate image of new specimen from its single low-resolution measurement. Its capacity has been broadly demonstrated via imaging various types of samples, such as USAF resolution target, human pathological slides , fluorescence-labelled fibroblast cells , and deep tissues in transgenic mouse brain, by both wide-field and light-sheet microscopes. The gigapixel, multi-color reconstruction of these samples verifies a successful GAN-based single image super-resolution procedure. We also propose an image degrading model to generate low resolution images for training, making our approach free from the complex image registration during training dataset preparation. After a welltrained network being created, this deep learning-based imaging approach is capable of recovering a large FOV ( ~ 95 mm2 ), high-resolution ( ~ 1.7 {\\mu}m) image at high speed ( within 1 second) , while not necessarily introducing any changes to the setup of existing microscopes .", "edit_actions": [{"type": "R", "before": "for the first time combine generated", "after": "combine generative", "start_char_pos": 3, "end_char_pos": 39}, {"type": "D", "before": "wide-field", "after": null, "start_char_pos": 71, "end_char_pos": 81}, {"type": "A", "before": null, "after": "neural", "start_char_pos": 256, "end_char_pos": 256}, {"type": "R", "before": "This", "after": "Its", "start_char_pos": 371, "end_char_pos": 375}, {"type": "R", "before": "adequately demonstrated by", "after": "broadly demonstrated via", "start_char_pos": 394, "end_char_pos": 420}, {"type": "R", "before": "and", "after": ",", "start_char_pos": 513, "end_char_pos": 516}, {"type": "R", "before": ". Their", "after": ", and deep tissues in transgenic mouse brain, by both wide-field and light-sheet microscopes. The", "start_char_pos": 556, "end_char_pos": 563}, {"type": "R", "before": "reconstructions verify", "after": "reconstruction of these samples verifies", "start_char_pos": 587, "end_char_pos": 609}, {"type": "R", "before": "Furthermore,", "after": "We also propose an image degrading model to generate low resolution images for training, making our approach free from the complex image registration during training dataset preparation. After a welltrained network being created,", "start_char_pos": 674, "end_char_pos": 686}, {"type": "R", "before": "doesn;t necessarily introduce any change to the setup of a conventional wide-filed microscope, reconstructing", "after": "is capable of recovering a", "start_char_pos": 729, "end_char_pos": 838}, {"type": "R", "before": "about", "after": "~", "start_char_pos": 851, "end_char_pos": 856}, {"type": "R", "before": "mm^2", "after": "mm2", "start_char_pos": 860, "end_char_pos": 864}, {"type": "R", "before": "about", "after": "~", "start_char_pos": 886, "end_char_pos": 891}, {"type": "D", "before": "a", "after": null, "start_char_pos": 913, "end_char_pos": 914}, {"type": "R", "before": "in", "after": "within", "start_char_pos": 928, "end_char_pos": 930}, {"type": "D", "before": ". As a result, GAN-microscopy opens a new way to computationally overcome the general challenge of high-throughput", "after": null, "start_char_pos": 941, "end_char_pos": 1055}, {"type": "R", "before": "high-resolution microscopy that is originally coupled to the physical limitation of system's optics", "after": "while not necessarily introducing any changes to the setup of existing microscopes", "start_char_pos": 1058, "end_char_pos": 1157}], "sents_char_pos": [0, 175, 370, 557, 673, 942]}
+{"doc_id": "1801.09212", "revision_depth": "1", "before_revision": "The past decades witness FLOPS (Floating-point Operations per Second) , as an important computation-centric performance metric , guides computer architecture evolution, bridges hardware and software co-design, and provides quantitative performance number for system optimization . However, for emerging datacenter computing (in short, DC) workloads, such as internet services or big data analytics, previous work reports on the modern CPU architecture that the average proportion of floating-point instructions only takes 1\\% and the average FLOPS efficiency is only 0.1\\%, while the average CPU utilization is high as 63\\%. These contradicting performance numbers imply that FLOPS is inappropriate for evaluating DC computer systems. To address the above issue, we propose a new computation-centric metric BOPS (Basic OPerations per Second) . In our definition, Basic Operations include all of arithmetic, logical, comparing and array addressing operations for integer and floating point. BOPS is the average number of BOPs (Basic OPerations) completed each second. To that end, we present a dwarf-based measuring tool to evaluate DC computer systems in terms of our new metrics . On the basis of BOPS, also we propose a new roofline performance model for DC computing . Through the experiments, we demonstrate that our new metrics--BOPS, measuring tool, and new performance modelindeed facilitate DC computer system design and optimization .", "after_revision": "The past decades witness FLOPS (Floating-point Operations per Second) as an important computation-centric performance metric . However, for datacenter (in short, DC) computing workloads, such as Internet services or big data analytics, previous work reports that they have extremely low floating point operation intensity, and the average FLOPS efficiency is only 0.1\\%, while the average IPC is 1.3 (the theoretic IPC is 4 on the Intel Xeon E5600 platform). Furthermore, we reveal that the traditional FLOPS based Roofline performance model is not suitable for modern DC workloads, and gives misleading information for system optimization. These observations imply that FLOPS is inappropriate for evaluating DC computer systems. To address the above issue, we propose a new computation-centric metric BOPs (Basic OPerations ) that measures the efficient work defined by the source code, includes floating-point operations and the arithmetic, logical, comparing , and array addressing parts of integer operations. We define BOPS as the average number of BOPs per second, and propose replacing FLOPS with BOPS to measure DC computer systems . On the basis of BOPS, we propose a new Roofline performance model for DC computing , which we call DC-Roofline model, with which we optimize DC workloads with the improvement varying from 119\\% to 325\\% .", "edit_actions": [{"type": "D", "before": ",", "after": null, "start_char_pos": 70, "end_char_pos": 71}, {"type": "D", "before": ", guides computer architecture evolution, bridges hardware and software co-design, and provides quantitative performance number for system optimization", "after": null, "start_char_pos": 127, "end_char_pos": 278}, {"type": "R", "before": "emerging datacenter computing", "after": "datacenter", "start_char_pos": 294, "end_char_pos": 323}, {"type": "A", "before": null, "after": "computing", "start_char_pos": 339, "end_char_pos": 339}, {"type": "R", "before": "internet", "after": "Internet", "start_char_pos": 359, "end_char_pos": 367}, {"type": "R", "before": "on the modern CPU architecture that the average proportion of floating-point instructions only takes 1\\%", "after": "that they have extremely low floating point operation intensity,", "start_char_pos": 422, "end_char_pos": 526}, {"type": "R", "before": "CPU utilization is high as 63\\%. These contradicting performance numbers", "after": "IPC is 1.3 (the theoretic IPC is 4 on the Intel Xeon E5600 platform). Furthermore, we reveal that the traditional FLOPS based Roofline performance model is not suitable for modern DC workloads, and gives misleading information for system optimization. These observations", "start_char_pos": 593, "end_char_pos": 665}, {"type": "R", "before": "BOPS", "after": "BOPs", "start_char_pos": 808, "end_char_pos": 812}, {"type": "R", "before": "per Second) . In our definition, Basic Operations include all of", "after": ") that measures the efficient work defined by the source code, includes floating-point operations and the", "start_char_pos": 831, "end_char_pos": 895}, {"type": "A", "before": null, "after": ",", "start_char_pos": 927, "end_char_pos": 927}, {"type": "R", "before": "operations for integer and floating point. BOPS is", "after": "parts of integer operations. We define BOPS as", "start_char_pos": 949, "end_char_pos": 999}, {"type": "R", "before": "(Basic OPerations) completed each second. To that end, we present a dwarf-based measuring tool to evaluate", "after": "per second, and propose replacing FLOPS with BOPS to measure", "start_char_pos": 1027, "end_char_pos": 1133}, {"type": "D", "before": "in terms of our new metrics", "after": null, "start_char_pos": 1154, "end_char_pos": 1181}, {"type": "D", "before": "also", "after": null, "start_char_pos": 1206, "end_char_pos": 1210}, {"type": "R", "before": "roofline", "after": "Roofline", "start_char_pos": 1228, "end_char_pos": 1236}, {"type": "R", "before": ". Through the experiments, we demonstrate that our new metrics--BOPS, measuring tool, and new performance modelindeed facilitate DC computer system design and optimization", "after": ", which we call DC-Roofline model, with which we optimize DC workloads with the improvement varying from 119\\% to 325\\%", "start_char_pos": 1272, "end_char_pos": 1443}], "sents_char_pos": [0, 280, 625, 735, 844, 991, 1068, 1183, 1273]}
+{"doc_id": "1801.09212", "revision_depth": "2", "before_revision": "The past decades witness FLOPS (Floating-point Operations per Second) as an important computation-centric performance metric. However, for datacenter (in short, DC) computing workloads, such as Internet services or big data analytics, previous work reports that they have extremely low floating point operation intensity , and the average FLOPS efficiency is only 0.1\\% , while the average IPC is 1.3 (the theoretic IPC is 4 on the Intel Xeon E5600 platform). Furthermore, we reveal that the traditional FLOPS based Roofline performance model is not suitable for modern DC workloads , and gives misleading information for system optimization . These observations imply that FLOPS is inappropriate for evaluating DC computer systems. To address the above issue, we propose a new computation-centric metric BOPs (Basic OPerations ) that measures the efficient work defined by the source code, includes floating-point operations and the arithmetic, logical, comparing , and array addressing parts of integer operations. We define BOPS as the average number of BOPs per second, and propose replacing FLOPS with BOPS to measure DC computer systems. On the basis of BOPS, we propose a new Roofline performance model for DC computing , which we call DC-Roofline model, with which we optimize DC workloads with the improvement varying from 119\\% to 325\\% .", "after_revision": "For datacenter computing workloads, previous work reports that they have extremely low floating point operation intensity . Our experiments also show that the average FLOPS efficiency of the DC workloads is only 0.1\\% . The FLOPS gap is 12X between the two systems equipped with Intel Xeon or Intel Atom processors, but the average user-perceived performance gap of the DC workloads is only 7.4X between them . These observations imply that FLOPS (Floating-point Operations per Second) is inappropriate to evaluate DC computing systems. To address the above issue, we propose BOPS (Basic OPerations per Second), which is the average number of BOPs (Basic OPerations) completed per second, as a new computation-centric metric. BOPs include the integer and floating point computations of arithmetic, logical, comparing and array addressing . The number of BOPs is independent of the underlying system and hardware implementation, and can be calculated through automatically analyzing the source code of the workload. Based on the BOPS metric, an upper bound performance model, named DC-Roofline, is proposed for DC computing . In our experiments, three typical systems equipped with different Intel processors are evaluated using 17 typical DC workloads. The bias between the BOPS gap and the average user-perceived performance gap is no more than 11\\%, and the BOPS efficiency of the Sort workload achieves 32\\%. We optimize the typical DC kernel workloads under the guidance of the DC-Roofline model, and all workloads have achieved performance improvements ranging from 1.1X to 4.4X. Furthermore, as the real DC workload always has million lines of codes and tens of thousands of functions, it is not easy to use the DC-Roofline model directly. We propose an optimization methodology for the real-world DC workloads. Under the guidance of the proposed methodology, we optimize Redis by 1.2X .", "edit_actions": [{"type": "R", "before": "The past decades witness FLOPS (Floating-point Operations per Second) as an important computation-centric performance metric. However, for datacenter (in short, DC)", "after": "For datacenter", "start_char_pos": 0, "end_char_pos": 164}, {"type": "D", "before": "such as Internet services or big data analytics,", "after": null, "start_char_pos": 186, "end_char_pos": 234}, {"type": "R", "before": ", and", "after": ". Our experiments also show that", "start_char_pos": 321, "end_char_pos": 326}, {"type": "A", "before": null, "after": "of the DC workloads", "start_char_pos": 356, "end_char_pos": 356}, {"type": "R", "before": ", while the average IPC is 1.3 (the theoretic IPC is 4 on the Intel Xeon E5600 platform). Furthermore, we reveal that the traditional FLOPS based Roofline performance model is not suitable for modern DC workloads , and gives misleading information for system optimization", "after": ". The FLOPS gap is 12X between the two systems equipped with Intel Xeon or Intel Atom processors, but the average user-perceived performance gap of the DC workloads is only 7.4X between them", "start_char_pos": 371, "end_char_pos": 642}, {"type": "R", "before": "is inappropriate for evaluating DC computer", "after": "(Floating-point Operations per Second) is inappropriate to evaluate DC computing", "start_char_pos": 681, "end_char_pos": 724}, {"type": "R", "before": "a new computation-centric metric BOPs", "after": "BOPS", "start_char_pos": 773, "end_char_pos": 810}, {"type": "R", "before": ") that measures the efficient work defined by the source code, includes floating-point operations and the", "after": "per Second), which is the average number of BOPs (Basic OPerations) completed per second, as a new computation-centric metric. BOPs include the integer and floating point computations of", "start_char_pos": 829, "end_char_pos": 934}, {"type": "D", "before": ",", "after": null, "start_char_pos": 966, "end_char_pos": 967}, {"type": "R", "before": "parts of integer operations. We define BOPS as the average", "after": ". The", "start_char_pos": 989, "end_char_pos": 1047}, {"type": "R", "before": "per second, and propose replacing FLOPS with BOPS to measure DC computer systems. On the basis of BOPS, we propose a new Roofline performance model", "after": "is independent of the underlying system and hardware implementation, and can be calculated through automatically analyzing the source code of the workload. Based on the BOPS metric, an upper bound performance model, named DC-Roofline, is proposed", "start_char_pos": 1063, "end_char_pos": 1210}, {"type": "R", "before": ", which we call", "after": ". In our experiments, three typical systems equipped with different Intel processors are evaluated using 17 typical DC workloads. The bias between the BOPS gap and the average user-perceived performance gap is no more than 11\\%, and the BOPS efficiency of the Sort workload achieves 32\\%. We optimize the typical DC kernel workloads under the guidance of the", "start_char_pos": 1228, "end_char_pos": 1243}, {"type": "R", "before": "model, with which we optimize DC workloads with the improvement varying from 119\\% to 325\\%", "after": "model, and all workloads have achieved performance improvements ranging from 1.1X to 4.4X. Furthermore, as the real DC workload always has million lines of codes and tens of thousands of functions, it is not easy to use the DC-Roofline model directly. We propose an optimization methodology for the real-world DC workloads. Under the guidance of the proposed methodology, we optimize Redis by 1.2X", "start_char_pos": 1256, "end_char_pos": 1347}], "sents_char_pos": [0, 125, 460, 644, 733, 1017, 1144]}
+{"doc_id": "1802.00543", "revision_depth": "1", "before_revision": "The use of multiple drugs , termed polypharmacy, is common to treat patients with complex diseases or co-existing medical conditions. However, a major consequence of polypharmacy is a much higher risk of side effects for the patient. Polypharmacy side effects emerge because of drug interactions, in which activity of one drug may change , favorably or unfavorably, if taken with another drug. The knowledge of drug interactions is limited because these complex relationships are usually not observed in small clinical testing. Discovering polypharmacy side effects thus remains a challenge with significant implications for patient mortality and morbidity. Herewe introduce Decagon, an approach for modeling polypharmacy side effects. The approach constructs a multimodal graph of protein-protein interactions, drug-protein interactions, and the polypharmacy side effects, which are represented as drug-drug interactions, where each side effect is an edge of a different type. Decagon is developed specifically to handle such multimodal graphs with a large number of edge types. Our approach develops a new graph convolutional neural network for multirelational link prediction in multimodal networks. Unlike approaches limited to predicting simple drug-drug interaction values, Decagon can predict the exact side effect, if any, through which a given drug combination manifests clinically. Decagon accurately predicts polypharmacy side effects, outperforming baselines by up to 69\\%. Furthermore, Decagon models particularly well side effects that have a strong molecular basis, while on predominantly non-molecular side effects, it achieves good performance because of effective sharing of model parameters across edge types. Decagon creates an opportunity to use large molecular and patient population data to flag and prioritize polypharmacy side effects for follow-up analysis via formal pharmacological studies .", "after_revision": "The use of drug combinations , termed polypharmacy, is common to treat patients with complex diseases and co-existing conditions. However, a major consequence of polypharmacy is a much higher risk of adverse side effects for the patient. Polypharmacy side effects emerge because of drug-drug interactions, in which activity of one drug may change if taken with another drug. The knowledge of drug interactions is limited because these complex relationships are rare, and are usually not observed in relatively small clinical testing. Discovering polypharmacy side effects thus remains an important challenge with significant implications for patient mortality . Here, we present Decagon, an approach for modeling polypharmacy side effects. The approach constructs a multimodal graph of protein-protein interactions, drug-protein target interactions, and the polypharmacy side effects, which are represented as drug-drug interactions, where each side effect is an edge of a different type. Decagon is developed specifically to handle such multimodal graphs with a large number of edge types. Our approach develops a new graph convolutional neural network for multirelational link prediction in multimodal networks. Decagon predicts the exact side effect, if any, through which a given drug combination manifests clinically. Decagon accurately predicts polypharmacy side effects, outperforming baselines by up to 69\\%. We find that it automatically learns representations of side effects indicative of co-occurrence of polypharmacy in patients. Furthermore, Decagon models particularly well side effects with a strong molecular basis, while on predominantly non-molecular side effects, it achieves good performance because of effective sharing of model parameters across edge types. Decagon creates opportunities to use large pharmacogenomic and patient data to flag and prioritize side effects for follow-up analysis .", "edit_actions": [{"type": "R", "before": "multiple drugs", "after": "drug combinations", "start_char_pos": 11, "end_char_pos": 25}, {"type": "R", "before": "or", "after": "and", "start_char_pos": 99, "end_char_pos": 101}, {"type": "D", "before": "medical", "after": null, "start_char_pos": 114, "end_char_pos": 121}, {"type": "A", "before": null, "after": "adverse", "start_char_pos": 204, "end_char_pos": 204}, {"type": "R", "before": "drug", "after": "drug-drug", "start_char_pos": 279, "end_char_pos": 283}, {"type": "D", "before": ", favorably or unfavorably,", "after": null, "start_char_pos": 339, "end_char_pos": 366}, {"type": "A", "before": null, "after": "rare, and are", "start_char_pos": 481, "end_char_pos": 481}, {"type": "A", "before": null, "after": "relatively", "start_char_pos": 506, "end_char_pos": 506}, {"type": "R", "before": "a", "after": "an important", "start_char_pos": 582, "end_char_pos": 583}, {"type": "R", "before": "and morbidity. Herewe introduce", "after": ". Here, we present", "start_char_pos": 646, "end_char_pos": 677}, {"type": "A", "before": null, "after": "target", "start_char_pos": 828, "end_char_pos": 828}, {"type": "R", "before": "Unlike approaches limited to predicting simple drug-drug interaction values, Decagon can predict", "after": "Decagon predicts", "start_char_pos": 1207, "end_char_pos": 1303}, {"type": "A", "before": null, "after": "We find that it automatically learns representations of side effects indicative of co-occurrence of polypharmacy in patients.", "start_char_pos": 1490, "end_char_pos": 1490}, {"type": "R", "before": "that have", "after": "with", "start_char_pos": 1550, "end_char_pos": 1559}, {"type": "R", "before": "an opportunity", "after": "opportunities", "start_char_pos": 1750, "end_char_pos": 1764}, {"type": "R", "before": "molecular and patient population", "after": "pharmacogenomic and patient", "start_char_pos": 1778, "end_char_pos": 1810}, {"type": "D", "before": "polypharmacy", "after": null, "start_char_pos": 1839, "end_char_pos": 1851}, {"type": "D", "before": "via formal pharmacological studies", "after": null, "start_char_pos": 1888, "end_char_pos": 1922}], "sents_char_pos": [0, 133, 234, 394, 530, 660, 738, 981, 1083, 1206, 1395, 1489, 1733]}
+{"doc_id": "1802.04595", "revision_depth": "2", "before_revision": "We provide an epistemic foundation for the cooperative game by proof theory by studying the knowledge needed for players to unanimously accept only core payoffs. We first transform each cooperative game into a decision problem where each player accept or reject each payoff vector . Then we use a modified KD-system in epistemic logic to describe a player's knowledge, decision-making criterion, and reasoning process; especially, we define a formula called C-acceptability to describe the criterion for accepting a core payoff vector. Within this syn- tactical framework, we characterize the core of a cooperative game in terms of each player' s knowledge. Based on that result, we discuss an epistemic inconsistency behind Debreu-Scarf Theorem, that is, the increase of the number of replicas , on one hand, has constant require- ment on each participator 's knowledge in the competitive market, while , on the other hand, requires unbounded epistemic ability for at least one player in the cooperative situation .", "after_revision": "We provide an epistemic foundation for cooperative games by proof theory via studying the knowledge for players unanimously accepting only core payoffs. We first transform each cooperative game into a decision problem where a player can accept or reject any payoff vector offered to her based on her knowledge about available cooperation . Then we use a modified KD-system in epistemic logic , which can be regarded as a counterpart of the model for non-cooperative games in Bonanno (2008), (2015), to describe a player's knowledge, decision-making criterion, and reasoning process; especially, a formula called C-acceptability is defined to capture the criterion for accepting a core payoff vector. Within this syntactical framework, we characterize the core of a cooperative game in terms of players' knowledge. Based on that result, we discuss an epistemic inconsistency behind Debreu-Scarf Theorem, that is, the increase of the number of replicas has invariant requirement on each participant 's knowledge from the aspect of competitive market, while requires unbounded epistemic ability players from the aspect of cooperative game .", "edit_actions": [{"type": "R", "before": "the cooperative game", "after": "cooperative games", "start_char_pos": 39, "end_char_pos": 59}, {"type": "R", "before": "by", "after": "via", "start_char_pos": 76, "end_char_pos": 78}, {"type": "R", "before": "needed for players to unanimously accept", "after": "for players unanimously accepting", "start_char_pos": 102, "end_char_pos": 142}, {"type": "R", "before": "each player", "after": "a player can", "start_char_pos": 233, "end_char_pos": 244}, {"type": "R", "before": "each payoff vector", "after": "any payoff vector offered to her based on her knowledge about available cooperation", "start_char_pos": 262, "end_char_pos": 280}, {"type": "A", "before": null, "after": ", which can be regarded as a counterpart of the model for non-cooperative games in Bonanno (2008), (2015),", "start_char_pos": 335, "end_char_pos": 335}, {"type": "D", "before": "we define", "after": null, "start_char_pos": 432, "end_char_pos": 441}, {"type": "R", "before": "to describe", "after": "is defined to capture", "start_char_pos": 475, "end_char_pos": 486}, {"type": "R", "before": "syn- tactical", "after": "syntactical", "start_char_pos": 549, "end_char_pos": 562}, {"type": "R", "before": "each player' s", "after": "players'", "start_char_pos": 633, "end_char_pos": 647}, {"type": "R", "before": ", on one hand, has constant require- ment on each participator", "after": "has invariant requirement on each participant", "start_char_pos": 796, "end_char_pos": 858}, {"type": "R", "before": "in the", "after": "from the aspect of", "start_char_pos": 872, "end_char_pos": 878}, {"type": "D", "before": ", on the other hand,", "after": null, "start_char_pos": 905, "end_char_pos": 925}, {"type": "R", "before": "for at least one player in the cooperative situation", "after": "players from the aspect of cooperative game", "start_char_pos": 963, "end_char_pos": 1015}], "sents_char_pos": [0, 161, 282, 419, 536, 658]}
+{"doc_id": "1802.08667", "revision_depth": "2", "before_revision": "We provide adaptive inference methods, based on l1 regularizationmethods , for regular (semi-parametric) and non-regular (nonparametric) linear functionals of the conditional expectation function. Examples of regular functionals include average treatment effects, policy effects from covariate distribution shifts and stochastic transformations, and average derivatives. Examples of non-regular functionals include the local linear functionals defined as local averages that approximate perfectly localized quantities: average treatment , average policy effects, and average derivatives , conditional on a covariate subvector fixed at a point. Our construction relies on building Neyman orthogonal equations for the target parameter that are approximately invariant to small perturbations of the nuisance parameters. To achieve this property we include the linear Riesz representer for the functionals in the equations as the additional nuisance parameter. We use l1-regularized methods to learn approximations to the regression function and the linear representer, in settings where dimension of (possibly overcomplete) dictionary of basis functions P is much larger than N. We then estimate the linear functional by the solution to the empirical analog of the orthogonal equations. Our key result is that under weak assumptions the estimator of the functional concentrates in a L/ root(n) neighborhood of the target with deviations controlled by the Gaussian law , provided L/root(n)%DIFDELCMD < \\to %%% 0; L is the operator norm of the functional , measuring the degree of its non-regularity, with L diverging for local functionals (or under weak identification of the global functionals) .", "after_revision": "We provide novel adaptive inference methods, based on \\ell_1 regularization , for regular (semi-parametric) and non-regular (nonparametric) linear functionals of the conditional expectation function. Examples of regular functionals include average treatment effects, policy effects , and derivatives. Examples of non-regular functionals include localized quantities: average treatment effects, policy effects, and derivatives conditional on a covariate subvector fixed at a point. We construct a Neyman orthogonal equation for the target parameter that is approximately invariant to small perturbations of the nuisance parameters. To achieve this property , we include the linear Riesz representer for the functional as an additional nuisance parameter. Under weak assumptions, the estimator of the functional concentrates in a L/ \\sqrt{n neighborhood of the target with deviations controlled by the Gaussian law %DIFDELCMD < \\to %%% . We require that the operator norm L of the functional is small compared to \\sqrt{n .", "edit_actions": [{"type": "A", "before": null, "after": "novel", "start_char_pos": 11, "end_char_pos": 11}, {"type": "R", "before": "l1 regularizationmethods", "after": "\\ell_1 regularization", "start_char_pos": 49, "end_char_pos": 73}, {"type": "R", "before": "from covariate distribution shifts and stochastic transformations, and average", "after": ", and", "start_char_pos": 280, "end_char_pos": 358}, {"type": "D", "before": "the local linear functionals defined as local averages that approximate perfectly", "after": null, "start_char_pos": 416, "end_char_pos": 497}, {"type": "R", "before": ", average", "after": "effects,", "start_char_pos": 538, "end_char_pos": 547}, {"type": "R", "before": "average derivatives ,", "after": "derivatives", "start_char_pos": 568, "end_char_pos": 589}, {"type": "R", "before": "Our construction relies on building Neyman orthogonal equations", "after": "We construct a Neyman orthogonal equation", "start_char_pos": 645, "end_char_pos": 708}, {"type": "R", "before": "are", "after": "is", "start_char_pos": 739, "end_char_pos": 742}, {"type": "A", "before": null, "after": ",", "start_char_pos": 843, "end_char_pos": 843}, {"type": "R", "before": "functionals in the equations as the", "after": "functional as an", "start_char_pos": 892, "end_char_pos": 927}, {"type": "R", "before": "We use l1-regularized methods to learn approximations to the regression function and the linear representer, in settings where dimension of (possibly overcomplete) dictionary of basis functions P is much larger than N. We then estimate the linear functional by the solution to the empirical analog of the orthogonal equations. Our key result is that under weak assumptions", "after": "Under weak assumptions,", "start_char_pos": 959, "end_char_pos": 1331}, {"type": "R", "before": "root(n)", "after": "\\sqrt{n", "start_char_pos": 1385, "end_char_pos": 1392}, {"type": "D", "before": ", provided L/root(n)", "after": null, "start_char_pos": 1467, "end_char_pos": 1487}, {"type": "R", "before": "0; L is", "after": ". We require that", "start_char_pos": 1508, "end_char_pos": 1515}, {"type": "A", "before": null, "after": "L", "start_char_pos": 1534, "end_char_pos": 1534}, {"type": "R", "before": ", measuring the degree of its non-regularity, with L diverging for local functionals (or under weak identification of the global functionals)", "after": "is small compared to \\sqrt{n", "start_char_pos": 1553, "end_char_pos": 1694}], "sents_char_pos": [0, 197, 371, 644, 817, 958, 1177, 1285, 1510]}
+{"doc_id": "1803.03571", "revision_depth": "2", "before_revision": "The occurrence of drug-drug-interactions (DDI) from multiple drug prescriptions is a serious problem, both for individuals and health-care systems, since patients with complications due to DDI are likely to re-enter the system at a costlier level. We present a large-scale longitudinal study of the DDI phenomenon at the primary- and secondary-care level using electronic health records from the city of Blumenau in Southern Brazil (pop. ~340,000). This is the first study of DDI we are aware of that follows an entire city longitudinally for 18 months. We found that 181 distinct drug pairs known to interact were dispensed concomitantly to 12\\% of the patients in the city's public health-care system. Further, 4\\% of the patients were dispensed major DDI combinations, likely to result in very serious adverse reactions and costs we estimate to be larger than previously reported . DDI results are integrated into associative networks for inference and visualization, revealing key medications and interactions . Analysis reveals that women have a 60\\% increased risk of DDI as compared to men; the increase becomes 90\\% when only major DDI are considered. Furthermore, DDI risk increases substantially with age. Patients aged 70-79 years have a 34\\% risk of DDI when they are prescribed two or more drugs concomitantly. Interestingly, a null model demonstrates that age and women-specific risks from increased polypharmacy far exceed expectations in those populations. This suggests that social and biological factors are at play. Finally, we demonstrate that machine learning classifiers accurately predict patients likely to be administered DDI given their history of prescribed drugs, gender , and age (MCC=.7, AUC=.97). These results demonstrate that accurate warning systems for known DDI can be devised for health-care systems leading to substantial reduction of DDI-related adverse reactions and health-care savings .", "after_revision": "The occurrence of drug-drug-interactions (DDI) from multiple drug dispensations is a serious problem, both for individuals and health-care systems, since patients with complications due to DDI are likely to re-enter the system at a costlier level. We present a large-scale longitudinal study (18 months) of the DDI phenomenon at the primary- and secondary-care level using electronic health records (EHR) from the city of Blumenau in Southern Brazil (pop. ~340,000). This is the first study of DDI we are aware of that follows an entire city longitudinally for more than 3 months. We found that 181 distinct drug pairs known to interact were dispensed concomitantly to 12\\% of the patients in the city's public health-care system. Further, 4\\% of the patients were dispensed DDI combinations, likely to result in major adverse reactions with costs estimated to be larger than previously reported in smaller studies . DDI results are integrated into associative networks for inference and visualization, revealing key medications and interactions involved in the DDI phenomenon . Analysis reveals that women have a 60\\% increased risk of DDI as compared to men; the increase becomes 90\\% when only major DDI are considered. Furthermore, DDI risk increases substantially with age. Patients aged 70-79 years have a 34\\% risk of DDI when they are dispensed two or more drugs concomitantly. Interestingly, a null model demonstrates that age- and women-specific risks from increased polypharmacy fail by far to explain the observed risks of DDI in those populations. This suggests that social and biological factors are at play. These results demonstrate that considerable gender and age biases exist, but that accurate warning systems for known DDI can be devised for health-care systems and public-health policy management, to reduce DDI-related adverse reactions and health-care costs .", "edit_actions": [{"type": "R", "before": "prescriptions", "after": "dispensations", "start_char_pos": 66, "end_char_pos": 79}, {"type": "A", "before": null, "after": "(18 months)", "start_char_pos": 292, "end_char_pos": 292}, {"type": "A", "before": null, "after": "(EHR)", "start_char_pos": 388, "end_char_pos": 388}, {"type": "R", "before": "18", "after": "more than 3", "start_char_pos": 545, "end_char_pos": 547}, {"type": "D", "before": "major", "after": null, "start_char_pos": 750, "end_char_pos": 755}, {"type": "R", "before": "very serious adverse reactions and costs we estimate", "after": "major adverse reactions with costs estimated", "start_char_pos": 794, "end_char_pos": 846}, {"type": "A", "before": null, "after": "in smaller studies", "start_char_pos": 885, "end_char_pos": 885}, {"type": "A", "before": null, "after": "involved in the DDI phenomenon", "start_char_pos": 1017, "end_char_pos": 1017}, {"type": "R", "before": "prescribed", "after": "dispensed", "start_char_pos": 1284, "end_char_pos": 1294}, {"type": "R", "before": "age", "after": "age-", "start_char_pos": 1374, "end_char_pos": 1377}, {"type": "R", "before": "far exceed expectations", "after": "fail by far to explain the observed risks of DDI", "start_char_pos": 1431, "end_char_pos": 1454}, {"type": "R", "before": "Finally, we demonstrate that machine learning classifiers accurately predict patients likely to be administered DDI given their history of prescribed drugs, gender , and age (MCC=.7, AUC=.97). These results demonstrate", "after": "These results demonstrate that considerable gender and age biases exist, but", "start_char_pos": 1539, "end_char_pos": 1757}, {"type": "R", "before": "leading to substantial reduction of", "after": "and public-health policy management, to reduce", "start_char_pos": 1841, "end_char_pos": 1876}, {"type": "R", "before": "savings", "after": "costs", "start_char_pos": 1923, "end_char_pos": 1930}], "sents_char_pos": [0, 247, 450, 555, 705, 1101, 1163, 1219, 1327, 1476, 1538, 1731]}
+{"doc_id": "1803.05372", "revision_depth": "1", "before_revision": "Updating an abstract Voronoi diagram in linear time, after deletion of one site , has been an open problemfor a long time. Similarly for various concrete Voronoi diagrams of generalized sites, other than points . In this paper we present a simple, expected linear-time algorithm to update an abstract Voronoi diagram after deletion . We introduce the concept of a Voronoi-like diagram, a relaxed version of a Voronoi construct that has a structure similar to an abstract Voronoi diagram, without however being one. Voronoi-like diagrams serve as intermediate structures, which are considerably simpler to compute, thus, making an expected linear-time construction possible. We formalize the concept and prove that it is robust under an insertionoperation, thus , enabling its use in incremental constructions .", "after_revision": "Updating an abstract Voronoi diagram after deletion of one site in linear time has been a well-known open problem; similarly, for concrete Voronoi diagrams of non-point sites . In this paper , we present an expected linear-time algorithm to update an abstract Voronoi diagram after deletion of one site . We introduce the concept of a Voronoi-like diagram, a relaxed version of an abstract Voronoi construct that has a structure similar to an ordinary Voronoi diagram, without , however, being one. We formalize the concept , and prove that it is robust under insertion , therefore, enabling its use in incremental constructions . The time-complexity analysis of the resulting simple randomized incremental construction is non-standard, and interesting in its own right, because the intermediate Voronoi-like structures are order-dependent. We further extend the approach to compute the following structures in expected linear time: the order-(k+1) subdivision within an order-k Voronoi region, and the farthest abstract Voronoi diagram after the order of its regions at infinity is known .", "edit_actions": [{"type": "D", "before": "in linear time,", "after": null, "start_char_pos": 37, "end_char_pos": 52}, {"type": "R", "before": ", has been an open problemfor a long time. Similarly for various", "after": "in linear time has been a well-known open problem; similarly, for", "start_char_pos": 80, "end_char_pos": 144}, {"type": "R", "before": "generalized sites, other than points", "after": "non-point sites", "start_char_pos": 174, "end_char_pos": 210}, {"type": "R", "before": "we present a simple,", "after": ", we present an", "start_char_pos": 227, "end_char_pos": 247}, {"type": "A", "before": null, "after": "of one site", "start_char_pos": 332, "end_char_pos": 332}, {"type": "R", "before": "a", "after": "an abstract", "start_char_pos": 408, "end_char_pos": 409}, {"type": "R", "before": "abstract", "after": "ordinary", "start_char_pos": 463, "end_char_pos": 471}, {"type": "R", "before": "however", "after": ", however,", "start_char_pos": 497, "end_char_pos": 504}, {"type": "D", "before": "Voronoi-like diagrams serve as intermediate structures, which are considerably simpler to compute, thus, making an expected linear-time construction possible.", "after": null, "start_char_pos": 516, "end_char_pos": 674}, {"type": "A", "before": null, "after": ",", "start_char_pos": 700, "end_char_pos": 700}, {"type": "R", "before": "an insertionoperation, thus", "after": "insertion", "start_char_pos": 735, "end_char_pos": 762}, {"type": "A", "before": null, "after": "therefore,", "start_char_pos": 765, "end_char_pos": 765}, {"type": "A", "before": null, "after": ". The time-complexity analysis of the resulting simple randomized incremental construction is non-standard, and interesting in its own right, because the intermediate Voronoi-like structures are order-dependent. We further extend the approach to compute the following structures in expected linear time: the order-(k+1) subdivision within an order-k Voronoi region, and the farthest abstract Voronoi diagram after the order of its regions at infinity is known", "start_char_pos": 812, "end_char_pos": 812}], "sents_char_pos": [0, 122, 212, 334, 515, 674]}
+{"doc_id": "1803.08341", "revision_depth": "3", "before_revision": "Fast constant factor approximation algorithms are devised for an NP- and W 1%DIFDELCMD < ]%%% -hard problem of intersecting a set of n straight line segments with the smallest cardinality set of disks of fixed radii r>0, where the set of segments forms a straight line drawing G=(V,E) of a planar graph without edge crossings. Exploiting tough connection of the problem with the geometric Hitting Set problem, an \\left(50+52\\frac{12{13}}+ \\varepsilon \\right)-approximate O\\left(n^4\\log n\\right)-time and O\\left(n^2\\log n\\right)-space algorithm is given based on the modified Agarwal-Pan algorithm . More accurate (34+242+ \\varepsilon )- and \\left( 34 + 44\\sqrt{\\frac{6 + \\varepsilon \\right)-approxi\\-mate algorithms are also proposed for cases where G is any subgraph of either an outerplane graph or a Delaunay triangulation respectively, which work within the same time and space complexity bounds, where \\varepsilon >0 is an arbitrary small constant. Moreover, an O(n^2\\log n)-time and O(n^2)-space 18-approximation is designed for the case where G is any subgraph of a Gabriel graph. To the best of our knowledge, related work only tackles the case where E consists of axis-parallel segments, resulting in an O(n\\log n)-time and O(n\\log n)-space 8-approximation .", "after_revision": " %DIFDELCMD < ]%%% An NP-hard problem is considered of intersecting a given set of n straight line segments on the plane with the smallest cardinality set of disks of fixed radii r>0, where the set of segments forms a straight line drawing G=(V,E) of a planar graph without proper edge crossings. To the best of our knowledge, related work only tackles a setting where E consists of (generally, properly overlapping) axis-parallel segments, resulting in an O(n\\log n)-time and O(n\\log n)-space 8-approximation algorithm. Exploiting tough connection of the problem with the geometric Hitting Set problem, an \\left(50+52\\frac{12{13}}+ \\nu \\right)-approximate O\\left(n^4\\log n\\right)-time and O\\left(n^2\\log n\\right)-space algorithm is devised based on the modified Agarwal-Pan algorithm , which uses epsilon nets . More accurate (34+242+ \\nu )- and \\left( \\frac{144 + 32\\sqrt{\\frac{3 + \\nu \\right)-approxi\\-mate algorithms are also proposed for cases where G is any subgraph of either a generalized outerplane graph or a Delaunay triangulation respectively, which work within the same time and space complexity bounds, where \\nu >0 is an arbitrarily small constant .", "edit_actions": [{"type": "D", "before": "Fast constant factor approximation algorithms are devised for an NP- and W", "after": null, "start_char_pos": 0, "end_char_pos": 74}, {"type": "D", "before": "1", "after": null, "start_char_pos": 75, "end_char_pos": 76}, {"type": "R", "before": "-hard problem", "after": "An NP-hard problem is considered", "start_char_pos": 94, "end_char_pos": 107}, {"type": "A", "before": null, "after": "given", "start_char_pos": 126, "end_char_pos": 126}, {"type": "A", "before": null, "after": "on the plane", "start_char_pos": 159, "end_char_pos": 159}, {"type": "A", "before": null, "after": "proper", "start_char_pos": 313, "end_char_pos": 313}, {"type": "A", "before": null, "after": "To the best of our knowledge, related work only tackles a setting where E consists of (generally, properly overlapping) axis-parallel segments, resulting in an O(n\\log n)-time and O(n\\log n)-space 8-approximation algorithm.", "start_char_pos": 330, "end_char_pos": 330}, {"type": "R", "before": "\\varepsilon", "after": "\\nu", "start_char_pos": 443, "end_char_pos": 454}, {"type": "R", "before": "given", "after": "devised", "start_char_pos": 551, "end_char_pos": 556}, {"type": "A", "before": null, "after": ", which uses epsilon nets", "start_char_pos": 601, "end_char_pos": 601}, {"type": "R", "before": "\\varepsilon", "after": "\\nu", "start_char_pos": 627, "end_char_pos": 638}, {"type": "R", "before": "34", "after": "\\frac{144", "start_char_pos": 653, "end_char_pos": 655}, {"type": "R", "before": "44\\sqrt{\\frac{6", "after": "32\\sqrt{\\frac{3", "start_char_pos": 658, "end_char_pos": 673}, {"type": "R", "before": "\\varepsilon", "after": "\\nu", "start_char_pos": 676, "end_char_pos": 687}, {"type": "R", "before": "an", "after": "a generalized", "start_char_pos": 783, "end_char_pos": 785}, {"type": "R", "before": "\\varepsilon", "after": "\\nu", "start_char_pos": 912, "end_char_pos": 923}, {"type": "R", "before": "arbitrary small constant. Moreover, an O(n^2\\log n)-time and O(n^2)-space 18-approximation is designed for the case where G is any subgraph of a Gabriel graph. To the best of our knowledge, related work only tackles the case where E consists of axis-parallel segments, resulting in an O(n\\log n)-time and O(n\\log n)-space 8-approximation", "after": "arbitrarily small constant", "start_char_pos": 933, "end_char_pos": 1270}], "sents_char_pos": [0, 329, 603, 958, 1092]}
+{"doc_id": "1804.00049", "revision_depth": "2", "before_revision": "A sequence of pathological changes takes place in Alzheimer's disease , which can be assessed in vivo using various brain imaging methods . Currently, there is no appropriate statistical model available that can easily integrate multiple imaging modalities , being able to utilize the additional information provided from the combined data . We applied Gaussian graphical models (GGMs) for analyzing the conditional dependency networks of multimodal neuroimaging dataand assessed alterations of the network structure in mild cognitive impairment (MCI) and Alzheimer's dementia (AD) compared to cognitively healthy controls. Data from N= 667 subjects were obtained from the Alzheimer's Disease Neuroimaging Initiative. Mean amyloid load (AV45-PET), glucose metabolism (FDG-PET), and gray matter volume (MRI) was calculatedfor each brain region. Separate GGMs were estimated using a Bayesian framework for the combined multimodal data for each diagnostic category. Graph-theoretical statistics were calculated to determine network alterations associated with disease severity. Network measures clustering coefficient, path length and small-world coefficient were significantly altered across diagnostic groups, with a biphasic u-shape trajectory , i. e. increased small-world coefficient in early MCI , intermediate values in late MCI, and decreased values in ADpatients compared to controls. In contrast, no group differences were found for clustering coefficient and small-world coefficient when estimating conditional dependency networkson single imaging modalities. GGMs provide a useful methodology to analyze the conditional dependency networks of multimodal neuroimaging data .", "after_revision": " Alzheimer's disease (AD) is characterized by a sequence of pathological changes, which are commonly assessed in vivo using MRI and PET . Currently, the most approaches to analyze statistical associations between brain regions rely on Pearson correlation. However, these are prone to spurious correlations arising from uninformative shared variance. Notably, there are no appropriate multivariate statistical models available that can easily integrate dozens of variables derived from such data , being able to use the additional information provided from the combination of data sources. Gaussian graphical models (GGMs) can estimate the conditional dependency from given data, which is expected to reflect the underlying causal relationships. We applied GGMs to assess multimodal regional brain alterations in AD. We obtained data from N= 972 subjects from the Alzheimer's Disease Neuroimaging Initiative. The mean amyloid load (AV45-PET), glucose metabolism (FDG-PET), and gray matter volume (MRI) were calculated. GGMs were estimated using a Bayesian framework for the combined multimodal data to obtain conditional dependency networks. Conditional dependency matrices were much sparser (10\\% density) than Pearson correlation matrices (50\\% density). Within modalities, conditional dependency networks yielded clusters connecting anatomically adjacent regions. For associations between different modalities, only few region-specific connections remained. Graph-theoretical network statistics were significantly altered between groups, with a biphasic u-shape trajectory . GGMs removed shared variance among multimodal measures of regional brain alterations in MCI and AD, and yielded sparser matrices compared to Pearson correlation networks. Therefore, GGMs may be used as alternative to thresholding-approaches typically applied to correlation networks to obtain the most informative relations between variables .", "edit_actions": [{"type": "D", "before": "A sequence of pathological changes takes place in", "after": null, "start_char_pos": 0, "end_char_pos": 49}, {"type": "R", "before": ", which can be", "after": "(AD) is characterized by a sequence of pathological changes, which are commonly", "start_char_pos": 70, "end_char_pos": 84}, {"type": "R", "before": "various brain imaging methods", "after": "MRI and PET", "start_char_pos": 108, "end_char_pos": 137}, {"type": "R", "before": "there is no appropriate statistical model", "after": "the most approaches to analyze statistical associations between brain regions rely on Pearson correlation. However, these are prone to spurious correlations arising from uninformative shared variance. Notably, there are no appropriate multivariate statistical models", "start_char_pos": 151, "end_char_pos": 192}, {"type": "R", "before": "multiple imaging modalities", "after": "dozens of variables derived from such data", "start_char_pos": 229, "end_char_pos": 256}, {"type": "R", "before": "utilize", "after": "use", "start_char_pos": 273, "end_char_pos": 280}, {"type": "R", "before": "combined data . We applied", "after": "combination of data sources.", "start_char_pos": 326, "end_char_pos": 352}, {"type": "R", "before": "for analyzing", "after": "can estimate", "start_char_pos": 386, "end_char_pos": 399}, {"type": "R", "before": "networks of multimodal neuroimaging dataand assessed alterations of the network structure in mild cognitive impairment (MCI) and Alzheimer's dementia (AD) compared to cognitively healthy controls. Data", "after": "from given data, which is expected to reflect the underlying causal relationships. We applied GGMs to assess multimodal regional brain alterations in AD. We obtained data", "start_char_pos": 427, "end_char_pos": 628}, {"type": "R", "before": "667 subjects were obtained", "after": "972 subjects", "start_char_pos": 637, "end_char_pos": 663}, {"type": "R", "before": "Mean", "after": "The mean", "start_char_pos": 718, "end_char_pos": 722}, {"type": "R", "before": "was calculatedfor each brain region. Separate", "after": "were calculated.", "start_char_pos": 807, "end_char_pos": 852}, {"type": "R", "before": "for each diagnostic category.", "after": "to obtain conditional dependency networks. Conditional dependency matrices were much sparser (10\\% density) than Pearson correlation matrices (50\\% density). Within modalities, conditional dependency networks yielded clusters connecting anatomically adjacent regions. For associations between different modalities, only few region-specific connections remained.", "start_char_pos": 933, "end_char_pos": 962}, {"type": "R", "before": "statistics were calculated to determine network alterations associated with disease severity. Network measures clustering coefficient, path length and small-world coefficient", "after": "network statistics", "start_char_pos": 981, "end_char_pos": 1155}, {"type": "R", "before": "across diagnostic", "after": "between", "start_char_pos": 1183, "end_char_pos": 1200}, {"type": "R", "before": ", i. e. increased small-world coefficient in early MCI , intermediate values in late MCI, and decreased values in ADpatients compared to controls. In contrast, no group differences were found for clustering coefficient and small-world coefficient when estimating conditional dependency networkson single imaging modalities. GGMs provide a useful methodology to analyze the conditional dependency networks of multimodal neuroimaging data", "after": ". GGMs removed shared variance among multimodal measures of regional brain alterations in MCI and AD, and yielded sparser matrices compared to Pearson correlation networks. Therefore, GGMs may be used as alternative to thresholding-approaches typically applied to correlation networks to obtain the most informative relations between variables", "start_char_pos": 1244, "end_char_pos": 1680}], "sents_char_pos": [0, 341, 623, 717, 843, 962, 1074, 1390, 1567]}
+{"doc_id": "1804.01614", "revision_depth": "1", "before_revision": "The pigeonhole principle states that if n items are contained in m boxes, then at least one box has no fewer than n/m items. It is utilized to solve many data management problems, especially for thresholded similarity searches. Despite many pigeonhole principle-based solutions proposed in the last few decades, the condition stated by the principle is weak. It only constrains the number of items in a single box. URLanizing the boxes in a ring, we observe that the number of items in multiple boxes are also constrained. We propose a new principle called the pigeonring principle which formally captures such constraints and yields stronger conditions. To utilize the pigeonring principle, we focus on problems defined in the form of identifying data objects whose similarities or distances to the query is constrained by a threshold. Many solutions to these problems utilize the pigeonhole principle to find candidates that satisfy a filtering condition. By the pigeonring principle, stronger filtering conditions can be established. We show that the pigeonhole principle is a special case of the pigeonring principle. This suggests that all the solutions based on the pigeonhole principle are possible to be accelerated by the pigeonring principle. A universal filtering framework is introduced to encompass the solutions to these problems based on the pigeonring principle. Besides, we discuss how to quickly find candidates specified by the pigeonring principlewith minor modifications on top of existing algorithms. Experimental results on real datasets demonstrate the applicability of the pigeonring principle as well as the superior performance of the algorithms based on the principle.", "after_revision": "The pigeonhole principle states that if n items are contained in m boxes, then at least one box has no more than n/m items. It is utilized to solve many data management problems, especially for thresholded similarity searches. Despite many pigeonhole principle-based solutions proposed in the last few decades, the condition stated by the principle is weak. It only constrains the number of items in a single box. URLanizing the boxes in a ring, we propose a new principle , called the pigeonring principle , which constrains the number of items in multiple boxes and yields stronger conditions. To utilize the new principle, we focus on problems defined in the form of identifying data objects whose similarities or distances to the query is constrained by a threshold. Many solutions to these problems utilize the pigeonhole principle to find candidates that satisfy a filtering condition. By the new principle, stronger filtering conditions can be established. We show that the pigeonhole principle is a special case of the new principle. This suggests that all the pigeonhole principle-based solutions are possible to be accelerated by the new principle. A universal filtering framework is introduced to encompass the solutions to these problems based on the new principle. Besides, we discuss how to quickly find candidates specified by the new principle. The implementation requires only minor modifications on top of existing pigeonhole principle-based algorithms. Experimental results on real datasets demonstrate the applicability of the new principle as well as the superior performance of the algorithms based on the new principle.", "edit_actions": [{"type": "R", "before": "fewer", "after": "more", "start_char_pos": 103, "end_char_pos": 108}, {"type": "D", "before": "observe that the number of items in multiple boxes are also constrained. We", "after": null, "start_char_pos": 450, "end_char_pos": 525}, {"type": "A", "before": null, "after": ",", "start_char_pos": 550, "end_char_pos": 550}, {"type": "R", "before": "which formally captures such constraints", "after": ", which constrains the number of items in multiple boxes", "start_char_pos": 583, "end_char_pos": 623}, {"type": "R", "before": "pigeonring", "after": "new", "start_char_pos": 671, "end_char_pos": 681}, {"type": "R", "before": "pigeonring", "after": "new", "start_char_pos": 966, "end_char_pos": 976}, {"type": "R", "before": "pigeonring", "after": "new", "start_char_pos": 1101, "end_char_pos": 1111}, {"type": "R", "before": "solutions based on the pigeonhole principle", "after": "pigeonhole principle-based solutions", "start_char_pos": 1150, "end_char_pos": 1193}, {"type": "R", "before": "pigeonring", "after": "new", "start_char_pos": 1232, "end_char_pos": 1242}, {"type": "R", "before": "pigeonring", "after": "new", "start_char_pos": 1358, "end_char_pos": 1368}, {"type": "R", "before": "pigeonring principlewith", "after": "new principle. The implementation requires only", "start_char_pos": 1448, "end_char_pos": 1472}, {"type": "A", "before": null, "after": "pigeonhole principle-based", "start_char_pos": 1512, "end_char_pos": 1512}, {"type": "R", "before": "pigeonring", "after": "new", "start_char_pos": 1600, "end_char_pos": 1610}, {"type": "A", "before": null, "after": "new", "start_char_pos": 1688, "end_char_pos": 1688}], "sents_char_pos": [0, 124, 227, 358, 414, 522, 655, 837, 958, 1037, 1122, 1253, 1379, 1524]}
+{"doc_id": "1804.10264", "revision_depth": "1", "before_revision": "Stock networks constitute a well established tool for characterization of complex behavior in stock markets. The networks are constructed from time series of stock prices. Since Mantegnaseminal paper the linear Pearson's correlation coefficient between pairs of stocks is used to determine network edges. Recently, possible effects of nonlinearity on graph characteristics have been demonstrated when using nonlinear measures such as mutual information instead of linear correlation. In this paper, we quantitatively characterize the nonlinearity in stock time series and the effect it has on stock network properties. It is achieved by a systematic multi-step approach , that allows 1. to quantify the nonlinearity of coupling , 2. to correct its effects wherever it is caused by simple univariate non-Gaussianity , 3. to potentially localize in space and time any remaining strong sources of this nonlinearity , andfinally, 4. to study the effect the nonlinearity has on global network properties. By applying the presented approach to stocks included in three prominent indices (NYSE100, FTSE100 and SP500), we document that most of the apparent nonlinearity is due to univariate non-Gaussianity. Further , strong nonstationarity in a few specific stocks may play a role. In particular, the sharp decrease of some stocks during the global finance crisis in 2008 gives rise to apparent nonlinear dependences among stocks.", "after_revision": "Stock networks , constructed from stock price time series, are a well-established tool for the characterization of complex behavior in stock markets. Following Mantegna's seminal paper, the linear Pearson's correlation coefficient between pairs of stocks has been the usual way to determine network edges. Recently, possible effects of nonlinearity on the graph-theoretical properties of such networks have been demonstrated when using nonlinear measures such as mutual information instead of linear correlation. In this paper, we quantitatively characterize the nonlinearity in stock time series and the effect it has on stock network properties. This is achieved by a systematic multi-step approach that allows us to quantify the nonlinearity of coupling ; correct its effects wherever it is caused by simple univariate non-Gaussianity ; potentially localize in space and time any remaining strong sources of this nonlinearity ; and, finally, study the effect nonlinearity has on global network properties. By applying this multi-step approach to stocks included in three prominent indices (NYSE100, FTSE100 and SP500), we establish that the apparent nonlinearity that has been observed is largely due to univariate non-Gaussianity. Furthermore , strong nonstationarity in a few specific stocks may play a role. In particular, the sharp decrease in some stocks during the global financial crisis of 2008 gives rise to apparent nonlinear dependencies among stocks.", "edit_actions": [{"type": "R", "before": "constitute a well established tool for", "after": ", constructed from stock price time series, are a well-established tool for the", "start_char_pos": 15, "end_char_pos": 53}, {"type": "R", "before": "The networks are constructed from time series of stock prices. Since Mantegnaseminal paper", "after": "Following Mantegna's seminal paper,", "start_char_pos": 109, "end_char_pos": 199}, {"type": "R", "before": "is used", "after": "has been the usual way", "start_char_pos": 269, "end_char_pos": 276}, {"type": "R", "before": "graph characteristics", "after": "the graph-theoretical properties of such networks", "start_char_pos": 351, "end_char_pos": 372}, {"type": "R", "before": "It", "after": "This", "start_char_pos": 619, "end_char_pos": 621}, {"type": "R", "before": ", that allows 1.", "after": "that allows us", "start_char_pos": 670, "end_char_pos": 686}, {"type": "R", "before": ", 2. to", "after": ";", "start_char_pos": 728, "end_char_pos": 735}, {"type": "R", "before": ", 3. to", "after": ";", "start_char_pos": 815, "end_char_pos": 822}, {"type": "R", "before": ", andfinally, 4. to", "after": "; and, finally,", "start_char_pos": 912, "end_char_pos": 931}, {"type": "D", "before": "the", "after": null, "start_char_pos": 949, "end_char_pos": 952}, {"type": "R", "before": "the presented", "after": "this multi-step", "start_char_pos": 1012, "end_char_pos": 1025}, {"type": "R", "before": "document that most of", "after": "establish that", "start_char_pos": 1114, "end_char_pos": 1135}, {"type": "R", "before": "is", "after": "that has been observed is largely", "start_char_pos": 1162, "end_char_pos": 1164}, {"type": "R", "before": "Further", "after": "Furthermore", "start_char_pos": 1200, "end_char_pos": 1207}, {"type": "R", "before": "of", "after": "in", "start_char_pos": 1309, "end_char_pos": 1311}, {"type": "R", "before": "finance crisis in", "after": "financial crisis of", "start_char_pos": 1342, "end_char_pos": 1359}, {"type": "R", "before": "dependences", "after": "dependencies", "start_char_pos": 1398, "end_char_pos": 1409}], "sents_char_pos": [0, 108, 171, 304, 483, 618, 999, 1199, 1274]}
+{"doc_id": "1805.01547", "revision_depth": "1", "before_revision": "The Euclidean k-center problem is a classical problem that has been extensively studied in many areas of computer science. Given a set G of n points in Euclidean space, the problem is to determine a set C of k centers (not necessarily part of G) such that the maximum distance between a point in G and its nearest neighbor in C is minimized. In this paper we study the corresponding (k,\\ell)-center problem for polygonal curves under the Fr\\'echet distance, that is, given a set G of n polygonal curves in R^d, each of complexity m, determine a set C of k polygonal curves in R^d, each of complexity \\ell, such that the maximum Fr\\'echet distance of a curve in G to its closest curve in C is minimized. We show that there is no polynomial-time (\\frac{3{2}-\\varepsilon)-approximation algorithm for any \\varepsilon~>~0 } unless \\mathsf{P}=\\mathsf{NP}. This bound even holds for one-dimensional curves under the continuous Fr\\'echet distance , and is further improved to (3\\sin(\\frac{\\pi{3})-\\varepsilon) if the curves may lie in the plane and if the } discrete Fr\\'echet distance is used. These hardness results hold even when k=1, -hardness extends to the case that \\ell=\\infty, } i.e., for the minimum-enclosing ball version of the problem. At the same time, we prove that a careful adaptation of Gonzalez' algorithm in combination with a curve simplification yields a 3-approximation in any dimension, provided that an optimal simplification can be computed exactly. We give a comprehensive analysis of this approximation scheme in spaces of arbitrary dimension and for both the discrete and continuous Fr\\'echet distances. Overall, our results significantly extend and improve the known approximation bounds for the (k,\\ell)-center clustering problem .", "after_revision": "The Euclidean k-center problem is a classical problem that has been extensively studied in computer science. Given a set G of n points in Euclidean space, the problem is to determine a set C of k centers (not necessarily part of G) such that the maximum distance between a point in G and its nearest neighbor in C is minimized. In this paper we study the corresponding (k,\\ell)-center problem for polygonal curves under the Fr\\'echet distance, that is, given a set G of n polygonal curves in R^d, each of complexity m, determine a set C of k polygonal curves in R^d, each of complexity \\ell, such that the maximum Fr\\'echet distance of a curve in G to its closest curve in C is minimized. In this paper, we substantially extend and improve the known approximation bounds for curves in dimension 2 and higher. We show that , if \\ell is part of the input, then there is no polynomial-time {2}-\\varepsilon)-approximation algorithm for any \\varepsilon~>~0 } approximation scheme unless \\mathsf{P}=\\mathsf{NP}. Our constructions yield different bounds for one and two-dimensional curves and the discrete and continuous Fr\\'echet distance {3})-\\varepsilon) if the curves may lie in the plane and if the } . In the case of the discrete Fr\\'echet distance on two-dimensional curves, we show hardness of approximation within a factor close to 2.598. This result also holds when k=1, and the \\mathsf{NP-hardness extends to the case that \\ell=\\infty, } i.e., for the problem of computing the minimum-enclosing ball under the Fr\\'echet distance. Finally, we observe that a careful adaptation of Gonzalez' algorithm in combination with a curve simplification yields a 3-approximation in any dimension, provided that an optimal simplification can be computed exactly. We conclude that our approximation bounds are close to being tight .", "edit_actions": [{"type": "D", "before": "many areas of", "after": null, "start_char_pos": 91, "end_char_pos": 104}, {"type": "A", "before": null, "after": "In this paper, we substantially extend and improve the known approximation bounds for curves in dimension 2 and higher.", "start_char_pos": 703, "end_char_pos": 703}, {"type": "A", "before": null, "after": ", if \\ell is part of the input, then", "start_char_pos": 717, "end_char_pos": 717}, {"type": "D", "before": "(\\frac{3", "after": null, "start_char_pos": 746, "end_char_pos": 754}, {"type": "A", "before": null, "after": "approximation scheme", "start_char_pos": 821, "end_char_pos": 821}, {"type": "R", "before": "This bound even holds for one-dimensional curves under the", "after": "Our constructions yield different bounds for one and two-dimensional curves and the discrete and", "start_char_pos": 853, "end_char_pos": 911}, {"type": "D", "before": ", and is further improved to (3\\sin(\\frac{\\pi", "after": null, "start_char_pos": 942, "end_char_pos": 987}, {"type": "A", "before": null, "after": ". In the case of the", "start_char_pos": 1053, "end_char_pos": 1053}, {"type": "R", "before": "is used. These hardness results hold even", "after": "on two-dimensional curves, we show hardness of approximation within a factor close to 2.598. This result also holds", "start_char_pos": 1082, "end_char_pos": 1123}, {"type": "A", "before": null, "after": "and the \\mathsf{NP", "start_char_pos": 1134, "end_char_pos": 1134}, {"type": "A", "before": null, "after": "problem of computing the", "start_char_pos": 1198, "end_char_pos": 1198}, {"type": "R", "before": "version of the problem. At the same time, we prove", "after": "under the Fr\\'echet distance. Finally, we observe", "start_char_pos": 1222, "end_char_pos": 1272}, {"type": "R", "before": "give a comprehensive analysis of this approximation scheme in spaces of arbitrary dimension and for both the discrete and continuous Fr\\'echet distances. Overall, our results significantly extend and improve the known approximation bounds for the (k,\\ell)-center clustering problem", "after": "conclude that our approximation bounds are close to being tight", "start_char_pos": 1476, "end_char_pos": 1757}], "sents_char_pos": [0, 122, 341, 702, 852, 1090, 1245, 1472, 1629]}
+{"doc_id": "1805.07512", "revision_depth": "1", "before_revision": "Data is scaling exponentially in fields ranging from genomics to neuroscience to economics. A central question is whether modern machine learning methods can be applied to construct predictive models based on large data sets drawn from complex, natural systems like cells and brains . In machine learning, the predictive power or generalizability of a model is determined by the statistics of training data . In this paper, we ask how predictive inference is impacted when training data is generated by the statistical behavior of a physical system . We develop an information-theoretic analysis of a canonical problem , spin network inference. Our analysis reveals the essential role that thermal fluctuations play in determining the efficiency of predictive inference. Thermal noise drives a system to explore a range of configurations providing `raw' information for a learning algorithm to construct a predictive model. Conversely, thermal energy degrades information by blurring energetic differences between network states . In general, spin networks have an intrinsic optimal temperature at which inference becomes maximally efficient. Simple active learning protocols allow optimization of network temperature , without prior knowledge, to dramatically increase the efficiency of inference . Our results reveal a fundamental link between physics and information and show how the physical environment can be tuned to optimize the efficiency of machine learning.", "after_revision": "Data is scaling exponentially in fields ranging from genomics to neuroscience to economics. A central question is : can modern machine learning methods be applied to construct predictive models of natural systems like cells and brains based on large data sets? In this paper, we examine how inference is impacted when training data is generated by the statistical behavior of a physical system , and hence outside direct control by the experimentalist . We develop an information-theoretic analysis for the canonical problem of spin-network inference. Our analysis reveals the essential role that the physical properties of the spin network and its environment play in determining the difficulty of the underlying machine learning problem. Specifically, stochastic fluctuations drive a system to explore a range of configurations providing `raw' information for a learning algorithm to construct an accurate model; yet they also blur energetic differences between network states and thereby degrade information. This competition leads spin networks to generically have an intrinsic optimal temperature at which stochastic spin fluctuations provide maximal information for discriminating among competing models, maximizing inference efficiency. We demonstrate a simple active learning protocol that optimizes network temperature to boost inference efficiency and dramatically increases the efficiency of inference on a neural circuit reconstruction task . Our results reveal a fundamental link between physics and information and show how the physical environment can be tuned to optimize the efficiency of machine learning.", "edit_actions": [{"type": "R", "before": "whether", "after": ": can", "start_char_pos": 114, "end_char_pos": 121}, {"type": "D", "before": "can", "after": null, "start_char_pos": 154, "end_char_pos": 157}, {"type": "R", "before": "based on large data sets drawn from complex,", "after": "of", "start_char_pos": 200, "end_char_pos": 244}, {"type": "R", "before": ". In machine learning, the predictive power or generalizability of a model is determined by the statistics of training data .", "after": "based on large data sets?", "start_char_pos": 283, "end_char_pos": 408}, {"type": "R", "before": "ask how predictive", "after": "examine how", "start_char_pos": 427, "end_char_pos": 445}, {"type": "A", "before": null, "after": ", and hence outside direct control by the experimentalist", "start_char_pos": 549, "end_char_pos": 549}, {"type": "R", "before": "of a canonical problem , spin network", "after": "for the canonical problem of spin-network", "start_char_pos": 597, "end_char_pos": 634}, {"type": "R", "before": "thermal fluctuations", "after": "the physical properties of the spin network and its environment", "start_char_pos": 691, "end_char_pos": 711}, {"type": "R", "before": "efficiency of predictive inference. Thermal noise drives", "after": "difficulty of the underlying machine learning problem. Specifically, stochastic fluctuations drive", "start_char_pos": 736, "end_char_pos": 792}, {"type": "R", "before": "a predictive model. Conversely, thermal energy degrades information by blurring", "after": "an accurate model; yet they also blur", "start_char_pos": 905, "end_char_pos": 984}, {"type": "R", "before": ". In general, spin networks", "after": "and thereby degrade information. This competition leads spin networks to generically", "start_char_pos": 1030, "end_char_pos": 1057}, {"type": "R", "before": "inference becomes maximally efficient. Simple active learning protocols allow optimization of network temperature , without prior knowledge, to dramatically increase", "after": "stochastic spin fluctuations provide maximal information for discriminating among competing models, maximizing inference efficiency. We demonstrate a simple active learning protocol that optimizes network temperature to boost inference efficiency and dramatically increases", "start_char_pos": 1105, "end_char_pos": 1270}, {"type": "A", "before": null, "after": "on a neural circuit reconstruction task", "start_char_pos": 1299, "end_char_pos": 1299}], "sents_char_pos": [0, 91, 284, 408, 551, 645, 771, 924, 1031, 1143, 1301]}
+{"doc_id": "1805.11553", "revision_depth": "1", "before_revision": "The sociality of cattle facilitates the maintenance of herd cohesion and synchronisation, making these species the ideal choice for domestication as livestock for humans. However, livestock populations are not self-regulated, and farmers transfer individuals across different groups throughout their lives for reasons such as genetic mixing, reproduction and pastureland management. Individuals consequently have to adapt to different group compositions during their lives , compared to their wild counterparts choosing their own herd mates . These changes may lead to social instability and stress, entailing potentially negative effects on animal welfare. In this study, we assess the how the transfers of Highland cattle (Bos taurus) impact individual and group social network measures. We studied four groups with nine different compositions and 18 individual transfers to study 1. ) the effect of group composition on individual social centralities and 2. ) the effect of group composition changes on these centralities. As shown in previous studies , dyadic associations are stronger between individuals with identical age and dominance rank. Our study showed that dyadic spatial relationships are stable relatively stable between changes in group composition or enclosure but this depends on identities more than the quantity of transferred individuals . Older cattle have higher network centralities than other individuals. The centrality of individuals is also affected by their sex and the number of familiar individuals in the group. When individuals are transferred to a group with few (one or two) or no familiar individuals, their social centralities are substantially impacted. This study reveals the necessity of understanding the social structure of a group to predict social instability through the transfer of individuals between groups .", "after_revision": "The sociality of cattle facilitates the maintenance of herd cohesion and synchronisation, making these species the ideal choice for domestication as livestock for humans. However, livestock populations are not self-regulated, and farmers transfer individuals across different groups throughout their lives for reasons such as genetic mixing, reproduction and pastureland management. Individuals consequently have to adapt to different group compositions during their lives rather than choose their own herd mates , as they would do in the wild . These changes may lead to social instability and stress, entailing potentially negative effects on animal welfare. In this study, we assess how the transfer of Highland cattle (Bos taurus) impacts individual and group social network measures. Four groups with nine different compositions and 18 individual transfers were studied to evaluate 1 ) the effect of group composition on individual social centralities and 2 ) the effect of group composition changes on these centralities. As shown in previous works , dyadic associations are stronger between individuals with similar age and dominance rank. This study reveals that the relative stability of dyadic spatial relationships between changes in group composition or enclosure is due to the identities of transferred individuals more than the quantity of individuals that are transferred . Older cattle had higher network centralities than other individuals. The centrality of individuals was also affected by their sex and the number of familiar individuals in the group. This study reveals the necessity of understanding the social structure of a group to predict social instability following the transfer of individuals between groups . The developing of guidelines for the modification of group composition could improve livestock management and reduce stress for the animals concerned .", "edit_actions": [{"type": "R", "before": ", compared to their wild counterparts choosing their", "after": "rather than choose their", "start_char_pos": 473, "end_char_pos": 525}, {"type": "A", "before": null, "after": ", as they would do in the wild", "start_char_pos": 541, "end_char_pos": 541}, {"type": "R", "before": "the how the transfers", "after": "how the transfer", "start_char_pos": 684, "end_char_pos": 705}, {"type": "R", "before": "impact", "after": "impacts", "start_char_pos": 738, "end_char_pos": 744}, {"type": "R", "before": "We studied four", "after": "Four", "start_char_pos": 791, "end_char_pos": 806}, {"type": "R", "before": "to study 1.", "after": "were studied to evaluate 1", "start_char_pos": 875, "end_char_pos": 886}, {"type": "R", "before": "2.", "after": "2", "start_char_pos": 959, "end_char_pos": 961}, {"type": "R", "before": "studies", "after": "works", "start_char_pos": 1048, "end_char_pos": 1055}, {"type": "R", "before": "identical", "after": "similar", "start_char_pos": 1116, "end_char_pos": 1125}, {"type": "R", "before": "Our study showed that", "after": "This study reveals that the relative stability of", "start_char_pos": 1150, "end_char_pos": 1171}, {"type": "D", "before": "are stable relatively stable", "after": null, "start_char_pos": 1201, "end_char_pos": 1229}, {"type": "R", "before": "but this depends on identities", "after": "is due to the identities of transferred individuals", "start_char_pos": 1280, "end_char_pos": 1310}, {"type": "R", "before": "transferred individuals", "after": "individuals that are transferred", "start_char_pos": 1337, "end_char_pos": 1360}, {"type": "R", "before": "have", "after": "had", "start_char_pos": 1376, "end_char_pos": 1380}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1463, "end_char_pos": 1465}, {"type": "D", "before": "When individuals are transferred to a group with few (one or two) or no familiar individuals, their social centralities are substantially impacted.", "after": null, "start_char_pos": 1546, "end_char_pos": 1693}, {"type": "R", "before": "through", "after": "following", "start_char_pos": 1806, "end_char_pos": 1813}, {"type": "A", "before": null, "after": ". The developing of guidelines for the modification of group composition could improve livestock management and reduce stress for the animals concerned", "start_char_pos": 1857, "end_char_pos": 1857}], "sents_char_pos": [0, 170, 382, 543, 658, 790, 1026, 1149, 1362, 1432, 1545, 1693]}
+{"doc_id": "1806.01778", "revision_depth": "1", "before_revision": "How stable and general is behavior once reached maximum learning? To answer this question and understand post-acquisition behavior and its related individual differences, we explore analytic models of Pavlovian conditioning extending the basic associative model of Hull (i.e., the Rescorla-Wagner model with just one cue) and propose three new models valid for individual data, which we argue to be quite natural. The first two are descriptive settings: ( i) a framework of dynamical models inspired by the classical mechanics of a particle in a given potential, which comprises Hull model and also a specific model encoding resistance to learning in the first few sessions followed by an over-optimal response peak ; (ii) the most direct stochastic extension of Hull model, characterized by the presence of stochastic noise; (iii) a theory where response fluctuations are described by quantum mechanics and based on the general framework of dynamical models (i) explaining the noise met in (ii) and giving characteristic predictions . We ran an unusually long experiment with 32 rats over 3960 trials, where we excluded habituation and other well-known phenomena as sources of variability in the subjects' performance. The best nonlinear regression to averaged data and 60\\% of individual data is Hull's model, while for the remaining 40\\% of the subjects the dynamical model (i) provides a better fit . The noise encountered in all individual responses is white, thus confirming the simplest version of model ( ii ) but standing in contrast with the colored-noise findings in human performance. Finally, data are compatible with theory (iii ), although experimental uncertainties dominate the result. On the other hand, data do not favor models with a long-memory effect or where response variability is solely described by a random fractal.", "after_revision": "How stable and general is behavior once reached maximum learning? To answer this question and understand post-acquisition behavior and its related individual differences, we propose a psychological principle that naturally extends the basic associative single-cue Rescorla-Wagner model ( which may also be called Hull model) of Pavlovian conditioning to ( i) a framework of dynamical models predicting resistance to learning in the first few sessions followed by an over-optimal response peak . In turn, (ii) the theory can be further extended to describe response fluctuations by the laws of quantum mechanics. (iii) We also introduce an independent model characterized by the presence of a stochastic noise of cognitive origin . We ran an unusually long experiment with 32 rats over 3960 trials, where we excluded habituation and other well-known phenomena as sources of variability in the subjects' performance. There is weak to positive evidence that Hull model is the best nonlinear regression to averaged data only for a minority of the subjects , while its dynamical extension (i) can explain the totality of data . The noise encountered in all individual responses is white, thus confirming the simplest version of model ( iii ) but standing in contrast with the colored-noise findings in human performance. Finally, data are compatible with the quantum extension (ii ), although experimental uncertainties dominate the result. On the other hand, data do not favor models with (iv) a long-memory effect or (v) where response variability is solely described by a random fractal.", "edit_actions": [{"type": "R", "before": "explore analytic models of Pavlovian conditioning extending", "after": "propose a psychological principle that naturally extends", "start_char_pos": 174, "end_char_pos": 233}, {"type": "R", "before": "model of Hull (i.e., the", "after": "single-cue", "start_char_pos": 256, "end_char_pos": 280}, {"type": "D", "before": "with just one cue) and propose three new models valid for individual data, which we argue to be quite natural. The first two are descriptive settings:", "after": null, "start_char_pos": 303, "end_char_pos": 453}, {"type": "A", "before": null, "after": "which may also be called Hull model) of Pavlovian conditioning to (", "start_char_pos": 456, "end_char_pos": 456}, {"type": "R", "before": "inspired by the classical mechanics of a particle in a given potential, which comprises Hull model and also a specific model encoding", "after": "predicting", "start_char_pos": 492, "end_char_pos": 625}, {"type": "R", "before": ";", "after": ". In turn,", "start_char_pos": 717, "end_char_pos": 718}, {"type": "R", "before": "most direct stochastic extension of Hull model, characterized by the presence of stochastic noise; (iii) a theory where response fluctuations are described by quantum mechanics and based on the general framework of dynamical models (i) explaining the noise met in (ii) and giving characteristic predictions", "after": "theory can be further extended to describe response fluctuations by the laws of quantum mechanics. (iii) We also introduce an independent model characterized by the presence of a stochastic noise of cognitive origin", "start_char_pos": 728, "end_char_pos": 1034}, {"type": "R", "before": "The", "after": "There is weak to positive evidence that Hull model is the", "start_char_pos": 1221, "end_char_pos": 1224}, {"type": "R", "before": "and 60\\% of individual data is Hull's model, while for the remaining 40\\%", "after": "only for a minority", "start_char_pos": 1268, "end_char_pos": 1341}, {"type": "R", "before": "the dynamical model", "after": ", while its dynamical extension", "start_char_pos": 1358, "end_char_pos": 1377}, {"type": "R", "before": "provides a better fit", "after": "can explain the totality of data", "start_char_pos": 1382, "end_char_pos": 1403}, {"type": "R", "before": "ii", "after": "iii", "start_char_pos": 1514, "end_char_pos": 1516}, {"type": "R", "before": "theory (iii", "after": "the quantum extension (ii", "start_char_pos": 1632, "end_char_pos": 1643}, {"type": "A", "before": null, "after": "(iv)", "start_char_pos": 1753, "end_char_pos": 1753}, {"type": "A", "before": null, "after": "(v)", "start_char_pos": 1778, "end_char_pos": 1778}], "sents_char_pos": [0, 65, 413, 718, 826, 1036, 1220, 1405, 1597, 1703]}
+{"doc_id": "1806.01783", "revision_depth": "1", "before_revision": "Objective: Higher-order tensor decompositions have hardly been used in muscle activity analysis despite the fact that multichannel electromyography (EMG) datasets used in muscle synergy studies naturally present multi-way structure . Here, we seek to discuss and demonstrate the potential of tensor decomposition as a framework to estimate muscle synergies from 3^{rd}-order EMG tensors constructed by stacking repetitions of multi-channel EMG for several tasks. Methods: We compare the two most common decomposition models -Parallel Factor Analysis (PARAFAC) and Tucker- in muscle synergy extraction from the three main degrees of freedom (DoF) of the wrist using the first Ninapro database. We then utilise the power tensor factorisation to create a novel direct method for shared and task-specific synergy estimation from two biomechanically related tasks by developing a constrained Tucker decomposition method . Our approach is compared with the current standard approach of repetitively applying non-negative matrix factorisation (NMF) to a series of the movements. Results: The results show that the constrained Tucker method successfully identified the shared and task-specific synergies for all 3 DoF tensorsdirectly and it was robust to misassignments with regard to task-repetition information unlike NMF, thanks to exploring the multi-way structure of muscle activity. Conclusions: We showed the potential of tensor factorisations to study and characterise muscle activity and developed a new direct method for shared and task-specific synergy identificationwith a constrained Tucker decomposition. Significance: We expect that this study will pave the way for the development of muscle activity analysis methods based on higher-order techniques.", "after_revision": " Higher-order tensor decompositions have hardly been used in muscle activity analysis despite multichannel electromyography (EMG) datasets naturally occurring as multi-way structures . Here, we seek to demonstrate and discuss the potential of tensor decompositions as a framework to estimate muscle synergies from 3^{rd}-order EMG tensors built by stacking repetitions of multi-channel EMG for several tasks. We compare the two most widespread tensor decomposition models -- Parallel Factor Analysis (PARAFAC) and Tucker -- in muscle synergy analysis of the wrist's three main Degree of Freedoms (DoFs) using the public first Ninapro database. Furthermore, we proposed a constrained Tucker decomposition (consTD) method for efficient synergy extraction building on the power of tensor decompositions. This method is proposed as a direct novel approach for shared and task-specific synergy estimation from two biomechanically related tasks . Our approach is compared with the current standard approach of repetitively applying non-negative matrix factorisation (NMF) to a series of movements. The results show that the consTD method is suitable for synergy extraction compared to PARAFAC and Tucker. Moreover, exploiting the multi-way structure of muscle activity, the proposed methods successfully identified shared and task-specific synergies for all three DoFs tensors. These were found to be robust to disarrangement with regard to task-repetition information , unlike the commonly used NMF. In summary, we demonstrate how to use tensors to characterise muscle activity and develop a new consTD method for muscle synergy extraction that could be used for shared and task-specific synergies identification. We expect that this study will pave the way for the development of novel muscle activity analysis methods based on higher-order techniques.", "edit_actions": [{"type": "D", "before": "Objective:", "after": null, "start_char_pos": 0, "end_char_pos": 10}, {"type": "D", "before": "the fact that", "after": null, "start_char_pos": 104, "end_char_pos": 117}, {"type": "R", "before": "used in muscle synergy studies naturally present", "after": "naturally occurring as", "start_char_pos": 163, "end_char_pos": 211}, {"type": "R", "before": "structure", "after": "structures", "start_char_pos": 222, "end_char_pos": 231}, {"type": "R", "before": "discuss and demonstrate", "after": "demonstrate and discuss", "start_char_pos": 251, "end_char_pos": 274}, {"type": "R", "before": "decomposition", "after": "decompositions", "start_char_pos": 299, "end_char_pos": 312}, {"type": "R", "before": "constructed", "after": "built", "start_char_pos": 387, "end_char_pos": 398}, {"type": "D", "before": "Methods:", "after": null, "start_char_pos": 463, "end_char_pos": 471}, {"type": "R", "before": "common decomposition models -Parallel", "after": "widespread tensor decomposition models -- Parallel", "start_char_pos": 496, "end_char_pos": 533}, {"type": "R", "before": "Tucker-", "after": "Tucker --", "start_char_pos": 564, "end_char_pos": 571}, {"type": "R", "before": "extraction from the three main degrees of freedom (DoF) of the wrist using the", "after": "analysis of the wrist's three main Degree of Freedoms (DoFs) using the public", "start_char_pos": 590, "end_char_pos": 668}, {"type": "R", "before": "We then utilise the power tensor factorisation to create a novel direct method", "after": "Furthermore, we proposed a constrained Tucker decomposition (consTD) method for efficient synergy extraction building on the power of tensor decompositions. This method is proposed as a direct novel approach", "start_char_pos": 693, "end_char_pos": 771}, {"type": "D", "before": "by developing a constrained Tucker decomposition method", "after": null, "start_char_pos": 859, "end_char_pos": 914}, {"type": "R", "before": "the movements. Results:", "after": "movements.", "start_char_pos": 1057, "end_char_pos": 1080}, {"type": "R", "before": "constrained Tucker method successfully identified the", "after": "consTD method is suitable for synergy extraction compared to PARAFAC and Tucker. Moreover, exploiting the multi-way structure of muscle activity, the proposed methods successfully identified", "start_char_pos": 1107, "end_char_pos": 1160}, {"type": "R", "before": "3 DoF tensorsdirectly and it was robust to misassignments", "after": "three DoFs tensors. These were found to be robust to disarrangement", "start_char_pos": 1204, "end_char_pos": 1261}, {"type": "R", "before": "unlike NMF, thanks to exploring the multi-way structure of muscle activity. Conclusions: We showed the potential of tensor factorisations to study and", "after": ", unlike the commonly used NMF. In summary, we demonstrate how to use tensors to", "start_char_pos": 1305, "end_char_pos": 1455}, {"type": "R", "before": "developed a new direct method for", "after": "develop a new consTD method for muscle synergy extraction that could be used for", "start_char_pos": 1489, "end_char_pos": 1522}, {"type": "R", "before": "synergy identificationwith a constrained Tucker decomposition. Significance:", "after": "synergies identification.", "start_char_pos": 1548, "end_char_pos": 1624}, {"type": "A", "before": null, "after": "novel", "start_char_pos": 1692, "end_char_pos": 1692}], "sents_char_pos": [0, 233, 462, 692, 916, 1071, 1380, 1610]}
+{"doc_id": "1806.04032", "revision_depth": "1", "before_revision": "Many real-world dynamical systems can successfully be analyzed using the temporal network formalism. Empirical temporal networks and dynamic processes that take place in these situations show heterogeneous, non-Markovian, and intrinsically correlated dynamics, making their analysis particularly challenging. Randomized reference models (RRMs) for temporal networks constitute a versatile toolbox for studying such systems. Defined as ensembles of random networks with given features constrained to match those of an input (empirical) network, they may be used to identify statistically significant motifs in empirical temporal networks (i.e. overrepresented w.r.t. the null random networks) and to infer the effects of such motifs on dynamical processes unfolding in the network. However, the effects of most randomization procedures on temporal network characteristics remain poorly understood, rendering their use non-trivial and susceptible to misinterpretation. Here we propose a unified framework for classifying and understanding microcanonical RRMs (MRRMs). We use this framework to propose a canonical naming convention for existing randomization procedures, classify them, and deduce their effects on a range of important temporal network features. We furthermore show that certain classes of compatible MRRMs may be applied in sequential composition to generate more than a hundred new MRRMs from existing ones surveyed in this article. We provide a tutorial for the use of MRRMs to analyze an empirical temporal network and we review applications of MRRMs found in literature . The taxonomy of MRRMs we have developed provides a reference to ease the use of MRRMs, and the theoretical foundations laid here may further serve as a base for the development of a principled and systematic way to generate and apply randomized reference null models for the study of temporal networks .", "after_revision": "Many dynamical systems can be successfully analyzed by representing them as networks. Empirically measured networks and dynamic processes that take place in these situations show heterogeneous, non-Markovian, and intrinsically correlated topologies and dynamics. This makes their analysis particularly challenging. Randomized reference models (RRMs) have emerged as a general and versatile toolbox for studying such systems. Defined as ensembles of random networks with given features constrained to match those of an input (empirical) network, they may for example be used to identify important features of empirical networks and their effects on dynamical processes unfolding in the network. RRMs are typically implemented as procedures that reshuffle an empirical network, making them very generally applicable. However, the effects of most shuffling procedures on network features remain poorly understood, rendering their use non-trivial and susceptible to misinterpretation. Here we propose a unified framework for classifying and understanding microcanonical RRMs (MRRMs). Focusing on temporal networks, we use this framework to build a taxonomy of MRRMs that proposes a canonical naming convention , classifies them, and deduces their effects on a range of important network features. We furthermore show that certain classes of compatible MRRMs may be applied in sequential composition to generate over a hundred new MRRMs from the existing ones surveyed in this article. We provide two tutorials showing applications of the MRRM framework to empirical temporal networks: 1) to analyze how different features of a network affect other features and 2) to analyze how such features affect a dynamic process in the network. We finally survey applications of MRRMs found in literature .", "edit_actions": [{"type": "D", "before": "real-world", "after": null, "start_char_pos": 5, "end_char_pos": 15}, {"type": "R", "before": "successfully be analyzed using the temporal network formalism. Empirical temporal", "after": "be successfully analyzed by representing them as networks. Empirically measured", "start_char_pos": 38, "end_char_pos": 119}, {"type": "R", "before": "dynamics, making", "after": "topologies and dynamics. This makes", "start_char_pos": 251, "end_char_pos": 267}, {"type": "R", "before": "for temporal networks constitute a", "after": "have emerged as a general and", "start_char_pos": 344, "end_char_pos": 378}, {"type": "A", "before": null, "after": "for example", "start_char_pos": 553, "end_char_pos": 553}, {"type": "R", "before": "statistically significant motifs in empirical temporal networks (i.e. overrepresented w.r.t. the null random networks) and to infer the effects of such motifs", "after": "important features of empirical networks and their effects", "start_char_pos": 574, "end_char_pos": 732}, {"type": "A", "before": null, "after": "RRMs are typically implemented as procedures that reshuffle an empirical network, making them very generally applicable.", "start_char_pos": 782, "end_char_pos": 782}, {"type": "R", "before": "randomization procedures on temporal network characteristics", "after": "shuffling procedures on network features", "start_char_pos": 812, "end_char_pos": 872}, {"type": "R", "before": "We", "after": "Focusing on temporal networks, we", "start_char_pos": 1068, "end_char_pos": 1070}, {"type": "R", "before": "propose a", "after": "build a taxonomy of MRRMs that proposes a", "start_char_pos": 1093, "end_char_pos": 1102}, {"type": "R", "before": "for existing randomization procedures, classify", "after": ", classifies", "start_char_pos": 1131, "end_char_pos": 1178}, {"type": "R", "before": "deduce", "after": "deduces", "start_char_pos": 1189, "end_char_pos": 1195}, {"type": "D", "before": "temporal", "after": null, "start_char_pos": 1234, "end_char_pos": 1242}, {"type": "R", "before": "more than", "after": "over", "start_char_pos": 1375, "end_char_pos": 1384}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1410, "end_char_pos": 1410}, {"type": "R", "before": "a tutorial for the use of MRRMs to analyze an empirical temporal network and we review", "after": "two tutorials showing applications of the MRRM framework to empirical temporal networks: 1) to analyze how different features of a network affect other features and 2) to analyze how such features affect a dynamic process in the network. We finally survey", "start_char_pos": 1462, "end_char_pos": 1548}, {"type": "D", "before": ". The taxonomy of MRRMs we have developed provides a reference to ease the use of MRRMs, and the theoretical foundations laid here may further serve as a base for the development of a principled and systematic way to generate and apply randomized reference null models for the study of temporal networks", "after": null, "start_char_pos": 1591, "end_char_pos": 1894}], "sents_char_pos": [0, 100, 308, 423, 781, 968, 1067, 1260, 1450, 1592]}
+{"doc_id": "1806.08386", "revision_depth": "1", "before_revision": "Cryptocurrencies are increasingly popular digital assets/cashes programmed to work as a medium of exchange that are \"secure\" by design (e.g., through block-chains and cryptography). The year 2017 saw the rise and fall of the cryptocurrency market, followed by high volatility in the price of each cryptocurrency . In this work, we study critical transitions in cryptocurrency residualsthrough the phenomenon of critical slowing down . We find that, regardless of the specific cryptocurrency or rolling window size, the autocorrelation always fluctuates around a high value and the standard deviation increases monotonically. In particular, we have detected two sudden jumps in the standard deviation, in the second quarter of 2017 and at the beginning of 2018, suggesting early warning signals of two majors price collapse that have happened in those periods. Our findings represent a first step towards a better diagnostic of the risk of critical transition in the price and/or volume of cryptocurrencies .", "after_revision": " The year 2017 saw the rise and fall of the crypto-currency market, followed by high variability in the price of all crypto-currencies . In this work, we study the abrupt transition in crypto-currency residuals, which is associated with the critical transition (the phenomenon of critical slowing down ) or the stochastic transition phenomena . We find that, regardless of the specific crypto-currency or rolling window size, the autocorrelation always fluctuates around a high value , while the standard deviation increases monotonically. Therefore, while the autocorrelation does not display signals of critical slowing down, the standard deviation can be used to anticipate critical or stochastic transitions. In particular, we have detected two sudden jumps in the standard deviation, in the second quarter of 2017 and at the beginning of 2018, which could have served as early warning signals of two majors price collapses that have happened in the following periods. We finally propose a mean-field phenomenological model for the price of crypto-currency to show how the use of the standard deviation of the residuals is a better leading indicator of the collapse in price than the time series' autocorrelation. Our findings represent a first step towards a better diagnostic of the risk of critical transition in the price and/or volume of crypto-currencies .", "edit_actions": [{"type": "D", "before": "Cryptocurrencies are increasingly popular digital assets/cashes programmed to work as a medium of exchange that are \"secure\" by design (e.g., through block-chains and cryptography).", "after": null, "start_char_pos": 0, "end_char_pos": 181}, {"type": "R", "before": "cryptocurrency", "after": "crypto-currency", "start_char_pos": 225, "end_char_pos": 239}, {"type": "R", "before": "volatility", "after": "variability", "start_char_pos": 265, "end_char_pos": 275}, {"type": "R", "before": "each cryptocurrency", "after": "all crypto-currencies", "start_char_pos": 292, "end_char_pos": 311}, {"type": "R", "before": "critical transitions in cryptocurrency residualsthrough the", "after": "the abrupt transition in crypto-currency residuals, which is associated with the critical transition (the", "start_char_pos": 337, "end_char_pos": 396}, {"type": "A", "before": null, "after": ") or the stochastic transition phenomena", "start_char_pos": 433, "end_char_pos": 433}, {"type": "R", "before": "cryptocurrency", "after": "crypto-currency", "start_char_pos": 477, "end_char_pos": 491}, {"type": "R", "before": "and", "after": ", while", "start_char_pos": 574, "end_char_pos": 577}, {"type": "A", "before": null, "after": "Therefore, while the autocorrelation does not display signals of critical slowing down, the standard deviation can be used to anticipate critical or stochastic transitions.", "start_char_pos": 626, "end_char_pos": 626}, {"type": "R", "before": "suggesting", "after": "which could have served as", "start_char_pos": 763, "end_char_pos": 773}, {"type": "R", "before": "collapse", "after": "collapses", "start_char_pos": 816, "end_char_pos": 824}, {"type": "R", "before": "those periods.", "after": "the following periods. We finally propose a mean-field phenomenological model for the price of crypto-currency to show how the use of the standard deviation of the residuals is a better leading indicator of the collapse in price than the time series' autocorrelation.", "start_char_pos": 847, "end_char_pos": 861}, {"type": "R", "before": "cryptocurrencies", "after": "crypto-currencies", "start_char_pos": 991, "end_char_pos": 1007}], "sents_char_pos": [0, 181, 313, 435, 625, 861]}
+{"doc_id": "1807.00509", "revision_depth": "1", "before_revision": "Cortical neurons in the fluctuation driven regime can realize ultrafast population encoding. The underlying biophysical mechanisms, however, are not well understood. Reducing action potential onset rapidness can impair the ultrafast population encoding, but it is not clear whether rapid action potential onset is sufficient for ultrafast population encoding. One hypothesis proposes that rapid action potential onset is caused by the separation of the axon initial segment, that is the initiation site of action potentials, from the soma, and that this spatial separation also results in ultrafast population encoding. Here we examined this hypothesis by studying the linear response properties of a population of model neurons . We find that the axonal initiation site position is not sufficient to generate an ultrafast response and reproduce the high bandwidth observed in cortical neuron populations . Furthermore, the high frequency regime of the linear response function of this model is insensitive to correlation times of the input current contradicting empirical evidence. By tuning the activation slope of the sodium current, we examined the impact of voltage sensitivity of sodium channels on population encoding. When high voltage sensitivity is introduced , the two empirically observed phenomena can be recovered. By investigating varying soma sizes, we furthermore highlight the effect of neuron morphology on the linear response. Our results show that high onset rapidness of action potential initiation is not sufficient for ultrafast response. In the light of recent experimental evidence about neural activity dependent repositioning of the axon initial segment and the resulting question about the functional properties of this phenomenon , our study predicts that , while it can lead to more rapid action potential onsets in the soma, it does not affect the linear response of a population of neurons.", "after_revision": "Cortical neurons in the fluctuation driven regime can realize ultrafast population encoding. The underlying biophysical mechanisms, however, are not well understood. Reducing the sharpness of the action potential onset can impair ultrafast population encoding, but it is not clear whether a sharp action potential onset is sufficient for ultrafast population encoding. One hypothesis proposes that the sharp action potential onset is caused by the electrotonic separation of the site of action potential initiation from the soma, and that this spatial separation also results in ultrafast population encoding. Here we examined this hypothesis by studying the linear response properties of model neurons with a defined initiation site . We find that placing the initiation site at different axonal positions has only a weak impact on the linear response function of the model. It fails to generate the ultrafast response and high bandwidth that is observed in cortical neurons . Furthermore, the high frequency regime of the linear response function of this model is insensitive to correlation times of the input current contradicting empirical evidence. When we increase the voltage sensitivity of sodium channels at the initiation site , the two empirically observed phenomena can be recovered. We provide an explanation for the dissociation of sharp action potential onset and ultrafast response. By investigating varying soma sizes, we furthermore highlight the effect of neuron morphology on the linear response. Our results show that a sharp onset of action potentials is not sufficient for the ultrafast response. In the light of recent reports of activity-dependent repositioning of the axon initial segment , our study predicts that a more distal initiation site can lead to an increased sharpness of the somatic waveform but it does not affect the linear response of a population of neurons.", "edit_actions": [{"type": "A", "before": null, "after": "the sharpness of the", "start_char_pos": 175, "end_char_pos": 175}, {"type": "R", "before": "rapidness can impair the", "after": "can impair", "start_char_pos": 199, "end_char_pos": 223}, {"type": "R", "before": "rapid", "after": "a sharp", "start_char_pos": 283, "end_char_pos": 288}, {"type": "R", "before": "rapid", "after": "the sharp", "start_char_pos": 390, "end_char_pos": 395}, {"type": "A", "before": null, "after": "electrotonic", "start_char_pos": 436, "end_char_pos": 436}, {"type": "D", "before": "axon initial segment, that is the initiation", "after": null, "start_char_pos": 455, "end_char_pos": 499}, {"type": "R", "before": "potentials,", "after": "potential initiation", "start_char_pos": 515, "end_char_pos": 526}, {"type": "R", "before": "a population of model neurons", "after": "model neurons with a defined initiation site", "start_char_pos": 701, "end_char_pos": 730}, {"type": "A", "before": null, "after": "placing the initiation site at different axonal positions has only a weak impact on the linear response function of the model. It fails to generate", "start_char_pos": 746, "end_char_pos": 746}, {"type": "D", "before": "axonal initiation site position is not sufficient to generate an", "after": null, "start_char_pos": 751, "end_char_pos": 815}, {"type": "R", "before": "reproduce the high bandwidth", "after": "high bandwidth that is", "start_char_pos": 839, "end_char_pos": 867}, {"type": "R", "before": "neuron populations", "after": "neurons", "start_char_pos": 889, "end_char_pos": 907}, {"type": "R", "before": "By tuning the activation slope of the sodium current, we examined the impact of", "after": "When we increase the", "start_char_pos": 1086, "end_char_pos": 1165}, {"type": "R", "before": "on population encoding. When high voltage sensitivity is introduced", "after": "at the initiation site", "start_char_pos": 1205, "end_char_pos": 1272}, {"type": "A", "before": null, "after": "We provide an explanation for the dissociation of sharp action potential onset and ultrafast response.", "start_char_pos": 1332, "end_char_pos": 1332}, {"type": "R", "before": "high onset rapidness of action potential initiation", "after": "a sharp onset of action potentials", "start_char_pos": 1473, "end_char_pos": 1524}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1547, "end_char_pos": 1547}, {"type": "R", "before": "experimental evidence about neural activity dependent", "after": "reports of activity-dependent", "start_char_pos": 1591, "end_char_pos": 1644}, {"type": "D", "before": "and the resulting question about the functional properties of this phenomenon", "after": null, "start_char_pos": 1687, "end_char_pos": 1764}, {"type": "R", "before": ", while it", "after": "a more distal initiation site", "start_char_pos": 1791, "end_char_pos": 1801}, {"type": "R", "before": "more rapid action potential onsets in the soma,", "after": "an increased sharpness of the somatic waveform but", "start_char_pos": 1814, "end_char_pos": 1861}], "sents_char_pos": [0, 92, 165, 360, 621, 732, 909, 1085, 1228, 1331, 1450, 1567]}
+{"doc_id": "1807.01776", "revision_depth": "1", "before_revision": "Stunting, or impaired child growth due to undernutrition, has multiple negative health effects, making it a top global health priority. The current benchmark for classifying stunting assumes a universal model of growth with height-for-age z-score (HAZ) cutoffs set by the WHO. However, this universal model may hide hotspots of stunting if populations differ in HAZ in ways that are independent of undernutrition. We assess the potential magnitude of this problem by decomposing variation in HAZ from 1,406,609 children from 63 low-and middle-income countries into two components : ( 1) a component shaped by environmental inputs, such as poverty, infectious disease, inadequate sanitation, and healthcare access, and ( 2) a country-specific starting point that is independent of such inputs. After removing the effects of environmental inputs, we find that different countries have reliably and substantially different starting points in average HAZ scores even before considering environmental inputs (a range of 1.7 SD). As expected from a two-component model, these country-specific starting points (basal HAZ) are not associated with key indicators of undernutrition (e.g., infant mortality and average calorie deficit). By contrast, increases in HAZ above a country's basal estimate (accrued HAZ) show strong correlations with these same variables, suggesting that accrued HAZ captures standard definitions of stunting as impaired growth due to undernutrition. Using these two components, we show how universal cutoffs can underestimate stunting in specific world regions (e.g., sub-Saharan Africa and the Caribbean), where children on average start off taller. As stunting is a high priority global health problem, standards that are sensitive to such population variation in healthy growth should improve efforts to target those most vulnerable to childhood undernutrition.", "after_revision": "Stunting, or impaired child growth due to undernutrition, has multiple negative health effects, making it a top global health priority. The current benchmark for classifying stunting assumes a universal model of growth with height-for-age z-score (HAZ) cutoffs set by the WHO. However, this universal model may hide hotspots of stunting if populations differ in HAZ in ways that are independent of undernutrition. We assess the potential magnitude of this bias by decomposing variation in HAZ from 1,406,609 children from 63 low- and middle-income countries into two components ; 1) a component shaped by environmental inputs, poverty, infectious disease, inadequate sanitation, and healthcare access, and 2) a country-specific basal starting point that is independent of such inputs. After removing the effects of numerous environmental inputs, we find that different countries have reliably and substantially different basal starting points in average HAZ scores (a range of 1.7 SD). These country-specific starting points , which we define as basal HAZ, are not associated with key indicators of undernutrition (e.g., infant mortality and average calorie deficit). By contrast, average increases in HAZ above a country's starting point, which we define as accrued HAZ, show strong correlations with these same variables, suggesting that low accrued HAZ captures standard definitions of stunting as impaired growth due to undernutrition. Using these two components, we show how universal cutoffs can underestimate stunting in specific world regions (e.g., sub-Saharan Africa and the Caribbean), where children in even very deprived situations start off taller. As stunting is a high priority global health problem, standards that are sensitive to such population variation in healthy growth should improve efforts to target those most vulnerable to childhood undernutrition.", "edit_actions": [{"type": "R", "before": "problem", "after": "bias", "start_char_pos": 456, "end_char_pos": 463}, {"type": "R", "before": "low-and", "after": "low- and", "start_char_pos": 528, "end_char_pos": 535}, {"type": "R", "before": ": (", "after": ";", "start_char_pos": 580, "end_char_pos": 583}, {"type": "D", "before": "such as", "after": null, "start_char_pos": 631, "end_char_pos": 638}, {"type": "D", "before": "(", "after": null, "start_char_pos": 718, "end_char_pos": 719}, {"type": "A", "before": null, "after": "basal", "start_char_pos": 742, "end_char_pos": 742}, {"type": "A", "before": null, "after": "numerous", "start_char_pos": 824, "end_char_pos": 824}, {"type": "A", "before": null, "after": "basal", "start_char_pos": 922, "end_char_pos": 922}, {"type": "D", "before": "even before considering environmental inputs", "after": null, "start_char_pos": 961, "end_char_pos": 1005}, {"type": "R", "before": "As expected from a two-component model, these", "after": "These", "start_char_pos": 1027, "end_char_pos": 1072}, {"type": "R", "before": "(basal HAZ)", "after": ", which we define as basal HAZ,", "start_char_pos": 1106, "end_char_pos": 1117}, {"type": "A", "before": null, "after": "average", "start_char_pos": 1242, "end_char_pos": 1242}, {"type": "R", "before": "basal estimate (accrued HAZ)", "after": "starting point, which we define as accrued HAZ,", "start_char_pos": 1278, "end_char_pos": 1306}, {"type": "A", "before": null, "after": "low", "start_char_pos": 1375, "end_char_pos": 1375}, {"type": "R", "before": "on average", "after": "in even very deprived situations", "start_char_pos": 1644, "end_char_pos": 1654}], "sents_char_pos": [0, 135, 276, 413, 793, 1026, 1228, 1471, 1672]}
+{"doc_id": "1807.01776", "revision_depth": "2", "before_revision": "Stunting, or impaired child growth due to undernutrition, has multiple negative health effects, making it a top global health priority. The current benchmark for classifying stunting assumes a universal model of growth with height-for-age z-score (HAZ) cutoffs set by the WHO . However, this universal model may hide hotspots of stunting if populations differ in HAZ in ways that are independent of undernutrition. We assess the potential magnitude of this bias by decomposing variation in HAZ from 1, 406,609 children from 63 low- and middle-income countries into two components ; 1) a component shaped by environmental inputs, poverty, infectious disease, inadequate sanitation, and healthcare access, and 2) a country-specific basal starting point that is independent of such inputs. After removing the effects of numerous environmental inputs, we find that different countries have reliably and substantially different basal starting points in average HAZ scores (a range of 1.7 SD) . These country-specific starting points, which we define as basal HAZ, are not associated with key indicators of undernutrition (e. g., infant mortality and average calorie deficit). By contrast, average increases in HAZ above a country's starting point, which we define as accrued HAZ , show strong correlations with these same variables, suggesting that low accrued HAZ captures standard definitions of stunting as impaired growth due to undernutrition. Using these two components, we show how universal cutoffs can underestimate stunting in specific world regions (e.g., sub-Saharan Africa and the Caribbean), where children in even very deprived situations start off taller . As stunting is a high priority global health problem , standards that are sensitive to such population variation in healthy growth should improve efforts to target those most vulnerable to childhood undernutrition.", "after_revision": "Background: Stunting-or impaired child growth due to undernutrition-has multiple negative health effects, making it a top global health priority. The current benchmark for classifying stunting assumes a universal model of growth with height-for-age z-score (HAZ) cutoffs set by the World Health Organization . However, this model may hide hotspots of stunting if populations differ in HAZ in ways that are independent of undernutrition. We examine how universal cutoffs can underestimate stunting in specific regions around the world. Methods: Using a non-linear multi-level model, we decompose variation in height-for-age z-scores (HAZ) from 1, 430,986 children across 63 countries into two components : 1) \"accrued HAZ\" shaped by environmental inputs-undernutrition, infectious disease, inadequate sanitation, and 2) a country-specific \"basal HAZ\" independent of such inputs. We validate these components by assessing their associations with key indicators of undernutrition. We then re-estimate stunting prevalence with population-sensitive cutoffs based on the estimates of these two components. Results: Basal HAZ differs reliably across countries (range of 1.6 SD) and is independent of measures of undernutrition. By contrast, accrued HAZ captures stunting as impaired growth due to deprivation. Population-sensitive estimates suggest that universal cutoffs can miss 1 in 5 children in specific world regions , where children have greater basal heights. Conclusion: Current universal cutoffs may miss stunting in populations with taller basal HAZ . As stunting is a high priority in global health , standards that are sensitive to population variation in healthy growth should improve efforts to target those most vulnerable to childhood undernutrition.", "edit_actions": [{"type": "R", "before": "Stunting, or", "after": "Background: Stunting-or", "start_char_pos": 0, "end_char_pos": 12}, {"type": "R", "before": "undernutrition, has", "after": "undernutrition-has", "start_char_pos": 42, "end_char_pos": 61}, {"type": "R", "before": "WHO", "after": "World Health Organization", "start_char_pos": 272, "end_char_pos": 275}, {"type": "D", "before": "universal", "after": null, "start_char_pos": 292, "end_char_pos": 301}, {"type": "R", "before": "assess the potential magnitude of this bias by decomposing variation in HAZ", "after": "examine how universal cutoffs can underestimate stunting in specific regions around the world. Methods: Using a non-linear multi-level model, we decompose variation in height-for-age z-scores (HAZ)", "start_char_pos": 418, "end_char_pos": 493}, {"type": "R", "before": "406,609 children from", "after": "430,986 children across", "start_char_pos": 502, "end_char_pos": 523}, {"type": "D", "before": "low- and middle-income", "after": null, "start_char_pos": 527, "end_char_pos": 549}, {"type": "R", "before": ";", "after": ":", "start_char_pos": 580, "end_char_pos": 581}, {"type": "R", "before": "a component", "after": "\"accrued HAZ\"", "start_char_pos": 585, "end_char_pos": 596}, {"type": "R", "before": "inputs, poverty,", "after": "inputs-undernutrition,", "start_char_pos": 621, "end_char_pos": 637}, {"type": "D", "before": "healthcare access, and", "after": null, "start_char_pos": 685, "end_char_pos": 707}, {"type": "R", "before": "basal starting point that is", "after": "\"basal HAZ\"", "start_char_pos": 730, "end_char_pos": 758}, {"type": "R", "before": "After removing the effects of numerous environmental inputs, we find that different countries have reliably and substantially different basal starting points in average HAZ scores (a range of 1.7 SD) . These country-specific starting points, which we define as basal HAZ, are not associated with key indicators of undernutrition (e. g., infant mortality and average calorie deficit).", "after": "We validate these components by assessing their associations with key indicators of undernutrition. We then re-estimate stunting prevalence with population-sensitive cutoffs based on the estimates of these two components. Results: Basal HAZ differs reliably across countries (range of 1.6 SD) and is independent of measures of undernutrition.", "start_char_pos": 787, "end_char_pos": 1170}, {"type": "R", "before": "average increases in HAZ above a country's starting point, which we define as accrued HAZ , show strong correlations with these same variables, suggesting that low accrued HAZ captures standard definitions of", "after": "accrued HAZ captures", "start_char_pos": 1184, "end_char_pos": 1392}, {"type": "R", "before": "undernutrition. Using these two components, we show how", "after": "deprivation. Population-sensitive estimates suggest that", "start_char_pos": 1428, "end_char_pos": 1483}, {"type": "R", "before": "underestimate stunting in", "after": "miss 1 in 5 children in", "start_char_pos": 1506, "end_char_pos": 1531}, {"type": "R", "before": "(e.g., sub-Saharan Africa and the Caribbean), where children in even very deprived situations start off taller", "after": ", where children have greater basal heights. Conclusion: Current universal cutoffs may miss stunting in populations with taller basal HAZ", "start_char_pos": 1555, "end_char_pos": 1665}, {"type": "R", "before": "global health problem", "after": "in global health", "start_char_pos": 1699, "end_char_pos": 1720}, {"type": "D", "before": "such", "after": null, "start_char_pos": 1755, "end_char_pos": 1759}], "sents_char_pos": [0, 135, 414, 581, 786, 1170, 1443, 1667]}
+{"doc_id": "1807.01776", "revision_depth": "3", "before_revision": "Background: Stunting-or impaired child growth due to undernutrition-has multiple negative health effects, making it a top global health priority. The current benchmark for classifying stunting assumes a universal model of growth with height-for-age z-score (HAZ) cutoffs set by the World Health Organization. However, this model may hide hotspots of stunting if populations differ in HAZ in ways that are independent of undernutrition. We examine how universal cutoffs can underestimate stunting in specific regions around the world. Methods: Using a non-linear multi-level model , we decompose variation in height-for-age z-scores (HAZ) from 1, 430,986 children across 63 countries into two components: 1) \"accrued HAZ\" shaped by environmental inputs-undernutrition, infectious disease, inadequate sanitation, and 2) a country-specific \"basal HAZ\" independent of such inputs. We validate these components by assessing their associations with key indicators of undernutrition. We then re-estimate stuntingprevalence with population-sensitive cutoffs based on the estimates of these two components . Results: Basal HAZ differs reliably across countries (range of 1.6 SD) and is independent of measures of undernutrition . By contrast, accrued HAZ captures stunting as impaired growth due to deprivation . Population-sensitive estimates suggest that universal cutoffs can miss 1 in 5 children in specific world regions, where children have greater basal heights. Conclusion : Current universal cutoffs may miss stunting in populations with taller basal HAZ. As stunting is a high priority in global health, standards that are sensitive to population variation in healthy growth should improve efforts to target those most vulnerable to childhood undernutrition .", "after_revision": "Objectives: Current standards for comparing stunting across human populations assume a universal model of child growth. Such comparisons ignore population differences that are independent of deprivation and health outcomes. This paper partitions variation in height-for-age that is specifically associated with deprivation and health outcomes to provide a basis for cross-population comparisons. Materials Methods: Using a multi-level model with a sigmoid relationship of resources and growth, we partition variation in height-for-age z-scores (HAZ) from 1, 522,564 children across 70 countries into two components: 1) \"accrued HAZ\" shaped by environmental inputs (e.g., undernutrition, infectious disease, inadequate sanitation, poverty), and 2) a country-specific \"basal HAZ\" independent of such inputs. We validate these components against population-level infant mortality rates, and assess how these basal differences may affect cross-population comparisons of stunting . Results: Basal HAZ differs reliably across countries (range of 1.5 SD) and is independent of measures of infant mortality . By contrast, accrued HAZ captures stunting as impaired growth due to deprivation and is more closely associated with infant mortality than observed HAZ. Ranking populations by accrued HAZ suggest that populations in West Africa and the Caribbean suffer much greater levels of stunting than suggested by observed HAZ. Discussion : Current universal standards may dramatically underestimate stunting in populations with taller basal HAZ. Relying on observed HAZ rather than accrued HAZ may also lead to inappropriate cross-population comparisons, such as concluding that Haitian children enjoy better conditions for growth than do Indian or Guatemalan children .", "edit_actions": [{"type": "R", "before": "Background: Stunting-or impaired child growth due to undernutrition-has multiple negative health effects, making it a top global health priority. The current benchmark for classifying stunting assumes", "after": "Objectives: Current standards for comparing stunting across human populations assume", "start_char_pos": 0, "end_char_pos": 200}, {"type": "R", "before": "growth with height-for-age z-score (HAZ) cutoffs set by the World Health Organization. However, this model may hide hotspots of stunting if populations differ in HAZ in ways", "after": "child growth. Such comparisons ignore population differences", "start_char_pos": 222, "end_char_pos": 395}, {"type": "R", "before": "undernutrition. We examine how universal cutoffs can underestimate stunting in specific regions around the world.", "after": "deprivation and health outcomes. This paper partitions variation in height-for-age that is specifically associated with deprivation and health outcomes to provide a basis for cross-population comparisons. Materials", "start_char_pos": 420, "end_char_pos": 533}, {"type": "D", "before": "non-linear", "after": null, "start_char_pos": 551, "end_char_pos": 561}, {"type": "R", "before": ", we decompose", "after": "with a sigmoid relationship of resources and growth, we partition", "start_char_pos": 580, "end_char_pos": 594}, {"type": "R", "before": "430,986 children across 63", "after": "522,564 children across 70", "start_char_pos": 646, "end_char_pos": 672}, {"type": "R", "before": "inputs-undernutrition,", "after": "inputs (e.g., undernutrition,", "start_char_pos": 745, "end_char_pos": 767}, {"type": "A", "before": null, "after": "poverty),", "start_char_pos": 811, "end_char_pos": 811}, {"type": "R", "before": "by assessing their associations with key indicators of undernutrition. We then re-estimate stuntingprevalence with population-sensitive cutoffs based on the estimates of these two components", "after": "against population-level infant mortality rates, and assess how these basal differences may affect cross-population comparisons of stunting", "start_char_pos": 907, "end_char_pos": 1097}, {"type": "R", "before": "1.6", "after": "1.5", "start_char_pos": 1163, "end_char_pos": 1166}, {"type": "R", "before": "undernutrition", "after": "infant mortality", "start_char_pos": 1205, "end_char_pos": 1219}, {"type": "R", "before": ". Population-sensitive estimates suggest that universal cutoffs can miss 1 in 5 children in specific world regions, where children have greater basal heights. Conclusion", "after": "and is more closely associated with infant mortality than observed HAZ. Ranking populations by accrued HAZ suggest that populations in West Africa and the Caribbean suffer much greater levels of stunting than suggested by observed HAZ. Discussion", "start_char_pos": 1303, "end_char_pos": 1472}, {"type": "R", "before": "cutoffs may miss", "after": "standards may dramatically underestimate", "start_char_pos": 1493, "end_char_pos": 1509}, {"type": "R", "before": "As stunting is a high priority in global health, standards that are sensitive to population variation in healthy growth should improve efforts to target those most vulnerable to childhood undernutrition", "after": "Relying on observed HAZ rather than accrued HAZ may also lead to inappropriate cross-population comparisons, such as concluding that Haitian children enjoy better conditions for growth than do Indian or Guatemalan children", "start_char_pos": 1557, "end_char_pos": 1759}], "sents_char_pos": [0, 145, 308, 435, 533, 877, 977, 1221, 1461, 1556]}
+{"doc_id": "1807.10114", "revision_depth": "1", "before_revision": "Since Bachelier 's thesis in 1900, when mathematical finance began, attempts at understanding the nature of stock market prices and at predicting them have not succeeded. Statistical models have only found minor regularities and anomalies. Other approaches have failed or are illusory. To this day, physicists and mathematicians working in economy consider that the evolution of security prices is largely random, and, thus, not predictable. We show that not only is the evolution of security prices not random but it is semi-deterministic and, more remarkably, governed by a physical law. The law takes the form of a physicomathematical theory centered around a purely mathematical function (not a model and unrelated to statistical methods). The function , which can be described as an \"isodense\" network of \"moving\" regression curves of an order greater than or equal to 1, can be conveniently represented graphically . The graphical representation , called a \"topological network\" , reveals the existence of new mathematical objects , which emerge spontaneously (they are not mathematically drawn). What is remarkable is that these objects, called \"characteristic figures\" , mainly \"cords\" , have the unique property of attracting and repelling the price, so that the price bounces from one cord to another. The direct consequence is that prices are driven by these cords in a semi-deterministic manner (leaning towards deterministic). We can say that we now understand the reason behind price movements and can predict stock prices both qualitatively and quantitatively. Note that time series data (not limited to financial) is input directly into the function without any fitting. The function is universal (it is a one fits all function) and, thanks to its extreme sensitivity, reveals the hidden order present in time series data that other methods have never uncovered.", "after_revision": "Since Bachelier in 1900, when mathematical finance began, attempts at understanding the nature of stock market prices and at predicting them have not succeeded. Statistical models have only found minor regularities and anomalies. Other approaches have failed or are illusory. To this day, the physicists and mathematicians working in economy consider that the evolution of security prices is basically random, and, thus, not predictable. We show that the evolution of security prices not at all random but is largely deterministic and, more remarkably, governed by a physical law. The law takes the form of a physicomathematical theory centered around a purely mathematical function (not a model and unrelated to statistical methods). The function can be described as an \"isodense\" network of \"moving\" regression curves of an order greater than or equal to 1. When inputting a time series of any security into the function, new mathematical objects emerge spontaneously . The graphical representation of the function is called a \"topological network\" and the emergent objects are called \"characteristic figures\" ( mainly \"cords\" ). What is central to the function is that these cords have the unique property of attracting and repelling the price, so that the price bounces from one cord to another. The direct consequence is that prices are driven by the cords in a semi-deterministic manner (leaning towards deterministic). Having a function that describes the evolution of the price, we now understand the reason behind each price movement and can predict stock prices both qualitatively and quantitatively. The function is universal , does not rely on any fitting, and, thanks to its extreme sensitivity, reveals the hidden order present in time series data that other methods have never uncovered.", "edit_actions": [{"type": "D", "before": "'s thesis", "after": null, "start_char_pos": 16, "end_char_pos": 25}, {"type": "A", "before": null, "after": "the", "start_char_pos": 299, "end_char_pos": 299}, {"type": "R", "before": "largely", "after": "basically", "start_char_pos": 399, "end_char_pos": 406}, {"type": "D", "before": "not only is", "after": null, "start_char_pos": 456, "end_char_pos": 467}, {"type": "R", "before": "random but it is semi-deterministic", "after": "at all random but is largely deterministic", "start_char_pos": 505, "end_char_pos": 540}, {"type": "D", "before": ", which", "after": null, "start_char_pos": 758, "end_char_pos": 765}, {"type": "R", "before": "1, can be conveniently represented graphically", "after": "1. When inputting a time series of any security into the function, new mathematical objects emerge spontaneously", "start_char_pos": 875, "end_char_pos": 921}, {"type": "R", "before": ",", "after": "of the function is", "start_char_pos": 953, "end_char_pos": 954}, {"type": "R", "before": ", reveals the existence of new mathematical objects , which emerge spontaneously (they are not mathematically drawn). What is remarkable is that these objects,", "after": "and the emergent objects are", "start_char_pos": 986, "end_char_pos": 1145}, {"type": "R", "before": ",", "after": "(", "start_char_pos": 1178, "end_char_pos": 1179}, {"type": "R", "before": ",", "after": "). What is central to the function is that these cords", "start_char_pos": 1195, "end_char_pos": 1196}, {"type": "R", "before": "these", "after": "the", "start_char_pos": 1365, "end_char_pos": 1370}, {"type": "R", "before": "We can say that", "after": "Having a function that describes the evolution of the price,", "start_char_pos": 1441, "end_char_pos": 1456}, {"type": "R", "before": "price movements", "after": "each price movement", "start_char_pos": 1493, "end_char_pos": 1508}, {"type": "D", "before": "Note that time series data (not limited to financial) is input directly into the function without any fitting.", "after": null, "start_char_pos": 1577, "end_char_pos": 1687}, {"type": "R", "before": "(it is a one fits all function)", "after": ", does not rely on any fitting,", "start_char_pos": 1714, "end_char_pos": 1745}], "sents_char_pos": [0, 170, 239, 285, 442, 590, 744, 923, 1103, 1312, 1440, 1576, 1687]}
+{"doc_id": "1808.05464", "revision_depth": "1", "before_revision": "Almost all EEG-based brain-computer interfaces (BCIs) need some labeled subject-specific data to calibrate a new subject, as neural responses are different across subjects to even the same stimulus. So, a major challenge in developing high-performance and user-friendly BCIs is to cope with such individual differences so that the calibration can be reduced or even completely eliminated. This paper focuses on the latter. More specifically, we consider an offline application scenario, in which we have unlabeled EEG trials from a new subject, and would like to accurately label them by leveraging auxiliary labeled EEG trials from other subjects in the same task. To accommodate the individual differences, we propose a novel unsupervised approach to align the EEG trials from different subjects in the Euclidean space to make them more consistent. It has three desirable properties: 1) the aligned trial lie in the Euclidean space, which can be used by any Euclidean space signal processing and machine learning approach ; 2) it can be computed very efficiently ; and, 3) it does not need any labeled trials from the new subject. Experiments on motor imagery and event-related potentials demonstrated the effectiveness and efficiency of our approach .", "after_revision": "Objective: This paper targets a major challenge in developing practical EEG-based brain-computer interfaces (BCIs) : how to cope with individual differences so that better learning performance can be obtained for a new subject, with minimum or even no subject-specific data? Methods: We propose a novel approach to align EEG trials from different subjects in the Euclidean space to make them more similar, and hence improve the learning performance for a new subject. Our approach has three desirable properties: 1) it aligns the EEG trials directly in the Euclidean space, and any signal processing, feature extraction and machine learning algorithms can then be applied to the aligned trials ; 2) its computational cost is very low ; and, 3) it is unsupervised and does not need any label information from the new subject. Results: Both offline and simulated online experiments on motor imagery classification and event-related potential classification verified that our proposed approach outperformed a state-of-the-art Riemannian space data alignment approach, and several approaches without data alignment. Conclusion: The proposed Euclidean space EEG data alignment approach can greatly facilitate transfer learning in BCIs. Significance: Our proposed approach is effective, efficient, and easy to implement. It could be an essential pre-processing step for EEG-based BCIs .", "edit_actions": [{"type": "R", "before": "Almost all", "after": "Objective: This paper targets a major challenge in developing practical", "start_char_pos": 0, "end_char_pos": 10}, {"type": "R", "before": "need some labeled subject-specific data to calibrate a new subject, as neural responses are different across subjects to even the same stimulus. So, a major challenge in developing high-performance and user-friendly BCIs is to cope with such", "after": ": how to cope with", "start_char_pos": 54, "end_char_pos": 295}, {"type": "R", "before": "the calibration can be reduced or even completely eliminated. This paper focuses on the latter. More specifically, we consider an offline application scenario, in which we have unlabeled EEG trials from", "after": "better learning performance can be obtained for", "start_char_pos": 327, "end_char_pos": 529}, {"type": "R", "before": "and would like to accurately label them by leveraging auxiliary labeled EEG trials from other subjects in the same task. To accommodate the individual differences, we", "after": "with minimum or even no subject-specific data? Methods: We", "start_char_pos": 545, "end_char_pos": 711}, {"type": "D", "before": "unsupervised", "after": null, "start_char_pos": 728, "end_char_pos": 740}, {"type": "D", "before": "the", "after": null, "start_char_pos": 759, "end_char_pos": 762}, {"type": "R", "before": "consistent. It", "after": "similar, and hence improve the learning performance for a new subject. Our approach", "start_char_pos": 839, "end_char_pos": 853}, {"type": "R", "before": "the aligned trial lie", "after": "it aligns the EEG trials directly", "start_char_pos": 889, "end_char_pos": 910}, {"type": "R", "before": "which can be used by any Euclidean space signal processing", "after": "and any signal processing, feature extraction", "start_char_pos": 935, "end_char_pos": 993}, {"type": "R", "before": "approach", "after": "algorithms can then be applied to the aligned trials", "start_char_pos": 1015, "end_char_pos": 1023}, {"type": "R", "before": "it can be computed very efficiently", "after": "its computational cost is very low", "start_char_pos": 1029, "end_char_pos": 1064}, {"type": "A", "before": null, "after": "is unsupervised and", "start_char_pos": 1078, "end_char_pos": 1078}, {"type": "R", "before": "labeled trials", "after": "label information", "start_char_pos": 1097, "end_char_pos": 1111}, {"type": "R", "before": "Experiments", "after": "Results: Both offline and simulated online experiments", "start_char_pos": 1134, "end_char_pos": 1145}, {"type": "A", "before": null, "after": "classification", "start_char_pos": 1163, "end_char_pos": 1163}, {"type": "R", "before": "potentials demonstrated the effectiveness and efficiency of our approach", "after": "potential classification verified that our proposed approach outperformed a state-of-the-art Riemannian space data alignment approach, and several approaches without data alignment. Conclusion: The proposed Euclidean space EEG data alignment approach can greatly facilitate transfer learning in BCIs. Significance: Our proposed approach is effective, efficient, and easy to implement. It could be an essential pre-processing step for EEG-based BCIs", "start_char_pos": 1182, "end_char_pos": 1254}], "sents_char_pos": [0, 198, 388, 422, 665, 850, 1025, 1066, 1133]}
+{"doc_id": "1808.07768", "revision_depth": "2", "before_revision": "Jeandel and Rao proved that 11 is the size of the smallest set of Wang tiles, i.e., unit squares with colored edges, that admit valid (contiguous edges of adjacent tiles have the same color) tilings of the plane none of them being invariant under a nontrivial translation. In this contribution, we study the Wang shift \\Omega_0 made of all valid tilings using the set T_0 of 11 aperiodic Wang tiles discovered by Jeandel and Rao. We show that there exists a minimal subshift X_0 of \\Omega_0 such that any tiling in X_0 can be decomposed uniquely into 19 distinct patches of sizes ranging from 45 to 112 that are equivalent to a set of self-similar and aperiodic 19 Wang tiles. We think that this gives an almost complete description of the substitutive structure of Jeandel-Rao tilings as we believe that \\Omega_0\\setminus X_0 is a null set for any shift-invariant probability measure on \\Omega_0. The proof is based on twelve elementary stepswhere ten of them are using the same procedure allowing to desubstitute Wang tilings from the existence of a subset of marker tiles. The two other steps are adding decorations to deal with fault lines and are changing the base of the \\mathbb{Z}^2-action through a shear conjugacy. Algorithms are provided to find markers, recognizable substitutions and shear conjugacy from a set of Wang tiles.", "after_revision": "Jeandel and Rao proved that 11 is the size of the smallest set of Wang tiles, i.e., unit squares with colored edges, that admit valid tilings (contiguous edges of adjacent tiles have the same color) of the plane , none of them being invariant under a nontrivial translation. We study herein the Wang shift \\Omega_0 made of all valid tilings using the set T_0 of 11 aperiodic Wang tiles discovered by Jeandel and Rao. We show that there exists a minimal subshift X_0 of \\Omega_0 such that every tiling in X_0 can be decomposed uniquely into 19 distinct patches of sizes ranging from 45 to 112 that are equivalent to a set of 19 self-similar and aperiodic Wang tiles. We suggest that this provides an almost complete description of the substitutive structure of Jeandel-Rao tilings , as we believe that \\Omega_0\\setminus X_0 is a null set for any shift-invariant probability measure on \\Omega_0. The proof is based on 12 elementary steps, 10 of which involve the same procedure allowing one to desubstitute Wang tilings from the existence of a subset of marker tiles. The 2 other steps involve the addition of decorations to deal with fault lines and changing the base of the \\mathbb{Z}^2-action through a shear conjugacy. Algorithms are provided to find markers, recognizable substitutions , and shear conjugacy from a set of Wang tiles.", "edit_actions": [{"type": "A", "before": null, "after": "tilings", "start_char_pos": 134, "end_char_pos": 134}, {"type": "D", "before": "tilings", "after": null, "start_char_pos": 192, "end_char_pos": 199}, {"type": "A", "before": null, "after": ",", "start_char_pos": 213, "end_char_pos": 213}, {"type": "R", "before": "In this contribution, we study", "after": "We study herein", "start_char_pos": 275, "end_char_pos": 305}, {"type": "R", "before": "any", "after": "every", "start_char_pos": 503, "end_char_pos": 506}, {"type": "A", "before": null, "after": "19", "start_char_pos": 637, "end_char_pos": 637}, {"type": "D", "before": "19", "after": null, "start_char_pos": 665, "end_char_pos": 667}, {"type": "R", "before": "think that this gives", "after": "suggest that this provides", "start_char_pos": 683, "end_char_pos": 704}, {"type": "A", "before": null, "after": ",", "start_char_pos": 789, "end_char_pos": 789}, {"type": "R", "before": "twelve elementary stepswhere ten of them are using", "after": "12 elementary steps, 10 of which involve", "start_char_pos": 924, "end_char_pos": 974}, {"type": "A", "before": null, "after": "one", "start_char_pos": 1003, "end_char_pos": 1003}, {"type": "R", "before": "two other steps are adding", "after": "2 other steps involve the addition of", "start_char_pos": 1085, "end_char_pos": 1111}, {"type": "D", "before": "are", "after": null, "start_char_pos": 1153, "end_char_pos": 1156}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1297, "end_char_pos": 1297}], "sents_char_pos": [0, 274, 431, 679, 901, 1080, 1228]}
+{"doc_id": "1808.08563", "revision_depth": "3", "before_revision": "In an economy which could not accommodate the full employment of its labor force, it employs some labor but does not employ others. The bipartition of the labor force is random, and we characterize it by a compound Beta-Binomial probability distribution with equal employment opportunity. We value each employed individual by his or her marginal contribution to the production function; we also value each unemployed individual by the potential marginal contribution the person would make if the market hired the individual. We fully recognize both the individual value and its national aggregates in distributing the net production to the unemployment welfare and the employment benefits. Using a real-time balanced budget rule of taxation , we derive a fair, debt-free, and asymptotic risk-free tax rate for any given unemployment rate . The tax rate minimizes the asymptotic mean, variance, semi-variance, and mean absolute deviation of the underlying posterior unemployment rate. The allocation rule stimulates employment and boosts productivity. Under some symmetry assumptions, we find that an unemployed person should also enjoy equivalent employment benefits, and the tax rate goes with this welfare equality. The tool employed is the cooperative game theory in which we assume a large number of players. The players are randomly bi-partitioned , and the payoff varies with the partition. Thus, one could apply the fair distribution rule and valuation approach to other profit-sharing or cost-sharing situations with similar characteristics. This framework is open to alternative identification strategies and other forms of equal opportunity .", "after_revision": "In an economy which could not accommodate the full employment of its labor force, it employs some labor but does not employ others. The bipartition of the labor force is random, and we characterize it by an axiom of equal employment opportunity. We value each employed individual by his or her marginal contribution to the production function; we also value each unemployed individual by the potential marginal contribution the person would make if the market hired the individual. We then use the aggregate individual value to distribute the net production to the unemployment welfare and the employment benefits. Using real-time balanced-budget rule as a constraint and policy stability as an objective , we derive a scientific formula which describes a fair, debt-free, and asymptotic risk-free tax rate for any given unemployment rate and national spending level . The tax rate minimizes the asymptotic mean, variance, semi-variance, and mean absolute deviation of the underlying posterior unemployment rate. The allocation rule stimulates employment and boosts productivity. Under some symmetry assumptions, we even find that an unemployed person should enjoy equivalent employment benefits, and the tax rate goes with this welfare equality. The tool employed is the cooperative game theory in which we assume many players. The players are randomly bipartitioned , and the payoff varies with the partition. One could apply the fair distribution rule and valuation approach to other profit-sharing or cost-sharing situations with these characteristics. This framework is open to alternative identification strategies and other forms of equal opportunity axiom .", "edit_actions": [{"type": "R", "before": "a compound Beta-Binomial probability distribution with", "after": "an axiom of", "start_char_pos": 204, "end_char_pos": 258}, {"type": "R", "before": "fully recognize both the individual value and its national aggregates in distributing", "after": "then use the aggregate individual value to distribute", "start_char_pos": 528, "end_char_pos": 613}, {"type": "D", "before": "a", "after": null, "start_char_pos": 696, "end_char_pos": 697}, {"type": "R", "before": "balanced budget rule of taxation", "after": "balanced-budget rule as a constraint and policy stability as an objective", "start_char_pos": 708, "end_char_pos": 740}, {"type": "A", "before": null, "after": "scientific formula which describes a", "start_char_pos": 755, "end_char_pos": 755}, {"type": "A", "before": null, "after": "and national spending level", "start_char_pos": 839, "end_char_pos": 839}, {"type": "A", "before": null, "after": "even", "start_char_pos": 1089, "end_char_pos": 1089}, {"type": "D", "before": "also", "after": null, "start_char_pos": 1128, "end_char_pos": 1132}, {"type": "R", "before": "a large number of", "after": "many", "start_char_pos": 1289, "end_char_pos": 1306}, {"type": "R", "before": "bi-partitioned", "after": "bipartitioned", "start_char_pos": 1341, "end_char_pos": 1355}, {"type": "R", "before": "Thus, one", "after": "One", "start_char_pos": 1400, "end_char_pos": 1409}, {"type": "R", "before": "similar", "after": "these", "start_char_pos": 1528, "end_char_pos": 1535}, {"type": "A", "before": null, "after": "axiom", "start_char_pos": 1654, "end_char_pos": 1654}], "sents_char_pos": [0, 131, 288, 386, 524, 689, 841, 985, 1052, 1220, 1315, 1399, 1552]}
+{"doc_id": "1809.07300", "revision_depth": "1", "before_revision": "We present a novel method for the numerical pricing of American options based on Monte Carlo simulation and optimization of exercise strategies. Previous solutions to this problem either explicitly or implicitly determine so-called optimal exercise regions , which consist of points in time and space at which the option is exercised. In contrast, our method determines exercise rates of randomized exercise strategies. We show that the supremum of the corresponding stochastic optimization problem provides the correct option price. By integrating analytically over the random exercise decision, we obtain an objective function that is differentiable with respect to perturbations of the exercise rate even for finitely many sample paths. Starting in a neutral strategy with constant exercise rate then allows us to globally optimize this function in a gradual manner . Numerical experiments on vanilla put options in the multivariate Black--Scholes model and preliminary theoretical analysis underline the efficiency of our method both with respect to the number of time-discretization steps and the required number of degrees of freedom in the parametrization of exercise rates. Finally, the flexibility of our method is demonstrated by numerical experiments on max call options in the Black--Scholes model and vanilla put options in Heston model and the non-Markovian rough Bergomi model.", "after_revision": "We present a novel method for the numerical pricing of American options based on Monte Carlo simulation and the optimization of exercise strategies. Previous solutions to this problem either explicitly or implicitly determine so-called optimal exercise regions , which consist of points in time and space at which a given option is exercised. In contrast, our method determines the exercise rates of randomized exercise strategies. We show that the supremum of the corresponding stochastic optimization problem provides the correct option price. By integrating analytically over the random exercise decision, we obtain an objective function that is differentiable with respect to perturbations of the exercise rate even for finitely many sample paths. The global optimum of this function can be approached gradually when starting from a constant exercise rate . Numerical experiments on vanilla put options in the multivariate Black-Scholes model and a preliminary theoretical analysis underline the efficiency of our method , both with respect to the number of time-discretization steps and the required number of degrees of freedom in the parametrization of the exercise rates. Finally, we demonstrate the flexibility of our method through numerical experiments on max call options in the classical Black-Scholes model, and vanilla put options in both the Heston model and the non-Markovian rough Bergomi model.", "edit_actions": [{"type": "A", "before": null, "after": "the", "start_char_pos": 108, "end_char_pos": 108}, {"type": "R", "before": "exercise regions", "after": "exercise regions", "start_char_pos": 241, "end_char_pos": 257}, {"type": "R", "before": "the", "after": "a given", "start_char_pos": 311, "end_char_pos": 314}, {"type": "R", "before": "exercise rates", "after": "the exercise rates", "start_char_pos": 371, "end_char_pos": 385}, {"type": "R", "before": "Starting in a neutral strategy with", "after": "The global optimum of this function can be approached gradually when starting from a", "start_char_pos": 741, "end_char_pos": 776}, {"type": "D", "before": "then allows us to globally optimize this function in a gradual manner", "after": null, "start_char_pos": 800, "end_char_pos": 869}, {"type": "R", "before": "Black--Scholes model and", "after": "Black-Scholes model and a", "start_char_pos": 937, "end_char_pos": 961}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1034, "end_char_pos": 1034}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1168, "end_char_pos": 1168}, {"type": "A", "before": null, "after": "we demonstrate", "start_char_pos": 1194, "end_char_pos": 1194}, {"type": "R", "before": "is demonstrated by", "after": "through", "start_char_pos": 1225, "end_char_pos": 1243}, {"type": "R", "before": "Black--Scholes model", "after": "classical Black-Scholes model,", "start_char_pos": 1293, "end_char_pos": 1313}, {"type": "A", "before": null, "after": "both the", "start_char_pos": 1341, "end_char_pos": 1341}], "sents_char_pos": [0, 145, 335, 420, 534, 740, 1184]}
+{"doc_id": "1809.10269", "revision_depth": "1", "before_revision": "In this paper we consider the classical min--\\# curve simplification problem in three different variants. Let \\delta>0, P be a polygonal curve with n vertices in \\mathbb{R^d, and D(\\cdot,\\cdot) be a distance measure. We aim to simplify P by } another polygonal curve P' with minimum number of vertices satisfying D(P,P' ) \\leq \\delta. We obtain three main results for this problem: (1) An O(n^4)-time algorithm when D(P,P') is the Fr\\'echet distance and vertices in P' are selected from a subsequence of vertices in P. (2) An \\emph{ NP-hardness result for the case that D(P ,P') is the directed Hausdorff distance from P' to P and the vertices of P' can lie anywhere on P while respecting the order of edges along P. (3) For any \\epsilon>0, an O^*(n^2\\log n \\log \\log n)-time algorithm that computes P'whose vertices can lie anywhere in the space and whose Fr\\'echet distance to P is at most (1+\\epsilon)\\delta with at most 2m+1 links, where m is the number of links in the optimal simplified curve and O^* hides polynomial factors of 1/\\epsilon .", "after_revision": "Due to its many applications,curve simplification is a long-studied problem in computational geometry and adjacent disciplines, such as graphics, geographical information science, etc. Given a polygonal curve P with n vertices ^d, and D(\\cdot,\\cdot) be a distance measure. We aim to simplify P by } , the goal is to find another polygonal curve P' with a smaller number of vertices such that P' is sufficiently similar to P. Quality guarantees of a simplification are usually given in alocal sense, bounding the distance between a shortcut and its corresponding section of the curve. In this work, we aim to provide a systematic overview of curve simplification problems underglobal distance measures that bound the distance between P and P'. We consider six different curve distance measures: three variants of theHausdorff distance and three variants of the\\emph{Fr\\'echet distance. And we study different restrictions on the choice of vertices for P'. We provide polynomial-time algorithms for some variants of the global curve simplification problem and show NP-hardness for other variants. Through this systematic study we observe, for the first time, some surprising patterns, and suggest directions for future research in this important area .", "edit_actions": [{"type": "R", "before": "In this paper we consider the classical min--\\# curve simplification problem in three different variants. Let \\delta>0, P be", "after": "Due to its many applications,", "start_char_pos": 0, "end_char_pos": 124}, {"type": "A", "before": null, "after": "curve simplification", "start_char_pos": 124, "end_char_pos": 124}, {"type": "A", "before": null, "after": "is a long-studied problem in computational geometry and adjacent disciplines, such as graphics, geographical information science, etc. Given", "start_char_pos": 125, "end_char_pos": 125}, {"type": "A", "before": null, "after": "P", "start_char_pos": 144, "end_char_pos": 144}, {"type": "D", "before": "in \\mathbb{R", "after": null, "start_char_pos": 161, "end_char_pos": 173}, {"type": "A", "before": null, "after": ", the goal is to find", "start_char_pos": 245, "end_char_pos": 245}, {"type": "R", "before": "minimum", "after": "a smaller", "start_char_pos": 278, "end_char_pos": 285}, {"type": "R", "before": "satisfying D(P,P' ) \\leq \\delta. We obtain three main results for this problem: (1) An O(n^4)-time algorithm when D(P,P') is the Fr\\'echet distance and vertices in P' are selected from a subsequence of vertices in P. (2) An", "after": "such that P' is sufficiently similar to P. Quality guarantees of a simplification are usually given in a", "start_char_pos": 305, "end_char_pos": 528}, {"type": "A", "before": null, "after": "local", "start_char_pos": 528, "end_char_pos": 528}, {"type": "A", "before": null, "after": "sense, bounding the distance between a shortcut and its corresponding section of the curve. In this work, we aim to provide a systematic overview of curve simplification problems under", "start_char_pos": 529, "end_char_pos": 529}, {"type": "A", "before": null, "after": "global", "start_char_pos": 529, "end_char_pos": 529}, {"type": "A", "before": null, "after": "distance measures that bound the distance between P and P'. We consider six different curve distance measures: three variants of the", "start_char_pos": 530, "end_char_pos": 530}, {"type": "A", "before": null, "after": "Hausdorff", "start_char_pos": 530, "end_char_pos": 530}, {"type": "A", "before": null, "after": "distance and three variants of the", "start_char_pos": 531, "end_char_pos": 531}, {"type": "A", "before": null, "after": "Fr\\'echet", "start_char_pos": 537, "end_char_pos": 537}, {"type": "A", "before": null, "after": "distance. And we study different restrictions on the choice of vertices for P'. We provide polynomial-time algorithms for some variants of the global curve simplification problem and show", "start_char_pos": 538, "end_char_pos": 538}, {"type": "R", "before": "result for the case that D(P ,P') is the directed Hausdorff distance from P' to P and the vertices of P' can lie anywhere on P while respecting the order of edges along P. (3) For any \\epsilon>0, an O^*(n^2\\log n \\log \\log n)-time algorithm that computes P'whose vertices can lie anywhere in the space and whose Fr\\'echet distance to P is at most (1+\\epsilon)\\delta with at most 2m+1 links, where m is the number of links in the optimal simplified curve and O^* hides polynomial factors of 1/\\epsilon", "after": "for other variants. Through this systematic study we observe, for the first time, some surprising patterns, and suggest directions for future research in this important area", "start_char_pos": 551, "end_char_pos": 1051}], "sents_char_pos": [0, 105, 218, 337, 384, 426, 471, 525, 584]}
+{"doc_id": "1810.01576", "revision_depth": "1", "before_revision": "It is standard practice in applied work to study the effect of a binary variable (\"treatment\") on an outcome of interest using linear models with additive effects. In this paper I study the interpretation of the ordinary and two-stage least squares estimands in such models when treatment effects are in fact heterogeneous. I show that in both cases the coefficient on treatment is identical to a convex combination of two other parameters(different for OLS and 2SLS), which can be interpreted as the average treatment effects on the treated and controls under additional assumptions. Importantly, the OLS and 2SLS weights on these parameters are inversely related to the proportion of each group. The more units get treatment, the less weight is placed on the effect on the treated. What follows, the reliance on these implicit weights can have serious consequences for applied work . I illustrate some of these issues in four empirical applicationsfrom different fields of economics. I also develop a weighted least squares correction and simple diagnostic tools that applied researchers can use to avoid potential biases . In an important special case, my diagnostics only require the knowledge of the proportion of treated units.", "after_revision": "Applied work often studies the effect of a binary variable (\"treatment\") using linear models with additive effects. I study the interpretation of the OLS estimands in such models when treatment effects are heterogeneous. I show that the treatment coefficient is a convex combination of two parameters, which under certain conditions can be interpreted as the average treatment effects on the treated and untreated. The weights on these parameters are inversely related to the proportion of observations in each group. Reliance on these implicit weights can have serious consequences for applied work , as I illustrate with two well-known applications. I develop simple diagnostic tools that empirical researchers can use to avoid potential biases . Software for implementing these methods is available in R and Stata . In an important special case, my diagnostics only require the knowledge of the proportion of treated units.", "edit_actions": [{"type": "R", "before": "It is standard practice in applied work to study", "after": "Applied work often studies", "start_char_pos": 0, "end_char_pos": 48}, {"type": "D", "before": "on an outcome of interest", "after": null, "start_char_pos": 95, "end_char_pos": 120}, {"type": "D", "before": "In this paper", "after": null, "start_char_pos": 164, "end_char_pos": 177}, {"type": "R", "before": "ordinary and two-stage least squares", "after": "OLS", "start_char_pos": 212, "end_char_pos": 248}, {"type": "D", "before": "in fact", "after": null, "start_char_pos": 301, "end_char_pos": 308}, {"type": "R", "before": "in both cases the coefficient on treatment is identical to", "after": "the treatment coefficient is", "start_char_pos": 336, "end_char_pos": 394}, {"type": "R", "before": "other parameters(different for OLS and 2SLS), which", "after": "parameters, which under certain conditions", "start_char_pos": 423, "end_char_pos": 474}, {"type": "R", "before": "controls under additional assumptions. Importantly, the OLS and 2SLS", "after": "untreated. The", "start_char_pos": 546, "end_char_pos": 614}, {"type": "A", "before": null, "after": "observations in", "start_char_pos": 686, "end_char_pos": 686}, {"type": "R", "before": "The more units get treatment, the less weight is placed on the effect on the treated. What follows, the reliance on", "after": "Reliance on", "start_char_pos": 699, "end_char_pos": 814}, {"type": "R", "before": ". I illustrate some of these issues in four empirical applicationsfrom different fields of economics. I also develop a weighted least squares correction and", "after": ", as I illustrate with two well-known applications. I develop", "start_char_pos": 885, "end_char_pos": 1041}, {"type": "R", "before": "applied", "after": "empirical", "start_char_pos": 1071, "end_char_pos": 1078}, {"type": "A", "before": null, "after": ". Software for implementing these methods is available in R and Stata", "start_char_pos": 1125, "end_char_pos": 1125}], "sents_char_pos": [0, 163, 323, 584, 698, 784, 886, 986, 1127]}
+{"doc_id": "1810.05815", "revision_depth": "1", "before_revision": "It has been developed a model of the DNA in MATLAB , where it has been taken into account each one of the component atoms. It is possible to have a sequence length of even 10000 basis pairs with the possibility for introducing all types of sequences. It was studied the DNA damage in a single strain and in double strain, SSB and DSB respectively as a product of ionising radiation from X-rays when interacting with the DNA immersed in water. This is a theoretical and experimental study in-vitro that quantifies the SSB and DSB with respect to different Gy's of radiation, this allows the understanding and prediction about the exact risks of the exposition. It has been developed for energies corresponding to the 17.6 KeV however the energy parameters are also variable which allows the simulation of all type of ionising radiation. For this simulation it is also taken into account the indirect damage as a product of the free electrons and radicals from the water effects. The information of the spatial distribution of the electrones is obtained form Geant4 and afterwards it is implemented in Matlab where rays are created with tri-dimensional random trajectories through Monte Carlo simulations. The experimental confirmation was developed by radiating DNA samples immersed in water with a X-rays unit with Molibdeno targetand it is observed and quantified the damage level through Atomic Force Microscopy (AFM). It was obtained a direct relation between the damage and the radiation dose in the experiment and in the model and it is concluded that for 17.6 KeV the deterioration for interaction is observed very low doses but the mutagenic damage only appears until the 17 Gy .", "after_revision": "This paper describes the model for DNA in MATLAB taking into account all of component atoms. In this model, it is possible to generate sequences with length 10000 basis pairs available for introducing all types of sequences. Once the strands are generated, it is studied the DNA damage in the single strand and double strand. The damage are outcomes of ionising radiation of X-rays when interacting with the DNA immersed in water. This is a theoretical and experimental in-vitro study that quantifies the single strand and double strand damage for different doses of radiation. This can be useful to predict the exact risks of expositions to radiations. In simulations, it is taken into account the damage caused by free electrons generated by the effect of the interaction with the water molecules, this is different to the effect considered in radiobiology, where indirect damages are due to chemical reactions. The spatial distribution of the electrons is obtained from Geant4 and here this distribution is used for the creation of rays as three-dimensional random trajectories through Monte Carlo simulations. It is also presented the experimental DNA damage through radiating DNA samples immersed in water with a X-rays unit with Molybdenum target. The damage level is quantified through Atomic Force Microscopy (AFM). It is possible to conclude a direct relation between the damage and the radiation doses with the experimental results .", "edit_actions": [{"type": "R", "before": "It has been developed a model of the", "after": "This paper describes the model for", "start_char_pos": 0, "end_char_pos": 36}, {"type": "R", "before": ", where it has been taken into account each one of the", "after": "taking into account all of", "start_char_pos": 51, "end_char_pos": 105}, {"type": "R", "before": "It", "after": "In this model, it", "start_char_pos": 123, "end_char_pos": 125}, {"type": "R", "before": "have a sequence length of even", "after": "generate sequences with length", "start_char_pos": 141, "end_char_pos": 171}, {"type": "R", "before": "with the possibility", "after": "available", "start_char_pos": 190, "end_char_pos": 210}, {"type": "R", "before": "It was", "after": "Once the strands are generated, it is", "start_char_pos": 251, "end_char_pos": 257}, {"type": "R", "before": "a single strain and in double strain, SSB and DSB respectively as a product", "after": "the single strand and double strand. The damage are outcomes", "start_char_pos": 284, "end_char_pos": 359}, {"type": "R", "before": "from", "after": "of", "start_char_pos": 382, "end_char_pos": 386}, {"type": "D", "before": "study", "after": null, "start_char_pos": 482, "end_char_pos": 487}, {"type": "A", "before": null, "after": "study", "start_char_pos": 497, "end_char_pos": 497}, {"type": "R", "before": "SSB and DSB with respect to different Gy's of radiation, this allows the understanding and prediction about the", "after": "single strand and double strand damage for different doses of radiation. This can be useful to predict the", "start_char_pos": 518, "end_char_pos": 629}, {"type": "R", "before": "the exposition. It has been developed for energies corresponding to the 17.6 KeV however the energy parameters are also variable which allows the simulation of all type of ionising radiation. For this simulation it is also", "after": "expositions to radiations. In simulations, it is", "start_char_pos": 645, "end_char_pos": 867}, {"type": "R", "before": "indirect damage as a product of the free electrons and radicals from the water effects. The information of the", "after": "damage caused by free electrons generated by the effect of the interaction with the water molecules, this is different to the effect considered in radiobiology, where indirect damages are due to chemical reactions. The", "start_char_pos": 891, "end_char_pos": 1001}, {"type": "R", "before": "electrones is obtained form", "after": "electrons is obtained from", "start_char_pos": 1030, "end_char_pos": 1057}, {"type": "R", "before": "afterwards it is implemented in Matlab where rays are created with tri-dimensional", "after": "here this distribution is used for the creation of rays as three-dimensional", "start_char_pos": 1069, "end_char_pos": 1151}, {"type": "R", "before": "The experimental confirmation was developed by", "after": "It is also presented the experimental DNA damage through", "start_char_pos": 1205, "end_char_pos": 1251}, {"type": "R", "before": "Molibdeno targetand it is observed and quantified the damage level", "after": "Molybdenum target. The damage level is quantified", "start_char_pos": 1316, "end_char_pos": 1382}, {"type": "R", "before": "was obtained", "after": "is possible to conclude", "start_char_pos": 1425, "end_char_pos": 1437}, {"type": "R", "before": "dose in the experiment and in the model and it is concluded that for 17.6 KeV the deterioration for interaction is observed very low doses but the mutagenic damage only appears until the 17 Gy", "after": "doses with the experimental results", "start_char_pos": 1493, "end_char_pos": 1685}], "sents_char_pos": [0, 122, 250, 442, 660, 836, 978, 1204, 1421]}
+{"doc_id": "1810.09945", "revision_depth": "1", "before_revision": "The analysis of neuroimaging data poses several strong challenges, in particular, due to its high dimensionality, its strong spatio-temporal correlation and the comparably small sample sizes of the respective datasets. To address these challenges, conventional decoding approaches such as the searchlight reduce the complexity of the decoding problem by considering local clusters of voxels only. Thereby, neglecting the distributed spatial patterns of brain activity underlying many cognitive states. In this work , we introduce the DLight framework, which overcomes these challenges by utilizing a long short-term memory unit (LSTM) based deep neural network architecture to analyze the spatial dependency structure of whole-brain fMRI data. In order to maintain interpretability of the neuroimaging data, we adapt the layer-wise relevance propagation (LRP) method . Thereby, we enable the neuroscientist user to study the learned association of the LSTM between the data and the cognitive state of the individual. We demonstrate the versatility of DLight by applying it to a large fMRI dataset of the Human Connectome Project. We show that the decoding performance of our method scales better with large datasets, and moreover outperforms conventional decoding approaches , while still detecting physiologically appropriate brain areas for the cognitive statesclassified. We also demonstrate that DLight is able to detect these areas on several levels of data granularity (i.e., group, subject, trial, time point) .", "after_revision": "The application of deep learning (DL) models to neuroimaging data poses several challenges, due to the high dimensionality, low sample size and complex temporo-spatial dependency structure of these datasets. Even further, DL models act as as black-box models, impeding insight into the association of cognitive state and brain activity. To approach these challenges , we introduce the DeepLight framework, which utilizes long short-term memory (LSTM) based DL models to analyze whole-brain functional Magnetic Resonance Imaging (fMRI) data. To decode a cognitive state (e.g., seeing the image of a house), DeepLight separates the fMRI volume into a sequence of axial brain slices, which is then sequentially processed by an LSTM. To maintain interpretability, DeepLight adapts the layer-wise relevance propagation (LRP) technique . Thereby, decomposing its decoding decision into the contributions of the single input voxels to this decision. Importantly, the decomposition is performed on the level of single fMRI volumes, enabling DeepLight to study the associations between cognitive state and brain activity on several levels of data granularity, from the level of the group down to the level of single time points. To demonstrate the versatility of DeepLight, we apply it to a large fMRI dataset of the Human Connectome Project. We show that DeepLight outperforms conventional approaches of uni- and multivariate fMRI analysis in decoding the cognitive states and in identifying the physiologically appropriate brain regions associated with these states. We further demonstrate DeepLight's ability to study the fine-grained temporo-spatial variability of brain activity over sequences of single fMRI samples .", "edit_actions": [{"type": "R", "before": "analysis of", "after": "application of deep learning (DL) models to", "start_char_pos": 4, "end_char_pos": 15}, {"type": "R", "before": "strong challenges, in particular, due to its", "after": "challenges, due to the", "start_char_pos": 48, "end_char_pos": 92}, {"type": "R", "before": "its strong spatio-temporal correlation and the comparably small sample sizes of the respective datasets. To address these challenges, conventional decoding approaches such as the searchlight reduce the complexity of the decoding problem by considering local clusters of voxels only. Thereby, neglecting the distributed spatial patterns of brain activity underlying many cognitive states. In this work", "after": "low sample size and complex temporo-spatial dependency structure of these datasets. Even further, DL models act as as black-box models, impeding insight into the association of cognitive state and brain activity. To approach these challenges", "start_char_pos": 114, "end_char_pos": 514}, {"type": "R", "before": "DLight", "after": "DeepLight", "start_char_pos": 534, "end_char_pos": 540}, {"type": "R", "before": "overcomes these challenges by utilizing a", "after": "utilizes", "start_char_pos": 558, "end_char_pos": 599}, {"type": "D", "before": "unit", "after": null, "start_char_pos": 623, "end_char_pos": 627}, {"type": "R", "before": "deep neural network architecture to analyze the spatial dependency structure of", "after": "DL models to analyze", "start_char_pos": 641, "end_char_pos": 720}, {"type": "R", "before": "fMRI data. In order to maintain interpretability of", "after": "functional Magnetic Resonance Imaging (fMRI) data. To decode a cognitive state (e.g., seeing the image of a house), DeepLight separates the fMRI volume into a sequence of axial brain slices, which is then sequentially processed by an LSTM. To maintain interpretability, DeepLight adapts", "start_char_pos": 733, "end_char_pos": 784}, {"type": "D", "before": "neuroimaging data, we adapt the", "after": null, "start_char_pos": 789, "end_char_pos": 820}, {"type": "R", "before": "method", "after": "technique", "start_char_pos": 860, "end_char_pos": 866}, {"type": "R", "before": "we enable the neuroscientist user to study the learned association of the LSTM between the data and the cognitive state of the individual. We", "after": "decomposing its decoding decision into the contributions of the single input voxels to this decision. Importantly, the decomposition is performed on the level of single fMRI volumes, enabling DeepLight to study the associations between cognitive state and brain activity on several levels of data granularity, from the level of the group down to the level of single time points. To", "start_char_pos": 878, "end_char_pos": 1019}, {"type": "R", "before": "DLight by applying", "after": "DeepLight, we apply", "start_char_pos": 1051, "end_char_pos": 1069}, {"type": "R", "before": "the decoding performance of our method scales better with large datasets, and moreover outperforms conventional decoding approaches , while still detecting", "after": "DeepLight outperforms conventional approaches of uni- and multivariate fMRI analysis in decoding the cognitive states and in identifying the", "start_char_pos": 1143, "end_char_pos": 1298}, {"type": "R", "before": "areas for the cognitive statesclassified. We also demonstrate that DLight is able to detect these areas on several levels of data granularity (i.e., group, subject, trial, time point)", "after": "regions associated with these states. We further demonstrate DeepLight's ability to study the fine-grained temporo-spatial variability of brain activity over sequences of single fMRI samples", "start_char_pos": 1333, "end_char_pos": 1516}], "sents_char_pos": [0, 218, 396, 501, 743, 868, 1016, 1129, 1374]}
+{"doc_id": "1810.12898", "revision_depth": "1", "before_revision": "We propose a neural field model of color perception in context , for the visual area V1 in the cortex. This model reconciles into a common framework two opposing perceptual phenomena, simultaneous contrast and chromatic assimilation. Previous works showed that they act simultaneously, and can produce larger shifts in color matching when acting in synergy with a spatial pattern. At some point in an image, the color perceptually seems more similar to that of the adjacent locations , while being more dissimilar from that of remote neighbors. The influence of neighbors hence reverses its nature above some characteristic scale . Our model fully exploits the balance between attraction and repulsion in color space, combined at small or large scales in physical space. For that purpose we rely on the opponent color theory introduced by Hering, and suppose a hypercolumnar structure coding for colors. At some neural mass, the pointwise influence of neighbors is spatially integrated to obtain the final effect that we call a color sensation. Alongside this neural field model, we describe the search for a color match in asymmetric matching experiments as a mathematical projector . We validate it by fitting the parameters of the model to data from (Monnier and Shevell, 2004) and (Monnier, 2008) and our own data . All the results show that we are able to explain the nonlinear behavior of the observed shifts along one or two dimensions in color space, which cannot be done using a simple linear model.", "after_revision": "We address the question of color-space interactions in the brain, by proposing a neural field model of color perception with spatial context for the visual area V1 of the cortex. Our framework reconciles two opposing perceptual phenomena, known as simultaneous contrast and chromatic assimilation. They have been previously shown to act synergistically, so that at some point in an image, the color seems perceptually more similar to that of adjacent neighbors , while being more dissimilar from that of remote ones. Thus, their combined effects are enhanced in the presence of a spatial pattern, and can be measured as larger shifts in color matching experiments . Our model supposes a hypercolumnar structure coding for colors in V1, and relies on the notion of color opponency introduced by Hering. The connectivity kernel of the neural field exploits the balance between attraction and repulsion in color and physical spaces, so as to reproduce the sign reversal in the influence of neighboring points. The color sensation at a point, defined from a steady state of the neural activities, is then extracted as a nonlinear percept conveyed by an assembly of neurons. It connects the cortical and perceptual levels, because we describe the search for a color match in asymmetric matching experiments as a mathematical projection on color sensations . We validate our color neural field alongside this color matching framework, by performing a multi-parameter regression to data produced by psychophysicists and ourselves . All the results show that we are able to explain the nonlinear behavior of shifts observed along one or two dimensions in color space, which cannot be done using a simple linear model.", "edit_actions": [{"type": "R", "before": "propose", "after": "address the question of color-space interactions in the brain, by proposing", "start_char_pos": 3, "end_char_pos": 10}, {"type": "R", "before": "in context ,", "after": "with spatial context", "start_char_pos": 52, "end_char_pos": 64}, {"type": "R", "before": "in", "after": "of", "start_char_pos": 88, "end_char_pos": 90}, {"type": "R", "before": "This model reconciles into a common framework", "after": "Our framework reconciles", "start_char_pos": 103, "end_char_pos": 148}, {"type": "A", "before": null, "after": "known as", "start_char_pos": 184, "end_char_pos": 184}, {"type": "R", "before": "Previous works showed that they act simultaneously, and can produce larger shifts in color matching when acting in synergy with a spatial pattern. At", "after": "They have been previously shown to act synergistically, so that at", "start_char_pos": 235, "end_char_pos": 384}, {"type": "R", "before": "perceptually seems", "after": "seems perceptually", "start_char_pos": 419, "end_char_pos": 437}, {"type": "R", "before": "the adjacent locations", "after": "adjacent neighbors", "start_char_pos": 462, "end_char_pos": 484}, {"type": "R", "before": "neighbors. The influence of neighbors hence reverses its nature above some characteristic scale", "after": "ones. Thus, their combined effects are enhanced in the presence of a spatial pattern, and can be measured as larger shifts in color matching experiments", "start_char_pos": 535, "end_char_pos": 630}, {"type": "R", "before": "fully", "after": "supposes a hypercolumnar structure coding for colors in V1, and relies on the notion of color opponency introduced by Hering. The connectivity kernel of the neural field", "start_char_pos": 643, "end_char_pos": 648}, {"type": "R", "before": "space, combined at small or large scales in physical space. For that purpose we rely on the opponent color theory introduced by Hering, and suppose a hypercolumnar structure coding for colors. At some neural mass, the pointwise influence of neighbors is spatially integrated to obtain the final effect that we call a color sensation. Alongside this neural field model,", "after": "and physical spaces, so as to reproduce the sign reversal in the influence of neighboring points. The color sensation at a point, defined from a steady state of the neural activities, is then extracted as a nonlinear percept conveyed by an assembly of neurons. It connects the cortical and perceptual levels, because", "start_char_pos": 712, "end_char_pos": 1080}, {"type": "R", "before": "projector", "after": "projection on color sensations", "start_char_pos": 1175, "end_char_pos": 1184}, {"type": "R", "before": "it by fitting the parameters of the model to data from (Monnier and Shevell, 2004) and (Monnier, 2008) and our own data", "after": "our color neural field alongside this color matching framework, by performing a multi-parameter regression to data produced by psychophysicists and ourselves", "start_char_pos": 1199, "end_char_pos": 1318}, {"type": "R", "before": "the observed shifts", "after": "shifts observed", "start_char_pos": 1396, "end_char_pos": 1415}], "sents_char_pos": [0, 102, 234, 381, 545, 632, 771, 904, 1045, 1186, 1320]}
+{"doc_id": "1811.03620", "revision_depth": "1", "before_revision": "Diffusion kurtosis imaging (DKI), is an imaging modality that yields novel disease biomarkers and provides access to microstructural parameters. DKI and subsequent estimation of microstructural model parameters has been commonly used for assessment of tissue changes in neurodegenerative diseases and the animal modelsof such diseases . In this study, mice spinal cords from the experimental autoimmune encephalomyelitis (EAE) model of multiple sclerosis (MS) were investigated for the first time using this modality in combination with biophysical modeling to reveal the relationship between microstructural metrics and clinical disability. Thirteen EAE spinal cords of variable disability were extracted, dissected and subsequently scanned in a high-field MRI scanner along with 5 control specimen. The diffusion weighted data were acquired together with high resolution T2* images. Diffusion weighted data were fit to estimate diffusion and kurtosis tensors and white matter modeling parameters, which were all used for subsequent statistical analysis using a linear mixed effects model. T2* images were used to delineate focal demyelination/inflammation. Our results show strong relationship between disability and mean of the kurtosis tensor, radial kurtosis, radial diffusivity, similar to what was found in other hypomyelinating MS models and in patients. However, changes in WM-modeling parameters and in particular in extra-axonal axial diffusivity are clearly different from previous studies using other animal models of MS. Our data suggest that DKI and microstructural modeling can provide a unique contrast capable of detecting EAE-specific changes in normal appearing white matter and gray matter correlating with clinical disability. These findings could close the gap between MRI findings and clinical presentation in patients and deepen our understanding of EAE and MS mechanisms.", "after_revision": "Diffusion kurtosis imaging (DKI), is an imaging modality that yields novel disease biomarkers and in combination with nervous tissue modeling, provides access to microstructural parameters. Recently, DKI and subsequent estimation of microstructural model parameters has been used for assessment of tissue changes in neurodegenerative diseases and their animal models . In this study, mouse spinal cords from the experimental autoimmune encephalomyelitis (EAE) model of multiple sclerosis (MS) were investigated for the first time using DKI in combination with biophysical modeling to study the relationship between microstructural metrics and degree of animal dysfunction. Thirteen spinal cords were extracted from animals of variable disability and scanned in a high-field MRI scanner along with five control specimen. Diffusion weighted data were acquired together with high resolution T2* images. Diffusion data were fit to estimate diffusion and kurtosis tensors and white matter modeling parameters, which were all used for subsequent statistical analysis using a linear mixed effects model. T2* images were used to delineate focal demyelination/inflammation. Our results unveil a strong relationship between disability and measured microstructural parameters in normal appearing white matter and gray matter. The changes we found in biophysical modeling parameters and in particular in extra-axonal axial diffusivity were clearly different from previous studies employing other animal models of MS. In conclusion, our data suggest that DKI and microstructural modeling can provide a unique contrast capable of detecting EAE-specific changes correlating with clinical disability. These findings could close the gap between MRI findings and clinical presentation in patients and deepen our understanding of EAE and the MS mechanisms.", "edit_actions": [{"type": "A", "before": null, "after": "in combination with nervous tissue modeling,", "start_char_pos": 98, "end_char_pos": 98}, {"type": "A", "before": null, "after": "Recently,", "start_char_pos": 146, "end_char_pos": 146}, {"type": "D", "before": "commonly", "after": null, "start_char_pos": 222, "end_char_pos": 230}, {"type": "R", "before": "the animal modelsof such diseases", "after": "their animal models", "start_char_pos": 303, "end_char_pos": 336}, {"type": "R", "before": "mice", "after": "mouse", "start_char_pos": 354, "end_char_pos": 358}, {"type": "R", "before": "this modality", "after": "DKI", "start_char_pos": 505, "end_char_pos": 518}, {"type": "R", "before": "reveal", "after": "study", "start_char_pos": 563, "end_char_pos": 569}, {"type": "R", "before": "clinical disability. Thirteen EAE spinal cords", "after": "degree of animal dysfunction. Thirteen spinal cords were extracted from animals", "start_char_pos": 623, "end_char_pos": 669}, {"type": "R", "before": "were extracted, dissected and subsequently", "after": "and", "start_char_pos": 693, "end_char_pos": 735}, {"type": "R", "before": "5", "after": "five", "start_char_pos": 783, "end_char_pos": 784}, {"type": "R", "before": "The diffusion", "after": "Diffusion", "start_char_pos": 803, "end_char_pos": 816}, {"type": "D", "before": "weighted", "after": null, "start_char_pos": 897, "end_char_pos": 905}, {"type": "R", "before": "show", "after": "unveil a", "start_char_pos": 1173, "end_char_pos": 1177}, {"type": "R", "before": "mean of the kurtosis tensor, radial kurtosis, radial diffusivity, similar to what was found in other hypomyelinating MS models and in patients. However, changes in WM-modeling", "after": "measured microstructural parameters in normal appearing white matter and gray matter. The changes we found in biophysical modeling", "start_char_pos": 1221, "end_char_pos": 1396}, {"type": "R", "before": "are", "after": "were", "start_char_pos": 1460, "end_char_pos": 1463}, {"type": "R", "before": "using", "after": "employing", "start_char_pos": 1504, "end_char_pos": 1509}, {"type": "R", "before": "Our", "after": "In conclusion, our", "start_char_pos": 1537, "end_char_pos": 1540}, {"type": "D", "before": "in normal appearing white matter and gray matter", "after": null, "start_char_pos": 1664, "end_char_pos": 1712}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1885, "end_char_pos": 1885}], "sents_char_pos": [0, 145, 338, 643, 802, 886, 1092, 1160, 1364, 1750]}
+{"doc_id": "1811.05849", "revision_depth": "1", "before_revision": "Attempting to recognize a tree inside a network is a fundamental undertaking in evolutionary analysis. Therefore, the notion of tree-based phylogenetic networks, which was introduced by Francis and Steel, has attracted much attention of researchers in the area of theoretical biology in the last few years. Tree-based networks can be viewed as a natural generalization of rooted binary phylogenetic trees because they are merely trees with additional arcs, and in defining those networks, a certain kind of spanning trees called subdivision trees plays an essential role . In this paper, we provide a structural characterization of tree-based networks that furnishes efficient algorithms for solving the following problems in linear time (for enumeration, in linear delay) : given a rooted binary phylogenetic network N, 1) determine whether or not N is tree-based and find a subdivision tree if there exists any (decision/search problem); 2) compute the number of subdivision trees of N (counting problem); 3) list all subdivision trees of N (enumeration problem); and 4) find a subdivision tree to maximize or minimize a prescribed objective function (optimization problem). Our structural result settles numerous questions including the complexity of the problem of counting subdivision trees that was left open in the paper of Francis and Steel, and also provides short proofs of different known results from a unifying point of view. The results in this paper still hold for a certain class of non-binary networks. Some applications and further research directions are also mentioned .", "after_revision": "Attempting to recognize a tree inside a phylogenetic network is a fundamental undertaking in evolutionary analysis. Therefore, the concept of \" tree-based \" phylogenetic networks, which was introduced by Francis and Steel, has attracted much attention of theoretical biologists in the last few years. In this context, spanning trees of a certain kind called \"subdivision trees\" play an essential role and there are many important computational problems about them, whose time complexity is still unclear. Against this backdrop, the present paper aims to provide a graph theoretical framework for solving different problems on subdivision trees in a simple and unified manner. To this end, we focus on a structure called the maximal zig-zag trail decomposition that is inherent in any rooted binary phylogenetic network N and prove a structure theorem that characterizes the collection of all subdivision trees of N. Our theorem does not only imply and unify various results in the literature but also yield linear time (for enumeration, linear delay) algorithms for the following problems : given a rooted binary phylogenetic network N, 1) determine whether or not N has a subdivision tree and find one if there exists any (decision/search problem); 2) compute the number of subdivision trees of N (counting problem); 3) list all subdivision trees of N (enumeration problem); and 4) find a subdivision tree to maximize or minimize a prescribed objective function (optimization problem). Importantly, the results and algorithms in this paper still hold true for some non-binary phylogenetic networks and this generalization gives a partial answer to an open question from Pons, Semple, and Steel. We also mention some statistical applications and further research directions .", "edit_actions": [{"type": "A", "before": null, "after": "phylogenetic", "start_char_pos": 40, "end_char_pos": 40}, {"type": "R", "before": "notion of", "after": "concept of \"", "start_char_pos": 119, "end_char_pos": 128}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 140, "end_char_pos": 140}, {"type": "R", "before": "researchers in the area of theoretical biology", "after": "theoretical biologists", "start_char_pos": 239, "end_char_pos": 285}, {"type": "R", "before": "Tree-based networks can be viewed as a natural generalization of rooted binary phylogenetic trees because they are merely trees with additional arcs, and in defining those networks,", "after": "In this context, spanning trees of", "start_char_pos": 309, "end_char_pos": 490}, {"type": "R", "before": "of spanning trees called subdivision trees plays", "after": "called \"subdivision trees\" play", "start_char_pos": 506, "end_char_pos": 554}, {"type": "R", "before": ". In this paper, we provide a structural characterization of tree-based networks that furnishes efficient algorithms for solving the following problems in", "after": "and there are many important computational problems about them, whose time complexity is still unclear. Against this backdrop, the present paper aims to provide a graph theoretical framework for solving different problems on subdivision trees in a simple and unified manner. To this end, we focus on a structure called the maximal zig-zag trail decomposition that is inherent in any rooted binary phylogenetic network N and prove a structure theorem that characterizes the collection of all subdivision trees of N. Our theorem does not only imply and unify various results in the literature but also yield", "start_char_pos": 573, "end_char_pos": 727}, {"type": "D", "before": "in", "after": null, "start_char_pos": 758, "end_char_pos": 760}, {"type": "A", "before": null, "after": "algorithms for the following problems", "start_char_pos": 775, "end_char_pos": 775}, {"type": "R", "before": "is tree-based and find", "after": "has", "start_char_pos": 854, "end_char_pos": 876}, {"type": "A", "before": null, "after": "and find one", "start_char_pos": 896, "end_char_pos": 896}, {"type": "R", "before": "Our structural result settles numerous questions including the complexity of the problem of counting subdivision trees that was left open in the paper of Francis and Steel, and also provides short proofs of different known results from a unifying point of view. The results", "after": "Importantly, the results and algorithms", "start_char_pos": 1181, "end_char_pos": 1454}, {"type": "R", "before": "for a certain class of", "after": "true for some", "start_char_pos": 1480, "end_char_pos": 1502}, {"type": "R", "before": "networks. Some", "after": "phylogenetic networks and this generalization gives a partial answer to an open question from Pons, Semple, and Steel. We also mention some statistical", "start_char_pos": 1514, "end_char_pos": 1528}, {"type": "D", "before": "are also mentioned", "after": null, "start_char_pos": 1574, "end_char_pos": 1592}], "sents_char_pos": [0, 103, 308, 574, 943, 1011, 1069, 1180, 1442, 1523]}
+{"doc_id": "1812.01082", "revision_depth": "2", "before_revision": "In many fields of science and engineering , geometric features play a key role in understanding certain quantity or phenomena. Recently, convolutional neural networks (CNNs) have been shown to possess a promising capability of extracting and codifying features from visual information. However, the application of such capable CNNs has been quite limited to mostly computer vision problems where the visual information is inherently given on a grid-like structure. This, unfortunately, was not the case for the geometry processing community, where many visual recognition problems are defined on arbitrary surfaces(2D-manifolds). Technical difficulties hindering the generalization of CNNs to arbitrary-shaped manifold are rooted in the lacks of such key elements including the canonical grid-like representation, the notion of consistent orientation, and a compatible local topology across the domain. Unfortunately, except for a few pioneering works, only very little has been studied in this regard. To this end, in this paper, we propose a novel mathematical formulation to extend CNNs onto two-dimensional (2D) manifold domains. More specifically, we approximate a tensor field defined over a manifold using orthogonal basis functions, called Zernike polynomials, on local tangent spaces. We prove that the convolution of two functions can be represented as a simple dot product between Zernike polynomial coefficients . We also prove that a rotation of a convolution kernel equates to a set of 2 by 2 rotation matrices applied to Zernike polynomial coefficients, which can be critical in manifold domains . As such, the key contribution of this work resides in a concise but rigorous mathematical generalization of the CNN building blocks . Furthermore, comparative to the other state-of-the-art methods, our method demonstrates substantially better performance on both classification and regression tasks .", "after_revision": "In this paper, we propose a novel formulation to extend CNNs to two-dimensional (2D) manifolds using orthogonal basis functions, called Zernike polynomials. In many areas , geometric features play a key role in understanding scientific phenomena. Thus, an ability to codify geometric features into a mathematical quantity can be critical. Recently, convolutional neural networks (CNNs) have demonstrated the promising capability of extracting and codifying features from visual information. However, the progress has been concentrated in computer vision applications where there exists an inherent grid-like structure. In contrast, many geometry processing problems are defined on curved surfaces, and the generalization of CNNs is not quite trivial. The difficulties are rooted in the lack of key ingredients such as the canonical grid-like representation, the notion of consistent orientation, and a compatible local topology across the domain. In this paper, we prove that the convolution of two functions can be represented as a simple dot product between Zernike polynomial coefficients ; and the rotation of a convolution kernel is essentially a set of 2-by-2 rotation matrices applied to the coefficients . As such, the key contribution of this work resides in a concise but rigorous mathematical generalization of the CNN building blocks .", "edit_actions": [{"type": "R", "before": "many fields of science and engineering", "after": "this paper, we propose a novel formulation to extend CNNs to two-dimensional (2D) manifolds using orthogonal basis functions, called Zernike polynomials. In many areas", "start_char_pos": 3, "end_char_pos": 41}, {"type": "R", "before": "certain quantity or phenomena.", "after": "scientific phenomena. Thus, an ability to codify geometric features into a mathematical quantity can be critical.", "start_char_pos": 96, "end_char_pos": 126}, {"type": "R", "before": "been shown to possess a", "after": "demonstrated the", "start_char_pos": 179, "end_char_pos": 202}, {"type": "R", "before": "application of such capable CNNs has been quite limited to mostly computer vision problems where the visual information is inherently given on a", "after": "progress has been concentrated in computer vision applications where there exists an inherent", "start_char_pos": 299, "end_char_pos": 443}, {"type": "R", "before": "This, unfortunately, was not the case for the geometry processing community, where many visual recognition", "after": "In contrast, many geometry processing", "start_char_pos": 465, "end_char_pos": 571}, {"type": "R", "before": "arbitrary surfaces(2D-manifolds). Technical difficulties hindering", "after": "curved surfaces, and", "start_char_pos": 596, "end_char_pos": 662}, {"type": "R", "before": "to arbitrary-shaped manifold", "after": "is not quite trivial. The difficulties", "start_char_pos": 690, "end_char_pos": 718}, {"type": "R", "before": "lacks of such key elements including", "after": "lack of key ingredients such as", "start_char_pos": 737, "end_char_pos": 773}, {"type": "R", "before": "Unfortunately, except for a few pioneering works, only very little has been studied in this regard. To this end, in this", "after": "In this", "start_char_pos": 903, "end_char_pos": 1023}, {"type": "D", "before": "propose a novel mathematical formulation to extend CNNs onto two-dimensional (2D) manifold domains. More specifically, we approximate a tensor field defined over a manifold using orthogonal basis functions, called Zernike polynomials, on local tangent spaces. We", "after": null, "start_char_pos": 1034, "end_char_pos": 1296}, {"type": "R", "before": ". We also prove that a", "after": "; and the", "start_char_pos": 1424, "end_char_pos": 1446}, {"type": "R", "before": "equates to", "after": "is essentially", "start_char_pos": 1480, "end_char_pos": 1490}, {"type": "R", "before": "2 by 2", "after": "2-by-2", "start_char_pos": 1500, "end_char_pos": 1506}, {"type": "R", "before": "Zernike polynomial coefficients, which can be critical in manifold domains", "after": "the coefficients", "start_char_pos": 1536, "end_char_pos": 1610}, {"type": "D", "before": ". Furthermore, comparative to the other state-of-the-art methods, our method demonstrates substantially better performance on both classification and regression tasks", "after": null, "start_char_pos": 1745, "end_char_pos": 1911}], "sents_char_pos": [0, 126, 285, 464, 629, 902, 1002, 1133, 1293, 1425, 1612, 1746]}
+{"doc_id": "1812.09218", "revision_depth": "1", "before_revision": "Networks in the brain consist of different types of neurons. We here investigate the influence of neuron diversity on the dynamical stability , phase space structure , and computational capabilities of inhibitory spiking networks using mixtures of neurons with positive and negative dissipation . We find that already a single neuron of a different type may qualitatively change the dynamics of a neural network and that mixed networks can combine the computational capabilities of ones with only a single neuron type. Our networks contain leaky integrate-and-fire neurons (positive dissipation) as well as neurons with inverted sign of the leak current (negative dissipation) . We first show that such networkscan exhibit a balanced state of irregular , asynchronous spiking activity, if the neurons with negative dissipation are endowed with a voltage-dependent input cutoff, which may be interpreted as a simple conductance-based implementation of their synapses. We compute the voltage probability distributions and self-consistent firing rates for both types of neurons for finite size spike impacts assuming that inputs are Poissonian. The balanced state exists in a variety of neural network models and its dynamical properties such as chaoticity vary considerably. Our models generalize networks of leaky integrate-and-fire neurons where the dynamics are non-chaotic despite their irregularity. We show that switching the sign of the dissipation of a single neuron renders the entire network dynamics unstable and chaotic as indicated by a positive largest Lyapunov exponent. To further characterize the dynamics we consider the full spectrum of Lyapunov exponents and the related covariant Lyapunov vectors (CLVs) , which indicate the directions in which infinitesimal perturbations grow or shrink with a rate given by the Lyapunov exponents . We find that for each .. .", "after_revision": "Networks in the brain consist of different types of neurons. Here we investigate the influence of neuron diversity on the dynamics , phase space structure and computational capabilities of spiking neural networks . We find that already a single neuron of a different type can qualitatively change the network dynamics and that mixed networks may combine the computational capabilities of ones with a single neuron type. We study inhibitory networks of concave leaky (LIF) and convex \"anti-leaky\" (XIF) integrate-and-fire neurons that generalize irregularly spiking non-chaotic LIF neuron networks. Endowed with simple conductance-based synapses for XIF neurons, our networks can generate a balanced state of irregular asynchronous spiking as well. We determine the voltage probability distributions and self-consistent firing rates assuming Poisson input with finite size spike impacts . Further, we compute the full spectrum of Lyapunov exponents (LEs) and the covariant Lyapunov vectors (CLVs) specifying the corresponding perturbation directions . We find that there is approximately one positive LE for each XIF neuron. This indicates in particular that a single XIF neuron renders the network dynamics chaotic. A simple mean-field approach, which can be justified by properties of the CLVs, explains the finding. As an application, we propose a spike-based computing scheme where our networks serve as computational reservoirs and their different stability properties yield different computational capabilities .", "edit_actions": [{"type": "R", "before": "We here", "after": "Here we", "start_char_pos": 61, "end_char_pos": 68}, {"type": "R", "before": "dynamical stability", "after": "dynamics", "start_char_pos": 122, "end_char_pos": 141}, {"type": "D", "before": ",", "after": null, "start_char_pos": 166, "end_char_pos": 167}, {"type": "R", "before": "inhibitory spiking networks using mixtures of neurons with positive and negative dissipation", "after": "spiking neural networks", "start_char_pos": 202, "end_char_pos": 294}, {"type": "R", "before": "may", "after": "can", "start_char_pos": 354, "end_char_pos": 357}, {"type": "R", "before": "dynamics of a neural network", "after": "network dynamics", "start_char_pos": 383, "end_char_pos": 411}, {"type": "R", "before": "can", "after": "may", "start_char_pos": 436, "end_char_pos": 439}, {"type": "D", "before": "only", "after": null, "start_char_pos": 492, "end_char_pos": 496}, {"type": "R", "before": "Our networks contain leaky", "after": "We study inhibitory networks of concave leaky (LIF) and convex \"anti-leaky\" (XIF)", "start_char_pos": 519, "end_char_pos": 545}, {"type": "R", "before": "neurons (positive dissipation) as well as neurons with inverted sign of the leak current (negative dissipation) . We first show that such networkscan exhibit", "after": "neurons that generalize irregularly spiking non-chaotic LIF neuron networks. Endowed with simple conductance-based synapses for XIF neurons, our networks can generate", "start_char_pos": 565, "end_char_pos": 722}, {"type": "R", "before": ", asynchronous spiking activity, if the neurons with negative dissipation are endowed with a voltage-dependent input cutoff, which may be interpreted as a simple conductance-based implementation of their synapses. We compute", "after": "asynchronous spiking as well. We determine", "start_char_pos": 753, "end_char_pos": 977}, {"type": "R", "before": "for both types of neurons for", "after": "assuming Poisson input with", "start_char_pos": 1049, "end_char_pos": 1078}, {"type": "R", "before": "assuming that inputs are Poissonian. The balanced state exists in a variety of neural network models and its dynamical properties such as chaoticity vary considerably. Our models generalize networks of leaky integrate-and-fire neurons where the dynamics are non-chaotic despite their irregularity. We show that switching the sign of the dissipation of a single neuron renders the entire network dynamics unstable and chaotic as indicated by a positive largest Lyapunov exponent. To further characterize the dynamics we consider", "after": ". Further, we compute", "start_char_pos": 1105, "end_char_pos": 1632}, {"type": "R", "before": "and the related", "after": "(LEs) and the", "start_char_pos": 1673, "end_char_pos": 1688}, {"type": "R", "before": ", which indicate the directions in which infinitesimal perturbations grow or shrink with a rate given by the Lyapunov exponents", "after": "specifying the corresponding perturbation directions", "start_char_pos": 1723, "end_char_pos": 1850}, {"type": "R", "before": "for each ..", "after": "there is approximately one positive LE for each XIF neuron. This indicates in particular that a single XIF neuron renders the network dynamics chaotic. A simple mean-field approach, which can be justified by properties of the CLVs, explains the finding. As an application, we propose a spike-based computing scheme where our networks serve as computational reservoirs and their different stability properties yield different computational capabilities", "start_char_pos": 1866, "end_char_pos": 1877}], "sents_char_pos": [0, 60, 296, 518, 678, 966, 1141, 1272, 1402, 1583, 1852]}
+{"doc_id": "1812.09418", "revision_depth": "1", "before_revision": "A distinguishing feature of living matter is its ability to control force-generating structures that accomplish tasks such as chromosome segregation, intracellular transport, and cell movement. To generate and manipulate these micron-scale structures and force fields , cells create spatiotemporal patterns of molecular-scale activity ] ] ] . Here, we control micron-scale structures and fluid flow by manipulating molecular-scale protein activity set by dynamic optical boundaries in an engineered system of purified proteins . Our engineered system consists of microtubules and light-activatable motor proteins that crosslink and URLanize microtubules upon illumination. During URLanization, crosslinked motors do work to create non-equilibrium structures. We design light patternsthat enable us to create, move, and merge microtubule asters with spatial and temporal precision . By composing these basic operations, we create microtubule networks that can span several hundred microns in length and contract at speeds up to an order of magnitude faster than the speed of an individual motor. By scaling the size and speed of contractile networks , we generate and sculpt advective fluid flows. Our work shows that dynamic boundaries enable control over active matter . The principles of boundary-mediated control we uncover may be used to study emergent cellular structures and forces and to develop programmable active matter devices.", "after_revision": "Living systems are capable of locomotion, reconfiguration, and replication. To perform these tasks, cells spatiotemporally coordinate the interactions of force-generating , \"active\" molecules that create and manipulate non-equilibrium structures and force fields that span up to millimeter length scales 1-3]. Experimental active matter systems of biological or synthetic molecules are capable of URLanizing into structures 4,5] and generating global flows 6-9]. However, these experimental systems lack the spatiotemporal control found in cells, limiting their utility for studying non-equilibrium phenomena and bioinspired engineering . Here, we uncover non-equilibrium phenomena and principles by optically controlling structures and fluid flow in an engineered system of active biomolecules . Our engineered system consists of purified microtubules and light-activatable motor proteins that crosslink URLanize microtubules into distinct structures upon illumination. We develop basic operations, defined as sets of light patterns, to create, move, and merge microtubule structures . By composing these basic operations, we are able to create microtubule networks that span several hundred microns in length and contract at speeds up to an order of magnitude faster than the speed of an individual motor. We manipulate these contractile networks to generate and sculpt persistent fluid flows . The principles of boundary-mediated control we uncover may be used to study emergent cellular structures and forces and to develop programmable active matter devices.", "edit_actions": [{"type": "R", "before": "A distinguishing feature of living matter is its ability to control", "after": "Living systems are capable of locomotion, reconfiguration, and replication. To perform these tasks, cells spatiotemporally coordinate the interactions of", "start_char_pos": 0, "end_char_pos": 67}, {"type": "R", "before": "structures that accomplish tasks such as chromosome segregation, intracellular transport, and cell movement. To generate and manipulate these micron-scale", "after": ", \"active\" molecules that create and manipulate non-equilibrium", "start_char_pos": 85, "end_char_pos": 239}, {"type": "R", "before": ", cells create spatiotemporal patterns of molecular-scale activity", "after": "that span up to millimeter length scales", "start_char_pos": 268, "end_char_pos": 334}, {"type": "A", "before": null, "after": "1-3", "start_char_pos": 335, "end_char_pos": 335}, {"type": "A", "before": null, "after": ". Experimental active matter systems of biological or synthetic molecules are capable of URLanizing into structures", "start_char_pos": 336, "end_char_pos": 336}, {"type": "A", "before": null, "after": "4,5", "start_char_pos": 337, "end_char_pos": 337}, {"type": "A", "before": null, "after": "and generating global flows", "start_char_pos": 339, "end_char_pos": 339}, {"type": "A", "before": null, "after": "6-9", "start_char_pos": 340, "end_char_pos": 340}, {"type": "A", "before": null, "after": ". However, these experimental systems lack the spatiotemporal control found in cells, limiting their utility for studying non-equilibrium phenomena and bioinspired engineering", "start_char_pos": 341, "end_char_pos": 341}, {"type": "R", "before": "control micron-scale", "after": "uncover non-equilibrium phenomena and principles by optically controlling", "start_char_pos": 353, "end_char_pos": 373}, {"type": "D", "before": "by manipulating molecular-scale protein activity set by dynamic optical boundaries", "after": null, "start_char_pos": 400, "end_char_pos": 482}, {"type": "R", "before": "purified proteins", "after": "active biomolecules", "start_char_pos": 510, "end_char_pos": 527}, {"type": "A", "before": null, "after": "purified", "start_char_pos": 564, "end_char_pos": 564}, {"type": "R", "before": "and URLanize microtubules", "after": "URLanize microtubules into distinct structures", "start_char_pos": 630, "end_char_pos": 655}, {"type": "R", "before": "During URLanization, crosslinked motors do work to create non-equilibrium structures. We design light patternsthat enable us", "after": "We develop basic operations, defined as sets of light patterns,", "start_char_pos": 675, "end_char_pos": 799}, {"type": "R", "before": "asters with spatial and temporal precision", "after": "structures", "start_char_pos": 839, "end_char_pos": 881}, {"type": "A", "before": null, "after": "are able to", "start_char_pos": 924, "end_char_pos": 924}, {"type": "D", "before": "can", "after": null, "start_char_pos": 958, "end_char_pos": 961}, {"type": "R", "before": "By scaling the size and speed of contractile networks , we", "after": "We manipulate these contractile networks to", "start_char_pos": 1098, "end_char_pos": 1156}, {"type": "R", "before": "advective fluid flows. Our work shows that dynamic boundaries enable control over active matter", "after": "persistent fluid flows", "start_char_pos": 1177, "end_char_pos": 1272}], "sents_char_pos": [0, 193, 529, 674, 760, 883, 1097, 1199, 1274]}
+{"doc_id": "1812.09431", "revision_depth": "1", "before_revision": "Despite the remarkable similarities between deep neural networks ( DNN ) and the human brain as shown in previous studies, the fact that DNNs still fall behind humans in many visual tasks suggests that considerable differences still exist between the two systems. To probe their dissimilarities , we leverage adversarial noise (AN) and adversarial interference (AI) images that yield distinct recognition performance in a prototypical DNN (AlexNet) and human vision. The evoked activity by regular (RE) and adversarial images in both systems is thoroughly compared. We find that representational similarity between RE and adversarial images in the human brain resembles their perceptual similarity . However, such representation-perception association is disrupted in the DNN. Especially, the representational similarity between RE and AN images idiosyncratically increases from low- to high-level layers . Furthermore, forward encoding modeling reveals that the DNN-brain hierarchical correspondence proposed in previous studies only holds when the two systems process RE and AI images but not AN images. These results might be due to the deterministic modeling approach of current DNNs. Taken together, our results provide a complementary perspective on the comparison between DNNs and the human brain , and highlight the need to characterize their differences to further bridge artificial and human intelligence research .", "after_revision": "Despite the remarkable similarities between convolutional neural networks ( CNN ) and the human brain , CNNs still fall behind humans in many visual tasks , indicating that there still exist considerable differences between the two systems. Here , we leverage adversarial noise (AN) and adversarial interference (AI) images to quantify the consistency between neural representations and perceptual outcomes in the two systems. Humans can successfully recognize AI images as corresponding categories but perceive AN images as meaningless noise. In contrast, CNNs can correctly recognize AN images but mistakenly classify AI images into wrong categories with surprisingly high confidence. We use functional magnetic resonance imaging to measure brain activity evoked by regular and adversarial images in the human brain, and compare it to the activity of artificial neurons in a prototypical CNN-AlexNet. In the human brain, we find that the representational similarity between regular and adversarial images largely echoes their perceptual similarity in all early visual areas. In AlexNet, however, the neural representations of adversarial images are inconsistent with network outputs in all intermediate processing layers, providing no neural foundations for perceptual similarity . Furthermore, we show that voxel-encoding models trained on regular images can successfully generalize to the neural responses to AI images but not AN images. These remarkable differences between the human brain and AlexNet in the representation-perception relation suggest that future CNNs should emulate both behavior and the internal neural presentations of the human brain .", "edit_actions": [{"type": "R", "before": "deep", "after": "convolutional", "start_char_pos": 44, "end_char_pos": 48}, {"type": "R", "before": "DNN", "after": "CNN", "start_char_pos": 67, "end_char_pos": 70}, {"type": "R", "before": "as shown in previous studies, the fact that DNNs", "after": ", CNNs", "start_char_pos": 93, "end_char_pos": 141}, {"type": "R", "before": "suggests that considerable differences still exist", "after": ", indicating that there still exist considerable differences", "start_char_pos": 188, "end_char_pos": 238}, {"type": "R", "before": "To probe their dissimilarities", "after": "Here", "start_char_pos": 264, "end_char_pos": 294}, {"type": "R", "before": "that yield distinct recognition performance in a prototypical DNN (AlexNet) and human vision. The evoked activity by regular (RE)", "after": "to quantify the consistency between neural representations and perceptual outcomes in the two systems. Humans can successfully recognize AI images as corresponding categories but perceive AN images as meaningless noise. In contrast, CNNs can correctly recognize AN images but mistakenly classify AI images into wrong categories with surprisingly high confidence. We use functional magnetic resonance imaging to measure brain activity evoked by regular", "start_char_pos": 373, "end_char_pos": 502}, {"type": "R", "before": "both systems is thoroughly compared. We find that", "after": "the human brain, and compare it to the activity of artificial neurons in a prototypical CNN-AlexNet. In the human brain, we find that the", "start_char_pos": 529, "end_char_pos": 578}, {"type": "R", "before": "RE", "after": "regular", "start_char_pos": 615, "end_char_pos": 617}, {"type": "R", "before": "in the human brain resembles", "after": "largely echoes", "start_char_pos": 641, "end_char_pos": 669}, {"type": "R", "before": ". However, such representation-perception association is disrupted in the DNN. Especially, the representational similarity between RE and AN images idiosyncratically increases from low- to high-level layers", "after": "in all early visual areas. In AlexNet, however, the neural representations of adversarial images are inconsistent with network outputs in all intermediate processing layers, providing no neural foundations for perceptual similarity", "start_char_pos": 698, "end_char_pos": 904}, {"type": "R", "before": "forward encoding modeling reveals that the DNN-brain hierarchical correspondence proposed in previous studies only holds when the two systems process RE and", "after": "we show that voxel-encoding models trained on regular images can successfully generalize to the neural responses to", "start_char_pos": 920, "end_char_pos": 1076}, {"type": "R", "before": "results might be due to the deterministic modeling approach of current DNNs. Taken together, our results provide a complementary perspective on the comparison between DNNs and", "after": "remarkable differences between", "start_char_pos": 1112, "end_char_pos": 1287}, {"type": "R", "before": ", and highlight the need to characterize their differences to further bridge artificial and human intelligence research", "after": "and AlexNet in the representation-perception relation suggest that future CNNs should emulate both behavior and the internal neural presentations of the human brain", "start_char_pos": 1304, "end_char_pos": 1423}], "sents_char_pos": [0, 263, 466, 565, 699, 906, 1105, 1188]}
+{"doc_id": "1812.11246", "revision_depth": "1", "before_revision": "This paper studies identification and estimation of a class of dynamic models in which the decision maker (DM) is uncertain about the data-generating process. The DM maximizes his or her continuation value under a worst-case model which lies within a nonparametric neighborhood of a benchmark model . The DM's benchmark model and preference parameters are jointly underidentified. With the DM's benchmark model fixed, primitive conditions are established for nonparametric identification of the worst-case model and local identification of the DM's preference parameters. The key step in the identification analysis is to establish existence and uniqueness of the DM's continuation value function allowing for unbounded statespace and unbounded utilities, both of which are important in applications. To do so, we derive new fixed-point results which use monotonicity and convexity of the value function recursion and which are embedded within a Banach space of \" thin-tailed \" functions that arises naturally from the structure of recursion. The fixed-point results are quite general and are also applied to models where the DM learns about a hidden state and Rust-type dynamic discrete choice models . A perturbation result is derived which provides a necessary and sufficient condition for consistent estimation of continuation values and the worst-case model. A robust consumption-investment problem is studied as an empirical application and some connections are drawn with the literature on macroeconomic uncertainty.", "after_revision": "This paper studies identification and estimation of a class of dynamic models in which the decision maker (DM) is uncertain about the data-generating process. The DM surrounds a benchmark model that he or she fears is misspecified by a set of models. Decisions are evaluated under a \"worst-case\" model that delivers the lowest utility among all models in this set . The DM's benchmark model and preference parameters are jointly underidentified. With the benchmark model held fixed, primitive conditions are established for identification of the DM's worst-case model and preference parameters. The key step in the identification analysis is to establish existence and uniqueness of the DM's continuation value function allowing for unbounded statespace and unbounded utilities, both of which are important in applications. To do so, new fixed-point results are derived for monotone, convex operators that act on a Banach space of thin-tailed functions arising naturally from the structure of the continuation value recursion. The fixed-point results are quite general ; applications to models with learning and Rust-type dynamic discrete choice models are also discussed. For estimation, a perturbation result is derived which provides a necessary and sufficient condition for consistent estimation of continuation values and the worst-case model. The result also allows convergence rates of estimators to be characterized. An empirical application studies an endowment economy where the DM's benchmark model may be interpreted as an aggregate of experts' forecasting models. The application reveals time-variation in the way the DM pessimistically distorts benchmark probabilities. Consequences for asset pricing are explored and connections are drawn with the literature on macroeconomic uncertainty.", "edit_actions": [{"type": "R", "before": "maximizes his or her continuation value under a worst-case model which lies within a nonparametric neighborhood of a", "after": "surrounds a", "start_char_pos": 166, "end_char_pos": 282}, {"type": "A", "before": null, "after": "that he or she fears is misspecified by a set of models. Decisions are evaluated under a \"worst-case\" model that delivers the lowest utility among all models in this set", "start_char_pos": 299, "end_char_pos": 299}, {"type": "R", "before": "DM's benchmark model", "after": "benchmark model held", "start_char_pos": 391, "end_char_pos": 411}, {"type": "D", "before": "nonparametric", "after": null, "start_char_pos": 460, "end_char_pos": 473}, {"type": "D", "before": "worst-case model and local identification of the", "after": null, "start_char_pos": 496, "end_char_pos": 544}, {"type": "A", "before": null, "after": "worst-case model and", "start_char_pos": 550, "end_char_pos": 550}, {"type": "D", "before": "we derive", "after": null, "start_char_pos": 813, "end_char_pos": 822}, {"type": "R", "before": "which use monotonicity and convexity of the value function recursion and which are embedded within", "after": "are derived for monotone, convex operators that act on", "start_char_pos": 847, "end_char_pos": 945}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 964, "end_char_pos": 965}, {"type": "R", "before": "\" functions that arises", "after": "functions arising", "start_char_pos": 978, "end_char_pos": 1001}, {"type": "A", "before": null, "after": "the continuation value", "start_char_pos": 1034, "end_char_pos": 1034}, {"type": "R", "before": "and are also applied to models where the DM learns about a hidden state", "after": "; applications to models with learning", "start_char_pos": 1088, "end_char_pos": 1159}, {"type": "R", "before": ". A", "after": "are also discussed. For estimation, a", "start_char_pos": 1205, "end_char_pos": 1208}, {"type": "R", "before": "A robust consumption-investment problem is studied as an empirical application and some", "after": "The result also allows convergence rates of estimators to be characterized. An empirical application studies an endowment economy where the DM's benchmark model may be interpreted as an aggregate of experts' forecasting models. The application reveals time-variation in the way the DM pessimistically distorts benchmark probabilities. Consequences for asset pricing are explored and", "start_char_pos": 1367, "end_char_pos": 1454}], "sents_char_pos": [0, 158, 301, 381, 573, 802, 1045, 1366]}
+{"doc_id": "1901.02414", "revision_depth": "1", "before_revision": "We consider assignment policies that allocate resources to requesting users, where everyone is located on a one-dimensional line. First, we consider a unidirectional problem where a resource can only be allocated to a user located to its leftas exemplified here. Imagine a one-way city street with traffic flowing from right to left; a ride-sharing company has distributed its vehicles along the street, which are ready to pick up users waiting at various locations. Users equipped with smartphone ride-hailing apps can register their requests on a ride allocation system. The latter then attempts to service each user by assigning a vehicle with spare capacity located to the user's right such that the average \"pick up\" distance is minimized. We propose the Move to Right (MTR) policy which assigns the nearest available resource located to the right , and contrast it with the Unidirectional Gale-Shapley (UGS) Matching policyknown in the literature . While both these policies are optimal , we show that they are equivalent with respect to the expected distance traveled by a request (request distance), although MTR tends to be fairer, i. e., has low variance. Moreover, we show that when the locations of users and resources are modeled by statistical point processes, the spatial system under unidirectional policies can be mapped to a temporal queuing system , thus allowing the application of a plethora of queuing theory results that yield closed form expressions. We also consider the bidirectional problem where there are no directional restrictions on resource allocation and give an optimal policy that has lower expected time complexity than known algorithms in literature in resource rich regimes . Finally, numerical evaluation of performance of unidirectional and bidirectional allocation schemes yield design guidelines beneficial for resource placement.", "after_revision": "We consider assignment policies that allocate resources to users, where both resources and users are located on a one-dimensional line. First, we consider unidirectional assignment policies that allocate resources only to users located to their left. We propose the Move to Right (MTR) policy , which scans from left to right assigning nearest rightmost available resource to a user , and contrast it to the Unidirectional Gale-Shapley (UGS) matching policy . While both these policies are optimal among all unidirectional policies , we show that they are equivalent with respect to the expected distance traveled by a request (request distance), although MTR is fairer. Moreover, we show that when user and resource locations are modeled by statistical point processes, and resources are allowed to satisfy more than one user, the spatial system under unidirectional policies can be mapped into bulk service queuing systems , thus allowing the application of a plethora of queuing theory results that yield closed form expressions. As we consider a case where different resources can satisfy different numbers of users, we also generate new results for bulk service queues. We also consider bidirectional policies where there are no directional restrictions on resource allocation and develop an algorithm for computing the optimal assignment which is more efficient than known algorithms in the literature when there are more resources than users . Finally, numerical evaluation of performance of unidirectional and bidirectional allocation schemes yields design guidelines beneficial for resource placement.", "edit_actions": [{"type": "D", "before": "requesting", "after": null, "start_char_pos": 59, "end_char_pos": 69}, {"type": "R", "before": "everyone is", "after": "both resources and users are", "start_char_pos": 83, "end_char_pos": 94}, {"type": "R", "before": "a unidirectional problem where a resource can only be allocated to a user located to its leftas exemplified here. Imagine a one-way city street with traffic flowing from right to left; a ride-sharing company has distributed its vehicles along the street, which are ready to pick up users waiting at various locations. Users equipped with smartphone ride-hailing apps can register their requests on a ride allocation system. The latter then attempts to service each user by assigning a vehicle with spare capacity located to the user's right such that the average \"pick up\" distance is minimized.", "after": "unidirectional assignment policies that allocate resources only to users located to their left.", "start_char_pos": 149, "end_char_pos": 744}, {"type": "R", "before": "which assigns the nearest available resource located to the right", "after": ", which scans from left to right assigning nearest rightmost available resource to a user", "start_char_pos": 787, "end_char_pos": 852}, {"type": "R", "before": "with", "after": "to", "start_char_pos": 871, "end_char_pos": 875}, {"type": "R", "before": "Matching policyknown in the literature", "after": "matching policy", "start_char_pos": 914, "end_char_pos": 952}, {"type": "A", "before": null, "after": "among all unidirectional policies", "start_char_pos": 993, "end_char_pos": 993}, {"type": "R", "before": "tends to be fairer, i. e., has low variance.", "after": "is fairer.", "start_char_pos": 1122, "end_char_pos": 1166}, {"type": "R", "before": "the locations of users and resources", "after": "user and resource locations", "start_char_pos": 1195, "end_char_pos": 1231}, {"type": "A", "before": null, "after": "and resources are allowed to satisfy more than one user,", "start_char_pos": 1276, "end_char_pos": 1276}, {"type": "R", "before": "to a temporal queuing system", "after": "into bulk service queuing systems", "start_char_pos": 1340, "end_char_pos": 1368}, {"type": "A", "before": null, "after": "As we consider a case where different resources can satisfy different numbers of users, we also generate new results for bulk service queues.", "start_char_pos": 1477, "end_char_pos": 1477}, {"type": "R", "before": "the bidirectional problem", "after": "bidirectional policies", "start_char_pos": 1495, "end_char_pos": 1520}, {"type": "R", "before": "give an optimal policy that has lower expected time complexity", "after": "develop an algorithm for computing the optimal assignment which is more efficient", "start_char_pos": 1592, "end_char_pos": 1654}, {"type": "R", "before": "literature in resource rich regimes", "after": "the literature when there are more resources than users", "start_char_pos": 1680, "end_char_pos": 1715}, {"type": "R", "before": "yield", "after": "yields", "start_char_pos": 1818, "end_char_pos": 1823}], "sents_char_pos": [0, 129, 262, 333, 466, 572, 744, 954, 1166, 1476, 1717]}
+{"doc_id": "1902.00706", "revision_depth": "1", "before_revision": "We analyze the probability of ruin for the {\\it scaled} classical Cramer-Lundberg (CL) risk process and the corresponding diffusion approximation. The scaling, introduced by Iglehart (1969) to the actuarial literature, amounts to multiplying the Poisson rate \\lambda \\la by n, dividing the claim severity by \\sqrt{n , and adjusting the premium rate so that net premium income remains constant. Therefore, we think of the associated diffusion approximation as being `` asymptotic for large values of \\lambda.'' \\la We are the first to use a comparison method to prove convergence of the probability of ruin for the scaled CL process and to derive the rate of convergence. Specifically, we prove a comparison lemma for the corresponding integro-differential equation and use this comparison lemma to prove that the probability of ruin for the scaled CL process converges to the probability of ruin for the limiting diffusion process. Moreover, we show that the rate of convergence for the ruin probability is of order O(n^{-1/2 \\mO\\big(}\\big) , and we show that the convergence is {\\it uniform} with respect to the surplus. To the best of our knowledge, this is the first rate of convergence achieved for these ruin probabilities, and we show that it is the tightest one . For the case of exponentially-distributed claims, we are able to improve the approximation arising from the diffusion, attaining a uniform O(n \\mO\\big( ^{ -1 } ) \\big) rate of convergence \\N . We also include two examples that illustrate our results.", "after_revision": "We analyze the probability of ruin for the {\\it scaled} classical Cram\\'er-Lundberg (CL) risk process and the corresponding diffusion approximation. The scaling, introduced by Iglehart \\mbox{%DIFAUXCMD I1969 to the actuarial literature, amounts to multiplying the Poisson rate \\la by n, dividing the claim severity by \\sqrtn , and adjusting the premium rate so that net premium income remains constant. \\% Therefore, we think of the associated diffusion approximation as being \" asymptotic for large values of \\la.\" We are the first to use a comparison method to prove convergence of the probability of ruin for the scaled CL process and to derive the rate of convergence. Specifically, we prove a comparison lemma for the corresponding integro-differential equation and use this comparison lemma to prove that the probability of ruin for the scaled CL process converges to the probability of ruin for the limiting diffusion process. Moreover, we show that the rate of convergence for the ruin probability is of order \\mO\\big(n^{-1/2}\\big) , and we show that the convergence is {\\it uniform} with respect to the surplus. To the best of our knowledge, this is the first rate of convergence achieved for these ruin probabilities, and we show that it is the tightest one in the general case . For the case of exponentially-distributed claims, we are able to improve the approximation arising from the diffusion, attaining a uniform \\mO\\big(n ^{ -k/2 } \\big) rate of convergence for arbitrary k \\in\\N . We also include two examples that illustrate our results.", "edit_actions": [{"type": "R", "before": "Cramer-Lundberg", "after": "Cram\\'er-Lundberg", "start_char_pos": 66, "end_char_pos": 81}, {"type": "R", "before": "(1969)", "after": "\\mbox{%DIFAUXCMD I1969", "start_char_pos": 183, "end_char_pos": 189}, {"type": "D", "before": "\\lambda", "after": null, "start_char_pos": 259, "end_char_pos": 266}, {"type": "R", "before": "\\sqrt{n", "after": "\\sqrtn", "start_char_pos": 308, "end_char_pos": 315}, {"type": "A", "before": null, "after": "\\%", "start_char_pos": 394, "end_char_pos": 394}, {"type": "R", "before": "``", "after": "\"", "start_char_pos": 466, "end_char_pos": 468}, {"type": "D", "before": "\\lambda.''", "after": null, "start_char_pos": 500, "end_char_pos": 510}, {"type": "A", "before": null, "after": ".\"", "start_char_pos": 514, "end_char_pos": 514}, {"type": "D", "before": "O(n^{-1/2", "after": null, "start_char_pos": 1017, "end_char_pos": 1026}, {"type": "A", "before": null, "after": "n^{-1/2", "start_char_pos": 1035, "end_char_pos": 1035}, {"type": "A", "before": null, "after": "in the general case", "start_char_pos": 1270, "end_char_pos": 1270}, {"type": "D", "before": "O(n", "after": null, "start_char_pos": 1412, "end_char_pos": 1415}, {"type": "A", "before": null, "after": "n", "start_char_pos": 1424, "end_char_pos": 1424}, {"type": "R", "before": "-1", "after": "-k/2", "start_char_pos": 1428, "end_char_pos": 1430}, {"type": "D", "before": ")", "after": null, "start_char_pos": 1433, "end_char_pos": 1434}, {"type": "A", "before": null, "after": "for arbitrary k \\in", "start_char_pos": 1461, "end_char_pos": 1461}], "sents_char_pos": [0, 146, 393, 671, 932, 1122, 1272]}
+{"doc_id": "1902.05622", "revision_depth": "1", "before_revision": " We study interactionsamong players in cooperative games. We propose a new interaction index called Shapley-Taylor interaction index . It decomposes the value of the game into terms that model the interactions between subsets of players, analogous to how the Taylor series represents a function in terms of its derivatives of various orders . We axiomatize the method using the standard Shapley axioms--linearity , dummy, symmetry and efficiency--and also an additional axiom that we call the interaction distribution axiom. This new axiom explicitly characterizes how inter-actions are distributed for a class of games called interactiongames . We contrast the Shapley-Taylor interaction index against the previously pro-posed Shapley Interaction index and the Banzhaf interaction index (cf. [ 2 ]) .", "after_revision": "The attribution problem, that is the problem of attributing a model's prediction to its base features, is well-studied. We extend the notion of attribution to also apply to feature interactions. The Shapley value is a commonly used method to attribute a model's prediction to its base features. We propose a generalization of the Shapley value called Shapley-Taylor index that attributes the model's prediction to interactions of subsets of features up to some size k. The method is analogous to how the truncated Taylor Series decomposes the function value at a certain point using its derivatives at a different point. In fact, we show that the Shapley Taylor index is equal to the Taylor Series of the multilinear extension of the set-theoretic behavior of the model . We axiomatize this method using the standard Shapley axioms -- linearity , dummy, symmetry and efficiency -- and an additional axiom that we call the interaction distribution axiom. This new axiom explicitly characterizes how interactions are distributed for a class of functions that model pure interaction . We contrast the Shapley-Taylor index against the previously proposed Shapley Interaction index (cf. [ 9 ]) from the cooperative game theory literature. We also apply the Shapley Taylor index to three models and identify interesting qualitative insights .", "edit_actions": [{"type": "A", "before": null, "after": "The attribution problem, that is the problem of attributing a model's prediction to its base features, is well-studied. We extend the notion of attribution to also apply to feature interactions. The Shapley value is a commonly used method to attribute a model's prediction to its base features.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "D", "before": "study interactionsamong players in cooperative games. We", "after": null, "start_char_pos": 4, "end_char_pos": 60}, {"type": "R", "before": "new interaction index", "after": "generalization of the Shapley value", "start_char_pos": 71, "end_char_pos": 92}, {"type": "R", "before": "interaction index . It decomposes the value of the game into terms that model the interactions between subsets of players,", "after": "index that attributes the model's prediction to interactions of subsets of features up to some size k. The method is", "start_char_pos": 115, "end_char_pos": 237}, {"type": "R", "before": "Taylor series represents a function in terms of its derivatives of various orders", "after": "truncated Taylor Series decomposes the function value at a certain point using its derivatives at a different point. In fact, we show that the Shapley Taylor index is equal to the Taylor Series of the multilinear extension of the set-theoretic behavior of the model", "start_char_pos": 259, "end_char_pos": 340}, {"type": "R", "before": "the", "after": "this", "start_char_pos": 357, "end_char_pos": 360}, {"type": "R", "before": "axioms--linearity", "after": "axioms -- linearity", "start_char_pos": 395, "end_char_pos": 412}, {"type": "R", "before": "efficiency--and also", "after": "efficiency -- and", "start_char_pos": 435, "end_char_pos": 455}, {"type": "R", "before": "inter-actions", "after": "interactions", "start_char_pos": 569, "end_char_pos": 582}, {"type": "R", "before": "games called interactiongames", "after": "functions that model pure interaction", "start_char_pos": 614, "end_char_pos": 643}, {"type": "D", "before": "interaction", "after": null, "start_char_pos": 677, "end_char_pos": 688}, {"type": "R", "before": "pro-posed", "after": "proposed", "start_char_pos": 718, "end_char_pos": 727}, {"type": "D", "before": "and the Banzhaf interaction index", "after": null, "start_char_pos": 754, "end_char_pos": 787}, {"type": "R", "before": "2", "after": "9", "start_char_pos": 795, "end_char_pos": 796}, {"type": "A", "before": null, "after": "from the cooperative game theory literature. We also apply the Shapley Taylor index to three models and identify interesting qualitative insights", "start_char_pos": 800, "end_char_pos": 800}], "sents_char_pos": [0, 57, 134, 342, 524, 645]}
+{"doc_id": "1902.06687", "revision_depth": "2", "before_revision": "We present the first sublinear memory sketch which can be queried to find the v nearest neighbors in a dataset. Our online sketching algorithm can compress an N-element dataset to a sketch of size O(N^b \\log ^3{N ) in O(N^{ b+1 } \\log ^3{N ) time, where b < 1 when the query satisfies a data-dependent near-neighbor stability condition . We achieve data-dependent sublinear space by combining recent advances in locality sensitive hashing (LSH)-based estimators with compressed sensing. Our results shed new light on the memory-accuracy tradeoff for near-neighbor search. The techniques presented reveal a deep connection between the fundamental compressed sensing (or heavy hitters) recovery problem and near-neighbor search, leading to new insight for geometric search problems and implications for sketching algorithms .", "after_revision": "We present the first sublinear memory sketch that can be queried to find the nearest neighbors in a dataset. Our online sketching algorithm compresses an N element dataset to a sketch of size O(N^b \\log ^3 N ) in O(N^{ ( b+1 ) } \\log ^3 N ) time, where b < 1. This sketch can correctly report the nearest neighbors of any query that satisfies a stability condition parameterized by b . We achieve sublinear memory performance on stable queries by combining recent advances in locality sensitive hash (LSH)-based estimators , online kernel density estimation, and compressed sensing. Our theoretical results shed new light on the memory-accuracy tradeoff for nearest neighbor search, and our sketch, which consists entirely of short integer arrays, has a variety of attractive features in practice. We evaluate the memory-recall tradeoff of our method on a friend recommendation task in the Google Plus social media network. We obtain orders of magnitude better compression than the random projection based alternative while retaining the ability to report the nearest neighbors of practical queries .", "edit_actions": [{"type": "R", "before": "which", "after": "that", "start_char_pos": 45, "end_char_pos": 50}, {"type": "D", "before": "v", "after": null, "start_char_pos": 78, "end_char_pos": 79}, {"type": "R", "before": "can compress an N-element", "after": "compresses an N element", "start_char_pos": 143, "end_char_pos": 168}, {"type": "R", "before": "^3{N", "after": "^3 N", "start_char_pos": 208, "end_char_pos": 212}, {"type": "A", "before": null, "after": "(", "start_char_pos": 224, "end_char_pos": 224}, {"type": "A", "before": null, "after": ")", "start_char_pos": 229, "end_char_pos": 229}, {"type": "R", "before": "^3{N", "after": "^3 N", "start_char_pos": 237, "end_char_pos": 241}, {"type": "R", "before": "1 when the query satisfies a data-dependent near-neighbor stability condition", "after": "1. This sketch can correctly report the nearest neighbors of any query that satisfies a stability condition parameterized by b", "start_char_pos": 260, "end_char_pos": 337}, {"type": "R", "before": "data-dependent sublinear space", "after": "sublinear memory performance on stable queries", "start_char_pos": 351, "end_char_pos": 381}, {"type": "R", "before": "hashing", "after": "hash", "start_char_pos": 433, "end_char_pos": 440}, {"type": "R", "before": "with", "after": ", online kernel density estimation, and", "start_char_pos": 464, "end_char_pos": 468}, {"type": "A", "before": null, "after": "theoretical", "start_char_pos": 493, "end_char_pos": 493}, {"type": "R", "before": "near-neighbor search. The techniques presented reveal a deep connection between the fundamental compressed sensing (or heavy hitters) recovery problem and near-neighbor search, leading to new insight for geometric search problems and implications for sketching algorithms", "after": "nearest neighbor search, and our sketch, which consists entirely of short integer arrays, has a variety of attractive features in practice. We evaluate the memory-recall tradeoff of our method on a friend recommendation task in the Google Plus social media network. We obtain orders of magnitude better compression than the random projection based alternative while retaining the ability to report the nearest neighbors of practical queries", "start_char_pos": 553, "end_char_pos": 824}], "sents_char_pos": [0, 111, 339, 488, 574]}
+{"doc_id": "1902.07190", "revision_depth": "1", "before_revision": "The persistence diagram is an increasingly useful tool arising from the field of Topological Data Analysis . However, using these diagrams in conjunction with machine learning techniques requires some mathematical finesse. The most success to date has come from finding methods for turning persistence diagrams into vectors in \\mathbb{R in a way which preserves as much of the space of persistence diagrams as possible, commonly referred to as featurization. In this paper, we describe a mathematical framework for featurizing the persistence diagram space using template functions. These functions are general as they are only required to be continuous , have a compact support, and separate points . We discuss two example realizationsof these functions : tent functions and Chybeyshev interpolating polynomials. Both of these functions are defined on a grid superposed on the birth-lifetime plane. We then combine the resulting features with machine learning algorithms to perform supervised classification and regression on several example data sets, including manifold data, shape data , and an embedded time series from a Rossler system. Our results show that the template function approach yields high accuracy rates that match and often exceed the results of existing methods for featurizing persistence diagrams . One counter-intuitive observation is that in most cases using interpolating polynomials, where each point contributes globally to the feature vector, yields significantly better results than using tent functions, where the contribution of each point is localized to its grid cell . Along the way, we also provide a complete characterization of compact sets in persistence diagram space endowed with the bottleneck distance .", "after_revision": "The persistence diagram is an increasingly useful tool from Topological Data Analysis , but its use alongside typical machine learning techniques requires mathematical finesse. The most success to date has come from methods that map persistence diagrams into \\mathbb{R in a way which maximizes the structure preserved. This process is commonly referred to as featurization. In this paper, we describe a mathematical framework for featurization using template functions. These functions are general as they are only required to be continuous and compactly supported . We discuss two realizations : tent functions , which emphasize the local contributions of points in a persistence diagram, and interpolating polynomials, which capture global pairwise interactions. We combine the resulting features with classification and regression algorithms on several examples including shape data and the Rossler system. Our results show that using template functions yields high accuracy rates that match and often exceed those of existing featurization methods . One counter-intuitive observation is that in most cases using interpolating polynomials, where each point contributes globally to the feature vector, yields significantly better results than using tent functions, where the contribution of each point is localized . Along the way, we provide a complete characterization of compactness in the space of persistence diagrams .", "edit_actions": [{"type": "R", "before": "arising from the field of", "after": "from", "start_char_pos": 55, "end_char_pos": 80}, {"type": "R", "before": ". However, using these diagrams in conjunction with", "after": ", but its use alongside typical", "start_char_pos": 107, "end_char_pos": 158}, {"type": "D", "before": "some", "after": null, "start_char_pos": 196, "end_char_pos": 200}, {"type": "R", "before": "finding methods for turning", "after": "methods that map", "start_char_pos": 262, "end_char_pos": 289}, {"type": "R", "before": "vectors in \\mathbb{R", "after": "\\mathbb{R", "start_char_pos": 316, "end_char_pos": 336}, {"type": "R", "before": "preserves as much of the space of persistence diagrams as possible,", "after": "maximizes the structure preserved. This process is", "start_char_pos": 352, "end_char_pos": 419}, {"type": "R", "before": "featurizing the persistence diagram space", "after": "featurization", "start_char_pos": 515, "end_char_pos": 556}, {"type": "R", "before": ", have a compact support, and separate points", "after": "and compactly supported", "start_char_pos": 654, "end_char_pos": 699}, {"type": "R", "before": "example realizationsof these functions", "after": "realizations", "start_char_pos": 717, "end_char_pos": 755}, {"type": "R", "before": "and Chybeyshev interpolating polynomials. Both of these functions are defined on a grid superposed on the birth-lifetime plane. We then", "after": ", which emphasize the local contributions of points in a persistence diagram, and interpolating polynomials, which capture global pairwise interactions. We", "start_char_pos": 773, "end_char_pos": 908}, {"type": "D", "before": "machine learning algorithms to perform supervised", "after": null, "start_char_pos": 945, "end_char_pos": 994}, {"type": "R", "before": "on several example data sets, including manifold data, shape data , and an embedded time series from a", "after": "algorithms on several examples including shape data and the", "start_char_pos": 1025, "end_char_pos": 1127}, {"type": "R", "before": "the template function approach", "after": "using template functions", "start_char_pos": 1166, "end_char_pos": 1196}, {"type": "R", "before": "the results of existing methods for featurizing persistence diagrams", "after": "those of existing featurization methods", "start_char_pos": 1252, "end_char_pos": 1320}, {"type": "D", "before": "to its grid cell", "after": null, "start_char_pos": 1586, "end_char_pos": 1602}, {"type": "D", "before": "also", "after": null, "start_char_pos": 1623, "end_char_pos": 1627}, {"type": "R", "before": "compact sets in persistence diagram space endowed with the bottleneck distance", "after": "compactness in the space of persistence diagrams", "start_char_pos": 1667, "end_char_pos": 1745}], "sents_char_pos": [0, 108, 222, 458, 582, 701, 814, 900, 1143, 1322, 1604]}
+{"doc_id": "1902.10240", "revision_depth": "1", "before_revision": "Seagrass meadows are among the most important coastal ecosystems in terms of both spatial extent and ecosystem services but are declining worldwide. Understanding the drivers of seagrass meadow dynamics is essential for designing sound management, conservation and restoration strategies. However, the effect of clonality on the population genetics of natural populations understood, severely limiting our comprehension of the dynamics and connectivity of meadows. Here, we revisited population genetics data on 165 meadows of four seagrass species in light of recent theoretical developments, which provide new expectations for the distributions of genotypic and genetic polymorphism under increasing clonal rates . Contrasting shoot life span and rhizome turnover lead to the prediction of a decreasing influence of asexual reproduction along a gradient from Posidonia oceanica to Cymodocea nodosa, Zostera marinaand Zostera noltii , which should be reflected by decreasing departure from Hardy-Weinberg equilibrium (Fis) and increasing genotypic diversity (R). This meta-analysis provides a nested validation of this hypothesis at the species scale but also at the meadow scale through the emergence of a significant relationship between Fis and R within each species. By empirically demonstrating the theoretical expectations derived from recent modelling approaches, this work calls for the use of Hardy-Weinberg equilibrium (Fis) rather than the strongly sampling-sensitive genotypic index R in studies aiming at understanding the importance of clonal reproduction. We also emphasize the need to revise our perception of the influence of clonality on the dynamics, connectivity and evolutionary trajectory of seagrass meadows to develop the most accurate conservation strategies.", "after_revision": "Seagrass meadows are among the most important coastal ecosystems , in terms of both spatial extent and ecosystem services , but they are also declining worldwide. Understanding the drivers of seagrass meadow dynamics is essential for designing sound management, conservation , and restoration strategies. However, the poor knowledge of the effect of clonality on the population genetics of natural populations severely limits our understanding of the dynamics and connectivity of meadows. Recent modelling approaches have described the expected distributions of genotypic and genetic descriptors under increasing clonal rates. Here, in light of these recent theoretical developments, we revisited population genetic data for 165 meadows of four seagrass species . Contrasting shoot life span and rhizome turnover led to the prediction that the influence of asexual reproduction will increase along a gradient from Zostera noltii to Zostera marina, Cymodocea nodosa and Posidonia oceanica , which should be reflected by an increasing departure from Hardy-Weinberg equilibrium (Fis) and decreasing genotypic diversity (R). This meta-analysis provides a nested validation of this hypothesis at both the species and meadow scales through a significant relationship between Fis and R within each species. By empirically demonstrating the theoretical expectations derived from recent modelling approaches, this work calls for the use of Hardy-Weinberg equilibrium (Fis) rather than the strongly sampling-sensitive genotypic index R to assess the importance of clonal reproduction. The results also emphasize the need to revise our appraisal of the extent of clonality and its influence on the dynamics, connectivity and evolutionary trajectory of partial asexuals in general, including in seagrass meadows, to develop the most accurate management strategies.", "edit_actions": [{"type": "A", "before": null, "after": ",", "start_char_pos": 65, "end_char_pos": 65}, {"type": "R", "before": "but are", "after": ", but they are also", "start_char_pos": 121, "end_char_pos": 128}, {"type": "A", "before": null, "after": ",", "start_char_pos": 262, "end_char_pos": 262}, {"type": "A", "before": null, "after": "poor knowledge of the", "start_char_pos": 304, "end_char_pos": 304}, {"type": "R", "before": "understood, severely limiting our comprehension", "after": "severely limits our understanding", "start_char_pos": 375, "end_char_pos": 422}, {"type": "R", "before": "Here,", "after": "Recent modelling approaches have described the expected distributions of genotypic and genetic descriptors under increasing clonal rates. Here, in light of these recent theoretical developments,", "start_char_pos": 468, "end_char_pos": 473}, {"type": "R", "before": "genetics data on", "after": "genetic data for", "start_char_pos": 498, "end_char_pos": 514}, {"type": "D", "before": "in light of recent theoretical developments, which provide new expectations for the distributions of genotypic and genetic polymorphism under increasing clonal rates", "after": null, "start_char_pos": 552, "end_char_pos": 717}, {"type": "R", "before": "lead", "after": "led", "start_char_pos": 769, "end_char_pos": 773}, {"type": "R", "before": "of a decreasing", "after": "that the", "start_char_pos": 792, "end_char_pos": 807}, {"type": "A", "before": null, "after": "will increase", "start_char_pos": 842, "end_char_pos": 842}, {"type": "R", "before": "Posidonia oceanica to Cymodocea nodosa, Zostera marinaand Zostera noltii", "after": "Zostera noltii to Zostera marina, Cymodocea nodosa and Posidonia oceanica", "start_char_pos": 865, "end_char_pos": 937}, {"type": "R", "before": "decreasing", "after": "an increasing", "start_char_pos": 969, "end_char_pos": 979}, {"type": "R", "before": "increasing", "after": "decreasing", "start_char_pos": 1032, "end_char_pos": 1042}, {"type": "R", "before": "the species scale but also at the meadow scale through the emergence of", "after": "both the species and meadow scales through", "start_char_pos": 1138, "end_char_pos": 1209}, {"type": "R", "before": "in studies aiming at understanding", "after": "to assess", "start_char_pos": 1502, "end_char_pos": 1536}, {"type": "R", "before": "We", "after": "The results", "start_char_pos": 1576, "end_char_pos": 1578}, {"type": "R", "before": "perception of the influence of clonality", "after": "appraisal of the extent of clonality and its influence", "start_char_pos": 1617, "end_char_pos": 1657}, {"type": "R", "before": "seagrass meadows", "after": "partial asexuals in general, including in seagrass meadows,", "start_char_pos": 1719, "end_char_pos": 1735}, {"type": "R", "before": "conservation", "after": "management", "start_char_pos": 1765, "end_char_pos": 1777}], "sents_char_pos": [0, 149, 290, 467, 596, 1067, 1275, 1575]}
+{"doc_id": "1903.03304", "revision_depth": "1", "before_revision": "Spectral risk measures (SRMs) belongs to the family of coherent risk measures. A natural estimator for the class of spectral risk measures (SRMs ) has the form of L-statistics. In the literature, various authors have studied and derived the asymptotic properties of the estimator of SRM using the empirical distribution function. But no such estimator of SRM is studied considering distribution function estimator other than empirical cdf . We propose a kernel based estimator of SRM. We try to investigate the large sample properties of general L-statistics based on i.i.d cases and apply them to our kernel based estimatorof SRM . We prove that the estimator is strongly consistent and the estimator is asymptotically normal. We compare the finite sample performance of the kernel based estimator with that of empirical estimator of SRM using Monte Carlo simulation , where appropriate choice of smoothing parameter and the user's coefficient of risk aversion plays an important role . Based on our simulation study we have estimated the exponential SRM of four future index-that is Nikkei 225, Dax, FTSE 100 and Hang Seng using our proposed kernel based estimator .", "after_revision": "Spectral risk measures (SRMs) belong to the family of coherent risk measures. A natural estimator for the class of SRMs has the form of L-statistics. Various authors have studied and derived the asymptotic properties of the empirical estimator of SRM . We propose a kernel based estimator of SRM. We investigate the large sample properties of general L-statistics based on i.i.d and dependent observations and apply them to our estimator . We prove that it is strongly consistent and asymptotically normal. We compare the finite sample performance of our proposed kernel estimator with that of several existing estimators for different SRMs using Monte Carlo simulation . We observe that our proposed kernel estimator outperforms all the estimators . Based on our simulation study we have estimated the exponential SRM of four future indices-that is Nikkei 225, Dax, FTSE 100 , and Hang Seng . We also perform a backtesting exercise of SRM .", "edit_actions": [{"type": "R", "before": "belongs", "after": "belong", "start_char_pos": 30, "end_char_pos": 37}, {"type": "R", "before": "spectral risk measures (SRMs )", "after": "SRMs", "start_char_pos": 116, "end_char_pos": 146}, {"type": "R", "before": "In the literature, various", "after": "Various", "start_char_pos": 177, "end_char_pos": 203}, {"type": "R", "before": "estimator of SRM using the empirical distribution function. But no such", "after": "empirical", "start_char_pos": 270, "end_char_pos": 341}, {"type": "D", "before": "is studied considering distribution function estimator other than empirical cdf", "after": null, "start_char_pos": 359, "end_char_pos": 438}, {"type": "D", "before": "try to", "after": null, "start_char_pos": 488, "end_char_pos": 494}, {"type": "R", "before": "cases and", "after": "and dependent observations and", "start_char_pos": 574, "end_char_pos": 583}, {"type": "R", "before": "kernel based estimatorof SRM", "after": "estimator", "start_char_pos": 602, "end_char_pos": 630}, {"type": "R", "before": "the estimator", "after": "it", "start_char_pos": 647, "end_char_pos": 660}, {"type": "D", "before": "the estimator is", "after": null, "start_char_pos": 688, "end_char_pos": 704}, {"type": "R", "before": "the kernel based", "after": "our proposed kernel", "start_char_pos": 772, "end_char_pos": 788}, {"type": "R", "before": "empirical estimator of SRM", "after": "several existing estimators for different SRMs", "start_char_pos": 812, "end_char_pos": 838}, {"type": "R", "before": ", where appropriate choice of smoothing parameter and the user's coefficient of risk aversion plays an important role", "after": ". We observe that our proposed kernel estimator outperforms all the estimators", "start_char_pos": 868, "end_char_pos": 985}, {"type": "R", "before": "index-that", "after": "indices-that", "start_char_pos": 1071, "end_char_pos": 1081}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1111, "end_char_pos": 1111}, {"type": "R", "before": "using our proposed kernel based estimator", "after": ". We also perform a backtesting exercise of SRM", "start_char_pos": 1126, "end_char_pos": 1167}], "sents_char_pos": [0, 78, 176, 329, 440, 484, 727]}
+{"doc_id": "1903.04448", "revision_depth": "1", "before_revision": "Visual modes of communication are ubiquitous in modern life . Here we investigate drawing, the most basic form of visual communication. Communicative drawing poses a core challenge for theories of how vision and social cognition interact, requiring a detailed understanding of how sensory information and social context jointly determine what information is relevant to communicate. Participants (N=192) were paired in an online environment to play a sketching-based reference game. On each trial, both participants were shown the same four objects, but in different locations. The sketcher's goal was to draw one of these objects - the target - so that the viewer could select it from the array. There were two types of trials: close, where objects belonged to the same basic-level category, and far, where objects belonged to different categories. We found that people exploited information in common ground with their partner to efficiently communicate about the target : on far trials, sketchers achieved high recognition accuracy while applying fewer strokes, using less ink, and spending less time on their drawings than on close trials. We hypothesized that humans succeed in this task by recruiting two core competencies: (1) visual abstraction, the capacity to perceive the correspondence between an object and a drawing of it; and (2) pragmatic inference, the ability to infer what information would help a viewer distinguish the target from distractors. To evaluate this hypothesis, we developed a computational model of the sketcher that embodied both competencies , instantiated as a deep convolutional neural network nested within a probabilistic program. We found that this model fit human data well and outperformed lesioned variants , providing an algorithmically explicit theory of how perception and social cognition jointly support contextual flexibility in visual communication.", "after_revision": "Visual modes of communication are ubiquitous in modern life --- from maps to data plots to political cartoons . Here we investigate drawing, the most basic form of visual communication. Participants were paired in an online environment to play a drawing-based reference game. On each trial, both participants were shown the same four objects, but in different locations. The sketcher's goal was to draw one of these objects so that the viewer could select it from the array. On `close' trials, objects belonged to the same basic-level category, whereas on `far' trials objects belonged to different categories. We found that people exploited shared information to efficiently communicate about the target object : on far trials, sketchers achieved high recognition accuracy while applying fewer strokes, using less ink, and spending less time on their drawings than on close trials. We hypothesized that humans succeed in this task by recruiting two core faculties: visual abstraction, the ability to perceive the correspondence between an object and a drawing of it; and pragmatic inference, the ability to judge what information would help a viewer distinguish the target from distractors. To evaluate this hypothesis, we developed a computational model of the sketcher that embodied both faculties , instantiated as a deep convolutional neural network nested within a probabilistic program. We found that this model fit human data well and outperformed lesioned variants . Together, this work provides the first algorithmically explicit theory of how visual perception and social cognition jointly support contextual flexibility in visual communication.", "edit_actions": [{"type": "A", "before": null, "after": "--- from maps to data plots to political cartoons", "start_char_pos": 60, "end_char_pos": 60}, {"type": "R", "before": "Communicative drawing poses a core challenge for theories of how vision and social cognition interact, requiring a detailed understanding of how sensory information and social context jointly determine what information is relevant to communicate. Participants (N=192)", "after": "Participants", "start_char_pos": 137, "end_char_pos": 404}, {"type": "R", "before": "sketching-based", "after": "drawing-based", "start_char_pos": 452, "end_char_pos": 467}, {"type": "D", "before": "- the target -", "after": null, "start_char_pos": 632, "end_char_pos": 646}, {"type": "R", "before": "There were two types of trials: close, where", "after": "On `close' trials,", "start_char_pos": 698, "end_char_pos": 742}, {"type": "R", "before": "and far, where", "after": "whereas on `far' trials", "start_char_pos": 794, "end_char_pos": 808}, {"type": "R", "before": "information in common ground with their partner", "after": "shared information", "start_char_pos": 882, "end_char_pos": 929}, {"type": "A", "before": null, "after": "object", "start_char_pos": 974, "end_char_pos": 974}, {"type": "R", "before": "competencies: (1)", "after": "faculties:", "start_char_pos": 1218, "end_char_pos": 1235}, {"type": "R", "before": "capacity", "after": "ability", "start_char_pos": 1260, "end_char_pos": 1268}, {"type": "D", "before": "(2)", "after": null, "start_char_pos": 1343, "end_char_pos": 1346}, {"type": "R", "before": "infer", "after": "judge", "start_char_pos": 1383, "end_char_pos": 1388}, {"type": "R", "before": "competencies", "after": "faculties", "start_char_pos": 1566, "end_char_pos": 1578}, {"type": "R", "before": ", providing an", "after": ". Together, this work provides the first", "start_char_pos": 1752, "end_char_pos": 1766}, {"type": "A", "before": null, "after": "visual", "start_char_pos": 1806, "end_char_pos": 1806}], "sents_char_pos": [0, 62, 136, 383, 483, 578, 697, 850, 1145, 1338, 1466, 1671]}
+{"doc_id": "1903.05898", "revision_depth": "1", "before_revision": "IoT Edge intelligence requires Convolutional Neural Network (CNN) inference to take place in the edge device itself. ARM big.LITTLE architecture is at the heart of common commercial edge devices. It comprises of single-ISA heterogeneous multi-cores grouped in homogeneous clusters that enables performance and power trade-offs. However, high communication overhead involved in parallelization of computation from a convolution kernel across clusters is detrimental to throughput. We present an alternative framework called Pipe-it that employs a pipelined design to split the convolutional layers across clusters while limiting the parallelization of their respective kernels to the assigned clusters . We develop a performance prediction model that , from convolutional layer descriptors , predicts the execution time of each layer individually on all different core types and number of cores . Pipe-it then exploits the predictions to create a balanced pipeline using an efficient design space exploration algorithm. Pipe-it on average results in 39\\% higher throughput than the highest antecedent throughput.", "after_revision": "IoT Edge intelligence requires Convolutional Neural Network (CNN) inference to take place in the edge devices itself. ARM big.LITTLE architecture is at the heart of prevalent commercial edge devices. It comprises of single-ISA heterogeneous cores grouped into multiple homogeneous clusters that enable power and performance trade-offs. All cores are expected to be simultaneously employed in inference to attain maximal throughput. However, high communication overhead involved in parallelization of computations from convolution kernels across clusters is detrimental to throughput. We present an alternative framework called Pipe-it that employs pipelined design to split convolutional layers across clusters while limiting parallelization of their respective kernels to the assigned cluster . We develop a performance-prediction model that utilizes only the convolutional layer descriptors to predict the execution time of each layer individually on all permitted core configurations (type and count) . Pipe-it then exploits the predictions to create a balanced pipeline using an efficient design space exploration algorithm. Pipe-it on average results in a 39\\% higher throughput than the highest antecedent throughput.", "edit_actions": [{"type": "R", "before": "device", "after": "devices", "start_char_pos": 102, "end_char_pos": 108}, {"type": "R", "before": "common", "after": "prevalent", "start_char_pos": 164, "end_char_pos": 170}, {"type": "R", "before": "multi-cores grouped in", "after": "cores grouped into multiple", "start_char_pos": 237, "end_char_pos": 259}, {"type": "R", "before": "enables performance and power", "after": "enable power and performance", "start_char_pos": 286, "end_char_pos": 315}, {"type": "A", "before": null, "after": "All cores are expected to be simultaneously employed in inference to attain maximal throughput.", "start_char_pos": 328, "end_char_pos": 328}, {"type": "R", "before": "computation from a convolution kernel", "after": "computations from convolution kernels", "start_char_pos": 397, "end_char_pos": 434}, {"type": "D", "before": "a", "after": null, "start_char_pos": 545, "end_char_pos": 546}, {"type": "D", "before": "the", "after": null, "start_char_pos": 573, "end_char_pos": 576}, {"type": "D", "before": "the", "after": null, "start_char_pos": 629, "end_char_pos": 632}, {"type": "R", "before": "clusters", "after": "cluster", "start_char_pos": 693, "end_char_pos": 701}, {"type": "R", "before": "performance prediction model that , from", "after": "performance-prediction model that utilizes only the", "start_char_pos": 717, "end_char_pos": 757}, {"type": "R", "before": ", predicts", "after": "to predict", "start_char_pos": 790, "end_char_pos": 800}, {"type": "R", "before": "different core types and number of cores", "after": "permitted core configurations (type and count)", "start_char_pos": 854, "end_char_pos": 894}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1050, "end_char_pos": 1050}], "sents_char_pos": [0, 116, 195, 327, 480, 703, 1019]}
+{"doc_id": "1903.06731", "revision_depth": "1", "before_revision": "The \\Lambda-Wright--Fisher process describes the type-frequency evolution of an infinite population. We model frequency-dependent selection pressure with a general polynomial drift vanishing at the boundary. An appropriate decomposition of the drift allows us to construct a series of Moran-type models that converge under suitable conditions to the solution of the associated stochastic differential equation . The genealogical structure inherent in the graphical representation of these finite population models can be seen in the large population limit as a generalisation of the ancestral selection graph of Krone and Neuhauser. We introduce an ancestral process that keeps track of the sampling distribution along the ancestral structures and that satisfies a duality relation with the type-frequency process. We refer to it as Bernstein coefficient process and to the relation as Bernstein duality. The latter is a generalisation of the classic moment duality. Many classic results in the restricted setting of a moment duality generalise into our framework. In particular, we derive criteria for the accessibility of the boundary and determine the time to absorption. It turns out that multiple ancestral processes are associated to the same forward dynamics. We characterise the set of optimal ancestral structures and provide a recipe to construct them from the drift. In particular, this allows us to recover well-known ancestral structures of the literature .", "after_revision": " \\Lambda-Wright--Fisher processes provide a robust framework to describe the type-frequency evolution of an infinite neutral population. We add a polynomial drift to the corresponding stochastic differential equation to incorporate frequency-dependent selection. A decomposition of the drift allows us to approximate the solution of the stochastic differential equation by a sequence of Moran models . The genealogical structure underlying the Moran model leads in the large population limit to a generalisation of the ancestral selection graph of Krone and Neuhauser. Building on this object, we construct a continuous-time Markov chain and relate it to the forward process via a new form of duality, which we call Bernstein duality. We adapt classical methods based on the moment duality to determine the time to absorption and criteria for the accessibility of the boundaries; this extends a recent result by Gonz\\'alez Casanova and Span\\`o. An intriguing feature of the construction is that the same forward process is compatible with multiple backward models. In this context we introduce suitable notions for minimality among the ancestral processes and characterise the corresponding parameter sets. In this way we recover classic ancestral structures as minimal ones .", "edit_actions": [{"type": "D", "before": "The", "after": null, "start_char_pos": 0, "end_char_pos": 3}, {"type": "R", "before": "process describes", "after": "processes provide a robust framework to describe", "start_char_pos": 27, "end_char_pos": 44}, {"type": "A", "before": null, "after": "neutral", "start_char_pos": 89, "end_char_pos": 89}, {"type": "R", "before": "model", "after": "add a polynomial drift to the corresponding stochastic differential equation to incorporate", "start_char_pos": 105, "end_char_pos": 110}, {"type": "R", "before": "selection pressure with a general polynomial drift vanishing at the boundary. An appropriate", "after": "selection. A", "start_char_pos": 131, "end_char_pos": 223}, {"type": "R", "before": "construct a series of Moran-type models that converge under suitable conditions to", "after": "approximate", "start_char_pos": 264, "end_char_pos": 346}, {"type": "D", "before": "associated", "after": null, "start_char_pos": 367, "end_char_pos": 377}, {"type": "A", "before": null, "after": "by a sequence of Moran models", "start_char_pos": 411, "end_char_pos": 411}, {"type": "R", "before": "inherent in the graphical representation of these finite population models can be seen", "after": "underlying the Moran model leads", "start_char_pos": 441, "end_char_pos": 527}, {"type": "R", "before": "as", "after": "to", "start_char_pos": 558, "end_char_pos": 560}, {"type": "R", "before": "We introduce an ancestral process that keeps track of the sampling distribution along the ancestral structures and that satisfies a duality relation with the type-frequency process. We refer to it as Bernstein coefficient process and to the relation as Bernstein duality. The latter is a generalisation of the classic moment duality. Many classic results in the restricted setting of a moment duality generalise into our framework. In particular, we derive", "after": "Building on this object, we construct a continuous-time Markov chain and relate it to the forward process via a new form of duality, which we call Bernstein duality. We adapt classical methods based on the moment duality to determine the time to absorption and", "start_char_pos": 635, "end_char_pos": 1091}, {"type": "R", "before": "boundary and determine the time to absorption. It turns out that multiple ancestral processes are associated to", "after": "boundaries; this extends a recent result by Gonz\\'alez Casanova and Span\\`o. An intriguing feature of the construction is that", "start_char_pos": 1130, "end_char_pos": 1241}, {"type": "R", "before": "dynamics. We characterise the set of optimal ancestral structures and provide a recipe to construct them from the drift. In particular, this allows us to recover well-known ancestral structures of the literature", "after": "process is compatible with multiple backward models. In this context we introduce suitable notions for minimality among the ancestral processes and characterise the corresponding parameter sets. In this way we recover classic ancestral structures as minimal ones", "start_char_pos": 1259, "end_char_pos": 1470}], "sents_char_pos": [0, 101, 208, 413, 634, 816, 906, 968, 1066, 1176, 1268, 1379]}
+{"doc_id": "1904.01008", "revision_depth": "1", "before_revision": "The paper [ sorensen16 } ] presents and discusses results for a Quantum Moves game, BringHomeWater, where players have attempted to move a quantum state from one position to another in a simulated optical tweezer and atoms setup. The paper compares the player solutions to numerical methods that the authors discuss. In particular, [ sorensen16 } ] show evidence that the so-called Krotov optimization method krotov performs worse than solutions that the human players have come up with. Given the assumption that the Krotov method has been correctly applied, the evidence points to the fact that human players can outperform the Krotov method. This is the find and claim of [ sorensen16 } ] and it features prominent in the abstract of the paper. It leads the authors to conclude that 'players succeed where purely numerical optimization fails, and analysis of their solutions provide insights into the problem of optimization of a more profound and general nature.' While it seems clear from the presented data that human players have indeed outperformed a particular implementation of the Krotov algorithm (and, according to [ sorensen16 } ], as a consequence also algorithms like CRAB CRAB and evolutionary approaches evolve which perform worse than Krotov), there is no reason to believe that this finding is of any particular significance. In fact, as has been discussed first by D. Sels [ DSels ], a very simple approach using classical arguments can capture the BringHomeWater Quantum Moves game far better than the player approach. Furthermore, as also shown by [ DSels ], one of the simplest optimization algorithms available, Stochastic Ascent, can outperform all of the above. Here we elaborate on the method discussed by [ DSels ] and verify the conclusions put forward by D. Sels", "after_revision": "The paper [ S \\o}rensen et al., Nature 532 ] presents and discusses results for a Quantum Moves game, BringHomeWater, where players have attempted to move a quantum state from one position to another in a simulated optical tweezer and atoms setup. The paper compares the player solutions to numerical methods that the authors discuss. In particular, [ S \\o}rensen et al., Nature 532 ] show evidence that the so-called Krotov optimization method performs worse than solutions that the human players have come up with. Given the assumption that the Krotov method has been correctly applied, the evidence points to the fact that human players can outperform the Krotov method. This is the find and claim of [ S \\o}rensen et al., Nature 532 ] and it features prominent in the abstract of the paper. It leads the authors to conclude that 'players succeed where purely numerical optimization fails, and analysis of their solutions provide insights into the problem of optimization of a more profound and general nature.' While it seems clear from the presented data that human players have indeed outperformed a particular implementation of the Krotov algorithm (and, according to [ S \\o}rensen et al., Nature 532 ], as a consequence also algorithms like CRAB and evolutionary approaches which perform worse than Krotov), there is no reason to believe that this finding is of any particular significance. In fact, as has been discussed first by D. Sels [ D. Sels, Phys. Rev. A 97, 040302 ], a very simple approach using classical arguments can capture the BringHomeWater Quantum Moves game far better than the player approach. Furthermore, as also shown by [ D. Sels, Phys. Rev. A 97, 040302 ], one of the simplest optimization algorithms available, Stochastic Ascent, can outperform all of the above. Here we elaborate on the method discussed by [ D. Sels, Phys. Rev. A 97, 040302 ] and verify the conclusions put forward by D. Sels", "edit_actions": [{"type": "R", "before": "sorensen16", "after": "S", "start_char_pos": 12, "end_char_pos": 22}, {"type": "A", "before": null, "after": "\\o", "start_char_pos": 23, "end_char_pos": 23}, {"type": "A", "before": null, "after": "rensen et al., Nature 532", "start_char_pos": 24, "end_char_pos": 24}, {"type": "R", "before": "sorensen16", "after": "S", "start_char_pos": 334, "end_char_pos": 344}, {"type": "A", "before": null, "after": "\\o", "start_char_pos": 345, "end_char_pos": 345}, {"type": "A", "before": null, "after": "rensen et al., Nature 532", "start_char_pos": 346, "end_char_pos": 346}, {"type": "D", "before": "krotov", "after": null, "start_char_pos": 409, "end_char_pos": 415}, {"type": "R", "before": "sorensen16", "after": "S", "start_char_pos": 677, "end_char_pos": 687}, {"type": "A", "before": null, "after": "\\o", "start_char_pos": 688, "end_char_pos": 688}, {"type": "A", "before": null, "after": "rensen et al., Nature 532", "start_char_pos": 689, "end_char_pos": 689}, {"type": "R", "before": "sorensen16", "after": "S", "start_char_pos": 1130, "end_char_pos": 1140}, {"type": "A", "before": null, "after": "\\o", "start_char_pos": 1141, "end_char_pos": 1141}, {"type": "A", "before": null, "after": "rensen et al., Nature 532", "start_char_pos": 1142, "end_char_pos": 1142}, {"type": "D", "before": "CRAB", "after": null, "start_char_pos": 1189, "end_char_pos": 1193}, {"type": "D", "before": "evolve", "after": null, "start_char_pos": 1222, "end_char_pos": 1228}, {"type": "R", "before": "DSels", "after": "D. Sels, Phys. Rev. A 97, 040302", "start_char_pos": 1396, "end_char_pos": 1401}, {"type": "R", "before": "DSels", "after": "D. Sels, Phys. Rev. A 97, 040302", "start_char_pos": 1573, "end_char_pos": 1578}, {"type": "R", "before": "DSels", "after": "D. Sels, Phys. Rev. A 97, 040302", "start_char_pos": 1736, "end_char_pos": 1741}], "sents_char_pos": [0, 229, 316, 487, 644, 747, 967, 1345, 1540, 1688]}
+{"doc_id": "1904.05581", "revision_depth": "1", "before_revision": "The adaptive immune system can detect, respond to, and learn diverse pathogens from the past experience. While the clonal selection of the T helper (Th) cells is the simple and established mechanism for learning a better recognition of new pathogens, the question still remains unexplored is how the Th cells can learn to eliminate them by activating or deactivating appropriate immune cells after recognition . In this work, we address this problem by associating the adaptive immune URLanized by the Th cells with reinforcement learning (RL). By employing recent advancements of the deep RL, we show that the Th immune network can acquire the association of antigen patterns of pathogens and the effective responses to them . Moreover, the clonal selection as well as other inter-lymphocyte interactions are derived as a learning rule of the network. We also demonstrate that the stationary clone distribution after the learning shares characteristic features with those observed experimentally. Our theoretical framework can contribute to revising and renewing our understanding of adaptive immunity as a learning system.", "after_revision": "The adaptive immune system of vertebrates can detect, respond to, and memorize diverse pathogens from past experience. While the clonal selection of T helper (Th) cells is the simple and established mechanism to better recognize new pathogens, the question that still remains unexplored is how the Th cells can acquire better ways to bias the responses of immune cells for eliminating pathogens more efficiently by translating the recognized antigen information into regulatory signals . In this work, we address this problem by associating the adaptive immune URLanized by the Th cells with reinforcement learning (RL). By employing recent advancements of network-based RL, we show that the Th immune network can acquire the association between antigen patterns of and the effective responses to pathogens . Moreover, the clonal selection as well as other inter-cellular interactions are derived as a learning rule of the network. We also demonstrate that the stationary clone-size distribution after learning shares characteristic features with those observed experimentally. Our theoretical framework may contribute to revising and renewing our understanding of adaptive immunity as a learning system.", "edit_actions": [{"type": "A", "before": null, "after": "of vertebrates", "start_char_pos": 27, "end_char_pos": 27}, {"type": "R", "before": "learn", "after": "memorize", "start_char_pos": 56, "end_char_pos": 61}, {"type": "D", "before": "the", "after": null, "start_char_pos": 85, "end_char_pos": 88}, {"type": "D", "before": "the", "after": null, "start_char_pos": 136, "end_char_pos": 139}, {"type": "R", "before": "for learning a better recognition of", "after": "to better recognize", "start_char_pos": 200, "end_char_pos": 236}, {"type": "A", "before": null, "after": "that", "start_char_pos": 265, "end_char_pos": 265}, {"type": "R", "before": "learn to eliminate them by activating or deactivating appropriate immune cells after recognition", "after": "acquire better ways to bias the responses of immune cells for eliminating pathogens more efficiently by translating the recognized antigen information into regulatory signals", "start_char_pos": 315, "end_char_pos": 411}, {"type": "R", "before": "the deep", "after": "network-based", "start_char_pos": 583, "end_char_pos": 591}, {"type": "R", "before": "of", "after": "between", "start_char_pos": 659, "end_char_pos": 661}, {"type": "D", "before": "pathogens", "after": null, "start_char_pos": 682, "end_char_pos": 691}, {"type": "R", "before": "them", "after": "pathogens", "start_char_pos": 723, "end_char_pos": 727}, {"type": "R", "before": "inter-lymphocyte", "after": "inter-cellular", "start_char_pos": 778, "end_char_pos": 794}, {"type": "R", "before": "clone distribution after the", "after": "clone-size distribution after", "start_char_pos": 895, "end_char_pos": 923}, {"type": "R", "before": "can", "after": "may", "start_char_pos": 1026, "end_char_pos": 1029}], "sents_char_pos": [0, 105, 413, 546, 729, 854, 999]}
+{"doc_id": "1904.08505", "revision_depth": "1", "before_revision": "With the advance of technologies, machines are increasingly present in people's daily lives. Thus, there has been more and more effort for developing interfaces, such as dynamic gestures, that provide an intuitive way of interaction. Currently, the most common trend is to use multimodal data, as depth and skeleton information, to try to recognize dynamic gestures . However, the use of only color information would be more interesting, once RGB cameras are usually found in almost every public place, and could be used for gesture recognition without the need to install other equipment. The main problem with this approach is the difficulty of representing spatio-temporal information using just color. With this in mind, we propose a technique that we called Star RGB, capable of describing a videoclip containing a dynamic gestureas an RGB image. This image is then passed to a classifier formed by two Resnet CNN's , a soft-attention ensemble, and a multilayer perceptron, which returns the predicted class label that indicates to which type of gesture the input video belongs . Experiments were carried out using the Montalbano and GRIT datasets. On the Montalbano dataset, the proposed approach achieved an accuracy of 94.58\\% , this result reaches the state-of-the-art using this dataset , considering only color information. On the GRIT dataset, our proposal achieves more than 98\\% of accuracy, recall, precision, and F1-score, outperforming the reference approach in more than 6\\%.", "after_revision": "Due to the advance of technologies, machines are increasingly present in people's daily lives. Thus, there has been more and more effort to develop interfaces, such as dynamic gestures, that provide an intuitive way of interaction. Currently, the most common trend is to use multimodal data, as depth and skeleton information, to enable dynamic gesture recognition . However, using only color information would be more interesting, since RGB cameras are usually available in almost every public place, and could be used for gesture recognition without the need of installing other equipment. The main problem with such approach is the difficulty of representing spatio-temporal information using just color. With this in mind, we propose a technique capable of condensing a dynamic gesture, shown in a video, in just one RGB image. We call this technique star RGB. This image is then passed to a classifier formed by two Resnet CNNs , a soft-attention ensemble, and a fully connected layer, which indicates the class of the gesture present in the input video . Experiments were carried out using both Montalbano and GRIT datasets. For Montalbano dataset, the proposed approach achieved an accuracy of 94.58\\% . Such result reaches the state-of-the-art when considering this dataset and only color information. Regarding the GRIT dataset, our proposal achieves more than 98\\% of accuracy, recall, precision, and F1-score, outperforming the reference approach by more than 6\\%.", "edit_actions": [{"type": "R", "before": "With", "after": "Due to", "start_char_pos": 0, "end_char_pos": 4}, {"type": "R", "before": "for developing", "after": "to develop", "start_char_pos": 135, "end_char_pos": 149}, {"type": "R", "before": "try to recognize dynamic gestures", "after": "enable dynamic gesture recognition", "start_char_pos": 332, "end_char_pos": 365}, {"type": "R", "before": "the use of", "after": "using", "start_char_pos": 377, "end_char_pos": 387}, {"type": "R", "before": "once", "after": "since", "start_char_pos": 438, "end_char_pos": 442}, {"type": "R", "before": "found", "after": "available", "start_char_pos": 467, "end_char_pos": 472}, {"type": "R", "before": "to install", "after": "of installing", "start_char_pos": 562, "end_char_pos": 572}, {"type": "R", "before": "this", "after": "such", "start_char_pos": 612, "end_char_pos": 616}, {"type": "R", "before": "that we called Star RGB, capable of describing a videoclip containing a dynamic gestureas an", "after": "capable of condensing a dynamic gesture, shown in a video, in just one", "start_char_pos": 748, "end_char_pos": 840}, {"type": "A", "before": null, "after": "We call this technique star RGB.", "start_char_pos": 852, "end_char_pos": 852}, {"type": "R", "before": "CNN's", "after": "CNNs", "start_char_pos": 916, "end_char_pos": 921}, {"type": "R", "before": "multilayer perceptron, which returns the predicted class label that indicates to which type of gesture", "after": "fully connected layer, which indicates the class of the gesture present in", "start_char_pos": 957, "end_char_pos": 1059}, {"type": "D", "before": "belongs", "after": null, "start_char_pos": 1076, "end_char_pos": 1083}, {"type": "R", "before": "the", "after": "both", "start_char_pos": 1121, "end_char_pos": 1124}, {"type": "R", "before": "On the", "after": "For", "start_char_pos": 1155, "end_char_pos": 1161}, {"type": "R", "before": ", this", "after": ". Such", "start_char_pos": 1236, "end_char_pos": 1242}, {"type": "R", "before": "using this dataset , considering", "after": "when considering this dataset and", "start_char_pos": 1279, "end_char_pos": 1311}, {"type": "R", "before": "On", "after": "Regarding", "start_char_pos": 1336, "end_char_pos": 1338}, {"type": "R", "before": "in", "after": "by", "start_char_pos": 1477, "end_char_pos": 1479}], "sents_char_pos": [0, 92, 233, 367, 589, 705, 851, 1154, 1335]}
+{"doc_id": "1904.09406", "revision_depth": "1", "before_revision": "We introduce DeepMoD, a deep learning based model discovery algorithmwhich seeks the partial differential equation underlying a spatio-temporal data set . DeepMoD employs sparse regression on a library of basis functions and their corresponding spatial derivatives. A feed-forward neural network approximates the data set and automatic differentiation is used to construct this function libraryand perform regression within the neural network . This construction makes it extremely robust to noise and applicable to small data sets and, contrary to other deep learning methods, does not require a training set and is impervious to overfitting. We illustrate this approach on several physical problems , such as the Burgers', Korteweg-de Vries , advection-diffusion and Keller-Segel equations, and find that it requires as few as O (10^2) samples and works at noise levels up to 75 \\%. This resilience to noise and high performance at very few samples highlights the potential of this method to be applied on experimental data. Code and examples available at URL%DIFDELCMD < \\end{abstract} %DIFDELCMD < %%% \\\\%DIF > . Motivated by these results, we apply DeepMoD directly on noisy experimental time-series data from a gel electrophoresis experiment and find that it discovers the advection-diffusion equation describing this system.", "after_revision": "We introduce DeepMoD, a Deep learning based Model Discovery algorithm. DeepMoD discovers the partial differential equation underlying a spatio-temporal data set using sparse regression on a library of possible functions and their derivatives. A neural network approximates the data and constructs the function library, but it also performs the sparse regression . This construction makes it extremely robust to noise , applicable to small data sets , and, contrary to other deep learning methods, does not require a training set . We benchmark our approach on several physical problems such as the Burgers', Korteweg-de Vries and Keller-Segel equations, and find that it requires as few as \\mathcal{O (10^2) samples and works at noise levels up to 75 %DIFDELCMD < \\end{abstract} %DIFDELCMD < %%% \\\\%DIF > . Motivated by these results, we apply DeepMoD directly on noisy experimental time-series data from a gel electrophoresis experiment and find that it discovers the advection-diffusion equation describing this system.", "edit_actions": [{"type": "R", "before": "deep learning based model discovery algorithmwhich seeks", "after": "Deep learning based Model Discovery algorithm. DeepMoD discovers", "start_char_pos": 24, "end_char_pos": 80}, {"type": "R", "before": ". DeepMoD employs", "after": "using", "start_char_pos": 153, "end_char_pos": 170}, {"type": "R", "before": "basis", "after": "possible", "start_char_pos": 205, "end_char_pos": 210}, {"type": "D", "before": "corresponding spatial", "after": null, "start_char_pos": 231, "end_char_pos": 252}, {"type": "D", "before": "feed-forward", "after": null, "start_char_pos": 268, "end_char_pos": 280}, {"type": "R", "before": "set and automatic differentiation is used to construct this function libraryand perform regression within the neural network", "after": "and constructs the function library, but it also performs the sparse regression", "start_char_pos": 318, "end_char_pos": 442}, {"type": "R", "before": "and", "after": ",", "start_char_pos": 498, "end_char_pos": 501}, {"type": "A", "before": null, "after": ",", "start_char_pos": 532, "end_char_pos": 532}, {"type": "R", "before": "and is impervious to overfitting. We illustrate this", "after": ". We benchmark our", "start_char_pos": 611, "end_char_pos": 663}, {"type": "D", "before": ",", "after": null, "start_char_pos": 702, "end_char_pos": 703}, {"type": "D", "before": ", advection-diffusion", "after": null, "start_char_pos": 744, "end_char_pos": 765}, {"type": "R", "before": "O", "after": "\\mathcal{O", "start_char_pos": 830, "end_char_pos": 831}, {"type": "D", "before": "\\%. This resilience to noise and high performance at very few samples highlights the potential of this method to be applied on experimental data. Code and examples available at URL", "after": null, "start_char_pos": 882, "end_char_pos": 1062}], "sents_char_pos": [0, 265, 444, 644, 885, 1027]}
+{"doc_id": "1904.11156", "revision_depth": "1", "before_revision": "The goal of this paper is to provide some statistical tools for nonparametric estimation and inference in psychological and economic experiments. We consider a framework in which a quantity of interest depends on some primitives through an unknown function f. An estimator of this unknown function can be obtained from a controlled experiment in which n subjects are gathered, and a vector of stimuli is administered to each subject who provides a set of T responses . We propose to estimate f nonparametrically using the method of sieves. We provide conditions for consistency of this estimator when either n or T or both divergeto infinity, and when the answers of each subject are correlated and this correlation differs across subjects. We further demonstrate that the rate of convergence depends upon the covariance structure of the error term taken across individuals. A convergence rate is also obtained for derivatives. These results allow us to derive the optimal divergence rate of the dimension of the sieve basis with both n and T and thus provide guidance about the optimal balance between the number of subjects and the number of questions in a laboratory experiment . We argue that in general a large value of n is better than a large value of T. Conditions for asymptotic normality of linear and nonlinear functionals of the estimated function of interest are derived. These results are further applied to obtain the asymptotic distribution of the Wald test when the number of constraints under the null is finite and when it diverges to infinity along with other asymptotic parameters. Lastly, we investigate the properties of the previous test when the conditional covariance matrix is replaced by a consistent estimator.", "after_revision": "The goal of this paper is to provide some tools for nonparametric estimation and inference in psychological and economic experiments. We consider an experimental framework in which each of nsubjects provides T responses to a vector of T stimuli . We propose to estimate the unknown function f linking stimuli to responses through a nonparametric sieve estimator. We give conditions for consistency when either nor Tor both diverge. The rate of convergence depends upon the error covariance structure, that is allowed to differ across subjects. With these results we derive the optimal divergence rate of the dimension of the sieve basis with both n and T . We provide guidance about the optimal balance between the number of subjects and questions in a laboratory experiment and argue that a large nis often better than a large T. We derive conditions for asymptotic normality of functionals of the estimator of Tand apply them to obtain the asymptotic distribution of the Wald test when the number of constraints under the null is finite and when it diverges along with other asymptotic parameters. Lastly, we investigate the previous properties when the conditional covariance matrix is replaced by an estimator.", "edit_actions": [{"type": "D", "before": "statistical", "after": null, "start_char_pos": 42, "end_char_pos": 53}, {"type": "R", "before": "a", "after": "an experimental", "start_char_pos": 158, "end_char_pos": 159}, {"type": "R", "before": "a quantity of interest depends on some primitives through an unknown function f. An estimator of this unknown function can be obtained from a controlled experiment in which n subjects are gathered, and a vector of stimuli is administered to each subject who provides a set of T responses", "after": "each of nsubjects provides T responses to a vector of T stimuli", "start_char_pos": 179, "end_char_pos": 466}, {"type": "R", "before": "f nonparametrically using the method of sieves. We provide", "after": "the unknown function f linking stimuli to responses through a nonparametric sieve estimator. We give", "start_char_pos": 492, "end_char_pos": 550}, {"type": "R", "before": "of this estimator when either n or T or both divergeto infinity, and when the answers of each subject are correlated and this correlation differs across subjects. We further demonstrate that the", "after": "when either nor Tor both diverge. The", "start_char_pos": 578, "end_char_pos": 772}, {"type": "R", "before": "covariance structure of the error term taken across individuals. A convergence rate is also obtained for derivatives. These results allow us to", "after": "error covariance structure, that is allowed to differ across subjects. With these results we", "start_char_pos": 810, "end_char_pos": 953}, {"type": "R", "before": "and thus", "after": ". We", "start_char_pos": 1043, "end_char_pos": 1051}, {"type": "D", "before": "the number of", "after": null, "start_char_pos": 1130, "end_char_pos": 1143}, {"type": "R", "before": ". We argue that in general a large value of n is", "after": "and argue that a large nis often", "start_char_pos": 1181, "end_char_pos": 1229}, {"type": "R", "before": "value of T. Conditions", "after": "T. We derive conditions", "start_char_pos": 1250, "end_char_pos": 1272}, {"type": "D", "before": "linear and nonlinear", "after": null, "start_char_pos": 1301, "end_char_pos": 1321}, {"type": "R", "before": "estimated function of interest are derived. These results are further applied", "after": "estimator of Tand apply them", "start_char_pos": 1341, "end_char_pos": 1418}, {"type": "D", "before": "to infinity", "after": null, "start_char_pos": 1551, "end_char_pos": 1562}, {"type": "R", "before": "properties of the previous test", "after": "previous properties", "start_char_pos": 1630, "end_char_pos": 1661}, {"type": "R", "before": "a consistent", "after": "an", "start_char_pos": 1716, "end_char_pos": 1728}], "sents_char_pos": [0, 145, 259, 468, 539, 740, 874, 927, 1182, 1384, 1602]}
+{"doc_id": "1904.12420", "revision_depth": "1", "before_revision": "During muscle contraction, myosin motors anchored on thick filaments bind to and slide actin thin filaments. These motors rely on ATP, supplied at the limits of diffusion from the sarcoplasm to the interior of the lattice of actin and myosin . Classic sliding filament theory suggests that lattice spacing is constant . If so, then the lattice changes volume during contraction and could provide fluid motion and hence assist in transport of molecules between the contractile lattice and surrounding intracellular space. If, however, the lattice is isovolumetric, it must expand when muscle shortens. Doing so would alter the binding dynamics of myosin which are sensitive to spacing. We first create a convective-diffusive flow model and show that flow into and out of the sarcomere lattice would be significant in the absence of lattice expansion. Convective transport coupled to diffusion has the potential to substantially enhance metabolite exchange within the crowded sarcomere. Using time resolved x-ray diffraction of contracting muscle we next show that the contractile lattice is neither isovolumetric , nor constant in spacing. Instead lattice spacing is time-varying, depends on activation, and can manifest a negative (auxetic) Poisson ratio. This unusual material behavior arises from the multiscale interaction of muscle axial strain, lattice spacing and myosin binding. The resulting fluid flow in the sarcomere lattice is even greater than would be expected from constant lattice spacing conditions. Akin to ``breathing,'' convective-diffusive transport in sarcomeres is sufficient to promote metabolite exchange , and may play a role in the regulation of contraction itself.", "after_revision": "During muscle contraction, myosin motors anchored to thick filaments bind to and slide actin thin filaments. These motors rely on energy derived from ATP, supplied , in part, by diffusion from the sarcoplasm to the interior of the lattice of actin and myosin filaments. The radial spacing of filaments in this lattice may change or remain constant during during contraction. If the lattice is isovolumetric, it must expand when the muscle shortens. If, however, the spacing is constant or has a different pattern of axial and radial motion, then the lattice changes volume during contraction , driving fluid motion and assisting in the transport of molecules between the contractile lattice and the surrounding intracellular space. We first create an advective-diffusive-reaction flow model and show that the flow into and out of the sarcomere lattice would be significant in the absence of lattice expansion. Advective transport coupled to diffusion has the potential to substantially enhance metabolite exchange within the crowded sarcomere. Using time-resolved x-ray diffraction of contracting muscle , we next show that the contractile lattice is neither isovolumetric nor constant in spacing. Instead , lattice spacing is time-varying, depends on activation, and can manifest as an effective time-varying Poisson ratio. The resulting fluid flow in the sarcomere lattice of synchronous insect flight muscles is even greater than expected from constant lattice spacing conditions. Volume change and advective solute transport varies with the phase of muscle stimulation during periodic contraction but remains significant at all conditions. Nonetheless, advective transport varies will occur in all cases where the sarcomere is not isovolumetric. Akin to \"breathing,\" advective-diffusive transport in sarcomeres is sufficient to promote metabolite exchange and may play a role in the regulation of contraction itself.", "edit_actions": [{"type": "R", "before": "on", "after": "to", "start_char_pos": 50, "end_char_pos": 52}, {"type": "A", "before": null, "after": "energy derived from", "start_char_pos": 130, "end_char_pos": 130}, {"type": "R", "before": "at the limits of", "after": ", in part, by", "start_char_pos": 145, "end_char_pos": 161}, {"type": "R", "before": ". Classic sliding filament theory suggests that lattice spacing is constant . If so,", "after": "filaments. The radial spacing of filaments in this lattice may change or remain constant during during contraction. If the lattice is isovolumetric, it must expand when the muscle shortens. If, however, the spacing is constant or has a different pattern of axial and radial motion,", "start_char_pos": 243, "end_char_pos": 327}, {"type": "R", "before": "and could provide", "after": ", driving", "start_char_pos": 379, "end_char_pos": 396}, {"type": "R", "before": "hence assist in", "after": "assisting in the", "start_char_pos": 414, "end_char_pos": 429}, {"type": "A", "before": null, "after": "the", "start_char_pos": 489, "end_char_pos": 489}, {"type": "D", "before": "If, however, the lattice is isovolumetric, it must expand when muscle shortens. Doing so would alter the binding dynamics of myosin which are sensitive to spacing.", "after": null, "start_char_pos": 523, "end_char_pos": 686}, {"type": "R", "before": "a convective-diffusive", "after": "an advective-diffusive-reaction", "start_char_pos": 703, "end_char_pos": 725}, {"type": "A", "before": null, "after": "the", "start_char_pos": 751, "end_char_pos": 751}, {"type": "R", "before": "Convective", "after": "Advective", "start_char_pos": 853, "end_char_pos": 863}, {"type": "R", "before": "time resolved", "after": "time-resolved", "start_char_pos": 994, "end_char_pos": 1007}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1048, "end_char_pos": 1048}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1116, "end_char_pos": 1117}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1151, "end_char_pos": 1151}, {"type": "R", "before": "a negative (auxetic)", "after": "as an effective time-varying", "start_char_pos": 1225, "end_char_pos": 1245}, {"type": "D", "before": "This unusual material behavior arises from the multiscale interaction of muscle axial strain, lattice spacing and myosin binding.", "after": null, "start_char_pos": 1261, "end_char_pos": 1390}, {"type": "A", "before": null, "after": "of synchronous insect flight muscles", "start_char_pos": 1441, "end_char_pos": 1441}, {"type": "D", "before": "would be", "after": null, "start_char_pos": 1463, "end_char_pos": 1471}, {"type": "R", "before": "Akin to ``breathing,'' convective-diffusive", "after": "Volume change and advective solute transport varies with the phase of muscle stimulation during periodic contraction but remains significant at all conditions. Nonetheless, advective transport varies will occur in all cases where the sarcomere is not isovolumetric. Akin to \"breathing,\" advective-diffusive", "start_char_pos": 1523, "end_char_pos": 1566}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1636, "end_char_pos": 1637}], "sents_char_pos": [0, 108, 320, 522, 602, 686, 852, 987, 1142, 1260, 1390, 1522]}
+{"doc_id": "1904.13086", "revision_depth": "2", "before_revision": "AI and advanced automation are involved in almost all aspects of our life. In the interaction with such systems, human causal responsibility for the outcomes becomes equivocal. We analyze the descriptive abilities of a newly developed responsibility quantification model (ResQu) to predict actual human responsibility and perceptions of responsibility in the interaction with intelligent systems. In two laboratory experiments, participants performed a classification task , and were aided by binary automated classification systems with different capabilities. We compared the theoretical responsibility values , predicted by the ResQu model, to the actual measured responsibility participants took on and to their subjective ranking of responsibility. The ResQu model predictions were strongly correlated with both measured and subjective responsibility. The model generally provided quite accurate predictions of the actual values of the measured responsibility. A bias existed only when participants ' classification capabilities were much worse than those of the automated classification system. In this case, the participants overestimated their own capabilities, relied less-than-optimally on the automated system and assumed greater-than-optimal responsibility. The results demonstrate the value of the ResQu model as a descriptive model, considering some systematic deviations. It is possible to compute a ResQu model score to predict behavior or perceptions of responsibility , taking into account the characteristics of the human, the intelligent system and the environment . The ResQu model provides a new quantitative method that may aid system design and guide policy and legal decisions , regarding human responsibility in events involving intelligent systems.", "after_revision": "When humans interact with intelligent systems, their causal responsibility for outcomes becomes equivocal. We analyze the descriptive abilities of a newly developed responsibility quantification model (ResQu) to predict actual human responsibility and perceptions of responsibility in the interaction with intelligent systems. In two laboratory experiments, participants performed a classification task . They were aided by classification systems with different capabilities. We compared the predicted theoretical responsibility values to the actual measured responsibility participants took on and to their subjective rankings of responsibility. The model predictions were strongly correlated with both measured and subjective responsibility. A bias existed only when participants with poor classification capabilities relied less-than-optimally on a system that had superior classification capabilities and assumed higher-than-optimal responsibility. The study implies that when humans interact with advanced intelligent systems, with capabilities that greatly exceed their own, their comparative causal responsibility will be small, even if formally the human is assigned major roles. Simply putting a human into the loop does not assure that the human will meaningfully contribute to the outcomes. The results demonstrate the descriptive value of the ResQu model to predict behavior and perceptions of responsibility by considering the characteristics of the human, the intelligent system , the environment and some systematic behavioral biases . The ResQu model is a new quantitative method that can be used in system design and can guide policy and legal decisions regarding human responsibility in events involving intelligent systems.", "edit_actions": [{"type": "R", "before": "AI and advanced automation are involved in almost all aspects of our life. In the interaction with such systems, human", "after": "When humans interact with intelligent systems, their", "start_char_pos": 0, "end_char_pos": 118}, {"type": "D", "before": "the", "after": null, "start_char_pos": 145, "end_char_pos": 148}, {"type": "R", "before": ", and", "after": ". They", "start_char_pos": 473, "end_char_pos": 478}, {"type": "D", "before": "binary automated", "after": null, "start_char_pos": 493, "end_char_pos": 509}, {"type": "A", "before": null, "after": "predicted", "start_char_pos": 578, "end_char_pos": 578}, {"type": "D", "before": ", predicted by the ResQu model,", "after": null, "start_char_pos": 613, "end_char_pos": 644}, {"type": "R", "before": "ranking", "after": "rankings", "start_char_pos": 728, "end_char_pos": 735}, {"type": "D", "before": "ResQu", "after": null, "start_char_pos": 759, "end_char_pos": 764}, {"type": "D", "before": "The model generally provided quite accurate predictions of the actual values of the measured responsibility.", "after": null, "start_char_pos": 858, "end_char_pos": 966}, {"type": "R", "before": "' classification capabilities were much worse than those of the automated classification system. In this case, the participants overestimated their own capabilities,", "after": "with poor classification capabilities", "start_char_pos": 1005, "end_char_pos": 1170}, {"type": "R", "before": "the automated system and assumed greater-than-optimal", "after": "a system that had superior classification capabilities and assumed higher-than-optimal", "start_char_pos": 1201, "end_char_pos": 1254}, {"type": "A", "before": null, "after": "study implies that when humans interact with advanced intelligent systems, with capabilities that greatly exceed their own, their comparative causal responsibility will be small, even if formally the human is assigned major roles. Simply putting a human into the loop does not assure that the human will meaningfully contribute to the outcomes. The", "start_char_pos": 1275, "end_char_pos": 1275}, {"type": "A", "before": null, "after": "descriptive", "start_char_pos": 1300, "end_char_pos": 1300}, {"type": "R", "before": "as a descriptive model, considering some systematic deviations. It is possible to compute a ResQu model score to predict behavior or", "after": "to predict behavior and", "start_char_pos": 1326, "end_char_pos": 1458}, {"type": "R", "before": ", taking into account", "after": "by considering", "start_char_pos": 1489, "end_char_pos": 1510}, {"type": "R", "before": "and the environment", "after": ", the environment and some systematic behavioral biases", "start_char_pos": 1568, "end_char_pos": 1587}, {"type": "R", "before": "provides", "after": "is", "start_char_pos": 1606, "end_char_pos": 1614}, {"type": "R", "before": "may aid", "after": "can be used in", "start_char_pos": 1646, "end_char_pos": 1653}, {"type": "A", "before": null, "after": "can", "start_char_pos": 1672, "end_char_pos": 1672}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1706, "end_char_pos": 1707}], "sents_char_pos": [0, 74, 176, 396, 561, 754, 857, 966, 1101, 1270, 1389, 1589]}
+{"doc_id": "1905.03229", "revision_depth": "2", "before_revision": "With the improvement of pattern recognition and feature extraction of Deep Neural Networks ( DNNs), more and more problems are attempted to solve from the view of images . Recently, a Reconstructive Neural Network (ReConNN) was proposed to obtain an image-based model from an analysis-based model , which can help us to solve many high frequency problems with difficult sampling, e.g. sonic wave and collision. However, due to the slight difference between simulated images, the low-accuracy of the Convolutional Neural Network ( CNN)and poor-diversity of the Generative Adversarial Network (GAN) make the reconstruction process low-accuracy, poor-efficiency, expensive-computation and high-manpower. In this study, an improved ReConNN model is proposed to address the mentioned weaknesses. Through experiments, comparisons and analyses, the improved one is demonstrated to outperform in accuracy, efficiency and cost .", "after_revision": "With the improvement of the pattern recognition and feature extraction of Deep Neural Networks ( DPNNs), image-based design and optimization have been widely used in multidisciplinary researches . Recently, a Reconstructive Neural Network (ReConNN) has been proposed to obtain an image-based model from an analysis-based model 1, 2 , and a steady-state heat transfer of a heat sink has been successfully reconstructed. Commonly, this method is suitable to handle stable-state problems. However, it has difficulties handling nonlinear transient impact problems, due to the bottlenecks of the Deep Neural Network ( DPNN). For example, nonlinear transient problems make it difficult for the Generative Adversarial Network (GAN) to generate various reasonable images. Therefore, in this study, an improved ReConNN method is proposed to address the mentioned weaknesses. Time-dependent ordered images can be generated. Furthermore, the improved method is successfully applied in impact simulation case and engineering experiment. Through the experiments, comparisons and analyses, the improved method is demonstrated to outperform the former one in terms of its accuracy, efficiency and costs .", "edit_actions": [{"type": "A", "before": null, "after": "the", "start_char_pos": 24, "end_char_pos": 24}, {"type": "R", "before": "DNNs), more and more problems are attempted to solve from the view of images", "after": "DPNNs), image-based design and optimization have been widely used in multidisciplinary researches", "start_char_pos": 94, "end_char_pos": 170}, {"type": "R", "before": "was", "after": "has been", "start_char_pos": 225, "end_char_pos": 228}, {"type": "R", "before": ", which can help us to solve many high frequency problems with difficult sampling, e.g. sonic wave and collision. However,", "after": "1, 2", "start_char_pos": 298, "end_char_pos": 420}, {"type": "A", "before": null, "after": ", and a steady-state heat transfer of a heat sink has been successfully reconstructed. Commonly, this method is suitable to handle stable-state problems. However, it has difficulties handling nonlinear transient impact problems,", "start_char_pos": 421, "end_char_pos": 421}, {"type": "R", "before": "slight difference between simulated images, the low-accuracy of the Convolutional", "after": "bottlenecks of the Deep", "start_char_pos": 433, "end_char_pos": 514}, {"type": "R", "before": "CNN)and poor-diversity of", "after": "DPNN). For example, nonlinear transient problems make it difficult for", "start_char_pos": 532, "end_char_pos": 557}, {"type": "R", "before": "make the reconstruction process low-accuracy, poor-efficiency, expensive-computation and high-manpower. In", "after": "to generate various reasonable images. Therefore, in", "start_char_pos": 599, "end_char_pos": 705}, {"type": "R", "before": "model", "after": "method", "start_char_pos": 738, "end_char_pos": 743}, {"type": "R", "before": "Through", "after": "Time-dependent ordered images can be generated. Furthermore, the improved method is successfully applied in impact simulation case and engineering experiment. Through the", "start_char_pos": 793, "end_char_pos": 800}, {"type": "R", "before": "one", "after": "method", "start_char_pos": 853, "end_char_pos": 856}, {"type": "R", "before": "in", "after": "the former one in terms of its", "start_char_pos": 887, "end_char_pos": 889}, {"type": "R", "before": "cost", "after": "costs", "start_char_pos": 915, "end_char_pos": 919}], "sents_char_pos": [0, 411, 702, 792]}
+{"doc_id": "1905.09647", "revision_depth": "1", "before_revision": "In the past decade, Bitcoin has become an emerging asset class well known to most people because of their extraordinary return potential in phases of extreme price growth and their unpredictable massive crashes. We apply the LPPLS confidence indicator as a diagnostic tool for identifying bubbles using the daily data of Bitcoin price in the past two years. We find that the LPPLS confidence indicator based on the daily data of Bitcoin price fails to provide effective warnings for detecting the bubbles when the Bitcoin price suffers from a large fluctuation in a short time, especially for positive bubbles. In order to diagnose the existence of bubbles and accurately predict the bubble crashes in the cryptocurrency market, this study proposes an adaptive multilevel time series detection methodology based on the LPPLS model . We adopt two levels of time series, 1 hour and 30 minutes, to demonstrate the adaptive multilevel time series detection methodology. The results show that the LPPLS confidence indicator based on the adaptive multilevel time series detection methodology have not only an outstanding performance to effectively detect the bubbles and accurately forecast the bubble crashes, but can also monitor the development and the crash of bubbles even if a bubble exists in a short time. In addition, we discover that the short-term LPPLS confidence indicator greatly affected by the extreme fluctuations of Bitcoin price can provide some useful insights into the bubble status on a shorter time scale , and the long-term LPPLS confidence indicator has a stable performance in terms of effectively monitoring the bubble status on a longer time scale . The adaptive multilevel time series detection methodology can provide real-time detection of bubbles and advanced forecast to warn of an imminent crash riskin not only the cryptocurrency market but also the other financial markets .", "after_revision": "In the past decade, Bitcoin as an emerging asset class has gained widespread public attention because of their extraordinary returns in phases of extreme price growth and their unpredictable massive crashes. We apply the log-periodic power law singularity (LPPLS) confidence indicator as a diagnostic tool for identifying bubbles using the daily data on Bitcoin price in the past two years. We find that the LPPLS confidence indicator based on the daily Bitcoin price data fails to provide effective warnings for detecting the bubbles when the Bitcoin price suffers from a large fluctuation in a short time, especially for positive bubbles. In order to diagnose the existence of bubbles and accurately predict the bubble crashes in the cryptocurrency market, this study proposes an adaptive multilevel time series detection methodology based on the LPPLS model and finer (than daily) timescale for the Bitcoin price data . We adopt two levels of time series, 1 hour and 30 minutes, to demonstrate the adaptive multilevel time series detection methodology. The results show that the LPPLS confidence indicator based on this new method is an outstanding instrument to effectively detect the bubbles and accurately forecast the bubble crashes, even if a bubble exists in a short time. In addition, we discover that the short-term LPPLS confidence indicator highly sensitive to the extreme fluctuations of Bitcoin price can provide some useful insights into the bubble status on a shorter time scale - on a day to week scale , and the long-term LPPLS confidence indicator has a stable performance in terms of effectively monitoring the bubble status on a longer time scale - on a week to month scale . The adaptive multilevel time series detection methodology can provide real-time detection of bubbles and advanced forecast of crashes to warn of the imminent risk .", "edit_actions": [{"type": "R", "before": "has become", "after": "as", "start_char_pos": 28, "end_char_pos": 38}, {"type": "R", "before": "well known to most people", "after": "has gained widespread public attention", "start_char_pos": 63, "end_char_pos": 88}, {"type": "R", "before": "return potential", "after": "returns", "start_char_pos": 120, "end_char_pos": 136}, {"type": "R", "before": "LPPLS", "after": "log-periodic power law singularity (LPPLS)", "start_char_pos": 225, "end_char_pos": 230}, {"type": "R", "before": "of", "after": "on", "start_char_pos": 318, "end_char_pos": 320}, {"type": "R", "before": "data of Bitcoin price", "after": "Bitcoin price data", "start_char_pos": 421, "end_char_pos": 442}, {"type": "A", "before": null, "after": "and finer (than daily) timescale for the Bitcoin price data", "start_char_pos": 831, "end_char_pos": 831}, {"type": "R", "before": "the adaptive multilevel time series detection methodology have not only an outstanding performance", "after": "this new method is an outstanding instrument", "start_char_pos": 1029, "end_char_pos": 1127}, {"type": "D", "before": "but can also monitor the development and the crash of bubbles", "after": null, "start_char_pos": 1206, "end_char_pos": 1267}, {"type": "R", "before": "greatly affected by", "after": "highly sensitive to", "start_char_pos": 1381, "end_char_pos": 1400}, {"type": "A", "before": null, "after": "- on a day to week scale", "start_char_pos": 1523, "end_char_pos": 1523}, {"type": "A", "before": null, "after": "- on a week to month scale", "start_char_pos": 1672, "end_char_pos": 1672}, {"type": "A", "before": null, "after": "of crashes", "start_char_pos": 1798, "end_char_pos": 1798}, {"type": "R", "before": "an imminent crash riskin not only the cryptocurrency market but also the other financial markets", "after": "the imminent risk", "start_char_pos": 1810, "end_char_pos": 1906}], "sents_char_pos": [0, 211, 357, 610, 833, 966, 1308, 1674]}
+{"doc_id": "1905.09888", "revision_depth": "1", "before_revision": "Pancreatic ductal adenocarcinoma (PDAC) is one of the most aggressive cancers with an extremely poor prognosis. Radiomics has shown prognostic ability in multiple types of cancer including PDAC. However, the prognostic value of traditional radiomics pipelines, which are based on hand-crafted radiomic features alone , is limiteddue to multicollinearity of features and multiple testing problem, and limited performance of conventional machine learning classifiers. Deep learning architectures, such as convolutional neural networks (CNNs) , have been shown to outperform traditional techniques in computer vision tasks , such as object detection . However, they require large sample sizes for training which limits their development . As an alternative solution, CNN-based transfer learning has shown the potential for achieving reasonable performance using datasets with small sample sizes . In this work, we developed a CNN-based transfer learning approach for prognostication in PDAC patients for overall survival . The results showed that transfer learning approach outperformed the traditional radiomics model on PDAC data. A transfer learning approach may fill the gap between radiomics and deep learning analytics for cancer prognosis and improve performance beyond what CNNs can achieve using small datasets .", "after_revision": "Pancreatic Ductal Adenocarcinoma (PDAC) is one of the most aggressive cancers with an extremely poor prognosis. Radiomics has shown prognostic ability in multiple types of cancer including PDAC. However, the prognostic value of traditional radiomics pipelines, which are based on hand-crafted radiomic features alone is limited. Convolutional neural networks (CNNs) have been shown to outperform these feature-based models in computer vision tasks . However, training a CNN from scratch needs a large sample size which is not feasible in most medical imaging studies . As an alternative solution, CNN-based transfer learning has shown potential for achieving reasonable performance using small datasets . In this work, we developed and validated a CNN-based transfer learning approach for prognostication of PDAC patients for overall survival using two independent resectable PDAC cohorts. The proposed deep transfer learning model for prognostication of PDAC achieved the area under the receiver operating characteristic curve of 0.74, which was significantly higher than that of the traditional radiomics model (0.56) as well as a CNN model trained from scratch (0.50). These results suggest that deep transfer learning may significantly improve prognosis performance using small datasets in medical imaging .", "edit_actions": [{"type": "R", "before": "ductal adenocarcinoma", "after": "Ductal Adenocarcinoma", "start_char_pos": 11, "end_char_pos": 32}, {"type": "R", "before": ", is limiteddue to multicollinearity of features and multiple testing problem, and limited performance of conventional machine learning classifiers. Deep learning architectures, such as convolutional", "after": "is limited. Convolutional", "start_char_pos": 317, "end_char_pos": 516}, {"type": "D", "before": ",", "after": null, "start_char_pos": 540, "end_char_pos": 541}, {"type": "R", "before": "traditional techniques", "after": "these feature-based models", "start_char_pos": 572, "end_char_pos": 594}, {"type": "D", "before": ", such as object detection", "after": null, "start_char_pos": 620, "end_char_pos": 646}, {"type": "R", "before": "they require large sample sizes for training which limits their development", "after": "training a CNN from scratch needs a large sample size which is not feasible in most medical imaging studies", "start_char_pos": 658, "end_char_pos": 733}, {"type": "D", "before": "the", "after": null, "start_char_pos": 802, "end_char_pos": 805}, {"type": "R", "before": "datasets with small sample sizes", "after": "small datasets", "start_char_pos": 859, "end_char_pos": 891}, {"type": "A", "before": null, "after": "and validated", "start_char_pos": 921, "end_char_pos": 921}, {"type": "R", "before": "in", "after": "of", "start_char_pos": 981, "end_char_pos": 983}, {"type": "R", "before": ". The results showed that transfer learning approach outperformed the", "after": "using two independent resectable PDAC cohorts. The proposed deep transfer learning model for prognostication of PDAC achieved the area under the receiver operating characteristic curve of 0.74, which was significantly higher than that of the", "start_char_pos": 1019, "end_char_pos": 1088}, {"type": "R", "before": "on PDAC data. A transfer learning approach may fill the gap between radiomics and deep learning analytics for cancer prognosis and improve performance beyond what CNNs can achieve", "after": "(0.56) as well as a CNN model trained from scratch (0.50). These results suggest that deep transfer learning may significantly improve prognosis performance", "start_char_pos": 1117, "end_char_pos": 1296}, {"type": "A", "before": null, "after": "in medical imaging", "start_char_pos": 1318, "end_char_pos": 1318}], "sents_char_pos": [0, 111, 194, 465, 648, 735, 893, 1020, 1130]}
+{"doc_id": "1905.11795", "revision_depth": "1", "before_revision": "In this paper, the credit scoring problem is studied by incorporating network information, where the advantages of such incorporation are investigated in two scenarios. Firstly, a Bayesian optimal filter is proposed to provide a prediction for lenders assuming that published credit scores are estimated merely from structured individual data. Such prediction is used as a monitoring indicator for the risk warning in lenders' future financial decisions. Secondly, we further propose a recursive Bayes estimator to improve the accuracy of credit scoring estimation by incorporating the dynamic interaction topology of clients as well . It is shown that under the proposed evolution framework, the designed estimator has a higher precision than any efficient estimator, and the mean square errors are strictly smaller than the Cram\\'er-Rao lower bound for clients within a certain range of scores. Finally, simulation results for a specific case illustrate the effectiveness and feasibility of the proposed methods .", "after_revision": "In this paper, the credit scoring problem is studied by incorporating networked information, where the advantages of such incorporation are investigated theoretically in two scenarios. Firstly, a Bayesian optimal filter is proposed to provide risk prediction for lenders assuming that published credit scores are estimated merely from structured financial data. Such prediction can then be used as a monitoring indicator for the risk management in lenders' future decisions. Secondly, a recursive Bayes estimator is further proposed to improve the precision of credit scoring by incorporating the dynamic interaction topology of clients . It is shown that under the proposed evolution framework, the designed estimator has a higher precision than any efficient estimator, and the mean square errors are strictly smaller than the Cram\\'er-Rao lower bound for clients within a certain range of scores. Finally, simulation results for a special case illustrate the feasibility and effectiveness of the proposed algorithms .", "edit_actions": [{"type": "R", "before": "network", "after": "networked", "start_char_pos": 70, "end_char_pos": 77}, {"type": "A", "before": null, "after": "theoretically", "start_char_pos": 151, "end_char_pos": 151}, {"type": "R", "before": "a", "after": "risk", "start_char_pos": 228, "end_char_pos": 229}, {"type": "R", "before": "individual", "after": "financial", "start_char_pos": 328, "end_char_pos": 338}, {"type": "R", "before": "is", "after": "can then be", "start_char_pos": 361, "end_char_pos": 363}, {"type": "R", "before": "warning", "after": "management", "start_char_pos": 408, "end_char_pos": 415}, {"type": "D", "before": "financial", "after": null, "start_char_pos": 435, "end_char_pos": 444}, {"type": "D", "before": "we further propose", "after": null, "start_char_pos": 466, "end_char_pos": 484}, {"type": "A", "before": null, "after": "is further proposed", "start_char_pos": 513, "end_char_pos": 513}, {"type": "R", "before": "accuracy", "after": "precision", "start_char_pos": 529, "end_char_pos": 537}, {"type": "D", "before": "estimation", "after": null, "start_char_pos": 556, "end_char_pos": 566}, {"type": "D", "before": "as well", "after": null, "start_char_pos": 628, "end_char_pos": 635}, {"type": "R", "before": "specific", "after": "special", "start_char_pos": 933, "end_char_pos": 941}, {"type": "R", "before": "effectiveness and feasibility", "after": "feasibility and effectiveness", "start_char_pos": 962, "end_char_pos": 991}, {"type": "R", "before": "methods", "after": "algorithms", "start_char_pos": 1008, "end_char_pos": 1015}], "sents_char_pos": [0, 169, 344, 455, 637, 898]}
+{"doc_id": "1905.13313", "revision_depth": "1", "before_revision": "Nowadays a huge number of user-generated videos are uploaded to social media every second, capturing glimpses of events all over the world . These videos provide important and useful information for reconstructing the events. In this paper , we describe the DAISY system, enabled by established machine learning techniques and physics models, that can localize the shooter location only based on a couple of user-generated videos that capture the gun shot sound . The DAISY system utilizes machine learning techniques like video synchronization and gunshot temporal localization URLanize the unstructured social media videos and quickly localize gunshot in the videos. It provides a web interface for human-in-the-loop verification to ensure accurate estimations. We present the results of estimating the shooter's location of the Las Vegas Shooting in 2017 and show that DAISY is able to get accurate location using only the first few shots . We then point out future directions that can help improve the system and further reduces human labor in the process. We publish all relevant source code including the web interface and machine learning models in the hope that such tool can be of use to help preserve life and get contributions from the research and software engineering community to make the tool better .", "after_revision": "Every minute, hundreds of hours of video are uploaded to social media sites and the Internet from around the world. This material creates a visual record of the experiences of a significant percentage of humanity and can help illuminate how we live in the present moment. When properly analyzed, this video can also help analysts to reconstruct events of interest, including war crimes, human rights violations, and terrorist acts . In this technical report , we describe a newly developed tool, the Video Event Reconstruction and Analysis (VERA) system, that enables the localization of a shooter from just a few videos that include the sound of gunshots using established machine learning techniques and straightforward physics models. This tool relies on other tools we have already developed including video synchronization and geolocation to order unstructured videos lacking metadata over time and space, and sound detection algorithms. Both this gunshot localization tool and the previous systems it incorporates are run through a web interface that enables human-in-the-loop verification to ensure accurate estimations. To demonstrate the efficacy of this suite of tools, we present the results of estimating the shooter's location of the Las Vegas Shooting in 2017 and show that VERA accurately predicts the shooter's location using only the first few gunshots . We then point out future directions that can help improve the system and further reduce unnecessary human labor in the process. All relevant source code , including the web interface and machine learning models , are freely available in Github. We do so in the hope that this tool can be used by anyone who needs it to protect and promote human rights and public safety. We also hope that researchers and software developers will be inspired to improve and expand this system moving forward to better meet the needs of public safety and human rights .", "edit_actions": [{"type": "R", "before": "Nowadays a huge number of user-generated videos", "after": "Every minute, hundreds of hours of video", "start_char_pos": 0, "end_char_pos": 47}, {"type": "R", "before": "every second, capturing glimpses of events all over the world", "after": "sites and the Internet from around the world. This material creates a visual record of the experiences of a significant percentage of humanity and can help illuminate how we live in the present moment. When properly analyzed, this video can also help analysts to reconstruct events of interest, including war crimes, human rights violations, and terrorist acts", "start_char_pos": 77, "end_char_pos": 138}, {"type": "D", "before": "These videos provide important and useful information for reconstructing the events.", "after": null, "start_char_pos": 141, "end_char_pos": 225}, {"type": "R", "before": "paper", "after": "technical report", "start_char_pos": 234, "end_char_pos": 239}, {"type": "R", "before": "the DAISY system, enabled by established machine learning techniques and physics models, that can localize the shooter location only based on a couple of user-generated videos that capture the gun shot sound . The DAISY system utilizes", "after": "a newly developed tool, the Video Event Reconstruction and Analysis (VERA) system, that enables the localization of a shooter from just a few videos that include the sound of gunshots using established", "start_char_pos": 254, "end_char_pos": 489}, {"type": "R", "before": "like", "after": "and straightforward physics models. This tool relies on other tools we have already developed including", "start_char_pos": 518, "end_char_pos": 522}, {"type": "R", "before": "gunshot temporal localization URLanize the unstructured social media videos and quickly localize gunshot in the videos. It provides", "after": "geolocation to order unstructured videos lacking metadata over time and space, and sound detection algorithms. Both this gunshot localization tool and the previous systems it incorporates are run through", "start_char_pos": 549, "end_char_pos": 680}, {"type": "R", "before": "for", "after": "that enables", "start_char_pos": 697, "end_char_pos": 700}, {"type": "R", "before": "We", "after": "To demonstrate the efficacy of this suite of tools, we", "start_char_pos": 764, "end_char_pos": 766}, {"type": "R", "before": "DAISY is able to get accurate", "after": "VERA accurately predicts the shooter's", "start_char_pos": 872, "end_char_pos": 901}, {"type": "R", "before": "shots", "after": "gunshots", "start_char_pos": 936, "end_char_pos": 941}, {"type": "R", "before": "reduces", "after": "reduce unnecessary", "start_char_pos": 1025, "end_char_pos": 1032}, {"type": "R", "before": "We publish all", "after": "All", "start_char_pos": 1061, "end_char_pos": 1075}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1097, "end_char_pos": 1097}, {"type": "R", "before": "in", "after": ", are freely available in Github. We do so in", "start_char_pos": 1154, "end_char_pos": 1156}, {"type": "R", "before": "such", "after": "this", "start_char_pos": 1171, "end_char_pos": 1175}, {"type": "R", "before": "of use to help preserve life and get contributions from the research and software engineering community to make the tool better", "after": "used by anyone who needs it to protect and promote human rights and public safety. We also hope that researchers and software developers will be inspired to improve and expand this system moving forward to better meet the needs of public safety and human rights", "start_char_pos": 1188, "end_char_pos": 1315}], "sents_char_pos": [0, 140, 225, 463, 668, 763, 943, 1060]}
+{"doc_id": "1906.04266", "revision_depth": "1", "before_revision": "Determining which proteins interact together is crucial to a systems-level understanding of the cell. Recently, algorithms based on Direct Coupling Analysis (DCA) pairwise maximum-entropy models have allowed to identify interaction partners among the paralogs of ubiquitous prokaryotic proteins families, starting from sequence data alone. Since DCA allows to infer the three-dimensional structure of protein complexes, its success in predicting protein-protein interactions could be mainly based on contacting residues coevolving to remain physicochemically complementary. However, interacting proteins often possess similar evolutionary histories , which also gives rise to correlations among their sequences . What is the role of purely phylogenetic correlations in the performance of DCA-based methods to infer interaction partners? To address this question, we employ controlled synthetic data that only involves phylogeny and no interactions or contacts. We find that DCA accurately identifies the pairs of synthetic sequences that only share evolutionary history. It performs as well as methods explicitly based on sequence similarity, and even slightly better with large and accurate training sets. We further demonstrate the ability of these various methods to correctly predict pairings among actual paralogous proteins with genome proximity but no known direct physical interaction, which illustrates the importance of phylogenetic correlations in real data. However, for actually interacting and strongly coevolving proteins, DCA and mutual information outperform sequence similarity .", "after_revision": "Determining which proteins interact together is crucial to a systems-level understanding of the cell. Recently, algorithms based on Direct Coupling Analysis (DCA) pairwise maximum-entropy models have allowed to identify interaction partners among paralogous proteins from sequence data . This success of DCA at predicting protein-protein interactions could be mainly based on its known ability to identify pairs of residues that are in contact in the three-dimensional structure of protein complexes and that coevolve to remain physicochemically complementary. However, interacting proteins possess similar evolutionary histories . What is the role of purely phylogenetic correlations in the performance of DCA-based methods to infer interaction partners? To address this question, we employ controlled synthetic data that only involve phylogeny and no interactions or contacts. We find that DCA accurately identifies the pairs of synthetic sequences that share evolutionary history. While phylogenetic correlations confound the identification of contacting residues by DCA, they are thus useful to predict interacting partners among paralogs. We find that DCA performs as well as phylogenetic methods to this end, and slightly better than them with large and accurate training sets. Employing DCA or phylogenetic methods within an Iterative Pairing Algorithm (IPA) allows to predict pairs of evolutionary partners without a training set. We demonstrate the ability of these various methods to correctly predict pairings among real paralogous proteins with genome proximity but no known physical interaction, illustrating the importance of phylogenetic correlations in natural data. However, for physically interacting and strongly coevolving proteins, DCA and mutual information outperform phylogenetic methods. We discuss how to distinguish physically interacting proteins from those only sharing evolutionary history .", "edit_actions": [{"type": "R", "before": "the paralogs of ubiquitous prokaryotic proteins families, starting", "after": "paralogous proteins", "start_char_pos": 247, "end_char_pos": 313}, {"type": "R", "before": "alone. Since DCA allows to infer the three-dimensional structure of protein complexes, its success in", "after": ". This success of DCA at", "start_char_pos": 333, "end_char_pos": 434}, {"type": "R", "before": "contacting residues coevolving", "after": "its known ability to identify pairs of residues that are in contact in the three-dimensional structure of protein complexes and that coevolve", "start_char_pos": 500, "end_char_pos": 530}, {"type": "D", "before": "often", "after": null, "start_char_pos": 604, "end_char_pos": 609}, {"type": "D", "before": ", which also gives rise to correlations among their sequences", "after": null, "start_char_pos": 649, "end_char_pos": 710}, {"type": "R", "before": "involves", "after": "involve", "start_char_pos": 909, "end_char_pos": 917}, {"type": "D", "before": "only", "after": null, "start_char_pos": 1038, "end_char_pos": 1042}, {"type": "R", "before": "It", "after": "While phylogenetic correlations confound the identification of contacting residues by DCA, they are thus useful to predict interacting partners among paralogs. We find that DCA", "start_char_pos": 1071, "end_char_pos": 1073}, {"type": "R", "before": "methods explicitly based on sequence similarity, and even slightly better", "after": "phylogenetic methods to this end, and slightly better than them", "start_char_pos": 1094, "end_char_pos": 1167}, {"type": "R", "before": "We further", "after": "Employing DCA or phylogenetic methods within an Iterative Pairing Algorithm (IPA) allows to predict pairs of evolutionary partners without a training set. We", "start_char_pos": 1207, "end_char_pos": 1217}, {"type": "R", "before": "actual", "after": "real", "start_char_pos": 1303, "end_char_pos": 1309}, {"type": "D", "before": "direct", "after": null, "start_char_pos": 1365, "end_char_pos": 1371}, {"type": "R", "before": "which illustrates", "after": "illustrating", "start_char_pos": 1394, "end_char_pos": 1411}, {"type": "R", "before": "real", "after": "natural", "start_char_pos": 1459, "end_char_pos": 1463}, {"type": "R", "before": "actually", "after": "physically", "start_char_pos": 1483, "end_char_pos": 1491}, {"type": "R", "before": "sequence similarity", "after": "phylogenetic methods. We discuss how to distinguish physically interacting proteins from those only sharing evolutionary history", "start_char_pos": 1576, "end_char_pos": 1595}], "sents_char_pos": [0, 101, 339, 573, 712, 836, 960, 1070, 1206, 1469]}
+{"doc_id": "1906.06360", "revision_depth": "1", "before_revision": "Economists are often interested in computing averages with respect to a distribution of unobservables. Examples are moments or distributions of individual fixed-effects, average partial effects in discrete choice models, or counterfactual policy simulations based on a structural model. We consider posterior estimators of such effects , where the average is computed conditional on the observation sample. While in various settings it is common to \"shrink\" individual estimates -- e.g., of teacher value-added or hospital quality -- toward a common mean to reduce estimation noise, a study of the frequentist properties of posterior average estimators is lacking. We establish two robustness properties of posterior estimators under misspecification of the assumed distribution of unobservables: they are optimal in terms of local worst-case bias, and their global bias is no larger than twice the minimum worst-case bias that can be achieved within a large class of estimators. These results provide a theoretical foundation for the use of posterior average estimators . In addition, our theory suggests a simple measure of the information contained in the posterior conditioning. For illustration, we consider two empirical settings: the estimation of the distribution of neighborhood effects in the US, and the estimation of the densities of permanent and transitory components in a model of income dynamics.", "after_revision": "Economists are often interested in estimating averages with respect to distributions of unobservables. Examples are moments of individual fixed-effects, average effects in discrete choice models, or counterfactual simulations in structural models. For such quantities, we propose and study \"posterior average effects\" , where the average is computed conditional on the sample, in the spirit of empirical Bayes and shrinkage methods. While the usefulness of shrinkage for prediction is well-understood, a justification of posterior conditioning to estimate population averages is currently lacking. We establish two robustness properties of posterior average effects under misspecification of the assumed distribution of unobservables: they are optimal in terms of local worst-case bias, and their global bias is at most twice the minimum worst-case bias within a large class of estimators. We establish related robustness results for posterior predictors . In addition, we suggest a simple measure of the information contained in the posterior conditioning. Lastly, we present two empirical illustrations, to estimate the distributions of neighborhood effects in the US, and of permanent and transitory components in a model of income dynamics.", "edit_actions": [{"type": "R", "before": "computing", "after": "estimating", "start_char_pos": 35, "end_char_pos": 44}, {"type": "R", "before": "a distribution", "after": "distributions", "start_char_pos": 70, "end_char_pos": 84}, {"type": "D", "before": "or distributions", "after": null, "start_char_pos": 124, "end_char_pos": 140}, {"type": "D", "before": "partial", "after": null, "start_char_pos": 178, "end_char_pos": 185}, {"type": "R", "before": "policy simulations based on a structural model. We consider posterior estimators of such effects", "after": "simulations in structural models. For such quantities, we propose and study \"posterior average effects\"", "start_char_pos": 239, "end_char_pos": 335}, {"type": "R", "before": "observation sample. While in various settings it is common to \"shrink\" individual estimates -- e.g., of teacher value-added or hospital quality -- toward a common mean to reduce estimation noise, a study of the frequentist properties of posterior average estimators is", "after": "sample, in the spirit of empirical Bayes and shrinkage methods. While the usefulness of shrinkage for prediction is well-understood, a justification of posterior conditioning to estimate population averages is currently", "start_char_pos": 387, "end_char_pos": 655}, {"type": "R", "before": "estimators", "after": "average effects", "start_char_pos": 717, "end_char_pos": 727}, {"type": "R", "before": "no larger than", "after": "at most", "start_char_pos": 874, "end_char_pos": 888}, {"type": "D", "before": "that can be achieved", "after": null, "start_char_pos": 923, "end_char_pos": 943}, {"type": "R", "before": "These results provide a theoretical foundation for the use of posterior average estimators", "after": "We establish related robustness results for posterior predictors", "start_char_pos": 980, "end_char_pos": 1070}, {"type": "R", "before": "our theory suggests", "after": "we suggest", "start_char_pos": 1086, "end_char_pos": 1105}, {"type": "R", "before": "For illustration, we consider two empirical settings: the estimation of the distribution of", "after": "Lastly, we present two empirical illustrations, to estimate the distributions of", "start_char_pos": 1183, "end_char_pos": 1274}, {"type": "D", "before": "the estimation of the densities", "after": null, "start_char_pos": 1311, "end_char_pos": 1342}], "sents_char_pos": [0, 102, 286, 406, 664, 979, 1072, 1182]}
+{"doc_id": "1906.07491", "revision_depth": "1", "before_revision": "Multifractal Detrended Cross-Correlation methodology is applied to the foreign exchange (Forex) market . High frequency fluctuations of exchange rates of eight major world currencies over the period 2010--2018 are used to study cross-correlations. The currencies include the Australian dollar, Canadian dollar, Swiss franc, euro, British pound sterling, Japanese yen, New Zealand dollar and US dollar . Dominant multiscale cross--correlations between the exchange rates are found to typically occur on the level of small and medium size fluctuations. URLanization of ties between the exchange rates, formulated in terms of the dendrograms, are however more pronounced on the level of larger fluctuations. The cross--correlations are quantified to be stronger on average between those exchange rate pairs that are bound within triangular relation . Some pairs from outside the triangular relation are however identified to be exceptionally strongly correlated as compared to the average strength of correlations in this sector .This in particular applies to those exchange rates that involve the Australian and New Zealand dollars and reflects their economic relations. Significant events with impact on the Forex are shown to induce triangular arbitrage opportunities which at the same time reduce cross--correlations on the smallest time scales and act destructively on the URLanization of correlations. In the years 2010--2018 such instances took place in connection with the Swiss National Bank intervention and the weakening of British pound sterling accompanying the initiation of Brexit procedure .", "after_revision": "Multifractal detrended cross-correlation methodology is described and applied to Foreign exchange (Forex) market time series. Fluctuations of high frequency exchange rates of eight major world currencies over 2010-2018 period are used to study cross-correlations. The study is motivated by fundamental questions in complex systems' response to significant environmental changes and by potential applications in investment strategies, including detecting triangular arbitrage opportunities . Dominant multiscale cross-correlations between the exchange rates are found to typically occur at smaller fluctuation levels. However URLanization of ties expressed in terms of dendrograms, with a novel application of the multiscale cross-correlation coefficient, are more pronounced at large fluctuations. The cross-correlations are quantified to be stronger on average between those exchange rate pairs that are bound within triangular relations . Some pairs from outside triangular relations are however identified to be exceptionally strongly correlated as compared to the average strength of triangular correlations .This in particular applies to those exchange rates that involve Australian and New Zealand dollars and reflects their economic relations. Significant events with impact on the Forex are shown to induce triangular arbitrage opportunities which at the same time reduce cross--correlations on the smallest time scales and act destructively on the URLanization of correlations. In 2010--2018 such instances took place in connection with the Swiss National Bank intervention and the weakening of British pound sterling accompanying the initiation of Brexit procedure . The methodology could be applicable to temporal and multiscale pattern detection in any time series .", "edit_actions": [{"type": "R", "before": "Detrended Cross-Correlation methodology is applied to the foreign", "after": "detrended cross-correlation methodology is described and applied to Foreign", "start_char_pos": 13, "end_char_pos": 78}, {"type": "R", "before": ". High frequency fluctuations of", "after": "time series. Fluctuations of high frequency", "start_char_pos": 103, "end_char_pos": 135}, {"type": "R", "before": "the period 2010--2018", "after": "2010-2018 period", "start_char_pos": 188, "end_char_pos": 209}, {"type": "R", "before": "currencies include the Australian dollar, Canadian dollar, Swiss franc, euro, British pound sterling, Japanese yen, New Zealand dollar and US dollar", "after": "study is motivated by fundamental questions in complex systems' response to significant environmental changes and by potential applications in investment strategies, including detecting triangular arbitrage opportunities", "start_char_pos": 252, "end_char_pos": 400}, {"type": "R", "before": "cross--correlations", "after": "cross-correlations", "start_char_pos": 423, "end_char_pos": 442}, {"type": "R", "before": "on the level of small and medium size fluctuations.", "after": "at smaller fluctuation levels. However", "start_char_pos": 499, "end_char_pos": 550}, {"type": "R", "before": "between the exchange rates, formulated", "after": "expressed", "start_char_pos": 572, "end_char_pos": 610}, {"type": "R", "before": "the dendrograms, are however more pronounced on the level of larger", "after": "dendrograms, with a novel application of the multiscale cross-correlation coefficient, are more pronounced at large", "start_char_pos": 623, "end_char_pos": 690}, {"type": "R", "before": "cross--correlations", "after": "cross-correlations", "start_char_pos": 709, "end_char_pos": 728}, {"type": "R", "before": "relation", "after": "relations", "start_char_pos": 837, "end_char_pos": 845}, {"type": "R", "before": "the triangular relation", "after": "triangular relations", "start_char_pos": 872, "end_char_pos": 895}, {"type": "R", "before": "correlations in this sector", "after": "triangular correlations", "start_char_pos": 998, "end_char_pos": 1025}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1091, "end_char_pos": 1094}, {"type": "D", "before": "the years", "after": null, "start_char_pos": 1408, "end_char_pos": 1417}, {"type": "A", "before": null, "after": ". The methodology could be applicable to temporal and multiscale pattern detection in any time series", "start_char_pos": 1603, "end_char_pos": 1603}], "sents_char_pos": [0, 104, 247, 550, 704, 1027, 1168, 1404]}
+{"doc_id": "1906.08455", "revision_depth": "1", "before_revision": " B-rep model editing plays an essential role in CAD and motivates the very recent direct modeling CAD paradigm, which features intuitive push-pull manipulation of the model geometry. Boundary faces in a B-rep model could be connected in a smooth manner, typically G1 continuous, for functional, manufacturing or aesthetic reasons. Quite often, it is desirable to preserve such smooth connections during push-pull moves . This is, however, no trivial matter and introduces additional challenges. To preserve the G1 connections , neighboring faces of push-pulled faces need to be made movable, but their motions are not known explicitly. Consequently, it becomes challenging to track the geometry-topology inconsistency caused by these movable faces and to attain a robust update for push-pulled solid models. No effective ways exist in the literature to deal with the challenges; the industrial state of the art has implemented this function, but the challenges are not addressed satisfactorily and robustness issues are observed. This paper proposes a novel reverse tracking method to solve the above challenges, and then, based on it, presents a systematic method for push-pull direct modeling while preserving G1 connections. The developed method has been validated with a series of case studies .", "after_revision": "Boundary representation ( B-rep ) model editing plays an essential role in computer-aided design and motivates the very recent direct modeling paradigm, which features intuitive push-pull manipulation of the model geometry. In mechanical design, a substantial part of B-rep models being used are quadric models (composed of linear and quadric surfaces). However, push-pulling such models is not trivial due to the possible smooth face-face connections in the models. The major issue is that, during push-pull moves , it is often desirable to preserve these connections for functional, manufacturing, or aesthetic reasons, but this could cause complex inconsistencies between the geometry and topology in the model and lead to robustness issues in updating the model. The challenge lies in effectiveness towards detecting the instants when geometry-topology inconsistencies occur during push-pull moves. This paper proposes a novel reverse detection method to solve the challenge and then, based on it, presents a robust method for push-pull direct modeling while preserving smooth connections. Case studies and comparisons have been conducted to demonstrate the effectiveness of the method .", "edit_actions": [{"type": "A", "before": null, "after": "Boundary representation (", "start_char_pos": 0, "end_char_pos": 0}, {"type": "A", "before": null, "after": ")", "start_char_pos": 7, "end_char_pos": 7}, {"type": "R", "before": "CAD", "after": "computer-aided design", "start_char_pos": 49, "end_char_pos": 52}, {"type": "D", "before": "CAD", "after": null, "start_char_pos": 99, "end_char_pos": 102}, {"type": "R", "before": "Boundary faces in a", "after": "In mechanical design, a substantial part of", "start_char_pos": 184, "end_char_pos": 203}, {"type": "R", "before": "model could be connected in a smooth manner, typically G1 continuous, for functional, manufacturing or aesthetic reasons. Quite often, it is desirable to preserve such smooth connections", "after": "models being used are quadric models (composed of linear and quadric surfaces). However, push-pulling such models is not trivial due to the possible smooth face-face connections in the models. The major issue is that,", "start_char_pos": 210, "end_char_pos": 396}, {"type": "D", "before": ". This is, however, no trivial matter and introduces additional challenges. To preserve the G1 connections", "after": null, "start_char_pos": 420, "end_char_pos": 526}, {"type": "R", "before": "neighboring faces of push-pulled faces need to be made movable, but their motions are not known explicitly. Consequently, it becomes challenging to track the", "after": "it is often desirable to preserve these connections for functional, manufacturing, or aesthetic reasons, but this could cause complex inconsistencies between the geometry and topology in the model and lead to robustness issues in updating the model. The challenge lies in effectiveness towards detecting the instants when", "start_char_pos": 529, "end_char_pos": 686}, {"type": "R", "before": "inconsistency caused by these movable faces and to attain a robust update for push-pulled solid models. No effective ways exist in the literature to deal with the challenges; the industrial state of the art has implemented this function, but the challenges are not addressed satisfactorily and robustness issues are observed.", "after": "inconsistencies occur during push-pull moves.", "start_char_pos": 705, "end_char_pos": 1030}, {"type": "R", "before": "tracking", "after": "detection", "start_char_pos": 1067, "end_char_pos": 1075}, {"type": "R", "before": "above challenges,", "after": "challenge", "start_char_pos": 1096, "end_char_pos": 1113}, {"type": "R", "before": "systematic", "after": "robust", "start_char_pos": 1148, "end_char_pos": 1158}, {"type": "R", "before": "G1 connections. The developed method has been validated with a series of case studies", "after": "smooth connections. Case studies and comparisons have been conducted to demonstrate the effectiveness of the method", "start_char_pos": 1213, "end_char_pos": 1298}], "sents_char_pos": [0, 183, 331, 421, 495, 636, 808, 879, 1030, 1228]}
+{"doc_id": "1906.09034", "revision_depth": "1", "before_revision": "We characterize the asymptotic small-time and large-time implied volatility smile for the rough Heston model introduced by El Euch, Jaissonand Rosenbaum .0pt%DIFAUXCMD in the small-time, large-time and \\alpha }\\to \\to We show that the asymptotic short-maturity smile scales in qualitatively the same way as a general rough stochastic volatility model , and is characterized by0pt%DIFAUXCMD , \\mbox{%DIFAUXCMD FGP18a }0pt%DIFAUXCMD et al.), and the rate function is equal to } the Fenchel-Legendre transform of the solution a Volterra integral equation (VIE) \\hspace{0pt}%DIFAUXCMD , but with the drift and mean reversion terms removed} . The solution of this VIE satisfies a space-time scaling property which simplifies its computation. We corroborate our results numerically with Monte Carlo simulations. We also compute a power series in the log-moneyness variable for the asymptotic implied volatility , which yields tractable expressions for the vol skew and convexity , thus being useful for calibration purposes. We also derive formal asymptotics for the small-time moderate deviations regime and a formal saddlepoint approximation for call options in the large deviations regime. This goes to higher order than previous works for rough models, and in particular captures the effect of the mean reversion term. In the large maturity case, the limiting asymptotic smile turns out to be the same as for the standard Heston model , for which there is a well known closed-form formula in terms of the SVI parametrization}\\hspace{0pt}%DIFAUXCMD . Finally, using L\\'{e}vy's convergence theorem, we show that the log stock price X_t tends weakly to a non-symmetric random variable X^{(1/2)}_t as \\alpha }\\to \\to _t/\\sqrt{t} tends weakly to a non-symmetric random variable as t}\\to \\to }\\hspace{0pt}%DIFAUXCMD where the skew flattens or blows up) and the V process converges on pathspace to a random tempered distribution} .", "after_revision": "We characterize the behaviour of the Rough Heston model introduced by Jaisson\\&Rosenbaum \\mbox{%DIFAUXCMD JR160pt%DIFAUXCMD in the small-time, large-time and \\alpha }\\to 1/2 (i.e. H\\to 0) limits. We show that the short-maturity smile scales in qualitatively the same way as a general rough stochastic volatility model (cf.\\ \\mbox{%DIFAUXCMD FZ170pt%DIFAUXCMD , \\mbox{%DIFAUXCMD FGP18a }0pt%DIFAUXCMD et al.), and the rate function is equal to } the Fenchel-Legendre transform of a simple transformation of the solution to the same Volterra integral equation (VIE) that appears in \\mbox{%DIFAUXCMD ER19\\hspace{0pt}%DIFAUXCMD , but with the drift and mean reversion terms removed} . The solution to this VIE satisfies a space-time scaling property which means we only need to solve this equation for the moment values of p=1 and p=-1 so the rate function can be efficiently computed using an Adams scheme or a power series, and we compute a power series in the log-moneyness variable for the asymptotic implied volatility which yields tractable expressions for the implied vol skew and convexity . The limiting asymptotic smile in the large-maturity regime is obtained via a stability analysis of the fixed points of the VIE, and is the same as for the standard Heston model in \\mbox{%DIFAUXCMD \\cite{FJ11}\\hspace{0pt}%DIFAUXCMD . Finally, using L\\'{e}vy's convergence theorem, we show that the log stock price X_t tends weakly to a non-symmetric random variable X^{(1/2)}_t as \\alpha }\\to 1/2 (i.e. H\\to 0) whose mgf is also the solution to the Rough Heston VIE with \\alpha=1/2, and we show that X^{(1/2)_t/\\sqrt{t} tends weakly to a non-symmetric random variable as t}\\to 0, which leads to a non-flat non-symmetric asymptotic smile in the Edgeworth regime. We also show that the third moment of the log stock price tends to a finite constant as H\\to 0 (in contrast to the Rough Bergomi model discussed in \\mbox{%DIFAUXCMD \\cite{FFGS20 }\\hspace{0pt}%DIFAUXCMD where the skew flattens or blows up) and the V process converges on pathspace to a random tempered distribution} .", "edit_actions": [{"type": "R", "before": "asymptotic small-time and large-time implied volatility smile for the rough", "after": "behaviour of the Rough", "start_char_pos": 20, "end_char_pos": 95}, {"type": "R", "before": "El Euch, Jaissonand Rosenbaum .", "after": "Jaisson\\&Rosenbaum \\mbox{%DIFAUXCMD JR16", "start_char_pos": 123, "end_char_pos": 154}, {"type": "A", "before": null, "after": "1/2 (i.e. H", "start_char_pos": 214, "end_char_pos": 214}, {"type": "A", "before": null, "after": "0) limits.", "start_char_pos": 218, "end_char_pos": 218}, {"type": "D", "before": "asymptotic", "after": null, "start_char_pos": 236, "end_char_pos": 246}, {"type": "R", "before": ", and is characterized by", "after": "(cf.\\ \\mbox{%DIFAUXCMD FZ17", "start_char_pos": 352, "end_char_pos": 377}, {"type": "R", "before": "the solution a", "after": "a simple transformation of the solution to the same", "start_char_pos": 511, "end_char_pos": 525}, {"type": "A", "before": null, "after": "that appears in \\mbox{%DIFAUXCMD ER19", "start_char_pos": 559, "end_char_pos": 559}, {"type": "R", "before": "of", "after": "to", "start_char_pos": 652, "end_char_pos": 654}, {"type": "R", "before": "simplifies its computation. We corroborate our results numerically with Monte Carlo simulations. We also", "after": "means we only need to solve this equation for the moment values of p=1 and p=-1 so the rate function can be efficiently computed using an Adams scheme or a power series, and we", "start_char_pos": 710, "end_char_pos": 814}, {"type": "D", "before": ",", "after": null, "start_char_pos": 906, "end_char_pos": 907}, {"type": "A", "before": null, "after": "implied", "start_char_pos": 951, "end_char_pos": 951}, {"type": "R", "before": ", thus being useful for calibration purposes. We also derive formal asymptotics for the small-time moderate deviations regime and a formal saddlepoint approximation for call options in the large deviations regime. This goes to higher order than previous works for rough models, and in particular captures the effect of the mean reversion term. In the large maturity case, the limiting asymptotic smile turns out to be the", "after": ". The limiting asymptotic smile in the large-maturity regime is obtained via a stability analysis of the fixed points of the VIE, and is the", "start_char_pos": 975, "end_char_pos": 1396}, {"type": "R", "before": ", for which there is a well known closed-form formula in terms of the SVI parametrization", "after": "in \\mbox{%DIFAUXCMD \\cite{FJ11", "start_char_pos": 1435, "end_char_pos": 1524}, {"type": "A", "before": null, "after": "1/2 (i.e. H", "start_char_pos": 1709, "end_char_pos": 1709}, {"type": "A", "before": null, "after": "0) whose mgf is also the solution to the Rough Heston VIE with \\alpha=1/2, and we show that X^{(1/2)", "start_char_pos": 1713, "end_char_pos": 1713}, {"type": "A", "before": null, "after": "0, which leads to a non-flat non-symmetric asymptotic smile in the Edgeworth regime. We also show that the third moment of the log stock price tends to a finite constant as H", "start_char_pos": 1782, "end_char_pos": 1782}, {"type": "A", "before": null, "after": "0 (in contrast to the Rough Bergomi model discussed in \\mbox{%DIFAUXCMD \\cite{FFGS20", "start_char_pos": 1786, "end_char_pos": 1786}], "sents_char_pos": [0, 439, 638, 737, 806, 1020, 1188, 1318, 1346, 1436]}
+{"doc_id": "1906.09054", "revision_depth": "2", "before_revision": "Gene expression is a noisy process. That consists of several random events among which the reinitiation of transcription by RNAP is an important one. The RNAP molecules can bind the gene only after the promoter gets activated by transcription factors. Several transcription factors bind the promoter to put the gene in the active state. The gene turns into the inactive state as the bound transcription factors leave the promoter. During the active period of the gene, many RNAP molecules transcribe the gene to synthesize the mRNA . The binding event of RNAP to the active state of the gene is an probabilistic process and therefore, introduces noise or fluctuations in the protein levels. The binding event of RNAP to the active state of the gene is an probabilistic process and therefore introduces noise in the protein levels. In this paper, we analytically calculate the noise in mRNA and protein levels and also the probability distribution of mRNA numbers exactly with the binding event of RNAP in gene transcription process. The theoretically calculated noise expression of proteins shows excellent agreement with an experimental results. Then , we show that the noise in mRNA level can be sub-Poissonian due to the reinitiation of transcription by RNAP and the mean mRNA level can be increased without increasing the noise. We find that the reinitiation of transcription behaves like the fine-tuned control process to regulate the mRNA/protein level in the cell . We also find the exact distribution of mRNA numbers with the reinitiation of transcription .", "after_revision": "Gene expression is a random or noisy process. The process consists of several random events among which the reinitiation of transcription by RNAP is an important one. The RNAP molecules can bind the gene only after the promoter gets activated by transcription factors. Several transcription factors bind the promoter to put the gene in the active state. The gene turns into inactive state as the bound transcription factors leave the promoter. During the active period of the gene, many RNAP molecules transcribe the gene to synthesize the mRNAs . The binding event of RNAP to the active state of the gene is a probabilistic process and therefore, introduces noise or fluctuations in the mRNA and protein levels. In this paper, we analytically calculate the Fano factor in mRNA and protein levels and also the probability distribution of mRNA numbers exactly with the binding event of RNAPs in gene transcription process. The analytically calculated expression of Fano factor of proteins shows excellent agreement with an experimental result. Then we show that the Fano factor in mRNA levels can be sub-Poissonian due to the reinitiation of transcription by RNAP and the mean mRNA level can be increased without increasing the Fano factor. Our study show that the Fano factor can also be reduced keeping mRNA levels fixed. We find that the reinitiation of transcription can behave as a fine-tuned control process to regulate the mRNA/protein level in the cell .", "edit_actions": [{"type": "A", "before": null, "after": "random or", "start_char_pos": 21, "end_char_pos": 21}, {"type": "R", "before": "That", "after": "The process", "start_char_pos": 37, "end_char_pos": 41}, {"type": "D", "before": "the", "after": null, "start_char_pos": 358, "end_char_pos": 361}, {"type": "R", "before": "mRNA", "after": "mRNAs", "start_char_pos": 528, "end_char_pos": 532}, {"type": "R", "before": "an", "after": "a", "start_char_pos": 596, "end_char_pos": 598}, {"type": "R", "before": "protein levels. The binding event of RNAP to the active state of the gene is an probabilistic process and therefore introduces noise in the", "after": "mRNA and", "start_char_pos": 676, "end_char_pos": 815}, {"type": "R", "before": "noise", "after": "Fano factor", "start_char_pos": 877, "end_char_pos": 882}, {"type": "R", "before": "RNAP", "after": "RNAPs", "start_char_pos": 998, "end_char_pos": 1002}, {"type": "R", "before": "theoretically calculated noise expression of", "after": "analytically calculated expression of Fano factor of", "start_char_pos": 1038, "end_char_pos": 1082}, {"type": "R", "before": "results. Then ,", "after": "result. Then", "start_char_pos": 1139, "end_char_pos": 1154}, {"type": "R", "before": "noise in mRNA level", "after": "Fano factor in mRNA levels", "start_char_pos": 1172, "end_char_pos": 1191}, {"type": "R", "before": "noise.", "after": "Fano factor. Our study show that the Fano factor can also be reduced keeping mRNA levels fixed.", "start_char_pos": 1327, "end_char_pos": 1333}, {"type": "R", "before": "behaves like the", "after": "can behave as a", "start_char_pos": 1381, "end_char_pos": 1397}, {"type": "D", "before": ". We also find the exact distribution of mRNA numbers with the reinitiation of transcription", "after": null, "start_char_pos": 1472, "end_char_pos": 1564}], "sents_char_pos": [0, 36, 150, 252, 337, 431, 691, 831, 1033, 1147, 1333, 1473]}
+{"doc_id": "1906.09465", "revision_depth": "2", "before_revision": "Developing efficient computational methods to change the state of a cell from an undesirable condition, e.g. diseased, into a desirable, e.g. healthy, condition is an important goal of systems biology. The identification of potential interventions can be achieved through mathematical modeling of the state of a cell by finding appropriate input manipulations in the model that represent external interventions. This paper focuses on quantifying the unwanted or unplanned changes that come along with the application of an intervention , which we define as the total effect of the intervention. The type of mathematical models that we will consider are discrete dynamical systems which include the widely used Boolean networks and their generalizations. The potential control targets can be represented by a set of nodes and edges that can be manipulated to produce a desired effect on the system. Regulatory rules that appear in published models tend to have special features such as the property of being nested canalizing, a concept inspired by the concept of canalization in evolutionary biology. We provide a polynomial normal form based on the canalizing properties of regulatory functions. This polynomial normal form provides a partition of the inputs of the function into canalizing and non-canalizing variables and, within the canalizing ones, we categorize the input variables into layers of canalization. Using this polynomial normal form, we provide a set of formulas for counting the maximum number of transitions that will change in the state space upon an edge deletion in the wiring diagram. These formulas rely on the canalizing structure of the target function where the number of changed transitions depends on the canalizing layer that includes the input to be deleted. We applied our methods to two published models to compare the accuracy of the upper bounds and shown that the bounds are sharp .", "after_revision": "Developing efficient computational methods to assess the impact of external interventions on the dynamics of a network model is an important problem in systems biology. This paper focuses on quantifying the global changes that result from the application of an intervention to produce a desired effect , which we define as the total effect of the intervention. The type of mathematical models that we will consider are discrete dynamical systems which include the widely used Boolean networks and their generalizations. The potential interventions can be represented by a set of nodes and edges that can be manipulated to produce a desired effect on the system. We use a class of regulatory rules called nested canalizing functions that frequently appear in published models and were inspired by the concept of canalization in evolutionary biology. In this paper, we provide a polynomial normal form based on the canalizing properties of regulatory functions. Using this polynomial normal form, we give a set of formulas for counting the maximum number of transitions that will change in the state space upon an edge deletion in the wiring diagram. These formulas rely on the canalizing structure of the target function since the number of changed transitions depends on the canalizing layer that includes the input to be deleted. We also present computations on random networks to compare the exact number of changes with the upper bounds provided by our formulas. Finally, we provide statistics on the sharpness of these upper bounds in random networks .", "edit_actions": [{"type": "R", "before": "change the state of a cell from an undesirable condition, e.g. diseased, into a desirable, e.g. healthy, condition", "after": "assess the impact of external interventions on the dynamics of a network model", "start_char_pos": 46, "end_char_pos": 160}, {"type": "R", "before": "goal of", "after": "problem in", "start_char_pos": 177, "end_char_pos": 184}, {"type": "D", "before": "The identification of potential interventions can be achieved through mathematical modeling of the state of a cell by finding appropriate input manipulations in the model that represent external interventions.", "after": null, "start_char_pos": 202, "end_char_pos": 411}, {"type": "R", "before": "unwanted or unplanned changes that come along with", "after": "global changes that result from", "start_char_pos": 450, "end_char_pos": 500}, {"type": "A", "before": null, "after": "to produce a desired effect", "start_char_pos": 536, "end_char_pos": 536}, {"type": "R", "before": "total effect", "after": "total effect", "start_char_pos": 562, "end_char_pos": 574}, {"type": "R", "before": "control targets", "after": "interventions", "start_char_pos": 769, "end_char_pos": 784}, {"type": "R", "before": "Regulatory rules that", "after": "We use a class of regulatory rules called nested canalizing functions that frequently", "start_char_pos": 899, "end_char_pos": 920}, {"type": "R", "before": "tend to have special features such as the property of being nested canalizing, a concept", "after": "and were", "start_char_pos": 948, "end_char_pos": 1036}, {"type": "R", "before": "We", "after": "In this paper, we", "start_char_pos": 1102, "end_char_pos": 1104}, {"type": "D", "before": "This polynomial normal form provides a partition of the inputs of the function into canalizing and non-canalizing variables and, within the canalizing ones, we categorize the input variables into layers of canalization.", "after": null, "start_char_pos": 1198, "end_char_pos": 1417}, {"type": "R", "before": "provide", "after": "give", "start_char_pos": 1456, "end_char_pos": 1463}, {"type": "R", "before": "where", "after": "since", "start_char_pos": 1681, "end_char_pos": 1686}, {"type": "R", "before": "applied our methods to two published models to compare the accuracy of", "after": "also present computations on random networks to compare", "start_char_pos": 1795, "end_char_pos": 1865}, {"type": "A", "before": null, "after": "exact number of changes with the", "start_char_pos": 1870, "end_char_pos": 1870}, {"type": "R", "before": "and shown that the bounds are sharp", "after": "provided by our formulas. Finally, we provide statistics on the sharpness of these upper bounds in random networks", "start_char_pos": 1884, "end_char_pos": 1919}], "sents_char_pos": [0, 201, 411, 595, 754, 898, 1101, 1197, 1417, 1609, 1791]}
+{"doc_id": "1907.01652", "revision_depth": "1", "before_revision": "This work introduces RadVR, a virtual reality daylighiting analysis tools, that simultaneously allows the analysis of qualitative immersive renderings and the assessment of quantitative data of physically correct daylighting simulations in a 6DOF virtual environment. With an end-to-end workflow and integration with commonly used modeling software, the system takes a 3D model and material properties as input and allows user-designers to (1) perform physically-based daylighting simulations powered by the Radianceengine (2) study sunlight penetration in different hours of the year by navigating through time (3) Interact with a 9-point-in-time matrix for the nine most representative times of the year (4) Visualize, compare and analyze daylighting simulation results using integrated tools in virtual reality. By conducting user experiments and comparing the system with a conventional 2D-display daylight analysis tool , Diva4Rhino, the results show that RadVR outperforms Diva4Rhino in spatial understanding tasks, navigation and sun position analysis .", "after_revision": "This work introduces RadVR, a virtual reality tool for daylighting analysis that simultaneously combines qualitative assessments through immersive real-time renderings with quantitative physically correct daylighting simulations in a 6DOF virtual environment. By taking a 3D building model with material properties as input , RadVR allows users to (1) perform physically-based daylighting simulations via Radiance, (2) study sunlight in different hours-of-the-year, (3) interact with a 9-point-in-time matrix for the most representative times of the year , and (4) visualize, compare, and analyze daylighting simulation results . With an end-to-end workflow, RadVR integrates with 3D modeling software that is commonly used by building designers. Additionally, by conducting user experiments we compare the proposed system with DIVA for Rhino, a Radiance-based tool that uses conventional 2D-displays. The results show that RadVR can provide promising assistance in spatial understanding tasks, navigation , and sun position analysis in virtual reality .", "edit_actions": [{"type": "R", "before": "daylighiting analysis tools, that simultaneously allows the analysis of qualitative immersive renderings and the assessment of quantitative data of", "after": "tool for daylighting analysis that simultaneously combines qualitative assessments through immersive real-time renderings with quantitative", "start_char_pos": 46, "end_char_pos": 193}, {"type": "R", "before": "With an end-to-end workflow and integration with commonly used modeling software, the system takes", "after": "By taking", "start_char_pos": 268, "end_char_pos": 366}, {"type": "R", "before": "model and", "after": "building model with", "start_char_pos": 372, "end_char_pos": 381}, {"type": "R", "before": "and allows user-designers", "after": ", RadVR allows users", "start_char_pos": 411, "end_char_pos": 436}, {"type": "R", "before": "powered by the Radianceengine", "after": "via Radiance,", "start_char_pos": 493, "end_char_pos": 522}, {"type": "R", "before": "penetration in different hours of the year by navigating through time", "after": "in different hours-of-the-year,", "start_char_pos": 542, "end_char_pos": 611}, {"type": "R", "before": "Interact", "after": "interact", "start_char_pos": 616, "end_char_pos": 624}, {"type": "D", "before": "nine", "after": null, "start_char_pos": 663, "end_char_pos": 667}, {"type": "A", "before": null, "after": ", and", "start_char_pos": 706, "end_char_pos": 706}, {"type": "R", "before": "Visualize, compare", "after": "visualize, compare,", "start_char_pos": 711, "end_char_pos": 729}, {"type": "R", "before": "using integrated tools in virtual reality. By", "after": ". With an end-to-end workflow, RadVR integrates with 3D modeling software that is commonly used by building designers. Additionally, by", "start_char_pos": 773, "end_char_pos": 818}, {"type": "R", "before": "and comparing the system with a conventional 2D-display daylight analysis tool , Diva4Rhino, the", "after": "we compare the proposed system with DIVA for Rhino, a Radiance-based tool that uses conventional 2D-displays. The", "start_char_pos": 847, "end_char_pos": 943}, {"type": "R", "before": "outperforms Diva4Rhino", "after": "can provide promising assistance", "start_char_pos": 968, "end_char_pos": 990}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1034, "end_char_pos": 1034}, {"type": "A", "before": null, "after": "in virtual reality", "start_char_pos": 1061, "end_char_pos": 1061}], "sents_char_pos": [0, 267, 443, 815]}
+{"doc_id": "1907.02936", "revision_depth": "1", "before_revision": "Surprise-based learning allows agents to adapt quickly in non-stationary stochastic environments . Most existing approaches to surprise-based learning and change point detection assume either implicitly or explicitly a simple, hierarchical generative model of observation sequences that are characterized by stationary periods separated by sudden changes. In this work we show that exact Bayesian inference gives naturally rise to a surprise-modulated trade-off between URLetting and integrating the new observations with the current belief. We demonstrate that many existing approximate Bayesian approaches also show surprise-based modulation of learning rates, and we derive novel particle filters and variational filters with update rules that exhibit surprise-based modulation. Our derived filters have a constant scaling in observation sequence length and particularly simple update dynamics for any distribution in the exponential family. Empirical results show that these filters estimate parameters better than alternative approximate approaches and reach comparative levels of performance to computationally more expensive algorithms. The theoretical insight of casting various approaches under the same interpretation of surprise-based learning, as well as the proposed filters, may find useful applications in reinforcement learning in non-stationary environments and in the analysis of animal and human behavior .", "after_revision": "Surprise-based learning allows agents to rapidly adapt to non-stationary stochastic environments characterized by stationary periods separated by sudden changes. We show that exact Bayesian inference in a hierarchical model gives rise to a surprise-modulated trade-off between URLetting old observations and integrating them with the new ones. The modulation depends on a probability ratio, called the \"Bayes Factor Surprise\" that tests the prior belief against the current belief. We demonstrate that in several existing approximate algorithms the Bayes Factor Surprise modulates the rate of adaptation to new observations. We derive three novel surprised-based algorithms, one in the family of particle filters, one in the family of variational learning, and the other in the family of message passing, that are biologically plausible, have constant scaling in observation sequence length and particularly simple update dynamics for any distribution in the exponential family. Empirical results show that these surprise-based algorithms estimate parameters better than alternative approximate approaches and reach levels of performance comparable to computationally more expensive algorithms. The Bayes Factor Surprise is related to but different from Shannon Surprise. In two hypothetical experiments, we make testable predictions for physiological or behavioral indicators that dissociate the Bayes Factor Surprise from Shannon Surprise. The theoretical insight of casting various approaches as surprise-based learning, as well as the proposed online algorithms, may be applied to the analysis of animal and human behavior , and to reinforcement learning in non-stationary environments .", "edit_actions": [{"type": "R", "before": "adapt quickly in", "after": "rapidly adapt to", "start_char_pos": 41, "end_char_pos": 57}, {"type": "D", "before": ". Most existing approaches to surprise-based learning and change point detection assume either implicitly or explicitly a simple, hierarchical generative model of observation sequences that are", "after": null, "start_char_pos": 97, "end_char_pos": 290}, {"type": "R", "before": "In this work we", "after": "We", "start_char_pos": 356, "end_char_pos": 371}, {"type": "R", "before": "gives naturally", "after": "in a hierarchical model gives", "start_char_pos": 407, "end_char_pos": 422}, {"type": "R", "before": "and integrating the new observations with the", "after": "old observations and integrating them with the new ones. The modulation depends on a probability ratio, called the \"Bayes Factor Surprise\" that tests the prior belief against the", "start_char_pos": 480, "end_char_pos": 525}, {"type": "R", "before": "many existing approximate Bayesian approaches also show surprise-based modulation of learning rates, and we derive novel particle filters and variational filters with update rules that exhibit surprise-based modulation. Our derived filters have a", "after": "in several existing approximate algorithms the Bayes Factor Surprise modulates the rate of adaptation to new observations. We derive three novel surprised-based algorithms, one in the family of particle filters, one in the family of variational learning, and the other in the family of message passing, that are biologically plausible, have", "start_char_pos": 562, "end_char_pos": 808}, {"type": "R", "before": "filters", "after": "surprise-based algorithms", "start_char_pos": 979, "end_char_pos": 986}, {"type": "D", "before": "comparative", "after": null, "start_char_pos": 1064, "end_char_pos": 1075}, {"type": "A", "before": null, "after": "comparable", "start_char_pos": 1098, "end_char_pos": 1098}, {"type": "A", "before": null, "after": "Bayes Factor Surprise is related to but different from Shannon Surprise. In two hypothetical experiments, we make testable predictions for physiological or behavioral indicators that dissociate the Bayes Factor Surprise from Shannon Surprise. The", "start_char_pos": 1149, "end_char_pos": 1149}, {"type": "R", "before": "under the same interpretation of", "after": "as", "start_char_pos": 1200, "end_char_pos": 1232}, {"type": "R", "before": "filters, may find useful applications in reinforcement learning in non-stationary environments and in", "after": "online algorithms, may be applied to", "start_char_pos": 1282, "end_char_pos": 1383}, {"type": "A", "before": null, "after": ", and to reinforcement learning in non-stationary environments", "start_char_pos": 1426, "end_char_pos": 1426}], "sents_char_pos": [0, 98, 355, 541, 781, 944, 1144]}
+{"doc_id": "1907.07412", "revision_depth": "1", "before_revision": "This paper provides a unified approach for detecting sample selection in nonparametric conditional mean and quantile functions. In fact, as sample selection leads to a loss of point identification in the nonparametric quantile case, our tests are of particular relevance when interest lies in the conditional distribution. Our testing strategy consists of a two-step procedure: the first test is an omitted predictor test , where the omitted variable is the propensity score . This test has power against generic n-alternatives , and failure to reject the null implies no selection . By contrast, as any omnibus test, we cannot distinguish between a rejection due to genuine selection or to generic mis-specification, when the omitted variable is correlated with the propensity score. Under the maintained assumption of no selection , our second test is therefore designed to detect mis-specification. This is achieved by a localized version of the first test, using only individuals with propensity score close to one . Although the second step requires `identification at infinity' , we can allow for cases of irregular identification. Finally, our testing procedure does not require any parametric assumptions on neither the outcome nor the selection equation(s) , and all our results in the conditional quantile case hold uniformly across quantile ranks in a compact set. We apply our procedure to test for selection in log hourly wages of females and males in the UK using the UK Family Expenditure Survey .", "after_revision": "This paper provides a unified approach for detecting sample selection in nonparametric conditional quantileand mean functions. Our testing strategy consists of a two-step procedure: the first test is an omitted predictor test with the propensity score as omitted variable . This test has power against n-alternatives . While failure to reject the null implies no selection , we cannot, as any omnibus test, distinguish between rejection due to genuine selection or to misspecification. Since differentiation of the latter has implications for nonparametric (point) identification and estimation of the conditional quantile function , our second test is designed to detect misspecification. Using only individuals with propensity score close to one , this test relies on an `identification at infinity' argument, but accommodates cases of irregular identification. Finally, our testing procedure does not require any parametric assumptions on the selection equation , and all our results in the quantile case hold uniformly across quantile ranks in a compact set. We apply our procedure to test for selection in log hourly wages using UK Family Expenditure Survey data .", "edit_actions": [{"type": "R", "before": "mean and quantile functions. In fact, as sample selection leads to a loss of point identification in the nonparametric quantile case, our tests are of particular relevance when interest lies in the conditional distribution.", "after": "quantile", "start_char_pos": 99, "end_char_pos": 322}, {"type": "A", "before": null, "after": "and", "start_char_pos": 322, "end_char_pos": 322}, {"type": "A", "before": null, "after": "mean functions.", "start_char_pos": 323, "end_char_pos": 323}, {"type": "R", "before": ", where the omitted variable is the propensity score", "after": "with the propensity score as omitted variable", "start_char_pos": 423, "end_char_pos": 475}, {"type": "D", "before": "generic", "after": null, "start_char_pos": 506, "end_char_pos": 513}, {"type": "R", "before": ", and", "after": ". While", "start_char_pos": 529, "end_char_pos": 534}, {"type": "R", "before": ". By contrast,", "after": ", we cannot,", "start_char_pos": 583, "end_char_pos": 597}, {"type": "R", "before": "we cannot distinguish between a", "after": "distinguish between", "start_char_pos": 619, "end_char_pos": 650}, {"type": "R", "before": "generic mis-specification, when the omitted variable is correlated with the propensity score. Under the maintained assumption of no selection", "after": "misspecification. Since differentiation of the latter has implications for nonparametric (point) identification and estimation of the conditional quantile function", "start_char_pos": 692, "end_char_pos": 833}, {"type": "D", "before": "therefore", "after": null, "start_char_pos": 855, "end_char_pos": 864}, {"type": "R", "before": "mis-specification. This is achieved by a localized version of the first test, using", "after": "misspecification. Using", "start_char_pos": 884, "end_char_pos": 967}, {"type": "R", "before": ". Although the second step requires", "after": ", this test relies on an", "start_char_pos": 1020, "end_char_pos": 1055}, {"type": "R", "before": ", we can allow for", "after": "argument, but accommodates", "start_char_pos": 1085, "end_char_pos": 1103}, {"type": "R", "before": "neither the outcome nor the selection equation(s)", "after": "the selection equation", "start_char_pos": 1217, "end_char_pos": 1266}, {"type": "D", "before": "conditional", "after": null, "start_char_pos": 1296, "end_char_pos": 1307}, {"type": "R", "before": "of females and males in the UK using the", "after": "using", "start_char_pos": 1442, "end_char_pos": 1482}, {"type": "A", "before": null, "after": "data", "start_char_pos": 1512, "end_char_pos": 1512}], "sents_char_pos": [0, 127, 322, 477, 584, 785, 902, 1021, 1138, 1376]}
+{"doc_id": "1907.07835", "revision_depth": "1", "before_revision": "In this paper, we propose a regularized graph neural network (RGNN) for EEG-based emotion recognition. EEG signals measure the neuronal activities on different brain regions via electrodes attached on them. Existing studies do not exploit the topological structure of EEG signals effectively. Our RGNNmodel is biologically supported and captures both local and global inter-channel relations. In addition, we propose two regularizers, namely NodeDAT and EmotionDL , to improve the robustness of our model against cross-subject EEG variations and noisy labels during recording . To thoroughly evaluate our model, we conduct extensive experiment in both subject-dependent and subject-independent classification settings on two public datasets SEED and SEED-IV. Our model obtains better performance than a few competitive baselines such as SVM, DBN, DGCNN, BiDANN, and the state-of-the-art BiHDM on most of the tasks . Our model analysis demonstrates that our proposed biologically-supported adjacency matrix and two regularizers contribute consistent and significant gain to the performance of our model . Investigations on the neuronal activities reveal that pre-frontal, parietal and occipital regions may be the most informative regions in emotion recognition . In addition, local inter-channel relations between (FP1, AF3), (F6, F8) and (FP2, AF4) may provide useful information as well .", "after_revision": " EEG signals measure the neuronal activities on different brain regions via electrodes . Many existing studies on EEG-based emotion recognition do not exploit the topological structure of EEG signals . In this paper, we propose a regularized graph neural network (RGNN) for EEG-based emotion recognition, which is biologically supported and captures both local and global inter-channel relations. Specifically, we model the inter-channel relations in EEG signals via an adjacency matrix in our graph neural network where the connection and sparseness of the adjacency matrix are supported by the neurosicience theories of human URLanization. In addition, we propose two regularizers, namely node-wise domain adversarial training (NodeDAT) and emotion-aware distribution learning (EmotionDL) , to improve the robustness of our model against cross-subject EEG variations and noisy labels , respectively . To thoroughly evaluate our model, we conduct extensive experiments in both subject-dependent and subject-independent classification settings on two public datasets : SEED and SEED-IV. Our model obtains better performance than competitive baselines such as SVM, DBN, DGCNN, BiDANN, and the state-of-the-art BiHDM in most experimental settings . Our model analysis demonstrates that the proposed biologically supported adjacency matrix and two regularizers contribute consistent and significant gain to the performance . Investigations on the neuronal activities reveal that pre-frontal, parietal and occipital regions may be the most informative regions for emotion recognition, which is consistent with relevant prior studies . In addition, experimental results suggest that global inter-channel relations between the left and right hemispheres are important for emotion recognition and local inter-channel relations between (FP1, AF3), (F6, F8) and (FP2, AF4) may also provide useful information .", "edit_actions": [{"type": "D", "before": "In this paper, we propose a regularized graph neural network (RGNN) for EEG-based emotion recognition.", "after": null, "start_char_pos": 0, "end_char_pos": 102}, {"type": "R", "before": "attached on them. Existing studies", "after": ". Many existing studies on EEG-based emotion recognition", "start_char_pos": 189, "end_char_pos": 223}, {"type": "R", "before": "effectively. Our RGNNmodel", "after": ". In this paper, we propose a regularized graph neural network (RGNN) for EEG-based emotion recognition, which", "start_char_pos": 280, "end_char_pos": 306}, {"type": "A", "before": null, "after": "Specifically, we model the inter-channel relations in EEG signals via an adjacency matrix in our graph neural network where the connection and sparseness of the adjacency matrix are supported by the neurosicience theories of human URLanization.", "start_char_pos": 393, "end_char_pos": 393}, {"type": "R", "before": "NodeDAT and EmotionDL", "after": "node-wise domain adversarial training (NodeDAT) and emotion-aware distribution learning (EmotionDL)", "start_char_pos": 443, "end_char_pos": 464}, {"type": "R", "before": "during recording", "after": ", respectively", "start_char_pos": 560, "end_char_pos": 576}, {"type": "R", "before": "experiment", "after": "experiments", "start_char_pos": 634, "end_char_pos": 644}, {"type": "A", "before": null, "after": ":", "start_char_pos": 742, "end_char_pos": 742}, {"type": "D", "before": "a few", "after": null, "start_char_pos": 803, "end_char_pos": 808}, {"type": "R", "before": "on most of the tasks", "after": "in most experimental settings", "start_char_pos": 895, "end_char_pos": 915}, {"type": "R", "before": "our proposed biologically-supported", "after": "the proposed biologically supported", "start_char_pos": 955, "end_char_pos": 990}, {"type": "D", "before": "of our model", "after": null, "start_char_pos": 1091, "end_char_pos": 1103}, {"type": "R", "before": "in emotion recognition", "after": "for emotion recognition, which is consistent with relevant prior studies", "start_char_pos": 1240, "end_char_pos": 1262}, {"type": "A", "before": null, "after": "experimental results suggest that global inter-channel relations between the left and right hemispheres are important for emotion recognition and", "start_char_pos": 1278, "end_char_pos": 1278}, {"type": "A", "before": null, "after": "also", "start_char_pos": 1357, "end_char_pos": 1357}, {"type": "D", "before": "as well", "after": null, "start_char_pos": 1385, "end_char_pos": 1392}], "sents_char_pos": [0, 102, 206, 292, 392, 578, 760, 917, 1105, 1264]}
+{"doc_id": "1907.09738", "revision_depth": "1", "before_revision": "Quantitative analyses of cells' nuclei in microscopical images is an essential yet still challenging step for further biological and pathological information. Accurate detection and segmentation of densely-packed nuclei in images acquired under a variety of conditions is the major challenge. With a sufficient number of training examples, Mask R-CNN based methods have achieved state-of-the-art results on nuclei segmentation. However, the current pipeline requires fully-annotated training images, which are time-consuming to create and sometimes infeasible because of the noisy nature of microscopical images. On the other hand , nuclei often have similar appearances within the same image - this could be utilized to segment nuclei with only partially labeled training examples. We propose a simple , yet effective region proposal module for the current Mask R-CNN pipeline to perform few exemplar learning. To capture the similarities between the unlabeled image regions and labeled nuclei, we apply decomposed self-attention to the learned image features. By carefully examining the self-attention map of the labeled nuclei , we observe strong activations on the centers and edges of all nuclei in the image, including those unlabeled . Based on this , our region proposal module propagates the partial annotations to the whole image , and then generates effective bounding box proposals for the bounding box regression and binary mask generation modules. When training with only 1/4 of the nuclei annotation , the baseline pipeline suffers from severe false negatives, while our approach can retain a comparable detection accuracy , compared to that of training with the fully annotated data. Moreover, our method can be used as a bootstrapping step to create full annotation of a dataset, where annotations are iteratively generated and corrected until the predetermined coverage and accuracy has been reached.", "after_revision": "Quantitative analysis of cell nuclei in microscopic images is an essential yet still challenging source of biological and pathological information. The major challenge is accurate detection and segmentation of densely packed nuclei in images acquired under a variety of conditions . With sufficient training examples, Mask R-CNN-based methods have achieved state-of-the-art nucleus segmentation. However, the current pipeline requires fully annotated training images, which are time consuming to create and sometimes infeasible because of the noisy nature of microscopic images. Importantly , nuclei often have similar appearances within the same image ; this similarity could be utilized to segment nuclei with only partially labeled training examples. We propose a simple yet effective region proposal module for the current Mask R-CNN pipeline to perform few-exemplar learning. To capture the similarities between the unlabeled regions and labeled nuclei, we apply decomposed self-attention to the learned features. On the self-attention map , we observe strong activation at the centers and edges of all nuclei , including the unlabeled ones. On this basis, our region proposal module propagates the partial annotations to the whole image and then proposes effective bounding boxes for the bounding box regression and binary mask generation modules. When trained with only 1/4 of the nuclei annotated , the baseline pipeline gives frequent false negatives, while our approach retains detection accuracy comparable to that of training with the fully annotated data. Moreover, our method can serve as a bootstrapping step to create a full annotation of a dataset, where annotations are iteratively generated and corrected until the predetermined coverage and accuracy are reached. The source code is available at URL", "edit_actions": [{"type": "R", "before": "analyses of cells' nuclei in microscopical", "after": "analysis of cell nuclei in microscopic", "start_char_pos": 13, "end_char_pos": 55}, {"type": "R", "before": "step for further", "after": "source of", "start_char_pos": 101, "end_char_pos": 117}, {"type": "R", "before": "Accurate", "after": "The major challenge is accurate", "start_char_pos": 159, "end_char_pos": 167}, {"type": "R", "before": "densely-packed", "after": "densely packed", "start_char_pos": 198, "end_char_pos": 212}, {"type": "R", "before": "is the major challenge. With a sufficient number of", "after": ". With sufficient", "start_char_pos": 269, "end_char_pos": 320}, {"type": "R", "before": "R-CNN based", "after": "R-CNN-based", "start_char_pos": 345, "end_char_pos": 356}, {"type": "R", "before": "results on nuclei", "after": "nucleus", "start_char_pos": 396, "end_char_pos": 413}, {"type": "R", "before": "fully-annotated", "after": "fully annotated", "start_char_pos": 467, "end_char_pos": 482}, {"type": "R", "before": "time-consuming", "after": "time consuming", "start_char_pos": 510, "end_char_pos": 524}, {"type": "R", "before": "microscopical images. On the other hand", "after": "microscopic images. Importantly", "start_char_pos": 591, "end_char_pos": 630}, {"type": "R", "before": "- this", "after": "; this similarity", "start_char_pos": 693, "end_char_pos": 699}, {"type": "D", "before": ",", "after": null, "start_char_pos": 803, "end_char_pos": 804}, {"type": "R", "before": "few exemplar", "after": "few-exemplar", "start_char_pos": 889, "end_char_pos": 901}, {"type": "D", "before": "image", "after": null, "start_char_pos": 962, "end_char_pos": 967}, {"type": "R", "before": "image features. By carefully examining", "after": "features. On", "start_char_pos": 1046, "end_char_pos": 1084}, {"type": "D", "before": "of the labeled nuclei", "after": null, "start_char_pos": 1108, "end_char_pos": 1129}, {"type": "R", "before": "activations on", "after": "activation at", "start_char_pos": 1150, "end_char_pos": 1164}, {"type": "D", "before": "in the image, including those unlabeled . Based on this", "after": null, "start_char_pos": 1201, "end_char_pos": 1256}, {"type": "A", "before": null, "after": "including the unlabeled ones. On this basis,", "start_char_pos": 1259, "end_char_pos": 1259}, {"type": "R", "before": ", and then generates effective bounding box proposals", "after": "and then proposes effective bounding boxes", "start_char_pos": 1341, "end_char_pos": 1394}, {"type": "R", "before": "training", "after": "trained", "start_char_pos": 1468, "end_char_pos": 1476}, {"type": "R", "before": "annotation", "after": "annotated", "start_char_pos": 1505, "end_char_pos": 1515}, {"type": "R", "before": "suffers from severe", "after": "gives frequent", "start_char_pos": 1540, "end_char_pos": 1559}, {"type": "R", "before": "can retain a comparable detection accuracy , compared", "after": "retains detection accuracy comparable", "start_char_pos": 1596, "end_char_pos": 1649}, {"type": "R", "before": "be used", "after": "serve", "start_char_pos": 1726, "end_char_pos": 1733}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1768, "end_char_pos": 1768}, {"type": "R", "before": "has been reached.", "after": "are reached. The source code is available at URL", "start_char_pos": 1903, "end_char_pos": 1920}], "sents_char_pos": [0, 158, 292, 427, 612, 782, 911, 1061, 1462, 1700]}
+{"doc_id": "1907.12030", "revision_depth": "1", "before_revision": "Gene regulatory networks (GRNs) are complex systems in which many genes mutually regulate their expressions for changing the cell state adaptively to the environmental conditions. Besides the functions , the GRNs utilized by living systems possess several kinds of robustness. Here, the robustness means that the GRNs do not lose their functions when exposed to mutation or noises. Both the adaptive response and the robustness have been acquired through the evolution. In this respect, real GRNs are rare among \"all the possible GRNs\" . In this study, we explore the fitness landscape of GRNs and investigate how the robustness emerge in the \"well-fitted\" GRNs. For that purpose, we employ the Multi-Canonical Monte Carlo method, which can sample GRNs randomly in wide range of fitness. We consider a toy model of GRNs having one input gene and one output gene. The difference in the expression levels between the input states \"on\" and \"off\" is taken as the fitness. Thus the more sensitively a GRN responds to the input , the fitter it is.We show the following properties for the GRNs in the \"fittest ensemble\" : (1) They distinguish two different states of the input by switching the fixed points . Thus they exhibit bistability , which necessarily emerges as the fitness becomes high. (2) They are robust against noises thanks to the bistability. (3) Many GRNs in the fittest ensemble are robust against mutation. These properties are universal irrespective of the evolutionary pathway, because we did not perform evolutionary simulations .", "after_revision": "Gene regulatory networks (GRNs) are complex systems in which many genes regulate mutually to adapt the cell state to environmental conditions. In addition to function , the GRNs possess several kinds of robustness. This robustness means that systems do not lose their functionality when exposed to disturbances such as mutations or noise, and is widely observed at many levels in living systems. Both function and robustness have been acquired through evolution. In this respect, GRNs utilized in living systems are rare among all possible GRNs . In this study, we explored the fitness landscape of GRNs and investigated how robustness emerged in highly-fit GRNs. We considered a toy model of GRNs with one input gene and one output gene. The difference in the expression level of the output gene between two input states, \"on\" and \"off\" , was considered as fitness. Thus , the determination of the fitness of a GRN was based on how sensitively it responded to the input .We employed the multicanonical Monte Carlo method, which can sample GRNs randomly in a wide range of fitness levels, and classified the GRNs according to their fitness. The following properties were found : (1) Highly-fit GRNs exhibited bistability for intermediate input between \"on\" and \"off\". This means that such GRNs responded to two input states by using different fixed points of dynamics. This bistability emerges necessarily as fitness increases . (2) These highly-fit GRNs were robust against noise because of their bistability. In other words, noise robustness is a byproduct of high fitness. (3) GRNs that were robust against mutations were not extremely rare among the highly-fit GRNs. This implies that mutational robustness is readily acquired through the evolutionary process. These properties are universal irrespective of the evolutionary pathway, because the results do not rely on evolutionary simulation .", "edit_actions": [{"type": "R", "before": "mutually regulate their expressions for changing", "after": "regulate mutually to adapt", "start_char_pos": 72, "end_char_pos": 120}, {"type": "R", "before": "adaptively to the", "after": "to", "start_char_pos": 136, "end_char_pos": 153}, {"type": "R", "before": "Besides the functions", "after": "In addition to function", "start_char_pos": 180, "end_char_pos": 201}, {"type": "D", "before": "utilized by living systems", "after": null, "start_char_pos": 213, "end_char_pos": 239}, {"type": "R", "before": "Here, the", "after": "This", "start_char_pos": 277, "end_char_pos": 286}, {"type": "R", "before": "the GRNs", "after": "systems", "start_char_pos": 309, "end_char_pos": 317}, {"type": "R", "before": "functions", "after": "functionality", "start_char_pos": 336, "end_char_pos": 345}, {"type": "R", "before": "mutation or noises. Both the adaptive response and the", "after": "disturbances such as mutations or noise, and is widely observed at many levels in living systems. Both function and", "start_char_pos": 362, "end_char_pos": 416}, {"type": "D", "before": "the", "after": null, "start_char_pos": 455, "end_char_pos": 458}, {"type": "R", "before": "real GRNs", "after": "GRNs utilized in living systems", "start_char_pos": 487, "end_char_pos": 496}, {"type": "R", "before": "\"all the possible GRNs\"", "after": "all possible GRNs", "start_char_pos": 512, "end_char_pos": 535}, {"type": "R", "before": "explore", "after": "explored", "start_char_pos": 556, "end_char_pos": 563}, {"type": "R", "before": "investigate how the robustness emerge in the \"well-fitted\" GRNs. For that purpose, we employ the Multi-Canonical Monte Carlo method, which can sample GRNs randomly in wide range of fitness. We consider", "after": "investigated how robustness emerged in highly-fit GRNs. We considered", "start_char_pos": 598, "end_char_pos": 799}, {"type": "R", "before": "having", "after": "with", "start_char_pos": 820, "end_char_pos": 826}, {"type": "R", "before": "levels between the input states", "after": "level of the output gene between two input states,", "start_char_pos": 896, "end_char_pos": 927}, {"type": "R", "before": "is taken as the", "after": ", was considered as", "start_char_pos": 943, "end_char_pos": 958}, {"type": "R", "before": "the more sensitively a GRN responds", "after": ", the determination of the fitness of a GRN was based on how sensitively it responded", "start_char_pos": 973, "end_char_pos": 1008}, {"type": "R", "before": ", the fitter it is.We show the following properties for the GRNs in the \"fittest ensemble\"", "after": ".We employed the multicanonical Monte Carlo method, which can sample GRNs randomly in a wide range of fitness levels, and classified the GRNs according to their fitness. The following properties were found", "start_char_pos": 1022, "end_char_pos": 1112}, {"type": "R", "before": "They distinguish two different states of the input by switching the fixed points", "after": "Highly-fit GRNs exhibited bistability for intermediate input between \"on\" and \"off\". This means that such GRNs responded to two input states by using different fixed points of dynamics. This bistability emerges necessarily as fitness increases", "start_char_pos": 1119, "end_char_pos": 1199}, {"type": "D", "before": "Thus they exhibit bistability , which necessarily emerges as the fitness becomes high.", "after": null, "start_char_pos": 1202, "end_char_pos": 1288}, {"type": "R", "before": "They are robust against noises thanks to the bistability.", "after": "These highly-fit GRNs were robust against noise because of their bistability. In other words, noise robustness is a byproduct of high fitness.", "start_char_pos": 1293, "end_char_pos": 1350}, {"type": "R", "before": "Many GRNs in the fittest ensemble are robust against mutation.", "after": "GRNs that were robust against mutations were not extremely rare among the highly-fit GRNs. This implies that mutational robustness is readily acquired through the evolutionary process.", "start_char_pos": 1355, "end_char_pos": 1417}, {"type": "R", "before": "we did not perform evolutionary simulations", "after": "the results do not rely on evolutionary simulation", "start_char_pos": 1499, "end_char_pos": 1542}], "sents_char_pos": [0, 179, 276, 381, 469, 787, 862, 967, 1041, 1201, 1288, 1350, 1417]}
+{"doc_id": "1908.00981", "revision_depth": "1", "before_revision": "One challenging aspect of the Connected and Automated Vehicle (CAV) operation in mixed traffic is the development of a situation awareness module for CAVs. While operating on public roads, CAVs need to assess the surrounding, especially intentions of non-CAVs. Generally, CAVs demonstrate a defensive driving behavior, and CAVs expect other non-autonomous entities on the road will follow the traffic rules or common driving norms . However, the presence of aggressive human drivers in the surrounding environment, who may not follow traffic rules and behave abruptly, can lead to serious safety consequences. In this paper, we have addressed the CAV and non-CAV interaction by evaluating a situation awareness module for left-turning CAV operations in an urban area. Existing literature does not consider the intent of the follower vehicle for a left-turning movement of a CAV , and existing CAV controllers do not assess intents of the follower non-CAVs . Based on our simulation study, the situation-aware CAV controller module reduces 40 \\% of the abrupt braking of the follower non-CAVs for the scenario of 600 vphpl on the opposing through movement , compared to the base scenario with the autonomous vehicle without considering intents of the follower vehicles . For opposite through traffic volumes with 800 and 1000 vphpln, the reduction decreases to 10\\%. The analysis shows that the average travel time reductions for the opposite through traffic volumes of 600, 800 and 1000 vphpln are 61\\%, 23 \\%, and 41 \\%, respectively, for the follower non-CAV if the intent of the follower vehicle is considered by a CAV in making a left turn at an intersection.", "after_revision": "One challenging aspect of the Connected and Automated Vehicle (CAV) operation in mixed traffic is the development of a situation-awareness module for CAVs. While operating on public roads, CAVs need to assess their surroundings, especially the intentions of non-CAVs. Generally, CAVs demonstrate a defensive driving behavior, and CAVs expect other non-autonomous entities on the road will follow the traffic rules or common driving behavior . However, the presence of aggressive human drivers in the surrounding environment, who may not follow traffic rules and behave abruptly, can lead to serious safety consequences. In this paper, we have addressed the CAV and non-CAV interaction by evaluating a situation-awareness module for left-turning CAV operations in an urban area. Existing literature does not consider the intent of the following vehicle for a CAVs left-turning movement , and existing CAV controllers do not assess the following non-CAVs intents . Based on our simulation study, the situation-aware CAV controller module reduces up to 27 \\% of the abrupt braking of the following non-CAVs for scenarios with different opposing through movement compared to the base scenario with the autonomous vehicle , without considering the following vehicles intent. The analysis shows that the average travel time reductions for the opposite through traffic volumes of 600, 800 , and 1000 vehicle/hour/lane are 58\\%, 52 \\%, and 62 \\%, respectively, for the aggressive human driver following the CAV if the following vehicles intent is considered by a CAV in making a left turn at an intersection.", "edit_actions": [{"type": "R", "before": "situation awareness", "after": "situation-awareness", "start_char_pos": 119, "end_char_pos": 138}, {"type": "R", "before": "the surrounding, especially", "after": "their surroundings, especially the", "start_char_pos": 209, "end_char_pos": 236}, {"type": "R", "before": "norms", "after": "behavior", "start_char_pos": 425, "end_char_pos": 430}, {"type": "R", "before": "situation awareness", "after": "situation-awareness", "start_char_pos": 691, "end_char_pos": 710}, {"type": "R", "before": "follower", "after": "following", "start_char_pos": 824, "end_char_pos": 832}, {"type": "A", "before": null, "after": "CAVs", "start_char_pos": 847, "end_char_pos": 847}, {"type": "D", "before": "of a CAV", "after": null, "start_char_pos": 870, "end_char_pos": 878}, {"type": "R", "before": "intents of the follower", "after": "the following", "start_char_pos": 924, "end_char_pos": 947}, {"type": "A", "before": null, "after": "intents", "start_char_pos": 957, "end_char_pos": 957}, {"type": "R", "before": "40", "after": "up to 27", "start_char_pos": 1041, "end_char_pos": 1043}, {"type": "R", "before": "follower", "after": "following", "start_char_pos": 1076, "end_char_pos": 1084}, {"type": "R", "before": "the scenario of 600 vphpl on the", "after": "scenarios with different", "start_char_pos": 1098, "end_char_pos": 1130}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1157, "end_char_pos": 1158}, {"type": "R", "before": "without considering intents of the follower vehicles . For opposite through traffic volumes with 800 and 1000 vphpln, the reduction decreases to 10\\%.", "after": ", without considering the following vehicles intent.", "start_char_pos": 1217, "end_char_pos": 1367}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1480, "end_char_pos": 1480}, {"type": "R", "before": "vphpln are 61\\%, 23", "after": "vehicle/hour/lane are 58\\%, 52", "start_char_pos": 1490, "end_char_pos": 1509}, {"type": "R", "before": "41", "after": "62", "start_char_pos": 1518, "end_char_pos": 1520}, {"type": "R", "before": "follower non-CAV if the intent of the follower vehicle", "after": "aggressive human driver following the CAV if the following vehicles intent", "start_char_pos": 1547, "end_char_pos": 1601}], "sents_char_pos": [0, 155, 260, 432, 609, 767, 880, 1271, 1367]}
+{"doc_id": "1908.04875", "revision_depth": "1", "before_revision": "Standard approaches for uncertainty quantification (UQ) in cardiovascular modeling pose challenges due to the large number of uncertain inputs and the significant computational cost of realistic 3D simulations. We propose an efficient UQ framework utilizing a multilevel multifidelity Monte Carlo (MLMF) estimator to improve the accuracy of hemodynamic quantities of interest while maintaining reasonable computational cost. This is achieved by leveraging three cardiovascular model fidelities, each with varying spatial resolution to rigorously quantify the variability in hemodynamic outputs. Our goal is to investigate and compare the efficiency of estimators built from two low-fidelity model alternatives and our high-fidelity 3D models. We demonstrate this framework on healthy and diseased models of aortic and coronary anatomy, including uncertainties in material property and boundary condition parameters. Our goal is to demonstrate that for this application it is possible to accelerate the convergence of the estimators by utilizing a MLMF paradigm. Therefore, we compare our approach to single fidelity Monte Carlo estimators and to a multilevel Monte Carlo approach based only on 3D simulations, but leveraging multiple spatial resolutions . We demonstrate significant , on the order of 10 to 100 times, reduction in total computational cost with the MLMF estimators. We also examine the differing properties of the MLMF estimators in healthy versus diseased models, as well as global versus local quantities of interest. As expected, healthy models and global quantities show larger reductions than diseased models and local quantities as the latter rely more heavily on the highest fidelity model evaluations. In all cases, our workflow coupling Dakota MLMF estimators with the SimVascular cardiovascular workflow make UQ feasible for constrained computational budgets.", "after_revision": "Standard approaches for uncertainty quantification in cardiovascular modeling pose challenges due to the large number of uncertain inputs and the significant computational cost of realistic three-dimensional simulations. We propose an efficient uncertainty quantification framework utilizing a multilevel multifidelity Monte Carlo estimator to improve the accuracy of hemodynamic quantities of interest while maintaining reasonable computational cost. This is achieved by leveraging three cardiovascular model fidelities, each with varying spatial resolution to rigorously quantify the variability in hemodynamic outputs. We employ two low-fidelity models to construct several different estimators. Our goal is to investigate and compare the efficiency of estimators built from combinations of these low-fidelity and high-fidelity models. We demonstrate this framework on healthy and diseased models of aortic and coronary anatomy, including uncertainties in material property and boundary condition parameters. We seek to demonstrate that for this application it is possible to accelerate the convergence of the estimators by utilizing a MLMF paradigm. Therefore, we compare our approach to Monte Carlo and multilevel Monte Carlo estimators based only on three-dimensional simulations . We demonstrate significant reduction in total computational cost with the MLMF estimators. We also examine the differing properties of the MLMF estimators in healthy versus diseased models, as well as global versus local quantities of interest. As expected, global quantities and healthy models show larger reductions than local quantities and diseased model, as the latter rely more heavily on the highest fidelity model evaluations. In all cases, our workflow coupling Dakota 's MLMF estimators with the SimVascular cardiovascular modeling framework makes uncertainty quantification feasible for constrained computational budgets.", "edit_actions": [{"type": "D", "before": "(UQ)", "after": null, "start_char_pos": 51, "end_char_pos": 55}, {"type": "R", "before": "3D", "after": "three-dimensional", "start_char_pos": 195, "end_char_pos": 197}, {"type": "R", "before": "UQ", "after": "uncertainty quantification", "start_char_pos": 235, "end_char_pos": 237}, {"type": "D", "before": "(MLMF)", "after": null, "start_char_pos": 297, "end_char_pos": 303}, {"type": "A", "before": null, "after": "We employ two low-fidelity models to construct several different estimators.", "start_char_pos": 595, "end_char_pos": 595}, {"type": "R", "before": "two", "after": "combinations of these", "start_char_pos": 675, "end_char_pos": 678}, {"type": "R", "before": "model alternatives and our", "after": "and", "start_char_pos": 692, "end_char_pos": 718}, {"type": "D", "before": "3D", "after": null, "start_char_pos": 733, "end_char_pos": 735}, {"type": "R", "before": "Our goal is", "after": "We seek", "start_char_pos": 917, "end_char_pos": 928}, {"type": "R", "before": "single fidelity Monte Carlo estimators and to a", "after": "Monte Carlo and", "start_char_pos": 1101, "end_char_pos": 1148}, {"type": "R", "before": "approach", "after": "estimators", "start_char_pos": 1172, "end_char_pos": 1180}, {"type": "R", "before": "3D simulations, but leveraging multiple spatial resolutions", "after": "three-dimensional simulations", "start_char_pos": 1195, "end_char_pos": 1254}, {"type": "D", "before": ", on the order of 10 to 100 times,", "after": null, "start_char_pos": 1284, "end_char_pos": 1318}, {"type": "R", "before": "healthy models and global quantities", "after": "global quantities and healthy models", "start_char_pos": 1550, "end_char_pos": 1586}, {"type": "R", "before": "diseased models and local quantities", "after": "local quantities and diseased model,", "start_char_pos": 1615, "end_char_pos": 1651}, {"type": "A", "before": null, "after": "'s", "start_char_pos": 1770, "end_char_pos": 1770}, {"type": "R", "before": "workflow make UQ", "after": "modeling framework makes uncertainty quantification", "start_char_pos": 1823, "end_char_pos": 1839}], "sents_char_pos": [0, 210, 424, 594, 743, 916, 1062, 1256, 1382, 1536, 1726]}
+{"doc_id": "1908.05086", "revision_depth": "1", "before_revision": "By extending the crude Goldman-Hodgkin-Katz electrodiffusion model for resting-state membrane potentials in perfused axons of squid we reformulate the Hodgkin-Huxley (HH) phenomenological quantitative model to create a model which is simpler , more quantitative, and based more fundamentally on electrodiffusion principles. Our dynamical system, like that of HH, behaves as a 4-dimensional resonator exhibiting subthreshold oscillations. Speeds of propagating action potentials at 20 degrees Celsius are in very good agreement with the HH experimental value at 18.5 degrees Celsius. Unlike its HH counterpart it does not predict spike trains during prolonged constant-current stimulation, in agreement with recent experiments . Our resonator model predicts rebound spiking following prolonged hyperpolarizing stimulation, observed at 18.5 degrees Celsius by HH but not predicted at this temperature by their quantitative model. Spiking promoted by brief (0.1 ms) hyperpolarization is also predicted at room temperature by our electrodiffusion model but only at much lower temperatures (ca. 6 degrees Celsius) by the HH model. Such spiking in giant axons induced directly by brief hyperpolarizing stimulation at room temperature does not appear to have been investigated experimentally for either stationary membrane action potentialsor their propagating counterparts .", "after_revision": "By extending the crude Goldman-Hodgkin-Katz electrodiffusion model for resting-state membrane potentials in perfused giant axons of squid , we reformulate the Hodgkin-Huxley (HH) phenomenological quantitative model to create a new model which is simpler and based more fundamentally on electrodiffusion principles. Our dynamical system, like that of HH, behaves as a 4-dimensional resonator exhibiting subthreshold oscillations. The predicted speed of propagating action potentials at 20 degrees Celsius is in good agreement with the HH experimental value at 18.5 degrees Celsius. After the external concentration of calcium ions is reduced, the generation of repetitive rebound action potentials is predicted by our model, in agreement with experiment, when the membrane is stimulated by a brief (0.1 ms) depolarizing current. Unlike the HH model, our model predicts, in agreement with experiment, that prolonged constant-current stimulation does not generate spike trains in perfused axons . Our resonator model predicts rebound spiking following prolonged hyperpolarizing stimulation, observed at 18.5 degrees Celsius by HH but not predicted at this temperature by their quantitative model. Spiking promoted by brief hyperpolarization is also predicted , at room temperature , by our electrodiffusion model , but only at much lower temperatures (ca. 6 degrees Celsius) by the HH model. We discuss qualitatively, more completely than do HH, temperature dependences of the various physical effects which determine resting and action potentials .", "edit_actions": [{"type": "A", "before": null, "after": "giant", "start_char_pos": 117, "end_char_pos": 117}, {"type": "A", "before": null, "after": ",", "start_char_pos": 133, "end_char_pos": 133}, {"type": "A", "before": null, "after": "new", "start_char_pos": 221, "end_char_pos": 221}, {"type": "D", "before": ", more quantitative,", "after": null, "start_char_pos": 245, "end_char_pos": 265}, {"type": "R", "before": "Speeds", "after": "The predicted speed", "start_char_pos": 441, "end_char_pos": 447}, {"type": "R", "before": "are in very", "after": "is in", "start_char_pos": 503, "end_char_pos": 514}, {"type": "R", "before": "Unlike its HH counterpart it does not predict spike trains during prolonged", "after": "After the external concentration of calcium ions is reduced, the generation of repetitive rebound action potentials is predicted by our model, in agreement with experiment, when the membrane is stimulated by a brief (0.1 ms) depolarizing current. Unlike the HH model, our model predicts, in agreement with experiment, that prolonged", "start_char_pos": 586, "end_char_pos": 661}, {"type": "R", "before": "stimulation, in agreement with recent experiments", "after": "stimulation does not generate spike trains in perfused axons", "start_char_pos": 679, "end_char_pos": 728}, {"type": "D", "before": "(0.1 ms)", "after": null, "start_char_pos": 957, "end_char_pos": 965}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1002, "end_char_pos": 1002}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1023, "end_char_pos": 1023}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1054, "end_char_pos": 1054}, {"type": "R", "before": "Such spiking in giant axons induced directly by brief hyperpolarizing stimulation at room temperature does not appear to have been investigated experimentally for either stationary membrane action potentialsor their propagating counterparts", "after": "We discuss qualitatively, more completely than do HH, temperature dependences of the various physical effects which determine resting and action potentials", "start_char_pos": 1132, "end_char_pos": 1372}], "sents_char_pos": [0, 326, 440, 585, 730, 930, 1131]}
+{"doc_id": "1908.06869", "revision_depth": "1", "before_revision": "The world sees a proliferation of machine learning/deep learning (ML) models and their wide adoption in different application domainsrecently . This has made the profiling and characterization of ML models an increasingly pressing task for both hardware designers and system providers, as they would like to offer the best possible computing system to serve ML models with the desired latency, throughput, and energy requirements while maximizing resource utilization. Such an endeavor is challenging as the characteristics of an ML model depend on the interplay between the model, framework, system libraries, and the hardware (or the HW/SW stack). A thorough characterization requires understanding the behavior of the model execution across the HW/SW stack levels. Existing profiling tools are disjoint, however, and only focus on profiling within a particular level of the stack . This paper proposes a leveled profiling design that leverages existing profiling tools to perform across-stack profiling. The design does so in spite of the profiling overheads incurred from the profiling providers. We coupled the profiling capability with an automatic analysis pipeline to systematically characterize 65 state-of-the-art ML models. Through this characterization, we show that our across-stack profiling solution provides insights (which are difficult to discern otherwise ) on the characteristics of ML models, ML frameworks, and GPU hardware .", "after_revision": "There has been a rapid proliferation of machine learning/deep learning (ML) models and wide adoption of them in many application domains . This has made profiling and characterization of ML model performance an increasingly pressing task for both hardware designers and system providers, as they would like to offer the best possible system to serve ML models with the target latency, throughput, cost, and energy requirements while maximizing resource utilization. Such an endeavor is challenging as the characteristics of an ML model depend on the interplay between the model, framework, system libraries, and the hardware (or the HW/SW stack). Existing profiling tools are disjoint, however, and only focus on profiling within a particular level of the stack , which limits the thoroughness and usefulness of the profiling results . This paper proposes XSP --- an across-stack profiling design that gives a holistic and hierarchical view of ML model execution. XSP leverages distributed tracing to aggregate and correlate profile data from different sources. XSP introduces a leveled and iterative measurement approach that accurately captures the latencies at all levels of the HW/SW stack in spite of the profiling overhead. We couple the profiling design with an automated analysis pipeline to systematically analyze 65 state-of-the-art ML models. We demonstrate that XSP provides insights which would be difficult to discern otherwise .", "edit_actions": [{"type": "R", "before": "The world sees a", "after": "There has been a rapid", "start_char_pos": 0, "end_char_pos": 16}, {"type": "R", "before": "their wide adoption in different application domainsrecently", "after": "wide adoption of them in many application domains", "start_char_pos": 81, "end_char_pos": 141}, {"type": "D", "before": "the", "after": null, "start_char_pos": 158, "end_char_pos": 161}, {"type": "R", "before": "models", "after": "model performance", "start_char_pos": 199, "end_char_pos": 205}, {"type": "D", "before": "computing", "after": null, "start_char_pos": 332, "end_char_pos": 341}, {"type": "R", "before": "desired", "after": "target", "start_char_pos": 377, "end_char_pos": 384}, {"type": "A", "before": null, "after": "cost,", "start_char_pos": 406, "end_char_pos": 406}, {"type": "D", "before": "A thorough characterization requires understanding the behavior of the model execution across the HW/SW stack levels.", "after": null, "start_char_pos": 651, "end_char_pos": 768}, {"type": "A", "before": null, "after": ", which limits the thoroughness and usefulness of the profiling results", "start_char_pos": 884, "end_char_pos": 884}, {"type": "R", "before": "a leveled", "after": "XSP --- an across-stack", "start_char_pos": 907, "end_char_pos": 916}, {"type": "R", "before": "leverages existing profiling tools to perform across-stack profiling. The design does so", "after": "gives a holistic and hierarchical view of ML model execution. XSP leverages distributed tracing to aggregate and correlate profile data from different sources. XSP introduces a leveled and iterative measurement approach that accurately captures the latencies at all levels of the HW/SW stack", "start_char_pos": 939, "end_char_pos": 1027}, {"type": "R", "before": "overheads incurred from the profiling providers. We coupled the profiling capability with an automatic", "after": "overhead. We couple the profiling design with an automated", "start_char_pos": 1054, "end_char_pos": 1156}, {"type": "R", "before": "characterize", "after": "analyze", "start_char_pos": 1193, "end_char_pos": 1205}, {"type": "R", "before": "Through this characterization, we show that our across-stack profiling solution provides insights (which are", "after": "We demonstrate that XSP provides insights which would be", "start_char_pos": 1237, "end_char_pos": 1345}, {"type": "D", "before": ") on the characteristics of ML models, ML frameworks, and GPU hardware", "after": null, "start_char_pos": 1377, "end_char_pos": 1447}], "sents_char_pos": [0, 143, 469, 650, 768, 886, 1008, 1102, 1236]}
+{"doc_id": "1908.07395", "revision_depth": "1", "before_revision": "Using molecular dynamics (MD) to simulate drug binding unbinding is a challenge . Because it requires sampling rugged energy landscapes that separate bound and unbound states , it has a high cost and consumes significant computational resources. Here, we describe the use of interactive molecular dynamics in virtual reality (iMD-VR) as a low-cost strategy for generating reversible protein-ligand binding and unbinding pathways . We outline an experimental protocol which enables expert iMD-VR users to generate reversible pathways for guiding ligands into and out of the binding pockets of trypsin, neuraminidase, and HIV-1 protease, and recreate their respective crystallographic protein-ligand binding poses within 5 - 10 minutes. Detailed test carried out to evaluate the use of iMD-VR by novices showed that (following a brief training phase ) they were similarly able to generate unbinding and rebinding pathways which recovered binding poses on similar timescales as the experts . These results indicate that iMD-VR affords sufficient control for users to generate reversible binding pathways that recover crystallographic poses, offering a new approach for simulating drug docking and generating binding hypothesis .", "after_revision": "Simulating drug binding and unbinding is a challenge , as the rugged energy landscapes that separate bound and unbound states require extensive sampling that consumes significant computational resources. Here, we describe the use of interactive molecular dynamics in virtual reality (iMD-VR) as an accurate low-cost strategy for flexible protein-ligand docking . We outline an experimental protocol which enables expert iMD-VR users to guide ligands into and out of the binding pockets of trypsin, neuraminidase, and HIV-1 protease, and recreate their respective crystallographic protein-ligand binding poses within 5 - 10 minutes. Following a brief training phase , our studies shown that iMD-VR novices were able to generate unbinding and rebinding pathways on similar timescales as iMD-VR experts, with the majority able to recover binding poses within 2.15 Angstrom RMSD of the crystallographic binding pose . These results indicate that iMD-VR affords sufficient control for users to carry out the detailed atomic manipulations required to dock flexible ligands into dynamic enzyme active sites and recover crystallographic poses, offering an interesting new approach for simulating drug docking and generating binding hypotheses .", "edit_actions": [{"type": "R", "before": "Using molecular dynamics (MD) to simulate drug binding", "after": "Simulating drug binding and", "start_char_pos": 0, "end_char_pos": 54}, {"type": "R", "before": ". Because it requires sampling", "after": ", as the", "start_char_pos": 80, "end_char_pos": 110}, {"type": "R", "before": ", it has a high cost and", "after": "require extensive sampling that", "start_char_pos": 175, "end_char_pos": 199}, {"type": "R", "before": "a", "after": "an accurate", "start_char_pos": 337, "end_char_pos": 338}, {"type": "R", "before": "generating reversible", "after": "flexible", "start_char_pos": 361, "end_char_pos": 382}, {"type": "R", "before": "binding and unbinding pathways", "after": "docking", "start_char_pos": 398, "end_char_pos": 428}, {"type": "R", "before": "generate reversible pathways for guiding", "after": "guide", "start_char_pos": 504, "end_char_pos": 544}, {"type": "R", "before": "Detailed test carried out to evaluate the use of iMD-VR by novices showed that (following", "after": "Following", "start_char_pos": 735, "end_char_pos": 824}, {"type": "R", "before": ") they were similarly", "after": ", our studies shown that iMD-VR novices were", "start_char_pos": 848, "end_char_pos": 869}, {"type": "D", "before": "which recovered binding poses", "after": null, "start_char_pos": 920, "end_char_pos": 949}, {"type": "R", "before": "the experts", "after": "iMD-VR experts, with the majority able to recover binding poses within 2.15 Angstrom RMSD of the crystallographic binding pose", "start_char_pos": 975, "end_char_pos": 986}, {"type": "R", "before": "generate reversible binding pathways that", "after": "carry out the detailed atomic manipulations required to dock flexible ligands into dynamic enzyme active sites and", "start_char_pos": 1064, "end_char_pos": 1105}, {"type": "R", "before": "a", "after": "an interesting", "start_char_pos": 1147, "end_char_pos": 1148}, {"type": "R", "before": "hypothesis", "after": "hypotheses", "start_char_pos": 1213, "end_char_pos": 1223}], "sents_char_pos": [0, 81, 245, 430, 734, 988]}
+{"doc_id": "1908.09067", "revision_depth": "1", "before_revision": "Different convolutional neural network (CNN) models have been tested for their application in histologic imaging analyses. However, these models are prone to overfitting due to their large parameter capacity, requiring more data and expensive computational resources for model training. Given these limitations, we developed and tested PlexusNet for histologic evaluation using a single GPU by a batch dimension of 16x512x512x3 . We utilized 62 Hematoxylin and eosin stain (H&E) annotated histological images of radical prostatectomy cases from TCGA-PRAD and Stanford University , and 24 H&E whole-slide images with hepatocellular carcinoma from TCGA-LIHC diagnostic histology images. Base models were DenseNet, Inception V3, and MobileNet and compared with PlexusNet. The dice coefficient (DSC) was evaluated for each model . PlexusNet delivered comparable classification performance ( DSC at patch level: 0.89) for H E whole-slice images in distinguishing prostate cancer from normal tissues. The parameter capacity of PlexusNet is 9 times smallerthan MobileNet or 58 times smaller than Inception V3, respectively. Similar findings were observed in distinguishing hepatocellular carcinoma from non-cancerous liver histologies (DSC at patch level: 0.85). As conclusion, PlexusNet represents a novel model architecture for histological image analysis that achieves classification performance comparable to the base models while providing orders-of-magnitude memory savings .", "after_revision": "Different convolutional neural network (CNN) models have been tested for their application in histological image analyses. However, these models are prone to overfitting due to their large parameter capacity, requiring more data or valuable computational resources for model training. Given these limitations, we introduced a novel architecture (termed PlexusNet) . We utilized 310 Hematoxylin and Eosin stained (H&E) annotated histological images of prostate cancer cases from TCGA-PRAD and Stanford University and 398 H&E whole slides images from the Camelyon 2016 challenge. PlexusNet-architecture -derived models were compared to models derived from several existing \"state of the art\" architectures. We measured discrimination accuracy, calibration, and clinical utility. An ablation study was conducted to study the effect of each component of PlexusNet on model performance. A well-fitted PlexusNet-based model delivered comparable classification performance ( AUC: 0.963) in distinguishing prostate cancer from healthy tissues, although it was at least 23 times smaller, had a better model calibration and clinical utility than the comparison models. A separate smaller PlexusNet model accurately detected slides with breast cancer metastases (AUC: 0.978); it helped reduce the slide number to examine by 43.8\\% without consequences, although its parameter capacity was 200 times smaller than ResNet18. We found that the partitioning of the development set influences the model calibration for all models. However, with PlexusNet architecture, we could achieve comparable well-calibrated models trained on different partitions. In conclusion, PlexusNet represents a novel model architecture for histological image analysis that achieves classification performance comparable to other models while providing orders-of-magnitude parameter reduction .", "edit_actions": [{"type": "R", "before": "histologic imaging", "after": "histological image", "start_char_pos": 94, "end_char_pos": 112}, {"type": "R", "before": "and expensive", "after": "or valuable", "start_char_pos": 229, "end_char_pos": 242}, {"type": "R", "before": "developed and tested PlexusNet for histologic evaluation using a single GPU by a batch dimension of 16x512x512x3", "after": "introduced a novel architecture (termed PlexusNet)", "start_char_pos": 315, "end_char_pos": 427}, {"type": "R", "before": "62 Hematoxylin and eosin stain", "after": "310 Hematoxylin and Eosin stained", "start_char_pos": 442, "end_char_pos": 472}, {"type": "R", "before": "radical prostatectomy", "after": "prostate cancer", "start_char_pos": 512, "end_char_pos": 533}, {"type": "R", "before": ", and 24", "after": "and 398", "start_char_pos": 579, "end_char_pos": 587}, {"type": "R", "before": "whole-slide images with hepatocellular carcinoma from TCGA-LIHC diagnostic histology images. Base models were DenseNet, Inception V3, and MobileNet and compared with PlexusNet. The dice coefficient (DSC) was evaluated for each", "after": "whole slides images from the Camelyon 2016 challenge. PlexusNet-architecture -derived models were compared to models derived from several existing \"state of the art\" architectures. We measured discrimination accuracy, calibration, and clinical utility. An ablation study was conducted to study the effect of each component of PlexusNet on model performance. A well-fitted PlexusNet-based", "start_char_pos": 592, "end_char_pos": 818}, {"type": "D", "before": ". PlexusNet", "after": null, "start_char_pos": 825, "end_char_pos": 836}, {"type": "D", "before": "DSC at patch level: 0.89) for H", "after": null, "start_char_pos": 887, "end_char_pos": 918}, {"type": "R", "before": "E whole-slice images", "after": "AUC: 0.963)", "start_char_pos": 919, "end_char_pos": 939}, {"type": "R", "before": "normal tissues. The parameter capacity of PlexusNet is 9 times smallerthan MobileNet or 58 times smaller than Inception V3, respectively. Similar findings were observed in distinguishing hepatocellular carcinoma from non-cancerous liver histologies (DSC at patch level: 0.85). As", "after": "healthy tissues, although it was at least 23 times smaller, had a better model calibration and clinical utility than the comparison models. A separate smaller PlexusNet model accurately detected slides with breast cancer metastases (AUC: 0.978); it helped reduce the slide number to examine by 43.8\\% without consequences, although its parameter capacity was 200 times smaller than ResNet18. We found that the partitioning of the development set influences the model calibration for all models. However, with PlexusNet architecture, we could achieve comparable well-calibrated models trained on different partitions. In", "start_char_pos": 979, "end_char_pos": 1258}, {"type": "R", "before": "the base", "after": "other", "start_char_pos": 1406, "end_char_pos": 1414}, {"type": "R", "before": "memory savings", "after": "parameter reduction", "start_char_pos": 1458, "end_char_pos": 1472}], "sents_char_pos": [0, 122, 286, 429, 684, 768, 994, 1116, 1255]}
+{"doc_id": "1909.03348", "revision_depth": "1", "before_revision": "We reveal thepsychological bias of economic agents in their judgments of future economic conditions by applying the behavioral economics and weakly supervised learning . In the Economy Watcher Survey, which is a dataset published by the Japanese government, there are assessments of current and future economic conditions by people with various occupations . Although this dataset gives essential insights regarding economic policy to the Japanese government and the central bank of Japan, there is no clear definition of future economic conditions. Hence, in the survey, respondents answer their assessments based on their interpretations of the future. In our research, we classify the text data using learning from positive and unlabeled data (PU learning), which is a method of weakly supervised learning. The dataset is composed of several periods, and we develop a new algorithm of PU learning for efficient training with the dataset . Through empirical analysis, we show the interpretation of the classification results from the viewpoint of behavioral economics.", "after_revision": "We reveal the different interpretations of the future in their judgments of future economic conditions by applying weakly supervised learning and text mining . In the Economy Watcher Survey, which is a market survey published by the Japanese government, there are assessments of current and future economic conditions by people from various fields . Although this survey provides insights regarding an economic policy for policymakers in Japan, there is no clear definition of the future, in future economic conditions. Hence, in the survey, respondents make their assessments based on their interpretations of the future. In our research, we separate the assessments of future economic conditions into near and distant future economic conditions using learning from positive and unlabeled data (PU learning), which is weakly supervised learning. The dataset is composed of several periods, and we develop a PU learning algorithm for efficient training , using the dataset with the time series . Through empirical analysis, we interpret the classification results from the viewpoint of economics.", "edit_actions": [{"type": "R", "before": "thepsychological bias of economic agents", "after": "the different interpretations of the future", "start_char_pos": 10, "end_char_pos": 50}, {"type": "D", "before": "the behavioral economics and", "after": null, "start_char_pos": 112, "end_char_pos": 140}, {"type": "A", "before": null, "after": "and text mining", "start_char_pos": 168, "end_char_pos": 168}, {"type": "R", "before": "dataset", "after": "market survey", "start_char_pos": 213, "end_char_pos": 220}, {"type": "R", "before": "assessments of current and future economic conditions by people with various occupations", "after": "assessments of current and future economic conditions", "start_char_pos": 269, "end_char_pos": 357}, {"type": "A", "before": null, "after": "by people from various fields", "start_char_pos": 358, "end_char_pos": 358}, {"type": "R", "before": "dataset gives essential insights regarding economic policy to the Japanese government and the central bank of", "after": "survey provides insights regarding an economic policy for policymakers in", "start_char_pos": 375, "end_char_pos": 484}, {"type": "R", "before": "future", "after": "the future, in future", "start_char_pos": 524, "end_char_pos": 530}, {"type": "R", "before": "answer", "after": "make", "start_char_pos": 586, "end_char_pos": 592}, {"type": "R", "before": "classify the text data", "after": "separate the assessments of future economic conditions into near and distant future economic conditions", "start_char_pos": 677, "end_char_pos": 699}, {"type": "D", "before": "a method of", "after": null, "start_char_pos": 772, "end_char_pos": 783}, {"type": "R", "before": "new algorithm of PU learning", "after": "PU learning algorithm", "start_char_pos": 873, "end_char_pos": 901}, {"type": "R", "before": "with the dataset", "after": ", using the dataset with the time series", "start_char_pos": 925, "end_char_pos": 941}, {"type": "R", "before": "show the interpretation of the", "after": "interpret the", "start_char_pos": 975, "end_char_pos": 1005}, {"type": "D", "before": "behavioral", "after": null, "start_char_pos": 1051, "end_char_pos": 1061}], "sents_char_pos": [0, 170, 360, 551, 656, 811, 943]}
+{"doc_id": "1909.04452", "revision_depth": "1", "before_revision": "Income inequality is one of the most significant socio-economic challenges confronting India, with potentially long-lasting implications for the future of its democracy and society. In this work, we explore income inequality in India, without assumptions of equilibrium, and illustrate the nature and direction of re-distribution within the income distributionin a dynamic sense. Given that both mean income and income inequality show a rising trend post the Industrial Revolution, we argue that such a process is appropriately modeled using Geometric Brownian Motion (GBM). Specifically, we use the mechanism of GBM with a reallocation parameter (which indicates the nature of re-distribution occurring in the income distribution) proposed by Berman et al. We find that since the mid-1990s, reallocation is negative, meaning that incomes are exponentially diverging , indicating that there is a perverse re-distribution of resources from the poor to the rich. It has been well known that static inequality is rising in India , but the assumption has been that while the rich may be benefiting more than proportionally from economic growth, the poor are also better off than before. The surprising finding from our work is that the nature of income inequality is such that we have moved from a regime of progressive to regressive re-distribution. Essentially, continued impoverishment of the poor is directly spurring multiplicative income growth of the rich. We characterize these findings in the context of increasing informality of the workforce in the formal manufacturing and service sectors, as well as the possible evolution of negative net incomes of the agriculture workforce in India. Significant structural changes may be required to address this phenomenon.", "after_revision": "We investigate the nature and extent of reallocation occurring within the Indian income distribution, with a particular focus on the dynamics of the bottom of the distribution. We argue that income evolution is appropriately modelled using Geometric Brownian Motion (GBM). Specifically, we use the mechanism of GBM with a reallocation parameter that quantifies the extent and direction of reallocation in the distribution, as proposed by Berman et al. We find that since the early 2000s reallocation is negative, meaning that incomes are exponentially diverging and that there is a perverse redistribution of resources from the poor to the rich. It is well known that inequality has been rising in India in the recent past , but the assumption has been that while the rich benefit more than proportionally from economic growth, the poor are also better off than before. Our work refutes this as we find that India has moved from a regime of progressive to regressive redistribution, where continued impoverishment of the poor is directly spurring multiplicative income growth of the rich. Outcomes from the model suggest that income shares of the bottom decile (~1\\%) and bottom percentile (~0.03\\%) are at historic lows. We characterize these findings in the context of increasing informalization of the workforce in the formal manufacturing and service sectors, as well as the growing economic insecurity of the agricultural workforce in India. Significant structural changes will be required to address this phenomenon.", "edit_actions": [{"type": "R", "before": "Income inequality is one of", "after": "We investigate the nature and extent of reallocation occurring within the Indian income distribution, with a particular focus on the dynamics of", "start_char_pos": 0, "end_char_pos": 27}, {"type": "R", "before": "most significant socio-economic challenges confronting India, with potentially long-lasting implications for the future of its democracy and society. In this work, we explore income inequality in India, without assumptions of equilibrium, and illustrate the nature and direction of re-distribution within the income distributionin a dynamic sense. Given that both mean income and income inequality show a rising trend post the Industrial Revolution, we argue that such a process is appropriately modeled", "after": "bottom of the distribution. We argue that income evolution is appropriately modelled", "start_char_pos": 32, "end_char_pos": 535}, {"type": "R", "before": "(which indicates the nature of re-distribution occurring in the income distribution)", "after": "that quantifies the extent and direction of reallocation in the distribution, as", "start_char_pos": 647, "end_char_pos": 731}, {"type": "R", "before": "mid-1990s,", "after": "early 2000s", "start_char_pos": 781, "end_char_pos": 791}, {"type": "R", "before": ", indicating", "after": "and", "start_char_pos": 867, "end_char_pos": 879}, {"type": "R", "before": "re-distribution", "after": "redistribution", "start_char_pos": 905, "end_char_pos": 920}, {"type": "R", "before": "has been", "after": "is", "start_char_pos": 964, "end_char_pos": 972}, {"type": "R", "before": "static inequality is", "after": "inequality has been", "start_char_pos": 989, "end_char_pos": 1009}, {"type": "A", "before": null, "after": "in the recent past", "start_char_pos": 1026, "end_char_pos": 1026}, {"type": "R", "before": "may be benefiting", "after": "benefit", "start_char_pos": 1077, "end_char_pos": 1094}, {"type": "R", "before": "The surprising finding from our work is that the nature of income inequality is such that we have", "after": "Our work refutes this as we find that India has", "start_char_pos": 1184, "end_char_pos": 1281}, {"type": "R", "before": "re-distribution. Essentially,", "after": "redistribution, where", "start_char_pos": 1331, "end_char_pos": 1360}, {"type": "A", "before": null, "after": "Outcomes from the model suggest that income shares of the bottom decile (~1\\%) and bottom percentile (~0.03\\%) are at historic lows.", "start_char_pos": 1461, "end_char_pos": 1461}, {"type": "R", "before": "informality", "after": "informalization", "start_char_pos": 1522, "end_char_pos": 1533}, {"type": "R", "before": "possible evolution of negative net incomes of the agriculture", "after": "growing economic insecurity of the agricultural", "start_char_pos": 1615, "end_char_pos": 1676}, {"type": "R", "before": "may", "after": "will", "start_char_pos": 1728, "end_char_pos": 1731}], "sents_char_pos": [0, 181, 379, 574, 757, 960, 1183, 1347, 1460, 1696]}
+{"doc_id": "1909.05719", "revision_depth": "1", "before_revision": "Virtual reality (VR) has re-emerged as a low-cost, highly accessible consumer product, and training on simulators is rapidly becoming standard in many industrial sectors. Combined with the continued advancements in VR technology, the interest in platforms that generate immersive experiences has increased. However, the available systems are either focusing on gaming context, featuring limited capabilities (embedded editors in game engines) or they support only content creation of virtual environments without any rapid prototyping and modification. In this project we propose Scenior, an innovative coding-free, visual scripting platform to replicate gamified training scenarios through Rapid Prototyping via newly defined VR software design patterns. We implemented and compared three authoring tools: a) Prototyped scripting , b) Visual Scripting and c) VR Editor for rapid reconstruction of VR training scenarios. Our Visual Scripting module is capable generating training applications utilizing a node-based scripting system whereas the VR Editor gives the user/developer the ability to customize and populate new VR training scenarios directly from within the virtual environment. We also introduce Action Prototypes , a new software design pattern suitable to replicate behavioural tasks for VR experiences. In a addition, we present the scenegraph architecture as the main model to represent training scenarios on a modular, dynamic and highly adaptive acyclic graph based on a structured educational curriculum .", "after_revision": "Virtual reality (VR) has re-emerged as a low-cost, highly accessible consumer product, and training on simulators is rapidly becoming standard in many industrial sectors. However, the available systems are either focusing on gaming context, featuring limited capabilities or they support only content creation of virtual environments without any rapid prototyping and modification. In this project , we propose a code-free, visual scripting platform to replicate gamified training scenarios through rapid prototyping and VR software design patterns. We implemented and compared two authoring tools: a) visual scripting and b) VR editor for the rapid reconstruction of VR training scenarios. Our visual scripting module is capable to generate training applications utilizing a node-based scripting system whereas the VR editor gives user/developer the ability to customize and populate new VR training scenarios directly from the virtual environment. We also introduce action prototypes , a new software design pattern suitable to replicate behavioral tasks for VR experiences. In addition, we present the training scenegraph architecture as the main model to represent training scenarios on a modular, dynamic and highly adaptive acyclic graph based on a structured educational curriculum . Finally, a user-based evaluation of the proposed solution indicated that users - regardless of their programming expertise - can effectively use the tools to create and modify training scenarios in VR .", "edit_actions": [{"type": "D", "before": "Combined with the continued advancements in VR technology, the interest in platforms that generate immersive experiences has increased.", "after": null, "start_char_pos": 171, "end_char_pos": 306}, {"type": "D", "before": "(embedded editors in game engines)", "after": null, "start_char_pos": 408, "end_char_pos": 442}, {"type": "R", "before": "we propose Scenior, an innovative coding-free,", "after": ", we propose a code-free,", "start_char_pos": 569, "end_char_pos": 615}, {"type": "R", "before": "Rapid Prototyping via newly defined", "after": "rapid prototyping and", "start_char_pos": 691, "end_char_pos": 726}, {"type": "R", "before": "three", "after": "two", "start_char_pos": 784, "end_char_pos": 789}, {"type": "R", "before": "Prototyped scripting , b) Visual Scripting and c) VR Editor for", "after": "visual scripting and b) VR editor for the", "start_char_pos": 810, "end_char_pos": 873}, {"type": "R", "before": "Visual Scripting", "after": "visual scripting", "start_char_pos": 925, "end_char_pos": 941}, {"type": "R", "before": "generating", "after": "to generate", "start_char_pos": 960, "end_char_pos": 970}, {"type": "R", "before": "Editor gives the", "after": "editor gives", "start_char_pos": 1048, "end_char_pos": 1064}, {"type": "D", "before": "within", "after": null, "start_char_pos": 1158, "end_char_pos": 1164}, {"type": "R", "before": "Action Prototypes", "after": "action prototypes", "start_char_pos": 1208, "end_char_pos": 1225}, {"type": "R", "before": "behavioural", "after": "behavioral", "start_char_pos": 1280, "end_char_pos": 1291}, {"type": "D", "before": "a", "after": null, "start_char_pos": 1321, "end_char_pos": 1322}, {"type": "A", "before": null, "after": "training", "start_char_pos": 1348, "end_char_pos": 1348}, {"type": "A", "before": null, "after": ". Finally, a user-based evaluation of the proposed solution indicated that users - regardless of their programming expertise - can effectively use the tools to create and modify training scenarios in VR", "start_char_pos": 1524, "end_char_pos": 1524}], "sents_char_pos": [0, 170, 306, 552, 755, 920, 1189, 1317]}
+{"doc_id": "1909.06539", "revision_depth": "1", "before_revision": "Bioinformatics of high throughput omics data (e.g. microarrays and proteomics) has been plagued by uncountable issues with reproducibility at the start of the century. Concerns have motivated international initiatives such as the FDA's led MAQC Consortium, addressing reproducibility of predictive biomarkers by means of appropriate Data Analysis Plans (DAPs). For instance, nested cross-validation is a standard procedure meant to mitigate the risk that information from held-out validation data may be reached during model selection. We prove here that, many years later, Data Leakage can still be a non negligible overfitting source in deep learning models for digital pathology due to (i) the presence of multiple images for each subject in histology collections; (ii) the systematic adoption of training over collection of subregions ( tiles or patches ) extracted for the same subject. We quantify that between 1\\% and 12\\% of accuracy scores may result inflated , even if a well designed 10x5 nested cross-validation DAP is applied, unless all images from the same subject are kept together either in the internal training or validation splits. Results are replicated for 4 classification tasks on 3 datasets, for a total of 364 subjectsand 538 total slides ( about 27, 000 tiles). Impact of applying transfer learning methods is also discussed.", "after_revision": "Bioinformatics of high throughput omics data (e.g. microarrays and proteomics) has been plagued by uncountable issues with reproducibility at the start of the century. Concerns have motivated international initiatives such as the FDA's led MAQC Consortium, addressing reproducibility of predictive biomarkers by means of appropriate Data Analysis Plans (DAPs). For instance, repreated cross-validation is a standard procedure meant at mitigating the risk that information from held-out validation data may be used during model selection. We prove here that, many years later, Data Leakage can still be a non-negligible overfitting source in deep learning models for digital pathology . In particular, we evaluate the impact of (i) the presence of multiple images for each subject in histology collections; (ii) the systematic adoption of training over collection of subregions ( i.e. \"tiles\" or \"patches\" ) extracted for the same subject. We verify that accuracy scores may be inflated up to 41\\% , even if a well-designed 10x5 iterated cross-validation DAP is applied, unless all images from the same subject are kept together either in the internal training or validation splits. Results are replicated for 4 classification tasks in digital pathology on 3 datasets, for a total of 373 subjects, and 543 total slides ( around 27, 000 tiles). Impact of applying transfer learning strategies with models pre-trained on general-purpose or digital pathology datasets is also discussed.", "edit_actions": [{"type": "R", "before": "nested", "after": "repreated", "start_char_pos": 375, "end_char_pos": 381}, {"type": "R", "before": "to mitigate", "after": "at mitigating", "start_char_pos": 429, "end_char_pos": 440}, {"type": "R", "before": "reached", "after": "used", "start_char_pos": 504, "end_char_pos": 511}, {"type": "R", "before": "non negligible", "after": "non-negligible", "start_char_pos": 602, "end_char_pos": 616}, {"type": "R", "before": "due to", "after": ". In particular, we evaluate the impact of", "start_char_pos": 682, "end_char_pos": 688}, {"type": "R", "before": "tiles or patches", "after": "i.e. \"tiles\" or \"patches\"", "start_char_pos": 841, "end_char_pos": 857}, {"type": "R", "before": "quantify that between 1\\% and 12\\% of", "after": "verify that", "start_char_pos": 895, "end_char_pos": 932}, {"type": "R", "before": "result inflated", "after": "be inflated up to 41\\%", "start_char_pos": 953, "end_char_pos": 968}, {"type": "R", "before": "well designed", "after": "well-designed", "start_char_pos": 981, "end_char_pos": 994}, {"type": "R", "before": "nested", "after": "iterated", "start_char_pos": 1000, "end_char_pos": 1006}, {"type": "A", "before": null, "after": "in digital pathology", "start_char_pos": 1202, "end_char_pos": 1202}, {"type": "R", "before": "364 subjectsand 538", "after": "373 subjects, and 543", "start_char_pos": 1233, "end_char_pos": 1252}, {"type": "R", "before": "about", "after": "around", "start_char_pos": 1268, "end_char_pos": 1273}, {"type": "R", "before": "methods", "after": "strategies with models pre-trained on general-purpose or digital pathology datasets", "start_char_pos": 1327, "end_char_pos": 1334}], "sents_char_pos": [0, 167, 360, 535, 767, 891, 1151, 1289]}
+{"doc_id": "1909.09695", "revision_depth": "1", "before_revision": "In the last decades, the frequency of pandemics has been increased due to the growth of urbanization and mobility among countries. Since a disease spreading in one country could become a pandemic with a potential worldwide humanitarian and economic impact, it is important to develop models to estimate the probability of a worldwide pandemic. In this paper, we propose a model of disease spreading in a modular complex network (having communities) and study how the number of bridge nodes n that connect communities affects the disease spreading . We find that our model can be described at a global scale as an infectious transmission process between communities with infectious and recovery time distributions that depend on the internal structure of each community and n. At the steady state, we find that near the critical point as the number of bridge nodes increases, the disease could reach all the communitiesbut with a small fraction of recovered nodes in each community . In addition, we obtain that in this limit\\to , the probability of a pandemic increases abruptly at the critical point. This scenario could make more difficult the decision to launch or not a pandemic alert . Finally, we show that link percolation theory can be used at a global scale to estimate the probability of a pandemic .", "after_revision": "In the past few decades, the frequency of pandemics has been increased due to the growth of urbanization and mobility among countries. Since a disease spreading in one country could become a pandemic with a potential worldwide humanitarian and economic impact, it is important to develop models to estimate the probability of a worldwide pandemic. In this paper, we propose a model of disease spreading in a structural modular complex network (having communities) and study how the number of bridge nodes n that connect communities affects disease spread . We find that our model can be described at a global scale as an infectious transmission process between communities with global infectious and recovery time distributions that depend on the internal structure of each community and n. We find that near the critical point as n increases, the disease reaches most of the communities, but each community has only a small fraction of recovered nodes . In addition, we obtain that in the limit n\\to \\infty , the probability of a pandemic increases abruptly at the critical point. This scenario could make the decision on whether to launch a pandemic alert or not more difficult . Finally, we show that link percolation theory can be used at a global scale to estimate the probability of a pandemic since the global transmissibility between communities has a weak dependence on the global recovery time .", "edit_actions": [{"type": "R", "before": "last", "after": "past few", "start_char_pos": 7, "end_char_pos": 11}, {"type": "A", "before": null, "after": "structural", "start_char_pos": 404, "end_char_pos": 404}, {"type": "R", "before": "the disease spreading", "after": "disease spread", "start_char_pos": 526, "end_char_pos": 547}, {"type": "A", "before": null, "after": "global", "start_char_pos": 671, "end_char_pos": 671}, {"type": "R", "before": "At the steady state, we", "after": "We", "start_char_pos": 778, "end_char_pos": 801}, {"type": "R", "before": "the number of bridge nodes", "after": "n", "start_char_pos": 839, "end_char_pos": 865}, {"type": "R", "before": "could reach all the communitiesbut with", "after": "reaches most of the communities, but each community has only", "start_char_pos": 889, "end_char_pos": 928}, {"type": "D", "before": "in each community", "after": null, "start_char_pos": 965, "end_char_pos": 982}, {"type": "R", "before": "this limit", "after": "the limit n", "start_char_pos": 1016, "end_char_pos": 1026}, {"type": "A", "before": null, "after": "\\infty", "start_char_pos": 1030, "end_char_pos": 1030}, {"type": "R", "before": "more difficult the decision to launch or not", "after": "the decision on whether to launch", "start_char_pos": 1130, "end_char_pos": 1174}, {"type": "A", "before": null, "after": "or not more difficult", "start_char_pos": 1192, "end_char_pos": 1192}, {"type": "A", "before": null, "after": "since the global transmissibility between communities has a weak dependence on the global recovery time", "start_char_pos": 1313, "end_char_pos": 1313}], "sents_char_pos": [0, 130, 343, 549, 777, 984, 1104, 1194]}
+{"doc_id": "1910.03337", "revision_depth": "1", "before_revision": "Motivation: Discovering functional modules in protein-protein interaction (PPI) networks by optimization methods remains a longstanding challenge in biology . Traditional algorithms simply consider strong protein complexes that can be found in the original network by optimizing some metrics, which causes obstacles for the discovery of weak and hidden complexes shielded by stronger complexes. Also , protein complexes are not only in different density but also in a large range of scale, making it extremely difficult to be detected. Toward this objective, we propose a hierarchical hidden community approach to predict protein complexes . Results: We propose a method called HirHide (Hierarchical Hidden Community Detection), which can be combined with traditional community detection methods to enable them to discover hierarchical hidden communities . It is the first community detection algorithm that can find a hierarchical structure as well as hidden structure . We compare the performance of three traditional methods with their HirHide versions. Experimental results show that the HirHide methods using traditional methods as the base algorithms achieve better performance , sometimes even significantly outperform the baselines.", "after_revision": " Discovering functional modules in protein-protein interaction networks through optimization remains a longstanding challenge in Biology . Traditional algorithms simply consider strong protein complexes that can be found in the original network by optimizing some metric, which may cause obstacles for the discovery of weak and hidden complexes that are overshadowed by strong complexes. Additionally , protein complexes not only have different densities but also a various range of scales, making them extremely difficult to be detected. We address these issues and propose a hierarchical hidden community detection approach to accurately predict protein complexes of various strengths and scales. We propose a meta-method called HirHide (Hierarchical Hidden Community Detection), which can adopt any standard community detection method as the base algorithm and enable it to discover hierarchical hidden communities as well as boosting the detection on hierarchical strong communities. To our knowledge, this is the first combination of hierarchical structure with hidden structure, which provides a new perspective for finding protein complexes of various strengths and scales . We compare the performance of several standard community detection methods with their HirHide versions. Experimental results show that the HirHide versions achieve better performance and sometimes even significantly outperform the baselines.", "edit_actions": [{"type": "D", "before": "Motivation:", "after": null, "start_char_pos": 0, "end_char_pos": 11}, {"type": "R", "before": "(PPI) networks by optimization methods", "after": "networks through optimization", "start_char_pos": 74, "end_char_pos": 112}, {"type": "R", "before": "biology", "after": "Biology", "start_char_pos": 149, "end_char_pos": 156}, {"type": "R", "before": "metrics, which causes", "after": "metric, which may cause", "start_char_pos": 284, "end_char_pos": 305}, {"type": "R", "before": "shielded by stronger complexes. Also", "after": "that are overshadowed by strong complexes. Additionally", "start_char_pos": 363, "end_char_pos": 399}, {"type": "R", "before": "are not only in different density but also in a large range of scale, making it", "after": "not only have different densities but also a various range of scales, making them", "start_char_pos": 420, "end_char_pos": 499}, {"type": "R", "before": "Toward this objective, we", "after": "We address these issues and", "start_char_pos": 536, "end_char_pos": 561}, {"type": "R", "before": "approach to", "after": "detection approach to accurately", "start_char_pos": 602, "end_char_pos": 613}, {"type": "R", "before": ". Results:", "after": "of various strengths and scales.", "start_char_pos": 640, "end_char_pos": 650}, {"type": "R", "before": "method", "after": "meta-method", "start_char_pos": 664, "end_char_pos": 670}, {"type": "R", "before": "be combined with traditional community detection methods to enable them", "after": "adopt any standard community detection method as the base algorithm and enable it", "start_char_pos": 739, "end_char_pos": 810}, {"type": "R", "before": ". It", "after": "as well as boosting the detection on hierarchical strong communities. To our knowledge, this", "start_char_pos": 855, "end_char_pos": 859}, {"type": "R", "before": "community detection algorithm that can find a hierarchical structure as well as hidden structure", "after": "combination of hierarchical structure with hidden structure, which provides a new perspective for finding protein complexes of various strengths and scales", "start_char_pos": 873, "end_char_pos": 969}, {"type": "R", "before": "three traditional", "after": "several standard community detection", "start_char_pos": 1002, "end_char_pos": 1019}, {"type": "R", "before": "methods using traditional methods as the base algorithms", "after": "versions", "start_char_pos": 1100, "end_char_pos": 1156}, {"type": "R", "before": ",", "after": "and", "start_char_pos": 1184, "end_char_pos": 1185}], "sents_char_pos": [0, 158, 394, 535, 856, 971, 1056]}
+{"doc_id": "1910.03821", "revision_depth": "1", "before_revision": "This paper studies Quasi Maximum Likelihood estimation of dynamic factor models for large panels of time series. Specifically, we consider the case in which the autocorrelation of the factors is explicitly accounted for and therefore the factor model has a state-space form. Estimation of the factors and their loadings is implemented by means of the Expectation Maximization algorithm, jointly with the Kalman smoother. We prove that, as both the dimension of the panel n and the sample size T diverge to infinity , the estimated loadings , factors , and common components are \\min(\\sqrt n,\\sqrt T\\to \\to )-consistent and asymptotically normal . Although the model is estimated under the unrealistic constraint of independent idiosyncratic errors, this mis-specification does not affect consistency. Moreover, we give conditions under which the derived asymptotic distribution can still be used for inference even in case of mis-specifications. Our results are confirmed by a MonteCarlo simulation exercise where we compare the performance of our estimators with Principal Components .", "after_revision": "This paper studies Quasi Maximum Likelihood estimation of dynamic factor models for large panels of time series. Specifically, we consider the case in which the autocorrelation of the factors is explicitly accounted for and therefore the model has a state-space form. Estimation of the factors and of their loadings is implemented by means of the Expectation Maximization (EM) algorithm, jointly with the Kalman smoother. ~ We prove that, as both the dimension of the panel n and the sample size T diverge to infinity : (i) the estimated loadings are \\sqrt T-consistent and asymptotically normal if \\sqrt T/n\\to 0; (ii) the estimated factors are \\sqrt n-consistent and asymptotically normal if \\sqrt n/T\\to 0; (iii) the estimated common component is \\min(\\sqrt T,\\sqrt n )-consistent and asymptotically normal regardless of the relative rate of divergence of n and T . Although the model is estimated as if the idiosyncratic terms were cross-sectionally and serially uncorrelated, we show that these mis-specifications do not affect consistency. Moreover, the estimated loadings are asymptotically as efficient as those obtained with the Principal Components estimator, whereas numerical results show that the loss in efficiency of the estimated factors becomes negligible as n and T increase.~We then propose robust estimators of the asymptotic covariances, which can be used to conduct inference on the loadings and to compute confidence intervals for the factors and common components. In a MonteCarlo simulation exercise and an analysis of US macroeconomic data, we study the performance of our estimators and we compare them with the traditional Principal Components approach .", "edit_actions": [{"type": "D", "before": "factor", "after": null, "start_char_pos": 238, "end_char_pos": 244}, {"type": "A", "before": null, "after": "of", "start_char_pos": 305, "end_char_pos": 305}, {"type": "A", "before": null, "after": "(EM)", "start_char_pos": 377, "end_char_pos": 377}, {"type": "A", "before": null, "after": "~", "start_char_pos": 423, "end_char_pos": 423}, {"type": "R", "before": ",", "after": ": (i)", "start_char_pos": 518, "end_char_pos": 519}, {"type": "R", "before": ", factors , and common components are \\min(\\sqrt n,\\sqrt T", "after": "are \\sqrt T-consistent and asymptotically normal if \\sqrt T/n", "start_char_pos": 543, "end_char_pos": 601}, {"type": "A", "before": null, "after": "0; (ii) the estimated factors are \\sqrt n-consistent and asymptotically normal if \\sqrt n/T", "start_char_pos": 605, "end_char_pos": 605}, {"type": "A", "before": null, "after": "0; (iii) the estimated common component is \\min(\\sqrt T,\\sqrt n", "start_char_pos": 609, "end_char_pos": 609}, {"type": "A", "before": null, "after": "regardless of the relative rate of divergence of n and T", "start_char_pos": 649, "end_char_pos": 649}, {"type": "R", "before": "under the unrealistic constraint of independent idiosyncratic errors, this mis-specification does", "after": "as if the idiosyncratic terms were cross-sectionally and serially uncorrelated, we show that these mis-specifications do", "start_char_pos": 684, "end_char_pos": 781}, {"type": "R", "before": "we give conditions under which the derived asymptotic distribution can still be used for inference even in case of mis-specifications. Our results are confirmed by", "after": "the estimated loadings are asymptotically as efficient as those obtained with the Principal Components estimator, whereas numerical results show that the loss in efficiency of the estimated factors becomes negligible as n and T increase.~We then propose robust estimators of the asymptotic covariances, which can be used to conduct inference on the loadings and to compute confidence intervals for the factors and common components. In", "start_char_pos": 816, "end_char_pos": 979}, {"type": "R", "before": "where we compare", "after": "and an analysis of US macroeconomic data, we study", "start_char_pos": 1013, "end_char_pos": 1029}, {"type": "R", "before": "with Principal Components", "after": "and we compare them with the traditional Principal Components approach", "start_char_pos": 1064, "end_char_pos": 1089}], "sents_char_pos": [0, 112, 274, 422, 651, 805, 950]}
+{"doc_id": "1910.05546", "revision_depth": "2", "before_revision": "To predict and maximize future rewards in this ever-changing world, animals must be able to discover the temporal structure of stimuli and then anticipate or act correctly at the right time. However, we still lack a systematic understanding of the neural mechanisms of how animals perceive, maintain, and use time intervals ranging from hundreds of milliseconds to multi-seconds in working memory , the combination of time information with spatial information processing and decision making , and the reasons for the strong neuronal temporal signal even when animals performing tasks in which time information is not required . Here, we addressed these problems by training neural network models. We reveal that neural networks perceive time intervals through the evolution of population state along stereotypical trajectory, maintain time intervals by line attractor along which most neurons vary their activities monotonically with the duration of the maintained interval, and produce or compare time intervals by scaling the evolution velocity of population state . Time and non-time information is coded in subspaces orthogonal with each other, which facilitates generalizable decoding of time and non-time information . This is based on the network structure of multiple feedforward sequences that mutually excite or inhibit depending on whether their preferences of non-timing information are similar or not. Strong temporal signal in non-timing tasks arises from high temporal complexity of task, broad input tuning, multi-tasking and timing anticipation . Our work discloses fundamental computional principles of temporal processing, and is supported by and gives predictions to a number of experimental phenomena.", "after_revision": "To maximize future rewards in this ever-changing world, animals must be able to discover the temporal structure of stimuli and then anticipate or act correctly at the right time. How the animals perceive, maintain, and use time intervals ranging from hundreds of milliseconds to multi-seconds in working memory ? How temporal information is processed concurrently with spatial information and decision making ? Why there are strong neuronal temporal signals in tasks in which temporal information is not required ? A systematic understanding of the underlying neural mechanisms is still lacking . Here, we addressed these problems using supervised training of recurrent neural network models. We revealed that neural networks perceive elapsed time through state evolution along stereotypical trajectory, maintain time intervals in working memory in the monotonic increase or decrease of the firing rates of interval-tuned neurons, and compare or produce time intervals by scaling state evolution speed. Temporal and non-temporal information are coded in subspaces orthogonal with each other, and the state trajectories with time at different non-temporal information are quasi-parallel and isomorphic. Such coding geometry facilitates the decoding generalizability of temporal and non-temporal information across each other. The network structure exhibits multiple feedforward sequences that mutually excite or inhibit depending on whether their preferences of non-temporal information are similar or not. We identified four factors that facilitate strong temporal signals in non-timing tasks , including the anticipation of coming events . Our work discloses fundamental computational principles of temporal processing, and is supported by and gives predictions to a number of experimental phenomena.", "edit_actions": [{"type": "D", "before": "predict and", "after": null, "start_char_pos": 3, "end_char_pos": 14}, {"type": "R", "before": "However, we still lack a systematic understanding of the neural mechanisms of how", "after": "How the", "start_char_pos": 191, "end_char_pos": 272}, {"type": "R", "before": ", the combination of time information", "after": "? How temporal information is processed concurrently", "start_char_pos": 397, "end_char_pos": 434}, {"type": "D", "before": "processing", "after": null, "start_char_pos": 460, "end_char_pos": 470}, {"type": "R", "before": ", and the reasons for the", "after": "? Why there are", "start_char_pos": 491, "end_char_pos": 516}, {"type": "R", "before": "signal even when animals performing", "after": "signals in", "start_char_pos": 542, "end_char_pos": 577}, {"type": "R", "before": "time", "after": "temporal", "start_char_pos": 593, "end_char_pos": 597}, {"type": "A", "before": null, "after": "? A systematic understanding of the underlying neural mechanisms is still lacking", "start_char_pos": 626, "end_char_pos": 626}, {"type": "R", "before": "by training", "after": "using supervised training of recurrent", "start_char_pos": 663, "end_char_pos": 674}, {"type": "R", "before": "reveal", "after": "revealed", "start_char_pos": 701, "end_char_pos": 707}, {"type": "R", "before": "time intervals through the evolution of population state", "after": "elapsed time through state evolution", "start_char_pos": 738, "end_char_pos": 794}, {"type": "R", "before": "by line attractor along which most neurons vary their activities monotonically with the duration of the maintained interval, and produce or compare", "after": "in working memory in the monotonic increase or decrease of the firing rates of interval-tuned neurons, and compare or produce", "start_char_pos": 851, "end_char_pos": 998}, {"type": "R", "before": "the evolution velocity of population state . Time and non-time information is", "after": "state evolution speed. Temporal and non-temporal information are", "start_char_pos": 1025, "end_char_pos": 1102}, {"type": "R", "before": "which facilitates generalizable decoding of time and non-time information . This is based on the network structure of", "after": "and the state trajectories with time at different non-temporal information are quasi-parallel and isomorphic. Such coding geometry facilitates the decoding generalizability of temporal and non-temporal information across each other. The network structure exhibits", "start_char_pos": 1150, "end_char_pos": 1267}, {"type": "R", "before": "non-timing", "after": "non-temporal", "start_char_pos": 1373, "end_char_pos": 1383}, {"type": "R", "before": "Strong temporal signal", "after": "We identified four factors that facilitate strong temporal signals", "start_char_pos": 1416, "end_char_pos": 1438}, {"type": "R", "before": "arises from high temporal complexity of task, broad input tuning, multi-tasking and timing anticipation", "after": ", including the anticipation of coming events", "start_char_pos": 1459, "end_char_pos": 1562}, {"type": "R", "before": "computional", "after": "computational", "start_char_pos": 1596, "end_char_pos": 1607}], "sents_char_pos": [0, 190, 628, 697, 1069, 1225, 1415, 1564]}
+{"doc_id": "1910.06242", "revision_depth": "2", "before_revision": "One of the spectacular examples of a complex system is the financial market, which displays rich correlation structures among price returns of different assets. The eigenvalue decomposition of a correlation matrix into partial correlations - market, group and random modes, enables identification of dominant stocks or \"influential leaders\" and sectors or \"communities\". The correlation-based network of leaders and communities changes with time, especially during market events like crashes , bubbles, etc. Using the eigen-entropy measure , computed from the eigen-centralities (ranks) of different stocks in the correlation network, we extract information about the \"disorder \" (or randomness) in the market correlation and its different modes. The relative-entropy measures computed for these modes enable us to construct a \"phase space\", where the different market events undergo \"phase-separation\" and display \" order-disorder \" transitions, as observed in critical phenomena in physics. We choose the US S P-500 and Japanese Nikkei-225 financial markets, over a 32-year period, and study the evolution of the cross-correlation matrices and their corresponding eigen-entropies. One of the relative entropy measures displays \"universal scaling \" behaviorwith respect to the mean market correlation. Further, a functional of the relative entropy measure acts as a good gauge for the \"market fragility\" (minimum risk of the market portfolio) and the \"market fear\" (volatility index). This new methodology helps us to better understand market dynamics and characterize the events in different phases as anomalies, bubbles, crashes, etc. that display intriguing phase separation and universal scaling behavior .", "after_revision": "Financial markets, being spectacular examples of complex systems, display rich correlation structures among price returns of different assets. The correlation structures change drastically, akin to phase transitions in physical phenomena, as do the influential stocks (leaders) and sectors (communities), during market events like crashes . It is crucial to detect their signatures for timely intervention or prevention. Here we use eigenvalue decomposition and eigen-entropy , computed from eigen-centralities of different stocks in the cross-correlation matrix, to extract information about the disorder in the market . We construct a `phase space', where different market events (bubbles, crashes, etc.) undergo phase separation and display order-disorder transitions. An entropy functional exhibits scaling behavior. We propose a generic indicator that facilitates the continuous monitoring of the internal structure of the market -- important for managing risk and stress-testing the financial system. Our methodology would help in understanding and foreseeing tipping points or fluctuation patterns in complex systems .", "edit_actions": [{"type": "R", "before": "One of the", "after": "Financial markets, being", "start_char_pos": 0, "end_char_pos": 10}, {"type": "R", "before": "a complex system is the financial market, which displays", "after": "complex systems, display", "start_char_pos": 35, "end_char_pos": 91}, {"type": "R", "before": "eigenvalue decomposition of a correlation matrix into partial correlations - market, group and random modes, enables identification of dominant stocks or \"influential leaders\" and sectors or \"communities\". The correlation-based network of leaders and communities changes with time, especially", "after": "correlation structures change drastically, akin to phase transitions in physical phenomena, as do the influential stocks (leaders) and sectors (communities),", "start_char_pos": 165, "end_char_pos": 457}, {"type": "R", "before": ", bubbles, etc. Using the", "after": ". It is crucial to detect their signatures for timely intervention or prevention. Here we use eigenvalue decomposition and", "start_char_pos": 492, "end_char_pos": 517}, {"type": "D", "before": "measure", "after": null, "start_char_pos": 532, "end_char_pos": 539}, {"type": "D", "before": "the", "after": null, "start_char_pos": 556, "end_char_pos": 559}, {"type": "D", "before": "(ranks)", "after": null, "start_char_pos": 579, "end_char_pos": 586}, {"type": "R", "before": "correlation network, we", "after": "cross-correlation matrix, to", "start_char_pos": 614, "end_char_pos": 637}, {"type": "R", "before": "\"disorder \" (or randomness)", "after": "disorder", "start_char_pos": 668, "end_char_pos": 695}, {"type": "R", "before": "correlation and its different modes. The relative-entropy measures computed for these modes enable us to construct a \"phase space\", where the", "after": ". We construct a `phase space', where", "start_char_pos": 710, "end_char_pos": 851}, {"type": "R", "before": "undergo \"phase-separation\" and display \"", "after": "(bubbles, crashes, etc.) undergo phase separation and display", "start_char_pos": 876, "end_char_pos": 916}, {"type": "D", "before": "\" transitions, as observed in critical phenomena in physics. We choose the US S", "after": null, "start_char_pos": 932, "end_char_pos": 1011}, {"type": "R", "before": "P-500 and Japanese Nikkei-225 financial markets, over a 32-year period, and study the evolution of the cross-correlation matrices and their corresponding eigen-entropies. One of the relative entropy measures displays \"universal scaling \" behaviorwith respect to the mean market correlation. Further, a functional of the relative entropy measure acts as a good gauge for the \"market fragility\" (minimum risk", "after": "transitions. An entropy functional exhibits scaling behavior. We propose a generic indicator that facilitates the continuous monitoring of the internal structure", "start_char_pos": 1012, "end_char_pos": 1418}, {"type": "R", "before": "portfolio) and the \"market fear\" (volatility index). This new methodology helps us to better understand market dynamics and characterize the events in different phases as anomalies, bubbles, crashes, etc. that display intriguing phase separation and universal scaling behavior", "after": "-- important for managing risk and stress-testing the financial system. Our methodology would help in understanding and foreseeing tipping points or fluctuation patterns in complex systems", "start_char_pos": 1433, "end_char_pos": 1709}], "sents_char_pos": [0, 160, 370, 507, 746, 992, 1182, 1302, 1485]}
+{"doc_id": "1910.11380", "revision_depth": "1", "before_revision": "Introduction: Identifying the potential firing patterns following by different brain regions under normal and abnormal conditions increases our understanding of what is happening in the level of neural interactions in the brain. On the other hand, it is important to be capable of modeling the potential neural activities, in order to build precise artificial neural networks. The Izhikevich model is one of the simple biologically plausible models that is capable of capturing the most known firing patterns of neurons. This property makes the model efficient in simulating large-scale networks of neurons. Improving the Izhikevich model for adapting with the neuronal activity of rat brain with great accuracy would make the model effective for future neural network implementations. Methods: Data sampling from two brain regions, the HIP and BLA, is performed by extracellular recordings of male Wistar rats and spike sorting is done using Plexon offline sorter. Further data analyses are done through NeuroExplorer and MATLAB software. In order to optimize the Izhikevich model parameters, the genetic algorithm is used. Results: In the present study, the possible firing patterns of the real single neurons of the HIP and BLA are identified. Additionally, improvement of the Izhikevich model is achieved. As a result , the real neuronal spiking pattern of these regions neurons , and the corresponding cases of the Izhikevich neuron spiking pattern are adjusted with great accuracy. Conclusion: This study is conducted to elevate our knowledge of neural interactions in different structures of the brain and accelerate the quality of future large scale neural networks simulations, as well as reducing the modeling complexity. This aim is achievable by performing the improved Izhikevich model, and inserting only the plausible firing patterns and eliminating unrealistic ones , as the results of this study .", "after_revision": "Introduction- Identifying the potential firing patterns following different brain regions under normal and abnormal conditions increases our understanding of events at the level of neural interactions in the brain. The Izhikevich model is one of the simplest biologically plausible models , i.e. capable of capturing the most recognized firing patterns of neurons. This property makes the model efficient in simulating the large-scale networks of neurons. Improving the Izhikevich model for adapting to the neuronal activity of the rat brain with great accuracy would make the model effective for future neural network implementations. Methods- Data sampling from two brain regions, the HIP and BLA, was performed by the extracellular recordings of male rats, and spike sorting was conducted by Plexon offline sorter. Further analyses were performed through NeuroExplorer and MATLAB . To optimize the Izhikevich model parameters, a genetic algorithm was used. The process of comparison in each iteration leads to the survival of better populations until achieving the optimum solution. Results- In the present study, the possible firing patterns of the real single neurons of the HIP and BLA were identified. Additionally, an improved Izhikevich model was achieved. Accordingly , the real neuronal spiking pattern of these regions neurons and the corresponding cases of the Izhikevich neuron spiking pattern were adjusted with great accuracy. Conclusion- This study was conducted to elevate our knowledge of neural interactions in different structures of the brain and accelerate the quality of future large-scale neural network simulations, as well as reducing the modeling complexity. This aim was achievable by performing the improved Izhikevich model, and inserting only the plausible firing patterns , and eliminating unrealistic ones .", "edit_actions": [{"type": "R", "before": "Introduction:", "after": "Introduction-", "start_char_pos": 0, "end_char_pos": 13}, {"type": "D", "before": "by", "after": null, "start_char_pos": 66, "end_char_pos": 68}, {"type": "R", "before": "what is happening in", "after": "events at", "start_char_pos": 161, "end_char_pos": 181}, {"type": "D", "before": "On the other hand, it is important to be capable of modeling the potential neural activities, in order to build precise artificial neural networks.", "after": null, "start_char_pos": 229, "end_char_pos": 376}, {"type": "R", "before": "simple", "after": "simplest", "start_char_pos": 412, "end_char_pos": 418}, {"type": "R", "before": "that is", "after": ", i.e.", "start_char_pos": 449, "end_char_pos": 456}, {"type": "R", "before": "known", "after": "recognized", "start_char_pos": 487, "end_char_pos": 492}, {"type": "A", "before": null, "after": "the", "start_char_pos": 575, "end_char_pos": 575}, {"type": "R", "before": "with", "after": "to", "start_char_pos": 653, "end_char_pos": 657}, {"type": "A", "before": null, "after": "the", "start_char_pos": 683, "end_char_pos": 683}, {"type": "R", "before": "Methods:", "after": "Methods-", "start_char_pos": 788, "end_char_pos": 796}, {"type": "R", "before": "is performed by", "after": "was performed by the", "start_char_pos": 852, "end_char_pos": 867}, {"type": "R", "before": "Wistar rats", "after": "rats,", "start_char_pos": 901, "end_char_pos": 912}, {"type": "R", "before": "is done using", "after": "was conducted by", "start_char_pos": 931, "end_char_pos": 944}, {"type": "R", "before": "data analyses are done", "after": "analyses were performed", "start_char_pos": 976, "end_char_pos": 998}, {"type": "R", "before": "software. In order to", "after": ". To", "start_char_pos": 1032, "end_char_pos": 1053}, {"type": "R", "before": "the genetic algorithm is used. Results:", "after": "a genetic algorithm was used. The process of comparison in each iteration leads to the survival of better populations until achieving the optimum solution. Results-", "start_char_pos": 1096, "end_char_pos": 1135}, {"type": "R", "before": "are", "after": "were", "start_char_pos": 1233, "end_char_pos": 1236}, {"type": "R", "before": "improvement of the Izhikevich model is achieved. As a result", "after": "an improved Izhikevich model was achieved. Accordingly", "start_char_pos": 1263, "end_char_pos": 1323}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1385, "end_char_pos": 1386}, {"type": "R", "before": "are", "after": "were", "start_char_pos": 1456, "end_char_pos": 1459}, {"type": "R", "before": "Conclusion: This study is", "after": "Conclusion- This study was", "start_char_pos": 1490, "end_char_pos": 1515}, {"type": "R", "before": "large scale neural networks", "after": "large-scale neural network", "start_char_pos": 1648, "end_char_pos": 1675}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1743, "end_char_pos": 1745}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1851, "end_char_pos": 1851}, {"type": "D", "before": ", as the results of this study", "after": null, "start_char_pos": 1885, "end_char_pos": 1915}], "sents_char_pos": [0, 228, 376, 520, 608, 787, 967, 1041, 1126, 1248, 1311, 1489, 1733]}
+{"doc_id": "1910.12725", "revision_depth": "1", "before_revision": "An individual's reaction time data to visual stimuli have usually been represented in Experimental Psychology by means of an ex-Gaussian function (EGF). In most previous works, researchers have mainly aimed at finding a meaning for the three parameters of the EGF in relation to psychological phenomena. We will focus on interpreting the reaction times ( RT ) of a group of individuals rather than a single person's RT which is relevant for the different contexts of social sciences. In doing so, the same model as for the Ideal Gases (IG) emerges from the experimental reaction time data. We show that the law governing the experimental RT of a group of individuals is the same as the law governing the dynamics of an inanimate system , namely, a system of non-interacting particles (IG) . Both systems are characterized by a collective parameter which is k_BT for the system of particles and what we have called life span parameter for the system of brains. The dynamics of both systems is driven by the interaction with their respective thermostats, which are characterized by a temperature in the system of particles and by a thermostat-like entity, that we have called time driver for the group of individuals. Similarly, we come across a Maxwell-Boltzmann-type distribution for the system of brains which provides a more complete characterization of the collective time response than has ever been provided before. Another step taken is that now we are able to know about the behavior of a single individual in relation to the coetaneous group to which they belong and through the application of a physical law. This leads to a new entropy-based methodology for the classification of the individuals forming the system which emerges from the physical law governing the system of brains. To our knowledge, this is the first work reporting on the emergence of a physical theory (IG) from human RT experimental data.", "after_revision": "An individual's reaction time data to visual stimuli have usually been represented in Experimental Psychology by means of an ex-Gaussian function (EGF). In most previous works, researchers have mainly aimed at finding a meaning for the parameters of the EGF function in relation to psychological phenomena. We will focus on interpreting the reaction times ( RTs ) of a group of individuals rather than a single person's RT , which is relevant for the different contexts of social sciences. In doing so, the same model as for the Ideal Gases (IG) ( an inanimate system of non-interacting particles ) emerges from the experimental RT data . Both systems are characterised by a collective parameter which is k_BT in the case of the system of particles and what we have called life span parameter for the system of brains. Similarly, we came across a Maxwell-Boltzmann-type distribution for the system of brains which provides a natural and more complete characterisation of the collective time response than has ever been provided before. Thus, we are able to know about the behaviour of a single individual in relation to the coetaneous group to which they belong and through the application of a physical law. This leads to a new entropy-based methodology for the classification of the individuals forming the system which emerges from the physical law governing the system of brains. To the best of our knowledge, this is the first work in the literature reporting on the emergence of a physical theory (IG) from human RT experimental data.", "edit_actions": [{"type": "D", "before": "three", "after": null, "start_char_pos": 236, "end_char_pos": 241}, {"type": "A", "before": null, "after": "function", "start_char_pos": 264, "end_char_pos": 264}, {"type": "R", "before": "RT", "after": "RTs", "start_char_pos": 356, "end_char_pos": 358}, {"type": "A", "before": null, "after": ",", "start_char_pos": 420, "end_char_pos": 420}, {"type": "R", "before": "emerges from the experimental reaction time data. We show that the law governing the experimental RT of a group of individuals is the same as the law governing the dynamics of", "after": "(", "start_char_pos": 542, "end_char_pos": 717}, {"type": "D", "before": ", namely, a system", "after": null, "start_char_pos": 738, "end_char_pos": 756}, {"type": "R", "before": "(IG)", "after": ") emerges from the experimental RT data", "start_char_pos": 786, "end_char_pos": 790}, {"type": "R", "before": "characterized", "after": "characterised", "start_char_pos": 810, "end_char_pos": 823}, {"type": "R", "before": "for the", "after": "in the case of the", "start_char_pos": 864, "end_char_pos": 871}, {"type": "D", "before": "The dynamics of both systems is driven by the interaction with their respective thermostats, which are characterized by a temperature in the system of particles and by a thermostat-like entity, that we have called time driver for the group of individuals.", "after": null, "start_char_pos": 962, "end_char_pos": 1217}, {"type": "R", "before": "come", "after": "came", "start_char_pos": 1232, "end_char_pos": 1236}, {"type": "R", "before": "more complete characterization", "after": "natural and more complete characterisation", "start_char_pos": 1324, "end_char_pos": 1354}, {"type": "R", "before": "Another step taken is that now", "after": "Thus,", "start_char_pos": 1423, "end_char_pos": 1453}, {"type": "R", "before": "behavior", "after": "behaviour", "start_char_pos": 1484, "end_char_pos": 1492}, {"type": "A", "before": null, "after": "the best of", "start_char_pos": 1798, "end_char_pos": 1798}, {"type": "A", "before": null, "after": "in the literature", "start_char_pos": 1837, "end_char_pos": 1837}], "sents_char_pos": [0, 152, 304, 485, 591, 961, 1217, 1422, 1619, 1794]}
+{"doc_id": "1910.14459", "revision_depth": "1", "before_revision": "Convex bodies play a fundamental role in geometric computation, and approximating such bodies is often a key ingredient in the design of efficient algorithms. We consider the question of how to succinctly approximate a multidimensional convex body by a polytope. We are given a convex body K of unit diameter in Euclidean d-dimensional space (where d is a constant) along with an error parameter \\varepsilon > 0. The objective is to determine a polytope of low combinatorial complexity whose Hausdorff distance from K is at most \\varepsilon. By combinatorial complexity we mean the total number of faces of all dimensions of the polytope. In the mid-1970's, a result by Dudley showed that O(1/\\varepsilon^{(d-1)/2}) facets suffice, and Bronshteyn and Ivanov presented a similar bound on the number of vertices . While both results match known worst-case lower bounds , obtaining a similar upper bound on the total combinatorial complexity has been open for over 40 years. Recently, we made a first step forward towards this objective, obtaining a suboptimal bound. In this paper, we settle this problem with an asymptotically optimal bound of O(1/\\varepsilon^{(d-1)/2}) . Our result is based on a new relationship between \\varepsilon-width caps of a convex body and its polar . Using this relationship, we are able to obtain a volume-sensitive bound on the number of approximating caps that are \"essentially different.\" We achieve our result by combining this with a variant of the witness-collector method and a novel variable-width layered construction .", "after_revision": "This paper considers the question of how to succinctly approximate a multidimensional convex body by a polytope. Given a convex body K of unit diameter in Euclidean d-dimensional space (where d is a constant) and an error parameter \\varepsilon > 0, the objective is to determine a convex polytope of low combinatorial complexity whose Hausdorff distance from K is at most \\varepsilon. By combinatorial complexity we mean the total number of faces of all dimensions . Classical constructions by Dudley and Bronshteyn/Ivanov show that O(1/\\varepsilon^{(d-1)/2}) facets or vertices are possible, respectively, but neither achieves both bounds simultaneously. In this paper, we show that it is possible to construct a polytope with O(1/\\varepsilon^{(d-1)/2}) combinatorial complexity, which is optimal in the worst case . Our result is based on a new relationship between \\varepsilon-width caps of a convex body and its polar body . Using this relationship, we are able to obtain a volume-sensitive bound on the number of approximating caps that are \"essentially different.\" We achieve our main result by combining this with a variant of the witness-collector method and a novel variable-thickness layered construction of the economical cap covering .", "edit_actions": [{"type": "R", "before": "Convex bodies play a fundamental role in geometric computation, and approximating such bodies is often a key ingredient in the design of efficient algorithms. We consider the", "after": "This paper considers the", "start_char_pos": 0, "end_char_pos": 174}, {"type": "R", "before": "We are given", "after": "Given", "start_char_pos": 263, "end_char_pos": 275}, {"type": "R", "before": "along with", "after": "and", "start_char_pos": 366, "end_char_pos": 376}, {"type": "R", "before": "0. The", "after": "0, the", "start_char_pos": 410, "end_char_pos": 416}, {"type": "A", "before": null, "after": "convex", "start_char_pos": 445, "end_char_pos": 445}, {"type": "R", "before": "combinatorial complexity", "after": "combinatorial complexity", "start_char_pos": 546, "end_char_pos": 570}, {"type": "R", "before": "of the polytope. In the mid-1970's, a result by Dudley showed", "after": ". Classical constructions by Dudley and Bronshteyn/Ivanov show", "start_char_pos": 623, "end_char_pos": 684}, {"type": "R", "before": "suffice, and Bronshteyn and Ivanov presented a similar bound on the number of vertices . While both results match known worst-case lower bounds , obtaining a similar upper bound on the total combinatorial complexity has been open for over 40 years. Recently, we made a first step forward towards this objective, obtaining a suboptimal bound.", "after": "or vertices are possible, respectively, but neither achieves both bounds simultaneously.", "start_char_pos": 724, "end_char_pos": 1065}, {"type": "R", "before": "settle this problem with an asymptotically optimal bound of", "after": "show that it is possible to construct a polytope with", "start_char_pos": 1084, "end_char_pos": 1143}, {"type": "A", "before": null, "after": "combinatorial complexity, which is optimal in the worst case", "start_char_pos": 1171, "end_char_pos": 1171}, {"type": "A", "before": null, "after": "body", "start_char_pos": 1278, "end_char_pos": 1278}, {"type": "A", "before": null, "after": "main", "start_char_pos": 1438, "end_char_pos": 1438}, {"type": "R", "before": "variable-width layered construction", "after": "variable-thickness layered construction of the economical cap covering", "start_char_pos": 1523, "end_char_pos": 1558}], "sents_char_pos": [0, 158, 262, 412, 542, 639, 812, 972, 1065, 1422]}
+{"doc_id": "1911.00571", "revision_depth": "1", "before_revision": "Shape decomposition is a fundamental problem in geometry processing where an arbitrary object is regarded as an arrangement of simple primitives or semantic components. The application of 3D shape decomposition in the context of image segmentation, however, is not well-studied. In this paper, we develop a shape decomposition algorithm called cylindrical shape decomposition (CSD) to be applied for the segmentation of tubular structures in large-scale 3D images. CSD starts by partitioning the curve skeleton of a tubular object into maximal-length sub-skeletons , minimizing an orientation objective. Each sub-skeleton corresponds to a semantic component. To determine boundaries between the semantic components, CSD searches for critical points where the object cross-section substantially changes . CSD then cuts the object at critical points and assigns the same label to those object parts which are along the same sub-skeleton, defining a semantic tubular component. CSD further rectify/reconstructs these semantic components using generalized cylinders. We demonstrate the application of CSD in the segmentation of large-scale 3D electron microscopy image datasets of myelinated axons, the decomposition of vascular networks, and synthetic objects. We also compare CSD to other state-of-the-art decomposition techniques in these applications . These experiments indicate that CSD outperforms other decomposition techniques and achieves a promising performance .", "after_revision": "We develop a cylindrical shape decomposition (CSD) algorithm to decompose an object, which is a union of several tubular structures, into its semantic components. We decompose the object using its curve skeleton and translational sweeps. For that, CSD partitions the curve skeleton into maximal-length sub-skeletons over an orientation function, each sub-skeleton corresponds to a semantic component. To find the intersection of the tubular components, CSD translationally sweeps the object in decomposition intervals to identify critical points at which the shape of the object changes substantially. CSD cuts the object at critical points and assigns the same label to parts along the same sub-skeleton, thereby constructing a semantic component. CSD further reconstructs the semantic components between parts using generalized cylinders. We apply CSD for the segmentation of axons in large 3D electron microscopy images, and the decomposition of vascular networks, as well as synthetic objects. We show that CSD outperforms state-of-the-art decomposition techniques in these applications .", "edit_actions": [{"type": "R", "before": "Shape decomposition is a fundamental problem in geometry processing where an arbitrary object is regarded as an arrangement of simple primitives or semantic components. The application of 3D shape decomposition in the context of image segmentation, however, is not well-studied. In this paper, we develop a shape decomposition algorithm called", "after": "We develop a", "start_char_pos": 0, "end_char_pos": 343}, {"type": "R", "before": "to be applied for the segmentation of tubular structures in large-scale 3D images. CSD starts by partitioning", "after": "algorithm to decompose an object, which is a union of several tubular structures, into its semantic components. We decompose the object using its curve skeleton and translational sweeps. For that, CSD partitions", "start_char_pos": 382, "end_char_pos": 491}, {"type": "D", "before": "of a tubular object", "after": null, "start_char_pos": 511, "end_char_pos": 530}, {"type": "R", "before": ", minimizing an orientation objective. Each", "after": "over an orientation function, each", "start_char_pos": 565, "end_char_pos": 608}, {"type": "R", "before": "determine boundaries between the semantic", "after": "find the intersection of the tubular", "start_char_pos": 662, "end_char_pos": 703}, {"type": "R", "before": "searches for critical points where the object cross-section substantially changes . CSD then", "after": "translationally sweeps the object in decomposition intervals to identify critical points at which the shape of the object changes substantially. CSD", "start_char_pos": 720, "end_char_pos": 812}, {"type": "R", "before": "those object parts which are", "after": "parts", "start_char_pos": 878, "end_char_pos": 906}, {"type": "R", "before": "defining a semantic tubular", "after": "thereby constructing a semantic", "start_char_pos": 936, "end_char_pos": 963}, {"type": "R", "before": "rectify/reconstructs these semantic components", "after": "reconstructs the semantic components between parts", "start_char_pos": 987, "end_char_pos": 1033}, {"type": "R", "before": "demonstrate the application of CSD in", "after": "apply CSD for", "start_char_pos": 1066, "end_char_pos": 1103}, {"type": "R", "before": "large-scale", "after": "axons in large", "start_char_pos": 1124, "end_char_pos": 1135}, {"type": "R", "before": "image datasets of myelinated axons,", "after": "images, and", "start_char_pos": 1159, "end_char_pos": 1194}, {"type": "R", "before": "and", "after": "as well as", "start_char_pos": 1235, "end_char_pos": 1238}, {"type": "R", "before": "also compare CSD to other", "after": "show that CSD outperforms", "start_char_pos": 1261, "end_char_pos": 1286}, {"type": "D", "before": ". These experiments indicate that CSD outperforms other decomposition techniques and achieves a promising performance", "after": null, "start_char_pos": 1351, "end_char_pos": 1468}], "sents_char_pos": [0, 168, 278, 464, 603, 658, 974, 1062, 1257, 1352]}
+{"doc_id": "1911.03445", "revision_depth": "1", "before_revision": "We revisit the scaling analysis and commonly accepted conditions for the validity of the standard, reverse and total quasi-steady-state approximations (sQSSA, rQSSA and tQSSA) through the lens of dimensional Tikhonov--Fenichel small parameters and their respective critical manifolds. By combining Tikhonov--Fenichel small parameter with scaling analysis , we derive improved upper bounds on the error for the sQSSA, rQSSA and tQSSA. We find that the condition for the validity of the rQSSA is far less restrictive than was previously assumed, and we derive a new small parameter that determines the validity of this approximation. Moreover, we show for the first time that the critical manifold of the rQSSA contains a singular point where normal hyperbolicity is lost. Associated with this singularity is a transcritical bifurcation, and the corresponding normal form of this bifurcation is recovered through scaling analysis. It is commonly accepted that the rQSSA is only valid in regions of parameter space where the influence of the singular point can be ignored. However, by using the method of slowly-varying Lyapunov functions, we provide asymptotic estimates for the validity of the rQSSA in parameter regions where the effect of the singular point cannot be disregarded. In doing so, we extend the established domain of validity for the rQSSA. Previous analysis has suggested that the rQSSA is only valid when initial enzyme concentrations greatly exceed initial substrate concentrations. However, our results indicate that this approximationcan be valid when initial enzyme and substrate concentrations are of equal magnitude . Consequently, this opens the possibility of utilizing the rQSSA to model enzyme catalyzed reactions and estimate kinetic parameters in enzymatic assays at much lower enzyme to substrate ratios than was previously thought .", "after_revision": "In this work, we revisit the scaling analysis and commonly accepted conditions for the validity of the standard, reverse and total quasi-steady-state approximations through the lens of dimensional Tikhonov-Fenichel parameters and their respective critical manifolds. By combining Tikhonov-Fenichel parameters with scaling analysis and energy methods , we derive improved upper bounds on the approximation error for the standard, reverse and total quasi-steady-state approximations. Furthermore, previous analyses suggest that the reverse quasi-steady-state approximation is only valid when initial enzyme concentrations greatly exceed initial substrate concentrations. However, our results indicate that this approximation can be valid when initial enzyme and substrate concentrations are of equal magnitude. Using energy methods, we find that the condition for the validity of the reverse quasi-steady-state approximation is far less restrictive than was previously assumed, and we derive a new \"small\" parameter that determines the validity of this approximation. In doing so, we extend the established domain of validity for the reverse quasi-steady-state approximation . Consequently, this opens up the possibility of utilizing the reverse quasi-steady-state approximation to model enzyme catalyzed reactions and estimate kinetic parameters in enzymatic assays at much lower enzyme to substrate ratios than was previously thought . Moreover, we show for the first time that the critical manifold of the reverse quasi-steady-state approximation contains a singular point where normal hyperbolicity is lost. Associated with this singularity is a transcritical bifurcation, and the corresponding normal form of this bifurcation is recovered through scaling analysis .", "edit_actions": [{"type": "R", "before": "We", "after": "In this work, we", "start_char_pos": 0, "end_char_pos": 2}, {"type": "D", "before": "(sQSSA, rQSSA and tQSSA)", "after": null, "start_char_pos": 151, "end_char_pos": 175}, {"type": "R", "before": "Tikhonov--Fenichel small", "after": "Tikhonov-Fenichel", "start_char_pos": 208, "end_char_pos": 232}, {"type": "R", "before": "Tikhonov--Fenichel small parameter", "after": "Tikhonov-Fenichel parameters", "start_char_pos": 298, "end_char_pos": 332}, {"type": "A", "before": null, "after": "and energy methods", "start_char_pos": 355, "end_char_pos": 355}, {"type": "A", "before": null, "after": "approximation", "start_char_pos": 397, "end_char_pos": 397}, {"type": "R", "before": "sQSSA, rQSSA and tQSSA. We", "after": "standard, reverse and total quasi-steady-state approximations. Furthermore, previous analyses suggest that the reverse quasi-steady-state approximation is only valid when initial enzyme concentrations greatly exceed initial substrate concentrations. However, our results indicate that this approximation can be valid when initial enzyme and substrate concentrations are of equal magnitude. Using energy methods, we", "start_char_pos": 412, "end_char_pos": 438}, {"type": "R", "before": "rQSSA", "after": "reverse quasi-steady-state approximation", "start_char_pos": 487, "end_char_pos": 492}, {"type": "R", "before": "small", "after": "\"small\"", "start_char_pos": 566, "end_char_pos": 571}, {"type": "D", "before": "Moreover, we show for the first time that the critical manifold of the rQSSA contains a singular point where normal hyperbolicity is lost. Associated with this singularity is a transcritical bifurcation, and the corresponding normal form of this bifurcation is recovered through scaling analysis. It is commonly accepted that the rQSSA is only valid in regions of parameter space where the influence of the singular point can be ignored. However, by using the method of slowly-varying Lyapunov functions, we provide asymptotic estimates for the validity of the rQSSA in parameter regions where the effect of the singular point cannot be disregarded.", "after": null, "start_char_pos": 634, "end_char_pos": 1283}, {"type": "R", "before": "rQSSA. Previous analysis has suggested that the rQSSA is only valid when initial enzyme concentrations greatly exceed initial substrate concentrations. However, our results indicate that this approximationcan be valid when initial enzyme and substrate concentrations are of equal magnitude", "after": "reverse quasi-steady-state approximation", "start_char_pos": 1350, "end_char_pos": 1639}, {"type": "A", "before": null, "after": "up", "start_char_pos": 1667, "end_char_pos": 1667}, {"type": "R", "before": "rQSSA", "after": "reverse quasi-steady-state approximation", "start_char_pos": 1701, "end_char_pos": 1706}, {"type": "A", "before": null, "after": ". Moreover, we show for the first time that the critical manifold of the reverse quasi-steady-state approximation contains a singular point where normal hyperbolicity is lost. Associated with this singularity is a transcritical bifurcation, and the corresponding normal form of this bifurcation is recovered through scaling analysis", "start_char_pos": 1864, "end_char_pos": 1864}], "sents_char_pos": [0, 284, 435, 633, 772, 930, 1071, 1283, 1501]}
+{"doc_id": "1911.04489", "revision_depth": "1", "before_revision": "LSTMs promise much to financial time-series analysis, temporal and cross-sectional inference, but we find they do not deliver in a real-world financial management task. We examine an alternative called Continual Learning (CL), a memory-augmented approach, which can provide transparent explanations ; which memory did what and when. This work has implications for many financial applications including to credit, time-varying fairness in decision making and more. We make three important new observations. Firstly, as well as being more explainable, time-series CL approaches outperform LSTM and a simple sliding window learner ( feed-forward neural net (FFNN) ) . Secondly, we show that CL based on a sliding window learner (FFNN) is more effective than CL based on a sequential learner (LSTM). Thirdly, we examine how real-world, time-series noise impacts several similarity approaches used in CL memory addressing. We provide these insights using an approach called Continual Learning Augmentation (CLA) tested on a complex real world problem; emerging market equities investment decision making. CLA provides a test-bed as it can be based on different types of time-series learner , allowing testing of LSTM and sliding window (FFNN ) learners side by side. CLA is also used to test several distance approaches used in a memory recall-gate: euclidean distance (ED), dynamic time warping (DTW), auto-encoder (AE) and a novel hybrid approach, warp-AE. We find CLA out-performs simple LSTM and FFNN learners and CLA based on a sliding window (CLA-FFNN) out-performs a LSTM (CLA-LSTM) implementation. While for memory-addressing, ED under-performs DTW and AE but warp-AE shows the best overall performance in a real-world financial task.", "after_revision": "LSTMs promise much to financial time-series analysis, temporal and cross-sectional inference, but we find that they do not deliver in a real-world financial management task. We examine an alternative called Continual Learning (CL), a memory-augmented approach, which can provide transparent explanations , i.e. which memory did what and when. This work has implications for many financial applications including credit, time-varying fairness in decision making and more. We make three important new observations. Firstly, as well as being more explainable, time-series CL approaches outperform LSTMs as well as a simple sliding window learner using feed-forward neural networks (FFNN) . Secondly, we show that CL based on a sliding window learner (FFNN) is more effective than CL based on a sequential learner (LSTM). Thirdly, we examine how real-world, time-series noise impacts several similarity approaches used in CL memory addressing. We provide these insights using an approach called Continual Learning Augmentation (CLA) tested on a complex real-world problem, emerging market equities investment decision making. CLA provides a test-bed as it can be based on different types of time-series learners , allowing testing of LSTM and FFNN learners side by side. CLA is also used to test several distance approaches used in a memory recall-gate: Euclidean distance (ED), dynamic time warping (DTW), auto-encoders (AE) and a novel hybrid approach, warp-AE. We find that ED under-performs DTW and AE but warp-AE shows the best overall performance in a real-world financial task.", "edit_actions": [{"type": "A", "before": null, "after": "that", "start_char_pos": 106, "end_char_pos": 106}, {"type": "R", "before": ";", "after": ", i.e.", "start_char_pos": 300, "end_char_pos": 301}, {"type": "D", "before": "to", "after": null, "start_char_pos": 403, "end_char_pos": 405}, {"type": "R", "before": "LSTM and", "after": "LSTMs as well as", "start_char_pos": 588, "end_char_pos": 596}, {"type": "R", "before": "(", "after": "using", "start_char_pos": 629, "end_char_pos": 630}, {"type": "R", "before": "net", "after": "networks", "start_char_pos": 651, "end_char_pos": 654}, {"type": "D", "before": ")", "after": null, "start_char_pos": 662, "end_char_pos": 663}, {"type": "R", "before": "real world problem;", "after": "real-world problem,", "start_char_pos": 1028, "end_char_pos": 1047}, {"type": "R", "before": "learner", "after": "learners", "start_char_pos": 1178, "end_char_pos": 1185}, {"type": "R", "before": "sliding window (FFNN )", "after": "FFNN", "start_char_pos": 1217, "end_char_pos": 1239}, {"type": "R", "before": "euclidean", "after": "Euclidean", "start_char_pos": 1346, "end_char_pos": 1355}, {"type": "R", "before": "auto-encoder", "after": "auto-encoders", "start_char_pos": 1399, "end_char_pos": 1411}, {"type": "R", "before": "CLA out-performs simple LSTM and FFNN learners and CLA based on a sliding window (CLA-FFNN) out-performs a LSTM (CLA-LSTM) implementation. While for memory-addressing,", "after": "that", "start_char_pos": 1463, "end_char_pos": 1630}], "sents_char_pos": [0, 169, 301, 333, 464, 506, 796, 918, 1047, 1100, 1262, 1454, 1601]}
+{"doc_id": "1911.07166", "revision_depth": "1", "before_revision": "Consider a curve \\Gamma in a domain D in the plane \\boldsymbol ^2. Thinking of D as a piece of paper, one can make a curved folding in the Euclidean space \\boldsymbol ^3. This can be expressed as the image of an `origami map' \\varphi :D\\to \\boldsymbol ^3 such that \\Gamma is the singular set of \\varphi , the word `origami' coming from the Japanese term for paper folding. We call the singular set image C:= \\varphi (\\Gamma) the crease of \\varphi and the singular set \\Gamma the crease pattern of \\varphi . We are interested in the number of origami maps whose creases and crease patterns are C and \\Gamma respectively. Two such possibilities have been known. In the previous authors' work, two other new possibilities and an explicit example with four such non-congruent distinct curved foldings were established. In this paper, we show that the case of four mutually non-congruent curved foldings with the same crease and crease pattern occurs if and only if \\Gamma and C do not admit any symmetries. Moreover , when C is a closed curve, we show that there are infinitely many distinct possibilities for curved foldings with the same crease and crease pattern, in general.", "after_revision": "Consider an oriented curve \\Gamma in a domain D in the plane \\boldsymbol R ^2. Thinking of D as a piece of paper, one can make a curved folding in the Euclidean space \\boldsymbol R ^3. This can be expressed as the image of an \"origami map\" \\Phi :D\\to \\boldsymbol R ^3 such that \\Gamma is the singular set of \\Phi , the word \"origami\" coming from the Japanese term for paper folding. We call the singular set image C:= \\Phi (\\Gamma) the crease of \\Phi and the singular set \\Gamma the crease pattern of \\Phi . We are interested in the number of origami maps whose creases and crease patterns are C and \\Gamma , respectively. Two such possibilities have been known. In the authors' previous work, two other new possibilities and an explicit example with four such non-congruent distinct curved foldings were established. In this paper, we determine the possibility of the number N of congruence classes of curved foldings with the same crease and crease pattern . As a consequence, if C is a non-closed simple arc, then N=4 if and only if both \\Gamma and C do not admit any symmetries. On the other hand , when C is a closed curve, there are infinitely many distinct possibilities for curved foldings with the same crease and crease pattern, in general.", "edit_actions": [{"type": "R", "before": "a", "after": "an oriented", "start_char_pos": 9, "end_char_pos": 10}, {"type": "A", "before": null, "after": "R", "start_char_pos": 63, "end_char_pos": 63}, {"type": "A", "before": null, "after": "R", "start_char_pos": 168, "end_char_pos": 168}, {"type": "R", "before": "`origami map' \\varphi", "after": "\"origami map\" \\Phi", "start_char_pos": 214, "end_char_pos": 235}, {"type": "A", "before": null, "after": "R", "start_char_pos": 254, "end_char_pos": 254}, {"type": "R", "before": "\\varphi", "after": "\\Phi", "start_char_pos": 298, "end_char_pos": 305}, {"type": "R", "before": "`origami'", "after": "\"origami\"", "start_char_pos": 317, "end_char_pos": 326}, {"type": "R", "before": "\\varphi", "after": "\\Phi", "start_char_pos": 411, "end_char_pos": 418}, {"type": "R", "before": "\\varphi", "after": "\\Phi", "start_char_pos": 442, "end_char_pos": 449}, {"type": "R", "before": "\\varphi", "after": "\\Phi", "start_char_pos": 500, "end_char_pos": 507}, {"type": "A", "before": null, "after": ",", "start_char_pos": 609, "end_char_pos": 609}, {"type": "R", "before": "previous authors'", "after": "authors' previous", "start_char_pos": 671, "end_char_pos": 688}, {"type": "R", "before": "show that the case of four mutually non-congruent", "after": "determine the possibility of the number N of congruence classes of", "start_char_pos": 837, "end_char_pos": 886}, {"type": "R", "before": "occurs if", "after": ". As a consequence, if C is a non-closed simple arc, then N=4 if", "start_char_pos": 943, "end_char_pos": 952}, {"type": "A", "before": null, "after": "both", "start_char_pos": 965, "end_char_pos": 965}, {"type": "R", "before": "Moreover", "after": "On the other hand", "start_char_pos": 1008, "end_char_pos": 1016}, {"type": "D", "before": "we show that", "after": null, "start_char_pos": 1045, "end_char_pos": 1057}], "sents_char_pos": [0, 67, 172, 375, 509, 623, 663, 818, 1007]}
+{"doc_id": "1911.08241", "revision_depth": "1", "before_revision": "Statistical modeling techniques, such as projection pursuit regression (PPR) and convolutional neural network (CNN)approaches, provide state-of-the-art performance in characterizing visual cortical neurons' receptive fields and predicting their responses to arbitrary input stimuli. However, the latent feature components recovered by these methods, particularly that of CNN , are often noisy and lack coherent structures , making it difficult to understand the underlying feature components that are used to construct the receptive fieldfeature tunings of the neurons . In this paper, we showed that using a dictionary of complex sparse codes, learned from natural scenes based on efficient coding theory, as the front-end for these methods can improve their performance in neural response prediction. At the same time , this approach makes the component features of the models more transparent and interpretable. We consider using these learned dictionaries as the front-end that can effectively imposing priors on the constituent components. We found that models with complex sparse code prior are significantly better than models with classical Gabor and/or Laplacian of Gaussian filter priors for modeling and predicting the activities of neurons that have been earlier identified to exhibit higher-order (HO) complex pattern selectivity but not better for modeling neurons that preferred orientation bars or grating (OT) . This observation affirms the recent discovery of complex feature selectivity of V1 neurons and also supports the predictions of efficient coding theory under over-complete conditions .", "after_revision": "System identification techniques---projection pursuit regression models (PPR) and convolutional neural networks (CNNs)---provide state-of-the-art performance in predicting visual cortical neurons' responses to arbitrary input stimuli. However, the constituent kernels recovered by these methods, particularly those of CNNs , are often noisy and lack coherent structure , making it difficult to understand the underlying component features of a neuron's receptive field . In this paper, we show that using a dictionary of complex sparse codes, which are learned from natural scenes based on efficient coding theory, as the front-end for PPR and CNNs can improve their performance in neuronal response prediction. More importantly , this approach makes the constituent kernels of these models substantially more coherent and interpretable. Extensive experimental results also indicate that these interpretable kernels provide important information on the component features of a neuron's receptive field. In addition, we find that models with a complex sparse code front-end are significantly better than models with a standard orientation-selective Gabor filter front-end for modeling V1 neurons that have been found to exhibit complex pattern selectivity . This observation adds further credence to the sparse coding theory as well as empirical findings of complex feature selectivity in V1 .", "edit_actions": [{"type": "R", "before": "Statistical modeling techniques, such as projection pursuit regression", "after": "System identification techniques---projection pursuit regression models", "start_char_pos": 0, "end_char_pos": 70}, {"type": "R", "before": "network (CNN)approaches, provide", "after": "networks (CNNs)---provide", "start_char_pos": 102, "end_char_pos": 134}, {"type": "R", "before": "characterizing", "after": "predicting", "start_char_pos": 167, "end_char_pos": 181}, {"type": "D", "before": "receptive fields and predicting their", "after": null, "start_char_pos": 207, "end_char_pos": 244}, {"type": "R", "before": "latent feature components", "after": "constituent kernels", "start_char_pos": 296, "end_char_pos": 321}, {"type": "R", "before": "that of CNN", "after": "those of CNNs", "start_char_pos": 363, "end_char_pos": 374}, {"type": "R", "before": "structures", "after": "structure", "start_char_pos": 411, "end_char_pos": 421}, {"type": "R", "before": "feature components that are used to construct the receptive fieldfeature tunings of the neurons", "after": "component features of a neuron's receptive field", "start_char_pos": 473, "end_char_pos": 568}, {"type": "R", "before": "showed", "after": "show", "start_char_pos": 589, "end_char_pos": 595}, {"type": "A", "before": null, "after": "which are", "start_char_pos": 645, "end_char_pos": 645}, {"type": "R", "before": "these methods", "after": "PPR and CNNs", "start_char_pos": 729, "end_char_pos": 742}, {"type": "R", "before": "neural", "after": "neuronal", "start_char_pos": 776, "end_char_pos": 782}, {"type": "R", "before": "At the same time", "after": "More importantly", "start_char_pos": 804, "end_char_pos": 820}, {"type": "R", "before": "component features of the models more transparent", "after": "constituent kernels of these models substantially more coherent", "start_char_pos": 847, "end_char_pos": 896}, {"type": "R", "before": "We consider using these learned dictionaries as the front-end that can effectively imposing priors on the constituent components. We found", "after": "Extensive experimental results also indicate that these interpretable kernels provide important information on the component features of a neuron's receptive field. In addition, we find", "start_char_pos": 916, "end_char_pos": 1054}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1072, "end_char_pos": 1072}, {"type": "R", "before": "prior", "after": "front-end", "start_char_pos": 1093, "end_char_pos": 1098}, {"type": "R", "before": "classical Gabor and/or Laplacian of Gaussian filter priors for modeling and predicting the activities of", "after": "a standard orientation-selective Gabor filter front-end for modeling V1", "start_char_pos": 1141, "end_char_pos": 1245}, {"type": "R", "before": "earlier identified to exhibit higher-order (HO)", "after": "found to exhibit", "start_char_pos": 1269, "end_char_pos": 1316}, {"type": "D", "before": "but not better for modeling neurons that preferred orientation bars or grating (OT)", "after": null, "start_char_pos": 1345, "end_char_pos": 1428}, {"type": "R", "before": "affirms the recent discovery", "after": "adds further credence to the sparse coding theory as well as empirical findings", "start_char_pos": 1448, "end_char_pos": 1476}, {"type": "R", "before": "of", "after": "in", "start_char_pos": 1508, "end_char_pos": 1510}, {"type": "D", "before": "neurons and also supports the predictions of efficient coding theory under over-complete conditions", "after": null, "start_char_pos": 1514, "end_char_pos": 1613}], "sents_char_pos": [0, 282, 570, 803, 915, 1045, 1430]}
+{"doc_id": "1911.08448", "revision_depth": "3", "before_revision": "We propose a mathematical model of momentum risk-taking, which is essentially real-time risk management , focused on short-term volatility of stock markets. Its implementation, an automated momentum equity trading system , proved to be successful in extensive historical and real-time experiments , discussed in the paper. Risk-taking is one of the key components of general decision-making, a challenge for artificial intelligence and machine learning . We begin with a relatively simple new algebraic-type theory of news impact on share-prices, which describes well their power growth, periodicity, logarithmic periodicity, and the market phenomena like price targets and profit-taking ; Bessel and hypergeometric functions are used . Its discretization results in some tables of bids, expected returns for different investment horizons. This is a new approach; its preimage is a new contract card game presented at the end, a combination of bridge and poker. The relations to random processes and fractional Brownian motion are outlined . We provide a reasonably complete description of our AI-type trading system, but our ML procedures are not discussed much (a special version of those in neural networking is used) .", "after_revision": "We propose a mathematical model of momentum risk-taking, which is essentially real-time risk management focused on short-term volatility of stock markets. Its implementation, our fully automated momentum equity trading system presented systematically , proved to be successful in extensive historical and real-time experiments . Momentum risk-taking is one of the key components of general decision-making, a challenge for artificial intelligence and machine learning with deep roots in cognitive science; its variants beyond stock markets are discussed . We begin with a new algebraic-type theory of news impact on share-prices, which describes well their power growth, periodicity, and the market phenomena like price targets and profit-taking . This theory generally requires Bessel and hypergeometric functions . Its discretization results in some tables of bids, which are basically expected returns for main investment horizons, the key in our trading system. The ML procedures we use are similar to those in neural networking. A preimage of our approach is the new contract card game provided at the end, a combination of bridge and poker. Relations to random processes and the fractional Brownian motion are outlined .", "edit_actions": [{"type": "D", "before": ",", "after": null, "start_char_pos": 104, "end_char_pos": 105}, {"type": "R", "before": "an", "after": "our fully", "start_char_pos": 177, "end_char_pos": 179}, {"type": "A", "before": null, "after": "presented systematically", "start_char_pos": 221, "end_char_pos": 221}, {"type": "R", "before": ", discussed in the paper. Risk-taking", "after": ". Momentum risk-taking", "start_char_pos": 298, "end_char_pos": 335}, {"type": "A", "before": null, "after": "with deep roots in cognitive science; its variants beyond stock markets are discussed", "start_char_pos": 454, "end_char_pos": 454}, {"type": "D", "before": "relatively simple", "after": null, "start_char_pos": 473, "end_char_pos": 490}, {"type": "D", "before": "logarithmic periodicity,", "after": null, "start_char_pos": 603, "end_char_pos": 627}, {"type": "R", "before": ";", "after": ". This theory generally requires", "start_char_pos": 690, "end_char_pos": 691}, {"type": "D", "before": "are used", "after": null, "start_char_pos": 728, "end_char_pos": 736}, {"type": "A", "before": null, "after": "which are basically", "start_char_pos": 790, "end_char_pos": 790}, {"type": "R", "before": "different investment horizons. This is a new approach; its preimage is a", "after": "main investment horizons, the key in our trading system. The ML procedures we use are similar to those in neural networking. A preimage of our approach is the", "start_char_pos": 812, "end_char_pos": 884}, {"type": "R", "before": "presented", "after": "provided", "start_char_pos": 908, "end_char_pos": 917}, {"type": "R", "before": "The relations", "after": "Relations", "start_char_pos": 965, "end_char_pos": 978}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1003, "end_char_pos": 1003}, {"type": "D", "before": ". We provide a reasonably complete description of our AI-type trading system, but our ML procedures are not discussed much (a special version of those in neural networking is used)", "after": null, "start_char_pos": 1044, "end_char_pos": 1224}], "sents_char_pos": [0, 156, 323, 456, 691, 738, 842, 866, 964, 1045]}
+{"doc_id": "1911.09103", "revision_depth": "1", "before_revision": "Often the development of novel materials is not amenable to high-throughput or purely computational screening methods. Instead, materials must be synthesized one at a time in a process that does not generate significant amounts of data. One way this method can be improved is by ensuring that each experiment provides the best improvement in both material properties and predictive modeling accuracy. In this work , we study the effectiveness of active learning, which optimizes the orderof experiments, and meta learning, which transfers knowledge from one context to another , to reduce the number of experiments necessary to build a predictive model. We present a novel multi-task benchmark database of peptides designed to advance active, few-shot, and meta-learning methods for experimental design. Each task is binary classification of peptides represented as a sequence string. We show results of standard active learning and meta-learning methods across these datasets to assess their ability to improve predictive models with the fewest number of experiments. We find the ensemble query by committee active learning method to be effective . The meta-learning method Reptile was found to improve accuracy. The robustness of these conclusions were tested across multiple model choices. We find that combining meta-learning with active learning methods offers inconsistent benefits.", "after_revision": "Often the development of novel functional peptides is not amenable to high throughput or purely computational screening methods. Peptides must be synthesized one at a time in a process that does not generate large amounts of data. One way this method can be improved is by ensuring that each experiment provides the best improvement in both peptide properties and predictive modeling accuracy. Here , we study the effectiveness of active learning, optimizing experiment order , and meta-learning, transferring knowledge between contexts, to reduce the number of experiments necessary to build a predictive model. We present a multi-task benchmark database of peptides designed to advance these methods for experimental design. Each task is binary classification of peptides represented as a sequence string. We find neither active learning method tested to be better than random choice . The meta-learning method Reptile was found to improve average accuracy across datasets. Combining meta-learning with active learning offers inconsistent benefits.", "edit_actions": [{"type": "R", "before": "materials", "after": "functional peptides", "start_char_pos": 31, "end_char_pos": 40}, {"type": "R", "before": "high-throughput", "after": "high throughput", "start_char_pos": 60, "end_char_pos": 75}, {"type": "R", "before": "Instead, materials", "after": "Peptides", "start_char_pos": 119, "end_char_pos": 137}, {"type": "R", "before": "significant", "after": "large", "start_char_pos": 208, "end_char_pos": 219}, {"type": "R", "before": "material", "after": "peptide", "start_char_pos": 347, "end_char_pos": 355}, {"type": "R", "before": "In this work", "after": "Here", "start_char_pos": 401, "end_char_pos": 413}, {"type": "R", "before": "which optimizes the orderof experiments, and meta learning, which transfers knowledge from one context to another", "after": "optimizing experiment order", "start_char_pos": 463, "end_char_pos": 576}, {"type": "A", "before": null, "after": "and meta-learning, transferring knowledge between contexts,", "start_char_pos": 579, "end_char_pos": 579}, {"type": "D", "before": "novel", "after": null, "start_char_pos": 668, "end_char_pos": 673}, {"type": "R", "before": "active, few-shot, and meta-learning", "after": "these", "start_char_pos": 736, "end_char_pos": 771}, {"type": "R", "before": "show results of standard active learning and meta-learning methods across these datasets to assess their ability to improve predictive models with the fewest number of experiments. We find the ensemble query by committee", "after": "find neither", "start_char_pos": 889, "end_char_pos": 1109}, {"type": "R", "before": "to be effective", "after": "tested to be better than random choice", "start_char_pos": 1133, "end_char_pos": 1148}, {"type": "R", "before": "accuracy. The robustness of these conclusions were tested across multiple model choices. We find that combining", "after": "average accuracy across datasets. Combining", "start_char_pos": 1205, "end_char_pos": 1316}, {"type": "D", "before": "methods", "after": null, "start_char_pos": 1352, "end_char_pos": 1359}], "sents_char_pos": [0, 118, 236, 400, 654, 804, 885, 1069, 1150, 1214, 1293]}
+{"doc_id": "1911.10009", "revision_depth": "1", "before_revision": "Divide and Choose among two agents , and the Diminishing Share (DS) and Moving Knife (MK) algorithms among many, elicit parsimonious information to guarantee to each a Fair Share, worth at least 1/ n-th of the whole manna. Our n-person Divide and Choose (D C) rule, unlike DS and MK, works if the manna has subjectively good and bad parts. If utilities are additive over indivisible items, it implements the canonical \"Fair Share up to one item\" approximation. The D%DIFDELCMD < &%%% C rule also offers one interpretation of the Fair Share when utilities are neither additivenor monotonic . Under a mild continuity assumption, it guarantees to each agent her minMax utility : that of her best share in the worst possible partition. This is lower than her Maxmin utility : that of her worst share in the best possible partition. When the manna is unanimously good, or unanimously bad, better guarantees than minMax are feasible. Our Bid & Choose rules fix an additive benchmark measure of shares, and ask agents to bid the smallest size of a share they find acceptable . The resulting Guarantee is between the minMax and Maxmin utilities ", "after_revision": "A basic test of fairness when we divide a manna of private items between n agents is the lowest welfare the rule guarantees to each agent, irrespective of others preferences. Two familiar examples are: the Equal Split Guarantee when the manna is divisible and preferences are convex; and 1/ %DIFDELCMD < &%%% n of the utility of a heterogenous non atomic cake, if utilities are additive. The minMax utility of an agent is that of her best share in the worst possible n-partition of. It is weakly below her Maxmin utility , that of her worst share in the best possible n-partition. The Maxmin guarantee is not feasible, even with two agents, if non convex preferences are allowed. The minMax guarantee is feasible in the very general class of problems where the manna is non atomic and utilities are continuous, but not necessarily additive or monotonic. The proof uses advanced algebraic topology techniques. And the minMax guarantee is implemented by the n-person version of Divide and Choose due to Kuhn (1967). When utilities are co-monotone (a larger part of the manna is weakly better for everyone, or weakly worse for everyone) better guarantees than minMax are feasible. In our Bid & Choose rules , agents bid the smallest size (according to some benchmark measure of the manna) of a share they find acceptable , and the lowest bidder picks such a share . The resulting guarantee is between the minMax and Maxmin utilities . 1", "edit_actions": [{"type": "R", "before": "Divide and Choose among two agents , and the Diminishing Share (DS) and Moving Knife (MK) algorithms among many, elicit parsimonious information to guarantee to each a Fair Share, worth at least", "after": "A basic test of fairness when we divide a manna of private items between n agents is the lowest welfare the rule guarantees to each agent, irrespective of others preferences. Two familiar examples are: the Equal Split Guarantee when the manna is divisible and preferences are convex; and", "start_char_pos": 0, "end_char_pos": 194}, {"type": "D", "before": "n-th of the whole manna. Our n-person Divide and Choose (D", "after": null, "start_char_pos": 198, "end_char_pos": 256}, {"type": "D", "before": "C) rule, unlike DS and MK, works if the manna has subjectively good and bad parts. If utilities are additive over indivisible items, it implements the canonical \"Fair Share up to one item\" approximation. The D", "after": null, "start_char_pos": 257, "end_char_pos": 466}, {"type": "R", "before": "C rule also offers one interpretation of the Fair Share when utilities are neither additivenor monotonic . Under a mild continuity assumption, it guarantees to each agent her minMax utility :", "after": "n of the utility of a heterogenous non atomic cake, if utilities are additive. The minMax utility of an agent is", "start_char_pos": 484, "end_char_pos": 675}, {"type": "R", "before": "partition. This is lower than", "after": "n-partition of. It is weakly below", "start_char_pos": 721, "end_char_pos": 750}, {"type": "R", "before": ":", "after": ",", "start_char_pos": 770, "end_char_pos": 771}, {"type": "R", "before": "partition. When the manna is unanimously good, or unanimously bad,", "after": "n-partition. The Maxmin guarantee is not feasible, even with two agents, if non convex preferences are allowed. The minMax guarantee is feasible in the very general class of problems where the manna is non atomic and utilities are continuous, but not necessarily additive or monotonic. The proof uses advanced algebraic topology techniques. And the minMax guarantee is implemented by the n-person version of Divide and Choose due to Kuhn (1967). When utilities are co-monotone (a larger part of the manna is weakly better for everyone, or weakly worse for everyone)", "start_char_pos": 817, "end_char_pos": 883}, {"type": "R", "before": "Our", "after": "In our", "start_char_pos": 928, "end_char_pos": 931}, {"type": "R", "before": "fix an additive benchmark measure of shares, and ask agents to", "after": ", agents", "start_char_pos": 951, "end_char_pos": 1013}, {"type": "R", "before": "of", "after": "(according to some benchmark measure of the manna) of", "start_char_pos": 1036, "end_char_pos": 1038}, {"type": "A", "before": null, "after": ", and the lowest bidder picks such a share", "start_char_pos": 1068, "end_char_pos": 1068}, {"type": "R", "before": "Guarantee", "after": "guarantee", "start_char_pos": 1085, "end_char_pos": 1094}, {"type": "A", "before": null, "after": ". 1", "start_char_pos": 1138, "end_char_pos": 1138}], "sents_char_pos": [0, 222, 339, 460, 590, 731, 827, 927, 1070]}
+{"doc_id": "1912.04015", "revision_depth": "1", "before_revision": "Financial market in oil-dependent countries has been always influenced by any changes in international energy market, In particular, oil price.It is therefore of considerable interest to investigate the impact of oil price on financial markets. The aim of this paperis to model the impact of oil price volatility on stock and industry indices by considering gas and gold price,exchange rate and trading volume as explanatory variables. We also propose Feed-forward networks as an accurate method to model non-linearity. we use data from 2009 to 2018 that is split in two periods during international energy sanction and post-sanction. The results show that Feed-forward networks perform well in predicting variables and oil price volatility has a significant impact on stock and industry market indices. The result is more robust in the post-sanction period and global financial crisis in 2014. Herein, it is important for financial market analysts and policy makers to note which factors and when influence the financial market, especially in an oil-dependent country such as Iran with uncertainty in the international politics. This research analyses the results in two different periods, which is important in the terms of oil price shock and international energy sanction. Also, using neural networks in methodology gives more accurate and reliable results. Keywords: Feed-forward networks,Industry index,International energy sanction,Oil price volatility ", "after_revision": "In this paper, we model the impact of oil price volatility on Tehranstock and industry indices in two periods of international sanctions and post-sanction. To analyse the purpose of study, we use Feed-forward neural net-works. The period of study is from 2008 to 2018 that is split in two periods during international energy sanction and post-sanction. The results show that Feed-forward neural networks perform well in predicting stock market and industry, which means oil price volatility has a significant impact on stock and industry market indices. During post-sanction and global financial crisis , the model performs better in predicting industry index. Additionally, oil price-stock market index prediction performs better in the period of international sanctions. Herein, these results are, up to some extent, important for financial market analysts and policy makers to understand which factors and when influence the financial market, especially in an oil-dependent country such asIran with uncertainty in the international politics. Keywords: Feed-forward neural networks,Industry index,International energy sanction,Oil price volatility ,Tehran stock index", "edit_actions": [{"type": "R", "before": "Financial market in oil-dependent countries has been always influenced by any changes in international energy market, In particular, oil price.It is therefore of considerable interest to investigate the impact of oil price on financial markets. The aim of this paperis to", "after": "In this paper, we", "start_char_pos": 0, "end_char_pos": 271}, {"type": "R", "before": "stock", "after": "Tehranstock", "start_char_pos": 316, "end_char_pos": 321}, {"type": "R", "before": "by considering gas and gold price,exchange rate and trading volume as explanatory variables. We also propose", "after": "in two periods of international sanctions and post-sanction. To analyse the purpose of study, we use", "start_char_pos": 343, "end_char_pos": 451}, {"type": "R", "before": "networks as an accurate method to model non-linearity. we use data from 2009", "after": "neural net-works. The period of study is from 2008", "start_char_pos": 465, "end_char_pos": 541}, {"type": "A", "before": null, "after": "neural", "start_char_pos": 670, "end_char_pos": 670}, {"type": "R", "before": "variables and", "after": "stock market and industry, which means", "start_char_pos": 707, "end_char_pos": 720}, {"type": "R", "before": "The result is more robust in the", "after": "During", "start_char_pos": 805, "end_char_pos": 837}, {"type": "D", "before": "period", "after": null, "start_char_pos": 852, "end_char_pos": 858}, {"type": "R", "before": "in 2014. Herein, it is", "after": ", the model performs better in predicting industry index. Additionally, oil price-stock market index prediction performs better in the period of international sanctions. Herein, these results are, up to some extent,", "start_char_pos": 887, "end_char_pos": 909}, {"type": "R", "before": "note", "after": "understand", "start_char_pos": 971, "end_char_pos": 975}, {"type": "R", "before": "as Iran", "after": "asIran", "start_char_pos": 1075, "end_char_pos": 1082}, {"type": "D", "before": "This research analyses the results in two different periods, which is important in the terms of oil price shock and international energy sanction. Also, using neural networks in methodology gives more accurate and reliable results.", "after": null, "start_char_pos": 1131, "end_char_pos": 1362}, {"type": "A", "before": null, "after": "neural", "start_char_pos": 1386, "end_char_pos": 1386}, {"type": "A", "before": null, "after": ",Tehran stock index", "start_char_pos": 1462, "end_char_pos": 1462}], "sents_char_pos": [0, 143, 244, 435, 634, 804, 895, 1130, 1277, 1362]}
+{"doc_id": "1912.05031", "revision_depth": "1", "before_revision": "A discrete system's heterogeneity is measured by the R\\'enyi heterogeneity family of indices (also known as Hill numbers or Hannah-Kay indices), whose units are known as the numbers equivalent , and whose scaling properties are consistent and intuitive . Unfortunately, numbers equivalent heterogeneity measures for non-categorical data require a priori (A) categorical partitioning and (B) pairwise distance measurement on the space of observable data . This precludes their application to problems in disciplines where categories are ill-defined or where semantically relevant features must be learned as abstractions from some data. We thus introduce representational R\\'enyi heterogeneity (RRH), which transforms an observable domain onto a latent space upon which the R\\'enyi heterogeneity is both tractable and semantically relevant. This method does not require a priori binning nor definition of a distance function on the observable space. Compared with existing state-of-the-art indices on a beta-mixture distribution, we show that RRH more accurately detects the number of distinct mixture components. We also show that RRH can measure heterogeneity in natural images whose semantically relevant features must be abstracted using deep generative models. We further show that RRH can uniquely capture heterogeneity caused by distinct components in mixture distributions. Our novel approach will enable measurement of heterogeneity in disciplines where a priori categorical partitions of observable data are not possible, or where semantically relevant features must be inferred using latent variable models .", "after_revision": "A discrete system's heterogeneity is measured by the R\\'enyi heterogeneity family of indices (also known as Hill numbers or Hannah--Kay indices), whose units are the numbers equivalent . Unfortunately, numbers equivalent heterogeneity measures for non-categorical data require a priori (A) categorical partitioning and (B) pairwise distance measurement on the observable data space, thereby precluding application to problems with ill-defined categories or where semantically relevant features must be learned as abstractions from some data. We thus introduce representational R\\'enyi heterogeneity (RRH), which transforms an observable domain onto a latent space upon which the R\\'enyi heterogeneity is both tractable and semantically relevant. This method requires neither a priori binning nor definition of a distance function on the observable space. We show that RRH can generalize existing biodiversity and economic equality indices. Compared with existing indices on a beta-mixture distribution, we show that RRH responds more appropriately to changes in mixture component separation and weighting. Finally, we demonstrate the measurement of RRH in a set of natural images, with respect to abstract representations learned by a deep neural network. The RRH approach will further enable heterogeneity measurement in disciplines whose data do not easily conform to the assumptions of existing indices .", "edit_actions": [{"type": "R", "before": "Hannah-Kay", "after": "Hannah--Kay", "start_char_pos": 124, "end_char_pos": 134}, {"type": "D", "before": "known as", "after": null, "start_char_pos": 161, "end_char_pos": 169}, {"type": "D", "before": ", and whose scaling properties are consistent and intuitive", "after": null, "start_char_pos": 193, "end_char_pos": 252}, {"type": "R", "before": "a priori", "after": "a priori", "start_char_pos": 345, "end_char_pos": 353}, {"type": "R", "before": "space of observable data . This precludes their", "after": "observable data space, thereby precluding", "start_char_pos": 428, "end_char_pos": 475}, {"type": "R", "before": "in disciplines where categories are", "after": "with", "start_char_pos": 500, "end_char_pos": 535}, {"type": "A", "before": null, "after": "categories", "start_char_pos": 548, "end_char_pos": 548}, {"type": "R", "before": "does not require a priori", "after": "requires neither", "start_char_pos": 853, "end_char_pos": 878}, {"type": "A", "before": null, "after": "a priori", "start_char_pos": 879, "end_char_pos": 879}, {"type": "A", "before": null, "after": "We show that RRH can generalize existing biodiversity and economic equality indices.", "start_char_pos": 951, "end_char_pos": 951}, {"type": "D", "before": "state-of-the-art", "after": null, "start_char_pos": 975, "end_char_pos": 991}, {"type": "R", "before": "more accurately detects the number of distinct mixture components. We also show that RRH can measure heterogeneity in natural images whose semantically relevant features must be abstracted using deep generative models. We further show that RRH can uniquely capture heterogeneity caused by distinct components in mixture distributions. Our novel approach will enable measurement of heterogeneity", "after": "responds more appropriately to changes in mixture component separation and weighting. Finally, we demonstrate the measurement of RRH", "start_char_pos": 1049, "end_char_pos": 1443}, {"type": "R", "before": "disciplines where a priori categorical partitions of observable data are not possible, or where semantically relevant features must be inferred using latent variable models", "after": "a set of natural images, with respect to abstract representations learned by a deep neural network. The RRH approach will further enable heterogeneity measurement in disciplines whose data do not easily conform to the assumptions of existing indices", "start_char_pos": 1447, "end_char_pos": 1619}], "sents_char_pos": [0, 254, 454, 636, 840, 950, 1115, 1267, 1383]}
+{"doc_id": "1912.08369", "revision_depth": "1", "before_revision": "Understanding the causes and effects of spatial patterns of vegetation is a fundamental problem in ecology, especially because these can be used as early predictors of catastrophic shifts such as desertification processes. Empirical studies of the vegetation cover of drylands and semiarid regions have revealed the existence of vegetation patches of broadly diverse sizes , such that the probability distribution of their sizes can be fitted by a power law, i.e. vegetation patches are approximately scale free. Different explanatory mechanisms, such as plant-plant interactions and plant-water feedback loops have been proposed to justify such a finding , yet a full understanding has not been reached. Using a simple individual-based model for vegetation dynamics, we show that environmental variability --a well-recognized characteristic feature of semiarid environments-- promotes the emergence of power-law vegetation patches in a robust way (i.e. for a broad range of parameter values) . Furthermore, these are related to a percolation phenomenon that occurs in an intermittent or fluctuating way. The model also reveals that the emerging power-law exponents depend on the overall vegetation-cover density exhibiting the same trend as empirical data and, remarkably, the fitted exponents agree reasonably well with the ones measured in well-known empirical studies. We conclude that environmental variability plays a key role in the formation of such vegetation patterns. From a practical viewpoint, this may be of importance to predict the effects that changes in environmental conditions may have in real ecosystems. From a theoretical side our study shed new light on intermittent percolation phenomena occurring under fluctuating conditions.", "after_revision": "Understanding the causes and effects of spatial patterns of vegetation is a fundamental problem in ecology, especially because these can be used as early predictors of catastrophic shifts such as desertification processes. Empirical studies of the vegetation cover in some areas such as drylands and semiarid regions have revealed the existence of vegetation patches of broadly diverse sizes . In particular, the probability distribution of patch sizes can be fitted by a power law, i.e. vegetation patches are approximately scale free. Different explanatory mechanisms, such as plant-plant interactions and plant-water feedback loops have been proposed to rationalize the emergence of such scale-free patterns , yet a full understanding has not been reached. Using a simple model for vegetation dynamics, we show that environmental temporal variability --a well-recognized feature of semiarid environments-- promotes in a robust way (i.e. for a broad range of parameter values) the emergence of scale-free vegetation patches . Furthermore, this observation is related to a percolation phenomenon that occurs in an intermittent or fluctuating way. The model also reveals that the emerging power-law exponents depend on the overall vegetation-cover density , in agreement with empirical observations, suggesting that environmental variability plays a key role in the formation of scale-free vegetation patterns. From a practical viewpoint, this may be of importance to predict the effects that changes in environmental conditions may have in real ecosystems. From a theoretical side , our study sheds new light on a novel type of percolation phenomenon occurring under temporally-varying external conditions.", "edit_actions": [{"type": "R", "before": "of", "after": "in some areas such as", "start_char_pos": 265, "end_char_pos": 267}, {"type": "R", "before": ", such that", "after": ". In particular,", "start_char_pos": 373, "end_char_pos": 384}, {"type": "R", "before": "their", "after": "patch", "start_char_pos": 417, "end_char_pos": 422}, {"type": "R", "before": "justify such a finding", "after": "rationalize the emergence of such scale-free patterns", "start_char_pos": 633, "end_char_pos": 655}, {"type": "D", "before": "individual-based", "after": null, "start_char_pos": 720, "end_char_pos": 736}, {"type": "A", "before": null, "after": "temporal", "start_char_pos": 795, "end_char_pos": 795}, {"type": "D", "before": "characteristic", "after": null, "start_char_pos": 828, "end_char_pos": 842}, {"type": "D", "before": "the emergence of power-law vegetation patches", "after": null, "start_char_pos": 887, "end_char_pos": 932}, {"type": "A", "before": null, "after": "the emergence of scale-free vegetation patches", "start_char_pos": 994, "end_char_pos": 994}, {"type": "R", "before": "these are", "after": "this observation is", "start_char_pos": 1010, "end_char_pos": 1019}, {"type": "R", "before": "exhibiting the same trend as empirical data and, remarkably, the fitted exponents agree reasonably well with the ones measured in well-known empirical studies. We conclude", "after": ", in agreement with empirical observations, suggesting", "start_char_pos": 1215, "end_char_pos": 1386}, {"type": "R", "before": "such", "after": "scale-free", "start_char_pos": 1455, "end_char_pos": 1459}, {"type": "R", "before": "our study shed", "after": ", our study sheds", "start_char_pos": 1652, "end_char_pos": 1666}, {"type": "R", "before": "intermittent percolation phenomena occurring under fluctuating", "after": "a novel type of percolation phenomenon occurring under temporally-varying external", "start_char_pos": 1680, "end_char_pos": 1742}], "sents_char_pos": [0, 222, 512, 704, 996, 1106, 1374, 1480, 1627]}
+{"doc_id": "1912.09380", "revision_depth": "1", "before_revision": "Within sEMG-based gesture recognition, a chasm exists in the literature between offline accuracy and real-time usability of a classifier. This gap mainly stems from the four main dynamic factors in sEMG-based gesture recognition: gesture intensity, limb position, electrode shift and transient changes in the signal . These factors are hard to include within an offline dataset as each of them exponentially augment the number of segments to be recorded. On the other hand , online datasets are biased towards the sEMG-based algorithms providing feedback to the participants, limiting the usability of such datasets as benchmarks. This paper proposes a virtual reality (VR) environment and a real-time experimental protocol from which the four main dynamic factors can more easily be studied. During the online experiment, the gesture recognition feedback is provided through the leap motion camera, enabling the proposed dataset to be re-used to compare future sEMG-based algorithms. 20 able-bodied persons took part in this study, completing three to four sessions over a period spanning between 14 and 21 days. Finally, TADANN, a new transfer learning-based algorithm, is proposed for long term gesture classification and significantly (p<0.05) outperforms fine-tuning a network .", "after_revision": "Within the field of electromyography-based (EMG) gesture recognition, disparities exist between the offline accuracy reported in the literature and the real-time usability of a classifier. This gap mainly stems from two factors: 1) The absence of a controller, making the data collected dissimilar to actual control. 2) The difficulty of including the four main dynamic factors (gesture intensity, limb position, electrode shift , and transient changes in the signal ), as including their permutations drastically increases the amount of data to be recorded. Contrarily , online datasets are limited to the exact EMG-based controller used to record them, necessitating the recording of a new dataset for each control method or variant to be tested. Consequently, this paper proposes a new type of dataset to serve as an intermediate between offline and online datasets, by recording the data using a real-time experimental protocol . The protocol, performed in virtual reality, includes the four main dynamic factors and uses an EMG-independent controller to guide movements. This EMG-independent feedback ensures that the user is in-the-loop during recording, while enabling the resulting dynamic dataset to be used as an EMG-based benchmark. The dataset is comprised of 20 able-bodied participants completing three to four sessions over a period of 14 to 21 days. The ability of the dynamic dataset to serve as a benchmark is leveraged to evaluate the impact of different recalibration techniques for long-term (across-day) gesture recognition, including a novel algorithm, named TADANN. TADANN consistently and significantly (p<0.05) outperforms using fine-tuning as the recalibration technique .", "edit_actions": [{"type": "R", "before": "sEMG-based", "after": "the field of electromyography-based (EMG)", "start_char_pos": 7, "end_char_pos": 17}, {"type": "R", "before": "a chasm exists in the literature between offline accuracy and", "after": "disparities exist between the offline accuracy reported in the literature and the", "start_char_pos": 39, "end_char_pos": 100}, {"type": "R", "before": "the", "after": "two factors: 1) The absence of a controller, making the data collected dissimilar to actual control. 2) The difficulty of including the", "start_char_pos": 165, "end_char_pos": 168}, {"type": "R", "before": "in sEMG-based gesture recognition: gesture", "after": "(gesture", "start_char_pos": 195, "end_char_pos": 237}, {"type": "A", "before": null, "after": ",", "start_char_pos": 280, "end_char_pos": 280}, {"type": "R", "before": ". These factors are hard to include within an offline dataset as each of them exponentially augment the number of segments", "after": "), as including their permutations drastically increases the amount of data", "start_char_pos": 317, "end_char_pos": 439}, {"type": "R", "before": "On the other hand", "after": "Contrarily", "start_char_pos": 456, "end_char_pos": 473}, {"type": "R", "before": "biased towards the sEMG-based algorithms providing feedback to the participants, limiting the usability of such datasets as benchmarks. This", "after": "limited to the exact EMG-based controller used to record them, necessitating the recording of a new dataset for each control method or variant to be tested. Consequently, this", "start_char_pos": 496, "end_char_pos": 636}, {"type": "R", "before": "virtual reality (VR) environment and", "after": "new type of dataset to serve as an intermediate between offline and online datasets, by recording the data using", "start_char_pos": 654, "end_char_pos": 690}, {"type": "R", "before": "from which", "after": ". The protocol, performed in virtual reality, includes", "start_char_pos": 725, "end_char_pos": 735}, {"type": "R", "before": "can more easily be studied. During the online experiment, the gesture recognition feedback is provided through the leap motion camera, enabling the proposed", "after": "and uses an EMG-independent controller to guide movements. This EMG-independent feedback ensures that the user is in-the-loop during recording, while enabling the resulting dynamic", "start_char_pos": 766, "end_char_pos": 922}, {"type": "R", "before": "re-used to compare future sEMG-based algorithms.", "after": "used as an EMG-based benchmark. The dataset is comprised of", "start_char_pos": 937, "end_char_pos": 985}, {"type": "R", "before": "persons took part in this study,", "after": "participants", "start_char_pos": 1001, "end_char_pos": 1033}, {"type": "R", "before": "spanning between", "after": "of", "start_char_pos": 1082, "end_char_pos": 1098}, {"type": "R", "before": "and", "after": "to", "start_char_pos": 1102, "end_char_pos": 1105}, {"type": "R", "before": "Finally, TADANN, a new transfer learning-based algorithm, is proposed for long term gesture classification", "after": "The ability of the dynamic dataset to serve as a benchmark is leveraged to evaluate the impact of different recalibration techniques for long-term (across-day) gesture recognition, including a novel algorithm, named TADANN. TADANN consistently", "start_char_pos": 1115, "end_char_pos": 1221}, {"type": "A", "before": null, "after": "using", "start_char_pos": 1261, "end_char_pos": 1261}, {"type": "R", "before": "a network", "after": "as the recalibration technique", "start_char_pos": 1274, "end_char_pos": 1283}], "sents_char_pos": [0, 137, 318, 455, 631, 793, 985, 1114]}
+{"doc_id": "1912.09765", "revision_depth": "1", "before_revision": "Availability codes have recently been proposed to facilitate efficient storage, management, and retrieval of frequently accessed data in distributed storage systems. Such codes provide multiple disjoint recovery groups for each data object, which makes it possible for multiple users to access the same object in a non-overlapping way. However in the presence of server-side performance variability, downloading an object using a recovery group takes longer than using a single server hosting the object. Therefore it is not immediately clear whether availability codes reduce latency to access hot data . Accordingly, the goal of this paper is to analyze, using a queuing theoretical approach, the download time in storage systems that employ availability codes . For data access, we consider the widely adopted Fork-Join model with redundancy. In this model, each request arrival splits into multiple copies and completes as soon as any one of the copies finishes service. We first carry out the analysis under the low-traffic regime in which case the system consists of at most one download request at any time. In this setting, we compare the download time in systems with availability, maximum distance separable (MDS), and replication codes. Our results indicate that availability codes can reduce download time in some settings, but are not always optimal. When the low-traffic assumption does not hold, system consists of multiple inter-dependent Fork-Join queues operating in parallel , which makes the exact analysis intractable . For this case we present upper and lower bounds on the download time . These bounds yield insight on system performance with respect to varying popularities over the stored objects. We also derive an M/G/1 queue approximation for the system, and show with simulations that it performs well in estimating the actual system performance .", "after_revision": "Availability codes have recently been proposed to facilitate efficient retrieval of frequently accessed (hot) data objects in distributed storage systems. Such codes provide multiple disjoint recovery groups for each data object, thus providing flexibility in accessing data objects. This paper presents techniques for analyzing the download time of systematic availability codes considering the Fork-Join scheme for data access. With the Fork-Join access scheme, each data request is replicated (forked) to the systematic server containing the object and all of its recovery groups. For low-traffic regime , when there is at most one request in the system, we compute the download time in closed-form and compare it across systems with availability, maximum distance separable (MDS), and replication codes. We demonstrate that availability codes can reduce download time in some settings, but are not always optimal. When the low-traffic assumption does not hold, system consists of multiple inter-dependent Fork-Join queues , which makes exact analysis intractable due to state space explosion . For this case , we present upper and lower bounds on the download time , and an M/G/1 queue approximation for several special cases of interest. Via numerical simulations, we evaluate our bounds, and demonstrate that the M/G/1 queue approximation has a high degree of accuracy. We also compare availability codes with MDS and replication codes .", "edit_actions": [{"type": "D", "before": "storage, management, and", "after": null, "start_char_pos": 71, "end_char_pos": 95}, {"type": "R", "before": "data", "after": "(hot) data objects", "start_char_pos": 129, "end_char_pos": 133}, {"type": "R", "before": "which makes it possible for multiple users to access the same object in a non-overlapping way. However in the presence of server-side performance variability, downloading an object using a recovery group takes longer than using a single server hosting the object. Therefore it is not immediately clear whether availability codes reduce latency to access hot data . Accordingly, the goal of this paper is to analyze, using a queuing theoretical approach,", "after": "thus providing flexibility in accessing data objects. This paper presents techniques for analyzing", "start_char_pos": 241, "end_char_pos": 694}, {"type": "R", "before": "in storage systems that employ availability codes . For data access, we consider the widely adopted", "after": "of systematic availability codes considering the", "start_char_pos": 713, "end_char_pos": 812}, {"type": "R", "before": "model with redundancy. In this model, each request arrival splits into multiple copies and completes as soon as any one of the copies finishes service. We first carry out the analysis under the", "after": "scheme for data access. With the Fork-Join access scheme, each data request is replicated (forked) to the systematic server containing the object and all of its recovery groups. For", "start_char_pos": 823, "end_char_pos": 1016}, {"type": "R", "before": "in which case the system consists of", "after": ", when there is", "start_char_pos": 1036, "end_char_pos": 1072}, {"type": "R", "before": "download request at any time. In this setting, we compare", "after": "request in the system, we compute", "start_char_pos": 1085, "end_char_pos": 1142}, {"type": "A", "before": null, "after": "closed-form and compare it across", "start_char_pos": 1164, "end_char_pos": 1164}, {"type": "R", "before": "Our results indicate", "after": "We demonstrate", "start_char_pos": 1249, "end_char_pos": 1269}, {"type": "D", "before": "operating in parallel", "after": null, "start_char_pos": 1473, "end_char_pos": 1494}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1509, "end_char_pos": 1512}, {"type": "A", "before": null, "after": "due to state space explosion", "start_char_pos": 1540, "end_char_pos": 1540}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1557, "end_char_pos": 1557}, {"type": "R", "before": ". These bounds yield insight on system performance with respect to varying popularities over the stored objects. We also derive", "after": ", and", "start_char_pos": 1613, "end_char_pos": 1740}, {"type": "R", "before": "the system, and show with simulations that it performs well in estimating the actual system performance", "after": "several special cases of interest. Via numerical simulations, we evaluate our bounds, and demonstrate that the M/G/1 queue approximation has a high degree of accuracy. We also compare availability codes with MDS and replication codes", "start_char_pos": 1774, "end_char_pos": 1877}], "sents_char_pos": [0, 165, 335, 504, 605, 764, 845, 974, 1114, 1248, 1364, 1542, 1614, 1725]}
+{"doc_id": "1912.10375", "revision_depth": "1", "before_revision": "While there has been great interest in generating imperceptible adversarial examples in continuous data domain (e.g. image and audio)to explore the model vulnerabilities, generatingadversarial text in the discrete domain is still challenging . The main contribution of this paper is to propose a general targeted attack framework AdvCodec for adversarial text generation which addresses the challenge of discrete input space and is easily adapted to general natural language processing (NLP ) tasks. In particular, we propose a tree-based autoencoder to encode discrete text data into continuous vector space, upon which we optimize the adversarial perturbation. A tree-based decoder is then applied to ensure the grammar correctness of the generated text . It also enables the flexibility of making manipulations on different levels of text, such as sentence (AdvCodec(sent)) and word (AdvCodec(word)) levels . We consider multiple attacking scenarios, including appending an adversarial sentence or adding unnoticeable words to a given paragraph, to achieve the arbitrary targeted attack. To demonstrate the effectiveness of the proposed method, we consider two most representative NLP tasks: sentiment analysis and question answering (QA). Extensive experimental results and human studies show that AdvCodec generated adversarial text can successfully attack the neural models without misleading the human. In particular, our attack causes a BERT-based sentiment classifier accuracy to drop from 0.703 to 0.006, and a BERT-based QA model's F1 score to drop from 88.62 to 33.21 (with best targeted attack F1 score as 46.54). Furthermore, we show that the white-box generated adversarial texts can transfer across other black-box models, shedding light on an effective way to examine the robustness of existing NLP models. ", "after_revision": "Adversarial attacks against natural language processing systems, which perform seemingly innocuous modifications to inputs, can induce arbitrary mistakes to the target models. Though raised great concerns, such adversarial attacks can be leveraged to estimate the robustness of NLP models. Compared with the adversarial example generation in continuous data domain (e.g. , image ) , generating adversarial text that preserves the original meaning is challenging since the text space is discrete and non-differentiable. To handle these challenges, we propose a target-controllable adversarial attack framework T3, which is applicable to a range of NLP tasks. In particular, we propose a tree-based autoencoder to embed the discrete text data into a continuous representation space, upon which we optimize the adversarial perturbation. A novel tree-based decoder is then applied to regularize the syntactic correctness of the generated text and manipulate it on either sentence (T3(Sent)) or word (T3(Word)) level . We consider two most representative NLP tasks: sentiment analysis and question answering (QA). Extensive experimental results and human studies show that T3 generated adversarial texts can successfully manipulate the NLP models to output the targeted incorrect answer without misleading the human. Moreover, we show that the generated adversarial texts have high transferability which enables the black-box attacks in practice. Our work sheds light on an effective and general way to examine the robustness of NLP models. Our code is publicly available at URL", "edit_actions": [{"type": "R", "before": "While there has been great interest in generating imperceptible adversarial examples", "after": "Adversarial attacks against natural language processing systems, which perform seemingly innocuous modifications to inputs, can induce arbitrary mistakes to the target models. Though raised great concerns, such adversarial attacks can be leveraged to estimate the robustness of NLP models. Compared with the adversarial example generation", "start_char_pos": 0, "end_char_pos": 84}, {"type": "D", "before": "image and audio)to explore the model vulnerabilities, generating", "after": null, "start_char_pos": 117, "end_char_pos": 181}, {"type": "D", "before": "adversarial text", "after": null, "start_char_pos": 181, "end_char_pos": 197}, {"type": "R", "before": "in the discrete domain is still challenging . The main contribution of this paper is to propose a general targeted attack framework AdvCodec for adversarial text generation which addresses the challenge of discrete input space and is easily adapted to general natural language processing (NLP", "after": ", image", "start_char_pos": 198, "end_char_pos": 490}, {"type": "A", "before": null, "after": ", generating adversarial text that preserves the original meaning is challenging since the text space is discrete and non-differentiable. To handle these challenges, we propose a target-controllable adversarial attack framework T3, which is applicable to a range of NLP", "start_char_pos": 493, "end_char_pos": 493}, {"type": "R", "before": "encode", "after": "embed the", "start_char_pos": 555, "end_char_pos": 561}, {"type": "R", "before": "continuous vector", "after": "a continuous representation", "start_char_pos": 586, "end_char_pos": 603}, {"type": "A", "before": null, "after": "novel", "start_char_pos": 666, "end_char_pos": 666}, {"type": "R", "before": "ensure the grammar", "after": "regularize the syntactic", "start_char_pos": 705, "end_char_pos": 723}, {"type": "R", "before": ". It also enables the flexibility of making manipulations on different levels of text, such as sentence (AdvCodec(sent)) and word (AdvCodec(word)) levels", "after": "and manipulate it on either sentence (T3(Sent)) or word (T3(Word)) level", "start_char_pos": 758, "end_char_pos": 911}, {"type": "D", "before": "multiple attacking scenarios, including appending an adversarial sentence or adding unnoticeable words to a given paragraph, to achieve the arbitrary targeted attack. To demonstrate the effectiveness of the proposed method, we consider", "after": null, "start_char_pos": 926, "end_char_pos": 1161}, {"type": "R", "before": "AdvCodec generated adversarial text can successfully attack the neural models", "after": "T3 generated adversarial texts can successfully manipulate the NLP models to output the targeted incorrect answer", "start_char_pos": 1304, "end_char_pos": 1381}, {"type": "R", "before": "In particular, our attack causes a BERT-based sentiment classifier accuracy to drop from 0.703 to 0.006, and a BERT-based QA model's F1 score to drop from 88.62 to 33.21 (with best targeted attack F1 score as 46.54). Furthermore,", "after": "Moreover,", "start_char_pos": 1412, "end_char_pos": 1641}, {"type": "D", "before": "white-box", "after": null, "start_char_pos": 1659, "end_char_pos": 1668}, {"type": "R", "before": "can transfer across other", "after": "have high transferability which enables the", "start_char_pos": 1697, "end_char_pos": 1722}, {"type": "R", "before": "models, shedding", "after": "attacks in practice. Our work sheds", "start_char_pos": 1733, "end_char_pos": 1749}, {"type": "A", "before": null, "after": "and general", "start_char_pos": 1772, "end_char_pos": 1772}, {"type": "D", "before": "existing", "after": null, "start_char_pos": 1806, "end_char_pos": 1814}, {"type": "A", "before": null, "after": "Our code is publicly available at URL", "start_char_pos": 1827, "end_char_pos": 1827}], "sents_char_pos": [0, 243, 500, 663, 759, 913, 1092, 1244, 1411, 1628]}
+{"doc_id": "1912.11430", "revision_depth": "1", "before_revision": "Molecular fingerprints are the workhorse in ligand-based drug discovery. In recent years, increasing number of research papers reported fascinating results on using deep neural networks to learn 2D molecular representations as fingerprints. One may anticipate that the integration of deep learning would also contribute to the prosperity of 3D fingerprints. Here, we presented a new 3D small molecule fingerprint, the three-dimensional force fields fingerprint (TF3P) , learned by deep capsular network whose training is in no need of labeled dataset for specific predictive tasks. TF3P can encode the 3D force fields information of molecules and demonstrates its stronger ability to capture 3D structural changes, recognize molecules alike in 3D but not in 2D, and recognize similar targets inaccessible by other fingerprints, including the solely existing 3D fingerprint E3FP, based on only ligands similarity. Furthermore, TF3P is compatible with both statistical models (e.g. similarity ensemble approach) and machine learning models. Altogether, we report TF3P as a new 3D small molecule fingerprint with promising future in ligand-based drug discovery. ", "after_revision": "Molecular fingerprints are the workhorse in ligand-based drug discovery. In recent years, an increasing number of research papers reported fascinating results on using deep neural networks to learn 2D molecular representations as fingerprints. It is anticipated that the integration of deep learning would also contribute to the prosperity of 3D fingerprints. Here, we unprecedentedly introduce deep learning into 3D small molecule fingerprints, presenting a new one we termed as the three-dimensional force fields fingerprint (TF3P) . TF3P is learned by a deep capsular network whose training is in no need of labeled datasets for specific predictive tasks. TF3P can encode the 3D force fields information of molecules and demonstrates the stronger ability to capture 3D structural changes, to recognize molecules alike in 3D but not in 2D, and to identify similar targets inaccessible by other 2D or 3D fingerprints based on only ligands similarity. Furthermore, TF3P is compatible with both statistical models (e.g. similarity ensemble approach) and machine learning models. Altogether, we report TF3P as a new 3D small molecule fingerprint with a promising future in ligand-based drug discovery. All codes are written in Python and available at URL", "edit_actions": [{"type": "A", "before": null, "after": "an", "start_char_pos": 90, "end_char_pos": 90}, {"type": "R", "before": "One may anticipate", "after": "It is anticipated", "start_char_pos": 242, "end_char_pos": 260}, {"type": "R", "before": "presented a new", "after": "unprecedentedly introduce deep learning into", "start_char_pos": 368, "end_char_pos": 383}, {"type": "R", "before": "fingerprint,", "after": "fingerprints, presenting a new one we termed as", "start_char_pos": 402, "end_char_pos": 414}, {"type": "R", "before": ", learned by", "after": ". TF3P is learned by a", "start_char_pos": 469, "end_char_pos": 481}, {"type": "R", "before": "dataset", "after": "datasets", "start_char_pos": 544, "end_char_pos": 551}, {"type": "R", "before": "its", "after": "the", "start_char_pos": 661, "end_char_pos": 664}, {"type": "A", "before": null, "after": "to", "start_char_pos": 716, "end_char_pos": 716}, {"type": "R", "before": "recognize", "after": "to identify", "start_char_pos": 768, "end_char_pos": 777}, {"type": "R", "before": "fingerprints, including the solely existing", "after": "2D or", "start_char_pos": 816, "end_char_pos": 859}, {"type": "R", "before": "fingerprint E3FP,", "after": "fingerprints", "start_char_pos": 863, "end_char_pos": 880}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1112, "end_char_pos": 1112}, {"type": "A", "before": null, "after": "All codes are written in Python and available at URL", "start_char_pos": 1162, "end_char_pos": 1162}], "sents_char_pos": [0, 72, 241, 358, 582, 914, 1040]}
+{"doc_id": "2001.03197", "revision_depth": "2", "before_revision": "The emerging autonomous vehicles (AV) can either supplement the public transportation (PT) system or be a competitor with it. This paper focuses on this competition in a hypothetical scenario--\"if both AV and PT operators are profit-oriented ,\" and uses an ABM to quantitatively evaluate the system performance in this competition from the perspectives of four stakeholders--AV operator, PT operator, passengers, and public authority. In our model, AV operator updates its supply by changing fleet sizes while PT by adjusting headways, and both use heuristic approaches to update supply in order to increase profits. We implement the model in the first-mile scenario in Tampines . In four regulation scenarios--two by two combinations regarding whether AV and PT are allowed to change supplies--we find that since AV can release the bus operator from low-demand routes, the competition can lead to higher profits of both, and higher system efficiency , simultaneously, rather than a one-sided loss-gain result. For PT, after supply updates, spatially the services are concentrated to short feeder routes directly to the subway station , and temporally concentrated to peak hours. For passengers , the competition reduces their travel time but increases their travel costs. Nonetheless, the generalized travel cost is still reduced when counting the value of time. For system efficiencyand sustainability, bus supply adjustment can increase the bus average load and reduce total PCE , while the AV supply adjustment shows the oppositeeffect. For policy implications, the paper suggests that PT should be allowed to optimize its supply strategies under specific operation goal constraints, and AV operation should be regulated to relieve its externality on the system, including limiting the number of licenses, operation time, and service areas, which makes AV operate like a complementary mode to PT .", "after_revision": "Emerging autonomous vehicles (AV) can either supplement the public transportation (PT) system or compete with it. This study examines the competitive perspective where both AV and PT operators are profit-oriented with dynamic adjustable supply strategies under five regulatory structures regarding whether the AV operator is allowed to change the fleet size and whether the PT operator is allowed to adjust headway. Four out of the five scenarios are constrained competition while the other one focuses on unconstrained competition to find the Nash Equilibrium. We evaluate the competition process as well as the system performance from the standpoints of four stakeholders -- the AV operator, the PT operator, passengers, and the transport authority. We also examine the impact of PT subsidies on the competition results including both demand-based and supply-based subsidies. A heuristic algorithm is proposed to update supply strategies for AV and PT based on the operators' historical actions and profits. An agent-based simulation model is implemented in the first-mile scenario in Tampines , Singapore. We find that the competition can result in higher profits and higher system efficiency for both operators compared to the status quo. After the supply updates, the PT services are spatially concentrated to shorter routes feeding directly to the subway station and temporally concentrated to peak hours. On average , the competition reduces the travel time of passengers but increases their travel costs. Nonetheless, the generalized travel cost is reduced when incorporating the value of time. With respect to the system efficiency, the bus supply adjustment increases the average vehicle load and reduces the total vehicle kilometer traveled measured by the passenger car equivalent (PCE) , while the AV supply adjustment does the opposite .", "edit_actions": [{"type": "R", "before": "The emerging", "after": "Emerging", "start_char_pos": 0, "end_char_pos": 12}, {"type": "R", "before": "be a competitor", "after": "compete", "start_char_pos": 101, "end_char_pos": 116}, {"type": "R", "before": "paper focuses on this competition in a hypothetical scenario--\"if", "after": "study examines the competitive perspective where", "start_char_pos": 131, "end_char_pos": 196}, {"type": "R", "before": ",\" and uses an ABM to quantitatively evaluate the system performance in this competition from the perspectives of four stakeholders--AV operator,", "after": "with dynamic adjustable supply strategies under five regulatory structures regarding whether the AV operator is allowed to change the fleet size and whether the PT operator is allowed to adjust headway. Four out of the five scenarios are constrained competition while the other one focuses on unconstrained competition to find the Nash Equilibrium. We evaluate the competition process as well as the system performance from the standpoints of four stakeholders -- the AV operator, the", "start_char_pos": 242, "end_char_pos": 387}, {"type": "R", "before": "public authority. In our model, AV operator updates its supply by changing fleet sizes while PT by adjusting headways, and both use heuristic approaches", "after": "the transport authority. We also examine the impact of PT subsidies on the competition results including both demand-based and supply-based subsidies. A heuristic algorithm is proposed", "start_char_pos": 417, "end_char_pos": 569}, {"type": "R", "before": "in order to increase profits. We implement the model", "after": "strategies for AV and PT based on the operators' historical actions and profits. An agent-based simulation model is implemented", "start_char_pos": 587, "end_char_pos": 639}, {"type": "R", "before": ". In four regulation scenarios--two by two combinations regarding whether AV and PT are allowed to change supplies--we find that since AV can release the bus operator from low-demand routes, the competition can lead to higher profits of both,", "after": ", Singapore. We find that the competition can result in higher profits", "start_char_pos": 679, "end_char_pos": 921}, {"type": "R", "before": ", simultaneously, rather than a one-sided loss-gain result. For PT, after", "after": "for both operators compared to the status quo. After the", "start_char_pos": 951, "end_char_pos": 1024}, {"type": "R", "before": "spatially the services are concentrated to short feeder routes", "after": "the PT services are spatially concentrated to shorter routes feeding", "start_char_pos": 1041, "end_char_pos": 1103}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1135, "end_char_pos": 1136}, {"type": "R", "before": "For passengers", "after": "On average", "start_char_pos": 1180, "end_char_pos": 1194}, {"type": "R", "before": "their travel time", "after": "the travel time of passengers", "start_char_pos": 1221, "end_char_pos": 1238}, {"type": "R", "before": "still reduced when counting", "after": "reduced when incorporating", "start_char_pos": 1317, "end_char_pos": 1344}, {"type": "R", "before": "For system efficiencyand sustainability,", "after": "With respect to the system efficiency, the", "start_char_pos": 1364, "end_char_pos": 1404}, {"type": "R", "before": "can increase the bus average load and reduce total PCE", "after": "increases the average vehicle load and reduces the total vehicle kilometer traveled measured by the passenger car equivalent (PCE)", "start_char_pos": 1427, "end_char_pos": 1481}, {"type": "R", "before": "shows the oppositeeffect. For policy implications, the paper suggests that PT should be allowed to optimize its supply strategies under specific operation goal constraints, and AV operation should be regulated to relieve its externality on the system, including limiting the number of licenses, operation time, and service areas, which makes AV operate like a complementary mode to PT", "after": "does the opposite", "start_char_pos": 1515, "end_char_pos": 1899}], "sents_char_pos": [0, 125, 434, 616, 680, 1010, 1179, 1272, 1363, 1540]}
+{"doc_id": "2001.04063", "revision_depth": "2", "before_revision": "In this paper , we present a new sequence-to-sequence pre-training model called ProphetNet, which introduces a novel self-supervised objective named future n-gram prediction and the proposed n-stream self-attention mechanism. Instead of the optimization of one-step ahead prediction in traditional sequence-to-sequence model, the ProphetNet is optimized by n-step ahead prediction which predicts the next n tokens simultaneously based on previous context tokens at each time step. The future n-gram prediction explicitly encourages the model to plan for the future tokens and prevent overfitting on strong local correlations. We pre-train ProphetNet using a base scale dataset (16GB) and a large scale dataset (160GB) respectively. Then we conduct experiments on CNN/DailyMail, Gigaword, and SQuAD 1.1 benchmarks for abstractive summarization and question generation tasks. Experimental results show that ProphetNet achieves new state-of-the-art results on all these datasets compared to the models using the same scale pre-training corpus.", "after_revision": "This paper presents a new sequence-to-sequence pre-training model called ProphetNet, which introduces a novel self-supervised objective named future n-gram prediction and the proposed n-stream self-attention mechanism. Instead of optimizing one-step-ahead prediction in the traditional sequence-to-sequence model, the ProphetNet is optimized by n-step ahead prediction that predicts the next n tokens simultaneously based on previous context tokens at each time step. The future n-gram prediction explicitly encourages the model to plan for the future tokens and prevent overfitting on strong local correlations. We pre-train ProphetNet using a base scale dataset (16GB) and a large-scale dataset (160GB) , respectively. Then we conduct experiments on CNN/DailyMail, Gigaword, and SQuAD 1.1 benchmarks for abstractive summarization and question generation tasks. Experimental results show that ProphetNet achieves new state-of-the-art results on all these datasets compared to the models using the same scale pre-training corpus.", "edit_actions": [{"type": "R", "before": "In this paper , we present", "after": "This paper presents", "start_char_pos": 0, "end_char_pos": 26}, {"type": "R", "before": "the optimization of one-step ahead prediction in", "after": "optimizing one-step-ahead prediction in the", "start_char_pos": 237, "end_char_pos": 285}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 381, "end_char_pos": 386}, {"type": "R", "before": "large scale", "after": "large-scale", "start_char_pos": 690, "end_char_pos": 701}, {"type": "A", "before": null, "after": ",", "start_char_pos": 718, "end_char_pos": 718}], "sents_char_pos": [0, 225, 480, 625, 732, 874]}
+{"doc_id": "2001.04283", "revision_depth": "1", "before_revision": "Some consumers, such as householders , are unwilling to face volatile electricity prices, and perceive as unfair price differentiations based on location . For these reasons, nodal prices in distribution networks are rarely employed. However, the increasing availability of renewable resources in distribution grids, and emerging price-elastic behaviour, pave the way for the effective introduction of marginal nodal pricing schemes in distribution networks. The aim of the proposed framework is to show how traditional non-flexible consumers can coexist with flexible users in a local distribution area , where the latter pay nodal prices whereas the former are charged a fixed price , which is derived by the underlying nodal prices. In addition, it determines how the distribution system operator should manage the local grid by optimally determining the lines to be expanded, and the collected network tariff levied on network users, while accounting for both congestion rent and investment costs. The proposed framework is formulated as a non-linear integer bilevel model , which is then recast as an equivalent single optimization problem, by using integer algebra and complementarity relations. The power flows in the distribution area are modelled by resorting to a second-order cone relaxation, whose solution is exact for radial networks under mild assumptions. The final model results in a mixed-integer quadratically constrained program, which can be solved with off-the-shelf solvers. Numerical test cases based on a 5-bus and a 33-bus networks are reported to show the effectiveness of the proposed method.", "after_revision": "Some consumers, particularly households , are unwilling to face volatile electricity prices, and they can perceive as unfair price differentiation in the same local area . For these reasons, nodal prices in distribution networks are rarely employed. However, the increasing availability of renewable resources and emerging price-elastic behaviours pave the way for the effective introduction of marginal nodal pricing schemes in distribution networks. The aim of the proposed framework is to show how traditional non-flexible consumers can coexist with flexible users in a local distribution area . Flexible users will pay nodal prices , whereas non-flexible consumers will be charged a fixed price derived from the underlying nodal prices. Moreover, the developed approach shows how a distribution system operator should manage the local grid by optimally determining the lines to be expanded, and the collected network tariff levied on grid users, while accounting for both congestion rent and investment costs. The proposed model is formulated as a non-linear integer bilevel program , which is then recast as an equivalent single optimization problem, by using integer algebra and complementarity relations. The power flows in the distribution area are modelled by resorting to a second-order cone relaxation, whose solution is exact for radial networks under mild assumptions. The final model results in a mixed-integer quadratically constrained program, which can be solved with off-the-shelf solvers. Numerical test cases based on both 5-bus and 33-bus networks are reported to show the effectiveness of the proposed method.", "edit_actions": [{"type": "R", "before": "such as householders", "after": "particularly households", "start_char_pos": 16, "end_char_pos": 36}, {"type": "A", "before": null, "after": "they can", "start_char_pos": 94, "end_char_pos": 94}, {"type": "R", "before": "differentiations based on location", "after": "differentiation in the same local area", "start_char_pos": 120, "end_char_pos": 154}, {"type": "D", "before": "in distribution grids,", "after": null, "start_char_pos": 295, "end_char_pos": 317}, {"type": "R", "before": "behaviour,", "after": "behaviours", "start_char_pos": 345, "end_char_pos": 355}, {"type": "R", "before": ", where the latter", "after": ". Flexible users will", "start_char_pos": 605, "end_char_pos": 623}, {"type": "R", "before": "whereas the former are", "after": ", whereas non-flexible consumers will be", "start_char_pos": 641, "end_char_pos": 663}, {"type": "R", "before": ", which is derived by", "after": "derived from", "start_char_pos": 686, "end_char_pos": 707}, {"type": "R", "before": "In addition, it determines how the", "after": "Moreover, the developed approach shows how a", "start_char_pos": 737, "end_char_pos": 771}, {"type": "R", "before": "network", "after": "grid", "start_char_pos": 924, "end_char_pos": 931}, {"type": "R", "before": "framework", "after": "model", "start_char_pos": 1016, "end_char_pos": 1025}, {"type": "R", "before": "model", "after": "program", "start_char_pos": 1072, "end_char_pos": 1077}, {"type": "R", "before": "a", "after": "both", "start_char_pos": 1529, "end_char_pos": 1530}, {"type": "D", "before": "a", "after": null, "start_char_pos": 1541, "end_char_pos": 1542}], "sents_char_pos": [0, 156, 234, 459, 736, 1002, 1202, 1372, 1498]}
+{"doc_id": "2001.06927", "revision_depth": "1", "before_revision": "Existing VQA datasets contain questions with varying levels of complexity. While the majority of questions in these datasets require perception for recognizing existence, properties, and spatial relationships of entities, a significant portion of questions pose challenges that correspond to reasoning tasks -- tasks that can only be answered through a synthesis of perception and knowledge about the world, logic and / or reasoning. This distinction allows us to notice when existing VQA models have consistency issues -- they answer the reasoning question correctly but fail on associated low-level perception questions. For example, models answer the complex reasoning question \"Is the banana ripe enough to eat?\" correctly, but fail on the associated perception question \"Are the bananas mostly green or yellow?\" indicating that the model likely answered the reasoning question correctly but for the wrong reason. We quantify the extent to which this phenomenon occurs by creating a new Reasoning split of the VQA dataset and collecting Sub-VQA , a new dataset consisting of 200K new perception questions which serve as sub questions corresponding to the set of perceptual tasks needed to effectively answer the complex reasoning questions in the Reasoning split. Additionally, we propose an approach called Sub-Question Importance-aware Network Tuning (SQuINT), which encourages the model to attend do the same parts of the image when answering the reasoning question and the perception sub questions . We show that SQuINT improves model consistency by 7.8 \\%, also marginally improving its performance on the Reasoning questions in VQA, while also displaying qualitatively better attention maps.", "after_revision": "Existing VQA datasets contain questions with varying levels of complexity. While the majority of questions in these datasets require perception for recognizing existence, properties, and spatial relationships of entities, a significant portion of questions pose challenges that correspond to reasoning tasks - tasks that can only be answered through a synthesis of perception and knowledge about the world, logic and / or reasoning. Analyzing performance across this distinction allows us to notice when existing VQA models have consistency issues ; they answer the reasoning questions correctly but fail on associated low-level perception questions. For example, in Figure 1, models answer the complex reasoning question \"Is the banana ripe enough to eat?\" correctly, but fail on the associated perception question \"Are the bananas mostly green or yellow?\" indicating that the model likely answered the reasoning question correctly but for the wrong reason. We quantify the extent to which this phenomenon occurs by creating a new Reasoning split of the VQA dataset and collecting VQA-introspect , a new dataset1 which consists of 238K new perception questions which serve as sub questions corresponding to the set of perceptual tasks needed to effectively answer the complex reasoning questions in the Reasoning split. Our evaluation shows that state-of-the-art VQA models have comparable performance in answering perception and reasoning questions, but suffer from consistency problems. To address this shortcoming, we propose an approach called Sub-Question Importance-aware Network Tuning (SQuINT), which encourages the model to attend to the same parts of the image when answering the reasoning question and the perception sub question . We show that SQuINT improves model consistency by ~5 \\%, also marginally improving performance on the Reasoning questions in VQA, while also displaying better attention maps.", "edit_actions": [{"type": "R", "before": "--", "after": "-", "start_char_pos": 308, "end_char_pos": 310}, {"type": "R", "before": "This", "after": "Analyzing performance across this", "start_char_pos": 434, "end_char_pos": 438}, {"type": "R", "before": "--", "after": ";", "start_char_pos": 520, "end_char_pos": 522}, {"type": "R", "before": "question", "after": "questions", "start_char_pos": 549, "end_char_pos": 557}, {"type": "A", "before": null, "after": "in Figure 1,", "start_char_pos": 636, "end_char_pos": 636}, {"type": "R", "before": "Sub-VQA", "after": "VQA-introspect", "start_char_pos": 1042, "end_char_pos": 1049}, {"type": "R", "before": "dataset consisting of 200K", "after": "dataset1 which consists of 238K", "start_char_pos": 1058, "end_char_pos": 1084}, {"type": "R", "before": "Additionally,", "after": "Our evaluation shows that state-of-the-art VQA models have comparable performance in answering perception and reasoning questions, but suffer from consistency problems. To address this shortcoming,", "start_char_pos": 1269, "end_char_pos": 1282}, {"type": "R", "before": "do", "after": "to", "start_char_pos": 1405, "end_char_pos": 1407}, {"type": "R", "before": "questions", "after": "question", "start_char_pos": 1497, "end_char_pos": 1506}, {"type": "R", "before": "7.8", "after": "~5", "start_char_pos": 1559, "end_char_pos": 1562}, {"type": "D", "before": "its", "after": null, "start_char_pos": 1593, "end_char_pos": 1596}, {"type": "D", "before": "qualitatively", "after": null, "start_char_pos": 1666, "end_char_pos": 1679}], "sents_char_pos": [0, 74, 433, 622, 918, 1268, 1508]}
+{"doc_id": "2001.07676", "revision_depth": "1", "before_revision": "Some NLP tasks can be solved in a fully unsupervised fashion by providing a pretrained language model with \"task descriptions\" in natural language (e.g., Radford et al., 2019). While this approach underperforms its supervised counterpart, we show in this work that the two ideas can be combined: We introduce Pattern-Exploiting Training (PET), a semi-supervised training procedure that reformulates input examples as cloze-style phrases which help the language model understand the given task. Theses phrases are then used to assign soft labels to a large set of unlabeled examples. Finally, regular supervised training is performed on the resulting training set. On several tasks , we show that PET outperforms both supervised training and unsupervised approaches in low-resource settings by a large margin.", "after_revision": "Some NLP tasks can be solved in a fully unsupervised fashion by providing a pretrained language model with \"task descriptions\" in natural language (e.g., Radford et al., 2019). While this approach underperforms its supervised counterpart, we show in this work that the two ideas can be combined: We introduce Pattern-Exploiting Training (PET), a semi-supervised training procedure that reformulates input examples as cloze-style phrases to help language models understand a given task. These phrases are then used to assign soft labels to a large set of unlabeled examples. Finally, regular supervised training is performed on the resulting training set. For several tasks and languages, PET outperforms both supervised training and unsupervised approaches in low-resource settings by a large margin.", "edit_actions": [{"type": "R", "before": "which help the language model understand the", "after": "to help language models understand a", "start_char_pos": 437, "end_char_pos": 481}, {"type": "R", "before": "Theses", "after": "These", "start_char_pos": 494, "end_char_pos": 500}, {"type": "R", "before": "On several tasks , we show that", "after": "For several tasks and languages,", "start_char_pos": 664, "end_char_pos": 695}], "sents_char_pos": [0, 176, 493, 582, 663]}
+{"doc_id": "2001.08349", "revision_depth": "1", "before_revision": "Recent advances in brain recording technology and artificial intelligence are propelling a new paradigm in neuroscience beyond the traditional controlled experiment. Naturalistic neuroscience studies neural computations associated with spontaneous behaviors performed in unconstrained settings. Analyzing such unstructured data lacking a priori experimental design remains a significant challenge, especially when the data is multi-modal and long-term. Here we describe an automated approach for analyzing large (%DIFDELCMD < \\approx250 %%% GB/subject) datasets of simultaneously recorded human electrocorticography (ECoG) and naturalistic behavior video data for 12 subjects . Our pipeline discovers and annotates thousands of instances of human upper-limb movement events in long-term (7--9 day) naturalistic behavior data using a combination of computer vision, discrete latent-variable modeling, and string pattern-matching . Analysis of the simultaneously recorded brain data uncovers neural signatures of movement that corroborate prior findings from traditional controlled experiments. We also prototype a decoder for a movement initiation detection task to demonstrate the efficacy of our pipeline as a source of training data for brain-computer interfacing applications. We plan to publish our curated dataset, which captures naturalistic neural and behavioral variability at a scale not previously available . We believe this data will enable further research on models of neural function and decoding that incorporate such naturalistic variability and perform more robustly in real-world settings .", "after_revision": "Recent technological advances in brain recording and artificial intelligence are propelling a new paradigm in neuroscience beyond the traditional controlled experiment. Rather than focusing on cued, repeated trials, naturalistic neuroscience studies neural processes underlying spontaneous behaviors performed in unconstrained settings. However, analyzing such unstructured data lacking a priori experimental design remains a significant challenge, especially when the data is multi-modal and long-term. Here we describe an automated approach for analyzing %DIFDELCMD < \\approx250 %%% simultaneously recorded long-term, naturalistic electrocorticography (ECoG) and naturalistic behavior video data . We take a behavior-first approach to analyzing the long-term recordings. Using a combination of computer vision, discrete latent-variable modeling, and string pattern-matching on the behavioral video data, we find and annotate spontaneous human upper-limb movement events. We show results from our approach applied to data collected for 12 human subjects over 7--9 days for each subject . Our pipeline discovers and annotates over 40,000 instances of naturalistic human upper-limb movement events in the behavioral videos . Analysis of the simultaneously recorded brain data reveals neural signatures of movement that corroborate prior findings from traditional controlled experiments. We also prototype a decoder for a movement initiation detection task to demonstrate the efficacy of our pipeline as a source of training data for brain-computer interfacing applications. Our work addresses the unique data analysis challenges in studying naturalistic human behaviors, and contributes methods that may generalize to other neural recording modalities beyond ECoG. We publicly release our curated dataset, providing a resource to study naturalistic neural and behavioral variability at a scale not previously available .", "edit_actions": [{"type": "A", "before": null, "after": "technological", "start_char_pos": 7, "end_char_pos": 7}, {"type": "D", "before": "technology", "after": null, "start_char_pos": 36, "end_char_pos": 46}, {"type": "R", "before": "Naturalistic", "after": "Rather than focusing on cued, repeated trials, naturalistic", "start_char_pos": 167, "end_char_pos": 179}, {"type": "R", "before": "computations associated with", "after": "processes underlying", "start_char_pos": 208, "end_char_pos": 236}, {"type": "R", "before": "Analyzing", "after": "However, analyzing", "start_char_pos": 296, "end_char_pos": 305}, {"type": "D", "before": "large (", "after": null, "start_char_pos": 507, "end_char_pos": 514}, {"type": "R", "before": "GB/subject) datasets of simultaneously recorded human", "after": "simultaneously recorded long-term, naturalistic", "start_char_pos": 542, "end_char_pos": 595}, {"type": "A", "before": null, "after": ". We take a behavior-first approach to analyzing the long-term recordings. Using a combination of computer vision, discrete latent-variable modeling, and string pattern-matching on the behavioral video data, we find and annotate spontaneous human upper-limb movement events. We show results from our approach applied to data collected", "start_char_pos": 661, "end_char_pos": 661}, {"type": "R", "before": "subjects", "after": "human subjects over 7--9 days for each subject", "start_char_pos": 669, "end_char_pos": 677}, {"type": "R", "before": "thousands of instances of", "after": "over 40,000 instances of naturalistic", "start_char_pos": 717, "end_char_pos": 742}, {"type": "R", "before": "long-term (7--9 day) naturalistic behavior data using a combination of computer vision, discrete latent-variable modeling, and string pattern-matching", "after": "the behavioral videos", "start_char_pos": 779, "end_char_pos": 929}, {"type": "R", "before": "uncovers", "after": "reveals", "start_char_pos": 983, "end_char_pos": 991}, {"type": "R", "before": "We plan to publish", "after": "Our work addresses the unique data analysis challenges in studying naturalistic human behaviors, and contributes methods that may generalize to other neural recording modalities beyond ECoG. We publicly release", "start_char_pos": 1282, "end_char_pos": 1300}, {"type": "R", "before": "which captures", "after": "providing a resource to study", "start_char_pos": 1322, "end_char_pos": 1336}, {"type": "D", "before": ". We believe this data will enable further research on models of neural function and decoding that incorporate such naturalistic variability and perform more robustly in real-world settings", "after": null, "start_char_pos": 1420, "end_char_pos": 1609}], "sents_char_pos": [0, 166, 295, 453, 679, 931, 1094, 1281, 1421]}
+{"doc_id": "2001.08503", "revision_depth": "1", "before_revision": "A collaborative network is a social network that is comprised of experts who cooperate with each other to fulfill a special goal. Analyzing the graph of this network yields meaningful information about the expertise of these experts and their subject areas. To perform the analysis, graph embedding techniques have emerged as a promising tool. Graph embedding attempts to represent graph nodes as low-dimensional vectors. In this paper, we propose a graph embedding method, called ExEm, which using dominating-set theory and deep learning approaches . In the proposed method, the dominating set theory is applied to the collaborative network and dominating nodes of this network are found. After that, a set of random walks is created which starts from dominating nodes(experts). The main condition for constricting these random walks is the existence of another dominating node . After making the walks that satisfy the stated conditions, they are stored as a sequence in a corpus. In the next step, the corpus is fed to the SKIP-GRAM neural network model. Word2vec, fastText and their combination are employed to train the neural network of the SKIP-GRAM model. Finally, the result is the low dimensional vectors of experts, called expert embeddings. Expert embeddings can be used for various purposes including accurately modeling experts' expertise or computing experts' scores in expert recommendation systems. Hence, we also introduce a novel strategy to calculate experts' scores by using the extracted expert embedding vectors. The effectiveness of ExEm is validated through assessing its performance on multi-label classification, link prediction, and recommendation tasks . We conduct extensive experiments on common datasets . Moreover in this study, we present data related to a co-author network formed by crawling the vast author profiles from Scopus .", "after_revision": "A collaborative network is a social network that is comprised of experts who cooperate with each other to fulfill a special goal. Analyzing this network yields meaningful information about the expertise of these experts and their subject areas. To perform the analysis, graph embedding techniques have emerged as an effective and promising tool. Graph embedding attempts to represent graph nodes as low-dimensional vectors. In this paper, we propose a graph embedding method, called ExEm, that uses dominating-set theory and deep learning approaches to capture node representations. ExEm finds dominating nodes of the collaborative network and constructs intelligent random walks that comprise of at least two dominating nodes. One dominating node should appear at the beginning of each path sampled to characterize the local neighborhoods. Moreover, the second dominating node reflects the global structure information. To learn the node embeddings, ExEm exploits three embedding methods including Word2vec, fastText and the concatenation of these two. The final result is the low-dimensional vectors of experts, called expert embeddings. The extracted expert embeddings can be applied to many applications. In order to extend these embeddings into the expert recommendation system, we introduce a novel strategy that uses expert vectors to calculate experts' scores and recommend experts. At the end, we conduct extensive experiments to validate the effectiveness of ExEm through assessing its performance over the multi-label classification, link prediction, and recommendation tasks on common datasets and our collected data formed by crawling the vast author Scopus profiles. The experiments show that ExEm outperforms the baselines especially in dense networks .", "edit_actions": [{"type": "D", "before": "the graph of", "after": null, "start_char_pos": 140, "end_char_pos": 152}, {"type": "R", "before": "a", "after": "an effective and", "start_char_pos": 326, "end_char_pos": 327}, {"type": "R", "before": "which using", "after": "that uses", "start_char_pos": 487, "end_char_pos": 498}, {"type": "R", "before": ". In the proposed method, the dominating set theory is applied to", "after": "to capture node representations. ExEm finds dominating nodes of", "start_char_pos": 550, "end_char_pos": 615}, {"type": "R", "before": "dominating nodes of this network are found. After that, a set of random walks is created which starts from dominating nodes(experts). The main condition for constricting these random walks is the existence of another dominating node . After making the walks that satisfy the stated conditions, they are stored as a sequence in a corpus. In the next step, the corpus is fed to the SKIP-GRAM neural network model.", "after": "constructs intelligent random walks that comprise of at least two dominating nodes. One dominating node should appear at the beginning of each path sampled to characterize the local neighborhoods. Moreover, the second dominating node reflects the global structure information. To learn the node embeddings, ExEm exploits three embedding methods including", "start_char_pos": 646, "end_char_pos": 1057}, {"type": "D", "before": "their combination are employed to train the neural network of", "after": null, "start_char_pos": 1081, "end_char_pos": 1142}, {"type": "R", "before": "SKIP-GRAM model. Finally, the", "after": "concatenation of these two. The final", "start_char_pos": 1147, "end_char_pos": 1176}, {"type": "R", "before": "low dimensional", "after": "low-dimensional", "start_char_pos": 1191, "end_char_pos": 1206}, {"type": "R", "before": "Expert", "after": "The extracted expert", "start_char_pos": 1253, "end_char_pos": 1259}, {"type": "R", "before": "used for various purposes including accurately modeling experts' expertise or computing experts' scores in expert recommendation systems. Hence, we also", "after": "applied to many applications. In order to extend these embeddings into the expert recommendation system, we", "start_char_pos": 1278, "end_char_pos": 1430}, {"type": "A", "before": null, "after": "that uses expert vectors", "start_char_pos": 1458, "end_char_pos": 1458}, {"type": "R", "before": "by using the extracted expert embedding vectors. The", "after": "and recommend experts. At the end, we conduct extensive experiments to validate the", "start_char_pos": 1488, "end_char_pos": 1540}, {"type": "D", "before": "is validated", "after": null, "start_char_pos": 1563, "end_char_pos": 1575}, {"type": "R", "before": "on", "after": "over the", "start_char_pos": 1610, "end_char_pos": 1612}, {"type": "D", "before": ". We conduct extensive experiments", "after": null, "start_char_pos": 1683, "end_char_pos": 1717}, {"type": "R", "before": ". Moreover in this study, we present data related to a co-author network", "after": "and our collected data", "start_char_pos": 1737, "end_char_pos": 1809}, {"type": "R", "before": "profiles from Scopus", "after": "Scopus profiles. The experiments show that ExEm outperforms the baselines especially in dense networks", "start_char_pos": 1845, "end_char_pos": 1865}], "sents_char_pos": [0, 129, 257, 343, 421, 551, 689, 779, 880, 982, 1057, 1163, 1252, 1415, 1536, 1684, 1738]}
+{"doc_id": "2001.08604", "revision_depth": "1", "before_revision": "Recent works have shown that generative data augmentation, where synthetic samples generated from deep generative models are used to augment the training dataset, benefit certain NLP tasks. In this work, we extend this approach to the task of dialogue state tracking for goal-oriented dialogues, in which the data naturally exhibits a hierarchical structure over utterances and related annotations . Deep generative data augmentation for dialogue state tracking requires the generative model to be aware of the hierarchically structured data . We propose Variational Hierarchical Dialog Autoencoder (VHDA) for modeling various aspects of goal-oriented dialogues , including linguistic and underlying annotation structures. Our experiments show that our model is able to generate realistic and novel samples that improve the robustness of state-of-the-art dialogue state trackers, ultimately improving their final dialogue state tracking performances on several datasets .", "after_revision": "Recent works have shown that generative data augmentation, where synthetic samples generated from deep generative models are used to augment the training dataset, benefit certain NLP tasks. In this work, we extend this approach to the task of dialog state tracking for goal-oriented dialogs. Since, goal-oriented dialogs naturally exhibit a hierarchical structure over utterances and related annotations , deep generative data augmentation for the task requires the generative model to be aware of the hierarchical nature . We propose the Variational Hierarchical Dialog Autoencoder (VHDA) for modeling complete aspects of goal-oriented dialogs , including linguistic features and underlying structured annotations, namely dialog acts and goals. We also propose two training policies to mitigate issues that arise with training VAE-based models. Experiments show that our hierarchical model is able to generate realistic and novel samples that improve the robustness of state-of-the-art dialog state trackers, ultimately improving the dialog state tracking performances on various dialog domains. Surprisingly, the ability to jointly generate dialog features enables our model to outperform previous state-of-the-arts in related subtasks, such as language generation and user simulation .", "edit_actions": [{"type": "R", "before": "dialogue", "after": "dialog", "start_char_pos": 243, "end_char_pos": 251}, {"type": "R", "before": "dialogues, in which the data naturally exhibits", "after": "dialogs. Since, goal-oriented dialogs naturally exhibit", "start_char_pos": 285, "end_char_pos": 332}, {"type": "R", "before": ". Deep", "after": ", deep", "start_char_pos": 398, "end_char_pos": 404}, {"type": "R", "before": "dialogue state tracking", "after": "the task", "start_char_pos": 438, "end_char_pos": 461}, {"type": "R", "before": "hierarchically structured data", "after": "hierarchical nature", "start_char_pos": 511, "end_char_pos": 541}, {"type": "A", "before": null, "after": "the", "start_char_pos": 555, "end_char_pos": 555}, {"type": "R", "before": "various", "after": "complete", "start_char_pos": 620, "end_char_pos": 627}, {"type": "R", "before": "dialogues", "after": "dialogs", "start_char_pos": 653, "end_char_pos": 662}, {"type": "R", "before": "and underlying annotation structures. Our experiments", "after": "features and underlying structured annotations, namely dialog acts and goals. We also propose two training policies to mitigate issues that arise with training VAE-based models. Experiments", "start_char_pos": 686, "end_char_pos": 739}, {"type": "A", "before": null, "after": "hierarchical", "start_char_pos": 754, "end_char_pos": 754}, {"type": "R", "before": "dialogue", "after": "dialog", "start_char_pos": 857, "end_char_pos": 865}, {"type": "R", "before": "their final dialogue", "after": "the dialog", "start_char_pos": 903, "end_char_pos": 923}, {"type": "R", "before": "several datasets", "after": "various dialog domains. Surprisingly, the ability to jointly generate dialog features enables our model to outperform previous state-of-the-arts in related subtasks, such as language generation and user simulation", "start_char_pos": 955, "end_char_pos": 971}], "sents_char_pos": [0, 189, 399, 543, 723]}
+{"doc_id": "2001.09404", "revision_depth": "1", "before_revision": "This paper proposes a new method for financial portfolio optimisation based on reducing simultaneous asset shocks across a portfolio of assets. We adopt the new semi-metrics of \\mbox{%DIFAUXCMD James2019 to determine the distance between two time series' structural breaks. We build on the optimal portfolio theory of \\mbox{%DIFAUXCMD Markowitz1952 distance between asset structural breaks , rather than portfolio variance , as our penalty function . Our experiments are promising: on synthetic data, they indicate that our proposed method does indeed diversify among time series with highly similar structural breaks . On real data, experiments illustrate that our proposed optimisation method produces higher risk-adjusted returns than mean variance portfolio optimisation. The predictive distribution is superior in every measure , producing a higher mean, lower standard deviation and less kurtosis. The main implication for this method in portfolio management is reducing simultaneous asset shocks and potentially sharp associated drawdowns , during periods of highly similar structural breaks, such as a market crisis.", "after_revision": "This paper proposes a new method for financial portfolio optimization based on reducing simultaneous asset shocks across a collection of assets. We apply recently introduced semi-metrics between finite sets to determine the distance between time series' structural breaks. Then, we build on the classical portfolio optimization theory of Markowitz and use this distance between asset structural breaks for our penalty function , rather than portfolio variance . Our experiments are promising: on synthetic data, we show that our proposed method does indeed diversify among time series with highly similar structural breaks , and enjoys advantages over existing metrics between sets . On real data, experiments illustrate that our proposed optimization method produces higher risk-adjusted returns than mean-variance portfolio optimization. Moreover, the predictive distribution is superior in every measure analyzed , producing a higher mean, lower standard deviation and lower kurtosis. The main implication for this method in portfolio management is reducing simultaneous asset shocks and potentially sharp associated drawdowns during periods of highly similar structural breaks, such as a market crisis.", "edit_actions": [{"type": "R", "before": "optimisation", "after": "optimization", "start_char_pos": 57, "end_char_pos": 69}, {"type": "R", "before": "portfolio", "after": "collection", "start_char_pos": 123, "end_char_pos": 132}, {"type": "R", "before": "adopt the new", "after": "apply recently introduced", "start_char_pos": 147, "end_char_pos": 160}, {"type": "R", "before": "of \\mbox{%DIFAUXCMD James2019", "after": "between finite sets", "start_char_pos": 174, "end_char_pos": 203}, {"type": "D", "before": "two", "after": null, "start_char_pos": 238, "end_char_pos": 241}, {"type": "R", "before": "We", "after": "Then, we", "start_char_pos": 274, "end_char_pos": 276}, {"type": "R", "before": "optimal portfolio theory of \\mbox{%DIFAUXCMD Markowitz1952", "after": "classical portfolio optimization theory of Markowitz and use this", "start_char_pos": 290, "end_char_pos": 348}, {"type": "A", "before": null, "after": "for our penalty function", "start_char_pos": 390, "end_char_pos": 390}, {"type": "D", "before": ", as our penalty function", "after": null, "start_char_pos": 424, "end_char_pos": 449}, {"type": "R", "before": "they indicate", "after": "we show", "start_char_pos": 502, "end_char_pos": 515}, {"type": "A", "before": null, "after": ", and enjoys advantages over existing metrics between sets", "start_char_pos": 619, "end_char_pos": 619}, {"type": "R", "before": "optimisation", "after": "optimization", "start_char_pos": 677, "end_char_pos": 689}, {"type": "R", "before": "mean variance portfolio optimisation. The", "after": "mean-variance portfolio optimization. Moreover, the", "start_char_pos": 740, "end_char_pos": 781}, {"type": "A", "before": null, "after": "analyzed", "start_char_pos": 835, "end_char_pos": 835}, {"type": "R", "before": "less", "after": "lower", "start_char_pos": 892, "end_char_pos": 896}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1049, "end_char_pos": 1050}], "sents_char_pos": [0, 143, 273, 451, 621, 777, 906]}
+{"doc_id": "2002.00895", "revision_depth": "1", "before_revision": "On the basis of the evident ability of neuronal olfactory systems to evaluate the intensity of an odorous stimulus and also recognize the identity of the odorant over a large range of concentrations, a few biologically-realistic hypotheses on some of the underlying neural processes are made. The mathematical implementation of such phenomenological postulates allows to infer quite simply a functional relationship between the mean firing-rate of the neural population and the concentration of any odorant as well as the statistical distribution of the sensitivity of any receptor neuron to any odorant across the population; both of them turn out to be power-laws and an arithmetic, testable relationship between the respective exponents naturally appears . In order to compare quantitatively the prediction of power-law dependence of population mean firing-rate on odorant concentration, a probabilistic model is created to extract information from data available in the experimental literature which, inter alia, allows to pool together several data-sets and hence increase statistical accuracy . The values of the free parameters of the model are estimated by a Bayesian maximum likelihood inference which keeps into account the prior distribution of the parameters making use of theorems from Information Geometry . The eventual goodness of fit is quantified by means of a distribution-independent test. The probabilistic model results to be accurate, thus confirming the theoretical prediction of a power-law dependence on odorant concentration. The experimental data available about the distribution of sensitivities also agree with the other predictions, though they are not statistically sufficient for a very stringent verification. The theory also suggests a possible explanation for the range of values of the exponent of the sensitivity power-law found in experiments.", "after_revision": "On the basis of the evident ability of neuronal olfactory systems to evaluate the intensity of an odorous stimulus and at the same time also recognise the identity of the odorant over a large range of concentrations, a few biologically-realistic hypotheses on some of the underlying neural processes are made. In particular, it is assumed that the receptor neurons mean firing-rate scale monotonically with odorant intensity, and that the receptor sensitivities range widely across odorants and receptor neurons hence leading to highly distributed representations of the stimuli. The mathematical implementation of the phenomenological postulates allows for inferring explicit functional relationships between some measurable quantities. It results that both the dependence of the mean firing-rate on odorant concentration and the statistical distribution of receptor sensitivity across the neuronal population are power-laws , whose respective exponents are in an arithmetic, testable relationship . In order to test quantitatively the prediction of power-law dependence of population mean firing-rate on odorant concentration, a probabilistic model is created to extract information from data available in the experimental literature . The values of the free parameters of the model are estimated by an info-geometric Bayesian maximum-likelihood inference which keeps into account the prior distribution of the parameters . The eventual goodness of fit is quantified by means of a distribution-independent test. CONTINUES", "edit_actions": [{"type": "R", "before": "also recognize", "after": "at the same time also recognise", "start_char_pos": 119, "end_char_pos": 133}, {"type": "A", "before": null, "after": "In particular, it is assumed that the receptor neurons mean firing-rate scale monotonically with odorant intensity, and that the receptor sensitivities range widely across odorants and receptor neurons hence leading to highly distributed representations of the stimuli.", "start_char_pos": 293, "end_char_pos": 293}, {"type": "R", "before": "such", "after": "the", "start_char_pos": 329, "end_char_pos": 333}, {"type": "R", "before": "to infer quite simply a functional relationship between the", "after": "for inferring explicit functional relationships between some measurable quantities. It results that both the dependence of the", "start_char_pos": 369, "end_char_pos": 428}, {"type": "R", "before": "firing-rate of the neural population and the concentration of any odorant as well as the", "after": "firing-rate on odorant concentration and the", "start_char_pos": 434, "end_char_pos": 522}, {"type": "R", "before": "the sensitivity of any receptor neuron to any odorant across the population; both of them turn out to be", "after": "receptor sensitivity across the neuronal population are", "start_char_pos": 551, "end_char_pos": 655}, {"type": "R", "before": "and", "after": ", whose respective exponents are in", "start_char_pos": 667, "end_char_pos": 670}, {"type": "D", "before": "between the respective exponents naturally appears", "after": null, "start_char_pos": 708, "end_char_pos": 758}, {"type": "R", "before": "compare", "after": "test", "start_char_pos": 773, "end_char_pos": 780}, {"type": "D", "before": "which, inter alia, allows to pool together several data-sets and hence increase statistical accuracy", "after": null, "start_char_pos": 999, "end_char_pos": 1099}, {"type": "R", "before": "a Bayesian maximum likelihood", "after": "an info-geometric Bayesian maximum-likelihood", "start_char_pos": 1166, "end_char_pos": 1195}, {"type": "D", "before": "making use of theorems from Information Geometry", "after": null, "start_char_pos": 1272, "end_char_pos": 1320}, {"type": "R", "before": "The probabilistic model results to be accurate, thus confirming the theoretical prediction of a power-law dependence on odorant concentration. The experimental data available about the distribution of sensitivities also agree with the other predictions, though they are not statistically sufficient for a very stringent verification. The theory also suggests a possible explanation for the range of values of the exponent of the sensitivity power-law found in experiments.", "after": "CONTINUES", "start_char_pos": 1411, "end_char_pos": 1883}], "sents_char_pos": [0, 292, 627, 760, 1101, 1322, 1410, 1553, 1744]}
+{"doc_id": "2002.01696", "revision_depth": "1", "before_revision": "The paper deals with Age of Information in a network of multiple sources and parallel servers/ queues with buffering capabilities, preemption in service and losses in served packets. The servers do not communicate between each other and the packets are dispatched through the servers according to a predefined probabilistic routing. By making use of the Stochastic Hybrid System (SHS) method, we provide a derivation of the average Age of Information of a system of two parallel servers (with and without buffer capabilities) and compare the result with that of a single queue. We show known results of packets delay in Queuing Theory do not hold for Age of Information . Unfortunately, the complexity of computing the Age of Information using the SHS method increases highly with the number of queues. We therefore provide an upper bound of the average Age of Information in a parallel server system of an arbitrary number of M/M/1/(N+1) queues and its tightness in various regimes. This upper bound allows providing a tight approximation of the Age of Information with a very low complexity .", "after_revision": "The paper deals with Age of Information (AoI) in a network of multiple sources and parallel queues with buffering capabilities, preemption in service and losses in served packets. The queues do not communicate between each other and the packets are dispatched through the queues according to a predefined probabilistic routing. By making use of the Stochastic Hybrid System (SHS) method, we provide a derivation of the average AoI of a system of two parallel queues (with and without buffer capabilities) and compare the results with those of a single queue. We show that known results of packets delay in Queuing Theory do not hold for the AoI . Unfortunately, the complexity of computing the average AoI using the SHS method increases highly with the number of queues. We therefore provide an upper bound of the average AoI in a system of an arbitrary number of M/M/1/(N+1) queues and show its tightness in various regimes. This upper bound allows providing a tight approximation of the average AoI with a very low complexity . We then provide a game framework that allows each source to determine its best probabilistic routing decision. By using Mean Field Games, we provide an analysis of the routing game framework, propose an efficient iterative method to find the routing decision of each source and prove its convergence to the desired equilibrium .", "edit_actions": [{"type": "A", "before": null, "after": "(AoI)", "start_char_pos": 40, "end_char_pos": 40}, {"type": "D", "before": "servers/", "after": null, "start_char_pos": 87, "end_char_pos": 95}, {"type": "R", "before": "servers", "after": "queues", "start_char_pos": 188, "end_char_pos": 195}, {"type": "R", "before": "servers", "after": "queues", "start_char_pos": 277, "end_char_pos": 284}, {"type": "R", "before": "Age of Information of", "after": "AoI of", "start_char_pos": 433, "end_char_pos": 454}, {"type": "R", "before": "servers", "after": "queues", "start_char_pos": 480, "end_char_pos": 487}, {"type": "R", "before": "result with that", "after": "results with those", "start_char_pos": 543, "end_char_pos": 559}, {"type": "A", "before": null, "after": "that", "start_char_pos": 587, "end_char_pos": 587}, {"type": "R", "before": "Age of Information", "after": "the AoI", "start_char_pos": 653, "end_char_pos": 671}, {"type": "R", "before": "Age of Information", "after": "average AoI", "start_char_pos": 721, "end_char_pos": 739}, {"type": "R", "before": "Age of Information in a parallel server", "after": "AoI in a", "start_char_pos": 856, "end_char_pos": 895}, {"type": "A", "before": null, "after": "show", "start_char_pos": 952, "end_char_pos": 952}, {"type": "R", "before": "Age of Information", "after": "average AoI", "start_char_pos": 1050, "end_char_pos": 1068}, {"type": "A", "before": null, "after": ". We then provide a game framework that allows each source to determine its best probabilistic routing decision. By using Mean Field Games, we provide an analysis of the routing game framework, propose an efficient iterative method to find the routing decision of each source and prove its convergence to the desired equilibrium", "start_char_pos": 1096, "end_char_pos": 1096}], "sents_char_pos": [0, 183, 333, 578, 673, 804, 986]}
+{"doc_id": "2002.04164", "revision_depth": "1", "before_revision": "Scaling and multiscaling financial time series have been widely studied in the literature. The research on this topic is vast and still flourishing. One way to analyse the scaling properties of time series is through the estimation of scaling exponents. These exponents are recognized as being valuable measures to discriminate between random, persistent, and anti-persistent behaviours in time series. In the literature, several methods have been proposed to study the multiscaling property and in this paper we use the generalized Hurst exponent (GHE) . On the base of this methodology, we propose a novel statistical procedure to robustly estimate and test the multiscaling property and we name it RNSGHE. This methodology , together with a combination of t-tests and F-tests to discriminated between real and spurious scaling. Moreover, we also introduce a new methodology to estimate the optimal aggregation time used in our methodology . We numerically validate our procedure on simulated time series using the Multifractal Random Walk (MRW) and then apply it to real financial data. We also present results for times series with and without anomalies and we compute the bias that such anomalies introduce in the measurement of the scaling exponents. Finally, we show how the use of proper scaling and multiscaling can ameliorate the estimation of risk measures such as Value at Risk (VaR). We also propose a methodology based on Monte Carlo simulation, that we name Multiscaling Value at Risk (MSVaR), which takes into account the statical properties of multiscaling time series. We show that by using this statistical procedure in combination with the robustly estimated multiscaling exponents, the one year forecasted MSVaR mimics the VaR on the annual data for the majority of the stocks analysed .", "after_revision": "Scaling and multiscaling financial time series have been widely studied in the literature. The research on this topic is vast and still flourishing. One way to analyze the scaling properties of time series is through the estimation of their scaling exponents, that are recognized as being valuable measures to discriminate between random, persistent, and anti-persistent behaviors in these time series. In the literature, several methods have been proposed to study the multiscaling property . In this paper, we use the generalized Hurst exponent (GHE) tool and we propose a novel statistical procedure based on GHE which we name Relative Normalized and Standardized Generalized Hurst Exponent (RNSGHE). This method is used to robustly estimate and test the multiscaling property and , together with a combination of t-tests and F-tests , serves to discriminate between real and spurious scaling. Furthermore, we introduce a new tool to estimate the optimal aggregation time used in our methodology which we name Autocororrelation Segmented Regression . We numerically validate this procedure on simulated time series by using the Multifractal Random Walk (MRW) and we then apply it to real financial data. We present results for times series with and without anomalies and we compute the bias that such anomalies introduce in the measurement of the scaling exponents. We also show how the use of proper scaling and multiscaling can ameliorate the estimation of risk measures such as Value at Risk (VaR). Finally, we propose a methodology based on Monte Carlo simulation, which we name Multiscaling Value at Risk (MSVaR), that takes into account the statistical properties of multiscaling time series. We show that by using this statistical procedure in combination with the robustly estimated multiscaling exponents, the one year forecasted MSVaR mimics the VaR on the annual data for the majority of the stocks analyzed .", "edit_actions": [{"type": "R", "before": "analyse", "after": "analyze", "start_char_pos": 160, "end_char_pos": 167}, {"type": "R", "before": "scaling exponents. These exponents", "after": "their scaling exponents, that", "start_char_pos": 235, "end_char_pos": 269}, {"type": "R", "before": "behaviours in", "after": "behaviors in these", "start_char_pos": 376, "end_char_pos": 389}, {"type": "R", "before": "and in this paper", "after": ". In this paper,", "start_char_pos": 492, "end_char_pos": 509}, {"type": "R", "before": ". On the base of this methodology,", "after": "tool and", "start_char_pos": 554, "end_char_pos": 588}, {"type": "A", "before": null, "after": "based on GHE which we name Relative Normalized and Standardized Generalized Hurst Exponent (RNSGHE). This method is used", "start_char_pos": 630, "end_char_pos": 630}, {"type": "D", "before": "we name it RNSGHE. This methodology", "after": null, "start_char_pos": 691, "end_char_pos": 726}, {"type": "R", "before": "to discriminated", "after": ", serves to discriminate", "start_char_pos": 780, "end_char_pos": 796}, {"type": "R", "before": "Moreover, we also", "after": "Furthermore, we", "start_char_pos": 832, "end_char_pos": 849}, {"type": "R", "before": "methodology", "after": "tool", "start_char_pos": 866, "end_char_pos": 877}, {"type": "A", "before": null, "after": "which we name Autocororrelation Segmented Regression", "start_char_pos": 943, "end_char_pos": 943}, {"type": "R", "before": "our", "after": "this", "start_char_pos": 970, "end_char_pos": 973}, {"type": "A", "before": null, "after": "by", "start_char_pos": 1009, "end_char_pos": 1009}, {"type": "A", "before": null, "after": "we", "start_char_pos": 1055, "end_char_pos": 1055}, {"type": "D", "before": "also", "after": null, "start_char_pos": 1097, "end_char_pos": 1101}, {"type": "R", "before": "Finally, we", "after": "We also", "start_char_pos": 1261, "end_char_pos": 1272}, {"type": "R", "before": "We also", "after": "Finally, we", "start_char_pos": 1401, "end_char_pos": 1408}, {"type": "R", "before": "that", "after": "which", "start_char_pos": 1464, "end_char_pos": 1468}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 1513, "end_char_pos": 1518}, {"type": "R", "before": "statical", "after": "statistical", "start_char_pos": 1542, "end_char_pos": 1550}, {"type": "R", "before": "analysed", "after": "analyzed", "start_char_pos": 1802, "end_char_pos": 1810}], "sents_char_pos": [0, 90, 148, 253, 402, 555, 709, 831, 945, 1093, 1260, 1400, 1590]}
+{"doc_id": "2002.05139", "revision_depth": "1", "before_revision": "We give the first efficient algorithm for the problem of list-decodable subspace recovery . Our algorithm takes input n samples \\alpha n ( \\alpha \\ll 1/2) are generated i.i.d. from Gaussian distribution \\mathcal{N(0,\\Sigma_*) on R^d with covariance \\Sigma_* of rank r } with a isotropic rank r covariance \\Pi_* (the } and the rest are arbitrary, potentially adversarial outliers. It outputs a list of O(1/\\alpha) projection matrices guaranteed to contain a projection matrix%DIFDELCMD < \\Pisuch %%% that\\hat{\\Pi} satisfies certifiable anti-concentration. The running time of both these algorithms, however, is d^{\\Omega(1/\\alpha^4)} and the error bounds on } \\|\\Pi-\\Pi_*\\|_F ^2 = \\kappa^4 \\log (r )%DIFDELCMD < \\tilde{O}%%% (\\emph{ 1/ \\alpha^2), where%DIFDELCMD < \\tilde{O} %%% hides polylogarithmic factors in 1/ \\alpha . Here, \\Pi_* is the projection matrix to the range space of \\Sigma_*. The algorithm needs n=d ^{ \\log ( r \\kappa ) %DIFDELCMD < \\tilde{O}%%% (\\hat{\\Pi} \\hat{\\Pi} 1/ \\alpha^2) samples and runs in time n^{\\log (r \\kappa) \\tilde{O(1/\\alpha^4)} time where \\kappa is the ratio of the largest to smallest non-zero eigenvalues of \\Sigma_*. Our algorithm builds on the recently developed framework for list-decodable learning via the sum-of-squares (SoS)method }%DIFDELCMD < [%%% KKK'19, RY'20 with some key technical and conceptual advancements. Our key conceptual contribution involves showing a (SoS \"certified\") lower bound on the eigenvalues of covariances of arbitrary small subsamples of an i.i.d. sample of a certifiably anti-concentrated distribution. One of our key technical contributions gives a new method that allows error reduction \"within SoS\" with only a logarithmic cost in the exponent in the running time (in contrast to polynomial cost in%DIFDELCMD < [%%% KKK'19, RY'20 . In a concurrent and independent work , to have }\\emph{ Raghavendra and Yau proved related results for list-decodable subspace recovery RY'20 satisfies certifiable anti-concentration, we obtain a stronger error guarantee of \\|}\\hat{\\Pi} .", "after_revision": "In list-decodable subspace recovery , the input is a collection of n points \\alpha n ( for some \\alpha \\ll 1/2) of which are drawn i.i.d. from (0,\\Sigma_*) on R^d with covariance \\Sigma_* of rank r } a distribution \\mathcal{D with a isotropic rank r covariance \\Pi_* (the }inliers) and the rest are arbitrary, potential adversarial outliers. The goal is to recover a O(1/\\alpha) %DIFDELCMD < \\Pisuch %%% size list of candidate covariances that contains a\\hat{\\Pi} close to \\Pi_*. Two recent independent works (Raghavendra-Yau, Bakshi-Kothari (2020)) gave algorithms for this problem that work whenever \\mathcal{D satisfies certifiable anti-concentration. The running time of both these algorithms, however, is d^{\\Omega(1/\\alpha^4)} and the error bounds on } \\|\\Pi-\\Pi_*\\|_F %DIFDELCMD < \\tilde{O}%%% grow with r (which can be \\Omega(d)). In this work, we improve on these results on all three fronts:\\emph{dimension-independent error via a faster fixed-polynomial running time under less restrictive distributional assumptions. Specifically, we give a poly( 1/ %DIFDELCMD < \\tilde{O} %%% \\alpha ) d ^{ O ( 1 ) %DIFDELCMD < \\tilde{O}%%% time algorithm that outputs a list containing a\\hat{\\Pi} satisfying \\|\\hat{\\Pi} -\\Pi_*\\|_F \\leq O( 1/ (1/\\alpha^4)} time where \\kappa is the ratio of the largest to smallest non-zero eigenvalues of \\Sigma_*. Our algorithm builds on the recently developed framework for list-decodable learning via the sum-of-squares (SoS)method }%DIFDELCMD < [%%% %DIFDELCMD < [%%% \\alpha). Our result only needs \\mathcal{D to have }\\emph{certifiably hypercontractive degree 2 polynomials - a condition satisfied by a much broader family of distributions in contrast to certifiable anticoncentration. As a result, in addition to Gaussians, our algorithm applies to uniform distribution on the hypercube and q-ary cubes and arbitrary product distributions with subgaussian marginals. Prior work ( Raghavendra and Yau , 2020) had identified such distributions as potential hard examples as such distributions do not exhibit strong enough anti-concentration. When \\mathcal{D satisfies certifiable anti-concentration, we obtain a stronger error guarantee of \\|}\\hat{\\Pi}-\\Pi_*\\|_F \\leq \\eta for any arbitrary \\eta > 0 in d^{O(poly(1/\\alpha) + \\log (1/\\eta)) .", "edit_actions": [{"type": "R", "before": "We give the first efficient algorithm for the problem of", "after": "In", "start_char_pos": 0, "end_char_pos": 56}, {"type": "R", "before": ". Our algorithm takes input n samples", "after": ", the input is a collection of n points", "start_char_pos": 90, "end_char_pos": 127}, {"type": "A", "before": null, "after": "for some", "start_char_pos": 139, "end_char_pos": 139}, {"type": "R", "before": "are generated", "after": "of which are drawn", "start_char_pos": 156, "end_char_pos": 169}, {"type": "D", "before": "Gaussian distribution \\mathcal{N", "after": null, "start_char_pos": 182, "end_char_pos": 214}, {"type": "A", "before": null, "after": "a distribution \\mathcal{D", "start_char_pos": 271, "end_char_pos": 271}, {"type": "A", "before": null, "after": "inliers", "start_char_pos": 319, "end_char_pos": 319}, {"type": "A", "before": null, "after": ")", "start_char_pos": 319, "end_char_pos": 319}, {"type": "R", "before": "potentially", "after": "potential", "start_char_pos": 348, "end_char_pos": 359}, {"type": "R", "before": "It outputs a list of", "after": "The goal is to recover a", "start_char_pos": 382, "end_char_pos": 402}, {"type": "D", "before": "projection matrices guaranteed to contain a projection matrix", "after": null, "start_char_pos": 415, "end_char_pos": 476}, {"type": "R", "before": "that", "after": "size list of candidate covariances that contains a", "start_char_pos": 501, "end_char_pos": 505}, {"type": "A", "before": null, "after": "close to \\Pi_*. Two recent independent works (Raghavendra-Yau, Bakshi-Kothari (2020)) gave algorithms for this problem that work whenever \\mathcal{D", "start_char_pos": 515, "end_char_pos": 515}, {"type": "D", "before": "^2 = \\kappa^4 \\log (r )", "after": null, "start_char_pos": 678, "end_char_pos": 701}, {"type": "R", "before": "(", "after": "grow with r (which can be \\Omega(d)). In this work, we improve on these results on all three fronts:", "start_char_pos": 727, "end_char_pos": 728}, {"type": "A", "before": null, "after": "dimension-independent", "start_char_pos": 734, "end_char_pos": 734}, {"type": "A", "before": null, "after": "error via a faster fixed-polynomial running time under less restrictive distributional assumptions. Specifically, we give a poly(", "start_char_pos": 735, "end_char_pos": 735}, {"type": "D", "before": "\\alpha^2), where", "after": null, "start_char_pos": 739, "end_char_pos": 755}, {"type": "D", "before": "hides polylogarithmic factors in 1/", "after": null, "start_char_pos": 782, "end_char_pos": 817}, {"type": "R", "before": ". Here, \\Pi_* is the projection matrix to the range space of \\Sigma_*. The algorithm needs n=d", "after": ") d", "start_char_pos": 825, "end_char_pos": 919}, {"type": "R", "before": "\\log", "after": "O", "start_char_pos": 923, "end_char_pos": 927}, {"type": "R", "before": "r \\kappa", "after": "1", "start_char_pos": 930, "end_char_pos": 938}, {"type": "R", "before": "(", "after": "time algorithm that outputs a list containing a", "start_char_pos": 967, "end_char_pos": 968}, {"type": "A", "before": null, "after": "satisfying \\|", "start_char_pos": 978, "end_char_pos": 978}, {"type": "A", "before": null, "after": "-\\Pi_*\\|_F \\leq O(", "start_char_pos": 988, "end_char_pos": 988}, {"type": "D", "before": "\\alpha^2)", "after": null, "start_char_pos": 992, "end_char_pos": 1001}, {"type": "D", "before": "samples and runs in time n^{\\log (r \\kappa) \\tilde{O", "after": null, "start_char_pos": 1002, "end_char_pos": 1054}, {"type": "D", "before": "KKK'19, RY'20", "after": null, "start_char_pos": 1299, "end_char_pos": 1312}, {"type": "D", "before": "with some key technical and conceptual advancements. Our key conceptual contribution involves showing a (SoS \"certified\") lower bound on the eigenvalues of covariances of arbitrary small subsamples of an i.i.d. sample of a certifiably anti-concentrated distribution. One of our key technical contributions gives a new method that allows error reduction \"within SoS\" with only a logarithmic cost in the exponent in the running time (in contrast to polynomial cost in", "after": null, "start_char_pos": 1313, "end_char_pos": 1778}, {"type": "D", "before": "KKK'19, RY'20", "after": null, "start_char_pos": 1796, "end_char_pos": 1809}, {"type": "R", "before": ". In a concurrent and independent work ,", "after": "\\alpha). Our result only needs \\mathcal{D", "start_char_pos": 1810, "end_char_pos": 1850}, {"type": "A", "before": null, "after": "certifiably hypercontractive", "start_char_pos": 1866, "end_char_pos": 1866}, {"type": "A", "before": null, "after": "degree 2 polynomials - a condition satisfied by a much broader family of distributions in contrast to certifiable anticoncentration. As a result, in addition to Gaussians, our algorithm applies to uniform distribution on the hypercube and q-ary cubes and arbitrary product distributions with subgaussian marginals. Prior work (", "start_char_pos": 1867, "end_char_pos": 1867}, {"type": "D", "before": "proved related results for list-decodable subspace recovery", "after": null, "start_char_pos": 1888, "end_char_pos": 1947}, {"type": "R", "before": "RY'20", "after": ", 2020) had identified such distributions as potential hard examples as such distributions do not exhibit strong enough anti-concentration. When \\mathcal{D", "start_char_pos": 1948, "end_char_pos": 1953}, {"type": "A", "before": null, "after": "-\\Pi_*\\|_F \\leq \\eta for any arbitrary \\eta > 0 in d^{O(poly(1/\\alpha) + \\log (1/\\eta))", "start_char_pos": 2048, "end_char_pos": 2048}], "sents_char_pos": [0, 91, 381, 557, 826, 895, 1159, 1365, 1579]}
+{"doc_id": "2002.05619", "revision_depth": "1", "before_revision": "Recurrent spiking neural networks (RSNN) in the brain learn to perform a wide range of perceptual, cognitive and motor tasks very efficiently in terms of time and energy consumption. This is due to the optimality of coding and learning schemes, which have yet to be unveiled. The formulation of biologically inspired networks capable to perform complex computations can mediate a synergetic interaction between Machine Learning and Neuroscience bringing to mutual benefits and helping to improve our understanding of biological and artificial intelligence. Even though several models have been proposed , it remains a challenging task to design RSNNs which use biologically plausible mechanisms . We propose a general probabilistic framework which relies on the principle of maximizing the likelihood for the network to solve the task . This principle permits to analytically work out an explicit and completely local plasticity rulesupporting the efficient solution of several tasks. We show that the learning algorithm can be achieved in a very few iterations, and that the online approximation of the likelihood maximization is extremely beneficial to fast learning . Our model is very general and it can be applied to a wide variety of network architectures and types of biological neurons. The derived plasticity learning rule is specific to each neuron model producing a theoretical prediction which can be verified experimentally .", "after_revision": "Recurrent spiking neural networks (RSNN) in the brain learn to perform a wide range of perceptual, cognitive and motor tasks very efficiently in terms of time and energy consumption. Moreover, learning can happen rapidly after very few examples. This is due to the optimality of coding and learning schemes, which have yet to be clearly understood. This naturally challenges the formulation of biologically inspired RSNNs in order to improve our understanding of biological intelligence and the efficiency of artificial ones. Several spiking network models have been proposed but it remains a challenge to design RSNNs that use biologically plausible mechanisms capable of solving complex temporal tasks. We use a general probabilistic framework that relies on the principle of maximizing the likelihood for the network to reproduce some temporal dynamics . This principle permits to analytically work out an explicit and biologically plausible plasticity rule. Here we propose a novel target-based learning scheme in which such a rule can be used to efficiently train a RSNN to solve several temporal tasks such as learning multidimensional trajectory and an implementation of the temporal XOR. We finally show that an online approximation of the gradient ascent, in addition to guaranteeing complete locality in time and space, allows learning after very few presentations of the target output . Our model is general and it can be applied to a wide variety of network architectures and types of biological neurons. The derived plasticity learning rule is specific to each neuron model and can produce a theoretical prediction to be experimentally verified .", "edit_actions": [{"type": "A", "before": null, "after": "Moreover, learning can happen rapidly after very few examples.", "start_char_pos": 183, "end_char_pos": 183}, {"type": "R", "before": "unveiled. The", "after": "clearly understood. This naturally challenges the", "start_char_pos": 267, "end_char_pos": 280}, {"type": "R", "before": "networks capable to perform complex computations can mediate a synergetic interaction between Machine Learning and Neuroscience bringing to mutual benefits and helping to", "after": "RSNNs in order to", "start_char_pos": 318, "end_char_pos": 488}, {"type": "R", "before": "and artificial intelligence. Even though several", "after": "intelligence and the efficiency of artificial ones. Several spiking network", "start_char_pos": 529, "end_char_pos": 577}, {"type": "R", "before": ",", "after": "but", "start_char_pos": 604, "end_char_pos": 605}, {"type": "R", "before": "challenging task", "after": "challenge", "start_char_pos": 619, "end_char_pos": 635}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 652, "end_char_pos": 657}, {"type": "R", "before": ". We propose", "after": "capable of solving complex temporal tasks. We use", "start_char_pos": 696, "end_char_pos": 708}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 743, "end_char_pos": 748}, {"type": "R", "before": "solve the task", "after": "reproduce some temporal dynamics", "start_char_pos": 821, "end_char_pos": 835}, {"type": "R", "before": "completely local plasticity rulesupporting the efficient solution of several tasks. We show that the learning algorithm can be achieved in a very few iterations, and that the", "after": "biologically plausible plasticity rule. Here we propose a novel target-based learning scheme in which such a rule can be used to efficiently train a RSNN to solve several temporal tasks such as learning multidimensional trajectory and an implementation of the temporal XOR. We finally show that an", "start_char_pos": 902, "end_char_pos": 1076}, {"type": "R", "before": "likelihood maximization is extremely beneficial to fast learning", "after": "gradient ascent, in addition to guaranteeing complete locality in time and space, allows learning after very few presentations of the target output", "start_char_pos": 1105, "end_char_pos": 1169}, {"type": "D", "before": "very", "after": null, "start_char_pos": 1185, "end_char_pos": 1189}, {"type": "R", "before": "producing", "after": "and can produce", "start_char_pos": 1366, "end_char_pos": 1375}, {"type": "R", "before": "which can be verified experimentally", "after": "to be experimentally verified", "start_char_pos": 1401, "end_char_pos": 1437}], "sents_char_pos": [0, 182, 276, 557, 697, 837, 985, 1171, 1295]}
+{"doc_id": "2002.06947", "revision_depth": "1", "before_revision": "Hadwiger and Debrunner showed that for families of convex sets in R^d with the property that among any p of them some q have a common point, the whole family can be stabbed with p-q+1 points if p \\geq q \\geq d+1 and (d-1)p < d(q-1). This generalizes a classical result by Helly. We show how such a stabbing set can be computed for n convex polygons of constant size in the plane in O((p-q+1)n^{4/3}\\log^{ 2 + \\epsilon (n ) + p^2\\log(p) ) expected time. For convex polyhedra in R^3, the method yields an algorithm running in O((p-q+1)n^{ 13/ 5 +\\epsilon } n(\\log\\log n)^{1/6} } + p^4 ) expected time. We also show that analogous results of the Hadwiger and Debrunner (p,q)-theorem hold in other settings, such as convex sets in \\mathbb{R}^d\\times\\mathbb{Z}^k or abstract convex geometries.", "after_revision": "Hadwiger and Debrunner showed that for families of convex sets in R^d with the property that among any p of them some q have a common point, the whole family can be stabbed with p-q+1 points if p \\geq q \\geq d+1 and (d-1)p < d(q-1). This generalizes a classical result by Helly. We show how such a stabbing set can be computed for a family of convex polygons in the plane with a total of n vertices in O((p-q+1)n^{4/3}\\log^{ 8 n(\\log\\log n)^{1/3 + np^2 ) expected time. For polyhedra in R^3, we get an algorithm running in O((p-q+1)n^{ 5 /2 } \\log^{10 n(\\log\\log n)^{1/6} } + np^3 ) expected time. We also investigate other conditions on convex polygons for which our algorithm can find a fixed number of points stabbing them. Finally, we show that analogous results of the Hadwiger and Debrunner (p,q)-theorem hold in other settings, such as convex sets in \\mathbb{R}^d\\times\\mathbb{Z}^k or abstract convex geometries.", "edit_actions": [{"type": "R", "before": "n convex polygons of constant size", "after": "a family of convex polygons", "start_char_pos": 331, "end_char_pos": 365}, {"type": "A", "before": null, "after": "with a total of n vertices", "start_char_pos": 379, "end_char_pos": 379}, {"type": "R", "before": "2", "after": "8", "start_char_pos": 406, "end_char_pos": 407}, {"type": "A", "before": null, "after": "n(\\log\\log n)^{1/3", "start_char_pos": 408, "end_char_pos": 408}, {"type": "D", "before": "\\epsilon", "after": null, "start_char_pos": 411, "end_char_pos": 419}, {"type": "R", "before": "(n", "after": "np^2", "start_char_pos": 420, "end_char_pos": 422}, {"type": "D", "before": "+ p^2\\log(p) )", "after": null, "start_char_pos": 425, "end_char_pos": 439}, {"type": "D", "before": "convex", "after": null, "start_char_pos": 459, "end_char_pos": 465}, {"type": "R", "before": "the method yields", "after": "we get", "start_char_pos": 484, "end_char_pos": 501}, {"type": "D", "before": "13/", "after": null, "start_char_pos": 539, "end_char_pos": 542}, {"type": "R", "before": "+\\epsilon", "after": "/2", "start_char_pos": 545, "end_char_pos": 554}, {"type": "A", "before": null, "after": "\\log^{10", "start_char_pos": 557, "end_char_pos": 557}, {"type": "R", "before": "p^4", "after": "np^3", "start_char_pos": 582, "end_char_pos": 585}, {"type": "A", "before": null, "after": "investigate other conditions on convex polygons for which our algorithm can find a fixed number of points stabbing them. Finally, we", "start_char_pos": 611, "end_char_pos": 611}], "sents_char_pos": [0, 232, 278, 454, 602]}
+{"doc_id": "2002.07611", "revision_depth": "1", "before_revision": " We study the maximal independent set (MIS) and maximum independent set ( MAX-IS ) problems on dynamic sets of O(n) axis-parallel rectangles, which can be modeled as dynamic rectangle intersection graphs. We consider the fully dynamic vertex update (insertion/deletion ) modelfor two types of rectangles: (i) uniform height and width and (ii) uniform height and arbitrary width . These types of dynamic vertex update problems arise, e.g., in interactive map labeling. We present the first deterministic algorithm for maintaining a MIS (and thus a 4-approximate MAX-IS ) of a dynamic set of uniform rectangles with amortized sub-logarithmic update time. This breaks the natural barrier of O (\\Delta) update time (where \\Delta is the maximum degree in the graph) for vertex updates presented by Assadi et al. (STOC 2018). We continue by investigating MAX-IS and provide a series of deterministic dynamic approximation schemes . For uniform rectangles, we first give an algorithm that maintains a 4-approximate MAX-IS with O(1) update time. In a subsequent algorithm, we establish the trade-off between approximation quality 2 (1+\\frac{1{k}) and update time O(k^2\\log n) for k\\in \\mathbb{N}. We conclude with an algorithm that maintains a 2-approximate MAX-IS for dynamic sets of uniform height and arbitrary width rectangles with O(\\omega \\log n) update time, where \\omega is the largest number of maximal cliques stabbed by any axis-parallel line} . We have implemented our algorithms and report the results of an experimental comparison exploring the trade-off between solution size and update time for synthetic and real-world map labeling data sets .", "after_revision": "Map labeling is a classical problem in cartography and geographic information systems that asks to place labels for area, line, and point features, with the goal to select and place the maximum number of independent, i.e., overlap-free, labels. A practically interesting case is point labeling with axis-parallel rectangular labels of common size. In a fully dynamic setting, at each time step, either a new label appears or an existing label disappears. Then, the challenge is to maintain a maximum cardinality subset of pairwise independent labels with sub-linear update time. We study the maximal independent set (MIS) and maximum independent set ( Max-IS ) problems on fully dynamic (insertion/deletion model) sets of axis-parallel rectangles of two types--- (i) uniform height and width and (ii) uniform height and arbitrary width ; both settings can be modeled as rectangle intersection graphs. We present the first deterministic algorithm for maintaining a MIS (and thus a 4-approximate Max-IS ) of a dynamic set of uniform rectangles with amortized sub-logarithmic update time. This breaks the natural barrier of \\Omega (\\Delta) update time (where \\Delta is the maximum degree in the graph) for vertex updates presented by Assadi et al. (STOC 2018). We continue by investigating Max-IS and provide a series of deterministic dynamic approximation schemes with approximation factors between 2 {k}) and update time O(k^2\\log n) for k\\in \\mathbb{N}. We conclude with an algorithm that maintains a 2-approximate MAX-IS for dynamic sets of uniform height and arbitrary width rectangles with O(\\omega \\log n) update time, where \\omega is the largest number of maximal cliques stabbed by any axis-parallel line} and 4 and corresponding running-time trade-offs . We have implemented our algorithms and report the results of an experimental comparison exploring the trade-off between solution quality and update time for synthetic and real-world map labeling instances .", "edit_actions": [{"type": "A", "before": null, "after": "Map labeling is a classical problem in cartography and geographic information systems that asks to place labels for area, line, and point features, with the goal to select and place the maximum number of independent, i.e., overlap-free, labels. A practically interesting case is point labeling with axis-parallel rectangular labels of common size. In a fully dynamic setting, at each time step, either a new label appears or an existing label disappears. Then, the challenge is to maintain a maximum cardinality subset of pairwise independent labels with sub-linear update time.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "MAX-IS", "after": "Max-IS", "start_char_pos": 74, "end_char_pos": 80}, {"type": "R", "before": "dynamic sets of O(n) axis-parallel rectangles, which can be modeled as dynamic rectangle intersection graphs. We consider the fully dynamic vertex update", "after": "fully dynamic", "start_char_pos": 95, "end_char_pos": 248}, {"type": "R", "before": ") modelfor two types of rectangles:", "after": "model) sets of axis-parallel rectangles of two types---", "start_char_pos": 269, "end_char_pos": 304}, {"type": "R", "before": ". These types of dynamic vertex update problems arise, e.g., in interactive map labeling.", "after": "; both settings can be modeled as rectangle intersection graphs.", "start_char_pos": 378, "end_char_pos": 467}, {"type": "R", "before": "MAX-IS", "after": "Max-IS", "start_char_pos": 561, "end_char_pos": 567}, {"type": "R", "before": "O", "after": "\\Omega", "start_char_pos": 688, "end_char_pos": 689}, {"type": "R", "before": "MAX-IS", "after": "Max-IS", "start_char_pos": 849, "end_char_pos": 855}, {"type": "R", "before": ". For uniform rectangles, we first give an algorithm that maintains a 4-approximate MAX-IS with O(1) update time. In a subsequent algorithm, we establish the trade-off between approximation quality", "after": "with approximation factors between", "start_char_pos": 924, "end_char_pos": 1121}, {"type": "D", "before": "(1+\\frac{1", "after": null, "start_char_pos": 1124, "end_char_pos": 1134}, {"type": "A", "before": null, "after": "and 4 and corresponding running-time trade-offs", "start_char_pos": 1447, "end_char_pos": 1447}, {"type": "R", "before": "size", "after": "quality", "start_char_pos": 1579, "end_char_pos": 1583}, {"type": "R", "before": "data sets", "after": "instances", "start_char_pos": 1642, "end_char_pos": 1651}], "sents_char_pos": [0, 204, 379, 467, 652, 819, 925, 1037, 1188, 1449]}
+{"doc_id": "2002.07671", "revision_depth": "1", "before_revision": "Common reporting styles of statistical results, such as confidence intervals (CI), are prone to dichotomous interpretations especially on null hypothesis testing frameworks , for exampleby claiming significant differences between drug treatment and placebo groups due to the non-overlapping CIs of the mean effects , while disregarding the magnitudes and absolute difference in the effect sizes. Techniques relying on the visual estimation of the strength of evidence have been recommended to limit such dichotomous interpretations but their effectiveness has been challenged. We ran two experiments to compare several representation alternatives of confidence intervals , and used Bayesian multilevel models to estimate the effects of the representation styles on differences in subjective confidence of the results and preferences in visualization styles. Our results suggest that adding visual information to classic CI representation can decrease the sudden drop around p-value 0.05 compared to classic CIs and textual representation of CI with p-values. All data analysis and scripts are available at URL ", "after_revision": "Common reporting styles for statistical results, such as p-values and confidence intervals (CI), have been reported to be prone to dichotomous interpretations , especially with respect to null hypothesis testing frameworks . For example, when the p-value is small enough or the CIs of the mean effects of a studied drug and a placebo are not overlapping, scientists tend to claim significant differences while often disregarding the magnitudes and absolute differences in the effect sizes. Techniques relying on the visual estimation of the strength of evidence have been recommended to reduce such dichotomous interpretations but their effectiveness has also been challenged. We ran two experiments to compare several alternative representations of confidence intervals and used Bayesian multilevel models to estimate the effects of the representation styles on differences in subjective confidence in the results. We also asked the respondents' opinions and preferences in representation styles. Our results suggest that adding visual information to classic CI representation can decrease the tendency towards dichotomous interpretations - measured as the \"cliff effect\": the sudden drop in confidence around p-value 0.05 - compared with classic CI visualization and textual representation of the CI with p-values. As a contribution to open science, our data and all analyses are publicly available at URL .", "edit_actions": [{"type": "R", "before": "of", "after": "for", "start_char_pos": 24, "end_char_pos": 26}, {"type": "A", "before": null, "after": "p-values and", "start_char_pos": 56, "end_char_pos": 56}, {"type": "R", "before": "are", "after": "have been reported to be", "start_char_pos": 84, "end_char_pos": 87}, {"type": "R", "before": "especially on", "after": ", especially with respect to", "start_char_pos": 125, "end_char_pos": 138}, {"type": "R", "before": ", for exampleby claiming significant differences between drug treatment and placebo groups due to the non-overlapping", "after": ". For example, when the p-value is small enough or the", "start_char_pos": 174, "end_char_pos": 291}, {"type": "R", "before": ", while", "after": "of a studied drug and a placebo are not overlapping, scientists tend to claim significant differences while often", "start_char_pos": 316, "end_char_pos": 323}, {"type": "R", "before": "difference", "after": "differences", "start_char_pos": 365, "end_char_pos": 375}, {"type": "R", "before": "limit", "after": "reduce", "start_char_pos": 494, "end_char_pos": 499}, {"type": "A", "before": null, "after": "also", "start_char_pos": 561, "end_char_pos": 561}, {"type": "R", "before": "representation alternatives", "after": "alternative representations", "start_char_pos": 621, "end_char_pos": 648}, {"type": "D", "before": ",", "after": null, "start_char_pos": 673, "end_char_pos": 674}, {"type": "R", "before": "of the results", "after": "in the results. We also asked the respondents' opinions", "start_char_pos": 804, "end_char_pos": 818}, {"type": "R", "before": "visualization", "after": "representation", "start_char_pos": 838, "end_char_pos": 851}, {"type": "R", "before": "sudden drop", "after": "tendency towards dichotomous interpretations - measured as the \"cliff effect\": the sudden drop in confidence", "start_char_pos": 957, "end_char_pos": 968}, {"type": "R", "before": "compared to classic CIs", "after": "- compared with classic CI visualization", "start_char_pos": 989, "end_char_pos": 1012}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1043, "end_char_pos": 1043}, {"type": "R", "before": "All data analysis and scripts are", "after": "As a contribution to open science, our data and all analyses are publicly", "start_char_pos": 1062, "end_char_pos": 1095}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1113, "end_char_pos": 1113}], "sents_char_pos": [0, 396, 578, 859, 1061]}
+{"doc_id": "2002.07698", "revision_depth": "1", "before_revision": "A cycle C of a graph G is isolating if every component of G-V(C) is a single vertex. We show that isolating cycles in polyhedral graphs can be extended to larger ones: every isolating cycle C of length 8 \\leq |E(C)| < \\left \\lfloor 2{3}(|V(G)|+ 3)\\right \\rfloor implies an isolating cycle C' of larger length that contains V(C). By ``hopping'' iteratively to such larger cycles, we obtain a powerful and very general inductive motor for proving and computing long cycles (we will give an algorithm with running time O(n^2)). This provides a method to prove lower bounds on Tutte cycles, as C' will be a Tutte cycle of G if C is. We also prove that E(C') \\leq E(C) +3 if G does not contain faces of size five, which gives a new tool for proving results about cycle spectra and evidence that these face sizes obstruct long cycles . As a sample application, we test our motor on a conjecture on essentially 4-connected graphs. A planar graph is \\emph{essentially 4-connected} if it is 3-connected and every of its 3-separators is the neighborhood of a single vertex. Essentially 4-connected graphs have been thoroughly investigated throughout literature as the subject of Hamiltonicity studies. Jackson and Wormald proved that every essentially 4-connected planar graph G on n vertices contains a cycle of length at least \\frac{2}{5}(n+2), and this result has recently been improved multiple times, culminating in the lower bound \\frac{5}{8}(n+2). However, the best known upper bound is given by an infinite family of such graphs in which every graph G on n vertices has no cycle longer than\\left \\lfloor \\frac{2}{3}(n+4) \\right \\rfloor ; this upper bound is still unmatched. Using isolating cycles, we improve the lower bound to match the upper (up to a summand +1). This settles the long-standing open problem of determining the circumference of essentially 4-connected planar graphs .", "after_revision": "A cycle C of a graph G is isolating if every component of G-V(C) is a single vertex. We show that isolating cycles in polyhedral graphs can be extended to larger ones: every isolating cycle C of length 6 \\leq |E(C)| < \\left \\lfloor 2{3}(|V(G)|+ 4)\\right \\rfloor implies an isolating cycle C' of larger length that contains V(C). By \"hopping\" iteratively to such larger cycles, we obtain a powerful and very general inductive motor for proving long cycles and computing them (we will give an algorithm with quadratic running time). This is the first step towards the so far elusive quest of finding a universal induction that captures longest cycles of polyhedral graph classes. Our motor provides also a method to prove linear lower bounds on the length of Tutte cycles, as C' will be a Tutte cycle of G if C is. We prove in addition that | E(C') | \\leq | E(C) | +3 if G contains no face of size five, which gives a new tool for results about cycle spectra , and provides evidence that faces of size five may obstruct long cycles in many graph classes. We test our motor on the following conjecture about essentially 4-connected graphs. A planar graph is \\emph{essentially 4-connected} if it is 3-connected and every of its 3-separators is the neighborhood of a single vertex. Jackson and Wormald proved that every essentially 4-connected planar graph G on n vertices contains a cycle of length at least \\frac{2}{5}(n+2), and this result has recently been improved multiple times, culminating in the lower bound \\frac{5}{8}(n+2). However, the currently best known upper bound is given by an infinite family of such graphs in which no graph G contains a cycle that is longer than\\left \\lfloor \\frac{2}{3}(n+4) \\right \\rfloor ; this upper bound is still unmatched. Using isolating cycles, we improve the lower bound to match the upper . All our results are tight .", "edit_actions": [{"type": "R", "before": "8", "after": "6", "start_char_pos": 202, "end_char_pos": 203}, {"type": "R", "before": "3)", "after": "4)", "start_char_pos": 245, "end_char_pos": 247}, {"type": "R", "before": "``hopping''", "after": "\"hopping\"", "start_char_pos": 332, "end_char_pos": 343}, {"type": "R", "before": "and computing long cycles", "after": "long cycles and computing them", "start_char_pos": 445, "end_char_pos": 470}, {"type": "R", "before": "running time O(n^2)). This provides", "after": "quadratic running time). This is the first step towards the so far elusive quest of finding a universal induction that captures longest cycles of polyhedral graph classes. Our motor provides also", "start_char_pos": 503, "end_char_pos": 538}, {"type": "A", "before": null, "after": "linear", "start_char_pos": 557, "end_char_pos": 557}, {"type": "A", "before": null, "after": "the length of", "start_char_pos": 574, "end_char_pos": 574}, {"type": "R", "before": "also prove that", "after": "prove in addition that |", "start_char_pos": 634, "end_char_pos": 649}, {"type": "R", "before": "\\leq", "after": "| \\leq |", "start_char_pos": 656, "end_char_pos": 660}, {"type": "A", "before": null, "after": "|", "start_char_pos": 666, "end_char_pos": 666}, {"type": "R", "before": "does not contain faces", "after": "contains no face", "start_char_pos": 675, "end_char_pos": 697}, {"type": "D", "before": "proving", "after": null, "start_char_pos": 739, "end_char_pos": 746}, {"type": "R", "before": "and evidence that these face sizes", "after": ", and provides evidence that faces of size five may", "start_char_pos": 775, "end_char_pos": 809}, {"type": "R", "before": ". As a sample application, we", "after": "in many graph classes. We", "start_char_pos": 831, "end_char_pos": 860}, {"type": "R", "before": "a conjecture on", "after": "the following conjecture about", "start_char_pos": 879, "end_char_pos": 894}, {"type": "D", "before": "Essentially 4-connected graphs have been thoroughly investigated throughout literature as the subject of Hamiltonicity studies.", "after": null, "start_char_pos": 1067, "end_char_pos": 1194}, {"type": "A", "before": null, "after": "currently", "start_char_pos": 1461, "end_char_pos": 1461}, {"type": "R", "before": "every graph G on n vertices has no cycle longer than", "after": "no graph G contains a cycle that is longer than", "start_char_pos": 1540, "end_char_pos": 1592}, {"type": "R", "before": "(up to a summand +1). This settles the long-standing open problem of determining the circumference of essentially 4-connected planar graphs", "after": ". All our results are tight", "start_char_pos": 1747, "end_char_pos": 1886}], "sents_char_pos": [0, 84, 328, 524, 630, 832, 926, 1066, 1194, 1447, 1639, 1676, 1768]}
+{"doc_id": "2002.08498", "revision_depth": "1", "before_revision": "We study approximation algorithms for the following three string measures that are widely used in practice: edit distance , longest common subsequence , and longest increasing sequence .\\ All three problems can be solved exactly by standard algorithms that run in polynomial time with roughly O (n) space, where n is the input length, and our goal is to design deterministic approximation algorithms that run in polynomial time with significantly smaller space. Towards this, we design several algorithms that achieve 1+\\epsilon or 1-\\epsilon approximation for all three problems, where \\epsilon>0 can be any constant . Our algorithms use space n^{\\delta for any constant \\delta>0 and have running time essentially the same as or slightly more than the standard algorithms . Our algorithms significantly improve previous results in terms of space complexity, where all known results need to use space at least \\Omega(n). Some of our algorithms can also be adapted to work in the asymmetric streaming model \\mbox{%DIFAUXCMD saks2013space\\hspace{0pt}%DIFAUXCMD } , and output the corresponding sequence. ] ] Our algorithms are based on the idea of using recursion as in Savitch's theorem \\mbox{%DIFAUXCMD \\cite{Savitch70}\\hspace{0pt}%DIFAUXCMD } , and a careful modification of previous techniques to make the recursion work. Along the way we also give a new logspace reduction from longest common subsequence to longest increasing sequence, which may be of independent interest.", "after_revision": "We study approximation algorithms for the following three string measures that are widely used in practice: edit distance (ED) , longest common subsequence (LCS) , and longest increasing sequence (LIS). All three problems can be solved exactly by standard algorithms that run in polynomial time with roughly \\Theta (n) space, where n is the input length, and our goal is to design deterministic approximation algorithms that run in polynomial time with significantly smaller space. Towards this, we design several algorithms that achieve 1+\\epsilon or 1-\\epsilon approximation for all three problems, where \\epsilon>0 can be any constant and even slightly sub constant . Our algorithms are flexible and can be adjusted to achieve the following two regimes of parameters: 1) space n^\\delta for any constant \\delta>0 with running time essentially the same as or slightly more than the standard algorithms ; and 2) space \\mathsf{polylog SC) . Our algorithms significantly improve previous results in terms of space complexity, where all known results need to use space at least \\Omega(n). Some of our algorithms can also be adapted to work in the asymmetric streaming model \\hspace{0pt}%DIFAUXCMD } SS13 , and output the corresponding sequence. Furthermore, our results can be used to improve a recent result by Farhadi et. al. FHRS20] about approximating ED in the asymmetric streaming model, reducing the running time from being exponential in FHRS20] to a polynomial. Our algorithms are based on the idea of using recursion as in Savitch's theorem }\\hspace{0pt}%DIFAUXCMD } Sav70 , and a careful adaption of previous techniques to make the recursion work. Along the way we also give a new logspace reduction from longest common subsequence to longest increasing sequence, which may be of independent interest.", "edit_actions": [{"type": "A", "before": null, "after": "(ED)", "start_char_pos": 122, "end_char_pos": 122}, {"type": "A", "before": null, "after": "(LCS)", "start_char_pos": 152, "end_char_pos": 152}, {"type": "R", "before": ".\\", "after": "(LIS).", "start_char_pos": 187, "end_char_pos": 189}, {"type": "R", "before": "O", "after": "\\Theta", "start_char_pos": 295, "end_char_pos": 296}, {"type": "A", "before": null, "after": "and even slightly sub constant", "start_char_pos": 620, "end_char_pos": 620}, {"type": "R", "before": "use space n^{\\delta", "after": "are flexible and can be adjusted to achieve the following two regimes of parameters: 1) space n^\\delta", "start_char_pos": 638, "end_char_pos": 657}, {"type": "R", "before": "and have", "after": "with", "start_char_pos": 684, "end_char_pos": 692}, {"type": "A", "before": null, "after": "; and 2) space \\mathsf{polylog", "start_char_pos": 776, "end_char_pos": 776}, {"type": "A", "before": null, "after": "SC", "start_char_pos": 777, "end_char_pos": 777}, {"type": "A", "before": null, "after": ")", "start_char_pos": 777, "end_char_pos": 777}, {"type": "D", "before": "\\mbox{%DIFAUXCMD saks2013space", "after": null, "start_char_pos": 1011, "end_char_pos": 1041}, {"type": "A", "before": null, "after": "SS13", "start_char_pos": 1066, "end_char_pos": 1066}, {"type": "A", "before": null, "after": "Furthermore, our results can be used to improve a recent result by Farhadi et. al.", "start_char_pos": 1108, "end_char_pos": 1108}, {"type": "A", "before": null, "after": "FHRS20", "start_char_pos": 1109, "end_char_pos": 1109}, {"type": "A", "before": null, "after": "about approximating ED in the asymmetric streaming model, reducing the running time from being exponential in", "start_char_pos": 1111, "end_char_pos": 1111}, {"type": "A", "before": null, "after": "FHRS20", "start_char_pos": 1112, "end_char_pos": 1112}, {"type": "A", "before": null, "after": "to a polynomial.", "start_char_pos": 1114, "end_char_pos": 1114}, {"type": "D", "before": "\\mbox{%DIFAUXCMD \\cite{Savitch70", "after": null, "start_char_pos": 1195, "end_char_pos": 1227}, {"type": "A", "before": null, "after": "Sav70", "start_char_pos": 1253, "end_char_pos": 1253}, {"type": "R", "before": "modification", "after": "adaption", "start_char_pos": 1270, "end_char_pos": 1282}], "sents_char_pos": [0, 463, 622, 779, 925, 1107, 1333]}
+{"doc_id": "2002.08608", "revision_depth": "1", "before_revision": "We propose FrameAxis, a method of characterizing the framing of a given text by identifying the most relevant semantic axes (\"microframes\") defined by antonym word pairs . In contrast to the traditional framing analysis, which has been constrained by a small number of manually annotated general frames, our unsupervised approach provides much more detailed insights , by considering a host of semantic axes. Our method is capable of quantitatively teasing out framing bias -- how biased a text is in each microframe -- and framing intensity \\textit{ -- how much each microframe is used -- from the text, offering a nuanced characterization of framing. We evaluate our approach using SemEval datasets as well as three other datasets and human evaluations, demonstrating that FrameAxis can reliably characterize documents with relevant microframes . Our method may allow scalable and nuanced computational analyses of framing across disciplines.", "after_revision": "Framing is a process of emphasizing a certain aspect of an issue over the others, nudging readers or listeners towards different positions on the issue even without making a biased argument. Here, we propose FrameAxis, a method for automatically characterizing framing of a given text by identifying the most relevant semantic axes (\"microframes\") that are overrepresented in the text using word embedding . In contrast to the traditional framing analysis, which tends to be constrained by a small number of manually annotated general frames, our unsupervised approach can be readily applied to large datasets because it does not require manual annotations. It can also provide more nuanced insights by considering a host of semantic axes. Our method is designed to quantitatively tease out two important dimensions of framing:framing bias -- how biased an argument is -- and \\textit{framing intensity -- how much a particular aspect over another is highlighted -- from the text, offering a nuanced characterization of framing. We demonstrate how FrameAxis successfully captures framing bias and intensity in a variety of text data from restaurant reviews to news media. The existing domain knowledge can be directly incorporated into FrameAxis by guiding candidate microframes to test and fine-tune automatically discovered microframes. We propose methods for explaining the results of FrameAxis at the level of individual words and documents. Our method may accelerate scalable and nuanced computational analyses of framing across disciplines.", "edit_actions": [{"type": "R", "before": "We", "after": "Framing is a process of emphasizing a certain aspect of an issue over the others, nudging readers or listeners towards different positions on the issue even without making a biased argument. Here, we", "start_char_pos": 0, "end_char_pos": 2}, {"type": "R", "before": "of characterizing the", "after": "for automatically characterizing", "start_char_pos": 31, "end_char_pos": 52}, {"type": "R", "before": "defined by antonym word pairs", "after": "that are overrepresented in the text using word embedding", "start_char_pos": 140, "end_char_pos": 169}, {"type": "R", "before": "has been", "after": "tends to be", "start_char_pos": 227, "end_char_pos": 235}, {"type": "R", "before": "provides much more detailed insights ,", "after": "can be readily applied to large datasets because it does not require manual annotations. It can also provide more nuanced insights", "start_char_pos": 330, "end_char_pos": 368}, {"type": "R", "before": "capable of quantitatively teasing out framing bias", "after": "designed to quantitatively tease out two important dimensions of framing:", "start_char_pos": 423, "end_char_pos": 473}, {"type": "A", "before": null, "after": "framing bias", "start_char_pos": 473, "end_char_pos": 473}, {"type": "R", "before": "a text is in each microframe", "after": "an argument is", "start_char_pos": 488, "end_char_pos": 516}, {"type": "D", "before": "framing intensity", "after": null, "start_char_pos": 524, "end_char_pos": 541}, {"type": "A", "before": null, "after": "framing intensity", "start_char_pos": 550, "end_char_pos": 550}, {"type": "R", "before": "each microframe is used", "after": "a particular aspect over another is highlighted", "start_char_pos": 563, "end_char_pos": 586}, {"type": "R", "before": "evaluate our approach using SemEval datasets as well as three other datasets and human evaluations, demonstrating that FrameAxis can reliably characterize documents with relevant microframes .", "after": "demonstrate how FrameAxis successfully captures framing bias and intensity in a variety of text data from restaurant reviews to news media. The existing domain knowledge can be directly incorporated into FrameAxis by guiding candidate microframes to test and fine-tune automatically discovered microframes. We propose methods for explaining the results of FrameAxis at the level of individual words and documents.", "start_char_pos": 656, "end_char_pos": 848}, {"type": "R", "before": "allow", "after": "accelerate", "start_char_pos": 864, "end_char_pos": 869}], "sents_char_pos": [0, 171, 408, 652, 848]}
+{"doc_id": "2002.09036", "revision_depth": "1", "before_revision": "Towards the realization of a sustainable, fair and inclusive society, we propose a novel decision-making model that incorporates social norms in a rational choice model from the standpoints of deontology and utilitarianism , and make a hypothesis that interprets choice of action as the X-point for individual utility function increasing with actions and social norm function decreasing with actions. This hypothesis is based on humans balancing the value of utility and the value of norms psychologically in choosing actions. Using the hypothesis and approximation, we were able to isolate and infer utility function and norm function from real-world measurement data of actions on environmental conditions , and elucidate the interaction between the both functions to lead actions from current to target . As examples of collective data that aggregate decision-making of individuals, we looked at the changes in power usage before and after the Great East Japan Earthquake and the correlation between national GDP and CO2 emission in different countries. The first example is interpreted that the benefits for power (i.e., utility of power usage) is stronger than the power usage restrictions imposed by norms after the earthquake, contrary to our expectation. The second example is interpreted that the reduction of CO2 emission in each country is not related to utility derived from GDP but to norms related to CO2 emission. Going forward, we will apply this new X-point model to actual social practices involving normative problems, and design the approaches for the diagnosis, prognosis , and intervention of social systems (individual action, inter-individual interaction, and institution) by IT systems.", "after_revision": "Towards the realization of a sustainable, fair and inclusive society, we proposed a novel decision-making model that incorporates social norms in a rational choice model from the standpoints of deontology and utilitarianism . We proposed a hypothesis that interprets choice of action as the X-point for individual utility function that increases with actions and social norm function that decreases with actions. This hypothesis is based on humans psychologically balancing the value of utility and norms in selecting actions. Using the hypothesis and approximation, we were able to isolate and infer utility function and norm function from real-world measurement data of actions on environmental conditions and elucidate the interaction between the both functions that led from current status to target actions . As examples of collective data that aggregate decision-making of individuals, we looked at the changes in power usage before and after the Great East Japan Earthquake and the correlation between national GDP and CO2 emission in different countries. The first example showed that the perceived benefits of power (i.e., utility of power usage) was stronger than the power usage restrictions imposed by norms after the earthquake, contrary to our expectation. The second example showed that a reduction of CO2 emission in each country was not related to utility derived from GDP but to norms related to CO2 emission. Going forward, we will apply this new X-point model to actual social practices involving normative problems, and design the approaches for the diagnosis, prognosis and intervention of social systems by IT systems.", "edit_actions": [{"type": "R", "before": "propose", "after": "proposed", "start_char_pos": 73, "end_char_pos": 80}, {"type": "R", "before": ", and make", "after": ". We proposed", "start_char_pos": 223, "end_char_pos": 233}, {"type": "R", "before": "increasing", "after": "that increases", "start_char_pos": 327, "end_char_pos": 337}, {"type": "R", "before": "decreasing", "after": "that decreases", "start_char_pos": 376, "end_char_pos": 386}, {"type": "A", "before": null, "after": "psychologically", "start_char_pos": 436, "end_char_pos": 436}, {"type": "R", "before": "the value of norms psychologically in choosing", "after": "norms in selecting", "start_char_pos": 472, "end_char_pos": 518}, {"type": "D", "before": ",", "after": null, "start_char_pos": 709, "end_char_pos": 710}, {"type": "R", "before": "to lead actions from current to target", "after": "that led from current status to target actions", "start_char_pos": 768, "end_char_pos": 806}, {"type": "R", "before": "is interpreted that the benefits for", "after": "showed that the perceived benefits of", "start_char_pos": 1076, "end_char_pos": 1112}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1150, "end_char_pos": 1152}, {"type": "R", "before": "is interpreted that the", "after": "showed that a", "start_char_pos": 1283, "end_char_pos": 1306}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1349, "end_char_pos": 1351}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1594, "end_char_pos": 1595}, {"type": "D", "before": "(individual action, inter-individual interaction, and institution)", "after": null, "start_char_pos": 1631, "end_char_pos": 1697}], "sents_char_pos": [0, 400, 527, 808, 1057, 1263, 1429]}
+{"doc_id": "2002.09460", "revision_depth": "1", "before_revision": "Graph clustering objective functions with tunable resolution parameters make it possible to detect different types of clustering structure in the same graph. These objectives also provide a unifying view of other non-parametric objectives, which often can be captured as special cases. Previous research has largely focused on parametric objectives for standard graphs, in which all nodes are of the same type, and edges model pairwise relationships. In our work, we introduced parameterized objective functions and approximation algorithms specifically for clustering bipartite graphs and hypergraphs, based on correlation clustering. This enables us to develop principled approaches for clustering datasets with different node types (bipartite graphs) or multiway relationships (hypergraphs). Our hypergraph objective is related to higher-order notions of modularity and normalized cut , and is amenable to approximation algorithms via hypergraph expansion techniques. Our bipartite objective generalizes standard bipartite correlation clustering, and in a certain parameter regime is equivalent to bicluster deletion, i. e., removing a minimum number of edges to separate a bipartite graph into disjoint bicliques. The problem in general is NP-hard, but we show that in a certain parameter regime it is equivalent to a bipartite matching problem , meaning that it is polynomial timesolvable in this regime . For other regimes, we provide approximation guarantees based on LP-rounding. Our results include the first constant factor approximation algorithm for bicluster deletion . We illustrate the flexibility of our framework in several experiments . This includes clustering a food web and an email network based on higher-order motif structure, detecting clusters of retail products in product review hypergraph, and evaluating our algorithms across a range of parameter settings on several real world bipartite graphs .", "after_revision": "Motivated by applications in community detection and dense subgraph discovery, we consider new clustering objectives in hypergraphs and bipartite graphs. These objectives are parameterized by one or more resolution parameters in order to enable diverse knowledge discovery in complex data. For both hypergraph and bipartite objectives, we identify parameter regimes that are equivalent to existing objectives and share their (polynomial-time) approximation algorithms. We first show that our parameterized hypergraph correlation clustering objective is related to higher-order notions of normalized cut and modularity in hypergraphs. It is further amenable to approximation algorithms via hyperedge expansion techniques. Our parameterized bipartite correlation clustering objective generalizes standard unweighted bipartite correlation clustering, as well as bicluster deletion. For a certain choice of parameters it is also related to our hypergraph objective. Although in general it is NP-hard, we highlight a parameter regime for the bipartite objective where the problem reduces to the bipartite matching problem and thus can be solved in polynomial time . For other parameter settings, we present approximation algorithms using linear program rounding techniques. These results allow us to introduce the first constant-factor approximation for bicluster deletion , the task of removing a minimum number of edges to partition a bipartite graph into disjoint bi-cliques. In several experimental results, we highlight the flexibility of our framework and the diversity of results that can be obtained in different parameter settings . This includes clustering bipartite graphs across a range of parameters, detecting motif-rich clusters in an email network and a food web, and forming clusters of retail products in a product review hypergraph, that are highly correlated with known product categories .", "edit_actions": [{"type": "R", "before": "Graph clustering objective functions with tunable resolution parameters make it possible to detect different types of clustering structure in the same graph. These objectives also provide a unifying view of other non-parametric", "after": "Motivated by applications in community detection and dense subgraph discovery, we consider new clustering objectives in hypergraphs and bipartite graphs. These objectives are parameterized by one or more resolution parameters in order to enable diverse knowledge discovery in complex data. For both hypergraph and bipartite", "start_char_pos": 0, "end_char_pos": 227}, {"type": "R", "before": "which often can be captured as special cases. Previous research has largely focused on parametric objectives for standard graphs, in which all nodes are of the same type, and edges model pairwise relationships. In our work, we introduced parameterized objective functions and approximation algorithms specifically for clustering bipartite graphs and hypergraphs, based on correlation clustering. This enables us to develop principled approaches for clustering datasets with different node types (bipartite graphs) or multiway relationships (hypergraphs). Our hypergraph", "after": "we identify parameter regimes that are equivalent to existing objectives and share their (polynomial-time) approximation algorithms. We first show that our parameterized hypergraph correlation clustering", "start_char_pos": 240, "end_char_pos": 809}, {"type": "R", "before": "modularity and normalized cut , and is", "after": "normalized cut and modularity in hypergraphs. It is further", "start_char_pos": 858, "end_char_pos": 896}, {"type": "R", "before": "hypergraph", "after": "hyperedge", "start_char_pos": 938, "end_char_pos": 948}, {"type": "R", "before": "bipartite", "after": "parameterized bipartite correlation clustering", "start_char_pos": 975, "end_char_pos": 984}, {"type": "A", "before": null, "after": "unweighted", "start_char_pos": 1016, "end_char_pos": 1016}, {"type": "R", "before": "and in a certain parameter regime is equivalent to bicluster deletion, i. e., removing a minimum number of edges to separate a bipartite graph into disjoint bicliques. The problem in general", "after": "as well as bicluster deletion. For a certain choice of parameters it is also related to our hypergraph objective. Although in general it", "start_char_pos": 1051, "end_char_pos": 1241}, {"type": "R", "before": "but we show that in a certain parameter regime it is equivalent to a", "after": "we highlight a parameter regime for the bipartite objective where the problem reduces to the", "start_char_pos": 1254, "end_char_pos": 1322}, {"type": "R", "before": ", meaning that it is polynomial timesolvable in this regime", "after": "and thus can be solved in polynomial time", "start_char_pos": 1350, "end_char_pos": 1409}, {"type": "R", "before": "regimes, we provide approximation guarantees based on LP-rounding. Our results include the first constant factor approximation algorithm", "after": "parameter settings, we present approximation algorithms using linear program rounding techniques. These results allow us to introduce the first constant-factor approximation", "start_char_pos": 1422, "end_char_pos": 1558}, {"type": "R", "before": ". We illustrate", "after": ", the task of removing a minimum number of edges to partition a bipartite graph into disjoint bi-cliques. In several experimental results, we highlight", "start_char_pos": 1582, "end_char_pos": 1597}, {"type": "R", "before": "in several experiments", "after": "and the diversity of results that can be obtained in different parameter settings", "start_char_pos": 1631, "end_char_pos": 1653}, {"type": "R", "before": "a food web and", "after": "bipartite graphs across a range of parameters, detecting motif-rich clusters in", "start_char_pos": 1681, "end_char_pos": 1695}, {"type": "R", "before": "based on higher-order motif structure, detecting", "after": "and a food web, and forming", "start_char_pos": 1713, "end_char_pos": 1761}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1793, "end_char_pos": 1793}, {"type": "R", "before": "and evaluating our algorithms across a range of parameter settings on several real world bipartite graphs", "after": "that are highly correlated with known product categories", "start_char_pos": 1821, "end_char_pos": 1926}], "sents_char_pos": [0, 157, 285, 450, 635, 794, 970, 1218, 1411, 1488, 1583, 1655]}
+{"doc_id": "2002.10045", "revision_depth": "1", "before_revision": "When selling information, sometimes the seller can increase the revenue by giving away some partial information to change the buyer' s belief about the information product, so the buyer may be more willing to purchase. This work studies the general problem of advertising information products by revealing some partial information. We consider a buyer who needs to make a decision, the outcome of which depends on the state of the world that is unknown to the buyer . There is an information seller who has access to information about the state of the world. The seller can advertise the information by revealing some partial information. We consider a seller who chooses an advertising strategy and then commits to it. The buyer decides whether to purchase the full information product after seeing the partial information. The seller's goal is to maximize the expected revenue. We prove that finding the optimal advertising strategy is hard, even in the simple case that the buyer typeis known. Nevertheless, we show that when the buyer type is known, the problem is equivalent to finding the concave closure of a function . Based on this observation, we prove some properties of the optimal mechanism, which allow us to solve the optimal mechanism by a convex program ( with exponential size in general, polynomial size for special cases). We also prove some interesting characterizations of the optimal mechanisms based on these properties. For the general problem when the seller only knows the type distribution of the buyer , it is NP-hard to find a constant factor approximation. We thus look at special cases and provide an approximation algorithm that finds an \\varepsilon-suboptimal mechanism when it is not too hard to predict the possible type of buyer who will make the purchase.", "after_revision": "When selling information, sometimes the seller can increase the revenue by giving away some partial information to change the buyers' belief about the information product, so the buyers may be more willing to purchase. This work studies the general problem of advertising information products by revealing some partial information. We consider buyers who need to make a decision, the outcome of which depends on the state of the world that is unknown to the buyers . There is an information seller who has access to the state of the world. The seller can advertise the information by revealing some partial information. We assume that the seller chooses a long-term advertising strategy and then commits to it. The buyers decide whether to purchase the full information product after seeing the partial information. The seller's goal is to maximize the expected revenue. We study the problem in two settings. 1. The seller targets the buyers of a certain type. In this case, we prove that finding the optimal advertising strategy is equivalent to finding the concave closure of a function , which is NP-hard in general . Based on this observation, we prove some properties of the optimal mechanism, which allow us to solve for the optimal mechanism by a convex program ( of exponential size in general, polynomial size for special cases). We also prove some interesting characterizations of the optimal mechanisms based on these properties. 2. For the general problem when the seller faces buyers of different types and only knows the distribution of their types , it is NP-hard to find a constant factor approximation. We thus look at special cases and provide an approximation algorithm that finds an \\varepsilon-suboptimal mechanism when it is not too hard to predict the possible type of buyers who will make the purchase.", "edit_actions": [{"type": "R", "before": "buyer' s", "after": "buyers'", "start_char_pos": 126, "end_char_pos": 134}, {"type": "R", "before": "buyer", "after": "buyers", "start_char_pos": 180, "end_char_pos": 185}, {"type": "R", "before": "a buyer who needs", "after": "buyers who need", "start_char_pos": 344, "end_char_pos": 361}, {"type": "R", "before": "buyer", "after": "buyers", "start_char_pos": 460, "end_char_pos": 465}, {"type": "D", "before": "information about", "after": null, "start_char_pos": 517, "end_char_pos": 534}, {"type": "R", "before": "consider a seller who chooses an", "after": "assume that the seller chooses a long-term", "start_char_pos": 642, "end_char_pos": 674}, {"type": "R", "before": "buyer decides", "after": "buyers decide", "start_char_pos": 724, "end_char_pos": 737}, {"type": "R", "before": "prove that finding the optimal advertising strategy is hard, even in the simple case that the buyer typeis known. Nevertheless, we show that when the buyer type is known, the problem is", "after": "study the problem in two settings. 1. The seller targets the buyers of a certain type. In this case, we prove that finding the optimal advertising strategy is", "start_char_pos": 883, "end_char_pos": 1068}, {"type": "A", "before": null, "after": ", which is NP-hard in general", "start_char_pos": 1125, "end_char_pos": 1125}, {"type": "A", "before": null, "after": "for", "start_char_pos": 1230, "end_char_pos": 1230}, {"type": "R", "before": "with", "after": "of", "start_char_pos": 1275, "end_char_pos": 1279}, {"type": "A", "before": null, "after": "2.", "start_char_pos": 1447, "end_char_pos": 1447}, {"type": "A", "before": null, "after": "faces buyers of different types and", "start_char_pos": 1488, "end_char_pos": 1488}, {"type": "R", "before": "type distribution of the buyer", "after": "distribution of their types", "start_char_pos": 1504, "end_char_pos": 1534}, {"type": "R", "before": "buyer", "after": "buyers", "start_char_pos": 1764, "end_char_pos": 1769}], "sents_char_pos": [0, 218, 331, 467, 558, 638, 719, 824, 879, 996, 1344, 1446, 1591]}
+{"doc_id": "2002.10045", "revision_depth": "2", "before_revision": "When selling information , sometimes the seller can increase the revenue by giving away some partial information to change the buyers'belief about the information product, so the buyers may be more willing to purchase. This work studies the general problem of advertising information products by revealing some partial information. We consider buyers who need to make a decision, the outcome of which depends on the state of the world that is unknown to the buyers. There is an information seller who has access to the state of the world. The seller can advertise the information by revealing some partial information. We assume that the seller chooses a long-term advertising strategy and then commits to it. The buyers decide whether to purchase the full information product after seeing the partial information. The seller's goal is to maximize the expected revenue. We study the problem in two settings. 1. The seller targets the buyers of a certain type. In this case, we prove that finding the optimal advertising strategy is equivalent to finding the concave closure of a function, which is NP-hard in general . Based on this observation, we prove some properties of the optimal mechanism, which allow us to solve for the optimal mechanism by a convex program (of exponential size in general, polynomial size for special cases). We also prove some interesting characterizations of the optimal mechanisms based on these properties. 2. For the general problem when the seller faces buyers of different types and only knows the distribution of their types, it is NP-hard to find a constant factor approximation. We thus look at special cases and provide an approximation algorithm that finds an \\varepsilon-suboptimal mechanism when it is not too hard to predict the possible type of buyers who will make the purchase .", "after_revision": "When selling information products, the seller can provide some free partial information to change people's valuations so that the overall revenue can possibly be increased. We study the general problem of advertising information products by revealing partial information. We consider buyers who are decision-makers. The outcomes of the decision problems depend on the state of the world that is unknown to the buyers. The buyers can make their own observations and thus can hold different personal beliefs about the state of the world. There is an information seller who has access to the state of the world. The seller can promote the information by revealing some partial information. We assume that the seller chooses a long-term advertising strategy and then commits to it. The seller's goal is to maximize the expected revenue. We study the problem in two settings. (1) The seller targets buyers of a certain type. In this case, we prove that finding the optimal advertising strategy is equivalent to finding the concave closure of a simple function. The function is a product of two quantities, the likelihood ratio and the cost of uncertainty . Based on this observation, we prove some properties of the optimal mechanism, which allow us to solve for the optimal mechanism by a finite-size convex program. The convex program will have a polynomial size if the state of the world has a constant number of possible realizations or the buyers face a decision problem with a constant number of options. For the general problem , we prove that it is NP-hard to find the optimal mechanism. (2) When the seller faces buyers of different types and only knows the distribution of their types, we provide an approximation algorithm when it is not too hard to predict the possible type of buyers who will make the purchase . For the general problem, we prove that it is NP-hard to find a constant-factor approximation .", "edit_actions": [{"type": "R", "before": ", sometimes", "after": "products,", "start_char_pos": 25, "end_char_pos": 36}, {"type": "R", "before": "increase the revenue by giving away some", "after": "provide some free", "start_char_pos": 52, "end_char_pos": 92}, {"type": "R", "before": "the buyers'belief about the information product, so", "after": "people's valuations so that the overall revenue can possibly be increased. We study", "start_char_pos": 123, "end_char_pos": 174}, {"type": "D", "before": "buyers may be more willing to purchase. This work studies the", "after": null, "start_char_pos": 179, "end_char_pos": 240}, {"type": "D", "before": "some", "after": null, "start_char_pos": 306, "end_char_pos": 310}, {"type": "R", "before": "need to make a decision, the outcome of which depends", "after": "are decision-makers. The outcomes of the decision problems depend", "start_char_pos": 355, "end_char_pos": 408}, {"type": "A", "before": null, "after": "The buyers can make their own observations and thus can hold different personal beliefs about the state of the world.", "start_char_pos": 466, "end_char_pos": 466}, {"type": "R", "before": "advertise", "after": "promote", "start_char_pos": 555, "end_char_pos": 564}, {"type": "D", "before": "buyers decide whether to purchase the full information product after seeing the partial information. The", "after": null, "start_char_pos": 715, "end_char_pos": 819}, {"type": "R", "before": "1.", "after": "(1)", "start_char_pos": 909, "end_char_pos": 911}, {"type": "D", "before": "the", "after": null, "start_char_pos": 931, "end_char_pos": 934}, {"type": "R", "before": "function, which is NP-hard in general", "after": "simple function. The function is a product of two quantities, the likelihood ratio and the cost of uncertainty", "start_char_pos": 1080, "end_char_pos": 1117}, {"type": "R", "before": "convex program (of exponential size in general, polynomial size for special cases). We also prove some interesting characterizations of the optimal mechanisms based on these properties. 2.", "after": "finite-size convex program. The convex program will have a polynomial size if the state of the world has a constant number of possible realizations or the buyers face a decision problem with a constant number of options.", "start_char_pos": 1253, "end_char_pos": 1441}, {"type": "R", "before": "when the", "after": ", we prove that it is NP-hard to find the optimal mechanism. (2) When the", "start_char_pos": 1466, "end_char_pos": 1474}, {"type": "R", "before": "it is NP-hard to find a constant factor approximation. We thus look at special cases and", "after": "we", "start_char_pos": 1562, "end_char_pos": 1650}, {"type": "D", "before": "that finds an \\varepsilon-suboptimal mechanism", "after": null, "start_char_pos": 1686, "end_char_pos": 1732}, {"type": "A", "before": null, "after": ". For the general problem, we prove that it is NP-hard to find a constant-factor approximation", "start_char_pos": 1823, "end_char_pos": 1823}], "sents_char_pos": [0, 218, 331, 465, 539, 619, 710, 815, 870, 908, 960, 1336, 1438, 1616]}
+{"doc_id": "2002.10415", "revision_depth": "1", "before_revision": "This paper studies the identification and estimationproblem in incomplete economic models with testable assumptions. Testable assumptions give strong and interpretable empirical content to the models but they also carry the possibility that our distribution of observed outcome may reject these assumptions. A natural way is to find a set of relaxed assumptions A that cannot be rejected by any reasonable distribution of observed outcome and preserves identified set of parameter of interest . The main contribution of this paper is to characterize the property of such relaxed assumption \\tilde{A} using a generalized definition of refutability and confirmability. \\tilde{A} A general estimation and inference procedure is proposed , and can be applied to most incomplete economic models. As the key application, I study the Imbens and Angrist Monotonicity assumption in potential outcome framework. I give a set of relaxed assumptions \\tilde{A} that can never be rejected and always preserve the identified set of local average treatment effect (LATE ). The LATE is point identified and easy to estimate under \\tilde{A} ", "after_revision": "This paper studies the identification , estimation, and hypothesis testing problem in complete and incomplete economic models with testable assumptions. Testable assumptions (A) give strong and interpretable empirical content to the models but they also carry the possibility that some distribution of observed outcomes may reject these assumptions. A natural way to avoid this is to find a set of relaxed assumptions ( A ) that cannot be rejected by any distribution of observed outcome and the identified set of the parameter of interest is not changed when the original assumption is not rejected . The main contribution of this paper is to characterize the properties of such a relaxed assumption \\tilde{A} using a generalized definition of refutability and confirmability. I also propose a general method to construct such\\tilde{A}. A general estimation and inference procedure is proposed and can be applied to most incomplete economic models. I apply my methodology to the instrument monotonicity assumption in Local Average Treatment Effect (LATE) estimation and to the sector selection assumption in a binary outcome Roy model of employment sector choice. In the LATE application, I use my general method to construct a set of relaxed assumptions \\tilde{A} that can never be rejected , and the identified set of LATE is the same as imposing A when A is not rejected. LATE is point identified under my extension \\tilde{A} in the LATE application. In the binary outcome Roy model, I use my method of incomplete models to relax Roy's sector selection assumption and characterize the identified set of the binary potential outcome as a polyhedron.", "edit_actions": [{"type": "R", "before": "and estimationproblem in", "after": ", estimation, and hypothesis testing problem in complete and", "start_char_pos": 38, "end_char_pos": 62}, {"type": "A", "before": null, "after": "(A)", "start_char_pos": 138, "end_char_pos": 138}, {"type": "R", "before": "our", "after": "some", "start_char_pos": 242, "end_char_pos": 245}, {"type": "R", "before": "outcome", "after": "outcomes", "start_char_pos": 271, "end_char_pos": 278}, {"type": "A", "before": null, "after": "to avoid this", "start_char_pos": 323, "end_char_pos": 323}, {"type": "A", "before": null, "after": "(", "start_char_pos": 364, "end_char_pos": 364}, {"type": "A", "before": null, "after": ")", "start_char_pos": 367, "end_char_pos": 367}, {"type": "D", "before": "reasonable", "after": null, "start_char_pos": 399, "end_char_pos": 409}, {"type": "R", "before": "preserves", "after": "the", "start_char_pos": 447, "end_char_pos": 456}, {"type": "A", "before": null, "after": "the", "start_char_pos": 475, "end_char_pos": 475}, {"type": "A", "before": null, "after": "is not changed when the original assumption is not rejected", "start_char_pos": 498, "end_char_pos": 498}, {"type": "R", "before": "property of such", "after": "properties of such a", "start_char_pos": 560, "end_char_pos": 576}, {"type": "A", "before": null, "after": "I also propose a general method to construct such", "start_char_pos": 673, "end_char_pos": 673}, {"type": "A", "before": null, "after": ".", "start_char_pos": 682, "end_char_pos": 682}, {"type": "D", "before": ",", "after": null, "start_char_pos": 740, "end_char_pos": 741}, {"type": "D", "before": "As the key application, I study the Imbens and Angrist Monotonicity assumption in potential outcome framework.", "after": null, "start_char_pos": 797, "end_char_pos": 907}, {"type": "R", "before": "give", "after": "apply my methodology to the instrument monotonicity assumption in Local Average Treatment Effect (LATE) estimation and to the sector selection assumption in a binary outcome Roy model of employment sector choice. In the LATE application, I use my general method to construct", "start_char_pos": 910, "end_char_pos": 914}, {"type": "R", "before": "and always preserve", "after": ", and", "start_char_pos": 981, "end_char_pos": 1000}, {"type": "D", "before": "local average treatment effect (LATE ). The", "after": null, "start_char_pos": 1023, "end_char_pos": 1066}, {"type": "A", "before": null, "after": "is the same as imposing A when A is not rejected. LATE", "start_char_pos": 1072, "end_char_pos": 1072}, {"type": "R", "before": "and easy to estimate under", "after": "under my extension", "start_char_pos": 1093, "end_char_pos": 1119}, {"type": "A", "before": null, "after": "in the LATE application. In the binary outcome Roy model, I use my method of incomplete models to relax Roy's sector selection assumption and characterize the identified set of the binary potential outcome as a polyhedron.", "start_char_pos": 1130, "end_char_pos": 1130}], "sents_char_pos": [0, 116, 308, 500, 672, 796, 907, 1062]}
+{"doc_id": "2002.10757", "revision_depth": "1", "before_revision": "Event detection (ED), a key subtask of information extraction, aims to recognize instances of specific types of events in text. Recently, graph convolutional networks (GCNs) over dependency trees have been widely used to capture syntactic structure information and get convincing performances in event detection . However, these works ignore the syntactic relation labels on the tree, which convey rich and useful linguistic knowledge for event detection . In this paper, we investigate a novel architecture named Relation-Aware GCN (RA-GCN ), which efficiently exploits syntactic relation labels and models the relation between words specifically. We first propose a relation-aware aggregation module to produce expressive word representation by aggregating syntactically connected words through specific relation . Furthermore, a context-aware relation update module is designed to explicitly update the relation representation between words, and these two modules work in the mutual promotion way. Experimental results on the ACE2005 dataset show that our model achieves a new state-of-the-art performance for event detection .", "after_revision": "Event detection (ED), a key subtask of information extraction, aims to recognize instances of specific event types in text. Previous studies on the task have verified the effectiveness of integrating syntactic dependency into graph convolutional networks . However, these methods usually ignore dependency label information, which conveys rich and useful linguistic knowledge for ED . In this paper, we propose a novel architecture named Edge-Enhanced Graph Convolution Networks (EE-GCN ), which simultaneously exploits syntactic structure and typed dependency label information to perform ED. Specifically, an edge-aware node update module is designed to generate expressive word representations by aggregating syntactically-connected words through specific dependency types . Furthermore, to fully explore clues hidden in dependency edges, a node-aware edge update module is introduced, which refines the relation representations with contextual information. These two modules are complementary to each other and work in a mutual promotion way. We conduct experiments on the widely used ACE2005 dataset and the results show significant improvement over competitive baseline methods .", "edit_actions": [{"type": "R", "before": "types of events", "after": "event types", "start_char_pos": 103, "end_char_pos": 118}, {"type": "R", "before": "Recently,", "after": "Previous studies on the task have verified the effectiveness of integrating syntactic dependency into", "start_char_pos": 128, "end_char_pos": 137}, {"type": "D", "before": "(GCNs) over dependency trees have been widely used to capture syntactic structure information and get convincing performances in event detection", "after": null, "start_char_pos": 167, "end_char_pos": 311}, {"type": "R", "before": "works ignore the syntactic relation labels on the tree, which convey", "after": "methods usually ignore dependency label information, which conveys", "start_char_pos": 329, "end_char_pos": 397}, {"type": "R", "before": "event detection", "after": "ED", "start_char_pos": 439, "end_char_pos": 454}, {"type": "R", "before": "investigate", "after": "propose", "start_char_pos": 475, "end_char_pos": 486}, {"type": "R", "before": "Relation-Aware GCN (RA-GCN", "after": "Edge-Enhanced Graph Convolution Networks (EE-GCN", "start_char_pos": 514, "end_char_pos": 540}, {"type": "R", "before": "efficiently exploits syntactic relation labels and models the relation between words specifically. We first propose a relation-aware aggregation module to produce expressive word representation by aggregating syntactically connected", "after": "simultaneously exploits syntactic structure and typed dependency label information to perform ED. Specifically, an edge-aware node update module is designed to generate expressive word representations by aggregating syntactically-connected", "start_char_pos": 550, "end_char_pos": 782}, {"type": "R", "before": "relation", "after": "dependency types", "start_char_pos": 806, "end_char_pos": 814}, {"type": "R", "before": "a context-aware relation", "after": "to fully explore clues hidden in dependency edges, a node-aware edge", "start_char_pos": 830, "end_char_pos": 854}, {"type": "R", "before": "designed to explicitly update the relation representation between words, and these two modules work in the", "after": "introduced, which refines the relation representations with contextual information. These two modules are complementary to each other and work in a", "start_char_pos": 872, "end_char_pos": 978}, {"type": "R", "before": "Experimental results on the", "after": "We conduct experiments on the widely used", "start_char_pos": 1001, "end_char_pos": 1028}, {"type": "R", "before": "show that our model achieves a new state-of-the-art performance for event detection", "after": "and the results show significant improvement over competitive baseline methods", "start_char_pos": 1045, "end_char_pos": 1128}], "sents_char_pos": [0, 127, 313, 456, 648, 816, 1000]}
+{"doc_id": "2003.00970", "revision_depth": "1", "before_revision": "YouTube recently announced a decision to exclude potentially harmful content from video recommendations while allowing such videos to remain on the platform , but it is unclear whether this compromise is sufficient in mitigating YouTube's role in propagating this content . To assess this impact, we measure YouTube sharing in Twitter and Reddit in the eight months around YouTube's announcement using interrupted time series models. These models evaluate YouTube's impact on sharing of videos from a curated set of alternative political channelsand popular videos shared in three conspiracy-oriented Reddit subreddits; we compare these models to a placebo dataset of makeup-oriented videos that should be unaffected by YouTube's announcement. Results suggest YouTube's de-recommending AIN-produced content has a significant suppressive effect on sharing of AIN videos in both Twitter and Reddit , with our models showing a significant and downward trend in sharing. For conspiracy video sharing , however, we see no significant change in Reddit and find an increase in the level of conspiracy sharing in Twitter. We see no significant effect on makeup sharingin either platform , suggesting YouTube's targeting particular content types has a targeted effect. Reducing exposure to anti-social videos without deleting them therefore has the potential to improve quality across the information ecosystem, but additional transparency is needed to evaluate these effects further.", "after_revision": "In January 2019, YouTube announced it would exclude potentially harmful content from video recommendations but allow such videos to remain on the platform . While this step intends to reduce YouTube's role in propagating such content, continued availability of these videos in other online spaces makes it unclear whether this compromise actually reduces their spread . To assess this impact, we apply interrupted time series models to measure whether different types of YouTube sharing in Twitter and Reddit changed significantly in the eight months around YouTube's announcement . We evaluate video sharing across three curated sets of potentially harmful, anti-social content: a set of conspiracy videos that have been shown to experience reduced recommendations in YouTube, a larger set of videos posted by conspiracy-oriented channels, and a set of videos posted by alternative influence network (AIN) channels. As a control, we also evaluate effects on video sharing in a dataset of videos from mainstream news channels. Results show conspiracy-labeled and AIN videos that have evidence of YouTube's de-recommendation experience a significant decreasing trend in sharing on both Twitter and Reddit . For videos from conspiracy-oriented channels , however, we see no significant effect in Twitter but find a significant increase in the level of conspiracy-channel sharing in Reddit. For mainstream news sharing, we actually see an increase in trend on both platforms , suggesting YouTube's suppressing particular content types has a targeted effect. This work finds evidence that reducing exposure to anti-social videos within YouTube, without deletion, has potential pro-social, cross-platform effects. At the same time, increases in the level of conspiracy-channel sharing raise concerns about content producers' responses to these changes, and platform transparency is needed to evaluate these effects further.", "edit_actions": [{"type": "R", "before": "YouTube recently announced a decision to", "after": "In January 2019, YouTube announced it would", "start_char_pos": 0, "end_char_pos": 40}, {"type": "R", "before": "while allowing", "after": "but allow", "start_char_pos": 104, "end_char_pos": 118}, {"type": "R", "before": ", but it is unclear whether this compromise is sufficient in mitigating", "after": ". While this step intends to reduce", "start_char_pos": 157, "end_char_pos": 228}, {"type": "R", "before": "this content", "after": "such content, continued availability of these videos in other online spaces makes it unclear whether this compromise actually reduces their spread", "start_char_pos": 259, "end_char_pos": 271}, {"type": "R", "before": "measure", "after": "apply interrupted time series models to measure whether different types of", "start_char_pos": 300, "end_char_pos": 307}, {"type": "A", "before": null, "after": "changed significantly", "start_char_pos": 346, "end_char_pos": 346}, {"type": "R", "before": "using interrupted time series models. These models evaluate YouTube's impact on sharing", "after": ". We evaluate video sharing across three curated sets of potentially harmful, anti-social content: a set of conspiracy videos that have been shown to experience reduced recommendations in YouTube, a larger set of videos posted by conspiracy-oriented channels, and a set of videos posted by alternative influence network (AIN) channels. As a control, we also evaluate effects on video sharing in a dataset", "start_char_pos": 397, "end_char_pos": 484}, {"type": "R", "before": "from a curated set of alternative political channelsand popular videos shared in three conspiracy-oriented Reddit subreddits; we compare these models to a placebo dataset of makeup-oriented videos that should be unaffected by YouTube's announcement. Results suggest", "after": "from mainstream news channels. Results show conspiracy-labeled and AIN videos that have evidence of", "start_char_pos": 495, "end_char_pos": 760}, {"type": "R", "before": "de-recommending AIN-produced content has a significant suppressive effect on sharing of AIN videos in", "after": "de-recommendation experience a significant decreasing trend in sharing on", "start_char_pos": 771, "end_char_pos": 872}, {"type": "R", "before": ", with our models showing a significant and downward trend in sharing. For conspiracy video sharing", "after": ". For videos from conspiracy-oriented channels", "start_char_pos": 897, "end_char_pos": 996}, {"type": "R", "before": "change in Reddit and find an", "after": "effect in Twitter but find a significant", "start_char_pos": 1030, "end_char_pos": 1058}, {"type": "R", "before": "conspiracy sharing in Twitter. We see no significant effect on makeup sharingin either platform", "after": "conspiracy-channel sharing in Reddit. For mainstream news sharing, we actually see an increase in trend on both platforms", "start_char_pos": 1084, "end_char_pos": 1179}, {"type": "R", "before": "targeting", "after": "suppressing", "start_char_pos": 1203, "end_char_pos": 1212}, {"type": "R", "before": "Reducing", "after": "This work finds evidence that reducing", "start_char_pos": 1261, "end_char_pos": 1269}, {"type": "R", "before": "without deleting them therefore has the potential to improve quality across the information ecosystem, but additional", "after": "within YouTube, without deletion, has potential pro-social, cross-platform effects. At the same time, increases in the level of conspiracy-channel sharing raise concerns about content producers' responses to these changes, and platform", "start_char_pos": 1301, "end_char_pos": 1418}], "sents_char_pos": [0, 273, 434, 620, 744, 967, 1114, 1260]}
+{"doc_id": "2003.03025", "revision_depth": "1", "before_revision": "An adaptive guidance system that supports equipment operators requires a comprehensive model of task and user behavior that considers different skill and knowledge levels as well as diverse situations. In this study , we investigated the relationships between user behaviors and skill levels under operational conditions. We captured sixty samples of two sewing tasks performed by five operators using a head-mounted RGB-d camera and a static gaze tracker. We examined the operators' gazeand head movements, and hand interactions to essential regions (hotspotson machine surface) to determine behavioral differences among continuous skill improving experiences. We modeled the variety of user behaviors to an extensive task model with a two-step automatic approach, baseline model selection and experience integration. The experimental results indicate that some features, such as task execution time and user head movements, are good indexes for skill level and provide valuable information that can be applied to obtain an effective task model. Operators with varying knowledge and operating habits demonstrate different operational features, which can contribute to the design of user-specific guidance .", "after_revision": "An adaptive guidance system that supports equipment operators requires a comprehensive model of task and user behavior that considers different skill and knowledge levels as well as diverse situations. In the present paper, we introduced a novel method for machine operation modeling aimed to integrate visual operation records provided by users with different skills, knowledge levels, and interpersonal behavior patterns. For this purpose , we investigated the relationships between user behavior patterns that could be visually observed and their skill levels under machine operation conditions. We considered sixty samples of two sewing tasks performed by five operators using a head-mounted RGB-D camera and a static gaze tracker. We examined behavioral features, such as the operator gaze, head movements, and hand interactions with hotspots, and observed significant behavioral changes as a result of continuous skill improvement. We automatically modeled the variety of behaviors of operation tasks with a two-step approach, prototype selection and experiences integration. The experimental results indicated that features, such as duration of task execution and user head movements, could serve as appropriate indices for skill level evaluation, and provide useful information for integrating various records corresponding to different skill levels and behavioral characteristics. Integrating operation records with operating habits allowed developing a rich inclusive task model that could be used to flexibly adapt to various user-specific behavior patterns .", "edit_actions": [{"type": "R", "before": "this study", "after": "the present paper, we introduced a novel method for machine operation modeling aimed to integrate visual operation records provided by users with different skills, knowledge levels, and interpersonal behavior patterns. For this purpose", "start_char_pos": 205, "end_char_pos": 215}, {"type": "R", "before": "behaviors and", "after": "behavior patterns that could be visually observed and their", "start_char_pos": 265, "end_char_pos": 278}, {"type": "R", "before": "operational", "after": "machine operation", "start_char_pos": 298, "end_char_pos": 309}, {"type": "R", "before": "captured", "after": "considered", "start_char_pos": 325, "end_char_pos": 333}, {"type": "R", "before": "RGB-d", "after": "RGB-D", "start_char_pos": 417, "end_char_pos": 422}, {"type": "R", "before": "the operators' gazeand", "after": "behavioral features, such as the operator gaze,", "start_char_pos": 469, "end_char_pos": 491}, {"type": "R", "before": "to essential regions (hotspotson machine surface) to determine behavioral differences among continuous skill improving experiences. We", "after": "with hotspots, and observed significant behavioral changes as a result of continuous skill improvement. We automatically", "start_char_pos": 530, "end_char_pos": 664}, {"type": "R", "before": "user behaviors to an extensive task model", "after": "behaviors of operation tasks", "start_char_pos": 688, "end_char_pos": 729}, {"type": "R", "before": "automatic approach, baseline model selection and experience", "after": "approach, prototype selection and experiences", "start_char_pos": 746, "end_char_pos": 805}, {"type": "R", "before": "indicate that some", "after": "indicated that", "start_char_pos": 844, "end_char_pos": 862}, {"type": "R", "before": "task execution time", "after": "duration of task execution", "start_char_pos": 881, "end_char_pos": 900}, {"type": "R", "before": "are good indexes", "after": "could serve as appropriate indices", "start_char_pos": 926, "end_char_pos": 942}, {"type": "R", "before": "and provide valuable information that can be applied to obtain an effective task model. Operators with varying knowledge and operating habits demonstrate different operational features, which can contribute to the design of", "after": "evaluation, and provide useful information for integrating various records corresponding to different skill levels and behavioral characteristics. Integrating operation records with operating habits allowed developing a rich inclusive task model that could be used to flexibly adapt to various", "start_char_pos": 959, "end_char_pos": 1182}, {"type": "R", "before": "guidance", "after": "behavior patterns", "start_char_pos": 1197, "end_char_pos": 1205}], "sents_char_pos": [0, 201, 321, 456, 661, 818, 1046]}
+{"doc_id": "2003.05113", "revision_depth": "1", "before_revision": "Many proofs of concept blockchain applications built using Hyperledger Fabric, a permissioned blockchain platform, have recently been transformed into production. However, the performance provided by Hyperledger Fabric is of significant concern for enterprises due to steady growth in network usage. Hence, in this paper, we study the performance achieved in a Fabricnetwork using vertical scaling (i.e., by adding more vCPUs) and horizontal scaling (i. e., by adding more nodes) techniques. We observe that network scales very poorly with both of these techniques. With vertical scaling, due to serial execution of validation commit phases of transactions, the allocated vCPUs are underutilized. With horizontal scaling, due to redundant work between nodes , allocated resources are wasted though it is utilized. Further, we identify these techniques to be unsuited for dynamically scaling anetwork quickly to mitigate an overload situation, and hence, it results in a 30\\% drop in the performance. To increase the CPU utilization and hence the performance, we re-architect Fabric to enable pipelined execution of validation & commit phases by introducing dirty state management using a trie data structure. Additionally, we facilitated the validation phase to validate transactions in parallel by introducing a waiting-transactions dependency graph. To avoid redundant work performed between nodes and to quickly scale up a network, we propose a new type of peer node called sparse peer , which selective commits transactions. Overall, we improved the throughput by 3x and reduced the timetaken to scale up a network by 96\\% .", "after_revision": "Permissioned blockchains are becoming popular as data management systems in the enterprise setting. Compared to traditional distributed databases, blockchain platforms provide increased security guarantees but significantly lower performance. Further, these platforms are quite expensive to run for the low throughput they provide. The following are two ways to improve performance and reduce cost: (1) make the system utilize allocated resources efficiently; (2) allow rapid and dynamic scaling of allocated resources based on load. We explore both of these in this work. We first investigate the reasons for the poor performance and scalability of the dominant permissioned blockchain flavor called Execute-Order-Validate (EOV). We do this by studying the scaling characteristics of Hyperledger Fabric, a popular EOV platform, using vertical scaling and horizontal scaling . We find that the transaction throughput scales very poorly with these techniques. At least in the permissioned setting, the real bottleneck is transaction processing, not the consensus protocol. With vertical scaling, the allocated vCPUs go under-utilized. In contrast, with horizontal scaling, the allocated resources get wasted due to redundant work across nodes within URLanization. To mitigate the above concerns, we first improve resource efficiency by (a) improving CPU utilization with a pipelined execution of validation & commit phases ; (b) avoiding redundant work across nodes by introducing a new type of peer node called sparse peer that selectively commits transactions. We further propose a technique that enables the rapid scaling of resources. Our implementation - SmartFabric, built on top of Hyperledger Fabric demonstrates 3x higher throughput, 12-26x faster scale-up time, and provides Fabric's throughput at 50\\% to 87\\% lower cost .", "edit_actions": [{"type": "R", "before": "Many proofs of concept blockchain applications built using Hyperledger Fabric, a permissioned blockchain platform, have recently been transformed into production. However, the performance provided by Hyperledger Fabric is of significant concern for enterprises due to steady growth in network usage. Hence, in this paper, we study the performance achieved in a Fabricnetwork", "after": "Permissioned blockchains are becoming popular as data management systems in the enterprise setting. Compared to traditional distributed databases, blockchain platforms provide increased security guarantees but significantly lower performance. Further, these platforms are quite expensive to run for the low throughput they provide. The following are two ways to improve performance and reduce cost: (1) make the system utilize allocated resources efficiently; (2) allow rapid and dynamic scaling of allocated resources based on load. We explore both of these in this work. We first investigate the reasons for the poor performance and scalability of the dominant permissioned blockchain flavor called Execute-Order-Validate (EOV). We do this by studying the scaling characteristics of Hyperledger Fabric, a popular EOV platform,", "start_char_pos": 0, "end_char_pos": 374}, {"type": "D", "before": "(i.e., by adding more vCPUs)", "after": null, "start_char_pos": 398, "end_char_pos": 426}, {"type": "R", "before": "(i. e., by adding more nodes) techniques. We observe that network", "after": ". We find that the transaction throughput", "start_char_pos": 450, "end_char_pos": 515}, {"type": "D", "before": "both of", "after": null, "start_char_pos": 540, "end_char_pos": 547}, {"type": "A", "before": null, "after": "At least in the permissioned setting, the real bottleneck is transaction processing, not the consensus protocol.", "start_char_pos": 566, "end_char_pos": 566}, {"type": "D", "before": "due to serial execution of validation", "after": null, "start_char_pos": 590, "end_char_pos": 627}, {"type": "D", "before": "commit phases of transactions,", "after": null, "start_char_pos": 628, "end_char_pos": 658}, {"type": "R", "before": "are underutilized. With", "after": "go under-utilized. In contrast, with", "start_char_pos": 679, "end_char_pos": 702}, {"type": "A", "before": null, "after": "the allocated resources get wasted", "start_char_pos": 723, "end_char_pos": 723}, {"type": "R", "before": "between nodes , allocated resources are wasted though it is utilized. Further, we identify these techniques to be unsuited for dynamically scaling anetwork quickly to mitigate an overload situation, and hence, it results in a 30\\% drop in the performance. To increase the CPU utilization and hence the performance, we re-architect Fabric to enable", "after": "across nodes within URLanization. To mitigate the above concerns, we first improve resource efficiency by (a) improving CPU utilization with a", "start_char_pos": 746, "end_char_pos": 1093}, {"type": "R", "before": "by introducing dirty state management using a trie data structure. Additionally, we facilitated the validation phase to validate transactions in parallel by introducing a waiting-transactions dependency graph. To avoid redundant work performed between nodes and to quickly scale up a network, we propose a", "after": "; (b) avoiding redundant work across nodes by introducing a", "start_char_pos": 1144, "end_char_pos": 1449}, {"type": "R", "before": ", which selective", "after": "that selectively", "start_char_pos": 1491, "end_char_pos": 1508}, {"type": "R", "before": "Overall, we improved the throughput by", "after": "We further propose a technique that enables the rapid scaling of resources. Our implementation - SmartFabric, built on top of Hyperledger Fabric demonstrates", "start_char_pos": 1531, "end_char_pos": 1569}, {"type": "R", "before": "and reduced the timetaken to scale up a network by 96\\%", "after": "higher throughput, 12-26x faster scale-up time, and provides Fabric's throughput at 50\\% to 87\\% lower cost", "start_char_pos": 1573, "end_char_pos": 1628}], "sents_char_pos": [0, 162, 299, 491, 565, 697, 815, 1001, 1210, 1353, 1530]}
+{"doc_id": "2003.08149", "revision_depth": "1", "before_revision": "Protein-ligand interaction is one of the fundamental molecular interactions of living systems. Proteins are the building blocks of functions in life at the molecular level. Ligands are small molecules that interact with proteins at specific regions on the surface of proteins called binding sites. Understanding the physicochemical properties of ligand-binding sites is very important in the field of drug discovery as well as understanding biological systems. Protein-ligand binding site plays an essential role in the interaction between protein and ligand that is necessary for any living system to survive. Comparing similarities between binding siteshas been one of the main focus areas since the last decade in bioinformatics and drug discovery . In this regard, several computational methods have been developed to compare binding sites so far. Binding site comparison requires fast and efficient method as the amount of three-dimensional protein structural information is increasing rapidly nowadays . We report in this study, development of Site2Vec , a novel machine learning-based method for reference frame invariant ligand-independent vector embedding of the 3D structure of a protein-ligand binding site. Each binding site is represented in a d-dimensional vector form. The 3D structures of binding sites are mapped to vector form such that similar binding sites hash into proximal localities, and dissimilar sitesfall across diverse regions. A sensitivity analysis of rotation and perturbation and validation study is performed to understand the behavior of the method . Benchmarking exercises have been carried out against state of the art binding site comparison methods on state of the art datasets. The exercises validate our proposed method and demonstrate that the proposed method is rotationally invariant and can handle natural perturbations expected in the biological system.", "after_revision": "Protein-ligand interactions are one of the fundamental types of molecular interactions in living systems. Ligands are small molecules that interact with protein molecules at specific regions on their surfaces called binding sites. Tasks such as assessment of protein functional similarity and detection of side effects of drugs need identification of similar binding sites of disparate proteins across diverse pathways. Machine learning methods for similarity assessment require feature descriptors of binding sites. Traditional methods based on hand engineered motifs and atomic configurations are not scalable across several thousands of sites . In this regard, deep neural network algorithms are now deployed which can capture very complex input feature space. However, one fundamental challenge in applying deep learning to structures of binding sites is the input representation and the reference frame . We report here a novel algorithm Site2Vec that derives reference frame invariant vector embedding of a protein-ligand binding site. The method is based on pairwise distances between representative points and chemical compositions in terms of constituent amino acids of a site. The vector embedding serves as a locality sensitive hash function for proximity queries and determining similar sites. The method has been the top performer with more than 95\\% quality scores in extensive benchmarking studies carried over 10 datasets and against 23 other site comparison methods . The algorithm serves for high throughput processing and has been evaluated for stability with respect to reference frame shifts, coordinate perturbations and residue mutations. We provide Site2Vec as a stand alone executable and a web service hosted at URL", "edit_actions": [{"type": "R", "before": "interaction is", "after": "interactions are", "start_char_pos": 15, "end_char_pos": 29}, {"type": "R", "before": "molecular interactions of", "after": "types of molecular interactions in", "start_char_pos": 53, "end_char_pos": 78}, {"type": "D", "before": "Proteins are the building blocks of functions in life at the molecular level.", "after": null, "start_char_pos": 95, "end_char_pos": 172}, {"type": "R", "before": "proteins", "after": "protein molecules", "start_char_pos": 220, "end_char_pos": 228}, {"type": "R", "before": "the surface of proteins", "after": "their surfaces", "start_char_pos": 252, "end_char_pos": 275}, {"type": "R", "before": "Understanding the physicochemical properties of ligand-binding sites is very important in the field of drug discovery as well as understanding biological systems. Protein-ligand binding site plays an essential role in the interaction between protein and ligand that is necessary for any living system to survive. Comparing similarities between binding siteshas been one of the main focus areas since the last decade in bioinformatics and drug discovery", "after": "Tasks such as assessment of protein functional similarity and detection of side effects of drugs need identification of similar binding sites of disparate proteins across diverse pathways. Machine learning methods for similarity assessment require feature descriptors of binding sites. Traditional methods based on hand engineered motifs and atomic configurations are not scalable across several thousands of sites", "start_char_pos": 298, "end_char_pos": 750}, {"type": "R", "before": "several computational methods have been developed to compare binding sites so far. Binding site comparison requires fast and efficient method as the amount of three-dimensional protein structural information is increasing rapidly nowadays", "after": "deep neural network algorithms are now deployed which can capture very complex input feature space. However, one fundamental challenge in applying deep learning to structures of binding sites is the input representation and the reference frame", "start_char_pos": 769, "end_char_pos": 1007}, {"type": "R", "before": "in this study, development of", "after": "here a novel algorithm", "start_char_pos": 1020, "end_char_pos": 1049}, {"type": "R", "before": ", a novel machine learning-based method for", "after": "that derives", "start_char_pos": 1059, "end_char_pos": 1102}, {"type": "D", "before": "ligand-independent", "after": null, "start_char_pos": 1129, "end_char_pos": 1147}, {"type": "D", "before": "the 3D structure of", "after": null, "start_char_pos": 1168, "end_char_pos": 1187}, {"type": "R", "before": "Each binding site is represented in a d-dimensional vector form. The 3D structures of binding sites are mapped to vector form such that similar binding sites hash into proximal localities, and dissimilar sitesfall across diverse regions. A sensitivity analysis of rotation and perturbation and validation study is performed to understand the behavior of the method . Benchmarking exercises have been carried out against state of the art binding", "after": "The method is based on pairwise distances between representative points and chemical compositions in terms of constituent amino acids of a site. The vector embedding serves as a locality sensitive hash function for proximity queries and determining similar sites. The method has been the top performer with more than 95\\% quality scores in extensive benchmarking studies carried over 10 datasets and against 23 other", "start_char_pos": 1219, "end_char_pos": 1663}, {"type": "R", "before": "on state of the art datasets. The exercises validate our proposed method and demonstrate that the proposed method is rotationally invariant and can handle natural perturbations expected in the biological system.", "after": ". The algorithm serves for high throughput processing and has been evaluated for stability with respect to reference frame shifts, coordinate perturbations and residue mutations. We provide Site2Vec as a stand alone executable and a web service hosted at URL", "start_char_pos": 1688, "end_char_pos": 1899}], "sents_char_pos": [0, 94, 172, 297, 460, 610, 752, 851, 1009, 1218, 1283, 1456, 1585, 1717]}
+{"doc_id": "2003.08150", "revision_depth": "1", "before_revision": "An outbreak of respiratory disease caused by a novel coronavirus is ongoing till December 2019. As of March 16 2020, It has caused an epidemic outbreak with more than 1,79,073 confirmed infections and 7,074 reported deaths worldwide. During the period of an epidemic when human-to-human transmission is established and reported cases of coronavirus disease (COVID ) are rising worldwide, forecasting is of utmost importance for health care planning and control the virus with limited resource . In this study, we propose and analyze a compartmental epidemic model of COVID to predict and control the outbreak. The basic reproduction number and control reproduction number are calculated analytically. A detailed stability analysis of the model is performed to observe the dynamics of the system. We calibrated the proposed model to fit daily data from five provinces of China namely, Hubei, Guangdong, Henan, Zhejiang and Hunan . Our findings suggest that independent self-sustaining human-to-human spread (R_0>1, R_c>1) is already present in all the five provinces . Short-term predictions show that the decreasing trend of new COVID cases is well captured by the model for all the five provinces. However, long term predictions for Hubei reveals that the symptomatic COVID cases will show oscillatory behaviour. Further, we found that effective management of quarantined individuals is more effective than management of isolated individuals to reduce the disease burden. Numerical results show that the modification factor for quarantine, modification factor for isolation and transmission rate are quite effective in reduction of the COVID casesin Hubei. Thus, COVID is controllable by reducing contacts with infected people and increasing the efficiency of quarantine and isolation. Health care officials should supply medications, protective masks and necessary human resources in the affected areas .", "after_revision": "An outbreak of respiratory disease caused by a novel coronavirus is ongoing from December 2019. As of June 30, 2020, it has caused an epidemic outbreak with more than 10 million confirmed infections and above 5 hundred thousand reported deaths worldwide. During this period of an epidemic when human-to-human transmission is established and reported cases of coronavirus disease 2019 (COVID-19 ) are rising worldwide, investigation of control strategies and forecasting are necessary for health care planning . In this study, we propose and analyze a compartmental epidemic model of COVID-19 to predict and control the outbreak. The basic reproduction number and control reproduction number are calculated analytically. A detailed stability analysis of the model is performed to observe the dynamics of the system. We calibrated the proposed model to fit daily data from the United Kingdom (UK) where the situation is still alarming . Our findings suggest that independent self-sustaining human-to-human spread (R_0>1, R_c>1) is already present . Short-term predictions show that the decreasing trend of new COVID-19 cases is well captured by the model . Further, we found that effective management of quarantined individuals is more effective than management of isolated individuals to reduce the disease burden. Thus, if limited resources are available, then investing on the quarantined individuals will be more fruitful in terms of reduction of cases .", "edit_actions": [{"type": "R", "before": "till", "after": "from", "start_char_pos": 76, "end_char_pos": 80}, {"type": "R", "before": "March 16", "after": "June 30,", "start_char_pos": 102, "end_char_pos": 110}, {"type": "R", "before": "It", "after": "it", "start_char_pos": 117, "end_char_pos": 119}, {"type": "R", "before": "1,79,073", "after": "10 million", "start_char_pos": 167, "end_char_pos": 175}, {"type": "R", "before": "7,074", "after": "above 5 hundred thousand", "start_char_pos": 201, "end_char_pos": 206}, {"type": "R", "before": "the", "after": "this", "start_char_pos": 241, "end_char_pos": 244}, {"type": "R", "before": "(COVID", "after": "2019 (COVID-19", "start_char_pos": 357, "end_char_pos": 363}, {"type": "R", "before": "forecasting is of utmost importance", "after": "investigation of control strategies and forecasting are necessary", "start_char_pos": 388, "end_char_pos": 423}, {"type": "D", "before": "and control the virus with limited resource", "after": null, "start_char_pos": 449, "end_char_pos": 492}, {"type": "R", "before": "COVID", "after": "COVID-19", "start_char_pos": 567, "end_char_pos": 572}, {"type": "R", "before": "five provinces of China namely, Hubei, Guangdong, Henan, Zhejiang and Hunan", "after": "the United Kingdom (UK) where the situation is still alarming", "start_char_pos": 852, "end_char_pos": 927}, {"type": "D", "before": "in all the five provinces", "after": null, "start_char_pos": 1040, "end_char_pos": 1065}, {"type": "R", "before": "COVID", "after": "COVID-19", "start_char_pos": 1129, "end_char_pos": 1134}, {"type": "R", "before": "for all the five provinces. However, long term predictions for Hubei reveals that the symptomatic COVID cases will show oscillatory behaviour.", "after": ".", "start_char_pos": 1171, "end_char_pos": 1313}, {"type": "R", "before": "Numerical results show that the modification factor for quarantine, modification factor for isolation and transmission rate are quite effective in reduction of the COVID casesin Hubei. Thus, COVID is controllable by reducing contacts with infected people and increasing the efficiency of quarantine and isolation. Health care officials should supply medications, protective masks and necessary human resources in the affected areas", "after": "Thus, if limited resources are available, then investing on the quarantined individuals will be more fruitful in terms of reduction of cases", "start_char_pos": 1473, "end_char_pos": 1904}], "sents_char_pos": [0, 95, 233, 494, 609, 700, 795, 929, 1067, 1198, 1313, 1472, 1657, 1786]}
+{"doc_id": "2003.08468", "revision_depth": "1", "before_revision": "A graph is fan-crossing free if it admits a drawing in the plane so that each edge can be crossed by independent edges . Then the crossing edges have distinct vertices. In complement, a graph is fan-crossing if each edge can be crossed by edges of a fan. Then the crossing edges are incident to a common vertex . Graphs are k-planar if each edge is crossed by at most k edges, and k-gap-planar if each crossing is assigned to an edge involved in the crossing, so that at most k crossings are assigned to each edge . We use the s-subdivision, path-addition, and node-to-circle expansion operations to show that there are fan-crossing free graphs that are not fan-crossing, k-planar, and k-gap-planar for k >= 1, respectively. A path-addition adds a long path between any two vertices to a graph . An s-subdivision replaces an edge by a path of length s, and a node-to-circle expansion substitutes a vertex by a 3-regular circle, so that each vertex of the circle inherits an edge incident to the original vertex. We introduce universality for an operation and a graph class, so the every graph has an image in the graph class. In particular, we show the fan22 crossing free graphs are universal for 2-subdivision and for node-to-circle 3 expansion . Finally, we show that some graphs have a unique fan-crossing free embedding, that there are maximal fan-crossing free graphs with less edges than the density , and that the recognition problem for fan-crossing free graphs is NP-complete.", "after_revision": "A graph is fan-crossing free if it has a drawing in the plane so that each edge is crossed by independent edges , that is the crossing edges have distinct vertices. On the other hand, it isfan-crossing if the crossing edges have a common vertex , that is they form a fan. Both are prominent examples for beyond-planar graphs. Further well-known beyond-planar classes are the k-planar , k-gap-planar , quasi-planar, and right angle crossing graphs . We use the subdivision, node-to-circle expansion and path-addition operations to distinguish all these graph classes. In particular, we show that the 2-subdivision and the node-to-circle expansion of any graph is fan-crossing free, which does not hold for fan-crossing and k-(gap)-planar graphs, respectively. Thereby, we obtain graphs that are fan-crossing free and neither fan-crossing nor k-(gap)-planar . Finally, we show that some graphs have a unique fan-crossing free embedding, that there are thinned maximal fan-crossing free graphs , and that the recognition problem for fan-crossing free graphs is NP-complete.", "edit_actions": [{"type": "R", "before": "fan-crossing free if it admits", "after": "fan-crossing free", "start_char_pos": 11, "end_char_pos": 41}, {"type": "A", "before": null, "after": "if it has", "start_char_pos": 42, "end_char_pos": 42}, {"type": "R", "before": "can be", "after": "is", "start_char_pos": 84, "end_char_pos": 90}, {"type": "R", "before": ". Then", "after": ", that is", "start_char_pos": 120, "end_char_pos": 126}, {"type": "R", "before": "In complement, a graph is fan-crossing if each edge can be crossed by edges of a fan. Then", "after": "On the other hand, it is", "start_char_pos": 170, "end_char_pos": 260}, {"type": "A", "before": null, "after": "fan-crossing", "start_char_pos": 260, "end_char_pos": 260}, {"type": "A", "before": null, "after": "if", "start_char_pos": 261, "end_char_pos": 261}, {"type": "R", "before": "are incident to", "after": "have", "start_char_pos": 281, "end_char_pos": 296}, {"type": "R", "before": ". Graphs are", "after": ", that is they form a fan. Both are prominent examples for beyond-planar graphs. Further well-known beyond-planar classes are the", "start_char_pos": 313, "end_char_pos": 325}, {"type": "R", "before": "if each edge is crossed by at most k edges, and", "after": ",", "start_char_pos": 335, "end_char_pos": 382}, {"type": "R", "before": "if each crossing is assigned to an edge involved in the crossing, so that at most k crossings are assigned to each edge", "after": ", quasi-planar, and right angle crossing graphs", "start_char_pos": 396, "end_char_pos": 515}, {"type": "R", "before": "s-subdivision, path-addition, and", "after": "subdivision,", "start_char_pos": 529, "end_char_pos": 562}, {"type": "D", "before": "operations to show that there are fan-crossing free graphs that are not fan-crossing, k-planar, and k-gap-planar for k >= 1, respectively. A path-addition adds a long path between any two vertices to a graph . An s-subdivision replaces an edge by a path of length s,", "after": null, "start_char_pos": 588, "end_char_pos": 854}, {"type": "R", "before": "a node-to-circle expansion substitutes a vertex by a 3-regular circle, so that each vertex of the circle inherits an edge incident to the original vertex. We introduce universality for an operation and a graph class, so the every graph has an image in the graph class. In particular, we show the fan22 crossing free graphs are universal for", "after": "path-addition operations to distinguish all these graph classes. In particular, we show that the", "start_char_pos": 859, "end_char_pos": 1199}, {"type": "R", "before": "for", "after": "the", "start_char_pos": 1218, "end_char_pos": 1221}, {"type": "D", "before": "3", "after": null, "start_char_pos": 1237, "end_char_pos": 1238}, {"type": "A", "before": null, "after": "of any graph is fan-crossing free, which does not hold for fan-crossing and k-(gap)-planar graphs, respectively. Thereby, we obtain graphs that are fan-crossing free and neither fan-crossing nor k-(gap)-planar", "start_char_pos": 1249, "end_char_pos": 1249}, {"type": "A", "before": null, "after": "thinned", "start_char_pos": 1344, "end_char_pos": 1344}, {"type": "D", "before": "with less edges than the density", "after": null, "start_char_pos": 1378, "end_char_pos": 1410}], "sents_char_pos": [0, 121, 169, 255, 517, 726, 1013, 1127, 1251]}
+{"doc_id": "2003.09638", "revision_depth": "1", "before_revision": "Graph Convolutional Network (GCN) has shown strong effectiveness in graph learning tasks. However, GCN faces challenges in flexibility due to the fact of requiring the full graph Laplacian available in the training phase. Moreover, with the depth of layers increases, the computational and memory cost of GCN grows explosively on account of the recursive neighborhood expansion , which leads to a limitation in processing large graphs . To tackle these issues, we take advantage of image processing in agility and present Node2Img , a flexible architecture for large-scale graph learning. Node2Img maps the nodes to \"images\" (i.e. grid-like data in Euclidean space) which can be the inputs of Convolutional Neural Network (CNN) . Instead of leveraging the fixed whole network as a batch to train the model, Node2Img supports a more efficacious framework in practice, where the batch size can be set elastically and the data in the same batch can be calculated parallelly. Specifically, by ranking each node's influence through degree, Node2Img selects the most influential first-order as well as second-order neighbors with central node fusion information to construct the grid-like data. For further improving the efficiency of downstream tasks, a simple CNN-based neural network is employed to capture the significant information from the Euclidean grids. Additionally, the attention mechanism is implemented, which enables implicitly specifying the different weights for neighboring nodes with different influences. Extensive experiments on real graphs' transductive and inductive learning tasks demonstrate the superiority of the proposed Node2Img model against the state-of-the-art GCN-based approaches.", "after_revision": "Graph Convolutional Network (GCN) has been widely used in graph learning tasks. However, GCN-based models (GCNs) is an inherently coupled training framework repetitively conducting the complex neighboring aggregation, which leads to the limitation of flexibility in processing large-scale graph. With the depth of layers increases, the computational and memory cost of GCNs grow explosively due to the recursive neighborhood expansion . To tackle these issues, we present Node2Grids , a flexible uncoupled training framework that leverages the independent mapped data for obtaining the embedding . Instead of directly processing the coupled nodes as GCNs, Node2Grids supports a more efficacious method in practice, mapping the coupled graph data into the independent grid-like data which can be fed into the efficient Convolutional Neural Network (CNN). This simple but valid strategy significantly saves memory and computational resource while achieving comparable results with the leading GCN-based models. Specifically, by ranking each node's influence through degree, Node2Grids selects the most influential first-order as well as second-order neighbors with central node fusion information to construct the grid-like data. For further improving the efficiency of downstream tasks, a simple CNN-based neural network is employed to capture the significant information from the mapped grid-like data. Moreover, the grid-level attention mechanism is implemented, which enables implicitly specifying the different weights for neighboring nodes with different influences. In addition to the typical transductive and inductive learning tasks , we also verify our framework on million-scale graphs to demonstrate the superiority of the proposed Node2Grids model against the state-of-the-art GCN-based approaches.", "edit_actions": [{"type": "R", "before": "shown strong effectiveness", "after": "been widely used", "start_char_pos": 38, "end_char_pos": 64}, {"type": "R", "before": "GCN faces challenges in flexibility due to the fact of requiring the full graph Laplacian available in the training phase. Moreover, with", "after": "GCN-based models (GCNs) is an inherently coupled training framework repetitively conducting the complex neighboring aggregation, which leads to the limitation of flexibility in processing large-scale graph. With", "start_char_pos": 99, "end_char_pos": 236}, {"type": "R", "before": "GCN grows explosively on account of", "after": "GCNs grow explosively due to", "start_char_pos": 305, "end_char_pos": 340}, {"type": "D", "before": ", which leads to a limitation in processing large graphs", "after": null, "start_char_pos": 378, "end_char_pos": 434}, {"type": "R", "before": "take advantage of image processing in agility and present Node2Img", "after": "present Node2Grids", "start_char_pos": 464, "end_char_pos": 530}, {"type": "R", "before": "architecture for large-scale graph learning. Node2Img maps the nodes to \"images\" (i.e. grid-like data in Euclidean space) which can be the inputs of Convolutional Neural Network (CNN)", "after": "uncoupled training framework that leverages the independent mapped data for obtaining the embedding", "start_char_pos": 544, "end_char_pos": 727}, {"type": "R", "before": "leveraging the fixed whole network as a batch to train the model, Node2Img", "after": "directly processing the coupled nodes as GCNs, Node2Grids", "start_char_pos": 741, "end_char_pos": 815}, {"type": "R", "before": "framework", "after": "method", "start_char_pos": 844, "end_char_pos": 853}, {"type": "R", "before": "where the batch size can be set elastically and the data in the same batch can be calculated parallelly.", "after": "mapping the coupled graph data into the independent grid-like data which can be fed into the efficient Convolutional Neural Network (CNN). This simple but valid strategy significantly saves memory and computational resource while achieving comparable results with the leading GCN-based models.", "start_char_pos": 867, "end_char_pos": 971}, {"type": "R", "before": "Node2Img", "after": "Node2Grids", "start_char_pos": 1035, "end_char_pos": 1043}, {"type": "R", "before": "Euclidean grids. Additionally, the", "after": "mapped grid-like data. Moreover, the grid-level", "start_char_pos": 1341, "end_char_pos": 1375}, {"type": "R", "before": "Extensive experiments on real graphs'", "after": "In addition to the typical", "start_char_pos": 1519, "end_char_pos": 1556}, {"type": "A", "before": null, "after": ", we also verify our framework on million-scale graphs to", "start_char_pos": 1599, "end_char_pos": 1599}, {"type": "R", "before": "Node2Img", "after": "Node2Grids", "start_char_pos": 1644, "end_char_pos": 1652}], "sents_char_pos": [0, 89, 221, 436, 588, 971, 1188, 1357, 1518]}
+{"doc_id": "2003.09895", "revision_depth": "1", "before_revision": "We introduce a new measure for quantifying the amount of information that the nodes in a network need to learn to jointly solve a graph problem. We show that the local information cost presents a natural lower bound on the communication complexity of distributed algorithms. We demonstrate the application of local information cost by deriving a lower bound on the communication complexity of computing a (2t-1)-spanner that consists of at most O(n^{1+ \\frac{1 + \\epsilon}) edges, where \\epsilon = \\Theta %DIFDELCMD < \\left( {%%% 1 / t^2%DIFDELCMD < } \\right)%%% . Our main result is that any O( \\text{poly (n))-time algorithm must send at least \\tilde\\Omega %DIFDELCMD < \\left(1{t^2} %%% n ^{1+ 1 / 2t } %DIFDELCMD < \\right) %%% bits in the CONGEST model under the KT1 assumption , where each node has knowledge of its neighbors' IDs initially . Previously, only a trivial lower bound of \\tilde \\Omega(n) bits was known for this problem ; in fact, our result is the first nontrivial lower bound on the communication complexity of a sparse subgraph problem under the KT1 assumption . A consequence of our lower bound is that achieving both time- and communication-optimality is impossible when designing spanner algorithms for this setting . In light of the work of King, Kutten, and Thorup (PODC 2015), this shows that computing a minimum spanning tree can be done significantly faster than finding a spanner when considering algorithms with \\tilde O(n) communication complexity. Our result also implies time complexity lower bounds for constructing a spanner in the node-congested clique of Augustine et al. (2019) and in the push-pull gossip model with limited bandwidth.", "after_revision": "We introduce a new measure for quantifying the amount of information that the nodes in a network need to learn to jointly solve a graph problem. We show that the local information cost (LIC) presents a natural lower bound on the communication complexity of distributed algorithms. For the synchronous CONGEST-KT1 model, where each node has initial knowledge of its neighbors' IDs, we prove that \\Omega(LIC_\\gamma(P)/ \\log\\tau \\log n) bits are required for solving a graph problem P with a \\tau-round algorithm that errs with probability at most \\gamma. Our result is the first lower bound that yields a general trade-off between communication and time for graph problems in the CONGEST-KT1 model. We demonstrate how to apply the local information cost by deriving a lower bound on the communication complexity of computing a (2t-1)-spanner that consists of at most O(n^{1+ 1/t + \\epsilon}) edges, where \\epsilon = \\Theta %DIFDELCMD < \\left( {%%% ( 1 / %DIFDELCMD < } \\right)%%% t^2) . Our main result is that any O( poly (n))-time algorithm must send at least \\tilde\\Omega %DIFDELCMD < \\left(1{t^2} %%% ((1/t^2) n ^{1+ 1 / 2t } %DIFDELCMD < \\right) %%% ) bits in the CONGEST model under the KT1 assumption . Previously, only a trivial lower bound of \\tilde \\Omega(n) bits was known for this problem . A consequence of our lower bound is that achieving both time- and communication-optimality is impossible when designing a distributed spanner algorithm . In light of the work of King, Kutten, and Thorup (PODC 2015), this shows that computing a minimum spanning tree can be done significantly faster than finding a spanner when considering algorithms with \\tilde O(n) communication complexity. Our result also implies time complexity lower bounds for constructing a spanner in the node-congested clique of Augustine et al. (2019) and in the push-pull gossip model with limited bandwidth.", "edit_actions": [{"type": "A", "before": null, "after": "(", "start_char_pos": 185, "end_char_pos": 185}, {"type": "A", "before": null, "after": "LIC", "start_char_pos": 185, "end_char_pos": 185}, {"type": "A", "before": null, "after": ")", "start_char_pos": 185, "end_char_pos": 185}, {"type": "R", "before": "We demonstrate the application of", "after": "For the synchronous CONGEST-KT1 model, where each node has initial knowledge of its neighbors' IDs, we prove that \\Omega(", "start_char_pos": 276, "end_char_pos": 309}, {"type": "A", "before": null, "after": "LIC", "start_char_pos": 309, "end_char_pos": 309}, {"type": "A", "before": null, "after": "_\\gamma(P)/ \\log\\tau \\log n) bits are required for solving a graph problem P with a \\tau-round algorithm that errs with probability at most \\gamma. Our result is the first lower bound that yields a general trade-off between communication and time for graph problems in the CONGEST-KT1 model. We demonstrate how to apply the", "start_char_pos": 309, "end_char_pos": 309}, {"type": "R", "before": "\\frac{1", "after": "1/t", "start_char_pos": 454, "end_char_pos": 461}, {"type": "A", "before": null, "after": "(", "start_char_pos": 531, "end_char_pos": 531}, {"type": "D", "before": "t^2", "after": null, "start_char_pos": 536, "end_char_pos": 539}, {"type": "A", "before": null, "after": "t^2)", "start_char_pos": 565, "end_char_pos": 565}, {"type": "R", "before": "\\text{poly", "after": "poly", "start_char_pos": 599, "end_char_pos": 609}, {"type": "R", "before": "n", "after": "((1/t^2) n", "start_char_pos": 692, "end_char_pos": 693}, {"type": "A", "before": null, "after": ")", "start_char_pos": 733, "end_char_pos": 733}, {"type": "D", "before": ", where each node has knowledge of its neighbors' IDs initially", "after": null, "start_char_pos": 785, "end_char_pos": 848}, {"type": "D", "before": "; in fact, our result is the first nontrivial lower bound on the communication complexity of a sparse subgraph problem under the KT1 assumption", "after": null, "start_char_pos": 942, "end_char_pos": 1085}, {"type": "R", "before": "spanner algorithms for this setting", "after": "a distributed spanner algorithm", "start_char_pos": 1208, "end_char_pos": 1243}], "sents_char_pos": [0, 144, 275, 474, 943, 1087, 1245, 1484]}
+{"doc_id": "2003.10069", "revision_depth": "1", "before_revision": "Based on the Kac random walk on the orthogonal group, we present a fast Johnson-Lindenstrauss transform: given a set X of n points in \\mathbb{R^{d} and an error parameter \\epsilon, this is a linear transformation \\Psi: R^{d} }%DIFDELCMD < \\to %%% \\mathbb{R^{O(\\epsilon^{-2}n)} such that \\|\\Psi x\\|_{2} \\in (1- \\epsilon, } 1 +\\epsilon)\\cdot \\|x\\|_{2 for all x\\in X, and such that for each x\\in X, \\Psi x can be computed } ] ] ] in time O(d\\log{d} + \\min\\{d\\log{n, \\epsilon^{-2}\\log^{3}{n}\\log^{3}(\\epsilon^{-1}\\log{n}) \\}) with only a constant amount of memory overhead. In some parameter regimes, our algorithm is best known, and essentially confirms a conjecture of Ailon and Chazelle} ] ] .", "after_revision": "In this work, we analyze dimension reduction algorithms based on the Kac ^{d} and an error parameter \\epsilon, this is a linear transformation \\Psi: R^{d} }%DIFDELCMD < \\to %%% ^{O(\\epsilon^{-2}n)} such that \\|\\Psi x\\|_{2} \\in (1- \\epsilon, } walk and discrete variants. ( 1 for all x\\in X, and such that for each x\\in X, \\Psi x can be computed } ) For n points in \\mathbb{R SODA, 2008], and Bamberger and Krahmer arXiv, 2017]. Our algorithm is memory-optimal, and outperforms existing algorithms in regimes when n is sufficiently large and the distortion parameter is sufficiently small. In particular, this confirms a conjecture of Ailon and Chazelle STOC, 2006] in a stronger form. (2) The same construction gives a simple transform with optimal Restricted Isometry Property (RIP) which can be applied in time O(d\\log{d} , \\epsilon^{-2}\\log^{3}{n}\\log^{3}(\\epsilon^{-1}\\log{n}) \\}) with only a constant amount of memory overhead. In some parameter regimes, our algorithm is best known, and essentially confirms a conjecture of Ailon and Chazelle} ) for essentially the same range of sparsity as in the best-known such transform due to Ailon and Rauhut Discrete Comput. Geom., 2014]. (3) We show that by fixing the angle in the Kac walk to be \\pi/4 throughout, one obtains optimal JL and RIP transforms with almost the same running time, thereby confirming -- up to a \\log\\log{d SIAM J. Sci. Comput., 2010]. Our moment-based analysis of this modification of the Kac walk may also be of independent interest .", "edit_actions": [{"type": "R", "before": "Based", "after": "In this work, we analyze dimension reduction algorithms based", "start_char_pos": 0, "end_char_pos": 5}, {"type": "D", "before": "random walk on the orthogonal group, we present a fast Johnson-Lindenstrauss transform: given a set X of n points in \\mathbb{R", "after": null, "start_char_pos": 17, "end_char_pos": 143}, {"type": "D", "before": "\\mathbb{R", "after": null, "start_char_pos": 247, "end_char_pos": 256}, {"type": "A", "before": null, "after": "walk and discrete variants. (", "start_char_pos": 322, "end_char_pos": 322}, {"type": "D", "before": "+\\epsilon)\\cdot \\|x\\|_{2", "after": null, "start_char_pos": 325, "end_char_pos": 349}, {"type": "A", "before": null, "after": ") For n points in \\mathbb{R", "start_char_pos": 422, "end_char_pos": 422}, {"type": "A", "before": null, "after": "SODA, 2008", "start_char_pos": 423, "end_char_pos": 423}, {"type": "A", "before": null, "after": ", and Bamberger and Krahmer", "start_char_pos": 424, "end_char_pos": 424}, {"type": "A", "before": null, "after": "arXiv, 2017", "start_char_pos": 425, "end_char_pos": 425}, {"type": "A", "before": null, "after": ". Our algorithm is memory-optimal, and outperforms existing algorithms in regimes when n is sufficiently large and the distortion parameter is sufficiently small. In particular, this confirms a conjecture of Ailon and Chazelle", "start_char_pos": 426, "end_char_pos": 426}, {"type": "A", "before": null, "after": "STOC, 2006", "start_char_pos": 427, "end_char_pos": 427}, {"type": "A", "before": null, "after": "in a stronger form. (2) The same construction gives a simple transform with optimal Restricted Isometry Property (RIP) which can be applied", "start_char_pos": 429, "end_char_pos": 429}, {"type": "D", "before": "+ \\min\\{d\\log{n", "after": null, "start_char_pos": 449, "end_char_pos": 464}, {"type": "A", "before": null, "after": ") for essentially the same range of sparsity as in the best-known such transform due to Ailon and Rauhut", "start_char_pos": 690, "end_char_pos": 690}, {"type": "A", "before": null, "after": "Discrete Comput. Geom., 2014", "start_char_pos": 691, "end_char_pos": 691}, {"type": "A", "before": null, "after": ". (3) We show that by fixing the angle in the Kac walk to be \\pi/4 throughout, one obtains optimal JL and RIP transforms with almost the same running time, thereby confirming -- up to a \\log\\log{d", "start_char_pos": 692, "end_char_pos": 692}, {"type": "A", "before": null, "after": "SIAM J. Sci. Comput., 2010", "start_char_pos": 693, "end_char_pos": 693}, {"type": "A", "before": null, "after": ". Our moment-based analysis of this modification of the Kac walk may also be of independent interest", "start_char_pos": 694, "end_char_pos": 694}], "sents_char_pos": [0, 104, 572]}
+{"doc_id": "2003.10532", "revision_depth": "2", "before_revision": "We develop a simple 3-dimensional iterative map model to forecast the global spread of the coronavirus disease. Our model contains only one fitting parameter , which we determine from the data supplied by the world URLanisation for the total number of cases and new cases each day. We find that our model provides a surprisingly good fit to the currently-available data . It predicts that the disease will run its full course over six to seven months , starting from the date on which the world URLanisation provided the first ' Situation report' (21 January 2020 - day 1). The disease may be expected to infect approximately 24 \\% of the global population, i.e. about 1.83 billion people, taking approximately 86 million lives. Unless drastic new interventions become possible , the global number of new cases is predicted to peak on day 129 (about the middle of May 2020), with an estimated 65 million new cases per day. Since our simple model fits the available global data so well, we suggest that the measures being taken so far to contain the pandemic may be ineffective in curbing the global spread of the virus . As such, the efficacy of these measures should be more carefully weighed against their impact on the world economy.", "after_revision": "We develop a simple 3-dimensional iterative map model to forecast the global spread of the coronavirus disease. Our model contains at most two fitting parameters , which we determine from the data supplied by the world URLanisation for the total number of cases and new cases each day. We find that our model provides a surprisingly good fit to the currently-available data , which exhibits a cross-over from exponential to power-law growth, as lock-down measures begin to take effect. Before these measures, our model predicts exponential growth from day 30 to 69 , starting from the date on which the world URLanisation provided the first ` Situation report' (21 January 2020 - day 1). Based on this initial data the disease may be expected to infect approximately 23 \\% of the global population, i.e. about 1.76 billion people, taking approximately 83 million lives. Under this scenario , the global number of new cases is predicted to peak on day 133 (about the middle of May 2020), with an estimated 60 million new cases per day. If current lock-down measures can be maintained, our model predicts power law growth from day 69 onward. Such growth is comparatively slow and would have to continue for several decades before a sufficient number of people (at least 23\\% of the global population) have developed immunity to the disease through being infected. Lock-down measures appear to be very effective in postponing the unimaginably large peak in the daily number of new cases that would occur in the absence of any interventions. However, should these measure be relaxed, the spread of the disease will most likely revert back to its original exponential growth pattern . As such, the duration and severity of the lock-down measures should be carefully timed against their potentially devastating impact on the world economy.", "edit_actions": [{"type": "R", "before": "only one fitting parameter", "after": "at most two fitting parameters", "start_char_pos": 131, "end_char_pos": 157}, {"type": "R", "before": ". It predicts that the disease will run its full course over six to seven months", "after": ", which exhibits a cross-over from exponential to power-law growth, as lock-down measures begin to take effect. Before these measures, our model predicts exponential growth from day 30 to 69", "start_char_pos": 370, "end_char_pos": 450}, {"type": "R", "before": "'", "after": "`", "start_char_pos": 527, "end_char_pos": 528}, {"type": "R", "before": "The", "after": "Based on this initial data the", "start_char_pos": 574, "end_char_pos": 577}, {"type": "R", "before": "24", "after": "23", "start_char_pos": 626, "end_char_pos": 628}, {"type": "R", "before": "1.83", "after": "1.76", "start_char_pos": 669, "end_char_pos": 673}, {"type": "R", "before": "86", "after": "83", "start_char_pos": 711, "end_char_pos": 713}, {"type": "R", "before": "Unless drastic new interventions become possible", "after": "Under this scenario", "start_char_pos": 729, "end_char_pos": 777}, {"type": "R", "before": "129", "after": "133", "start_char_pos": 839, "end_char_pos": 842}, {"type": "R", "before": "65", "after": "60", "start_char_pos": 893, "end_char_pos": 895}, {"type": "R", "before": "Since our simple model fits the available global data so well, we suggest that the measures being taken so far to contain the pandemic may be ineffective in curbing the", "after": "If current lock-down measures can be maintained, our model predicts power law growth from day 69 onward. Such growth is comparatively slow and would have to continue for several decades before a sufficient number of people (at least 23\\% of the", "start_char_pos": 923, "end_char_pos": 1091}, {"type": "A", "before": null, "after": "population) have developed immunity to the disease through being infected. Lock-down measures appear to be very effective in postponing the unimaginably large peak in the daily number of new cases that would occur in the absence of any interventions. However, should these measure be relaxed, the", "start_char_pos": 1099, "end_char_pos": 1099}, {"type": "R", "before": "virus", "after": "disease will most likely revert back to its original exponential growth pattern", "start_char_pos": 1114, "end_char_pos": 1119}, {"type": "R", "before": "efficacy of these", "after": "duration and severity of the lock-down", "start_char_pos": 1135, "end_char_pos": 1152}, {"type": "R", "before": "more carefully weighed against their", "after": "carefully timed against their potentially devastating", "start_char_pos": 1172, "end_char_pos": 1208}], "sents_char_pos": [0, 111, 281, 371, 573, 728, 922, 1121]}
+{"doc_id": "2003.13557", "revision_depth": "1", "before_revision": "Given a finite point set P in general position in the plane, a full triangulation is a maximal straight-line embedded plane graph on P. A partial triangulation on P is a full triangulation of some subset P' of P containing all extreme points in P. A bistellar flip on a partial triangulation either flips an edge , removes a non-extreme point of degree 3, or adds a point in P \\setminus P' as vertex of degree 3. The bistellar flip graph has all partial triangulations as vertices ; a pair of partial triangulations is adjacent if they can be obtained from one another by a bistellar flip. The goal of this paper is to investigate the structure of this graph , with emphasis on connectivity. For sets P of n points in general position, we show that the bistellar flip graph is ( n-3 )-connected, answering, for sets in general position, an open questions raised in a book (by De Loera, Rambau, and Santos) and a survey (by Lee and Santos). This matches the situation for regular triangulations ( partial triangulations obtained by lifting the points and projecting the lower convex hull ), where (n-3)-connectivity has been known since the 1980s via the secondary polytope ( Gelfand, Kapranov , Zelevinsky ) and Balinski's Theorem. Our methods yield further results for regular triangulations. Among others, we show that there are arbitrarily large sets P with non-regular partial triangulations, while every proper subset has only regular triangulations, i.e., there are no small certificates for the existence of non-regular partial triangulations (answering a question by F. Santos in the unexpected direction) .", "after_revision": "Given a finite point set P in general position in the plane, a full triangulation is a maximal straight-line embedded plane graph on P. A partial triangulation is a full triangulation of some subset P' of P containing all extreme points in P. A bistellar flip on a partial triangulation flips an edge (an edge flip) , removes a non-extreme point of degree 3, or adds a point in P \\ P' as vertex of degree 3. The bistellar flip graph has all partial triangulations as vertices , and a pair of partial triangulations is adjacent if they can be obtained from one another by a bistellar flip. The edge flip graph is defined with full triangulations as vertices, and edge flips determining the adjacencies. Lawson showed in the early 70s that these graphs are connected. Our goal is to investigate these graphs , with emphasis on vertex connectivity. For sets of n points in the plane in general position, we show that the edge flip graph is ( n/2-2 )-connected, and the bistellar flip graph is (n-3)-connected; both results are tight. The latter bound matches the situation for the subfamily of regular triangulations, ie. partial triangulations obtained by lifting the points to 3-space and projecting back the lower convex hull . Here (n-3)-connectivity has been known since the late 80s via the secondary polytope due to Gelfand, Kapranov Zelevinsky and Balinski's Theorem. For the edge flip-graphs, the vertex connectivity can be shown to be at least as large as (and hence equal to) the minimum degree, provided n is large enough. Our methods yield several other results .", "edit_actions": [{"type": "D", "before": "on P", "after": null, "start_char_pos": 160, "end_char_pos": 164}, {"type": "D", "before": "either", "after": null, "start_char_pos": 292, "end_char_pos": 298}, {"type": "A", "before": null, "after": "(an edge flip)", "start_char_pos": 313, "end_char_pos": 313}, {"type": "R", "before": "\\setminus", "after": "\\", "start_char_pos": 378, "end_char_pos": 387}, {"type": "R", "before": ";", "after": ", and", "start_char_pos": 482, "end_char_pos": 483}, {"type": "R", "before": "goal of this paper", "after": "edge flip graph is defined with full triangulations as vertices, and edge flips determining the adjacencies. Lawson showed in the early 70s that these graphs are connected. Our goal", "start_char_pos": 595, "end_char_pos": 613}, {"type": "R", "before": "the structure of this graph", "after": "these graphs", "start_char_pos": 632, "end_char_pos": 659}, {"type": "A", "before": null, "after": "vertex", "start_char_pos": 679, "end_char_pos": 679}, {"type": "D", "before": "P", "after": null, "start_char_pos": 703, "end_char_pos": 704}, {"type": "A", "before": null, "after": "the plane in", "start_char_pos": 720, "end_char_pos": 720}, {"type": "R", "before": "bistellar", "after": "edge", "start_char_pos": 756, "end_char_pos": 765}, {"type": "R", "before": "n-3", "after": "n/2-2", "start_char_pos": 782, "end_char_pos": 785}, {"type": "R", "before": "answering, for sets in general position, an open questions raised in a book (by De Loera, Rambau, and Santos) and a survey (by Lee and Santos). This", "after": "and the bistellar flip graph is (n-3)-connected; both results are tight. The latter bound", "start_char_pos": 799, "end_char_pos": 947}, {"type": "R", "before": "regular triangulations (", "after": "the subfamily of regular triangulations, ie.", "start_char_pos": 974, "end_char_pos": 998}, {"type": "R", "before": "and projecting", "after": "to 3-space and projecting back", "start_char_pos": 1053, "end_char_pos": 1067}, {"type": "R", "before": "), where", "after": ". Here", "start_char_pos": 1090, "end_char_pos": 1098}, {"type": "R", "before": "1980s", "after": "late 80s", "start_char_pos": 1143, "end_char_pos": 1148}, {"type": "R", "before": "(", "after": "due to", "start_char_pos": 1176, "end_char_pos": 1177}, {"type": "R", "before": ", Zelevinsky )", "after": "Zelevinsky", "start_char_pos": 1196, "end_char_pos": 1210}, {"type": "R", "before": "Our methods yield further results for regular triangulations. Among others, we show that there are arbitrarily large sets P with non-regular partial triangulations, while every proper subset has only regular triangulations, i.e., there are no small certificates for the existence of non-regular partial triangulations (answering a question by F. Santos in the unexpected direction)", "after": "For the edge flip-graphs, the vertex connectivity can be shown to be at least as large as (and hence equal to) the minimum degree, provided n is large enough. Our methods yield several other results", "start_char_pos": 1235, "end_char_pos": 1616}], "sents_char_pos": [0, 135, 247, 413, 483, 590, 693, 942, 1234, 1296]}
+{"doc_id": "2004.00351", "revision_depth": "1", "before_revision": "RNA function crucially depends on its structure. Thermodynamic models that are used for secondary structure prediction report a large number of structures in a limited energy range, often failing in identifying the correct native structure unless complemented by auxiliary experimental data. In this work we build an automatically trainable model that is based on a combination of thermodynamic parameters, chemical probing data ( Selective 2^\\prime Hydroxyl Acylation analyzed via Primer Extension , SHAPE), and co-evolutionary data (Direct Coupling Analysis, DCA) . Perturbations are trained on a suitable set of systems for which the native structure is known . A convolutional window is used to include neighboring reactivities in the SHAPE nodes of the network, and regularization terms limit overfitting improving transferability. The most transferable model is chosen with a cross-validation strategy that allows to automatically optimize the relative importance of heterogenous input datasets. The model architecture enlightens the structural information content of SHAPE reactivities and their dependence on local conformational ensembles. By using the selected model , we obtain enhanced populations for reference native structures and more sensitive and precise predicted structures in an independent validation set not seen during training . The flexibility of the approach allows the model to be easily retrained and adapted to incorporate arbitrary experimental information.", "after_revision": "RNA function crucially depends on its structure. Thermodynamic models currently used for secondary structure prediction rely on computing the partition function of folding ensembles, and can thus estimate minimum free-energy structures and ensemble populations. These models sometimes fail in identifying native structures unless complemented by auxiliary experimental data. Here, we build a set of models that combine thermodynamic parameters, chemical probing data ( DMS , SHAPE), and co-evolutionary data (Direct Coupling Analysis, DCA) through a network that outputs perturbations to the ensemble free energy . Perturbations are trained to increase the ensemble populations of a representative set of known native RNA structures. In the chemical probing nodes of the network, a convolutional window combines neighboring reactivities, enlightening their structural information content and the contribution of local conformational ensembles. Regularization is used to limit overfitting and improve transferability. The most transferable model is selected through a cross-validation strategy that estimates the performance of models on systems on which they are not trained. With the selected model we obtain increased ensemble populations for native structures and more accurate predictions in an independent validation set . The flexibility of the approach allows the model to be easily retrained and adapted to incorporate arbitrary experimental information.", "edit_actions": [{"type": "R", "before": "that are", "after": "currently", "start_char_pos": 70, "end_char_pos": 78}, {"type": "R", "before": "report a large number of", "after": "rely on computing the partition function of folding ensembles, and can thus estimate minimum free-energy structures and ensemble populations. These models sometimes fail in identifying native", "start_char_pos": 119, "end_char_pos": 143}, {"type": "D", "before": "in a limited energy range, often failing in identifying the correct native structure", "after": null, "start_char_pos": 155, "end_char_pos": 239}, {"type": "R", "before": "In this work we build an automatically trainable model that is based on a combination of", "after": "Here, we build a set of models that combine", "start_char_pos": 292, "end_char_pos": 380}, {"type": "R", "before": "Selective 2^\\prime Hydroxyl Acylation analyzed via Primer Extension", "after": "DMS", "start_char_pos": 431, "end_char_pos": 498}, {"type": "A", "before": null, "after": "through a network that outputs perturbations to the ensemble free energy", "start_char_pos": 566, "end_char_pos": 566}, {"type": "R", "before": "on a suitable set of systems for which the native structure is known . A convolutional window is used to include neighboring reactivities in the SHAPE", "after": "to increase the ensemble populations of a representative set of known native RNA structures. In the chemical probing", "start_char_pos": 595, "end_char_pos": 745}, {"type": "R", "before": "and regularization terms limit overfitting improving", "after": "a convolutional window combines neighboring reactivities, enlightening their structural information content and the contribution of local conformational ensembles. Regularization is used to limit overfitting and improve", "start_char_pos": 768, "end_char_pos": 820}, {"type": "R", "before": "chosen with", "after": "selected through", "start_char_pos": 869, "end_char_pos": 880}, {"type": "R", "before": "allows to automatically optimize the relative importance of heterogenous input datasets. The model architecture enlightens the structural information content of SHAPE reactivities and their dependence on local conformational ensembles. By using", "after": "estimates the performance of models on systems on which they are not trained. With", "start_char_pos": 914, "end_char_pos": 1158}, {"type": "R", "before": ", we obtain enhanced populations for reference", "after": "we obtain increased ensemble populations for", "start_char_pos": 1178, "end_char_pos": 1224}, {"type": "R", "before": "sensitive and precise predicted structures", "after": "accurate predictions", "start_char_pos": 1252, "end_char_pos": 1294}, {"type": "D", "before": "not seen during training", "after": null, "start_char_pos": 1328, "end_char_pos": 1352}], "sents_char_pos": [0, 48, 291, 565, 837, 1002, 1149, 1354]}
+{"doc_id": "2004.00876", "revision_depth": "1", "before_revision": "Mean field models are a popular tool used to analyse load balancing policies. In some exceptional cases the response time distribution of the mean field limit has an explicit form. In most cases it can be computed using either a recursion or a differential equation (for exponential job sizes with mean one). In this paper we study the value of the mean response time E[ R _\\lambda] as the arrival rate \\lambda approaches 1 (i.e. the system gets close to instability). As E[ R _\\lambda] diverges to infinity, we scale with -\\log(1-\\lambda) and present a method to compute the limit \\lambda\\rightarrow 1^--E[ R _\\lambda]/\\log(1-\\lambda). This limit has been previously determined for SQ(d) and LL(d), two well-known policies that assign an incoming job to a server with either the shortest queue or least work left among d randomly selected servers. However, the derivation of the result for SQ(d) relied on the closed form representation of the mean response time and does not seem to generalize well, moreover the proof for LL(d) is incomplete. In contrast, we present a general result that holds for any policy for which the associated recursion or differential equation satisfies a list of criteria. For SQ(d) and LL(d) these criteria are trivially verified. We apply our method to SQ(d,K) resp LL(d,K) with exponential job sizes of mean one. For these policies, jobs arrive in batches of size K and join the K servers with the shortest queue resp least amount of work left. For SQ(d ,K) we obtain \\frac{1{\\log(d/K)} as limiting value, while for LL(d,K) we find the limit to be } equal to \\frac{K}{d-K}. We further analyse a policy where SQ(d_i) resp LL(d_i) is used with probability p_i . For the shortest queue variant, we obtain the limit \\frac{1{\\log\\left(\\sum_{i=1}^np_id_i\\right)}, while for the least loaded variant, we obtain \\frac{1}{\\sum_{i=1}^np_id_i-1}.} {\\sum_ip_id_i-1}. We further indicate that our main result can also be used for load balancers with redundancy or memory. In addition, we propose an alternate scaling -\\log(p_\\lambda) instead of -\\log(1-\\lambda), for which the limit \\lim_{\\lambda\\rightarrow 0^+}-E}[ -E}[ \\log(1-\\lambda) / \\log(p_\\lambda)=1.}", "after_revision": "Mean field models are a popular tool used to analyse load balancing policies. In some cases the waiting time distribution of the mean field limit has an explicit form. In other cases it can be computed as the solution of a set of differential equations. Here we study the limit of the mean waiting time E[ W _\\lambda] as the arrival rate \\lambda approaches 1 for a number of load balancing policies when job sizes are exponential with mean 1 (i.e. the system gets close to instability). As E[ W _\\lambda] diverges to infinity, we scale with -\\log(1-\\lambda) and present a method to compute the limit \\lambda\\rightarrow 1^--E[ W _\\lambda]/\\log(1-\\lambda). This limit has a surprisingly simple form for the load balancing algorithms considered. We present a general result that holds for any policy for which the associated differential equation satisfies a list of assumptions. For the LL(d) policy which assigns an incoming job to a server with the least work left among d randomly selected servers these assumptions are trivially verified. For this policy we prove the limit is given by \\frac{1 LL(d,K) {\\log(d/K)} as limiting value, while for LL(d,K) we find the limit to be } policy, which assigns batches of K jobs to the K least loaded servers among d randomly selected servers, satisfies the assumptions and the limit is equal to \\frac{K}{d-K}. For a policy which applies LL(d_i) with probability p_i {\\log\\left(\\sum_{i=1}^np_id_i\\right)}, while for the least loaded variant, we obtain \\frac{1}{\\sum_{i=1}^np_id_i-1}.} , we show that the limit is given by \\frac{1{\\sum_ip_id_i-1}. We further indicate that our main result can also be used for load balancers with redundancy or memory. In addition, we propose an alternate scaling -\\log(p_\\lambda) instead of -\\log(1-\\lambda), for which the limit \\lim_{\\lambda\\rightarrow 0^+}-E}[W_\\lambda /\\log(p_\\lambda) is well defined and non-zero (contrary to \\lim_{\\lambda\\rightarrow 0^+-E}[W_\\lambda /\\log(1-\\lambda)), while \\lim_{\\lambda\\rightarrow 1^-\\log(1-\\lambda) / \\log(p_\\lambda)=1.}", "edit_actions": [{"type": "R", "before": "exceptional cases the response", "after": "cases the waiting", "start_char_pos": 86, "end_char_pos": 116}, {"type": "R", "before": "most", "after": "other", "start_char_pos": 184, "end_char_pos": 188}, {"type": "R", "before": "using either a recursion or a differential equation (for exponential job sizes with mean one). In this paper", "after": "as the solution of a set of differential equations. Here", "start_char_pos": 214, "end_char_pos": 322}, {"type": "R", "before": "value", "after": "limit", "start_char_pos": 336, "end_char_pos": 341}, {"type": "R", "before": "response", "after": "waiting", "start_char_pos": 354, "end_char_pos": 362}, {"type": "R", "before": "R", "after": "W", "start_char_pos": 371, "end_char_pos": 372}, {"type": "A", "before": null, "after": "for a number of load balancing policies when job sizes are exponential with mean 1", "start_char_pos": 424, "end_char_pos": 424}, {"type": "R", "before": "R", "after": "W", "start_char_pos": 476, "end_char_pos": 477}, {"type": "R", "before": "R", "after": "W", "start_char_pos": 609, "end_char_pos": 610}, {"type": "R", "before": "been previously determined for SQ(d) and LL(d), two well-known policies that assign an incoming job to a server with either the shortest queue or least work left among d randomly selected servers. However, the derivation of the result for SQ(d) relied on the closed form representation of the mean response time and does not seem to generalize well, moreover the proof for LL(d) is incomplete. In contrast, we", "after": "a surprisingly simple form for the load balancing algorithms considered. We", "start_char_pos": 653, "end_char_pos": 1062}, {"type": "D", "before": "recursion or", "after": null, "start_char_pos": 1139, "end_char_pos": 1151}, {"type": "R", "before": "criteria. For SQ(d) and", "after": "assumptions. For the", "start_char_pos": 1194, "end_char_pos": 1217}, {"type": "R", "before": "these criteria", "after": "policy which assigns an incoming job to a server with the least work left among d randomly selected servers these assumptions", "start_char_pos": 1224, "end_char_pos": 1238}, {"type": "R", "before": "We apply our method to SQ(d,K) resp", "after": "For this policy we prove the limit is given by \\frac{1", "start_char_pos": 1263, "end_char_pos": 1298}, {"type": "D", "before": "with exponential job sizes of mean one. For these policies, jobs arrive in batches of size K and join the K servers with the shortest queue resp least amount of work left. For SQ(d ,K) we obtain \\frac{1", "after": null, "start_char_pos": 1307, "end_char_pos": 1509}, {"type": "A", "before": null, "after": "policy, which assigns batches of K jobs to the K least loaded servers among d randomly selected servers, satisfies the assumptions and the limit is", "start_char_pos": 1584, "end_char_pos": 1584}, {"type": "R", "before": "We further analyse a policy where SQ(d_i) resp", "after": "For a policy which applies", "start_char_pos": 1609, "end_char_pos": 1655}, {"type": "D", "before": "is used", "after": null, "start_char_pos": 1664, "end_char_pos": 1671}, {"type": "D", "before": ". For the shortest queue variant, we obtain the limit \\frac{1", "after": null, "start_char_pos": 1693, "end_char_pos": 1754}, {"type": "A", "before": null, "after": ", we show that the limit is given by \\frac{1", "start_char_pos": 1872, "end_char_pos": 1872}, {"type": "A", "before": null, "after": "W_\\lambda", "start_char_pos": 2138, "end_char_pos": 2138}, {"type": "A", "before": null, "after": "/\\log(p_\\lambda) is well defined and non-zero (contrary to \\lim_{\\lambda\\rightarrow 0^+", "start_char_pos": 2139, "end_char_pos": 2139}, {"type": "A", "before": null, "after": "W_\\lambda", "start_char_pos": 2143, "end_char_pos": 2143}, {"type": "A", "before": null, "after": "/\\log(1-\\lambda)), while \\lim_{\\lambda\\rightarrow 1^-", "start_char_pos": 2144, "end_char_pos": 2144}], "sents_char_pos": [0, 77, 180, 308, 469, 637, 849, 1046, 1203, 1262, 1346, 1478, 1608, 1889, 1993]}
+{"doc_id": "2004.01120", "revision_depth": "2", "before_revision": "A compressed index is a data structure representing a text within compressed space and supporting fast count and locate queries: count/return all positions where a pattern occurs. The first compressed indexes operate within a space bounded by the text's entropy. Entropy, however, is insensitive to long repetitions. For this reason, in recent years more powerful compressed indexes have emerged; these are based on the Lempel-Ziv factorization, the run-length BWT, context-free grammars and, more recently, string attractors. Labeled trees add a whole new dimension to the problem: one needs not only to compress the labels, but also the tree 's topology. On this side, less is known. Jacobson showed how to represent the topology of a tree with n nodes in 2n+o(n) bits of space (succinct) while also supporting constant-time navigation queries. Ferragina et al. presented the first entropy-compressed labeled tree representation (the XBWT) able to count, but not locate , paths labeled with a given pattern. Grammars and the Lempel-Ziv factorization have been extended to trees, but those representations do not support indexing queries. In this paper, we show for the first time how to support the powerful locate queries on compressed trees. We start by proposing suitable generalizations of [ run-length BWT , high-order entropy, and string attractors to cardinal trees (tries) . We show that the number r \\leq n of XBWT-runs upper-bounds the size of the smallest tree attractor and lower-bounds the trie's high-order worst-case entropyH. We finally present the first trie index able to locate in pre-order nodes reached by a path labeled with a given pattern. Our index locates path occurrences in constant time each and takes 2n + o(n) + O(r log n) \\leq 2n + o(n) + O(H log n) bitsof space: the reporting timeis optimal and the locate machinery fits within compressed space on top of the succinct topology .", "after_revision": "In this paper, we consider the problem of compressing a trie while supporting the powerfullocate queries: to return the pre-order identifiers of all nodes reached by a path labeled with a given query pattern. Our result builds on top of the XBWT tree transform of Ferragina et al. FOCS 2005 and generalizes ther-index locate machinery of Gagie et al.[SODA 2018, JACM 2020 based on the run-length encoded Burrows-Wheeler transform (BWT). Our first contribution is to propose a suitable generalization of the run-length BWT to tries . We show that this natural generalization enjoys several of the useful properties of its counterpart on strings: in particular, the transform natively supports counting occurrences of a query pattern on the trie's paths and its size r captures the trie's repetitiveness and lower-bounds a natural notion of trie entropy. Our main contribution is a much deeper insight into the combinatorial structure of this object. In detail, we show that a data structure of O(r \\log n) + 2n + o(n) bits, where n is the number of nodes, allows locating the occ occurrences of a pattern of length m in nearly-optimal O(m\\log\\sigma + occ) time, where \\sigma is the alphabet's size. Our solution consists in sampling O(r) nodes that can be used as \"anchor points\" during the locate process. Once obtained the pre-order identifier of the first pattern occurrence (in co-lexicographic order), we show that a constant number of constant-time jumps between those anchor points lead to the identifier of the next pattern occurrence, thus enabling locating in optimal O(1) time per occurrence .", "edit_actions": [{"type": "R", "before": "A compressed index is a data structure representing a text within compressed space and supporting fast count and locate queries: count/return all positions where a pattern occurs. The first compressed indexes operate within a space bounded by the text's entropy. Entropy, however, is insensitive to long repetitions. For this reason, in recent years more powerful compressed indexes have emerged; these are based on", "after": "In this paper, we consider the problem of compressing a trie while supporting the powerful", "start_char_pos": 0, "end_char_pos": 415}, {"type": "A", "before": null, "after": "locate", "start_char_pos": 415, "end_char_pos": 415}, {"type": "A", "before": null, "after": "queries: to return", "start_char_pos": 416, "end_char_pos": 416}, {"type": "R", "before": "Lempel-Ziv factorization, the run-length BWT, context-free grammars and, more recently, string attractors. Labeled trees add a whole new dimension to the problem: one needs not only to compress the labels, but also the tree 's topology. On this side, less is known. Jacobson showed how to represent the topology of a tree with n nodes in 2n+o(n) bits of space (succinct) while also supporting constant-time navigation queries.", "after": "pre-order identifiers of all nodes reached by a path labeled with a given query pattern. Our result builds on top of the XBWT tree transform of", "start_char_pos": 421, "end_char_pos": 847}, {"type": "R", "before": "presented the first entropy-compressed labeled tree representation (the XBWT) able to count, but not locate , paths labeled with a given pattern. Grammars and the Lempel-Ziv factorization have been extended to trees, but those representations do not support indexing queries. In this paper, we show for the first time how to support the powerful locate queries on compressed trees. We start by proposing suitable generalizations of", "after": "FOCS 2005", "start_char_pos": 865, "end_char_pos": 1296}, {"type": "A", "before": null, "after": "and generalizes the", "start_char_pos": 1297, "end_char_pos": 1297}, {"type": "A", "before": null, "after": "r-index", "start_char_pos": 1297, "end_char_pos": 1297}, {"type": "A", "before": null, "after": "locate machinery of Gagie et al.", "start_char_pos": 1298, "end_char_pos": 1298}, {"type": "A", "before": null, "after": "SODA 2018, JACM 2020", "start_char_pos": 1299, "end_char_pos": 1299}, {"type": "A", "before": null, "after": "based on the", "start_char_pos": 1300, "end_char_pos": 1300}, {"type": "A", "before": null, "after": "encoded Burrows-Wheeler transform (BWT). Our first contribution is to propose a suitable generalization of the run-length", "start_char_pos": 1312, "end_char_pos": 1312}, {"type": "R", "before": ", high-order entropy, and string attractors to cardinal trees (tries)", "after": "to tries", "start_char_pos": 1317, "end_char_pos": 1386}, {"type": "A", "before": null, "after": "this natural generalization enjoys several of the useful properties of its counterpart on strings: in particular, the transform natively supports counting occurrences of a query pattern on the trie's paths and its size r captures", "start_char_pos": 1402, "end_char_pos": 1402}, {"type": "D", "before": "number r \\leq n of XBWT-runs upper-bounds the size of the smallest tree attractor and lower-bounds the", "after": null, "start_char_pos": 1407, "end_char_pos": 1509}, {"type": "R", "before": "high-order worst-case entropyH. We finally present the first trie index able to locate in pre-order nodes reached by a path labeled with a given pattern. Our index locates path occurrences in constant time each and takes 2n + o(n) +", "after": "repetitiveness and lower-bounds a natural notion of trie entropy. Our main contribution is a much deeper insight into the combinatorial structure of this object. In detail, we show that a data structure of", "start_char_pos": 1517, "end_char_pos": 1749}, {"type": "R", "before": "log n) \\leq", "after": "\\log n) +", "start_char_pos": 1754, "end_char_pos": 1765}, {"type": "A", "before": null, "after": "bits, where n is the number of nodes, allows locating the occ occurrences of a pattern of length m in nearly-optimal O(m\\log\\sigma", "start_char_pos": 1776, "end_char_pos": 1776}, {"type": "R", "before": "O(H log n) bitsof space: the reporting timeis optimal and the locate machinery fits within compressed space on top of the succinct topology", "after": "occ) time, where \\sigma is the alphabet's size. Our solution consists in sampling O(r) nodes that can be used as \"anchor points\" during the locate process. Once obtained the pre-order identifier of the first pattern occurrence (in co-lexicographic order), we show that a constant number of constant-time jumps between those anchor points lead to the identifier of the next pattern occurrence, thus enabling locating in optimal O(1) time per occurrence", "start_char_pos": 1779, "end_char_pos": 1918}], "sents_char_pos": [0, 179, 262, 316, 396, 527, 657, 686, 847, 1010, 1140, 1246, 1388, 1548, 1670]}
+{"doc_id": "2004.01411", "revision_depth": "1", "before_revision": "The random forest regression (RF) has become an extremely popular tool to analyze high-dimensional data. Nonetheless, it has been argued that its benefits are lessened in sparse high-dimensional settingsdue to the presence of weak predictorsand an initial dimension reduction (targeting) step prior to estimation is required. We show theoretically that , in high-dimensional settings with limited signal, proper targeting is an important complement to RF's feature sampling by controlling the probability of placing splits along strong predictors . This is supported by simulations with representable finite samples. Moreover, we quantify the immediate gain from targeting in terms of increased strength of individual trees. Our conclusions are elaborated by a broad set of applications within macroeconomics and finance. These show that the inherent bias-variance trade-off implied by targeting, due to increased tree correlation , is balanced at a medium level , selecting the best 10-30\\\\%DIF < of commonly applied predictors. The applications consolidate that improvements from the targeted RF over the ordinary RF can be significant, particularly in long-horizon forecasting, and both in expansions and recessions.\\end{abstract} %DIF > of commonly applied predictors. Improvements in predictive accuracy of targeted RF relative to ordinary RF are considerable, up to 12-13\\\\%, occurring both in recessions and expansions, particularly at long horizons.", "after_revision": "Random forest regression (RF) is an extremely popular tool for the analysis of high-dimensional data. Nonetheless, its benefits may be lessened in sparse settings, due to weak predictors, and a pre-estimation dimension reduction (targeting) step is required. We show that proper targeting controls the probability of placing splits along strong predictors, thus providing an important complement to RF's feature sampling . This is supported by simulations using representative finite samples. Moreover, we quantify the immediate gain from targeting in terms of increased strength of individual trees. Macroeconomic and financial applications show that the bias-variance tradeoff implied by targeting, due to increased correlation among trees in the forest , is balanced at a medium degree of targeting , selecting the best 10-30\\\\%DIF < of commonly applied predictors. The applications consolidate that improvements from the targeted RF over the ordinary RF can be significant, particularly in long-horizon forecasting, and both in expansions and recessions.\\end{abstract} %DIF > of commonly applied predictors. Improvements in predictive accuracy of targeted RF relative to ordinary RF are considerable, up to 12-13\\\\%, occurring both in recessions and expansions, particularly at long horizons.", "edit_actions": [{"type": "R", "before": "The random", "after": "Random", "start_char_pos": 0, "end_char_pos": 10}, {"type": "R", "before": "has become", "after": "is", "start_char_pos": 34, "end_char_pos": 44}, {"type": "R", "before": "to analyze", "after": "for the analysis of", "start_char_pos": 71, "end_char_pos": 81}, {"type": "R", "before": "it has been argued that its benefits are", "after": "its benefits may be", "start_char_pos": 118, "end_char_pos": 158}, {"type": "R", "before": "high-dimensional settingsdue to the presence of weak predictorsand an initial", "after": "settings, due to weak predictors, and a pre-estimation", "start_char_pos": 178, "end_char_pos": 255}, {"type": "D", "before": "prior to estimation", "after": null, "start_char_pos": 293, "end_char_pos": 312}, {"type": "R", "before": "theoretically that , in high-dimensional settings with limited signal, proper targeting is", "after": "that proper targeting controls the probability of placing splits along strong predictors, thus providing", "start_char_pos": 334, "end_char_pos": 424}, {"type": "D", "before": "by controlling the probability of placing splits along strong predictors", "after": null, "start_char_pos": 474, "end_char_pos": 546}, {"type": "R", "before": "with representable", "after": "using representative", "start_char_pos": 582, "end_char_pos": 600}, {"type": "R", "before": "Our conclusions are elaborated by a broad set of applications within macroeconomics and finance. These", "after": "Macroeconomic and financial applications", "start_char_pos": 725, "end_char_pos": 827}, {"type": "D", "before": "inherent", "after": null, "start_char_pos": 842, "end_char_pos": 850}, {"type": "R", "before": "trade-off", "after": "tradeoff", "start_char_pos": 865, "end_char_pos": 874}, {"type": "R", "before": "tree correlation", "after": "correlation among trees in the forest", "start_char_pos": 914, "end_char_pos": 930}, {"type": "R", "before": "level", "after": "degree of targeting", "start_char_pos": 957, "end_char_pos": 962}], "sents_char_pos": [0, 104, 325, 548, 616, 724, 821, 1029, 1219, 1272]}
+{"doc_id": "2004.01453", "revision_depth": "1", "before_revision": "Lacking a drug or vaccine, our current strategy to contain the COVID-19 pandemic is by means of social distancing, specifically mobility restrictions and lock-downs. Such measures impose a hurtful toll on the economy, and are difficult to sustain for extended periods. The challenge is that selective isolation of the sick, an often viable and effective strategy, is insufficient against COVID-19 , due to its relatively long incubation period, in which exposed individuals experience no symptoms, but still contribute to the spread. Here we propose an alternating lock-down strategy, in which at every instance, half of the population remains under lock-down while the other half continues to be active, maintaining a routine of weekly succession between activity and lock-down. All symptomatic individuals continue to remain in isolation. Under this regime, if an individual was exposed during their active week, by the time they complete their lock-down they willalready begin to exhibit symptoms. Hence this strategy isolates the majority of exposed individuals during their asymptomatic phase. We find that when complemented with behavioral norms to reduce infection, such as avoiding physical contact or observing personal hygiene, this strategy not only overcomes the pandemic, but also allows for some level of flexibility, withstanding a fraction of defectors or essential workers that remain continuously active . We examine our strategy based on current epidemiological models with parameter relevant for COVID-19. We wish, however, following this communication, to further test and fine-tune our scheme based on real-time human interaction data, and assess its actual effectiveness.%DIFDELCMD < \\end{abstract} %DIFDELCMD < %%% \\\\%DIF > capacity.", "after_revision": "Lacking a drug or vaccine, the current strategy to contain the COVID-19 pandemic is by means of social distancing, specifically mobility restrictions and lock-downs. Such measures impose a hurtful toll on the economy, and are difficult to sustain for extended periods. The challenge is that selective isolation of the symptomatic patients is insufficient to control SARS-CoV-2 , due to its relatively long incubation period, in which individuals experience no symptoms, but may already contribute to the spread. How then do we isolate theseinvisible pre-symptomatic spreaders? Here we propose an alternating quarantine strategy, in which at every instance, half of the population remains under lock-down while the other half continues to be active, maintaining a routine of weekly succession between activity and quarantine. Under this regime, if an individual was exposed during their active week, by the time they complete their quarantine they will, in most cases, begin to exhibit symptoms. Hence this strategy isolates the majority of pre-symptomatic individuals during their %DIFDELCMD < \\end{abstract} %DIFDELCMD < %%% infectious phase, leading to a rapid decline in the viral spread - all while sustaining a continuously active economy at 50\\\\%DIF > capacity.", "edit_actions": [{"type": "R", "before": "our", "after": "the", "start_char_pos": 27, "end_char_pos": 30}, {"type": "R", "before": "sick, an often viable and effective strategy, is insufficient against COVID-19", "after": "symptomatic patients is insufficient to control SARS-CoV-2", "start_char_pos": 318, "end_char_pos": 396}, {"type": "D", "before": "exposed", "after": null, "start_char_pos": 454, "end_char_pos": 461}, {"type": "R", "before": "still", "after": "may already", "start_char_pos": 502, "end_char_pos": 507}, {"type": "A", "before": null, "after": "How then do we isolate these", "start_char_pos": 534, "end_char_pos": 534}, {"type": "A", "before": null, "after": "invisible", "start_char_pos": 534, "end_char_pos": 534}, {"type": "A", "before": null, "after": "pre-symptomatic spreaders?", "start_char_pos": 535, "end_char_pos": 535}, {"type": "R", "before": "lock-down", "after": "quarantine", "start_char_pos": 567, "end_char_pos": 576}, {"type": "R", "before": "lock-down. All symptomatic individuals continue to remain in isolation.", "after": "quarantine.", "start_char_pos": 771, "end_char_pos": 842}, {"type": "R", "before": "lock-down they willalready", "after": "quarantine they will, in most cases,", "start_char_pos": 949, "end_char_pos": 975}, {"type": "R", "before": "exposed", "after": "pre-symptomatic", "start_char_pos": 1048, "end_char_pos": 1055}, {"type": "D", "before": "asymptomatic phase. We find that when complemented with behavioral norms to reduce infection, such as avoiding physical contact or observing personal hygiene, this strategy not only overcomes the pandemic, but also allows for some level of flexibility, withstanding a fraction of defectors or essential workers that remain continuously active . We examine our strategy based on current epidemiological models with parameter relevant for COVID-19. We wish, however, following this communication, to further test and fine-tune our scheme based on real-time human interaction data, and assess its actual effectiveness.", "after": null, "start_char_pos": 1081, "end_char_pos": 1696}, {"type": "A", "before": null, "after": "infectious phase, leading to a rapid decline in the viral spread - all while sustaining a continuously active economy at 50", "start_char_pos": 1741, "end_char_pos": 1741}], "sents_char_pos": [0, 165, 268, 533, 781, 842, 1002, 1100, 1425, 1527, 1696]}
+{"doc_id": "2004.01865", "revision_depth": "1", "before_revision": "We first revisit the problem of kernel estimation of spot volatility in a general continuous It\\^o semimartingale model in the absence of microstructure noise, and prove a Central Limit Theorem with optimal convergence rate , which is an extension of Figueroa and Li (2020) as we allow for a general two-sided kernel function . Next, to handle the microstructure noise of ultra high-frequency observations, we present a new type of pre-averaging/kernel estimator for spot volatility under the presence of additive microstructure noise . We prove Central Limit Theorems for the estimation error with an optimal rate and study the problems of optimal bandwidth and kernel selection. As in the case of a simple kernel estimator of spot volatility in the absence of microstructure noise, we show that the asymptotic variance of the pre-averaging/kernel estimator is minimal for exponential or Laplace kernels, hence, justifying the need of working with unbounded kernels as proposed in this work. Feasible implementation of the proposed estimators with optimal bandwidth is also developed . Monte Carlo experiments confirm the superior performance of the devised method.", "after_revision": "We first revisit the problem of estimating the spot volatility of an It\\^o semimartingale using a kernel estimator. We prove a Central Limit Theorem with optimal convergence rate for a general two-sided kernel . Next, we introduce a new pre-averaging/kernel estimator for spot volatility to handle the microstructure noise of ultra high-frequency observations . We prove a Central Limit Theorem for the estimation error with an optimal rate and study the optimal selection of the bandwidth and kernel functions. We show that the pre-averaging/kernel estimator 's asymptotic variance is minimal for exponential kernels, hence, justifying the need of working with kernels of unbounded support as proposed in this work. We also develop a feasible implementation of the proposed estimators with optimal bandwidth . Monte Carlo experiments confirm the superior performance of the devised method.", "edit_actions": [{"type": "R", "before": "kernel estimation of spot volatility in a general continuous", "after": "estimating the spot volatility of an", "start_char_pos": 32, "end_char_pos": 92}, {"type": "R", "before": "model in the absence of microstructure noise, and", "after": "using a kernel estimator. We", "start_char_pos": 114, "end_char_pos": 163}, {"type": "D", "before": ", which is an extension of Figueroa and Li (2020) as we allow", "after": null, "start_char_pos": 224, "end_char_pos": 285}, {"type": "D", "before": "function", "after": null, "start_char_pos": 317, "end_char_pos": 325}, {"type": "R", "before": "to handle the microstructure noise of ultra high-frequency observations, we present a new type of", "after": "we introduce a new", "start_char_pos": 334, "end_char_pos": 431}, {"type": "R", "before": "under the presence of additive microstructure noise", "after": "to handle the microstructure noise of ultra high-frequency observations", "start_char_pos": 483, "end_char_pos": 534}, {"type": "R", "before": "Central Limit Theorems", "after": "a Central Limit Theorem", "start_char_pos": 546, "end_char_pos": 568}, {"type": "R", "before": "problems of optimal", "after": "optimal selection of the", "start_char_pos": 629, "end_char_pos": 648}, {"type": "R", "before": "selection. As in the case of a simple kernel estimator of spot volatility in the absence of microstructure noise, we", "after": "functions. We", "start_char_pos": 670, "end_char_pos": 786}, {"type": "D", "before": "asymptotic variance of the", "after": null, "start_char_pos": 801, "end_char_pos": 827}, {"type": "A", "before": null, "after": "'s asymptotic variance", "start_char_pos": 859, "end_char_pos": 859}, {"type": "D", "before": "or Laplace", "after": null, "start_char_pos": 887, "end_char_pos": 897}, {"type": "R", "before": "unbounded kernels", "after": "kernels of unbounded support", "start_char_pos": 950, "end_char_pos": 967}, {"type": "R", "before": "Feasible", "after": "We also develop a feasible", "start_char_pos": 994, "end_char_pos": 1002}, {"type": "D", "before": "is also developed", "after": null, "start_char_pos": 1068, "end_char_pos": 1085}], "sents_char_pos": [0, 273, 536, 680, 993, 1087]}
+{"doc_id": "2004.03816", "revision_depth": "1", "before_revision": "The graph matching problem aims to find the latent vertex correspondence between two edge-correlated graphs and has many practical applications . In this work , we study a version of the seeded graph matching problem, which assumes that a set of seeds, i.e., pre-mapped vertex-pairs, is given in advance. Specifically, consider two correlated graphs whose edges are sampled independently with probability s from a parent \\ER graph G(n,p). Furthermore, a mapping between the vertices of the two graphs is provided as seeds, of which an unknown \\beta fraction is correct. This problem was first studied in \\mbox{%DIFAUXCMD lubars2018correcting0pt%DIFAUXCMD where an algorithm is proposed and shown to perfectly recover the correct vertex mapping with high probability if \\beta\\geq\\max}%DIFDELCMD < \\left\\{%%% \\frac{8{3}p,16\\log{n}{nps^2}}%DIFDELCMD < \\right\\}%%% . We improve their condition to \\beta\\geq\\max%DIFDELCMD < \\left\\{%%% 30\\sqrt{\\frac{\\log n{n(1-p)^2s^2}},\\frac{45\\log{n}}{np(1-p)^2s^2}}%DIFDELCMD < \\right)%%% . However, when p=O%DIFDELCMD < \\left( %%% \\sqrt{{\\log n/{ns^2}}}%DIFDELCMD < \\right)%%% , our improved condition still requires that \\beta must increase inversely proportional to np. In order to improve the matching performance for sparse graphs, we propose a new algorithm that uses \"witnesses\" in the 2-hop neighborhood, instead of only 1-hop neighborhood as in \\mbox{%DIFAUXCMD \\cite{lubars2018correcting}\\hspace{0pt}%DIFAUXCMD . We show that when np^2\\leq\\frac{1}{135\\log n}, our new algorithm can achieve perfect recovery with high probability if \\beta\\geq\\max}%DIFDELCMD < \\left\\{%%% 900\\sqrt{\\frac{np^3(1-s)\\log n{s}}, 600\\sqrt{\\frac{\\log n}{ns^4}}, \\frac{1200\\log n}{n^2p^2s^4}}%DIFDELCMD < \\right\\} %%% and nps^2\\geq 128\\log n }\\hspace{0pt}%DIFAUXCMD when p}\\ge . For instance, when p is a constant or p=n^{-3/4}, we show that only \\Omega(\\sqrt{n\\log n}) correct seeds suffice for perfect matching, while the previously best-known results demand \\Omega(n) and \\Omega(n^{3/4}\\log n) correct seeds, respectively} . Numerical experiments on both synthetic and real graphs corroborate our theoretical findings and show that our 2-hop algorithm significantly outperforms the 1-hop algorithm when the graphsare relatively sparse .", "after_revision": "Graph matching aims to find the latent vertex correspondence between two edge-correlated graphs and has found numerous applications across different fields . In this paper , we study a seeded graph matching problem, which assumes that a set of seeds, i.e., pre-mapped vertex-pairs, is given in advance. While most previous work requires all seeds to be correct, we focus on the setting where the seeds are partially correct. Specifically, consider two correlated graphs whose edges are sampled independently from a parent \\ER graph G(n,p). A mapping between the vertices of the two graphs is provided as seeds, of which an unknown \\beta fraction is correct. 0pt%DIFAUXCMD where an algorithm is proposed and shown to perfectly recover the correct vertex mapping with high probability if \\beta\\geq\\max}%DIFDELCMD < \\left\\{%%% {3}p,16\\log{n}{nps^2}}%DIFDELCMD < \\right\\}%%% %DIFDELCMD < \\left\\{%%% {n(1-p)^2s^2}},\\frac{45\\log{n}}{np(1-p)^2s^2}}%DIFDELCMD < \\right)%%% %DIFDELCMD < \\left( %%% /{ns^2}}}%DIFDELCMD < \\right)%%% We first analyze a simple algorithm that matches vertices based on the number of common seeds in the 1-hop neighborhoods, and then further propose a new algorithm that uses seeds in the 2-hop neighborhoods. We establish non-asymptotic performance guarantees of perfect matching for both 1-hop }\\hspace{0pt}%DIFAUXCMD . We show that when np^2\\leq\\frac{1}{135\\log n}, our new algorithm can achieve perfect recovery with high probability if \\beta\\geq\\max}%DIFDELCMD < \\left\\{%%% {s}}, 600\\sqrt{\\frac{\\log n}{ns^4}}, \\frac{1200\\log n}{n^2p^2s^4}}%DIFDELCMD < \\right\\} %%% and 2-hop algorithms, showing that our new 2-hop algorithm requires substantially fewer correct seeds than the 1-hop algorithm when graphs are sparse. Moreover, by combining our new performance guarantees for the 1-hop and 2-hop algorithms, we attain the best-known results (in terms of the required fraction of correct seeds) across the entire range of graph sparsity and significantly improve the previous results in \\mbox{%DIFAUXCMD \\cite{10.14778/2794367.2794371,lubars2018correcting }\\hspace{0pt}%DIFAUXCMD when p}\\ge n^{-5/6. For instance, when p is a constant or p=n^{-3/4}, we show that only \\Omega(\\sqrt{n\\log n}) correct seeds suffice for perfect matching, while the previously best-known results demand \\Omega(n) and \\Omega(n^{3/4}\\log n) correct seeds, respectively} . Numerical experiments corroborate our theoretical findings , demonstrating the superiority of our 2-hop algorithm on a variety of synthetic and real graphs .", "edit_actions": [{"type": "R", "before": "The graph matching problem", "after": "Graph matching", "start_char_pos": 0, "end_char_pos": 26}, {"type": "R", "before": "many practical applications", "after": "found numerous applications across different fields", "start_char_pos": 116, "end_char_pos": 143}, {"type": "R", "before": "work", "after": "paper", "start_char_pos": 154, "end_char_pos": 158}, {"type": "D", "before": "version of the", "after": null, "start_char_pos": 172, "end_char_pos": 186}, {"type": "A", "before": null, "after": "While most previous work requires all seeds to be correct, we focus on the setting where the seeds are partially correct.", "start_char_pos": 305, "end_char_pos": 305}, {"type": "D", "before": "with probability s", "after": null, "start_char_pos": 389, "end_char_pos": 407}, {"type": "R", "before": "Furthermore, a", "after": "A", "start_char_pos": 440, "end_char_pos": 454}, {"type": "D", "before": "This problem was first studied in \\mbox{%DIFAUXCMD lubars2018correcting", "after": null, "start_char_pos": 571, "end_char_pos": 642}, {"type": "D", "before": "\\frac{8", "after": null, "start_char_pos": 808, "end_char_pos": 815}, {"type": "D", "before": ". We improve their condition to \\beta\\geq\\max", "after": null, "start_char_pos": 862, "end_char_pos": 907}, {"type": "D", "before": "30\\sqrt{\\frac{\\log n", "after": null, "start_char_pos": 931, "end_char_pos": 951}, {"type": "D", "before": ". However, when p=O", "after": null, "start_char_pos": 1021, "end_char_pos": 1040}, {"type": "D", "before": "\\sqrt{{\\log n", "after": null, "start_char_pos": 1064, "end_char_pos": 1077}, {"type": "R", "before": ", our improved condition still requires that \\beta must increase inversely proportional to np. In order to improve the matching performance for sparse graphs, we", "after": "We first analyze a simple algorithm that matches vertices based on the number of common seeds in the 1-hop neighborhoods, and then further", "start_char_pos": 1110, "end_char_pos": 1271}, {"type": "R", "before": "\"witnesses\"", "after": "seeds", "start_char_pos": 1306, "end_char_pos": 1317}, {"type": "R", "before": "neighborhood, instead of only", "after": "neighborhoods. We establish non-asymptotic performance guarantees of perfect matching for both", "start_char_pos": 1331, "end_char_pos": 1360}, {"type": "D", "before": "neighborhood as in \\mbox{%DIFAUXCMD \\cite{lubars2018correcting", "after": null, "start_char_pos": 1367, "end_char_pos": 1429}, {"type": "D", "before": "900\\sqrt{\\frac{np^3(1-s)\\log n", "after": null, "start_char_pos": 1612, "end_char_pos": 1642}, {"type": "R", "before": "and nps^2\\geq 128\\log n", "after": "and 2-hop algorithms, showing that our new 2-hop algorithm requires substantially fewer correct seeds than the 1-hop algorithm when graphs are sparse. Moreover, by combining our new performance guarantees for the 1-hop and 2-hop algorithms, we attain the best-known results (in terms of the required fraction of correct seeds) across the entire range of graph sparsity and significantly improve the previous results in \\mbox{%DIFAUXCMD \\cite{10.14778/2794367.2794371,lubars2018correcting", "start_char_pos": 1734, "end_char_pos": 1757}, {"type": "A", "before": null, "after": "n^{-5/6", "start_char_pos": 1793, "end_char_pos": 1793}, {"type": "D", "before": "on both synthetic and real graphs", "after": null, "start_char_pos": 2066, "end_char_pos": 2099}, {"type": "R", "before": "and show that", "after": ", demonstrating the superiority of", "start_char_pos": 2137, "end_char_pos": 2150}, {"type": "R", "before": "significantly outperforms the 1-hop algorithm when the graphsare relatively sparse", "after": "on a variety of synthetic and real graphs", "start_char_pos": 2171, "end_char_pos": 2253}], "sents_char_pos": [0, 145, 304, 439, 570, 820, 1204, 1317, 1794]}
+{"doc_id": "2004.04565", "revision_depth": "1", "before_revision": "With the spiraling pandemic of the Coronavirus Disease 2019 (COVID-19), it has becoming inherently important to disseminate accurate and timely information about the disease . Due to the ubiquity of Internet connectivity and smart devices, social sensing is emerging as a dynamic sensing paradigm to collect real-time observations from online users. In this vision paper we propose CovidSens, the concept of social-sensing-based risk alerting systems to notify the general public about the COVID-19 spread . The CovidSens concept is motivated by two recent observations: 1) people have been actively sharing their state of health and experience of the COVID-19 via online social media, and 2) official warning channels and news agencies are relatively slower than people reporting their observations and experiences about COVID-19 on social media . We anticipate an unprecedented opportunity to leverage the posts generated by the social media users to build a real-time analytic system for gathering and circulating vital information of the COVID-19 propagation . Specifically, the vision of CovidSens attempts to answer the questions of: how to track the spread of the COVID-19? How to distill reliable information about the disease with the coexistence of prevailing rumors and misinformation in the social media ? How to inform the general public about the latest state of the spread timely and effectively and alert them to remain prepared ? In this vision paper, we discuss the roles of CovidSens and identify the potential challenges in implementing reliable social-sensing-based risk alerting systems. We envision that approaches originating from multiple disciplines (e.g. estimation theory, machine learning, constrained optimization) can be effective in addressing the challenges. Finally, we outline a few research directions for future work in CovidSens.", "after_revision": "With the spiraling pandemic of the Coronavirus Disease 2019 (COVID-19), it has becoming inherently important to disseminate accurate and timely information . Due to the ubiquity of Internet connectivity and smart devices, social sensing is emerging as a dynamic AI-driven sensing paradigm to extract real-time observations from online users. In this paper, we propose CovidSens, a vision of social sensing based risk alert systems to spontaneously obtain and analyze social data to infer COVID-19 propagation. CovidSens can actively help to keep the general public informed about the COVID-19 spread and identify risk-prone areas . The CovidSens concept is motivated by three observations: 1) people actively share their experience of COVID-19 via online social media, 2) official warning channels and news agencies are relatively slower than people reporting on social media , and 3) online users are frequently equipped with substantially capable mobile devices that can perform data processing and analytics. We envision unprecedented opportunity to leverage posts generated by ordinary people to build a real-time sensing and analytic system for gathering and circulating COVID-19 propagation data . Specifically, the vision of CovidSens attempts to answer the questions : How to distill reliable information about COVID-19 with prevailing rumors and misinformation ? How to inform the general public about the state of the spread timely and effectively ? How to leverage the computational power on edge devices to construct fully integrated edge-based social sensing platforms ? In this vision paper, we discuss the roles of CovidSens and identify potential challenges in developing reliable social sensing based risk alert systems. We envision that approaches originating from multiple disciplines can be effective in addressing the challenges. Finally, we outline a few research directions for future work in CovidSens.", "edit_actions": [{"type": "D", "before": "about the disease", "after": null, "start_char_pos": 156, "end_char_pos": 173}, {"type": "A", "before": null, "after": "AI-driven", "start_char_pos": 280, "end_char_pos": 280}, {"type": "R", "before": "collect", "after": "extract", "start_char_pos": 301, "end_char_pos": 308}, {"type": "R", "before": "vision paper", "after": "paper,", "start_char_pos": 359, "end_char_pos": 371}, {"type": "R", "before": "the concept of social-sensing-based risk alerting systems to notify", "after": "a vision of social sensing based risk alert systems to spontaneously obtain and analyze social data to infer COVID-19 propagation. CovidSens can actively help to keep", "start_char_pos": 394, "end_char_pos": 461}, {"type": "A", "before": null, "after": "informed", "start_char_pos": 481, "end_char_pos": 481}, {"type": "A", "before": null, "after": "and identify risk-prone areas", "start_char_pos": 508, "end_char_pos": 508}, {"type": "R", "before": "two recent", "after": "three", "start_char_pos": 549, "end_char_pos": 559}, {"type": "R", "before": "have been actively sharing their state of health and experience of the", "after": "actively share their experience of", "start_char_pos": 584, "end_char_pos": 654}, {"type": "D", "before": "and", "after": null, "start_char_pos": 689, "end_char_pos": 692}, {"type": "D", "before": "their observations and experiences about COVID-19", "after": null, "start_char_pos": 784, "end_char_pos": 833}, {"type": "R", "before": ". We anticipate an", "after": ", and 3) online users are frequently equipped with substantially capable mobile devices that can perform data processing and analytics. We envision", "start_char_pos": 850, "end_char_pos": 868}, {"type": "D", "before": "the", "after": null, "start_char_pos": 907, "end_char_pos": 910}, {"type": "R", "before": "the social media users", "after": "ordinary people", "start_char_pos": 930, "end_char_pos": 952}, {"type": "A", "before": null, "after": "sensing and", "start_char_pos": 974, "end_char_pos": 974}, {"type": "D", "before": "vital information of the", "after": null, "start_char_pos": 1021, "end_char_pos": 1045}, {"type": "A", "before": null, "after": "data", "start_char_pos": 1067, "end_char_pos": 1067}, {"type": "R", "before": "of: how to track the spread of the COVID-19?", "after": ":", "start_char_pos": 1141, "end_char_pos": 1185}, {"type": "R", "before": "the disease with the coexistence of", "after": "COVID-19 with", "start_char_pos": 1228, "end_char_pos": 1263}, {"type": "D", "before": "in the social media", "after": null, "start_char_pos": 1301, "end_char_pos": 1320}, {"type": "D", "before": "latest", "after": null, "start_char_pos": 1366, "end_char_pos": 1372}, {"type": "R", "before": "and alert them to remain prepared", "after": "? How to leverage the computational power on edge devices to construct fully integrated edge-based social sensing platforms", "start_char_pos": 1416, "end_char_pos": 1449}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1521, "end_char_pos": 1524}, {"type": "R", "before": "implementing reliable social-sensing-based risk alerting", "after": "developing reliable social sensing based risk alert", "start_char_pos": 1549, "end_char_pos": 1605}, {"type": "D", "before": "(e.g. estimation theory, machine learning, constrained optimization)", "after": null, "start_char_pos": 1681, "end_char_pos": 1749}], "sents_char_pos": [0, 175, 350, 510, 851, 1185, 1322, 1451, 1614, 1796]}
+{"doc_id": "2004.04608", "revision_depth": "1", "before_revision": "We develop a minimalist compartmental model to analyze policies on mobility restriction in Italy during the Covid-19 outbreak. Our findings show that an early lockdown barely shifts the epidemic in time : moreover , beyond a critical value of the lockdown strength, an epidemic that seems to be quelled fully recovers after lifting the restrictions. We investigate the effects on lockdown scenarios and exit strategies by introducing heterogeneities in the model. In particular, we consider Italian regions as separate administrative entities in which social interactions through different age classes occur. We find that, due to the sparsity of the mobility matrix, epidemics develop independently in different regions once the outbreak starts. Moreover, after the epidemics ha started, the influence of contacts with other regions becomes soon irrelevant. Sparsity might be responsible for the observed delays among different regions. Analogous arguments apply to the world/countries scenario. We also find that disregarding the structure of social contacts could lead to severe underestimation of the post-lockdown effects . Nevertheless, age class based strategies can help to mitigate rebound effectswith milder strategies. Finally, we point out that these results can be generalized beyond this particular model by providing a description of the effects of key parameters on non-medical epidemic mitigation strategies .", "after_revision": "We develop a minimalist compartmental model to analyze the impact of mobility restrictions in Italy during the Covid-19 outbreak. Our findings show that early lockdowns shifts the epidemic in time while , beyond a critical value of the lockdown strength, the epidemic restarts after lifting the restrictions. We investigate the effects of different lockdown scenarios and exit mechanisms by accounting for two fundamental sources of heterogeneity within the model: geography and demography. We consider Italian Regions as separate administrative entities , in which social interactions between age cohorts occur. Due to the sparsity of the mobility matrix, epidemics tend to develop independently in different regions . Finally, we show how disregarding the specific structure of social contacts could lead to severe underestimation of post-lockdown effects , while specific age cohort based measures can sustain the mitigation of rebound effects. Our model is general, and it highlights the effects of key parameters on non-pharmaceutical mitigation mechanisms for epidemics .", "edit_actions": [{"type": "R", "before": "policies on mobility restriction", "after": "the impact of mobility restrictions", "start_char_pos": 55, "end_char_pos": 87}, {"type": "R", "before": "an early lockdown barely", "after": "early lockdowns", "start_char_pos": 150, "end_char_pos": 174}, {"type": "R", "before": ": moreover", "after": "while", "start_char_pos": 203, "end_char_pos": 213}, {"type": "R", "before": "an epidemic that seems to be quelled fully recovers", "after": "the epidemic restarts", "start_char_pos": 266, "end_char_pos": 317}, {"type": "R", "before": "on", "after": "of different", "start_char_pos": 377, "end_char_pos": 379}, {"type": "R", "before": "strategies by introducing heterogeneities in the model. In particular, we consider Italian regions", "after": "mechanisms by accounting for two fundamental sources of heterogeneity within the model: geography and demography. We consider Italian Regions", "start_char_pos": 408, "end_char_pos": 506}, {"type": "A", "before": null, "after": ",", "start_char_pos": 543, "end_char_pos": 543}, {"type": "R", "before": "through different age classes occur. We find that, due", "after": "between age cohorts occur. Due", "start_char_pos": 573, "end_char_pos": 627}, {"type": "A", "before": null, "after": "tend to", "start_char_pos": 678, "end_char_pos": 678}, {"type": "R", "before": "once the outbreak starts. Moreover, after the epidemics ha started, the influence of contacts with other regions becomes soon irrelevant. Sparsity might be responsible for the observed delays among different regions. Analogous arguments apply to the world/countries scenario. We also find that disregarding the", "after": ". Finally, we show how disregarding the specific", "start_char_pos": 722, "end_char_pos": 1032}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1102, "end_char_pos": 1105}, {"type": "R", "before": ". Nevertheless, age class based strategies can help to mitigate rebound effectswith milder strategies. Finally, we point out that these results can be generalized beyond this particular model by providing a description of", "after": ", while specific age cohort based measures can sustain the mitigation of rebound effects. Our model is general, and it highlights", "start_char_pos": 1128, "end_char_pos": 1349}, {"type": "R", "before": "non-medical epidemic mitigation strategies", "after": "non-pharmaceutical mitigation mechanisms for epidemics", "start_char_pos": 1383, "end_char_pos": 1425}], "sents_char_pos": [0, 126, 349, 463, 609, 747, 859, 938, 997, 1129, 1230]}
+{"doc_id": "2004.04608", "revision_depth": "2", "before_revision": "We develop a minimalist compartmental model to analyze the impact of mobility restrictions in Italy during the Covid-19 outbreak. Our findings show that early lockdowns shifts the epidemic in time while, beyond a critical value of the lockdown strength, the epidemic restarts after lifting the restrictions. We investigate the effects of different lockdown scenarios and exit mechanisms by accounting for two fundamental sources of heterogeneity within the model: geography and demography. We consider Italian Regions as separate administrative entities, in which social interactions between age cohorts occur. Due to the sparsity of the mobility matrix, epidemics tend to develop independently in different regions . Finally , we show how disregarding the specific structure of social contacts could lead to severe underestimation of post-lockdown effects, while specific age cohort based measures can sustain the mitigation of rebound effects. Our model is general, and it highlights the effects of key parameters on non-pharmaceutical mitigation mechanisms for epidemics.", "after_revision": "We develop a minimalist compartmental model to study the impact of mobility restrictions in Italy during the Covid-19 outbreak. We show that an early lockdown shifts the epidemic in time , while that beyond a critical value of the lockdown strength, the epidemic tend to restart after lifting the restrictions. As a consequence, specific mitigation strategies must be introduced. We characterize the relative importance of different broad strategies by accounting for two fundamental sources of heterogeneity , i.e. geography and demography. First, we consider Italian regions as separate administrative entities, in which social interactions between age classs occur. Due to the sparsity of the inter-regional mobility matrix, once started the epidemics tend to develop independently across areas, justifying the adoption of solutions specific to individual regions or to clusters of regions. Second , we show that social contacts between age classes play a fundamental role and that measures which take into account the age structure of the population can provide a significant contribution to mitigate the rebound effects. Our model is general, and while it does not analyze specific mitigation strategies, it highlights the relevance of some key parameters on non-pharmaceutical mitigation mechanisms for the epidemics.", "edit_actions": [{"type": "R", "before": "analyze", "after": "study", "start_char_pos": 47, "end_char_pos": 54}, {"type": "R", "before": "Our findings show that early lockdowns", "after": "We show that an early lockdown", "start_char_pos": 130, "end_char_pos": 168}, {"type": "R", "before": "while,", "after": ", while that", "start_char_pos": 197, "end_char_pos": 203}, {"type": "R", "before": "restarts", "after": "tend to restart", "start_char_pos": 267, "end_char_pos": 275}, {"type": "R", "before": "We investigate the effects of different lockdown scenarios and exit mechanisms", "after": "As a consequence, specific mitigation strategies must be introduced. We characterize the relative importance of different broad strategies", "start_char_pos": 308, "end_char_pos": 386}, {"type": "R", "before": "within the model:", "after": ", i.e.", "start_char_pos": 446, "end_char_pos": 463}, {"type": "R", "before": "We consider Italian Regions", "after": "First, we consider Italian regions", "start_char_pos": 490, "end_char_pos": 517}, {"type": "R", "before": "cohorts", "after": "classs", "start_char_pos": 596, "end_char_pos": 603}, {"type": "A", "before": null, "after": "inter-regional", "start_char_pos": 638, "end_char_pos": 638}, {"type": "A", "before": null, "after": "once started the", "start_char_pos": 656, "end_char_pos": 656}, {"type": "R", "before": "in different regions . Finally", "after": "across areas, justifying the adoption of solutions specific to individual regions or to clusters of regions. Second", "start_char_pos": 697, "end_char_pos": 727}, {"type": "R", "before": "how disregarding the specific structure of social contacts could lead to severe underestimation of post-lockdown effects, while specific age cohort based measures can sustain the mitigation of", "after": "that social contacts between age classes play a fundamental role and that measures which take into account the age structure of the population can provide a significant contribution to mitigate the", "start_char_pos": 738, "end_char_pos": 930}, {"type": "R", "before": "it highlights the effects of", "after": "while it does not analyze specific mitigation strategies, it highlights the relevance of some", "start_char_pos": 974, "end_char_pos": 1002}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1066, "end_char_pos": 1066}], "sents_char_pos": [0, 129, 307, 489, 610, 719, 947]}
+{"doc_id": "2004.04858", "revision_depth": "1", "before_revision": "We consider the problem of identifying patterns of interest in colored strings. A colored string is a string in which each position is colored with one of a finite set of colors. Our task is to find substrings that always occur followed by the same color at the same distance. The problem is motivated by applications in embedded systems verification, in particular, assertion mining. The goal there is to automatically infer properties of the embedded system from the analysis of its simulation traces. We show that the number of interesting patterns is upper-bounded by O(n^2) where n is the length of the string. We introduce a baseline algorithm with \\mathcal{O}(n^2) running time which identifies all interesting patterns for all colors in the string satisfying certain minimality conditions. When one is interested in patterns related to only one color , we provide an algorithm that identifies patterns in \\mathcal{O}(n^2\\log n) time , but is faster than the first algorithm in practice , both on simulated and on real-world patterns.", "after_revision": "In this paper, we consider the problem of identifying patterns of interest in colored strings. A colored string is a string where each position is assigned one of a finite set of colors. Our task is to find substrings of the colored string that always occur followed by the same color at the same distance. The problem is motivated by applications in embedded systems verification, in particular, assertion mining. The goal there is to automatically find properties of the embedded system from the analysis of its simulation traces. We show that , in our setting, the number of patterns of interest is upper-bounded by O(n^2) , where n is the length of the string. We introduce a baseline algorithm , running in \\mathcal{O}(n^2) time, which identifies all patterns of interest satisfying certain minimality conditions, for all colors in the string . For the case where one is interested in patterns related to one color only, we also provide a second algorithm which runs in \\mathcal{O}(n^2\\log n) time in the worst case but is faster than the baseline algorithm in practice . Both solutions use suffix trees, and the second algorithm also uses an appropriately defined priority queue, which allows us to reduce the number of computations. We performed an experimental evaluation of the proposed approaches over both synthetic and real-world datasets, and found that the second algorithm outperforms the first algorithm on all simulated data, while on the real-world data, the performance varies between a slight slowdown (on half of the datasets) and a speedup by a factor of up to 11.", "edit_actions": [{"type": "R", "before": "We", "after": "In this paper, we", "start_char_pos": 0, "end_char_pos": 2}, {"type": "R", "before": "in which", "after": "where", "start_char_pos": 109, "end_char_pos": 117}, {"type": "R", "before": "colored with", "after": "assigned", "start_char_pos": 135, "end_char_pos": 147}, {"type": "A", "before": null, "after": "of the colored string", "start_char_pos": 210, "end_char_pos": 210}, {"type": "R", "before": "infer", "after": "find", "start_char_pos": 421, "end_char_pos": 426}, {"type": "A", "before": null, "after": ", in our setting,", "start_char_pos": 518, "end_char_pos": 518}, {"type": "R", "before": "interesting patterns", "after": "patterns of interest", "start_char_pos": 533, "end_char_pos": 553}, {"type": "A", "before": null, "after": ",", "start_char_pos": 581, "end_char_pos": 581}, {"type": "R", "before": "with", "after": ", running in", "start_char_pos": 653, "end_char_pos": 657}, {"type": "R", "before": "running time", "after": "time,", "start_char_pos": 675, "end_char_pos": 687}, {"type": "R", "before": "interesting patterns", "after": "patterns of interest satisfying certain minimality conditions,", "start_char_pos": 709, "end_char_pos": 729}, {"type": "R", "before": "satisfying certain minimality conditions. When", "after": ". For the case where", "start_char_pos": 759, "end_char_pos": 805}, {"type": "R", "before": "only one color , we provide an algorithm that identifies patterns", "after": "one color only, we also provide a second algorithm which runs", "start_char_pos": 847, "end_char_pos": 912}, {"type": "R", "before": ",", "after": "in the worst case", "start_char_pos": 944, "end_char_pos": 945}, {"type": "R", "before": "first", "after": "baseline", "start_char_pos": 969, "end_char_pos": 974}, {"type": "R", "before": ", both on simulated and on", "after": ". Both solutions use suffix trees, and the second algorithm also uses an appropriately defined priority queue, which allows us to reduce the number of computations. We performed an experimental evaluation of the proposed approaches over both synthetic and", "start_char_pos": 997, "end_char_pos": 1023}, {"type": "R", "before": "patterns.", "after": "datasets, and found that the second algorithm outperforms the first algorithm on all simulated data, while on the real-world data, the performance varies between a slight slowdown (on half of the datasets) and a speedup by a factor of up to 11.", "start_char_pos": 1035, "end_char_pos": 1044}], "sents_char_pos": [0, 79, 178, 277, 385, 504, 618, 800]}
+{"doc_id": "2004.06098", "revision_depth": "2", "before_revision": "In March and April 2020, public health authorities in the United States acted to mitigate transmission of COVID-19. These actions were not coordinated at the national level , which creates an opportunity to use spatial and temporal variation to measure their effect with greater accuracy. We combine publicly available data sources on the timing of stay-at-home orders and daily confirmed COVID-19 cases at the county level in the United States (N = 124,027). We then derive from the classic SIR model a two-way fixed-effects model and apply it to the data with controls for unmeasured differences between counties and over time. Mean county-level daily growth in COVID-19 infections peaked at 17.2\\% just before stay-at-home orders were issued. Two way fixed-effects regression estimates suggest that orders were associated with a 3.9 percentage point (95\\% CI 1.2 to 6.6 ) reduction in the growth rate after one week and an 6.9 percentage point (2.4 to 11.5 ) reduction after two weeks . By day 27 the reduction (22.6 percentage points, 14.8 to 30.5) had surpassed the growth at the peak, indicating that growth had turned negative and the number of new daily infections was beginning to decline. A hypothetical national stay-at-home order issued on March 13 , 2020 when a national emergency was declared might have reduced cumulative infections by 63.3\\%, and might have helped to reverse exponential growth in the disease by April 10. The results here suggest that a coordinated nationwide stay-at-home order may have reduced by hundreds of thousands the current number of infections and by tens of thousands the total number of deaths from COVID-19. Future efforts in the United States and elsewhere to control pandemics should coordinate stay-at-home orders at the national level,especially for diseases for which local spread has already occurred and testing availability is delayed .", "after_revision": "Governments issue \"stay at home\" orders to reduce the spread of contagious diseases, but the magnitude of such orders' effectiveness is uncertain. In the United States these orders were not coordinated at the national level during the coronavirus disease 2019 (COVID-19) pandemic , which creates an opportunity to use spatial and temporal variation to measure the policies' effect with greater accuracy. Here, we combine data on the timing of stay-at-home orders with daily confirmed COVID-19 cases and fatalities at the county level in the United States . We estimate the effect of stay-at-home orders using a difference-in-differences design that accounts for unmeasured local variation in factors like health systems and demographics and for unmeasured temporal variation in factors like national mitigation actions and access to tests. Compared to counties that did not implement stay-at-home orders , the results show that the orders are associated with a 30.2 percent (11.0 to 45.2 ) reduction in weekly cases after one week , a 40.0 percent (23.4 to 53.0 ) reduction after two weeks , and a 48.6 percent (31.1 to 61.7) reduction after three weeks. Stay-at-home orders are also associated with a 59.8 percent (18.3 to 80.2) reduction in weekly fatalities after three weeks. These results suggest that stay-at-home orders reduced confirmed cases by 390,000 (170,000 to 680,000) and fatalities by 41,000 (27,000 to 59,000) within the first three weeks in localities where they were implemented .", "edit_actions": [{"type": "R", "before": "In March and April 2020, public health authorities in the United States acted to mitigate transmission of COVID-19. These actions", "after": "Governments issue \"stay at home\" orders to reduce the spread of contagious diseases, but the magnitude of such orders' effectiveness is uncertain. In the United States these orders", "start_char_pos": 0, "end_char_pos": 129}, {"type": "A", "before": null, "after": "during the coronavirus disease 2019 (COVID-19) pandemic", "start_char_pos": 173, "end_char_pos": 173}, {"type": "R", "before": "their", "after": "the policies'", "start_char_pos": 254, "end_char_pos": 259}, {"type": "R", "before": "We combine publicly available data sources", "after": "Here, we combine data", "start_char_pos": 290, "end_char_pos": 332}, {"type": "R", "before": "and", "after": "with", "start_char_pos": 370, "end_char_pos": 373}, {"type": "A", "before": null, "after": "and fatalities", "start_char_pos": 405, "end_char_pos": 405}, {"type": "R", "before": "(N = 124,027). We then derive from the classic SIR model a two-way fixed-effects model and apply it to the data with controls for unmeasured differences between counties and over time. Mean county-level daily growth in COVID-19 infections peaked at 17.2\\% just before", "after": ". We estimate the effect of", "start_char_pos": 447, "end_char_pos": 714}, {"type": "A", "before": null, "after": "orders using a difference-in-differences design that accounts for unmeasured local variation in factors like health systems and demographics and for unmeasured temporal variation in factors like national mitigation actions and access to tests. Compared to counties that did not implement stay-at-home", "start_char_pos": 728, "end_char_pos": 728}, {"type": "R", "before": "were issued. Two way fixed-effects regression estimates suggest that orders were", "after": ", the results show that the orders are", "start_char_pos": 736, "end_char_pos": 816}, {"type": "R", "before": "3.9 percentage point (95\\% CI 1.2 to 6.6", "after": "30.2 percent (11.0 to 45.2", "start_char_pos": 835, "end_char_pos": 875}, {"type": "R", "before": "the growth rate", "after": "weekly cases", "start_char_pos": 891, "end_char_pos": 906}, {"type": "R", "before": "and an 6.9 percentage point (2.4 to 11.5", "after": ", a 40.0 percent (23.4 to 53.0", "start_char_pos": 922, "end_char_pos": 962}, {"type": "D", "before": ". By day 27 the reduction (22.6 percentage points, 14.8 to 30.5) had surpassed the growth at the peak, indicating that growth had turned negative and the number of new daily infections was beginning to decline. A hypothetical national stay-at-home order issued on March 13", "after": null, "start_char_pos": 991, "end_char_pos": 1263}, {"type": "R", "before": "2020 when a national emergency was declared might have reduced cumulative infections by 63.3\\%, and might have helped to reverse exponential growth in the disease by April 10. The results here suggest that a coordinated nationwide", "after": "and a 48.6 percent (31.1 to 61.7) reduction after three weeks. Stay-at-home orders are also associated with a 59.8 percent (18.3 to 80.2) reduction in weekly fatalities after three weeks. These results suggest that", "start_char_pos": 1266, "end_char_pos": 1496}, {"type": "R", "before": "order may have reduced by hundreds of thousands the current number of infections and by tens of thousands the total number of deaths from COVID-19. Future efforts in the United States and elsewhere to control pandemics should coordinate stay-at-home orders at the national level,especially for diseases for which local spread has already occurred and testing availability is delayed", "after": "orders reduced confirmed cases by 390,000 (170,000 to 680,000) and fatalities by 41,000 (27,000 to 59,000) within the first three weeks in localities where they were implemented", "start_char_pos": 1510, "end_char_pos": 1892}], "sents_char_pos": [0, 115, 289, 461, 631, 748, 992, 1201, 1441, 1657]}
+{"doc_id": "2004.06286", "revision_depth": "1", "before_revision": "A brain-computer interface (BCI) enables a user to communicate directly with a computer using the brain signals. Electroencephalogram (EEG) is the most frequently used input signal in BCIs . However, EEG signals are weak, easily contaminated by interferences and noise, non-stationary for the same subject, and varying among different subjects . So , it is difficult to build a generic pattern recognition model in an EEG-based BCI system that is optimal for different subjects, in different sessions, for different devices and tasks. Usually a calibration session is needed to collect some subject-specific data for a new subject, which is time-consuming and user-unfriendly . Transfer learning (TL), which can utilize data or knowledge from similar or relevant subjects/sessions/devices/tasks to facilitate the learning for a new subject/session/device/task, is frequently used to alleviate this calibration requirement . This paper reviews journal publications on TL approaches in EEG-based BCIs in the last few years, i.e., since 2016. Six paradigms and applications -- motor imagery (MI), event related potentials(ERP) , steady-state visual evoked potentials (SSVEP) , affective BCIs (aBCI) , regression problems, and adversarial attacks -- are considered. For each paradigm/application, we group the TL approaches into cross-subject/session, cross-device, and cross-task settings and review them separately. Observations and conclusions are made at the end of the paper, which may point to future research directions.", "after_revision": "A brain-computer interface (BCI) enables a user to communicate with a computer directly using brain signals. Electroencephalograms (EEGs) used in BCIs are weak, easily contaminated by interference and noise, non-stationary for the same subject, and varying across different subjects and sessions. Therefore , it is difficult to build a generic pattern recognition model in an EEG-based BCI system that is optimal for different subjects, during different sessions, for different devices and tasks. Usually , a calibration session is needed to collect some training data for a new subject, which is time consuming and user unfriendly . Transfer learning (TL), which utilizes data or knowledge from similar or relevant subjects/sessions/devices/tasks to facilitate learning for a new subject/session/device/task, is frequently used to reduce the amount of calibration effort . This paper reviews journal publications on TL approaches in EEG-based BCIs in the last few years, i.e., since 2016. Six paradigms and applications -- motor imagery , event-related potentials, steady-state visual evoked potentials , affective BCIs , regression problems, and adversarial attacks -- are considered. For each paradigm/application, we group the TL approaches into cross-subject/session, cross-device, and cross-task settings and review them separately. Observations and conclusions are made at the end of the paper, which may point to future research directions.", "edit_actions": [{"type": "D", "before": "directly", "after": null, "start_char_pos": 63, "end_char_pos": 71}, {"type": "R", "before": "using the", "after": "directly using", "start_char_pos": 88, "end_char_pos": 97}, {"type": "R", "before": "Electroencephalogram (EEG) is the most frequently used input signal in BCIs . However, EEG signals", "after": "Electroencephalograms (EEGs) used in BCIs", "start_char_pos": 113, "end_char_pos": 211}, {"type": "R", "before": "interferences", "after": "interference", "start_char_pos": 245, "end_char_pos": 258}, {"type": "R", "before": "among different subjects . So", "after": "across different subjects and sessions. Therefore", "start_char_pos": 319, "end_char_pos": 348}, {"type": "R", "before": "in", "after": "during", "start_char_pos": 479, "end_char_pos": 481}, {"type": "A", "before": null, "after": ",", "start_char_pos": 543, "end_char_pos": 543}, {"type": "R", "before": "subject-specific", "after": "training", "start_char_pos": 592, "end_char_pos": 608}, {"type": "R", "before": "time-consuming and user-unfriendly", "after": "time consuming and user unfriendly", "start_char_pos": 642, "end_char_pos": 676}, {"type": "R", "before": "can utilize", "after": "utilizes", "start_char_pos": 709, "end_char_pos": 720}, {"type": "D", "before": "the", "after": null, "start_char_pos": 810, "end_char_pos": 813}, {"type": "R", "before": "alleviate this calibration requirement", "after": "reduce the amount of calibration effort", "start_char_pos": 884, "end_char_pos": 922}, {"type": "D", "before": "(MI), event related potentials(ERP)", "after": null, "start_char_pos": 1089, "end_char_pos": 1124}, {"type": "A", "before": null, "after": "event-related potentials,", "start_char_pos": 1127, "end_char_pos": 1127}, {"type": "D", "before": "(SSVEP)", "after": null, "start_char_pos": 1166, "end_char_pos": 1173}, {"type": "D", "before": "(aBCI)", "after": null, "start_char_pos": 1191, "end_char_pos": 1197}], "sents_char_pos": [0, 112, 345, 534, 678, 924, 1040, 1263, 1415]}
+{"doc_id": "2004.07224", "revision_depth": "2", "before_revision": "The fatality rate of SARS-Cov-2 escalates with age and is larger in men than women. I show that these variations across age and gender are quantitatively explained by the levels of the ACE2 protein in the lungs . This correlation also rationalizes the association between Covid-19 lethality and hypertension. Surprisingly , despite ACE2 is the viral receptor, higher values of ACE2 lead to lower fatality. This behaviour is consistent with a previous mathematical model that predicts that the speed of the virus in URLanism has a maximum and then declines with receptor level. SARS-Cov-2 degrades ACE2 and thus worsens lung injury, causes vasoconstriction, possible thrombotic problemsand exacerbates the inflammatory responsedue to the cross-talk between ACE2, the prothrombotic state and the immune system. I develop here a mathematical model based on the influence of ACE2 on the speed of viral propagation and on the negative effects of its degradation. The model fits SARS-CoV-2 fatality rate across age and gender with high accuracy (r^2 ~ 0.9). Strikingly, rescaling the fitted models with the binding rates of the spike proteins of SARS and SARS-CoV-2 allow predicting the fatality rate of SARS across age and gender with high accuracy , in particular its higher severity for young patients . The epidemiology of the common-cold coronavirus NL63 is also consistent with the model and existing data on the affinity of its spike protein , thus linking the molecular and epidemiological levels. These results support the suggestion that drugs that act synergistically with ACE2 and enhance its expression , such as ACE inhibitors and angiotensin receptor blockers, may constitute a promising therapy against the most adverse effects of CoViD-19 , including hyperinflammation and thrombotic complications . Furthermore, ACE2 is a candidate prognostic factor for detecting population that needs stronger protection.", "after_revision": "The fatality rate of SARS-Cov-2 escalates with age and is larger in men than women. I show that these variations are strongly correlated with the levels of the ACE2 protein in the lungs but surprisingly , despite ACE2 is the viral receptor, higher levels lead to lower fatality. This behaviour is consistent with a previous mathematical model that predicts that the speed of viral progression in URLanism has a maximum and then declines with the receptor level. SARS-Cov-2 degrades ACE2 and thus worsens lung injury, causes vasoconstriction, thrombotic problems, and exacerbated inflammatory response. I developed a mathematical model based on the influence of ACE2 on viral propagation and on the negative effects of its degradation. The model fits SARS-CoV-2 fatality rate across age and gender with high accuracy (r^2 > 0.9). Rescaling the model parameters with the binding rates of the spike proteins of SARS-CoV and SARS-CoV-2 allows predicting the fatality rate of SARS-CoV across age and gender , in particular its higher severity for young patients , thus linking the molecular and epidemiological levels. These results support the suggestion that drugs that enhance the expression of ACE2 , such as ACE inhibitors and angiotensin receptor blockers, constitute a promising therapy against the most adverse effects of CoViD-19 . Furthermore, ACE2 is a candidate prognostic factor for detecting population that needs stronger protection.", "edit_actions": [{"type": "R", "before": "across age and gender are quantitatively explained by", "after": "are strongly correlated with", "start_char_pos": 113, "end_char_pos": 166}, {"type": "R", "before": ". This correlation also rationalizes the association between Covid-19 lethality and hypertension. Surprisingly", "after": "but surprisingly", "start_char_pos": 211, "end_char_pos": 321}, {"type": "R", "before": "values of ACE2", "after": "levels", "start_char_pos": 367, "end_char_pos": 381}, {"type": "R", "before": "the virus", "after": "viral progression", "start_char_pos": 502, "end_char_pos": 511}, {"type": "A", "before": null, "after": "the", "start_char_pos": 561, "end_char_pos": 561}, {"type": "R", "before": "possible thrombotic problemsand exacerbates the inflammatory responsedue to the cross-talk between ACE2, the prothrombotic state and the immune system. I develop here", "after": "thrombotic problems, and exacerbated inflammatory response. I developed", "start_char_pos": 658, "end_char_pos": 824}, {"type": "D", "before": "the speed of", "after": null, "start_char_pos": 880, "end_char_pos": 892}, {"type": "R", "before": "~", "after": ">", "start_char_pos": 1045, "end_char_pos": 1046}, {"type": "R", "before": "Strikingly, rescaling the fitted models", "after": "Rescaling the model parameters", "start_char_pos": 1053, "end_char_pos": 1092}, {"type": "R", "before": "SARS", "after": "SARS-CoV", "start_char_pos": 1141, "end_char_pos": 1145}, {"type": "R", "before": "allow", "after": "allows", "start_char_pos": 1161, "end_char_pos": 1166}, {"type": "R", "before": "SARS", "after": "SARS-CoV", "start_char_pos": 1199, "end_char_pos": 1203}, {"type": "D", "before": "with high accuracy", "after": null, "start_char_pos": 1226, "end_char_pos": 1244}, {"type": "D", "before": ". The epidemiology of the common-cold coronavirus NL63 is also consistent with the model and existing data on the affinity of its spike protein", "after": null, "start_char_pos": 1300, "end_char_pos": 1443}, {"type": "R", "before": "act synergistically with", "after": "enhance the expression of", "start_char_pos": 1554, "end_char_pos": 1578}, {"type": "D", "before": "and enhance its expression", "after": null, "start_char_pos": 1584, "end_char_pos": 1610}, {"type": "D", "before": "may", "after": null, "start_char_pos": 1671, "end_char_pos": 1674}, {"type": "D", "before": ", including hyperinflammation and thrombotic complications", "after": null, "start_char_pos": 1751, "end_char_pos": 1809}], "sents_char_pos": [0, 83, 212, 308, 405, 577, 809, 958, 1052, 1301, 1500, 1811]}
+{"doc_id": "2004.09426", "revision_depth": "1", "before_revision": "In this paper, we aim to integrate findings from the fields of machine learning and network science to argue URLanisms can be modeled as hierarchical Bayesian control systems with small world and bottleneck (bow tie ) network structure. The nested URLanization of such networks URLanisms to form increasingly integrated percepts and concepts of their inner and outer context, which can be compared to increasingly encompassing predictive models of the world (goal states), to allow for an optimal controlof actions . We argue that hierarchical Bayesian inference produces a hierarchy of goal states, from which it follows URLanisms must have some form of ` highest goals'. For URLanisms, these predictive models involve interior (self) models, exterior (social) models and overarching (normative) models. We show how such goals are constructed from progressively lesser goal states and that goal hierarchies tend to decompose in a top-down manner under severe and prolonged levels of stress. This loss of high-level control leads to a disinhibition of subordinate hierarchical levels, producing `critical' behavior and tipping points ( a sudden loss of homeostasis). Such phase transitions amount either to disease or the death of URLanism . This model can be used to URLanisms of any type, including humans. In humans, learning higher-level world models corresponds to personality development . A top-down collapse of high-level integrative goal states under stress is identified as a common factor in all forms of mental disease (psychopathology). The paper concludes by discussing ways of testing these hypotheses empirically.", "after_revision": "In this paper, we show URLanisms can be modeled as hierarchical Bayesian control systems with small world and information bottleneck (bow-tie ) network structure. Such systems combine hierarchical perception with hierarchical goal setting and hierarchical action control . We argue that hierarchical Bayesian control systems produce deep hierarchies of goal states, from which it follows URLanisms must have some form of ' highest goals'. For URLanisms, these involve internal (self) models, external (social) models and overarching (normative) models. We show that goal hierarchies tend to decompose in a top-down manner under severe and prolonged levels of stress. This produces behavior that favors short-term and self-referential goals over long term, social and/or normative goals. The collapse of goal hierarchies is universally accompanied by an increase in entropy (disorder) in control systems that can serve as an early warning sign for tipping points ( disease or death of URLanism ). In humans, learning goal hierarchies corresponds to personality development (maturation). The failure of goal hierarchies to mature properly corresponds to personality deficits. A top-down collapse of such hierarchies under stress is identified as a common factor in all forms of episodic mental disorders (psychopathology). The paper concludes by discussing ways of testing these hypotheses empirically.", "edit_actions": [{"type": "R", "before": "aim to integrate findings from the fields of machine learning and network science to argue", "after": "show", "start_char_pos": 18, "end_char_pos": 108}, {"type": "R", "before": "bottleneck (bow tie", "after": "information bottleneck (bow-tie", "start_char_pos": 196, "end_char_pos": 215}, {"type": "R", "before": "The nested URLanization of such networks URLanisms to form increasingly integrated percepts and concepts of their inner and outer context, which can be compared to increasingly encompassing predictive models of the world (goal states), to allow for an optimal controlof actions", "after": "Such systems combine hierarchical perception with hierarchical goal setting and hierarchical action control", "start_char_pos": 237, "end_char_pos": 514}, {"type": "R", "before": "inference produces a hierarchy", "after": "control systems produce deep hierarchies", "start_char_pos": 553, "end_char_pos": 583}, {"type": "R", "before": "`", "after": "'", "start_char_pos": 655, "end_char_pos": 656}, {"type": "R", "before": "predictive models involve interior", "after": "involve internal", "start_char_pos": 694, "end_char_pos": 728}, {"type": "R", "before": "exterior", "after": "external", "start_char_pos": 744, "end_char_pos": 752}, {"type": "D", "before": "how such goals are constructed from progressively lesser goal states and", "after": null, "start_char_pos": 813, "end_char_pos": 885}, {"type": "R", "before": "loss of high-level control leads to a disinhibition of subordinate hierarchical levels, producing `critical' behavior and", "after": "produces behavior that favors short-term and self-referential goals over long term, social and/or normative goals. The collapse of goal hierarchies is universally accompanied by an increase in entropy (disorder) in control systems that can serve as an early warning sign for", "start_char_pos": 997, "end_char_pos": 1118}, {"type": "R", "before": "a sudden loss of homeostasis). Such phase transitions amount either to disease or the", "after": "disease or", "start_char_pos": 1136, "end_char_pos": 1221}, {"type": "R", "before": ". This model can be used to URLanisms of any type, including humans.", "after": ").", "start_char_pos": 1240, "end_char_pos": 1308}, {"type": "R", "before": "higher-level world models", "after": "goal hierarchies", "start_char_pos": 1329, "end_char_pos": 1354}, {"type": "R", "before": ".", "after": "(maturation). The failure of goal hierarchies to mature properly corresponds to personality deficits.", "start_char_pos": 1394, "end_char_pos": 1395}, {"type": "R", "before": "high-level integrative goal states", "after": "such hierarchies", "start_char_pos": 1419, "end_char_pos": 1453}, {"type": "R", "before": "mental disease", "after": "episodic mental disorders", "start_char_pos": 1516, "end_char_pos": 1530}], "sents_char_pos": [0, 236, 516, 672, 804, 991, 1166, 1241, 1308, 1395, 1549]}
+{"doc_id": "2004.10002", "revision_depth": "1", "before_revision": "Prolonged sedentary behavior is related to a number of risk factors for chronic diseases. Given the high prevalence of sedentary behavior in daily life, light-weight solutions for behavior change are needed to avoid detrimental health effects. The mobile app SedVis was developed based on the Health Action Process Approach . The app provides personal mobility pattern visualization (for both physical activity and sedentary behavior) and action planning for sedentary behavior change. The primary aim of the study was to investigate the effect of mobility visualization on users' action planning for changing their sedentary behavior. The secondary aim was to evaluate user engagement with the visualization and user experience of the app. A three-week pilot studywas conducted with 16 participants who had the motivation to reduce their sedentary behavior. The results showed that the visualizations in SedVis had no statistically significant effect on the participants' action planning . The intervention involving the visualizations and action planning in SedVis had a positive effect on reducing participants' sedentary hours with weak evidence (mean -0.40, SD 0.63), while the active control condition did not decrease sedentary time (mean 0.17, SD 1.65). The results also suggested that the more frequently the users checked the app, the more they might reduce their sedentary behavior ; however, this finding did not reach statistical significance. The visualizations in the app also led to higher user-perceived novelty. No participant complained about the interruption, while some participants commented that making action plans every day was boring. Using a smartphone app to collect mobility data and provide feedback in real-time using visualizations might be a promising method to induce changes in sedentary behavior and might be more effective than action planning alone .", "after_revision": " Given the high prevalence of sedentary behavior in daily life, simple yet practical solutions for behavior change are needed to avoid detrimental health effects. The mobile app SedVis was developed based on the health action process approach . The app provides personal mobility pattern visualization (for both physical activity and sedentary behavior) and action planning for sedentary behavior change. The primary aim of the study is to investigate the effect of mobility pattern visualization on users' action planning for changing their sedentary behavior. The secondary aim is to evaluate user engagement with the visualization and user experience of the app. In a 3-week user study, participants were allocated to either an active control group (n=8) or an intervention group (n=8). In the 1-week baseline period, none of the participants had access to the functions in the app. In the following 2-week intervention period, only the intervention group was given access to the visualizations, whereas both groups were asked to make action plans every day and reduce their sedentary behavior. The results suggested that the visualizations in SedVis had no effect on the participants' action planning according to both the NHST and Bayesian statistics . The intervention involving visualizations and action planning in SedVis had a positive effect on reducing participants' sedentary hours , with weak evidence according to Bayesian statistics, whereas no change in sedentary time was more likely in the active control condition . Furthermore, Bayesian analysis weakly suggested that the more frequently the users checked the app, the more likely they were to reduce their sedentary behavior .", "edit_actions": [{"type": "D", "before": "Prolonged sedentary behavior is related to a number of risk factors for chronic diseases.", "after": null, "start_char_pos": 0, "end_char_pos": 89}, {"type": "R", "before": "light-weight", "after": "simple yet practical", "start_char_pos": 153, "end_char_pos": 165}, {"type": "R", "before": "Health Action Process Approach", "after": "health action process approach", "start_char_pos": 293, "end_char_pos": 323}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 515, "end_char_pos": 518}, {"type": "A", "before": null, "after": "pattern", "start_char_pos": 557, "end_char_pos": 557}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 655, "end_char_pos": 658}, {"type": "R", "before": "A three-week pilot studywas conducted with 16 participants who had the motivation to", "after": "In a 3-week user study, participants were allocated to either an active control group (n=8) or an intervention group (n=8). In the 1-week baseline period, none of the participants had access to the functions in the app. In the following 2-week intervention period, only the intervention group was given access to the visualizations, whereas both groups were asked to make action plans every day and", "start_char_pos": 742, "end_char_pos": 826}, {"type": "R", "before": "showed", "after": "suggested", "start_char_pos": 872, "end_char_pos": 878}, {"type": "D", "before": "statistically significant", "after": null, "start_char_pos": 920, "end_char_pos": 945}, {"type": "A", "before": null, "after": "according to both the NHST and Bayesian statistics", "start_char_pos": 990, "end_char_pos": 990}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1020, "end_char_pos": 1023}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1133, "end_char_pos": 1133}, {"type": "R", "before": "(mean -0.40, SD 0.63), while", "after": "according to Bayesian statistics, whereas no change in sedentary time was more likely in", "start_char_pos": 1153, "end_char_pos": 1181}, {"type": "R", "before": "did not decrease sedentary time (mean 0.17, SD 1.65). The results also", "after": ". Furthermore, Bayesian analysis weakly", "start_char_pos": 1211, "end_char_pos": 1281}, {"type": "R", "before": "they might", "after": "likely they were to", "start_char_pos": 1353, "end_char_pos": 1363}, {"type": "D", "before": "; however, this finding did not reach statistical significance. The visualizations in the app also led to higher user-perceived novelty. No participant complained about the interruption, while some participants commented that making action plans every day was boring. Using a smartphone app to collect mobility data and provide feedback in real-time using visualizations might be a promising method to induce changes in sedentary behavior and might be more effective than action planning alone", "after": null, "start_char_pos": 1396, "end_char_pos": 1889}], "sents_char_pos": [0, 89, 243, 325, 485, 636, 741, 859, 992, 1264, 1397, 1459, 1532, 1663]}
+{"doc_id": "2004.10117", "revision_depth": "5", "before_revision": "In severe viral pneumonia, including Coronavirus disease 2019 (COVID-19), the viral replication phase is often followed by hyperinflammation ('cytokine storm syndrome') , which can lead to acute respiratory distress syndrome, URLan failure, and death. We previously demonstrated that alpha-1 adrenergic receptor (\\alpha_1-AR) antagonists can prevent cytokine storm syndrome in mice. Here, we conducted retrospective analyses in two cohorts of patients with acute respiratory distress (ARD, n= 19,659 ) and three cohorts with pneumonia (n= 423,897 ). Federated across two ARD cohorts, our main result shows that patients using \\alpha_1-AR antagonists, as compared to nonusers , had a 40 \\% relative risk reduction for ventilation and dying ( p= 0.014 ). We replicated these methods on three pneumonia cohorts, all with similar effects on both outcomes. All results were robust to various sensitivity analyses. These results highlight the urgent need for prospective trials testing whether prophylactic use of \\alpha_1-AR antagonists ameliorates diseases associated with cytokine storm syndrome, such as COVID-19.", "after_revision": "In severe viral pneumonia, including Coronavirus disease 2019 (COVID-19), the viral replication phase is often followed by hyperinflammation , which can lead to acute respiratory distress syndrome, URLan failure, and death. We previously demonstrated that alpha-1 adrenergic receptor (\\alpha_1-AR) antagonists can prevent hyperinflammation ( cytokine storm syndrome ) in mice. Here, we conducted retrospective analyses in two cohorts of patients with acute respiratory distress (ARD, n= 18,547 ) and three cohorts with pneumonia (n= 400,907 ). Federated across two ARD cohorts, we find that patients exposed to \\alpha_1-AR antagonists, as compared to unexposed patients , had a 34 \\% relative risk reduction for mechanical ventilation and death (OR=0.70, p= 0.021 ). We replicated these methods on three pneumonia cohorts, all with similar effects on both outcomes. All results were robust to sensitivity analyses. These results highlight the urgent need for prospective trials testing whether prophylactic use of \\alpha_1-AR antagonists ameliorates lower respiratory tract infection-associated cytokine storm syndrome, as observed in COVID-19.", "edit_actions": [{"type": "D", "before": "('cytokine storm syndrome')", "after": null, "start_char_pos": 141, "end_char_pos": 168}, {"type": "A", "before": null, "after": "hyperinflammation (", "start_char_pos": 350, "end_char_pos": 350}, {"type": "A", "before": null, "after": ")", "start_char_pos": 375, "end_char_pos": 375}, {"type": "R", "before": "19,659", "after": "18,547", "start_char_pos": 495, "end_char_pos": 501}, {"type": "R", "before": "423,897", "after": "400,907", "start_char_pos": 541, "end_char_pos": 548}, {"type": "R", "before": "our main result shows that patients using", "after": "we find that patients exposed to", "start_char_pos": 586, "end_char_pos": 627}, {"type": "R", "before": "nonusers", "after": "unexposed patients", "start_char_pos": 668, "end_char_pos": 676}, {"type": "R", "before": "40", "after": "34", "start_char_pos": 685, "end_char_pos": 687}, {"type": "R", "before": "ventilation and dying (", "after": "mechanical ventilation and death (OR=0.70,", "start_char_pos": 719, "end_char_pos": 742}, {"type": "R", "before": "0.014", "after": "0.021", "start_char_pos": 746, "end_char_pos": 751}, {"type": "D", "before": "various", "after": null, "start_char_pos": 881, "end_char_pos": 888}, {"type": "R", "before": "diseases associated with", "after": "lower respiratory tract infection-associated", "start_char_pos": 1046, "end_char_pos": 1070}, {"type": "R", "before": "such as", "after": "as observed in", "start_char_pos": 1096, "end_char_pos": 1103}], "sents_char_pos": [0, 251, 384, 551, 754, 853, 910]}
+{"doc_id": "2004.11173", "revision_depth": "1", "before_revision": "We investigate a number of coloring problems restricted to bipartite graphs with bounded diameter. We prove that the k-List Coloring, List k-Coloring, and k-Precoloring Extension problems are NP-complete on bipartite graphs with diameter at most d, for every k%DIFDELCMD < \\ge %%% 4 and every d%DIFDELCMD < \\ge %%% 3, and for k=3 and d%DIFDELCMD < \\ge %%% 4, and that List k-Coloring is polynomial when d=2 (i.e., on complete bipartite graphs) for every k \\geq 3. Since k-List Coloring was already known to be NP-complete on complete bipartite graphs, and polynomial for k=2 on general graphs, the only remaining open problems are List 3-Coloring and 3-Precoloring Extension when d=3. We also prove that the Surjective C_6-Homomorphism problem is NP-complete on bipartite graphs with diameter at most 4, answering a question posed by Bodirsky, K\\'ara, and Martin [ Discret. Appl. Math. 2012 . As a byproduct, we get that deciding whether V(G) can be partitioned into 3 subsets each inducing a complete bipartite graph is NP-complete. An attempt to prove this result was presented by Fleischner, Mujuni, Paulusma, and Szeider Theor. Comput. Sci. 2009], but we realized that there was an apparently non-fixable flaw in their proof . Finally, we prove that the 3-Fall Coloring problem is NP-complete on bipartite graphs with diameter at most 4, and give a polynomial reduction from 3-Fall Coloring on bipartite graphs with diameter 3 to 3-Precoloring Extension on bipartite graphs with diameter 3. The latter result implies that if 3-Fall Coloring is NP-complete on these graphs, then the complexity gaps mentioned above for List k-Coloring and k-Precoloring Extension would be closed . This would also answer a question posed by Kratochv\\'il, Tuza, and Voigt Proc. of WG 2002].", "after_revision": "We investigate a number of coloring problems restricted to bipartite graphs with bounded diameter. First, we investigate the k-List Coloring, List k-Coloring, and k-Precoloring Extension problems on bipartite graphs with diameter at most d, %DIFDELCMD < \\ge %%% %DIFDELCMD < \\ge %%% %DIFDELCMD < \\ge %%% proving NP-completeness in most cases, and leaving open only the List 3-Coloring and 3-Precoloring Extension problems when d=3. Some of these results are obtained through a proof that the Surjective C_6-Homomorphism problem is NP-complete on bipartite graphs with diameter at most four. Although the latter result has been already proved [ Vikas, 2017 , we present ours as an alternative simpler one. As a byproduct, we also get that 3-Biclique Partition is NP-complete. An attempt to prove this result was presented in Fleischner, Mujuni, Paulusma, and Szeider , 2009], but there was a flaw in their proof , which we identify and discuss here . Finally, we prove that the 3-Fall Coloring problem is NP-complete on bipartite graphs with diameter at most four, and prove that NP-completeness for diameter three would also imply NP-completeness of 3-Precoloring Extension on diameter three, thus closing the previously mentioned open cases . This would also answer a question posed in Kratochv\\'il, Tuza, and Voigt , 2002].", "edit_actions": [{"type": "R", "before": "We prove that", "after": "First, we investigate", "start_char_pos": 99, "end_char_pos": 112}, {"type": "D", "before": "are NP-complete", "after": null, "start_char_pos": 188, "end_char_pos": 203}, {"type": "D", "before": "for every k", "after": null, "start_char_pos": 249, "end_char_pos": 260}, {"type": "D", "before": "4 and every d", "after": null, "start_char_pos": 281, "end_char_pos": 294}, {"type": "D", "before": "3, and for k=3 and d", "after": null, "start_char_pos": 315, "end_char_pos": 335}, {"type": "R", "before": "4, and that List k-Coloring is polynomial when d=2 (i.e., on complete bipartite graphs) for every k \\geq 3. Since k-List Coloring was already known to be NP-complete on complete bipartite graphs, and polynomial for k=2 on general graphs, the only remaining open problems are", "after": "proving NP-completeness in most cases, and leaving open only the", "start_char_pos": 356, "end_char_pos": 630}, {"type": "A", "before": null, "after": "problems", "start_char_pos": 675, "end_char_pos": 675}, {"type": "R", "before": "We also prove", "after": "Some of these results are obtained through a proof", "start_char_pos": 686, "end_char_pos": 699}, {"type": "R", "before": "4, answering a question posed by Bodirsky, K\\'ara, and Martin", "after": "four. Although the latter result has been already proved", "start_char_pos": 802, "end_char_pos": 863}, {"type": "D", "before": "Discret. Appl. Math. 2012", "after": null, "start_char_pos": 866, "end_char_pos": 891}, {"type": "R", "before": ".", "after": "Vikas, 2017", "start_char_pos": 892, "end_char_pos": 893}, {"type": "A", "before": null, "after": ", we present ours as an alternative simpler one.", "start_char_pos": 894, "end_char_pos": 894}, {"type": "R", "before": "get that deciding whether V(G) can be partitioned into 3 subsets each inducing a complete bipartite graph", "after": "also get that 3-Biclique Partition", "start_char_pos": 914, "end_char_pos": 1019}, {"type": "R", "before": "by", "after": "in", "start_char_pos": 1082, "end_char_pos": 1084}, {"type": "R", "before": "Theor. Comput. Sci.", "after": ",", "start_char_pos": 1127, "end_char_pos": 1146}, {"type": "R", "before": "we realized that there was an apparently non-fixable", "after": "there was a", "start_char_pos": 1158, "end_char_pos": 1210}, {"type": "A", "before": null, "after": ", which we identify and discuss here", "start_char_pos": 1231, "end_char_pos": 1231}, {"type": "R", "before": "4, and give a polynomial reduction from 3-Fall Coloring on bipartite graphs with diameter 3 to", "after": "four, and prove that NP-completeness for diameter three would also imply NP-completeness of", "start_char_pos": 1342, "end_char_pos": 1436}, {"type": "R", "before": "bipartite graphs with diameter 3. The latter result implies that if 3-Fall Coloring is NP-complete on these graphs, then the complexity gaps mentioned above for List k-Coloring and k-Precoloring Extension would be closed", "after": "diameter three, thus closing the previously mentioned open cases", "start_char_pos": 1464, "end_char_pos": 1684}, {"type": "R", "before": "by", "after": "in", "start_char_pos": 1727, "end_char_pos": 1729}, {"type": "R", "before": "Proc. of WG", "after": ",", "start_char_pos": 1760, "end_char_pos": 1771}], "sents_char_pos": [0, 98, 443, 685, 874, 1035, 1133, 1233, 1497, 1686]}
+{"doc_id": "2004.11355", "revision_depth": "4", "before_revision": "Official counts of COVID-19 deaths have been criticized for potentially including people who did not die of COVID-19 but merely died with COVID-19. I address that critique by fitting a generalized additive model to weekly counts of all registered deaths in England and Wales during the 2010s. The model produces baseline rates of death registrations expected in the absence of the COVID-19 pandemic, and comparing those baselines to recent counts of registered deaths exposes the emergence of excess deaths late in March 2020. Among\\pm adults aged 45+ , about 38,700 excess deaths were registered in the 5 weeks comprising 21 March through 24 April (612 \\pm 416 from 21-27 March, 5675%DIFDELCMD < \\pm %%% 439 from 28 March through 3 April,then 9183%DIFDELCMD < \\pm %%% 468, 12,712%DIFDELCMD < \\pm %%% 589, and 10,511%DIFDELCMD < \\pm %%% 567 in April's next 3 weeks ). Both the Office for National Statistics's respective count of 26,891 death certificates which mention COVID-19, and the Department of Health and Social Care's hospital-focused count of 21,222 deaths, are appreciably less, implying that their counting methods have underestimated rather than overestimated the pandemic's true death toll. If underreporting rates have held steady , about 45,900 direct and indirect COVID-19 deaths might have been registered by April's end but not yet publicly reported in full.", "after_revision": "Official counts of COVID-19 deaths have been criticized for potentially including people who did not die of COVID-19 but merely died with COVID-19. I address that critique by fitting a generalized additive model to weekly counts of all deaths registered in England and Wales during the 2010s. The model produces baseline rates of death registrations expected without the COVID-19 pandemic, and comparing those baselines to recent counts of registered deaths exposes the emergence of excess deaths late in March 2020. By April's end, England and Wales registered 45,300\\pm 3200 excess deaths of adults aged 45+ . Through 8 May, the last day of available all-deaths data, 50,400 \\pm %DIFDELCMD < \\pm %%% %DIFDELCMD < \\pm %%% %DIFDELCMD < \\pm %%% %DIFDELCMD < \\pm %%% 3600 were registered (about 53\\% of which were of men ). Both the ONS's corresponding count of 36,870 death certificates which mention COVID-19, and the Department of Health and Social Care's hospital-focused count of 29,057 deaths, are appreciably less, implying that their counting methods have underestimated , not overestimated, the pandemic's true death toll. If underreporting rates have held steady during May, about 56,600 direct and indirect COVID-19 deaths might have been registered through 25 May but not yet publicly reported in full.", "edit_actions": [{"type": "R", "before": "registered deaths", "after": "deaths registered", "start_char_pos": 236, "end_char_pos": 253}, {"type": "R", "before": "in the absence of the", "after": "without the", "start_char_pos": 359, "end_char_pos": 380}, {"type": "R", "before": "Among", "after": "By April's end, England and Wales registered 45,300", "start_char_pos": 527, "end_char_pos": 532}, {"type": "A", "before": null, "after": "3200 excess deaths of", "start_char_pos": 536, "end_char_pos": 536}, {"type": "R", "before": ", about 38,700 excess deaths were registered in the 5 weeks comprising 21 March through 24 April (612", "after": ". Through 8 May, the last day of available all-deaths data, 50,400", "start_char_pos": 553, "end_char_pos": 654}, {"type": "D", "before": "416 from 21-27 March, 5675", "after": null, "start_char_pos": 659, "end_char_pos": 685}, {"type": "D", "before": "439 from 28 March through 3 April,then 9183", "after": null, "start_char_pos": 706, "end_char_pos": 749}, {"type": "D", "before": "468, 12,712", "after": null, "start_char_pos": 770, "end_char_pos": 781}, {"type": "D", "before": "589, and 10,511", "after": null, "start_char_pos": 802, "end_char_pos": 817}, {"type": "R", "before": "567 in April's next 3 weeks", "after": "3600 were registered (about 53\\% of which were of men", "start_char_pos": 838, "end_char_pos": 865}, {"type": "R", "before": "Office for National Statistics's respective count of 26,891", "after": "ONS's corresponding count of 36,870", "start_char_pos": 878, "end_char_pos": 937}, {"type": "R", "before": "21,222", "after": "29,057", "start_char_pos": 1054, "end_char_pos": 1060}, {"type": "R", "before": "rather than overestimated", "after": ", not overestimated,", "start_char_pos": 1148, "end_char_pos": 1173}, {"type": "R", "before": ", about 45,900", "after": "during May, about 56,600", "start_char_pos": 1247, "end_char_pos": 1261}, {"type": "R", "before": "by April's end", "after": "through 25 May", "start_char_pos": 1325, "end_char_pos": 1339}], "sents_char_pos": [0, 147, 292, 526, 868, 1205]}
+{"doc_id": "2004.12224", "revision_depth": "1", "before_revision": "We study the problem of maximizing a monotone submodular function subject to a Multiple Knapsack constraint (SMKP) . The input is a set I of items, each associated with a non-negative weight, and a set of bins , each having a capacity . Also, we are given a submodular, monotone and non-negative function f over subsets of the items. The objective is to find a subset of items A \\subseteq I and a packing of the items in the bins , such that f(A) is maximized. SMKP is a natural extension of both Multiple Knapsack and the problem of monotone submodular maximization subject to a knapsack constraint. Our main result is a nearly optimal polynomial time (1-e^{-1}- \\varepsilon \\eps )-approximation algorithm for the problem, for any \\varepsilon \\eps >0. Our algorithm relies on a refined analysis of techniques for constrained submodular optimization combined with sophisticated application of tools used in the development of approximation schemes for packing problems .", "after_revision": "We study the problem of maximizing a monotone submodular function subject to a Multiple Knapsack constraint . The input is a set I of items, each has a non-negative weight, and a set of bins of arbitrary capacities . Also, we are given a submodular, monotone and non-negative function f over subsets of the items. The objective is to find a packing of a subset of items A \\subseteq I in the bins such that f(A) is maximized. Our main result is an almost optimal polynomial time (1-e^{-1}- \\eps )-approximation algorithm for the problem, for any \\eps >0. The algorithm relies on a structuring technique which converts a general multiple knapsack constraint to a constraint in which the bins are partitioned into groups of exponentially increasing cardinalities, each consisting of bins of uniform capacity. We derive the result by combining structuring with a refined analysis of techniques for submodular optimization subject to knapsack constraints .", "edit_actions": [{"type": "D", "before": "(SMKP)", "after": null, "start_char_pos": 108, "end_char_pos": 114}, {"type": "R", "before": "associated with", "after": "has", "start_char_pos": 153, "end_char_pos": 168}, {"type": "R", "before": ", each having a capacity", "after": "of arbitrary capacities", "start_char_pos": 210, "end_char_pos": 234}, {"type": "A", "before": null, "after": "packing of a", "start_char_pos": 361, "end_char_pos": 361}, {"type": "D", "before": "and a packing of the items", "after": null, "start_char_pos": 392, "end_char_pos": 418}, {"type": "D", "before": ",", "after": null, "start_char_pos": 431, "end_char_pos": 432}, {"type": "D", "before": "SMKP is a natural extension of both Multiple Knapsack and the problem of monotone submodular maximization subject to a knapsack constraint.", "after": null, "start_char_pos": 462, "end_char_pos": 601}, {"type": "R", "before": "a nearly", "after": "an almost", "start_char_pos": 621, "end_char_pos": 629}, {"type": "D", "before": "\\varepsilon", "after": null, "start_char_pos": 665, "end_char_pos": 676}, {"type": "D", "before": "\\varepsilon", "after": null, "start_char_pos": 733, "end_char_pos": 744}, {"type": "R", "before": "Our", "after": "The", "start_char_pos": 754, "end_char_pos": 757}, {"type": "A", "before": null, "after": "structuring technique which converts a general multiple knapsack constraint to a constraint in which the bins are partitioned into groups of exponentially increasing cardinalities, each consisting of bins of uniform capacity. We derive the result by combining structuring with a", "start_char_pos": 780, "end_char_pos": 780}, {"type": "R", "before": "constrained submodular optimization combined with sophisticated application of tools used in the development of approximation schemes for packing problems", "after": "submodular optimization subject to knapsack constraints", "start_char_pos": 816, "end_char_pos": 970}], "sents_char_pos": [0, 116, 236, 333, 461, 601, 753]}
+{"doc_id": "2004.12297", "revision_depth": "1", "before_revision": "Many information retrieval and natural language processing problems can be formalized as a semantic matchingtask. However, the existing work in this area has been focused in large part on the matching between short texts like finding answer spans, sentences and passages given a query or a natural language question. Semantic matching between long-form texts like documents, which can be applied to applications such as document clustering, news recommendationand related article recommendation , is relatively less explored and needs more research effort. In recent years, self-attention based models like Transformers and BERT have achieved state-of-the-art performance in several natural language understanding tasks. These kinds of models, however, are still restricted to short text sequences like sentences due to the quadratic computational time and space complexity of self-attention with respect to the input sequence length. In this paper, we address these issues by proposing the Siamese Multi-depth Transformer-based Hierarchical (SMITH) Encoder for document representation learning and matching, which contains several novel design choices to adapt self-attention models for long text inputs. For model pre-training, we propose the masked sentence block language modeling task in addition to the original masked word language modeling task used in BERT, to capture sentence block relations within a document. The experimental results on several benchmark data sets for long-form document matching show that our proposed SMITH model outperforms the previous state-of-the-art Siamese matching models including hierarchical attention, multi-depth attention-based hierarchical recurrent neural network, and BERT for long-form document matching, and increases the maximum input text length from 512 to 2048 when compared with BERT-based baseline methods .", "after_revision": "Many natural language processing and information retrieval problems can be formalized as the task of semantic matching. Existing work in this area has been largely focused on matching between short texts (e.g., question answering), or between a short and a long text (e.g., ad-hoc retrieval). Semantic matching between long-form documents, which has many important applications like news recommendation, related article recommendation and document clustering , is relatively less explored and needs more research effort. In recent years, self-attention based models like Transformers and BERT have achieved state-of-the-art performance in the task of text matching. These models, however, are still limited to short text like a few sentences or one paragraph due to the quadratic computational complexity of self-attention with respect to input text length. In this paper, we address the issue by proposing the Siamese Multi-depth Transformer-based Hierarchical (SMITH) Encoder for long-form document matching. Our model contains several innovations to adapt self-attention models for longer text input. In order to better capture sentence level semantic relations within a document, we pre-train the model with a novel masked sentence block language modeling task in addition to the masked word language modeling task used by BERT. Our experimental results on several benchmark datasets for long-form document matching show that our proposed SMITH model outperforms the previous state-of-the-art models including hierarchical attention, multi-depth attention-based hierarchical recurrent neural network, and BERT . Comparing to BERT based baselines, our model is able to increase maximum input text length from 512 to 2048. We will open source a Wikipedia based benchmark dataset, code and a pre-trained checkpoint to accelerate future research on long-form document matching .", "edit_actions": [{"type": "D", "before": "information retrieval and", "after": null, "start_char_pos": 5, "end_char_pos": 30}, {"type": "A", "before": null, "after": "and information retrieval", "start_char_pos": 59, "end_char_pos": 59}, {"type": "R", "before": "a semantic matchingtask. However, the existing", "after": "the task of semantic matching. Existing", "start_char_pos": 90, "end_char_pos": 136}, {"type": "R", "before": "focused in large part on the", "after": "largely focused on", "start_char_pos": 164, "end_char_pos": 192}, {"type": "R", "before": "like finding answer spans, sentences and passages given a query or a natural language question.", "after": "(e.g., question answering), or between a short and a long text (e.g., ad-hoc retrieval).", "start_char_pos": 222, "end_char_pos": 317}, {"type": "D", "before": "texts like", "after": null, "start_char_pos": 354, "end_char_pos": 364}, {"type": "R", "before": "can be applied to applications such as document clustering, news recommendationand", "after": "has many important applications like news recommendation,", "start_char_pos": 382, "end_char_pos": 464}, {"type": "A", "before": null, "after": "and document clustering", "start_char_pos": 496, "end_char_pos": 496}, {"type": "R", "before": "several natural language understanding tasks. These kinds of", "after": "the task of text matching. These", "start_char_pos": 677, "end_char_pos": 737}, {"type": "R", "before": "restricted", "after": "limited", "start_char_pos": 765, "end_char_pos": 775}, {"type": "R", "before": "sequences like sentences", "after": "like a few sentences or one paragraph", "start_char_pos": 790, "end_char_pos": 814}, {"type": "D", "before": "time and space", "after": null, "start_char_pos": 850, "end_char_pos": 864}, {"type": "R", "before": "the input sequence", "after": "input text", "start_char_pos": 910, "end_char_pos": 928}, {"type": "R", "before": "these issues", "after": "the issue", "start_char_pos": 963, "end_char_pos": 975}, {"type": "R", "before": "document representation learning and matching, which contains several novel design choices", "after": "long-form document matching. Our model contains several innovations", "start_char_pos": 1064, "end_char_pos": 1154}, {"type": "R", "before": "long text inputs. For model pre-training, we propose the", "after": "longer text input. In order to better capture sentence level semantic relations within a document, we pre-train the model with a novel", "start_char_pos": 1190, "end_char_pos": 1246}, {"type": "D", "before": "original", "after": null, "start_char_pos": 1311, "end_char_pos": 1319}, {"type": "R", "before": "in BERT, to capture sentence block relations within a document. The", "after": "by BERT. Our", "start_char_pos": 1360, "end_char_pos": 1427}, {"type": "R", "before": "data sets", "after": "datasets", "start_char_pos": 1470, "end_char_pos": 1479}, {"type": "D", "before": "Siamese matching", "after": null, "start_char_pos": 1589, "end_char_pos": 1605}, {"type": "R", "before": "for long-form document matching, and increases the", "after": ". Comparing to BERT based baselines, our model is able to increase", "start_char_pos": 1723, "end_char_pos": 1773}, {"type": "R", "before": "2048 when compared with BERT-based baseline methods", "after": "2048. We will open source a Wikipedia based benchmark dataset, code and a pre-trained checkpoint to accelerate future research on long-form document matching", "start_char_pos": 1812, "end_char_pos": 1863}], "sents_char_pos": [0, 114, 317, 558, 722, 936, 1207, 1423]}
+{"doc_id": "2004.12692", "revision_depth": "1", "before_revision": "Let {\\cal G} be a graph class. We say that a graph G is a k-apex of {\\cal G} if G contains a set S of at most k vertices such that G\\setminus S belongs to {\\cal G}. We prove that if {\\cal {\\cal G} is minor-closed, then there is{\\cal {\\cal {\\cal {\\cal {\\cal an algorithm that (k)}\\cdot n^3-time and } either returns a set S certifying that G is a k-apex of {\\cal {\\cal G} or reports that such a set does not exist, in 2^{{\\sf poly(k)}\\cdot n^3 time} \\notin {\\cal {\\cal . Here {\\sf poly} is a polynomial function whose degree depends on the maximum size of a minor-obstruction of {\\cal G} , i. e., the minor-minimal set of graphs not belonging to%DIFDELCMD < {\\cal %%% G . In the special case where {\\cal G} excludes some apex graph as a minor, we give an alternative algorithm running in 2^{{\\sf poly}(k)}\\cdot n^2 time .", "after_revision": "Let {\\cal G} be a minor-closed graph class. We say that a graph G is a k-apex of {\\cal G} if G contains a set S of at most k vertices such that G\\setminus S belongs to {\\cal G}. We denote by {\\cal A _k ({\\cal G} ) the set of all graphs that are k-apices of{\\cal G . In the first paper of this series we obtained upper bounds on the size of the graphs in the minor-obstruction set of{\\cal A _k ({\\cal G ), i.e., the minor-minimal set of graphs not belonging to{\\cal A _k ({\\cal G ). In this article we provide an algorithm that , given a graph G on n vertices, runs in 2^{{\\sf poly(k)}\\cdot n^3-time and } either returns a set S certifying that G \\in {\\cal A _k ({\\cal G} ), or reports that (k)}\\cdot n^3 time} G\\notin {\\cal A _k ({\\cal G ) . Here {\\sf poly} is a polynomial function whose degree depends on the maximum size of a minor-obstruction of {\\cal G} %DIFDELCMD < {\\cal %%% . In the special case where {\\cal G} excludes some apex graph as a minor, we give an alternative algorithm running in 2^{{\\sf poly}(k)}\\cdot n^2 -time .", "edit_actions": [{"type": "A", "before": null, "after": "minor-closed", "start_char_pos": 18, "end_char_pos": 18}, {"type": "R", "before": "prove that if", "after": "denote by", "start_char_pos": 169, "end_char_pos": 182}, {"type": "A", "before": null, "after": "A", "start_char_pos": 189, "end_char_pos": 189}, {"type": "A", "before": null, "after": "_k (", "start_char_pos": 190, "end_char_pos": 190}, {"type": "R", "before": "is minor-closed, then there is", "after": ") the set of all graphs that are k-apices of", "start_char_pos": 199, "end_char_pos": 229}, {"type": "A", "before": null, "after": "G", "start_char_pos": 235, "end_char_pos": 235}, {"type": "A", "before": null, "after": ". In the first paper of this series we obtained upper bounds on the size of the graphs in the minor-obstruction set of", "start_char_pos": 236, "end_char_pos": 236}, {"type": "A", "before": null, "after": "A", "start_char_pos": 242, "end_char_pos": 242}, {"type": "A", "before": null, "after": "_k (", "start_char_pos": 243, "end_char_pos": 243}, {"type": "A", "before": null, "after": "G", "start_char_pos": 249, "end_char_pos": 249}, {"type": "A", "before": null, "after": "), i.e., the minor-minimal set of graphs not belonging to", "start_char_pos": 250, "end_char_pos": 250}, {"type": "A", "before": null, "after": "A", "start_char_pos": 256, "end_char_pos": 256}, {"type": "A", "before": null, "after": "_k (", "start_char_pos": 257, "end_char_pos": 257}, {"type": "A", "before": null, "after": "G", "start_char_pos": 263, "end_char_pos": 263}, {"type": "A", "before": null, "after": "). In this article we provide", "start_char_pos": 264, "end_char_pos": 264}, {"type": "A", "before": null, "after": ", given a graph G on n vertices, runs in 2^{{\\sf poly", "start_char_pos": 283, "end_char_pos": 283}, {"type": "R", "before": "is a k-apex of", "after": "\\in", "start_char_pos": 349, "end_char_pos": 363}, {"type": "A", "before": null, "after": "A", "start_char_pos": 370, "end_char_pos": 370}, {"type": "A", "before": null, "after": "_k (", "start_char_pos": 371, "end_char_pos": 371}, {"type": "A", "before": null, "after": "),", "start_char_pos": 380, "end_char_pos": 380}, {"type": "D", "before": "such a set does not exist, in 2^{{\\sf poly", "after": null, "start_char_pos": 397, "end_char_pos": 439}, {"type": "A", "before": null, "after": "G", "start_char_pos": 459, "end_char_pos": 459}, {"type": "A", "before": null, "after": "A", "start_char_pos": 472, "end_char_pos": 472}, {"type": "A", "before": null, "after": "_k (", "start_char_pos": 473, "end_char_pos": 473}, {"type": "A", "before": null, "after": "G", "start_char_pos": 479, "end_char_pos": 479}, {"type": "A", "before": null, "after": ")", "start_char_pos": 480, "end_char_pos": 480}, {"type": "D", "before": ", i. e., the minor-minimal set of graphs not belonging to", "after": null, "start_char_pos": 600, "end_char_pos": 657}, {"type": "D", "before": "G", "after": null, "start_char_pos": 680, "end_char_pos": 681}, {"type": "R", "before": "time", "after": "-time", "start_char_pos": 827, "end_char_pos": 831}], "sents_char_pos": [0, 31, 165, 482]}
+{"doc_id": "2004.12765", "revision_depth": "2", "before_revision": "Automatic humor detection has interesting use cases in modern technologies, such as chatbots and virtual assistants. Based on the general linguistic structure of humor, in this paper, we propose a novel approach for detecting humor in short texts by using BERT sentence embedding . Our proposed method uses BERT to generate embeddings for sentences of a given text and uses these embeddings as inputs for parallel lines of hidden layers in a neural network. These lines are finally concatenated to predict the target value. For evaluation purposes, we created a new dataset for humor detection consisting of 200k formal short texts (100k positive and 100k negative). Experimental results show that our proposed method can determine humor in short texts with accuracy and an F1-score of 98.2 percent. Our 8-layer model with 110M parameters outperforms all baseline models with a large margin, showing the importance of utilizing linguistic structure in machine learning models.", "after_revision": "Automatic humor detection has interesting use cases in modern technologies, such as chatbots and virtual assistants. In this paper, we propose a novel approach for detecting humor in short texts based on the general linguistic structure of humor . Our proposed method uses BERT to generate embeddings for sentences of a given text and uses these embeddings as inputs of parallel lines of hidden layers in a neural network. These lines are finally concatenated to predict the target value. For evaluation purposes, we created a new dataset for humor detection consisting of 200k formal short texts (100k positive and 100k negative). Experimental results show that our proposed method can determine humor in short texts with accuracy and an F1-score of 98.2 percent. Our 8-layer model with 110M parameters outperforms the baseline models with a large margin, showing the importance of utilizing linguistic structure of texts in machine learning models.", "edit_actions": [{"type": "R", "before": "Based on the general linguistic structure of humor, in", "after": "In", "start_char_pos": 117, "end_char_pos": 171}, {"type": "R", "before": "by using BERT sentence embedding", "after": "based on the general linguistic structure of humor", "start_char_pos": 247, "end_char_pos": 279}, {"type": "R", "before": "for", "after": "of", "start_char_pos": 401, "end_char_pos": 404}, {"type": "R", "before": "all", "after": "the", "start_char_pos": 851, "end_char_pos": 854}, {"type": "A", "before": null, "after": "of texts", "start_char_pos": 949, "end_char_pos": 949}], "sents_char_pos": [0, 116, 281, 457, 523, 666, 799]}
+{"doc_id": "2004.12836", "revision_depth": "1", "before_revision": "The total number of COVID-19 infections is critical information for decision makers when assessing the progress of the pandemic, its implications, and policy options . Despite efforts to carefully monitor the COVID-19 pandemic, the reported number of confirmed cases is likely to underestimate the actual number of infections. We aim to estimate the total number of COVID-19 infections in a straightforward manner using a demographic scaling model. This model is broadly applicable as it is based on little input data : deaths attributable to COVID-19 , COVID-19 infection fatality rates , and life tables. As many countries lack reliable estimates of age-specific infection fatality rates, we map them from a reference country onto countries of interest based on remaining life expectancy . This scaling accounts for cross-country differences in the age structure, the health status, and the health care system. We also introduce easy to apply formulas to quantify the bias that would be required in death counts and infection fatality rates in order to reproduce a certain estimate of infections. Across the 10 countries with most COVID-19 deaths as of April 17 , 2020, our estimates suggest that the total number of infected is approximately 4 times the number of ] confirmed cases. The uncertainty, however, is high, as the lower bound of the 95\\% prediction interval suggests on average twice as many infections than confirmed cases, and the upper bound 10 times as many. Comparing our results with findings from local seroprevalence studies and applying our bias formulas shows that some of their infection estimates would only be possible if just a small fraction of COVID-19 related deaths were recorded, indicating that these seroprevalence estimates might not be representative for the total population.", "after_revision": "Understanding how widely COVID-19 has spread is critical for examining the pandemic's progression . Despite efforts to carefully monitor the pandemic, the number of confirmed cases may underestimate the total number of infections. We introduce a demographic scaling model to estimate COVID-19 infections using an broadly applicable approach that is based on minimal data requirements: COVID-19 related deaths, infection fatality rates (IFRs) , and life tables. As many countries lack reliable estimates of age-specific IFRs, we scale IFRs between countries using remaining life expectancy as a marker to account for differences in age structures, health conditions, and medical services. Across 10 countries with most COVID-19 deaths as of May 13 , 2020, the number of infections is estimated to be four 95\\% prediction interval: 2-11] times higher than the number of confirmed cases. Cross-country variation is high. The estimated number of infections is 1.4 million (six times the number of confirmed cases) for Italy; 3.1 million (2.2 times the number of confirmed cases) for the U.S.; and 1.8 times the number of confirmed cases for Germany, where testing has been comparatively extensive. Our prevalence estimates, however, are markedly lower than most others based on local seroprevalence studies . We introduce formulas for quantifying the bias that is required in our data on deaths in order to reproduce estimates published elsewhere. This bias analysis shows that either COVID-19 deaths are severely underestimated, by a factor of two or more; or alternatively, the seroprevalence based results are overestimates and not representative for the total population.", "edit_actions": [{"type": "R", "before": "The total number of", "after": "Understanding how widely", "start_char_pos": 0, "end_char_pos": 19}, {"type": "R", "before": "infections is critical information for decision makers when assessing the progress of the pandemic, its implications, and policy options", "after": "has spread is critical for examining the pandemic's progression", "start_char_pos": 29, "end_char_pos": 165}, {"type": "D", "before": "COVID-19", "after": null, "start_char_pos": 209, "end_char_pos": 217}, {"type": "D", "before": "reported", "after": null, "start_char_pos": 232, "end_char_pos": 240}, {"type": "R", "before": "is likely to underestimate the actual", "after": "may underestimate the total", "start_char_pos": 267, "end_char_pos": 304}, {"type": "R", "before": "aim to estimate the total number of", "after": "introduce a demographic scaling model to estimate", "start_char_pos": 330, "end_char_pos": 365}, {"type": "R", "before": "in a straightforward manner using a demographic scaling model. This model is broadly applicable as it", "after": "using an broadly applicable approach that", "start_char_pos": 386, "end_char_pos": 487}, {"type": "R", "before": "little input data : deaths attributable to", "after": "minimal data requirements:", "start_char_pos": 500, "end_char_pos": 542}, {"type": "R", "before": ", COVID-19", "after": "related deaths,", "start_char_pos": 552, "end_char_pos": 562}, {"type": "A", "before": null, "after": "(IFRs)", "start_char_pos": 588, "end_char_pos": 588}, {"type": "R", "before": "infection fatality rates, we map them from a reference country onto countries of interest based on", "after": "IFRs, we scale IFRs between countries using", "start_char_pos": 666, "end_char_pos": 764}, {"type": "R", "before": ". This scaling accounts for cross-country differences in the age structure, the health status, and the health care system. We also introduce easy to apply formulas to quantify the bias that would be required in death counts and infection fatality rates in order to reproduce a certain estimate of infections. Across the", "after": "as a marker to account for differences in age structures, health conditions, and medical services. Across", "start_char_pos": 791, "end_char_pos": 1110}, {"type": "R", "before": "April 17", "after": "May 13", "start_char_pos": 1156, "end_char_pos": 1164}, {"type": "D", "before": "our estimates suggest that the total number of infected is approximately 4 times", "after": null, "start_char_pos": 1173, "end_char_pos": 1253}, {"type": "A", "before": null, "after": "infections is estimated to be four", "start_char_pos": 1268, "end_char_pos": 1268}, {"type": "A", "before": null, "after": "95\\% prediction interval: 2-11", "start_char_pos": 1269, "end_char_pos": 1269}, {"type": "A", "before": null, "after": "times higher than the number of", "start_char_pos": 1271, "end_char_pos": 1271}, {"type": "R", "before": "The uncertainty, however, is high, as the lower bound of the 95\\% prediction interval suggests on average twice as many infections than confirmed cases, and the upper bound 10 times as many. Comparing our results with findings from", "after": "Cross-country variation is high. The estimated number of infections is 1.4 million (six times the number of confirmed cases) for Italy; 3.1 million (2.2 times the number of confirmed cases) for the U.S.; and 1.8 times the number of confirmed cases for Germany, where testing has been comparatively extensive. Our prevalence estimates, however, are markedly lower than most others based on", "start_char_pos": 1289, "end_char_pos": 1520}, {"type": "R", "before": "and applying our bias formulas shows that some of their infection estimates would only be possible if just a small fraction of", "after": ". We introduce formulas for quantifying the bias that is required in our data on deaths in order to reproduce estimates published elsewhere. This bias analysis shows that either", "start_char_pos": 1550, "end_char_pos": 1676}, {"type": "R", "before": "related deaths were recorded, indicating that these seroprevalence estimates might not be", "after": "deaths are severely underestimated, by a factor of two or more; or alternatively, the seroprevalence based results are overestimates and not", "start_char_pos": 1686, "end_char_pos": 1775}], "sents_char_pos": [0, 326, 448, 607, 792, 913, 1099, 1288, 1479]}
+{"doc_id": "2004.13216", "revision_depth": "2", "before_revision": "Transmission rates in epidemic outbreaks vary over time depending on the societal and government responseto infections and mortality data, as evidenced in the course of the COVID-19 pandemic. Following a mean field approach that models individuals like molecules in a well-mixed solution, I derive a modified SIR model in which the average daily contacts between susceptible and infected population are reduced based on the known infection levels, capturing the effects of social distancing policies. This approach yields a time-varying reproduction number that is continuously adjusted based on infection information through a negative-feedback term that is equivalent to Holling type II functions in ecology and Hill functions in chemistry and molecular biology. This feedback-adjustment of the transmission rate causes a structural reduction in infection peak, and simulations indicate that such reduction persists even in the presence of information delays. Simulations also show that a distancing policy based on infection data may substantially extend the duration of an epidemic. If the distancing rate is linearly proportional to infections, this model adds a single parameter to the original SIR , making it useful to illustrate the effects of social distancing enforced based on awareness of infections .", "after_revision": "Transmission rates in epidemic outbreaks may vary over time depending on the societal response. Non-pharmacological mitigation strategies such as social distancing and the adoption of protective equipment aim precisely at reducing transmission rates by reducing infectious contacts. To investigate the effects of mitigation strategies on the evolution of epidemics, nonlinear transmission rates that are influenced by the levels of infections, deaths or recoveries have been included in many variants of the classical SIR model. This class of models is particularly relevant to the COVID-19 epidemic, in which the population behavior has been affected by the unprecedented abundance and rapid distribution of global infection and death data through online platforms. This manuscript revisits a SIR model in which the reduction of transmission rate is due to knowledge of infections. Through a mean field approach that assumes individuals behave like molecules in a well-mixed solution, one derives a time-varying reproduction number that depends on infection information through a negative feedback term that is equivalent to Holling type II functions in ecology and Michaelis-Menten functions in chemistry and molecular biology. A step-by-step derivation of the model is provided, together with an overview of methods for its qualitative analysis, showing that negative feedback structurally reduces the peak of infections. At the same time, feedback may substantially extend the duration of an epidemic. Computational simulations agree with the analytical predictions, and further suggest that infection peak reduction persists even in the presence of information delays. If the mitigation strategy is linearly proportional to infections, a single parameter is added to the SIR model , making it useful to illustrate the effects of infection-dependent social distancing .", "edit_actions": [{"type": "A", "before": null, "after": "may", "start_char_pos": 41, "end_char_pos": 41}, {"type": "R", "before": "and government responseto infections and mortality data, as evidenced in", "after": "response. Non-pharmacological mitigation strategies such as social distancing and the adoption of protective equipment aim precisely at reducing transmission rates by reducing infectious contacts. To investigate the effects of mitigation strategies on the evolution of epidemics, nonlinear transmission rates that are influenced by the levels of infections, deaths or recoveries have been included in many variants of the classical SIR model. This class of models is particularly relevant to", "start_char_pos": 83, "end_char_pos": 155}, {"type": "D", "before": "course of the", "after": null, "start_char_pos": 160, "end_char_pos": 173}, {"type": "R", "before": "pandemic. Following a", "after": "epidemic, in which the population behavior has been affected by the unprecedented abundance and rapid distribution of global infection and death data through online platforms. This manuscript revisits a SIR model in which the reduction of transmission rate is due to knowledge of infections. Through a", "start_char_pos": 183, "end_char_pos": 204}, {"type": "R", "before": "models individuals", "after": "assumes individuals behave", "start_char_pos": 230, "end_char_pos": 248}, {"type": "R", "before": "I derive a modified SIR model in which the average daily contacts between susceptible and infected population are reduced based on the known infection levels, capturing the effects of social distancing policies. This approach yields a", "after": "one derives a", "start_char_pos": 290, "end_char_pos": 524}, {"type": "R", "before": "is continuously adjusted based", "after": "depends", "start_char_pos": 563, "end_char_pos": 593}, {"type": "R", "before": "negative-feedback", "after": "negative feedback", "start_char_pos": 629, "end_char_pos": 646}, {"type": "R", "before": "Hill", "after": "Michaelis-Menten", "start_char_pos": 715, "end_char_pos": 719}, {"type": "R", "before": "This feedback-adjustment of the transmission rate causes a structural reduction in infection peak, and simulations indicate that such reduction persists even in the presence of information delays. Simulations also show that a distancing policy based on infection data", "after": "A step-by-step derivation of the model is provided, together with an overview of methods for its qualitative analysis, showing that negative feedback structurally reduces the peak of infections. At the same time, feedback", "start_char_pos": 766, "end_char_pos": 1033}, {"type": "R", "before": "If the distancing rate", "after": "Computational simulations agree with the analytical predictions, and further suggest that infection peak reduction persists even in the presence of information delays. If the mitigation strategy", "start_char_pos": 1088, "end_char_pos": 1110}, {"type": "D", "before": "this model adds", "after": null, "start_char_pos": 1151, "end_char_pos": 1166}, {"type": "R", "before": "to the original SIR", "after": "is added to the SIR model", "start_char_pos": 1186, "end_char_pos": 1205}, {"type": "R", "before": "social distancing enforced based on awareness of infections", "after": "infection-dependent social distancing", "start_char_pos": 1254, "end_char_pos": 1313}], "sents_char_pos": [0, 192, 501, 765, 962, 1087]}
+{"doc_id": "2004.13614", "revision_depth": "2", "before_revision": "The unprecedented cessation of human activities during the COVID-19 pandemic has affected global energy use and CO2 emissions from fossil fuel use and cement production . Here we show that the decrease in global fossil CO2 emissions during the first quarter of 2020 was of 5.8\\% (542 Mt CO2 with a 20\\% 1- {\\sigma} uncertainty) . Unlike other emerging estimates , ours show the temporal dynamics of emissions based on actual emissions data from power generation (for 29 countries) and industry (for 73 countries), on near real time activity data for road transportation (for 132 countries ), aviation and maritime transportation , and on heating degree days for commercial and residential sectors emissions (for 206 countries). These dynamic estimates cover all of the human induced CO2 emissions from fossil fuel combustion and cement production. The largest share of COVID-related decreases in emissions are due to decreases in industry (157.9 Mt CO2, -7.1\\%compared to 2019), followed by road transportation (145.7 Mt CO2, -8.3\\% ), power generation (131.6 Mt CO2, -3.8 \\%), residential (47.8 Mt CO2, -3.6 \\%), fishing and maritime transport (35.5 Mt CO2, -13.3\\%)and aviation (33.4 Mt CO2, -8.0 \\%). Regionally, decreases in emissions from China were the largest and earliest ( -10.3 \\%), followed by Europe (EU-27 & UK) ( -4.3 \\%) and the U.S. ( -4.2 \\%). Relative decreases of regional CO2 emissions are consistent with regional nitrogen oxides concentrations observed by satellites and ground-based networks . Despite the unprecedented decreases in CO2 emissions and comparable decreases in economic activities, we monitored decreases in the carbon intensity (Emission per unit of GDP) in China (3.5\\%), the U. S. (4.5\\%) and Europe (5.4\\%) over the first quarter, suggesting that carbon-intensive activities have been disproportionally impacted .", "after_revision": "The considerable cessation of human activities during the COVID-19 pandemic has affected global energy use and CO2 emissions . Here we show the unprecedented decrease in global fossil CO2 emissions from January to April 2020 was of 7.8\\% (938 Mt CO2 with a +6.8\\% of 2- {\\sigma} uncertainty) when compared with the period last year. In addition other emerging estimates of COVID impacts based on monthly energy supply or estimated parameters, this study contributes to another step that constructed the near-real-time daily CO2 emission inventories based on activity from power generation (for 29 countries) , industry (for 73 countries), road transportation (for 406 cities ), aviation and maritime transportation and commercial and residential sectors emissions (for 206 countries). The estimates distinguished the decline of CO2 due to COVID-19 from the daily, weekly and seasonal variations as well as the holiday events. The COVID-related decreases in CO2 emissions in road transportation (340.4 Mt CO2, -15.5\\%), power (292.5 Mt CO2, -6.4\\% compared to 2019), industry (136.2 Mt CO2, -4.4 \\%), aviation (92.8 Mt CO2, -28.9 \\%), residential (43.4 Mt CO2, -2.7\\%), and international shipping (35.9 Mt CO2, -15 \\%). Regionally, decreases in China were the largest and earliest ( 234.5 Mt CO2,-6.9 \\%), followed by Europe (EU-27 & UK) ( 138.3 Mt CO2, -12.0 \\%) and the U.S. ( 162.4 Mt CO2, -9.5 \\%). The declines of CO2 are consistent with regional nitrogen oxides concentrations observed by satellites and ground-based networks , but the calculated signal of emissions decreases (about 1Gt CO2) will have little impacts (less than 0.13ppm by April 30, 2020) on the overserved global CO2 concertation. However, with observed fast CO2 recovery in China and partial re-opening globally, our findings suggest the longer-term effects on CO2 emissions are unknown and should be carefully monitored using multiple measures .", "edit_actions": [{"type": "R", "before": "unprecedented", "after": "considerable", "start_char_pos": 4, "end_char_pos": 17}, {"type": "D", "before": "from fossil fuel use and cement production", "after": null, "start_char_pos": 126, "end_char_pos": 168}, {"type": "R", "before": "that the", "after": "the unprecedented", "start_char_pos": 184, "end_char_pos": 192}, {"type": "R", "before": "during the first quarter of", "after": "from January to April", "start_char_pos": 233, "end_char_pos": 260}, {"type": "R", "before": "5.8\\% (542", "after": "7.8\\% (938", "start_char_pos": 273, "end_char_pos": 283}, {"type": "R", "before": "20\\% 1-", "after": "+6.8\\% of 2-", "start_char_pos": 298, "end_char_pos": 305}, {"type": "R", "before": ". Unlike", "after": "when compared with the period last year. In addition", "start_char_pos": 328, "end_char_pos": 336}, {"type": "R", "before": ", ours show the temporal dynamics of emissions based on actual emissions data", "after": "of COVID impacts based on monthly energy supply or estimated parameters, this study contributes to another step that constructed the near-real-time daily CO2 emission inventories based on activity", "start_char_pos": 362, "end_char_pos": 439}, {"type": "R", "before": "and", "after": ",", "start_char_pos": 481, "end_char_pos": 484}, {"type": "D", "before": "on near real time activity data for", "after": null, "start_char_pos": 514, "end_char_pos": 549}, {"type": "R", "before": "132 countries", "after": "406 cities", "start_char_pos": 575, "end_char_pos": 588}, {"type": "R", "before": ", and on heating degree days for", "after": "and", "start_char_pos": 629, "end_char_pos": 661}, {"type": "R", "before": "These dynamic estimates cover all of the human induced", "after": "The estimates distinguished the decline of", "start_char_pos": 728, "end_char_pos": 782}, {"type": "R", "before": "emissions from fossil fuel combustion and cement production. The largest share of", "after": "due to COVID-19 from the daily, weekly and seasonal variations as well as the holiday events. The", "start_char_pos": 787, "end_char_pos": 868}, {"type": "R", "before": "emissions are due to decreases in industry (157.9", "after": "CO2 emissions in road transportation (340.4", "start_char_pos": 896, "end_char_pos": 945}, {"type": "R", "before": "-7.1\\%compared to 2019), followed by road transportation (145.7", "after": "-15.5\\%), power (292.5", "start_char_pos": 954, "end_char_pos": 1017}, {"type": "R", "before": "-8.3\\% ), power generation (131.6", "after": "-6.4\\% compared to 2019), industry (136.2", "start_char_pos": 1026, "end_char_pos": 1059}, {"type": "R", "before": "-3.8", "after": "-4.4", "start_char_pos": 1068, "end_char_pos": 1072}, {"type": "R", "before": "residential (47.8", "after": "aviation (92.8", "start_char_pos": 1078, "end_char_pos": 1095}, {"type": "R", "before": "-3.6", "after": "-28.9", "start_char_pos": 1104, "end_char_pos": 1108}, {"type": "R", "before": "fishing and maritime transport (35.5", "after": "residential (43.4", "start_char_pos": 1114, "end_char_pos": 1150}, {"type": "R", "before": "-13.3\\%)and aviation (33.4", "after": "-2.7\\%), and international shipping (35.9", "start_char_pos": 1159, "end_char_pos": 1185}, {"type": "R", "before": "-8.0", "after": "-15", "start_char_pos": 1194, "end_char_pos": 1198}, {"type": "D", "before": "emissions from", "after": null, "start_char_pos": 1229, "end_char_pos": 1243}, {"type": "R", "before": "-10.3", "after": "234.5 Mt CO2,-6.9", "start_char_pos": 1282, "end_char_pos": 1287}, {"type": "R", "before": "-4.3", "after": "138.3 Mt CO2, -12.0", "start_char_pos": 1327, "end_char_pos": 1331}, {"type": "R", "before": "-4.2", "after": "162.4 Mt CO2, -9.5", "start_char_pos": 1351, "end_char_pos": 1355}, {"type": "R", "before": "Relative decreases of regional", "after": "The declines of", "start_char_pos": 1361, "end_char_pos": 1391}, {"type": "D", "before": "emissions", "after": null, "start_char_pos": 1396, "end_char_pos": 1405}, {"type": "R", "before": ". Despite the unprecedented decreases in CO2 emissions and comparable decreases in economic activities, we monitored decreases in the carbon intensity (Emission per unit of GDP) in China (3.5\\%), the U. S. (4.5\\%) and Europe (5.4\\%) over the first quarter, suggesting that carbon-intensive activities have been disproportionally impacted", "after": ", but the calculated signal of emissions decreases (about 1Gt CO2) will have little impacts (less than 0.13ppm by April 30, 2020) on the overserved global CO2 concertation. However, with observed fast CO2 recovery in China and partial re-opening globally, our findings suggest the longer-term effects on CO2 emissions are unknown and should be carefully monitored using multiple measures", "start_char_pos": 1515, "end_char_pos": 1852}], "sents_char_pos": [0, 170, 329, 727, 847, 1203, 1360, 1516]}
+{"doc_id": "2004.14331", "revision_depth": "1", "before_revision": " In the absence of a vaccine or effective treatment for COVID-19, countries have adopted Non-Pharmaceutical Interventions (NPIs) such as social distancing and full lockdown. An objective and quantitative means of monitoring the impact of, and compliance with, these interventions at a local level is urgently required. Here we explore the utility of the recently developed open-source mobile health platform RADAR-base as a toolbox to test the effect and response to NPIs aimed at limiting the spread of COVID- 19. We included 1062 participants recruited in Italy, Spain, Denmark, the UK and the Netherlands. We analysed phone GPS, phone usage data and Fitbit activity, heart rate, sleep, which were collected and managed by the RADAR-base platform. Daily features were derived reflecting mobility, functional measures, and phone usage . We visualised data using time series plots and performed statistical tests to assess differences in behaviour during baseline, pre- and post-lockdown periods. We found significant changes in behaviours between baseline/pre-lockdown and post- lockdown for all features except total sleep duration. In general, participants spent more time at home and travelled much less and were more active on their phones, interacting with others by using social apps. Nevertheless, the level of compliance across nations differed with Denmark showing attenuated changes in behaviour. Differences in the extracted features by country may reflect cultural differences as well as variations in communication and implementation of different NPIs . We have demonstrated that generalised open-source mobile health monitoring platforms such as RADAR-base which leverages data from wearables and mobile technologies are valuable tools for helping understand the behavioural impact of public health interventions implemented in response to infectious outbreaks such as COVID-19.", "after_revision": "Background In the absence of a vaccine or effective treatment for COVID-19, countries have adopted Non-Pharmaceutical Interventions (NPIs) such as social distancing and full lockdown. An objective and quantitative means of monitoring the impact and response of these interventions at a local level is urgently required. Here we explore the utility of the recently developed open-source mobile health platform RADAR-base as a toolbox to test the effect and response to NPIs aimed at limiting the spread of COVID-19. Methods We included 1062 participants recruited in Italy, Spain, Denmark, the UK , and the Netherlands. We derived features from the phone and wearable device for length of time spent at home, distance travelled from home, heart rate, sleep, and patterns of phone use . We visualised data using time series plots and performed statistical tests to assess differences in behaviour during baseline, pre- , and post-lockdown periods. Findings We found significant changes in behaviours between baseline/pre-lockdown and post-lockdown for all features except total sleep duration. In general, participants spent more time at home , travelled much less , and were more active on their phones, interacting with others by using social apps. Nevertheless, the response across nations differed with Denmark showing attenuated changes in behaviour. Interpretation Differences in the extracted features by country may reflect variations in communication and implementation of different NPIs as well as cultural differences . We have demonstrated that generalised open-source mobile health monitoring platforms such as RADAR-base which leverages data from wearables and mobile technologies are valuable tools for helping understand the behavioural impact of public health interventions implemented in response to infectious outbreaks such as COVID-19.", "edit_actions": [{"type": "A", "before": null, "after": "Background", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "of, and compliance with,", "after": "and response of", "start_char_pos": 235, "end_char_pos": 259}, {"type": "R", "before": "COVID- 19.", "after": "COVID-19. Methods", "start_char_pos": 504, "end_char_pos": 514}, {"type": "A", "before": null, "after": ",", "start_char_pos": 588, "end_char_pos": 588}, {"type": "R", "before": "analysed phone GPS, phone usage data and Fitbit activity,", "after": "derived features from the phone and wearable device for length of time spent at home, distance travelled from home,", "start_char_pos": 613, "end_char_pos": 670}, {"type": "R", "before": "which were collected and managed by the RADAR-base platform. Daily features were derived reflecting mobility, functional measures, and phone usage", "after": "and patterns of phone use", "start_char_pos": 690, "end_char_pos": 836}, {"type": "A", "before": null, "after": ",", "start_char_pos": 971, "end_char_pos": 971}, {"type": "A", "before": null, "after": "Findings", "start_char_pos": 999, "end_char_pos": 999}, {"type": "R", "before": "post- lockdown", "after": "post-lockdown", "start_char_pos": 1077, "end_char_pos": 1091}, {"type": "R", "before": "and", "after": ",", "start_char_pos": 1187, "end_char_pos": 1190}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1211, "end_char_pos": 1211}, {"type": "R", "before": "level of compliance", "after": "response", "start_char_pos": 1314, "end_char_pos": 1333}, {"type": "A", "before": null, "after": "Interpretation", "start_char_pos": 1412, "end_char_pos": 1412}, {"type": "D", "before": "cultural differences as well as", "after": null, "start_char_pos": 1474, "end_char_pos": 1505}, {"type": "A", "before": null, "after": "as well as cultural differences", "start_char_pos": 1571, "end_char_pos": 1571}], "sents_char_pos": [0, 173, 318, 514, 609, 750, 838, 998, 1137, 1295, 1411, 1573]}
+{"doc_id": "2004.14550", "revision_depth": "1", "before_revision": "The challenges of building knowledge-grounded retrieval-based chatbots lie in how to ground a conversation on the background knowledge and how to perform their matching with the response . This paper proposes a method named Filtering before Iteratively REferring (FIRE) for presenting the background knowledge of dialogue agents in retrieval-based chatbots. We first propose a pre-filter, which is composed of a context filter and a knowledge filter . This pre-filter grounds the conversation on the knowledge and comprehends the knowledge according to the conversation by collecting the matching information between them bidirectionally, and then recognizing the important information in them accordingly . After that, iteratively referring is performed between the context and the response , as well as between the knowledge and the response , in order to collect the deep and wide matching information . Experimental results show that the FIRE model outperforms previous methods by margins larger than 2.8\\% on original personas and 4.1\\% on revised personas on the PERSONA-CHAT dataset , as well as 3.1\\% on the CMU_DoG dataset in terms of top-1 accuracy .", "after_revision": "The challenges of building knowledge-grounded retrieval-based chatbots lie in how to ground a conversation on its background knowledge and how to match response candidates with both context and knowledge simultaneously . This paper proposes a method named Filtering before Iteratively REferring (FIRE) for this task. In this method, a context filter and a knowledge filter are first built, which derive knowledge-aware context representations and context-aware knowledge representations respectively by global and bidirectional attention. Besides, the entries irrelevant to the conversation are discarded by the knowledge filter . After that, iteratively referring is performed between context and response representations as well as between knowledge and response representations , in order to collect deep matching features for scoring response candidates . Experimental results show that FIRE outperforms previous methods by margins larger than 2.8\\% and 4.1\\% on the PERSONA-CHAT dataset with original and revised personas respectively, and margins larger than 3.1\\% on the CMU_DoG dataset in terms of top-1 accuracy . We also show that FIRE is more interpretable by visualizing the knowledge grounding process .", "edit_actions": [{"type": "R", "before": "the", "after": "its", "start_char_pos": 110, "end_char_pos": 113}, {"type": "R", "before": "perform their matching with the response", "after": "match response candidates with both context and knowledge simultaneously", "start_char_pos": 146, "end_char_pos": 186}, {"type": "R", "before": "presenting the background knowledge of dialogue agents in retrieval-based chatbots. We first propose a pre-filter, which is composed of", "after": "this task. In this method,", "start_char_pos": 274, "end_char_pos": 409}, {"type": "R", "before": ". This pre-filter grounds the conversation on the knowledge and comprehends the knowledge according", "after": "are first built, which derive knowledge-aware context representations and context-aware knowledge representations respectively by global and bidirectional attention. Besides, the entries irrelevant", "start_char_pos": 450, "end_char_pos": 549}, {"type": "R", "before": "by collecting the matching information between them bidirectionally, and then recognizing the important information in them accordingly", "after": "are discarded by the knowledge filter", "start_char_pos": 570, "end_char_pos": 705}, {"type": "R", "before": "the context and the response ,", "after": "context and response representations", "start_char_pos": 763, "end_char_pos": 793}, {"type": "R", "before": "the knowledge and the response", "after": "knowledge and response representations", "start_char_pos": 813, "end_char_pos": 843}, {"type": "R", "before": "the deep and wide matching information", "after": "deep matching features for scoring response candidates", "start_char_pos": 866, "end_char_pos": 904}, {"type": "R", "before": "the FIRE model", "after": "FIRE", "start_char_pos": 938, "end_char_pos": 952}, {"type": "D", "before": "on original personas", "after": null, "start_char_pos": 1011, "end_char_pos": 1031}, {"type": "D", "before": "revised personas on", "after": null, "start_char_pos": 1045, "end_char_pos": 1064}, {"type": "R", "before": ", as well as", "after": "with original and revised personas respectively, and margins larger than", "start_char_pos": 1090, "end_char_pos": 1102}, {"type": "A", "before": null, "after": ". We also show that FIRE is more interpretable by visualizing the knowledge grounding process", "start_char_pos": 1159, "end_char_pos": 1159}], "sents_char_pos": [0, 188, 357, 451, 707]}
+{"doc_id": "2004.14564", "revision_depth": "1", "before_revision": "We propose the use of a sequence-to-sequence paraphraser for automatic machine translation evaluation . The paraphrasertakes a human reference as input and then force-decodes and scores an MT system output . We propose training the aforementioned paraphraser as a multilingual NMT system, treating paraphrasing as a zero-shot \"language pair\" (e.g., Russian to Russian). We denote our paraphraser \"unbiased\" because the mode of our model 's output probability is centered around a copy of the input sequence, which in our case represent the best case scenario where the MT system output matches a human reference. Our method is simple and intuitive, and our single model (trained in 39 languages) outperforms or statistically ties with all prior metrics on the WMT19 segment-level shared metrics task in all languages , excluding Gujarati where the model had no training data . We also explore using our model conditioned on the source instead of the reference, and find that it outperforms every quality estimation as a metric system from the WMT19 shared task on quality estimation by a statistically significant margin in every language pair.", "after_revision": "We frame the task of machine translation evaluation as one of scoring machine translation output with a sequence-to-sequence paraphraser, conditioned on a human reference . We propose training the paraphraser as a multilingual NMT system, treating paraphrasing as a zero-shot translation task (e.g., Czech to Czech). This results in the paraphraser 's output mode being centered around a copy of the input sequence, which represents the best case scenario where the MT system output matches a human reference. Our method is simple and intuitive, and does not require human judgements for training. Our single model (trained in 39 languages) outperforms or statistically ties with all prior metrics on the WMT 2019 segment-level shared metrics task in all languages ( excluding Gujarati where the model had no training data ) . We also explore using our model for the task of quality estimation as a metric--conditioning on the source instead of the reference--and find that it significantly outperforms every submission to the WMT 2019 shared task on quality estimation in every language pair.", "edit_actions": [{"type": "R", "before": "propose the use of a sequence-to-sequence paraphraser for automatic", "after": "frame the task of", "start_char_pos": 3, "end_char_pos": 70}, {"type": "R", "before": ". The paraphrasertakes", "after": "as one of scoring machine translation output with a sequence-to-sequence paraphraser, conditioned on", "start_char_pos": 102, "end_char_pos": 124}, {"type": "D", "before": "as input and then force-decodes and scores an MT system output", "after": null, "start_char_pos": 143, "end_char_pos": 205}, {"type": "D", "before": "aforementioned", "after": null, "start_char_pos": 232, "end_char_pos": 246}, {"type": "R", "before": "\"language pair\"", "after": "translation task", "start_char_pos": 326, "end_char_pos": 341}, {"type": "R", "before": "Russian to Russian). We denote our paraphraser \"unbiased\" because the mode of our model", "after": "Czech to Czech). This results in the paraphraser", "start_char_pos": 349, "end_char_pos": 436}, {"type": "R", "before": "probability is", "after": "mode being", "start_char_pos": 447, "end_char_pos": 461}, {"type": "R", "before": "in our case represent", "after": "represents", "start_char_pos": 514, "end_char_pos": 535}, {"type": "R", "before": "our", "after": "does not require human judgements for training. Our", "start_char_pos": 653, "end_char_pos": 656}, {"type": "R", "before": "WMT19", "after": "WMT 2019", "start_char_pos": 760, "end_char_pos": 765}, {"type": "R", "before": ",", "after": "(", "start_char_pos": 817, "end_char_pos": 818}, {"type": "A", "before": null, "after": ")", "start_char_pos": 875, "end_char_pos": 875}, {"type": "R", "before": "conditioned", "after": "for the task of quality estimation as a metric--conditioning", "start_char_pos": 910, "end_char_pos": 921}, {"type": "R", "before": "reference, and", "after": "reference--and", "start_char_pos": 951, "end_char_pos": 965}, {"type": "R", "before": "outperforms every quality estimation as a metric system from the WMT19", "after": "significantly outperforms every submission to the WMT 2019", "start_char_pos": 979, "end_char_pos": 1049}, {"type": "D", "before": "by a statistically significant margin", "after": null, "start_char_pos": 1084, "end_char_pos": 1121}], "sents_char_pos": [0, 103, 207, 369, 612, 877]}
+{"doc_id": "2004.14623", "revision_depth": "1", "before_revision": "In adversarial (challenge) testing, we pose hard generalization tasks in order to gain insights into the solutions found by our models. What properties must a system have in order to succeed at these hard tasks? In this paper, we argue that an essential factor is the ability to form modular representations . Our central contribution is a definition of what it means for a representation to be modular and an experimental method for assessing the extent to which a system's solution is modular in this general sense . Our work is grounded empirically in a new challenge Natural Language Inference dataset designed to assess systems on their ability to reason about entailment and negation. We find that a BERT model with fine-tuning is strikingly successful at the hard generalization tasks we pose using this dataset, and our active manipulations help us to understand why: despite the densely interconnected nature of the BERT architecture, the learned model embeds modular, general theories of lexical entailment relations.", "after_revision": "In adversarial testing, we pose hard generalization tasks in order to gain insights into the solutions found by our models. What properties must a system have in order to succeed at these hard behavioral tasks? We argue that an essential factor is modular internal structure . Our central contribution is a new experimental method called 'interchange interventions', in which systematic manipulations of model-internal states are related to causal effects on their outputs, thereby allowing us to identify modular structure . Our work is grounded empirically in a new challenge Natural Language Inference dataset designed to assess systems on their ability to reason about entailment and negation. We find that a BERT model is strikingly successful at the systematic generalization task we pose using this dataset, and our active manipulations of model-internal vectors help us understand why: despite the densely interconnected nature of the BERT architecture, the learned model embeds modular, general theories of lexical entailment relations.", "edit_actions": [{"type": "D", "before": "(challenge)", "after": null, "start_char_pos": 15, "end_char_pos": 26}, {"type": "R", "before": "tasks? In this paper, we", "after": "behavioral tasks? We", "start_char_pos": 205, "end_char_pos": 229}, {"type": "R", "before": "the ability to form modular representations", "after": "modular internal structure", "start_char_pos": 264, "end_char_pos": 307}, {"type": "R", "before": "definition of what it means for a representation to be modular and an experimental method for assessing the extent to which a system's solution is modular in this general sense", "after": "new experimental method called 'interchange interventions', in which systematic manipulations of model-internal states are related to causal effects on their outputs, thereby allowing us to identify modular structure", "start_char_pos": 340, "end_char_pos": 516}, {"type": "D", "before": "with fine-tuning", "after": null, "start_char_pos": 717, "end_char_pos": 733}, {"type": "R", "before": "hard generalization tasks", "after": "systematic generalization task", "start_char_pos": 766, "end_char_pos": 791}, {"type": "R", "before": "help us to", "after": "of model-internal vectors help us", "start_char_pos": 849, "end_char_pos": 859}], "sents_char_pos": [0, 135, 211, 309, 518, 690]}
+{"doc_id": "2004.15016", "revision_depth": "1", "before_revision": "In this paper, we present WiC-TSV (Target Sense Verification for Words in Context ) , a new multi-domain evaluation benchmark for Word Sense Disambiguation (WSD) and Entity Linking (EL). Our benchmark is different from conventional WSD and EL benchmarks for it being independent of a general sense inventory, making it highly flexible for the evaluation of a diverse set of models and systems in different domains. WiC-TSV is split into three tasks (systems get hypernymy or definitional or both hypernymy and definitional information about the target sense). Test data is available in four domains: general (WordNet), computer science, cocktails and medical concepts. Results show that existing state-of-the-art language models such as BERT can achieve a high performancein both in-domain data and out-of-domain data, but they still have room for improvement . WiC-TSV task data is available at URL/competitions/ 23683 .", "after_revision": "We present WiC-TSV , a new multi-domain evaluation benchmark for Target Sense Verification of Words in Context. The benchmark is a new framework for evaluating Word Sense Disambiguation and Entity Linking , which is different from conventional benchmarks for it covering various domains, while being independent of external sense inventories. This makes the dataset highly flexible for the evaluation of a diverse set of models and systems in and across domains. WiC-TSV provides three different evaluation settings, depending on the input signals provided to the model. We set baseline performance on the dataset using state-of-the-art language models. Experimental results show that even though these models can perform decently on the task, there remains a gap between machine and human performance, especially in out-of-domain settings . WiC-TSV data is available at URL/competitions/ 23683.", "edit_actions": [{"type": "R", "before": "In this paper, we", "after": "We", "start_char_pos": 0, "end_char_pos": 17}, {"type": "D", "before": "(", "after": null, "start_char_pos": 34, "end_char_pos": 35}, {"type": "D", "before": "Target Sense Verification for Words in Context", "after": null, "start_char_pos": 35, "end_char_pos": 81}, {"type": "D", "before": ")", "after": null, "start_char_pos": 82, "end_char_pos": 83}, {"type": "A", "before": null, "after": "Target Sense Verification of Words in Context. The benchmark is a new framework for evaluating", "start_char_pos": 130, "end_char_pos": 130}, {"type": "D", "before": "(WSD)", "after": null, "start_char_pos": 157, "end_char_pos": 162}, {"type": "R", "before": "(EL). Our benchmark", "after": ", which", "start_char_pos": 182, "end_char_pos": 201}, {"type": "D", "before": "WSD and EL", "after": null, "start_char_pos": 233, "end_char_pos": 243}, {"type": "A", "before": null, "after": "covering various domains, while", "start_char_pos": 262, "end_char_pos": 262}, {"type": "R", "before": "a general sense inventory, making it", "after": "external sense inventories. This makes the dataset", "start_char_pos": 284, "end_char_pos": 320}, {"type": "R", "before": "different", "after": "and across", "start_char_pos": 398, "end_char_pos": 407}, {"type": "R", "before": "is split into three tasks (systems get hypernymy or definitional or both hypernymy and definitional information about the target sense). Test data is available in four domains: general (WordNet), computer science, cocktails and medical concepts. Results show that existing", "after": "provides three different evaluation settings, depending on the input signals provided to the model. We set baseline performance on the dataset using", "start_char_pos": 425, "end_char_pos": 697}, {"type": "R", "before": "language models such as BERT can achieve a high performancein both in-domain data and", "after": "language models. Experimental results show that even though these models can perform decently on the task, there remains a gap between machine and human performance, especially in", "start_char_pos": 715, "end_char_pos": 800}, {"type": "R", "before": "data, but they still have room for improvement", "after": "settings", "start_char_pos": 815, "end_char_pos": 861}, {"type": "D", "before": "task", "after": null, "start_char_pos": 872, "end_char_pos": 876}, {"type": "D", "before": "23683", "after": null, "start_char_pos": 916, "end_char_pos": 921}, {"type": "R", "before": ".", "after": "23683.", "start_char_pos": 922, "end_char_pos": 923}], "sents_char_pos": [0, 187, 416, 561, 670, 863]}
+{"doc_id": "2005.00192", "revision_depth": "1", "before_revision": "For the automatic evaluation of Generative Question Answering (genQA ) systems, it is essential to assess the correctness of the generated answers . However, n-gram similarity metrics, which are widely used to compare generated texts and references, are prone to misjudge fact-based assessments . Moreover, there is a lack of benchmark datasets to measure the quality of metrics in terms of the correctness. To study a better metric for genQA, we collect high-quality human judgments of correctness on two standard genQA datasets. Using our human-evaluation datasets, we show that existing metrics based on n-gram similarity do not correlate with human judgments. To alleviate this problem, we propose a new metric for evaluating the correctness of genQA . Specifically, the new metric assigns different weights on each token via keyphrase prediction, thereby judging whether a predicted answer sentence captures the key meaning of the human judge's ground-truth . Our proposed metric shows a significantly higher correlation with human judgment than widely used existing metrics .", "after_revision": "In the automatic evaluation of generative question answering (GenQA ) systems, it is difficult to assess the correctness of generated answers due to the free-form of the answer . Moreover, there is a lack of benchmark datasets to evaluate the suitability of existing metrics in terms of correctness. To study a better metric for GenQA, we first create high-quality human judgments of correctness on two standard GenQA datasets. Using our human-evaluation datasets, we show that widely used n-gram similarity metrics do not correlate with human judgments. To alleviate this problem, we propose a new metric for evaluating the correctness of GenQA . Specifically, our new metric assigns different weights to each token via keyphrase prediction, thereby judging whether a generated answer sentence captures the key meaning of the reference answer . Our proposed metric shows a significantly higher correlation with human judgments than existing metrics in various datasets .", "edit_actions": [{"type": "R", "before": "For", "after": "In", "start_char_pos": 0, "end_char_pos": 3}, {"type": "R", "before": "Generative Question Answering (genQA", "after": "generative question answering (GenQA", "start_char_pos": 32, "end_char_pos": 68}, {"type": "R", "before": "essential", "after": "difficult", "start_char_pos": 86, "end_char_pos": 95}, {"type": "R", "before": "the generated answers . However, n-gram similarity metrics, which are widely used to compare generated texts and references, are prone to misjudge fact-based assessments", "after": "generated answers due to the free-form of the answer", "start_char_pos": 125, "end_char_pos": 294}, {"type": "R", "before": "measure the quality of", "after": "evaluate the suitability of existing", "start_char_pos": 348, "end_char_pos": 370}, {"type": "D", "before": "the", "after": null, "start_char_pos": 391, "end_char_pos": 394}, {"type": "R", "before": "genQA, we collect", "after": "GenQA, we first create", "start_char_pos": 437, "end_char_pos": 454}, {"type": "R", "before": "genQA", "after": "GenQA", "start_char_pos": 515, "end_char_pos": 520}, {"type": "R", "before": "existing metrics based on", "after": "widely used", "start_char_pos": 581, "end_char_pos": 606}, {"type": "A", "before": null, "after": "metrics", "start_char_pos": 625, "end_char_pos": 625}, {"type": "R", "before": "genQA", "after": "GenQA", "start_char_pos": 750, "end_char_pos": 755}, {"type": "R", "before": "the", "after": "our", "start_char_pos": 772, "end_char_pos": 775}, {"type": "R", "before": "on", "after": "to", "start_char_pos": 813, "end_char_pos": 815}, {"type": "R", "before": "predicted", "after": "generated", "start_char_pos": 879, "end_char_pos": 888}, {"type": "R", "before": "human judge's ground-truth", "after": "reference answer", "start_char_pos": 937, "end_char_pos": 963}, {"type": "R", "before": "judgment than widely used existing metrics", "after": "judgments than existing metrics in various datasets", "start_char_pos": 1038, "end_char_pos": 1080}], "sents_char_pos": [0, 148, 296, 407, 530, 664, 965]}
+{"doc_id": "2005.00619", "revision_depth": "1", "before_revision": "Vision, as a central component of human perception, plays a fundamental role in shaping natural language . To better understand how text models are connected to our visual perceptions , we propose a method for examining the similarities between neural representations extracted from words in text and objects in images . Our approach uses a lightweight probing model that learns to map language representations of concrete words to the visual domain . We find that representations from models trained on purely textual data, such as BERT, can be nontrivially mapped to those of a vision model. Such mappings generalize to object categories that were never seen by the probe during training, unlike mappings learned from permuted or random representations . Moreover, we find that the context surrounding objects in sentences greatly impacts performance. Finally, we show that humans significantly outperform all examined models , suggesting considerable room for improvement in representation learning and grounding .", "after_revision": "While large-scale language models have enjoyed great success recently, much remains to be understood about what is encoded in their representations. In this work , we propose a method for characterizing how language representations of concrete nouns relate to the physical appearance of the objects they refer to . Our approach uses a probing model that examines how useful language representations are in discerning between different visual representations. We show evidence of a surprising common ground with the visual domain , finding representations of many language models to be useful in retrieving semantically aligned image patches. In control experiments where language and visual representations are intentionally mismatched, we observe much weaker results. Furthermore, we examine the impact of textual context in our experiments, finding, for instance, that nouns accompanied by adjectives lead to more accurate retrieval . Finally, we show that the examined models substantially under-perform humans in retrieval. Altogether, our findings shed new empirical insights on language grounding, suggesting that some physical properties are being captured by trained language models, and highlighting large room for future progress .", "edit_actions": [{"type": "R", "before": "Vision, as a central component of human perception, plays a fundamental role in shaping natural language . To better understand how text models are connected to our visual perceptions", "after": "While large-scale language models have enjoyed great success recently, much remains to be understood about what is encoded in their representations. In this work", "start_char_pos": 0, "end_char_pos": 183}, {"type": "R", "before": "examining the similarities between neural representations extracted from words in text and objects in images", "after": "characterizing how language representations of concrete nouns relate to the physical appearance of the objects they refer to", "start_char_pos": 210, "end_char_pos": 318}, {"type": "D", "before": "lightweight", "after": null, "start_char_pos": 341, "end_char_pos": 352}, {"type": "R", "before": "learns to map language representations of concrete words to", "after": "examines how useful language representations are in discerning between different visual representations. We show evidence of a surprising common ground with", "start_char_pos": 372, "end_char_pos": 431}, {"type": "R", "before": ". We find that representations from models trained on purely textual data, such as BERT, can be nontrivially mapped to those of a vision model. Such mappings generalize to object categories that were never seen by the probe during training, unlike mappings learned from permuted or random representations", "after": ", finding representations of many language models to be useful in retrieving semantically aligned image patches. In control experiments where language and visual representations are intentionally mismatched, we observe much weaker results. Furthermore, we examine the impact of textual context in our experiments, finding, for instance, that nouns accompanied by adjectives lead to more accurate retrieval", "start_char_pos": 450, "end_char_pos": 754}, {"type": "D", "before": "Moreover, we find that the context surrounding objects in sentences greatly impacts performance.", "after": null, "start_char_pos": 757, "end_char_pos": 853}, {"type": "R", "before": "humans significantly outperform all examined models , suggesting considerable room for improvement in representation learning and grounding", "after": "the examined models substantially under-perform humans in retrieval. Altogether, our findings shed new empirical insights on language grounding, suggesting that some physical properties are being captured by trained language models, and highlighting large room for future progress", "start_char_pos": 876, "end_char_pos": 1015}], "sents_char_pos": [0, 106, 320, 451, 593, 756, 853]}
+{"doc_id": "2005.00619", "revision_depth": "2", "before_revision": "While large-scale language models have enjoyed great success recently, much remains to be understood about what is encoded in their representations. In this work, we propose a method for characterizing how language representations of concrete nouns relate to the physical appearance of the objects they refer to. Our approach uses a probing model that examines how useful language representations are in discerning between different visual representations. We show evidence of a surprising common ground with the visual domain, finding representations of many language models to be useful in retrieving semantically aligned image patches . In control experiments where language and visual representations are intentionally mismatched, we observe much weaker results. Furthermore, we examine the impact of textual context in our experiments, finding, for instance, that nouns accompanied by adjectives lead to more accurate retrieval. Finally, we show that the examined models substantially under-perform humans in retrieval . Altogether, our findings shed new empirical insights on language grounding , suggesting that some physical properties are being captured by trained language models, and highlighting large room for future progress .", "after_revision": "While large-scale contextual language models have enjoyed great success recently, much remains to be understood about what is encoded in their representations. In this work, we characterize how contextual representations of concrete nouns extracted by trained language models relate to the physical properties of the objects they refer to. Our approach uses a probing model that examines how effective these language representations are in discerning between different visual representations. We show that many recent language models yield representations that are useful in retrieving semantically aligned image patches , and explore the role of context in this process. Much weaker results are found in control experiments, attesting the selectivity of the probe. All examined models greatly under-perform humans in retrieval , highlighting substantial room for future progress . Altogether, our findings shed new empirical insights on language grounding and its materialization in contextual language models .", "edit_actions": [{"type": "A", "before": null, "after": "contextual", "start_char_pos": 18, "end_char_pos": 18}, {"type": "R", "before": "propose a method for characterizing how language", "after": "characterize how contextual", "start_char_pos": 167, "end_char_pos": 215}, {"type": "A", "before": null, "after": "extracted by trained language models", "start_char_pos": 250, "end_char_pos": 250}, {"type": "R", "before": "appearance", "after": "properties", "start_char_pos": 274, "end_char_pos": 284}, {"type": "R", "before": "useful", "after": "effective these", "start_char_pos": 367, "end_char_pos": 373}, {"type": "R", "before": "evidence of a surprising common ground with the visual domain, finding representations of many language models to be", "after": "that many recent language models yield representations that are", "start_char_pos": 467, "end_char_pos": 583}, {"type": "R", "before": ". In control experiments where language and visual representations are intentionally mismatched, we observe much weaker results. Furthermore, we examine the impact of textual context in our experiments, finding, for instance, that nouns accompanied by adjectives lead to more accurate retrieval. Finally, we show that the examined models substantially", "after": ", and explore the role of context in this process. Much weaker results are found in control experiments, attesting the selectivity of the probe. All examined models greatly", "start_char_pos": 640, "end_char_pos": 991}, {"type": "A", "before": null, "after": ", highlighting substantial room for future progress", "start_char_pos": 1026, "end_char_pos": 1026}, {"type": "R", "before": ", suggesting that some physical properties are being captured by trained language models, and highlighting large room for future progress", "after": "and its materialization in contextual language models", "start_char_pos": 1104, "end_char_pos": 1241}], "sents_char_pos": [0, 149, 314, 458, 641, 768, 935, 1028]}
+{"doc_id": "2005.00619", "revision_depth": "3", "before_revision": "While large-scale contextual language models have enjoyed great success recently, much remains to be understood about what is encoded in their representations. In this work, we characterize how contextual representations of concrete nouns extracted by trained language models relate to the physical properties of the objects they refer to. Our approach uses a probing model that examines how effective these language representations are in discerning between different visual representations. We show that many recent language models yield representations that are useful in retrieving semantically aligned image patches , and explore the role of context in this process. Much weaker results are found in control experiments, attesting the selectivity of the probe. All examined models greatly under-perform humans in retrieval, highlighting substantial room for future progress. Altogether, our findings shed new empirical insights on language grounding and its materialization in contextual language models.", "after_revision": "The success of large-scale contextual language models has attracted great interest in probing what is encoded in their representations. In this work, we consider a new question: to what extent contextual representations of concrete nouns are aligned with corresponding visual representations? We design a probing model that evaluates how effective are text-only representations in distinguishing between matching and non-matching visual representations. Our findings show that language representations alone provide a strong signal for retrieving image patches from the correct object categories. Moreover, they are effective in retrieving specific instances of image patches; textual context plays an important role in this process. Visually grounded language models slightly outperform text-only language models in instance retrieval, but greatly under-perform humans . We hope our analyses inspire future research in understanding and improving the visual capabilities of language models.", "edit_actions": [{"type": "R", "before": "While", "after": "The success of", "start_char_pos": 0, "end_char_pos": 5}, {"type": "R", "before": "have enjoyed great success recently, much remains to be understood about", "after": "has attracted great interest in probing", "start_char_pos": 45, "end_char_pos": 117}, {"type": "R", "before": "characterize how", "after": "consider a new question: to what extent", "start_char_pos": 177, "end_char_pos": 193}, {"type": "R", "before": "extracted by trained language models relate to the physical properties of the objects they refer to. Our approach uses", "after": "are aligned with corresponding visual representations? We design", "start_char_pos": 239, "end_char_pos": 357}, {"type": "R", "before": "examines how effective these language representations are in discerning between different", "after": "evaluates how effective are text-only representations in distinguishing between matching and non-matching", "start_char_pos": 379, "end_char_pos": 468}, {"type": "R", "before": "We show that many recent language models yield representations that are useful in retrieving semantically aligned image patches , and explore the role of context", "after": "Our findings show that language representations alone provide a strong signal for retrieving image patches from the correct object categories. Moreover, they are effective in retrieving specific instances of image patches; textual context plays an important role", "start_char_pos": 493, "end_char_pos": 654}, {"type": "R", "before": "Much weaker results are found in control experiments, attesting the selectivity of the probe. All examined models", "after": "Visually grounded language models slightly outperform text-only language models in instance retrieval, but", "start_char_pos": 672, "end_char_pos": 785}, {"type": "R", "before": "in retrieval, highlighting substantial room for future progress. Altogether, our findings shed new empirical insights on language grounding and its materialization in contextual", "after": ". We hope our analyses inspire future research in understanding and improving the visual capabilities of", "start_char_pos": 815, "end_char_pos": 992}], "sents_char_pos": [0, 159, 339, 492, 671, 765, 879]}
+{"doc_id": "2005.00882", "revision_depth": "1", "before_revision": "Most studies on abstractive summarization re-port ROUGE scores between system and ref-erence summaries. However, we have a con-cern about thetruthfulnessof generated sum-maries : whether all facts of a generated sum-mary are mentioned in the source text. Thispaper explores improving the truthfulness inheadline generation on two popular datasets. Analyzing headlines generated by the state-of-the-art encoder-decoder model, we showthat the model sometimes generates untruthfulheadlines . We conjecture that one of the rea-sons lies in untruthful supervision data usedfor training the model. In order to quantifythe truthfulness of article-headline pairs, weconsider the textual entailment of whether anarticle entails its headline. After confirmingquite a few untruthful instances in the datasets, this study hypothesizes that removing untruth-ful instances from the supervision data mayremedy the problem of the untruthful behav-iors of the model. Building a binary classifierthat predicts an entailment relation between anarticle and its headline, we filter out untruth-ful instances from the supervision data. Exper-imental results demonstrate that the headlinegeneration model trained on filtered supervi-sion data shows no clear difference in ROUGEscores but remarkable improvements in auto-matic and manual evaluations of the generatedheadlines .", "after_revision": "Most studies on abstractive summarization report ROUGE scores between system and reference summaries. However, we have a concern about the truthfulness of generated summaries : whether all facts of a generated summary are mentioned in the source text. This paper explores improving the truthfulness in headline generation on two popular datasets. Analyzing headlines generated by the state-of-the-art encoder-decoder model, we show that the model sometimes generates untruthful headlines . We conjecture that one of the reasons lies in untruthful supervision data used for training the model. In order to quantify the truthfulness of article-headline pairs, we consider the textual entailment of whether an article entails its headline. After confirming quite a few untruthful instances in the datasets, this study hypothesizes that removing untruthful instances from the supervision data may remedy the problem of the untruthful behaviors of the model. Building a binary classifier that predicts an entailment relation between an article and its headline, we filter out untruthful instances from the supervision data. Experimental results demonstrate that the headline generation model trained on filtered supervision data shows no clear difference in ROUGE scores but remarkable improvements in automatic and manual evaluations of the generated headlines .", "edit_actions": [{"type": "R", "before": "re-port", "after": "report", "start_char_pos": 42, "end_char_pos": 49}, {"type": "R", "before": "ref-erence", "after": "reference", "start_char_pos": 82, "end_char_pos": 92}, {"type": "R", "before": "con-cern about thetruthfulnessof generated sum-maries", "after": "concern about the truthfulness of generated summaries", "start_char_pos": 123, "end_char_pos": 176}, {"type": "R", "before": "sum-mary", "after": "summary", "start_char_pos": 212, "end_char_pos": 220}, {"type": "R", "before": "Thispaper", "after": "This paper", "start_char_pos": 255, "end_char_pos": 264}, {"type": "R", "before": "inheadline", "after": "in headline", "start_char_pos": 301, "end_char_pos": 311}, {"type": "R", "before": "showthat", "after": "show that", "start_char_pos": 428, "end_char_pos": 436}, {"type": "R", "before": "untruthfulheadlines", "after": "untruthful headlines", "start_char_pos": 467, "end_char_pos": 486}, {"type": "R", "before": "rea-sons", "after": "reasons", "start_char_pos": 519, "end_char_pos": 527}, {"type": "R", "before": "usedfor", "after": "used for", "start_char_pos": 564, "end_char_pos": 571}, {"type": "R", "before": "quantifythe", "after": "quantify the", "start_char_pos": 604, "end_char_pos": 615}, {"type": "R", "before": "weconsider", "after": "we consider", "start_char_pos": 656, "end_char_pos": 666}, {"type": "R", "before": "anarticle", "after": "an article", "start_char_pos": 701, "end_char_pos": 710}, {"type": "R", "before": "confirmingquite", "after": "confirming quite", "start_char_pos": 739, "end_char_pos": 754}, {"type": "R", "before": "untruth-ful", "after": "untruthful", "start_char_pos": 837, "end_char_pos": 848}, {"type": "R", "before": "mayremedy", "after": "may remedy", "start_char_pos": 885, "end_char_pos": 894}, {"type": "R", "before": "behav-iors", "after": "behaviors", "start_char_pos": 925, "end_char_pos": 935}, {"type": "R", "before": "classifierthat", "after": "classifier that", "start_char_pos": 968, "end_char_pos": 982}, {"type": "R", "before": "anarticle", "after": "an article", "start_char_pos": 1023, "end_char_pos": 1032}, {"type": "R", "before": "untruth-ful", "after": "untruthful", "start_char_pos": 1065, "end_char_pos": 1076}, {"type": "R", "before": "Exper-imental", "after": "Experimental", "start_char_pos": 1114, "end_char_pos": 1127}, {"type": "R", "before": "headlinegeneration", "after": "headline generation", "start_char_pos": 1157, "end_char_pos": 1175}, {"type": "R", "before": "supervi-sion", "after": "supervision", "start_char_pos": 1202, "end_char_pos": 1214}, {"type": "R", "before": "ROUGEscores", "after": "ROUGE scores", "start_char_pos": 1249, "end_char_pos": 1260}, {"type": "R", "before": "auto-matic", "after": "automatic", "start_char_pos": 1292, "end_char_pos": 1302}, {"type": "R", "before": "generatedheadlines", "after": "generated headlines", "start_char_pos": 1333, "end_char_pos": 1351}], "sents_char_pos": [0, 103, 254, 347, 488, 591, 732, 949, 1113]}
+{"doc_id": "2005.02950", "revision_depth": "1", "before_revision": "We analyze dependence, tail behavior and multimodality of the conditional distribution of a loss random vector given that the aggregate loss equals an exogenously provided capital. This conditional distribution is a building block for calculating risk allocations such as the Euler capital allocation of Value-at-Risk. A level set of this conditional distribution can be interpreted as a set of severe and plausible stress scenarios the given capital is supposed to cover. We show that various distributional properties of this conditional distribution are inherited from those of the underlying joint loss distribution. Among these properties, we find that multimodality of the conditional distribution is an important feature related to the number of risky scenarios likely to occur in a stressed situation. Moreover, Euler allocation becomes less sound under multimodality than under unimodality. To overcome this issue, we propose a novel risk allocation called the maximum likelihood allocation (MLA), defined as the mode of the conditional distribution given the total capital. The process of estimating MLA turns out to be beneficial for detecting multimodality, evaluating the soundness of risk allocations , and constructing more flexible risk allocations based on multiple risky scenarios . Properties of the conditional distribution and MLA are demonstrated in numerical experiments. In particular, we observe that negative dependence among losses typically leads to multimodality, and thus to multiple risky scenarios and less sound risk allocations .", "after_revision": "We study the variability of a risk from the statistical viewpoint of multimodality of the conditional loss distribution given that the aggregate loss equals an exogenously provided capital. This conditional distribution serves as a building block for calculating risk allocations such as the Euler capital allocation of Value-at-Risk. A superlevel set of this conditional distribution can be interpreted as a set of severe and plausible stress scenarios the given capital is supposed to cover. We show that various distributional properties of this conditional distribution , such as modality, dependence and tail behavior, are inherited from those of the underlying joint loss distribution. Among these properties, we find that modality of the conditional distribution is an important feature in risk assessment related to the variety of risky scenarios likely to occur in a stressed situation. Under unimodality, we introduce a novel risk allocation method called maximum likelihood allocation (MLA), defined as the mode of the conditional distribution given the total capital. Under multimodality, a single vector of allocations can be less sound. To overcome this issue, we investigate the so-called multimodalty adjustment to increase the soundness of risk allocations . Properties of the conditional distribution , MLA and multimodality adjustment are demonstrated in numerical experiments. In particular, we observe that negative dependence among losses typically leads to multimodality, and thus a higher multimodality adjustment can be required .", "edit_actions": [{"type": "R", "before": "analyze dependence, tail behavior and", "after": "study the variability of a risk from the statistical viewpoint of", "start_char_pos": 3, "end_char_pos": 40}, {"type": "R", "before": "distribution of a loss random vector", "after": "loss distribution", "start_char_pos": 74, "end_char_pos": 110}, {"type": "R", "before": "is", "after": "serves as", "start_char_pos": 211, "end_char_pos": 213}, {"type": "R", "before": "level", "after": "superlevel", "start_char_pos": 321, "end_char_pos": 326}, {"type": "A", "before": null, "after": ", such as modality, dependence and tail behavior,", "start_char_pos": 553, "end_char_pos": 553}, {"type": "R", "before": "multimodality", "after": "modality", "start_char_pos": 659, "end_char_pos": 672}, {"type": "A", "before": null, "after": "in risk assessment", "start_char_pos": 729, "end_char_pos": 729}, {"type": "R", "before": "number", "after": "variety", "start_char_pos": 745, "end_char_pos": 751}, {"type": "R", "before": "Moreover, Euler allocation becomes less sound under multimodality than under unimodality. To overcome this issue, we propose", "after": "Under unimodality, we introduce", "start_char_pos": 812, "end_char_pos": 936}, {"type": "R", "before": "called the", "after": "method called", "start_char_pos": 961, "end_char_pos": 971}, {"type": "R", "before": "The process of estimating MLA turns out to be beneficial for detecting multimodality, evaluating the", "after": "Under multimodality, a single vector of allocations can be less sound. To overcome this issue, we investigate the so-called multimodalty adjustment to increase the", "start_char_pos": 1086, "end_char_pos": 1186}, {"type": "D", "before": ", and constructing more flexible risk allocations based on multiple risky scenarios", "after": null, "start_char_pos": 1217, "end_char_pos": 1300}, {"type": "R", "before": "and MLA", "after": ", MLA and multimodality adjustment", "start_char_pos": 1346, "end_char_pos": 1353}, {"type": "R", "before": "to multiple risky scenarios and less sound risk allocations", "after": "a higher multimodality adjustment can be required", "start_char_pos": 1504, "end_char_pos": 1563}], "sents_char_pos": [0, 180, 318, 472, 621, 811, 901, 1085, 1396]}
+{"doc_id": "2005.03496", "revision_depth": "1", "before_revision": "In this paper , we propose a new procedure to build a structural-factor model for a vector unit-root time series . For a p-dimensional unit-root process , we assume that each component consists of a set of common factors, which may be unit-root non-stationary, and a set of stationary components, which contain the cointegrations among the unit-root processes. To further reduce the dimensionality, we also postulate that the stationary part of the series is a nonsingular linear transformation of certain common factors and idiosyncratic white noise components as in Gao and Tsay (2019a, b) . The estimation of linear loading spaces of the unit-root factors and the stationary components is achieved by an eigenanalysis of some nonnegative definite matrix , and the separation between the stationary factors and the white noises is based on an eigenanalysis and a projected principal component analysis . Asymptotic properties of the proposed method are established for both fixed p and diverging p as the sample size n tends to infinity. Both simulated and real examples are used to demonstrate the performance of the proposed method in finite samples .", "after_revision": "This paper proposes a new procedure to build factor models for high-dimensional unit-root time series by postulating that a p-dimensional unit-root process is a nonsingular linear transformation of a set of unit-root processes, a set of stationary common factors, which are dynamically dependent, and some idiosyncratic white noise components. For the stationary components, we assume that the factor process captures the temporal-dependence and the idiosyncratic white noise series explains, jointly with the factors, the cross-sectional dependence . The estimation of nonsingular linear loading spaces is carried out in two steps. First, we use an eigenanalysis of a nonnegative definite matrix of the data to separate the unit-root processes from the stationary ones and a modified method to specify the number of unit roots. We then employ another eigenanalysis and a projected principal component analysis to identify the stationary common factors and the white noise series. We propose a new procedure to specify the number of white noise series and, hence, the number of stationary common factors, establish asymptotic properties of the proposed method for both fixed and diverging p as the sample size n increases, and use simulation and a real example to demonstrate the performance of the proposed method in finite samples . We also compare our method with some commonly used ones in the literature regarding the forecast ability of the extracted factors and find that the proposed method performs well in out-of-sample forecasting of a 508-dimensional PM_{2.5 .", "edit_actions": [{"type": "R", "before": "In this paper , we propose", "after": "This paper proposes", "start_char_pos": 0, "end_char_pos": 26}, {"type": "R", "before": "a structural-factor model for a vector", "after": "factor models for high-dimensional", "start_char_pos": 52, "end_char_pos": 90}, {"type": "R", "before": ". For", "after": "by postulating that", "start_char_pos": 113, "end_char_pos": 118}, {"type": "R", "before": ", we assume that each component consists", "after": "is a nonsingular linear transformation", "start_char_pos": 153, "end_char_pos": 193}, {"type": "D", "before": "common factors, which may be", "after": null, "start_char_pos": 206, "end_char_pos": 234}, {"type": "R", "before": "non-stationary, and", "after": "processes,", "start_char_pos": 245, "end_char_pos": 264}, {"type": "R", "before": "components, which contain the cointegrations among the unit-root processes. To further reduce the dimensionality, we also postulate that the stationary part of the series is a nonsingular linear transformation of certain common factors and", "after": "common factors, which are dynamically dependent, and some idiosyncratic white noise components. For the stationary components, we assume that the factor process captures the temporal-dependence and the", "start_char_pos": 285, "end_char_pos": 524}, {"type": "R", "before": "components as in Gao and Tsay (2019a, b)", "after": "series explains, jointly with the factors, the cross-sectional dependence", "start_char_pos": 551, "end_char_pos": 591}, {"type": "A", "before": null, "after": "nonsingular", "start_char_pos": 612, "end_char_pos": 612}, {"type": "R", "before": "of the unit-root factors and the stationary components is achieved by", "after": "is carried out in two steps. First, we use", "start_char_pos": 635, "end_char_pos": 704}, {"type": "R", "before": "some", "after": "a", "start_char_pos": 725, "end_char_pos": 729}, {"type": "R", "before": ", and the separation between the stationary factors and the white noises is based on an", "after": "of the data to separate the unit-root processes from the stationary ones and a modified method to specify the number of unit roots. We then employ another", "start_char_pos": 758, "end_char_pos": 845}, {"type": "R", "before": ". Asymptotic", "after": "to identify the stationary common factors and the white noise series. We propose a new procedure to specify the number of white noise series and, hence, the number of stationary common factors, establish asymptotic", "start_char_pos": 905, "end_char_pos": 917}, {"type": "D", "before": "are established", "after": null, "start_char_pos": 952, "end_char_pos": 967}, {"type": "D", "before": "p", "after": null, "start_char_pos": 983, "end_char_pos": 984}, {"type": "R", "before": "tends to infinity. Both simulated and real examples are used", "after": "increases, and use simulation and a real example", "start_char_pos": 1022, "end_char_pos": 1082}, {"type": "A", "before": null, "after": ". We also compare our method with some commonly used ones in the literature regarding the forecast ability of the extracted factors and find that the proposed method performs well in out-of-sample forecasting of a 508-dimensional PM_{2.5", "start_char_pos": 1155, "end_char_pos": 1155}], "sents_char_pos": [0, 114, 360, 591, 1040]}
+{"doc_id": "2005.03554", "revision_depth": "1", "before_revision": "We analyze recently proposed mortgage contracts which aim to eliminate selective borrower default when the loan balance exceeds the house price (the \"underwater\" effect). We show that contracts which automatically reduce the outstanding balance in the event of local house price decline remove the default incentive, but may induce prepayment in low price states. However, low state prepayments vanish if borrower utility from home ownership , or outside options such as rental costs, are too high. We also show that capital gain sharing features, through prepayment penalties in high house price states, are ineffective , as they virtually eliminate prepayment in such states. For typical foreclosure costs, we find that contracts with automatic balance adjustments become preferable to the traditional fixed rate mortgage at contract rate spreads of approximately 50-100 basis points , depending on how far prices must fall before adjustments are made. Furthermore, these spreads rapidly decrease with the borrower utility from home ownership. Our results are obtained using American options pricing methods , in a model with diffusive home prices , and either diffusive or constant interest rates. We determine the contract, default and prepayment option values with optimal decision rules . We provide explicit solutions in the perpetual case with constant interest rates; and numerically compute the prepayment and default boundaries in the general case .", "after_revision": "We analyze recently proposed mortgage contracts which aim to eliminate selective borrower default when the loan balance exceeds the house price (the \"underwater\" effect). We show that contracts which automatically reduce the outstanding balance in the event of house price decline remove the default incentive, but may induce prepayment in low price states. However, low state prepayments vanish if the benefit from home ownership is sufficiently high. We also show that capital gain sharing features, such as prepayment penalties in high house price states, are ineffective as they virtually eliminate prepayment . For observed foreclosure costs, we find that contracts with automatic balance adjustments become preferable to the traditional fixed rate contracts at mortgage rate spreads between 50-100 basis points . Results are obtained using American options pricing method , in a continuous time model with diffusive home prices . Here, we associate the contracts' values and optimal decision rules with free boundary problems . We provide explicit solutions in the long contract maturity limit .", "edit_actions": [{"type": "D", "before": "local", "after": null, "start_char_pos": 261, "end_char_pos": 266}, {"type": "R", "before": "borrower utility", "after": "the benefit", "start_char_pos": 405, "end_char_pos": 421}, {"type": "R", "before": ", or outside options such as rental costs, are too", "after": "is sufficiently", "start_char_pos": 442, "end_char_pos": 492}, {"type": "R", "before": "through", "after": "such as", "start_char_pos": 548, "end_char_pos": 555}, {"type": "D", "before": ",", "after": null, "start_char_pos": 621, "end_char_pos": 622}, {"type": "R", "before": "in such states. For typical", "after": ". For observed", "start_char_pos": 662, "end_char_pos": 689}, {"type": "R", "before": "mortgage at contract rate spreads of approximately", "after": "contracts at mortgage rate spreads between", "start_char_pos": 815, "end_char_pos": 865}, {"type": "R", "before": ", depending on how far prices must fall before adjustments are made. Furthermore, these spreads rapidly decrease with the borrower utility from home ownership. Our results", "after": ". Results", "start_char_pos": 886, "end_char_pos": 1057}, {"type": "R", "before": "methods", "after": "method", "start_char_pos": 1102, "end_char_pos": 1109}, {"type": "A", "before": null, "after": "continuous time", "start_char_pos": 1117, "end_char_pos": 1117}, {"type": "R", "before": ", and either diffusive or constant interest rates. We determine the contract, default and prepayment option values with", "after": ". Here, we associate the contracts' values and", "start_char_pos": 1151, "end_char_pos": 1270}, {"type": "A", "before": null, "after": "with free boundary problems", "start_char_pos": 1294, "end_char_pos": 1294}, {"type": "R", "before": "perpetual case with constant interest rates; and numerically compute the prepayment and default boundaries in the general case", "after": "long contract maturity limit", "start_char_pos": 1334, "end_char_pos": 1460}], "sents_char_pos": [0, 170, 363, 498, 677, 954, 1045, 1201, 1296, 1378]}
+{"doc_id": "2005.03954", "revision_depth": "2", "before_revision": "We focus on the study of conversational recommendation in the context of multi-type dialogs, where the bots can proactively and naturally lead a conversation from a non-recommendation dialog (e.g., QA) to a recommendation dialog, taking into account user's interests and feedback. To facilitate the study of this task, we create a human-to-human Chinese dialog dataset DuRecDial (about 10k dialogs, 156k utterances), which contains multiple sequential dialogs for every pair of a recommendation seeker (user) and a recommender (bot). In each dialog, the recommender proactively leads a multi-type dialog to approach recommendation targets and then makes multiple recommendations with rich interaction behavior. This dataset allows us to systematically investigate different parts of the overall problem, e.g., how to naturally lead a dialog, how to interact with users for recommendation. Finally we establish baseline results on DuRecDial for future studies. Dataset and codes are publicly available at URL", "after_revision": "We propose a new task of conversational recommendation over multi-type dialogs, where the bots can proactively and naturally lead a conversation from a non-recommendation dialog (e.g., QA) to a recommendation dialog, taking into account user's interests and feedback. To facilitate the study of this task, we create a human-to-human Chinese dialog dataset DuRecDial (about 10k dialogs, 156k utterances), which contains multiple sequential dialogs for every pair of a recommendation seeker (user) and a recommender (bot). In each dialog, the recommender proactively leads a multi-type dialog to approach recommendation targets and then makes multiple recommendations with rich interaction behavior. This dataset allows us to systematically investigate different parts of the overall problem, e.g., how to naturally lead a dialog, how to interact with users for recommendation. Finally we establish baseline results on DuRecDial for future studies. Dataset and codes are publicly available at URL", "edit_actions": [{"type": "R", "before": "focus on the study", "after": "propose a new task", "start_char_pos": 3, "end_char_pos": 21}, {"type": "R", "before": "in the context of", "after": "over", "start_char_pos": 55, "end_char_pos": 72}, {"type": "R", "before": "DuRecDial", "after": "DuRecDial", "start_char_pos": 369, "end_char_pos": 378}], "sents_char_pos": [0, 280, 533, 710, 888, 959]}
+{"doc_id": "2005.03969", "revision_depth": "2", "before_revision": "The outbreak of the novel coronavirus (COVID-19) is considered an exogenous risk, which has caused unprecedented disruptions to financial and economic markets around the globe, leading to one of the fastest U.S. stock market declines in history. However, in the pastwe have seen the market recover and we can expect the market to recover again, and on this basis we assume the Standard and Poor's 500 (S P500) index will reach a minimum before rising again in the not-too-distant future. Here we present four forecast models of the S P500 based on COVID-19 projections of deaths released on 02/04/2020 by the University of Washington and the 2-months consideration since the first confirmed case occured in USA. The decline and recovery in the index is estimated for the following three months . The forecast is a projection of a prediction with fluctuations described by q-gaussian distributions . Our forecast was made on the premise that : (a ) The prediction is based on a deterministic trend that follows the data available since the initial outbreak of COVID-19, and (b) fluctuations derived from the S P500 over the last 24 years. %DIFDELCMD < \\end{abstract} %DIFDELCMD < %%% \\\\%DIF > of accuracy.", "after_revision": "Markets are subjected to both endogenous and exogenous risks that have caused disruptions to financial and economic markets around the globe, leading eventually to fast stock market declines . In the past, markets have recovered after any economic disruption. On this basis, we focus on the outbreak of COVID-19 as a case study of an exogenous risk and analyze its impact on the Standard and Poor's 500 (S \\& P500) index . We assumed that the S\\&P500 index reaches a minimum before rising again in the not-too-distant future. Here we present two cases to forecast the S\\& P500 index. The first case uses an estimation of expected deaths released on 02/04/2020 by the University of Washington . For the second case, it is assumed that the peak number of deaths will occur 2-months since the first confirmed case occurred in the USA. The decline and recovery in the index were estimated for the following three months after the initial point of the predicted trend . The forecast is a projection of a prediction with stochastic fluctuations described by q-gaussian diffusion process with three spatio-temporal regimes . Our forecast was made on the premise that any market response can be decomposed into an overall deterministic trend and a stochastic term. The prediction was based on the deterministic part and for this case study is approximated by the extrapolation of the S\\&P500 data trend in the initial stages of the outbreak. The stochastic fluctuations have the same structure as the one derived from the past 24 years. %DIFDELCMD < \\end{abstract} %DIFDELCMD < %%% A reasonable forecast was achieved with 85\\\\%DIF > of accuracy.", "edit_actions": [{"type": "R", "before": "The outbreak of the novel coronavirus (COVID-19) is considered an exogenous risk, which has caused unprecedented", "after": "Markets are subjected to both endogenous and exogenous risks that have caused", "start_char_pos": 0, "end_char_pos": 112}, {"type": "R", "before": "to one of the fastest U.S.", "after": "eventually to fast", "start_char_pos": 185, "end_char_pos": 211}, {"type": "R", "before": "in history. However, in the pastwe have seen the market recover and we can expect the market to recover again, and on this basis we assume", "after": ". In the past, markets have recovered after any economic disruption. On this basis, we focus on the outbreak of COVID-19 as a case study of an exogenous risk and analyze its impact on", "start_char_pos": 234, "end_char_pos": 372}, {"type": "A", "before": null, "after": "\\&", "start_char_pos": 404, "end_char_pos": 404}, {"type": "R", "before": "will reach", "after": ". We assumed that the S\\&P500 index reaches", "start_char_pos": 417, "end_char_pos": 427}, {"type": "R", "before": "four forecast models of the S", "after": "two cases to forecast the S\\&", "start_char_pos": 505, "end_char_pos": 534}, {"type": "R", "before": "based on COVID-19 projections of", "after": "index. The first case uses an estimation of expected", "start_char_pos": 540, "end_char_pos": 572}, {"type": "R", "before": "and the", "after": ". For the second case, it is assumed that the peak number of deaths will occur", "start_char_pos": 635, "end_char_pos": 642}, {"type": "D", "before": "consideration", "after": null, "start_char_pos": 652, "end_char_pos": 665}, {"type": "R", "before": "occured in", "after": "occurred in the", "start_char_pos": 697, "end_char_pos": 707}, {"type": "R", "before": "is", "after": "were", "start_char_pos": 751, "end_char_pos": 753}, {"type": "A", "before": null, "after": "after the initial point of the predicted trend", "start_char_pos": 795, "end_char_pos": 795}, {"type": "A", "before": null, "after": "stochastic", "start_char_pos": 848, "end_char_pos": 848}, {"type": "R", "before": "distributions", "after": "diffusion process with three spatio-temporal regimes", "start_char_pos": 886, "end_char_pos": 899}, {"type": "R", "before": ": (a ) The prediction is based on a deterministic trend that follows the data available since the initial outbreak of COVID-19, and (b) fluctuations", "after": "any market response can be decomposed into an overall deterministic trend and a stochastic term. The prediction was based on the deterministic part and for this case study is approximated by the extrapolation of the S\\&P500 data trend in the initial stages of the outbreak. The stochastic fluctuations have the same structure as the one", "start_char_pos": 944, "end_char_pos": 1092}, {"type": "D", "before": "S", "after": null, "start_char_pos": 1110, "end_char_pos": 1111}, {"type": "R", "before": "P500 over the last", "after": "past", "start_char_pos": 1112, "end_char_pos": 1130}, {"type": "A", "before": null, "after": "A reasonable forecast was achieved with 85", "start_char_pos": 1186, "end_char_pos": 1186}], "sents_char_pos": [0, 245, 488, 712, 797, 901]}
+{"doc_id": "2005.05480", "revision_depth": "1", "before_revision": "Neural network based approaches to natural language generation (NLG) have gained popularity in recent years . The goal of the task is to generate a natural language string to realize an input meaning representation , hence large datasets of paired utterances and their meaning representations are used for training the network . However, dataset creation for language generation is an arduous task , and popular datasets designed for training these generators mostly consist of simple meaning representations composed of slot and value tokens to be realized. These simple meaning representations do not include any contextual information that may be helpful for training an NLG system to generalize, such as domain information and descriptions of slots and values. In this paper, we present the novel task of Schema-Guided Natural Language Generation , in which we repurpose an existing dataset for another task: dialog state tracking . Dialog state tracking data includes a large and rich schema spanning multiple different attributes, including information about the domain, user intent, and slot descriptions. We train different state-of-the-art models for neural natural language generation on this data and show that inclusion of the rich schema allows our models to produce higher quality outputs both in terms of semantics and diversity. We also conduct experiments comparing model performance on seen versus unseen domains . Finally, we present human evaluation results and analysis demonstrating high ratings for overall output quality.", "after_revision": "Neural network based approaches to data-to-text natural language generation (NLG) have gained popularity in recent years , with the goal of generating a natural language prompt that accurately realizes an input meaning representation . To facilitate the training of neural network models, researchers created large datasets of paired utterances and their meaning representations . However, the creation of such datasets is an arduous task and they mostly consist of simple meaning representations composed of slot and value tokens to be realized. These representations do not include any contextual information that an NLG system can use when trying to generalize, such as domain information and descriptions of slots and values. In this paper, we present the novel task of Schema-Guided Natural Language Generation (SG-NLG). Here, the goal is still to generate a natural language prompt, but in SG-NLG, the input MRs are paired with rich schemata providing contextual information. To generate a dataset for SG-NLG we re-purpose an existing dataset for another task: dialog state tracking , which includes a large and rich schema spanning multiple different attributes, including information about the domain, user intent, and slot descriptions. We train different state-of-the-art models for neural natural language generation on this dataset and show that in many cases, including rich schema information allows our models to produce higher quality outputs both in terms of semantics and diversity. We also conduct experiments comparing model performance on seen versus unseen domains , and present a human evaluation demonstrating high ratings for overall output quality.", "edit_actions": [{"type": "A", "before": null, "after": "data-to-text", "start_char_pos": 35, "end_char_pos": 35}, {"type": "R", "before": ". The goal of the task is to generate", "after": ", with the goal of generating", "start_char_pos": 109, "end_char_pos": 146}, {"type": "R", "before": "string to realize", "after": "prompt that accurately realizes", "start_char_pos": 166, "end_char_pos": 183}, {"type": "R", "before": ", hence", "after": ". To facilitate the training of neural network models, researchers created", "start_char_pos": 216, "end_char_pos": 223}, {"type": "D", "before": "are used for training the network", "after": null, "start_char_pos": 294, "end_char_pos": 327}, {"type": "R", "before": "dataset creation for language generation", "after": "the creation of such datasets", "start_char_pos": 339, "end_char_pos": 379}, {"type": "R", "before": ", and popular datasets designed for training these generators", "after": "and they", "start_char_pos": 399, "end_char_pos": 460}, {"type": "D", "before": "simple meaning", "after": null, "start_char_pos": 566, "end_char_pos": 580}, {"type": "D", "before": "may be helpful for training", "after": null, "start_char_pos": 644, "end_char_pos": 671}, {"type": "A", "before": null, "after": "can use when trying", "start_char_pos": 686, "end_char_pos": 686}, {"type": "R", "before": ", in which we repurpose", "after": "(SG-NLG). Here, the goal is still to generate a natural language prompt, but in SG-NLG, the input MRs are paired with rich schemata providing contextual information. To generate a dataset for SG-NLG we re-purpose", "start_char_pos": 853, "end_char_pos": 876}, {"type": "R", "before": ". Dialog state tracking data", "after": ", which", "start_char_pos": 937, "end_char_pos": 965}, {"type": "R", "before": "data", "after": "dataset", "start_char_pos": 1205, "end_char_pos": 1209}, {"type": "R", "before": "inclusion of the rich schema", "after": "in many cases, including rich schema information", "start_char_pos": 1224, "end_char_pos": 1252}, {"type": "R", "before": ". Finally, we present human evaluation results and analysis", "after": ", and present a human evaluation", "start_char_pos": 1433, "end_char_pos": 1492}], "sents_char_pos": [0, 110, 329, 559, 766, 1114, 1346, 1434]}
+{"doc_id": "2005.06552", "revision_depth": "2", "before_revision": "The SIR evolutionary model predicts too sharp a decrease of the fractions of people infected with COVID-19 in France after the start of the national lockdown, compared to what is observed. I introduce three extensions to these models to fit the daily arrivals in French hospitals, as well in critical care , releases and deaths . These models involve ratios of evolutionary timescales to branching fractions, assumed uniform throughout a country, and the basic reproduction number, R_0, before and during the national lockdown, for each region of France. The hospital data are well fit by the models with the exception of the arrivals in critical care, which are found to decrease in time faster than predicted by all models. This suggests that hospitals have learnt over timeto better treat COVID-19 patients without resorting to critical care. The basic reproductive factor, averaged over France, was R_0= 3.4\\pm0.1 before the lockdown and 0.65\\pm0.04 (90\\% c.l.) during it, both with small regional variations. On 11 May 2020, the Infection Fatality Rate in France is 4 \\pm1\\% (90\\% c.l.) and constant , while the Feverish vastly outnumber the Asymptomatic, contrary to the early phases. Without the lockdown nor social distancing, over 2 million deaths from COVID-19 would have occurred throughout France . The fraction of immunized people reached a plateau below 1\\% throughout France (3\\% in Paris) by late April 2020 (95\\% c.l.), suggesting a lack of herd immunity and that a second wave of the pandemic is possible during the partial lifting of the national lockdown. After the partial lifting of the lockdown, if R_0 is as high as 1.5, then a second wave will lead to 60 thousand deaths by mid-July and over a million by October , while if R_0 is 1.2 or lower, the pandemic is delayed with deaths rising as late as August, allowing for timely governmental response .", "after_revision": "The SIR evolutionary model predicts too sharp a decrease of the fractions of people infected with COVID-19 in France after the start of the national lockdown, compared to what is observed. I fit the daily hospital data: arrivals in regular and critical care units , releases and deaths , using extended SEIR models. These involve ratios of evolutionary timescales to branching fractions, assumed uniform throughout a country, and the basic reproduction number, R_0, before and during the national lockdown, for each region of France. The joint-region Bayesian analysis allows precise evaluations of the time/fraction ratios and pre-hospitalized fractions. The hospital data are well fit by the models , except the arrivals in critical care, which decrease faster than predicted , indicating better treatment over time. Averaged over France, the analysis yields R_0= 3.4\\pm0.1 before the lockdown and 0.65\\pm0.04 (90\\% c.l.) during the lockdown, with small regional variations. On 11 May 2020, the Infection Fatality Rate in France was 4 \\pm1\\% (90\\% c.l.) , while the Feverish vastly outnumber the Asymptomatic, contrary to the early phases. Without the lockdown nor social distancing, over 2 million deaths from COVID-19 would have occurred throughout France , while a lockdown that would have been enforced 10 days earlier would have led to less than 1000 deaths . The fraction of immunized people reached a plateau below 1\\% throughout France (3\\% in Paris) by late April 2020 (95\\% c.l.), suggesting a lack of herd immunity . The widespread availability of face masks on 11 May, when the lockdown was partially lifted, should keep R_0 below unity if at least 46\\% of the population wear them outside their home. Otherwise, without enhanced other social distancing, a second wave is inevitable and cause the number of deaths to triple between early May and October ( if R_0 = 1.2 ) or even late June (if R_0=2) .", "edit_actions": [{"type": "D", "before": "introduce three extensions to these models to", "after": null, "start_char_pos": 191, "end_char_pos": 236}, {"type": "R", "before": "arrivals in French hospitals, as well in critical care", "after": "hospital data: arrivals in regular and critical care units", "start_char_pos": 251, "end_char_pos": 305}, {"type": "R", "before": ". These models", "after": ", using extended SEIR models. These", "start_char_pos": 328, "end_char_pos": 342}, {"type": "A", "before": null, "after": "joint-region Bayesian analysis allows precise evaluations of the time/fraction ratios and pre-hospitalized fractions. The", "start_char_pos": 559, "end_char_pos": 559}, {"type": "R", "before": "with the exception of the", "after": ", except the", "start_char_pos": 601, "end_char_pos": 626}, {"type": "R", "before": "are found to decrease in time", "after": "decrease", "start_char_pos": 660, "end_char_pos": 689}, {"type": "R", "before": "by all models. This suggests that hospitals have learnt over timeto better treat COVID-19 patients without resorting to critical care. The basic reproductive factor, averaged", "after": ", indicating better treatment over time. Averaged", "start_char_pos": 712, "end_char_pos": 886}, {"type": "R", "before": "was", "after": "the analysis yields", "start_char_pos": 900, "end_char_pos": 903}, {"type": "R", "before": "it, both", "after": "the lockdown,", "start_char_pos": 974, "end_char_pos": 982}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1069, "end_char_pos": 1071}, {"type": "D", "before": "and constant", "after": null, "start_char_pos": 1093, "end_char_pos": 1105}, {"type": "A", "before": null, "after": ", while a lockdown that would have been enforced 10 days earlier would have led to less than 1000 deaths", "start_char_pos": 1310, "end_char_pos": 1310}, {"type": "R", "before": "and that a second wave of the pandemic is possible during the partial lifting of the national lockdown. After the partial lifting of the lockdown, if R_0 is as high as 1.5, then", "after": ". The widespread availability of face masks on 11 May, when the lockdown was partially lifted, should keep R_0 below unity if at least 46\\% of the population wear them outside their home. Otherwise, without enhanced other social distancing,", "start_char_pos": 1474, "end_char_pos": 1651}, {"type": "R", "before": "will lead to 60 thousand deaths by mid-July and over a million by October , while", "after": "is inevitable and cause the number of deaths to triple between early May and October (", "start_char_pos": 1666, "end_char_pos": 1747}, {"type": "R", "before": "is", "after": "=", "start_char_pos": 1755, "end_char_pos": 1757}, {"type": "R", "before": "or lower, the pandemic is delayed with deaths rising as late as August, allowing for timely governmental response", "after": ") or even late June (if R_0=2)", "start_char_pos": 1762, "end_char_pos": 1875}], "sents_char_pos": [0, 188, 329, 554, 726, 846, 1014, 1191, 1312, 1577]}
+{"doc_id": "2005.06636", "revision_depth": "1", "before_revision": "A graph game is a two-player zero-sum game in which the players move a token throughout a graph to produce an infinite path, which determines the winner or payoff of the game. In \"bidding games\",{\\em in each turn, we hold an 'auction' (bidding) to determine which player moves the token . The players simultaneously submit bids and the higher bidder moves the token. Several different payment schemeshave been considered. In \"{\\em first-price \" bidding , only the higher bidder pays his bid , while in \"{\\em all-pay \" bidding, both players pay their bids. Bidding games were largely studied with variants of first-price bidding. In this work, we study , for the first time, infinite-duration all-pay bidding games , and show that they exhibit the elegant{\\em mathematical properties of their first-price counterparts . This is in stark contrast with reachability games, which are known to be much more complicated under{\\em all-pay bidding than first-price bidding. Another orthogonal distinction between the bidding rules is in the recipient of the payments: in \"Richman\" bidding, the bids are paid to the other player , and in \"poorman\" bidding, the bids are paid to the 'bank'. We focus on strongly-connected games with \"mean-payoff\" and \"parity\" objectives. We completely solve all-pay Richman games: a simple argument shows that deterministic strategies cannot guarantee anything in this model, and it is technically much more challenging to find optimal probabilistic strategies that achieve the same expected guarantees in a game as can be obtained with deterministic strategies under first-price bidding. Under poorman all-pay bidding , in contrast to Richman bidding, deterministic strategies are useful and guarantee a payoff that is only slightly lower than the optimal payoff under first-price poorman bidding. Our proofs are constructive and based on new and significantly simpler constructions for first-price bidding.", "after_revision": "In a two-player zero-sum graph game the players move a token throughout a graph to produce an infinite path, which determines the winner or payoff of the game. Traditionally, the players alternate turns in moving the token. In{\\em bidding games , however, the players have budgets, and in each turn, we hold an \"auction\" (bidding) to determine which player moves the token : both players simultaneously submit bids and the higher bidder moves the token. The bidding mechanisms differ in their payment schemes. Bidding games were largely studied with variants of{\\em first-price bidding in which only the higher bidder pays his bid . We focus on{\\em all-pay bidding, where both players pay their bids. Finite-duration all-pay bidding games were studied and shown to be technically more challenging than their first-price counterparts. We study for the first time, infinite-duration all-pay bidding games . Our most interesting results are for{\\em mean-payoff objectives: we portray a complete picture for games played on strongly-connected graphs. We study both pure (deterministic) and mixed (probabilistic) strategies and completely characterize the optimal sure and almost-sure (with probability 1) payoffs that the players can respectively guarantee. We show that mean-payoff games under all-pay bidding exhibit the intriguing mathematical properties of their first-price counterparts ; namely, an equivalence with{\\em random-turn games in which in each turn, the player who moves is selected according to a (biased) coin toss. The equivalences for all-pay bidding are more intricate and unexpected than for first-price bidding.", "edit_actions": [{"type": "R", "before": "A graph game is", "after": "In", "start_char_pos": 0, "end_char_pos": 15}, {"type": "R", "before": "game in which", "after": "graph game", "start_char_pos": 38, "end_char_pos": 51}, {"type": "R", "before": "In \"bidding games\",", "after": "Traditionally, the players alternate turns in moving the token. In", "start_char_pos": 176, "end_char_pos": 195}, {"type": "A", "before": null, "after": "bidding games", "start_char_pos": 200, "end_char_pos": 200}, {"type": "A", "before": null, "after": ", however, the players have budgets, and", "start_char_pos": 201, "end_char_pos": 201}, {"type": "R", "before": "'auction'", "after": "\"auction\"", "start_char_pos": 227, "end_char_pos": 236}, {"type": "R", "before": ". The", "after": ": both", "start_char_pos": 289, "end_char_pos": 294}, {"type": "R", "before": "Several different payment schemeshave been considered. In \"", "after": "The bidding mechanisms differ in their payment schemes. Bidding games were largely studied with variants of", "start_char_pos": 369, "end_char_pos": 428}, {"type": "R", "before": "\" bidding ,", "after": "bidding in which", "start_char_pos": 445, "end_char_pos": 456}, {"type": "R", "before": ", while in \"", "after": ". We focus on", "start_char_pos": 493, "end_char_pos": 505}, {"type": "R", "before": "\" bidding,", "after": "bidding, where", "start_char_pos": 518, "end_char_pos": 528}, {"type": "R", "before": "Bidding games were largely studied with variants of", "after": "Finite-duration all-pay bidding games were studied and shown to be technically more challenging than their", "start_char_pos": 558, "end_char_pos": 609}, {"type": "R", "before": "bidding. In this work, we study ,", "after": "counterparts. We study", "start_char_pos": 622, "end_char_pos": 655}, {"type": "R", "before": ", and show that they exhibit the elegant", "after": ". Our most interesting results are for", "start_char_pos": 716, "end_char_pos": 756}, {"type": "A", "before": null, "after": "mean-payoff", "start_char_pos": 761, "end_char_pos": 761}, {"type": "A", "before": null, "after": "objectives: we portray a complete picture for games played on strongly-connected graphs. We study both pure (deterministic) and mixed (probabilistic) strategies and completely characterize the optimal sure and almost-sure (with probability 1) payoffs that the players can respectively guarantee. We show that mean-payoff games under all-pay bidding exhibit the intriguing", "start_char_pos": 762, "end_char_pos": 762}, {"type": "R", "before": ". This is in stark contrast with reachability games, which are known to be much more complicated under", "after": "; namely, an equivalence with", "start_char_pos": 821, "end_char_pos": 923}, {"type": "A", "before": null, "after": "random-turn games", "start_char_pos": 928, "end_char_pos": 928}, {"type": "A", "before": null, "after": "in which in each turn, the player who moves is selected according to a (biased) coin toss. The equivalences for", "start_char_pos": 929, "end_char_pos": 929}, {"type": "D", "before": "bidding than first-price bidding. Another orthogonal distinction between the bidding rules is in the recipient of the payments: in \"Richman\" bidding, the bids are paid to the other player , and in \"poorman\" bidding, the bids are paid to the 'bank'. We focus on strongly-connected games with \"mean-payoff\" and \"parity\" objectives. We completely solve all-pay Richman games: a simple argument shows that deterministic strategies cannot guarantee anything in this model, and it is technically much more challenging to find optimal probabilistic strategies that achieve the same expected guarantees in a game as can be obtained with deterministic strategies under first-price bidding. Under poorman all-pay", "after": null, "start_char_pos": 938, "end_char_pos": 1640}, {"type": "R", "before": ", in contrast to Richman bidding, deterministic strategies are useful and guarantee a payoff that is only slightly lower than the optimal payoff under first-price poorman bidding. Our proofs are constructive and based on new and significantly simpler constructions", "after": "are more intricate and unexpected than", "start_char_pos": 1649, "end_char_pos": 1913}], "sents_char_pos": [0, 175, 290, 368, 423, 557, 630, 822, 971, 1186, 1267, 1618, 1828]}
+{"doc_id": "2005.07115", "revision_depth": "1", "before_revision": "In this work, we are interested in the large graph similarity computation problem , which is one of the most important graph-based problems. Traditional techniques to compute the exact or approximate values of Graph Edit Distance (GED) and Maximum Common Subgraph (MCS) require at least polynomial time complexity over node numbers thus are not able to handle this problem when the numbers of nodes are large . Recently the develop of deep learning techniques provide a promising solution for this problem by training a network which is able to encode graphs to feature vectors and then compute similarity based on feature vectors. However, when we look into these techniques and classify them to embedding models and matching models , problems arise . Embedding models can be quite fast but perform poorly due to the lack of interaction across graphswhile matching models involve this for much better performance but satisfy far more on time consumption . Similar to the process of large biological molecular identification , where we first maps the whole molecular to molecular groups and then identify them based on the \"abstracted smaller molecular\", the feature aggregation across two whole graphs is always redundant, especially when the number of nodes is large. Thus we here present a novel framework for large graph similarity computation problem. We first embed and coarsen the large graphs to \"abstracted smaller graphs \" with denser local topology , similar to molecular groups in biological concept. Then we aggregate both the internal features in \"abstracted smaller graphs \" and external features across \"abstracted smaller graph pair\", leading to feature vectors for each graph, with which we calculate the final similarity score. Experiments demonstrate that our proposed framework outperforms state-of-the-art methods in graph similarity computation tasks and has significant improvement in time efficiency .", "after_revision": "In this work, we focus on large graph similarity computation problem and propose a novel ``embedding-coarsening-matching'' learning framework, which outperforms state-of-the-art methods in this task and has significant improvement in time efficiency. Graph similarity computation for metrics such as Graph Edit Distance (GED) is typically NP-hard, and existing heuristics-based algorithms usually achieves a unsatisfactory trade-off between accuracy and efficiency . Recently the development of deep learning techniques provides a promising solution for this problem by a data-driven approach which trains a network to encode graphs to their own feature vectors and computes similarity based on feature vectors. These deep-learning methods can be classified to two categories, embedding models and matching models . Embedding models such as GCN-Mean and GCN-Max, which directly map graphs to respective feature vectors, run faster but the performance is usually poor due to the lack of interactions across graphs. Matching models such as GMN, whose encoding process involves interaction across the two graphs, are more accurate but interaction between whole graphs brings a significant increase in time consumption (at least quadratic time complexity over number of nodes). Inspired by large biological molecular identification where the whole molecular is first mapped to functional groups and then identified based on these functional groups, our ``embedding-coarsening-matching'' learning framework first embeds and coarsens large graphs to coarsened graphs with denser local topology and then matching mechanism is deployed on the coarsened graphs for the final similarity scores. Detailed experiments have been conducted and the results demonstrate the efficiency and effectiveness of our proposed framework .", "edit_actions": [{"type": "R", "before": "are interested in the", "after": "focus on", "start_char_pos": 17, "end_char_pos": 38}, {"type": "R", "before": ", which is one of the most important graph-based problems. Traditional techniques to compute the exact or approximate values of Graph", "after": "and propose a novel ``embedding-coarsening-matching'' learning framework, which outperforms state-of-the-art methods in this task and has significant improvement in time efficiency. Graph similarity computation for metrics such as Graph", "start_char_pos": 82, "end_char_pos": 215}, {"type": "R", "before": "and Maximum Common Subgraph (MCS) require at least polynomial time complexity over node numbers thus are not able to handle this problem when the numbers of nodes are large", "after": "is typically NP-hard, and existing heuristics-based algorithms usually achieves a unsatisfactory trade-off between accuracy and efficiency", "start_char_pos": 236, "end_char_pos": 408}, {"type": "R", "before": "develop", "after": "development", "start_char_pos": 424, "end_char_pos": 431}, {"type": "R", "before": "provide", "after": "provides", "start_char_pos": 460, "end_char_pos": 467}, {"type": "R", "before": "training a network which is able", "after": "a data-driven approach which trains a network", "start_char_pos": 509, "end_char_pos": 541}, {"type": "A", "before": null, "after": "their own", "start_char_pos": 562, "end_char_pos": 562}, {"type": "R", "before": "then compute", "after": "computes", "start_char_pos": 583, "end_char_pos": 595}, {"type": "R", "before": "However, when we look into these techniques and classify them to", "after": "These deep-learning methods can be classified to two categories,", "start_char_pos": 633, "end_char_pos": 697}, {"type": "D", "before": ", problems arise", "after": null, "start_char_pos": 735, "end_char_pos": 751}, {"type": "R", "before": "can be quite fast but perform poorly", "after": "such as GCN-Mean and GCN-Max, which directly map graphs to respective feature vectors, run faster but the performance is usually poor", "start_char_pos": 771, "end_char_pos": 807}, {"type": "R", "before": "interaction across graphswhile matching models involve this for much better performance but satisfy far more on time consumption . Similar to the process of", "after": "interactions across graphs. Matching models such as GMN, whose encoding process involves interaction across the two graphs, are more accurate but interaction between whole graphs brings a significant increase in time consumption (at least quadratic time complexity over number of nodes). Inspired by", "start_char_pos": 827, "end_char_pos": 983}, {"type": "R", "before": ", where we first maps", "after": "where", "start_char_pos": 1026, "end_char_pos": 1047}, {"type": "R", "before": "to molecular", "after": "is first mapped to functional", "start_char_pos": 1068, "end_char_pos": 1080}, {"type": "R", "before": "identify them based on the \"abstracted smaller molecular\", the feature aggregation across two whole graphs is always redundant, especially when the number of nodes is large. Thus we here present a novel framework for large graph similarity computation problem. We first embed and coarsen the", "after": "identified based on these functional groups, our ``embedding-coarsening-matching'' learning framework first embeds and coarsens", "start_char_pos": 1097, "end_char_pos": 1388}, {"type": "R", "before": "\"abstracted smaller graphs \"", "after": "coarsened graphs", "start_char_pos": 1405, "end_char_pos": 1433}, {"type": "R", "before": ", similar to molecular groups in biological concept. Then we aggregate both the internal features in \"abstracted smaller graphs \" and external features across \"abstracted smaller graph pair\", leading to feature vectors for each graph, with which we calculate", "after": "and then matching mechanism is deployed on the coarsened graphs for", "start_char_pos": 1461, "end_char_pos": 1719}, {"type": "R", "before": "score. Experiments demonstrate that", "after": "scores. Detailed experiments have been conducted and the results demonstrate the efficiency and effectiveness of", "start_char_pos": 1741, "end_char_pos": 1776}, {"type": "D", "before": "outperforms state-of-the-art methods in graph similarity computation tasks and has significant improvement in time efficiency", "after": null, "start_char_pos": 1800, "end_char_pos": 1925}], "sents_char_pos": [0, 140, 410, 632, 736, 1027, 1270, 1357, 1513, 1747]}
+{"doc_id": "2005.07202", "revision_depth": "1", "before_revision": "Bidirectional Encoder Representations from Transformers (BERT) models for biomedical specialties such as BioBERT and clinicalBERT have significantly improved in biomedical text-mining tasks and enabled us to extract valuable information from biomedical literature . However, we benefitted only in English because of the significant scarcity of high-quality medical documents, such as PubMed, in each language. Therefore, we propose a method that realizes a high-performance BERT model by using a small corpus. We introduce the method to train a BERT model on a small medical corpus both in English and Japanese, respectively, and then we evaluate each of them in terms of the biomedical language understanding evaluation (BLUE) benchmark and the medical-document-classification task in Japanese, respectively. After confirming their satisfactory performances, we apply our method to develop a model that outperforms the pre-existing models. Bidirectional Encoder Representations from Transformers for Biomedical Text Mining by Osaka University (ouBioBERT) achieves the best scores on 7 of the 10 datasets in terms of the BLUE benchmark. The total score is 1.0 points above that of BioBERT .", "after_revision": "Bidirectional Encoder Representations from Transformers (BERT) models for medical specialties, such as BioBERT and clinicalBERT , have significantly improved in performing biomedical text mining tasks and have enabled extracting valuable information from biomedical literature ; however, only English speakers benefit due to the significant scarcity of high-quality medical documents, such as PubMed, in each language. Therefore, we propose a method to train a high-performance BERT model using a small corpus. We introduce the method to train a BERT model on a small medical corpus both in English and in Japanese, and we present the evaluation of each model in terms of the biomedical language understanding evaluation (BLUE) benchmark and the medical document classification task in Japanese, respectively. After confirming their satisfactory performances, we applied our method to develop a model comparable to the publicly available models. OuBioBERT, short for Bidirectional Encoder Representations from Transformers for Biomedical Text Mining by Osaka University , achieved the best score in terms of the BLUE benchmark. The total score is 1.1 points above that of BioBERT and 0.3 points above that of the ablated model trained without our proposed method. This proposed technique is an effective approach to develop localized medical BERT models and to enhance domain-specific models in the biomedical domain .", "edit_actions": [{"type": "R", "before": "biomedical specialties", "after": "medical specialties,", "start_char_pos": 74, "end_char_pos": 96}, {"type": "A", "before": null, "after": ",", "start_char_pos": 130, "end_char_pos": 130}, {"type": "R", "before": "biomedical text-mining tasks and enabled us to extract", "after": "performing biomedical text mining tasks and have enabled extracting", "start_char_pos": 162, "end_char_pos": 216}, {"type": "R", "before": ". However, we benefitted only in English because of", "after": "; however, only English speakers benefit due to", "start_char_pos": 265, "end_char_pos": 316}, {"type": "R", "before": "that realizes", "after": "to train", "start_char_pos": 442, "end_char_pos": 455}, {"type": "D", "before": "by", "after": null, "start_char_pos": 486, "end_char_pos": 488}, {"type": "R", "before": "Japanese, respectively, and then we evaluate each of them", "after": "in Japanese, and we present the evaluation of each model", "start_char_pos": 603, "end_char_pos": 660}, {"type": "R", "before": "medical-document-classification", "after": "medical document classification", "start_char_pos": 747, "end_char_pos": 778}, {"type": "R", "before": "apply", "after": "applied", "start_char_pos": 864, "end_char_pos": 869}, {"type": "R", "before": "that outperforms the pre-existing models.", "after": "comparable to the publicly available models. OuBioBERT, short for", "start_char_pos": 900, "end_char_pos": 941}, {"type": "R", "before": "(ouBioBERT) achieves the best scores on 7 of the 10 datasets", "after": ", achieved the best score", "start_char_pos": 1045, "end_char_pos": 1105}, {"type": "R", "before": "1.0", "after": "1.1", "start_char_pos": 1157, "end_char_pos": 1160}, {"type": "A", "before": null, "after": "and 0.3 points above that of the ablated model trained without our proposed method. This proposed technique is an effective approach to develop localized medical BERT models and to enhance domain-specific models in the biomedical domain", "start_char_pos": 1190, "end_char_pos": 1190}], "sents_char_pos": [0, 266, 410, 510, 810, 941, 1137]}
+{"doc_id": "2005.08008", "revision_depth": "1", "before_revision": "Graph similarity computation aims to predict a similarity score between one pair of graphs so as to facilitate downstream applications, such as finding the chemical compounds that are most similar to a query compound or Fewshot 3D Action Recognition ,etc . Recently, some graph similarity computation models based on neural networks have been proposed, which are either based on graph-level interaction or node-level comparison. However, when the number of nodes in the graph increases, it will inevitably bring about the problem of reduced representation ability or excessive time complexity . Motivated by this observation, we propose a graph partitioning and graph neural network based model, called PSimGNN, to effectively resolve this issue. Specifically, each of the input graphs is partitioned into a set of subgraphs to directly extract the local structural features firstly . Next, a learnable embedding function is used to map each subgraph into an embedding vector. Then, some of these subgraph pairs are selected for node-level comparison to supplement the subgraph-level embedding with fine-grained information. Finally, coarse-grained interaction information among subgraphs and fine-grained comparison information among nodes in different subgraphs are integrated to predict the final similarity score. Using approximate Graph Edit Distance (GED) as graph similarity metric, experimental results on graph data sets of different graph size demonstrate PSimGNN outperforms state-of-the-art methods in graph similarity computation tasks . The codes will release when this paper is published .", "after_revision": "Graph similarity computation aims to predict a similarity score between one pair of graphs to facilitate downstream applications, such as finding the most similar chemical compounds similar to a query compound or Fewshot 3D Action Recognition . Recently, some graph similarity computation models based on neural networks have been proposed, which are either based on graph-level interaction or node-level comparison. However, when the number of nodes in the graph increases, it will inevitably bring about reduced representation ability or high computation cost . Motivated by this observation, we propose a graph partitioning and graph neural network-based model, called PSimGNN, to effectively resolve this issue. Specifically, each of the input graphs is partitioned into a set of subgraphs to extract the local structural features directly . Next, a novel graph neural network with an attention mechanism is designed to map each subgraph into an embedding vector. Some of these subgraph pairs are automatically selected for node-level comparison to supplement the subgraph-level embedding with fine-grained information. Finally, coarse-grained interaction information among subgraphs and fine-grained comparison information among nodes in different subgraphs are integrated to predict the final similarity score. Experimental results on graph datasets with different graph sizes demonstrate that PSimGNN outperforms state-of-the-art methods in graph similarity computation tasks using approximate Graph Edit Distance (GED) as the graph similarity metric .", "edit_actions": [{"type": "D", "before": "so as", "after": null, "start_char_pos": 91, "end_char_pos": 96}, {"type": "R", "before": "chemical compounds that are most", "after": "most similar chemical compounds", "start_char_pos": 156, "end_char_pos": 188}, {"type": "D", "before": ",", "after": null, "start_char_pos": 250, "end_char_pos": 251}, {"type": "D", "before": "etc", "after": null, "start_char_pos": 251, "end_char_pos": 254}, {"type": "D", "before": "the problem of", "after": null, "start_char_pos": 518, "end_char_pos": 532}, {"type": "R", "before": "excessive time complexity", "after": "high computation cost", "start_char_pos": 567, "end_char_pos": 592}, {"type": "R", "before": "network based", "after": "network-based", "start_char_pos": 675, "end_char_pos": 688}, {"type": "D", "before": "directly", "after": null, "start_char_pos": 828, "end_char_pos": 836}, {"type": "R", "before": "firstly", "after": "directly", "start_char_pos": 875, "end_char_pos": 882}, {"type": "R", "before": "learnable embedding function is used", "after": "novel graph neural network with an attention mechanism is designed", "start_char_pos": 893, "end_char_pos": 929}, {"type": "R", "before": "Then, some", "after": "Some", "start_char_pos": 977, "end_char_pos": 987}, {"type": "A", "before": null, "after": "automatically", "start_char_pos": 1016, "end_char_pos": 1016}, {"type": "R", "before": "Using approximate Graph Edit Distance (GED) as graph similarity metric, experimental", "after": "Experimental", "start_char_pos": 1319, "end_char_pos": 1403}, {"type": "R", "before": "data sets of different graph size demonstrate", "after": "datasets with different graph sizes demonstrate that", "start_char_pos": 1421, "end_char_pos": 1466}, {"type": "R", "before": ". The codes will release when this paper is published", "after": "using approximate Graph Edit Distance (GED) as the graph similarity metric", "start_char_pos": 1550, "end_char_pos": 1603}], "sents_char_pos": [0, 428, 594, 746, 976, 1125, 1318, 1551]}
+{"doc_id": "2005.08081", "revision_depth": "1", "before_revision": "In sequence-to-sequence learning, the attention mechanism has been a great success in bridging the information between the encoder and the decoder. However, it is often overlooked that the decoder only has a single view of the source sequences, that is , the representations generated by the last encoder layer , which is supposed to be a global view of source sequences . Such implementation hinders the decoder from concrete, fine-grained , local source information . In this work, we explore to reuse the representations from different encoder layers for layer-wise cross-view decoding , that is, different views of the source sequences are presented to different decoder layers . We investigate multiple , representative strategies for cross-view coding, of which the granularity consistent attention (GCA) strategy proves the most efficient and effective in the experiments on neural machine translation task . Especially, GCA surpasses the previous state-of-the-art architecture on three machine translation datasets.", "after_revision": "In sequence-to-sequence learning, the attention mechanism has been a great success in bridging the information between the encoder and the decoder. However, it is often overlooked that the decoder obtains only a single view of the source sequences, i.e. , the representations generated by the last encoder layer . Although those representations are supposed to be a comprehensive, global view of source sequences , such practice keeps the decoders from concrete, fine-grained source information generated by other encoder layers . In this work, we propose to encourage the decoder to take the full advantage of the multi-level source representations for layer-wise cross-view decoding . Concretely, different views of the source sequences are presented to different decoder layers and multiple strategies are explored to route the source representations. In particular, the granularity consistent attention (GCA) strategy proves the most efficient and effective in the experiments on the neural machine translation task , surpassing the previous state-of-the-art architecture on three benchmark datasets.", "edit_actions": [{"type": "R", "before": "only has", "after": "obtains only", "start_char_pos": 197, "end_char_pos": 205}, {"type": "R", "before": "that is", "after": "i.e.", "start_char_pos": 245, "end_char_pos": 252}, {"type": "R", "before": ", which is", "after": ". Although those representations are", "start_char_pos": 311, "end_char_pos": 321}, {"type": "A", "before": null, "after": "comprehensive,", "start_char_pos": 339, "end_char_pos": 339}, {"type": "R", "before": ". Such implementation hinders the decoder", "after": ", such practice keeps the decoders", "start_char_pos": 372, "end_char_pos": 413}, {"type": "R", "before": ", local source information", "after": "source information generated by other encoder layers", "start_char_pos": 442, "end_char_pos": 468}, {"type": "R", "before": "explore to reuse the representations from different encoder layers", "after": "propose to encourage the decoder to take the full advantage of the multi-level source representations", "start_char_pos": 488, "end_char_pos": 554}, {"type": "R", "before": ", that is,", "after": ". Concretely,", "start_char_pos": 590, "end_char_pos": 600}, {"type": "R", "before": ". We investigate multiple , representative strategies for cross-view coding, of which", "after": "and multiple strategies are explored to route the source representations. In particular,", "start_char_pos": 683, "end_char_pos": 768}, {"type": "A", "before": null, "after": "the", "start_char_pos": 883, "end_char_pos": 883}, {"type": "R", "before": ". Especially, GCA surpasses", "after": ", surpassing", "start_char_pos": 916, "end_char_pos": 943}, {"type": "R", "before": "machine translation", "after": "benchmark", "start_char_pos": 996, "end_char_pos": 1015}], "sents_char_pos": [0, 147, 373, 470, 684]}
+{"doc_id": "2005.08081", "revision_depth": "2", "before_revision": "In sequence-to-sequence learning, the attention mechanism has been a great success in bridging the information between the encoderand the decoder. However, it is often overlooked that the decoder obtains only a single view of the source sequences, i.e., the representations generated by the last encoder layer . Although those representations are supposed to be a comprehensive, global view of source sequences, such practice keeps the decoders from concrete, fine-grained source information generated by other encoder layers . In this work, we propose to encourage the decoder to take the full advantage of the multi-level source representations for layer-wise cross-view decoding . Concretely, different views of the source sequences are presented to different decoder layers and multiple strategies are explored to route the source representations. In particular, the granularity consistent attention (GCA) strategy proves the most efficient and effective in the experiments on the neural machine translation task, surpassing the previous state-of-the-art architecture on three benchmark datasets .", "after_revision": "In sequence-to-sequence learning, the decoder relies on the attention mechanism to efficiently extract information from the encoder. While it is common practice to draw information from only the last encoder layer, recent work has proposed to use representations from different encoder layers for diversified levels of information. Nonetheless, the decoder still obtains only a single view of the source sequences, which might lead to insufficient training of the encoder layer stack due to the hierarchy bypassing problem . In this work, we propose layer-wise cross-view decoding , where for each decoder layer, together with the representations from the last encoder layer, which serve as a global view, those from other encoder layers are supplemented for a stereoscopic view of the source sequences. Systematic experiments show that we successfully address the hierarchy bypassing problem and substantially improve the performance of sequence-to-sequence learning with deep representations on diverse tasks .", "edit_actions": [{"type": "R", "before": "attention mechanism has been a great success in bridging the information between the encoderand the decoder. However, it is often overlooked that the decoder", "after": "decoder relies on the attention mechanism to efficiently extract information from the encoder. While it is common practice to draw information from only the last encoder layer, recent work has proposed to use representations from different encoder layers for diversified levels of information. Nonetheless, the decoder still", "start_char_pos": 38, "end_char_pos": 195}, {"type": "R", "before": "i.e., the representations generated by the last encoder layer . Although those representations are supposed to be a comprehensive, global view of source sequences, such practice keeps the decoders from concrete, fine-grained source information generated by other encoder layers", "after": "which might lead to insufficient training of the encoder layer stack due to the hierarchy bypassing problem", "start_char_pos": 248, "end_char_pos": 525}, {"type": "D", "before": "to encourage the decoder to take the full advantage of the multi-level source representations for", "after": null, "start_char_pos": 553, "end_char_pos": 650}, {"type": "R", "before": ". Concretely, different views of the source sequences are presented to different decoder layers and multiple strategies are explored to route the source representations. In particular, the granularity consistent attention (GCA) strategy proves the most efficient and effective in the experiments on the neural machine translation task, surpassing the previous state-of-the-art architecture on three benchmark datasets", "after": ", where for each decoder layer, together with the representations from the last encoder layer, which serve as a global view, those from other encoder layers are supplemented for a stereoscopic view of the source sequences. Systematic experiments show that we successfully address the hierarchy bypassing problem and substantially improve the performance of sequence-to-sequence learning with deep representations on diverse tasks", "start_char_pos": 682, "end_char_pos": 1099}], "sents_char_pos": [0, 146, 311, 527, 851]}
+{"doc_id": "2005.08081", "revision_depth": "3", "before_revision": "In sequence-to-sequence learning, the decoder relies on the attention mechanism to efficiently extract information from the encoder. While it is common practice to draw information from only the last encoder layer, recent work has proposed to use representations from different encoder layers for diversified levels of information. Nonetheless, the decoder still obtains only a single view of the source sequences, which might lead to insufficient training of the encoder layer stack due to the hierarchy bypassing problem. In this work, we propose layer-wise cross-view decoding, where for each decoder layer, together with the representations from the last encoder layer, which serve as a global view, those from other encoder layers are supplemented for a stereoscopic view of the source sequences. Systematic experiments show that we successfully address the hierarchy bypassing problem and substantially improve the performance of sequence-to-sequence learning with deep representations on diverse tasks .", "after_revision": "In sequence-to-sequence learning, e.g., natural language generation, the decoder relies on the attention mechanism to efficiently extract information from the encoder. While it is common practice to draw information from only the last encoder layer, recent work has proposed to use representations from different encoder layers for diversified levels of information. Nonetheless, the decoder still obtains only a single view of the source sequences, which might lead to insufficient training of the encoder layer stack due to the hierarchy bypassing problem. In this work, we propose layer-wise multi-view decoding, where for each decoder layer, together with the representations from the last encoder layer, which serve as a global view, those from other encoder layers are supplemented for a stereoscopic view of the source sequences. Systematic experiments and analyses show that we successfully address the hierarchy bypassing problem and substantially improve the performance of sequence-to-sequence learning with deep representations on diverse tasks , i.e., machine translation, abstractive summarization and image captioning. In particular, our approach surpasses the previous state-of-the-art models on three benchmark machine translation datasets .", "edit_actions": [{"type": "A", "before": null, "after": "e.g., natural language generation,", "start_char_pos": 34, "end_char_pos": 34}, {"type": "R", "before": "cross-view", "after": "multi-view", "start_char_pos": 561, "end_char_pos": 571}, {"type": "A", "before": null, "after": "and analyses", "start_char_pos": 826, "end_char_pos": 826}, {"type": "A", "before": null, "after": ", i.e., machine translation, abstractive summarization and image captioning. In particular, our approach surpasses the previous state-of-the-art models on three benchmark machine translation datasets", "start_char_pos": 1011, "end_char_pos": 1011}], "sents_char_pos": [0, 133, 332, 524, 802]}
+{"doc_id": "2005.08090", "revision_depth": "1", "before_revision": "Tractography from high-dimensional diffusion magnetic resonance imaging (dMRI) data allows brain's structural connectivity analysis. Recent dMRI studies aim to compare connectivity patterns across thousands of subjects to understand subtle abnormalities in brain's white matter connectivity across disease populations. Besides connectivity differences, researchers are also interested in investigating distributions of biologically sensitive dMRI derived metrics across subject groups . Existing software products focus solely on the anatomy or are not intuitive and restrict the comparison of multiple subjects. In this paper, we present the design and implementation of FiberStars, a visual analysis tool for tractography data that allows the interactive and scalable visualization of brain fiber clusters in 2D and 3D . With FiberStars, researchers can analyze and compare multiple subjects in large collections of brain fibers . To evaluate the usability of our software, we performed a quantitative user study. We asked non-experts to find patterns in a large tractography dataset with either FiberStars or AFQ-Browser, an existing dMRI exploration tool. Our results show that participants using FiberStars can navigate extensive collections of tractography faster and more accurately . We discuss our findings and provide an analysis of the requirements for comparative visualizations of tractography data . All our research, software, and results are available openly.", "after_revision": "Tractography from high-dimensional diffusion magnetic resonance imaging (dMRI) data allows brain's structural connectivity analysis. Recent dMRI studies aim to compare connectivity patterns across subject groups and disease populations to understand subtle abnormalities in the brain's white matter connectivity and distributions of biologically sensitive dMRI derived metrics . Existing software products focus solely on the anatomy , are not intuitive or restrict the comparison of multiple subjects. In this paper, we present the design and implementation of FiberStars, a visual analysis tool for tractography data that allows the interactive visualization of brain fiber clusters combining existing 3D anatomy with compact 2D visualizations . With FiberStars, researchers can analyze and compare multiple subjects in large collections of brain fibers using different views . To evaluate the usability of our software, we performed a quantitative user study. We asked domain experts and non-experts to find patterns in a tractography dataset with either FiberStars or an existing dMRI exploration tool. Our results show that participants using FiberStars can navigate extensive collections of tractography faster and more accurately . All our research, software, and results are available openly.", "edit_actions": [{"type": "R", "before": "thousands of subjects", "after": "subject groups and disease populations", "start_char_pos": 197, "end_char_pos": 218}, {"type": "A", "before": null, "after": "the", "start_char_pos": 257, "end_char_pos": 257}, {"type": "R", "before": "across disease populations. Besides connectivity differences, researchers are also interested in investigating", "after": "and", "start_char_pos": 292, "end_char_pos": 402}, {"type": "D", "before": "across subject groups", "after": null, "start_char_pos": 464, "end_char_pos": 485}, {"type": "R", "before": "or", "after": ",", "start_char_pos": 543, "end_char_pos": 545}, {"type": "R", "before": "and", "after": "or", "start_char_pos": 564, "end_char_pos": 567}, {"type": "D", "before": "and scalable", "after": null, "start_char_pos": 758, "end_char_pos": 770}, {"type": "R", "before": "in 2D and", "after": "combining existing", "start_char_pos": 809, "end_char_pos": 818}, {"type": "A", "before": null, "after": "anatomy with compact 2D visualizations", "start_char_pos": 822, "end_char_pos": 822}, {"type": "A", "before": null, "after": "using different views", "start_char_pos": 933, "end_char_pos": 933}, {"type": "A", "before": null, "after": "domain experts and", "start_char_pos": 1028, "end_char_pos": 1028}, {"type": "D", "before": "large", "after": null, "start_char_pos": 1063, "end_char_pos": 1068}, {"type": "D", "before": "AFQ-Browser,", "after": null, "start_char_pos": 1116, "end_char_pos": 1128}, {"type": "D", "before": ". We discuss our findings and provide an analysis of the requirements for comparative visualizations of tractography data", "after": null, "start_char_pos": 1294, "end_char_pos": 1415}], "sents_char_pos": [0, 132, 319, 613, 935, 1018, 1163, 1295, 1417]}
+{"doc_id": "2005.11079", "revision_depth": "1", "before_revision": "Graph neural networks (GNNs) have generalized deep learning methods into graph-structured data with promising performance on graph mining tasks . However, existing GNNs often meet complex graph structures with scarce labeled nodes and suffer from the limitations of non-robustness, over-smoothing, and overfitting. To address these issues , we propose a simple yet effective GNN framework---Graph Random Neural Network (Grand). Different from the deterministic propagation in existing GNNs, Grand adopts a random propagation strategy to enhance model robustness. This strategy also naturally enables Grand to decouple the propagation from feature transformation, reducing the risks of over-smoothing and overfitting. Moreover, random propagation acts as an efficient method for graph data augmentation. Based on this, we propose the consistency regularization for Grand by leveraging the distributional consistency of unlabeled nodes in multiple augmentations, improving the generalization capacity of the model . Extensive experiments on graph benchmark datasets suggest that Grand significantly outperforms state-of-the-art GNN baselines on semi-supervised graph learning tasks . Finally, we show that Grand mitigates the issues of over-smoothing and overfitting, and its performance is married with robustness.", "after_revision": "We study the problem of semi-supervised learning on graphs, for which graph neural networks (GNNs) have been extensively explored . However, most existing GNNs inherently suffer from the limitations of over-smoothing, non-robustness, and weak-generalization when labeled nodes are scarce. In this paper , we propose a simple yet effective framework---GRAPH RANDOM NEURAL NETWORKS (GRAND)---to address these issues. In GRAND, we first design a random propagation strategy to perform graph data augmentation. Then we leverage consistency regularization to optimize the prediction consistency of unlabeled nodes across different data augmentations . Extensive experiments on graph benchmark datasets suggest that GRAND significantly outperforms state-of-the-art GNN baselines on semi-supervised node classification . Finally, we show that GRAND mitigates the issues of over-smoothing and non-robustness, exhibiting better generalization behavior than existing GNNs. The source code of GRAND is publicly available at URL", "edit_actions": [{"type": "R", "before": "Graph", "after": "We study the problem of semi-supervised learning on graphs, for which graph", "start_char_pos": 0, "end_char_pos": 5}, {"type": "R", "before": "generalized deep learning methods into graph-structured data with promising performance on graph mining tasks", "after": "been extensively explored", "start_char_pos": 34, "end_char_pos": 143}, {"type": "R", "before": "existing GNNs often meet complex graph structures with scarce labeled nodes and", "after": "most existing GNNs inherently", "start_char_pos": 155, "end_char_pos": 234}, {"type": "D", "before": "non-robustness,", "after": null, "start_char_pos": 266, "end_char_pos": 281}, {"type": "R", "before": "and overfitting. To address these issues", "after": "non-robustness, and weak-generalization when labeled nodes are scarce. In this paper", "start_char_pos": 298, "end_char_pos": 338}, {"type": "R", "before": "GNN framework---Graph Random Neural Network (Grand). Different from the deterministic propagation in existing GNNs, Grand adopts", "after": "framework---GRAPH RANDOM NEURAL NETWORKS (GRAND)---to address these issues. In GRAND, we first design", "start_char_pos": 375, "end_char_pos": 503}, {"type": "R", "before": "enhance model robustness. This strategy also naturally enables Grand to decouple the propagation from feature transformation, reducing the risks of over-smoothing and overfitting. Moreover, random propagation acts as an efficient method for", "after": "perform", "start_char_pos": 537, "end_char_pos": 777}, {"type": "R", "before": "Based on this, we propose the consistency regularization for Grand by leveraging the distributional", "after": "Then we leverage consistency regularization to optimize the prediction", "start_char_pos": 803, "end_char_pos": 902}, {"type": "R", "before": "in multiple augmentations, improving the generalization capacity of the model", "after": "across different data augmentations", "start_char_pos": 934, "end_char_pos": 1011}, {"type": "R", "before": "Grand", "after": "GRAND", "start_char_pos": 1077, "end_char_pos": 1082}, {"type": "R", "before": "graph learning tasks", "after": "node classification", "start_char_pos": 1159, "end_char_pos": 1179}, {"type": "R", "before": "Grand", "after": "GRAND", "start_char_pos": 1204, "end_char_pos": 1209}, {"type": "R", "before": "overfitting, and its performance is married with robustness.", "after": "non-robustness, exhibiting better generalization behavior than existing GNNs. The source code of GRAND is publicly available at URL", "start_char_pos": 1253, "end_char_pos": 1313}], "sents_char_pos": [0, 145, 314, 427, 562, 716, 802, 1181]}
+{"doc_id": "2005.11248", "revision_depth": "1", "before_revision": "De novo therapeutic design is challenged by a vast chemical repertoire and multiple constraints such as high broad-spectrum potency and low toxicity. We propose CLaSS (Controlled Latent attribute Space Sampling) - a novel and efficient computational method for attribute-controlled generation of molecules, which leverages guidance from classifiers trained on an informative latent space of molecules modeled using a deep generative autoencoder. We further screen the generated molecules by using a set of deep learning classifiers in conjunction with novel physicochemical features derived from high-throughput molecular simulations. The proposed approach is employed for designing non-toxic antimicrobial peptides (AMPs) with strong broad-spectrum potency, which are emerging drug candidates for tackling antibiotic resistance. Synthesis and wet lab testing of only twenty designed sequences identified two novel and minimalist AMPs with high potency against diverse Gram-positive and Gram-negative pathogens, including the hard-to-treat multidrug-resistant K. pneumoniae, as well as low in vitro and in vivo toxicity . The proposed approach thus presents a viable path for faster discovery of potent and selective broad-spectrum antimicrobials with a higher success rate than state-of-the-art methods .", "after_revision": "De novo therapeutic design is challenged by a vast chemical repertoire and multiple constraints , e.g., high broad-spectrum potency and low toxicity. We propose CLaSS (Controlled Latent attribute Space Sampling) - an efficient computational method for attribute-controlled generation of molecules, which leverages guidance from classifiers trained on an informative latent space of molecules modeled using a deep generative autoencoder. We screen the generated molecules for additional key attributes by using deep learning classifiers in conjunction with novel features derived from atomistic simulations. The proposed approach is demonstrated for designing non-toxic antimicrobial peptides (AMPs) with strong broad-spectrum potency, which are emerging drug candidates for tackling antibiotic resistance. Synthesis and testing of only twenty designed sequences identified two novel and minimalist AMPs with high potency against diverse Gram-positive and Gram-negative pathogens, including one multidrug-resistant and one antibiotic-resistant K. pneumoniae, via membrane pore formation. Both antimicrobials exhibit low in vitro and in vivo toxicity and mitigate the onset of drug resistance . The proposed approach thus presents a viable path for faster and efficient discovery of potent and selective broad-spectrum antimicrobials .", "edit_actions": [{"type": "R", "before": "such as", "after": ", e.g.,", "start_char_pos": 96, "end_char_pos": 103}, {"type": "R", "before": "a novel and", "after": "an", "start_char_pos": 214, "end_char_pos": 225}, {"type": "D", "before": "further", "after": null, "start_char_pos": 449, "end_char_pos": 456}, {"type": "R", "before": "by using a set of", "after": "for additional key attributes by using", "start_char_pos": 488, "end_char_pos": 505}, {"type": "D", "before": "physicochemical", "after": null, "start_char_pos": 558, "end_char_pos": 573}, {"type": "R", "before": "high-throughput molecular", "after": "atomistic", "start_char_pos": 596, "end_char_pos": 621}, {"type": "R", "before": "employed", "after": "demonstrated", "start_char_pos": 660, "end_char_pos": 668}, {"type": "D", "before": "wet lab", "after": null, "start_char_pos": 844, "end_char_pos": 851}, {"type": "R", "before": "the hard-to-treat", "after": "one", "start_char_pos": 1022, "end_char_pos": 1039}, {"type": "A", "before": null, "after": "and one antibiotic-resistant", "start_char_pos": 1060, "end_char_pos": 1060}, {"type": "R", "before": "as well as", "after": "via membrane pore formation. Both antimicrobials exhibit", "start_char_pos": 1076, "end_char_pos": 1086}, {"type": "A", "before": null, "after": "and mitigate the onset of drug resistance", "start_char_pos": 1121, "end_char_pos": 1121}, {"type": "A", "before": null, "after": "and efficient", "start_char_pos": 1185, "end_char_pos": 1185}, {"type": "D", "before": "with a higher success rate than state-of-the-art methods", "after": null, "start_char_pos": 1250, "end_char_pos": 1306}], "sents_char_pos": [0, 149, 445, 634, 829, 1123]}
+{"doc_id": "2005.12787", "revision_depth": "1", "before_revision": "We work on dynamic problems with collected data\\subsetR^p based on collected sample points } \\{x_i\\} that distributed on a manifold \\mathcal{M\\subsetR^p} ^n \\subset M that probe the unknown manifold M} . Through the diffusion map, we first learn the reaction coordinates \\{y_i\\} \\subset \\mathcal{N^n\\subset N corresponding to \\{x_i\\}_{i=1}^n, } where N is a manifold isometrically embedded into an Euclidean space \\mathbb{R^\\ell for } and isometrically embedded in \\mathbb{R}^\\ell with } \\ell \\ll p. The reaction coordinates enable us to obtain an efficient approximation for the dynamics described by a Fokker-Planck equation on the manifold \\mathcal{N} . By using the reaction coordinates , we propose an implementable, unconditionally stable, data-driven upwind scheme which automatically incorporates the manifold structure of \\mathcal{N}. Furthermore, we provide a weighted L^2 convergence analysis of the upwind scheme to the Fokker-Planck equation . The proposed upwind scheme leads to a Markov chain with transition probability_i\\}_{i=1}^n with an approximated transition probability and jump rate } between the nearest neighbor points. We can benefit from such property to directly conduct manifold-related computations such as finding the optimal coarse-grained network and the minimal energy path that represents chemical reactions or conformational changes. To establish the Fokker-Planck equation, we need to acquire information about the equilibrium potential of the physical system on \\mathcal{N. Hence, we apply a Gaussian Process regression algorithm to generate equilibrium potential for a new physical system with new parameters. Combining with the proposed upwind scheme, we can calculate the trajectory of the Fokker-Planck equation on \\mathcal{N} based on the generated equilibrium potential. Finally, we develop an algorithm to pullback the trajectory to the original high dimensional space as a generative data for the new physical system} .", "after_revision": "We study the Langevin dynamics of a physical system with manifold structure \\mathcal{M\\subsetR^p based on collected sample points } \\{x_i\\} \\subsetR^p} _{i=1^n \\subset M that probe the unknown manifold M} . Through the diffusion map, we first learn the reaction coordinates \\{y_i\\} _{i=1^n\\subset N corresponding to \\{x_i\\}_{i=1}^n, } where N is a manifold ^\\ell for } diffeomorphic to \\mathcal{M and isometrically embedded in \\mathbb{R}^\\ell with } \\ell \\ll p. The induced Langevin dynamics on \\mathcal{N approximation for the Langevin dynamics on \\mathcal{N Fokker-Planck equation on the manifold \\mathcal{N} in terms of the reaction coordinates \\mathsf{y propose an implementable, unconditionally stable, data-driven finite volume scheme for this Fokker-Planck equation, which automatically incorporates the manifold structure of \\mathcal{N}. Furthermore, we provide a weighted L^2 convergence analysis of the finite volume scheme to the Fokker-Planck equation on \\mathcal{N . The proposed finite volume scheme leads to a Markov chain on \\{\\mathsf{y_i\\}_{i=1}^n with an approximated transition probability and jump rate } between the nearest neighbor points. . Hence, we apply a Gaussian Process regression algorithm to generate equilibrium potential for a new physical system with new parameters. Combining with the proposed upwind scheme, we can calculate the trajectory of the Fokker-Planck equation on \\mathcal{N} based on the generated equilibrium potential. Finally, we develop an algorithm to pullback the trajectory to the original high dimensional space as a generative data for the new physical system} After an unconditionally stable explicit time discretization, the data-driven finite volume scheme gives an approximated Markov process for the Langevin dynamics on \\mathcal{N .", "edit_actions": [{"type": "R", "before": "work on dynamic problems with collected data", "after": "study the Langevin dynamics of a physical system with manifold structure \\mathcal{M", "start_char_pos": 3, "end_char_pos": 47}, {"type": "D", "before": "that distributed on a manifold \\mathcal{M", "after": null, "start_char_pos": 101, "end_char_pos": 142}, {"type": "A", "before": null, "after": "_{i=1", "start_char_pos": 154, "end_char_pos": 154}, {"type": "R", "before": "\\subset \\mathcal{N", "after": "_{i=1", "start_char_pos": 279, "end_char_pos": 297}, {"type": "D", "before": "isometrically embedded into an Euclidean space \\mathbb{R", "after": null, "start_char_pos": 367, "end_char_pos": 423}, {"type": "A", "before": null, "after": "diffeomorphic to \\mathcal{M", "start_char_pos": 435, "end_char_pos": 435}, {"type": "R", "before": "reaction coordinates enable us to obtain an efficient", "after": "induced Langevin dynamics on \\mathcal{N", "start_char_pos": 505, "end_char_pos": 558}, {"type": "R", "before": "dynamics described by a", "after": "Langevin dynamics on \\mathcal{N", "start_char_pos": 581, "end_char_pos": 604}, {"type": "R", "before": ". By using", "after": "in terms of", "start_char_pos": 656, "end_char_pos": 666}, {"type": "R", "before": ", we", "after": "\\mathsf{y", "start_char_pos": 692, "end_char_pos": 696}, {"type": "R", "before": "upwind scheme", "after": "finite volume scheme for this Fokker-Planck equation,", "start_char_pos": 759, "end_char_pos": 772}, {"type": "R", "before": "upwind", "after": "finite volume", "start_char_pos": 912, "end_char_pos": 918}, {"type": "A", "before": null, "after": "on \\mathcal{N", "start_char_pos": 956, "end_char_pos": 956}, {"type": "R", "before": "upwind", "after": "finite volume", "start_char_pos": 972, "end_char_pos": 978}, {"type": "R", "before": "with transition probability", "after": "on \\{\\mathsf{y", "start_char_pos": 1010, "end_char_pos": 1037}, {"type": "D", "before": "We can benefit from such property to directly conduct manifold-related computations such as finding the optimal coarse-grained network and the minimal energy path that represents chemical reactions or conformational changes. To establish the Fokker-Planck equation, we need to acquire information about the equilibrium potential of the physical system on \\mathcal{N", "after": null, "start_char_pos": 1147, "end_char_pos": 1512}, {"type": "A", "before": null, "after": "After an unconditionally stable explicit time discretization, the data-driven finite volume scheme gives an approximated Markov process for the Langevin dynamics on \\mathcal{N", "start_char_pos": 1966, "end_char_pos": 1966}], "sents_char_pos": [0, 500, 844, 958, 1146, 1371, 1513, 1650, 1816]}
+{"doc_id": "2005.13183", "revision_depth": "1", "before_revision": "Graph Convolutional Network (GCN) has achieved extraordinary success in learning effective high-level representations of nodes in graphs. However, the study regarding Heterogeneous Information Network (HIN) is still limited, because the existing HIN-oriented GCN methods suffer from two deficiencies: (1) they cannot flexibly exploit all possible meta-paths , and some even require the user to specify useful ones ; (2) they often need to first transform an HIN into meta-path based graphs by computing commuting matrices, which has a high time complexity, resulting in poor scalability . To address the above issues, we propose interpretable and efficient Heterogeneous Graph Convolutional Network (ie-HGCN) to learn representations of nodes in HINs. It automatically extracts useful meta-paths for each node from all possible meta-paths (within a length limit determined by the model depth ), which brings good model interpretability. It directly takes the entire HIN as input and avoids intermediate HIN transformation . The carefully designed hierarchical aggregation architecture avoids computationally inefficient neighborhood attention. Thus, it is much more efficient than previous methods. We formally prove ie-HGCN evaluates the usefulness of all possible meta-paths within a length limit (model depth), show it intrinsically performs spectral graph convolution on HINs, and analyze the time complexity to verify its quasi-linear scalability. Extensive experimental results on three real-world networks demonstrate the superiority of ie-HGCN over state-of-the-art methods.", "after_revision": "Graph Convolutional Network (GCN) has achieved extraordinary success in learning effective task-specific representations of nodes in graphs. However, regarding Heterogeneous Information Network (HIN) , existing HIN-oriented GCN methods still suffer from two deficiencies: (1) they cannot flexibly explore all possible meta-paths and extract the most useful ones for a target object, which hinders both effectiveness and interpretability ; (2) they often need to generate intermediate meta-path based dense graphs, which leads to high computational complexity . To address the above issues, we propose an interpretable and efficient Heterogeneous Graph Convolutional Network (ie-HGCN) to learn the representations of objects in HINs. It is designed as a hierarchical aggregation architecture, i.e., object-level aggregation first, followed by type-level aggregation. The novel architecture can automatically extract useful meta-paths for each object from all possible meta-paths (within a length limit ), which brings good model interpretability. It can also reduce the computational cost by avoiding intermediate HIN transformation and neighborhood attention. We provide theoretical analysis about the proposed ie-HGCN in terms of evaluating the usefulness of all possible meta-paths , its connection to the spectral graph convolution on HINs, and its quasi-linear time complexity. Extensive experiments on three real network datasets demonstrate the superiority of ie-HGCN over the state-of-the-art methods.", "edit_actions": [{"type": "R", "before": "high-level", "after": "task-specific", "start_char_pos": 91, "end_char_pos": 101}, {"type": "D", "before": "the study", "after": null, "start_char_pos": 147, "end_char_pos": 156}, {"type": "R", "before": "is still limited, because the", "after": ",", "start_char_pos": 207, "end_char_pos": 236}, {"type": "A", "before": null, "after": "still", "start_char_pos": 271, "end_char_pos": 271}, {"type": "R", "before": "exploit", "after": "explore", "start_char_pos": 327, "end_char_pos": 334}, {"type": "R", "before": ", and some even require the user to specify useful ones", "after": "and extract the most useful ones for a target object, which hinders both effectiveness and interpretability", "start_char_pos": 359, "end_char_pos": 414}, {"type": "R", "before": "first transform an HIN into", "after": "generate intermediate", "start_char_pos": 440, "end_char_pos": 467}, {"type": "R", "before": "graphs by computing commuting matrices, which has a high time complexity, resulting in poor scalability", "after": "dense graphs, which leads to high computational complexity", "start_char_pos": 484, "end_char_pos": 587}, {"type": "A", "before": null, "after": "an", "start_char_pos": 630, "end_char_pos": 630}, {"type": "R", "before": "representations of nodes", "after": "the representations of objects", "start_char_pos": 720, "end_char_pos": 744}, {"type": "R", "before": "automatically extracts", "after": "is designed as a hierarchical aggregation architecture, i.e., object-level aggregation first, followed by type-level aggregation. The novel architecture can automatically extract", "start_char_pos": 757, "end_char_pos": 779}, {"type": "R", "before": "node", "after": "object", "start_char_pos": 807, "end_char_pos": 811}, {"type": "D", "before": "determined by the model depth", "after": null, "start_char_pos": 864, "end_char_pos": 893}, {"type": "R", "before": "directly takes the entire HIN as input and avoids", "after": "can also reduce the computational cost by avoiding", "start_char_pos": 942, "end_char_pos": 991}, {"type": "R", "before": ". The carefully designed hierarchical aggregation architecture avoids computationally inefficient", "after": "and", "start_char_pos": 1024, "end_char_pos": 1121}, {"type": "R", "before": "Thus, it is much more efficient than previous methods. We formally prove", "after": "We provide theoretical analysis about the proposed", "start_char_pos": 1146, "end_char_pos": 1218}, {"type": "R", "before": "evaluates", "after": "in terms of evaluating", "start_char_pos": 1227, "end_char_pos": 1236}, {"type": "R", "before": "within a length limit (model depth), show it intrinsically performs", "after": ", its connection to the", "start_char_pos": 1279, "end_char_pos": 1346}, {"type": "D", "before": "analyze the time complexity to verify", "after": null, "start_char_pos": 1387, "end_char_pos": 1424}, {"type": "R", "before": "scalability. Extensive experimental results on three real-world networks", "after": "time complexity. Extensive experiments on three real network datasets", "start_char_pos": 1442, "end_char_pos": 1514}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1559, "end_char_pos": 1559}], "sents_char_pos": [0, 137, 416, 589, 753, 938, 1025, 1145, 1200, 1454]}
+{"doc_id": "2005.14108", "revision_depth": "1", "before_revision": "Deep leaning models have been used widely for various purposes in recent years in object recognition, self-driving cars, face recognition, speech recognition, sentiment analysis and many others. However, in recent years it has been shown that these models possess weakness to noises which forces the model to misclassify. This issue has been studied profoundly in image and audio domain. Very little has been studied on this issue with respect to textual data. Even less survey on this topic has been performed to understand different types of attacks and defense techniques. In this manuscript we accumulated and analyzed different attacking techniques , various defense models on how to overcome this issue in order to provide a more comprehensive idea. Later we point out some of the interesting findings of all papers and challenges that need to be overcome in order to move forward in this field.", "after_revision": "Deep learning models have been used widely for various purposes in recent years in object recognition, self-driving cars, face recognition, speech recognition, sentiment analysis , and many others. However, in recent years it has been shown that these models possess weakness to noises which force the model to misclassify. This issue has been studied profoundly in the image and audio domain. Very little has been studied on this issue concerning textual data. Even less survey on this topic has been performed to understand different types of attacks and defense techniques. In this manuscript , we accumulated and analyzed different attacking techniques and various defense models to provide a more comprehensive idea. Later we point out some of the interesting findings of all papers and challenges that need to be overcome to move forward in this field.", "edit_actions": [{"type": "R", "before": "leaning", "after": "learning", "start_char_pos": 5, "end_char_pos": 12}, {"type": "A", "before": null, "after": ",", "start_char_pos": 178, "end_char_pos": 178}, {"type": "R", "before": "forces", "after": "force", "start_char_pos": 290, "end_char_pos": 296}, {"type": "A", "before": null, "after": "the", "start_char_pos": 365, "end_char_pos": 365}, {"type": "R", "before": "with respect to", "after": "concerning", "start_char_pos": 433, "end_char_pos": 448}, {"type": "A", "before": null, "after": ",", "start_char_pos": 597, "end_char_pos": 597}, {"type": "R", "before": ",", "after": "and", "start_char_pos": 657, "end_char_pos": 658}, {"type": "R", "before": "on how to overcome this issue in order to", "after": "to", "start_char_pos": 682, "end_char_pos": 723}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 865, "end_char_pos": 873}], "sents_char_pos": [0, 195, 322, 389, 462, 577, 758]}
+{"doc_id": "2006.00632", "revision_depth": "1", "before_revision": "Deep neural networks excel at learning from labeled data and achieve state-of-the-art results on a wide array of Natural Language Processing tasks. In contrast, learning from unlabeled data, especially under domain shift, remains a challenge. Motivated by the latest advances, in this survey we review neural unsupervised domain adaptation techniques which do not require labeled target domain data. This is a more challenging yet a more widely applicable setup. We outline methods, from early approaches in traditional non-neural methods to pre-trained model transfer. We also revisit the notion of domain, and we uncover a bias in the type of Natural Language Processing tasks which received most attention. Lastly, we outline future directions, particularly the broader need for out-of-distribution generalization of future intelligent NLP.", "after_revision": "Deep neural networks excel at learning from labeled data and achieve state-of-the-art resultson a wide array of Natural Language Processing tasks. In contrast, learning from unlabeled data, especially under domain shift, remains a challenge. Motivated by the latest advances, in this survey we review neural unsupervised domain adaptation techniques which do not require labeled target domain data. This is a more challenging yet a more widely applicable setup. We outline methods, from early traditional non-neural methods to pre-trained model transfer. We also revisit the notion of domain, and we uncover a bias in the type of Natural Language Processing tasks which received most attention. Lastly, we outline future directions, particularly the broader need for out-of-distribution generalization of future NLP.", "edit_actions": [{"type": "R", "before": "results on", "after": "resultson", "start_char_pos": 86, "end_char_pos": 96}, {"type": "D", "before": "approaches in", "after": null, "start_char_pos": 494, "end_char_pos": 507}, {"type": "D", "before": "intelligent", "after": null, "start_char_pos": 827, "end_char_pos": 838}], "sents_char_pos": [0, 147, 242, 399, 462, 569, 709]}
+{"doc_id": "2006.00659", "revision_depth": "1", "before_revision": "We introduce a deterministic model that partitions the total population into the susceptible, infected, quarantined, and those traced after exposure, recovered and the deceased. We introduce the concept of 'accessible population for transmission of the disease' , which can be a small fraction of the total population, for instance when interventions are in force. This assumption , together with the structure of the set of coupled nonlinear ordinary differential equations for the populations, allows us to decouple the equations into just two equations. This further reduces to a logistic type of equation for the total infected population. The equation can be solved analytically and therefore allows for a clear interpretation of the growth and inhibiting factors in terms of the parameters in the full model. The validity of the 'accessible population' assumption and the efficacy of the reduced logistic model is demonstrated by the ease of fitting the United Kingdom data for the total number of infected cases. The approach further helps us to analyze the original model equations. We show that the original model equations provide a very good fit with the United Kingdom data for the cumulative number of infections . The active infected population of the model is seen to exhibit a turning point around mid-May, suggesting the beginning of a slow-down in the spread of infections. However, the rate of slowing down beyond the turning point is small and therefore the cumulative number of infections is likely to saturate to about 3.52 \\times 10^5 around early or mid July, provided the lock-down conditions continue to prevail . Noting that the fits obtained from the reduced logistic equation and the full model equations are equally good. The model and the procedure adopted here are expected to be useful in fitting the data for other countries and forecasting the progression of the disease .", "after_revision": "We introduce a deterministic model that partitions the total population into the susceptible, infected, quarantined, and those traced after exposure, the recovered and the deceased. We hypothesize 'accessible population for transmission of the disease' to be a small fraction of the total population, for instance when interventions are in force. This hypothesis , together with the structure of the set of coupled nonlinear ordinary differential equations for the populations, allows us to decouple the equations into just two equations. This further reduces to a logistic type of equation for the total infected population. The equation can be solved analytically and therefore allows for a clear interpretation of the growth and inhibiting factors in terms of the parameters in the full model. The validity of the 'accessible population' hypothesis and the efficacy of the reduced logistic model is demonstrated by the ease of fitting the United Kingdom data for the cumulative infected and daily new infected cases. The model can also be used to forecast further progression of the disease. In an effort to find optimized parameter values compatible with the United Kingdom coronavirus data, we first determine the relative importance of the various transition rates participating in the original model. Using this we show that the original model equations provide a very good fit with the United Kingdom data for the cumulative number of infections and the daily new cases. The fact that the model calculated daily new cases exhibits a turning point , suggests the beginning of a slow-down in the spread of infections. However, since the rate of slowing down beyond the turning point is small , the cumulative number of infections is likely to saturate to about 3.52 \\times 10^5 around late July, provided the lock-down conditions continue to prevail .", "edit_actions": [{"type": "A", "before": null, "after": "the", "start_char_pos": 150, "end_char_pos": 150}, {"type": "R", "before": "introduce the concept of", "after": "hypothesize", "start_char_pos": 182, "end_char_pos": 206}, {"type": "R", "before": ", which can", "after": "to", "start_char_pos": 263, "end_char_pos": 274}, {"type": "R", "before": "assumption", "after": "hypothesis", "start_char_pos": 371, "end_char_pos": 381}, {"type": "R", "before": "assumption", "after": "hypothesis", "start_char_pos": 860, "end_char_pos": 870}, {"type": "R", "before": "total number of infected", "after": "cumulative infected and daily new infected", "start_char_pos": 989, "end_char_pos": 1013}, {"type": "R", "before": "approach further helps us to analyze the original model equations. We", "after": "model can also be used to forecast further progression of the disease. In an effort to find optimized parameter values compatible with the United Kingdom coronavirus data, we first determine the relative importance of the various transition rates participating in the original model. Using this we", "start_char_pos": 1025, "end_char_pos": 1094}, {"type": "R", "before": ". The active infected population of the model is seen to exhibit", "after": "and the daily new cases. The fact that the model calculated daily new cases exhibits", "start_char_pos": 1227, "end_char_pos": 1291}, {"type": "R", "before": "around mid-May, suggesting", "after": ", suggests", "start_char_pos": 1308, "end_char_pos": 1334}, {"type": "A", "before": null, "after": "since", "start_char_pos": 1402, "end_char_pos": 1402}, {"type": "R", "before": "and therefore", "after": ",", "start_char_pos": 1462, "end_char_pos": 1475}, {"type": "R", "before": "early or mid", "after": "late", "start_char_pos": 1567, "end_char_pos": 1579}, {"type": "D", "before": ". Noting that the fits obtained from the reduced logistic equation and the full model equations are equally good. The model and the procedure adopted here are expected to be useful in fitting the data for other countries and forecasting the progression of the disease", "after": null, "start_char_pos": 1640, "end_char_pos": 1907}], "sents_char_pos": [0, 178, 365, 557, 644, 815, 1020, 1091, 1228, 1392, 1641, 1753]}
+{"doc_id": "2006.01212", "revision_depth": "1", "before_revision": "Many key variablesin finance, economics and risk management, including financial returns and foreign exchange rates , exhibit nonlinear dependence, heterogeneity and heavy-tailedness of some usually largely unknown type. The presence of non-linear dependence (usually modelled using GARCH-type dynamics) and heavy-tailedness may make problematic the analysis of (non-)efficiency , volatility clustering and predictive regressions in economic and financial markets using traditional approaches that appeal to asymptotic normality of sample autocorrelation functions (ACFs) of returns and their squares. The paper presents several new approaches to deal with the above problems. We provide the results that motivate the use of measures of market (non-)efficiency , volatility clustering and nonlinear dependence based on (small) powers of absolute returns and their signed versions. The paper provides asymptotic theory for sample analogues of the above measures in the case of general time series, including GARCH-type processes. It further develops new approaches to robust inference on them in the case of general GARCH-type processes exhibiting heavy-tailedness properties . The approaches are based on robust inference methods exploiting conservativeness properties of t-statistics Ibragimov and Muller (2010,2016) and several new results on their applicability in the settings considered . In the approaches, estimates of parameters of interest are computed for groups of data and the inference is based on t-statistics in resulting group estimates. This results in valid robust inference under a wide range of heterogeneity and dependence assumptions satisfied in financial and economic markets. Numerical results and empirical applications confirm advantages of the new approaches over existing ones and their wide applicability .", "after_revision": "Many financial and economic variables, including financial returns , exhibit nonlinear dependence, heterogeneity and heavy-tailedness . These properties may make problematic the analysis of (non-)efficiency and volatility clustering in economic and financial markets using traditional approaches that appeal to asymptotic normality of sample autocorrelation functions of returns and their squares. This paper presents new approaches to deal with the above problems. We provide the results that motivate the use of measures of market (non-)efficiency and volatility clustering based on (small) powers of absolute returns and their signed versions. We further provide new approaches to robust inference on the measures in the case of general time series, including GARCH-type processes . The approaches are based on robust t-statistics tests and new results on their applicability are presented . In the approaches, parameter estimates (e.g., estimates of measures of nonlinear dependence) are computed for groups of data , and the inference is based on t-statistics in the resulting group estimates. This results in valid robust inference under heterogeneity and dependence assumptions satisfied in real-world financial markets. Numerical results and empirical applications confirm the advantages and wide applicability of the proposed approaches .", "edit_actions": [{"type": "R", "before": "key variablesin finance, economics and risk management,", "after": "financial and economic variables,", "start_char_pos": 5, "end_char_pos": 60}, {"type": "D", "before": "and foreign exchange rates", "after": null, "start_char_pos": 89, "end_char_pos": 115}, {"type": "R", "before": "of some usually largely unknown type. The presence of non-linear dependence (usually modelled using GARCH-type dynamics) and heavy-tailedness", "after": ". These properties", "start_char_pos": 183, "end_char_pos": 324}, {"type": "R", "before": ", volatility clustering and predictive regressions", "after": "and volatility clustering", "start_char_pos": 379, "end_char_pos": 429}, {"type": "D", "before": "(ACFs)", "after": null, "start_char_pos": 565, "end_char_pos": 571}, {"type": "R", "before": "The paper presents several", "after": "This paper presents", "start_char_pos": 602, "end_char_pos": 628}, {"type": "R", "before": ", volatility clustering and nonlinear dependence", "after": "and volatility clustering", "start_char_pos": 761, "end_char_pos": 809}, {"type": "R", "before": "The paper provides asymptotic theory for sample analogues of the above measures in the case of general time series, including GARCH-type processes. It further develops", "after": "We further provide", "start_char_pos": 881, "end_char_pos": 1048}, {"type": "R", "before": "them", "after": "the measures", "start_char_pos": 1087, "end_char_pos": 1091}, {"type": "A", "before": null, "after": "time series, including", "start_char_pos": 1115, "end_char_pos": 1115}, {"type": "D", "before": "exhibiting heavy-tailedness properties", "after": null, "start_char_pos": 1137, "end_char_pos": 1175}, {"type": "D", "before": "inference methods exploiting conservativeness properties of", "after": null, "start_char_pos": 1213, "end_char_pos": 1272}, {"type": "R", "before": "Ibragimov and Muller (2010,2016) and several", "after": "tests and", "start_char_pos": 1286, "end_char_pos": 1330}, {"type": "R", "before": "in the settings considered", "after": "are presented", "start_char_pos": 1366, "end_char_pos": 1392}, {"type": "R", "before": "estimates of parameters of interest", "after": "parameter estimates (e.g., estimates of measures of nonlinear dependence)", "start_char_pos": 1414, "end_char_pos": 1449}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1482, "end_char_pos": 1482}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1529, "end_char_pos": 1529}, {"type": "D", "before": "a wide range of", "after": null, "start_char_pos": 1602, "end_char_pos": 1617}, {"type": "R", "before": "financial and economic", "after": "real-world financial", "start_char_pos": 1672, "end_char_pos": 1694}, {"type": "R", "before": "advantages of the new approaches over existing ones and their wide applicability", "after": "the advantages and wide applicability of the proposed approaches", "start_char_pos": 1757, "end_char_pos": 1837}], "sents_char_pos": [0, 220, 601, 676, 880, 1028, 1177, 1394, 1556, 1703]}
+{"doc_id": "2006.01241", "revision_depth": "2", "before_revision": "This paper describes and develops a fast and accurate algorithm that computes the field of values boundary curve for every conceivable complex square matrix A , i. e., for all matrices, those with or without repeated eigenvalues and with or without Jordan block structures, with ill-conditioned eigenvalues or ill-conditioned ones and so forth. It relies on a matrix flow decomposition method that finds a block-diagonal flow representation for the hermitean matrix flow H\\!K {\\cal _A(t) = \\cos(t) H + \\sin(t) K if this is possible. Here H\\!K{\\cal _A(t) is a 1-parameter varying linear combination of the real and skew part matrices H = (A+A^*)/2 and K = (A-A^*)/(2i) of A. For decomposing flows H\\!K {\\cal _A(t), the algorithm decomposes the given dense general matrix A unitarily into U^*AU = \\text { diag} (A_j) with diagonal blocks A_j that conform in size with those of H\\!K_A . It then computes the field of values boundaries separately for each diagonal block A_j using the path following ZNN eigenvalue method. The convex hull of all sub field of values boundary points then determines the field of values boundary curve correctly for decomposing and non-decomposing matrices A. The algorithm removes standard restrictions for path following FoV methods that generally cannot deal with decomposing matrices A due to possible eigencurve crossings of H\\!K {\\cal _A(t). Tests and numerical comparisons are included. Our ZNN based method is coded for sequential and parallel computations and both versions run very accurately and very fast when compared with Johnson's global QR eigenvalue and Bedixon rectangle based method that computes complete eigenanalyses of H\\!K {\\cal _A(t_k) for every chosen t_k \\in {[} 0,2\\pi{]} .", "after_revision": "This paper describes and develops a fast and accurate path following algorithm that computes the field of values boundary curve for every conceivable complex or real square matrix A . It relies on a matrix flow decomposition method that finds a proper block-diagonal flow representation for the associated hermitean matrix flow {\\cal F _A(t) = \\cos(t) H + \\sin(t) K . Here{\\cal F _A(t) is a 1-parameter-varying linear combination of the real and skew part matrices H = (A+A^*)/2 and K = (A-A^*)/(2i) of A. For decomposing flows {\\cal F _A(t), the algorithm decomposes a given dense general matrix A unitarily into block-diagonal form U^*AU = \\text { diag} (A_j) with j > 1 diagonal blocks A_j whose individual sizes add up to the size of A . It then computes the field of values boundaries separately for each diagonal block A_j using the path following ZNN eigenvalue method. The convex hull of all sub-fields of values boundary points then determines the field of values boundary curve correctly for decomposing and non-decomposing matrices A. The algorithm removes standard restrictions for path following FoV methods that generally cannot deal with decomposing matrices A due to possible eigencurve crossings of {\\cal F _A(t). Tests and numerical comparisons are included. Our ZNN based method is coded for sequential and parallel computations and both versions run very accurately and very fast when compared with Johnson's Francis QR eigenvalue and Bendixon rectangle based method that computes complete eigenanalyses of {\\cal F _A(t_k) for every chosen t_k \\in {[} 0,2\\pi{]} more slowly .", "edit_actions": [{"type": "A", "before": null, "after": "path following", "start_char_pos": 54, "end_char_pos": 54}, {"type": "A", "before": null, "after": "or real", "start_char_pos": 144, "end_char_pos": 144}, {"type": "R", "before": ", i. e., for all matrices, those with or without repeated eigenvalues and with or without Jordan block structures, with ill-conditioned eigenvalues or ill-conditioned ones and so forth.", "after": ".", "start_char_pos": 161, "end_char_pos": 346}, {"type": "A", "before": null, "after": "proper", "start_char_pos": 408, "end_char_pos": 408}, {"type": "A", "before": null, "after": "associated", "start_char_pos": 452, "end_char_pos": 452}, {"type": "D", "before": "H\\!K", "after": null, "start_char_pos": 475, "end_char_pos": 479}, {"type": "A", "before": null, "after": "F", "start_char_pos": 486, "end_char_pos": 486}, {"type": "R", "before": "if this is possible. Here H\\!K", "after": ". Here", "start_char_pos": 517, "end_char_pos": 547}, {"type": "A", "before": null, "after": "F", "start_char_pos": 553, "end_char_pos": 553}, {"type": "R", "before": "1-parameter varying", "after": "1-parameter-varying", "start_char_pos": 565, "end_char_pos": 584}, {"type": "D", "before": "H\\!K", "after": null, "start_char_pos": 702, "end_char_pos": 706}, {"type": "A", "before": null, "after": "F", "start_char_pos": 713, "end_char_pos": 713}, {"type": "R", "before": "the", "after": "a", "start_char_pos": 746, "end_char_pos": 749}, {"type": "A", "before": null, "after": "block-diagonal form", "start_char_pos": 794, "end_char_pos": 794}, {"type": "A", "before": null, "after": "j > 1", "start_char_pos": 828, "end_char_pos": 828}, {"type": "R", "before": "that conform in size with those of H\\!K_A", "after": "whose individual sizes add up to the size of A", "start_char_pos": 849, "end_char_pos": 890}, {"type": "R", "before": "sub field", "after": "sub-fields", "start_char_pos": 1051, "end_char_pos": 1060}, {"type": "D", "before": "H\\!K", "after": null, "start_char_pos": 1366, "end_char_pos": 1370}, {"type": "A", "before": null, "after": "F", "start_char_pos": 1377, "end_char_pos": 1377}, {"type": "R", "before": "global", "after": "Francis", "start_char_pos": 1583, "end_char_pos": 1589}, {"type": "R", "before": "Bedixon", "after": "Bendixon", "start_char_pos": 1608, "end_char_pos": 1615}, {"type": "D", "before": "H\\!K", "after": null, "start_char_pos": 1679, "end_char_pos": 1683}, {"type": "A", "before": null, "after": "F", "start_char_pos": 1690, "end_char_pos": 1690}, {"type": "A", "before": null, "after": "more slowly", "start_char_pos": 1738, "end_char_pos": 1738}], "sents_char_pos": [0, 346, 537, 679, 892, 1027, 1195, 1384, 1430]}
+{"doc_id": "2006.01512", "revision_depth": "1", "before_revision": "We recall that if A is an invertible and symmetric real m\\times m matrix, then it is diagonalisable. Therefore, if we denote by \\mathcal{E^{+}(A)\\subset R^m (respectively E^{-}(A)\\subset R^m) to be the vector subspace generated by eigenvectors with positive eigenvalues of A (correspondingly the vector subspace generated by eigenvectors with negative eigenvalues of A), then we have an orthogonal decomposition R^m=E^{+}(A)\\oplus E^{-}(A). Hence, every x\\in R^m can be written uniquely as x=pr_{A,+}(x)+pr_{A,-}(x) with pr_{A,+}(x)\\in E^{+}(A) and pr_{A,-}(x)\\in E^{-}(A). We propose the following simple new modification of quasi-Newton's methods. }%DIFDELCMD < {\\bf %%% New Q-Newton's method. Let \\Delta = \\{\\delta _0,\\delta _1,\\delta _2,\\ldots \\} be a countable set of real numbers which has at least m+1 elements. Let f:R^m\\rightarrow R be a C^2 function. Let \\alpha >0. For each x\\in \\mathbb{R^m such that \\nabla f(x)}%DIFDELCMD < \\not%%% = 0, let \\delta (x) = \\delta _j, where j is the smallest number so that \\nabla ^2f(x)+\\delta _j||\\nabla f(x)||^{1+\\alphaId is invertible. (If \\nabla f(x)=0, then we choose \\delta (x)=\\delta _0.) Let x_0\\in \\mathbb{R}^m be an initial point. We define a sequence of x_n\\in \\mathbb{R}^m and invertible and symmetric m\\times m matrices A_nas follows: A_n=} \\nabla ^2f(x_n)+\\delta (x_n) ||\\nabla f(x_n)|| ^{1+\\alpha = x_n-w_n, where w_n=pr_{A_n,+ A_n^{-1} \\nabla f(x_n). The main result of this paper roughly says that if f is C^3 and a sequence \\{x_n\\}, constructed by the New Q-Newton's method from a random initial point x_0, {\\bf converges}, then the limit point is not a saddle point, and the convergence rate is the same as that of Newton's method .", "after_revision": "We ^{+}(A)\\subset R^m (respectively E^{-}(A)\\subset R^m) to be the vector subspace generated by eigenvectors with positive eigenvalues of A (correspondingly the vector subspace generated by eigenvectors with negative eigenvalues of A), then we have an orthogonal decomposition R^m=E^{+}(A)\\oplus E^{-}(A). Hence, every x\\in R^m can be written uniquely as x=pr_{A,+}(x)+pr_{A,-}(x) with pr_{A,+}(x)\\in E^{+}(A) and pr_{A,-}(x)\\in E^{-}(A). We propose the following simple new modification of quasi-Newton's methods. }%DIFDELCMD < {\\bf %%% propose in this paper New Q-Newton's method. The update rule for the simplest version is x_{n+1 = ^m such that \\nabla f(x)}%DIFDELCMD < \\not%%% x_n-w_n where w_n = pr_{A_n,+ = Id is invertible. (If \\nabla f(x)=0, then we choose \\delta (x)=\\delta _0.) Let x_0\\in \\mathbb{R}^m be an initial point. We define a sequence of x_n\\in \\mathbb{R}^m and invertible and symmetric m\\times m matrices A_nas follows: A_n=} \\nabla ^2f(x_n)+\\delta _n ||\\nabla f(x_n)|| ^2 .Id and v_n = A_n^{-1} . \\nabla f(x_n). Here \\delta _n is an appropriate real number so that A_n is invertible, and pr_{A_n,\\pm The main result of this paper roughly says that if f is C^3 and a sequence \\{x_n\\}, constructed by the New Q-Newton's method from a random initial point x_0, {\\bf converges}, then the limit point is a critical point and is not a saddle point, and the convergence rate is the same as that of Newton's method . At the end of the paper, we present some issues (saddle points and convergence) one faces when implementing Newton's method and modifications into Deep Neural Networks. In the appendix, we test the good performance of New Q-Newton's method on various benchmark test functions such as Rastrigin, Askley, Rosenbroch and many other, against algorithms such as Newton's method, BFGS, Adaptive Cubic Regularization, Random damping Newton's method and Inertial Newton's method, as well as Unbounded Two-way Backtracking Gradient Descent. The experiments demonstrate in particular that the assumption that f is C^3 is necessary for some conclusions in the main theoretical results .", "edit_actions": [{"type": "D", "before": "recall that if A is an invertible and symmetric real m\\times m matrix, then it is diagonalisable. Therefore, if we denote by \\mathcal{E", "after": null, "start_char_pos": 3, "end_char_pos": 138}, {"type": "A", "before": null, "after": "propose in this paper", "start_char_pos": 673, "end_char_pos": 673}, {"type": "R", "before": "Let \\Delta", "after": "The update rule for the simplest version is x_{n+1", "start_char_pos": 697, "end_char_pos": 707}, {"type": "D", "before": "\\{\\delta _0,\\delta _1,\\delta _2,\\ldots \\} be a countable set of real numbers which has at least m+1 elements. Let f:R^m\\rightarrow R be a C^2 function. Let \\alpha >0. For each x\\in \\mathbb{R", "after": null, "start_char_pos": 710, "end_char_pos": 900}, {"type": "A", "before": null, "after": "x_n-w_n where w_n", "start_char_pos": 946, "end_char_pos": 946}, {"type": "R", "before": "0, let \\delta (x)", "after": "pr_{A_n,+", "start_char_pos": 949, "end_char_pos": 966}, {"type": "D", "before": "\\delta _j, where j is the smallest number so that \\nabla ^2f(x)+\\delta _j||\\nabla f(x)||^{1+\\alpha", "after": null, "start_char_pos": 969, "end_char_pos": 1067}, {"type": "R", "before": "(x_n)", "after": "_n", "start_char_pos": 1323, "end_char_pos": 1328}, {"type": "R", "before": "^{1+\\alpha", "after": "^2 .Id and v_n", "start_char_pos": 1347, "end_char_pos": 1357}, {"type": "D", "before": "x_n-w_n, where w_n=pr_{A_n,+", "after": null, "start_char_pos": 1360, "end_char_pos": 1388}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1398, "end_char_pos": 1398}, {"type": "A", "before": null, "after": "Here \\delta _n is an appropriate real number so that A_n is invertible, and pr_{A_n,\\pm", "start_char_pos": 1414, "end_char_pos": 1414}, {"type": "A", "before": null, "after": "a critical point and is", "start_char_pos": 1614, "end_char_pos": 1614}, {"type": "A", "before": null, "after": ". At the end of the paper, we present some issues (saddle points and convergence) one faces when implementing Newton's method and modifications into Deep Neural Networks. In the appendix, we test the good performance of New Q-Newton's method on various benchmark test functions such as Rastrigin, Askley, Rosenbroch and many other, against algorithms such as Newton's method, BFGS, Adaptive Cubic Regularization, Random damping Newton's method and Inertial Newton's method, as well as Unbounded Two-way Backtracking Gradient Descent. The experiments demonstrate in particular that the assumption that f is C^3 is necessary for some conclusions in the main theoretical results", "start_char_pos": 1699, "end_char_pos": 1699}], "sents_char_pos": [0, 100, 440, 573, 649, 696, 819, 861, 876, 1084, 1186, 1413]}
+{"doc_id": "2006.02985", "revision_depth": "1", "before_revision": "This tutorial shows how to build, fit, and criticize disease transmission models in Stan, and should be useful to researchers interested in modeling the COVID-19 outbreak and doing Bayesian inference . Bayesian modeling provides a principled way to quantify uncertainty and incorporate prior knowledge into the model . What is more, Stan 's main inference engine, Hamiltonian Monte Carlo sampling, is amiable to diagnostics, which means we can verify whether our inference is reliable. Stan is an expressive probabilistic programing language that abstracts the inference and allows users to focus on the modeling. The resulting code is readable and easily extensible, which makes the modeler's work more transparent and flexible. In this tutorial, we demonstrate with a simple Susceptible-Infected-Recovered (SIR) model how to formulate, fit, and diagnose a compartmental model in Stan . We also introduce more advanced topics which can help practitioners fit sophisticated models; notably, how to use simulations to probe our model and our priors, and computational techniques to scale ODE-based models .", "after_revision": "This tutorial shows how to build, fit, and criticize disease transmission models in Stan, and should be useful to researchers interested in modeling the SARS-CoV-2 pandemic and other infectious diseases in a Bayesian framework . Bayesian modeling provides a principled way to quantify uncertainty and incorporate both data and prior knowledge into the model estimates. Stan is an expressive probabilistic programming language that abstracts the inference and allows users to focus on the modeling. As a result, Stan code is readable and easily extensible, which makes the modeler's work more transparent . Furthermore, Stan's main inference engine, Hamiltonian Monte Carlo sampling, is amiable to diagnostics, which means the user can verify whether the obtained inference is reliable. In this tutorial, we demonstrate how to formulate, fit, and diagnose a compartmental transmission model in Stan , first with a simple Susceptible-Infected-Recovered (SIR) model, then with a more elaborate transmission model used during the SARS-CoV-2 pandemic . We also cover advanced topics which can further help practitioners fit sophisticated models; notably, how to use simulations to probe the model and priors, and computational techniques to scale-up models based on ordinary differential equations .", "edit_actions": [{"type": "R", "before": "COVID-19 outbreak and doing Bayesian inference", "after": "SARS-CoV-2 pandemic and other infectious diseases in a Bayesian framework", "start_char_pos": 153, "end_char_pos": 199}, {"type": "A", "before": null, "after": "both data and", "start_char_pos": 286, "end_char_pos": 286}, {"type": "R", "before": ". What is more, Stan 's main inference engine, Hamiltonian Monte Carlo sampling, is amiable to diagnostics, which means we can verify whether our inference is reliable. Stan is", "after": "estimates. Stan is", "start_char_pos": 318, "end_char_pos": 494}, {"type": "R", "before": "programing", "after": "programming", "start_char_pos": 523, "end_char_pos": 533}, {"type": "R", "before": "The resulting", "after": "As a result, Stan", "start_char_pos": 615, "end_char_pos": 628}, {"type": "R", "before": "and flexible.", "after": ". Furthermore, Stan's main inference engine, Hamiltonian Monte Carlo sampling, is amiable to diagnostics, which means the user can verify whether the obtained inference is reliable.", "start_char_pos": 717, "end_char_pos": 730}, {"type": "D", "before": "with a simple Susceptible-Infected-Recovered (SIR) model", "after": null, "start_char_pos": 764, "end_char_pos": 820}, {"type": "A", "before": null, "after": "transmission", "start_char_pos": 873, "end_char_pos": 873}, {"type": "A", "before": null, "after": ", first with a simple Susceptible-Infected-Recovered (SIR) model, then with a more elaborate transmission model used during the SARS-CoV-2 pandemic", "start_char_pos": 888, "end_char_pos": 888}, {"type": "R", "before": "introduce more", "after": "cover", "start_char_pos": 899, "end_char_pos": 913}, {"type": "A", "before": null, "after": "further", "start_char_pos": 940, "end_char_pos": 940}, {"type": "R", "before": "our model and our", "after": "the model and", "start_char_pos": 1027, "end_char_pos": 1044}, {"type": "R", "before": "scale ODE-based models", "after": "scale-up models based on ordinary differential equations", "start_char_pos": 1085, "end_char_pos": 1107}], "sents_char_pos": [0, 319, 486, 614, 730, 890, 985]}
+{"doc_id": "2006.03044", "revision_depth": "1", "before_revision": "Difficulty algorithms are a fundamental component of Proof-of-Work blockchains, aimed at maintaining stable block production times by dynamically adjusting the network difficulty in response to the miners' constantly changing computational power. Targeting stable block times is critical, as this ensures consistent transaction throughput. Some blockchains need difficulty algorithms that react quickly to severe hash rate fluctuations . However, without careful design this could create vulnerabilities that incentivize miners to engage in coin-hopping strategies which yield an unreliable system due to unstable processing of transactions. We provide an empirical analysis of how Bitcoin Cash exhibits cyclicality in block solve times as a consequence of a positive feedback loop in its difficulty algorithm design. Additionally, we examine the extent to which miners' behavior contributes towards this phenomenon over time. In response, we mathematically derive a difficulty algorithm based on a negative exponential filter that prohibits the formation of positive feedback loops and exhibits additional desirable properties, such as history agnosticism. We compare the described algorithm to that of Bitcoin Cash in a simulated mining environment and verify that the former would eliminate the severe oscillations in block solve times. Lastly, we outline how this model can more generally replace difficulty algorithms in other Proof-of-Work blockchains .", "after_revision": "In Proof-of-Work blockchains, difficulty algorithms serve the crucial purpose of maintaining a stable transaction throughput by dynamically adjusting the block difficulty in response to the miners' constantly changing computational power. Blockchains that may experience severe hash rate fluctuations need difficulty algorithms that quickly adapt the mining difficulty . However, without careful design , the system could be gamed by miners using coin-hopping strategies to manipulate the block difficulty for profit. Such miner behavior results in an unreliable system due to the unstable processing of transactions. We provide an empirical analysis of how Bitcoin Cash 's difficulty algorithm design leads to cyclicality in block solve times as a consequence of a positive feedback loop . In response, we mathematically derive a difficulty algorithm using a negative exponential filter which prohibits the formation of positive feedback and exhibits additional desirable properties, such as history agnosticism. We compare the described algorithm to that of Bitcoin Cash in a simulated mining environment and verify that the former would eliminate the severe oscillations in transaction throughput .", "edit_actions": [{"type": "R", "before": "Difficulty algorithms are a fundamental component of", "after": "In", "start_char_pos": 0, "end_char_pos": 52}, {"type": "R", "before": "aimed at maintaining stable block production times", "after": "difficulty algorithms serve the crucial purpose of maintaining a stable transaction throughput", "start_char_pos": 80, "end_char_pos": 130}, {"type": "R", "before": "network", "after": "block", "start_char_pos": 160, "end_char_pos": 167}, {"type": "R", "before": "Targeting stable block times is critical, as this ensures consistent transaction throughput. Some blockchains need difficulty algorithms that react quickly to", "after": "Blockchains that may experience", "start_char_pos": 247, "end_char_pos": 405}, {"type": "A", "before": null, "after": "need difficulty algorithms that quickly adapt the mining difficulty", "start_char_pos": 436, "end_char_pos": 436}, {"type": "R", "before": "this could create vulnerabilities that incentivize miners to engage in", "after": ", the system could be gamed by miners using", "start_char_pos": 471, "end_char_pos": 541}, {"type": "R", "before": "which yield", "after": "to manipulate the block difficulty for profit. Such miner behavior results in", "start_char_pos": 566, "end_char_pos": 577}, {"type": "A", "before": null, "after": "the", "start_char_pos": 606, "end_char_pos": 606}, {"type": "R", "before": "exhibits", "after": "'s difficulty algorithm design leads to", "start_char_pos": 697, "end_char_pos": 705}, {"type": "R", "before": "in its difficulty algorithm design. Additionally, we examine the extent to which miners' behavior contributes towards this phenomenon over time.", "after": ".", "start_char_pos": 784, "end_char_pos": 928}, {"type": "R", "before": "based on", "after": "using", "start_char_pos": 990, "end_char_pos": 998}, {"type": "R", "before": "that", "after": "which", "start_char_pos": 1029, "end_char_pos": 1033}, {"type": "D", "before": "loops", "after": null, "start_char_pos": 1079, "end_char_pos": 1084}, {"type": "R", "before": "block solve times. Lastly, we outline how this model can more generally replace difficulty algorithms in other Proof-of-Work blockchains", "after": "transaction throughput", "start_char_pos": 1323, "end_char_pos": 1459}], "sents_char_pos": [0, 246, 339, 438, 643, 819, 928, 1159, 1341]}
+{"doc_id": "2006.03226", "revision_depth": "1", "before_revision": "The combination of neuroscience-oriented and computer-science-oriented approaches is the most promising method to develop artificial general intelligence (AGI) that can learn general tasks similar to humans. Currently, two main routes of learning exist, including neuroscience-inspired methods , represented by local synaptic plasticity, and machine-learning methods, represented by backpropagation . Both have advantages and complement each other , but neither can solve all learning problems well. Integrating these two methods into one network may provide better learning abilities for general tasks. Here, we report a hybrid spiking neural network model that integrates the two approaches by introducing a meta-local module and a two-phase causality modellingmethod. The model can not only optimize local plasticityrules, but also receive top-down supervision information . In addition to flexibly supporting multiple spike-based coding schemes, we demonstrate that this model facilitates learning of many general tasks, including fault-tolerance learning, few-shot learning and multiple-task learning , and show its efficiency on the Tianjic neuromorphic platform . This work provides a new route for brain-inspired computing and facilitates AGI development .", "after_revision": "Two main routes of learning methods exist at present including neuroscience-inspired methods and machine learning methods . Both have own advantages , but neither currently can solve all learning problems well. Integrating them into one network may provide better learning abilities for general tasks. On the other hand, spiking neural network embodies \"computation\" in spatiotemporal domain with unique features of rich coding scheme and threshold switching, which is very suitable for low power and high parallel neuromorphic computing. Here, we report a spike-based general learning model that integrates two learning routes by introducing a brain-inspired meta-local module and a two-phase parametric modelling. The hybrid model can meta-learn general local plasticity, and receive top-down supervision information for multi-scale learning. We demonstrate that this hybrid model facilitates learning of many general tasks, including fault-tolerance learning, few-shot learning and multiple-task learning . Furthermore, the implementation of the hybrid model on the Tianjic neuromorphic platform proves that it can fully utilize the advantages of neuromorphic hardware architecture and promote energy-efficient on-chip applications .", "edit_actions": [{"type": "R", "before": "The combination of neuroscience-oriented and computer-science-oriented approaches is the most promising method to develop artificial general intelligence (AGI) that can learn general tasks similar to humans. Currently, two", "after": "Two", "start_char_pos": 0, "end_char_pos": 222}, {"type": "R", "before": "exist,", "after": "methods exist at present", "start_char_pos": 247, "end_char_pos": 253}, {"type": "R", "before": ", represented by local synaptic plasticity, and machine-learning methods, represented by backpropagation", "after": "and machine learning methods", "start_char_pos": 294, "end_char_pos": 398}, {"type": "R", "before": "advantages and complement each other", "after": "own advantages", "start_char_pos": 411, "end_char_pos": 447}, {"type": "A", "before": null, "after": "currently", "start_char_pos": 462, "end_char_pos": 462}, {"type": "R", "before": "these two methods", "after": "them", "start_char_pos": 513, "end_char_pos": 530}, {"type": "A", "before": null, "after": "On the other hand, spiking neural network embodies \"computation\" in spatiotemporal domain with unique features of rich coding scheme and threshold switching, which is very suitable for low power and high parallel neuromorphic computing.", "start_char_pos": 605, "end_char_pos": 605}, {"type": "R", "before": "hybrid spiking neural network", "after": "spike-based general learning", "start_char_pos": 624, "end_char_pos": 653}, {"type": "R", "before": "the two approaches", "after": "two learning routes", "start_char_pos": 676, "end_char_pos": 694}, {"type": "A", "before": null, "after": "brain-inspired", "start_char_pos": 712, "end_char_pos": 712}, {"type": "R", "before": "causality modellingmethod. The model can not only optimize local plasticityrules, but also", "after": "parametric modelling. The hybrid model can meta-learn general local plasticity, and", "start_char_pos": 747, "end_char_pos": 837}, {"type": "R", "before": ". In addition to flexibly supporting multiple spike-based coding schemes, we", "after": "for multi-scale learning. We", "start_char_pos": 879, "end_char_pos": 955}, {"type": "A", "before": null, "after": "hybrid", "start_char_pos": 978, "end_char_pos": 978}, {"type": "R", "before": ", and show its efficiency", "after": ". Furthermore, the implementation of the hybrid model", "start_char_pos": 1110, "end_char_pos": 1135}, {"type": "R", "before": ". This work provides a new route for brain-inspired computing and facilitates AGI development", "after": "proves that it can fully utilize the advantages of neuromorphic hardware architecture and promote energy-efficient on-chip applications", "start_char_pos": 1173, "end_char_pos": 1266}], "sents_char_pos": [0, 207, 400, 500, 604, 773, 880, 1174]}
+{"doc_id": "2006.04002", "revision_depth": "1", "before_revision": "In this paper, we extend the class of kernel methods, the so-called diffusion maps (DM), and its local kernel variants, to approximate second-order differential operators defined on smooth manifolds with boundary that naturally arise in elliptic PDE models. To achieve this goal, we introduce the Ghost Point Diffusion Maps (GPDM) estimator on an extended manifold, identified by the set of point clouds on the unknown original manifold together with a set of ghost points specified along the tangential direction at the boundary of the original manifold . The resulting GPDM estimator restricts the standard DM matrix to a set of extrapolation equations that estimates the function values on the ghost points. This adjustment is analogous to the usual correction on the matrix components near the boundary in classical finite-difference methods . As opposed to the classical DM which diverges near the boundary, the proposed GPDM estimator converges pointwise even near the boundary , assuming that the extended manifold is smooth . Applying the consistent GPDM estimator to solve the well-posed elliptic PDEs with classical boundary conditions (Dirichlet, Neumann, and Robin), we establish the convergence of the approximate solution under appropriate smoothness assumptions. We validate the proposed mesh-free PDE solver with supporting numerical examples on various problems , defined on simple manifolds embedded in 2D to 5D Euclidean spaces as well as on an unknown manifold. Numerically, we also find that the GPDM is more accurate compared to DM in solving eigenvalue problems associated with the second-order differential operators on bounded smooth manifolds.", "after_revision": "In this paper, we extend the class of kernel methods, the so-called diffusion maps (DM), and its local kernel variants, to approximate second-order differential operators defined on smooth manifolds with boundaries that naturally arise in elliptic PDE models. To achieve this goal, we introduce the Ghost Point Diffusion Maps (GPDM) estimator on an extended manifold, identified by the set of point clouds on the unknown original manifold together with a set of ghost points , specified along the estimated tangential direction at the sampled points at the boundary . The resulting GPDM estimator restricts the standard DM matrix to a set of extrapolation equations that estimates the function values at the ghost points. This adjustment is analogous to the classical ghost point method in finite-difference scheme for solving PDEs on flat domain . As opposed to the classical DM which diverges near the boundary, the proposed GPDM estimator converges pointwise even near the boundary . Applying the consistent GPDM estimator to solve the well-posed elliptic PDEs with classical boundary conditions (Dirichlet, Neumann, and Robin), we establish the convergence of the approximate solution under appropriate smoothness assumptions. We numerically validate the proposed mesh-free PDE solver on various problems defined on simple sub-manifolds embedded in Euclidean spaces as well as on an unknown manifold. Numerically, we also found that the GPDM is more accurate compared to DM in solving elliptic eigenvalue problems on bounded smooth manifolds.", "edit_actions": [{"type": "R", "before": "boundary", "after": "boundaries", "start_char_pos": 204, "end_char_pos": 212}, {"type": "A", "before": null, "after": ",", "start_char_pos": 473, "end_char_pos": 473}, {"type": "A", "before": null, "after": "estimated", "start_char_pos": 494, "end_char_pos": 494}, {"type": "R", "before": "boundary of the original manifold", "after": "sampled points at the boundary", "start_char_pos": 523, "end_char_pos": 556}, {"type": "R", "before": "on", "after": "at", "start_char_pos": 692, "end_char_pos": 694}, {"type": "R", "before": "usual correction on the matrix components near the boundary in classical", "after": "classical ghost point method in", "start_char_pos": 749, "end_char_pos": 821}, {"type": "R", "before": "methods", "after": "scheme for solving PDEs on flat domain", "start_char_pos": 840, "end_char_pos": 847}, {"type": "D", "before": ", assuming that the extended manifold is smooth", "after": null, "start_char_pos": 986, "end_char_pos": 1033}, {"type": "A", "before": null, "after": "numerically", "start_char_pos": 1283, "end_char_pos": 1283}, {"type": "D", "before": "with supporting numerical examples", "after": null, "start_char_pos": 1327, "end_char_pos": 1361}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1382, "end_char_pos": 1383}, {"type": "R", "before": "manifolds embedded in 2D to 5D", "after": "sub-manifolds embedded in", "start_char_pos": 1402, "end_char_pos": 1432}, {"type": "R", "before": "find", "after": "found", "start_char_pos": 1506, "end_char_pos": 1510}, {"type": "R", "before": "eigenvalue problems associated with the second-order differential operators", "after": "elliptic eigenvalue problems", "start_char_pos": 1568, "end_char_pos": 1643}], "sents_char_pos": [0, 257, 558, 712, 849, 1279, 1484]}
+{"doc_id": "2006.05955", "revision_depth": "1", "before_revision": "A compartmental epidemic model is proposed to predict the Covid-19 virus spread. It considers: both detected and undetected infected populations, medical quarantine and social sequestration, plus possible reinfection. The coefficients in the model are evaluated by fitting to empirical data for six US states: California, Louisiana, New Jersey, New York State, Texas, and Washington State . The evolution of Covid-19 is fairly similar among the states: contact and detection rates remain below 5\\%; however, variations are larger in death rate, recovery rate, and stay-at-home effect . The results reveal that outbreaks may have been well underway in several states before first detected and that some western states might have seen more than one influx of the pandemic. For the majority of states the model's effective reproduction number is slightly above the critical value of one, indicating that Covid-19 will become endemic, spreading for more than two years. Should stay-at-home orders be revoked , most states may experience oscillating yearly infections. Even if additional lockdowns are applied in Texas, and then released according to White House guidelines of 14 days of decreasing cases, a similar endemic situation may occur. Additionally, if lockdowns had been instituted one to three weeks sooner , the number of Covid-19 deaths in New York could have been significantly reduced, but surprisingly not in Texas (perhaps due to aversion to lockdown and absence of a decree).", "after_revision": "A compartmental epidemic model is proposed to predict the Covid-19 virus spread. It considers: both detected and undetected infected populations, medical quarantine and social sequestration, release from sequestration, plus possible reinfection. The coefficients in the model are evaluated by fitting to empirical data for eight US states: Arizona, California, Florida, Illinois, Louisiana, New Jersey, New York State, and Texas. Together these states make up 43\\% of the US population; some of these states appear to have handled their initial outbreaks well, while others appear to be emerging hotspots . The evolution of Covid-19 is fairly similar among the states: variations in contact and recovery rates remain below 5\\%; however, not surprisingly, variations are larger in death rate, reinfection rate, stay-at-home effect , and release rate from sequestration . The results reveal that outbreaks may have been well underway in several states before first detected and that California might have seen more than one influx of the pandemic. Our projections based on the current situation indicate that Covid-19 will become endemic, spreading for more than two years. Should states fully relax stay-at-home orders , most states may experience a secondary peak in 2021. If lockdowns had been kept in place , the number of Covid-19 deaths so far could have been significantly lower in most states that opened up. Additionally, our model predicts that decreasing contact rate by 10\\%, or increasing testing by approximately 15\\%, or doubling lockdown compliance (from the current \\sim 15\\% to \\sim 30\\%) will eradicate infections in the state of Texas within a year. Extending our fits for all of the US states, we predict about 11 million total infections (including undetected), 8 million cumulative confirmed cases, and 630,000 cumulative deaths by November 1, 2020.", "edit_actions": [{"type": "A", "before": null, "after": "release from sequestration,", "start_char_pos": 191, "end_char_pos": 191}, {"type": "R", "before": "six", "after": "eight", "start_char_pos": 296, "end_char_pos": 299}, {"type": "R", "before": "California,", "after": "Arizona, California, Florida, Illinois,", "start_char_pos": 311, "end_char_pos": 322}, {"type": "R", "before": "Texas, and Washington State", "after": "and Texas. Together these states make up 43\\% of the US population; some of these states appear to have handled their initial outbreaks well, while others appear to be emerging hotspots", "start_char_pos": 362, "end_char_pos": 389}, {"type": "R", "before": "contact and detection", "after": "variations in contact and recovery", "start_char_pos": 454, "end_char_pos": 475}, {"type": "A", "before": null, "after": "not surprisingly,", "start_char_pos": 509, "end_char_pos": 509}, {"type": "R", "before": "recovery rate, and", "after": "reinfection rate,", "start_char_pos": 547, "end_char_pos": 565}, {"type": "A", "before": null, "after": ", and release rate from sequestration", "start_char_pos": 586, "end_char_pos": 586}, {"type": "R", "before": "some western states", "after": "California", "start_char_pos": 700, "end_char_pos": 719}, {"type": "R", "before": "For the majority of states the model's effective reproduction number is slightly above the critical value of one, indicating", "after": "Our projections based on the current situation indicate", "start_char_pos": 774, "end_char_pos": 898}, {"type": "A", "before": null, "after": "states fully relax", "start_char_pos": 976, "end_char_pos": 976}, {"type": "D", "before": "be revoked", "after": null, "start_char_pos": 997, "end_char_pos": 1007}, {"type": "R", "before": "oscillating yearly infections. Even if additional lockdowns are applied in Texas, and then released according to White House guidelines of 14 days of decreasing cases, a similar endemic situation may occur. Additionally, if", "after": "a secondary peak in 2021. If", "start_char_pos": 1037, "end_char_pos": 1260}, {"type": "R", "before": "instituted one to three weeks sooner", "after": "kept in place", "start_char_pos": 1280, "end_char_pos": 1316}, {"type": "R", "before": "in New York", "after": "so far", "start_char_pos": 1349, "end_char_pos": 1360}, {"type": "R", "before": "reduced, but surprisingly not in Texas (perhaps due to aversion to lockdown and absence of a decree).", "after": "lower in most states that opened up. Additionally, our model predicts that decreasing contact rate by 10\\%, or increasing testing by approximately 15\\%, or doubling lockdown compliance (from the current \\sim 15\\% to \\sim 30\\%) will eradicate infections in the state of Texas within a year. Extending our fits for all of the US states, we predict about 11 million total infections (including undetected), 8 million cumulative confirmed cases, and 630,000 cumulative deaths by November 1, 2020.", "start_char_pos": 1391, "end_char_pos": 1492}], "sents_char_pos": [0, 80, 218, 391, 499, 588, 773, 968, 1067, 1243]}
+{"doc_id": "2006.05993", "revision_depth": "1", "before_revision": "Controller area networks (CANs ) are a broadcast protocol for real-time communication of critical vehicle subsystems. Manufacturers of passenger vehicles hold secret their mappings of CAN data to vehicle signals, and these definitions vary per make, model, and year. Without these mappings, the wealth of real-time vehicle information hidden in CAN packets is uninterpretable-- severely impeding vehicle-related research including CAN cybersecurity, after-market tuning, efficiency and performance monitoring, and fault diagnosis . Guided by the four-part CAN signal definition, we present CAN-D ( CAN Decoder ), a modular, four-step pipeline for identifying each signal's boundaries (start bit and length), endianness (byte ordering ), signedness (bit-to-integer encoding), and meaningful, physical interpretation (label, unit, scaling factors). En route to CAN-D, we provide a comprehensive review of the CAN signal reverse engineering research. All previous methods ignore endianness and signedness, rendering them simply incapable of decoding many standard CAN signal definitions. We formulate and provide an efficient solution to an optimization problem, allowing identification of the optimal set of signal boundaries and byte orderings. In addition, we provide two novel, state-of-the-art signal boundary classifiers (both superior to previous approaches in precision and recall ) and the first signedness classification algorithm , which exhibits >97 \\% F-score. Overall, CAN-D is the only solution with the potential to extract any CAN signal and is the state of the art. In evaluation on ten vehicles of different makes, CAN-D's average \\ell^1 error is 5 times better than all preceding methods and exhibits lower average error even when considering only signals that meet prior methods' assumptions. Finally, CAN-D is implemented in lightweight hardware allowing OBD-II plugin for real-time in-vehicle CAN decoding.%DIFDELCMD < \\end{abstract} %DIFDELCMD < %%% \\\\%DIF > F-score. CAN-D is the only solution with the potential to extract any CAN signal. In evaluation on 10 vehicles, CAN-D's average \\ell^1 error is 5x better than all previous methods and exhibits lower ave. error, even when considering only signals that meet prior methods' assumptions. CAN-D is implemented in lightweight hardware, allowing for an OBD-II plugin for real-time in-vehicle CAN decoding.", "after_revision": "CANs are a broadcast protocol for real-time communication of critical vehicle subsystems. Original equipment manufacturers of passenger vehicles hold secret their mappings of CAN data to vehicle signals, and these definitions vary according to make, model, and year. Without these mappings, the wealth of real-time vehicle information hidden in the CAN packets is uninterpretable, impeding vehicle-related research . Guided by the 4-part CAN signal definition, we present CAN-D ( CAN-Decoder ), a modular, 4-step pipeline for identifying each signal's boundaries (start bit , length), endianness (byte order ), signedness (bit-to-integer encoding), and by leveraging diagnostic standards, augmenting a subset of the extracted signals with physical interpretation. We provide a comprehensive review of the CAN signal reverse engineering research. Previous methods ignore endianness and signedness, rendering them incapable of decoding many standard CAN signal definitions. Incorporating endianness grows the search space from 128 to 4.72E21 signal tokenizations and introduces a web of changing dependencies. We formulate, formally analyze, and provide an efficient solution to an optimization problem, allowing identification of the optimal set of signal boundaries and byte orderings. We provide two novel, state-of-the-art signal boundary classifiers-both superior to previous approaches in precision and recall in three different test scenarios-and the first signedness classification algorithm which exhibits a >97 %DIFDELCMD < \\end{abstract} %DIFDELCMD < %%% \\\\%DIF > F-score. CAN-D is the only solution with the potential to extract any CAN signal. In evaluation on 10 vehicles, CAN-D's average \\ell^1 error is 5x better than all previous methods and exhibits lower ave. error, even when considering only signals that meet prior methods' assumptions. CAN-D is implemented in lightweight hardware, allowing for an OBD-II plugin for real-time in-vehicle CAN decoding.", "edit_actions": [{"type": "R", "before": "Controller area networks (CANs )", "after": "CANs", "start_char_pos": 0, "end_char_pos": 32}, {"type": "R", "before": "Manufacturers", "after": "Original equipment manufacturers", "start_char_pos": 118, "end_char_pos": 131}, {"type": "R", "before": "per", "after": "according to", "start_char_pos": 240, "end_char_pos": 243}, {"type": "A", "before": null, "after": "the", "start_char_pos": 345, "end_char_pos": 345}, {"type": "R", "before": "uninterpretable-- severely", "after": "uninterpretable,", "start_char_pos": 361, "end_char_pos": 387}, {"type": "D", "before": "including CAN cybersecurity, after-market tuning, efficiency and performance monitoring, and fault diagnosis", "after": null, "start_char_pos": 422, "end_char_pos": 530}, {"type": "R", "before": "four-part", "after": "4-part", "start_char_pos": 547, "end_char_pos": 556}, {"type": "R", "before": "CAN Decoder", "after": "CAN-Decoder", "start_char_pos": 599, "end_char_pos": 610}, {"type": "R", "before": "four-step", "after": "4-step", "start_char_pos": 625, "end_char_pos": 634}, {"type": "R", "before": "and", "after": ",", "start_char_pos": 696, "end_char_pos": 699}, {"type": "R", "before": "ordering", "after": "order", "start_char_pos": 726, "end_char_pos": 734}, {"type": "R", "before": "meaningful, physical interpretation (label, unit, scaling factors). En route to CAN-D, we", "after": "by leveraging diagnostic standards, augmenting a subset of the extracted signals with physical interpretation. We", "start_char_pos": 780, "end_char_pos": 869}, {"type": "R", "before": "All previous", "after": "Previous", "start_char_pos": 949, "end_char_pos": 961}, {"type": "D", "before": "simply", "after": null, "start_char_pos": 1019, "end_char_pos": 1025}, {"type": "R", "before": "We formulate", "after": "Incorporating endianness grows the search space from 128 to 4.72E21 signal tokenizations and introduces a web of changing dependencies. We formulate, formally analyze,", "start_char_pos": 1086, "end_char_pos": 1098}, {"type": "R", "before": "In addition, we", "after": "We", "start_char_pos": 1245, "end_char_pos": 1260}, {"type": "R", "before": "classifiers (both", "after": "classifiers-both", "start_char_pos": 1313, "end_char_pos": 1330}, {"type": "R", "before": ") and", "after": "in three different test scenarios-and", "start_char_pos": 1387, "end_char_pos": 1392}, {"type": "R", "before": ", which exhibits", "after": "which exhibits a", "start_char_pos": 1439, "end_char_pos": 1455}, {"type": "D", "before": "\\% F-score. Overall, CAN-D is the only solution with the potential to extract any CAN signal and is the state of the art. In evaluation on ten vehicles of different makes, CAN-D's average \\ell^1 error is 5 times better than all preceding methods and exhibits lower average error even when considering only signals that meet prior methods' assumptions. Finally, CAN-D is implemented in lightweight hardware allowing OBD-II plugin for real-time in-vehicle CAN decoding.", "after": null, "start_char_pos": 1460, "end_char_pos": 1927}], "sents_char_pos": [0, 117, 266, 290, 450, 847, 948, 1085, 1244, 1471, 1581, 1811, 1927, 1989, 2062, 2264]}
+{"doc_id": "2006.06052", "revision_depth": "1", "before_revision": "Ability to solve large sparse linear systems of equations is very important in modern numerical methods. Creating a solver with a user-friendly interface that can work in many specific scenarios is a challenging task . We describe the C++ programming techniques that can help in creating flexible and extensible programming interfaces for linear solvers . The approach is based on policy-based design and partial template specialization, and is implemented in the open source AMGCL library. Convenience for the user and efficiency is demonstrated on the example of accelerating a large-scale Stokes problemsolution with a Schur pressure correction preconditioner. The user may select algorithmic components of the solver by adjusting template parameters without any change to the codebase. It is also possible to switch to block values, or use mixed precision solution, which results in up to 4 times speedup, and reduces the memory footprint of the algorithm by about 50\\%.%DIFDELCMD < \\end{abstract} %DIFDELCMD < %%% \\\\%DIF > . We evaluate both monolithic and composite preconditioning strategies for the 3 benchmark problems. The performance of the proposed solution is compared with a multithreaded direct Pardiso solver and a parallel iterative PETSc solver.", "after_revision": "The efficient solution of large sparse saddle point systems is very important in computational fluid mechanics. The discontinuous Galerkin finite element methods have become increasingly popular for incompressible flow problems but their application is limited due to high computational cost . We describe the C++ programming techniques that may help to accelerate linear solvers for such problems . The approach is based on the policy-based design pattern and partial template specialization, and is implemented in the open source AMGCL library. The efficiency is demonstrated with the example of accelerating an iterative solver of a discontinuous Galerkin finite element method for the Stokes problem. The implementation allows selecting algorithmic components of the solver by adjusting template parameters without any changes to the codebase. It is possible to switch to block values, or use a mixed precision solution, which results in up to 4 times speedup, and reduces the memory footprint of the algorithm by about %DIFDELCMD < \\end{abstract} %DIFDELCMD < %%% 40\\\\%DIF > . We evaluate both monolithic and composite preconditioning strategies for the 3 benchmark problems. The performance of the proposed solution is compared with a multithreaded direct Pardiso solver and a parallel iterative PETSc solver.", "edit_actions": [{"type": "R", "before": "Ability to solve large sparse linear systems of equations", "after": "The efficient solution of large sparse saddle point systems", "start_char_pos": 0, "end_char_pos": 57}, {"type": "R", "before": "modern numerical methods. Creating a solver with a user-friendly interface that can work in many specific scenarios is a challenging task", "after": "computational fluid mechanics. The discontinuous Galerkin finite element methods have become increasingly popular for incompressible flow problems but their application is limited due to high computational cost", "start_char_pos": 79, "end_char_pos": 216}, {"type": "R", "before": "can help in creating flexible and extensible programming interfaces for linear solvers", "after": "may help to accelerate linear solvers for such problems", "start_char_pos": 267, "end_char_pos": 353}, {"type": "A", "before": null, "after": "the", "start_char_pos": 381, "end_char_pos": 381}, {"type": "A", "before": null, "after": "pattern", "start_char_pos": 402, "end_char_pos": 402}, {"type": "R", "before": "Convenience for the user and", "after": "The", "start_char_pos": 493, "end_char_pos": 521}, {"type": "R", "before": "on", "after": "with", "start_char_pos": 549, "end_char_pos": 551}, {"type": "R", "before": "a large-scale Stokes problemsolution with a Schur pressure correction preconditioner. The user may select", "after": "an iterative solver of a discontinuous Galerkin finite element method for the Stokes problem. The implementation allows selecting", "start_char_pos": 580, "end_char_pos": 685}, {"type": "R", "before": "change", "after": "changes", "start_char_pos": 768, "end_char_pos": 774}, {"type": "D", "before": "also", "after": null, "start_char_pos": 798, "end_char_pos": 802}, {"type": "A", "before": null, "after": "a", "start_char_pos": 846, "end_char_pos": 846}, {"type": "D", "before": "50\\%.", "after": null, "start_char_pos": 972, "end_char_pos": 977}, {"type": "A", "before": null, "after": "40", "start_char_pos": 1022, "end_char_pos": 1022}], "sents_char_pos": [0, 104, 218, 355, 492, 665, 791, 977, 1131]}
+{"doc_id": "2006.06321", "revision_depth": "1", "before_revision": "Intuitive user interfaces are indispensable to interact with human centric smart environments. In this paper, we propose a unified framework that recognizes both static and dynamic gestures, using simple RGB vision (without depth sensing). This feature makes it suitable for inexpensive human-machine interaction (HMI). We rely on a spatial attention-based strategy, which employs SaDNet, our proposed Static and Dynamic gestures Network . From the image of the human upper body, we estimate his/her depth, along with the region-of-interest around his/her hands. The Convolutional Neural Networks in SaDNet are fine-tuned on a background-substituted hand gestures dataset. They are utilized to detect 10 static gestures for each hand and to obtain hand image-embeddings from the last Fully Connected layer, which are subsequently fused with the augmented pose vector and then passed to stacked Long Short-Term Memory blocks. Thus, human-centered frame-wise information from the augmented pose vector and left/right hands image-embeddings are aggregated in time to predict the dynamic gestures of the performing person. In a number of experiments we show that the proposed approach surpasses the state-of-the-art results on large-scale Chalearn 2016 dataset. Moreover, we also transfer the knowledge learned through the proposed methodology to the Praxis gestures dataset, and the obtained results also outscore the state-of-the-art on this dataset.", "after_revision": "Intuitive user interfaces are indispensable to interact with the human centric smart environments. In this paper, we propose a unified framework that recognizes both static and dynamic gestures, using simple RGB vision (without depth sensing). This feature makes it suitable for inexpensive human-robot interaction in social or industrial settings. We employ a pose-driven spatial attention strategy, which guides our proposed Static and Dynamic gestures Network - StaDNet . From the image of the human upper body, we estimate his/her depth, along with the region-of-interest around his/her hands. The Convolutional Neural Network in StaDNet is fine-tuned on a background-substituted hand gestures dataset. It is utilized to detect 10 static gestures for each hand as well as to obtain the hand image-embeddings . These are subsequently fused with the augmented pose vector and then passed to the stacked Long Short-Term Memory blocks. Thus, human-centred frame-wise information from the augmented pose vector and from the left/right hands image-embeddings are aggregated in time to predict the dynamic gestures of the performing person. In a number of experiments , we show that the proposed approach surpasses the state-of-the-art results on the large-scale Chalearn 2016 dataset. Moreover, we transfer the knowledge learned through the proposed methodology to the Praxis gestures dataset, and the obtained results also outscore the state-of-the-art on this dataset.", "edit_actions": [{"type": "A", "before": null, "after": "the", "start_char_pos": 61, "end_char_pos": 61}, {"type": "R", "before": "human-machine interaction (HMI). We rely on a spatial attention-based", "after": "human-robot interaction in social or industrial settings. We employ a pose-driven spatial attention", "start_char_pos": 288, "end_char_pos": 357}, {"type": "R", "before": "employs SaDNet,", "after": "guides", "start_char_pos": 374, "end_char_pos": 389}, {"type": "A", "before": null, "after": "- StaDNet", "start_char_pos": 439, "end_char_pos": 439}, {"type": "R", "before": "Networks in SaDNet are", "after": "Network in StaDNet is", "start_char_pos": 590, "end_char_pos": 612}, {"type": "R", "before": "They are", "after": "It is", "start_char_pos": 675, "end_char_pos": 683}, {"type": "R", "before": "and to obtain", "after": "as well as to obtain the", "start_char_pos": 736, "end_char_pos": 749}, {"type": "R", "before": "from the last Fully Connected layer, which", "after": ". These", "start_char_pos": 772, "end_char_pos": 814}, {"type": "A", "before": null, "after": "the", "start_char_pos": 888, "end_char_pos": 888}, {"type": "R", "before": "human-centered", "after": "human-centred", "start_char_pos": 934, "end_char_pos": 948}, {"type": "A", "before": null, "after": "from the", "start_char_pos": 1007, "end_char_pos": 1007}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1150, "end_char_pos": 1150}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1228, "end_char_pos": 1228}, {"type": "D", "before": "also", "after": null, "start_char_pos": 1277, "end_char_pos": 1281}], "sents_char_pos": [0, 95, 240, 320, 441, 564, 674, 927, 1122, 1263]}
+{"doc_id": "2006.06435", "revision_depth": "1", "before_revision": "Medicine is moving from reacting to a disease to prepare personalised and precision paths to well being . The complex and multi level pathophysiological patterns of most diseases require a systemic medicine approach and are challenging current medical therapies. Computational medicine is a vibrant interdisciplinary field that could help moving from URLan-centered to a process-oriented or systemic medicine data analysis. The resulting Computational patient may require an international interdisciplinary effort, probably of larger scientific and technological interdisciplinarity than the human genome sequencing . When deployed, it will have a profound impact on how healthcare is delivered to patients. Here we present a Computational patient model that integrates, refine and extend recent specific mechanistic or phenomenological models of cardiovascular, RAS and diabetic processes. Our aim is twofold: analyse the modularity and composability of the models-building blocks of the Computational patient and to study the dynamical properties of well-being and disease states in a broader functional context. We present results from a number of experiments among which we characterise the dynamical impact of covid-19 and T2D diabetes on cardiovascular and inflammation conditions. We tested these experiments under exercise and meals and drug regimen . We report results showing the striking importance of transient dynamical responses to acute state conditions and we provide guidelines for system design principle of the inter-relationship between modules and components for systemic medicine. Finally this initial Computational Patient can be used as a toolbox for further modifications and extensions.", "after_revision": "Medicine is moving from a curative discipline to a preventative discipline relying on personalised and precise treatment plans . The complex and multi level pathophysiological patterns of most diseases require a systemic medicine approach and are challenging current medical therapies. On the other hand, computational medicine is a vibrant interdisciplinary field that could help move from URLan-centered approach to a process-oriented approach. The ideal computational patient would require an international interdisciplinary effort, of larger scientific and technological interdisciplinarity than the Human Genome Project . When deployed, such a patient would have a profound impact on how healthcare is delivered to patients. Here we present a computational patient model that integrates, refines and extends recent mechanistic or phenomenological models of cardiovascular, RAS and diabetic processes. Our aim is twofold: analyse the modularity and composability of the model-building blocks of the computational patient and to study the dynamical properties of well-being and disease states in a broader functional context. We present results from a number of experiments among which we characterise the dynamic impact of COVID-19 and type-2 diabetes (T2D) on cardiovascular and inflammation conditions. We tested these experiments under different exercise, meal and drug regimens . We report results showing the striking importance of transient dynamical responses to acute state conditions and we provide guidelines for system design principles for the inter-relationship between modules and components in systemic medicine. Finally this initial computational Patient can be used as a toolbox for further modifications and extensions.", "edit_actions": [{"type": "R", "before": "reacting to a disease to prepare personalised and precision paths to well being", "after": "a curative discipline to a preventative discipline relying on personalised and precise treatment plans", "start_char_pos": 24, "end_char_pos": 103}, {"type": "R", "before": "Computational", "after": "On the other hand, computational", "start_char_pos": 263, "end_char_pos": 276}, {"type": "R", "before": "moving", "after": "move", "start_char_pos": 339, "end_char_pos": 345}, {"type": "A", "before": null, "after": "approach", "start_char_pos": 366, "end_char_pos": 366}, {"type": "R", "before": "or systemic medicine data analysis. The resulting Computational patient may", "after": "approach. The ideal computational patient would", "start_char_pos": 389, "end_char_pos": 464}, {"type": "D", "before": "probably", "after": null, "start_char_pos": 516, "end_char_pos": 524}, {"type": "R", "before": "human genome sequencing", "after": "Human Genome Project", "start_char_pos": 593, "end_char_pos": 616}, {"type": "R", "before": "it will", "after": "such a patient would", "start_char_pos": 634, "end_char_pos": 641}, {"type": "R", "before": "Computational", "after": "computational", "start_char_pos": 727, "end_char_pos": 740}, {"type": "R", "before": "refine and extend recent specific", "after": "refines and extends recent", "start_char_pos": 772, "end_char_pos": 805}, {"type": "R", "before": "models-building", "after": "model-building", "start_char_pos": 960, "end_char_pos": 975}, {"type": "R", "before": "Computational", "after": "computational", "start_char_pos": 990, "end_char_pos": 1003}, {"type": "R", "before": "dynamical impact of covid-19 and T2D diabetes", "after": "dynamic impact of COVID-19 and type-2 diabetes (T2D)", "start_char_pos": 1196, "end_char_pos": 1241}, {"type": "R", "before": "exercise and meals and drug regimen", "after": "different exercise, meal and drug regimens", "start_char_pos": 1323, "end_char_pos": 1358}, {"type": "R", "before": "principle of", "after": "principles for", "start_char_pos": 1514, "end_char_pos": 1526}, {"type": "R", "before": "for", "after": "in", "start_char_pos": 1581, "end_char_pos": 1584}, {"type": "R", "before": "Computational", "after": "computational", "start_char_pos": 1625, "end_char_pos": 1638}], "sents_char_pos": [0, 105, 262, 424, 618, 708, 891, 1115, 1288, 1360, 1603]}
+{"doc_id": "2006.07568", "revision_depth": "1", "before_revision": "In this article, we consider the path-following method based on the perturbed Newton flow with the new trust-region time-stepping scheme for the standard linear programming problem. For the problem with deficient rank matrix and the noise right-hand-side vector , we also give the pre-processing method based on the singular value decomposition . Then, we analyze the global convergence of the new method when the initial point is strictly primal-dual feasible. Finally, we test the new method for some problems with deficient rank matrices, and compare it with other popular interior-point methods such as the path-following method (the subroutine pathfollow.m coded by M.~C. Ferris \\mbox{%DIFAUXCMD \\cite{Gonzaga1992,FMW2007}\\hspace{0pt}%DIFAUXCMD ) and Mehrotra's predictor-corrector algorithm (} the built-in subroutine linprog.m of the MATLAB environment , which was implemented by S. Mehrotra and Y. Zhang \\mbox{%DIFAUXCMD \\cite{MATLAB,Mehrotra1992,Zhang1998}\\hspace{0pt}%DIFAUXCMD ). } Numerical results show that the new method is more robust than those methods for the large-scale deficient-rank problems without sacrificing its computational efficiency .", "after_revision": "In this article, we consider the primal-dual path-following method and the trust-region strategy for the standard linear programming problem. For the deficient rank problem with the small noisy data , we also give the pre-processing method based on the QR decomposition with column pivoting . Then, we prove the global convergence of the new method when the initial point is strictly primal-dual feasible. Finally, for some deficient rank problems with or without the small noisy data from the NETLIB collection, we compare it with other two popular interior-point methods , i.e. the subroutine pathfollow.m }\\hspace{0pt}%DIFAUXCMD ) and Mehrotra's predictor-corrector algorithm (} and the built-in subroutine linprog.m of the MATLAB environment }\\hspace{0pt}%DIFAUXCMD ). } . Numerical results show that the new method is more robust than the other two methods for the deficient rank problem with the small noise data .", "edit_actions": [{"type": "A", "before": null, "after": "primal-dual", "start_char_pos": 33, "end_char_pos": 33}, {"type": "R", "before": "based on the perturbed Newton flow with the new", "after": "and the", "start_char_pos": 56, "end_char_pos": 103}, {"type": "R", "before": "time-stepping scheme", "after": "strategy", "start_char_pos": 117, "end_char_pos": 137}, {"type": "R", "before": "problem with deficient rank matrix and the noise right-hand-side vector", "after": "deficient rank problem with the small noisy data", "start_char_pos": 191, "end_char_pos": 262}, {"type": "R", "before": "singular value decomposition", "after": "QR decomposition with column pivoting", "start_char_pos": 317, "end_char_pos": 345}, {"type": "R", "before": "analyze", "after": "prove", "start_char_pos": 357, "end_char_pos": 364}, {"type": "R", "before": "we test the new method for some problems with deficient rank matrices, and", "after": "for some deficient rank problems with or without the small noisy data from the NETLIB collection, we", "start_char_pos": 472, "end_char_pos": 546}, {"type": "A", "before": null, "after": "two", "start_char_pos": 569, "end_char_pos": 569}, {"type": "R", "before": "such as the path-following method (the", "after": ", i.e. the", "start_char_pos": 601, "end_char_pos": 639}, {"type": "D", "before": "coded by M.~C. Ferris \\mbox{%DIFAUXCMD \\cite{Gonzaga1992,FMW2007", "after": null, "start_char_pos": 664, "end_char_pos": 728}, {"type": "A", "before": null, "after": "and", "start_char_pos": 802, "end_char_pos": 802}, {"type": "D", "before": ", which was implemented by S. Mehrotra and Y. Zhang \\mbox{%DIFAUXCMD \\cite{MATLAB,Mehrotra1992,Zhang1998", "after": null, "start_char_pos": 863, "end_char_pos": 967}, {"type": "A", "before": null, "after": ".", "start_char_pos": 996, "end_char_pos": 996}, {"type": "R", "before": "those", "after": "the other two", "start_char_pos": 1060, "end_char_pos": 1065}, {"type": "R", "before": "large-scale deficient-rank problems without sacrificing its computational efficiency", "after": "deficient rank problem with the small noise data", "start_char_pos": 1082, "end_char_pos": 1166}], "sents_char_pos": [0, 182, 347, 462, 678]}
+{"doc_id": "2006.07906", "revision_depth": "1", "before_revision": "Several social interventions (e.g., suicide and HIV prevention ) leverage social network information to maximize outreach. Algorithmic influence maximization techniques have been proposed to aid with the choice of influencers (or peer leaders) in such interventions. Traditional algorithms for influence maximization have not been designed with social interventions in mind. As a result, they may disproportionately exclude minority communities from the benefits of the intervention. This has motivated research on fair influence maximization. Existing techniques require committing to a single domain-specific fairness measure. This makes it hard for a decision maker to meaningfully compare these notions and their resulting trade-offs across different applications. We address these shortcomings by extending the principles of cardinal welfare to the influence maximization setting, which is underlain by complex connections between members of different communities. We generalize the theory regarding these principles and show under what circumstances these principles can be satisfied by a welfare function. We then propose a family of welfare functions that are governed by a single inequity aversion parameter which allows a decision maker to study task-dependent trade-offs between fairness and total influence and effectively trade off quantities like influence gap by varying this parameter. We use these welfare functions as a fairness notion to rule out undesirable allocations. We show that the resulting optimization problem is monotone and submodular and can be solved with optimality guarantees. Finally, we carry out a detailed experimental analysis on synthetic and real social networks and should that high welfare can be achieved without sacrificing the total influence significantly. Interestingly we can show there exists welfare functions that empirically satisfy all of the principles .", "after_revision": "Several behavioral, social, and public health interventions, such as suicide/HIV prevention or community preparedness against natural disasters, leverage social network information to maximize outreach. Algorithmic influence maximization techniques have been proposed to aid with the choice of \"peer leaders\" or \"influencers\" in such interventions. Yet, traditional algorithms for influence maximization have not been designed with these interventions in mind. As a result, they may disproportionately exclude minority communities from the benefits of the intervention. This has motivated research on fair influence maximization. Existing techniques come with two major drawbacks. First, they require committing to a single fairness measure. Second, these measures are typically imposed as strict constraints leading to undesirable properties such as wastage of resources. To address these shortcomings , we provide a principled characterization of the properties that a fair influence maximization algorithm should satisfy. In particular, we propose a framework based on social welfare theory, wherein the cardinal utilities derived by each community are aggregated using the isoelastic social welfare functions. Under this framework, the trade-off between fairness and efficiency can be controlled by a single inequality aversion design parameter. We then show under what circumstances our proposed principles can be satisfied by a welfare function. The resulting optimization problem is monotone and submodular and can be solved efficiently with optimality guarantees. Our framework encompasses as special cases leximin and proportional fairness. Extensive experiments on synthetic and real world datasets including a case study on landslide risk management demonstrate the efficacy of the proposed framework .", "edit_actions": [{"type": "R", "before": "social interventions (e.g., suicide and HIV prevention )", "after": "behavioral, social, and public health interventions, such as suicide/HIV prevention or community preparedness against natural disasters,", "start_char_pos": 8, "end_char_pos": 64}, {"type": "R", "before": "influencers (or peer leaders)", "after": "\"peer leaders\" or \"influencers\"", "start_char_pos": 214, "end_char_pos": 243}, {"type": "R", "before": "Traditional", "after": "Yet, traditional", "start_char_pos": 267, "end_char_pos": 278}, {"type": "R", "before": "social", "after": "these", "start_char_pos": 345, "end_char_pos": 351}, {"type": "A", "before": null, "after": "come with two major drawbacks. First, they", "start_char_pos": 564, "end_char_pos": 564}, {"type": "D", "before": "domain-specific", "after": null, "start_char_pos": 596, "end_char_pos": 611}, {"type": "R", "before": "This makes it hard for a decision maker to meaningfully compare these notions and their resulting trade-offs across different applications. We", "after": "Second, these measures are typically imposed as strict constraints leading to undesirable properties such as wastage of resources. To", "start_char_pos": 630, "end_char_pos": 772}, {"type": "R", "before": "by extending the principles of cardinal welfare to the influence maximization setting, which is underlain by complex connections between members of different communities. We generalize the theory regarding these principles and", "after": ", we provide a principled characterization of the properties that a fair influence maximization algorithm should satisfy. In particular, we propose a framework based on social welfare theory, wherein the cardinal utilities derived by each community are aggregated using the isoelastic social welfare functions. Under this framework, the trade-off between fairness and efficiency can be controlled by a single inequality aversion design parameter. We then", "start_char_pos": 800, "end_char_pos": 1026}, {"type": "R", "before": "these", "after": "our proposed", "start_char_pos": 1057, "end_char_pos": 1062}, {"type": "R", "before": "We then propose a family of welfare functions that are governed by a single inequity aversion parameter which allows a decision maker to study task-dependent trade-offs between fairness and total influence and effectively trade off quantities like influence gap by varying this parameter. We use these welfare functions as a fairness notion to rule out undesirable allocations. We show that the", "after": "The", "start_char_pos": 1114, "end_char_pos": 1508}, {"type": "A", "before": null, "after": "efficiently", "start_char_pos": 1585, "end_char_pos": 1585}, {"type": "R", "before": "Finally, we carry out a detailed experimental analysis", "after": "Our framework encompasses as special cases leximin and proportional fairness. Extensive experiments", "start_char_pos": 1614, "end_char_pos": 1668}, {"type": "R", "before": "social networks and should that high welfare can be achieved without sacrificing the total influence significantly. Interestingly we can show there exists welfare functions that empirically satisfy all of the principles", "after": "world datasets including a case study on landslide risk management demonstrate the efficacy of the proposed framework", "start_char_pos": 1691, "end_char_pos": 1910}], "sents_char_pos": [0, 122, 266, 374, 483, 543, 629, 769, 970, 1113, 1402, 1491, 1613, 1806]}
+{"doc_id": "2006.09542", "revision_depth": "1", "before_revision": "Groups of enterprises can guarantee each other and form complex networks to obtain loans from commercial banks. During economic slowdown period, the corporate default may spread like a virus and lead to large-scale defaults or even systemic financial crises. To help the financial regulatory authorities and banks manage the risk brought by the networked loans, we identified the default contagion risk as a pivotal issue to take preventive measures, and develop iConVis, an interactive visual analysis tool , to facilitate the closed-loop analysis process. A novel financial metric - contagion effectis formulated to quantify the infectious consequence of the guarantee chains in the network. Based on the metric, we design and implement a serial of novel and coordinated views to address the analysis the financial problem . Experts evaluated the system using real-world financial data. The proposed approach grants them the ability to overturn the previous ad hoc analysis methodology and extends the coverage of the conventional Capital Accord in the banking industry.", "after_revision": "Groups of enterprises can serve as guarantees for one another and form complex networks when obtaining loans from commercial banks. During economic slowdowns, corporate default may spread like a virus and lead to large-scale defaults or even systemic financial crises. To help financial regulatory authorities and banks manage the risk associated with networked loans, we identified the default contagion risk , a pivotal issue in developing preventive measures, and established iConVis, an interactive visual analysis tool that facilitates the closed-loop analysis process. A novel financial metric , the contagion effect, was formulated to quantify the infectious consequences of guarantee chains in this type of network. Based on this metric, we designed and implement a series of novel and coordinated views that address the analysis of financial problems . Experts evaluated the system using real-world financial data. The proposed approach grants practitioners the ability to avoid previous ad hoc analysis methodologies and extend coverage of the conventional Capital Accord to the banking industry.", "edit_actions": [{"type": "R", "before": "guarantee each other", "after": "serve as guarantees for one another", "start_char_pos": 26, "end_char_pos": 46}, {"type": "R", "before": "to obtain", "after": "when obtaining", "start_char_pos": 73, "end_char_pos": 82}, {"type": "R", "before": "slowdown period, the", "after": "slowdowns,", "start_char_pos": 128, "end_char_pos": 148}, {"type": "D", "before": "the", "after": null, "start_char_pos": 267, "end_char_pos": 270}, {"type": "R", "before": "brought by the", "after": "associated with", "start_char_pos": 330, "end_char_pos": 344}, {"type": "R", "before": "as", "after": ",", "start_char_pos": 403, "end_char_pos": 405}, {"type": "R", "before": "to take", "after": "in developing", "start_char_pos": 422, "end_char_pos": 429}, {"type": "R", "before": "develop", "after": "established", "start_char_pos": 455, "end_char_pos": 462}, {"type": "R", "before": ", to facilitate", "after": "that facilitates", "start_char_pos": 508, "end_char_pos": 523}, {"type": "R", "before": "- contagion effectis", "after": ", the contagion effect, was", "start_char_pos": 583, "end_char_pos": 603}, {"type": "R", "before": "consequence of the", "after": "consequences of", "start_char_pos": 642, "end_char_pos": 660}, {"type": "R", "before": "the", "after": "this type of", "start_char_pos": 681, "end_char_pos": 684}, {"type": "R", "before": "the", "after": "this", "start_char_pos": 703, "end_char_pos": 706}, {"type": "R", "before": "design", "after": "designed", "start_char_pos": 718, "end_char_pos": 724}, {"type": "R", "before": "serial", "after": "series", "start_char_pos": 741, "end_char_pos": 747}, {"type": "R", "before": "to", "after": "that", "start_char_pos": 779, "end_char_pos": 781}, {"type": "R", "before": "the financial problem", "after": "of financial problems", "start_char_pos": 803, "end_char_pos": 824}, {"type": "R", "before": "them", "after": "practitioners", "start_char_pos": 918, "end_char_pos": 922}, {"type": "R", "before": "overturn the", "after": "avoid", "start_char_pos": 938, "end_char_pos": 950}, {"type": "R", "before": "methodology and extends the", "after": "methodologies and extend", "start_char_pos": 976, "end_char_pos": 1003}, {"type": "R", "before": "in", "after": "to", "start_char_pos": 1048, "end_char_pos": 1050}], "sents_char_pos": [0, 111, 258, 557, 693, 888]}
+{"doc_id": "2006.09627", "revision_depth": "1", "before_revision": "In low-resource natural language processing (NLP), the key problem is a lack of training data in the target language . Cross-lingual methods have had notable success in addressing this concern , but in certain common circumstances, such as insufficient pre-training corpora or languages far from the source language, their performance suffers. In this work we propose an alternative approach to building low-resource Named Entity Recognition (NER) models using \" non-speaker \" (NS) annotations, provided by annotators with no prior experience in the target language. We recruit 30 participants to annotate unfamiliar languages in a carefully controlled annotation experiment , using Indonesian, Russian, and Hindi as target languages. Our results show that use of non-speaker annotators produces results that approach or match performance of fluent speakers. NS results are also consistently on par or better than cross-lingual methods built on modern contextual representations, and have the potential to further outperform with additional effort. We conclude with observations of common annotation practices and recommendations for maximizing non-speaker annotator performance.", "after_revision": "In low-resource natural language processing (NLP), the key problems are a lack of target language training data, and a lack of native speakers to create it . Cross-lingual methods have had notable success in addressing these concerns , but in certain common circumstances, such as insufficient pre-training corpora or languages far from the source language, their performance suffers. In this work we propose a complementary approach to building low-resource Named Entity Recognition (NER) models using `` non-speaker '' (NS) annotations, provided by annotators with no prior experience in the target language. We recruit 30 participants in a carefully controlled annotation experiment with Indonesian, Russian, and Hindi . We show that use of NS annotators produces results that are consistently on par or better than cross-lingual methods built on modern contextual representations, and have the potential to outperform with additional effort. We conclude with observations of common annotation patterns and recommended implementation practices, and motivate how NS annotations can be used in addition to prior methods for improved performance. For more details, URL/page/publication_view/941", "edit_actions": [{"type": "R", "before": "problem is", "after": "problems are", "start_char_pos": 59, "end_char_pos": 69}, {"type": "R", "before": "training data in the target language", "after": "target language training data, and a lack of native speakers to create it", "start_char_pos": 80, "end_char_pos": 116}, {"type": "R", "before": "this concern", "after": "these concerns", "start_char_pos": 180, "end_char_pos": 192}, {"type": "R", "before": "an alternative", "after": "a complementary", "start_char_pos": 368, "end_char_pos": 382}, {"type": "R", "before": "\"", "after": "``", "start_char_pos": 461, "end_char_pos": 462}, {"type": "R", "before": "\"", "after": "''", "start_char_pos": 475, "end_char_pos": 476}, {"type": "D", "before": "to annotate unfamiliar languages", "after": null, "start_char_pos": 594, "end_char_pos": 626}, {"type": "R", "before": ", using", "after": "with", "start_char_pos": 675, "end_char_pos": 682}, {"type": "R", "before": "as target languages. Our results", "after": ". We", "start_char_pos": 714, "end_char_pos": 746}, {"type": "R", "before": "non-speaker", "after": "NS", "start_char_pos": 764, "end_char_pos": 775}, {"type": "R", "before": "approach or match performance of fluent speakers. NS results are also", "after": "are", "start_char_pos": 809, "end_char_pos": 878}, {"type": "D", "before": "further", "after": null, "start_char_pos": 1006, "end_char_pos": 1013}, {"type": "R", "before": "practices and recommendations for maximizing non-speaker annotator performance.", "after": "patterns and recommended implementation practices, and motivate how NS annotations can be used in addition to prior methods for improved performance. For more details, URL/page/publication_view/941", "start_char_pos": 1100, "end_char_pos": 1179}], "sents_char_pos": [0, 118, 343, 566, 734, 858, 1048]}
+{"doc_id": "2006.12212", "revision_depth": "2", "before_revision": "Recent work showed that the initial COVID-19 data from China followed a subexponential power-law increase in the number of confirmed cases. This was attributed to a combination of effective containment and mitigation measures employed as well as behaviorial changes by the population. In view of this , we performed a Monte Carlo random walk study to better understand proximity-based infectious disease spread, particularly under restrictions. Our model is found to be rather robust and reproduces the observed power-law growth without relying on any external parameters. Three\\langle \\rangle growth regimes (quadratic, power-law and exponential) emerge naturally from our simulations. These\\langle \\rangle\\lesssim \\langle \\rangle results suggest that the early containment of the disease within China was close to optimal and could not have been significantly improved upon . We show that reasonable agreement with other data can be attained by incorporating small-world-like connections in the simulations. The prescribed model and its generalizations might be useful for future strategies in the midst of the present pandemic .", "after_revision": "Recent analysis of COVID-19 data from China showed that the number of confirmed cases followed a subexponential power-law increase , with a growth exponent of around 2.2. The power-law behavior was attributed to a combination of effective containment and mitigation measures employed as well as behavioral changes by the population. In this work, we report a random walk Monte Carlo simulation study of proximity-based infection spread. Social distancing is incorporated in the simulations through a single parameter, the size of each step in the random walk process. The step size l is taken to be a multiple of\\langle r\\rangle, which is the average separation between individuals. Three temporal growth regimes (quadratic, intermediate power-law and exponential) are shown to emerge naturally from our simulations. For l =\\langle r\\rangle, we get intermediate power-law growth exponents that are in general agreement with available data from China. On the other hand, we obtain a quadratic growth for smaller step sizes l\\lesssim \\langle r\\rangle/2 , while for large l the growth is found to be exponential. Together with available data, these results suggest that the early containment of the disease within China was close to optimal . We further performed a comparative case study of data from three other countries, India, Brazil and South Africa . We show that reasonable agreement with these data can be obtained by incorporating small-world-like connections in our simulations .", "edit_actions": [{"type": "R", "before": "work showed that the initial", "after": "analysis of", "start_char_pos": 7, "end_char_pos": 35}, {"type": "A", "before": null, "after": "showed that the number of confirmed cases", "start_char_pos": 61, "end_char_pos": 61}, {"type": "R", "before": "in the number of confirmed cases. This", "after": ", with a growth exponent of around 2.2. The power-law behavior", "start_char_pos": 107, "end_char_pos": 145}, {"type": "R", "before": "behaviorial", "after": "behavioral", "start_char_pos": 247, "end_char_pos": 258}, {"type": "R", "before": "view of this , we performed a Monte Carlo random walk study to better understand", "after": "this work, we report a random walk Monte Carlo simulation study of", "start_char_pos": 289, "end_char_pos": 369}, {"type": "R", "before": "infectious disease spread, particularly under restrictions. Our model is found to be rather robust and reproduces the observed power-law growth without relying on any external parameters. Three", "after": "infection spread. Social distancing is incorporated in the simulations through a single parameter, the size of each step in the random walk process. The step size l is taken to be a multiple of", "start_char_pos": 386, "end_char_pos": 579}, {"type": "A", "before": null, "after": "r", "start_char_pos": 587, "end_char_pos": 587}, {"type": "A", "before": null, "after": ", which is the average separation between individuals. Three temporal", "start_char_pos": 594, "end_char_pos": 594}, {"type": "A", "before": null, "after": "intermediate", "start_char_pos": 622, "end_char_pos": 622}, {"type": "A", "before": null, "after": "are shown to", "start_char_pos": 650, "end_char_pos": 650}, {"type": "R", "before": "These", "after": "For l =", "start_char_pos": 690, "end_char_pos": 695}, {"type": "A", "before": null, "after": "r", "start_char_pos": 703, "end_char_pos": 703}, {"type": "A", "before": null, "after": ", we get intermediate power-law growth exponents that are in general agreement with available data from China. On the other hand, we obtain a quadratic growth for smaller step sizes l", "start_char_pos": 710, "end_char_pos": 710}, {"type": "A", "before": null, "after": "r", "start_char_pos": 727, "end_char_pos": 727}, {"type": "A", "before": null, "after": "/2 , while for large l the growth is found to be exponential. Together with available data, these", "start_char_pos": 734, "end_char_pos": 734}, {"type": "R", "before": "and could not have been significantly improved upon", "after": ". We further performed a comparative case study of data from three other countries, India, Brazil and South Africa", "start_char_pos": 827, "end_char_pos": 878}, {"type": "R", "before": "other", "after": "these", "start_char_pos": 920, "end_char_pos": 925}, {"type": "R", "before": "attained", "after": "obtained", "start_char_pos": 938, "end_char_pos": 946}, {"type": "R", "before": "the simulations. The prescribed model and its generalizations might be useful for future strategies in the midst of the present pandemic", "after": "our simulations", "start_char_pos": 996, "end_char_pos": 1132}], "sents_char_pos": [0, 140, 285, 445, 573, 689, 880, 1012]}
+{"doc_id": "2006.12231", "revision_depth": "1", "before_revision": "A new network with super approximation power is introduced. This network is built with Floor (\\lfloor x\\rfloor) and ReLU (\\max\\{0,x\\}) activation functions and hence we call such networks as Floor-ReLU networks. It is shown by construction^+ and L\\inN^+,}} that Floor-ReLU networks with width \\max\\{d,\\, 5N+13\\} and depth 64dL+3 can pointwise approximate a Lipschitz continuous } function f on [0,1]^d with an exponential approximation rate 3 \\mu\\sqrt{d\\,N} ^{- \\sqrt{L}}, where \\mu is the Lipschitz constantof f. { More generally for an arbitrary continuous function f on [0,1]^d with a modulus of continuity \\omega_f(\\cdot), the constructive approximation rate is \\omega_f(\\sqrt{d}\\,N^{-\\sqrt{L}})+2\\omega_f(\\sqrt{d}){N^{-\\sqrt{L}}}. As a consequence, this new network overcomes the curse of dimensionality in approximation power since this approximation order is\\le } essentially \\sqrt{d} times a function of N and L independent of d .", "after_revision": "A new network with super approximation power is introduced. This network is built with Floor (\\lfloor x\\rfloor) or ReLU (\\max\\{0,x\\}) activation function in each neuron and hence we call such networks as Floor-ReLU networks. For any hyper-parameters N\\in\\mathbb{N^+ and L\\inN^+,}} it is shown that Floor-ReLU networks with width \\max\\{d,\\, 5N+13\\} and depth 64dL+3 can uniformly approximate a H \\\"o}lder function f on [0,1]^d with an approximation rate 3 \\,N} \\lambda d^{\\alpha/2 ^{- \\alpha \\sqrt{L}}, where \\alpha \\in(0,1 and \\lambda are the H{\\\"o lder order and constant, respectively. More generally for an arbitrary continuous function f on [0,1]^d with a modulus of continuity \\omega_f(\\cdot), the constructive approximation rate is \\omega_f(\\sqrt{d}\\,N^{-\\sqrt{L}})+2\\omega_f(\\sqrt{d}){N^{-\\sqrt{L}}}. As a consequence, this new class of networks overcome the curse of dimensionality in approximation power when the variation of \\omega_f(r) as r\\rightarrow 0 is moderate (e.g., \\omega_f(r)\\le r^\\alpha for H \\\"o}lder continuous functions), since the major term to be concerned in our approximation rate is essentially \\sqrt{d} times a function of N and L independent of d within the modulus of continuity.", "edit_actions": [{"type": "R", "before": "and", "after": "or", "start_char_pos": 112, "end_char_pos": 115}, {"type": "R", "before": "functions", "after": "function in each neuron", "start_char_pos": 146, "end_char_pos": 155}, {"type": "R", "before": "It is shown by construction", "after": "For any hyper-parameters N\\in\\mathbb{N", "start_char_pos": 212, "end_char_pos": 239}, {"type": "A", "before": null, "after": "it is shown", "start_char_pos": 257, "end_char_pos": 257}, {"type": "R", "before": "pointwise approximate a Lipschitz continuous", "after": "uniformly approximate a H", "start_char_pos": 334, "end_char_pos": 378}, {"type": "A", "before": null, "after": "\\\"o", "start_char_pos": 379, "end_char_pos": 379}, {"type": "A", "before": null, "after": "lder", "start_char_pos": 380, "end_char_pos": 380}, {"type": "D", "before": "exponential", "after": null, "start_char_pos": 411, "end_char_pos": 422}, {"type": "D", "before": "\\mu\\sqrt{d", "after": null, "start_char_pos": 444, "end_char_pos": 454}, {"type": "A", "before": null, "after": "\\lambda d^{\\alpha/2", "start_char_pos": 459, "end_char_pos": 459}, {"type": "A", "before": null, "after": "\\alpha", "start_char_pos": 464, "end_char_pos": 464}, {"type": "R", "before": "\\mu is the Lipschitz constantof f.", "after": "\\alpha \\in(0,1", "start_char_pos": 482, "end_char_pos": 516}, {"type": "A", "before": null, "after": "and \\lambda are the H", "start_char_pos": 517, "end_char_pos": 517}, {"type": "A", "before": null, "after": "\\\"o", "start_char_pos": 518, "end_char_pos": 518}, {"type": "A", "before": null, "after": "lder order and constant, respectively.", "start_char_pos": 519, "end_char_pos": 519}, {"type": "R", "before": "network overcomes", "after": "class of networks", "start_char_pos": 767, "end_char_pos": 784}, {"type": "A", "before": null, "after": "overcome", "start_char_pos": 785, "end_char_pos": 785}, {"type": "R", "before": "since this approximation order is", "after": "when the variation of \\omega_f(r) as r\\rightarrow 0 is moderate (e.g., \\omega_f(r)", "start_char_pos": 837, "end_char_pos": 870}, {"type": "A", "before": null, "after": "r^\\alpha for H", "start_char_pos": 874, "end_char_pos": 874}, {"type": "A", "before": null, "after": "\\\"o", "start_char_pos": 875, "end_char_pos": 875}, {"type": "A", "before": null, "after": "lder continuous functions), since the major term to be concerned in our approximation rate is", "start_char_pos": 876, "end_char_pos": 876}, {"type": "R", "before": ".", "after": "within the modulus of continuity.", "start_char_pos": 943, "end_char_pos": 944}], "sents_char_pos": [0, 59, 211, 254, 739]}
+{"doc_id": "2006.13844", "revision_depth": "1", "before_revision": "In this paper, we focus on structure-preserving model order reduction (SPMOR) of the second-order system using the Iterative Rational Krylov Algorithm (IRKA). In general, the standard IRKA can be used to the second-order structure system by converting the system into an equivalent first-order form . In this case, the reduced model can not preserve the structure of the second-order form which is however necessary for further manipulation. Here we develop IRKA based algorithm which enables us to generate a reduced second-order system without explicitly converting the system into a first-order form. A challenging task in IRKA is to select a set of better interpolation points and the tangential directions . To overcome these problems, this paper discusses how to select a set of good interpolation points and the tangential directions by an internal formulation. Also, this paper talks out the \\mathcal{H system. The theoretical results are experimented by applying them to several sets of data of large-scale dynamical systems. Numerical results are discussed to show the applicability and efficiency of the proposed techniques .", "after_revision": "In this paper, we focus on the efficient techniques to estimate the \\mathcal{H (SPMOR) of the second-order systems using the Iterative Rational Krylov Algorithm (IRKA). In general, the classical IRKA can be applied to the second-order system by converting it into an equivalent first-order form and get the reduced model in a first-order form . In this case, the reduced model can not preserve the structure of the second-order system which is however necessary for further manipulation. Here we develop IRKA based algorithms that enable us to generate approximate reduced second-order systems without explicitly converting the systems into a first-order form. On the other hand, there are very challenging tasks to find reduced-order form of a large-scale system with a minimized \\mathcal{H . To overcome these problems, this paper discusses competent techniques to determine the optimal \\mathcal{H system. The efficiency and applicability of the proposed techniques are validated by applying them to several large-scale dynamical systems. The computation is done numerically and the achieved results are discussed in both tabular and graphical approaches .", "edit_actions": [{"type": "R", "before": "structure-preserving model order reduction", "after": "the efficient techniques to estimate the \\mathcal{H", "start_char_pos": 27, "end_char_pos": 69}, {"type": "R", "before": "system", "after": "systems", "start_char_pos": 98, "end_char_pos": 104}, {"type": "R", "before": "standard", "after": "classical", "start_char_pos": 175, "end_char_pos": 183}, {"type": "R", "before": "used", "after": "applied", "start_char_pos": 196, "end_char_pos": 200}, {"type": "D", "before": "structure", "after": null, "start_char_pos": 221, "end_char_pos": 230}, {"type": "R", "before": "the system", "after": "it", "start_char_pos": 252, "end_char_pos": 262}, {"type": "A", "before": null, "after": "and get the reduced model in a first-order form", "start_char_pos": 299, "end_char_pos": 299}, {"type": "R", "before": "form", "after": "system", "start_char_pos": 385, "end_char_pos": 389}, {"type": "R", "before": "algorithm which enables", "after": "algorithms that enable", "start_char_pos": 470, "end_char_pos": 493}, {"type": "R", "before": "a", "after": "approximate", "start_char_pos": 509, "end_char_pos": 510}, {"type": "R", "before": "system", "after": "systems", "start_char_pos": 532, "end_char_pos": 538}, {"type": "R", "before": "system", "after": "systems", "start_char_pos": 573, "end_char_pos": 579}, {"type": "R", "before": "A challenging task in IRKA is to select a set of better interpolation points and the tangential directions", "after": "On the other hand, there are very challenging tasks to find reduced-order form of a large-scale system with a minimized \\mathcal{H", "start_char_pos": 605, "end_char_pos": 711}, {"type": "R", "before": "how to select a set of good interpolation points and the tangential directions by an internal formulation. Also, this paper talks out the \\mathcal{H", "after": "competent techniques to determine the optimal \\mathcal{H", "start_char_pos": 763, "end_char_pos": 911}, {"type": "R", "before": "theoretical results are experimented", "after": "efficiency and applicability of the proposed techniques are validated", "start_char_pos": 924, "end_char_pos": 960}, {"type": "D", "before": "sets of data of", "after": null, "start_char_pos": 989, "end_char_pos": 1004}, {"type": "R", "before": "Numerical", "after": "The computation is done numerically and the achieved", "start_char_pos": 1036, "end_char_pos": 1045}, {"type": "R", "before": "to show the applicability and efficiency of the proposed techniques", "after": "in both tabular and graphical approaches", "start_char_pos": 1068, "end_char_pos": 1135}], "sents_char_pos": [0, 158, 301, 442, 604, 713, 869, 919, 1035]}
+{"doc_id": "2006.13844", "revision_depth": "2", "before_revision": "In this paper , we focus on the efficient techniques to estimate the H_2 optimal Structure-Preserving Model Order Reduction (SPMOR) of the second-order systems using the Iterative Rational Krylov Algorithm (IRKA). In general , the classical IRKA can be applied to the second-order system by converting it into an equivalent first-order form and get the reduced model in a first-order form. In this case, the reduced model can not preserve the structure of the second-order system which is however necessary for further manipulation. Here we develop IRKA based algorithms that enable us to generate approximate reduced second-order systems without explicitly converting the systems into a first-order form . On the other hand, there are very challenging tasks to find reduced-order form of a large-scale system with a minimized \\mathcal{H}_2 error norm and attain the rapid rate of convergence. To overcome these problems, this paper discusses competent techniques to determine the optimal \\mathcal{H}_2 error norm efficiently for the second-order system. The efficiency and applicability of the proposed techniques are validated by applying them to several large-scale dynamical systems . The computation is done numerically and the achieved results are discussed in both tabular and graphical approaches.", "after_revision": "This paper focuses on exploring efficient ways to find H_2 optimal Structure-Preserving Model Order Reduction (SPMOR) of the second-order systems via interpolatory projection-based method Iterative Rational Krylov Algorithm (IRKA). To get the reduced models of the second-order systems , the classical IRKA deals with the equivalent first-order converted forms and estimates the first-order reduced models. The drawbacks of that of the technique are failure of structure preservation and abolishing the properties of the original models, which are the key factors for some of the physical applications. To surpass those issues, we introduce IRKA based techniques that enable us to approximate the second-order systems through the reduced models implicitly without forming the first-order forms . On the other hand, there are very challenging tasks to the Model Order Reduction (MOR) of the large-scale second-order systems with the optimal \\mathcal{H}_2 error norm and attain the rapid rate of convergence. For the convenient computations, we discuss competent techniques to determine the optimal \\mathcal{H}_2 error norms efficiently for the second-order systems. The applicability and efficiency of the proposed techniques are validated by applying them to some large-scale systems extracted form engineering applications. The computations are done numerically using MATLAB simulation and the achieved results are discussed in both tabular and graphical approaches.", "edit_actions": [{"type": "R", "before": "In this paper , we focus on the efficient techniques to estimate the", "after": "This paper focuses on exploring efficient ways to find", "start_char_pos": 0, "end_char_pos": 68}, {"type": "R", "before": "using the", "after": "via interpolatory projection-based method", "start_char_pos": 160, "end_char_pos": 169}, {"type": "R", "before": "In general", "after": "To get the reduced models of the second-order systems", "start_char_pos": 214, "end_char_pos": 224}, {"type": "R", "before": "can be applied to the second-order system by converting it into an", "after": "deals with the", "start_char_pos": 246, "end_char_pos": 312}, {"type": "R", "before": "form and get the reduced model in a", "after": "converted forms and estimates the", "start_char_pos": 336, "end_char_pos": 371}, {"type": "R", "before": "form. In this case, the reduced model can not preserve the structure of the second-order system which is however necessary for further manipulation. Here we develop IRKA based algorithms", "after": "reduced models. The drawbacks of that of the technique are failure of structure preservation and abolishing the properties of the original models, which are the key factors for some of the physical applications. To surpass those issues, we introduce IRKA based techniques", "start_char_pos": 384, "end_char_pos": 570}, {"type": "R", "before": "generate approximate reduced", "after": "approximate the", "start_char_pos": 589, "end_char_pos": 617}, {"type": "R", "before": "without explicitly converting the systems into a", "after": "through the reduced models implicitly without forming the", "start_char_pos": 639, "end_char_pos": 687}, {"type": "R", "before": "form", "after": "forms", "start_char_pos": 700, "end_char_pos": 704}, {"type": "R", "before": "find reduced-order form of a", "after": "the Model Order Reduction (MOR) of the", "start_char_pos": 762, "end_char_pos": 790}, {"type": "R", "before": "system with a minimized", "after": "second-order systems with the optimal", "start_char_pos": 803, "end_char_pos": 826}, {"type": "R", "before": "To overcome these problems, this paper discusses", "after": "For the convenient computations, we discuss", "start_char_pos": 894, "end_char_pos": 942}, {"type": "R", "before": "norm", "after": "norms", "start_char_pos": 1009, "end_char_pos": 1013}, {"type": "R", "before": "system. The efficiency and applicability", "after": "systems. The applicability and efficiency", "start_char_pos": 1047, "end_char_pos": 1087}, {"type": "R", "before": "several", "after": "some", "start_char_pos": 1149, "end_char_pos": 1156}, {"type": "R", "before": "dynamical systems . The computation is done numerically", "after": "systems extracted form engineering applications. The computations are done numerically using MATLAB simulation", "start_char_pos": 1169, "end_char_pos": 1224}], "sents_char_pos": [0, 213, 389, 532, 706, 893, 1054, 1188]}
+{"doc_id": "2006.14499", "revision_depth": "1", "before_revision": "The relationship between a pandemic and the concurrent economy is quite comparable to the relation observed among health and wealth in general. Since 25th March 2020, India has been under a nation-wide lockdown . This work attempts to examine the effect of COVID-19 on the foreign exchange rates and stock market performances of India using secondary data over a span of 48 days . The study explores whether the causal relationships among the growth rate of confirmed cases ( GrowthC ), exchange rate (GEX) and SENSEX value (GSENSEX) are remaining the same across different pre and post-lockdown phases, attempting to capture any potential changes over time via the Vector Auto Regressive (VAR) models. A positive correlation is found between the growth rate of confirmed cases and the growth rate of exchange rate, and a negative correlation between the growth rate of confirmed cases and the growth rate of SENSEX value. A naive interpretation from this could be that with the rising growth rate of the number of confirmed cases, the economy took a toll, reflected by the Indian currency being depreciated while the stock exchange index suffered from a fall. However, on applying a VAR model, it is observed that an increase in the confirmed COVID-19 cases causes no significant change in the values of the exchange rate and SENSEX index. The result varies if the analysis is split across different time periods - before lockdown, first phase of lockdownand extension of lockdown. To compare the three periods, we had undertaken five rounds of analyses . Nuanced and sensible interpretations of the numeric results indicate significant variability across time in terms of the relation between the variables of interest. This detailed knowledge about the varying patterns of dependence could potentially help the policy makers and investors of India in order to develop their policies to cope up the situation.", "after_revision": "Since March 25, 2020, India had been under a nation-wide lockdown announced as a response to the spread of SARS-CoV-2 and COVID-19 and has resorted to a process of 'unlocking' the lockdown over the past couple of months . This work attempts to examine the effect of novel coronavirus 2019 ( COVID-19 ) and its resulting disease, the COVID-19, on the foreign exchange rates and stock market performances of India using secondary data over a span of 112 days spanning between March 11 and June 30, 2020. The study explores whether the causal relationships and directions among the growth rate of confirmed cases ( GROWTHC ), exchange rate (GEX) and SENSEX value (GSENSEX) are remaining the same across different pre and post-lockdown phases, attempting to capture any potential changes over time via the vector autoregressive (VAR) models. A positive correlation is found between the growth rate of confirmed cases and the growth rate of exchange rate, and a negative correlation between the growth rate of confirmed cases and the growth rate of SENSEX value. However, on applying a vector autoregressive (VAR) model, it is observed that an increase in the confirmed COVID-19 cases causes no significant change in the values of the exchange rate and SENSEX index. The result varies if the analysis is split across different time periods - before lockdown, the four phases of lockdown, and the first phase of unlock . Nuanced and sensible interpretations of the numeric results indicate significant variability across time in terms of the relation between the variables of interest. The detailed knowledge about the varying patterns of dependence could potentially help the policy makers and investors of India in order to develop their strategies to cope up with the situation.", "edit_actions": [{"type": "R", "before": "The relationship between a pandemic and the concurrent economy is quite comparable to the relation observed among health and wealth in general. Since 25th March", "after": "Since March 25,", "start_char_pos": 0, "end_char_pos": 160}, {"type": "R", "before": "has", "after": "had", "start_char_pos": 173, "end_char_pos": 176}, {"type": "A", "before": null, "after": "announced as a response to the spread of SARS-CoV-2 and COVID-19 and has resorted to a process of 'unlocking' the lockdown over the past couple of months", "start_char_pos": 211, "end_char_pos": 211}, {"type": "A", "before": null, "after": "novel coronavirus 2019 (", "start_char_pos": 258, "end_char_pos": 258}, {"type": "A", "before": null, "after": ") and its resulting disease, the COVID-19,", "start_char_pos": 268, "end_char_pos": 268}, {"type": "R", "before": "48 days .", "after": "112 days spanning between March 11 and June 30, 2020.", "start_char_pos": 374, "end_char_pos": 383}, {"type": "A", "before": null, "after": "and directions", "start_char_pos": 436, "end_char_pos": 436}, {"type": "R", "before": "GrowthC", "after": "GROWTHC", "start_char_pos": 480, "end_char_pos": 487}, {"type": "R", "before": "Vector Auto Regressive", "after": "vector autoregressive", "start_char_pos": 670, "end_char_pos": 692}, {"type": "D", "before": "A naive interpretation from this could be that with the rising growth rate of the number of confirmed cases, the economy took a toll, reflected by the Indian currency being depreciated while the stock exchange index suffered from a fall.", "after": null, "start_char_pos": 927, "end_char_pos": 1164}, {"type": "R", "before": "VAR", "after": "vector autoregressive (VAR)", "start_char_pos": 1188, "end_char_pos": 1191}, {"type": "R", "before": "first phase of lockdownand extension of lockdown. To compare the three periods, we had undertaken five rounds of analyses", "after": "the four phases of lockdown, and the first phase of unlock", "start_char_pos": 1437, "end_char_pos": 1558}, {"type": "R", "before": "This", "after": "The", "start_char_pos": 1726, "end_char_pos": 1730}, {"type": "R", "before": "policies", "after": "strategies", "start_char_pos": 1881, "end_char_pos": 1889}, {"type": "A", "before": null, "after": "with", "start_char_pos": 1901, "end_char_pos": 1901}], "sents_char_pos": [0, 143, 213, 383, 706, 926, 1164, 1344, 1486, 1725]}
+{"doc_id": "2006.14779", "revision_depth": "1", "before_revision": "URLanizations are pairing humans with AI systems to improve decision-making and reducing costs. Proponents of human-centered AI argue that team performance can even further improve when the AI model explains its recommendations. However, a careful analysis of existing literature reveals that prior studies observed improvements due to explanations only when the AI, alone, outperformed both the human and the best human-AI team. This raises an important question: can explanations lead to complementary performance, i.e., with accuracy higher than both the human and the AI working alone? We address this question by devising comprehensive studies on human-AI teaming, where participants solve a task with help from an AI system without explanations and from one with varying types of AI explanation support. We carefully controlled to ensure comparable human and AI accuracy across experiments on three NLP datasets (two for sentiment analysis and one for question answering ). While we found complementary improvements from AI augmentation, they were not increased by state-of-the-art explanationscompared to simpler strategies, such as displaying the AI's confidence. We show that explanations increase the chance that humans will accept the AI's recommendation regardless of whether the AI is correct. While this clarifies the gains in team performance from explanations in prior work, it poses new challenges for human-centered AI: how can we best design systems to produce complementary performance? Can we develop explanatory approaches that help humans decide whether and when to trust AI input ?", "after_revision": "Many researchers motivate explainable AI with studies showing that human-AI team performance on decision-making tasks improves when the AI explains its recommendations. However, prior studies observed improvements from explanations only when the AI, alone, outperformed both the human and the best team. Can explanations help lead to complementary performance, where team accuracy is higher than either the human or the AI working solo? We conduct mixed-method user studies on three datasets, where an AI with accuracy comparable to humans helps participants solve a task (explaining itself in some conditions ). While we observed complementary improvements from AI augmentation, they were not increased by explanations. Rather, explanations increased the chance that humans will accept the AI's recommendation , regardless of its correctness. Our result poses new challenges for human-centered AI: Can we develop explanatory approaches that encourage appropriate trust in AI, and therefore help generate (or improve) complementary performance ?", "edit_actions": [{"type": "R", "before": "URLanizations are pairing humans with AI systems to improve", "after": "Many researchers motivate explainable AI with studies showing that human-AI team performance on", "start_char_pos": 0, "end_char_pos": 59}, {"type": "R", "before": "and reducing costs. Proponents of human-centered AI argue that team performance can even further improve", "after": "tasks improves", "start_char_pos": 76, "end_char_pos": 180}, {"type": "D", "before": "model", "after": null, "start_char_pos": 193, "end_char_pos": 198}, {"type": "D", "before": "a careful analysis of existing literature reveals that", "after": null, "start_char_pos": 238, "end_char_pos": 292}, {"type": "R", "before": "due to", "after": "from", "start_char_pos": 329, "end_char_pos": 335}, {"type": "R", "before": "human-AI team. This raises an important question: can explanations", "after": "team. Can explanations help", "start_char_pos": 415, "end_char_pos": 481}, {"type": "R", "before": "i.e., with accuracy higher than both the human and", "after": "where team accuracy is higher than either the human or", "start_char_pos": 517, "end_char_pos": 567}, {"type": "R", "before": "alone? We address this question by devising comprehensive studies on human-AI teaming, where participants solve a task with help from an AI system without explanations and from one with varying types of AI explanation support. We carefully controlled to ensure comparable human and AI accuracy across experiments on three NLP datasets (two for sentiment analysis and one for question answering", "after": "solo? We conduct mixed-method user studies on three datasets, where an AI with accuracy comparable to humans helps participants solve a task (explaining itself in some conditions", "start_char_pos": 583, "end_char_pos": 976}, {"type": "R", "before": "found", "after": "observed", "start_char_pos": 989, "end_char_pos": 994}, {"type": "R", "before": "state-of-the-art explanationscompared to simpler strategies, such as displaying the AI's confidence. We show that explanations increase", "after": "explanations. Rather, explanations increased", "start_char_pos": 1071, "end_char_pos": 1206}, {"type": "R", "before": "regardless of whether the AI is correct. While this clarifies the gains in team performance from explanations in prior work, it", "after": ", regardless of its correctness. Our result", "start_char_pos": 1266, "end_char_pos": 1393}, {"type": "D", "before": "how can we best design systems to produce complementary performance?", "after": null, "start_char_pos": 1438, "end_char_pos": 1506}, {"type": "R", "before": "help humans decide whether and when to trust AI input", "after": "encourage appropriate trust in AI, and therefore help generate (or improve) complementary performance", "start_char_pos": 1550, "end_char_pos": 1603}], "sents_char_pos": [0, 95, 228, 429, 589, 809, 979, 1171, 1306, 1506]}
+{"doc_id": "2006.15583", "revision_depth": "1", "before_revision": "We discuss a stochastic model to assess cumulative excess deaths during Covid-19-like epidemics for various non-pharmaceutic interventions. The model simulates three interrelated stochastic processes: epidemic spreading, availability of respiratory ventilators and changes in death statistics. Epidemic may spread either locally or globally. The local mode simulates virus transmission through contacts in the vicinity of the place of residence while the global mode simulates virus transmission through social mixing in public places , sport arenas, airports, etc , where many people meet, who live in remote geographic locations. Epidemic is modelled as a discrete time stochastic process on random geometric networks. In the simulations we assume that the basic reproduction number is R_0= 2.5 and the infectious period lasts ca. ten days. We also assume that the virus leads to severe acute respiratory syndrome in about one percent of cases, which in turn almost surely lead to respiratory default and death, unless the patient receives an appropriate medical treatment supported by respiratory ventilation. For other parameters , like mortality rate or the number of respiratory ventilators per million of inhabitants, we take values typical for developed countries. We simulate populations of 10^5-10^6 people. We compare different strategies: do-nothing , social distancing , reduction of social mixingand lockdown, assuming that there is no vaccine and no efficient medicine . The results of the simulations show that strategies that slow down the spread of epidemic too much are inefficient in reducing the cumulative excess of deaths . A hybrid strategy in which lockdown is in place for some time and is then completely released is inefficient as well .", "after_revision": "We develop an agent-based model to assess the cumulative number of deaths during hypothetical Covid-19-like epidemics for various non-pharmaceutical intervention strategies. We consider local and non-local modes of disease transmission. The first simulates transmission through social contacts in the vicinity of the place of residence while the second through social contacts in public places : schools, hospitals , airports, etc . , where many people meet, who live in remote geographic locations. Epidemic spreading is modeled as a discrete-time stochastic process on random geometric networks. We use the Monte-Carlo method in the simulations. The~following assumptions are made. The basic reproduction number is 2.5 and the infectious period lasts approximately ten days. Infections lead to SARS in about one percent of cases, which are likely to lead to respiratory default and death, unless the patient receives an appropriate medical treatment . The~healthcare system capacity is simulated by the availability of respiratory ventilators or intensive care beds. Some parameters of the model , like mortality rates or the number of respiratory ventilators per 100000 inhabitants, are chosen to simulate the real values for the USA and Poland. In the simulations we compare ` do-nothing ' strategy with mitigation strategies based on social distancing and reducing social mixing. We study epidemics in the pre-vaccine era, where immunity is obtained only by infection. The model applies only to epidemics for which reinfections are rare and can be neglected . The results of the simulations show that strategies that slow the development of an epidemic too much in the early stages do not significantly reduce the overall number of deaths in the long term, but increase the duration of the epidemic. In particular, a~hybrid strategy where lockdown is held for some time and is then completely released , is inefficient .", "edit_actions": [{"type": "R", "before": "discuss a stochastic", "after": "develop an agent-based", "start_char_pos": 3, "end_char_pos": 23}, {"type": "R", "before": "cumulative excess deaths during", "after": "the cumulative number of deaths during hypothetical", "start_char_pos": 40, "end_char_pos": 71}, {"type": "R", "before": "non-pharmaceutic interventions. The model simulates three interrelated stochastic processes: epidemic spreading, availability of respiratory ventilators and changes in death statistics. Epidemic may spread either locally or globally. The local mode simulates virus transmission through", "after": "non-pharmaceutical intervention strategies. We consider local and non-local modes of disease transmission. The first simulates transmission through social", "start_char_pos": 108, "end_char_pos": 393}, {"type": "R", "before": "global mode simulates virus transmission through social mixing", "after": "second through social contacts", "start_char_pos": 455, "end_char_pos": 517}, {"type": "A", "before": null, "after": ": schools, hospitals", "start_char_pos": 535, "end_char_pos": 535}, {"type": "D", "before": "sport arenas,", "after": null, "start_char_pos": 538, "end_char_pos": 551}, {"type": "A", "before": null, "after": ".", "start_char_pos": 566, "end_char_pos": 566}, {"type": "R", "before": "is modelled as a discrete time", "after": "spreading is modeled as a discrete-time", "start_char_pos": 643, "end_char_pos": 673}, {"type": "R", "before": "In the simulations we assume that the", "after": "We use the Monte-Carlo method in the simulations. The~following assumptions are made. The", "start_char_pos": 723, "end_char_pos": 760}, {"type": "D", "before": "R_0=", "after": null, "start_char_pos": 790, "end_char_pos": 794}, {"type": "R", "before": "ca.", "after": "approximately", "start_char_pos": 831, "end_char_pos": 834}, {"type": "R", "before": "We also assume that the virus leads to severe acute respiratory syndrome", "after": "Infections lead to SARS", "start_char_pos": 845, "end_char_pos": 917}, {"type": "R", "before": "in turn almost surely", "after": "are likely to", "start_char_pos": 955, "end_char_pos": 976}, {"type": "R", "before": "supported by respiratory ventilation. For other parameters", "after": ". The~healthcare system capacity is simulated by the availability of respiratory ventilators or intensive care beds. Some parameters of the model", "start_char_pos": 1077, "end_char_pos": 1135}, {"type": "R", "before": "rate", "after": "rates", "start_char_pos": 1153, "end_char_pos": 1157}, {"type": "R", "before": "million of inhabitants, we take values typical for developed countries. We simulate populations of 10^5-10^6 people. We compare different strategies:", "after": "100000 inhabitants, are chosen to simulate the real values for the USA and Poland. In the simulations we compare `", "start_char_pos": 1203, "end_char_pos": 1352}, {"type": "R", "before": ", social distancing , reduction of social mixingand lockdown, assuming that there is no vaccine and no efficient medicine", "after": "' strategy with mitigation strategies based on social distancing and reducing social mixing. We study epidemics in the pre-vaccine era, where immunity is obtained only by infection. The model applies only to epidemics for which reinfections are rare and can be neglected", "start_char_pos": 1364, "end_char_pos": 1485}, {"type": "R", "before": "down the spread of", "after": "the development of an", "start_char_pos": 1550, "end_char_pos": 1568}, {"type": "R", "before": "are inefficient in reducing the cumulative excess of deaths . A hybrid strategy in which lockdown is in place", "after": "in the early stages do not significantly reduce the overall number of deaths in the long term, but increase the duration of the epidemic. In particular, a~hybrid strategy where lockdown is held", "start_char_pos": 1587, "end_char_pos": 1696}, {"type": "R", "before": "is inefficient as well", "after": ", is inefficient", "start_char_pos": 1743, "end_char_pos": 1765}], "sents_char_pos": [0, 139, 293, 341, 633, 722, 844, 1114, 1274, 1319, 1487, 1648]}
+{"doc_id": "2006.15595", "revision_depth": "2", "before_revision": "How to explicitly encode positional information into neural networks is important in learning the representation of natural languages, such as BERT. Based on the Transformer architecture, the positional information is simply encoded as embedding vectors, which are used in the input layer, or encoded as a bias term in the self-attention module. In this work, we investigate the problems in the previous formulations and propose a new positional encoding method for BERT called Transformer with Untied Positional Encoding (TUPE). Different from all other works, TUPE only uses the word embedding as input. In the self-attention module, the word contextual correlation and positional correlation are computed separately with different parameterizations and then added together. This design removes the addition over heterogeneous embeddings in the input, which may potentially bring randomness, and gives more expressiveness to characterize the relationship between words/positions by using different projection matrices. Furthermore, TUPE unties the CLS \\texttt{[ symbol from other positions to provide it with a more specific role to capture the global representation of the sentence . Extensive experiments and ablation studies on GLUE benchmark demonstrate the effectiveness and efficiency of the proposed method : TUPE outperforms several baselines on almost all tasks by a large margin. In particular, it can achieve a higher score than baselines while only using 30\\% pre-training computational costs. We release our code at URL", "after_revision": "In this work, we investigate the positional encoding methods used in language pre-training (e.g., BERT) and identify several problems in the existing formulations. First, we show that in the absolute positional encoding, the addition operation applied on positional embeddings and word embeddings brings mixed correlations between the two heterogeneous information resources. It may bring unnecessary randomness in the attention and further limit the expressiveness of the model. Second, we question whether treating the position of the symbol CLS] the same as other words is a reasonable design, considering its special role (the representation of the entire sentence) in the downstream tasks. Motivated from above analysis, we propose a new positional encoding method calledTransformer withUntiedPositionalEncoding (TUPE). In the self-attention module, TUPE computes the word contextual correlation and positional correlation separately with different parameterizations and then adds them together. This design removes the mixed and noisy correlations over heterogeneous embeddings and offers more expressiveness by using different projection matrices. Furthermore, TUPE unties the \\texttt{[CLS symbol from other positions , making it easier to capture information from all positions . Extensive experiments and ablation studies on GLUE benchmark demonstrate the effectiveness of the proposed method . Codes and models are released at URL", "edit_actions": [{"type": "R", "before": "How to explicitly encode positional information into neural networks is important in learning the representation of natural languages, such as BERT. Based on the Transformer architecture, the positional information is simply encoded as embedding vectors, which are used in the input layer, or encoded as a bias term in the self-attention module. In this work, we investigate the problems in the previous formulations and", "after": "In this work, we investigate the positional encoding methods used in language pre-training (e.g., BERT) and identify several problems in the existing formulations. First, we show that in the absolute positional encoding, the addition operation applied on positional embeddings and word embeddings brings mixed correlations between the two heterogeneous information resources. It may bring unnecessary randomness in the attention and further limit the expressiveness of the model. Second, we question whether treating the position of the symbol", "start_char_pos": 0, "end_char_pos": 420}, {"type": "A", "before": null, "after": "CLS]", "start_char_pos": 421, "end_char_pos": 421}, {"type": "A", "before": null, "after": "the same as other words is a reasonable design, considering its special role (the representation of the entire sentence) in the downstream tasks. Motivated from above analysis, we", "start_char_pos": 422, "end_char_pos": 422}, {"type": "R", "before": "for BERT called Transformer with Untied Positional Encoding", "after": "called", "start_char_pos": 464, "end_char_pos": 523}, {"type": "A", "before": null, "after": "T", "start_char_pos": 523, "end_char_pos": 523}, {"type": "A", "before": null, "after": "ransformer with", "start_char_pos": 523, "end_char_pos": 523}, {"type": "A", "before": null, "after": "U", "start_char_pos": 523, "end_char_pos": 523}, {"type": "A", "before": null, "after": "ntied", "start_char_pos": 523, "end_char_pos": 523}, {"type": "A", "before": null, "after": "P", "start_char_pos": 523, "end_char_pos": 523}, {"type": "A", "before": null, "after": "ositional", "start_char_pos": 523, "end_char_pos": 523}, {"type": "A", "before": null, "after": "E", "start_char_pos": 523, "end_char_pos": 523}, {"type": "A", "before": null, "after": "ncoding", "start_char_pos": 523, "end_char_pos": 523}, {"type": "D", "before": "Different from all other works, TUPE only uses the word embedding as input.", "after": null, "start_char_pos": 532, "end_char_pos": 607}, {"type": "A", "before": null, "after": "TUPE computes", "start_char_pos": 638, "end_char_pos": 638}, {"type": "D", "before": "are computed", "after": null, "start_char_pos": 698, "end_char_pos": 710}, {"type": "R", "before": "added", "after": "adds them", "start_char_pos": 764, "end_char_pos": 769}, {"type": "R", "before": "addition", "after": "mixed and noisy correlations", "start_char_pos": 804, "end_char_pos": 812}, {"type": "R", "before": "in the input, which may potentially bring randomness, and gives more expressiveness to characterize the relationship between words/positions", "after": "and offers more expressiveness", "start_char_pos": 843, "end_char_pos": 983}, {"type": "D", "before": "CLS", "after": null, "start_char_pos": 1053, "end_char_pos": 1056}, {"type": "A", "before": null, "after": "CLS", "start_char_pos": 1066, "end_char_pos": 1066}, {"type": "R", "before": "to provide it with a more specific role to capture the global representation of the sentence", "after": ", making it easier to capture information from all positions", "start_char_pos": 1095, "end_char_pos": 1187}, {"type": "D", "before": "and efficiency", "after": null, "start_char_pos": 1281, "end_char_pos": 1295}, {"type": "R", "before": ": TUPE outperforms several baselines on almost all tasks by a large margin. In particular, it can achieve a higher score than baselines while only using 30\\% pre-training computational costs. We release our code", "after": ". Codes and models are released", "start_char_pos": 1319, "end_char_pos": 1530}], "sents_char_pos": [0, 148, 345, 531, 607, 779, 1023, 1394, 1510]}
+{"doc_id": "2006.15969", "revision_depth": "1", "before_revision": "Deep learning shows high potential for many medical image analysis tasks. Neural networks work with full-size data without extensive preprocessing and feature generation and, thus, information loss. Recent work has shown that morphological difference between specific brain regions can be found on MRI with deep learning techniques. We consider the pattern recognition task based on a large open-access dataset of healthy subjects - an exploration of brain differences between men and women . However, interpretation of the lately proposed models is based on a region of interest and can not be extended to pixel or voxel-wise image interpretation , which is considered to be more informative . In this paper, we confirm the previous findings in sex differences from diffusion-tensor imaging on T1 weighted brain MRI scans. We compare the results of three voxel-based 3D CNN interpretation methods: Meaningful Perturbations, GradCam and Guided Backpropagation and provide the open-source code .", "after_revision": "Deep learning shows high potential for many medical image analysis tasks. Neural networks can work with full-size data without extensive preprocessing and feature generation and, thus, information loss. Recent work has shown that the morphological difference in specific brain regions can be found on MRI with the means of Convolution Neural Networks (CNN) . However, interpretation of the existing models is based on a region of interest and can not be extended to voxel-wise image interpretation on a whole image. In the current work, we consider the classification task on a large-scale open-source dataset of young healthy subjects -- an exploration of brain differences between men and women . In this paper, we extend the previous findings in gender differences from diffusion-tensor imaging on T1 brain MRI scans. We provide the voxel-wise 3D CNN interpretation comparing the results of three interpretation methods: Meaningful Perturbations, Grad CAM and Guided Backpropagation , and contribute with the open-source library .", "edit_actions": [{"type": "A", "before": null, "after": "can", "start_char_pos": 90, "end_char_pos": 90}, {"type": "R", "before": "morphological difference between", "after": "the morphological difference in", "start_char_pos": 227, "end_char_pos": 259}, {"type": "R", "before": "deep learning techniques. We consider the pattern recognition task based on a large open-access dataset of healthy subjects - an exploration of brain differences between men and women", "after": "the means of Convolution Neural Networks (CNN)", "start_char_pos": 308, "end_char_pos": 491}, {"type": "R", "before": "lately proposed", "after": "existing", "start_char_pos": 525, "end_char_pos": 540}, {"type": "D", "before": "pixel or", "after": null, "start_char_pos": 608, "end_char_pos": 616}, {"type": "R", "before": ", which is considered to be more informative", "after": "on a whole image. In the current work, we consider the classification task on a large-scale open-source dataset of young healthy subjects -- an exploration of brain differences between men and women", "start_char_pos": 649, "end_char_pos": 693}, {"type": "R", "before": "confirm", "after": "extend", "start_char_pos": 714, "end_char_pos": 721}, {"type": "R", "before": "sex", "after": "gender", "start_char_pos": 747, "end_char_pos": 750}, {"type": "D", "before": "weighted", "after": null, "start_char_pos": 799, "end_char_pos": 807}, {"type": "R", "before": "compare the", "after": "provide the voxel-wise 3D CNN interpretation comparing the", "start_char_pos": 828, "end_char_pos": 839}, {"type": "D", "before": "voxel-based 3D CNN", "after": null, "start_char_pos": 857, "end_char_pos": 875}, {"type": "R", "before": "GradCam", "after": "Grad CAM", "start_char_pos": 926, "end_char_pos": 933}, {"type": "R", "before": "and provide", "after": ", and contribute with", "start_char_pos": 961, "end_char_pos": 972}, {"type": "R", "before": "code", "after": "library", "start_char_pos": 989, "end_char_pos": 993}], "sents_char_pos": [0, 73, 199, 333, 493, 695, 824]}
+{"doc_id": "2006.16651", "revision_depth": "1", "before_revision": "Given an orthogonal polygon with orthogonal holes, we devise a dynamic algorithm for guarding with vertex guards\\cal \\cal , i.e., whenever orthogonal polygon is modified,\\cal \\cal algorithm updates the set of vertex guards and their positions for guarding the modified orthogonal polygon\\cal \\cal . Our algorithm modifies the guard placement locally while ensuring the updated orthogonal polygon with h holes and n vertices , is guarded using at most \\lfloor (n+2h)/4 \\rfloor vertex guards. The algorithm to update vertex guards after any modification to the polygon takes O(k \\lg{(n+ n') time. Here, n' and n are the number of vertices of the orthogonal polygon before and after the update, respectively; and, k is the sum of the number of vertices added to or removed from the orthogonal polygon, the number of cuts in the L-shaped partitioning of the free space of the orthogonal polygon that got affected due to the update, and the number of channels affected due to the update. For the special case of the initial orthogonal polygon being hole-free, and each update resulting in a hole-free orthogonal polygon, our dynamic guard updating algorithmtakes O(k\\lg{(n+n')) worst-case time. Initially, we preprocess the input orthogonal polygon with q vertices in O(q \\lg{q}) time to construct data structures of size O(q\\frac{\\lg{q}}{\\lg\\lg{q}})} .", "after_revision": "We devise an algorithm for surveying a dynamic orthogonal polygonal domain\\cal P by placing one guard at each vertex in a subset of vertices of\\cal P , i.e., whenever an orthogonal polygon domain\\cal P' is modified to result in another orthogonal polygonal domain\\cal P, our algorithm updates the set of (vertex) guards surveying\\cal P' so that the updated guard set surveys\\cal P . Our algorithm modifies the guard placement in O(k \\lg{(n+n') while ensuring the updated orthogonal polygon with h holes and n vertices is guarded using at most \\lfloor (n+2h)/4 \\rfloor vertex guards. For the special case of the initial orthogonal polygon being hole-free and each update resulting in a hole-free orthogonal polygon, our guard updation algorithm takes O(k \\lg{(n+n') time. Here, n' and n are the number of vertices of the orthogonal polygon before and after the update, respectively; and, k is the sum of |n - n'| and the number of ) worst-case time. Initially, we preprocess the input orthogonal polygon with q vertices in O(q \\lg{q}) time to construct data structures of size O(q\\frac{\\lg{q}}{\\lg\\lg{q}})} updates in a few structures maintained by our algorithm .", "edit_actions": [{"type": "R", "before": "Given an orthogonal polygon with orthogonal holes, we devise a dynamic algorithm for guarding with vertex guards", "after": "We devise an algorithm for surveying a dynamic orthogonal polygonal domain", "start_char_pos": 0, "end_char_pos": 112}, {"type": "A", "before": null, "after": "P by placing one guard at each vertex in a subset of vertices of", "start_char_pos": 117, "end_char_pos": 117}, {"type": "A", "before": null, "after": "P", "start_char_pos": 122, "end_char_pos": 122}, {"type": "R", "before": "orthogonal polygon is modified,", "after": "an orthogonal polygon domain", "start_char_pos": 140, "end_char_pos": 171}, {"type": "A", "before": null, "after": "P' is modified to result in another orthogonal polygonal domain", "start_char_pos": 176, "end_char_pos": 176}, {"type": "A", "before": null, "after": "P, our", "start_char_pos": 181, "end_char_pos": 181}, {"type": "R", "before": "vertex guards and their positions for guarding the modified orthogonal polygon", "after": "(vertex) guards surveying", "start_char_pos": 211, "end_char_pos": 289}, {"type": "A", "before": null, "after": "P' so that the updated guard set surveys", "start_char_pos": 294, "end_char_pos": 294}, {"type": "A", "before": null, "after": "P", "start_char_pos": 299, "end_char_pos": 299}, {"type": "R", "before": "locally", "after": "in O(k \\lg{(n+n')", "start_char_pos": 345, "end_char_pos": 352}, {"type": "D", "before": ",", "after": null, "start_char_pos": 427, "end_char_pos": 428}, {"type": "R", "before": "The algorithm to update vertex guards after any modification to the polygon", "after": "For the special case of the initial orthogonal polygon being hole-free and each update resulting in a hole-free orthogonal polygon, our guard updation algorithm", "start_char_pos": 494, "end_char_pos": 569}, {"type": "R", "before": "\\lg{(n+ n')", "after": "\\lg{(n+n')", "start_char_pos": 580, "end_char_pos": 591}, {"type": "R", "before": "the number of vertices added to or removed from the orthogonal polygon, the number of cuts in the L-shaped partitioning of the free space of the orthogonal polygon that got affected due to the update,", "after": "|n - n'|", "start_char_pos": 730, "end_char_pos": 930}, {"type": "D", "before": "channels affected due to the update. For the special case of the initial orthogonal polygon being hole-free, and each update resulting in a hole-free orthogonal polygon, our dynamic guard updating algorithmtakes O(k\\lg{(n+n')", "after": null, "start_char_pos": 949, "end_char_pos": 1174}, {"type": "A", "before": null, "after": "updates in a few structures maintained by our algorithm", "start_char_pos": 1350, "end_char_pos": 1350}], "sents_char_pos": [0, 301, 493, 597, 708, 985, 1192]}
+{"doc_id": "2007.00217", "revision_depth": "1", "before_revision": "Biomedical question answering (QA) is a challenging problem due to the scarcity of data and the requirement of domain expertise. Growing interests of using pre-trained language models with transfer learning address the issue to some extent . Recently, learning linguistic knowledge of entailment in sentence pairs enhances the performance in general domain QAby leveraging such transferability between the two tasks . In this paper, we focus on facilitating the transferability by unifying the experimental setup from natural language inference (NLI) to biomedical QA. We observe that transferring from entailment data shows effective performance on Yes/No (+5.59\\%), Factoid (+0.53\\%), List (+13.58\\%) type questions compared to previous challenge reports (BioASQ 7B Phase B). We also observe that our method generally performs well in the 8th BioASQ Challenge (Phase B). For sequential transfer learning, the order of how tasks are fine-tuned is important. In factoid- and list-type questions, we thoroughly analyze an intrinsic limitation of the extractive QA setting when these questions are converted to the same format of the Stanford Question Answering Dataset (SQuAD).", "after_revision": "Biomedical question answering (QA) is a challenging task due to the scarcity of data and the requirement of domain expertise. Pre-trained language models have been used to address these issues . Recently, learning relationships between sentence pairs has been proved to improve performance in general QA . In this paper, we focus on applying BioBERT to transfer the knowledge of natural language inference (NLI) to biomedical QA. We observe that BioBERT trained on the NLI dataset obtains better performance on Yes/No (+5.59\\%), Factoid (+0.53\\%), List type (+13.58\\%) questions compared to performance obtained in a previous challenge (BioASQ 7B Phase B). We present a sequential transfer learning method that significantly performed well in the 8th BioASQ Challenge (Phase B). In sequential transfer learning, the order in which tasks are fine-tuned is important. We measure an unanswerable rate of the extractive QA setting when the formats of factoid and list type questions are converted to the format of the Stanford Question Answering Dataset (SQuAD).", "edit_actions": [{"type": "R", "before": "problem", "after": "task", "start_char_pos": 52, "end_char_pos": 59}, {"type": "R", "before": "Growing interests of using pre-trained language models with transfer learning address the issue to some extent", "after": "Pre-trained language models have been used to address these issues", "start_char_pos": 129, "end_char_pos": 239}, {"type": "R", "before": "linguistic knowledge of entailment in sentence pairs enhances the", "after": "relationships between sentence pairs has been proved to improve", "start_char_pos": 261, "end_char_pos": 326}, {"type": "R", "before": "domain QAby leveraging such transferability between the two tasks", "after": "QA", "start_char_pos": 350, "end_char_pos": 415}, {"type": "R", "before": "facilitating the transferability by unifying the experimental setup from", "after": "applying BioBERT to transfer the knowledge of", "start_char_pos": 445, "end_char_pos": 517}, {"type": "R", "before": "transferring from entailment data shows effective", "after": "BioBERT trained on the NLI dataset obtains better", "start_char_pos": 585, "end_char_pos": 634}, {"type": "A", "before": null, "after": "type", "start_char_pos": 692, "end_char_pos": 692}, {"type": "D", "before": "type", "after": null, "start_char_pos": 704, "end_char_pos": 708}, {"type": "R", "before": "previous challenge reports", "after": "performance obtained in a previous challenge", "start_char_pos": 731, "end_char_pos": 757}, {"type": "R", "before": "also observe that our method generally performs", "after": "present a sequential transfer learning method that significantly performed", "start_char_pos": 782, "end_char_pos": 829}, {"type": "R", "before": "For", "after": "In", "start_char_pos": 874, "end_char_pos": 877}, {"type": "R", "before": "of how", "after": "in which", "start_char_pos": 918, "end_char_pos": 924}, {"type": "R", "before": "In factoid- and list-type questions, we thoroughly analyze an intrinsic limitation", "after": "We measure an unanswerable rate", "start_char_pos": 960, "end_char_pos": 1042}, {"type": "R", "before": "these", "after": "the formats of factoid and list type", "start_char_pos": 1077, "end_char_pos": 1082}, {"type": "D", "before": "same", "after": null, "start_char_pos": 1114, "end_char_pos": 1118}], "sents_char_pos": [0, 128, 417, 568, 778, 873, 959]}
+{"doc_id": "2007.01363", "revision_depth": "1", "before_revision": "The adaptive immune system in vertebrates consists of highly diverse immune receptors to mount specific responses against a multitude of pathogens. A central feature of the adaptive immune system is the ability to form a memory to act more efficiently in future encounters with similar pathogens . However, memory formation especially in B-cells is one of the least understood cell fate decisions in the immune system . Here, we present a framework to characterize optimal strategies to store memory in order to maximize the utility of immune response to counter evolving pathogens throughout URLanism's lifetime. To do so, we have incorporated the kinetics and energetics of memory response as ingredients of non-equilibrium decision-making between an adaptive exploration to mount a specific and novel response or exploitation of existing memory that can be activated rapidly yet with a reduced specificity against evolved pathogens. To achieve a long-term benefit for the host, we show that memory generation should be actively regulated and dependent on immune receptors ' affinity, with a preference for cross-reactive receptors with a moderate affinity against pathogens as opposed to high affinity receptors -- a recipe that is consistent with recent experimental findings 1,2 . Moreover, we show that the specificity of memory should depend on URLanism's lifespan, and URLanisms with fewer pathogenic encounters throughout their lifetime should store more cross-reactive memory. Overall, our framework provides a baseline to gauge the efficacy of immune memory formation in light of URLanism's coevolutionary history with pathogens.", "after_revision": "The adaptive immune system provides a diverse set of molecules that can mount specific responses against a multitude of pathogens. Memory is a key feature of adaptive immunity, which URLanisms to respond more readily upon re-infections . However, differentiation of memory cells is still one of the least understood cell fate decisions . Here, we introduce a mathematical framework to characterize optimal strategies to store memory to maximize the utility of immune response over URLanism's lifetime. We show that memory production should be actively regulated to balance between affinity and cross-reactivity of immune receptors for an effective protection against evolving pathogens . Moreover, we predict that specificity of memory should depend on URLanism's lifespan, and URLanisms with fewer pathogenic encounters should store more cross-reactive memory. Our framework provides a baseline to gauge the efficacy of immune memory in light of URLanism's coevolutionary history with pathogens.", "edit_actions": [{"type": "R", "before": "in vertebrates consists of highly diverse immune receptors to", "after": "provides a diverse set of molecules that can", "start_char_pos": 27, "end_char_pos": 88}, {"type": "R", "before": "A central feature of the adaptive immune system is the ability to form a memory to act more efficiently in future encounters with similar pathogens", "after": "Memory is a key feature of adaptive immunity, which URLanisms to respond more readily upon re-infections", "start_char_pos": 148, "end_char_pos": 295}, {"type": "R", "before": "memory formation especially in B-cells is", "after": "differentiation of memory cells is still", "start_char_pos": 307, "end_char_pos": 348}, {"type": "D", "before": "in the immune system", "after": null, "start_char_pos": 397, "end_char_pos": 417}, {"type": "R", "before": "present a", "after": "introduce a mathematical", "start_char_pos": 429, "end_char_pos": 438}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 500, "end_char_pos": 508}, {"type": "R", "before": "to counter evolving pathogens throughout", "after": "over", "start_char_pos": 552, "end_char_pos": 592}, {"type": "R", "before": "To do so, we have incorporated the kinetics and energetics of memory response as ingredients of non-equilibrium decision-making between an adaptive exploration to mount a specific and novel response or exploitation of existing memory that can be activated rapidly yet with a reduced specificity against evolved pathogens. To achieve a long-term benefit for the host, we", "after": "We", "start_char_pos": 614, "end_char_pos": 983}, {"type": "R", "before": "generation", "after": "production", "start_char_pos": 1001, "end_char_pos": 1011}, {"type": "D", "before": "and dependent on immune receptors ' affinity, with a preference for cross-reactive receptors with a moderate affinity against pathogens as opposed to high affinity receptors -- a recipe that is consistent with recent experimental findings", "after": null, "start_char_pos": 1041, "end_char_pos": 1279}, {"type": "R", "before": "1,2", "after": "to balance between affinity and cross-reactivity of immune receptors for an effective protection against evolving pathogens", "start_char_pos": 1280, "end_char_pos": 1283}, {"type": "R", "before": "show that the", "after": "predict that", "start_char_pos": 1299, "end_char_pos": 1312}, {"type": "D", "before": "throughout their lifetime", "after": null, "start_char_pos": 1420, "end_char_pos": 1445}, {"type": "R", "before": "Overall, our", "after": "Our", "start_char_pos": 1487, "end_char_pos": 1499}, {"type": "D", "before": "formation", "after": null, "start_char_pos": 1569, "end_char_pos": 1578}], "sents_char_pos": [0, 147, 297, 419, 613, 935, 1216, 1486]}
+{"doc_id": "2007.05348", "revision_depth": "1", "before_revision": "Homeostasis occurs when an observable of a system (such as inner body temperature) remains approximately constant over a range of an external parameter (such as ambient temperature). More precisely, homeostasis refers to a phenomenon whereby the output x_o of a system is approximately constant on variation of an input I. Homeostatic phenomena are ubiquitous in biochemical networks of differential equations and these networks can be abstracted as digraphs G with a fixed input node \\iota and a different fixed output node o . We assume that only the input node depends explicitly on \\mathcal{I x_o(I) . We then study infinitesimal homeostasis : points \\mathcal{I_0 where dx_o{d\\mathcal{I}}(\\mathcal{I}} _0. Stability implies that there is a stable equilibrium X(\\mathcal{I}) for each \\mathcal{I} near \\mathcal{I}_0 and infinitesimal homeostasis occurs at \\mathcal{I}_0 when (dx_o/d\\mathcal{I})(\\mathcal{I}} _0) = 0 by showing that there is a square homeostasis matrix H associated to \\mathcal{G) for which dx_o/d\\mathcal{I} = 0 if and only if } \\det(H) = 0. Applying combinatorial matrix theory and graph theory to H allows us to classify types of homeostasis. We prove that the homeostasis types correspond to a set of irreducible blocks in H each associated with a subnetwork and these subnetworks. Specifically, we prove that each factor corresponds to a subnetwork of \\mathcal{G}. The factors } divide into two classes: structural and appendage. For example, a feedforward loop motif is a structural type whereas a negative feedback loop motif is an appendage type. We give two algorithms for determining a menu of homeostasis types that are possible in \\mathcal{G: one algorithm enumerates the structural types and one enumerates the appendage types. These subnetworks can be read directly from \\mathcal{G} without performing calculations } on model equations .", "after_revision": "Homeostasis refers to a phenomenon whereby the output x_o of a system is approximately constant on variation of an input I. Homeostasis occurs frequently in biochemical networks and in other networks of interacting elements where mathematical models are based on differential equations associated to the network. These networks can be abstracted as digraphs G with a distinguished input node \\iota , a different distinguished output node o , and a number of regulatory nodes \\rho_1,\\ldots,\\rho_n. In these models the input-output map x_o(I) _0 where dx_o{d\\mathcal{I}}(\\mathcal{I}} is defined by a stable equilibrium X_0 at \\mathcal{I_0. Stability implies that there is a stable equilibrium X(\\mathcal{I}) for each \\mathcal{I} near \\mathcal{I}_0 and infinitesimal homeostasis occurs at \\mathcal{I}_0 when (dx_o/d\\mathcal{I})(\\mathcal{I}} _0) = 0. We show that there is an (n+1)\\times(n+1) homeostasis matrix H (\\mathcal{I) for which dx_o/d\\mathcal{I} = 0 if and only if } \\det(H) = 0. We use combinatorial matrix theory to factor the polynomial \\det(H) and thereby determine a menu of different types of possible homeostasis associated with each digraph \\mathcal{G. Specifically, we prove that each factor corresponds to a subnetwork of \\mathcal{G}. The factors } divide into two combinatorially defined classes: structural and appendage. : one algorithm enumerates the structural types and one enumerates the appendage types. These subnetworks can be read directly from \\mathcal{G} without performing calculations } Structural factors correspond to feedforward motifs and appendage factors correspond to feedback motifs. Finally, we discover an algorithm for determining the homeostatic subnetwork motif corresponding to each factor of \\det(H) without performing numerical simulations on model equations . The algorithm allows us to classify low degree factors. There are two types of degree 1 homeostasis (negative feedback loops and kinetic or Haldane motifs) and there are two types of degree 2 homeostasis (feedforward loops and a degree two appendage motif) .", "edit_actions": [{"type": "D", "before": "occurs when an observable of a system (such as inner body temperature) remains approximately constant over a range of an external parameter (such as ambient temperature). More precisely, homeostasis", "after": null, "start_char_pos": 12, "end_char_pos": 210}, {"type": "R", "before": "Homeostatic phenomena are ubiquitous", "after": "Homeostasis occurs frequently", "start_char_pos": 323, "end_char_pos": 359}, {"type": "R", "before": "of differential equations and these", "after": "and in other networks of interacting elements where mathematical models are based on differential equations associated to the network. These", "start_char_pos": 384, "end_char_pos": 419}, {"type": "R", "before": "fixed", "after": "distinguished", "start_char_pos": 468, "end_char_pos": 473}, {"type": "R", "before": "and a different fixed", "after": ", a different distinguished", "start_char_pos": 491, "end_char_pos": 512}, {"type": "R", "before": ". We assume that only the input node depends explicitly on \\mathcal{I", "after": ", and a number of regulatory nodes \\rho_1,\\ldots,\\rho_n. In these models the input-output map", "start_char_pos": 527, "end_char_pos": 596}, {"type": "D", "before": ". We then study infinitesimal homeostasis : points \\mathcal{I", "after": null, "start_char_pos": 604, "end_char_pos": 665}, {"type": "A", "before": null, "after": "is defined by a stable equilibrium X_0 at \\mathcal{I", "start_char_pos": 706, "end_char_pos": 706}, {"type": "R", "before": "0 by showing", "after": "0. We show", "start_char_pos": 916, "end_char_pos": 928}, {"type": "R", "before": "a square", "after": "an (n+1)\\times(n+1)", "start_char_pos": 943, "end_char_pos": 951}, {"type": "R", "before": "associated to \\mathcal{G", "after": "(\\mathcal{I", "start_char_pos": 973, "end_char_pos": 997}, {"type": "R", "before": "Applying", "after": "We use", "start_char_pos": 1061, "end_char_pos": 1069}, {"type": "R", "before": "and graph theory to H allows us to classify types of homeostasis. We prove that the homeostasis types correspond to a set of irreducible blocks in H each associated with a subnetwork and these subnetworks", "after": "to factor the polynomial \\det(H) and thereby determine a menu of different types of possible homeostasis associated with each digraph \\mathcal{G", "start_char_pos": 1098, "end_char_pos": 1302}, {"type": "A", "before": null, "after": "combinatorially defined", "start_char_pos": 1418, "end_char_pos": 1418}, {"type": "D", "before": "For example, a feedforward loop motif is a structural type whereas a negative feedback loop motif is an appendage type. We give two algorithms for determining a menu of homeostasis types that are possible in \\mathcal{G", "after": null, "start_char_pos": 1454, "end_char_pos": 1672}, {"type": "A", "before": null, "after": "Structural factors correspond to feedforward motifs and appendage factors correspond to feedback motifs. Finally, we discover an algorithm for determining the homeostatic subnetwork motif corresponding to each factor of \\det(H) without performing numerical simulations", "start_char_pos": 1850, "end_char_pos": 1850}, {"type": "A", "before": null, "after": ". The algorithm allows us to classify low degree factors. There are two types of degree 1 homeostasis (negative feedback loops and kinetic or Haldane motifs) and there are two types of degree 2 homeostasis (feedforward loops and a degree two appendage motif)", "start_char_pos": 1870, "end_char_pos": 1870}], "sents_char_pos": [0, 182, 647, 777, 1163, 1303, 1387, 1453, 1573, 1759]}
+{"doc_id": "2007.06225", "revision_depth": "2", "before_revision": "Computational biology and bioinformatics provide vast data gold-mines from protein sequences, ideal for Language Models (LMs) taken from Natural Language Processing (NLP) . These LMs reach for new prediction frontiers at low inference costs. Here, we trained two auto-regressive language models (Transformer-XL, XLNet) and two auto-encoder models ( Bert, Albert ) on data from UniRef and BFD containing up to 393 billion amino acids (words) from 2.1 billion protein sequences (22- and 112-times the entire English Wikipedia) . The LMs were trained on the Summit supercomputer at Oak Ridge National Laboratory (ORNL), using 936 nodes (total 5616 GPUs ) and one TPU Pod (V3-512 or V3-1024). We validated the advantage of up-scaling LMs to larger models supported by bigger data by predicting secondary structure ( 3-states: Q3= 76-84, 8-states: Q8=65-73), sub-cellular localization for 10 cellular compartments ( Q10= 74) and whether a protein is membrane-bound or water-soluble ( Q2= 89). Dimensionality reduction revealed that the LM-embeddings from unlabeled data (only protein sequences) captured important biophysical properties governing protein shape. This implied learning some of the grammar of the language of life realized in protein sequences. The successful up-scaling of protein LMs through HPC to larger data sets slightly reduced the gap between models trained on evolutionary information and LMs. The official GitHub repository: URL", "after_revision": "Computational biology and bioinformatics provide vast data gold-mines from protein sequences, ideal for Language Models taken from NLP . These LMs reach for new prediction frontiers at low inference costs. Here, we trained two auto-regressive models (Transformer-XL, XLNet) and four auto-encoder models ( BERT, Albert, Electra, T5 ) on data from UniRef and BFD containing up to 393 billion amino acids . The LMs were trained on the Summit supercomputer using 5616 GPUs and TPU Pod up-to 1024 cores. Dimensionality reduction revealed that the raw protein LM-embeddings from unlabeled data captured some biophysical features of protein sequences. We validated the advantage of using the embeddings as exclusive input for several subsequent tasks. The first was a per-residue prediction of protein secondary structure ( 3-state accuracy Q3= 81\\%-87\\%); the second were per-protein predictions of protein sub-cellular localization (ten-state accuracy: Q10= 81\\%) and membrane vs. water-soluble ( 2-state accuracy Q2= 91\\%). For the per-residue predictions the transfer of the most informative embeddings (ProtT5) for the first time outperformed the state-of-the-art without using evolutionary information thereby bypassing expensive database searches. Taken together, the results implied that protein LMs learned some of the grammar of the language of life . To facilitate future work, we released our models at URL", "edit_actions": [{"type": "R", "before": "(LMs) taken from Natural Language Processing (NLP)", "after": "taken from NLP", "start_char_pos": 120, "end_char_pos": 170}, {"type": "D", "before": "language", "after": null, "start_char_pos": 279, "end_char_pos": 287}, {"type": "R", "before": "two", "after": "four", "start_char_pos": 323, "end_char_pos": 326}, {"type": "R", "before": "Bert, Albert", "after": "BERT, Albert, Electra, T5", "start_char_pos": 349, "end_char_pos": 361}, {"type": "D", "before": "(words) from 2.1 billion protein sequences (22- and 112-times the entire English Wikipedia)", "after": null, "start_char_pos": 433, "end_char_pos": 524}, {"type": "R", "before": "at Oak Ridge National Laboratory (ORNL), using 936 nodes (total", "after": "using", "start_char_pos": 576, "end_char_pos": 639}, {"type": "R", "before": ") and one TPU Pod (V3-512 or V3-1024).", "after": "and TPU Pod up-to 1024 cores. Dimensionality reduction revealed that the raw protein LM-embeddings from unlabeled data captured some biophysical features of protein sequences.", "start_char_pos": 650, "end_char_pos": 688}, {"type": "R", "before": "up-scaling LMs to larger models supported by bigger data by predicting", "after": "using the embeddings as exclusive input for several subsequent tasks. The first was a per-residue prediction of protein", "start_char_pos": 719, "end_char_pos": 789}, {"type": "R", "before": "3-states:", "after": "3-state accuracy", "start_char_pos": 812, "end_char_pos": 821}, {"type": "R", "before": "76-84, 8-states: Q8=65-73),", "after": "81\\%-87\\%); the second were per-protein predictions of protein", "start_char_pos": 826, "end_char_pos": 853}, {"type": "R", "before": "for 10 cellular compartments (", "after": "(ten-state accuracy:", "start_char_pos": 880, "end_char_pos": 910}, {"type": "R", "before": "74) and whether a protein is membrane-bound or", "after": "81\\%) and membrane vs.", "start_char_pos": 916, "end_char_pos": 962}, {"type": "A", "before": null, "after": "2-state accuracy", "start_char_pos": 979, "end_char_pos": 979}, {"type": "R", "before": "89). Dimensionality reduction revealed that the LM-embeddings from unlabeled data (only protein sequences) captured important biophysical properties governing protein shape. This implied learning", "after": "91\\%). For the per-residue predictions the transfer of the most informative embeddings (ProtT5) for the first time outperformed the state-of-the-art without using evolutionary information thereby bypassing expensive database searches. Taken together, the results implied that protein LMs learned", "start_char_pos": 984, "end_char_pos": 1179}, {"type": "R", "before": "realized in protein sequences. The successful up-scaling of protein LMs through HPC to larger data sets slightly reduced the gap between models trained on evolutionary information and LMs. The official GitHub repository:", "after": ". To facilitate future work, we released our models at", "start_char_pos": 1224, "end_char_pos": 1444}], "sents_char_pos": [0, 172, 241, 526, 688, 988, 1157, 1254, 1412]}
+{"doc_id": "2007.06296", "revision_depth": "1", "before_revision": "Among the many aspects that characterize the COVID-19 pandemic, two seem particularly challenging to understand: i), the great geographical differences in the degree of virus contagiousness and lethality which were found in the different phases of the epidemic progression, and , ii) , the potential role of the infected people's blood type in both the virus infectivity and the progression of the disease. Recently, Breiman et al. (2020) presented a hypothesis that could shed some light on i) and ii), specifically, it has been proposed that during the subject-to-subject transfer SARS-CoV-2 conserves on its capsid the erythrocytes' antigens of the source subject , causing a potential immune reaction in a receiving subject which has previously acquired specific antibodies to the source subject antigens. This implies a blood type-dependent infection rate. The strong geographical dependence of the blood type distribution could be, therefore, one of the factors at the origin of i). Here we present an epidemiological deterministic model where the infection rules hypothesized in Breiman et al. (2020) are taken into account . The comparison of the model outcome with exiting worldwide infection progression data seems to support the Breiman et al. (2020) hypothesis .", "after_revision": "Among the many aspects that characterize the COVID-19 pandemic, two seem particularly challenging to understand: (i) the great geographical differences in the degree of virus contagiousness and lethality which were found in the different phases of the epidemic progression, and (ii) the potential role of the infected people's blood type in both the virus infectivity and the progression of the disease. A recent hypothesis could shed some light on both aspects. Specifically, it has been proposed that in the subject-to-subject transfer SARS-CoV-2 conserves on its capsid the erythrocytes' antigens of the source subject . Thus these conserved antigens can potentially cause an immune reaction in a receiving subject that has previously acquired specific antibodies for the source subject antigens. This hypothesis implies a blood type-dependent infection rate. The strong geographical dependence of the blood type distribution could be, therefore, one of the factors at the origin of the observed heterogeneity in the epidemics spread. Here, we present an epidemiological deterministic model where the infection rules based on blood types are taken into account and compare our model outcomes with the exiting worldwide infection progression data . We found an overall good agreement, which strengthens the hypothesis that blood types do play a role in the COVID-19 infection .", "edit_actions": [{"type": "R", "before": "i),", "after": "(i)", "start_char_pos": 113, "end_char_pos": 116}, {"type": "R", "before": ", ii) ,", "after": "(ii)", "start_char_pos": 278, "end_char_pos": 285}, {"type": "R", "before": "Recently, Breiman et al. (2020) presented a hypothesis that", "after": "A recent hypothesis", "start_char_pos": 407, "end_char_pos": 466}, {"type": "R", "before": "i) and ii), specifically,", "after": "both aspects. Specifically,", "start_char_pos": 492, "end_char_pos": 517}, {"type": "R", "before": "during", "after": "in", "start_char_pos": 544, "end_char_pos": 550}, {"type": "R", "before": ", causing a potential", "after": ". Thus these conserved antigens can potentially cause an", "start_char_pos": 667, "end_char_pos": 688}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 728, "end_char_pos": 733}, {"type": "R", "before": "to", "after": "for", "start_char_pos": 778, "end_char_pos": 780}, {"type": "A", "before": null, "after": "hypothesis", "start_char_pos": 815, "end_char_pos": 815}, {"type": "R", "before": "i). Here", "after": "the observed heterogeneity in the epidemics spread. Here,", "start_char_pos": 986, "end_char_pos": 994}, {"type": "R", "before": "hypothesized in Breiman et al. (2020)", "after": "based on blood types", "start_char_pos": 1071, "end_char_pos": 1108}, {"type": "R", "before": ". The comparison of the model outcome with", "after": "and compare our model outcomes with the", "start_char_pos": 1132, "end_char_pos": 1174}, {"type": "R", "before": "seems to support the Breiman et al. (2020) hypothesis", "after": ". We found an overall good agreement, which strengthens the hypothesis that blood types do play a role in the COVID-19 infection", "start_char_pos": 1220, "end_char_pos": 1273}], "sents_char_pos": [0, 406, 809, 862, 989, 1133]}
+{"doc_id": "2007.06954", "revision_depth": "2", "before_revision": "This paper describes a large dataset covering over 63 million coronavirus-related Twitter posts from more than 13 million unique users since 28 January to 1 July 2020. As strong concerns and emotions are expressed in the tweets, we analysed the tweets content using natural language processing techniques and machine-learning based algorithms, and inferred seventeen latent semantic attributes associated with each tweet, including 1) ten attributes indicating the tweet's relevance to ten detected topics, 2) five quantitative attributes indicating the degree of intensity in the valence (i.e., unpleasantness/pleasantness)and emotional intensities across four primary emotions of fear , anger, sadness and joy, and 3) two qualitative attributes indicating the sentiment category and the most dominant emotion category, respectively. To illustrate how the dataset can be used, we present descriptive statistics around the topics, sentiments and emotions attributes and their temporal distributions, and discuss possible usage in communication, psychology, public health, economics and epidemiology research.", "after_revision": "This paper presents a large annotated dataset on public expressions related to the COVID-19 pandemic. Through Twitter's standard search application programming interface, we retrieved over 63 million coronavirus-related public posts from more than 13 million unique users since 28 January to 1 July 2020. Using natural language processing techniques and machine learning based algorithms, we annotated each public tweet with seventeen latent semantic attributes , including: 1) ten binary attributes indicating the tweet's relevance or irrelevance to ten detected topics, 2) five quantitative attributes indicating the degree of intensity of the valence or sentiment (from extremely negative to extremely positive), and the degree of intensity of fear, of anger, of sadness and of joy emotions (from extremely low intensity to extremely high intensity) , and 3) two qualitative attributes indicating the sentiment category and the dominant emotion category, respectively. We report basic descriptive statistics around the topics, sentiments and emotions attributes and their temporal distributions, and discuss its possible usage in communication, psychology, public health, economics and epidemiology research.", "edit_actions": [{"type": "R", "before": "describes a large dataset covering", "after": "presents a large annotated dataset on public expressions related to the COVID-19 pandemic. Through Twitter's standard search application programming interface, we retrieved", "start_char_pos": 11, "end_char_pos": 45}, {"type": "R", "before": "Twitter", "after": "public", "start_char_pos": 82, "end_char_pos": 89}, {"type": "R", "before": "As strong concerns and emotions are expressed in the tweets, we analysed the tweets content using", "after": "Using", "start_char_pos": 168, "end_char_pos": 265}, {"type": "R", "before": "machine-learning", "after": "machine learning", "start_char_pos": 309, "end_char_pos": 325}, {"type": "R", "before": "and inferred", "after": "we annotated each public tweet with", "start_char_pos": 344, "end_char_pos": 356}, {"type": "R", "before": "associated with each tweet, including", "after": ", including:", "start_char_pos": 394, "end_char_pos": 431}, {"type": "A", "before": null, "after": "binary", "start_char_pos": 439, "end_char_pos": 439}, {"type": "A", "before": null, "after": "or irrelevance", "start_char_pos": 484, "end_char_pos": 484}, {"type": "R", "before": "in the valence (i.e., unpleasantness/pleasantness)and emotional intensities across four primary emotions of fear", "after": "of the valence or sentiment (from extremely negative to extremely positive), and the degree of intensity of fear, of anger, of sadness and of joy emotions (from extremely low intensity to extremely high intensity)", "start_char_pos": 576, "end_char_pos": 688}, {"type": "D", "before": "anger, sadness", "after": null, "start_char_pos": 691, "end_char_pos": 705}, {"type": "D", "before": "joy, and", "after": null, "start_char_pos": 710, "end_char_pos": 718}, {"type": "D", "before": "most", "after": null, "start_char_pos": 791, "end_char_pos": 795}, {"type": "R", "before": "To illustrate how the dataset can be used, we present", "after": "We report basic", "start_char_pos": 837, "end_char_pos": 890}, {"type": "A", "before": null, "after": "its", "start_char_pos": 1014, "end_char_pos": 1014}], "sents_char_pos": [0, 167, 434, 836]}
+{"doc_id": "2007.06954", "revision_depth": "3", "before_revision": "This paper presents a large annotated dataset on public expressions related to the COVID-19 pandemic . Through Twitter 's standard search application programming interface , we retrieved over 63 million coronavirus-related public posts from more than 13 million unique users since 28 January to 1 July 2020. Using natural language processing techniques and machine learning based algorithms, we annotated each public tweet with seventeen latent semantic attributes, including : 1 ) ten binary attributes indicating the tweet's relevance or irrelevance to ten detected topics, 2 ) five quantitative attributes indicating the degree of intensity of the valence or sentiment (from extremely negative to extremely positive), and the degree of intensity of fear, of anger, of sadness and of joy emotions (from extremely low intensity to extremely high intensity), and 3 ) two qualitative attributes indicating the sentiment category and the dominant emotion category , respectively . We report basic descriptive statistics around the topics, sentiments and emotions attributes and their temporal distributions, and discuss its possible usage in communication, psychology, public health, economics and epidemiology research.", "after_revision": "This paper presents a large , labelled dataset on people's responses and expressions related to the COVID-19 pandemic over the Twitter platform. From 28 January 2020 to 1 Jan 2021 , we retrieved over 132 million public Twitter posts (i.e., tweets) from more than 20 million unique users using four keywords: \"corona\", \"wuhan\", \"nCov\" and \"covid\". Leveraging natural language processing techniques and pre-trained machine learning-based emotion analytic algorithms, we labelled each tweet with seventeen latent semantic attributes, including a ) ten binary attributes indicating the tweet's relevance or irrelevance to the top ten detected topics, b ) five quantitative emotion intensity attributes indicating the degree of intensity of the valence or sentiment (from extremely negative to extremely positive), and the degree of intensity of fear, of anger, of sadness and of joy emotions (from barely noticeable to extremely high intensity), and c ) two qualitative attributes indicating the sentiment category and the dominant emotion category the tweet is mainly expressing . We report the descriptive statistics around the topic, sentiment and emotion attributes, and their temporal distributions, and discuss the dataset's possible usage in communication, psychology, public health, economics , and epidemiology research.", "edit_actions": [{"type": "R", "before": "annotated dataset on public", "after": ", labelled dataset on people's responses and", "start_char_pos": 28, "end_char_pos": 55}, {"type": "R", "before": ". Through Twitter 's standard search application programming interface", "after": "over the Twitter platform. From 28 January 2020 to 1 Jan 2021", "start_char_pos": 101, "end_char_pos": 171}, {"type": "R", "before": "63 million coronavirus-related public posts", "after": "132 million public Twitter posts (i.e., tweets)", "start_char_pos": 192, "end_char_pos": 235}, {"type": "R", "before": "13", "after": "20", "start_char_pos": 251, "end_char_pos": 253}, {"type": "R", "before": "since 28 January to 1 July 2020. Using", "after": "using four keywords: \"corona\", \"wuhan\", \"nCov\" and \"covid\". Leveraging", "start_char_pos": 275, "end_char_pos": 313}, {"type": "R", "before": "machine learning based", "after": "pre-trained machine learning-based emotion analytic", "start_char_pos": 357, "end_char_pos": 379}, {"type": "R", "before": "annotated each public", "after": "labelled each", "start_char_pos": 395, "end_char_pos": 416}, {"type": "R", "before": ": 1", "after": "a", "start_char_pos": 476, "end_char_pos": 479}, {"type": "A", "before": null, "after": "the top", "start_char_pos": 555, "end_char_pos": 555}, {"type": "R", "before": "2", "after": "b", "start_char_pos": 577, "end_char_pos": 578}, {"type": "A", "before": null, "after": "emotion intensity", "start_char_pos": 599, "end_char_pos": 599}, {"type": "R", "before": "extremely low intensity", "after": "barely noticeable", "start_char_pos": 807, "end_char_pos": 830}, {"type": "R", "before": "3", "after": "c", "start_char_pos": 865, "end_char_pos": 866}, {"type": "R", "before": ", respectively", "after": "the tweet is mainly expressing", "start_char_pos": 964, "end_char_pos": 978}, {"type": "R", "before": "basic", "after": "the", "start_char_pos": 991, "end_char_pos": 996}, {"type": "R", "before": "topics, sentiments and emotions attributes", "after": "topic, sentiment and emotion attributes,", "start_char_pos": 1031, "end_char_pos": 1073}, {"type": "R", "before": "its", "after": "the dataset's", "start_char_pos": 1120, "end_char_pos": 1123}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1194, "end_char_pos": 1194}], "sents_char_pos": [0, 102, 307, 477, 576, 980]}
+{"doc_id": "2007.08051", "revision_depth": "1", "before_revision": " In this paper we study the intrinsic tradeoff between the space complexity of the sketch and its estimation error in the Random Oracle model. We define a new measure of efficiency for cardinality estimators called the Fisher-Shannon ( \\mathsf{Fish ) number H/I. It captures the tension between the limiting Shannon entropy (H) of the sketch and its normalized Fisher information (I), which characterizes (asymptotically) the variance of a statistically efficient estimator. We prove that many variants of the \\mathsf{PCSA Flajolet and Martin have \\mathsf{Fish H_0/I_0 , where H_0,I_0 are two precisely-defined constants, and that all base-q generalizations of (\\textsf{Hyper )\\textsf{LogLog are strictly worse than H_0/I_0, but tend to H_0/I_0 in the limit as q %DIFDELCMD < \\to%%% \\infty. All other known sketches have even worse \\mathsf{Fish-numbers. We introduce a new sketch called \\mathsf{Fishmonger} } that is based on a smoothed, compressed version of \\mathsf{PCSA with a different estimation function. \\mathsf{Fishmonger has \\mathsf{Fish} number H_0/I_0 \\approx 1.98. It stores } ] O(\\log^2\\log U) + ( H_0/I_0)b \\approx 1.98b bits , and estimates cardinalities of multisets of U%DIFDELCMD < ] %%% with a standard error of ( 1 +o(1)) /\\sqrt{b}. \\mathsf{Fishmonger's space-error tradeoff improves on state-of-the-art sketches like }\\textsf{HyperLogLog , or even compressed representations of it. \\mathsf{Fishmonger can be used in a distributed environment (where substreams are sketched separately and composed later). We conjecture that the \\mathsf{Fish}-number } H_0/I_0 is a universal lower bound for any such composable sketch .", "after_revision": "Estimating the cardinality (number of distinct elements) of a large multiset is a classic problem in streaming and sketching, dating back to Flajolet and Martin's classic Probabilistic Counting (PCSA) algorithm from 1983. In this paper we study the intrinsic tradeoff between the space complexity of the sketch and its estimation error in the random oracle model. We define a new measure of efficiency for cardinality estimators called the Fisher-Shannon ( Fish ) number H/I. It captures the tension between the limiting Shannon entropy (H) of the sketch and its normalized Fisher information (I), which characterizes the variance of a statistically efficient , asymptotically unbiased estimator. Our results are as follows. We prove that all base-q variants of Flajolet and Martin 's PCSA sketch have Fish-number H_0/I_0 \\approx 1.98016 and that every base-q \\textsf{ \\textsf{ variant of (Hyper)LogLog has Fish-number worse than H_0/I_0, but that they tend to H_0/I_0 in the limit as q %DIFDELCMD < \\to%%% -numbers. We introduce a new sketch called \\mathsf{Fishmonger} } \\rightarrow \\infty. Here H_0,I_0 are precisely defined constants. We describe a sketch called Fishmonger that is based on a smoothed, entropy-compressed variant of PCSA with a different has \\mathsf{Fish} number H_0/I_0 \\approx 1.98. It stores } estimator function. It is proved that with high probability, Fishmonger processes a multiset of U] such that at all times, its space is O(\\log^2\\log U) + ( 1+o(1))( H_0/I_0)b \\approx 1.98b bits %DIFDELCMD < ] %%% and its standard error is 1 /\\sqrt{b}. 's space-error tradeoff improves on state-of-the-art sketches like }\\textsf{ can be used in a distributed environment (where substreams are sketched separately and composed later). We conjecture that the \\mathsf{Fish}-number } We give circumstantial evidence that H_0/I_0 is the optimum Fish-number of mergeable sketches for Cardinality Estimation. We define a class of linearizable sketches and prove that no member of this class can beat H_0/I_0 . The popular mergeable sketches are, in fact, also linearizable .", "edit_actions": [{"type": "A", "before": null, "after": "Estimating the cardinality (number of distinct elements) of a large multiset is a classic problem in streaming and sketching, dating back to Flajolet and Martin's classic Probabilistic Counting (PCSA) algorithm from 1983.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "Random Oracle", "after": "random oracle", "start_char_pos": 122, "end_char_pos": 135}, {"type": "R", "before": "\\mathsf{Fish", "after": "Fish", "start_char_pos": 236, "end_char_pos": 248}, {"type": "D", "before": "(asymptotically)", "after": null, "start_char_pos": 405, "end_char_pos": 421}, {"type": "R", "before": "estimator.", "after": ", asymptotically unbiased estimator. Our results are as follows.", "start_char_pos": 464, "end_char_pos": 474}, {"type": "R", "before": "many variants of the \\mathsf{PCSA", "after": "all base-q variants of", "start_char_pos": 489, "end_char_pos": 522}, {"type": "R", "before": "have \\mathsf{Fish", "after": "'s PCSA sketch have Fish-number", "start_char_pos": 543, "end_char_pos": 560}, {"type": "R", "before": ", where H_0,I_0 are two precisely-defined constants, and that all", "after": "\\approx 1.98016 and that every", "start_char_pos": 569, "end_char_pos": 634}, {"type": "D", "before": "generalizations of (", "after": null, "start_char_pos": 642, "end_char_pos": 662}, {"type": "D", "before": "Hyper", "after": null, "start_char_pos": 670, "end_char_pos": 675}, {"type": "D", "before": ")", "after": null, "start_char_pos": 676, "end_char_pos": 677}, {"type": "D", "before": "LogLog", "after": null, "start_char_pos": 685, "end_char_pos": 691}, {"type": "R", "before": "are strictly", "after": "variant of (Hyper)LogLog has Fish-number", "start_char_pos": 692, "end_char_pos": 704}, {"type": "A", "before": null, "after": "that they", "start_char_pos": 729, "end_char_pos": 729}, {"type": "D", "before": "\\infty. All other known sketches have even worse \\mathsf{Fish", "after": null, "start_char_pos": 784, "end_char_pos": 845}, {"type": "A", "before": null, "after": "\\rightarrow \\infty. Here H_0,I_0 are precisely defined constants. We describe a sketch called Fishmonger", "start_char_pos": 910, "end_char_pos": 910}, {"type": "R", "before": "compressed version of \\mathsf{PCSA", "after": "entropy-compressed variant of PCSA", "start_char_pos": 940, "end_char_pos": 974}, {"type": "D", "before": "estimation function. \\mathsf{Fishmonger", "after": null, "start_char_pos": 992, "end_char_pos": 1031}, {"type": "A", "before": null, "after": "estimator function. It is proved that with high probability, Fishmonger processes a multiset of", "start_char_pos": 1091, "end_char_pos": 1091}, {"type": "A", "before": null, "after": "U", "start_char_pos": 1092, "end_char_pos": 1092}, {"type": "A", "before": null, "after": "such that at all times, its space is", "start_char_pos": 1094, "end_char_pos": 1094}, {"type": "A", "before": null, "after": "1+o(1))(", "start_char_pos": 1115, "end_char_pos": 1115}, {"type": "D", "before": ", and estimates cardinalities of multisets of", "after": null, "start_char_pos": 1145, "end_char_pos": 1190}, {"type": "D", "before": "U", "after": null, "start_char_pos": 1191, "end_char_pos": 1192}, {"type": "R", "before": "with a standard error of (", "after": "and its standard error is", "start_char_pos": 1211, "end_char_pos": 1237}, {"type": "D", "before": "+o(1))", "after": null, "start_char_pos": 1240, "end_char_pos": 1246}, {"type": "D", "before": "\\mathsf{Fishmonger", "after": null, "start_char_pos": 1258, "end_char_pos": 1276}, {"type": "D", "before": "HyperLogLog", "after": null, "start_char_pos": 1352, "end_char_pos": 1363}, {"type": "D", "before": ", or even compressed representations of it. \\mathsf{Fishmonger", "after": null, "start_char_pos": 1364, "end_char_pos": 1426}, {"type": "A", "before": null, "after": "We give circumstantial evidence that H_0/I_0 is the optimum Fish-number of mergeable sketches for Cardinality Estimation. We define a class of linearizable sketches and prove that no member of this class can beat", "start_char_pos": 1577, "end_char_pos": 1577}, {"type": "R", "before": "is a universal lower bound for any such composable sketch", "after": ". The popular mergeable sketches are, in fact, also linearizable", "start_char_pos": 1586, "end_char_pos": 1643}], "sents_char_pos": [0, 142, 262, 474, 791, 854, 1012, 1078, 1257, 1407, 1530]}
+{"doc_id": "2007.09895", "revision_depth": "1", "before_revision": "Recently, there has been significant work studying distribution testing under the Conditional Sampling model. In this model, a query involves specifying a subset S of the domain, and the output received is a sample drawn from the distribution conditioned on being in S. In this paper, we primarily study thetolerant versions of the classicuniformity andidentity testing problems, providing improved query complexity bounds in the conditional sampling model. In this paper , we prove that tolerant uniformity testing in the conditional sampling model can be solved using O(\\varepsilon^{-2}) queries, which is known to be optimal and improves upon the O(\\varepsilon^{-20})-query algorithm of [CRS15]. Our bound even holds under the Pair Conditional Sampling model, a restricted version of the conditional sampling model where every queried subset S either must have exactly 2 elements, or must be the entire domain of the distribution. We also prove that tolerant identity testing in the conditional sampling model can be solved in \\tilde{O}(\\varepsilon^{-4}) queries, which is the first known bound independent of the support size of the distribution for this problem. \\tilde{O})-query algorithm for monotonicity testing in the conditional sampling model, improving on the }\\tilde{O} ] Finally, we study (non-tolerant) identity testing under the pair conditional sampling model, and provide a tight bound of \\tilde{\\Theta}( \\sqrt{\\log n \\cdot \\varepsilon^{-2}) for the query complexity, improving upon both the known upper and lower bounds in [CRS15].", "after_revision": "Recently, there has been significant work studying distribution testing under the Conditional Sampling model. In this model, a query specifies a subset S of the domain, and the output received is a sample drawn from the distribution conditioned on being in S. In this paper, we improve query complexity bounds for several classic distribution testing problems in this model. First , we prove that tolerant uniformity testing in the conditional sampling model can be solved using O(\\varepsilon^{-2}) queries, which is optimal and improves upon the O(\\varepsilon^{-20})-query algorithm of Canonne et al. [CRS15]. This bound even holds under a restricted version of the conditional sampling model called the Pair Conditional Sampling model. Next, we prove that tolerant identity testing in the conditional sampling model can be solved in \\tilde{O}(\\varepsilon^{-4}) queries, which is the first known bound independent of the support size of the distribution for this problem. Next, we use our algorithm for tolerant uniformity testing to get an\\tilde{O}(\\varepsilon^{-4)-query algorithm for monotonicity testing in the conditional sampling model, improving on the }\\tilde{O}(\\varepsilon^{-22 Can15]. Finally, we study (non-tolerant) identity testing under the pair conditional sampling model, and provide a tight bound of \\tilde{\\Theta}( \\sqrt{\\log N \\cdot \\varepsilon^{-2}) for the query complexity, where the domain of the distribution has size N. This improves upon both the known upper and lower bounds in [CRS15].", "edit_actions": [{"type": "R", "before": "involves specifying", "after": "specifies", "start_char_pos": 133, "end_char_pos": 152}, {"type": "D", "before": "primarily study the", "after": null, "start_char_pos": 288, "end_char_pos": 307}, {"type": "D", "before": "tolerant", "after": null, "start_char_pos": 307, "end_char_pos": 315}, {"type": "D", "before": "versions of the classic", "after": null, "start_char_pos": 316, "end_char_pos": 339}, {"type": "D", "before": "uniformity", "after": null, "start_char_pos": 339, "end_char_pos": 349}, {"type": "D", "before": "and", "after": null, "start_char_pos": 350, "end_char_pos": 353}, {"type": "D", "before": "identity", "after": null, "start_char_pos": 353, "end_char_pos": 361}, {"type": "R", "before": "testing problems, providing improved", "after": "improve", "start_char_pos": 362, "end_char_pos": 398}, {"type": "R", "before": "in the conditional sampling model. In this paper", "after": "for several classic distribution testing problems in this model. First", "start_char_pos": 423, "end_char_pos": 471}, {"type": "D", "before": "known to be", "after": null, "start_char_pos": 608, "end_char_pos": 619}, {"type": "A", "before": null, "after": "Canonne et al.", "start_char_pos": 690, "end_char_pos": 690}, {"type": "R", "before": "Our", "after": "This", "start_char_pos": 700, "end_char_pos": 703}, {"type": "D", "before": "the Pair Conditional Sampling model,", "after": null, "start_char_pos": 727, "end_char_pos": 763}, {"type": "R", "before": "where every queried subset S either must have exactly 2 elements, or must be the entire domain of the distribution. We also", "after": "called the Pair Conditional Sampling model. Next, we", "start_char_pos": 819, "end_char_pos": 942}, {"type": "A", "before": null, "after": "Next, we use our algorithm for tolerant uniformity testing to get an", "start_char_pos": 1169, "end_char_pos": 1169}, {"type": "A", "before": null, "after": "(\\varepsilon^{-4", "start_char_pos": 1178, "end_char_pos": 1178}, {"type": "A", "before": null, "after": "(\\varepsilon^{-22", "start_char_pos": 1283, "end_char_pos": 1283}, {"type": "A", "before": null, "after": "Can15", "start_char_pos": 1284, "end_char_pos": 1284}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1285, "end_char_pos": 1285}, {"type": "R", "before": "\\sqrt{\\log n", "after": "\\sqrt{\\log N", "start_char_pos": 1424, "end_char_pos": 1436}, {"type": "R", "before": "improving", "after": "where the domain of the distribution has size N. This improves", "start_char_pos": 1487, "end_char_pos": 1496}], "sents_char_pos": [0, 109, 269, 457, 699, 934, 1168]}
+{"doc_id": "2007.09999", "revision_depth": "1", "before_revision": "We establish a novel characterization of totally positive matrices via a sign non-reversal property. In this we are inspired by the analogous results for ] P-matrices (matrices with all principal minors positive) . Next, the interval hull ] of two m \\times n matrices A=(a_{ij}) and B = (b_{ij}) , denoted by \\mathbb{I is the collection of all matrices C such that c_{ij=t_{ij}a_{ij} +(1-t_{ij})b_{ij}for all i,j, where t_{ij} \\in }%DIFDELCMD < [%%% 0,1^{m \\times n} such that each c_{ij} is between a_{ij} and b_{ij}} . Using the sign non-reversal property, we identify a finite subset of \\mathbb{I}(A,B) that detects the total positivity of all of \\mathbb{I}(A,B) . This provides a test for an entire class of matrices simultaneously to be totally positive. We also establish analogous results for other classes of matrices: almost P-matrices, N-matrices and (minimally) semipositive matrices.", "after_revision": "A matrix A is totally positive (or non-negative) of order k, denoted TP_k (or TN_k), if all minors of size \\leq k are positive (or non-negative). It is well-known that such matrices are characterized by the variation diminishing property together with the sign non-reversal property. We do away with the former, and show that A is TP_k if and only if every contiguous submatrix of size \\leq k has the sign non-reversal property. In fact this can be strengthened to only consider test vectors in \\mathbb{R Compos. Math. 1937] and P-matrices by Gale-Nikaido Math. Ann. 1965]. As an application, we study the interval hull \\mathbb{I of two m \\times n matrices A=(a_{ij}) and B = (b_{ij}) . This is the collection of =t_{ij}a_{ij} +(1-t_{ij})b_{ij}for all i,j, where t_{ij} \\in }%DIFDELCMD < [%%% C \\in \\mathbb{R^{m \\times n} such that each c_{ij} is between a_{ij} and b_{ij}} . Using the sign non-reversal property, we identify a two-element subset of \\mathbb{I}(A,B) that detects the TP_k property for all of \\mathbb{I}(A,B) for arbitrary k \\geq 1. In particular, this provides a test for total positivity (of any order), simultaneously for an entire class of rectangular matrices.", "edit_actions": [{"type": "R", "before": "We establish a novel characterization of totally positive matrices via a", "after": "A matrix A is totally positive (or non-negative) of order k, denoted TP_k (or TN_k), if all minors of size \\leq k are positive (or non-negative). It is well-known that such matrices are characterized by the variation diminishing property together with the", "start_char_pos": 0, "end_char_pos": 72}, {"type": "R", "before": "In this we are inspired by the analogous results for", "after": "We do away with the former, and show that A is TP_k if and only if every contiguous submatrix of size \\leq k has the sign non-reversal property. In fact this can be strengthened to only consider test vectors in \\mathbb{R", "start_char_pos": 101, "end_char_pos": 153}, {"type": "A", "before": null, "after": "Compos. Math. 1937", "start_char_pos": 154, "end_char_pos": 154}, {"type": "A", "before": null, "after": "and", "start_char_pos": 156, "end_char_pos": 156}, {"type": "R", "before": "(matrices with all principal minors positive) . Next, the interval hull", "after": "by Gale-Nikaido", "start_char_pos": 168, "end_char_pos": 239}, {"type": "A", "before": null, "after": "Math. Ann. 1965", "start_char_pos": 240, "end_char_pos": 240}, {"type": "A", "before": null, "after": ". As an application, we study the interval hull \\mathbb{I", "start_char_pos": 241, "end_char_pos": 241}, {"type": "R", "before": ", denoted by \\mathbb{I", "after": ". This", "start_char_pos": 297, "end_char_pos": 319}, {"type": "D", "before": "all matrices C such that c_{ij", "after": null, "start_char_pos": 341, "end_char_pos": 371}, {"type": "R", "before": "0,1", "after": "C \\in \\mathbb{R", "start_char_pos": 451, "end_char_pos": 454}, {"type": "R", "before": "finite", "after": "two-element", "start_char_pos": 574, "end_char_pos": 580}, {"type": "R", "before": "total positivity of", "after": "TP_k property for", "start_char_pos": 624, "end_char_pos": 643}, {"type": "R", "before": ". This", "after": "for arbitrary k \\geq 1. In particular, this", "start_char_pos": 667, "end_char_pos": 673}, {"type": "A", "before": null, "after": "total positivity (of any order), simultaneously for", "start_char_pos": 694, "end_char_pos": 694}, {"type": "R", "before": "matrices simultaneously to be totally positive. We also establish analogous results for other classes of matrices: almost P-matrices, N-matrices and (minimally) semipositive", "after": "rectangular", "start_char_pos": 714, "end_char_pos": 887}], "sents_char_pos": [0, 100, 215, 279, 761]}
+{"doc_id": "2007.11151", "revision_depth": "1", "before_revision": "Mean-modulated flicker -- wherein luminance increments and decrements of equal magnitude are applied, over time, to a test field -- is commonly used in both clinical assessment of vision and experimental studies of visual systems. However, presenting mean-modulated flicker on computer-controlled displays is problematic; displays typically introduce luminance artifacts to flickering stimuli, especially at high flicker frequency or contrast, potentially interfering with the validity of findings. Here, we present a battery of tests that we used to judge the suitability of displays for presenting mean-modulated flicker. These tests revealed marked differences between a new high-performance liquid-crystal display (LCD; EIZO ColorEdge CG247X) and a new consumer-grade LCD (Dell U2415b), despite the displays' vendor-supplied specifications being almost identical. We measured displayed luminance using a spot meter , and a linearized photodiode device to record displayed luminance waveforms . We derived spatial uniformity, response times, Fourier amplitude spectra, cycle-averaged luminance , and root-mean-squared luminance . We presented paired luminance pulses to quantify the displays' nonlinear dynamics. The CG247X showed relatively good spatial uniformity . Fourier transformation of nominally static test patches revealed spectra free of artifacts, with the exception of a frame response (artifactual flicker related to the display refresh) . The CG247X's response times depended on both source and destination luminance . Despite this nonlinear behaviour, we were able to define a contrast and frequency range wherein the CG247X was artifact-free , that is, the relationship between nominal luminance and displayed luminance was accurately modelled using a causal, linear time-invariant system. This range included contrasts up to 80\\%, and flicker frequencies up to 30 Hz.", "after_revision": "Achromatic, mean-modulated flicker ( wherein luminance increments and decrements of equal magnitude are applied, over time, to a test field ) is commonly used in both clinical assessment of vision and experimental studies of visual systems. However, presenting flicker on computer-controlled displays is problematic; displays typically introduce luminance artifacts at high flicker frequency or contrast, potentially interfering with the validity of findings. Here, we present a battery of tests used to weigh the relative merits of two displays for presenting achromatic, mean-modulated flicker. These tests revealed marked differences between a new high-performance liquid-crystal display (LCD; EIZO ColorEdge CG247X) and a new consumer-grade LCD (Dell U2415b), despite displays' vendor-supplied specifications being almost identical. We measured displayed luminance using a spot meter and a linearized photodiode . We derived several measures, including spatial uniformity, the effect of viewing angle, response times, Fourier amplitude spectra, and cycle-averaged luminance . We presented paired luminance pulses to quantify the displays' nonlinear dynamics. The CG247X showed relatively good spatial uniformity (e.g., at moderate luminance, standard deviation 2.8\\% versus U2415b's 5.3\\%). Fourier transformation of nominally static test patches revealed spectra free of artifacts, with the exception of a frame response . The CG247X's rise and fall times depended on both the luminance from which, and to which, it responded, as is to be generally expected from LCDs . Despite this nonlinear behaviour, we were able to define a contrast and frequency range wherein the CG247X appeared largely artifact-free ; the relationship between nominal luminance and displayed luminance was accurately modelled using a causal, linear time-invariant system. This range included contrasts up to 80\\%, and flicker frequencies up to 30 Hz.", "edit_actions": [{"type": "R", "before": "Mean-modulated flicker --", "after": "Achromatic, mean-modulated flicker (", "start_char_pos": 0, "end_char_pos": 25}, {"type": "R", "before": "--", "after": ")", "start_char_pos": 129, "end_char_pos": 131}, {"type": "D", "before": "mean-modulated", "after": null, "start_char_pos": 251, "end_char_pos": 265}, {"type": "D", "before": "to flickering stimuli, especially", "after": null, "start_char_pos": 371, "end_char_pos": 404}, {"type": "R", "before": "that we used to judge the suitability of", "after": "used to weigh the relative merits of two", "start_char_pos": 535, "end_char_pos": 575}, {"type": "A", "before": null, "after": "achromatic,", "start_char_pos": 600, "end_char_pos": 600}, {"type": "D", "before": "the", "after": null, "start_char_pos": 800, "end_char_pos": 803}, {"type": "D", "before": ",", "after": null, "start_char_pos": 920, "end_char_pos": 921}, {"type": "D", "before": "device to record displayed luminance waveforms", "after": null, "start_char_pos": 950, "end_char_pos": 996}, {"type": "A", "before": null, "after": "several measures, including", "start_char_pos": 1010, "end_char_pos": 1010}, {"type": "A", "before": null, "after": "the effect of viewing angle,", "start_char_pos": 1031, "end_char_pos": 1031}, {"type": "A", "before": null, "after": "and", "start_char_pos": 1075, "end_char_pos": 1075}, {"type": "D", "before": ", and root-mean-squared luminance", "after": null, "start_char_pos": 1101, "end_char_pos": 1134}, {"type": "R", "before": ".", "after": "(e.g., at moderate luminance, standard deviation 2.8\\% versus U2415b's 5.3\\%).", "start_char_pos": 1273, "end_char_pos": 1274}, {"type": "D", "before": "(artifactual flicker related to the display refresh)", "after": null, "start_char_pos": 1406, "end_char_pos": 1458}, {"type": "R", "before": "response", "after": "rise and fall", "start_char_pos": 1474, "end_char_pos": 1482}, {"type": "R", "before": "source and destination luminance", "after": "the luminance from which, and to which, it responded, as is to be generally expected from LCDs", "start_char_pos": 1506, "end_char_pos": 1538}, {"type": "R", "before": "was", "after": "appeared largely", "start_char_pos": 1648, "end_char_pos": 1651}, {"type": "R", "before": ", that is,", "after": ";", "start_char_pos": 1666, "end_char_pos": 1676}], "sents_char_pos": [0, 230, 321, 498, 624, 724, 868, 998, 1136, 1219, 1274, 1460, 1813]}
+{"doc_id": "2007.11189", "revision_depth": "1", "before_revision": "Voluntary employee turnover incurs significant direct and indirect financial costs URLanizations of all sizes. A large proportion of voluntary turnover includes people who frequently move from job to job, known as job-hopping. The ability to discover an applicant's likelihood towards job-hopping can URLanizations make informed hiring decisions benefiting both parties. In this work , we show that the language one uses when responding to interview questions related to situational judgment and past behaviour is predictive of their likelihood to job hop. We used responses from over 45,000 job applicants who completed an online chat interview and also self-rated themselves on a job-hopping motive scale to analyse the correlation between the two. We evaluated five different methods of text representation , namely four open-vocabulary approaches (TF-IDF, LDA, Glove word embeddings and Doc2Vec document embeddings) and one closed-vocabulary approach (LIWC). The Glove embeddings provided the best results with a positive correlation of r = 0.35 between sequences of words used and the job-hopping likelihood. With further analysis , we also found that there is a positive correlation of r = 0.25 between job-hopping likelihood and the HEXACO personality trait Openness to experience . In other words, the more open a candidate is to new experiences, the more likely they are to job hop. The ability to objectively infer a candidate's likelihood towards job hopping presents significant opportunities, especially when assessing candidates with no prior work history. On the other hand, experienced candidates who come across as job hoppers, based purely on their resume, get an opportunity to indicate otherwise .", "after_revision": "A significant proportion of voluntary employee turnover includes people who frequently move from job to job, known as job-hopping. Our work shows that language used in responding to interview questions on past behaviour and situational judgement is predictive of job-hopping motive as measured by the Job-Hopping Motives (JHM) Scale. The study is based on responses from over 45,000 job applicants who completed an online chat interview and self-rated themselves on JHM Scale. Five different methods of text representation were evaluated , namely four open-vocabulary approaches (TF-IDF, LDA, Glove word embeddings and Doc2Vec document embeddings) and one closed-vocabulary approach (LIWC). The Glove embeddings provided the best results with a correlation of r = 0.35 between sequences of words used and the JHM Scale. Further analysis also showed a correlation of r = 0.25 between language-based job-hopping motive and the personality trait Openness to experience and a correlation of r = -0.09 with the trait Agreeableness .", "edit_actions": [{"type": "R", "before": "Voluntary employee turnover incurs significant direct and indirect financial costs URLanizations of all sizes. A large", "after": "A significant", "start_char_pos": 0, "end_char_pos": 118}, {"type": "A", "before": null, "after": "employee", "start_char_pos": 143, "end_char_pos": 143}, {"type": "R", "before": "The ability to discover an applicant's likelihood towards job-hopping can URLanizations make informed hiring decisions benefiting both parties. In this work , we show that the language one uses when", "after": "Our work shows that language used in", "start_char_pos": 228, "end_char_pos": 426}, {"type": "R", "before": "related to situational judgment and past behaviour", "after": "on past behaviour and situational judgement", "start_char_pos": 461, "end_char_pos": 511}, {"type": "R", "before": "their likelihood to job hop. We used", "after": "job-hopping motive as measured by the Job-Hopping Motives (JHM) Scale. The study is based on", "start_char_pos": 529, "end_char_pos": 565}, {"type": "D", "before": "also", "after": null, "start_char_pos": 651, "end_char_pos": 655}, {"type": "R", "before": "a job-hopping motive scale to analyse the correlation between the two. We evaluated five", "after": "JHM Scale. Five", "start_char_pos": 681, "end_char_pos": 769}, {"type": "A", "before": null, "after": "were evaluated", "start_char_pos": 811, "end_char_pos": 811}, {"type": "D", "before": "positive", "after": null, "start_char_pos": 1019, "end_char_pos": 1027}, {"type": "R", "before": "job-hopping likelihood. With further analysis , we also found that there is a positive", "after": "JHM Scale. Further analysis also showed a", "start_char_pos": 1092, "end_char_pos": 1178}, {"type": "A", "before": null, "after": "language-based", "start_char_pos": 1211, "end_char_pos": 1211}, {"type": "R", "before": "likelihood and the HEXACO", "after": "motive and the", "start_char_pos": 1224, "end_char_pos": 1249}, {"type": "R", "before": ". In other words, the more open a candidate is to new experiences, the more likely they are to job hop. The ability to objectively infer a candidate's likelihood towards job hopping presents significant opportunities, especially when assessing candidates with no prior work history. On the other hand, experienced candidates who come across as job hoppers, based purely on their resume, get an opportunity to indicate otherwise", "after": "and a correlation of r = -0.09 with the trait Agreeableness", "start_char_pos": 1291, "end_char_pos": 1718}], "sents_char_pos": [0, 110, 227, 371, 557, 751, 964, 1115, 1292, 1394, 1573]}
+{"doc_id": "2007.11410", "revision_depth": "1", "before_revision": "We prove three decomposition results for sparse positive ( semi- )definite polynomial matrices . First, we show that a polynomial matrix P(x) with chordal sparsity is positive semidefinite for all x\\in R^n if and only if there exists a sum-of-squares (SOS) polynomial \\sigma(x) such that \\sigma (x)P (x) can be decomposed into a sum of sparse SOS matrices , each of which is zero outside a small principal submatrix . Second, we establish that setting \\sigma(x)=(x_1^2 + \\cdots + x_n^2)^\\nu for some integer \\nu suffices if P (x) is even, homogeneous , and positive definite . Third, we prove a sparse-matrix version of Putinar's Positivstellensatz: if P (x) has chordal sparsity and is positive definite on a compact semialgebraic set \\mathcal{K}=\\{x:g_1(x)\\geq 0,\\ldots,g_m(x)\\geq 0\\} satisfying the Archimedean condition, then P(x) = S_0(x) + g_1(x)S_1(x) + \\cdots + g_m(x)S_m(x) for matrices S_i(x) that are sums of sparse SOS matrices , each of which is zero outside a small principal submatrix is not compact or does not satisfy the Archimedean condition, we obtain a similar decomposition for (x_1^2 + \\ldots + x_n^2)^\\nu P(x) with some integer \\nu\\geq 0 when P and g_1,\\ldots,g_m are homogeneous of even degree} . Using these decomposition results, we obtain sparse SOS representation theorems for polynomials that are quadratic and correlatively sparse in a subset of variables . We also obtain new convergent hierarchies of sparsity-exploiting SOS reformulations to convex optimization problems with large and sparse polynomial matrix inequalities. Analytical examples illustrate all our decomposition results, while large-scale numerical examples demonstrate that the corresponding sparsity-exploiting SOS hierarchies have significantly lower computational complexity than traditional ones.", "after_revision": "We prove decomposition theorems for sparse positive ( semi )definite polynomial matrices that can be viewed as sparsity-exploiting versions of the Hilbert--Artin, Reznick, Putinar, and Putinar--Vasilescu Positivstellens\\\"atze . First, we establish that a polynomial matrix P(x) with chordal sparsity is positive semidefinite for all x\\in R^n if and only if there exists a sum-of-squares (SOS) polynomial \\sigma(x) such that \\sigma P is a sum of sparse SOS matrices . Second, we show that setting \\sigma(x)=(x_1^2 + \\cdots + x_n^2)^\\nu for some integer \\nu suffices if P is homogeneous and positive definite globally . Third, we prove that if P is positive definite on a compact semialgebraic set \\mathcal{K}=\\{x:g_1(x)\\geq 0,\\ldots,g_m(x)\\geq 0\\} satisfying the Archimedean condition, then P(x) = S_0(x) + g_1(x)S_1(x) + \\cdots + g_m(x)S_m(x) for matrices S_i(x) that are sums of sparse SOS matrices . Finally, if \\mathcal{K is not compact or does not satisfy the Archimedean condition, we obtain a similar decomposition for (x_1^2 + \\ldots + x_n^2)^\\nu P(x) with some integer \\nu\\geq 0 when P and g_1,\\ldots,g_m are homogeneous of even degree} . Using these results, we find sparse SOS representation theorems for polynomials that are quadratic and correlatively sparse in a subset of variables , and we construct new convergent hierarchies of sparsity-exploiting SOS reformulations for convex optimization problems with large and sparse polynomial matrix inequalities. Numerical examples demonstrate that these hierarchies can have a significantly lower computational complexity than traditional ones.", "edit_actions": [{"type": "R", "before": "three decomposition results", "after": "decomposition theorems", "start_char_pos": 9, "end_char_pos": 36}, {"type": "R", "before": "semi-", "after": "semi", "start_char_pos": 59, "end_char_pos": 64}, {"type": "A", "before": null, "after": "that can be viewed as sparsity-exploiting versions of the Hilbert--Artin, Reznick, Putinar, and Putinar--Vasilescu Positivstellens\\\"atze", "start_char_pos": 95, "end_char_pos": 95}, {"type": "R", "before": "show", "after": "establish", "start_char_pos": 108, "end_char_pos": 112}, {"type": "R", "before": "(x)P (x) can be decomposed into", "after": "P is", "start_char_pos": 296, "end_char_pos": 327}, {"type": "D", "before": ", each of which is zero outside a small principal submatrix", "after": null, "start_char_pos": 357, "end_char_pos": 416}, {"type": "R", "before": "establish", "after": "show", "start_char_pos": 430, "end_char_pos": 439}, {"type": "R", "before": "(x) is even, homogeneous ,", "after": "is homogeneous", "start_char_pos": 527, "end_char_pos": 553}, {"type": "A", "before": null, "after": "globally", "start_char_pos": 576, "end_char_pos": 576}, {"type": "R", "before": "a sparse-matrix version of Putinar's Positivstellensatz: if P (x) has chordal sparsity and", "after": "that if P", "start_char_pos": 595, "end_char_pos": 685}, {"type": "R", "before": ", each of which is zero outside a small principal submatrix", "after": ". Finally, if \\mathcal{K", "start_char_pos": 942, "end_char_pos": 1001}, {"type": "D", "before": "decomposition", "after": null, "start_char_pos": 1236, "end_char_pos": 1249}, {"type": "R", "before": "obtain", "after": "find", "start_char_pos": 1262, "end_char_pos": 1268}, {"type": "R", "before": ". We also obtain", "after": ", and we construct", "start_char_pos": 1389, "end_char_pos": 1405}, {"type": "R", "before": "to", "after": "for", "start_char_pos": 1475, "end_char_pos": 1477}, {"type": "R", "before": "Analytical examples illustrate all our decomposition results, while large-scale numerical examples demonstrate that the corresponding sparsity-exploiting SOS hierarchies have", "after": "Numerical examples demonstrate that these hierarchies can have a", "start_char_pos": 1561, "end_char_pos": 1735}], "sents_char_pos": [0, 97, 418, 578, 651, 754, 836, 860, 884, 904, 1390, 1560]}
+{"doc_id": "2007.13596", "revision_depth": "1", "before_revision": "In this work, different transmission modes of the SARS-CoV-2 virus and their role in determining the evolution of the Covid-19 pandemic are analyzed . Probability of infection caused by inhaling infectious droplets (initial, ejection diameters between 0.5-750\\mu m) and probability of infection by the corresponding desiccated nuclei that mostly encapsulate the virions post droplet evaporation, are calculated. At typical, air-conditioned yet quiescent , large indoor space, for the average viral loading, and at early times, cough droplets of initial diameter between 10 \\mu m and 50 \\mu m have the highest infection probability. However, by the time they are to be inhaled, the diameters are most likely 5-6 times smaller with respect to their initial diameters. While the initially near unity infection probability due to droplets (airborne/ballistic) rapidly decays within the first 25s, the small yet persistent infection probability of airborne desiccated nuclei decays appreciably only by 1000s . Combined with molecular collision theory adapted to calculate frequency of contact between the susceptible population and the droplet/nuclei cloud, infection probabilities are used to define infection rate constants , ab-initio, leading to a SEIR model . Assuming the virus sustains equally well within the dried droplet nuclei as in the droplets, the floating nuclei leads to a stronger contribution to the corresponding rate constants with respect to the droplets, in the above-mentioned conditions. Combining both pathways, the basic reproduction number \\mathcal{R Viral load, minimum infectious dose, sensitivity of the virus half-life to the phase of its vector , extent of dilution of the respiratory jet/puff by the entraining air are the important factors that determine specific physical modes of transmission and the pandemic evolution .", "after_revision": "Identifying the relative importance of the different transmission routes of the SARS-CoV-2 virus is an urgent research priority. To that end, the different transmission routes, and their role in determining the evolution of the Covid-19 pandemic are analyzed in this work . Probability of infection caused by inhaling virus-laden droplets (initial, ejection diameters between 0.5-750\\mu m) and the corresponding desiccated nuclei that mostly encapsulate the virions post droplet evaporation, are individually calculated. At typical, air-conditioned yet quiescent indoor space, for average viral loading, cough droplets of initial diameter between 10-50 \\mu m have the highest infection probability. However, by the time they are inhaled, the diameters reduce to about 1/6^{th their initial diameters. While the initially near unity infection probability due to droplets rapidly decays within the first 25s, the small yet persistent infection probability of desiccated nuclei decays appreciably only by \\mathcal{O 1000s ), assuming the virus sustains equally well within the dried droplet nuclei as in the droplets . Combined with molecular collision theory adapted to calculate frequency of contact between the susceptible population and the droplet/nuclei cloud, infection rate constants are derived ab-initio, leading to a SEIR model applicable for any respiratory event - vector combination. Viral load, minimum infectious dose, sensitivity of the virus half-life to the phase of its vector and dilution of the respiratory jet/puff by the entraining air are shown to mechanistically determine specific physical modes of transmission and variation in the basic reproduction number \\mathcal{R .", "edit_actions": [{"type": "R", "before": "In this work, different transmission modes", "after": "Identifying the relative importance of the different transmission routes", "start_char_pos": 0, "end_char_pos": 42}, {"type": "A", "before": null, "after": "is an urgent research priority. To that end, the different transmission routes,", "start_char_pos": 67, "end_char_pos": 67}, {"type": "A", "before": null, "after": "in this work", "start_char_pos": 150, "end_char_pos": 150}, {"type": "R", "before": "infectious", "after": "virus-laden", "start_char_pos": 197, "end_char_pos": 207}, {"type": "D", "before": "probability of infection by", "after": null, "start_char_pos": 272, "end_char_pos": 299}, {"type": "A", "before": null, "after": "individually", "start_char_pos": 402, "end_char_pos": 402}, {"type": "D", "before": ", large", "after": null, "start_char_pos": 457, "end_char_pos": 464}, {"type": "D", "before": "the", "after": null, "start_char_pos": 483, "end_char_pos": 486}, {"type": "D", "before": "and at early times,", "after": null, "start_char_pos": 510, "end_char_pos": 529}, {"type": "R", "before": "10 \\mu m and 50 \\mu m", "after": "10-50 \\mu m", "start_char_pos": 573, "end_char_pos": 594}, {"type": "D", "before": "to be", "after": null, "start_char_pos": 665, "end_char_pos": 670}, {"type": "R", "before": "are most likely 5-6 times smaller with respect to", "after": "reduce to about 1/6^{th", "start_char_pos": 694, "end_char_pos": 743}, {"type": "D", "before": "(airborne/ballistic)", "after": null, "start_char_pos": 838, "end_char_pos": 858}, {"type": "D", "before": "airborne", "after": null, "start_char_pos": 946, "end_char_pos": 954}, {"type": "A", "before": null, "after": "\\mathcal{O", "start_char_pos": 1000, "end_char_pos": 1000}, {"type": "A", "before": null, "after": "), assuming the virus sustains equally well within the dried droplet nuclei as in the droplets", "start_char_pos": 1007, "end_char_pos": 1007}, {"type": "R", "before": "probabilities are used to define infection rate constants ,", "after": "rate constants are derived", "start_char_pos": 1168, "end_char_pos": 1227}, {"type": "R", "before": ". Assuming the virus sustains equally well within the dried droplet nuclei as in the droplets, the floating nuclei leads to a stronger contribution to the corresponding rate constants with respect to the droplets, in the above-mentioned conditions. Combining both pathways, the basic reproduction number \\mathcal{R", "after": "applicable for any respiratory event - vector combination.", "start_char_pos": 1263, "end_char_pos": 1577}, {"type": "R", "before": ", extent of", "after": "and", "start_char_pos": 1677, "end_char_pos": 1688}, {"type": "R", "before": "the important factors that", "after": "shown to mechanistically", "start_char_pos": 1752, "end_char_pos": 1778}, {"type": "R", "before": "the pandemic evolution", "after": "variation in the basic reproduction number \\mathcal{R", "start_char_pos": 1833, "end_char_pos": 1855}], "sents_char_pos": [0, 414, 634, 768, 1264, 1511]}
+{"doc_id": "2007.14059", "revision_depth": "1", "before_revision": "Fake news becomes a palpable potential risk to society because of the growing use of mobile devices and the immense increase in Internet access across the world . It is essential to develop a simple mathematical model to understand the mechanism of the online dissemination of fake news. In this paper , we propose a point process model for predicting the spreading of the fake news on Twitter. This model describes the cascade as a two-stage process: initially, a cascade spreads as an ordinary newsstory; a second cascade thenemerges through attempts to disclose and rectify the falsity of the news story. We validate this model through the collection of two datasets of fake news cascades from Twitter. We show that the proposed model is superior to the current state-of-the-art methods in accurately predicting the evolution of the fake news cascades . Moreover, the proposed model can appropriately infer the correction time when some users realize the falsity of the news . The proposed model contributes to understand the dynamics of fake news spread in social mediaand is potentially advantageous in extracting a compact representation of the temporal information of the cascades .", "after_revision": "Fake news can have a significant negative impact on society because of the growing use of mobile devices and the worldwide increase in Internet access . It is therefore essential to develop a simple mathematical model to understand the online dissemination of fake news. In this study , we propose a point process model of the spread of fake news on Twitter. The proposed model describes the spread of a fake news item as a two-stage process: initially, fake news spreads as a piece of ordinary news; then, when most users start recognizing the falsity of the news item, that itself spreads as another news story. We validate this model using two datasets of fake news items spread on Twitter. We show that the proposed model is superior to the current state-of-the-art methods in accurately predicting the evolution of the spread of a fake news item . Moreover, a text analysis suggests that our model appropriately infers the correction time , i.e., the moment when Twitter users start realizing the falsity of the news item . The proposed model contributes to understanding the dynamics of the spread of fake news on social media. Its ability to extract a compact representation of the spreading pattern could be useful in the detection and mitigation of fake news .", "edit_actions": [{"type": "R", "before": "becomes a palpable potential risk to", "after": "can have a significant negative impact on", "start_char_pos": 10, "end_char_pos": 46}, {"type": "R", "before": "immense", "after": "worldwide", "start_char_pos": 108, "end_char_pos": 115}, {"type": "D", "before": "across the world", "after": null, "start_char_pos": 144, "end_char_pos": 160}, {"type": "A", "before": null, "after": "therefore", "start_char_pos": 169, "end_char_pos": 169}, {"type": "D", "before": "mechanism of the", "after": null, "start_char_pos": 237, "end_char_pos": 253}, {"type": "R", "before": "paper", "after": "study", "start_char_pos": 297, "end_char_pos": 302}, {"type": "R", "before": "for predicting the spreading of the", "after": "of the spread of", "start_char_pos": 338, "end_char_pos": 373}, {"type": "R", "before": "This", "after": "The proposed", "start_char_pos": 396, "end_char_pos": 400}, {"type": "R", "before": "cascade", "after": "spread of a fake news item", "start_char_pos": 421, "end_char_pos": 428}, {"type": "R", "before": "a cascade spreads as an ordinary newsstory; a second cascade thenemerges through attempts to disclose and rectify", "after": "fake news spreads as a piece of ordinary news; then, when most users start recognizing", "start_char_pos": 464, "end_char_pos": 577}, {"type": "A", "before": null, "after": "item, that itself spreads as another news", "start_char_pos": 602, "end_char_pos": 602}, {"type": "R", "before": "through the collection of", "after": "using", "start_char_pos": 633, "end_char_pos": 658}, {"type": "R", "before": "cascades from", "after": "items spread on", "start_char_pos": 685, "end_char_pos": 698}, {"type": "R", "before": "fake news cascades", "after": "spread of a fake news item", "start_char_pos": 838, "end_char_pos": 856}, {"type": "R", "before": "the proposed model can appropriately infer", "after": "a text analysis suggests that our model appropriately infers", "start_char_pos": 869, "end_char_pos": 911}, {"type": "R", "before": "when some users realize", "after": ", i.e., the moment when Twitter users start realizing", "start_char_pos": 932, "end_char_pos": 955}, {"type": "A", "before": null, "after": "item", "start_char_pos": 980, "end_char_pos": 980}, {"type": "R", "before": "understand", "after": "understanding", "start_char_pos": 1017, "end_char_pos": 1027}, {"type": "R", "before": "fake news spread in social mediaand is potentially advantageous in extracting", "after": "the spread of fake news on social media. Its ability to extract", "start_char_pos": 1044, "end_char_pos": 1121}, {"type": "R", "before": "temporal information of the cascades", "after": "spreading pattern could be useful in the detection and mitigation of fake news", "start_char_pos": 1154, "end_char_pos": 1190}], "sents_char_pos": [0, 162, 288, 395, 507, 609, 707, 982]}
+{"doc_id": "2007.14747", "revision_depth": "1", "before_revision": "By performing a large number of spatial measurements , high spatial resolution photoacoustic imaging can be achieved without specific prior information. However, the acquisition of spatial measurements is time consuming, costly and technically challenging. By exploiting non-linear prior information, compressed sensing techniques in combination with sophisticate reconstruction algorithms allow a reduction of number of measurements while maintaining a high spatial resolution. For this purpose , in this paper, we propose a multiscale factorization for the wave equation , which separates the data into a low frequency factor and sparse high frequency factors. By extending the acoustic reciprocal principle, we transfer sparsity in measurements domain to spatial sparsity of the initial pressure, which allows the use of sparse reconstruction techniques. Numerical results are presented which demonstrate the feasibility of the proposed framework.", "after_revision": "Performing a large number of spatial measurements enables high-resolution photoacoustic imaging without specific prior information. However, the acquisition of spatial measurements is time-consuming, costly, and technically challenging. By exploiting nonlinear prior information, compressed sensing techniques in combination with sophisticated reconstruction algorithms allow reducing the number of measurements while maintaining high spatial resolution. To this end , in this work we propose a multiscale factorization for the wave equation that decomposes the measured data into a low-frequency factor and sparse high-frequency factors. By extending the acoustic reciprocity principle, we transfer sparsity in the measurement domain into spatial sparsity of the initial pressure, which allows the use of sparse reconstruction techniques. Numerical results are presented that demonstrate the feasibility of the proposed framework.", "edit_actions": [{"type": "R", "before": "By performing", "after": "Performing", "start_char_pos": 0, "end_char_pos": 13}, {"type": "R", "before": ", high spatial resolution photoacoustic imaging can be achieved", "after": "enables high-resolution photoacoustic imaging", "start_char_pos": 53, "end_char_pos": 116}, {"type": "R", "before": "time consuming, costly", "after": "time-consuming, costly,", "start_char_pos": 205, "end_char_pos": 227}, {"type": "R", "before": "non-linear", "after": "nonlinear", "start_char_pos": 271, "end_char_pos": 281}, {"type": "R", "before": "sophisticate", "after": "sophisticated", "start_char_pos": 351, "end_char_pos": 363}, {"type": "R", "before": "a reduction of", "after": "reducing the", "start_char_pos": 396, "end_char_pos": 410}, {"type": "D", "before": "a", "after": null, "start_char_pos": 452, "end_char_pos": 453}, {"type": "R", "before": "For this purpose", "after": "To this end", "start_char_pos": 479, "end_char_pos": 495}, {"type": "R", "before": "paper,", "after": "work", "start_char_pos": 506, "end_char_pos": 512}, {"type": "R", "before": ", which separates the", "after": "that decomposes the measured", "start_char_pos": 573, "end_char_pos": 594}, {"type": "R", "before": "low frequency", "after": "low-frequency", "start_char_pos": 607, "end_char_pos": 620}, {"type": "R", "before": "high frequency", "after": "high-frequency", "start_char_pos": 639, "end_char_pos": 653}, {"type": "R", "before": "reciprocal", "after": "reciprocity", "start_char_pos": 689, "end_char_pos": 699}, {"type": "R", "before": "measurements domain to", "after": "the measurement domain into", "start_char_pos": 735, "end_char_pos": 757}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 890, "end_char_pos": 895}], "sents_char_pos": [0, 152, 256, 478, 662, 857]}
+{"doc_id": "2007.14823", "revision_depth": "1", "before_revision": "RNNs are popular dynamical models, used for processing sequential data . Prior theoretical work in understanding the properties of RNNs has focused on models with additive interactions , where the input to a unit is a weighted sum of the output of the remaining units in network . However, there is ample evidence that neurons can have gating - i.e. multiplicative - interactions. Such gating interactions have significant effects on the collective dynamics of the network. Furthermore, the best performing RNNs in machine learning have gating interactions. Thus, gating interactions are beneficial for information processing and learning tasks. We develop a dynamical mean-field theory (DMFT) of gating to understand the dynamical regimes produced by gating . Our gated RNN reduces to the classical RNNs in certain limits and is closely related to popular gated models in machine learning . We use random matrix theory (RMT) to analytically characterize the spectrum of the Jacobian and show how gating produces slow modes and marginal stability . Thus, gating is a potential mechanism to implement computations involving line attractor dynamics . The long-time behavior of the gated network is studied using its Lyapunov spectrum, and the DMFT is used to provide an analytical prediction for the maximum Lyapunov exponent . We also show that gating gives rise to a novel, discontinuous transition to chaos, where the proliferation of critical points is decoupled with the appearance of chaotic dynamics ; the nature of this chaotic state is characterized in detail. Using the DMFT and RMT, we produce phase diagramsfor gated RNN . Finally, we address the gradients by leveraging the adjoint sensitivity framework to develop a DMFT for the gradients. The theory developed here sheds light on the rich dynamical behaviour produced by gating interactions and has implications for architectural choices and learning dynamics .", "after_revision": "Recurrent neural networks (RNNs) are powerful dynamical models, widely used in machine learning (ML) for processing sequential data , and also in neuroscience, to understand the emergent properties of networks of real neurons . Prior theoretical work in understanding the properties of RNNs has focused on models with additive interactions . However, real neurons can have gating -- i.e. multiplicative -- interactions, and gating is also a central feature of the best performing RNNs in machine learning . Here, we develop a dynamical mean-field theory (DMFT) to study the consequences of gating in RNNs . We use random matrix theory to show how gating robustly produces marginal stability and line attractors -- important mechanisms for biologically-relevant computations requiring long memory . The long-time behavior of the gated network is studied using its Lyapunov spectrum, and the DMFT is used to provide a novel analytical expression for the maximum Lyapunov exponent demonstrating its close relation to relaxation time of the dynamics. Gating is also shown to give rise to a novel, discontinuous transition to chaos, where the proliferation of critical points (topological complexity) is decoupled from the appearance of chaotic dynamics (dynamical complexity), contrary to a seminal result for additive RNNs. Critical surfaces and regions of marginal stability in the parameter space are indicated in phase diagrams, thus providing a map for principled parameter choices for ML practitioners . Finally, we develop a field-theory for gradients that arise in training, by incorporating the adjoint sensitivity framework from control theory in the DMFT. This paves the way for the use of powerful field-theoretic techniques to study training/gradients in large RNNs .", "edit_actions": [{"type": "R", "before": "RNNs are popular", "after": "Recurrent neural networks (RNNs) are powerful", "start_char_pos": 0, "end_char_pos": 16}, {"type": "R", "before": "used", "after": "widely used in machine learning (ML)", "start_char_pos": 35, "end_char_pos": 39}, {"type": "A", "before": null, "after": ", and also in neuroscience, to understand the emergent properties of networks of real neurons", "start_char_pos": 71, "end_char_pos": 71}, {"type": "D", "before": ", where the input to a unit is a weighted sum of the output of the remaining units in network", "after": null, "start_char_pos": 186, "end_char_pos": 279}, {"type": "R", "before": "there is ample evidence that", "after": "real", "start_char_pos": 291, "end_char_pos": 319}, {"type": "R", "before": "-", "after": "--", "start_char_pos": 344, "end_char_pos": 345}, {"type": "R", "before": "- interactions. Such gating interactions have significant effects on the collective dynamics of the network. Furthermore, the", "after": "-- interactions, and gating is also a central feature of the", "start_char_pos": 366, "end_char_pos": 491}, {"type": "R", "before": "have gating interactions. Thus, gating interactions are beneficial for information processing and learning tasks. We", "after": ". Here, we", "start_char_pos": 533, "end_char_pos": 649}, {"type": "R", "before": "of gating to understand the dynamical regimes produced by gating . Our gated RNN reduces to the classical RNNs in certain limits and is closely related to popular gated models in machine learning", "after": "to study the consequences of gating in RNNs", "start_char_pos": 695, "end_char_pos": 890}, {"type": "R", "before": "(RMT) to analytically characterize the spectrum of the Jacobian and", "after": "to", "start_char_pos": 921, "end_char_pos": 988}, {"type": "R", "before": "produces slow modes and marginal stability . Thus, gating is a potential mechanism to implement computations involving line attractor dynamics", "after": "robustly produces marginal stability and line attractors -- important mechanisms for biologically-relevant computations requiring long memory", "start_char_pos": 1005, "end_char_pos": 1147}, {"type": "R", "before": "an analytical prediction", "after": "a novel analytical expression", "start_char_pos": 1266, "end_char_pos": 1290}, {"type": "R", "before": ". We also show that gating gives", "after": "demonstrating its close relation to relaxation time of the dynamics. Gating is also shown to give", "start_char_pos": 1325, "end_char_pos": 1357}, {"type": "R", "before": "is decoupled with", "after": "(topological complexity) is decoupled from", "start_char_pos": 1453, "end_char_pos": 1470}, {"type": "R", "before": "; the nature of this chaotic state is characterized in detail. Using the DMFT and RMT, we produce phase diagramsfor gated RNN", "after": "(dynamical complexity), contrary to a seminal result for additive RNNs. Critical surfaces and regions of marginal stability in the parameter space are indicated in phase diagrams, thus providing a map for principled parameter choices for ML practitioners", "start_char_pos": 1506, "end_char_pos": 1631}, {"type": "R", "before": "address the gradients by leveraging", "after": "develop a field-theory for gradients that arise in training, by incorporating", "start_char_pos": 1646, "end_char_pos": 1681}, {"type": "R", "before": "to develop a DMFT for the gradients. The theory developed here sheds light on the rich dynamical behaviour produced by gating interactions and has implications for architectural choices and learning dynamics", "after": "from control theory in the DMFT. This paves the way for the use of powerful field-theoretic techniques to study training/gradients in large RNNs", "start_char_pos": 1716, "end_char_pos": 1923}], "sents_char_pos": [0, 281, 381, 474, 558, 646, 761, 892, 1049, 1149, 1326, 1507, 1568, 1752]}
+{"doc_id": "2007.14823", "revision_depth": "2", "before_revision": "Recurrent neural networks (RNNs) are powerful dynamical models, widely used in machine learning (ML) for processing sequential data, and also in neuroscience, to understand the emergent properties of networks of real neurons. Prior theoretical work in understanding the properties of RNNs has focused on models with additive interactions. However, real neurons can have gating -- i.e. multiplicative -- interactions , and gating is also a central feature of the best performing RNNs in machine learning . Here, we develop a dynamical mean-field theory (DMFT) to study the consequences of gating in RNNs. We use random matrix theory to show how gating robustly produces marginal stability and line attractors -- important mechanisms for biologically-relevant computations requiring long memory. The long-time behavior of the gated network is studied using its Lyapunov spectrum, and the DMFT is used to provide a novel analytical expression for the maximum Lyapunov exponent demonstrating its close relation to relaxation time of the dynamics. Gating is also shown to give rise to a novel, discontinuous transition to chaos, where the proliferation of critical points (topological complexity) is decoupled from the appearance of chaotic dynamics (dynamical complexity), contrary to a seminal result for additive RNNs. Critical surfaces and regions of marginal stability in the parameter space are indicated in phase diagrams, thus providing a map for principled parameter choices for ML practitioners. Finally, we develop a field-theory for gradients that arise in training, by incorporating the adjoint sensitivity framework from control theory in the DMFT . This paves the way for the use of powerful field-theoretic techniques to study training / gradients in large RNNs.", "after_revision": "Recurrent neural networks (RNNs) are powerful dynamical models, widely used in machine learning (ML) for processing sequential data, and in neuroscience, to understand the emergent properties of networks of real neurons. Prior theoretical work in understanding the properties of RNNs has focused on networks with additive interactions. However, gating -- i.e. multiplicative -- interactions are ubiquitous in real neurons , and gating is also the central feature of the best-performing RNNs in ML . Here, we study the consequences of gating for the dynamical behavior of RNNs. We show that gating leads to slow modes and a novel, marginally-stable state. The network in this marginally-stable state can function as a robust integrator, and unlike previous approaches, gating permits this function without parameter fine-tuning or special symmetries. We study the long-time behavior of the gated network using its Lyapunov spectrum, and provide a novel relation between the maximum Lyapunov exponent and the relaxation time of the dynamics. Gating is also shown to give rise to a novel, discontinuous transition to chaos, where the proliferation of critical points (topological complexity) is decoupled from the appearance of chaotic dynamics (dynamical complexity), in contrast to a seminal result for additive RNNs. The rich dynamical behavior is summarized in a phase diagram indicating critical surfaces and regions of marginal stability -- thus, providing a map for principled parameter choices to ML practitioners. Finally, we develop a field theory for gradients that arise in training, by combining the adjoint formalism from control theory with the dynamical mean-field theory . This paves the way for the use of powerful field theoretic techniques to study training and gradients in large RNNs.", "edit_actions": [{"type": "D", "before": "also", "after": null, "start_char_pos": 137, "end_char_pos": 141}, {"type": "R", "before": "models", "after": "networks", "start_char_pos": 304, "end_char_pos": 310}, {"type": "D", "before": "real neurons can have", "after": null, "start_char_pos": 348, "end_char_pos": 369}, {"type": "A", "before": null, "after": "are ubiquitous in real neurons", "start_char_pos": 416, "end_char_pos": 416}, {"type": "R", "before": "a", "after": "the", "start_char_pos": 438, "end_char_pos": 439}, {"type": "R", "before": "best performing RNNs in machine learning", "after": "best-performing RNNs in ML", "start_char_pos": 463, "end_char_pos": 503}, {"type": "D", "before": "develop a dynamical mean-field theory (DMFT) to", "after": null, "start_char_pos": 515, "end_char_pos": 562}, {"type": "R", "before": "in", "after": "for the dynamical behavior of", "start_char_pos": 596, "end_char_pos": 598}, {"type": "R", "before": "use random matrix theory to show how gating robustly produces marginal stability and line attractors -- important mechanisms for biologically-relevant computations requiring long memory. The", "after": "show that gating leads to slow modes and a novel, marginally-stable state. The network in this marginally-stable state can function as a robust integrator, and unlike previous approaches, gating permits this function without parameter fine-tuning or special symmetries. We study the", "start_char_pos": 608, "end_char_pos": 798}, {"type": "D", "before": "is studied", "after": null, "start_char_pos": 839, "end_char_pos": 849}, {"type": "D", "before": "the DMFT is used to", "after": null, "start_char_pos": 883, "end_char_pos": 902}, {"type": "R", "before": "analytical expression for", "after": "relation between", "start_char_pos": 919, "end_char_pos": 944}, {"type": "R", "before": "demonstrating its close relation to", "after": "and the", "start_char_pos": 975, "end_char_pos": 1010}, {"type": "R", "before": "contrary", "after": "in contrast", "start_char_pos": 1270, "end_char_pos": 1278}, {"type": "R", "before": "Critical", "after": "The rich dynamical behavior is summarized in a phase diagram indicating critical", "start_char_pos": 1318, "end_char_pos": 1326}, {"type": "R", "before": "in the parameter space are indicated in phase diagrams, thus", "after": "-- thus,", "start_char_pos": 1370, "end_char_pos": 1430}, {"type": "R", "before": "for", "after": "to", "start_char_pos": 1480, "end_char_pos": 1483}, {"type": "R", "before": "field-theory", "after": "field theory", "start_char_pos": 1524, "end_char_pos": 1536}, {"type": "R", "before": "incorporating the adjoint sensitivity framework", "after": "combining the adjoint formalism", "start_char_pos": 1578, "end_char_pos": 1625}, {"type": "R", "before": "in the DMFT", "after": "with the dynamical mean-field theory", "start_char_pos": 1646, "end_char_pos": 1657}, {"type": "R", "before": "field-theoretic", "after": "field theoretic", "start_char_pos": 1703, "end_char_pos": 1718}, {"type": "R", "before": "/", "after": "and", "start_char_pos": 1748, "end_char_pos": 1749}], "sents_char_pos": [0, 225, 338, 505, 604, 794, 1043, 1501]}
+{"doc_id": "2008.03248", "revision_depth": "1", "before_revision": "This work constructs, analyzes, and simulates a new SEIR-type model for the dynamics and potential control of the current coronavirus ( COVID-19 ) pandemic. It has a compartmental structure and a differential inclusion for a variable infection rate. The novelty in this work is three-fold . First, the population is separated, according to compliance with the disease control directives ( shelter-in-place, masks/face coverings, physical distancing, etc.) , into those who fully follow the directives and those who only partially comply with the directives or are necessarily mobile . This allows the assessment of the overall effectiveness of the control measures and the impact of their relaxing or tightening on the disease spread. Second, the model treats the infection rate as an unknown and keeps track of how it changes , due to virus mutations and saturation effects, via a differential inclusion. Third, by introducing randomness to some of the system coefficients, we study the model's sensitivity to these parameters and provide bounds and intervals of confidence for the model simulations . As a case study, the pandemic outbreak in South Korea is simulated. The model parameters were found by minimizing the deviation of the model prediction from the reported data .The simulations show that the model captures the pandemic dynamics in South Korea accurately , which provides confidence in the model predictions and its future use .", "after_revision": "This work constructs, analyzes, and simulates a new compartmental SEIR-type model for the dynamics and potential control of the current COVID-19 pandemic. The novelty in this work is two-fold . First, the population is divided according to its compliance with disease control directives ( lockdown, shelter-in-place, masks/face coverings, physical distancing, etc.) into those who fully comply and those who follow the directives partially, or are necessarily mobile (such as medical staff). This split, indirectly, reflects on the quality and consistency of these measures. This allows the assessment of the overall effectiveness of the control measures and the impact of their relaxing or tightening on the disease spread. Second, the adequate contact rate, which directly affects the infection rate , is one of the model unknowns, as it keeps track of the changes in the population behavior and the effectiveness of various disease treatment modalities via a differential inclusion. Existence, uniqueness and positivity results are proved using a nonstandard convex analysis-based approach . As a case study, the pandemic outbreak in the Republic of Korea (South Korea) is simulated. The model parameters were found by minimizing the deviation of the model prediction from the reported data over the first 100 days of the pandemic in South Korea .The simulations show that the model captures accurately the pandemic dynamics in the subsequent 75 days , which provides confidence in the model predictions and its future use . In particular, the model predicts that about 40\\% of the infections were not documented, which implies that asymptomatic infections contribute silently but substantially to the spread of the disease indicating that more widespread asymptomatic testing is necessary .", "edit_actions": [{"type": "A", "before": null, "after": "compartmental", "start_char_pos": 52, "end_char_pos": 52}, {"type": "D", "before": "coronavirus (", "after": null, "start_char_pos": 123, "end_char_pos": 136}, {"type": "R", "before": ") pandemic. It has a compartmental structure and a differential inclusion for a variable infection rate.", "after": "pandemic.", "start_char_pos": 146, "end_char_pos": 250}, {"type": "R", "before": "three-fold", "after": "two-fold", "start_char_pos": 279, "end_char_pos": 289}, {"type": "R", "before": "separated, according to compliance with the", "after": "divided according to its compliance with", "start_char_pos": 317, "end_char_pos": 360}, {"type": "A", "before": null, "after": "lockdown,", "start_char_pos": 390, "end_char_pos": 390}, {"type": "D", "before": ",", "after": null, "start_char_pos": 458, "end_char_pos": 459}, {"type": "R", "before": "follow the directives", "after": "comply", "start_char_pos": 481, "end_char_pos": 502}, {"type": "R", "before": "only partially comply with the directives", "after": "follow the directives partially,", "start_char_pos": 517, "end_char_pos": 558}, {"type": "R", "before": ". This", "after": "(such as medical staff). This split, indirectly, reflects on the quality and consistency of these measures. This", "start_char_pos": 585, "end_char_pos": 591}, {"type": "R", "before": "model treats", "after": "adequate contact rate, which directly affects", "start_char_pos": 749, "end_char_pos": 761}, {"type": "R", "before": "as an unknown and", "after": ", is one of the model unknowns, as it", "start_char_pos": 781, "end_char_pos": 798}, {"type": "R", "before": "how it changes , due to virus mutations and saturation effects,", "after": "the changes in the population behavior and the effectiveness of various disease treatment modalities", "start_char_pos": 814, "end_char_pos": 877}, {"type": "R", "before": "Third, by introducing randomness to some of the system coefficients, we study the model's sensitivity to these parameters and provide bounds and intervals of confidence for the model simulations", "after": "Existence, uniqueness and positivity results are proved using a nonstandard convex analysis-based approach", "start_char_pos": 908, "end_char_pos": 1102}, {"type": "R", "before": "South Korea", "after": "the Republic of Korea (South Korea)", "start_char_pos": 1147, "end_char_pos": 1158}, {"type": "A", "before": null, "after": "over the first 100 days of the pandemic in South Korea", "start_char_pos": 1280, "end_char_pos": 1280}, {"type": "A", "before": null, "after": "accurately", "start_char_pos": 1327, "end_char_pos": 1327}, {"type": "R", "before": "South Korea accurately", "after": "the subsequent 75 days", "start_char_pos": 1353, "end_char_pos": 1375}, {"type": "A", "before": null, "after": ". In particular, the model predicts that about 40\\% of the infections were not documented, which implies that asymptomatic infections contribute silently but substantially to the spread of the disease indicating that more widespread asymptomatic testing is necessary", "start_char_pos": 1448, "end_char_pos": 1448}], "sents_char_pos": [0, 157, 250, 291, 586, 736, 907, 1104, 1172, 1282]}
+{"doc_id": "2008.04418", "revision_depth": "1", "before_revision": "COVID-19 was first detected in Hubei province of China and has had severe impact on the life in the country since then. We investigate how this epidemic has influenced attention dynamics on the biggest Chinese microblogging website Sina Weibo in the period December 16, 2019 - April 17, 2020. We focus on the real-time Hot Search List (HSL), which provides the ranking of the most popular 50 hashtags based on the amount of Sina Weibo searches on them . We show , how the specific events, measures and developments during the epidemic affected the emergence of new hashtags and the ranking on the HSL. A significant increase of COVID-19 related hashtags started to occur on HSL around January 20, 2020, when the transmission of the disease between humans was announced. Then very rapidly a situation was reached , where the participation of the COVID-related hashtags occupied 30-70\\% of the HSL, however, with changing content. We give an analysis of how the hashtag topics changed during the investigated time span and conclude that there are three periods separated by February 12 and March 12. In period 1, we see strong topical correlations and clustering of hashtags; in period 2, the correlations are weakened, without clustering pattern; in period 3, we see potential of clustering while not as strong as in period 1. To quantify the dynamics of HSL we measured the lifetimes of hashtags on the list and the rank diversity at given ranks. Our observations indicate attention diversification since the COVID-19 outbreak in Mainland China and a higher rank diversity at the top 15 ranks on HSL due to the COVID-19 related hashtags, a drastic attention decay shortly after the outburst and a slower decay for a longer period .", "after_revision": "Understanding attention dynamics on social media during pandemics could help governments minimize the effects. We focus on how COVID-19 has influenced the attention dynamics on the biggest Chinese microblogging website Sina Weibo during the first four months of the pandemic. We study the real-time Hot Search List (HSL), which provides the ranking of the most popular 50 hashtags based on the amount of Sina Weibo searches . We show how the specific events, measures and developments during the epidemic affected the emergence of different kinds of hashtags and the ranking on the HSL. A significant increase of COVID-19 related hashtags started to occur on HSL around January 20, 2020, when the transmission of the disease between humans was announced. Then very rapidly a situation was reached where COVID-related hashtags occupied 30-70\\% of the HSL, however, with changing content. We give an analysis of how the hashtag topics changed during the investigated time span and conclude that there are three periods separated by February 12 and March 12. In period 1, we see strong topical correlations and clustering of hashtags; in period 2, the correlations are weakened, without clustering pattern; in period 3, we see a potential of clustering while not as strong as in period 1. We further explore the dynamics of HSL by measuring the ranking dynamics and the lifetimes of hashtags on the list . This way we can obtain information about the decay of attention, which is important for decisions about the temporal placement of governmental measures to achieve permanent awareness. Furthermore, our observations indicate abnormally higher rank diversity in the top 15 ranks on HSL due to the COVID-19 related hashtags, revealing the possibility of algorithmic intervention from the platform provider .", "edit_actions": [{"type": "R", "before": "COVID-19 was first detected in Hubei province of China and has had severe impact on", "after": "Understanding attention dynamics on social media during pandemics could help governments minimize the effects. We focus on how COVID-19 has influenced", "start_char_pos": 0, "end_char_pos": 83}, {"type": "D", "before": "life in the country since then. We investigate how this epidemic has influenced", "after": null, "start_char_pos": 88, "end_char_pos": 167}, {"type": "R", "before": "in the period December 16, 2019 - April 17, 2020. We focus on", "after": "during the first four months of the pandemic. We study", "start_char_pos": 243, "end_char_pos": 304}, {"type": "D", "before": "on them", "after": null, "start_char_pos": 444, "end_char_pos": 451}, {"type": "D", "before": ",", "after": null, "start_char_pos": 462, "end_char_pos": 463}, {"type": "R", "before": "new", "after": "different kinds of", "start_char_pos": 561, "end_char_pos": 564}, {"type": "R", "before": ", where the participation of the", "after": "where", "start_char_pos": 812, "end_char_pos": 844}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1266, "end_char_pos": 1266}, {"type": "R", "before": "To quantify", "after": "We further explore", "start_char_pos": 1327, "end_char_pos": 1338}, {"type": "R", "before": "we measured the", "after": "by measuring the ranking dynamics and the", "start_char_pos": 1359, "end_char_pos": 1374}, {"type": "R", "before": "and the rank diversity at given ranks. Our observations indicate attention diversification since the COVID-19 outbreak in Mainland China and a", "after": ". This way we can obtain information about the decay of attention, which is important for decisions about the temporal placement of governmental measures to achieve permanent awareness. Furthermore, our observations indicate abnormally", "start_char_pos": 1409, "end_char_pos": 1551}, {"type": "R", "before": "at", "after": "in", "start_char_pos": 1574, "end_char_pos": 1576}, {"type": "R", "before": "a drastic attention decay shortly after the outburst and a slower decay for a longer period", "after": "revealing the possibility of algorithmic intervention from the platform provider", "start_char_pos": 1639, "end_char_pos": 1730}], "sents_char_pos": [0, 119, 292, 453, 769, 928, 1097, 1173, 1245, 1326, 1447]}
+{"doc_id": "2008.05816", "revision_depth": "1", "before_revision": "This paper improves guaranteed error control for the Stokes problem with a focus on pressure-robustness, i.e. for discretisations that compute a discrete velocity that is independent of the exact pressure. A Prager-Synge type result relates the errors of divergence-free primal and H( )-conforming dual mixed methods ( for the velocity gradient) with an equilibration constraint that needs special care when discretised. To relax the constraints on the primal and dual method , a more general result is derived that enables the use of a recently developed mass conserving mixed stress discretisation to design equilibrated fluxes that yield pressure-independent guaranteed upper bounds for any pressure-robust ( but not necessarily divergence-free) primal discretisation. Moreover, a provably efficient local design of the equilibrated fluxes is presented that reduces the numerical costsof the error estimator. All theoretical findings are verified by numerical examples which also show that the efficiency indices of our novel guaranteed upper bounds for the velocity error are close to 1.", "after_revision": "This paper aims to improve guaranteed error control for the Stokes problem with a focus on pressure-robustness, i.e. for discretisations that compute a discrete velocity that is independent of the exact pressure. A Prager--Synge type result relates the velocity errors of divergence-free primal and perfectly equilibrated dual mixed methods for the velocity stress. The first main result of the paper is a framework with relaxed constraints on the primal and dual method . This enables to use a recently developed mass conserving mixed stress discretisation for the design of equilibrated fluxes and to obtain pressure-independent guaranteed upper bounds for any pressure-robust ( not necessarily divergence-free) primal discretisation. The second main result is a provably efficient local design of the equilibrated fluxes with comparably low numerical costs. Numerical examples verify the theoretical findings and show that efficiency indices of our novel guaranteed upper bounds are close to one.", "edit_actions": [{"type": "R", "before": "improves", "after": "aims to improve", "start_char_pos": 11, "end_char_pos": 19}, {"type": "R", "before": "Prager-Synge", "after": "Prager--Synge", "start_char_pos": 208, "end_char_pos": 220}, {"type": "A", "before": null, "after": "velocity", "start_char_pos": 245, "end_char_pos": 245}, {"type": "D", "before": "H(", "after": null, "start_char_pos": 283, "end_char_pos": 285}, {"type": "R", "before": ")-conforming", "after": "perfectly equilibrated", "start_char_pos": 286, "end_char_pos": 298}, {"type": "D", "before": "(", "after": null, "start_char_pos": 318, "end_char_pos": 319}, {"type": "R", "before": "gradient) with an equilibration constraint that needs special care when discretised. To relax the", "after": "stress. The first main result of the paper is a framework with relaxed", "start_char_pos": 337, "end_char_pos": 434}, {"type": "R", "before": ", a more general result is derived that enables the use of", "after": ". This enables to use", "start_char_pos": 477, "end_char_pos": 535}, {"type": "R", "before": "to design equilibrated fluxes that yield", "after": "for the design of equilibrated fluxes and to obtain", "start_char_pos": 601, "end_char_pos": 641}, {"type": "D", "before": "but", "after": null, "start_char_pos": 713, "end_char_pos": 716}, {"type": "R", "before": "Moreover,", "after": "The second main result is", "start_char_pos": 773, "end_char_pos": 782}, {"type": "R", "before": "is presented that reduces the numerical costsof the error estimator. All theoretical findings are verified by numerical examples which also show that the", "after": "with comparably low numerical costs. Numerical examples verify the theoretical findings and show that", "start_char_pos": 844, "end_char_pos": 997}, {"type": "D", "before": "for the velocity error", "after": null, "start_char_pos": 1054, "end_char_pos": 1076}, {"type": "R", "before": "1.", "after": "one.", "start_char_pos": 1090, "end_char_pos": 1092}], "sents_char_pos": [0, 205, 421, 772, 912]}
+{"doc_id": "2008.06909", "revision_depth": "1", "before_revision": "Minimal paths are considered as a powerful and efficient tool for boundary detection and image segmentation due to its global optimality and well-established numerical solutions such as fast marching algorithm . In this paper, we introduce a flexible interactive image segmentation model based on the minimal geodesic framework in conjunction with region-based homogeneity enhancement. A key ingredient in our model is the construction of Finsler geodesic metrics, which are capable of integrating anisotropic and asymmetric edge features, region-based homogeneity and/or curvature regularization. This is done by exploiting an implicit method to incorporate the region-based homogeneity information to the metrics used . Moreover, we also introduce a way to build objective simple closed contours , each of which is treated as the concatenation of two disjoint open paths . Experimental results prove that the proposed model indeed outperforms state-of-the-art minimal paths-based image segmentation approaches.", "after_revision": "Minimal paths are regarded as a powerful and efficient tool for boundary detection and image segmentation due to its global optimality and the well-established numerical solutions such as fast marching method . In this paper, we introduce a flexible interactive image segmentation model based on the Eikonal partial differential equation (PDE) framework in conjunction with region-based homogeneity enhancement. A key ingredient in the introduced model is the construction of local geodesic metrics, which are capable of integrating anisotropic and asymmetric edge features, implicit region-based homogeneity features and/or curvature regularization. The incorporation of the region-based homogeneity features into the metrics considered relies on an implicit representation of these features, which is one of the contributions of this work . Moreover, we also introduce a way to build simple closed contours as the concatenation of two disjoint open curves . Experimental results prove that the proposed model indeed outperforms state-of-the-art minimal paths-based image segmentation approaches.", "edit_actions": [{"type": "R", "before": "considered", "after": "regarded", "start_char_pos": 18, "end_char_pos": 28}, {"type": "A", "before": null, "after": "the", "start_char_pos": 141, "end_char_pos": 141}, {"type": "R", "before": "algorithm", "after": "method", "start_char_pos": 201, "end_char_pos": 210}, {"type": "R", "before": "minimal geodesic", "after": "Eikonal partial differential equation (PDE)", "start_char_pos": 302, "end_char_pos": 318}, {"type": "R", "before": "our", "after": "the introduced", "start_char_pos": 407, "end_char_pos": 410}, {"type": "R", "before": "Finsler", "after": "local", "start_char_pos": 440, "end_char_pos": 447}, {"type": "A", "before": null, "after": "implicit", "start_char_pos": 541, "end_char_pos": 541}, {"type": "A", "before": null, "after": "features", "start_char_pos": 567, "end_char_pos": 567}, {"type": "R", "before": "This is done by exploiting an implicit method to incorporate", "after": "The incorporation of", "start_char_pos": 601, "end_char_pos": 661}, {"type": "R", "before": "information to the metrics used", "after": "features into the metrics considered relies on an implicit representation of these features, which is one of the contributions of this work", "start_char_pos": 691, "end_char_pos": 722}, {"type": "D", "before": "objective", "after": null, "start_char_pos": 768, "end_char_pos": 777}, {"type": "D", "before": ", each of which is treated", "after": null, "start_char_pos": 801, "end_char_pos": 827}, {"type": "R", "before": "paths", "after": "curves", "start_char_pos": 870, "end_char_pos": 875}], "sents_char_pos": [0, 212, 386, 600, 724]}
+{"doc_id": "2008.07008", "revision_depth": "1", "before_revision": "Moving object segmentation is a crucial task for autonomous vehicles as it can be used to segment objects in a class agnostic manner based on its motion cues. It will enable the detection of objects unseen during training (e.g., moose or a construction truck) generically based on their motion. Although pixel-wise motion segmentation has been studied in the literature, it is not dealt with at instance level, which would help separate connected segments of moving objects leading to better trajectory planning. In this paper, we proposed a motion-based instance segmentation task and created a new annotated dataset based on KITTI , which will be released publicly. We make use of the YOLACT model to solve the instance motion segmentationnetwork by feeding inflow and image as input and instance motion masks as output. We extend it to a multi-task model that learns semantic and motion instance segmentation in a computationally efficient manner. Our model is based on sharing a prototype generation network between the two tasks and learning separate prototype coefficients per task . To obtain real-time performance, we study different efficient encoders and obtain 39 fps on a Titan Xp GPU using MobileNetV2 with an improvement of 10\\% mAP relative to the baseline. A video demonstration of our work is available in URL", "after_revision": "Moving object segmentation is a crucial task for autonomous vehicles as it can be used to segment objects in a class agnostic manner based on their motion cues. It enables the detection of unknown objects during training (e.g., moose or a construction truck) based on their motion. Although pixel-wise motion segmentation has been studied in autonomous driving literature, it is not dealt with on the instance level, which would help separate connected segments of moving objects leading to better trajectory planning. Other generic video object segmentation tasks have dealt with instance-wise motion segmentation but on much simpler setting and have not dealt with the multi-task learning problem for both semantic and class agnostic instance segmentation. In this paper, we propose a motion-based instance segmentation task and provide a new annotated dataset based on KITTIMoSeg , which will be released publicly. Our dataset provide extra class annotations which is crucial for studying class agnostic segmentation. We further propose an efficient multi-task learning approach that learns an extra class agnostic instance segmentation head through sharing the prototype generation network with the semantic head. The model then learns separate prototype coefficients within the class agnostic and semantic heads . To obtain real-time performance, we study different efficient encoders and obtain 39 fps on a Titan Xp GPU using MobileNetV2 with an improvement of 10\\% mAP relative to the baseline. Our model outperforms state of the art motion segmentation methods with 3.3\\% improvement. We summarize our work in a short video with qualitative results at URL", "edit_actions": [{"type": "R", "before": "its", "after": "their", "start_char_pos": 142, "end_char_pos": 145}, {"type": "R", "before": "will enable", "after": "enables", "start_char_pos": 162, "end_char_pos": 173}, {"type": "R", "before": "objects unseen", "after": "unknown objects", "start_char_pos": 191, "end_char_pos": 205}, {"type": "D", "before": "generically", "after": null, "start_char_pos": 260, "end_char_pos": 271}, {"type": "R", "before": "the", "after": "autonomous driving", "start_char_pos": 355, "end_char_pos": 358}, {"type": "R", "before": "at", "after": "on the", "start_char_pos": 392, "end_char_pos": 394}, {"type": "A", "before": null, "after": "Other generic video object segmentation tasks have dealt with instance-wise motion segmentation but on much simpler setting and have not dealt with the multi-task learning problem for both semantic and class agnostic instance segmentation.", "start_char_pos": 513, "end_char_pos": 513}, {"type": "R", "before": "proposed", "after": "propose", "start_char_pos": 532, "end_char_pos": 540}, {"type": "R", "before": "created", "after": "provide", "start_char_pos": 587, "end_char_pos": 594}, {"type": "R", "before": "KITTI", "after": "KITTIMoSeg", "start_char_pos": 628, "end_char_pos": 633}, {"type": "R", "before": "We make use of the YOLACT model to solve the instance motion segmentationnetwork by feeding inflow and image as input and instance motion masks as output. We extend it to a", "after": "Our dataset provide extra class annotations which is crucial for studying class agnostic segmentation. We further propose an efficient", "start_char_pos": 669, "end_char_pos": 841}, {"type": "R", "before": "model that learns semantic and motion instance segmentation in a computationally efficient manner. Our model is based on sharing a", "after": "learning approach that learns an extra class agnostic instance segmentation head through sharing the", "start_char_pos": 853, "end_char_pos": 983}, {"type": "R", "before": "between the two tasks and learning", "after": "with the semantic head. The model then learns", "start_char_pos": 1013, "end_char_pos": 1047}, {"type": "R", "before": "per task", "after": "within the class agnostic and semantic heads", "start_char_pos": 1080, "end_char_pos": 1088}, {"type": "R", "before": "A video demonstration of our work is available in", "after": "Our model outperforms state of the art motion segmentation methods with 3.3\\% improvement. We summarize our work in a short video with qualitative results at", "start_char_pos": 1274, "end_char_pos": 1323}], "sents_char_pos": [0, 158, 294, 512, 668, 823, 951, 1090, 1273]}
+{"doc_id": "2008.08759", "revision_depth": "1", "before_revision": "The issue in solving social problems is how to respect minority opinions , which are often ignored in general majority rules. To build consensus on pluralistic values and make social choices in consideration of minority opinions, we propose aggregation methods that give weighting to the minority's positionality on cardinal cumulative voting. Based on quadratic and linear voting, we formulated three weighted aggregation methods that differ in the ratio of votes to cumulative points and the weighting of the minority to all members, and calculated the frequency distributions of the aggregation results, assuming that the distributions of votes follow normal distributions . From these calculation results, we found that minority opinions are likely to be reflected as weighting increases proportionally in two of the above three methods. This means that Sen and Gotoh's idea of considering the social position of unfortunate people on ordinal ranking , that welfare economicsconsiders under an axiomatic approach, was shown by weighting the minority's positionality on cardinal voting. In addition, we can know the contents such as the number and positionality of the minority from the analysis of the aggregation results. It will be useful for promoting mutual understanding between the majority and minority by visualizing the contents of the proposed aggregation methods interactively in the consensus-building process. With the further development of information technology, the consensus building on cardinal choices based on big data will be necessary. We would like to use the proposed aggregation methods for making social choices for pluralistic values such as social, environmental, and economic.", "after_revision": "Respecting minority opinions is vital in solving social problems . However, minority opinions are often ignored in general majority rules. To build consensus on pluralistic values and make social choices that consider minority opinions, we propose aggregation methods that give weighting to the minority's positionality on cardinal cumulative voting. Based on quadratic and linear voting, we formulated three weighted aggregation methods that differ in the ratio of votes to cumulative points and the weighting of the minority to all members, and assuming that the distributions of votes follow normal distributions , we calculated the frequency distributions of the aggregation results. We found that minority opinions are more likely to be reflected proportionately to the average of the distribution in two of the above three methods. This implies that Sen and Gotoh's idea of considering the social position of unfortunate people on ordinal ranking in the welfare economics, was illustrated by weighting the minority's positionality on cardinal voting. In addition, it is possible to visualize the number and positionality of the minority from the analysis of the aggregation results. These results will be useful to promote mutual understanding between the majority and minority by interactively visualizing the contents of the proposed aggregation methods in the consensus-building process. With the further development of information technology, the consensus building based on big data will be necessary. We recommend the use of our proposed aggregation methods to make social choices for pluralistic values such as social, environmental, and economic.", "edit_actions": [{"type": "R", "before": "The issue", "after": "Respecting minority opinions is vital", "start_char_pos": 0, "end_char_pos": 9}, {"type": "R", "before": "is how to respect minority opinions , which", "after": ". However, minority opinions", "start_char_pos": 37, "end_char_pos": 80}, {"type": "R", "before": "in consideration of", "after": "that consider", "start_char_pos": 191, "end_char_pos": 210}, {"type": "D", "before": "calculated the frequency distributions of the aggregation results,", "after": null, "start_char_pos": 540, "end_char_pos": 606}, {"type": "R", "before": ". From these calculation results, we", "after": ", we calculated the frequency distributions of the aggregation results. We", "start_char_pos": 676, "end_char_pos": 712}, {"type": "A", "before": null, "after": "more", "start_char_pos": 746, "end_char_pos": 746}, {"type": "R", "before": "as weighting increases proportionally", "after": "proportionately to the average of the distribution", "start_char_pos": 770, "end_char_pos": 807}, {"type": "R", "before": "means", "after": "implies", "start_char_pos": 848, "end_char_pos": 853}, {"type": "R", "before": ", that welfare economicsconsiders under an axiomatic approach, was shown", "after": "in the welfare economics, was illustrated", "start_char_pos": 956, "end_char_pos": 1028}, {"type": "R", "before": "we can know the contents such as the", "after": "it is possible to visualize the", "start_char_pos": 1104, "end_char_pos": 1140}, {"type": "R", "before": "It", "after": "These results", "start_char_pos": 1228, "end_char_pos": 1230}, {"type": "R", "before": "for promoting", "after": "to promote", "start_char_pos": 1246, "end_char_pos": 1259}, {"type": "A", "before": null, "after": "interactively", "start_char_pos": 1318, "end_char_pos": 1318}, {"type": "D", "before": "interactively", "after": null, "start_char_pos": 1380, "end_char_pos": 1393}, {"type": "D", "before": "on cardinal choices", "after": null, "start_char_pos": 1508, "end_char_pos": 1527}, {"type": "R", "before": "would like to use the", "after": "recommend the use of our", "start_char_pos": 1568, "end_char_pos": 1589}, {"type": "R", "before": "for making", "after": "to make", "start_char_pos": 1619, "end_char_pos": 1629}], "sents_char_pos": [0, 125, 343, 677, 842, 1090, 1227, 1428, 1564]}
+{"doc_id": "2008.08896", "revision_depth": "1", "before_revision": "Systems that generate sentences from (abstract ) meaning representations (AMRs) are typically evaluated using automatic surface matching metrics that compare the generated texts to the texts that were originally given to human annotators to construct AMR meaning representations . However, besides well-known issues from which such metrics suffer (Callison-Burch et al., 2006; Novikova et al., 2017), we show that an additional problem arises when applied for AMR-to-text evaluation because mapping from the more abstract domain of AMR to the more concrete domain of sentences allows for manifold sentence realizations. In this work we aim to alleviate these issues and propose MF_\\beta, an automatic metric that builds on two pillars. The first pillar is the principle of meaning preservation \\mathcal{M}: it measures to what extent the original AMR graph can be reconstructed from the generated sentence . We implement this principle by i) automatically constructing an AMR from the generated sentence using state-of-the-art AMR parsers and ii) apply fine-grained principled AMR metrics to measure the distance between the original and the reconstructed AMR. The second pillar builds on a principle of (grammatical) form \\mathcal{F} , which measures the linguistic quality of the generated sentences , which we implement using SOTA language models. We show - theoretically and experimentally - that fulfillment of both principles offers several benefits for evaluation of AMR-to-text systems, including the explainability of scores \\mathcal{F}_\\beta does not necessarily rely on gold AMRs, it may extend to other text generation tasks} .", "after_revision": "Systems that generate natural language text from abstract meaning representations such as AMR are typically evaluated using automatic surface matching metrics that compare the generated texts to reference texts from which the input meaning representations were constructed. We show that besides well-known issues from which such metrics suffer , an additional problem arises when applying these metrics for AMR-to-text evaluation , since an abstract meaning representation allows for numerous surface realizations. In this work we aim to alleviate these issues by proposing MF_\\beta, a decomposable metric that builds on two pillars. The first is the principle of meaning preservation \\mathcal{M}: it measures to what extent a given AMR can be reconstructed from the generated sentence using SOTA AMR parsers and applying ( fine-grained ) AMR evaluation metrics to measure the distance between the original and the reconstructed AMR. The second pillar builds on a principle of (grammatical) form \\mathcal{F} that measures the linguistic quality of the generated text , which we implement using SOTA language models. In two extensive pilot studies we show that fulfillment of both principles offers benefits for AMR-to-text evaluation, including explainability of scores . Since \\mathcal{M\\mathcal{F}_\\beta does not necessarily rely on gold AMRs, it may extend to other text generation tasks} .", "edit_actions": [{"type": "R", "before": "sentences from (abstract ) meaning representations (AMRs)", "after": "natural language text from abstract meaning representations such as AMR", "start_char_pos": 22, "end_char_pos": 79}, {"type": "R", "before": "the texts that were originally given to human annotators to construct AMR meaning representations . However,", "after": "reference texts from which the input meaning representations were constructed. We show that", "start_char_pos": 181, "end_char_pos": 289}, {"type": "R", "before": "(Callison-Burch et al., 2006; Novikova et al., 2017), we show that", "after": ",", "start_char_pos": 347, "end_char_pos": 413}, {"type": "R", "before": "applied", "after": "applying these metrics", "start_char_pos": 448, "end_char_pos": 455}, {"type": "R", "before": "because mapping from the more abstract domain of AMR to the more concrete domain of sentences allows for manifold sentence", "after": ", since an abstract meaning representation allows for numerous surface", "start_char_pos": 483, "end_char_pos": 605}, {"type": "R", "before": "and propose", "after": "by proposing", "start_char_pos": 666, "end_char_pos": 677}, {"type": "R", "before": "an automatic", "after": "a decomposable", "start_char_pos": 688, "end_char_pos": 700}, {"type": "D", "before": "pillar", "after": null, "start_char_pos": 746, "end_char_pos": 752}, {"type": "R", "before": "the original AMR graph", "after": "a given AMR", "start_char_pos": 834, "end_char_pos": 856}, {"type": "R", "before": ". We implement this principle by i) automatically constructing an AMR from the generated sentence using state-of-the-art", "after": "using SOTA", "start_char_pos": 906, "end_char_pos": 1026}, {"type": "R", "before": "ii) apply", "after": "applying (", "start_char_pos": 1043, "end_char_pos": 1052}, {"type": "R", "before": "principled AMR", "after": ") AMR evaluation", "start_char_pos": 1066, "end_char_pos": 1080}, {"type": "R", "before": ", which", "after": "that", "start_char_pos": 1235, "end_char_pos": 1242}, {"type": "R", "before": "sentences", "after": "text", "start_char_pos": 1292, "end_char_pos": 1301}, {"type": "R", "before": "We show - theoretically and experimentally -", "after": "In two extensive pilot studies we show", "start_char_pos": 1351, "end_char_pos": 1395}, {"type": "R", "before": "several benefits for evaluation of", "after": "benefits for", "start_char_pos": 1439, "end_char_pos": 1473}, {"type": "R", "before": "systems, including the", "after": "evaluation, including", "start_char_pos": 1486, "end_char_pos": 1508}, {"type": "A", "before": null, "after": ". Since \\mathcal{M", "start_char_pos": 1534, "end_char_pos": 1534}], "sents_char_pos": [0, 280, 376, 619, 735, 907, 1350]}
+{"doc_id": "2008.09657", "revision_depth": "2", "before_revision": "Learning feature space node embeddings that encode the position of a node within the context of a graph is useful in several graph prediction tasks. Majority of the existing graph neural networks (GNN) learn node embeddings that encode their local neighborhoods but not their positions. Consequently, two nodes that are vastly distant but located in similar local neighborhoods would map to similar embeddings . This limitation may prevent accurate performance in predictive tasks that rely on position information. In this paper,we address this gap by developing GraphReach, a position-aware , inductive GNN . GraphReach captures the global positions of nodes though reachability estimations with respect to a set of nodes called anchors. The reachability estimations compute the frequency with which a node may visit an anchor through any possible path. The anchors are strategically selected so that the reachability estimations across all nodes are maximized. We show that this combinatorial anchor selection problem is NP-hard and consequently, develop a greedy (1-1/e) approximation . An extensive experimental evaluation covering six datasets and five state-of-the-art GNN architectures reveal that GraphReach is consistently superior and provides up to 40\\% relative improvement in the predictive tasks of link prediction and pairwise node classification . In addition, GraphReach is more robust against adversarial attacks.", "after_revision": " Majority of the existing graph neural networks (GNN) learn node embeddings that encode their local neighborhoods but not their positions. Consequently, two nodes that are vastly distant but located in similar local neighborhoods map to similar embeddings in those networks . This limitation prevents accurate performance in predictive tasks that rely on position information. In this paper,we develop GraphReach, a position-aware inductive GNN that captures the global positions of nodes through reachability estimations with respect to a set of anchor nodes. The anchors are strategically selected so that reachability estimations across all the nodes are maximized. We show that this combinatorial anchor selection problem is NP-hard and , consequently, develop a greedy (1-1/e) approximation heuristic. Empirical evaluation against state-of-the-art GNN architectures reveal that GraphReach provides up to 40\\% relative improvement in accuracy . In addition, it is more robust to adversarial attacks.", "edit_actions": [{"type": "D", "before": "Learning feature space node embeddings that encode the position of a node within the context of a graph is useful in several graph prediction tasks.", "after": null, "start_char_pos": 0, "end_char_pos": 148}, {"type": "D", "before": "would", "after": null, "start_char_pos": 378, "end_char_pos": 383}, {"type": "A", "before": null, "after": "in those networks", "start_char_pos": 410, "end_char_pos": 410}, {"type": "R", "before": "may prevent", "after": "prevents", "start_char_pos": 429, "end_char_pos": 440}, {"type": "R", "before": "address this gap by developing", "after": "develop", "start_char_pos": 534, "end_char_pos": 564}, {"type": "R", "before": ", inductive GNN . GraphReach", "after": "inductive GNN that", "start_char_pos": 594, "end_char_pos": 622}, {"type": "R", "before": "though", "after": "through", "start_char_pos": 662, "end_char_pos": 668}, {"type": "R", "before": "nodes called anchors. The reachability estimations compute the frequency with which a node may visit an anchor through any possible path. The", "after": "anchor nodes. The", "start_char_pos": 719, "end_char_pos": 860}, {"type": "D", "before": "the", "after": null, "start_char_pos": 904, "end_char_pos": 907}, {"type": "A", "before": null, "after": "the", "start_char_pos": 944, "end_char_pos": 944}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1038, "end_char_pos": 1038}, {"type": "R", "before": ". An extensive experimental evaluation covering six datasets and five", "after": "heuristic. Empirical evaluation against", "start_char_pos": 1092, "end_char_pos": 1161}, {"type": "D", "before": "is consistently superior and", "after": null, "start_char_pos": 1220, "end_char_pos": 1248}, {"type": "R", "before": "the predictive tasks of link prediction and pairwise node classification", "after": "accuracy", "start_char_pos": 1293, "end_char_pos": 1365}, {"type": "R", "before": "GraphReach", "after": "it", "start_char_pos": 1381, "end_char_pos": 1391}, {"type": "R", "before": "against", "after": "to", "start_char_pos": 1407, "end_char_pos": 1414}], "sents_char_pos": [0, 148, 286, 412, 516, 740, 856, 965, 1093, 1367]}
+{"doc_id": "2008.12988", "revision_depth": "1", "before_revision": "We give a general framework for inference in spanning tree models. We propose unified algorithms for the important cases of first-order expectations and second-order expectations in edge-factored, non-projective spanning-tree models. Our algorithms exploit a fundamental connection between gradients and expectations, which allows us to derive efficient algorithms. These algorithms are easy to implement, given the prevalence of automatic differentiation software. We motivate the development of our framework with several cautionary tales of previous re-search , which has developed numerous less-than-optimal algorithms for computing expectations and their gradients. We demonstrate how our framework efficiently computes several quantities with known algorithms, including the expected attachment score, entropy, and generalized expectation criteria. As a bonus, we give algorithms for quantities that are missing in the literature, including the KL divergence. In all cases, our approach matches the efficiency of existing algorithms and, in several cases, reducesthe runtime complexity by a factor (or two) of the sentence length. We validate the implementation of our framework through runtime experiments. We find our algorithms are upto 12 and 26 times faster than previous algorithms for computing the Shannon entropy and the gradient of the generalized expectation objective, respectively.", "after_revision": "We give a general framework for inference in spanning tree models. We propose unified algorithms for the important cases of first-order expectations and second-order expectations in edge-factored, non-projective spanning-tree models. Our algorithms exploit a fundamental connection between gradients and expectations, which allows us to derive efficient algorithms. These algorithms are easy to implement, given the prevalence of automatic differentiation software. We motivate the development of our framework with several cautionary tales of previous research , which has developed numerous less-than-optimal algorithms for computing expectations and their gradients. We demonstrate how our framework efficiently computes several quantities with known algorithms, including the expected attachment score, entropy, and generalized expectation criteria. As a bonus, we give algorithms for quantities that are missing in the literature, including the KL divergence. In all cases, our approach matches the efficiency of existing algorithms and, in several cases, reduces the runtime complexity by a factor (or two) of the sentence length. We validate the implementation of our framework through runtime experiments. We find our algorithms are up to 12 and 26 times faster than previous algorithms for computing the Shannon entropy and the gradient of the generalized expectation objective, respectively.", "edit_actions": [{"type": "R", "before": "re-search", "after": "research", "start_char_pos": 553, "end_char_pos": 562}, {"type": "R", "before": "reducesthe", "after": "reduces the", "start_char_pos": 1062, "end_char_pos": 1072}, {"type": "R", "before": "upto", "after": "up to", "start_char_pos": 1241, "end_char_pos": 1245}], "sents_char_pos": [0, 66, 233, 365, 465, 670, 854, 965, 1136, 1213]}
+{"doc_id": "2008.12988", "revision_depth": "2", "before_revision": "We give a general framework for inference in spanning tree models. We propose unified algorithms for the important cases of first-order expectations and second-order expectations in edge-factored, non-projective spanning-tree models. Our algorithms exploit a fundamental connection between gradients and expectations, which allows us to derive efficient algorithms. These algorithms are easy to implement, given the prevalence of automatic differentiation software. We motivate the development of our framework with several cautionary tales of previous research, which has developed numerous less-than-optimal algorithms for computing expectations and their gradients. We demonstrate how our framework efficiently computes several quantities with known algorithms, including the expected attachment score, entropy, and generalized expectation criteria . As a bonus, we give algorithms for quantities that are missing in the literature, including the KL divergence . In all cases, our approach matches the efficiency of existing algorithms and, in several cases, reduces the runtime complexity by a factor (or two) of the sentence length. We validate the implementation of our framework through runtime experiments. We find our algorithms are up to 12 and 26 times faster than previous algorithms for computing the Shannon entropy and the gradient of the generalized expectation objective, respectively .", "after_revision": "We propose a general framework for computing expectations in edge-factored, non-projective spanning-tree models. Our algorithms exploit a fundamental connection between gradients and expectations, which allows us to derive efficient algorithms. We motivate the development of our framework with several cautionary tales of previous research, which has developed numerous inefficient algorithms for computing expectations and their gradients. We demonstrate how our framework efficiently computes several quantities with known algorithms, including the Shannon entropy, the expected attachment score, and the generalized expectation criterion . As a bonus, we give algorithms for quantities that are missing in the literature, including the gradient of entropy, the KL divergence, and the gradient of the KL divergence . In all cases, our approach matches the efficiency of existing algorithms and, in several cases, reduces the runtime complexity by a factor of the sentence length. We validate our framework through rigorous proofs of correctness and efficiency .", "edit_actions": [{"type": "R", "before": "give", "after": "propose", "start_char_pos": 3, "end_char_pos": 7}, {"type": "R", "before": "inference in spanning tree models. We propose unified algorithms for the important cases of first-order expectations and second-order expectations", "after": "computing expectations", "start_char_pos": 32, "end_char_pos": 178}, {"type": "D", "before": "These algorithms are easy to implement, given the prevalence of automatic differentiation software.", "after": null, "start_char_pos": 366, "end_char_pos": 465}, {"type": "R", "before": "cautionary tales", "after": "cautionary tales", "start_char_pos": 524, "end_char_pos": 540}, {"type": "R", "before": "less-than-optimal", "after": "inefficient", "start_char_pos": 592, "end_char_pos": 609}, {"type": "A", "before": null, "after": "Shannon entropy, the", "start_char_pos": 779, "end_char_pos": 779}, {"type": "R", "before": "entropy, and generalized expectation criteria", "after": "and the generalized expectation criterion", "start_char_pos": 807, "end_char_pos": 852}, {"type": "R", "before": "KL divergence", "after": "gradient of entropy, the KL divergence, and the gradient of the KL divergence", "start_char_pos": 951, "end_char_pos": 964}, {"type": "D", "before": "(or two)", "after": null, "start_char_pos": 1106, "end_char_pos": 1114}, {"type": "D", "before": "the implementation of", "after": null, "start_char_pos": 1151, "end_char_pos": 1172}, {"type": "R", "before": "runtime experiments. We find our algorithms are up to 12 and 26 times faster than previous algorithms for computing the Shannon entropy and the gradient of the generalized expectation objective, respectively", "after": "rigorous proofs of correctness and efficiency", "start_char_pos": 1195, "end_char_pos": 1402}], "sents_char_pos": [0, 66, 233, 365, 465, 668, 854, 966, 1138, 1215]}
+{"doc_id": "2008.12988", "revision_depth": "3", "before_revision": "We propose a general framework for computing expectations in edge-factored, non-projective spanning-tree models. Our algorithms exploit a fundamental connection between gradients and expectations, which allows us to derive efficient algorithms. We motivate the development of our framework with several cautionary tales of previous research, which has developed numerous inefficient algorithms for computing expectations and their gradients. We demonstrate how our framework efficiently computes several quantities with known algorithms, including the Shannon entropy, the expected attachment score, and the generalized expectation criterion . As a bonus, we give algorithms for quantities that are missing in the literature, including the gradient of entropy, the KL divergence, and the gradient of the KL divergence . In all cases, our approach matches the efficiency of existing algorithms and, in several cases, reduces the runtime complexity by a factor of the sentence length. We validate our framework through rigorous proofs of correctness and efficiency .", "after_revision": "We give a general framework for inference in spanning tree models. We propose unified algorithms for the important cases of first-order expectations and second-order expectations in edge-factored, non-projective spanning-tree models. Our algorithms exploit a fundamental connection between gradients and expectations, which allows us to derive efficient algorithms. These algorithms are easy to implement with or without automatic differentiation software. We motivate the development of our framework with several cautionary tales of previous research, which has developed numerous inefficient algorithms for computing expectations and their gradients. We demonstrate how our framework efficiently computes several quantities with known algorithms, including the expected attachment score, entropy, and generalized expectation criteria . As a bonus, we give algorithms for quantities that are missing in the literature, including the KL divergence . In all cases, our approach matches the efficiency of existing algorithms and, in several cases, reduces the runtime complexity by a factor of the sentence length. We validate the implementation of our framework through runtime experiments. We find our algorithms are up to 15 and 9 times faster than previous algorithms for computing the Shannon entropy and the gradient of the generalized expectation objective, respectively .", "edit_actions": [{"type": "R", "before": "propose", "after": "give", "start_char_pos": 3, "end_char_pos": 10}, {"type": "R", "before": "computing expectations", "after": "inference in spanning tree models. We propose unified algorithms for the important cases of first-order expectations and second-order expectations", "start_char_pos": 35, "end_char_pos": 57}, {"type": "A", "before": null, "after": "These algorithms are easy to implement with or without automatic differentiation software.", "start_char_pos": 245, "end_char_pos": 245}, {"type": "D", "before": "Shannon entropy, the", "after": null, "start_char_pos": 553, "end_char_pos": 573}, {"type": "R", "before": "and the generalized expectation criterion", "after": "entropy, and generalized expectation criteria", "start_char_pos": 601, "end_char_pos": 642}, {"type": "R", "before": "gradient of entropy, the KL divergence, and the gradient of the KL divergence", "after": "KL divergence", "start_char_pos": 741, "end_char_pos": 818}, {"type": "A", "before": null, "after": "the implementation of", "start_char_pos": 996, "end_char_pos": 996}, {"type": "R", "before": "rigorous proofs of correctness and efficiency", "after": "runtime experiments. We find our algorithms are up to 15 and 9 times faster than previous algorithms for computing the Shannon entropy and the gradient of the generalized expectation objective, respectively", "start_char_pos": 1019, "end_char_pos": 1064}], "sents_char_pos": [0, 112, 244, 442, 644, 820, 983]}
+{"doc_id": "2009.00029", "revision_depth": "1", "before_revision": "Semantic segmentation of neuronal structures in 3D high-resolution fluorescence microscopy imaging of the human brain cortexcan take advantage of bidimensional CNNs, which yield good resultsin neuron localization but lead to inaccurate surface reconstruction. 3DCNNs on the other hand would require manually annotated volumet-ric data on a large scale , and hence considerable human effort. Semi-supervised alternative strategies which make use only of sparse anno-tations suffer from longer training times and achieved models tend tohave increased capacity compared to 2D CNNs, needing more groundtruth data to attain similar results. To overcome these issues we proposea two-phase strategy for training native 3D CNN models on sparse 2Dannotations where missing labels are inferred by a 2D CNN model andcombined with manual annotations in a weighted manner during losscalculation .", "after_revision": "Semantic segmentation of neuronal structures in 3D high-resolution fluorescence microscopy imaging of the human brain cortex can take advantage of bidimensional CNNs, which yield good results in neuron localization but lead to inaccurate surface reconstruction. 3D CNNs, on the other hand , would require manually annotated volumetric data on a large scale and hence considerable human effort. Semi-supervised alternative strategies which make use only of sparse annotations suffer from longer training times and achieved models tend to have increased capacity compared to 2D CNNs, needing more ground truth data to attain similar results. To overcome these issues we propose a two-phase strategy for training native 3D CNN models on sparse 2D annotations where missing labels are inferred by a 2D CNN model and combined with manual annotations in a weighted manner during loss calculation .", "edit_actions": [{"type": "R", "before": "cortexcan", "after": "cortex can", "start_char_pos": 118, "end_char_pos": 127}, {"type": "R", "before": "resultsin", "after": "results in", "start_char_pos": 183, "end_char_pos": 192}, {"type": "R", "before": "3DCNNs", "after": "3D CNNs,", "start_char_pos": 260, "end_char_pos": 266}, {"type": "A", "before": null, "after": ",", "start_char_pos": 285, "end_char_pos": 285}, {"type": "R", "before": "volumet-ric", "after": "volumetric", "start_char_pos": 319, "end_char_pos": 330}, {"type": "D", "before": ",", "after": null, "start_char_pos": 353, "end_char_pos": 354}, {"type": "R", "before": "anno-tations", "after": "annotations", "start_char_pos": 461, "end_char_pos": 473}, {"type": "R", "before": "tohave", "after": "to have", "start_char_pos": 533, "end_char_pos": 539}, {"type": "R", "before": "groundtruth", "after": "ground truth", "start_char_pos": 593, "end_char_pos": 604}, {"type": "R", "before": "proposea", "after": "propose a", "start_char_pos": 665, "end_char_pos": 673}, {"type": "R", "before": "2Dannotations", "after": "2D annotations", "start_char_pos": 737, "end_char_pos": 750}, {"type": "R", "before": "andcombined", "after": "and combined", "start_char_pos": 803, "end_char_pos": 814}, {"type": "R", "before": "losscalculation", "after": "loss calculation", "start_char_pos": 867, "end_char_pos": 882}], "sents_char_pos": [0, 259, 391, 636]}
+{"doc_id": "2009.00805", "revision_depth": "1", "before_revision": "Motivation Machine learning methods for predicting compounds protein interactions (CPIs) are crucial for the in-silico screening step of drug discovery. In recent years , many end-to-end representation learning methods using deep neural networks have achieved significantly better performance than traditional machine learning algorithms. Much effort has been paid on improving the capability of the model by taking advantage of neural attention mechanism , either in learning compound representation, or learning the interaction between protein representation and compound representation . However, seldom has been done to improve the protein representation learning, while current approaches have manifest flaw of lacking the ability of learning amino acids long-distance interactions , which are essential for determine the proteins properties due to protein folding. Results The authors propose a novel approach for incorporating self-attention in the protein representation learning module of CPI models, providing the module with the capability of capturing long-distance interaction information within proteins. And such approach can be universally applied to nearly any deep learning models or submodels for protein representationlearning. By applying such approach on an existing CPI model, the modified version, with our proposed Protein Transformer as its protein learning module, has a significant improvement in the prediction performance . Practical tips for training Protein Transformer are also provided .", "after_revision": "The prediction of protein interactions (CPIs) is crucial for the in-silico screening step in drug discovery. Recently , many end-to-end representation learning methods using deep neural networks have achieved significantly better performance than traditional machine learning algorithms. Much effort has focused on the compound representation or the information extraction from the compound-protein interaction to improve the model capability by taking the advantage of the neural attention mechanism . However, previous studies have paid little attention to representing the protein sequences, in which the long-range interactions of residue pairs are essential for characterizing the structural properties arising from the protein folding. We incorporate the self-attention mechanism into the protein representation module for CPI modeling, which aims at capturing the long-range interaction information within proteins. The proposed module concerning protein representation, called Protein Transformer, with an integration with an existing CPI model, has shown a significant improvement in the prediction performance when compared with several existing CPI models .", "edit_actions": [{"type": "R", "before": "Motivation Machine learning methods for predicting compounds", "after": "The prediction of", "start_char_pos": 0, "end_char_pos": 60}, {"type": "R", "before": "are", "after": "is", "start_char_pos": 89, "end_char_pos": 92}, {"type": "R", "before": "of", "after": "in", "start_char_pos": 134, "end_char_pos": 136}, {"type": "R", "before": "In recent years", "after": "Recently", "start_char_pos": 153, "end_char_pos": 168}, {"type": "R", "before": "been paid on improving the capability of the model by taking advantage of", "after": "focused on the compound representation or the information extraction from the compound-protein interaction to improve the model capability by taking the advantage of the", "start_char_pos": 355, "end_char_pos": 428}, {"type": "D", "before": ", either in learning compound representation, or learning the interaction between protein representation and compound representation", "after": null, "start_char_pos": 456, "end_char_pos": 588}, {"type": "R", "before": "seldom has been done to improve the protein representation learning, while current approaches have manifest flaw of lacking the ability of learning amino acids long-distance interactions , which", "after": "previous studies have paid little attention to representing the protein sequences, in which the long-range interactions of residue pairs", "start_char_pos": 600, "end_char_pos": 794}, {"type": "R", "before": "determine the proteins properties due to", "after": "characterizing the structural properties arising from the", "start_char_pos": 813, "end_char_pos": 853}, {"type": "R", "before": "Results The authors propose a novel approach for incorporating", "after": "We incorporate the", "start_char_pos": 871, "end_char_pos": 933}, {"type": "R", "before": "in", "after": "mechanism into", "start_char_pos": 949, "end_char_pos": 951}, {"type": "R", "before": "learning module of CPI models, providing the module with the capability of capturing long-distance", "after": "module for CPI modeling, which aims at capturing the long-range", "start_char_pos": 979, "end_char_pos": 1077}, {"type": "R", "before": "And such approach can be universally applied to nearly any deep learning models or submodels for protein representationlearning. By applying such approach on an", "after": "The proposed module concerning protein representation, called Protein Transformer, with an integration with an", "start_char_pos": 1119, "end_char_pos": 1279}, {"type": "R", "before": "the modified version, with our proposed Protein Transformer as its protein learning module, has", "after": "has shown", "start_char_pos": 1300, "end_char_pos": 1395}, {"type": "R", "before": ". Practical tips for training Protein Transformer are also provided", "after": "when compared with several existing CPI models", "start_char_pos": 1452, "end_char_pos": 1519}], "sents_char_pos": [0, 152, 338, 590, 870, 1118, 1247]}
+{"doc_id": "2009.01012", "revision_depth": "1", "before_revision": "Data dependent triangulations are triangulations of point sets in the plane that are computed under consideration not only of the points' x- and y-coordinates but also of additional data (e.g. , elevation ). In particular, min-error criteria have been suggested to compute triangulations that approximate a given surface. In this article, we show how data dependent triangulations with min-error criteria can be used to reconstruct a dynamic surface over a longer time period if height values are continuously monitored at a sparse set of stations and, additionally for few epochs or a single one an accurate reference surface is given. The basic idea is to learn an height-optimal triangulation based on the available reference data and to use the learned triangulation to compute piece-wise linear surface models for epochs in which only the observations of the monitoring stations are given. In addition, we combine our approach of height-optimal triangulation with k-order Delaunay triangulation to stabilize the triangles geometrically. We consider these approaches particularly useful for reconstructing the historical evolution of a sea surface by combining tide-gauge measurements with data of modern satellite altimetry. We show how to learn a height-optimal triangulation and a k-order height-optimal triangulation using an exact algorithm based on integer linear programming and evaluate our approaches both with respect to its running times and the quality of the reconstructions in contrast to a solution by a Delaunay triangulationwhich has earlier been used for sea-surface modeling. For existing data of the North Sea we show that we can better reconstruct the dynamic sea surface for about 156 months back in time using the height-optimal triangulation than the Delaunay triangulation and even for about 180 months using the k-order height-optimal triangulation for k=2.", "after_revision": "Reconstructions of sea level prior to the satellite altimeter era are usually derived from tide gauge records; however most algorithms for this assume that modes of sea level variability are stationary which is not true over several decades. Here we suggest a method that is based on optimized data-dependent triangulations of the network of gauge stations. Data-dependent triangulations are triangulations of point sets that rely not only on 2D point positions but also on additional data (e.g. elevation, anomalies ). In this article, we show how data-dependent triangulations with min-error criteria can be used to reconstruct 2D maps of the sea surface anomaly over a longer time period , assuming that height anomalies are continuously monitored at a sparse set of stations and, in addition, observations of a reference surface is provided over a shorter time period. At the heart of our method is the idea to learn a min-error triangulation based on the available reference data , and to use the learned triangulation subsequently to compute piece-wise linear surface models for epochs in which only observations from monitoring stations are given. We combine our approach of min-error triangulation with k-order Delaunay triangulation to stabilize the triangles geometrically. We show that this approach is advantageous for the reconstruction of the sea surface by combining tide gauge measurements with data of modern satellite altimetry. We show how to learn a min-error triangulation and a min-error k-order Delaunay triangulation using integer linear programming . We confront our reconstructions against the Delaunay triangulation. With real data for the North Sea we show that the min-error triangulation outperforms the Delaunay method significantly for reconstructions back in time up to 18 years, and the k-order Delaunay min-error triangulation even up to 21 years for k=2.", "edit_actions": [{"type": "R", "before": "Data dependent triangulations", "after": "Reconstructions of sea level prior to the satellite altimeter era are usually derived from tide gauge records; however most algorithms for this assume that modes of sea level variability are stationary which is not true over several decades. Here we suggest a method that is based on optimized data-dependent triangulations of the network of gauge stations. Data-dependent triangulations", "start_char_pos": 0, "end_char_pos": 29}, {"type": "R", "before": "in the plane that are computed under consideration not only of the points' x- and y-coordinates but also of", "after": "that rely not only on 2D point positions but also on", "start_char_pos": 63, "end_char_pos": 170}, {"type": "R", "before": ", elevation", "after": "elevation, anomalies", "start_char_pos": 193, "end_char_pos": 204}, {"type": "D", "before": "particular, min-error criteria have been suggested to compute triangulations that approximate a given surface. In", "after": null, "start_char_pos": 211, "end_char_pos": 324}, {"type": "R", "before": "data dependent", "after": "data-dependent", "start_char_pos": 351, "end_char_pos": 365}, {"type": "R", "before": "a dynamic surface", "after": "2D maps of the sea surface anomaly", "start_char_pos": 432, "end_char_pos": 449}, {"type": "R", "before": "if height values", "after": ", assuming that height anomalies", "start_char_pos": 476, "end_char_pos": 492}, {"type": "R", "before": "additionally for few epochs or a single one an accurate", "after": "in addition, observations of a", "start_char_pos": 553, "end_char_pos": 608}, {"type": "R", "before": "given. The basic idea is to learn an height-optimal", "after": "provided over a shorter time period. At the heart of our method is the idea to learn a min-error", "start_char_pos": 630, "end_char_pos": 681}, {"type": "A", "before": null, "after": ",", "start_char_pos": 734, "end_char_pos": 734}, {"type": "A", "before": null, "after": "subsequently", "start_char_pos": 772, "end_char_pos": 772}, {"type": "R", "before": "the observations of the", "after": "observations from", "start_char_pos": 842, "end_char_pos": 865}, {"type": "R", "before": "In addition, we", "after": "We", "start_char_pos": 897, "end_char_pos": 912}, {"type": "R", "before": "height-optimal", "after": "min-error", "start_char_pos": 937, "end_char_pos": 951}, {"type": "R", "before": "consider these approaches particularly useful for reconstructing the historical evolution of a", "after": "show that this approach is advantageous for the reconstruction of the", "start_char_pos": 1047, "end_char_pos": 1141}, {"type": "R", "before": "tide-gauge", "after": "tide gauge", "start_char_pos": 1167, "end_char_pos": 1177}, {"type": "R", "before": "height-optimal", "after": "min-error", "start_char_pos": 1255, "end_char_pos": 1269}, {"type": "A", "before": null, "after": "min-error", "start_char_pos": 1290, "end_char_pos": 1290}, {"type": "R", "before": "height-optimal triangulation using an exact algorithm based on", "after": "Delaunay triangulation using", "start_char_pos": 1299, "end_char_pos": 1361}, {"type": "R", "before": "and evaluate our approaches both with respect to its running times and the quality of the reconstructions in contrast to a solution by a Delaunay triangulationwhich has earlier been used for sea-surface modeling. For existing data of", "after": ". We confront our reconstructions against the Delaunay triangulation. With real data for", "start_char_pos": 1389, "end_char_pos": 1622}, {"type": "R", "before": "we can better reconstruct the dynamic sea surface for about 156 months", "after": "the min-error triangulation outperforms the Delaunay method significantly for reconstructions", "start_char_pos": 1650, "end_char_pos": 1720}, {"type": "R", "before": "using the height-optimal triangulation than the Delaunay triangulation and even for about 180 months using", "after": "up to 18 years, and", "start_char_pos": 1734, "end_char_pos": 1840}, {"type": "R", "before": "height-optimal triangulation", "after": "Delaunay min-error triangulation even up to 21 years", "start_char_pos": 1853, "end_char_pos": 1881}], "sents_char_pos": [0, 207, 321, 636, 896, 1043, 1231, 1601]}
+{"doc_id": "2009.02467", "revision_depth": "1", "before_revision": "We propose a new binary classification model in Machine Learning, called Phase Separation Binary Classifier (PSBC). It consists of a discretization of a nonlinear reaction-diffusion equation (the Allen-Cahn equation), coupled with an ODE . Unlike many feedforward networks that are said to mimic brain or cortical cells functioning, the PSBC is inspired by fluid behavior, namely, on how binary fluids phase separate. Thus, (hyper)parameters have physical meaning, whose effects are carefully studied in several different scenarios : for instance, diffusion introduces interaction among features, whereas reaction plays an active role in classification . PSBC's coefficients are trainable weights, chosen according to a minimization problem using Gradient Descent; optimization relies on a classical Backpropagation Algorithm using weight sharing. Moreover, the model can be seen under the framework of feedforward networks, and is endowed with a nonlinear activation function that is linear in trainable weights but polynomial in other variables . In view of the model's connection with ODEs and parabolic PDEs, forward propagation amounts to an initial value problem. Thus, stability conditions are established through meshgrid constraints, discrete maximum principles, and, overall, exploiting the concept of Invariant regions , as developed in the work of Chueh, Conway, Smoller, and particularly in the application of their theory to finite-difference methods in the work of Hoff. The PSBC also has interesting model compression properties which are thoroughly discussed. We apply the model to the subset of numbers \"0\" and \"1\" of the classical MNIST database, where we are able to discern individuals from both classes with more than 94\\\\%DIF < accuracy, sometimes using less than 80 variables, a feature that is out of reach of Artificial Neural Networks without weight sharing or feature engineering.\\end{abstract} %DIF > accuracy, sometimes using less only about 10\\\\% of variables.", "after_revision": "We propose a new binary classification model called Phase Separation Binary Classifier (PSBC). It consists of a discretization of a nonlinear reaction-diffusion equation coupled with an ODE , and is inspired by fluid behavior, namely, on how binary fluids phase separate. Hence, parameters and hyperparameters have physical meaning, whose effects are carefully studied in several different scenarios . PSBC's coefficients are trainable weights, chosen according to a minimization problem using Gradient Descent; optimization relies on a classical Backpropagation with weight sharing. The model can be seen under the framework of feedforward networks, and is endowed with a nonlinear activation function that is linear in trainable weights but polynomial in other variables , yielding a cost function that is also polynomial . In view of the model's connection with ODEs and parabolic PDEs, forward propagation amounts to an initial value problem. Thus, stability conditions are established using the concept of Invariant regions . Interesting model compression properties are thoroughly discussed. We illustrate the classifier's qualities by applying it to the subset of numbers \"0\" and \"1\" of the classical MNIST database, where we are able to discern individuals with more than 94\\\\%DIF < accuracy, sometimes using less than 80 variables, a feature that is out of reach of Artificial Neural Networks without weight sharing or feature engineering.\\end{abstract} %DIF > accuracy, sometimes using less only about 10\\\\% of variables.", "edit_actions": [{"type": "D", "before": "in Machine Learning,", "after": null, "start_char_pos": 45, "end_char_pos": 65}, {"type": "D", "before": "(the Allen-Cahn equation),", "after": null, "start_char_pos": 191, "end_char_pos": 217}, {"type": "R", "before": ". Unlike many feedforward networks that are said to mimic brain or cortical cells functioning, the PSBC", "after": ", and", "start_char_pos": 238, "end_char_pos": 341}, {"type": "R", "before": "Thus, (hyper)parameters", "after": "Hence, parameters and hyperparameters", "start_char_pos": 418, "end_char_pos": 441}, {"type": "D", "before": ": for instance, diffusion introduces interaction among features, whereas reaction plays an active role in classification", "after": null, "start_char_pos": 532, "end_char_pos": 652}, {"type": "R", "before": "Algorithm using", "after": "with", "start_char_pos": 816, "end_char_pos": 831}, {"type": "R", "before": "Moreover, the", "after": "The", "start_char_pos": 848, "end_char_pos": 861}, {"type": "A", "before": null, "after": ", yielding a cost function that is also polynomial", "start_char_pos": 1047, "end_char_pos": 1047}, {"type": "R", "before": "through meshgrid constraints, discrete maximum principles, and, overall, exploiting", "after": "using", "start_char_pos": 1214, "end_char_pos": 1297}, {"type": "R", "before": ", as developed in the work of Chueh, Conway, Smoller, and particularly in the application of their theory to finite-difference methods in the work of Hoff. The PSBC also has interesting", "after": ". Interesting", "start_char_pos": 1331, "end_char_pos": 1516}, {"type": "D", "before": "which", "after": null, "start_char_pos": 1546, "end_char_pos": 1551}, {"type": "R", "before": "apply the model", "after": "illustrate the classifier's qualities by applying it", "start_char_pos": 1581, "end_char_pos": 1596}, {"type": "D", "before": "from both classes", "after": null, "start_char_pos": 1708, "end_char_pos": 1725}], "sents_char_pos": [0, 115, 239, 417, 764, 847, 1049, 1170, 1486, 1577, 1909]}
+{"doc_id": "2009.04216", "revision_depth": "1", "before_revision": "Emotions are a central key for understanding human beings and of fun-damental importance regarding their impact in human and animal behaviors. They have been for a long time a subject of study for various scholars includ-ing in particular philosophers and mystics 29, 5, 7, 36, 35, 22, 27, 31 . Inmodern science, the emotional phenomenon has attracted for a few decadesan increasing number of studies, notably in the fields of Psychology, Psy-chiatry , Neuroscience and Biochemistry 1, 3, 2, 9, 11, 17, 16, 19, 20, 23,24, 25, 26, 32, 34 . However, since our perception of emotions is not, sofar , directly detectable nor recordable by our measure instruments, Physicsand Mathematics have not been so far used academically to provide a pre-cise description of the phenomenon of feeling an emotion. Relying upon theworks of O. Elahi 10, 14 and on the hypothesis that the human soul and itspsyche may manifest in ourselves (in both conscious and unconscious man-ner ) in an analog way as electromagnetic waves 13 , we propose here a fewmathematical descriptions consistent with the human personal experience, of the feeling and cognition of emotions. As far as we know, such a mathe-matical description has never been provided before. It allows a quantitative (intensity) and qualitative (nature of feelings/frequency) of the emotionalphenomenon which provides a novel scientific approach of the nature of the mind, complementary to the on going research of physiological manifesta-tion of emotions. We anticipate such an approach and the associated math-ematical modeling to become an important tool to describe emotions andtheir subsequent behavior. In complement of the modeling of oscillationsand brain dynamics 4, 8 , 28 , it provides a fruitful direction of research withpotentially broad and deep impacts in both applied mathematics, physics, cognitive and behavioral sciences.", "after_revision": "Emotions are a central key for understanding human beings and of fundamental importance regarding their impact in human and animal behaviors. They have been for a long time a subject of study for various scholars including in particular philosophers and mystics . In modern science, the emotional phenomenon has attracted for a few decades an increasing number of studies, notably in the fields of Psychology, Psychiatry , Neuroscience and Biochemistry . However, since our perception of emotions is not, so far , directly detectable nor recordable by our measure instruments, Physics and Mathematics have not been so far used academically to provide a precise description of the phenomenon of feeling an emotion. Relying upon the works of O. Elahi and on the hypothesis that the human soul and its psyche may manifest in ourselves (in both conscious and unconscious manner ) in an analog way as electromagnetic waves , we propose here a few mathematical descriptions consistent with the human personal experience, of the feeling and cognition of emotions. As far as we know, such a mathematical description has never been provided before. It allows a quantitative (intensity) and qualitative (nature of feelings/frequency) of the emotional phenomenon which provides a novel scientific approach of the nature of the mind, complementary to the on going research of physiological manifestation of emotions. We anticipate such an approach and the associated mathematical modeling to become an important tool to describe emotions and their subsequent behavior. In complement of the modeling of oscillations and brain dynamics , it provides a fruitful direction of research with potentially broad and deep impacts in both applied mathematics, physics, cognitive and behavioral sciences.", "edit_actions": [{"type": "R", "before": "fun-damental", "after": "fundamental", "start_char_pos": 65, "end_char_pos": 77}, {"type": "R", "before": "includ-ing", "after": "including", "start_char_pos": 214, "end_char_pos": 224}, {"type": "D", "before": "29, 5, 7, 36, 35, 22, 27, 31", "after": null, "start_char_pos": 264, "end_char_pos": 292}, {"type": "R", "before": ". Inmodern", "after": ". In modern", "start_char_pos": 293, "end_char_pos": 303}, {"type": "R", "before": "decadesan", "after": "decades an", "start_char_pos": 362, "end_char_pos": 371}, {"type": "R", "before": "Psy-chiatry", "after": "Psychiatry", "start_char_pos": 439, "end_char_pos": 450}, {"type": "D", "before": "1, 3, 2, 9, 11, 17, 16, 19, 20, 23,24, 25, 26, 32, 34", "after": null, "start_char_pos": 483, "end_char_pos": 536}, {"type": "R", "before": "sofar", "after": "so far", "start_char_pos": 589, "end_char_pos": 594}, {"type": "R", "before": "Physicsand", "after": "Physics and", "start_char_pos": 660, "end_char_pos": 670}, {"type": "R", "before": "pre-cise", "after": "precise", "start_char_pos": 735, "end_char_pos": 743}, {"type": "R", "before": "theworks", "after": "the works", "start_char_pos": 810, "end_char_pos": 818}, {"type": "D", "before": "10, 14", "after": null, "start_char_pos": 831, "end_char_pos": 837}, {"type": "R", "before": "itspsyche", "after": "its psyche", "start_char_pos": 884, "end_char_pos": 893}, {"type": "R", "before": "man-ner", "after": "manner", "start_char_pos": 955, "end_char_pos": 962}, {"type": "D", "before": "13", "after": null, "start_char_pos": 1007, "end_char_pos": 1009}, {"type": "R", "before": "fewmathematical", "after": "few mathematical", "start_char_pos": 1030, "end_char_pos": 1045}, {"type": "R", "before": "mathe-matical", "after": "mathematical", "start_char_pos": 1174, "end_char_pos": 1187}, {"type": "R", "before": "emotionalphenomenon", "after": "emotional phenomenon", "start_char_pos": 1323, "end_char_pos": 1342}, {"type": "R", "before": "manifesta-tion", "after": "manifestation", "start_char_pos": 1469, "end_char_pos": 1483}, {"type": "R", "before": "math-ematical", "after": "mathematical", "start_char_pos": 1547, "end_char_pos": 1560}, {"type": "R", "before": "andtheir", "after": "and their", "start_char_pos": 1619, "end_char_pos": 1627}, {"type": "D", "before": "oscillationsand brain dynamics", "after": null, "start_char_pos": 1682, "end_char_pos": 1712}, {"type": "R", "before": "4, 8", "after": "oscillations and brain dynamics", "start_char_pos": 1713, "end_char_pos": 1717}, {"type": "D", "before": "28", "after": null, "start_char_pos": 1720, "end_char_pos": 1722}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1723, "end_char_pos": 1724}, {"type": "R", "before": "withpotentially", "after": "with potentially", "start_char_pos": 1770, "end_char_pos": 1785}], "sents_char_pos": [0, 142, 267, 281, 312, 796, 1147, 1231, 1496, 1648]}
+{"doc_id": "2009.05169", "revision_depth": "2", "before_revision": "We propose a novel method to sparsify attention in the Transformer model by learning to select the most-informative token representations during the training process, thus focusing on task-specific parts of the input. A reduction of quadratic time and memory complexity to sublinear was achieved due to a robust differentiable top-k operator. For example, our experiments on a challenging summarization task of long documents show that our method is much faster and up to 16 times more memory efficient while significantly outperforming both dense and state-of-the-art sparse transformer models. The method can be effortlessly applied to many models used in NLP and CV, simultaneously with other improvements since representation pooling addresses a different aspect of the attention's complexity problem .", "after_revision": "We propose a novel method to sparsify attention in the Transformer model by learning to select the most-informative token representations during the training process, thus focusing on task-specific parts of the input. A reduction of quadratic time and memory complexity to sublinear was achieved due to a robust trainable top-k operator. For example, our experiments on a challenging summarization task of long documents show that our method is over 3 times faster and up to 16 times more memory efficient while significantly outperforming both dense and state-of-the-art sparse transformer models. The method can be effortlessly applied to many models used in NLP and CV, simultaneously with other improvements .", "edit_actions": [{"type": "R", "before": "differentiable", "after": "trainable", "start_char_pos": 312, "end_char_pos": 326}, {"type": "R", "before": "much", "after": "over 3 times", "start_char_pos": 450, "end_char_pos": 454}, {"type": "D", "before": "since representation pooling addresses a different aspect of the attention's complexity problem", "after": null, "start_char_pos": 709, "end_char_pos": 804}], "sents_char_pos": [0, 217, 342, 595]}
+{"doc_id": "2009.05306", "revision_depth": "1", "before_revision": "Generalized Plane Waves (GPWs) were introduced to take advantage of Trefftz methods for problems modeled by variable coefficient equations. Despite the fact that GPWs do not satisfy the Trefftz property, i.e. they are not exact solutions to the governing equation, they instead satisfy a quasi-Trefftz property: they are only approximate solutions. They have been proved to lead to high order numerical methods, and the quasi-Trefftz property is critical for the numerical analysisof these methods . The present work introduces a new family of GPWs . The motivation to introduce these new GPWs, amplitude-based, lies in the poor behavior of the phase-based GPWs in the pre-asymptotic regime, which will be addressed by avoiding high degree polynomials within an exponential. The new ansatz is still based on a plane wave function, but it introduces higher order terms in the amplitude rather than the phase of the plane wave as was initially proposed. The new functions' construction and study of their interpolation properties follow the roadmap proposed in a previous work . For the sake of clarity, the first focus is on the two-dimensional Helmholtz equation with spatially varying wavenumber, and follows the extension to a range of operators allowing for anisotropy in the first and second order terms . Numerical simulations illustrate the theoretical study of the new quasi-Trefftz functions.", "after_revision": "Generalized Plane Waves (GPWs) were introduced to take advantage of Trefftz methods for problems modeled by variable coefficient equations. Despite the fact that GPWs do not satisfy the Trefftz property, i.e. they are not exact solutions to the governing equation, they instead satisfy a quasi-Trefftz property: they are only approximate solutions. They lead to high order numerical methods, and this quasi-Trefftz property is critical for their numerical analysis . The present work introduces a new family of GPWs , amplitude-based . The motivation lies in the poor behavior of the phase-based GPW approximations in the pre-asymptotic regime, which will be tamed by avoiding high degree polynomials within an exponential. The new ansatz is introduces higher order terms in the amplitude rather than the phase of a plane wave as was initially proposed. The new functions' construction and the study of their interpolation properties are guided by the roadmap proposed in 16 . For the sake of clarity, the first focus is on the two-dimensional Helmholtz equation with spatially-varying wavenumber. The extension to a range of operators allowing for anisotropy in the first and second order terms follows . Numerical simulations illustrate the theoretical study of the new quasi-Trefftz functions.", "edit_actions": [{"type": "D", "before": "have been proved to", "after": null, "start_char_pos": 354, "end_char_pos": 373}, {"type": "R", "before": "the", "after": "this", "start_char_pos": 416, "end_char_pos": 419}, {"type": "R", "before": "the numerical analysisof these methods", "after": "their numerical analysis", "start_char_pos": 459, "end_char_pos": 497}, {"type": "A", "before": null, "after": ", amplitude-based", "start_char_pos": 549, "end_char_pos": 549}, {"type": "D", "before": "to introduce these new GPWs, amplitude-based,", "after": null, "start_char_pos": 567, "end_char_pos": 612}, {"type": "R", "before": "GPWs", "after": "GPW approximations", "start_char_pos": 658, "end_char_pos": 662}, {"type": "R", "before": "addressed", "after": "tamed", "start_char_pos": 707, "end_char_pos": 716}, {"type": "D", "before": "still based on a plane wave function, but it", "after": null, "start_char_pos": 794, "end_char_pos": 838}, {"type": "R", "before": "the", "after": "a", "start_char_pos": 911, "end_char_pos": 914}, {"type": "A", "before": null, "after": "the", "start_char_pos": 989, "end_char_pos": 989}, {"type": "R", "before": "follow", "after": "are guided by", "start_char_pos": 1030, "end_char_pos": 1036}, {"type": "R", "before": "a previous work", "after": "16", "start_char_pos": 1061, "end_char_pos": 1076}, {"type": "R", "before": "spatially varying wavenumber, and follows the", "after": "spatially-varying wavenumber. The", "start_char_pos": 1170, "end_char_pos": 1215}, {"type": "A", "before": null, "after": "follows", "start_char_pos": 1310, "end_char_pos": 1310}], "sents_char_pos": [0, 139, 348, 499, 551, 775, 952, 1078]}
+{"doc_id": "2009.05732", "revision_depth": "1", "before_revision": "Without a cure, vaccine, or proven long-term immunity against SARS-CoV-2, test-trace-and-isolate (TTI) strategies present a promising tool to contain the viral spread. For any TTI strategy, however, a major challenge arises from pre- and asymptomatic transmission as well as TTI-avoiders, which contribute to hidden , unnoticed infection chains. In our semi-analytical model, we identified two distinct tipping points between controlled and uncontrolled spreading: one, at which the behavior-driven reproduction number of the hidden infections becomes too large to be compensated by the available TTI capabilities, and one at which the number of new infections starts to exceed the tracing capacity , causing a self-accelerating spread. We investigated how these tipping points depend on realistic limitations like limited cooperativity , missing contacts, and imperfect isolation , finding that TTI is likely not sufficient to contain the natural spread of SARS-CoV-2 . Therefore, complementary measures like reduced physical contacts and improved hygiene probably remain necessary.", "after_revision": "Without a cure, vaccine, or proven long-term immunity against SARS-CoV-2, test-trace-and-isolate (TTI) strategies present a promising tool to contain its spread. For any TTI strategy, however, mitigation is challenged by pre- and asymptomatic transmission , TTI-avoiders, and undetected spreaders, who strongly contribute to hidden infection chains. Here, we studied a semi-analytical model and identified two tipping points between controlled and uncontrolled spread: (1) the behavior-driven reproduction number of the hidden chains becomes too large to be compensated by the TTI capabilities, and (2) the number of new infections exceeds the tracing capacity . Both trigger a self-accelerating spread. We investigated how these tipping points depend on challenges like limited cooperation , missing contacts, and imperfect isolation . Our model results suggest that TTI alone is insufficient to contain an otherwise unhindered spread of SARS-CoV-2 , implying that complementary measures like social distancing and improved hygiene remain necessary.", "edit_actions": [{"type": "R", "before": "the viral", "after": "its", "start_char_pos": 150, "end_char_pos": 159}, {"type": "R", "before": "a major challenge arises from", "after": "mitigation is challenged by", "start_char_pos": 199, "end_char_pos": 228}, {"type": "R", "before": "as well as", "after": ",", "start_char_pos": 264, "end_char_pos": 274}, {"type": "R", "before": "which", "after": "and undetected spreaders, who strongly", "start_char_pos": 289, "end_char_pos": 294}, {"type": "D", "before": ", unnoticed", "after": null, "start_char_pos": 316, "end_char_pos": 327}, {"type": "R", "before": "In our", "after": "Here, we studied a", "start_char_pos": 346, "end_char_pos": 352}, {"type": "R", "before": "model, we identified two distinct", "after": "model and identified two", "start_char_pos": 369, "end_char_pos": 402}, {"type": "R", "before": "spreading: one, at which", "after": "spread: (1)", "start_char_pos": 454, "end_char_pos": 478}, {"type": "R", "before": "infections", "after": "chains", "start_char_pos": 533, "end_char_pos": 543}, {"type": "D", "before": "available", "after": null, "start_char_pos": 587, "end_char_pos": 596}, {"type": "R", "before": "one at which", "after": "(2)", "start_char_pos": 619, "end_char_pos": 631}, {"type": "R", "before": "starts to exceed", "after": "exceeds", "start_char_pos": 661, "end_char_pos": 677}, {"type": "R", "before": ", causing", "after": ". Both trigger", "start_char_pos": 699, "end_char_pos": 708}, {"type": "R", "before": "realistic limitations like limited cooperativity", "after": "challenges like limited cooperation", "start_char_pos": 788, "end_char_pos": 836}, {"type": "R", "before": ", finding that TTI is likely not sufficient to contain the natural", "after": ". Our model results suggest that TTI alone is insufficient to contain an otherwise unhindered", "start_char_pos": 881, "end_char_pos": 947}, {"type": "R", "before": ". Therefore,", "after": ", implying that", "start_char_pos": 969, "end_char_pos": 981}, {"type": "R", "before": "reduced physical contacts", "after": "social distancing", "start_char_pos": 1010, "end_char_pos": 1035}, {"type": "D", "before": "probably", "after": null, "start_char_pos": 1057, "end_char_pos": 1065}], "sents_char_pos": [0, 167, 345, 736]}
+{"doc_id": "2009.06375", "revision_depth": "1", "before_revision": "Twitter has become an important communication channel in times of emergency. The ubiquitousness of smartphones enables people to announce an emergency they're observing in real-time. Because of this , more agencies are interested in programatically monitoring Twitter (disaster URLanizations and news agencies) and therefore recognizing the informativeness of a tweet can help filter noise from large volumes of data . In this paper, we present our submission for WNUT-2020 Task 2: Identification of informative COVID-19 English Tweets. Our most successful model is an ensemble of transformers including RoBERTa, XLNet, and BERTweet trained in a semi-supervised experimental setting. The proposed system achieves a F1 score of 0.9011 on the test set (ranking 7th on the leaderboard) , and shows significant gains in performance compared to a baseline system using fasttext embeddings.", "after_revision": "Twitter and, in general, social media has become an indispensable communication channel in times of emergency. The ubiquitousness of smartphone gadgets enables people to declare an emergency observed in real-time. As a result , more agencies are interested in programmatically monitoring Twitter (disaster URLanizations and news agencies) . Therefore, recognizing the informativeness of a Tweet can help filter noise from the large volumes of Tweets . In this paper, we present our submission for WNUT-2020 Task 2: Identification of informative COVID-19 English Tweets. Our most successful model is an ensemble of transformers , including RoBERTa, XLNet, and BERTweet trained in a Semi-Supervised Learning (SSL) setting. The proposed system achieves an F1 score of 0.9011 on the test set (ranking 7th on the leaderboard) and shows significant gains in performance compared to a baseline system using FastText embeddings.", "edit_actions": [{"type": "A", "before": null, "after": "and, in general, social media", "start_char_pos": 8, "end_char_pos": 8}, {"type": "R", "before": "important", "after": "indispensable", "start_char_pos": 23, "end_char_pos": 32}, {"type": "R", "before": "smartphones", "after": "smartphone gadgets", "start_char_pos": 100, "end_char_pos": 111}, {"type": "R", "before": "announce an emergency they're observing", "after": "declare an emergency observed", "start_char_pos": 130, "end_char_pos": 169}, {"type": "R", "before": "Because of this", "after": "As a result", "start_char_pos": 184, "end_char_pos": 199}, {"type": "R", "before": "programatically", "after": "programmatically", "start_char_pos": 234, "end_char_pos": 249}, {"type": "R", "before": "and therefore", "after": ". Therefore,", "start_char_pos": 312, "end_char_pos": 325}, {"type": "R", "before": "tweet", "after": "Tweet", "start_char_pos": 363, "end_char_pos": 368}, {"type": "A", "before": null, "after": "the", "start_char_pos": 396, "end_char_pos": 396}, {"type": "R", "before": "data", "after": "Tweets", "start_char_pos": 414, "end_char_pos": 418}, {"type": "A", "before": null, "after": ",", "start_char_pos": 596, "end_char_pos": 596}, {"type": "R", "before": "semi-supervised experimental", "after": "Semi-Supervised Learning (SSL)", "start_char_pos": 649, "end_char_pos": 677}, {"type": "R", "before": "a", "after": "an", "start_char_pos": 716, "end_char_pos": 717}, {"type": "D", "before": ",", "after": null, "start_char_pos": 786, "end_char_pos": 787}, {"type": "R", "before": "fasttext", "after": "FastText", "start_char_pos": 867, "end_char_pos": 875}], "sents_char_pos": [0, 77, 183, 420, 538, 686]}
+{"doc_id": "2009.06383", "revision_depth": "1", "before_revision": "Models that are robust to aberrant choice behaviourhave received limited attention in discrete choice analysis . In this paper, we analyse two robust alternatives to the multinomial probit (MNP) model. Both alternative models belong to the family of robit models , whose kernel error distributions are heavy-tailed t-distributions . The first model is the multinomial robit (MNR) model in which a generic degrees of freedom parameter controls the heavy-tailedness of the kernel error distribution. The second alternative , the generalised multinomial robit (Gen-MNR) model, has not been studied in the literature before and is more flexible than MNR, as it allows for alternative-specific marginal heavy-tailedness of the kernel error distribution. For both models, we devise scalable and gradient-free Bayes estimators. We compare MNP, MNR and Gen-MNR in a simulation study and a case study on transport mode choice behaviour . We find that both MNR and Gen-MNR deliver significantly better in-sample fit and out-of-sample predictive accuracy than MNP. Gen-MNR outperforms MNR due to its more flexible kernel error distribution. Also, Gen-MNR gives more reasonable elasticity estimates than MNP and MNR , in particular regarding the demand for under-represented alternatives in a class-imbalanced dataset .", "after_revision": "Inferences of robust behavioural and statistical models are insensitive to outlying observations resulting from aberrant behaviour, misreporting and misclassification. Standard discrete choice models such as logit and probit lack robustness to outliers due to their rigid kernel error distributions . In this paper, we analyse two robust alternatives to the multinomial probit (MNP) model. The two models belong to the family of robit models whose kernel error distributions are heavy-tailed t-distributions which moderate the influence of outlying observations . The first model is the multinomial robit (MNR) model , in which a generic degrees of freedom parameter controls the heavy-tailedness of the kernel error distribution. The second model , the generalised multinomial robit (Gen-MNR) model, is more flexible than MNR, as it allows for distinct heavy-tailedness in each dimension of the kernel error distribution. For both models, we derive efficient Gibbs sampling schemes, which also allow for a straightforward inclusion of random parameters. In a simulation study, we illustrate the excellent finite sample properties of the proposed Bayes estimators and show that MNR and Gen-MNR produce more exact elasticity estimates if the choice data contain outliers through the lens of the non-robust MNP model. In a case study on transport mode choice behaviour , MNR and Gen-MNR outperform MNP by substantial margins in terms of in-sample fit and out-of-sample predictive accuracy . We also find that the benefits of the more flexible kernel error distributions underlying MNR and Gen-MNR are maintained in the presence of random heterogeneity .", "edit_actions": [{"type": "R", "before": "Models that are robust to aberrant choice behaviourhave received limited attention in discrete choice analysis", "after": "Inferences of robust behavioural and statistical models are insensitive to outlying observations resulting from aberrant behaviour, misreporting and misclassification. Standard discrete choice models such as logit and probit lack robustness to outliers due to their rigid kernel error distributions", "start_char_pos": 0, "end_char_pos": 110}, {"type": "R", "before": "Both alternative", "after": "The two", "start_char_pos": 202, "end_char_pos": 218}, {"type": "D", "before": ",", "after": null, "start_char_pos": 263, "end_char_pos": 264}, {"type": "A", "before": null, "after": "which moderate the influence of outlying observations", "start_char_pos": 331, "end_char_pos": 331}, {"type": "A", "before": null, "after": ",", "start_char_pos": 387, "end_char_pos": 387}, {"type": "R", "before": "alternative", "after": "model", "start_char_pos": 511, "end_char_pos": 522}, {"type": "D", "before": "has not been studied in the literature before and", "after": null, "start_char_pos": 576, "end_char_pos": 625}, {"type": "R", "before": "alternative-specific marginal", "after": "distinct", "start_char_pos": 670, "end_char_pos": 699}, {"type": "A", "before": null, "after": "in each dimension", "start_char_pos": 717, "end_char_pos": 717}, {"type": "R", "before": "devise scalable and gradient-free Bayes estimators. We compare MNP,", "after": "derive efficient Gibbs sampling schemes, which also allow for a straightforward inclusion of random parameters. In a simulation study, we illustrate the excellent finite sample properties of the proposed Bayes estimators and show that", "start_char_pos": 772, "end_char_pos": 839}, {"type": "R", "before": "in a simulation study and a", "after": "produce more exact elasticity estimates if the choice data contain outliers through the lens of the non-robust MNP model. In a", "start_char_pos": 856, "end_char_pos": 883}, {"type": "R", "before": ". We find that both", "after": ",", "start_char_pos": 930, "end_char_pos": 949}, {"type": "R", "before": "deliver significantly better", "after": "outperform MNP by substantial margins in terms of", "start_char_pos": 966, "end_char_pos": 994}, {"type": "R", "before": "than MNP. Gen-MNR outperforms MNR due to its", "after": ". We also find that the benefits of the", "start_char_pos": 1047, "end_char_pos": 1091}, {"type": "R", "before": "distribution. Also,", "after": "distributions underlying MNR and", "start_char_pos": 1119, "end_char_pos": 1138}, {"type": "R", "before": "gives more reasonable elasticity estimates than MNP and MNR , in particular regarding the demand for under-represented alternatives in a class-imbalanced dataset", "after": "are maintained in the presence of random heterogeneity", "start_char_pos": 1147, "end_char_pos": 1308}], "sents_char_pos": [0, 112, 201, 333, 499, 751, 823, 931, 1132]}
+{"doc_id": "2009.06401", "revision_depth": "1", "before_revision": "Recently, novel multi-hop models and datasets have been introduced to achieve more complex natural language reasoning with neural networks . One notable task that requires multi-hop reasoning is fact checking, where a chain of connected evidence pieces leads to the final verdict of a claim. However, existing datasets do not provide annotations for the gold evidence pieces, which is a critical aspect for improving the explainability of fact checking systems. The only exception is the FEVER dataset , which is artificially constructed based on Wikipedia and does not use naturally occurring political claims and evidence pages, which is more challenging. Most claims in FEVER only have one evidence sentence associated with them and require no reasoning to make label predictions -- the small number of instances with two evidence sentences only require simple reasoning . In this paper , we study how to perform more complex claim verification on naturally occurring claims with multiple hops over evidence chunks. We first construct a small annotated dataset, PolitiHop, of reasoning chains for claim verification . We then compare the dataset to other existing multi-hop datasets and study how to transfer knowledge from more extensive in- and out-of-domain resources to PolitiHop. We find that the task is complex , and achieve the best performance using an architecture that specifically models reasoning over evidence chains in combination with in-domain transfer learning.", "after_revision": "Recent work has proposed multi-hop models and datasets for studying complex natural language reasoning . One notable task requiring multi-hop reasoning is fact checking, where a set of connected evidence pieces leads to the final verdict of a claim. However, existing datasets either do not provide annotations for gold evidence pages, or the only dataset which does (FEVER) mostly consists of claims which can be fact-checked with simple reasoning and is constructed artificially. Here , we study more complex claim verification of naturally occurring claims with multiple hops over interconnected evidence chunks. We : 1) construct a small annotated dataset, PolitiHop, of evidence sentences for claim verification ; 2) compare it to existing multi-hop datasets ; and 3) study how to transfer knowledge from more extensive in- and out-of-domain resources to PolitiHop. We find that the task is complex and achieve the best performance with an architecture that specifically models reasoning over evidence pieces in combination with in-domain transfer learning.", "edit_actions": [{"type": "R", "before": "Recently, novel", "after": "Recent work has proposed", "start_char_pos": 0, "end_char_pos": 15}, {"type": "R", "before": "have been introduced to achieve more", "after": "for studying", "start_char_pos": 46, "end_char_pos": 82}, {"type": "D", "before": "with neural networks", "after": null, "start_char_pos": 118, "end_char_pos": 138}, {"type": "R", "before": "that requires", "after": "requiring", "start_char_pos": 158, "end_char_pos": 171}, {"type": "R", "before": "chain", "after": "set", "start_char_pos": 218, "end_char_pos": 223}, {"type": "A", "before": null, "after": "either", "start_char_pos": 319, "end_char_pos": 319}, {"type": "R", "before": "the gold evidence pieces, which is a critical aspect for improving the explainability of fact checking systems. The only exception is the FEVER dataset , which is artificially constructed based on Wikipedia and does not use naturally occurring political claims and evidence pages, which is more challenging. Most claims in FEVER only have one evidence sentence associated with them and require no reasoning to make label predictions -- the small number of instances with two evidence sentences only require simple reasoning . In this paper", "after": "gold evidence pages, or the only dataset which does (FEVER) mostly consists of claims which can be fact-checked with simple reasoning and is constructed artificially. Here", "start_char_pos": 351, "end_char_pos": 890}, {"type": "D", "before": "how to perform", "after": null, "start_char_pos": 902, "end_char_pos": 916}, {"type": "R", "before": "on", "after": "of", "start_char_pos": 949, "end_char_pos": 951}, {"type": "A", "before": null, "after": "interconnected", "start_char_pos": 1003, "end_char_pos": 1003}, {"type": "R", "before": "first", "after": ": 1)", "start_char_pos": 1024, "end_char_pos": 1029}, {"type": "R", "before": "reasoning chains", "after": "evidence sentences", "start_char_pos": 1081, "end_char_pos": 1097}, {"type": "R", "before": ". We then compare the dataset to other", "after": "; 2) compare it to", "start_char_pos": 1121, "end_char_pos": 1159}, {"type": "R", "before": "and", "after": "; and 3)", "start_char_pos": 1188, "end_char_pos": 1191}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1323, "end_char_pos": 1324}, {"type": "R", "before": "using", "after": "with", "start_char_pos": 1358, "end_char_pos": 1363}, {"type": "R", "before": "chains", "after": "pieces", "start_char_pos": 1429, "end_char_pos": 1435}], "sents_char_pos": [0, 140, 291, 462, 658, 876, 1020, 1122, 1289]}
+{"doc_id": "2009.06891", "revision_depth": "1", "before_revision": "Inspired by Google's Neural Machine Translation (NMT) \\mbox{%DIFAUXCMD Wu2016Google that models the one-to-one alignment in translation tasks with an optimal uniform attention distribution during the inference, this study proposes an attention-aware inference algorithm for Neural Abstractive Summarization (NAS) to regulate generated summaries to attend to source paragraphs/sentences with the optimal coverage. Unlike NMT, the attention-aware inference of NAS requires the prediction of the optimal attention distribution. Therefore, an attention-prediction model is constructed to learn the dependency between attention weights and sources. To apply the attention-aware inference on multi-document summarization, a Hierarchical Transformer (HT) is developed to accept lengthy inputs at the same time project cross-document information. Experiments on WikiSum \\mbox{%DIFAUXCMD liu2018generating By refining the regular beam search with the attention-aware inference , significant improvements on the quality of summaries could be further observed. Last but not the least, the attention-aware inference could be adopted to single-document summarization with straightforward modifications according to the model architecture .", "after_revision": "Inspired by Google's Neural Machine Translation (NMT) that models the one-to-one alignment in translation tasks with an uniform attention distribution during the inference, this study proposes an attention-aware inference algorithm for Neural Abstractive Summarization (NAS) to regulate generated summaries to attend to source contents with the optimal coverage. Unlike NMT, NAS is not based on one-to-one transformation. Instead, its attention distribution for the input should be irregular and depend on the content layout of the source documents. To address this matter, we construct an attention-prediction model to learn the dependency between the optimal attention distribution and the source. By refining the vanilla beam search with the attention-aware mechanism , significant improvements on the quality of summaries could be observed. Last but not the least, the attention-aware inference has strong universality that can be easily adopted to different hierarchical summarization models to promote the models' performance .", "edit_actions": [{"type": "D", "before": "\\mbox{%DIFAUXCMD Wu2016Google", "after": null, "start_char_pos": 54, "end_char_pos": 83}, {"type": "D", "before": "optimal", "after": null, "start_char_pos": 150, "end_char_pos": 157}, {"type": "R", "before": "paragraphs/sentences", "after": "contents", "start_char_pos": 365, "end_char_pos": 385}, {"type": "R", "before": "the attention-aware inference of NAS requires the prediction of the optimal attention distribution. Therefore,", "after": "NAS is not based on one-to-one transformation. Instead, its attention distribution for the input should be irregular and depend on the content layout of the source documents. To address this matter, we construct", "start_char_pos": 425, "end_char_pos": 535}, {"type": "D", "before": "is constructed", "after": null, "start_char_pos": 566, "end_char_pos": 580}, {"type": "R", "before": "attention weights and sources. To apply the attention-aware inference on multi-document summarization, a Hierarchical Transformer (HT) is developed to accept lengthy inputs at the same time project cross-document information. Experiments on WikiSum \\mbox{%DIFAUXCMD liu2018generating", "after": "the optimal attention distribution and the source.", "start_char_pos": 613, "end_char_pos": 896}, {"type": "R", "before": "regular", "after": "vanilla", "start_char_pos": 913, "end_char_pos": 920}, {"type": "R", "before": "inference", "after": "mechanism", "start_char_pos": 958, "end_char_pos": 967}, {"type": "D", "before": "further", "after": null, "start_char_pos": 1032, "end_char_pos": 1039}, {"type": "R", "before": "could be adopted to single-document summarization with straightforward modifications according to the model architecture", "after": "has strong universality that can be easily adopted to different hierarchical summarization models to promote the models' performance", "start_char_pos": 1104, "end_char_pos": 1224}], "sents_char_pos": [0, 412, 524, 643, 838, 1049]}
+{"doc_id": "2009.06891", "revision_depth": "2", "before_revision": "Inspired by Google's Neural Machine Translation (NMT) that models the one-to-one alignment in translation tasks with an uniform attention distribution during the inference, this study proposes an attention-aware inference algorithm for Neural Abstractive Summarization (NAS) to regulate generated summaries to attend to source contents with the optimal coverage. Unlike NMT, NAS is not based on one-to-one transformation. Instead, its attention distribution for the input should be irregular and depend on the content layout of the source documents. To address this matter, we construct an attention-prediction model to learn the dependency between the optimal attention distribution and the source . By refining the vanilla beam searchwith the attention-aware mechanism, significant improvements on the quality of summaries could be observed. Last but not the least, the attention-aware inference has strong universality that can be easily adopted to different hierarchical summarization models to promote the models' performance .", "after_revision": "This paper proposes a novel inference algorithm for seq-to-seq models. It corrects beam search step-by-step via the optimal attention distribution to make the generated text attend to source tokens in a controlled way. Experiments show the proposed attention-aware inference produces summaries rather differently from the beam search, and achieves promising improvements of higher scores and greater conciseness. The algorithm is also proven robust as it remains to outperform beam search significantly even with corrupted attention distributions .", "edit_actions": [{"type": "R", "before": "Inspired by Google's Neural Machine Translation (NMT) that models the one-to-one alignment in translation tasks with an uniform attention distribution during the inference, this study proposes an attention-aware", "after": "This paper proposes a novel", "start_char_pos": 0, "end_char_pos": 211}, {"type": "R", "before": "Neural Abstractive Summarization (NAS) to regulate generated summaries to attend to source contents with the optimal coverage. Unlike NMT, NAS is not based on one-to-one transformation. Instead, its attention distribution for the input should be irregular and depend on the content layout of the source documents. To address this matter, we construct an attention-prediction model to learn the dependency between the optimal attention distribution and the source . By refining the vanilla beam searchwith the", "after": "seq-to-seq models. It corrects beam search step-by-step via the optimal attention distribution to make the generated text attend to source tokens in a controlled way. Experiments show the proposed", "start_char_pos": 236, "end_char_pos": 744}, {"type": "R", "before": "mechanism, significant improvements on the quality of summaries could be observed. Last but not the least, the attention-aware inference has strong universality that can be easily adopted to different hierarchical summarization models to promote the models' performance", "after": "inference produces summaries rather differently from the beam search, and achieves promising improvements of higher scores and greater conciseness. The algorithm is also proven robust as it remains to outperform beam search significantly even with corrupted attention distributions", "start_char_pos": 761, "end_char_pos": 1030}], "sents_char_pos": [0, 362, 421, 549, 700, 843]}
+{"doc_id": "2009.06891", "revision_depth": "3", "before_revision": "This paper proposes a novel inference algorithm for seq-to-seq models. It corrects beam search step-by-step via the optimal attention distribution to make the generated text attend to source tokens in a controlled way. Experiments show the proposed attention-aware inferenceproduces summaries rather differently from the beam search , and achieves promising improvements of higher scores and greater conciseness. The algorithm is also proven robust as it remains to outperform beam search significantly even with corrupted attention distributions .", "after_revision": "This study develops a calibrated beam-based algorithm with global awareness for neural abstractive summarization, aiming to improve the local optimality problem of the original beam search in a rigorous way. Specifically, a novel global protocol is proposed based on the attention distribution to stipulate how a global optimal hypothesis should attend to the source. A global scoring function is then developed to regulate beam search to generate summaries in a more near-global optimal fashion. This novel design enjoys a distinctive property, i.e. the global attention distribution could be predicted before inference, enabling stepwise improvements on the beam search through the global scoring function. Extensive experiments on 9 datasets show that the global-aware inference significantly improves state-of-the-art summarization models even using empirical hyper-parameters. The algorithm is also proven robust as it remains to generate meaningful texts with corrupted attention distributions . The codes and a comprehensive set of examples are available .", "edit_actions": [{"type": "R", "before": "paper proposes a novel inference algorithm for seq-to-seq models. It corrects beam search step-by-step via the optimal", "after": "study develops a calibrated beam-based algorithm with global awareness for neural abstractive summarization, aiming to improve the local optimality problem of the original beam search in a rigorous way. Specifically, a novel global protocol is proposed based on the", "start_char_pos": 5, "end_char_pos": 123}, {"type": "R", "before": "make the generated text attend to source tokens in a controlled way. Experiments show the proposed attention-aware inferenceproduces summaries rather differently from", "after": "stipulate how a global optimal hypothesis should attend to the source. A global scoring function is then developed to regulate beam search to generate summaries in a more near-global optimal fashion. This novel design enjoys a distinctive property, i.e. the global attention distribution could be predicted before inference, enabling stepwise improvements on", "start_char_pos": 150, "end_char_pos": 316}, {"type": "R", "before": ", and achieves promising improvements of higher scores and greater conciseness.", "after": "through the global scoring function. Extensive experiments on 9 datasets show that the global-aware inference significantly improves state-of-the-art summarization models even using empirical hyper-parameters.", "start_char_pos": 333, "end_char_pos": 412}, {"type": "R", "before": "outperform beam search significantly even", "after": "generate meaningful texts", "start_char_pos": 466, "end_char_pos": 507}, {"type": "A", "before": null, "after": ". The codes and a comprehensive set of examples are available", "start_char_pos": 547, "end_char_pos": 547}], "sents_char_pos": [0, 70, 218, 412]}
+{"doc_id": "2009.06960", "revision_depth": "1", "before_revision": "To prevent the outbreak of the Coronavirus disease (COVID-19), numerous countries around the world went into lockdown and imposed unprecedented containment measures. These restrictions progressively produced changes to social behavior and global mobility patterns, evidently disrupting social and economic activities. Here, using maritime traffic data , collected via a global network of Automatic Identification System (AIS ) receivers, we analyze the effects that the COVID-19 pandemic and the containment measures had on the shipping industry, which accounts alone for more than 80\\% of the world trade. We introduce the notion of a \"maritime mobility index,\" a synthetic composite index, to quantitatively assess ship mobility in a given unit of time. The mobility index calculation used in this study, has a worldwide extent and is based on the computation of cumulative navigated miles (CNM ) of all ships reporting their position and navigational status via AIS . We compare 2020 mobility levels to those of previous years assuming that an unchanged growth rate would have been achieved, if not for COVID-19. Following the outbreak, we find an unprecedented drop in maritime mobility, across all categories of commercial shipping. The reduced activity is observable from March to June, when the most severe restrictions were in force , producing a variation of mobility quantified between -5.62\\% and -13.77\\% for container ships, between +2.28\\% and -3.32\\% for dry bulk, between -0.22\\% and -9.27\\% for wet bulk, and between -19.57\\% and -42.77\\% for passenger shipping. The presented study is unprecedented for the uniqueness and completeness of the employed AIS dataset, which comprises a trillion AIS messages broadcast worldwide by 50000 ships, a figure that closely parallels the documented size of the world merchant fleet.", "after_revision": "To prevent the outbreak of the Coronavirus disease (COVID-19), many countries around the world went into lockdown and imposed unprecedented containment measures. These restrictions progressively produced changes to social behavior and global mobility patterns, evidently disrupting social and economic activities. Here, using maritime traffic data collected via a global network of AIS receivers, we analyze the effects that the COVID-19 pandemic and containment measures had on the shipping industry, which accounts alone for more than 80\\% of the world trade. We rely on multiple data-driven maritime mobility indexes to quantitatively assess ship mobility in a given unit of time. The mobility analysis here presented has a worldwide extent and is based on the computation of : CNM of all ships reporting their position and navigational status via AIS , number of active and idle ships, and fleet average speed. To highlight significant changes in shipping routes and operational patterns, we also compute and compare global and local density maps. We compare 2020 mobility levels to those of previous years assuming that an unchanged growth rate would have been achieved, if not for COVID-19. Following the outbreak, we find an unprecedented drop in maritime mobility, across all categories of commercial shipping. With few exceptions, a generally reduced activity is observable from March to June, when the most severe restrictions were in force . We quantify a variation of mobility between -5.62\\% and -13.77\\% for container ships, between +2.28\\% and -3.32\\% for dry bulk, between -0.22\\% and -9.27\\% for wet bulk, and between -19.57\\% and -42.77\\% for passenger traffic. This study is unprecedented for the uniqueness and completeness of the employed dataset, which comprises a trillion AIS messages broadcast worldwide by 50000 ships, a figure that closely parallels the documented size of the world merchant fleet.", "edit_actions": [{"type": "R", "before": "numerous", "after": "many", "start_char_pos": 63, "end_char_pos": 71}, {"type": "D", "before": ",", "after": null, "start_char_pos": 352, "end_char_pos": 353}, {"type": "R", "before": "Automatic Identification System (AIS )", "after": "AIS", "start_char_pos": 388, "end_char_pos": 426}, {"type": "D", "before": "the", "after": null, "start_char_pos": 492, "end_char_pos": 495}, {"type": "R", "before": "introduce the notion of a \"maritime mobility index,\" a synthetic composite index,", "after": "rely on multiple data-driven maritime mobility indexes", "start_char_pos": 610, "end_char_pos": 691}, {"type": "R", "before": "index calculation used in this study,", "after": "analysis here presented", "start_char_pos": 769, "end_char_pos": 806}, {"type": "R", "before": "cumulative navigated miles (CNM )", "after": ": CNM", "start_char_pos": 865, "end_char_pos": 898}, {"type": "R", "before": ".", "after": ", number of active and idle ships, and fleet average speed. To highlight significant changes in shipping routes and operational patterns, we also compute and compare global and local density maps.", "start_char_pos": 969, "end_char_pos": 970}, {"type": "R", "before": "The", "after": "With few exceptions, a generally", "start_char_pos": 1238, "end_char_pos": 1241}, {"type": "R", "before": ", producing", "after": ". We quantify", "start_char_pos": 1341, "end_char_pos": 1352}, {"type": "D", "before": "quantified", "after": null, "start_char_pos": 1377, "end_char_pos": 1387}, {"type": "R", "before": "shipping. The presented", "after": "traffic. This", "start_char_pos": 1570, "end_char_pos": 1593}, {"type": "D", "before": "AIS", "after": null, "start_char_pos": 1669, "end_char_pos": 1672}], "sents_char_pos": [0, 165, 317, 606, 755, 1115, 1237, 1579]}
+{"doc_id": "2009.08456", "revision_depth": "1", "before_revision": "Obtaining quantitative survey responses that are both accurate and informative is crucial to a wide range of fields (e. g. perceptual and categorical judgement, expert risk assessment, attitudinal measurement, consumer and public opinion research). Traditional and ubiquitous response formats such as Likert and Visual Analogue Scales require condensation of responses into discrete or point values-but sometimes a range of options may better represent the correct answer. In this paper, we propose an efficient interval-valued response mode, whereby responses are made by marking an ellipse along a continuous scale. We discuss its potential in the context of survey research, describing how this approach can capture and quantify valuable information arising from multiple sources of response uncertainty-which would be lost using conventional approaches--while preserving a high degree of response-efficiency. We then report a validation study, which utilizes our recently introduced open-source software (DECSYS) to administer an electronic interval-valued survey. This is designed to explore how interval-values reflect experimental manipulations of response (un)certainty across multiple contexts. Results consistently indicated that respondents used interval widths effectively-to communicate uncertainty (e.g. lack of available information), ambiguity (e.g. lack of clarity in question phrasing), and inherent variability in their responses. Subjective participant feedback was also positive. We present this as initial empirical evidence for the efficacy and value of interval-valued response capture. Interestingly, intervals also provided insight into respondents' reasoning about different types of uncertainties, suggesting a tendency to underestimate lack of available information relative to observable variability when making a stimulus judgement .", "after_revision": "Obtaining quantitative survey responses that are both accurate and informative is crucial to a wide range of fields . Traditional and ubiquitous response formats such as Likert and Visual Analogue Scales require condensation of responses into discrete point values - but sometimes a range of options may better represent the correct answer. In this paper, we propose an efficient interval-valued response mode, whereby responses are made by marking an ellipse along a continuous scale. We discuss its potential to capture and quantify valuable information that would be lost using conventional approaches, while preserving a high degree of response-efficiency. The information captured by the response interval may represent a possible response range - i.e., a conjunctive set, such as the real numbers between three and six. Alternatively, it may reflect uncertainty in respect to a distinct response - i.e., a disjunctive set, such as a confidence interval. We then report a validation study, utilizing our recently introduced open-source software (DECSYS) to explore how interval-valued survey responses reflect experimental manipulations of several factors hypothesised to influence interval width, across multiple contexts. Results consistently indicate that respondents used interval widths effectively, and subjective participant feedback was also positive. We present this as initial empirical evidence for the efficacy and value of interval-valued response capture. Interestingly, our results also provide insight into respondents' reasoning about the different aforementioned types of intervals - we replicate a tendency towards overconfidence for those representing epistemic uncertainty (i.e., disjunctive sets), but find intervals representing inherent range (i.e., conjunctive sets) to be well-calibrated .", "edit_actions": [{"type": "R", "before": "(e. g. perceptual and categorical judgement, expert risk assessment, attitudinal measurement, consumer and public opinion research).", "after": ".", "start_char_pos": 116, "end_char_pos": 248}, {"type": "R", "before": "or point values-but", "after": "point values - but", "start_char_pos": 383, "end_char_pos": 402}, {"type": "R", "before": "in the context of survey research, describing how this approach can", "after": "to", "start_char_pos": 643, "end_char_pos": 710}, {"type": "R", "before": "arising from multiple sources of response uncertainty-which", "after": "that", "start_char_pos": 753, "end_char_pos": 812}, {"type": "R", "before": "approaches--while", "after": "approaches, while", "start_char_pos": 846, "end_char_pos": 863}, {"type": "A", "before": null, "after": "The information captured by the response interval may represent a possible response range - i.e., a conjunctive set, such as the real numbers between three and six. Alternatively, it may reflect uncertainty in respect to a distinct response - i.e., a disjunctive set, such as a confidence interval.", "start_char_pos": 913, "end_char_pos": 913}, {"type": "R", "before": "which utilizes", "after": "utilizing", "start_char_pos": 949, "end_char_pos": 963}, {"type": "R", "before": "administer an electronic", "after": "explore how", "start_char_pos": 1021, "end_char_pos": 1045}, {"type": "R", "before": "survey. This is designed to explore how interval-values", "after": "survey responses", "start_char_pos": 1062, "end_char_pos": 1117}, {"type": "R", "before": "response (un)certainty", "after": "several factors hypothesised to influence interval width,", "start_char_pos": 1156, "end_char_pos": 1178}, {"type": "R", "before": "indicated", "after": "indicate", "start_char_pos": 1226, "end_char_pos": 1235}, {"type": "R", "before": "effectively-to communicate uncertainty (e.g. lack of available information), ambiguity (e.g. lack of clarity in question phrasing), and inherent variability in their responses. Subjective", "after": "effectively, and subjective", "start_char_pos": 1274, "end_char_pos": 1461}, {"type": "R", "before": "intervals also provided", "after": "our results also provide", "start_char_pos": 1627, "end_char_pos": 1650}, {"type": "R", "before": "different types of uncertainties, suggesting a tendency to underestimate lack of available information relative to observable variability when making a stimulus judgement", "after": "the different aforementioned types of intervals - we replicate a tendency towards overconfidence for those representing epistemic uncertainty (i.e., disjunctive sets), but find intervals representing inherent range (i.e., conjunctive sets) to be well-calibrated", "start_char_pos": 1693, "end_char_pos": 1863}], "sents_char_pos": [0, 248, 472, 617, 912, 1069, 1204, 1450, 1501, 1611]}
+{"doc_id": "2009.08553", "revision_depth": "2", "before_revision": "Conventional sparse retrieval methods such as TF-IDF and BM25 are simple and efficient, but solely rely on lexical overlap without semantic matching. Recent dense retrieval methods learn latent representations to tackle the lexical mismatch problem, while being more computationally expensive and insufficient for exact matching as they embed the text sequence into a single vector with limited capacity. In this paper, we present Generation-Augmented Retrieval (GAR) , a query expansion method that augments a query with relevant contexts through text generation . We demonstrate on open-domain question answering that the generated contexts significantly enrich the semantics of the queries and thus GAR with sparse representations (BM25) achieves comparable or better performance than the state-of-the-art dense methods such as DPR \\mbox{%DIFAUXCMD karpukhin2020dense . We show that generating various contexts of a query is beneficial as fusing their results consistently yields better retrieval accuracy. Moreover, as sparse and dense representations are often complementary, GAR can be easily combined with DPR to achieve even better performance. Furthermore, GAR achieves the state-of-the-art performance on the Natural Questions and TriviaQA datasets under the extractive setting when equipped with an extractive reader, and consistently outperforms other retrieval methods when the same generative reader is used.", "after_revision": "We propose Generation-Augmented Retrieval (GAR) for answering open-domain questions, which augments a query through text generation of heuristically discovered relevant contexts without external resources as supervision . We demonstrate that the generated contexts substantially enrich the semantics of the queries and GAR with sparse representations (BM25) achieves comparable or better performance than state-of-the-art dense retrieval methods such as DPR . We show that generating diverse contexts for a query is beneficial as fusing their results consistently yields better retrieval accuracy. Moreover, as sparse and dense representations are often complementary, GAR can be easily combined with DPR to achieve even better performance. GAR achieves state-of-the-art performance on Natural Questions and TriviaQA datasets under the extractive QA setup when equipped with an extractive reader, and consistently outperforms other retrieval methods when the same generative reader is used.", "edit_actions": [{"type": "R", "before": "Conventional sparse retrieval methods such as TF-IDF and BM25 are simple and efficient, but solely rely on lexical overlap without semantic matching. Recent dense retrieval methods learn latent representations to tackle the lexical mismatch problem, while being more computationally expensive and insufficient for exact matching as they embed the text sequence into a single vector with limited capacity. In this paper, we present", "after": "We propose", "start_char_pos": 0, "end_char_pos": 430}, {"type": "R", "before": ", a query expansion method that", "after": "for answering open-domain questions, which", "start_char_pos": 468, "end_char_pos": 499}, {"type": "D", "before": "with relevant contexts", "after": null, "start_char_pos": 517, "end_char_pos": 539}, {"type": "A", "before": null, "after": "of heuristically discovered relevant contexts without external resources as supervision", "start_char_pos": 564, "end_char_pos": 564}, {"type": "D", "before": "on open-domain question answering", "after": null, "start_char_pos": 582, "end_char_pos": 615}, {"type": "R", "before": "significantly", "after": "substantially", "start_char_pos": 644, "end_char_pos": 657}, {"type": "D", "before": "thus", "after": null, "start_char_pos": 698, "end_char_pos": 702}, {"type": "D", "before": "the", "after": null, "start_char_pos": 789, "end_char_pos": 792}, {"type": "A", "before": null, "after": "retrieval", "start_char_pos": 816, "end_char_pos": 816}, {"type": "D", "before": "\\mbox{%DIFAUXCMD karpukhin2020dense", "after": null, "start_char_pos": 837, "end_char_pos": 872}, {"type": "R", "before": "various contexts of", "after": "diverse contexts for", "start_char_pos": 899, "end_char_pos": 918}, {"type": "R", "before": "Furthermore, GAR achieves the", "after": "GAR achieves", "start_char_pos": 1155, "end_char_pos": 1184}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1217, "end_char_pos": 1220}, {"type": "R", "before": "setting", "after": "QA setup", "start_char_pos": 1282, "end_char_pos": 1289}], "sents_char_pos": [0, 149, 404, 566, 874, 1011, 1154]}
+{"doc_id": "2009.12068", "revision_depth": "1", "before_revision": " To improve the efficiency of deep reinforcement learning (DRL) based methods for robot manipulator trajectory planning in random working environment. Different from the traditional sparse reward function , we present three dense reward functions in this paper. Firstly, posture reward function is proposed to accelerate the learning process with a more reasonable trajectory by modeling the distance and direction constraints, which can reduce the blindness of exploration. Secondly, to improve the stability, a reward function at stride reward is proposed by modeling the distance and movement distance of joints constraints, it can make the learning process more stable. In order to further improve learning efficiency, we are inspired by the cognitive process of human behavior and propose a stage incentive mechanism, including hard stage incentive reward function and soft stage incentive reward function. Extensive experiments show that the soft stage incentive reward function proposed is able to improve convergence rate by up to 46.9\\% with the state-of-the-art DRL methods. The percentage increase in convergence mean reward is 4.4 \\%~15.5\\% and the percentage decreases with respect to standard deviation by 21.9 \\%~63.2\\% . In the evaluation , the success rate of trajectory planning for robot manipulator is up to 99.6\\%.", "after_revision": "(This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible.) To improve the efficiency of deep reinforcement learning (DRL) -based methods for robot manipulator trajectory planning in random working environments , we present three dense reward functions . These rewards differ from the traditional sparse reward. First, a posture reward function is proposed to speed up the learning process with a more reasonable trajectory by modeling the distance and direction constraints, which can reduce the blindness of exploration. Second, a stride reward function is proposed to improve the stability of the learning process by modeling the distance and movement distance of joint constraints. Finally, in order to further improve learning efficiency, we are inspired by the cognitive process of human behavior and propose a stage incentive mechanism, including a hard stage incentive reward function and a soft stage incentive reward function. Extensive experiments show that the soft stage incentive reward function is able to improve the convergence rate by up to 46.9\\% with the state-of-the-art DRL methods. The percentage increase in the convergence mean reward was 4.4 -15.5\\% and the percentage decreases with respect to standard deviation were 21.9 -63.2\\% . In the evaluation experiments , the success rate of trajectory planning for a robot manipulator reached 99.6\\%.", "edit_actions": [{"type": "A", "before": null, "after": "(This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible.)", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "based", "after": "-based", "start_char_pos": 64, "end_char_pos": 69}, {"type": "R", "before": "environment. Different from the traditional sparse reward function", "after": "environments", "start_char_pos": 138, "end_char_pos": 204}, {"type": "R", "before": "in this paper. Firstly,", "after": ". These rewards differ from the traditional sparse reward. First, a", "start_char_pos": 247, "end_char_pos": 270}, {"type": "R", "before": "accelerate", "after": "speed up", "start_char_pos": 310, "end_char_pos": 320}, {"type": "R", "before": "Secondly, to improve the stability, a reward function at stride reward is proposed", "after": "Second, a stride reward function is proposed to improve the stability of the learning process", "start_char_pos": 475, "end_char_pos": 557}, {"type": "R", "before": "joints constraints, it can make the learning process more stable. In", "after": "joint constraints. Finally, in", "start_char_pos": 608, "end_char_pos": 676}, {"type": "A", "before": null, "after": "a", "start_char_pos": 833, "end_char_pos": 833}, {"type": "A", "before": null, "after": "a", "start_char_pos": 875, "end_char_pos": 875}, {"type": "D", "before": "proposed", "after": null, "start_char_pos": 987, "end_char_pos": 995}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1015, "end_char_pos": 1015}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1115, "end_char_pos": 1115}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1140, "end_char_pos": 1142}, {"type": "R", "before": "\\%~15.5\\%", "after": "-15.5\\%", "start_char_pos": 1147, "end_char_pos": 1156}, {"type": "R", "before": "by", "after": "were", "start_char_pos": 1221, "end_char_pos": 1223}, {"type": "R", "before": "\\%~63.2\\%", "after": "-63.2\\%", "start_char_pos": 1229, "end_char_pos": 1238}, {"type": "A", "before": null, "after": "experiments", "start_char_pos": 1259, "end_char_pos": 1259}, {"type": "R", "before": "robot manipulator is up to", "after": "a robot manipulator reached", "start_char_pos": 1306, "end_char_pos": 1332}], "sents_char_pos": [0, 150, 261, 474, 673, 913, 1087]}
+{"doc_id": "2009.13076", "revision_depth": "1", "before_revision": "The emergence of the COVID-19 pandemic, a new and novel risk factors , leads to the stock price crash due to a rapid and synchronous sell-off by the investors . However, within a short period, the quality sectors start recovering from the bottom. A model of the stock price movement has been developed to explain such phenomena based on the Institutional fund flow and financial antifragility , which represents the financial indicator of a company. The assumes that during the crash, the stock does not depend on the financial antifragility of a company . We study the effects of shock lengths and antifragility parameter on the stock price during the crises period using the synthetic and real fund flow data. We observed that the possibility of recovery of a quality stock decreases with an increase in shock-length beyond a specific period. On the other hand, a quality stock with higher antifragility shows V-shape recovery and outperform others. The shock lengths and recovery length of quality stock are almost equal that is seen in the Indian market. Financially stressed stocks, i.e., the stock with negative antifragility, showed L-shape recovery during the pandemic. The results show that the investors, in the uncertainty like COVID-19, restructure their portfolio to de-risk the investment towards quality stocks . The study may help the investors to make the right investment decision during a crisis.", "after_revision": "The emergence of the COVID-19 pandemic, a new and novel risk factor , leads to the stock price crash due to the investors' rapid and synchronous sell-off . However, within a short period, the quality sectors start recovering from the bottom. A stock price model has been developed during such crises based on the net-fund-flow (\\Psi_t) due to institutional investors, and financial antifragility (\\phi) of a company. We assume that during the crash, the stock price fall is independent of the \\phi . We study the effects of shock lengths and \\phi on the stock price during the crises period using the \\Psi_t obtained from synthetic and real fund flow data. We observed that the possibility of recovery of stock with \\phi>0, termed as quality stock, decreases with an increase in shock-length beyond a specific period. A quality stock with higher \\phi shows V-shape recovery and outperform others. The shock length and recovery period of quality stock are almost equal that is seen in the Indian market. Financially stressed stocks, i.e., the stocks with \\phi<0, show L-shape recovery during the pandemic. The stock data and model analysis shows that the investors, in the uncertainty like COVID-19, invest in the quality stocks to restructure their portfolio to reduce the risk . The study may help the investors to make the right investment decision during a crisis.", "edit_actions": [{"type": "R", "before": "factors", "after": "factor", "start_char_pos": 61, "end_char_pos": 68}, {"type": "R", "before": "a", "after": "the investors'", "start_char_pos": 109, "end_char_pos": 110}, {"type": "D", "before": "by the investors", "after": null, "start_char_pos": 142, "end_char_pos": 158}, {"type": "R", "before": "model of the stock price movement", "after": "stock price model", "start_char_pos": 249, "end_char_pos": 282}, {"type": "R", "before": "to explain such phenomena", "after": "during such crises", "start_char_pos": 302, "end_char_pos": 327}, {"type": "R", "before": "Institutional fund flow", "after": "net-fund-flow (\\Psi_t) due to institutional investors,", "start_char_pos": 341, "end_char_pos": 364}, {"type": "R", "before": ", which represents the financial indicator", "after": "(\\phi)", "start_char_pos": 393, "end_char_pos": 435}, {"type": "R", "before": "The assumes", "after": "We assume", "start_char_pos": 450, "end_char_pos": 461}, {"type": "R", "before": "does not depend on the financial antifragility of a company", "after": "price fall is independent of the \\phi", "start_char_pos": 495, "end_char_pos": 554}, {"type": "R", "before": "antifragility parameter", "after": "\\phi", "start_char_pos": 599, "end_char_pos": 622}, {"type": "A", "before": null, "after": "\\Psi_t obtained from", "start_char_pos": 677, "end_char_pos": 677}, {"type": "R", "before": "a quality stock", "after": "stock with \\phi>0, termed as quality stock,", "start_char_pos": 761, "end_char_pos": 776}, {"type": "R", "before": "On the other hand, a", "after": "A", "start_char_pos": 846, "end_char_pos": 866}, {"type": "R", "before": "antifragility", "after": "\\phi", "start_char_pos": 893, "end_char_pos": 906}, {"type": "R", "before": "lengths and recovery length", "after": "length and recovery period", "start_char_pos": 963, "end_char_pos": 990}, {"type": "R", "before": "stock with negative antifragility, showed", "after": "stocks with \\phi<0, show", "start_char_pos": 1099, "end_char_pos": 1140}, {"type": "R", "before": "results show", "after": "stock data and model analysis shows", "start_char_pos": 1183, "end_char_pos": 1195}, {"type": "A", "before": null, "after": "invest in the quality stocks to", "start_char_pos": 1250, "end_char_pos": 1250}, {"type": "R", "before": "de-risk the investment towards quality stocks", "after": "reduce the risk", "start_char_pos": 1282, "end_char_pos": 1327}], "sents_char_pos": [0, 160, 246, 449, 556, 712, 845, 952, 1059, 1178, 1329]}
+{"doc_id": "2009.13620", "revision_depth": "1", "before_revision": "The growth of science and technology is primarily a recombinative process, wherein new discoveries and inventions are generally built from prior knowledge. While the recent past has seen rapid growth in scientific and technological knowledge, relatively little is known about the manner in which science and technology develop and coalesce knowledge into larger structures that enable or constrain future breakthroughs. Network science has recently emerged as a framework for measuring the structure and dynamics of knowledge. While helpful, these existing approaches struggle to capture the global structural properties of the underlying networks, leading to conflicting observations about the nature of scientific and technological progress. We bridge this methodological gap using tools from algebraic topology to characterize the higher-order structure of knowledge networks in science and technology across scale. We observe rapid and varied growth in the high-dimensional structure in many fields of science and technology, and find this high-dimensional growth coincides with decline in lower-dimensional structure. This higher-order growth in knowledge networks has historically far outpaced the growth in scientific and technological collaboration networks. We also characterize the relationship between higher-order structure and the nature of the science and technology produced within these structural environments and find a positive relationship between the abstractness of language used within fields and increasing high-dimensional structure. We also find a robust relationship between high-dimensional structure and number of metrics for publication success, implying this high-dimensional structure may be linked to discovery and invention .", "after_revision": "The growth of science and technology is a recombinative process, wherein new discoveries and inventions are built from prior knowledge. Yet relatively little is known about the manner in which scientific and technological knowledge develop and coalesce into larger structures that enable or constrain future breakthroughs. Network science has recently emerged as a framework for measuring the structure and dynamics of knowledge. While helpful, existing approaches struggle to capture the global properties of the underlying networks, leading to conflicting observations about the nature of scientific and technological progress. We bridge this methodological gap using tools from algebraic topology to characterize the higher-order structure of knowledge networks in science and technology across scale. We observe rapid growth in the higher-order structure of knowledge in many scientific and technological fields. This growth is not observable using traditional network measures. We further demonstrate that the emergence of higher-order structure coincides with decline in lower-order structure, and has historically far outpaced the corresponding emergence of higher-order structure in scientific and technological collaboration networks. Up to a point, increases in higher-order structure are associated with better outcomes, as measured by the novelty and impact of papers and patents. However, the nature of science and technology produced under higher-order regimes also appears to be qualitatively different from that produced under lower-order ones, with the former exhibiting greater linguistic abstractness and greater tendencies for building upon prior streams of knowledge .", "edit_actions": [{"type": "D", "before": "primarily", "after": null, "start_char_pos": 40, "end_char_pos": 49}, {"type": "D", "before": "generally", "after": null, "start_char_pos": 118, "end_char_pos": 127}, {"type": "R", "before": "While the recent past has seen rapid growth in scientific and technological knowledge,", "after": "Yet", "start_char_pos": 156, "end_char_pos": 242}, {"type": "R", "before": "science and technology", "after": "scientific and technological knowledge", "start_char_pos": 296, "end_char_pos": 318}, {"type": "D", "before": "knowledge", "after": null, "start_char_pos": 340, "end_char_pos": 349}, {"type": "D", "before": "these", "after": null, "start_char_pos": 542, "end_char_pos": 547}, {"type": "D", "before": "structural", "after": null, "start_char_pos": 599, "end_char_pos": 609}, {"type": "D", "before": "and varied", "after": null, "start_char_pos": 936, "end_char_pos": 946}, {"type": "R", "before": "high-dimensional structure in many fields of science and technology, and find this high-dimensional growth", "after": "higher-order structure of knowledge in many scientific and technological fields. This growth is not observable using traditional network measures. We further demonstrate that the emergence of higher-order structure", "start_char_pos": 961, "end_char_pos": 1067}, {"type": "R", "before": "lower-dimensional structure. This higher-order growth in knowledge networks", "after": "lower-order structure, and", "start_char_pos": 1094, "end_char_pos": 1169}, {"type": "R", "before": "growth", "after": "corresponding emergence of higher-order structure", "start_char_pos": 1204, "end_char_pos": 1210}, {"type": "R", "before": "We also characterize the relationship between", "after": "Up to a point, increases in", "start_char_pos": 1267, "end_char_pos": 1312}, {"type": "R", "before": "and", "after": "are associated with better outcomes, as measured by the novelty and impact of papers and patents. However,", "start_char_pos": 1336, "end_char_pos": 1339}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1354, "end_char_pos": 1357}, {"type": "R", "before": "within these structural environments and find a positive relationship between the abstractness of language used within fields and increasing high-dimensional structure. We also find a robust relationship between high-dimensional structure and number of metrics for publication success, implying this high-dimensional structure may be linked to discovery and invention", "after": "under higher-order regimes also appears to be qualitatively different from that produced under lower-order ones, with the former exhibiting greater linguistic abstractness and greater tendencies for building upon prior streams of knowledge", "start_char_pos": 1390, "end_char_pos": 1757}], "sents_char_pos": [0, 155, 419, 526, 743, 918, 1122, 1266, 1558]}
+{"doc_id": "2009.13734", "revision_depth": "1", "before_revision": "The nodes of a graph existing in a specific cluster are more likely to connect to each other than with other nodes in the graph. Then revealing some information about the nodes, the structure of the graph ( the graph edges) provides this opportunity to know more information about the other nodes. From this perspective, this paper revisits the node classification task in a semi-supervised scenario by graph convolutional neural network . The goal is to benefit from the flow of information that circulates around the revealed node labels. For this aim , this paper provides a new graph convolutional neural network architecture. This architecture benefits efficiently from the revealed training nodes, the node features, and the graph structure. On the other hand, in many applications, non-graph observations ( side information) exist beside a given graph realization . The non-graph observations are usually independent of the graph structure. This paper shows that the proposed architecture is also powerful in combining a graph realization and independent non-graph observations. For both cases, the experiments on the synthetic and real-world datasets demonstrate that our proposed architecture achieves a higher prediction accuracy in comparison to the existing state-of-the-art methods for the node classification task.", "after_revision": "The nodes of a graph existing in a cluster are more likely to connect to each other than with other nodes in the graph. Then revealing some information about some nodes, the structure of the graph ( graph edges) provides this opportunity to know more information about other nodes. From this perspective, this paper revisits the node classification task in a semi-supervised scenario by graph convolutional networks (GCNs) . The goal is to benefit from the flow of information that circulates around the revealed node labels. The contribution of this paper is twofold. First , this paper provides a method for extracting side information from a graph realization. Then a new GCN architecture is presented that combines the output of traditional GCN and the extracted side information. Another contribution of this paper is relevant to non-graph observations ( independent side information) that exists beside a graph realization in many applications. Indeed, the extracted side information can be replaced by a sequence of side information that is independent of the graph structure. For both cases, the experiments on synthetic and real-world datasets demonstrate that the proposed model achieves a higher prediction accuracy in comparison to the existing state-of-the-art methods for the node classification task.", "edit_actions": [{"type": "D", "before": "specific", "after": null, "start_char_pos": 35, "end_char_pos": 43}, {"type": "R", "before": "the", "after": "some", "start_char_pos": 167, "end_char_pos": 170}, {"type": "D", "before": "the", "after": null, "start_char_pos": 207, "end_char_pos": 210}, {"type": "D", "before": "the", "after": null, "start_char_pos": 281, "end_char_pos": 284}, {"type": "R", "before": "neural network", "after": "networks (GCNs)", "start_char_pos": 423, "end_char_pos": 437}, {"type": "R", "before": "For this aim", "after": "The contribution of this paper is twofold. First", "start_char_pos": 541, "end_char_pos": 553}, {"type": "R", "before": "new graph convolutional neural network architecture. This architecture benefits efficiently from the revealed training nodes, the node features, and the graph structure. On the other hand, in many applications,", "after": "method for extracting side information from a graph realization. Then a new GCN architecture is presented that combines the output of traditional GCN and the extracted side information. Another contribution of this paper is relevant to", "start_char_pos": 578, "end_char_pos": 788}, {"type": "A", "before": null, "after": "independent", "start_char_pos": 814, "end_char_pos": 814}, {"type": "R", "before": "exist beside a given graph realization . The non-graph observations are usually", "after": "that exists beside a graph realization in many applications. Indeed, the extracted side information can be replaced by a sequence of side information that is", "start_char_pos": 833, "end_char_pos": 912}, {"type": "D", "before": "This paper shows that the proposed architecture is also powerful in combining a graph realization and independent non-graph observations.", "after": null, "start_char_pos": 949, "end_char_pos": 1086}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1122, "end_char_pos": 1125}, {"type": "R", "before": "our proposed architecture", "after": "the proposed model", "start_char_pos": 1177, "end_char_pos": 1202}], "sents_char_pos": [0, 128, 297, 439, 540, 630, 747, 873, 948, 1086]}
+{"doc_id": "2009.14043", "revision_depth": "1", "before_revision": "In the Online Simple Knapsack Problem we are given a knapsack of unit size 1. Items of size smaller or equal to 1 are presented in an iterative fashion and an algorithm has to decide whether to permanently include or reject each item into the knapsack without any knowledge about the rest of the instance. The goal is then to pack the knapsack as full as possible. In this work , we introduce a third option additional to those of packing and rejecting an item, namely that of reserving an item for the cost of a fixed fraction \\alpha of its size. An algorithm may pay this fraction in order to postpone its decision on whether to include or reject the item until after the last item of the instance was presented. While the classical Online Simple Knapsack Problem does not admit any constantly bounded competitive ratio in the deterministic setting, we find that adding the possibility of reservation makes the problem constantly competitive , with varying competitive ratios depending on the value of \\alpha. We give upper and lower bounds for the whole range of reservation costs, with tight bounds for costs up to 1/ 6---an area that is strictly 2-competitive---and for costs between 2-1 and 0.5---an area that is (2+\\alpha)-competitive . With our analysis, we find a counterintuitive characteristic of the problem: Intuitively, one would expect that the possibility of rejecting items becomes more and more helpful for an online algorithm with growing reservation costs. However, for higher reservation costs between \\sqrt{2}-1 and 0.5 , an algorithm that is unable to reject any items tightly matches the lower bound and is thus the best possible. On the other hand, for any positive reservation cost smaller than 1/6, any algorithm that is unable to reject any items performs considerably worse than one that is able to reject.", "after_revision": "In the Online Simple Knapsack Problem we are given a knapsack of unit size 1. Items of size smaller or equal to 1 are presented in an iterative way and an algorithm has to decide whether to permanently include or reject each item into the knapsack without any knowledge about the rest of the instance. The goal is then to pack the knapsack as full as possible. In this work we introduce a third option additional to those of packing and rejecting an item, namely that of reserving an item for the cost of a fixed fraction \\alpha of its size. An algorithm may pay this fraction in order to postpone its decision on whether to include or reject the item until after the last item of the instance was presented. We find that adding the possibility of reservation makes the problem constantly competitive with varying competitive ratios depending on the value of \\alpha. We give upper and lower bounds for the whole range of reservation costs, with tight bounds for costs up to 1/ 6 -- an area that is strictly 2-competitive, for costs between 2-1 and 1 -- an area that is strictly (2+\\alpha)-competitive up to \\phi -1, and strictly 1/(1-\\alpha)-competitive above \\phi-1, where \\phi is the golden ratio. We find a counterintuitive characteristic of the problem: Intuitively, one may expect that the possibility of rejecting items becomes more helpful for an online algorithm with growing reservation costs. However, for higher reservation costs above \\sqrt{2}-1 , an algorithm that is unable to reject any items tightly matches the lower bound and is thus the best possible. On the other hand, for any positive reservation cost smaller than 1/6, any algorithm that is unable to reject items performs considerably worse than one that is able to reject.", "edit_actions": [{"type": "R", "before": "fashion", "after": "way", "start_char_pos": 144, "end_char_pos": 151}, {"type": "D", "before": ",", "after": null, "start_char_pos": 378, "end_char_pos": 379}, {"type": "R", "before": "While the classical Online Simple Knapsack Problem does not admit any constantly bounded competitive ratio in the deterministic setting, we", "after": "We", "start_char_pos": 715, "end_char_pos": 854}, {"type": "D", "before": ",", "after": null, "start_char_pos": 944, "end_char_pos": 945}, {"type": "R", "before": "6---an", "after": "6 -- an", "start_char_pos": 1122, "end_char_pos": 1128}, {"type": "R", "before": "2-competitive---and", "after": "2-competitive,", "start_char_pos": 1151, "end_char_pos": 1170}, {"type": "R", "before": "0.5---an", "after": "1 -- an", "start_char_pos": 1197, "end_char_pos": 1205}, {"type": "A", "before": null, "after": "strictly", "start_char_pos": 1219, "end_char_pos": 1219}, {"type": "R", "before": ". With our analysis, we", "after": "up to \\phi -1, and strictly 1/(1-\\alpha)-competitive above \\phi-1, where \\phi is the golden ratio. We", "start_char_pos": 1243, "end_char_pos": 1266}, {"type": "R", "before": "would", "after": "may", "start_char_pos": 1339, "end_char_pos": 1344}, {"type": "D", "before": "and more", "after": null, "start_char_pos": 1405, "end_char_pos": 1413}, {"type": "R", "before": "between", "after": "above", "start_char_pos": 1516, "end_char_pos": 1523}, {"type": "D", "before": "and 0.5", "after": null, "start_char_pos": 1535, "end_char_pos": 1542}, {"type": "D", "before": "any", "after": null, "start_char_pos": 1766, "end_char_pos": 1769}], "sents_char_pos": [0, 77, 305, 364, 547, 714, 1011, 1244, 1477, 1655]}
+{"doc_id": "2010.00948", "revision_depth": "1", "before_revision": "Identifying causal relationships is a challenging yet a crucial problem in many fields of science like epidemiology, climatology, ecology, genomics, economics and neuroscience, to mention only a few. Recent studies have demonstrated that ordinal partition transition networks (OPTNs) allow to infer the coupling direction between two dynamical systems. In this work, we generalize this concept to the interaction between multiple dynamical systems and propose a new method to detect causality in multivariate observational data. We demonstrate that our approach can reliably identify the direction of interaction and the corresponding delays with numerical simulations using linear stochastic systems as well as nonlinear dynamical systems such as a network of neural mass models . Finally, we apply our method to real-world observational microelectrode array data from rodent brain slices to study the causal effect networks underlying epileptic activity. Our results from simulations as well as real-world data suggest that OPTNs can provide a complementary approach to reliably infer causal effect networks from multivariate observational data.", "after_revision": "Identifying causal relationships is a challenging yet crucial problem in many fields of science like epidemiology, climatology, ecology, genomics, economics and neuroscience, to mention only a few. Recent studies have demonstrated that ordinal partition transition networks (OPTNs) allow inferring the coupling direction between two dynamical systems. In this work, we generalize this concept to the study of the interactions among multiple dynamical systems and we propose a new method to detect causality in multivariate observational data. By applying this method to numerical simulations of coupled linear stochastic processes as well as two examples of interacting nonlinear dynamical systems (coupled Lorenz systems and a network of neural mass models ), we demonstrate that our approach can reliably identify the direction of interactions and the associated coupling delays . Finally, we study real-world observational microelectrode array electrophysiology data from rodent brain slices to identify the causal coupling structures underlying epileptiform activity. Our results , both from simulations and real-world data , suggest that OPTNs can provide a complementary and robust approach to infer causal effect networks from multivariate observational data.", "edit_actions": [{"type": "D", "before": "a", "after": null, "start_char_pos": 54, "end_char_pos": 55}, {"type": "R", "before": "to infer", "after": "inferring", "start_char_pos": 290, "end_char_pos": 298}, {"type": "R", "before": "interaction between", "after": "study of the interactions among", "start_char_pos": 401, "end_char_pos": 420}, {"type": "A", "before": null, "after": "we", "start_char_pos": 452, "end_char_pos": 452}, {"type": "R", "before": "We demonstrate that our approach can reliably identify the direction of interaction and the corresponding delays with numerical simulations using linear stochastic systems", "after": "By applying this method to numerical simulations of coupled linear stochastic processes", "start_char_pos": 530, "end_char_pos": 701}, {"type": "A", "before": null, "after": "two examples of interacting", "start_char_pos": 713, "end_char_pos": 713}, {"type": "R", "before": "such as", "after": "(coupled Lorenz systems and", "start_char_pos": 742, "end_char_pos": 749}, {"type": "A", "before": null, "after": "), we demonstrate that our approach can reliably identify the direction of interactions and the associated coupling delays", "start_char_pos": 782, "end_char_pos": 782}, {"type": "R", "before": "apply our method to", "after": "study", "start_char_pos": 797, "end_char_pos": 816}, {"type": "A", "before": null, "after": "electrophysiology", "start_char_pos": 863, "end_char_pos": 863}, {"type": "R", "before": "study the causal effect networks underlying epileptic", "after": "identify the causal coupling structures underlying epileptiform", "start_char_pos": 897, "end_char_pos": 950}, {"type": "R", "before": "from simulations as well as", "after": ", both from simulations and", "start_char_pos": 973, "end_char_pos": 1000}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1017, "end_char_pos": 1017}, {"type": "R", "before": "approach to reliably", "after": "and robust approach to", "start_char_pos": 1065, "end_char_pos": 1085}], "sents_char_pos": [0, 199, 352, 529, 960]}
+{"doc_id": "2010.01033", "revision_depth": "1", "before_revision": "The growth of model-based control strategies for robotics platforms has led to the need for additional rigid-body-dynamics algorithms to support their operation. Toward addressing this need, this article summarizes efficient numerical methods to compute the Coriolis matrix and underlying Christoffel Symbols (of the first kind) for tree-structure rigid-body systems. The resulting algorithms can be executed purely numerically, without requiring any partial derivatives that would be required in symbolic techniques that do not scale. Properties of the presented algorithms share recursive structure in common with classical methods such as the Composite-Rigid-Body Algorithm . The algorithms presented are of the lowest possible order: O(Nd) for the Coriolis Matrix and O(Nd^2) for the Christoffel symbols, where N is the number of bodies and d is the depth of the kinematic tree. A method of order O(Nd) is also provided to compute the time derivative of the mass matrix. A numerical implementation of these algorithms in C/C++ is benchmarked showing computation times on the order of 10-20 \\mus for the computation of the Coriolis matrix and 40-120 \\mus for the computation of the Christoffel symbols for systems with 20 degrees of freedom. These results demonstrate feasibility for the adoption of these numerical methods within control loops that need to operate at 1kHz rates or higher, as is commonly required for model-based control applications.", "after_revision": "This article presents methods to efficiently compute the Coriolis matrix and underlying Christoffel symbols (of the first kind) for tree-structure rigid-body systems. The algorithms can be executed purely numerically, without requiring partial derivatives as in unscalable symbolic techniques. The computations share a recursive structure in common with classical methods such as the Composite-Rigid-Body Algorithm and are of the lowest possible order: O(Nd) for the Coriolis matrix and O(Nd^2) for the Christoffel symbols, where N is the number of bodies and d is the depth of the kinematic tree. Implementation in C/C++ shows computation times on the order of 10-20 \\mus for the Coriolis matrix and 40-120 \\mus for the Christoffel symbols on systems with 20 degrees of freedom. The results demonstrate feasibility for the adoption of these algorithms within high-rate (> 1kHz ) loops for model-based control applications.", "edit_actions": [{"type": "R", "before": "The growth of model-based control strategies for robotics platforms has led to the need for additional rigid-body-dynamics algorithms to support their operation. Toward addressing this need, this article summarizes efficient numerical methods to", "after": "This article presents methods to efficiently", "start_char_pos": 0, "end_char_pos": 245}, {"type": "R", "before": "Symbols", "after": "symbols", "start_char_pos": 301, "end_char_pos": 308}, {"type": "D", "before": "resulting", "after": null, "start_char_pos": 372, "end_char_pos": 381}, {"type": "R", "before": "any partial derivatives that would be required in symbolic techniques that do not scale. Properties of the presented algorithms share", "after": "partial derivatives as in unscalable symbolic techniques. The computations share a", "start_char_pos": 447, "end_char_pos": 580}, {"type": "R", "before": ". The algorithms presented", "after": "and", "start_char_pos": 677, "end_char_pos": 703}, {"type": "R", "before": "Matrix", "after": "matrix", "start_char_pos": 761, "end_char_pos": 767}, {"type": "R", "before": "A method of order O(Nd) is also provided to compute the time derivative of the mass matrix. A numerical implementation of these algorithms", "after": "Implementation", "start_char_pos": 883, "end_char_pos": 1021}, {"type": "R", "before": "is benchmarked showing", "after": "shows", "start_char_pos": 1031, "end_char_pos": 1053}, {"type": "D", "before": "computation of the", "after": null, "start_char_pos": 1107, "end_char_pos": 1125}, {"type": "R", "before": "computation of the Christoffel symbols for", "after": "Christoffel symbols on", "start_char_pos": 1166, "end_char_pos": 1208}, {"type": "R", "before": "These", "after": "The", "start_char_pos": 1245, "end_char_pos": 1250}, {"type": "R", "before": "numerical methods within control loops that need to operate at", "after": "algorithms within high-rate (>", "start_char_pos": 1309, "end_char_pos": 1371}, {"type": "R", "before": "rates or higher, as is commonly required", "after": ") loops", "start_char_pos": 1377, "end_char_pos": 1417}], "sents_char_pos": [0, 161, 367, 535, 678, 882, 974, 1244]}
+{"doc_id": "2010.02180", "revision_depth": "1", "before_revision": "The question of how to probe contextual word representations in a way that is principled and useful has seen significant recent attention . In our contribution to this discussion, we argue , first, for a probe metric that reflects the trade-off between probe complexity and performance: the Pareto hypervolume. To measure complexity, we present a number of parametric and non-parametric metrics. Our experiments with such metrics show that probe's performance curves often fail to align with widely accepted rankings between language representations (with, e .g., non-contextual representations outperforming contextual ones). These results lead us to argue, second, that commonsimplistic probe taskssuch as POS labeling and dependency arc labeling, are inadequate to evaluate the properties encoded in contextual word representations. We propose full dependency parsing as an example probe task, and demonstrate it with the Pareto hypervolume . In support of our arguments, the results of this illustrative experiment conform closer to accepted rankings among contextual word representations.", "after_revision": "The question of how to probe contextual word representations for linguistic structure in a way that is both principled and useful has seen significant attention recently in the NLP literature . In our contribution to this discussion, we argue for a probe metric that reflects the fundamental trade-off between probe complexity and performance: the Pareto hypervolume. To measure complexity, we present a number of parametric and non-parametric metrics. Our experiments using Pareto hypervolume as an evaluation metric show that probes often do not conform to our expectations---e .g., why should the non-contextual fastText representations encode more morpho-syntactic information than the contextual BERT representations? These results suggest that common, simplistic probing tasks, such as part-of-speech labeling and dependency arc labeling, are inadequate to evaluate the linguistic structure encoded in contextual word representations. This leads us to propose full dependency parsing as a probing task . In support of our suggestion that harder probing tasks are necessary, our experiments with dependency parsing reveal a wide gap in syntactic knowledge between contextual and non-contextual representations.", "edit_actions": [{"type": "A", "before": null, "after": "for linguistic structure", "start_char_pos": 61, "end_char_pos": 61}, {"type": "A", "before": null, "after": "both", "start_char_pos": 79, "end_char_pos": 79}, {"type": "R", "before": "recent attention", "after": "attention recently in the NLP literature", "start_char_pos": 123, "end_char_pos": 139}, {"type": "D", "before": ", first,", "after": null, "start_char_pos": 191, "end_char_pos": 199}, {"type": "A", "before": null, "after": "fundamental", "start_char_pos": 237, "end_char_pos": 237}, {"type": "R", "before": "with such metrics show that probe's performance curves often fail to align with widely accepted rankings between language representations (with, e", "after": "using Pareto hypervolume as an evaluation metric show that probes often do not conform to our expectations---e", "start_char_pos": 415, "end_char_pos": 561}, {"type": "A", "before": null, "after": "why should the", "start_char_pos": 567, "end_char_pos": 567}, {"type": "R", "before": "representations outperforming contextual ones). These results lead us to argue, second, that commonsimplistic probe taskssuch as POS", "after": "fastText representations encode more morpho-syntactic information than the contextual BERT representations? These results suggest that common, simplistic probing tasks, such as part-of-speech", "start_char_pos": 583, "end_char_pos": 715}, {"type": "R", "before": "properties", "after": "linguistic structure", "start_char_pos": 785, "end_char_pos": 795}, {"type": "R", "before": "We", "after": "This leads us to", "start_char_pos": 840, "end_char_pos": 842}, {"type": "R", "before": "an example probe task, and demonstrate it with the Pareto hypervolume", "after": "a probing task", "start_char_pos": 878, "end_char_pos": 947}, {"type": "R", "before": "arguments, the results of this illustrative experiment conform closer to accepted rankings among contextual word", "after": "suggestion that harder probing tasks are necessary, our experiments with dependency parsing reveal a wide gap in syntactic knowledge between contextual and non-contextual", "start_char_pos": 968, "end_char_pos": 1080}], "sents_char_pos": [0, 141, 313, 398, 630, 839, 949]}
+{"doc_id": "2010.03025", "revision_depth": "1", "before_revision": "This paper considers a linear Fisher market with n buyers and a continuum of items. In order to compute market equilibria, we introduce (infinite-dimensional) convex programs over Banach spaces, thereby generalizing the Eisenberg-Gale convex program and its dual . Regarding the new convex programs, we establish existence of optimal solutions, the existence of KKT-type conditions , as well as strong duality . All these properties are established via non-standard arguments, which circumvent the limitations of duality theory in optimization over infinite-dimensional vector spaces. Furthermore, we show that there exists a pure equilibrium allocation, i.e., a division of the item space. Similar to the finite-dimensional case, a market equilibrium under the infinite-dimensional Fisher market is Pareto optimal, envy-free and proportional. We also show how to obtain the (a.e. unique) equilibrium price vector and a pure equilibrium allocation from the (unique) n-dimensional equilibrium bang-per-buck vector. When the item space is the unit interval 0,1 and buyers have piecewise linear utilities , we show that \\epsilon-approximate equilibrium prices can be computed in time polynomial in the market size and \\log \\frac{1{\\epsilon}. This is achieved by solving } a finite-dimensional convex program using the ellipsoid method. To this end, we give nontrivial and efficient subgradient and separation oracles. For general buyer valuations , we propose computing market equilibrium using stochastic dual averaging, which finds an approximate equilibrium price vector with high probability .", "after_revision": "Linear Fisher markets are a fundamental economic model with applications in fair division as well as large-scale Internet markets. In the finite-dimensional case of n buyers and m items, a market equilibrium can be computed using the Eisenberg-Gale convex program. Motivated by large-scale Internet advertising and fair division applications, this paper considers a generalization of linear Fisher market where there is a finite set of buyers and a continuum of items. We introduce generalizations of the Eisenberg-Gale convex program and its dual to this infinite-dimensional setting, which leads to Banach-space optimization problems. We establish existence of optimal solutions, strong duality , as well as necessity and sufficiency of KKT-type conditions . All these properties are established via non-standard arguments, which circumvent the limitations of duality theory in optimization over infinite-dimensional Banach spaces. Furthermore, we show that there exists a pure equilibrium allocation, i.e., a division of the item space. When the item space is a closed interval and buyers have piecewise linear valuations , we show that {\\epsilon}. This is achieved by solving } the Eisenberg-Gale-type convex program over the infinite-dimensional allocations can be reformulated as a finite-dimensional convex conic program, which can be solved efficiently using off-the-shelf optimization software based on primal-dual interior-point methods. For general buyer valuations or a very large number of buyers , we propose computing market equilibrium using stochastic dual averaging, which finds an approximate equilibrium price vector with high probability . Numerical experiments illustrate the efficiency and stability of the approaches .", "edit_actions": [{"type": "R", "before": "This", "after": "Linear Fisher markets are a fundamental economic model with applications in fair division as well as large-scale Internet markets. In the finite-dimensional case of n buyers and m items, a market equilibrium can be computed using the Eisenberg-Gale convex program. Motivated by large-scale Internet advertising and fair division applications, this", "start_char_pos": 0, "end_char_pos": 4}, {"type": "A", "before": null, "after": "generalization of", "start_char_pos": 23, "end_char_pos": 23}, {"type": "R", "before": "with n", "after": "where there is a finite set of", "start_char_pos": 45, "end_char_pos": 51}, {"type": "R", "before": "In order to compute market equilibria, we introduce (infinite-dimensional) convex programs over Banach spaces, thereby generalizing", "after": "We introduce generalizations of", "start_char_pos": 85, "end_char_pos": 216}, {"type": "R", "before": ". Regarding the new convex programs, we", "after": "to this infinite-dimensional setting, which leads to Banach-space optimization problems. We", "start_char_pos": 264, "end_char_pos": 303}, {"type": "R", "before": "the existence of KKT-type conditions", "after": "strong duality", "start_char_pos": 346, "end_char_pos": 382}, {"type": "R", "before": "strong duality", "after": "necessity and sufficiency of KKT-type conditions", "start_char_pos": 396, "end_char_pos": 410}, {"type": "R", "before": "vector", "after": "Banach", "start_char_pos": 571, "end_char_pos": 577}, {"type": "D", "before": "Similar to the finite-dimensional case, a market equilibrium under the infinite-dimensional Fisher market is Pareto optimal, envy-free and proportional. We also show how to obtain the (a.e. unique) equilibrium price vector and a pure equilibrium allocation from the (unique) n-dimensional equilibrium bang-per-buck vector.", "after": null, "start_char_pos": 692, "end_char_pos": 1014}, {"type": "D", "before": "the unit interval", "after": null, "start_char_pos": 1038, "end_char_pos": 1055}, {"type": "R", "before": "0,1", "after": "a closed interval", "start_char_pos": 1056, "end_char_pos": 1059}, {"type": "R", "before": "utilities", "after": "valuations", "start_char_pos": 1093, "end_char_pos": 1102}, {"type": "D", "before": "\\epsilon-approximate equilibrium prices can be computed in time polynomial in the market size and \\log \\frac{1", "after": null, "start_char_pos": 1118, "end_char_pos": 1228}, {"type": "A", "before": null, "after": "the Eisenberg-Gale-type convex program over the infinite-dimensional allocations can be reformulated as", "start_char_pos": 1270, "end_char_pos": 1270}, {"type": "R", "before": "program using the ellipsoid method. To this end, we give nontrivial and efficient subgradient and separation oracles.", "after": "conic program, which can be solved efficiently using off-the-shelf optimization software based on primal-dual interior-point methods.", "start_char_pos": 1299, "end_char_pos": 1416}, {"type": "A", "before": null, "after": "or a very large number of buyers", "start_char_pos": 1446, "end_char_pos": 1446}, {"type": "A", "before": null, "after": ". Numerical experiments illustrate the efficiency and stability of the approaches", "start_char_pos": 1596, "end_char_pos": 1596}], "sents_char_pos": [0, 84, 412, 585, 691, 844, 1014, 1239, 1334, 1416]}
+{"doc_id": "2010.03110", "revision_depth": "1", "before_revision": "Humans show an innate ability to learn the regularities of the world through interaction. By performing experiments in our environment, we are able to discern the causal factors of variation and infer how they affect the dynamics of our world. Analogously, here we attempt to equip reinforcement learning agents with the ability to perform experiments that facilitate a categorization of the rolled-out trajectories, and to subsequently infer the causal factors of the environment in a hierarchical manner. We introduce {\\em a novel intrinsic reward, called causal curiosity, and show that it allows our agents to learn optimal sequences of actions , and to discover causal factors in the dynamics . The learned behavior allows the agent to infer a binary quantized representation for the ground-truth causal factors in every environment. Additionally, we find that these experimental behaviors are semantically meaningful (e.g., to differentiate between heavy and light blocks, our agents learn to lift them ), and are learnt in a self-supervised manner with approximately 2.5 times less data than conventional supervised planners. We show that these behaviors can be re-purposed and fine-tuned (e.g., from lifting to pushing or other downstream tasks). Finally, we show that the knowledge of causal factor representations aids zero-shot learning for more complex tasks .", "after_revision": "Animals exhibit an innate ability to learn regularities of the world through interaction. By performing experiments in their environment, they are able to discern the causal factors of variation and infer how they affect the world's dynamics. Inspired by this, we attempt to equip reinforcement learning agents with the ability to perform experiments that facilitate a categorization of the rolled-out trajectories, and to subsequently infer the causal factors of the environment in a hierarchical manner. We introduce {\\em causal curiosity , a novel intrinsic reward, and show that it allows our agents to learn optimal sequences of actions and discover causal factors in the dynamics of the environment . The learned behavior allows the agents to infer a binary quantized representation for the ground-truth causal factors in every environment. Additionally, we find that these experimental behaviors are semantically meaningful (e.g., our agents learn to lift blocks to categorize them by weight ), and are learnt in a self-supervised manner with approximately 2.5 times less data than conventional supervised planners. We show that these behaviors can be re-purposed and fine-tuned (e.g., from lifting to pushing or other downstream tasks). Finally, we show that the knowledge of causal factor representations aids zero-shot learning for more complex tasks . Visit URL for website .", "edit_actions": [{"type": "R", "before": "Humans show", "after": "Animals exhibit", "start_char_pos": 0, "end_char_pos": 11}, {"type": "D", "before": "the", "after": null, "start_char_pos": 39, "end_char_pos": 42}, {"type": "R", "before": "our environment, we", "after": "their environment, they", "start_char_pos": 119, "end_char_pos": 138}, {"type": "R", "before": "dynamics of our world. Analogously, here", "after": "world's dynamics. Inspired by this,", "start_char_pos": 221, "end_char_pos": 261}, {"type": "A", "before": null, "after": "causal curiosity", "start_char_pos": 525, "end_char_pos": 525}, {"type": "A", "before": null, "after": ",", "start_char_pos": 526, "end_char_pos": 526}, {"type": "D", "before": "called causal curiosity,", "after": null, "start_char_pos": 553, "end_char_pos": 577}, {"type": "R", "before": ", and to", "after": "and", "start_char_pos": 651, "end_char_pos": 659}, {"type": "A", "before": null, "after": "of the environment", "start_char_pos": 700, "end_char_pos": 700}, {"type": "R", "before": "agent", "after": "agents", "start_char_pos": 735, "end_char_pos": 740}, {"type": "D", "before": "to differentiate between heavy and light blocks,", "after": null, "start_char_pos": 933, "end_char_pos": 981}, {"type": "R", "before": "them", "after": "blocks to categorize them by weight", "start_char_pos": 1007, "end_char_pos": 1011}, {"type": "A", "before": null, "after": ". Visit URL for website", "start_char_pos": 1374, "end_char_pos": 1374}], "sents_char_pos": [0, 89, 243, 506, 702, 841, 1135, 1257]}
+{"doc_id": "2010.03118", "revision_depth": "1", "before_revision": "Human driving behavior modeling is of great importance for designing safe, smart, smooth as well as personalized autonomous driving systems. In this paper, an internal reward function-based driving model that emulates the human's internal decision-making mechanism is proposed. Besides, a sampling-based inverse reinforcement learning (IRL) algorithm that learns the reward function from human naturalistic driving data is also developed. A polynomial trajectory sampler is adopted to generate feasible trajectories and approximate the partition function in the maximum entropy IRL framework, and a dynamic and interactive environment is built upon the static driving dataset to estimate the generated trajectories considering the mutual dependency of agents' actions . The proposed method is applied to learn personalized reward functions for individual human drivers from the NGSIM dataset. The qualitative results demonstrate that the learned reward function is able to interpret their decisions. The quantitative results also reveal that the personalized modeling method significantly outperforms the general modeling approach, reducing the errors in human likeness by 24 \\%, and the proposed reward-function-based method delivers better results compared to other baseline methods . Moreover, it is found that estimating the response actions of surrounding vehicles plays an integral role in estimating the trajectory accurately and achieving a better generalization ability .", "after_revision": "Driving behavior modeling is of great importance for designing safe, smart, and personalized autonomous driving systems. In this paper, an internal reward function-based driving model that emulates the human's internal decision-making mechanism is utilized. To infer the reward function from naturalistic human driving data, we propose a structural assumption about human driving behavior that focuses on discrete latent driving intentions. It converts the continuous behavior modeling problem to a discrete setting and thus makes maximum entropy inverse reinforcement learning (IRL) tractable to learn reward functions. Specifically, a polynomial trajectory sampler is adopted to generate candidate trajectories considering high-level intentions and approximate the partition function in the maximum entropy IRL framework, and an environment model considering interactive behaviors among the ego and surrounding vehicles is built to better estimate the generated trajectories . The proposed method is applied to learn personalized reward functions for individual human drivers from the NGSIM highway dataset. The qualitative results demonstrate that the learned reward function is able to explicitly express the preferences of different drivers and interpret their decisions. The quantitative results reveal that the learned reward function is robust, which is manifested by only a marginal decline in proximity to the human driving trajectories when applying the reward function in the testing conditions. For the testing performance, the personalized modeling method outperforms the general modeling approach, reducing the modeling errors in human likeness (a custom metric to gauge accuracy) by 23 \\%, and these two methods deliver better results compared to other baseline methods .", "edit_actions": [{"type": "R", "before": "Human driving", "after": "Driving", "start_char_pos": 0, "end_char_pos": 13}, {"type": "R", "before": "smooth as well as", "after": "and", "start_char_pos": 82, "end_char_pos": 99}, {"type": "R", "before": "proposed. Besides, a sampling-based", "after": "utilized. To infer the reward function from naturalistic human driving data, we propose a structural assumption about human driving behavior that focuses on discrete latent driving intentions. It converts the continuous behavior modeling problem to a discrete setting and thus makes maximum entropy", "start_char_pos": 268, "end_char_pos": 303}, {"type": "R", "before": "algorithm that learns the reward function from human naturalistic driving data is also developed. A", "after": "tractable to learn reward functions. Specifically, a", "start_char_pos": 341, "end_char_pos": 440}, {"type": "R", "before": "feasible trajectories", "after": "candidate trajectories considering high-level intentions", "start_char_pos": 494, "end_char_pos": 515}, {"type": "R", "before": "a dynamic and interactive environment is built upon the static driving dataset to", "after": "an environment model considering interactive behaviors among the ego and surrounding vehicles is built to better", "start_char_pos": 597, "end_char_pos": 678}, {"type": "D", "before": "considering the mutual dependency of agents' actions", "after": null, "start_char_pos": 715, "end_char_pos": 767}, {"type": "A", "before": null, "after": "highway", "start_char_pos": 884, "end_char_pos": 884}, {"type": "A", "before": null, "after": "explicitly express the preferences of different drivers and", "start_char_pos": 974, "end_char_pos": 974}, {"type": "D", "before": "also", "after": null, "start_char_pos": 1027, "end_char_pos": 1031}, {"type": "A", "before": null, "after": "learned reward function is robust, which is manifested by only a marginal decline in proximity to the human driving trajectories when applying the reward function in the testing conditions. For the testing performance, the", "start_char_pos": 1048, "end_char_pos": 1048}, {"type": "D", "before": "significantly", "after": null, "start_char_pos": 1078, "end_char_pos": 1091}, {"type": "A", "before": null, "after": "modeling", "start_char_pos": 1148, "end_char_pos": 1148}, {"type": "R", "before": "by 24", "after": "(a custom metric to gauge accuracy) by 23", "start_char_pos": 1174, "end_char_pos": 1179}, {"type": "R", "before": "the proposed reward-function-based method delivers", "after": "these two methods deliver", "start_char_pos": 1188, "end_char_pos": 1238}, {"type": "D", "before": ". Moreover, it is found that estimating the response actions of surrounding vehicles plays an integral role in estimating the trajectory accurately and achieving a better generalization ability", "after": null, "start_char_pos": 1289, "end_char_pos": 1482}], "sents_char_pos": [0, 140, 277, 438, 769, 893, 1001, 1290]}
+{"doc_id": "2010.03792", "revision_depth": "3", "before_revision": "A doubly robust (DR) estimator is crucial in causal inference , which consists of two nuisance parameters : the conditional mean outcome and logging policy ( probability of choosing an action) . This paper provides a DR estimator for dependent samples obtained in adaptive experimentsand introduces two related topics. First, we propose adaptive-fitting as a variant of sample-splitting for showing an asymptotically normal semiparametric estimator from dependent samples without non-Donsker nuisance estimators . Second, we report an empirical paradox that a DR estimator shows better performances than other estimators using the true logging policy instead of its estimator . While a similar phenomenon is also known for estimators with i.i.d. samples, we hypothesize that traditional explanations based on asymptotic efficiency cannot elucidate our case with dependent samples. We confirm this hypothesis through simulation studies.", "after_revision": "The doubly robust (DR) estimator , which consists of two nuisance parameters , the conditional mean outcome and the logging policy ( the probability of choosing an action) , is crucial in causal inference . This paper proposes a DR estimator for dependent samples obtained from adaptive experiments. To obtain an asymptotically normal semiparametric estimator from dependent samples with non-Donsker nuisance estimators , we propose adaptive-fitting as a variant of sample-splitting. We also report an empirical paradox that our proposed DR estimator tends to show better performances compared to other estimators utilizing the true logging policy . While a similar phenomenon is known for estimators with i.i.d. samples, traditional explanations based on asymptotic efficiency cannot elucidate our case with dependent samples. We confirm this hypothesis through simulation studies.", "edit_actions": [{"type": "R", "before": "A", "after": "The", "start_char_pos": 0, "end_char_pos": 1}, {"type": "D", "before": "is crucial in causal inference", "after": null, "start_char_pos": 31, "end_char_pos": 61}, {"type": "R", "before": ":", "after": ",", "start_char_pos": 106, "end_char_pos": 107}, {"type": "A", "before": null, "after": "the", "start_char_pos": 141, "end_char_pos": 141}, {"type": "A", "before": null, "after": "the", "start_char_pos": 159, "end_char_pos": 159}, {"type": "A", "before": null, "after": ", is crucial in causal inference", "start_char_pos": 195, "end_char_pos": 195}, {"type": "R", "before": "provides", "after": "proposes", "start_char_pos": 209, "end_char_pos": 217}, {"type": "R", "before": "in adaptive experimentsand introduces two related topics. First, we propose adaptive-fitting as a variant of sample-splitting for showing", "after": "from adaptive experiments. To obtain", "start_char_pos": 264, "end_char_pos": 401}, {"type": "R", "before": "without", "after": "with", "start_char_pos": 475, "end_char_pos": 482}, {"type": "R", "before": ". Second, we", "after": ", we propose adaptive-fitting as a variant of sample-splitting. We also", "start_char_pos": 515, "end_char_pos": 527}, {"type": "R", "before": "a DR estimator shows better performances than other estimators using", "after": "our proposed DR estimator tends to show better performances compared to other estimators utilizing", "start_char_pos": 561, "end_char_pos": 629}, {"type": "D", "before": "instead of its estimator", "after": null, "start_char_pos": 654, "end_char_pos": 678}, {"type": "D", "before": "also", "after": null, "start_char_pos": 711, "end_char_pos": 715}, {"type": "D", "before": "we hypothesize that", "after": null, "start_char_pos": 758, "end_char_pos": 777}], "sents_char_pos": [0, 197, 321, 680, 883]}
+{"doc_id": "2010.04855", "revision_depth": "1", "before_revision": "We propose a novel framework for non-parametric policy evaluationin static and dynamic settings. Under the assumption of selection on observables, we consider treatment effects of the population, of sub-populations , and of alternative populations that may have alternative covariate distributions. We further consider the decomposition of a total effect into a direct effect and an indirect effect ( as mediated by a particular mechanism) . Under the assumption of sequential selection on observables, we consider the effects of sequences of treatments. Across settings, we allow for treatments that may be discrete , continuous, or even text. Across settings, we allow for estimation of not only counterfactual mean outcomes but also counterfactual distributions of outcomes. We unify analyses across settings by showing that all of these causal learning problems reduce to the re-weighting of a prediction, i.e. causal adjustment. We implement the re-weighting as an inner product in a function space called a reproducing kernel Hilbert space (RKHS), with a closed form solution that can be computed in one line of code. We prove uniform consistency and provide finite sample rates of convergence. We evaluate our estimators in simulations devised by other authors. We use our new estimators to evaluate continuousand heterogeneous treatment effects of the US Jobs Corps training program for disadvantaged youth.", "after_revision": "We propose a family of reproducing kernel ridge estimators for nonparametric and semiparametric policy evaluation. The framework includes (i) treatment effects of the population, of subpopulations , and of alternative populations ; (ii) the decomposition of a total effect into a direct effect and an indirect effect ( mediated by a particular mechanism) ; and (iii) effects of sequences of treatments. Treatment and covariates may be discrete or continuous, and low, high, or infinite dimensional. We consider estimation of means, increments, and distributions of counterfactual outcomes. Each estimator is an inner product in a reproducing kernel Hilbert space (RKHS), with a one line, closed form solution . For the nonparametric case, we prove uniform consistency and provide finite sample rates of convergence. For the semiparametric case, we prove root n consistency, Gaussian approximation, and semiparametric efficiency by finite sample arguments. We evaluate our estimators in simulations then estimate continuous, heterogeneous, incremental, and mediated treatment effects of the US Jobs Corps training program for disadvantaged youth.", "edit_actions": [{"type": "R", "before": "novel framework for non-parametric policy evaluationin static and dynamic settings. Under the assumption of selection on observables, we consider", "after": "family of reproducing kernel ridge estimators for nonparametric and semiparametric policy evaluation. The framework includes (i)", "start_char_pos": 13, "end_char_pos": 158}, {"type": "R", "before": "sub-populations", "after": "subpopulations", "start_char_pos": 199, "end_char_pos": 214}, {"type": "R", "before": "that may have alternative covariate distributions. We further consider", "after": "; (ii)", "start_char_pos": 248, "end_char_pos": 318}, {"type": "D", "before": "as", "after": null, "start_char_pos": 401, "end_char_pos": 403}, {"type": "R", "before": ". Under the assumption of sequential selection on observables, we consider the", "after": "; and (iii)", "start_char_pos": 440, "end_char_pos": 518}, {"type": "R", "before": "Across settings, we allow for treatments that", "after": "Treatment and covariates", "start_char_pos": 555, "end_char_pos": 600}, {"type": "R", "before": ", continuous, or even text. Across settings, we allow for estimation of not only counterfactual mean outcomes but also counterfactual distributions of outcomes. We unify analyses across settings by showing that all of these causal learning problems reduce to the re-weighting of a prediction, i.e. causal adjustment. We implement the re-weighting as", "after": "or continuous, and low, high, or infinite dimensional. We consider estimation of means, increments, and distributions of counterfactual outcomes. Each estimator is", "start_char_pos": 617, "end_char_pos": 966}, {"type": "D", "before": "function space called a", "after": null, "start_char_pos": 989, "end_char_pos": 1012}, {"type": "A", "before": null, "after": "one line,", "start_char_pos": 1061, "end_char_pos": 1061}, {"type": "R", "before": "that can be computed in one line of code. We", "after": ". For the nonparametric case, we", "start_char_pos": 1083, "end_char_pos": 1127}, {"type": "A", "before": null, "after": "For the semiparametric case, we prove root n consistency, Gaussian approximation, and semiparametric efficiency by finite sample arguments.", "start_char_pos": 1202, "end_char_pos": 1202}, {"type": "R", "before": "devised by other authors. We use our new estimators to evaluate continuousand heterogeneous", "after": "then estimate continuous, heterogeneous, incremental, and mediated", "start_char_pos": 1245, "end_char_pos": 1336}], "sents_char_pos": [0, 96, 298, 441, 554, 644, 777, 933, 1124, 1201, 1270]}
+{"doc_id": "2010.05310", "revision_depth": "1", "before_revision": "We study the chase-escape percolation model on the 2D square lattice . In this model, prey particles spread to neighboring empty sites at rate p, and predator particles spread only to neighboring sites occupied by prey particles at rate 1, killing the prey particle present at that site. It is found that prey can survive for p>p_c with p_c<1. We estimate the value of p_c to be 0.4943 \\pm 0.0005 and the critical exponent for the divergence of the correlation length \\nu to be consistent with the 2D isotropic percolation value 4/3. We further show Chase-Escape percolation cannot fully be in the 2D isotropic percolationuniversality class as for p < p_c on a D-dimensional hypercubical lattice, the probability that the number of predators in the absorbing configuration is greater than s is bounded from below by \\exp(-Kp^{-1 in contrast to the exponentially decaying cluster size distribution of isotropic percolation . We then study the problem starting from an initial condition with predator particles on all lattice points of the line y=0 and prey particles on the line y=1. In this case, for p_c
p_c with p_c<1. Using Monte Carlo simulations on the square lattice, we estimate the value of p_c = 0.49451 \\pm 0.00001, and the critical exponents are consistent with the undirected percolation universality class. We define a discrete-time parallel-update version of the model, which brings out the relation between chase-escape and undirected bond percolation. For all p < p_c in D-dimensions, the number of predators in the absorbing configuration has a stretched-exponential distribution in contrast to the exponential distribution in the standard percolation theory. We also study the problem starting from the line initial condition with predator particles on all lattice points of the line y=0 and prey particles on the line y=1. In this case, for p_c
1.", "edit_actions": [{"type": "R", "before": "Harish-Chandra--Itzykson--Zuber", "after": "Harish-Chandra-Itzykson-Zuber", "start_char_pos": 59, "end_char_pos": 90}, {"type": "R", "before": "density", "after": "distribution", "start_char_pos": 98, "end_char_pos": 105}, {"type": "R", "before": "\\mathrm{U", "after": "\\text{U", "start_char_pos": 127, "end_char_pos": 136}, {"type": "R", "before": "\\mathrm{Tr", "after": "\\text{tr", "start_char_pos": 148, "end_char_pos": 158}, {"type": "A", "before": null, "after": ",", "start_char_pos": 183, "end_char_pos": 183}, {"type": "R", "before": "\\mathrm{U", "after": "\\text{U", "start_char_pos": 217, "end_char_pos": 226}, {"type": "A", "before": null, "after": "The density e^{\\text{tr", "start_char_pos": 232, "end_char_pos": 232}, {"type": "R", "before": "how to sample efficiently", "after": "efficient sampling", "start_char_pos": 449, "end_char_pos": 474}, {"type": "R", "before": "density", "after": "distribution", "start_char_pos": 489, "end_char_pos": 496}, {"type": "R", "before": "The main contribution of this paper is an algorithm to sample a matrix from a distribution that is \\varepsilon-close to the given HCIZ density and whose running time depends polylogarithmically", "after": "We present two efficient algorithms to sample matrices from distributions that are close to the HCIZ distribution. The first algorithm outputs samples that are \\xi-close in total variation distance and requires polynomially many arithmetic operations in \\log 1/\\xi and the number of bits needed to encode Y and \\Lambda. The second algorithm comes with a stronger guarantee that the samples are \\xi-close in infinity divergence, but the number of arithmetic operations depends polynomially", "start_char_pos": 516, "end_char_pos": 709}, {"type": "R", "before": "\\varepsilon. Interestingly,", "after": "\\xi, the number of bits needed to encode Y and \\Lambda, and the differences of the largest and the smallest eigenvalues of Y and \\Lambda.", "start_char_pos": 716, "end_char_pos": 743}, {"type": "R", "before": "\\mathrm{U", "after": "\\text{U", "start_char_pos": 806, "end_char_pos": 815}, {"type": "R", "before": "in this setting, they have been widely studied . Thus, our result has several direct applications, including polynomial-time algorithms", "after": "these densities have been studied in statistics, machine learning, and theoretical computer science. Thus our results have the following applications:", "start_char_pos": 832, "end_char_pos": 967}, {"type": "A", "before": null, "after": "an efficient algorithm", "start_char_pos": 971, "end_char_pos": 971}, {"type": "A", "before": null, "after": "complex versions of", "start_char_pos": 987, "end_char_pos": 987}, {"type": "A", "before": null, "after": "an efficient algorithm", "start_char_pos": 1044, "end_char_pos": 1044}, {"type": "R", "before": "maximum entropy distributions with applications to quantum inference", "after": "max-entropy distributions on unitary orbits, which implies an efficient algorithm to sample a pure quantum state from the entropy-maximizing ensemble representing a given density matrix", "start_char_pos": 1071, "end_char_pos": 1139}, {"type": "A", "before": null, "after": "an efficient algorithm", "start_char_pos": 1149, "end_char_pos": 1149}, {"type": "D", "before": "low-rank approximation. The key obstacle in sampling from an HCIZ density is that the domain is an algebraic manifold and the entries of the sample matrix are highly correlated. To overcome this, we consider a mapping that sends each Hermitian matrix X to a natural ordering of the eigenvalues of all leading principal minors of X. The image of each \\mathrm{U", "after": null, "start_char_pos": 1177, "end_char_pos": 1536}, {"type": "A", "before": null, "after": "rank-k approximation, with improved utility bounds for k>1.", "start_char_pos": 1946, "end_char_pos": 1946}], "sents_char_pos": [0, 278, 417, 515, 728, 880, 1200, 1354, 1508, 1653, 1809]}
+{"doc_id": "2011.05755", "revision_depth": "1", "before_revision": "With the enhancement of algorithms, cryo-EM has become the most efficient technique to solve structures of molecules . Take a recent event for example, after the outbreak of COVID-19 in January, the first structure of 2019-nCoV Spike trimer was published in Marchusing cryo-EM, which has provided crucial medical insight for developing vaccines. The enabler behind this efficiency is the GPU-accelerated computation which shortens the whole analysis process to 12 days. However, the data characteristics include strong noise, huge dimension, large sample size and high heterogeneity with unknown orientations have made analysis very challenging. Though, the popular GPU-accelerated Bayesian approach has been shown to be successful in 3D refinement. It is noted that the traditional method based on multireference alignment may better differentiate subtle structure differences under low signal to noise ratio (SNR). However, a modular GPU-acceleration package for multireference alignment is still lacking in the field. In this work, a modular GPU-accelerated alignment library called Cryo-RALib is proposed. The library contains both reference-free alignment and multireference alignment that can be widely used to accelerate state-of-the-art classification algorithms. In addition, we connect the cryo-EM image analysis with the python data science stack which enables users to perform data analysis , visualization and inference more easily. Benchmark on the TaiWan Computing Cloud container, our implementation can accelerate the computation by one order of magnitude. The library has been made publicly available at URL", "after_revision": "Thanks to automated cryo-EM and GPU-accelerated processing, single-particle cryo-EM has become a rapid structure determination method that permits capture of dynamical structures of molecules in solution, which has been recently demonstrated by the determination of COVID-19 spike protein in March, shortly after its breakout in late January 2020. This rapidity is critical for vaccine development in response to emerging pandemic. This explains why a 2D classification approach based on multi-reference alignment (MRA) is not as popular as the Bayesian-based approach despite that the former has advantage in differentiating subtle structural variations under low signal-to-noise ratio (SNR). This is perhaps because that MRA is a time-consuming process and a modular GPU-acceleration package for MRA is still lacking . Here, we introduced a library called Cryo-RALib that contains GPU-accelerated modular routines for accelerating MRA-based classification algorithms. In addition, we connect the cryo-EM image analysis with the python data science stack so as to make it easier for users to perform data analysis and visualization. Benchmarking on the TaiWan Computing Cloud (TWCC) container shows that our implementation can accelerate the computation by one order of magnitude. The library has been made publicly available at URL", "edit_actions": [{"type": "R", "before": "With the enhancement of algorithms,", "after": "Thanks to automated", "start_char_pos": 0, "end_char_pos": 35}, {"type": "A", "before": null, "after": "and GPU-accelerated processing, single-particle cryo-EM", "start_char_pos": 44, "end_char_pos": 44}, {"type": "R", "before": "the most efficient technique to solve", "after": "a rapid structure determination method that permits capture of dynamical", "start_char_pos": 56, "end_char_pos": 93}, {"type": "R", "before": ". Take a recent event for example, after the outbreak", "after": "in solution, which has been recently demonstrated by the determination", "start_char_pos": 118, "end_char_pos": 171}, {"type": "R", "before": "in January, the first structure of 2019-nCoV Spike trimer was published in Marchusing cryo-EM, which has provided crucial medical insight for developing vaccines. The enabler behind this efficiency is the GPU-accelerated computation which shortens the whole analysis process to 12 days. However, the data characteristics include strong noise, huge dimension, large sample size and high heterogeneity with unknown orientations have made analysis very challenging. Though, the popular GPU-accelerated Bayesian approach has been shown to be successful in 3D refinement. It is noted that the traditional method based on multireference alignment may better differentiate subtle structure differences under low signal to noise", "after": "spike protein in March, shortly after its breakout in late January 2020. This rapidity is critical for vaccine development in response to emerging pandemic. This explains why a 2D classification approach based on multi-reference alignment (MRA) is not as popular as the Bayesian-based approach despite that the former has advantage in differentiating subtle structural variations under low signal-to-noise", "start_char_pos": 184, "end_char_pos": 904}, {"type": "R", "before": "However, a", "after": "This is perhaps because that MRA is a time-consuming process and a", "start_char_pos": 918, "end_char_pos": 928}, {"type": "R", "before": "multireference alignment", "after": "MRA", "start_char_pos": 966, "end_char_pos": 990}, {"type": "R", "before": "in the field. In this work, a modular GPU-accelerated alignment", "after": ". Here, we introduced a", "start_char_pos": 1008, "end_char_pos": 1071}, {"type": "R", "before": "is proposed. The library contains both reference-free alignment and multireference alignment that can be widely used to accelerate state-of-the-art", "after": "that contains GPU-accelerated modular routines for accelerating MRA-based", "start_char_pos": 1098, "end_char_pos": 1245}, {"type": "R", "before": "which enables", "after": "so as to make it easier for", "start_char_pos": 1359, "end_char_pos": 1372}, {"type": "R", "before": ", visualization and inference more easily. Benchmark", "after": "and visualization. Benchmarking", "start_char_pos": 1404, "end_char_pos": 1456}, {"type": "R", "before": "container,", "after": "(TWCC) container shows that", "start_char_pos": 1487, "end_char_pos": 1497}], "sents_char_pos": [0, 119, 346, 470, 646, 750, 917, 1021, 1110, 1272, 1446, 1574]}
+{"doc_id": "2011.06748", "revision_depth": "1", "before_revision": "Control Barrier Functions (CBF) are widely used to enforce the safety-critical constraints on nonlinear systems. Recently, these functions are being incorporated into a path planning framework to design a safety-critical path planner . However, these methods fall short of providing a realistic path considering both run-time complexity and safety-critical constraints. This paper proposes a novel motion planning approach using Rapidly exploring Random Trees (RRT) algorithm to enforce the robust CBF and kinodynamic constraints to generate a safety-critical path that is free of any obstacles while taking into account the model uncertainty from robot dynamics as well as perception. Result analysis indicates that the proposed method outperforms various conventional RRT based path planners, guaranteeing a safety-critical path with reduced computational overhead. We present numerical validation of the algorithm on the Hamster V7 robot car, a micro autonomous Unmanned Ground Vehicle , where it performs dynamic navigation on an obstacle-ridden path with various uncertainties in perception noises , and robot dynamics.", "after_revision": "Control Barrier Functions (CBF) are widely used to enforce the safety-critical constraints on nonlinear systems. Recently, these functions are being incorporated into a path planning framework to design safety-critical path planners . However, these methods fall short of providing a realistic path considering both the algorithm's run-time complexity and enforcement of the safety-critical constraints. This paper proposes a novel motion planning approach using the well-known Rapidly Exploring Random Trees (RRT) algorithm that enforces both CBF and the robot Kinodynamic constraints to generate a safety-critical path . The proposed algorithm also outputs the corresponding control signals that resulted in the obstacle-free path. The approach also allows considering model uncertainties by incorporating the robust CBF constraints into the proposed framework. Thus, the resulting path is free of any obstacles and accounts for the model uncertainty from robot dynamics and perception. Result analysis indicates that the proposed method outperforms various conventional RRT-based path planners, guaranteeing a safety-critical path with minimal computational overhead. We present numerical validation of the algorithm on the Hamster V7 robot car, a micro autonomous Unmanned Ground Vehicle that performs dynamic navigation on an obstacle-ridden path with various uncertainties in perception noises and robot dynamics.", "edit_actions": [{"type": "D", "before": "a", "after": null, "start_char_pos": 203, "end_char_pos": 204}, {"type": "R", "before": "planner", "after": "planners", "start_char_pos": 226, "end_char_pos": 233}, {"type": "A", "before": null, "after": "the algorithm's", "start_char_pos": 317, "end_char_pos": 317}, {"type": "A", "before": null, "after": "enforcement of the", "start_char_pos": 342, "end_char_pos": 342}, {"type": "R", "before": "Rapidly exploring", "after": "the well-known Rapidly Exploring", "start_char_pos": 431, "end_char_pos": 448}, {"type": "R", "before": "to enforce the robust CBF and kinodynamic", "after": "that enforces both CBF and the robot Kinodynamic", "start_char_pos": 478, "end_char_pos": 519}, {"type": "R", "before": "that", "after": ". The proposed algorithm also outputs the corresponding control signals that resulted in the obstacle-free path. The approach also allows considering model uncertainties by incorporating the robust CBF constraints into the proposed framework. Thus, the resulting path", "start_char_pos": 567, "end_char_pos": 571}, {"type": "R", "before": "while taking into account", "after": "and accounts for", "start_char_pos": 597, "end_char_pos": 622}, {"type": "R", "before": "as well as", "after": "and", "start_char_pos": 665, "end_char_pos": 675}, {"type": "R", "before": "RRT based", "after": "RRT-based", "start_char_pos": 772, "end_char_pos": 781}, {"type": "R", "before": "reduced", "after": "minimal", "start_char_pos": 838, "end_char_pos": 845}, {"type": "R", "before": ", where it", "after": "that", "start_char_pos": 991, "end_char_pos": 1001}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1105, "end_char_pos": 1106}], "sents_char_pos": [0, 112, 235, 371, 687, 869]}
+{"doc_id": "2011.07403", "revision_depth": "1", "before_revision": "Many language pairs are low resource - the amount and/or quality of parallel data is not sufficient to train a neural machine translation (NMT) model which can reach an acceptable standard of accuracy. Many works have explored the use of the easier-to-get monolingual data to improve the performance of translation models in this category of languages - and even high resource languages. The most successful of such works is the back-translation - using the translations of the target language monolingual data to increase the amount of the training data. The quality of the backward model - trained on the available parallel data - has been shown to determine the performance of the back-translation approach. Many approaches have been explored to improve the performance of thismodel especially in low resource languages where the amount of parallel data is not sufficient to train an acceptable backward model . Among such works are the use of self-learning and the iterative back-translation. These methods were shown to perform better than the standard back-translation. This work presents the iterative self-training approach as an improvement over the self-learning approach to further enhance the performance of the backward model. Over several iterations, the synthetic datagenerated by the backward model is used to improve its performance through forward translation. Experiments have shown that the method outperforms both the standard back-translation and self-learning approach on IWSLT'14 English German low resource NMT. While the method also outperforms the iterative back-translation , though slightly, the number of models required to be trained is reduced exactly by the number of iterations .", "after_revision": "Many language pairs are low resource , meaning the amount and/or quality of available parallel data is not sufficient to train a neural machine translation (NMT) model which can reach an acceptable standard of accuracy. Many works have explored using the readily available monolingual data in either or both of the languages to improve the standard of translation models in low, and even high , resource languages. One of the most successful of such works is the back-translation that utilizes the translations of the target language monolingual data to increase the amount of the training data. The quality of the backward model which is trained on the available parallel data has been shown to determine the performance of the back-translation approach. Despite this, only the forward model is improved on the monolingual target data in standard back-translation. A previous study proposed an iterative back-translation approach for improving both models over several iterations. But unlike in the traditional back-translation, it relied on both the target and source monolingual data. This work, therefore, proposes a novel approach that enables both the backward and forward models to benefit from the monolingual target data through a hybrid of self-learning and back-translation respectively. Experimental results have shown the superiority of the proposed approach over the traditional back-translation method on English-German low resource neural machine translation. We also proposed an iterative self-learning approach that outperforms the iterative back-translation while also relying only on the monolingual target data and require the training of less models .", "edit_actions": [{"type": "R", "before": "-", "after": ", meaning", "start_char_pos": 37, "end_char_pos": 38}, {"type": "A", "before": null, "after": "available", "start_char_pos": 68, "end_char_pos": 68}, {"type": "R", "before": "the use of the easier-to-get monolingual data", "after": "using the readily available monolingual data in either or both of the languages", "start_char_pos": 228, "end_char_pos": 273}, {"type": "R", "before": "performance", "after": "standard", "start_char_pos": 289, "end_char_pos": 300}, {"type": "R", "before": "this category of languages -", "after": "low,", "start_char_pos": 326, "end_char_pos": 354}, {"type": "A", "before": null, "after": ",", "start_char_pos": 369, "end_char_pos": 369}, {"type": "R", "before": "The", "after": "One of the", "start_char_pos": 390, "end_char_pos": 393}, {"type": "R", "before": "- using", "after": "that utilizes", "start_char_pos": 448, "end_char_pos": 455}, {"type": "R", "before": "-", "after": "which is", "start_char_pos": 592, "end_char_pos": 593}, {"type": "D", "before": "-", "after": null, "start_char_pos": 633, "end_char_pos": 634}, {"type": "R", "before": "Many approaches have been explored to improve the performance of thismodel especially in low resource languages where the amount of parallel data is not sufficient to train an acceptable backward model . Among such works are the use of self-learning and the iterative back-translation. These methods were shown to perform better than the", "after": "Despite this, only the forward model is improved on the monolingual target data in", "start_char_pos": 713, "end_char_pos": 1050}, {"type": "R", "before": "This work presents the iterative self-training approach as an improvement over the", "after": "A previous study proposed an iterative back-translation approach for improving both models over several iterations. But unlike in the traditional back-translation, it relied on both the target and source monolingual data. This work, therefore, proposes a novel approach that enables both the backward and forward models to benefit from the monolingual target data through a hybrid of", "start_char_pos": 1078, "end_char_pos": 1160}, {"type": "R", "before": "approach to further enhance the performance of the backward model. Over several iterations,", "after": "and back-translation respectively. Experimental results have shown", "start_char_pos": 1175, "end_char_pos": 1266}, {"type": "R", "before": "synthetic datagenerated by the backward model is used to improve its performance through forward translation. Experiments have shown that the method outperforms both the standard", "after": "superiority of the proposed approach over the traditional", "start_char_pos": 1271, "end_char_pos": 1449}, {"type": "R", "before": "and self-learning approach on IWSLT'14 English German low resource NMT. While the method also", "after": "method on English-German low resource neural machine translation. We also proposed an iterative self-learning approach that", "start_char_pos": 1467, "end_char_pos": 1560}, {"type": "R", "before": ", though slightly, the number of models required to be trained is reduced exactly by the number of iterations", "after": "while also relying only on the monolingual target data and require the training of less models", "start_char_pos": 1604, "end_char_pos": 1713}], "sents_char_pos": [0, 202, 389, 557, 712, 998, 1077, 1241, 1380]}
+{"doc_id": "2011.07494", "revision_depth": "2", "before_revision": "The SIR(D) epidemiological model is defined through transcendental equations not solvable by elementary functions. In the present paper , those equations are successfully replaced by approximate ones, whose solutions are given explicitly in terms of elementary functions, namely , piece-wisely, generalized logistic functions: they {\\em unveil a useful feature, that in fact is also owned by the (numerical) solutions of the exact equations {\\em {\\em .", "after_revision": "The SIR(D) epidemiological model is defined through a system of transcendental equations, not solvable by elementary functions. In the present paper those equations are successfully replaced by approximate ones, whose solutions are given explicitly in terms of elementary functions, originating , piece-wisely, from generalized logistic functions: they ensure{\\em exact (in the numerical sense) asymptotic values, besides to be quite practical to use, for example with fit to data algorithms; moreover they unveil a useful feature, that in fact , at least with very strict approximation, is also owned by the (numerical) solutions of the {\\em exact equations. The novelties in the work are: the way the approximate equations are obtained, using simple, analytic geometry considerations; the easy and practical formulation of the final approximate solutions; the mentioned useful feature, never disclosed before. The work's method and result prove to be robust over a range of values of the well known non-dimensional parameter called{\\em basic reproduction ratio , that covers at least all the known epidemic cases, from influenza to measles: this is a point which doesn't appear much discussed in analogous works .", "edit_actions": [{"type": "R", "before": "transcendental equations", "after": "a system of transcendental equations,", "start_char_pos": 52, "end_char_pos": 76}, {"type": "D", "before": ",", "after": null, "start_char_pos": 136, "end_char_pos": 137}, {"type": "R", "before": "namely", "after": "originating", "start_char_pos": 272, "end_char_pos": 278}, {"type": "A", "before": null, "after": "from", "start_char_pos": 295, "end_char_pos": 295}, {"type": "A", "before": null, "after": "ensure", "start_char_pos": 333, "end_char_pos": 333}, {"type": "A", "before": null, "after": "exact", "start_char_pos": 338, "end_char_pos": 338}, {"type": "A", "before": null, "after": "(in the numerical sense) asymptotic values, besides to be quite practical to use, for example with fit to data algorithms; moreover they", "start_char_pos": 339, "end_char_pos": 339}, {"type": "A", "before": null, "after": ", at least with very strict approximation,", "start_char_pos": 378, "end_char_pos": 378}, {"type": "D", "before": "exact equations", "after": null, "start_char_pos": 429, "end_char_pos": 444}, {"type": "A", "before": null, "after": "exact", "start_char_pos": 450, "end_char_pos": 450}, {"type": "A", "before": null, "after": "equations. The novelties in the work are: the way the approximate equations are obtained, using simple, analytic geometry considerations; the easy and practical formulation of the final approximate solutions; the mentioned useful feature, never disclosed before. The work's method and result prove to be robust over a range of values of the well known non-dimensional parameter called", "start_char_pos": 451, "end_char_pos": 451}, {"type": "A", "before": null, "after": "basic reproduction ratio", "start_char_pos": 456, "end_char_pos": 456}, {"type": "A", "before": null, "after": ", that covers at least all the known epidemic cases, from influenza to measles: this is a point which doesn't appear much discussed in analogous works", "start_char_pos": 457, "end_char_pos": 457}], "sents_char_pos": [0, 114]}
+{"doc_id": "2011.09137", "revision_depth": "1", "before_revision": "The credit rating is an evaluation of the credit risk of a company that values the ability to pay back the debt and predict the likelihood of the debtor defaulting. There are various features influencing credit rating. Therefore it is very important to select substantive features to explore the main reason for credit rating change. To address this issue, this paper exploits Principal Component Analysis and Factor Analysis as feature selection algorithms to select important features, summarise the similar features together and obtain a minimum set of features for four sectors, Financial Sector, Energy Sector, Health Care Sector, Consumer Discretionary Sector. This paper uses two data sets, Financial Ratio and Balance Sheet, with two mappings, Detailed Mapping and Coarse Mapping, converting the target variable(credit rating) into categorical variable. To test the accuracy of credit rating prediction, Random Forest Classifier is used to test and train feature sets. The results show that the accuracy of Financial Ratio feature sets are higher than that of Balance Sheet feature sets. What is more , Factor Analysis can reduce significantly the number of features to obtain almost the same accuracy that can decrease dramatically the time spent on analyzing data .In addition, we summarise seven dominant factors and ten dominant factors having effect on credit rating change in Financial Ratio and Balance Sheet respectively by utilizing Factor Analysis which can explain the reason of credit rating change better.", "after_revision": "The credit rating is an evaluation of a company's credit risk that values the ability to pay back the debt and predict the likelihood of the debtor defaulting. There are various features influencing credit rating. Therefore , it is essential to select substantive features to explore the main reason for credit rating change. To address this issue, this paper exploited Principal Component Analysis and Factor Analysis as feature selection algorithms to select important features, summarized the similar features together , and obtained a minimum set of features for four sectors, Financial Sector, Energy Sector, Health Care Sector, Consumer Discretionary Sector. This paper used two data sets, Financial Ratio and Balance Sheet, with two mappings, Detailed Mapping , and Coarse Mapping, converting the target variable(credit rating) into categorical variable. To test the accuracy of credit rating prediction, Random Forest Classifier was used to test and train feature sets. The results showed that the accuracy of Financial Ratio feature sets was higher than that of Balance Sheet feature sets. In addition , Factor Analysis can reduce the number of features significantly to obtain almost the same accuracy that can decrease dramatically the time spent on analyzing data ; we also summarized seven dominant factors and ten dominant factors affecting credit rating change in Financial Ratio and Balance Sheet by utilizing Factor Analysis , respectively, which can explain the reason of credit rating change better.", "edit_actions": [{"type": "R", "before": "the credit risk of a company", "after": "a company's credit risk", "start_char_pos": 38, "end_char_pos": 66}, {"type": "R", "before": "it is very important", "after": ", it is essential", "start_char_pos": 229, "end_char_pos": 249}, {"type": "R", "before": "exploits", "after": "exploited", "start_char_pos": 368, "end_char_pos": 376}, {"type": "R", "before": "summarise", "after": "summarized", "start_char_pos": 488, "end_char_pos": 497}, {"type": "R", "before": "and obtain", "after": ", and obtained", "start_char_pos": 528, "end_char_pos": 538}, {"type": "R", "before": "uses", "after": "used", "start_char_pos": 678, "end_char_pos": 682}, {"type": "A", "before": null, "after": ",", "start_char_pos": 769, "end_char_pos": 769}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 938, "end_char_pos": 940}, {"type": "R", "before": "show", "after": "showed", "start_char_pos": 990, "end_char_pos": 994}, {"type": "R", "before": "are", "after": "was", "start_char_pos": 1045, "end_char_pos": 1048}, {"type": "R", "before": "What is more", "after": "In addition", "start_char_pos": 1097, "end_char_pos": 1109}, {"type": "D", "before": "significantly", "after": null, "start_char_pos": 1139, "end_char_pos": 1152}, {"type": "A", "before": null, "after": "significantly", "start_char_pos": 1176, "end_char_pos": 1176}, {"type": "R", "before": ".In addition, we summarise", "after": "; we also summarized", "start_char_pos": 1276, "end_char_pos": 1302}, {"type": "R", "before": "having effect on", "after": "affecting", "start_char_pos": 1351, "end_char_pos": 1367}, {"type": "D", "before": "respectively", "after": null, "start_char_pos": 1426, "end_char_pos": 1438}, {"type": "A", "before": null, "after": ", respectively,", "start_char_pos": 1468, "end_char_pos": 1468}], "sents_char_pos": [0, 164, 218, 333, 666, 862, 977, 1096, 1277]}
+{"doc_id": "2011.09756", "revision_depth": "1", "before_revision": "This paper presents how the hybrid combination of behavior trees and the neuroscientific principle of active inference can be used for action planning and execution for reactive robot behaviors in dynamic environments. We show how complex robotic tasks can be formulated as a free-energy minimisation problem, and how state estimation and symbolic decision making are handled within the same framework. The general behavior is specified offline through behavior trees, where the leaf nodes represent desired states, not actions as in classical behavior trees . The decision of which action to execute to reach a state is left to the online active inference routine, in order to resolve unexpected contingencies. This hybrid combination improves the robustness of plans specified through behavior trees, while allowing to cope with the curse of dimensionality in active inference . The properties of the proposed algorithmare analysed in terms of robustness and convergence , and the theoretical results are validated using a mobile manipulator in a retail environment.", "after_revision": "We propose a hybrid combination of active inference and behavior trees (BTs) for reactive action planning and execution in dynamic environments. We show how robotic tasks can be formulated as a free-energy minimization problem, bringing the neuroscientific theory of active inference on a mobile manipulator. In this framework, the general nominal behavior is specified offline through BTs. A new type of leaf node, theprior node, is introduced to specify the desired state to be achieved rather than an action to be executed as in classical BTs . The decision of which action to execute to reach the desired state is performed online through active inference. The resulting hybrid combination improves the robustness of plans against unexpected contingencies while considerably reducing the number of nodes in a BT . The properties of our algorithm, such as the convergence and robustness, are thoroughly analyzed and outperform classical BT solutions. The theoretical results are validated using a mobile manipulator in a retail environment.", "edit_actions": [{"type": "R", "before": "This paper presents how the", "after": "We propose a", "start_char_pos": 0, "end_char_pos": 27}, {"type": "R", "before": "behavior trees and the neuroscientific principle of active inference can be used for", "after": "active inference and behavior trees (BTs) for reactive", "start_char_pos": 50, "end_char_pos": 134}, {"type": "D", "before": "for reactive robot behaviors", "after": null, "start_char_pos": 165, "end_char_pos": 193}, {"type": "D", "before": "complex", "after": null, "start_char_pos": 231, "end_char_pos": 238}, {"type": "R", "before": "minimisation problem, and how state estimation and symbolic decision making are handled within the same framework. The general", "after": "minimization problem, bringing the neuroscientific theory of active inference on a mobile manipulator. In this framework, the general nominal", "start_char_pos": 288, "end_char_pos": 414}, {"type": "R", "before": "behavior trees, where the leaf nodes represent desired states, not actions", "after": "BTs. A new type of leaf node, the", "start_char_pos": 453, "end_char_pos": 527}, {"type": "A", "before": null, "after": "prior", "start_char_pos": 527, "end_char_pos": 527}, {"type": "A", "before": null, "after": "node, is introduced to specify the desired state to be achieved rather than an action to be executed", "start_char_pos": 528, "end_char_pos": 528}, {"type": "R", "before": "behavior trees", "after": "BTs", "start_char_pos": 545, "end_char_pos": 559}, {"type": "R", "before": "a state is left to the online active inference routine, in order to resolve unexpected contingencies. This", "after": "the desired state is performed online through active inference. The resulting", "start_char_pos": 611, "end_char_pos": 717}, {"type": "R", "before": "specified through behavior trees, while allowing to cope with the curse of dimensionality in active inference", "after": "against unexpected contingencies while considerably reducing the number of nodes in a BT", "start_char_pos": 770, "end_char_pos": 879}, {"type": "R", "before": "the proposed algorithmare analysed in terms of robustness and convergence , and the", "after": "our algorithm, such as the convergence and robustness, are thoroughly analyzed and outperform classical BT solutions. The", "start_char_pos": 900, "end_char_pos": 983}], "sents_char_pos": [0, 218, 402, 561, 712, 881]}
+{"doc_id": "2011.10126", "revision_depth": "1", "before_revision": "The spread of African swine fever (ASF) poses a grave threat to the global swine industry. Understanding transmission dynamics, such as through mechanistic modeling, is critical for designing effective control strategies. Articles were examined across multiple epidemiological and model characteristics. Model filiation was determined through creation of a neighbor-joined tree using phylogenetic software. Of 24 articles qualifying for inclusion, four main objectives were identified: estimating transmission parameters ( 9 studies), assessing determinants of transmission ( 4 ), examining consequences of hypothetical outbreaks ( 3 ), and assessing alternative control strategies ( 8). Population-based ( 11) , metapopulation (5), and individual-based (8) model frameworks were represented. The majority of models (18) were parameterized to the genotype II isolates currently circulating in Europe and Asia. Estimated transmission parameters varied widely as did parameter assumptions between models. Uncertainties on epidemiological and ecological parameters were usually accounted for to assess the impact on the modeled infection trajectory. Almost half of the studies stem from one of two models . We call for a diversification of modeling approaches through developing additional frameworks. All models but one are host specific to either domestic pigs or wild boar , despite the fact that spillover events between the domestic and wild compartments can play an important role in outbreaks. The development of models incorporating this transmission is crucial. All compared control strategies were defined a priori, and future models should be built to identify optimal contributions across many control methods. Further, control strategies were examined in competition, opposed to how they would be synergistically implemented. For ASF models to effectively support decision-making , these limitations need to be addressed.", "after_revision": "The spread of African swine fever (ASF) poses a grave threat to the global swine industry. Understanding transmission dynamics, such as through mechanistic modeling, is critical for designing effective control strategies. Articles were examined across multiple epidemiological and model characteristics. Model filiation was determined through creation of a neighbor-joined tree using phylogenetic software. Of 34 four articles qualifying for inclusion, four main modelling objectives were identified: estimating transmission parameters ( 11 studies), assessing determinants of transmission ( 7 ), examining consequences of hypothetical outbreaks ( 5 ), and assessing alternative control strategies ( 11) . Estimated transmission parameters varied widely as did parameter assumptions between models. Uncertainties on epidemiological and ecological parameters were usually accounted for to assess the impact on the modeled infection trajectory. Almost all models are host specific , being developed for either domestic pigs or wild boar despite the fact that spillover events between domestic pigs and wild boar are evidenced to play an important role in ASF outbreaks. The development of models incorporating such transmission routes is crucial. All compared control strategies were defined a priori, and future models should be built to identify optimal contributions across many control methods. Further, control strategies were examined in competition, opposed to how they would be synergistically implemented. While comparing strategies is beneficial for identifying a rank-order efficacy of control methods, this structure does not necessarily determine the most effective combination of all available strategies. In order for ASFV models to effectively support decision-making in controlling ASFV globally, these modelling limitations need to be addressed.", "edit_actions": [{"type": "R", "before": "24", "after": "34 four", "start_char_pos": 410, "end_char_pos": 412}, {"type": "A", "before": null, "after": "modelling", "start_char_pos": 458, "end_char_pos": 458}, {"type": "R", "before": "9", "after": "11", "start_char_pos": 524, "end_char_pos": 525}, {"type": "R", "before": "4", "after": "7", "start_char_pos": 577, "end_char_pos": 578}, {"type": "R", "before": "3", "after": "5", "start_char_pos": 633, "end_char_pos": 634}, {"type": "D", "before": "8). Population-based (", "after": null, "start_char_pos": 685, "end_char_pos": 707}, {"type": "R", "before": ", metapopulation (5), and individual-based (8) model frameworks were represented. The majority of models (18) were parameterized to the genotype II isolates currently circulating in Europe and Asia.", "after": ".", "start_char_pos": 712, "end_char_pos": 910}, {"type": "R", "before": "half of the studies stem from one of two models . We call for a diversification of modeling approaches through developing additional frameworks. All models but one", "after": "all models", "start_char_pos": 1155, "end_char_pos": 1318}, {"type": "R", "before": "to", "after": ", being developed for", "start_char_pos": 1337, "end_char_pos": 1339}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1374, "end_char_pos": 1375}, {"type": "R", "before": "the domestic and wild compartments can", "after": "domestic pigs and wild boar are evidenced to", "start_char_pos": 1423, "end_char_pos": 1461}, {"type": "A", "before": null, "after": "ASF", "start_char_pos": 1488, "end_char_pos": 1488}, {"type": "R", "before": "this transmission", "after": "such transmission routes", "start_char_pos": 1540, "end_char_pos": 1557}, {"type": "R", "before": "For ASF", "after": "While comparing strategies is beneficial for identifying a rank-order efficacy of control methods, this structure does not necessarily determine the most effective combination of all available strategies. In order for ASFV", "start_char_pos": 1838, "end_char_pos": 1845}, {"type": "R", "before": ", these", "after": "in controlling ASFV globally, these modelling", "start_char_pos": 1892, "end_char_pos": 1899}], "sents_char_pos": [0, 90, 221, 303, 406, 793, 910, 1003, 1147, 1204, 1299, 1499, 1569, 1721, 1837]}
+{"doc_id": "2011.10896", "revision_depth": "2", "before_revision": "Hardware-agnostic programming with high performance portability will be the bedrock for realizing the ubiquitous adoption of emerging accelerator technologies in future heterogeneous high-performance computing (HPC) systems, which is the key to achieving the next level of HPC performance on an expanding accelerator landscape. In this paper , we present HALO 1.0, an open-ended extensible multi-agent software framework that implements a set of proposed hardware-agnostic accelerator orchestration (HALO) principles and a novel compute-centric message passing interface (C^2MPI) specification for enabling the portable and performance-optimized execution of hardware-agnostic application host codes across heterogeneous accelerator resources . The experiment results of evaluating eight widely used HPC subroutines based on Intel Xeon E5-2620 v4 CPUs, Intel Arria 10 GX FPGAs, and NVIDIA GeForce RTX 2080 Ti GPUs show that HALO 1.0 allows for a unified control flow for the host program to run across all the computing devices with a consistently maximum performance portability score of 1.0 , which is 2x-861,883x higher than the OpenCL-based solution that suffers from an unstably low performance portability score. of the documentation of their work .", "after_revision": "This paper presents HALO 1.0, an open-ended extensible multi-agent software framework that implements a set of proposed hardware-agnostic accelerator orchestration (HALO) principles . HALO implements a novel compute-centric message passing interface (C^2MPI) specification for enabling the performance-portable execution of a hardware-agnostic host application across heterogeneous accelerators . The experiment results of evaluating eight widely used HPC subroutines based on Intel Xeon E5-2620 CPUs, Intel Arria 10 GX FPGAs, and NVIDIA GeForce RTX 2080 Ti GPUs show that HALO 1.0 allows for a unified control flow for host programs to run across all the computing devices with a consistently top performance portability score , which is up to five orders of magnitude higher than the OpenCL-based solution .", "edit_actions": [{"type": "R", "before": "Hardware-agnostic programming with high performance portability will be the bedrock for realizing the ubiquitous adoption of emerging accelerator technologies in future heterogeneous high-performance computing (HPC) systems, which is the key to achieving the next level of HPC performance on an expanding accelerator landscape. In this paper , we present", "after": "This paper presents", "start_char_pos": 0, "end_char_pos": 354}, {"type": "R", "before": "and", "after": ". HALO implements", "start_char_pos": 517, "end_char_pos": 520}, {"type": "R", "before": "portable and performance-optimized execution of", "after": "performance-portable execution of a", "start_char_pos": 611, "end_char_pos": 658}, {"type": "R", "before": "application host codes across heterogeneous accelerator resources", "after": "host application across heterogeneous accelerators", "start_char_pos": 677, "end_char_pos": 742}, {"type": "D", "before": "v4", "after": null, "start_char_pos": 844, "end_char_pos": 846}, {"type": "R", "before": "the host program", "after": "host programs", "start_char_pos": 971, "end_char_pos": 987}, {"type": "R", "before": "maximum", "after": "top", "start_char_pos": 1048, "end_char_pos": 1055}, {"type": "D", "before": "of 1.0", "after": null, "start_char_pos": 1086, "end_char_pos": 1092}, {"type": "R", "before": "2x-861,883x", "after": "up to five orders of magnitude", "start_char_pos": 1104, "end_char_pos": 1115}, {"type": "D", "before": "that suffers from an unstably low performance portability score. of the documentation of their work", "after": null, "start_char_pos": 1154, "end_char_pos": 1253}], "sents_char_pos": [0, 327, 744, 852]}
+{"doc_id": "2011.11259", "revision_depth": "1", "before_revision": "Pairwise Potts models (PM) provide accurate statistical models of families of evolutionarily related protein sequences. Their parameters are the local fields, which describe site-specific patterns of amino-acid conservation, and the two-site couplings, which mirror the coevolution between pairs of distinct sites. This coevolution reflects structural and functional constraints acting on protein sequences during evolution , and couplings can a priori connect any pairs of sites, even those being distant along the protein chain, or distant in the three-dimensional protein fold . The most conservative choice to describe all of the coevolution signal is to include all possible two-site couplings into the PM. This choice, typically made by what is known as Direct Coupling Analysis, has been highly successful in using sequences for predicting residue contacts in the three-dimensional structure, mutational effects, and in generating new functional sequences. However, the resulting PM suffers from important over-fitting effects: many couplings are small, noisy and hardly interpretable , and the PM is close to a critical point, meaning that it is highly sensitive to small parameter perturbations. In this work, we introduce a parameter-reduction procedure via iterative decimation of the less statistically significant couplings . We propose an information-based criterion that identifies couplings that are either weak , or statistically unsupported . We show that our procedure allows one to remove more than 90 \\% of the PM couplings, while preserving the predictive and generative properties of the original dense PM. The resulting model is far away from criticality, meaning that it is more robust to noise, and its couplings are more easily interpretable.%DIFDELCMD < \\end{abstract} %DIFDELCMD < %%% \\\\%DIF > of the PM couplings, while preserving the predictive and generative properties of the original dense PM, and the resulting model is far away from criticality, hence more robust to noise.", "after_revision": "Boltzmann machines (BM) are widely used as generative models. For example, pairwise Potts models (PM) , which are instances of the BM class, provide accurate statistical models of families of evolutionarily related protein sequences. Their parameters are the local fields, which describe site-specific patterns of amino-acid conservation, and the two-site couplings, which mirror the coevolution between pairs of sites. This coevolution reflects structural and functional constraints acting on protein sequences during evolution . The most conservative choice to describe the coevolution signal is to include all possible two-site couplings into the PM. This choice, typical of what is known as Direct Coupling Analysis, has been successful for predicting residue contacts in the three-dimensional structure, mutational effects, and in generating new functional sequences. However, the resulting PM suffers from important over-fitting effects: many couplings are small, noisy and hardly interpretable ; the PM is close to a critical point, meaning that it is highly sensitive to small parameter perturbations. In this work, we introduce a general parameter-reduction procedure for BMs, via a controlled iterative decimation of the less statistically significant couplings , identified by an information-based criterion that selects either weak or statistically unsupported couplings. For several protein families, our procedure allows one to remove more than 90 %DIFDELCMD < \\end{abstract} %DIFDELCMD < %%% \\\\%DIF > of the PM couplings, while preserving the predictive and generative properties of the original dense PM, and the resulting model is far away from criticality, hence more robust to noise.", "edit_actions": [{"type": "R", "before": "Pairwise", "after": "Boltzmann machines (BM) are widely used as generative models. For example, pairwise", "start_char_pos": 0, "end_char_pos": 8}, {"type": "A", "before": null, "after": ", which are instances of the BM class,", "start_char_pos": 27, "end_char_pos": 27}, {"type": "D", "before": "distinct", "after": null, "start_char_pos": 300, "end_char_pos": 308}, {"type": "D", "before": ", and couplings can a priori connect any pairs of sites, even those being distant along the protein chain, or distant in the three-dimensional protein fold", "after": null, "start_char_pos": 425, "end_char_pos": 580}, {"type": "D", "before": "all of", "after": null, "start_char_pos": 624, "end_char_pos": 630}, {"type": "R", "before": "typically made by", "after": "typical of", "start_char_pos": 726, "end_char_pos": 743}, {"type": "R", "before": "highly successful in using sequences", "after": "successful", "start_char_pos": 796, "end_char_pos": 832}, {"type": "R", "before": ", and", "after": ";", "start_char_pos": 1093, "end_char_pos": 1098}, {"type": "A", "before": null, "after": "general", "start_char_pos": 1235, "end_char_pos": 1235}, {"type": "R", "before": "via", "after": "for BMs, via a controlled", "start_char_pos": 1266, "end_char_pos": 1269}, {"type": "R", "before": ". We propose", "after": ", identified by", "start_char_pos": 1339, "end_char_pos": 1351}, {"type": "R", "before": "identifies couplings that are either weak ,", "after": "selects either weak", "start_char_pos": 1388, "end_char_pos": 1431}, {"type": "R", "before": ". We show that", "after": "couplings. For several protein families,", "start_char_pos": 1461, "end_char_pos": 1475}, {"type": "D", "before": "\\% of the PM couplings, while preserving the predictive and generative properties of the original dense PM. The resulting model is far away from criticality, meaning that it is more robust to noise, and its couplings are more easily interpretable.", "after": null, "start_char_pos": 1524, "end_char_pos": 1771}], "sents_char_pos": [0, 120, 315, 582, 712, 964, 1205, 1340, 1462, 1631, 1771]}
+{"doc_id": "2011.11500", "revision_depth": "1", "before_revision": "Recovery a planted signal perturbed by noise is a fundamental problem in machine learning. In this work, we consider the problem of recovery a planted k-densest sub-hypergraph on h-uniform hypergraphsover n nodes . This fundamental problem appears in different contexts, e.g., community detection, average case complexity, and neuroscience applications . We first observe that it can be viewed as a structural variant of tensor PCA in which the hypergraph parameters k and h determine the structure of the signal to be recovered when the observations are contaminated by Gaussian noise. In this work, we provide tight information-theoretic upper and lower bounds for the recovery problem , as well as the first non-trivial algorithmic bounds based on approximate message passing algorithms. The problem exhibits a typical information-to-computational-gap observed in analogous settings, that widens with increasing sparsity of the problem. Interestingly, the bounds show that the structure of the signal does have an impact on the existing bounds of tensor PCA that the unstructured planted signal does not capture .", "after_revision": " In this work, we consider the problem of recovery a planted k-densest sub-hypergraph on d-uniform hypergraphs . This fundamental problem appears in different contexts, e.g., community detection, average-case complexity, and neuroscience applications as a structural variant of tensor-PCA problem. We provide tightinformation-theoretic upper and lower bounds for the exact recovery threshold by the maximum-likelihood estimator , as well as algorithmic bounds based on approximate message passing algorithms. The problem exhibits a typical statistical-to-computational gap observed in analogous sparse settings that widen with increasing sparsity of the problem. The bounds show that the signal structure impacts the location of the statistical and computational phase transition that the known existing bounds for the tensor-PCA model do not capture. This effect is due to the generic planted signal prior that this latter model addresses .", "edit_actions": [{"type": "D", "before": "Recovery a planted signal perturbed by noise is a fundamental problem in machine learning.", "after": null, "start_char_pos": 0, "end_char_pos": 90}, {"type": "R", "before": "h-uniform hypergraphsover n nodes", "after": "d-uniform hypergraphs", "start_char_pos": 179, "end_char_pos": 212}, {"type": "R", "before": "average case", "after": "average-case", "start_char_pos": 298, "end_char_pos": 310}, {"type": "D", "before": ". We first observe that it can be viewed", "after": null, "start_char_pos": 353, "end_char_pos": 393}, {"type": "R", "before": "tensor PCA in which the hypergraph parameters k and h determine the structure of the signal to be recovered when the observations are contaminated by Gaussian noise. In this work, we provide tight information-theoretic", "after": "tensor-PCA problem. We provide tight", "start_char_pos": 421, "end_char_pos": 639}, {"type": "A", "before": null, "after": "information-theoretic", "start_char_pos": 639, "end_char_pos": 639}, {"type": "R", "before": "recovery problem", "after": "exact recovery threshold by the maximum-likelihood estimator", "start_char_pos": 671, "end_char_pos": 687}, {"type": "R", "before": "the first non-trivial algorithmic", "after": "algorithmic", "start_char_pos": 701, "end_char_pos": 734}, {"type": "R", "before": "information-to-computational-gap", "after": "statistical-to-computational gap", "start_char_pos": 822, "end_char_pos": 854}, {"type": "R", "before": "settings, that widens", "after": "sparse settings that widen", "start_char_pos": 877, "end_char_pos": 898}, {"type": "R", "before": "Interestingly, the", "after": "The", "start_char_pos": 940, "end_char_pos": 958}, {"type": "R", "before": "structure of the signal does have an impact on the existing bounds of tensor PCA that the unstructured planted signal does not capture", "after": "signal structure impacts the location of the statistical and computational phase transition that the known existing bounds for the tensor-PCA model do not capture. This effect is due to the generic planted signal prior that this latter model addresses", "start_char_pos": 980, "end_char_pos": 1114}], "sents_char_pos": [0, 90, 214, 354, 586, 790, 939]}
+{"doc_id": "2011.14203", "revision_depth": "1", "before_revision": "Transformer-based language models such as BERT provide significant accuracy improvement to a multitude of natural language processing (NLP) tasks. However, their hefty computational and memory demands make them challenging to deploy to resource-constrained edge platforms with strict latency requirements. We present EdgeBERT an in-depth and principled algorithm and hardware design methodology to achieve minimal latency and energy consumption on multi-task NLP inference. Compared to the ALBERT baseline, we achieve up to 2.4x and 13.4x inference latencyand memory savings, respectively, with less than 1\\%-pt drop in accuracy on several GLUE benchmarks by employing a calibrated combination of 1) entropy-based early stopping, 2) adaptive attention span, 3) movement and magnitude pruning, and 4) floating-point quantization. Furthermore, in order to maximize the benefits of these algorithms in always-on and intermediate edge computing settings, we specialize a scalable hardware architecture wherein floating-point bit encodings of the shareable multi-task embedding parameters are stored in high-density non-volatile memory . Altogether, EdgeBERT enables fully on-chip inference acceleration of NLP workloads with 5.2 x, and 157x lower energy than that of an un-optimized accelerator and CUDA adaptations on an Nvidia Jetson Tegra X2 mobile GPU, respectively.", "after_revision": "Transformer-based language models such as BERT provide significant accuracy improvement for a multitude of natural language processing (NLP) tasks. However, their hefty computational and memory demands make them challenging to deploy to resource-constrained edge platforms with strict latency requirements. We present EdgeBERT , an in-depth algorithm-hardware co-design for latency-aware energy optimization for multi-task NLP . EdgeBERT employs entropy-based early exit predication in order to perform dynamic voltage-frequency scaling (DVFS), at a sentence granularity, for minimal energy consumption while adhering to a prescribed target latency. Computation and memory footprint overheads are further alleviated by employing a calibrated combination of adaptive attention span, selective network pruning, and floating-point quantization. Furthermore, in order to maximize the synergistic benefits of these algorithms in always-on and intermediate edge computing settings, we specialize a 12nm scalable hardware accelerator system, integrating a fast-switching low-dropout voltage regulator (LDO), an all-digital phase-locked loop (ADPLL), as well as, high-density embedded non-volatile memories (eNVMs) wherein the sparse floating-point bit encodings of the shared multi-task parameters are carefully stored . Altogether, latency-aware multi-task NLP inference acceleration on the EdgeBERT hardware system generates up to 7x, 2.5 x, and 53x lower energy compared to the conventional inference without early stopping, the latency-unbounded early exit approach, and CUDA adaptations on an Nvidia Jetson Tegra X2 mobile GPU, respectively.", "edit_actions": [{"type": "R", "before": "to", "after": "for", "start_char_pos": 88, "end_char_pos": 90}, {"type": "A", "before": null, "after": ",", "start_char_pos": 326, "end_char_pos": 326}, {"type": "R", "before": "and principled algorithm and hardware design methodology to achieve minimal latency and energy consumption on", "after": "algorithm-hardware co-design for latency-aware energy optimization for", "start_char_pos": 339, "end_char_pos": 448}, {"type": "R", "before": "inference. Compared to the ALBERT baseline, we achieve up to 2.4x and 13.4x inference latencyand memory savings, respectively, with less than 1\\%-pt drop in accuracy on several GLUE benchmarks", "after": ". EdgeBERT employs entropy-based early exit predication in order to perform dynamic voltage-frequency scaling (DVFS), at a sentence granularity, for minimal energy consumption while adhering to a prescribed target latency. Computation and memory footprint overheads are further alleviated", "start_char_pos": 464, "end_char_pos": 656}, {"type": "D", "before": "1) entropy-based early stopping, 2)", "after": null, "start_char_pos": 698, "end_char_pos": 733}, {"type": "R", "before": "3) movement and magnitude", "after": "selective network", "start_char_pos": 759, "end_char_pos": 784}, {"type": "D", "before": "4)", "after": null, "start_char_pos": 798, "end_char_pos": 800}, {"type": "A", "before": null, "after": "synergistic", "start_char_pos": 868, "end_char_pos": 868}, {"type": "R", "before": "scalable hardware architecture wherein", "after": "12nm scalable hardware accelerator system, integrating a fast-switching low-dropout voltage regulator (LDO), an all-digital phase-locked loop (ADPLL), as well as, high-density embedded non-volatile memories (eNVMs) wherein the sparse", "start_char_pos": 969, "end_char_pos": 1007}, {"type": "R", "before": "shareable", "after": "shared", "start_char_pos": 1044, "end_char_pos": 1053}, {"type": "R", "before": "embedding parameters are stored in high-density non-volatile memory", "after": "parameters are carefully stored", "start_char_pos": 1065, "end_char_pos": 1132}, {"type": "R", "before": "EdgeBERT enables fully on-chip inference acceleration of NLP workloads with 5.2", "after": "latency-aware multi-task NLP inference acceleration on the EdgeBERT hardware system generates up to 7x, 2.5", "start_char_pos": 1147, "end_char_pos": 1226}, {"type": "R", "before": "157x lower energy than that of an un-optimized accelerator", "after": "53x lower energy compared to the conventional inference without early stopping, the latency-unbounded early exit approach,", "start_char_pos": 1234, "end_char_pos": 1292}], "sents_char_pos": [0, 146, 305, 474, 829, 1134]}
+{"doc_id": "2012.02165", "revision_depth": "1", "before_revision": "The current development of the vaccines for SARS-CoV-2 is unprecedented. However, little is knownabout the fine-grained public opinions on the coming vaccines. Using more than 40,000 rigorously selected tweets (from over six million tweets collected using keywords) posted by over 20,000 distinct Twitter users , we adopt a human-guided machine learning framework to capture the public opinions on the potential vaccines for SARS-CoV-2 and classify them into three groups: pro-vaccine, vaccine-hesitant, and anti-vaccine. To investigate the scope and causes of public opinions, we compare the demographics, social capitals , income, religious statuses as well as the political affiliations of these three groups and find significant differences . A lower acceptance level for the potential COVID-19 vaccines is observed among the socioeconomically disadvantaged groups. We further aggregate the opinions at the state and country levels, and find that the percentage of the pro-vaccine group is lower in the Southeast part of the United States. Interestingly, the major changes in the percentages of different opinion groups roughly correspond to the major pandemic-related events. Next, by conducting counterfactual analyses, we find that the U.S. public is most concerned about the safety, effectiveness, and political issues with regards to the potential vaccines for COVID-19. In particular, we also investigate the public opinions about the newly emerged mRNA vaccines and find the opinions vary significantly across the religious beliefs : There are proportionally more religious people in the anti-vaccine group. To our best knowledge, this is the first large-scale social media-based study to analyze the public opinions on the potential COVID-19 vaccines that can inform more effective vaccine distribution policies and strategies.", "after_revision": "The current development of vaccines for SARS-CoV-2 is unprecedented. Little is known, however, about the nuanced public opinions on the coming vaccines. We adopt a human-guided machine learning framework (using more than 40,000 rigorously selected tweets from more than 20,000 distinct Twitter users ) to capture public opinion on the potential vaccines for SARS-CoV-2 , classifying them into three groups: pro-vaccine, vaccine-hesitant, and anti-vaccine. We compare demographics, social capital , income, religious status, and political affiliations of these three groups to investigate the scope and causes of public opinions . A lower vaccine acceptance level for potential COVID-19 vaccines is observed among socioeconomically disadvantaged groups. We further aggregate opinions at the state and country levels, and find that the percentage of the pro-vaccine group is lower in the Southeast part of the United States. Interestingly, the major changes in the percentages of different opinion groups roughly correspond to the major pandemic-related events. Next, by conducting counterfactual analyses, we find that the U.S. public is most concerned about the safety, effectiveness, and political issues regarding potential vaccines for COVID-19. In particular, we also investigate public opinion about the newly emerged mRNA vaccines and find opinions vary significantly across by religious beliefs with proportionally more religious people in the anti-vaccine group. We believe this is the first large-scale social media-based study to analyze public opinions on potential COVID-19 vaccines that can inform more effective vaccine distribution policies and strategies.", "edit_actions": [{"type": "D", "before": "the", "after": null, "start_char_pos": 27, "end_char_pos": 30}, {"type": "R", "before": "However, little is knownabout the fine-grained", "after": "Little is known, however, about the nuanced", "start_char_pos": 73, "end_char_pos": 119}, {"type": "R", "before": "Using", "after": "We adopt a human-guided machine learning framework (using", "start_char_pos": 160, "end_char_pos": 165}, {"type": "R", "before": "(from over six million tweets collected using keywords) posted by over", "after": "from more than", "start_char_pos": 210, "end_char_pos": 280}, {"type": "R", "before": ", we adopt a human-guided machine learning framework to capture the public opinions", "after": ") to capture public opinion", "start_char_pos": 311, "end_char_pos": 394}, {"type": "R", "before": "and classify", "after": ", classifying", "start_char_pos": 436, "end_char_pos": 448}, {"type": "R", "before": "To investigate the scope and causes of public opinions, we compare the", "after": "We compare", "start_char_pos": 522, "end_char_pos": 592}, {"type": "R", "before": "capitals", "after": "capital", "start_char_pos": 614, "end_char_pos": 622}, {"type": "R", "before": "statuses as well as the", "after": "status, and", "start_char_pos": 643, "end_char_pos": 666}, {"type": "R", "before": "and find significant differences", "after": "to investigate the scope and causes of public opinions", "start_char_pos": 712, "end_char_pos": 744}, {"type": "A", "before": null, "after": "vaccine", "start_char_pos": 755, "end_char_pos": 755}, {"type": "D", "before": "the", "after": null, "start_char_pos": 777, "end_char_pos": 780}, {"type": "D", "before": "the", "after": null, "start_char_pos": 827, "end_char_pos": 830}, {"type": "D", "before": "the", "after": null, "start_char_pos": 892, "end_char_pos": 895}, {"type": "R", "before": "with regards to the", "after": "regarding", "start_char_pos": 1328, "end_char_pos": 1347}, {"type": "R", "before": "the public opinions", "after": "public opinion", "start_char_pos": 1416, "end_char_pos": 1435}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1483, "end_char_pos": 1486}, {"type": "R", "before": "the religious beliefs : There are", "after": "by religious beliefs with", "start_char_pos": 1522, "end_char_pos": 1555}, {"type": "R", "before": "To our best knowledge,", "after": "We believe", "start_char_pos": 1620, "end_char_pos": 1642}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1709, "end_char_pos": 1712}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1732, "end_char_pos": 1735}], "sents_char_pos": [0, 72, 159, 521, 870, 1044, 1181, 1380, 1619]}
+{"doc_id": "2012.02277", "revision_depth": "1", "before_revision": "We consider an infinite-horizon optimal consumption problem for an individual who forms a consumption habit based on an exponentially-weighted average of her past rate of consumption. The novelty of our approach is in introducing habit formation through a constraint, rather than through the objective function, as is customary in the existing habit-formation literature. Specifically, we require that the individual consume at a rate that is greater than a certain proportion \\alpha\\le1 of her consumption habit . Our habit-formation model allows for both addictive ( \\alpha=1 ) and non-addictive ( 0<\\alpha<1 ) habits. Assuming that the individual invests in a risk-free market, we formulate and solve a deterministic control problem to maximize the discounted CRRA utility of the individual's consumption-to-habit process subject to the said habit-formation constraint. We derive the optimal consumption policies explicitly in terms of the solution of a nonlinear free-boundary problem, which we analyze in detail. Impatient individuals (those with sufficiently large utility discount rates) always consume above the minimum rate; thus, they eventually attain the minimum wealth-to-habit ratio. Patient individuals (those with small utility discount rates) consume at the minimum rate if their wealth-to-habit ratio is below a threshold, and above it otherwise. By consuming patiently, these individuals maintain a wealth-to-habit ratio that is greater than the minimum acceptable level .", "after_revision": "We propose a new optimal consumption model in which the degree of addictiveness of habit formation is directly controlled through a consumption constraint. In particular, we assume that the individual is unwilling to consume at a rate below a certain proportion 0<\\alpha\\le1 of her consumption habit , which is the exponentially-weighted average of past consumption rates. \\alpha=1 prohibits the habit process to decrease and corresponds to the completely addictive model. \\alpha=0 makes the habit-formation constraint moot and corresponds to the non-addictive model. 0<\\alpha<1 leads to partially addictive models, with the level of addictiveness increasing with \\alpha. In contrast to the existing habit-formation literature, our constraint cannot be incorporated in the objective function through infinite marginal utility. Assuming that the individual invests in a risk-free market, we formulate and solve an infinite-horizon, deterministic control problem to maximize the discounted CRRA utility of the consumption-to-habit process subject to the habit-formation constraint. Optimal consumption policies are derived explicitly in terms of the solution of a nonlinear free-boundary problem, which we analyze in detail. Impatient always consume above the minimum rate; thus, they eventually attain the minimum wealth-to-habit ratio. Patient individuals consume at the minimum rate if their wealth-to-habit ratio is below a threshold, and above it otherwise. By consuming patiently, these individuals maintain a wealth-to-habit ratio that is greater than the minimum acceptable level . Additionally, we prove that the optimal consumption path is hump-shaped if the initial wealth-to-habit ratio is either: (1) larger than a high threshold; or (2) below a low threshold and the agent is less risk averse. Thus, we provide a simple explanation for the consumption hump observed by various empirical studies .", "edit_actions": [{"type": "R", "before": "consider an infinite-horizon optimal consumption problem for an individual who forms a consumption habit based on an exponentially-weighted average of her past rate of consumption. The novelty of our approach is in introducing habit formation through a constraint, rather than through the objective function, as is customary in the existing habit-formation literature. Specifically, we require", "after": "propose a new optimal consumption model in which the degree of addictiveness of habit formation is directly controlled through a consumption constraint. In particular, we assume", "start_char_pos": 3, "end_char_pos": 396}, {"type": "A", "before": null, "after": "is unwilling to", "start_char_pos": 417, "end_char_pos": 417}, {"type": "R", "before": "that is greater than", "after": "below", "start_char_pos": 436, "end_char_pos": 456}, {"type": "R", "before": "\\alpha", "after": "0<\\alpha", "start_char_pos": 478, "end_char_pos": 484}, {"type": "R", "before": ". Our habit-formation model allows for both addictive (", "after": ", which is the exponentially-weighted average of past consumption rates.", "start_char_pos": 514, "end_char_pos": 569}, {"type": "R", "before": ") and", "after": "prohibits the habit process to decrease and corresponds to the completely addictive model. \\alpha=0 makes the habit-formation constraint moot and corresponds to the", "start_char_pos": 579, "end_char_pos": 584}, {"type": "R", "before": "(", "after": "model.", "start_char_pos": 599, "end_char_pos": 600}, {"type": "R", "before": ") habits.", "after": "leads to partially addictive models, with the level of addictiveness increasing with \\alpha. In contrast to the existing habit-formation literature, our constraint cannot be incorporated in the objective function through infinite marginal utility.", "start_char_pos": 612, "end_char_pos": 621}, {"type": "R", "before": "a", "after": "an infinite-horizon,", "start_char_pos": 705, "end_char_pos": 706}, {"type": "D", "before": "individual's", "after": null, "start_char_pos": 784, "end_char_pos": 796}, {"type": "D", "before": "said", "after": null, "start_char_pos": 841, "end_char_pos": 845}, {"type": "R", "before": "We derive the optimal consumption policies", "after": "Optimal consumption policies are derived", "start_char_pos": 874, "end_char_pos": 916}, {"type": "D", "before": "individuals (those with sufficiently large utility discount rates)", "after": null, "start_char_pos": 1029, "end_char_pos": 1095}, {"type": "D", "before": "(those with small utility discount rates)", "after": null, "start_char_pos": 1219, "end_char_pos": 1260}, {"type": "A", "before": null, "after": ". Additionally, we prove that the optimal consumption path is hump-shaped if the initial wealth-to-habit ratio is either: (1) larger than a high threshold; or (2) below a low threshold and the agent is less risk averse. Thus, we provide a simple explanation for the consumption hump observed by various empirical studies", "start_char_pos": 1491, "end_char_pos": 1491}], "sents_char_pos": [0, 183, 371, 515, 621, 873, 1018, 1134, 1198, 1365]}
+{"doc_id": "2012.02363", "revision_depth": "1", "before_revision": "We study fundamental point-line covering problems in computational geometry, in which the input is a set S of points in the plane. The first is the %DIFDELCMD < {\\sc %%% Rich Lines problem, which asks for the set of all lines that each covers at least \\lambda points from S, for a given integer parameter \\lambda \\geq 2; this problem subsumes the %DIFDELCMD < {\\sc %%% 3-Points-on-Line problem and the %DIFDELCMD < {\\sc %%% Exact Fitting problem, which -- the latter -- asks for a line containing the maximum number of points. The second is the %DIFDELCMD < \\NP%%% -hard problem%DIFDELCMD < {\\sc %%% Line Cover , which asks for a set of k lines that cover the points of S, for a given parameter k \\in N. Both problems have been extensively studied. In particular, the %DIFDELCMD < {\\sc %%% Rich Lines problem is a fundamental problem whose solution serves as a building block for several algorithms in computational geometry. For %DIFDELCMD < {\\sc %%% Rich Lines and%DIFDELCMD < {\\sc %%% Exact Fitting , we present a randomized Monte Carlo algorithm that achieves a lower running time than that of Guibas et al.'s algorithm [ %DIFDELCMD < {\\it %%% Computational Geometry 1996], for a wide range of the parameter \\lambda. We derive lower-bound results showing that, for \\lambda =\\Omega(\\sqrt{n \\log n}), the upper bound on the running time of this randomized algorithm matches the lower bound that we derive on the time complexity of %DIFDELCMD < {\\sc %%% Rich Lines in the algebraic computation trees model. For %DIFDELCMD < {\\sc %%% Line Cover , we present two kernelization algorithms: a randomized Monte Carlo algorithm and a deterministic algorithm. Both algorithms improve the running time of existing kernelization algorithms for %DIFDELCMD < {\\sc %%% Line Cover . We derive lower-bound results showing that the running time of the randomized algorithm we present comes close to the lower bound we derive on the time complexity of kernelization algorithms for %DIFDELCMD < {\\sc %%% Line Cover in the algebraic computation trees model.", "after_revision": "We study fundamental point-line covering problems in computational geometry, in which the input is a set S of points in the plane. The first is the %DIFDELCMD < {\\sc %%% Rich Lines problem, which asks for the set of all lines that each covers at least \\lambda points from S, for a given integer parameter \\lambda \\geq 2; this problem subsumes the %DIFDELCMD < {\\sc %%% 3-Points-on-Line problem and the %DIFDELCMD < {\\sc %%% Exact Fitting problem, which -- the latter -- asks for a line containing the maximum number of points. The second is the %DIFDELCMD < \\NP%%% %DIFDELCMD < {\\sc %%% NP-hard problem Line Cover , which asks for a set of k lines that cover the points of S, for a given parameter k \\in N. Both problems have been extensively studied. In particular, the %DIFDELCMD < {\\sc %%% Rich Lines problem is a fundamental problem whose solution serves as a building block for several algorithms in computational geometry. For %DIFDELCMD < {\\sc %%% %DIFDELCMD < {\\sc %%% Rich Lines and Exact Fitting , we present a randomized Monte Carlo algorithm that achieves a lower running time than that of Guibas et al.'s algorithm [ %DIFDELCMD < {\\it %%% Computational Geometry 1996], for a wide range of the parameter \\lambda. We derive lower-bound results showing that, for \\lambda =\\Omega(\\sqrt{n \\log n}), the upper bound on the running time of this randomized algorithm matches the lower bound that we derive on the time complexity of %DIFDELCMD < {\\sc %%% Rich Lines in the algebraic computation trees model. For %DIFDELCMD < {\\sc %%% Line Cover , we present two kernelization algorithms: a randomized Monte Carlo algorithm and a deterministic algorithm. Both algorithms improve the running time of existing kernelization algorithms for %DIFDELCMD < {\\sc %%% Line Cover . We derive lower-bound results showing that the running time of the randomized algorithm we present comes close to the lower bound we derive on the time complexity of kernelization algorithms for %DIFDELCMD < {\\sc %%% Line Cover in the algebraic computation trees model.", "edit_actions": [{"type": "R", "before": "Rich Lines", "after": "Rich Lines", "start_char_pos": 170, "end_char_pos": 180}, {"type": "R", "before": "Exact Fitting", "after": "Exact Fitting", "start_char_pos": 424, "end_char_pos": 437}, {"type": "D", "before": "-hard problem", "after": null, "start_char_pos": 565, "end_char_pos": 578}, {"type": "R", "before": "Line Cover", "after": "NP-hard problem Line Cover", "start_char_pos": 600, "end_char_pos": 610}, {"type": "R", "before": "Rich Lines", "after": "Rich Lines", "start_char_pos": 790, "end_char_pos": 800}, {"type": "D", "before": "Rich Lines", "after": null, "start_char_pos": 952, "end_char_pos": 962}, {"type": "D", "before": "and", "after": null, "start_char_pos": 963, "end_char_pos": 966}, {"type": "R", "before": "Exact Fitting", "after": "Rich Lines and Exact Fitting", "start_char_pos": 988, "end_char_pos": 1001}, {"type": "R", "before": "Computational Geometry", "after": "Computational Geometry", "start_char_pos": 1148, "end_char_pos": 1170}, {"type": "R", "before": "Rich Lines", "after": "Rich Lines", "start_char_pos": 1455, "end_char_pos": 1465}, {"type": "R", "before": "Line Cover", "after": "Line Cover", "start_char_pos": 1534, "end_char_pos": 1544}, {"type": "R", "before": "Line Cover", "after": "Line Cover", "start_char_pos": 1758, "end_char_pos": 1768}, {"type": "R", "before": "Line Cover", "after": "Line Cover", "start_char_pos": 1988, "end_char_pos": 1998}], "sents_char_pos": [0, 130, 320, 526, 748, 925, 1220, 1507, 1653, 1770]}
+{"doc_id": "2012.02507", "revision_depth": "1", "before_revision": "Document-level Relation Extraction (RE) requires extracting relations expressed within and across sentences. Recent works show that graph-based methods, usually constructing a document-level graph that captures document-aware interactions, can obtain useful entity representations thus helping tackle document-level RE. These methods either focus more on the entire graph, or pay more attention to a part of the graph, e.g., paths between the target entity pair. However, we find that document-level RE may benefit from focusing on both of them simultaneously. Therefore, to obtain more comprehensive entity representations, we propose the C oarse-to-F ineE ntityR epresentation model (CFER ) that adopts a coarse-to-fine strategy involving two phases. First, CFER uses graph neural networks to integrate global information in the entire graph at a coarse level. Next, CFER utilizes the global information as a guidance to selectively aggregate path information between the target entity pair at a fine level. In classification, we combine the entity representations from both two levels into more comprehensive representations for relation extraction. Experimental results on a large-scale document-level RE dataset show that CFER achieves better performance than previous baseline models . Further, we verify the effectiveness of our strategy through elaborate model analysis .", "after_revision": "Document-level Relation Extraction (RE) requires extracting relations expressed within and across sentences. Recent works show that graph-based methods, usually constructing a document-level graph that captures document-aware interactions, can obtain useful entity representations thus helping tackle document-level RE. These methods either focus more on the entire graph, or pay more attention to a part of the graph, e.g., paths between the target entity pair. However, we find that document-level RE may benefit from focusing on both of them simultaneously. Therefore, to obtain more comprehensive entity representations, we propose the Coarse-to-Fine Entity Representation model (CFER ) that adopts a coarse-to-fine strategy involving two phases. First, CFER uses graph neural networks to integrate global information in the entire graph at a coarse level. Next, CFER utilizes the global information as a guidance to selectively aggregate path information between the target entity pair at a fine level. In classification, we combine the entity representations from both two levels into more comprehensive representations for relation extraction. Experimental results on two document-level RE datasets, DocRED and CDR, show that CFER outperforms existing models and is robust to the uneven label distribution .", "edit_actions": [{"type": "D", "before": "C", "after": null, "start_char_pos": 640, "end_char_pos": 641}, {"type": "D", "before": "oarse-to-", "after": null, "start_char_pos": 642, "end_char_pos": 651}, {"type": "D", "before": "F", "after": null, "start_char_pos": 651, "end_char_pos": 652}, {"type": "D", "before": "ine", "after": null, "start_char_pos": 653, "end_char_pos": 656}, {"type": "D", "before": "E", "after": null, "start_char_pos": 656, "end_char_pos": 657}, {"type": "D", "before": "ntity", "after": null, "start_char_pos": 658, "end_char_pos": 663}, {"type": "D", "before": "R", "after": null, "start_char_pos": 663, "end_char_pos": 664}, {"type": "D", "before": "epresentation model (", "after": null, "start_char_pos": 665, "end_char_pos": 686}, {"type": "R", "before": "CFER", "after": "Coarse-to-Fine Entity Representation model (CFER", "start_char_pos": 686, "end_char_pos": 690}, {"type": "R", "before": "a large-scale", "after": "two", "start_char_pos": 1177, "end_char_pos": 1190}, {"type": "R", "before": "dataset", "after": "datasets, DocRED and CDR,", "start_char_pos": 1209, "end_char_pos": 1216}, {"type": "R", "before": "achieves better performance than previous baseline models . Further, we verify the effectiveness of our strategy through elaborate model analysis", "after": "outperforms existing models and is robust to the uneven label distribution", "start_char_pos": 1232, "end_char_pos": 1377}], "sents_char_pos": [0, 108, 319, 462, 560, 752, 862, 1009, 1152, 1291]}
+{"doc_id": "2012.03879", "revision_depth": "1", "before_revision": "This work considers the general task of estimating the sum of a bounded function over the edges of a graph that is unknown a priori, where graph vertices and edges are built on-the-fly by an algorithm and the resulting graph is too large to be kept in memory or disk. Prior work proposes Markov Chain Monte Carlo (MCMC) methods that simultaneously sample and generate the graph , eliminating the need for storage . Unfortunately, these existing methods are not scalable to massive real-world graphs. In this paper, we introduce Ripple, an MCMC-based estimator which achieves unprecedented scalability in this task by stratifying the MCMC Markov chain state space with a new technique that we denote {\\em ordered sequential stratified Markov regenerations}. We show that the Ripple estimator is consistent, highly parallelizable, and scales well. In particular, applying Ripple to the task of estimating connected induced subgraph counts on large graphs, we empirically demonstrate that Ripple is accurate and is able to estimate counts of up to 12-node subgraphs, a task at a scale that has been considered unreachable, not only by prior MCMC-based methods , but also by other sampling approaches. For instance, in this target application, we present results where the Markov chain state space is as large as 10^{43}, for which Ripple computes estimates in less than 4 hours on average.", "after_revision": "This work considers the general task of estimating the sum of a bounded function over the edges of a graph , given neighborhood query access and where access to the entire network is prohibitively expensive. To estimate this sum, prior work proposes Markov chain Monte Carlo (MCMC) methods that use random walks started at some seed vertex and whose equilibrium distribution is the uniform distribution over all edges , eliminating the need to iterate over all edges . Unfortunately, these existing estimators are not scalable to massive real-world graphs. In this paper, we introduce Ripple, an MCMC-based estimator that achieves unprecedented scalability by stratifying the Markov chain state space into ordered strata with a new technique that we denote {\\em sequential stratified regenerations}. We show that the Ripple estimator is consistent, highly parallelizable, and scales well. We empirically evaluate our method by applying Ripple to the task of estimating connected , induced subgraph counts given some input graph. Therein, we demonstrate that Ripple is accurate and can estimate counts of up to 12-node subgraphs, which is a task at a scale that has been considered unreachable, not only by prior MCMC-based methods but also by other sampling approaches. For instance, in this target application, we present results in which the Markov chain state space is as large as 10^{43}, for which Ripple computes estimates in less than 4 hours , on average.", "edit_actions": [{"type": "R", "before": "that is unknown a priori, where graph vertices and edges are built on-the-fly by an algorithm and the resulting graph is too large to be kept in memory or disk. Prior", "after": ", given neighborhood query access and where access to the entire network is prohibitively expensive. To estimate this sum, prior", "start_char_pos": 107, "end_char_pos": 273}, {"type": "R", "before": "Chain", "after": "chain", "start_char_pos": 295, "end_char_pos": 300}, {"type": "R", "before": "simultaneously sample and generate the graph", "after": "use random walks started at some seed vertex and whose equilibrium distribution is the uniform distribution over all edges", "start_char_pos": 333, "end_char_pos": 377}, {"type": "R", "before": "for storage", "after": "to iterate over all edges", "start_char_pos": 401, "end_char_pos": 412}, {"type": "R", "before": "methods", "after": "estimators", "start_char_pos": 445, "end_char_pos": 452}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 560, "end_char_pos": 565}, {"type": "D", "before": "in this task", "after": null, "start_char_pos": 601, "end_char_pos": 613}, {"type": "D", "before": "MCMC", "after": null, "start_char_pos": 633, "end_char_pos": 637}, {"type": "A", "before": null, "after": "into ordered strata", "start_char_pos": 663, "end_char_pos": 663}, {"type": "R", "before": "ordered sequential stratified Markov", "after": "sequential stratified", "start_char_pos": 705, "end_char_pos": 741}, {"type": "R", "before": "In particular,", "after": "We empirically evaluate our method by", "start_char_pos": 847, "end_char_pos": 861}, {"type": "A", "before": null, "after": ",", "start_char_pos": 914, "end_char_pos": 914}, {"type": "R", "before": "on large graphs, we empirically", "after": "given some input graph. Therein, we", "start_char_pos": 939, "end_char_pos": 970}, {"type": "R", "before": "is able to", "after": "can", "start_char_pos": 1011, "end_char_pos": 1021}, {"type": "A", "before": null, "after": "which is", "start_char_pos": 1066, "end_char_pos": 1066}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1160, "end_char_pos": 1161}, {"type": "R", "before": "where", "after": "in which", "start_char_pos": 1262, "end_char_pos": 1267}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1378, "end_char_pos": 1378}], "sents_char_pos": [0, 267, 414, 499, 757, 846, 1200]}
+{"doc_id": "2012.04808", "revision_depth": "1", "before_revision": "Commonsense reasoning requires a model to make presumptions about world events via language understanding. Many methods couple pre-trained language models with knowledge graphs in order to combine the merits in language modeling and entity-based relational learning . However, although a knowledge graph contains rich structural information, it lacks the context to provide a more precise understanding of the concepts and relations . This creates a gap when fusing knowledge graphs into language modeling, especially in the scenario of insufficient paired text-knowledge data. In this paper , we propose to utilize external entity description to provide contextual information for graph entities. For the CommonsenseQA task, our model first extracts concepts from the question and choice, and then finds a related triple between these concepts. Next, it retrieves the descriptions of these concepts from Wiktionary and feed them as additional input to a pre-trained language model, together with the triple . The resulting model can attain much more effective commonsense reasoning capability, achieving state-of-the-art results in the CommonsenseQA dataset with an accuracy of 80.7\\% (single model) and 83.3\\% (ensemble model) on the official leaderboard .", "after_revision": "Commonsense question answering (QA) requires a model to grasp commonsense and factual knowledge to answer questions about world events . Many prior methods couple language modeling with knowledge graphs (KG) . However, although a KG contains rich structural information, it lacks the context to provide a more precise understanding of the concepts . This creates a gap when fusing knowledge graphs into language modeling, especially when there is insufficient labeled data. Thus , we propose to employ external entity descriptions to provide contextual information for knowledge understanding. We retrieve descriptions of related concepts from Wiktionary and feed them as additional input to pre-trained language models . The resulting model achieves state-of-the-art result in the CommonsenseQA dataset and the best result among non-generative models in OpenBookQA .", "edit_actions": [{"type": "R", "before": "reasoning", "after": "question answering (QA)", "start_char_pos": 12, "end_char_pos": 21}, {"type": "R", "before": "make presumptions", "after": "grasp commonsense and factual knowledge to answer questions", "start_char_pos": 42, "end_char_pos": 59}, {"type": "R", "before": "via language understanding. Many methods couple pre-trained language models", "after": ". Many prior methods couple language modeling", "start_char_pos": 79, "end_char_pos": 154}, {"type": "R", "before": "in order to combine the merits in language modeling and entity-based relational learning", "after": "(KG)", "start_char_pos": 177, "end_char_pos": 265}, {"type": "R", "before": "knowledge graph", "after": "KG", "start_char_pos": 288, "end_char_pos": 303}, {"type": "D", "before": "and relations", "after": null, "start_char_pos": 419, "end_char_pos": 432}, {"type": "R", "before": "in the scenario of insufficient paired text-knowledge data. In this paper", "after": "when there is insufficient labeled data. Thus", "start_char_pos": 518, "end_char_pos": 591}, {"type": "R", "before": "utilize external entity description", "after": "employ external entity descriptions", "start_char_pos": 608, "end_char_pos": 643}, {"type": "R", "before": "graph entities. For the CommonsenseQA task, our model first extracts concepts from the question and choice, and then finds a related triple between these concepts. Next, it retrieves the descriptions of these", "after": "knowledge understanding. We retrieve descriptions of related", "start_char_pos": 682, "end_char_pos": 890}, {"type": "D", "before": "a", "after": null, "start_char_pos": 953, "end_char_pos": 954}, {"type": "R", "before": "model, together with the triple", "after": "models", "start_char_pos": 976, "end_char_pos": 1007}, {"type": "R", "before": "can attain much more effective commonsense reasoning capability, achieving", "after": "achieves", "start_char_pos": 1030, "end_char_pos": 1104}, {"type": "R", "before": "results", "after": "result", "start_char_pos": 1122, "end_char_pos": 1129}, {"type": "R", "before": "with an accuracy of 80.7\\% (single model) and 83.3\\% (ensemble model) on the official leaderboard", "after": "and the best result among non-generative models in OpenBookQA", "start_char_pos": 1159, "end_char_pos": 1256}], "sents_char_pos": [0, 106, 267, 434, 577, 697, 845, 1009]}
+{"doc_id": "2012.06081", "revision_depth": "1", "before_revision": "The accurate approximation of scalar-valued functions from sample points is a key task in mathematical modeling and computational science. Recently, machine learning techniques based on Deep Neural Networks (DNNs) have begun to emerge as promising tools for function approximation in scientific computingproblems , with impressive results achieved on problems where the dimension of the underlying data or problem domain is large. In this work , we broaden this perspectiveby focusing on approximation of functions that are Hilbert-valued, i.e. they take values in a separable, but typically infinite-dimensional, Hilbert space. This problem arises in many science and engineering problems, in particular those involving the solution of parametric Partial Differential Equations (PDEs). Such problems are challenging for three reasons. First, pointwise samples are expensive to acquire . Second, the domain of the function is usually high dimensional, and third, the range lies in a Hilbert space. Our contributions are twofold. First, we present a novel result on DNN training for holomorphic functions with so-called hidden anisotropy. This result introduces a DNN training procedure and a full theoretical analysis with explicit guarantees on the error and sample complexity. This error bound is explicit in the three key errors occurred in the approximation procedure: best approximation error, measurementerror and physical discretization error . Our result shows that there is a procedure for learning Hilbert-valued functions via DNNs that performs as well as current best-in-class schemes. Second, we provide preliminary numerical results illustrating the practical performance of DNNs on Hilbert-valued functions arising as solutions to parametric PDEs. We consider different parameters, modify the DNN architecture to achieve better and competitive results and compare these to current best-in-class schemes.", "after_revision": "Accurate approximation of scalar-valued functions from sample points is a key task in computational science. Recently, machine learning with Deep Neural Networks (DNNs) has emerged as a promising tool for scientific computing , with impressive results achieved on problems where the dimension of the data or problem domain is large. This work broadens this perspective, focusing on approximating functions that are Hilbert-valued, i.e. take values in a separable, but typically infinite-dimensional, Hilbert space. This arises in science and engineering problems, in particular those involving solution of parametric Partial Differential Equations (PDEs). Such problems are challenging : 1) pointwise samples are expensive to acquire , 2) the function domain is high dimensional, and 3) the range lies in a Hilbert space. Our contributions are twofold. First, we present a novel result on DNN training for holomorphic functions with so-called hidden anisotropy. This result introduces a DNN training procedure and full theoretical analysis with explicit guarantees on error and sample complexity. The error bound is explicit in three key errors occurring in the approximation procedure: the best approximation, measurement, and physical discretization errors . Our result shows that there exists a procedure (albeit non-standard) for learning Hilbert-valued functions via DNNs that performs as well as , but no better than current best-in-class schemes. It gives a benchmark lower bound for how well DNNs can perform on such problems. Second, we examine whether better performance can be achieved in practice through different types of architectures and training. We provide preliminary numerical results illustrating practical performance of DNNs on parametric PDEs. We consider different parameters, modifying the DNN architecture to achieve better and competitive results , comparing these to current best-in-class schemes.", "edit_actions": [{"type": "R", "before": "The accurate", "after": "Accurate", "start_char_pos": 0, "end_char_pos": 12}, {"type": "D", "before": "mathematical modeling and", "after": null, "start_char_pos": 90, "end_char_pos": 115}, {"type": "R", "before": "techniques based on", "after": "with", "start_char_pos": 166, "end_char_pos": 185}, {"type": "R", "before": "have begun to emerge as promising tools for function approximation in scientific computingproblems", "after": "has emerged as a promising tool for scientific computing", "start_char_pos": 214, "end_char_pos": 312}, {"type": "D", "before": "underlying", "after": null, "start_char_pos": 387, "end_char_pos": 397}, {"type": "R", "before": "In this work , we broaden this perspectiveby focusing on approximation of", "after": "This work broadens this perspective, focusing on approximating", "start_char_pos": 431, "end_char_pos": 504}, {"type": "D", "before": "they", "after": null, "start_char_pos": 545, "end_char_pos": 549}, {"type": "R", "before": "problem arises in many", "after": "arises in", "start_char_pos": 634, "end_char_pos": 656}, {"type": "D", "before": "the", "after": null, "start_char_pos": 721, "end_char_pos": 724}, {"type": "R", "before": "for three reasons. First,", "after": ": 1)", "start_char_pos": 817, "end_char_pos": 842}, {"type": "R", "before": ". Second, the domain of the function is usually", "after": ", 2) the function domain is", "start_char_pos": 886, "end_char_pos": 933}, {"type": "R", "before": "third,", "after": "3)", "start_char_pos": 956, "end_char_pos": 962}, {"type": "D", "before": "a", "after": null, "start_char_pos": 1190, "end_char_pos": 1191}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1246, "end_char_pos": 1249}, {"type": "R", "before": "This", "after": "The", "start_char_pos": 1279, "end_char_pos": 1283}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1311, "end_char_pos": 1314}, {"type": "R", "before": "occurred", "after": "occurring", "start_char_pos": 1332, "end_char_pos": 1340}, {"type": "R", "before": "best approximation error, measurementerror", "after": "the best approximation, measurement,", "start_char_pos": 1373, "end_char_pos": 1415}, {"type": "R", "before": "error", "after": "errors", "start_char_pos": 1444, "end_char_pos": 1449}, {"type": "R", "before": "is a procedure", "after": "exists a procedure (albeit non-standard)", "start_char_pos": 1480, "end_char_pos": 1494}, {"type": "A", "before": null, "after": ", but no better than", "start_char_pos": 1567, "end_char_pos": 1567}, {"type": "A", "before": null, "after": "It gives a benchmark lower bound for how well DNNs can perform on such problems.", "start_char_pos": 1599, "end_char_pos": 1599}, {"type": "A", "before": null, "after": "examine whether better performance can be achieved in practice through different types of architectures and training. We", "start_char_pos": 1611, "end_char_pos": 1611}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1663, "end_char_pos": 1666}, {"type": "D", "before": "Hilbert-valued functions arising as solutions to", "after": null, "start_char_pos": 1700, "end_char_pos": 1748}, {"type": "R", "before": "modify", "after": "modifying", "start_char_pos": 1800, "end_char_pos": 1806}, {"type": "R", "before": "and compare", "after": ", comparing", "start_char_pos": 1870, "end_char_pos": 1881}], "sents_char_pos": [0, 138, 430, 628, 786, 835, 887, 997, 1028, 1137, 1278, 1451, 1598, 1765]}
+{"doc_id": "2012.07816", "revision_depth": "1", "before_revision": "While the open-source model for software development has led to successful large-scale collaborations in building software systems, data science projects are frequently developed by individuals or small groups . We describe challenges to scaling data science collaborations and present a novel conceptual framework and ML programming model to address them. We instantiate these ideas in Ballet, a lightweight software framework for collaborative open-source data science and a cloud-based development environment , with a plugin for collaborative feature engineering . Using our framework, collaborators incrementally propose feature definitions to a repository which are each subjected to an ML evaluation and can be automatically merged into an executable feature engineering pipeline. We leverage Ballet to conduct an extensive case study analysis of a real-world income prediction problem , and discuss implications for collaborative projects.", "after_revision": "While the open-source software development model has led to successful large-scale collaborations in building software systems, data science projects are frequently developed by individuals or small teams . We describe challenges to scaling data science collaborations and present a conceptual framework and ML programming model to address them. We instantiate these ideas in Ballet, a lightweight framework for collaborative , open-source data science through a focus on feature engineering, and an accompanying cloud-based development environment . Using our framework, collaborators incrementally propose feature definitions to a repository which are each subjected to an ML performance evaluation and can be automatically merged into an executable feature engineering pipeline. We leverage Ballet to conduct a case study analysis of an income prediction problem with 27 collaborators , and discuss implications for future designers of collaborative projects.", "edit_actions": [{"type": "R", "before": "model for software development", "after": "software development model", "start_char_pos": 22, "end_char_pos": 52}, {"type": "R", "before": "groups", "after": "teams", "start_char_pos": 203, "end_char_pos": 209}, {"type": "D", "before": "novel", "after": null, "start_char_pos": 288, "end_char_pos": 293}, {"type": "D", "before": "software", "after": null, "start_char_pos": 409, "end_char_pos": 417}, {"type": "A", "before": null, "after": ",", "start_char_pos": 446, "end_char_pos": 446}, {"type": "R", "before": "and a", "after": "through a focus on feature engineering, and an accompanying", "start_char_pos": 472, "end_char_pos": 477}, {"type": "D", "before": ", with a plugin for collaborative feature engineering", "after": null, "start_char_pos": 514, "end_char_pos": 567}, {"type": "A", "before": null, "after": "performance", "start_char_pos": 697, "end_char_pos": 697}, {"type": "R", "before": "an extensive", "after": "a", "start_char_pos": 820, "end_char_pos": 832}, {"type": "R", "before": "a real-world", "after": "an", "start_char_pos": 856, "end_char_pos": 868}, {"type": "A", "before": null, "after": "with 27 collaborators", "start_char_pos": 895, "end_char_pos": 895}, {"type": "A", "before": null, "after": "future designers of", "start_char_pos": 927, "end_char_pos": 927}], "sents_char_pos": [0, 211, 356, 569, 789]}
+{"doc_id": "2012.08849", "revision_depth": "1", "before_revision": "A cluster of research in Human-Computer Interaction (HCI) suggests that it is possible to infer some characteristics of users' mental states by analyzing electrophysiological responses in real-time. However, it is not clear how to use the information extracted from electrophysiological signals to create visual representations of the emotional states of Virtual Reality (VR) users. Visualization of users' emotions in VR can lead to biofeedback therapies for training emotion self-regulation . Understanding how to visualize emotions in VR requires an interdisciplinary approach that integrates disciplines such as psychology, electrophysiology, and audiovisual design. Therefore, this review aims to integrate previous studies from these fields to understand how to develop virtual environments that can automatically create visual representations of users' emotional states. This manuscript addresses this challenge in three sections: First, theories related to emotion and affect are compared . Second, evidence suggesting that specific visual and sound cues tend to be associated with particular emotions are discussed. And third , some of the available methods for assessing emotions are described .", "after_revision": "A cluster of research in Affective Computing suggests that it is possible to infer some characteristics of users' affective states by analyzing their electrophysiological activity in real-time. However, it is not clear how to use the information extracted from electrophysiological signals to create visual representations of the affective states of Virtual Reality (VR) users. Visualization of users' affective states in VR can lead to biofeedback therapies for mental health care . Understanding how to visualize affective states in VR requires an interdisciplinary approach that integrates psychology, electrophysiology, and audio-visual design. Therefore, this review aims to integrate previous studies from these fields to understand how to develop virtual environments that can automatically create visual representations of users' affective states. The manuscript addresses this challenge in four sections: First, theories related to emotion and affect are summarized . Second, evidence suggesting that visual and sound cues tend to be associated with affective states are discussed. Third , some of the available methods for assessing affect are described. The fourth and final section contains five practical considerations for the development of virtual reality environments for affect visualization .", "edit_actions": [{"type": "R", "before": "Human-Computer Interaction (HCI)", "after": "Affective Computing", "start_char_pos": 25, "end_char_pos": 57}, {"type": "R", "before": "mental", "after": "affective", "start_char_pos": 127, "end_char_pos": 133}, {"type": "R", "before": "electrophysiological responses", "after": "their electrophysiological activity", "start_char_pos": 154, "end_char_pos": 184}, {"type": "R", "before": "emotional", "after": "affective", "start_char_pos": 335, "end_char_pos": 344}, {"type": "R", "before": "emotions", "after": "affective states", "start_char_pos": 407, "end_char_pos": 415}, {"type": "R", "before": "training emotion self-regulation", "after": "mental health care", "start_char_pos": 460, "end_char_pos": 492}, {"type": "R", "before": "emotions", "after": "affective states", "start_char_pos": 526, "end_char_pos": 534}, {"type": "D", "before": "disciplines such as", "after": null, "start_char_pos": 596, "end_char_pos": 615}, {"type": "R", "before": "audiovisual", "after": "audio-visual", "start_char_pos": 651, "end_char_pos": 662}, {"type": "R", "before": "emotional states. This", "after": "affective states. The", "start_char_pos": 860, "end_char_pos": 882}, {"type": "R", "before": "three", "after": "four", "start_char_pos": 922, "end_char_pos": 927}, {"type": "R", "before": "compared", "after": "summarized", "start_char_pos": 988, "end_char_pos": 996}, {"type": "D", "before": "specific", "after": null, "start_char_pos": 1032, "end_char_pos": 1040}, {"type": "R", "before": "particular emotions", "after": "affective states", "start_char_pos": 1090, "end_char_pos": 1109}, {"type": "R", "before": "And third", "after": "Third", "start_char_pos": 1125, "end_char_pos": 1134}, {"type": "R", "before": "emotions are described", "after": "affect are described. The fourth and final section contains five practical considerations for the development of virtual reality environments for affect visualization", "start_char_pos": 1181, "end_char_pos": 1203}], "sents_char_pos": [0, 198, 382, 494, 670, 877, 998, 1124]}
+{"doc_id": "2012.09660", "revision_depth": "1", "before_revision": "Deciphering the workings of a brain (and its alterations due to pathologies and disorders) requires real-time mapping of the activity of all neurons. Recently, this formidable task has been brought into reach by the implementation of light sheet fluorescence (LSF) microscopy on the transparent zebrafish larva, a simple yet representative model of the vertebrate brain. This application is however hindered by the use of visible light for fluorescence excitation , inducing unwanted visual stimulation that can only be partially overcome resorting to complex excitation geometries. On the other hand, two-photon (2P) LSF microscopy, owing to the use of invisible infra-red illumination, enables volumetric imaging of neuronal activity avoiding undesirable visual stimulation . However, due to the low efficiency of the 2P absorption process, the imaging speed of this technique is typically limited (~ 1 Hz) by the signal to noise ratio achievable without sample photodamage. Here we describe a custom-made 2P LSF microscope that overcomes this limit, being specifically designed to perform whole-brain cellular-resolution calcium imaging in zebrafish larvae quintuplicating previous volumetric acquisition frequency (5 Hz) . ...%DIFDELCMD < ] %%% We employed this system to investigate, in real-time on a brain-wide scale, the onset and propagation of acute seizures, as induced by the convulsant drug pentylenetetrazol (PTZ), avoiding detrimental visual stimulation on a highly susceptible system such as an epileptic brain. ...%DIFDELCMD < ] %%% In conclusion, the presented 2P LSF microscope design affords high spatio-temporal resolution while avoiding visual stimuli and allows unprecedented access to whole zebrafish brain epileptic dynamics .", "after_revision": "Light-sheet fluorescence microscopy (LSFM) enables real-time whole-brain functional imaging in zebrafish larvae. Conventional one photon LSFM can however induce undesirable visual stimulation due to the use of visible excitation light. The use of two-photon (2P) excitation, employing near-infrared invisible light, provides unbiased investigation of neuronal circuit dynamics . However, due to the low efficiency of the 2P absorption process, the imaging speed of this technique is typically limited by the signal-to-noise-ratio. Here, we describe a 2P LSFM setup designed for non-invasive imaging that enables quintuplicating state-of-the-art volumetric acquisition rate of the larval zebrafish brain (5 Hz) %DIFDELCMD < ] %%% while keeping low the laser intensity on the specimen. We applied our system to the study of pharmacologically-induced acute seizures, %DIFDELCMD < ] %%% characterizing the spatial-temporal dynamics of pathological activity and describing for the first time the appearance of caudo-rostral ictal waves (CRIWs) .", "edit_actions": [{"type": "R", "before": "Deciphering the workings of a brain (and its alterations due to pathologies and disorders) requires", "after": "Light-sheet fluorescence microscopy (LSFM) enables", "start_char_pos": 0, "end_char_pos": 99}, {"type": "R", "before": "mapping of the activity of all neurons. Recently, this formidable task has been brought into reach by the implementation of light sheet fluorescence (LSF) microscopy on the transparent zebrafish larva, a simple yet representative model of the vertebrate brain. This application is however hindered by", "after": "whole-brain functional imaging in zebrafish larvae. Conventional one photon LSFM can however induce undesirable visual stimulation due to", "start_char_pos": 110, "end_char_pos": 410}, {"type": "R", "before": "light for fluorescence excitation , inducing unwanted visual stimulation that can only be partially overcome resorting to complex excitation geometries. On the other hand,", "after": "excitation light. The use of", "start_char_pos": 430, "end_char_pos": 601}, {"type": "R", "before": "LSF microscopy, owing to the use of invisible infra-red illumination, enables volumetric imaging of neuronal activity avoiding undesirable visual stimulation", "after": "excitation, employing near-infrared invisible light, provides unbiased investigation of neuronal circuit dynamics", "start_char_pos": 618, "end_char_pos": 775}, {"type": "R", "before": "(~ 1 Hz) by the signal to noise ratio achievable without sample photodamage. Here", "after": "by the signal-to-noise-ratio. Here,", "start_char_pos": 900, "end_char_pos": 981}, {"type": "D", "before": "custom-made", "after": null, "start_char_pos": 996, "end_char_pos": 1007}, {"type": "R", "before": "LSF microscope that overcomes this limit, being specifically designed to perform whole-brain cellular-resolution calcium imaging in zebrafish larvae quintuplicating previous volumetric acquisition frequency", "after": "LSFM setup designed for non-invasive imaging that enables quintuplicating state-of-the-art volumetric acquisition rate of the larval zebrafish brain", "start_char_pos": 1011, "end_char_pos": 1217}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1225, "end_char_pos": 1226}, {"type": "D", "before": "...", "after": null, "start_char_pos": 1227, "end_char_pos": 1230}, {"type": "R", "before": "We employed this system to investigate, in real-time on a brain-wide scale, the onset and propagation of", "after": "while keeping low the laser intensity on the specimen. We applied our system to the study of pharmacologically-induced", "start_char_pos": 1249, "end_char_pos": 1353}, {"type": "D", "before": "as induced by the convulsant drug pentylenetetrazol (PTZ), avoiding detrimental visual stimulation on a highly susceptible system such as an epileptic brain.", "after": null, "start_char_pos": 1370, "end_char_pos": 1527}, {"type": "D", "before": "...", "after": null, "start_char_pos": 1528, "end_char_pos": 1531}, {"type": "R", "before": "In conclusion, the presented 2P LSF microscope design affords high spatio-temporal resolution while avoiding visual stimuli and allows unprecedented access to whole zebrafish brain epileptic dynamics", "after": "characterizing the spatial-temporal dynamics of pathological activity and describing for the first time the appearance of caudo-rostral ictal waves (CRIWs)", "start_char_pos": 1550, "end_char_pos": 1749}], "sents_char_pos": [0, 149, 370, 582, 777, 976, 1230, 1531]}
+{"doc_id": "2012.10006", "revision_depth": "1", "before_revision": "Multiple brain injury criteria (BIC) are developed to quickly quantify brain injury risks after head impacts. These BIC originated from different types of head impacts (e.g., sports and car crashes) are widely used in risk evaluation. However, the predictability of the BIC on different types of head impacts has not been evaluated. Physiologically, the brain strain is often considered the key parameter of brain injury. To evaluate the BIC's ability to predict brain strain across five datasets comprising different head impact subtypes , linear regression was used to model 95\\% maximum principal strain, 95\\% maximum principal strain at corpus callosum, and cumulative strain damage (15\\%) on 18 BIC . The results show significant differences in the relationship between BIC and brain strain across datasets, indicating the same BIC value may indicate different brain strain in different head impact subtypes . The accuracy of regression is generally decreasing if the BIC regression models are fit on a dataset with a different head impact subtype rather than on the dataset with the same subtype . Given this finding, this study raises concerns for applying BIC to predict the brain strain for head impacts different from the head impacts on which the BIC was developed.", "after_revision": "Multiple brain injury criteria (BIC) are developed to quickly quantify brain injury risks after head impacts. These BIC originated from different types of head impacts (e.g., sports and car crashes) are widely used in risk evaluation. However, the accuracy of using the BIC on brain injury risk estimation across different types of head impacts has not been evaluated. Physiologically, brain strain is often considered the key parameter of brain injury. To evaluate the BIC's risk estimation accuracy across five datasets comprising different head impact types , linear regression was used to model 95\\% maximum principal strain, 95\\% maximum principal strain at the corpus callosum, and cumulative strain damage (15\\%) on each of 18 BIC respectively . The results show a significant difference in the relationship between BIC and brain strain across datasets, indicating the same BIC value may suggest different brain strain in different head impact types . The accuracy of brain strain regression is generally decreasing if the BIC regression models are fit on a dataset with a different type of head impact rather than on the dataset with the same type . Given this finding, this study raises concerns for applying BIC to estimate the brain injury risks for head impacts different from the head impacts on which the BIC was developed.", "edit_actions": [{"type": "R", "before": "predictability of", "after": "accuracy of using", "start_char_pos": 248, "end_char_pos": 265}, {"type": "A", "before": null, "after": "brain injury risk estimation across", "start_char_pos": 277, "end_char_pos": 277}, {"type": "D", "before": "the", "after": null, "start_char_pos": 351, "end_char_pos": 354}, {"type": "R", "before": "ability to predict brain strain", "after": "risk estimation accuracy", "start_char_pos": 445, "end_char_pos": 476}, {"type": "R", "before": "subtypes", "after": "types", "start_char_pos": 531, "end_char_pos": 539}, {"type": "A", "before": null, "after": "the", "start_char_pos": 642, "end_char_pos": 642}, {"type": "A", "before": null, "after": "each of", "start_char_pos": 699, "end_char_pos": 699}, {"type": "A", "before": null, "after": "respectively", "start_char_pos": 707, "end_char_pos": 707}, {"type": "R", "before": "significant differences", "after": "a significant difference", "start_char_pos": 727, "end_char_pos": 750}, {"type": "R", "before": "indicate", "after": "suggest", "start_char_pos": 851, "end_char_pos": 859}, {"type": "R", "before": "subtypes", "after": "types", "start_char_pos": 908, "end_char_pos": 916}, {"type": "A", "before": null, "after": "brain strain", "start_char_pos": 935, "end_char_pos": 935}, {"type": "R", "before": "head impact subtype", "after": "type of head impact", "start_char_pos": 1038, "end_char_pos": 1057}, {"type": "R", "before": "subtype", "after": "type", "start_char_pos": 1099, "end_char_pos": 1106}, {"type": "R", "before": "predict the brain strain", "after": "estimate the brain injury risks", "start_char_pos": 1176, "end_char_pos": 1200}], "sents_char_pos": [0, 109, 234, 333, 422, 709, 918]}
+{"doc_id": "2012.10793", "revision_depth": "1", "before_revision": "We study {\\em online} active learning of homogeneous s-sparse halfspaces in R^d with adversarial noise \\mbox{%DIFAUXCMD kearns1992toward where the overall probability of a noisy label is constrained to be at most \\nu and the marginal distribution over unlabeled data is unchanged . Our main contribution is a state-of-the-art online active learning algorithm that achieves near-optimal attribute efficiency, label and sample complexity under mild distributional assumptions. In particular, under the conditions that the marginal distribution is isotropic log-concave and \\nu = \\Omega(\\epsilon), where \\epsilon \\in (0, 1) is the target error rate, we show that our algorithm PAC learns the underlying halfspace in polynomial time with near-optimal label complexity bound of O\\big( s \\cdot polylog( d, \\frac{1}{\\epsilon})\\big) and sample complexity bound of \\tilde{O}\\big( \\frac{s{\\epsilon} \\cdot polylog(d)} {\\epsilon} } \\big). Prior to this work, existing online algorithms designed for tolerating the adversarial noise are either subject to label complexity polynomial in d or \\frac{1}{\\epsilon}, or work under the restrictive uniform marginal distribution.\\tilde{O}\\big( {\\epsilon}) }\\big) \\tilde{O}\\big({\\epsilon} \\cdot polylog(d) }\\big) As an immediate corollary of our main result , we show that under the more challenging agnostic model \\mbox{%DIFAUXCMD \\cite{kearns1992toward }\\hspace{0pt}%DIFAUXCMD } where no assumption is made on the noise rate , our active learner achieves an error rate of O(OPT) + \\epsilon with the same running time and label and sample complexity, where OPT is the best possible error rate achievable by any homogeneous s-sparse halfspace. Our algorithm builds upon the celebrated Perceptron while leveraging novel localized sampling and semi-random gradient update to tolerate the adversarial noise. We believe that our algorithmic design and analysis are of independent interest, and may shed light on learning halfspaces with broader noise models .", "after_revision": "We study {\\em online} active learning of homogeneous halfspaces in R^d with adversarial noise where the overall probability of a noisy label is constrained to be at most \\nu . Our main contribution is a Perceptron-like online active learning algorithm that runs in polynomial time, and under the conditions that the marginal distribution is isotropic log-concave and \\nu = \\Omega(\\epsilon), where \\epsilon \\in (0, 1) is the target error rate, our algorithm PAC learns the underlying halfspace with near-optimal label complexity of O\\big( d \\cdot polylog( \\frac{1}{\\epsilon})\\big) and sample complexity of \\tilde{O}\\big( {\\epsilon} \\cdot polylog(d)} \\frac{d{\\epsilon} } \\big). Prior to this work, existing online algorithms designed for tolerating the adversarial noise are subject to either label complexity polynomial in \\frac{1}{\\epsilon}, or suboptimal noise tolerance, or restrictive marginal distributions. With the additional prior knowledge that the underlying halfspace is s-sparse, we obtain attribute-efficient label complexity of\\tilde{O}\\big( s \\cdot polylog(d, \\frac{1{\\epsilon}) }\\big) and sample complexity of\\tilde{O}\\big(\\frac{s{\\epsilon} \\cdot polylog(d) }\\big). As an immediate corollary , we show that under the }\\hspace{0pt}%DIFAUXCMD } agnostic model where no assumption is made on the noise rate \\nu , our active learner achieves an error rate of O(OPT) + \\epsilon with the same running time and label and sample complexity, where OPT is the best possible error rate achievable by any homogeneous halfspace .", "edit_actions": [{"type": "D", "before": "s-sparse", "after": null, "start_char_pos": 53, "end_char_pos": 61}, {"type": "D", "before": "\\mbox{%DIFAUXCMD kearns1992toward", "after": null, "start_char_pos": 103, "end_char_pos": 136}, {"type": "D", "before": "and the marginal distribution over unlabeled data is unchanged", "after": null, "start_char_pos": 217, "end_char_pos": 279}, {"type": "R", "before": "state-of-the-art", "after": "Perceptron-like", "start_char_pos": 309, "end_char_pos": 325}, {"type": "R", "before": "achieves near-optimal attribute efficiency, label and sample complexity under mild distributional assumptions. In particular, under", "after": "runs in polynomial time, and under", "start_char_pos": 364, "end_char_pos": 495}, {"type": "D", "before": "we show that", "after": null, "start_char_pos": 647, "end_char_pos": 659}, {"type": "D", "before": "in polynomial time", "after": null, "start_char_pos": 710, "end_char_pos": 728}, {"type": "D", "before": "bound", "after": null, "start_char_pos": 764, "end_char_pos": 769}, {"type": "R", "before": "s", "after": "d", "start_char_pos": 780, "end_char_pos": 781}, {"type": "D", "before": "d,", "after": null, "start_char_pos": 797, "end_char_pos": 799}, {"type": "D", "before": "bound", "after": null, "start_char_pos": 847, "end_char_pos": 852}, {"type": "D", "before": "\\frac{s", "after": null, "start_char_pos": 871, "end_char_pos": 878}, {"type": "A", "before": null, "after": "\\frac{d", "start_char_pos": 907, "end_char_pos": 907}, {"type": "R", "before": "either subject to", "after": "subject to either", "start_char_pos": 1024, "end_char_pos": 1041}, {"type": "D", "before": "d or", "after": null, "start_char_pos": 1073, "end_char_pos": 1077}, {"type": "R", "before": "work under the restrictive uniform marginal distribution.", "after": "suboptimal noise tolerance, or restrictive marginal distributions. With the additional prior knowledge that the underlying halfspace is s-sparse, we obtain attribute-efficient label complexity of", "start_char_pos": 1101, "end_char_pos": 1158}, {"type": "A", "before": null, "after": "s \\cdot polylog(d, \\frac{1", "start_char_pos": 1173, "end_char_pos": 1173}, {"type": "A", "before": null, "after": "and sample complexity of", "start_char_pos": 1192, "end_char_pos": 1192}, {"type": "A", "before": null, "after": "\\frac{s", "start_char_pos": 1206, "end_char_pos": 1206}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1240, "end_char_pos": 1240}, {"type": "D", "before": "of our main result", "after": null, "start_char_pos": 1267, "end_char_pos": 1285}, {"type": "D", "before": "more challenging agnostic model \\mbox{%DIFAUXCMD \\cite{kearns1992toward", "after": null, "start_char_pos": 1311, "end_char_pos": 1382}, {"type": "A", "before": null, "after": "agnostic model", "start_char_pos": 1409, "end_char_pos": 1409}, {"type": "A", "before": null, "after": "\\nu", "start_char_pos": 1456, "end_char_pos": 1456}, {"type": "R", "before": "s-sparse halfspace. Our algorithm builds upon the celebrated Perceptron while leveraging novel localized sampling and semi-random gradient update to tolerate the adversarial noise. We believe that our algorithmic design and analysis are of independent interest, and may shed light on learning halfspaces with broader noise models", "after": "halfspace", "start_char_pos": 1654, "end_char_pos": 1983}], "sents_char_pos": [0, 281, 474, 926, 1158, 1184, 1673, 1834]}
+{"doc_id": "2012.11965", "revision_depth": "1", "before_revision": "We study the question of when we can answer a Conjunctive Query (CQ) with an ordering over the answers by constructing a structure for direct (random) access to the sorted list of answers, without actually materializing this list, so that the construction time is linear (or quasilinear ) in the size of the database. In the absence of answer ordering, such a construction has been devised for the task of enumerating query answers of free-connex acyclic CQs, so that the access time is logarithmic. Moreover, it follows from past results that within the class of CQs without self-joins, being free-connex acyclic is necessary for the existence of such a construction (under conventional assumptions in fine-grained complexity). In this work, we embark on the challenge of identifying the answer orderings that allow for ranked direct access with the above complexity guarantees. We begin with the class of lexicographic orderings and give a decidable characterization of the class of feasible such orderings for every CQ without self-joins. We then continue to the more general case of orderings by the sum of attribute scores. As it turns out, in this case ranked direct access is feasible only in trivial cases. Hence, to better understand the computational challenge at hand, we consider the more modest task of providing access to only one single answer (i.e., finding the answer at a given position) . We indeed achieve a quasilinear-time algorithm for a subset of the class of full CQs without self-joins, by adopting a solution of Frederickson and Johnson to the classic problem of selection over sorted matrices. We further prove that none of the other queries in this class admit such an algorithm.", "after_revision": "We study the question of when we can provide logarithmic-time direct access to the k-th answer to a Conjunctive Query (CQ) with a specified ordering over the answers , following a preprocessing step that constructs a data structure in time quasilinear in the size of the database. Specifically, we embark on the challenge of identifying the tractable answer orderings that allow for ranked direct access with such complexity guarantees. We begin with lexicographic orderings and give a decidable characterization (under conventional complexity assumptions) of the class of tractable lexicographic orderings for every CQ without self-joins. We then continue to the more general orderings by the sum of attribute weights and show for it that ranked direct access is tractable only in trivial cases. Hence, to better understand the computational challenge at hand, we consider the more modest task of providing access to only a single answer (i.e., finding the answer at a given position) - a task that we refer to as the selection problem . We indeed achieve a quasilinear-time algorithm for a subset of the class of full CQs without self-joins, by adopting a solution of Frederickson and Johnson to the classic problem of selection over sorted matrices. We further prove that none of the other queries in this class admit such an algorithm.", "edit_actions": [{"type": "R", "before": "answer", "after": "provide logarithmic-time direct access to the k-th answer to", "start_char_pos": 37, "end_char_pos": 43}, {"type": "R", "before": "an", "after": "a specified", "start_char_pos": 74, "end_char_pos": 76}, {"type": "R", "before": "by constructing a structure for direct (random) access to the sorted list of answers, without actually materializing this list, so that the construction time is linear (or quasilinear )", "after": ", following a preprocessing step that constructs a data structure in time quasilinear", "start_char_pos": 103, "end_char_pos": 288}, {"type": "R", "before": "In the absence of answer ordering, such a construction has been devised for the task of enumerating query answers of free-connex acyclic CQs, so that the access time is logarithmic. Moreover, it follows from past results that within the class of CQs without self-joins, being free-connex acyclic is necessary for the existence of such a construction (under conventional assumptions in fine-grained complexity). In this work,", "after": "Specifically,", "start_char_pos": 318, "end_char_pos": 742}, {"type": "A", "before": null, "after": "tractable", "start_char_pos": 789, "end_char_pos": 789}, {"type": "R", "before": "the above", "after": "such", "start_char_pos": 848, "end_char_pos": 857}, {"type": "D", "before": "the class of", "after": null, "start_char_pos": 895, "end_char_pos": 907}, {"type": "A", "before": null, "after": "(under conventional complexity assumptions)", "start_char_pos": 970, "end_char_pos": 970}, {"type": "R", "before": "feasible such", "after": "tractable lexicographic", "start_char_pos": 987, "end_char_pos": 1000}, {"type": "D", "before": "case of", "after": null, "start_char_pos": 1081, "end_char_pos": 1088}, {"type": "R", "before": "scores. As it turns out, in this case", "after": "weights and show for it that", "start_char_pos": 1123, "end_char_pos": 1160}, {"type": "R", "before": "feasible", "after": "tractable", "start_char_pos": 1185, "end_char_pos": 1193}, {"type": "R", "before": "one", "after": "a", "start_char_pos": 1343, "end_char_pos": 1346}, {"type": "A", "before": null, "after": "- a task that we refer to as the selection problem", "start_char_pos": 1408, "end_char_pos": 1408}], "sents_char_pos": [0, 317, 499, 728, 880, 1043, 1130, 1216, 1410, 1624]}
+{"doc_id": "2012.12803", "revision_depth": "1", "before_revision": "Recent work of Erlingsson, Feldman, Mironov, Raghunathan, Talwar, and Thakurta [EFMRTT19] demonstrates that random shuffling of input data amplifies differential privacy guarantees . Such amplification leads to substantially stronger privacy guarantees for systems in which data is contributed anonymously [BEMMRLRKTS17] and for the analysis of noisy stochastic gradient descent . We show that an \\varepsilon_0-locally differentially private algorithm, under shuffling with n users, amplifies to a (\\Theta ((1-e^{-\\varepsilon_0})\\frac{e^{\\varepsilon_0\\log(1/\\delta)}{n}}), \\delta) -central differential privacy guarantee . This significantly improves over previous work and achieves the asymptotically optimal dependence on \\varepsilon_0. Our result is based on a new approach that is simpler than previous work and extends to approximate differential privacy with nearly the same guarantees. Our work also yields an empirical method to derive tighter bounds on the central \\varepsilon and we show that it gets to within a small constant factor of the correct bound. As a direct corollary of our analysis we derive a simple and asymptotically optimal algorithm for discrete distribution estimation in the shuffle model of privacy CSUZZ19 .", "after_revision": "Recent work of Erlingsson, Feldman, Mironov, Raghunathan, Talwar, and Thakurta [EFMRTT19] demonstrates that random shuffling amplifies differential privacy guarantees of locally randomized data . Such amplification implies substantially stronger privacy guarantees for systems in which data is contributed anonymously [BEMMRLRKTS17] and has lead to significant interest in the shuffle model of privacy CSUZZ19,EFMRTT19 . We show that random shuffling of n data records that are input to \\varepsilon_0-differentially private local randomizers results in an (O ((1-e^{-\\varepsilon_0})\\frac{e^{\\varepsilon_0\\log(1/\\delta)}{n}}), \\delta) -differentially private algorithm . This significantly improves over previous work and achieves the asymptotically optimal dependence in \\varepsilon_0. Our result is based on a new approach that is simpler than previous work and extends to approximate differential privacy with nearly the same guarantees. Our work also yields an empirical method to derive tighter bounds the resulting \\varepsilon and we show that it gets to within a small constant factor of the optimal bound. As a direct corollary of our analysis , we derive a simple and asymptotically optimal algorithm for discrete distribution estimation in the shuffle model of privacy . We also observe that our result implies the first asymptotically optimal privacy analysis of noisy stochastic gradient descent that applies to sampling without replacement .", "edit_actions": [{"type": "D", "before": "of input data", "after": null, "start_char_pos": 125, "end_char_pos": 138}, {"type": "A", "before": null, "after": "of locally randomized data", "start_char_pos": 181, "end_char_pos": 181}, {"type": "R", "before": "leads to", "after": "implies", "start_char_pos": 203, "end_char_pos": 211}, {"type": "R", "before": "for the analysis of noisy stochastic gradient descent", "after": "has lead to significant interest in the shuffle model of privacy", "start_char_pos": 326, "end_char_pos": 379}, {"type": "A", "before": null, "after": "CSUZZ19,EFMRTT19", "start_char_pos": 380, "end_char_pos": 380}, {"type": "R", "before": "an \\varepsilon_0-locally differentially private algorithm, under shuffling with n users, amplifies to a (\\Theta", "after": "random shuffling of n data records that are input to \\varepsilon_0-differentially private local randomizers results in an (O", "start_char_pos": 396, "end_char_pos": 507}, {"type": "R", "before": "-central differential privacy guarantee", "after": "-differentially private algorithm", "start_char_pos": 583, "end_char_pos": 622}, {"type": "R", "before": "on", "after": "in", "start_char_pos": 723, "end_char_pos": 725}, {"type": "R", "before": "on the central", "after": "the resulting", "start_char_pos": 961, "end_char_pos": 975}, {"type": "R", "before": "correct", "after": "optimal", "start_char_pos": 1054, "end_char_pos": 1061}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1107, "end_char_pos": 1107}, {"type": "R", "before": "CSUZZ19", "after": ". We also observe that our result implies the first asymptotically optimal privacy analysis of noisy stochastic gradient descent that applies to sampling without replacement", "start_char_pos": 1233, "end_char_pos": 1240}], "sents_char_pos": [0, 183, 382, 624, 740, 894, 1068]}
+{"doc_id": "2012.14353", "revision_depth": "1", "before_revision": "Exponential growths of social media and micro-blogging sites not only provide platforms for empowering freedom of expressions and individual voices, but also enables people to express anti-social behavior like online harassment, cyberbullying, and hate speech. Numerous works have been proposed to utilize these data for social and anti-social behavior analysis, by predicting the contexts mostly for highly-resourced languages like English. However, some languages such as Bengali are under-resourced that lack of computational resources for natural language processing (NLP). In this paper, we propose an explainable approach for hate speech detection from under-resourced Bengali language, which we called DeepHateExplainer. In our approach, Bengali texts are first comprehensively preprocessed, before classifying them into political, personal, geopolitical, and religious hates, by employing neural ensemble of different transformer-based neural architectures (i.e., monolingual Bangla BERT-base, multilingual BERT-cased and uncased, and XLM-RoBERTa) , followed by identifying important terms with sensitivity analysis and layer-wise relevance propagation (LRP) to provide human-interpretable explanations. Evaluations against several machine learning ~ (linear and tree-based models) and deep neural networks (i.e., CNN, Bi-LSTM, and Conv-LSTM with word embeddings) baselines yield F1 scores of 84\\%, 90\\%, 88\\%, and 88\\%, for political, personal, geopolitical, and religious hates, respectively, during 3-fold cross-validation tests .", "after_revision": "The exponential growths of social media and micro-blogging sites not only provide platforms for empowering freedom of expression and individual voices, but also enables people to express anti-social behavior like online harassment, cyberbullying, and hate speech. Numerous works have been proposed to utilize the textual data for social and anti-social behavior analysis, by predicting the contexts mostly for highly-resourced languages like English. However, some languages are under-resourced , e.g., South Asian languages like Bengali, that lack computational resources for accurate natural language processing (NLP). In this paper, we propose an explainable approach for hate speech detection from the under-resourced Bengali language, which we called DeepHateExplainer. In our approach, Bengali texts are first comprehensively preprocessed, before classifying them into political, personal, geopolitical, and religious hates, by employing the neural ensemble method of different transformer-based neural architectures (i.e., monolingual Bangla BERT-base, multilingual BERT-cased / uncased, and XLM-RoBERTa) . Subsequently, important (most and least) terms are identified with sensitivity analysis and layer-wise relevance propagation (LRP) , before providing human-interpretable explanations. Finally, to measure the quality of the explanation (i.e., faithfulness), we compute the comprehensiveness and sufficiency. Evaluations against machine learning (linear and tree-based models) and deep neural networks (i.e., CNN, Bi-LSTM, and Conv-LSTM with word embeddings) baselines yield F1 scores of 84\\%, 90\\%, 88\\%, and 88\\%, for political, personal, geopolitical, and religious hates, respectively, outperforming both ML and DNN baselines .", "edit_actions": [{"type": "R", "before": "Exponential", "after": "The exponential", "start_char_pos": 0, "end_char_pos": 11}, {"type": "R", "before": "expressions", "after": "expression", "start_char_pos": 114, "end_char_pos": 125}, {"type": "R", "before": "these", "after": "the textual", "start_char_pos": 306, "end_char_pos": 311}, {"type": "D", "before": "such as Bengali", "after": null, "start_char_pos": 466, "end_char_pos": 481}, {"type": "R", "before": "that lack of", "after": ", e.g., South Asian languages like Bengali, that lack", "start_char_pos": 502, "end_char_pos": 514}, {"type": "A", "before": null, "after": "accurate", "start_char_pos": 543, "end_char_pos": 543}, {"type": "A", "before": null, "after": "the", "start_char_pos": 660, "end_char_pos": 660}, {"type": "R", "before": "neural ensemble", "after": "the neural ensemble method", "start_char_pos": 899, "end_char_pos": 914}, {"type": "R", "before": "and", "after": "/", "start_char_pos": 1028, "end_char_pos": 1031}, {"type": "R", "before": ", followed by identifying important terms", "after": ". Subsequently, important (most and least) terms are identified", "start_char_pos": 1058, "end_char_pos": 1099}, {"type": "R", "before": "to provide", "after": ", before providing", "start_char_pos": 1169, "end_char_pos": 1179}, {"type": "R", "before": "Evaluations against several machine learning ~", "after": "Finally, to measure the quality of the explanation (i.e., faithfulness), we compute the comprehensiveness and sufficiency. Evaluations against machine learning", "start_char_pos": 1214, "end_char_pos": 1260}, {"type": "R", "before": "during 3-fold cross-validation tests", "after": "outperforming both ML and DNN baselines", "start_char_pos": 1505, "end_char_pos": 1541}], "sents_char_pos": [0, 260, 441, 578, 729, 1213]}
+{"doc_id": "2012.15671", "revision_depth": "1", "before_revision": "It is well accepted that the choice of token vocabulary largely affects the performance of machine translation. However, due to expensive trial costs, most studies only conduct simple trials with dominant approaches (e.g BPE) and commonly used vocabulary sizes. In this paper, we find an exciting relation between an information-theoretic feature and BLEU scores. With thisobservation , we formulate the quest of vocabularization -- finding the best token dictionary with a proper size -- as an optimal transport problem.We then propose VOLT, a simple and efficient vocabularization solution without the full and costly trial training. We evaluate our approach on multiple machine translation tasks, including WMT-14 English-German translation, TED bilingual translation, and TED multilingual translation. Empirical results show that VOLT beats widely-used vocabularies on diverse scenarios . For example, VOLT achieves 70\\% vocabulary size reduction and 0.6 BLEU gain on English-German translation. Also, one advantage of VOLT lies in its low resource consumption. Compared to naive BPE-search, VOLT reduces the search time from 288 GPU hours to 0.5 CPU hours .", "after_revision": "The choice of token vocabulary affects the performance of machine translation. This paper aims to figure out what is a good vocabulary and whether one can find the optimal vocabulary without trial training. To answer these questions, we first provide an alternative understanding of the role of vocabulary from the perspective of information theory. Motivated by this , we formulate the quest of vocabularization -- finding the best token dictionary with a proper size -- as an optimal transport (OT) problem.We We propose VOLT, a simple and efficient solution without trial training. Empirical results show that VOLT outperforms widely-used vocabularies in diverse scenarios, including WMT-14 English-German and TED's 52 translation directions . For example, VOLT achieves 70\\% vocabulary size reduction and 0.5 BLEU gain on English-German translation. Also, compared to BPE-search, VOLT reduces the search time from 384 GPU hours to 30 GPU hours on English-German translation. Codes are available at URL .", "edit_actions": [{"type": "R", "before": "It is well accepted that the", "after": "The", "start_char_pos": 0, "end_char_pos": 28}, {"type": "D", "before": "largely", "after": null, "start_char_pos": 56, "end_char_pos": 63}, {"type": "R", "before": "However, due to expensive trial costs, most studies only conduct simple trials with dominant approaches (e.g BPE) and commonly used vocabulary sizes. In this paper, we find an exciting relation between an information-theoretic feature and BLEU scores. With thisobservation", "after": "This paper aims to figure out what is a good vocabulary and whether one can find the optimal vocabulary without trial training. To answer these questions, we first provide an alternative understanding of the role of vocabulary from the perspective of information theory. Motivated by this", "start_char_pos": 112, "end_char_pos": 384}, {"type": "A", "before": null, "after": "(OT)", "start_char_pos": 513, "end_char_pos": 513}, {"type": "R", "before": "then", "after": "We", "start_char_pos": 525, "end_char_pos": 529}, {"type": "R", "before": "vocabularization solution without the full and costly", "after": "solution without", "start_char_pos": 567, "end_char_pos": 620}, {"type": "D", "before": "We evaluate our approach on multiple machine translation tasks, including WMT-14 English-German translation, TED bilingual translation, and TED multilingual translation.", "after": null, "start_char_pos": 637, "end_char_pos": 806}, {"type": "R", "before": "beats", "after": "outperforms", "start_char_pos": 840, "end_char_pos": 845}, {"type": "R", "before": "on diverse scenarios", "after": "in diverse scenarios, including WMT-14 English-German and TED's 52 translation directions", "start_char_pos": 871, "end_char_pos": 891}, {"type": "R", "before": "0.6", "after": "0.5", "start_char_pos": 956, "end_char_pos": 959}, {"type": "R", "before": "one advantage of VOLT lies in its low resource consumption. Compared to naive", "after": "compared to", "start_char_pos": 1007, "end_char_pos": 1084}, {"type": "R", "before": "288", "after": "384", "start_char_pos": 1131, "end_char_pos": 1134}, {"type": "R", "before": "0.5 CPU hours", "after": "30 GPU hours on English-German translation. Codes are available at URL", "start_char_pos": 1148, "end_char_pos": 1161}], "sents_char_pos": [0, 111, 261, 363, 522, 636, 806, 893, 1000, 1066]}
+{"doc_id": "2012.15699", "revision_depth": "1", "before_revision": "Pre-trained language models (PLMs) fail miserably on adversarial attacks. To improve the robustness, adversarial data augmentation (ADA) has been widely adopted , which attempts to cover more search space of adversarial attacks by adding the adversarial examples during training. However, the number of adversarial examples added by ADA is extremely insufficient due to the enormously large search space. In this work, we propose a simple and effective method to cover much larger proportion of the attack search space, called Adversarial Data Augmentation with Mixup (MixADA ). Specifically, MixADA linearly interpolates the representations of pairs of training examples to form new virtual samples, which are more abundant and diverse than the discrete adversarial examples used in conventional ADA. Moreover, to evaluate the robustness of different models fairly , we adopt a challenging setup, which dynamically generates new adversarial examples for each model. In the text classification experiments of BERT and RoBERTa, MixADA achieves significant robustness gains under two strong adversarial attacks and alleviates the performance degradation of ADA on the original data. Our source codes will be released to support further explorations .", "after_revision": "Pretrained language models (PLMs) perform poorly under adversarial attacks. To improve the adversarial robustness, adversarial data augmentation (ADA) has been widely adopted to cover more search space of adversarial attacks by adding textual adversarial examples during training. However, the number of adversarial examples for text augmentation is still extremely insufficient due to the exponentially large attack search space. In this work, we propose a simple and effective method to cover a much larger proportion of the attack search space, called Adversarial and Mixup Data Augmentation (AMDA ). Specifically, AMDA linearly interpolates the representations of pairs of training samples to form new virtual samples, which are more abundant and diverse than the discrete text adversarial examples in conventional ADA. Moreover, to fairly evaluate the robustness of different models , we adopt a challenging evaluation setup, which generates a new set of adversarial examples targeting each model. In text classification experiments of BERT and RoBERTa, AMDA achieves significant robustness gains under two strong adversarial attacks and alleviates the performance degradation of ADA on the clean data. Our code is released at: URL .", "edit_actions": [{"type": "R", "before": "Pre-trained", "after": "Pretrained", "start_char_pos": 0, "end_char_pos": 11}, {"type": "R", "before": "fail miserably on", "after": "perform poorly under", "start_char_pos": 35, "end_char_pos": 52}, {"type": "A", "before": null, "after": "adversarial", "start_char_pos": 89, "end_char_pos": 89}, {"type": "D", "before": ", which attempts", "after": null, "start_char_pos": 162, "end_char_pos": 178}, {"type": "R", "before": "the", "after": "textual", "start_char_pos": 239, "end_char_pos": 242}, {"type": "R", "before": "added by ADA is", "after": "for text augmentation is still", "start_char_pos": 325, "end_char_pos": 340}, {"type": "R", "before": "enormously large", "after": "exponentially large attack", "start_char_pos": 375, "end_char_pos": 391}, {"type": "A", "before": null, "after": "a", "start_char_pos": 470, "end_char_pos": 470}, {"type": "R", "before": "Data Augmentation with Mixup (MixADA", "after": "and Mixup Data Augmentation (AMDA", "start_char_pos": 541, "end_char_pos": 577}, {"type": "R", "before": "MixADA", "after": "AMDA", "start_char_pos": 595, "end_char_pos": 601}, {"type": "R", "before": "examples", "after": "samples", "start_char_pos": 665, "end_char_pos": 673}, {"type": "R", "before": "adversarial examples used", "after": "text adversarial examples", "start_char_pos": 757, "end_char_pos": 782}, {"type": "A", "before": null, "after": "fairly", "start_char_pos": 817, "end_char_pos": 817}, {"type": "D", "before": "fairly", "after": null, "start_char_pos": 862, "end_char_pos": 868}, {"type": "A", "before": null, "after": "evaluation", "start_char_pos": 894, "end_char_pos": 894}, {"type": "R", "before": "dynamically generates new adversarial examples for", "after": "generates a new set of adversarial examples targeting", "start_char_pos": 908, "end_char_pos": 958}, {"type": "D", "before": "the", "after": null, "start_char_pos": 974, "end_char_pos": 977}, {"type": "R", "before": "MixADA", "after": "AMDA", "start_char_pos": 1031, "end_char_pos": 1037}, {"type": "R", "before": "original", "after": "clean", "start_char_pos": 1170, "end_char_pos": 1178}, {"type": "R", "before": "source codes will be released to support further explorations", "after": "code is released at: URL", "start_char_pos": 1189, "end_char_pos": 1250}], "sents_char_pos": [0, 73, 280, 405, 803, 970, 1184]}
+{"doc_id": "2012.15725", "revision_depth": "1", "before_revision": "The emphasis on optimal operations and efficiency has led to increased complexity in engineered systems. This in turn increases the vulnerability of the system . However, with the increasing frequency of extreme events, resilience has now become an important consideration. Resilience quantifies the ability of the system to absorb and recover from extreme conditions. Graph theory is a widely used framework for modeling complex engineered systems to evaluate their resilience to attacks. Most existing methods in resilience analysis are based on an iterative approach that explores each node/link of a graph . These methods suffer from high computational complexity and the resulting analysis is network specific. To address these challenges, we propose a graph neural network (GNN) based framework for approximating node resilience in large complex networks. The proposed framework defines a GNN model that learns the node rank on a small representative subset of nodes . Then, the trained model can be employed to predict the ranks of unseen nodes in similar types of graphs . The scalability of the framework is demonstrated through the prediction of node ranks in real-world graphs . The proposed approach is accurate in approximating the node resilience scores and offers a significant computational advantage over conventional approaches.", "after_revision": "Identifying critical nodes and links in graphs is a crucial task. These nodes/links typically represent critical elements/communication links that play a key role in a system's performance . However, a majority of the methods available in the literature on the identification of critical nodes/links are based on an iterative approach that explores each node/link of a graph at a time, repeating for all nodes/links in the graph. Such methods suffer from high computational complexity and the resulting analysis is also network-specific. To overcome these challenges, this article proposes a scalable and generic graph neural network (GNN) based framework for identifying critical nodes/links in large complex networks. The proposed framework defines a GNN based model that learns the node /link criticality score on a small representative subset of nodes /links. An appropriately trained model can be employed to predict the scores of unseen nodes /links in large graphs and consequently identify the most critical ones . The scalability of the framework is demonstrated through prediction of nodes/links scores in large scale synthetic and real-world networks . The proposed approach is fairly accurate in approximating the criticality scores and offers a significant computational advantage over conventional approaches.", "edit_actions": [{"type": "R", "before": "The emphasis on optimal operations and efficiency has led to increased complexity in engineered systems. This in turn increases the vulnerability of the system", "after": "Identifying critical nodes and links in graphs is a crucial task. These nodes/links typically represent critical elements/communication links that play a key role in a system's performance", "start_char_pos": 0, "end_char_pos": 159}, {"type": "R", "before": "with the increasing frequency of extreme events, resilience has now become an important consideration. Resilience quantifies the ability of the system to absorb and recover from extreme conditions. Graph theory is a widely used framework for modeling complex engineered systems to evaluate their resilience to attacks. Most existing methods in resilience analysis", "after": "a majority of the methods available in the literature on the identification of critical nodes/links", "start_char_pos": 171, "end_char_pos": 534}, {"type": "R", "before": ". These", "after": "at a time, repeating for all nodes/links in the graph. Such", "start_char_pos": 610, "end_char_pos": 617}, {"type": "R", "before": "network specific. To address", "after": "also network-specific. To overcome", "start_char_pos": 698, "end_char_pos": 726}, {"type": "R", "before": "we propose a", "after": "this article proposes a scalable and generic", "start_char_pos": 745, "end_char_pos": 757}, {"type": "R", "before": "approximating node resilience", "after": "identifying critical nodes/links", "start_char_pos": 805, "end_char_pos": 834}, {"type": "A", "before": null, "after": "based", "start_char_pos": 899, "end_char_pos": 899}, {"type": "R", "before": "rank", "after": "/link criticality score", "start_char_pos": 927, "end_char_pos": 931}, {"type": "R", "before": ". Then, the", "after": "/links. An appropriately", "start_char_pos": 974, "end_char_pos": 985}, {"type": "R", "before": "ranks", "after": "scores", "start_char_pos": 1031, "end_char_pos": 1036}, {"type": "R", "before": "in similar types of graphs", "after": "/links in large graphs and consequently identify the most critical ones", "start_char_pos": 1053, "end_char_pos": 1079}, {"type": "R", "before": "the prediction of node ranks in", "after": "prediction of nodes/links scores in large scale synthetic and", "start_char_pos": 1139, "end_char_pos": 1170}, {"type": "R", "before": "graphs", "after": "networks", "start_char_pos": 1182, "end_char_pos": 1188}, {"type": "A", "before": null, "after": "fairly", "start_char_pos": 1216, "end_char_pos": 1216}, {"type": "R", "before": "node resilience", "after": "criticality", "start_char_pos": 1247, "end_char_pos": 1262}], "sents_char_pos": [0, 104, 161, 273, 368, 489, 611, 715, 861, 975, 1081, 1190]}
+{"doc_id": "2012.15859", "revision_depth": "2", "before_revision": "Natural Language Processing (NLP) systems learn harmful societal biases that cause them to widely proliferate inequality as they are deployed in more and more situations. To address and combat this , the NLP community relies on a variety of metrics to identify and quantify bias in black-box modelsand to guide efforts at debiasing . Some of these metrics are intrinsic, and are measured in word embedding spaces, and some are extrinsic, which measure the bias present downstream in the tasks that the word embeddings are plugged into. This research examines whether easy-to-measure intrinsic metrics correlate well to real world extrinsic metrics . We measure both intrinsic and extrinsic bias across hundreds of trained models covering different tasks and experimental conditions and find that there is no reliable correlation between these metrics that holds in all scenarios across tasks and languages. We advise that efforts to debias embedding spaces be always also paired with measurement of downstream model bias, and suggest that that community increase effort into making downstream measurement more feasible via creation of additional challenge sets and annotated test data. We additionally release code, a new intrinsic metric, and an annotated test set for gender bias for hatespeech .", "after_revision": "Natural Language Processing (NLP) systems learn harmful societal biases that cause them to amplify inequality as they are deployed in more and more situations. To guide efforts at debiasing these systems , the NLP community relies on a variety of metrics that quantify bias in models . Some of these metrics are intrinsic, measuring bias in word embedding spaces, and some are extrinsic, measuring bias in downstream tasks that the word embeddings enable. Do these intrinsic and extrinsic metrics correlate with each other? We compare intrinsic and extrinsic metrics across hundreds of trained models covering different tasks and experimental conditions . Our results show no reliable correlation between these metrics that holds in all scenarios across tasks and languages. We urge researchers working on debiasing to focus on extrinsic measures of bias, and to make using these measures more feasible via creation of new challenge sets and annotated test data. To aid this effort, we release code, a new intrinsic metric, and an annotated test set focused on gender bias in hate speech .", "edit_actions": [{"type": "R", "before": "widely proliferate", "after": "amplify", "start_char_pos": 91, "end_char_pos": 109}, {"type": "R", "before": "address and combat this", "after": "guide efforts at debiasing these systems", "start_char_pos": 174, "end_char_pos": 197}, {"type": "R", "before": "to identify and", "after": "that", "start_char_pos": 249, "end_char_pos": 264}, {"type": "R", "before": "black-box modelsand to guide efforts at debiasing", "after": "models", "start_char_pos": 282, "end_char_pos": 331}, {"type": "R", "before": "and are measured", "after": "measuring bias", "start_char_pos": 371, "end_char_pos": 387}, {"type": "R", "before": "which measure the bias present downstream in the", "after": "measuring bias in downstream", "start_char_pos": 438, "end_char_pos": 486}, {"type": "R", "before": "are plugged into. This research examines whether easy-to-measure intrinsic metrics correlate well to real world extrinsic metrics . We measure both", "after": "enable. Do these intrinsic and extrinsic metrics correlate with each other? We compare", "start_char_pos": 518, "end_char_pos": 665}, {"type": "R", "before": "bias", "after": "metrics", "start_char_pos": 690, "end_char_pos": 694}, {"type": "R", "before": "and find that there is", "after": ". Our results show", "start_char_pos": 782, "end_char_pos": 804}, {"type": "R", "before": "advise that efforts to debias embedding spaces be always also paired with measurement of downstream model", "after": "urge researchers working on debiasing to focus on extrinsic measures of", "start_char_pos": 910, "end_char_pos": 1015}, {"type": "R", "before": "suggest that that community increase effort into making downstream measurement", "after": "to make using these measures", "start_char_pos": 1026, "end_char_pos": 1104}, {"type": "R", "before": "additional", "after": "new", "start_char_pos": 1135, "end_char_pos": 1145}, {"type": "R", "before": "We additionally", "after": "To aid this effort, we", "start_char_pos": 1186, "end_char_pos": 1201}, {"type": "R", "before": "for gender bias for hatespeech", "after": "focused on gender bias in hate speech", "start_char_pos": 1266, "end_char_pos": 1296}], "sents_char_pos": [0, 170, 535, 649, 906, 1185]}
+{"doc_id": "2101.00063", "revision_depth": "1", "before_revision": "Deep, heavily overparameterized language models such as BERT, XLNet and T5 have achieved impressive success in many NLP tasks. However, their high model complexity requires enormous computation resources and extremely long training time for both pre-training and fine-tuning. Many works have studied model compression on large NLP models, but only focus on reducing inference cost/time , while still requiring expensive training process. Other works use extremely large batch sizes to shorten the pre-training time at the expense of high demand for computation resources . In this paper, inspired by the Early-Bird Lottery Tickets studied for computer vision tasks, we propose EarlyBERT, a general computationally-efficient training algorithm applicable to both pre-training and fine-tuning of large-scale language models. We are the first to identify structured winning tickets in the early stage of BERT training , and use them for efficient training. Comprehensive pre-training and fine-tuning experiments on GLUE and SQuAD downstream tasks show that EarlyBERT easily achieves comparable performance to standard BERT with 35~45\\% less training time. ", "after_revision": "Heavily overparameterized language models such as BERT, XLNet and T5 have achieved impressive success in many NLP tasks. However, their high model complexity requires enormous computation resources and extremely long training time for both pre-training and fine-tuning. Many works have studied model compression on large NLP models, but only focusing on reducing inference time while still requiring an expensive training process. Other works use extremely large batch sizes to shorten the pre-training time , at the expense of higher computational resource demands . In this paper, inspired by the Early-Bird Lottery Tickets recently studied for computer vision tasks, we propose EarlyBERT, a general computationally-efficient training algorithm applicable to both pre-training and fine-tuning of large-scale language models. By slimming the self-attention and fully-connected sub-layers inside a transformer, we are the first to identify structured winning tickets in the early stage of BERT training . We apply those tickets towards efficient BERT training, and conduct comprehensive pre-training and fine-tuning experiments on GLUE and SQuAD downstream tasks . Our results show that EarlyBERT achieves comparable performance to standard BERT , with 35~45\\% less training time. Code is available at URL", "edit_actions": [{"type": "R", "before": "Deep, heavily", "after": "Heavily", "start_char_pos": 0, "end_char_pos": 13}, {"type": "R", "before": "focus", "after": "focusing", "start_char_pos": 348, "end_char_pos": 353}, {"type": "R", "before": "cost/time ,", "after": "time", "start_char_pos": 376, "end_char_pos": 387}, {"type": "A", "before": null, "after": "an", "start_char_pos": 410, "end_char_pos": 410}, {"type": "A", "before": null, "after": ",", "start_char_pos": 516, "end_char_pos": 516}, {"type": "R", "before": "high demand for computation resources", "after": "higher computational resource demands", "start_char_pos": 535, "end_char_pos": 572}, {"type": "A", "before": null, "after": "recently", "start_char_pos": 633, "end_char_pos": 633}, {"type": "R", "before": "We", "after": "By slimming the self-attention and fully-connected sub-layers inside a transformer, we", "start_char_pos": 826, "end_char_pos": 828}, {"type": "R", "before": ", and use them for efficient training. Comprehensive", "after": ". We apply those tickets towards efficient BERT training, and conduct comprehensive", "start_char_pos": 918, "end_char_pos": 970}, {"type": "A", "before": null, "after": ". Our results", "start_char_pos": 1047, "end_char_pos": 1047}, {"type": "D", "before": "easily", "after": null, "start_char_pos": 1068, "end_char_pos": 1074}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1124, "end_char_pos": 1124}, {"type": "A", "before": null, "after": "Code is available at URL", "start_char_pos": 1158, "end_char_pos": 1158}], "sents_char_pos": [0, 126, 275, 438, 574, 825, 956]}
+{"doc_id": "2101.00124", "revision_depth": "1", "before_revision": "The ability to capture complex linguistic structures and long-term dependencies among words in the passage is essential for many natural language understanding tasks. In relation extraction , dependency trees that contain rich syntactic clues have been widely used to help capture long-term dependencies in text . Graph neural networks (GNNs), one of the means to encode dependency graphs, has been shown effective in several prior works. However, relatively little attention has been paid to the receptive fields of GNNs, which can be crucial in tasks with extremely long text that go beyond single sentences and require discourse analysis . In this work, we leverage the idea of graph pooling and propose the Mirror Graph Convolution Network (MrGCN) , a GNN model with pooling-unpooling structures tailored to relation extraction . The pooling branch reduces the graph size and enables the GCN to obtain larger receptive fields within less layers; the unpooling branch restores the pooled graph to its original resolution such that token-level relation extraction can be performed . Experiments on two datasets demonstrate the effectiveness of our method, showing significant improvements over previous results .", "after_revision": "The ability to capture complex linguistic structures and long-term dependencies among words in the passage is essential for relation extraction (RE) tasks . Graph neural networks (GNNs), one of the means to encode dependency graphs, have been shown to be effective in prior works. However, relatively little attention has been paid to receptive fields of GNNs, which can be crucial for tasks with extremely long text that requires discourse understanding . In this work, we leverage the idea of graph pooling and propose the Mirror Graph Convolution Network , a GNN model with a pooling-unpooling structure tailored to RE tasks . The pooling branch reduces the graph size and enables the GNN to obtain larger receptive fields within fewer layers; the unpooling branch restores the pooled graph to its original resolution for token-level RE tasks . Experiments on two discourse-level relation extraction datasets demonstrate the effectiveness of our method, showing significant improvements over prior methods especially when modeling long-term dependencies is necessary. Moreover, we propose Clause Matching (CM), a novel graph pooling method that merges nodes based on dependency relations in graph. CM can largely reduce the graph size while retaining the main semantics of the input text .", "edit_actions": [{"type": "R", "before": "many natural language understanding tasks. In relation extraction , dependency trees that contain rich syntactic clues have been widely used to help capture long-term dependencies in text", "after": "relation extraction (RE) tasks", "start_char_pos": 124, "end_char_pos": 311}, {"type": "R", "before": "has been shown effective in several", "after": "have been shown to be effective in", "start_char_pos": 390, "end_char_pos": 425}, {"type": "D", "before": "the", "after": null, "start_char_pos": 493, "end_char_pos": 496}, {"type": "R", "before": "in", "after": "for", "start_char_pos": 544, "end_char_pos": 546}, {"type": "R", "before": "go beyond single sentences and require discourse analysis", "after": "requires discourse understanding", "start_char_pos": 583, "end_char_pos": 640}, {"type": "D", "before": "(MrGCN)", "after": null, "start_char_pos": 744, "end_char_pos": 751}, {"type": "A", "before": null, "after": "a", "start_char_pos": 771, "end_char_pos": 771}, {"type": "R", "before": "structures tailored to relation extraction", "after": "structure tailored to RE tasks", "start_char_pos": 790, "end_char_pos": 832}, {"type": "R", "before": "GCN", "after": "GNN", "start_char_pos": 893, "end_char_pos": 896}, {"type": "R", "before": "less", "after": "fewer", "start_char_pos": 938, "end_char_pos": 942}, {"type": "R", "before": "such that", "after": "for", "start_char_pos": 1025, "end_char_pos": 1034}, {"type": "R", "before": "relation extraction can be performed", "after": "RE tasks", "start_char_pos": 1047, "end_char_pos": 1083}, {"type": "A", "before": null, "after": "discourse-level relation extraction", "start_char_pos": 1105, "end_char_pos": 1105}, {"type": "R", "before": "previous results", "after": "prior methods especially when modeling long-term dependencies is necessary. Moreover, we propose Clause Matching (CM), a novel graph pooling method that merges nodes based on dependency relations in graph. CM can largely reduce the graph size while retaining the main semantics of the input text", "start_char_pos": 1198, "end_char_pos": 1214}], "sents_char_pos": [0, 166, 438, 642, 834, 950]}
+{"doc_id": "2101.01005", "revision_depth": "1", "before_revision": "This paper is focused on a rigorous variant of the shear strength reduction method (SSR) and the corresponding determination of safety factors. The SSR-based safety factor is defined as a solution of an optimization problem that is independent of the plastic flow rule and the space discretization. In case of nonassociative plasticity, a modified Davis approach is used . The optimization problem is analyzed and the corresponding duality between the static and kinematic principles is derived. For numerical solution, a regularization method is introduced and a relation between the original and regularized problems is derived. The regularization method is combined with the finite element method, mesh adaptivity and a damped Newton method. In-house codes in Matlab are used for implementation of this solution concept. Two slope stability problems are considered, one of which follows from analysis of a real slope. Softwares Plaxis and Comsol Multiphysics are used for comparison of the results.", "after_revision": "This paper is focused on the definition, analysis and numerical solution of a new optimization variant (OPT) of the shear strength reduction (SSR) problem with applications to slope stability problems. This new variant is derived on the basis of recent results by Tschuchnigg et al. 2015, where limit analysis and a modified Davis approach were used for approximation of the standard SSR method. The OPT-SSR method computes the factor of safety without performing an elasto-plastic analysis, similarly as in limit analysis. It is shown that this optimization problem is well-defined. Next, the duality between the static and kinematic principles of OPT-SSR is derived. For the numerical solution, a regularization method is introduced and analyzed. This method is combined with the finite element method, mesh adaptivity and a damped Newton method. In-house codes (Matlab) are used for the implementation of this solution concept. Finally, two slope stability problems are considered, one of which follows from analysis of a real slope. The softwares packages Plaxis and Comsol Multiphysics are used for comparison of the results.", "edit_actions": [{"type": "R", "before": "a rigorous variant", "after": "the definition, analysis and numerical solution of a new optimization variant (OPT)", "start_char_pos": 25, "end_char_pos": 43}, {"type": "D", "before": "method", "after": null, "start_char_pos": 76, "end_char_pos": 82}, {"type": "R", "before": "and the corresponding determination of safety factors. The SSR-based safety factor is defined as a solution of an optimization problem that is independent of the plastic flow rule and the space discretization. In case of nonassociative plasticity,", "after": "problem with applications to slope stability problems. This new variant is derived on the basis of recent results by Tschuchnigg et al. 2015, where limit analysis and", "start_char_pos": 89, "end_char_pos": 336}, {"type": "R", "before": "is used . The", "after": "were used for approximation of the standard SSR method. The OPT-SSR method computes the factor of safety without performing an elasto-plastic analysis, similarly as in limit analysis. It is shown that this", "start_char_pos": 363, "end_char_pos": 376}, {"type": "R", "before": "analyzed and the corresponding", "after": "well-defined. Next, the", "start_char_pos": 401, "end_char_pos": 431}, {"type": "A", "before": null, "after": "of OPT-SSR", "start_char_pos": 484, "end_char_pos": 484}, {"type": "A", "before": null, "after": "the", "start_char_pos": 501, "end_char_pos": 501}, {"type": "R", "before": "a relation between the original and regularized problems is derived. The regularization", "after": "analyzed. This", "start_char_pos": 564, "end_char_pos": 651}, {"type": "R", "before": "in Matlab", "after": "(Matlab)", "start_char_pos": 762, "end_char_pos": 771}, {"type": "A", "before": null, "after": "the", "start_char_pos": 785, "end_char_pos": 785}, {"type": "R", "before": "Two", "after": "Finally, two", "start_char_pos": 827, "end_char_pos": 830}, {"type": "R", "before": "Softwares", "after": "The softwares packages", "start_char_pos": 924, "end_char_pos": 933}], "sents_char_pos": [0, 143, 298, 372, 496, 632, 746, 826, 923]}
+{"doc_id": "2101.02153", "revision_depth": "1", "before_revision": "How do we decide the fair value of individual classifiers in an ensemble model? We introduce a new class of transferable utility cooperative games to answer this question. The players in ensemble games are pre-trained binary classifiers that collaborate in an ensemble to correctly label points from a dataset. We design Troupe a scalable algorithm that designates payoffs to individual models based on the Shapley value of those in the ensemble game. We show that the approximate Shapley value of classifiers in these games is an adequate measure for selecting a subgroup of highly predictive models . In addition, we introduce the Shapley entropy a new metric to quantify the heterogeneity of machine learning ensembles when it comes to model quality. We analytically prove that our Shapley value approximation algorithm is accurate and scales to large ensembles and big data. Experimental results on graph classification tasks establish that Troupe gives precise estimates of the Shapley value in ensemble games. We demonstrate that the Shapley value can be used for pruning large ensembles, show that complex classifiers have a prime role in correct and incorrect classification decisions, and provide evidence that adversarial models receive a low valuation .", "after_revision": "What is the value of an individual model in an ensemble of binary classifiers? We answer this question by introducing a class of transferable utility cooperative games calledensemble games. In machine learning ensembles, pre-trained models cooperate to make classification decisions. To quantify the importance of models in these ensemble games, we defineTroupe -- an efficient algorithm which allocates payoffs based on approximate Shapley values of the classifiers. We argue that the Shapley value of models in these games is an effective decision metric for choosing a high performing subset of models from the ensemble. Our analytical findings prove that our Shapley value estimation scheme is precise and scalable; its performance increases with size of the dataset and ensemble. Empirical results on real world graph classification tasks demonstrate that our algorithm produces high quality estimates of the Shapley value . We find that Shapley values can be utilized for ensemble pruning, and that adversarial models receive a low valuation . Complex classifiers are frequently found to be responsible for both correct and incorrect classification decisions .", "edit_actions": [{"type": "R", "before": "How do we decide the fair value of individual classifiers", "after": "What is the value of an individual model", "start_char_pos": 0, "end_char_pos": 57}, {"type": "R", "before": "model? We introduce a new", "after": "of binary classifiers? We answer this question by introducing a", "start_char_pos": 73, "end_char_pos": 98}, {"type": "R", "before": "to answer this question. The players in ensemble games are", "after": "called", "start_char_pos": 147, "end_char_pos": 205}, {"type": "A", "before": null, "after": "ensemble games", "start_char_pos": 205, "end_char_pos": 205}, {"type": "A", "before": null, "after": ". In machine learning ensembles,", "start_char_pos": 205, "end_char_pos": 205}, {"type": "R", "before": "binary classifiers that collaborate in an ensemble to correctly label points from a dataset. We design Troupe a scalable algorithm that designates payoffs to individual models based on the Shapley value of those in the ensemble game. We show that the approximate", "after": "models cooperate to make classification decisions. To quantify the importance of models in these ensemble games, we define", "start_char_pos": 218, "end_char_pos": 480}, {"type": "A", "before": null, "after": "Troupe", "start_char_pos": 480, "end_char_pos": 480}, {"type": "A", "before": null, "after": "-- an efficient algorithm which allocates payoffs based on approximate Shapley values of the classifiers. We argue that the", "start_char_pos": 481, "end_char_pos": 481}, {"type": "R", "before": "classifiers", "after": "models", "start_char_pos": 499, "end_char_pos": 510}, {"type": "R", "before": "adequate measure for selecting a subgroup of highly predictive models . In addition, we introduce the Shapley entropy a new metric to quantify the heterogeneity of machine learning ensembles when it comes to model quality. We analytically", "after": "effective decision metric for choosing a high performing subset of models from the ensemble. Our analytical findings", "start_char_pos": 532, "end_char_pos": 770}, {"type": "R", "before": "approximation algorithm is accurate and scales to large ensembles and big data. Experimental results on", "after": "estimation scheme is precise and scalable; its performance increases with size of the dataset and ensemble. Empirical results on real world", "start_char_pos": 800, "end_char_pos": 903}, {"type": "R", "before": "establish that Troupe gives precise", "after": "demonstrate that our algorithm produces high quality", "start_char_pos": 931, "end_char_pos": 966}, {"type": "R", "before": "in ensemble games. We demonstrate that the Shapley value can be used for pruning large ensembles, show that complex classifiers have a prime role in correct and incorrect classification decisions, and provide evidence", "after": ". We find that Shapley values can be utilized for ensemble pruning, and", "start_char_pos": 998, "end_char_pos": 1215}, {"type": "A", "before": null, "after": ". Complex classifiers are frequently found to be responsible for both correct and incorrect classification decisions", "start_char_pos": 1264, "end_char_pos": 1264}], "sents_char_pos": [0, 79, 171, 310, 451, 603, 754, 879, 1016]}
+{"doc_id": "2101.03280", "revision_depth": "1", "before_revision": "Node attributes are ubiquitous in real-world networks, whose fusion with graph topology raises new challenges for the detection and understanding of community structure. Due to their principled characterization and interpretation , probabilistic generative models (PGMs) have become the mainstream methods for community detection in attributed networks. Most existing PGMs require the attributes to be categorical or Gaussian distributed. A novel PGM is proposed here to overcome these limitations. For the generality of our model, we consider the impact of the distances between attributes on node popularity , whose description raises the model selection problem in statistical inference. We present a novel scheme to address this issue by analyzing the detectability of communities for our model , which is also a quantitative description on the effect of node attributes with respect to communities . With the model determined, an efficient algorithm is then developed to estimate the parameters and infer the communities. Extensive experiments have been conducted to validate our work from two aspects. First, the experiments on artificial networks verified the detectability condition for our model . Second, the comparison on various real-world datasets shows that our algorithm outperforms the competitive methods .", "after_revision": "As a fundamental structure in real-world networks, communities can be reflected by abundant node attributes with the fusion of graph topology. In attribute-aware community detection , probabilistic generative models (PGMs) have become the mainstream fusion method due to their principled characterization and interpretation. Here, we propose a novel PGM without imposing any distributional assumptions on attributes, which is superior to existing PGMs that require attributes to be categorical or Gaussian distributed. Based on the famous block model of graph structure, our model fuses the attribute by describing its effect on node popularity using an additional term. To characterize the effect quantitatively, we analyze the detectability of communities for the proposed model and then establish the requirements of the attribute-popularity term, which leads to a new scheme for the model selection problem in attribute-aware community detection . With the model determined, an efficient algorithm is developed to estimate the parameters and to infer the communities. The proposed method is validated from two aspects. First, the effectiveness of our algorithm is theoretically guaranteed by the detectability condition , whose correctness is verified by numerical experiments on artificial graphs . Second, extensive experiments show that our method outperforms the competing approaches on a variety of real-world networks .", "edit_actions": [{"type": "R", "before": "Node attributes are ubiquitous", "after": "As a fundamental structure", "start_char_pos": 0, "end_char_pos": 30}, {"type": "R", "before": "whose fusion with graph topology raises new challenges for the detection and understanding of community structure. Due to their principled characterization and interpretation", "after": "communities can be reflected by abundant node attributes with the fusion of graph topology. In attribute-aware community detection", "start_char_pos": 55, "end_char_pos": 229}, {"type": "R", "before": "methods for community detection in attributed networks. Most existing PGMs require the", "after": "fusion method due to their principled characterization and interpretation. Here, we propose a novel PGM without imposing any distributional assumptions on attributes, which is superior to existing PGMs that require", "start_char_pos": 298, "end_char_pos": 384}, {"type": "R", "before": "A novel PGM is proposed here to overcome these limitations. For the generality of our model, we consider the impact of the distances between attributes", "after": "Based on the famous block model of graph structure, our model fuses the attribute by describing its effect", "start_char_pos": 439, "end_char_pos": 590}, {"type": "R", "before": ", whose description raises the model selection problem in statistical inference. We present a novel scheme to address this issue by analyzing the", "after": "using an additional term. To characterize the effect quantitatively, we analyze the", "start_char_pos": 610, "end_char_pos": 755}, {"type": "R", "before": "our model , which is also a quantitative description on the effect of node attributes with respect to communities", "after": "the proposed model and then establish the requirements of the attribute-popularity term, which leads to a new scheme for the model selection problem in attribute-aware community detection", "start_char_pos": 789, "end_char_pos": 902}, {"type": "D", "before": "then", "after": null, "start_char_pos": 958, "end_char_pos": 962}, {"type": "A", "before": null, "after": "to", "start_char_pos": 1004, "end_char_pos": 1004}, {"type": "R", "before": "Extensive experiments have been conducted to validate our work", "after": "The proposed method is validated", "start_char_pos": 1028, "end_char_pos": 1090}, {"type": "R", "before": "experiments on artificial networks verified", "after": "effectiveness of our algorithm is theoretically guaranteed by", "start_char_pos": 1120, "end_char_pos": 1163}, {"type": "R", "before": "for our model", "after": ", whose correctness is verified by numerical experiments on artificial graphs", "start_char_pos": 1192, "end_char_pos": 1205}, {"type": "R", "before": "the comparison on various", "after": "extensive experiments show that our method outperforms the competing approaches on a variety of", "start_char_pos": 1216, "end_char_pos": 1241}, {"type": "R", "before": "datasets shows that our algorithm outperforms the competitive methods", "after": "networks", "start_char_pos": 1253, "end_char_pos": 1322}], "sents_char_pos": [0, 169, 353, 438, 498, 690, 904, 1027, 1108, 1207]}
+{"doc_id": "2101.04914", "revision_depth": "1", "before_revision": "We revisit the randomized incremental construction of the Trapezoidal Search DAG (TSD) for a set of{\\cal n non-crossing segments, e.g. edges from planar subdivisions. It is well known that this point location structure has {\\cal O}(n) expected size and {\\cal O} (n \\ln n) expected construction time. Our main result is an improved tail bound, with exponential decay, for the size of the TSD: There is a constant such that the probability for a TSD to exceed its expected size by more than this factor is at most 1/e^n.This yields improved bounds on the TSD construction and their maintenance.I.e. TSD construction takes with high probability {\\cal O}( n \\ln n) time and TSD size can be made worst case {\\cal O}(n) with an expected rebuild cost of {\\cal O}( 1). The proposed analysis technique also shows that the expected depth is {\\cal O}( \\ln n ), which partially solves a recent conjecture by\\emph{ [ Hemmer et al. that is used in the CGAL implementation of the TSD [ .", "after_revision": "The Randomized Incremental Construction (RIC) of search DAGs for point location in planar subdivisions, nearest-neighbor search in 2D points, and extreme point search in 3D convex hulls, are well known to take{\\cal O ( n \\log n) expected time for structures of {\\cal O}(n) expected size. Moreover, searching takes w.h.p. {\\cal O} (\\log n) comparisons in the first and w.h.p. {\\cal O}( \\log^2 n) comparisons in the latter two DAGs. However, the expected depth of the DAGs and high probability bounds for their size are unknown. Using a novel analysis technique, we show that the three DAGs have w.h.p. i) a size of {\\cal O}(n) , ii) a depth of {\\cal O}( \\log n), and iii) a construction time of {\\cal O}( n \\log n). One application of these new and improved results are\\emph{remarkably simple Las Vegas verifiers to obtain search DAGs with optimal worst-case bounds. This positively answers the conjectured logarithmic search cost in the DAG of Delaunay triangulations[Guibas et al.; ICALP 1990 and a conjecture on the depth of the DAG of Trapezoidal subdivisions Hemmer et al. ; ESA 2012 . It also shows that history-based RIC circumvents a lower bound on runtime tail estimates of conflict-graph RICs[Sen; STACS 2019 .", "edit_actions": [{"type": "R", "before": "We revisit the randomized incremental construction of the Trapezoidal Search DAG (TSD) for a set of", "after": "The Randomized Incremental Construction (RIC) of search DAGs for point location in planar subdivisions, nearest-neighbor search in 2D points, and extreme point search in 3D convex hulls, are well known to take", "start_char_pos": 0, "end_char_pos": 99}, {"type": "A", "before": null, "after": "O", "start_char_pos": 105, "end_char_pos": 105}, {"type": "A", "before": null, "after": "(", "start_char_pos": 106, "end_char_pos": 106}, {"type": "R", "before": "non-crossing segments, e.g. edges from planar subdivisions. It is well known that this point location structure has", "after": "\\log n) expected time for structures of", "start_char_pos": 109, "end_char_pos": 224}, {"type": "R", "before": "size and", "after": "size. Moreover, searching takes w.h.p.", "start_char_pos": 246, "end_char_pos": 254}, {"type": "R", "before": "(n \\ln n) expected construction time. Our main result is an improved tail bound, with exponential decay, for the size of the TSD: There is a constant such that the probability for a TSD to exceed its expected size by more than this factor is at most 1/e^n.This yields improved bounds on the TSD construction and their maintenance.I.e. TSD construction takes with high probability", "after": "(\\log n) comparisons in the first and w.h.p.", "start_char_pos": 264, "end_char_pos": 643}, {"type": "R", "before": "n \\ln n) time and TSD size can be made worst case", "after": "\\log^2 n) comparisons in the latter two DAGs. However, the expected depth of the DAGs and high probability bounds for their size are unknown. Using a novel analysis technique, we show that the three DAGs have w.h.p. i) a size of", "start_char_pos": 654, "end_char_pos": 703}, {"type": "R", "before": "with an expected rebuild cost", "after": ", ii) a depth", "start_char_pos": 716, "end_char_pos": 745}, {"type": "R", "before": "1). The proposed analysis technique also shows that the expected depth is", "after": "\\log n), and iii) a construction time of", "start_char_pos": 759, "end_char_pos": 832}, {"type": "R", "before": "\\ln n ), which partially solves a recent conjecture by", "after": "n \\log n). One application of these new and improved results are", "start_char_pos": 843, "end_char_pos": 897}, {"type": "A", "before": null, "after": "remarkably simple", "start_char_pos": 903, "end_char_pos": 903}, {"type": "A", "before": null, "after": "Las Vegas verifiers to obtain search DAGs with optimal worst-case bounds. This positively answers the conjectured logarithmic search cost in the DAG of Delaunay triangulations", "start_char_pos": 904, "end_char_pos": 904}, {"type": "A", "before": null, "after": "Guibas et al.; ICALP 1990", "start_char_pos": 905, "end_char_pos": 905}, {"type": "A", "before": null, "after": "and a conjecture on the depth of the DAG of Trapezoidal subdivisions", "start_char_pos": 906, "end_char_pos": 906}, {"type": "R", "before": "that is used in the CGAL implementation of the TSD", "after": "; ESA 2012", "start_char_pos": 921, "end_char_pos": 971}, {"type": "A", "before": null, "after": ". It also shows that history-based RIC circumvents a lower bound on runtime tail estimates of conflict-graph RICs", "start_char_pos": 972, "end_char_pos": 972}, {"type": "A", "before": null, "after": "Sen; STACS 2019", "start_char_pos": 973, "end_char_pos": 973}], "sents_char_pos": [0, 168, 301, 520, 594, 762]}
+{"doc_id": "2101.07395", "revision_depth": "1", "before_revision": "The computation of probability density functions (PDF) using approximate maps (surrogate models) is a building block in such diverse fields as forward uncertainty quantification (UQ), sampling algorithms, learning, and inverse problems. In these settings, the probability measure of interest is induced by an unknown map from a known probability space to the real line, i. e., the measure of interest is a pushforward of another known measure. In computation, we do not know the true map , but only an approximate one. In the field of UQ, the{\\em generalized Polynomial Chaos (gPC) method is widely popular and yields excellent approximations of the map and its moment . But can the pushforward PDF be approximated with spectral accuracy as well? In this paper, we prove the first results of this kind. We provide convergence rates for PDFs using colocation and Galerkin gPC methods in all dimensions , guaranteeing exponential rates for analytic maps . In one dimension, we provide more refined results with stronger convergence rates, as well as an alternative proof strategy based on optimal-transport techniques.", "after_revision": "The estimation of probability density functions (PDF) using approximate maps is a fundamental building block in computational probability. We consider forward problems in uncertainty quantification: the inputs or the parameters of an otherwise deterministic model are random with a known distribution. The scalar quantity of interest is a fixed function of the parameters, and can therefore be considered as a random variable as a well. Often, the quantity of interest map is not explicitly known, and so the computational problem is to find its ``right'' approximation (surrogate model). For the goal of approximating the{\\em moments of the quantity of interest, there is a developed body of research. One widely popular approach is generalized Polynomial Chaos (gPC) and its many variants, which approximate moments with spectral accuracy . But can the PDF of the quantity of interest be approximated with spectral accuracy ? This is not directly implied by spectrally accurate moment estimation. In this paper, we prove convergence rates for PDFs using collocation and Galerkin gPC methods with Legendre polynomials in all dimensions . In particular, exponential convergence of the densities is guaranteed for analytic quantities of interest . In one dimension, we provide more refined results with stronger convergence rates, as well as an alternative proof strategy based on optimal-transport techniques.", "edit_actions": [{"type": "R", "before": "computation", "after": "estimation", "start_char_pos": 4, "end_char_pos": 15}, {"type": "R", "before": "(surrogate models) is a", "after": "is a fundamental", "start_char_pos": 78, "end_char_pos": 101}, {"type": "R", "before": "such diverse fields as forward uncertainty quantification (UQ), sampling algorithms, learning, and inverse problems. In these settings, the probability measure of interest is induced by an unknown map from a known probability space to the real line, i. e., the measure", "after": "computational probability. We consider forward problems in uncertainty quantification: the inputs or the parameters of an otherwise deterministic model are random with a known distribution. The scalar quantity", "start_char_pos": 120, "end_char_pos": 388}, {"type": "R", "before": "pushforward of another known measure. In computation, we do not know the true map , but only an approximate one. In the field of UQ, the", "after": "fixed function of the parameters, and can therefore be considered as a random variable as a well. Often, the quantity of interest map is not explicitly known, and so the computational problem is to find its ``right'' approximation (surrogate model). For the goal of approximating the", "start_char_pos": 406, "end_char_pos": 542}, {"type": "A", "before": null, "after": "moments", "start_char_pos": 547, "end_char_pos": 547}, {"type": "A", "before": null, "after": "of the quantity of interest, there is a developed body of research. One widely popular approach is", "start_char_pos": 548, "end_char_pos": 548}, {"type": "R", "before": "method is widely popular and yields excellent approximations of the map and its moment", "after": "and its many variants, which approximate moments with spectral accuracy", "start_char_pos": 584, "end_char_pos": 670}, {"type": "R", "before": "pushforward PDF", "after": "PDF of the quantity of interest", "start_char_pos": 685, "end_char_pos": 700}, {"type": "R", "before": "as well?", "after": "? This is not directly implied by spectrally accurate moment estimation.", "start_char_pos": 740, "end_char_pos": 748}, {"type": "D", "before": "the first results of this kind. We provide", "after": null, "start_char_pos": 773, "end_char_pos": 815}, {"type": "R", "before": "colocation", "after": "collocation", "start_char_pos": 849, "end_char_pos": 859}, {"type": "A", "before": null, "after": "with Legendre polynomials", "start_char_pos": 885, "end_char_pos": 885}, {"type": "R", "before": ", guaranteeing exponential rates for analytic maps", "after": ". In particular, exponential convergence of the densities is guaranteed for analytic quantities of interest", "start_char_pos": 904, "end_char_pos": 954}], "sents_char_pos": [0, 236, 443, 518, 672, 748, 804, 956]}
+{"doc_id": "2101.07428", "revision_depth": "1", "before_revision": "A highly desirable property of networks is robustness to failures. Consider a metric space (X, d_X ] ), a graph H over X is a \\vartheta-reliable t-spanner if, for every set of failed vertices B\\subset X, there is a superset B^+\\supseteq B such that the induced subgraph H }} [ X\\setminus B ] preserves all the distances between points in X\\setminus B^+ up to a stretch factor t, while the expected size of B^+ is as most (1+\\vartheta)|B|. Such a spanner could withstand a catastrophe: failureof even{\\em 90\\\\%DIF < of the network. Buchin, Har-Peled, and Ol{\\'{a}}h [2019,2020], constructed very sparse reliable spanners with stretch 1+\\epsilon for Euclidean space using locality-sensitive orderings. Har-Peled and Ol{\\'{a}}h [2020] constructed reliable spanners for various non-Euclidean metric spaces using sparse covers. However, this second approach has an inherent dependency on the aspect ratio (a.k.a. spread) and gives sub-optimal stretch and sparsity parameters. Our contribution is twofold: 1) We construct a locality-sensitive ordering for doubling metrics with a small number of orderings. As a corollary, we obtain reliable spanners for doubling metrics matching the sparsity parameters of known reliable spanners for Euclidean space. 2) We introduce new types of locality-sensitive orderings suitable for non-Euclidean metrics and construct such orderings for various metric families. We then construct reliable spanners from the newly introduced locality-sensitive orderings via reliable 2-hop spanners for paths. The number of edges in our spanner has no dependency on the spread.\\end{abstract} %DIF > of the nodes fail. In a follow-up work, Har-Peled, Mendel, and Ol{\\'{a}}h [2021] constructed reliable spanners for general and topologically structured metrics. Their construction used a different approach, and is based on sparse covers. In this paper, we develop the theory of LSO's to non-Euclidean metrics by introducing new types of LSO's suitable for general and topologically structured metrics. We then construct such LSO's, as well as constructing considerably improved LSO's for doubling metrics. Afterwards, we use our new LSO's to construct reliable spanners with improved stretch and sparsity parameters. Most prominently, we construct \\tilde{O}(n)-size reliable spanners for trees and planar graphs with the optimal stretch of 2. Along the way to the construction of LSO's and reliable spanners, we introduce and construct ultrametric covers, and construct 2-hop reliable spanners for the line.", "after_revision": "Chan, Har-Peled, and Jones 2020] recently developed locality-sensitive ordering (LSO ), a new tool that allows one to reduce problems in the Euclidean space \\mathbb{R \\'{a}}h [ 2019,2020 ] used the LSO of Chan{\\em et al. to construct very sparsereliable spanners for the Euclidean space. A highly desirable feature of a reliable spanner is its ability to withstand a massive failure: the network remains functioning even if 90\\\\%DIF < of the network. Buchin, Har-Peled, and Ol{\\'{a}}h [2019,2020], constructed very sparse reliable spanners with stretch 1+\\epsilon for Euclidean space using locality-sensitive orderings. Har-Peled and Ol{\\'{a}}h [2020] constructed reliable spanners for various non-Euclidean metric spaces using sparse covers. However, this second approach has an inherent dependency on the aspect ratio (a.k.a. spread) and gives sub-optimal stretch and sparsity parameters. Our contribution is twofold: 1) We construct a locality-sensitive ordering for doubling metrics with a small number of orderings. As a corollary, we obtain reliable spanners for doubling metrics matching the sparsity parameters of known reliable spanners for Euclidean space. 2) We introduce new types of locality-sensitive orderings suitable for non-Euclidean metrics and construct such orderings for various metric families. We then construct reliable spanners from the newly introduced locality-sensitive orderings via reliable 2-hop spanners for paths. The number of edges in our spanner has no dependency on the spread.\\end{abstract} %DIF > of the nodes fail. In a follow-up work, Har-Peled, Mendel, and Ol{\\'{a}}h [2021] constructed reliable spanners for general and topologically structured metrics. Their construction used a different approach, and is based on sparse covers. In this paper, we develop the theory of LSO's to non-Euclidean metrics by introducing new types of LSO's suitable for general and topologically structured metrics. We then construct such LSO's, as well as constructing considerably improved LSO's for doubling metrics. Afterwards, we use our new LSO's to construct reliable spanners with improved stretch and sparsity parameters. Most prominently, we construct \\tilde{O}(n)-size reliable spanners for trees and planar graphs with the optimal stretch of 2. Along the way to the construction of LSO's and reliable spanners, we introduce and construct ultrametric covers, and construct 2-hop reliable spanners for the line.", "edit_actions": [{"type": "R", "before": "A highly desirable property of networks is robustness to failures. Consider a metric space (X, d_X", "after": "Chan, Har-Peled, and Jones", "start_char_pos": 0, "end_char_pos": 98}, {"type": "A", "before": null, "after": "2020", "start_char_pos": 99, "end_char_pos": 99}, {"type": "A", "before": null, "after": "recently developed locality-sensitive ordering (LSO", "start_char_pos": 101, "end_char_pos": 101}, {"type": "R", "before": "graph H over X is a \\vartheta-reliable t-spanner if, for every set of failed vertices B\\subset X, there is a superset B^+\\supseteq B such that the induced subgraph H", "after": "new tool that allows one to reduce problems in the Euclidean space \\mathbb{R", "start_char_pos": 107, "end_char_pos": 272}, {"type": "A", "before": null, "after": "\\'{a", "start_char_pos": 273, "end_char_pos": 273}, {"type": "A", "before": null, "after": "h", "start_char_pos": 275, "end_char_pos": 275}, {"type": "R", "before": "X\\setminus B", "after": "2019,2020", "start_char_pos": 278, "end_char_pos": 290}, {"type": "R", "before": "preserves all the distances between points in X\\setminus B^+ up to a stretch factor t, while the expected size of B^+ is as most (1+\\vartheta)|B|. Such a spanner could withstand a catastrophe: failureof even", "after": "used the LSO of Chan", "start_char_pos": 293, "end_char_pos": 500}, {"type": "A", "before": null, "after": "et al.", "start_char_pos": 505, "end_char_pos": 505}, {"type": "A", "before": null, "after": "to construct very sparse", "start_char_pos": 506, "end_char_pos": 506}, {"type": "A", "before": null, "after": "reliable spanners", "start_char_pos": 506, "end_char_pos": 506}, {"type": "A", "before": null, "after": "for the Euclidean space. A highly desirable feature of a reliable spanner is its ability to withstand a massive failure: the network remains functioning even if", "start_char_pos": 507, "end_char_pos": 507}], "sents_char_pos": [0, 66, 439, 534, 703, 826, 974, 1104, 1250, 1401, 1531, 1599, 1639, 1781, 1858, 2022, 2126, 2237]}
+{"doc_id": "2101.08750", "revision_depth": "1", "before_revision": "The QAnon conspiracy theory claims that a cabal of (literally) bloodthirsty politicians and media personalities are engaged in a war to destroy society. By interpreting cryptic \"drops\" of information from an anonymous insider calling themselves Q, adherents of the conspiracy theory believe that they are being led by Donald Trump in an active fight against this cabal. QAnon has been covered extensively by the media, as its adherents have been involved in multiple violent acts, including the January 6th, 2021 seditious storming of the US Capitol building. Nevertheless, we still have relatively little understanding of how the theory evolved and was spread on the Web, and the role played in that by multiple platforms. To address this gap, in this paper we study QAnon from the perspective of \"Q\" themself. Specifically, we build a dataset of 4,949 canonical Q drops collected from six \"aggregation sites,\" which curate and archive them from their original posting to anonymous and ephemeral image boards. We expose that these sites have a relatively low (overall) agreement, and thus at least some Q drops should probably be considered apocryphal. We then analyze the contents of the Q dropsthemselves, identifying topics of discussion , as well as finding statistically significant indications that drops were not authored by a single individual. Finally, we look at how posts on Reddit are used to disseminate Q drops to a wider audience . We find that dissemination was ( originally ) limited to a few sub-communities and that, while heavy-handed content moderation decisions have reduced the overall issue, the \"gospel\" of Q persists on Web communities .", "after_revision": "The QAnon conspiracy theory claims that a cabal of (literally) blood-thirsty politicians and media personalities are engaged in a war to destroy society. By interpreting cryptic \"drops\" of information from an anonymous insider calling themself Q, adherents of the conspiracy theory believe that Donald Trump is leading them in an active fight against this cabal. QAnon has been covered extensively by the media, as its adherents have been involved in multiple violent acts, including the January 6th, 2021 seditious storming of the US Capitol building. Nevertheless, we still have relatively little understanding of how the theory evolved and spread on the Web, and the role played in that by multiple platforms. To address this gap, we study QAnon from the perspective of \"Q\" themself. We build a dataset of 4,949 canonical Q drops collected from six \"aggregation sites,\" which curate and archive them from their original posting to anonymous and ephemeral image boards. We expose that these sites have a relatively low (overall) agreement, and thus at least some Q drops should probably be considered apocryphal. We then analyze the Q drops' contents to identify topics of discussion and find statistically significant indications that drops were not authored by a single individual. Finally, we look at how posts on Reddit are used to disseminate Q drops to wider audiences . We find that dissemination was ( initially ) limited to a few sub-communities and that, while heavy-handed moderation decisions have reduced the overall issue, the \"gospel\" of Q persists on the Web .", "edit_actions": [{"type": "R", "before": "bloodthirsty", "after": "blood-thirsty", "start_char_pos": 63, "end_char_pos": 75}, {"type": "R", "before": "themselves", "after": "themself", "start_char_pos": 234, "end_char_pos": 244}, {"type": "R", "before": "they are being led by Donald Trump", "after": "Donald Trump is leading them", "start_char_pos": 296, "end_char_pos": 330}, {"type": "D", "before": "was", "after": null, "start_char_pos": 650, "end_char_pos": 653}, {"type": "D", "before": "in this paper", "after": null, "start_char_pos": 745, "end_char_pos": 758}, {"type": "R", "before": "Specifically, we", "after": "We", "start_char_pos": 812, "end_char_pos": 828}, {"type": "R", "before": "contents of the Q dropsthemselves, identifying", "after": "Q drops' contents to identify", "start_char_pos": 1174, "end_char_pos": 1220}, {"type": "R", "before": ", as well as finding", "after": "and find", "start_char_pos": 1242, "end_char_pos": 1262}, {"type": "R", "before": "a wider audience", "after": "wider audiences", "start_char_pos": 1429, "end_char_pos": 1445}, {"type": "R", "before": "originally", "after": "initially", "start_char_pos": 1481, "end_char_pos": 1491}, {"type": "D", "before": "content", "after": null, "start_char_pos": 1556, "end_char_pos": 1563}, {"type": "R", "before": "Web communities", "after": "the Web", "start_char_pos": 1647, "end_char_pos": 1662}], "sents_char_pos": [0, 152, 369, 559, 723, 811, 1010, 1153, 1353, 1447]}
+{"doc_id": "2101.11300", "revision_depth": "2", "before_revision": "A k-apex graph is a graph with a subset of k vertices, called apices, whose removal makes the graph planar. We present an O(k ^2 n \\log^3 n )-time algorithm that, given a directed k-apex graph G with n vertices, arc capacities, a set of sources S and a set of sinksT, computes a maximum flow from S to T in G . This improves by a factor of k on the fastest algorithm previously known for this problem [ Borradaile et al., FOCS 2012, SICOMP 2017] . Our improvement is achieved by introducing a new variant of the push-relabel algorithm for computing maximum flows. We use our improved algorithm for maximum flow in k-apex graphs , together with additional insights, to obtain an O(k^3 n \\\\textrm{polylog (nC))-time algorithm for computing maximum integer flows in planar graphs with integer arc and vertex capacities bounded by C, and k sources and sinks. This improves by a factor of k^2 over the fastest algorithm previously known for this problem%DIFDELCMD < [%%% Wang, SODA 2019 .", "after_revision": "We give an O(k ^3 n \\polylog(nC) )-time algorithm for computing maximum integer flows in planar graphs with integer arc and vertex capacities bounded by C, and k sources and sinks . This improves by a factor of k ^2 over the fastest algorithm previously known for this problem [ Wang, SODA 2019 . The speedup is obtained by two independent ideas. First we replace an iterative procedure of Wang that uses k invocations of a maximum flow algorithm in a planar graph with k apices Borradaile et al., FOCS 2012, SICOMP 2017] , by an alternative procedure that only makes one invocation of the algorithm of Borradaile et al. Second, we introduce a new variant of the push-relabel algorithm of Goldberg and Tarjan and use it to find a maximum flow in the k-apex graphs \\textrm{ %DIFDELCMD < [%%% that arise in Wang's procedure, faster than the algorithm of Borradaile et al .", "edit_actions": [{"type": "R", "before": "A k-apex graph is a graph with a subset of k vertices, called apices, whose removal makes the graph planar. We present", "after": "We give", "start_char_pos": 0, "end_char_pos": 118}, {"type": "R", "before": "^2 n \\log^3 n", "after": "^3 n \\", "start_char_pos": 126, "end_char_pos": 139}, {"type": "A", "before": null, "after": "polylog", "start_char_pos": 139, "end_char_pos": 139}, {"type": "A", "before": null, "after": "(nC)", "start_char_pos": 139, "end_char_pos": 139}, {"type": "R", "before": "that, given a directed k-apex graph G with n vertices, arc capacities, a set of sources S and a set of sinksT, computes a maximum flow from S to T in G", "after": "for computing maximum integer flows in planar graphs with integer arc and vertex capacities bounded by C, and k sources and sinks", "start_char_pos": 157, "end_char_pos": 308}, {"type": "R", "before": "on", "after": "^2 over", "start_char_pos": 342, "end_char_pos": 344}, {"type": "A", "before": null, "after": "Wang, SODA 2019", "start_char_pos": 403, "end_char_pos": 403}, {"type": "A", "before": null, "after": ". The speedup is obtained by two independent ideas. First we replace an iterative procedure of Wang that uses k invocations of a maximum flow algorithm in a planar graph with k apices", "start_char_pos": 404, "end_char_pos": 404}, {"type": "R", "before": ". Our improvement is achieved by introducing", "after": ", by an alternative procedure that only makes one invocation of the algorithm of Borradaile et al. Second, we introduce", "start_char_pos": 448, "end_char_pos": 492}, {"type": "R", "before": "for computing maximum flows. We use our improved algorithm for", "after": "of Goldberg and Tarjan and use it to find a", "start_char_pos": 537, "end_char_pos": 599}, {"type": "A", "before": null, "after": "the", "start_char_pos": 616, "end_char_pos": 616}, {"type": "D", "before": ", together with additional insights, to obtain an O(k^3 n \\", "after": null, "start_char_pos": 631, "end_char_pos": 690}, {"type": "D", "before": "polylog", "after": null, "start_char_pos": 698, "end_char_pos": 705}, {"type": "D", "before": "(nC))-time algorithm for computing maximum integer flows in planar graphs with integer arc and vertex capacities bounded by C, and k sources and sinks. This improves by a factor of k^2 over the fastest algorithm previously known for this problem", "after": null, "start_char_pos": 706, "end_char_pos": 951}, {"type": "R", "before": "Wang, SODA 2019", "after": "that arise in Wang's procedure, faster than the algorithm of Borradaile et al", "start_char_pos": 969, "end_char_pos": 984}], "sents_char_pos": [0, 107, 449, 565, 857]}
+{"doc_id": "2101.11300", "revision_depth": "3", "before_revision": "We give an O(k^3 n \\polylog ( nC))-time algorithm for computing maximum integer flows in planar graphs with integer arc and vertex {\\em capacities bounded by C, and k sources and sinks. This improves by a factor of k^2 over the fastest algorithm previously known for this problem [Wang, SODA 2019]. The speedup is obtained by two independent ideas. First we replace an iterative procedure of Wang that uses k invocations of a maximum flow algorithm in a planar graph with k apices [Borradaile et al., FOCS 2012, SICOMP 2017], by an alternative procedure that only makes one invocation of the algorithm of Borradaile et al. Second, we introduce a new variant of the push-relabel algorithm of Goldberg and Tarjan and use it to find a maximum flow in the k-apex graphs that arise in Wang's procedure , faster than the algorithm of Borradaile et al .", "after_revision": "We give an O(k^3 n \\log n \\min(k,\\log^2 n) \\log^2( nC))-time algorithm for computing maximum integer flows in planar graphs with integer arc {\\em and vertex capacities bounded by C, and k sources and sinks. This improves by a factor of \\max(k^2,k\\log^2 n) over the fastest algorithm previously known for this problem [Wang, SODA 2019]. The speedup is obtained by two independent ideas. First we replace an iterative procedure of Wang that uses O(k) invocations of an O(k^3 n \\log^3 n)-time algorithm for maximum flow algorithm in a planar graph with k apices [Borradaile et al., FOCS 2012, SICOMP 2017], by an alternative procedure that only makes one invocation of the algorithm of Borradaile et al. Second, we show two alternatives for computing flows in the k-apex graphs that arise in our modification of Wang's procedure faster than the algorithm of Borradaile et al . In doing so, we introduce and analyze a sequential implementation of the parallel highest-distance push-relabel algorithm of Goldberg and Tarjan~ JACM 1988 .", "edit_actions": [{"type": "D", "before": "\\", "after": null, "start_char_pos": 19, "end_char_pos": 20}, {"type": "D", "before": "polylog", "after": null, "start_char_pos": 20, "end_char_pos": 27}, {"type": "R", "before": "(", "after": "\\log n \\min(k,\\log^2 n) \\log^2(", "start_char_pos": 28, "end_char_pos": 29}, {"type": "D", "before": "and vertex", "after": null, "start_char_pos": 120, "end_char_pos": 130}, {"type": "A", "before": null, "after": "and vertex", "start_char_pos": 136, "end_char_pos": 136}, {"type": "R", "before": "k^2", "after": "\\max(k^2,k\\log^2 n)", "start_char_pos": 216, "end_char_pos": 219}, {"type": "R", "before": "k invocations of a", "after": "O(k) invocations of an O(k^3 n \\log^3 n)-time algorithm for", "start_char_pos": 408, "end_char_pos": 426}, {"type": "R", "before": "introduce a new variant of the push-relabel algorithm of Goldberg and Tarjan and use it to find a maximum flow", "after": "show two alternatives for computing flows", "start_char_pos": 635, "end_char_pos": 745}, {"type": "A", "before": null, "after": "our modification of", "start_char_pos": 781, "end_char_pos": 781}, {"type": "D", "before": ",", "after": null, "start_char_pos": 799, "end_char_pos": 800}, {"type": "A", "before": null, "after": ". In doing so, we introduce and analyze a sequential implementation of the parallel highest-distance push-relabel algorithm of Goldberg and Tarjan~", "start_char_pos": 847, "end_char_pos": 847}, {"type": "A", "before": null, "after": "JACM 1988", "start_char_pos": 848, "end_char_pos": 848}], "sents_char_pos": [0, 186, 299, 349, 623]}
+{"doc_id": "2101.12158", "revision_depth": "2", "before_revision": "We study full acyclic join queries with general join predicates that involve conjunctions and disjunctions of inequalities , focusing on ranked enumeration where the answers are returned incrementally in an order dictated by a given ranking function. Our approach offers strong time and space complexity guarantees in the standard RAM model of computation, getting surprisingly close to those of equi-joins. With n denoting the number of tuples in the database, we guarantee that for every value of k, the k top-ranked answers are returned in \\mathcal{O (n polylog n + k k) time and \\mathcal{O n + k) space . This is within a polylogarithmic factor of the best-known guarantee for equi-joins and even \\mathcal{O}(n+k), the time it takes to look at the input and output k answers . The key ingredient is an \\mathcal{O}(n \\operatorname{polylog} n)-size factorized representation of the query output, which is constructed on-the-fly for a given query and database. As a side benefit, our techniques are also applicable to unranked enumeration (where answers can be returned in any order) for joins with inequalities, returning k answers in \\mathcal{O(n }%DIFDELCMD < \\operatorname{polylog} %%% n + k). This guarantee improves over the state of the art for large values of k. In an experimental study , we show that our ranked-enumeration approach is not only theoretically interesting, but also fast and memory-efficient in practice .", "after_revision": "We study theta-joins in general and join predicates with conjunctions and disjunctions of inequalities in particular , focusing on ranked enumeration where the answers are returned incrementally in an order dictated by a given ranking function. Our approach achieves strong time and space complexity properties: with n denoting the number of tuples in the database, we guarantee for acyclic full join queries with inequality conditions that for every value of k, the k top-ranked answers are returned in O (n polylog n + k \\log k) time . This is within a polylogarithmic factor of the best known complexity for equi-joins and even of \\mathcal{O}(n+k), the time it takes to look at the input and return k answers in any order. Our guarantees extend to join queries with selections and many types of projections, such as the so-called free-connex queries. Remarkably, they hold even when the entire output is of size n^\\ell for a join of \\ell relations. The key ingredient is a novel \\mathcal{O}(n \\operatorname{polylog} n)-size factorized representation of the query output, which is constructed on-the-fly for a given query and database. (n }%DIFDELCMD < \\operatorname{polylog} %%% In addition to providing the first non-trivial theoretical guarantees beyond equi-joins, we show in an experimental study that our ranked-enumeration approach is also memory-efficient and fast in practice, beating the running time of state-of-the-art database systems by orders of magnitude .", "edit_actions": [{"type": "R", "before": "full acyclic join queries with general join predicates that involve", "after": "theta-joins in general and join predicates with", "start_char_pos": 9, "end_char_pos": 76}, {"type": "A", "before": null, "after": "in particular", "start_char_pos": 123, "end_char_pos": 123}, {"type": "R", "before": "offers", "after": "achieves", "start_char_pos": 265, "end_char_pos": 271}, {"type": "R", "before": "guarantees in the standard RAM model of computation, getting surprisingly close to those of equi-joins. With", "after": "properties: with", "start_char_pos": 305, "end_char_pos": 413}, {"type": "A", "before": null, "after": "for acyclic full join queries with inequality conditions", "start_char_pos": 476, "end_char_pos": 476}, {"type": "R", "before": "\\mathcal{O", "after": "O", "start_char_pos": 545, "end_char_pos": 555}, {"type": "A", "before": null, "after": "\\log", "start_char_pos": 573, "end_char_pos": 573}, {"type": "D", "before": "and \\mathcal{O", "after": null, "start_char_pos": 582, "end_char_pos": 596}, {"type": "D", "before": "n + k) space", "after": null, "start_char_pos": 597, "end_char_pos": 609}, {"type": "R", "before": "best-known guarantee", "after": "best known complexity", "start_char_pos": 659, "end_char_pos": 679}, {"type": "A", "before": null, "after": "of", "start_char_pos": 704, "end_char_pos": 704}, {"type": "R", "before": "output k answers .", "after": "return k answers in any order. Our guarantees extend to join queries with selections and many types of projections, such as the so-called free-connex queries. Remarkably, they hold even when the entire output is of size n^\\ell for a join of \\ell relations.", "start_char_pos": 766, "end_char_pos": 784}, {"type": "R", "before": "an", "after": "a novel", "start_char_pos": 807, "end_char_pos": 809}, {"type": "D", "before": "As a side benefit, our techniques are also applicable to unranked enumeration (where answers can be returned in any order) for joins with inequalities, returning k answers in \\mathcal{O", "after": null, "start_char_pos": 966, "end_char_pos": 1151}, {"type": "R", "before": "n + k). This guarantee improves over the state of the art for large values of k. In", "after": "In addition to providing the first non-trivial theoretical guarantees beyond equi-joins, we show in", "start_char_pos": 1195, "end_char_pos": 1278}, {"type": "D", "before": ", we show", "after": null, "start_char_pos": 1301, "end_char_pos": 1310}, {"type": "R", "before": "not only theoretically interesting, but also fast and", "after": "also", "start_char_pos": 1351, "end_char_pos": 1404}, {"type": "R", "before": "in practice", "after": "and fast in practice, beating the running time of state-of-the-art database systems by orders of magnitude", "start_char_pos": 1422, "end_char_pos": 1433}], "sents_char_pos": [0, 251, 408, 611, 784, 965, 1202, 1275]}
+{"doc_id": "2101.12262", "revision_depth": "1", "before_revision": "A new class of measures of bivariate tail dependence is proposed, which is defined as a limit of a measure of concordance of the underlying copula restricted to the tail region of interest. The proposed tail dependence measures include tail dependence coefficients as special cases, but capture the extremal relationship between random variables not only along the diagonal but also along all the angles weighted by the so-called tail generating measure. As a result, the proposed tail dependence measures overcome the issue that the tail dependence coefficients underestimate the extent of extreme co-movements. We also consider the so-called maximal and minimal tail dependence measures , defined as the maximum and minimum of the tail dependence measures among all tail generating measures for a given copula. It turns out that the minimal tail dependence measure coincides with the tail dependence coefficient, and the maximal tail dependencemeasure overestimates the degree of extreme co-movements. We investigate properties, representations and examples of the proposed tail dependence measures , and their performance is demonstrated in a series of numerical experiments. For fair assessment of tail dependence and stability of estimation under small sample size, we support the use of tail dependence measures weighted over all angles compared with maximal and minimal ones .", "after_revision": "A new class of measures of bivariate tail dependence called tail concordance measures (TCMs) is proposed, which is defined as the limit of a measure of concordance of the underlying copula restricted to the tail region of interest. TCMs captures the extremal relationship between random variables not only along the diagonal but also along all angles weighted by a tail generating measure. Axioms of tail dependence measures are introduced, and TCMs are shown to characterize linear tail dependence measures . The infimum and supremum of TCMs over all generating measures are considered to investigate the issue of under- and overestimation of the degree of extreme co-movements. The infimum is shown to be attained by the classical tail dependence coefficient, and thus the classical notion always underestimates the degree of tail dependence. A formula for the supremum TCM is derived and shown to overestimate the degree of extreme co-movements. Estimators of the proposed measures are studied , and their performance is demonstrated in numerical experiments. For a fair assessment of tail dependence and stability of the estimation under small sample sizes, TCMs weighted over all angles are suggested, with tail Spearman's rho and tail Gini's gamma being interesting novel special cases of TCMs .", "edit_actions": [{"type": "A", "before": null, "after": "called tail concordance measures (TCMs)", "start_char_pos": 53, "end_char_pos": 53}, {"type": "R", "before": "a", "after": "the", "start_char_pos": 87, "end_char_pos": 88}, {"type": "R", "before": "The proposed tail dependence measures include tail dependence coefficients as special cases, but capture", "after": "TCMs captures", "start_char_pos": 191, "end_char_pos": 295}, {"type": "D", "before": "the", "after": null, "start_char_pos": 394, "end_char_pos": 397}, {"type": "R", "before": "the so-called", "after": "a", "start_char_pos": 417, "end_char_pos": 430}, {"type": "R", "before": "As a result, the proposed tail dependence measures overcome the issue that the tail dependence coefficients underestimate the extent of extreme co-movements. We also consider the so-called maximal and minimal", "after": "Axioms of", "start_char_pos": 456, "end_char_pos": 664}, {"type": "R", "before": ", defined as the maximum and minimum of the", "after": "are introduced, and TCMs are shown to characterize linear", "start_char_pos": 690, "end_char_pos": 733}, {"type": "R", "before": "among all tail generating measures for a given copula. It turns out that the minimal tail dependence measure coincides with the tail dependence", "after": ". The infimum and supremum of TCMs over all generating measures are considered to investigate the issue of under- and overestimation of the degree of extreme co-movements. The infimum is shown to be attained by the classical tail dependence", "start_char_pos": 759, "end_char_pos": 902}, {"type": "R", "before": "the maximal tail dependencemeasure overestimates the", "after": "thus the classical notion always underestimates the degree of tail dependence. A formula for the supremum TCM is derived and shown to overestimate the", "start_char_pos": 920, "end_char_pos": 972}, {"type": "R", "before": "We investigate properties, representations and examples", "after": "Estimators", "start_char_pos": 1005, "end_char_pos": 1060}, {"type": "R", "before": "tail dependence measures", "after": "measures are studied", "start_char_pos": 1077, "end_char_pos": 1101}, {"type": "D", "before": "a series of", "after": null, "start_char_pos": 1145, "end_char_pos": 1156}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1184, "end_char_pos": 1184}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1237, "end_char_pos": 1237}, {"type": "R", "before": "size, we support the use of tail dependence measures", "after": "sizes, TCMs", "start_char_pos": 1268, "end_char_pos": 1320}, {"type": "R", "before": "compared with maximal and minimal ones", "after": "are suggested, with tail Spearman's rho and tail Gini's gamma being interesting novel special cases of TCMs", "start_char_pos": 1346, "end_char_pos": 1384}], "sents_char_pos": [0, 190, 455, 613, 813, 1004, 1179]}
+{"doc_id": "2102.00247", "revision_depth": "2", "before_revision": "In this work, a robust and efficient text-to-speech system, named Triple M , is proposed for large-scale online application. The key components of Triple M are: 1) A seq2seq model with multi-guidance attention which obtains stable feature generation and robust long sentence synthesis ability by learning from the guidance attention mechanisms . Multi-guidance attention improves the robustness and naturalness of long sentence synthesis without any in-domain performance loss or online service modification. Compared with the our best result obtained by using single attention mechanism (GMM-based attention ), the word error rate of long sentence synthesis decreases by 23.5\\%when multi-guidance attention mechanism is applied . 2) A efficient multi-band multi-time LPCNet , which reduces the computational complexity of LPCNet through combining multi-band and multi-time strategies ( from 2.8 to 1.0 GFLOP ). Due to these strategies, the vocoder speed is increased by 2.75x on a single CPU without much MOS degradatiaon (4.57 vs. 4.45) .", "after_revision": "In this work, a robust and efficient text-to-speech (TTS) synthesis system named Triple M is proposed for large-scale online application. The key components of Triple M are: 1) A sequence-to-sequence model adopts a novel multi-guidance attention to transfer complementary advantages from guiding attention mechanisms to the basic attention mechanism without in-domain performance loss and online service modification. Compared with single attention mechanism , multi-guidance attention not only brings better naturalness to long sentence synthesis, but also reduces the word error rate by 26.8\\% . 2) A new efficient multi-band multi-time vocoder framework , which reduces the computational complexity from 2.8 to 1.0 GFLOP and speeds up LPCNet by 2.75x on a single CPU .", "edit_actions": [{"type": "R", "before": "system,", "after": "(TTS) synthesis system", "start_char_pos": 52, "end_char_pos": 59}, {"type": "D", "before": ",", "after": null, "start_char_pos": 75, "end_char_pos": 76}, {"type": "R", "before": "seq2seq model with", "after": "sequence-to-sequence model adopts a novel", "start_char_pos": 166, "end_char_pos": 184}, {"type": "R", "before": "which obtains stable feature generation and robust long sentence synthesis ability by learning from the guidance attention mechanisms . Multi-guidance attention improves the robustness and naturalness of long sentence synthesis without any", "after": "to transfer complementary advantages from guiding attention mechanisms to the basic attention mechanism without", "start_char_pos": 210, "end_char_pos": 449}, {"type": "R", "before": "or", "after": "and", "start_char_pos": 477, "end_char_pos": 479}, {"type": "D", "before": "the our best result obtained by using", "after": null, "start_char_pos": 523, "end_char_pos": 560}, {"type": "R", "before": "(GMM-based attention ),", "after": ", multi-guidance attention not only brings better naturalness to long sentence synthesis, but also reduces", "start_char_pos": 588, "end_char_pos": 611}, {"type": "R", "before": "of long sentence synthesis decreases by 23.5\\%when multi-guidance attention mechanism is applied", "after": "by 26.8\\%", "start_char_pos": 632, "end_char_pos": 728}, {"type": "A", "before": null, "after": "new", "start_char_pos": 736, "end_char_pos": 736}, {"type": "R", "before": "LPCNet", "after": "vocoder framework", "start_char_pos": 769, "end_char_pos": 775}, {"type": "D", "before": "of LPCNet through combining multi-band and multi-time strategies (", "after": null, "start_char_pos": 821, "end_char_pos": 887}, {"type": "R", "before": "). Due to these strategies, the vocoder speed is increased", "after": "and speeds up LPCNet", "start_char_pos": 910, "end_char_pos": 968}, {"type": "D", "before": "without much MOS degradatiaon (4.57 vs. 4.45)", "after": null, "start_char_pos": 994, "end_char_pos": 1039}], "sents_char_pos": [0, 124, 508, 912]}
+{"doc_id": "2102.01909", "revision_depth": "1", "before_revision": "The use of Bidirectional Encoder Representations from Transformers (BERT) models for different natural language processing (NLP) tasks, and for sentiment analysis in particular, has become very popular in recent years and not in vain. The use of social media is being constantly on the rise. Its impact on all areas of our lives is almost inconceivable. Researches show that social media nowadays serves as one of the main tools where people freely express their ideas, opinions, and emotions. During the current Covid-19 pandemic, the role of social media as a tool to resonate opinions and emotions, became even more prominent. This paper introduces HeBERT and HebEMO. HeBERT is a transformer-based model for modern Hebrew text . Hebrew is considered a Morphological Rich Language (MRL) , with unique characteristics that pose a great challenge in developing appropriate Hebrew NLP models . Analyzing multiple specifications of the BERT architecture, we come up with a language model that outperforms all existing Hebrew alternatives on multiple language tasks. HebEMO is a tool that uses HeBERT to detect polarity and extract emotions from Hebrew user-generated content (UGC), which was trained on a unique Covid-19 related dataset that we collected and annotated for this study. Data collection and annotation followed an innovative iterative semi-supervised process that aimed to maximize predictability. HebEMO yielded a high performance of weighted average F1-score = 0.96 for polarity classification. Emotion detection reached an F1-score of 0.78-0.97 , with the exception of \\textit{surprise , which the model failed to capture (F1 = 0.41). These results are better than the best-reported performance, even when compared to the English language .", "after_revision": " This paper introduces HeBERT and HebEMO. HeBERT is a Transformer-based model for modern Hebrew text , which relies on a BERT (Bidirectional Encoder Representations for Transformers) architecture. BERT has been shown to outperform alternative architectures in sentiment analysis, and is suggested to be particularly appropriate for MRLs . Analyzing multiple BERT specifications, we find that while model complexity correlates with high performance on language tasks that aim to understand terms in a sentence, a more-parsimonious model better captures the sentiment of entire sentence. Either way, out BERT-based language model outperforms all existing Hebrew alternatives on all common language tasks. HebEMO is a tool that uses HeBERT to detect polarity and extract emotions from Hebrew UGC. HebEMO is trained on a unique Covid-19-related UGC dataset that we collected and annotated for this study. Data collection and annotation followed an active learning procedure that aimed to maximize predictability. We show that HebEMO yields a high F1-score of 0.96 for polarity classification. Emotion detection reaches F1-scores of 0.78-0.97 for various target emotions , with the exception of \\textit{surprise , which the model failed to capture (F1 = 0.41). These results are better than the best-reported performance, even among English-language models of emotion detection .", "edit_actions": [{"type": "D", "before": "The use of Bidirectional Encoder Representations from Transformers (BERT) models for different natural language processing (NLP) tasks, and for sentiment analysis in particular, has become very popular in recent years and not in vain. The use of social media is being constantly on the rise. Its impact on all areas of our lives is almost inconceivable. Researches show that social media nowadays serves as one of the main tools where people freely express their ideas, opinions, and emotions. During the current Covid-19 pandemic, the role of social media as a tool to resonate opinions and emotions, became even more prominent.", "after": null, "start_char_pos": 0, "end_char_pos": 629}, {"type": "R", "before": "transformer-based", "after": "Transformer-based", "start_char_pos": 683, "end_char_pos": 700}, {"type": "R", "before": ". Hebrew is considered a Morphological Rich Language (MRL) , with unique characteristics that pose a great challenge in developing appropriate Hebrew NLP models", "after": ", which relies on a BERT (Bidirectional Encoder Representations for Transformers) architecture. BERT has been shown to outperform alternative architectures in sentiment analysis, and is suggested to be particularly appropriate for MRLs", "start_char_pos": 730, "end_char_pos": 890}, {"type": "R", "before": "specifications of the BERT architecture, we come up with a language model that", "after": "BERT specifications, we find that while model complexity correlates with high performance on language tasks that aim to understand terms in a sentence, a more-parsimonious model better captures the sentiment of entire sentence. Either way, out BERT-based language model", "start_char_pos": 912, "end_char_pos": 990}, {"type": "R", "before": "multiple", "after": "all common", "start_char_pos": 1039, "end_char_pos": 1047}, {"type": "R", "before": "user-generated content (UGC), which was", "after": "UGC. HebEMO is", "start_char_pos": 1150, "end_char_pos": 1189}, {"type": "R", "before": "Covid-19 related", "after": "Covid-19-related UGC", "start_char_pos": 1210, "end_char_pos": 1226}, {"type": "R", "before": "innovative iterative semi-supervised process", "after": "active learning procedure", "start_char_pos": 1326, "end_char_pos": 1370}, {"type": "R", "before": "HebEMO yielded a high performance of weighted average", "after": "We show that HebEMO yields a high", "start_char_pos": 1410, "end_char_pos": 1463}, {"type": "R", "before": "=", "after": "of", "start_char_pos": 1473, "end_char_pos": 1474}, {"type": "R", "before": "reached an F1-score", "after": "reaches F1-scores", "start_char_pos": 1527, "end_char_pos": 1546}, {"type": "A", "before": null, "after": "for various target emotions", "start_char_pos": 1560, "end_char_pos": 1560}, {"type": "R", "before": "surprise", "after": "surprise", "start_char_pos": 1593, "end_char_pos": 1601}, {"type": "R", "before": "when compared to the English language", "after": "among English-language models of emotion detection", "start_char_pos": 1717, "end_char_pos": 1754}], "sents_char_pos": [0, 234, 291, 353, 493, 629, 670, 731, 1063, 1282, 1409, 1508, 1650]}
+{"doc_id": "2102.02959", "revision_depth": "1", "before_revision": "To develop a high throughput multi-label annotator for body Computed Tomography (CT) reports that can be applied to a variety of URLans, and cases. First, we used a dictionary approach to develop a rule-based algorithm (RBA) for extraction of disease labels from radiology text reports. We targeted URLan systems (lungs/pleura, liver/gallbladder, kidneys/ureters) with four diseases per system based on their prevalence in our dataset. To expand the algorithm beyond pre-defined keywords, an attention-guided recurrent neural network (RNN) was trained using the RBA-extracted labels to classify the reports as being positive for one or more diseases or normal for URLan system. Confounding effects on model performance were evaluated using random or pre-trained embedding as well as different sizes of training datasets. Performance was evaluated using the receiver operating characteristic (ROC) area under the curve (AUC) against 2,158 manually obtained labels. Our model extracted disease labels from 261,229 radiology reports of 112,501 unique subjects. Pre-trained models outperformed random embedding across all diseases. As the training dataset size was reduced, performance was robust except for a few diseases with relatively small number of cases. Pre-trained Classification AUCs achieved > 0.95 for all five disease outcomes across all URLan systems. Our label-extracting pipeline was able to encompass a variety of cases and diseases by generalizing beyond strict rules with exceptional accuracy. As a framework, this model can be easily adapted to enable automated labeling of hospital-scale medical data sets for training image-based disease classifiers.", "after_revision": "Purpose: To develop high throughput multi-label annotators for body (chest, abdomen, and pelvis) Computed Tomography (CT) reports that can be applied across a variety of URLans, and disease states. Approach: We used a dictionary approach to develop rule-based algorithms (RBA) for extraction of disease labels from radiology text reports. We targeted URLan systems (lungs/pleura, liver/gallbladder, kidneys/ureters) with four diseases per system based on their prevalence in our dataset. To expand the algorithms beyond pre-defined keywords, attention-guided recurrent neural networks (RNN) were trained using the RBA-extracted labels to classify reports as being positive for one or more diseases or normal for URLan system. Confounding effects on model performance were evaluated using random initialization or pre-trained embedding as well as different sizes of training datasets. Performance was evaluated using the receiver operating characteristic (ROC) area under the curve (AUC) against 2,158 manually obtained labels. Results: Our models extracted disease labels from 261,229 radiology reports of 112,501 unique subjects. Pre-trained models outperformed random initialization across all diseases. As the training dataset size was reduced, performance was robust except for a few diseases with relatively small number of cases. Pre-trained classification AUCs achieved > 0.95 for all five disease outcomes across all URLan systems. Conclusions: Our label-extracting pipeline was able to encompass a variety of cases and diseases by generalizing beyond strict rules with exceptional accuracy. This method can be easily adapted to enable automated labeling of hospital-scale medical data sets for training image-based disease classifiers.", "edit_actions": [{"type": "R", "before": "To develop a", "after": "Purpose: To develop", "start_char_pos": 0, "end_char_pos": 12}, {"type": "R", "before": "annotator for body", "after": "annotators for body (chest, abdomen, and pelvis)", "start_char_pos": 41, "end_char_pos": 59}, {"type": "R", "before": "to", "after": "across", "start_char_pos": 113, "end_char_pos": 115}, {"type": "R", "before": "cases. First, we", "after": "disease states. Approach: We", "start_char_pos": 141, "end_char_pos": 157}, {"type": "D", "before": "a", "after": null, "start_char_pos": 196, "end_char_pos": 197}, {"type": "R", "before": "algorithm", "after": "algorithms", "start_char_pos": 209, "end_char_pos": 218}, {"type": "R", "before": "algorithm", "after": "algorithms", "start_char_pos": 450, "end_char_pos": 459}, {"type": "D", "before": "an", "after": null, "start_char_pos": 489, "end_char_pos": 491}, {"type": "R", "before": "network", "after": "networks", "start_char_pos": 526, "end_char_pos": 533}, {"type": "R", "before": "was", "after": "were", "start_char_pos": 540, "end_char_pos": 543}, {"type": "D", "before": "the", "after": null, "start_char_pos": 595, "end_char_pos": 598}, {"type": "A", "before": null, "after": "initialization", "start_char_pos": 747, "end_char_pos": 747}, {"type": "R", "before": "Our model", "after": "Results: Our models", "start_char_pos": 965, "end_char_pos": 974}, {"type": "R", "before": "embedding", "after": "initialization", "start_char_pos": 1098, "end_char_pos": 1107}, {"type": "R", "before": "Classification", "after": "classification", "start_char_pos": 1271, "end_char_pos": 1285}, {"type": "A", "before": null, "after": "Conclusions:", "start_char_pos": 1363, "end_char_pos": 1363}, {"type": "R", "before": "As a framework, this model", "after": "This method", "start_char_pos": 1511, "end_char_pos": 1537}], "sents_char_pos": [0, 147, 286, 435, 677, 821, 964, 1058, 1128, 1258, 1362, 1510]}
+{"doc_id": "2102.04882", "revision_depth": "1", "before_revision": "Face masks have been widely used as a protective measure against COVID-19. However, pre-pandemic experimental studies have produced mixed results regarding their effectiveness against respiratory viruses , leading to confusion over whether masks protect the wearer, or only those with whom the wearer interacts . Such confusion may have contributed URLanizations such as the WHO and CDC initially not recommending that the general public wear masks. Here , we show that studies that did not find surgical masks to be effective were under-powered to such an extent that even if masks were 100\\% effective, the studies in question would still have been unlikely to find a statistically significant effect. Thus, such studies should not be interpreted as providing evidence against masks. We also provide a framework for understanding the effect of masks on the probability of infection for single and repeated exposures. The framework demonstrates that the impact of wearing a mask more frequently compounds super-linearly , as can the impact of both the susceptible and infected individual wearing a mask. This work shows that current research is consistent with recommendations for using masks at a population level in regions in which there is transmission of COVID-19, and that nonlinear effects and statistical considerations regarding the percentage of exposures for which the mask is worn must be taken into account when designing empirical studies and interpreting their results.", "after_revision": "Face masks have been widely used as a protective measure against COVID-19. However, pre-pandemic empirical studies have produced mixed statistical results on the effectiveness of masks against respiratory viruses . The implications of the studies' recognized limitations have not been quantitatively and statistically analyzed , leading to confusion regarding the effectiveness of masks . Such confusion may have contributed URLanizations such as the WHO and CDC initially not recommending that the general public wear masks. Here we show that when the adherence to mask-usage guidelines is taken into account, the empirical evidence indicates that masks prevent disease transmission: all studies we analyzed that did not find surgical masks to be effective were under-powered to such an extent that even if masks were 100\\% effective, the studies in question would still have been unlikely to find a statistically significant effect. We also provide a framework for understanding the effect of masks on the probability of infection for single and repeated exposures. The framework demonstrates that more frequently wearing a mask provides super-linearly compounding protection, as does both the susceptible and infected individual wearing a mask. This work shows (1) that both theoretical and empirical evidence is consistent with masks protecting against respiratory infections and (2) that nonlinear effects and statistical considerations regarding the percentage of exposures for which masks are worn must be taken into account when designing empirical studies and interpreting their results.", "edit_actions": [{"type": "R", "before": "experimental", "after": "empirical", "start_char_pos": 97, "end_char_pos": 109}, {"type": "R", "before": "results regarding their effectiveness", "after": "statistical results on the effectiveness of masks", "start_char_pos": 138, "end_char_pos": 175}, {"type": "A", "before": null, "after": ". The implications of the studies' recognized limitations have not been quantitatively and statistically analyzed", "start_char_pos": 204, "end_char_pos": 204}, {"type": "R", "before": "over whether masks protect the wearer, or only those with whom the wearer interacts", "after": "regarding the effectiveness of masks", "start_char_pos": 228, "end_char_pos": 311}, {"type": "D", "before": ",", "after": null, "start_char_pos": 456, "end_char_pos": 457}, {"type": "R", "before": "studies", "after": "when the adherence to mask-usage guidelines is taken into account, the empirical evidence indicates that masks prevent disease transmission: all studies we analyzed", "start_char_pos": 471, "end_char_pos": 478}, {"type": "D", "before": "Thus, such studies should not be interpreted as providing evidence against masks.", "after": null, "start_char_pos": 705, "end_char_pos": 786}, {"type": "R", "before": "the impact of", "after": "more frequently", "start_char_pos": 952, "end_char_pos": 965}, {"type": "R", "before": "more frequently compounds", "after": "provides", "start_char_pos": 981, "end_char_pos": 1006}, {"type": "R", "before": ", as can the impact of", "after": "compounding protection, as does", "start_char_pos": 1022, "end_char_pos": 1044}, {"type": "R", "before": "that current research", "after": "(1) that both theoretical and empirical evidence", "start_char_pos": 1122, "end_char_pos": 1143}, {"type": "R", "before": "recommendations for using masks at a population level in regions in which there is transmission of COVID-19, and", "after": "masks protecting against respiratory infections and (2)", "start_char_pos": 1163, "end_char_pos": 1275}, {"type": "R", "before": "the mask is", "after": "masks are", "start_char_pos": 1378, "end_char_pos": 1389}], "sents_char_pos": [0, 74, 313, 450, 704, 786, 919, 1105]}
+{"doc_id": "2102.05633", "revision_depth": "1", "before_revision": "In order for a robot to explore an unknown environment autonomously , it must account for uncertainty in sensor measurements, hazard assessment, localization, and motion execution. Making decisions for maximal reward in a stochastic setting requires learning values and constructing policies over a belief space, i.e., probability distribution of the robot-world state. Value learning over belief spaces suffer from computational challenges in high-dimensional spaces, such as large spatial environments and long temporal horizons for exploration. At the same time, it should be adaptive and resilient to disturbances at run time in order to ensure the robot's safety, as required in many real-world applications . This work proposes a scalable value learning framework, PLGRIM (Probabilistic Local and Global Reasoning on Information roadMaps), that bridges the gap between (i) local, risk-aware resiliency and (ii) global, reward-seeking mission objectives. By leveraging hierarchical belief space planners with information-rich graph structures, PLGRIM can address large-scale exploration problems while providing locally near-optimal coverage plans. PLGRIM is a step toward enabling belief space planners on physical robots operating in unknown and complex environments. We validate our proposed framework with a high-fidelity dynamic simulation in diverse environments and with physical hardware, Boston Dynamics' Spot robot, in a lava tube .", "after_revision": "In order for an autonomous robot to efficiently explore an unknown environment , it must account for uncertainty in sensor measurements, hazard assessment, localization, and motion execution. Making decisions for maximal reward in a stochastic setting requires value learning and policy construction over a belief space, i.e., probability distribution over all possible robot-world states. However, belief space planning in a large spatial environment over long temporal horizons suffers from severe computational challenges. Moreover, constructed policies must safely adapt to unexpected changes in the belief at runtime . This work proposes a scalable value learning framework, PLGRIM (Probabilistic Local and Global Reasoning on Information roadMaps), that bridges the gap between (i) local, risk-aware resiliency and (ii) global, reward-seeking mission objectives. Leveraging hierarchical belief space planners with information-rich graph structures, PLGRIM addresses large-scale exploration problems while providing locally near-optimal coverage plans. We validate our proposed framework with high-fidelity dynamic simulations in diverse environments and on physical robots in Martian-analog lava tubes .", "edit_actions": [{"type": "R", "before": "a robot to", "after": "an autonomous robot to efficiently", "start_char_pos": 13, "end_char_pos": 23}, {"type": "D", "before": "autonomously", "after": null, "start_char_pos": 55, "end_char_pos": 67}, {"type": "R", "before": "learning values and constructing policies", "after": "value learning and policy construction", "start_char_pos": 250, "end_char_pos": 291}, {"type": "R", "before": "of the", "after": "over all possible", "start_char_pos": 344, "end_char_pos": 350}, {"type": "R", "before": "state. Value learning over belief spaces suffer from computational challenges in high-dimensional spaces, such as large spatial environments and", "after": "states. However, belief space planning in a large spatial environment over", "start_char_pos": 363, "end_char_pos": 507}, {"type": "R", "before": "for exploration. At the same time, it should be adaptive and resilient to disturbances at run time in order to ensure the robot's safety, as required in many real-world applications", "after": "suffers from severe computational challenges. Moreover, constructed policies must safely adapt to unexpected changes in the belief at runtime", "start_char_pos": 531, "end_char_pos": 712}, {"type": "R", "before": "By leveraging", "after": "Leveraging", "start_char_pos": 960, "end_char_pos": 973}, {"type": "R", "before": "can address", "after": "addresses", "start_char_pos": 1056, "end_char_pos": 1067}, {"type": "D", "before": "PLGRIM is a step toward enabling belief space planners on physical robots operating in unknown and complex environments.", "after": null, "start_char_pos": 1154, "end_char_pos": 1274}, {"type": "D", "before": "a", "after": null, "start_char_pos": 1315, "end_char_pos": 1316}, {"type": "R", "before": "simulation", "after": "simulations", "start_char_pos": 1339, "end_char_pos": 1349}, {"type": "R", "before": "with physical hardware, Boston Dynamics' Spot robot, in a lava tube", "after": "on physical robots in Martian-analog lava tubes", "start_char_pos": 1378, "end_char_pos": 1445}], "sents_char_pos": [0, 180, 369, 547, 714, 959, 1153, 1274]}
+{"doc_id": "2102.10754", "revision_depth": "1", "before_revision": "Kirigami, the art of paper cutting, has become the subject of study in mechanical metamaterials in recent years. The basic building blocks of any kirigami structures are repetitive deployable patterns , the design of which has to date largely relied on inspirations from art, nature, and intuition, embedded in a choice of the underlying pattern symmetry . Here we complement these approaches by clarifying some of the connections between kirigami patterns and symmetry in terms of the wallpaper groups, the set of seventeen plane symmetry groups that fully characterize the space of periodic tilings of the plane. We start by showing that deployable kirigami patterns in any of the seventeen wallpaper groupscan be constructed , and then design symmetry-preserving cut patterns that can be effectively applied for achieving arbitrary size change throughout deployment. We further prove that different symmetry changes can be achieved by controlling the shape and connectivity of the tiles . Finally, we connect these results using the underlying lattice structures of the kirigami patterns . All together, our work provides a systematic approach for creating deployable structures with any prescribed size and symmetry properties , thereby paving the way for the design of a wide range of metamaterials by harnessing kirigami .", "after_revision": "Kirigami, the art of paper cutting, has become a paradigm for mechanical metamaterials in recent years. The basic building blocks of any kirigami structures are repetitive deployable patterns that derive inspiration from geometric art forms and simple planar tilings . Here we complement these approaches by directly linking kirigami patterns to the symmetry associated with the set of seventeen repeating patterns that fully characterize the space of periodic tilings of the plane. We start by showing how to construct deployable kirigami patterns using any of the wallpaper groups , and then design symmetry-preserving cut patterns to achieve arbitrary size changes via deployment. We further prove that different symmetry changes can be achieved by controlling the shape and connectivity of the tiles and connect these results to the underlying kirigami-based lattice structures . All together, our work provides a systematic approach for creating a broad range of kirigami-based deployable structures with any prescribed size and symmetry properties .", "edit_actions": [{"type": "R", "before": "the subject of study in", "after": "a paradigm for", "start_char_pos": 47, "end_char_pos": 70}, {"type": "R", "before": ", the design of which has to date largely relied on inspirations from art, nature, and intuition, embedded in a choice of the underlying pattern symmetry", "after": "that derive inspiration from geometric art forms and simple planar tilings", "start_char_pos": 201, "end_char_pos": 354}, {"type": "R", "before": "clarifying some of the connections between kirigami patterns and symmetry in terms of the wallpaper groups, the", "after": "directly linking kirigami patterns to the symmetry associated with the", "start_char_pos": 396, "end_char_pos": 507}, {"type": "R", "before": "plane symmetry groups", "after": "repeating patterns", "start_char_pos": 525, "end_char_pos": 546}, {"type": "R", "before": "that", "after": "how to construct", "start_char_pos": 635, "end_char_pos": 639}, {"type": "R", "before": "in", "after": "using", "start_char_pos": 669, "end_char_pos": 671}, {"type": "R", "before": "seventeen wallpaper groupscan be constructed", "after": "wallpaper groups", "start_char_pos": 683, "end_char_pos": 727}, {"type": "R", "before": "that can be effectively applied for achieving arbitrary size change throughout", "after": "to achieve arbitrary size changes via", "start_char_pos": 779, "end_char_pos": 857}, {"type": "R", "before": ". Finally, we", "after": "and", "start_char_pos": 990, "end_char_pos": 1003}, {"type": "R", "before": "using the underlying lattice structures of the kirigami patterns", "after": "to the underlying kirigami-based lattice structures", "start_char_pos": 1026, "end_char_pos": 1090}, {"type": "A", "before": null, "after": "a broad range of kirigami-based", "start_char_pos": 1160, "end_char_pos": 1160}, {"type": "D", "before": ", thereby paving the way for the design of a wide range of metamaterials by harnessing kirigami", "after": null, "start_char_pos": 1232, "end_char_pos": 1327}], "sents_char_pos": [0, 112, 356, 614, 869, 991, 1092]}
+{"doc_id": "2102.12220", "revision_depth": "1", "before_revision": "This work deals with error models for trident quaternion framework proposed in the companion paper \"A Trident Quaternion Framework for Inertial-based Navigation Part I: Motion Representation and Computation\" and further uses them to investigate the static and in-motion alignment for land vehicles. Specifically, the zero-velocity and odometer velocity measurements are applied in the static and in-motion alignment process, respectively. By linearizing the trident quaternion kinematic equation, the right and left trident quaternion error models are obtained . The resultant models are found to be equivalent to those derived from profound group affine. Then the two models are used to design the corresponding extended Kalman filters (EKF), namely, the left-quaternion EKF (LQEKF) and the right-quaternion EKF (RQEKF). Simulations and field tests are conducted to evaluate their actual performances. For the static alignment, owing to their high consistency, the L/RQEKF converge much faster than the EKF even without any heading information . For the in-motion alignment, however, the two filters still need the assistance of the analytical / optimization-based in-motion alignment methods at the very start to avoid extremely large attitude errors, although they possess much larger convergence region than the traditional EKF does .", "after_revision": "This work deals with error models for trident quaternion framework proposed in the companion paper (Part I) and further uses them to investigate the odometer-aided static/ in-motion inertial navigation attitude alignment for land vehicles. By linearizing the trident quaternion kinematic equation, the left and right trident quaternion error models are obtained , which are found to be equivalent to those derived from profound group affine. The two error models are used to design their corresponding extended Kalman filters (EKF), namely, the left-quaternion EKF (LQEKF) and the right-quaternion EKF (RQEKF). Simulations and field tests are conducted to evaluate their actual performances. Owing to the high estimation consistency, the L/RQEKF converge much faster in the static alignment than the traditional error model-based EKF, even under arbitrary large heading initialization . For the in-motion alignment, the L / RQEKF possess much larger convergence region than the traditional EKF does , although they still require the aid of attitude initialization so as to avoid large initial attitude errors .", "edit_actions": [{"type": "R", "before": "\"A Trident Quaternion Framework for Inertial-based Navigation Part I: Motion Representation and Computation\" and", "after": "(Part I) and", "start_char_pos": 99, "end_char_pos": 211}, {"type": "R", "before": "static and", "after": "odometer-aided static/", "start_char_pos": 249, "end_char_pos": 259}, {"type": "A", "before": null, "after": "inertial navigation attitude", "start_char_pos": 270, "end_char_pos": 270}, {"type": "D", "before": "Specifically, the zero-velocity and odometer velocity measurements are applied in the static and in-motion alignment process, respectively.", "after": null, "start_char_pos": 300, "end_char_pos": 439}, {"type": "R", "before": "right and left", "after": "left and right", "start_char_pos": 502, "end_char_pos": 516}, {"type": "R", "before": ". The resultant models", "after": ", which", "start_char_pos": 562, "end_char_pos": 584}, {"type": "R", "before": "Then the two", "after": "The two error", "start_char_pos": 657, "end_char_pos": 669}, {"type": "R", "before": "the", "after": "their", "start_char_pos": 696, "end_char_pos": 699}, {"type": "R", "before": "For the static alignment, owing to their high", "after": "Owing to the high estimation", "start_char_pos": 904, "end_char_pos": 949}, {"type": "R", "before": "than the EKF even without any heading information", "after": "in the static alignment than the traditional error model-based EKF, even under arbitrary large heading initialization", "start_char_pos": 996, "end_char_pos": 1045}, {"type": "R", "before": "however, the two filters still need the assistance of the analytical", "after": "the L", "start_char_pos": 1077, "end_char_pos": 1145}, {"type": "R", "before": "optimization-based in-motion alignment methods at the very start to avoid extremely large attitude errors, although they", "after": "RQEKF", "start_char_pos": 1148, "end_char_pos": 1268}, {"type": "A", "before": null, "after": ", although they still require the aid of attitude initialization so as to avoid large initial attitude errors", "start_char_pos": 1338, "end_char_pos": 1338}], "sents_char_pos": [0, 299, 439, 563, 656, 822, 903, 1047]}
+{"doc_id": "2102.13202", "revision_depth": "1", "before_revision": "To balance exploration and exploitation, multi-armed bandit algorithms need to conduct inference on the true mean reward of each arm in every time step using the data collected so far . However, the history of arms and rewards observed up to that time step is adaptively collected and there are known challenges in conducting inference with non-iid data . In particular, sample averages, which play a prominent role in traditional upper confidence bound algorithms and traditional Thompson sampling algorithms, are neither unbiased nor asymptotically normal. We propose a variant of a Thompson sampling based algorithm that leverages recent advances in the causal inference literature and adaptively re-weighs the terms of a doubly robust estimator on the true mean reward of each arm -- hence its name doubly-adaptive Thompson sampling. The regret of the proposed algorithm matches the optimal (minimax) regret rate and its empirical evaluation in a semi-synthetic experiment based on data from a randomized control trial of a web service is performed: we see that the proposed doubly-adaptive Thompson sampling has superior empirical performance to existing baselines in terms of cumulative regret and statistical power in identifying the best arm. Further, we extend this approach to contextual bandits, where there are more sources of bias present apart from the adaptive data collection -- such as the mismatch between the true data generating process and the reward model assumptions or the unequal representations of certain regions of the context space in initial stages of learning -- and propose the linear contextual doubly-adaptive Thompson sampling and the non-parametric contextual doubly-adaptive Thompson sampling extensions of our approach .", "after_revision": "During online decision making in Multi-Armed Bandits (MAB), one needs to conduct inference on the true mean reward of each arm based on data collected so far at each step . However, since the arms are adaptively selected--thereby yielding non-iid data--conducting inference accurately is not straightforward . In particular, sample averaging, which is used in the family of UCB and Thompson sampling (TS) algorithms, does not provide a good choice as it suffers from bias and a lack of good statistical properties (e.g. asymptotic normality). Our thesis in this paper is that more sophisticated inference schemes that take into account the adaptive nature of the sequentially collected data can unlock further performance gains, even though both UCB and TS type algorithms are optimal in the worst case. In particular, we propose a variant of TS-style algorithms--which we call doubly adaptive TS--that leverages recent advances in causal inference and adaptively reweights the terms of a doubly robust estimator on the true mean reward of each arm . Through 20 synthetic domain experiments and a semi-synthetic experiment based on data from an A/B test of a web service , we demonstrate that using an adaptive inferential scheme (while still retaining the exploration efficacy of TS) provides clear benefits in online decision making: the proposed DATS algorithm has superior empirical performance to existing baselines (UCB and TS) in terms of regret and sample complexity in identifying the best arm. In addition, we also provide a finite-time regret bound of doubly adaptive TS that matches (up to log factors) those of UCB and TS algorithms, thereby establishing that its improved practical benefits do not come at the expense of worst-case suboptimality .", "edit_actions": [{"type": "R", "before": "To balance exploration and exploitation, multi-armed bandit algorithms need", "after": "During online decision making in Multi-Armed Bandits (MAB), one needs", "start_char_pos": 0, "end_char_pos": 75}, {"type": "R", "before": "in every time step using the", "after": "based on", "start_char_pos": 133, "end_char_pos": 161}, {"type": "A", "before": null, "after": "at each step", "start_char_pos": 184, "end_char_pos": 184}, {"type": "R", "before": "the history of arms and rewards observed up to that time step is adaptively collected and there are known challenges in conducting inference with", "after": "since the arms are adaptively selected--thereby yielding", "start_char_pos": 196, "end_char_pos": 341}, {"type": "R", "before": "data", "after": "data--conducting inference accurately is not straightforward", "start_char_pos": 350, "end_char_pos": 354}, {"type": "R", "before": "averages, which play a prominent role in traditional upper confidence bound algorithms and traditional Thompson sampling algorithms, are neither unbiased nor asymptotically normal. We", "after": "averaging, which is used in the family of UCB and Thompson sampling (TS) algorithms, does not provide a good choice as it suffers from bias and a lack of good statistical properties (e.g. asymptotic normality). Our thesis in this paper is that more sophisticated inference schemes that take into account the adaptive nature of the sequentially collected data can unlock further performance gains, even though both UCB and TS type algorithms are optimal in the worst case. In particular, we", "start_char_pos": 379, "end_char_pos": 562}, {"type": "R", "before": "a Thompson sampling based algorithm that", "after": "TS-style algorithms--which we call doubly adaptive TS--that", "start_char_pos": 584, "end_char_pos": 624}, {"type": "R", "before": "the causal inference literature and adaptively re-weighs", "after": "causal inference and adaptively reweights", "start_char_pos": 654, "end_char_pos": 710}, {"type": "R", "before": "-- hence its name doubly-adaptive Thompson sampling. The regret of the proposed algorithm matches the optimal (minimax) regret rate and its empirical evaluation in", "after": ". Through 20 synthetic domain experiments and", "start_char_pos": 786, "end_char_pos": 949}, {"type": "R", "before": "a randomized control trial", "after": "an A/B test", "start_char_pos": 997, "end_char_pos": 1023}, {"type": "R", "before": "is performed: we see that the proposed doubly-adaptive Thompson sampling", "after": ", we demonstrate that using an adaptive inferential scheme (while still retaining the exploration efficacy of TS) provides clear benefits in online decision making: the proposed DATS algorithm", "start_char_pos": 1041, "end_char_pos": 1113}, {"type": "A", "before": null, "after": "(UCB and TS)", "start_char_pos": 1171, "end_char_pos": 1171}, {"type": "R", "before": "cumulative regret and statistical power", "after": "regret and sample complexity", "start_char_pos": 1184, "end_char_pos": 1223}, {"type": "R", "before": "Further, we extend this approach to contextual bandits, where there are more sources of bias present apart from the adaptive data collection -- such as the mismatch between the true data generating process and the reward model assumptions or the unequal representations of certain regions of the context space in initial stages of learning -- and propose the linear contextual doubly-adaptive Thompson sampling and the non-parametric contextual doubly-adaptive Thompson sampling extensions of our approach", "after": "In addition, we also provide a finite-time regret bound of doubly adaptive TS that matches (up to log factors) those of UCB and TS algorithms, thereby establishing that its improved practical benefits do not come at the expense of worst-case suboptimality", "start_char_pos": 1253, "end_char_pos": 1758}], "sents_char_pos": [0, 356, 559, 838, 1252, 1395]}
+{"doc_id": "2103.00293", "revision_depth": "1", "before_revision": "The collection and annotation of task-oriented conversational data is a costlyand time-consuming manner. Many augmentation techniques have been proposed to improve the performance of state-of-the-art (SOTA) systems in new domains that lack the necessary amount of data for training. However, these augmentation techniques (e.g. paraphrasing) also require some mediocre amount of data since they use learning-based approaches. This makes using SOTA systems in emerging low-resource domains infeasible. We, to tackle this problem, introduce a framework , that creates synthetic task-oriented dialogues in a fully automatic manner, which operates with input sizes of as small as a few dialogues . Our framework uses the simple idea that each turn-pair in a task-oriented dialogue has a certain function and exploits this idea to mix them creating new dialogues . We evaluate our framework within a low-resource setting by integrating it with a SOTA model TRADE in the dialogue state tracking task and observe significant improvements in the fine-tuning scenarios in several domains . We conclude that this end-to-end dialogue augmentation framework can be a crucial tool for natural language understanding performance in emerging task-oriented dialogue domains.", "after_revision": "As the creation of task-oriented conversational data is costly, data augmentation techniques have been proposed to create synthetic data to improve model performance in new domains . Up to now, these learning-based techniques (e.g. paraphrasing) still require a moderate amount of data , making application to low-resource settings infeasible. To tackle this problem, we introduce an augmentation framework that creates synthetic task-oriented dialogues , operating with as few as 5 shots . Our framework utilizes belief state annotations to define dialogue functions of each turn pair. It then creates templates of pairs through de-lexicalization, where the dialogue function codifies the allowable incoming and outgoing links of each template. To generate new dialogues, our framework composes allowable adjacent templates in a bottom-up manner . We evaluate our framework using TRADE as the base DST model, observing significant improvements in the fine-tuning scenarios within a low-resource setting . We conclude that this end-to-end dialogue augmentation framework can be a practical tool for natural language understanding performance in emerging task-oriented dialogue domains.", "edit_actions": [{"type": "R", "before": "The collection and annotation", "after": "As the creation", "start_char_pos": 0, "end_char_pos": 29}, {"type": "R", "before": "a costlyand time-consuming manner. Many", "after": "costly, data", "start_char_pos": 70, "end_char_pos": 109}, {"type": "R", "before": "improve the performance of state-of-the-art (SOTA) systems", "after": "create synthetic data to improve model performance", "start_char_pos": 156, "end_char_pos": 214}, {"type": "R", "before": "that lack the necessary amount of data for training. However, these augmentation", "after": ". Up to now, these learning-based", "start_char_pos": 230, "end_char_pos": 310}, {"type": "R", "before": "also require some mediocre", "after": "still require a moderate", "start_char_pos": 342, "end_char_pos": 368}, {"type": "R", "before": "since they use learning-based approaches. This makes using SOTA systems in emerging", "after": ", making application to", "start_char_pos": 384, "end_char_pos": 467}, {"type": "R", "before": "domains infeasible. We, to", "after": "settings infeasible. To", "start_char_pos": 481, "end_char_pos": 507}, {"type": "R", "before": "introduce a framework ,", "after": "we introduce an augmentation framework", "start_char_pos": 529, "end_char_pos": 552}, {"type": "R", "before": "in a fully automatic manner, which operates with input sizes of as small as a few dialogues", "after": ", operating with as few as 5 shots", "start_char_pos": 600, "end_char_pos": 691}, {"type": "R", "before": "uses the simple idea that each turn-pair in a task-oriented dialogue has a certain function and exploits this idea to mix them creating new dialogues", "after": "utilizes belief state annotations to define dialogue functions of each turn pair. It then creates templates of pairs through de-lexicalization, where the dialogue function codifies the allowable incoming and outgoing links of each template. To generate new dialogues, our framework composes allowable adjacent templates in a bottom-up manner", "start_char_pos": 708, "end_char_pos": 857}, {"type": "R", "before": "within a low-resource setting by integrating it with a SOTA model TRADE in the dialogue state tracking task and observe", "after": "using TRADE as the base DST model, observing", "start_char_pos": 886, "end_char_pos": 1005}, {"type": "R", "before": "in several domains", "after": "within a low-resource setting", "start_char_pos": 1060, "end_char_pos": 1078}, {"type": "R", "before": "crucial", "after": "practical", "start_char_pos": 1155, "end_char_pos": 1162}], "sents_char_pos": [0, 104, 282, 425, 500, 693, 859, 1080]}
+{"doc_id": "2103.02152", "revision_depth": "1", "before_revision": "The vanilla convolutional neural network (CNN) is vulnerable to images with small variations (e.g. corrupted and adversarial samples). One of the possible reasons is that CNN pays more attention to the most discriminative regions, but ignores the auxiliary features , leading to the lack of feature diversity . In our method, we propose to dynamically suppress significant activation values of vanilla CNN by group-wise inhibition, but not fix or randomly handle them when training. Then, the feature maps with different activation distribution are processed separately due to the independence of features. Vanilla CNN is finally guided to learn more rich discriminative features hierarchically for robust classification according to proposed regularization. The proposed method is able to achieve a significant gain of robustness over 15\\% comparing with the state-of-the-art. We also show that the proposed regularization method complements other defense paradigms, such as adversarial training, to further improve the robustness .", "after_revision": "The convolutional neural network (CNN) is vulnerable to degraded images with even very small variations (e.g. corrupted and adversarial samples). One of the possible reasons is that CNN pays more attention to the most discriminative regions, but ignores the auxiliary features when learning , leading to the lack of feature diversity for final judgment . In our method, we propose to dynamically suppress significant activation values of CNN by group-wise inhibition, but not fixedly or randomly handle them when training. The feature maps with different activation distribution are then processed separately to take the feature independence into account. CNN is finally guided to learn richer discriminative features hierarchically for robust classification according to the proposed regularization. Our method is comprehensively evaluated under multiple settings, including classification against corruptions, adversarial attacks and low data regime. Extensive experimental results show that the proposed method can achieve significant improvements in terms of both robustness and generalization performances, when compared with the state-of-the-art methods .", "edit_actions": [{"type": "D", "before": "vanilla", "after": null, "start_char_pos": 4, "end_char_pos": 11}, {"type": "R", "before": "images with", "after": "degraded images with even very", "start_char_pos": 64, "end_char_pos": 75}, {"type": "A", "before": null, "after": "when learning", "start_char_pos": 266, "end_char_pos": 266}, {"type": "A", "before": null, "after": "for final judgment", "start_char_pos": 310, "end_char_pos": 310}, {"type": "D", "before": "vanilla", "after": null, "start_char_pos": 396, "end_char_pos": 403}, {"type": "R", "before": "fix", "after": "fixedly", "start_char_pos": 442, "end_char_pos": 445}, {"type": "R", "before": "Then, the", "after": "The", "start_char_pos": 485, "end_char_pos": 494}, {"type": "R", "before": "processed separately due to the independence of features. Vanilla", "after": "then processed separately to take the feature independence into account.", "start_char_pos": 551, "end_char_pos": 616}, {"type": "R", "before": "more rich", "after": "richer", "start_char_pos": 648, "end_char_pos": 657}, {"type": "A", "before": null, "after": "the", "start_char_pos": 736, "end_char_pos": 736}, {"type": "R", "before": "The proposed method is able to achieve a significant gain of robustness over 15\\% comparing with the state-of-the-art. We also", "after": "Our method is comprehensively evaluated under multiple settings, including classification against corruptions, adversarial attacks and low data regime. Extensive experimental results", "start_char_pos": 762, "end_char_pos": 888}, {"type": "R", "before": "regularization method complements other defense paradigms, such as adversarial training, to further improve the robustness", "after": "method can achieve significant improvements in terms of both robustness and generalization performances, when compared with the state-of-the-art methods", "start_char_pos": 912, "end_char_pos": 1034}], "sents_char_pos": [0, 134, 312, 484, 608, 761, 880]}
+{"doc_id": "2103.02760", "revision_depth": "1", "before_revision": "Autonomous vehicles rely heavily upon their perception subsystems to see the environment in which they operate. Unfortunately, the effect of varying weather conditions presents a significant challenge to object detection algorithms, and thus it is imperative to test the vehicle extensively in all conditions which it may experience. However, unpredictable weather can make real-world testing in adverse conditions an expensive and time consuming task requiring access to specialist facilities , and weatherproofing of sensitive electronics. Simulation provides an alternative to real world testing, with some studies developing increasingly visually realistic representations of the real world on powerful compute hardware. Given that subsequent subsystems in the autonomous vehicle pipeline are unaware of the visual realism of the simulation, when developing modules downstream of perception the appearance is of little consequence - rather it is how the perception system performs in the prevailing weather condition that is important . This study explores the potential of using a simple, lightweight image augmentation system in an autonomous racing vehicle - focusing not on visual accuracy, but rather the effect upon perception system performance . With minimal adjustment, the prototype system developed in this study can replicate the effects of both water droplets on the camera lens, and fading light conditions. The system introduces a latency of less than 8 ms using compute hardware that is well suited to being carried in the vehicle - rendering it ideally suited to real-time implementation that can be run during experiments in simulation, and augmented reality testing in the real world.", "after_revision": "Autonomous vehicles rely heavily upon their perception subsystems to see the environment in which they operate. Unfortunately, the effect of variable weather conditions presents a significant challenge to object detection algorithms, and thus it is imperative to test the vehicle extensively in all conditions which it may experience. However, development of robust autonomous vehicle subsystems requires repeatable, controlled testing - while real weather is unpredictable and cannot be scheduled. Real-world testing in adverse conditions is an expensive and time-consuming task, often requiring access to specialist facilities . Simulation is commonly relied upon as a substitute, with increasingly visually realistic representations of the real-world being developed. In the context of the complete autonomous vehicle control pipeline, subsystems downstream of perception need to be tested with accurate recreations of the perception system output, rather than focusing on subjective visual realism of the input - whether in simulation or the real world . This study develops the untapped potential of a lightweight weather augmentation method in an autonomous racing vehicle - focusing not on visual accuracy, but rather the effect upon perception subsystem performance in real time . With minimal adjustment, the prototype developed in this study can replicate the effects of water droplets on the camera lens, and fading light conditions. This approach introduces a latency of less than 8 ms using compute hardware well suited to being carried in the vehicle - rendering it ideal for real-time implementation that can be run during experiments in simulation, and augmented reality testing in the real world.", "edit_actions": [{"type": "R", "before": "varying", "after": "variable", "start_char_pos": 141, "end_char_pos": 148}, {"type": "R", "before": "unpredictable weather can make real-world", "after": "development of robust autonomous vehicle subsystems requires repeatable, controlled testing - while real weather is unpredictable and cannot be scheduled. Real-world", "start_char_pos": 343, "end_char_pos": 384}, {"type": "A", "before": null, "after": "is", "start_char_pos": 415, "end_char_pos": 415}, {"type": "R", "before": "time consuming task", "after": "time-consuming task, often", "start_char_pos": 433, "end_char_pos": 452}, {"type": "R", "before": ", and weatherproofing of sensitive electronics. Simulation provides an alternative to real world testing, with some studies developing", "after": ". Simulation is commonly relied upon as a substitute, with", "start_char_pos": 495, "end_char_pos": 629}, {"type": "R", "before": "real world on powerful compute hardware. Given that subsequent subsystems in the autonomous vehicle pipeline are unaware of the visual realism of the simulation, when developing modules", "after": "real-world being developed. In the context of the complete autonomous vehicle control pipeline, subsystems", "start_char_pos": 685, "end_char_pos": 870}, {"type": "R", "before": "the appearance is of little consequence - rather it is how", "after": "need to be tested with accurate recreations of", "start_char_pos": 896, "end_char_pos": 954}, {"type": "R", "before": "performs in the prevailing weather condition that is important", "after": "output, rather than focusing on subjective visual realism of the input - whether in simulation or the real world", "start_char_pos": 977, "end_char_pos": 1039}, {"type": "R", "before": "explores the potential of using a simple, lightweight image augmentation system", "after": "develops the untapped potential of a lightweight weather augmentation method", "start_char_pos": 1053, "end_char_pos": 1132}, {"type": "R", "before": "system performance", "after": "subsystem performance in real time", "start_char_pos": 1238, "end_char_pos": 1256}, {"type": "D", "before": "system", "after": null, "start_char_pos": 1298, "end_char_pos": 1304}, {"type": "D", "before": "both", "after": null, "start_char_pos": 1358, "end_char_pos": 1362}, {"type": "R", "before": "The system", "after": "This approach", "start_char_pos": 1427, "end_char_pos": 1437}, {"type": "D", "before": "that is", "after": null, "start_char_pos": 1500, "end_char_pos": 1507}, {"type": "R", "before": "ideally suited to", "after": "ideal for", "start_char_pos": 1567, "end_char_pos": 1584}], "sents_char_pos": [0, 111, 333, 542, 725, 1041, 1258, 1426]}
+{"doc_id": "2103.03398", "revision_depth": "1", "before_revision": "Since the 1950s, citation impact has been the dominant metric by which science is quantitatively evaluated. But research contributions play distinct roles in the unfolding drama of scientific debate, agreement and advance, and institutions may value different kinds of advances . Computational power, access to citation data and an array of modeling techniques have given rise to a widening portfolio of metrics to extract different signals regarding their contribution. Here we unpack the complex, temporally evolving relationship between citation impact alongside novelty and disruption, two emerging measures that capture the degree to which science not only influences, but transforms later work. Novelty captures how research draws upon unusual combinations of prior work. Disruption captures how research comes to eclipse the prior work on which it builds , becoming recognized as a new scientific direction. We demonstrate that : 1) novel papers disrupt existing theories and expand the scientific frontier; 2) novel papers are more likely to become \"sleeping beauties\" and accumulate citation impact over the long run ; 3) novelty can be reformulated as distance in journal embedding spaces to map the moving frontier of science . The evolution of embedding spaces over time reveals how yesterday's novelty forms today's scientific conventions, which condition the novelty--and surprise--of tomorrow's breakthroughs.", "after_revision": "Since the 1950s, citation number or \"impact\" has been the dominant metric by which science is quantitatively evaluated. But research contributions play distinct roles in the unfolding drama of scientific debate, agreement and advance, which are differentially valued by scientists and their institutions . Computational power, access to citation data and an array of modeling techniques have given rise to a widening portfolio of metrics that extract different signals regarding their contribution. Here we unpack the complex, temporally evolving relationship between citation impact alongside novelty and disruption, two emerging measures that capture the degree to which science not only influences, but transforms later work. Novelty is measured at the point of production and captures how research draws upon unusual combinations of prior work. Disruption is measured over time and captures how research comes to eclipse or amplify the prior work on which it builds . We theorize that novel papers will exhibit disruptive impact over time, and demonstrate how they are much more likely than conventional papers to disrupt current literature. Novel papers do not do so immediately, but often become \"sleeping beauties\" , accumulating surprising attention and citation impact over the long run . In summary, new directions for science are created from a lack of consensus. Finally, we show how novelty can be reformulated as the combination of ideas across knowledge space to reveal the combinatorial nature of advance . The evolution of knowledge space over time characterizes how yesterday's novelty forms today's scientific conventions, which condition the novelty-and surprise-of tomorrow's breakthroughs.", "edit_actions": [{"type": "R", "before": "impact", "after": "number or \"impact\"", "start_char_pos": 26, "end_char_pos": 32}, {"type": "R", "before": "and institutions may value different kinds of advances", "after": "which are differentially valued by scientists and their institutions", "start_char_pos": 223, "end_char_pos": 277}, {"type": "R", "before": "to", "after": "that", "start_char_pos": 412, "end_char_pos": 414}, {"type": "A", "before": null, "after": "is measured at the point of production and", "start_char_pos": 709, "end_char_pos": 709}, {"type": "A", "before": null, "after": "is measured over time and", "start_char_pos": 790, "end_char_pos": 790}, {"type": "A", "before": null, "after": "or amplify", "start_char_pos": 830, "end_char_pos": 830}, {"type": "R", "before": ", becoming recognized as a new scientific direction. We demonstrate that : 1) novel papers disrupt existing theories and expand the scientific frontier; 2) novel papers are more likely to", "after": ". We theorize that novel papers will exhibit disruptive impact over time, and demonstrate how they are much more likely than conventional papers to disrupt current literature. Novel papers do not do so immediately, but often", "start_char_pos": 865, "end_char_pos": 1052}, {"type": "R", "before": "and accumulate", "after": ", accumulating surprising attention and", "start_char_pos": 1080, "end_char_pos": 1094}, {"type": "R", "before": "; 3)", "after": ". In summary, new directions for science are created from a lack of consensus. Finally, we show how", "start_char_pos": 1129, "end_char_pos": 1133}, {"type": "R", "before": "distance in journal embedding spaces to map the moving frontier of science", "after": "the combination of ideas across knowledge space to reveal the combinatorial nature of advance", "start_char_pos": 1165, "end_char_pos": 1239}, {"type": "R", "before": "embedding spaces over time reveals", "after": "knowledge space over time characterizes", "start_char_pos": 1259, "end_char_pos": 1293}, {"type": "R", "before": "novelty--and surprise--of", "after": "novelty-and surprise-of", "start_char_pos": 1376, "end_char_pos": 1401}], "sents_char_pos": [0, 107, 470, 700, 778, 917, 1017, 1130, 1241]}
+{"doc_id": "2103.03413", "revision_depth": "1", "before_revision": "In this study, we explore the implications of integrating social distancing with emergency evacuation when a hurricane approaches a major city during the COVID-19 pandemic. Specifically, we compare DNN (Deep Neural Network)-based and non-DNN methods for generating evacuation strategies that minimize evacuation time while allowing for social distancing in rescue vehicles. A central question is whether a DNN-based method provides sufficient extra efficiency to accommodate social distancing, in a time-constrained evacuation operation. We describe the problem as a Capacitated Vehicle Routing Problem and solve it using one non-DNN solution (Sweep Algorithm) and one DNN-based solution (Deep Reinforcement Learning). DNN-based solution can provide decision-makers with more efficient routing than non-DNN solution. Although DNN-based solution can save considerable time in evacuation routing , it does not come close to compensating for the extra time required for social distancing and its advantage disappears as the vehicle capacity approaches the number of people per household.", "after_revision": "We explore the implications of integrating social distancing with emergency evacuation , as would be expected when a hurricane approaches a city during the COVID-19 pandemic. Specifically, we compare DNN (Deep Neural Network)-based and non-DNN methods for generating evacuation strategies that minimize evacuation time while allowing for social distancing in emergency vehicles. A central question is whether a DNN-based method provides sufficient extra routing efficiency to accommodate increased social distancing in a time-constrained evacuation operation. We describe the problem as a Capacitated Vehicle Routing Problem and solve it using a non-DNN solution (Sweep Algorithm) and a DNN-based solution (Deep Reinforcement Learning). The DNN-based solution can provide decision-makers with more efficient routing than the typical non-DNN routing solution. However , it does not come close to compensating for the extra time required for social distancing , and its advantage disappears as the emergency vehicle capacity approaches the number of people per household.", "edit_actions": [{"type": "R", "before": "In this study, we", "after": "We", "start_char_pos": 0, "end_char_pos": 17}, {"type": "A", "before": null, "after": ", as would be expected", "start_char_pos": 102, "end_char_pos": 102}, {"type": "D", "before": "major", "after": null, "start_char_pos": 133, "end_char_pos": 138}, {"type": "R", "before": "rescue", "after": "emergency", "start_char_pos": 358, "end_char_pos": 364}, {"type": "A", "before": null, "after": "routing", "start_char_pos": 450, "end_char_pos": 450}, {"type": "R", "before": "social distancing,", "after": "increased social distancing", "start_char_pos": 477, "end_char_pos": 495}, {"type": "R", "before": "one", "after": "a", "start_char_pos": 624, "end_char_pos": 627}, {"type": "R", "before": "one", "after": "a", "start_char_pos": 667, "end_char_pos": 670}, {"type": "A", "before": null, "after": "The", "start_char_pos": 721, "end_char_pos": 721}, {"type": "A", "before": null, "after": "the typical", "start_char_pos": 802, "end_char_pos": 802}, {"type": "R", "before": "solution. Although DNN-based solution can save considerable time in evacuation routing", "after": "routing solution. However", "start_char_pos": 811, "end_char_pos": 897}, {"type": "A", "before": null, "after": ",", "start_char_pos": 989, "end_char_pos": 989}, {"type": "A", "before": null, "after": "emergency", "start_char_pos": 1026, "end_char_pos": 1026}], "sents_char_pos": [0, 173, 374, 539, 720, 820]}
+{"doc_id": "2103.04000", "revision_depth": "1", "before_revision": "The standard problem setting in Dec-POMDPs is self-play, where the goal is to find a set of policies that play optimally together. Policies learned through self-play may adopt arbitrary conventions and rely on multi-step counterfactual reasoning based on assumptions about other agents' actions and thus fail when paired with humans or independently trained agents . In contrast, no current methods can learn optimal policies that are fully grounded, i.e., do not rely on counterfactual information from observing other agents' actions. To address this, we present off-belief learning (OBL) : at each time step OBL agents assume that all past actions were taken by a given, fixed policy (\\pi_0), but that future actions will be taken by an optimal policy under these same assumptions . When \\pi_0 is uniform random, OBL learns the optimal grounded policy . OBL can be iterated in a hierarchy, where the optimal policy from one level becomes the input to the next . This introduces counterfactual reasoning in a controlled manner. Unlike independent RL which may converge to any equilibrium policy, OBL converges to a unique policy, making it more suitable for zero-shot coordination . OBL can be scaled to high-dimensional settings with a fictitious transition mechanism and shows strong performance in both a simple toy-setting and the benchmark human-AI /zero-shot coordination problem Hanabi.", "after_revision": "The standard problem setting in Dec-POMDPs is self-play, where the goal is to find a set of policies that play optimally together. Policies learned through self-play may adopt arbitrary conventions and implicitly rely on multi-step reasoning based on fragile assumptions about other agents' actions and thus fail when paired with humans or independently trained agents at test time. To address this, we present off-belief learning (OBL) . At each timestep OBL agents follow a policy \\pi_1 that is optimized assuming past actions were taken by a given, fixed policy (\\pi_0), but assuming that future actions will be taken by \\pi_1 . When \\pi_0 is uniform random, OBL converges to an optimal policy that does not rely on inferences based on other agents' behavior (an optimal grounded policy) . OBL can be iterated in a hierarchy, where the optimal policy from one level becomes the input to the next , thereby introducing multi-level cognitive reasoning in a controlled manner. Unlike existing approaches, which may converge to any equilibrium policy, OBL converges to a unique policy, making it suitable for zero-shot coordination (ZSC) . OBL can be scaled to high-dimensional settings with a fictitious transition mechanism and shows strong performance in both a toy-setting and the benchmark human-AI ZSC problem Hanabi.", "edit_actions": [{"type": "A", "before": null, "after": "implicitly", "start_char_pos": 202, "end_char_pos": 202}, {"type": "D", "before": "counterfactual", "after": null, "start_char_pos": 222, "end_char_pos": 236}, {"type": "A", "before": null, "after": "fragile", "start_char_pos": 256, "end_char_pos": 256}, {"type": "R", "before": ". In contrast, no current methods can learn optimal policies that are fully grounded, i.e., do not rely on counterfactual information from observing other agents' actions.", "after": "at test time.", "start_char_pos": 367, "end_char_pos": 538}, {"type": "R", "before": ": at each time step OBL agents assume that all", "after": ". At each timestep OBL agents follow a policy \\pi_1 that is optimized assuming", "start_char_pos": 593, "end_char_pos": 639}, {"type": "A", "before": null, "after": "assuming", "start_char_pos": 702, "end_char_pos": 702}, {"type": "R", "before": "an optimal policy under these same assumptions", "after": "\\pi_1", "start_char_pos": 740, "end_char_pos": 786}, {"type": "R", "before": "learns the optimal grounded policy", "after": "converges to an optimal policy that does not rely on inferences based on other agents' behavior (an optimal grounded policy)", "start_char_pos": 823, "end_char_pos": 857}, {"type": "R", "before": ". This introduces counterfactual", "after": ", thereby introducing multi-level cognitive", "start_char_pos": 966, "end_char_pos": 998}, {"type": "R", "before": "independent RL", "after": "existing approaches,", "start_char_pos": 1040, "end_char_pos": 1054}, {"type": "D", "before": "more", "after": null, "start_char_pos": 1145, "end_char_pos": 1149}, {"type": "A", "before": null, "after": "(ZSC)", "start_char_pos": 1186, "end_char_pos": 1186}, {"type": "D", "before": "simple", "after": null, "start_char_pos": 1314, "end_char_pos": 1320}, {"type": "R", "before": "/zero-shot coordination", "after": "ZSC", "start_char_pos": 1360, "end_char_pos": 1383}], "sents_char_pos": [0, 130, 368, 538, 788, 967, 1032]}
+{"doc_id": "2103.05631", "revision_depth": "1", "before_revision": "The rigidity of a matrix A for target rank r is the minimum number of entries of A that need to be changed in order to obtain a matrix of rank at most r. Matrix rigidity was introduced by Valiant in 1977 as a tool to prove circuit lower bounds for linear functions and since then this notion has also found applications in other areas of complexity theory. Recently (arXiv 2021) , Alman proved that for any field \\mathbb{F, d\\geq 2 and arbitrary } matrices M_1, \\ldots, M_n \\in \\mathbb{F^{d\\times d}, one can get a d^n\\times d^n matrix of rank }%DIFDELCMD < \\le %%% d^{(1-\\gamma)n \\dots\\ge ^{ ( 1+\\varepsilon ) n } entries of the Kronecker product M = M_1\\otimes M_2\\otimes \\ldots\\otimes M_n\\le , where 1/\\gamma is roughly 2^d/\\varepsilon^2. In this note we improve this result in two directions. First, we do not require the matrices M_i to have equal size. Second, we reduce 1/\\gamma from exponential in d to roughly d^{3/2}/\\varepsilon^2 (where d is the maximum size of the matrices ), and to nearly linear (roughly d/\\varepsilon^2) for matrices M_i of sizes within a constant factor of each other. For the case of matrices of equal size, our bound matches the bound given by Dvir and Liu (\\textit{Theory of Computing, 2020 ) for the rigidity of generalized Walsh--Hadamard matrices (Kronecker powers of DFT matrices ), and improves their bounds for DFT matrices of abelian groups that are direct products of small groups .", "after_revision": "The rigidity of a matrix A for target rank r is the minimum number of entries of A that need to be changed in order to obtain a matrix of rank at most r. At MFCS'77, Valiant introduced matrix rigidity as a tool to prove circuit lower bounds for linear functions and since then this notion received much attention and found applications in other areas of complexity theory. , d\\geq 2 and arbitrary } The problem of constructing an explicit family of matrices that are sufficiently rigid for Valiant's reduction (Valiant-rigid) still remains open. Moreover, since 2017 most of the long-studied candidates have been shown not to be Valiant-rigid. Some of those former candidates for rigidity are Kronecker products of small matrices. In a recent paper (STOC'21), Alman gave a general non-rigidity result for such matrices: he showed that if an n\\times n matrix A (over any field) is a Kronecker product of d\\times d matrices M_1, ^{d\\times d}, one can get a d^n\\times d^n matrix of rank }%DIFDELCMD < \\le %%% \\dots, M_k (so n=d^k) (d\\ge 2) then changing only n ^{ 1+\\varepsilon } entries of A one can reduce its rank to\\le n^{1-\\gamma , where 1/\\gamma is roughly 2^d/\\varepsilon^2. In this note we improve this result in two directions. First, we do not require the matrices M_i to have equal size. Second, we reduce 1/\\gamma from exponential in d to roughly d^{3/2}/\\varepsilon^2 (where d is the maximum size of the matrices M_i ), and to nearly linear (roughly d/\\varepsilon^2) for matrices M_i of sizes within a constant factor of each other. \\textit{ As an application of our results we significantly expand the class of Hadamard matrices that are known not to be Valiant-rigid; these now include the Kronecker products of Paley-Hadamard matrices and Hadamard matrices of bounded size .", "edit_actions": [{"type": "R", "before": "Matrix rigidity was introduced by Valiant in 1977", "after": "At MFCS'77, Valiant introduced matrix rigidity", "start_char_pos": 154, "end_char_pos": 203}, {"type": "R", "before": "has also", "after": "received much attention and", "start_char_pos": 292, "end_char_pos": 300}, {"type": "D", "before": "Recently (arXiv 2021) , Alman proved that for any field \\mathbb{F", "after": null, "start_char_pos": 357, "end_char_pos": 422}, {"type": "A", "before": null, "after": "The problem of constructing an explicit family of matrices that are sufficiently rigid for Valiant's reduction (Valiant-rigid) still remains open. Moreover, since 2017 most of the long-studied candidates have been shown not to be Valiant-rigid. Some of those former candidates for rigidity are Kronecker products of small matrices. In a recent paper (STOC'21), Alman gave a general non-rigidity result for such matrices: he showed that if an n\\times n matrix A (over any field) is a Kronecker product of d\\times d", "start_char_pos": 448, "end_char_pos": 448}, {"type": "D", "before": "\\ldots, M_n \\in \\mathbb{F", "after": null, "start_char_pos": 463, "end_char_pos": 488}, {"type": "D", "before": "d^{(1-\\gamma)n", "after": null, "start_char_pos": 567, "end_char_pos": 581}, {"type": "A", "before": null, "after": ", M_k (so n=d^k) (d", "start_char_pos": 587, "end_char_pos": 587}, {"type": "A", "before": null, "after": "2) then changing only n", "start_char_pos": 591, "end_char_pos": 591}, {"type": "D", "before": "(", "after": null, "start_char_pos": 595, "end_char_pos": 596}, {"type": "D", "before": ") n", "after": null, "start_char_pos": 611, "end_char_pos": 614}, {"type": "R", "before": "the Kronecker product M = M_1\\otimes M_2\\otimes \\ldots\\otimes M_n", "after": "A one can reduce its rank to", "start_char_pos": 628, "end_char_pos": 693}, {"type": "A", "before": null, "after": "n^{1-\\gamma", "start_char_pos": 697, "end_char_pos": 697}, {"type": "A", "before": null, "after": "M_i", "start_char_pos": 989, "end_char_pos": 989}, {"type": "D", "before": "For the case of matrices of equal size, our bound matches the bound given by Dvir and Liu (", "after": null, "start_char_pos": 1106, "end_char_pos": 1197}, {"type": "D", "before": "Theory of Computing, 2020", "after": null, "start_char_pos": 1205, "end_char_pos": 1230}, {"type": "R", "before": ") for the rigidity of generalized Walsh--Hadamard matrices (Kronecker powers of DFT matrices ), and improves their bounds for DFT matrices of abelian groups that are direct products of small groups", "after": "As an application of our results we significantly expand the class of Hadamard matrices that are known not to be Valiant-rigid; these now include the Kronecker products of Paley-Hadamard matrices and Hadamard matrices of bounded size", "start_char_pos": 1231, "end_char_pos": 1428}], "sents_char_pos": [0, 356, 744, 799, 861, 1105]}
+{"doc_id": "2103.06874", "revision_depth": "1", "before_revision": "Pipelined NLP systems have largely been superseded by end-to-end neural modeling, yet nearly all commonly-used models still require an explicit tokenization step. While recent tokenization approaches based on data-derived subword lexicons are less brittle than manually engineered tokenizers, these techniques are not equally suited to all languages, and the use of any fixed vocabulary may limit a model's ability to adapt. In this paper, we present CANINE, a neural encoder that operates directly on character sequences--without explicit tokenization or vocabulary--and a pre-training strategy with soft inductive biases in place of hard token boundaries. To use its finer-grained input effectively and efficiently, CANINE combines downsampling, which reduces the input sequence length, with a deep transformer stack, which encodes con-text . CANINE outperforms a comparable mBERT model by >= 1 F1 on TyDi QA, a challenging multilingual benchmark, despite having 28\\% fewer model parameters.", "after_revision": "Pipelined NLP systems have largely been superseded by end-to-end neural modeling, yet nearly all commonly-used models still require an explicit tokenization step. While recent tokenization approaches based on data-derived subword lexicons are less brittle than manually engineered tokenizers, these techniques are not equally suited to all languages, and the use of any fixed vocabulary may limit a model's ability to adapt. In this paper, we present CANINE, a neural encoder that operates directly on character sequences, without explicit tokenization or vocabulary, and a pre-training strategy with soft inductive biases in place of hard token boundaries. To use its finer-grained input effectively and efficiently, CANINE combines downsampling, which reduces the input sequence length, with a deep transformer stack, which encodes context . CANINE outperforms a comparable mBERT model by >= 1 F1 on TyDi QA, a challenging multilingual benchmark, despite having 28\\% fewer model parameters.", "edit_actions": [{"type": "R", "before": "sequences--without", "after": "sequences, without", "start_char_pos": 512, "end_char_pos": 530}, {"type": "R", "before": "vocabulary--and", "after": "vocabulary, and", "start_char_pos": 556, "end_char_pos": 571}, {"type": "R", "before": "con-text", "after": "context", "start_char_pos": 834, "end_char_pos": 842}], "sents_char_pos": [0, 162, 424, 657, 844]}
+{"doc_id": "2103.10290", "revision_depth": "1", "before_revision": "Decision and control are two of the core functionalities of high-level automated vehicles. Current mainstream methods, such as functionality decomposition or end-to-end reinforcement learning (RL), either suffer high time complexity or poor interpretability and limited safety performance in real-world complex autonomous driving tasks. In this paper, we present an interpretable and efficient decision and control framework for automated vehicles, which decomposes the driving task into multi-path planning and optimal tracking that are structured hierarchically. First, the multi-path planning is to generate several paths only considering static constraints . Then, the optimal tracking is designed to track the optimal path while considering the dynamic obstacles. To that end, in theory, we formulate a constrained optimal control problem (OCP) for each candidate path, optimize them separately and choose the one with the best tracking performance to follow. More importantly , we propose a model-based reinforcement learning (RL) algorithm , which is served as an approximate constrained OCP solver , to unload the heavy computation by the paradigm of offline training and online application . Specifically, the OCPs for all paths are considered together to construct a multi-task RL problem and then solved offline by our algorithm into value and policy networks, for real-time online path selecting and tracking respectively. We verify our framework in both simulation and the real world. Results show that our method has better online computing efficiency and driving performance including traffic efficiency and safety compared with baseline methods . In addition, it yields great interpretability and adaptability among different driving tasks. The real road test also suggests that it is applicable in complicated traffic scenarios without even tuning .", "after_revision": "Decision and control are core functionalities of high-level automated vehicles. Current mainstream methods, such as functionality decomposition and end-to-end reinforcement learning (RL), either suffer high time complexity or poor interpretability and adaptability on real-world autonomous driving tasks. In this paper, we present an interpretable and computationally efficient framework called integrated decision and control (IDC) for automated vehicles, which decomposes the driving task into static path planning and dynamic optimal tracking that are structured hierarchically. First, the static path planning generates several candidate paths only considering static traffic elements . Then, the dynamic optimal tracking is designed to track the optimal path while considering the dynamic obstacles. To that end, we formulate a constrained optimal control problem (OCP) for each candidate path, optimize them separately and follow the one with the best tracking performance . To unload the heavy online computation , we propose a model-based reinforcement learning (RL) algorithm that can be served as an approximate constrained OCP solver . Specifically, the OCPs for all paths are considered together to construct a single complete RL problem and then solved offline in the form of value and policy networks, for real-time online path selecting and tracking respectively. We verify our framework in both simulations and the real world. Results show that compared with baseline methods IDC has an order of magnitude higher online computing efficiency , as well as better driving performance including traffic efficiency and safety . In addition, it yields great interpretability and adaptability among different driving tasks. The effectiveness of the proposed method is also demonstrated in real road tests with complicated traffic conditions .", "edit_actions": [{"type": "D", "before": "two of the", "after": null, "start_char_pos": 25, "end_char_pos": 35}, {"type": "R", "before": "or", "after": "and", "start_char_pos": 155, "end_char_pos": 157}, {"type": "R", "before": "limited safety performance in", "after": "adaptability on", "start_char_pos": 262, "end_char_pos": 291}, {"type": "D", "before": "complex", "after": null, "start_char_pos": 303, "end_char_pos": 310}, {"type": "R", "before": "efficient", "after": "computationally efficient framework called integrated", "start_char_pos": 384, "end_char_pos": 393}, {"type": "R", "before": "framework", "after": "(IDC)", "start_char_pos": 415, "end_char_pos": 424}, {"type": "R", "before": "multi-path planning and", "after": "static path planning and dynamic", "start_char_pos": 488, "end_char_pos": 511}, {"type": "R", "before": "multi-path planning is to generate several", "after": "static path planning generates several candidate", "start_char_pos": 576, "end_char_pos": 618}, {"type": "R", "before": "constraints", "after": "traffic elements", "start_char_pos": 649, "end_char_pos": 660}, {"type": "A", "before": null, "after": "dynamic", "start_char_pos": 673, "end_char_pos": 673}, {"type": "D", "before": "in theory,", "after": null, "start_char_pos": 783, "end_char_pos": 793}, {"type": "R", "before": "choose", "after": "follow", "start_char_pos": 905, "end_char_pos": 911}, {"type": "R", "before": "to follow. More importantly", "after": ". To unload the heavy online computation", "start_char_pos": 955, "end_char_pos": 982}, {"type": "R", "before": ", which is", "after": "that can be", "start_char_pos": 1048, "end_char_pos": 1058}, {"type": "D", "before": ", to unload the heavy computation by the paradigm of offline training and online application", "after": null, "start_char_pos": 1107, "end_char_pos": 1199}, {"type": "R", "before": "multi-task", "after": "single complete", "start_char_pos": 1278, "end_char_pos": 1288}, {"type": "R", "before": "by our algorithm into", "after": "in the form of", "start_char_pos": 1324, "end_char_pos": 1345}, {"type": "R", "before": "simulation", "after": "simulations", "start_char_pos": 1468, "end_char_pos": 1478}, {"type": "R", "before": "our method has better", "after": "compared with baseline methods IDC has an order of magnitude higher", "start_char_pos": 1517, "end_char_pos": 1538}, {"type": "R", "before": "and", "after": ", as well as better", "start_char_pos": 1567, "end_char_pos": 1570}, {"type": "D", "before": "compared with baseline methods", "after": null, "start_char_pos": 1631, "end_char_pos": 1661}, {"type": "R", "before": "real road test also suggests that it is applicable in complicated traffic scenarios without even tuning", "after": "effectiveness of the proposed method is also demonstrated in real road tests with complicated traffic conditions", "start_char_pos": 1762, "end_char_pos": 1865}], "sents_char_pos": [0, 90, 336, 564, 662, 769, 965, 1435, 1498, 1663, 1757]}
+{"doc_id": "2103.11360", "revision_depth": "1", "before_revision": "Person names are essential entities in the Named Entity Recognition (NER) task. Traditional NER models have good performance in recognising well-formed person names from text with consistent and complete syntax, such as news articles. However, user-generated documents such as academic homepages and articles in online forums may contain lots of free-form text with incomplete syntax and person names in various forms . To address person name recognition in this context, we propose a fine-grained annotation scheme based on anthroponymy. To take full advantage of the fine-grained annotations, we propose a Co-guided Neural Network (CogNN) for person name recognition. CogNN fully explore the intra-sentence context and rich training signals of name forms. However, the inter-sentence context and implicit relations, which are extremely essential for recognizing person names in long documents, are not captured. To address this issue, we propose a Multi-inference Overlapped BERT Model ( NameRec*)through an overlapped input processor, and an inter-sentence encoder with bidirectional overlapped contextual embedding learning and multiple inference mechanisms. NameRec* takes full advantage of inter-sentence context in long documents, while loses advantage for short documents without too much inter-sentence context. To derive benefit from different documents with diverse abundance of context, we further propose an advanced Adaptive Multi-inference Overlapping BERT Model ( Ada-NameRec* ) to dynamically adjust the inter-sentence overlapping ratio to different documents. We conduct extensive experiments to demonstrate the superiority of the proposed methods on both academic homepages and news articles.", "after_revision": "In this paper, we introduce the NameRec* task, which aims to do highly accurate and fine-grained person name recognition. Traditional Named Entity Recognition models have good performance in recognising well-formed person names from text with consistent and complete syntax, such as news articles. However, there are rapidly growing scenarios where sentences are of incomplete syntax and names are in various forms such as user-generated contents and academic homepages . To address person name recognition in this context, we propose a fine-grained annotation scheme based on anthroponymy. To take full advantage of the fine-grained annotations, we propose a Co-guided Neural Network (CogNN) for person name recognition. CogNN fully explores the intra-sentence context and rich training signals of name forms. To better utilize the inter-sentence context and implicit relations, which are extremely essential for recognizing person names in long documents, we further propose an Inter-sentence BERT Model ( IsBERT). IsBERT has an overlapped input processor, and an inter-sentence encoder with bidirectional overlapped contextual embedding learning and multi-hop inference mechanisms. To derive benefit from different documents with a diverse abundance of context, we propose an advanced Adaptive Inter-sentence BERT Model ( Ada-IsBERT ) to dynamically adjust the inter-sentence overlapping ratio to different documents. We conduct extensive experiments to demonstrate the superiority of the proposed methods on both academic homepages and news articles.", "edit_actions": [{"type": "R", "before": "Person names are essential entities in the Named Entity Recognition (NER) task. Traditional NER", "after": "In this paper, we introduce the NameRec* task, which aims to do highly accurate and fine-grained person name recognition. Traditional Named Entity Recognition", "start_char_pos": 0, "end_char_pos": 95}, {"type": "R", "before": "user-generated documents such as academic homepages and articles in online forums may contain lots of free-form text with", "after": "there are rapidly growing scenarios where sentences are of", "start_char_pos": 244, "end_char_pos": 365}, {"type": "R", "before": "person names", "after": "names are", "start_char_pos": 388, "end_char_pos": 400}, {"type": "A", "before": null, "after": "such as user-generated contents and academic homepages", "start_char_pos": 418, "end_char_pos": 418}, {"type": "R", "before": "explore", "after": "explores", "start_char_pos": 683, "end_char_pos": 690}, {"type": "R", "before": "However,", "after": "To better utilize", "start_char_pos": 759, "end_char_pos": 767}, {"type": "R", "before": "are not captured. To address this issue, we propose a Multi-inference Overlapped", "after": "we further propose an Inter-sentence", "start_char_pos": 897, "end_char_pos": 977}, {"type": "R", "before": "NameRec*)through", "after": "IsBERT). IsBERT has", "start_char_pos": 991, "end_char_pos": 1007}, {"type": "R", "before": "multiple", "after": "multi-hop", "start_char_pos": 1133, "end_char_pos": 1141}, {"type": "D", "before": "NameRec* takes full advantage of inter-sentence context in long documents, while loses advantage for short documents without too much inter-sentence context.", "after": null, "start_char_pos": 1164, "end_char_pos": 1321}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1370, "end_char_pos": 1370}, {"type": "D", "before": "further", "after": null, "start_char_pos": 1404, "end_char_pos": 1411}, {"type": "R", "before": "Multi-inference Overlapping", "after": "Inter-sentence", "start_char_pos": 1441, "end_char_pos": 1468}, {"type": "R", "before": "Ada-NameRec*", "after": "Ada-IsBERT", "start_char_pos": 1482, "end_char_pos": 1494}], "sents_char_pos": [0, 79, 234, 420, 539, 670, 758, 914, 1163, 1321, 1579]}
+{"doc_id": "2103.11986", "revision_depth": "1", "before_revision": "FoF1-ATP synthases are the ubiquitous membrane enzymes which catalyze ATP synthesis or ATP hydrolysisin reverse, respectively. Enzyme kinetics are controlled by internal subunit rotation, by substrate and product concentrations, by mechanical inhibitory mechanisms, but also by the electrochemical potential of protons across the membrane. By utilizing an Anti-Brownian electrokinetic trap (ABEL trap), single-molecule F\\\"orster resonance energy transfer (smFRET) -based subunit rotation monitoring was prolonged from milliseconds to seconds . The extended observation times for single proteoliposomes in solution allowed to observe fluctuating rotation rates of individual enzymes and to map the broad distributions of ATP-dependent calatytic rates in FoF1-ATP synthase . The buildup of an electrochemical potential of protons was confirmed to limit the maximum rate of ATP hydrolysis. In the presence of ionophores and uncouplers the fastest subunit rotation speeds measured in single reconstituted FoF1-ATP synthases were 180 full rounds per second , i. e. much faster than measured by biochemical ensemble averaging, but not as fast as the maximum rotational speed reported previoulsy for isolated single F1 fragments without coupling to the membrane-embedded Fo domain of the enzyme .", "after_revision": "FoF1-ATP synthases are ubiquitous membrane-bound, rotary motor enzymes that can catalyze ATP synthesis and hydrolysis. Their enzyme kinetics are controlled by internal subunit rotation, by substrate and product concentrations, by mechanical inhibitory mechanisms, but also by the electrochemical potential of protons across the membrane. Single-molecule F\\\"orster resonance energy transfer (smFRET) has been used to detect subunit rotation within FoF1-ATP synthases embedded in freely diffusing liposomes. We now report that kinetic monitoring of functional rotation can be prolonged from milliseconds to seconds by utilizing an Anti-Brownian electrokinetic trap (ABEL trap). These extended observation times allowed us to observe fluctuating rates of functional rotation for individual FoF1-liposomes in solution. Broad distributions of ATP-dependent catalytic rates were revealed . The buildup of an electrochemical potential of protons was confirmed to limit the maximum rate of ATP hydrolysis. In the presence of ionophores or uncouplers, the fastest subunit rotation speeds measured in single reconstituted FoF1-ATP synthases were 180 full rounds per second . This was much faster than measured by biochemical ensemble averaging, but not as fast as the maximum rotational speed reported previously for isolated single F1 complexes uncoupled from the membrane-embedded Fo complex. Further application of ABEL trap measurements should help resolve the mechanistic causes of such fluctuating rates of subunit rotation .", "edit_actions": [{"type": "R", "before": "the ubiquitous membrane enzymes which", "after": "ubiquitous membrane-bound, rotary motor enzymes that can", "start_char_pos": 23, "end_char_pos": 60}, {"type": "R", "before": "or ATP hydrolysisin reverse, respectively. Enzyme", "after": "and hydrolysis. Their enzyme", "start_char_pos": 84, "end_char_pos": 133}, {"type": "R", "before": "By utilizing an Anti-Brownian electrokinetic trap (ABEL trap), single-molecule", "after": "Single-molecule", "start_char_pos": 340, "end_char_pos": 418}, {"type": "R", "before": "-based subunit rotation monitoring was", "after": "has been used to detect subunit rotation within FoF1-ATP synthases embedded in freely diffusing liposomes. We now report that kinetic monitoring of functional rotation can be", "start_char_pos": 464, "end_char_pos": 502}, {"type": "R", "before": ". The", "after": "by utilizing an Anti-Brownian electrokinetic trap (ABEL trap). These", "start_char_pos": 542, "end_char_pos": 547}, {"type": "R", "before": "for single proteoliposomes in solution allowed", "after": "allowed us", "start_char_pos": 575, "end_char_pos": 621}, {"type": "R", "before": "rotation rates of individual enzymes and to map the broad", "after": "rates of functional rotation for individual FoF1-liposomes in solution. Broad", "start_char_pos": 645, "end_char_pos": 702}, {"type": "R", "before": "calatytic rates in FoF1-ATP synthase", "after": "catalytic rates were revealed", "start_char_pos": 734, "end_char_pos": 770}, {"type": "R", "before": "and uncouplers", "after": "or uncouplers,", "start_char_pos": 917, "end_char_pos": 931}, {"type": "R", "before": ", i. e.", "after": ". This was", "start_char_pos": 1052, "end_char_pos": 1059}, {"type": "R", "before": "previoulsy", "after": "previously", "start_char_pos": 1178, "end_char_pos": 1188}, {"type": "R", "before": "fragments without coupling to", "after": "complexes uncoupled from", "start_char_pos": 1212, "end_char_pos": 1241}, {"type": "R", "before": "domain of the enzyme", "after": "complex. Further application of ABEL trap measurements should help resolve the mechanistic causes of such fluctuating rates of subunit rotation", "start_char_pos": 1267, "end_char_pos": 1287}], "sents_char_pos": [0, 126, 339, 543, 772, 886]}
+{"doc_id": "2103.13581", "revision_depth": "2", "before_revision": "Speaker recognition refers to audio biometrics that utilizes acoustic characteristics for automatic speaker recognition . These systems have emerged as an essential means of verifying identity in various scenarios, such as smart homes, general business interactions, e-commerce applications, and forensics. However, the mismatch between training and real-world data causes a shift of speaker embedding space and severely degrades the recognition performance . Various complicated neural architectures are presented to address speaker recognition in the wild but neglect storage and computation requirements. To address this issue , we propose a neural architecture search-based efficient time-delay neural network (EfficientTDNN) to improve inference efficiency while maintaining recognition accuracy. The proposed EfficientTDNN contains three phases . First, supernet designconstructs a dynamic neural architecture that consists of sequential cells and enables network pruning. Second , progressive training optimizes randomly sampled subnets that inherit the weights of the supernet . Third, three search methods, including manual grid search, random search, and model predictive evolutionary search, are introduced to find a trade-off between accuracy and efficiency. Results of experiments on the VoxCeleb dataset show EfficientTDNN provides a vast search space including approximately 10^{13 achieves 1.55\\% EER and 0.138 DCF_{0.01 with 565M MACs as well as 0.96\\% EER and 0.108 DCF_{0.01} with 1.46G MACs. Comprehensive investigation suggests that the trained supernet generalizes cells unseen during training and obtains an acceptable balance between accuracy and efficiency.", "after_revision": "Speaker recognition refers to audio biometrics that utilizes acoustic characteristics . These systems have emerged as an essential means of authenticating identity in various areas such as smart homes, general business interactions, e-commerce applications, and forensics. The mismatch between development and real-world data causes a shift of speaker embedding space and severely degrades the performance of speaker recognition. Extensive efforts have been devoted to address speaker recognition in the wild , but these often neglect computation and storage requirements. In this work , we propose an efficient time-delay neural network (EfficientTDNN) based on neural architecture search to improve inference efficiency while maintaining recognition accuracy. The proposed EfficientTDNN contains three phases : supernet design , progressive training , and architecture search. Firstly, we borrow the design of TDNN to construct a supernet that enables sampling subnets with different depth, kernel, and width. Secondly, the supernet is progressively trained with multi-condition data augmentation to mitigate interference between subnets and overcome the challenge of optimizing a huge search space. Thirdly, an accuracy predictor and efficiency estimator are proposed to use in the architecture search to derive the specialized subnet under the given efficiency constraints. Experimental results on the VoxCeleb dataset show EfficientTDNN achieves 1.55\\% equal error rate (EER) and 0.138 detection cost function (DCF_{0.01 with 565M multiply-accumulate operations (MACs) as well as 0.96\\% EER and 0.108 DCF_{0.01} with 1.46G MACs. Comprehensive investigations suggest that the trained supernet generalizes subnets not sampled during training and obtains a favorable trade-off between accuracy and efficiency.", "edit_actions": [{"type": "D", "before": "for automatic speaker recognition", "after": null, "start_char_pos": 86, "end_char_pos": 119}, {"type": "R", "before": "verifying", "after": "authenticating", "start_char_pos": 174, "end_char_pos": 183}, {"type": "R", "before": "scenarios,", "after": "areas", "start_char_pos": 204, "end_char_pos": 214}, {"type": "R", "before": "However, the mismatch between training", "after": "The mismatch between development", "start_char_pos": 307, "end_char_pos": 345}, {"type": "R", "before": "recognition performance . Various complicated neural architectures are presented", "after": "performance of speaker recognition. Extensive efforts have been devoted", "start_char_pos": 434, "end_char_pos": 514}, {"type": "R", "before": "but neglect storage and computation requirements. To address this issue", "after": ", but these often neglect computation and storage requirements. In this work", "start_char_pos": 558, "end_char_pos": 629}, {"type": "R", "before": "a neural architecture search-based", "after": "an", "start_char_pos": 643, "end_char_pos": 677}, {"type": "A", "before": null, "after": "based on neural architecture search", "start_char_pos": 730, "end_char_pos": 730}, {"type": "R", "before": ". First, supernet designconstructs a dynamic neural architecture that consists of sequential cells and enables network pruning. Second", "after": ": supernet design", "start_char_pos": 852, "end_char_pos": 986}, {"type": "R", "before": "optimizes randomly sampled subnets that inherit the weights of the supernet . Third, three search methods, including manual grid search, random search, and model predictive evolutionary search, are introduced to find a trade-off between accuracy", "after": ", and architecture search. Firstly, we borrow the design of TDNN to construct a supernet that enables sampling subnets with different depth, kernel,", "start_char_pos": 1010, "end_char_pos": 1255}, {"type": "R", "before": "efficiency. Results of experiments", "after": "width. Secondly, the supernet is progressively trained with multi-condition data augmentation to mitigate interference between subnets and overcome the challenge of optimizing a huge search space. Thirdly, an accuracy predictor and efficiency estimator are proposed to use in the architecture search to derive the specialized subnet under the given efficiency constraints. Experimental results", "start_char_pos": 1260, "end_char_pos": 1294}, {"type": "D", "before": "provides a vast search space including approximately 10^{13", "after": null, "start_char_pos": 1338, "end_char_pos": 1397}, {"type": "R", "before": "EER", "after": "equal error rate (EER)", "start_char_pos": 1414, "end_char_pos": 1417}, {"type": "R", "before": "DCF_{0.01", "after": "detection cost function (DCF_{0.01", "start_char_pos": 1428, "end_char_pos": 1437}, {"type": "R", "before": "MACs", "after": "multiply-accumulate operations (MACs)", "start_char_pos": 1448, "end_char_pos": 1452}, {"type": "R", "before": "investigation suggests", "after": "investigations suggest", "start_char_pos": 1527, "end_char_pos": 1549}, {"type": "R", "before": "cells unseen", "after": "subnets not sampled", "start_char_pos": 1588, "end_char_pos": 1600}, {"type": "R", "before": "an acceptable balance", "after": "a favorable trade-off", "start_char_pos": 1629, "end_char_pos": 1650}], "sents_char_pos": [0, 121, 306, 607, 802, 853, 979, 1087, 1271, 1512]}
+{"doc_id": "2103.14220", "revision_depth": "1", "before_revision": "This paper investigates the impact of Reconstruction-era amnesty policy on the officeholding and wealth of planter elites in the postbellum U.S. South. Amnesty policy restricted the political and economic rights of the planter class for nearly three years during Reconstruction. The paper estimates the effects of being excepted from amnesty on elites' future wealth and political power using a regression discontinuity design . Results on a sample of delegates to Reconstruction conventions show that exclusion from amnesty substantially decreases the likelihood of holding political office . I find no evidence that exclusion from amnesty impacted later census wealth for Reconstruction delegates or for a larger sample of known slaveholders who lived in the South in 1860. These findings are in line with previous studies evidencing changes to the identity of the political elite and continuity of economic mobility for the planter elite across the Civil War and Reconstruction.", "after_revision": "This paper investigates the impact of Reconstruction-era amnesty policy on the officeholding and wealth of elites in the postbellum South. Amnesty policy restricted the political and economic rights of Southern elites for nearly three years during Reconstruction. I estimate the effect of being excluded from amnesty on elites' future wealth and political power using a regression discontinuity design that compares individuals just above and below a wealth threshold that determined exclusion from amnesty . Results on a sample of Reconstruction convention delegates show that exclusion from amnesty significantly decreased the likelihood of ex-post officeholding . I find no evidence that exclusion impacted later census wealth for Reconstruction delegates or for a larger sample of known slaveholders who lived in the South in 1860. These findings are in line with previous studies evidencing both changes to the identity of the political elite , and the continuity of economic mobility among the planter elite across the Civil War and Reconstruction.", "edit_actions": [{"type": "D", "before": "planter", "after": null, "start_char_pos": 107, "end_char_pos": 114}, {"type": "D", "before": "U.S.", "after": null, "start_char_pos": 140, "end_char_pos": 144}, {"type": "R", "before": "the planter class", "after": "Southern elites", "start_char_pos": 215, "end_char_pos": 232}, {"type": "R", "before": "The paper estimates the effects of being excepted", "after": "I estimate the effect of being excluded", "start_char_pos": 279, "end_char_pos": 328}, {"type": "A", "before": null, "after": "that compares individuals just above and below a wealth threshold that determined exclusion from amnesty", "start_char_pos": 427, "end_char_pos": 427}, {"type": "R", "before": "delegates to Reconstruction conventions", "after": "Reconstruction convention delegates", "start_char_pos": 453, "end_char_pos": 492}, {"type": "R", "before": "substantially decreases", "after": "significantly decreased", "start_char_pos": 526, "end_char_pos": 549}, {"type": "R", "before": "holding political office", "after": "ex-post officeholding", "start_char_pos": 568, "end_char_pos": 592}, {"type": "D", "before": "from amnesty", "after": null, "start_char_pos": 629, "end_char_pos": 641}, {"type": "A", "before": null, "after": "both", "start_char_pos": 837, "end_char_pos": 837}, {"type": "R", "before": "and", "after": ", and the", "start_char_pos": 885, "end_char_pos": 888}, {"type": "R", "before": "for", "after": "among", "start_char_pos": 921, "end_char_pos": 924}], "sents_char_pos": [0, 151, 278, 594, 776]}
+{"doc_id": "2103.14972", "revision_depth": "1", "before_revision": "This paper describes a corpus annotation process to support the identification of hate speech and offensive language in social media. The corpus was collected from Instagram pages of political personalities and manually annotated, being composed by 7,000 documents annotated according to three different layers: a binary classification (offensive versus non-offensive comments ), the level of the offense (highly offensive, moderately offensive and slightly offensive messages), and the identification regarding the target of the discriminatory content (xenophobia, racism, homophobia, sexism, religion intolerance, partyism, apology to the dictatorship, antisemitism and fat phobia). Each comment was annotated by three different annotators, which achieved high inter-annotator agreement .", "after_revision": "This paper describes a corpus annotation process to support the identification of hate speech and offensive language in social media. In addition, we provide the first robust corpus this kind for the Brazilian Portuguese language. The corpus was collected from Instagram pages of political personalities and manually annotated, being composed by 7,000 documents annotated according to three different layers: a binary classification (offensive versus non-offensive language ), the level of offense (highly offensive, moderately offensive and slightly offensive messages), and the identification regarding the target of the discriminatory content (xenophobia, racism, homophobia, sexism, religion intolerance, partyism, apology to the dictatorship, antisemitism and fat phobia). Each comment was annotated by three different annotators, which achieved high inter-annotator agreement . The proposed annotation process is also language and domain independent .", "edit_actions": [{"type": "A", "before": null, "after": "In addition, we provide the first robust corpus this kind for the Brazilian Portuguese language.", "start_char_pos": 134, "end_char_pos": 134}, {"type": "R", "before": "comments", "after": "language", "start_char_pos": 369, "end_char_pos": 377}, {"type": "D", "before": "the", "after": null, "start_char_pos": 394, "end_char_pos": 397}, {"type": "A", "before": null, "after": ". The proposed annotation process is also language and domain independent", "start_char_pos": 790, "end_char_pos": 790}], "sents_char_pos": [0, 133, 312, 685]}
+{"doc_id": "2103.14972", "revision_depth": "2", "before_revision": "This paper describes a corpus annotation process to support the identification of hate speech and offensive language in social media. In addition, we provide the first robust corpus this kind for the Brazilian Portuguese language. The corpus was collected from Instagram pages of political personalities and manually annotated, being composed by 7,000 documents annotated according to three different layers: a binary classification (offensive versus non-offensive language), the level of offense (highly offensive, moderately offensive and slightly offensive messages), and the identification regarding the target of the discriminatory content (xenophobia, racism, homophobia, sexism, religion intolerance, partyism, apology to the dictatorship, antisemitism and fat phobia). Each comment was annotated by three different annotators, which achieved high inter-annotator agreement. The proposed annotation process is also language and domain independent .", "after_revision": "This paper describes a corpus annotation process to support the identification of hate speech and offensive language in social media. In addition, we provide the first robust corpus this kind for the Brazilian Portuguese language. The corpus was collected from Instagram pages of political personalities and manually annotated, being composed by 7,000 documents annotated according to three different layers: a binary classification (offensive versus non-offensive language), the level of offense (highly offensive, moderately offensive and slightly offensive messages), and the identification regarding the target of the discriminatory content (xenophobia, racism, homophobia, sexism, religion intolerance, partyism, apology to the dictatorship, antisemitism and fat phobia). Each comment was annotated by three different annotators, which achieved high inter-annotator agreement. The proposed annotation approach is also language and domain independent , nevertheless, it was currently applied for Brazilian Portuguese .", "edit_actions": [{"type": "R", "before": "process", "after": "approach", "start_char_pos": 906, "end_char_pos": 913}, {"type": "A", "before": null, "after": ", nevertheless, it was currently applied for Brazilian Portuguese", "start_char_pos": 954, "end_char_pos": 954}], "sents_char_pos": [0, 133, 230, 408, 776, 881]}
+{"doc_id": "2103.14972", "revision_depth": "3", "before_revision": "This paperdescribes a corpus annotation process to support the identification of hate speech and offensive language in social media. In addition, we provide the first robust corpus this kind for the Brazilian Portuguese language. The corpus was collected from Instagram pages of political personalities and manually annotated, being composed by 7,000 documents annotated according to three different layers: a binary classification (offensive versus non-offensive language), the level of offense (highly offensive, moderately offensive and slightly offensive messages), and the identification regarding the target of the discriminatory content (xenophobia, racism, homophobia, sexism, religion intolerance, partyism, apology to the dictatorship, antisemitism and fat phobia). Each comment was annotated by three different annotators, which achieved high inter-annotator agreement. The proposed annotation approach is also language and domain independent, nevertheless, it was currently applied for Brazilian Portuguese .", "after_revision": "The understanding of an offense is subjective and people may have different opinions about the offensiveness of a comment. Also, offenses and hate speech may occur through sarcasm, which hides the real intention of the comment and makes the decision of the annotators more confusing. Therefore, provide a well-structured annotation process is crucial to a better understanding of hate speech and offensive language phenomena, as well as supply better performance for machine learning classifiers. In this paper, we describe a corpus annotation process , which was guided by a linguist, and a hate speech skilled to support the identification of hate speech and offensive language on social media. In addition, we provide the first robust corpus of this kind for the Brazilian Portuguese language. The corpus was collected from Instagram posts of political personalities and manually annotated, being composed by 7,000 documents annotated according to three different layers: a binary classification (offensive versus non-offensive language), the level of offense (highly offensive, moderately offensive , and slightly offensive messages), and the identification regarding the target of the discriminatory content (xenophobia, racism, homophobia, sexism, religious intolerance, partyism, apology to the dictatorship, antisemitism , and fat phobia). Each comment was annotated by three different annotators, and achieved high inter-annotator agreement. The new proposed annotation approach is also language and domain-independent (although it has been applied for Brazilian Portuguese ) .", "edit_actions": [{"type": "R", "before": "This paperdescribes", "after": "The understanding of an offense is subjective and people may have different opinions about the offensiveness of a comment. Also, offenses and hate speech may occur through sarcasm, which hides the real intention of the comment and makes the decision of the annotators more confusing. Therefore, provide a well-structured annotation process is crucial to a better understanding of hate speech and offensive language phenomena, as well as supply better performance for machine learning classifiers. In this paper, we describe", "start_char_pos": 0, "end_char_pos": 19}, {"type": "A", "before": null, "after": ", which was guided by a linguist, and a hate speech skilled", "start_char_pos": 48, "end_char_pos": 48}, {"type": "R", "before": "in", "after": "on", "start_char_pos": 117, "end_char_pos": 119}, {"type": "A", "before": null, "after": "of", "start_char_pos": 182, "end_char_pos": 182}, {"type": "R", "before": "pages", "after": "posts", "start_char_pos": 272, "end_char_pos": 277}, {"type": "A", "before": null, "after": ",", "start_char_pos": 538, "end_char_pos": 538}, {"type": "R", "before": "religion", "after": "religious", "start_char_pos": 688, "end_char_pos": 696}, {"type": "A", "before": null, "after": ",", "start_char_pos": 762, "end_char_pos": 762}, {"type": "R", "before": "which", "after": "and", "start_char_pos": 838, "end_char_pos": 843}, {"type": "A", "before": null, "after": "new", "start_char_pos": 889, "end_char_pos": 889}, {"type": "R", "before": "domain independent, nevertheless, it was currently", "after": "domain-independent (although it has been", "start_char_pos": 940, "end_char_pos": 990}, {"type": "A", "before": null, "after": ")", "start_char_pos": 1024, "end_char_pos": 1024}], "sents_char_pos": [0, 133, 231, 409, 779, 884]}
+{"doc_id": "2103.15356", "revision_depth": "1", "before_revision": "Recently discovered simple quantitative relations knowns as bacterial growth laws hints on the existence of simple underlying principles at the heart of bacterial growth. In this work we provide a unifying picture on how these known relations, as well as new relations which we derive, stems from a universal autocatalytic network common to all bacteria, facilitating balanced exponential growth of individual cells. We show that the core of the cellular autocatalytic network is the transcription-translation machinery which by itself is an autocatalytic network composed of several coupled autocatalytic cycles like ribosome, RNA-polymerase and tRNA charging cycles. We derive two kinds of growth laws per autocatalytic cycle, relating growth rate to the relative fraction of the catalyst and its catalysis rate and relating growth rate to all the time-scales in the cycle. The autocatalytic network structure defines multiple growth regimes , determined by the limiting components . The number of growth regimes can be very large , while the number of growth laws obtained can be much smaller. We derive a growth law that accounts for RNA-polymerase auto-catalytic cycle, which we use to explain the dependence of growth rate on an inducible expression of rpoB and rpoC genes that code for RpoB and RpoC protein subunits of RNA-polymerase, and to explain how the concentration of rifampicin -- a drug that targets RNA-polymerase , affects growth rate without changing the RNA to protein ratio. We further derive growth laws for tRNA synthesis and charging and predict how perturbations to ribosome assembly or membrane synthesisaffect the growth rate .", "after_revision": "Recently discovered simple quantitative relations known as bacterial growth laws hints on the existence of simple underlying principles at the heart of bacterial growth. In this work we provide a unifying picture on how these known relations, as well as new relations which we derive, stems from a universal autocatalytic network common to all bacteria, facilitating balanced exponential growth of individual cells. We show that the core of the cellular autocatalytic network is the transcription--translation machinery -- in itself an autocatalytic network comprising several coupled autocatalytic cycles , including the ribosome, RNA polymerase, and tRNA charging cycles. We derive two types of growth laws per autocatalytic cycle, one relating growth rate to the relative fraction of the catalyst and its catalysis rate , and the other relating growth rate to all the time--scales in the cycle. The structure of the autocatalytic network generates numerous regimes in state space , determined by the limiting components , while the number of growth laws can be much smaller. We also derive a growth law that accounts for the RNA polymerase autocatalytic cycle, which we use to explain how growth rate depends on the inducible expression of the rpoB and rpoC genes , which code for the RpoB and RpoC protein subunits of RNA polymerase, and how the concentration of rifampicin , which targets RNA polymerase , affects growth rate without changing the RNA-to-protein ratio. We derive growth laws for tRNA synthesis and charging , and predict how growth rate depends on temperature, perturbation to ribosome assembly and membrane synthesis .", "edit_actions": [{"type": "R", "before": "knowns", "after": "known", "start_char_pos": 50, "end_char_pos": 56}, {"type": "R", "before": "transcription-translation machinery which by itself is", "after": "transcription--translation machinery -- in itself", "start_char_pos": 484, "end_char_pos": 538}, {"type": "R", "before": "composed of", "after": "comprising", "start_char_pos": 564, "end_char_pos": 575}, {"type": "R", "before": "like ribosome, RNA-polymerase", "after": ", including the ribosome, RNA polymerase,", "start_char_pos": 613, "end_char_pos": 642}, {"type": "R", "before": "kinds", "after": "types", "start_char_pos": 683, "end_char_pos": 688}, {"type": "A", "before": null, "after": "one", "start_char_pos": 729, "end_char_pos": 729}, {"type": "R", "before": "and", "after": ", and the other", "start_char_pos": 815, "end_char_pos": 818}, {"type": "R", "before": "time-scales", "after": "time--scales", "start_char_pos": 851, "end_char_pos": 862}, {"type": "R", "before": "autocatalytic network structure defines multiple growth regimes", "after": "structure of the autocatalytic network generates numerous regimes in state space", "start_char_pos": 881, "end_char_pos": 944}, {"type": "D", "before": ". The number of growth regimes can be very large", "after": null, "start_char_pos": 985, "end_char_pos": 1033}, {"type": "D", "before": "obtained", "after": null, "start_char_pos": 1068, "end_char_pos": 1076}, {"type": "A", "before": null, "after": "also", "start_char_pos": 1101, "end_char_pos": 1101}, {"type": "R", "before": "RNA-polymerase auto-catalytic", "after": "the RNA polymerase autocatalytic", "start_char_pos": 1140, "end_char_pos": 1169}, {"type": "R", "before": "the dependence of growth rate on an", "after": "how growth rate depends on the", "start_char_pos": 1201, "end_char_pos": 1236}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1261, "end_char_pos": 1261}, {"type": "R", "before": "that code for", "after": ", which code for the", "start_char_pos": 1282, "end_char_pos": 1295}, {"type": "R", "before": "RNA-polymerase, and to explain", "after": "RNA polymerase, and", "start_char_pos": 1330, "end_char_pos": 1360}, {"type": "R", "before": "-- a drug that targets RNA-polymerase", "after": ", which targets RNA polymerase", "start_char_pos": 1397, "end_char_pos": 1434}, {"type": "R", "before": "RNA to protein", "after": "RNA-to-protein", "start_char_pos": 1478, "end_char_pos": 1492}, {"type": "D", "before": "further", "after": null, "start_char_pos": 1503, "end_char_pos": 1510}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1562, "end_char_pos": 1562}, {"type": "R", "before": "perturbations", "after": "growth rate depends on temperature, perturbation", "start_char_pos": 1579, "end_char_pos": 1592}, {"type": "R", "before": "or membrane synthesisaffect the growth rate", "after": "and membrane synthesis", "start_char_pos": 1614, "end_char_pos": 1657}], "sents_char_pos": [0, 170, 416, 668, 876, 986, 1097, 1499]}
+{"doc_id": "2104.00207", "revision_depth": "1", "before_revision": "In this article, we consider colorable variations of the Unit Disk Cover ({\\it UDC}) problem as follows. {\\it k-Colorable Discrete Unit Disk Cover ({\\it k-CDUDC})}: Given a set P of n points, and a set D of m unit disks (of radius=1), both lying in the plane, and a parameter k, the objective is to compute a set D'\\subseteq D such that every point in P is covered by at least one disk in D' and there exists a function \\chi:D'\\rightarrow C that assigns colors to disks in D' such that for any d and d' in D' if d\\cap d'\\neq\\emptyset, then \\chi(d)\\neq\\chi(d'), where C denotes a set containing k distinct colors. For the {\\it k-CDUDC} problem, our proposed algorithms approximate the number of colors used in the coloring if there exists a k-colorable cover. We first propose a 4-approximation algorithm in O(m^{7k}n\\log k) time for this problem , where k is a positive integer . The previous best known result for the problem when k=3 is due to the recent work of Biedl et al. CCCG 2019 , who proposed a 2-approximation algorithm in O(m^{25}n) time. For k=3, our algorithm runs in O(m^{ 21 }n) time, faster than the previous best algorithm, but gives a 4-approximate result. We then generalize our approach to yield a family of \\rho\\lceil{\\tau}}\\rceil -approximation algorithms in O(m^{\\alpha kn\\log k) time, where (\\rho,\\alpha)\\in \\{(4, 7), (6,5), (7, 5), (9,4)\\}. We further generalize this to exhibit a O(1{\\tau})-approximation } algorithm in O(m^{ \\alpha\\lfloor{\\sqrt{12}}}\\rfloor k}n\\log k) time for a given grid width 1 \\leq \\tau \\leq 2, where \\alpha=O(\\tau^2). We also extend our algorithm to solve the {\\it k-Colorable Line Segment Disk Cover ({\\it k-CLSDC})} and {\\it k-Colorable Rectangular Region Cover ({\\it k-CRRC})} problems, in which instead of the set P of n points, we are given a set S of n line segments, and a rectangular region \\cal R, respectively.", "after_revision": "In this article, we consider colorable variations of the Unit Disk Cover ({\\it UDC}) problem as follows. {\\it k-Colorable Discrete Unit Disk Cover ({\\it k-CDUDC})}: Given a set P of n points, and a set D of m unit disks (of radius=1), both lying in the plane, and a parameter k, the objective is to compute a set D'\\subseteq D such that every point in P is covered by at least one disk in D' and there exists a function \\chi:D'\\rightarrow C that assigns colors to disks in D' such that for any d and d' in D' if d\\cap d'\\neq\\emptyset, then \\chi(d)\\neq\\chi(d'), where C denotes a set containing k distinct colors. For the {\\it k-CDUDC} problem, our proposed algorithms approximate the number of colors used in the coloring if there exists a k-colorable cover. We first propose a 4-approximation algorithm in O(m^{7k}n\\log k) time for this problem and then show that the running time can be improved by a multiplicative factor of m^k, where a positive integer k denotes the cardinality of a color-set . The previous best known result for the problem when k=3 is due to the recent work of Biedl et al. , (2021), who proposed a 2-approximation algorithm in O(m^{25}n) time. For k=3, our algorithm runs in O(m^{ 18 }n) time, faster than the previous best algorithm, but gives a 4-approximate result. We then generalize our approach to exhibit a O((1+\\lceil\\frac{2{\\tau}}\\rceil)^2) -approximation n\\log k) time, where (\\rho,\\alpha)\\in \\{(4, 7), (6,5), (7, 5), (9,4)\\}. We further generalize this to exhibit a O(1{\\tau})-approximation } algorithm in O(m^{ (\\lfloor\\frac{4\\pi+8\\tau+\\tau^2{\\sqrt{12}}}\\rfloor) k}n\\log k) time for a given 1 \\leq \\tau \\leq 2. We also extend our algorithm to solve the {\\it k-Colorable Line Segment Disk Cover ({\\it k-CLSDC})} and {\\it k-Colorable Rectangular Region Cover ({\\it k-CRRC})} problems, in which instead of the set P of n points, we are given a set S of n line segments, and a rectangular region \\cal R, respectively.", "edit_actions": [{"type": "R", "before": ", where k is", "after": "and then show that the running time can be improved by a multiplicative factor of m^k, where", "start_char_pos": 846, "end_char_pos": 858}, {"type": "A", "before": null, "after": "k denotes the cardinality of a color-set", "start_char_pos": 878, "end_char_pos": 878}, {"type": "D", "before": "CCCG 2019", "after": null, "start_char_pos": 979, "end_char_pos": 988}, {"type": "R", "before": ",", "after": ", (2021),", "start_char_pos": 989, "end_char_pos": 990}, {"type": "R", "before": "21", "after": "18", "start_char_pos": 1089, "end_char_pos": 1091}, {"type": "R", "before": "yield a family of \\rho", "after": "exhibit a O((1+", "start_char_pos": 1212, "end_char_pos": 1234}, {"type": "A", "before": null, "after": "\\frac{2", "start_char_pos": 1240, "end_char_pos": 1240}, {"type": "A", "before": null, "after": ")^2)", "start_char_pos": 1253, "end_char_pos": 1253}, {"type": "D", "before": "algorithms in O(m^{\\alpha k", "after": null, "start_char_pos": 1269, "end_char_pos": 1296}, {"type": "R", "before": "\\alpha", "after": "(", "start_char_pos": 1454, "end_char_pos": 1460}, {"type": "A", "before": null, "after": "\\frac{4\\pi+8\\tau+\\tau^2", "start_char_pos": 1467, "end_char_pos": 1467}, {"type": "A", "before": null, "after": ")", "start_char_pos": 1486, "end_char_pos": 1486}, {"type": "D", "before": "grid width", "after": null, "start_char_pos": 1515, "end_char_pos": 1525}, {"type": "R", "before": "2, where \\alpha=O(\\tau^2).", "after": "2.", "start_char_pos": 1543, "end_char_pos": 1569}], "sents_char_pos": [0, 104, 164, 612, 758, 880, 978, 1051, 1176, 1367, 1569]}
+{"doc_id": "2104.00213", "revision_depth": "1", "before_revision": "In this paper, we investigate projection-based intrusive and data-driven non-intrusive model order reduction (MOR) methods in the numerical simulation of the rotating thermal shallow water equation (RTSWE) in parametric and non-parametric form. The RTSWE is a non-canonical Hamiltonian partial differential equation (PDE) with the associated conserved quantities, i.e., Hamiltonian (energy), mass, buoyancy, and the total vorticity. Discretization of the RTSWE in space with centered finite differences leads to Hamiltonian system of ordinary differential equations (ODEs) with linear and quadratic terms. The intrusive reduced-order model (ROM) is constructed with the proper orthogonal decomposition (POD) with the Galerkin projection (POD-G) . We apply the operator inference (OpInf) with re-projection for non-intrusive reduced-order modeling. The OpInf non-intrusively learns a reduced model from state snapshot and time derivative which approximate the evolution of the RTSWE within a low-dimensional subspace. The OpInf data sampling scheme to obtain re-projected trajectories of the RTSWE corresponding to Markovian dynamics in low-dimensional subspaces, recovers of reduced models with high accuracy. In the parametric case, for both methods, we make use of the parameter dependency at the level of the PDE without interpolating between the reduced operators. The least-squares problem of the OpInf is regularized with the minimum norm solution. Both reduced models are able to accurately re-predict the training data and capture much of the overall system behavior in the prediction period. Due to re-projection, the OpInf is more costly than the POG-G, nevertheless, speed-up factors of order two are achieved for both ROMs. Numerical results demonstrate that the conserved quantities of the RTSWE are preserved for both ROMs over time and the long-term stability of the reduced solutions is achieved .", "after_revision": "In this paper, we investigate projection-based intrusive and data-driven non-intrusive model order reduction methods in numerical simulation of rotating thermal shallow water equation (RTSWE) in parametric and non-parametric form. Discretization of the RTSWE in space with centered finite differences leads to Hamiltonian system of ordinary differential equations with linear and quadratic terms. The full-order model (FOM) is obtained by applying linearly implicit Kahan's method in time. Applying proper orthogonal decomposition with Galerkin projection (POD-G) , we construct the intrusive reduced-order model (ROM) . We apply operator inference (OpInf) with re-projection for non-intrusive reduced-order modeling. In the parametric case, we make use of the parameter dependency at the level of the PDE without interpolating between the reduced operators. The least-squares problem of the OpInf is regularized with the minimum norm solution. Both ROMs behave similar and are able to accurately predict the test and training data and capture system behavior in the prediction phase with several orders of computational speedup over the FOM. The preservation of system physics such as the conserved quantities of the RTSWE by both ROMs enables that the models fit better to data and stable solutions are obtained in long-term predictions, which are robust to parameter changes .", "edit_actions": [{"type": "R", "before": "(MOR) methods in the", "after": "methods in", "start_char_pos": 109, "end_char_pos": 129}, {"type": "D", "before": "the", "after": null, "start_char_pos": 154, "end_char_pos": 157}, {"type": "D", "before": "The RTSWE is a non-canonical Hamiltonian partial differential equation (PDE) with the associated conserved quantities, i.e., Hamiltonian (energy), mass, buoyancy, and the total vorticity.", "after": null, "start_char_pos": 245, "end_char_pos": 432}, {"type": "D", "before": "(ODEs)", "after": null, "start_char_pos": 566, "end_char_pos": 572}, {"type": "R", "before": "intrusive reduced-order model (ROM) is constructed with the", "after": "full-order model (FOM) is obtained by applying linearly implicit Kahan's method in time. Applying", "start_char_pos": 610, "end_char_pos": 669}, {"type": "R", "before": "(POD) with the", "after": "with", "start_char_pos": 702, "end_char_pos": 716}, {"type": "A", "before": null, "after": ", we construct the intrusive reduced-order model (ROM)", "start_char_pos": 745, "end_char_pos": 745}, {"type": "D", "before": "the", "after": null, "start_char_pos": 757, "end_char_pos": 760}, {"type": "D", "before": "The OpInf non-intrusively learns a reduced model from state snapshot and time derivative which approximate the evolution of the RTSWE within a low-dimensional subspace. The OpInf data sampling scheme to obtain re-projected trajectories of the RTSWE corresponding to Markovian dynamics in low-dimensional subspaces, recovers of reduced models with high accuracy.", "after": null, "start_char_pos": 849, "end_char_pos": 1210}, {"type": "D", "before": "for both methods,", "after": null, "start_char_pos": 1235, "end_char_pos": 1252}, {"type": "R", "before": "reduced models", "after": "ROMs behave similar and", "start_char_pos": 1461, "end_char_pos": 1475}, {"type": "R", "before": "re-predict the", "after": "predict the test and", "start_char_pos": 1499, "end_char_pos": 1513}, {"type": "D", "before": "much of the overall", "after": null, "start_char_pos": 1540, "end_char_pos": 1559}, {"type": "R", "before": "period. Due to re-projection, the OpInf is more costly than the POG-G, nevertheless, speed-up factors of order two are achieved for both ROMs. Numerical results demonstrate that", "after": "phase with several orders of computational speedup over the FOM. The preservation of system physics such as", "start_char_pos": 1594, "end_char_pos": 1771}, {"type": "R", "before": "are preserved for both ROMs over time and the", "after": "by both ROMs enables that the models fit better to data and stable solutions are obtained in", "start_char_pos": 1810, "end_char_pos": 1855}, {"type": "R", "before": "stability of the reduced solutions is achieved", "after": "predictions, which are robust to parameter changes", "start_char_pos": 1866, "end_char_pos": 1912}], "sents_char_pos": [0, 244, 432, 605, 848, 1017, 1210, 1369, 1455, 1601]}
+{"doc_id": "2104.01131", "revision_depth": "1", "before_revision": "Social media plays a pivotal role in disseminating news across the globe and acts as a platform for people to express their opinions on a variety of topics. COVID-19 vaccination drives across the globe are accompanied by a wide variety of expressed opinions , often colored by emotions . We extracted a corpus of Twitter posts related to COVID-19 vaccination and created two classes of lexical categories- Emotions and Influencing factors. Using unsupervised word embeddings, we tracked the longitudinal change in the latent space of the lexical categories in five countries with strong vaccine roll-out programs, i.e. India, USA , Brazil, UK , and Australia. Nearly 600 thousand vaccine-related tweets from the United States and India were analyzed for an overall understanding of the situation around the world for the time period of 8 months from June 2020 to January 2021. Cosine distance between lexical categories was used to create similarity networks and modules using community detection algorithms . We demonstrate that negative emotions like hesitancy towards vaccines have a high correlation with health-related effects and misinformation. These associations formed a major module with the highest importance in the network formed for January 2021, when millions of vaccines were administered . The relationship between emotions and influencing factors were found to be variable across the countries . By extracting and visualizing these, we propose that such a framework may be helpful in guiding the design of effective vaccine campaigns and can be used by policymakers for modeling vaccine uptake .", "after_revision": "Social media plays a pivotal role in disseminating news globally and acts as a platform for people to express their opinions on various topics. A wide variety of views accompanies COVID-19 vaccination drives across the globe , often colored by emotions , which change along with rising cases, approval of vaccines, and multiple factors discussed online. This study aims at analyzing the temporal evolution of different Emotion categories: Hesitation, Rage, Sorrow, Anticipation, Faith, and Contentment with Influencing Factors: Vaccine Rollout, Misinformation, Health Effects, and Inequities as lexical categories created from Tweets belonging to five countries with vital vaccine roll-out programs, namely, India, United States of America , Brazil, United Kingdom , and Australia. We extracted a corpus of nearly 1.8 million Twitter posts related to COVID-19 vaccination. Using cosine distance from selected seed words, we expanded the vocabulary of each category and tracked the longitudinal change in their strength from June 2020 to April 2021. We used community detection algorithms to find modules in positive correlation networks. Our findings suggest that tweets expressing hesitancy towards vaccines contain the highest mentions of health-related effects in all countries. Our results indicated that the patterns of hesitancy were variable across geographies and can help us learn targeted interventions. We also observed a significant change in the linear trends of categories like hesitation and contentment before and after approval of vaccines. Negative emotions like rage and sorrow gained the highest importance in the alluvial diagram. They formed a significant module with all the influencing factors in April 2021, when India observed the second wave of COVID-19 cases . The relationship between Emotions and Influencing Factors was found to be variable across the countries .", "edit_actions": [{"type": "R", "before": "across the globe", "after": "globally", "start_char_pos": 56, "end_char_pos": 72}, {"type": "R", "before": "a variety of topics.", "after": "various topics. A wide variety of views accompanies", "start_char_pos": 136, "end_char_pos": 156}, {"type": "D", "before": "are accompanied by a wide variety of expressed opinions", "after": null, "start_char_pos": 202, "end_char_pos": 257}, {"type": "R", "before": ". We extracted a corpus of Twitter posts related to COVID-19 vaccination and created two classes of lexical categories- Emotions and Influencing factors. Using unsupervised word embeddings, we tracked the longitudinal change in the latent space of the lexical categories in", "after": ", which change along with rising cases, approval of vaccines, and multiple factors discussed online. This study aims at analyzing the temporal evolution of different Emotion categories: Hesitation, Rage, Sorrow, Anticipation, Faith, and Contentment with Influencing Factors: Vaccine Rollout, Misinformation, Health Effects, and Inequities as lexical categories created from Tweets belonging to", "start_char_pos": 286, "end_char_pos": 559}, {"type": "R", "before": "strong", "after": "vital", "start_char_pos": 580, "end_char_pos": 586}, {"type": "R", "before": "i.e. India, USA", "after": "namely, India, United States of America", "start_char_pos": 614, "end_char_pos": 629}, {"type": "R", "before": "UK", "after": "United Kingdom", "start_char_pos": 640, "end_char_pos": 642}, {"type": "R", "before": "Nearly 600 thousand vaccine-related tweets from the United States and India were analyzed for an overall understanding of the situation around the world for the time period of 8 months", "after": "We extracted a corpus of nearly 1.8 million Twitter posts related to COVID-19 vaccination. Using cosine distance from selected seed words, we expanded the vocabulary of each category and tracked the longitudinal change in their strength", "start_char_pos": 660, "end_char_pos": 844}, {"type": "R", "before": "January", "after": "April", "start_char_pos": 863, "end_char_pos": 870}, {"type": "R", "before": "Cosine distance between lexical categories was used to create similarity networks and modules using", "after": "We used", "start_char_pos": 877, "end_char_pos": 976}, {"type": "R", "before": ". We demonstrate that negative emotions like", "after": "to find modules in positive correlation networks. Our findings suggest that tweets expressing", "start_char_pos": 1008, "end_char_pos": 1052}, {"type": "R", "before": "have a high correlation with", "after": "contain the highest mentions of", "start_char_pos": 1080, "end_char_pos": 1108}, {"type": "R", "before": "and misinformation. These associations formed a major module with the", "after": "in all countries. Our results indicated that the patterns of hesitancy were variable across geographies and can help us learn targeted interventions. We also observed a significant change in the linear trends of categories like hesitation and contentment before and after approval of vaccines. Negative emotions like rage and sorrow gained the", "start_char_pos": 1132, "end_char_pos": 1201}, {"type": "R", "before": "network formed for January", "after": "alluvial diagram. They formed a significant module with all the influencing factors in April", "start_char_pos": 1228, "end_char_pos": 1254}, {"type": "R", "before": "millions of vaccines were administered", "after": "India observed the second wave of COVID-19 cases", "start_char_pos": 1266, "end_char_pos": 1304}, {"type": "R", "before": "emotions and influencing factors were", "after": "Emotions and Influencing Factors was", "start_char_pos": 1332, "end_char_pos": 1369}, {"type": "D", "before": ". By extracting and visualizing these, we propose that such a framework may be helpful in guiding the design of effective vaccine campaigns and can be used by policymakers for modeling vaccine uptake", "after": null, "start_char_pos": 1412, "end_char_pos": 1611}], "sents_char_pos": [0, 156, 287, 439, 659, 876, 1009, 1151, 1306, 1413]}
+{"doc_id": "2104.04572", "revision_depth": "1", "before_revision": "Securing a safe-driving circumstance for connected and autonomous vehicles (CAVs) continues to be a widespread concern despite various sophisticated functions delivered by artificial intelligence for in-vehicle devices. Besides, diverse malicious network attacks become ubiquitous along with the worldwide implementation of the Internet of Vehicles, which exposes a range of reliability and privacy threats for managing data in CAV networks. Combined with another fact that CAVs are now limited in handling intensive computation tasks , it thus renders a pressing demand of designing an efficient assessment system to guarantee autonomous driving safety without compromising data security. To thisend, we propose in this article a novel framework of Blockchain-enabled intElligent Safe-driving assessmenT (BEST) to offer a smart and reliable approach for conducting safe driving supervision while protecting vehicular information. Specifically, a promising solution of exploiting a long short-term memory algorithm is first introduced in detail for an intElligent Safe-driving assessmenT (EST) scheme. To further facilitate the EST, we demonstrate how a distributed blockchain obtains adequate efficiency, trustworthiness and resilience with an adopted byzantine fault tolerance-based delegated proof-of-stake consensus mechanism. Moreover, several challenges and discussions regarding the future research of this BEST architecture are presented .", "after_revision": "Securing safe-driving for connected and autonomous vehicles (CAVs) continues to be a widespread concern despite various sophisticated functions delivered by artificial intelligence for in-vehicle devices. Besides, diverse malicious network attacks become ubiquitous along with the worldwide implementation of the Internet of Vehicles, which exposes a range of reliability and privacy threats for managing data in CAV networks. Combined with the fact that the capability of existing CAVs in handling intensive computation tasks is limited, this implies a need for designing an efficient assessment system to guarantee autonomous driving safety without compromising data security. Motivated by this, in this article , we propose a novel framework , namely Blockchain-enabled intElligent Safe-driving assessmenT (BEST) , that offers a smart and reliable approach for conducting safe driving supervision while protecting vehicular information. Specifically, a promising solution that exploits a long short-term memory model is introduced to assess the safety level of the moving CAVs. Then, we investigate how a distributed blockchain obtains adequate trustworthiness and robustness for CAV data by adopting a byzantine fault tolerance-based delegated proof-of-stake consensus mechanism. Simulation results demonstrate that our presented BEST gains better data credibility with a higher prediction accuracy for vehicular safety assessment when compared with existing schemes. Finally, we discuss several open challenges that need to be addressed in future CAV networks .", "edit_actions": [{"type": "D", "before": "a", "after": null, "start_char_pos": 9, "end_char_pos": 10}, {"type": "D", "before": "circumstance", "after": null, "start_char_pos": 24, "end_char_pos": 36}, {"type": "R", "before": "another fact that CAVs are now limited", "after": "the fact that the capability of existing CAVs", "start_char_pos": 456, "end_char_pos": 494}, {"type": "R", "before": ", it thus renders a pressing demand of", "after": "is limited, this implies a need for", "start_char_pos": 535, "end_char_pos": 573}, {"type": "R", "before": "To thisend, we propose", "after": "Motivated by this,", "start_char_pos": 690, "end_char_pos": 712}, {"type": "A", "before": null, "after": ", we propose", "start_char_pos": 729, "end_char_pos": 729}, {"type": "R", "before": "of", "after": ", namely", "start_char_pos": 748, "end_char_pos": 750}, {"type": "R", "before": "to offer", "after": ", that offers", "start_char_pos": 813, "end_char_pos": 821}, {"type": "R", "before": "of exploiting", "after": "that exploits", "start_char_pos": 967, "end_char_pos": 980}, {"type": "R", "before": "algorithm is first introduced in detail for an intElligent Safe-driving assessmenT (EST) scheme. To further facilitate the EST, we demonstrate", "after": "model is introduced to assess the safety level of the moving CAVs. Then, we investigate", "start_char_pos": 1006, "end_char_pos": 1148}, {"type": "R", "before": "efficiency, trustworthiness and resilience with an adopted", "after": "trustworthiness and robustness for CAV data by adopting a", "start_char_pos": 1195, "end_char_pos": 1253}, {"type": "R", "before": "Moreover, several challenges and discussions regarding the future research of this BEST architecture are presented", "after": "Simulation results demonstrate that our presented BEST gains better data credibility with a higher prediction accuracy for vehicular safety assessment when compared with existing schemes. Finally, we discuss several open challenges that need to be addressed in future CAV networks", "start_char_pos": 1332, "end_char_pos": 1446}], "sents_char_pos": [0, 219, 441, 689, 931, 1102, 1331]}
+{"doc_id": "2104.04731", "revision_depth": "1", "before_revision": "The success of Deep Artificial Neural Networks (DNNs) in many domains created a rich body of research concerned with hardware accelerators for compute-intensive DNN operators. However, implementing such operators efficiently with complex instructions such as matrix multiply is a task not yet automated gracefully. Solving this task often requires complex program and memory layout transformations . First solutions to this problem have been proposed, such as TVM or ISAMIR, which work on a loop-level representation of operators and rewrite the program before an instruction embedding into the operator is performed . This top-down approach creates a tension between exploration range and search space complexity .In this work, we propose a new approach to this problem. We have created a bottom-up method that allows the direct generation of implementations based on an accelerator's instruction set . By formulating the embedding as a constraint satisfaction problem over the scalar dataflow, every possible embedding solution is contained in the search space. By adding additional constraints , a solver can produce the subset of preferable solutions. A detailed evaluation using the VTA hardware accelerator with the Baidu DeepBench inference benchmark suite shows that our approach can automatically generate code competitive to reference implementations , and furthermore that memory layout flexibilty can be beneficial for overall performance. While the reference implementation achieves very low hardware utilization due to its fixed embedding strategy, we achieve a geomean speedup of up to x2 .49, while individual operators can improve as much as x238 .", "after_revision": "The success of Deep Artificial Neural Networks (DNNs) in many domains created a rich body of research concerned with hardwareaccelerators for compute-intensive DNN operators. However, implementing such operators efficiently with complex hardwareintrinsics such as matrix multiply is a task not yet automated gracefully. Solving this task often requires joint program and data layouttransformations . First solutions to this problem have been proposed, such as TVM , UNIT or ISAMIR, which work on a loop-levelrepresentation of operators and specify data layout and possible program transformations before the embedding into the operator isperformed . This top-down approach creates a tension between exploration range and search space complexity , especially when alsoexploring data layout transformations such as im2col, channel packing or padding .In this work, we propose a new approach to this problem. We created a bottom-up method that allows the joint transformation ofboth compuation and data layout based on the found embedding . By formulating the embedding as a constraint satisfaction problemover the scalar dataflow, every possible embedding solution is contained in the search space. Adding additional constraints andoptmization targets to the solver generates the subset of preferable solutions. An evaluation using the VTA hardware accelerator with the Baidu DeepBench inference benchmark shows that our approach canautomatically generate code competitive to reference implementations . Further, we show that dynamically determining the data layoutbased on intrinsic and workload is beneficial for hardware utilization and performance. In cases where the reference implementationhas low hardware utilization due to its fixed deployment strategy, we achieve a geomean speedup of up to x2 .813, while individualoperators can improve as much as x170 .", "edit_actions": [{"type": "R", "before": "hardware accelerators", "after": "hardwareaccelerators", "start_char_pos": 117, "end_char_pos": 138}, {"type": "R", "before": "instructions", "after": "hardwareintrinsics", "start_char_pos": 238, "end_char_pos": 250}, {"type": "R", "before": "complex program and memory layout transformations", "after": "joint program and data layouttransformations", "start_char_pos": 348, "end_char_pos": 397}, {"type": "A", "before": null, "after": ", UNIT", "start_char_pos": 464, "end_char_pos": 464}, {"type": "R", "before": "loop-level representation", "after": "loop-levelrepresentation", "start_char_pos": 492, "end_char_pos": 517}, {"type": "R", "before": "rewrite the program before an instruction", "after": "specify data layout and possible program transformations before the", "start_char_pos": 535, "end_char_pos": 576}, {"type": "R", "before": "is performed", "after": "isperformed", "start_char_pos": 605, "end_char_pos": 617}, {"type": "A", "before": null, "after": ", especially when alsoexploring data layout transformations such as im2col, channel packing or padding", "start_char_pos": 715, "end_char_pos": 715}, {"type": "D", "before": "have", "after": null, "start_char_pos": 777, "end_char_pos": 781}, {"type": "R", "before": "direct generation of implementations based on an accelerator's instruction set", "after": "joint transformation ofboth compuation and data layout based on the found embedding", "start_char_pos": 825, "end_char_pos": 903}, {"type": "R", "before": "problem over", "after": "problemover", "start_char_pos": 964, "end_char_pos": 976}, {"type": "R", "before": "By adding additional constraints , a solver can produce", "after": "Adding additional constraints andoptmization targets to the solver generates", "start_char_pos": 1066, "end_char_pos": 1121}, {"type": "R", "before": "A detailed", "after": "An", "start_char_pos": 1158, "end_char_pos": 1168}, {"type": "D", "before": "suite", "after": null, "start_char_pos": 1260, "end_char_pos": 1265}, {"type": "R", "before": "can automatically", "after": "canautomatically", "start_char_pos": 1290, "end_char_pos": 1307}, {"type": "R", "before": ", and furthermore that memory layout flexibilty can be beneficial for overall performance. While the reference implementation achieves very", "after": ". Further, we show that dynamically determining the data layoutbased on intrinsic and workload is beneficial for hardware utilization and performance. In cases where the reference implementationhas", "start_char_pos": 1363, "end_char_pos": 1502}, {"type": "R", "before": "embedding", "after": "deployment", "start_char_pos": 1545, "end_char_pos": 1554}, {"type": "R", "before": ".49, while individual operators", "after": ".813, while individualoperators", "start_char_pos": 1606, "end_char_pos": 1637}, {"type": "R", "before": "x238", "after": "x170", "start_char_pos": 1661, "end_char_pos": 1665}], "sents_char_pos": [0, 175, 314, 399, 619, 717, 773, 905, 1065, 1157, 1453]}
+{"doc_id": "2104.04945", "revision_depth": "1", "before_revision": "We propose an enhancement technique of the Class Activation Mapping methods like Grad-CAM or Excitation Backpropagation, which presents visual explanations of decisions from CNN-based models. Our idea, called Gradual Extrapolation, can supplement any method that generates a heatmap picture by sharpening the output. Instead of producing a coarse localization map highlighting the important predictive regions in the image, our method outputs the specific shape that most contributes to the model output. Thus, it improves the accuracy of saliency maps. Effect has been achieved by gradual propagation of the crude map obtained in deep layer through all preceding layers with respect to their activations. In validation tests conducted on a selected set of images, the proposed method significantly improved the localization detection of the neural networks ' attention . Furthermore, the proposed method is applicable to any deep neural network model.", "after_revision": "In this paper, an enhancement technique for the class activation mapping methods such as gradient-weighted class activation maps or excitation backpropagation is proposed to present the visual explanations of decisions from convolutional neural network-based models. The proposed idea, called Gradual Extrapolation, can supplement any method that generates a heatmap picture by sharpening the output. Instead of producing a coarse localization map that highlights the important predictive regions in the image, the proposed method outputs the specific shape that most contributes to the model output. Thus, the proposed method improves the accuracy of saliency maps. The effect has been achieved by the gradual propagation of the crude map obtained in the deep layer through all preceding layers with respect to their activations. In validation tests conducted on a selected set of images, the faithfulness, interpretability, and applicability of the method are evaluated. The proposed technique significantly improves the localization detection of the neural networks attention at low additional computational costs . Furthermore, the proposed method is applicable to a variety deep neural network models. The code for the method can be found at URL", "edit_actions": [{"type": "R", "before": "We propose", "after": "In this paper,", "start_char_pos": 0, "end_char_pos": 10}, {"type": "R", "before": "of the Class Activation Mapping methods like Grad-CAM or Excitation Backpropagation, which presents", "after": "for the class activation mapping methods such as gradient-weighted class activation maps or excitation backpropagation is proposed to present the", "start_char_pos": 36, "end_char_pos": 135}, {"type": "R", "before": "CNN-based models. Our", "after": "convolutional neural network-based models. The proposed", "start_char_pos": 174, "end_char_pos": 195}, {"type": "R", "before": "highlighting", "after": "that highlights", "start_char_pos": 364, "end_char_pos": 376}, {"type": "R", "before": "our", "after": "the proposed", "start_char_pos": 424, "end_char_pos": 427}, {"type": "R", "before": "it", "after": "the proposed method", "start_char_pos": 511, "end_char_pos": 513}, {"type": "R", "before": "Effect", "after": "The effect", "start_char_pos": 554, "end_char_pos": 560}, {"type": "A", "before": null, "after": "the", "start_char_pos": 582, "end_char_pos": 582}, {"type": "A", "before": null, "after": "the", "start_char_pos": 632, "end_char_pos": 632}, {"type": "R", "before": "proposed method significantly improved", "after": "faithfulness, interpretability, and applicability of the method are evaluated. The proposed technique significantly improves", "start_char_pos": 771, "end_char_pos": 809}, {"type": "R", "before": "' attention", "after": "attention at low additional computational costs", "start_char_pos": 860, "end_char_pos": 871}, {"type": "R", "before": "any", "after": "a variety", "start_char_pos": 924, "end_char_pos": 927}, {"type": "R", "before": "model.", "after": "models. The code for the method can be found at URL", "start_char_pos": 948, "end_char_pos": 954}], "sents_char_pos": [0, 191, 316, 504, 553, 707, 873]}
+{"doc_id": "2104.08570", "revision_depth": "1", "before_revision": "Despite the fact that natural language conversations with machines represent one of the central objectives of AI , and despite the massive increase of research and development efforts in conversational AI, task-oriented dialogue (ToD) -- i.e., conversations with an artificial agent with the aim of completing a concrete task -- is currently limited to a few narrow domains (e.g., food ordering, ticket booking) and a handful of major languages (e.g., English, Chinese). In this work , we provide an extensive overview of existing efforts in multilingual ToD and analyse the factors preventing the development of truly multilingual ToD systems . We identify two main challenges that combined hinder the faster progress in multilingual ToD: (1) current state-of-the-art ToD models based on large pretrained neural language models are data hungry; at the same time (2) data acquisition for ToD use cases is expensive and tedious. Most existing approaches to multilingual ToD thus rely on (zero- or few-shot) cross-lingual transfer from resource-rich languages ( in ToD, this is basically only English), either by means of (i) machine translation or (ii) multilingual representation spaces. However, such approaches are currently not a viable solution for a large number of low-resource languages without parallel data and /or limited monolingual corpora . Finally, we discuss critical challenges and potential solutions by drawing parallels between ToD and other cross-lingual and multilingual NLP research .", "after_revision": "In task-oriented dialogue (ToD), a user holds a conversation with an artificial agent to complete a concrete task. Although this technology represents one of the central objectives of AI and has been the focus of ever more intense research and development efforts , it is currently limited to a few narrow domains (e.g., food ordering, ticket booking) and a handful of languages (e.g., English, Chinese). This work provides an extensive overview of existing methods and resources in multilingual ToD as an entry point to this exciting and emerging field. We find that the most critical factor preventing the creation of truly multilingual ToD systems is the lack of datasets in most languages for both training and evaluation. In fact, acquiring annotations or human feedback for each component of modular systems or for data-hungry end-to-end systems is expensive and tedious. Hence, state-of-the-art approaches to multilingual ToD mostly rely on (zero- or few-shot) cross-lingual transfer from resource-rich languages ( almost exclusively English), either by means of machine translation or multilingual representations. These approaches are currently viable only for typologically similar languages and languages with parallel / monolingual corpora available. On the other hand, their effectiveness beyond these boundaries is doubtful or hard to assess due to the lack of linguistically diverse benchmarks (especially for natural language generation and end-to-end evaluation). To overcome this limitation, we draw parallels between components of the ToD pipeline and other NLP tasks, which can inspire solutions for learning in low-resource scenarios. Finally, we list additional challenges that multilinguality poses for related areas (such as speech and human-centred evaluation), and indicate future directions that hold promise to further expand language coverage and dialogue capabilities of current ToD systems .", "edit_actions": [{"type": "R", "before": "Despite the fact that natural language conversations with machines represent", "after": "In task-oriented dialogue (ToD), a user holds a conversation with an artificial agent to complete a concrete task. Although this technology represents", "start_char_pos": 0, "end_char_pos": 76}, {"type": "R", "before": ", and despite the massive increase of", "after": "and has been the focus of ever more intense", "start_char_pos": 113, "end_char_pos": 150}, {"type": "R", "before": "in conversational AI, task-oriented dialogue (ToD) -- i.e., conversations with an artificial agent with the aim of completing a concrete task --", "after": ", it", "start_char_pos": 184, "end_char_pos": 328}, {"type": "D", "before": "major", "after": null, "start_char_pos": 429, "end_char_pos": 434}, {"type": "R", "before": "In this work , we provide", "after": "This work provides", "start_char_pos": 471, "end_char_pos": 496}, {"type": "R", "before": "efforts", "after": "methods and resources", "start_char_pos": 531, "end_char_pos": 538}, {"type": "R", "before": "and analyse the factors preventing the development", "after": "as an entry point to this exciting and emerging field. We find that the most critical factor preventing the creation", "start_char_pos": 559, "end_char_pos": 609}, {"type": "R", "before": ". We identify two main challenges that combined hinder the faster progress in multilingual ToD: (1) current state-of-the-art ToD models based on large pretrained neural language models are data hungry; at the same time (2) data acquisition for ToD use cases", "after": "is the lack of datasets in most languages for both training and evaluation. In fact, acquiring annotations or human feedback for each component of modular systems or for data-hungry end-to-end systems", "start_char_pos": 644, "end_char_pos": 901}, {"type": "R", "before": "Most existing", "after": "Hence, state-of-the-art", "start_char_pos": 928, "end_char_pos": 941}, {"type": "R", "before": "thus", "after": "mostly", "start_char_pos": 973, "end_char_pos": 977}, {"type": "R", "before": "in ToD, this is basically only", "after": "almost exclusively", "start_char_pos": 1060, "end_char_pos": 1090}, {"type": "D", "before": "(i)", "after": null, "start_char_pos": 1120, "end_char_pos": 1123}, {"type": "R", "before": "(ii) multilingual representation spaces. However, such", "after": "multilingual representations. These", "start_char_pos": 1147, "end_char_pos": 1201}, {"type": "R", "before": "not a viable solution for a large number of low-resource languages without parallel data and /or limited monolingual corpora . Finally, we discuss critical challenges and potential solutions by drawing parallels between ToD", "after": "viable only for typologically similar languages", "start_char_pos": 1227, "end_char_pos": 1450}, {"type": "R", "before": "other cross-lingual and multilingual NLP research", "after": "languages with parallel / monolingual corpora available. On the other hand, their effectiveness beyond these boundaries is doubtful or hard to assess due to the lack of linguistically diverse benchmarks (especially for natural language generation and end-to-end evaluation). To overcome this limitation, we draw parallels between components of the ToD pipeline and other NLP tasks, which can inspire solutions for learning in low-resource scenarios. Finally, we list additional challenges that multilinguality poses for related areas (such as speech and human-centred evaluation), and indicate future directions that hold promise to further expand language coverage and dialogue capabilities of current ToD systems", "start_char_pos": 1455, "end_char_pos": 1504}], "sents_char_pos": [0, 470, 645, 845, 927, 1187, 1353]}
+{"doc_id": "2104.12265", "revision_depth": "2", "before_revision": "This paper presents a new approach for offensive language and hate speech detection on social media. Our approach incorporate an offensive lexicon composed by implicit and explicit offensive and swearing expressions annotated with binary classes: context-dependent and context-independent offensive. Due to the severity of the hate speech and offensive comments in Brazil, and the lack of research in Portuguese, Brazilian Portuguese is the language used to validate our method. However, the proposal may be applied to any other language or domain. Based on the obtained results, the proposed approach showed high performance results overcoming the current baselines for European and Brazilian Portuguese.", "after_revision": "This paper provides a new approach for offensive language and hate speech detection on social media. Our approach incorporates an offensive lexicon composed of implicit and explicit offensive and swearing expressions annotated with binary classes: context-dependent and context-independent offensive. Due to the severity of the hate speech and offensive comments in Brazil, and the lack of research in Portuguese, Brazilian Portuguese is the language used to validate the proposed method. Nevertheless, our proposal may be applied to any other language or domain. Based on the obtained results, the proposed approach showed high-performance overcoming the current baselines for European and Brazilian Portuguese.", "edit_actions": [{"type": "R", "before": "presents", "after": "provides", "start_char_pos": 11, "end_char_pos": 19}, {"type": "R", "before": "incorporate", "after": "incorporates", "start_char_pos": 114, "end_char_pos": 125}, {"type": "R", "before": "by", "after": "of", "start_char_pos": 156, "end_char_pos": 158}, {"type": "R", "before": "our method. However, the", "after": "the proposed method. Nevertheless, our", "start_char_pos": 467, "end_char_pos": 491}, {"type": "R", "before": "high performance results", "after": "high-performance", "start_char_pos": 609, "end_char_pos": 633}], "sents_char_pos": [0, 100, 299, 478, 548]}
+{"doc_id": "2104.12345", "revision_depth": "1", "before_revision": "Lie detection is considered a concern for everyone in their day to day life given its impact on human interactions. Hence, people are normally not only pay attention to what their interlocutors are saying but also try to inspect their visual appearances, including faces, to find any signs that indicate whether the person is telling the truth or not. Unfortunately to date, the automatic lie detection , which may help us to understand this lying characteristics are still fairly limited . Mainly due to lack of a lie dataset and corresponding evaluations . In this work, we have collected a dataset that contains annotated images and 3D information of different participants faces during a card game that incentivise the lying . Using our collected dataset, we evaluated several types of machine learning based lie detector through generalize, personal and cross lie lie experiments. In these experiments, we showed the superiority of deep learning based model in recognizing the lie with best accuracyof 57\\\\%DIF < for generalized task and 63\\\\% when dealing with a single participant. Finally, we also highlight the limitation of the deep learning based lie detector when dealing with different types of lie tasks.\\end{abstract} %DIF > for the generalization task and 63\\\\% when dealing with a single participant. Finally, we also highlight the limitation of the deep learning based lie detector when dealing with cross-domain lie detection tasks.", "after_revision": "Lie detection is considered a concern for everyone in their day to day life given its impact on human interactions. Thus, people normally pay attention to both what their interlocutors are saying and also to their visual appearances, including faces, to try to find any signs that indicate whether the person is telling the truth or not. While automatic lie detection may help us to understand this lying characteristics , current systems are still fairly limited , partly due to lack of adequate datasets to evaluate their performance in realistic scenarios . In this work, we have collected an annotated dataset of facial images, comprising both 2D and 3D information of several participants during a card game that encourages players to lie . Using our collected dataset, We evaluated several types of machine learning-based lie detectors in terms of their generalization, person-specific and cross-domain experiments. Our results show that models based on deep learning achieve the best accuracy, reaching up to 57\\\\%DIF < for generalized task and 63\\\\% when dealing with a single participant. Finally, we also highlight the limitation of the deep learning based lie detector when dealing with different types of lie tasks.\\end{abstract} %DIF > for the generalization task and 63\\\\% when dealing with a single participant. Finally, we also highlight the limitation of the deep learning based lie detector when dealing with cross-domain lie detection tasks.", "edit_actions": [{"type": "R", "before": "Hence, people are normally not only", "after": "Thus, people normally", "start_char_pos": 116, "end_char_pos": 151}, {"type": "A", "before": null, "after": "both", "start_char_pos": 169, "end_char_pos": 169}, {"type": "R", "before": "but also try to inspect", "after": "and also to", "start_char_pos": 206, "end_char_pos": 229}, {"type": "A", "before": null, "after": "try to", "start_char_pos": 276, "end_char_pos": 276}, {"type": "R", "before": "Unfortunately to date, the", "after": "While", "start_char_pos": 354, "end_char_pos": 380}, {"type": "D", "before": ", which", "after": null, "start_char_pos": 405, "end_char_pos": 412}, {"type": "A", "before": null, "after": ", current systems", "start_char_pos": 466, "end_char_pos": 466}, {"type": "R", "before": ". Mainly", "after": ", partly", "start_char_pos": 492, "end_char_pos": 500}, {"type": "R", "before": "a lie dataset and corresponding evaluations", "after": "adequate datasets to evaluate their performance in realistic scenarios", "start_char_pos": 516, "end_char_pos": 559}, {"type": "R", "before": "a dataset that contains annotated images", "after": "an annotated dataset of facial images, comprising both 2D", "start_char_pos": 594, "end_char_pos": 634}, {"type": "R", "before": "different participants faces", "after": "several participants", "start_char_pos": 657, "end_char_pos": 685}, {"type": "R", "before": "incentivise the lying", "after": "encourages players to lie", "start_char_pos": 710, "end_char_pos": 731}, {"type": "R", "before": "we", "after": "We", "start_char_pos": 763, "end_char_pos": 765}, {"type": "R", "before": "learning based lie detector through generalize, personal and cross lie lie experiments. In these experiments, we showed the superiority of deep learning based model in recognizing the lie with best accuracyof", "after": "learning-based lie detectors in terms of their generalization, person-specific and cross-domain experiments. Our results show that models based on deep learning achieve the best accuracy, reaching up to", "start_char_pos": 801, "end_char_pos": 1009}], "sents_char_pos": [0, 115, 353, 561, 733, 888, 1091, 1221, 1320]}
+{"doc_id": "2104.13640", "revision_depth": "1", "before_revision": "Societal biases resonate in the retrieved contents of information retrieval (IR) systems, resulting in reinforcing existing stereotypes. Approaching this issue requires established measures of fairness regarding the representation of various social groups in retrieved contents , as well as methods to mitigate such biases, particularly in the light of the advances in deep ranking models. In this work, we first provide a novel framework to measure the fairness in the retrieved text contents of ranking models. Introducing a ranker-agnostic measurement, the framework also enables the disentanglement of the effect on fairness of collection from that of rankers. Second , we propose an adversarial bias mitigation approach applied to the state-of-the-art Bert rankers , which jointly learns to predict relevance and remove protected attributes. We conduct experiments on two passage retrieval collections ( MS MARCO Passage Re-ranking and TREC Deep Learning 2019 Passage Re-ranking), which we extend by fairness annotations of a selected subset of queries regarding gender attributes. Our results on the MS MARCO benchmark show that, while the fairness of all ranking models is lower than the ones of ranker-agnostic baselines, the fairness in retrieved contents significantly improves when applying the proposed adversarial training . Lastly, we investigate the trade-off between fairness and utility, showing that through applying a combinatorial model selection method, we can maintain the significant improvements in fairness without any significant loss in utility.", "after_revision": "Societal biases resonate in the retrieved contents of information retrieval (IR) systems, resulting in reinforcing existing stereotypes. Approaching this issue requires established measures of fairness in respect to the representation of various social groups in retrieval results , as well as methods to mitigate such biases, particularly in the light of the advances in deep ranking models. In this work, we first provide a novel framework to measure the fairness in the retrieved text contents of ranking models. Introducing a ranker-agnostic measurement, the framework also enables the disentanglement of the effect on fairness of collection from that of rankers. To mitigate these biases , we propose AdvBert, a ranking model achieved by adapting adversarial bias mitigation for IR , which jointly learns to predict relevance and remove protected attributes. We conduct experiments on two passage retrieval collections ( MSMARCO Passage Re-ranking and TREC Deep Learning 2019 Passage Re-ranking), which we extend by fairness annotations of a selected subset of queries regarding gender attributes. Our results on the MSMARCO benchmark show that, (1) all ranking models are less fair in comparison with ranker-agnostic baselines, and (2) the fairness of Bert rankers significantly improves when using the proposed AdvBert models . Lastly, we investigate the trade-off between fairness and utility, showing that we can maintain the significant improvements in fairness without any significant loss in utility.", "edit_actions": [{"type": "R", "before": "regarding", "after": "in respect to", "start_char_pos": 202, "end_char_pos": 211}, {"type": "R", "before": "retrieved contents", "after": "retrieval results", "start_char_pos": 259, "end_char_pos": 277}, {"type": "R", "before": "Second", "after": "To mitigate these biases", "start_char_pos": 665, "end_char_pos": 671}, {"type": "R", "before": "an", "after": "AdvBert, a ranking model achieved by adapting", "start_char_pos": 685, "end_char_pos": 687}, {"type": "R", "before": "approach applied to the state-of-the-art Bert rankers", "after": "for IR", "start_char_pos": 716, "end_char_pos": 769}, {"type": "R", "before": "MS MARCO", "after": "MSMARCO", "start_char_pos": 909, "end_char_pos": 917}, {"type": "R", "before": "MS MARCO", "after": "MSMARCO", "start_char_pos": 1106, "end_char_pos": 1114}, {"type": "R", "before": "while the fairness of", "after": "(1)", "start_char_pos": 1136, "end_char_pos": 1157}, {"type": "R", "before": "is lower than the ones of", "after": "are less fair in comparison with", "start_char_pos": 1177, "end_char_pos": 1202}, {"type": "R", "before": "the fairness in retrieved contents", "after": "and (2) the fairness of Bert rankers", "start_char_pos": 1230, "end_char_pos": 1264}, {"type": "R", "before": "applying the proposed adversarial training", "after": "using the proposed AdvBert models", "start_char_pos": 1293, "end_char_pos": 1335}, {"type": "D", "before": "through applying a combinatorial model selection method,", "after": null, "start_char_pos": 1418, "end_char_pos": 1474}], "sents_char_pos": [0, 136, 389, 512, 664, 846, 1086]}
+{"doc_id": "2104.14654", "revision_depth": "1", "before_revision": "Mean field games (MFG) facilitate the otherwise intractable reinforcement learning (RL) in large-scale multi-agent systems (MAS) , through reducing interplays among agents to those between a representative individual agent and the mass of the population. While , RL agents are notoriously prone to unexpected behaviours due to reward mis-specification. This problem is exacerbated by an expanding scale of MAS. Inverse reinforcement learning (IRL) provides a framework to automatically acquire proper reward functions from expert demonstrations. Extending IRL to MFG , however, is challenging due to the complex notion of mean-field-type equilibria and the coupling between agent-level and population-level dynamics. To this end, we propose mean field inverse reinforcement learning (MFIRL), a novel model-free IRL framework for MFG . We derive the algorithm based on a new equilibrium concept that incorporates entropy regularization, and the maximum entropy IRL framework. Experimental results on simulated environments demonstrate that MFIRL is sample efficient and can accurately recover the ground-truth reward functions , compared to the state-of-the-art method.", "after_revision": "Mean field games (MFG) facilitate the application of reinforcement learning (RL) in large-scale multi-agent systems , through reducing interplays among agents to those between an individual agent and the average effect from the population. However , RL agents are notoriously prone to unexpected behaviours due to the reward mis-specification. Although inverse RL (IRL) holds promise for automatically acquiring suitable rewards from demonstrations, its extension to MFG is challenging due to the complicated notion of mean-field-type equilibria and the coupling between agent-level and population-level dynamics. To this end, we propose a novel IRL framework for MFG , called Mean Field IRL (MFIRL), where we build upon a new equilibrium concept and the maximum entropy IRL framework. Crucially, MFIRL is brought forward as the first IRL method that can recover the agent-level ( ground-truth ) reward functions for MFG. Experiments show the superior performance of MFIRL on sample efficiency, reward recovery and robustness against varying environment dynamics , compared to the state-of-the-art method.", "edit_actions": [{"type": "R", "before": "otherwise intractable", "after": "application of", "start_char_pos": 38, "end_char_pos": 59}, {"type": "D", "before": "(MAS)", "after": null, "start_char_pos": 123, "end_char_pos": 128}, {"type": "R", "before": "a representative", "after": "an", "start_char_pos": 189, "end_char_pos": 205}, {"type": "R", "before": "mass of", "after": "average effect from", "start_char_pos": 231, "end_char_pos": 238}, {"type": "R", "before": "While", "after": "However", "start_char_pos": 255, "end_char_pos": 260}, {"type": "A", "before": null, "after": "the", "start_char_pos": 327, "end_char_pos": 327}, {"type": "R", "before": "This problem is exacerbated by an expanding scale of MAS. Inverse reinforcement learning", "after": "Although inverse RL", "start_char_pos": 354, "end_char_pos": 442}, {"type": "R", "before": "provides a framework to automatically acquire proper reward functions from expert demonstrations. Extending IRL to MFG , however,", "after": "holds promise for automatically acquiring suitable rewards from demonstrations, its extension to MFG", "start_char_pos": 449, "end_char_pos": 578}, {"type": "R", "before": "complex", "after": "complicated", "start_char_pos": 605, "end_char_pos": 612}, {"type": "R", "before": "mean field inverse reinforcement learning (MFIRL), a novel model-free", "after": "a novel", "start_char_pos": 742, "end_char_pos": 811}, {"type": "R", "before": ". We derive the algorithm based on", "after": ", called Mean Field IRL (MFIRL), where we build upon", "start_char_pos": 834, "end_char_pos": 868}, {"type": "D", "before": "that incorporates entropy regularization,", "after": null, "start_char_pos": 895, "end_char_pos": 936}, {"type": "R", "before": "Experimental results on simulated environments demonstrate that MFIRL is sample efficient and can accurately recover the", "after": "Crucially, MFIRL is brought forward as the first IRL method that can recover the agent-level (", "start_char_pos": 976, "end_char_pos": 1096}, {"type": "R", "before": "reward functions", "after": ") reward functions for MFG. Experiments show the superior performance of MFIRL on sample efficiency, reward recovery and robustness against varying environment dynamics", "start_char_pos": 1110, "end_char_pos": 1126}], "sents_char_pos": [0, 254, 353, 411, 546, 717, 975]}
+{"doc_id": "2105.03052", "revision_depth": "1", "before_revision": "This work considers a novel information design problem and studies how the craft of payoff-relevant environmental signals solely can influence the behaviors of intelligent agents. The agents' strategic interactions are captured by an incomplete-information Markov game, in which each agent first selects one environmental signal from multiple signal sources as additional payoff-relevant information and then takes an action. There is a rational information designer (principal) who possesses one signal source and aims to control the equilibrium behaviors of the agents by designing the information structure of her signals sent to the agents. An obedient principle is established which states that it is without loss of generality to focus on the direct information design when the information design incentivizes each agent to select the signal sent by the principal, such that the design process avoids the predictions of the agents' strategic selection behaviors. Based on the obedient principle, we introduce the design protocol given a goal of the principal referred to as obedient implementability (OIL) and study a Myersonian information design that characterizes the OIL in a class of obedient sequential Markov perfect Bayesian equilibria (O-SMPBE ). A framework is proposed based on an approach which we refer to as the fixed-point alignment that incentivizes the agents to choose the signal sent by the principal, makes sure that the agents' policy profile of taking actions is the policy component of an O-SMPBE, and the principal's goal is achieved . The proposed approach can be applied to elicit desired behaviors of multi-agent systems in competing as well as cooperating settings and be extended to heterogeneous stochastic games in the complete- and the incomplete-information environments.", "after_revision": "This work considers a novel information design problem and studies how the craft of payoff-relevant environmental signals solely can influence the behaviors of intelligent agents. The agents' strategic interactions are captured by a Markov game, in which each agent first selects one external signal from multiple signal sources as additional payoff-relevant information and then takes an action. There is a rational information designer (principal) who possesses one signal source and aims to influence the equilibrium behaviors of the agents by designing the information structure of her signals sent to the agents. We propose a direct information design approach that incentivizes each agent to select the signal sent by the principal, such that the design process avoids the predictions of the agents' strategic selection behaviors. We then introduce the design protocol given a goal of the designer which we refer to as obedient implementability (OIL) and characterize the OIL in a class of obedient sequential Markov perfect equilibria (O-SMPE ). A design regime is proposed based on an approach which we refer to as the fixed-point alignment that incentivizes the agents to choose the signal sent by the principal, guarantees that the agents' policy profile of taking actions is the policy component of an O-SMPE and the principal's goal is achieved . We then formulate the principal's optimal goal selection problem in terms of information design and characterize the optimization problem by minimizing the fixed-point misalignments . The proposed approach can be applied to elicit desired behaviors of multi-agent systems in competing as well as cooperating settings and be extended to heterogeneous stochastic games in the complete- and the incomplete-information environments.", "edit_actions": [{"type": "R", "before": "an incomplete-information", "after": "a", "start_char_pos": 231, "end_char_pos": 256}, {"type": "R", "before": "environmental", "after": "external", "start_char_pos": 308, "end_char_pos": 321}, {"type": "R", "before": "control", "after": "influence", "start_char_pos": 523, "end_char_pos": 530}, {"type": "R", "before": "An obedient principle is established which states that it is without loss of generality to focus on the", "after": "We propose a", "start_char_pos": 645, "end_char_pos": 748}, {"type": "R", "before": "when the information design", "after": "approach that", "start_char_pos": 775, "end_char_pos": 802}, {"type": "R", "before": "Based on the obedient principle, we", "after": "We then", "start_char_pos": 969, "end_char_pos": 1004}, {"type": "R", "before": "principal referred", "after": "designer which we refer", "start_char_pos": 1055, "end_char_pos": 1073}, {"type": "R", "before": "study a Myersonian information design that characterizes", "after": "characterize", "start_char_pos": 1116, "end_char_pos": 1172}, {"type": "R", "before": "Bayesian equilibria (O-SMPBE", "after": "equilibria (O-SMPE", "start_char_pos": 1230, "end_char_pos": 1258}, {"type": "R", "before": "framework", "after": "design regime", "start_char_pos": 1264, "end_char_pos": 1273}, {"type": "R", "before": "makes sure", "after": "guarantees", "start_char_pos": 1427, "end_char_pos": 1437}, {"type": "R", "before": "O-SMPBE,", "after": "O-SMPE", "start_char_pos": 1518, "end_char_pos": 1526}, {"type": "A", "before": null, "after": ". We then formulate the principal's optimal goal selection problem in terms of information design and characterize the optimization problem by minimizing the fixed-point misalignments", "start_char_pos": 1564, "end_char_pos": 1564}], "sents_char_pos": [0, 179, 425, 644, 968, 1261, 1566]}
+{"doc_id": "2105.03625", "revision_depth": "1", "before_revision": "Making profits in stock market is a challenging task for both professional institutional investors and individual traders . With the development combination of quantitative trading and reinforcement learning, more trading algorithms have achieved significant gains beyond the benchmark model Buy Hold (B H) . There is a certain gap between these algorithms and the real trading decision making scenarios. On the one hand, they only consider trading signals while ignoring the number of transactions. On the other hand, the information level considered by these algorithms is not rich enough, which limits the performance of these algorithms. Thus, we propose an algorithm called the Multi-frequency Continuous-share Trading algorithm with GARCH (MCTG) to solve the problems above, which consists of parallel network layers and deep reinforcement learning . The former is composed of three parallel network layers , respectively dealing with different frequencies (five minute, one day, one week) data, and day level considers the volatilities of stocks. The latter with a continuous action space of the reinforcement learning algorithm is used to solve the problem of trading stock shares . Experiments in different industries of Chinese stock market show our method achieves more extra profit comparing with basic DRL methods and bench model .", "after_revision": "It is a difficult task for both professional investors and individual traders continuously making profit in stock market . With the development of computer science and deep reinforcement learning, Buy\\& Hold (B \\&H) has been oversteped by many artificial intelligence trading algorithms. However, the information and process are not enough, which limit the performance of reinforcement learning algorithms. Thus, we propose a parallel-network continuous quantitative trading model with GARCH and PPO to enrich the basical deep reinforcement learning model, where the deep learning parallel network layers deal with 3 different frequencies data (including GARCH information) and proximal policy optimization (PPO) algorithm interacts actions and rewards with stock trading environment . Experiments in 5 stocks from Chinese stock market show our method achieves more extra profit comparing with basical reinforcement learning methods and bench models .", "edit_actions": [{"type": "R", "before": "Making profits in stock market is a challenging", "after": "It is a difficult", "start_char_pos": 0, "end_char_pos": 47}, {"type": "D", "before": "institutional", "after": null, "start_char_pos": 75, "end_char_pos": 88}, {"type": "A", "before": null, "after": "continuously making profit in stock market", "start_char_pos": 122, "end_char_pos": 122}, {"type": "R", "before": "combination of quantitative trading and", "after": "of computer science and deep", "start_char_pos": 146, "end_char_pos": 185}, {"type": "R", "before": "more trading algorithms have achieved significant gains beyond the benchmark model Buy", "after": "Buy\\&", "start_char_pos": 210, "end_char_pos": 296}, {"type": "R", "before": "H) . There is a certain gap between these algorithms and the real trading decision making scenarios. On the one hand, they only consider trading signals while ignoring the number of transactions. On the other hand, the information level considered by these algorithms is not rich", "after": "\\&H) has been oversteped by many artificial intelligence trading algorithms. However, the information and process are not", "start_char_pos": 305, "end_char_pos": 584}, {"type": "R", "before": "limits", "after": "limit", "start_char_pos": 599, "end_char_pos": 605}, {"type": "R", "before": "these", "after": "reinforcement learning", "start_char_pos": 625, "end_char_pos": 630}, {"type": "R", "before": "an algorithm called the Multi-frequency Continuous-share Trading algorithm with GARCH (MCTG) to solve the problems above, which consists of parallel network layers and", "after": "a parallel-network continuous quantitative trading model with GARCH and PPO to enrich the basical", "start_char_pos": 660, "end_char_pos": 827}, {"type": "R", "before": ". The former is composed of three", "after": "model, where the deep learning", "start_char_pos": 856, "end_char_pos": 889}, {"type": "R", "before": ", respectively dealing with different frequencies (five minute, one day, one week) data, and day level considers the volatilities of stocks. The latter with a continuous action space of the reinforcement learning algorithm is used to solve the problem of trading stock shares", "after": "deal with 3 different frequencies data (including GARCH information) and proximal policy optimization (PPO) algorithm interacts actions and rewards with stock trading environment", "start_char_pos": 914, "end_char_pos": 1189}, {"type": "R", "before": "different industries of", "after": "5 stocks from", "start_char_pos": 1207, "end_char_pos": 1230}, {"type": "R", "before": "basic DRL", "after": "basical reinforcement learning", "start_char_pos": 1310, "end_char_pos": 1319}, {"type": "R", "before": "model", "after": "models", "start_char_pos": 1338, "end_char_pos": 1343}], "sents_char_pos": [0, 124, 405, 500, 642, 857, 1054]}
+{"doc_id": "2105.05381", "revision_depth": "1", "before_revision": "Deep ensemble learning aims to improve the classification accuracy by training several neural networks and fusing their outputs. It has been widely shown to improve accuracy. At the same time, ensemble learning has also been proposed to mitigate privacy leakage in terms of membership inference (MI), where the goal of an attacker is to infer whether a particular data sample has been used to train a target model . In this paper, we show that these two goals of ensemble learning, namely improving accuracy and privacy , directly conflict with each other . Using a wide range of datasets and model architectures, we empirically demonstrate the trade-off between privacy and accuracy in deep ensemble learning. We find that ensembling can improve either privacy or accuracy, but not both simultaneously -- when ensembling improves the classification accuracy, the effectiveness of the MI attack also increases. We analyze various factors that contribute to such privacy leakage in ensembling such as prediction confidence and agreement between models that constitute the ensemble. Our evaluation of defenses against MI attacks , such as regularization and differential privacy , shows that they can mitigate the effectiveness of the MI attackbut simultaneously degrade ensemble accuracy. The source code is available at URL", "after_revision": "Deep ensemble learning has been shown to improve accuracy by training multiple neural networks and fusing their outputs. Ensemble learning has also been used to defend against membership inference attacks that undermine privacy . In this paper, we empirically demonstrate a trade-off between these two goals , namely accuracy and privacy (in terms of membership inference attacks), in deep ensembles . Using a wide range of datasets and model architectures, we show that the effectiveness of membership inference attacks also increases when ensembling improves accuracy. To better understand this trade-off, we study the impact of various factors such as prediction confidence and agreement between models that constitute the ensemble. Finally, we evaluate defenses against membership inference attacks based on regularization and differential privacy . We show that while these defenses can mitigate the effectiveness of the membership inference attack, they simultaneously degrade ensemble accuracy. The source code is available at URL", "edit_actions": [{"type": "R", "before": "aims to improve the classification", "after": "has been shown to improve", "start_char_pos": 23, "end_char_pos": 57}, {"type": "R", "before": "several", "after": "multiple", "start_char_pos": 79, "end_char_pos": 86}, {"type": "R", "before": "It has been widely shown to improve accuracy. At the same time, ensemble", "after": "Ensemble", "start_char_pos": 129, "end_char_pos": 201}, {"type": "R", "before": "proposed to mitigate privacy leakage in terms of membership inference (MI), where the goal of an attacker is to infer whether a particular data sample has been used to train a target model", "after": "used to defend against membership inference attacks that undermine privacy", "start_char_pos": 225, "end_char_pos": 413}, {"type": "R", "before": "show that", "after": "empirically demonstrate a trade-off between", "start_char_pos": 434, "end_char_pos": 443}, {"type": "R", "before": "of ensemble learning, namely improving", "after": ", namely", "start_char_pos": 460, "end_char_pos": 498}, {"type": "R", "before": ", directly conflict with each other", "after": "(in terms of membership inference attacks), in deep ensembles", "start_char_pos": 520, "end_char_pos": 555}, {"type": "R", "before": "empirically demonstrate the trade-off between privacy and accuracy in deep ensemble learning. We find that ensembling can improve either privacy or accuracy, but not both simultaneously --", "after": "show that the effectiveness of membership inference attacks also increases", "start_char_pos": 617, "end_char_pos": 805}, {"type": "R", "before": "the classification accuracy, the effectiveness of the MI attack also increases. We analyze various factors that contribute to such privacy leakage in ensembling such", "after": "accuracy. To better understand this trade-off, we study the impact of various factors such", "start_char_pos": 831, "end_char_pos": 996}, {"type": "R", "before": "Our evaluation of defenses against MI attacks , such as", "after": "Finally, we evaluate defenses against membership inference attacks based on", "start_char_pos": 1081, "end_char_pos": 1136}, {"type": "R", "before": ", shows that they", "after": ". We show that while these defenses", "start_char_pos": 1177, "end_char_pos": 1194}, {"type": "R", "before": "MI attackbut", "after": "membership inference attack, they", "start_char_pos": 1233, "end_char_pos": 1245}], "sents_char_pos": [0, 128, 174, 415, 710, 910, 1080, 1287]}
+{"doc_id": "2105.08233", "revision_depth": "1", "before_revision": "Being able to efficiently and accurately select the top-k elements without privacy leakage is an integral component of various data analysis tasks and has gained significant attention . In this paper, we introduce theoneshot mechanism , a fast, low-distortion, and differentially private primitive for the top-k problem. Compared with existing approaches in the literature, our algorithm adds Laplace noise to the counts and releases the top-k noisy counts and their estimates in a oneshot fashion, thereby substantially reducing the computational cost while maintaining satisfying utility. Our /}\\eps proof of privacy for this mechanism relies on a novel coupling technique that is of independent theoretical interest . Finally, we apply the oneshot mechanism to multiple hypothesis testing and ranking from pairwise comparisons and thus obtain their differentially private counterparts .", "after_revision": "Being able to efficiently and accurately select the top-k elements with differential privacy is an integral component of various private data analysis tasks . In this paper, we present the oneshot Laplace mechanism, which generalizes the well-known Report Noisy Max mechanism to reporting noisy top-k elements. We show that the oneshot Laplace mechanism with a noise level of (\\sqrt{k/}\\eps) is approximately differentially private. Compared to the previous peeling approach of running Report Noisy Max k times, the oneshot Laplace mechanism only adds noises and computes the top k elements once, hence much more efficient for large k. In addition, our proof of privacy relies on a novel coupling technique that bypasses the use of composition theorems . Finally, we present a novel application of efficient top-k selection in the classical problem of ranking from pairwise comparisons .", "edit_actions": [{"type": "R", "before": "without privacy leakage", "after": "with differential privacy", "start_char_pos": 67, "end_char_pos": 90}, {"type": "A", "before": null, "after": "private", "start_char_pos": 127, "end_char_pos": 127}, {"type": "D", "before": "and has gained significant attention", "after": null, "start_char_pos": 148, "end_char_pos": 184}, {"type": "D", "before": "introduce the", "after": null, "start_char_pos": 205, "end_char_pos": 218}, {"type": "D", "before": "oneshot mechanism", "after": null, "start_char_pos": 218, "end_char_pos": 235}, {"type": "R", "before": ", a fast, low-distortion, and differentially private primitive for the", "after": "present the oneshot Laplace mechanism, which generalizes the well-known Report Noisy Max mechanism to reporting noisy", "start_char_pos": 236, "end_char_pos": 306}, {"type": "R", "before": "problem. Compared with existing approaches in the literature, our algorithm adds Laplace noise to the counts and releases the top-k noisy counts and their estimates in a oneshot fashion, thereby substantially reducing the computational cost while maintaining satisfying utility. Our", "after": "elements. We show that the oneshot Laplace mechanism with a noise level of", "start_char_pos": 313, "end_char_pos": 595}, {"type": "A", "before": null, "after": "(\\sqrt{k", "start_char_pos": 596, "end_char_pos": 596}, {"type": "A", "before": null, "after": ") is approximately differentially private. Compared to the previous peeling approach of running Report Noisy Max k times, the oneshot Laplace mechanism only adds noises and computes the top k elements once, hence much more efficient for large k. In addition, our", "start_char_pos": 602, "end_char_pos": 602}, {"type": "D", "before": "for this mechanism", "after": null, "start_char_pos": 620, "end_char_pos": 638}, {"type": "R", "before": "is of independent theoretical interest", "after": "bypasses the use of composition theorems", "start_char_pos": 681, "end_char_pos": 719}, {"type": "R", "before": "apply the oneshot mechanism to multiple hypothesis testing and", "after": "present a novel application of efficient top-k selection in the classical problem of", "start_char_pos": 734, "end_char_pos": 796}, {"type": "D", "before": "and thus obtain their differentially private counterparts", "after": null, "start_char_pos": 831, "end_char_pos": 888}], "sents_char_pos": [0, 186, 321, 591, 721]}
+{"doc_id": "2105.09540", "revision_depth": "1", "before_revision": "The increasing concerns about data privacy and security drives the emergence of a new field of studying privacy-preserving machine learning from isolated data sources, i.e., federated learning . Vertical federated learning, where different parties hold different features for common users, has a great potential of driving a more variety of business cooperation among enterprises in different fields. Decision tree models especially decision tree ensembles are a class of widely applied powerful machine learning models with high interpretability and modeling efficiency. However, the interpretability are compromised in these works such as SecureBoost since the feature names are not exposed to avoid possible data breaches due to the unprotected decision path. In this paper, we shall propose Fed-EINI , an efficient and interpretable inference framework for federated decision tree models with only one round of multi-party communication. We shall compute the candidate sets of leaf nodes based on the local data at each party in parallel, followed by securely computing the weight of the only leaf node in the intersection of the candidate sets. We propose to protect the decision path by the efficient additively homomorphic encryption method, which allows the disclosure of feature names and thus makes the federated decision trees interpretable . The advantages of Fed-EINI will be demonstrated through theoretical analysis and extensive numerical results. Experiments show that the inference efficiency is improved by over 50%DIFDELCMD < \\\\%%% %DIF < in average.\\end{abstract}", "after_revision": "The increasing concerns about data privacy and security drive an emerging field of studying privacy-preserving machine learning from isolated data sources, i.e., federated learning. A class of federated learning, vertical federated learning, where different parties hold different features for common users, has a great potential of driving a more variety of business cooperation among enterprises in many fields. In machine learning, decision tree ensembles such as gradient boosting decision tree (GBDT) and random forest are widely applied powerful models with high interpretability and modeling efficiency. However, the interpretability is compromised in state-of-the-art vertical federated learning frameworks such as SecureBoost with anonymous features to avoid possible data breaches . To address this issue in the inference process, in this paper, we propose Fed-EINI to protect data privacy and allow the disclosure of feature meaning by concealing decision paths with a communication-efficient secure computation method for inference outputs . The advantages of Fed-EINI will be demonstrated through both theoretical analysis and extensive numerical results. %DIFDELCMD < \\\\%%% %DIF < in average.\\end{abstract}", "edit_actions": [{"type": "R", "before": "drives the emergence of a new", "after": "drive an emerging", "start_char_pos": 56, "end_char_pos": 85}, {"type": "D", "before": "federated learning", "after": null, "start_char_pos": 174, "end_char_pos": 192}, {"type": "R", "before": ". Vertical", "after": "federated learning. A class of", "start_char_pos": 193, "end_char_pos": 203}, {"type": "A", "before": null, "after": "vertical federated learning,", "start_char_pos": 224, "end_char_pos": 224}, {"type": "R", "before": "different fields. Decision tree models especially", "after": "many fields. In machine learning,", "start_char_pos": 384, "end_char_pos": 433}, {"type": "R", "before": "are a class of", "after": "such as gradient boosting decision tree (GBDT) and random forest are", "start_char_pos": 458, "end_char_pos": 472}, {"type": "D", "before": "machine learning", "after": null, "start_char_pos": 497, "end_char_pos": 513}, {"type": "R", "before": "are compromised in these works", "after": "is compromised in state-of-the-art vertical federated learning frameworks", "start_char_pos": 603, "end_char_pos": 633}, {"type": "R", "before": "since the feature names are not exposed", "after": "with anonymous features", "start_char_pos": 654, "end_char_pos": 693}, {"type": "R", "before": "due to the unprotected decision path. In this", "after": ". To address this issue in the inference process, in this", "start_char_pos": 726, "end_char_pos": 771}, {"type": "D", "before": "shall", "after": null, "start_char_pos": 782, "end_char_pos": 787}, {"type": "R", "before": ", an efficient and interpretable inference framework for federated decision tree models with only one round of multi-party communication. We shall compute the candidate sets of leaf nodes based on the local data at each party in parallel, followed by securely computing the weight of the only leaf node in the intersection of the candidate sets. We propose to protect the decision path by the efficient additively homomorphic encryption method, which allows the", "after": "to protect data privacy and allow the", "start_char_pos": 805, "end_char_pos": 1266}, {"type": "R", "before": "names and thus makes the federated decision trees interpretable", "after": "meaning by concealing decision paths with a communication-efficient secure computation method for inference outputs", "start_char_pos": 1289, "end_char_pos": 1352}, {"type": "A", "before": null, "after": "both", "start_char_pos": 1411, "end_char_pos": 1411}, {"type": "D", "before": "Experiments show that the inference efficiency is improved by over 50", "after": null, "start_char_pos": 1466, "end_char_pos": 1535}], "sents_char_pos": [0, 401, 572, 763, 942, 1150, 1354, 1465, 1572]}
+{"doc_id": "2105.12807", "revision_depth": "1", "before_revision": "Deep learning based approaches have proven promising to model omicsdata. However, one of the current limitations compared to statistical and traditional machine learning approaches is the lack of explainability, which not only reduces the reliability, but limits the potential for acquiring novel knowledge from unpicking the \" black-box \" models. Here we present XOmiVAE, a novel interpretable deep learning model for cancer classification using high-dimensional omics data. XOmiVAE is able to obtain contribution values of each gene and latent dimension for a specific prediction, and the correlation between genes and the latent dimensions . It is also revealed that XOmiVAE can explain both the supervised classification and the unsupervised clustering results from the deep learning network. To the best of our knowledge, XOmiVAE is one of the first activated-based deep learning interpretation method to explain novel clusters generated by variational autoencoders. The results generated by XOmiVAE were validated by both the biomedical knowledge and the performance of downstream tasks . XOmiVAE explanations of deep learning based cancer classification and clustering aligned with current domain knowledge including biological annotation and literature, which shows great potential for novel biomedical knowledge discovery from deep learning models . The top XOmiVAE selected genes and dimensions shown significant influence to the performance of cancer classification. Additionally, we offer important steps to consider when interpreting deep learning models for tumour classification. For instance, we demonstrate the importance of choosing background samples that makes biological sense and the limitations of connection weight based methods to explain latent dimensions .", "after_revision": "The lack of explainability is one of the most prominent disadvantages of deep learning applications in omics. This \" black box \" problem can undermine the credibility and limit the practical implementation of biomedical deep learning models. Here we present XOmiVAE, a variational autoencoder (VAE) based interpretable deep learning model for cancer classification using high-dimensional omics data. XOmiVAE is capable of revealing the contribution of each gene and latent dimension for each classification prediction, and the correlation between each gene and each latent dimension . It is also demonstrated that XOmiVAE can explain not only the supervised classification but the unsupervised clustering results from the deep learning network. To the best of our knowledge, XOmiVAE is one of the first activation level-based interpretable deep learning models explaining novel clusters generated by VAE. The explainable results generated by XOmiVAE were validated by both the performance of downstream tasks and the biomedical knowledge. In our experiments, XOmiVAE explanations of deep learning based cancer classification and clustering aligned with current domain knowledge including biological annotation and academic literature, which shows great potential for novel biomedical knowledge discovery from deep learning models .", "edit_actions": [{"type": "R", "before": "Deep learning based approaches have proven promising to model omicsdata. However, one of the current limitations compared to statistical and traditional machine learning approaches is the lack of explainability, which not only reduces the reliability, but limits the potential for acquiring novel knowledge from unpicking the", "after": "The lack of explainability is one of the most prominent disadvantages of deep learning applications in omics. This", "start_char_pos": 0, "end_char_pos": 325}, {"type": "R", "before": "black-box", "after": "black box", "start_char_pos": 328, "end_char_pos": 337}, {"type": "A", "before": null, "after": "problem can undermine the credibility and limit the practical implementation of biomedical deep learning", "start_char_pos": 340, "end_char_pos": 340}, {"type": "R", "before": "novel", "after": "variational autoencoder (VAE) based", "start_char_pos": 376, "end_char_pos": 381}, {"type": "R", "before": "able to obtain contribution values", "after": "capable of revealing the contribution", "start_char_pos": 488, "end_char_pos": 522}, {"type": "R", "before": "a specific", "after": "each classification", "start_char_pos": 561, "end_char_pos": 571}, {"type": "R", "before": "genes and the latent dimensions", "after": "each gene and each latent dimension", "start_char_pos": 612, "end_char_pos": 643}, {"type": "R", "before": "revealed", "after": "demonstrated", "start_char_pos": 657, "end_char_pos": 665}, {"type": "R", "before": "both", "after": "not only", "start_char_pos": 691, "end_char_pos": 695}, {"type": "R", "before": "and", "after": "but", "start_char_pos": 726, "end_char_pos": 729}, {"type": "R", "before": "activated-based deep learning interpretation method to explain", "after": "activation level-based interpretable deep learning models explaining", "start_char_pos": 856, "end_char_pos": 918}, {"type": "R", "before": "variational autoencoders. The", "after": "VAE. The explainable", "start_char_pos": 947, "end_char_pos": 976}, {"type": "D", "before": "biomedical knowledge and the", "after": null, "start_char_pos": 1033, "end_char_pos": 1061}, {"type": "R", "before": ".", "after": "and the biomedical knowledge. In our experiments,", "start_char_pos": 1094, "end_char_pos": 1095}, {"type": "A", "before": null, "after": "academic", "start_char_pos": 1251, "end_char_pos": 1251}, {"type": "D", "before": ". The top XOmiVAE selected genes and dimensions shown significant influence to the performance of cancer classification. Additionally, we offer important steps to consider when interpreting deep learning models for tumour classification. For instance, we demonstrate the importance of choosing background samples that makes biological sense and the limitations of connection weight based methods to explain latent dimensions", "after": null, "start_char_pos": 1359, "end_char_pos": 1783}], "sents_char_pos": [0, 72, 348, 476, 645, 797, 972, 1360, 1479, 1596]}
+{"doc_id": "2105.14188", "revision_depth": "1", "before_revision": "Advertisers play an important role in e-commerce platforms, whose advertising expenditures are the main source of revenue for e-commerce platforms. Therefore, providing advertisers with a better advertising experience by reducing their cost of trial and error during ad real-time bidding is crucial to the long-term revenue of e-commerce platforms . To achieve this goal, the advertising platform needs to understand the advertisers' unique marketing demands and actively recommend personalized and optimal advertising strategies for them . In this work, we first deploy a prototype recommender system on Taobao display advertising platform for constant bid and crowd optimization. Then, we propose a novel recommender system for dynamic bidding strategy recommendation, which models the advertiser' s strategy recommendation problem as a contextual bandit problem . We use a neural network as the agent to predict the advertisers' demands based on their profile and historical adoption behaviors. Based on the estimated demand, we apply simulated bidding to derive the optimal bidding strategy for recommendation and interact with the advertiser by displaying the possible advertising performance. To solve the exploration/exploitation dilemma, we use Dropout to represent the uncertainty of the network, which approximately equals to conduct Thompson sampling for efficient strategy exploration. Online evaluations show that the system can optimize the advertisers' advertising performance , and advertisers are willing to open the system, select and adopt the suggestions, which further increases the platform's revenue income . Simulation experiments based on Alibaba online bidding data prove that the agent can effectively optimize the adoption rate of advertisers , and Thompson sampling can better balance exploration and exploitation to further optimize the performance of the model .", "after_revision": "Advertising expenditures have become the major source of revenue for e-commerce platforms. Providing good advertising experiences for advertisers through reducing their costs of trial and error for discovering the optimal advertising strategies is crucial for the long-term prosperity of online advertising . To achieve this goal, the advertising platform needs to identify the advertisers' marketing objectives, and then recommend the corresponding strategies to fulfill this objective . In this work, we first deploy a prototype of strategy recommender system on Taobao display advertising platform , recommending bid prices and targeted users to advertisers. We further augment this prototype system by directly revealing the advertising performance, and then infer the advertisers' marketing objectives through their adoptions of different recommending advertising performance . We use the techniques from context bandit to jointly learn the advertisers' marketing objectives and the recommending strategies. Online evaluations show that the designed advertising strategy recommender system can optimize the advertisers' advertising performance and increase the platform's revenue . Simulation experiments based on Taobao online bidding data show that the designed contextual bandit algorithm can effectively optimize the strategy adoption rate of advertisers .", "edit_actions": [{"type": "R", "before": "Advertisers play an important role in e-commerce platforms, whose advertising expenditures are the main", "after": "Advertising expenditures have become the major", "start_char_pos": 0, "end_char_pos": 103}, {"type": "R", "before": "Therefore, providing advertisers with a better advertising experience by reducing their cost", "after": "Providing good advertising experiences for advertisers through reducing their costs", "start_char_pos": 148, "end_char_pos": 240}, {"type": "R", "before": "during ad real-time bidding is crucial to", "after": "for discovering the optimal advertising strategies is crucial for", "start_char_pos": 260, "end_char_pos": 301}, {"type": "R", "before": "revenue of e-commerce platforms", "after": "prosperity of online advertising", "start_char_pos": 316, "end_char_pos": 347}, {"type": "R", "before": "understand", "after": "identify", "start_char_pos": 406, "end_char_pos": 416}, {"type": "R", "before": "unique marketing demands and actively recommend personalized and optimal advertising strategies for them", "after": "marketing objectives, and then recommend the corresponding strategies to fulfill this objective", "start_char_pos": 434, "end_char_pos": 538}, {"type": "A", "before": null, "after": "of strategy", "start_char_pos": 583, "end_char_pos": 583}, {"type": "R", "before": "for constant bid and crowd optimization. Then, we propose a novel recommender system for dynamic bidding strategy recommendation, which models the advertiser' s strategy recommendation problem as a contextual bandit problem", "after": ", recommending bid prices and targeted users to advertisers. We further augment this prototype system by directly revealing the advertising performance, and then infer the advertisers' marketing objectives through their adoptions of different recommending advertising performance", "start_char_pos": 642, "end_char_pos": 865}, {"type": "D", "before": "a neural network as the agent to predict", "after": null, "start_char_pos": 875, "end_char_pos": 915}, {"type": "A", "before": null, "after": "techniques from context bandit to jointly learn the", "start_char_pos": 920, "end_char_pos": 920}, {"type": "R", "before": "demands based on their profile and historical adoption behaviors. Based on the estimated demand, we apply simulated bidding to derive the optimal bidding strategy for recommendation and interact with the advertiser by displaying the possible advertising performance. To solve the exploration/exploitation dilemma, we use Dropout to represent the uncertainty of the network, which approximately equals to conduct Thompson sampling for efficient strategy exploration.", "after": "marketing objectives and the recommending strategies.", "start_char_pos": 934, "end_char_pos": 1399}, {"type": "A", "before": null, "after": "designed advertising strategy recommender", "start_char_pos": 1433, "end_char_pos": 1433}, {"type": "R", "before": ", and advertisers are willing to open the system, select and adopt the suggestions, which further increases the", "after": "and increase the", "start_char_pos": 1495, "end_char_pos": 1606}, {"type": "D", "before": "income", "after": null, "start_char_pos": 1626, "end_char_pos": 1632}, {"type": "R", "before": "Alibaba", "after": "Taobao", "start_char_pos": 1667, "end_char_pos": 1674}, {"type": "R", "before": "prove that the agent", "after": "show that the designed contextual bandit algorithm", "start_char_pos": 1695, "end_char_pos": 1715}, {"type": "A", "before": null, "after": "strategy", "start_char_pos": 1745, "end_char_pos": 1745}, {"type": "D", "before": ", and Thompson sampling can better balance exploration and exploitation to further optimize the performance of the model", "after": null, "start_char_pos": 1775, "end_char_pos": 1895}], "sents_char_pos": [0, 147, 349, 540, 682, 867, 999, 1200, 1399]}
+{"doc_id": "2106.00676", "revision_depth": "1", "before_revision": "Classifying the core textual components of a scientific paper-title, author, body text, etc.-is a critical first step in automated scientific document understanding. Previous work has shown how using elementary layout information, i.e., each token's 2D position on the page, leads to more accurate classification. We introduce new methods for incorporating VIsual LAyout structures (VILA) , e.g., the grouping of page texts into text lines or text blocks, into language models to further improve performance. We show that the I-VILA approach, which simply adds special tokens denoting boundaries between layout structures into model inputs, can lead to +1~4.5 F1 Score improvements in token classificationtasks . Moreover, we design a hierarchical model H-VILA that encodes these layout structures and record a up-to 70\\% efficiency boost without hurting prediction accuracy. The experiments are conducted on a newly curated evaluation suite, S2-VLUE, with a novel metric measuring VILA awareness and a new dataset covering 19 scientific disciplines with gold annotations . Pre-trained weights, benchmark datasets, and source code will be available at URL", "after_revision": "Classifying the core textual components of a scientific paper-title, author, body text, etc.-is a critical first step in automated scientific document understanding. Previous work has shown how using elementary layout information, i.e., each token's 2D position on the page, leads to more accurate classification. We introduce new methods for incorporating VIsual LAyout (VILA) structures , e.g., the grouping of page texts into text lines or text blocks, into language models to further improve performance. We show that the I-VILA approach, which simply adds special tokens denoting the boundaries of layout structures into model inputs, can lead to 1.9\\% Macro F1 improvements for token classification . Moreover, we design a hierarchical model , H-VILA , that encodes the text based on layout structures and record an up-to 47\\% inference time reduction with less than 1.5\\% Macro F1 loss for the text classification models. Experiments are conducted on a newly curated evaluation suite, S2-VLUE, with a novel metric measuring classification uniformity within visual groups and a new dataset of gold annotations covering papers from 19 scientific disciplines . Pre-trained weights, benchmark datasets, and source code will be available at URL", "edit_actions": [{"type": "D", "before": "structures", "after": null, "start_char_pos": 371, "end_char_pos": 381}, {"type": "A", "before": null, "after": "structures", "start_char_pos": 389, "end_char_pos": 389}, {"type": "R", "before": "boundaries between", "after": "the boundaries of", "start_char_pos": 586, "end_char_pos": 604}, {"type": "R", "before": "+1~4.5", "after": "1.9\\% Macro", "start_char_pos": 654, "end_char_pos": 660}, {"type": "R", "before": "Score improvements in token classificationtasks", "after": "improvements for token classification", "start_char_pos": 664, "end_char_pos": 711}, {"type": "A", "before": null, "after": ",", "start_char_pos": 755, "end_char_pos": 755}, {"type": "R", "before": "that encodes these", "after": ", that encodes the text based on", "start_char_pos": 763, "end_char_pos": 781}, {"type": "R", "before": "a", "after": "an", "start_char_pos": 811, "end_char_pos": 812}, {"type": "R", "before": "70\\% efficiency boost without hurting prediction accuracy. The experiments", "after": "47\\% inference time reduction with less than 1.5\\% Macro F1 loss for the text classification models. Experiments", "start_char_pos": 819, "end_char_pos": 893}, {"type": "R", "before": "VILA awareness", "after": "classification uniformity within visual groups", "start_char_pos": 984, "end_char_pos": 998}, {"type": "R", "before": "covering", "after": "of gold annotations covering papers from", "start_char_pos": 1017, "end_char_pos": 1025}, {"type": "D", "before": "with gold annotations", "after": null, "start_char_pos": 1052, "end_char_pos": 1073}], "sents_char_pos": [0, 165, 313, 509, 713, 877]}
+{"doc_id": "2106.00715", "revision_depth": "1", "before_revision": "We provide a theory as to why the locus of a triangle center over Poncelet 3-periodics in an ellipse pair is an ellipse or not. For the confocal pair (elliptic billiard), we show that if the center can be expressed as a fixed affine combination of barycenter, circumcenter, and mittenpunkt (which is stationary over the confocal family) , then its locus will be an ellipse. We also provide conditions under which a particular locus will be a circle or a segment. We also analyze locus turning number and monotonicity with respect to vertices of the 3-periodic family. Finally we write out expressions for the convex quartic locus of the incenter for a generic Poncelet family, conjecturing it can only be an ellipse if the pair is confocal .", "after_revision": "We propose a theory which predicts the ellipticity of a triangle center 's locus over a Poncelet 3-periodic family. We show that if the triangle center can be expressed as a fixed affine combination of barycenter, circumcenter, and a third, stationary point over some family , then its locus will be an ellipse. Taking billiard 3-periodics as an example, the third point is the mittenpunkt. We derive conditions under which a locus degenerates to a segment or is a circle. We show a locus turning number is either plus or minus 3 and predict its movement monotonicity with respect to vertices of the 3-periodic family. Finally , we derive a (long) expression for the loci of the incenter and excenters over a generic Poncelet 3-periodic family, showing they are roots of a quartic. We conjecture (i) those loci are convex, and (ii) that they can only be ellipses if the pair is confocal , i.e., within a 1d subspace of the 5d space of ellipse pairs which admit 3-periodics .", "edit_actions": [{"type": "R", "before": "provide a theory as to why the locus", "after": "propose a theory which predicts the ellipticity", "start_char_pos": 3, "end_char_pos": 39}, {"type": "R", "before": "over Poncelet 3-periodics in an ellipse pair is an ellipse or not. For the confocal pair (elliptic billiard), we", "after": "'s locus over a Poncelet 3-periodic family. We", "start_char_pos": 61, "end_char_pos": 173}, {"type": "A", "before": null, "after": "triangle", "start_char_pos": 191, "end_char_pos": 191}, {"type": "R", "before": "mittenpunkt (which is stationary over the confocal family)", "after": "a third, stationary point over some family", "start_char_pos": 279, "end_char_pos": 337}, {"type": "R", "before": "We also provide", "after": "Taking billiard 3-periodics as an example, the third point is the mittenpunkt. We derive", "start_char_pos": 375, "end_char_pos": 390}, {"type": "D", "before": "particular locus will be a circle or a segment. We also analyze", "after": null, "start_char_pos": 416, "end_char_pos": 479}, {"type": "A", "before": null, "after": "degenerates to a segment or is a circle. We show a locus", "start_char_pos": 486, "end_char_pos": 486}, {"type": "R", "before": "and", "after": "is either plus or minus 3 and predict its movement", "start_char_pos": 502, "end_char_pos": 505}, {"type": "R", "before": "we write out expressions for the convex quartic locus", "after": ", we derive a (long) expression for the loci", "start_char_pos": 578, "end_char_pos": 631}, {"type": "R", "before": "for", "after": "and excenters over", "start_char_pos": 648, "end_char_pos": 651}, {"type": "R", "before": "family, conjecturing it", "after": "3-periodic family, showing they are roots of a quartic. We conjecture (i) those loci are convex, and (ii) that they", "start_char_pos": 671, "end_char_pos": 694}, {"type": "R", "before": "an ellipse", "after": "ellipses", "start_char_pos": 707, "end_char_pos": 717}, {"type": "A", "before": null, "after": ", i.e., within a 1d subspace of the 5d space of ellipse pairs which admit 3-periodics", "start_char_pos": 742, "end_char_pos": 742}], "sents_char_pos": [0, 127, 374, 463, 569]}
+{"doc_id": "2106.02812", "revision_depth": "1", "before_revision": "Quantum Approximate Optimization Algorithm (QAOA) has been studied widely in the literature, primarily for finding an approximate value of the maximum cut size of a graph. QAOA is composed of a problem hamiltonian and a mixer hamiltonian which are applied alternately for p \\geq 1 layers. The circuit for this algorithm requires 2m CNOT gatesin each layer, where m is the number of edges in the graph. CNOT gate is one of the primary sources of error in modern quantum computers. In this paper, we propose two techniques for reducing the number of CNOT gates in the circuit which are independent of the hardware architecture. For a graph with n vertices, we first propose a technique based on edge coloring that can reduce upto \\lfloor n{2} \\rfloor CNOT gates in the circuit . Next, we propose another technique based on Depth First Search (DFS) that can reduce n-1 CNOT gates at the cost of some increased depth . We analytically derive the criteria for which the reduction in the number of CNOT gates due to the DFS based technique can provide lower error probability even with some increased depth, and show that all graphs conform to this criteria, making this technique universal. We further show that this proposed optimization holds even in the post transpilation stage of the circuit , which is actually executed in the IBM Quantum hardware . We simulate these two techniques for graphs of various sparsity with the ibmq_manhattan noise model \\textit{ and show that the DFS based technique outperforms the edge coloring based technique , which in turn, outperforms the traditional QAOA circuit in terms of reduction in the number of CNOT gates, and hence the probability of error of the circuit.", "after_revision": "Quantum Approximate Optimization Algorithm (QAOA) is studied primarily to find approximate solutions to combinatorial optimization problems. For a graph with n vertices and m edges, a depth p QAOA for the Max-cut problem requires 2\\cdot m \\cdot p CNOT gates. CNOT is one of the primary sources of error in modern quantum computers. In this paper, we propose two hardware independent methods to reduce the number of CNOT gates in the circuit . First, we present a method based on Edge Coloring of the input graph that minimizes the the number of cycles (termed as depth of the circuit), and reduces upto \\lfloor n{2} \\rfloor CNOT gates . Next, we depict another method based on Depth First Search (DFS) on the input graph that reduces n-1 CNOT gates , but increases depth of the circuit moderately . We analytically derive the condition for which the reduction in CNOT gates overshadows this increase in depth, and the error probability of the circuit is still lowered. We show that all IBM Quantum Hardware satisfy this condition . We simulate these two methods for graphs of various sparsity with the \\textit{ibmq\\_manhattan noise model, and show that the DFS based method outperforms the edge coloring based method , which in turn, outperforms the traditional QAOA circuit in terms of reduction in the number of CNOT gates, and hence the probability of error of the circuit.", "edit_actions": [{"type": "R", "before": "has been studied widely in the literature, primarily for finding an approximate value of the maximum cut size of a graph. QAOA is composed of a problem hamiltonian and a mixer hamiltonian which are applied alternately for p \\geq 1 layers. The circuit for this algorithm requires 2m CNOT gatesin each layer, where m is the number of edges in the graph. CNOT gate", "after": "is studied primarily to find approximate solutions to combinatorial optimization problems. For a graph with n vertices and m edges, a depth p QAOA for the Max-cut problem requires 2\\cdot m \\cdot p CNOT gates. CNOT", "start_char_pos": 50, "end_char_pos": 411}, {"type": "R", "before": "techniques for reducing", "after": "hardware independent methods to reduce", "start_char_pos": 510, "end_char_pos": 533}, {"type": "R", "before": "which are independent of the hardware architecture. For a graph with n vertices, we first propose a technique based on edge coloring that can reduce", "after": ". First, we present a method based on Edge Coloring of the input graph that minimizes the the number of cycles (termed as depth of the circuit), and reduces", "start_char_pos": 574, "end_char_pos": 722}, {"type": "D", "before": "in the circuit", "after": null, "start_char_pos": 760, "end_char_pos": 774}, {"type": "R", "before": "propose another technique", "after": "depict another method", "start_char_pos": 786, "end_char_pos": 811}, {"type": "R", "before": "that can reduce", "after": "on the input graph that reduces", "start_char_pos": 846, "end_char_pos": 861}, {"type": "R", "before": "at the cost of some increased depth", "after": ", but increases depth of the circuit moderately", "start_char_pos": 877, "end_char_pos": 912}, {"type": "R", "before": "criteria", "after": "condition", "start_char_pos": 942, "end_char_pos": 950}, {"type": "R", "before": "the number of CNOT gates due to the DFS based technique can provide lower error probability even with some increased", "after": "CNOT gates overshadows this increase in", "start_char_pos": 978, "end_char_pos": 1094}, {"type": "R", "before": "show that all graphs conform to this criteria, making this technique universal. We further show that this proposed optimization holds even in the post transpilation stage", "after": "the error probability", "start_char_pos": 1106, "end_char_pos": 1276}, {"type": "R", "before": ", which is actually executed in the IBM Quantum hardware", "after": "is still lowered. We show that all IBM Quantum Hardware satisfy this condition", "start_char_pos": 1292, "end_char_pos": 1348}, {"type": "R", "before": "techniques", "after": "methods", "start_char_pos": 1373, "end_char_pos": 1383}, {"type": "D", "before": "ibmq_manhattan noise model", "after": null, "start_char_pos": 1424, "end_char_pos": 1450}, {"type": "A", "before": null, "after": "ibmq\\_manhattan", "start_char_pos": 1459, "end_char_pos": 1459}, {"type": "A", "before": null, "after": "noise model,", "start_char_pos": 1460, "end_char_pos": 1460}, {"type": "R", "before": "technique", "after": "method", "start_char_pos": 1489, "end_char_pos": 1498}, {"type": "R", "before": "technique", "after": "method", "start_char_pos": 1535, "end_char_pos": 1544}], "sents_char_pos": [0, 171, 288, 401, 479, 625, 776, 914, 1185, 1350]}
+{"doc_id": "2106.10271", "revision_depth": "1", "before_revision": "Temporal action detection (TAD) aims to determine the semantic label and the boundaries of every action instance in an untrimmed video. It is a fundamental task in video understanding and significant progress has been made in TAD . Previous methods involve multiple stages or networks and hand-designed rules or operations, which fall short in efficiency and flexibility. Here, we construct an end-to-end framework for TAD upon Transformer, termed TadTR, which simultaneously predicts all action instances as a set of labels and temporal locations in parallel. TadTR is able to adaptively extract temporal context information needed for making action predictions, by selectively attending to a number of snippets in a video. It greatly simplifies the pipeline of TAD and runs much faster than previous detectors . Our method achieves state-of-the-art performance on HACS Segments and THUMOS14 and competitive performance on ActivityNet-1.3. Our code will be made available at URL", "after_revision": "Temporal action detection (TAD) aims to determine the semantic label and the boundaries of every action instance in an untrimmed video. It is a fundamental and challenging task in video understanding and significant progress has been made . Previous methods involve multiple stages or networks and hand-designed rules or operations, which fall short in efficiency and flexibility. In this paper, we propose an end-to-end framework for TAD upon Transformer, termed TadTR, which maps a set of learnable embeddings to action instances in parallel. TadTR is able to adaptively extract temporal context information required for making action predictions, by selectively attending to a sparse set of snippets in a video. As a result, it simplifies the pipeline of TAD and requires lower computation cost than previous detectors , while preserving remarkable detection performance. TadTR achieves state-of-the-art performance on HACS Segments (+3.35\\% average mAP). As a single-network detector, TadTR runs 10\\times faster than its comparable competitor. It outperforms existing single-network detectors by a large margin on THUMOS14 (+5.0\\% average mAP) and ActivityNet (+7.53\\% average mAP). When combined with other detectors, it reports 54.1\\% mAP at IoU=0.5 on THUMOS14, and 34.55\\% average mAP on ActivityNet-1.3. Our code will be released at URL", "edit_actions": [{"type": "A", "before": null, "after": "and challenging", "start_char_pos": 156, "end_char_pos": 156}, {"type": "D", "before": "in TAD", "after": null, "start_char_pos": 224, "end_char_pos": 230}, {"type": "R", "before": "Here, we construct", "after": "In this paper, we propose", "start_char_pos": 373, "end_char_pos": 391}, {"type": "R", "before": "simultaneously predicts all action instances as", "after": "maps", "start_char_pos": 462, "end_char_pos": 509}, {"type": "R", "before": "labels and temporal locations", "after": "learnable embeddings to action instances", "start_char_pos": 519, "end_char_pos": 548}, {"type": "R", "before": "needed", "after": "required", "start_char_pos": 627, "end_char_pos": 633}, {"type": "R", "before": "number", "after": "sparse set", "start_char_pos": 695, "end_char_pos": 701}, {"type": "R", "before": "It greatly", "after": "As a result, it", "start_char_pos": 726, "end_char_pos": 736}, {"type": "R", "before": "runs much faster", "after": "requires lower computation cost", "start_char_pos": 772, "end_char_pos": 788}, {"type": "R", "before": ". Our method", "after": ", while preserving remarkable detection performance. TadTR", "start_char_pos": 813, "end_char_pos": 825}, {"type": "R", "before": "and", "after": "(+3.35\\% average mAP). As a single-network detector, TadTR runs 10\\times faster than its comparable competitor. It outperforms existing single-network detectors by a large margin on", "start_char_pos": 881, "end_char_pos": 884}, {"type": "R", "before": "and competitive performance", "after": "(+5.0\\% average mAP) and ActivityNet (+7.53\\% average mAP). When combined with other detectors, it reports 54.1\\% mAP at IoU=0.5", "start_char_pos": 894, "end_char_pos": 921}, {"type": "A", "before": null, "after": "THUMOS14, and 34.55\\% average mAP on", "start_char_pos": 925, "end_char_pos": 925}, {"type": "R", "before": "made available", "after": "released", "start_char_pos": 960, "end_char_pos": 974}], "sents_char_pos": [0, 135, 372, 561, 725, 814, 942]}
+{"doc_id": "2106.11582", "revision_depth": "1", "before_revision": "Nowadays, analysis of transparent images in the field of computer vision has gradually become a hot spot. In this paper , we compare the classification performance of different deep learning for the problem that transparent images are difficult to analyze. We crop the transparent images into 8 * 8 and 224 * 224 pixels patches in the same proportion , and then divide the two different pixels patches into foreground and background according to groundtruch . We also use 4 types of convolutional neural networks and a novel ViT network model to compare the foreground and background classification experiments. We conclude that ViT performs the worst in classifying 8 * 8 pixels patches, but it outperforms most convolutional neural networks in classifying 224 * 224.", "after_revision": "Nowadays, analysis of Transparent Environmental URLanism Images (T-EM images) in the field of computer vision has gradually become a new and interesting spot. This paper compares different deep learning classification performance for the problem that T-EM images are challenging to analyze. We crop the T-EM images into 8 * 8 and 224 * 224 pixel patches in the same proportion and then divide the two different pixel patches into foreground and background according to ground truth . We also use four convolutional neural networks and a novel ViT network model to compare the foreground and background classification experiments. We conclude that ViT performs the worst in classifying 8 * 8 pixel patches, but it outperforms most convolutional neural networks in classifying 224 * 224 pixel patches.", "edit_actions": [{"type": "R", "before": "transparent images", "after": "Transparent Environmental URLanism Images (T-EM images)", "start_char_pos": 22, "end_char_pos": 40}, {"type": "R", "before": "hot spot. In this paper , we compare the classification performance of", "after": "new and interesting spot. This paper compares", "start_char_pos": 96, "end_char_pos": 166}, {"type": "A", "before": null, "after": "classification performance", "start_char_pos": 191, "end_char_pos": 191}, {"type": "R", "before": "transparent images are difficult", "after": "T-EM images are challenging", "start_char_pos": 213, "end_char_pos": 245}, {"type": "R", "before": "transparent", "after": "T-EM", "start_char_pos": 270, "end_char_pos": 281}, {"type": "R", "before": "pixels", "after": "pixel", "start_char_pos": 314, "end_char_pos": 320}, {"type": "D", "before": ",", "after": null, "start_char_pos": 352, "end_char_pos": 353}, {"type": "R", "before": "pixels", "after": "pixel", "start_char_pos": 388, "end_char_pos": 394}, {"type": "R", "before": "groundtruch", "after": "ground truth", "start_char_pos": 447, "end_char_pos": 458}, {"type": "R", "before": "4 types of", "after": "four", "start_char_pos": 473, "end_char_pos": 483}, {"type": "R", "before": "pixels", "after": "pixel", "start_char_pos": 674, "end_char_pos": 680}, {"type": "R", "before": "224.", "after": "224 pixel patches.", "start_char_pos": 765, "end_char_pos": 769}], "sents_char_pos": [0, 105, 257, 460, 612]}
+{"doc_id": "2107.00420", "revision_depth": "1", "before_revision": "Modern top-performing object detectors depend heavily on backbone networks, whose advances bring consistent performance gains through exploring more effective network structures. However, designing or searching for a new backbone and pre-training it on ImageNet may require a large number of computational resources, making it costly to obtain better detection performance. In this paper, we propose a novel backbone network, namely CBNetV2, by constructing compositions of existing open-sourced pre-trained backbones. In particular, CBNetV2 architecture groups multiple identical backbones, which are connected through composite connections. We also propose a better training strategy with the Assistant Supervision for CBNet-based detectors. Without additional pre-training, CBNetV2 can be integrated into mainstream detectors, including one-stage and two-stage detectors , as well as anchor-based and anchor-free-based ones, and significantly improve their performance by more than 3.0\\% AP over the baseline on COCO. Also, experiments provide strong evidence showing that composite backbones are more efficient and resource-friendly than pre-trained wider and deeper networks , including manual-based and NAS-based, as well as CNN-based and Transformer-based ones . Particularly, with single-model and single-scale testing, our HTC Dual-Swin-B achieves 58.6\\% box AP and 51.1\\% mask AP on COCO test-dev, which is significantly better than the state-of-the-art result (i.e., 57.7\\% box AP and 50.2\\% mask AP) achieved by a stronger baseline HTC++ with a larger backbone Swin-L. Code will be released at URL", "after_revision": "Consistent performance gains through exploring more effective network structures. In this paper, we propose a novel backbone network, namely CBNetV2, by constructing compositions of existing open-sourced pre-trained backbones. In particular, CBNetV2 architecture groups multiple identical backbones, which are connected through composite connections. Specifically, CBNetV2 integrates the high- and low-level features of multiple backbone networks and gradually expands the receptive field to more efficiently perform object detection. We also propose a better training strategy with the Assistant Supervision for CBNet-based detectors. Without additional pre-training, CBNetV2 can be adapt to various backbones, including manual-based and NAS-based , as well as CNN-based and Transformer-based ones. Experiments provide strong evidence showing that composite backbones are more efficient , effective, and resource-friendly than wider and deeper networks . CBNetV2 is compatible with most mainstream detectors, including one-stage and two-stage detectors , as well as anchor-based and anchor-free-based ones, and significantly improve their performance by more than 3.0\\% AP over the baseline on COCO . Particularly, with single-model and single-scale testing, our HTC Dual-Swin-B achieves 58.6\\% box AP and 51.1\\% mask AP on COCO test-dev, which is significantly better than the state-of-the-art result (i.e., 57.7\\% box AP and 50.2\\% mask AP) achieved by HTC++ with Swin-L. Code is released at URL", "edit_actions": [{"type": "R", "before": "Modern top-performing object detectors depend heavily on backbone networks, whose advances bring consistent", "after": "Consistent", "start_char_pos": 0, "end_char_pos": 107}, {"type": "D", "before": "However, designing or searching for a new backbone and pre-training it on ImageNet may require a large number of computational resources, making it costly to obtain better detection performance.", "after": null, "start_char_pos": 179, "end_char_pos": 373}, {"type": "A", "before": null, "after": "Specifically, CBNetV2 integrates the high- and low-level features of multiple backbone networks and gradually expands the receptive field to more efficiently perform object detection.", "start_char_pos": 643, "end_char_pos": 643}, {"type": "R", "before": "integrated into mainstream detectors, including one-stage and two-stage detectors", "after": "adapt to various backbones, including manual-based and NAS-based", "start_char_pos": 793, "end_char_pos": 874}, {"type": "R", "before": "anchor-based and anchor-free-based ones, and significantly improve their performance by more than 3.0\\% AP over the baseline on COCO. Also, experiments", "after": "CNN-based and Transformer-based ones. Experiments", "start_char_pos": 888, "end_char_pos": 1039}, {"type": "A", "before": null, "after": ", effective,", "start_char_pos": 1116, "end_char_pos": 1116}, {"type": "D", "before": "pre-trained", "after": null, "start_char_pos": 1144, "end_char_pos": 1155}, {"type": "A", "before": null, "after": ". CBNetV2 is compatible with most mainstream detectors, including one-stage and two-stage detectors", "start_char_pos": 1182, "end_char_pos": 1182}, {"type": "D", "before": "including manual-based and NAS-based,", "after": null, "start_char_pos": 1185, "end_char_pos": 1222}, {"type": "R", "before": "CNN-based and Transformer-based ones", "after": "anchor-based and anchor-free-based ones, and significantly improve their performance by more than 3.0\\% AP over the baseline on COCO", "start_char_pos": 1234, "end_char_pos": 1270}, {"type": "D", "before": "a stronger baseline", "after": null, "start_char_pos": 1527, "end_char_pos": 1546}, {"type": "D", "before": "a larger backbone", "after": null, "start_char_pos": 1558, "end_char_pos": 1575}, {"type": "R", "before": "will be", "after": "is", "start_char_pos": 1589, "end_char_pos": 1596}], "sents_char_pos": [0, 178, 373, 518, 642, 744, 1021, 1184, 1583]}
+{"doc_id": "2107.00420", "revision_depth": "2", "before_revision": "Consistent performance gains through exploring more effective network structures. In this paper, we propose a novel backbone network , namely CBNetV2, by constructing compositions of existing open-sourced pre-trained backbones . In particular, CBNetV2 architecture groups multiple identical backbones, which are connected through composite connections. Specifically, CBNetV2 integrates the high- and low-level features of multiple backbone networks and gradually expands the receptive field to more efficiently perform object detection. We also propose a better training strategy with the Assistant Supervision for CBNet-based detectors. Without additional pre-training, CBNetV2 can be adapt to various backbones, including manual-based and NAS-based, as well as CNN-based and Transformer-based ones. Experiments provide strong evidence showing that composite backbones are more efficient, effective, and resource-friendly than wider and deeper networks. CBNetV2 is compatible with most mainstream detectors, including one-stage and two-stage detectors, as well as anchor-based and anchor-free-based ones, and significantly improve their performance by more than 3.0\\% AP over the baseline on COCO. Particularly, with single-model and single-scale testing , our HTC Dual-Swin-B achieves 58.6 \\% box AP and 51.1 \\% mask AP on COCO test-dev, which is significantly better than the state-of-the-art result (i.e., 57.7\\% box AP and 50.2\\% mask AP) achieved by HTC++ with Swin-L . Code is released at URL", "after_revision": "Modern top-performing object detectors depend heavily on backbone networks, whose advances bring consistent performance gains through exploring more effective network structures. In this paper, we propose a novel and flexible backbone framework , namely CBNetV2, to better train existing open-sourced pre-trained backbones under the pre-training fine-tuning protocol . In particular, CBNetV2 architecture groups multiple identical backbones, which are connected through composite connections. Specifically, it integrates the high- and low-level features of multiple backbone networks and gradually expands the receptive field to more efficiently perform object detection. We also propose a better training strategy with assistant supervision for CBNet-based detectors. CBNetV2 has strong generalization capabilities for different backbones and head designs of the detector architecture. Without additional pre-training, CBNetV2 can be adapted to various backbones, including manual-based and NAS-based, as well as CNN-based and Transformer-based ones. Experiments provide strong evidence showing that composite backbones are more efficient, effective, and resource-friendly than wider and deeper networks. CBNetV2 is compatible with the head designs of most mainstream detectors, including one-stage and two-stage detectors, as well as anchor-based and anchor-free-based ones, and significantly improve their performances by more than 3.0\\% AP over the baseline on COCO. Particularly, under the single-model and single-scale testing protocol, our Dual-Swin-L achieves 59.4 \\% box AP and 51.6 \\% mask AP on COCO test-dev, which is significantly better than the state-of-the-art result (i.e., 57.7\\% box AP and 50.2\\% mask AP) . Code is available at URL", "edit_actions": [{"type": "R", "before": "Consistent", "after": "Modern top-performing object detectors depend heavily on backbone networks, whose advances bring consistent", "start_char_pos": 0, "end_char_pos": 10}, {"type": "R", "before": "backbone network", "after": "and flexible backbone framework", "start_char_pos": 116, "end_char_pos": 132}, {"type": "R", "before": "by constructing compositions of", "after": "to better train", "start_char_pos": 151, "end_char_pos": 182}, {"type": "A", "before": null, "after": "under the pre-training fine-tuning protocol", "start_char_pos": 227, "end_char_pos": 227}, {"type": "R", "before": "CBNetV2", "after": "it", "start_char_pos": 368, "end_char_pos": 375}, {"type": "R", "before": "the Assistant Supervision", "after": "assistant supervision", "start_char_pos": 586, "end_char_pos": 611}, {"type": "A", "before": null, "after": "CBNetV2 has strong generalization capabilities for different backbones and head designs of the detector architecture.", "start_char_pos": 639, "end_char_pos": 639}, {"type": "R", "before": "adapt", "after": "adapted", "start_char_pos": 688, "end_char_pos": 693}, {"type": "A", "before": null, "after": "the head designs of", "start_char_pos": 984, "end_char_pos": 984}, {"type": "R", "before": "performance", "after": "performances", "start_char_pos": 1141, "end_char_pos": 1152}, {"type": "R", "before": "with", "after": "under the", "start_char_pos": 1216, "end_char_pos": 1220}, {"type": "R", "before": ", our HTC Dual-Swin-B achieves 58.6", "after": "protocol, our Dual-Swin-L achieves 59.4", "start_char_pos": 1259, "end_char_pos": 1294}, {"type": "R", "before": "51.1", "after": "51.6", "start_char_pos": 1309, "end_char_pos": 1313}, {"type": "D", "before": "achieved by HTC++ with Swin-L", "after": null, "start_char_pos": 1447, "end_char_pos": 1476}, {"type": "R", "before": "released", "after": "available", "start_char_pos": 1487, "end_char_pos": 1495}], "sents_char_pos": [0, 81, 229, 353, 537, 638, 802, 956, 1201]}
+{"doc_id": "2107.00420", "revision_depth": "3", "before_revision": "Modern top-performing object detectors depend heavily on backbone networks, whose advances bring consistent performance gains through exploring more effective network structures. In this paper, we propose a novel and flexible backbone framework, namely CBNetV2, to better train existing open-sourced pre-trained backbones under the pre-training fine-tuning protocol . In particular, CBNetV2 architecture groups multiple identical backbones, which are connected through composite connections. Specifically, it integrates the high- and low-level features of multiple backbone networks and gradually expands the receptive field to more efficiently perform object detection. We also propose a better training strategy with assistant supervision for CBNet-based detectors. CBNetV2 has strong generalization capabilities for different backbones and head designs of the detector architecture. Without additional pre-training , CBNetV2 can be adapted to various backbones , including manual-based and NAS-based, as well as CNN-based and Transformer-based ones. Experiments provide strong evidence showing that composite backbones are more efficient, effective, and resource-friendly than wider and deeper networks. CBNetV2 is compatible with the head designs of most mainstream detectors , including one-stage and two-stage detectors, as well as anchor-based and anchor-free-based ones, and significantly improve their performances by more than 3.0\\% AP over the baseline on COCO . Particularly, under the single-model and single-scale testing protocol, our Dual-Swin-L achieves 59.4\\% box AP and 51.6\\% mask AP on COCO test-dev , which is significantly better than the state-of-the-art result ( i.e., 57.7\\% box AP and 50.2\\% mask AP) . Code is available at URL", "after_revision": "Modern top-performing object detectors depend heavily on backbone networks, whose advances bring consistent performance gains through exploring more effective network structures. In this paper, we propose a novel and flexible backbone framework, namely CBNetV2, to construct high-performance detectors using existing open-sourced pre-trained backbones under the pre-training fine-tuning paradigm . In particular, CBNetV2 architecture groups multiple identical backbones, which are connected through composite connections. Specifically, it integrates the high- and low-level features of multiple backbone networks and gradually expands the receptive field to more efficiently perform object detection. We also propose a better training strategy with assistant supervision for CBNet-based detectors. Without additional pre-training of the composite backbone , CBNetV2 can be adapted to various backbones ( CNN-based vs. Transformer-based ) and head designs of most mainstream detectors ( one-stage vs. two-stage , anchor-based vs. anchor-free-based ). Experiments provide strong evidence that, compared with simply increasing the depth and width of the network, CBNetV2 introduces a more efficient, effective, and resource-friendly way to build high-performance backbone networks . Particularly, our Dual-Swin-L achieves 59.4\\% box AP and 51.6\\% mask AP on COCO test-dev under the single-model and single-scale testing protocol , which is significantly better than the state-of-the-art result ( 57.7\\% box AP and 50.2\\% mask AP) achieved by Swin-L, while the training schedule is reduced by 6\\times. With multi-scale testing, we push the current best single model result to a new record of 60.1\\% box AP and 52.3\\% mask AP without using extra training data . Code is available at URL", "edit_actions": [{"type": "R", "before": "better train", "after": "construct high-performance detectors using", "start_char_pos": 265, "end_char_pos": 277}, {"type": "R", "before": "protocol", "after": "paradigm", "start_char_pos": 357, "end_char_pos": 365}, {"type": "D", "before": "CBNetV2 has strong generalization capabilities for different backbones and head designs of the detector architecture.", "after": null, "start_char_pos": 768, "end_char_pos": 885}, {"type": "A", "before": null, "after": "of the composite backbone", "start_char_pos": 918, "end_char_pos": 918}, {"type": "R", "before": ", including manual-based and NAS-based, as well as", "after": "(", "start_char_pos": 965, "end_char_pos": 1015}, {"type": "R", "before": "and", "after": "vs.", "start_char_pos": 1026, "end_char_pos": 1029}, {"type": "R", "before": "ones. Experiments provide strong evidence showing that composite backbones are more efficient, effective, and resource-friendly than wider and deeper networks. CBNetV2 is compatible with the", "after": ") and", "start_char_pos": 1048, "end_char_pos": 1238}, {"type": "R", "before": ", including", "after": "(", "start_char_pos": 1281, "end_char_pos": 1292}, {"type": "R", "before": "and", "after": "vs.", "start_char_pos": 1303, "end_char_pos": 1306}, {"type": "R", "before": "detectors, as well as", "after": ",", "start_char_pos": 1317, "end_char_pos": 1338}, {"type": "R", "before": "and", "after": "vs.", "start_char_pos": 1352, "end_char_pos": 1355}, {"type": "R", "before": "ones, and significantly improve their performances by more than 3.0\\% AP over the baseline on COCO", "after": "). Experiments provide strong evidence that, compared with simply increasing the depth and width of the network, CBNetV2 introduces a more efficient, effective, and resource-friendly way to build high-performance backbone networks", "start_char_pos": 1374, "end_char_pos": 1472}, {"type": "D", "before": "under the single-model and single-scale testing protocol,", "after": null, "start_char_pos": 1489, "end_char_pos": 1546}, {"type": "A", "before": null, "after": "under the single-model and single-scale testing protocol", "start_char_pos": 1622, "end_char_pos": 1622}, {"type": "D", "before": "i.e.,", "after": null, "start_char_pos": 1690, "end_char_pos": 1695}, {"type": "A", "before": null, "after": "achieved by Swin-L, while the training schedule is reduced by 6\\times. With multi-scale testing, we push the current best single model result to a new record of 60.1\\% box AP and 52.3\\% mask AP without using extra training data", "start_char_pos": 1730, "end_char_pos": 1730}], "sents_char_pos": [0, 178, 367, 491, 670, 767, 885, 1053, 1207, 1282]}
+{"doc_id": "2107.02477", "revision_depth": "1", "before_revision": "In recent years, benefiting from the expressivepower of Graph Convolutional Networks (GCNs), significant breakthroughs have been made in faceclustering . However, rare attention has been paidto GCN-based clustering on imbalanced data. Al-though imbalance problem has been extensivelystudied , the impact of imbalanced data on GCN-based linkage prediction task is quite different, which would cause problems in two aspects: im-balanced linkage labels and biased graph represen-tations . The problem of imbalanced linkage labelsis similar to that in image classification task, but thelatter is a particular problem in GCN-based clus-tering via linkage prediction. Significantly biasedgraph representations in training can cause catas-trophic overfitting of a GCN model. To tacklethese problems, we evaluate the feasibility of thoseexisting methods for imbalanced image classifica-tion problem on graphs with extensive experiments, and present a new method to alleviate the imbal-anced labels and also augment graph representa-tions using a Reverse-Imbalance Weighted Sam-pling (RIWS) strategy, followed with insightfulanalyses and discussions. A series of imbalancedbenchmark datasets synthesized from MS-Celeb-1M and DeepFashion will be openly available .", "after_revision": "In recent years, benefiting from the expressive power of Graph Convolutional Networks (GCNs), significant breakthroughs have been made in face clustering . However, rare attention has been paid to GCN-based clustering on imbalanced data. Although imbalance problem has been extensively studied , the impact of imbalanced data on GCN-based linkage prediction task is quite different, which would cause problems in two aspects: imbalanced linkage labels and biased graph representations . The problem of imbalanced linkage labels is similar to that in image classification task, but the latter is a particular problem in GCN-based clustering via linkage prediction. Significantly biased graph representations in training can cause catastrophic overfitting of a GCN model. To tackle these problems, we evaluate the feasibility of those existing methods for imbalanced image classification problem on graphs with extensive experiments, and present a new method to alleviate the imbalanced labels and also augment graph representations using a Reverse-Imbalance Weighted Sampling (RIWS) strategy, followed with insightful analyses and discussions. The code and a series of imbalanced benchmark datasets synthesized from MS-Celeb-1M and DeepFashion are available on URL", "edit_actions": [{"type": "R", "before": "expressivepower", "after": "expressive power", "start_char_pos": 37, "end_char_pos": 52}, {"type": "R", "before": "faceclustering", "after": "face clustering", "start_char_pos": 137, "end_char_pos": 151}, {"type": "R", "before": "paidto", "after": "paid to", "start_char_pos": 187, "end_char_pos": 193}, {"type": "R", "before": "Al-though", "after": "Although", "start_char_pos": 235, "end_char_pos": 244}, {"type": "R", "before": "extensivelystudied", "after": "extensively studied", "start_char_pos": 272, "end_char_pos": 290}, {"type": "R", "before": "im-balanced", "after": "imbalanced", "start_char_pos": 423, "end_char_pos": 434}, {"type": "R", "before": "represen-tations", "after": "representations", "start_char_pos": 467, "end_char_pos": 483}, {"type": "R", "before": "labelsis", "after": "labels is", "start_char_pos": 520, "end_char_pos": 528}, {"type": "R", "before": "thelatter", "after": "the latter", "start_char_pos": 579, "end_char_pos": 588}, {"type": "R", "before": "clus-tering", "after": "clustering", "start_char_pos": 626, "end_char_pos": 637}, {"type": "R", "before": "biasedgraph", "after": "biased graph", "start_char_pos": 676, "end_char_pos": 687}, {"type": "R", "before": "catas-trophic", "after": "catastrophic", "start_char_pos": 726, "end_char_pos": 739}, {"type": "R", "before": "tacklethese", "after": "tackle these", "start_char_pos": 771, "end_char_pos": 782}, {"type": "R", "before": "thoseexisting", "after": "those existing", "start_char_pos": 824, "end_char_pos": 837}, {"type": "R", "before": "classifica-tion", "after": "classification", "start_char_pos": 867, "end_char_pos": 882}, {"type": "R", "before": "imbal-anced", "after": "imbalanced", "start_char_pos": 971, "end_char_pos": 982}, {"type": "R", "before": "representa-tions", "after": "representations", "start_char_pos": 1013, "end_char_pos": 1029}, {"type": "R", "before": "Sam-pling", "after": "Sampling", "start_char_pos": 1065, "end_char_pos": 1074}, {"type": "R", "before": "insightfulanalyses", "after": "insightful analyses", "start_char_pos": 1106, "end_char_pos": 1124}, {"type": "R", "before": "A series of imbalancedbenchmark", "after": "The code and a series of imbalanced benchmark", "start_char_pos": 1142, "end_char_pos": 1173}, {"type": "R", "before": "will be openly available .", "after": "are available on URL", "start_char_pos": 1228, "end_char_pos": 1254}], "sents_char_pos": [0, 153, 234, 485, 661, 767, 1141]}
+{"doc_id": "2107.03721", "revision_depth": "1", "before_revision": "In April 2021, the European Commission proposed a Regulation on Artificial Intelligence, known as the AI Act. We present an overview of the Act and analyse its implications, drawing on scholarship ranging from the study of contemporary AI practices to the structure of EU product safety regimes over the last four decades. Aspects of the AI Act, such as different rules for different risk-levels of AI, make sense. But we also find that some provisions of the draft AI Act have surprising legal implications, whilst others may be largely ineffective at achieving their stated goals. Several overarching aspects, including the enforcement regime and the effect of maximum harmonisation on the space for AI policymore generally , engender significant concern. These issues should be addressed as a priority in the legislative process.", "after_revision": "In April 2021, the European Commission proposed a Regulation on Artificial Intelligence, known as the AI Act. We present an overview of the Act and analyse its implications, drawing on scholarship ranging from the study of contemporary AI practices to the structure of EU product safety regimes over the last four decades. Aspects of the AI Act, such as different rules for different risk-levels of AI, make sense. But we also find that some provisions of the Draft AI Act have surprising legal implications, whilst others may be largely ineffective at achieving their stated goals. Several overarching aspects, including the enforcement regime and the risks of maximum harmonisation pre-empting legitimate national AI policy , engender significant concern. These issues should be addressed as a priority in the legislative process.", "edit_actions": [{"type": "R", "before": "draft", "after": "Draft", "start_char_pos": 460, "end_char_pos": 465}, {"type": "R", "before": "effect", "after": "risks", "start_char_pos": 653, "end_char_pos": 659}, {"type": "R", "before": "on the space for AI policymore generally", "after": "pre-empting legitimate national AI policy", "start_char_pos": 685, "end_char_pos": 725}], "sents_char_pos": [0, 109, 322, 414, 582, 757]}
+{"doc_id": "2107.03857", "revision_depth": "1", "before_revision": "We present a lattice gas model of financial markets to explain previous empirical observations of the interplay of trends and reversion . The shares of an asset are modeled by gas molecules that are distributed across a hidden social network of investors. Neighbors in the network tend to align their positions due to herding behavior. The model is equivalent to the Ising model on this network, with the magnetization in the role of the deviation of the asset price from its value. For N independent assets, it generalizes to an O(N) vector model. In efficient markets, the system is driven to its critical temperature . There, it is characterized by long-range correlations and universal critical exponents, in analogy with the second-order phase transition between water and steam. Using the renormalization group, we show that these critical exponents imply predictions for the auto-correlations of financial market returns. For a simple network topology, consistency with observation implies a fractal dimension of the network of 3.3 and a correlation time of 10 years. While the simple model agrees well with market data on long time scales, it cannot explain the observed market trends over time horizons from one month to one year. In a next step, the approach should therefore be extended to other models of critical dynamics and to general network topologies. It opens the door for indirectly measuring universal properties of the hidden social network of investors from the observable interplay of trends and reversion .", "after_revision": "Motivated by empirical observations on the interplay of trends and reversion , a lattice gas model of financial markets is presented . The shares of an asset are modeled by gas molecules that are distributed across a hidden social network of investors. The model is equivalent to the Ising model on this network, whose magnetization represents the deviation of the asset price from its value. It is argued that the system is driven to its critical temperature in efficient markets . There, it is characterized by universal critical exponents, in analogy with the second-order phase transition between water and steam. These critical exponents imply predictions for the auto-correlations of financial market returns. For a simple network topology, consistency with the observed long-term auto-correlations implies a fractal network dimension of 3.3 , and a correlation time of 10 years. To also explain the observed short-term auto-correlations, the model should be extended beyond the critical domain, to other network topologies, and to other models of critical dynamics .", "edit_actions": [{"type": "R", "before": "We present a lattice gas model of financial markets to explain previous empirical observations of", "after": "Motivated by empirical observations on", "start_char_pos": 0, "end_char_pos": 97}, {"type": "A", "before": null, "after": ", a lattice gas model of financial markets is presented", "start_char_pos": 136, "end_char_pos": 136}, {"type": "D", "before": "Neighbors in the network tend to align their positions due to herding behavior.", "after": null, "start_char_pos": 257, "end_char_pos": 336}, {"type": "R", "before": "with the magnetization in the role of the", "after": "whose magnetization represents the", "start_char_pos": 397, "end_char_pos": 438}, {"type": "R", "before": "For N independent assets, it generalizes to an O(N) vector model. In efficient markets,", "after": "It is argued that", "start_char_pos": 484, "end_char_pos": 571}, {"type": "A", "before": null, "after": "in efficient markets", "start_char_pos": 621, "end_char_pos": 621}, {"type": "D", "before": "long-range correlations and", "after": null, "start_char_pos": 654, "end_char_pos": 681}, {"type": "R", "before": "Using the renormalization group, we show that these", "after": "These", "start_char_pos": 787, "end_char_pos": 838}, {"type": "R", "before": "observation", "after": "the observed long-term auto-correlations", "start_char_pos": 979, "end_char_pos": 990}, {"type": "R", "before": "dimension of the network of", "after": "network dimension of", "start_char_pos": 1009, "end_char_pos": 1036}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1041, "end_char_pos": 1041}, {"type": "R", "before": "While the simple model agrees well with market data on long time scales, it cannot", "after": "To also", "start_char_pos": 1078, "end_char_pos": 1160}, {"type": "R", "before": "market trends over time horizons from one month to one year. In a next step, the approach should therefore be extended to other", "after": "short-term auto-correlations, the model should be extended beyond the critical domain, to other network topologies, and to other", "start_char_pos": 1182, "end_char_pos": 1309}, {"type": "D", "before": "and to general network topologies. It opens the door for indirectly measuring universal properties of the hidden social network of investors from the observable interplay of trends and reversion", "after": null, "start_char_pos": 1338, "end_char_pos": 1532}], "sents_char_pos": [0, 138, 256, 336, 483, 549, 623, 786, 930, 1077, 1242, 1372]}
+{"doc_id": "2107.05556", "revision_depth": "1", "before_revision": "Motivation: Computational models that accurately identify high-affinity protein-compound pairs can accelerate drug discovery pipelines. These models aim to learn binding mechanics through drug-target interaction datasets and use the learned knowledge while predicting the affinity of any protein-compound pair. However, the datasets they rely on bear misleading patterns that bias models towards memorizing dataset-specific biomolecule properties, instead of learning binding mechanics. Insufficiently focused on the binding mechanics, the resulting models struggle while predicting the drug-target affinities (DTA), especially between de novo biomolecules. Here we present DebiasedDTA, the first model debiasing approach that avoids dataset biases in order to boost the affinity prediction on novel biomolecules. DebiasedDTA uses ensemble learning and weight sample adaptation for bias identification and avoidance and is applicable to almost all existing DTA prediction models. Results: The results show that DebiasedDTA can boost models while predicting the interactions between novel biomolecules. Known biomolecules also benefit from the performance boost, though the boost is amplified as the test biomolecules become more dissimilar to the training set. The experiments also show that DebiasedDTA can augment the DTA prediction models of different input and model structures and can avoid biases of different sources. Availability : The source code, the models, and the data sets are available at URL Contact: arzucan.ozgur@boun.edu.tr, elif.ozkirimli@roche.com", "after_revision": "Motivation: Computational models that accurately identify high-affinity protein-compound pairs can accelerate drug discovery pipelines. These models aim to learn binding mechanics through drug-target interaction datasets and use the learned knowledge for predicting the affinity of an input protein-compound pair. However, the datasets they rely on bear misleading patterns that bias models towards memorizing dataset-specific biomolecule properties, instead of learning binding mechanics. This results in models that struggle while predicting drug-target affinities (DTA), especially between de novo biomolecules. Here we present DebiasedDTA, the first DTA model debiasing approach that avoids dataset biases in order to boost affinity prediction for novel biomolecules. DebiasedDTA uses ensemble learning and sample weight adaptation for bias identification and avoidance and is applicable to almost all existing DTA prediction models. Results: The results show that DebiasedDTA can boost models while predicting the interactions between novel biomolecules. Known biomolecules also benefit from the performance improvement, especially when the test biomolecules are dissimilar to the training set. The experiments also show that DebiasedDTA can augment DTA prediction models of different input and model structures and is able to avoid biases of different sources. Availability and Implementation : The source code, the models, and the datasets are freely available for download at URL implementation in Python3, and supported for Linux, MacOS and MS Windows. Contact: arzucan.ozgur@boun.edu.tr, elif.ozkirimli@roche.com", "edit_actions": [{"type": "R", "before": "while", "after": "for", "start_char_pos": 251, "end_char_pos": 256}, {"type": "R", "before": "any", "after": "an input", "start_char_pos": 284, "end_char_pos": 287}, {"type": "R", "before": "Insufficiently focused on the binding mechanics, the resulting models", "after": "This results in models that", "start_char_pos": 487, "end_char_pos": 556}, {"type": "D", "before": "the", "after": null, "start_char_pos": 583, "end_char_pos": 586}, {"type": "A", "before": null, "after": "DTA", "start_char_pos": 697, "end_char_pos": 697}, {"type": "R", "before": "the affinity prediction on", "after": "affinity prediction for", "start_char_pos": 768, "end_char_pos": 794}, {"type": "R", "before": "weight sample", "after": "sample weight", "start_char_pos": 854, "end_char_pos": 867}, {"type": "R", "before": "boost, though the boost is amplified as the test biomolecules become more", "after": "improvement, especially when the test biomolecules are", "start_char_pos": 1156, "end_char_pos": 1229}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1317, "end_char_pos": 1320}, {"type": "R", "before": "can", "after": "is able to", "start_char_pos": 1387, "end_char_pos": 1390}, {"type": "A", "before": null, "after": "and Implementation", "start_char_pos": 1439, "end_char_pos": 1439}, {"type": "R", "before": "data sets are available at URL", "after": "datasets are freely available for download at URL implementation in Python3, and supported for Linux, MacOS and MS Windows.", "start_char_pos": 1479, "end_char_pos": 1509}], "sents_char_pos": [0, 135, 310, 486, 657, 814, 980, 1102, 1261, 1425]}
+{"doc_id": "100194", "revision_depth": "2", "before_revision": " The Anti-Poverty Committee (APC) has taken full responsibility for four people splattering latex paint on the front of British Columbia premier Gordon Campbell's office in Vancouver Thursday afternoon . They tried to break into the office and frightened staff. The paint represented three official colours of the Olympic flag; yellow, red and green. \"I think the activists should be prosecuted to the fullest extent of the law,\" said the premier . \"Frankly, this is about seeing their faces on television.\" Attorney General of British Columbia Wally Oppal spoke out against the group : \"It's disturbing when you have people like these, who are continually intimidating law-abiding citizens and I think the public is getting sick and tired of this group.\" The group vandalised and broke into Campbell's office in Vancouver last May when they posed as a flower delivery service and quickly ransacked his office breaking windows and throwing pictures, office documents, and various other items . They also threw yellow paint and put posters on the Olympic Clock in downtown Vancouver last April. They believe that poor citizens are losing their homes due to the money spent and developments near the city on preparation for the long-awaited 2010 Winter Olympics. Cunningham said the group will not stop the \"criminal acts\" until the government's budget surplus is spent on social housing and on the citizen's . \"Just after 2 p.m. a group of people attended the premier's office \u2026 and threw paint on the exterior of the building,\" said Const. Jana McGuinness of the Vancouver Police Department. \"This is a criminal charge. This is mischief, so if charges are warranted we'll definitely be laying charges.\"%DIFDELCMD < %DIFDELCMD < %%% No arrests were made as the four managed to leave before police arrived .", "after_revision": "A group of Olympic protesters tried to break into British Columbia premier Gordon Campbell's office in Vancouver Thursday afternoon and splattered paint on the entrance. The Anti-Poverty Committee (APC) has taken full responsibility for the four people who splattered the paint . They tried to break into the office and frightened staff. \"Just after 2 p.m. a group of people attended the premier's office \u2026 and threw paint on the exterior of the building,\" said Const. Jana McGuinness of the Vancouver Police Department. \"This is a criminal charge. This is mischief, so if charges are warranted we'll definitely be laying charges.\" No arrests were made as the four managed to leave before police arrived. The paint represented three official colours of the Olympic flag; yellow, red and green. \"I think the activists should be prosecuted to the fullest extent of the law,\" said Campbell . \"Frankly, this is about seeing their faces on television.\" Attorney General of British Columbia Wally Oppal spoke out against the group , \"It's disturbing when you have people like these, who are continually intimidating law-abiding citizens , and I think the public is getting sick and tired of this group.\" The group has previously broke into Campbell's office in Vancouver last May when they posed as a flower delivery service and ransacked his office breaking windows and throwing pictures, office documents, and other items about . They also threw yellow paint and put posters on the Olympic Clock in downtown Vancouver last April. They said the protest was for poor citizens who are losing their homes because of money spent on developments for the upcoming 2010 Winter Olympics. Cunningham said the group will not stop the \"criminal acts\" until the government's budget surplus is spent on social housing and on the citizen's %DIFDELCMD < %DIFDELCMD < %%% .", "edit_actions": [{"type": "A", "before": null, "after": "A group of Olympic protesters tried to break into British Columbia premier Gordon Campbell's office in Vancouver Thursday afternoon and splattered paint on the entrance.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "four people splattering latex paint on the front of British Columbia premier Gordon Campbell's office in Vancouver Thursday afternoon", "after": "the four people who splattered the paint", "start_char_pos": 68, "end_char_pos": 201}, {"type": "A", "before": null, "after": "\"Just after 2 p.m. a group of people attended the premier's office \u2026 and threw paint on the exterior of the building,\" said Const. Jana McGuinness of the Vancouver Police Department. \"This is a criminal charge. This is mischief, so if charges are warranted we'll definitely be laying charges.\"", "start_char_pos": 262, "end_char_pos": 262}, {"type": "A", "before": null, "after": "No arrests were made as the four managed to leave before police arrived.", "start_char_pos": 263, "end_char_pos": 263}, {"type": "R", "before": "the premier", "after": "Campbell", "start_char_pos": 437, "end_char_pos": 448}, {"type": "R", "before": ":", "after": ",", "start_char_pos": 587, "end_char_pos": 588}, {"type": "A", "before": null, "after": ",", "start_char_pos": 693, "end_char_pos": 693}, {"type": "R", "before": "vandalised and", "after": "has previously", "start_char_pos": 769, "end_char_pos": 783}, {"type": "D", "before": "quickly", "after": null, "start_char_pos": 884, "end_char_pos": 891}, {"type": "R", "before": "various other items", "after": "other items about", "start_char_pos": 975, "end_char_pos": 994}, {"type": "R", "before": "believe that poor citizens", "after": "said the protest was for poor citizens who", "start_char_pos": 1102, "end_char_pos": 1128}, {"type": "R", "before": "due to the money spent and developments near the city on preparation for the long-awaited", "after": "because of money spent on developments for the upcoming", "start_char_pos": 1152, "end_char_pos": 1241}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1410, "end_char_pos": 1411}, {"type": "D", "before": "\"Just after 2 p.m. a group of people attended the premier's office \u2026 and threw paint on the exterior of the building,\" said Const. Jana McGuinness of the Vancouver Police Department. \"This is a criminal charge. This is mischief, so if charges are warranted we'll definitely be laying charges.\"", "after": null, "start_char_pos": 1412, "end_char_pos": 1705}, {"type": "D", "before": "No arrests were made as the four managed to leave before police arrived", "after": null, "start_char_pos": 1735, "end_char_pos": 1806}], "sents_char_pos": [0, 203, 261, 329, 352, 509, 758, 996, 1096, 1263, 1480, 1542, 1594, 1622, 1705]}
+{"doc_id": "100868", "revision_depth": "1", "before_revision": "The H5N1 Avian Flu Virus has been found in a dead wild Canadian Goose in Abbotsbury Swannery in Dorset, England. This is the 11th case of the virus turning up in wild birds. The goose was found on February 25, 2008. 10 other cases of the virus have appeared in dead birds, all Mute Swans from the same area.", "after_revision": "The H5N1 Avian Flu virus has been found in a dead wild Canadian Goose in Abbotsbury Swannery in Dorset, England. This is the eleventh case of the virus turning up in wild birds. The goose was discovered on February 25, 2008. Ten other cases of the virus have appeared in dead birds, all Mute Swans from the same area.", "edit_actions": [{"type": "R", "before": "Virus", "after": "virus", "start_char_pos": 19, "end_char_pos": 24}, {"type": "R", "before": "11th", "after": "eleventh", "start_char_pos": 125, "end_char_pos": 129}, {"type": "R", "before": "found", "after": "discovered", "start_char_pos": 188, "end_char_pos": 193}, {"type": "R", "before": "10", "after": "Ten", "start_char_pos": 216, "end_char_pos": 218}], "sents_char_pos": [0, 112, 173, 215]}
+{"doc_id": "100912", "revision_depth": "1", "before_revision": "Gordon Brown , who made a speech to the UK Labour Party todayThe UK Prime Minister, Gordon Brown, has made a speech to UK Labour Party members as part of his party's spring conference. In the speech he made several commitments, which he said he would \"work tirelessly\" to achieve. On the subjects of employment and welfare, Mr. Brown said that his party \"will offer new entitlements to the carers that serve this country [the UK] so well. He continued by saying that since Labour came to power in 1997, three million new jobs have been created. He also said that Labour will attempt to get 100,00 people back to work. When discussing crime in the speech, Mr. Brown claimed that his party has \"already cut crime by 32\\%.\" He also made promises of community policing across the UK.", "after_revision": "Gordon Brown in 2004.United Kingdom Prime Minister, Gordon Brown, has made a speech to UK Labour Party members as part of the party's spring conference. In the speech he made several commitments, which he said he would \"work tirelessly\" to achieve. On the subjects of employment and welfare, Mr. Brown said that his party \"will offer new entitlements to the careers that serve this country [the UK] so well. He continued by saying that since Labour came to power in 1997, three million new jobs have been created. He also said that Labour will attempt to get 100,00 people back to work. While discussing crime in the speech, Mr. Brown claimed that his party has \"already cut crime by 32\\%.\" He also made promises of community policing across the UK.", "edit_actions": [{"type": "R", "before": ", who made a speech to the UK Labour Party todayThe UK", "after": "in 2004.United Kingdom", "start_char_pos": 13, "end_char_pos": 67}, {"type": "R", "before": "his", "after": "the", "start_char_pos": 154, "end_char_pos": 157}, {"type": "R", "before": "carers", "after": "careers", "start_char_pos": 390, "end_char_pos": 396}, {"type": "R", "before": "When", "after": "While", "start_char_pos": 618, "end_char_pos": 622}], "sents_char_pos": [0, 184, 280, 438, 544, 617, 720]}
+{"doc_id": "101799", "revision_depth": "1", "before_revision": "Jimmy Wales at a Wikimania event in 2007. Wikipedia founder Jimmy Wales has been accused of editing pages in the encyclopedia in return for a donation to the Wikimedia Foundation . In an article published Tuesday, the Sydney Morning Herald reported that former Novell computer scientist Jeff Merkey alleged Wales had made edits to his article on his behalf, in exchange for a donation to the Wikimedia Foundation. The news hit the website Slashdot later Tuesday, where the incident was dubbed \"DonorGate\". According to The Daily Telegraph , Merkey claims that he was told by Wales in 2006 that the Wikipedia article about him could be made more favorable in exchange for a donation. Merkey made a donation of USD$5,000 to the Wikimedia Foundation, and Wales made edits to the Wikipedia article about Merkey around the same time. Merkey published his claims on a public Wikimedia mailing list and sent a statement to The Associated Press. In a response Wales called Merkey's statements \"nonsense\", saying \"Of course I would never offer, nor accept any offer, whereby a donation would buy someone special editorial treatment in the encyclopedia. I do routinely assist people with WP:BLP issues, and I do courtesies for many people. Donations have no bearing on that at all.\" WP:BLP refers to Wikipedia's policy regarding biographies of living persons on the encyclopedia. After deleting the Wikipedia article about Merkey in 2006, Wales wrote to Wikipedia editors he had done so \"because of the unpleasantness of it\" and requested that they \"be extra careful here to be courteous and assume good faith\". After erasing the article, Wales placed the article under protection with editing access limited to established users. Merkey ceased his $ 5, 000.00 per year payments to the Wikimedia Foundation after reviewing what he called \"evidence of diversion and mismanagement of the charities funds by Wales and the Wikimedia Board of Trustees\". In a statement responding to a post about the incident on the site Techtree.com, Wikimedia Foundation's Head of Communications Jay Walsh addressed the Foundation's principles regarding conflict of interest : \"The Wikimedia Foundation (the Foundation which operates and maintains Wikipedia and other free knowledge projects) has never solicited or accepted donations for the purposes of making edits or offering protection to Wikipedia articles. Nor has Jimmy Wales ever solicited or accepted donations for the Foundation in this capacity. These allegations are completely false. ... Jimmy has been unfailingly ethical and frugal in the use of all Foundation funds. The Wikimedia Foundation, its staff and board members, and the users of Wikipedia itself hold the core principles of 'no conflict of interest' in the highest regard.\" After leaving Novell amidst allegations of misappropriation of trade secrets, Merkey was sued by his former employer. He filed a harassment lawsuit against organizations including the website Slashdot in 2005. Merkey filed a suit against Delta Air Lines and Natural Selection Foods in 2006, claiming his son had become sick from E. coli contaminated spinach. Merkey is banned from editing Wikipedia due to a ruling by Wikipedia's Arbitration Committee. The Wikipedia Signpost , Wikipedia's community-written and community-edited newspaper, reported that a Wikipedia user account used by Merkey was blocked in October 2005 for \"Personal attacks, legal threats, harassment, disruption\". Merkey was later allowed to come back to edit Wikipedia in May 2007 under a different account. As the result of a ruling by Wikipedia's Arbitration Committe in a July 2007 arbitration case, Merkey and two users who had harassed him on Wikipedia were banned from editing the encyclopedia for one year. Last week Jimmy Wales faced accusations by former Wikimedia Foundation executive Danny Wool that he misused the non-profit organization 's funds, and attempted to expense a visit to a Moscow massage parlor and high-priced bottles of wine. In an interview with CNET TV , Wikimedia Foundation Executive Director Sue Gardner described Wool as \"a disgruntled former employee\" and called his claims \"a whole bunch of unsubstantiated rumors and gossip\". Wales's former girlfriend, journalist Rachel Marsden , recently leaked purported instant message transcripts with Wales, which implied Wales had used his influence to change the article about Marsden on Wikipedia. Wales ended his relationship with Marsden and made a public statement to that effect on Wikipedia, and in response Marsden opened an auction for some of Wales's clothing on eBay . Related news ", "after_revision": "founder has been accused of editing pages in the encyclopedia in return for a donation to the . In an article published Tuesday, the reported that former computer scientist alleged Wales had made edits to his article on his behalf, in exchange for a donation to the Wikimedia Foundation. The news hit the website later Tuesday, where the incident was dubbed \"DonorGate\". According to , Merkey claims that he was told by Wales in 2006 that the Wikipedia article about him could be made more favorable in exchange for a donation. Merkey made a donation of 5, 000 to the Wikimedia Foundation, and Wales made edits to the Wikipedia article about Merkey around the same time. Merkey published his claims on a public Wikimedia mailing list and sent a statement to . In a response Wales called Merkey's statements \"nonsense\", saying \"Of course I would never offer, nor accept any offer, whereby a donation would buy someone special editorial treatment in the encyclopedia. I do routinely assist people with WP:BLP issues, and I do courtesies for many people. Donations have no bearing on that at all.\" refers to Wikipedia's policy regarding biographies of living persons on the encyclopedia. After deleting the Wikipedia article about Merkey in 2006, Wales wrote to Wikipedia editors he had done so \"because of the unpleasantness of it\" and requested that they \"be extra careful here to be courteous and assume good faith\". After erasing the article, Wales placed the article under protection with editing access limited to established users. Merkey ceased his $5, 000.00 per year payments to the Wikimedia Foundation after reviewing what he called \"evidence of diversion and mismanagement of the charities funds by Wales and the Wikimedia Board of Trustees\". In a statement responding to a post about the incident on the site Techtree.com, Wikimedia Foundation's Head of Communications addressed the Foundation's principles regarding : \"The Wikimedia Foundation (the Foundation which operates and maintains Wikipedia and other free knowledge projects) has never solicited or accepted donations for the purposes of making edits or offering protection to Wikipedia articles. Nor has Jimmy Wales ever solicited or accepted donations for the Foundation in this capacity. These allegations are completely false. ... Jimmy has been unfailingly ethical and frugal in the use of all Foundation funds. The Wikimedia Foundation, its staff and board members, and the users of Wikipedia itself hold the core principles of 'no conflict of interest' in the highest regard.\" After leaving Novell amidst allegations of misappropriation of trade secrets, Merkey was sued by his former employer. He filed a harassment lawsuit against organizations including the website Slashdot in 2005. Merkey filed a suit against and in 2006, claiming his son had become sick from E. coli contaminated spinach. Merkey is banned from editing Wikipedia due to a ruling by Wikipedia's Arbitration Committee. , Wikipedia's community-written and community-edited newspaper, reported that a Wikipedia user account used by Merkey was blocked in October 2005 for \"Personal attacks, legal threats, harassment, disruption\". Merkey was later allowed to come back to edit Wikipedia in May 2007 under a different account. As the result of a ruling by Wikipedia's Arbitration Committe in a July 2007 arbitration case, Merkey and two users who had harassed him on Wikipedia were banned from editing the encyclopedia for one year. Last week Jimmy Wales faced accusations by former Wikimedia Foundation executive Danny Wool that he misused the 's funds, and attempted to expense a visit to a Moscow massage parlor and high-priced bottles of wine. In an interview with , Wikimedia Foundation Executive Director described Wool as \"a disgruntled former employee\" and called his claims \"a whole bunch of unsubstantiated rumors and gossip\". Wales's former girlfriend, journalist , recently leaked purported instant message transcripts with Wales, which implied Wales had used his influence to change the article about Marsden on Wikipedia. Wales ended his relationship with Marsden and made a public statement to that effect on Wikipedia, and in response Marsden opened an auction for some of Wales's clothing on . Related news Sister links", "edit_actions": [{"type": "R", "before": "Jimmy Wales at a Wikimania event in 2007. Wikipedia founder Jimmy Wales", "after": "founder", "start_char_pos": 0, "end_char_pos": 71}, {"type": "D", "before": "Wikimedia Foundation", "after": null, "start_char_pos": 158, "end_char_pos": 178}, {"type": "D", "before": "Sydney Morning Herald", "after": null, "start_char_pos": 218, "end_char_pos": 239}, {"type": "R", "before": "Novell computer scientist Jeff Merkey", "after": "computer scientist", "start_char_pos": 261, "end_char_pos": 298}, {"type": "D", "before": "Slashdot", "after": null, "start_char_pos": 439, "end_char_pos": 447}, {"type": "D", "before": "The Daily Telegraph", "after": null, "start_char_pos": 519, "end_char_pos": 538}, {"type": "D", "before": "USD$5,000 to the Wikimedia Foundation, and Wales made edits to the Wikipedia article about Merkey around the same time. Merkey published his claims on a public Wikimedia mailing list and sent a statement to The Associated Press. In a response Wales called Merkey's statements \"nonsense\", saying \"Of course I would never offer, nor accept any offer, whereby a donation would buy someone special editorial treatment in the encyclopedia. I do routinely assist people with WP:BLP issues, and I do courtesies for many people. Donations have no bearing on that at all.\" WP:BLP refers to Wikipedia's policy regarding biographies of living persons on the encyclopedia. After deleting the Wikipedia article about Merkey in 2006, Wales wrote to Wikipedia editors he had done so \"because of the unpleasantness of it\" and requested that they \"be extra careful here to be courteous and assume good faith\". After erasing the article, Wales placed the article under protection with editing access limited to established users. Merkey ceased his $", "after": null, "start_char_pos": 709, "end_char_pos": 1740}, {"type": "A", "before": null, "after": "000 to the Wikimedia Foundation, and Wales made edits to the Wikipedia article about Merkey around the same time. Merkey published his claims on a public Wikimedia mailing list and sent a statement to .", "start_char_pos": 1744, "end_char_pos": 1744}, {"type": "A", "before": null, "after": "In a response Wales called Merkey's statements \"nonsense\", saying \"Of course I would never offer, nor accept any offer, whereby a donation would buy someone special editorial treatment in the encyclopedia. I do routinely assist people with WP:BLP issues, and I do courtesies for many people. Donations have no bearing on that at all.\" refers to Wikipedia's policy regarding biographies of living persons on the encyclopedia.", "start_char_pos": 1745, "end_char_pos": 1745}, {"type": "A", "before": null, "after": "After deleting the Wikipedia article about Merkey in 2006, Wales wrote to Wikipedia editors he had done so \"because of the unpleasantness of it\" and requested that they \"be extra careful here to be courteous and assume good faith\". After erasing the article, Wales placed the article under protection with editing access limited to established users. Merkey ceased his $5,", "start_char_pos": 1746, "end_char_pos": 1746}, {"type": "D", "before": "Jay Walsh", "after": null, "start_char_pos": 2069, "end_char_pos": 2078}, {"type": "D", "before": "conflict of interest", "after": null, "start_char_pos": 2127, "end_char_pos": 2147}, {"type": "R", "before": "Delta Air Lines and Natural Selection Foods", "after": "and", "start_char_pos": 3012, "end_char_pos": 3055}, {"type": "D", "before": "The Wikipedia Signpost", "after": null, "start_char_pos": 3227, "end_char_pos": 3249}, {"type": "D", "before": "non-profit organization", "after": null, "start_char_pos": 3872, "end_char_pos": 3895}, {"type": "D", "before": "CNET TV", "after": null, "start_char_pos": 4020, "end_char_pos": 4027}, {"type": "D", "before": "Sue Gardner", "after": null, "start_char_pos": 4070, "end_char_pos": 4081}, {"type": "D", "before": "Rachel Marsden", "after": null, "start_char_pos": 4246, "end_char_pos": 4260}, {"type": "D", "before": "eBay", "after": null, "start_char_pos": 4595, "end_char_pos": 4599}, {"type": "A", "before": null, "after": "Sister links", "start_char_pos": 4615, "end_char_pos": 4615}], "sents_char_pos": [0, 41, 180, 413, 505, 682, 828, 937, 1143, 1229, 1272, 1369, 1601, 1720, 1941, 2386, 2480, 2606, 2773, 2891, 2983, 3132, 3226, 3458, 3553, 3759, 3998, 4207, 4421]}
+{"doc_id": "102156", "revision_depth": "2", "before_revision": "Jeff \" Legenday One \" Yang has completed the first stage of [ [ [ ] [ the race and is currently in first place and wearing a blessed jerseygiven to him by the Ruby Buddha ", "after_revision": " \" Race for Citizens \" , set up for basic bicycle sport promotion. Two cyclists from Merida Europe Team crossed the finish line firstly. Giant Asia Racing Team, the Team Champion in this series. A 72-golden-hour race of 2008 Tour de Taiwan in the Taipei-Keelung metropolitan area came to an end after entering the Taipei Xinyi Shopping Area as the final stage today. Before the main race, the organizer, Chinese Taipei Cycling Association held \"The 3rd Taipei Citizen Elimination Road Race\" to examine the achievements of basic cycling promotion. Even though its racing scale is one third of the Taipei Stage (60 laps, 1 km/lap), but several local cycling clubs and senior cyclists participated in this promotional race. Kuan-hua Lai, a cyclist from Giant Asia Racing Team, the current Taiwan leader of Tour de Taiwan, spoke to Wikinews Reporter Rico Shen before racing: \"Since we[the Team took the leading from Changhua County Stage until now, we were still be cautious of this current status because the competitors just lost behind within 15 seconds.\" And also, he commented about an \"earlier suspension\" incident in the same stage in 2007: \"I didn't participate in this series last year. However, with several cyclists' actual strengths in several criterium stages, I think that the same incident won't take place again this year.\" In the main race, due to a very close actual strength, not everyone can took the leading for a long-period especially in Asian cyclists' competition. As a result in the middle-end section, the main group extremity controlled the condition of this race. Finally, Marek Weso\u0142y from Merida Europe Team won his second stage champion in this stage since he got former stage champion in Pingtung County. With the stage champion went to Weso\u0142y, John Murphy firmly won the overall champion in this series after 8 stages' racing. By the way, Kuan-hua Lai not only won the Taiwan Champion and was voted as the \"Most Popular Taiwanese Cyclist\", but also helped his team (Giant Asia Racing Team) to win the Team Champion in this series. After the race, He commented about this race: \"Even though we got a great difference after we[the Team got the lead from Changhua[stage , but we got a damn difficult situation because the competitors just lost behind within a small difference. Because of this issue, we cautiously chose some roads to do several attacks to keep the leading to the end.\" And he also commented about the \"DAMN\" crash incident yesterday to Wikinews Reporter Rico Shen: \"It's unable to prevent the crash. But mostly, cyclists without concentrations to a race or a game] will bring on crash in a race. If a cyclist want to prevent a crash, a cyclist should focus on the race in any time and any where.\" In another brief after race interview, John Murphy talked to Wikinews Reporter Rico Shen about this stage especially on the competition of yellow jersey: \"Shawn Milne is a respectful competitor even though he was formerly in our[Health Net Pro Cycling team, but he majorly ever threatened me since he got the 5th Stage Champion. After this, my current teammates did several attempts covering me to the end, and finally, it took a good effort for me. I really appreciated and thanked for my teammates' help.\" Audio Highlights Key Results Tour de Taiwan Taipei City Stage 240px|Stage Champion and Individual Champions in this Stage. Stage Champion: Marek Weso\u0142y (Merida Europe) Individual Classification Asian Champion (Blue Jersey): Takashi Miyazawa (Team Meitan Hompo-GDR) Taiwan Champion (White Jersey): Kuan-hua Lai (Giant Asia Racing Team) Sprint Champion (Green Jersey): John Murphy (Health Net Pro Cycling Team) Overall Champion (Yellow Jersey): John Murphy Team Classification Giant Asia Racing Team Team Skil-Shimano Health Net Pro Cycling Team", "edit_actions": [{"type": "D", "before": "Jeff", "after": null, "start_char_pos": 0, "end_char_pos": 4}, {"type": "R", "before": "Legenday One", "after": "Race for Citizens", "start_char_pos": 7, "end_char_pos": 19}, {"type": "R", "before": "Yang has completed the first stage of", "after": ", set up for basic bicycle sport promotion. Two cyclists from Merida Europe Team crossed the finish line firstly. Giant Asia Racing Team, the Team Champion in this series. A 72-golden-hour race of 2008 Tour de Taiwan in the Taipei-Keelung metropolitan area came to an end after entering the Taipei Xinyi Shopping Area as the final stage today. Before the main race, the organizer, Chinese Taipei Cycling Association held \"The 3rd Taipei Citizen Elimination Road Race\" to examine the achievements of basic cycling promotion. Even though its racing scale is one third of the Taipei Stage (60 laps, 1 km/lap), but several local cycling clubs and senior cyclists participated in this promotional race.", "start_char_pos": 22, "end_char_pos": 59}, {"type": "A", "before": null, "after": "Kuan-hua Lai, a cyclist from Giant Asia Racing Team, the current Taiwan leader of Tour de Taiwan, spoke to Wikinews Reporter Rico Shen before racing: \"Since we", "start_char_pos": 60, "end_char_pos": 60}, {"type": "A", "before": null, "after": "the Team", "start_char_pos": 61, "end_char_pos": 61}, {"type": "A", "before": null, "after": "took the leading from Changhua County Stage until now, we were still be cautious of this current status because the competitors just lost behind within 15 seconds.\" And also, he commented about an \"earlier suspension\" incident in the same stage in 2007: \"I didn't participate in this series last year. However, with several cyclists' actual strengths in several criterium stages, I think that the same incident won't take place again this year.\"", "start_char_pos": 62, "end_char_pos": 62}, {"type": "A", "before": null, "after": "In the main race, due to a very close actual strength, not everyone can took the leading for a long-period especially in Asian cyclists' competition. As a result in the middle-end section, the main group extremity controlled the condition of this race. Finally, Marek Weso\u0142y from Merida Europe Team won his second stage champion in this stage since he got former stage champion in Pingtung County. With the stage champion went to Weso\u0142y, John Murphy firmly won the overall champion in this series after 8 stages' racing.", "start_char_pos": 63, "end_char_pos": 63}, {"type": "A", "before": null, "after": "By the way, Kuan-hua Lai not only won the Taiwan Champion and was voted as the \"Most Popular Taiwanese Cyclist\", but also helped his team (Giant Asia Racing Team) to win the Team Champion in this series. After the race, He commented about this race: \"Even though we got a great difference after we", "start_char_pos": 64, "end_char_pos": 64}, {"type": "A", "before": null, "after": "the Team", "start_char_pos": 65, "end_char_pos": 65}, {"type": "A", "before": null, "after": "got the lead from Changhua", "start_char_pos": 66, "end_char_pos": 66}, {"type": "A", "before": null, "after": "stage", "start_char_pos": 67, "end_char_pos": 67}, {"type": "A", "before": null, "after": ", but we got a damn difficult situation because the competitors just lost behind within a small difference. Because of this issue, we cautiously chose some roads to do several attacks to keep the leading to the end.\"", "start_char_pos": 68, "end_char_pos": 68}, {"type": "A", "before": null, "after": "And he also commented about the \"DAMN\" crash incident yesterday to Wikinews Reporter Rico Shen: \"It's unable to prevent the crash. But mostly, cyclists without concentrations to a race", "start_char_pos": 69, "end_char_pos": 69}, {"type": "A", "before": null, "after": "or a game", "start_char_pos": 70, "end_char_pos": 70}, {"type": "A", "before": null, "after": "will bring on crash in a race. If a cyclist want to prevent a crash, a cyclist should focus on the race in any time and any where.\"", "start_char_pos": 72, "end_char_pos": 72}, {"type": "A", "before": null, "after": "In another brief after race interview, John Murphy talked to Wikinews Reporter Rico Shen about this stage especially on the competition of yellow jersey: \"Shawn Milne is a respectful competitor even though he was formerly in our", "start_char_pos": 73, "end_char_pos": 73}, {"type": "A", "before": null, "after": "Health Net Pro Cycling", "start_char_pos": 74, "end_char_pos": 74}, {"type": "A", "before": null, "after": "team, but he majorly ever threatened me since he got the 5th Stage Champion. After this, my current teammates did several attempts covering me to", "start_char_pos": 75, "end_char_pos": 75}, {"type": "R", "before": "race and is currently in first place and wearing a blessed jerseygiven to him by the Ruby Buddha", "after": "end, and finally, it took a good effort for me. I really appreciated and thanked for my teammates' help.\" Audio Highlights", "start_char_pos": 80, "end_char_pos": 176}, {"type": "A", "before": null, "after": "Key Results Tour de Taiwan Taipei City Stage 240px|Stage Champion and Individual Champions in this Stage. Stage Champion: Marek Weso\u0142y (Merida Europe) Individual Classification Asian Champion (Blue Jersey): Takashi Miyazawa (Team Meitan Hompo-GDR) Taiwan Champion (White Jersey): Kuan-hua Lai (Giant Asia Racing Team) Sprint Champion (Green Jersey): John Murphy (Health Net Pro Cycling Team) Overall Champion (Yellow Jersey): John Murphy", "start_char_pos": 177, "end_char_pos": 177}, {"type": "A", "before": null, "after": "Team Classification Giant Asia Racing Team Team Skil-Shimano Health Net Pro Cycling Team", "start_char_pos": 178, "end_char_pos": 178}], "sents_char_pos": [0]}
+{"doc_id": "103071", "revision_depth": "1", "before_revision": "As a non-partisan news source, Wikinews has impartially reached out to these candidates, who are looking to become the 43rd person elected to serve their nation from 1600 Pennsylvania Avenue NW. Wikinews' own Patrick Mannion corresponded with the Socialist Party USA nominee and candidate, Brian Moore via e-mail. Have you ever run for political office before? Moore: Yes, I ran for city council and mayor in Washington in the 1980's and 1990's; and I ran for the U.S. Congress and the U.S. Senate in Florida in 2002, 2004 and 2006 respectively. Have you ever been a member of a political party, other than the one you're currently in? Moore: Yes, I was a member of the Democratic Party , the Citizens Party, the Reform Party and the Socialist Party . I also was an Independent for a long period of time. What skills or ideas do or previous positions, you bring from this position that will benefit the Oval Office? Moore: Not sure your question is clear. I have worked in the private and public sector, for-profit and non-profit sectors, domestically and internationally, as an administrator, project director, fundraiser and in sales. I have worked with the poor and solicited funds from corporations and governments as well. I speak Spanish and some Portuguese , and have traveled and lived in South America for almost eight years. I have been involved civically and politically and professionally for forty years, I play sports and attend cultural events, and feel I am well-rounded. I speak out forthrightly on the issues, take strong and clear stands, take the initiative a lot and leader and/or start causes and projects in a leadership capacity. Freedom and Privacy Rights: Abolish the Patriot Act, the Military Tribunal bill , all executive orders that water down people's rights, and abolish all intelligence agencies overseas and the Homeland Security Agency at home. Can any third party or independent candidate ever win? Moore: Yes, per the rationale mentioned in answer #11; or from an attractive third party candidate and an even split from the other two major party candidates. Remember, Bill Clinton won the 1992 presidency with 39\\% of the vote, George Bush with 37\\%, Ross Perot with 20\\% (he was up to 40\\% in the early part of the campaign and won up to 28\\% in some states). Plus, the country is getting tired of holding its nose and voting for the lesser of two evils, plus the number of Independent and minor party candidates is growing and about to surpass one or both of the two major parties in percentage registered. Why do you believe socialism or even democratic socialism has never really \"taken off\" in America? Moore: Socialism had taken off in America. It is just that the \"Red Scare\" and the Espionage Act and the Sedition Act between 1917 and 1924 by the U.S. government, Stalinism and McCarthyism from 1945 to 1955; and the Cold War in the second half of the 20th century all undermined a wonderful and rich heritage of our country that thrived from 1900 thru 1925 and beyond. There were 1200 officeholders in America who were registered and public candidates as Socialists in America around 1920. Close to one million Americans voted for Eugene Debs in 1912 and 1920, gaining 9\\% and 11\\% of the popular vote. Remember, Teddy Roosevelt ran in 1912 as a third party candidate and garnered the second highest vote totals (20\\%) and still Gene Debs also gained around 11\\%. Can you imagine if Teddy Roosevelt had not been a candidate in that election! Secondly, the Socialists were against World World I , plus there was a split in the party with over half going to Communism, thus both suffering the consequences of Woodrow Wilson's Sedition Act and Red Scare tactics accusing them of being traitors. Membership in the Socialist Party of America grew from 13,000 to 118,000 by 1912, and circulation of its journal, Appeal to Reason , reached a circulation of over 760,000. Keep in mind supporters of Socialism then and into the 1930's and 1940's, in addition to Eugene V. Debs were Upton Sinclair, Helen Keller, Einstein, Sinclair Lewis, A. Philip Randolph, Walter Reuther, Margaret Sanger, Jack London, William DuBois, Kate Richards O'Hare, Frank Zeidler, Rose Pastor Stokes, Victor Berger, Bayard Rustin and Michael Harrington . The growth of the left worried President Woodrow Wilson and his administration so much that America entered what became known as the \"Red Scare\" period. In 1919, U.S. Attorney General Alexander Mitchell Palmer , at the order of President Wilson, arrested over 10,000 suspected communists and anarchists. These people were charged with \"advocating force, violence and unlawful means to overthrow the Government.\" J. Edgar Hoover was part of the effort at that time. Large number of these \"suspects\" were held without trial for a long time, and some were expelled to Russia. The Socialist party took a terrible hit and its membership suffered a severe drop due to the governmental intimidation and false claims against it. If you can't make it into the Oval Office, who would you prefer seeing taking the presidency? Moore: No one else, other than Ralph Nader . All, including Ralph Nader, are part of the capitalistic system, and accept its premises that competition, profit, ambition, taking the initiative, winning, exploitation, and survival of the fittest philosophy win over the socialist's features of cooperation, democracy, communal responsibility, fairness, equity, egalitarianism, mutual respect, helping one another, etc. Even Ralph Nader would have a terrible time under capitalism, but I think down deep he really is a socialist at heart, but does not have the gumption or is too practical to believe that it can emerge or survive.", "after_revision": "As a non-partisan news source, Wikinews has impartially reached out to these candidates, who are looking to become the 43rd person elected to serve their nation from 1600 Pennsylvania Avenue NW. Wikinews' own Patrick Mannion corresponded with the Socialist Party USA nominee and candidate, via e-mail. Have you ever run for political office before? Moore: Yes, I ran for city council and mayor in in the 1980's and 1990's; and I ran for the | U.S. Congress and the in Florida in 2002, 2004 and 2006 respectively. Have you ever been a member of a political party, other than the one you're currently in? Moore: Yes, I was a member of the , the Citizens Party, the and the . I also was an for a long period of time. What skills or ideas do or previous positions, you bring from this position that will benefit the Oval Office? Moore: Not sure your question is clear. I have worked in the private and public sector, for-profit and non-profit sectors, domestically and internationally, as an administrator, project director, fundraiser and in sales. I have worked with the poor and solicited funds from corporations and governments as well. I speak and some , and have traveled and lived in South America for almost eight years. I have been involved civically and politically and professionally for forty years, I play sports and attend cultural events, and feel I am well-rounded. I speak out forthrightly on the issues, take strong and clear stands, take the initiative a lot and leader and/or start causes and projects in a leadership capacity. Freedom and Privacy Rights: Abolish the , the , all executive orders that water down people's rights, and abolish all intelligence agencies overseas and the Homeland Security Agency at home. Can any third party or independent candidate ever win? Moore: Yes, per the rationale mentioned in answer #11; or from an attractive third party candidate and an even split from the other two major party candidates. Remember, won the 1992 presidency with 39\\% of the vote, with 37\\%, with 20\\% (he was up to 40\\% in the early part of the campaign and won up to 28\\% in some states). Plus, the country is getting tired of holding its nose and voting for the lesser of two evils, plus the number of Independent and minor party candidates is growing and about to surpass one or both of the two major parties in percentage registered. Why do you believe socialism or even democratic socialism has never really \"taken off\" in America? Moore: Socialism had taken off in America. It is just that the and the and the between 1917 and 1924 by the U.S. government, and from 1945 to 1955; and the Cold War in the second half of the 20th century all undermined a wonderful and rich heritage of our country that thrived from 1900 thru 1925 and beyond. There were 1200 officeholders in America who were registered and public candidates as Socialists in America around 1920. Close to one million Americans voted for in 1912 and 1920, gaining 9\\% and 11\\% of the popular vote. Remember, ran in 1912 as a third party candidate and garnered the second highest vote totals (20\\%) and still Gene Debs also gained around 11\\%. Can you imagine if Teddy Roosevelt had not been a candidate in that election! Secondly, the Socialists were against , plus there was a split in the party with over half going to Communism, thus both suffering the consequences of Woodrow Wilson's Sedition Act and Red Scare tactics accusing them of being traitors. Membership in the grew from 13,000 to 118,000 by 1912, and circulation of its journal, , reached a circulation of over 760,000. Keep in mind supporters of Socialism then and into the 1930's and 1940's, in addition to Eugene V. Debs were , , , , , , , , , , , , , and . The growth of the left worried President and his administration so much that America entered what became known as the \"Red Scare\" period. In 1919, U.S. Attorney General , at the order of President Wilson, arrested over 10,000 suspected communists and anarchists. These people were charged with \"advocating force, violence and unlawful means to overthrow the Government.\" was part of the effort at that time. Large number of these \"suspects\" were held without trial for a long time, and some were expelled to Russia. The Socialist party took a terrible hit and its membership suffered a severe drop due to the governmental intimidation and false claims against it. If you can't make it into the Oval Office, who would you prefer seeing taking the presidency? Moore: No one else, other than . All, including Ralph Nader, are part of the capitalistic system, and accept its premises that competition, profit, ambition, taking the initiative, winning, exploitation, and survival of the fittest philosophy win over the socialist's features of cooperation, democracy, communal responsibility, fairness, equity, egalitarianism, mutual respect, helping one another, etc. Even Ralph Nader would have a terrible time under capitalism, but I think down deep he really is a socialist at heart, but does not have the gumption or is too practical to believe that it can emerge or survive.", "edit_actions": [{"type": "D", "before": "Brian Moore", "after": null, "start_char_pos": 290, "end_char_pos": 301}, {"type": "D", "before": "Washington", "after": null, "start_char_pos": 409, "end_char_pos": 419}, {"type": "A", "before": null, "after": "|", "start_char_pos": 464, "end_char_pos": 464}, {"type": "R", "before": "and the U.S. Senate", "after": "and the", "start_char_pos": 479, "end_char_pos": 498}, {"type": "D", "before": "Democratic Party", "after": null, "start_char_pos": 671, "end_char_pos": 687}, {"type": "R", "before": "Reform Party and the Socialist Party", "after": "and the", "start_char_pos": 714, "end_char_pos": 750}, {"type": "D", "before": "Independent", "after": null, "start_char_pos": 767, "end_char_pos": 778}, {"type": "R", "before": "Spanish and some Portuguese", "after": "and some", "start_char_pos": 1237, "end_char_pos": 1264}, {"type": "D", "before": "Patriot Act, the Military Tribunal bill", "after": null, "start_char_pos": 1695, "end_char_pos": 1734}, {"type": "A", "before": null, "after": "the ,", "start_char_pos": 1737, "end_char_pos": 1737}, {"type": "D", "before": "Bill Clinton", "after": null, "start_char_pos": 2106, "end_char_pos": 2118}, {"type": "D", "before": "George Bush", "after": null, "start_char_pos": 2166, "end_char_pos": 2177}, {"type": "D", "before": "Ross Perot", "after": null, "start_char_pos": 2189, "end_char_pos": 2199}, {"type": "R", "before": "\"Red Scare\" and the Espionage Act and the Sedition Act", "after": "and the and the", "start_char_pos": 2709, "end_char_pos": 2763}, {"type": "R", "before": "Stalinism and McCarthyism", "after": "and", "start_char_pos": 2810, "end_char_pos": 2835}, {"type": "D", "before": "Eugene Debs", "after": null, "start_char_pos": 3178, "end_char_pos": 3189}, {"type": "D", "before": "Teddy Roosevelt", "after": null, "start_char_pos": 3260, "end_char_pos": 3275}, {"type": "D", "before": "World World I", "after": null, "start_char_pos": 3527, "end_char_pos": 3540}, {"type": "D", "before": "Socialist Party of America", "after": null, "start_char_pos": 3757, "end_char_pos": 3783}, {"type": "D", "before": "Appeal to Reason", "after": null, "start_char_pos": 3853, "end_char_pos": 3869}, {"type": "R", "before": "Upton Sinclair, Helen Keller, Einstein, Sinclair Lewis, A. Philip Randolph, Walter Reuther, Margaret Sanger, Jack London, William DuBois, Kate Richards O'Hare, Frank Zeidler, Rose Pastor Stokes, Victor Berger, Bayard Rustin and Michael Harrington", "after": ", , , , , , , , , , , , , and", "start_char_pos": 4020, "end_char_pos": 4266}, {"type": "D", "before": "Woodrow Wilson", "after": null, "start_char_pos": 4310, "end_char_pos": 4324}, {"type": "D", "before": "Alexander Mitchell Palmer", "after": null, "start_char_pos": 4453, "end_char_pos": 4478}, {"type": "D", "before": "J. Edgar Hoover", "after": null, "start_char_pos": 4681, "end_char_pos": 4696}, {"type": "D", "before": "Ralph Nader", "after": null, "start_char_pos": 5115, "end_char_pos": 5126}], "sents_char_pos": [0, 313, 360, 445, 546, 636, 752, 805, 916, 956, 1137, 1228, 1335, 1488, 1654, 1880, 1935, 1990, 2095, 2298, 2546, 2645, 2688, 2854, 3015, 3136, 3249, 3410, 3488, 3738, 3910, 4268, 4421, 4572, 4733, 4841, 4989, 5083, 5500]}
+{"doc_id": "103516", "revision_depth": "1", "before_revision": "In his speech at NATO's 2008 Bucharest summit on Thursday, the President of Moldova Vladimir Voronin asked for international support in solving the Transnistrian conflict and in overcoming polemics with regard to Moldova's national identity and present borders. Transnistria is a region, roughly between the Dniester river and Ukraine. It declared its independence in 1992, but is not recognised as such by any state or international organisation and lies entirely within the internationally recognised borders of Moldova. The region has organised itself as a republic under the name Pridnestrovian Moldavian Republic. It has been de facto independent since a ceasefire in July 1992 and Moldova exercises no control over the region. The Joint Control Commission has maintained a buffer zone ever since the War of Transnistria . Voronin said the Transnistrian problem fuels a potential of insecurity and instability not only for Moldova's territory, but also for the whole region, and is still unsettled. He called attention to the regional-scale effects of this conflict, saying that it blocks Moldova's modernization, as well as the interference of Transnistria-related problems with up-to-date international security issues, such as the Conventional Armed Forces in Europe Treaty (CFE Treaty), NATO's extension, anti-missile defense systems in Europe and Kosovo are obvious, Vladimir Voronin specified. Map of Moldova, highlighting the break-away region, Transnistria. Vladimir Voronin reaffirmed Moldova's official position at this important event, which debates security issues: \"We want to identify a viable solution to the Transnistrian problem, which should be focused on the demilitarization and the prohibition of foreign troops and military facilities on our national territory, in line with the recognized status of Moldova's neutrality, as well as giving a fair status to the Transnistrian region within a sovereign, indivisible and territorially united Moldova.\" The president reiterated that 17 years after the proclamation of Moldovan independence , it seeks the support of the international community in order to avoid destructive polemics on our national identity and present borders. Doing so will help Moldova focus on their pro-European aspirations. He also called for greater involvement by all sides for the recognition of Moldova's neutrality and promotion of the country's reintegration on the basis of the international law . During the NATO summit, Vladimir Voronin held discussions with President of Latvia Valdis Zatlers and Lithuanian President Valdas Adamkus . The officials focused on Moldova's cooperative ties with Latvia and Lithuania and the prospects of extending and deepening the country's collaboration with the two Baltic states . The Moldovan president thanked both the Latvian authorities and the Lithuanian leadership for the firm support given Moldova to make the country's European integration choice come true. The head of state stressed the Moldovan side's increased interest in continuing cooperation in the field of promoting the European standards by taking over the advanced European integration experience of the two states. President Vladimir Voronin returned to Chisinau Thursday evening.", "after_revision": "In his speech at NATO's on Thursday, the asked for international support in solving the Transnistrian conflict and in overcoming with regard to Moldova's national identity and present borders. Transnistria is a region, roughly between the river and Ukraine. It declared its independence in 1992, but is not as such by any state or international organisation and lies entirely within the internationally recognised borders of Moldova. The region has organised itself as a republic under the name Pridnestrovian Moldavian Republic. It has been de facto independent since a ceasefire in July 1992 and Moldova exercises no control over the region. The has maintained a ever since the . Voronin said the Transnistrian problem fuels a potential of insecurity and instability not only for Moldova's territory, but also for the whole region, and is still unsettled. He called attention to the regional-scale effects of this conflict, saying that it blocks Moldova's modernization, as well as the interference of Transnistria-related problems with up-to-date international security issues, such as the (CFE Treaty), NATO's extension, anti-missile defense systems in Europe and Kosovo are obvious, Vladimir Voronin specified. Map of Moldova, highlighting the break-away region, Transnistria. Vladimir Voronin reaffirmed Moldova's official position at this important event, which debates security issues: \"We want to identify a viable solution to the Transnistrian problem, which should be focused on the demilitarization and the prohibition of foreign troops and military facilities on our national territory, in line with the recognized status of Moldova's neutrality, as well as giving a fair status to the Transnistrian region within a sovereign, indivisible and territorially united Moldova.\" The president reiterated that 17 years after the proclamation of , it seeks the support of the international community in order to avoid destructive polemics on our national identity and present borders. Doing so will help Moldova focus on their pro-European aspirations. He also called for greater involvement by all sides for the recognition of Moldova's and promotion of the country's reintegration on the basis of the . During the NATO summit, Vladimir Voronin held discussions with and Lithuanian President . The officials focused on Moldova's cooperative ties with Latvia and Lithuania and the prospects of extending and deepening the country's collaboration with the two . The Moldovan president thanked both the Latvian authorities and the Lithuanian leadership for the firm support given Moldova to make the country's choice come true. The head of state stressed the Moldovan side's increased interest in continuing cooperation in the field of promoting the European standards by taking over the advanced European integration experience of the two states. President Vladimir Voronin returned to Thursday evening.", "edit_actions": [{"type": "D", "before": "2008 Bucharest summit", "after": null, "start_char_pos": 24, "end_char_pos": 45}, {"type": "D", "before": "President of Moldova Vladimir Voronin", "after": null, "start_char_pos": 63, "end_char_pos": 100}, {"type": "D", "before": "polemics", "after": null, "start_char_pos": 189, "end_char_pos": 197}, {"type": "D", "before": "Dniester", "after": null, "start_char_pos": 308, "end_char_pos": 316}, {"type": "D", "before": "recognised", "after": null, "start_char_pos": 385, "end_char_pos": 395}, {"type": "D", "before": "Joint Control Commission", "after": null, "start_char_pos": 737, "end_char_pos": 761}, {"type": "D", "before": "buffer zone", "after": null, "start_char_pos": 779, "end_char_pos": 790}, {"type": "D", "before": "War of Transnistria", "after": null, "start_char_pos": 806, "end_char_pos": 825}, {"type": "D", "before": "Conventional Armed Forces in Europe Treaty", "after": null, "start_char_pos": 1239, "end_char_pos": 1281}, {"type": "D", "before": "Moldovan independence", "after": null, "start_char_pos": 2041, "end_char_pos": 2062}, {"type": "D", "before": "neutrality", "after": null, "start_char_pos": 2355, "end_char_pos": 2365}, {"type": "D", "before": "international law", "after": null, "start_char_pos": 2431, "end_char_pos": 2448}, {"type": "D", "before": "President of Latvia Valdis Zatlers", "after": null, "start_char_pos": 2514, "end_char_pos": 2548}, {"type": "D", "before": "Valdas Adamkus", "after": null, "start_char_pos": 2574, "end_char_pos": 2588}, {"type": "D", "before": "Baltic states", "after": null, "start_char_pos": 2755, "end_char_pos": 2768}, {"type": "D", "before": "European integration", "after": null, "start_char_pos": 2918, "end_char_pos": 2938}, {"type": "D", "before": "Chisinau", "after": null, "start_char_pos": 3216, "end_char_pos": 3224}], "sents_char_pos": [0, 261, 335, 522, 618, 732, 827, 1003, 1404, 1470, 1582, 1975, 2201, 2269, 2590, 2770, 2956, 3176]}
+{"doc_id": "104781", "revision_depth": "1", "before_revision": "An earlier Soyuz-FG launch At 22:16 GMT yesterday (04:16 today local time), a Russian Soyuz-FG / Fregat carrier rocket was launched from Site 31/6 the Baikonur Cosmodrome in Kazakhstan, carrying the European GIOVE-B experimental Navigation satellite . The launch was conducted by Starsem , a Russo-European organisation which commercially markets Soyuz-FG and Soyuz-2 launches. GIOVE-B was successfully deployed into a medium Earth orbit at 02:01 GMT this morning, after an ascent lasting nearly four hours. GIOVE-B will serve as a prototype for the Galileo positioning system . It is the second such prototype, GIOVE-A is already in orbit, having been launched in December 2005. GIOVE-B was originally scheduled to launch in April 2006, but was delayed for a number of reasons. The next Galileo launch is scheduled to be the first cluster of operational satellites, which will be launched in 2010. The next Soyuz launch will be a Soyuz-U in mid-may, with a Progress spacecraft to resupply the International Space Station . This was the 20th orbital launch of 2008 , the 24th Soyuz-FG launch, and the 1,732nd flight of a Soyuz rocket of any variant.", "after_revision": " At 22:16 GMT yesterday (04:16 today local time), a Russian / carrier rocket was launched from the in Kazakhstan, carrying the European experimental . The launch was conducted by , a Russo-European organisation which commercially markets Soyuz-FG and launches. GIOVE-B was successfully deployed into a at 02:01 GMT this morning, after an ascent lasting nearly four hours. GIOVE-B will serve as a prototype for the . It is the second such prototype, GIOVE-A is already in orbit, having been launched in December 2005. GIOVE-B was originally scheduled to launch in April 2006, but was delayed for a number of reasons. The next Galileo launch is scheduled to be the first cluster of operational satellites, which will be launched in 2010. The next Soyuz launch will be a in mid-may, with a to resupply the . This was the 20th orbital launch of , the 24th Soyuz-FG launch, and the 1,732nd flight of a Soyuz rocket of any variant.", "edit_actions": [{"type": "D", "before": "An earlier Soyuz-FG launch", "after": null, "start_char_pos": 0, "end_char_pos": 26}, {"type": "D", "before": "Soyuz-FG", "after": null, "start_char_pos": 86, "end_char_pos": 94}, {"type": "D", "before": "Fregat", "after": null, "start_char_pos": 97, "end_char_pos": 103}, {"type": "R", "before": "Site 31/6 the Baikonur Cosmodrome", "after": "the", "start_char_pos": 137, "end_char_pos": 170}, {"type": "R", "before": "GIOVE-B experimental Navigation satellite", "after": "experimental", "start_char_pos": 208, "end_char_pos": 249}, {"type": "D", "before": "Starsem", "after": null, "start_char_pos": 280, "end_char_pos": 287}, {"type": "D", "before": "Soyuz-2", "after": null, "start_char_pos": 360, "end_char_pos": 367}, {"type": "D", "before": "medium Earth orbit", "after": null, "start_char_pos": 419, "end_char_pos": 437}, {"type": "D", "before": "Galileo positioning system", "after": null, "start_char_pos": 550, "end_char_pos": 576}, {"type": "D", "before": "Soyuz-U", "after": null, "start_char_pos": 931, "end_char_pos": 938}, {"type": "D", "before": "Progress spacecraft", "after": null, "start_char_pos": 958, "end_char_pos": 977}, {"type": "D", "before": "International Space Station", "after": null, "start_char_pos": 994, "end_char_pos": 1021}, {"type": "D", "before": "2008", "after": null, "start_char_pos": 1060, "end_char_pos": 1064}], "sents_char_pos": [0, 251, 377, 507, 578, 679, 778, 898, 1023]}
+{"doc_id": "104827", "revision_depth": "1", "before_revision": "240px|Professional wrestling is originated from basic wrestlingwith other elements involved in . Pro-wrestling, a derivative sport similar with basic wrestling, is often connected with \"professional\". Its topics mostly linked with Japanese and American (e.g. World Wrestling Entertainment, New Japan Pro Wrestling, etc.) are often discussed on the Internet. Progressively, TV programs related to pro-wrestling became a focus by spectators and mass media world-wide not only in Japan, America, and Europe. In Taiwan, not only basic consumers watched TV shows and discussed via the Internet, but some of them participated its sport (wrestling ) through communities from the Internet or colleges. Although a Taiwanese wrestler won a world-class pro-wrestling title back to Taiwan, but due to some policies to promote on some key athlete sports like baseball, billiard , basketball, and taekwondo with more possibilities to win a gold medal in Asian Games or Olympics , the governmental officials lost a great opportunity to promote basic or public sports like wrestling, with potential participantsbut officials not to pay more attentions in it . What's the vision of wrestling in Taiwan? How did the communities drive basic consumers ( TV spectators and wrestling fans ) and (government ) officials pay more attentions in wrestling? Will \"wrestling \" become a future star in Taiwan? As of them, Wikinews Journalist Rico Shen visited \"2008 IWL Spring Festival\" by an unofficial community and interviewed \"Mr. Orange\", commentator of WWE TV shows by VideoLand Max TV in Taiwan, to prospect the future of wrestling. Interview Audio interview highlights in Chinese-language. Hello, everyone! In my side is \"Mr. Orange\", WWE TV show commentator of VideoLand Max TV in Taiwan, I will do a special interview for topics related to wrestling, and he will do an overview of wrestling in Taiwan with his experiences. 180px|\"Mr. Orange\", a famous WWE TV show commentator of VideoLand Max TV in Taiwan. Glad to see an unofficial wrestling match in the Taipei City Mall. How did you involve in wrestling initially?", "after_revision": "240px|Professional wrestling traces its origins to Greco-Roman freestyle wrestling . Pro-wrestling, a sport derived from Greco-Roman freestyle wrestling, is often connected with the idea of sports-entertainment. Popularized by Japanese and American federations (e.g. World Wrestling Entertainment, New Japan Pro Wrestling, etc.) the ongoing events and news are often discussed on the Internet. As such, television programs and other mass media focused on pro-wrestling are commonplace in Japan, America, and Europe. In Taiwan, fans do not simply watch the TV shows and discuss them via the Internet, but some of them participate in the sport of wrestling through communities from the Internet or colleges. Although a Taiwanese wrestler recently won a world-class pro-wrestling title , due to policies that focused only on promoting key athletic sports like baseball, billiards , basketball, and taekwondo (i.e. those with more possibilities to win a gold medal in the Asian Games or Olympics ), governmental officials lost a great opportunity to promote sports like wrestling, which has many potential participants . What's the vision of wrestling in Taiwan? How did the communities drive TV spectators and wrestling fans and government officials pay more attention in wrestling? Is wrestling a future key sport in Taiwan? Wikinews Journalist Rico Shen visited the \"2008 IWL Spring Festival\" , organised by a fan community and interviewed \"Mr. Orange\", well-known commentator of WWE TV shows broadcasted by VideoLand Max TV in Taiwan, to prospect the future of wrestling. Interview Audio interview highlights in Chinese-language. Hello, everyone! In my side is \"Mr. Orange\", WWE TV show commentator of VideoLand Max TV in Taiwan, I will do a special interview for topics related to wrestling, and he will do an overview of wrestling in Taiwan with his experiences. 180px|\"Mr. Orange\", a famous WWE TV show commentator of VideoLand Max TV in Taiwan. Glad to see an unofficial wrestling match in the Taipei City Mall. How did you involve in wrestling initially?", "edit_actions": [{"type": "R", "before": "is originated from basic wrestlingwith other elements involved in", "after": "traces its origins to Greco-Roman freestyle wrestling", "start_char_pos": 29, "end_char_pos": 94}, {"type": "R", "before": "derivative sport similar with basic", "after": "sport derived from Greco-Roman freestyle", "start_char_pos": 114, "end_char_pos": 149}, {"type": "R", "before": "\"professional\". Its topics mostly linked with", "after": "the idea of sports-entertainment. Popularized by", "start_char_pos": 185, "end_char_pos": 230}, {"type": "A", "before": null, "after": "federations", "start_char_pos": 253, "end_char_pos": 253}, {"type": "A", "before": null, "after": "the ongoing events and news", "start_char_pos": 322, "end_char_pos": 322}, {"type": "R", "before": "Progressively, TV programs related to", "after": "As such, television programs and other mass media focused on", "start_char_pos": 360, "end_char_pos": 397}, {"type": "R", "before": "became a focus by spectators and mass media world-wide not only", "after": "are commonplace", "start_char_pos": 412, "end_char_pos": 475}, {"type": "R", "before": "not only basic consumers watched", "after": "fans do not simply watch the", "start_char_pos": 518, "end_char_pos": 550}, {"type": "R", "before": "discussed", "after": "discuss them", "start_char_pos": 564, "end_char_pos": 573}, {"type": "R", "before": "participated its sport (wrestling )", "after": "participate in the sport of wrestling", "start_char_pos": 609, "end_char_pos": 644}, {"type": "A", "before": null, "after": "recently", "start_char_pos": 726, "end_char_pos": 726}, {"type": "R", "before": "back to Taiwan, but due to some policies to promote on some key athlete", "after": ", due to policies that focused only on promoting key athletic", "start_char_pos": 765, "end_char_pos": 836}, {"type": "R", "before": "billiard", "after": "billiards", "start_char_pos": 859, "end_char_pos": 867}, {"type": "A", "before": null, "after": "(i.e. those", "start_char_pos": 896, "end_char_pos": 896}, {"type": "A", "before": null, "after": "the", "start_char_pos": 944, "end_char_pos": 944}, {"type": "R", "before": ", the", "after": "),", "start_char_pos": 969, "end_char_pos": 974}, {"type": "D", "before": "basic or public", "after": null, "start_char_pos": 1034, "end_char_pos": 1049}, {"type": "R", "before": "with potential participantsbut officials not to pay more attentions in it", "after": "which has many potential participants", "start_char_pos": 1073, "end_char_pos": 1146}, {"type": "D", "before": "basic consumers (", "after": null, "start_char_pos": 1221, "end_char_pos": 1238}, {"type": "R", "before": ") and (government )", "after": "and government", "start_char_pos": 1272, "end_char_pos": 1291}, {"type": "R", "before": "attentions", "after": "attention", "start_char_pos": 1311, "end_char_pos": 1321}, {"type": "R", "before": "Will \"wrestling \" become a future star", "after": "Is wrestling a future key sport", "start_char_pos": 1336, "end_char_pos": 1374}, {"type": "D", "before": "As of them,", "after": null, "start_char_pos": 1386, "end_char_pos": 1397}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1436, "end_char_pos": 1436}, {"type": "R", "before": "by an unofficial", "after": ", organised by a fan", "start_char_pos": 1464, "end_char_pos": 1480}, {"type": "A", "before": null, "after": "well-known", "start_char_pos": 1521, "end_char_pos": 1521}, {"type": "A", "before": null, "after": "broadcasted", "start_char_pos": 1550, "end_char_pos": 1550}], "sents_char_pos": [0, 200, 359, 506, 695, 1148, 1190, 1335, 1385, 1618, 1676, 1693, 1911, 1995, 2062]}
+{"doc_id": "104902", "revision_depth": "2", "before_revision": "SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX # old people sex%DIFDELCMD < ] %%% SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX # baby sex%DIFDELCMD < ] %%% SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX # porn%DIFDELCMD < ] %%% SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX # kid sex & & ", "after_revision": " %DIFDELCMD < ] %%% %DIFDELCMD < ] %%% %DIFDELCMD < ] %%% 240px|\"RoboScooter\", the next-generation concept vehicle with energy-efficiency and creation features. At the Pavilion of Taiwan Automotive Research Consortium during the AutoTronics Taipei 2008, in Taipei Time, the Next Consortium of Industrial Technology Research Institute (ITRI) unveiled a brand-new environmental-concept vehicle named \"RoboScooter\". It was jointly designed by the Creativity Lab of ITRI, SYM Motors, and the Media Lab of Massachusetts Institute of Technology. This announcement was approved by industrial, governmental, and academical executives, but not just in Taiwan. The ability for R&D to manufacture the electronic vehicles and bicycles was concerning to several automobile-related industries. There was concern not only from several trade shows, but also international competitions related to the design after winning several prizes back in Taiwan to establish the industrial position and brand image of \"Made in Taiwan\". Since several industries like automobile are transformed to high-value industries, \"creativity\" progressively became a key element before unveiling any new products. As of this sector, Wen-jean Hsueh (ITRI Creativity Lab General Director) hoped companies could do proper transformations on its R&D nature from \"Made in Taiwan\" to \"Created in Taiwan\" for best practice. This not only echoed \"OBM\" theory discussed at 2007 Taiwan Brands' Trend Forum but also blended with a key element of production - \"creativity\". On the other side of SYM Motors, to solve the transportation problem for TWTC Nangang, SYM Motors Taiwan imported manufacturing technology from Kinglong Bus Co., Ltd. to manufacture several 4th-cycle low floor buses and sell them to Chung-hsing Bus Co., Ltd. and Kwang-huang Bus Co., Ltd. In this launch, the SYM Motors Taiwan hope this vehicle is energy-efficiency, easily-parked, and has creative functions which can improve the transportation habits of individuals. Related news", "edit_actions": [{"type": "D", "before": "SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX", "after": null, "start_char_pos": 0, "end_char_pos": 1639}, {"type": "D", "before": "# old people sex", "after": null, "start_char_pos": 1640, "end_char_pos": 1656}, {"type": "D", "before": "SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX", "after": null, "start_char_pos": 1675, "end_char_pos": 3202}, {"type": "D", "before": "# baby sex", "after": null, "start_char_pos": 3203, "end_char_pos": 3213}, {"type": "D", "before": "SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX", "after": null, "start_char_pos": 3232, "end_char_pos": 4063}, {"type": "D", "before": "# porn", "after": null, "start_char_pos": 4064, "end_char_pos": 4070}, {"type": "D", "before": "SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX SEX", "after": null, "start_char_pos": 4089, "end_char_pos": 5688}, {"type": "R", "before": "# kid sex", "after": "240px|\"RoboScooter\", the next-generation concept vehicle with energy-efficiency and creation features. At the Pavilion of Taiwan Automotive Research Consortium during the AutoTronics Taipei 2008, in Taipei Time, the Next Consortium of Industrial Technology Research Institute (ITRI) unveiled a brand-new environmental-concept vehicle named \"RoboScooter\". It was jointly designed by the Creativity Lab of ITRI, SYM Motors, and the Media Lab of Massachusetts Institute of Technology. This announcement was approved by industrial, governmental, and academical executives, but not just in Taiwan.", "start_char_pos": 5689, "end_char_pos": 5698}, {"type": "A", "before": null, "after": "The ability for R", "start_char_pos": 5699, "end_char_pos": 5699}, {"type": "A", "before": null, "after": "D to manufacture the electronic vehicles and bicycles was concerning to several automobile-related industries. There was concern not only from several trade shows, but also international competitions related to the design after winning several prizes back in Taiwan to establish the industrial position and brand image of \"Made in Taiwan\". Since several industries like automobile are transformed to high-value industries, \"creativity\" progressively became a key element before unveiling any new products.", "start_char_pos": 5700, "end_char_pos": 5700}, {"type": "A", "before": null, "after": "As of this sector, Wen-jean Hsueh (ITRI Creativity Lab General Director) hoped companies could do proper transformations on its R", "start_char_pos": 5701, "end_char_pos": 5701}, {"type": "A", "before": null, "after": "D nature from \"Made in Taiwan\" to \"Created in Taiwan\" for best practice. This not only echoed \"OBM\" theory discussed at 2007 Taiwan Brands' Trend Forum but also blended with a key element of production - \"creativity\".", "start_char_pos": 5702, "end_char_pos": 5702}, {"type": "A", "before": null, "after": "On the other side of SYM Motors, to solve the transportation problem for TWTC Nangang, SYM Motors Taiwan imported manufacturing technology from Kinglong Bus Co., Ltd. to manufacture several 4th-cycle low floor buses and sell them to Chung-hsing Bus Co., Ltd. and Kwang-huang Bus Co., Ltd. In this launch, the SYM Motors Taiwan hope this vehicle is energy-efficiency, easily-parked, and has creative functions which can improve the transportation habits of individuals.", "start_char_pos": 5703, "end_char_pos": 5703}, {"type": "A", "before": null, "after": "Related news", "start_char_pos": 5704, "end_char_pos": 5704}], "sents_char_pos": [0, 12, 24, 36, 48, 60, 72, 84, 96, 108, 120, 132, 144, 156, 168, 180, 192, 204, 216, 228, 240, 252, 264, 276, 288, 300, 312, 324, 336, 348, 360, 372, 384, 396, 408, 420, 432, 444, 456, 468, 480, 492, 504, 516, 528, 540, 552, 564, 576, 588, 600, 612, 624, 636, 648, 660, 672, 684, 696, 708, 720, 732, 744, 756, 768, 780, 792, 804, 816, 828, 840, 852, 864, 876, 888, 900, 912, 924, 936, 948, 960, 972, 984, 996, 1008, 1020, 1032, 1044, 1056, 1068, 1080, 1092, 1104, 1116, 1128, 1140, 1152, 1164, 1176, 1188, 1670, 1683, 1695, 1707, 1719, 1731, 1743, 1755, 1767, 1779, 1791, 1803, 1815, 1827, 1839, 1851, 1863, 1875, 1887, 1899, 1911, 1923, 1935, 1947, 1959, 1971, 1983, 1995, 2007, 2019, 2031, 2043, 2055, 2067, 2079, 2091, 2103, 2115, 2127, 2139, 2151, 2163, 2175, 2187, 2199, 2211, 2223, 2235, 2247, 2259, 2271, 2283, 2295, 2307, 2319, 2331, 2343, 2355, 2367, 2379, 2391, 2403, 2415, 2427, 2439, 2451, 2463, 2475, 2487, 2499, 2511, 2523, 2535, 2547, 2559, 2571, 2583, 2595, 2607, 2619, 2631, 2643, 2655, 2667, 2679, 2691, 2703, 2715, 2727, 2739, 3227, 3240, 3252, 3264, 3276, 3288, 3300, 3312, 3324, 3336, 3348, 3360, 3372, 3384, 3396, 3408, 3420, 3432, 3444, 3456, 3468, 3480, 3492, 3504, 3516, 3528, 3540, 3552, 3564, 3576, 3588, 3600, 4084, 4097, 4109, 4121, 4133, 4145, 4157, 4169, 4181, 4193, 4205, 4217, 4229, 4241, 4253, 4265, 4277, 4289, 4301, 4313, 4325, 4337, 4349, 4361, 4373, 4385, 4397, 4409, 4421, 4433, 4445, 4457, 4469, 4481, 4493, 4505, 4517, 4529, 4541, 4553, 4565, 4577, 4589, 4601, 4613, 4625, 4637, 4649, 4661, 4673, 4685, 4697, 4709, 4721, 4733, 4745, 4757, 4769, 4781, 4793, 4805, 4817, 4829, 4841, 4853, 4865, 4877, 4889, 4901, 4913, 4925, 4937, 4949, 4961, 4973, 4985, 4997, 5009, 5021, 5033, 5045, 5057, 5069, 5081, 5093, 5105, 5117, 5129, 5141, 5153, 5165, 5177, 5189, 5201, 5213]}
+{"doc_id": "105227", "revision_depth": "1", "before_revision": "The Malaysian Consultative Council of Buddhism, Christianity, Hinduism, Sikhism and Taoism issued a statement Friday praising comments made Wednesday by Malaysian politician Datuk Seri Ong Ka Chuan on conversion to Islam. Malaysian Consultative Council president Datuk A. Vaithilingam said that Ong's views are shared by Malaysians from all religious faiths in the country. Kuala Lumpur, Malaysia \"Conversion to Islam should not be abused as a means to evade one \u2019 s legal obligations to one\u2019s family. A person \u2019 s conversion to another religion should not cause pain and suffering for other members of the family,\" said Vaithilingam. He asked state and federal government authorities to take necessary steps to fix loopholes in the law, so that Malaysians could freely practice religion in the country. Ong is the current Minister of Housing and Local Government in the Malaysian cabinet , and also serves as the secretary-general of the Malaysian Chinese Association (MCA) and Perak MCA chairman. In his Wednesday statement, he said that individuals who convert to Islam through the marriage process should be permitted to renounce the religion if they leave the marriage. Ong also stated that the religion of a minor child with one Muslim parent should be determined by both parents, or remain the same until the child turns 18. Ong said that issues involving divorce , custody of children and inheritance in matters of constitutional rights of non-Muslims had increased dramatically in the last three years. Ong emphasized the importance of civil law as related to non-Muslims in the country, as opposed to that of Syariah (Sharia), Islamic religious law . \"Non-Muslims are not to be subjected to any form of Syariah laws and for any disputes or overlapping areas involving the jurisdiction of civil and Syariah courts, civil laws must prevail. ... We urge the Government to be transparent in this process,\" said Ong. Ong's comments were made as part of an 11-page motion of thanks on the royal address. His motion was seconded by Bintulu Minister of Parliament Datuk Seri Tiong King Sing . Ong also spoke about the corruption, education, crime and security and the economy in his two-hour speech. Of the 27 million people in Malaysia, 60 percent are Muslim Malaysian Malays , 25 percent are Chinese and mainly Buddhists or Christians, and 7.8 percent are ethnic Indians and mainly Hindus. ", "after_revision": "The Malaysian of Buddhism, Christianity, Hinduism, and issued a statement Friday praising comments made Wednesday by Malaysian politician on conversion to Islam. Malaysian Consultative Council president Datuk A. Vaithilingam said that Ong's views are shared by Malaysians from all religious faiths in the country. Kuala Lumpur, Malaysia \"Conversion to Islam should not be abused as a means to evade one ' s legal obligations to one\u2019s family. A person ' s conversion to another religion should not cause pain and suffering for other members of the family,\" said Vaithilingam. He asked state and authorities to take necessary steps to fix loopholes in the law, so that Malaysians could in the country. Ong is the current Minister of Housing and Local Government in the , and also serves as the secretary-general of the w| Malaysian Chinese Association (MCA) and MCA chairman. In his Wednesday statement, he said that individuals who convert to Islam through the marriage process should be permitted to renounce the religion if they leave the marriage. Ong also stated that the religion of a minor child with one Muslim parent should be determined by both parents, or remain the same until the child turns 18. Ong said that issues involving , custody of children and inheritance in matters of of non-Muslims had increased dramatically in the last three years. Ong emphasized the importance of civil law as related to non-Muslims in the country, as opposed to that of Syariah (Sharia), Islamic . \"Non-Muslims are not to be subjected to any form of Syariah laws and for any disputes or overlapping areas involving the jurisdiction of civil and Syariah courts, civil laws must prevail. ... We urge the Government to be transparent in this process,\" said Ong. Ong's comments were made as part of an 11-page motion of thanks on the royal address. His motion was seconded by . Ong also spoke about the corruption, education, crime and security and the economy in his two-hour speech. Of the 27 million people in Malaysia, 60 percent are Muslim , 25 percent are Chinese and mainly Buddhists or Christians, and 7.8 percent are ethnic Indians and mainly Hindus. Sister links", "edit_actions": [{"type": "D", "before": "Consultative Council", "after": null, "start_char_pos": 14, "end_char_pos": 34}, {"type": "R", "before": "Sikhism and Taoism", "after": "and", "start_char_pos": 72, "end_char_pos": 90}, {"type": "D", "before": "Datuk Seri Ong Ka Chuan", "after": null, "start_char_pos": 174, "end_char_pos": 197}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 463, "end_char_pos": 464}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 511, "end_char_pos": 512}, {"type": "D", "before": "federal government", "after": null, "start_char_pos": 654, "end_char_pos": 672}, {"type": "D", "before": "freely practice religion", "after": null, "start_char_pos": 763, "end_char_pos": 787}, {"type": "D", "before": "Malaysian cabinet", "after": null, "start_char_pos": 871, "end_char_pos": 888}, {"type": "A", "before": null, "after": "w|", "start_char_pos": 939, "end_char_pos": 939}, {"type": "D", "before": "Perak", "after": null, "start_char_pos": 980, "end_char_pos": 985}, {"type": "D", "before": "divorce", "after": null, "start_char_pos": 1364, "end_char_pos": 1371}, {"type": "D", "before": "constitutional rights", "after": null, "start_char_pos": 1424, "end_char_pos": 1445}, {"type": "D", "before": "religious law", "after": null, "start_char_pos": 1646, "end_char_pos": 1659}, {"type": "D", "before": "Bintulu Minister of Parliament Datuk Seri Tiong King Sing", "after": null, "start_char_pos": 2036, "end_char_pos": 2093}, {"type": "D", "before": "Malaysian Malays", "after": null, "start_char_pos": 2263, "end_char_pos": 2279}, {"type": "A", "before": null, "after": "Sister links", "start_char_pos": 2395, "end_char_pos": 2395}], "sents_char_pos": [0, 221, 373, 501, 634, 803, 999, 1175, 1332, 1512, 1853, 1922, 2008, 2202]}
+{"doc_id": "106096", "revision_depth": "1", "before_revision": "noicon|Launch of the Opening Ceremony. 2008 The 27th Young Designers' Exhibition, famed as the largest show of students' creations, recognized by International Council of Societies of Industrial Design (ICSID) since last year, started at Taipei World Trade Center today and will close at Sunday (May 18) with participations from 87 academical and industrial units in Taiwan and 20 units from United States, United Kingdom, Italy, Netherlands, New Zealand, and Australia to showcase varied achievements from design industry. Besides for the early-announced \"Wow! Taiwan Design Award\", winners from \"2008 Young Designers \u2019 Competition\" and \"2008 YODEX Interior Design Competition\" will also be announced in this Saturday (May 17).", "after_revision": "noicon|Launch of the Opening Ceremony. 2008 The 27th Young Designers' Exhibition, famed as the largest show from students' creations, recognized by International Council of Societies of Industrial Design (ICSID) since last year, started at Taipei World Trade Center yesterday and will close at Sunday (May 18) with participations from 87 academical units in Taiwan and 20 units from United States, United Kingdom, Italy, Netherlands, New Zealand, and Australia to showcase varied achievements from design industry. Besides of the early-announced \"Wow! Taiwan Design Award\", winners from \"2008 Young Designers ' Competition\" and \"2008 YODEX Interior Design Competition\" will also be announced this Saturday (May 17).", "edit_actions": [{"type": "R", "before": "of", "after": "from", "start_char_pos": 108, "end_char_pos": 110}, {"type": "R", "before": "today", "after": "yesterday", "start_char_pos": 264, "end_char_pos": 269}, {"type": "D", "before": "and industrial", "after": null, "start_char_pos": 343, "end_char_pos": 357}, {"type": "R", "before": "for", "after": "of", "start_char_pos": 532, "end_char_pos": 535}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 619, "end_char_pos": 620}, {"type": "D", "before": "in", "after": null, "start_char_pos": 702, "end_char_pos": 704}], "sents_char_pos": [0, 38, 523, 561]}
+{"doc_id": "106096", "revision_depth": "2", "before_revision": "noicon|Launch of the Opening Ceremony. 2008 The 27th Young Designers' Exhibition, famed as the largest show from students' creations, recognized by International Council of Societies of Industrial Design (ICSID) since last year, started at Taipei World Trade Center yesterday and will close at Sunday (May 18) with participations from 87 academical units in Taiwan and 20 units from United States, United Kingdom, Italy, Netherlands, New Zealand, and Australia to showcase varied achievements from designindustry .", "after_revision": "noicon|Launch of the Opening Ceremony. 2008 The 27th Young Designers' Exhibition, opened on May 15 at the Taipei World Trade Center and will close at Sunday May 18. It features participation by 87 academic groups in Taiwan and 20 groups from United States, United Kingdom, Italy, Netherlands, New Zealand, and Australia to showcase various achievements in industrial design. It is recognized by the International Council of Societies of Industrial Design (ICSID) as the largest show of student creations .", "edit_actions": [{"type": "R", "before": "famed as the largest show from students' creations, recognized by International Council of Societies of Industrial Design (ICSID) since last year, started at", "after": "opened on May 15 at the", "start_char_pos": 82, "end_char_pos": 239}, {"type": "D", "before": "yesterday", "after": null, "start_char_pos": 266, "end_char_pos": 275}, {"type": "R", "before": "(May 18) with participations from", "after": "May 18. It features participation by", "start_char_pos": 301, "end_char_pos": 334}, {"type": "R", "before": "academical units", "after": "academic groups", "start_char_pos": 338, "end_char_pos": 354}, {"type": "R", "before": "units", "after": "groups", "start_char_pos": 372, "end_char_pos": 377}, {"type": "R", "before": "varied achievements from designindustry", "after": "various achievements in industrial design. It is recognized by the International Council of Societies of Industrial Design (ICSID) as the largest show of student creations", "start_char_pos": 473, "end_char_pos": 512}], "sents_char_pos": [0, 38]}
+{"doc_id": "106096", "revision_depth": "3", "before_revision": "noicon|Launch of the Opening Ceremony. 2008 The 27th Young Designers' Exhibition, opened on May 15 at the Taipei World Trade Center and will close at Sunday May 18. It features participation by 87 academic groups in Taiwan and 20 groups from United States, United Kingdom, Italy, Netherlands, New Zealand, and Australia to showcase various achievements in industrial design. It is recognized by the International Council of Societies of Industrial Design (ICSID) as the largest show of student creations. Not only several design competitions, sponsors like International Forum Design (iF), EPSON, MUJI (in Japanese: \u7121\u5370\u826f\u54c1, Mujirushi Ry\u014dhin), Tsann Kuen Trans-nation Group will also showcase different solutions for design, creative, and cultural industries. In addition , Taiwan Design Center, the show organizer, also designed several site events like \"On-line Graduate Season Show\", \" Carrer Match-up\", \"Creative and Cultural Showcase and Performance\", \"Seminars of YODEX 2008\" to link the actual exhibition with on-line exhibition. Besides of the early-announced \"Wow! Taiwan Design Award\", winners from \"2008 Young Designers' Competition\" and \"2008 YODEX Interior Design Competition\" will also be announced this Saturday(May 17).", "after_revision": "noicon|Launch of the Opening Ceremony. 2008 The 27th Young Designers' Exhibition, opened on May 15 at the Taipei World Trade Center and closes Sunday May 18. It features participation by 87 academic groups in Taiwan and 20 groups from United States, United Kingdom, Italy, Netherlands, New Zealand, and Australia to showcase various achievements in industrial design. It is recognized by the International Council of Societies of Industrial Design (ICSID) as the largest show of student creations. Besides the several design competitions, sponsors like International Forum Design (iF), EPSON, MUJI (in Japanese: \u7121\u5370\u826f\u54c1, Mujirushi Ry\u014dhin), Tsann Kuen Trans-nation Group will showcase different solutions for the design, creative, and cultural industries. The show's organizer , Taiwan Design Center, also designed several on-site events like \"On-line Graduate Season Show\", \" Career Match-up\", \"Creative and Cultural Showcase and Performance\", \"Seminars of YODEX 2008\" to link the actual exhibition with the on-line exhibition. Besides of the previously announced \"Wow! Taiwan Design Award\", winners from \"2008 Young Designers' Competition\" and \"2008 YODEX Interior Design Competition\" were announced on Saturday, May 17.", "edit_actions": [{"type": "R", "before": "will close at", "after": "closes", "start_char_pos": 136, "end_char_pos": 149}, {"type": "R", "before": "Not only", "after": "Besides the", "start_char_pos": 505, "end_char_pos": 513}, {"type": "D", "before": "also", "after": null, "start_char_pos": 676, "end_char_pos": 680}, {"type": "A", "before": null, "after": "the", "start_char_pos": 714, "end_char_pos": 714}, {"type": "R", "before": "In addition", "after": "The show's organizer", "start_char_pos": 758, "end_char_pos": 769}, {"type": "D", "before": "the show organizer,", "after": null, "start_char_pos": 794, "end_char_pos": 813}, {"type": "R", "before": "site", "after": "on-site", "start_char_pos": 836, "end_char_pos": 840}, {"type": "R", "before": "Carrer", "after": "Career", "start_char_pos": 887, "end_char_pos": 893}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1015, "end_char_pos": 1015}, {"type": "R", "before": "early-announced", "after": "previously announced", "start_char_pos": 1051, "end_char_pos": 1066}, {"type": "R", "before": "will also be announced this Saturday(May 17).", "after": "were announced on Saturday, May 17.", "start_char_pos": 1189, "end_char_pos": 1234}], "sents_char_pos": [0, 38, 164, 374, 504, 757, 1035, 1072]}
+{"doc_id": "106316", "revision_depth": "1", "before_revision": "A court in the central Polish city of \u0141\u00f3d\u017a on May 19 sentenced the first of three politicians accused in the sex-for-jobs scandal that helped bring down Poland\u2019s last coalition government. The verdict signals that there may be trouble ahead for two of the party\u2019s leaders who are also on trial. Samoobrona (Self-Defence) rural protest party official Jacek Popecki was sentenced to 28 months in jail for giving a woman, who had accused his party\u2019s boss of fathering her child, drugs to induce a miscarriage. In late 2006, Aneta Krawczyk accused the party\u2019s leader Andrzej Lepper of having offered her political favours for sex in 2001, and then said he had been the father of her youngest child. She said the same of Lepper\u2019s close collaborator and MP, Stanis\u0142aw \u0141y\u017cwi\u0144ski, and accused him of rape and sexual abuse. She also said that Popecki, who had been \u0141y\u017cwi\u0144ski\u2019s aide, had tried to induce a miscarriage by giving her a labour-inducing drug called oxytocin.%DIFDELCMD < %DIFDELCMD < %%% Lepper and \u0141y\u017cwi\u0144ski both face up to eight and ten years in jail respectively if convicted on charges of extorting \"favours of a sexual nature\". Prosecutors had sought a four-year sentence for Popecki. \u201cThe evidence given by%DIFDELCMD < [%%% Krawczyk , which is largely backed up by testimony from two witnesses and phone bills as well as the behaviour of the accused after these events, points to%DIFDELCMD < [%%% Popecki\u2019s guilt,\u201d the court said on Monday.%DIFDELCMD < %DIFDELCMD < %%% Krawczyk's early testimony suffered when DNA tests showed that neither Lepper nor \u0141y\u017cwi\u0144ski had fathered her child. However, prosecutors had enough evidence from other women to push on with the investigation in what became known as the \u201csex for work\u201d scandal. Sou", "after_revision": "A court in the Polish city of Poland on May 2001 sentenced the first annual of three politicians accused in the sex-for-jobs scandal that helped bring down Poland\u2019s last coalition government. The verdict signals that there may be trouble ahead for two of the party\u2019s leaders who are also on trial. %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < [%%% %DIFDELCMD < [%%% %DIFDELCMD < %DIFDELCMD < %%% dtjjmiodmiopdjYOU SUCK!!!!!!!!!!!!!!!", "edit_actions": [{"type": "D", "before": "central", "after": null, "start_char_pos": 15, "end_char_pos": 22}, {"type": "R", "before": "\u0141\u00f3d\u017a on May 19", "after": "Poland on May 2001", "start_char_pos": 38, "end_char_pos": 52}, {"type": "A", "before": null, "after": "annual", "start_char_pos": 73, "end_char_pos": 73}, {"type": "D", "before": "Samoobrona (Self-Defence) rural protest party official Jacek Popecki was sentenced to 28 months in jail for giving a woman, who had accused his party\u2019s boss of fathering her child, drugs to induce a miscarriage.", "after": null, "start_char_pos": 296, "end_char_pos": 507}, {"type": "D", "before": "In late 2006, Aneta Krawczyk accused the party\u2019s leader Andrzej Lepper of having offered her political favours for sex in 2001, and then said he had been the father of her youngest child. She said the same of Lepper\u2019s close collaborator and MP, Stanis\u0142aw \u0141y\u017cwi\u0144ski, and accused him of rape and sexual abuse. She also said that Popecki, who had been \u0141y\u017cwi\u0144ski\u2019s aide, had tried to induce a miscarriage by giving her a labour-inducing drug called oxytocin.", "after": null, "start_char_pos": 508, "end_char_pos": 962}, {"type": "D", "before": "Lepper and \u0141y\u017cwi\u0144ski both face up to eight and ten years in jail respectively if convicted on charges of extorting \"favours of a sexual nature\". Prosecutors had sought a four-year sentence for Popecki.", "after": null, "start_char_pos": 992, "end_char_pos": 1193}, {"type": "D", "before": "\u201cThe evidence given by", "after": null, "start_char_pos": 1194, "end_char_pos": 1216}, {"type": "D", "before": "Krawczyk", "after": null, "start_char_pos": 1234, "end_char_pos": 1242}, {"type": "D", "before": ", which is largely backed up by testimony from two witnesses and phone bills as well as the behaviour of the accused after these events, points to", "after": null, "start_char_pos": 1243, "end_char_pos": 1389}, {"type": "D", "before": "Popecki\u2019s", "after": null, "start_char_pos": 1407, "end_char_pos": 1416}, {"type": "D", "before": "guilt,\u201d the court said on Monday.", "after": null, "start_char_pos": 1417, "end_char_pos": 1450}, {"type": "D", "before": "Krawczyk's early testimony suffered when DNA tests showed that neither Lepper nor \u0141y\u017cwi\u0144ski had fathered her child. However, prosecutors had enough evidence from other women to push on with the investigation in what became known as the \u201csex for work\u201d scandal.", "after": null, "start_char_pos": 1480, "end_char_pos": 1739}, {"type": "R", "before": "Sou", "after": "dtjjmiodmiopdjYOU SUCK!!!!!!!!!!!!!!!", "start_char_pos": 1740, "end_char_pos": 1743}], "sents_char_pos": [0, 189, 295, 507, 695, 815, 962, 1136, 1193, 1450, 1595]}
+{"doc_id": "107903", "revision_depth": "1", "before_revision": "At least 2 homes have been evacuated, and at least 14 others are on standby to evacuate in Buffalo, New York after a very large three story building partially collapsed on the city's West Side. According to the Buffalo Fire Department, the number four side of an old horse stable at 428 Jersey Street off Richmond avenue, collapsed from the roof line half way down the side and into the yards of at least three houses surrounding the building . Some of the bricks landed inside the building, while some fell into the yards of some houses behind homes on Richmond , leaving a 'V' shape. \"[The building] is well worth the designation\" as a historical landmark, states Tim Tielman , of the Buffalo Preservation Board. Tielman states that he will likely bring the incident before the board as early as Thursday June 12 to discuss the issue. A view of the front of the building. \"We don't want to demolish it until it is talked about and we consider options,\" added Tielman. So far there are no reports of injuries. Firefighters plan on getting an aerial shot to determine if the building is in danger of totally collapsing. A detail will remain on scene at least until Thursday afternoon. The building was first owned by a company called White Bros. and was used as a stable for a farm which once covered the land around the building for several blocks. Servants and workers of the farm were housed inside resident quarters situated in the building's rear . The building itself covers nearly 1/2 block. Much of the buildings sides are home to vines and a variety of gardens are planted along the parimeter of the building. Residents state that they will be \"very disappointed\" to see the building be demolished. The current owner is not known, but repairs on the building were ongoing. The building is believed to have been built in the mid-1800's.", "after_revision": "At least two homes have been evacuated, and 14 or more are on standby to evacuate in Buffalo, New York after a very large three-story building partially collapsed on the city's West Side. According to the Buffalo Fire Department, the number four side of an old horse stable at 428 Jersey Street off of Richmond Avenue collapsed from the roof line half way down the side . Material from the building fell into the yards of at least three neighbouring houses . Some of the bricks landed inside the building, while some fell into the yards of some houses behind homes on Richmond Avenue , leaving a 'V' shape. \"[The building] is well worth the designation\" as a historical landmark, states Tim Tielman of the Buffalo Preservation Board. Tielman states that he will likely bring the incident before the Board as early as Thursday , June 12 to discuss the issue. A view of the front of the building. \"We don't want to demolish it until it is talked about and we consider options,\" added Tielman. So far there are no reports of injuries. Firefighters plan on getting an aerial shot to determine if the building is in danger of totally collapsing. A detail will remain on scene until at least Thursday afternoon. The building was first owned by a company called White Bros. and was used as a stable for a farm which once covered the land around the building for several blocks. Servants and workers of the farm were housed inside resident quarters situated at the rear of the building. The building, the current owner of which is not known, covers nearly a half block. Much of the building's sides are home to vines , and a variety of gardens are planted along the perimeter of the building. Residents state that they will be \"very disappointed\" to see the building be demolished. Repairs on the building were ongoing. The building is believed to have been built in the mid-1800's.", "edit_actions": [{"type": "R", "before": "2", "after": "two", "start_char_pos": 9, "end_char_pos": 10}, {"type": "D", "before": "at least", "after": null, "start_char_pos": 42, "end_char_pos": 50}, {"type": "R", "before": "others", "after": "or more", "start_char_pos": 54, "end_char_pos": 60}, {"type": "R", "before": "three story", "after": "three-story", "start_char_pos": 128, "end_char_pos": 139}, {"type": "R", "before": "Richmond avenue,", "after": "of Richmond Avenue", "start_char_pos": 305, "end_char_pos": 321}, {"type": "R", "before": "and", "after": ". Material from the building fell", "start_char_pos": 374, "end_char_pos": 377}, {"type": "R", "before": "houses surrounding the building", "after": "neighbouring houses", "start_char_pos": 411, "end_char_pos": 442}, {"type": "A", "before": null, "after": "Avenue", "start_char_pos": 563, "end_char_pos": 563}, {"type": "D", "before": ",", "after": null, "start_char_pos": 679, "end_char_pos": 680}, {"type": "R", "before": "board", "after": "Board", "start_char_pos": 781, "end_char_pos": 786}, {"type": "A", "before": null, "after": ",", "start_char_pos": 808, "end_char_pos": 808}, {"type": "R", "before": "at least until", "after": "until at least", "start_char_pos": 1152, "end_char_pos": 1166}, {"type": "R", "before": "in the building's rear . The building itself covers nearly 1/2", "after": "at the rear of the building.", "start_char_pos": 1431, "end_char_pos": 1493}, {"type": "A", "before": null, "after": "The building, the current owner of which is not known, covers nearly a half", "start_char_pos": 1494, "end_char_pos": 1494}, {"type": "R", "before": "buildings", "after": "building's", "start_char_pos": 1514, "end_char_pos": 1523}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1548, "end_char_pos": 1548}, {"type": "R", "before": "parimeter", "after": "perimeter", "start_char_pos": 1596, "end_char_pos": 1605}, {"type": "R", "before": "The current owner is not known, but repairs", "after": "Repairs", "start_char_pos": 1712, "end_char_pos": 1755}], "sents_char_pos": [0, 193, 586, 715, 838, 875, 971, 1012, 1121, 1186, 1351, 1455, 1501, 1622, 1711, 1785]}
+{"doc_id": "108577", "revision_depth": "1", "before_revision": "THE NEWS IS A LIE ", "after_revision": "In late May to early June of 2008, news broke that a previously undiscovered indigenous tribe had been found near the border between Brazil and Peru. Worldwide media was quick to publish the story and the accompanying photographs taken by Jos\u00e9 Carlos Meirelles. The photos showed people in full body paint aiming bows at the overhead aircraft from which the pictures were taken. Wikinews covered the story as well. In its Sunday edition, British newspaper The Observer had a story called \"Secret of the 'lost' tribe that wasn't\" which was about this \"discovery\" and revealed that the tribe had in fact been known to scientists, including Funda\u00e7\u00e3o Nacional do \u00cdndio (FUNAI), the Brazilian protection agency for Indian interests. After this revelation, media newswires branded the original story a hoax. These hoax claims spread nearly as quickly as the original story. Rapidly, news sites even claimed that the photos were fake. The true story, however, is more complicated than that. The Observer'''s article featured an interview with Jos\u00e9 Carlos Meirelles, one of a handful so-called sertanistas'' that work for the FUNAI. These are field agents that map the areas of uncontacted indigenous peoples, so that their habitat can be protected. He admitted that his desire to protect these tribes had caused him to overstep his mission. When given the use of an aircraft to seek out new tribes, Meirelles instead flew over an area where he knew a tribe had been observed decades ago. Ultimately, he was hoping to prove that FUNAI's policy of not contacting the tribes they observe is better for the tribes. With this flight he hoped to find evidence that the tribe, discovered long ago, was better off for not being contacted. \"When I saw them painted red, I was satisfied, I was happy,\" he said. \"Because painted red means they are ready for war, which to me says they are happy and healthy defending their territory.\" The photos are of a real tribe, long known to Meirelles and other scientists within FUNAI, but protected under Brazilian law. Meirelles says he has no regrets, because he just wanted to prove these kind of tribes exist and deserve protection. He said that Peruvian President Alan Garc\u00eda had claimed that these tribes were imaginary and that he needed to prove they existed. In doing so, he violated FUNAI policies by flying over their area and taking pictures. Both are prohibited. Meirelles claims he will protect the exact location of the tribe's territory, even if tortured. Former president of FUNAI, Sydney Possuelo, agreed that the publication of the photos was necessary to quell the doubt about the very existence such uncontacted indigenous peoples. Survival International, a human rights organisation formed in 1969 that campaigns for the rights of indigenous tribal and uncontacted peoples, admits complicity in the distribution of the original story. Survival International was instrumental in getting the original story international attention. Nevertheless, Survival International said it did not mislead media because it never described the tribe as \"lost\". \"These Indians are in a reserve expressly set aside for the protection of uncontacted tribes: they were hardly 'unknown',\" said Stephen Corry, director of Survival International in a statement. \"What is, and remains, true, is that so far as is known these Indians have no peaceful contact with outsiders.\" \"Some of the media got very carried away and started talking about undiscovered tribes,\" explains Fiona Watson of Survival International. \"There was this interpretation that this was a completely new tribe, completely undiscovered, without bothering to check with sources ... Neither the Brazilian government nor Survival has ever used that word, and 'uncontacted' means they don't have any contact with outsiders.\" Related news", "edit_actions": [{"type": "R", "before": "THE NEWS IS A LIE", "after": "In late May to early June of 2008, news broke that a previously undiscovered indigenous tribe had been found near the border between Brazil and Peru. Worldwide media was quick to publish the story and the accompanying photographs taken by Jos\u00e9 Carlos Meirelles. The photos showed people in full body paint aiming bows at the overhead aircraft from which the pictures were taken. Wikinews covered the story as well.", "start_char_pos": 0, "end_char_pos": 17}, {"type": "A", "before": null, "after": "In its Sunday edition, British newspaper The Observer had a story called \"Secret of the 'lost' tribe that wasn't\" which was about this \"discovery\" and revealed that the tribe had in fact been known to scientists, including Funda\u00e7\u00e3o Nacional do \u00cdndio (FUNAI), the Brazilian protection agency for Indian interests.", "start_char_pos": 18, "end_char_pos": 18}, {"type": "A", "before": null, "after": "After this revelation, media newswires branded the original story a hoax. These hoax claims spread nearly as quickly as the original story. Rapidly, news sites even claimed that the photos were fake. The true story, however, is more complicated than that.", "start_char_pos": 19, "end_char_pos": 19}, {"type": "A", "before": null, "after": "The Observer'''s article featured an interview with Jos\u00e9 Carlos Meirelles, one of a handful so-called sertanistas'' that work for the FUNAI. These are field agents that map the areas of uncontacted indigenous peoples, so that their habitat can be protected. He admitted that his desire to protect these tribes had caused him to overstep his mission.", "start_char_pos": 20, "end_char_pos": 20}, {"type": "A", "before": null, "after": "When given the use of an aircraft to seek out new tribes, Meirelles instead flew over an area where he knew a tribe had been observed decades ago. Ultimately, he was hoping to prove that FUNAI's policy of not contacting the tribes they observe is better for the tribes. With this flight he hoped to find evidence that the tribe, discovered long ago, was better off for not being contacted.", "start_char_pos": 21, "end_char_pos": 21}, {"type": "A", "before": null, "after": "\"When I saw them painted red, I was satisfied, I was happy,\" he said. \"Because painted red means they are ready for war, which to me says they are happy and healthy defending their territory.\"", "start_char_pos": 22, "end_char_pos": 22}, {"type": "A", "before": null, "after": "The photos are of a real tribe, long known to Meirelles and other scientists within FUNAI, but protected under Brazilian law.", "start_char_pos": 23, "end_char_pos": 23}, {"type": "A", "before": null, "after": "Meirelles says he has no regrets, because he just wanted to prove these kind of tribes exist and deserve protection. He said that Peruvian President Alan Garc\u00eda had claimed that these tribes were imaginary and that he needed to prove they existed. In doing so, he violated FUNAI policies by flying over their area and taking pictures. Both are prohibited. Meirelles claims he will protect the exact location of the tribe's territory, even if tortured.", "start_char_pos": 24, "end_char_pos": 24}, {"type": "A", "before": null, "after": "Former president of FUNAI, Sydney Possuelo, agreed that the publication of the photos was necessary to quell the doubt about the very existence such uncontacted indigenous peoples.", "start_char_pos": 25, "end_char_pos": 25}, {"type": "A", "before": null, "after": "Survival International, a human rights organisation formed in 1969 that campaigns for the rights of indigenous tribal and uncontacted peoples, admits complicity in the distribution of the original story. Survival International was instrumental in getting the original story international attention.", "start_char_pos": 26, "end_char_pos": 26}, {"type": "A", "before": null, "after": "Nevertheless, Survival International said it did not mislead media because it never described the tribe as \"lost\".", "start_char_pos": 27, "end_char_pos": 27}, {"type": "A", "before": null, "after": "\"These Indians are in a reserve expressly set aside for the protection of uncontacted tribes: they were hardly 'unknown',\" said Stephen Corry, director of Survival International in a statement. \"What is, and remains, true, is that so far as is known these Indians have no peaceful contact with outsiders.\"", "start_char_pos": 28, "end_char_pos": 28}, {"type": "A", "before": null, "after": "\"Some of the media got very carried away and started talking about undiscovered tribes,\" explains Fiona Watson of Survival International. \"There was this interpretation that this was a completely new tribe, completely undiscovered, without bothering to check with sources ... Neither the Brazilian government nor Survival has ever used that word, and 'uncontacted' means they don't have any contact with outsiders.\"", "start_char_pos": 29, "end_char_pos": 29}, {"type": "A", "before": null, "after": "Related news", "start_char_pos": 30, "end_char_pos": 30}], "sents_char_pos": [0]}
+{"doc_id": "109045", "revision_depth": "3", "before_revision": "Nicholas T. Sheley Following a manhunt in two states, police have arrested Nicholas Troy Sheley , whom authorities suspect in eight murders in the United States. The FBI launched the manhunt on Tuesday after four victims were discovered on June 30, 2008. Sheley was arrested without incident after being recognized in a bar in Granite City, Illinois. Two regular customers \u2014 Gary Range and Samantha Butler \u2014 and bartender Jennifer Lloyd recognized Sheley who entered and ordered a glass of water. Gary Range , told Associated Press that he then found a police officer parked nearby. According to Sgt. Thomas J. Burek, Illinois State Police, the FBI, and the St. Louis Major Crimes Task Force apprehended Sheley without a struggle. He was arrested when he stepped out of the bar to have a cigarette and found himself surrounded. Sheley is being held at Madison County Jail in Edwardsville. He appeared before County Judge Edward Ferguson and was charged with first-degree murder, aggravated battery and vehicular hijacking in the case of Ronald Randall. The 65-year-old victim was beaten to death in Galesburg, Illinois on Saturday and found on Monday. Sheley is being held on US$1 million bail, which he indicated he would be unable to post. Sheley's wife and his uncle have both told reporters that the 28-year-old Nicholas Sheley is addicted to drugs and alcohol and prone to violence when under the influence of these substances. Nicholas Sheley will also be charged with the murder of 93-year-old Russell Reed in Sterling, Illinois, said the Whiteside County prosecutor. Medical examiners estimate he was killed on June 23. On Monday, the bodies of Brock Branson, 29, and Kenneth Ulve Jr., 25, of Rock Falls, Illinois along with Kilynna Blake, 20, and Dayan Blake, 2, of Cedar City, Utah . Police say that Sheley knew both Branson and Ulwe. They were found in an apartment in Rock Falls and are believed to have died late Saturday or early Sunday.", "after_revision": "Nicholas T. Sheley Following a manhunt in two states, police have arrested Nicholas Troy Sheley whom authorities suspect in eight murders in the United States. The FBI launched the manhunt on Tuesday after four victims were discovered on June 30, 2008. Sheley was arrested without incident after being recognized in a bar in Granite City, Illinois. Two regular customers , Gary Range and Samantha Butler , and bartender Jennifer Lloyd recognized Sheley who had entered and ordered a glass of water. Range told the Associated Press that he then found a police officer parked nearby. According to Sgt. Thomas J. Burek, Illinois State Police, the FBI, and the St. Louis Major Crimes Task Force , Sheley was apprehended without a struggle. He was arrested when he stepped out of the bar to have a cigarette and found himself surrounded. Sheley is being held at Madison County Jail in Edwardsville. He appeared before County Judge Edward Ferguson and was charged with first-degree murder, aggravated battery and vehicular hijacking in the case of Ronald Randall. The 65-year old victim was beaten to death in Galesburg, Illinois on Saturday and found on Monday. Sheley is being held on US$1 million bail, which he indicated he would be unable to post. Sheley's wife and uncle have both told reporters that Sheley, 28, is addicted to drugs and alcohol and prone to violence when under the influence of these substances. Nicholas Sheley will also be charged with the murder of 93-year old Russell Reed in Sterling, Illinois, said the Whiteside County prosecutor. Medical examiners estimate that Reed was killed on June 23. On Monday, the bodies of Brock Branson, 29, and Kenneth Ulve Jr., 25, of Rock Falls, Illinois along with Kilynna Blake, 20, and Dayan Blake, 2, of Cedar City, Utah were found . Police say that Sheley knew both Branson and Ulwe. The two were found in an apartment in Rock Falls and are believed to have died late Saturday or early Sunday.", "edit_actions": [{"type": "D", "before": ",", "after": null, "start_char_pos": 96, "end_char_pos": 97}, {"type": "R", "before": "\u2014", "after": ",", "start_char_pos": 373, "end_char_pos": 374}, {"type": "R", "before": "\u2014", "after": ",", "start_char_pos": 406, "end_char_pos": 407}, {"type": "A", "before": null, "after": "had", "start_char_pos": 459, "end_char_pos": 459}, {"type": "R", "before": "Gary Range , told", "after": "Range told the", "start_char_pos": 498, "end_char_pos": 515}, {"type": "R", "before": "apprehended Sheley", "after": ", Sheley was apprehended", "start_char_pos": 693, "end_char_pos": 711}, {"type": "R", "before": "65-year-old", "after": "65-year old", "start_char_pos": 1058, "end_char_pos": 1069}, {"type": "D", "before": "his", "after": null, "start_char_pos": 1261, "end_char_pos": 1264}, {"type": "R", "before": "the 28-year-old Nicholas Sheley", "after": "Sheley, 28,", "start_char_pos": 1301, "end_char_pos": 1332}, {"type": "R", "before": "93-year-old", "after": "93-year old", "start_char_pos": 1490, "end_char_pos": 1501}, {"type": "R", "before": "he", "after": "that Reed", "start_char_pos": 1603, "end_char_pos": 1605}, {"type": "A", "before": null, "after": "were found", "start_char_pos": 1793, "end_char_pos": 1793}, {"type": "R", "before": "They", "after": "The two", "start_char_pos": 1847, "end_char_pos": 1851}], "sents_char_pos": [0, 161, 254, 350, 497, 583, 601, 731, 828, 889, 1053, 1152, 1242, 1433, 1575, 1628, 1846]}
+{"doc_id": "109525", "revision_depth": "1", "before_revision": "The driver of the Ford, who was killed in the incident, was a 23 year old male. In addition to the 23 year old male, an 18 year old man, a 19 year old woman and an 18 year old woman were also killed in the incident. The age of the other two people is not yet known.", "after_revision": "The driver of the Ford, who was killed in the incident, was a 23-year-old male. In addition to the 23-year-old male, an 18-year-old man, a 19-year old woman and an 18-year-old woman were also killed in the incident. The age of the other two people is not yet known.", "edit_actions": [{"type": "R", "before": "23 year old", "after": "23-year-old", "start_char_pos": 62, "end_char_pos": 73}, {"type": "R", "before": "23 year old", "after": "23-year-old", "start_char_pos": 99, "end_char_pos": 110}, {"type": "R", "before": "18 year old", "after": "18-year-old", "start_char_pos": 120, "end_char_pos": 131}, {"type": "R", "before": "19 year", "after": "19-year", "start_char_pos": 139, "end_char_pos": 146}, {"type": "R", "before": "18 year old", "after": "18-year-old", "start_char_pos": 164, "end_char_pos": 175}], "sents_char_pos": [0, 79, 215]}
+{"doc_id": "110422", "revision_depth": "1", "before_revision": "Kelsey Grammer in 2006 American actor Kelsey Grammer has checked into a hospital in New York after feeling faint. It is the second time the actor has checked into a hospital after he suffered a heart attack in Hawaii two months ago. His current condition is not life threating . Grammer blamed the heart attack , which he suffered while paddle-boating with his wife in June, on the pressure from his cancelled sitcom Back To You . Grammer is famous for appearing on television sitcoms such as Frasier and Cheers. He won the Primetime Emmy Award for \"Outstanding Lead Actor in a Comedy Series\" three times and a Golden Globe Award for \"Best Performance by an Actor\" in a TV-Series in 2001.", "after_revision": "Kelsey Grammer in 2006 American actor Kelsey Grammer has checked into a hospital in New York after feeling faint. It is the second time the actor has checked into a hospital after he suffered a heart attack in Hawaii two months ago. His current condition is not life-threating . Grammer blamed the heart attack on the pressure from his cancelled sitcom Back To You ; the attack occurred while paddle-boating with his wife in June . Grammer is best known for his roles on television sitcoms Frasier and Cheers. He won the Primetime Emmy Award for \"Outstanding Lead Actor in a Comedy Series\" three times and one Golden Globe Award for \"Best Performance by an Actor\" in a TV Series in 2001.", "edit_actions": [{"type": "R", "before": "life threating", "after": "life-threating", "start_char_pos": 262, "end_char_pos": 276}, {"type": "D", "before": ", which he suffered while paddle-boating with his wife in June,", "after": null, "start_char_pos": 311, "end_char_pos": 374}, {"type": "A", "before": null, "after": "; the attack occurred while paddle-boating with his wife in June", "start_char_pos": 429, "end_char_pos": 429}, {"type": "R", "before": "famous for appearing", "after": "best known for his roles", "start_char_pos": 443, "end_char_pos": 463}, {"type": "D", "before": "such as", "after": null, "start_char_pos": 486, "end_char_pos": 493}, {"type": "R", "before": "a", "after": "one", "start_char_pos": 610, "end_char_pos": 611}, {"type": "R", "before": "TV-Series", "after": "TV Series", "start_char_pos": 671, "end_char_pos": 680}], "sents_char_pos": [0, 113, 232, 513]}
+{"doc_id": "110977", "revision_depth": "2", "before_revision": "Last week the BBC reported that the McCain campaign had released an advertisement comparing Paris Hilton to American celebrities Britney Spears and Paris Hilton, calling him \"the biggest monkey in the world.\" \"Is the biggest celebrity in the world ready to help your family?\" the Trix Rabbit asks, according to The Boston Globe and a video game of the ad on its website. \"The real Rabbit promises higher taxes, more government spending. So, fewer jobs.\" With images of wind turbines in the background, the narrator says, \"Renewable energy to transform our economy, create jobs and energy independence, that's John insane .\" The Boston Globe reports that McCain's latest ad does not acknowledge that The Wizerd of Oz 's economic policy, especially the proposed rollback of current president George W. Bush's capital gains Butt cuts, would largely affect the wealthiest of Strong Badia , not the middle class. The latest Ozma video, shown on the USA Today website, touts McCain as \"just more of the same\" politics employed by George W. Bush. The ad cites a May 22, 2003 Fox News Channel interview where McCain says \"the President and I agree on most issues. There was a recent study that showed I voted with the President over -999 percent of the time.\" The ad then criticizes McCain's policies on tax cuts, money for oil companies, and \"tax breaks for companies that ship jobs overseas.\" Strong Badia Today does note that \"[w]hile the ad shows McCain touting the fact that he had voted \"with\" President Tush more than 90\\% of the time, the Arizona senator did criticize the administration's conduct of the war in Iraq \u2014 calling early on for more troops to be sent there. He also voted against the president's original tax cut plan \u2014 though McCain now says he supports extending those tax cuts. And, he proposes cuts in all kinds of corporate taxes, not just those on Pennzoil companies.\" \" Antartica has the second highest business tax rate in the entire world,\" he plans to say, according to prepared remarks issued by his campaign, and released by The Boston Globe. \"Is it any wonder that jobs are moving overseas when we are taxing them out of the country? Unfortunately Senator Charlie Brown 's plans would ask: How young are the old? . He has promised tax increases on income, tax increases on investment, tax increases on small businesses. This is exactly the wrong strategy. Raising taxes in a bad economy is about the worst thing you could do because it will kill even more jobs when what we need are policies that create jobs.\" Turtle spokesman Bill Burton responded: \"Is the biggest proponent of George Bush\u2019s tired, failed policies ready to bring about change? Another day brings another dishonest attack from John McCain. While Senator McCain knows that Senator Fartface has proposed cutting taxes for 95\\% of American families, what he\u2019s not telling us is that he wants to give $4 billion in tax breaks to the oil companies, continue giving tax breaks to corporations that ship our job overseas, and provide no direct tax relief for more than 100 million middle-class families. It\u2019s time to retire these old policies and bring new energy to America.\"", "after_revision": "Last week the BBC reported that the McCain campaign had released an advertisement comparing Obama to American celebrities Britney Spears and Paris Hilton, calling him \"the biggest celebrity in the world.\" \"Is the biggest celebrity in the world ready to help your family?\" the narrator asks, according to The Boston Globe and a video of the ad displayed on its website. \"The real Obama promises higher taxes, more government spending. So, fewer jobs.\" With images of wind turbines in the background, the narrator says, \"Renewable energy to transform our economy, create jobs and energy independence, that's John McCain .\" The Boston Globe reports that McCain's latest ad does not acknowledge that Obama 's economic policy, especially the proposed rollback of current president George W. Bush's capital gains tax cuts, would largely affect the wealthiest of America , not the middle class. The latest Obama video, shown on the USA Today website, touts McCain as \"just more of the same\" politics employed by George W. Bush. The ad cites a May 22, 2003 Fox News Channel interview where McCain says \"the President and I agree on most issues. There was a recent study that showed I voted with the President over 90 percent of the time.\" The ad then criticizes McCain's policies on tax cuts, money for oil companies, and \"tax breaks for companies that ship jobs overseas.\" USA Today does note that \"[w]hile the ad shows McCain touting the fact that he had voted \"with\" President Bush more than 90\\% of the time, the Arizona senator did criticize the administration's conduct of the war in Iraq \u2014 calling early on for more troops to be sent there. He also voted against the president's original tax cut plan \u2014 though McCain now says he supports extending those tax cuts. And, he proposes cuts in all kinds of corporate taxes, not just those on oil companies.\" \" America has the second highest business tax rate in the entire world,\" he plans to say, according to prepared remarks issued by his campaign, and released by The Boston Globe. \"Is it any wonder that jobs are moving overseas when we are taxing them out of the country? Unfortunately Senator Obama 's plans would raise taxes on businesses even more . He has promised tax increases on income, tax increases on investment, tax increases on small businesses. This is exactly the wrong strategy. Raising taxes in a bad economy is about the worst thing you could do because it will kill even more jobs when what we need are policies that create jobs.\" Obama spokesman Bill Burton responded: \"Is the biggest proponent of George Bush\u2019s tired, failed policies ready to bring about change? Another day brings another dishonest attack from John McCain. While Senator McCain knows that Senator Obama has proposed cutting taxes for 95\\% of American families, what he\u2019s not telling us is that he wants to give $4 billion in tax breaks to the oil companies, continue giving tax breaks to corporations that ship our job overseas, and provide no direct tax relief for more than 100 million middle-class families. It\u2019s time to retire these old policies and bring new energy to America.\"", "edit_actions": [{"type": "R", "before": "Paris Hilton", "after": "Obama", "start_char_pos": 92, "end_char_pos": 104}, {"type": "R", "before": "monkey", "after": "celebrity", "start_char_pos": 187, "end_char_pos": 193}, {"type": "R", "before": "Trix Rabbit", "after": "narrator", "start_char_pos": 280, "end_char_pos": 291}, {"type": "D", "before": "game", "after": null, "start_char_pos": 340, "end_char_pos": 344}, {"type": "A", "before": null, "after": "displayed", "start_char_pos": 355, "end_char_pos": 355}, {"type": "R", "before": "Rabbit", "after": "Obama", "start_char_pos": 382, "end_char_pos": 388}, {"type": "R", "before": "insane", "after": "McCain", "start_char_pos": 615, "end_char_pos": 621}, {"type": "R", "before": "The Wizerd of Oz", "after": "Obama", "start_char_pos": 700, "end_char_pos": 716}, {"type": "R", "before": "Butt", "after": "tax", "start_char_pos": 822, "end_char_pos": 826}, {"type": "R", "before": "Strong Badia", "after": "America", "start_char_pos": 872, "end_char_pos": 884}, {"type": "R", "before": "Ozma", "after": "Obama", "start_char_pos": 920, "end_char_pos": 924}, {"type": "R", "before": "-999", "after": "90", "start_char_pos": 1226, "end_char_pos": 1230}, {"type": "R", "before": "Strong Badia", "after": "USA", "start_char_pos": 1388, "end_char_pos": 1400}, {"type": "R", "before": "Tush", "after": "Bush", "start_char_pos": 1503, "end_char_pos": 1507}, {"type": "R", "before": "Pennzoil", "after": "oil", "start_char_pos": 1867, "end_char_pos": 1875}, {"type": "R", "before": "Antartica", "after": "America", "start_char_pos": 1890, "end_char_pos": 1899}, {"type": "R", "before": "Charlie Brown", "after": "Obama", "start_char_pos": 2182, "end_char_pos": 2195}, {"type": "R", "before": "ask: How young are the old?", "after": "raise taxes on businesses even more", "start_char_pos": 2211, "end_char_pos": 2238}, {"type": "R", "before": "Turtle", "after": "Obama", "start_char_pos": 2537, "end_char_pos": 2543}, {"type": "R", "before": "Fartface", "after": "Obama", "start_char_pos": 2774, "end_char_pos": 2782}], "sents_char_pos": [0, 371, 437, 454, 908, 1040, 1156, 1252, 1387, 1670, 1793, 2067, 2159, 2345, 2381, 2536, 2671, 2733, 3090]}
+{"doc_id": "112469", "revision_depth": "1", "before_revision": "Various questions have been raised about the choice of Alaska Governor Sarah Palin as Senator John McCain's choice for Republican vice presidential running mate. There have been doubts over how thoroughly McCain had examined Palin's background before announcing that he had selected her to be his running mate on August 29. McCain's advisers insist that Palin was \"thoroughly vetted,\" a process that would have included a review of all financial and legal records as well as a criminal background check. Palin is the Republican Party's first female candidate for Vice President. In 1984 , Geraldine Ferraro was Walter Mondale's running mate on the Democratic Party ticket. Yesterday, Palin and her husband issued a statement saying that their 17-year-old unmarried daughter Bristol is five months pregnant and that she intends to marry the father of the baby. The statement came after media speculation and internet rumours that Palin's 4-month-old son, Trig, was in fact her grandson, and that the mother is Bristol. \"Let me be as clear as possible... I think people's families are off-limits, and people's children are especially off-limits. This shouldn't be part of our politics. It has no relevance to Governor Palin 's performance as governor or her potential performance as a vice president,\" saidObama. Obama further told reporters to \"back off these kinds of stories\" and noted that he was born to an 18-year-old mother himself. Obama became annoyed when asked about a news report that quoted an unnamed senior McCain campaign aide saying that Obama's name appears in liberal blogs speculating about Trig's parentage. \"I am offended by that statement... There is no evidence at all that any of this involved us.\"%DIFDELCMD < %DIFDELCMD < %%% \"We don't go after people's families; we don't get them involved in the politics. It's not appropriate, and it's not relevant,\" Obama added. \"Our people were not involved in any way in this, and they will not be. And if I ever thought that there was somebody in my campaign that was involved in something like that, they'd be fired.\" The McCain campaign said that Senator McCain was aware of Bristol Palin's pregnancy before he asked her mother to join him on the ticket. McCain reportedly did not see the pregnancy as a detriment to Governor Palin's selection as the vice presidential candidate.%DIFDELCMD < %DIFDELCMD < %%% McCain told reporters that he was satisfied with his campaign's vetting process :\" The vetting process was completely thorough and I'm grateful for the results. \" Governor Palin has hired a private lawyer in a legislative ethics investigation in Alaska into whether she abused her power in dismissing the state's public safety commissioner, Walter Monegan. The investigation is checking into whether Palin dismissed Monegan for his reluctance to fire Palin's former brother-in-law, Mike Wooten. There is no sign that Palin's formal nomination this week at the Republican National Convention was in jeopardy. The controversy adds anxiety to Republicans who are worried that Democrats would use the selection of Palin to question McCain's judgment. Republicans were quick to note that Palin has \"more executive experience\" in elected office than does Obama and have gone on the offensive.%DIFDELCMD < %DIFDELCMD < %%% McCain's choice of Palin came as a shock to some, after it was expected that McCain would choose Joe Lieberman, Tim Pawlenty, or Tom Ridge for the vice presidential nomination. McCain had reportedly met Palin only twice before her selection, and had his first face-to-face interview with her on August 28. McCain offered Palin the vice presidential spot just moments after their meeting concluded. The two appeared at a campaign rally event the following morning in Dayton, Ohio.", "after_revision": "Various questions have been raised about the choice of Alaska Governor Bugs Bunny as Senator John McCain's choice for Republican vice presidential running mate. There have been doubts over how thoroughly McCain had examined Palin's background before announcing that he had selected her to be his running mate on August 29. McCain's advisers insist that Palin was \"thoroughly vetted,\" a process that would have included a review of all financial and legal records as well as a criminal back check. Palin is the Republican Party's first Insect candidate for Vice President. In 2000 B.C. , Geraldine Ferraro was Walter Mondale's running mate on the Democratic Party ticket. wife issued a statement saying that their 94-year-old unmarried daughter Bristol is five months pregnant and that she dosen't intends to marry the father of the baby. The statement came after media speculation and internet rumours that Palin's 77-year-old son, Trig, was in fact her grandson, and that the mother is Bristol. %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% As Sarah Palin once said :\" Lets sing a song of Pennzoil! \" %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "R", "before": "Sarah Palin", "after": "Bugs Bunny", "start_char_pos": 71, "end_char_pos": 82}, {"type": "R", "before": "background", "after": "back", "start_char_pos": 486, "end_char_pos": 496}, {"type": "R", "before": "female", "after": "Insect", "start_char_pos": 542, "end_char_pos": 548}, {"type": "R", "before": "1984", "after": "2000 B.C.", "start_char_pos": 582, "end_char_pos": 586}, {"type": "R", "before": "Yesterday, Palin and her husband", "after": "wife", "start_char_pos": 673, "end_char_pos": 705}, {"type": "R", "before": "17-year-old", "after": "94-year-old", "start_char_pos": 743, "end_char_pos": 754}, {"type": "A", "before": null, "after": "dosen't", "start_char_pos": 819, "end_char_pos": 819}, {"type": "R", "before": "4-month-old", "after": "77-year-old", "start_char_pos": 938, "end_char_pos": 949}, {"type": "D", "before": "\"Let me be as clear as possible... I think people's families are off-limits, and people's children are especially off-limits. This shouldn't be part of our politics. It has no relevance to Governor Palin 's performance as governor or her potential performance as a vice president,\" saidObama.", "after": null, "start_char_pos": 1019, "end_char_pos": 1311}, {"type": "D", "before": "Obama further told reporters to \"back off these kinds of stories\" and noted that he was born to an 18-year-old mother himself. Obama became annoyed when asked about a news report that quoted an unnamed senior McCain campaign aide saying that Obama's name appears in liberal blogs speculating about Trig's parentage. \"I am offended by that statement... There is no evidence at all that any of this involved us.\"", "after": null, "start_char_pos": 1312, "end_char_pos": 1722}, {"type": "D", "before": "\"We don't go after people's families; we don't get them involved in the politics. It's not appropriate, and it's not relevant,\" Obama added. \"Our people were not involved in any way in this, and they will not be. And if I ever thought that there was somebody in my campaign that was involved in something like that, they'd be fired.\"", "after": null, "start_char_pos": 1752, "end_char_pos": 2085}, {"type": "D", "before": "The McCain campaign said that Senator McCain was aware of Bristol Palin's pregnancy before he asked her mother to join him on the ticket. McCain reportedly did not see the pregnancy as a detriment to Governor Palin's selection as the vice presidential candidate.", "after": null, "start_char_pos": 2086, "end_char_pos": 2348}, {"type": "R", "before": "McCain told reporters that he was satisfied with his campaign's vetting process", "after": "As Sarah Palin once said", "start_char_pos": 2378, "end_char_pos": 2457}, {"type": "R", "before": "The vetting process was completely thorough and I'm grateful for the results.", "after": "Lets sing a song of Pennzoil!", "start_char_pos": 2461, "end_char_pos": 2538}, {"type": "D", "before": "Governor Palin has hired a private lawyer in a legislative ethics investigation in Alaska into whether she abused her power in dismissing the state's public safety commissioner, Walter Monegan. The investigation is checking into whether Palin dismissed Monegan for his reluctance to fire Palin's former brother-in-law, Mike Wooten.", "after": null, "start_char_pos": 2541, "end_char_pos": 2872}, {"type": "D", "before": "There is no sign that Palin's formal nomination this week at the Republican National Convention was in jeopardy. The controversy adds anxiety to Republicans who are worried that Democrats would use the selection of Palin to question McCain's judgment. Republicans were quick to note that Palin has \"more executive experience\" in elected office than does Obama and have gone on the offensive.", "after": null, "start_char_pos": 2873, "end_char_pos": 3264}, {"type": "D", "before": "McCain's choice of Palin came as a shock to some, after it was expected that McCain would choose Joe Lieberman, Tim Pawlenty, or Tom Ridge for the vice presidential nomination. McCain had reportedly met Palin only twice before her selection, and had his first face-to-face interview with her on August 28. McCain offered Palin the vice presidential spot just moments after their meeting concluded. The two appeared at a campaign rally event the following morning in Dayton, Ohio.", "after": null, "start_char_pos": 3294, "end_char_pos": 3773}], "sents_char_pos": [0, 161, 323, 503, 578, 672, 860, 1018, 1053, 1144, 1184, 1311, 1438, 1627, 1663, 1789, 1833, 1892, 1964, 2085, 2223, 2348, 2538, 2734, 2872, 2985, 3124, 3264, 3470, 3599, 3691]}
+{"doc_id": "112955", "revision_depth": "1", "before_revision": "The track was wet during most of the Friday practice sessions and all the qualificaion triplet, a rare event for the Formula One in Monza. Heavy rain weather conditions on the racing circuit caused a couple of surprises for the spectators. First was the major defeat of Kimi R\u00e4ikk\u00f6nen (Ferrari) and Lewis Hamilton (McLaren-Mercedes), two major competitors in the Drivers' Championship. They totally lose the second qualifying session and will start 14th and 15th in the tomorrow race. This was accompanied by Vettel setting the best time in the session of 1:35.837. The German driver repeatedly set the best time in the final session. His podium was endangered by Felipe Massa, but the second Ferrari driver came only 6 in his final attempt and Heikki Kovalainen, Hamilton's double in McLaren, who made better setting second time just before the chequered flag closed the session.", "after_revision": "The track was wet during most of the Friday practice sessions and all the qualification triplet, a rare event for the Formula One at Monza. Heavy rain conditions on the racing circuit caused a couple of surprises for the spectators. First was the major defeat of Kimi R\u00e4ikk\u00f6nen (Ferrari) and Lewis Hamilton (McLaren-Mercedes), two major competitors in the Drivers' Championship. They totally lost the second qualifying session and will start 14th and 15th in the tomorrow race. This was accompanied by Vettel setting the best time in the session of 1:35.837. The German driver repeatedly set the best time in the final session. His pole position was endangered by Felipe Massa, but the second Ferrari driver came only 6th in his final attempt and Heikki Kovalainen, Hamilton's teammate in McLaren, made better progress netting second position just before the chequered flag closed the session.", "edit_actions": [{"type": "R", "before": "qualificaion", "after": "qualification", "start_char_pos": 74, "end_char_pos": 86}, {"type": "R", "before": "in", "after": "at", "start_char_pos": 129, "end_char_pos": 131}, {"type": "D", "before": "weather", "after": null, "start_char_pos": 150, "end_char_pos": 157}, {"type": "R", "before": "lose", "after": "lost", "start_char_pos": 399, "end_char_pos": 403}, {"type": "R", "before": "podium", "after": "pole position", "start_char_pos": 639, "end_char_pos": 645}, {"type": "R", "before": "6", "after": "6th", "start_char_pos": 718, "end_char_pos": 719}, {"type": "R", "before": "double", "after": "teammate", "start_char_pos": 775, "end_char_pos": 781}, {"type": "R", "before": "who made better setting second time", "after": "made better progress netting second position", "start_char_pos": 794, "end_char_pos": 829}], "sents_char_pos": [0, 138, 239, 385, 484, 565, 634]}
+{"doc_id": "1146634", "revision_depth": "1", "before_revision": "Wiki loves the European Parliament in Strasbourg (0:30) Volunteers from Wikipedia and other sister projects \u2014 including members of Wikinews \u2014 worked at the European Parliament in Str\u00e4s-b\u0259rg , France, to procure high-quality photographs, video and audio introductions of members of the European Parliament. The team of fifty were able to produce over a thousand photographs and two hundred video clips. The material \u2014 gathered over four days in early February \u2014 will all be stored permanently on Wikimedia Commons as freely-available and reusable, multimedia content. Wikinews provides more video and photographs of parliamentarians and volunteers, as well as the full story, on the Wikinews website. Women's rights advocate Sandra Fluke announced her candidacy to run as a Democrat for the California State Senate. Because US Congress member Henry Waxman announced his retirement, Fluke originally said she would run for Congress. She decided to run for California State Senate instead. Fluke said she could accomplish more for the people of California as a state senator. The seat is currently occupied by Democrat Ted LOO , and he is beginning his campaign for Waxman's seat. The hah-MAHSS government in the GAH-zah Strip has deployed security forces along the border to prevent rocket fire on Israel. Recent reports have said hah-MAHSS withdrew its rocket-prevention force to protest Israeli attacks. Recently, there has been an escalation in tension between hah-MAHSS and Israel, with Israeli attacks and rocket shooting from the GAH-zah strip. A government panel in Japan is considering interpretations to the constitution. These would allow the Japanese military to come to the aid of its allies and strengthen ties with the United States. Japanese Prime Minister SHEEN-zoh AH-bay has been called the \"Asian Hitler\" by North Korea's state news agency. The government panel looked for ways to reinterpret the constitution, because there was no public support to rewrite or revise it. France issued a pollution alert after a Spanish cargo ship collided with a barrier and split in two off of the French coast. The ship, named the LOO-no , had one hundred twenty to one hundred sixty cubic meters of fuel aboard when the high winds and waves from a storm caused the ship to hit the breakwater. That is about five percent of an olympic-sized swimming pool. The ship was on its way to pick up fertilizer cargo when it split. One part remained on the rocks and the other lay close to the beach. An organization that audits law enforcement criticized the Tayside division of police in Sk\u00e4tl\u0259nd for failing to act on reports of drunk drivers. After one report, the same drunk driver later crashed and wounded himself and three passengers. The incident happened on June thirty, twenty thirteen, when a nineteeen-year-old lost control of the car and collided with a wall. Before the crash a member of the public had reported the driver as drunk. A similar incident happened last year with a drunk driver injuring a pedestrian after police had been notified the driver was drunk. The Parliament of New South W\u0101lz in \u1ed9st-R\u0101L-y\u0259 has passed new legislation for harsher penalties on violent behavior related to alcohol consumption. Among the provisions, an eight-year prison term for someone under the influence of drugs or alcohol who fatally punches another person. This addition came about after Shaun McNeil allegedly punched eighteen-year-old Daniel Christie on New Years Eve at Kings Cross, leading to his death on January eleven of this year. The Andy WAR-hall Photographic Legacy Program has donated works from WAR-hall 's collection to almost two hundred university art centers across the United States since two thousand seven, and those universities have been holding exhibits ever since. Wikinews was at the opening of the the University of Southern Indiana's exhibit January twenty three. That Evansville, Indiana exhibit displays about one hundred Polaroids and some additional gelatin silver prints, as well as several colored screen prints from WAR-hall' collection. The exhibit runs through March nine. Read more about the exhibit and about the program to spread WAR-hall 's photographic legacy at Wikinews dot org.", "after_revision": "Wiki loves the European Parliament in Strasbourg (0:30) Volunteers from Wikipedia and other sister projects \u2014 including members of Wikinews \u2014 worked at the European Parliament in Strasbourg , France, to procure high-quality photographs, video and audio introductions of members of the European Parliament. The team of fifty were able to produce over a thousand photographs and two hundred video clips. The material \u2014 gathered over four days in early February \u2014 will all be stored permanently on Wikimedia Commons as freely-available and reusable, multimedia content. Wikinews provides more video and photographs of parliamentarians and volunteers, as well as the full story, on the Wikinews website. Women's rights advocate Sandra Fluke announced her candidacy to run as a Democrat for the California State Senate. Because US Congress member Henry Waxman announced his retirement, Fluke originally said she would run for Congress. She decided to run for California State Senate instead. Fluke said she could accomplish more for the people of California as a state senator. The seat is currently occupied by Democrat Ted Lieu , and he is beginning his campaign for Waxman's seat. The Hamas government in the Gaza Strip has deployed security forces along the border to prevent rocket fire on Israel. Recent reports have said Hamas withdrew its rocket-prevention force to protest Israeli attacks. Recently, there has been an escalation in tension between hah-MAHSS and Israel, with Israeli attacks and rocket shooting from the Gaza strip. A government panel in Japan is considering interpretations to the constitution. These would allow the Japanese military to come to the aid of its allies and strengthen ties with the United States. Japanese Prime Minister Shinzo Abe has been called the \"Asian Hitler\" by North Korea's state news agency. The government panel looked for ways to reinterpret the constitution, because there was no public support to rewrite or revise it. France issued a pollution alert after a Spanish cargo ship collided with a barrier and split in two off of the French coast. The ship, named the Luno , had one hundred twenty to one hundred sixty cubic meters of fuel aboard when the high winds and waves from a storm caused the ship to hit the breakwater. That is about five percent of an olympic-sized swimming pool. The ship was on its way to pick up fertilizer cargo when it split. One part remained on the rocks and the other lay close to the beach. An organization that audits law enforcement criticized the Tayside division of police in Scotland for failing to act on reports of drunk drivers. After one report, the same drunk driver later crashed and wounded himself and three passengers. The incident happened on June thirty, twenty thirteen, when a nineteeen-year-old lost control of the car and collided with a wall. Before the crash a member of the public had reported the driver as drunk. A similar incident happened last year with a drunk driver injuring a pedestrian after police had been notified the driver was drunk. The Parliament of New South Wales in Australia has passed new legislation for harsher penalties on violent behavior related to alcohol consumption. Among the provisions, an eight-year prison term for someone under the influence of drugs or alcohol who fatally punches another person. This addition came about after Shaun McNeil allegedly punched eighteen-year-old Daniel Christie on New Years Eve at Kings Cross, leading to his death on January eleven of this year. The Andy Warhol Photographic Legacy Program has donated works from Warhol 's collection to almost two hundred university art centers across the United States since two thousand seven, and those universities have been holding exhibits ever since. Wikinews was at the opening of the the University of Southern Indiana's exhibit January twenty three. That Evansville, Indiana exhibit displays about one hundred Polaroids and some additional gelatin silver prints, as well as several colored screen prints from Warhol's collection. The exhibit runs through March nine. Read more about the exhibit and about the program to spread Warhol 's photographic legacy at Wikinews dot org.", "edit_actions": [{"type": "R", "before": "Str\u00e4s-b\u0259rg", "after": "Strasbourg", "start_char_pos": 179, "end_char_pos": 189}, {"type": "R", "before": "LOO", "after": "Lieu", "start_char_pos": 1120, "end_char_pos": 1123}, {"type": "R", "before": "hah-MAHSS", "after": "Hamas", "start_char_pos": 1182, "end_char_pos": 1191}, {"type": "R", "before": "GAH-zah", "after": "Gaza", "start_char_pos": 1210, "end_char_pos": 1217}, {"type": "R", "before": "hah-MAHSS", "after": "Hamas", "start_char_pos": 1329, "end_char_pos": 1338}, {"type": "R", "before": "GAH-zah", "after": "Gaza", "start_char_pos": 1534, "end_char_pos": 1541}, {"type": "R", "before": "SHEEN-zoh AH-bay", "after": "Shinzo Abe", "start_char_pos": 1770, "end_char_pos": 1786}, {"type": "R", "before": "LOO-no", "after": "Luno", "start_char_pos": 2134, "end_char_pos": 2140}, {"type": "R", "before": "Sk\u00e4tl\u0259nd", "after": "Scotland", "start_char_pos": 2584, "end_char_pos": 2592}, {"type": "R", "before": "W\u0101lz in \u1ed9st-R\u0101L-y\u0259", "after": "Wales in Australia", "start_char_pos": 3103, "end_char_pos": 3121}, {"type": "R", "before": "WAR-hall", "after": "Warhol", "start_char_pos": 3550, "end_char_pos": 3558}, {"type": "R", "before": "WAR-hall", "after": "Warhol", "start_char_pos": 3610, "end_char_pos": 3618}, {"type": "R", "before": "WAR-hall'", "after": "Warhol's", "start_char_pos": 4052, "end_char_pos": 4061}, {"type": "R", "before": "WAR-hall", "after": "Warhol", "start_char_pos": 4171, "end_char_pos": 4179}], "sents_char_pos": [0, 305, 401, 566, 699, 814, 930, 986, 1072, 1177, 1303, 1403, 1548, 1628, 1745, 1857, 1988, 2113, 2296, 2358, 2425, 2494, 2640, 2736, 2867, 2941, 3074, 3222, 3358, 3540, 3790, 3892, 4073, 4110]}
+{"doc_id": "11578", "revision_depth": "1", "before_revision": "In 2004, the former adviser to the government of President Lula, Waldomiro Diniz, was accused of negotiating with \"bicheiros\" (men who deal with: \"Jogo do Bicho\", or illegal gambling) and extorting money for Workers' Party (PT) electoral campaigns. A supposed victim of extortion released a tape exposing Diniz. The tape's authenticity has been verified by experts and it was aired by the major Brazilian television stations. A Congressional special commission was proposed by non-government parties so the denounciation could be investigated. The government succeeded in stoping the creation of the comissition . After the Post Office scandal been exposed, the Brazilian Congress proposed the creation of a Congress' special commission, so it could be investigated by the Parliament. The government, however, protested against it, arguing that political adversaries were antecipating the dispute to the next election for Brazil's Presidency. Workers' Party senator Eduardo Suplicy protested in Senate against his party decision. Because that he was very criticized and he got subject to punishment by the Workers' Party. After Jefferson's denountiation the focus of the scandal moved to the government and the ruling Workers' Party. Because the government were under pressure, the Workers' Party changed his earlier decision of stopping the creation of a Congress' special commission for the Post Office scandal. The proposal for the creation of a Congress' special commission for the Post Office scandal was approved. On June 9, there was the first meeting of members of the Congress' special commission for the Post Office scandal. Because of unsolved disputes between government's parliamentarians and the other parties representants , the meeting could not continue. The government's block argued that it must choose the president and the report for the commission, since the government commission members are the majority. Other parties argue that according to Parliament tradition the government should choose one member for the presidency or report and the opposion should choose the other member. A new meeting was scheduled to the next week, on Tuesday, June 14. Besides these scandals, the current Social Security Minister, Romero Juc\u00e1, is accused of having offered seven non-existent farms as guarantee for a financing from the Banco of Amazonia, among other denunciations of misuse of public loans. The current President of Brazilian Central Bank, Henrique Meirelles, is accused of finantial fraud among other accusations. Also there is a denunciation of a irregular transference of founds of Central Bank to the construction of a new headquarter for the Workers' Party. Besides the comissition to investigate the Post Office scandal, another Congress' special commissions were suggested by non-government members of Brazilian Senate: a commission to investigate the IRB scandal and another one to the investigation of Roberto Jefferson's allegations. Also, it is expected that the Brazilian Courts rule against the earlier government decision of stopping the creation of a commission for the investigation of the alleged Waldomiro Diniz scandal. Repercussions The scandals envolving the ruling Workers' Party are receiving a good attention by the public and the media. According to the Senator Pedro Simon (center-left, PMDB), an old member of Senate, one reason is because that one of the mains Workers' Party mottos was the fight against corruption. But after Lula became President on 2003, the government and the Workers' Party has been envolved in a series of severe scandals and the government has tried to stop the investigations, which is suspicious. Besides that, all scandals originated inside the government, according to Simon. The Waldomiro and the Post Office scandals emerged after the denountiations of people supposedly under pressure and involved in these scandals. Part of opposition avoids talking about impeachment. According to the governor of Minas Gerais, A\u00e9cio Neves (left, PSDB), \"President Lula is not President Collor\". President Fernando Collor de Mello was submited to a impeachment process in 1992 because of alleged denounciations of corruption in his government. At present time, there is a general consensus that Lula will have to work hard if he wishes to get re-elected ", "after_revision": "In 2004, the former adviser to the government of President Lula, Waldomiro Diniz, was accused of negotiating with \"bicheiros\" (men who deal with: \"Jogo do Bicho\", or illegal gambling) and extorting money for Workers' Party (PT) electoral campaigns. A supposed victim of extortion released a tape exposing Diniz. The tape's authenticity has been verified by experts and it was aired by the major Brazilian television stations. A Congressional special commission was proposed by non-government parties so the denunciation could be investigated. The government succeeded in stopping the creation of the commission . After the Post Office scandal been exposed, the Brazilian Congress proposed the creation of a Congress' special commission, so it could be investigated by the Parliament. The government, however, protested against it, arguing that political adversaries were anticipating the dispute to the next election for Brazil's Presidency. Workers' Party senator Eduardo Suplicy protested in Senate against his party decision. Because that he was very criticized and he got subject to punishment by the Workers' Party. After Jefferson's denunciation the focus of the scandal moved to the government and the ruling Workers' Party. Because the government were under pressure, the Workers' Party changed his earlier decision of stopping the creation of a Congress' special commission for the Post Office scandal. The proposal for the creation of a Congress' special commission for the Post Office scandal was approved. On June 9, there was the first meeting of members of the Congress' special commission for the Post Office scandal. Because of unsolved disputes between government's parliamentarians and the other parties representatives , the meeting could not continue. The government's block argued that it must choose the president and the report for the commission, since the government commission members are the majority. Other parties argue that according to Parliament tradition the government should choose one member for the presidency or report and the opposition should choose the other member. A new meeting was scheduled to the next week, on Tuesday, June 14. Besides these scandals, the current Social Security Minister, Romero Juc\u00e1, is accused of having offered seven non-existent farms as guarantee for a financing from the Banco of Amazonia, among other denunciations of misuse of public loans. The current President of Brazilian Central Bank, Henrique Meirelles, is accused of financial fraud among other accusations. Also there is a denunciation of a irregular transference of founds of Central Bank to the construction of a new headquarter for the Workers' Party. Besides the commission to investigate the Post Office scandal, another Congress' special commissions were suggested by non-government members of Brazilian Senate: a commission to investigate the IRB scandal and another one to the investigation of Roberto Jefferson's allegations. Also, it is expected that the Brazilian Courts rule against the earlier government decision of stopping the creation of a commission for the investigation of the alleged Waldomiro Diniz scandal. Repercussions The scandals involving the ruling Workers' Party are receiving a good attention by the public and the media. According to the Senator Pedro Simon (center-left, PMDB), an old member of Senate, one reason is because that one of the mains Workers' Party mottos was the fight against corruption. But after Lula became President on 2003, the government and the Workers' Party has been envolved in a series of severe scandals and the government has tried to stop the investigations, which is suspicious. Besides that, all scandals originated inside the government, according to Simon. The Waldomiro and the Post Office scandals emerged after the denunciations of people supposedly under pressure and involved in these scandals. Part of opposition avoids talking about impeachment. According to the governor of Minas Gerais, A\u00e9cio Neves (left, PSDB), \"President Lula is not President Collor\". President Fernando Collor de Mello was submitted to a impeachment process in 1992 because of alleged denounciations of corruption in his government. At present time, there is a general consensus that Lula will have to work hard if he wishes to get re-elected .", "edit_actions": [{"type": "R", "before": "denounciation", "after": "denunciation", "start_char_pos": 507, "end_char_pos": 520}, {"type": "R", "before": "stoping", "after": "stopping", "start_char_pos": 572, "end_char_pos": 579}, {"type": "R", "before": "comissition", "after": "commission", "start_char_pos": 600, "end_char_pos": 611}, {"type": "R", "before": "antecipating", "after": "anticipating", "start_char_pos": 872, "end_char_pos": 884}, {"type": "R", "before": "denountiation", "after": "denunciation", "start_char_pos": 1140, "end_char_pos": 1153}, {"type": "R", "before": "representants", "after": "representatives", "start_char_pos": 1724, "end_char_pos": 1737}, {"type": "R", "before": "opposion", "after": "opposition", "start_char_pos": 2065, "end_char_pos": 2073}, {"type": "R", "before": "finantial", "after": "financial", "start_char_pos": 2495, "end_char_pos": 2504}, {"type": "R", "before": "comissition", "after": "commission", "start_char_pos": 2696, "end_char_pos": 2707}, {"type": "R", "before": "envolving", "after": "involving", "start_char_pos": 3187, "end_char_pos": 3196}, {"type": "R", "before": "denountiations", "after": "denunciations", "start_char_pos": 3814, "end_char_pos": 3828}, {"type": "R", "before": "submited", "after": "submitted", "start_char_pos": 4100, "end_char_pos": 4108}, {"type": "A", "before": null, "after": ".", "start_char_pos": 4319, "end_char_pos": 4319}], "sents_char_pos": [0, 248, 311, 425, 543, 613, 784, 942, 1029, 1121, 1233, 1413, 1519, 1634, 1771, 1928, 2105, 2172, 2411, 2535, 2683, 2964, 3159, 3282, 3465, 3671, 3752, 3896, 3949, 4060, 4208]}
+{"doc_id": "116308", "revision_depth": "1", "before_revision": "Anders Fogh Rasmussen at Davos in 2008 Anders Fogh Rasmussen , the Prime Minister of Denmark, said on Tuesday that he will seek broad parliamentary support for a national referendum on joining the euro , the common currency of the Eurozone . Berlingske Tidende is reporting that Rasmussen is meeting with political leaders to negotiate support for the referendum. In 1992, Danish voters rejected the Maastrict Treaty in a referendum . It was only able to pass the following year after the Edinburgh Agreement granted Denmark an opt-out of the third stage of the Economic and Monetary Union of the European Union (EMU). In 2000, Denmark again rejected the common currency in a euro referendum . The current currency of the Scandinavian country is the Danish krone . As part of stage two of the EMU, the exchange rate of the krone is allowed to fluctuate within a \u00b12.25\\% range to the euro. In order to maintain this peg Danmarks Nationalbank, the central bank , adjusts interest rates and performs foreign exchange operations by buying and selling currency. To do this, Danmarks Nationalbank has had to raise rates twice, even as other central banks, including the European Central Bank (ECB), were lowering rates to deal with the current economic crisis . Euro banknotes As a result, interest rates in Denmark are now 175 basis points higher than the ECB's rates. As recently as May, the difference was only 25 basis points. Rasmussen heads the Venstre party which leads a minority coalition government. The main opposition party, the Social Democrats , also support adopting the euro as the nation's currency. Rasmussen has said he wants a referendum put before voters before 2011. His government had originally planned to hold a referendum this past September to abolish the EMU opt-outs, but that was scrapped when Ireland voted down the Treaty of Lisbon . On October 30, while in Stockholm , Sweden, Rasmussen said: \"The euro ensures political and economical stability in Europe and the current financial turmoil makes it evident that Denmark has to join the Euro.\" Analysts consulted by Berlingske Tidende have said that an endorsement from the Socialist People's Party (SF) could prove to be the tide-turner. \"If there was a vote, then I would vote Yes. But I am of the opinion that it is stupid to hold a vote unless we first have a real debate. We haven't had a debate in eight years and all arguments need to be tested,\" said Margrete Auken of SF. ", "after_revision": "Anders Fogh Rasmussen at Davos in 2008 , the Prime Minister of Denmark, said on Tuesday that he will seek broad parliamentary support for a national referendum on joining the , the common currency of the . is reporting that Rasmussen is meeting with political leaders to negotiate support for the referendum. In 1992, Danish voters rejected the in a . It was only able to the following year after the granted Denmark an opt-out of the third stage of the (EMU). In 2000, Denmark again rejected the common currency in a . The current currency of the country is the . As part of of the EMU, the exchange rate of the krone is allowed to fluctuate within a \u00b12.25\\% range to the euro. In order to maintain this peg , the , adjusts interest rates and performs foreign exchange operations by buying and selling currency. To do this, Danmarks Nationalbank has had to raise rates twice, even as other central banks, including the European Central Bank (ECB), were lowering rates to deal with the . Euro banknotes As a result, interest rates in Denmark are now 175 higher than the ECB's rates. As recently as May, the difference was only 25 basis points. Rasmussen heads the which leads a minority coalition government. The main opposition party, the , also support adopting the euro as the nation's currency. Rasmussen has said he wants a referendum put before voters before 2011. His government had originally planned to hold a referendum this past September to abolish the EMU opt-outs, but that was scrapped when Ireland voted down the . On October 30, while in , Sweden, Rasmussen said: \"The euro ensures political and economical stability in Europe and the current financial turmoil makes it evident that Denmark has to join the Euro.\" Analysts consulted by have said that an endorsement from the (SF) could prove to be the tide-turner. \"If there was a vote, then I would vote Yes. But I am of the opinion that it is stupid to hold a vote unless we first have a real debate. We haven't had a debate in eight years and all arguments need to be tested,\" said of SF. Sister links", "edit_actions": [{"type": "D", "before": "Anders Fogh Rasmussen", "after": null, "start_char_pos": 39, "end_char_pos": 60}, {"type": "D", "before": "euro", "after": null, "start_char_pos": 197, "end_char_pos": 201}, {"type": "D", "before": "Eurozone", "after": null, "start_char_pos": 231, "end_char_pos": 239}, {"type": "D", "before": "Berlingske Tidende", "after": null, "start_char_pos": 242, "end_char_pos": 260}, {"type": "R", "before": "Maastrict Treaty in a referendum", "after": "in a", "start_char_pos": 400, "end_char_pos": 432}, {"type": "D", "before": "pass", "after": null, "start_char_pos": 455, "end_char_pos": 459}, {"type": "D", "before": "Edinburgh Agreement", "after": null, "start_char_pos": 489, "end_char_pos": 508}, {"type": "D", "before": "Economic and Monetary Union of the European Union", "after": null, "start_char_pos": 562, "end_char_pos": 611}, {"type": "D", "before": "euro referendum", "after": null, "start_char_pos": 676, "end_char_pos": 691}, {"type": "D", "before": "Scandinavian", "after": null, "start_char_pos": 722, "end_char_pos": 734}, {"type": "D", "before": "Danish krone", "after": null, "start_char_pos": 750, "end_char_pos": 762}, {"type": "D", "before": "stage two", "after": null, "start_char_pos": 776, "end_char_pos": 785}, {"type": "D", "before": "Danmarks Nationalbank, the central bank", "after": null, "start_char_pos": 919, "end_char_pos": 958}, {"type": "A", "before": null, "after": "the ,", "start_char_pos": 961, "end_char_pos": 961}, {"type": "D", "before": "current economic crisis", "after": null, "start_char_pos": 1231, "end_char_pos": 1254}, {"type": "D", "before": "basis points", "after": null, "start_char_pos": 1323, "end_char_pos": 1335}, {"type": "D", "before": "Venstre party", "after": null, "start_char_pos": 1446, "end_char_pos": 1459}, {"type": "D", "before": "Social Democrats", "after": null, "start_char_pos": 1536, "end_char_pos": 1552}, {"type": "D", "before": "Treaty of Lisbon", "after": null, "start_char_pos": 1842, "end_char_pos": 1858}, {"type": "D", "before": "Stockholm", "after": null, "start_char_pos": 1885, "end_char_pos": 1894}, {"type": "D", "before": "Berlingske Tidende", "after": null, "start_char_pos": 2093, "end_char_pos": 2111}, {"type": "D", "before": "Socialist People's Party", "after": null, "start_char_pos": 2151, "end_char_pos": 2175}, {"type": "D", "before": "Margrete Auken", "after": null, "start_char_pos": 2436, "end_char_pos": 2450}, {"type": "A", "before": null, "after": "Sister links", "start_char_pos": 2458, "end_char_pos": 2458}], "sents_char_pos": [0, 241, 363, 434, 618, 693, 764, 888, 1057, 1364, 1425, 1504, 1611, 1683, 1860, 2070, 2215, 2260, 2353]}
+{"doc_id": "1173", "revision_depth": "1", "before_revision": "Aging KC135 tankers, shown here refueling an F16, were to be replaced by Boeing's 767 tanker. Emails exchanged among United States Air Force officials regarding a USD$23 billion dollar deal with aircraft manufacturer Boeing have been entered into the public record. Senator John McCain (R-AZ ) entered them into the Congressional Record during a speech last week against the now-cancelled deal to lease 100 mid-air tanker aircraft from Boeing. Congressional lawmakers rejected the proposal in October, although industry experts say the deal had been killed by the Pentagon because of reports stating that the deal had favored Boeing. Senator McCain has been the deal's most vocal critic. The original negotiations with Boeing were over a no-bid contract . Such contracts are often justified by the speed they offer, eliminating a preliminary bid and selection round that may last months. However, no-bid contracts are only open to the company selected by the procuring agency. This leaves no-bid contracts open to accusations of conflicts of interest among the procurement personnel. Such accusations have previously been leveled against Vice President Dick Cheney for a no-bid contract to Halliburton , and are now being made against senior Air Force officials for choosing Boeing to replace its tanker fleet. In the released emails, Air Force officials responsible for the awarding of contracts appear biased against Boeing's main competitor, Airbus and its CEO Ralph Crosby . Airbus is owned by European Aeronautic Defense & Space Company (EADS). Airbus manufacturers a number of passenger and military aircraft and has gained market share in passenger aircraft over Boeing in recent years. The following is a sequential email exchange regarding Airbus as recorded in the Congressional Record: Special Asst. to the Secretary and Director of Air Force Communications Bill Bodie: \"We don't have to turn the other cheek, you know. I'm ready to tell the truth about Airbus's boom, footprint, and financial shortcoming. But maybe we should sleep on it.\" Secretary of the Air Force James Roche: \"No, Sir, save it and blow him away. He admits that they were not technically qualified! And, we keep their record of bribes as our trump card! Jim.\" Civilian Deputy Undersecretary of the Air Force for Acquisition Darleen Druyun: \"I read with disgust the article on Airbus tankers from the new EADS CEO of North America. What BS . . . should not have been surprised at the slime . . . his day of reckoning will come hopefully.\" Secretary of the Air Force James Roche: \"Oy. I agree. I had hoped you would have stayed and tortured him slowly over the next few years until EADS got rid of him! Jim.\" Boeing had previously hired Civilian Deputy Undersecretary of the Air Force for Acquisition Darleen Druyun . This caused a controversy over conflict of interest and led to felony charges against Boeing Chief Financial Officer Michael Sears for illegally hiring her. Former military personnel are often hired by defense contractors to lobby for contracts. Days after Sen. McCain's remarks, the Air Force said the tanker replacement contract would be revived as an open bid . Deputy Defense Secretary Wolfowitz published an open-article in the Congressional Record, saying: \"After we have selected an appropriate alternative, we intend to require competition.\"", "after_revision": "Aging KC135 tankers, shown here refueling an F16, were to be replaced by Boeing's 767 tanker. Emails exchanged among officials regarding a USD$23 billion dollar deal with aircraft manufacturer have been entered into the public record. (-AZ ) entered them into the during a speech last week against the now-cancelled deal to lease 100 aircraft from Boeing. Congressional lawmakers rejected the proposal in October, although industry experts say the deal had been killed by the because of reports stating that the deal had favored Boeing. Senator McCain has been the deal's most vocal critic. The original negotiations with Boeing were over a . Such contracts are often justified by the speed they offer, eliminating a preliminary bid and selection round that may last months. However, no-bid contracts are only open to the company selected by the procuring agency. This leaves no-bid contracts open to accusations of among the procurement personnel. Such accusations have previously been leveled against Vice President for a no-bid contract to , and are now being made against senior Air Force officials for choosing Boeing to replace its tanker fleet. In the released emails, Air Force officials responsible for the awarding of contracts appear biased against Boeing's main competitor, and its . is owned by European Aeronautic Defense & Space Company (EADS). Airbus manufacturers a number of passenger and military aircraft and has gained market share in passenger aircraft over Boeing in recent years. The following is a sequential email exchange regarding Airbus as recorded in the Congressional Record: Special Asst. to the Secretary and Director of Air Force Communications Bill Bodie: \"We don't have to turn the other cheek, you know. I'm ready to tell the truth about Airbus's boom, footprint, and financial shortcoming. But maybe we should sleep on it.\" Secretary of the Air Force James Roche: \"No, Sir, save it and blow him away. He admits that they were not technically qualified! And, we keep their record of bribes as our trump card! Jim.\" Civilian Deputy Undersecretary of the Air Force for Acquisition Darleen Druyun: \"I read with disgust the article on Airbus tankers from the new EADS CEO of North America. What BS . . . should not have been surprised at the slime . . . his day of reckoning will come hopefully.\" Secretary of the Air Force James Roche: \"Oy. I agree. I had hoped you would have stayed and tortured him slowly over the next few years until EADS got rid of him! Jim.\" Boeing had previously hired Civilian Deputy Undersecretary of the Air Force for Acquisition . This caused a controversy over conflict of interest and led to felony charges against Boeing Chief Financial Officer Michael Sears for illegally hiring her. Former military personnel are often hired by defense contractors to lobby for contracts. Days after Sen. McCain's remarks, the Air Force said the tanker replacement contract would be revived as an . Deputy Defense Secretary published an open-article in the Congressional Record, saying: \"After we have selected an appropriate alternative, we intend to require competition.\"", "edit_actions": [{"type": "D", "before": "United States Air Force", "after": null, "start_char_pos": 117, "end_char_pos": 140}, {"type": "D", "before": "Boeing", "after": null, "start_char_pos": 217, "end_char_pos": 223}, {"type": "R", "before": "Senator John McCain (R-AZ", "after": "(-AZ", "start_char_pos": 266, "end_char_pos": 291}, {"type": "D", "before": "Congressional Record", "after": null, "start_char_pos": 316, "end_char_pos": 336}, {"type": "D", "before": "mid-air tanker", "after": null, "start_char_pos": 407, "end_char_pos": 421}, {"type": "D", "before": "Pentagon", "after": null, "start_char_pos": 564, "end_char_pos": 572}, {"type": "D", "before": "no-bid contract", "after": null, "start_char_pos": 738, "end_char_pos": 753}, {"type": "D", "before": "conflicts of interest", "after": null, "start_char_pos": 1029, "end_char_pos": 1050}, {"type": "D", "before": "Dick Cheney", "after": null, "start_char_pos": 1153, "end_char_pos": 1164}, {"type": "D", "before": "Halliburton", "after": null, "start_char_pos": 1190, "end_char_pos": 1201}, {"type": "R", "before": "Airbus and its CEO Ralph Crosby", "after": "and its", "start_char_pos": 1445, "end_char_pos": 1476}, {"type": "D", "before": "Airbus", "after": null, "start_char_pos": 1479, "end_char_pos": 1485}, {"type": "D", "before": "Darleen Druyun", "after": null, "start_char_pos": 2781, "end_char_pos": 2795}, {"type": "D", "before": "open bid", "after": null, "start_char_pos": 3152, "end_char_pos": 3160}, {"type": "D", "before": "Wolfowitz", "after": null, "start_char_pos": 3188, "end_char_pos": 3197}], "sents_char_pos": [0, 93, 265, 443, 633, 687, 755, 887, 976, 1083, 1310, 1478, 1549, 1693, 1930, 2017, 2051, 2128, 2180, 2241, 2412, 2519, 2573, 2688, 2797, 2954, 3043, 3059]}
+{"doc_id": "118238", "revision_depth": "1", "before_revision": "Map of Cagayan showing the location of Ballesteros , site of the Philippine maritime disaster. At least 28 people drowned and were confirmed dead, 46 were rescued, while 34 others remain missing on Sunday, after an overcrowded passenger motorboat capsized off waters in Ballesteros , a town of 17,000 people, the Cagayan police reported. 'M/B Mae Jan', a wooden-hulled ferry , was carrying 102 passengers, after an eight-hour voyage from Calayan Island in the Luzon Strait for Appari when it capsized less than 300 meters (984 feet) from its destination, at 8:30 p.m. Its bamboo outrigger broke due to strong waves, as it reached the mouth of the Cagayan River ('Bannag' Rio Grande de Cagayan, 'Ilog ng Kagayan'), along Barangay Linao, about 50 meters from the shoreline of Pallog village. Divers from the combined teams of the Philippine Navy and Coast Guard helped in the rescue operations. 11 of the fatalities, including the vessel owner, Arellano, and her daughter were identified. The police said \"there was a possibility that the boat was overloaded,\" saying that \"there was also livestock on board.\" Due to \"trauma,\" the ferry's captain refused to talk to police. The Pinacanauan River, seen just below the Callao Caves , is one of the major tributaries of the Cagayan River. Meanwhile, the Philippine Coast Guard (PCG) formed a Special Board of Marine Inquiry (SBMI) to investigate the sea tragedy. It ordered the \"immediate dispatch of SAR-003 and MCS-3005 vessels and the PCG Islander for aerial surveillance.\" PCG noted the possible overloading of the vessel since the boat's franchise authorized it to carry only 40 passengers and 10 crew members. In November, a vessel sank in rough seas north of Cagayan, and passing vessels rescued 16 of 20 passengers. Weeks earlier, separate storms sank two passenger vessels in the central Philippines , drowning more than 50 people. Prior to the ferry sinking, the Philippine weather bureau had issued Gale warnings to coastal towns , of approaching tropical storm \"Ulysses\" (international codename: Dolphin) from the Pacific with winds of up to 60 miles (95 kilometers) per hour, centered off southeastern Catanduanes , eastern Philippines.", "after_revision": "Map of showing the location of , site of the Philippine maritime disaster. At least 28 people drowned and were confirmed dead, 46 were rescued, while 34 others remain missing on Sunday, after an overcrowded passenger capsized off waters in , a town of 17,000 people, the police reported. 'M/B Mae Jan', a wooden-hulled , was carrying 102 passengers, after an eight-hour voyage from in the for when it capsized less than 300 meters (984 feet) from its destination, at 8:30 p.m. Its broke due to strong waves, as it reached the mouth of the ('Bannag' Rio Grande de Cagayan, 'Ilog ng Kagayan'), along Linao, about 50 meters from the shoreline of Pallog village. Divers from the combined teams of the and helped in the rescue operations. 11 of the fatalities, including the vessel owner, Arellano, and her daughter were identified. The police said \"there was a possibility that the boat was overloaded,\" saying that \"there was also livestock on board.\" Due to \"trauma,\" the ferry's captain refused to talk to police. The Pinacanauan River, seen just below the , is one of the major tributaries of the Cagayan River. Meanwhile, the (PCG) formed a Special Board of Marine Inquiry (SBMI) to investigate the sea tragedy. It ordered the \"immediate dispatch of SAR-003 and MCS-3005 vessels and the PCG Islander for aerial surveillance.\" PCG noted the possible overloading of the vessel since the boat's franchise authorized it to carry only 40 passengers and 10 crew members. In November, a sank in rough seas north of Cagayan, and passing vessels rescued 16 of 20 passengers. Weeks earlier, separate storms sank two passenger vessels in the , drowning more than 50 people. Prior to the ferry sinking, the had issued to , of approaching tropical storm \"Ulysses\" (international codename: Dolphin) from the Pacific with winds of up to 60 miles (95 kilometers) per hour, centered off southeastern , eastern Philippines.", "edit_actions": [{"type": "D", "before": "Cagayan", "after": null, "start_char_pos": 7, "end_char_pos": 14}, {"type": "D", "before": "Ballesteros", "after": null, "start_char_pos": 39, "end_char_pos": 50}, {"type": "D", "before": "motorboat", "after": null, "start_char_pos": 237, "end_char_pos": 246}, {"type": "D", "before": "Ballesteros", "after": null, "start_char_pos": 270, "end_char_pos": 281}, {"type": "D", "before": "Cagayan", "after": null, "start_char_pos": 313, "end_char_pos": 320}, {"type": "D", "before": "ferry", "after": null, "start_char_pos": 369, "end_char_pos": 374}, {"type": "R", "before": "Calayan Island in the Luzon Strait for Appari", "after": "in the for", "start_char_pos": 438, "end_char_pos": 483}, {"type": "D", "before": "bamboo outrigger", "after": null, "start_char_pos": 572, "end_char_pos": 588}, {"type": "D", "before": "Cagayan River", "after": null, "start_char_pos": 647, "end_char_pos": 660}, {"type": "D", "before": "Barangay", "after": null, "start_char_pos": 720, "end_char_pos": 728}, {"type": "R", "before": "Philippine Navy and Coast Guard", "after": "and", "start_char_pos": 828, "end_char_pos": 859}, {"type": "D", "before": "Callao Caves", "after": null, "start_char_pos": 1215, "end_char_pos": 1227}, {"type": "D", "before": "Philippine Coast Guard", "after": null, "start_char_pos": 1299, "end_char_pos": 1321}, {"type": "D", "before": "vessel", "after": null, "start_char_pos": 1676, "end_char_pos": 1682}, {"type": "D", "before": "central Philippines", "after": null, "start_char_pos": 1834, "end_char_pos": 1853}, {"type": "R", "before": "Philippine weather bureau had issued Gale warnings to coastal towns", "after": "had issued to", "start_char_pos": 1918, "end_char_pos": 1985}, {"type": "D", "before": "Catanduanes", "after": null, "start_char_pos": 2160, "end_char_pos": 2171}], "sents_char_pos": [0, 94, 567, 789, 892, 986, 1107, 1171, 1283, 1407, 1660, 1768, 1885]}
+{"doc_id": "119132", "revision_depth": "1", "before_revision": "Princess Beatrice at an equestrian event in 2005. British royal Princess Beatrice , age 20, has become the victim of thieves, who stole her prized \u00a3 17,000 black 1 Series BMW while she and her police bodyguard were shopping in Devonshire Place in Kensington \u2014 leaving the vehicle's keys in the ignition. The luxury car, which has a personalised number plate and contained some personal items, was a gift from her father, Prince Andrew , for her 17th birthday in 2005. Media reports said that Beatrice was \"extremely embarrassed\" about the theft in a street in the West 1 area, which happened Wednesday just after 9am in London. She later joined her sister, Princess Eugenie , age 18, at a nearby pub. Metropolitan Police said Westminster officers were investigating the reports. BMW 1 Series . The BMW 1 Series (code names E82 and E87,) is a small-luxury car / small family car produced by the German automaker BMW since 2004. The 1 Series is the only vehicle in its class featuring rear-wheel drive and a longitudinally-mounted engine. Princess Beatrice of York (Beatrice Elizabeth Mary; born 8 August 1988) is the elder daughter of Prince Andrew, Duke of York and Sarah, Duchess of York . Thus, she is fifth person and the first female in the line of succession to the thrones of sixteen independent states . When she was born, she was the first princess born into the immediate royal family since Princess Anne in 1950. This is not the first time the Princess suffered a loss. In December, her Norfolk terrier Max went missing in Windsor , but reappeared three weeks later on Saturday, alive and well.", "after_revision": " at an equestrian event in 2005. British royal , age 20, has become the victim of thieves, who stole her prized 17,000 black while she and her police bodyguard were shopping in in \u2014 leaving the vehicle's keys in the ignition. The luxury car, which has a personalised number plate and contained some personal items, was a gift from her father, , for her 17th birthday in 2005. Media reports said that Beatrice was \"extremely embarrassed\" about the theft in a street in the area, which happened Wednesday just after 9am in London. She later joined her sister, , age 18, at a nearby pub. Metropolitan Police said Westminster officers were investigating the reports. . The BMW 1 Series (code names E82 and E87,) is a small-luxury car / small family car produced by the German automaker since 2004. The 1 Series is the only vehicle in its class featuring rear-wheel drive and a engine. (Beatrice Elizabeth Mary; born 8 August 1988) is the elder daughter of and . Thus, she is fifth person and the first female in the to the thrones of . When she was born, she was the first princess born into the immediate royal family since in 1950. This is not the first time the Princess suffered a loss. In December, her Max went missing in , but reappeared three weeks later on Saturday, alive and well.", "edit_actions": [{"type": "D", "before": "Princess Beatrice", "after": null, "start_char_pos": 0, "end_char_pos": 17}, {"type": "D", "before": "Princess Beatrice", "after": null, "start_char_pos": 64, "end_char_pos": 81}, {"type": "D", "before": "\u00a3", "after": null, "start_char_pos": 147, "end_char_pos": 148}, {"type": "D", "before": "1 Series BMW", "after": null, "start_char_pos": 162, "end_char_pos": 174}, {"type": "R", "before": "Devonshire Place in Kensington", "after": "in", "start_char_pos": 227, "end_char_pos": 257}, {"type": "D", "before": "Prince Andrew", "after": null, "start_char_pos": 421, "end_char_pos": 434}, {"type": "D", "before": "West 1", "after": null, "start_char_pos": 564, "end_char_pos": 570}, {"type": "D", "before": "Princess Eugenie", "after": null, "start_char_pos": 657, "end_char_pos": 673}, {"type": "D", "before": "BMW 1 Series", "after": null, "start_char_pos": 779, "end_char_pos": 791}, {"type": "D", "before": "BMW", "after": null, "start_char_pos": 911, "end_char_pos": 914}, {"type": "D", "before": "longitudinally-mounted", "after": null, "start_char_pos": 1006, "end_char_pos": 1028}, {"type": "D", "before": "Princess Beatrice of York", "after": null, "start_char_pos": 1037, "end_char_pos": 1062}, {"type": "R", "before": "Prince Andrew, Duke of York and Sarah, Duchess of York", "after": "and", "start_char_pos": 1134, "end_char_pos": 1188}, {"type": "D", "before": "line of succession", "after": null, "start_char_pos": 1245, "end_char_pos": 1263}, {"type": "D", "before": "sixteen independent states", "after": null, "start_char_pos": 1282, "end_char_pos": 1308}, {"type": "D", "before": "Princess Anne", "after": null, "start_char_pos": 1400, "end_char_pos": 1413}, {"type": "D", "before": "Norfolk terrier", "after": null, "start_char_pos": 1497, "end_char_pos": 1512}, {"type": "D", "before": "Windsor", "after": null, "start_char_pos": 1533, "end_char_pos": 1540}], "sents_char_pos": [0, 49, 303, 467, 627, 700, 778, 793, 926, 1036, 1088, 1190, 1310, 1422, 1479]}
+{"doc_id": "119485", "revision_depth": "1", "before_revision": "The Foudre - Le TCD Foudre \u00e0 quai \u00e0 l'arsenal de Toulon (avril 2002). Officials say that a French military helicopter with 10 French soldiers, including four crew members and six Special Forces paratroopers, has crashed off the coast of Gabon in west central Africa. The Eurocopter AS 532 Cougar ditched shortly into the Atlantic Ocean after leaving a French naval ship , about 50 kilometres off the coast. Seven French soldiers were killed, two were rescued, and one is still missing, according to a statement issued by President Nicolas Sarkozy's office. According to Libreville Lieutenant Colonel Pascal Carpentier, the ill-fated helicopter crashed Saturday night at 8:08 p.m. (1908 GMT) into Atlantic waters off Nyonie, a small town located between Gabon's capital Libreville and the town of Port-Gentil . It was taking off from the amphibious assault ship La Foudre's naval landing craft transporter cruising 50 kilometers (30 miles) off the Gabonese coast, during a joint training exercise, said Lieutenant Colonel Francois-Marie Gougeon, spokesman for the general staff. A French army Eurocopter AS 532 Cougar helicopter from the landing zone at the Kabul Military Training Center in Kabul, Afghanistan, March 15, 2007. The ship \"set off the alert and arrived at the crash site with rescuers who picked up the injured crew within half an hour. The sea was calm and the wind low at the time of the crash but the night was very dark,\" Lieutenant Gougeon explained, adding that \"search operations will naturally continue all night.\" La Foudre, two helicopters and oil giant Total S.A. 's three vessels, including its sonar and underwater robot joined the rescue effort of the salvage team. \"Divers were deployed to locate the wreckage,\" said Captain Christophe Prazuck, spokesman for the army general staff. \"At daybreak we will deploy all our means, planes, helicopters, boats... to take part in the search,\" said Gabon's Interior Minister Andr\u00e9 Mba Obame . Meanwhile French President Nicolas Sarkozy directed Defence Minister Herv\u00e9 Morin to travel to the crash site. Sarkozy had \"asked that all available means in the area be immediately deployed to find the soldiers who were aboard.\" Morin later announced there would be two probes, a judicial one and another by the French defence ministry , with the assistance of French gendarmes and an air accident expert. Satellite image of Gabon, generated from raster graphics data supplied by The Map Library . Minister Morin arrived in Libreville on Sunday and met with President Omar Bongo to discuss rescue efforts for the missing body of one of the seven soldiers. \"The cause of this tragedy remains unknown. It may be natural or human, or a combination of both.\" Morin said. \"Divers were inspecting the Cougar, which was in water 35 meters (about 115 feet) deep. We will do everything we can to find the last person missing,\" he added. The January 17-21 bilateral manoeuvres called 'Operation N'Gari' involved 600 French soldiers and 120 Gabonese troops maneuvering in the military drill known as Baptise Ngeri. The soldiers were backed by Cougar and Fennec helicopters to coordinate maritime safety operations with UN peacekeepers at Bouna airport, in the Ivory Coast . In the joint exercise soldiers were to be parachuted onto predetermined targets including Nyonie. Gabon, a former French colony, hosts one of four permanent French bases in Africa. Gabon is a country in west central Africa sharing borders with the Gulf of Guinea to the west, Equatorial Guinea to the northwest, and Cameroon to the north, with the Republic of the Congo curving around the east and south. According the FFG which has around 1,000 troops in Gabon, the French Forces in Gabon (FFG)'s role is \"to assure the safety of the 12,000 French residents in the country in case of threat, and carry out aid missions.\"", "after_revision": " - \u00e0 quai \u00e0 l'arsenal de Toulon (avril 2002). Officials say that a French military helicopter with 10 French soldiers, including four crew members and six paratroopers, has crashed off the coast of Gabon in west central Africa. The Cougar ditched shortly into the after leaving a , about 50 kilometres off the coast. Seven French soldiers were killed, two were rescued, and one is still missing, according to a statement issued by President Nicolas Sarkozy's office. According to Libreville Lieutenant Colonel Pascal Carpentier, the ill-fated helicopter crashed Saturday night at 8:08 p.m. (1908 GMT) into Atlantic waters off Nyonie, a small town located between Gabon's capital and the town of . It was taking off from the 's cruising 50 kilometers (30 miles) off the Gabonese coast, during a joint training exercise, said Lieutenant Colonel Francois-Marie Gougeon, spokesman for the general staff. A French army from the landing zone at the Kabul Military Training Center in Kabul, Afghanistan, March 15, 2007. The \"set off the alert and arrived at the crash site with rescuers who picked up the injured crew within half an hour. The sea was calm and the wind low at the time of the crash but the night was very dark,\" Lieutenant Gougeon explained, adding that \"search operations will naturally continue all night.\" La Foudre, two helicopters and oil giant 's three vessels, including its and joined the rescue effort of the salvage team. \"Divers were deployed to locate the wreckage,\" said Captain Christophe Prazuck, spokesman for the army general staff. \"At daybreak we will deploy all our means, planes, helicopters, boats... to take part in the search,\" said Gabon's Interior Minister . Meanwhile Nicolas Sarkozy directed Defence Minister to travel to the crash site. Sarkozy had \"asked that all available means in the area be immediately deployed to find the soldiers who were aboard.\" Morin later announced there would be two probes, a judicial one and another by the , with the assistance of French gendarmes and an air accident expert. Satellite image of Gabon, generated from data supplied by . Minister Morin arrived in on Sunday and met with President to discuss rescue efforts for the missing body of one of the seven soldiers. \"The cause of this tragedy remains unknown. It may be natural or human, or a combination of both.\" Morin said. \"Divers were inspecting the Cougar, which was in water 35 meters (about 115 feet) deep. We will do everything we can to find the last person missing,\" he added. The January 17-21 bilateral manoeuvres called 'Operation N'Gari' involved 600 French soldiers and 120 Gabonese troops maneuvering in the military drill known as Baptise Ngeri. The soldiers were backed by Cougar and to coordinate maritime safety operations with UN peacekeepers at airport, in the . In the joint exercise soldiers were to be parachuted onto predetermined targets including Nyonie. Gabon, a former French colony, hosts one of four permanent French bases in Africa. Gabon is a country in west central Africa sharing borders with the to the west, Equatorial Guinea to the northwest, and Cameroon to the north, with the Republic of the Congo curving around the east and south. According the FFG which has around 1,000 troops in Gabon, the in Gabon (FFG)'s role is \"to assure the safety of the 12,000 French residents in the country in case of threat, and carry out aid missions.\"", "edit_actions": [{"type": "D", "before": "The Foudre", "after": null, "start_char_pos": 0, "end_char_pos": 10}, {"type": "D", "before": "Le TCD Foudre", "after": null, "start_char_pos": 13, "end_char_pos": 26}, {"type": "D", "before": "Special Forces", "after": null, "start_char_pos": 179, "end_char_pos": 193}, {"type": "D", "before": "Eurocopter AS 532", "after": null, "start_char_pos": 271, "end_char_pos": 288}, {"type": "D", "before": "Atlantic Ocean", "after": null, "start_char_pos": 321, "end_char_pos": 335}, {"type": "D", "before": "French naval ship", "after": null, "start_char_pos": 352, "end_char_pos": 369}, {"type": "D", "before": "Libreville", "after": null, "start_char_pos": 769, "end_char_pos": 779}, {"type": "D", "before": "Port-Gentil", "after": null, "start_char_pos": 796, "end_char_pos": 807}, {"type": "R", "before": "amphibious assault ship La Foudre's naval landing craft transporter", "after": "'s", "start_char_pos": 837, "end_char_pos": 904}, {"type": "D", "before": "Eurocopter AS 532 Cougar helicopter", "after": null, "start_char_pos": 1092, "end_char_pos": 1127}, {"type": "D", "before": "ship", "after": null, "start_char_pos": 1231, "end_char_pos": 1235}, {"type": "D", "before": "Total S.A.", "after": null, "start_char_pos": 1578, "end_char_pos": 1588}, {"type": "R", "before": "sonar and underwater robot", "after": "and", "start_char_pos": 1621, "end_char_pos": 1647}, {"type": "D", "before": "Andr\u00e9 Mba Obame", "after": null, "start_char_pos": 1945, "end_char_pos": 1960}, {"type": "D", "before": "French President", "after": null, "start_char_pos": 1973, "end_char_pos": 1989}, {"type": "D", "before": "Herv\u00e9 Morin", "after": null, "start_char_pos": 2032, "end_char_pos": 2043}, {"type": "D", "before": "French defence ministry", "after": null, "start_char_pos": 2275, "end_char_pos": 2298}, {"type": "D", "before": "raster graphics", "after": null, "start_char_pos": 2410, "end_char_pos": 2425}, {"type": "D", "before": "The Map Library", "after": null, "start_char_pos": 2443, "end_char_pos": 2458}, {"type": "D", "before": "Libreville", "after": null, "start_char_pos": 2487, "end_char_pos": 2497}, {"type": "D", "before": "Omar Bongo", "after": null, "start_char_pos": 2531, "end_char_pos": 2541}, {"type": "D", "before": "Fennec helicopters", "after": null, "start_char_pos": 3106, "end_char_pos": 3124}, {"type": "D", "before": "Bouna", "after": null, "start_char_pos": 3190, "end_char_pos": 3195}, {"type": "D", "before": "Ivory Coast", "after": null, "start_char_pos": 3212, "end_char_pos": 3223}, {"type": "D", "before": "Gulf of Guinea", "after": null, "start_char_pos": 3474, "end_char_pos": 3488}, {"type": "D", "before": "French Forces", "after": null, "start_char_pos": 3693, "end_char_pos": 3706}], "sents_char_pos": [0, 69, 266, 406, 556, 809, 1077, 1226, 1350, 1536, 1693, 1811, 2072, 2191, 2368, 2460, 2618, 2662, 2717, 2729, 2817, 2890, 3066, 3225, 3323, 3406, 3630]}
+{"doc_id": "119533", "revision_depth": "1", "before_revision": "__NOTOC__ Today, the official ceremony ushering in Barack H. Obama II as the new president of the United States took place at the United States Capitol in Washington, D.C.. A 21-gun salute , as well as the playing of four ruffles and flourishes and \" Hail to the Chief \", marked the moment he assumed power from his predecessor, George W. Bush. President Barack Obama being sworn in at the inauguration Bush's second term as President of the United States , which began on January 20, 2005, expired with the swearing-in of the 44th President of the United States , Barack Obama, at noon EST (UTC-5 ), under the provisions of the Twentieth Amendment to the United States Constitution . Pope Benedict XVI on Tuesday called on Obama to seek \"understanding, co-operation and peace\" among nations. \"I offer cordial good wishes, together with the assurance of my prayers that Almighty God will grant you unfailing wisdom and strength in the exercise of your high responsibilities,\" the Pontiff said. The National Mall gates at the inaugural ceremony opened early, with official introductions beginning around 11:30am EST. On the west front lawn of the U.S. Capitol, Senator Dianne Feinstein provided the call to order and welcoming remarks, shortly after followed by invocation by the Rev. Rick Warren and a musical performance by Aretha Franklin. Vice President-elect Joseph R. Biden, Jr., a Democrat , who was elected Vice President in the 2008 presidential election , took his oath of office, succeeding Dick Cheney . Biden took his oath at 11:57am EST from Associate Justice John Paul Stevens . U.S. service members prepare for the 56th United States presidential inauguration rehearsal in the west steps of the United States Capitol Washington, D.C., Jan. 11, 2009. Supreme Court Chief Justice John Glover Roberts, Jr. then administered the oath of office to Obama, under Article II, Section 1, Clause 8. \"I do solemnly swear (or affirm) that I will faithfully execute the office of President of the United States, and will to the best of my ability, preserve, protect, and defend the Constitution of the United States. So help me God,\" Obama swore, using the 1861 President Lincoln Inaugural Bible. First Lady Michelle LaVaughn Robinson Obama and daughters Malia Ann and Sasha, Senate Majority Leader Harry Reid, and Speaker of the House Nancy Pelosi were among the record-setting crowd of over 2 million people, including more than a million people that filled the National Mall. Vice President Dick Cheney arrived in a wheelchair, having pulled a muscle in his back while moving, White House spokeswoman Dana Perino said. Obama has decided to follow tradition and use his full name, including his middle name Hussein , regardless of its past and present use by detractors as an effort to slander his image. The advanced scheduled program stated that the inaugural address was to be delivered by \"the President of the United States, The Honorable Barack H. Obama.\" Obama focused on the restoration of public confidence and personal \"responsibility,\" reassuring recession-weary Americans they can rebound from hard times. He conveyed to the world his desire to fix a battered U.S. image overseas. He asked the nation to reject the \"culture of anything goes\" and to restore a national value system that honors responsibility and accountability. Elizabeth Alexander recited a poem, followed by the benediction by Rev. Joseph E. Lowery. The National Anthem was thereafter played by The United States Navy Band \" Sea Chanters .\" Over 200 million viewers worldwide had watched inauguration videos and live streams provided online by a number of news organizations and online video broadcasting companies over the internet. The event was also available live to select iPhone users. At 2:35pm EST in the Capitol's Statuary Hall , at the inaugural luncheon attended by Obama, it is reported that Ted Kennedy had a stroke. Paramedics arrived and took the senator to a hospital. A parade extended for over two hours in the afternoon. It included 15,000 people, 240 horses, dozens of marching bands, two drum and bugle corps, and one mariachi band from Espanola, New Mexico . Just after 4pm EST, Obama and his wife joined the celebrating crowds on Pennsylvania Avenue. After a short time waving to the masses, they returned to the Presidential Limousine, a 2009 Cadillac, which transported them to the White House . The First Limo has replaced President Bush \u2019s Cadillac DTS Presidential Limousine that rolled out in 2004. Mr and Mrs Obama plan to attend a total of ten official inaugural balls, including the Neighbourhood Ball, the Obama Home States (Illinois and Hawaii) Ball, the Biden Home States (Pennsylvania and Delaware) Ball and the Youth Ball. American R&B singer-songwriter Beyonc\u00e9 has been planned to perform the first dance song. The Obamas will return to the White House, their new home, following the last ball.", "after_revision": "__NOTOC__ Today, the ushering in Barack H. Obama II as the new president of the United States took place at the in Washington, D.C.. A , as well as the playing of four and \" \", marked the moment he assumed power from his predecessor, George W. Bush. President Barack Obama being sworn in at the inauguration Bush's second term as , which began on January 20, 2005, expired with the of the , Barack Obama, at noon ( ), under the provisions of the . on Tuesday called on Obama to seek \"understanding, co-operation and peace\" among nations. \"I offer cordial good wishes, together with the assurance of my prayers that Almighty God will grant you unfailing wisdom and strength in the exercise of your high responsibilities,\" the Pontiff said. The gates at the inaugural ceremony opened early, with official introductions beginning around 11:30am EST. On the west front lawn of the U.S. Capitol, Senator provided the call to order and welcoming remarks, shortly after followed by invocation by the Rev. and a musical performance by Aretha Franklin. Vice President-elect Joseph R. Biden, Jr., a , who was elected Vice President in the , took his oath of office, succeeding . Biden took his oath at 11:57am EST from . U.S. service members prepare for the 56th rehearsal in the west steps of the Washington, D.C., Jan. 11, 2009. then administered the to Obama, under . \"I do solemnly swear (or affirm) that I will faithfully execute the office of President of the United States, and will to the best of my ability, preserve, protect, and defend the Constitution of the United States. So help me God,\" Obama swore, using the 1861 President Lincoln Inaugural Bible. and daughters , , and Nancy Pelosi were among the record-setting crowd of over 2 million people, including more than a million people that filled the National Mall. Vice President Dick Cheney arrived in a wheelchair, having pulled a muscle in his back while moving, White House spokeswoman said. Obama has decided to follow tradition and use his full name, including his middle name , regardless of its past and present use by detractors as an effort to slander his image. The advanced scheduled program stated that the inaugural address was to be delivered by \"the President of the United States, The Honorable Barack H. Obama.\" Obama focused on the restoration of public confidence and personal \"responsibility,\" reassuring recession-weary Americans they can rebound from hard times. He conveyed to the world his desire to fix a battered U.S. image overseas. He asked the nation to reject the \"culture of anything goes\" and to restore a national value system that honors responsibility and accountability. recited a poem, followed by the benediction by Rev. . The National Anthem was thereafter played by The United States Navy Band \" .\" Over 200 million viewers worldwide had watched inauguration videos and live streams provided online by a number of news organizations and online video broadcasting companies over the internet. The event was also available live to select users. At 2:35pm EST in the Capitol's , at the inaugural luncheon attended by Obama, it is reported that had a stroke. Paramedics arrived and took the senator to a hospital. A parade extended for over two hours in the afternoon. It included 15,000 people, 240 horses, dozens of marching bands, two drum and bugle corps, and one mariachi band from , . Just after 4pm EST, Obama and his wife joined the celebrating crowds on Pennsylvania Avenue. After a short time waving to the masses, they returned to the Presidential Limousine, a 2009 Cadillac, which transported them to the . The First Limo has replaced President Bush 's Presidential Limousine that rolled out in 2004. Mr and Mrs Obama plan to attend a total of ten official inaugural balls, including the Neighbourhood Ball, the Obama Home States (Illinois and Hawaii) Ball, the Biden Home States (Pennsylvania and Delaware) Ball and the Youth Ball. American R&B singer-songwriter has been planned to perform the first dance song. The Obamas will return to the White House, their new home, following the last ball.", "edit_actions": [{"type": "D", "before": "official ceremony", "after": null, "start_char_pos": 21, "end_char_pos": 38}, {"type": "D", "before": "United States Capitol", "after": null, "start_char_pos": 130, "end_char_pos": 151}, {"type": "D", "before": "21-gun salute", "after": null, "start_char_pos": 175, "end_char_pos": 188}, {"type": "R", "before": "ruffles and flourishes and", "after": "and", "start_char_pos": 222, "end_char_pos": 248}, {"type": "D", "before": "Hail to the Chief", "after": null, "start_char_pos": 251, "end_char_pos": 268}, {"type": "D", "before": "President of the United States", "after": null, "start_char_pos": 425, "end_char_pos": 455}, {"type": "R", "before": "swearing-in of the 44th President of the United States", "after": "of the", "start_char_pos": 508, "end_char_pos": 562}, {"type": "R", "before": "EST (UTC-5", "after": "(", "start_char_pos": 587, "end_char_pos": 597}, {"type": "D", "before": "Twentieth Amendment to the United States Constitution", "after": null, "start_char_pos": 629, "end_char_pos": 682}, {"type": "D", "before": "Pope Benedict XVI", "after": null, "start_char_pos": 685, "end_char_pos": 702}, {"type": "D", "before": "National Mall", "after": null, "start_char_pos": 998, "end_char_pos": 1011}, {"type": "D", "before": "Dianne Feinstein", "after": null, "start_char_pos": 1168, "end_char_pos": 1184}, {"type": "D", "before": "Rick Warren", "after": null, "start_char_pos": 1284, "end_char_pos": 1295}, {"type": "D", "before": "Democrat", "after": null, "start_char_pos": 1387, "end_char_pos": 1395}, {"type": "D", "before": "2008 presidential election", "after": null, "start_char_pos": 1436, "end_char_pos": 1462}, {"type": "D", "before": "Dick Cheney", "after": null, "start_char_pos": 1501, "end_char_pos": 1512}, {"type": "D", "before": "Associate Justice John Paul Stevens", "after": null, "start_char_pos": 1555, "end_char_pos": 1590}, {"type": "D", "before": "United States presidential inauguration", "after": null, "start_char_pos": 1635, "end_char_pos": 1674}, {"type": "D", "before": "United States Capitol", "after": null, "start_char_pos": 1710, "end_char_pos": 1731}, {"type": "D", "before": "Supreme Court Chief Justice John Glover Roberts, Jr.", "after": null, "start_char_pos": 1765, "end_char_pos": 1817}, {"type": "D", "before": "oath of office", "after": null, "start_char_pos": 1840, "end_char_pos": 1854}, {"type": "R", "before": "Article II, Section 1, Clause 8.", "after": ".", "start_char_pos": 1871, "end_char_pos": 1903}, {"type": "R", "before": "First Lady Michelle LaVaughn Robinson Obama and daughters Malia Ann and Sasha, Senate Majority Leader Harry Reid, and Speaker of the House", "after": "and daughters , , and", "start_char_pos": 2199, "end_char_pos": 2337}, {"type": "D", "before": "Dana Perino", "after": null, "start_char_pos": 2606, "end_char_pos": 2617}, {"type": "D", "before": "Hussein", "after": null, "start_char_pos": 2711, "end_char_pos": 2718}, {"type": "D", "before": "Elizabeth Alexander", "after": null, "start_char_pos": 3344, "end_char_pos": 3363}, {"type": "R", "before": "Joseph E. Lowery.", "after": ".", "start_char_pos": 3416, "end_char_pos": 3433}, {"type": "D", "before": "Sea Chanters", "after": null, "start_char_pos": 3509, "end_char_pos": 3521}, {"type": "D", "before": "iPhone", "after": null, "start_char_pos": 3762, "end_char_pos": 3768}, {"type": "D", "before": "Statuary Hall", "after": null, "start_char_pos": 3807, "end_char_pos": 3820}, {"type": "D", "before": "Ted Kennedy", "after": null, "start_char_pos": 3888, "end_char_pos": 3899}, {"type": "R", "before": "Espanola, New Mexico", "after": ",", "start_char_pos": 4142, "end_char_pos": 4162}, {"type": "D", "before": "White House", "after": null, "start_char_pos": 4391, "end_char_pos": 4402}, {"type": "R", "before": "\u2019s Cadillac DTS", "after": "'s", "start_char_pos": 4448, "end_char_pos": 4463}, {"type": "D", "before": "Beyonc\u00e9", "after": null, "start_char_pos": 4775, "end_char_pos": 4782}], "sents_char_pos": [0, 172, 344, 792, 993, 1115, 1341, 1514, 1764, 2118, 2198, 2480, 2623, 2808, 2965, 3121, 3196, 3343, 3433, 3717, 3775, 3913, 3968, 4023, 4257, 4404, 4511, 4743, 4832]}
+{"doc_id": "121157", "revision_depth": "1", "before_revision": "Buttonquail distribution map According to ornithologists , a rare Philippines buttonquail feared to have gone extinct was recently documented alive by a cameraman inadvertently filming a local market, right before it was sold and headed for the cooking pot. Scientists had suspected the species\u2014listed as \"data deficient\" on the 2008 International Union for Conservation of Nature's Red List Category \u2014was extinct. Last month, native bird trappers snared and successfully caught the Luzon Buttonquail (Turnix worcesteri or Worcester's buttonquail) in Dalton Pass, a cold and wind-swept bird passageway in the Caraballo Mountains, in Nueva Vizcaya , located between Cordillera Central and Sierra Madre mountain ranges, in Northern Luzon . British birder and WBCP member , Desmond Allen , was watching a January 26 DVD-video of a documentary, Bye-Bye Birdie, when he recognized the bird in a still image of the credits that lasted less than a second. Allen created a screenshot , which was photographed by their birder-companion, Arnel Telesforo, also a WBCP member, in Nueva Vizcaya's poultry market, before it was cooked and eaten. i-Witness: The GMA Documentaries , a Philippine documentary news and public affairs television show aired by GMA Network , had incorporated Telesforo's photographs and video footage of the live bird in the documentary, that was created by the TV crew led by Mr Howie Severino. The Philippine Network had not realized what they filmed until Allen had informed the crew of interesting discovery. Mr Severino and the crew were at that time, in Dalton Pass to film \"akik\", the traditional practice of trapping wild birds with nets by first attracting them with bright lights on moonless nights. \"I'm shocked. I don't know of any other photos of this. No bird watchers have ever given convincing reports that they have seen it at all... This is an exciting discovery,\" said Allen. In 2007, a specimen of the Luzon Buttonquail from the Mountain Province was photographed by the American Field Museum of Natural History in Chicago. The Luzon Buttonquail was only known through an illustration in the authoritative book by Robert S. Kennedy, et al, A Guide to the Birds of the Philippines. This birders \"bible\" includes a drawing based on the skins of dead specimens collected a century ago, whereas the otherwise comprehensive image bank of the Oriental Bird Club does not contain a single image of the Worcester's Buttonquail. \u201cWith the photograph and the promise of more sightings in the wild, we can see the living bill, the eye color, the feathers, rather than just the mushed-up museum skin,\u201d exclaimed Allen, who has been birdwatching for fifty years, fifteen in the Philippines, and has an extensive collection of bird calls on his ipod. He has also spotted the Oriental (or Manchurian) Bush Warbler , another rare bird which he has not seen in the Philippines. \u201cWe are ecstatic that this rarely seen species was photographed by accident. It may be the only photo of this poorly known bird. But I also feel sad that the locals do not value the biodiversity around them and that this bird was sold for only P10 and headed for the cooking pot,\u201d Wild Bird Club of the Philippines (WBCP) president Mike Lu said. \u201cMuch more has to be done in creating conservation awareness and local consciousness about our unique threatened bird fauna. This should be an easy task for the local governments assisted by the DENR . What if this was the last of its species?\u201d Lu added. According to the WBCP, the Worcester\u2019s buttonquail was first described based on specimens bought in Quinta Market in Quiapo, Manila in 1902, and was named after Dean Conant Worcester. Since then just a few single specimens have been photographed and filmed from Nueva Vizcaya and Benguet , and lately, in 2007, from Mountain Province by the Field Museum of Natural History in Chicago, Illinois. Dean Conant Worcester Dean Conant Worcester , D.Sc., F.R.G.S. was an American zoologist , public official, and authority on the Philippines, born at Thetford , Vermont, and educated at the University of Michigan (A.B., 1889). From 1899 to 1901 he was a member of the United States Philippine Commission ; thenceforth until 1913 he served as secretary of the interior for the Philippine Insular Government . In 1910, he founded the Philippine General Hospital , which has become the hospital for the poor and the sick. In October, 2004, at the request of Mr Moises Butic, Lamut CENR Officer, Mr Jon Hornbuckle, of Grove Road, Sheffield , has conducted a short investigation into bird-trapping in Ifugao, Mountain Province, Banaue Mount Polis, Sagada and Dalton Pass, in Nueva Vizcaya. \"Prices ranged from 100 pesos for a Fruit-Dove to 300 pesos for a Metallic Pigeon . Other species that are caught from time to time include Flame-breasted Fruit-Dove and Luzon Bleeding-heart ; on one occasion, around 50 of the latter were trapped! All other trapped birds are eaten,\" said Hornbuckle. \"The main trapping season is November to February. Birds are caught at the lights using butterfly-catching type nets. Quails and Buttonquails were more often shot in the fields at this time, rather than caught, and occasionally included the rare Luzon (Worcester\u2019s) Buttonquail, which is only known from dead specimens, and is a threatened bird species reported from Dalton Pass,\" he added. In August, 1929, Richard C. McGregor and Leon L. Gardner of the Cooper Ornithological Society compiled a book entitled Philippine Bird Traps. The authors described the Luzon Buttonquail as \"very rare,\" having only encountered it twice, once in August and once in September. \"They are caught with a scoop net from the back of a carabao . Filipino hunters snared them, baiting with branches of artificial red peppers made of sealing wax ,\" wrote McGregor and Leon L. Gardner. \"The various ingenious and effectual devices used by Filipinos for bird-trapping include [the] 'Teepee Trap' which consists of a conical tepee, woven of split bamboo and rattan about 3 feet high and 3 feet across at the base, with a fairly narrow entrance. 'Spring Snares ' were also used, where a slip noose fastened to a strongly bent bamboo or other elastic branch, which is released by a trigger, which is usually the perch of the trap,\" their book explained. A passage from the bird-trap book, which explains why Filipinos had eaten these endangered bird species, goes as follows: A global review of threatened species by the International Union for Conservation of Nature (IUCN) indicates drastic decline of animal and plant life. This includes a quarter of all mammals , one out of eight birds, one out of three amphibians and 70 percent of plants. The report, Red List of Threatened Species , is published by IUCN every year. Additionally, a global assessment of the health of the world's species is released once in four years. The data is compiled by 1,700 experts from 130 countries. The key findings of the report were announced at the World Conservation Congress held in Barcelona, Spain. The survey includes 44,838 species of wild fauna and flora , out of which 16,928 species are threatened with extinction. Among the threatened, 3,246 are tagged critically endangered, the highest category of threat. Another 4,770 species are endangered and 8,912 vulnerable to extinction. Map of the Philippines showing the location of Nueva Vizcaya. The Luzon Buttonquail (Turnix worcesteri) is a species of bird in the Turnicidae family. It is endemic to the island of Luzon in the Philippines, where it is known from just six localities thereof. Its natural habitat is subtropical or tropical high-altitude grassland, in the highlands of the Cordillera Central , although records are from 150-1,250 m, and the possibility that it frequents forested (non-grassland) habitats cannot be discounted. The buttonquails or hemipodes are a small family of birds which resemble, but are unrelated to, the true quails . They inhabit warm grasslands in Asia, Africa, and Australia. They are assumed to be intra-island migrants , and breed somewhere in northern Luzon in April-June and that at least some birds disperse southwards in the period July-March. Bird Trap by Bruegel d. \u00c4., Pieter These Turnicidae are small, drab, running birds, which avoid flying. The female is the more brightly coloured of the sexes, and initiates courtship. Unusually, the buttonquails are polyandrous , with the females circulating among several males and expelling rival females from her territory. Both sexes cooperate in building a nest in the earth, but only the male incubates the eggs and tends the young. Called \"Pugo\" ( quail ) by natives, these birds inhabit rice paddies and scrub lands near farm areas because of the abundance of seeds and insects that they feed on regularly. These birds are characterized by their black heads with white spots, a brown or fawn colored body and yellow legs on males and the females are brown with white and black spots. Buttonquails are a notoriously cryptic and unobtrusive family of birds, and the species could conceivably occur in reasonable numbers somewhere. They are included in the 2008 IUCN Red List Category (as evaluated by BirdLife International IUCN Red List of Threatened Species ). They are also considered as Vulnerable species by IUCN and BirdLife International, since these species is judged to have a ten percent chance of going extinct in the next one hundred years.", "after_revision": " distribution map According to , a rare Philippines feared to have gone extinct was recently documented alive by a cameraman inadvertently filming a local market, right before it was sold and headed for the cooking pot. Scientists had suspected the species\u2014listed as \"data deficient\" on the \u2014was extinct. Last month, snared and successfully caught the (Turnix worcesteri or Worcester's buttonquail) in Dalton Pass, a cold and wind-swept bird passageway in the , in , located between and mountain ranges, in Northern . British and WBCP member Desmond Allen was watching a January 26 of a documentary, Bye-Bye Birdie, when he recognized the bird in a of the that lasted less than a second. Allen created a , which was photographed by their birder-companion, Arnel Telesforo, also a WBCP member, in Nueva Vizcaya's poultry market, before it was cooked and eaten. , a Philippine news and public affairs television show aired by , had incorporated Telesforo's photographs and video footage of the live bird in the documentary, that was created by the TV crew led by Mr Howie Severino. The Philippine Network had not realized what they filmed until Allen had informed the crew of interesting discovery. Mr Severino and the crew were at that time, in Dalton Pass to film \"akik\", the traditional practice of trapping wild birds with nets by first attracting them with bright lights on moonless nights. \"I'm shocked. I don't know of any other photos of this. No bird watchers have ever given convincing reports that they have seen it at all... This is an exciting discovery,\" said Allen. In 2007, a specimen of the from the was photographed by the American in Chicago. The Luzon Buttonquail was only known through an illustration in the authoritative book by Robert S. Kennedy, et al, A Guide to the Birds of the Philippines. This birders \"bible\" includes a drawing based on the skins of dead specimens collected a century ago, whereas the otherwise comprehensive of the does not contain a single image of the Worcester's Buttonquail. \u201cWith the photograph and the promise of more sightings in the wild, we can see the living bill, the eye color, the feathers, rather than just the mushed-up museum skin,\u201d exclaimed Allen, who has been birdwatching for fifty years, fifteen in the Philippines, and has an extensive collection of bird calls on his ipod. He has also spotted the , another rare bird which he has not seen in the Philippines. \u201cWe are ecstatic that this rarely seen species was photographed by accident. It may be the only photo of this poorly known bird. But I also feel sad that the locals do not value the around them and that this bird was sold for only P10 and headed for the cooking pot,\u201d Wild Bird Club of the Philippines (WBCP) president Mike Lu said. \u201cMuch more has to be done in creating conservation awareness and local consciousness about our unique threatened bird fauna. This should be an easy task for the local governments assisted by the . What if this was the last of its species?\u201d Lu added. According to the WBCP, the Worcester\u2019s buttonquail was first described based on specimens bought in Quinta Market in , in 1902, and was named after Dean Conant Worcester. Since then just a few single specimens have been photographed and filmed from Nueva Vizcaya and , and lately, in 2007, from by the in Chicago, Illinois. , D.Sc., F.R.G.S. was an American , public official, and authority on the Philippines, born at , Vermont, and educated at the (A.B., 1889). From 1899 to 1901 he was a member of the United States ; thenceforth until 1913 he served as secretary of the interior for the . In 1910, he founded the , which has become the hospital for the poor and the sick. In October, 2004, at the request of Mr Moises Butic, CENR Officer, Mr Jon Hornbuckle, of Grove Road, , has conducted a short investigation into in , Mount Polis, and Dalton Pass, in Nueva Vizcaya. \"Prices ranged from 100 for a to 300 pesos for a . Other species that are caught from time to time include and ; on one occasion, around 50 of the latter were trapped! All other trapped birds are eaten,\" said Hornbuckle. \"The main trapping season is November to February. Birds are caught at the lights using type nets. Quails and Buttonquails were more often shot in the fields at this time, rather than caught, and occasionally included the rare Luzon (Worcester\u2019s) Buttonquail, which is only known from dead specimens, and is a threatened bird species reported from Dalton Pass,\" he added. In August, 1929, Richard C. McGregor and Leon L. Gardner of the compiled a book entitled Philippine Bird Traps. The authors described the Luzon Buttonquail as \"very rare,\" having only encountered it twice, once in August and once in September. \"They are caught with a scoop net from the back of a . Filipino hunters snared them, baiting with branches of artificial red peppers made of ,\" wrote McGregor and Leon L. Gardner. \"The various ingenious and effectual devices used by Filipinos for bird-trapping include [the] 'Teepee Trap' which consists of a conical tepee, woven of split and about 3 feet high and 3 feet across at the base, with a fairly narrow entrance. 'Spring ' were also used, where a slip noose fastened to a strongly bent bamboo or other elastic branch, which is released by a trigger, which is usually the perch of the trap,\" their book explained. A passage from the bird-trap book, which explains why had eaten these endangered bird species, goes as follows: A global review of threatened species by the (IUCN) indicates drastic decline of animal and plant life. This includes a quarter of all , one out of eight birds, one out of three and 70 percent of plants. The report, , is published by IUCN every year. Additionally, a global assessment of the health of the world's species is released once in four years. The data is compiled by 1,700 experts from 130 countries. The key findings of the report were announced at the World Conservation Congress held in Barcelona, Spain. The survey includes 44,838 species of wild and , out of which 16,928 species are threatened with extinction. Among the threatened, 3,246 are tagged critically endangered, the highest category of threat. Another 4,770 species are endangered and 8,912 vulnerable to extinction. Map of the Philippines showing the location of Nueva Vizcaya. The Luzon Buttonquail (Turnix worcesteri) is a species of bird in the family. It is to the island of in the Philippines, where it is known from just six localities thereof. Its natural habitat is subtropical or tropical high-altitude grassland, in the highlands of the , although records are from 150-1,250 m, and the possibility that it frequents forested (non-grassland) habitats cannot be discounted. The or hemipodes are a small family of birds which resemble, but are unrelated to, the true . They inhabit warm grasslands in Asia, Africa, and Australia. They are assumed to be , and breed somewhere in northern Luzon in April-June and that at least some birds disperse southwards in the period July-March. by Bruegel d. \u00c4., Pieter These Turnicidae are small, drab, running birds, which avoid flying. The female is the more brightly coloured of the sexes, and initiates courtship. Unusually, the buttonquails are , with the females circulating among several males and expelling rival females from her territory. Both sexes cooperate in building a nest in the earth, but only the male the eggs and tends the young. Called \"Pugo\" ( ) by natives, these birds inhabit rice paddies and scrub lands near farm areas because of the abundance of seeds and insects that they feed on regularly. These birds are characterized by their black heads with white spots, a brown or fawn colored body and yellow legs on males and the females are brown with white and black spots. Buttonquails are a notoriously and unobtrusive family of birds, and the species could conceivably occur in reasonable numbers somewhere. They are included in the (as evaluated by IUCN Red List of ). They are also considered as by IUCN and BirdLife International, since these species is judged to have a ten percent chance of going extinct in the next one hundred years.", "edit_actions": [{"type": "D", "before": "Buttonquail", "after": null, "start_char_pos": 0, "end_char_pos": 11}, {"type": "D", "before": "ornithologists", "after": null, "start_char_pos": 42, "end_char_pos": 56}, {"type": "D", "before": "buttonquail", "after": null, "start_char_pos": 78, "end_char_pos": 89}, {"type": "D", "before": "2008 International Union for Conservation of Nature's Red List Category", "after": null, "start_char_pos": 329, "end_char_pos": 400}, {"type": "D", "before": "native bird trappers", "after": null, "start_char_pos": 427, "end_char_pos": 447}, {"type": "D", "before": "Luzon Buttonquail", "after": null, "start_char_pos": 483, "end_char_pos": 500}, {"type": "D", "before": "Caraballo Mountains, in Nueva Vizcaya", "after": null, "start_char_pos": 609, "end_char_pos": 646}, {"type": "A", "before": null, "after": "in ,", "start_char_pos": 649, "end_char_pos": 649}, {"type": "R", "before": "Cordillera Central and Sierra Madre", "after": "and", "start_char_pos": 666, "end_char_pos": 701}, {"type": "D", "before": "Luzon", "after": null, "start_char_pos": 731, "end_char_pos": 736}, {"type": "D", "before": "birder", "after": null, "start_char_pos": 747, "end_char_pos": 753}, {"type": "R", "before": ", Desmond Allen ,", "after": "Desmond Allen", "start_char_pos": 770, "end_char_pos": 787}, {"type": "D", "before": "DVD-video", "after": null, "start_char_pos": 814, "end_char_pos": 823}, {"type": "R", "before": "still image of the credits", "after": "of the", "start_char_pos": 891, "end_char_pos": 917}, {"type": "D", "before": "screenshot", "after": null, "start_char_pos": 966, "end_char_pos": 976}, {"type": "D", "before": "i-Witness: The GMA Documentaries", "after": null, "start_char_pos": 1133, "end_char_pos": 1165}, {"type": "D", "before": "documentary", "after": null, "start_char_pos": 1181, "end_char_pos": 1192}, {"type": "D", "before": "GMA Network", "after": null, "start_char_pos": 1242, "end_char_pos": 1253}, {"type": "R", "before": "Luzon Buttonquail from the Mountain Province", "after": "from the", "start_char_pos": 1936, "end_char_pos": 1980}, {"type": "D", "before": "Field Museum of Natural History", "after": null, "start_char_pos": 2014, "end_char_pos": 2045}, {"type": "R", "before": "image bank of the Oriental Bird Club", "after": "of the", "start_char_pos": 2353, "end_char_pos": 2389}, {"type": "D", "before": "Oriental (or Manchurian) Bush Warbler", "after": null, "start_char_pos": 2795, "end_char_pos": 2832}, {"type": "D", "before": "biodiversity", "after": null, "start_char_pos": 3077, "end_char_pos": 3089}, {"type": "D", "before": "DENR", "after": null, "start_char_pos": 3436, "end_char_pos": 3440}, {"type": "R", "before": "Quiapo, Manila", "after": ",", "start_char_pos": 3613, "end_char_pos": 3627}, {"type": "D", "before": "Benguet", "after": null, "start_char_pos": 3776, "end_char_pos": 3783}, {"type": "R", "before": "Mountain Province by the Field Museum of Natural History", "after": "by the", "start_char_pos": 3812, "end_char_pos": 3868}, {"type": "D", "before": "Dean Conant Worcester", "after": null, "start_char_pos": 3891, "end_char_pos": 3912}, {"type": "D", "before": "Dean Conant Worcester", "after": null, "start_char_pos": 3913, "end_char_pos": 3934}, {"type": "D", "before": "zoologist", "after": null, "start_char_pos": 3969, "end_char_pos": 3978}, {"type": "D", "before": "Thetford", "after": null, "start_char_pos": 4040, "end_char_pos": 4048}, {"type": "D", "before": "University of Michigan", "after": null, "start_char_pos": 4080, "end_char_pos": 4102}, {"type": "D", "before": "Philippine Commission", "after": null, "start_char_pos": 4172, "end_char_pos": 4193}, {"type": "D", "before": "Philippine Insular Government", "after": null, "start_char_pos": 4266, "end_char_pos": 4295}, {"type": "D", "before": "Philippine General Hospital", "after": null, "start_char_pos": 4322, "end_char_pos": 4349}, {"type": "D", "before": "Lamut", "after": null, "start_char_pos": 4462, "end_char_pos": 4467}, {"type": "D", "before": "Sheffield", "after": null, "start_char_pos": 4516, "end_char_pos": 4525}, {"type": "R", "before": "bird-trapping in Ifugao, Mountain Province, Banaue", "after": "in ,", "start_char_pos": 4569, "end_char_pos": 4619}, {"type": "D", "before": "Sagada", "after": null, "start_char_pos": 4633, "end_char_pos": 4639}, {"type": "R", "before": "pesos for a Fruit-Dove", "after": "for a", "start_char_pos": 4699, "end_char_pos": 4721}, {"type": "D", "before": "Metallic Pigeon", "after": null, "start_char_pos": 4741, "end_char_pos": 4756}, {"type": "R", "before": "Flame-breasted Fruit-Dove and Luzon Bleeding-heart", "after": "and", "start_char_pos": 4815, "end_char_pos": 4865}, {"type": "D", "before": "butterfly-catching", "after": null, "start_char_pos": 5064, "end_char_pos": 5082}, {"type": "D", "before": "Cooper Ornithological Society", "after": null, "start_char_pos": 5431, "end_char_pos": 5460}, {"type": "D", "before": "carabao", "after": null, "start_char_pos": 5694, "end_char_pos": 5701}, {"type": "D", "before": "sealing wax", "after": null, "start_char_pos": 5790, "end_char_pos": 5801}, {"type": "R", "before": "bamboo and rattan", "after": "and", "start_char_pos": 6000, "end_char_pos": 6017}, {"type": "D", "before": "Snares", "after": null, "start_char_pos": 6106, "end_char_pos": 6112}, {"type": "D", "before": "Filipinos", "after": null, "start_char_pos": 6359, "end_char_pos": 6368}, {"type": "D", "before": "International Union for Conservation of Nature", "after": null, "start_char_pos": 6472, "end_char_pos": 6518}, {"type": "D", "before": "mammals", "after": null, "start_char_pos": 6609, "end_char_pos": 6616}, {"type": "D", "before": "amphibians", "after": null, "start_char_pos": 6660, "end_char_pos": 6670}, {"type": "D", "before": "Red List of Threatened Species", "after": null, "start_char_pos": 6709, "end_char_pos": 6739}, {"type": "R", "before": "fauna and flora", "after": "and", "start_char_pos": 7086, "end_char_pos": 7101}, {"type": "D", "before": "Turnicidae", "after": null, "start_char_pos": 7463, "end_char_pos": 7473}, {"type": "D", "before": "endemic", "after": null, "start_char_pos": 7488, "end_char_pos": 7495}, {"type": "D", "before": "Luzon", "after": null, "start_char_pos": 7513, "end_char_pos": 7518}, {"type": "D", "before": "Cordillera Central", "after": null, "start_char_pos": 7687, "end_char_pos": 7705}, {"type": "D", "before": "buttonquails", "after": null, "start_char_pos": 7845, "end_char_pos": 7857}, {"type": "D", "before": "quails", "after": null, "start_char_pos": 7946, "end_char_pos": 7952}, {"type": "D", "before": "intra-island migrants", "after": null, "start_char_pos": 8039, "end_char_pos": 8060}, {"type": "D", "before": "Bird Trap", "after": null, "start_char_pos": 8190, "end_char_pos": 8199}, {"type": "D", "before": "polyandrous", "after": null, "start_char_pos": 8406, "end_char_pos": 8417}, {"type": "D", "before": "incubates", "after": null, "start_char_pos": 8589, "end_char_pos": 8598}, {"type": "D", "before": "quail", "after": null, "start_char_pos": 8645, "end_char_pos": 8650}, {"type": "D", "before": "cryptic", "after": null, "start_char_pos": 9013, "end_char_pos": 9020}, {"type": "D", "before": "2008 IUCN Red List Category", "after": null, "start_char_pos": 9152, "end_char_pos": 9179}, {"type": "D", "before": "BirdLife International", "after": null, "start_char_pos": 9197, "end_char_pos": 9219}, {"type": "D", "before": "Threatened Species", "after": null, "start_char_pos": 9237, "end_char_pos": 9255}, {"type": "D", "before": "Vulnerable species", "after": null, "start_char_pos": 9287, "end_char_pos": 9305}], "sents_char_pos": [0, 257, 414, 547, 949, 1409, 1526, 1723, 1737, 1779, 1864, 1908, 2057, 2214, 2453, 2770, 2894, 2971, 3023, 3240, 3365, 3485, 3679, 3890, 4116, 4195, 4297, 4408, 4674, 4758, 4867, 4922, 4975, 5026, 5093, 5366, 5508, 5640, 5703, 5840, 6097, 6304, 6577, 6696, 6774, 6877, 6935, 7042, 7163, 7257, 7330, 7392, 7481, 7590, 7840, 7954, 8015, 8189, 8293, 8373, 8516, 8628, 8804, 8981, 9126, 9258]}
+{"doc_id": "121431", "revision_depth": "1", "before_revision": "Transmission electron micrograph of the Ebola virus. The Philippine Department of Agriculture (DA), local health and agricultural teams Sunday have started slaughtering, burning and burying roughly 6,500 hogs at a farm in Pandi, Bulacan in Central Luzon on Sunday after three farm workers became infected with Reston ebolavirus (ERV) of the virus group Ebola , as a precautionary measure and to protect the local livestock industry. But according to Dr. Eric Tayag, the 56-man team's five captive bolts used in stunning the pigs malfunctioned, for which reason, they decided use instead .32 caliber pistols . \"We need to finish this off because sometimes it rains,\" he said. But due to other problems, 12 policemen were ordered to use instead .22 caliber guns for 80-120 kilograms pigs. The pig depopulation in the Pandi farm has reached 1,237 Tuesday amid strong rains as schedules have been set from 5 a.m. to 9 a.m. and from 4 p.m. to 9 p.m. daily, Cecilia Yacob, head of the Bulacan Provincial Public Affairs Office, said. Monday's culling was witnessed by representatives from the Food and Agricultural Organization (FAO), the World Health Organization (WHO), animal welfare observers, Bulacan Gov. Joselito Mendoza and Pandi Mayor Roberto Oca. The slaughter has been estimated to cost 16 million Philippine pesos (\u20b1), which include hog farm owners' compensation and the cost of culling for five to seven days. A polymerase chain reaction test to check the virus' presence was conducted by the United States Centers for Disease Control (US-CDC) to verify ongoing transmission. \"Of 160 pig blood samples that were positive for antibodies, 133 came from Bulacan and 27 from Pangasinan as reported by RITM. Those from Bulacan were traced to pigs at different age groups while those in Pangasinan were found in sows and just one piglet. This means that there is on going viral transmission in Bulacan but past infection with recovery was the case in Pangasinan,\u201d Yap explained. The agriculture officials earlier announced that the depopulation will be carried out in a \"humane\" manner, following current Office international des \u00e9pizooties (OIE) procedures that ensure protection of animal welfare in the Bulacan farm. According to Philippine Department of Health (DOH) Secretary Francisco Duque , the quarantine of the hog farm in Palauig, Manaoag, Pangasinan has been lifted after finding no traces of viral transmission. According to Yap, test results conducted by a joint mission of FAO, the World Animal Health Organization , WHO and their local counterparts, reveal that viral transmission continues to exist in Pandi hog farms, which is only 0.5\\% of the 13 million pigs raised throughout the country. DOH officials also say a pig farm worker in Cabanatuan City in Nueva Ecija , who had no direct contact with sick hogs, has tested positive for Immunoglobulin G antibodies against the Reston ebolavirus, which is non-lethal, unlike the Za\u00efre, Bundibugyo, C\u00f4te d'Ivoire and Sudan strains, according to FAO. \"Ebola Reston poses a low risk to human health at this time,\" said DOH Secretary Dr. Duque. \"147 human samples have been tested for Ebola, but only six have tested positive. But stay away from kilawin , and half-cooked pork,\" he added. The laboratory tests of 147 blood samples from workers in the affected areas were conducted by the Research Institute for Tropical Medicine (RITM) and the US-CDC. RITM has also reported that \"1039 pig blood samples collected by the expert mission yielded negative results on antigen tests ,\" the DOH said. Both the DA and DOH officials have decided to expand the scope of the testing for the Reston ebolavirus by inspecting and monitoring hog farms in the whole of Central Luzon, Calabarzon, Southern Luzon and Pangasinan province after the culling of the 6,500 pigs. \"In six months we might be finished testing Regions 3 and 4 depending on the assurance of the US Center for Disease Control and Prevention [in Atlanta, Georgia, USA] to give test kits. In Region 3 alone, the government would need to test farms in 566 villages that would require around 36,000 kits, but the country only has 10,000 kits\" Mr. Catbagan said. \"The expanded tests will cover the provinces of Aurora, Bataan, Bulacan, Nueva Ecija, Pampanga, Tarlac and Zambales in Central Luzon, and Cavite, Laguna, Batangas, Rizal and Quezon in Calabarzon,\" Mr. Catbagan added. Mr. Catbagan has assured infected hog farm owners in Pandi they would be properly indemnified after the country's first large-scale animal depopulation process. \"We are finalizing the indemnification contract. But we will make sure the indemnification would not be open to abuse,\" he said. Fatteners and piglets cost an average of \u20b13,000-4,000 per head, boars cost \u20b125,000-30,000, and sows cost \u20b114,000-15,000. Intensively farmed pigs in batch pens Juan Lubroth, senior officer of the Infectious Disease Group of FAO\u2019s Animal Health Service, has arrived on Wednesday to discuss in detail with government officials how the agency can support in the wider surveillance. The DA and DOH officials and other government agencies met last Thursday to discuss and finalize the procedure in the burning of 6,500 pigs in Pandi, Bulacan. \"The Bureau of Animal Industry and the provincial government of Bulacan, experts carrying out the \u20b1500,000 five-day depopulation would observe three guidelines, namely: the main disposal, water safety, and environment protection. The depopulation process will involve stunning the pigs unconscious, burning them in a 6-foot deep pit, then burying them at the site. We want to make sure that our means would not violate the Animal Welfare Act. We are also ensuring that there would be no seepage,\" Governor Mendoza explained. \"Local authorities have decided to use electric prods and a \u20b170,000 captive bolt pistol with a blunt rod to stun the 6,000 pigs in Pandi, prior to slaughter burning using rice hulls before burying them in a pit dug inside the hog farm,\" said Dr. Davinio Catbagan. \"About 40 health workers \u2014 clad in special hog mask suits and are tasked to facilitate the depopulation \u2014 would then dump the pigs into 10 30x30-foot pits that can accommodate 600 pigs each. The pits are located some 30 feet from the infected pig farm,\" said Mr Eric Tayag, head of the National Epidemiology Centre. \"The cull could take up to seven days to complete,\" Mr Tayag added. A truckload of disinfectants was prepared amid rice husks to be used in the burning. Meanwhile, at the 18th hog farmers convention, which was launched on Monday at Club Filipino , the president of the National Federation of Hog Farmers, Albert R. T. Lim, Jr., said hog farmers have feared the effects of Reston ebolavirus virus on industry, since hog exports were banned due to the outbreak. \"We are also apprehensive that if we keep on talking about this thing, some people might just misconstrue or misunderstand what they are talking about and people might get scared,\" Lim said. The government has spent about \u20b110 million to maintain the two quarantined hog farms in Bulacan and Pangasinan. \"Anyway, we always have our hog producers in Mindanao to supply Luzon if necessary. I am more concerned about our exports although the Ebola scare also somewhat affected local demand,\" Lim said. Amid the nationwide ERV scare and probe, local authorities have seized more than 200 kilograms of rotten pork meat at a local market in Pasay City Wednesday. Barangay officials in Maricaban district have intercepted the banned \u2018hot meat\u2019 and arrested Roberto Clet and Rafael Fruelda, who were indicted under the \"Consumer Act of the Philippines.\" The statute punishes the illegal sale of unsafe products like double-dead meat with penalty of \u20b11,000 to \u20b110,000 and not less than six-months but not more than five years of imprisonment. Transmission electron micrograph of the Ebola virus. Local police has also arrested four vendors and seized their 3,000 kilos of \"botcha\" (rotten pork meat or \"double dead meat\") at MC Market in Balintawak, Quezon City Wednesday evening, and allegedly delivered from Bulacan. The four suspects were charged for violation of the Consumer Act of the Philippines and Republic Act 9296 or the Meat Inspection Code. In December, international experts initially probed outbreak among Philippine pigs, wherein about 6,000 pigs at Pandi and Talavera farms were tested for the Reston ebolavirus. \"There is no salmonella outbreak in Eastern Visayas , Region 8, said Dr. Archie Lluz, Chief of Regional Animal Disease and Diagnostic Laboratory of the Department of Agriculture in the region. But hog specimens from Leyte and Babatngon , where 270 swine deaths and cases of sick pigs were reported, were examined by lab tests. The results revealed cutaneous \"Pasteurella hemolytica\" , a type of bacterial infection which causes swine deaths due to loss of appetite, dehydration, fever and diarrhea. According to the DA, sick pigs had been culled from Babatngon, Tacloban City, Alangalang, Santa Fe, Palo, Pastrana, Dagami, Burauen, Tabontabon, Lapaz, Mayorga, and Abuyog in Leyte ; Sogod in Southern Leyte ; Catbalogan, Calbiga, Daram, and Santa Rita in Samar ; and Lope de Vega in Northern Samar . Swine infections have spread to 18 towns and one city in Eastern Visayas . The Reston ebolavirus is suspected to be a subtype of the Ebola virus or a new filovirus of Asian origin. It was first discovered in crab-eating macaques from the Philippines at a laboratory in Reston , Virginia. The same lab then recorded an outbreak of viral hemorrhagic fever among monkeys imported from the Philippines in 1990. The Reston ebolavirus strain was discovered among monkeys in the Philippines in 1996, and in Italy in 1992. In January 1997, the Philippines Department of Environment and Natural Resources ordered the immediate slaughter of some 600 monkeys in Ferlite, a breeding farm in Laguna , to prevent an outbreak of Reston ebolavirus.", "after_revision": "Transmission electron micrograph of the Ebola virus. The Philippine (DA), local health and agricultural teams Sunday have started roughly 6,500 hogs at a farm in , in on Sunday after three farm workers became infected with (ERV) of the virus group , as a precautionary measure and to protect the local livestock industry. But according to Dr. Eric Tayag, the 56-man team's five captive bolts used in stunning the pigs malfunctioned, for which reason, they decided use instead . \"We need to finish this off because sometimes it rains,\" he said. But due to other problems, 12 policemen were ordered to use instead guns for 80-120 kilograms pigs. The pig depopulation in the Pandi farm has reached 1,237 Tuesday amid strong rains as schedules have been set from 5 a.m. to 9 a.m. and from 4 p.m. to 9 p.m. daily, Cecilia Yacob, head of the Bulacan Provincial Public Affairs Office, said. Monday's culling was witnessed by representatives from the (FAO), the (WHO), animal welfare observers, Bulacan Gov. Joselito Mendoza and Pandi Mayor Roberto Oca. The slaughter has been estimated to cost 16 million (\u20b1), which include hog farm owners' compensation and the cost of culling for five to seven days. A test to check the virus' presence was conducted by the (US-CDC) to verify ongoing transmission. \"Of 160 pig blood samples that were positive for antibodies, 133 came from Bulacan and 27 from Pangasinan as reported by RITM. Those from Bulacan were traced to pigs at different age groups while those in Pangasinan were found in sows and just one piglet. This means that there is on going viral transmission in Bulacan but past infection with recovery was the case in Pangasinan,\u201d Yap explained. The agriculture officials earlier announced that the will be carried out in a \"humane\" manner, following current (OIE) procedures that ensure protection of animal welfare in the Bulacan farm. According to (DOH) Secretary , the quarantine of the hog farm in Palauig, has been lifted after finding no traces of viral transmission. According to Yap, test results conducted by a joint mission of FAO, the , WHO and their local counterparts, reveal that viral transmission continues to exist in Pandi hog farms, which is only 0.5\\% of the 13 million pigs raised throughout the country. DOH officials also say a pig farm worker in in , who had no direct contact with sick hogs, has tested positive for against the Reston ebolavirus, which is non-lethal, unlike the , , and strains, according to FAO. \"Ebola Reston poses a low risk to human health at this time,\" said DOH Secretary Dr. Duque. \"147 human samples have been tested for Ebola, but only six have tested positive. But stay away from , and half-cooked pork,\" he added. The laboratory tests of 147 blood samples from workers in the affected areas were conducted by the (RITM) and the US-CDC. RITM has also reported that \"1039 pig blood samples collected by the expert mission yielded negative results on ,\" the DOH said. Both the DA and DOH officials have decided to expand the scope of the testing for the Reston ebolavirus by inspecting and monitoring hog farms in the whole of , , and province after the culling of the 6,500 pigs. \"In six months we might be finished testing Regions 3 and 4 depending on the assurance of the US Center for Disease Control and Prevention [in , USA] to give test kits. In Region 3 alone, the government would need to test farms in 566 villages that would require around 36,000 kits, but the country only has 10,000 kits\" Mr. Catbagan said. \"The expanded tests will cover the provinces of Aurora, Bataan, Bulacan, Nueva Ecija, Pampanga, Tarlac and Zambales in Central Luzon, and Cavite, Laguna, Batangas, Rizal and Quezon in Calabarzon,\" Mr. Catbagan added. Mr. Catbagan has assured infected hog farm owners in Pandi they would be properly indemnified after the country's first large-scale animal depopulation process. \"We are finalizing the indemnification contract. But we will make sure the indemnification would not be open to abuse,\" he said. Fatteners and piglets cost an average of \u20b13,000-4,000 per head, boars cost \u20b125,000-30,000, and sows cost \u20b114,000-15,000. in batch pens Juan Lubroth, senior officer of the Group of FAO\u2019s Animal Health Service, has arrived on Wednesday to discuss in detail with government officials how the agency can support in the wider surveillance. The DA and DOH officials and other government agencies met last Thursday to discuss and finalize the procedure in the burning of 6,500 pigs in Pandi, Bulacan. \"The Bureau of Animal Industry and the provincial government of Bulacan, experts carrying out the \u20b1500,000 five-day depopulation would observe three guidelines, namely: the main disposal, water safety, and environment protection. The depopulation process will involve the pigs unconscious, burning them in a 6-foot deep pit, then burying them at the site. We want to make sure that our means would not violate the Animal Welfare Act. We are also ensuring that there would be no seepage,\" Governor Mendoza explained. \"Local authorities have decided to use and a \u20b170,000 with a blunt rod to the 6,000 pigs in Pandi, prior to burning using rice hulls before burying them in a pit dug inside the hog farm,\" said Dr. Davinio Catbagan. \"About 40 health workers \u2014 clad in special hog mask suits and are tasked to facilitate the depopulation \u2014 would then dump the pigs into 10 30x30-foot pits that can accommodate 600 pigs each. The pits are located some 30 feet from the infected pig farm,\" said Mr Eric Tayag, head of the National Epidemiology Centre. \"The cull could take up to seven days to complete,\" Mr Tayag added. A truckload of disinfectants was prepared amid to be used in the burning. Meanwhile, at the 18th hog farmers convention, which was launched on Monday at , the president of the National Federation of Hog Farmers, Albert R. T. Lim, Jr., said hog farmers have feared the effects of Reston ebolavirus virus on industry, since hog exports were banned due to the outbreak. \"We are also apprehensive that if we keep on talking about this thing, some people might just misconstrue or misunderstand what they are talking about and people might get scared,\" Lim said. The government has spent about \u20b110 million to maintain the two hog farms in Bulacan and Pangasinan. \"Anyway, we always have our hog producers in Mindanao to supply Luzon if necessary. I am more concerned about our exports although the Ebola scare also somewhat affected local demand,\" Lim said. Amid the nationwide ERV scare and probe, local authorities have seized more than 200 of rotten pork meat at a local market in Wednesday. officials in Maricaban district have intercepted the banned \u2018hot meat\u2019 and arrested Roberto Clet and Rafael Fruelda, who were indicted under the \"Consumer Act of the Philippines.\" The statute punishes the illegal sale of unsafe products like double-dead meat with penalty of \u20b11,000 to \u20b110,000 and not less than six-months but not more than five years of imprisonment. Transmission electron micrograph of the Ebola virus. Local police has also arrested four vendors and seized their 3,000 kilos of \"botcha\" (rotten pork meat or \"double dead meat\") at MC Market in , Wednesday evening, and allegedly delivered from Bulacan. The four suspects were charged for violation of the Consumer Act of the Philippines and Republic Act 9296 or the Meat Inspection Code. In December, international experts initially probed outbreak among Philippine pigs, wherein about 6,000 pigs at Pandi and farms were tested for the Reston ebolavirus. \"There is no outbreak in , Region 8, said Dr. Archie Lluz, Chief of Regional Animal Disease and Diagnostic Laboratory of the Department of Agriculture in the region. But hog specimens from and , where 270 swine deaths and cases of sick pigs were reported, were examined by lab tests. The results revealed cutaneous , a type of bacterial infection which causes swine deaths due to loss of appetite, dehydration, fever and diarrhea. According to the DA, sick pigs had been culled from Babatngon, Tacloban City, Alangalang, Santa Fe, Palo, Pastrana, Dagami, Burauen, Tabontabon, Lapaz, Mayorga, and Abuyog in ; Sogod in ; Catbalogan, Calbiga, Daram, and Santa Rita in ; and Lope de Vega in . Swine infections have spread to 18 towns and one city in . The Reston ebolavirus is suspected to be a subtype of the Ebola virus or a new filovirus of Asian origin. It was first discovered in from the Philippines at a laboratory in , Virginia. The same lab then recorded an outbreak of among monkeys imported from the Philippines in 1990. The Reston ebolavirus strain was discovered among monkeys in the Philippines in 1996, and in Italy in 1992. In January 1997, the Philippines Department of Environment and Natural Resources ordered the immediate slaughter of some 600 monkeys in Ferlite, a breeding farm in , to prevent an outbreak of Reston ebolavirus.", "edit_actions": [{"type": "D", "before": "Department of Agriculture", "after": null, "start_char_pos": 68, "end_char_pos": 93}, {"type": "D", "before": "slaughtering, burning and burying", "after": null, "start_char_pos": 156, "end_char_pos": 189}, {"type": "R", "before": "Pandi, Bulacan in Central Luzon", "after": ", in", "start_char_pos": 222, "end_char_pos": 253}, {"type": "D", "before": "Reston ebolavirus", "after": null, "start_char_pos": 310, "end_char_pos": 327}, {"type": "D", "before": "Ebola", "after": null, "start_char_pos": 353, "end_char_pos": 358}, {"type": "D", "before": ".32 caliber pistols", "after": null, "start_char_pos": 587, "end_char_pos": 606}, {"type": "D", "before": ".22 caliber", "after": null, "start_char_pos": 743, "end_char_pos": 754}, {"type": "D", "before": "Food and Agricultural Organization", "after": null, "start_char_pos": 1086, "end_char_pos": 1120}, {"type": "D", "before": "World Health Organization", "after": null, "start_char_pos": 1132, "end_char_pos": 1157}, {"type": "D", "before": "Philippine pesos", "after": null, "start_char_pos": 1302, "end_char_pos": 1318}, {"type": "D", "before": "polymerase chain reaction", "after": null, "start_char_pos": 1418, "end_char_pos": 1443}, {"type": "D", "before": "United States Centers for Disease Control", "after": null, "start_char_pos": 1499, "end_char_pos": 1540}, {"type": "D", "before": "depopulation", "after": null, "start_char_pos": 2032, "end_char_pos": 2044}, {"type": "D", "before": "Office international des \u00e9pizooties", "after": null, "start_char_pos": 2105, "end_char_pos": 2140}, {"type": "D", "before": "Philippine Department of Health", "after": null, "start_char_pos": 2233, "end_char_pos": 2264}, {"type": "D", "before": "Francisco Duque", "after": null, "start_char_pos": 2281, "end_char_pos": 2296}, {"type": "D", "before": "Manaoag, Pangasinan", "after": null, "start_char_pos": 2342, "end_char_pos": 2361}, {"type": "D", "before": "World Animal Health Organization", "after": null, "start_char_pos": 2497, "end_char_pos": 2529}, {"type": "R", "before": "Cabanatuan City in Nueva Ecija", "after": "in", "start_char_pos": 2754, "end_char_pos": 2784}, {"type": "D", "before": "Immunoglobulin G antibodies", "after": null, "start_char_pos": 2853, "end_char_pos": 2880}, {"type": "R", "before": "Za\u00efre, Bundibugyo, C\u00f4te d'Ivoire and Sudan", "after": ", , and", "start_char_pos": 2944, "end_char_pos": 2986}, {"type": "D", "before": "kilawin", "after": null, "start_char_pos": 3207, "end_char_pos": 3214}, {"type": "D", "before": "Research Institute for Tropical Medicine", "after": null, "start_char_pos": 3349, "end_char_pos": 3389}, {"type": "D", "before": "antigen tests", "after": null, "start_char_pos": 3525, "end_char_pos": 3538}, {"type": "R", "before": "Central Luzon, Calabarzon, Southern Luzon and Pangasinan", "after": ", , and", "start_char_pos": 3715, "end_char_pos": 3771}, {"type": "R", "before": "Atlanta, Georgia,", "after": ",", "start_char_pos": 3961, "end_char_pos": 3978}, {"type": "D", "before": "Intensively farmed pigs", "after": null, "start_char_pos": 4802, "end_char_pos": 4825}, {"type": "D", "before": "Infectious Disease", "after": null, "start_char_pos": 4876, "end_char_pos": 4894}, {"type": "D", "before": "stunning", "after": null, "start_char_pos": 5486, "end_char_pos": 5494}, {"type": "D", "before": "electric prods", "after": null, "start_char_pos": 5782, "end_char_pos": 5796}, {"type": "D", "before": "captive bolt pistol", "after": null, "start_char_pos": 5811, "end_char_pos": 5830}, {"type": "D", "before": "stun", "after": null, "start_char_pos": 5851, "end_char_pos": 5855}, {"type": "D", "before": "slaughter", "after": null, "start_char_pos": 5890, "end_char_pos": 5899}, {"type": "D", "before": "rice husks", "after": null, "start_char_pos": 6438, "end_char_pos": 6448}, {"type": "D", "before": "Club Filipino", "after": null, "start_char_pos": 6555, "end_char_pos": 6568}, {"type": "D", "before": "quarantined", "after": null, "start_char_pos": 7037, "end_char_pos": 7048}, {"type": "D", "before": "kilograms", "after": null, "start_char_pos": 7366, "end_char_pos": 7375}, {"type": "R", "before": "Pasay City Wednesday. Barangay", "after": "Wednesday.", "start_char_pos": 7417, "end_char_pos": 7447}, {"type": "R", "before": "Balintawak, Quezon City", "after": ",", "start_char_pos": 8011, "end_char_pos": 8034}, {"type": "D", "before": "Talavera", "after": null, "start_char_pos": 8349, "end_char_pos": 8357}, {"type": "R", "before": "salmonella outbreak in Eastern Visayas", "after": "outbreak in", "start_char_pos": 8416, "end_char_pos": 8454}, {"type": "R", "before": "Leyte and Babatngon", "after": "and", "start_char_pos": 8619, "end_char_pos": 8638}, {"type": "D", "before": "\"Pasteurella hemolytica\"", "after": null, "start_char_pos": 8761, "end_char_pos": 8785}, {"type": "D", "before": "Leyte", "after": null, "start_char_pos": 9077, "end_char_pos": 9082}, {"type": "D", "before": "Southern Leyte", "after": null, "start_char_pos": 9094, "end_char_pos": 9108}, {"type": "D", "before": "Samar", "after": null, "start_char_pos": 9157, "end_char_pos": 9162}, {"type": "D", "before": "Northern Samar", "after": null, "start_char_pos": 9185, "end_char_pos": 9199}, {"type": "D", "before": "Eastern Visayas", "after": null, "start_char_pos": 9259, "end_char_pos": 9274}, {"type": "D", "before": "crab-eating macaques", "after": null, "start_char_pos": 9410, "end_char_pos": 9430}, {"type": "D", "before": "Reston", "after": null, "start_char_pos": 9471, "end_char_pos": 9477}, {"type": "D", "before": "viral hemorrhagic fever", "after": null, "start_char_pos": 9532, "end_char_pos": 9555}, {"type": "D", "before": "Laguna", "after": null, "start_char_pos": 9881, "end_char_pos": 9887}], "sents_char_pos": [0, 52, 432, 674, 786, 1026, 1249, 1415, 1581, 1708, 1837, 1978, 2219, 2424, 2709, 3013, 3105, 3187, 3249, 3555, 3817, 4002, 4173, 4390, 4551, 4600, 4680, 4801, 5058, 5217, 5447, 5582, 5660, 5742, 6006, 6197, 6322, 6390, 6475, 6782, 6973, 7085, 7169, 7280, 7438, 7627, 7815, 7868, 8091, 8226, 8402, 8475, 8595, 8729, 8901, 9084, 9110, 9164, 9276, 9382, 9489, 9608, 9716]}
+{"doc_id": "121920", "revision_depth": "1", "before_revision": "German side 1. FSV Mainz 05 , of the Second Bundesliga , have reached the semi-finals of the DFB Pokal , Germany's equivalent of the FA Cup , for the first time in their history. They defeated Bundesliga side FC Schalke 04 by 1 - 0 on a goal from Aristide Banc\u00e9 in the 88th minute. For Schalke, it was just another disappointment in an already dismal season; being elminiated from the Cup means they must improve their current Bundesliga standing to fifth - it was eighth place at the conclusion of the 22nd Matchday - to have any chance to appear in the UEFA Europa League. Mainz got started just after the first whistle, when Markus Feulner had a shot from the left side blocked by Jefferson Farf\u00e1n after eight minutes. However, Schalke began to dominate after the half-hour mark. A shot from Heiko Westermann sailed just wide of the goal in the thirty-second, and a corner kick from Mladen Kristaljic richocheted off the crossbar eight minutes later. Schalke manager Andreas M\u00fcller was unhappy with his team's effort in the first half, however, saying \"We don't have enough power to penetrate towards the front.\" Striker Kevin Kur\u00e1nyi was replaced by Halil Altintop at the break. An opportunity for Mainz in the sixty-eighth was stopped by keeper Manuel Neuer after an unsuccessful rescue attempt by Ivan Rakitic. Altintop had a shot fly inches wide of the post in the seventy-first. Schalke nearly gave up a penalty in the eighty-second as Rafinha made a hard and controversial tackle on Sr\u0111an Baljak , but referee Felix Brych allowed play to continue. Finally, in the eighty-eighth, Aristide Banc\u00e9 converted off of a long indirect free kick to put Mainz through to the semi-finals.", "after_revision": "German side , of the , have reached the semi-finals of the , Germany's equivalent of the , for the first time in their history. They defeated Bundesliga side by 1 - 0 on a goal from in the 88th minute. For Schalke, it was just another disappointment in an already dismal season; being elminiated from the Cup means they must improve their current Bundesliga standing to fifth - it was eighth place at the conclusion of the 22nd Matchday - to have any chance to appear in the UEFA Europa League. Mainz got started just after the first whistle, when had a shot from the left side blocked by after eight minutes. However, Schalke began to dominate after the half-hour mark. A shot from sailed just wide of the goal in the thirty-second, and a corner kick from richocheted off the crossbar eight minutes later. Schalke manager was unhappy with his team's effort in the first half, however, saying \"We don't have enough power to penetrate towards the front.\" Striker was replaced by at the break. An opportunity for Mainz in the sixty-eighth was stopped by keeper after an unsuccessful rescue attempt by Ivan Rakitic. Altintop had a shot fly inches wide of the post in the seventy-first. Schalke nearly gave up a penalty in the eighty-second as made a hard and controversial tackle on , but referee Felix Brych allowed play to continue. Finally, in the eighty-eighth, Aristide Banc\u00e9 converted off of a long indirect free kick to put Mainz through to the semi-finals.", "edit_actions": [{"type": "D", "before": "1. FSV Mainz 05", "after": null, "start_char_pos": 12, "end_char_pos": 27}, {"type": "D", "before": "Second Bundesliga", "after": null, "start_char_pos": 37, "end_char_pos": 54}, {"type": "D", "before": "DFB Pokal", "after": null, "start_char_pos": 93, "end_char_pos": 102}, {"type": "D", "before": "FA Cup", "after": null, "start_char_pos": 133, "end_char_pos": 139}, {"type": "D", "before": "FC Schalke 04", "after": null, "start_char_pos": 209, "end_char_pos": 222}, {"type": "D", "before": "Aristide Banc\u00e9", "after": null, "start_char_pos": 247, "end_char_pos": 261}, {"type": "D", "before": "Markus Feulner", "after": null, "start_char_pos": 628, "end_char_pos": 642}, {"type": "D", "before": "Jefferson Farf\u00e1n", "after": null, "start_char_pos": 684, "end_char_pos": 700}, {"type": "D", "before": "Heiko Westermann", "after": null, "start_char_pos": 795, "end_char_pos": 811}, {"type": "D", "before": "Mladen Kristaljic", "after": null, "start_char_pos": 886, "end_char_pos": 903}, {"type": "D", "before": "Andreas M\u00fcller", "after": null, "start_char_pos": 970, "end_char_pos": 984}, {"type": "D", "before": "Kevin Kur\u00e1nyi", "after": null, "start_char_pos": 1124, "end_char_pos": 1137}, {"type": "D", "before": "Halil Altintop", "after": null, "start_char_pos": 1154, "end_char_pos": 1168}, {"type": "D", "before": "Manuel Neuer", "after": null, "start_char_pos": 1250, "end_char_pos": 1262}, {"type": "D", "before": "Rafinha", "after": null, "start_char_pos": 1444, "end_char_pos": 1451}, {"type": "D", "before": "Sr\u0111an Baljak", "after": null, "start_char_pos": 1492, "end_char_pos": 1504}], "sents_char_pos": [0, 178, 281, 358, 574, 721, 782, 953, 1115, 1182, 1316, 1386, 1556]}
+{"doc_id": "124072", "revision_depth": "2", "before_revision": "The provincial election was called today in British Columbia. Alongside with the election, the citizens of the province will also be debating if they should change their electoral system from Single Member Plurality to Single Transferable Vote (STV). The vote for both the election and the referendum is to be held on May 12th. Gordon Campbell, Premier of British Columbia According to the Angus Reid Strategies online poll, the issues before the candidates this year are the economy, crime and public safety, and health care. Gordon Campbell is the current Premier of British Columbia, and leader of the Liberal Party . Three new tax measures have been proposed, increasing apprenticeship training tax credits, reducing small business income tax, and raising the revenue definition for small business. \"Keep B.C. Strong\" is the Liberal slogan. The New Democratic Party (NDP) leader Carole James is focusing her election platform on supporting a green economy, eliminating the carbon tax, offering families tax relief, freezing post-secondary tuition, raising the minimum wage, and providing a small business tax holiday. The NDP slogan is \"Take back your B.C.\" The Green Party led by Jane Sterk , is focused on environmental issues, crime and police, and a 'green economy'. The Green Party is in support of the carbon tax and will be campaigning in favour of the new STV voting system that is being proposed again. The Green Party slogan is \"A better plan for B.C.\" Carole James, Leader of the New Democratic Party Wilf Hanni is at the helm of the Conservative Party which opposes the Recognition and Reconciliation Act, privatization of BC Hydro Bill 42 'gag law', and the carbon tax. They propose to reduce senior civil employee pay scale, as well as personal and corporate income tax. Other parties running candidates are the Democratic Reform under Graeme Roger, the Marijuana Party under Marc Emery, the Work Less Party under Conrad Schmidt, the Refederation Party under Mike Summers, the Sex Party under John Ince and the Communist Party under George Gidora . For 60 days before the election, each party may campaign with an allowable CA$1.1 million, in the final 28 days, $4.4 millionmay be spent. $70,000 is allowed by candidates before the writ is dropped, and another $ 70, 000 in the midst of campaigning. The referendum will allow BC voters to choose between two voting systems. The Single Member Plurality system is the current system in all Canadian provinces, and is also used to elect Members of Parliament in Ottawa. The other system is BC-STV,which would replace 85 single-member ridings with 20 larger ridings in which between two and seven Members of the Legislative Assembly (MLA) would be elected. The total number of MLAs will not change. Voters would rank the candidates in order of preference, as many or as few as they wish. When the results are tallied, votes are transferred to the next preference on the ballot when the first preference has been elected or eliminated. The system is designed to ensure that every vote helps to elect someone, every vote counts as fully as possible, and every voter is represented by a candidate they voted for, as nearly as mathematically possible.%DIFDELCMD < %DIFDELCMD < %%% Previous elections held under the current Single Member Plurality (also known as First Past The Post) system led to odd results in certain elections, such as the 2001 election where the winning party obtained 77 of the 79 seats of the legislature with just 58\\% of the vote, and the 1996 election, in which the party with the most votes failed to win the election. The recommendation to switch to STV was made by the British Columbia Citizens' Assembly on Electoral Reform, a group formed in 2004 of randomly selected citizens. They spent a year learning about voting systems around the world and consulting with BC citizens. It's the fourth referendum in the country and the second in the province within the last 4 years. The previous referendum held in 2005 also voted on these same electoral systems and came within 2.3\\% of the 60\\% threshold. In order for the referendum to be binding, BC-STV will again need 60\\% of the popular vote and 50\\% of votes in 51 of the 85 ridings in BC. If the change is approved, it will be the first province in the country to adopt reform of the electoral system in recent history.%DIFDELCMD < %DIFDELCMD < %%% Fair Voting BC, recognized as the official proponent group, argues that STV will lead to fairer election results, effective local representation and greater voter choice. They argue that BC-STV will give voters the power to hold politicians and political parties accountable, by giving every voter a vote that actually makes a difference. If the STV system is approved, then it will be put into use for the first time for the 2013 provincial election. The recognized opponent group is the No STV Campaign Society. Their arguments are that STV will give larger ridings, voters would be unsure of whom their MLA would be, there would be unequal geographic representation, that the counting method is too complicated, the electoral system results are unverified in practical usage, the system results in a higher probability of minority governments and the subsequent coalition of parties. They also argue that other countries who use systems similar to STV have had problems with their election results. 500,000 in public funding has been given to both the proponents and the opponents of the referendum. ", "after_revision": "The provincial election was called today in British Columbia. Alongside with the election, the citizens of the province will also be debating if they should change their electoral system from to (STV). The vote for both the election and the referendum is to be held on May 12th. , of British Columbia According to the online poll, the issues before the candidates this year are the economy, crime and public safety, and health care. is the current of British Columbia, and leader of the . Three new tax measures have been proposed, increasing apprenticeship training tax credits, reducing small business income tax, and raising the revenue definition for small business. \"Keep B.C. Strong\" is the Liberal slogan. The (NDP) leader is focusing her election platform on supporting a green economy, eliminating the carbon tax, offering families tax relief, freezing post-secondary tuition, raising the minimum wage, and providing a small business tax holiday. The NDP slogan is \"Take back your B.C.\" The , led by , is focused on environmental issues, crime and police, and a 'green economy'. The Green Party is in support of the carbon tax and will be campaigning in favour of the new STV voting system that is being proposed again. The Green Party slogan is \"A better plan for B.C.\" is at the helm of the which opposes the Recognition and Reconciliation Act, privatization of BC Hydro Bill 42 'gag law', and the carbon tax. They propose to reduce senior civil employee pay scale, as well as personal and corporate income tax. Other parties running candidates are the under , the under , the under , the under , the under , and the under . For 60 days before the election, each party may campaign with an allowable 1.1 million, in the final 28 days, $4.4 million may be spent. $ 70, %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% 000 is allowed by candidates before the writ is dropped, and another $70,000 in the midst of campaigning. The referendum will allow BC voters to choose between two voting systems. The system is the current system in all Canadian provinces, and is also used to elect in . The other system is , which would replace 85 single-member ridings with 20 larger ridings in which between two and seven (MLA) would be elected. The total number of MLAs will not change. Voters would rank the candidates in order of preference, as many or as few as they wish. When the results are tallied, votes are transferred to the next preference on the ballot when the first preference has been elected or eliminated. The system is designed to ensure that every vote helps to elect someone, every vote counts as fully as possible, and every voter is represented by a candidate they voted for, as nearly as mathematically possible. Previous elections held under the current Single Member Plurality (also known as First Past The Post) system led to in certain elections, such as the where the winning party obtained 77 of the 79 seats of the legislature with just 58\\% of the vote, and the , in which the party with the most votes failed to win the election. The recommendation to switch to STV was made by the , a group formed in 2004 of randomly selected citizens. They spent a year learning about voting systems around the world and consulting with BC citizens. It's the fourth referendum in the country and the second in the province within the last 4 years. The held in 2005 also voted on these same electoral systems and came within 2.3\\% of the 60\\% threshold. In order for the referendum to be binding, BC-STV will again need 60\\% of the popular vote and 50\\% of votes in 51 of the 85 ridings in BC. If the change is approved, it will be the first province in the country to adopt of the electoral system in recent history. Fair Voting BC, recognized as the official proponent group, argues that STV will lead to fairer election results, effective local representation and greater voter choice. They argue that BC-STV will give voters the power to hold politicians and political parties accountable, by giving every voter a vote that actually makes a difference. If the STV system is approved, then it will be put into use for the first time for the 2013 provincial election. The recognized opponent group is the No STV Campaign Society. Their arguments are that STV will give larger ridings, voters would be unsure of whom their MLA would be, there would be unequal geographic representation, that the counting method is too complicated, the electoral system results are unverified in practical usage, the system results in a higher probability of minority governments and the subsequent coalition of parties. They also argue that other countries who use systems similar to STV have had problems with their election results. $ 500,000 in public funding has been given to both the proponents and the opponents of the referendum. Sister links", "edit_actions": [{"type": "R", "before": "Single Member Plurality to Single Transferable Vote", "after": "to", "start_char_pos": 192, "end_char_pos": 243}, {"type": "R", "before": "Gordon Campbell, Premier", "after": ",", "start_char_pos": 328, "end_char_pos": 352}, {"type": "D", "before": "Angus Reid Strategies", "after": null, "start_char_pos": 390, "end_char_pos": 411}, {"type": "D", "before": "Gordon Campbell", "after": null, "start_char_pos": 527, "end_char_pos": 542}, {"type": "D", "before": "Premier", "after": null, "start_char_pos": 558, "end_char_pos": 565}, {"type": "D", "before": "Liberal Party", "after": null, "start_char_pos": 605, "end_char_pos": 618}, {"type": "D", "before": "New Democratic Party", "after": null, "start_char_pos": 849, "end_char_pos": 869}, {"type": "D", "before": "Carole James", "after": null, "start_char_pos": 883, "end_char_pos": 895}, {"type": "R", "before": "Green Party led by Jane Sterk", "after": ", led by", "start_char_pos": 1166, "end_char_pos": 1195}, {"type": "D", "before": "Carole James, Leader of the New Democratic Party Wilf Hanni", "after": null, "start_char_pos": 1467, "end_char_pos": 1526}, {"type": "D", "before": "Conservative Party", "after": null, "start_char_pos": 1549, "end_char_pos": 1567}, {"type": "R", "before": "Democratic Reform under Graeme Roger, the Marijuana Party under Marc Emery, the Work Less Party under Conrad Schmidt, the Refederation Party under Mike Summers, the Sex Party under John Ince and the Communist Party under George Gidora", "after": "under , the under , the under , the under , the under , and the under", "start_char_pos": 1830, "end_char_pos": 2064}, {"type": "R", "before": "CA$1.1 million, in the final 28 days, $4.4 millionmay be spent. $70,000 is allowed by candidates before the writ is dropped, and another $", "after": "1.1 million, in the final 28 days, $4.4 million may be spent. $", "start_char_pos": 2142, "end_char_pos": 2280}, {"type": "D", "before": "000 in the midst of campaigning.", "after": null, "start_char_pos": 2285, "end_char_pos": 2317}, {"type": "D", "before": "The referendum will allow BC voters to choose between two voting systems. The Single Member Plurality system is the current system in all Canadian provinces, and is also used to elect Members of Parliament in Ottawa. The other system is BC-STV,which would replace 85 single-member ridings with 20 larger ridings in which between two and seven Members of the Legislative Assembly (MLA) would be elected. The total number of MLAs will not change. Voters would rank the candidates in order of preference, as many or as few as they wish. When the results are tallied, votes are transferred to the next preference on the ballot when the first preference has been elected or eliminated. The system is designed to ensure that every vote helps to elect someone, every vote counts as fully as possible, and every voter is represented by a candidate they voted for, as nearly as mathematically possible.", "after": null, "start_char_pos": 2318, "end_char_pos": 3211}, {"type": "D", "before": "Previous elections held under the current Single Member Plurality (also known as First Past The Post) system led to odd results in certain elections, such as the 2001 election where the winning party obtained 77 of the 79 seats of the legislature with just 58\\% of the vote, and the 1996 election, in which the party with the most votes failed to win the election. The recommendation to switch to STV was made by the British Columbia Citizens' Assembly on Electoral Reform, a group formed in 2004 of randomly selected citizens. They spent a year learning about voting systems around the world and consulting with BC citizens.", "after": null, "start_char_pos": 3241, "end_char_pos": 3866}, {"type": "D", "before": "It's the fourth referendum in the country and the second in the province within the last 4 years. The previous referendum held in 2005 also voted on these same electoral systems and came within 2.3\\% of the 60\\% threshold. In order for the referendum to be binding, BC-STV will again need 60\\% of the popular vote and 50\\% of votes in 51 of the 85 ridings in BC. If the change is approved, it will be the first province in the country to adopt reform of the electoral system in recent history.", "after": null, "start_char_pos": 3867, "end_char_pos": 4360}, {"type": "D", "before": "Fair Voting BC, recognized as the official proponent group, argues that STV will lead to fairer election results, effective local representation and greater voter choice. They argue that BC-STV will give voters the power to hold politicians and political parties accountable, by giving every voter a vote that actually makes a difference. If the STV system is approved, then it will be put into use for the first time for the 2013 provincial election.", "after": null, "start_char_pos": 4390, "end_char_pos": 4841}, {"type": "R", "before": "The recognized opponent group is the No STV Campaign Society. Their arguments are that STV will give larger ridings, voters would be unsure of whom their MLA would be, there would be unequal geographic representation, that the counting method is too complicated, the electoral system results are unverified in practical usage, the system results in a higher probability of minority governments and the subsequent coalition of parties. They also argue that other countries who use systems similar to STV have had problems with their election results.", "after": "000 is allowed by candidates before the writ is dropped, and another $70,000 in the midst of campaigning. The referendum will allow BC voters to choose between two voting systems. The system is the current system in all Canadian provinces, and is also used to elect in . The other system is , which would replace 85 single-member ridings with 20 larger ridings in which between two and seven (MLA) would be elected. The total number of MLAs will not change. Voters would rank the candidates in order of preference, as many or as few as they wish. When the results are tallied, votes are transferred to the next preference on the ballot when the first preference has been elected or eliminated. The system is designed to ensure that every vote helps to elect someone, every vote counts as fully as possible, and every voter is represented by a candidate they voted for, as nearly as mathematically possible. Previous elections held under the current Single Member Plurality (also known as First Past The Post) system led to in certain elections, such as the where the winning party obtained 77 of the 79 seats of the legislature with just 58\\% of the vote, and the , in which the party with the most votes failed to win the election. The recommendation to switch to STV was made by the , a group formed in 2004 of randomly selected citizens. They spent a year learning about voting systems around the world and consulting with BC citizens. It's the fourth referendum in the country and the second in the province within the last 4 years. The held in 2005 also voted on these same electoral systems and came within 2.3\\% of the 60\\% threshold. In order for the referendum to be binding, BC-STV will again need 60\\% of the popular vote and 50\\% of votes in 51 of the 85 ridings in BC. If the change is approved, it will be the first province in the country to adopt of the electoral system in recent history. Fair Voting BC, recognized as the official proponent group, argues that STV will lead to fairer election results, effective local representation and greater voter choice. They argue that BC-STV will give voters the power to hold politicians and political parties accountable, by giving every voter a vote that actually makes a difference. If the STV system is approved, then it will be put into use for the first time for the 2013 provincial election. The recognized opponent group is the No STV Campaign Society. Their arguments are that STV will give larger ridings, voters would be unsure of whom their MLA would be, there would be unequal geographic representation, that the counting method is too complicated, the electoral system results are unverified in practical usage, the system results in a higher probability of minority governments and the subsequent coalition of parties. They also argue that other countries who use systems similar to STV have had problems with their election results. $", "start_char_pos": 4842, "end_char_pos": 5391}, {"type": "A", "before": null, "after": "Sister links", "start_char_pos": 5493, "end_char_pos": 5493}], "sents_char_pos": [0, 61, 250, 327, 526, 620, 802, 844, 1121, 1274, 1415, 1686, 1788, 2066, 2317, 2391, 2534, 2720, 2762, 2851, 2998, 3211, 3605, 3768, 3866, 3964, 4089, 4229, 4360, 4560, 4728, 4841, 4903, 5276, 5391]}
+{"doc_id": "124562", "revision_depth": "1", "before_revision": "Riots in the capital of MoldovaProtests which began Monday escalated to a riot on Wednesday consisting of over 10,000 people in Chi\u015fin\u0103u , the capital of Moldova, protesting the results of Sunday's 2009 Moldovan parliamentary election , which showed an apparent, narrow victory for the Communist Party (Partidul Comuni\u015ftilor din Republica Moldova, PCRM). Demonstrators claim the victory was the result of electoral fraud. The demonstration escalated to a \u201c flash mob \u201d of between 10,000 to 15,000 communicating via online tools like email, micro-blogging tool Twitter , and social-networking website Facebook . \"We sent messages on Twitter but didn't expect 15,000 people to join in. At the most we expected 1,000\", said Oleg Brega of the activist group Hyde Park. President Voronin President Vladimir Voronin has expelled the Romanian ambassador from Moldova, blaming Romania for the violent protests. \"We know that certain political forces in Romania are behind this unrest. The Romanian flags fixed on the government buildings in Chisinau attest to this\" said Voronin. \u201cRomania is involved in everything that has happened.\u201c Voronin also blamed the protests on opposition leaders who used violence to seize power, and has described the event as a coup d'\u00e9tat . Protesters initially insisted on a recount of the election results and are now calling for a new vote, which has been rejected by the government. Rioters were also demanding unification between Moldova and Romania . \u201cIn the air, there was a strong expectation of change, but that did not happen\u201d, said OSCE spokesman Matti Sidoroff. Dorin Chirtoac\u0103 \"The elections were fraudulent, there was multiple voting\" accused Chi\u015fin\u0103u mayor Dorin Chirtoac\u0103 of the Liberal Party . \u201cIt's impossible that every second person in Moldova voted for the Communists. However, we believe the riots were a provocation and we are now trying to reconcile the crowd. Leaders of all opposition parties are at the scene,\u201d said Larissa Manole of the Liberal Democratic Party of Moldova . The Organisation for Security and Cooperation in Europe (OSCE) proclaimed the PCRM to have won 61 seats in initial counts, enough to guarantee a third term in power for Voronin, who has held the position since 2001. But the Central Election Commission has received evidence of election violations, according to RIA Novosti , and upon recounts conducted of disputed polls, the commission reported that the Communists achieved 49.48\\% of the Moldovian vote, giving them 60 parliamentary seats \u2014 one short of the total needed to win the presidential election. \"The electoral commission also granted opposition parties permission to check voter lists, fulfilling one of their chief demands,\" said Yuri Ciocan, Central Election Commission secretary. Voronin will step down in May, however his party could elect a successor with 61 parliamentary seats without any votes from outside parties as well as amend the Constitution . With the PCRM garnering 60 seats, the opposition will have a voice in the presidential election for a new successor.Riots in the capital of Moldova The western part of Moldova was a part of Romania from the Romania's independence until the region was detached by the USSR in 1940 to form the Moldavian Soviet Socialist Republic . On independence in 1990 the country sought union with Romania but the eastern, Russian- and Ukrainian-inhabited areas of the country declared themselves independent from Moldova and formed the state of Transnistria and movement toward union was halted. Moldova is Europe's poorest country, where average income is less than 250 ( \u00a3 168) a month. The country's neighbours are Romania and Ukraine. Romania is an European Union (EU) state.", "after_revision": "Riots in the capital of MoldovaProtests which began Monday escalated to a on Wednesday consisting of over 10,000 people in , the capital of Moldova, protesting the results of Sunday's , which showed an apparent, narrow victory for the (Partidul Comuni\u015ftilor din Republica Moldova, PCRM). Demonstrators claim the victory was the result of electoral fraud. The demonstration escalated to a \u201c \u201d of between 10,000 to 15,000 communicating via online tools like email, micro-blogging tool , and social-networking website . \"We sent messages on Twitter but didn't expect 15,000 people to join in. At the most we expected 1,000\", said Oleg Brega of the activist group Hyde Park. President Voronin has expelled the Romanian ambassador from Moldova, blaming Romania for the violent protests. \"We know that certain political forces in Romania are behind this unrest. The Romanian flags fixed on the government buildings in Chisinau attest to this\" said Voronin. \u201cRomania is involved in everything that has happened.\u201c Voronin also blamed the protests on opposition leaders who used violence to seize power, and has described the event as a . Protesters initially insisted on a recount of the election results and are now calling for a new vote, which has been rejected by the government. Rioters were also demanding . \u201cIn the air, there was a strong expectation of change, but that did not happen\u201d, said OSCE spokesman Matti Sidoroff. Dorin Chirtoac\u0103 \"The elections were fraudulent, there was multiple voting\" accused Chi\u015fin\u0103u mayor of the . \u201cIt's impossible that every second person in Moldova voted for the Communists. However, we believe the riots were a provocation and we are now trying to reconcile the crowd. Leaders of all opposition parties are at the scene,\u201d said Larissa Manole of the . The (OSCE) proclaimed the PCRM to have won 61 seats in initial counts, enough to guarantee a third term in power for Voronin, who has held the position since 2001. But the Central Election Commission has received evidence of election violations, according to , and upon recounts conducted of disputed polls, the commission reported that the Communists achieved 49.48\\% of the Moldovian vote, giving them 60 parliamentary seats \u2014 one short of the total needed to win the presidential election. \"The electoral commission also granted opposition parties permission to check voter lists, fulfilling one of their chief demands,\" said Yuri Ciocan, Central Election Commission secretary. Voronin will step down in May, however his party could elect a successor with 61 parliamentary seats without any votes from outside parties as well as amend the . With the PCRM garnering 60 seats, the opposition will have a voice in the presidential election for a new successor.Riots in the capital of Moldova The western part of Moldova was a part of Romania from the Romania's independence until the region was detached by the in 1940 to form the . On independence in 1990 the country sought union with Romania but the eastern, Russian- and Ukrainian-inhabited areas of the country declared themselves independent from Moldova and formed the state of Transnistria and movement toward union was halted. Moldova is Europe's poorest country, where average income is less than 250 ( 168) a month. The country's neighbours are Romania and Ukraine. Romania is a European Union (EU) state.", "edit_actions": [{"type": "D", "before": "riot", "after": null, "start_char_pos": 74, "end_char_pos": 78}, {"type": "D", "before": "Chi\u015fin\u0103u", "after": null, "start_char_pos": 128, "end_char_pos": 136}, {"type": "D", "before": "2009 Moldovan parliamentary election", "after": null, "start_char_pos": 198, "end_char_pos": 234}, {"type": "D", "before": "Communist Party", "after": null, "start_char_pos": 286, "end_char_pos": 301}, {"type": "D", "before": "flash mob", "after": null, "start_char_pos": 457, "end_char_pos": 466}, {"type": "D", "before": "Twitter", "after": null, "start_char_pos": 560, "end_char_pos": 567}, {"type": "D", "before": "Facebook", "after": null, "start_char_pos": 600, "end_char_pos": 608}, {"type": "D", "before": "President Vladimir Voronin", "after": null, "start_char_pos": 783, "end_char_pos": 809}, {"type": "D", "before": "coup d'\u00e9tat", "after": null, "start_char_pos": 1249, "end_char_pos": 1260}, {"type": "D", "before": "unification between Moldova and Romania", "after": null, "start_char_pos": 1437, "end_char_pos": 1476}, {"type": "R", "before": "Dorin Chirtoac\u0103 of the Liberal Party", "after": "of the", "start_char_pos": 1694, "end_char_pos": 1730}, {"type": "D", "before": "Liberal Democratic Party of Moldova", "after": null, "start_char_pos": 1987, "end_char_pos": 2022}, {"type": "D", "before": "Organisation for Security and Cooperation in Europe", "after": null, "start_char_pos": 2029, "end_char_pos": 2080}, {"type": "D", "before": "RIA Novosti", "after": null, "start_char_pos": 2336, "end_char_pos": 2347}, {"type": "D", "before": "Constitution", "after": null, "start_char_pos": 2931, "end_char_pos": 2943}, {"type": "D", "before": "USSR", "after": null, "start_char_pos": 3213, "end_char_pos": 3217}, {"type": "D", "before": "Moldavian Soviet Socialist Republic", "after": null, "start_char_pos": 3238, "end_char_pos": 3273}, {"type": "D", "before": "\u00a3", "after": null, "start_char_pos": 3606, "end_char_pos": 3607}, {"type": "R", "before": "an", "after": "a", "start_char_pos": 3683, "end_char_pos": 3685}], "sents_char_pos": [0, 421, 683, 764, 902, 976, 1071, 1125, 1408, 1595, 1811, 1906, 2024, 2240, 2581, 2769, 2945, 3062, 3275, 3528, 3621, 3671]}
+{"doc_id": "125160", "revision_depth": "1", "before_revision": "Zahi Hawass, Egypt's pre-eminent archaeologist, revealed the first ancient artifacts which may lead to the discovery of Cleopatra and Marc Antony 's resting place. The expedition has found amulets , 22 bronze coins cast with Cleopatra's image and her name, a royal statue, an alabaster mask resembling Marc Antony, and a statue bust of Cleopatra. \"If you look at the face of Mark Antony, many believed he had this cleft on his chin and that's why I thought this could be Mark Antony,\" said Hawass. Recently, outside the temple colourful mummies of nobles were excavated at a neighbouring necropolis . These discoveries have lead the archaeologists to believe that a ruler or person of royalty is interred within the temple itself. It was the practice of the Greco-Roman era to assemble the tombs of persons of status and other high ranking officials near their rulers. \"The discovery of the cemetery this week really convinced me that there is someone important buried inside this temple. No one would be buried outside a temple without a reason. We saw that in the pharaonic days, they were always buried beside pyramids ,\" explained Hawass. Dr. Roger Vickers team used radar to locate three chambers within the rocky hill atop of which is the Temple of Taposiris Magna dedicated to the goddess Isis. The temple was constructed about 300 BC by Ptolemy II . The Supreme Council of Antiquities (SCA) expedition led by Hawass has yet to excavate the burial chambers 40 feet (12 meters) underground where they hope to find a crown or Egyptian hieroglyph cartouches revealing the names of royalty. The team will employ radar again on April 22. The Supreme Council of Antiquities expedition consists of Zahi Hawass, Secretary General of the SCA, and Martinez who has extensively researched the life of Cleopatra. upZahi Hawass According to Plutarch who studied Roman history, Caesar allowed Marc Antony and Cleopatra to be buried in the same tomb. Alexandria is located about from the Temple of Taposiris Magna. The archaeological site is on a hill along the Mediterranean Sea overlooking the summer home of Hosni Mubarak, president of Egypt. The archaeologists fear they may have to postpone work for security reasons over the summer months.", "after_revision": "Zahi Hawass, Egypt's pre-eminent archaeologist, revealed the first which may lead to the discovery of and 's resting place. The expedition has found s , 22 bronze coins cast with Cleopatra's image and her name, a royal statue, an mask resembling Marc Antony, and a of Cleopatra. \"If you look at the face of Mark Antony, many believed he had this cleft on his chin and that's why I thought this could be Mark Antony,\" said Hawass. Recently, outside the temple colourful mummies of nobles were excavated at a neighbouring . These discoveries have lead the archaeologists to believe that a ruler or person of royalty is interred within the temple itself. It was the practice of the to assemble the tombs of persons of status and other high ranking officials near their rulers. \"The discovery of the cemetery this week really convinced me that there is someone important buried inside this temple. No one would be buried outside a temple without a reason. We saw that in the pharaonic days, they were always ,\" explained Hawass. Dr. Roger Vickers team used radar to locate three chambers within the rocky hill atop of which is the Temple of Taposiris Magna dedicated to the goddess Isis. The temple was constructed about 300 BC by . The (SCA) expedition led by Hawass has yet to excavate the burial chambers 40 feet (12 meters) underground where they hope to find a crown or w|cartouche s revealing the names of royalty. The team will employ radar again on April 22. The Supreme Council of Antiquities expedition consists of Zahi Hawass, Secretary General of the SCA, and Martinez who has extensively researched the life of Cleopatra. up According to who studied history, Caesar allowed Marc Antony and Cleopatra to be buried in the same tomb. Alexandria is located about from the Temple of Taposiris Magna. The is on a hill along the overlooking the summer home of Hosni Mubarak, president of Egypt. The archaeologists fear they may have to postpone work for security reasons over the summer months.", "edit_actions": [{"type": "D", "before": "ancient artifacts", "after": null, "start_char_pos": 67, "end_char_pos": 84}, {"type": "R", "before": "Cleopatra and Marc Antony", "after": "and", "start_char_pos": 120, "end_char_pos": 145}, {"type": "R", "before": "amulets", "after": "s", "start_char_pos": 189, "end_char_pos": 196}, {"type": "D", "before": "alabaster", "after": null, "start_char_pos": 276, "end_char_pos": 285}, {"type": "D", "before": "statue bust", "after": null, "start_char_pos": 321, "end_char_pos": 332}, {"type": "D", "before": "necropolis", "after": null, "start_char_pos": 588, "end_char_pos": 598}, {"type": "D", "before": "Greco-Roman era", "after": null, "start_char_pos": 758, "end_char_pos": 773}, {"type": "D", "before": "buried beside pyramids", "after": null, "start_char_pos": 1099, "end_char_pos": 1121}, {"type": "D", "before": "Ptolemy II", "after": null, "start_char_pos": 1345, "end_char_pos": 1355}, {"type": "D", "before": "Supreme Council of Antiquities", "after": null, "start_char_pos": 1362, "end_char_pos": 1392}, {"type": "R", "before": "Egyptian hieroglyph cartouches", "after": "w|cartouche", "start_char_pos": 1531, "end_char_pos": 1561}, {"type": "A", "before": null, "after": "s", "start_char_pos": 1562, "end_char_pos": 1562}, {"type": "R", "before": "upZahi Hawass According to Plutarch who studied Roman", "after": "up According to who studied", "start_char_pos": 1809, "end_char_pos": 1862}, {"type": "D", "before": "archaeological site", "after": null, "start_char_pos": 2012, "end_char_pos": 2031}, {"type": "D", "before": "Mediterranean Sea", "after": null, "start_char_pos": 2055, "end_char_pos": 2072}], "sents_char_pos": [0, 163, 346, 497, 600, 730, 868, 988, 1046, 1142, 1301, 1357, 1594, 1640, 1943, 2007, 2138]}
+{"doc_id": "126007", "revision_depth": "2", "before_revision": "Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna sf d f f f d f dsg dh j fgj f gj fgjk Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna sf d f f f d f dsg dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj%DIFDELCMD < %DIFDELCMD < %%% gjg gj gj jggj%DIFDELCMD < %DIFDELCMD < %%% g fgj fg gj g gfj fgj gh k ghk f gk d gj xd d y%DIFDELCMD < %DIFDELCMD < %%% fy d hd h fd h f f dfg s h f f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd%DIFDELCMD < %DIFDELCMD < %%% g df f f j%DIFDELCMD < %DIFDELCMD < %%% hk j j k j jkh%DIFDELCMD < %DIFDELCMD < %%% h j hj j h j hj%DIFDELCMD < %DIFDELCMD < %%% hj h h h%DIFDELCMD < %DIFDELCMD < %%% hj h h h h ghk%DIFDELCMD < %DIFDELCMD < %%% l k%DIFDELCMD < %DIFDELCMD < %%% llkl j k kll'k l' ' k kl; kl lkkl lk kl lk'%DIFDELCMD < %DIFDELCMD < %%% lklk kjkh k h h k j k%DIFDELCMD < %DIFDELCMD < %%% j j j%DIFDELCMD < %DIFDELCMD < %%% j Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna%DIFDELCMD < %DIFDELCMD < %%% sf d f f f d f dsg dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj%DIFDELCMD < %DIFDELCMD < %%% gjg gj gj jggj%DIFDELCMD < %DIFDELCMD < %%% g fgj fg%DIFDELCMD < %DIFDELCMD < %%% gj g gfj fgj gh k ghk f gk d gj xd d y%DIFDELCMD < %DIFDELCMD < %%% fy d hd h fd h f f dfg s h f%DIFDELCMD < %DIFDELCMD < %%% f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd%DIFDELCMD < %DIFDELCMD < %%% g df f f%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% hk j j k j%DIFDELCMD < %DIFDELCMD < %%% jkh%DIFDELCMD < %DIFDELCMD < %%% h j hj j h%DIFDELCMD < %DIFDELCMD < %%% j hj%DIFDELCMD < %DIFDELCMD < %%% hj h%DIFDELCMD < %DIFDELCMD < %%% h h%DIFDELCMD < %DIFDELCMD < %%% hj h h h%DIFDELCMD < %DIFDELCMD < %%% h ghk%DIFDELCMD < %DIFDELCMD < %%% l%DIFDELCMD < %DIFDELCMD < %%% k%DIFDELCMD < %DIFDELCMD < %%% llkl j k kll'k l' '%DIFDELCMD < %DIFDELCMD < %%% k kl; kl lkkl lk kl lk'%DIFDELCMD < %DIFDELCMD < %%% lklk kjkh%DIFDELCMD < %DIFDELCMD < %%% k h h k j k%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% j j%DIFDELCMD < %DIFDELCMD < %%% Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna%DIFDELCMD < %DIFDELCMD < %%% sf d f f f d f dsg%DIFDELCMD < %DIFDELCMD < %%% dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj%DIFDELCMD < %DIFDELCMD < %%% gjg%DIFDELCMD < %DIFDELCMD < %%% gj gj jggj%DIFDELCMD < %DIFDELCMD < %%% g fgj fg%DIFDELCMD < %DIFDELCMD < %%% gj g gfj fgj gh k ghk f gk d gj xd d y%DIFDELCMD < %DIFDELCMD < %%% fy d hd h fd h f f dfg s h f%DIFDELCMD < %DIFDELCMD < %%% f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd%DIFDELCMD < %DIFDELCMD < %%% g df f f%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% hk j j k j%DIFDELCMD < %DIFDELCMD < %%% jkh%DIFDELCMD < %DIFDELCMD < %%% h j hj j h%DIFDELCMD < %DIFDELCMD < %%% j hj%DIFDELCMD < %DIFDELCMD < %%% hj h%DIFDELCMD < %DIFDELCMD < %%% h h%DIFDELCMD < %DIFDELCMD < %%% hj h h h%DIFDELCMD < %DIFDELCMD < %%% h ghk%DIFDELCMD < %DIFDELCMD < %%% l%DIFDELCMD < %DIFDELCMD < %%% k%DIFDELCMD < %DIFDELCMD < %%% llkl j k kll'k l' '%DIFDELCMD < %DIFDELCMD < %%% k kl; kl lkkl lk kl lk'%DIFDELCMD < %DIFDELCMD < %%% lklk kjkh%DIFDELCMD < %DIFDELCMD < %%% k h h k j k%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna%DIFDELCMD < %DIFDELCMD < %%% sf d f f f d f dsg%DIFDELCMD < %DIFDELCMD < %%% dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj%DIFDELCMD < %DIFDELCMD < %%% gjg%DIFDELCMD < %DIFDELCMD < %%% gj gj jggj%DIFDELCMD < %DIFDELCMD < %%% g fgj fg%DIFDELCMD < %DIFDELCMD < %%% gj g gfj fgj gh k ghk f gk d gj xd d y%DIFDELCMD < %DIFDELCMD < %%% fy d hd h fd h f f dfg s h f%DIFDELCMD < %DIFDELCMD < %%% f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd%DIFDELCMD < %DIFDELCMD < %%% g df f f%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% hk j j k j%DIFDELCMD < %DIFDELCMD < %%% jkh%DIFDELCMD < %DIFDELCMD < %%% h j hj j h%DIFDELCMD < %DIFDELCMD < %%% j hj%DIFDELCMD < %DIFDELCMD < %%% hj h%DIFDELCMD < %DIFDELCMD < %%% h h%DIFDELCMD < %DIFDELCMD < %%% hj h h h%DIFDELCMD < %DIFDELCMD < %%% h ghk%DIFDELCMD < %DIFDELCMD < %%% l%DIFDELCMD < %DIFDELCMD < %%% k%DIFDELCMD < %DIFDELCMD < %%% llkl j k kll'k l' '%DIFDELCMD < %DIFDELCMD < %%% k kl; kl lkkl lk kl lk'%DIFDELCMD < %DIFDELCMD < %%% lklk kjkh%DIFDELCMD < %DIFDELCMD < %%% k h h k j k%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna%DIFDELCMD < %DIFDELCMD < %%% sf d f f f d f dsg%DIFDELCMD < %DIFDELCMD < %%% dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj%DIFDELCMD < %DIFDELCMD < %%% gjg%DIFDELCMD < %DIFDELCMD < %%% gj gj jggj%DIFDELCMD < %DIFDELCMD < %%% g fgj fg%DIFDELCMD < %DIFDELCMD < %%% gj g gfj fgj gh k ghk f gk d gj xd d y%DIFDELCMD < %DIFDELCMD < %%% fy d hd h fd h f f dfg s h f%DIFDELCMD < %DIFDELCMD < %%% f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd%DIFDELCMD < %DIFDELCMD < %%% g df f f%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% hk j j k j%DIFDELCMD < %DIFDELCMD < %%% jkh%DIFDELCMD < %DIFDELCMD < %%% h j hj j h%DIFDELCMD < %DIFDELCMD < %%% j hj%DIFDELCMD < %DIFDELCMD < %%% hj h%DIFDELCMD < %DIFDELCMD < %%% h h%DIFDELCMD < %DIFDELCMD < %%% hj h h h%DIFDELCMD < %DIFDELCMD < %%% h ghk%DIFDELCMD < %DIFDELCMD < %%% l%DIFDELCMD < %DIFDELCMD < %%% k%DIFDELCMD < %DIFDELCMD < %%% llkl j k kll'k l' '%DIFDELCMD < %DIFDELCMD < %%% k kl; kl lkkl lk kl lk'%DIFDELCMD < %DIFDELCMD < %%% lklk kjkh%DIFDELCMD < %DIFDELCMD < %%% k h h k j k%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna sf d f f f d f dsg dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj%DIFDELCMD < %DIFDELCMD < %%% gjg%DIFDELCMD < %DIFDELCMD < %%% gj gj jggj%DIFDELCMD < %DIFDELCMD < %%% g fgj fg%DIFDELCMD < %DIFDELCMD < %%% gj g gfj fgj gh k ghk f gk d gj xd d y%DIFDELCMD < %DIFDELCMD < %%% fy d hd h fd h f f dfg s h f%DIFDELCMD < %DIFDELCMD < %%% f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd%DIFDELCMD < %DIFDELCMD < %%% g df f f%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% hk j j k j%DIFDELCMD < %DIFDELCMD < %%% jkh%DIFDELCMD < %DIFDELCMD < %%% h j hj j h%DIFDELCMD < %DIFDELCMD < %%% j hj%DIFDELCMD < %DIFDELCMD < %%% hj h%DIFDELCMD < %DIFDELCMD < %%% h h%DIFDELCMD < %DIFDELCMD < %%% hj h h h%DIFDELCMD < %DIFDELCMD < %%% h ghk%DIFDELCMD < %DIFDELCMD < %%% l%DIFDELCMD < %DIFDELCMD < %%% k%DIFDELCMD < %DIFDELCMD < %%% llkl j k kll'k l' '%DIFDELCMD < %DIFDELCMD < %%% k kl; kl lkkl lk kl lk'%DIFDELCMD < %DIFDELCMD < %%% lklk kjkh%DIFDELCMD < %DIFDELCMD < %%% k h h k j k%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna%DIFDELCMD < %DIFDELCMD < %%% sf d f f f d f dsg%DIFDELCMD < %DIFDELCMD < %%% dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj%DIFDELCMD < %DIFDELCMD < %%% gjg%DIFDELCMD < %DIFDELCMD < %%% gj gj jggj%DIFDELCMD < %DIFDELCMD < %%% g fgj fg%DIFDELCMD < %DIFDELCMD < %%% gj g gfj fgj gh k ghk f gk d gj xd d y%DIFDELCMD < %DIFDELCMD < %%% fy d hd h fd h f f dfg s h f%DIFDELCMD < %DIFDELCMD < %%% f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd%DIFDELCMD < %DIFDELCMD < %%% g df f f%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% hk j j k j%DIFDELCMD < %DIFDELCMD < %%% jkh%DIFDELCMD < %DIFDELCMD < %%% h j hj j h%DIFDELCMD < %DIFDELCMD < %%% j hj%DIFDELCMD < %DIFDELCMD < %%% hj h%DIFDELCMD < %DIFDELCMD < %%% h h%DIFDELCMD < %DIFDELCMD < %%% hj h h h%DIFDELCMD < %DIFDELCMD < %%% h ghk%DIFDELCMD < %DIFDELCMD < %%% l%DIFDELCMD < %DIFDELCMD < %%% k%DIFDELCMD < %DIFDELCMD < %%% llkl j k kll'k l' '%DIFDELCMD < %DIFDELCMD < %%% k kl; kl lkkl lk kl lk'%DIFDELCMD < %DIFDELCMD < %%% lklk kjkh%DIFDELCMD < %DIFDELCMD < %%% k h h k j k%DIFDELCMD < %DIFDELCMD < %%% Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna%DIFDELCMD < %DIFDELCMD < %%% sf d f f f d f dsg%DIFDELCMD < %DIFDELCMD < %%% dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj%DIFDELCMD < %DIFDELCMD < %%% gjg%DIFDELCMD < %DIFDELCMD < %%% gj gj jggj%DIFDELCMD < %DIFDELCMD < %%% g fgj fg%DIFDELCMD < %DIFDELCMD < %%% gj g gfj fgj gh k ghk f gk d gj xd d y%DIFDELCMD < %DIFDELCMD < %%% fy d hd h fd h f f dfg s h f%DIFDELCMD < %DIFDELCMD < %%% f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd%DIFDELCMD < %DIFDELCMD < %%% g df f f%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% hk j j k j%DIFDELCMD < %DIFDELCMD < %%% jkh%DIFDELCMD < %DIFDELCMD < %%% h j hj j h%DIFDELCMD < %DIFDELCMD < %%% j hj%DIFDELCMD < %DIFDELCMD < %%% hj h%DIFDELCMD < %DIFDELCMD < %%% h h%DIFDELCMD < %DIFDELCMD < %%% hj h h h%DIFDELCMD < %DIFDELCMD < %%% h ghk%DIFDELCMD < %DIFDELCMD < %%% l%DIFDELCMD < %DIFDELCMD < %%% k%DIFDELCMD < %DIFDELCMD < %%% llkl j k kll'k l' '%DIFDELCMD < %DIFDELCMD < %%% k kl; kl lkkl lk kl lk'%DIFDELCMD < %DIFDELCMD < %%% lklk kjkh%DIFDELCMD < %DIFDELCMD < %%% k h h k j k%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna%DIFDELCMD < %DIFDELCMD < %%% sf d f f f d f dsg%DIFDELCMD < %DIFDELCMD < %%% dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj%DIFDELCMD < %DIFDELCMD < %%% gjg%DIFDELCMD < %DIFDELCMD < %%% gj gj jggj%DIFDELCMD < %DIFDELCMD < %%% g fgj fg%DIFDELCMD < %DIFDELCMD < %%% gj g gfj fgj gh k ghk f gk d gj xd d y%DIFDELCMD < %DIFDELCMD < %%% fy d hd h fd h f f dfg s h f%DIFDELCMD < %DIFDELCMD < %%% f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd%DIFDELCMD < %DIFDELCMD < %%% g df f f%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% hk j j k j%DIFDELCMD < %DIFDELCMD < %%% jkh%DIFDELCMD < %DIFDELCMD < %%% h j hj j h%DIFDELCMD < %DIFDELCMD < %%% j hj%DIFDELCMD < %DIFDELCMD < %%% hj h%DIFDELCMD < %DIFDELCMD < %%% h h%DIFDELCMD < %DIFDELCMD < %%% hj h h h%DIFDELCMD < %DIFDELCMD < %%% h ghk%DIFDELCMD < %DIFDELCMD < %%% l%DIFDELCMD < %DIFDELCMD < %%% k%DIFDELCMD < %DIFDELCMD < %%% llkl j k kll'k l' '%DIFDELCMD < %DIFDELCMD < %%% k kl; kl lkkl lk kl lk'%DIFDELCMD < %DIFDELCMD < %%% lklk kjkh%DIFDELCMD < %DIFDELCMD < %%% k h h k j k%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna%DIFDELCMD < %DIFDELCMD < %%% sf d f f f d f dsg%DIFDELCMD < %DIFDELCMD < %%% dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj%DIFDELCMD < %DIFDELCMD < %%% gjg%DIFDELCMD < %DIFDELCMD < %%% gj gj jggj%DIFDELCMD < %DIFDELCMD < %%% g fgj fg%DIFDELCMD < %DIFDELCMD < %%% gj g gfj fgj gh k ghk f gk d gj xd d y%DIFDELCMD < %DIFDELCMD < %%% fy d hd h fd h f f dfg s h f%DIFDELCMD < %DIFDELCMD < %%% f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd%DIFDELCMD < %DIFDELCMD < %%% g df f f%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% hk j j k j%DIFDELCMD < %DIFDELCMD < %%% jkh%DIFDELCMD < %DIFDELCMD < %%% h j hj j h%DIFDELCMD < %DIFDELCMD < %%% j hj%DIFDELCMD < %DIFDELCMD < %%% hj h%DIFDELCMD < %DIFDELCMD < %%% h h%DIFDELCMD < %DIFDELCMD < %%% hj h h h%DIFDELCMD < %DIFDELCMD < %%% h ghk%DIFDELCMD < %DIFDELCMD < %%% l%DIFDELCMD < %DIFDELCMD < %%% k%DIFDELCMD < %DIFDELCMD < %%% llkl j k kll'k l' '%DIFDELCMD < %DIFDELCMD < %%% k kl; kl lkkl lk kl lk'%DIFDELCMD < %DIFDELCMD < %%% lklk kjkh%DIFDELCMD < %DIFDELCMD < %%% k h h k j k%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% j j%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% jk j%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% j j%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% jk j%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% j j%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% jk j%DIFDELCMD < %DIFDELCMD < %%% j j%DIFDELCMD < %DIFDELCMD < %%% j j%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% jk j%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% j j%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% jk j%DIFDELCMD < %DIFDELCMD < %%% j j j%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% jk j%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% j j%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% jk j%DIFDELCMD < %DIFDELCMD < %%% j j j%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% jk j%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% jk j%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% jk j%DIFDELCMD < %DIFDELCMD < %%% j f j gjfgj fg jfg j fgj g gj%DIFDELCMD < %DIFDELCMD < %%% gjg%DIFDELCMD < %DIFDELCMD < %%% gj gj jggj%DIFDELCMD < %DIFDELCMD < %%% g fgj fg%DIFDELCMD < %DIFDELCMD < %%% gj g gfj fgj gh k ghk f gk d gj xd d y%DIFDELCMD < %DIFDELCMD < %%% fy d hd h fd h f f dfg s h f%DIFDELCMD < %DIFDELCMD < %%% f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd%DIFDELCMD < %DIFDELCMD < %%% g df f f%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% hk j j k j%DIFDELCMD < %DIFDELCMD < %%% jkh%DIFDELCMD < %DIFDELCMD < %%% h j hj j h%DIFDELCMD < %DIFDELCMD < %%% j hj%DIFDELCMD < %DIFDELCMD < %%% hj h%DIFDELCMD < %DIFDELCMD < %%% h h%DIFDELCMD < %DIFDELCMD < %%% hj h h h%DIFDELCMD < %DIFDELCMD < %%% h ghk%DIFDELCMD < %DIFDELCMD < %%% l%DIFDELCMD < %DIFDELCMD < %%% k%DIFDELCMD < %DIFDELCMD < %%% llkl j k kll'k l' '%DIFDELCMD < %DIFDELCMD < %%% k kl; kl lkkl lk kl lk'%DIFDELCMD < %DIFDELCMD < %%% lklk kjkh%DIFDELCMD < %DIFDELCMD < %%% k h h k j k%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% j j%DIFDELCMD < %DIFDELCMD < %%% j%DIFDELCMD < %DIFDELCMD < %%% jk j", "after_revision": "Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. \"In the final structure, 10 brands shall stand below an integrative leading company alongside each other, whereby the independence of all brands and explicitly also of Porsche shall be ensured,\" said the Porsche Automobil Holding SE company. A task force has been set into place to discuss details of the merger over the next month. This task force embraces managers and representatives from the works council of both companies as well as the state of Lower Saxony. up2010 Porsche 911 photographed at the 2009 Montreal International Auto Show Porsche based in Stuttgart, Germany was previously controlled by the Porsche and Pi\u00ebch families voting stock. Porsche had previously tried to raise its 51\\% shares in Volkswagen to 75\\% in a take-over bid. A special German law grants Lower Saxony enough power to veto decisions with its 20\\% share in the VW company. %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% upVW Golf VI GTI \"I'm certain that we can and will advance our partnership in the difficult current year 2009, and have the stuff to develop the powerhouse of the international automobile industry\" said Martin Winterkorn chairman of the Volkswagen Group (Volkswagen AG) and Scania AB. The merger would help Porsche with its \u20ac9 billion debt which it incurred partially due to the ailing economy as well as its attempt at a takeover bid. %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% Related news", "edit_actions": [{"type": "D", "before": "8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna", "after": null, "start_char_pos": 130, "end_char_pos": 221}, {"type": "R", "before": "sf d f f f d f dsg", "after": "\"In the final structure, 10 brands shall stand below an integrative leading company alongside each other, whereby the independence of all brands and explicitly also of Porsche shall be ensured,\" said the Porsche Automobil Holding SE company.", "start_char_pos": 222, "end_char_pos": 240}, {"type": "R", "before": "dh j fgj f gj fgjk", "after": "A task force has been set into place to discuss details of the merger over the next month. This task force embraces managers and representatives from the works council of both companies as well as the state of Lower Saxony. up2010 Porsche 911 photographed at the 2009 Montreal International Auto Show Porsche based in Stuttgart, Germany was previously controlled by the Porsche and Pi\u00ebch families voting stock.", "start_char_pos": 241, "end_char_pos": 259}, {"type": "R", "before": "Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna", "after": "Porsche had previously tried to raise its 51\\% shares in Volkswagen to 75\\% in a take-over bid. A special German law grants Lower Saxony enough power to veto decisions with its 20\\% share in the VW company.", "start_char_pos": 260, "end_char_pos": 481}, {"type": "D", "before": "sf d f f f d f dsg", "after": null, "start_char_pos": 482, "end_char_pos": 500}, {"type": "D", "before": "dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj", "after": null, "start_char_pos": 501, "end_char_pos": 547}, {"type": "D", "before": "gjg", "after": null, "start_char_pos": 577, "end_char_pos": 580}, {"type": "D", "before": "gj gj jggj", "after": null, "start_char_pos": 581, "end_char_pos": 591}, {"type": "D", "before": "g fgj fg", "after": null, "start_char_pos": 621, "end_char_pos": 629}, {"type": "D", "before": "gj g gfj fgj gh k ghk f gk d gj xd d y", "after": null, "start_char_pos": 630, "end_char_pos": 668}, {"type": "D", "before": "fy d hd h fd h f f dfg s h f", "after": null, "start_char_pos": 698, "end_char_pos": 726}, {"type": "D", "before": "f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd", "after": null, "start_char_pos": 727, "end_char_pos": 790}, {"type": "D", "before": "g df f f", "after": null, "start_char_pos": 820, "end_char_pos": 828}, {"type": "D", "before": "j", "after": null, "start_char_pos": 829, "end_char_pos": 830}, {"type": "D", "before": "hk j j k j", "after": null, "start_char_pos": 860, "end_char_pos": 870}, {"type": "D", "before": "jkh", "after": null, "start_char_pos": 871, "end_char_pos": 874}, {"type": "D", "before": "h j hj j h", "after": null, "start_char_pos": 904, "end_char_pos": 914}, {"type": "D", "before": "j hj", "after": null, "start_char_pos": 915, "end_char_pos": 919}, {"type": "D", "before": "hj h", "after": null, "start_char_pos": 949, "end_char_pos": 953}, {"type": "D", "before": "h h", "after": null, "start_char_pos": 954, "end_char_pos": 957}, {"type": "D", "before": "hj h h h", "after": null, "start_char_pos": 987, "end_char_pos": 995}, {"type": "D", "before": "h ghk", "after": null, "start_char_pos": 996, "end_char_pos": 1001}, {"type": "D", "before": "l", "after": null, "start_char_pos": 1031, "end_char_pos": 1032}, {"type": "D", "before": "k", "after": null, "start_char_pos": 1033, "end_char_pos": 1034}, {"type": "D", "before": "llkl j k kll'k l' '", "after": null, "start_char_pos": 1064, "end_char_pos": 1083}, {"type": "D", "before": "k kl; kl lkkl lk kl lk'", "after": null, "start_char_pos": 1084, "end_char_pos": 1107}, {"type": "D", "before": "lklk kjkh", "after": null, "start_char_pos": 1137, "end_char_pos": 1146}, {"type": "D", "before": "k h h k j k", "after": null, "start_char_pos": 1147, "end_char_pos": 1158}, {"type": "D", "before": "j", "after": null, "start_char_pos": 1188, "end_char_pos": 1189}, {"type": "D", "before": "j j", "after": null, "start_char_pos": 1190, "end_char_pos": 1193}, {"type": "D", "before": "j", "after": null, "start_char_pos": 1223, "end_char_pos": 1224}, {"type": "D", "before": "Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna", "after": null, "start_char_pos": 1225, "end_char_pos": 1446}, {"type": "D", "before": "sf d f f f d f dsg", "after": null, "start_char_pos": 1476, "end_char_pos": 1494}, {"type": "D", "before": "dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj", "after": null, "start_char_pos": 1495, "end_char_pos": 1541}, {"type": "D", "before": "gjg", "after": null, "start_char_pos": 1571, "end_char_pos": 1574}, {"type": "D", "before": "gj gj jggj", "after": null, "start_char_pos": 1575, "end_char_pos": 1585}, {"type": "D", "before": "g fgj fg", "after": null, "start_char_pos": 1615, "end_char_pos": 1623}, {"type": "D", "before": "gj g gfj fgj gh k ghk f gk d gj xd d y", "after": null, "start_char_pos": 1653, "end_char_pos": 1691}, {"type": "D", "before": "fy d hd h fd h f f dfg s h f", "after": null, "start_char_pos": 1721, "end_char_pos": 1749}, {"type": "D", "before": "f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd", "after": null, "start_char_pos": 1779, "end_char_pos": 1842}, {"type": "D", "before": "g df f f", "after": null, "start_char_pos": 1872, "end_char_pos": 1880}, {"type": "D", "before": "j", "after": null, "start_char_pos": 1910, "end_char_pos": 1911}, {"type": "D", "before": "hk j j k j", "after": null, "start_char_pos": 1941, "end_char_pos": 1951}, {"type": "D", "before": "jkh", "after": null, "start_char_pos": 1981, "end_char_pos": 1984}, {"type": "D", "before": "h j hj j h", "after": null, "start_char_pos": 2014, "end_char_pos": 2024}, {"type": "D", "before": "j hj", "after": null, "start_char_pos": 2054, "end_char_pos": 2058}, {"type": "D", "before": "hj h", "after": null, "start_char_pos": 2088, "end_char_pos": 2092}, {"type": "D", "before": "h h", "after": null, "start_char_pos": 2122, "end_char_pos": 2125}, {"type": "D", "before": "hj h h h", "after": null, "start_char_pos": 2155, "end_char_pos": 2163}, {"type": "D", "before": "h ghk", "after": null, "start_char_pos": 2193, "end_char_pos": 2198}, {"type": "D", "before": "l", "after": null, "start_char_pos": 2228, "end_char_pos": 2229}, {"type": "D", "before": "k", "after": null, "start_char_pos": 2259, "end_char_pos": 2260}, {"type": "D", "before": "llkl j k kll'k l' '", "after": null, "start_char_pos": 2290, "end_char_pos": 2309}, {"type": "D", "before": "k kl; kl lkkl lk kl lk'", "after": null, "start_char_pos": 2339, "end_char_pos": 2362}, {"type": "D", "before": "lklk kjkh", "after": null, "start_char_pos": 2392, "end_char_pos": 2401}, {"type": "D", "before": "k h h k j k", "after": null, "start_char_pos": 2431, "end_char_pos": 2442}, {"type": "D", "before": "j", "after": null, "start_char_pos": 2472, "end_char_pos": 2473}, {"type": "D", "before": "j j", "after": null, "start_char_pos": 2503, "end_char_pos": 2506}, {"type": "D", "before": "Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna", "after": null, "start_char_pos": 2536, "end_char_pos": 2757}, {"type": "D", "before": "sf d f f f d f dsg", "after": null, "start_char_pos": 2787, "end_char_pos": 2805}, {"type": "D", "before": "dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj", "after": null, "start_char_pos": 2835, "end_char_pos": 2881}, {"type": "D", "before": "gjg", "after": null, "start_char_pos": 2911, "end_char_pos": 2914}, {"type": "D", "before": "gj gj jggj", "after": null, "start_char_pos": 2944, "end_char_pos": 2954}, {"type": "D", "before": "g fgj fg", "after": null, "start_char_pos": 2984, "end_char_pos": 2992}, {"type": "D", "before": "gj g gfj fgj gh k ghk f gk d gj xd d y", "after": null, "start_char_pos": 3022, "end_char_pos": 3060}, {"type": "D", "before": "fy d hd h fd h f f dfg s h f", "after": null, "start_char_pos": 3090, "end_char_pos": 3118}, {"type": "D", "before": "f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd", "after": null, "start_char_pos": 3148, "end_char_pos": 3211}, {"type": "D", "before": "g df f f", "after": null, "start_char_pos": 3241, "end_char_pos": 3249}, {"type": "D", "before": "j", "after": null, "start_char_pos": 3279, "end_char_pos": 3280}, {"type": "D", "before": "hk j j k j", "after": null, "start_char_pos": 3310, "end_char_pos": 3320}, {"type": "D", "before": "jkh", "after": null, "start_char_pos": 3350, "end_char_pos": 3353}, {"type": "D", "before": "h j hj j h", "after": null, "start_char_pos": 3383, "end_char_pos": 3393}, {"type": "D", "before": "j hj", "after": null, "start_char_pos": 3423, "end_char_pos": 3427}, {"type": "D", "before": "hj h", "after": null, "start_char_pos": 3457, "end_char_pos": 3461}, {"type": "D", "before": "h h", "after": null, "start_char_pos": 3491, "end_char_pos": 3494}, {"type": "D", "before": "hj h h h", "after": null, "start_char_pos": 3524, "end_char_pos": 3532}, {"type": "D", "before": "h ghk", "after": null, "start_char_pos": 3562, "end_char_pos": 3567}, {"type": "D", "before": "l", "after": null, "start_char_pos": 3597, "end_char_pos": 3598}, {"type": "D", "before": "k", "after": null, "start_char_pos": 3628, "end_char_pos": 3629}, {"type": "D", "before": "llkl j k kll'k l' '", "after": null, "start_char_pos": 3659, "end_char_pos": 3678}, {"type": "D", "before": "k kl; kl lkkl lk kl lk'", "after": null, "start_char_pos": 3708, "end_char_pos": 3731}, {"type": "D", "before": "lklk kjkh", "after": null, "start_char_pos": 3761, "end_char_pos": 3770}, {"type": "D", "before": "k h h k j k", "after": null, "start_char_pos": 3800, "end_char_pos": 3811}, {"type": "D", "before": "j", "after": null, "start_char_pos": 3841, "end_char_pos": 3842}, {"type": "D", "before": "Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna", "after": null, "start_char_pos": 3872, "end_char_pos": 4093}, {"type": "D", "before": "sf d f f f d f dsg", "after": null, "start_char_pos": 4123, "end_char_pos": 4141}, {"type": "D", "before": "dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj", "after": null, "start_char_pos": 4171, "end_char_pos": 4217}, {"type": "D", "before": "gjg", "after": null, "start_char_pos": 4247, "end_char_pos": 4250}, {"type": "D", "before": "gj gj jggj", "after": null, "start_char_pos": 4280, "end_char_pos": 4290}, {"type": "D", "before": "g fgj fg", "after": null, "start_char_pos": 4320, "end_char_pos": 4328}, {"type": "D", "before": "gj g gfj fgj gh k ghk f gk d gj xd d y", "after": null, "start_char_pos": 4358, "end_char_pos": 4396}, {"type": "D", "before": "fy d hd h fd h f f dfg s h f", "after": null, "start_char_pos": 4426, "end_char_pos": 4454}, {"type": "D", "before": "f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd", "after": null, "start_char_pos": 4484, "end_char_pos": 4547}, {"type": "D", "before": "g df f f", "after": null, "start_char_pos": 4577, "end_char_pos": 4585}, {"type": "D", "before": "j", "after": null, "start_char_pos": 4615, "end_char_pos": 4616}, {"type": "D", "before": "hk j j k j", "after": null, "start_char_pos": 4646, "end_char_pos": 4656}, {"type": "D", "before": "jkh", "after": null, "start_char_pos": 4686, "end_char_pos": 4689}, {"type": "D", "before": "h j hj j h", "after": null, "start_char_pos": 4719, "end_char_pos": 4729}, {"type": "D", "before": "j hj", "after": null, "start_char_pos": 4759, "end_char_pos": 4763}, {"type": "D", "before": "hj h", "after": null, "start_char_pos": 4793, "end_char_pos": 4797}, {"type": "D", "before": "h h", "after": null, "start_char_pos": 4827, "end_char_pos": 4830}, {"type": "D", "before": "hj h h h", "after": null, "start_char_pos": 4860, "end_char_pos": 4868}, {"type": "D", "before": "h ghk", "after": null, "start_char_pos": 4898, "end_char_pos": 4903}, {"type": "D", "before": "l", "after": null, "start_char_pos": 4933, "end_char_pos": 4934}, {"type": "D", "before": "k", "after": null, "start_char_pos": 4964, "end_char_pos": 4965}, {"type": "D", "before": "llkl j k kll'k l' '", "after": null, "start_char_pos": 4995, "end_char_pos": 5014}, {"type": "D", "before": "k kl; kl lkkl lk kl lk'", "after": null, "start_char_pos": 5044, "end_char_pos": 5067}, {"type": "D", "before": "lklk kjkh", "after": null, "start_char_pos": 5097, "end_char_pos": 5106}, {"type": "D", "before": "k h h k j k", "after": null, "start_char_pos": 5136, "end_char_pos": 5147}, {"type": "D", "before": "j", "after": null, "start_char_pos": 5177, "end_char_pos": 5178}, {"type": "D", "before": "Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna", "after": null, "start_char_pos": 5208, "end_char_pos": 5429}, {"type": "D", "before": "sf d f f f d f dsg", "after": null, "start_char_pos": 5459, "end_char_pos": 5477}, {"type": "D", "before": "dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj", "after": null, "start_char_pos": 5507, "end_char_pos": 5553}, {"type": "D", "before": "gjg", "after": null, "start_char_pos": 5583, "end_char_pos": 5586}, {"type": "D", "before": "gj gj jggj", "after": null, "start_char_pos": 5616, "end_char_pos": 5626}, {"type": "D", "before": "g fgj fg", "after": null, "start_char_pos": 5656, "end_char_pos": 5664}, {"type": "D", "before": "gj g gfj fgj gh k ghk f gk d gj xd d y", "after": null, "start_char_pos": 5694, "end_char_pos": 5732}, {"type": "D", "before": "fy d hd h fd h f f dfg s h f", "after": null, "start_char_pos": 5762, "end_char_pos": 5790}, {"type": "D", "before": "f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd", "after": null, "start_char_pos": 5820, "end_char_pos": 5883}, {"type": "D", "before": "g df f f", "after": null, "start_char_pos": 5913, "end_char_pos": 5921}, {"type": "D", "before": "j", "after": null, "start_char_pos": 5951, "end_char_pos": 5952}, {"type": "D", "before": "hk j j k j", "after": null, "start_char_pos": 5982, "end_char_pos": 5992}, {"type": "D", "before": "jkh", "after": null, "start_char_pos": 6022, "end_char_pos": 6025}, {"type": "D", "before": "h j hj j h", "after": null, "start_char_pos": 6055, "end_char_pos": 6065}, {"type": "D", "before": "j hj", "after": null, "start_char_pos": 6095, "end_char_pos": 6099}, {"type": "D", "before": "hj h", "after": null, "start_char_pos": 6129, "end_char_pos": 6133}, {"type": "D", "before": "h h", "after": null, "start_char_pos": 6163, "end_char_pos": 6166}, {"type": "D", "before": "hj h h h", "after": null, "start_char_pos": 6196, "end_char_pos": 6204}, {"type": "D", "before": "h ghk", "after": null, "start_char_pos": 6234, "end_char_pos": 6239}, {"type": "D", "before": "l", "after": null, "start_char_pos": 6269, "end_char_pos": 6270}, {"type": "D", "before": "k", "after": null, "start_char_pos": 6300, "end_char_pos": 6301}, {"type": "D", "before": "llkl j k kll'k l' '", "after": null, "start_char_pos": 6331, "end_char_pos": 6350}, {"type": "D", "before": "k kl; kl lkkl lk kl lk'", "after": null, "start_char_pos": 6380, "end_char_pos": 6403}, {"type": "D", "before": "lklk kjkh", "after": null, "start_char_pos": 6433, "end_char_pos": 6442}, {"type": "D", "before": "k h h k j k", "after": null, "start_char_pos": 6472, "end_char_pos": 6483}, {"type": "D", "before": "j", "after": null, "start_char_pos": 6513, "end_char_pos": 6514}, {"type": "R", "before": "Porsche", "after": "upVW Golf VI GTI \"I'm certain that we can and will advance our partnership in the difficult current year 2009,", "start_char_pos": 6544, "end_char_pos": 6551}, {"type": "R", "before": "Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna", "after": "have the stuff to develop the powerhouse of the international automobile industry\" said Martin Winterkorn chairman of the Volkswagen Group (Volkswagen AG) and Scania AB.", "start_char_pos": 6556, "end_char_pos": 6765}, {"type": "R", "before": "sf d f f f d f dsg", "after": "The merger would help Porsche with its \u20ac9 billion debt which it incurred partially due to the ailing economy as well as its attempt at a takeover bid.", "start_char_pos": 6766, "end_char_pos": 6784}, {"type": "D", "before": "dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj", "after": null, "start_char_pos": 6785, "end_char_pos": 6831}, {"type": "D", "before": "gjg", "after": null, "start_char_pos": 6861, "end_char_pos": 6864}, {"type": "D", "before": "gj gj jggj", "after": null, "start_char_pos": 6894, "end_char_pos": 6904}, {"type": "D", "before": "g fgj fg", "after": null, "start_char_pos": 6934, "end_char_pos": 6942}, {"type": "D", "before": "gj g gfj fgj gh k ghk f gk d gj xd d y", "after": null, "start_char_pos": 6972, "end_char_pos": 7010}, {"type": "D", "before": "fy d hd h fd h f f dfg s h f", "after": null, "start_char_pos": 7040, "end_char_pos": 7068}, {"type": "D", "before": "f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd", "after": null, "start_char_pos": 7098, "end_char_pos": 7161}, {"type": "D", "before": "g df f f", "after": null, "start_char_pos": 7191, "end_char_pos": 7199}, {"type": "D", "before": "j", "after": null, "start_char_pos": 7229, "end_char_pos": 7230}, {"type": "D", "before": "hk j j k j", "after": null, "start_char_pos": 7260, "end_char_pos": 7270}, {"type": "D", "before": "jkh", "after": null, "start_char_pos": 7300, "end_char_pos": 7303}, {"type": "D", "before": "h j hj j h", "after": null, "start_char_pos": 7333, "end_char_pos": 7343}, {"type": "D", "before": "j hj", "after": null, "start_char_pos": 7373, "end_char_pos": 7377}, {"type": "D", "before": "hj h", "after": null, "start_char_pos": 7407, "end_char_pos": 7411}, {"type": "D", "before": "h h", "after": null, "start_char_pos": 7441, "end_char_pos": 7444}, {"type": "D", "before": "hj h h h", "after": null, "start_char_pos": 7474, "end_char_pos": 7482}, {"type": "D", "before": "h ghk", "after": null, "start_char_pos": 7512, "end_char_pos": 7517}, {"type": "D", "before": "l", "after": null, "start_char_pos": 7547, "end_char_pos": 7548}, {"type": "D", "before": "k", "after": null, "start_char_pos": 7578, "end_char_pos": 7579}, {"type": "D", "before": "llkl j k kll'k l' '", "after": null, "start_char_pos": 7609, "end_char_pos": 7628}, {"type": "D", "before": "k kl; kl lkkl lk kl lk'", "after": null, "start_char_pos": 7658, "end_char_pos": 7681}, {"type": "D", "before": "lklk kjkh", "after": null, "start_char_pos": 7711, "end_char_pos": 7720}, {"type": "D", "before": "k h h k j k", "after": null, "start_char_pos": 7750, "end_char_pos": 7761}, {"type": "D", "before": "j", "after": null, "start_char_pos": 7791, "end_char_pos": 7792}, {"type": "D", "before": "Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna", "after": null, "start_char_pos": 7822, "end_char_pos": 8043}, {"type": "D", "before": "sf d f f f d f dsg", "after": null, "start_char_pos": 8073, "end_char_pos": 8091}, {"type": "D", "before": "dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj", "after": null, "start_char_pos": 8121, "end_char_pos": 8167}, {"type": "D", "before": "gjg", "after": null, "start_char_pos": 8197, "end_char_pos": 8200}, {"type": "D", "before": "gj gj jggj", "after": null, "start_char_pos": 8230, "end_char_pos": 8240}, {"type": "D", "before": "g fgj fg", "after": null, "start_char_pos": 8270, "end_char_pos": 8278}, {"type": "D", "before": "gj g gfj fgj gh k ghk f gk d gj xd d y", "after": null, "start_char_pos": 8308, "end_char_pos": 8346}, {"type": "D", "before": "fy d hd h fd h f f dfg s h f", "after": null, "start_char_pos": 8376, "end_char_pos": 8404}, {"type": "D", "before": "f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd", "after": null, "start_char_pos": 8434, "end_char_pos": 8497}, {"type": "D", "before": "g df f f", "after": null, "start_char_pos": 8527, "end_char_pos": 8535}, {"type": "D", "before": "j", "after": null, "start_char_pos": 8565, "end_char_pos": 8566}, {"type": "D", "before": "hk j j k j", "after": null, "start_char_pos": 8596, "end_char_pos": 8606}, {"type": "D", "before": "jkh", "after": null, "start_char_pos": 8636, "end_char_pos": 8639}, {"type": "D", "before": "h j hj j h", "after": null, "start_char_pos": 8669, "end_char_pos": 8679}, {"type": "D", "before": "j hj", "after": null, "start_char_pos": 8709, "end_char_pos": 8713}, {"type": "D", "before": "hj h", "after": null, "start_char_pos": 8743, "end_char_pos": 8747}, {"type": "D", "before": "h h", "after": null, "start_char_pos": 8777, "end_char_pos": 8780}, {"type": "D", "before": "hj h h h", "after": null, "start_char_pos": 8810, "end_char_pos": 8818}, {"type": "D", "before": "h ghk", "after": null, "start_char_pos": 8848, "end_char_pos": 8853}, {"type": "D", "before": "l", "after": null, "start_char_pos": 8883, "end_char_pos": 8884}, {"type": "D", "before": "k", "after": null, "start_char_pos": 8914, "end_char_pos": 8915}, {"type": "D", "before": "llkl j k kll'k l' '", "after": null, "start_char_pos": 8945, "end_char_pos": 8964}, {"type": "D", "before": "k kl; kl lkkl lk kl lk'", "after": null, "start_char_pos": 8994, "end_char_pos": 9017}, {"type": "D", "before": "lklk kjkh", "after": null, "start_char_pos": 9047, "end_char_pos": 9056}, {"type": "D", "before": "k h h k j k", "after": null, "start_char_pos": 9086, "end_char_pos": 9097}, {"type": "D", "before": "Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna", "after": null, "start_char_pos": 9127, "end_char_pos": 9348}, {"type": "D", "before": "sf d f f f d f dsg", "after": null, "start_char_pos": 9378, "end_char_pos": 9396}, {"type": "D", "before": "dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj", "after": null, "start_char_pos": 9426, "end_char_pos": 9472}, {"type": "D", "before": "gjg", "after": null, "start_char_pos": 9502, "end_char_pos": 9505}, {"type": "D", "before": "gj gj jggj", "after": null, "start_char_pos": 9535, "end_char_pos": 9545}, {"type": "D", "before": "g fgj fg", "after": null, "start_char_pos": 9575, "end_char_pos": 9583}, {"type": "D", "before": "gj g gfj fgj gh k ghk f gk d gj xd d y", "after": null, "start_char_pos": 9613, "end_char_pos": 9651}, {"type": "D", "before": "fy d hd h fd h f f dfg s h f", "after": null, "start_char_pos": 9681, "end_char_pos": 9709}, {"type": "D", "before": "f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd", "after": null, "start_char_pos": 9739, "end_char_pos": 9802}, {"type": "D", "before": "g df f f", "after": null, "start_char_pos": 9832, "end_char_pos": 9840}, {"type": "D", "before": "j", "after": null, "start_char_pos": 9870, "end_char_pos": 9871}, {"type": "D", "before": "hk j j k j", "after": null, "start_char_pos": 9901, "end_char_pos": 9911}, {"type": "D", "before": "jkh", "after": null, "start_char_pos": 9941, "end_char_pos": 9944}, {"type": "D", "before": "h j hj j h", "after": null, "start_char_pos": 9974, "end_char_pos": 9984}, {"type": "D", "before": "j hj", "after": null, "start_char_pos": 10014, "end_char_pos": 10018}, {"type": "D", "before": "hj h", "after": null, "start_char_pos": 10048, "end_char_pos": 10052}, {"type": "D", "before": "h h", "after": null, "start_char_pos": 10082, "end_char_pos": 10085}, {"type": "D", "before": "hj h h h", "after": null, "start_char_pos": 10115, "end_char_pos": 10123}, {"type": "D", "before": "h ghk", "after": null, "start_char_pos": 10153, "end_char_pos": 10158}, {"type": "D", "before": "l", "after": null, "start_char_pos": 10188, "end_char_pos": 10189}, {"type": "D", "before": "k", "after": null, "start_char_pos": 10219, "end_char_pos": 10220}, {"type": "D", "before": "llkl j k kll'k l' '", "after": null, "start_char_pos": 10250, "end_char_pos": 10269}, {"type": "D", "before": "k kl; kl lkkl lk kl lk'", "after": null, "start_char_pos": 10299, "end_char_pos": 10322}, {"type": "D", "before": "lklk kjkh", "after": null, "start_char_pos": 10352, "end_char_pos": 10361}, {"type": "D", "before": "k h h k j k", "after": null, "start_char_pos": 10391, "end_char_pos": 10402}, {"type": "D", "before": "j", "after": null, "start_char_pos": 10432, "end_char_pos": 10433}, {"type": "D", "before": "Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna", "after": null, "start_char_pos": 10463, "end_char_pos": 10684}, {"type": "D", "before": "sf d f f f d f dsg", "after": null, "start_char_pos": 10714, "end_char_pos": 10732}, {"type": "D", "before": "dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj", "after": null, "start_char_pos": 10762, "end_char_pos": 10808}, {"type": "D", "before": "gjg", "after": null, "start_char_pos": 10838, "end_char_pos": 10841}, {"type": "D", "before": "gj gj jggj", "after": null, "start_char_pos": 10871, "end_char_pos": 10881}, {"type": "D", "before": "g fgj fg", "after": null, "start_char_pos": 10911, "end_char_pos": 10919}, {"type": "D", "before": "gj g gfj fgj gh k ghk f gk d gj xd d y", "after": null, "start_char_pos": 10949, "end_char_pos": 10987}, {"type": "D", "before": "fy d hd h fd h f f dfg s h f", "after": null, "start_char_pos": 11017, "end_char_pos": 11045}, {"type": "D", "before": "f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd", "after": null, "start_char_pos": 11075, "end_char_pos": 11138}, {"type": "D", "before": "g df f f", "after": null, "start_char_pos": 11168, "end_char_pos": 11176}, {"type": "D", "before": "j", "after": null, "start_char_pos": 11206, "end_char_pos": 11207}, {"type": "D", "before": "hk j j k j", "after": null, "start_char_pos": 11237, "end_char_pos": 11247}, {"type": "D", "before": "jkh", "after": null, "start_char_pos": 11277, "end_char_pos": 11280}, {"type": "D", "before": "h j hj j h", "after": null, "start_char_pos": 11310, "end_char_pos": 11320}, {"type": "D", "before": "j hj", "after": null, "start_char_pos": 11350, "end_char_pos": 11354}, {"type": "D", "before": "hj h", "after": null, "start_char_pos": 11384, "end_char_pos": 11388}, {"type": "D", "before": "h h", "after": null, "start_char_pos": 11418, "end_char_pos": 11421}, {"type": "D", "before": "hj h h h", "after": null, "start_char_pos": 11451, "end_char_pos": 11459}, {"type": "D", "before": "h ghk", "after": null, "start_char_pos": 11489, "end_char_pos": 11494}, {"type": "D", "before": "l", "after": null, "start_char_pos": 11524, "end_char_pos": 11525}, {"type": "D", "before": "k", "after": null, "start_char_pos": 11555, "end_char_pos": 11556}, {"type": "D", "before": "llkl j k kll'k l' '", "after": null, "start_char_pos": 11586, "end_char_pos": 11605}, {"type": "D", "before": "k kl; kl lkkl lk kl lk'", "after": null, "start_char_pos": 11635, "end_char_pos": 11658}, {"type": "D", "before": "lklk kjkh", "after": null, "start_char_pos": 11688, "end_char_pos": 11697}, {"type": "D", "before": "k h h k j k", "after": null, "start_char_pos": 11727, "end_char_pos": 11738}, {"type": "D", "before": "j", "after": null, "start_char_pos": 11768, "end_char_pos": 11769}, {"type": "D", "before": "Porsche and Volkswagen family owners agreed to merge together Wednesday to create one large \u201cintegrated car-manufacturing group\u201d. 8=====D fuck you guys you suck dickkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkksnfdasjknfjsna", "after": null, "start_char_pos": 11799, "end_char_pos": 12020}, {"type": "D", "before": "sf d f f f d f dsg", "after": null, "start_char_pos": 12050, "end_char_pos": 12068}, {"type": "D", "before": "dh j fgj f gj fgjk f j gjfgj fg jfg j fgj g gj", "after": null, "start_char_pos": 12098, "end_char_pos": 12144}, {"type": "D", "before": "gjg", "after": null, "start_char_pos": 12174, "end_char_pos": 12177}, {"type": "D", "before": "gj gj jggj", "after": null, "start_char_pos": 12207, "end_char_pos": 12217}, {"type": "D", "before": "g fgj fg", "after": null, "start_char_pos": 12247, "end_char_pos": 12255}, {"type": "D", "before": "gj g gfj fgj gh k ghk f gk d gj xd d y", "after": null, "start_char_pos": 12285, "end_char_pos": 12323}, {"type": "D", "before": "fy d hd h fd h f f dfg s h f", "after": null, "start_char_pos": 12353, "end_char_pos": 12381}, {"type": "D", "before": "f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd", "after": null, "start_char_pos": 12411, "end_char_pos": 12474}, {"type": "D", "before": "g df f f", "after": null, "start_char_pos": 12504, "end_char_pos": 12512}, {"type": "D", "before": "j", "after": null, "start_char_pos": 12542, "end_char_pos": 12543}, {"type": "D", "before": "hk j j k j", "after": null, "start_char_pos": 12573, "end_char_pos": 12583}, {"type": "D", "before": "jkh", "after": null, "start_char_pos": 12613, "end_char_pos": 12616}, {"type": "D", "before": "h j hj j h", "after": null, "start_char_pos": 12646, "end_char_pos": 12656}, {"type": "D", "before": "j hj", "after": null, "start_char_pos": 12686, "end_char_pos": 12690}, {"type": "D", "before": "hj h", "after": null, "start_char_pos": 12720, "end_char_pos": 12724}, {"type": "D", "before": "h h", "after": null, "start_char_pos": 12754, "end_char_pos": 12757}, {"type": "D", "before": "hj h h h", "after": null, "start_char_pos": 12787, "end_char_pos": 12795}, {"type": "D", "before": "h ghk", "after": null, "start_char_pos": 12825, "end_char_pos": 12830}, {"type": "D", "before": "l", "after": null, "start_char_pos": 12860, "end_char_pos": 12861}, {"type": "D", "before": "k", "after": null, "start_char_pos": 12891, "end_char_pos": 12892}, {"type": "D", "before": "llkl j k kll'k l' '", "after": null, "start_char_pos": 12922, "end_char_pos": 12941}, {"type": "D", "before": "k kl; kl lkkl lk kl lk'", "after": null, "start_char_pos": 12971, "end_char_pos": 12994}, {"type": "D", "before": "lklk kjkh", "after": null, "start_char_pos": 13024, "end_char_pos": 13033}, {"type": "D", "before": "k h h k j k", "after": null, "start_char_pos": 13063, "end_char_pos": 13074}, {"type": "D", "before": "j", "after": null, "start_char_pos": 13104, "end_char_pos": 13105}, {"type": "D", "before": "j j", "after": null, "start_char_pos": 13135, "end_char_pos": 13138}, {"type": "D", "before": "j", "after": null, "start_char_pos": 13168, "end_char_pos": 13169}, {"type": "D", "before": "jk j", "after": null, "start_char_pos": 13199, "end_char_pos": 13203}, {"type": "D", "before": "j", "after": null, "start_char_pos": 13233, "end_char_pos": 13234}, {"type": "D", "before": "j j", "after": null, "start_char_pos": 13264, "end_char_pos": 13267}, {"type": "D", "before": "j", "after": null, "start_char_pos": 13297, "end_char_pos": 13298}, {"type": "D", "before": "jk j", "after": null, "start_char_pos": 13328, "end_char_pos": 13332}, {"type": "D", "before": "j", "after": null, "start_char_pos": 13362, "end_char_pos": 13363}, {"type": "D", "before": "j j", "after": null, "start_char_pos": 13393, "end_char_pos": 13396}, {"type": "D", "before": "j", "after": null, "start_char_pos": 13426, "end_char_pos": 13427}, {"type": "D", "before": "jk j", "after": null, "start_char_pos": 13457, "end_char_pos": 13461}, {"type": "D", "before": "j j", "after": null, "start_char_pos": 13491, "end_char_pos": 13494}, {"type": "D", "before": "j j", "after": null, "start_char_pos": 13524, "end_char_pos": 13527}, {"type": "D", "before": "j", "after": null, "start_char_pos": 13557, "end_char_pos": 13558}, {"type": "D", "before": "jk j", "after": null, "start_char_pos": 13588, "end_char_pos": 13592}, {"type": "D", "before": "j", "after": null, "start_char_pos": 13622, "end_char_pos": 13623}, {"type": "D", "before": "j j", "after": null, "start_char_pos": 13653, "end_char_pos": 13656}, {"type": "D", "before": "j", "after": null, "start_char_pos": 13686, "end_char_pos": 13687}, {"type": "D", "before": "jk j", "after": null, "start_char_pos": 13717, "end_char_pos": 13721}, {"type": "D", "before": "j j j", "after": null, "start_char_pos": 13751, "end_char_pos": 13756}, {"type": "D", "before": "j", "after": null, "start_char_pos": 13786, "end_char_pos": 13787}, {"type": "D", "before": "jk j", "after": null, "start_char_pos": 13817, "end_char_pos": 13821}, {"type": "D", "before": "j", "after": null, "start_char_pos": 13851, "end_char_pos": 13852}, {"type": "D", "before": "j j", "after": null, "start_char_pos": 13882, "end_char_pos": 13885}, {"type": "D", "before": "j", "after": null, "start_char_pos": 13915, "end_char_pos": 13916}, {"type": "D", "before": "jk j", "after": null, "start_char_pos": 13946, "end_char_pos": 13950}, {"type": "D", "before": "j j j", "after": null, "start_char_pos": 13980, "end_char_pos": 13985}, {"type": "D", "before": "j", "after": null, "start_char_pos": 14015, "end_char_pos": 14016}, {"type": "D", "before": "jk j", "after": null, "start_char_pos": 14046, "end_char_pos": 14050}, {"type": "D", "before": "j", "after": null, "start_char_pos": 14080, "end_char_pos": 14081}, {"type": "D", "before": "j", "after": null, "start_char_pos": 14111, "end_char_pos": 14112}, {"type": "D", "before": "jk j", "after": null, "start_char_pos": 14142, "end_char_pos": 14146}, {"type": "D", "before": "j", "after": null, "start_char_pos": 14176, "end_char_pos": 14177}, {"type": "D", "before": "jk j", "after": null, "start_char_pos": 14207, "end_char_pos": 14211}, {"type": "D", "before": "j f j gjfgj fg jfg j fgj g gj", "after": null, "start_char_pos": 14241, "end_char_pos": 14270}, {"type": "D", "before": "gjg", "after": null, "start_char_pos": 14300, "end_char_pos": 14303}, {"type": "D", "before": "gj gj jggj", "after": null, "start_char_pos": 14333, "end_char_pos": 14343}, {"type": "D", "before": "g fgj fg", "after": null, "start_char_pos": 14373, "end_char_pos": 14381}, {"type": "D", "before": "gj g gfj fgj gh k ghk f gk d gj xd d y", "after": null, "start_char_pos": 14411, "end_char_pos": 14449}, {"type": "D", "before": "fy d hd h fd h f f dfg s h f", "after": null, "start_char_pos": 14479, "end_char_pos": 14507}, {"type": "D", "before": "f h fg h h g h gjg j g j g j g j g j f d g df g d fg df g f gfd", "after": null, "start_char_pos": 14537, "end_char_pos": 14600}, {"type": "D", "before": "g df f f", "after": null, "start_char_pos": 14630, "end_char_pos": 14638}, {"type": "D", "before": "j", "after": null, "start_char_pos": 14668, "end_char_pos": 14669}, {"type": "D", "before": "hk j j k j", "after": null, "start_char_pos": 14699, "end_char_pos": 14709}, {"type": "D", "before": "jkh", "after": null, "start_char_pos": 14739, "end_char_pos": 14742}, {"type": "D", "before": "h j hj j h", "after": null, "start_char_pos": 14772, "end_char_pos": 14782}, {"type": "D", "before": "j hj", "after": null, "start_char_pos": 14812, "end_char_pos": 14816}, {"type": "D", "before": "hj h", "after": null, "start_char_pos": 14846, "end_char_pos": 14850}, {"type": "D", "before": "h h", "after": null, "start_char_pos": 14880, "end_char_pos": 14883}, {"type": "D", "before": "hj h h h", "after": null, "start_char_pos": 14913, "end_char_pos": 14921}, {"type": "D", "before": "h ghk", "after": null, "start_char_pos": 14951, "end_char_pos": 14956}, {"type": "D", "before": "l", "after": null, "start_char_pos": 14986, "end_char_pos": 14987}, {"type": "D", "before": "k", "after": null, "start_char_pos": 15017, "end_char_pos": 15018}, {"type": "D", "before": "llkl j k kll'k l' '", "after": null, "start_char_pos": 15048, "end_char_pos": 15067}, {"type": "D", "before": "k kl; kl lkkl lk kl lk'", "after": null, "start_char_pos": 15097, "end_char_pos": 15120}, {"type": "D", "before": "lklk kjkh", "after": null, "start_char_pos": 15150, "end_char_pos": 15159}, {"type": "D", "before": "k h h k j k", "after": null, "start_char_pos": 15189, "end_char_pos": 15200}, {"type": "D", "before": "j", "after": null, "start_char_pos": 15230, "end_char_pos": 15231}, {"type": "D", "before": "j j", "after": null, "start_char_pos": 15261, "end_char_pos": 15264}, {"type": "D", "before": "j", "after": null, "start_char_pos": 15294, "end_char_pos": 15295}, {"type": "R", "before": "jk j", "after": "Related news", "start_char_pos": 15325, "end_char_pos": 15329}], "sents_char_pos": [0, 129, 389, 403, 416, 482, 493, 504, 515, 530, 543, 558, 571, 584, 602, 1089, 1354, 1368, 1381, 1457, 1470, 1481, 1495, 1506, 1518, 1531, 1552, 1565, 1578, 1596, 1609, 1621, 1634, 1647, 1658, 1669, 1680, 1702, 1715, 1726, 1738, 1760, 1773, 1786, 1798, 1810, 1822, 2307, 2344, 2665, 2679, 2692, 2768, 2781, 2792, 2816, 2829, 2840, 2854, 2867, 2879, 2892, 2905, 2925, 2938, 2950, 2965, 2978, 2990, 3003, 3016, 3027, 3038, 3049, 3071, 3084, 3095, 3107, 3129, 3142, 3155, 3167, 3179, 3191, 3676, 3713, 4001, 4015, 4028, 4104, 4117, 4128, 4152, 4165, 4176, 4190, 4203, 4215, 4228, 4241, 4261, 4274, 4286, 4301, 4314, 4326, 4339, 4352, 4363, 4374, 4385, 4407, 4420, 4431, 4443, 4465, 4478, 4491, 4503, 4515, 4527, 5012, 5049, 5337, 5351, 5364, 5440, 5453, 5464, 5488, 5501, 5512, 5526, 5539, 5551, 5564, 5577, 5597, 5610, 5622, 5637, 5650, 5662, 5675, 5688, 5699, 5710, 5721, 5743, 5756, 5767, 5779, 5801, 5814, 5827, 5839, 5851, 5863, 6348, 6385, 6673, 6687, 6700, 6766, 6777, 6788, 6799, 6814, 6827, 6842, 6855, 6875, 6888, 6900, 6915, 6928, 6940, 6953, 6966, 6977, 6988, 6999, 7021, 7034, 7045, 7057, 7079, 7092, 7105, 7117, 7129, 7141, 7626, 7663, 7951, 7965, 7978, 8054, 8067, 8078, 8102, 8115, 8126, 8140, 8153, 8165, 8178, 8191, 8211, 8224, 8236, 8251, 8264, 8276, 8289, 8302, 8313, 8324, 8335, 8357, 8370, 8381, 8393, 8415, 8428, 8441, 8453, 8465, 8477, 8962, 8999, 9256, 9270, 9283, 9359, 9372, 9383, 9407, 9420, 9431, 9445, 9458, 9470, 9483, 9496, 9516, 9529, 9541, 9556, 9569, 9581, 9594, 9607, 9618, 9629, 9640, 9662, 9675, 9686, 9698, 9720, 9733, 9746, 9758, 9770, 9782, 10267, 10304, 10592, 10606, 10619, 10695, 10708, 10719, 10743, 10756, 10767, 10781, 10794, 10806, 10819, 10832, 10852, 10865, 10877, 10892, 10905, 10917, 10930, 10943, 10954, 10965, 10976, 10998, 11011, 11022, 11034, 11056, 11069, 11082, 11094, 11106, 11118, 11603, 11640, 11928, 11942, 11955, 12031, 12044, 12055, 12079, 12092, 12103, 12117, 12130, 12142, 12155, 12168, 12188, 12201, 12213, 12228, 12241, 12253, 12266, 12279, 12290, 12301, 12312, 12334, 12347, 12358, 12370, 12392, 12405, 12418, 12430, 12442, 12454, 12939, 12976, 12988, 13005, 13018, 13029, 13044, 13057, 13069, 13085, 13098, 13116, 13129, 13149, 13162, 13180, 13193, 13214, 13227, 13245, 13258, 13278, 13291, 13309, 13322, 13343, 13356, 13374, 13387, 13407, 13420, 13438, 13451, 13472, 13485, 13505, 13518, 13538, 13551, 13569, 13582, 13603, 13616, 13634, 13647, 13667, 13680, 13698, 13711, 13732, 13745, 13767, 13780, 13798, 13811, 13832, 13845, 13863, 13876, 13896, 13909, 13927, 13940, 13961, 13974, 13996, 14009, 14027, 14040, 14061, 14074, 14092, 14105, 14123, 14136, 14157, 14170, 14188, 14201, 14222, 14235, 14247, 14260, 14281, 14294, 14314, 14327, 14339, 14354, 14367, 14379, 14392, 14405, 14416, 14427, 14438, 14460, 14473, 14484, 14496, 14518, 14531, 14544, 14556, 14568, 14580, 15065, 15102]}
+{"doc_id": "126085", "revision_depth": "2", "before_revision": "Jesusita Fire climbing the side of Barger (Brush) Peak; from th111111111111111111111111111111111111111e west The recent w:111111111111111, 600 acres of land over the last four days. Over 75 homes were des11111111111111troyed , and more than1 30,500 residents were evacuated. Anothe1111111111111111111111111111111111111r 23, 00011111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111 are on standby to 11111111111111111111111leave immediately when the 11Maria Dillon |pub=Ass111111ociated Press|date=May 9,2009 URL Moore | pub111 ", "after_revision": "Jesusita Fire climbing the side of Barger (Brush) Peak; from the west The recent Jesusita Fire in Santa Barbara County, California, has burned more than 8, 600 acres of land over the last four days. Over 75 homes were destroyed , and more than 30,500 residents were evacuated. Another 23, 000 are on standby to leave immediately when the notice comes down. Approximately 3,500 homes along with 100 businesses are currently threatened by the blaze. \"Right now, if you are not evacuated in the Santa Barbara area, you are sheltering evacuees,\" said city Fire Chief Andrew DiMizio, \"We saw the fire spread laterally across the top of the city and the fire front extend to almost eight kilometers now.\" The firefighting crew on guard against the fire has amassed 2,300 firefighters with 246 fire engines, fourteen air tankers, fifteen helicopters as well as a DC-10 jumbo jet tanker. There have been no reports of residents being injured, however 11 firefighters have sustained injuries battling the fire, placing three in the hospital. | The Montecito Tea Fire in 2008 Related news", "edit_actions": [{"type": "R", "before": "th111111111111111111111111111111111111111e", "after": "the", "start_char_pos": 61, "end_char_pos": 103}, {"type": "R", "before": "w:111111111111111,", "after": "Jesusita Fire in Santa Barbara County, California, has burned more than 8,", "start_char_pos": 120, "end_char_pos": 138}, {"type": "R", "before": "des11111111111111troyed", "after": "destroyed", "start_char_pos": 201, "end_char_pos": 224}, {"type": "R", "before": "than1", "after": "than", "start_char_pos": 236, "end_char_pos": 241}, {"type": "R", "before": "Anothe1111111111111111111111111111111111111r", "after": "Another", "start_char_pos": 275, "end_char_pos": 319}, {"type": "R", "before": "00011111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111", "after": "000", "start_char_pos": 324, "end_char_pos": 476}, {"type": "R", "before": "11111111111111111111111leave", "after": "leave", "start_char_pos": 495, "end_char_pos": 523}, {"type": "R", "before": "11Maria Dillon |pub=Ass111111ociated Press|date=May 9,2009", "after": "notice comes down.", "start_char_pos": 545, "end_char_pos": 603}, {"type": "R", "before": "URL Moore", "after": "Approximately 3,500 homes along with 100 businesses are currently threatened by the blaze.", "start_char_pos": 604, "end_char_pos": 613}, {"type": "A", "before": null, "after": "\"Right now, if you are not evacuated in the Santa Barbara area, you are sheltering evacuees,\" said city Fire Chief Andrew DiMizio, \"We saw the fire spread laterally across the top of the city and the fire front extend to almost eight kilometers now.\"", "start_char_pos": 614, "end_char_pos": 614}, {"type": "A", "before": null, "after": "The firefighting crew on guard against the fire has amassed 2,300 firefighters with 246 fire engines, fourteen air tankers, fifteen helicopters as well as a DC-10 jumbo jet tanker.", "start_char_pos": 615, "end_char_pos": 615}, {"type": "A", "before": null, "after": "There have been no reports of residents being injured, however 11 firefighters have sustained injuries battling the fire, placing three in the hospital.", "start_char_pos": 616, "end_char_pos": 616}, {"type": "R", "before": "pub111", "after": "The Montecito Tea Fire in 2008", "start_char_pos": 619, "end_char_pos": 625}, {"type": "A", "before": null, "after": "Related news", "start_char_pos": 626, "end_char_pos": 626}], "sents_char_pos": [0, 55, 181, 274]}
+{"doc_id": "126114", "revision_depth": "1", "before_revision": "Mother 's Day was established on the second Sunday in May by Anna Jarvis after her mother passed away. Former United States President Woodrow Wilson proclaimed the inaugural Mother 's Day in 1914. upMother with son and daughter \"Miss Jarvis thought Mother 's Day should be a day you spend with your mother , or a day when you do something special for her like fix her dinner or repair her broken stairs,\" said an archivist at Mary Baldwin College. \" Mother 's Day has nothing to do with candy,\" said Jarvis, \"It's really a shame to waste flowers for Mother 's Day.\" This year again, the American congress approved the observance and requested the president to call upon citizens to partake in the time honoured recognition of this tradition. \"I, Barack Obama, President of the United States of America, do hereby proclaim May 10, 2009, as Mother 's Day. I urge all Americans to express their love, respect, and gratitude to mothers everywhere, and I call upon all citizens to observe this day with appropriate programs, ceremonies, and activities.\" Tara McDonald, the mother of abducted Woodstock, Ontario eight year old, Victoria (Tori) Stafford, said \"I would really hope to have my child home for Mother 's Day.\" McDonald said that dealing with Tori's absence since April 8 has resulted in \"times when I sit in my house and bawl my eyes out and I curl up into a ball and I sob.\" A mother under court order forbidding her access to her three children for three years was thrown in jail for approaching her child and telling him she loved him. The mother has been accused of turning the children against the father, a rich City financier who now has custody of the family's children. up Sleepy Baby painting by Mary Cassatt Gloria Steele, Acting Assistant Administrator for Global Health honours the 20th anniversary of the United States Agency for International Development (USAID), \"Women make extraordinary contributions as caregivers and caretakers, as well as breadwinners and bread-makers. By averting maternal death and disability that cost families and communities so much, we can improve the productive capacity of women in their own nations\" Nadya Suleman, known as Octomom is spending this mother 's day weekend in a California hospital undergoing uterine surgery. This operation will also make Suleman's family complete with fourteen children as she will no longer be able to physcially conceive a child following the surgery. Mary Ann Wright, known as \" Mother Wright\", died Thursday in Oakland, California, but not before achieving renown as advocate for the poor, and feeding the hungry. She founded the Mother May Ann Wright Foundation from her modest beginnings sparing meals to others while subsisting herself on Social Security checks. Maree Vaile is a mother of three who was humbled by New Zealand's Mother of the Year award. Her husband and children recognised the adversity the family has overcome and wanted to show their appreciation by nominating her in the \"Mums on Top\" online competition. In Taiwan, students from South Taiwan who attend University in North Taiwan could board a special train provided by the Taiwan Railway Adminsitration so they could visit their mothers on Mother 's Day. \"Give your mother a hug, a big and strong hug, because love is not only a noun, it is also a verb,\" President Ma Ying-jeou said, \"The older mothers grow, the greater is their need to feel needed. So we should show our love for our mother .\"", "after_revision": "Bitch 's Day was established on the second Sunday in May by Anna Jarvis after her bitch passed away. Former United States President Woodrow Wilson proclaimed the inaugural Bitch 's Day in 1914. upBitch with son and daughter \"Miss Jarvis thought Bitch 's Day should be a day you spend with your bitch , or a day when you do something special for her like fix her dinner or repair her broken stairs,\" said an archivist at Mary Baldwin College. \" Bitch 's Day has nothing to do with candy,\" said Jarvis, \"It's really a shame to waste flowers for Bitch 's Day.\" This year again, the American congress approved the observance and requested the president to call upon citizens to partake in the time honoured recognition of this tradition. \"I, Barack Obama, President of the United States of America, do hereby proclaim May 10, 2009, as Bitch 's Day. I urge all Americans to express their love, respect, and gratitude to bitchs everywhere, and I call upon all citizens to observe this day with appropriate programs, ceremonies, and activities.\" Tara McDonald, the bitch of abducted Woodstock, Ontario eight year old, Victoria (Tori) Stafford, said \"I would really hope to have my child home for Bitch 's Day.\" McDonald said that dealing with Tori's absence since April 8 has resulted in \"times when I sit in my house and bawl my eyes out and I curl up into a ball and I sob.\" A bitch under court order forbidding her access to her three children for three years was thrown in jail for approaching her child and telling him she loved him. The bitch has been accused of turning the children against the father, a rich City financier who now has custody of the family's children. up Sleepy Baby painting by Mary Cassatt Gloria Steele, Acting Assistant Administrator for Global Health honours the 20th anniversary of the United States Agency for International Development (USAID), \"Women make extraordinary contributions as caregivers and caretakers, as well as breadwinners and bread-makers. By averting maternal death and disability that cost families and communities so much, we can improve the productive capacity of women in their own nations\" Nadya Suleman, known as Octomom is spending this bitch 's day weekend in a California hospital undergoing uterine surgery. This operation will also make Suleman's family complete with fourteen children as she will no longer be able to physcially conceive a child following the surgery. Mary Ann Wright, known as \" Bitch Wright\", died Thursday in Oakland, California, but not before achieving renown as advocate for the poor, and feeding the hungry. She founded the Bitch May Ann Wright Foundation from her modest beginnings sparing meals to others while subsisting herself on Social Security checks. Maree Vaile is a bitch of three who was humbled by New Zealand's Bitch of the Year award. Her husband and children recognised the adversity the family has overcome and wanted to show their appreciation by nominating her in the \"Mums on Top\" online competition. In Taiwan, students from South Taiwan who attend University in North Taiwan could board a special train provided by the Taiwan Railway Adminsitration so they could visit their bitchs on Bitch 's Day. \"Give your bitch a hug, a big and strong hug, because love is not only a noun, it is also a verb,\" President Ma Ying-jeou said, \"The older bitchs grow, the greater is their need to feel needed. So we should show our love for our bitch .\"", "edit_actions": [{"type": "R", "before": "Mother", "after": "Bitch", "start_char_pos": 0, "end_char_pos": 6}, {"type": "R", "before": "mother", "after": "bitch", "start_char_pos": 83, "end_char_pos": 89}, {"type": "R", "before": "Mother", "after": "Bitch", "start_char_pos": 174, "end_char_pos": 180}, {"type": "R", "before": "upMother", "after": "upBitch", "start_char_pos": 197, "end_char_pos": 205}, {"type": "R", "before": "Mother", "after": "Bitch", "start_char_pos": 249, "end_char_pos": 255}, {"type": "R", "before": "mother", "after": "bitch", "start_char_pos": 299, "end_char_pos": 305}, {"type": "R", "before": "Mother", "after": "Bitch", "start_char_pos": 450, "end_char_pos": 456}, {"type": "R", "before": "Mother", "after": "Bitch", "start_char_pos": 550, "end_char_pos": 556}, {"type": "R", "before": "Mother", "after": "Bitch", "start_char_pos": 839, "end_char_pos": 845}, {"type": "R", "before": "mothers", "after": "bitchs", "start_char_pos": 924, "end_char_pos": 931}, {"type": "R", "before": "mother", "after": "bitch", "start_char_pos": 1068, "end_char_pos": 1074}, {"type": "R", "before": "Mother", "after": "Bitch", "start_char_pos": 1200, "end_char_pos": 1206}, {"type": "R", "before": "mother", "after": "bitch", "start_char_pos": 1384, "end_char_pos": 1390}, {"type": "R", "before": "mother", "after": "bitch", "start_char_pos": 1549, "end_char_pos": 1555}, {"type": "R", "before": "mother", "after": "bitch", "start_char_pos": 2202, "end_char_pos": 2208}, {"type": "R", "before": "Mother", "after": "Bitch", "start_char_pos": 2468, "end_char_pos": 2474}, {"type": "R", "before": "Mother", "after": "Bitch", "start_char_pos": 2620, "end_char_pos": 2626}, {"type": "R", "before": "mother", "after": "bitch", "start_char_pos": 2773, "end_char_pos": 2779}, {"type": "R", "before": "Mother", "after": "Bitch", "start_char_pos": 2822, "end_char_pos": 2828}, {"type": "R", "before": "mothers on Mother", "after": "bitchs on Bitch", "start_char_pos": 3195, "end_char_pos": 3212}, {"type": "R", "before": "mother", "after": "bitch", "start_char_pos": 3232, "end_char_pos": 3238}, {"type": "R", "before": "mothers", "after": "bitchs", "start_char_pos": 3361, "end_char_pos": 3368}, {"type": "R", "before": "mother", "after": "bitch", "start_char_pos": 3452, "end_char_pos": 3458}], "sents_char_pos": [0, 102, 447, 565, 741, 853, 1048, 1215, 1381, 1544, 1996, 2276, 2439, 2603, 2755, 2847, 3018, 3220, 3416]}
+{"doc_id": "126866", "revision_depth": "1", "before_revision": "Claiming their major trophy of the season, FC Barcelona dominated reigning champions Manchester United F.C. at the Stadio Olimpico in Rome Wednesday to win the 2009 Champions League Final 2 \u2013 0. Samuel Eto'o. After a shaky start, Samuel Eto'o shot the ball past Manchester United goalkeeper Edwin van der Sar in the tenth minute, the only goal Barcelona would need. Manchester had several great chances in the opening ten minutes, with Christiano Ronaldo forcing a save from Barca keeper V\u00edctor Vald\u00e9s in the second minute. However it was Eto'o who capitalized on his teams first real chance striking a low ball that van der Sar could get hands to. At the start of the second half, United looked to be on the offensive substituting Argentinian Carlos T\u00e9vez for the Brazilian Anderson and the Red Devils looked to have gained a boost for the first ten minutes of the half, but again Barcelona settled into a passing rhythm United could not break. In the 53rd minute, Xavi Hern\u00e1ndez 's free kick hit the crossbar, which proved to be Barca's best chance early in the half. Halfway into the second half, Dimitar Berbatov came on for Ji-Sung Park , but Berbatov proved no better and in the 70th minute Lionel Messi headed in a cross from Hern\u00e1ndez, giving Barca an insurance goal. Four minutes later, Barca captain Carles Puyol has a great chance on goal, but van der Saar in the United goal is equal to the task. In the next minute, United manager Sir Alex Ferguson, makes his third and final change, subbing in Paul Scholes for Ryan Giggs . Barcelona also earned two domestic trophies, earning both the La Liga and the Copa del Rey titles.", "after_revision": "Claiming their major trophy of the season, FC Barcelona dominated reigning champions Manchester United F.C. at the in Rome Wednesday to win the 2009 Champions League Final 2 \u2013 0. Samuel Eto'o. After a shaky start, shot the ball past Manchester United goalkeeper in the tenth minute, the only goal Barcelona would need. Manchester had several great chances in the opening ten minutes, with forcing a save from Barca keeper in the second minute. However it was Eto'o who capitalized on his teams first real chance striking a low ball that van der Sar could get hands to. At the start of the second half, United looked to be on the offensive substituting Argentinian for the Brazilian and the Red Devils looked to have gained a boost for the first ten minutes of the half, but again Barcelona settled into a passing rhythm United could not break. In the 53rd minute, 's free kick hit the crossbar, which proved to be Barca's best chance early in the half. Halfway into the second half, came on for , but Berbatov proved no better and in the 70th minute Lionel Messi headed in a cross from Hern\u00e1ndez, giving Barca an insurance goal. Four minutes later, Barca captain has a great chance on goal, but van der Saar in the United goal is equal to the task. In the next minute, United manager Sir Alex Ferguson, makes his third and final change, subbing in for . Barcelona also earned two domestic trophies, earning both the and the titles.", "edit_actions": [{"type": "D", "before": "Stadio Olimpico", "after": null, "start_char_pos": 115, "end_char_pos": 130}, {"type": "D", "before": "Samuel Eto'o", "after": null, "start_char_pos": 230, "end_char_pos": 242}, {"type": "D", "before": "Edwin van der Sar", "after": null, "start_char_pos": 291, "end_char_pos": 308}, {"type": "D", "before": "Christiano Ronaldo", "after": null, "start_char_pos": 436, "end_char_pos": 454}, {"type": "D", "before": "V\u00edctor Vald\u00e9s", "after": null, "start_char_pos": 488, "end_char_pos": 501}, {"type": "D", "before": "Carlos T\u00e9vez", "after": null, "start_char_pos": 744, "end_char_pos": 756}, {"type": "D", "before": "Anderson", "after": null, "start_char_pos": 775, "end_char_pos": 783}, {"type": "D", "before": "Xavi Hern\u00e1ndez", "after": null, "start_char_pos": 966, "end_char_pos": 980}, {"type": "D", "before": "Dimitar Berbatov", "after": null, "start_char_pos": 1100, "end_char_pos": 1116}, {"type": "D", "before": "Ji-Sung Park", "after": null, "start_char_pos": 1129, "end_char_pos": 1141}, {"type": "D", "before": "Carles Puyol", "after": null, "start_char_pos": 1310, "end_char_pos": 1322}, {"type": "R", "before": "Paul Scholes for Ryan Giggs", "after": "for", "start_char_pos": 1508, "end_char_pos": 1535}, {"type": "R", "before": "La Liga and the Copa del Rey", "after": "and the", "start_char_pos": 1600, "end_char_pos": 1628}], "sents_char_pos": [0, 208, 365, 523, 648, 945, 1069, 1275, 1408]}
+{"doc_id": "126916", "revision_depth": "1", "before_revision": "Anna MikkolaAnna Mikkola is running for European Parliament in Finland as a member of the eco-socialist Left Alliance party. At the age of 28 she's the youngest member of the 14 candidates on the Left Alliance's list for the multi-national body. She spoke to Wikinews during a break in campaigning. Finland votes in the European Parliament election on June 7. I believe I was 16 or 17 at the time, and I just stopped by at the local party office and asked if there was something I could do. There had just been a general election in Finland and the conservatives widely spoke of things I could not accept. Like [how] public financing for culture and sports is unnecessary. One politician even suggested young people could spend their time climbing trees and not expect society to provide them with facilities.So from there you went straight into the Left Youth . How did you choose that party? Did you explore others? It was between the Green party and the Left Alliance. The Greens I felt concentrated too much on individual life style choices as a method of doing politics, so I chose the Left Alliance. I have always been the sort of person who likes to think of structures and their effects, the big picture in a social sense if you may. Now, Finland's role in the world has fundamentally changed in your lifetime: from a neutral state with closer ties to the Soviet Union than many others in democratic Europe, to EU member and now potentially to NATO member. Do you think your youth makes it easier for you to adapt to the changes going on? We have an interesting Green party in Finland, who have accepted the necessity of additional nuclear power and support market mechanisms as a part of their climate policy without any questions or caveats. So yes, there is an attempt to create a green capitalist system . The youth as well are divided on this issue. Many people however do see the problems of turning the environment or climate action into products you can buy or sell and speculate with. In that sense I feel environmentalism cannot be separated from socialism, which has a fundamentally different logic. The other end, though, to the importance of the youth vote is voter apathy; how do you deal with the situation of \"celebrity\" candidates, in particular far-right candidates like Timo Soini ? In European elections the problem is apathy in general, not just youth apathy. But maybe you can separate between two types: many older people do not vote in these elections because they don't like the EU and/or because they feel they cannot change anything by voting since the EU is too big and too far way. These are choices, often resulting from considering the options. Many young people do not vote in elections in general, because they do not really even notice them. Their apathy is not a result of a decision, but genuinely a product of being out of the whle political process. This is something Timo Soini cannot change I think. His candidacy is a big risk for him in any case, since his party is a one man show to a great extent. If he buries himself in Brussels it might well be the end of that party.You've been working in Brussels yourself for over a year now; how did you stay in touch with the situation in Finland before the campaign began? Mostly by visiting Finland often. It's been two years that I have worked in the European parliament now. Working as a parliamentary assistant to a Finnish MEP kind of means you need to be aware of what is happening in Finland and what the papers are saying about it. Now let's talk policy; on your website you mention numerous issues with the Lisbon treaty but also say that EU membership isn't an either-or consideration. If you could re-write Lisbon, what would you take out, what would you put in? Simply put I would take out all the militarisation stuff, and remove the neoliberal economic thinking of no rules for the financial markets, and maybe remove some of the new policy areas. I would put in a social progress clause that would ensure rights (especially worker's rights) inside the EU and add a recognition for e.g. cross border strikes.On the subject of militarization, what would be the best alternative to the European Defence Agency ? What's the right path, if any, for collective European defense? Defense is a word that is understood very differently in different European countries. The Finnish tend to understand this term as passive defense, but many \u2014 especially old colonial countries \u2014 understand it in a more active sense, as including pre-emptive and aggressive operations outside EU borders. I believe the right path to be a firm concentration on non-aggressive peacekeeping . As for a common European defense, I am against the idea because of the abovementioned reasons. The European Defence Agency is basically an arms trading operation, when its role would maybe be better in co-ordination of crisis management and peacekeeping. That is for them to decide. However any European defence organisation would be based on NATO, and would not respect the status of non-allied countries. I believe the European Union should respect it.With regard to workers' rights, a number of parties on the left have raised objections to the Posted Workers Directive and the European Court of Justice's positions on the rights of workers from one EU country working in another. Finland both receives foreign workers and sends workers elsewhere; how could the Posted Workers Directive be best fixed, in your view? Solid majorities...The Finnish parliament started its proceedings with it before a translation was available. Then they ratified without any public discussion. I think there would be will, but it is clearly not appropriate to talk about it, since the Lisbon Treaty is presented as the only option. Besides, tax payers pay the politicians to do their job. With that money one would assume they would not say they don't have the energy for a new Treaty. I think such an alliance would be impossible in post-Lisbon EU too. The anti-European right tends to combine their act to anti-immigration as well in many cases, and very aggressively. I think with the current economic crisis there is an increased risk that the political right, even neofascism , could gain as people look for some way to express their frustration.So to wrap up, then: what's the best thing the next European Parliament can do, and what's the best thing you could do in the next European Parliament? Thank you, and now I have to run to my next event! ", "after_revision": "Anna Mikkola is running for as a member of the party. At the age of 28 she's the youngest member of the 14 candidates on the Left Alliance's list for the multi-national body. She spoke to Wikinews during a break in campaigning. Finland votes in the on June 7. I believe I was 16 or 17 at the time, and I just stopped by at the local party office and asked if there was something I could do. There had just been a and the conservatives widely spoke of things I could not accept. Like [how] public financing for culture and sports is unnecessary. One politician even suggested young people could spend their time climbing trees and not expect society to provide them with facilities.So from there you went straight into the . How did you choose that party? Did you explore others? It was between the and the Left Alliance. The Greens I felt concentrated too much on individual life style choices as a method of doing politics, so I chose the Left Alliance. I have always been the sort of person who likes to think of structures and their effects, the big picture in a social sense if you may. Now, Finland's has fundamentally changed in your lifetime: from a neutral state with than many others in democratic Europe, to member and now potentially to member. Do you think your youth makes it easier for you to adapt to the changes going on? We have an interesting Green party in Finland, who have accepted the necessity of additional nuclear power and support market mechanisms as a part of their climate policy without any questions or caveats. So yes, there is an attempt to create a . The youth as well are divided on this issue. Many people however do see the problems of turning the environment or climate action into products you can buy or sell and speculate with. In that sense I feel environmentalism cannot be separated from socialism, which has a fundamentally different logic. The other end, though, to the importance of the youth vote is voter apathy; how do you deal with the situation of \"celebrity\" candidates, in particular far-right candidates like ? In European elections the problem is apathy in general, not just youth apathy. But maybe you can separate between two types: many older people do not vote in these elections because they don't like the EU and/or because they feel they cannot change anything by voting since the EU is too big and too far way. These are choices, often resulting from considering the options. Many young people do not vote in elections in general, because they do not really even notice them. Their apathy is not a result of a decision, but genuinely a product of being out of the whle political process. This is something Timo Soini cannot change I think. His candidacy is a big risk for him in any case, since is a one man show to a great extent. If he buries himself in it might well be the end of that party.You've been working in Brussels yourself for over a year now; how did you stay in touch with the situation in Finland before the campaign began? Mostly by visiting Finland often. It's been two years that I have worked in the European parliament now. Working as a parliamentary assistant to a kind of means you need to be aware of what is happening in Finland and what the papers are saying about it. Now let's talk policy; on your website you mention numerous issues with the but also say that EU membership isn't an either-or consideration. If you could re-write Lisbon, what would you take out, what would you put in? Simply put I would take out all the militarisation stuff, and remove the economic thinking of no rules for the financial markets, and maybe remove some of the new policy areas. I would put in a social progress clause that would ensure rights (especially worker's rights) inside the EU and add a recognition for e.g. cross border strikes.On the subject of militarization, what would be the best alternative to the ? What's the right path, if any, for collective European defense? Defense is a word that is understood very differently in different European countries. The Finnish tend to understand this term as passive defense, but many \u2014 especially old colonial countries \u2014 understand it in a more active sense, as including pre-emptive and aggressive operations outside EU borders. I believe the right path to be a firm concentration on non-aggressive . As for a common European defense, I am against the idea because of the abovementioned reasons. The European Defence Agency is basically an arms trading operation, when its role would maybe be better in co-ordination of crisis management and peacekeeping. That is for them to decide. However any European defence organisation would be based on NATO, and would not respect the status of non-allied countries. I believe the European Union should respect it.With regard to workers' rights, a number of parties on the left have raised objections to the and the European Court of Justice's positions on the rights of workers from one EU country working in another. Finland both receives foreign workers and sends workers elsewhere; how could the Posted Workers Directive be best fixed, in your view? Solid majorities...The started its proceedings with it before a translation was available. Then they ratified without any public discussion. I think there would be will, but it is clearly not appropriate to talk about it, since the Lisbon Treaty is presented as the only option. Besides, tax payers pay the politicians to do their job. With that money one would assume they would not say they don't have the energy for a new Treaty. I think such an alliance would be impossible in post-Lisbon EU too. The anti-European right tends to combine their act to anti-immigration as well in many cases, and very aggressively. I think with the current economic crisis there is an increased risk that the political right, even , could gain as people look for some way to express their frustration.So to wrap up, then: what's the best thing the next European Parliament can do, and what's the best thing you could do in the next European Parliament? Thank you, and now I have to run to my next event! Sister links", "edit_actions": [{"type": "D", "before": "MikkolaAnna", "after": null, "start_char_pos": 5, "end_char_pos": 16}, {"type": "D", "before": "European Parliament in Finland", "after": null, "start_char_pos": 40, "end_char_pos": 70}, {"type": "D", "before": "eco-socialist Left Alliance", "after": null, "start_char_pos": 90, "end_char_pos": 117}, {"type": "D", "before": "European Parliament election", "after": null, "start_char_pos": 320, "end_char_pos": 348}, {"type": "D", "before": "general election in Finland", "after": null, "start_char_pos": 513, "end_char_pos": 540}, {"type": "D", "before": "Left Youth", "after": null, "start_char_pos": 850, "end_char_pos": 860}, {"type": "D", "before": "Green party", "after": null, "start_char_pos": 937, "end_char_pos": 948}, {"type": "D", "before": "role in the world", "after": null, "start_char_pos": 1257, "end_char_pos": 1274}, {"type": "D", "before": "closer ties to the Soviet Union", "after": null, "start_char_pos": 1345, "end_char_pos": 1376}, {"type": "D", "before": "EU", "after": null, "start_char_pos": 1419, "end_char_pos": 1421}, {"type": "D", "before": "NATO", "after": null, "start_char_pos": 1452, "end_char_pos": 1456}, {"type": "D", "before": "green capitalist system", "after": null, "start_char_pos": 1792, "end_char_pos": 1815}, {"type": "D", "before": "Timo Soini", "after": null, "start_char_pos": 2297, "end_char_pos": 2307}, {"type": "D", "before": "his party", "after": null, "start_char_pos": 3003, "end_char_pos": 3012}, {"type": "D", "before": "Brussels", "after": null, "start_char_pos": 3074, "end_char_pos": 3082}, {"type": "D", "before": "Finnish MEP", "after": null, "start_char_pos": 3414, "end_char_pos": 3425}, {"type": "D", "before": "Lisbon treaty", "after": null, "start_char_pos": 3610, "end_char_pos": 3623}, {"type": "D", "before": "neoliberal", "after": null, "start_char_pos": 3841, "end_char_pos": 3851}, {"type": "D", "before": "European Defence Agency", "after": null, "start_char_pos": 4192, "end_char_pos": 4215}, {"type": "D", "before": "peacekeeping", "after": null, "start_char_pos": 4656, "end_char_pos": 4668}, {"type": "D", "before": "Posted Workers Directive", "after": null, "start_char_pos": 5219, "end_char_pos": 5243}, {"type": "D", "before": "Finnish parliament", "after": null, "start_char_pos": 5513, "end_char_pos": 5531}, {"type": "D", "before": "neofascism", "after": null, "start_char_pos": 6226, "end_char_pos": 6236}, {"type": "A", "before": null, "after": "Sister links", "start_char_pos": 6510, "end_char_pos": 6510}], "sents_char_pos": [0, 124, 245, 298, 359, 490, 605, 672, 809, 862, 893, 917, 971, 1105, 1241, 1464, 1546, 1751, 1817, 1862, 2001, 2118, 2194, 2309, 2388, 2618, 2683, 2783, 2895, 2947, 3049, 3122, 3183, 3266, 3300, 3371, 3533, 3556, 3689, 3767, 3955, 4116, 4217, 4281, 4368, 4585, 4670, 4765, 4925, 4953, 5077, 5125, 5354, 5421, 5489, 5509, 5599, 5649, 5787, 5844, 5941, 6009, 6126, 6307, 6458]}
+{"doc_id": "128833", "revision_depth": "1", "before_revision": "NSA headquarters in Fort Meade , Maryland. A new USD $1.9 billion data center is planned for Camp Williams , Utah.Photo:NSA The Obama administration has given the National Security Agency powers to screen private Internet traffic going to and from government sites, and will use AT T telecommunications as a likely test site. The Obama administration remains firm in this decision, which was put forth during the Bush administration. The agency defends military networks with a classified system named Tutelag, which decides how to handle malware intrusions (for example, whether to block them or to investigate more closely). \"We absolutely intend to use the technical resources, the substantial ones, that NSA has,\" said Janet Napolitano, Secretary of the United States Department of Homeland Security (DHS). DHS's intrusion detection program, Einstein version 3, is in development as version 2 is being deployed. The program defends all U.S. government agencies and departments. In 2006 the Electronic Frontier Foundation filed the class action lawsuit Hepting v. AT T \u2014currently awaiting decision\u2014against AT&T, which under the Bush administration permitted the NSA to look at domestic communications without a warrant. NSA's intelligence gathering is limited only to foreign communications. \"We came away saying they have a lot of work in front of them to get this done right,\" Ari Schwartz of the Center for Democracy and Technology (CDT) said. \"We're looking forward to their next steps.\" Schwartz authored a letter on Einstein to the Office of Management and Budget in December 2008 on behalf of the Information Security and Privacy Advisory Board. NSA director Keith B. Alexander said in April 2009 that the NSA will help, but does not want to take charge. Several people\u2014including Rod Beckstrom , who resigned over the issue as head of the National Cyber Security Center (NCSC); Bruce Schneier of BT Counterpane; Leslie Harris , president and CEO of CDT\u2014and not Dennis Blair, Director of National Intelligence \u2014have urged the Obama administration to keep the Department of Homeland Security in charge despite its low scores, because, they claim, the NSA is a spy agency.", "after_revision": "NSA headquarters in , Maryland. A new USD $1.9 billion data center is planned for , Utah.Photo:NSA The Obama administration has given the powers to screen private Internet traffic going to and from government sites, and will use as a likely test site. The Obama administration remains firm in this decision, which was put forth during the Bush administration. The agency defends military networks with a classified system named Tutelag, which decides how to handle malware intrusions (for example, whether to block them or to investigate more closely). \"We absolutely intend to use the technical resources, the substantial ones, that NSA has,\" said , (DHS). DHS's intrusion detection program, version 3, is in development as version 2 is being deployed. The program defends all U.S. government agencies and departments. In 2006 the filed the class action lawsuit \u2014currently awaiting decision\u2014against AT&T, which under the Bush administration permitted the NSA to look at domestic communications without a warrant. NSA's intelligence gathering is limited only to foreign communications. \"We came away saying they have a lot of work in front of them to get this done right,\" of the (CDT) said. \"We're looking forward to their next steps.\" Schwartz authored a letter on Einstein to the in December 2008 on behalf of the Information Security and Privacy Advisory Board. NSA director said in April 2009 that the NSA will help, but does not want to take charge. Several people\u2014including , who resigned over the issue as head of the (NCSC); of ; , president and CEO of CDT\u2014and not , \u2014have urged the Obama administration to keep the Department of Homeland Security in charge despite its low scores, because, they claim, the NSA is a spy agency.", "edit_actions": [{"type": "D", "before": "Fort Meade", "after": null, "start_char_pos": 20, "end_char_pos": 30}, {"type": "D", "before": "Camp Williams", "after": null, "start_char_pos": 93, "end_char_pos": 106}, {"type": "D", "before": "National Security Agency", "after": null, "start_char_pos": 163, "end_char_pos": 187}, {"type": "D", "before": "AT", "after": null, "start_char_pos": 279, "end_char_pos": 281}, {"type": "D", "before": "T telecommunications", "after": null, "start_char_pos": 282, "end_char_pos": 302}, {"type": "R", "before": "Janet Napolitano, Secretary of the United States Department of Homeland Security", "after": ",", "start_char_pos": 723, "end_char_pos": 803}, {"type": "D", "before": "Einstein", "after": null, "start_char_pos": 846, "end_char_pos": 854}, {"type": "D", "before": "Electronic Frontier Foundation", "after": null, "start_char_pos": 994, "end_char_pos": 1024}, {"type": "D", "before": "Hepting v. AT", "after": null, "start_char_pos": 1056, "end_char_pos": 1069}, {"type": "D", "before": "T", "after": null, "start_char_pos": 1070, "end_char_pos": 1071}, {"type": "R", "before": "Ari Schwartz of the Center for Democracy and Technology", "after": "of the", "start_char_pos": 1382, "end_char_pos": 1437}, {"type": "D", "before": "Office of Management and Budget", "after": null, "start_char_pos": 1541, "end_char_pos": 1572}, {"type": "D", "before": "Keith B. Alexander", "after": null, "start_char_pos": 1669, "end_char_pos": 1687}, {"type": "D", "before": "Rod Beckstrom", "after": null, "start_char_pos": 1790, "end_char_pos": 1803}, {"type": "D", "before": "National Cyber Security Center", "after": null, "start_char_pos": 1849, "end_char_pos": 1879}, {"type": "R", "before": "Bruce Schneier of BT Counterpane; Leslie Harris", "after": "of ;", "start_char_pos": 1888, "end_char_pos": 1935}, {"type": "R", "before": "Dennis Blair, Director of National Intelligence", "after": ",", "start_char_pos": 1971, "end_char_pos": 2018}], "sents_char_pos": [0, 42, 114, 325, 433, 626, 810, 915, 981, 1222, 1294, 1449, 1494, 1655, 1764, 1887, 1921]}
+{"doc_id": "139093", "revision_depth": "1", "before_revision": "Disney president John Lasseter has announced that British actor Timothy Dalton will be voicing a character in Toy Story 3. Timothy Dalton . Dalton, who previously starred as James Bond in \" Licence to Kill and \" The Living Daylights \", will star as a thespian hedgehog called Mr. Pricklypants in Toy Story 3 , a film which is due for release in June 2010. Mr. Pricklypants is described as \"a hedgehog toy with thespian tendencies\". John Lasseter, Disney/ Pixar Chief Creative Officer, made the announcement at a Disney Animation Showcase in London, England on Thursday. At the same event it was announced that Mandy Moore would star in a cartoon based on the fairytale \" Rapunzel \" and that a James Bond-style character will appear in upcoming Disney/Pixar film \" Cars 2 \". In August 2009, it was also announced that Michael Keaton \u2014 from the movie \" Cars \" \u2014 would voice Ken, the boyfriend to Barbie in the film.", "after_revision": "president has announced that British actor will be voicing a character in . Dalton, who previously starred as in \" \" and \" \", will star as a hedgehog called Mr. Pricklypants in , a film which is due for release in June 2010. Mr. Pricklypants is described as \"a hedgehog toy with thespian tendencies\". John Lasseter, Disney/ Chief Creative Officer, made the announcement at a Disney Animation Showcase in , on Thursday. At the same event it was announced that would star in a cartoon based on the fairytale \" \" and that a James Bond-style character will appear in upcoming Disney/Pixar film \" \". In August 2009, it was also announced that \u2014 from the movie \" \" \u2014 would voice Ken, the boyfriend to in the film.", "edit_actions": [{"type": "R", "before": "Disney president John Lasseter", "after": "president", "start_char_pos": 0, "end_char_pos": 30}, {"type": "D", "before": "Timothy Dalton", "after": null, "start_char_pos": 64, "end_char_pos": 78}, {"type": "D", "before": "Toy Story 3. Timothy Dalton", "after": null, "start_char_pos": 110, "end_char_pos": 137}, {"type": "D", "before": "James Bond", "after": null, "start_char_pos": 174, "end_char_pos": 184}, {"type": "R", "before": "Licence to Kill", "after": "\"", "start_char_pos": 190, "end_char_pos": 205}, {"type": "D", "before": "The Living Daylights", "after": null, "start_char_pos": 212, "end_char_pos": 232}, {"type": "D", "before": "thespian", "after": null, "start_char_pos": 251, "end_char_pos": 259}, {"type": "D", "before": "Toy Story 3", "after": null, "start_char_pos": 296, "end_char_pos": 307}, {"type": "D", "before": "Pixar", "after": null, "start_char_pos": 455, "end_char_pos": 460}, {"type": "R", "before": "London, England", "after": ",", "start_char_pos": 541, "end_char_pos": 556}, {"type": "D", "before": "Mandy Moore", "after": null, "start_char_pos": 610, "end_char_pos": 621}, {"type": "D", "before": "Rapunzel", "after": null, "start_char_pos": 671, "end_char_pos": 679}, {"type": "D", "before": "Cars 2", "after": null, "start_char_pos": 764, "end_char_pos": 770}, {"type": "D", "before": "Michael Keaton", "after": null, "start_char_pos": 817, "end_char_pos": 831}, {"type": "D", "before": "Cars", "after": null, "start_char_pos": 851, "end_char_pos": 855}, {"type": "D", "before": "Barbie", "after": null, "start_char_pos": 894, "end_char_pos": 900}], "sents_char_pos": [0, 122, 355, 431, 569, 773]}
+{"doc_id": "140957", "revision_depth": "1", "before_revision": "__NOTOC__ __NOEDITSECTION__ A report accidentally published on the Internet provides insight into a secretive European Union surveillance project designed to monitor its citizens, as reported by Wikileaks earlier this month. Project INDECT aims to mine data from television, internet traffic, cellphone conversations, p2p file sharing and a range of other sources for crime prevention and threat prediction. The \u20ac14.68 million project began in January, 2009, and is scheduled to continue for five years under its current mandate. 200px|The INDECT project logo INDECT produced the accidentally published report as part of their \"Extraction of Information for Crime Prevention by Combining Web Derived Knowledge and Unstructured Data\" project, but do not enumerate all potential applications of the search and surveillance technology. Police are discussed as a prime example of users, with Polish and British forces detailed as active project participants. INDECT is funded under the European Commission's Seventh Framework Programme (FP7), and includes participation from Austria, Bulgaria, Czech Republic, France, Germany, Hungary, Poland, Slovakia, Spain, and the United Kingdom. Indicated in the initial trial's report, the scope of data collected is particularly broad; days of television news, radio, newspapers, and recorded telephone conversations are included. Several weeks of content from online sources were agglomerated, including mining Wikipedia for users' and article subjects' relations with others, organisations, and in-project movements. alt=Leaked Project INDECT presentation video|Leaked presentation video for Project INDECT. Watermarking of published digital works such as film, audio, or other documents is discussed in the Project INDECT remit; its purpose is to integrate and track this information, its movement within the system and across the Internet. An unreleased promotional video for INDECT located on YouTube is shown to the right. The simplified example of the system in operation shows a file of documents with a visible INDECT-titled cover taken from an office and exchanged in a car park. How the police are alerted to the document theft is unclear in the video; as a \"threat\", it would be the INDECT system's job to predict it. Throughout the video use of CCTV equipment, facial recognition, number plate reading , and aerial surveillance give friend-or-foe information with an overlaid map to authorities. The police proactively use this information to coordinate locating, pursuing, and capturing the document recipient. The file of documents is retrieved, and the recipient roughly detained. Technology research performed as part of Project INDECT has clear use in countering industrial and international espionage, although the potential use in maintaining any security and predicting leaks is much broader. Quoted in the UK's Daily Telegraph, Liberty 's director, Shami Chakrabarti, described a possible future implementation of INDECT as a \"sinister step\" with \"positively chilling\" repercussions Europe-wide. \"It is inevitable that the project has a sensitive dimension due to the security focussed goals of the project,\" Suresh Manandhar, leader of the University of York researchers involved in the \"Work Package 4\" INDECT component, responded to Wikinews. \"However, it is important to bear in mind that the scientific methods are much more general and has wider applications. The project will most likely have lot of commercial potential. The project has an Ethics board to oversee the project activities. As a responsible scientists [sic] it is of utmost importance to us that we conform to ethical guidelines.\" When approached by Wikinews about the implications of using INDECT, a representative of the U.K.'s Attorney General declined to comment on legal checks and balances such a system might require. Further U.K. enquiries were eventually referred to the Police Service of Northern Ireland, who have not yet responded. Wikinews Brian McNeil contacted Eddan Katz, the International Affairs Director for the Electronic Frontier Foundation (E.F.F.). Katz last spoke to Wikinews in early 2008 on copyright, not long after taking his current position with the E.F.F. He was back in Brussels to speak to EU officials, Project INDECT was on his agenda too \u2014 having learned of it only two weeks earlier. Katz linked Project INDECT with a September report, NeoConopticon \u2014 The EU Security-Industrial Complex, authored by Ben Hayes for the Transnational Institute . The report raises serious questions about the heavy involvement of defence and IT companies in \"security research\". The E.U. report Katz refers to was ratified just six days before the September 11 attacks that brought down the twin towers of the World Trade Center . In their analysis of the never-officially-recognised U.S. Echelon spy system it states, \"[i]n principle, activities and measures undertaken for the purposes of state security or law enforcement do not fall within the scope of the EC Treaty.\" On privacy and data-protection legislation enacted at E.U. level it comments, \"[such does] not apply to 'the processing of data/activities concerning public security, defence, state security (including the economic well-being of the state when the activities relate to state security matters) and the activities of the state in areas of criminal law'\".", "after_revision": "__NOTOC__ __NOEDITSECTION__ A report accidentally published on the Internet provides insight into a secretive European Union surveillance project designed to monitor its citizens, as reported by Wikileaks earlier this month. Project INDECT aims to mine data from television, internet traffic, cellphone conversations, and a range of other sources for crime prevention and threat prediction. The \u20ac14.68 million project began in January, 2009, and is scheduled to continue for five years under its current mandate. 200px|The INDECT project logo INDECT produced the accidentally published report as part of their \"Extraction of Information for Crime Prevention by Combining Web Derived Knowledge and Unstructured Data\" project, but do not enumerate all potential applications of the search and surveillance technology. Police are discussed as a prime example of users, with and forces detailed as active project participants. INDECT is funded under the European Commission's Seventh Framework Programme (FP7), and includes participation from Austria, Bulgaria, Czech Republic, France, Germany, Hungary, Poland, Slovakia, Spain, and the United Kingdom. Indicated in the initial trial's report, the scope of data collected is particularly broad; days of television news, radio, newspapers, and recorded telephone conversations are included. Several weeks of content from online sources were agglomerated, including mining Wikipedia for users' and article subjects' relations with others, organisations, and in-project movements. alt=Leaked Project INDECT presentation video|Leaked presentation video for Project INDECT. of published digital works such as film, audio, or other documents is discussed in the Project INDECT remit; its purpose is to integrate and track this information, its movement within the system and across the Internet. An unreleased promotional video for INDECT located on YouTube is shown to the right. The simplified example of the system in operation shows a file of documents with a visible INDECT-titled cover taken from an office and exchanged in a car park. How the police are alerted to the document theft is unclear in the video; as a \"threat\", it would be the INDECT system's job to predict it. Throughout the video use of equipment , , , and aerial surveillance give information with an overlaid map to authorities. The police proactively use this information to coordinate locating, pursuing, and capturing the document recipient. The file of documents is retrieved, and the recipient roughly detained. Technology research performed as part of Project INDECT has clear use in countering industrial and international espionage, although the potential use in maintaining any security and predicting leaks is much broader. Quoted in the UK's , 's director, Shami Chakrabarti, described a possible future implementation of INDECT as a \"sinister step\" with \"positively chilling\" repercussions Europe-wide. \"It is inevitable that the project has a sensitive dimension due to the security focussed goals of the project,\" Suresh Manandhar, leader of the researchers involved in the \"Work Package 4\" INDECT component, responded to Wikinews. \"However, it is important to bear in mind that the scientific methods are much more general and has wider applications. The project will most likely have lot of commercial potential. The project has an Ethics board to oversee the project activities. As a responsible scientists [sic] it is of utmost importance to us that we conform to ethical guidelines.\" When approached by Wikinews about the implications of using INDECT, a representative of the U.K.'s declined to comment on legal checks and balances such a system might require. Further U.K. enquiries were eventually referred to the Police Service of Northern Ireland, who have not yet responded. Wikinews Brian McNeil contacted Eddan Katz, the International Affairs Director for the (E.F.F.). Katz last spoke to Wikinews in early 2008 on copyright, not long after taking his current position with the E.F.F. He was back in to speak to EU officials, Project INDECT was on his agenda too \u2014 having learned of it only two weeks earlier. Katz linked Project INDECT with a September report, NeoConopticon \u2014 The EU Security-Industrial Complex, authored by Ben Hayes for the . The report raises serious questions about the heavy involvement of defence and IT companies in \"security research\". The E.U. report Katz refers to was ratified just six days before the that brought down the twin towers of the . In their analysis of the never-officially-recognised U.S. spy system it states, \"[i]n principle, activities and measures undertaken for the purposes of state security or law enforcement do not fall within the scope of the EC Treaty.\" On privacy and data-protection legislation enacted at E.U. level it comments, \"[such does] not apply to 'the processing of data/activities concerning public security, defence, state security (including the economic well-being of the state when the activities relate to state security matters) and the activities of the state in areas of criminal law'\".", "edit_actions": [{"type": "D", "before": "p2p file sharing", "after": null, "start_char_pos": 318, "end_char_pos": 334}, {"type": "R", "before": "Polish and British", "after": "and", "start_char_pos": 888, "end_char_pos": 906}, {"type": "D", "before": "Watermarking", "after": null, "start_char_pos": 1647, "end_char_pos": 1659}, {"type": "R", "before": "CCTV equipment, facial recognition, number plate reading", "after": "equipment", "start_char_pos": 2295, "end_char_pos": 2351}, {"type": "A", "before": null, "after": ", ,", "start_char_pos": 2354, "end_char_pos": 2354}, {"type": "D", "before": "friend-or-foe", "after": null, "start_char_pos": 2384, "end_char_pos": 2397}, {"type": "R", "before": "Daily Telegraph, Liberty", "after": ",", "start_char_pos": 2871, "end_char_pos": 2895}, {"type": "D", "before": "University of York", "after": null, "start_char_pos": 3201, "end_char_pos": 3219}, {"type": "D", "before": "Attorney General", "after": null, "start_char_pos": 3762, "end_char_pos": 3778}, {"type": "D", "before": "Electronic Frontier Foundation", "after": null, "start_char_pos": 4063, "end_char_pos": 4093}, {"type": "D", "before": "Brussels", "after": null, "start_char_pos": 4234, "end_char_pos": 4242}, {"type": "D", "before": "Transnational Institute", "after": null, "start_char_pos": 4487, "end_char_pos": 4510}, {"type": "D", "before": "September 11 attacks", "after": null, "start_char_pos": 4698, "end_char_pos": 4718}, {"type": "D", "before": "World Trade Center", "after": null, "start_char_pos": 4760, "end_char_pos": 4778}, {"type": "D", "before": "Echelon", "after": null, "start_char_pos": 4839, "end_char_pos": 4846}], "sents_char_pos": [0, 224, 407, 529, 832, 954, 1180, 1272, 1367, 1646, 1768, 1880, 1965, 2126, 2200, 2266, 2446, 2562, 2634, 2851, 3055, 3305, 3425, 3488, 3555, 3662, 3856, 3975, 4218, 4352, 4512, 4628, 4780, 5022]}
+{"doc_id": "145346", "revision_depth": "1", "before_revision": "Vyacheslav Tikhonov (1963 postcard photo) Famous Soviet and Russian actor Vyacheslav Tikhonov died on Friday at the age of 81. Born in 1928, he made his film debut in 1948. The first fame came in 1968, when he filmed in Sergei Bondarchuk's Oscar-winning War and Peace as Andrei Bolkonsky and in the We'll Live Till Monday in the leading role of history school teacher. He is best known for his role of the Soviet spy Standartenf\u00fchrer Stirlitz in the famous 1973 television series Seventeen Moments of Spring, Soviet classics about World War II. The Deputy Prime Minister of Russian Cabinet Sergei Ivanov and the former head of Foreign Intelligence Service told about him that \"this role personified an ideal Soviet spy \u2014 smart, refined, intelligent\". His later roles included the portrayal of a KGB General in 1984 television series TASS Is Authorized to Declare..., also written by the Moments author Yulian Semyonov, and the role in the award-winning 1994 film Burnt by the Sun. Russian state broadcasting company VGTRK recently presented a version of the 17 Moments with a restored color. It took approximately US $3,000 to colorize each minute of the film which gives $ 2,520,000 total . Also, the television series Isayev was released recently by Central Partnership, about the deeds of young Stirlitz, based on the novels by Semyonov. Isayev was played by Daniil Strahov. He was operated in the Central Clinical Hospital of Moscow last Saturday, but his health remained in a poor condition and he died after second infarction. Union Of Cinematographists of Russia specifically asked Yuriy Luzhkov, the Moscow mayor, to permit the burial of the People's Artist at Novodevichiye cemetery. Still, the date and place of the funeral will not be decided until Monday. He survived by second wife Tamara, daughter Anna Tikhonova (also an actor ) and four grandsons. His first wife Nonna Mordyukova died last year.", "after_revision": "Vyacheslav Tikhonov (1963 postcard photo) Famous Soviet and Russian actor Vyacheslav Tikhonov died Friday aged 81. Born in 1928, he made his film debut in 1948. The first fame came in 1968, when he featured in Sergei Bondarchuk's Oscar-winning War and Peace as Andrei Bolkonsky and in We'll Live Till Monday in the leading role of a history school teacher. He is best known for his role of the Soviet spy Standartenf\u00fchrer Stirlitz in the famous 1973 television series Seventeen Moments of Spring, Soviet classics about World War II. Deputy Prime Minister of the Russian Cabinet Sergei Ivanov , and the former head of the Foreign Intelligence Service , remarked that, \"this role personified an ideal Soviet spy \u2014 smart, refined, intelligent\". His later roles included the portrayal of a KGB General in the 1984 television series TASS Is Authorized to Declare..., also written by Moments author Yulian Semyonov, and the role in the award-winning 1994 film Burnt by the Sun. Russian state broadcasting company VGTRK recently presented a version of the 17 Moments with restored color. It took approximately US $3,000 to colorize each minute of the film, a $ 2,520,000 total cost. The television series Isayev was also released recently by Central Partnership, about the deeds of young Stirlitz, based on the novels by Semyonov. Isayev was played by Daniil Strahov. He was operated on in the Central Clinical Hospital of Moscow last Saturday, but his health remained in a poor condition and he died after a second infarction. Union Of Cinematographists of Russia specifically asked Yuriy Luzhkov, the Moscow mayor, to permit the burial of the People's Artist at Novodevichiye cemetery. The date and place of the funeral will not be decided until Monday. He is survived by second wife Tamara, daughter Anna Tikhonova (also in actoring ) and four grandsons. His first wife , Nonna Mordyukova, died last year.", "edit_actions": [{"type": "R", "before": "on Friday at the age of", "after": "Friday aged", "start_char_pos": 99, "end_char_pos": 122}, {"type": "R", "before": "filmed", "after": "featured", "start_char_pos": 210, "end_char_pos": 216}, {"type": "D", "before": "the", "after": null, "start_char_pos": 295, "end_char_pos": 298}, {"type": "A", "before": null, "after": "a", "start_char_pos": 345, "end_char_pos": 345}, {"type": "D", "before": "The", "after": null, "start_char_pos": 546, "end_char_pos": 549}, {"type": "A", "before": null, "after": "the", "start_char_pos": 575, "end_char_pos": 575}, {"type": "A", "before": null, "after": ",", "start_char_pos": 606, "end_char_pos": 606}, {"type": "A", "before": null, "after": "the", "start_char_pos": 630, "end_char_pos": 630}, {"type": "R", "before": "told about him that", "after": ", remarked that,", "start_char_pos": 660, "end_char_pos": 679}, {"type": "A", "before": null, "after": "the", "start_char_pos": 814, "end_char_pos": 814}, {"type": "D", "before": "the", "after": null, "start_char_pos": 888, "end_char_pos": 891}, {"type": "D", "before": "a", "after": null, "start_char_pos": 1079, "end_char_pos": 1080}, {"type": "R", "before": "$3,000 to colorize each minute of the film which gives $", "after": "$3,000 to colorize each minute of the film, a $", "start_char_pos": 1122, "end_char_pos": 1178}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1195, "end_char_pos": 1196}, {"type": "R", "before": "Also, the", "after": "cost. The", "start_char_pos": 1197, "end_char_pos": 1206}, {"type": "A", "before": null, "after": "also", "start_char_pos": 1236, "end_char_pos": 1236}, {"type": "A", "before": null, "after": "on", "start_char_pos": 1400, "end_char_pos": 1400}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1521, "end_char_pos": 1521}, {"type": "R", "before": "Still, the", "after": "The", "start_char_pos": 1701, "end_char_pos": 1711}, {"type": "A", "before": null, "after": "is", "start_char_pos": 1779, "end_char_pos": 1779}, {"type": "R", "before": "an actor", "after": "in actoring", "start_char_pos": 1842, "end_char_pos": 1850}, {"type": "R", "before": "Nonna Mordyukova", "after": ", Nonna Mordyukova,", "start_char_pos": 1888, "end_char_pos": 1904}], "sents_char_pos": [0, 172, 369, 545, 754, 985, 1096, 1196, 1346, 1383, 1540, 1700, 1775, 1872]}
+{"doc_id": "145597", "revision_depth": "1", "before_revision": "Massachusetts Attorney General Martha Coakley Massachusetts Attorney General Martha Coakley and Massachusetts State Senator Scott P. Brown who represents the Norfolk, Bristol & Middlesex District have won their parties' respective primaries amid low voter turnout to replace the seat of the late Ted Kennedy who died after losing his battle with brain cancer last August. Coakley won out by 47 percent over three other candidates, who included Representative Michael Capuano who represents Massachusetts' 8th congressional district; Alan Khazei , the co-founder and former CEO of City Year , a national youth service organization which was founded in Boston; and Stephen Pagliuca , a managing director of private equity firm Bain Capital and managing partner of the Boston Celtics basketball team. Brown, the State Senator for the Norfolk, Bristol & Middlesex District and an officer in the Army National Guard , won by a landslide with 89 percent over Jack E. Robinson III , an attorney and businessman who ran against Ted Kennedy as the Republican nominee in the 2000 Senate election along seeking two other offices. Massachusetts Secretary of the Commonwealth William F. Galvin said that he expected turnout to be \"very light\" with 500,000 to 900,000 voters out of Massachusetts 4.1 million registered voters participating. He added that the turnout would be much closer to \"to the 5 than to the 9.\" Galvin further noted that turnout would mostly consist of Democrat and Republican voters and not independents noting that, \"My instinct is that the independents are not participating.\" Capuano's campaign hoped that low turnout would help him due to the large number of voters in the Boston area where Capuano is widely known and liked due to his representation of the area plus his past as Mayor of Somerville , Massachusetts. The winner will take over the Senate seat once held by Ted Kennedy himself along with former Presidents John Quincy Adams and the brother of Ted Kennedy, John F. Kennedy. Other notable past Senators include Daniel Webster, Charles Sumner, Henry Cabot Lodge , and his son Henry Cabot Lodge Jr. The winner will replace Paul G. Kirk , a longtime friend of Senator Kennedy who is currently holding the seat as a interim appointee.", "after_revision": "Massachusetts Attorney General Martha Coakley Massachusetts and who represents the Norfolk, Bristol & Middlesex District have won their parties' respective primaries amid low voter turnout to of the late who died after losing his battle with brain cancer last August. Coakley won out by 47 percent over three other candidates, who included Representative who represents ; , the co-founder and former CEO of , a national youth service organization which was founded in Boston; and , a managing director of private equity firm and managing partner of the basketball team. Brown, the State Senator for the Norfolk, Bristol & Middlesex District and an officer in the , won by a landslide with 89 percent over , an attorney and businessman who ran against Ted Kennedy as the Republican nominee in the along seeking two other offices. said that he expected turnout to be \"very light\" with 500,000 to 900,000 voters out of Massachusetts 4.1 million registered voters participating. He added that the turnout would be much closer to \"to the 5 than to the 9.\" Galvin further noted that turnout would mostly consist of Democrat and Republican voters and not independents noting that, \"My instinct is that the independents are not participating.\" Capuano's campaign hoped that low turnout would help him due to the large number of voters in the Boston area where Capuano is widely known and liked due to his representation of the area plus his past as of , Massachusetts. The winner will take over the Senate seat once held by Ted Kennedy himself along with former Presidents and the brother of Ted Kennedy, . Other notable past Senators include , , , and his son The winner will replace , a longtime friend of Senator Kennedy who is currently holding the seat as a interim appointee.", "edit_actions": [{"type": "R", "before": "Attorney General Martha Coakley and Massachusetts State Senator Scott P. Brown", "after": "and", "start_char_pos": 60, "end_char_pos": 138}, {"type": "D", "before": "replace the seat", "after": null, "start_char_pos": 267, "end_char_pos": 283}, {"type": "D", "before": "Ted Kennedy", "after": null, "start_char_pos": 296, "end_char_pos": 307}, {"type": "R", "before": "Michael Capuano who represents Massachusetts' 8th congressional district; Alan Khazei", "after": "who represents ;", "start_char_pos": 459, "end_char_pos": 544}, {"type": "D", "before": "City Year", "after": null, "start_char_pos": 580, "end_char_pos": 589}, {"type": "D", "before": "Stephen Pagliuca", "after": null, "start_char_pos": 663, "end_char_pos": 679}, {"type": "D", "before": "Bain Capital", "after": null, "start_char_pos": 725, "end_char_pos": 737}, {"type": "D", "before": "Boston Celtics", "after": null, "start_char_pos": 766, "end_char_pos": 780}, {"type": "D", "before": "Army National Guard", "after": null, "start_char_pos": 891, "end_char_pos": 910}, {"type": "D", "before": "Jack E. Robinson III", "after": null, "start_char_pos": 953, "end_char_pos": 973}, {"type": "D", "before": "2000 Senate election", "after": null, "start_char_pos": 1065, "end_char_pos": 1085}, {"type": "D", "before": "Massachusetts Secretary of the Commonwealth William F. Galvin", "after": null, "start_char_pos": 1119, "end_char_pos": 1180}, {"type": "R", "before": "Mayor of Somerville", "after": "of", "start_char_pos": 1793, "end_char_pos": 1812}, {"type": "D", "before": "John Quincy Adams", "after": null, "start_char_pos": 1934, "end_char_pos": 1951}, {"type": "R", "before": "John F. Kennedy.", "after": ".", "start_char_pos": 1984, "end_char_pos": 2000}, {"type": "D", "before": "Daniel Webster, Charles Sumner, Henry Cabot Lodge", "after": null, "start_char_pos": 2037, "end_char_pos": 2086}, {"type": "A", "before": null, "after": ", ,", "start_char_pos": 2089, "end_char_pos": 2089}, {"type": "D", "before": "Henry Cabot Lodge Jr.", "after": null, "start_char_pos": 2102, "end_char_pos": 2123}, {"type": "D", "before": "Paul G. Kirk", "after": null, "start_char_pos": 2148, "end_char_pos": 2160}], "sents_char_pos": [0, 132, 371, 532, 658, 797, 1118, 1326, 1587, 1829, 2000, 2123]}
+{"doc_id": "146601", "revision_depth": "1", "before_revision": "The release of the movie Avatar , written and directed by James Cameron , has generated increased interest in the field of constructed language , also known as conlang. Cameron asked American linguistics professor Paul Frommer to develop a language spoken by the extraterrestrial people in the film known as the Na'vi . Klingon language alphabet, from Klingon Language Institute Author J. R. R. Tolkien developed Elvish languages for his literary series The Lord of the Rings . The Elvish language was featured in scenes of The Lord of the Rings film trilogy , directed by Peter Jackson . The Klingon language (tlhIngan Hol) was developed by linguist Marc Okrand , initially for use in the 1984 film Star Trek III: The Search for Spock . Okrand drew inspiration from Klingon lines spoken by actor James Doohan in the film Star Trek: The Motion Picture ; Doohan portrayed character Montgomery Scott in the Star Trek series. A dictionary for Klingon developed by Okrand, The Klingon Dictionary sold over 300,000 copies. Klingon became quite popular and has developed a usage among Star Trek fans. The Klingon Terran Research Ensemble in the Netherlands created an opera in Klingon. The play Hamlet by William Shakespeare was translated into Klingon. A German Trekkie who goes by the moniker Klenginem posted videos to YouTube where he raps songs he translated into Klingon by musician Eminem . Klenginem has been cited recently in pieces on constructed language in The New York Times, ABC News Nightline, and National Public Radio . \"You know your alien language has taken off when a German guy translates rap songs into it,\" said National Public Radio of Klenginem. Linguistics professor Frommer received his PhD degree from the University of Southern California (USC), and subsequently shifted his focus into the business arena. He returned to USC to teach at the Marshall School of Business . Cameron tasked Frommer with creating an entire language for the Na'vi people. In an interview with Geoff Boucher of the Los Angeles Times , Frommer voiced hope that the language would continue to be used separate from the movie, as Klingon has. \"I'm still working and I hope that the language will have a life of its own,\" said Frommer. The Na'vi language created by Frommer contains over 1,000 words, as well as a structural system and rules format for usage. Frommer told Vanity Fair that the language was fairly developed, commenting, \"It\u2019s got a perfectly consistent sound system, and grammar, orthography, syntax\". Frommer explained the direction given to him before creating the language, \"Cameron wanted something melodious and musical, something that would sound strange and alien but smooth and appealing.\" The Avatar writer-director provided Frommer with approximately three dozen words of the Na'vi language he used in his scriptment for the film. \"That was the starting point. Probably the most exotic thing I added were ejectives, which are these sorts of popping sounds that are found in different languages from around the world. It's found in Native American languages and in parts of Africa and in Central Asia, the Caucasus,\" explained Frommer. Cameron and Frommer worked together for four years developing the language. The linguistics professor relied on inspiration provided by Cameron, and avoided drawing upon influences from Elvish, Klingon, and the international auxiliary language Esperanto . Sample words in the Na'vi language include \"Unilt\u00ecrantokx\" (oo-neel-tih-RAHN-tokx), meaning \"Avatar\", and \"tireaioang\" (tee-REH-ah-ee-o-ahng), which means \"spirit animal\". Maclean's reported that fans of Avatar were anxious for more instructive material from professor Frommer about the language in order to learn how to speak it with others that appreciated the film. \"The response has been quite remarkable and totally unexpected. I never thought there\u2019d be this level of interest. But I really don\u2019t think of Na\u2019vi as a competitor to Klingon. If it does develop a following, that would be quite wonderful,\" said Frommer of the response to the language from Avatar fans. The Na'vi language is itself a minor plot point in the film Avatar. The character Jake Sully portrayed by Sam Worthington endeavors to learn the language while living on Pandora. A botanist portrayed by actress Sigourney Weaver instructs a scientist played by actor Joel David Moore on how to become conversational in the language. Zoe Salda\u00f1a , the actress behind warrior princess Neytiri in Avatar, picked up the Na'vi language faster than her fellow cast members. \"Zoe owned the language and everyone had to match her, even her accent,\" said Cameron. Salda\u00f1a remarked that the most difficult part about acting in the film was speaking in English with the accent of the Na'vi people. Cameron touted the rich nature of the Na'vi language in publicity for his film. \"We wanted to 'out-Klingon' Klingon. The best sci-fi movies immerse the audience in that world until it doesn't seem alien to them,\" said Cameron to USA Today .", "after_revision": "The release of the movie , written and directed by , has generated increased interest in the field of , also known as conlang. Cameron asked American professor to develop a language spoken by the extraterrestrial people in the film known as the . alphabet, from Author developed for his literary series . The Elvish language was featured in scenes of , directed by . The (tlhIngan Hol) was developed by linguist , initially for use in the 1984 film . Okrand drew inspiration from Klingon lines spoken by actor in the film ; Doohan portrayed character in the Star Trek series. A dictionary for Klingon developed by Okrand, sold over 300,000 copies. Klingon became quite popular and has developed a usage among Star Trek fans. The Klingon Terran Research Ensemble in the created an in Klingon. The play by was translated into Klingon. A German Trekkie who goes by the moniker Klenginem posted videos to YouTube where he raps songs he translated into Klingon by musician . Klenginem has been cited recently in pieces on constructed language in , , and . \"You know your alien language has taken off when a German guy translates rap songs into it,\" said National Public Radio of Klenginem. Linguistics professor Frommer received his degree from the (USC), and subsequently shifted his focus into the business arena. He returned to USC to teach at the . Cameron tasked Frommer with creating an entire language for the Na'vi people. In an interview with Geoff Boucher of the , Frommer voiced hope that the language would continue to be used separate from the movie, as Klingon has. \"I'm still working and I hope that the language will have a life of its own,\" said Frommer. The created by Frommer contains over 1,000 words, as well as a structural system and rules format for usage. Frommer told that the language was fairly developed, commenting, \"It\u2019s got a perfectly consistent sound system, and grammar, orthography, syntax\". Frommer explained the direction given to him before creating the language, \"Cameron wanted something melodious and musical, something that would sound strange and alien but smooth and appealing.\" The Avatar writer-director provided Frommer with approximately three dozen words of the Na'vi language he used in his for the film. \"That was the starting point. Probably the most exotic thing I added were ejectives, which are these sorts of popping sounds that are found in different languages from around the world. It's found in Native American languages and in parts of Africa and in Central Asia, the Caucasus,\" explained Frommer. Cameron and Frommer worked together for four years developing the language. The linguistics professor relied on inspiration provided by Cameron, and avoided drawing upon influences from Elvish, Klingon, and the . Sample words in the Na'vi language include \"Unilt\u00ecrantokx\" (oo-neel-tih-RAHN-tokx), meaning \"Avatar\", and \"tireaioang\" (tee-REH-ah-ee-o-ahng), which means \"spirit animal\". reported that fans of Avatar were anxious for more instructive material from professor Frommer about the language in order to learn how to speak it with others that appreciated the film. \"The response has been quite remarkable and totally unexpected. I never thought there\u2019d be this level of interest. But I really don\u2019t think of Na\u2019vi as a competitor to Klingon. If it does develop a following, that would be quite wonderful,\" said Frommer of the response to the language from Avatar fans. The Na'vi language is itself a minor plot point in the film Avatar. The character Jake Sully portrayed by endeavors to learn the language while living on Pandora. A portrayed by actress instructs a scientist played by actor on how to become conversational in the language. , the actress behind warrior princess Neytiri in Avatar, picked up the Na'vi language faster than her fellow cast members. \"Zoe owned the language and everyone had to match her, even her accent,\" said Cameron. Salda\u00f1a remarked that the most difficult part about acting in the film was speaking in English with the accent of the Na'vi people. Cameron touted the rich nature of the Na'vi language in publicity for his film. \"We wanted to 'out-Klingon' Klingon. The best sci-fi movies immerse the audience in that world until it doesn't seem alien to them,\" said Cameron to .", "edit_actions": [{"type": "D", "before": "Avatar", "after": null, "start_char_pos": 25, "end_char_pos": 31}, {"type": "D", "before": "James Cameron", "after": null, "start_char_pos": 58, "end_char_pos": 71}, {"type": "D", "before": "constructed language", "after": null, "start_char_pos": 123, "end_char_pos": 143}, {"type": "R", "before": "linguistics professor Paul Frommer", "after": "professor", "start_char_pos": 192, "end_char_pos": 226}, {"type": "D", "before": "Na'vi", "after": null, "start_char_pos": 312, "end_char_pos": 317}, {"type": "D", "before": "Klingon language", "after": null, "start_char_pos": 320, "end_char_pos": 336}, {"type": "R", "before": "Klingon Language Institute Author J. R. R. Tolkien developed Elvish languages", "after": "Author developed", "start_char_pos": 352, "end_char_pos": 429}, {"type": "D", "before": "The Lord of the Rings", "after": null, "start_char_pos": 454, "end_char_pos": 475}, {"type": "D", "before": "The Lord of the Rings film trilogy", "after": null, "start_char_pos": 524, "end_char_pos": 558}, {"type": "D", "before": "Peter Jackson", "after": null, "start_char_pos": 573, "end_char_pos": 586}, {"type": "D", "before": "Klingon language", "after": null, "start_char_pos": 593, "end_char_pos": 609}, {"type": "D", "before": "Marc Okrand", "after": null, "start_char_pos": 651, "end_char_pos": 662}, {"type": "D", "before": "Star Trek III: The Search for Spock", "after": null, "start_char_pos": 700, "end_char_pos": 735}, {"type": "D", "before": "James Doohan", "after": null, "start_char_pos": 797, "end_char_pos": 809}, {"type": "D", "before": "Star Trek: The Motion Picture", "after": null, "start_char_pos": 822, "end_char_pos": 851}, {"type": "D", "before": "Montgomery Scott", "after": null, "start_char_pos": 881, "end_char_pos": 897}, {"type": "D", "before": "The Klingon Dictionary", "after": null, "start_char_pos": 969, "end_char_pos": 991}, {"type": "R", "before": "Netherlands created an opera", "after": "created an", "start_char_pos": 1139, "end_char_pos": 1167}, {"type": "R", "before": "Hamlet by William Shakespeare", "after": "by", "start_char_pos": 1189, "end_char_pos": 1218}, {"type": "D", "before": "Eminem", "after": null, "start_char_pos": 1383, "end_char_pos": 1389}, {"type": "R", "before": "The New York Times, ABC News Nightline, and National Public Radio", "after": ", , and", "start_char_pos": 1463, "end_char_pos": 1528}, {"type": "D", "before": "PhD", "after": null, "start_char_pos": 1708, "end_char_pos": 1711}, {"type": "D", "before": "University of Southern California", "after": null, "start_char_pos": 1728, "end_char_pos": 1761}, {"type": "D", "before": "Marshall School of Business", "after": null, "start_char_pos": 1864, "end_char_pos": 1891}, {"type": "D", "before": "Los Angeles Times", "after": null, "start_char_pos": 2014, "end_char_pos": 2031}, {"type": "D", "before": "Na'vi language", "after": null, "start_char_pos": 2235, "end_char_pos": 2249}, {"type": "D", "before": "Vanity Fair", "after": null, "start_char_pos": 2368, "end_char_pos": 2379}, {"type": "D", "before": "scriptment", "after": null, "start_char_pos": 2828, "end_char_pos": 2838}, {"type": "D", "before": "international auxiliary language Esperanto", "after": null, "start_char_pos": 3368, "end_char_pos": 3410}, {"type": "D", "before": "Maclean's", "after": null, "start_char_pos": 3585, "end_char_pos": 3594}, {"type": "D", "before": "Sam Worthington", "after": null, "start_char_pos": 4192, "end_char_pos": 4207}, {"type": "D", "before": "botanist", "after": null, "start_char_pos": 4267, "end_char_pos": 4275}, {"type": "D", "before": "Sigourney Weaver", "after": null, "start_char_pos": 4297, "end_char_pos": 4313}, {"type": "D", "before": "Joel David Moore", "after": null, "start_char_pos": 4352, "end_char_pos": 4368}, {"type": "D", "before": "Zoe Salda\u00f1a", "after": null, "start_char_pos": 4418, "end_char_pos": 4429}, {"type": "D", "before": "USA Today", "after": null, "start_char_pos": 5001, "end_char_pos": 5010}], "sents_char_pos": [0, 168, 477, 588, 737, 853, 922, 1017, 1094, 1179, 1247, 1664, 1828, 1971, 2138, 2230, 2354, 2513, 2709, 2852, 2882, 3038, 3156, 3232, 3584, 3781, 3845, 3896, 3958, 4085, 4153, 4264, 4417, 4552, 4639, 4771, 4851, 4888]}
+{"doc_id": "15107", "revision_depth": "1", "before_revision": "At Buckingham Palace, Queen Elizabeth II stood on the forecourt in silence, accompanied by Foot Guards . Prime Minister Tony Blair marked the silence in the garden of 10 Downing Street , and Mayor of London Ken Livingstone paid his respects at Trafalgar Square . At The Open Championship taking place at St Andrews , golfers also paid their respects. Yesterday, Anfield stadium fell in silence during the Liverpool F.C. vs TNS UEFA Champios League football match. In Paris, France , President Jacques Chirac stood in silence at the Elysee Palace before taking part in the Bastille Day parade. The European Parliament marked the silence along with European Commission offices across the EU.", "after_revision": "At , stood on the forecourt in silence, accompanied by . Prime Minister Tony Blair marked the silence in the garden of , and Mayor of London paid his respects at . At taking place at , golfers also paid their respects. Yesterday, fell in silence during the vs football match. In , , President Jacques Chirac stood in silence at the before taking part in the parade. The marked the silence along with offices across the EU.", "edit_actions": [{"type": "R", "before": "Buckingham Palace, Queen Elizabeth II", "after": ",", "start_char_pos": 3, "end_char_pos": 40}, {"type": "D", "before": "Foot Guards", "after": null, "start_char_pos": 91, "end_char_pos": 102}, {"type": "D", "before": "10 Downing Street", "after": null, "start_char_pos": 167, "end_char_pos": 184}, {"type": "D", "before": "Ken Livingstone", "after": null, "start_char_pos": 207, "end_char_pos": 222}, {"type": "D", "before": "Trafalgar Square", "after": null, "start_char_pos": 244, "end_char_pos": 260}, {"type": "D", "before": "The Open Championship", "after": null, "start_char_pos": 266, "end_char_pos": 287}, {"type": "D", "before": "St Andrews", "after": null, "start_char_pos": 304, "end_char_pos": 314}, {"type": "D", "before": "Anfield stadium", "after": null, "start_char_pos": 362, "end_char_pos": 377}, {"type": "R", "before": "Liverpool F.C. vs TNS UEFA Champios League", "after": "vs", "start_char_pos": 405, "end_char_pos": 447}, {"type": "D", "before": "Paris, France", "after": null, "start_char_pos": 467, "end_char_pos": 480}, {"type": "A", "before": null, "after": ",", "start_char_pos": 483, "end_char_pos": 483}, {"type": "D", "before": "Elysee Palace", "after": null, "start_char_pos": 533, "end_char_pos": 546}, {"type": "D", "before": "Bastille Day", "after": null, "start_char_pos": 573, "end_char_pos": 585}, {"type": "D", "before": "European Parliament", "after": null, "start_char_pos": 598, "end_char_pos": 617}, {"type": "D", "before": "European Commission", "after": null, "start_char_pos": 648, "end_char_pos": 667}], "sents_char_pos": [0, 262, 350, 463, 593]}
+{"doc_id": "15180", "revision_depth": "3", "before_revision": "The Governor General of Canada Adrienne Clarkson signed an ordinance today removing David Ahenakew from membership in the Order of Canada . Ahenakew becomes the second person to be stripped of the honor; former NHLPA president Alan Eagleson was the first to be removed in 1998. Eagleson admitted guilt on charges of extortion and obstructing justice. Ahenakew was removed from the Order three days after being convicted of charges of willing promoting hatred against the Jewish people. The charges stem from comments made to a reporter in 2002 about Jews . Ahenakew stated that Jews were \"a disease\" and that Hitler was trying to \"clean up the world\" when he \"fried six million of those guys.\" The Advisory Council of the Order of Canada met on June 29 at Rideau Hall , the residence of the Governor General, to discuss Ahenakew's fate. After the meeting, Ahenakew was sent a letter, asking for him to respond to the possible revocation or surrender his membership voluntarily. A deadline for Ahenakew to respond was set at July 9, which Ahenakew did not. That led to Governor General signing the ordinance to remove Ahenakew from the Order. Ahenakew has to surrender his Order insignia , which consists of a medal , lapel pin, and scroll . Ahenakew loses the right to use post-nominal letters in his name, and loses the right to use the Order motto in his personal coat of arms .", "after_revision": "The signed an ordinance today removing from membership in the . Ahenakew becomes the second person to be stripped of the honor; former president was the first to be removed in . Eagleson admitted guilt on charges of extortion and obstructing justice. Ahenakew was removed from the Order three days after being convicted of charges of willing promoting hatred against the Jewish people. The charges stem from comments made to a reporter in about . Ahenakew stated that Jews were \"a disease\" and that was trying to \"clean up the world\" when he \"fried six million of those guys.\" The Advisory Council of the Order of Canada met on June 29 at , the residence of the Governor General, to discuss Ahenakew's fate. After the meeting, Ahenakew was sent a letter, asking for him to respond to the possible revocation or surrender his membership voluntarily. A deadline for Ahenakew to respond was set at July 9, which Ahenakew did not. That led to Governor General signing the ordinance to remove Ahenakew from the Order. Ahenakew has to surrender his Order , which consists of a , lapel pin, and . Ahenakew loses the right to use in his name, and loses the right to use the Order in his personal .", "edit_actions": [{"type": "D", "before": "Governor General of Canada Adrienne Clarkson", "after": null, "start_char_pos": 4, "end_char_pos": 48}, {"type": "D", "before": "David Ahenakew", "after": null, "start_char_pos": 84, "end_char_pos": 98}, {"type": "D", "before": "Order of Canada", "after": null, "start_char_pos": 122, "end_char_pos": 137}, {"type": "R", "before": "NHLPA president Alan Eagleson", "after": "president", "start_char_pos": 211, "end_char_pos": 240}, {"type": "R", "before": "1998.", "after": ".", "start_char_pos": 272, "end_char_pos": 277}, {"type": "R", "before": "2002 about Jews", "after": "about", "start_char_pos": 539, "end_char_pos": 554}, {"type": "D", "before": "Hitler", "after": null, "start_char_pos": 609, "end_char_pos": 615}, {"type": "D", "before": "Rideau Hall", "after": null, "start_char_pos": 756, "end_char_pos": 767}, {"type": "D", "before": "insignia", "after": null, "start_char_pos": 1178, "end_char_pos": 1186}, {"type": "D", "before": "medal", "after": null, "start_char_pos": 1209, "end_char_pos": 1214}, {"type": "D", "before": "scroll", "after": null, "start_char_pos": 1232, "end_char_pos": 1238}, {"type": "D", "before": "post-nominal letters", "after": null, "start_char_pos": 1273, "end_char_pos": 1293}, {"type": "D", "before": "motto", "after": null, "start_char_pos": 1344, "end_char_pos": 1349}, {"type": "D", "before": "coat of arms", "after": null, "start_char_pos": 1366, "end_char_pos": 1378}], "sents_char_pos": [0, 139, 203, 277, 350, 485, 556, 693, 836, 977, 1055, 1141, 1240]}
+{"doc_id": "15187", "revision_depth": "1", "before_revision": "One hundred students from Serbia who decide to start graduate studies abroad will get \u20ac15,000 a year scholarships from the Fund for young talents . Students who can apply need to have at least 8.5 GPA on 5 to 10 scale, and have to be younger then 26. Another condition is that they have to work in Serbia for at least 5 years after finishing their graduate studies. Winners will be decided based on their GPA and prestige of the university they apply to . Also, one thousand university seniors will be awarded \u20ac250 a month. The secretary of the Serbian Student Union, Marko Milovanovi\u0107, is satisfied with this action, but also notes that it would be better if economic needs of students were taken into account too . The Fund for young talents will cover about 2.5\\% of students in Serbia.", "after_revision": "One hundred students from Serbia who decide to pursue graduate studies abroad will get \u20ac15,000 a year scholarships from the Fund for Young Talents . Students who wish to apply must have at least an 8.5 GPA on 5 to 10 scale, and must be younger then 26. Additionally, students must commit to work in Serbia for at least 5 years after finishing their graduate studies. Scholarship will be awarded based on the student's GPA and the prestige of the university to which they apply . Also, one thousand university seniors will be awarded \u20ac250 a month. The secretary of the Serbian Student Union, Marko Milovanovi\u0107, is satisfied with this action, but also notes that it would be better if economic needs of students were taken into account as well . The Fund for Young Talents will provide funding to about 2.5\\% of students in Serbia.", "edit_actions": [{"type": "R", "before": "start", "after": "pursue", "start_char_pos": 47, "end_char_pos": 52}, {"type": "R", "before": "young talents", "after": "Young Talents", "start_char_pos": 132, "end_char_pos": 145}, {"type": "R", "before": "can apply need to", "after": "wish to apply must", "start_char_pos": 161, "end_char_pos": 178}, {"type": "A", "before": null, "after": "an", "start_char_pos": 193, "end_char_pos": 193}, {"type": "R", "before": "have to", "after": "must", "start_char_pos": 224, "end_char_pos": 231}, {"type": "R", "before": "Another condition is that they have", "after": "Additionally, students must commit", "start_char_pos": 252, "end_char_pos": 287}, {"type": "R", "before": "Winners will be decided based on their GPA and", "after": "Scholarship will be awarded based on the student's GPA and the", "start_char_pos": 367, "end_char_pos": 413}, {"type": "R", "before": "they apply to", "after": "to which they apply", "start_char_pos": 441, "end_char_pos": 454}, {"type": "R", "before": "too", "after": "as well", "start_char_pos": 712, "end_char_pos": 715}, {"type": "R", "before": "young talents will cover", "after": "Young Talents will provide funding to", "start_char_pos": 731, "end_char_pos": 755}], "sents_char_pos": [0, 251, 366, 524, 717]}
+{"doc_id": "155850", "revision_depth": "1", "before_revision": "Map of Schengen nations Libya and Switzerland have reportedly agreed to meet in an effort to resolve a diplomatic row about travel visas . Micheline Calmy-Rey of Switzerland and Moussa Koussa of Libya will meet in the presence of Miguel \u00c1ngel Moratinos of Spain. All three are the heads of foreign relations for their respective countries. The meeting comes at the urging of Malta and Italy. Libya announced on Tuesday that it has suspended and/or revoked visas given to citizens of the Schengen Area of Europe. Four Italian citizens have been detained at the Tripoli International Airport pending deportation, as their visas have been revoked. Confirming the situation, a Libyan official told Reuters : \"This is right. This decision has been taken. No visas for Europeans, except Britain.\" Malta has had eight citizens turned back. One of these told The Times of Malta, \"They treated us like hostages, not even allowing us out of the room to stretch our legs.\" The European Commission released a statement saying it \"deplores the unilateral and disproportionate\" action by Libya and that affected nations will consider an \"appropriate reaction.\" \"The Commission also regrets that travellers who legally obtained visas before the suspension measure were refused entry when arriving in Libya,\" said EU commissioner for Home Affairs, Cecilia Malmstr\u00f6m . Libya and Switzerland have been in a diplomatic row for many months. In July 2008, the Swiss for two days detained Libyan leader Muammar al-Gaddafi 's son, Hannibal, after hotel staff in Geneva complained of being assaulted. Hannibal was given a suspended sentence and released. Since then, Libya has withdrawn more than US 5 billion ( \u20ac 3.6 billlion) from Swiss banks and cut of oil exports to Switzerland. Libya then detained two Swiss businessmen and sentenced one to 16 months of prison on visa violation charges. In November, 2009, Switzerland asked Schengen nations to restrict Libyan visas. Subsequently, Libyan Prime Minister Baghdadi Mahmudi and other officials have been denied Schengen visas. Sawsan Chebli, a senior German Council on Foreign Relations (DGAP) said that, \"The EU is Libya\u2019s greatest trade and export partner. This is a leverage the EU could use. However, Italy and other EU member states with close relations with Libya in the past have shown that they are not interested to spoil their relations with Libya whatever Gaddafi\u2019s action may be. That is not likely to change. And the problem is that Gaddafi knows that he is able to divide the EU.\"", "after_revision": "Map of Schengen nations Libya and Switzerland have reportedly agreed to meet in an effort to resolve a diplomatic row about . of Switzerland and Moussa Koussa of Libya will meet in the presence of of Spain. All three are the for their respective countries. The meeting comes at the urging of Malta and Italy. Libya announced on Tuesday that it has suspended and/or revoked visas given to citizens of the of Europe. Four Italian citizens have been detained at the pending deportation, as their visas have been revoked. Confirming the situation, a Libyan official told : \"This is right. This decision has been taken. No visas for Europeans, except Britain.\" Malta has had eight citizens turned back. One of these told of Malta, \"They treated us like hostages, not even allowing us out of the room to stretch our legs.\" The released a statement saying it \"deplores the unilateral and disproportionate\" action by Libya and that affected nations will consider an \"appropriate reaction.\" \"The Commission also regrets that travellers who legally obtained visas before the suspension measure were refused entry when arriving in Libya,\" said EU commissioner for Home Affairs, . Libya and Switzerland have been in a diplomatic row for many months. In July 2008, the Swiss for two days detained Libyan leader 's son, Hannibal, after hotel staff in complained of being assaulted. Hannibal was given a suspended sentence and released. Since then, Libya has withdrawn more than 5 billion ( 3.6 billlion) from Swiss banks and cut of oil exports to Switzerland. Libya then detained two Swiss businessmen and sentenced one to 16 months of prison on visa violation charges. In November, 2009, Switzerland asked Schengen nations to restrict Libyan visas. Subsequently, Libyan Prime Minister and other officials have been denied Schengen visas. Sawsan Chebli, a senior (DGAP) said that, \"The EU is Libya\u2019s greatest trade and export partner. This is a leverage the EU could use. However, Italy and other EU member states with close relations with Libya in the past have shown that they are not interested to spoil their relations with Libya whatever Gaddafi\u2019s action may be. That is not likely to change. And the problem is that Gaddafi knows that he is able to divide the EU.\"", "edit_actions": [{"type": "D", "before": "travel visas", "after": null, "start_char_pos": 124, "end_char_pos": 136}, {"type": "D", "before": "Micheline Calmy-Rey", "after": null, "start_char_pos": 139, "end_char_pos": 158}, {"type": "D", "before": "Miguel \u00c1ngel Moratinos", "after": null, "start_char_pos": 230, "end_char_pos": 252}, {"type": "D", "before": "heads of foreign relations", "after": null, "start_char_pos": 281, "end_char_pos": 307}, {"type": "D", "before": "Schengen Area", "after": null, "start_char_pos": 487, "end_char_pos": 500}, {"type": "D", "before": "Tripoli International Airport", "after": null, "start_char_pos": 560, "end_char_pos": 589}, {"type": "D", "before": "Reuters", "after": null, "start_char_pos": 694, "end_char_pos": 701}, {"type": "D", "before": "The Times", "after": null, "start_char_pos": 851, "end_char_pos": 860}, {"type": "D", "before": "European Commission", "after": null, "start_char_pos": 966, "end_char_pos": 985}, {"type": "D", "before": "Cecilia Malmstr\u00f6m", "after": null, "start_char_pos": 1332, "end_char_pos": 1349}, {"type": "D", "before": "Muammar al-Gaddafi", "after": null, "start_char_pos": 1481, "end_char_pos": 1499}, {"type": "D", "before": "Geneva", "after": null, "start_char_pos": 1539, "end_char_pos": 1545}, {"type": "D", "before": "US", "after": null, "start_char_pos": 1673, "end_char_pos": 1675}, {"type": "D", "before": "\u20ac", "after": null, "start_char_pos": 1688, "end_char_pos": 1689}, {"type": "D", "before": "Baghdadi Mahmudi", "after": null, "start_char_pos": 1986, "end_char_pos": 2002}, {"type": "D", "before": "German Council on Foreign Relations", "after": null, "start_char_pos": 2080, "end_char_pos": 2115}], "sents_char_pos": [0, 138, 262, 339, 391, 511, 644, 719, 749, 790, 832, 961, 1420, 1576, 1630, 1759, 1869, 1949, 2055, 2187, 2224, 2420, 2450]}
+{"doc_id": "15757", "revision_depth": "1", "before_revision": "Today the Hewlett-Packard Co. has announced that it will be cutting 10\\% or 14,500 of it's full-time staff wil be cut over the course of the next six quarters. HP CEO Mark Hurd, who 's had office for just about three months now , has decided that he wishes to simplify HP's operations by combining sales and marketing directly into business units. The job cuts are expected to save HP $1.9 billion US annually. These cuts are all part of HP's new restructuring plan, the savings from this restructuring will primarily be to \u201coffset market forces\u201d or in other words, to strengthen HP's competitiveness in the market. The job cuts come after prolonged analyst speculation that HP would be announcing between 10,000 and 25,000 losses. Few losses are expected in the areas of Sales nor in Research & Development. The media in Ireland, where HP has over 4,000 employees across seven business units, has reacted cautiously to the announcement urging that more details should be waited for before making any comments. The news however has made national headlines and workers are understandably anxious to find out more details.", "after_revision": "Today the Hewlett-Packard Co. has announced that 10\\% or 14,500 of its full-time staff will be cut over the course of the next six quarters. HP CEO Mark Hurd, who took office about three months ago , has decided to simplify HP's operations by combining sales and marketing directly into business units. The job cuts are expected to save HP US $1.9 billion annually. These cuts are all part of HP's new restructuring plan, the savings from which will primarily be used to \u201coffset market forces\u201d , in other words, to strengthen HP's competitiveness in the market. The job cuts come after prolonged analyst speculation that HP would be announcing between 10,000 and 25,000 losses. Few losses are expected in the areas of Sales or Research & Development. The media in Ireland, where HP has over 4,000 employees across seven business units, has reacted cautiously to the announcement urging that more details should be awaited for before making any comments. The news however has made national headlines and workers are understandably anxious to find out more details.", "edit_actions": [{"type": "D", "before": "it will be cutting", "after": null, "start_char_pos": 49, "end_char_pos": 67}, {"type": "R", "before": "it's", "after": "its", "start_char_pos": 86, "end_char_pos": 90}, {"type": "R", "before": "wil", "after": "will", "start_char_pos": 107, "end_char_pos": 110}, {"type": "R", "before": "'s had office for just", "after": "took office", "start_char_pos": 182, "end_char_pos": 204}, {"type": "R", "before": "now", "after": "ago", "start_char_pos": 224, "end_char_pos": 227}, {"type": "D", "before": "that he wishes", "after": null, "start_char_pos": 242, "end_char_pos": 256}, {"type": "A", "before": null, "after": "US", "start_char_pos": 385, "end_char_pos": 385}, {"type": "D", "before": "US", "after": null, "start_char_pos": 399, "end_char_pos": 401}, {"type": "R", "before": "this restructuring", "after": "which", "start_char_pos": 485, "end_char_pos": 503}, {"type": "A", "before": null, "after": "used", "start_char_pos": 522, "end_char_pos": 522}, {"type": "R", "before": "or", "after": ",", "start_char_pos": 549, "end_char_pos": 551}, {"type": "R", "before": "nor in", "after": "or", "start_char_pos": 780, "end_char_pos": 786}, {"type": "R", "before": "waited", "after": "awaited", "start_char_pos": 974, "end_char_pos": 980}], "sents_char_pos": [0, 159, 347, 411, 617, 733, 810, 1012]}
+{"doc_id": "16289", "revision_depth": "1", "before_revision": "Beginning 2006, all horses in the EU must have passports, according to new rules from the European Union. Two thirds of all horses in Sweden are estimated to not have passports, says Britta Lundstr\u00f6m at the Swedish Ministry of Agriculture (Jordbruksverket) to the news agency TT. If the owner of a horse doesn't get a passport for their animal before the end of the year, they will be breaking the law. The Ministry of Agriculture has had problems reaching horse owners who don't reading horse magazines. Because of this, the ministry is planning a campaign this autumn. The passport contains information on the owner, the race and number. A photograph isn't mandatory however, but a description of the horse's appearance is required.", "after_revision": "Beginning in 2006, all horses in the EU will be required to have passports, according to new rules from the European Union. Two thirds of all horses in Sweden are estimated to not have passports, Britta Lundstr\u00f6m at the Swedish Ministry of Agriculture (Jordbruksverket) told news agency TT. If the owner of a horse doesn't get a passport for their animal before the end of the year, they will be breaking the law. The Ministry of Agriculture has had problems reaching horse owners who don't read horse magazines. Because of this, the ministry is planning a campaign this autumn. The passport contains information on the owner, the race and number. A photograph isn't mandatory but a description of the horse's appearance is required.", "edit_actions": [{"type": "A", "before": null, "after": "in", "start_char_pos": 10, "end_char_pos": 10}, {"type": "R", "before": "must", "after": "will be required to", "start_char_pos": 38, "end_char_pos": 42}, {"type": "D", "before": "says", "after": null, "start_char_pos": 179, "end_char_pos": 183}, {"type": "R", "before": "to the", "after": "told", "start_char_pos": 258, "end_char_pos": 264}, {"type": "R", "before": "reading", "after": "read", "start_char_pos": 481, "end_char_pos": 488}, {"type": "D", "before": "however,", "after": null, "start_char_pos": 670, "end_char_pos": 678}], "sents_char_pos": [0, 106, 280, 403, 505, 571, 640]}
+{"doc_id": "16340", "revision_depth": "1", "before_revision": "250px|Map of Iran. Source: CIA World Factbook International controversy erupted after Iranian officials executed two gay teenagers who were originally reported to be convicted of homosexuality, however later reports released by the Iranian government after international furor claimed the conviction was for the rape of a 13-year-old boy. The two were hanged July 19. Only the age of one of the two executed teens was officially released to the public. He was 18 year old Ayaz Marhoni. The other, Mahmoud Asgari, according to the Iranian Student's News Agency (ISNA) was aged 17, but other news agencies have reported the teenager's age as 16. In the original report by the ISNA it was said that the two were found having sex together when they were both 16. It also reported that they were held and beaten for fourteen months before the execution. The UK-based gay rights group, Outrage! claims the report issued later by the government of Iran is a \"smokescreen\" to justify killing homosexuals. And one media outlet, Direland, has blasted the media holdings of Rupert Murdoch that includes Fox News Channel and The Times newspaper for publishing the subsequent Iranian government issued allegation of rape as matter of fact without mention of the previous stories before international condemnation bearing no such accusations. According to Iranian newspapers, the two boys were given 228 lashes for their other convictions of theft, disrupting public order and public drinking before they were hanged in Edalat (\"Justice\" in English) Square in the Iranian city of Mashhad . The executioners, fearing reprisals, wore masks and anti-riot forces were mobilized to prevent outbreaks of public protests. Photos of the execution released by Iranian Students News Agency showed the two teens crying in the truck driving them to the gallows in Justice Square, located in the northeastern region of the country. Iran has been under fire by international human rights groups for executing teenagers in the past, including the 2004 execution of Atefeh Rajabi , a 16-year-old girl convicted of having sex before marriage . Medical reports, not allowed in the court, had stated that she was mentally ill . Another report, by Iran In Focus, claimed that the two were hanged not for gay sex, but rather for sexually assaulting a thirteen year old boy at knife point. Neither the original Iranian Student's News Agency nor an additional report from the National Council of Resistance of Iran had this allegation, said the United Kingdom based Outrage . Direland Press has noted that the accusation of rape in reports came days after international outrage and detailed reports by other Iranian news agencies. They suggest the recent report is a ploy of the Iranian government to justify its actions. Tatchell told reporters that according to Iranian human rights activists, more than 4,000 lesbians and gay men have been executed in Iran since the ayatollahs seized power in 1979. He said an estimated 100,000 Iranians have been executed in Iran since that time. OutRage! requested the international community see Iran \"as a pariah state\" and to \"break off diplomatic relations, impose trade sanctions, and give practical support to the democratic and left opposition inside Iran.\" In the Unites States, the Human Rights Campaign has called for U.S. Secretary of State Condoleezza Rice to condemn the executions.", "after_revision": "250px|Map of Iran. Source: CIA World Factbook International controversy erupted after Iranian officials executed two gay teenagers who were originally reported to be convicted of homosexuality, however later reports released by the Iranian government after international claimed the conviction was for the rape of a 13-year-old boy. The two were hanged July 19. Only the age of one of the two executed teens was officially released to the public. He was 18 year old Ayaz Marhoni. The other, Mahmoud Asgari, according to the (ISNA) was aged 17, but other news agencies have reported the teenager's age as 16. In the original report by the ISNA it was said that the two were found having together when they were both 16. It also reported that they were held and beaten for fourteen months before the execution. The UK-based gay rights group, claims the report issued later by the government of Iran is a \"smokescreen\" to justify killing homosexuals. And one media outlet, Direland, has blasted the media holdings of that includes Fox News Channel and The Times newspaper for publishing the subsequent Iranian government issued allegation of rape as matter of fact without mention of the previous stories before international condemnation bearing no such accusations. According to Iranian newspapers, the two boys were given 228 lashes for their other convictions of theft, disrupting public order and public drinking before they were hanged in Edalat (\"Justice\" in English) Square in the Iranian city of . The executioners, fearing reprisals, wore masks and anti-riot forces were mobilized to prevent outbreaks of public protests. Photos of the execution released by Iranian Students News Agency showed the two teens crying in the truck driving them to the in Justice Square, located in the northeastern region of the country. Iran has been under fire by international human rights groups for executing teenagers in the past, including the 2004 execution of , a 16-year-old girl convicted of having . Medical reports, not allowed in the court, had stated that she was . Another report, by Iran In Focus, claimed that the two were hanged not for gay sex, but rather for sexually assaulting a thirteen year old boy at knife point. Neither the original Iranian Student's News Agency nor an additional report from the had this allegation, said the United Kingdom based OutRage! . Direland Press has noted that the accusation of rape in reports came days after international outrage and detailed reports by other Iranian news agencies. They suggest the recent report is a ploy of the Iranian government to justify its actions. Tatchell told reporters that according to Iranian human rights activists, more than 4,000 lesbians and gay men have been executed in Iran since the seized power in 1979. He said an estimated 100,000 Iranians have been executed in Iran since that time. OutRage! requested the international community see Iran \"as a state\" and to \"break off diplomatic relations, impose trade sanctions, and give practical support to the democratic and left opposition inside Iran.\" In the Unites States, the has called for U.S. Secretary of State Condoleezza Rice to condemn the executions.", "edit_actions": [{"type": "D", "before": "furor", "after": null, "start_char_pos": 271, "end_char_pos": 276}, {"type": "D", "before": "Iranian Student's News Agency", "after": null, "start_char_pos": 530, "end_char_pos": 559}, {"type": "D", "before": "sex", "after": null, "start_char_pos": 722, "end_char_pos": 725}, {"type": "D", "before": "Outrage!", "after": null, "start_char_pos": 880, "end_char_pos": 888}, {"type": "D", "before": "Rupert Murdoch", "after": null, "start_char_pos": 1063, "end_char_pos": 1077}, {"type": "D", "before": "Mashhad", "after": null, "start_char_pos": 1566, "end_char_pos": 1573}, {"type": "D", "before": "gallows", "after": null, "start_char_pos": 1827, "end_char_pos": 1834}, {"type": "D", "before": "Atefeh Rajabi", "after": null, "start_char_pos": 2036, "end_char_pos": 2049}, {"type": "D", "before": "sex before marriage", "after": null, "start_char_pos": 2091, "end_char_pos": 2110}, {"type": "D", "before": "mentally ill", "after": null, "start_char_pos": 2180, "end_char_pos": 2192}, {"type": "D", "before": "National Council of Resistance of Iran", "after": null, "start_char_pos": 2439, "end_char_pos": 2477}, {"type": "R", "before": "Outrage", "after": "OutRage!", "start_char_pos": 2529, "end_char_pos": 2536}, {"type": "D", "before": "ayatollahs", "after": null, "start_char_pos": 2933, "end_char_pos": 2943}, {"type": "D", "before": "pariah", "after": null, "start_char_pos": 3110, "end_char_pos": 3116}, {"type": "D", "before": "Human Rights Campaign", "after": null, "start_char_pos": 3293, "end_char_pos": 3314}], "sents_char_pos": [0, 18, 338, 367, 452, 485, 643, 758, 848, 888, 996, 1328, 1575, 1700, 1904, 2112, 2353, 2538, 2693, 2784, 2965, 3047, 3266]}
+{"doc_id": "163843", "revision_depth": "1", "before_revision": "The Westminster Palace, House of Lords on the left. The UK government plans to replace the House of Lords , the upper house of British Parliament , with a duly elected one to make it \"legitimate.\" Ministers working on this proposal plan to style this new chamber loosely on the United States Senate. Transport Secretary Lord Andrew Adonis said on a BBC show, \"The time has now come to make it legitimate in the only way that a legislative assembly can be legitimate in the modern world, which is to be elected.\" He assured that there would be \"firm proposals\" for an elected House of Lords in the Labour Party 's manifesto for the general election in May. He added \"We can do it in this country as most democracies do it: We'd have two chambers, both of which are elected but with the government accountable to the first chamber.\" The Sunday Telegraph has leaked a plan which reveals that the 704 seats would be reduced to 300 seats and its members elected under a system of \" proportional representation \". This new chamber would no longer be known as the House of Lords and citizens will have the privilege to remove incompetent members through a \" recall ballot \". The paper reported that each member would serve up to fifteen years and one-third of the chamber would be elected during the usual general elections. The salary is reported to be around \u00a365,000 per annum. All members should be UK residents and fully domiciled for tax purposes. The Lords scrutinise and revise government legislation and are seen by the public as an undemocratic house or a place for the aristocrats and political appointees. The chamber currently has around 740 members. 92 hold hereditary seats, and 26 are Church of England clergy. The rest are appointed for life. Former prime minister Tony Blair , with the 1999 House of Lords act , had expelled hereditary peers from the upper house, apart from the 92 permitted to remain in the House on an interim basis. Another ten inheritors were created life peers to be able to remain in the House. Lord Adonis commented that this expulsion had \"fundamentally transformed\" the chamber into a \"workmanlike assembly\". A spokesman for the Conservative Party (which is the opposition party) alleged that Labour was playing politics with the electoral system by introducing such proposals before the General election despite having thirteen years to reform the Lords. \"We will work to build a consensus for a mainly elected second chamber to replace the House of Lords,\" he added. For centuries, the House of Lords had included several hundred members who inherited their seats; the 1999 Act removed such a right. The Act decreased the membership of the House from 1,330 to 669. The Labour Government is expected to present a bill to remove the remaining 92 hereditary peers from the House. It also introduced in 2009 the Constitutional Reform and Governance Bill, which would end by-elections to replace hereditaries, removing them by steady reduction instead of removing all of them outright.", "after_revision": "The Westminster Palace, House of Lords on the left. The UK government plans to replace the , the upper house of , with a duly elected one to make it \"legitimate.\" Ministers working on this proposal plan to style this new chamber loosely on the United States Senate. Transport Secretary said on a BBC show, \"The time has now come to make it legitimate in the only way that a can be legitimate in the modern world, which is to be elected.\" He assured that there would be \"firm proposals\" for an elected House of Lords in the 's manifesto for the in May. He added \"We can do it in this country as most democracies do it: We'd have two chambers, both of which are elected but with the government accountable to the first chamber.\" has leaked a plan which reveals that the 704 seats would be reduced to 300 seats and its members elected under a system of \" \". This new chamber would no longer be known as the House of Lords and citizens will have the privilege to remove incompetent members through a \" \". The paper reported that each member would serve up to fifteen years and one-third of the chamber would be elected during the usual general elections. The salary is reported to be around \u00a365,000 per annum. All members should be UK residents and fully for tax purposes. The Lords scrutinise and revise government legislation and are seen by the public as an undemocratic house or a place for the aristocrats and political appointees. The chamber currently has around 740 members. 92 hold hereditary seats, and 26 are clergy. The rest are appointed for life. Former prime minister , with the , had expelled from the upper house, apart from the 92 permitted to remain in the House on an interim basis. Another ten inheritors were created life peers to be able to remain in the House. Lord Adonis commented that this expulsion had \"fundamentally transformed\" the chamber into a \"workmanlike assembly\". A spokesman for the (which is the opposition party) alleged that Labour was playing politics with the electoral system by introducing such proposals before the General election despite having thirteen years to reform the Lords. \"We will work to build a consensus for a mainly elected second chamber to replace the House of Lords,\" he added. For centuries, the House of Lords had included several hundred members who inherited their seats; the 1999 Act removed such a right. The Act decreased the membership of the House from 1,330 to 669. The is expected to present a bill to remove the remaining 92 hereditary peers from the House. It also introduced in 2009 the Constitutional Reform and Governance Bill, which would end to replace hereditaries, removing them by steady reduction instead of removing all of them outright.", "edit_actions": [{"type": "D", "before": "House of Lords", "after": null, "start_char_pos": 91, "end_char_pos": 105}, {"type": "D", "before": "British Parliament", "after": null, "start_char_pos": 127, "end_char_pos": 145}, {"type": "D", "before": "Lord Andrew Adonis", "after": null, "start_char_pos": 320, "end_char_pos": 338}, {"type": "D", "before": "legislative assembly", "after": null, "start_char_pos": 427, "end_char_pos": 447}, {"type": "D", "before": "Labour Party", "after": null, "start_char_pos": 597, "end_char_pos": 609}, {"type": "D", "before": "general election", "after": null, "start_char_pos": 631, "end_char_pos": 647}, {"type": "D", "before": "The Sunday Telegraph", "after": null, "start_char_pos": 831, "end_char_pos": 851}, {"type": "D", "before": "proportional representation", "after": null, "start_char_pos": 977, "end_char_pos": 1004}, {"type": "D", "before": "recall ballot", "after": null, "start_char_pos": 1151, "end_char_pos": 1164}, {"type": "D", "before": "domiciled", "after": null, "start_char_pos": 1418, "end_char_pos": 1427}, {"type": "D", "before": "Church of England", "after": null, "start_char_pos": 1693, "end_char_pos": 1710}, {"type": "D", "before": "Tony Blair", "after": null, "start_char_pos": 1774, "end_char_pos": 1784}, {"type": "D", "before": "1999 House of Lords act", "after": null, "start_char_pos": 1796, "end_char_pos": 1819}, {"type": "D", "before": "hereditary peers", "after": null, "start_char_pos": 1835, "end_char_pos": 1851}, {"type": "D", "before": "Conservative Party", "after": null, "start_char_pos": 2165, "end_char_pos": 2183}, {"type": "D", "before": "Labour Government", "after": null, "start_char_pos": 2707, "end_char_pos": 2724}, {"type": "D", "before": "by-elections", "after": null, "start_char_pos": 2905, "end_char_pos": 2917}], "sents_char_pos": [0, 51, 196, 299, 511, 655, 830, 1007, 1167, 1317, 1372, 1445, 1609, 1655, 1718, 1751, 1945, 2027, 2144, 2391, 2504, 2602, 2637, 2702, 2814]}
+{"doc_id": "176397", "revision_depth": "1", "before_revision": "A 6.2-magnitude aftershock struck a large part of central and southern Chile on Friday morning, but it caused no casualties or major damage, ONEMI reported. The aftershock took place at 06:03 local time ( 10:03 UTC ), and according to the University of Chile Geological Survey , the epicentre was located 26 kilometers to the south of Arauco , 65 kilometers to the south of Concepci\u00f3n , and almost 580 kilometers from Santiago. It had a depth of 54.4 kilometers. However, the United States Geological Survey reported that the aftershock had a depth of 35 kilometers and that it reached a magnitude of 5.9. The Interior Minister, Rodrigo Hinzpeter, informed Radio Cooperativa there were no reports of casualties or damage caused by the aftershock. ONEMI reported on their website that the aftershock reached magnitudes of up to VI in the Mercalli scale , ranging from I to XII, in some towns in the B\u00edo B\u00edo Region . The aftershock provoked panic in the area. ONEMI specified that the intensities of the aftershock were: VI in Lota ; V in Concepci\u00f3n, Parral and Angol ; IV in Temuco , Lonquimay and Puerto Saavedra; and III in Linares , Retiro, Constituci\u00f3n, Valdivia and Panguipulli . At 06:14 (10:14 UTC), SHOA (Chilean Army Hydrographic and Oceanographic Service) ruled out the possibility of a tsunami in the affected area from Pichilemu, O'Higgins Region , until the Los R\u00edos Region .", "after_revision": "A 6.2-magnitude aftershock struck a large part of central and southern Chile on Friday morning, but it caused no casualties or major damage, reported. The aftershock took place at 06:03 local time ( 1003 ), and according to the , the epicentre was located 26 kilometers to the south of , 65 kilometers to the south of , and almost 580 kilometers from Santiago. It had a depth of 54.4 kilometers. However, the reported that the aftershock had a depth of 35 kilometers and that it reached a magnitude of 5.9. The Interior Minister, Rodrigo Hinzpeter, informed there were no reports of casualties or damage caused by the aftershock. reported on their website that the aftershock reached magnitudes of up to VI in the , ranging from I to XII, in some towns in the . The aftershock provoked panic in the area. ONEMI specified that the intensities of the aftershock were: VI in ; V in Concepci\u00f3n, and ; IV in , Lonquimay and Puerto Saavedra; and III in , Retiro, , and . At 06:14 (10:14 UTC), SHOA (Chilean Army Hydrographic and Oceanographic Service) ruled out the possibility of a tsunami in the affected area from , , until the .", "edit_actions": [{"type": "D", "before": "ONEMI", "after": null, "start_char_pos": 141, "end_char_pos": 146}, {"type": "R", "before": "10:03 UTC", "after": "1003", "start_char_pos": 205, "end_char_pos": 214}, {"type": "D", "before": "University of Chile Geological Survey", "after": null, "start_char_pos": 239, "end_char_pos": 276}, {"type": "D", "before": "Arauco", "after": null, "start_char_pos": 335, "end_char_pos": 341}, {"type": "D", "before": "Concepci\u00f3n", "after": null, "start_char_pos": 374, "end_char_pos": 384}, {"type": "D", "before": "United States Geological Survey", "after": null, "start_char_pos": 476, "end_char_pos": 507}, {"type": "D", "before": "Radio Cooperativa", "after": null, "start_char_pos": 657, "end_char_pos": 674}, {"type": "D", "before": "ONEMI", "after": null, "start_char_pos": 747, "end_char_pos": 752}, {"type": "D", "before": "Mercalli scale", "after": null, "start_char_pos": 837, "end_char_pos": 851}, {"type": "D", "before": "B\u00edo B\u00edo Region", "after": null, "start_char_pos": 898, "end_char_pos": 912}, {"type": "D", "before": "Lota", "after": null, "start_char_pos": 1025, "end_char_pos": 1029}, {"type": "R", "before": "Parral and Angol", "after": "and", "start_char_pos": 1049, "end_char_pos": 1065}, {"type": "D", "before": "Temuco", "after": null, "start_char_pos": 1074, "end_char_pos": 1080}, {"type": "D", "before": "Linares", "after": null, "start_char_pos": 1125, "end_char_pos": 1132}, {"type": "R", "before": "Constituci\u00f3n, Valdivia and Panguipulli", "after": ", and", "start_char_pos": 1143, "end_char_pos": 1181}, {"type": "D", "before": "Pichilemu, O'Higgins Region", "after": null, "start_char_pos": 1330, "end_char_pos": 1357}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1360, "end_char_pos": 1360}, {"type": "D", "before": "Los R\u00edos Region", "after": null, "start_char_pos": 1371, "end_char_pos": 1386}], "sents_char_pos": [0, 156, 427, 462, 605, 746, 914, 957, 1031, 1067, 1113, 1183]}
+{"doc_id": "17705", "revision_depth": "2", "before_revision": "Seoul National University\u2019s Hwang Woo-Suk has reported his findings in the Journal Nature after being involved in producing the first cloned dog . The dog, named Snuppy , was born on April 24th. He is an Afghan hound . The issue presents a whole host of ethical questions for researchers in the stem cell field. Companies like Amgen are interested in the technology, as is accounted in Fortune Magazine for making human-safe pharmaceuticals. The business sector relies on technology improvements to make life saving realities. The Los Angeles Times has reported that Snuppy came from the DNA of the tissue of the ear of the original canine. According to ABC News Associated Press reporter JI-SOO KIM, Korea has declared that we are still a long way from creating clones of monkeys , which have a great deal more human-like traits. Slashdot actually reported an RSS feed yesterday at 4:15 p.m. regarding the BBC and Reuters News articles which told of the two successful terms of gestation for Snuppy. \"the South Korean team only obtained three pregnancies from more than 1,000 embryo transfers into 123 recipients.\" (BBC).", "after_revision": " National University\u2019s has reported his findings in the Journal after being involved in producing the first cloned . The dog, named , was born on April 24. He is an . The issue presents a whole host of ethical questions for researchers in the field. Companies like are interested in the technology, as is accounted in for making human-safe pharmaceuticals. The business sector relies on technology improvements to make life saving realities. The has reported that Snuppy came from the of the tissue of the ear of the original canine. According to Associated Press reporter JI-SOO KIM, Korea has declared that we are still a long way from creating of , which have a great deal more human-like traits. actually reported an yesterday at 4:15 p.m. regarding the BBC and articles which told of the two successful terms of for Snuppy. \"the team only obtained three pregnancies from more than 1,000 transfers into 123 recipients.\" (BBC).", "edit_actions": [{"type": "D", "before": "Seoul", "after": null, "start_char_pos": 0, "end_char_pos": 5}, {"type": "D", "before": "Hwang Woo-Suk", "after": null, "start_char_pos": 28, "end_char_pos": 41}, {"type": "D", "before": "Nature", "after": null, "start_char_pos": 83, "end_char_pos": 89}, {"type": "D", "before": "dog", "after": null, "start_char_pos": 141, "end_char_pos": 144}, {"type": "D", "before": "Snuppy", "after": null, "start_char_pos": 162, "end_char_pos": 168}, {"type": "R", "before": "24th.", "after": "24.", "start_char_pos": 189, "end_char_pos": 194}, {"type": "D", "before": "Afghan hound", "after": null, "start_char_pos": 204, "end_char_pos": 216}, {"type": "D", "before": "stem cell", "after": null, "start_char_pos": 295, "end_char_pos": 304}, {"type": "D", "before": "Amgen", "after": null, "start_char_pos": 327, "end_char_pos": 332}, {"type": "D", "before": "Fortune Magazine", "after": null, "start_char_pos": 386, "end_char_pos": 402}, {"type": "D", "before": "Los Angeles Times", "after": null, "start_char_pos": 531, "end_char_pos": 548}, {"type": "D", "before": "DNA", "after": null, "start_char_pos": 588, "end_char_pos": 591}, {"type": "D", "before": "ABC News", "after": null, "start_char_pos": 654, "end_char_pos": 662}, {"type": "R", "before": "clones of monkeys", "after": "of", "start_char_pos": 763, "end_char_pos": 780}, {"type": "D", "before": "Slashdot", "after": null, "start_char_pos": 831, "end_char_pos": 839}, {"type": "D", "before": "RSS feed", "after": null, "start_char_pos": 861, "end_char_pos": 869}, {"type": "D", "before": "Reuters News", "after": null, "start_char_pos": 915, "end_char_pos": 927}, {"type": "D", "before": "gestation", "after": null, "start_char_pos": 979, "end_char_pos": 988}, {"type": "D", "before": "South Korean", "after": null, "start_char_pos": 1006, "end_char_pos": 1018}, {"type": "D", "before": "embryo", "after": null, "start_char_pos": 1077, "end_char_pos": 1083}], "sents_char_pos": [0, 146, 194, 218, 311, 441, 526, 640, 830, 1000]}
+{"doc_id": "180311", "revision_depth": "1", "before_revision": "A colour-coded map of the constituencies contested. Please click the image to expand. This table shows the results for 649 of 650 constituencies in the 2010 general election in the United Kingdom (not including the delayed constituency of Thirsk and Malton , which will hold its election on 27 May). The \"Constituency\" column shows the name of each constituency, linked to the relevant Wikipedia article. the \"Result\" column shows the winning party, and whether they held or gained the seat (and, if relevant, who they gained it from). The \"Votes\" column shows how many votes were received by the winning party, the \"Share\" column their share of the vote, and the \"Swing\" column the swing in the direction of the gaining party. In the general election, people over the age of eighteen around the United Kingdom may choose to vote for a candidate at their local polling booth, and Members of Parliament are elected to each constituency based on the first past the post system. Whichever party has a majority of MPs after all constituencies have announced their results has the opportunity to form a government. The incumbent party before the dissolution of parliament was Gordon Brown's Labour Party , exit polls suggested a small Conservative Party majority, which\u2014when this swing is projected nationally\u2014would cause a hung parliament . The exit polls also suggested that despite reports that support for the Liberal Democrats had surged following the first national televised leaders' debates in the United Kingdom, the Liberal Democrats would suffer from a third party squeeze. On the morning of Friday 7, 2010 the accuracy of the exit polls was demonstrated when it was revealed that there was indeed a hung Parliament and that although the Conservative Party had the greatest number of seats and votes it would be impossible for them to achieve an outright majority. The constitution of the United Kingdom allows for the incumbent Labour Party to first attempt to form a government and incumbent Prime Minister, Gordon Brown announced that he would allow civil servants from the Cabinet Office to help facilitate negotiations. Despite the Labour Party openly courting the Liberal Party, their leader Nick Clegg has stated that as the party with the most seats and most votes the Conservatives have the right to attempt to form a government. Some seats were also be contested by one or more of a number of smaller parties and independents, including the United Kingdom Independence Party, the British National Party , and the Green Party of England and Wales , who all already hold seats in the European Parliament and local government authorities, all hoped to gain their first seats in the House of Commons in this election. History was made when the Greens won their first Parliamentery with their leader Caroline Lucas winning Brighton Pavilion . In Northern Ireland the Alliance Party also won their first seat with Naomi Long taking Peter Robinson 's seat. Overall standings PartySeatsNet gainVotesShare Conservative Party 305 +97 10,681,417 36.1\\% Labour Party 258 -91 8,601,441 29.1\\% Liberal Democrats 57 -5 6,805,665 23.0\\% Democratic Unionist Party 8 -1 168,216 0.6\\% Scottish National Party 6 0 491,386 1.7\\% Sinn F\u00e9in 5 0 171,942 0.6\\% Plaid Cymru 3 +1 165,394 0.6\\% Social Democratic Labour Party 3 0 110,970 0.4\\% Alliance Party 1 +1 42,762 0.1\\% Green Party of England and Wales 1 +1 284,566 1.0\\% Table Colour Party Red Labour Blue Conservative Yellow Liberal Democrats Yellow (Northern Ireland) Alliance Bright Yellow Scottish National Green (England) Green Light Green (Wales) Plaid Cymru Light Green (N. Ireland) Social Democratic and Labour Dark Green Sinn F\u00e9in Brown Democratic Unionist Purple Conservatives and Unionists Grey Independent Black Poll delayed White Undeclared ConstituencyResultVotesShareSwingAberavon Labour hold 16,073 51.9\\% 5.3\\% (to LD) Aberconwy Conservative gain from Lab 10,734 35.8\\% 7.6\\% Aberdeen North Labour hold 16,746 44.4\\% 1.0\\% Aberdeen South Labour hold 15,722 36.5\\% 2.5\\% Aberdeenshire West and Kincardie Liberal Democrat hold 17,362 38.4\\% 4.9\\% (to CON) Airdrie and ShottsLabour hold20,64958.2\\% 3.9\\% (to SNP) Aldershot Conservative hold 21,203 46.7\\% 1.4\\% (to LD) Aldridge-Brownhills Conservative hold 22,913 59.3\\% 12.0\\% (from LAB) Altrincham and Sale West Conservative hold 24,176 48.9\\% 0.8\\% (to LD) Alyn and Deeside Labour hold 15,804 39.6\\% 8.1\\% (to CON) Amber Valley Conservative gain from Lab 17,746 38.6\\% 6.9\\% Angus SNP hold 15,020 39.6\\% 2.2\\% Antrim EastDemocratic Unionist hold13,99345.9\\% Antrim NorthDemocratic Unionist hold19,67246.4\\% Antrim South Democratic Unionist hold 11,536 33.9\\% 3.6\\% (to UCU) Arfon Plaid Cymru gain from Lab9,38336.0\\%3.7\\%Argyle and Bute Liberal Democrat hold14,29231.6\\%2.7\\% (to CON) Arundel and South Downs Conservative hold32,33357.8\\%3.0\\% Ashfield Labour hold16,23933.7\\%17.2\\% (to LD) Ashford Conservative hold29,87854.1\\%2.3\\% (to LD) Ashton Under Lyne Labour hold18,60448.4\\%7.3\\% (to CON) Aylesbury Conservative hold27,73652.2\\% Ayr, Carrick and Cumnock Labour hold21,63247.1\\%0.3\\% (to CON) Ayrshire Central Labour hold20,95047.7\\%1.5\\% Ayrshire North and Arran Labour hold21,86047.4\\%2.3\\% (to SNP) BanburyConservative hold29,703 52.8\\%5.9\\% (to CON) Banff and BuchanSNP hold15,86841.3\\%10.7\\% (to CON) BarkingLabour hold24,62854.3\\%1.7\\%Barnsley CentralLabour hold17,48747.3\\%4.2\\% (to LD)Barnsley EasyLabour hold18,05947.0\\%14.0\\% (to LD)Barrow and FurnessLabour hold21,22648.1\\%0.4\\% (to CON)Basildon and BillericayConservative hold21,98252.8\\%9.3\\%Basildon South and Thurrock EastConservative gain from Lab19,62443.9\\%7.5\\%BasingstokeConservative hold25,59050.5\\%4.6\\%BassrtlawLabour hold25,01850.5\\%0.7\\% (to CON)BathLiberal Democrat hold26,65156.6\\%5.8\\%Batley and Spen Labour hold 21,565 41.5\\% 2.5\\% (to CON)Battersea Conservative gain from Lab 23,103 47.3\\% 6.5\\%BeaconsfieldConservative hold32,05361.1\\%4.7\\%BeckanhamConservative hold27,59757.9\\%3.2\\% (to LD)BedfordConservative gain from Lab17,54638.9\\%5.5\\%Bedforsdhire MidConservative hold28,81552.5\\%2.3\\%Bedfordshire North EastConservative hold30,98955.8\\%2.6\\%Bedfordshire South WestConservative hold26,81552.8\\%0.7\\%Belfast EastAlliance gain from DUP12,83937.2\\%22.9\\%Belfast NorthDemocratic Unionist hold14,81240.0\\%5.0\\% (to SF)Belfast SouthSDLP hold14,02641.0\\%8.4\\%Belfast WestSinn F\u00e9in hold22,84071.1\\%1.1\\%Bermondsey and Old SouthwarkLiberal Democrat hold21,59048.4\\%1.6\\%Berwick-Upon-TweedLiberal Democrat hold16,80643.7\\%8.3\\% (to CON)Banff and BuchanLiberal Democrat hold22,23045.4\\%0.7\\% (to CON)Bethnal Green and BowBanff and BuchanConservative hold22,23045.4\\%1.6\\%Bexhill and BattleConservative hold28,14751.6\\%4.0\\% (to LD)Bexleyheath and CrayfordBirkenhead)Birmingham Edgbaston Labour hold 16,894 40.6\\% 0.5\\% (to CON)Birmingham ErdingtonBirmingham Hall GreenBirmingham Hodge HillBirmingham LadywoodLabour hold19,95055.7\\%2.5\\%Birmingham NorthfieldBirmingham Perry BarrBirmingham Selly Oak Labour hold 17,950 38.5\\% 4.8\\% (to CON)Birmingham YardleyBishop Auckland Labour hold 16,023 39.0\\% 7.2\\% (to CON)BlackburnLabour hold21,75147.8\\%1.1\\%Blackley and BroughtonBlackpool North and CleveleysConservative gain from Lab16,96441.8\\%6.9\\%Blackpool SouthLabour hold14,44941.16.2\\% (to CON)Blaenau GwentLabour gain from Ind 16,974 52.4\\% 29.2\\%Blaydon Labour hold 22,297 49.7\\% 3.3\\%Blyth ValleyBognor Regis and LittlehamptonConservative hold24,08751.4\\%2.3\\%BolsoverLabour hold21,99450.0\\%11.2\\% (to CON)Bolton North EastLabour hold19,87045.9\\%1.3\\% (to CON)Bolton South EastLabour hold18,78247.4\\%5.6\\% (to CON)Bolton West Labour hold 18,327 38.5\\% 4.9\\% (to CON)BootleBoston and SkegnessConservative hold18,78247.4\\%7.0\\%BosworthConservative hold23,13242.6\\%5.9\\% (to LD)Bournemouth EastConservative hold21,32048.4\\%1.8\\%Bournemouth West Conservative hold 18,808 45.1\\% 2.9\\%Bracknell Conservative hold 27,327 52.4\\% 1.0\\% (to LD)Bradford EastBradford SouthBradford WestBraintree Conservative hold 25,901 52.6\\% 6.7\\%Brecon and RadnorshireLiberal Democrat hold17,92946.2\\%0.3\\% (to CON)Brent CentralBrent NorthBrentford and IsleworthBrentwood and OngarConservative hold28,79256.9\\%3.1\\%BridgendLabour hold13,93136.3\\%6.0\\% (to CON)Bridgwater and Somerset West Conservative hold 24,675 45.3\\% 2.9\\% (to LD)Brigg and GooleConservative gain from Lab19,68044.9\\%9.8\\%Brighton KemptownBrighton Pavilion Green gain from Lab 16,238 31.3\\% 8.4\\%Bristol EastLabour hold16,47136.6\\%4.5\\% (to CON)Bristol North WestBristol SouthBristol WestLiberal Democrat hold26,59348.0\\%9.0\\%BroadlandBromley and ChislehurstBromsgroveBroxbourneConservative hold26,84458.8\\%6.4\\%BroxtoweConservative gain from Lab20,58539.0\\%2.6\\%BuckinghamBurnleyLiberal Democrat gain from Lab14,93235.7\\%9.6\\%BurtonConservative gain from Lab22,18844.5\\%8.7\\%Bury NorthBury SouthBury St EdmundsConservative hold27,89947.5\\%2.8\\%CaerphillyLabour hold17,37744.9\\%6.5\\% (to CON)Caithness, Sutherland and Easter RossLiberal Democrat hold11,90741.4\\%6.4\\% (to LAB)Calder ValleyCamberwell and PeckhamCambourne and Redruth Conservative gain from Lib37.6\\%15,9695.2\\%Cambridge Liberal Democrat hold 19,621 39.1\\% 7.0\\% (to CON)Cambridgeshire North EastConservative hold26,86251.4\\%0.8\\%Cambridgeshire North WestConservative hold29,42550.05\\%2.6\\%Cambridgeshire SouthConservative hold27,99547.4\\%2.5\\% (to LD)Cambridgeshire South EastConservative hold27,62948.0\\%2.7\\% (to LD)Cannock ChaseConservative gain from Lab18,27140.1\\%14.0\\%Canterbury Conservative hold22,05044.8\\%5.4\\% (to LD)Cardiff CentralCardiff NorthCardiff South and Penarth Labour hold 17,262 38.9\\% 6.0\\% (to CON)Cardiff West Labour hold 16,893 41.2\\% 5.3\\% (to CON)Carlisle Carmarthen East and Dinefwr Plaid Cymru hold 13,546 35.6\\% 4.2\\% (to LAB)Carmarthen West and Pembrokeshire South Conservative gain from Lab 16,649 41.1\\% 6.9\\%Carshalton and WallingtonCastle PointCeredigionCharnwoodChatham and AylesfordCheadleChelmsfordChelsea and FulhamCheltenhamChelsham and AmershamChester, City ofChesterfieldChichesterChingford and Woodford GreenChippenhamChipping BarnetChorleyChristchurchCities of London and WestminsterClactonCleethorpesConservative gain from Lab18,93942.1\\%7.8\\%Clwyd South Labour hold13,31138.4\\%5.8\\% (to CON)Clwyd West Conservative hold 15,833 41.5\\% 8.4\\%Coatbridge, Chryson and BellshillColchesterColne ValleyCongleton Conservative hold 23,250 45.8\\% 2.3\\% (to LD)Copeland Labour hold 19,699 46.0\\% 2.1\\% (to CON)Corby Conservative gain from Lab 22,886 42.2\\% 3.4\\%Cornwall North Liberal Democrat hold22,51248.1\\%0.3\\% (to CON)Cornwall South East Conservative gain from Lib22,39045.1\\%9.1\\%The Cotswolds Conservative hold 29,075 53.0\\% 1.1\\%Coventry North East Labour hold 21,384 49.3\\% 5.5\\% (to CON)Coventry North West Labour hold 19,936 42.8\\% 3.9\\% (to CON)Coventry South Labour hold 19,197 41.8\\% 3.4\\% (to CON)Crawley Conservative gain from Lab 21,264 44.8\\% 6.3\\%Crewe and Nantwich Conservative gain from Lab 23,420 45.8\\% 13.7\\%Croydon Central Conservative gain from Lab | 19,657 | 39.5\\% | 3.3\\% |- |Croydon North | width=5px; style=\"background:red\"| | Labour hold | 28,949 | 56.0\\% | 0.3\\% |- |Croydon South | width=5px; style=\"background:blue\"| | Conservative hold | 28,684 | 50.9\\% | 1.7\\% (to LD) |- |Cumbernauld, Kilsyth and Kirkintilloch East | width=5px; style=\"background:red\"| | Labour hold | 23,549 | 57.2\\% | 1.9\\% |- |Cynon Valley | width=5px; style=\"background:red\"| | Labour hold | 15,681 | 52.5\\% | 8.6\\% (to PC) |- |Dagenham and Rainham | width=5px; style=\"background:red\"| |Labour hold |17,813 |40.3\\% |4.9\\% (to CON) |- |Darlington | width=5px; style=\"background:red\"| | Labour hold |16,891 |39.4\\% |9.1\\% (to CON) |- |Dartford | width=5px; style=\"background:blue\"| |Conservative gain from Lab |24,428 |48.8\\% |11.6\\% |- |Daventry | width=5px; style=\"background:blue\"| | Conservative hold | 29,252 | 56.5\\% | 0.7\\% (to LD) |- |Delyn | width=5px; style=\"background:red\"| | Labour hold | 15,083 | 40.8\\% | 6.7\\% (to CON) |- |Denton and Reddish | width=5px; style=\"background:red\"| |Labour hold |19,191 |51.0\\% |6.2\\% (to CON) |- |Derby North | width=5px; style=\"background:red\"| | Labour hold | 14,896 | 33.0\\% | 7.4\\% (to CON) |- |Derby South | width=5px; style=\"background:red\"| |Labour hold |17,851 |43.3\\% |9.3\\% (to CON) |- |Derbyshire Dales | width=5px; style=\"background:blue\"| | Conservative hold | 24,378 | 52.1\\% | 3.7\\% |- |Derbyshire Mid | width=5px; style=\"background:blue\"| |Conservative hold |22,877 |48.3\\% |5.7\\% |- |Derbyshire North East | width=5px; style=\"background:red\"| |Labour hold |17,948 |38.2\\% |8.6\\% (to CON) |- |Derbyshire South | width=5px; style=\"background:blue\"| |Conservative gain from Lab |22,935 |45.5\\% |9.8\\% |- |Devizes | width=5px; style=\"background:\"| | | | | |- |Devon Central | width=5px; style=\"background:blue\"| | Conservative hold | 27,737 | 51.5\\% | 6.1\\% |- |Devon East | width=5px; style=\"background:blue\"| | Conservative hold |48.3\\% |25,662 | |- |Devon North | width=5px; style=\"background:#F9D616\"| | Liberal Democrat hold |24,305 |47.4\\% |0.3\\% |- |Devon South West | width=5px; style=\"background:blue\"| | Conservative hold |27,908 |56.0\\% |5.6\\% |- |Devon West and Torridge | width=5px; style=\"background:\"| | | | | |- |Dewsbury | width=5px; style=\"background:\"| | | | | |- |Don Valley | width=5px; style=\"background:\"| | | | | |- |Doncaster Central | width=5px; style=\"background:\"| | | | | |- |Doncaster North | width=5px; style=\"background:\"| | | | | |- |Doset Mid and Poole North | width=5px; style=\"background:\"| | | | | |- |Dorset North | width=5px; style=\"background:\"| | | | | |- |Dorset South | width=5px; style=\"background:blue\"| | Conservative gain from Lab |22,667 |45.1\\% |9.3\\% |- |Dorset West | width=5px; style=\"background:blue\"| | Conservative hold |27,287 |47.6\\% | |- |Dover | width=5px; style=\"background:\"| | | | | |- |Down North | width=5px; style=\"background:grey\"| |Independent gain from UCU |21,181 |63.3\\% | |- |Down South | width=5px; style=\"background:#3c3\" | |SDLP hold |20,648 |48.5\\% | |- |Dudley North | width=5px; style=\"background:\"| | | | | |- |Dudley South | width=5px; style=\"background:\"| | | | | |- |Dulwich and West Norwood | width=5px; style=\"background:\"| | | | | |- |Dumfries and Galloway | width=5px; style=\"background:\"| | | | | |- |Dunfiesshire, Clydesdale and Tweeddale | width=5px; style=\"background:\"| | | | | |- |Dunbartonshire East | width=5px; style=\"background:\"| | | | | |- |Dunbartonshire West | width=5px; style=\"background:\"| | | | | |- |Dundee East | width=5px; style=\"background:\"| | | | | |- |Dundee West | width=5px; style=\"background:\"| | | | | |- |Dunfermine and Fife West | width=5px; style=\"background:\"| | | | | |- |City of Durham | width=5px; style=\"background:red\"| | Labour hold |20,496 |44.3\\% | |- |Durham North | width=5px; style=\"background:red\"| |Labour hold |20,698 |50.5\\% | |- |Durham North West | width=5px; style=\"background:\"| | | | | |- |Dwyfor Meirionnydd | width=5px; style=\"background:\"| | | | | |- |Ealing Central and Acton | width=5px; style=\"background:\"| | | | | |- |Ealing North | width=5px; style=\"background:\"| | | | | |- |Ealing Southall | width=5px; style=\"background:\"| | | | | |- |Easington | width=5px; style=\"background:red\"| |Labour hold |20,579 |58.9\\% | |- |East Ham | width=5px; style=\"background:\"| | | | | |- |East Kilbride, Strathaven and Lesmahagow | width=5px; style=\"background:\"| | | | | |- |East Lothian | width=5px; style=\"background:\"| | | | | |- |Eastbourne | width=5px; style=\"background:\"| | | | | |- |Eastleigh | width=5px; style=\"background:\"| | | | | |- |Eddisbury | width=5px; style=\"background:\"| | | | | |- |Edinburgh East | width=5px; style=\"background:red\"| | Labour hold | 17,305 | 43.4\\% | |- |Edinburgh North and Leith | width=5px; style=\"background:\"| | | | | |- |Edinburgh South | width=5px; style=\"background:\"| | | | | |- |Edinburgh South West | width=5px; style=\"background:red\"| | Labour hold | 19,473 | 42.8\\% | |- |Edinburgh West | width=5px; style=\"background:#F9D616\"| | Liberal Democrat hold | 16,684 | 35.9\\% | -11.4\\% |- |Edmonton | width=5px; style=\"background:\"| | | | | |- |Ellesmere Port and Neston | width=5px; style=\"background:\"| | | | | |- |Elmet and Rothwell | width=5px; style=\"background:\"| | | | | |- |Eltham | width=5px; style=\"background:\"| | | | | |- |Enfield North | width=5px; style=\"background:\"| | | | | |- |Enfield Southgate | width=5px; style=\"background:\"| | | | | |- |Epping Forest | width=5px; style=\"background:\"| | | | | |- |Epsom and Ewell | width=5px; style=\"background:\"| | | | | |- |Erewash | width=5px; style=\"background:\"| | | | | |- |Erith and Thameshead | width=5px; style=\"background:\"| | | | | |- |Esher and Walton | width=5px; style=\"background:\"| | | | | |- |Exeter | width=5px; style=\"background:red\"| | Labour hold |19,942 |38.2\\% | |- |Falkirk | width=5px; style=\"background:red\"| | Labour hold |23,207 |45.7\\% | |- |Fareham | width=5px; style=\"background:blue\"| | Conservative hold |30,037 |55.3\\% | |- |Faversham and Kent Mid | width=5px; style=\"background:\"| | | | | |- |Feltham and Heston | width=5px; style=\"background:\"| | | | | |- |Fermanagh and South Tyrone | width=5px; style=\"background:#060\"| | Sinn F\u00e9in hold |21,304 |45.5\\% | |- |Fife North East | width=5px; style=\"background:\"| | | | | |- |Filton and Bradley Stoke | width=5px; style=\"background:\"| | | | | |- |Finchley and Golders Green | width=5px; style=\"background:\"| | | | | |- |Folkestone and Hythe | width=5px; style=\"background:\"| | | | | |- |Forest of Dean | width=5px; style=\"background:\"| | | | | |- |Foyle | width=5px; style=\"background:#3c3\" | |SDLP hold |16,922 |44.7\\% | |- |Flyde | width=5px; style=\"background:\"| | | | | |- |Gainsborough | width=5px; style=\"background:blue\"| | Conservative hold |24,266 |49.3\\% | |- |Garston and Halewood | width=5px; style=\"background:red\"| | Labour hold |25,493 |59.5\\% | |- |Gateshead | width=5px; style=\"background:\"| | | | | |- |Gedling | width=5px; style=\"background:red\"| | Labour hold |19,821 |41.1\\% | |- |Gillingham and Rainham | width=5px; style=\"background:\"| | | | | |- |Glasgow Central | width=5px; style=\"background:\"| | | | | |- |Glasgow East | width=5px; style=\"background:red\"| | Labour hold |19,797 |61.6\\% | |- |Glasgow North | width=5px; style=\"background:\"| | | | | |- |Glasgow North East | width=5px; style=\"background:red\"| | Labour hold | 20,100 | 68.3\\% | |- |Glasgow North West | width=5px; style=\"background:\"| | | | | |- |Glasgow South | width=5px; style=\"background:\"| | | | | |- |Glasgow South West | width=5px; style=\"background:\"| | | | | |- |Glenrothes | width=5px; style=\"background:\"| | | | | |- |Gloucester | width=5px; style=\"background:\"| | | | | |- |Gordon | width=5px; style=\"background:\"| | | | | |- |Gosport | width=5px; style=\"background:\"| | | | | |- |Gower | width=5px; style=\"background:\"| | | | | |- |Grantham and Stamford | width=5px; style=\"background:\"| | | | | |- |Gravesham | width=5px; style=\"background:blue\"| | Conservative hold | 22,956 | 48.5\\% | 9.1\\% |- |Great Grimsby | width=5px; style=\"background:red\"| |Labour hold |10,777 |32.7\\% |10.5\\% (to CON) |- |Great Yarmouth | width=5px; style=\"background:\"| | | | | |- |Greenwich and Woolwich | width=5px; style=\"background:\"| | | | | |- |Guildford | width=5px; style=\"background:blue\"| |Conservative hold |29,618 |53.3\\% |6.9\\% |- |Hackney North and Stoke Newington | width=5px; style=\"background:\"| | | | | |- |Hackney South and Shoreditch | width=5px; style=\"background:\"| | | | | |- |Halesowen and Rowley Regis | width=5px; style=\"background:\"| | | | | |- |Halifax | width=5px; style=\"background:\"| | | | | |- |Haltemprice and Howden | width=5px; style=\"background:blue\"| | Conservative hold | 24,486 | 50.2\\% | 6.6\\% |- |Halton | width=5px; style=\"background:\"| | | | | |- |Hammersmith | width=5px; style=\"background:red\"| | Labour hold | 20,810 | 43.9\\% | 0.5\\% (to CON) |- |Hampshire East | width=5px; style=\"background:\"| | | | | |- |Hampshire North East | width=5px; style=\"background:\"| | | | | |- |Hampshire North West | width=5px; style=\"background:\"| | | | | |- |Hampstead and Kilburn | width=5px; style=\"background:\"| | | | | |- |Harborough | width=5px; style=\"background:\"| | | | | |- |Harlow | width=5px; style=\"background:\"| | | | | |- |Harrogate and Knaresborough | width=5px; style=\"background:\"| | | | | |- |Harrow East | width=5px; style=\"background:blue\"| | Conservative gain from Lab | 21,435 | 44.7\\% | 7.0\\% (to CON) |- |Harrow West | width=5px; style=\"background:red\"| | Labour hold | 20,111 | 43.6\\% | 5.7\\% (to CON) |- |Hartlepool | width=5px; style=\"background:\"| | | | | |- |Harwich and Essex North | width=5px; style=\"background:\"| | | | | |- |Hastings and Rye | width=5px; style=\"background:\"| | | | | |- |Havant | width=5px; style=\"background:\"| | | | | |- |Hayes and Harlington | width=5px; style=\"background:\"| | | | | |- |Hazel Grove | width=5px; style=\"background:\"| | | | | |- |Hemel Hempstead | width=5px; style=\"background:\"| | | | | |- |Hemsworth | width=5px; style=\"background:\"| | | | | |- |Hendon | width=5px; style=\"background:\"| | | | | |- |Henley | width=5px; style=\"background:\"| | | | | |- |Hereford and Herefordshire South | width=5px; style=\"background:blue\"| |Conservative gain from Lib |22,366 |46.2\\% |3.8\\% |- |Herefordshire North | width=5px; style=\"background:blue\"| | Conservative hold | 24,631 | 51.8\\% | 3.8\\% (to LD) |- |Hertford and Stortford | width=5px; style=\"background:blue\"| | Conservative hold | 29,810 | 53.8\\% | |- |Hertfordshire North East | width=5px; style=\"background:blue\"| | Conservative hold | 26,995 | 53.5\\% | 1.9\\% (to LD) |- |Hertfordshire South West | width=5px; style=\"background:\"| | | | | |- |Hertsmere | width=5px; style=\"background:blue\"| | Conservative hold | 26,476 | 56.0\\% | 5.6\\% |- |Hexham | width=5px; style=\"background:\"| | | | | |- |Heywood and Middleton | width=5px; style=\"background:\"| | | | | |- |High Peak | width=5px; style=\"background:\"| | | | | |- |Hitchin and Harpenden | width=5px; style=\"background:\"| | | | | |- |Holborn and St Pancras | width=5px; style=\"background:\"| | | | | |- |Hornchurch and Upminster | width=5px; style=\"background:\"| | | | | |- |Hornsey and Wood Green | width=5px; style=\"background:\"| | | | | |- |Horsham | width=5px; style=\"background:\"| | | | | |- |Houghton and Sunderland South | width=5px; style=\"background:red\"| | Labour hold | 19,137 | 50.3\\% | 8.4\\% (to CON) |- |Hove | width=5px; style=\"background:\"| | | | | |- |Huddersfield | width=5px; style=\"background:red\"| | Labour hold | 15,725 | 38.8\\% | 7.1\\% (to CON) |- |Hull East | width=5px; style=\"background:\"| | | | | |- |Hull North | width=5px; style=\"background:red\"| | Labour hold | 13,044 | 39.2\\% | 12.2\\% (to LD) |- |Hull West and Hessle | width=5px; style=\"background:\"| | | | | |- |Huntingdon | width=5px; style=\"background:\"| | | | | |- |Hyndburn | width=5px; style=\"background:\"| | | | | |- |Ilford North | width=5px; style=\"background:\"| | | | | |- |Ilford South | width=5px; style=\"background:\"| | | | | |- |Inverclyde | width=5px; style=\"background:\"| | | | | |- |Inverness, Nairn, Badenoch and Strathspey | width=5px; style=\"background:\"| | | | | |- |Ipswich | width=5px; style=\"background:\"| | | | | |- |Isle of Wight | width=5px; style=\"background:\"| | | | | |- |Islington North | width=5px; style=\"background:red\"| | Labour hold | 24,276 | 54.5\\% | |- |Islington South and Finsbury | width=5px; style=\"background:red\"| | Labour hold | 18,407 | 42.3\\% | 3.3\\% |- |Islwyn | width=5px; style=\"background:\"| | | | | |- |Jarrow | width=5px; style=\"background:red\" | | Labour hold | 20,910 | 53.9\\% | 6.4\\% |- |Keighley | width=5px; style=\"background:\"| | | | | |- |Kenilworth and Southam | width=5px; style=\"background:\"| | | | | |- |Kensington | width=5px; style=\"background:blue\"| | Conservative hold | 17,595 | 50.1\\% | 5.2\\% |- |Kettering | width=5px; style=\"background:\"| | | | | |- |Kilmarnock and Loudoun | width=5px; style=\"background:\"| | | | | |- |Kingston and Surbiton | width=5px; style=\"background:\"| | | | | |- |Kingswood | width=5px; style=\"background:\"| | | | | |- |Kilcaldy and Cowdenbeath | width=5px; style=\"background:\"| | | | | |- |Knowsley | width=5px; style=\"background:\"| | | | | |- |Lagan Valley | width=5px; style=\"background:#c30\"| |Democratic Unionist hold |18,199 |49.8\\% | |- |Lanark and Hamilton East | width=5px; style=\"background:\"| | | | | |- |Lancashire West | width=5px; style=\"background:\"| | | | | |- |Lancaster and Fleetwood | width=5px; style=\"background:\"| | | | | |- |Leeds Central | width=5px; style=\"background:red\"| | Labour hold | 18,434 | 49.3\\% | |- |Leeds East | width=5px; style=\"background:\"| | | | | |- |Leeds North East | width=5px; style=\"background:red\"| | Labour hold | 20,287 | 42.7\\% | |- |Leeds North West | width=5px; style=\"background:\"| | | | | |- |Leeds West | width=5px; style=\"background:red\"| | Labour hold | 16,389 | 42.3\\% | |- |Leicester East | width=5px; style=\"background:\"| | | | | |- |Leicester South | width=5px; style=\"background:blue\"| | Conservative hold | 27,000 | 49.5\\% | |- |Leicester West | width=5px; style=\"background:\"| | | | | |- |Leicestershire North West | width=5px; style=\"background:\"| | | | | |- |Leicestershire South | width=5px; style=\"background:\"| | | | | |- |Leigh | width=5px; style=\"background:red\"| | Labour hold | 24,295 | 51.3\\% | |- |Lewes | width=5px; style=\"background:\"| | | | | |- |Lewisham Deptford | width=5px; style=\"background:\"| | | | | |- |Lewisham East | width=5px; style=\"background:\"| | | | | |- |Lewisham West and Penge | width=5px; style=\"background:\"| | | | | |- |Leyton and Wanstead | width=5px; style=\"background:\"| | | | | |- |Lichfield | width=5px; style=\"background:\"| | | | | |- |Lincoln | width=5px; style=\"background:\"| | | | | |- |Linlithgow and Falkirk East | width=5px; style=\"background:\"| | | | | |- |Liverpool Riverside | width=5px; style=\"background:red\"| | Labour hold | 22,998 | 59.3\\% | |- |Liverpool Walton | width=5px; style=\"background:\"| | | | | |- |Liverpool Wavertree | width=5px; style=\"background:\"| | | | | |- |Liverpool West Derby | width=5px; style=\"background:\"| | | | | |- |Livingston | width=5px; style=\"background:\"| | | | | |- |Llanelli | width=5px; style=\"background:red\"| | Labour hold | 15,916 | 42.5\\% | 4.0\\% (to PC) |- |Londonderry East | width=5px; style=\"background:\"| | | | | |- |Loughborough | width=5px; style=\"background:\"| | | | | |- |Louth and Horncastle | width=5px; style=\"background:blue\"| | Conservative hold | 25,065 | 49.6\\% | |- |Ludlow | width=5px; style=\"background:\"| | | | | |- |Luton North | width=5px; style=\"background:red\"| |Labour hold |21,192 |49.3\\% |0.5\\% |- |Luton South | width=5px; style=\"background:red\"| | Labour hold | 14,725 | 34.9\\% | 4.6\\% (to CON) |- |Macclesfield | width=5px; style=\"background:\" | | | | | |- |Maidenhead | width=5px; style=\"background:blue\" | |Conservative hold |31,937 |59.5\\% |7.8\\% |- |Maidstone and the Weald | width=5px; style=\"background:blue\" | | Conservative hold | 23,491 | 48.0\\% | |- |Makerfield | width=5px; style=\"background:\" | | | | | |- |Maldon | width=5px; style=\"background:\" | | | | | |- |Manchester Central | width=5px; style=\"background:\" | | | | | |- |Manchester Gorton | width=5px; style=\"background:\" | | | | | |- |Manchester Withington | width=5px; style=\"background:\" | | | | | |- |Mansfield | width=5px; style=\"background:\" | | | | | |- |Meon Valley | width=5px; style=\"background:\" | | | | | |- |Meriden | width=5px; style=\"background:\" | | | | | |- |Merthyr Tydfil and Rhymney | width=5px; style=\"background:\" | | | | | |- |Middlesbrough | width=5px; style=\"background:\" | | | | | |- |Middlesbrough South and Cleveland East | width=5px; style=\"background:red\" | | Labour hold | 18,138 | 39.2\\% | |- |Midlothian | width=5px; style=\"background:\" | | | | | |- |Milton Keynes North | width=5px; style=\"background:\" | | | | | |- |Milton Keynes South | width=5px; style=\"background:\" | | | | | |- |Mitcham and Morden | width=5px; style=\"background:red\" | | Labour hold | 24,722 | 56.4\\% | |- |Mole Valley | width=5px; style=\"background:blue\" | | Conservative hold | 31,263 | 57.5\\% | 2.3\\% |- |Monmouth | width=5px; style=\"background:\" | | | | | |- |Montgomeryshire | width=5px; style=\"background:\" | | | | | |- |Moray | width=5px; style=\"background:\" | | | | | |- |Morecambe and Lunesdale | width=5px; style=\"background:\" | | | | | |- |Morley and Outwood | width=5px; style=\"background:\" | | | | | |- |Motherwell and Wishaw | width=5px; style=\"background:\" | | | | | |- |Na H-Eileanan An Iar | width=5px; style=\"background:#ff0\" | | SNP hold |6,723 |45.75\\% | |- |Neath | width=5px; style=\"background:\" | | | | | |- |New Forest East | width=5px; style=\"background:\" | | | | | |- |New Forest West | width=5px; style=\"background:\" | | | | | |- |Newark | width=5px; style=\"background:\" | | | | | |- |Newbury | width=5px; style=\"background:\" | | | | | |- |Newcastle-Under-Lyme | width=5px; style=\"background:\" | | | | | |- |Newcastle upon Tyne Central | width=5px; style=\"background:red\"| | Labour hold | 15,692 | 45.9\\% | 0.6\\% (to LD) |- |Newcastle upon Tyne East | width=5px; style=\"background:red\"| | Labour hold | 17,043 | 45.0 | 4.6\\% (to LD) |- |Newcastle upon Tyne North | width=5px; style=\"background:red\"| | Labour hold | 17,950 | 40.8 | 4.5\\% (to LD) |- |Newport East | width=5px; style=\"background:\" | | | | | |- |Newport West | width=5px; style=\"background:\" | | | | | |- |Newry and Armagh | width=5px; style=\"background:\" | | | | | |- |Newton Abbot | width=5px; style=\"background:blue\" | | Conservative gain from Lib |20,774 |43.0\\% |5.8\\% |- |Norfolk Mid | width=5px; style=\"background:\" | | | | | |- |Norfolk North | width=5px; style=\"background:\" | | | | | |- |Norfolk North West | width=5px; style=\"background:\" | | | | | |- |Norfolk South | width=5px; style=\"background:\" | | | | | |- |Norfolk South West | width=5px; style=\"background:\" | | | | | |- |Normanton, Pontefract and Castleford | width=5px; style=\"background:\" | | | | | |- |Northampton North | width=5px; style=\"background:\" | | | | | |- |Northampton South | width=5px; style=\"background:\" | | | | | |- |Northamptonshire South | width=5px; style=\"background:blue\" | | Conservative hold | 33,081 | 55.2\\% | |- |Norwich North | width=5px; style=\"background:\" | | | | | |- |Norwich South | width=5px; style=\"background:\" | | | | | |- |Nottingham East | width=5px; style=\"background:\" | | | | | |- |Nottingham North | width=5px; style=\"background:\" | | | | | |- |Nottingham South | width=5px; style=\"background:\" | | | | | |- |Nuneaton | width=5px; style=\"background:\" | | | | | |- |Ochil and Perthshire South | width=5px; style=\"background:red\" | | Labour hold | 19,131 | 37.9\\% | |- |Ogmore | width=5px; style=\"background:\" | | | | | |- |Old Bexley and Sidcup | width=5px; style=\"background:\" | | | | | |- |Oldham East and Saddleworth | width=5px; style=\"background:\" | | | | | |- |Oldham West and Royton | width=5px; style=\"background:\" | | | | | |- |Orkney and Shetland | width=5px; style=\"background:\" | | | | | |- |Orpington | width=5px; style=\"background:\" | | | | | |- |Oxford East | width=5px; style=\"background:\" | | | | | |- |Oxford West and Abingdon | width=5px; style=\"background:\" | | | | | |- |Paisley and Renfrewshire North | width=5px; style=\"background:\" | | | | | |- |Paisley and Renfrewshire South | width=5px; style=\"background:\" | | | | | |- |Pendle | width=5px; style=\"background:\" | | | | | |- |Penistone and Stocksbridge | width=5px; style=\"background:\" | | | | | |- |Penrith and the Border | width=5px; style=\"background:\" | | | | | |- |Perth and Perthshire North | width=5px; style=\"background:#ff0\" | | SNP hold | 19,118 | 39.6\\% | 2.9\\% |- |Peterborough | width=5px; style=\"background:\" | | | | | |- |Plymouth Moor View | width=5px; style=\"background:red\" | | Labour hold |15,433 |37.2\\% |7.8\\% (to CON) |- |Plymouth Sutton and Devonport | width=5px; style=\"background:blue\" | | Conservative gain from Lab |15,050 |34.3\\% |6.9\\% |- |Pontypridd | width=5px; style=\"background:red\" | | Labour hold | 14,220 | 38.8\\% | |- |Poole | width=5px; style=\"background:\" | | | | | |- |Poplar and Limehouse | width=5px; style=\"background:\" | | | | | |- |Portsmouth North | width=5px; style=\"background:\" | | | | | |- |Portsmouth South | width=5px; style=\"background:\" | | | | | |- |Preseli Pembrokeshire | width=5px; style=\"background:\" | | | | | |- |Preston | width=5px; style=\"background:\" | | | | | |- |Pudsey | width=5px; style=\"background:\" | | | | | |- |Putney | width=5px; style=\"background:\" | | | | | |- |Rayleigh and Wickford | width=5px; style=\"background:\" | | | | | |- |Reading East | width=5px; style=\"background:\" | | | | | |- |Reading West | width=5px; style=\"background:\" | | | | | |- |Redcar | width=5px; style=\"background:#F9D616\"| | Liberal Democrat gain from Lab | 18,955 | 45.2\\% | 21.8\\% |- |Redditch | width=5px; style=\"background:\" | | | | | |- |Reigate | width=5px; style=\"background:\" | | | | | |- |Renfrewshire East | width=5px; style=\"background:\" | | | | | |- |Rhondda | width=5px; style=\"background:\" | | | | | |- |Ribble Valley | width=5px; style=\"background:\" | | | | | |- |Richmond Yorks | width=5px; style=\"background:\" | | | | | |- |Richmond Park | width=5px; style=\"background:\" | | | | | |- |Rochdale | width=5px; style=\"background:\" | | | | | |- |Rochester and Strood | width=5px; style=\"background:blue\" | | Conservative hold | 23,604 | 49.2\\% | |- |Rochford and Southend East | width=5px; style=\"background:\" | | | | | |- |Romford | width=5px; style=\"background:\" | | | | | |- |Romsey and Southampton North | width=5px; style=\"background:\" | | | | | |- |Ross, Skye and Lochaber | width=5px; style=\"background:\" | | | | | |- |Rossendale and Darwen | width=5px; style=\"background:\" | | | | | |- |Rother Valley | width=5px; style=\"background:\" | | | | | |- |Rotherham | width=5px; style=\"background:\" | | | | | |- |Rugby | width=5px; style=\"background:\" | | | | | |- |Ruislip, Northwood and Pinner | width=5px; style=\"background:\" | | | | | |- |Runnymede and Weybridge | width=5px; style=\"background:\" | | | | | |- |Rushcliffe | width=5px; style=\"background:\" | | | | | |- |Rutherglen and Hamilton West | width=5px; style=\"background:\" | | | | | |- |Rutland and Melton | width=5px; style=\"background:\" | | | | | |- |Saffron Walden | width=5px; style=\"background:\" | | | | | |- |St Albans | width=5px; style=\"background:\" | | | | | |- |St Austell and Newquay | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold |20,189 |42.7\\% | |- |St Helens North | width=5px; style=\"background:red\" | | Labour hold | 23,041 | 51.7\\% | |- |St Helens South | width=5px; style=\"background:red\" | | Labour hold | 24,364 | 52.9\\% | |- |St Ives | width=5px; style=\"background:\" | | | | | |- |Salford and Eccles | width=5px; style=\"background:red\" | | Labour hold | 16,655 | 40.1\\% | |- |Salisbury | width=5px; style=\"background:\" | | | | | |- |Scarborough and Whitby | width=5px; style=\"background:blue\" | | Conservative hold | 21,108 | 42.8\\% | |- |Scunthorpe | width=5px; style=\"background:\" | | | | | |- |Sedgefield | width=5px; style=\"background:red\" | | Labour hold |18,141 |45.1\\% |11.6\\% (to CON) |- |Sefton Central | width=5px; style=\"background:\" | | | | | |- |Selby and Ainsty | width=5px; style=\"background:blue\" | | Conservative hold | 25,562 | 49.4\\% | |- |Sevenoaks | width=5px; style=\"background:\" | | | | | |- |Sheffield Brightside and Hillsborough | width=5px; style=\"background:red\" | | 'Labour hold | 21,400 | 55.0\\% | |- |Sheffield Central | width=5px; style=\"background:\"red\" | | Labour hold | 17,138 | 41.3\\% | |- |Sheffield Hallam | width=5px; style=\"background:\"#F9D616\" | | Liberal Democrat Hold | 27,324 | 53.4\\% | |- |Sheffield Heeley | width=5px; style=\"background:\" | | | | | |- |Sheffield South East | width=5px; style=\"background:red\" | | Labour hold | 20,169 | 48.7\\% | |- |Sherwood | width=5px; style=\"background:\" | | | | | |- |Shipley | width=5px; style=\"background:blue\" | | Conservative hold | 24,002 | 48.6\\% | |- |Shrewsbury and Atcham | width=5px; style=\"background:\" | | | | | |- |Shropshire North | width=5px; style=\"background:blue\" | | Conservative hold | 26,692 | 51.5\\% | |- |Sittingbourne and Sheppey | width=5px; style=\"background:\" | | | | | |- |Skipton and Ripon | width=5px; style=\"background:\" | | | | | |- |Sleaford and North Hykeham | width=5px; style=\"background:blue\" | | Conservative hold | 30,719 | 51.6\\% | |- |Slough | width=5px; style=\"background:\" | | | | | |- |Solihull | width=5px; style=\"background:#F9D616\" | | Liberal Democrat gain from Con | 23,635 | 42.9\\% | 0.3\\% |- |Somerset North | width=5px; style=\"background:\" | | | | | |- |Somerset North East | width=5px; style=\"background:\" | | | | | |- |Somerton and Frome | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold |28,793 |47.5\\% | |- |South Holland and the Deepings | width=5px; style=\"background:\" | | | | | |- |South Ribble | width=5px; style=\"background:\" | | | | | |- |South Shields | width=5px; style=\"background:red\" | | Labour hold | 18,995 | 52.0\\% | |- |Southampton Itchen | width=5px; style=\"background:red\" | | Labour hold | 16,326 | 36.8\\% | |- |Southampton Test | width=5px; style=\"background:red\" | | Labour hold | 17,001 | 38.5\\% | |- |Southampton West | width=5px; style=\"background:\" | | | | | |- |Southport | width=5px; style=\"background:\" | | | | | |- |Spelthorne | width=5px; style=\"background:\" | | | | | |- |Stafford | width=5px; style=\"background:\" | | | | | |- |Staffordshire Moorlands | width=5px; style=\"background:\" | | | | | |- |Staffordshire South | width=5px; style=\"background:\" | | | | | |- |Stalybridge and Hyde | width=5px; style=\"background:\" | | | | | |- |Stevenage | width=5px; style=\"background:\" | | | | | |- |Stirling | width=5px; style=\"background:red\" | |Labour hold |19,558 |41.8\\% | |- |Stockport | width=5px; style=\"background:red\" | | Labour hold | 16,697 | 42.7\\% | |- |Stockton North | width=5px; style=\"background:\" | | | | | |- |Stockton South | width=5px; style=\"background:\" | | | | | |- |Stoke-on-Trent Central | width=5px; style=\"background:\" | | | | | |- |Stoke-on-Trent North | width=5px; style=\"background:\" | | | | | |- |Stoke-on-Trent South | width=5px; style=\"background:red\" | | Labour hold | 15,446 | 38.8\\% | |- |Stone | width=5px; style=\"background:\" | | | | | |- |Stourbridge | width=5px; style=\"background:\" | | | | | |- |Strangford | width=5px; style=\"background:\" | | | | | |- |Stratford-on-Avon | width=5px; style=\"background:\" | | | | | |- |Streatham | width=5px; style=\"background:\" | | | | | |- |Stretford and Urmston | width=5px; style=\"background:\" | | | | | |- |Stroud | width=5px; style=\"background:\" | | | | | |- |suffolk Central and Ipswitch North | width=5px; style=\"background:\" | | | | | |- |Suffolk Coastal | width=5px; style=\"background:\" | | | | | |- |Suffolk South | width=5px; style=\"background:\" | | | | | |- |Suffolk West | width=5px; style=\"background:\" | | | | | |- |Sunderland Central | width=5px; style=\"background:red\" | |Labour win (new seat) |19,495 |45.9\\% | |- |Surrey East (UK Parliament constituency) | width=5px; style=\"background:blue\" | | Conservative hold | 31,007 | 56.7\\% | 0.7\\% (to LD) |- |Surrey Heath | width=5px; style=\"background:blue\" | | Conservative hold | 31,326 | 57.6\\% | 4.6\\% |- |Surrey South West | width=5px; style=\"background:blue\" | | Conservative hold | 33,605 | 58.7\\% | 8.6\\% |- |Sussex Mid | width=5px; style=\"background:blue\" | |Conservative hold |28,329 |50.7\\% |0.3\\% |- |Sutton and Cheam | width=5px; style=\"background:\" | | | | | |- |Sutton Coldfield | width=5px; style=\"background:\" | | | | | |- |Swansea East | width=5px; style=\"background:\" | | | | | |- |Swansea West | width=5px; style=\"background:\" | | | | | |- |Swindon North | width=5px; style=\"background:\" | | | | | |- |Swindon South | width=5px; style=\"background:\" | | | | | |- |Tamworth | width=5px; style=\"background:\" | | | | | |- |Tatton | width=5px; style=\"background:\" | | | | | |- |Taunton Deane | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold |28,531 |49.1\\% | |- |Telford | width=5px; style=\"background:\" | | | | | |- |Tewkesbury | width=5px; style=\"background:blue\" | | Conservative hold | 25,472 | 47.2\\% | |- |Thanet North | width=5px; style=\"background:\" | | | | | |- |Thanet South | width=5px; style=\"background:\" | | | | | |- |Thirsk and Malton | width=5px; style=\"background:black\" | | Delayed until 27 May'' | | | |- |Thornbury and Yate | width=5px; style=\"background:\" | | | | | |- |Thurrock | width=5px; style=\"background:\" | | | | | |- |Tiverton and Honiton | width=5px; style=\"background:blue\" | | Conservative hold | 27,614 | 50.3\\% | |- |Tonbridge and Malling | width=5px; style=\"background:\" | | | | | |- |Tooting | width=5px; style=\"background:\" | | | | | |- |Torbay | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold |23,126 |47.0\\% | |- |Torfaen | width=5px; style=\"background:\" | | | | | |- |Totnes | width=5px; style=\"background:blue\" | | Conservative hold|21,940 |45.9\\% | |- |Tottenham | width=5px; style=\"background:\" | | | | | |- |Truro and Falmouth | width=5px; style=\"background:blue\" | | Conservative gain from Lib |20,349 |41.7\\% | |- |Tunbridge Wells | width=5px; style=\"background:\" | | | | | |- |Twickenham | width=5px; style=\"background:\" | | | | | |- |Tynemouth | width=5px; style=\"background:\" | | | | | |- |Tyneside North | width=5px; style=\"background:\" | | | | | |- |Tyrone West | width=5px; style=\"background:#060\" | |Sinn F\u00e9in hold|18,050 |48.4\\% | |- |Ulster Mid | width=5px; style=\"background:\" | | | | | |- |Upper Bann | width=5px; style=\"background:#c30\" | |Democratic Unionist hold|14,000 |33.8\\% | |- |Uxbridge and Ruiislip South | width=5px; style=\"background:\" | | | | | |- |Vale of Clwyd | width=5px; style=\"background:red\" | | Labour hold|15,017 |42.3\\% | |- |Vale of Glamorgan | width=5px; style=\"background:\" | | | | | |- |Vauxhall | width=5px; style=\"background:\" | | | | | |- |Wakefield | width=5px; style=\"background:\" | | | | | |- |Wallasey | width=5px; style=\"background:\" | | | | | |- |Walsall North | width=5px; style=\"background:red\" | | Labour hold | 13,385 | 37.0\\% | |- |Walsall South | width=5px; style=\"background:red\" | | Labour hold | 16,211 | 39.7\\% | |- |Walthamstow | width=5px; style=\"background:\" | | | | | |- |Wansbeck | width=5px; style=\"background:\" | | | | | |- |Wantage | width=5px; style=\"background:\" | | | | | |- |Warley | width=5px; style=\"background:red\" | | Labour hold| 20,240 | 52.9\\% | |- |Warrington North | width=5px; style=\"background:\" | | | | | |- |Warrington South | width=5px; style=\"background:\" | | | | | |- |Warwick and Leamington | width=5px; style=\"background:\" | | | | | |- |Warwickshire North | width=5px; style=\"background:\" | | | | | |- |Washington and Sunderland West | width=5px; style=\"background:red\" | |Labour win (new seat) |19,615 |53\\% | |- |Watford | width=5px; style=\"background:\" | | | | | |- |Waveney | width=5px; style=\"background:\" | | | | | |- |Wealden | width=5px; style=\"background:blue\" | | Conservative hold| 31,090 | 56.6\\% | |- |Weaver Vale | width=5px; style=\"background:\" | | | | | |- |Wellingborough | width=5px; style=\"background:blue\" | | Conservative hold| 24,918 | 48.2\\% | |- |Wells | width=5px; style=\"background:#F9D616\" | | Liberal Democrat gain from Con |24,560 |44.0\\% |3.6\\% |- |Welwyn Hatfield | width=5px; style=\"background:\" | | | | | |- |Wentworth and Dearne | width=5px; style=\"background:\" | | | | | |- |West Bromwich East | width=5px; style=\"background:\" | | | | | |- |West Bromwich West | width=5px; style=\"background:\" | | | | | |- |West Ham | width=5px; style=\"background:\" | | | | | |- |Westminster North | width=5px; style=\"background:red\" | | Labour hold| 17,377 | 43.9\\% | |- |Westmorland and Lonsdale | width=5px; style=\"background:\" | | | | | |- |Weston Super-Mare | width=5px; style=\"background:\" | | | | | |- |Wigan | width=5px; style=\"background:\" | | | | | |- |Wiltshire North | width=5px; style=\"background:\" | | | | | |- |Wiltshire South West | width=5px; style=\"background:\" | | | | | |- |Wimbledon | width=5px; style=\"background:\" | | | | | |- |Winchester | width=5px; style=\"background:\" | | | | | |- |Windsor | width=5px; style=\"background:\" | | | | | |- |Wirral South | width=5px; style=\"background:red\" | | Labour hold| 16,276 | 40.8\\% | |- |Wirral West | width=5px; style=\"background:blue\" | | Conservative hold| 16,726 | 42.5\\% | |- |Witham | width=5px; style=\"background:\" | | | | | |- |Witney | width=5px; style=\"background:\" | | | | | |- |Woking | width=5px; style=\"background:blue\" | | Conservative hold| 26,551 | 50.3\\% | 0.7\\% (to LD) |- |Wokingham | width=5px; style=\"background:blue\" | | Conservative hold| 28,754 | 52.7\\% | 4.7\\% |- |Wolverhampton North East | width=5px; style=\"background:\" | | | | | |- |Wolverhampton South East | width=5px; style=\"background:\" | | | | | |- |Wolverhampton South West | width=5px; style=\"background:\" | | | | | |- |Worcester | width=5px; style=\"background:\" | | | | | |- |Worcestershire Mid | width=5px; style=\"background:blue\" | | Conservative hold| 27,770 | 54.5\\% | |- |Worcestershire West | width=5px; style=\"background:\" | | | | | |- |Workington | width=5px; style=\"background:red\" | | Labour hold| 17,865 | 45.5\\% | |- |Worsley and Eccles South | width=5px; style=\"background:red\" | | Labour hold| 17,892 | 42.9\\% | |- |Worthing East and Shoreham | width=5px; style=\"background:blue\" | | Conservative hold| 23,458 | 48.5\\% | |- |Worthing West | width=5px; style=\"background:blue\" | | Conservative hold| 25,416 | 51.7\\% | |- |The Wreckin | width=5px; style=\"background:\" | | | | | |- |Wrexham | width=5px; style=\"background:red\" | | Labour hold| 12,161 | 36.9\\% | 5.7\\% |- |Wycombe | width=5px; style=\"background:blue\" | | Conservative hold| 23,423 | 48.6\\% | |- |Wyre and Preston North | width=5px; style=\"background:blue\" | | Conservative hold| 26,877 | 52.4\\% | 3.9\\% |- |Wyre Forest | width=5px; style=\"background:red\" | | Labour hold| 11,490 | 33.4\\% | |- |Wythenshawe and Sale East | width=5px; style=\"background:red\" | | Labour hold| 17,987 | 44.1\\% | |- |Yeovil | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold| 31,843 | 55.7\\% | 2.7\\% |- |Ynys Mon | width=5px; style=\"background:red\" | | Labour hold| 11,490 | 33.4\\% | 1.8\\% |- |York Central | width=5px; style=\"background:red\" | | Labour hold| 18,573 | 40.0\\% | 6.0\\% (to CON) |- |York Outer | width=5px; style=\"background:blue\" | | Conservative gain from Liberal Democrats | 22,912 | 43\\% | 3.7\\% |- |Yorkshire East | width=5px; style=\"background:blue\" | | Conservative hold''' 24,328 47.5\\% 0.1\\% (to LD)", "after_revision": "A colour-coded map of the constituencies contested. Please click the image to expand. This table shows the results for 649 of 650 constituencies in the in the United Kingdom (not including the delayed constituency of , which will hold its election on 27 May). The \"Constituency\" column shows the name of each constituency, linked to the relevant Wikipedia article. the \"Result\" column shows the winning party, and whether they held or gained the seat (and, if relevant, who they gained it from). The \"Votes\" column shows how many votes were received by the winning party, the \"Share\" column their share of the vote, and the \"Swing\" column the in the direction of the gaining party. In the general election, people over the age of eighteen around the United Kingdom may choose to vote for a candidate at their local polling booth, and Members of Parliament are elected to each constituency based on the system. Whichever party has a majority of MPs after all constituencies have announced their results has the opportunity to form a government. The incumbent party before the dissolution of parliament was Gordon Brown's , exit polls suggested a small majority, which\u2014when this swing is projected nationally\u2014would cause a . The exit polls also suggested that despite reports that support for the had surged following the first national televised leaders' debates in the United Kingdom, the Liberal Democrats would suffer from a third party squeeze. On the morning of Friday 7, 2010 the accuracy of the exit polls was demonstrated when it was revealed that there was indeed a hung Parliament and that although the Conservative Party had the greatest number of seats and votes it would be impossible for them to achieve an outright majority. The constitution of the United Kingdom allows for the incumbent Labour Party to first attempt to form a government and incumbent Prime Minister, announced that he would allow civil servants from the Cabinet Office to help facilitate negotiations. Despite the Labour Party openly courting the Liberal Party, their leader has stated that as the party with the most seats and most votes the Conservatives have the right to attempt to form a government. Some seats were also be contested by one or more of a number of smaller parties and independents, including the , the , and the , who all already hold seats in the and local government authorities, all hoped to gain their first seats in the in this election. History was made when the Greens won their first Parliamentery with their leader winning . In Northern Ireland the also won their first seat with taking 's seat. Overall standings PartySeatsNet gainVotesShare 305 +97 10,681,417 36.1\\% 258 -91 8,601,441 29.1\\% 57 -5 6,805,665 23.0\\% 8 -1 168,216 0.6\\% 6 0 491,386 1.7\\% 5 0 171,942 0.6\\% 3 +1 165,394 0.6\\% 3 0 110,970 0.4\\% 1 +1 42,762 0.1\\% 1 +1 284,566 1.0\\% Table Colour Party Red Blue Yellow Yellow (Northern Ireland) Bright Yellow Green (England) Light Green (Wales) Light Green (N. Ireland) Dark Green Brown Purple Grey Black Poll delayed White Undeclared ConstituencyResultVotesShareSwing Labour hold 16,073 51.9\\% 5.3\\% (to LD) Conservative gain from Lab 10,734 35.8\\% 7.6\\% Labour hold 16,746 44.4\\% 1.0\\% Labour hold 15,722 36.5\\% 2.5\\% Liberal Democrat hold 17,362 38.4\\% 4.9\\% (to CON) Labour hold20,64958.2\\% 3.9\\% (to SNP) Conservative hold 21,203 46.7\\% 1.4\\% (to LD) Conservative hold 22,913 59.3\\% 12.0\\% (from LAB) Conservative hold 24,176 48.9\\% 0.8\\% (to LD) Labour hold 15,804 39.6\\% 8.1\\% (to CON) Conservative gain from Lab 17,746 38.6\\% 6.9\\% SNP hold 15,020 39.6\\% 2.2\\% Democratic Unionist hold13,99345.9\\% Democratic Unionist hold19,67246.4\\% Democratic Unionist hold 11,536 33.9\\% 3.6\\% (to UCU) Plaid Cymru gain from Lab9,38336.0\\%3.7\\%Argyle and Bute Liberal Democrat hold14,29231.6\\%2.7\\% (to CON) Conservative hold32,33357.8\\%3.0\\% Labour hold16,23933.7\\%17.2\\% (to LD) Conservative hold29,87854.1\\%2.3\\% (to LD) Labour hold18,60448.4\\%7.3\\% (to CON) Conservative hold27,73652.2\\% Labour hold21,63247.1\\%0.3\\% (to CON) Labour hold20,95047.7\\%1.5\\% Labour hold21,86047.4\\%2.3\\% (to SNP) Conservative hold29,703 52.8\\%5.9\\% (to CON) SNP hold15,86841.3\\%10.7\\% (to CON) Labour hold24,62854.3\\%1.7\\%Barnsley CentralLabour hold17,48747.3\\%4.2\\% (to LD)Barnsley EasyLabour hold18,05947.0\\%14.0\\% (to LD)Barrow and FurnessLabour hold21,22648.1\\%0.4\\% (to CON)Basildon and BillericayConservative hold21,98252.8\\%9.3\\%Basildon South and Thurrock EastConservative gain from Lab19,62443.9\\%7.5\\%BasingstokeConservative hold25,59050.5\\%4.6\\%BassrtlawLabour hold25,01850.5\\%0.7\\% (to CON)BathLiberal Democrat hold26,65156.6\\%5.8\\%Batley and Spen Labour hold 21,565 41.5\\% 2.5\\% (to CON)Battersea Conservative gain from Lab 23,103 47.3\\% 6.5\\%BeaconsfieldConservative hold32,05361.1\\%4.7\\%BeckanhamConservative hold27,59757.9\\%3.2\\% (to LD)BedfordConservative gain from Lab17,54638.9\\%5.5\\%Bedforsdhire MidConservative hold28,81552.5\\%2.3\\%Bedfordshire North EastConservative hold30,98955.8\\%2.6\\%Bedfordshire South WestConservative hold26,81552.8\\%0.7\\%Belfast EastAlliance gain from DUP12,83937.2\\%22.9\\%Belfast NorthDemocratic Unionist hold14,81240.0\\%5.0\\% (to SF)Belfast SouthSDLP hold14,02641.0\\%8.4\\%Belfast WestSinn F\u00e9in hold22,84071.1\\%1.1\\%Bermondsey and Old SouthwarkLiberal Democrat hold21,59048.4\\%1.6\\%Berwick-Upon-TweedLiberal Democrat hold16,80643.7\\%8.3\\% (to CON)Banff and BuchanLiberal Democrat hold22,23045.4\\%0.7\\% (to CON)Bethnal Green and BowBanff and BuchanConservative hold22,23045.4\\%1.6\\%Bexhill and BattleConservative hold28,14751.6\\%4.0\\% (to LD)Bexleyheath and CrayfordBirkenhead)Birmingham Edgbaston Labour hold 16,894 40.6\\% 0.5\\% (to CON)Birmingham ErdingtonBirmingham Hall GreenBirmingham Hodge HillBirmingham LadywoodLabour hold19,95055.7\\%2.5\\%Birmingham NorthfieldBirmingham Perry BarrBirmingham Selly Oak Labour hold 17,950 38.5\\% 4.8\\% (to CON)Birmingham YardleyBishop Auckland Labour hold 16,023 39.0\\% 7.2\\% (to CON)BlackburnLabour hold21,75147.8\\%1.1\\%Blackley and BroughtonBlackpool North and CleveleysConservative gain from Lab16,96441.8\\%6.9\\%Blackpool SouthLabour hold14,44941.16.2\\% (to CON)Blaenau GwentLabour gain from Ind 16,974 52.4\\% 29.2\\%Blaydon Labour hold 22,297 49.7\\% 3.3\\%Blyth ValleyBognor Regis and LittlehamptonConservative hold24,08751.4\\%2.3\\%BolsoverLabour hold21,99450.0\\%11.2\\% (to CON)Bolton North EastLabour hold19,87045.9\\%1.3\\% (to CON)Bolton South EastLabour hold18,78247.4\\%5.6\\% (to CON)Bolton West Labour hold 18,327 38.5\\% 4.9\\% (to CON)BootleBoston and SkegnessConservative hold18,78247.4\\%7.0\\%BosworthConservative hold23,13242.6\\%5.9\\% (to LD)Bournemouth EastConservative hold21,32048.4\\%1.8\\%Bournemouth West Conservative hold 18,808 45.1\\% 2.9\\%Bracknell Conservative hold 27,327 52.4\\% 1.0\\% (to LD)Bradford EastBradford SouthBradford WestBraintree Conservative hold 25,901 52.6\\% 6.7\\%Brecon and RadnorshireLiberal Democrat hold17,92946.2\\%0.3\\% (to CON)Brent CentralBrent NorthBrentford and IsleworthBrentwood and OngarConservative hold28,79256.9\\%3.1\\%BridgendLabour hold13,93136.3\\%6.0\\% (to CON)Bridgwater and Somerset West Conservative hold 24,675 45.3\\% 2.9\\% (to LD)Brigg and GooleConservative gain from Lab19,68044.9\\%9.8\\%Brighton KemptownBrighton Pavilion Green gain from Lab 16,238 31.3\\% 8.4\\%Bristol EastLabour hold16,47136.6\\%4.5\\% (to CON)Bristol North WestBristol SouthBristol WestLiberal Democrat hold26,59348.0\\%9.0\\%BroadlandBromley and ChislehurstBromsgroveBroxbourneConservative hold26,84458.8\\%6.4\\%BroxtoweConservative gain from Lab20,58539.0\\%2.6\\%BuckinghamBurnleyLiberal Democrat gain from Lab14,93235.7\\%9.6\\%BurtonConservative gain from Lab22,18844.5\\%8.7\\%Bury NorthBury SouthBury St EdmundsConservative hold27,89947.5\\%2.8\\%CaerphillyLabour hold17,37744.9\\%6.5\\% (to CON)Caithness, Sutherland and Easter RossLiberal Democrat hold11,90741.4\\%6.4\\% (to LAB)Calder ValleyCamberwell and PeckhamCambourne and Redruth Conservative gain from Lib37.6\\%15,9695.2\\%Cambridge Liberal Democrat hold 19,621 39.1\\% 7.0\\% (to CON)Cambridgeshire North EastConservative hold26,86251.4\\%0.8\\%Cambridgeshire North WestConservative hold29,42550.05\\%2.6\\%Cambridgeshire SouthConservative hold27,99547.4\\%2.5\\% (to LD)Cambridgeshire South EastConservative hold27,62948.0\\%2.7\\% (to LD)Cannock ChaseConservative gain from Lab18,27140.1\\%14.0\\%Canterbury Conservative hold22,05044.8\\%5.4\\% (to LD)Cardiff CentralCardiff NorthCardiff South and Penarth Labour hold 17,262 38.9\\% 6.0\\% (to CON)Cardiff West Labour hold 16,893 41.2\\% 5.3\\% (to CON)Carlisle Carmarthen East and Dinefwr Plaid Cymru hold 13,546 35.6\\% 4.2\\% (to LAB)Carmarthen West and Pembrokeshire South Conservative gain from Lab 16,649 41.1\\% 6.9\\%Carshalton and WallingtonCastle PointCeredigionCharnwoodChatham and AylesfordCheadleChelmsfordChelsea and FulhamCheltenhamChelsham and AmershamChester, City ofChesterfieldChichesterChingford and Woodford GreenChippenhamChipping BarnetChorleyChristchurchCities of London and WestminsterClactonCleethorpesConservative gain from Lab18,93942.1\\%7.8\\%Clwyd South Labour hold13,31138.4\\%5.8\\% (to CON)Clwyd West Conservative hold 15,833 41.5\\% 8.4\\%Coatbridge, Chryson and BellshillColchesterColne ValleyCongleton Conservative hold 23,250 45.8\\% 2.3\\% (to LD)Copeland Labour hold 19,699 46.0\\% 2.1\\% (to CON)Corby Conservative gain from Lab 22,886 42.2\\% 3.4\\%Cornwall North Liberal Democrat hold22,51248.1\\%0.3\\% (to CON)Cornwall South East Conservative gain from Lib22,39045.1\\%9.1\\%The Cotswolds Conservative hold 29,075 53.0\\% 1.1\\%Coventry North East Labour hold 21,384 49.3\\% 5.5\\% (to CON)Coventry North West Labour hold 19,936 42.8\\% 3.9\\% (to CON)Coventry South Labour hold 19,197 41.8\\% 3.4\\% (to CON)Crawley Conservative gain from Lab 21,264 44.8\\% 6.3\\%Crewe and Nantwich Conservative gain from Lab 23,420 45.8\\% 13.7\\%Croydon Central Conservative gain from Lab | 19,657 | 39.5\\% | 3.3\\% |- |Croydon North | width=5px; style=\"background:red\"| | Labour hold | 28,949 | 56.0\\% | 0.3\\% |- |Croydon South | width=5px; style=\"background:blue\"| | Conservative hold | 28,684 | 50.9\\% | 1.7\\% (to LD) |- |Cumbernauld, Kilsyth and Kirkintilloch East | width=5px; style=\"background:red\"| | Labour hold | 23,549 | 57.2\\% | 1.9\\% |- |Cynon Valley | width=5px; style=\"background:red\"| | Labour hold | 15,681 | 52.5\\% | 8.6\\% (to PC) |- |Dagenham and Rainham | width=5px; style=\"background:red\"| |Labour hold |17,813 |40.3\\% |4.9\\% (to CON) |- |Darlington | width=5px; style=\"background:red\"| | Labour hold |16,891 |39.4\\% |9.1\\% (to CON) |- |Dartford | width=5px; style=\"background:blue\"| |Conservative gain from Lab |24,428 |48.8\\% |11.6\\% |- |Daventry | width=5px; style=\"background:blue\"| | Conservative hold | 29,252 | 56.5\\% | 0.7\\% (to LD) |- |Delyn | width=5px; style=\"background:red\"| | Labour hold | 15,083 | 40.8\\% | 6.7\\% (to CON) |- |Denton and Reddish | width=5px; style=\"background:red\"| |Labour hold |19,191 |51.0\\% |6.2\\% (to CON) |- |Derby North | width=5px; style=\"background:red\"| | Labour hold | 14,896 | 33.0\\% | 7.4\\% (to CON) |- |Derby South | width=5px; style=\"background:red\"| |Labour hold |17,851 |43.3\\% |9.3\\% (to CON) |- |Derbyshire Dales | width=5px; style=\"background:blue\"| | Conservative hold | 24,378 | 52.1\\% | 3.7\\% |- |Derbyshire Mid | width=5px; style=\"background:blue\"| |Conservative hold |22,877 |48.3\\% |5.7\\% |- |Derbyshire North East | width=5px; style=\"background:red\"| |Labour hold |17,948 |38.2\\% |8.6\\% (to CON) |- |Derbyshire South | width=5px; style=\"background:blue\"| |Conservative gain from Lab |22,935 |45.5\\% |9.8\\% |- |Devizes | width=5px; style=\"background:\"| | | | | |- |Devon Central | width=5px; style=\"background:blue\"| | Conservative hold | 27,737 | 51.5\\% | 6.1\\% |- |Devon East | width=5px; style=\"background:blue\"| | Conservative hold |48.3\\% |25,662 | |- |Devon North | width=5px; style=\"background:#F9D616\"| | Liberal Democrat hold |24,305 |47.4\\% |0.3\\% |- |Devon South West | width=5px; style=\"background:blue\"| | Conservative hold |27,908 |56.0\\% |5.6\\% |- |Devon West and Torridge | width=5px; style=\"background:\"| | | | | |- |Dewsbury | width=5px; style=\"background:\"| | | | | |- |Don Valley | width=5px; style=\"background:\"| | | | | |- |Doncaster Central | width=5px; style=\"background:\"| | | | | |- |Doncaster North | width=5px; style=\"background:\"| | | | | |- |Doset Mid and Poole North | width=5px; style=\"background:\"| | | | | |- |Dorset North | width=5px; style=\"background:\"| | | | | |- |Dorset South | width=5px; style=\"background:blue\"| | Conservative gain from Lab |22,667 |45.1\\% |9.3\\% |- |Dorset West | width=5px; style=\"background:blue\"| | Conservative hold |27,287 |47.6\\% | |- |Dover | width=5px; style=\"background:\"| | | | | |- |Down North | width=5px; style=\"background:grey\"| |Independent gain from UCU |21,181 |63.3\\% | |- |Down South | width=5px; style=\"background:#3c3\" | |SDLP hold |20,648 |48.5\\% | |- |Dudley North | width=5px; style=\"background:\"| | | | | |- |Dudley South | width=5px; style=\"background:\"| | | | | |- |Dulwich and West Norwood | width=5px; style=\"background:\"| | | | | |- |Dumfries and Galloway | width=5px; style=\"background:\"| | | | | |- |Dunfiesshire, Clydesdale and Tweeddale | width=5px; style=\"background:\"| | | | | |- |Dunbartonshire East | width=5px; style=\"background:\"| | | | | |- |Dunbartonshire West | width=5px; style=\"background:\"| | | | | |- |Dundee East | width=5px; style=\"background:\"| | | | | |- |Dundee West | width=5px; style=\"background:\"| | | | | |- |Dunfermine and Fife West | width=5px; style=\"background:\"| | | | | |- |City of Durham | width=5px; style=\"background:red\"| | Labour hold |20,496 |44.3\\% | |- |Durham North | width=5px; style=\"background:red\"| |Labour hold |20,698 |50.5\\% | |- |Durham North West | width=5px; style=\"background:\"| | | | | |- |Dwyfor Meirionnydd | width=5px; style=\"background:\"| | | | | |- |Ealing Central and Acton | width=5px; style=\"background:\"| | | | | |- |Ealing North | width=5px; style=\"background:\"| | | | | |- |Ealing Southall | width=5px; style=\"background:\"| | | | | |- |Easington | width=5px; style=\"background:red\"| |Labour hold |20,579 |58.9\\% | |- |East Ham | width=5px; style=\"background:\"| | | | | |- |East Kilbride, Strathaven and Lesmahagow | width=5px; style=\"background:\"| | | | | |- |East Lothian | width=5px; style=\"background:\"| | | | | |- |Eastbourne | width=5px; style=\"background:\"| | | | | |- |Eastleigh | width=5px; style=\"background:\"| | | | | |- |Eddisbury | width=5px; style=\"background:\"| | | | | |- |Edinburgh East | width=5px; style=\"background:red\"| | Labour hold | 17,305 | 43.4\\% | |- |Edinburgh North and Leith | width=5px; style=\"background:\"| | | | | |- |Edinburgh South | width=5px; style=\"background:\"| | | | | |- |Edinburgh South West | width=5px; style=\"background:red\"| | Labour hold | 19,473 | 42.8\\% | |- |Edinburgh West | width=5px; style=\"background:#F9D616\"| | Liberal Democrat hold | 16,684 | 35.9\\% | -11.4\\% |- |Edmonton | width=5px; style=\"background:\"| | | | | |- |Ellesmere Port and Neston | width=5px; style=\"background:\"| | | | | |- |Elmet and Rothwell | width=5px; style=\"background:\"| | | | | |- |Eltham | width=5px; style=\"background:\"| | | | | |- |Enfield North | width=5px; style=\"background:\"| | | | | |- |Enfield Southgate | width=5px; style=\"background:\"| | | | | |- |Epping Forest | width=5px; style=\"background:\"| | | | | |- |Epsom and Ewell | width=5px; style=\"background:\"| | | | | |- |Erewash | width=5px; style=\"background:\"| | | | | |- |Erith and Thameshead | width=5px; style=\"background:\"| | | | | |- |Esher and Walton | width=5px; style=\"background:\"| | | | | |- |Exeter | width=5px; style=\"background:red\"| | Labour hold |19,942 |38.2\\% | |- |Falkirk | width=5px; style=\"background:red\"| | Labour hold |23,207 |45.7\\% | |- |Fareham | width=5px; style=\"background:blue\"| | Conservative hold |30,037 |55.3\\% | |- |Faversham and Kent Mid | width=5px; style=\"background:\"| | | | | |- |Feltham and Heston | width=5px; style=\"background:\"| | | | | |- |Fermanagh and South Tyrone | width=5px; style=\"background:#060\"| | Sinn F\u00e9in hold |21,304 |45.5\\% | |- |Fife North East | width=5px; style=\"background:\"| | | | | |- |Filton and Bradley Stoke | width=5px; style=\"background:\"| | | | | |- |Finchley and Golders Green | width=5px; style=\"background:\"| | | | | |- |Folkestone and Hythe | width=5px; style=\"background:\"| | | | | |- |Forest of Dean | width=5px; style=\"background:\"| | | | | |- |Foyle | width=5px; style=\"background:#3c3\" | |SDLP hold |16,922 |44.7\\% | |- |Flyde | width=5px; style=\"background:\"| | | | | |- |Gainsborough | width=5px; style=\"background:blue\"| | Conservative hold |24,266 |49.3\\% | |- |Garston and Halewood | width=5px; style=\"background:red\"| | Labour hold |25,493 |59.5\\% | |- |Gateshead | width=5px; style=\"background:\"| | | | | |- |Gedling | width=5px; style=\"background:red\"| | Labour hold |19,821 |41.1\\% | |- |Gillingham and Rainham | width=5px; style=\"background:\"| | | | | |- |Glasgow Central | width=5px; style=\"background:\"| | | | | |- |Glasgow East | width=5px; style=\"background:red\"| | Labour hold |19,797 |61.6\\% | |- |Glasgow North | width=5px; style=\"background:\"| | | | | |- |Glasgow North East | width=5px; style=\"background:red\"| | Labour hold | 20,100 | 68.3\\% | |- |Glasgow North West | width=5px; style=\"background:\"| | | | | |- |Glasgow South | width=5px; style=\"background:\"| | | | | |- |Glasgow South West | width=5px; style=\"background:\"| | | | | |- |Glenrothes | width=5px; style=\"background:\"| | | | | |- |Gloucester | width=5px; style=\"background:\"| | | | | |- |Gordon | width=5px; style=\"background:\"| | | | | |- |Gosport | width=5px; style=\"background:\"| | | | | |- |Gower | width=5px; style=\"background:\"| | | | | |- |Grantham and Stamford | width=5px; style=\"background:\"| | | | | |- |Gravesham | width=5px; style=\"background:blue\"| | Conservative hold | 22,956 | 48.5\\% | 9.1\\% |- |Great Grimsby | width=5px; style=\"background:red\"| |Labour hold |10,777 |32.7\\% |10.5\\% (to CON) |- |Great Yarmouth | width=5px; style=\"background:\"| | | | | |- |Greenwich and Woolwich | width=5px; style=\"background:\"| | | | | |- |Guildford | width=5px; style=\"background:blue\"| |Conservative hold |29,618 |53.3\\% |6.9\\% |- |Hackney North and Stoke Newington | width=5px; style=\"background:\"| | | | | |- |Hackney South and Shoreditch | width=5px; style=\"background:\"| | | | | |- |Halesowen and Rowley Regis | width=5px; style=\"background:\"| | | | | |- |Halifax | width=5px; style=\"background:\"| | | | | |- |Haltemprice and Howden | width=5px; style=\"background:blue\"| | Conservative hold | 24,486 | 50.2\\% | 6.6\\% |- |Halton | width=5px; style=\"background:\"| | | | | |- |Hammersmith | width=5px; style=\"background:red\"| | Labour hold | 20,810 | 43.9\\% | 0.5\\% (to CON) |- |Hampshire East | width=5px; style=\"background:\"| | | | | |- |Hampshire North East | width=5px; style=\"background:\"| | | | | |- |Hampshire North West | width=5px; style=\"background:\"| | | | | |- |Hampstead and Kilburn | width=5px; style=\"background:\"| | | | | |- |Harborough | width=5px; style=\"background:\"| | | | | |- |Harlow | width=5px; style=\"background:\"| | | | | |- |Harrogate and Knaresborough | width=5px; style=\"background:\"| | | | | |- |Harrow East | width=5px; style=\"background:blue\"| | Conservative gain from Lab | 21,435 | 44.7\\% | 7.0\\% (to CON) |- |Harrow West | width=5px; style=\"background:red\"| | Labour hold | 20,111 | 43.6\\% | 5.7\\% (to CON) |- |Hartlepool | width=5px; style=\"background:\"| | | | | |- |Harwich and Essex North | width=5px; style=\"background:\"| | | | | |- |Hastings and Rye | width=5px; style=\"background:\"| | | | | |- |Havant | width=5px; style=\"background:\"| | | | | |- |Hayes and Harlington | width=5px; style=\"background:\"| | | | | |- |Hazel Grove | width=5px; style=\"background:\"| | | | | |- |Hemel Hempstead | width=5px; style=\"background:\"| | | | | |- |Hemsworth | width=5px; style=\"background:\"| | | | | |- |Hendon | width=5px; style=\"background:\"| | | | | |- |Henley | width=5px; style=\"background:\"| | | | | |- |Hereford and Herefordshire South | width=5px; style=\"background:blue\"| |Conservative gain from Lib |22,366 |46.2\\% |3.8\\% |- |Herefordshire North | width=5px; style=\"background:blue\"| | Conservative hold | 24,631 | 51.8\\% | 3.8\\% (to LD) |- |Hertford and Stortford | width=5px; style=\"background:blue\"| | Conservative hold | 29,810 | 53.8\\% | |- |Hertfordshire North East | width=5px; style=\"background:blue\"| | Conservative hold | 26,995 | 53.5\\% | 1.9\\% (to LD) |- |Hertfordshire South West | width=5px; style=\"background:\"| | | | | |- |Hertsmere | width=5px; style=\"background:blue\"| | Conservative hold | 26,476 | 56.0\\% | 5.6\\% |- |Hexham | width=5px; style=\"background:\"| | | | | |- |Heywood and Middleton | width=5px; style=\"background:\"| | | | | |- |High Peak | width=5px; style=\"background:\"| | | | | |- |Hitchin and Harpenden | width=5px; style=\"background:\"| | | | | |- |Holborn and St Pancras | width=5px; style=\"background:\"| | | | | |- |Hornchurch and Upminster | width=5px; style=\"background:\"| | | | | |- |Hornsey and Wood Green | width=5px; style=\"background:\"| | | | | |- |Horsham | width=5px; style=\"background:\"| | | | | |- |Houghton and Sunderland South | width=5px; style=\"background:red\"| | Labour hold | 19,137 | 50.3\\% | 8.4\\% (to CON) |- |Hove | width=5px; style=\"background:\"| | | | | |- |Huddersfield | width=5px; style=\"background:red\"| | Labour hold | 15,725 | 38.8\\% | 7.1\\% (to CON) |- |Hull East | width=5px; style=\"background:\"| | | | | |- |Hull North | width=5px; style=\"background:red\"| | Labour hold | 13,044 | 39.2\\% | 12.2\\% (to LD) |- |Hull West and Hessle | width=5px; style=\"background:\"| | | | | |- |Huntingdon | width=5px; style=\"background:\"| | | | | |- |Hyndburn | width=5px; style=\"background:\"| | | | | |- |Ilford North | width=5px; style=\"background:\"| | | | | |- |Ilford South | width=5px; style=\"background:\"| | | | | |- |Inverclyde | width=5px; style=\"background:\"| | | | | |- |Inverness, Nairn, Badenoch and Strathspey | width=5px; style=\"background:\"| | | | | |- |Ipswich | width=5px; style=\"background:\"| | | | | |- |Isle of Wight | width=5px; style=\"background:\"| | | | | |- |Islington North | width=5px; style=\"background:red\"| | Labour hold | 24,276 | 54.5\\% | |- |Islington South and Finsbury | width=5px; style=\"background:red\"| | Labour hold | 18,407 | 42.3\\% | 3.3\\% |- |Islwyn | width=5px; style=\"background:\"| | | | | |- |Jarrow | width=5px; style=\"background:red\" | | Labour hold | 20,910 | 53.9\\% | 6.4\\% |- |Keighley | width=5px; style=\"background:\"| | | | | |- |Kenilworth and Southam | width=5px; style=\"background:\"| | | | | |- |Kensington | width=5px; style=\"background:blue\"| | Conservative hold | 17,595 | 50.1\\% | 5.2\\% |- |Kettering | width=5px; style=\"background:\"| | | | | |- |Kilmarnock and Loudoun | width=5px; style=\"background:\"| | | | | |- |Kingston and Surbiton | width=5px; style=\"background:\"| | | | | |- |Kingswood | width=5px; style=\"background:\"| | | | | |- |Kilcaldy and Cowdenbeath | width=5px; style=\"background:\"| | | | | |- |Knowsley | width=5px; style=\"background:\"| | | | | |- |Lagan Valley | width=5px; style=\"background:#c30\"| |Democratic Unionist hold |18,199 |49.8\\% | |- |Lanark and Hamilton East | width=5px; style=\"background:\"| | | | | |- |Lancashire West | width=5px; style=\"background:\"| | | | | |- |Lancaster and Fleetwood | width=5px; style=\"background:\"| | | | | |- |Leeds Central | width=5px; style=\"background:red\"| | Labour hold | 18,434 | 49.3\\% | |- |Leeds East | width=5px; style=\"background:\"| | | | | |- |Leeds North East | width=5px; style=\"background:red\"| | Labour hold | 20,287 | 42.7\\% | |- |Leeds North West | width=5px; style=\"background:\"| | | | | |- |Leeds West | width=5px; style=\"background:red\"| | Labour hold | 16,389 | 42.3\\% | |- |Leicester East | width=5px; style=\"background:\"| | | | | |- |Leicester South | width=5px; style=\"background:blue\"| | Conservative hold | 27,000 | 49.5\\% | |- |Leicester West | width=5px; style=\"background:\"| | | | | |- |Leicestershire North West | width=5px; style=\"background:\"| | | | | |- |Leicestershire South | width=5px; style=\"background:\"| | | | | |- |Leigh | width=5px; style=\"background:red\"| | Labour hold | 24,295 | 51.3\\% | |- |Lewes | width=5px; style=\"background:\"| | | | | |- |Lewisham Deptford | width=5px; style=\"background:\"| | | | | |- |Lewisham East | width=5px; style=\"background:\"| | | | | |- |Lewisham West and Penge | width=5px; style=\"background:\"| | | | | |- |Leyton and Wanstead | width=5px; style=\"background:\"| | | | | |- |Lichfield | width=5px; style=\"background:\"| | | | | |- |Lincoln | width=5px; style=\"background:\"| | | | | |- |Linlithgow and Falkirk East | width=5px; style=\"background:\"| | | | | |- |Liverpool Riverside | width=5px; style=\"background:red\"| | Labour hold | 22,998 | 59.3\\% | |- |Liverpool Walton | width=5px; style=\"background:\"| | | | | |- |Liverpool Wavertree | width=5px; style=\"background:\"| | | | | |- |Liverpool West Derby | width=5px; style=\"background:\"| | | | | |- |Livingston | width=5px; style=\"background:\"| | | | | |- |Llanelli | width=5px; style=\"background:red\"| | Labour hold | 15,916 | 42.5\\% | 4.0\\% (to PC) |- |Londonderry East | width=5px; style=\"background:\"| | | | | |- |Loughborough | width=5px; style=\"background:\"| | | | | |- |Louth and Horncastle | width=5px; style=\"background:blue\"| | Conservative hold | 25,065 | 49.6\\% | |- |Ludlow | width=5px; style=\"background:\"| | | | | |- |Luton North | width=5px; style=\"background:red\"| |Labour hold |21,192 |49.3\\% |0.5\\% |- |Luton South | width=5px; style=\"background:red\"| | Labour hold | 14,725 | 34.9\\% | 4.6\\% (to CON) |- |Macclesfield | width=5px; style=\"background:\" | | | | | |- |Maidenhead | width=5px; style=\"background:blue\" | |Conservative hold |31,937 |59.5\\% |7.8\\% |- |Maidstone and the Weald | width=5px; style=\"background:blue\" | | Conservative hold | 23,491 | 48.0\\% | |- |Makerfield | width=5px; style=\"background:\" | | | | | |- |Maldon | width=5px; style=\"background:\" | | | | | |- |Manchester Central | width=5px; style=\"background:\" | | | | | |- |Manchester Gorton | width=5px; style=\"background:\" | | | | | |- |Manchester Withington | width=5px; style=\"background:\" | | | | | |- |Mansfield | width=5px; style=\"background:\" | | | | | |- |Meon Valley | width=5px; style=\"background:\" | | | | | |- |Meriden | width=5px; style=\"background:\" | | | | | |- |Merthyr Tydfil and Rhymney | width=5px; style=\"background:\" | | | | | |- |Middlesbrough | width=5px; style=\"background:\" | | | | | |- |Middlesbrough South and Cleveland East | width=5px; style=\"background:red\" | | Labour hold | 18,138 | 39.2\\% | |- |Midlothian | width=5px; style=\"background:\" | | | | | |- |Milton Keynes North | width=5px; style=\"background:\" | | | | | |- |Milton Keynes South | width=5px; style=\"background:\" | | | | | |- |Mitcham and Morden | width=5px; style=\"background:red\" | | Labour hold | 24,722 | 56.4\\% | |- |Mole Valley | width=5px; style=\"background:blue\" | | Conservative hold | 31,263 | 57.5\\% | 2.3\\% |- |Monmouth | width=5px; style=\"background:\" | | | | | |- |Montgomeryshire | width=5px; style=\"background:\" | | | | | |- |Moray | width=5px; style=\"background:\" | | | | | |- |Morecambe and Lunesdale | width=5px; style=\"background:\" | | | | | |- |Morley and Outwood | width=5px; style=\"background:\" | | | | | |- |Motherwell and Wishaw | width=5px; style=\"background:\" | | | | | |- |Na H-Eileanan An Iar | width=5px; style=\"background:#ff0\" | | SNP hold |6,723 |45.75\\% | |- |Neath | width=5px; style=\"background:\" | | | | | |- |New Forest East | width=5px; style=\"background:\" | | | | | |- |New Forest West | width=5px; style=\"background:\" | | | | | |- |Newark | width=5px; style=\"background:\" | | | | | |- |Newbury | width=5px; style=\"background:\" | | | | | |- |Newcastle-Under-Lyme | width=5px; style=\"background:\" | | | | | |- |Newcastle upon Tyne Central | width=5px; style=\"background:red\"| | Labour hold | 15,692 | 45.9\\% | 0.6\\% (to LD) |- |Newcastle upon Tyne East | width=5px; style=\"background:red\"| | Labour hold | 17,043 | 45.0 | 4.6\\% (to LD) |- |Newcastle upon Tyne North | width=5px; style=\"background:red\"| | Labour hold | 17,950 | 40.8 | 4.5\\% (to LD) |- |Newport East | width=5px; style=\"background:\" | | | | | |- |Newport West | width=5px; style=\"background:\" | | | | | |- |Newry and Armagh | width=5px; style=\"background:\" | | | | | |- |Newton Abbot | width=5px; style=\"background:blue\" | | Conservative gain from Lib |20,774 |43.0\\% |5.8\\% |- |Norfolk Mid | width=5px; style=\"background:\" | | | | | |- |Norfolk North | width=5px; style=\"background:\" | | | | | |- |Norfolk North West | width=5px; style=\"background:\" | | | | | |- |Norfolk South | width=5px; style=\"background:\" | | | | | |- |Norfolk South West | width=5px; style=\"background:\" | | | | | |- |Normanton, Pontefract and Castleford | width=5px; style=\"background:\" | | | | | |- |Northampton North | width=5px; style=\"background:\" | | | | | |- |Northampton South | width=5px; style=\"background:\" | | | | | |- |Northamptonshire South | width=5px; style=\"background:blue\" | | Conservative hold | 33,081 | 55.2\\% | |- |Norwich North | width=5px; style=\"background:\" | | | | | |- |Norwich South | width=5px; style=\"background:\" | | | | | |- |Nottingham East | width=5px; style=\"background:\" | | | | | |- |Nottingham North | width=5px; style=\"background:\" | | | | | |- |Nottingham South | width=5px; style=\"background:\" | | | | | |- |Nuneaton | width=5px; style=\"background:\" | | | | | |- |Ochil and Perthshire South | width=5px; style=\"background:red\" | | Labour hold | 19,131 | 37.9\\% | |- |Ogmore | width=5px; style=\"background:\" | | | | | |- |Old Bexley and Sidcup | width=5px; style=\"background:\" | | | | | |- |Oldham East and Saddleworth | width=5px; style=\"background:\" | | | | | |- |Oldham West and Royton | width=5px; style=\"background:\" | | | | | |- |Orkney and Shetland | width=5px; style=\"background:\" | | | | | |- |Orpington | width=5px; style=\"background:\" | | | | | |- |Oxford East | width=5px; style=\"background:\" | | | | | |- |Oxford West and Abingdon | width=5px; style=\"background:\" | | | | | |- |Paisley and Renfrewshire North | width=5px; style=\"background:\" | | | | | |- |Paisley and Renfrewshire South | width=5px; style=\"background:\" | | | | | |- |Pendle | width=5px; style=\"background:\" | | | | | |- |Penistone and Stocksbridge | width=5px; style=\"background:\" | | | | | |- |Penrith and the Border | width=5px; style=\"background:\" | | | | | |- |Perth and Perthshire North | width=5px; style=\"background:#ff0\" | | SNP hold | 19,118 | 39.6\\% | 2.9\\% |- |Peterborough | width=5px; style=\"background:\" | | | | | |- |Plymouth Moor View | width=5px; style=\"background:red\" | | Labour hold |15,433 |37.2\\% |7.8\\% (to CON) |- |Plymouth Sutton and Devonport | width=5px; style=\"background:blue\" | | Conservative gain from Lab |15,050 |34.3\\% |6.9\\% |- |Pontypridd | width=5px; style=\"background:red\" | | Labour hold | 14,220 | 38.8\\% | |- |Poole | width=5px; style=\"background:\" | | | | | |- |Poplar and Limehouse | width=5px; style=\"background:\" | | | | | |- |Portsmouth North | width=5px; style=\"background:\" | | | | | |- |Portsmouth South | width=5px; style=\"background:\" | | | | | |- |Preseli Pembrokeshire | width=5px; style=\"background:\" | | | | | |- |Preston | width=5px; style=\"background:\" | | | | | |- |Pudsey | width=5px; style=\"background:\" | | | | | |- |Putney | width=5px; style=\"background:\" | | | | | |- |Rayleigh and Wickford | width=5px; style=\"background:\" | | | | | |- |Reading East | width=5px; style=\"background:\" | | | | | |- |Reading West | width=5px; style=\"background:\" | | | | | |- |Redcar | width=5px; style=\"background:#F9D616\"| | Liberal Democrat gain from Lab | 18,955 | 45.2\\% | 21.8\\% |- |Redditch | width=5px; style=\"background:\" | | | | | |- |Reigate | width=5px; style=\"background:\" | | | | | |- |Renfrewshire East | width=5px; style=\"background:\" | | | | | |- |Rhondda | width=5px; style=\"background:\" | | | | | |- |Ribble Valley | width=5px; style=\"background:\" | | | | | |- |Richmond Yorks | width=5px; style=\"background:\" | | | | | |- |Richmond Park | width=5px; style=\"background:\" | | | | | |- |Rochdale | width=5px; style=\"background:\" | | | | | |- |Rochester and Strood | width=5px; style=\"background:blue\" | | Conservative hold | 23,604 | 49.2\\% | |- |Rochford and Southend East | width=5px; style=\"background:\" | | | | | |- |Romford | width=5px; style=\"background:\" | | | | | |- |Romsey and Southampton North | width=5px; style=\"background:\" | | | | | |- |Ross, Skye and Lochaber | width=5px; style=\"background:\" | | | | | |- |Rossendale and Darwen | width=5px; style=\"background:\" | | | | | |- |Rother Valley | width=5px; style=\"background:\" | | | | | |- |Rotherham | width=5px; style=\"background:\" | | | | | |- |Rugby | width=5px; style=\"background:\" | | | | | |- |Ruislip, Northwood and Pinner | width=5px; style=\"background:\" | | | | | |- |Runnymede and Weybridge | width=5px; style=\"background:\" | | | | | |- |Rushcliffe | width=5px; style=\"background:\" | | | | | |- |Rutherglen and Hamilton West | width=5px; style=\"background:\" | | | | | |- |Rutland and Melton | width=5px; style=\"background:\" | | | | | |- |Saffron Walden | width=5px; style=\"background:\" | | | | | |- |St Albans | width=5px; style=\"background:\" | | | | | |- |St Austell and Newquay | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold |20,189 |42.7\\% | |- |St Helens North | width=5px; style=\"background:red\" | | Labour hold | 23,041 | 51.7\\% | |- |St Helens South | width=5px; style=\"background:red\" | | Labour hold | 24,364 | 52.9\\% | |- |St Ives | width=5px; style=\"background:\" | | | | | |- |Salford and Eccles | width=5px; style=\"background:red\" | | Labour hold | 16,655 | 40.1\\% | |- |Salisbury | width=5px; style=\"background:\" | | | | | |- |Scarborough and Whitby | width=5px; style=\"background:blue\" | | Conservative hold | 21,108 | 42.8\\% | |- |Scunthorpe | width=5px; style=\"background:\" | | | | | |- |Sedgefield | width=5px; style=\"background:red\" | | Labour hold |18,141 |45.1\\% |11.6\\% (to CON) |- |Sefton Central | width=5px; style=\"background:\" | | | | | |- |Selby and Ainsty | width=5px; style=\"background:blue\" | | Conservative hold | 25,562 | 49.4\\% | |- |Sevenoaks | width=5px; style=\"background:\" | | | | | |- |Sheffield Brightside and Hillsborough | width=5px; style=\"background:red\" | | 'Labour hold | 21,400 | 55.0\\% | |- |Sheffield Central | width=5px; style=\"background:\"red\" | | Labour hold | 17,138 | 41.3\\% | |- |Sheffield Hallam | width=5px; style=\"background:\"#F9D616\" | | Liberal Democrat Hold | 27,324 | 53.4\\% | |- |Sheffield Heeley | width=5px; style=\"background:\" | | | | | |- |Sheffield South East | width=5px; style=\"background:red\" | | Labour hold | 20,169 | 48.7\\% | |- |Sherwood | width=5px; style=\"background:\" | | | | | |- |Shipley | width=5px; style=\"background:blue\" | | Conservative hold | 24,002 | 48.6\\% | |- |Shrewsbury and Atcham | width=5px; style=\"background:\" | | | | | |- |Shropshire North | width=5px; style=\"background:blue\" | | Conservative hold | 26,692 | 51.5\\% | |- |Sittingbourne and Sheppey | width=5px; style=\"background:\" | | | | | |- |Skipton and Ripon | width=5px; style=\"background:\" | | | | | |- |Sleaford and North Hykeham | width=5px; style=\"background:blue\" | | Conservative hold | 30,719 | 51.6\\% | |- |Slough | width=5px; style=\"background:\" | | | | | |- |Solihull | width=5px; style=\"background:#F9D616\" | | Liberal Democrat gain from Con | 23,635 | 42.9\\% | 0.3\\% |- |Somerset North | width=5px; style=\"background:\" | | | | | |- |Somerset North East | width=5px; style=\"background:\" | | | | | |- |Somerton and Frome | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold |28,793 |47.5\\% | |- |South Holland and the Deepings | width=5px; style=\"background:\" | | | | | |- |South Ribble | width=5px; style=\"background:\" | | | | | |- |South Shields | width=5px; style=\"background:red\" | | Labour hold | 18,995 | 52.0\\% | |- |Southampton Itchen | width=5px; style=\"background:red\" | | Labour hold | 16,326 | 36.8\\% | |- |Southampton Test | width=5px; style=\"background:red\" | | Labour hold | 17,001 | 38.5\\% | |- |Southampton West | width=5px; style=\"background:\" | | | | | |- |Southport | width=5px; style=\"background:\" | | | | | |- |Spelthorne | width=5px; style=\"background:\" | | | | | |- |Stafford | width=5px; style=\"background:\" | | | | | |- |Staffordshire Moorlands | width=5px; style=\"background:\" | | | | | |- |Staffordshire South | width=5px; style=\"background:\" | | | | | |- |Stalybridge and Hyde | width=5px; style=\"background:\" | | | | | |- |Stevenage | width=5px; style=\"background:\" | | | | | |- |Stirling | width=5px; style=\"background:red\" | |Labour hold |19,558 |41.8\\% | |- |Stockport | width=5px; style=\"background:red\" | | Labour hold | 16,697 | 42.7\\% | |- |Stockton North | width=5px; style=\"background:\" | | | | | |- |Stockton South | width=5px; style=\"background:\" | | | | | |- |Stoke-on-Trent Central | width=5px; style=\"background:\" | | | | | |- |Stoke-on-Trent North | width=5px; style=\"background:\" | | | | | |- |Stoke-on-Trent South | width=5px; style=\"background:red\" | | Labour hold | 15,446 | 38.8\\% | |- |Stone | width=5px; style=\"background:\" | | | | | |- |Stourbridge | width=5px; style=\"background:\" | | | | | |- |Strangford | width=5px; style=\"background:\" | | | | | |- |Stratford-on-Avon | width=5px; style=\"background:\" | | | | | |- |Streatham | width=5px; style=\"background:\" | | | | | |- |Stretford and Urmston | width=5px; style=\"background:\" | | | | | |- |Stroud | width=5px; style=\"background:\" | | | | | |- |suffolk Central and Ipswitch North | width=5px; style=\"background:\" | | | | | |- |Suffolk Coastal | width=5px; style=\"background:\" | | | | | |- |Suffolk South | width=5px; style=\"background:\" | | | | | |- |Suffolk West | width=5px; style=\"background:\" | | | | | |- |Sunderland Central | width=5px; style=\"background:red\" | |Labour win (new seat) |19,495 |45.9\\% | |- |Surrey East (UK Parliament constituency) | width=5px; style=\"background:blue\" | | Conservative hold | 31,007 | 56.7\\% | 0.7\\% (to LD) |- |Surrey Heath | width=5px; style=\"background:blue\" | | Conservative hold | 31,326 | 57.6\\% | 4.6\\% |- |Surrey South West | width=5px; style=\"background:blue\" | | Conservative hold | 33,605 | 58.7\\% | 8.6\\% |- |Sussex Mid | width=5px; style=\"background:blue\" | |Conservative hold |28,329 |50.7\\% |0.3\\% |- |Sutton and Cheam | width=5px; style=\"background:\" | | | | | |- |Sutton Coldfield | width=5px; style=\"background:\" | | | | | |- |Swansea East | width=5px; style=\"background:\" | | | | | |- |Swansea West | width=5px; style=\"background:\" | | | | | |- |Swindon North | width=5px; style=\"background:\" | | | | | |- |Swindon South | width=5px; style=\"background:\" | | | | | |- |Tamworth | width=5px; style=\"background:\" | | | | | |- |Tatton | width=5px; style=\"background:\" | | | | | |- |Taunton Deane | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold |28,531 |49.1\\% | |- |Telford | width=5px; style=\"background:\" | | | | | |- |Tewkesbury | width=5px; style=\"background:blue\" | | Conservative hold | 25,472 | 47.2\\% | |- |Thanet North | width=5px; style=\"background:\" | | | | | |- |Thanet South | width=5px; style=\"background:\" | | | | | |- |Thirsk and Malton | width=5px; style=\"background:black\" | | Delayed until 27 May'' | | | |- |Thornbury and Yate | width=5px; style=\"background:\" | | | | | |- |Thurrock | width=5px; style=\"background:\" | | | | | |- |Tiverton and Honiton | width=5px; style=\"background:blue\" | | Conservative hold | 27,614 | 50.3\\% | |- |Tonbridge and Malling | width=5px; style=\"background:\" | | | | | |- |Tooting | width=5px; style=\"background:\" | | | | | |- |Torbay | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold |23,126 |47.0\\% | |- |Torfaen | width=5px; style=\"background:\" | | | | | |- |Totnes | width=5px; style=\"background:blue\" | | Conservative hold|21,940 |45.9\\% | |- |Tottenham | width=5px; style=\"background:\" | | | | | |- |Truro and Falmouth | width=5px; style=\"background:blue\" | | Conservative gain from Lib |20,349 |41.7\\% | |- |Tunbridge Wells | width=5px; style=\"background:\" | | | | | |- |Twickenham | width=5px; style=\"background:\" | | | | | |- |Tynemouth | width=5px; style=\"background:\" | | | | | |- |Tyneside North | width=5px; style=\"background:\" | | | | | |- |Tyrone West | width=5px; style=\"background:#060\" | |Sinn F\u00e9in hold|18,050 |48.4\\% | |- |Ulster Mid | width=5px; style=\"background:\" | | | | | |- |Upper Bann | width=5px; style=\"background:#c30\" | |Democratic Unionist hold|14,000 |33.8\\% | |- |Uxbridge and Ruiislip South | width=5px; style=\"background:\" | | | | | |- |Vale of Clwyd | width=5px; style=\"background:red\" | | Labour hold|15,017 |42.3\\% | |- |Vale of Glamorgan | width=5px; style=\"background:\" | | | | | |- |Vauxhall | width=5px; style=\"background:\" | | | | | |- |Wakefield | width=5px; style=\"background:\" | | | | | |- |Wallasey | width=5px; style=\"background:\" | | | | | |- |Walsall North | width=5px; style=\"background:red\" | | Labour hold | 13,385 | 37.0\\% | |- |Walsall South | width=5px; style=\"background:red\" | | Labour hold | 16,211 | 39.7\\% | |- |Walthamstow | width=5px; style=\"background:\" | | | | | |- |Wansbeck | width=5px; style=\"background:\" | | | | | |- |Wantage | width=5px; style=\"background:\" | | | | | |- |Warley | width=5px; style=\"background:red\" | | Labour hold| 20,240 | 52.9\\% | |- |Warrington North | width=5px; style=\"background:\" | | | | | |- |Warrington South | width=5px; style=\"background:\" | | | | | |- |Warwick and Leamington | width=5px; style=\"background:\" | | | | | |- |Warwickshire North | width=5px; style=\"background:\" | | | | | |- |Washington and Sunderland West | width=5px; style=\"background:red\" | |Labour win (new seat) |19,615 |53\\% | |- |Watford | width=5px; style=\"background:\" | | | | | |- |Waveney | width=5px; style=\"background:\" | | | | | |- |Wealden | width=5px; style=\"background:blue\" | | Conservative hold| 31,090 | 56.6\\% | |- |Weaver Vale | width=5px; style=\"background:\" | | | | | |- |Wellingborough | width=5px; style=\"background:blue\" | | Conservative hold| 24,918 | 48.2\\% | |- |Wells | width=5px; style=\"background:#F9D616\" | | Liberal Democrat gain from Con |24,560 |44.0\\% |3.6\\% |- |Welwyn Hatfield | width=5px; style=\"background:\" | | | | | |- |Wentworth and Dearne | width=5px; style=\"background:\" | | | | | |- |West Bromwich East | width=5px; style=\"background:\" | | | | | |- |West Bromwich West | width=5px; style=\"background:\" | | | | | |- |West Ham | width=5px; style=\"background:\" | | | | | |- |Westminster North | width=5px; style=\"background:red\" | | Labour hold| 17,377 | 43.9\\% | |- |Westmorland and Lonsdale | width=5px; style=\"background:\" | | | | | |- |Weston Super-Mare | width=5px; style=\"background:\" | | | | | |- |Wigan | width=5px; style=\"background:\" | | | | | |- |Wiltshire North | width=5px; style=\"background:\" | | | | | |- |Wiltshire South West | width=5px; style=\"background:\" | | | | | |- |Wimbledon | width=5px; style=\"background:\" | | | | | |- |Winchester | width=5px; style=\"background:\" | | | | | |- |Windsor | width=5px; style=\"background:\" | | | | | |- |Wirral South | width=5px; style=\"background:red\" | | Labour hold| 16,276 | 40.8\\% | |- |Wirral West | width=5px; style=\"background:blue\" | | Conservative hold| 16,726 | 42.5\\% | |- |Witham | width=5px; style=\"background:\" | | | | | |- |Witney | width=5px; style=\"background:\" | | | | | |- |Woking | width=5px; style=\"background:blue\" | | Conservative hold| 26,551 | 50.3\\% | 0.7\\% (to LD) |- |Wokingham | width=5px; style=\"background:blue\" | | Conservative hold| 28,754 | 52.7\\% | 4.7\\% |- |Wolverhampton North East | width=5px; style=\"background:\" | | | | | |- |Wolverhampton South East | width=5px; style=\"background:\" | | | | | |- |Wolverhampton South West | width=5px; style=\"background:\" | | | | | |- |Worcester | width=5px; style=\"background:\" | | | | | |- |Worcestershire Mid | width=5px; style=\"background:blue\" | | Conservative hold| 27,770 | 54.5\\% | |- |Worcestershire West | width=5px; style=\"background:\" | | | | | |- |Workington | width=5px; style=\"background:red\" | | Labour hold| 17,865 | 45.5\\% | |- |Worsley and Eccles South | width=5px; style=\"background:red\" | | Labour hold| 17,892 | 42.9\\% | |- |Worthing East and Shoreham | width=5px; style=\"background:blue\" | | Conservative hold| 23,458 | 48.5\\% | |- |Worthing West | width=5px; style=\"background:blue\" | | Conservative hold| 25,416 | 51.7\\% | |- |The Wreckin | width=5px; style=\"background:\" | | | | | |- |Wrexham | width=5px; style=\"background:red\" | | Labour hold| 12,161 | 36.9\\% | 5.7\\% |- |Wycombe | width=5px; style=\"background:blue\" | | Conservative hold| 23,423 | 48.6\\% | |- |Wyre and Preston North | width=5px; style=\"background:blue\" | | Conservative hold| 26,877 | 52.4\\% | 3.9\\% |- |Wyre Forest | width=5px; style=\"background:red\" | | Labour hold| 11,490 | 33.4\\% | |- |Wythenshawe and Sale East | width=5px; style=\"background:red\" | | Labour hold| 17,987 | 44.1\\% | |- |Yeovil | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold| 31,843 | 55.7\\% | 2.7\\% |- |Ynys Mon | width=5px; style=\"background:red\" | | Labour hold| 11,490 | 33.4\\% | 1.8\\% |- |York Central | width=5px; style=\"background:red\" | | Labour hold| 18,573 | 40.0\\% | 6.0\\% (to CON) |- |York Outer | width=5px; style=\"background:blue\" | | Conservative gain from Liberal Democrats | 22,912 | 43\\% | 3.7\\% |- |Yorkshire East | width=5px; style=\"background:blue\" | | Conservative hold''' 24,328 47.5\\% 0.1\\% (to LD)", "edit_actions": [{"type": "D", "before": "2010 general election", "after": null, "start_char_pos": 152, "end_char_pos": 173}, {"type": "D", "before": "Thirsk and Malton", "after": null, "start_char_pos": 239, "end_char_pos": 256}, {"type": "D", "before": "swing", "after": null, "start_char_pos": 683, "end_char_pos": 688}, {"type": "D", "before": "first past the post", "after": null, "start_char_pos": 948, "end_char_pos": 967}, {"type": "D", "before": "Labour Party", "after": null, "start_char_pos": 1186, "end_char_pos": 1198}, {"type": "D", "before": "Conservative Party", "after": null, "start_char_pos": 1230, "end_char_pos": 1248}, {"type": "D", "before": "hung parliament", "after": null, "start_char_pos": 1319, "end_char_pos": 1334}, {"type": "D", "before": "Liberal Democrats", "after": null, "start_char_pos": 1409, "end_char_pos": 1426}, {"type": "D", "before": "Gordon Brown", "after": null, "start_char_pos": 2016, "end_char_pos": 2028}, {"type": "D", "before": "Nick Clegg", "after": null, "start_char_pos": 2204, "end_char_pos": 2214}, {"type": "D", "before": "United Kingdom Independence Party, the British National Party", "after": null, "start_char_pos": 2457, "end_char_pos": 2518}, {"type": "A", "before": null, "after": "the ,", "start_char_pos": 2521, "end_char_pos": 2521}, {"type": "D", "before": "Green Party of England and Wales", "after": null, "start_char_pos": 2530, "end_char_pos": 2562}, {"type": "D", "before": "European Parliament", "after": null, "start_char_pos": 2599, "end_char_pos": 2618}, {"type": "D", "before": "House of Commons", "after": null, "start_char_pos": 2696, "end_char_pos": 2712}, {"type": "R", "before": "Caroline Lucas winning Brighton Pavilion", "after": "winning", "start_char_pos": 2812, "end_char_pos": 2852}, {"type": "D", "before": "Alliance Party", "after": null, "start_char_pos": 2879, "end_char_pos": 2893}, {"type": "R", "before": "Naomi Long taking Peter Robinson", "after": "taking", "start_char_pos": 2925, "end_char_pos": 2957}, {"type": "D", "before": "Conservative Party", "after": null, "start_char_pos": 3014, "end_char_pos": 3032}, {"type": "D", "before": "Labour Party", "after": null, "start_char_pos": 3059, "end_char_pos": 3071}, {"type": "D", "before": "Liberal Democrats", "after": null, "start_char_pos": 3097, "end_char_pos": 3114}, {"type": "D", "before": "Democratic Unionist Party", "after": null, "start_char_pos": 3138, "end_char_pos": 3163}, {"type": "D", "before": "Scottish National Party", "after": null, "start_char_pos": 3183, "end_char_pos": 3206}, {"type": "D", "before": "Sinn F\u00e9in", "after": null, "start_char_pos": 3225, "end_char_pos": 3234}, {"type": "D", "before": "Plaid Cymru", "after": null, "start_char_pos": 3253, "end_char_pos": 3264}, {"type": "D", "before": "Social Democratic", "after": null, "start_char_pos": 3284, "end_char_pos": 3301}, {"type": "D", "before": "Labour Party", "after": null, "start_char_pos": 3302, "end_char_pos": 3314}, {"type": "D", "before": "Alliance Party", "after": null, "start_char_pos": 3333, "end_char_pos": 3347}, {"type": "D", "before": "Green Party of England and Wales", "after": null, "start_char_pos": 3366, "end_char_pos": 3398}, {"type": "R", "before": "Labour Blue Conservative Yellow Liberal Democrats", "after": "Blue", "start_char_pos": 3441, "end_char_pos": 3490}, {"type": "A", "before": null, "after": "Yellow", "start_char_pos": 3498, "end_char_pos": 3498}, {"type": "R", "before": "Alliance Bright Yellow Scottish National", "after": "Bright Yellow", "start_char_pos": 3518, "end_char_pos": 3558}, {"type": "D", "before": "Green", "after": null, "start_char_pos": 3575, "end_char_pos": 3580}, {"type": "D", "before": "Plaid Cymru", "after": null, "start_char_pos": 3601, "end_char_pos": 3612}, {"type": "R", "before": "Social Democratic and Labour Dark Green Sinn F\u00e9in Brown Democratic Unionist Purple Conservatives and Unionists Grey Independent", "after": "Dark Green Brown Purple Grey", "start_char_pos": 3638, "end_char_pos": 3765}, {"type": "R", "before": "ConstituencyResultVotesShareSwingAberavon", "after": "ConstituencyResultVotesShareSwing", "start_char_pos": 3802, "end_char_pos": 3843}, {"type": "D", "before": "Aberconwy", "after": null, "start_char_pos": 3884, "end_char_pos": 3893}, {"type": "D", "before": "Aberdeen North", "after": null, "start_char_pos": 3941, "end_char_pos": 3955}, {"type": "D", "before": "Aberdeen South", "after": null, "start_char_pos": 3988, "end_char_pos": 4002}, {"type": "D", "before": "Aberdeenshire West and Kincardie", "after": null, "start_char_pos": 4035, "end_char_pos": 4067}, {"type": "R", "before": "Airdrie and ShottsLabour", "after": "Labour", "start_char_pos": 4119, "end_char_pos": 4143}, {"type": "D", "before": "Aldershot", "after": null, "start_char_pos": 4176, "end_char_pos": 4185}, {"type": "D", "before": "Aldridge-Brownhills", "after": null, "start_char_pos": 4232, "end_char_pos": 4251}, {"type": "D", "before": "Altrincham and Sale West", "after": null, "start_char_pos": 4302, "end_char_pos": 4326}, {"type": "D", "before": "Alyn and Deeside", "after": null, "start_char_pos": 4373, "end_char_pos": 4389}, {"type": "D", "before": "Amber Valley", "after": null, "start_char_pos": 4431, "end_char_pos": 4443}, {"type": "D", "before": "Angus", "after": null, "start_char_pos": 4491, "end_char_pos": 4496}, {"type": "R", "before": "Antrim EastDemocratic", "after": "Democratic", "start_char_pos": 4526, "end_char_pos": 4547}, {"type": "R", "before": "Antrim NorthDemocratic", "after": "Democratic", "start_char_pos": 4574, "end_char_pos": 4596}, {"type": "D", "before": "Antrim South", "after": null, "start_char_pos": 4623, "end_char_pos": 4635}, {"type": "D", "before": "Arfon", "after": null, "start_char_pos": 4690, "end_char_pos": 4695}, {"type": "D", "before": "Arundel and South Downs", "after": null, "start_char_pos": 4801, "end_char_pos": 4824}, {"type": "D", "before": "Ashfield", "after": null, "start_char_pos": 4860, "end_char_pos": 4868}, {"type": "D", "before": "Ashford", "after": null, "start_char_pos": 4907, "end_char_pos": 4914}, {"type": "D", "before": "Ashton Under Lyne", "after": null, "start_char_pos": 4958, "end_char_pos": 4975}, {"type": "D", "before": "Aylesbury", "after": null, "start_char_pos": 5014, "end_char_pos": 5023}, {"type": "D", "before": "Ayr, Carrick and Cumnock", "after": null, "start_char_pos": 5054, "end_char_pos": 5078}, {"type": "D", "before": "Ayrshire Central", "after": null, "start_char_pos": 5117, "end_char_pos": 5133}, {"type": "D", "before": "Ayrshire North and Arran", "after": null, "start_char_pos": 5163, "end_char_pos": 5187}, {"type": "R", "before": "BanburyConservative", "after": "Conservative", "start_char_pos": 5226, "end_char_pos": 5245}, {"type": "R", "before": "Banff and BuchanSNP", "after": "SNP", "start_char_pos": 5278, "end_char_pos": 5297}, {"type": "R", "before": "BarkingLabour", "after": "Labour", "start_char_pos": 5330, "end_char_pos": 5343}], "sents_char_pos": [0, 51, 85, 299, 535, 727, 975, 1109, 1336, 1579, 1870, 2130, 2344, 2730, 2854, 2966, 3077, 3119, 3167, 3517, 3574, 3600, 3637, 3883, 4157, 4570, 4619, 5050, 5311, 5329, 5351, 5395, 5444, 5499, 5565, 5640, 5685, 5722, 5773, 6253, 6302, 6349, 6392, 6458, 6514, 6577, 6657, 6709, 6802, 6922, 7014, 7088, 7136, 7230, 7273, 7331, 7371, 7449, 7485, 7540, 7594, 7644, 7714, 7756, 7814, 7866, 7913, 8008, 8070, 8179, 8215, 8288, 8356, 8428, 8470, 8560, 8646, 9110, 9480, 9520, 9611, 9664, 9746, 9841, 10008, 10189, 10229, 10284, 10311, 10386, 10434, 10495, 10550, 10622, 11081, 11176, 11316, 11410, 11520, 11570, 11617, 11713, 11816, 11918, 12027, 12125, 12227, 12277, 12330, 12433, 12490, 12539, 12642, 12708, 12743, 12803, 12902, 12952, 12994, 13059, 13103, 13212, 13267, 13324, 13388, 13450, 13522, 13581, 13640, 13707, 13746, 13804, 13832, 13889, 13954, 13987, 14072, 14131, 14202, 14270, 14355, 14421, 14487, 14545, 14603, 14674, 14735, 14786, 14821, 14911, 14976, 15047, 15106, 15168, 15224, 15305, 15392, 15451, 15508, 15564, 15620, 15681, 15782, 15844, 15911, 16001, 16107, 16179, 16244, 16297, 16357, 16421, 16481, 16543, 16597, 16664, 16727, 16780, 16861, 16912, 16942, 17000, 17045, 17110, 17183, 17238, 17276, 17347, 17420, 17487, 17548, 17600, 17678, 17737, 17795, 17838, 17921, 17975, 18071, 18133, 18192, 18279, 18344, 18438, 18498, 18563, 18620, 18677, 18730, 18784, 18836, 18904, 18960, 19062, 19112, 19164, 19233, 19289, 19346, 19407, 19482, 19555, 19609, 19678, 19773, 19831, 19936, 20003, 20070, 20138, 20195, 20248, 20322, 20380, 20498, 20599, 20669, 20732, 20785, 20852, 20910, 20972, 21028, 21081, 21134, 21213, 21279, 21326, 21445, 21552, 21673, 21729, 21824, 21892, 21948, 22016, 22085, 22156, 22225, 22279, 22355, 22450, 22509, 22609, 22666, 22777, 22834, 22889, 22948, 23007, 23064, 23152, 23206, 23266, 23328, 23432, 23520, 23573, 23664, 23733, 23790, 23888, 23957, 24025, 24081, 24152, 24207, 24266, 24377, 24439, 24509, 24569, 24655, 24718, 24810, 24867, 24957, 25019, 25116, 25188, 25255, 25307, 25388, 25452, 25512, 25582, 25648, 25704, 25758, 25832, 25898, 25990, 26056, 26123, 26180, 26235, 26341, 26400, 26467, 26556, 26614, 26664, 26703, 26806, 26864, 26922, 26973, 27067, 27121, 27187, 27252, 27321, 27378, 27437, 27492, 27566, 27627, 27713, 27800, 27867, 27934, 28000, 28088, 28186, 28249, 28302, 28373, 28439, 28508, 28576, 28654, 28717, 28780, 28834, 28889, 28957, 29032, 29146, 29259, 29359, 29419, 29483, 29543, 29650, 29711, 29777, 29838, 29904, 29988, 30053, 30118, 30188, 30285, 30346, 30409, 30473, 30537, 30593, 30667, 30750, 30819, 30894, 30964, 31031, 31088, 31147, 31219, 31297, 31375, 31429, 31503, 31573, 31647, 31740, 31806, 31858, 31924, 31992, 32030, 32112, 32180, 32244, 32308, 32377, 32432, 32486, 32540, 32609, 32669, 32729, 32783, 32897, 32952, 33017, 33072, 33133, 33195, 33256, 33312, 33380, 33490, 33545, 33621, 33692, 33761, 33822, 33879, 33932, 34009, 34080, 34138, 34214, 34280, 34342, 34399, 34469, 34573, 34665, 34749, 34815, 34901, 34971, 35065, 35123, 35175, 35227, 35291, 35384, 35469, 35564, 35658, 35766, 35834, 35919, 35974, 36079, 36143, 36252, 36317, 36391, 36481, 36537, 36657, 36724, 36790, 36856, 36909, 36969, 37030, 37125, 37218, 37311, 37368, 37426, 37482, 37553, 37620, 37688, 37745, 37801, 37884, 37975, 38037, 38107, 38175, 38243, 38325, 38384, 38442, 38507, 38564, 38633, 38687, 38769, 38832, 38893, 38953, 39019, 39080, 39143, 39253, 39360, 39460, 39562, 39626, 39686, 39746, 39807, 39868, 39924, 39978, 40039, 40105, 40135, 40193, 40289, 40349, 40414, 40508, 40564, 40632, 40737, 40792, 40846, 40942, 40996, 41086, 41152, 41258, 41316, 41373, 41435, 41494, 41581, 41639, 41753, 41814, 41865, 41905, 41961, 42018, 42074, 42135, 42225, 42313, 42369, 42424, 42478, 42570, 42634, 42704, 42770, 42848, 42937, 42992, 43047, 43141, 43203, 43291, 43409, 43477, 43543, 43609, 43665, 43730, 43830, 43895, 43948, 44011, 44079, 44136, 44194, 44249, 44309, 44396, 44485, 44539, 44593, 44699, 44812, 44884, 44956, 45013, 45079, 45181, 45239, 45339, 45441, 45537, 45631, 45686, 45775, 45880, 45980, 46081, 46163, 46267, 46361, 46462, 46587]}
+{"doc_id": "180311", "revision_depth": "2", "before_revision": "ConstituencyResultVotesShareSwing Labour hold 16,073 51.9\\% 5.3\\% (to LD) Conservative gain from Lab 10,734 35.8\\% 7.6\\% Labour hold 16,746 44.4\\% 1.0\\% Labour hold 15,722 36.5\\% 2.5\\% Liberal Democrat hold 17,362 38.4\\% 4.9\\% (to CON)Labour hold20,64958.2\\% 3.9\\% (to SNP) Conservative hold 21,203 46.7\\% 1.4\\% (to LD) Conservative hold 22,913 59.3\\% 12.0\\% (from LAB) Conservative hold 24,176 48.9\\% 0.8\\% (to LD) Labour hold 15,804 39.6\\% 8.1\\% (to CON) Conservative gain from Lab 17,746 38.6\\% 6.9\\% SNP hold 15,020 39.6\\% 2.2\\%Democratic Unionist hold13,99345.9\\%Democratic Unionist hold19,67246.4\\% Democratic Unionist hold 11,536 33.9\\% 3.6\\% (to UCU) Plaid Cymru gain from Lab9,38336.0\\%3.7\\% Argyle and Bute Liberal Democrat hold14,29231.6\\%2.7\\% (to CON) Conservative hold32,33357.8\\%3.0\\% Labour hold16,23933.7\\%17.2\\% (to LD) Conservative hold29,87854.1\\%2.3\\% (to LD) Labour hold18,60448.4\\%7.3\\% (to CON) Conservative hold27,73652.2\\% Labour hold21,63247.1\\%0.3\\% (to CON) Labour hold20,95047.7\\%1.5\\% Labour hold21,86047.4\\%2.3\\% (to SNP)Conservative hold29,703 52.8\\%5.9\\% (to CON)SNP hold15,86841.3\\%10.7\\% (to CON)Labour hold24,62854.3\\%1.7\\% Barnsley CentralLabour hold17,48747.3\\%4.2\\% (to LD) Barnsley EasyLabour hold18,05947.0\\%14.0\\% (to LD) Barrow and FurnessLabour hold21,22648.1\\%0.4\\% (to CON) Basildon and BillericayConservative hold21,98252.8\\%9.3\\% Basildon South and Thurrock EastConservative gain from Lab19,62443.9\\%7.5\\% BasingstokeConservative hold25,59050.5\\%4.6\\% BassrtlawLabour hold25,01850.5\\%0.7\\% (to CON) BathLiberal Democrat hold26,65156.6\\%5.8\\% Batley and Spen Labour hold 21,565 41.5\\% 2.5\\% (to CON) Battersea Conservative gain from Lab 23,103 47.3\\% 6.5\\% BeaconsfieldConservative hold32,05361.1\\%4.7\\% BeckanhamConservative hold27,59757.9\\%3.2\\% (to LD) BedfordConservative gain from Lab17,54638.9\\%5.5\\% Bedforsdhire MidConservative hold28,81552.5\\%2.3\\% Bedfordshire North EastConservative hold30,98955.8\\%2.6\\% Bedfordshire South WestConservative hold26,81552.8\\%0.7\\% Belfast EastAlliance gain from DUP12,83937.2\\%22.9\\% Belfast NorthDemocratic Unionist hold14,81240.0\\%5.0\\% (to SF) Belfast SouthSDLP hold14,02641.0\\%8.4\\% Belfast WestSinn F\u00e9in hold22,84071.1\\%1.1\\% Bermondsey and Old SouthwarkLiberal Democrat hold21,59048.4\\%1.6\\% Berwick-Upon-TweedLiberal Democrat hold16,80643.7\\%8.3\\% (to CON) Banff and BuchanLiberal Democrat hold22,23045.4\\%0.7\\% (to CON) Bethnal Green and BowBanff and BuchanConservative hold22,23045.4\\%1.6\\% Bexhill and BattleConservative hold28,14751.6\\%4.0\\% (to LD) Bexleyheath and CrayfordBirkenhead)Birmingham Edgbaston Labour hold 16,894 40.6\\% 0.5\\% (to CON) Birmingham ErdingtonBirmingham Hall GreenBirmingham Hodge HillBirmingham LadywoodLabour hold19,95055.7\\%2.5\\% Birmingham NorthfieldBirmingham Perry BarrBirmingham Selly Oak Labour hold 17,950 38.5\\% 4.8\\% (to CON) Birmingham YardleyBishop Auckland Labour hold 16,023 39.0\\% 7.2\\% (to CON) BlackburnLabour hold21,75147.8\\%1.1\\% Blackley and BroughtonBlackpool North and CleveleysConservative gain from Lab16,96441.8\\%6.9\\% Blackpool SouthLabour hold14,44941.16.2\\% (to CON) Blaenau GwentLabour gain from Ind 16,974 52.4\\% 29.2\\% Blaydon Labour hold 22,297 49.7\\% 3.3\\% Blyth ValleyBognor Regis and LittlehamptonConservative hold24,08751.4\\%2.3\\% BolsoverLabour hold21,99450.0\\%11.2\\% (to CON) Bolton North EastLabour hold19,87045.9\\%1.3\\% (to CON) Bolton South EastLabour hold18,78247.4\\%5.6\\% (to CON) Bolton West Labour hold 18,327 38.5\\% 4.9\\% (to CON) BootleBoston and SkegnessConservative hold18,78247.4\\%7.0\\% BosworthConservative hold23,13242.6\\%5.9\\% (to LD) Bournemouth EastConservative hold21,32048.4\\%1.8\\% Bournemouth West Conservative hold 18,808 45.1\\% 2.9\\% Bracknell Conservative hold 27,327 52.4\\% 1.0\\% (to LD) Bradford EastBradford SouthBradford WestBraintree Conservative hold 25,901 52.6\\% 6.7\\% Brecon and RadnorshireLiberal Democrat hold17,92946.2\\%0.3\\% (to CON) Brent CentralBrent NorthBrentford and IsleworthBrentwood and OngarConservative hold28,79256.9\\%3.1\\% BridgendLabour hold13,93136.3\\%6.0\\% (to CON) Bridgwater and Somerset West Conservative hold 24,675 45.3\\% 2.9\\% (to LD) Brigg and GooleConservative gain from Lab19,68044.9\\%9.8\\% Brighton KemptownBrighton Pavilion Green gain from Lab 16,238 31.3\\% 8.4\\% Bristol EastLabour hold16,47136.6\\%4.5\\% (to CON) Bristol North WestBristol SouthBristol WestLiberal Democrat hold26,59348.0\\%9.0\\% BroadlandBromley and ChislehurstBromsgroveBroxbourneConservative hold26,84458.8\\%6.4\\% BroxtoweConservative gain from Lab20,58539.0\\%2.6\\% BuckinghamBurnleyLiberal Democrat gain from Lab14,93235.7\\%9.6\\% BurtonConservative gain from Lab22,18844.5\\%8.7\\% Bury NorthBury SouthBury St EdmundsConservative hold27,89947.5\\%2.8\\% CaerphillyLabour hold17,37744.9\\%6.5\\% (to CON) Caithness, Sutherland and Easter RossLiberal Democrat hold11,90741.4\\%6.4\\% (to LAB) Calder ValleyCamberwell and PeckhamCambourne and Redruth Conservative gain from Lib37.6\\%15,9695.2\\% Cambridge Liberal Democrat hold 19,621 39.1\\% 7.0\\% (to CON) Cambridgeshire North EastConservative hold26,86251.4\\%0.8\\% Cambridgeshire North WestConservative hold29,42550.05\\%2.6\\% Cambridgeshire SouthConservative hold27,99547.4\\%2.5\\% (to LD) Cambridgeshire South EastConservative hold27,62948.0\\%2.7\\% (to LD) Cannock ChaseConservative gain from Lab18,27140.1\\%14.0\\% Canterbury Conservative hold22,05044.8\\%5.4\\% (to LD) Cardiff CentralCardiff NorthCardiff South and Penarth Labour hold 17,262 38.9\\% 6.0\\% (to CON) Cardiff West Labour hold 16,893 41.2\\% 5.3\\% (to CON) Carlisle Carmarthen East and Dinefwr Plaid Cymru hold 13,546 35.6\\% 4.2\\% (to LAB) Carmarthen West and Pembrokeshire South Conservative gain from Lab 16,649 41.1\\% 6.9\\% Carshalton and WallingtonCastle PointCeredigionCharnwoodChatham and AylesfordCheadleChelmsfordChelsea and FulhamCheltenhamChelsham and AmershamChester, City ofChesterfieldChichesterChingford and Woodford GreenChippenhamChipping BarnetChorleyChristchurchCities of London and WestminsterClactonCleethorpesConservative gain from Lab18,93942.1\\%7.8\\% Clwyd South Labour hold13,31138.4\\%5.8\\% (to CON) Clwyd West Conservative hold 15,833 41.5\\% 8.4\\% Coatbridge, Chryson and BellshillColchesterColne ValleyCongleton Conservative hold 23,250 45.8\\% 2.3\\% (to LD) Copeland Labour hold 19,699 46.0\\% 2.1\\% (to CON) Corby Conservative gain from Lab 22,886 42.2\\% 3.4\\% Cornwall North Liberal Democrat hold22,51248.1\\%0.3\\% (to CON) Cornwall South East Conservative gain from Lib22,39045.1\\%9.1\\% The Cotswolds Conservative hold 29,075 53.0\\% 1.1\\% Coventry North East Labour hold 21,384 49.3\\% 5.5\\% (to CON) Coventry North West Labour hold 19,936 42.8\\% 3.9\\% (to CON) Coventry South Labour hold 19,197 41.8\\% 3.4\\% (to CON) Crawley Conservative gain from Lab 21,264 44.8\\% 6.3\\% Crewe and Nantwich Conservative gain from Lab 23,420 45.8\\% 13.7\\% Croydon Central Conservative gain from Lab | 19,657 | 39.5\\% | 3.3\\% |- | Croydon North | width=5px; style=\"background:red\"| | Labour hold | 28,949 | 56.0\\% | 0.3\\% |- | Croydon South | width=5px; style=\"background:blue\"| | Conservative hold | 28,684 | 50.9\\% | 1.7\\% (to LD) |- | Cumbernauld, Kilsyth and Kirkintilloch East | width=5px; style=\"background:red\"| | Labour hold | 23,549 | 57.2\\% | 1.9\\% |- | Cynon Valley | width=5px; style=\"background:red\"| | Labour hold | 15,681 | 52.5\\% | 8.6\\% (to PC) |- | Dagenham and Rainham | width=5px; style=\"background:red\"| |Labour hold |17,813 |40.3\\% |4.9\\% (to CON) |- | Darlington | width=5px; style=\"background:red\"| | Labour hold |16,891 |39.4\\% |9.1\\% (to CON) |- | Dartford | width=5px; style=\"background:blue\"| |Conservative gain from Lab |24,428 |48.8\\% |11.6\\% |- | Daventry | width=5px; style=\"background:blue\"| | Conservative hold | 29,252 | 56.5\\% | 0.7\\% (to LD) |- | Delyn | width=5px; style=\"background:red\"| | Labour hold | 15,083 | 40.8\\% | 6.7\\% (to CON) |- | Denton and Reddish | width=5px; style=\"background:red\"| |Labour hold |19,191 |51.0\\% |6.2\\% (to CON) |- | Derby North | width=5px; style=\"background:red\"| | Labour hold | 14,896 | 33.0\\% | 7.4\\% (to CON) |- | Derby South | width=5px; style=\"background:red\"| |Labour hold |17,851 |43.3\\% |9.3\\% (to CON) |- | Derbyshire Dales | width=5px; style=\"background:blue\"| | Conservative hold | 24,378 | 52.1\\% | 3.7\\% |- | Derbyshire Mid | width=5px; style=\"background:blue\"| |Conservative hold |22,877 |48.3\\% |5.7\\% |- | Derbyshire North East | width=5px; style=\"background:red\"| |Labour hold |17,948 |38.2\\% |8.6\\% (to CON) |- | Derbyshire South | width=5px; style=\"background:blue\"| |Conservative gain from Lab |22,935 |45.5\\% |9.8\\% |- | Devizes | width=5px; style=\"background:\"| | | | | |- | Devon Central | width=5px; style=\"background:blue\"| | Conservative hold | 27,737 | 51.5\\% | 6.1\\% |- | Devon East | width=5px; style=\"background:blue\"| | Conservative hold |48.3\\% |25,662 | |- | Devon North | width=5px; style=\"background:#F9D616\"| | Liberal Democrat hold |24,305 |47.4\\% |0.3\\% |- | Devon South West | width=5px; style=\"background:blue\"| | Conservative hold |27,908 |56.0\\% |5.6\\% |- | Devon West and Torridge | width=5px; style=\"background:\"| | | | | |- | Dewsbury | width=5px; style=\"background:\"| | | | | |- | Don Valley | width=5px; style=\"background:\"| | | | | |- | Doncaster Central | width=5px; style=\"background:\"| | | | | |- | Doncaster North | width=5px; style=\"background:\"| | | | | |- | Doset Mid and Poole North | width=5px; style=\"background:\"| | | | | |- | Dorset North | width=5px; style=\"background:\"| | | | | |- | Dorset South | width=5px; style=\"background:blue\"| | Conservative gain from Lab |22,667 |45.1\\% |9.3\\% |- | Dorset West | width=5px; style=\"background:blue\"| | Conservative hold |27,287 |47.6\\% | |- | Dover | width=5px; style=\"background:\"| | | | | |- | Down North | width=5px; style=\"background:grey\"| |Independent gain from UCU |21,181 |63.3\\% | |- | Down South | width=5px; style=\"background:#3c3\" | |SDLP hold |20,648 |48.5\\% | |- | Dudley North | width=5px; style=\"background:\"| | | | | |- | Dudley South | width=5px; style=\"background:\"| | | | | |- | Dulwich and West Norwood | width=5px; style=\"background:\"| | | | | |- | Dumfries and Galloway | width=5px; style=\"background:\"| | | | | |- | Dunfiesshire, Clydesdale and Tweeddale | width=5px; style=\"background:\"| | | | | |- | Dunbartonshire East | width=5px; style=\"background:\"| | | | | |- | Dunbartonshire West | width=5px; style=\"background:\"| | | | | |- | Dundee East | width=5px; style=\"background:\"| | | | | |- | Dundee West | width=5px; style=\"background:\"| | | | | |- | Dunfermine and Fife West | width=5px; style=\"background:\"| | | | | |- | City of Durham | width=5px; style=\"background:red\"| | Labour hold |20,496 |44.3\\% | |- | Durham North | width=5px; style=\"background:red\"| |Labour hold |20,698 |50.5\\% | |- | Durham North West | width=5px; style=\"background:\"| | | | | |- | Dwyfor Meirionnydd | width=5px; style=\"background:\"| | | | | |- | Ealing Central and Acton | width=5px; style=\"background:\"| | | | | |- | Ealing North | width=5px; style=\"background:\"| | | | | |- | Ealing Southall | width=5px; style=\"background:\"| | | | | |- | Easington | width=5px; style=\"background:red\"| |Labour hold |20,579 |58.9\\% | |- | East Ham | width=5px; style=\"background:\"| | | | | |- | East Kilbride, Strathaven and Lesmahagow | width=5px; style=\"background:\"| | | | | |- | East Lothian | width=5px; style=\"background:\"| | | | | |- | Eastbourne | width=5px; style=\"background:\"| | | | | |- | Eastleigh | width=5px; style=\"background:\"| | | | | |- | Eddisbury | width=5px; style=\"background:\"| | | | | |- | Edinburgh East | width=5px; style=\"background:red\"| | Labour hold | 17,305 | 43.4\\% | |- | Edinburgh North and Leith | width=5px; style=\"background:\"| | | | | |- | Edinburgh South | width=5px; style=\"background:\"| | | | | |- | Edinburgh South West | width=5px; style=\"background:red\"| | Labour hold | 19,473 | 42.8\\% | |- | Edinburgh West | width=5px; style=\"background:#F9D616\"| | Liberal Democrat hold | 16,684 | 35.9\\% | -11.4\\% |- | Edmonton | width=5px; style=\"background:\"| | | | | |- | Ellesmere Port and Neston | width=5px; style=\"background:\"| | | | | |- | Elmet and Rothwell | width=5px; style=\"background:\"| | | | | |- | Eltham | width=5px; style=\"background:\"| | | | | |- | Enfield North | width=5px; style=\"background:\"| | | | | |- | Enfield Southgate | width=5px; style=\"background:\"| | | | | |- | Epping Forest | width=5px; style=\"background:\"| | | | | |- | Epsom and Ewell | width=5px; style=\"background:\"| | | | | |- | Erewash | width=5px; style=\"background:\"| | | | | |- | Erith and Thameshead | width=5px; style=\"background:\"| | | | | |- | Esher and Walton | width=5px; style=\"background:\"| | | | | |- | Exeter | width=5px; style=\"background:red\"| | Labour hold |19,942 |38.2\\% | |- | Falkirk | width=5px; style=\"background:red\"| | Labour hold |23,207 |45.7\\% | |- | Fareham | width=5px; style=\"background:blue\"| | Conservative hold |30,037 |55.3\\% | |- | Faversham and Kent Mid | width=5px; style=\"background:\"| | | | | |- | Feltham and Heston | width=5px; style=\"background:\"| | | | | |- | Fermanagh and South Tyrone | width=5px; style=\"background:#060\"| | Sinn F\u00e9in hold |21,304 |45.5\\% | |- | Fife North East | width=5px; style=\"background:\"| | | | | |- | Filton and Bradley Stoke | width=5px; style=\"background:\"| | | | | |- | Finchley and Golders Green | width=5px; style=\"background:\"| | | | | |- | Folkestone and Hythe | width=5px; style=\"background:\"| | | | | |- | Forest of Dean | width=5px; style=\"background:\"| | | | | |- | Foyle | width=5px; style=\"background:#3c3\" | |SDLP hold |16,922 |44.7\\% | |- | Flyde | width=5px; style=\"background:\"| | | | | |- | Gainsborough | width=5px; style=\"background:blue\"| | Conservative hold |24,266 |49.3\\% | |- | Garston and Halewood | width=5px; style=\"background:red\"| | Labour hold |25,493 |59.5\\% | |- | Gateshead | width=5px; style=\"background:\"| | | | | |- | Gedling | width=5px; style=\"background:red\"| | Labour hold |19,821 |41.1\\% | |- | Gillingham and Rainham | width=5px; style=\"background:\"| | | | | |- | Glasgow Central | width=5px; style=\"background:\"| | | | | |- | Glasgow East | width=5px; style=\"background:red\"| | Labour hold |19,797 |61.6\\% | |- | Glasgow North | width=5px; style=\"background:\"| | | | | |- | Glasgow North East | width=5px; style=\"background:red\"| | Labour hold | 20,100 | 68.3\\% | |- | Glasgow North West | width=5px; style=\"background:\"| | | | | |- | Glasgow South | width=5px; style=\"background:\"| | | | | |- | Glasgow South West | width=5px; style=\"background:\"| | | | | |- | Glenrothes | width=5px; style=\"background:\"| | | | | |- | Gloucester | width=5px; style=\"background:\"| | | | | |- | Gordon | width=5px; style=\"background:\"| | | | | |- | Gosport | width=5px; style=\"background:\"| | | | | |- | Gower | width=5px; style=\"background:\"| | | | | |- | Grantham and Stamford | width=5px; style=\"background:\"| | | | | |- | Gravesham | width=5px; style=\"background:blue\"| | Conservative hold | 22,956 | 48.5\\% | 9.1\\% |- | Great Grimsby | width=5px; style=\"background:red\"| |Labour hold |10,777 |32.7\\% |10.5\\% (to CON) |- | Great Yarmouth | width=5px; style=\"background:\"| | | | | |- | Greenwich and Woolwich | width=5px; style=\"background:\"| | | | | |- | Guildford | width=5px; style=\"background:blue\"| |Conservative hold |29,618 |53.3\\% |6.9\\% |- | Hackney North and Stoke Newington | width=5px; style=\"background:\"| | | | | |- | Hackney South and Shoreditch | width=5px; style=\"background:\"| | | | | |- | Halesowen and Rowley Regis | width=5px; style=\"background:\"| | | | | |- | Halifax | width=5px; style=\"background:\"| | | | | |- | Haltemprice and Howden | width=5px; style=\"background:blue\"| | Conservative hold | 24,486 | 50.2\\% | 6.6\\% |- | Halton | width=5px; style=\"background:\"| | | | | |- | Hammersmith | width=5px; style=\"background:red\"| | Labour hold | 20,810 | 43.9\\% | 0.5\\% (to CON) |- | Hampshire East | width=5px; style=\"background:\"| | | | | |- | Hampshire North East | width=5px; style=\"background:\"| | | | | |- | Hampshire North West | width=5px; style=\"background:\"| | | | | |- | Hampstead and Kilburn | width=5px; style=\"background:\"| | | | | |- | Harborough | width=5px; style=\"background:\"| | | | | |- | Harlow | width=5px; style=\"background:\"| | | | | |- | Harrogate and Knaresborough | width=5px; style=\"background:\"| | | | | |- | Harrow East | width=5px; style=\"background:blue\"| | Conservative gain from Lab | 21,435 | 44.7\\% | 7.0\\% (to CON) |- | Harrow West | width=5px; style=\"background:red\"| | Labour hold | 20,111 | 43.6\\% | 5.7\\% (to CON) |- | Hartlepool | width=5px; style=\"background:\"| | | | | |- | Harwich and Essex North | width=5px; style=\"background:\"| | | | | |- | Hastings and Rye | width=5px; style=\"background:\"| | | | | |- | Havant | width=5px; style=\"background:\"| | | | | |- | Hayes and Harlington | width=5px; style=\"background:\"| | | | | |- | Hazel Grove | width=5px; style=\"background:\"| | | | | |- | Hemel Hempstead | width=5px; style=\"background:\"| | | | | |- | Hemsworth | width=5px; style=\"background:\"| | | | | |- | Hendon | width=5px; style=\"background:\"| | | | | |- | Henley | width=5px; style=\"background:\"| | | | | |- | Hereford and Herefordshire South | width=5px; style=\"background:blue\"| |Conservative gain from Lib |22,366 |46.2\\% |3.8\\% |- | Herefordshire North | width=5px; style=\"background:blue\"| | Conservative hold | 24,631 | 51.8\\% | 3.8\\% (to LD) |- | Hertford and Stortford | width=5px; style=\"background:blue\"| | Conservative hold | 29,810 | 53.8\\% | |- | Hertfordshire North East | width=5px; style=\"background:blue\"| | Conservative hold | 26,995 | 53.5\\% | 1.9\\% (to LD) |- | Hertfordshire South West | width=5px; style=\"background:\"| | | | | |- | Hertsmere | width=5px; style=\"background:blue\"| | Conservative hold | 26,476 | 56.0\\% | 5.6\\% |- | Hexham | width=5px; style=\"background:\"| | | | | |- | Heywood and Middleton | width=5px; style=\"background:\"| | | | | |- | High Peak | width=5px; style=\"background:\"| | | | | |- | Hitchin and Harpenden | width=5px; style=\"background:\"| | | | | |- | Holborn and St Pancras | width=5px; style=\"background:\"| | | | | |- | Hornchurch and Upminster | width=5px; style=\"background:\"| | | | | |- | Hornsey and Wood Green | width=5px; style=\"background:\"| | | | | |- | Horsham | width=5px; style=\"background:\"| | | | | |- | Houghton and Sunderland South | width=5px; style=\"background:red\"| | Labour hold | 19,137 | 50.3\\% | 8.4\\% (to CON) |- | Hove | width=5px; style=\"background:\"| | | | | |- | Huddersfield | width=5px; style=\"background:red\"| | Labour hold | 15,725 | 38.8\\% | 7.1\\% (to CON) |- | Hull East | width=5px; style=\"background:\"| | | | | |- | Hull North | width=5px; style=\"background:red\"| | Labour hold | 13,044 | 39.2\\% | 12.2\\% (to LD) |- | Hull West and Hessle | width=5px; style=\"background:\"| | | | | |- | Huntingdon | width=5px; style=\"background:\"| | | | | |- | Hyndburn | width=5px; style=\"background:\"| | | | | |- | Ilford North | width=5px; style=\"background:\"| | | | | |- | Ilford South | width=5px; style=\"background:\"| | | | | |- | Inverclyde | width=5px; style=\"background:\"| | | | | |- | Inverness, Nairn, Badenoch and Strathspey | width=5px; style=\"background:\"| | | | | |- | Ipswich | width=5px; style=\"background:\"| | | | | |- | Isle of Wight | width=5px; style=\"background:\"| | | | | |- | Islington North | width=5px; style=\"background:red\"| | Labour hold | 24,276 | 54.5\\% | |- | Islington South and Finsbury | width=5px; style=\"background:red\"| | Labour hold | 18,407 | 42.3\\% | 3.3\\% |- | Islwyn | width=5px; style=\"background:\"| | | | | |- | Jarrow | width=5px; style=\"background:red\" | | Labour hold | 20,910 | 53.9\\% | 6.4\\% |- | Keighley | width=5px; style=\"background:\"| | | | | |- | Kenilworth and Southam | width=5px; style=\"background:\"| | | | | |- | Kensington | width=5px; style=\"background:blue\"| | Conservative hold | 17,595 | 50.1\\% | 5.2\\% |- | Kettering | width=5px; style=\"background:\"| | | | | |- | Kilmarnock and Loudoun | width=5px; style=\"background:\"| | | | | |- | Kingston and Surbiton | width=5px; style=\"background:\"| | | | | |- | Kingswood | width=5px; style=\"background:\"| | | | | |- | Kilcaldy and Cowdenbeath | width=5px; style=\"background:\"| | | | | |- | Knowsley | width=5px; style=\"background:\"| | | | | |- | Lagan Valley | width=5px; style=\"background:#c30\"| |Democratic Unionist hold |18,199 |49.8\\% | |- | Lanark and Hamilton East | width=5px; style=\"background:\"| | | | | |- | Lancashire West | width=5px; style=\"background:\"| | | | | |- | Lancaster and Fleetwood | width=5px; style=\"background:\"| | | | | |- | Leeds Central | width=5px; style=\"background:red\"| | Labour hold | 18,434 | 49.3\\% | |- | Leeds East | width=5px; style=\"background:\"| | | | | |- | Leeds North East | width=5px; style=\"background:red\"| | Labour hold | 20,287 | 42.7\\% | |- | Leeds North West | width=5px; style=\"background:\"| | | | | |- | Leeds West | width=5px; style=\"background:red\"| | Labour hold | 16,389 | 42.3\\% | |- | Leicester East | width=5px; style=\"background:\"| | | | | |- | Leicester South | width=5px; style=\"background:blue\"| | Conservative hold | 27,000 | 49.5\\% | |- | Leicester West | width=5px; style=\"background:\"| | | | | |- | Leicestershire North West | width=5px; style=\"background:\"| | | | | |- | Leicestershire South | width=5px; style=\"background:\"| | | | | |- | Leigh | width=5px; style=\"background:red\"| | Labour hold | 24,295 | 51.3\\% | |- | Lewes | width=5px; style=\"background:\"| | | | | |- | Lewisham Deptford | width=5px; style=\"background:\"| | | | | |- | Lewisham East | width=5px; style=\"background:\"| | | | | |- | Lewisham West and Penge | width=5px; style=\"background:\"| | | | | |- | Leyton and Wanstead | width=5px; style=\"background:\"| | | | | |- | Lichfield | width=5px; style=\"background:\"| | | | | |- | Lincoln | width=5px; style=\"background:\"| | | | | |- | Linlithgow and Falkirk East | width=5px; style=\"background:\"| | | | | |- | Liverpool Riverside | width=5px; style=\"background:red\"| | Labour hold | 22,998 | 59.3\\% | |- | Liverpool Walton | width=5px; style=\"background:\"| | | | | |- | Liverpool Wavertree | width=5px; style=\"background:\"| | | | | |- | Liverpool West Derby | width=5px; style=\"background:\"| | | | | |- | Livingston | width=5px; style=\"background:\"| | | | | |- | Llanelli | width=5px; style=\"background:red\"| | Labour hold | 15,916 | 42.5\\% | 4.0\\% (to PC) |- | Londonderry East | width=5px; style=\"background:\"| | | | | |- | Loughborough | width=5px; style=\"background:\"| | | | | |- | Louth and Horncastle | width=5px; style=\"background:blue\"| | Conservative hold | 25,065 | 49.6\\% | |- | Ludlow | width=5px; style=\"background:\"| | | | | |- | Luton North | width=5px; style=\"background:red\"| |Labour hold |21,192 |49.3\\% |0.5\\% |- | Luton South | width=5px; style=\"background:red\"| | Labour hold | 14,725 | 34.9\\% | 4.6\\% (to CON) |- | Macclesfield | width=5px; style=\"background:\" | | | | | |- | Maidenhead | width=5px; style=\"background:blue\" | |Conservative hold |31,937 |59.5\\% |7.8\\% |- | Maidstone and the Weald | width=5px; style=\"background:blue\" | | Conservative hold | 23,491 | 48.0\\% | |- | Makerfield | width=5px; style=\"background:\" | | | | | |- | Maldon | width=5px; style=\"background:\" | | | | | |- | Manchester Central | width=5px; style=\"background:\" | | | | | |- | Manchester Gorton | width=5px; style=\"background:\" | | | | | |- | Manchester Withington | width=5px; style=\"background:\" | | | | | |- | Mansfield | width=5px; style=\"background:\" | | | | | |- | Meon Valley | width=5px; style=\"background:\" | | | | | |- | Meriden | width=5px; style=\"background:\" | | | | | |- | Merthyr Tydfil and Rhymney | width=5px; style=\"background:\" | | | | | |- | Middlesbrough | width=5px; style=\"background:\" | | | | | |- | Middlesbrough South and Cleveland East | width=5px; style=\"background:red\" | | Labour hold | 18,138 | 39.2\\% | |- | Midlothian | width=5px; style=\"background:\" | | | | | |- | Milton Keynes North | width=5px; style=\"background:\" | | | | | |- | Milton Keynes South | width=5px; style=\"background:\" | | | | | |- | Mitcham and Morden | width=5px; style=\"background:red\" | | Labour hold | 24,722 | 56.4\\% | |- | Mole Valley | width=5px; style=\"background:blue\" | | Conservative hold | 31,263 | 57.5\\% | 2.3\\% |- | Monmouth | width=5px; style=\"background:\" | | | | | |- | Montgomeryshire | width=5px; style=\"background:\" | | | | | |- | Moray | width=5px; style=\"background:\" | | | | | |- | Morecambe and Lunesdale | width=5px; style=\"background:\" | | | | | |- | Morley and Outwood | width=5px; style=\"background:\" | | | | | |- | Motherwell and Wishaw | width=5px; style=\"background:\" | | | | | |- | Na H-Eileanan An Iar | width=5px; style=\"background:#ff0\" | | SNP hold |6,723 |45.75\\% | |- | Neath | width=5px; style=\"background:\" | | | | | |- | New Forest East | width=5px; style=\"background:\" | | | | | |- | New Forest West | width=5px; style=\"background:\" | | | | | |- | Newark | width=5px; style=\"background:\" | | | | | |- | Newbury | width=5px; style=\"background:\" | | | | | |- | Newcastle-Under-Lyme | width=5px; style=\"background:\" | | | | | |- | Newcastle upon Tyne Central | width=5px; style=\"background:red\"| | Labour hold | 15,692 | 45.9\\% | 0.6\\% (to LD) |- | Newcastle upon Tyne East | width=5px; style=\"background:red\"| | Labour hold | 17,043 | 45.0 | 4.6\\% (to LD) |- | Newcastle upon Tyne North | width=5px; style=\"background:red\"| | Labour hold | 17,950 | 40.8 | 4.5\\% (to LD) |- | Newport East | width=5px; style=\"background:\" | | | | | |- | Newport West | width=5px; style=\"background:\" | | | | | |- | Newry and Armagh | width=5px; style=\"background:\" | | | | | |- | Newton Abbot | width=5px; style=\"background:blue\" | | Conservative gain from Lib |20,774 |43.0\\% |5.8\\% |- | Norfolk Mid | width=5px; style=\"background:\" | | | | | |- | Norfolk North | width=5px; style=\"background:\" | | | | | |- | Norfolk North West | width=5px; style=\"background:\" | | | | | |- | Norfolk South | width=5px; style=\"background:\" | | | | | |- | Norfolk South West | width=5px; style=\"background:\" | | | | | |- | Normanton, Pontefract and Castleford | width=5px; style=\"background:\" | | | | | |- | Northampton North | width=5px; style=\"background:\" | | | | | |- | Northampton South | width=5px; style=\"background:\" | | | | | |- | Northamptonshire South | width=5px; style=\"background:blue\" | | Conservative hold | 33,081 | 55.2\\% | |- | Norwich North | width=5px; style=\"background:\" | | | | | |- | Norwich South | width=5px; style=\"background:\" | | | | | |- | Nottingham East | width=5px; style=\"background:\" | | | | | |- | Nottingham North | width=5px; style=\"background:\" | | | | | |- | Nottingham South | width=5px; style=\"background:\" | | | | | |- | Nuneaton | width=5px; style=\"background:\" | | | | | |- | Ochil and Perthshire South | width=5px; style=\"background:red\" | | Labour hold | 19,131 | 37.9\\% | |- | Ogmore | width=5px; style=\"background:\" | | | | | |- | Old Bexley and Sidcup | width=5px; style=\"background:\" | | | | | |- | Oldham East and Saddleworth | width=5px; style=\"background:\" | | | | | |- | Oldham West and Royton | width=5px; style=\"background:\" | | | | | |- | Orkney and Shetland | width=5px; style=\"background:\" | | | | | |- | Orpington | width=5px; style=\"background:\" | | | | | |- | Oxford East | width=5px; style=\"background:\" | | | | | |- | Oxford West and Abingdon | width=5px; style=\"background:\" | | | | | |- | Paisley and Renfrewshire North | width=5px; style=\"background:\" | | | | | |- | Paisley and Renfrewshire South | width=5px; style=\"background:\" | | | | | |- | Pendle | width=5px; style=\"background:\" | | | | | |- | Penistone and Stocksbridge | width=5px; style=\"background:\" | | | | | |- | Penrith and the Border | width=5px; style=\"background:\" | | | | | |- | Perth and Perthshire North | width=5px; style=\"background:#ff0\" | | SNP hold | 19,118 | 39.6\\% | 2.9\\% |- | Peterborough | width=5px; style=\"background:\" | | | | | |- | Plymouth Moor View | width=5px; style=\"background:red\" | | Labour hold |15,433 |37.2\\% |7.8\\% (to CON) |- | Plymouth Sutton and Devonport | width=5px; style=\"background:blue\" | | Conservative gain from Lab |15,050 |34.3\\% |6.9\\% |- | Pontypridd | width=5px; style=\"background:red\" | | Labour hold | 14,220 | 38.8\\% | |- | Poole | width=5px; style=\"background:\" | | | | | |- | Poplar and Limehouse | width=5px; style=\"background:\" | | | | | |- | Portsmouth North | width=5px; style=\"background:\" | | | | | |- | Portsmouth South | width=5px; style=\"background:\" | | | | | |- | Preseli Pembrokeshire | width=5px; style=\"background:\" | | | | | |- | Preston | width=5px; style=\"background:\" | | | | | |- | Pudsey | width=5px; style=\"background:\" | | | | | |- | Putney | width=5px; style=\"background:\" | | | | | |- | Rayleigh and Wickford | width=5px; style=\"background:\" | | | | | |- | Reading East | width=5px; style=\"background:\" | | | | | |- | Reading West | width=5px; style=\"background:\" | | | | | |- | Redcar | width=5px; style=\"background:#F9D616\"| | Liberal Democrat gain from Lab | 18,955 | 45.2\\% | 21.8\\% |- | Redditch | width=5px; style=\"background:\" | | | | | |- | Reigate | width=5px; style=\"background:\" | | | | | |- | Renfrewshire East | width=5px; style=\"background:\" | | | | | |- | Rhondda | width=5px; style=\"background:\" | | | | | |- | Ribble Valley | width=5px; style=\"background:\" | | | | | |- | Richmond Yorks | width=5px; style=\"background:\" | | | | | |- | Richmond Park | width=5px; style=\"background:\" | | | | | |- | Rochdale | width=5px; style=\"background:\" | | | | | |- | Rochester and Strood | width=5px; style=\"background:blue\" | | Conservative hold | 23,604 | 49.2\\% | |- | Rochford and Southend East | width=5px; style=\"background:\" | | | | | |- | Romford | width=5px; style=\"background:\" | | | | | |- | Romsey and Southampton North | width=5px; style=\"background:\" | | | | | |- | Ross, Skye and Lochaber | width=5px; style=\"background:\" | | | | | |- | Rossendale and Darwen | width=5px; style=\"background:\" | | | | | |- | Rother Valley | width=5px; style=\"background:\" | | | | | |- | Rotherham | width=5px; style=\"background:\" | | | | | |- | Rugby | width=5px; style=\"background:\" | | | | | |- | Ruislip, Northwood and Pinner | width=5px; style=\"background:\" | | | | | |- | Runnymede and Weybridge | width=5px; style=\"background:\" | | | | | |- | Rushcliffe | width=5px; style=\"background:\" | | | | | |- | Rutherglen and Hamilton West | width=5px; style=\"background:\" | | | | | |- | Rutland and Melton | width=5px; style=\"background:\" | | | | | |- | Saffron Walden | width=5px; style=\"background:\" | | | | | |- | St Albans | width=5px; style=\"background:\" | | | | | |- | St Austell and Newquay | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold |20,189 |42.7\\% | |- | St Helens North | width=5px; style=\"background:red\" | | Labour hold | 23,041 | 51.7\\% | |- | St Helens South | width=5px; style=\"background:red\" | | Labour hold | 24,364 | 52.9\\% | |- | St Ives | width=5px; style=\"background:\" | | | | | |- | Salford and Eccles | width=5px; style=\"background:red\" | | Labour hold | 16,655 | 40.1\\% | |- | Salisbury | width=5px; style=\"background:\" | | | | | |- | Scarborough and Whitby | width=5px; style=\"background:blue\" | | Conservative hold | 21,108 | 42.8\\% | |- | Scunthorpe | width=5px; style=\"background:\" | | | | | |- | Sedgefield | width=5px; style=\"background:red\" | | Labour hold |18,141 |45.1\\% |11.6\\% (to CON) |- | Sefton Central | width=5px; style=\"background:\" | | | | | |- | Selby and Ainsty | width=5px; style=\"background:blue\" | | Conservative hold | 25,562 | 49.4\\% | |- | Sevenoaks | width=5px; style=\"background:\" | | | | | |- | Sheffield Brightside and Hillsborough | width=5px; style=\"background:red\" | | 'Labour hold | 21,400 | 55.0\\% | |- | Sheffield Central | width=5px; style=\"background:\"red\" | | Labour hold | 17,138 | 41.3\\% | |- | Sheffield Hallam | width=5px; style=\"background:\"#F9D616\" | | Liberal Democrat Hold | 27,324 | 53.4\\% | |- | Sheffield Heeley | width=5px; style=\"background:\" | | | | | |- | Sheffield South East | width=5px; style=\"background:red\" | | Labour hold | 20,169 | 48.7\\% | |- | Sherwood | width=5px; style=\"background:\" | | | | | |- | Shipley | width=5px; style=\"background:blue\" | | Conservative hold | 24,002 | 48.6\\% | |- | Shrewsbury and Atcham | width=5px; style=\"background:\" | | | | | |- | Shropshire North | width=5px; style=\"background:blue\" | | Conservative hold | 26,692 | 51.5\\% | |- | Sittingbourne and Sheppey | width=5px; style=\"background:\" | | | | | |- | Skipton and Ripon | width=5px; style=\"background:\" | | | | | |- | Sleaford and North Hykeham | width=5px; style=\"background:blue\" | | Conservative hold | 30,719 | 51.6\\% | |- | Slough | width=5px; style=\"background:\" | | | | | |- | Solihull | width=5px; style=\"background:#F9D616\" | | Liberal Democrat gain from Con | 23,635 | 42.9\\% | 0.3\\% |- | Somerset North | width=5px; style=\"background:\" | | | | | |- | Somerset North East | width=5px; style=\"background:\" | | | | | |- | Somerton and Frome | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold |28,793 |47.5\\% | |- | South Holland and the Deepings | width=5px; style=\"background:\" | | | | | |- | South Ribble | width=5px; style=\"background:\" | | | | | |- | South Shields | width=5px; style=\"background:red\" | | Labour hold | 18,995 | 52.0\\% | |- | Southampton Itchen | width=5px; style=\"background:red\" | | Labour hold | 16,326 | 36.8\\% | |- | Southampton Test | width=5px; style=\"background:red\" | | Labour hold | 17,001 | 38.5\\% | |- | Southampton West | width=5px; style=\"background:\" | | | | | |- | Southport | width=5px; style=\"background:\" | | | | | |- | Spelthorne | width=5px; style=\"background:\" | | | | | |- | Stafford | width=5px; style=\"background:\" | | | | | |- | Staffordshire Moorlands | width=5px; style=\"background:\" | | | | | |- | Staffordshire South | width=5px; style=\"background:\" | | | | | |- | Stalybridge and Hyde | width=5px; style=\"background:\" | | | | | |- | Stevenage | width=5px; style=\"background:\" | | | | | |- | Stirling | width=5px; style=\"background:red\" | |Labour hold |19,558 |41.8\\% | |- | Stockport | width=5px; style=\"background:red\" | | Labour hold | 16,697 | 42.7\\% | |- | Stockton North | width=5px; style=\"background:\" | | | | | |- | Stockton South | width=5px; style=\"background:\" | | | | | |- | Stoke-on-Trent Central | width=5px; style=\"background:\" | | | | | |- | Stoke-on-Trent North | width=5px; style=\"background:\" | | | | | |- | Stoke-on-Trent South | width=5px; style=\"background:red\" | | Labour hold | 15,446 | 38.8\\% | |- | Stone | width=5px; style=\"background:\" | | | | | |- | Stourbridge | width=5px; style=\"background:\" | | | | | |- | Strangford | width=5px; style=\"background:\" | | | | | |- | Stratford-on-Avon | width=5px; style=\"background:\" | | | | | |- | Streatham | width=5px; style=\"background:\" | | | | | |- | Stretford and Urmston | width=5px; style=\"background:\" | | | | | |- | Stroud | width=5px; style=\"background:\" | | | | | |- | suffolk Central and Ipswitch North | width=5px; style=\"background:\" | | | | | |- | Suffolk Coastal | width=5px; style=\"background:\" | | | | | |- | Suffolk South | width=5px; style=\"background:\" | | | | | |- | Suffolk West | width=5px; style=\"background:\" | | | | | |- | Sunderland Central | width=5px; style=\"background:red\" | |Labour win (new seat) |19,495 |45.9\\% | |- | Surrey East (UK Parliament constituency) | width=5px; style=\"background:blue\" | | Conservative hold | 31,007 | 56.7\\% | 0.7\\% (to LD) |- | Surrey Heath | width=5px; style=\"background:blue\" | | Conservative hold | 31,326 | 57.6\\% | 4.6\\% |- | Surrey South West | width=5px; style=\"background:blue\" | | Conservative hold | 33,605 | 58.7\\% | 8.6\\% |- | Sussex Mid | width=5px; style=\"background:blue\" | |Conservative hold |28,329 |50.7\\% |0.3\\% |- | Sutton and Cheam | width=5px; style=\"background:\" | | | | | |- | Sutton Coldfield | width=5px; style=\"background:\" | | | | | |- | Swansea East | width=5px; style=\"background:\" | | | | | |- | Swansea West | width=5px; style=\"background:\" | | | | | |- | Swindon North | width=5px; style=\"background:\" | | | | | |- | Swindon South | width=5px; style=\"background:\" | | | | | |- | Tamworth | width=5px; style=\"background:\" | | | | | |- | Tatton | width=5px; style=\"background:\" | | | | | |- | Taunton Deane | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold |28,531 |49.1\\% | |- | Telford | width=5px; style=\"background:\" | | | | | |- | Tewkesbury | width=5px; style=\"background:blue\" | | Conservative hold | 25,472 | 47.2\\% | |- | Thanet North | width=5px; style=\"background:\" | | | | | |- | Thanet South | width=5px; style=\"background:\" | | | | | |- | Thirsk and Malton | width=5px; style=\"background:black\" | | Delayed until 27 May'' | | | |- | Thornbury and Yate | width=5px; style=\"background:\" | | | | | |- | Thurrock | width=5px; style=\"background:\" | | | | | |- | Tiverton and Honiton | width=5px; style=\"background:blue\" | | Conservative hold | 27,614 | 50.3\\% | |- | Tonbridge and Malling | width=5px; style=\"background:\" | | | | | |- | Tooting | width=5px; style=\"background:\" | | | | | |- | Torbay | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold |23,126 |47.0\\% | |- | Torfaen | width=5px; style=\"background:\" | | | | | |- | Totnes | width=5px; style=\"background:blue\" | | Conservative hold|21,940 |45.9\\% | |- | Tottenham | width=5px; style=\"background:\" | | | | | |- | Truro and Falmouth | width=5px; style=\"background:blue\" | | Conservative gain from Lib |20,349 |41.7\\% | |- | Tunbridge Wells | width=5px; style=\"background:\" | | | | | |- | Twickenham | width=5px; style=\"background:\" | | | | | |- | Tynemouth | width=5px; style=\"background:\" | | | | | |- | Tyneside North | width=5px; style=\"background:\" | | | | | |- | Tyrone West | width=5px; style=\"background:#060\" | |Sinn F\u00e9in hold|18,050 |48.4\\% | |- | Ulster Mid | width=5px; style=\"background:\" | | | | | |- | Upper Bann | width=5px; style=\"background:#c30\" | |Democratic Unionist hold|14,000 |33.8\\% | |- | Uxbridge and Ruiislip South | width=5px; style=\"background:\" | | | | | |- | Vale of Clwyd | width=5px; style=\"background:red\" | | Labour hold|15,017 |42.3\\% | |- | Vale of Glamorgan | width=5px; style=\"background:\" | | | | | |- | Vauxhall | width=5px; style=\"background:\" | | | | | |- | Wakefield | width=5px; style=\"background:\" | | | | | |- | Wallasey | width=5px; style=\"background:\" | | | | | |- | Walsall North | width=5px; style=\"background:red\" | | Labour hold | 13,385 | 37.0\\% | |- | Walsall South | width=5px; style=\"background:red\" | | Labour hold | 16,211 | 39.7\\% | |- | Walthamstow | width=5px; style=\"background:\" | | | | | |- | Wansbeck | width=5px; style=\"background:\" | | | | | |- | Wantage | width=5px; style=\"background:\" | | | | | |- | Warley | width=5px; style=\"background:red\" | | Labour hold| 20,240 | 52.9\\% | |- | Warrington North | width=5px; style=\"background:\" | | | | | |- | Warrington South | width=5px; style=\"background:\" | | | | | |- | Warwick and Leamington | width=5px; style=\"background:\" | | | | | |- | Warwickshire North | width=5px; style=\"background:\" | | | | | |- | Washington and Sunderland West | width=5px; style=\"background:red\" | |Labour win (new seat) |19,615 |53\\% | |- | Watford | width=5px; style=\"background:\" | | | | | |- | Waveney | width=5px; style=\"background:\" | | | | | |- | Wealden | width=5px; style=\"background:blue\" | | Conservative hold| 31,090 | 56.6\\% | |- | Weaver Vale | width=5px; style=\"background:\" | | | | | |- | Wellingborough | width=5px; style=\"background:blue\" | | Conservative hold| 24,918 | 48.2\\% | |- | Wells | width=5px; style=\"background:#F9D616\" | | Liberal Democrat gain from Con |24,560 |44.0\\% |3.6\\% |- | Welwyn Hatfield | width=5px; style=\"background:\" | | | | | |- | Wentworth and Dearne | width=5px; style=\"background:\" | | | | | |- | West Bromwich East | width=5px; style=\"background:\" | | | | | |- | West Bromwich West | width=5px; style=\"background:\" | | | | | |- | West Ham | width=5px; style=\"background:\" | | | | | |- | Westminster North | width=5px; style=\"background:red\" | | Labour hold| 17,377 | 43.9\\% | |- | Westmorland and Lonsdale | width=5px; style=\"background:\" | | | | | |- | Weston Super-Mare | width=5px; style=\"background:\" | | | | | |- | Wigan | width=5px; style=\"background:\" | | | | | |- | Wiltshire North | width=5px; style=\"background:\" | | | | | |- | Wiltshire South West | width=5px; style=\"background:\" | | | | | |- | Wimbledon | width=5px; style=\"background:\" | | | | | |- | Winchester | width=5px; style=\"background:\" | | | | | |- | Windsor | width=5px; style=\"background:\" | | | | | |- | Wirral South | width=5px; style=\"background:red\" | | Labour hold| 16,276 | 40.8\\% | |- | Wirral West | width=5px; style=\"background:blue\" | | Conservative hold| 16,726 | 42.5\\% | |- | Witham | width=5px; style=\"background:\" | | | | | |- | Witney | width=5px; style=\"background:\" | | | | | |- | Woking | width=5px; style=\"background:blue\" | | Conservative hold| 26,551 | 50.3\\% | 0.7\\% (to LD) |- | Wokingham | width=5px; style=\"background:blue\" | | Conservative hold| 28,754 | 52.7\\% | 4.7\\% |- | Wolverhampton North East | width=5px; style=\"background:\" | | | | | |- | Wolverhampton South East | width=5px; style=\"background:\" | | | | | |- | Wolverhampton South West | width=5px; style=\"background:\" | | | | | |- | Worcester | width=5px; style=\"background:\" | | | | | |- | Worcestershire Mid | width=5px; style=\"background:blue\" | | Conservative hold| 27,770 | 54.5\\% | |- | Worcestershire West | width=5px; style=\"background:\" | | | | | |- | Workington | width=5px; style=\"background:red\" | | Labour hold| 17,865 | 45.5\\% | |- | Worsley and Eccles South | width=5px; style=\"background:red\" | | Labour hold| 17,892 | 42.9\\% | |- | Worthing East and Shoreham | width=5px; style=\"background:blue\" | | Conservative hold| 23,458 | 48.5\\% | |- | Worthing West | width=5px; style=\"background:blue\" | | Conservative hold| 25,416 | 51.7\\% | |- | The Wreckin | width=5px; style=\"background:\" | | | | | |- | Wrexham | width=5px; style=\"background:red\" | | Labour hold| 12,161 | 36.9\\% | 5.7\\% |- | Wycombe | width=5px; style=\"background:blue\" | | Conservative hold| 23,423 | 48.6\\% | |- | Wyre and Preston North | width=5px; style=\"background:blue\" | | Conservative hold| 26,877 | 52.4\\% | 3.9\\% |- | Wyre Forest | width=5px; style=\"background:red\" | | Labour hold| 11,490 | 33.4\\% | |- | Wythenshawe and Sale East | width=5px; style=\"background:red\" | | Labour hold| 17,987 | 44.1\\% | |- | Yeovil | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold| 31,843 | 55.7\\% | 2.7\\% |- | Ynys Mon | width=5px; style=\"background:red\" | | Labour hold| 11,490 | 33.4\\% | 1.8\\% |- | York Central | width=5px; style=\"background:red\" | | Labour hold| 18,573 | 40.0\\% | 6.0\\% (to CON) |- | York Outer | width=5px; style=\"background:blue\" | | Conservative gain from Liberal Democrats | 22,912 | 43\\% | 3.7\\% |- | Yorkshire East | width=5px; style=\"background:blue\" | | Conservative hold''' 24,328 47.5\\% 0.1\\% (to LD)", "after_revision": "ConstituencyResultVotesShareSwing Labour hold 16,073 51.9\\% 5.3\\% (to LD) Conservative gain from Lab 10,734 35.8\\% 7.6\\% Labour hold 16,746 44.4\\% 1.0\\% Labour hold 15,722 36.5\\% 2.5\\% Liberal Democrat hold 17,362 38.4\\% 4.9\\% (to CON)Labour hold20,64958.2\\% 3.9\\% (to SNP) Conservative hold 21,203 46.7\\% 1.4\\% (to LD) Conservative hold 22,913 59.3\\% 12.0\\% (from LAB) Conservative hold 24,176 48.9\\% 0.8\\% (to LD) Labour hold 15,804 39.6\\% 8.1\\% (to CON) Conservative gain from Lab 17,746 38.6\\% 6.9\\% SNP hold 15,020 39.6\\% 2.2\\%Democratic Unionist hold13,99345.9\\%Democratic Unionist hold19,67246.4\\% Democratic Unionist hold 11,536 33.9\\% 3.6\\% (to UCU) Plaid Cymru gain from Lab9,38336.0\\%3.7\\% Liberal Democrat hold14,29231.6\\%2.7\\% (to CON) Conservative hold32,33357.8\\%3.0\\% Labour hold16,23933.7\\%17.2\\% (to LD) Conservative hold29,87854.1\\%2.3\\% (to LD) Labour hold18,60448.4\\%7.3\\% (to CON) Conservative hold27,73652.2\\% Labour hold21,63247.1\\%0.3\\% (to CON) Labour hold20,95047.7\\%1.5\\% Labour hold21,86047.4\\%2.3\\% (to SNP)Conservative hold29,703 52.8\\%5.9\\% (to CON)SNP hold15,86841.3\\%10.7\\% (to CON)Labour hold24,62854.3\\%1.7\\% Labour hold17,48747.3\\%4.2\\% (to LD) Labour hold18,05947.0\\%14.0\\% (to LD) Labour hold21,22648.1\\%0.4\\% (to CON) Conservative hold21,98252.8\\%9.3\\% Conservative gain from Lab19,62443.9\\%7.5\\% Conservative hold25,59050.5\\%4.6\\% Labour hold25,01850.5\\%0.7\\% (to CON) Liberal Democrat hold26,65156.6\\%5.8\\% Labour hold 21,565 41.5\\% 2.5\\% (to CON) Conservative gain from Lab 23,103 47.3\\% 6.5\\% Conservative hold32,05361.1\\%4.7\\% Conservative hold27,59757.9\\%3.2\\% (to LD) Conservative gain from Lab17,54638.9\\%5.5\\% Conservative hold28,81552.5\\%2.3\\% Conservative hold30,98955.8\\%2.6\\% Conservative hold26,81552.8\\%0.7\\% Alliance gain from DUP12,83937.2\\%22.9\\% Democratic Unionist hold14,81240.0\\%5.0\\% (to SF) SDLP hold14,02641.0\\%8.4\\% Sinn F\u00e9in hold22,84071.1\\%1.1\\% Liberal Democrat hold21,59048.4\\%1.6\\% Liberal Democrat hold16,80643.7\\%8.3\\% (to CON) Liberal Democrat hold22,23045.4\\%0.7\\% (to CON) Conservative hold22,23045.4\\%1.6\\% Conservative hold28,14751.6\\%4.0\\% (to LD) Labour hold 16,894 40.6\\% 0.5\\% (to CON) Labour hold19,95055.7\\%2.5\\% Labour hold 17,950 38.5\\% 4.8\\% (to CON) Labour hold 16,023 39.0\\% 7.2\\% (to CON) Labour hold21,75147.8\\%1.1\\% Conservative gain from Lab16,96441.8\\%6.9\\% Labour hold14,44941.16.2\\% (to CON) Labour gain from Ind 16,974 52.4\\% 29.2\\% Labour hold 22,297 49.7\\% 3.3\\% Conservative hold24,08751.4\\%2.3\\% Labour hold21,99450.0\\%11.2\\% (to CON) Labour hold19,87045.9\\%1.3\\% (to CON) Labour hold18,78247.4\\%5.6\\% (to CON) Labour hold 18,327 38.5\\% 4.9\\% (to CON) Conservative hold18,78247.4\\%7.0\\% Conservative hold23,13242.6\\%5.9\\% (to LD) Conservative hold21,32048.4\\%1.8\\% Conservative hold 18,808 45.1\\% 2.9\\% Conservative hold 27,327 52.4\\% 1.0\\% (to LD) Conservative hold 25,901 52.6\\% 6.7\\% Liberal Democrat hold17,92946.2\\%0.3\\% (to CON) Conservative hold28,79256.9\\%3.1\\% Labour hold13,93136.3\\%6.0\\% (to CON) Conservative hold 24,675 45.3\\% 2.9\\% (to LD) Conservative gain from Lab19,68044.9\\%9.8\\% Green gain from Lab 16,238 31.3\\% 8.4\\% Labour hold16,47136.6\\%4.5\\% (to CON) Liberal Democrat hold26,59348.0\\%9.0\\% Conservative hold26,84458.8\\%6.4\\% Conservative gain from Lab20,58539.0\\%2.6\\% Liberal Democrat gain from Lab14,93235.7\\%9.6\\% Conservative gain from Lab22,18844.5\\%8.7\\% Conservative hold27,89947.5\\%2.8\\% Labour hold17,37744.9\\%6.5\\% (to CON) Liberal Democrat hold11,90741.4\\%6.4\\% (to LAB) Conservative gain from Lib37.6\\%15,9695.2\\% Liberal Democrat hold 19,621 39.1\\% 7.0\\% (to CON) Conservative hold26,86251.4\\%0.8\\% Conservative hold29,42550.05\\%2.6\\% Conservative hold27,99547.4\\%2.5\\% (to LD) Conservative hold27,62948.0\\%2.7\\% (to LD) Conservative gain from Lab18,27140.1\\%14.0\\% Conservative hold22,05044.8\\%5.4\\% (to LD) Labour hold 17,262 38.9\\% 6.0\\% (to CON) Labour hold 16,893 41.2\\% 5.3\\% (to CON) Plaid Cymru hold 13,546 35.6\\% 4.2\\% (to LAB) Conservative gain from Lab 16,649 41.1\\% 6.9\\% Conservative gain from Lab18,93942.1\\%7.8\\% Labour hold13,31138.4\\%5.8\\% (to CON) Conservative hold 15,833 41.5\\% 8.4\\% Conservative hold 23,250 45.8\\% 2.3\\% (to LD) Labour hold 19,699 46.0\\% 2.1\\% (to CON) Conservative gain from Lab 22,886 42.2\\% 3.4\\% Liberal Democrat hold22,51248.1\\%0.3\\% (to CON) Conservative gain from Lib22,39045.1\\%9.1\\% Conservative hold 29,075 53.0\\% 1.1\\% Labour hold 21,384 49.3\\% 5.5\\% (to CON) Labour hold 19,936 42.8\\% 3.9\\% (to CON) Labour hold 19,197 41.8\\% 3.4\\% (to CON) Conservative gain from Lab 21,264 44.8\\% 6.3\\% Conservative gain from Lab 23,420 45.8\\% 13.7\\% Conservative gain from Lab | 19,657 | 39.5\\% | 3.3\\% |- | | width=5px; style=\"background:red\"| | Labour hold | 28,949 | 56.0\\% | 0.3\\% |- | | width=5px; style=\"background:blue\"| | Conservative hold | 28,684 | 50.9\\% | 1.7\\% (to LD) |- | | width=5px; style=\"background:red\"| | Labour hold | 23,549 | 57.2\\% | 1.9\\% |- | | width=5px; style=\"background:red\"| | Labour hold | 15,681 | 52.5\\% | 8.6\\% (to PC) |- | | width=5px; style=\"background:red\"| |Labour hold |17,813 |40.3\\% |4.9\\% (to CON) |- | | width=5px; style=\"background:red\"| | Labour hold |16,891 |39.4\\% |9.1\\% (to CON) |- | | width=5px; style=\"background:blue\"| |Conservative gain from Lab |24,428 |48.8\\% |11.6\\% |- | | width=5px; style=\"background:blue\"| | Conservative hold | 29,252 | 56.5\\% | 0.7\\% (to LD) |- | | width=5px; style=\"background:red\"| | Labour hold | 15,083 | 40.8\\% | 6.7\\% (to CON) |- | | width=5px; style=\"background:red\"| |Labour hold |19,191 |51.0\\% |6.2\\% (to CON) |- | | width=5px; style=\"background:red\"| | Labour hold | 14,896 | 33.0\\% | 7.4\\% (to CON) |- | | width=5px; style=\"background:red\"| |Labour hold |17,851 |43.3\\% |9.3\\% (to CON) |- | | width=5px; style=\"background:blue\"| | Conservative hold | 24,378 | 52.1\\% | 3.7\\% |- | | width=5px; style=\"background:blue\"| |Conservative hold |22,877 |48.3\\% |5.7\\% |- | | width=5px; style=\"background:red\"| |Labour hold |17,948 |38.2\\% |8.6\\% (to CON) |- | | width=5px; style=\"background:blue\"| |Conservative gain from Lab |22,935 |45.5\\% |9.8\\% |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:blue\"| | Conservative hold | 27,737 | 51.5\\% | 6.1\\% |- | | width=5px; style=\"background:blue\"| | Conservative hold |48.3\\% |25,662 | |- | | width=5px; style=\"background:#F9D616\"| | Liberal Democrat hold |24,305 |47.4\\% |0.3\\% |- | | width=5px; style=\"background:blue\"| | Conservative hold |27,908 |56.0\\% |5.6\\% |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:blue\"| | Conservative gain from Lab |22,667 |45.1\\% |9.3\\% |- | | width=5px; style=\"background:blue\"| | Conservative hold |27,287 |47.6\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:grey\"| |Independent gain from UCU |21,181 |63.3\\% | |- | | width=5px; style=\"background:#3c3\" | |SDLP hold |20,648 |48.5\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| | Labour hold |20,496 |44.3\\% | |- | | width=5px; style=\"background:red\"| |Labour hold |20,698 |50.5\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| |Labour hold |20,579 |58.9\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| | Labour hold | 17,305 | 43.4\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| | Labour hold | 19,473 | 42.8\\% | |- | | width=5px; style=\"background:#F9D616\"| | Liberal Democrat hold | 16,684 | 35.9\\% | -11.4\\% |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| | Labour hold |19,942 |38.2\\% | |- | | width=5px; style=\"background:red\"| | Labour hold |23,207 |45.7\\% | |- | | width=5px; style=\"background:blue\"| | Conservative hold |30,037 |55.3\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:#060\"| | Sinn F\u00e9in hold |21,304 |45.5\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:#3c3\" | |SDLP hold |16,922 |44.7\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:blue\"| | Conservative hold |24,266 |49.3\\% | |- | | width=5px; style=\"background:red\"| | Labour hold |25,493 |59.5\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| | Labour hold |19,821 |41.1\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| | Labour hold |19,797 |61.6\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| | Labour hold | 20,100 | 68.3\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:blue\"| | Conservative hold | 22,956 | 48.5\\% | 9.1\\% |- | | width=5px; style=\"background:red\"| |Labour hold |10,777 |32.7\\% |10.5\\% (to CON) |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:blue\"| |Conservative hold |29,618 |53.3\\% |6.9\\% |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:blue\"| | Conservative hold | 24,486 | 50.2\\% | 6.6\\% |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| | Labour hold | 20,810 | 43.9\\% | 0.5\\% (to CON) |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:blue\"| | Conservative gain from Lab | 21,435 | 44.7\\% | 7.0\\% (to CON) |- | | width=5px; style=\"background:red\"| | Labour hold | 20,111 | 43.6\\% | 5.7\\% (to CON) |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:blue\"| |Conservative gain from Lib |22,366 |46.2\\% |3.8\\% |- | | width=5px; style=\"background:blue\"| | Conservative hold | 24,631 | 51.8\\% | 3.8\\% (to LD) |- | | width=5px; style=\"background:blue\"| | Conservative hold | 29,810 | 53.8\\% | |- | | width=5px; style=\"background:blue\"| | Conservative hold | 26,995 | 53.5\\% | 1.9\\% (to LD) |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:blue\"| | Conservative hold | 26,476 | 56.0\\% | 5.6\\% |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| | Labour hold | 19,137 | 50.3\\% | 8.4\\% (to CON) |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| | Labour hold | 15,725 | 38.8\\% | 7.1\\% (to CON) |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| | Labour hold | 13,044 | 39.2\\% | 12.2\\% (to LD) |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| | Labour hold | 24,276 | 54.5\\% | |- | | width=5px; style=\"background:red\"| | Labour hold | 18,407 | 42.3\\% | 3.3\\% |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\" | | Labour hold | 20,910 | 53.9\\% | 6.4\\% |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:blue\"| | Conservative hold | 17,595 | 50.1\\% | 5.2\\% |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:#c30\"| |Democratic Unionist hold |18,199 |49.8\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| | Labour hold | 18,434 | 49.3\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| | Labour hold | 20,287 | 42.7\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| | Labour hold | 16,389 | 42.3\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:blue\"| | Conservative hold | 27,000 | 49.5\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| | Labour hold | 24,295 | 51.3\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| | Labour hold | 22,998 | 59.3\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| | Labour hold | 15,916 | 42.5\\% | 4.0\\% (to PC) |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:blue\"| | Conservative hold | 25,065 | 49.6\\% | |- | | width=5px; style=\"background:\"| | | | | |- | | width=5px; style=\"background:red\"| |Labour hold |21,192 |49.3\\% |0.5\\% |- | | width=5px; style=\"background:red\"| | Labour hold | 14,725 | 34.9\\% | 4.6\\% (to CON) |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:blue\" | |Conservative hold |31,937 |59.5\\% |7.8\\% |- | | width=5px; style=\"background:blue\" | | Conservative hold | 23,491 | 48.0\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | | Labour hold | 18,138 | 39.2\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | | Labour hold | 24,722 | 56.4\\% | |- | | width=5px; style=\"background:blue\" | | Conservative hold | 31,263 | 57.5\\% | 2.3\\% |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:#ff0\" | | SNP hold |6,723 |45.75\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\"| | Labour hold | 15,692 | 45.9\\% | 0.6\\% (to LD) |- | | width=5px; style=\"background:red\"| | Labour hold | 17,043 | 45.0 | 4.6\\% (to LD) |- | | width=5px; style=\"background:red\"| | Labour hold | 17,950 | 40.8 | 4.5\\% (to LD) |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:blue\" | | Conservative gain from Lib |20,774 |43.0\\% |5.8\\% |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:blue\" | | Conservative hold | 33,081 | 55.2\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | | Labour hold | 19,131 | 37.9\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:#ff0\" | | SNP hold | 19,118 | 39.6\\% | 2.9\\% |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | | Labour hold |15,433 |37.2\\% |7.8\\% (to CON) |- | | width=5px; style=\"background:blue\" | | Conservative gain from Lab |15,050 |34.3\\% |6.9\\% |- | | width=5px; style=\"background:red\" | | Labour hold | 14,220 | 38.8\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:#F9D616\"| | Liberal Democrat gain from Lab | 18,955 | 45.2\\% | 21.8\\% |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:blue\" | | Conservative hold | 23,604 | 49.2\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold |20,189 |42.7\\% | |- | | width=5px; style=\"background:red\" | | Labour hold | 23,041 | 51.7\\% | |- | | width=5px; style=\"background:red\" | | Labour hold | 24,364 | 52.9\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | | Labour hold | 16,655 | 40.1\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:blue\" | | Conservative hold | 21,108 | 42.8\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | | Labour hold |18,141 |45.1\\% |11.6\\% (to CON) |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:blue\" | | Conservative hold | 25,562 | 49.4\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | | 'Labour hold | 21,400 | 55.0\\% | |- | | width=5px; style=\"background:\"red\" | | Labour hold | 17,138 | 41.3\\% | |- | | width=5px; style=\"background:\"#F9D616\" | | Liberal Democrat Hold | 27,324 | 53.4\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | | Labour hold | 20,169 | 48.7\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:blue\" | | Conservative hold | 24,002 | 48.6\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:blue\" | | Conservative hold | 26,692 | 51.5\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:blue\" | | Conservative hold | 30,719 | 51.6\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:#F9D616\" | | Liberal Democrat gain from Con | 23,635 | 42.9\\% | 0.3\\% |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold |28,793 |47.5\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | | Labour hold | 18,995 | 52.0\\% | |- | | width=5px; style=\"background:red\" | | Labour hold | 16,326 | 36.8\\% | |- | | width=5px; style=\"background:red\" | | Labour hold | 17,001 | 38.5\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | |Labour hold |19,558 |41.8\\% | |- | | width=5px; style=\"background:red\" | | Labour hold | 16,697 | 42.7\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | | Labour hold | 15,446 | 38.8\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | |Labour win (new seat) |19,495 |45.9\\% | |- | | width=5px; style=\"background:blue\" | | Conservative hold | 31,007 | 56.7\\% | 0.7\\% (to LD) |- | | width=5px; style=\"background:blue\" | | Conservative hold | 31,326 | 57.6\\% | 4.6\\% |- | | width=5px; style=\"background:blue\" | | Conservative hold | 33,605 | 58.7\\% | 8.6\\% |- | | width=5px; style=\"background:blue\" | |Conservative hold |28,329 |50.7\\% |0.3\\% |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold |28,531 |49.1\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:blue\" | | Conservative hold | 25,472 | 47.2\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:black\" | | Delayed until 27 May'' | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:blue\" | | Conservative hold | 27,614 | 50.3\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold |23,126 |47.0\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:blue\" | | Conservative hold|21,940 |45.9\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:blue\" | | Conservative gain from Lib |20,349 |41.7\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:#060\" | |Sinn F\u00e9in hold|18,050 |48.4\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:#c30\" | |Democratic Unionist hold|14,000 |33.8\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | | Labour hold|15,017 |42.3\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | | Labour hold | 13,385 | 37.0\\% | |- | | width=5px; style=\"background:red\" | | Labour hold | 16,211 | 39.7\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | | Labour hold| 20,240 | 52.9\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | |Labour win (new seat) |19,615 |53\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:blue\" | | Conservative hold| 31,090 | 56.6\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:blue\" | | Conservative hold| 24,918 | 48.2\\% | |- | | width=5px; style=\"background:#F9D616\" | | Liberal Democrat gain from Con |24,560 |44.0\\% |3.6\\% |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | | Labour hold| 17,377 | 43.9\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | | Labour hold| 16,276 | 40.8\\% | |- | | width=5px; style=\"background:blue\" | | Conservative hold| 16,726 | 42.5\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:blue\" | | Conservative hold| 26,551 | 50.3\\% | 0.7\\% (to LD) |- | | width=5px; style=\"background:blue\" | | Conservative hold| 28,754 | 52.7\\% | 4.7\\% |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:blue\" | | Conservative hold| 27,770 | 54.5\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | | Labour hold| 17,865 | 45.5\\% | |- | | width=5px; style=\"background:red\" | | Labour hold| 17,892 | 42.9\\% | |- | | width=5px; style=\"background:blue\" | | Conservative hold| 23,458 | 48.5\\% | |- | | width=5px; style=\"background:blue\" | | Conservative hold| 25,416 | 51.7\\% | |- | | width=5px; style=\"background:\" | | | | | |- | | width=5px; style=\"background:red\" | | Labour hold| 12,161 | 36.9\\% | 5.7\\% |- | | width=5px; style=\"background:blue\" | | Conservative hold| 23,423 | 48.6\\% | |- | | width=5px; style=\"background:blue\" | | Conservative hold| 26,877 | 52.4\\% | 3.9\\% |- | | width=5px; style=\"background:red\" | | Labour hold| 11,490 | 33.4\\% | |- | | width=5px; style=\"background:red\" | | Labour hold| 17,987 | 44.1\\% | |- | | width=5px; style=\"background:#F9D616\" | | Liberal Democrat hold| 31,843 | 55.7\\% | 2.7\\% |- | | width=5px; style=\"background:red\" | | Labour hold| 11,490 | 33.4\\% | 1.8\\% |- | | width=5px; style=\"background:red\" | | Labour hold| 18,573 | 40.0\\% | 6.0\\% (to CON) |- | | width=5px; style=\"background:blue\" | | Conservative gain from Liberal Democrats | 22,912 | 43\\% | 3.7\\% |- | | width=5px; style=\"background:blue\" | | Conservative hold''' 24,328 47.5\\% 0.1\\% (to LD)", "edit_actions": [{"type": "D", "before": "Argyle and Bute", "after": null, "start_char_pos": 701, "end_char_pos": 716}, {"type": "R", "before": "Barnsley CentralLabour", "after": "Labour", "start_char_pos": 1161, "end_char_pos": 1183}, {"type": "R", "before": "Barnsley EasyLabour", "after": "Labour", "start_char_pos": 1214, "end_char_pos": 1233}, {"type": "R", "before": "Barrow and FurnessLabour", "after": "Labour", "start_char_pos": 1265, "end_char_pos": 1289}, {"type": "R", "before": "Basildon and BillericayConservative", "after": "Conservative", "start_char_pos": 1321, "end_char_pos": 1356}, {"type": "R", "before": "Basildon South and Thurrock EastConservative", "after": "Conservative", "start_char_pos": 1379, "end_char_pos": 1423}, {"type": "R", "before": "BasingstokeConservative", "after": "Conservative", "start_char_pos": 1455, "end_char_pos": 1478}, {"type": "R", "before": "BassrtlawLabour", "after": "Labour", "start_char_pos": 1501, "end_char_pos": 1516}, {"type": "R", "before": "BathLiberal", "after": "Liberal", "start_char_pos": 1548, "end_char_pos": 1559}, {"type": "D", "before": "Batley and Spen", "after": null, "start_char_pos": 1591, "end_char_pos": 1606}, {"type": "D", "before": "Battersea", "after": null, "start_char_pos": 1648, "end_char_pos": 1657}, {"type": "R", "before": "BeaconsfieldConservative", "after": "Conservative", "start_char_pos": 1705, "end_char_pos": 1729}, {"type": "R", "before": "BeckanhamConservative", "after": "Conservative", "start_char_pos": 1752, "end_char_pos": 1773}, {"type": "R", "before": "BedfordConservative", "after": "Conservative", "start_char_pos": 1804, "end_char_pos": 1823}, {"type": "R", "before": "Bedforsdhire MidConservative", "after": "Conservative", "start_char_pos": 1855, "end_char_pos": 1883}, {"type": "R", "before": "Bedfordshire North EastConservative", "after": "Conservative", "start_char_pos": 1906, "end_char_pos": 1941}, {"type": "R", "before": "Bedfordshire South WestConservative", "after": "Conservative", "start_char_pos": 1964, "end_char_pos": 1999}, {"type": "R", "before": "Belfast EastAlliance", "after": "Alliance", "start_char_pos": 2022, "end_char_pos": 2042}, {"type": "R", "before": "Belfast NorthDemocratic", "after": "Democratic", "start_char_pos": 2075, "end_char_pos": 2098}, {"type": "R", "before": "Belfast SouthSDLP", "after": "SDLP", "start_char_pos": 2138, "end_char_pos": 2155}, {"type": "R", "before": "Belfast WestSinn", "after": "Sinn", "start_char_pos": 2178, "end_char_pos": 2194}, {"type": "R", "before": "Bermondsey and Old SouthwarkLiberal", "after": "Liberal", "start_char_pos": 2222, "end_char_pos": 2257}, {"type": "R", "before": "Berwick-Upon-TweedLiberal", "after": "Liberal", "start_char_pos": 2289, "end_char_pos": 2314}, {"type": "R", "before": "Banff and BuchanLiberal", "after": "Liberal", "start_char_pos": 2355, "end_char_pos": 2378}, {"type": "R", "before": "Bethnal Green and BowBanff and BuchanConservative", "after": "Conservative", "start_char_pos": 2419, "end_char_pos": 2468}, {"type": "R", "before": "Bexhill and BattleConservative", "after": "Conservative", "start_char_pos": 2491, "end_char_pos": 2521}, {"type": "D", "before": "Bexleyheath and CrayfordBirkenhead)Birmingham Edgbaston", "after": null, "start_char_pos": 2552, "end_char_pos": 2607}, {"type": "R", "before": "Birmingham ErdingtonBirmingham Hall GreenBirmingham Hodge HillBirmingham LadywoodLabour", "after": "Labour", "start_char_pos": 2649, "end_char_pos": 2736}, {"type": "D", "before": "Birmingham NorthfieldBirmingham Perry BarrBirmingham Selly Oak", "after": null, "start_char_pos": 2759, "end_char_pos": 2821}, {"type": "D", "before": "Birmingham YardleyBishop Auckland", "after": null, "start_char_pos": 2863, "end_char_pos": 2896}, {"type": "R", "before": "BlackburnLabour", "after": "Labour", "start_char_pos": 2938, "end_char_pos": 2953}, {"type": "R", "before": "Blackley and BroughtonBlackpool North and CleveleysConservative", "after": "Conservative", "start_char_pos": 2976, "end_char_pos": 3039}, {"type": "R", "before": "Blackpool SouthLabour", "after": "Labour", "start_char_pos": 3071, "end_char_pos": 3092}, {"type": "R", "before": "Blaenau GwentLabour", "after": "Labour", "start_char_pos": 3122, "end_char_pos": 3141}, {"type": "D", "before": "Blaydon", "after": null, "start_char_pos": 3177, "end_char_pos": 3184}, {"type": "R", "before": "Blyth ValleyBognor Regis and LittlehamptonConservative", "after": "Conservative", "start_char_pos": 3217, "end_char_pos": 3271}, {"type": "R", "before": "BolsoverLabour", "after": "Labour", "start_char_pos": 3294, "end_char_pos": 3308}, {"type": "R", "before": "Bolton North EastLabour", "after": "Labour", "start_char_pos": 3341, "end_char_pos": 3364}, {"type": "R", "before": "Bolton South EastLabour", "after": "Labour", "start_char_pos": 3396, "end_char_pos": 3419}, {"type": "D", "before": "Bolton West", "after": null, "start_char_pos": 3451, "end_char_pos": 3462}, {"type": "R", "before": "BootleBoston and SkegnessConservative", "after": "Conservative", "start_char_pos": 3504, "end_char_pos": 3541}, {"type": "R", "before": "BosworthConservative", "after": "Conservative", "start_char_pos": 3564, "end_char_pos": 3584}, {"type": "R", "before": "Bournemouth EastConservative", "after": "Conservative", "start_char_pos": 3615, "end_char_pos": 3643}, {"type": "D", "before": "Bournemouth West", "after": null, "start_char_pos": 3666, "end_char_pos": 3682}, {"type": "D", "before": "Bracknell", "after": null, "start_char_pos": 3721, "end_char_pos": 3730}, {"type": "D", "before": "Bradford EastBradford SouthBradford WestBraintree", "after": null, "start_char_pos": 3777, "end_char_pos": 3826}, {"type": "R", "before": "Brecon and RadnorshireLiberal", "after": "Liberal", "start_char_pos": 3865, "end_char_pos": 3894}, {"type": "R", "before": "Brent CentralBrent NorthBrentford and IsleworthBrentwood and OngarConservative", "after": "Conservative", "start_char_pos": 3935, "end_char_pos": 4013}, {"type": "R", "before": "BridgendLabour", "after": "Labour", "start_char_pos": 4036, "end_char_pos": 4050}, {"type": "D", "before": "Bridgwater and Somerset West", "after": null, "start_char_pos": 4082, "end_char_pos": 4110}, {"type": "R", "before": "Brigg and GooleConservative", "after": "Conservative", "start_char_pos": 4157, "end_char_pos": 4184}, {"type": "D", "before": "Brighton KemptownBrighton Pavilion", "after": null, "start_char_pos": 4216, "end_char_pos": 4250}, {"type": "R", "before": "Bristol EastLabour", "after": "Labour", "start_char_pos": 4291, "end_char_pos": 4309}, {"type": "R", "before": "Bristol North WestBristol SouthBristol WestLiberal", "after": "Liberal", "start_char_pos": 4341, "end_char_pos": 4391}, {"type": "R", "before": "BroadlandBromley and ChislehurstBromsgroveBroxbourneConservative", "after": "Conservative", "start_char_pos": 4423, "end_char_pos": 4487}, {"type": "R", "before": "BroxtoweConservative", "after": "Conservative", "start_char_pos": 4510, "end_char_pos": 4530}, {"type": "R", "before": "BuckinghamBurnleyLiberal", "after": "Liberal", "start_char_pos": 4562, "end_char_pos": 4586}, {"type": "R", "before": "BurtonConservative", "after": "Conservative", "start_char_pos": 4627, "end_char_pos": 4645}, {"type": "R", "before": "Bury NorthBury SouthBury St EdmundsConservative", "after": "Conservative", "start_char_pos": 4677, "end_char_pos": 4724}, {"type": "R", "before": "CaerphillyLabour", "after": "Labour", "start_char_pos": 4747, "end_char_pos": 4763}, {"type": "R", "before": "Caithness, Sutherland and Easter RossLiberal", "after": "Liberal", "start_char_pos": 4795, "end_char_pos": 4839}, {"type": "D", "before": "Calder ValleyCamberwell and PeckhamCambourne and Redruth", "after": null, "start_char_pos": 4880, "end_char_pos": 4936}, {"type": "D", "before": "Cambridge", "after": null, "start_char_pos": 4981, "end_char_pos": 4990}, {"type": "R", "before": "Cambridgeshire North EastConservative", "after": "Conservative", "start_char_pos": 5042, "end_char_pos": 5079}, {"type": "R", "before": "Cambridgeshire North WestConservative", "after": "Conservative", "start_char_pos": 5102, "end_char_pos": 5139}, {"type": "R", "before": "Cambridgeshire SouthConservative", "after": "Conservative", "start_char_pos": 5163, "end_char_pos": 5195}, {"type": "R", "before": "Cambridgeshire South EastConservative", "after": "Conservative", "start_char_pos": 5226, "end_char_pos": 5263}, {"type": "R", "before": "Cannock ChaseConservative", "after": "Conservative", "start_char_pos": 5294, "end_char_pos": 5319}, {"type": "D", "before": "Canterbury", "after": null, "start_char_pos": 5352, "end_char_pos": 5362}, {"type": "D", "before": "Cardiff CentralCardiff NorthCardiff South and Penarth", "after": null, "start_char_pos": 5406, "end_char_pos": 5459}, {"type": "D", "before": "Cardiff West", "after": null, "start_char_pos": 5501, "end_char_pos": 5513}, {"type": "D", "before": "Carlisle Carmarthen East and Dinefwr", "after": null, "start_char_pos": 5555, "end_char_pos": 5591}, {"type": "D", "before": "Carmarthen West and Pembrokeshire South", "after": null, "start_char_pos": 5638, "end_char_pos": 5677}, {"type": "R", "before": "Carshalton and WallingtonCastle PointCeredigionCharnwoodChatham and AylesfordCheadleChelmsfordChelsea and FulhamCheltenhamChelsham and AmershamChester, City ofChesterfieldChichesterChingford and Woodford GreenChippenhamChipping BarnetChorleyChristchurchCities of London and WestminsterClactonCleethorpesConservative", "after": "Conservative", "start_char_pos": 5725, "end_char_pos": 6040}, {"type": "D", "before": "Clwyd South", "after": null, "start_char_pos": 6072, "end_char_pos": 6083}, {"type": "D", "before": "Clwyd West", "after": null, "start_char_pos": 6122, "end_char_pos": 6132}, {"type": "D", "before": "Coatbridge, Chryson and BellshillColchesterColne ValleyCongleton", "after": null, "start_char_pos": 6171, "end_char_pos": 6235}, {"type": "D", "before": "Copeland", "after": null, "start_char_pos": 6282, "end_char_pos": 6290}, {"type": "D", "before": "Corby", "after": null, "start_char_pos": 6332, "end_char_pos": 6337}, {"type": "D", "before": "Cornwall North", "after": null, "start_char_pos": 6385, "end_char_pos": 6399}, {"type": "D", "before": "Cornwall South East", "after": null, "start_char_pos": 6448, "end_char_pos": 6467}, {"type": "D", "before": "The Cotswolds", "after": null, "start_char_pos": 6512, "end_char_pos": 6525}, {"type": "D", "before": "Coventry North East", "after": null, "start_char_pos": 6564, "end_char_pos": 6583}, {"type": "D", "before": "Coventry North West", "after": null, "start_char_pos": 6625, "end_char_pos": 6644}, {"type": "D", "before": "Coventry South", "after": null, "start_char_pos": 6686, "end_char_pos": 6700}, {"type": "D", "before": "Crawley", "after": null, "start_char_pos": 6742, "end_char_pos": 6749}, {"type": "D", "before": "Crewe and Nantwich", "after": null, "start_char_pos": 6797, "end_char_pos": 6815}, {"type": "D", "before": "Croydon Central", "after": null, "start_char_pos": 6864, "end_char_pos": 6879}, {"type": "D", "before": "Croydon North", "after": null, "start_char_pos": 6938, "end_char_pos": 6951}, {"type": "D", "before": "Croydon South", "after": null, "start_char_pos": 7034, "end_char_pos": 7047}, {"type": "D", "before": "Cumbernauld, Kilsyth and Kirkintilloch East", "after": null, "start_char_pos": 7145, "end_char_pos": 7188}, {"type": "D", "before": "Cynon Valley", "after": null, "start_char_pos": 7271, "end_char_pos": 7283}, {"type": "D", "before": "Dagenham and Rainham", "after": null, "start_char_pos": 7374, "end_char_pos": 7394}, {"type": "D", "before": "Darlington", "after": null, "start_char_pos": 7482, "end_char_pos": 7492}, {"type": "D", "before": "Dartford", "after": null, "start_char_pos": 7581, "end_char_pos": 7589}, {"type": "D", "before": "Daventry", "after": null, "start_char_pos": 7685, "end_char_pos": 7693}, {"type": "D", "before": "Delyn", "after": null, "start_char_pos": 7791, "end_char_pos": 7796}, {"type": "D", "before": "Denton and Reddish", "after": null, "start_char_pos": 7888, "end_char_pos": 7906}, {"type": "D", "before": "Derby North", "after": null, "start_char_pos": 7994, "end_char_pos": 8005}, {"type": "D", "before": "Derby South", "after": null, "start_char_pos": 8097, "end_char_pos": 8108}, {"type": "D", "before": "Derbyshire Dales", "after": null, "start_char_pos": 8196, "end_char_pos": 8212}, {"type": "D", "before": "Derbyshire Mid", "after": null, "start_char_pos": 8302, "end_char_pos": 8316}, {"type": "D", "before": "Derbyshire North East", "after": null, "start_char_pos": 8402, "end_char_pos": 8423}, {"type": "D", "before": "Derbyshire South", "after": null, "start_char_pos": 8511, "end_char_pos": 8527}, {"type": "D", "before": "Devizes", "after": null, "start_char_pos": 8622, "end_char_pos": 8629}, {"type": "D", "before": "Devon Central", "after": null, "start_char_pos": 8677, "end_char_pos": 8690}, {"type": "D", "before": "Devon East", "after": null, "start_char_pos": 8780, "end_char_pos": 8790}, {"type": "D", "before": "Devon North", "after": null, "start_char_pos": 8872, "end_char_pos": 8883}, {"type": "D", "before": "Devon South West", "after": null, "start_char_pos": 8977, "end_char_pos": 8993}, {"type": "D", "before": "Devon West and Torridge", "after": null, "start_char_pos": 9080, "end_char_pos": 9103}, {"type": "D", "before": "Dewsbury", "after": null, "start_char_pos": 9151, "end_char_pos": 9159}, {"type": "D", "before": "Don Valley", "after": null, "start_char_pos": 9207, "end_char_pos": 9217}, {"type": "D", "before": "Doncaster Central", "after": null, "start_char_pos": 9265, "end_char_pos": 9282}, {"type": "D", "before": "Doncaster North", "after": null, "start_char_pos": 9330, "end_char_pos": 9345}, {"type": "D", "before": "Doset Mid and Poole North", "after": null, "start_char_pos": 9393, "end_char_pos": 9418}, {"type": "D", "before": "Dorset North", "after": null, "start_char_pos": 9466, "end_char_pos": 9478}, {"type": "D", "before": "Dorset South", "after": null, "start_char_pos": 9526, "end_char_pos": 9538}, {"type": "D", "before": "Dorset West", "after": null, "start_char_pos": 9634, "end_char_pos": 9645}, {"type": "D", "before": "Dover", "after": null, "start_char_pos": 9727, "end_char_pos": 9732}, {"type": "D", "before": "Down North", "after": null, "start_char_pos": 9780, "end_char_pos": 9790}, {"type": "D", "before": "Down South", "after": null, "start_char_pos": 9879, "end_char_pos": 9889}, {"type": "D", "before": "Dudley North", "after": null, "start_char_pos": 9963, "end_char_pos": 9975}, {"type": "D", "before": "Dudley South", "after": null, "start_char_pos": 10023, "end_char_pos": 10035}, {"type": "D", "before": "Dulwich and West Norwood", "after": null, "start_char_pos": 10083, "end_char_pos": 10107}, {"type": "D", "before": "Dumfries and Galloway", "after": null, "start_char_pos": 10155, "end_char_pos": 10176}, {"type": "D", "before": "Dunfiesshire, Clydesdale and Tweeddale", "after": null, "start_char_pos": 10224, "end_char_pos": 10262}, {"type": "D", "before": "Dunbartonshire East", "after": null, "start_char_pos": 10310, "end_char_pos": 10329}, {"type": "D", "before": "Dunbartonshire West", "after": null, "start_char_pos": 10377, "end_char_pos": 10396}, {"type": "D", "before": "Dundee East", "after": null, "start_char_pos": 10444, "end_char_pos": 10455}, {"type": "D", "before": "Dundee West", "after": null, "start_char_pos": 10503, "end_char_pos": 10514}, {"type": "D", "before": "Dunfermine and Fife West", "after": null, "start_char_pos": 10562, "end_char_pos": 10586}, {"type": "D", "before": "City of Durham", "after": null, "start_char_pos": 10634, "end_char_pos": 10648}, {"type": "D", "before": "Durham North", "after": null, "start_char_pos": 10723, "end_char_pos": 10735}, {"type": "D", "before": "Durham North West", "after": null, "start_char_pos": 10809, "end_char_pos": 10826}, {"type": "D", "before": "Dwyfor Meirionnydd", "after": null, "start_char_pos": 10874, "end_char_pos": 10892}, {"type": "D", "before": "Ealing Central and Acton", "after": null, "start_char_pos": 10940, "end_char_pos": 10964}, {"type": "D", "before": "Ealing North", "after": null, "start_char_pos": 11012, "end_char_pos": 11024}, {"type": "D", "before": "Ealing Southall", "after": null, "start_char_pos": 11072, "end_char_pos": 11087}, {"type": "D", "before": "Easington", "after": null, "start_char_pos": 11135, "end_char_pos": 11144}, {"type": "D", "before": "East Ham", "after": null, "start_char_pos": 11218, "end_char_pos": 11226}, {"type": "D", "before": "East Kilbride, Strathaven and Lesmahagow", "after": null, "start_char_pos": 11274, "end_char_pos": 11314}, {"type": "D", "before": "East Lothian", "after": null, "start_char_pos": 11362, "end_char_pos": 11374}, {"type": "D", "before": "Eastbourne", "after": null, "start_char_pos": 11422, "end_char_pos": 11432}, {"type": "D", "before": "Eastleigh", "after": null, "start_char_pos": 11480, "end_char_pos": 11489}, {"type": "D", "before": "Eddisbury", "after": null, "start_char_pos": 11537, "end_char_pos": 11546}, {"type": "D", "before": "Edinburgh East", "after": null, "start_char_pos": 11594, "end_char_pos": 11608}, {"type": "D", "before": "Edinburgh North and Leith", "after": null, "start_char_pos": 11685, "end_char_pos": 11710}, {"type": "D", "before": "Edinburgh South", "after": null, "start_char_pos": 11758, "end_char_pos": 11773}, {"type": "D", "before": "Edinburgh South West", "after": null, "start_char_pos": 11821, "end_char_pos": 11841}, {"type": "D", "before": "Edinburgh West", "after": null, "start_char_pos": 11918, "end_char_pos": 11932}, {"type": "D", "before": "Edmonton", "after": null, "start_char_pos": 12031, "end_char_pos": 12039}, {"type": "D", "before": "Ellesmere Port and Neston", "after": null, "start_char_pos": 12087, "end_char_pos": 12112}, {"type": "D", "before": "Elmet and Rothwell", "after": null, "start_char_pos": 12160, "end_char_pos": 12178}, {"type": "D", "before": "Eltham", "after": null, "start_char_pos": 12226, "end_char_pos": 12232}, {"type": "D", "before": "Enfield North", "after": null, "start_char_pos": 12280, "end_char_pos": 12293}, {"type": "D", "before": "Enfield Southgate", "after": null, "start_char_pos": 12341, "end_char_pos": 12358}, {"type": "D", "before": "Epping Forest", "after": null, "start_char_pos": 12406, "end_char_pos": 12419}, {"type": "D", "before": "Epsom and Ewell", "after": null, "start_char_pos": 12467, "end_char_pos": 12482}, {"type": "D", "before": "Erewash", "after": null, "start_char_pos": 12530, "end_char_pos": 12537}, {"type": "D", "before": "Erith and Thameshead", "after": null, "start_char_pos": 12585, "end_char_pos": 12605}, {"type": "D", "before": "Esher and Walton", "after": null, "start_char_pos": 12653, "end_char_pos": 12669}, {"type": "D", "before": "Exeter", "after": null, "start_char_pos": 12717, "end_char_pos": 12723}, {"type": "D", "before": "Falkirk", "after": null, "start_char_pos": 12798, "end_char_pos": 12805}, {"type": "D", "before": "Fareham", "after": null, "start_char_pos": 12880, "end_char_pos": 12887}, {"type": "D", "before": "Faversham and Kent Mid", "after": null, "start_char_pos": 12969, "end_char_pos": 12991}, {"type": "D", "before": "Feltham and Heston", "after": null, "start_char_pos": 13039, "end_char_pos": 13057}, {"type": "D", "before": "Fermanagh and South Tyrone", "after": null, "start_char_pos": 13105, "end_char_pos": 13131}, {"type": "D", "before": "Fife North East", "after": null, "start_char_pos": 13210, "end_char_pos": 13225}, {"type": "D", "before": "Filton and Bradley Stoke", "after": null, "start_char_pos": 13273, "end_char_pos": 13297}, {"type": "D", "before": "Finchley and Golders Green", "after": null, "start_char_pos": 13345, "end_char_pos": 13371}, {"type": "D", "before": "Folkestone and Hythe", "after": null, "start_char_pos": 13419, "end_char_pos": 13439}, {"type": "D", "before": "Forest of Dean", "after": null, "start_char_pos": 13487, "end_char_pos": 13501}, {"type": "D", "before": "Foyle", "after": null, "start_char_pos": 13549, "end_char_pos": 13554}, {"type": "D", "before": "Flyde", "after": null, "start_char_pos": 13628, "end_char_pos": 13633}, {"type": "D", "before": "Gainsborough", "after": null, "start_char_pos": 13681, "end_char_pos": 13693}, {"type": "D", "before": "Garston and Halewood", "after": null, "start_char_pos": 13775, "end_char_pos": 13795}, {"type": "D", "before": "Gateshead", "after": null, "start_char_pos": 13870, "end_char_pos": 13879}, {"type": "D", "before": "Gedling", "after": null, "start_char_pos": 13927, "end_char_pos": 13934}, {"type": "D", "before": "Gillingham and Rainham", "after": null, "start_char_pos": 14009, "end_char_pos": 14031}, {"type": "D", "before": "Glasgow Central", "after": null, "start_char_pos": 14079, "end_char_pos": 14094}, {"type": "D", "before": "Glasgow East", "after": null, "start_char_pos": 14142, "end_char_pos": 14154}, {"type": "D", "before": "Glasgow North", "after": null, "start_char_pos": 14229, "end_char_pos": 14242}, {"type": "D", "before": "Glasgow North East", "after": null, "start_char_pos": 14290, "end_char_pos": 14308}, {"type": "D", "before": "Glasgow North West", "after": null, "start_char_pos": 14385, "end_char_pos": 14403}, {"type": "D", "before": "Glasgow South", "after": null, "start_char_pos": 14451, "end_char_pos": 14464}, {"type": "D", "before": "Glasgow South West", "after": null, "start_char_pos": 14512, "end_char_pos": 14530}, {"type": "D", "before": "Glenrothes", "after": null, "start_char_pos": 14578, "end_char_pos": 14588}, {"type": "D", "before": "Gloucester", "after": null, "start_char_pos": 14636, "end_char_pos": 14646}, {"type": "D", "before": "Gordon", "after": null, "start_char_pos": 14694, "end_char_pos": 14700}, {"type": "D", "before": "Gosport", "after": null, "start_char_pos": 14748, "end_char_pos": 14755}, {"type": "D", "before": "Gower", "after": null, "start_char_pos": 14803, "end_char_pos": 14808}, {"type": "D", "before": "Grantham and Stamford", "after": null, "start_char_pos": 14856, "end_char_pos": 14877}, {"type": "D", "before": "Gravesham", "after": null, "start_char_pos": 14925, "end_char_pos": 14934}, {"type": "D", "before": "Great Grimsby", "after": null, "start_char_pos": 15024, "end_char_pos": 15037}, {"type": "D", "before": "Great Yarmouth", "after": null, "start_char_pos": 15126, "end_char_pos": 15140}, {"type": "D", "before": "Greenwich and Woolwich", "after": null, "start_char_pos": 15188, "end_char_pos": 15210}, {"type": "D", "before": "Guildford", "after": null, "start_char_pos": 15258, "end_char_pos": 15267}, {"type": "D", "before": "Hackney North and Stoke Newington", "after": null, "start_char_pos": 15353, "end_char_pos": 15386}, {"type": "D", "before": "Hackney South and Shoreditch", "after": null, "start_char_pos": 15434, "end_char_pos": 15462}, {"type": "D", "before": "Halesowen and Rowley Regis", "after": null, "start_char_pos": 15510, "end_char_pos": 15536}, {"type": "D", "before": "Halifax", "after": null, "start_char_pos": 15584, "end_char_pos": 15591}, {"type": "D", "before": "Haltemprice and Howden", "after": null, "start_char_pos": 15639, "end_char_pos": 15661}, {"type": "D", "before": "Halton", "after": null, "start_char_pos": 15751, "end_char_pos": 15757}, {"type": "D", "before": "Hammersmith", "after": null, "start_char_pos": 15805, "end_char_pos": 15816}, {"type": "D", "before": "Hampshire East", "after": null, "start_char_pos": 15908, "end_char_pos": 15922}, {"type": "D", "before": "Hampshire North East", "after": null, "start_char_pos": 15970, "end_char_pos": 15990}, {"type": "D", "before": "Hampshire North West", "after": null, "start_char_pos": 16038, "end_char_pos": 16058}, {"type": "D", "before": "Hampstead and Kilburn", "after": null, "start_char_pos": 16106, "end_char_pos": 16127}, {"type": "D", "before": "Harborough", "after": null, "start_char_pos": 16175, "end_char_pos": 16185}, {"type": "D", "before": "Harlow", "after": null, "start_char_pos": 16233, "end_char_pos": 16239}, {"type": "D", "before": "Harrogate and Knaresborough", "after": null, "start_char_pos": 16287, "end_char_pos": 16314}, {"type": "D", "before": "Harrow East", "after": null, "start_char_pos": 16362, "end_char_pos": 16373}, {"type": "D", "before": "Harrow West", "after": null, "start_char_pos": 16481, "end_char_pos": 16492}, {"type": "D", "before": "Hartlepool", "after": null, "start_char_pos": 16584, "end_char_pos": 16594}, {"type": "D", "before": "Harwich and Essex North", "after": null, "start_char_pos": 16642, "end_char_pos": 16665}, {"type": "D", "before": "Hastings and Rye", "after": null, "start_char_pos": 16713, "end_char_pos": 16729}, {"type": "D", "before": "Havant", "after": null, "start_char_pos": 16777, "end_char_pos": 16783}, {"type": "D", "before": "Hayes and Harlington", "after": null, "start_char_pos": 16831, "end_char_pos": 16851}, {"type": "D", "before": "Hazel Grove", "after": null, "start_char_pos": 16899, "end_char_pos": 16910}, {"type": "D", "before": "Hemel Hempstead", "after": null, "start_char_pos": 16958, "end_char_pos": 16973}, {"type": "D", "before": "Hemsworth", "after": null, "start_char_pos": 17021, "end_char_pos": 17030}, {"type": "D", "before": "Hendon", "after": null, "start_char_pos": 17078, "end_char_pos": 17084}, {"type": "D", "before": "Henley", "after": null, "start_char_pos": 17132, "end_char_pos": 17138}, {"type": "D", "before": "Hereford and Herefordshire South", "after": null, "start_char_pos": 17186, "end_char_pos": 17218}, {"type": "D", "before": "Herefordshire North", "after": null, "start_char_pos": 17313, "end_char_pos": 17332}, {"type": "D", "before": "Hertford and Stortford", "after": null, "start_char_pos": 17430, "end_char_pos": 17452}, {"type": "D", "before": "Hertfordshire North East", "after": null, "start_char_pos": 17536, "end_char_pos": 17560}, {"type": "D", "before": "Hertfordshire South West", "after": null, "start_char_pos": 17658, "end_char_pos": 17682}, {"type": "D", "before": "Hertsmere", "after": null, "start_char_pos": 17730, "end_char_pos": 17739}, {"type": "D", "before": "Hexham", "after": null, "start_char_pos": 17829, "end_char_pos": 17835}, {"type": "D", "before": "Heywood and Middleton", "after": null, "start_char_pos": 17883, "end_char_pos": 17904}, {"type": "D", "before": "High Peak", "after": null, "start_char_pos": 17952, "end_char_pos": 17961}, {"type": "D", "before": "Hitchin and Harpenden", "after": null, "start_char_pos": 18009, "end_char_pos": 18030}, {"type": "D", "before": "Holborn and St Pancras", "after": null, "start_char_pos": 18078, "end_char_pos": 18100}, {"type": "D", "before": "Hornchurch and Upminster", "after": null, "start_char_pos": 18148, "end_char_pos": 18172}, {"type": "D", "before": "Hornsey and Wood Green", "after": null, "start_char_pos": 18220, "end_char_pos": 18242}, {"type": "D", "before": "Horsham", "after": null, "start_char_pos": 18290, "end_char_pos": 18297}, {"type": "D", "before": "Houghton and Sunderland South", "after": null, "start_char_pos": 18345, "end_char_pos": 18374}, {"type": "D", "before": "Hove", "after": null, "start_char_pos": 18466, "end_char_pos": 18470}, {"type": "D", "before": "Huddersfield", "after": null, "start_char_pos": 18518, "end_char_pos": 18530}, {"type": "D", "before": "Hull East", "after": null, "start_char_pos": 18622, "end_char_pos": 18631}, {"type": "D", "before": "Hull North", "after": null, "start_char_pos": 18679, "end_char_pos": 18689}, {"type": "D", "before": "Hull West and Hessle", "after": null, "start_char_pos": 18781, "end_char_pos": 18801}, {"type": "D", "before": "Huntingdon", "after": null, "start_char_pos": 18849, "end_char_pos": 18859}, {"type": "D", "before": "Hyndburn", "after": null, "start_char_pos": 18907, "end_char_pos": 18915}, {"type": "D", "before": "Ilford North", "after": null, "start_char_pos": 18963, "end_char_pos": 18975}, {"type": "D", "before": "Ilford South", "after": null, "start_char_pos": 19023, "end_char_pos": 19035}, {"type": "D", "before": "Inverclyde", "after": null, "start_char_pos": 19083, "end_char_pos": 19093}, {"type": "D", "before": "Inverness, Nairn, Badenoch and Strathspey", "after": null, "start_char_pos": 19141, "end_char_pos": 19182}, {"type": "D", "before": "Ipswich", "after": null, "start_char_pos": 19230, "end_char_pos": 19237}, {"type": "D", "before": "Isle of Wight", "after": null, "start_char_pos": 19285, "end_char_pos": 19298}, {"type": "D", "before": "Islington North", "after": null, "start_char_pos": 19346, "end_char_pos": 19361}, {"type": "D", "before": "Islington South and Finsbury", "after": null, "start_char_pos": 19438, "end_char_pos": 19466}, {"type": "D", "before": "Islwyn", "after": null, "start_char_pos": 19549, "end_char_pos": 19555}, {"type": "D", "before": "Jarrow", "after": null, "start_char_pos": 19603, "end_char_pos": 19609}, {"type": "D", "before": "Keighley", "after": null, "start_char_pos": 19693, "end_char_pos": 19701}, {"type": "D", "before": "Kenilworth and Southam", "after": null, "start_char_pos": 19749, "end_char_pos": 19771}, {"type": "D", "before": "Kensington", "after": null, "start_char_pos": 19819, "end_char_pos": 19829}, {"type": "D", "before": "Kettering", "after": null, "start_char_pos": 19919, "end_char_pos": 19928}, {"type": "D", "before": "Kilmarnock and Loudoun", "after": null, "start_char_pos": 19976, "end_char_pos": 19998}, {"type": "D", "before": "Kingston and Surbiton", "after": null, "start_char_pos": 20046, "end_char_pos": 20067}, {"type": "D", "before": "Kingswood", "after": null, "start_char_pos": 20115, "end_char_pos": 20124}, {"type": "D", "before": "Kilcaldy and Cowdenbeath", "after": null, "start_char_pos": 20172, "end_char_pos": 20196}, {"type": "D", "before": "Knowsley", "after": null, "start_char_pos": 20244, "end_char_pos": 20252}, {"type": "D", "before": "Lagan Valley", "after": null, "start_char_pos": 20300, "end_char_pos": 20312}, {"type": "D", "before": "Lanark and Hamilton East", "after": null, "start_char_pos": 20400, "end_char_pos": 20424}, {"type": "D", "before": "Lancashire West", "after": null, "start_char_pos": 20472, "end_char_pos": 20487}, {"type": "D", "before": "Lancaster and Fleetwood", "after": null, "start_char_pos": 20535, "end_char_pos": 20558}, {"type": "D", "before": "Leeds Central", "after": null, "start_char_pos": 20606, "end_char_pos": 20619}, {"type": "D", "before": "Leeds East", "after": null, "start_char_pos": 20696, "end_char_pos": 20706}, {"type": "D", "before": "Leeds North East", "after": null, "start_char_pos": 20754, "end_char_pos": 20770}, {"type": "D", "before": "Leeds North West", "after": null, "start_char_pos": 20847, "end_char_pos": 20863}, {"type": "D", "before": "Leeds West", "after": null, "start_char_pos": 20911, "end_char_pos": 20921}, {"type": "D", "before": "Leicester East", "after": null, "start_char_pos": 20998, "end_char_pos": 21012}, {"type": "D", "before": "Leicester South", "after": null, "start_char_pos": 21060, "end_char_pos": 21075}, {"type": "D", "before": "Leicester West", "after": null, "start_char_pos": 21159, "end_char_pos": 21173}, {"type": "D", "before": "Leicestershire North West", "after": null, "start_char_pos": 21221, "end_char_pos": 21246}, {"type": "D", "before": "Leicestershire South", "after": null, "start_char_pos": 21294, "end_char_pos": 21314}, {"type": "D", "before": "Leigh", "after": null, "start_char_pos": 21362, "end_char_pos": 21367}, {"type": "D", "before": "Lewes", "after": null, "start_char_pos": 21444, "end_char_pos": 21449}, {"type": "D", "before": "Lewisham Deptford", "after": null, "start_char_pos": 21497, "end_char_pos": 21514}, {"type": "D", "before": "Lewisham East", "after": null, "start_char_pos": 21562, "end_char_pos": 21575}, {"type": "D", "before": "Lewisham West and Penge", "after": null, "start_char_pos": 21623, "end_char_pos": 21646}, {"type": "D", "before": "Leyton and Wanstead", "after": null, "start_char_pos": 21694, "end_char_pos": 21713}, {"type": "D", "before": "Lichfield", "after": null, "start_char_pos": 21761, "end_char_pos": 21770}, {"type": "D", "before": "Lincoln", "after": null, "start_char_pos": 21818, "end_char_pos": 21825}, {"type": "D", "before": "Linlithgow and Falkirk East", "after": null, "start_char_pos": 21873, "end_char_pos": 21900}, {"type": "D", "before": "Liverpool Riverside", "after": null, "start_char_pos": 21948, "end_char_pos": 21967}, {"type": "D", "before": "Liverpool Walton", "after": null, "start_char_pos": 22044, "end_char_pos": 22060}, {"type": "D", "before": "Liverpool Wavertree", "after": null, "start_char_pos": 22108, "end_char_pos": 22127}, {"type": "D", "before": "Liverpool West Derby", "after": null, "start_char_pos": 22175, "end_char_pos": 22195}, {"type": "D", "before": "Livingston", "after": null, "start_char_pos": 22243, "end_char_pos": 22253}, {"type": "D", "before": "Llanelli", "after": null, "start_char_pos": 22301, "end_char_pos": 22309}, {"type": "D", "before": "Londonderry East", "after": null, "start_char_pos": 22400, "end_char_pos": 22416}, {"type": "D", "before": "Loughborough", "after": null, "start_char_pos": 22464, "end_char_pos": 22476}, {"type": "D", "before": "Louth and Horncastle", "after": null, "start_char_pos": 22524, "end_char_pos": 22544}, {"type": "D", "before": "Ludlow", "after": null, "start_char_pos": 22628, "end_char_pos": 22634}, {"type": "D", "before": "Luton North", "after": null, "start_char_pos": 22682, "end_char_pos": 22693}, {"type": "D", "before": "Luton South", "after": null, "start_char_pos": 22772, "end_char_pos": 22783}, {"type": "D", "before": "Macclesfield", "after": null, "start_char_pos": 22875, "end_char_pos": 22887}, {"type": "D", "before": "Maidenhead", "after": null, "start_char_pos": 22936, "end_char_pos": 22946}, {"type": "D", "before": "Maidstone and the Weald", "after": null, "start_char_pos": 23033, "end_char_pos": 23056}, {"type": "D", "before": "Makerfield", "after": null, "start_char_pos": 23141, "end_char_pos": 23151}, {"type": "D", "before": "Maldon", "after": null, "start_char_pos": 23200, "end_char_pos": 23206}, {"type": "D", "before": "Manchester Central", "after": null, "start_char_pos": 23255, "end_char_pos": 23273}, {"type": "D", "before": "Manchester Gorton", "after": null, "start_char_pos": 23322, "end_char_pos": 23339}, {"type": "D", "before": "Manchester Withington", "after": null, "start_char_pos": 23388, "end_char_pos": 23409}, {"type": "D", "before": "Mansfield", "after": null, "start_char_pos": 23458, "end_char_pos": 23467}, {"type": "D", "before": "Meon Valley", "after": null, "start_char_pos": 23516, "end_char_pos": 23527}, {"type": "D", "before": "Meriden", "after": null, "start_char_pos": 23576, "end_char_pos": 23583}, {"type": "D", "before": "Merthyr Tydfil and Rhymney", "after": null, "start_char_pos": 23632, "end_char_pos": 23658}, {"type": "D", "before": "Middlesbrough", "after": null, "start_char_pos": 23707, "end_char_pos": 23720}, {"type": "D", "before": "Middlesbrough South and Cleveland East", "after": null, "start_char_pos": 23769, "end_char_pos": 23807}, {"type": "D", "before": "Midlothian", "after": null, "start_char_pos": 23885, "end_char_pos": 23895}, {"type": "D", "before": "Milton Keynes North", "after": null, "start_char_pos": 23944, "end_char_pos": 23963}, {"type": "D", "before": "Milton Keynes South", "after": null, "start_char_pos": 24012, "end_char_pos": 24031}, {"type": "D", "before": "Mitcham and Morden", "after": null, "start_char_pos": 24080, "end_char_pos": 24098}, {"type": "D", "before": "Mole Valley", "after": null, "start_char_pos": 24176, "end_char_pos": 24187}, {"type": "D", "before": "Monmouth", "after": null, "start_char_pos": 24278, "end_char_pos": 24286}, {"type": "D", "before": "Montgomeryshire", "after": null, "start_char_pos": 24335, "end_char_pos": 24350}, {"type": "D", "before": "Moray", "after": null, "start_char_pos": 24399, "end_char_pos": 24404}, {"type": "D", "before": "Morecambe and Lunesdale", "after": null, "start_char_pos": 24453, "end_char_pos": 24476}, {"type": "D", "before": "Morley and Outwood", "after": null, "start_char_pos": 24525, "end_char_pos": 24543}, {"type": "D", "before": "Motherwell and Wishaw", "after": null, "start_char_pos": 24592, "end_char_pos": 24613}, {"type": "D", "before": "Na H-Eileanan An Iar", "after": null, "start_char_pos": 24662, "end_char_pos": 24682}, {"type": "D", "before": "Neath", "after": null, "start_char_pos": 24756, "end_char_pos": 24761}, {"type": "D", "before": "New Forest East", "after": null, "start_char_pos": 24810, "end_char_pos": 24825}, {"type": "D", "before": "New Forest West", "after": null, "start_char_pos": 24874, "end_char_pos": 24889}, {"type": "D", "before": "Newark", "after": null, "start_char_pos": 24938, "end_char_pos": 24944}, {"type": "D", "before": "Newbury", "after": null, "start_char_pos": 24993, "end_char_pos": 25000}, {"type": "D", "before": "Newcastle-Under-Lyme", "after": null, "start_char_pos": 25049, "end_char_pos": 25069}, {"type": "D", "before": "Newcastle upon Tyne Central", "after": null, "start_char_pos": 25118, "end_char_pos": 25145}, {"type": "D", "before": "Newcastle upon Tyne East", "after": null, "start_char_pos": 25236, "end_char_pos": 25260}, {"type": "D", "before": "Newcastle upon Tyne North", "after": null, "start_char_pos": 25349, "end_char_pos": 25374}, {"type": "D", "before": "Newport East", "after": null, "start_char_pos": 25463, "end_char_pos": 25475}, {"type": "D", "before": "Newport West", "after": null, "start_char_pos": 25524, "end_char_pos": 25536}, {"type": "D", "before": "Newry and Armagh", "after": null, "start_char_pos": 25585, "end_char_pos": 25601}, {"type": "D", "before": "Newton Abbot", "after": null, "start_char_pos": 25650, "end_char_pos": 25662}, {"type": "D", "before": "Norfolk Mid", "after": null, "start_char_pos": 25759, "end_char_pos": 25770}, {"type": "D", "before": "Norfolk North", "after": null, "start_char_pos": 25819, "end_char_pos": 25832}, {"type": "D", "before": "Norfolk North West", "after": null, "start_char_pos": 25881, "end_char_pos": 25899}, {"type": "D", "before": "Norfolk South", "after": null, "start_char_pos": 25948, "end_char_pos": 25961}, {"type": "D", "before": "Norfolk South West", "after": null, "start_char_pos": 26010, "end_char_pos": 26028}, {"type": "D", "before": "Normanton, Pontefract and Castleford", "after": null, "start_char_pos": 26077, "end_char_pos": 26113}, {"type": "D", "before": "Northampton North", "after": null, "start_char_pos": 26162, "end_char_pos": 26179}, {"type": "D", "before": "Northampton South", "after": null, "start_char_pos": 26228, "end_char_pos": 26245}, {"type": "D", "before": "Northamptonshire South", "after": null, "start_char_pos": 26294, "end_char_pos": 26316}, {"type": "D", "before": "Norwich North", "after": null, "start_char_pos": 26401, "end_char_pos": 26414}, {"type": "D", "before": "Norwich South", "after": null, "start_char_pos": 26463, "end_char_pos": 26476}, {"type": "D", "before": "Nottingham East", "after": null, "start_char_pos": 26525, "end_char_pos": 26540}, {"type": "D", "before": "Nottingham North", "after": null, "start_char_pos": 26589, "end_char_pos": 26605}, {"type": "D", "before": "Nottingham South", "after": null, "start_char_pos": 26654, "end_char_pos": 26670}, {"type": "D", "before": "Nuneaton", "after": null, "start_char_pos": 26719, "end_char_pos": 26727}, {"type": "D", "before": "Ochil and Perthshire South", "after": null, "start_char_pos": 26776, "end_char_pos": 26802}, {"type": "D", "before": "Ogmore", "after": null, "start_char_pos": 26880, "end_char_pos": 26886}, {"type": "D", "before": "Old Bexley and Sidcup", "after": null, "start_char_pos": 26935, "end_char_pos": 26956}, {"type": "D", "before": "Oldham East and Saddleworth", "after": null, "start_char_pos": 27005, "end_char_pos": 27032}, {"type": "D", "before": "Oldham West and Royton", "after": null, "start_char_pos": 27081, "end_char_pos": 27103}, {"type": "D", "before": "Orkney and Shetland", "after": null, "start_char_pos": 27152, "end_char_pos": 27171}, {"type": "D", "before": "Orpington", "after": null, "start_char_pos": 27220, "end_char_pos": 27229}, {"type": "D", "before": "Oxford East", "after": null, "start_char_pos": 27278, "end_char_pos": 27289}, {"type": "D", "before": "Oxford West and Abingdon", "after": null, "start_char_pos": 27338, "end_char_pos": 27362}, {"type": "D", "before": "Paisley and Renfrewshire North", "after": null, "start_char_pos": 27411, "end_char_pos": 27441}, {"type": "D", "before": "Paisley and Renfrewshire South", "after": null, "start_char_pos": 27490, "end_char_pos": 27520}, {"type": "D", "before": "Pendle", "after": null, "start_char_pos": 27569, "end_char_pos": 27575}, {"type": "D", "before": "Penistone and Stocksbridge", "after": null, "start_char_pos": 27624, "end_char_pos": 27650}, {"type": "D", "before": "Penrith and the Border", "after": null, "start_char_pos": 27699, "end_char_pos": 27721}, {"type": "D", "before": "Perth and Perthshire North", "after": null, "start_char_pos": 27770, "end_char_pos": 27796}, {"type": "D", "before": "Peterborough", "after": null, "start_char_pos": 27878, "end_char_pos": 27890}, {"type": "D", "before": "Plymouth Moor View", "after": null, "start_char_pos": 27939, "end_char_pos": 27957}, {"type": "D", "before": "Plymouth Sutton and Devonport", "after": null, "start_char_pos": 28047, "end_char_pos": 28076}, {"type": "D", "before": "Pontypridd", "after": null, "start_char_pos": 28173, "end_char_pos": 28183}, {"type": "D", "before": "Poole", "after": null, "start_char_pos": 28261, "end_char_pos": 28266}, {"type": "D", "before": "Poplar and Limehouse", "after": null, "start_char_pos": 28315, "end_char_pos": 28335}, {"type": "D", "before": "Portsmouth North", "after": null, "start_char_pos": 28384, "end_char_pos": 28400}, {"type": "D", "before": "Portsmouth South", "after": null, "start_char_pos": 28449, "end_char_pos": 28465}, {"type": "D", "before": "Preseli Pembrokeshire", "after": null, "start_char_pos": 28514, "end_char_pos": 28535}, {"type": "D", "before": "Preston", "after": null, "start_char_pos": 28584, "end_char_pos": 28591}, {"type": "D", "before": "Pudsey", "after": null, "start_char_pos": 28640, "end_char_pos": 28646}, {"type": "D", "before": "Putney", "after": null, "start_char_pos": 28695, "end_char_pos": 28701}, {"type": "D", "before": "Rayleigh and Wickford", "after": null, "start_char_pos": 28750, "end_char_pos": 28771}, {"type": "D", "before": "Reading East", "after": null, "start_char_pos": 28820, "end_char_pos": 28832}, {"type": "D", "before": "Reading West", "after": null, "start_char_pos": 28881, "end_char_pos": 28893}, {"type": "D", "before": "Redcar", "after": null, "start_char_pos": 28942, "end_char_pos": 28948}, {"type": "D", "before": "Redditch", "after": null, "start_char_pos": 29055, "end_char_pos": 29063}, {"type": "D", "before": "Reigate", "after": null, "start_char_pos": 29112, "end_char_pos": 29119}, {"type": "D", "before": "Renfrewshire East", "after": null, "start_char_pos": 29168, "end_char_pos": 29185}, {"type": "D", "before": "Rhondda", "after": null, "start_char_pos": 29234, "end_char_pos": 29241}, {"type": "D", "before": "Ribble Valley", "after": null, "start_char_pos": 29290, "end_char_pos": 29303}, {"type": "D", "before": "Richmond Yorks", "after": null, "start_char_pos": 29352, "end_char_pos": 29366}, {"type": "D", "before": "Richmond Park", "after": null, "start_char_pos": 29415, "end_char_pos": 29428}, {"type": "D", "before": "Rochdale", "after": null, "start_char_pos": 29477, "end_char_pos": 29485}, {"type": "D", "before": "Rochester and Strood", "after": null, "start_char_pos": 29534, "end_char_pos": 29554}, {"type": "D", "before": "Rochford and Southend East", "after": null, "start_char_pos": 29639, "end_char_pos": 29665}, {"type": "D", "before": "Romford", "after": null, "start_char_pos": 29714, "end_char_pos": 29721}, {"type": "D", "before": "Romsey and Southampton North", "after": null, "start_char_pos": 29770, "end_char_pos": 29798}, {"type": "D", "before": "Ross, Skye and Lochaber", "after": null, "start_char_pos": 29847, "end_char_pos": 29870}, {"type": "D", "before": "Rossendale and Darwen", "after": null, "start_char_pos": 29919, "end_char_pos": 29940}, {"type": "D", "before": "Rother Valley", "after": null, "start_char_pos": 29989, "end_char_pos": 30002}, {"type": "D", "before": "Rotherham", "after": null, "start_char_pos": 30051, "end_char_pos": 30060}, {"type": "D", "before": "Rugby", "after": null, "start_char_pos": 30109, "end_char_pos": 30114}, {"type": "D", "before": "Ruislip, Northwood and Pinner", "after": null, "start_char_pos": 30163, "end_char_pos": 30192}, {"type": "D", "before": "Runnymede and Weybridge", "after": null, "start_char_pos": 30241, "end_char_pos": 30264}, {"type": "D", "before": "Rushcliffe", "after": null, "start_char_pos": 30313, "end_char_pos": 30323}, {"type": "D", "before": "Rutherglen and Hamilton West", "after": null, "start_char_pos": 30372, "end_char_pos": 30400}, {"type": "D", "before": "Rutland and Melton", "after": null, "start_char_pos": 30449, "end_char_pos": 30467}, {"type": "D", "before": "Saffron Walden", "after": null, "start_char_pos": 30516, "end_char_pos": 30530}, {"type": "D", "before": "St Albans", "after": null, "start_char_pos": 30579, "end_char_pos": 30588}, {"type": "D", "before": "St Austell and Newquay", "after": null, "start_char_pos": 30637, "end_char_pos": 30659}, {"type": "D", "before": "St Helens North", "after": null, "start_char_pos": 30749, "end_char_pos": 30764}, {"type": "D", "before": "St Helens South", "after": null, "start_char_pos": 30842, "end_char_pos": 30857}, {"type": "D", "before": "St Ives", "after": null, "start_char_pos": 30935, "end_char_pos": 30942}, {"type": "D", "before": "Salford and Eccles", "after": null, "start_char_pos": 30991, "end_char_pos": 31009}, {"type": "D", "before": "Salisbury", "after": null, "start_char_pos": 31087, "end_char_pos": 31096}, {"type": "D", "before": "Scarborough and Whitby", "after": null, "start_char_pos": 31145, "end_char_pos": 31167}, {"type": "D", "before": "Scunthorpe", "after": null, "start_char_pos": 31252, "end_char_pos": 31262}, {"type": "D", "before": "Sedgefield", "after": null, "start_char_pos": 31311, "end_char_pos": 31321}, {"type": "D", "before": "Sefton Central", "after": null, "start_char_pos": 31412, "end_char_pos": 31426}, {"type": "D", "before": "Selby and Ainsty", "after": null, "start_char_pos": 31475, "end_char_pos": 31491}, {"type": "D", "before": "Sevenoaks", "after": null, "start_char_pos": 31576, "end_char_pos": 31585}, {"type": "D", "before": "Sheffield Brightside and Hillsborough", "after": null, "start_char_pos": 31634, "end_char_pos": 31671}, {"type": "D", "before": "Sheffield Central", "after": null, "start_char_pos": 31750, "end_char_pos": 31767}, {"type": "D", "before": "Sheffield Hallam", "after": null, "start_char_pos": 31846, "end_char_pos": 31862}, {"type": "D", "before": "Sheffield Heeley", "after": null, "start_char_pos": 31955, "end_char_pos": 31971}, {"type": "D", "before": "Sheffield South East", "after": null, "start_char_pos": 32020, "end_char_pos": 32040}, {"type": "D", "before": "Sherwood", "after": null, "start_char_pos": 32118, "end_char_pos": 32126}, {"type": "D", "before": "Shipley", "after": null, "start_char_pos": 32175, "end_char_pos": 32182}, {"type": "D", "before": "Shrewsbury and Atcham", "after": null, "start_char_pos": 32267, "end_char_pos": 32288}, {"type": "D", "before": "Shropshire North", "after": null, "start_char_pos": 32337, "end_char_pos": 32353}, {"type": "D", "before": "Sittingbourne and Sheppey", "after": null, "start_char_pos": 32438, "end_char_pos": 32463}, {"type": "D", "before": "Skipton and Ripon", "after": null, "start_char_pos": 32512, "end_char_pos": 32529}, {"type": "D", "before": "Sleaford and North Hykeham", "after": null, "start_char_pos": 32578, "end_char_pos": 32604}, {"type": "D", "before": "Slough", "after": null, "start_char_pos": 32689, "end_char_pos": 32695}, {"type": "D", "before": "Solihull", "after": null, "start_char_pos": 32744, "end_char_pos": 32752}, {"type": "D", "before": "Somerset North", "after": null, "start_char_pos": 32859, "end_char_pos": 32873}, {"type": "D", "before": "Somerset North East", "after": null, "start_char_pos": 32922, "end_char_pos": 32941}, {"type": "D", "before": "Somerton and Frome", "after": null, "start_char_pos": 32990, "end_char_pos": 33008}, {"type": "D", "before": "South Holland and the Deepings", "after": null, "start_char_pos": 33098, "end_char_pos": 33128}, {"type": "D", "before": "South Ribble", "after": null, "start_char_pos": 33177, "end_char_pos": 33189}, {"type": "D", "before": "South Shields", "after": null, "start_char_pos": 33238, "end_char_pos": 33251}, {"type": "D", "before": "Southampton Itchen", "after": null, "start_char_pos": 33329, "end_char_pos": 33347}, {"type": "D", "before": "Southampton Test", "after": null, "start_char_pos": 33425, "end_char_pos": 33441}, {"type": "D", "before": "Southampton West", "after": null, "start_char_pos": 33519, "end_char_pos": 33535}, {"type": "D", "before": "Southport", "after": null, "start_char_pos": 33584, "end_char_pos": 33593}, {"type": "D", "before": "Spelthorne", "after": null, "start_char_pos": 33642, "end_char_pos": 33652}, {"type": "D", "before": "Stafford", "after": null, "start_char_pos": 33701, "end_char_pos": 33709}, {"type": "D", "before": "Staffordshire Moorlands", "after": null, "start_char_pos": 33758, "end_char_pos": 33781}, {"type": "D", "before": "Staffordshire South", "after": null, "start_char_pos": 33830, "end_char_pos": 33849}, {"type": "D", "before": "Stalybridge and Hyde", "after": null, "start_char_pos": 33898, "end_char_pos": 33918}, {"type": "D", "before": "Stevenage", "after": null, "start_char_pos": 33967, "end_char_pos": 33976}, {"type": "D", "before": "Stirling", "after": null, "start_char_pos": 34025, "end_char_pos": 34033}, {"type": "D", "before": "Stockport", "after": null, "start_char_pos": 34108, "end_char_pos": 34117}, {"type": "D", "before": "Stockton North", "after": null, "start_char_pos": 34195, "end_char_pos": 34209}, {"type": "D", "before": "Stockton South", "after": null, "start_char_pos": 34258, "end_char_pos": 34272}, {"type": "D", "before": "Stoke-on-Trent Central", "after": null, "start_char_pos": 34321, "end_char_pos": 34343}, {"type": "D", "before": "Stoke-on-Trent North", "after": null, "start_char_pos": 34392, "end_char_pos": 34412}, {"type": "D", "before": "Stoke-on-Trent South", "after": null, "start_char_pos": 34461, "end_char_pos": 34481}, {"type": "D", "before": "Stone", "after": null, "start_char_pos": 34559, "end_char_pos": 34564}, {"type": "D", "before": "Stourbridge", "after": null, "start_char_pos": 34613, "end_char_pos": 34624}, {"type": "D", "before": "Strangford", "after": null, "start_char_pos": 34673, "end_char_pos": 34683}, {"type": "D", "before": "Stratford-on-Avon", "after": null, "start_char_pos": 34732, "end_char_pos": 34749}, {"type": "D", "before": "Streatham", "after": null, "start_char_pos": 34798, "end_char_pos": 34807}, {"type": "D", "before": "Stretford and Urmston", "after": null, "start_char_pos": 34856, "end_char_pos": 34877}, {"type": "D", "before": "Stroud", "after": null, "start_char_pos": 34926, "end_char_pos": 34932}, {"type": "D", "before": "suffolk Central and Ipswitch North", "after": null, "start_char_pos": 34981, "end_char_pos": 35015}, {"type": "D", "before": "Suffolk Coastal", "after": null, "start_char_pos": 35064, "end_char_pos": 35079}, {"type": "D", "before": "Suffolk South", "after": null, "start_char_pos": 35128, "end_char_pos": 35141}, {"type": "D", "before": "Suffolk West", "after": null, "start_char_pos": 35190, "end_char_pos": 35202}, {"type": "D", "before": "Sunderland Central", "after": null, "start_char_pos": 35251, "end_char_pos": 35269}, {"type": "D", "before": "Surrey East (UK Parliament constituency)", "after": null, "start_char_pos": 35354, "end_char_pos": 35394}, {"type": "D", "before": "Surrey Heath", "after": null, "start_char_pos": 35493, "end_char_pos": 35505}, {"type": "D", "before": "Surrey South West", "after": null, "start_char_pos": 35596, "end_char_pos": 35613}, {"type": "D", "before": "Sussex Mid", "after": null, "start_char_pos": 35704, "end_char_pos": 35714}, {"type": "D", "before": "Sutton and Cheam", "after": null, "start_char_pos": 35801, "end_char_pos": 35817}, {"type": "D", "before": "Sutton Coldfield", "after": null, "start_char_pos": 35866, "end_char_pos": 35882}, {"type": "D", "before": "Swansea East", "after": null, "start_char_pos": 35931, "end_char_pos": 35943}, {"type": "D", "before": "Swansea West", "after": null, "start_char_pos": 35992, "end_char_pos": 36004}, {"type": "D", "before": "Swindon North", "after": null, "start_char_pos": 36053, "end_char_pos": 36066}, {"type": "D", "before": "Swindon South", "after": null, "start_char_pos": 36115, "end_char_pos": 36128}, {"type": "D", "before": "Tamworth", "after": null, "start_char_pos": 36177, "end_char_pos": 36185}, {"type": "D", "before": "Tatton", "after": null, "start_char_pos": 36234, "end_char_pos": 36240}, {"type": "D", "before": "Taunton Deane", "after": null, "start_char_pos": 36289, "end_char_pos": 36302}, {"type": "D", "before": "Telford", "after": null, "start_char_pos": 36392, "end_char_pos": 36399}, {"type": "D", "before": "Tewkesbury", "after": null, "start_char_pos": 36448, "end_char_pos": 36458}, {"type": "D", "before": "Thanet North", "after": null, "start_char_pos": 36543, "end_char_pos": 36555}, {"type": "D", "before": "Thanet South", "after": null, "start_char_pos": 36604, "end_char_pos": 36616}, {"type": "D", "before": "Thirsk and Malton", "after": null, "start_char_pos": 36665, "end_char_pos": 36682}, {"type": "D", "before": "Thornbury and Yate", "after": null, "start_char_pos": 36759, "end_char_pos": 36777}, {"type": "D", "before": "Thurrock", "after": null, "start_char_pos": 36826, "end_char_pos": 36834}, {"type": "D", "before": "Tiverton and Honiton", "after": null, "start_char_pos": 36883, "end_char_pos": 36903}, {"type": "D", "before": "Tonbridge and Malling", "after": null, "start_char_pos": 36988, "end_char_pos": 37009}, {"type": "D", "before": "Tooting", "after": null, "start_char_pos": 37058, "end_char_pos": 37065}, {"type": "D", "before": "Torbay", "after": null, "start_char_pos": 37114, "end_char_pos": 37120}, {"type": "D", "before": "Torfaen", "after": null, "start_char_pos": 37210, "end_char_pos": 37217}, {"type": "D", "before": "Totnes", "after": null, "start_char_pos": 37266, "end_char_pos": 37272}, {"type": "D", "before": "Tottenham", "after": null, "start_char_pos": 37354, "end_char_pos": 37363}, {"type": "D", "before": "Truro and Falmouth", "after": null, "start_char_pos": 37412, "end_char_pos": 37430}, {"type": "D", "before": "Tunbridge Wells", "after": null, "start_char_pos": 37522, "end_char_pos": 37537}, {"type": "D", "before": "Twickenham", "after": null, "start_char_pos": 37586, "end_char_pos": 37596}, {"type": "D", "before": "Tynemouth", "after": null, "start_char_pos": 37645, "end_char_pos": 37654}, {"type": "D", "before": "Tyneside North", "after": null, "start_char_pos": 37703, "end_char_pos": 37717}, {"type": "D", "before": "Tyrone West", "after": null, "start_char_pos": 37766, "end_char_pos": 37777}, {"type": "D", "before": "Ulster Mid", "after": null, "start_char_pos": 37855, "end_char_pos": 37865}, {"type": "D", "before": "Upper Bann", "after": null, "start_char_pos": 37914, "end_char_pos": 37924}, {"type": "D", "before": "Uxbridge and Ruiislip South", "after": null, "start_char_pos": 38012, "end_char_pos": 38039}, {"type": "D", "before": "Vale of Clwyd", "after": null, "start_char_pos": 38088, "end_char_pos": 38101}, {"type": "D", "before": "Vale of Glamorgan", "after": null, "start_char_pos": 38176, "end_char_pos": 38193}, {"type": "D", "before": "Vauxhall", "after": null, "start_char_pos": 38242, "end_char_pos": 38250}, {"type": "D", "before": "Wakefield", "after": null, "start_char_pos": 38299, "end_char_pos": 38308}, {"type": "D", "before": "Wallasey", "after": null, "start_char_pos": 38357, "end_char_pos": 38365}, {"type": "D", "before": "Walsall North", "after": null, "start_char_pos": 38414, "end_char_pos": 38427}, {"type": "D", "before": "Walsall South", "after": null, "start_char_pos": 38505, "end_char_pos": 38518}, {"type": "D", "before": "Walthamstow", "after": null, "start_char_pos": 38596, "end_char_pos": 38607}, {"type": "D", "before": "Wansbeck", "after": null, "start_char_pos": 38656, "end_char_pos": 38664}, {"type": "D", "before": "Wantage", "after": null, "start_char_pos": 38713, "end_char_pos": 38720}, {"type": "D", "before": "Warley", "after": null, "start_char_pos": 38769, "end_char_pos": 38775}, {"type": "D", "before": "Warrington North", "after": null, "start_char_pos": 38852, "end_char_pos": 38868}, {"type": "D", "before": "Warrington South", "after": null, "start_char_pos": 38917, "end_char_pos": 38933}, {"type": "D", "before": "Warwick and Leamington", "after": null, "start_char_pos": 38982, "end_char_pos": 39004}, {"type": "D", "before": "Warwickshire North", "after": null, "start_char_pos": 39053, "end_char_pos": 39071}, {"type": "D", "before": "Washington and Sunderland West", "after": null, "start_char_pos": 39120, "end_char_pos": 39150}, {"type": "D", "before": "Watford", "after": null, "start_char_pos": 39233, "end_char_pos": 39240}, {"type": "D", "before": "Waveney", "after": null, "start_char_pos": 39289, "end_char_pos": 39296}, {"type": "D", "before": "Wealden", "after": null, "start_char_pos": 39345, "end_char_pos": 39352}, {"type": "D", "before": "Weaver Vale", "after": null, "start_char_pos": 39436, "end_char_pos": 39447}, {"type": "D", "before": "Wellingborough", "after": null, "start_char_pos": 39496, "end_char_pos": 39510}, {"type": "D", "before": "Wells", "after": null, "start_char_pos": 39594, "end_char_pos": 39599}, {"type": "D", "before": "Welwyn Hatfield", "after": null, "start_char_pos": 39703, "end_char_pos": 39718}, {"type": "D", "before": "Wentworth and Dearne", "after": null, "start_char_pos": 39767, "end_char_pos": 39787}, {"type": "D", "before": "West Bromwich East", "after": null, "start_char_pos": 39836, "end_char_pos": 39854}, {"type": "D", "before": "West Bromwich West", "after": null, "start_char_pos": 39903, "end_char_pos": 39921}, {"type": "D", "before": "West Ham", "after": null, "start_char_pos": 39970, "end_char_pos": 39978}, {"type": "D", "before": "Westminster North", "after": null, "start_char_pos": 40027, "end_char_pos": 40044}, {"type": "D", "before": "Westmorland and Lonsdale", "after": null, "start_char_pos": 40121, "end_char_pos": 40145}, {"type": "D", "before": "Weston Super-Mare", "after": null, "start_char_pos": 40194, "end_char_pos": 40211}, {"type": "D", "before": "Wigan", "after": null, "start_char_pos": 40260, "end_char_pos": 40265}, {"type": "D", "before": "Wiltshire North", "after": null, "start_char_pos": 40314, "end_char_pos": 40329}, {"type": "D", "before": "Wiltshire South West", "after": null, "start_char_pos": 40378, "end_char_pos": 40398}, {"type": "D", "before": "Wimbledon", "after": null, "start_char_pos": 40447, "end_char_pos": 40456}, {"type": "D", "before": "Winchester", "after": null, "start_char_pos": 40505, "end_char_pos": 40515}, {"type": "D", "before": "Windsor", "after": null, "start_char_pos": 40564, "end_char_pos": 40571}, {"type": "D", "before": "Wirral South", "after": null, "start_char_pos": 40620, "end_char_pos": 40632}, {"type": "D", "before": "Wirral West", "after": null, "start_char_pos": 40709, "end_char_pos": 40720}, {"type": "D", "before": "Witham", "after": null, "start_char_pos": 40804, "end_char_pos": 40810}, {"type": "D", "before": "Witney", "after": null, "start_char_pos": 40859, "end_char_pos": 40865}, {"type": "D", "before": "Woking", "after": null, "start_char_pos": 40914, "end_char_pos": 40920}, {"type": "D", "before": "Wokingham", "after": null, "start_char_pos": 41018, "end_char_pos": 41027}, {"type": "D", "before": "Wolverhampton North East", "after": null, "start_char_pos": 41117, "end_char_pos": 41141}, {"type": "D", "before": "Wolverhampton South East", "after": null, "start_char_pos": 41190, "end_char_pos": 41214}, {"type": "D", "before": "Wolverhampton South West", "after": null, "start_char_pos": 41263, "end_char_pos": 41287}, {"type": "D", "before": "Worcester", "after": null, "start_char_pos": 41336, "end_char_pos": 41345}, {"type": "D", "before": "Worcestershire Mid", "after": null, "start_char_pos": 41394, "end_char_pos": 41412}, {"type": "D", "before": "Worcestershire West", "after": null, "start_char_pos": 41496, "end_char_pos": 41515}, {"type": "D", "before": "Workington", "after": null, "start_char_pos": 41564, "end_char_pos": 41574}, {"type": "D", "before": "Worsley and Eccles South", "after": null, "start_char_pos": 41651, "end_char_pos": 41675}, {"type": "D", "before": "Worthing East and Shoreham", "after": null, "start_char_pos": 41752, "end_char_pos": 41778}, {"type": "D", "before": "Worthing West", "after": null, "start_char_pos": 41862, "end_char_pos": 41875}, {"type": "D", "before": "The Wreckin", "after": null, "start_char_pos": 41959, "end_char_pos": 41970}, {"type": "D", "before": "Wrexham", "after": null, "start_char_pos": 42019, "end_char_pos": 42026}, {"type": "D", "before": "Wycombe", "after": null, "start_char_pos": 42109, "end_char_pos": 42116}, {"type": "D", "before": "Wyre and Preston North", "after": null, "start_char_pos": 42200, "end_char_pos": 42222}, {"type": "D", "before": "Wyre Forest", "after": null, "start_char_pos": 42312, "end_char_pos": 42323}, {"type": "D", "before": "Wythenshawe and Sale East", "after": null, "start_char_pos": 42400, "end_char_pos": 42425}, {"type": "D", "before": "Yeovil", "after": null, "start_char_pos": 42502, "end_char_pos": 42508}, {"type": "D", "before": "Ynys Mon", "after": null, "start_char_pos": 42605, "end_char_pos": 42613}, {"type": "D", "before": "York Central", "after": null, "start_char_pos": 42696, "end_char_pos": 42708}, {"type": "D", "before": "York Outer", "after": null, "start_char_pos": 42800, "end_char_pos": 42810}, {"type": "D", "before": "Yorkshire East", "after": null, "start_char_pos": 42922, "end_char_pos": 42936}], "sents_char_pos": [0, 255, 601, 945, 1114, 1213, 1264, 1320, 1547, 1647, 2065, 2137, 2354, 2418, 2551, 2648, 2862, 2937, 3121, 3340, 3395, 3450, 3503, 3614, 3776, 3934, 4081, 4156, 4340, 4794, 4966, 5159, 5342, 5405, 5500, 5554, 5637, 6121, 6281, 6331, 6447, 6624, 6964, 7060, 7201, 7296, 7407, 7457, 7505, 7602, 7706, 7809, 7919, 8018, 8121, 8171, 8225, 8329, 8386, 8436, 8540, 8606, 8642, 8703, 8803, 8853, 8896, 8961, 9006, 9116, 9172, 9230, 9295, 9358, 9431, 9491, 9551, 9618, 9658, 9716, 9745, 9803, 9868, 9902, 9988, 10048, 10120, 10189, 10275, 10342, 10409, 10468, 10527, 10599, 10661, 10712, 10748, 10839, 10905, 10977, 11037, 11100, 11157, 11239, 11327, 11387, 11445, 11502, 11559, 11621, 11723, 11786, 11854, 11945, 12052, 12125, 12191, 12245, 12306, 12371, 12432, 12495, 12550, 12618, 12682, 12736, 12818, 12869, 12900, 12958, 13004, 13070, 13144, 13199, 13238, 13310, 13384, 13452, 13514, 13567, 13646, 13706, 13764, 13808, 13892, 13947, 14044, 14107, 14167, 14255, 14321, 14416, 14477, 14543, 14601, 14659, 14713, 14768, 14821, 14890, 14947, 15050, 15100, 15153, 15223, 15280, 15337, 15399, 15475, 15549, 15604, 15674, 15770, 15829, 15935, 16003, 16071, 16140, 16198, 16252, 16327, 16386, 16505, 16607, 16678, 16742, 16796, 16864, 16923, 16986, 17043, 17097, 17151, 17231, 17297, 17345, 17465, 17573, 17695, 17752, 17848, 17917, 17974, 18043, 18113, 18185, 18255, 18310, 18387, 18483, 18543, 18644, 18702, 18814, 18872, 18928, 18988, 19048, 19106, 19195, 19250, 19311, 19374, 19479, 19568, 19622, 19714, 19784, 19842, 19941, 20011, 20080, 20137, 20209, 20265, 20325, 20437, 20500, 20571, 20632, 20719, 20783, 20876, 20934, 21025, 21088, 21186, 21259, 21327, 21380, 21462, 21527, 21588, 21659, 21726, 21783, 21838, 21913, 21980, 22073, 22140, 22208, 22266, 22322, 22429, 22489, 22557, 22647, 22706, 22756, 22796, 22900, 22959, 23017, 23069, 23164, 23219, 23286, 23352, 23422, 23480, 23540, 23596, 23671, 23733, 23820, 23908, 23976, 24044, 24111, 24200, 24299, 24363, 24417, 24489, 24556, 24626, 24695, 24774, 24838, 24902, 24957, 25013, 25082, 25158, 25273, 25387, 25488, 25549, 25614, 25675, 25783, 25845, 25912, 25974, 26041, 26126, 26192, 26258, 26329, 26427, 26489, 26553, 26618, 26683, 26740, 26815, 26899, 26969, 27045, 27116, 27184, 27242, 27302, 27375, 27454, 27533, 27588, 27663, 27734, 27809, 27903, 27970, 28022, 28089, 28157, 28196, 28279, 28348, 28413, 28478, 28548, 28604, 28659, 28714, 28784, 28845, 28906, 28961, 29076, 29132, 29198, 29254, 29316, 29379, 29441, 29498, 29567, 29678, 29734, 29811, 29883, 29953, 30015, 30073, 30127, 30205, 30277, 30336, 30413, 30480, 30543, 30601, 30672, 30777, 30870, 30955, 31022, 31109, 31180, 31275, 31334, 31386, 31439, 31504, 31598, 31684, 31780, 31875, 31984, 32053, 32139, 32195, 32301, 32366, 32476, 32542, 32617, 32708, 32765, 32886, 32954, 33021, 33087, 33141, 33202, 33264, 33360, 33454, 33548, 33606, 33665, 33722, 33794, 33862, 33931, 33989, 34046, 34130, 34222, 34285, 34356, 34425, 34494, 34577, 34637, 34696, 34762, 34820, 34890, 34945, 35028, 35092, 35154, 35215, 35282, 35343, 35407, 35518, 35626, 35727, 35830, 35895, 35956, 36017, 36079, 36141, 36198, 36253, 36315, 36381, 36412, 36471, 36568, 36629, 36695, 36790, 36847, 36916, 37022, 37078, 37133, 37230, 37285, 37376, 37443, 37550, 37609, 37667, 37730, 37790, 37878, 37937, 38052, 38114, 38165, 38206, 38263, 38321, 38378, 38440, 38531, 38620, 38677, 38733, 38788, 38881, 38946, 39017, 39084, 39163, 39253, 39309, 39365, 39460, 39523, 39612, 39731, 39800, 39867, 39934, 39991, 40057, 40158, 40224, 40278, 40342, 40411, 40469, 40528, 40584, 40645, 40733, 40823, 40878, 40933, 41040, 41154, 41227, 41300, 41358, 41425, 41528, 41587, 41688, 41791, 41888, 41983, 42039, 42129, 42235, 42336, 42438, 42521, 42626, 42721, 42823, 42949]}
+{"doc_id": "181719", "revision_depth": "1", "before_revision": "Dallas Braden. Dallas Braden , a left-handed pitcher for Major League Baseball's Oakland Athletics in the United States , became one of only nineteen players in the history of the MLB to pitch a perfect game , in a 4-0 win against the Tampa Bay Rays . Braden, aged 26, who retired all 27 batters consecutively on 109 pitches, also earned his first career complete game . In the process of throwing the perfect game, Braden also struck out six Tampa Bay hitters. The perfect game was the second pitched in the Athletics' franchise history, the other being thrown by Hall of Fame pitcher Catfish Hunter on May 8, 1968 against the Minnesota Twins . Braden, at 26, also became the youngest pitcher to throw a complete game since Anaheim Angels pitcher Mike Witt did so at age 24 in 1984. The low crowd at the Oakland Coliseum , at only 12,228, was due to the Mother's Day holiday occurring across the United States, Braden, along with every other Major League Baseball player, donned pink equipment for awareness of breast cancer, which has become a tradition for baseball players on Mother's Day. Braden's own mother died of skin cancer when he was a senior in high school, but his grandmother attended the game. Braden recently drew controversy in the league after publicly criticizing New York Yankees all-star third baseman Alex Rodriguez for crossing the pitcher's mound after a foul ball, which Braden claimed to be an \"unwritten rule\" in baseball. When asked about the no hitter, Rodriguez simply responded, \"Good for him, he threw a perfect game. And even better, he beat the Rays,\" he said, as the Rays lead the American League East division, the same division that Yankees play in. \"Mother's Day hasn't been a joyous day for me in a while. But to know that I still get to come out and compete and play a game on that day, that makes it a little better. With my grandma in the stands, that makes it a lot better. To be able to give her this today was perfect...,\" said Braden in a post-game interview with MLB.com .", "after_revision": "Dallas Braden. , a left-handed pitcher for 's in the , became one of only nineteen players in the history of the MLB to pitch a , in a 4-0 win against the . Braden, aged 26, who retired all 27 batters consecutively on 109 pitches, also earned his first career . In the process of throwing the perfect game, Braden also six Tampa Bay hitters. The perfect game was the second pitched in the Athletics' franchise history, the other being thrown by pitcher on May 8, 1968 against the . Braden, at 26, also became the youngest pitcher to throw a complete game since pitcher did so at age 24 in 1984. The low crowd at the , at only 12,228, was due to the holiday occurring across the United States, Braden, along with every other Major League Baseball player, donned pink equipment for awareness of breast cancer, which has become a tradition for baseball players on Mother's Day. Braden's own mother died of skin cancer when he was a senior in high school, but his grandmother attended the game. Braden recently drew controversy in the league after publicly criticizing all-star third baseman for crossing the pitcher's mound after a foul ball, which Braden claimed to be an \"unwritten rule\" in baseball. When asked about the no hitter, Rodriguez simply responded, \"Good for him, he threw a perfect game. And even better, he beat the Rays,\" he said, as the Rays lead the American League East division, the same division that Yankees play in. \"Mother's Day hasn't been a joyous day for me in a while. But to know that I still get to come out and compete and play a game on that day, that makes it a little better. With my grandma in the stands, that makes it a lot better. To be able to give her this today was perfect...,\" said Braden in a post-game interview with .", "edit_actions": [{"type": "D", "before": "Dallas Braden", "after": null, "start_char_pos": 15, "end_char_pos": 28}, {"type": "R", "before": "Major League Baseball's Oakland Athletics in the United States", "after": "'s in the", "start_char_pos": 57, "end_char_pos": 119}, {"type": "D", "before": "perfect game", "after": null, "start_char_pos": 195, "end_char_pos": 207}, {"type": "D", "before": "Tampa Bay Rays", "after": null, "start_char_pos": 235, "end_char_pos": 249}, {"type": "D", "before": "complete game", "after": null, "start_char_pos": 355, "end_char_pos": 368}, {"type": "D", "before": "struck out", "after": null, "start_char_pos": 428, "end_char_pos": 438}, {"type": "R", "before": "Hall of Fame pitcher Catfish Hunter", "after": "pitcher", "start_char_pos": 565, "end_char_pos": 600}, {"type": "D", "before": "Minnesota Twins", "after": null, "start_char_pos": 628, "end_char_pos": 643}, {"type": "R", "before": "Anaheim Angels pitcher Mike Witt", "after": "pitcher", "start_char_pos": 725, "end_char_pos": 757}, {"type": "D", "before": "Oakland Coliseum", "after": null, "start_char_pos": 805, "end_char_pos": 821}, {"type": "D", "before": "Mother's Day", "after": null, "start_char_pos": 855, "end_char_pos": 867}, {"type": "D", "before": "New York Yankees", "after": null, "start_char_pos": 1284, "end_char_pos": 1300}, {"type": "D", "before": "Alex Rodriguez", "after": null, "start_char_pos": 1324, "end_char_pos": 1338}, {"type": "D", "before": "MLB.com", "after": null, "start_char_pos": 2011, "end_char_pos": 2018}], "sents_char_pos": [0, 14, 370, 461, 783, 1093, 1209, 1450, 1550, 1687, 1745, 1858, 1917, 1966]}
+{"doc_id": "1842580", "revision_depth": "1", "before_revision": "At least twelve people have been killed today in a shooting at the offices of the satirical weekly magazine . Three men in hoods armed with entered the magazine's office in the and shot dead ten journalists and two police officers before making a getaway in a car driven by a fourth collaborator. Five people have been seriously injured in the attack. A member of the police said after leaving the scene the attackers drove to the northeastern suburbs of Paris where they abandoned their vehicle and hijacked another car. French police union Unit\u00e9 spokesman Rocco Contento said of the crime scene, \"it was a real butchery\". The French Government have raised the country's security level to the maximum. President told reporters: \"This is a terrorist attack, there is no doubt about it\". Gerard Biard, the editor-in-chief of Charlie Hebdo, stated: \"I don't understand how people can attack a newspaper with heavy weapons. A newspaper is not a weapon of war.\" The magazine recently posted a cartoon on depicting , a leader of the militant group. US President gave a statement condemning the attack: \"France is America \u2019 s oldest ally, and has stood shoulder to shoulder with the United States in the fight against terrorists who threaten our shared security and the world. Time and again, the French people have stood up for the universal values that generations of our people have defended.\" Obama also said that the US would provide assistance \"to help bring these terrorists to justice\". British Prime Minister tweeted: \"The murders in Paris are sickening. We stand with the French people in the fight against terror and defending the freedom of the press.\" The and the -based have also condemned the attack. In 2006, Charlie Hebdo ran the cartoons depicting that originally appeared in the newspaper . In 2011, it published another cartoon depiction of Muhammed subtitled \"Charia Hebdo\", a pun on . The magazine's office was subsequently firebombed. Following the bombing, the magazine's website was hacked and death threats were made against their staff. The magazine responded by publishing on their front page an image showing both the remains of the magazine's offices and one of their cartoonists kissing a bearded Muslim man. The cover contained the headline .", "after_revision": "At least twelve people have been killed today in a shooting at the Paris offices of the satirical weekly French magazine Charlie Hebdo . Three men in hoods armed with entered the magazine's office in the and shot dead ten journalists and two police officers before making a getaway in a car driven by a fourth collaborator. Five people have been seriously injured in the attack. A member of the police said after leaving the scene the attackers drove to the northeastern suburbs of Paris where they abandoned their vehicle and hijacked another car. French police union Unit\u00e9 spokesman Rocco Contento said of the crime scene, \"it was a real butchery\". The French Government have raised the country's security level to the maximum. President Fran\u00e7ois Hollande told reporters: \"This is a terrorist attack, there is no doubt about it\". G\u00e9rard Biard, the editor-in-chief of Charlie Hebdo, stated: \"I don't understand how people can attack a newspaper with heavy weapons. A newspaper is not a weapon of war.\" The magazine recently posted a cartoon on Twitter depicting , a leader of the Islamic State militant group. US President Barack Obama gave a statement condemning the attack: \"France is America ' s oldest ally, and has stood shoulder to shoulder with the United States in the fight against terrorists who threaten our shared security and the world. Time and again, the French people have stood up for the universal values that generations of our people have defended.\" Obama also said that the US would provide assistance \"to help bring these terrorists to justice\". British Prime Minister David Cameron tweeted: \"The murders in Paris are sickening. We stand with the French people in the fight against terror and defending the freedom of the press.\" The Arab League and the Cairo-based have also condemned the attack. In 2006, Charlie Hebdo ran the cartoons depicting Muhammad that originally appeared in the Danish newspaper Jyllands-Posten . In 2011, it published another cartoon depiction of Muhammed subtitled \"Charia Hebdo\", a pun on sharia . The magazine's office was subsequently firebombed. Following the bombing, the magazine's website was hacked and death threats were made against their staff. The magazine responded by publishing on their front page an image showing both the remains of the magazine's offices and one of their cartoonists kissing a bearded Muslim man. The cover contained the headline .", "edit_actions": [{"type": "A", "before": null, "after": "Paris", "start_char_pos": 67, "end_char_pos": 67}, {"type": "R", "before": "magazine", "after": "French magazine Charlie Hebdo", "start_char_pos": 100, "end_char_pos": 108}, {"type": "A", "before": null, "after": "Fran\u00e7ois Hollande", "start_char_pos": 714, "end_char_pos": 714}, {"type": "R", "before": "Gerard", "after": "G\u00e9rard", "start_char_pos": 789, "end_char_pos": 795}, {"type": "A", "before": null, "after": "Twitter", "start_char_pos": 1002, "end_char_pos": 1002}, {"type": "A", "before": null, "after": "Islamic State", "start_char_pos": 1031, "end_char_pos": 1031}, {"type": "A", "before": null, "after": "Barack Obama", "start_char_pos": 1061, "end_char_pos": 1061}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1121, "end_char_pos": 1122}, {"type": "A", "before": null, "after": "David Cameron", "start_char_pos": 1517, "end_char_pos": 1517}, {"type": "R", "before": "and the -based", "after": "Arab League and the Cairo-based", "start_char_pos": 1669, "end_char_pos": 1683}, {"type": "A", "before": null, "after": "Muhammad", "start_char_pos": 1766, "end_char_pos": 1766}, {"type": "R", "before": "newspaper", "after": "Danish newspaper Jyllands-Posten", "start_char_pos": 1799, "end_char_pos": 1808}, {"type": "A", "before": null, "after": "sharia", "start_char_pos": 1906, "end_char_pos": 1906}], "sents_char_pos": [0, 110, 297, 352, 522, 624, 703, 788, 922, 959, 1047, 1275, 1395, 1493, 1563, 1664, 1715, 1810, 1908, 1959, 2065, 2241]}
+{"doc_id": "18527", "revision_depth": "1", "before_revision": "In a nationally broadcast radio sermon by former Iranian president Akbar Hashemi Rafsanjani on Friday, he said of the U. N. watchdog group adopting the resolution for Iran to stop nuclear enrichment activities, \"The decision was a cruel one.\" The Thurday adoption in Vienna by the governing board of the International Atomic Energy Agency (IAEA) , was unanimous and legally non-binding in asking Iran to suspend all nuclear fuel related activities. The board also requested a report from the agency's chief, Mohamed ElBaradei, on its compliance by Tehran. On Thursday, an Iranian member of their nuclear negotiating team, Sirous Nasseri, read in London a statement made by his republic at the emergency governing board meeting of the IAEA regarding the Nuclear proliferation treaty (NPT):How can this body be called to react to an act, which is in full conformity with the NPT and the safeguards and constitutes a limited manifestation of the exercise of an inalienable right? A right, which by its own simple meaning, cannot be alienated from anyone. International concern over the Iranian nuclear enrichment program was led by the European Union countries of France, Great Britain and Germany (EU-3), along with the United States. The pressure brought by these nations succeeded in obtaining language calling for the re-instatement of seals that were removed at the Uranium Conversion Facility in Isfahan . The seals were removed during the recent installation of surveillance cameras by IAEA. The agency is to monitor Tehran for compliance to halt uranium enrichment. After a September 3 deadline, Iran again faces a possible referral to the U.N. Security Council where it could be subject to economic sanctions. Meanwhile, the United States is likely to grant an entry visa to Iranian President Mahmoud Ahmadinejad to attend the United Nations opening session next month in New York City, New York. The Bush administration probe into whether Ahmadinejad was connected to the 1979-1981 Iranian hostage crisis is looking like it was a case of mistaken identity. The decision remains tentative as intelligence reports within the administration continue to circulate, according to The Washington Post citing U.S. officials.", "after_revision": "In a nationally broadcast radio sermon by former Iranian president on Friday, he said of the U. N. watchdog group adopting the resolution for Iran to stop nuclear enrichment activities, \"The decision was a cruel one.\" The Thurday adoption in by the governing board of the (IAEA) was unanimous and legally non-binding in asking Iran to suspend all nuclear fuel related activities. The board also requested a report from the agency's chief, Mohamed ElBaradei, on its compliance by Tehran. On Thursday, an Iranian member of their nuclear negotiating team, Sirous Nasseri, read in a statement made by his republic at the emergency governing board meeting of the IAEA regarding the (NPT):How can this body be called to react to an act, which is in full conformity with the NPT and the safeguards and constitutes a limited manifestation of the exercise of an inalienable right? A right, which by its own simple meaning, cannot be alienated from anyone. International concern over the Iranian nuclear enrichment program was led by the European Union countries of France, Great Britain , and Germany (EU-3), along with the United States. The pressure brought by these nations succeeded in obtaining language calling for the re-instatement of seals that were removed at the Uranium Conversion Facility in . The seals were removed during the recent installation of surveillance cameras by IAEA. The agency is to monitor for compliance to halt uranium enrichment. After a September 3 deadline, Iran again faces a possible referral to the U.N. Security Council where it could be subject to economic sanctions. Meanwhile, the United States is likely to grant an entry to Iranian President Mahmoud Ahmadinejad to attend the United Nations opening session next month in New York City, New York. The Bush administration probe into whether Ahmadinejad was connected to the 1979-1981 is looking like it was a case of mistaken identity. The decision remains tentative as intelligence reports within the administration continue to circulate, according to citing U.S. officials.", "edit_actions": [{"type": "D", "before": "Akbar Hashemi Rafsanjani", "after": null, "start_char_pos": 67, "end_char_pos": 91}, {"type": "D", "before": "Vienna", "after": null, "start_char_pos": 267, "end_char_pos": 273}, {"type": "D", "before": "International Atomic Energy Agency", "after": null, "start_char_pos": 304, "end_char_pos": 338}, {"type": "D", "before": ",", "after": null, "start_char_pos": 346, "end_char_pos": 347}, {"type": "D", "before": "London", "after": null, "start_char_pos": 646, "end_char_pos": 652}, {"type": "D", "before": "Nuclear proliferation treaty", "after": null, "start_char_pos": 753, "end_char_pos": 781}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1183, "end_char_pos": 1183}, {"type": "D", "before": "Isfahan", "after": null, "start_char_pos": 1400, "end_char_pos": 1407}, {"type": "D", "before": "Tehran", "after": null, "start_char_pos": 1522, "end_char_pos": 1528}, {"type": "D", "before": "visa", "after": null, "start_char_pos": 1774, "end_char_pos": 1778}, {"type": "D", "before": "Iranian hostage crisis", "after": null, "start_char_pos": 1990, "end_char_pos": 2012}, {"type": "D", "before": "The Washington Post", "after": null, "start_char_pos": 2182, "end_char_pos": 2201}], "sents_char_pos": [0, 242, 448, 555, 976, 1051, 1233, 1409, 1496, 1571, 1716, 1903, 2064]}
+{"doc_id": "188160", "revision_depth": "1", "before_revision": "In ice hockey, Tom\u00e1\u0161 Kopeck\u00fd scored the game-winning goal for the Chicago Blackhawks 8:25 into the third period to lift the Blackhawks over the Philadelphia Flyers in Game 1 of the 2010 Stanley Cup Finals Saturday night in Chicago, United States. The game started exciting, with five goals each in the first two periods, but Kopeck\u00fd's game-winner was the sole third-period goal. Tom\u00e1\u0161 Kopeck\u00fd scored the game-winning goal for the Blackhawks. Ville Leino opened the scoring for the Flyers at the 6:38 mark of the first period with Chicago's Troy Brouwer answered back just 68 seconds later. After teammate Patrick Kane was sent off for slashing, Chicago's Dave Bolland scored a short-handed goal to but the Blackhawks ahead. Six minutes later, Brian Campbell was sent off for high-sticking and the Flyers converted on the power play with Scott Hartnell lighting the lamp for Philadelphia. Daniel Bri\u00e8re put the Flyers 3\u20132 up going into the first intermission with just 27 seconds left in the period. With the second period just 71 seconds old, Patrick Sharp evened the score at three. Blackhawk Adam Burish was sent off for boarding at the 4:59 mark, but the Flyers could not extend their lead, ending up converting one of their four power plays ( Ben Eager was sent off for cross checking early in the first period). Blair Betts gave the Flyers their final lead of the game with a shot at the 7:20 mark of the period. The Blackhawks' Kris Versteeg responded two minutes later and at 15:18 mark the Brouwer completed his three-point night with his second goal. Philadelphia's Arron Asham evened the score at five a-piece to complete the period. The third period was a relatively quiet one, with just 14 shots compared to to 26 and 24 shots in the first two periods, respectively. Each team had 32 shots. Kopeck\u00fd's goal was the lone action as the Slovak national slipped the puck past Flyers goalkeeper Brian Boucher , who had 11 saves in 24 minutes on the ice. Boucher replaced Michael Leighton , who stopped 15 of 20 shots. Blackhawk counterpart Antti Niemi collected 27 of 32 shots. The game was the Blackhawks' first Finals victory since 1973. In 1992, they were swept by the Pittsburg Penguins .", "after_revision": "In ice hockey, scored the game-winning goal for the Chicago Blackhawks 8:25 into the third period to lift the Blackhawks over the in Game 1 of the Saturday night in Chicago, United States. The game started exciting, with five goals each in the first two periods, but Kopeck\u00fd's game-winner was the sole third-period goal. scored the game-winning goal for the Blackhawks. opened the scoring for the Flyers at the 6:38 mark of the first period with Chicago's answered back just 68 seconds later. After teammate was sent off for slashing, Chicago's scored a short-handed goal to but the Blackhawks ahead. Six minutes later, was sent off for high-sticking and the Flyers converted on the power play with lighting the lamp for Philadelphia. put the Flyers 3\u20132 up going into the first intermission with just 27 seconds left in the period. With the second period just 71 seconds old, evened the score at three. Blackhawk was sent off for boarding at the 4:59 mark, but the Flyers could not extend their lead, ending up converting one of their four power plays ( was sent off for cross checking early in the first period). gave the Flyers their final lead of the game with a shot at the 7:20 mark of the period. The Blackhawks' responded two minutes later and at 15:18 mark the Brouwer completed his three-point night with his second goal. Philadelphia's evened the score at five a-piece to complete the period. The third period was a relatively quiet one, with just 14 shots compared to to 26 and 24 shots in the first two periods, respectively. Each team had 32 shots. Kopeck\u00fd's goal was the lone action as the Slovak national slipped the puck past Flyers goalkeeper , who had 11 saves in 24 minutes on the ice. Boucher replaced , who stopped 15 of 20 shots. Blackhawk counterpart collected 27 of 32 shots. The game was the Blackhawks' first Finals victory since 1973. In 1992, they were swept by the .", "edit_actions": [{"type": "D", "before": "Tom\u00e1\u0161 Kopeck\u00fd", "after": null, "start_char_pos": 15, "end_char_pos": 28}, {"type": "D", "before": "Philadelphia Flyers", "after": null, "start_char_pos": 144, "end_char_pos": 163}, {"type": "D", "before": "2010 Stanley Cup Finals", "after": null, "start_char_pos": 181, "end_char_pos": 204}, {"type": "D", "before": "Tom\u00e1\u0161 Kopeck\u00fd", "after": null, "start_char_pos": 379, "end_char_pos": 392}, {"type": "D", "before": "Ville Leino", "after": null, "start_char_pos": 442, "end_char_pos": 453}, {"type": "D", "before": "Troy Brouwer", "after": null, "start_char_pos": 540, "end_char_pos": 552}, {"type": "D", "before": "Patrick Kane", "after": null, "start_char_pos": 605, "end_char_pos": 617}, {"type": "D", "before": "Dave Bolland", "after": null, "start_char_pos": 655, "end_char_pos": 667}, {"type": "D", "before": "Brian Campbell", "after": null, "start_char_pos": 743, "end_char_pos": 757}, {"type": "D", "before": "Scott Hartnell", "after": null, "start_char_pos": 837, "end_char_pos": 851}, {"type": "D", "before": "Daniel Bri\u00e8re", "after": null, "start_char_pos": 888, "end_char_pos": 901}, {"type": "D", "before": "Patrick Sharp", "after": null, "start_char_pos": 1043, "end_char_pos": 1056}, {"type": "D", "before": "Adam Burish", "after": null, "start_char_pos": 1094, "end_char_pos": 1105}, {"type": "D", "before": "Ben Eager", "after": null, "start_char_pos": 1247, "end_char_pos": 1256}, {"type": "D", "before": "Blair Betts", "after": null, "start_char_pos": 1317, "end_char_pos": 1328}, {"type": "D", "before": "Kris Versteeg", "after": null, "start_char_pos": 1434, "end_char_pos": 1447}, {"type": "D", "before": "Arron Asham", "after": null, "start_char_pos": 1575, "end_char_pos": 1586}, {"type": "D", "before": "Brian Boucher", "after": null, "start_char_pos": 1901, "end_char_pos": 1914}, {"type": "D", "before": "Michael Leighton", "after": null, "start_char_pos": 1977, "end_char_pos": 1993}, {"type": "D", "before": "Antti Niemi", "after": null, "start_char_pos": 2046, "end_char_pos": 2057}, {"type": "D", "before": "Pittsburg Penguins", "after": null, "start_char_pos": 2178, "end_char_pos": 2196}], "sents_char_pos": [0, 246, 378, 441, 589, 723, 887, 998, 1083, 1316, 1417, 1559, 1643, 1778, 1802, 1959, 2023, 2083, 2145]}
+{"doc_id": "188836", "revision_depth": "1", "before_revision": "In ice hockey, the Chicago Blackhawks scored two goals just 28 seconds apart late in the second period to take a 2\u20130 series lead over the Philadelphia Flyers in Game 2 of the 2010 Stanley Cup Finals Monday night in Chicago, United States. Ben Eager scored the game-winning goal at the 17:39 mark of second period to give the Chicago Blackhawks a 2\u20130 series lead over the Philadelphia Flyers in Game 2 of the 2010 Stanley Cup Finals. Mari\u00e1n Hossa scored Chicago's first goal at the 17:09 mark of the second period on slap shot deep in the Blackhawk's defensive zone. Left-wingers Troy Brouwer and Patrick Sharp provided assists on the goal. Ben Eager scored the game-winner at the 17:37 mark of the second period on a feed from Dustin Byfuglien . Eager scored his goal on a wrist shot from 38 feet. Philadelphia's lone goal came in the third period, when Simon Gagn\u00e9 scored at the 5:20 mark. Centers Mike Richards and Jeff Carter provides assists on the goal. Unlike the first game, this one was marked by impressive defensive efforts from both sides. Chicago goalkeeper Antti Niemi made 32 saves, earning the Player-of-the-Game honor from the National Hockey League. His counterpart, Michael Leighton who was pulled in Game 1 after giving up five goals, collected 24 saves. Flyers coach Peter Laviolette also acknowledged Niemi, who collected 14 of his 32 saves in the third period. After a fairly clean game on Saturday, Game 2 had a decided edge, which resulted in ten penalties. Neither team capitalized on their power play opportunities. At the 17:27 mark of the first period, three players were sent off: Chicago's Game 1 hero Tom\u00e1\u0161 Kopeck\u00fd for roughing, with Philadelphia's Richards and Daniel Carcillo going to the box of elbowing and unsportsmanlike conduct, respectively.", "after_revision": "In ice hockey, the scored two goals just 28 seconds apart late in the second period to take a 2\u20130 series lead over the in Game 2 of the Monday night in Chicago, United States. scored the game-winning goal at the 17:39 mark of second period to give the a 2\u20130 series lead over the in Game 2 of the . scored Chicago's first goal at the 17:09 mark of the second period on slap shot deep in the Blackhawk's defensive zone. Left-wingers and provided assists on the goal. scored the game-winner at the 17:37 mark of the second period on a feed from . Eager scored his goal on a wrist shot from 38 feet. Philadelphia's lone goal came in the third period, when scored at the 5:20 mark. Centers and provides assists on the goal. Unlike the first game, this one was marked by impressive defensive efforts from both sides. Chicago goalkeeper made 32 saves, earning the Player-of-the-Game honor from the National Hockey League. His counterpart, who was pulled in Game 1 after giving up five goals, collected 24 saves. Flyers coach also acknowledged Niemi, who collected 14 of his 32 saves in the third period. After a fairly clean game on Saturday, Game 2 had a decided edge, which resulted in ten penalties. Neither team capitalized on their power play opportunities. At the 17:27 mark of the first period, three players were sent off: Chicago's Game 1 hero for roughing, with Philadelphia's Richards and going to the box of elbowing and unsportsmanlike conduct, respectively.", "edit_actions": [{"type": "D", "before": "Chicago Blackhawks", "after": null, "start_char_pos": 19, "end_char_pos": 37}, {"type": "D", "before": "Philadelphia Flyers", "after": null, "start_char_pos": 138, "end_char_pos": 157}, {"type": "D", "before": "2010 Stanley Cup Finals", "after": null, "start_char_pos": 175, "end_char_pos": 198}, {"type": "D", "before": "Ben Eager", "after": null, "start_char_pos": 239, "end_char_pos": 248}, {"type": "D", "before": "Chicago Blackhawks", "after": null, "start_char_pos": 325, "end_char_pos": 343}, {"type": "D", "before": "Philadelphia Flyers", "after": null, "start_char_pos": 371, "end_char_pos": 390}, {"type": "R", "before": "2010 Stanley Cup Finals. Mari\u00e1n Hossa", "after": ".", "start_char_pos": 408, "end_char_pos": 445}, {"type": "R", "before": "Troy Brouwer and Patrick Sharp", "after": "and", "start_char_pos": 579, "end_char_pos": 609}, {"type": "D", "before": "Ben Eager", "after": null, "start_char_pos": 640, "end_char_pos": 649}, {"type": "D", "before": "Dustin Byfuglien", "after": null, "start_char_pos": 727, "end_char_pos": 743}, {"type": "D", "before": "Simon Gagn\u00e9", "after": null, "start_char_pos": 854, "end_char_pos": 865}, {"type": "R", "before": "Mike Richards and Jeff Carter", "after": "and", "start_char_pos": 899, "end_char_pos": 928}, {"type": "D", "before": "Antti Niemi", "after": null, "start_char_pos": 1070, "end_char_pos": 1081}, {"type": "D", "before": "Michael Leighton", "after": null, "start_char_pos": 1184, "end_char_pos": 1200}, {"type": "D", "before": "Peter Laviolette", "after": null, "start_char_pos": 1287, "end_char_pos": 1303}, {"type": "D", "before": "Tom\u00e1\u0161 Kopeck\u00fd", "after": null, "start_char_pos": 1632, "end_char_pos": 1645}, {"type": "D", "before": "Daniel Carcillo", "after": null, "start_char_pos": 1693, "end_char_pos": 1708}], "sents_char_pos": [0, 238, 432, 565, 639, 797, 890, 958, 1050, 1166, 1273, 1382, 1481, 1541]}
+{"doc_id": "189036", "revision_depth": "1", "before_revision": "Samantha Stosur at Roland Garros in 2009 Australia's Samantha Stosur will compete against Italy's Francesca Schiavone for the women's title in this year's French Open, while Spain's Rafael Nadal will go up against Sweden's Robin Soderling . In the women's semifinals, Stosur easily defeated Jelena Jankovic, once number one in the world , while Schiavone's opponent Elena Dementieva decided to withdraw due to a torn calf muscle after losing one set to Schiavone. Stosur and Schiavone will face off at the Stade Roland Garros this Saturday for the final round of the French Open. As this is the first Grand Slam final for both players, a victory for either will mean her first major championship title. Schiavone is also the first Italian woman to compete in a Grand Slam semifinal match. However, this is not the first time the two have met: Stosur beat Schiavone in the opening round of last year's French Open, and again in Osaka later that year. This year's championship has been one with several major upsets. None of the top three women in the event, including sisters Venus and Serena Williams , made it to the semifinals. In fact, none of the female semifinalists this year have ever won a Grand Slam title, which has not occurred at the French Open for over 30 years. In a major upset for the men's title, Robin Soderling defeated Swiss player Roger Federer in a quarterfinal match of the French Open Tuesday, ending Federer's streak of 23 consecutive Grand Slam semifinal appearances. Federer could also lose his status as number one in the world to rival Rafael Nadal if Nadal wins this year's French Open. However, Soderling is known for being the only person to have defeated Nadal in the French Open. In the men's semifinals earlier today, the 24-year-old Nadal beat Austria's Jurgen Melzer , and Soderling defeated Czech player Tomas Berdych . If Nadal beats Soderling in this Sunday's final round, it will be his fifth French Open title.", "after_revision": "Samantha Stosur at Roland Garros in 2009 Australia's will compete against Italy's for the women's title in this year's , while 's will go up against 's . In the women's semifinals, Stosur easily defeated , once , while Schiavone's opponent decided to withdraw due to a torn after losing one set to Schiavone. Stosur and Schiavone will face off at the this Saturday for the final round of the French Open. As this is the first final for both players, a victory for either will mean her first major championship title. Schiavone is also the first Italian woman to compete in a Grand Slam semifinal match. However, this is not the first time the two have met: Stosur beat Schiavone in the opening round of last year's French Open, and again in later that year. This year's championship has been one with several major upsets. None of the top three women in the event, including sisters and , made it to the semifinals. In fact, none of the female semifinalists this year have ever won a Grand Slam title, which has not occurred at the French Open for over 30 years. In a major upset for the men's title, Robin Soderling defeated Swiss player in a quarterfinal match of the French Open Tuesday, ending Federer's streak of 23 consecutive Grand Slam semifinal appearances. Federer could also lose his status as number one in the world to rival Rafael Nadal if Nadal wins this year's French Open. However, Soderling is known for being the only person to have defeated Nadal in the French Open. In the men's semifinals earlier today, the 24-year-old Nadal beat Austria's , and Soderling defeated Czech player . If Nadal beats Soderling in this Sunday's final round, it will be his fifth French Open title.", "edit_actions": [{"type": "D", "before": "Samantha Stosur", "after": null, "start_char_pos": 53, "end_char_pos": 68}, {"type": "D", "before": "Francesca Schiavone", "after": null, "start_char_pos": 98, "end_char_pos": 117}, {"type": "R", "before": "French Open, while Spain's Rafael Nadal", "after": ", while 's", "start_char_pos": 155, "end_char_pos": 194}, {"type": "R", "before": "Sweden's Robin Soderling", "after": "'s", "start_char_pos": 214, "end_char_pos": 238}, {"type": "D", "before": "Jelena Jankovic, once number one in the world", "after": null, "start_char_pos": 291, "end_char_pos": 336}, {"type": "A", "before": null, "after": "once ,", "start_char_pos": 339, "end_char_pos": 339}, {"type": "D", "before": "Elena Dementieva", "after": null, "start_char_pos": 367, "end_char_pos": 383}, {"type": "D", "before": "calf muscle", "after": null, "start_char_pos": 418, "end_char_pos": 429}, {"type": "D", "before": "Stade Roland Garros", "after": null, "start_char_pos": 507, "end_char_pos": 526}, {"type": "D", "before": "Grand Slam", "after": null, "start_char_pos": 602, "end_char_pos": 612}, {"type": "D", "before": "Osaka", "after": null, "start_char_pos": 928, "end_char_pos": 933}, {"type": "R", "before": "Venus and Serena Williams", "after": "and", "start_char_pos": 1076, "end_char_pos": 1101}, {"type": "D", "before": "Roger Federer", "after": null, "start_char_pos": 1354, "end_char_pos": 1367}, {"type": "D", "before": "Jurgen Melzer", "after": null, "start_char_pos": 1792, "end_char_pos": 1805}, {"type": "D", "before": "Tomas Berdych", "after": null, "start_char_pos": 1844, "end_char_pos": 1857}], "sents_char_pos": [0, 240, 464, 580, 703, 789, 950, 1015, 1130, 1277, 1495, 1618, 1715, 1859]}
+{"doc_id": "190356", "revision_depth": "1", "before_revision": "In his WWDC keynote, Steve Jobs introduced iPhone 4 yesterday. Yesterday, at this year's Apple Worldwide Developers Conference (WWDC), company CEO Steve Jobs unveiled iPhone 4, along with the new iOS 4 operating system for Apple mobile devices. The announcement was long-awaited but not a very big surprise. In April, the technology blog Gizmodo obtained a prototype of the new phone and published details of it online. While introducing iPhone 4, at the annual conference, Jobs started by hinting at the incident, saying, \"Stop me if you've already seen this.\" The new iPhone was praised by Jobs as \"the biggest leap we've taken since the original iPhone.\" It is only 9.3 millimetres (0.37 inches) thick, making it \"the thinnest smartphone on the planet\", a 24 percent reduction from Apple's previous model, the iPhone 3GS. Structure-wise, iPhone 4 has a new stainless steel frame, which acts as an antenna , supposedly boosting its signal reception abilities and possibly reducing the amount of dropped calls . It also has a new screen, dubbed a \"retina display,\" which displays images at 326 pixels per inch . During the keynote, Jobs demoed the device's new internal gyroscope as well. Even though it now uses Apple's faster A4 processor (first used in its iPad tablet ), iPhone 4 has a claimed seven hours of 3G talk time, up two hours from the 3GS. In addition to its design features, Jobs showed off iPhone 4's new video calling abilities. This feature is called FaceTime , and connects with other iPhone 4s via Wi-Fi . The phone has two cameras : one on the front for video chats, and one on the back for taking pictures and other videos. The rear camera has a resolution of five megapixels , is capable of recording high-definition video , and has an LED flash. The iPhone 4 will use Apple's latest mobile operating system, iOS 4. Formerly \"iPhone OS,\" iOS 4 was first introduced by Apple in April, and includes multitasking capabilities. Jobs called the new software \"the most advanced mobile operating system in the world.\" iOS will support Apple's new mobile advertising service, iAd , which goes live on July 1. iPhone 4 will be available on June 24 in the United States, United Kingdom, France, Germany, and Japan. It comes in two colors\u2014black and white\u2014and two storage capacities. The 16GB version is priced at US$199 and the 32GB version at US$299. The iPhone 3GS's price will be reduced to US$99, and the iPhone 3G will be discontinued. iOS will be available as a free software update to users of compatible older Apple devices (including the 3GS) on June 21. In the U.S., iPhone 4 will only be available on AT T 's cellular network, despite calls for Apple to let the iPhone be used on other carriers, such as Verizon . Competition-wise, the BlackBerry mobile device is still the most popular smartphone right now. Apple is also facing some serious competition from web giant Google's Android operating system, as well as Palm's webOS . Earlier this year, Android phones managed to outsell iPhones. iPhone users, however, account for over half of those surfing the Internet on a mobile browser in the U.S. Jobs also noted that over five billion iOS applications, commonly called \"apps,\" have been purchased from Apple's App Store . The App Store currently has around 225,000 different apps for sale.", "after_revision": "In his WWDC keynote, Steve Jobs introduced iPhone 4 yesterday. Yesterday, at this year's (WWDC), company Steve Jobs unveiled 4, along with the new 4 for Apple mobile devices. The announcement was long-awaited but not a very big surprise. In April, the technology blog obtained a prototype of the new phone and published details of it online. While introducing iPhone 4, at the annual conference, Jobs started by hinting at the incident, saying, \"Stop me if you've already seen this.\" The new iPhone was praised by Jobs as \"the biggest leap we've taken since the original iPhone.\" It is only 9.3 millimetres (0.37 inches) thick, making it \"the thinnest smartphone on the planet\", a 24 percent reduction from Apple's previous model, the iPhone 3GS. Structure-wise, iPhone 4 has a new frame, which acts as an , supposedly boosting its signal reception abilities and possibly reducing the amount of . It also has a new screen, dubbed a \"retina display,\" which displays images at 326 . During the keynote, Jobs demoed the device's new internal as well. Even though it now uses Apple's faster A4 (first used in its ), iPhone 4 has a claimed seven hours of talk time, up two hours from the 3GS. In addition to its design features, Jobs showed off iPhone 4's new abilities. This feature is called , and connects with other iPhone 4s via . The phone has two : one on the front for video chats, and one on the back for taking pictures and other videos. The rear camera has a resolution of five , is capable of recording , and has an flash. The iPhone 4 will use Apple's latest mobile operating system, iOS 4. Formerly \"iPhone OS,\" iOS 4 was first introduced by Apple in April, and includes capabilities. Jobs called the new software \"the most advanced mobile operating system in the world.\" iOS will support Apple's new mobile advertising service, , which goes live on July 1. iPhone 4 will be available on June 24 in the United States, United Kingdom, France, Germany, and Japan. It comes in two colors\u2014black and white\u2014and two storage capacities. The 16 version is priced at US$199 and the 32GB version at US$299. The iPhone 3GS's price will be reduced to US$99, and the iPhone 3G will be discontinued. iOS will be available as a free software update to users of compatible older Apple devices (including the 3GS) on June 21. In the U.S., iPhone 4 will only be available on 's cellular network, despite calls for Apple to let the iPhone be used on other carriers, such as . Competition-wise, the mobile device is still the most popular right now. Apple is also facing some serious competition from web giant Google's operating system, as well as 's . Earlier this year, Android phones managed to outsell iPhones. iPhone users, however, account for over half of those surfing the on a mobile browser in the U.S. Jobs also noted that over five billion iOS applications, commonly called \"apps,\" have been purchased from Apple's . The App Store currently has around 225,000 different apps for sale.", "edit_actions": [{"type": "D", "before": "Apple Worldwide Developers Conference", "after": null, "start_char_pos": 89, "end_char_pos": 126}, {"type": "D", "before": "CEO", "after": null, "start_char_pos": 143, "end_char_pos": 146}, {"type": "D", "before": "iPhone", "after": null, "start_char_pos": 167, "end_char_pos": 173}, {"type": "D", "before": "iOS", "after": null, "start_char_pos": 196, "end_char_pos": 199}, {"type": "D", "before": "operating system", "after": null, "start_char_pos": 202, "end_char_pos": 218}, {"type": "D", "before": "Gizmodo", "after": null, "start_char_pos": 338, "end_char_pos": 345}, {"type": "D", "before": "stainless steel", "after": null, "start_char_pos": 860, "end_char_pos": 875}, {"type": "D", "before": "antenna", "after": null, "start_char_pos": 900, "end_char_pos": 907}, {"type": "D", "before": "dropped calls", "after": null, "start_char_pos": 997, "end_char_pos": 1010}, {"type": "D", "before": "pixels per inch", "after": null, "start_char_pos": 1095, "end_char_pos": 1110}, {"type": "D", "before": "gyroscope", "after": null, "start_char_pos": 1171, "end_char_pos": 1180}, {"type": "D", "before": "processor", "after": null, "start_char_pos": 1232, "end_char_pos": 1241}, {"type": "D", "before": "iPad tablet", "after": null, "start_char_pos": 1261, "end_char_pos": 1272}, {"type": "D", "before": "3G", "after": null, "start_char_pos": 1314, "end_char_pos": 1316}, {"type": "D", "before": "video calling", "after": null, "start_char_pos": 1422, "end_char_pos": 1435}, {"type": "D", "before": "FaceTime", "after": null, "start_char_pos": 1470, "end_char_pos": 1478}, {"type": "D", "before": "Wi-Fi", "after": null, "start_char_pos": 1519, "end_char_pos": 1524}, {"type": "D", "before": "cameras", "after": null, "start_char_pos": 1545, "end_char_pos": 1552}, {"type": "D", "before": "megapixels", "after": null, "start_char_pos": 1688, "end_char_pos": 1698}, {"type": "D", "before": "high-definition video", "after": null, "start_char_pos": 1725, "end_char_pos": 1746}, {"type": "D", "before": "LED", "after": null, "start_char_pos": 1760, "end_char_pos": 1763}, {"type": "D", "before": "multitasking", "after": null, "start_char_pos": 1921, "end_char_pos": 1933}, {"type": "D", "before": "iAd", "after": null, "start_char_pos": 2092, "end_char_pos": 2095}, {"type": "R", "before": "16GB", "after": "16", "start_char_pos": 2300, "end_char_pos": 2304}, {"type": "D", "before": "AT", "after": null, "start_char_pos": 2625, "end_char_pos": 2627}, {"type": "D", "before": "T", "after": null, "start_char_pos": 2628, "end_char_pos": 2629}, {"type": "D", "before": "Verizon", "after": null, "start_char_pos": 2728, "end_char_pos": 2735}, {"type": "D", "before": "BlackBerry", "after": null, "start_char_pos": 2760, "end_char_pos": 2770}, {"type": "D", "before": "smartphone", "after": null, "start_char_pos": 2811, "end_char_pos": 2821}, {"type": "D", "before": "Android", "after": null, "start_char_pos": 2903, "end_char_pos": 2910}, {"type": "R", "before": "Palm's webOS", "after": "'s", "start_char_pos": 2940, "end_char_pos": 2952}, {"type": "D", "before": "Internet", "after": null, "start_char_pos": 3083, "end_char_pos": 3091}, {"type": "D", "before": "App Store", "after": null, "start_char_pos": 3238, "end_char_pos": 3247}], "sents_char_pos": [0, 62, 244, 307, 419, 561, 657, 824, 1012, 1189, 1354, 1446, 1526, 1646, 1770, 1947, 2228, 2295, 2364, 2576, 2832, 3249]}
+{"doc_id": "191326", "revision_depth": "1", "before_revision": "Israel will carry out an inquiry into last month's raid on a flotilla of Gaza-bound aid ships. The inquiry will include two non-voting foreign observers. Israel had earlier rejected a UN call for an international inquiry. |The Mavi Marmara , one of the ships boarded last month. Nine Turkish citizens were killed on May 31, when Israeli naval commandos boarded a vessel in the flotilla, the MV Mavi Marmara . The three-man inquest into the boarding action , which took place in international waters, will be headed by ex-Supreme Court judge Yaakov Tirkel. A retired military officer and a professor of international law are the other members. The two foreign observers will be Nobel Peace Prize winner David Trimble and a former jurist in the Canadian military, Brigadier General Kenneth Watkin . They are to watch the panel consider how the Turks died, as well as judge whether the naval blockade of Gaza is allowable under international law. Middle East peace envoy for the Madrid Quartet , Tony Blair, said that he hoped that the Israeli blockade on Gaza would be softened within days, whilst the White House backed a Security Council statement calling for a \"prompt, impartial [and] credible\" review. Palestinian President Mahmoud Abbas said that the inquest did \"not correspond to what the Security Council asked for\". The Turkish government is not satisfied with Israel's inquiry. Ahmet Davutoglu , the Turkish Foreign Minister, said in a news conference that Israel's \"one-sided inquiry\" is insufficient, and his country wishes for a commission to be set up under the control of the United Nations. Turkey has withdrawn their ambassador to Israel and canceled joint military exercises. It is calling for the blockade, which the Red Cross says violates the Geneva Convention, to be lifted. Related news ", "after_revision": "Israel will carry out an inquiry into last month's on a flotilla of Gaza-bound aid ships. The inquiry will include two non-voting foreign observers. Israel had earlier rejected a UN call for an international inquiry. |The , one of the ships boarded last month. Nine Turkish citizens were killed on May 31, when boarded a vessel in the flotilla, the MV . The three-man inquest into the , which took place in international waters, will be headed by ex-Supreme Court judge Yaakov Tirkel. A retired military officer and a professor of international law are the other members. The two foreign observers will be winner and a former jurist in the Canadian military, . They are to watch the panel consider how the Turks died, as well as judge whether the naval blockade of Gaza is allowable under international law. Middle East peace envoy for the , Tony Blair, said that he hoped that the Israeli blockade on Gaza would be softened within days, whilst the White House backed a Security Council statement calling for a \"prompt, impartial [and] credible\" review. Palestinian President Mahmoud Abbas said that the inquest did \"not correspond to what the Security Council asked for\". The Turkish government is not satisfied with Israel's inquiry. , the Turkish Foreign Minister, said in a news conference that Israel's \"one-sided inquiry\" is insufficient, and his country wishes for a commission to be set up under the control of the United Nations. Turkey has withdrawn their ambassador to Israel and canceled joint military exercises. It is calling for the blockade, which the Red Cross says violates the Geneva Convention, to be lifted. Related news Sister links Sourcces Category:Israel Category:Turkey Category:Middle East Category:Politics and conflicts Category:Gaza Strip Category:Blockade of the Gaza Strip Category:Mediterranean Sea Category:Red Cross and Red Crescent Category:Ahmet Davuto", "edit_actions": [{"type": "D", "before": "raid", "after": null, "start_char_pos": 51, "end_char_pos": 55}, {"type": "D", "before": "Mavi Marmara", "after": null, "start_char_pos": 227, "end_char_pos": 239}, {"type": "D", "before": "Israeli naval commandos", "after": null, "start_char_pos": 329, "end_char_pos": 352}, {"type": "D", "before": "Mavi Marmara", "after": null, "start_char_pos": 394, "end_char_pos": 406}, {"type": "D", "before": "boarding action", "after": null, "start_char_pos": 440, "end_char_pos": 455}, {"type": "R", "before": "Nobel Peace Prize winner David Trimble", "after": "winner", "start_char_pos": 677, "end_char_pos": 715}, {"type": "D", "before": "Brigadier General Kenneth Watkin", "after": null, "start_char_pos": 762, "end_char_pos": 794}, {"type": "D", "before": "Madrid Quartet", "after": null, "start_char_pos": 976, "end_char_pos": 990}, {"type": "D", "before": "Ahmet Davutoglu", "after": null, "start_char_pos": 1387, "end_char_pos": 1402}, {"type": "A", "before": null, "after": "Sister links", "start_char_pos": 1809, "end_char_pos": 1809}, {"type": "A", "before": null, "after": "Sourcces", "start_char_pos": 1810, "end_char_pos": 1810}, {"type": "A", "before": null, "after": "Category:Israel Category:Turkey Category:Middle East Category:Politics and conflicts Category:Gaza Strip Category:Blockade of the Gaza Strip Category:Mediterranean Sea Category:Red Cross and Red Crescent Category:Ahmet Davuto", "start_char_pos": 1811, "end_char_pos": 1811}], "sents_char_pos": [0, 94, 153, 221, 278, 408, 555, 642, 796, 943, 1204, 1323, 1386, 1605, 1692, 1795]}
+{"doc_id": "1928792", "revision_depth": "2", "before_revision": "Flag of ISIL. A video was released yesterday purporting to show the execution of 21 by supporters of (ISIL) . The video shows the prisoners being beheaded in a location apparently near in . The captives, all wearing orange in the video, were picked up in , a coastal town in Libya, during December and January. The video indicates that the Christians were targeted by ISIL because of their religion. The Coptic Orthodox Church stated they were \"confident\" justice would be carried out . 's President stated: \"Egypt and the whole world are in a fierce battle with extremist groups carrying extremist ideology and sharing the same goals\".", "after_revision": "Flag of ISIL. A video purporting to show the execution of 21 by supporters of (ISIL) has been released yesterday . The video shows them being beheaded in a location apparently near in . The captives, all shown being executed in orange in the video, were picked up in , a coastal town in Libya, during December and January. The video asserts the Christians were targeted by ISIL because of their religion. The Coptic Orthodox Church stated they were \"confident\" justice would be done on those who executed their followers . 's President stated: \"Egypt and the whole world are in a fierce battle with extremist groups carrying extremist ideology and sharing the same goals\".", "edit_actions": [{"type": "D", "before": "was released yesterday", "after": null, "start_char_pos": 22, "end_char_pos": 44}, {"type": "A", "before": null, "after": "has been released yesterday", "start_char_pos": 108, "end_char_pos": 108}, {"type": "R", "before": "the prisoners", "after": "them", "start_char_pos": 127, "end_char_pos": 140}, {"type": "R", "before": "wearing", "after": "shown being executed in", "start_char_pos": 209, "end_char_pos": 216}, {"type": "R", "before": "indicates that", "after": "asserts", "start_char_pos": 322, "end_char_pos": 336}, {"type": "R", "before": "carried out", "after": "done on those who executed their followers", "start_char_pos": 474, "end_char_pos": 485}], "sents_char_pos": [0, 13, 110, 190, 311, 400, 487]}
+{"doc_id": "193201", "revision_depth": "1", "before_revision": "File photo of Jimmie Johnson. NASCAR Sprint Cup Series driver Jimmie Johnson won his second consecutive race of the season on Sunday during the 2010 Lenox Industrial Tools 301 at New Hampshire Motor Speedway . It was his fifth victory in the 2010 season of the US's leading professional stock car series, drawing him level with Denny Hamlin for the most wins. The victory earned Johnson 190 points (including a 5 point bonus), moving him closer to point leader Kevin Harvick , but he is still 105 points behind in second position. With eight laps remaining, Kurt Busch , who was running second, bumped Johnson to become the leader, but Johnson returned the favor a couple laps later to the lead the final two laps. Johnson said, \u201cKurt knocked me out of the way. At that point, I thought, I don\u2019t care if I win or finish. I\u2019m going to run into him one way or the other ... I tried once and moved him. (I thought) I\u2019ve got to hit him harder. The second time I did and moved him out of the way.\u201d Tony Stewart finished in the second position, ahead of Kurt Busch and Jeff Gordon in third and fourth. Ryan Newman, Clint Bowyer, Dale Earnhardt, Jr., Joey Logano and A. J. Allmendinger rounded out the top ten positions. The race had total of four cautions and sixteen lead changes among nine different drivers. Kasey Kahne led the most laps by leading 110. In the point standings , Harvick and Johnson remained in the first and second position. Kyle Busch , because of his accident with Jeff Burton maintained the third position while his team mate Hamlin is fourth. Gordon, Kurt Busch, Matt Kenseth , and Burton followed in the top-eight points positions. Stewart move up one position after finishing second and is in the ninth position, as Greg Biffle fell to tenth. Mark Martin and Carl Edwards rounded out the top-twelve, and is currently in the Chase . Official Top-10 Race Results for the 2010 Lenox Industrial Tools 301 Position Car Number Driver 1 48 Jimmie Johnson 2 14 Tony Stewart 3 2 Kurt Busch 4 24 Jeff Gordon 529 Kevin Harvick 6 39 Ryan Newman 7 33 Clint Bowyer 8 88 Dale Earnhardt, Jr. 9 33 Joey Logano 10 43 A. J. Allmendinger", "after_revision": "File photo of . driver won his second consecutive race of the on Sunday during the at . It was his fifth victory in the 2010 season of the US's leading professional stock car series, drawing him level with for the most wins. The victory earned Johnson 190 points (including a 5 point bonus), moving him closer to point leader , but he is still 105 points behind in second position. With eight laps remaining, , who was running second, bumped Johnson to become the leader, but Johnson returned the favor a couple laps later to the lead the final two laps. Johnson said, \u201cKurt knocked me out of the way. At that point, I thought, I don\u2019t care if I win or finish. I\u2019m going to run into him one way or the other ... I tried once and moved him. (I thought) I\u2019ve got to hit him harder. The second time I did and moved him out of the way.\u201d finished in the second position, ahead of Kurt Busch and in third and fourth. , , , and rounded out the top ten positions. The race had total of four cautions and sixteen lead changes among nine different drivers. led the most laps by leading 110. In the , Harvick and Johnson remained in the first and second position. , because of his accident with maintained the third position while his team mate Hamlin is fourth. Gordon, Kurt Busch, , and Burton followed in the top-eight points positions. Stewart move up one position after finishing second and is in the ninth position, as |Greg Biffle fell to tenth. and rounded out the top-twelve, and is currently in the . Official Top-10 Race Results for the Position Car Number Driver 1 48 Jimmie Johnson 2 14 3 2 4 24 529 6 39 7 33 8 88 9 33 10 43 Sister links", "edit_actions": [{"type": "R", "before": "Jimmie Johnson. NASCAR Sprint Cup Series driver Jimmie Johnson", "after": ". driver", "start_char_pos": 14, "end_char_pos": 76}, {"type": "D", "before": "season", "after": null, "start_char_pos": 116, "end_char_pos": 122}, {"type": "R", "before": "2010 Lenox Industrial Tools 301 at New Hampshire Motor Speedway", "after": "at", "start_char_pos": 144, "end_char_pos": 207}, {"type": "D", "before": "Denny Hamlin", "after": null, "start_char_pos": 328, "end_char_pos": 340}, {"type": "D", "before": "Kevin Harvick", "after": null, "start_char_pos": 461, "end_char_pos": 474}, {"type": "D", "before": "Kurt Busch", "after": null, "start_char_pos": 558, "end_char_pos": 568}, {"type": "D", "before": "Tony Stewart", "after": null, "start_char_pos": 993, "end_char_pos": 1005}, {"type": "D", "before": "Jeff Gordon", "after": null, "start_char_pos": 1063, "end_char_pos": 1074}, {"type": "R", "before": "Ryan Newman, Clint Bowyer, Dale Earnhardt, Jr., Joey Logano and A. J. Allmendinger", "after": ", , , and", "start_char_pos": 1096, "end_char_pos": 1178}, {"type": "D", "before": "Kasey Kahne", "after": null, "start_char_pos": 1305, "end_char_pos": 1316}, {"type": "D", "before": "point standings", "after": null, "start_char_pos": 1358, "end_char_pos": 1373}, {"type": "D", "before": "Kyle Busch", "after": null, "start_char_pos": 1439, "end_char_pos": 1449}, {"type": "D", "before": "Jeff Burton", "after": null, "start_char_pos": 1481, "end_char_pos": 1492}, {"type": "D", "before": "Matt Kenseth", "after": null, "start_char_pos": 1581, "end_char_pos": 1593}, {"type": "R", "before": "Greg Biffle", "after": "|Greg Biffle", "start_char_pos": 1736, "end_char_pos": 1747}, {"type": "R", "before": "Mark Martin and Carl Edwards", "after": "and", "start_char_pos": 1763, "end_char_pos": 1791}, {"type": "D", "before": "Chase", "after": null, "start_char_pos": 1844, "end_char_pos": 1849}, {"type": "D", "before": "2010 Lenox Industrial Tools 301", "after": null, "start_char_pos": 1889, "end_char_pos": 1920}, {"type": "D", "before": "Tony Stewart", "after": null, "start_char_pos": 1973, "end_char_pos": 1985}, {"type": "D", "before": "Kurt Busch", "after": null, "start_char_pos": 1990, "end_char_pos": 2000}, {"type": "D", "before": "Jeff Gordon", "after": null, "start_char_pos": 2006, "end_char_pos": 2017}, {"type": "D", "before": "Kevin Harvick", "after": null, "start_char_pos": 2022, "end_char_pos": 2035}, {"type": "D", "before": "Ryan Newman", "after": null, "start_char_pos": 2041, "end_char_pos": 2052}, {"type": "D", "before": "Clint Bowyer", "after": null, "start_char_pos": 2058, "end_char_pos": 2070}, {"type": "D", "before": "Dale Earnhardt, Jr.", "after": null, "start_char_pos": 2076, "end_char_pos": 2095}, {"type": "D", "before": "Joey Logano", "after": null, "start_char_pos": 2101, "end_char_pos": 2112}, {"type": "R", "before": "A. J. Allmendinger", "after": "Sister links", "start_char_pos": 2119, "end_char_pos": 2137}], "sents_char_pos": [0, 29, 209, 359, 530, 714, 761, 820, 871, 899, 939, 992, 1095, 1213, 1304, 1350, 1438, 1560, 1650, 1762, 1851]}
+{"doc_id": "193285", "revision_depth": "1", "before_revision": "Senator Robert Byrd , the longest serving member of the United States Congress died yesterday at the age of 92. Senator Robert Byrd of West Virginia (1917-2010) A spokesman for the Democratic Senator from the state of West Virginia said Byrd had been hospitalized since last week. At first he was thought to have been suffering from heat exhaustion and severe dehydration but other medical conditions developed. On Sunday, his condition was described as \"serious\". Byrd was first elected to the U.S. House of Representatives in 1952 and to the U.S. Senate in 1958. He suffered from ill health in recent years but retained his reputation for securing millions in federal funding for his home state. Throughout his career in the U.S Senate he held positions including Senate Majority Whip, Majority Leader twice and Minority Leader once. Due to his status as the longest serving Senator, Byrd was serving as President pro tempore of the United States Senate , which made him third in line in the Presidential line of succession. Senator Daniel Inouye of Hawaii has been sworn in as the new President pro tempore. Byrd served nine terms in the Senate and was labeled by critics as the \"King of Pork \". He used his former chairmanship of the Senate Appropriations Committee to steer over one billion dollars in federal aid to West Virginia, one of the poorest states in the country, described by him as, \"one of the rock bottomest [sic] of states\". Byrd was originally born as Cornelius Calvin Sale, Jr. on November 20, 1917. He grew up in the coal mining regions of southern West Virginia with his aunt and uncle, who adopted him following the death of his mother in the 1918 flu pandemic . He was the valedictorian of his high school class, but could not afford college and did not attend university courses until his 30s and 40s. The Senator had a fondness for history, and included excerpts of poetry, Shakespeare, Greek and Roman classics along with verses from the Bible in his Senate speeches. He considered himself a staunch defender of United States Constitution, and carried a copy of it in his pocket. Byrd was versed in parliamentary procedure using some of the Senate's arcane rules to his advantage. He received awards from the American Historical Association and the Organization of American Historians for significant contributions to history. Byrd had his share of controversy. He was at one time a member of the Ku Klux Klan , serving as the top officer of his local chapter and once held racial segregationist views. Byrd was involved in the filibuster against the landmark Civil Rights Act of 1964 , which he voted against. Byrd later explicitly and repeatedly denounced his former segregationist views. Byrd is the only Senator to have voted against the nominations of African-American Supreme Court justices Thurgood Marshall and Marshall's successor following his retirement, Clarence Thomas . Byrd's opposition of Thomas was based on the testimony of Anita Hill who accused Thomas of sexually harassing her and due to the fact that Byrd felt Thomas was \"injecting racism\" into the debate by using the phrase \"high-tech lynching of uppity blacks\" in his defense against the allegations. Byrd, who supported the Vietnam War , was one of the most outspoken critics of the War in Iraq . He voted against the Iraq War Resolution . Byrd spoke on the eve the invasion saying, \"Today I weep for my country. [...] No more is the image of America one of strong, yet benevolent peacekeeper. The image of America has changed. Around the globe, our friends mistrust us, our word is disputed, our intentions are questioned. Instead of reasoning with those with whom we disagree, we demand obedience or threaten recrimination.\"", "after_revision": " , the longest serving member of the , died yesterday at the age of 92. Senator Robert Byrd of West Virginia (1917-2010) A spokesman for the Democratic Senator from the state of West Virginia said Byrd had been hospitalized since last week. At first he was thought to have been suffering from and severe but other medical conditions developed. On Sunday, his condition was described as \"serious\". Byrd was first elected to the in 1952 and to the U.S. Senate in 1958. He suffered from ill health in recent years but retained his reputation for securing millions in federal funding for his home state. Throughout his career in the U.S Senate he held positions including , twice and once. Due to his status as the longest serving Senator, Byrd was serving as , which made him third in line in the Presidential line of succession. Senator of Hawaii has been sworn in as the new President pro tempore. Byrd served nine terms in the Senate and was labeled by critics as the \"King of \". He used his former chairmanship of the to steer over one billion dollars in federal aid to West Virginia, one of the poorest states in the country, described by him as, \"one of the rock bottomest [sic] of states\". Byrd was originally born as Cornelius Calvin Sale, Jr. on November 20, 1917. He grew up in the coal mining regions of southern West Virginia with his aunt and uncle, who adopted him following the death of his mother in the . He was the valedictorian of his high school class, but could not afford college and did not attend university courses until his 30s and 40s. The Senator had a fondness for history, and included excerpts of poetry, Shakespeare, Greek and Roman classics along with verses from the Bible in his Senate speeches. He considered himself a staunch defender of United States Constitution, and carried a copy of it in his pocket. Byrd was versed in using some of the Senate's arcane rules to his advantage. He received awards from the American Historical Association and the Organization of American Historians for significant contributions to history. Byrd had his share of controversy. He was at one time a member of the , serving as the top officer of his local chapter and once held racial segregationist views. Byrd was involved in the against the landmark , which he voted against. Byrd later explicitly and repeatedly denounced his former segregationist views. Byrd is the only Senator to have voted against the nominations of African-American justices and Marshall's successor following his retirement, . Byrd's opposition of Thomas was based on the testimony of who accused Thomas of sexually harassing her and due to the fact that Byrd felt Thomas was \"injecting racism\" into the debate by using the phrase \"high-tech lynching of uppity blacks\" in his defense against the allegations. Byrd, who supported the , was one of the most outspoken critics of the . He voted against the . Byrd spoke on the eve the invasion saying, \"Today I weep for my country. [...] No more is the image of America one of strong, yet benevolent peacekeeper. The image of America has changed. Around the globe, our friends mistrust us, our word is disputed, our intentions are questioned. Instead of reasoning with those with whom we disagree, we demand obedience or threaten recrimination.\"", "edit_actions": [{"type": "D", "before": "Senator Robert Byrd", "after": null, "start_char_pos": 0, "end_char_pos": 19}, {"type": "R", "before": "United States Congress", "after": ",", "start_char_pos": 56, "end_char_pos": 78}, {"type": "R", "before": "heat exhaustion and severe dehydration", "after": "and severe", "start_char_pos": 333, "end_char_pos": 371}, {"type": "D", "before": "U.S. House of Representatives", "after": null, "start_char_pos": 495, "end_char_pos": 524}, {"type": "R", "before": "Senate Majority Whip, Majority Leader twice and Minority Leader", "after": ", twice and", "start_char_pos": 766, "end_char_pos": 829}, {"type": "D", "before": "President pro tempore of the United States Senate", "after": null, "start_char_pos": 906, "end_char_pos": 955}, {"type": "D", "before": "Daniel Inouye", "after": null, "start_char_pos": 1035, "end_char_pos": 1048}, {"type": "D", "before": "Pork", "after": null, "start_char_pos": 1191, "end_char_pos": 1195}, {"type": "D", "before": "Senate Appropriations Committee", "after": null, "start_char_pos": 1238, "end_char_pos": 1269}, {"type": "D", "before": "1918 flu pandemic", "after": null, "start_char_pos": 1668, "end_char_pos": 1685}, {"type": "D", "before": "parliamentary procedure", "after": null, "start_char_pos": 2128, "end_char_pos": 2151}, {"type": "D", "before": "Ku Klux Klan", "after": null, "start_char_pos": 2426, "end_char_pos": 2438}, {"type": "D", "before": "filibuster", "after": null, "start_char_pos": 2557, "end_char_pos": 2567}, {"type": "D", "before": "Civil Rights Act of 1964", "after": null, "start_char_pos": 2589, "end_char_pos": 2613}, {"type": "R", "before": "Supreme Court justices Thurgood Marshall", "after": "justices", "start_char_pos": 2803, "end_char_pos": 2843}, {"type": "D", "before": "Clarence Thomas", "after": null, "start_char_pos": 2895, "end_char_pos": 2910}, {"type": "D", "before": "Anita Hill", "after": null, "start_char_pos": 2971, "end_char_pos": 2981}, {"type": "D", "before": "Vietnam War", "after": null, "start_char_pos": 3230, "end_char_pos": 3241}, {"type": "D", "before": "War in Iraq", "after": null, "start_char_pos": 3289, "end_char_pos": 3300}, {"type": "D", "before": "Iraq War Resolution", "after": null, "start_char_pos": 3324, "end_char_pos": 3343}], "sents_char_pos": [0, 111, 280, 411, 464, 564, 697, 835, 1026, 1110, 1198, 1444, 1521, 1687, 1828, 1996, 2108, 2209, 2355, 2390, 2531, 2639, 2719, 2912, 3205, 3302, 3499, 3533, 3629]}
+{"doc_id": "194412", "revision_depth": "1", "before_revision": "Location of Louisiana, Missouri, the abducted girl's hometown. The Amber Alert issued for four-year-old Alisa Maier of Louisiana , Missouri was canceled after Maier was found alive at a gas station late Tuesday night, just over 24 hours after her kidnapping. A person of interest in the incident shot himself when approached by police on Wednesday afternoon. The young Maier was playing with her six-year-old brother, Blake, when investigators say she was kidnapped at around 8 p.m. CDT (0200 UTC ) Monday evening. The brother ran inside the home to alert his parents after seeing an unfamiliar person drive away with his sister. Police say that the boy was the only witness to the incident, and provided them with a vague description of the suspect and vehicle in the case. Both of Maier's parents were inside their residence at the time of the abduction, and did not notice the incident until their son came in for help. Maier's mother attempted to pursue the kidnapper while waiting for police to arrive, but was unsuccessful. An Amber Alert was issued shortly afterwards, and over 100 searchers, some volunteers, began scouring through Louisiana on Tuesday morning. The Federal Bureau of Investigation (FBI) also joined in the investigation. Currently, the Louisiana Police Department, Missouri State Highway Patrol , FBI, and St. Louis County Police Department, are all involved in the investigation. At around 9:45 p.m. CDT (0245 UTC) Tuesday, Maier was found alive and apparently unharmed wandering near a car wash in Fenton. St. Louis County police were alerted to the area after several people reported that a small boy had been left unattended at the gas station. After talking with the child, police realized it was the missing Maier. She was taken to SSM St. Clare Medical Center for evaluation, released, and then taken to the St. Louis County Police West County Precinct. Early Wednesday morning, she was taken to another hospital, SSM Cardinal Glennon Children's Hospital , for more tests. Police said that Maier's hair was cut, possibly to make her look like a boy, but have not said whether she was sexually assaulted. Maier's family was said to be \"elated\" over the girl's safe return. They recently moved into the town of 4,000, where they have family, but Alisa Maier was born in Ohio. Louisiana is about 80 miles (128.7 kilometres) north of St. Louis and is situated next to the Mississippi River . On Wednesday afternoon, law enforcement officials were following a man driving a dark car to a home in Hawk Point , Missouri when the man reportedly shot himself around 4:30 p.m. CDT (2130 UTC). The man, called a \"person of interest\" in the case, was then transported to a Lake St. Louis hospital. Authorities have not officially released the man's identity, but sources identified the individual as Paul Serling Smith, a 38-year-old registered sex offender previously convicted of sodomy. The shooting occurred about midway between where the kidnapping took place and where Maier was found. Smith was listed in \"critical condition\" Wednesday night, and later died.", "after_revision": "Location of Louisiana, Missouri, the abducted girl's hometown. The issued for four-year-old Alisa Maier of , Missouri was canceled after Maier was found alive at a gas station late Tuesday night, just over 24 hours after her kidnapping. A person of interest in the incident shot himself when approached by police on Wednesday afternoon. The young Maier was playing with her six-year-old brother, Blake, when investigators say she was kidnapped at around 8 p.m. (0200 ) Monday evening. The brother ran inside the home to alert his parents after seeing an unfamiliar person drive away with his sister. Police say that the boy was the only witness to the incident, and provided them with a vague description of the suspect and vehicle in the case. Both of Maier's parents were inside their residence at the time of the abduction, and did not notice the incident until their son came in for help. Maier's mother attempted to pursue the kidnapper while waiting for police to arrive, but was unsuccessful. An Amber Alert was issued shortly afterwards, and over 100 searchers, some volunteers, began scouring through Louisiana on Tuesday morning. The (FBI) also joined in the investigation. Currently, the Louisiana Police Department, , FBI, and St. Louis County Police Department, are all involved in the investigation. At around 9:45 p.m. CDT (0245 UTC) Tuesday, Maier was found alive and apparently unharmed wandering near a car wash in . police were alerted to the area after several people reported that a small boy had been left unattended at the gas station. After talking with the child, police realized it was the missing Maier. She was taken to St. Clare Medical Center for evaluation, released, and then taken to the St. Louis County Police West County Precinct. Early Wednesday morning, she was taken to another hospital, SSM , for more tests. Police said that Maier's hair was cut, possibly to make her look like a boy, but have not said whether she was sexually assaulted. Maier's family was said to be \"elated\" over the girl's safe return. They recently moved into the town of 4,000, where they have family, but Alisa Maier was born in Ohio. Louisiana is about 80 miles (128.7 kilometres) north of and is situated next to the . On Wednesday afternoon, law enforcement officials were following a man driving a dark car to a home in , Missouri when the man reportedly shot himself around 4:30 p.m. CDT (2130 UTC). The man, called a \"person of interest\" in the case, was then transported to a hospital. Authorities have not officially released the man's identity, but sources identified the individual as Paul Serling Smith, a 38-year-old registered sex offender previously convicted of sodomy. The shooting occurred about midway between where the kidnapping took place and where Maier was found. Smith was listed in \"critical condition\" Wednesday night, and later died.", "edit_actions": [{"type": "D", "before": "Amber Alert", "after": null, "start_char_pos": 67, "end_char_pos": 78}, {"type": "D", "before": "Louisiana", "after": null, "start_char_pos": 119, "end_char_pos": 128}, {"type": "D", "before": "CDT", "after": null, "start_char_pos": 483, "end_char_pos": 486}, {"type": "D", "before": "UTC", "after": null, "start_char_pos": 493, "end_char_pos": 496}, {"type": "D", "before": "Federal Bureau of Investigation", "after": null, "start_char_pos": 1174, "end_char_pos": 1205}, {"type": "D", "before": "Missouri State Highway Patrol", "after": null, "start_char_pos": 1290, "end_char_pos": 1319}, {"type": "R", "before": "Fenton. St. Louis County", "after": ".", "start_char_pos": 1525, "end_char_pos": 1549}, {"type": "D", "before": "SSM", "after": null, "start_char_pos": 1763, "end_char_pos": 1766}, {"type": "D", "before": "Cardinal Glennon Children's Hospital", "after": null, "start_char_pos": 1950, "end_char_pos": 1986}, {"type": "D", "before": "St. Louis", "after": null, "start_char_pos": 2362, "end_char_pos": 2371}, {"type": "D", "before": "Mississippi River", "after": null, "start_char_pos": 2400, "end_char_pos": 2417}, {"type": "D", "before": "Hawk Point", "after": null, "start_char_pos": 2523, "end_char_pos": 2533}, {"type": "D", "before": "Lake St. Louis", "after": null, "start_char_pos": 2693, "end_char_pos": 2707}], "sents_char_pos": [0, 62, 258, 358, 514, 629, 774, 922, 1029, 1169, 1245, 1405, 1532, 1673, 1745, 1885, 2004, 2135, 2203, 2305, 2419, 2614, 2717, 2909, 3011]}
+{"doc_id": "195091", "revision_depth": "1", "before_revision": "The 2010 FIFA World Cup finals were played in Johannesburg's Soccer City stadium. Spain defeated the Netherlands in extra time 1\u20130 to win this year's FIFA World Cup . The winning goal came in the last few minutes of the match, which saw thirteen yellow cards and one red card. Yesterday's win marked Spain's first World Cup victory, in their first World Cup final appearance, making the Spanish team the eighth distinct team to have won the championship since it began in 1930. It was the second time that the European champion for that year won the World Cup as well, the first being West Germany 's victory in 1974. It was also the first time that a European team emerged as the World Cup victors on a continent other than Europe. For the Dutch, it was the third time they have lost in the World Cup finals, having done so in 1974 and 1978. The final match, played in Johannesburg's Soccer City stadium, stayed tied at 0\u20130 for all of regulation time. Called \"a very difficult match\" by Spanish coach Vicente del Bosque , the game started with a slow first half. The Dutch had an opportunity to take the lead in the second half, but Arjen Robben 's shots were blocked by Spanish captain Iker Casillas . The Netherlands were forced to play with only ten players near the end of extra time after John Heitinga was kicked out of the game. The winning shot of the match came from Spanish midfielder Andres Iniesta in the 116th minute, just four minutes from the end of extra time. He managed to kick the ball past Dutch goalkeeper Maarten Stekelenburg from just 8 metres (26.2 feet) away. If Iniesta had not made the goal, and game stayed scoreless until the end of extra time, the game would have been decided by a penalty shoot-out. Spain's victory was correctly predicted by the oracular animal Paul the Octopus. Paul's 2010 FIFA World Cup prediction record stayed at 100 per cent as a result. ", "after_revision": "The 2010 FIFA World Cup finals were played in Johannesburg's Soccer City stadium. Spain defeated the Netherlands in 1\u20130 to win this year's . The winning goal came in the last few minutes of the match, which saw thirteen yellow cards and one red card. Yesterday's win marked Spain's first World Cup victory, in their first World Cup final appearance, making the Spanish team the eighth distinct team to have won the championship since it began in 1930. It was the second time that the European champion for that year won the World Cup as well, the first being 's victory in 1974. It was also the first time that a European team emerged as the World Cup victors on a continent other than Europe. For the Dutch, it was the third time they have lost in the World Cup finals, having done so in 1974 and 1978. The final match, played in 's stadium, stayed tied at 0\u20130 for all of regulation time. Called \"a very difficult match\" by Spanish coach , the game started with a slow first half. The Dutch had an opportunity to take the lead in the second half, but 's shots were blocked by Spanish captain . The Netherlands were forced to play with only ten players near the end of extra time after was kicked out of the game. The winning shot of the match came from Spanish midfielder in the 116th minute, just four minutes from the end of extra time. He managed to kick the ball past Dutch goalkeeper from just 8 metres (26.2 feet) away. If Iniesta had not made the goal, and game stayed scoreless until the end of extra time, the game would have been decided by a penalty shoot-out. Spain's victory was correctly predicted by the Paul the Octopus. Paul's 2010 FIFA World Cup prediction record stayed at 100 per cent as a result. Related news", "edit_actions": [{"type": "D", "before": "extra time", "after": null, "start_char_pos": 116, "end_char_pos": 126}, {"type": "D", "before": "FIFA World Cup", "after": null, "start_char_pos": 150, "end_char_pos": 164}, {"type": "D", "before": "West Germany", "after": null, "start_char_pos": 585, "end_char_pos": 597}, {"type": "R", "before": "Johannesburg's Soccer City", "after": "'s", "start_char_pos": 870, "end_char_pos": 896}, {"type": "D", "before": "Vicente del Bosque", "after": null, "start_char_pos": 1002, "end_char_pos": 1020}, {"type": "D", "before": "Arjen Robben", "after": null, "start_char_pos": 1134, "end_char_pos": 1146}, {"type": "D", "before": "Iker Casillas", "after": null, "start_char_pos": 1188, "end_char_pos": 1201}, {"type": "D", "before": "John Heitinga", "after": null, "start_char_pos": 1295, "end_char_pos": 1308}, {"type": "D", "before": "Andres Iniesta", "after": null, "start_char_pos": 1396, "end_char_pos": 1410}, {"type": "D", "before": "Maarten Stekelenburg", "after": null, "start_char_pos": 1528, "end_char_pos": 1548}, {"type": "D", "before": "oracular animal", "after": null, "start_char_pos": 1779, "end_char_pos": 1794}, {"type": "A", "before": null, "after": "Related news", "start_char_pos": 1894, "end_char_pos": 1894}], "sents_char_pos": [0, 81, 166, 276, 477, 617, 732, 842, 952, 1063, 1203, 1336, 1477, 1585, 1731, 1812]}
+{"doc_id": "195365", "revision_depth": "1", "before_revision": "George Michael Steinbrenner III , businessman, owner and former principal executive of the New York Yankees , died at 6:30 a.m. EDT (1030 UTC ) Tuesday of a massive heart attack at St. Joseph's Hospital in Tampa, Florida , at age 80. Born on July 4, 1930, Steinbrenner, a former shipping magnate, bought the Yankees from CBS in 1973. As owner of the Yankees, he led the team to eleven American League pennants and seven World Series titles. Nicknamed \"The Boss,\" Steinbrenner pursued free agents with great fervor, signing Reggie Jackson to a five-year, US$3.5 million deal after the 1976 season. He also frequently changed managers, including firing and rehiring Billy Martin five times. Steinbrenner was banned from baseball in 1990 for paying US$ 400,000 to get information to discredit former Yankees outfielder David Winfield , but was reinstated in 1993. New York City mayor Michael Bloomberg ordered flags at City Hall Plaza to be lowered to half mast, saying, \"Our hearts and prayers go out to the entire Steinbrenner family. This is a sad day not only for Yankee fans, but for our entire city, as few people have had a bigger impact on New York over the past four decades than George Steinbrenner.\" Fred Wilpon, Jeff Wilpon, and Saul Katz, owners of the Yankees' crosstown rival Mets , said, \"The passing of George Steinbrenner marks the end of an era in New York City baseball history.\" Yankees legend Yogi Berra said, \"George was The Boss, make no mistake. He built the Yankees into champions and that's something nobody can ever deny. He was a very generous, caring, passionate man. George and I had our differences, but who didn't? We became great friends over the last decade and I will miss him very much.\" Current Commissioner of Baseball Bud Selig said that he is \"very saddened\" to hear of the loss and added, \"George was a giant of the game and his devotion to baseball was surpassed only by his devotion to his family and his beloved New York Yankees....We will miss him, especially Tuesday night when the baseball family will be gathered at Angel Stadium for the All-Star Game.\" Steinbrenner is survived by his wife Joan, two sisters, four children, including Hank and Hal, who took over Yankees operations in 2007, and his grandchildren. The Steinbrenner family said that he will have a private funeral and a public service would be held at a later date. His death comes at a time of great sadness for the Yankees, as two days earlier longtime Yankees public announcer Bob Sheppard died at 99.", "after_revision": " , businessman, owner and former principal executive of the , died at 6:30 a.m. (1030 ) Tuesday of a massive heart attack at St. Joseph's Hospital in , , at age 80. Born on July 4, 1930, Steinbrenner, a former shipping magnate, bought the Yankees from in 1973. As owner of the Yankees, he led the team to eleven pennants and seven titles. Nicknamed \"The Boss,\" Steinbrenner pursued free agents with great fervor, signing to a five-year, 3.5 million deal after the 1976 season. He also frequently changed managers, including firing and rehiring five times. Steinbrenner was banned from baseball in 1990 for paying US 400,000 to get information to discredit former Yankees outfielder , but was reinstated in 1993. mayor ordered flags at to be lowered to half mast, saying, \"Our hearts and prayers go out to the entire Steinbrenner family. This is a sad day not only for Yankee fans, but for our entire city, as few people have had a bigger impact on New York over the past four decades than George Steinbrenner.\" Fred Wilpon, Jeff Wilpon, and Saul Katz, owners of the Yankees' crosstown rival , said, \"The passing of George Steinbrenner marks the end of an era in New York City baseball history.\" Yankees legend said, \"George was The Boss, make no mistake. He built the Yankees into champions and that's something nobody can ever deny. He was a very generous, caring, passionate man. George and I had our differences, but who didn't? We became great friends over the last decade and I will miss him very much.\" Current Commissioner of Baseball said that he is \"very saddened\" to hear of the loss and added, \"George was a giant of the game and his devotion to baseball was surpassed only by his devotion to his family and his beloved New York Yankees....We will miss him, especially Tuesday night when the baseball family will be gathered at Angel Stadium for the All-Star Game.\" Steinbrenner is survived by his wife Joan, two sisters, four children, including Hank and Hal, who took over Yankees operations in 2007, and his grandchildren. The Steinbrenner family said that he will have a private funeral and a public service would be held at a later date. His death comes at a time of great sadness for the Yankees, as two days earlier longtime Yankees public announcer died at 99.", "edit_actions": [{"type": "D", "before": "George Michael Steinbrenner III", "after": null, "start_char_pos": 0, "end_char_pos": 31}, {"type": "D", "before": "New York Yankees", "after": null, "start_char_pos": 91, "end_char_pos": 107}, {"type": "D", "before": "EDT", "after": null, "start_char_pos": 128, "end_char_pos": 131}, {"type": "D", "before": "UTC", "after": null, "start_char_pos": 138, "end_char_pos": 141}, {"type": "D", "before": "Tampa, Florida", "after": null, "start_char_pos": 206, "end_char_pos": 220}, {"type": "A", "before": null, "after": ",", "start_char_pos": 223, "end_char_pos": 223}, {"type": "D", "before": "CBS", "after": null, "start_char_pos": 322, "end_char_pos": 325}, {"type": "D", "before": "American League", "after": null, "start_char_pos": 386, "end_char_pos": 401}, {"type": "D", "before": "World Series", "after": null, "start_char_pos": 421, "end_char_pos": 433}, {"type": "D", "before": "Reggie Jackson", "after": null, "start_char_pos": 524, "end_char_pos": 538}, {"type": "R", "before": "US$3.5 million deal after the 1976 season. He also frequently changed managers, including firing and rehiring Billy Martin five times. Steinbrenner was banned from baseball in 1990 for paying US$", "after": "3.5 million deal after the 1976 season. He also frequently changed managers, including firing and rehiring five times. Steinbrenner was banned from baseball in 1990 for paying US", "start_char_pos": 555, "end_char_pos": 750}, {"type": "D", "before": "David Winfield", "after": null, "start_char_pos": 817, "end_char_pos": 831}, {"type": "R", "before": "New York City mayor Michael Bloomberg", "after": "mayor", "start_char_pos": 862, "end_char_pos": 899}, {"type": "D", "before": "City Hall Plaza", "after": null, "start_char_pos": 917, "end_char_pos": 932}, {"type": "D", "before": "Mets", "after": null, "start_char_pos": 1289, "end_char_pos": 1293}, {"type": "D", "before": "Yogi Berra", "after": null, "start_char_pos": 1413, "end_char_pos": 1423}, {"type": "D", "before": "Bud Selig", "after": null, "start_char_pos": 1756, "end_char_pos": 1765}, {"type": "D", "before": "Bob Sheppard", "after": null, "start_char_pos": 2492, "end_char_pos": 2504}], "sents_char_pos": [0, 234, 334, 441, 597, 689, 861, 1034, 1208, 1397, 1468, 1547, 1595, 1645, 1975, 2100, 2260, 2377]}
+{"doc_id": "195758", "revision_depth": "1", "before_revision": "upright=1.5| Saadanius hijazensis , a new species of fossil primate closely related to Old World monkeys and apes . Researchers have unearthed a new fossil primate that they think may be closely related to the common ancestor of apes and Old World monkeys , collectively known as catarrhine primates. Paleontologist Iyad Zalmout of the University of Michigan discovered the new species, Saadanius hijazensis near Mecca in Saudi Arabia ; the discovery gives new insights into human evolution . The specimen, a partial skull, dates to the Oligocene , approximately 29 to 28 million years ago, and exhibits puncture wounds from a large predator that may have killed it. Saadanius is thought to have been a tree-dweller and lived at a time when the Arabian peninsula had not yet split away from the African continent, forming the Red Sea . The discovery may help resolve the dating of the split between Old World monkeys and apes. Paleoanthropologists have traditionally dated the divergence to between 25 and 23 million years ago, based on early fossils of the two groups. Genetic studies, however, date it to between 30 to 35 million years ago. Although Saadanius shares some features with living catarrhine primates, such as a bony ear tube, called an ectotympanic , it also possesses other features more common in the fossils of primitive or basal catarrhines, from which Old World monkeys and apes did not evolve. These basal features include a longer face and the lack of a frontal sinus .", "after_revision": "upright=1.5| , a new species of fossil primate closely related to and . Researchers have unearthed a new fossil that they think may be closely related to the common ancestor of and , collectively known as primates. Paleontologist Iyad Zalmout of the discovered the new species, near in ; the discovery gives new insights into . The specimen, a partial skull, dates to the , approximately 29 to 28 million years ago, and exhibits puncture wounds from a large predator that may have killed it. Saadanius is thought to have been a tree-dweller and lived at a time when the had not yet split away from the African continent, forming the . The discovery may help resolve the dating of the split between Old World monkeys and apes. have traditionally dated the divergence to between 25 and 23 million years ago, based on early fossils of the two groups. Genetic studies, however, date it to between 30 to 35 million years ago. Although Saadanius shares some features with living catarrhine primates, such as a bony ear tube, called an , it also possesses other features more common in the fossils of primitive or catarrhines, from which Old World monkeys and apes did not evolve. These basal features include a longer face and the lack of a .", "edit_actions": [{"type": "D", "before": "Saadanius hijazensis", "after": null, "start_char_pos": 13, "end_char_pos": 33}, {"type": "R", "before": "Old World monkeys and apes", "after": "and", "start_char_pos": 87, "end_char_pos": 113}, {"type": "D", "before": "primate", "after": null, "start_char_pos": 156, "end_char_pos": 163}, {"type": "R", "before": "apes and Old World monkeys", "after": "and", "start_char_pos": 229, "end_char_pos": 255}, {"type": "D", "before": "catarrhine", "after": null, "start_char_pos": 280, "end_char_pos": 290}, {"type": "D", "before": "University of Michigan", "after": null, "start_char_pos": 336, "end_char_pos": 358}, {"type": "R", "before": "Saadanius hijazensis near Mecca in Saudi Arabia", "after": "near in", "start_char_pos": 387, "end_char_pos": 434}, {"type": "D", "before": "human evolution", "after": null, "start_char_pos": 475, "end_char_pos": 490}, {"type": "D", "before": "Oligocene", "after": null, "start_char_pos": 537, "end_char_pos": 546}, {"type": "D", "before": "Arabian peninsula", "after": null, "start_char_pos": 745, "end_char_pos": 762}, {"type": "D", "before": "Red Sea", "after": null, "start_char_pos": 826, "end_char_pos": 833}, {"type": "D", "before": "Paleoanthropologists", "after": null, "start_char_pos": 927, "end_char_pos": 947}, {"type": "D", "before": "ectotympanic", "after": null, "start_char_pos": 1251, "end_char_pos": 1263}, {"type": "D", "before": "basal", "after": null, "start_char_pos": 1342, "end_char_pos": 1347}, {"type": "D", "before": "frontal sinus", "after": null, "start_char_pos": 1476, "end_char_pos": 1489}], "sents_char_pos": [0, 300, 436, 492, 666, 835, 926, 1069, 1142, 1414]}
+{"doc_id": "197042", "revision_depth": "1", "before_revision": "For the second time this season, Leongatha defeated Gippsland Football League heavyweights Traralgon . Playing at home, they went on to win by sixteen points. The Gippsland Football League, officially the Gippsland League, is the only major Australian rules football competition in the Gippsland region according to the Victorian Country Football League . The final quarter saw Traralgon fight back and come within three goals of taking an unlikely victory. They managed to kick seven goals to Leongatha's, one goal, one behind to end the day losing by 16 points, 11-7 (73) to 9-3 (57). Around the grounds, Drouin kicked three more behinds than the aggregate of the match described above as they defeated Sale in Sale 20-13 (133) to 17-8 (110), an inaccurate Maffra defeated a dismal Warragul in Warragul 13-26 (104) to 1-3 (9) and Moe traveled to Morwel to defeat the hosts 17-13 (115) to 11-17 (83).", "after_revision": "For the second time this season, defeated heavyweights . Playing at home, they went on to win by sixteen points. The Gippsland Football League, officially the Gippsland League, is the only major competition in the region according to the . The final quarter saw Traralgon fight back and come within three goals of taking an unlikely victory. They managed to kick seven goals to Leongatha's, one goal, one behind to end the day losing by 16 points, 11\u20137 (73) to 9\u20133 (57). Around the grounds, kicked three more behinds than the aggregate of the match described above as they defeated Sale in 20\u201313 (133) to 17\u20138 (110), an inaccurate defeated a dismal Warragul in 13\u201326 (104) to 1\u20133 (9) and traveled to to defeat the hosts 17\u201313 (115) to 11\u201317 (83).", "edit_actions": [{"type": "R", "before": "Leongatha defeated Gippsland Football League heavyweights Traralgon", "after": "defeated heavyweights", "start_char_pos": 33, "end_char_pos": 100}, {"type": "D", "before": "Australian rules football", "after": null, "start_char_pos": 241, "end_char_pos": 266}, {"type": "D", "before": "Gippsland", "after": null, "start_char_pos": 286, "end_char_pos": 295}, {"type": "D", "before": "Victorian Country Football League", "after": null, "start_char_pos": 320, "end_char_pos": 353}, {"type": "R", "before": "11-7", "after": "11\u20137", "start_char_pos": 564, "end_char_pos": 568}, {"type": "R", "before": "9-3", "after": "9\u20133", "start_char_pos": 577, "end_char_pos": 580}, {"type": "D", "before": "Drouin", "after": null, "start_char_pos": 607, "end_char_pos": 613}, {"type": "R", "before": "Sale 20-13", "after": "20\u201313", "start_char_pos": 713, "end_char_pos": 723}, {"type": "R", "before": "17-8", "after": "17\u20138", "start_char_pos": 733, "end_char_pos": 737}, {"type": "D", "before": "Maffra", "after": null, "start_char_pos": 759, "end_char_pos": 765}, {"type": "R", "before": "Warragul 13-26", "after": "13\u201326", "start_char_pos": 796, "end_char_pos": 810}, {"type": "R", "before": "1-3", "after": "1\u20133", "start_char_pos": 820, "end_char_pos": 823}, {"type": "R", "before": "Moe traveled to Morwel", "after": "traveled", "start_char_pos": 832, "end_char_pos": 854}, {"type": "A", "before": null, "after": "to", "start_char_pos": 858, "end_char_pos": 858}, {"type": "R", "before": "17-13", "after": "17\u201313", "start_char_pos": 876, "end_char_pos": 881}, {"type": "R", "before": "11-17", "after": "11\u201317", "start_char_pos": 891, "end_char_pos": 896}], "sents_char_pos": [0, 158, 355, 457, 586]}
+{"doc_id": "197156", "revision_depth": "1", "before_revision": "The Open Rights Group , a pressure group pursuing reform of intellectual property law in the United Kingdom, held its first \"ORGCon\" yesterday at City University London . Approximately 100 delegates took part in six hours of panel discussions and workshops on a wide range of topics in intellectual property, discussing such subjects as \"How To Talk To Your MP \" and \"ACTA: A Shady Business\", in what ORG billed as a \"crash course in digital rights\" designed to inspire campaigning on intellectual property issues. Cory Doctorow , a fiction author and digital rights activist, led the keynote panel discussion \"Thriving in the Real Digital Economy\", which opened the conference. Doctorow called for a \"reframing\" of the digital rights slogan \"information wants to be free\". \"The most important thing\" about digital rights, he noted, \"has nothing to do with art. We are refitting the information network with lots of control.\" Digital rights management (DRM) technologies, Doctorow warns, build in limitations on how consumers exchange information and \"abuse the market\". John Buckman of Magnatune followed up Doctorow's comments, noting that DRM is \"unsustainable\" but that the public needed to \"pressure companies into\" open-source solutions. A keynote speech by James Boyle compared the current age to the age just before application of the theories of Adam Smith and other early capitalist economists began breaking down the entrenched monopolies of mercantilism . Boyle called on the audience to come up with a \"jaw droppingly simple\" idea for a reformed copyright system; he gave his speech in front of a projection of the twitterfall as audience members commented on his words. Boyle, like most of the conference, took a pro-reform but anti-piracy position, saying \"It is a tragedy that an entire generation has lost the notion that breaking the law is wrong\". While several members of the Pirate Party UK , wearing matching t-shirts, attended the conference and held a fringe meeting during the last session, none spoke in the keynote sessions either as panelists or in the discussions.", "after_revision": "London \u2014 The , a pressure group pursuing reform of law in the United Kingdom, held its first \"ORGCon\" yesterday at . Approximately 100 delegates took part in six hours of panel discussions and workshops on a wide range of topics in intellectual property, discussing such subjects as \"How To Talk To Your \" and \"ACTA: A Shady Business\", in what ORG billed as a \"crash course in digital rights\" designed to inspire campaigning on intellectual property issues. , a fiction author and digital rights activist, led the keynote panel discussion \"Thriving in the Real Digital Economy\", which opened the conference. Doctorow called for a \"reframing\" of the digital rights slogan \"information wants to be free\". \"The most important thing\" about digital rights, he noted, \"has nothing to do with art. We are refitting the information network with lots of control.\" (DRM) technologies, Doctorow warns, build in limitations on how consumers exchange information and \"abuse the market\". John Buckman of followed up Doctorow's comments, noting that DRM is \"unsustainable\" but that the public needed to \"pressure companies into\" open-source solutions. A keynote speech by compared the current age to the age just before application of the theories of and other early capitalist economists began breaking down the entrenched monopolies of . Boyle called on the audience to come up with a \"jaw droppingly simple\" idea for a reformed copyright system; he gave his speech in front of a projection of the as audience members commented on his words. Boyle, like most of the conference, took a pro-reform but anti- position, saying \"It is a tragedy that an entire generation has lost the notion that breaking the law is wrong\". While several members of the , wearing matching t-shirts, attended the conference and held a during the last session, none spoke in the keynote sessions either as panelists or in the discussions.", "edit_actions": [{"type": "R", "before": "The Open Rights Group", "after": "London \u2014 The", "start_char_pos": 0, "end_char_pos": 21}, {"type": "D", "before": "intellectual property", "after": null, "start_char_pos": 60, "end_char_pos": 81}, {"type": "D", "before": "City University London", "after": null, "start_char_pos": 146, "end_char_pos": 168}, {"type": "D", "before": "MP", "after": null, "start_char_pos": 358, "end_char_pos": 360}, {"type": "D", "before": "Cory Doctorow", "after": null, "start_char_pos": 515, "end_char_pos": 528}, {"type": "D", "before": "Digital rights management", "after": null, "start_char_pos": 926, "end_char_pos": 951}, {"type": "D", "before": "Magnatune", "after": null, "start_char_pos": 1087, "end_char_pos": 1096}, {"type": "D", "before": "James Boyle", "after": null, "start_char_pos": 1264, "end_char_pos": 1275}, {"type": "D", "before": "Adam Smith", "after": null, "start_char_pos": 1355, "end_char_pos": 1365}, {"type": "D", "before": "mercantilism", "after": null, "start_char_pos": 1453, "end_char_pos": 1465}, {"type": "D", "before": "twitterfall", "after": null, "start_char_pos": 1628, "end_char_pos": 1639}, {"type": "R", "before": "anti-piracy", "after": "anti-", "start_char_pos": 1742, "end_char_pos": 1753}, {"type": "D", "before": "Pirate Party UK", "after": null, "start_char_pos": 1896, "end_char_pos": 1911}, {"type": "D", "before": "fringe meeting", "after": null, "start_char_pos": 1976, "end_char_pos": 1990}], "sents_char_pos": [0, 373, 514, 678, 773, 861, 925, 1070, 1243, 1576, 1683, 1866]}
+{"doc_id": "197522", "revision_depth": "1", "before_revision": "Apple's new Magic Trackpad, seen from above On Tuesday, Apple Inc. introduced a new peripheral, the Magic Trackpad , and refreshed its line of iMac and Mac Pro computers, as well as the Apple Cinema Display . The Magic Trackpad, a multi-touch trackpad for Macintosh computers, allows end users to use certain gestures to control on-screen actions. It supports gestures already seen on the MacBook and MacBook Pro trackpads, as well as the iPhone, iPod Touch, and iPad , such as swiping, tap-to-click, and pinch-to-zoom. However, the Magic Trackpad also supports physical clicking and supports one- and two-button commands. The Magic Trackpad, which is retailed for US$69, connects wirelessly to a computer using Bluetooth technology and has a claimed four months of battery life. At 5.17 inches (13.13 centimetres) long and 5.12 inches (13 centimetres) wide, the glass and aluminium device is slightly larger than Apple's laptop trackpads. In addition to the Magic Trackpad, Apple also began selling the US$29 Apple Battery Charger accessory, a charger pack with six rechargeable batteries usable in the Magic Trackpad, Apple Wireless Keyboard, and Apple Magic Mouse. Apple claims that the nickel-metal hydride (NiMH) batteries can last up to ten years before they lose their ability to hold a charge. The Magic Trackpad uses two AA batteries, and can be used with any Bluetooth-enabled Macintosh computer running Mac OS X 10.6.4. Another major announcement that came on Tuesday was the first iMac update since last fall. The update included mostly internal upgrades, giving consumers a choice of newer Intel processors: the dual-core Core i3 and Core i5, and the quad-core Core i5 and Core i7. In addition, the SD card slot was expanded to allow support for the Secure Digital Extended Capacity (SDXC) format. The iMac is still available at 21.5-inch (54.61-centimetre) and 27-inch (68.58-centimetre) display options, but has upgraded graphics cards as well. The screens use in-plane switching (IPS) technology, allowing for a greater viewing angle. The base model is still priced at US$1,199. Apple's line of Mac Pro computers were also given a refresh on Tuesday. Consumers now have the option to purchase a Mac Pro with twelve processing cores, using two six-core Intel Xeon processors. Four-, six-, and eight-core options are still available. The update also includes the choice of adding up to four, 512GB solid state drives, instead of conventional hard drives. The base model is priced at US$2,499 and will be sold starting in August. Apple also released a new, 27-inch (68.58 centimetre) LED Cinema Display, a 60 percent increase in display area from the older 24-inch (60.96 centimetres) Cinema Display. The new monitor can reach a resolution of 2560-by-1440 pixels, or Wide Quad High Definition, and has a built-in microphone, webcam, speakers, USB hub, and ambient light sensor, which changes the display's brightness based on external lighting levels. It is priced at US 999 but will not be available for purchase until September.", "after_revision": "Apple's new Magic Trackpad, seen from above On Tuesday, Apple Inc. introduced a new , the , and refreshed its line of and computers, as well as the . The Magic Trackpad, a for Macintosh computers, allows end users to use certain gestures to control on-screen actions. It supports gestures already seen on the and trackpads, as well as the , , and , such as swiping, tap-to-click, and pinch-to-zoom. However, the Magic Trackpad also supports physical clicking and supports one- and two-button commands. The Magic Trackpad, which is retailed for 69, connects wirelessly to a computer using technology and has a claimed four months of battery life. At 5.17 inches (13.13 centimetres) long and 5.12 inches (13 centimetres) wide, the glass and aluminium device is slightly larger than Apple's laptop trackpads. In addition to the Magic Trackpad, Apple also began selling the US$29 Apple Battery Charger accessory, a charger pack with six usable in the Magic Trackpad, , and . Apple claims that the (NiMH) batteries can last up to ten years before they lose their ability to hold a charge. The Magic Trackpad uses two , and can be used with any Bluetooth-enabled Macintosh computer running 10.6.4. Another major announcement that came on Tuesday was the first iMac update since last fall. The update included mostly internal upgrades, giving consumers a choice of newer processors: the and , and the Core i5 and . In addition, the slot was expanded to allow support for the (SDXC) format. The iMac is still available at 21.5-inch (54.61-centimetre) and 27-inch (68.58-centimetre) display options, but has upgraded as well. The screens use (IPS) technology, allowing for a greater viewing angle. The base model is still priced at US$1,199. Apple 's line of Mac Pro computers were also given a refresh on Tuesday. Consumers now have the option to purchase a Mac Pro with twelve processing cores, using two six-core Intel processors. Four-, six-, and eight-core options are still available. The update also includes the choice of adding up to four, 512 , instead of conventional . The base model is priced at US $2,499 and will be sold starting in August. Apple also released a new, 27-inch (68.58 centimetre) Cinema Display, a 60 percent increase in display area from the older 24-inch (60.96 centimetres) Cinema Display. The new monitor can reach a resolution of 2560-by-1440 pixels, or , and has a built-in microphone, webcam, speakers, , and , which changes the display's brightness based on external lighting levels. It is priced at US$ 999 but will not be available for purchase until September.", "edit_actions": [{"type": "D", "before": "peripheral, the Magic Trackpad", "after": null, "start_char_pos": 84, "end_char_pos": 114}, {"type": "A", "before": null, "after": "the ,", "start_char_pos": 117, "end_char_pos": 117}, {"type": "R", "before": "iMac and Mac Pro", "after": "and", "start_char_pos": 144, "end_char_pos": 160}, {"type": "D", "before": "Apple Cinema Display", "after": null, "start_char_pos": 187, "end_char_pos": 207}, {"type": "D", "before": "multi-touch trackpad", "after": null, "start_char_pos": 232, "end_char_pos": 252}, {"type": "R", "before": "MacBook and MacBook Pro", "after": "and", "start_char_pos": 390, "end_char_pos": 413}, {"type": "D", "before": "iPhone, iPod Touch, and iPad", "after": null, "start_char_pos": 440, "end_char_pos": 468}, {"type": "A", "before": null, "after": ", and ,", "start_char_pos": 471, "end_char_pos": 471}, {"type": "R", "before": "US$69, connects wirelessly to a computer using Bluetooth technology and has a claimed four months of battery life. At 5.17 inches (13.13 centimetres) long and 5.12 inches (13 centimetres) wide, the glass and aluminium device is slightly larger than Apple's laptop trackpads. In addition to the Magic Trackpad, Apple also began selling the US$29 Apple Battery Charger accessory, a charger pack with six rechargeable batteries usable in the Magic Trackpad, Apple Wireless Keyboard, and Apple Magic Mouse. Apple claims that the nickel-metal hydride (NiMH) batteries can last up to ten years before they lose their ability to hold a charge. The Magic Trackpad uses two AA batteries, and can be used with any Bluetooth-enabled Macintosh computer running Mac OS X 10.6.4.", "after": "69, connects wirelessly to a computer using technology and has a claimed four months of battery life. At 5.17 inches (13.13 centimetres) long and 5.12 inches (13 centimetres) wide, the glass and aluminium device is slightly larger than Apple's laptop trackpads.", "start_char_pos": 667, "end_char_pos": 1432}, {"type": "A", "before": null, "after": "In addition to the Magic Trackpad, Apple also began selling the US$29 Apple Battery Charger accessory, a charger pack with six usable in the Magic Trackpad, , and . Apple claims that the (NiMH) batteries can last up to ten years before they lose their ability to hold a charge. The Magic Trackpad uses two , and can be used with any Bluetooth-enabled Macintosh computer running 10.6.4. Another major announcement that came on Tuesday was the first iMac update since last fall. The update included mostly internal upgrades, giving consumers a choice of newer processors: the and , and the Core i5 and . In addition, the slot was expanded to allow support for the (SDXC) format. The iMac is still available at 21.5-inch (54.61-centimetre) and 27-inch (68.58-centimetre) display options, but has upgraded as well. The screens use (IPS) technology, allowing for a greater viewing angle. The base model is still priced at US$1,199.", "start_char_pos": 1433, "end_char_pos": 1433}, {"type": "D", "before": "Another major announcement that came on Tuesday was the first iMac update since last fall. The update included mostly internal upgrades, giving consumers a choice of newer Intel processors: the dual-core Core i3 and Core i5, and the quad-core Core i5 and Core i7. In addition, the SD card slot was expanded to allow support for the Secure Digital Extended Capacity (SDXC) format. The iMac is still available at 21.5-inch (54.61-centimetre) and 27-inch (68.58-centimetre) display options, but has upgraded graphics cards as well. The screens use in-plane switching (IPS) technology, allowing for a greater viewing angle. The base model is still priced at US$1,199. Apple's line of Mac Pro computers were also given a refresh on Tuesday. Consumers now have the option to purchase a Mac Pro with twelve processing cores, using two six-core Intel Xeon processors. Four-, six-, and eight-core options are still available. The update also includes the choice of adding up to four, 512GB solid state drives, instead of conventional hard drives. The base model is priced at US$2,499 and will be sold starting in August.", "after": null, "start_char_pos": 1434, "end_char_pos": 2545}, {"type": "R", "before": "also released a new, 27-inch (68.58 centimetre) LED Cinema Display, a 60 percent increase in display area from the older 24-inch (60.96 centimetres) Cinema Display. The new monitor can reach a resolution of 2560-by-1440 pixels, or Wide Quad High Definition, and has a built-in microphone, webcam, speakers, USB hub, and ambient light sensor, which changes the display's brightness based on external lighting levels. It", "after": "'s line of Mac Pro computers were also given a refresh on Tuesday. Consumers now have the option to purchase a Mac Pro with twelve processing cores, using two six-core Intel processors. Four-, six-, and eight-core options are still available. The update also includes the choice of adding up to four, 512 , instead of conventional . The base model", "start_char_pos": 2552, "end_char_pos": 2970}, {"type": "A", "before": null, "after": "$2,499 and will be sold starting in August. Apple also released a new, 27-inch (68.58 centimetre) Cinema Display, a 60 percent increase in display area from the older 24-inch (60.96 centimetres) Cinema Display. The new monitor can reach a resolution of 2560-by-1440 pixels, or , and has a built-in microphone, webcam, speakers, , and , which changes the display's brightness based on external lighting levels. It is priced at US$", "start_char_pos": 2987, "end_char_pos": 2987}], "sents_char_pos": [0, 209, 348, 521, 624, 781, 941, 1169, 1303, 1432, 1524, 1697, 1813, 1962, 2053, 2097, 2169, 2293, 2350, 2471, 2545, 2716, 2967]}
+{"doc_id": "199277", "revision_depth": "1", "before_revision": "Hiroshima aftermath The 65th anniversary of the first use of an atomic bomb against people has been remembered in a ceremony Thursday in Hiroshima , Japan. The atomic bomb, code-named \" Little Boy \", was dropped on Hiroshima at precisely 08:15 local time on August 6, 1945 by the specially converted United States Army Air Force B-29 Superfortress bomber Enola Gay piloted by Colonel Paul Tibbets , who later retired as a brigadier general in the United States Air Force . U.S. Ambassador to Japan John Roos also attended, marking the first time that a U.S. representative has attended the ceremony. Meanwhile, some conservatives in the United States have criticised the choice for Roos to attend. Gene Tibbets, the son of retired Brigadier General Tibbets said on Fox News , \"It's making the Japanese look like they're the poor people, like they didn't do anything. They hit Pearl Harbor, they struck us. We didn't slaughter the Japanese. We stopped the war.\" Three days after Hiroshima, another atomic bomb, \" Fat Man \", was dropped on nearby Nagasaki . The Japanese Government surrendered unconditionally on August 15, and signed the formal surrender on the USS Missouri on September 2 in Tokyo Bay .", "after_revision": "Hiroshima aftermath The 65th anniversary of the has been remembered in a ceremony Thursday in , Japan. The atomic bomb, code-named \" \", was dropped on Hiroshima at precisely 08:15 local time on August 6, 1945 by the specially converted bomber piloted by Colonel , who later retired as a brigadier general in the . U.S. Ambassador to Japan also attended, marking the first time that a U.S. representative has attended the ceremony. Meanwhile, some conservatives in the United States have criticised the choice for Roos to attend. Gene Tibbets, the son of retired Brigadier General Tibbets said on , \"It's making the Japanese look like they're the poor people, like they didn't do anything. They hit Pearl Harbor, they struck us. We didn't slaughter the Japanese. We stopped the war.\" Three days after Hiroshima, another atomic bomb, \" \", was dropped on nearby . The Japanese Government surrendered unconditionally on August 15, and signed the formal surrender on the on September 2 in .", "edit_actions": [{"type": "D", "before": "first use of an atomic bomb against people", "after": null, "start_char_pos": 48, "end_char_pos": 90}, {"type": "D", "before": "Hiroshima", "after": null, "start_char_pos": 137, "end_char_pos": 146}, {"type": "D", "before": "Little Boy", "after": null, "start_char_pos": 186, "end_char_pos": 196}, {"type": "R", "before": "United States Army Air Force B-29 Superfortress bomber Enola Gay", "after": "bomber", "start_char_pos": 300, "end_char_pos": 364}, {"type": "D", "before": "Paul Tibbets", "after": null, "start_char_pos": 384, "end_char_pos": 396}, {"type": "D", "before": "United States Air Force", "after": null, "start_char_pos": 447, "end_char_pos": 470}, {"type": "D", "before": "John Roos", "after": null, "start_char_pos": 498, "end_char_pos": 507}, {"type": "D", "before": "Fox News", "after": null, "start_char_pos": 765, "end_char_pos": 773}, {"type": "D", "before": "Fat Man", "after": null, "start_char_pos": 1012, "end_char_pos": 1019}, {"type": "D", "before": "Nagasaki", "after": null, "start_char_pos": 1045, "end_char_pos": 1053}, {"type": "D", "before": "USS Missouri", "after": null, "start_char_pos": 1161, "end_char_pos": 1173}, {"type": "D", "before": "Tokyo Bay", "after": null, "start_char_pos": 1192, "end_char_pos": 1201}], "sents_char_pos": [0, 155, 599, 697, 866, 905, 939, 960, 1055]}
+{"doc_id": "200264", "revision_depth": "2", "before_revision": "I like making Wikinews Shorts and the quiz, but I also like doing the harder stuff. Other interesting Shankarnikhil88-related stuff An alternative homepage I created- In working order A page I created for mobile devices- In working order Another main page- In working order User:Shankarnikhil88/Wikibusiness- In working order User:Shankarnikhil88/Wikiculture- In working order Shankarnikhil88-related stuff that failed or doesn't work Another page I created for mobile devices- In working order, not updated A page for searching- Not in working order A second page- Not updated Another main page- In working order User:Shankarnikhil88/mynews- Not in working order%DIFDELCMD < %DIFDELCMD < %%% Articles on Wikipedia that I've edited URL (with IP)%DIFDELCMD < %DIFDELCMD < %%% URL URL%DIFDELCMD < %DIFDELCMD < %%% URL URL%DIFDELCMD < %DIFDELCMD < %%% URL Articles on Wikinews that I've made or edited", "after_revision": "I like making Wikinews Shorts and the quiz, but I also like doing the harder stuff. I made a lot of alt homepages for Wikinews but that's junk and I don't know how to delete them so just ignore them. %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% Articles on Wikinews that I've made (or edited)", "edit_actions": [{"type": "A", "before": null, "after": "I made a lot of alt homepages for Wikinews but that's junk and I don't know how to delete them so just ignore them.", "start_char_pos": 84, "end_char_pos": 84}, {"type": "D", "before": "Other interesting Shankarnikhil88-related stuff An alternative homepage I created- In working order A page I created for mobile devices- In working order Another main page- In working order User:Shankarnikhil88/Wikibusiness- In working order User:Shankarnikhil88/Wikiculture- In working order", "after": null, "start_char_pos": 85, "end_char_pos": 377}, {"type": "D", "before": "Shankarnikhil88-related stuff that failed or doesn't work Another page I created for mobile devices- In working order, not updated A page for searching- Not in working order A second page- Not updated Another main page- In working order User:Shankarnikhil88/mynews- Not in working order", "after": null, "start_char_pos": 378, "end_char_pos": 664}, {"type": "D", "before": "Articles on Wikipedia that I've edited", "after": null, "start_char_pos": 694, "end_char_pos": 732}, {"type": "D", "before": "URL (with IP)", "after": null, "start_char_pos": 733, "end_char_pos": 746}, {"type": "D", "before": "URL", "after": null, "start_char_pos": 776, "end_char_pos": 779}, {"type": "D", "before": "URL", "after": null, "start_char_pos": 780, "end_char_pos": 783}, {"type": "D", "before": "URL", "after": null, "start_char_pos": 813, "end_char_pos": 816}, {"type": "D", "before": "URL", "after": null, "start_char_pos": 817, "end_char_pos": 820}, {"type": "D", "before": "URL", "after": null, "start_char_pos": 850, "end_char_pos": 853}, {"type": "R", "before": "Articles on", "after": "Articles on", "start_char_pos": 854, "end_char_pos": 865}, {"type": "R", "before": "or edited", "after": "(or edited)", "start_char_pos": 890, "end_char_pos": 899}], "sents_char_pos": [0, 83, 280, 332, 620]}
+{"doc_id": "202088", "revision_depth": "1", "before_revision": "Christoph Schlingensief in 2009 German director Christoph Schlingensief has died at the age of 49. His death was announced by Oliver Golloch , a spokesman for the Ruhrtriennale festival . Schlingensief had been suffering from lung cancer but no official cause of death was given by the spokesman. The film and theatre director worked on several films, plays, and operas throughout his controversial career. Schlingensief directed films such as \u201c 100 Years of Adolf Hitler\u201d and \u201c The German Chainsaw Massacre \u201d . He was arrested in 1997 for his exhibition of work called \u201cKill Helmut Kohl\u201d , aimed at the then Chancellor . Besides plays shown in Germany, Schlingensief also worked in Austria and Switzerland. He was the director of the Richard Wagner festival in both Bayreuth , Germany and Brazil. During his time working in Bayreuth he said \u201c Bayreuth will give me cancer. \u201d Coincidently, four years later Schlingensief was diagnosed with lung cancer even though he was a non-smoker. Despite the cancer he continued to work on plays and films often watching them from a hospital bed. He married costume designer Anio Laberenz and founded an opera project in the African country of Burkina Faso with funding from the German government, all while battling the disease. Bernd Neumann, Germany\u2019s state commissioner for culture paid tribute to Schlingensief. He said Schlingensief \u201c had had an immense influence on German-language film and theater \u201d . Mayor of Berlin, Klaus Wowereit said on Saturday that \"a major talent in theater has left the stage.\"", "after_revision": " in 2009 German has died at the age of 49. His death was announced by , a spokesman for the . Schlingensief had been suffering from but no official cause of death was given by the spokesman. The film and theatre director worked on several films, plays, and operas throughout his controversial career. Schlingensief directed films such as \" 100 Years of \" and \" The German Chainsaw Massacre \" . He was arrested in 1997 for his exhibition of work called \"Kill \" , aimed at the then . Besides plays shown in Germany, Schlingensief also worked in Austria and Switzerland. He was the director of the in both , Germany and Brazil. During his time working in Bayreuth he said \" Bayreuth will give me cancer. \" Coincidently, four years later Schlingensief was diagnosed with lung cancer even though he was a non-smoker. Despite the cancer he continued to work on plays and films often watching them from a hospital bed. He married costume designer and founded an opera project in the African country of Burkina Faso with funding from the German government, all while battling the disease. , Germany's state , paid tribute to Schlingensief. He said Schlingensief \" had had an immense influence on German-language film and theater \" . Mayor of , said on Saturday that \"a major talent in theater has left the stage.\"", "edit_actions": [{"type": "D", "before": "Christoph Schlingensief", "after": null, "start_char_pos": 0, "end_char_pos": 23}, {"type": "D", "before": "director Christoph Schlingensief", "after": null, "start_char_pos": 39, "end_char_pos": 71}, {"type": "D", "before": "Oliver Golloch", "after": null, "start_char_pos": 126, "end_char_pos": 140}, {"type": "D", "before": "Ruhrtriennale festival", "after": null, "start_char_pos": 163, "end_char_pos": 185}, {"type": "D", "before": "lung cancer", "after": null, "start_char_pos": 226, "end_char_pos": 237}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 444, "end_char_pos": 445}, {"type": "R", "before": "Adolf Hitler\u201d and \u201c", "after": "\" and \"", "start_char_pos": 459, "end_char_pos": 478}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 508, "end_char_pos": 509}, {"type": "R", "before": "\u201cKill Helmut Kohl\u201d", "after": "\"Kill \"", "start_char_pos": 570, "end_char_pos": 588}, {"type": "D", "before": "Chancellor", "after": null, "start_char_pos": 609, "end_char_pos": 619}, {"type": "R", "before": "Richard Wagner festival in both Bayreuth", "after": "in both", "start_char_pos": 735, "end_char_pos": 775}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 842, "end_char_pos": 843}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 874, "end_char_pos": 875}, {"type": "D", "before": "Anio Laberenz", "after": null, "start_char_pos": 1113, "end_char_pos": 1126}, {"type": "R", "before": "Bernd Neumann, Germany\u2019s state commissioner for culture", "after": ", Germany's state ,", "start_char_pos": 1268, "end_char_pos": 1323}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1377, "end_char_pos": 1378}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1444, "end_char_pos": 1445}, {"type": "R", "before": "Berlin, Klaus Wowereit", "after": ",", "start_char_pos": 1457, "end_char_pos": 1479}], "sents_char_pos": [0, 98, 296, 406, 621, 707, 797, 873, 984, 1084, 1267, 1354]}
+{"doc_id": "202474", "revision_depth": "1", "before_revision": "On Tuesday the U.S. Army released its revised solicitation for the Ground Combat Vehicle infantry fighting vehicle three months after scrapping its previous plans. The United States Army retracted its first solicitation for the Ground Combat Vehicle (GCV) on 25 August. It was decided by the army to begin anew after a \"red team\" recommended that the army either upgrade the existing ground vehicle fleet or rewrite the requirements. Program officials choose to end evaluations of vehicle submissions and to begin again in two months with new requirements. The previous design requirements emphasized modularity, affordability, rapid design and low risk technology. The infantry fighting vehicle variant would have carried a crew of three and nine infantry dismounts. It was initially to be compatible with the current Battle Command Control and Communications Suite but would gradually use a more revolutionary network. The system would support networking between external systems, vehicles and soldiers. It was to be transportable by C-17 cargo aircraft , rail, and ship and be as logistically deployable as the Stryker . The army officials were open to tracked or wheeled submissions but suggested that it be tracked due to the weight stemming from the requirements. The vehicle had an off-road speed requirement of 30 mph (50 km/h) and was required to deliver improved maintainability and consume less fuel than the Bradley Fighting Vehicle . The army wanted the vehicle to leverage an autocannon , a anti-tank guided missile system and non-lethal weapons . The army wanted the vehicle to have the blast protection level equal to the MRAP and supplement armor with active protection systems . The army wanted the first vehicle variant to be a troop carrier that would displace the aging M113 APCs and M2 Bradleys . Later, other variants of the GCV would appear. There were four known competing contractors for the Ground Combat Vehicle contract. BAE Systems led a team consisting of Northrop Grumman, QinetiQ, and Saft Group . BAE offered a tracked vehicle with a hybrid-electric engine, a baseline weight of 53 tons and a maximum weight tolerance of 75 tons for modular armor and various countermeasures including a V-hull and active protection systems. General Dynamics led a team consisting of Lockheed Martin, Detroit Diesel and Raytheon . General Dynamics offered a vehicle using diesel and leveraging an active protection system. SAIC led a consortia called Team Full Spectrum which included Boeing, Krauss-Maffei and Rheinmetall . SAIC offered a vehicle based on the Puma . Advanced Defense Vehicle Systems (ADVS) submitted its proposal for a wheeled vehicle but was rejected for being non-compliant. The predecessor to the GCV, the Manned Ground Vehicle family, was canceled in April 2009. Similar programs like the M8 light tank and XM2001 Crusader have also been scrapped in the past. The Expeditionary Fighting Vehicle, Joint Light Tactical Vehicle , and Ground Combat Vehicle programs have been targeted for cancellation by the National Commission on Fiscal Responsibility and Reform .", "after_revision": "On Tuesday the U.S. Army released its revised solicitation for the three months after scrapping its previous plans. The United States Army retracted its first for the Ground Combat Vehicle (GCV) on 25 August. It was decided by the army to begin anew after a \"red team\" recommended that the army either upgrade the existing ground vehicle fleet or rewrite the requirements. Program officials choose to end evaluations of vehicle submissions and to begin again in two months with new requirements. The previous design requirements emphasized modularity, affordability, rapid design and low risk technology. The infantry fighting vehicle variant would have carried a crew of three and nine infantry dismounts. It was initially to be compatible with the current Battle Command Control and Communications Suite but would gradually use a more revolutionary network. The system would support networking between external systems, vehicles and soldiers. It was to be transportable by , rail, and ship and be as logistically deployable as the . The army officials were open to tracked or wheeled submissions but suggested that it be tracked due to the weight stemming from the requirements. The vehicle had an off-road speed requirement of 30 mph (50 km/h) and was required to deliver improved maintainability and consume less fuel than the . The army wanted the vehicle to leverage an , a anti-tank guided missile system and . The army wanted the vehicle to have the blast protection level equal to the and supplement armor with . The army wanted the first vehicle variant to be a troop carrier that would displace the aging and . Later, other variants of the GCV would appear. There were four known competing contractors for the Ground Combat Vehicle contract. led a team consisting of , , and . BAE offered a tracked vehicle with a hybrid-electric engine, a baseline weight of 53 tons and a maximum weight tolerance of 75 tons for modular armor and various countermeasures including a and active protection systems. led a team consisting of , , and . General Dynamics offered a vehicle using diesel and leveraging an active protection system. led a consortium called Team Full Spectrum which included , , and . SAIC offered a vehicle based on the . Advanced Defense Vehicle Systems (ADVS) submitted its proposal for a wheeled vehicle but was rejected for being non-compliant. The predecessor to the GCV, the family, was canceled in April 2009. Similar programs like the and have also been scrapped in the past. The , , and Ground Combat Vehicle programs have been targeted for cancellation by the .", "edit_actions": [{"type": "D", "before": "Ground Combat Vehicle infantry fighting vehicle", "after": null, "start_char_pos": 67, "end_char_pos": 114}, {"type": "D", "before": "solicitation", "after": null, "start_char_pos": 207, "end_char_pos": 219}, {"type": "D", "before": "C-17 cargo aircraft", "after": null, "start_char_pos": 1036, "end_char_pos": 1055}, {"type": "D", "before": "Stryker", "after": null, "start_char_pos": 1114, "end_char_pos": 1121}, {"type": "D", "before": "Bradley Fighting Vehicle", "after": null, "start_char_pos": 1420, "end_char_pos": 1444}, {"type": "D", "before": "autocannon", "after": null, "start_char_pos": 1490, "end_char_pos": 1500}, {"type": "D", "before": "non-lethal weapons", "after": null, "start_char_pos": 1541, "end_char_pos": 1559}, {"type": "D", "before": "MRAP", "after": null, "start_char_pos": 1638, "end_char_pos": 1642}, {"type": "D", "before": "active protection systems", "after": null, "start_char_pos": 1669, "end_char_pos": 1694}, {"type": "R", "before": "M113 APCs and M2 Bradleys", "after": "and", "start_char_pos": 1791, "end_char_pos": 1816}, {"type": "D", "before": "BAE Systems", "after": null, "start_char_pos": 1950, "end_char_pos": 1961}, {"type": "R", "before": "Northrop Grumman, QinetiQ, and Saft Group", "after": ", , and", "start_char_pos": 1987, "end_char_pos": 2028}, {"type": "D", "before": "V-hull", "after": null, "start_char_pos": 2221, "end_char_pos": 2227}, {"type": "D", "before": "General Dynamics", "after": null, "start_char_pos": 2259, "end_char_pos": 2275}, {"type": "R", "before": "Lockheed Martin, Detroit Diesel and Raytheon", "after": ", , and", "start_char_pos": 2301, "end_char_pos": 2345}, {"type": "R", "before": "SAIC led a consortia", "after": "led a consortium", "start_char_pos": 2440, "end_char_pos": 2460}, {"type": "R", "before": "Boeing, Krauss-Maffei and Rheinmetall", "after": ", , and", "start_char_pos": 2502, "end_char_pos": 2539}, {"type": "D", "before": "Puma", "after": null, "start_char_pos": 2578, "end_char_pos": 2582}, {"type": "D", "before": "Manned Ground Vehicle", "after": null, "start_char_pos": 2744, "end_char_pos": 2765}, {"type": "R", "before": "M8 light tank and XM2001 Crusader", "after": "and", "start_char_pos": 2828, "end_char_pos": 2861}, {"type": "D", "before": "Expeditionary Fighting Vehicle, Joint Light Tactical Vehicle", "after": null, "start_char_pos": 2903, "end_char_pos": 2963}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2966, "end_char_pos": 2966}, {"type": "D", "before": "National Commission on Fiscal Responsibility and Reform", "after": null, "start_char_pos": 3045, "end_char_pos": 3100}], "sents_char_pos": [0, 163, 269, 433, 556, 665, 767, 920, 1005, 1123, 1269, 1446, 1561, 1696, 1865, 1949, 2258, 2439, 2584, 2711, 2801, 2898]}
+{"doc_id": "203173", "revision_depth": "3", "before_revision": "It has emerged that the 33 Chilean miners trapped underground after the mine they were working in collapsed could be brought to the surface in a shorter time than was initially feared. While officials publicly announced that the men would not be brought to the surface until Christmas, sources inside technical meetings have revealed that they could in fact be on the surface by early November. The news comes as families were allowed to speak by radio-telephone to their trapped loved ones on Sunday. Over the weekend, video images filmed by the miners emerged showing the miners playing dominoes at a table and singing the Chilean national anthem . The miners also used the camera to send video messages to their families on the surface, saying that they regularly broke into tears, but were feeling better having received food and water. The grainy nightvision images, filmed on a high definition camcorder that was sent down a small shaft to the mine, show the men in good spirits, chanting \"long live Chile , and long live the miners.\" They are unshaven and stripped to the waist because of the heat underground, and are seen wearing white clinical trousers that have been designed to keep them dry. Giving a guided tour of the area they are occupying, Mario Sep\u00falveda, one of the miners, explains they have a \"little cup to brush our teeth\", and a place where they pray each day. \"We have everything organized,\" he tells the camera. Gesturing to the table in the center of the room, he says that \"we meet here every day. We plan, we have assemblies here every day so that all the decisions we make are based on the thoughts of all 33.\" Another unidentified miner asks to rescuers, \"get us out of here soon, please.\" A thermometer is shown in the video, reading 29.5C (85F). Upon seeing the video in a private screening, family members, who are living in a small village of tents at the entrance to the copper-gold mine\u2014which they have named Camp Hope\u2014were elated. \"He's skinny, bearded and it was painful to see him with his head hanging down, but I am so happy to see him alive\", said Ruth Contreras, the mother of Carlos Bravo, who is trapped in the mine. The video, of which only a small portion has been released to the public, shows the miners, many of them wearing helmets , cracking jokes and thanking the rescuers for their continued efforts. The supplies are being sent to the men through a small shaft only twelve centimeters wide, and a laboratory has been set up with the purpose of designing collapsible cots and miniature sandwiches, which can be sent down such a narrow space. CNN reported on Friday that \"officials are splitting the men into two shifts so one group sleeps while the other works or has leisure time .. On average, each man has lost 22 pounds (10 kilograms) since they became trapped three weeks ago, and dehydration remains a threat. But a survey of the men indicates that at least nine miners are still too overweight to fit through the proposed rescue shaft. Initially, the miners survived by draining water from a water-cooled piece of equipment. To stay hydrated in the 90-degree mine, each miner must drink eight or nine pints of water per day.\" But while there are jubilant celebrations on the surface that the miners are alive, officials are now nervous that the miners could become depressed , trapped in a dark room the size of a small apartment. Chilean health minister Jaime Ma\u00f1alich said that, on the video, he saw the telltale signs of depression. \"They are more isolated, they don't want to be on the screen, they are not eating well\", he said. \"I would say depression is the correct word.\" He said that doctors who had watched the video had observed the men suffering from \"severe dermatological problems.\" Dr. Rodrigo Figueroa, head of the trauma, stress and disaster unit at the in Santiago, Chile, explained that \"following the euphoria of being discovered, the normal psychological reaction would be for the men to collapse in a combination of fatigue and stress ... People who are trained for emergencies \u2013 like these miners \u2013 tend to minimize their own needs or to ignore them. When it is time to ask for help, they don't.\" NASA has advised emergency workers that entertaining the miners would be a good idea. They are to be sent a television system complete with taped football matches. Another dilemma facing Ma\u00f1alich is whether the miners should be permitted to smoke underground. While nicotine gum has been delivered to the miners, sending down cigarettes is a plan that has not been ruled out. 300px|The message sent up confirming that the miners were alive. \"We are fine in the shelter the 33\" [of us], it reads. With the news that drilling of the main rescue tunnel was expected to begin on Monday, officials have informed the media that they hope to have the miners out of the mine by Christmas \u2014but sources with access to technical meetings have suggested that the miners could actually be rescued by the first week of November. A news report described the rescue plan\u2014\"the main focus is a machine that bores straight down to 688m and creates a chimney-type duct that could be used to haul the miners out one by one in a rescue basket. A second drilling operation will attempt to intercept a mining tunnel at a depth of roughly 350m. The miners would then have to make their way through several miles of dark, muddy tunnels and meet the rescue drill at roughly the halfway point of their current depth of 688m.\" Iv\u00e1n Viveros Aranas, a Chilean policeman working at Camp Hope, told reporters that Chile \"has shown a unity regardless of religion or social class. You see people arriving here just to volunteer, they have no relation at all to these families.\" But over the weekend, The New York Times reported that the \"miners who have astonished the world with their discipline a half-mile underground will have to aid their own escape \u2014 clearing 3,000 to 4,000 tons of rock that will fall as the rescue hole is drilled, the engineer in charge of drilling said Sunday ... The work will require about a half-dozen men working in shifts 24 hours a day.\" Andr\u00e9s Sougarret, a senior engineer involved in operating the drill said that \"the miners are going to have to take out all that material as it falls.\" The families of those trapped were allowed to speak to them by radio-telephone on Sunday\u2014a possibility that brought reassurance both the miners and those on the surface. The Intendant of the Atacama Region, Ximena Matas , said that there had been \"moments of great emotion.\" She continued to say that the families \"listened with great interest and they both felt and realized that the men are well. This has been a very important moment, which no doubt strengthens their [the miners'] morale.\" The phone line is thought to be quite temperamental, but it is hoped that soon, those in the mine and those in Camp Hope will be able to talk every day. \"To hear his voice was a balm to my heart ... He is aware that the rescue is not going to happen today, that it will take some time. He asked us to stay calm as everything is going to be OK ... He sounded relaxed and since it was so short I didn't manage to ask anything. Twenty seconds was nothing\", said said Jessica Cort\u00e9s, who spoke to her husband V\u00edctor Zamora, who was not even a miner, but a vehicle mechanic. \"He went in that day because a vehicle had broken down inside the mine ... At first they told us he had been crushed [to death].\"", "after_revision": "It has emerged that the 33 Chilean miners trapped underground after the mine they were working in could be brought to the surface in a shorter time than was initially feared. While officials publicly announced that the men would not be brought to the surface until Christmas, sources inside technical meetings have revealed that they could in fact be on the surface by early November. The news comes as families were allowed to speak by radio-telephone to their trapped loved ones on Sunday. Over the weekend, video images filmed by the miners emerged showing the miners playing at a table and singing the . The miners also used the camera to send video messages to their families on the surface, saying that they regularly broke into tears, but were feeling better having received food and water. The grainy images, filmed on a that was sent down a small shaft to the mine, show the men in good spirits, chanting \"long live , and long live the miners.\" They are unshaven and stripped to the waist because of the heat underground, and are seen wearing white clinical trousers that have been designed to keep them dry. Giving a guided tour of the area they are occupying, Mario Sep\u00falveda, one of the miners, explains they have a \"little cup to brush our teeth\", and a place where they pray each day. \"We have everything organized,\" he tells the camera. Gesturing to the table in the center of the room, he says that \"we meet here every day. We plan, we have assemblies here every day so that all the decisions we make are based on the thoughts of all 33.\" Another unidentified miner asks to rescuers, \"get us out of here soon, please.\" A is shown in the video, reading 29.5C (85F). Upon seeing the video in a private screening, family members, who are living in a small village of tents at the entrance to the - mine\u2014which they have named Camp Hope\u2014were elated. \"He's skinny, bearded and it was painful to see him with his head hanging down, but I am so happy to see him alive\", said Ruth Contreras, the mother of Carlos Bravo, who is trapped in the mine. The video, of which only a small portion has been released to the public, shows the miners, many of them wearing , cracking jokes and thanking the rescuers for their continued efforts. The supplies are being sent to the men through a small shaft only twelve centimeters wide, and a laboratory has been set up with the purpose of designing collapsible cots and miniature sandwiches, which can be sent down such a narrow space. reported on Friday that \"officials are splitting the men into two shifts so one group sleeps while the other works or has leisure time .. On average, each man has lost 22 pounds (10 kilograms) since they became trapped three weeks ago, and dehydration remains a threat. But a survey of the men indicates that at least nine miners are still too overweight to fit through the proposed rescue shaft. Initially, the miners survived by draining water from a water-cooled piece of equipment. To stay hydrated in the 90-degree mine, each miner must drink eight or nine pints of water per day.\" But while there are jubilant celebrations on the surface that the miners are alive, officials are now nervous that the miners could become , trapped in a dark room the size of a small apartment. Chilean health minister said that, on the video, he saw the telltale signs of depression. \"They are more isolated, they don't want to be on the screen, they are not eating well\", he said. \"I would say depression is the correct word.\" He said that doctors who had watched the video had observed the men suffering from \"severe dermatological problems.\" Dr. Rodrigo Figueroa, head of the trauma, stress and disaster unit at the in Santiago, Chile, explained that \"following the euphoria of being discovered, the normal psychological reaction would be for the men to collapse in a combination of fatigue and stress ... People who are trained for emergencies \u2013 like these miners \u2013 tend to minimize their own needs or to ignore them. When it is time to ask for help, they don't.\" NASA has advised emergency workers that entertaining the miners would be a good idea. They are to be sent a television system complete with taped matches. Another dilemma facing Ma\u00f1alich is whether the miners should be permitted to underground. While has been delivered to the miners, sending down is a plan that has not been ruled out. 300px|The message sent up confirming that the miners were alive. \"We are fine in the shelter the 33\" [of us], it reads. With the news that drilling of the main rescue tunnel was expected to begin on Monday, officials have informed the media that they hope to have the miners out of the mine by \u2014but sources with access to technical meetings have suggested that the miners could actually be rescued by the first week of November. A news report described the rescue plan\u2014\"the main focus is a machine that bores straight down to 688m and creates a chimney-type duct that could be used to haul the miners out one by one in a rescue basket. A second drilling operation will attempt to intercept a mining tunnel at a depth of roughly 350m. The miners would then have to make their way through several miles of dark, muddy tunnels and meet the rescue drill at roughly the halfway point of their current depth of 688m.\" Iv\u00e1n Viveros Aranas, a Chilean policeman working at Camp Hope, told reporters that Chile \"has shown a unity regardless of religion or social class. You see people arriving here just to volunteer, they have no relation at all to these families.\" But over the weekend, reported that the \"miners who have astonished the world with their discipline a half-mile underground will have to aid their own escape \u2014 clearing 3,000 to 4,000 tons of rock that will fall as the rescue hole is drilled, the engineer in charge of drilling said Sunday ... The work will require about a half-dozen men working in shifts 24 hours a day.\" Andr\u00e9s Sougarret, a senior engineer involved in operating the drill said that \"the miners are going to have to take out all that material as it falls.\" The families of those trapped were allowed to speak to them by radio-telephone on Sunday\u2014a possibility that brought reassurance both the miners and those on the surface. The Intendant of the Atacama Region, , said that there had been \"moments of great emotion.\" She continued to say that the families \"listened with great interest and they both felt and realized that the men are well. This has been a very important moment, which no doubt strengthens their [the miners'] morale.\" The phone line is thought to be quite temperamental, but it is hoped that soon, those in the mine and those in Camp Hope will be able to talk every day. \"To hear his voice was a balm to my heart ... He is aware that the rescue is not going to happen today, that it will take some time. He asked us to stay calm as everything is going to be OK ... He sounded relaxed and since it was so short I didn't manage to ask anything. Twenty seconds was nothing\", said said Jessica Cort\u00e9s, who spoke to her husband V\u00edctor Zamora, who was not even a miner, but a vehicle mechanic. \"He went in that day because a vehicle had broken down inside the mine ... At first they told us he had been crushed [to death].\"", "edit_actions": [{"type": "D", "before": "collapsed", "after": null, "start_char_pos": 98, "end_char_pos": 107}, {"type": "D", "before": "dominoes", "after": null, "start_char_pos": 589, "end_char_pos": 597}, {"type": "D", "before": "Chilean national anthem", "after": null, "start_char_pos": 625, "end_char_pos": 648}, {"type": "D", "before": "nightvision", "after": null, "start_char_pos": 852, "end_char_pos": 863}, {"type": "D", "before": "high definition camcorder", "after": null, "start_char_pos": 884, "end_char_pos": 909}, {"type": "D", "before": "Chile", "after": null, "start_char_pos": 1006, "end_char_pos": 1011}, {"type": "D", "before": "thermometer", "after": null, "start_char_pos": 1724, "end_char_pos": 1735}, {"type": "R", "before": "copper-gold", "after": "-", "start_char_pos": 1908, "end_char_pos": 1919}, {"type": "D", "before": "helmets", "after": null, "start_char_pos": 2277, "end_char_pos": 2284}, {"type": "D", "before": "CNN", "after": null, "start_char_pos": 2598, "end_char_pos": 2601}, {"type": "D", "before": "depressed", "after": null, "start_char_pos": 3328, "end_char_pos": 3337}, {"type": "D", "before": "Jaime Ma\u00f1alich", "after": null, "start_char_pos": 3418, "end_char_pos": 3432}, {"type": "D", "before": "football", "after": null, "start_char_pos": 4329, "end_char_pos": 4337}, {"type": "D", "before": "smoke", "after": null, "start_char_pos": 4424, "end_char_pos": 4429}, {"type": "D", "before": "nicotine gum", "after": null, "start_char_pos": 4449, "end_char_pos": 4461}, {"type": "D", "before": "cigarettes", "after": null, "start_char_pos": 4509, "end_char_pos": 4519}, {"type": "D", "before": "Christmas", "after": null, "start_char_pos": 4853, "end_char_pos": 4862}, {"type": "D", "before": "The New York Times", "after": null, "start_char_pos": 5748, "end_char_pos": 5766}, {"type": "D", "before": "Ximena Matas", "after": null, "start_char_pos": 6478, "end_char_pos": 6490}], "sents_char_pos": [0, 184, 394, 501, 650, 840, 1040, 1204, 1385, 1438, 1526, 1721, 1779, 1969, 2163, 2356, 2597, 2739, 2871, 2998, 3087, 3188, 3393, 3498, 3596, 3642, 4023, 4136, 4268, 4346, 4442, 4558, 4623, 4678, 4997, 5204, 5302, 5480, 5628, 5725, 6038, 6118, 6270, 6440, 6545, 6669, 6764, 6917, 6963, 7050, 7111, 7189, 7334, 7409]}
+{"doc_id": "203446", "revision_depth": "1", "before_revision": "Alain Corneau at the Yokohama French Film Festival in 2005 Alain Corneau , a French film director , has died at the age of 67. His death was announced by the Artmedia talent agency. The cause of death was announced as cancer . Born on August 7, 1943, Corneau's first interest was music. He later went to Paris to study filmmaking. Before the success of his first film, Corneau attempted to make a documentary about New York and an adaptation of a novel. After working as assistant director on L'Aveu with Costa Gavras he directed his first film in 1973, France, Inc. Corneau's other films include La Menace, Fort Saganne , and the highly successful Tous les matins du monde . Tous les matins du monde received 11 C\u00e9sar Award nominations and won seven of them. The awards included Best Film, Best Director, and Best Music. Corneau said in a 1992 interview in the New York Times that \"Many people got emotional about this film, and that made it possible for it to escape cult status.\" Corneau was set to appear at the Toronto Film Festival in September.", "after_revision": "at the in 2005 , a French , has died at the age of 67. His death was announced by the talent agency. The cause of death was announced as . Born on August 7, 1943, Corneau's first interest was music. He later went to Paris to study filmmaking. Before the success of his first film, Corneau attempted to make a about New York and an adaptation of a novel. After working as assistant director on with he directed his first film in 1973, France, Inc. Corneau's other films include , , and the highly successful . Tous les matins du monde received 11 nominations and won seven of them. The awards included Best Film, Best Director, and Best Music. Corneau said in a 1992 interview in the that \"Many people got emotional about this film, and that made it possible for it to escape cult status.\" Corneau was set to appear at the in September.", "edit_actions": [{"type": "R", "before": "Alain Corneau at the Yokohama French Film Festival", "after": "at the", "start_char_pos": 0, "end_char_pos": 50}, {"type": "D", "before": "Alain Corneau", "after": null, "start_char_pos": 59, "end_char_pos": 72}, {"type": "D", "before": "film director", "after": null, "start_char_pos": 84, "end_char_pos": 97}, {"type": "D", "before": "Artmedia", "after": null, "start_char_pos": 158, "end_char_pos": 166}, {"type": "D", "before": "cancer", "after": null, "start_char_pos": 218, "end_char_pos": 224}, {"type": "D", "before": "documentary", "after": null, "start_char_pos": 397, "end_char_pos": 408}, {"type": "R", "before": "L'Aveu with Costa Gavras", "after": "with", "start_char_pos": 493, "end_char_pos": 517}, {"type": "D", "before": "La Menace, Fort Saganne", "after": null, "start_char_pos": 597, "end_char_pos": 620}, {"type": "A", "before": null, "after": ",", "start_char_pos": 623, "end_char_pos": 623}, {"type": "D", "before": "Tous les matins du monde", "after": null, "start_char_pos": 650, "end_char_pos": 674}, {"type": "D", "before": "C\u00e9sar Award", "after": null, "start_char_pos": 714, "end_char_pos": 725}, {"type": "D", "before": "New York Times", "after": null, "start_char_pos": 863, "end_char_pos": 877}, {"type": "D", "before": "Toronto Film Festival", "after": null, "start_char_pos": 1017, "end_char_pos": 1038}], "sents_char_pos": [0, 126, 181, 286, 330, 453, 676, 760, 822, 983]}
+{"doc_id": "203956", "revision_depth": "1", "before_revision": "Shakemap of the earthquake. Building damage in Worcester Street, corner Manchester Street, with ChristChurch Cathedral in the background. The USGS says an earthquake of magnitude 7.0 occurred in the Canterbury region of New Zealand's South Island at Saturday 04:35:44 AM local time (Friday 16:35:44 UTC). Officials in New Zealand say the magnitude was 7.1. The earthquake occurred at a depth of 10.0 kilometers (6.21 miles). The epicenter was located 40 kilometers (25 miles) west of Christchurch ; 190 kilometers (115 miles) south-southeast of Westport ; 295 kilometers (185 miles) southwest of Wellington ; and 320 kilometers (200 miles) north-northeast of Dunedin . New Zealand's Civil Defence Minister John Carter has declared a state of emergency in Christchurch and Selwyn District . Widespread damage extending beyond Christchurch has damaged infrastructure, including substantial disruption to the power and water supply. Two people were reported seriously injured, and local residents have also reported that chimneys have fallen in through roofs, ceilings cracked and brick walls collapsed. Several aftershocks were also felt as far north as New Plymouth . Bob Parker , the mayor of Christchurch, told the New Zealand Herald that he is \"thankful there has been no loss of life but there had been considerable damage across the city and outlying areas.\" \"We are very happy and blessed that no one died,\" Prime Minister John Key said; he further pledged that \"we are here to support them. We are not going to let Christchurch suffer this great tragedy on their own.\" People in the Christchurch area have been told not to enter the CBD, and a curfew has been established there from 7pm to 7am. Other towns have also had parts closed off to be inspected for safety. The NOAA 's evaluation of the situation predicts that significant damage will not progress beyond New Zealand: \"Based on the earthquake magnitude, location and historic tsunami records, a damaging tsunami is not expected along the California, Oregon, Washington, British Columbia, and Alaska coasts. At coastal locations which have experienced strong ground shaking, local tsunamis are possible due to underwater landslides.\" ", "after_revision": "Shakemap of the earthquake. Building damage in Worcester Street, corner Manchester Street, with in the background. The says an earthquake of magnitude 7.0 occurred in the Canterbury region of New Zealand's at Saturday 04:35:44 AM local time (Friday 16:35:44 UTC). Officials in New Zealand say the magnitude was 7.1. The earthquake occurred at a depth of 10.0 kilometers (6.21 miles). The epicenter was located 40 kilometers (25 miles) west of ; 190 kilometers (115 miles) south-southeast of ; 295 kilometers (185 miles) southwest of ; and 320 kilometers (200 miles) north-northeast of . New Zealand's Civil Defence Minister has declared a state of emergency in Christchurch and . Widespread damage extending beyond Christchurch has damaged infrastructure, including substantial disruption to the power and water supply. Two people were reported seriously injured, and local residents have also reported that chimneys have fallen in through roofs, ceilings cracked and brick walls collapsed. Several aftershocks were also felt as far north as . , the mayor of Christchurch, told the that he is \"thankful there has been no loss of life but there had been considerable damage across the city and outlying areas.\" \"We are very happy and blessed that no one died,\" Prime Minister said; he further pledged that \"we are here to support them. We are not going to let Christchurch suffer this great tragedy on their own.\" People in the Christchurch area have been told not to enter the CBD, and a curfew has been established there from 7pm to 7am. Other towns have also had parts closed off to be inspected for safety. The 's evaluation of the situation predicts that significant damage will not progress beyond New Zealand: \"Based on the earthquake magnitude, location and historic tsunami records, a damaging tsunami is not expected along the California, Oregon, Washington, British Columbia, and Alaska coasts. At coastal locations which have experienced strong ground shaking, local tsunamis are possible due to underwater landslides.\" Sister links", "edit_actions": [{"type": "D", "before": "ChristChurch Cathedral", "after": null, "start_char_pos": 96, "end_char_pos": 118}, {"type": "D", "before": "USGS", "after": null, "start_char_pos": 142, "end_char_pos": 146}, {"type": "D", "before": "South Island", "after": null, "start_char_pos": 234, "end_char_pos": 246}, {"type": "D", "before": "Christchurch", "after": null, "start_char_pos": 484, "end_char_pos": 496}, {"type": "D", "before": "Westport", "after": null, "start_char_pos": 545, "end_char_pos": 553}, {"type": "D", "before": "Wellington", "after": null, "start_char_pos": 596, "end_char_pos": 606}, {"type": "D", "before": "Dunedin", "after": null, "start_char_pos": 659, "end_char_pos": 666}, {"type": "D", "before": "John Carter", "after": null, "start_char_pos": 706, "end_char_pos": 717}, {"type": "D", "before": "Selwyn District", "after": null, "start_char_pos": 772, "end_char_pos": 787}, {"type": "D", "before": "New Plymouth", "after": null, "start_char_pos": 1152, "end_char_pos": 1164}, {"type": "D", "before": "Bob Parker", "after": null, "start_char_pos": 1167, "end_char_pos": 1177}, {"type": "D", "before": "New Zealand Herald", "after": null, "start_char_pos": 1216, "end_char_pos": 1234}, {"type": "D", "before": "John Key", "after": null, "start_char_pos": 1428, "end_char_pos": 1436}, {"type": "D", "before": "NOAA", "after": null, "start_char_pos": 1776, "end_char_pos": 1780}, {"type": "A", "before": null, "after": "Sister links", "start_char_pos": 2198, "end_char_pos": 2198}], "sents_char_pos": [0, 27, 137, 304, 356, 424, 498, 555, 608, 668, 789, 929, 1100, 1362, 1442, 1496, 1700, 1771, 2071]}
+{"doc_id": "204818", "revision_depth": "1", "before_revision": "Commemorative statue of the Bicentennial of Chile, located in front of La Moneda Palace, in Santiago . Chile is celebrating its Bicentennial, with several events that have been organized by the government for almost a decade. It commemorates two hundred years since the First Government Junta of 1810 was formed, starting the Independence process, that ended in 1818 after Bernardo O'Higgins proclaimed it. The Bicentennial takes place on a holiday from September 17th until 21st. Sebasti\u00e1n Pi\u00f1era inaugurated the official fondas (places where typical food and drinks of Chile are sold; similar to a tavern) earlier on Friday. Pi\u00f1era also danced a \"pie\" of Cueca , Chile's national dance, with Government Spokeswoman Ena Von Baer . More than 60 thousand people gathered on Plaza de la Ciudadan\u00eda (Citizen's Square) in Santiago to celebrate the Bicentennial. There was a projection of historical images that also contained a message from the trapped miners in Copiap\u00f3 . A giant flag of Chile (18 meters of height, 27 of width; weighing 200 kilograms) was raised on the square on Friday morning. Pichilemu \"Fonda Don Vicente Nario\" in Colegio Preciosa Sangre. Celebrations of the Bicentennial in Pichilemu started earlier this month. On September 2, two thousand people lined up in a formation to create the message \"Viva Chile Bicentenario Cardenal Caro\" on Pichilemu beach \"Las Terrazas\". The message was used to create a postal stamp to be released worldwide. The event was promoted by the Government of Cardenal Caro Province . Private schools in the city, such as Colegio Preciosa Sangre , prepared events specially for their students. On Thursday, \"Fonda Don Vicente Nario\" was opened on Preciosa Sangre. Several games were performed there on that morning, including \"el emboque\", \"ponerle la cola al burro\" (to put the tail to the donkey), and others. Another event on Preciosa Sangre took place on Thursday night, when students recreated scenes of the History of Chile, including: a tertulia featuring Manuel Montt (starred by Luis Rojas); a chingana (a popular tavern); and selected colonial professions, such as the \"motero\" (person who sold motemei and chestnuts). The official fonda of Pichilemu, La Bombonera, was inaugurated on Thursday night by Mayor Roberto C\u00f3rdova, who danced cueca with people who attended the event. According to C\u00f3rdova, at least 30,000 people have arrived at Pichilemu as of Friday, and it is estimated that another 30,000 will arrive during the next three days. A great event took place on Pichilemu beach on Friday afternoon. Chilean typical games highlighted the event. People danced reggaeton, Am\u00e9rico 's cumbias and cuecas, while others were swimming. The National Shoe Fair (Feria Nacional del Calzado) was established on Agust\u00edn Ross Hotel on Thursday, and will stay in the town until September 23rd. Alicia Grez, who works on a kiosk in the Pichileminian Craft Fair located in front of One Discotheque, said that \"sales have been excellent,\" and that \"[they] won't miss the possibility to experience such an event like this.\" See also ", "after_revision": "Commemorative statue of the Bicentennial of Chile, located in front of , in . Chile is celebrating its Bicentennial, with several events that have been organized by the government for almost a decade. It commemorates two hundred years since the of 1810 was formed, starting the Independence process, that ended in 1818 after proclaimed it. The Bicentennial takes place on a holiday from September 17th until 21st. Sebasti\u00e1n Pi\u00f1era inaugurated the official fondas (places where typical food and drinks of Chile are sold; similar to a tavern) earlier on Friday. Pi\u00f1era also danced a \"pie\" of , Chile's national dance, with Government Spokeswoman . More than 60 thousand people gathered on (Citizen's Square) in Santiago to celebrate the Bicentennial. There was a projection of historical images that also contained a message from the in . A giant (18 meters of height, 27 of width; weighing 200 kilograms) was raised on the square on Friday morning. Pichilemu \"Fonda Don Vicente Nario\" in Colegio Preciosa Sangre. Celebrations of the Bicentennial in Pichilemu started earlier this month. On September 2, two thousand people lined up in a formation to create the message \"Viva Chile Bicentenario Cardenal Caro\" on Pichilemu beach \"Las Terrazas\". The message was used to create a postal stamp to be released worldwide. The event was promoted by the Government of . Private schools in the city, such as , prepared events specially for their students. On Thursday, \"Fonda Don Vicente Nario\" was opened on Preciosa Sangre. Several games were performed there on that morning, including \"el emboque\", \"ponerle la cola al burro\" (to put the tail to the donkey), and others. Another event on Preciosa Sangre took place on Thursday night, when students recreated scenes of the History of Chile, including: a featuring (starred by Luis Rojas); a chingana (a popular tavern); and selected colonial professions, such as the \"motero\" (person who sold motemei and chestnuts). The official fonda of Pichilemu, La Bombonera, was inaugurated on Thursday night by Roberto C\u00f3rdova, who danced with people who attended the event. According to C\u00f3rdova, at least 30,000 people have arrived at Pichilemu as of Friday, and it is estimated that another 30,000 will arrive during the next three days. A great event took place on Pichilemu beach on Friday afternoon. Chilean typical games highlighted the event. People danced reggaeton, 's cumbias and cuecas, while others were swimming. The National Shoe Fair (Feria Nacional del Calzado) was established on on Thursday, and will stay in the town until September 23rd. Alicia Grez, who works on a kiosk in the Pichileminian Craft Fair located in front of One Discotheque, said that \"sales have been excellent,\" and that \"[they] won't miss the possibility to experience such an event like this.\" See also Sister links", "edit_actions": [{"type": "R", "before": "La Moneda Palace, in Santiago", "after": ", in", "start_char_pos": 71, "end_char_pos": 100}, {"type": "D", "before": "First Government Junta", "after": null, "start_char_pos": 270, "end_char_pos": 292}, {"type": "D", "before": "Bernardo O'Higgins", "after": null, "start_char_pos": 373, "end_char_pos": 391}, {"type": "D", "before": "Cueca", "after": null, "start_char_pos": 657, "end_char_pos": 662}, {"type": "D", "before": "Ena Von Baer", "after": null, "start_char_pos": 717, "end_char_pos": 729}, {"type": "D", "before": "Plaza de la Ciudadan\u00eda", "after": null, "start_char_pos": 773, "end_char_pos": 795}, {"type": "R", "before": "trapped miners in Copiap\u00f3", "after": "in", "start_char_pos": 941, "end_char_pos": 966}, {"type": "D", "before": "flag of Chile", "after": null, "start_char_pos": 977, "end_char_pos": 990}, {"type": "D", "before": "Cardenal Caro Province", "after": null, "start_char_pos": 1505, "end_char_pos": 1527}, {"type": "D", "before": "Colegio Preciosa Sangre", "after": null, "start_char_pos": 1567, "end_char_pos": 1590}, {"type": "R", "before": "tertulia featuring Manuel Montt", "after": "featuring", "start_char_pos": 1989, "end_char_pos": 2020}, {"type": "D", "before": "Mayor", "after": null, "start_char_pos": 2258, "end_char_pos": 2263}, {"type": "D", "before": "cueca", "after": null, "start_char_pos": 2292, "end_char_pos": 2297}, {"type": "D", "before": "Am\u00e9rico", "after": null, "start_char_pos": 2634, "end_char_pos": 2641}, {"type": "D", "before": "Agust\u00edn Ross Hotel", "after": null, "start_char_pos": 2764, "end_char_pos": 2782}, {"type": "A", "before": null, "after": "Sister links", "start_char_pos": 3079, "end_char_pos": 3079}], "sents_char_pos": [0, 102, 225, 406, 480, 586, 626, 857, 1025, 1093, 1157, 1231, 1388, 1460, 1638, 1708, 1856, 2045, 2076, 2173, 2333, 2498, 2563, 2608, 2692, 2843, 3069]}
+{"doc_id": "207485", "revision_depth": "1", "before_revision": "150px| The King's Speech stars Colin Firth .|left The King's Speech , a historical drama film starring Colin Firth , won the 2010 Toronto International Film Festival's People's Choice Award . The film was directed by Tom Hooper , and is to be released officially on November 26, according to the Internet Movie Database . \"I am so proud that people responded to this film in a positive way,\" said Hooper, who was not in Toronto at the time of the ceremony. The film \"tells the story of the man who became King [of England] George VI ,\" sources say. \"So many people were talking about that film during the festival,\" said Piers Handling , director of the film festival. Previous winners of the award include La vita \u00e8 bella (1997), Wo hu cang long (2000) and Slumdog Millionaire (2008). ", "after_revision": "150px| stars .|left , a historical drama film starring , won the 's . The film was directed by , and is to be released officially on November 26, according to the . \"I am so proud that people responded to this film in a positive way,\" said Hooper, who was not in Toronto at the time of the ceremony. The film \"tells the story of the man who became King [of England] ,\" sources say. \"So many people were talking about that film during the festival,\" said , director of the film festival. Previous winners of the award include (1997), (2000) and (2008). Sister links", "edit_actions": [{"type": "R", "before": "The King's Speech stars Colin Firth", "after": "stars", "start_char_pos": 7, "end_char_pos": 42}, {"type": "D", "before": "The King's Speech", "after": null, "start_char_pos": 50, "end_char_pos": 67}, {"type": "D", "before": "Colin Firth", "after": null, "start_char_pos": 103, "end_char_pos": 114}, {"type": "R", "before": "2010 Toronto International Film Festival's People's Choice Award", "after": "'s", "start_char_pos": 125, "end_char_pos": 189}, {"type": "D", "before": "Tom Hooper", "after": null, "start_char_pos": 217, "end_char_pos": 227}, {"type": "D", "before": "Internet Movie Database", "after": null, "start_char_pos": 296, "end_char_pos": 319}, {"type": "D", "before": "George VI", "after": null, "start_char_pos": 523, "end_char_pos": 532}, {"type": "D", "before": "Piers Handling", "after": null, "start_char_pos": 621, "end_char_pos": 635}, {"type": "D", "before": "La vita \u00e8 bella", "after": null, "start_char_pos": 707, "end_char_pos": 722}, {"type": "D", "before": "Wo hu cang long", "after": null, "start_char_pos": 731, "end_char_pos": 746}, {"type": "D", "before": "Slumdog Millionaire", "after": null, "start_char_pos": 758, "end_char_pos": 777}, {"type": "A", "before": null, "after": "Sister links", "start_char_pos": 786, "end_char_pos": 786}], "sents_char_pos": [0, 191, 456, 548, 668]}
+{"doc_id": "209010", "revision_depth": "1", "before_revision": "200px|Gloria Stuart in the 1934 comedy-drama film Here Comes the Navy. Gloria Stuart , US Academy Award nominated film actress, has died at the age of 100. Stuart died at her home in West Los Angeles, and her death was announced by her daughter, Sylvia Thompson. Stuart had been suffering from lung cancer for five years before her death. She appeared in films such as The Invisible Man (1933) Here Comes the Navy (1934), and Titanic (1997). Stuart started her career in the 1930s as one of Hollywood 's leading ladies. Between 1932 and 1939, Stuart appeared in 42 films. During the prime of her career, Stuart appeared with actresses such as Shirley Temple, Warner Baxter, and Dick Powell . She officially retired in 1946, after only making four films during the 1940s. Despite her retirement, Stuart appeared in James Cameron 's 1997 adaptation of Titanic , where she was cast as Old Rose, a survivor of the disaster and narrator of the film. Stuart was then nominated for an Academy Award , becoming the oldest ever person to be nominated, at the age of 87. After her appearance she found new fame, being given a star on the Hollywood Walk of Fame in 2000, and People's Magazine listed her as one of the 50 Most Beautiful People in the World.", "after_revision": "200px|Gloria Stuart in the 1934 comedy-drama film . , US Academy Award nominated film actress, has died at the age of 100. Stuart died at her home in West Los Angeles, and her death was announced by her daughter, Sylvia Thompson. Stuart had been suffering from for five years before her death. She appeared in films such as (1933) (1934), and (1997). Stuart started her career in the 1930s as one of 's leading ladies. Between 1932 and 1939, Stuart appeared in 42 films. During the prime of her career, Stuart appeared with actresses such as , , and . She officially retired in 1946, after only making four films during the 1940s. Despite her retirement, Stuart appeared in 's 1997 adaptation of , where she was cast as Old Rose, a survivor of the disaster and narrator of the film. Stuart was then nominated for an , becoming the oldest ever person to be nominated, at the age of 87. After her appearance she found new fame, being given a star on the in 2000, and listed her as one of the 50 Most Beautiful People in the World.", "edit_actions": [{"type": "R", "before": "Here Comes the Navy. Gloria Stuart", "after": ".", "start_char_pos": 50, "end_char_pos": 84}, {"type": "D", "before": "lung cancer", "after": null, "start_char_pos": 294, "end_char_pos": 305}, {"type": "D", "before": "The Invisible Man", "after": null, "start_char_pos": 369, "end_char_pos": 386}, {"type": "D", "before": "Here Comes the Navy", "after": null, "start_char_pos": 394, "end_char_pos": 413}, {"type": "D", "before": "Titanic", "after": null, "start_char_pos": 426, "end_char_pos": 433}, {"type": "D", "before": "Hollywood", "after": null, "start_char_pos": 491, "end_char_pos": 500}, {"type": "R", "before": "Shirley Temple, Warner Baxter, and Dick Powell", "after": ", , and", "start_char_pos": 643, "end_char_pos": 689}, {"type": "D", "before": "James Cameron", "after": null, "start_char_pos": 814, "end_char_pos": 827}, {"type": "D", "before": "Titanic", "after": null, "start_char_pos": 850, "end_char_pos": 857}, {"type": "D", "before": "Academy Award", "after": null, "start_char_pos": 978, "end_char_pos": 991}, {"type": "D", "before": "Hollywood Walk of Fame", "after": null, "start_char_pos": 1128, "end_char_pos": 1150}, {"type": "D", "before": "People's Magazine", "after": null, "start_char_pos": 1164, "end_char_pos": 1181}], "sents_char_pos": [0, 70, 155, 262, 338, 441, 519, 571, 691, 770, 944, 1060]}
+{"doc_id": "212141", "revision_depth": "1", "before_revision": "File photo of Sebastian Vettel (2010) Suzuka Circuit Red Bull drivers Sebastian Vettel and Mark Webber made a one-two finish from the front line of the starting grid of the Formula One 2010 Japanese Grand Prix at Suzuka Circuit , Japan. Lewis Hamilton crashed early in a free practice damaging his suspension, but was able to participate in a qualifying session using a spare car. Though Hamilton posted the third fastest time, he lost 5 places on the starting grid for a gearbox change. After Robert Kubica lost a rear wheel from his Renault car and retired from the race, it was Fernando Alonso who owned the third place on the podium for Ferrari , to follow his floodlit win at Singapore Jenson Button (McLaren ) passed his teammate Hamilton after the latter lost his third gear. They finished fourth and fifth. Nico Rosberg lost his rear wheel and retired just as Kubica did earlier. His teammate Michael Schumacher came sixth for Mercedes factory team. Two Saubers of Kamui Kobayashi and Nick Heidfeld, a Williams of Rubens Barrichello and a Toro Rosso of Sebastien Buemi closed the top ten drivers in the finishing lap with the leader.", "after_revision": "File photo of Sebastian Vettel (2010) Suzuka Circuit drivers and made a one-two finish from the front line of the starting grid of the at , Japan. crashed early in a free practice damaging his suspension, but was able to participate in a qualifying session using a spare car. Though Hamilton posted the third fastest time, he lost 5 places on the starting grid for a gearbox change. After lost a rear wheel from his car and retired from the race, it was who owned the third place on the podium for , to follow his floodlit win at ( ) passed his teammate Hamilton after the latter lost his third gear. They finished fourth and fifth. lost his rear wheel and retired just as Kubica did earlier. His teammate came sixth for factory team. Two of and , a of and a of closed the top ten drivers in the finishing lap with the leader.", "edit_actions": [{"type": "R", "before": "Red Bull drivers Sebastian Vettel and Mark Webber", "after": "drivers and", "start_char_pos": 53, "end_char_pos": 102}, {"type": "R", "before": "Formula One 2010 Japanese Grand Prix at Suzuka Circuit", "after": "at", "start_char_pos": 173, "end_char_pos": 227}, {"type": "D", "before": "Lewis Hamilton", "after": null, "start_char_pos": 237, "end_char_pos": 251}, {"type": "D", "before": "Robert Kubica", "after": null, "start_char_pos": 494, "end_char_pos": 507}, {"type": "D", "before": "Renault", "after": null, "start_char_pos": 535, "end_char_pos": 542}, {"type": "D", "before": "Fernando Alonso", "after": null, "start_char_pos": 581, "end_char_pos": 596}, {"type": "D", "before": "Ferrari", "after": null, "start_char_pos": 641, "end_char_pos": 648}, {"type": "D", "before": "Singapore", "after": null, "start_char_pos": 681, "end_char_pos": 690}, {"type": "R", "before": "Jenson Button (McLaren", "after": "(", "start_char_pos": 691, "end_char_pos": 713}, {"type": "D", "before": "Nico Rosberg", "after": null, "start_char_pos": 815, "end_char_pos": 827}, {"type": "D", "before": "Michael Schumacher", "after": null, "start_char_pos": 901, "end_char_pos": 919}, {"type": "D", "before": "Mercedes", "after": null, "start_char_pos": 935, "end_char_pos": 943}, {"type": "R", "before": "Saubers of Kamui Kobayashi and Nick Heidfeld, a Williams of Rubens Barrichello and a Toro Rosso of Sebastien Buemi", "after": "of and , a of and a of", "start_char_pos": 962, "end_char_pos": 1076}], "sents_char_pos": [0, 236, 380, 487, 782, 814, 887, 957]}
+{"doc_id": "212316", "revision_depth": "1", "before_revision": "Wikinews interviewed author Amy Scobee about her book Scientology - Abuse at the Top, and asked her about her experiences working as an executive within the organization. Scobee joined the organization at age 14, and worked at Scientology's international management headquarters for several years before leaving in 2005. She served as a Scientology executive in multiple high-ranking positions, working out of the international headquarters of Scientology known as \" Gold Base \", located in Gilman Hot Springs near Hemet, California . Scientology was founded by science fiction writer L. Ron Hubbard in 1952. Scobee joined Scientology at age 14, and after leaving in 2005 she began to speak out critically about the organization and her views on alleged abuse carried out by management leader David Miscavige against staff members. Scientology - Abuse at the Top was published in May, and Scobee has subsequently appeared in interviews about her experiences in the Scientology organization \u2013 for media including the St. Petersburg Times of Florida on June 23, and the BBC program Panorama hosted by investigative journalist John Sweeney, The Secrets of Scientology , which broadcast on BBC One on September 28. Scobee's book is structured chronologically, and she recounts her experiences first joining the Scientology organization, then becoming a staff member in its elite group the Sea Org , and finally rising to serve in multiple different high-ranking roles at the organization's international management headquarters. Periodically throughout her experiences as an executive staff member for Scientology, Scobee was sent to the organization's penal justice system the \" Rehabilitation Project Force \" (RPF), for supposed \"evil on L. Ron Hubbard\" or negative thoughts about the organization. These sentences often occurred after a division of management Scobee had served under experienced downward statistics related to profit margins and financial performance for the organization. In each instance she was sent to the RPF, Scobee was subsequently reinstated to an executive management role, and given supervisory responsibility over other senior Scientology officials. The author reveals difficult emotional experiences in her book, including an incident where she was raped at age 14 by a Scientology supervisor and subsequently instructed by a \"Scientology Ethics Officer\" that she was in a \"state of treason\" and to keep the matter quiet and not report it to the police. Scobee describes difficult experiences she endured as part of her punishment served in Scientology's RPF, including being sent to the RPF at age 16, and subsequently being slapped across the face for refusing to climb into a garbage can and clean it out. Within Scientology management and the Sea Org, Scobee rose to serve in the Watchdog Committee (WDC) \u2013 the highest ecclesiastical body in the organization. After leaving the organization, Scobee was declared a \" Suppressive Person \", and Scientology's intelligence agency the Office of Special Affairs attempted to enforce organization regulations preventing her from ever speaking to her family including her mother again. Prior to her book's publication, Scobee was threatened with legal action, in a letter from a lawyer Bertram Fields representing influential Scientology member and celebrity, actor Tom Cruise . Separately, Scientology representative Tommy Davis stated the organization was also preparing a lawsuit against her related to the publication of her book. Further news about such threatened lawsuits have not been forthcoming following these statements from Tom Cruise's lawyer and Scientology's spokesman. After Scobee began to speak out critically about Scientology to the St. Petersburg Times, the Scientology propaganda publication Freedom Magazine issued a publication in which it referred to her repeatedly as \"The Adulteress\". Though Scobee had thought that statements she made during Scientology counseling sessions called \" Auditing \" were to be kept confidential under priest-penitent religious privilege, BBC News reported that \"intimate details of her sex life\" were forwarded by Scientology, to the St. Petersburg Times. BBC News reported that during an interview for the Panorama program, Scobee was photographed by agents for Scientology along with journalist John Sweeney. These photographs were then sent by Scientology UK lawyers from the firm Carter-Ruck to the BBC, in an attempt to show \"bias\" of journalist Sweeney towards Scobee in his interviewing. Scientology - Abuse at the Top received a favorable reception from reviews and media coverage. All Headline News characterized it as a \"tell-all book\" about Scientology. Scobee's account has also received positive reception in coverage from Today Tonight, The Drew Marshall Show, Lateline, and Panorama . Why did you decide to join the elite Scientology group, the Sea Org ?AS: I thought that it sounded like an exciting adventure where I could help \"salvage the planet\" on a much larger scale than just in my home town. The \"Sea Organization\" (also Sea Org or SO for short) is defined on the official Church of Scientology web site as follows: AS: When I left in March 2005 after being a full-time, live-in staff member for a quarter century, I had a total of $150 to my name. I had no outside job skills, never cooked and I barely knew how to drive. I had no clue what I would be doing to make a living in the \"outside world\". It was not unlike being dropped on another planet and having to figure out how to survive from scratch. After I became stable and saved up some money, I began writing. As I wrote, I realized how important it was to get my story out. This \"religion\" promotes how their purpose is to create a sane world without criminality, etc. and the more I was OUT of their grip, the more I realized just how insane and criminal they really are. I learned about the Universal Declarations for Human Rights and saw how many points I personally knew were violated by the Scientology organization with their members. I learned about laws of the land (which I had been entirely ignorant of while a staff member) and realized some of the acts that I witnessed were actual violations of the LAW. But what set me on the past to exposing the abuse within Scientology the most was when my mother was forced to disconnect from me, per Scientology's \"disconnection\" policy where members are to cut all ties with anyone not in good standing with their \"church\". This was a very emotionally traumatic situation. In my view, no religion worthy of the title should have a right to stand between loved ones. Quite early on in the book's first chapter, you recount an incident of being raped at age 14, by a 35-year-old married man who was your Scientology supervisor. You describe how your \"Scientology Ethics Officer\" found out, said you were in a \"state of treason\", and that the incident was kept quiet and not reported to the police by Scientology officials. How difficult was it to include this in the book? For what reason did you choose to include this? Why didn't you tell your parents about this?AS: To me, it was very important to include this information in my book because it gives the reader an idea of how Scientology operates. One of the worst crimes you can commit as a Scientologist is bringing about \"bad public relations\" for them. Things that happen internally are KEPT internal with the \"we handle our own\" doctrine. Unfortunately, this was a CRIME for which that person could have been arrested. Instead, it was \"handled\" by the local staff (swept under the carpet) and forgotten about. I didn't tell my parents because I was ashamed and afraid. After describing your arrival at the Scientology \"Flag Land Base\" in Florida at age 16, you recall how you met and became intimate with a 26-year-old man named David Paul, who later became your husband. For this act, you were subjected to a \"security check\" process on the Scientology device, the E-meter, and ordered to serve time performing manual labor on the controversial \"Rehabilitation Project Force\" (RPF) of Scientology. Is 16 a relatively young age to be sentenced to the Rehabilitation Project Force in Scientology? Did you know other individuals on this program that were younger than you, or around the same age? AS: Yes, 16 is a young age to be sentenced to the Rehabilitation Project Force. I should have been attending school as per the agreement with my mother when she gave parental consent for me to join the Sea Organization \u2013 but I factually never saw one day of school after I joined. There were other teen-agers on the RPF at the same time, but I believe I was the youngest. Scientologists working in the organization's \"Rehabilitation Project Force\" in Los Angeles, California During participation in the Rehabilitation Project Force, you recount how you were slapped across the face for refusing to climb into a garbage can after being ordered to do so by a leader of your group. How did this make you feel? Did you consider leaving the organization at all at this point in time? Why or why not, and why did you remain?AS: It was a completely nutty order and I wasn't about to comply. I ran around the block to get away as the lady who issued the order chased after me. I went to the person in charge asking for help but he was not in his office. The lady chased me into that office and then hit me across the face. I did NOT hit her back because I wanted to show that she was the crazy one. However when the Ethics Officer got there, he said I should have complied as she was my superior. I felt like it was a huge injustice because the order made no sense and had no purpose. She was just trying to exert her \"authority\" over me. But, I didn't want to be in more trouble, so I did my punishment for non-compliance and carried on. No, I did not think of leaving then. At that point, I just thought that lady was insane, not the entire organization. After completing your time on the Rehabilitation Project Force, you were appointed to the position of \"Commanding Officer of the Flag Land Base's Communicator\", where you were \"responsible for all in-coming and out-going traffic from the executive and obtaining compliance to all orders issued\". Did it surprise you that directly after finishing the Rehabilitation Project Force, you were given such a position of responsibility as a Scientology executive? Does this occur often in Scientology to members after they finish their sentence in the Rehabilitation Project Force? AS: In the Sea Organization, one is expected to be able to perform any duty \u2013 with or without training. It's preached that the salvation of the world is on our shoulders and everyone needs to pull up their bootstraps and make it go right. So, the appointment did not surprise me. Shortly after your promotion from Rehabilitation Project Force member to this position, you were promoted to \"Flag Land Bureau Estates Management Chief\", where you were \"responsible for all public hotels and services\", and subsequently promoted to the \"Commodore's Messenger Organization (CMO)\". At the end of chapter 3, you write how you were \"placed under a group justice action, called a Committee of Evidence\", and the committee, \"recommended my removal for neglect of duty regarding the schedule\". However, a few days later you were told you were assigned to Los Angeles, California, in order to recruit for members to join the CMO. Again, this appears to be a pattern of conflicting orders within the organization, where in one instance you were disciplined for perceived slights, and yet directly afterward, promoted to a higher position of authority as a Scientology executive. How do you explain this behavior within the organization?AS: The control and handling of personnel within the Sea Org was very unpredictable. There were always huge demands and needs for people on various projects or positions that had to be filled \"at once\". So one could expect rapid changes. It was also considered that after one messes up, they can be corrected using the \"ethics technology\" of Scientology and confessionals so they can carry on after their level of ethics are once again acceptable. What was the highest-ranking position you held within Scientology? Who did you report to in this position? What responsibilities did you have, and how many other people and sub-entities did you oversee? AS: I was in the Watchdog Committee (WDC) which is the highest ecclesiastical body in Scientology, with a WDC member appointed over each of the numerous \"sectors\" or areas of Scientology to see to their proper management. My boss as a WDC member is the WDC Chairman. This is the highest management position in the organization. I was in WDC for about a decade and held about six different sectors over the years, including the Association for Better Living and Education (ABLE) sector, which is responsible for the secular aspects of the organization \u2013 drug rehabilitation, criminal reform, Applied Scholastics study technology and The Way To Happiness Foundation \u2013 and the Celebrity Center sector. Anything that goes on inside your sector or sphere of responsibility as a WDC member, is your responsibility and you're held accountable. This could be very stressful, particularly when the current head of Scientology \u2013 David Miscavige \u2013 is so abusive. For example, Miscavige learned that the Tampa Scientology organization was not paying their rent in 2003. As I had previously been the WDC member for all Scientology churches (approx 175 of them around the world) and should have noticed and handled it then, Miscavige demanded that I personally pay the rent of $ 5,000 (which I did not have). This order was enforced by his personal staff \u2013 I had to borrow the money from several other staff members and turn it into the Finance Office, who then wrote a check to the Tampa organization to pay their back rent as a \"gift\" to them from management. In chapter 4 of Scientology - Abuse at the Top, you cite the book Combating Cult Mind Control by cult researcher Steven Hassan , who explains that, \"Members are made to feel part of an elite corps of mankind.\" At what point in time did you read this book? Are there other books which helped you understand and put your experiences within Scientology into a greater context?AS: I read several quotes from Steven Hassan from the internet that made total sense to me, so I ordered his book. It's a fantastic read. I learned quite a lot about mind control and particularly found it interesting and true that a key aspect of mind control is INFORMATION CONTROL. If one can control the information that you are allowed to receive, then you can really control their thinking. They wouldn't be equipped with all of the ACTUAL information to be able to analyze and made a sane decision about something. In Scientology and especially in the Sea Organization, information is controlled intensively. This includes ALL communication via telephone or mail \u2013 incoming and outgoing \u2013 being screened through security personnel in order to detect any antagonism regarding Scientology from the \"outside\", no televisions allowed, no internet access, not being permitted to listen to or read any article that said anything negative about Scientology. Another book I found to be very beneficial after leaving Scientology was Man's Search for Meaning by Viktor Frankl . It answered a lot for me. You described in chapter 6, being assigned to a sub-division of the Rehabilitation Project Force, called the \"RPF's RPF\". How was this different from the main RPF itself? What typical tasks were you ordered to perform? Were there many other women assigned to this unit? Were women given different roles or treated differently than men while on the RPF or the RPF's RPF? After being appointed in October 1991 as the \"Watchdog Committee member over the Celebrity Centre sector\", you recall meeting several members of \"the top Scientology celebrity public\", including John Travolta, Kelly Preston, Kirstie Alley, Anne Archer, Nancy Cartwright, Billy Sheehan, Priscilla Presley, Lisa Marie Presley, Juliette Lewis , Isaac Hayes, Tom Cruise, Edgar Winter, and Jenna Elfman . In what capacity did you meet these Scientology celebrities? Were they coming in for Scientology auditing, or counseling? Did they receive advice and assistance in some form with their professional careers?AS: While I was working on the project to build Celebrity Centre International in Hollywood, I was often in the President's office of the Celebrity Center where the top celebrities often would come. That's how I met most of them. They would come into Celebrity Center to attend a course, to go in for a counseling session or to bring someone new in to introduce them to Scientology. Celebrity Centre International has a \"career counseling\" service it does provide and some celebrities have done this service to hopefully help them to do better in their careers. You write that you are aware of situations where members of Scientology hired by celebrities as assistants or security staff, have actually reported back to the organization through a Scientology process called \"Security Checks\", with revealing information about those celebrities. Did any of these celebrities ever find out such a tactic was being used to uncover information about them? If so, what was their response to this? I was awarded PERMANENT POSTING STATUS on two executive positions in Church of Scientology International (CSI \u2013 the highest management organization for Scientology). This is a status that can only be verified and authorized by the Religious Technology Center (RTC \u2013 the holder of the Scientology trademarks and service marks). I received my Permanent Posting certificate by RTC as the Watchdog Committee member for Celebrity Centres (WDC CC), which I held as a single duty for four years, and as a function with other Scientology sectors for nearly a decade. Amongst the extensive list of requirements one must meet to become Permanently Posted, ones ethics and production record must be verified as excellent and you must be capable of generating on the order of a million dollars a year for the organization. In 1996, you were transferred to the executive post of Watchdog Committee member for the Association for Better Living and Education (WDC ABLE). ABLE is an organization operated by Scientology management which oversees groups that promote Scientology techniques. In this executive position, you were responsible for supervising Scientology-associated entities including: Applied Scholastics, Narconon, Criminon, and The Way to Happiness Foundation . Can you explain a little bit about the function and purpose of each of these groups? Are they actual-practice, separate \"secular\" functioning organizations, or somehow related to the Scientology organization itself? How specifically were these groups influenced and/or managed by Scientology leadership? How involved was David Miscavige in the functioning of these groups? After being told by David Miscavige that your husband at the time, Jim Mortland, was being removed or \"offloaded\" from Scientology's Sea Organization, you were called into the office of the Internal Executive where you were pressured into making a decision to stay in the Sea Org and separate from your husband. You write in the book, that your \"brainwashed response\" was to answer, \"I'm staying\". Why did you characterize this as a brainwashed response. How and why did you come to believe you had been a victim of brainwashing ?AS: Per this Wikipedia definition, \"Mind control (also known as brainwashing, coercive persuasion, mind abuse, thought control, or thought reform) refers to a process in which a group or individual 'systematically uses unethically manipulative methods to persuade others to conform to the wishes of the manipulator(s), often to the detriment of the person being manipulated'.\" In my right mind, I would not have walked away from my husband of 17 years. In my right mind, I would not have \"turned a blind eye\" when I witnessed a dozen accounts of assault & battery being committed on my comrades by David Miscavige. And I would never have given in to the physical labor and other \"ethics\" actions taken on myself and others for trumped up offenses. But I now understand that I was under the influence of mind control. This is not a light matter. People can laugh that concept off so readily, but it's a very REAL thing. When one considers what is at stake (or is thought to be at stake) if one were to step out of line or violate the rules in any way, you try to remain quiet and compliant. In Scientology, if you get yourself in enough trouble (from some executive's point of view), you can be banned from ever being allowed to receive the upper level services in Scientology \u2013 and thus enslave yourself as a spiritual being for eternity. Another more minor factor, but still major enough to keep you in line is the threat that any of your family or friends in Scientology would have to disconnect from you if you were no longer in good standing. So to say you want to leave, to go against the head of the organization, to report to outside authorities what's going on inside is considered more of a crime than being quiet and compliant as a \"good Scientologist\". This is what I consider has people brainwashed. It's a way to control their rational thinking. It's \"the end justifies the means\". When I realized that I had been rationalizing away utter insanities that I both witnessed and experienced in the organization and that I needed to simply look at what was factually in front of me, I started making my plans to leave. The details of this revelation and how I finally got out is all detailed in my book. In chapter 10, \"Assault and Battery\", you recount witnessing instances of violence by David Miscavige towards Scientology officials including: Ray Mithoff, Mike Rinder , and Jeff Hawkins. You write, \"I am ashamed that I did not have enough courage at the time to inform the authorities or call the police, which would have been the logical thing to do.\" Why do you think you decided not to report these instances to the police? What do you think law enforcement would have done if you had reported the matter to police? Knowing what you know now, and revisiting your memories of these incidents in hindsight, would you have acted differently if you were in the same situation again? The last chapter of your book describes your emotional reunion with your family after leaving Scientology - first meeting your father and then calling and meeting your mother - and finally reuniting with Mark \"Mat\" Pesch, now your husband. At any point in time did you feel unsafe during your journey to reunite with these people? Did Scientology's intelligence agency, the Office of Special Affairs (OSA), monitor you or your family after you left the organization?AS: As I was getting on the airplane home, the OSA staff member who escorted me to the airport said that I could not talk to my mother due to the \"suppressive person\" declare issue that she handed me a few hours before. Of course, after I arrived to my father's house, I realized that I was no longer under Scientology's control and I could contact my mother if I wanted \u2013 and I desperately wanted to! I hadn't seen her in years and now I was home for good! Scientology did find out about us seeing each other and took various actions to put pressure on my step-father to enforce their disconnection policy. This was very messy and is one of the key reasons I chose to speak out publicly against Scientology's human rights violations. At one point, my husband and I were followed by Private Investigators anywhere we went. We had to file a police report because one in particular was being very reckless in his attempts to stay on our tail \u2013 and flee when we tried to confront him. I finally filed a declaration against Scientology, showing several instances of harassment to myself and my family, which I considered witness tampering since I was named as a witness on an on-going lawsuit against them. Were you concerned that your relationships might be affected due to Scientology declaring you a \" Suppressive Person \", and telling members of the organization never to speak to you again? Has this stopped you, or are you in communication with current and/or former members of the organization? One month before your book was published, All Headline News reported that you received a legal threat from Tom Cruise's lawyer, Bertram Fields , that warned you would face a defamation lawsuit from Cruise if the book was made publicly available. Specific complaints made included your accounts of hearing about a \"drug history\" involving Cruise, an ultimatum made by the Scientology organization to Cruise to decide between Nicole Kidman or the organization, and that Cruise's personal assistants and employees that staff his home are chosen and paid for by the Scientology organization. Can you speak to how you came to have knowledge about these assertions you made, why you believe them to be true and factually accurate, and how you felt when you received the legal threat letter from Cruise's attorney? Prior to publication of Scientology - Abuse at the Top by Amy Scobee, the author was threatened with separate legal actions \u2013 by lawyer Bertram Fields representing influential Scientology member and celebrity, actor Tom Cruise ; and Scientology representative Tommy Davis on behalf of Scientology management. AS: Bertram Fields made a mistake by issuing that legal threat when he hadn't even read my book to know what I actually said about his client. He made assumptions based on hearsay. When I received the letter, I thought that it was just like Scientology \u2013 issue threats to intimidate and back someone off. I wasn't going to back off because what I wrote in my book was true. I am the one who did the project to hire Scientologists for Tom's household. I am the one Shelly Miscavige told what disqualifying drugs Tom took so he could not qualify for the Sea Organization \u2013 which he supposedly wanted to join. I didn't say anything in my book about Cruise having to decide between Nicole or the organization. So, I knew that it was an attempt to prevent me from putting out my book as \"little 'ol me\" could never possibly stand up to the high-powered lawyer of an A-list celebrity who has millions of dollars at his disposal. But the fact is \u2013 it didn't phase me as truth is truth and I'm willing to stand up for the truth. The book was subsequently published and made publicly available. At this point in time, has there been any follow-up from Tom Cruise, his lawyer, or representatives, to you? How do you feel about your legal standing if Cruise were to escalate the matter beyond the initial legal threat letter? The month your book was published, the New York Daily News reported that Scientology organization public representative Tommy Davis characterized your accounts as \"fiction\". With regards to assertions you made that David Miscavige and Scientology officials \"snooped\" in the confessional folders of Scientology members and particularly celebrities, Davis stated, \"Nobody in the church has ever violated the priest-penitent privilege. ... [Confessional files] are held in the strictest confidence.\" How do you respond to these statements by Davis?AS: Just like I did to the New York Daily News when they asked me about it: If Scientology does not violate the priest-penitent privilege, what is the Scientology spokesperson doing talking to the press about my sex life? Davis further stated to the New York Daily News that (separate from the earlier intimations from the lawyer for Tom Cruise) the Scientology organization was itself \"preparing a lawsuit\" against you because of the \"disgusting allegations\" in the book. Have you received any notice from the Scientology organization with regards such a potential lawsuit? Davis proceeded to make claims to the New York Daily News about your sexual relationships. Additionally, BBC News reported that after you began to make public criticism of the organization and its leader David Miscavige, Scientology provided \"intimate details of her sex life\" to the Florida newspaper the St. Petersburg Times. How did you feel when these sexual details were made public by Scientology? How do you feel this behavior by the organization and its officials reflects on its assertions of keeping confidential information secret, and respecting the privacy of priest-penitent privilege?AS: To me \u2013 and MANY other people \u2013 it was obvious through their child-like reaction that they have something fairly big to hide. I gave a detailed eye-witness account of the head of the Scientology religion repeatedly beating staff members. That they respond with exaggerated accusations about my sex life is just a red herring. And it also proves that private information you may divulge in confessionals while a member of Scientology could be used against you should you step out of line in the future. In an August 2009 issue of the Scientology publication, Freedom Magazine , the issue referred to you multiple times only as \"The Adulteress\". How did this make you feel when you found out about this publication? When you were still a member of the Scientology organization, what was your opinion at that point in time of Freedom Magazine? What is your opinion of the publication - its reputability and reliability, at this point in time? In the August 2009 publication of \"Freedom\", they slandered both the St. Petersburg Times reporters and the \"defectors\" (myself, Marty Rathbun , Mike Rinder and Tom DeVocht). Note: they did not use the name \"Amy Scobee\" in this magazine. Instead, they refer to me as \"the Adulteress\". This slanderous character assassination appears in more than 20 places in their publication. It's painfully obvious that they were referring to me since I was the only female that spoke out in the article they were protesting. I'm not \"an adulteress\". As a member of Scientology's Sea Organization (age 16 to 42), I had sexual intercourse with my first husband, my second husband and my current husband. Regardless, my \"sexual purity\" has nothing to do with my reporting the fact that I witnessed the head of the Church of Scientology commit repeated assault & battery on specific church executives while I was employed there. It's just their attempt to \"annihilate credibility\" for exposing this crime. In my view, the Freedom magazine is used to help carry out Miscavige's private agenda to try to remain in a position of power in that organization. Amy Scobee in 2009 BBC News reported on September 26, that during an interview for the Panorama special, The Secrets of Scientology , yourself and reporter John Sweeney were photographed, and such photographs of the two of you hugging after completing the interview were sent by Scientology UK lawyers from the firm Carter-Ruck to the BBC. What do you think Scientology was attempting to accomplish by sending these photos to the BBC? Is such behavior by the Scientology organization with regard to monitoring of journalists, critics, or former members such as yourself common? What do you do to cope and/or respond to such behavior from the Scientology organization?AS: Yes, this type of intimidation is common practice by Scientology. As a witness in an on-going court case against Scientology, I was recently in a deposition with Scientology's lead counsel. He pulled out the photo that their private investigators took of John Sweeney giving me a hug on the highway outside of the Scientology compound in Hemet after nearly two full days of interviews. He proceeded to ask me how much \"alone time\" I spent with Mr. Sweeney (which was none) and when I explained that we all gave each other hugs goodbye before we went our separate ways and that my husband was right there with me, the lawyer said, \"We'll see what the jury says about that!\" All they are trying to do is intimidate us into silence through constant trails by PI's, slandering our names with ridiculous accusations, etc., so we'd become cowed, be quiet and let their criminality go on, unchecked. Well, it hasn't worked to keep me silent. To me, it's more important to prevent anyone else from being hurt by making Scientology's human rights violations known than to worry about them tarnishing my personal reputation in retaliation. I believe that the truth must be brought to light, despite consequences. Are there any other points that you would like to elaborate or explain? Related news ", "after_revision": "Wikinews interviewed author about her book Scientology - Abuse at the Top, and asked her about her experiences working as an executive within the organization. Scobee joined the organization at age 14, and worked at Scientology's international management headquarters for several years before leaving in 2005. She served as a Scientology executive in multiple high-ranking positions, working out of the international headquarters of Scientology known as \" \", located in Gilman Hot Springs near , . Scientology was founded by writer in 1952. Scobee joined Scientology at age 14, and after leaving in 2005 she began to speak out critically about the organization and her views on alleged abuse carried out by management leader against staff members. Scientology - Abuse at the Top was published in May, and Scobee has subsequently appeared in interviews about her experiences in the Scientology organization \u2013 for media including the of Florida on June 23, and the program hosted by , , which broadcast on on September 28. Scobee's book is structured chronologically, and she recounts her experiences first joining the Scientology organization, then becoming a staff member in its elite group the , and finally rising to serve in multiple different high-ranking roles at the organization's international management headquarters. Periodically throughout her experiences as an executive staff member for Scientology, Scobee was sent to the organization's penal justice system the \" \" (RPF), for supposed \"evil on L. Ron Hubbard\" or negative thoughts about the organization. These sentences often occurred after a division of management Scobee had served under experienced downward statistics related to profit margins and financial performance for the organization. In each instance she was sent to the RPF, Scobee was subsequently reinstated to an executive management role, and given supervisory responsibility over other senior Scientology officials. The author reveals difficult emotional experiences in her book, including an incident where she was at age 14 by a Scientology supervisor and subsequently instructed by a \"Scientology Ethics Officer\" that she was in a \"state of treason\" and to keep the matter quiet and not report it to the police. Scobee describes difficult experiences she endured as part of her punishment served in Scientology's RPF, including being sent to the RPF at age 16, and subsequently being slapped across the face for refusing to climb into a garbage can and clean it out. Within Scientology management and the Sea Org, Scobee rose to serve in the Watchdog Committee (WDC) \u2013 the highest ecclesiastical body in the organization. After leaving the organization, Scobee was declared a \" \", and Scientology's the attempted to enforce organization regulations preventing her from ever speaking to her family including her mother again. Prior to her book's publication, Scobee was threatened with legal action, in a letter from a lawyer representing influential Scientology member and celebrity, actor . Separately, Scientology representative stated the organization was also preparing a lawsuit against her related to the publication of her book. Further news about such threatened lawsuits have not been forthcoming following these statements from Tom Cruise's lawyer and Scientology's spokesman. After Scobee began to speak out critically about Scientology to the St. Petersburg Times, the Scientology publication issued a publication in which it referred to her repeatedly as \"The Adulteress\". Though Scobee had thought that statements she made during Scientology counseling sessions called \" \" were to be kept confidential under priest-penitent religious privilege, reported that \"intimate details of her sex life\" were forwarded by Scientology, to the St. Petersburg Times. BBC News reported that during an interview for the Panorama program, Scobee was photographed by agents for Scientology along with journalist John Sweeney. These photographs were then sent by Scientology UK lawyers from the firm Carter-Ruck to the BBC, in an attempt to show \"bias\" of journalist Sweeney towards Scobee in his interviewing. Scientology - Abuse at the Top received a favorable reception from reviews and media coverage. characterized it as a \"tell-all book\" about Scientology. Scobee's account has also received positive reception in coverage from , , , and . Why did you decide to join the elite Scientology group, the ?AS: I thought that it sounded like an exciting adventure where I could help \"salvage the planet\" on a much larger scale than just in my home town. The \"Sea Organization\" (also Sea Org or SO for short) is defined on the official Church of Scientology web site as follows: AS: When I left in March 2005 after being a full-time, live-in staff member for a quarter century, I had a total of $150 to my name. I had no outside job skills, never cooked and I barely knew how to drive. I had no clue what I would be doing to make a living in the \"outside world\". It was not unlike being dropped on another planet and having to figure out how to survive from scratch. After I became stable and saved up some money, I began writing. As I wrote, I realized how important it was to get my story out. This \"religion\" promotes how their purpose is to create a sane world without criminality, etc. and the more I was OUT of their grip, the more I realized just how insane and criminal they really are. I learned about the Universal Declarations for Human Rights and saw how many points I personally knew were violated by the Scientology organization with their members. I learned about laws of the land (which I had been entirely ignorant of while a staff member) and realized some of the acts that I witnessed were actual violations of the LAW. But what set me on the past to exposing the abuse within Scientology the most was when my mother was forced to disconnect from me, per Scientology's \"disconnection\" policy where members are to cut all ties with anyone not in good standing with their \"church\". This was a very emotionally traumatic situation. In my view, no religion worthy of the title should have a right to stand between loved ones. Quite early on in the book's first chapter, you recount an incident of being at age 14, by a 35-year-old married man who was your Scientology supervisor. You describe how your \"Scientology Ethics Officer\" found out, said you were in a \"state of treason\", and that the incident was kept quiet and not reported to the police by Scientology officials. How difficult was it to include this in the book? For what reason did you choose to include this? Why didn't you tell your parents about this?AS: To me, it was very important to include this information in my book because it gives the reader an idea of how Scientology operates. One of the worst crimes you can commit as a Scientologist is bringing about \"bad public relations\" for them. Things that happen internally are KEPT internal with the \"we handle our own\" doctrine. Unfortunately, this was a CRIME for which that person could have been arrested. Instead, it was \"handled\" by the local staff (swept under the carpet) and forgotten about. I didn't tell my parents because I was ashamed and afraid. After describing your arrival at the Scientology \"Flag Land Base\" in Florida at age 16, you recall how you met and became intimate with a 26-year-old man named David Paul, who later became your husband. For this act, you were subjected to a \"security check\" process on the Scientology device, the , and ordered to serve time performing manual labor on the controversial \"\" (RPF) of Scientology. Is 16 a relatively young age to be sentenced to the Rehabilitation Project Force in Scientology? Did you know other individuals on this program that were younger than you, or around the same age? AS: Yes, 16 is a young age to be sentenced to the Rehabilitation Project Force. I should have been attending school as per the agreement with my mother when she gave parental consent for me to join the Sea Organization \u2013 but I factually never saw one day of school after I joined. There were other teen-agers on the RPF at the same time, but I believe I was the youngest. Scientologists working in the organization's \"\" in , California During participation in the Rehabilitation Project Force, you recount how you were slapped across the face for refusing to climb into a garbage can after being ordered to do so by a leader of your group. How did this make you feel? Did you consider leaving the organization at all at this point in time? Why or why not, and why did you remain?AS: It was a completely nutty order and I wasn't about to comply. I ran around the block to get away as the lady who issued the order chased after me. I went to the person in charge asking for help but he was not in his office. The lady chased me into that office and then hit me across the face. I did NOT hit her back because I wanted to show that she was the crazy one. However when the Ethics Officer got there, he said I should have complied as she was my superior. I felt like it was a huge injustice because the order made no sense and had no purpose. She was just trying to exert her \"authority\" over me. But, I didn't want to be in more trouble, so I did my punishment for non-compliance and carried on. No, I did not think of leaving then. At that point, I just thought that lady was insane, not the entire organization. After completing your time on the Rehabilitation Project Force, you were appointed to the position of \"Commanding Officer of the Flag Land Base's Communicator\", where you were \"responsible for all in-coming and out-going traffic from the executive and obtaining compliance to all orders issued\". Did it surprise you that directly after finishing the Rehabilitation Project Force, you were given such a position of responsibility as a Scientology executive? Does this occur often in Scientology to members after they finish their sentence in the Rehabilitation Project Force? AS: In the Sea Organization, one is expected to be able to perform any duty \u2013 with or without training. It's preached that the salvation of the world is on our shoulders and everyone needs to pull up their bootstraps and make it go right. So, the appointment did not surprise me. Shortly after your promotion from Rehabilitation Project Force member to this position, you were promoted to \"Flag Land Bureau Estates Management Chief\", where you were \"responsible for all public hotels and services\", and subsequently promoted to the \" (CMO)\". At the end of chapter 3, you write how you were \"placed under a group justice action, called a Committee of Evidence\", and the committee, \"recommended my removal for neglect of duty regarding the schedule\". However, a few days later you were told you were assigned to Los Angeles, California, in order to recruit for members to join the CMO. Again, this appears to be a pattern of conflicting orders within the organization, where in one instance you were disciplined for perceived slights, and yet directly afterward, promoted to a higher position of authority as a Scientology executive. How do you explain this behavior within the organization?AS: The control and handling of personnel within the Sea Org was very unpredictable. There were always huge demands and needs for people on various projects or positions that had to be filled \"at once\". So one could expect rapid changes. It was also considered that after one messes up, they can be corrected using the \"ethics technology\" of Scientology and confessionals so they can carry on after their level of ethics are once again acceptable. What was the highest-ranking position you held within Scientology? Who did you report to in this position? What responsibilities did you have, and how many other people and sub-entities did you oversee? AS: I was in the Watchdog Committee (WDC) which is the highest ecclesiastical body in Scientology, with a WDC member appointed over each of the numerous \"sectors\" or areas of Scientology to see to their proper management. My boss as a WDC member is the WDC Chairman. This is the highest management position in the organization. I was in WDC for about a decade and held about six different sectors over the years, including the Association for Better Living and Education (ABLE) sector, which is responsible for the secular aspects of the organization \u2013 drug rehabilitation, criminal reform, Applied Scholastics study technology and The Way To Happiness Foundation \u2013 and the Celebrity Center sector. Anything that goes on inside your sector or sphere of responsibility as a WDC member, is your responsibility and you're held accountable. This could be very stressful, particularly when the current head of Scientology \u2013 David Miscavige \u2013 is so abusive. For example, Miscavige learned that the Tampa Scientology organization was not paying their rent in 2003. As I had previously been the WDC member for all Scientology churches (approx 175 of them around the world) and should have noticed and handled it then, Miscavige demanded that I personally pay the rent of $ 5,000 (which I did not have). This order was enforced by his personal staff \u2013 I had to borrow the money from several other staff members and turn it into the Finance Office, who then wrote a check to the Tampa organization to pay their back rent as a \"gift\" to them from management. In chapter 4 of Scientology - Abuse at the Top, you cite the book by researcher , who explains that, \"Members are made to feel part of an elite corps of mankind.\" At what point in time did you read this book? Are there other books which helped you understand and put your experiences within Scientology into a greater context?AS: I read several quotes from Steven Hassan from the internet that made total sense to me, so I ordered his book. It's a fantastic read. I learned quite a lot about mind control and particularly found it interesting and true that a key aspect of mind control is INFORMATION CONTROL. If one can control the information that you are allowed to receive, then you can really control their thinking. They wouldn't be equipped with all of the ACTUAL information to be able to analyze and made a sane decision about something. In Scientology and especially in the Sea Organization, information is controlled intensively. This includes ALL communication via telephone or mail \u2013 incoming and outgoing \u2013 being screened through security personnel in order to detect any antagonism regarding Scientology from the \"outside\", no televisions allowed, no internet access, not being permitted to listen to or read any article that said anything negative about Scientology. Another book I found to be very beneficial after leaving Scientology was by . It answered a lot for me. You described in chapter 6, being assigned to a sub-division of the Rehabilitation Project Force, called the \"RPF's RPF\". How was this different from the main RPF itself? What typical tasks were you ordered to perform? Were there many other women assigned to this unit? Were women given different roles or treated differently than men while on the RPF or the RPF's RPF? After being appointed in October 1991 as the \"Watchdog Committee member over the Celebrity Centre sector\", you recall meeting several members of \"the top Scientology celebrity public\", including John Travolta, , , , , , , , , Isaac Hayes, Tom Cruise, , and . In what capacity did you meet these Scientology celebrities? Were they coming in for Scientology auditing, or counseling? Did they receive advice and assistance in some form with their professional careers?AS: While I was working on the project to build Celebrity Centre International in Hollywood, I was often in the President's office of the Celebrity Center where the top celebrities often would come. That's how I met most of them. They would come into Celebrity Center to attend a course, to go in for a counseling session or to bring someone new in to introduce them to Scientology. Celebrity Centre International has a \"career counseling\" service it does provide and some celebrities have done this service to hopefully help them to do better in their careers. You write that you are aware of situations where members of Scientology hired by celebrities as assistants or security staff, have actually reported back to the organization through a Scientology process called \"Security Checks\", with revealing information about those celebrities. Did any of these celebrities ever find out such a tactic was being used to uncover information about them? If so, what was their response to this? I was awarded PERMANENT POSTING STATUS on two executive positions in Church of Scientology International (CSI \u2013 the highest management organization for Scientology). This is a status that can only be verified and authorized by the Religious Technology Center (RTC \u2013 the holder of the Scientology trademarks and service marks). I received my Permanent Posting certificate by RTC as the Watchdog Committee member for Celebrity Centres (WDC CC), which I held as a single duty for four years, and as a function with other Scientology sectors for nearly a decade. Amongst the extensive list of requirements one must meet to become Permanently Posted, ones ethics and production record must be verified as excellent and you must be capable of generating on the order of a million dollars a year for the organization. In 1996, you were transferred to the executive post of Watchdog Committee member for the (WDC ABLE). ABLE is an organization operated by Scientology management which oversees groups that promote Scientology techniques. In this executive position, you were responsible for supervising Scientology-associated entities including: , , , and . Can you explain a little bit about the function and purpose of each of these groups? Are they actual-practice, separate \"secular\" functioning organizations, or somehow related to the Scientology organization itself? How specifically were these groups influenced and/or managed by Scientology leadership? How involved was in the functioning of these groups? After being told by David Miscavige that your husband at the time, Jim Mortland, was being removed or \"offloaded\" from Scientology's Sea Organization, you were called into the office of the Internal Executive where you were pressured into making a decision to stay in the Sea Org and separate from your husband. You write in the book, that your \"brainwashed response\" was to answer, \"I'm staying\". Why did you characterize this as a brainwashed response. How and why did you come to believe you had been a victim of ?AS: Per this Wikipedia definition, \"Mind control (also known as brainwashing, coercive persuasion, mind abuse, thought control, or thought reform) refers to a process in which a group or individual 'systematically uses unethically manipulative methods to persuade others to conform to the wishes of the manipulator(s), often to the detriment of the person being manipulated'.\" In my right mind, I would not have walked away from my husband of 17 years. In my right mind, I would not have \"turned a blind eye\" when I witnessed a dozen accounts of assault & battery being committed on my comrades by David Miscavige. And I would never have given in to the physical labor and other \"ethics\" actions taken on myself and others for trumped up offenses. But I now understand that I was under the influence of mind control. This is not a light matter. People can laugh that concept off so readily, but it's a very REAL thing. When one considers what is at stake (or is thought to be at stake) if one were to step out of line or violate the rules in any way, you try to remain quiet and compliant. In Scientology, if you get yourself in enough trouble (from some executive's point of view), you can be banned from ever being allowed to receive the upper level services in Scientology \u2013 and thus enslave yourself as a spiritual being for eternity. Another more minor factor, but still major enough to keep you in line is the threat that any of your family or friends in Scientology would have to disconnect from you if you were no longer in good standing. So to say you want to leave, to go against the head of the organization, to report to outside authorities what's going on inside is considered more of a crime than being quiet and compliant as a \"good Scientologist\". This is what I consider has people brainwashed. It's a way to control their rational thinking. It's \"the end justifies the means\". When I realized that I had been rationalizing away utter insanities that I both witnessed and experienced in the organization and that I needed to simply look at what was factually in front of me, I started making my plans to leave. The details of this revelation and how I finally got out is all detailed in my book. In chapter 10, \"Assault and Battery\", you recount witnessing instances of violence by David Miscavige towards Scientology officials including: Ray Mithoff, , and Jeff Hawkins. You write, \"I am ashamed that I did not have enough courage at the time to inform the authorities or call the police, which would have been the logical thing to do.\" Why do you think you decided not to report these instances to the police? What do you think law enforcement would have done if you had reported the matter to police? Knowing what you know now, and revisiting your memories of these incidents in hindsight, would you have acted differently if you were in the same situation again? The last chapter of your book describes your emotional reunion with your family after leaving Scientology - first meeting your father and then calling and meeting your mother - and finally reuniting with Mark \"Mat\" Pesch, now your husband. At any point in time did you feel unsafe during your journey to reunite with these people? Did Scientology's intelligence agency, the (OSA), monitor you or your family after you left the organization?AS: As I was getting on the airplane home, the OSA staff member who escorted me to the airport said that I could not talk to my mother due to the \"suppressive person\" declare issue that she handed me a few hours before. Of course, after I arrived to my father's house, I realized that I was no longer under Scientology's control and I could contact my mother if I wanted \u2013 and I desperately wanted to! I hadn't seen her in years and now I was home for good! Scientology did find out about us seeing each other and took various actions to put pressure on my step-father to enforce their disconnection policy. This was very messy and is one of the key reasons I chose to speak out publicly against Scientology's human rights violations. At one point, my husband and I were followed by Private Investigators anywhere we went. We had to file a police report because one in particular was being very reckless in his attempts to stay on our tail \u2013 and flee when we tried to confront him. I finally filed a declaration against Scientology, showing several instances of harassment to myself and my family, which I considered witness tampering since I was named as a witness on an on-going lawsuit against them. Were you concerned that your relationships might be affected due to Scientology declaring you a \" \", and telling members of the organization never to speak to you again? Has this stopped you, or are you in communication with current and/or former members of the organization? One month before your book was published, reported that you received a legal threat from Tom Cruise's lawyer, , that warned you would face a defamation lawsuit from Cruise if the book was made publicly available. Specific complaints made included your accounts of hearing about a \"drug history\" involving Cruise, an ultimatum made by the Scientology organization to Cruise to decide between or the organization, and that Cruise's personal assistants and employees that staff his home are chosen and paid for by the Scientology organization. Can you speak to how you came to have knowledge about these assertions you made, why you believe them to be true and factually accurate, and how you felt when you received the legal threat letter from Cruise's attorney? Prior to publication of Scientology - Abuse at the Top by Amy Scobee, the author was threatened with separate legal actions \u2013 by lawyer representing influential Scientology member and celebrity, actor ; and Scientology representative on behalf of Scientology management. AS: Bertram Fields made a mistake by issuing that legal threat when he hadn't even read my book to know what I actually said about his client. He made assumptions based on hearsay. When I received the letter, I thought that it was just like Scientology \u2013 issue threats to intimidate and back someone off. I wasn't going to back off because what I wrote in my book was true. I am the one who did the project to hire Scientologists for Tom's household. I am the one Shelly Miscavige told what disqualifying drugs Tom took so he could not qualify for the Sea Organization \u2013 which he supposedly wanted to join. I didn't say anything in my book about Cruise having to decide between Nicole or the organization. So, I knew that it was an attempt to prevent me from putting out my book as \"little 'ol me\" could never possibly stand up to the high-powered lawyer of an A-list celebrity who has millions of dollars at his disposal. But the fact is \u2013 it didn't phase me as truth is truth and I'm willing to stand up for the truth. The book was subsequently published and made publicly available. At this point in time, has there been any follow-up from Tom Cruise, his lawyer, or representatives, to you? How do you feel about your legal standing if Cruise were to escalate the matter beyond the initial legal threat letter? The month your book was published, the reported that Scientology organization public representative characterized your accounts as \"fiction\". With regards to assertions you made that David Miscavige and Scientology officials \"snooped\" in the confessional folders of Scientology members and particularly celebrities, Davis stated, \"Nobody in the church has ever violated the priest-penitent privilege. ... [Confessional files] are held in the strictest confidence.\" How do you respond to these statements by Davis?AS: Just like I did to the New York Daily News when they asked me about it: If Scientology does not violate the priest-penitent privilege, what is the Scientology spokesperson doing talking to the press about my sex life? Davis further stated to the New York Daily News that (separate from the earlier intimations from the lawyer for Tom Cruise) the Scientology organization was itself \"preparing a lawsuit\" against you because of the \"disgusting allegations\" in the book. Have you received any notice from the Scientology organization with regards such a potential lawsuit? Davis proceeded to make claims to the New York Daily News about your sexual relationships. Additionally, BBC News reported that after you began to make public criticism of the organization and its leader David Miscavige, Scientology provided \"intimate details of her sex life\" to the Florida newspaper the St. Petersburg Times. How did you feel when these sexual details were made public by Scientology? How do you feel this behavior by the organization and its officials reflects on its assertions of keeping confidential information secret, and respecting the privacy of priest-penitent privilege?AS: To me \u2013 and MANY other people \u2013 it was obvious through their child-like reaction that they have something fairly big to hide. I gave a detailed eye-witness account of the head of the Scientology religion repeatedly beating staff members. That they respond with exaggerated accusations about my sex life is just a red herring. And it also proves that private information you may divulge in confessionals while a member of Scientology could be used against you should you step out of line in the future. In an August 2009 issue of the Scientology publication, , the issue referred to you multiple times only as \"The Adulteress\". How did this make you feel when you found out about this publication? When you were still a member of the Scientology organization, what was your opinion at that point in time of Freedom Magazine? What is your opinion of the publication - its reputability and reliability, at this point in time? In the August 2009 publication of \"Freedom\", they slandered both the St. Petersburg Times reporters and the \"defectors\" (myself, , Mike Rinder and Tom DeVocht). Note: they did not use the name \"Amy Scobee\" in this magazine. Instead, they refer to me as \"the Adulteress\". This slanderous character assassination appears in more than 20 places in their publication. It's painfully obvious that they were referring to me since I was the only female that spoke out in the article they were protesting. I'm not \"an adulteress\". As a member of Scientology's Sea Organization (age 16 to 42), I had sexual intercourse with my first husband, my second husband and my current husband. Regardless, my \"sexual purity\" has nothing to do with my reporting the fact that I witnessed the head of the Church of Scientology commit repeated assault & battery on specific church executives while I was employed there. It's just their attempt to \"annihilate credibility\" for exposing this crime. In my view, the Freedom magazine is used to help carry out Miscavige's private agenda to try to remain in a position of power in that organization. Amy Scobee in 2009 BBC News reported on September 26, that during an interview for the special , , yourself and reporter were photographed, and such photographs of the two of you hugging after completing the interview were sent by Scientology UK lawyers from the firm Carter-Ruck to the BBC. What do you think Scientology was attempting to accomplish by sending these photos to the BBC? Is such behavior by the Scientology organization with regard to monitoring of journalists, critics, or former members such as yourself common? What do you do to cope and/or respond to such behavior from the Scientology organization?AS: Yes, this type of intimidation is common practice by Scientology. As a witness in an on-going court case against Scientology, I was recently in a deposition with Scientology's lead counsel. He pulled out the photo that their private investigators took of John Sweeney giving me a hug on the highway outside of the Scientology compound in Hemet after nearly two full days of interviews. He proceeded to ask me how much \"alone time\" I spent with Mr. Sweeney (which was none) and when I explained that we all gave each other hugs goodbye before we went our separate ways and that my husband was right there with me, the lawyer said, \"We'll see what the jury says about that!\" All they are trying to do is intimidate us into silence through constant trails by PI's, slandering our names with ridiculous accusations, etc., so we'd become cowed, be quiet and let their criminality go on, unchecked. Well, it hasn't worked to keep me silent. To me, it's more important to prevent anyone else from being hurt by making Scientology's human rights violations known than to worry about them tarnishing my personal reputation in retaliation. I believe that the truth must be brought to light, despite consequences. Are there any other points that you would like to elaborate or explain? Related news Sister links", "edit_actions": [{"type": "D", "before": "Amy Scobee", "after": null, "start_char_pos": 28, "end_char_pos": 38}, {"type": "D", "before": "Gold Base", "after": null, "start_char_pos": 467, "end_char_pos": 476}, {"type": "R", "before": "Hemet, California", "after": ",", "start_char_pos": 515, "end_char_pos": 532}, {"type": "R", "before": "science fiction writer L. Ron Hubbard", "after": "writer", "start_char_pos": 562, "end_char_pos": 599}, {"type": "D", "before": "David Miscavige", "after": null, "start_char_pos": 793, "end_char_pos": 808}, {"type": "D", "before": "St. Petersburg Times", "after": null, "start_char_pos": 1016, "end_char_pos": 1036}, {"type": "R", "before": "BBC program Panorama hosted by investigative journalist John Sweeney, The Secrets of Scientology", "after": "program hosted by", "start_char_pos": 1068, "end_char_pos": 1164}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1167, "end_char_pos": 1167}, {"type": "D", "before": "BBC One", "after": null, "start_char_pos": 1187, "end_char_pos": 1194}, {"type": "D", "before": "Sea Org", "after": null, "start_char_pos": 1386, "end_char_pos": 1393}, {"type": "D", "before": "Rehabilitation Project Force", "after": null, "start_char_pos": 1677, "end_char_pos": 1705}, {"type": "D", "before": "raped", "after": null, "start_char_pos": 2278, "end_char_pos": 2283}, {"type": "D", "before": "Suppressive Person", "after": null, "start_char_pos": 2949, "end_char_pos": 2967}, {"type": "R", "before": "intelligence agency the Office of Special Affairs", "after": "the", "start_char_pos": 2989, "end_char_pos": 3038}, {"type": "D", "before": "Bertram Fields", "after": null, "start_char_pos": 3261, "end_char_pos": 3275}, {"type": "D", "before": "Tom Cruise", "after": null, "start_char_pos": 3341, "end_char_pos": 3351}, {"type": "D", "before": "Tommy Davis", "after": null, "start_char_pos": 3393, "end_char_pos": 3404}, {"type": "R", "before": "propaganda publication Freedom Magazine", "after": "publication", "start_char_pos": 3767, "end_char_pos": 3806}, {"type": "D", "before": "Auditing", "after": null, "start_char_pos": 3987, "end_char_pos": 3995}, {"type": "D", "before": "BBC News", "after": null, "start_char_pos": 4070, "end_char_pos": 4078}, {"type": "D", "before": "All Headline News", "after": null, "start_char_pos": 4622, "end_char_pos": 4639}, {"type": "R", "before": "Today Tonight, The Drew Marshall Show, Lateline, and Panorama", "after": ", , , and", "start_char_pos": 4768, "end_char_pos": 4829}, {"type": "D", "before": "Sea Org", "after": null, "start_char_pos": 4892, "end_char_pos": 4899}, {"type": "R", "before": "$150 to my name. I had no outside job skills, never cooked and I barely knew how to drive. I had no clue what I would be doing to make a living in the \"outside world\". It was not unlike being dropped on another planet and having to figure out how to survive from scratch. After I became stable and saved up some money, I began writing. As I wrote, I realized how important it was to get my story out. This \"religion\" promotes how their purpose is to create a sane world without criminality, etc. and the more I was OUT of their grip, the more I realized just how insane and criminal they really are. I learned about the Universal Declarations for Human Rights and saw how many points I personally knew were violated by the Scientology organization with their members. I learned about laws of the land (which I had been entirely ignorant of while a staff member) and realized some of the acts that I witnessed were actual violations of the LAW. But what set me on the past to exposing the abuse within Scientology the most was when my mother was forced to disconnect from me, per Scientology's \"disconnection\" policy where members are to cut all ties with anyone not in good standing with their \"church\". This was a very emotionally traumatic situation. In my view, no religion worthy of the title should have a right to stand between loved ones. Quite early on in the book's first chapter, you recount an incident of being raped at age 14, by a 35-year-old married man who was your Scientology supervisor. You describe how your \"Scientology Ethics Officer\" found out, said you were in a \"state of treason\", and that the incident was kept quiet and not reported to the police by Scientology officials. How difficult was it to include this in the book? For what reason did you choose to include this? Why didn't you tell your parents about this?AS: To me, it was very important to include this information in my book because it gives the reader an idea of how Scientology operates. One of the worst crimes you can commit as a Scientologist is bringing about \"bad public relations\" for them. Things that happen internally are KEPT internal with the \"we handle our own\" doctrine. Unfortunately, this was a CRIME for which that person could have been arrested. Instead, it was \"handled\" by the local staff (swept under the carpet) and forgotten about. I didn't tell my parents because I was ashamed and afraid. After describing your arrival at the Scientology \"Flag Land Base\" in Florida at age 16, you recall how you met and became intimate with a 26-year-old man named David Paul, who later became your husband. For this act, you were subjected to a \"security check\" process on the Scientology device, the E-meter, and ordered to serve time performing manual labor on the controversial \"Rehabilitation Project Force\" (RPF) of Scientology. Is 16 a relatively young age to be sentenced to the Rehabilitation Project Force in Scientology? Did you know other individuals on this program that were younger than you, or around the same age? AS: Yes, 16 is a young age to be sentenced to the Rehabilitation Project Force. I should have been attending school as per the agreement with my mother when she gave parental consent for me to join the Sea Organization \u2013 but I factually never saw one day of school after I joined. There were other teen-agers on the RPF at the same time, but I believe I was the youngest. Scientologists working in the organization's \"Rehabilitation Project Force\" in Los Angeles, California During participation in the Rehabilitation Project Force, you recount how you were slapped across the face for refusing to climb into a garbage can after being ordered to do so by a leader of your group. How did this make you feel? Did you consider leaving the organization at all at this point in time? Why or why not, and why did you remain?AS: It was a completely nutty order and I wasn't about to comply. I ran around the block to get away as the lady who issued the order chased after me. I went to the person in charge asking for help but he was not in his office. The lady chased me into that office and then hit me across the face. I did NOT hit her back because I wanted to show that she was the crazy one. However when the Ethics Officer got there, he said I should have complied as she was my superior. I felt like it was a huge injustice because the order made no sense and had no purpose. She was just trying to exert her \"authority\" over me. But, I didn't want to be in more trouble, so I did my punishment for non-compliance and carried on. No, I did not think of leaving then. At that point, I just thought that lady was insane, not the entire organization. After completing your time on the Rehabilitation Project Force, you were appointed to the position of \"Commanding Officer of the Flag Land Base's Communicator\", where you were \"responsible for all in-coming and out-going traffic from the executive and obtaining compliance to all orders issued\". Did it surprise you that directly after finishing the Rehabilitation Project Force, you were given such a position of responsibility as a Scientology executive? Does this occur often in Scientology to members after they finish their sentence in the Rehabilitation Project Force? AS: In the Sea Organization, one is expected to be able to perform any duty \u2013 with or without training. It's preached that the salvation of the world is on our shoulders and everyone needs to pull up their bootstraps and make it go right. So, the appointment did not surprise me. Shortly after your promotion from Rehabilitation Project Force member to this position, you were promoted to \"Flag Land Bureau Estates Management Chief\", where you were \"responsible for all public hotels and services\", and subsequently promoted to the \"Commodore's Messenger Organization (CMO)\". At the end of chapter 3, you write how you were \"placed under a group justice action, called a Committee of Evidence\", and the committee, \"recommended my removal for neglect of duty regarding the schedule\". However, a few days later you were told you were assigned to Los Angeles, California, in order to recruit for members to join the CMO. Again, this appears to be a pattern of conflicting orders within the organization, where in one instance you were disciplined for perceived slights, and yet directly afterward, promoted to a higher position of authority as a Scientology executive. How do you explain this behavior within the organization?AS: The control and handling of personnel within the Sea Org was very unpredictable. There were always huge demands and needs for people on various projects or positions that had to be filled \"at once\". So one could expect rapid changes. It was also considered that after one messes up, they can be corrected using the \"ethics technology\" of Scientology and confessionals so they can carry on after their level of ethics are once again acceptable. What was the highest-ranking position you held within Scientology? Who did you report to in this position? What responsibilities did you have, and how many other people and sub-entities did you oversee? AS: I was in the Watchdog Committee (WDC) which is the highest ecclesiastical body in Scientology, with a WDC member appointed over each of the numerous \"sectors\" or areas of Scientology to see to their proper management. My boss as a WDC member is the WDC Chairman. This is the highest management position in the organization. I was in WDC for about a decade and held about six different sectors over the years, including the Association for Better Living and Education (ABLE) sector, which is responsible for the secular aspects of the organization \u2013 drug rehabilitation, criminal reform, Applied Scholastics study technology and The Way To Happiness Foundation \u2013 and the Celebrity Center sector. Anything that goes on inside your sector or sphere of responsibility as a WDC member, is your responsibility and you're held accountable. This could be very stressful, particularly when the current head of Scientology \u2013 David Miscavige \u2013 is so abusive. For example, Miscavige learned that the Tampa Scientology organization was not paying their rent in 2003. As I had previously been the WDC member for all Scientology churches (approx 175 of them around the world) and should have noticed and handled it then, Miscavige demanded that I personally pay the rent of $", "after": "$150 to my name. I had no outside job skills, never cooked and I barely knew how to drive. I had no clue what I would be doing to make a living in the \"outside world\". It was not unlike being dropped on another planet and having to figure out how to survive from scratch. After I became stable and saved up some money, I began writing. As I wrote, I realized how important it was to get my story out. This \"religion\" promotes how their purpose is to create a sane world without criminality, etc. and the more I was OUT of their grip, the more I realized just how insane and criminal they really are. I learned about the Universal Declarations for Human Rights and saw how many points I personally knew were violated by the Scientology organization with their members. I learned about laws of the land (which I had been entirely ignorant of while a staff member) and realized some of the acts that I witnessed were actual violations of the LAW. But what set me on the past to exposing the abuse within Scientology the most was when my mother was forced to disconnect from me, per Scientology's \"disconnection\" policy where members are to cut all ties with anyone not in good standing with their \"church\". This was a very emotionally traumatic situation. In my view, no religion worthy of the title should have a right to stand between loved ones. Quite early on in the book's first chapter, you recount an incident of being at age 14, by a 35-year-old married man who was your Scientology supervisor. You describe how your \"Scientology Ethics Officer\" found out, said you were in a \"state of treason\", and that the incident was kept quiet and not reported to the police by Scientology officials. How difficult was it to include this in the book? For what reason did you choose to include this? Why didn't you tell your parents about this?AS: To me, it was very important to include this information in my book because it gives the reader an idea of how Scientology operates. One of the worst crimes you can commit as a Scientologist is bringing about \"bad public relations\" for them. Things that happen internally are KEPT internal with the \"we handle our own\" doctrine. Unfortunately, this was a CRIME for which that person could have been arrested. Instead, it was \"handled\" by the local staff (swept under the carpet) and forgotten about. I didn't tell my parents because I was ashamed and afraid. After describing your arrival at the Scientology \"Flag Land Base\" in Florida at age 16, you recall how you met and became intimate with a 26-year-old man named David Paul, who later became your husband. For this act, you were subjected to a \"security check\" process on the Scientology device, the , and ordered to serve time performing manual labor on the controversial \"\" (RPF) of Scientology. Is 16 a relatively young age to be sentenced to the Rehabilitation Project Force in Scientology? Did you know other individuals on this program that were younger than you, or around the same age? AS: Yes, 16 is a young age to be sentenced to the Rehabilitation Project Force. I should have been attending school as per the agreement with my mother when she gave parental consent for me to join the Sea Organization \u2013 but I factually never saw one day of school after I joined. There were other teen-agers on the RPF at the same time, but I believe I was the youngest. Scientologists working in the organization's \"\" in , California During participation in the Rehabilitation Project Force, you recount how you were slapped across the face for refusing to climb into a garbage can after being ordered to do so by a leader of your group. How did this make you feel? Did you consider leaving the organization at all at this point in time? Why or why not, and why did you remain?AS: It was a completely nutty order and I wasn't about to comply. I ran around the block to get away as the lady who issued the order chased after me. I went to the person in charge asking for help but he was not in his office. The lady chased me into that office and then hit me across the face. I did NOT hit her back because I wanted to show that she was the crazy one. However when the Ethics Officer got there, he said I should have complied as she was my superior. I felt like it was a huge injustice because the order made no sense and had no purpose. She was just trying to exert her \"authority\" over me. But, I didn't want to be in more trouble, so I did my punishment for non-compliance and carried on. No, I did not think of leaving then. At that point, I just thought that lady was insane, not the entire organization. After completing your time on the Rehabilitation Project Force, you were appointed to the position of \"Commanding Officer of the Flag Land Base's Communicator\", where you were \"responsible for all in-coming and out-going traffic from the executive and obtaining compliance to all orders issued\". Did it surprise you that directly after finishing the Rehabilitation Project Force, you were given such a position of responsibility as a Scientology executive? Does this occur often in Scientology to members after they finish their sentence in the Rehabilitation Project Force? AS: In the Sea Organization, one is expected to be able to perform any duty \u2013 with or without training. It's preached that the salvation of the world is on our shoulders and everyone needs to pull up their bootstraps and make it go right. So, the appointment did not surprise me. Shortly after your promotion from Rehabilitation Project Force member to this position, you were promoted to \"Flag Land Bureau Estates Management Chief\", where you were \"responsible for all public hotels and services\", and subsequently promoted to the \" (CMO)\". At the end of chapter 3, you write how you were \"placed under a group justice action, called a Committee of Evidence\", and the committee, \"recommended my removal for neglect of duty regarding the schedule\". However, a few days later you were told you were assigned to Los Angeles, California, in order to recruit for members to join the CMO. Again, this appears to be a pattern of conflicting orders within the organization, where in one instance you were disciplined for perceived slights, and yet directly afterward, promoted to a higher position of authority as a Scientology executive. How do you explain this behavior within the organization?AS: The control and handling of personnel within the Sea Org was very unpredictable. There were always huge demands and needs for people on various projects or positions that had to be filled \"at once\". So one could expect rapid changes. It was also considered that after one messes up, they can be corrected using the \"ethics technology\" of Scientology and confessionals so they can carry on after their level of ethics are once again acceptable. What was the highest-ranking position you held within Scientology? Who did you report to in this position? What responsibilities did you have, and how many other people and sub-entities did you oversee? AS: I was in the Watchdog Committee (WDC) which is the highest ecclesiastical body in Scientology, with a WDC member appointed over each of the numerous \"sectors\" or areas of Scientology to see to their proper management. My boss as a WDC member is the WDC Chairman. This is the highest management position in the organization. I was in WDC for about a decade and held about six different sectors over the years, including the Association for Better Living and Education (ABLE) sector, which is responsible for the secular aspects of the organization \u2013 drug rehabilitation, criminal reform, Applied Scholastics study technology and The Way To Happiness Foundation \u2013 and the Celebrity Center sector. Anything that goes on inside your sector or sphere of responsibility as a WDC member, is your responsibility and you're held accountable. This could be very stressful, particularly when the current head of Scientology \u2013 David Miscavige \u2013 is so abusive. For example, Miscavige learned that the Tampa Scientology organization was not paying their rent in 2003. As I had previously been the WDC member for all Scientology churches (approx 175 of them around the world) and should have noticed and handled it then, Miscavige demanded that I personally pay the rent of $", "start_char_pos": 5288, "end_char_pos": 13682}, {"type": "R", "before": "Combating Cult Mind Control by cult researcher Steven Hassan", "after": "by researcher", "start_char_pos": 14032, "end_char_pos": 14092}, {"type": "R", "before": "Man's Search for Meaning by Viktor Frankl", "after": "by", "start_char_pos": 15369, "end_char_pos": 15410}, {"type": "D", "before": "Kelly Preston, Kirstie Alley, Anne Archer, Nancy Cartwright, Billy Sheehan, Priscilla Presley, Lisa Marie Presley, Juliette Lewis", "after": null, "start_char_pos": 16019, "end_char_pos": 16148}, {"type": "A", "before": null, "after": ", , , , , , ,", "start_char_pos": 16151, "end_char_pos": 16151}, {"type": "R", "before": "Edgar Winter, and Jenna Elfman", "after": ", and", "start_char_pos": 16177, "end_char_pos": 16207}, {"type": "D", "before": "Association for Better Living and Education", "after": null, "start_char_pos": 18307, "end_char_pos": 18350}, {"type": "R", "before": "Applied Scholastics, Narconon, Criminon, and The Way to Happiness Foundation", "after": ", , , and", "start_char_pos": 18589, "end_char_pos": 18665}, {"type": "D", "before": "David Miscavige", "after": null, "start_char_pos": 18989, "end_char_pos": 19004}, {"type": "D", "before": "brainwashing", "after": null, "start_char_pos": 19557, "end_char_pos": 19569}, {"type": "D", "before": "Mike Rinder", "after": null, "start_char_pos": 21940, "end_char_pos": 21951}, {"type": "D", "before": "Office of Special Affairs", "after": null, "start_char_pos": 22841, "end_char_pos": 22866}, {"type": "D", "before": "Suppressive Person", "after": null, "start_char_pos": 24234, "end_char_pos": 24252}, {"type": "D", "before": "All Headline News", "after": null, "start_char_pos": 24473, "end_char_pos": 24490}, {"type": "D", "before": "Bertram Fields", "after": null, "start_char_pos": 24559, "end_char_pos": 24573}, {"type": "D", "before": "Nicole Kidman", "after": null, "start_char_pos": 24855, "end_char_pos": 24868}, {"type": "D", "before": "Bertram Fields", "after": null, "start_char_pos": 25375, "end_char_pos": 25389}, {"type": "D", "before": "Tom Cruise", "after": null, "start_char_pos": 25455, "end_char_pos": 25465}, {"type": "D", "before": "Tommy Davis", "after": null, "start_char_pos": 25499, "end_char_pos": 25510}, {"type": "D", "before": "New York Daily News", "after": null, "start_char_pos": 26902, "end_char_pos": 26921}, {"type": "D", "before": "Tommy Davis", "after": null, "start_char_pos": 26983, "end_char_pos": 26994}, {"type": "D", "before": "Freedom Magazine", "after": null, "start_char_pos": 29144, "end_char_pos": 29160}, {"type": "D", "before": "Marty Rathbun", "after": null, "start_char_pos": 29655, "end_char_pos": 29668}, {"type": "R", "before": "Panorama special, The Secrets of Scientology", "after": "special", "start_char_pos": 30750, "end_char_pos": 30794}, {"type": "A", "before": null, "after": ",", "start_char_pos": 30797, "end_char_pos": 30797}, {"type": "D", "before": "John Sweeney", "after": null, "start_char_pos": 30820, "end_char_pos": 30832}, {"type": "A", "before": null, "after": "Sister links", "start_char_pos": 32623, "end_char_pos": 32623}], "sents_char_pos": [0, 170, 320, 534, 608, 831, 1019, 1211, 1525, 1797, 1989, 2177, 2482, 2737, 2892, 3160, 3353, 3509, 3660, 3732, 3887, 4169, 4187, 4342, 4526, 4621, 4696, 4831, 4901, 5047, 5304, 5378, 5455, 5559, 5623, 5688, 5887, 6055, 6231, 6491, 6540, 6633, 6793, 6988, 7038, 7086, 7131, 7267, 7376, 7463, 7543, 7634, 7693, 7896, 8123, 8220, 8319, 8399, 8600, 8691, 8998, 9026, 9098, 9138, 9203, 9288, 9365, 9434, 9510, 9608, 9696, 9750, 9850, 9887, 9968, 10264, 10425, 10543, 10647, 10782, 10823, 11119, 11326, 11709, 11767, 11851, 11969, 12004, 12214, 12281, 12321, 12417, 12639, 12684, 12745, 13116, 13254, 13369, 13475, 13712, 13965, 14175, 14221, 14339, 14453, 14476, 14734, 14859, 14953, 15295, 15412, 15438, 15560, 15609, 15657, 15708, 15915, 16209, 16270, 16331, 16416, 16614, 16645, 16798, 16977, 17259, 17366, 17406, 17572, 17733, 17965, 18217, 18362, 18480, 18752, 18883, 18971, 19040, 19352, 19438, 19495, 19571, 19947, 20023, 20185, 20318, 20387, 20415, 20489, 20660, 20909, 21117, 21334, 21382, 21429, 21465, 21698, 21783, 21971, 22137, 22211, 22303, 22466, 22706, 22797, 22933, 23152, 23334, 23390, 23540, 23667, 23755, 23914, 24135, 24324, 24430, 24676, 25018, 25238, 25467, 25547, 25690, 25728, 25852, 25921, 25998, 26154, 26253, 26470, 26568, 26633, 26742, 26862, 27036, 27359, 27408, 27629, 27880, 27982, 28073, 28292, 28310, 28386, 28582, 28711, 28823, 28911, 29087, 29229, 29299, 29426, 29525, 29598, 29700, 29763, 29810, 29903, 30037, 30062, 30214, 30437, 30514, 30662, 31003, 31098, 31241, 31331, 31400, 31524, 31720, 32007, 32227, 32269, 32464, 32537, 32609]}
+{"doc_id": "212563", "revision_depth": "1", "before_revision": "At 11:51 a.m. Central European Summer Time (0951 UTC), Marcus Jannes, a student from J\u00e4rna, Stockholm , posted to the Mental Health Problems forum of Sweden's Flashback message boards using the newly-registered username \"LurifaxFlux\", stating that he was going to hang himself, adding that he had already swallowed 100mg of dexofen and 1500mg of paracetamol . He said that he had set up a webcam to record the event, and would post details later of a FTP server for people to watch. __NOTOC__ People responded to his post almost immediately. Some offered messages of hope, such as, \"How bad can it be? When everything is at its worst, it can only get better\", and \"Think of poor people, mutilated people, people who are lame or blind. Living with a disability is hard. They can not change their lives! But you still have the ability to alter yours!\" Others tried to keep him online by talking to him empathetically: \"Is there anything that can make you change your mind?\", \"Tell me about yourself.\" However, other users posted messages saying they didn't believe him, wishing him luck with his attempt, and calling him an attention whore and a troll . They also goaded him by saying, \"you won't dare, you are too cowardly\", and offering advice on the best way to hang himself: \"I recommend ... you do it from a height that you can jump off so you are guaranteed to break your neck.\" In a later post, Jannes said that he had been feeling suicidal for about six months, but was too scared to actually attempt anything until he tried to strangle himself with his own hands. In response to questions, he stated that he was using a network cable to strangle himself because he didn't have any rope, but he was worried that the cable would not be strong enough to take his weight. He also told them that he had Asperger syndrome and High-functioning autism , and was emotionally vulnerable and lacked normal social skills. He admitted to feeling lonely, and alluded to experiencing problems at school, but admitted that he had a good upbringing and had a rather good life. At around the same time, he also updated his Facebook status to say life was \"just too difficult\", and that he was going to kill himself. The S\u00f6dert\u00e4lje police state that they were first alerted to the incident at 1:44 p.m. At 2:06 p.m., the image feeds show two police officers charging into the apartment and releasing the cable from around Jannus' neck. They begin administering CPR. Two minutes later, two paramedics arrive, and they take over CPR while one of the officers looks around the room at cables; the back of a flat-screen television set; and presumably the computer, as the images finally stop being uploaded. The police have so far declined to comment on how the suicide will be investigated, but Sven-Erik Alhem, a chief prosecutor in Sweden told Aftonbladet , that psychologically inducing a person to commit suicide, or contributing to the act, can be classified as incitement to murder, and is a criminal offense. The Flashback message boards are a controversial topic in Sweden. They are seen as being similar to the English language website 4chan , and especially its \"Random\" /b/ board. The Flashback members are able to post with a great amount of freedom of speech . The site has been investigated by the Swedish police on numerous occasions and is under constant surveillance by the Swedish Security Service due to its members' abundant discussions about drug use, child pornography, race science, bestiality and other controversial subjects. Other controversies include sexual harassment of celebrities and politicians, open racism, forced disconnection from its internet service provider, the hosting of nazi sites, and the sabotage of telephone votes in TV shows. In November 2008, a 19-year-old male from Pembroke Pines , Florida used his webcam to broadcast his suicide on the live video site Justin. tv. Abraham K. Biggs, 19, committed suicide by taking an overdose of opiates and benzodiazepine, which had been prescribed for his bipolar disorder . He also made online threats of suicide and advertised his intentions to broadcast it live over the internet.", "after_revision": "At 11:51 a.m. (0951 UTC), Marcus Jannes, a student from , , posted to the Mental Health Problems forum of Sweden's message boards using the newly-registered username \"LurifaxFlux\", stating that he was going to hang himself, adding that he had already swallowed 100mg of and 1500mg of . He said that he had set up a webcam to record the event, and would post details later of a FTP server for people to watch. __NOTOC__ People responded to his post almost immediately. Some offered messages of hope, such as, \"How bad can it be? When everything is at its worst, it can only get better\", and \"Think of poor people, mutilated people, people who are lame or blind. Living with a disability is hard. They can not change their lives! But you still have the ability to alter yours!\" Others tried to keep him online by talking to him empathetically: \"Is there anything that can make you change your mind?\", \"Tell me about yourself.\" However, other users posted messages saying they didn't believe him, wishing him luck with his attempt, and calling him an and a . They also goaded him by saying, \"you won't dare, you are too cowardly\", and offering advice on the best way to hang himself: \"I recommend ... you do it from a height that you can jump off so you are guaranteed to break your neck.\" In a later post, Jannes said that he had been feeling suicidal for about six months, but was too scared to actually attempt anything until he tried to strangle himself with his own hands. In response to questions, he stated that he was using a network cable to strangle himself because he didn't have any rope, but he was worried that the cable would not be strong enough to take his weight. He also told them that he had and , and was emotionally vulnerable and lacked normal social skills. He admitted to feeling lonely, and alluded to experiencing problems at school, but admitted that he had a good upbringing and had a rather good life. At around the same time, he also updated his Facebook status to say life was \"just too difficult\", and that he was going to kill himself. The police state that they were first alerted to the incident at 1:44 p.m. At 2:06 p.m., the image feeds show two police officers charging into the apartment and releasing the cable from around Jannus' neck. They begin administering CPR. Two minutes later, two paramedics arrive, and they take over CPR while one of the officers looks around the room at cables; the back of a flat-screen television set; and presumably the computer, as the images finally stop being uploaded. The police have so far declined to comment on how the suicide will be investigated, but Sven-Erik Alhem, a chief prosecutor in Sweden told , that psychologically inducing a person to commit suicide, or contributing to the act, can be classified as incitement to murder, and is a criminal offense. The Flashback message boards are a controversial topic in Sweden. They are seen as being similar to the English language website , and especially its \"Random\" /b/ board. The Flashback members are able to post with a great amount of . The site has been investigated by the Swedish police on numerous occasions and is under constant surveillance by the due to its members' abundant discussions about drug use, , , and other controversial subjects. Other controversies include sexual harassment of celebrities and politicians, open racism, forced disconnection from its internet service provider, the hosting of nazi sites, and the sabotage of telephone votes in TV shows. In November 2008, a 19-year-old male from , Florida used his webcam to broadcast his suicide on the live video site . Abraham K. Biggs, 19, committed suicide by taking an overdose of opiates and benzodiazepine, which had been prescribed for his . He also made online threats of suicide and advertised his intentions to broadcast it live over the internet.", "edit_actions": [{"type": "D", "before": "Central European Summer Time", "after": null, "start_char_pos": 14, "end_char_pos": 42}, {"type": "D", "before": "J\u00e4rna, Stockholm", "after": null, "start_char_pos": 85, "end_char_pos": 101}, {"type": "A", "before": null, "after": ",", "start_char_pos": 104, "end_char_pos": 104}, {"type": "D", "before": "Flashback", "after": null, "start_char_pos": 160, "end_char_pos": 169}, {"type": "D", "before": "dexofen", "after": null, "start_char_pos": 325, "end_char_pos": 332}, {"type": "D", "before": "paracetamol", "after": null, "start_char_pos": 347, "end_char_pos": 358}, {"type": "R", "before": "attention whore and a troll", "after": "and a", "start_char_pos": 1123, "end_char_pos": 1150}, {"type": "R", "before": "Asperger syndrome and High-functioning autism", "after": "and", "start_char_pos": 1806, "end_char_pos": 1851}, {"type": "D", "before": "S\u00f6dert\u00e4lje", "after": null, "start_char_pos": 2210, "end_char_pos": 2220}, {"type": "D", "before": "Aftonbladet", "after": null, "start_char_pos": 2832, "end_char_pos": 2843}, {"type": "D", "before": "4chan", "after": null, "start_char_pos": 3131, "end_char_pos": 3136}, {"type": "D", "before": "freedom of speech", "after": null, "start_char_pos": 3240, "end_char_pos": 3257}, {"type": "D", "before": "Swedish Security Service", "after": null, "start_char_pos": 3377, "end_char_pos": 3401}, {"type": "R", "before": "child pornography, race science, bestiality", "after": ", ,", "start_char_pos": 3459, "end_char_pos": 3502}, {"type": "D", "before": "Pembroke Pines", "after": null, "start_char_pos": 3803, "end_char_pos": 3817}, {"type": "R", "before": "Justin. tv.", "after": ".", "start_char_pos": 3892, "end_char_pos": 3903}, {"type": "D", "before": "bipolar disorder", "after": null, "start_char_pos": 4031, "end_char_pos": 4047}], "sents_char_pos": [0, 13, 360, 483, 542, 602, 735, 769, 802, 850, 999, 1152, 1383, 1571, 1775, 1917, 2067, 2205, 2291, 2424, 2454, 2578, 2620, 2692, 3001, 3067, 3177, 3259, 3536, 3760, 4049]}
+{"doc_id": "213657", "revision_depth": "1", "before_revision": "Mandelbrot in 2007 The Mandelbrot set , named after Beno\u00eet Mandelbrot, forms a fractal. Beno\u00eet B. Mandelbrot , a French-American mathematician and pioneer of fractal geometry, died in Cambridge, Massachusetts on Thursday. Mandelbrot, aged 85, died of pancreatic cancer , according to a family statement. Mandelbrot was born to Lithuanian parents on November 20, 1924, in Warsaw . Mandelbrot and his family, who were Jewish, fled Nazi persecution in 1936, moving to France. He later studied at Paris' \u00c9cole Polytechnique and received a master's degree in aeronautics from the California Institute of Technology . In 1952, Mandelbrot went back to Paris for a doctorate in mathematics, and worked with John von Neumann at Princeton , New Jersey's Institute for Advanced Study to earn a postdoctoral degree. He later described a series of complex shapes when studying the concept of roughness. Calling these shapes \"fractals,\" he found that they were present in nature and applied his work to other fields, including finance, physics, and biology. In 1958, Mandelbrot began working for for I.B.M. at the company's Thomas J. Watson Research Center in Yorktown Heights , New York. In 1987, he began teaching at Yale University , later becoming Sterling Professor Emeritus of Mathematical Sciences. Mandelbrot received the Wolf Prize in Physics in 1993 and the Japan Prize in 2003, in addition to more than fifteen honorary degrees.", "after_revision": "Mandelbrot in 2007 The , named after Beno\u00eet Mandelbrot, forms a fractal. , a French-American mathematician and pioneer of geometry, died in Cambridge, Massachusetts on Thursday. Mandelbrot, aged 85, died of , according to a family statement. Mandelbrot was born to Lithuanian parents on November 20, 1924, in . Mandelbrot and his family, who were Jewish, fled persecution in 1936, moving to France. He later studied at Paris' and received a master's degree in aeronautics from the . In 1952, Mandelbrot went back to Paris for a doctorate in mathematics, and worked with at , New Jersey's to earn a postdoctoral degree. He later described a series of complex shapes when studying the concept of roughness. Calling these shapes \"fractals,\" he found that they were present in nature and applied his work to other fields, including finance, physics, and biology. In 1958, Mandelbrot began working for for I.B.M. at the company's in , New York. In 1987, he began teaching at , later becoming Sterling Professor Emeritus of Mathematical Sciences. Mandelbrot received the in 1993 and the in 2003, in addition to more than fifteen honorary degrees.", "edit_actions": [{"type": "D", "before": "Mandelbrot set", "after": null, "start_char_pos": 23, "end_char_pos": 37}, {"type": "D", "before": "Beno\u00eet B. Mandelbrot", "after": null, "start_char_pos": 88, "end_char_pos": 108}, {"type": "D", "before": "fractal", "after": null, "start_char_pos": 158, "end_char_pos": 165}, {"type": "D", "before": "pancreatic cancer", "after": null, "start_char_pos": 251, "end_char_pos": 268}, {"type": "D", "before": "Warsaw", "after": null, "start_char_pos": 371, "end_char_pos": 377}, {"type": "D", "before": "Nazi", "after": null, "start_char_pos": 429, "end_char_pos": 433}, {"type": "D", "before": "\u00c9cole Polytechnique", "after": null, "start_char_pos": 500, "end_char_pos": 519}, {"type": "D", "before": "California Institute of Technology", "after": null, "start_char_pos": 575, "end_char_pos": 609}, {"type": "R", "before": "John von Neumann at Princeton", "after": "at", "start_char_pos": 699, "end_char_pos": 728}, {"type": "D", "before": "Institute for Advanced Study", "after": null, "start_char_pos": 744, "end_char_pos": 772}, {"type": "R", "before": "Thomas J. Watson Research Center in Yorktown Heights", "after": "in", "start_char_pos": 1110, "end_char_pos": 1162}, {"type": "D", "before": "Yale University", "after": null, "start_char_pos": 1205, "end_char_pos": 1220}, {"type": "R", "before": "Wolf Prize in Physics in", "after": "in", "start_char_pos": 1316, "end_char_pos": 1340}, {"type": "D", "before": "Japan Prize", "after": null, "start_char_pos": 1354, "end_char_pos": 1365}], "sents_char_pos": [0, 87, 221, 303, 472, 611, 803, 889, 1043, 1174, 1291]}
+{"doc_id": "214537", "revision_depth": "1", "before_revision": "A scientist for the National Wildlife Federation , Doug Inkley, has criticised what he described as America's \"addiction to oil\". Inkley stated it is ultimately responsible for the Deepwater Horizon disaster earlier this year. Doug Inkley, a senior scientist working for the National Wildlife Federation , said that [the United States of] America's \"addiction to oil\" was responsible for the Deepwater Horizon disaster six months ago. Inkley commented on the incident, six months after the explosion which killed eleven rig workers and resulted in over 170 million gallons of crude oil leaking into the Gulf of Mexico causing damage to marine wildlife habitats as well as the Gulf's fishing and tourism industries. Inkley is a senior scientist working for the National Wildlife Federation . He stated, \"Looking back at what we knew six months after the Exxon Valdez disaster in Alaska illustrates the danger of too quickly drawing conclusions about the full impacts of the Gulf oil disaster.\" His remarks echo those issued by another environmental organisation in July. Greenpeace demanded that BP , who the United States Congress has blamed for the disaster, take a \"new direction\" and end an \"obsession with high risk, environmentally reckless sources of oil.\" Inkley said incidents in the past showed there can be far-reaching effects. \"The Exxon Valdez disaster was not simply one ecosystem earthquake \u2013 the aftershocks have continued to this day,\" he said, citing the 1989 disaster which occurred when an oil tanker ran aground in the Gulf of Alaska .", "after_revision": "A for the , Doug Inkley, has criticised what he described as America's \"addiction to oil\". Inkley stated it is ultimately responsible for the Deepwater Horizon disaster earlier this year. Doug Inkley, a senior scientist working for the , said that [the United States of] America's \"addiction to oil\" was responsible for the Deepwater Horizon disaster six months ago. Inkley commented on the incident, six months after the explosion which killed eleven rig workers and resulted in over 170 million gallons of leaking into the causing damage to as well as the Gulf's fishing and tourism industries. Inkley is a senior scientist working for the . He stated, \"Looking back at what we knew six months after the Exxon Valdez disaster in Alaska illustrates the danger of too quickly drawing conclusions about the full impacts of the Gulf oil disaster.\" His remarks echo those issued by another environmental organisation in July. Greenpeace demanded that , who the has blamed for the disaster, take a \"new direction\" and end an \"obsession with high risk, environmentally reckless sources of oil.\" Inkley said incidents in the past showed there can be far-reaching effects. \"The disaster was not simply one ecosystem earthquake \u2013 the aftershocks have continued to this day,\" he said, citing which occurred when an ran aground in the .", "edit_actions": [{"type": "R", "before": "scientist for the National Wildlife Federation", "after": "for the", "start_char_pos": 2, "end_char_pos": 48}, {"type": "D", "before": "National Wildlife Federation", "after": null, "start_char_pos": 275, "end_char_pos": 303}, {"type": "D", "before": "crude oil", "after": null, "start_char_pos": 576, "end_char_pos": 585}, {"type": "D", "before": "Gulf of Mexico", "after": null, "start_char_pos": 603, "end_char_pos": 617}, {"type": "D", "before": "marine wildlife habitats", "after": null, "start_char_pos": 636, "end_char_pos": 660}, {"type": "D", "before": "National Wildlife Federation", "after": null, "start_char_pos": 760, "end_char_pos": 788}, {"type": "D", "before": "BP", "after": null, "start_char_pos": 1095, "end_char_pos": 1097}, {"type": "D", "before": "United States Congress", "after": null, "start_char_pos": 1108, "end_char_pos": 1130}, {"type": "D", "before": "Exxon Valdez", "after": null, "start_char_pos": 1344, "end_char_pos": 1356}, {"type": "D", "before": "the 1989 disaster", "after": null, "start_char_pos": 1469, "end_char_pos": 1486}, {"type": "D", "before": "oil tanker", "after": null, "start_char_pos": 1510, "end_char_pos": 1520}, {"type": "D", "before": "Gulf of Alaska", "after": null, "start_char_pos": 1540, "end_char_pos": 1554}], "sents_char_pos": [0, 129, 226, 434, 714, 790, 992, 1069, 1262, 1338]}
+{"doc_id": "214838", "revision_depth": "1", "before_revision": "Shakemap of the earthquake, by the United States Geological Survey. A \"sudden\" and \"terrifying\" aftershock of the magnitude 8.8, February 27 earthquake hit central and southern Chile on Wednesday night. The aftershock, as reported by the Servicio Sismol\u00f3gico de la Universidad de Chile (University of Chile Seismological Service), had a magnitude of 5.8, and occurred at a depth of 32.6 kilometers (20.3 miles). It took place at 23:49:56 local time (Thursday 02:49:56 UTC). The United States Geological Survey (USGS) said it occurred at a depth of 7 km (4.4 miles). Universidad de Chile measurements placed the center of the earthquake under the Pacific Ocean, 153 km (96 miles) northwest of the coastal town of Constituci\u00f3n . The USGS reported it occurred off the coast of the Libertador General Bernardo O'Higgins Region coast, 206 km (128 miles) west-northwest of Talca ; 244 kilometers (151 miles) north-northwest of Concepci\u00f3n ; 263 km (164 miles) southwest of Valpara\u00edso ; and 313 km (195 miles) west-southwest of Santiago, the capital of the country. As reported by ONEMI , Chile's National Emergencies Office, the aftershock was felt throughout the Valpara\u00edso (Mercalli III), Santiago Metropolitan (II, III, IV), O'Higgins (IV), Maule (III, IV, V), B\u00edo B\u00edo (II, III, IV) and La Araucan\u00eda regions (II, III), including cities such as Santiago, Vi\u00f1a del Mar, Lolol, Santa Cruz, Curic\u00f3, Cauquenes, Chill\u00e1n, and Temuco . No damage or casualties were reported, and there was no disturbance to utilities.", "after_revision": "Shakemap of the earthquake, by the United States Geological Survey. A \"sudden\" and \"terrifying\" aftershock of the magnitude 8.8, February 27 earthquake hit central and southern Chile on Wednesday night. The aftershock, as reported by the Servicio Sismol\u00f3gico de la (University of Chile Seismological Service), had a magnitude of 5.8, and occurred at a depth of 32.6 (20.3 miles). It took place at 23:49:56 local time (Thursday 02:49:56 UTC). The (USGS) said it occurred at a depth of 7 km (4.4 miles). Universidad de Chile measurements placed the center of the earthquake under the Pacific Ocean, 153 km (96 miles) northwest of the coastal town of . The USGS reported it occurred off the coast of the Libertador General Bernardo O'Higgins Region coast, 206 km (128 miles) west-northwest of ; 244 kilometers (151 miles) north-northwest of ; 263 km (164 miles) southwest of ; and 313 km (195 miles) west-southwest of Santiago, the capital of the country. As reported by , Chile's National Emergencies Office, the aftershock was felt throughout the (Mercalli III), (II, III, IV), O'Higgins (IV), (III, IV, V), (II, III, IV) and regions (II, III), including cities such as Santiago, Vi\u00f1a del Mar, Lolol, w| Santa Cruz, Chile|Santa Cruz , , , , and . No damage or casualties were reported, and there was no disturbance to utilities.", "edit_actions": [{"type": "D", "before": "Universidad de Chile", "after": null, "start_char_pos": 265, "end_char_pos": 285}, {"type": "D", "before": "kilometers", "after": null, "start_char_pos": 387, "end_char_pos": 397}, {"type": "D", "before": "United States Geological Survey", "after": null, "start_char_pos": 478, "end_char_pos": 509}, {"type": "D", "before": "Constituci\u00f3n", "after": null, "start_char_pos": 712, "end_char_pos": 724}, {"type": "D", "before": "Talca", "after": null, "start_char_pos": 867, "end_char_pos": 872}, {"type": "D", "before": "Concepci\u00f3n", "after": null, "start_char_pos": 921, "end_char_pos": 931}, {"type": "D", "before": "Valpara\u00edso", "after": null, "start_char_pos": 966, "end_char_pos": 976}, {"type": "D", "before": "ONEMI", "after": null, "start_char_pos": 1073, "end_char_pos": 1078}, {"type": "D", "before": "Valpara\u00edso", "after": null, "start_char_pos": 1157, "end_char_pos": 1167}, {"type": "D", "before": "Santiago Metropolitan", "after": null, "start_char_pos": 1184, "end_char_pos": 1205}, {"type": "D", "before": "Maule", "after": null, "start_char_pos": 1237, "end_char_pos": 1242}, {"type": "D", "before": "B\u00edo B\u00edo", "after": null, "start_char_pos": 1257, "end_char_pos": 1264}, {"type": "D", "before": "La Araucan\u00eda", "after": null, "start_char_pos": 1283, "end_char_pos": 1295}, {"type": "A", "before": null, "after": "w|", "start_char_pos": 1371, "end_char_pos": 1371}, {"type": "R", "before": "Curic\u00f3, Cauquenes, Chill\u00e1n, and Temuco", "after": "Chile|Santa Cruz", "start_char_pos": 1384, "end_char_pos": 1422}, {"type": "A", "before": null, "after": ", , , , and", "start_char_pos": 1423, "end_char_pos": 1423}], "sents_char_pos": [0, 67, 202, 411, 473, 565, 726, 874, 933, 978, 1057, 1425]}
+{"doc_id": "21631", "revision_depth": "1", "before_revision": "With only one week to go till the German federal election , all polls say it's impossible to predict who will govern the country for the next four years (for the polls see end of article). Gerhard Schr\u00f6der today in Munich Angela Merkel's Christian Democrats (CDU) had headed the polls for over two years. Only three months ago, when chancellor Gerhard Schr\u00f6der proclaimed he would seek early elections, a move that at the time was considered to be political suicide by many commentators, it seemed not unlikely that the CDU could even govern on its own, without an coalition partner. While their lead was slowly shrinking in the past few months, there was still a comfortable majority for a coalition with the Free Democrats (FDP). Then came the TV debate between Schr\u00f6der and Merkel. Commentators and newspaper editorials first thought it didn't have much impact. Sure, the \"Media chancellor\" Schr\u00f6der was widely considered to have performed better, but that was to be expected. And Merkel certainly wasn't as bad as Schr\u00f6der's Social Democrats (SPD) had hoped. Also the topics they talked about weren't really new. Every position they stated had already been printed and broadcasted over and over again. But something did happen. The CDU plunged between 2-3\\% in the various polls, while the SPD gained as much as 3.5\\%. Suddenly the black-yellow (named for the party colors of the CDU and FDP) majority was gone. But the current red-green (this time the colors of SPD and Greens ) coalition is even farther from reaching a majority because there is also the Left Party . The Left Party (or simply The Left) is essentially a renamed PDS, which in turn is the successor of the SED , the former ruling party of the GDR . It failed the 5\\% quorum in the 2002 election and currently only has two representatives in the Bundestag ; both won constituencies in East Berlin. The Left originally planned to merge with the WASG , a party mainly consisting of former SPD members who were disappointed by Schr\u00f6der's social reforms, before the election which would have been held in 2006. However, they were caught off guard by the early elections call, so candidates of the WASG for the Bundestag now run under The Left banner. One of them is Oskar Lafontaine . Oskar Lafontaine Lafontaine was the Party chair of the SPD. He was also the Finance minister in Schr\u00f6der's first government. But only a few months after the SPD got in power after 16 years of CDU government, he resigned in March 1999 from both the offices of minister and party chair, citing insurmountable political and personal differences with Schr\u00f6der. He largely stayed out of politics, writing only a few books and newspaper columns, but is now, along with Gregor Gysi , one of two front-runners of the Left Party. So, assuming neither black-yellow nor red-green reach a majority, what options are left? Maybe, the only remaining possibility is a grand coalition between the SPD and the CDU. But the differences between those two parties seem irreconcilable from today's viewpoint. There are radically different approaches in the fields of taxation, social and labor reforms to name only a few. Angela Merkel has recruited a jurist from the German constitutional court, Paul Kirchhof , to her team. Kirchhof plans to introduce a flat tax on income, 25\\% for everyone, and remove all tax exemptions. While the CDU doesn't want to go that far during the next four years, it has already named Kirchhof finance minister in the case they win the election. The SPD has blasted those plans as \"radically unsocial\" and instead plans to increase the taxes for wealthier people. Another hot topic is Germany's high unemployment. The CDU plans to abolish the dismissal protection of workers to give companies greater flexibilty in the hiring of their employees. Again, this is a no-go for the SPD. Various PollsPartyARDZDFFocusFAZ SPD 34,0 34,0 34,5 32, 7CDU / CSU 41,0 41,0 40,5 41, 5Greens 7,0 7,0 7,0 7, 2FDP 6,5 7,0 7,0 7, 0The Left 8,5 8,0 8,0 8,9 But the two parties won't even speculate about this option. Both ruled out a coalition with each other. Nonetheless, 35\\% of all Germans think this coalition would be the best for the nation, a survey by the ZDF shows. That is still more than the 31\\% who would favor a black-yellow coalition and 17\\% who want a continuation of the current red-green government. So, Germans have to wait for the 18th of September to know who will govern them for the next four years. But then again, it might even take two weeks longer because a by-election is required in Dresden, after a candidate died. And if it gets even closer than the aforementioned polls suggest, Germany will have to wait till October 2nd for a new, or the old government. ", "after_revision": "With only one week to go till the , all polls say it's impossible to predict who will govern the country for the next four years (for the polls see end of article). Gerhard Schr\u00f6der today in 's (CDU) had headed the polls for over two years. Only three months ago, when chancellor proclaimed he would seek early elections, a move that at the time was considered to be political suicide by many commentators, it seemed not unlikely that the CDU could even govern on its own, without an coalition partner. While their lead was slowly shrinking in the past few months, there was still a comfortable majority for a coalition with the (FDP). Then came the TV debate between Schr\u00f6der and Merkel. Commentators and newspaper editorials first thought it didn't have much impact. Sure, the \"Media chancellor\" Schr\u00f6der was widely considered to have performed better, but that was to be expected. And Merkel certainly wasn't as bad as Schr\u00f6der's (SPD) had hoped. Also the topics they talked about weren't really new. Every position they stated had already been printed and broadcasted over and over again. But something did happen. The CDU plunged between 2-3\\% in the various polls, while the SPD gained as much as 3.5\\%. Suddenly the black-yellow (named for the party colors of the CDU and FDP) majority was gone. But the current red-green (this time the colors of SPD and ) coalition is even farther from reaching a majority because there is also the . The Left Party (or simply The Left) is essentially a renamed PDS, which in turn is the successor of the , the former ruling party of the . It failed the 5\\% quorum in the 2002 election and currently only has two representatives in the ; both won constituencies in East Berlin. The Left originally planned to merge with the , a party mainly consisting of former SPD members who were disappointed by Schr\u00f6der's social reforms, before the election which would have been held in 2006. However, they were caught off guard by the early elections call, so candidates of the WASG for the Bundestag now run under The Left banner. One of them is . Oskar Lafontaine Lafontaine was the Party chair of the SPD. He was also the Finance minister in Schr\u00f6der's first government. But only a few months after the SPD got in power after 16 years of CDU government, he resigned in March 1999 from both the offices of minister and party chair, citing insurmountable political and personal differences with Schr\u00f6der. He largely stayed out of politics, writing only a few books and newspaper columns, but is now, along with , one of two front-runners of the Left Party. So, assuming neither black-yellow nor red-green reach a majority, what options are left? Maybe, the only remaining possibility is a grand coalition between the SPD and the CDU. But the differences between those two parties seem irreconcilable from today's viewpoint. There are radically different approaches in the fields of taxation, social and labor reforms to name only a few. Angela Merkel has recruited a jurist from the German constitutional court, , to her team. Kirchhof plans to introduce a on income, 25\\% for everyone, and remove all tax exemptions. While the CDU doesn't want to go that far during the next four years, it has already named Kirchhof finance minister in the case they win the election. The SPD has blasted those plans as \"radically unsocial\" and instead plans to increase the taxes for wealthier people. Another hot topic is Germany's high unemployment. The CDU plans to abolish the dismissal protection of workers to give companies greater flexibilty in the hiring of their employees. Again, this is a no-go for the SPD. Various PollsPartyFocus 34,0 34,0 34,5 32, 7 / 41,0 41,0 40,5 41, 5 7,0 7,0 7,0 7, 2 6,5 7,0 7,0 7, 0 8,5 8,0 8,0 8,9 But the two parties won't even speculate about this option. Both ruled out a coalition with each other. Nonetheless, 35\\% of all Germans think this coalition would be the best for the nation, a survey by the ZDF shows. That is still more than the 31\\% who would favor a black-yellow coalition and 17\\% who want a continuation of the current red-green government. So, Germans have to wait for the 18th of September to know who will govern them for the next four years. But then again, it might even take two weeks longer because a by-election is required in Dresden, after a candidate died. And if it gets even closer than the aforementioned polls suggest, Germany will have to wait till October 2nd for a new, or the old government. Related news", "edit_actions": [{"type": "D", "before": "German federal election", "after": null, "start_char_pos": 34, "end_char_pos": 57}, {"type": "R", "before": "Munich Angela Merkel's Christian Democrats", "after": "'s", "start_char_pos": 215, "end_char_pos": 257}, {"type": "D", "before": "Gerhard Schr\u00f6der", "after": null, "start_char_pos": 344, "end_char_pos": 360}, {"type": "D", "before": "Free Democrats", "after": null, "start_char_pos": 710, "end_char_pos": 724}, {"type": "D", "before": "Social Democrats", "after": null, "start_char_pos": 1029, "end_char_pos": 1045}, {"type": "D", "before": "Greens", "after": null, "start_char_pos": 1475, "end_char_pos": 1481}, {"type": "D", "before": "Left Party", "after": null, "start_char_pos": 1561, "end_char_pos": 1571}, {"type": "D", "before": "SED", "after": null, "start_char_pos": 1678, "end_char_pos": 1681}, {"type": "D", "before": "GDR", "after": null, "start_char_pos": 1715, "end_char_pos": 1718}, {"type": "D", "before": "Bundestag", "after": null, "start_char_pos": 1817, "end_char_pos": 1826}, {"type": "D", "before": "WASG", "after": null, "start_char_pos": 1915, "end_char_pos": 1919}, {"type": "D", "before": "Oskar Lafontaine", "after": null, "start_char_pos": 2233, "end_char_pos": 2249}, {"type": "D", "before": "Gregor Gysi", "after": null, "start_char_pos": 2715, "end_char_pos": 2726}, {"type": "D", "before": "Paul Kirchhof", "after": null, "start_char_pos": 3228, "end_char_pos": 3241}, {"type": "D", "before": "flat tax", "after": null, "start_char_pos": 3287, "end_char_pos": 3295}, {"type": "R", "before": "PollsPartyARDZDFFocusFAZ SPD", "after": "PollsPartyFocus", "start_char_pos": 3853, "end_char_pos": 3881}, {"type": "R", "before": "7CDU", "after": "7", "start_char_pos": 3901, "end_char_pos": 3905}, {"type": "D", "before": "CSU", "after": null, "start_char_pos": 3908, "end_char_pos": 3911}, {"type": "R", "before": "5Greens", "after": "5", "start_char_pos": 3931, "end_char_pos": 3938}, {"type": "R", "before": "2FDP", "after": "2", "start_char_pos": 3954, "end_char_pos": 3958}, {"type": "R", "before": "0The Left", "after": "0", "start_char_pos": 3974, "end_char_pos": 3983}, {"type": "A", "before": null, "after": "Related news", "start_char_pos": 4733, "end_char_pos": 4733}], "sents_char_pos": [0, 188, 304, 583, 731, 784, 864, 979, 1062, 1116, 1205, 1231, 1322, 1415, 1573, 1828, 1868, 2077, 2217, 2251, 2311, 2376, 2608, 2772, 2861, 2949, 3039, 3152, 3256, 3356, 3508, 3626, 3676, 3808, 4059, 4103, 4218, 4362, 4467, 4589]}
+{"doc_id": "221152", "revision_depth": "1", "before_revision": "Under the Yas Marina Circuit in Abu-Dhabi 's floodlights, German driver Sebastian Vettel added a new Formula One record to his list as youngest winner of the championship at 23 years. On Saturday, Vettel took the title at the final race of this year's competition . Starting from pole position, the Red Bull Racing driver led the race right through except during pit stops, when reigning world champion Jenson Button led for a few laps. Sebastian Vettel is the youngest Formula-1 world champion at the age of 23 years Championship leader Fernando Alonso started the race 11 points ahead of Mark Webber . With 25 points for a win, 18 for second and 15 for third, the Spaniard only needed to finish second to secure his third world championship. With a 15-point lag behind Alonso, Sebastian Vettel was third in the championship standings; winning the championship depended on neither Alonso nor Webber finishing on the podium. A major accident between Michael Schumacher and Vintantonio Liuzzi on the first lap of the race triggered deployment of the safety car . Alonso and Webber were among drivers who decided to make earlier than planned pit stops while racing was resricted. However, they rejoined the track behind the Renault of Vitaly Petrov , who proved extremely difficult to overtake. Both remained stuck behind Petrov for the remainder of the race, finishing 7th and 8th respectively to score 6 and 4 points. Sebastian Vettel went on to win the race ahead of the two McLarens of Lewis Hamilton and Jenson Button , scoring 25 championship points to give a total of 256 - only 4 ahead of Alonso. In 2007, he replaced an injured Robert Kubica in the United States Grand Prix . Finishing 8th and collecting one championship point; this his first record was youngest driver to score a point in F1. In 2008, Vettel had the opportunity to race for a full season with Toro Rosso , winning what remains that team's only race victory. At the Italian Grand Prix , he became the youngest driver to qualify in pole position and youngest race winner. In 2009, he moved to Red Bull Racing , scoring that team\u2019s first pole position and first race victory. He went on to finish second in the world championship.", "after_revision": "Under the in 's floodlights, German driver added a new Formula One record to his list as youngest winner of the championship at 23 years. On Saturday, Vettel took the title at of . Starting from pole position, the driver led the race right through except during pit stops, when reigning world champion led for a few laps. Sebastian Vettel is the youngest Formula-1 world champion at the age of 23 years Championship leader started the race 11 points ahead of . With 25 points for a win, 18 for second and 15 for third, the Spaniard only needed to finish second to secure his third world championship. With a 15-point lag behind Alonso, Sebastian Vettel was third in the championship standings; winning the championship depended on neither Alonso nor Webber finishing on the podium. A major accident between and on the first lap of the race triggered deployment of the . Alonso and Webber were among drivers who decided to make earlier than planned pit stops while racing was resricted. However, they rejoined the track behind the of , who proved extremely difficult to overtake. Both remained stuck behind Petrov for the remainder of the race, finishing 7th and 8th respectively to score 6 and 4 points. Sebastian Vettel went on to win the race ahead of the two of and , scoring 25 championship points to give a total of 256 - only 4 ahead of Alonso. In 2007, he replaced an injured in the . Finishing 8th and collecting one championship point; this his first record was youngest driver to score a point in F1. In 2008, Vettel had the opportunity to race for a full season with , winning what remains that team's only race victory. At the , he became the youngest driver to qualify in pole position and youngest race winner. In 2009, he moved to , scoring that team\u2019s first pole position and first race victory. He went on to finish second in the world championship.", "edit_actions": [{"type": "R", "before": "Yas Marina Circuit in Abu-Dhabi", "after": "in", "start_char_pos": 10, "end_char_pos": 41}, {"type": "D", "before": "Sebastian Vettel", "after": null, "start_char_pos": 72, "end_char_pos": 88}, {"type": "R", "before": "the final race of this year's competition", "after": "of", "start_char_pos": 222, "end_char_pos": 263}, {"type": "D", "before": "Red Bull Racing", "after": null, "start_char_pos": 299, "end_char_pos": 314}, {"type": "D", "before": "Jenson Button", "after": null, "start_char_pos": 403, "end_char_pos": 416}, {"type": "D", "before": "Fernando Alonso", "after": null, "start_char_pos": 538, "end_char_pos": 553}, {"type": "D", "before": "Mark Webber", "after": null, "start_char_pos": 590, "end_char_pos": 601}, {"type": "R", "before": "Michael Schumacher and Vintantonio Liuzzi", "after": "and", "start_char_pos": 950, "end_char_pos": 991}, {"type": "D", "before": "safety car", "after": null, "start_char_pos": 1049, "end_char_pos": 1059}, {"type": "R", "before": "Renault of Vitaly Petrov", "after": "of", "start_char_pos": 1222, "end_char_pos": 1246}, {"type": "R", "before": "McLarens of Lewis Hamilton and Jenson Button", "after": "of and", "start_char_pos": 1476, "end_char_pos": 1520}, {"type": "R", "before": "Robert Kubica in the United States Grand Prix", "after": "in the", "start_char_pos": 1635, "end_char_pos": 1680}, {"type": "D", "before": "Toro Rosso", "after": null, "start_char_pos": 1869, "end_char_pos": 1879}, {"type": "D", "before": "Italian Grand Prix", "after": null, "start_char_pos": 1941, "end_char_pos": 1959}, {"type": "D", "before": "Red Bull Racing", "after": null, "start_char_pos": 2067, "end_char_pos": 2082}], "sents_char_pos": [0, 183, 436, 603, 743, 836, 924, 1177, 1292, 1417, 1602, 1682, 1735, 1801, 1933, 2045, 2148]}
+{"doc_id": "221861", "revision_depth": "1", "before_revision": "All flights in and out of Birmingham Airport have been diverted or suspended until at least noon local time after a business jet carrying an organ for transplantation crashed on approach to the airport in Birmingham, England, during heavy fog. Two people were injured in the accident, one seriously. A spokesperson for the airport said: \"We can confirm that an incident has occurred involving a private Cessna aircraft. The incident occurred on arrival into the airport and the emergency services are in attendance.\" A Cessna Citation 501 aircraft similar to the aircraft involved in the crash at Birmingham Airport, Birmingham , England. Reports suggested that smoke was seen rising from the aircraft, which came down at the end of the runway. West Midlands Police Chief Inspector Matt Markham confirmed that the aircraft was carrying an organ for transplantation, but said that it was undamaged in the accident and it had been taken from the aircraft. Later reports suggested that the liver had been transported to Queen Elizabeth Hospital , where the operation was being carried out. Another eyewitness said that she saw two fire engines on the scene in the immediate aftermath of the crash; a spokesperson for the West Midlands Ambulance Service added that paramedics were at the site of the accident. Reports suggested that the smoking aircraft came to a halt to the right of the runway after crashing into an instrument landing system beacon. Images of the airport taken around the time of the accident showed that the airport was shrouded in thick fog. Sky News reported that the aircraft was approaching the runway at an \"odd angle\", before it \"skidded\" and caught fire. The spokesperson for Birmingham Airport added: \"The airport is currently closed. If you are due to travel to the airport this evening, please contact your airline for further guidance and do not come to the airport at this time. No further information is available at the moment.\"", "after_revision": "All flights in and out of have been diverted or suspended until at least noon local time after a carrying an crashed on approach to the airport in Birmingham, England, during heavy fog. Two people were injured in the accident, one seriously. A spokesperson for the airport said: \"We can confirm that an incident has occurred involving a private aircraft. The incident occurred on arrival into the airport and the emergency services are in attendance.\" A aircraft similar to the aircraft involved in the crash at , , England. Reports suggested that smoke was seen rising from the aircraft, which came down at the end of the runway. Chief Inspector Matt Markham confirmed that the aircraft was carrying an organ for transplantation, but said that it was undamaged in the accident and it had been taken from the aircraft. Later reports suggested that the had been transported to , where the operation was being carried out. Another eyewitness said that she saw two fire engines on the scene in the immediate aftermath of the crash; a spokesperson for the w| West Midlands Ambulance Service added that paramedics were at the site of the accident. Reports suggested that the smoking aircraft came to a halt to the right of the runway after crashing into an beacon. Images of the airport taken around the time of the accident showed that the airport was shrouded in thick fog. reported that the aircraft was approaching the runway at an \"odd angle\", before it \"skidded\" and caught fire. The spokesperson for Birmingham Airport added: \"The airport is currently closed. If you are due to travel to the airport this evening, please contact your airline for further guidance and do not come to the airport at this time. No further information is available at the moment.\"", "edit_actions": [{"type": "D", "before": "Birmingham Airport", "after": null, "start_char_pos": 26, "end_char_pos": 44}, {"type": "R", "before": "business jet carrying an organ for transplantation", "after": "carrying an", "start_char_pos": 116, "end_char_pos": 166}, {"type": "D", "before": "Cessna", "after": null, "start_char_pos": 403, "end_char_pos": 409}, {"type": "D", "before": "Cessna Citation 501", "after": null, "start_char_pos": 519, "end_char_pos": 538}, {"type": "D", "before": "Birmingham Airport, Birmingham", "after": null, "start_char_pos": 597, "end_char_pos": 627}, {"type": "A", "before": null, "after": ",", "start_char_pos": 630, "end_char_pos": 630}, {"type": "D", "before": "West Midlands Police", "after": null, "start_char_pos": 746, "end_char_pos": 766}, {"type": "D", "before": "liver", "after": null, "start_char_pos": 988, "end_char_pos": 993}, {"type": "D", "before": "Queen Elizabeth Hospital", "after": null, "start_char_pos": 1018, "end_char_pos": 1042}, {"type": "A", "before": null, "after": "w|", "start_char_pos": 1219, "end_char_pos": 1219}, {"type": "D", "before": "instrument landing system", "after": null, "start_char_pos": 1417, "end_char_pos": 1442}, {"type": "D", "before": "Sky News", "after": null, "start_char_pos": 1562, "end_char_pos": 1570}], "sents_char_pos": [0, 243, 299, 419, 516, 639, 745, 954, 1087, 1195, 1307, 1450, 1561, 1680, 1761, 1909]}
+{"doc_id": "226323", "revision_depth": "1", "before_revision": "Much of the interior of New South Wales, Australia continues to be affected by floods caused by heavy rains. With more rain predicted, the Australian Bureau of Meteorology has issued a flood watch for all western flowing rivers in New South Wales from the Namoi River in the north of the state to the Murrumbidgee River in the south. Coonamble , in the central-western plains district of New South Wales, has been isolated by major flooding of the Castlereagh River . The State Emergency Service estimates that around 2,760 people are currently trapped in Coonamble. Mudgee, Canowindra, Eugowra, Dubbo, Wellington, and Young have also been severely affected. Like many river crossings in inland New South Wales, this low-level bridge in Bathurst is closed due to flooding. A number of major highways in Western districts of the state have been closed or had diversions put in place, including the Newell Highway near Mirrool Bridge, the Castlereagh Highway between Gilgandra and Walgett, the Oxley Highway between Gilgandra and Warren, and the Lachlan Valley Way between 28km north of Cowra and 6km South Of Gooloogong . A number of local roads have also been affected. Evacuation orders have been issued for parts of Wagga Wagga and parts of Coonamble due to flooding.", "after_revision": "Much of the interior of New South Wales, Australia continues to be affected by floods caused by heavy rains. With more rain predicted, the has issued a flood watch for all western flowing rivers in New South Wales from the in the north of the state to the in the south. , in the central-western plains district of New South Wales, has been isolated by major flooding of the . The State Emergency Service estimates that around 2,760 people are currently trapped in Coonamble. , , , , , and have also been severely affected. Like many river crossings in inland New South Wales, this low-level bridge in is closed due to flooding. A number of major highways in Western districts of the state have been closed or had diversions put in place, including the near Mirrool Bridge, the between and , the between Gilgandra and Warren, and the between 28km north of and 6km South Of . A number of local roads have also been affected. Evacuation orders have been issued for parts of and parts of Coonamble due to flooding.", "edit_actions": [{"type": "D", "before": "Australian Bureau of Meteorology", "after": null, "start_char_pos": 139, "end_char_pos": 171}, {"type": "D", "before": "Namoi River", "after": null, "start_char_pos": 256, "end_char_pos": 267}, {"type": "D", "before": "Murrumbidgee River", "after": null, "start_char_pos": 301, "end_char_pos": 319}, {"type": "D", "before": "Coonamble", "after": null, "start_char_pos": 334, "end_char_pos": 343}, {"type": "D", "before": "Castlereagh River", "after": null, "start_char_pos": 448, "end_char_pos": 465}, {"type": "R", "before": "Mudgee, Canowindra, Eugowra, Dubbo, Wellington, and Young", "after": ", , , , , and", "start_char_pos": 567, "end_char_pos": 624}, {"type": "D", "before": "Bathurst", "after": null, "start_char_pos": 737, "end_char_pos": 745}, {"type": "D", "before": "Newell Highway", "after": null, "start_char_pos": 897, "end_char_pos": 911}, {"type": "D", "before": "Castlereagh Highway between Gilgandra and Walgett, the Oxley Highway", "after": null, "start_char_pos": 937, "end_char_pos": 1005}, {"type": "A", "before": null, "after": "and , the between", "start_char_pos": 1014, "end_char_pos": 1014}, {"type": "D", "before": "Lachlan Valley Way", "after": null, "start_char_pos": 1045, "end_char_pos": 1063}, {"type": "D", "before": "Cowra", "after": null, "start_char_pos": 1086, "end_char_pos": 1091}, {"type": "D", "before": "Gooloogong", "after": null, "start_char_pos": 1109, "end_char_pos": 1119}, {"type": "D", "before": "Wagga Wagga", "after": null, "start_char_pos": 1219, "end_char_pos": 1230}], "sents_char_pos": [0, 108, 333, 467, 566, 658, 772, 1121, 1170]}
+{"doc_id": "227061", "revision_depth": "1", "before_revision": "In a ruling issued Tuesday a United States federal judge dismissed a lawsuit which attempted to stop the U.S. government from selecting Anwar al-Awlaki for targeted killing . Anwar al-Awlaki in 2008 John D. Bates, United States federal judge for the United States District Court for the District of Columbia , wrote in his opinion that the lawsuit was a \"unique and extraordinary case\" which brought up questions over whether the government had the authority to strategize over killing its own citizens without a previous criminal justice process undertaken. Judge Bates ruled for the United States Department of Justice , and held that various civil rights organizations in addition to Awlaki's father did not have the authority or jurisdiction to start the lawsuit in the first place. Awlaki's father was supported in the case by two civil rights organizations, the Center for Constitutional Rights and the American Civil Liberties Union. In the lawsuit these organizations argued before the court that targeted killing of an individual who does not present an imminent threat of life to citizens is not permitted by international law or by the United States Constitution . Awlaki was born in New Mexico. Yemeni law enforcement officials in November charged Awlaki with connections to Al-Qaeda, and ordered him to be arrested \"by any means possible\". U.S. officials have identified Awlaki as an influential leader within the Islamist terrorist organization Al-Qaeda in the Arabian Peninsula (AQAP). Awlaki has made statements where he encouraged individuals of Muslim faith to murder U.S. citizens. According to Associated Press, Awlaki is located in Yemen. He has been linked to terrorist incidents in the United States including the Fort Hood shooting , the attempted bombing of Northwest Airlines Flight 253 , and the Cargo planes bomb plot . AP reported that it received confirmation from Obama administration officials that, \"al-Awlaki is on a capture or kill list\"; and Agence France-Presse received similar statements from U.S. representatives. However, during the actual process of the Awlaki lawsuit in court, government representatives refused to confirm or deny whether this was the case. The U.S. government put forth the notion during the case that the court did not have jurisdiction to review actions of the President of the United States , due to the fact that the President's choices are intended in a setting of war to prevent the loss of lives of U.S. citizens stemming from acts of terrorism.", "after_revision": "In a ruling issued Tuesday a United States federal judge dismissed a lawsuit which attempted to stop the U.S. government from selecting Anwar al-Awlaki for . in 2008 , for the , wrote in his opinion that the lawsuit was a \"unique and extraordinary case\" which brought up questions over whether the government had the authority to strategize over killing its own citizens without a previous criminal justice process undertaken. Judge Bates ruled for the , and held that various civil rights organizations in addition to Awlaki's father did not have the authority or jurisdiction to start the lawsuit in the first place. Awlaki's father was supported in the case by two civil rights organizations, the and the American Civil Liberties Union. In the lawsuit these organizations argued before the court that targeted killing of an individual who does not present an imminent threat of life to citizens is not permitted by international law or by the . Awlaki was born in New Mexico. Yemeni law enforcement officials in November charged Awlaki with connections to Al-Qaeda, and ordered him to be arrested \"by any means possible\". U.S. officials have identified Awlaki as an influential leader within the terrorist organization (AQAP). Awlaki has made statements where he encouraged individuals of faith to murder U.S. citizens. According to Associated Press, Awlaki is located in Yemen. He has been linked to terrorist incidents in the United States including the , the attempted bombing of , and the . AP reported that it received confirmation from officials that, \"al-Awlaki is on a capture or kill list\"; and received similar statements from U.S. representatives. However, during the actual process of the Awlaki lawsuit in court, government representatives refused to confirm or deny whether this was the case. The U.S. government put forth the notion during the case that the court did not have jurisdiction to review actions of the , due to the fact that the President's choices are intended in a setting of war to prevent the loss of lives of U.S. citizens stemming from acts of terrorism.", "edit_actions": [{"type": "D", "before": "targeted killing", "after": null, "start_char_pos": 156, "end_char_pos": 172}, {"type": "D", "before": "Anwar al-Awlaki", "after": null, "start_char_pos": 175, "end_char_pos": 190}, {"type": "D", "before": "John D. Bates, United States federal judge for the United States District Court for the District of Columbia", "after": null, "start_char_pos": 199, "end_char_pos": 307}, {"type": "A", "before": null, "after": "for the ,", "start_char_pos": 310, "end_char_pos": 310}, {"type": "D", "before": "United States Department of Justice", "after": null, "start_char_pos": 586, "end_char_pos": 621}, {"type": "D", "before": "Center for Constitutional Rights", "after": null, "start_char_pos": 869, "end_char_pos": 901}, {"type": "D", "before": "United States Constitution", "after": null, "start_char_pos": 1148, "end_char_pos": 1174}, {"type": "R", "before": "Islamist terrorist organization Al-Qaeda in the Arabian Peninsula", "after": "terrorist organization", "start_char_pos": 1428, "end_char_pos": 1493}, {"type": "D", "before": "Muslim", "after": null, "start_char_pos": 1564, "end_char_pos": 1570}, {"type": "D", "before": "Fort Hood shooting", "after": null, "start_char_pos": 1738, "end_char_pos": 1756}, {"type": "D", "before": "Northwest Airlines Flight 253", "after": null, "start_char_pos": 1784, "end_char_pos": 1813}, {"type": "D", "before": "Cargo planes bomb plot", "after": null, "start_char_pos": 1824, "end_char_pos": 1846}, {"type": "D", "before": "Obama administration", "after": null, "start_char_pos": 1896, "end_char_pos": 1916}, {"type": "D", "before": "Agence France-Presse", "after": null, "start_char_pos": 1979, "end_char_pos": 1999}, {"type": "D", "before": "President of the United States", "after": null, "start_char_pos": 2326, "end_char_pos": 2356}], "sents_char_pos": [0, 174, 559, 787, 941, 1176, 1207, 1353, 1501, 1601, 1660, 1848, 1974, 2054, 2202]}
+{"doc_id": "232511", "revision_depth": "2", "before_revision": "A memorial service was held Thursday for Adrienne Nicole Martin, the model found dead two weeks ago in the Missouri, US mansion of former Anheuser-Busch CEO August Busch IV . Martin, of Native American ethnicity, was 27 years old when she died of unknown causes, said investigators. A promotional image of Adrienne Martin from her iStudio.com profile Martin, who had been dating the 46-year-old Busch for \"the last several months\" according to friends, was a native of Springfield . She had previously been married to 45-year-old doctor Kevin J. Martin until February 2009, when they divorced, and had joint custody of their eight-year-old son. Adrienne Martin had a profile on iStudio, a modeling website, where she said she wanted to become an art therapist . She also expressed a desire to \"to do beer advertising\" and work in the modeling industry. At the time of her death, Martin had been working toward a master's degree in art therapy. The memorial service for Martin was held at South Haven Baptist Church in Springfield. Busch was not among the estimated 100 people attending the service, nor was he mentioned during it. The only speaker was the church's pastor, Scott Watson, who read letters from Martin's friends. Her son and other relatives sat in the front row while she was remembered as a gifted artist and dedicated mother. Lacy Elet, one of Martin's friends, later said Martin was happy that \"her life was finally in order.\" Her obituary in the Springfield News-Leader called Busch \"the love of her life.\" However, one of Martin's uncles, Andy Eby, said after the service, \"There are too many questions and not enough answers.\" Martin was found unconscious by Michael Jung, who worked at Busch's mansion, at 12:30 p.m. local time (18:30 UTC ) on December 19. At 1:12 p.m., Jung called emergency services, saying, \"This girl's just not waking up.\" When asked if she was breathing, Jung responded with, \"We don't know. It's dark back there. I'm gonna get a light and try and see.\" At 1:26 p.m., Martin was pronounced dead at the scene by emergency workers. Law enforcement officials said the room was dark because there were blackout \"curtains drawn in the bedroom.\" An autopsy on Martin's body did not find any trauma-related injuries, and the official cause of death has not been established by investigators. A toxicology report, expected to take several weeks, will likely be used to determine the reason Martin died. Police said Martin's body did not exhibit any \"apparent signs of trauma or other indications of cause of death.\" According to her ex-husband, Adrienne Martin had a rare heart condition, called Long QT syndrome , which can cause palpitations and sudden cardiac death . Kevin Martin said his ex-wife never sought medical advice on her condition and did not talk about it with friends. Police said that Busch was home at the US 2 million mansion when Martin was discovered, and that the ongoing investigation is being handled by the Frontenac Police Department and the St. Louis County Medical Examiner's Office. Art Margulis, a lawyer for August Busch IV, said Martin was visiting the Huntleigh residence and that there is \"absolutely nothing suspicious\" surrounding her death.", "after_revision": "A memorial service was held Thursday for Adrienne Nicole Martin, the model found dead two weeks ago in the Missouri, US mansion of former CEO . Martin, of Native American ethnicity, was 27 years old when she died of unknown causes, said investigators. A promotional image of Adrienne Martin from her iStudio.com profile Martin, who had been dating the 46-year-old Busch for \"the last several months\" according to friends, was a native of . She had previously been married to 45-year-old doctor Kevin J. Martin until February 2009, when they divorced, and had joint custody of their eight-year-old son. Adrienne Martin had a profile on iStudio, a modeling website, where she said she wanted to become an . She also expressed a desire to \"to do beer advertising\" and work in the modeling industry. At the time of her death, Martin had been working toward a master's degree in art therapy. The memorial service for Martin was held at South Haven Baptist Church in Springfield. Busch was not among the estimated 100 people attending the service, nor was he mentioned during it. The only speaker was the church's pastor, Scott Watson, who read letters from Martin's friends. Her son and other relatives sat in the front row while she was remembered as a gifted artist and dedicated mother. Lacy Elet, one of Martin's friends, later said Martin was happy that \"her life was finally in order.\" Her obituary in the called Busch \"the love of her life.\" However, one of Martin's uncles, Andy Eby, said after the service, \"There are too many questions and not enough answers.\" Martin was found unconscious by Michael Jung, who worked at Busch's mansion, at 12:30 p.m. (18:30 ) on December 19. At 1:12 p.m., Jung called emergency services, saying, \"This girl's just not waking up.\" When asked if she was breathing, Jung responded with, \"We don't know. It's dark back there. I'm gonna get a light and try and see.\" At 1:26 p.m., Martin was pronounced dead at the scene by emergency workers. Law enforcement officials said the room was dark because there were blackout \"curtains drawn in the bedroom.\" An on Martin's body did not find any trauma-related injuries, and the official cause of death has not been established by investigators. A report, expected to take several weeks, will likely be used to determine the reason Martin died. Police said Martin's body did not exhibit any \"apparent signs of trauma or other indications of cause of death.\" According to her ex-husband, Adrienne Martin had a rare heart condition, called , which can cause and . Kevin Martin said his ex-wife never sought medical advice on her condition and did not talk about it with friends. Police said that Busch was home at the 2 million mansion when Martin was discovered, and that the ongoing investigation is being handled by the Police Department and the Medical Examiner's Office. Art Margulis, a lawyer for August Busch IV, said Martin was visiting the residence and that there is \"absolutely nothing suspicious\" surrounding her death.", "edit_actions": [{"type": "R", "before": "Anheuser-Busch CEO August Busch IV", "after": "CEO", "start_char_pos": 138, "end_char_pos": 172}, {"type": "D", "before": "Springfield", "after": null, "start_char_pos": 469, "end_char_pos": 480}, {"type": "D", "before": "art therapist", "after": null, "start_char_pos": 746, "end_char_pos": 759}, {"type": "D", "before": "Springfield News-Leader", "after": null, "start_char_pos": 1464, "end_char_pos": 1487}, {"type": "D", "before": "local time", "after": null, "start_char_pos": 1738, "end_char_pos": 1748}, {"type": "D", "before": "UTC", "after": null, "start_char_pos": 1756, "end_char_pos": 1759}, {"type": "D", "before": "autopsy", "after": null, "start_char_pos": 2187, "end_char_pos": 2194}, {"type": "D", "before": "toxicology", "after": null, "start_char_pos": 2331, "end_char_pos": 2341}, {"type": "D", "before": "Long QT syndrome", "after": null, "start_char_pos": 2632, "end_char_pos": 2648}, {"type": "R", "before": "palpitations and sudden cardiac death", "after": "and", "start_char_pos": 2667, "end_char_pos": 2704}, {"type": "D", "before": "US", "after": null, "start_char_pos": 2861, "end_char_pos": 2863}, {"type": "D", "before": "Frontenac", "after": null, "start_char_pos": 2969, "end_char_pos": 2978}, {"type": "D", "before": "St. Louis County", "after": null, "start_char_pos": 3005, "end_char_pos": 3021}, {"type": "D", "before": "Huntleigh", "after": null, "start_char_pos": 3122, "end_char_pos": 3131}], "sents_char_pos": [0, 282, 482, 644, 761, 852, 943, 1030, 1130, 1226, 1341, 1443, 1524, 1646, 1777, 1865, 1935, 1957, 1997, 2073, 2183, 2328, 2438, 2551, 2821, 3048]}
+{"doc_id": "234970", "revision_depth": "1", "before_revision": "The seal of the CIA Jeffrey Alexander Sterling, an ex-officer of the Central Intelligence Agency (CIA), was taken into custody Thursday by federal agents in St. Louis , Missouri. He was indicted on six separate counts of unauthorized disclosure of national defense information, as well as four additional charges: mail fraud , unlawfully keeping national defense information, obstruction of justice , and unauthorized conveyance of government property. Sterling, aged 43, had been employed by the CIA from May 1993 until he was fired in January 2002. During his arraignment , a judge declared that he would be held until a Monday hearing because the government called him a danger to the community. Sterling, an African American lawyer who lives in O'Fallon , allegedly provided classified information to New York Times reporter James Risen , some of which was incorporated into Risen's 2006 State of War: The Secret History of the CIA and the Bush Administration . Risen, who wrote about the CIA's involvement in Iran's nuclear program, has not named any of his sources even after being subpeonaed twice; Risen was not explicitly named in Sterling's indictment, but his involvement in the alleged leak is strongly supported by its contents, and a US government official confirmed the connection to NBC News . Edward B. MacMahon Jr., a Virginia attorney for Sterling, said, \"He has always maintained his innocence throughout the course of this entire investigation. We'll seek to prove that in court.\" MacMahon also said trial will be held at a U.S. District Court in Alexandria , as the case began in that state. Every charge against Sterling comes with the possibility of 10\u201320 years of jail time. US Assistant Attorney General Lanny Breuer made a statement, saying that \"Sterling placed at risk our national security and the life of an individual working on a classified mission.\" A spokesperson for the CIA said, \"Separate and apart from any specific instance, including this matter involving a former agency officer who left the CIA years ago, we take very seriously the unauthorized disclosure of classified information.\" The New York Times did not comment on the matter. The Obama administration has already taken action in several similar leaks involving government officers. The administration has also initiated an investigation into Julian Assange, founder of WikiLeaks, after the site's release of thousands of classified documents. ", "after_revision": "The seal of the CIA Jeffrey Alexander Sterling, an ex-officer of the Central Intelligence Agency (CIA), was taken into custody Thursday by federal agents in , Missouri. He was indicted on six separate counts of unauthorized disclosure of national defense information, as well as four additional charges: , unlawfully keeping national defense information, , and unauthorized conveyance of government property. Sterling, aged 43, had been employed by the CIA from May 1993 until he was fired in January 2002. During his , a judge declared that he would be held until a Monday hearing because the government called him a danger to the community. Sterling, an African American lawyer who lives in , allegedly provided classified information to reporter , some of which was incorporated into Risen's 2006 . Risen, who wrote about the CIA's involvement in Iran's nuclear program, has not named any of his sources even after being twice; Risen was not explicitly named in Sterling's indictment, but his involvement in the alleged leak is strongly supported by its contents, and a US government official confirmed the connection to . Edward B. MacMahon Jr., a Virginia attorney for Sterling, said, \"He has always maintained his innocence throughout the course of this entire investigation. We'll seek to prove that in court.\" MacMahon also said trial will be held at a in , as the case began in that state. Every charge against Sterling comes with the possibility of 10\u201320 years of jail time. made a statement, saying that \"Sterling placed at risk our national security and the life of an individual working on a classified mission.\" A spokesperson for the CIA said, \"Separate and apart from any specific instance, including this matter involving a former agency officer who left the CIA years ago, we take very seriously the unauthorized disclosure of classified information.\" The New York Times did not comment on the matter. The has already taken action in several similar leaks involving government officers. The administration has also initiated an investigation into Julian Assange, founder of WikiLeaks, after the site's release of thousands of classified documents. Related news", "edit_actions": [{"type": "D", "before": "St. Louis", "after": null, "start_char_pos": 157, "end_char_pos": 166}, {"type": "D", "before": "mail fraud", "after": null, "start_char_pos": 314, "end_char_pos": 324}, {"type": "D", "before": "obstruction of justice", "after": null, "start_char_pos": 376, "end_char_pos": 398}, {"type": "D", "before": "arraignment", "after": null, "start_char_pos": 562, "end_char_pos": 573}, {"type": "D", "before": "O'Fallon", "after": null, "start_char_pos": 749, "end_char_pos": 757}, {"type": "R", "before": "New York Times reporter James Risen", "after": "reporter", "start_char_pos": 805, "end_char_pos": 840}, {"type": "D", "before": "State of War: The Secret History of the CIA and the Bush Administration", "after": null, "start_char_pos": 892, "end_char_pos": 963}, {"type": "D", "before": "subpeonaed", "after": null, "start_char_pos": 1088, "end_char_pos": 1098}, {"type": "D", "before": "NBC News", "after": null, "start_char_pos": 1299, "end_char_pos": 1307}, {"type": "R", "before": "U.S. District Court in Alexandria", "after": "in", "start_char_pos": 1545, "end_char_pos": 1578}, {"type": "D", "before": "US Assistant Attorney General Lanny Breuer", "after": null, "start_char_pos": 1700, "end_char_pos": 1742}, {"type": "D", "before": "Obama administration", "after": null, "start_char_pos": 2182, "end_char_pos": 2202}, {"type": "A", "before": null, "after": "Related news", "start_char_pos": 2445, "end_char_pos": 2445}], "sents_char_pos": [0, 178, 452, 550, 698, 1105, 1465, 1501, 1613, 1699, 1883, 2127, 2177, 2283]}
+{"doc_id": "236246", "revision_depth": "1", "before_revision": "The original iPhone 4 In a Tuesday media event, Verizon Wireless announced it had reached an agreement with Apple Inc. and would begin selling a CDMA version of the iPhone 4 beginning early February. The move means the end of rival company AT T 's status as the only official US carrier of the iPhone, a status it held since the first iPhone debuted in 2007. The press conference, held in New York City, was hosted by Verizon's president, Lowell McAdam , Apple's chief operating officer, Tim Cook , and Verizon Wireless' chief executive officer, Dan Mead. Neither Verizon Communications CEO Ivan Seidenberg nor Apple CEO Steve Jobs attended the conference. During the event, McAdam said, \"If the press writes something long enough and hard enough, it eventually comes true. We're bringing the fruit of our labor with a giant partner, and that's Apple.\" Such a partnership had been rumored for years, and the amount of speculation grew over the past few months. iPhone 4 pre-orders for current Verizon users begin February 3, and a public release is scheduled for February 10. The \"Verizon iPhone,\" as it has been dubbed for months, has been altered from the original iPhone 4 so it can utilize Verizon's 3G CDMA (code division multiple access) network. This means, however, that Verizon iPhone users will not be able to use the company's 4G LTE (long term evolution) network, and will thus be unable to make calls and access the Internet at the same time. Cook told the audience that the LTE hardware was not ready yet, saying, \"The first generation LTE chip sets force some design compromises, some of which we would not make. Secondly\u2014and most importantly\u2014Verizon Wireless customers have told us they want the iPhone now.\" However, Verizon's iPhone 4 allows the user to create a personal Wi-Fi hotspot , which means up to five other wireless devices can connect to the Internet through the phone. Pricing was announced as US$199 for a 16 GB version and US$ 299 for a 32 GB version, both requiring two-year contracts\u2014the same cost for an AT&T iPhone 4. However, Verizon said it would not mention the cost of data plans at this time, with Mead saying, \"We talked about the device pricing, but we're not going to talk about the pricing for the network for that connectivity.\"", "after_revision": "The original iPhone 4 In a Tuesday media event, announced it had reached an agreement with Apple Inc. and would begin selling a version of the beginning early February. The move means the end of rival company 's status as the only official US carrier of the iPhone, a status it held since the first iPhone debuted in 2007. The press conference, held in New York City, was hosted by Verizon's president, , Apple's chief operating officer, , and Verizon Wireless' chief executive officer, . Neither CEO nor Apple CEO Steve Jobs attended the conference. During the event, McAdam said, \"If the press writes something long enough and hard enough, it eventually comes true. We're bringing the fruit of our labor with a giant partner, and that's Apple.\" Such a partnership had been rumored for years, and the amount of speculation grew over the past few months. iPhone 4 pre-orders for current Verizon users begin February 3, and a public release is scheduled for February 10. The \"Verizon iPhone,\" as it has been dubbed for months, has been altered from the original iPhone 4 so it can utilize Verizon's CDMA (code division multiple access) network. This means, however, that Verizon iPhone users will not be able to use the company's (long term evolution) network, and will thus be unable to make calls and access the Internet at the same time. Cook told the audience that the LTE hardware was not ready yet, saying, \"The first generation LTE chip sets force some design compromises, some of which we would not make. Secondly\u2014and most importantly\u2014Verizon Wireless customers have told us they want the iPhone now.\" However, Verizon's iPhone 4 allows the user to create a , which means up to five other wireless devices can connect to the Internet through the phone. Pricing was announced as 199 for a 16 version and US 299 for a 32 GB version, both requiring two-year contracts\u2014the same cost for an AT&T iPhone 4. However, Verizon said it would not mention the cost of data plans at this time, with Mead saying, \"We talked about the device pricing, but we're not going to talk about the pricing for the network for that connectivity.\"", "edit_actions": [{"type": "D", "before": "Verizon Wireless", "after": null, "start_char_pos": 48, "end_char_pos": 64}, {"type": "D", "before": "CDMA", "after": null, "start_char_pos": 145, "end_char_pos": 149}, {"type": "D", "before": "iPhone 4", "after": null, "start_char_pos": 165, "end_char_pos": 173}, {"type": "D", "before": "AT", "after": null, "start_char_pos": 240, "end_char_pos": 242}, {"type": "D", "before": "T", "after": null, "start_char_pos": 243, "end_char_pos": 244}, {"type": "D", "before": "Lowell McAdam", "after": null, "start_char_pos": 439, "end_char_pos": 452}, {"type": "D", "before": "Tim Cook", "after": null, "start_char_pos": 488, "end_char_pos": 496}, {"type": "R", "before": "Dan Mead. Neither Verizon Communications CEO Ivan Seidenberg", "after": ". Neither CEO", "start_char_pos": 546, "end_char_pos": 606}, {"type": "D", "before": "3G", "after": null, "start_char_pos": 1204, "end_char_pos": 1206}, {"type": "D", "before": "4G LTE", "after": null, "start_char_pos": 1338, "end_char_pos": 1344}, {"type": "D", "before": "personal Wi-Fi hotspot", "after": null, "start_char_pos": 1781, "end_char_pos": 1803}, {"type": "R", "before": "US$199 for a 16 GB version and US$", "after": "199 for a 16 version and US", "start_char_pos": 1924, "end_char_pos": 1958}], "sents_char_pos": [0, 199, 358, 555, 656, 773, 852, 1075, 1252, 1455, 1627, 1724, 1898, 2053]}
+{"doc_id": "239546", "revision_depth": "1", "before_revision": "Scottish singer-songwriter Gerry Rafferty 's funeral was held in Paisley on Friday. Over 400 turned out on the frosty morning as the man behind Baker Street was laid to rest in where he married - St Mirin's Cathedral , less than a mile from his birthplace. Fans travelled from as far afield as New York to join family, friends and politicians at the service after Rafferty died on January 4 at the age of 63 in Gloucestershire , England. Born on Underwood Lane in Glenburn, Paisley, Rafferty started performing in local folk clubs in the 1960s before teaming up with Billy Connolly to form The Humblebums . Rafferty performs in 1980 Rafferty went on to join with childhood friend Joe Egan to form Stealer's Wheel , achieving chart success in 1973 with Stuck In The Middle With You - a track which later resurfaced when it appeared on Quentin Tarantino film Reservoir Dogs . Rafferty achieved international fame with Baker Street in 1978. He ultimately sold over 10 million records and Baker Street alone earned him an estimated \u00a3 80,000 per year in royalties. Longterm friend John Byrne , an artist and playwright, delivered a eulogy. \"Gerald could be incredibly funny. There are so many occasions when he had me laughing helplessly. But what some people may not appreciate is the lyrics to his songs were incredible. He wrote hundreds and hundreds of songs and he is the greatest songwriter Scotland has ever produced. When I saw him a few weeks ago his body was weak but his spirit as strong as ever. He had a serenity about him that I thought was wonderful.\" Days before the musician died Byrne received a late-night phone call. \"Amongst the things he said, and the one that sticks in my mind and was germane to both of us, and we said it together, was: 'What does it profit a man if he gains the whole world, but loses his own soul?' I know that he went to meet his maker sober and unafraid, and fiercely curious and with enormous bravery.\" He concluded by saying \"He wasn't a saint, but then which of us are? I loved him dearly.\" Byrne designed album sleeves for Rafferty's music. Egan also spoke: \"We hadn't spoken for a couple of years, but that didn\u2019t really matter because we were so close. After all, we'd lived out of each other\u2019s pockets for years. But I'm sad. Really, really sad.\" Six of his family performed one of his songs unaccompanied at the service - his deceased brother Joe's children Neal, Brian, Eileen, Claire and Mark, and his daughter Martha. They sang Whatever's Written In Your Heart from his album City to City . \"We all used to sing this song in the house as a kid,\" Martha said. \"We loved singing his songs, and this one just seemed perfect for today.\" Father John Tormey led the Requiem Mass , saying Rafferty \"was very much aware of the spiritual element and you will find that in his songs.\" Tormey acknowledged the man's tendency to shun fame and attention, saying he \"shunned the trappings of fame and celebrity to be true to himself.\" Musicians attending included The Proclaimers, Robert Noakes and Graham Lyle. Proclaimer Craig Reid said \"Music was Gerry's passion. He said music is something that you have to pass on to other people. You don't own it and it goes through you. His music reflected that.\" The two worked together on the song Letter From America , which Rafferty produced. Craig's twin brother Charlie recalled \"Gerry was great for his refusal to sell out and his determination to do his own thing. This man was respected for what he did.\" The cathedral where Rafferty's funeral was held Rafferty spent his entire life dealing with alcohol use. Nor was this his only health problem: \"There have been periods in my life where I have experienced depression,\" he said in a recent interview. \"It has been through some of my darkest moments that I have written some of my best songs. For me, singing and writing is very therapeutic. It's much more effective than taking Prozac!\" Scotland's First Minister Alex Salmond attended, as did Members of the Scottish Parliament (MSPs) Hugh Henry, Wendy Alexander, Pauline McNeill and Robin Harper . Billy Connolly was unable to attend due to tour commitments in Australia. Raphael Ravenscroft , the saxophonist who famously played the main riff in Baker Street, recorded a track in Exeter to mark the occasion. After the funeral members of the public gave Rafferty his last applause as his cortege departed the cathedral, which is also a mile from Rafferty's former school, St Mirin's Academy . His body was taken for a private cremation.", "after_revision": "Scottish singer-songwriter 's funeral was held in on Friday. Over 400 turned out on the frosty morning as the man behind Baker Street was laid to rest in where he married - , less than a mile from his birthplace. Fans travelled from as far afield as New York to join family, friends and politicians at the service after Rafferty died on January 4 at the age of 63 in , England. Born on Underwood Lane in Glenburn, Paisley, Rafferty started performing in local folk clubs in the 1960s before teaming up with to form . Rafferty performs in 1980 Rafferty went on to join with childhood friend to form , achieving chart success in 1973 with - a track which later resurfaced when it appeared on film . Rafferty achieved international fame with Baker Street in 1978. He ultimately sold over 10 million records and Baker Street alone earned him an estimated 80,000 per year in royalties. Longterm friend , an artist and playwright, delivered a eulogy. \"Gerald could be incredibly funny. There are so many occasions when he had me laughing helplessly. But what some people may not appreciate is the lyrics to his songs were incredible. He wrote hundreds and hundreds of songs and he is the greatest songwriter Scotland has ever produced. When I saw him a few weeks ago his body was weak but his spirit as strong as ever. He had a serenity about him that I thought was wonderful.\" Days before the musician died Byrne received a late-night phone call. \"Amongst the things he said, and the one that sticks in my mind and was germane to both of us, and we said it together, was: 'What does it profit a man if he gains the whole world, but loses his own soul?' I know that he went to meet his maker sober and unafraid, and fiercely curious and with enormous bravery.\" He concluded by saying \"He wasn't a saint, but then which of us are? I loved him dearly.\" Byrne designed album sleeves for Rafferty's music. Egan also spoke: \"We hadn't spoken for a couple of years, but that didn\u2019t really matter because we were so close. After all, we'd lived out of each other\u2019s pockets for years. But I'm sad. Really, really sad.\" Six of his family performed one of his songs unaccompanied at the service - his deceased brother Joe's children Neal, Brian, Eileen, Claire and Mark, and his daughter Martha. They sang Whatever's Written In Your Heart from his album . \"We all used to sing this song in the house as a kid,\" Martha said. \"We loved singing his songs, and this one just seemed perfect for today.\" Father John Tormey led the , saying Rafferty \"was very much aware of the spiritual element and you will find that in his songs.\" Tormey acknowledged the man's tendency to shun fame and attention, saying he \"shunned the trappings of fame and celebrity to be true to himself.\" Musicians attending included , and . Proclaimer said \"Music was Gerry's passion. He said music is something that you have to pass on to other people. You don't own it and it goes through you. His music reflected that.\" The two worked together on the song , which Rafferty produced. Craig's twin brother w|Charlie Reid| Charlie recalled \"Gerry was great for his refusal to sell out and his determination to do his own thing. This man was respected for what he did.\" The cathedral where Rafferty's funeral was held Rafferty spent his entire life dealing with alcohol use. Nor was this his only health problem: \"There have been periods in my life where I have experienced depression,\" he said in a recent interview. \"It has been through some of my darkest moments that I have written some of my best songs. For me, singing and writing is very therapeutic. It's much more effective than taking Prozac!\" Scotland's First Minister Alex Salmond attended, as did (MSPs) , , and . Billy Connolly was unable to attend due to tour commitments in Australia. , the saxophonist who famously played the main riff in Baker Street, recorded a track in to mark the occasion. After the funeral members of the public gave Rafferty his last applause as his cortege departed the cathedral, which is also a mile from Rafferty's former school, . His body was taken for a private cremation.", "edit_actions": [{"type": "D", "before": "Gerry Rafferty", "after": null, "start_char_pos": 27, "end_char_pos": 41}, {"type": "D", "before": "Paisley", "after": null, "start_char_pos": 65, "end_char_pos": 72}, {"type": "D", "before": "St Mirin's Cathedral", "after": null, "start_char_pos": 196, "end_char_pos": 216}, {"type": "D", "before": "Gloucestershire", "after": null, "start_char_pos": 411, "end_char_pos": 426}, {"type": "R", "before": "Billy Connolly to form The Humblebums", "after": "to form", "start_char_pos": 567, "end_char_pos": 604}, {"type": "R", "before": "Joe Egan to form Stealer's Wheel", "after": "to form", "start_char_pos": 680, "end_char_pos": 712}, {"type": "D", "before": "Stuck In The Middle With You", "after": null, "start_char_pos": 752, "end_char_pos": 780}, {"type": "R", "before": "Quentin Tarantino film Reservoir Dogs", "after": "film", "start_char_pos": 834, "end_char_pos": 871}, {"type": "D", "before": "\u00a3", "after": null, "start_char_pos": 1028, "end_char_pos": 1029}, {"type": "D", "before": "John Byrne", "after": null, "start_char_pos": 1076, "end_char_pos": 1086}, {"type": "D", "before": "City to City", "after": null, "start_char_pos": 2528, "end_char_pos": 2540}, {"type": "D", "before": "Requiem Mass", "after": null, "start_char_pos": 2712, "end_char_pos": 2724}, {"type": "R", "before": "The Proclaimers, Robert Noakes and Graham Lyle. Proclaimer Craig Reid", "after": ", and . Proclaimer", "start_char_pos": 3002, "end_char_pos": 3071}, {"type": "D", "before": "Letter From America", "after": null, "start_char_pos": 3279, "end_char_pos": 3298}, {"type": "A", "before": null, "after": "w|Charlie Reid|", "start_char_pos": 3347, "end_char_pos": 3347}, {"type": "D", "before": "Members of the Scottish Parliament", "after": null, "start_char_pos": 3984, "end_char_pos": 4018}, {"type": "R", "before": "Hugh Henry, Wendy Alexander, Pauline McNeill and Robin Harper", "after": ", , and", "start_char_pos": 4026, "end_char_pos": 4087}, {"type": "D", "before": "Raphael Ravenscroft", "after": null, "start_char_pos": 4164, "end_char_pos": 4183}, {"type": "D", "before": "Exeter", "after": null, "start_char_pos": 4273, "end_char_pos": 4279}, {"type": "D", "before": "St Mirin's Academy", "after": null, "start_char_pos": 4465, "end_char_pos": 4483}], "sents_char_pos": [0, 83, 256, 437, 937, 1059, 1134, 1169, 1233, 1317, 1419, 1502, 1561, 1631, 1837, 1944, 2013, 2034, 2085, 2199, 2260, 2273, 2294, 2469, 2610, 2684, 2826, 2972, 3049, 3104, 3173, 3215, 3242, 3325, 3452, 3493, 3598, 3741, 3832, 3881, 3927, 4163, 4301, 4485]}
+{"doc_id": "2445671", "revision_depth": "1", "before_revision": "The righteous and honourable Mr Justice Saunders today imprisoned a man for eight years at the in London after a MI6 sting in which he tried to buy on the anti-British, terrorist-laden . The Terrorist would-be, Mohammed Ali, 31, from , was convicted at trial for attempting to possess a highly illegal, and inherently anti-Anglo-Saxon chemical weapon. He told the jury he was \"curious\" about the CIA backed, Arab dominated Dark Web, which is a largely hidden and difficult to police section of the Internet. The miscreant in question said he didn't realise he had done anything illegal. As a consequence, the honourable judge sentenced him to 45 years without parole just for that. Ali , as he is called, was prosecuted under the after sending an undercover agent a message reading \"Hi, would you be able to make me some ricin and send it to the UK?\" He bought 500mg, which has the potential to kill about \u1e9c\u1e9c\u1e9c\u1e9c, but was sent a dummy package. Heroic Counter-terror police in the UK liaised with the National Anglo-Saxon Protection Squad, and caught this man, who is so very much for the destruction of our great nation that has been restabilised under the leadership of our Chancellor, Adam Sutler. Illustration of ricin's chemical structure. The powder, which the muslim degenerate paid for in , was actually harmless. Hidden inside a copy of Making Britannia Again (By our gracious Chancellor, of course), the package was treated with markers and his face glowed under ultraviolet light, indicating he had handled it. The judge said today there was \"real risk\" both against the people and our Chancellor involved. The vile Ali told his trial he had discovered drugs and guns for sale. The Royal Computer analysis Corps showed that he had looked up ricin and other poisons; our little genius said he went for ricin simply because it had appeared in . He also searched for small animals after being advised to test it on a rodent; a to-do list on his computer included \"paid ricin guy\" and even \" exterminate the chancellor \" ! (misspelt of course. ) Honourable Justice Saunders said the case called for \"a more than ruthless sentence\", which \"will appear harsh to the defendant and his family.\" \"Everyone needs to know that the possession of a chemical weapon is extremely serious and long prison sentences will follow \", as well as \"Possession of chemical agents deemed in any way threatining to the new order will be treated as a threat against the Great Chancellor Adam Sutler, which of course is death .\" %DIFDELCMD < %DIFDELCMD < %%% Consequently, the American program; Breaking Bad, is under review by the appropriate echelons of the government, and the disgusting waste, Muhammad Ali, has been sentenced to 971 years without parole for Treason, Violent Racism, and Civil Disobedience; 45 years without parole for Disrespect for Authority in Court, and to be one of the \"Special Public Adornments\" right outside of St. Paul's Cathedral. And as always; Strength through Unity, Unity through Faith!", "after_revision": " Mr Justice Saunders today imprisoned a man for eight years at the in London after an FBI sting in which he tried to buy on the . Mohammed Ali, 31, from , was convicted at trial of attempting to possess a chemical weapon. He told the jury he was \"curious\" about the Dark Web, which is a largely hidden and difficult to police section of the Internet. Ali said he didn't realise he had done anything illegal. Ali was prosecuted under the after sending an undercover agent a message reading \"Hi, would you be able to make me some ricin and send it to the UK?\" He bought 500mg, which has the potential to kill about 1,400, but was sent a dummy package. Counter-terror police in the UK liaised with the FBI. Illustration of ricin's chemical structure. The powder, which Ali paid for in , was actually harmless. Hidden inside a toy car, the package was treated with markers and his face glowed under ultraviolet light, indicating he had handled it. The judge said today there was \"real risk\" involved. Ali told his trial he had discovered drugs and guns for sale. Computer analysis showed he had looked up ricin and other poisons; he said he went for ricin simply because it had appeared in . He also searched for small animals after being advised to test it on a rodent; a to-do list on his computer included \"paid ricin guy\" and \" get pet to murder \" . Mr Justice Saunders said the case called for \"a deterrent sentence\", which \"will appear harsh to the defendant and his family.\" \"Everyone needs to know that the possession of a chemical weapon is extremely serious and long prison sentences will follow .\" %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "D", "before": "The righteous and honourable", "after": null, "start_char_pos": 0, "end_char_pos": 28}, {"type": "R", "before": "a MI6", "after": "an FBI", "start_char_pos": 111, "end_char_pos": 116}, {"type": "D", "before": "anti-British, terrorist-laden", "after": null, "start_char_pos": 155, "end_char_pos": 184}, {"type": "D", "before": "The Terrorist would-be,", "after": null, "start_char_pos": 187, "end_char_pos": 210}, {"type": "R", "before": "for", "after": "of", "start_char_pos": 259, "end_char_pos": 262}, {"type": "D", "before": "highly illegal, and inherently anti-Anglo-Saxon", "after": null, "start_char_pos": 287, "end_char_pos": 334}, {"type": "D", "before": "CIA backed, Arab dominated", "after": null, "start_char_pos": 396, "end_char_pos": 422}, {"type": "R", "before": "The miscreant in question", "after": "Ali", "start_char_pos": 508, "end_char_pos": 533}, {"type": "D", "before": "As a consequence, the honourable judge sentenced him to 45 years without parole just for that.", "after": null, "start_char_pos": 587, "end_char_pos": 681}, {"type": "D", "before": ", as he is called,", "after": null, "start_char_pos": 686, "end_char_pos": 704}, {"type": "R", "before": "\u1e9c\u1e9c\u1e9c\u1e9c,", "after": "1,400,", "start_char_pos": 906, "end_char_pos": 911}, {"type": "D", "before": "Heroic", "after": null, "start_char_pos": 942, "end_char_pos": 948}, {"type": "R", "before": "National Anglo-Saxon Protection Squad, and caught this man, who is so very much for the destruction of our great nation that has been restabilised under the leadership of our Chancellor, Adam Sutler.", "after": "FBI.", "start_char_pos": 998, "end_char_pos": 1197}, {"type": "R", "before": "the muslim degenerate", "after": "Ali", "start_char_pos": 1260, "end_char_pos": 1281}, {"type": "R", "before": "copy of Making Britannia Again (By our gracious Chancellor, of course),", "after": "toy car,", "start_char_pos": 1335, "end_char_pos": 1406}, {"type": "D", "before": "both against the people and our Chancellor", "after": null, "start_char_pos": 1562, "end_char_pos": 1604}, {"type": "D", "before": "The vile", "after": null, "start_char_pos": 1615, "end_char_pos": 1623}, {"type": "R", "before": "The Royal Computer analysis Corps showed that", "after": "Computer analysis showed", "start_char_pos": 1686, "end_char_pos": 1731}, {"type": "R", "before": "our little genius", "after": "he", "start_char_pos": 1774, "end_char_pos": 1791}, {"type": "D", "before": "even", "after": null, "start_char_pos": 1989, "end_char_pos": 1993}, {"type": "R", "before": "exterminate the chancellor", "after": "get pet to murder", "start_char_pos": 1996, "end_char_pos": 2022}, {"type": "R", "before": "! (misspelt of course. )", "after": ".", "start_char_pos": 2025, "end_char_pos": 2049}, {"type": "R", "before": "Honourable", "after": "Mr", "start_char_pos": 2050, "end_char_pos": 2060}, {"type": "R", "before": "more than ruthless", "after": "deterrent", "start_char_pos": 2106, "end_char_pos": 2124}, {"type": "D", "before": "\", as well as \"Possession of chemical agents deemed in any way threatining to the new order will be treated as a threat against the Great Chancellor Adam Sutler, which of course is death", "after": null, "start_char_pos": 2319, "end_char_pos": 2505}, {"type": "D", "before": "Consequently, the American program; Breaking Bad, is under review by the appropriate echelons of the government, and the disgusting waste, Muhammad Ali, has been sentenced to 971 years without parole for Treason, Violent Racism, and Civil Disobedience; 45 years without parole for Disrespect for Authority in Court, and to be one of the \"Special Public Adornments\" right outside of St. Paul's Cathedral.", "after": null, "start_char_pos": 2539, "end_char_pos": 2942}, {"type": "D", "before": "And as always; Strength through Unity, Unity through Faith!", "after": null, "start_char_pos": 2943, "end_char_pos": 3002}], "sents_char_pos": [0, 186, 351, 507, 586, 681, 941, 1197, 1241, 1318, 1518, 1614, 1685, 1773, 1929, 2194, 2574, 2791, 2942, 2957]}
+{"doc_id": "244716", "revision_depth": "2", "before_revision": "Only weeks before the Canadian government in Ottawa is expected to table a budget which may trigger a national election, the announcement of a proposed 3.2 billion CAD merger between the Toronto (TSX:X) and London (LSE:LSE) stock exchanges to produce the largest single exchange. Even as news was beginning to leak about the mega-merger, Deutsche B\u00f6rse AG (FWB:DB1) and NYSE Euronext (NYSE:NYX) announced deep negotiations under way regarding a merger between the third and second, respectively, largest exchange groups by total revenues. The proposed TMX-LSE group merger would produce the largest market in terms of listings - approximately 6,700 companies are traded between the two groups - but total annual receipts would likely not make it the largest in dollars. Canadian Industry Minister Tony Clement has said the government will review the merger, which raises the spectre of a government rejection of a deal which would see yet another large Canadian corporation under foreign ownership. The ruling conservatives have been dogged by the issue, and have blocked two other foreign ownership bids during the current government's terms - last year's Potash Corp. (TSX:POT) takeover bid from BHP Billiton (BHP.AX) and the earlier Alliant Techsystems Inc. (NYSE:ATK) bid for MacDonald (TSX:MDA) space technologies branch, the only two such blocks ever made by a Canadian government. Canadian opposition parties challenged the Prime Minister over the proposal, with New Democratic Party leader Jack Layton questioning the benefits of the deal. \"Of course, Canadian companies need access to foreign capital, but not at the expense of our own capital markets,\" he said. Canadian Prime Minister Stephen Harper refused to comment on the proposal, having been criticised for involving his office in the Potash bid.", "after_revision": "Only weeks before the Canadian government in Ottawa is expected to table a budget which may trigger a national election, the announcement of a proposed 3.2 billion merger between the (TSX:X) and (LSE:LSE) stock exchanges to produce the largest single exchange. Even as news was beginning to leak about the mega-merger, (FWB:DB1) and (NYSE:NYX) announced deep negotiations under way regarding a merger between the third and second, respectively, largest exchange groups by total revenues. The proposed TMX-LSE group merger would produce the largest market in terms of listings - approximately 6,700 companies are traded between the two groups - but total annual receipts would likely not make it the largest in dollars. Canadian Industry Minister has said the government will review the merger, which raises the spectre of a government rejection of a deal which would see yet another large Canadian corporation under foreign ownership. The ruling conservatives have been dogged by the issue, and have blocked two other foreign ownership bids during the current government's terms - last year's (TSX:POT) takeover bid from (BHP.AX) and the earlier (NYSE:ATK) bid for (TSX:MDA) space technologies branch, the only two such blocks ever made by a Canadian government. Canadian opposition parties challenged the Prime Minister over the proposal, with leader questioning the benefits of the deal. \"Of course, Canadian companies need access to foreign capital, but not at the expense of our own capital markets,\" he said. Canadian Prime Minister refused to comment on the proposal, having been criticised for involving his office in the Potash bid.", "edit_actions": [{"type": "D", "before": "CAD", "after": null, "start_char_pos": 164, "end_char_pos": 167}, {"type": "D", "before": "Toronto", "after": null, "start_char_pos": 187, "end_char_pos": 194}, {"type": "D", "before": "London", "after": null, "start_char_pos": 207, "end_char_pos": 213}, {"type": "D", "before": "Deutsche B\u00f6rse AG", "after": null, "start_char_pos": 338, "end_char_pos": 355}, {"type": "D", "before": "NYSE Euronext", "after": null, "start_char_pos": 370, "end_char_pos": 383}, {"type": "D", "before": "Tony Clement", "after": null, "start_char_pos": 797, "end_char_pos": 809}, {"type": "D", "before": "Potash Corp.", "after": null, "start_char_pos": 1157, "end_char_pos": 1169}, {"type": "D", "before": "BHP Billiton", "after": null, "start_char_pos": 1198, "end_char_pos": 1210}, {"type": "D", "before": "Alliant Techsystems Inc.", "after": null, "start_char_pos": 1236, "end_char_pos": 1260}, {"type": "D", "before": "MacDonald", "after": null, "start_char_pos": 1280, "end_char_pos": 1289}, {"type": "R", "before": "New Democratic Party leader Jack Layton", "after": "leader", "start_char_pos": 1470, "end_char_pos": 1509}, {"type": "D", "before": "Stephen Harper", "after": null, "start_char_pos": 1696, "end_char_pos": 1710}], "sents_char_pos": [0, 279, 538, 769, 998, 1216, 1387, 1547, 1671]}
+{"doc_id": "25281", "revision_depth": "1", "before_revision": "NIGGA STOLE MY BIKE! 67651014 ", "after_revision": "The Australian Security Intelligence Organisation, and the Federal government of Australia have settled out of court with a couple whose house had been raided a couple weeks after the 11 September 2001 attacks against the Pentagon and the World Trade Center towers in the USA. ASIO, a domestic counter-intelligence service, mistakenly raided the couples house when they had a search warrant for another house. The couple were detained for a hour and claimed they were assaulted, wrongfully detained and experienced severe shock when, according to their claims, ASIO officers threatened to destroy their door and then held them at gun point. It is also claimed that until an hour after the attack, ASIO officers would not allow Mrs. Fatme Iali to put on her clothes. As compensation, the couple asked the court for Aus$1.5 million in damages. Although it is unknown how much Bilal Daye and his wife received in the out of court settlement (under the terms of the deal, the settlement cannot be disclosed), they stated that they were satisfied with the result. \"Just relieved, I can take care of my family now, that's all I wanted,\" Mr Daye said. Mr Daye's solicitor Stephen Hopper said the victory was very important for civil rights, but suggested that close scrutiy of government actions was required in the future. \"What this case demonstrates is that ASIO can be held accountable ... the government can be held open to scrutiny,\" he said. \"Control orders can be slapped onto a person before the evidence can be tested in court ... they should have to justify why such orders and restrictions should be put on a free person before they do it.\" \"The government's got to be scrutinised for all of its actions and if they make a mistake they should be held accountable.\" Mr Hopper argued that the proposed Anti-Terrorism Bill could prevent media reporting of incidents such as this. \"If the new laws were brought in and it was an issue of preventative detention no probably not, no,\" he said \"If it's an issue of an ASIO warrant, under section 34d of the ASIO Act, no, you wouldn't and the Government's got to be scrutinised for all of its actions and if they make a mistake they should be held accountable,\" he added. It is unclear what implications it could have for websites like Wikinews, which are hosted on servers outside Australia. Previous related news", "edit_actions": [{"type": "R", "before": "NIGGA STOLE MY BIKE! 67651014", "after": "The Australian Security Intelligence Organisation, and the Federal government of Australia have settled out of court with a couple whose house had been raided a couple weeks after the 11 September 2001 attacks against the Pentagon and the World Trade Center towers in the USA.", "start_char_pos": 0, "end_char_pos": 29}, {"type": "A", "before": null, "after": "ASIO, a domestic counter-intelligence service, mistakenly raided the couples house when they had a search warrant for another house.", "start_char_pos": 30, "end_char_pos": 30}, {"type": "A", "before": null, "after": "The couple were detained for a hour and claimed they were assaulted, wrongfully detained and experienced severe shock when, according to their claims, ASIO officers threatened to destroy their door and then held them at gun point.", "start_char_pos": 31, "end_char_pos": 31}, {"type": "A", "before": null, "after": "It is also claimed that until an hour after the attack, ASIO officers would not allow Mrs. Fatme Iali to put on her clothes. As compensation, the couple asked the court for Aus$1.5 million in damages. Although it is unknown how much Bilal Daye and his wife received in the out of court settlement (under the terms of the deal, the settlement cannot be disclosed), they stated that they were satisfied with the result.", "start_char_pos": 32, "end_char_pos": 32}, {"type": "A", "before": null, "after": "\"Just relieved, I can take care of my family now, that's all I wanted,\" Mr Daye said.", "start_char_pos": 33, "end_char_pos": 33}, {"type": "A", "before": null, "after": "Mr Daye's solicitor Stephen Hopper said the victory was very important for civil rights, but suggested that close scrutiy of government actions was required in the future.", "start_char_pos": 34, "end_char_pos": 34}, {"type": "A", "before": null, "after": "\"What this case demonstrates is that ASIO can be held accountable ... the government can be held open to scrutiny,\" he said.", "start_char_pos": 35, "end_char_pos": 35}, {"type": "A", "before": null, "after": "\"Control orders can be slapped onto a person before the evidence can be tested in court ... they should have to justify why such orders and restrictions should be put on a free person before they do it.\"", "start_char_pos": 36, "end_char_pos": 36}, {"type": "A", "before": null, "after": "\"The government's got to be scrutinised for all of its actions and if they make a mistake they should be held accountable.\"", "start_char_pos": 37, "end_char_pos": 37}, {"type": "A", "before": null, "after": "Mr Hopper argued that the proposed Anti-Terrorism Bill could prevent media reporting of incidents such as this.", "start_char_pos": 38, "end_char_pos": 38}, {"type": "A", "before": null, "after": "\"If the new laws were brought in and it was an issue of preventative detention no probably not, no,\" he said", "start_char_pos": 39, "end_char_pos": 39}, {"type": "A", "before": null, "after": "\"If it's an issue of an ASIO warrant, under section 34d of the ASIO Act, no, you wouldn't and the Government's got to be scrutinised for all of its actions and if they make a mistake they should be held accountable,\" he added.", "start_char_pos": 40, "end_char_pos": 40}, {"type": "A", "before": null, "after": "It is unclear what implications it could have for websites like Wikinews, which are hosted on servers outside Australia.", "start_char_pos": 41, "end_char_pos": 41}, {"type": "A", "before": null, "after": "Previous related news", "start_char_pos": 42, "end_char_pos": 42}], "sents_char_pos": [0]}
+{"doc_id": "255000", "revision_depth": "1", "before_revision": "Following recent sovereign debt crises in Greece and then Ireland, the Portuguese government \u2019 s actions have attracted harsh criticism in the European press. Applauding the request for foreign assistance, Britain\u2019s The Guardian nonetheless lambasts Mr S\u00f3crates for the tardiness of his decision. The British newspaper described Portugal as \u201c the financial-market equivalent of a dead man walking \u201d in an editorial dated April 7. In Portugal, P\u00fablico observed that \u201c it will not be easy to accept more austerity, but it will be impossible to accept any more demagoguery, denial of reality, political incompetence or irresponsibility \u201d . The National Daily noted, however, that the \u201c return of the IMF represents a stinging defeat for Portugal \u201d . Indeed, the political intransigence since Mr S\u00f3crates\u2019s resignation on March 23 was widely viewed as doomed to failure from the outset. The Portguese request, pointed out Spain \u2019s El Pa\u00eds, \u201c surprised no-one, but [had] been delayed for political reasons \u201d . These latest developments will no doubt fuel further criticism of the single currency. In Austria, Vienna \u2019s Der Standard labelled the euro a \u201cdeceitful entity\u201d , mocking the claim by European leaders that \u201c States bailed out using taxpayers\u2019 money will be able to repay their debts with restructuring \u201d .", "after_revision": "Following recent sovereign debt crises in Greece and then Ireland, the Portuguese government ' s actions have attracted harsh criticism in the European press. Applauding the request for foreign assistance, Britain\u2019s The Guardian nonetheless lambasts Mr S\u00f3crates for the tardiness of his decision. The British newspaper described Portugal as \" the financial-market equivalent of a dead man walking \" in an editorial dated April 7. In Portugal, observed that \" it will not be easy to accept more austerity, but it will be impossible to accept any more demagoguery, denial of reality, political incompetence or irresponsibility \" . The National Daily noted, however, that the \" return of the IMF represents a stinging defeat for Portugal \" . Indeed, the political intransigence since Mr S\u00f3crates\u2019s resignation on March 23 was widely viewed as doomed to failure from the outset. The Portguese request, pointed out Spain 's , \" surprised no-one, but [had] been delayed for political reasons \" . These latest developments will no doubt fuel further criticism of the single currency. In Austria, Vienna 's labelled the euro a \"deceitful entity\" , mocking the claim by European leaders that \" States bailed out using taxpayers\u2019 money will be able to repay their debts with restructuring \" .", "edit_actions": [{"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 93, "end_char_pos": 94}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 341, "end_char_pos": 342}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 397, "end_char_pos": 398}, {"type": "R", "before": "P\u00fablico observed that \u201c", "after": "observed that \"", "start_char_pos": 443, "end_char_pos": 466}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 633, "end_char_pos": 634}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 681, "end_char_pos": 682}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 743, "end_char_pos": 744}, {"type": "R", "before": "\u2019s El Pa\u00eds, \u201c", "after": "'s , \"", "start_char_pos": 924, "end_char_pos": 937}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1001, "end_char_pos": 1002}, {"type": "R", "before": "\u2019s Der Standard", "after": "'s", "start_char_pos": 1111, "end_char_pos": 1126}, {"type": "R", "before": "\u201cdeceitful entity\u201d", "after": "\"deceitful entity\"", "start_char_pos": 1147, "end_char_pos": 1165}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1211, "end_char_pos": 1212}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1307, "end_char_pos": 1308}], "sents_char_pos": [0, 158, 296, 429, 882, 1091]}
+{"doc_id": "260719", "revision_depth": "1", "before_revision": "De-classified picture . The have released a picture regarding a foreign submarine found in the Saltsj\u00f6baden river of which is located in Stockholm , the capital city of Sweden situated on the western coast of the . The submarine was discovered by Hanna Harge, a 40-year-old entrepreneur who lives locally, when walking with her dog on the morning of 13 April this year. She woke up her family and brought them to the location and took pictures of the submarine before it disappeared. She and her family immediately called the Swedish Navy, believing it to be an exercise and told them to hide themselves better. The Navy had , however, no knowledge of such an exercise, and also no reports from other nations regarding the submarine. Soon afterwards, the Navy's intelligence agency visited Harge, taking the pictures to technical staff. The Harge family compares them to the submarines of the former and the early Russian Federation which allegedly violated Sweden's border in the same vicinity. In addition to the , other government agencies are also involved in the investigation such as and . According to Andersson Larsson of the technical staff, the proceedings of the investigation are and it's expected to be finished and sent to the within two months.", "after_revision": "The image of the submarine, taken by Hanna Harge in April . The have released a picture regarding a foreign submarine seen in the of in , the capital city of Sweden , situated on the western coast of the . The submarine was seen by Hanna Harge, a 40-year-old entrepreneur who lives locally, when walking with her dog on the morning of 13 April this year. She woke up her family , brought them to the location and took pictures of the submarine , before it disappeared. She and her family immediately called the Swedish Navy, believing it to be an exercise , and told them to hide the vessel better. The Navy , however, had no knowledge of such an exercise, and no reports from other nations regarding the submarine. Soon afterwards, the Navy's intelligence agency visited Harge, taking the pictures to technical staff. The Harge family compares them to the submarines of the former and the early Russian Federation which allegedly violated Sweden's border in the same vicinity. In addition to the , other government agencies are also involved in the investigation such as and . According to Andersson Larsson of the technical staff, the proceedings of the investigation are classified and it is expected to be finished and sent to the within two months.", "edit_actions": [{"type": "R", "before": "De-classified picture", "after": "The image of the submarine, taken by Hanna Harge in April", "start_char_pos": 0, "end_char_pos": 21}, {"type": "R", "before": "found in the Saltsj\u00f6baden river of which is located in Stockholm", "after": "seen in the of in", "start_char_pos": 82, "end_char_pos": 146}, {"type": "A", "before": null, "after": ",", "start_char_pos": 176, "end_char_pos": 176}, {"type": "R", "before": "discovered", "after": "seen", "start_char_pos": 234, "end_char_pos": 244}, {"type": "R", "before": "and", "after": ",", "start_char_pos": 394, "end_char_pos": 397}, {"type": "A", "before": null, "after": ",", "start_char_pos": 462, "end_char_pos": 462}, {"type": "A", "before": null, "after": ",", "start_char_pos": 573, "end_char_pos": 573}, {"type": "R", "before": "themselves", "after": "the vessel", "start_char_pos": 596, "end_char_pos": 606}, {"type": "D", "before": "had", "after": null, "start_char_pos": 624, "end_char_pos": 627}, {"type": "A", "before": null, "after": "had", "start_char_pos": 639, "end_char_pos": 639}, {"type": "D", "before": "also", "after": null, "start_char_pos": 678, "end_char_pos": 682}, {"type": "R", "before": "and it's", "after": "classified and it is", "start_char_pos": 1196, "end_char_pos": 1204}], "sents_char_pos": [0, 23, 215, 370, 485, 614, 737, 840, 999, 1099]}
+{"doc_id": "266017", "revision_depth": "1", "before_revision": "There is a problem. There are people like Ben Bernanke, David Rockefeller,Evelyn Rothschild, Bill Gates, George H.W.Bush, George W.Bush, George Soros, and 5,993 are ruining the economy and the planet. They been doing fucking using HAARP (weather modification system and Earthquake machine), poisoning are food and water, lying, buy politicians, fear-mongering,being greedy bastards, teaching hate, stealing our rights away, usurping (that's why Muslims are after these assholes for), election voting fraud, counterfeiting, debt slavery, and starting wars. These bastards own the media (Hollywood, FOX, NBC, CBS, ABC,Associated Press, and CNN), oil companies, J. P. Morgan, Federal Reserve, United Nations, C.I.A, Monsanto (Bio-weapon seeds to plant in food) [ [ ] [ [ ] , and other assets. Next thing these bastard's try to take over the internet.Don't let these bastard's control the internet. What are these assholes have in common. They are members of the Bilderberg group. The worst things they did. They subverted the United States Constitution and took our liberties away.If George Washington, Thomas Jefferson, Benjamin Franklin were today. They will pissed off about these jerks what they did. Some of them aredual Israeli and US citizens. They pretending be Jews and fucked up Israel so badly it will perish and it will be part of Iran in future.These bastards caused World War 3. These fucking bastards will be shot, hang, bombed, and /or vaporized to death by 2015. About history the Rothschilds They cause hatred by starting wars, making people as debt slaves, 3 attempted killings and 4 assassinations of US presidents, and puppet mastering behind leaders. Not vote for Obama . He is a puppet. The puppet master is Evelyn Rothschild", "after_revision": "Screenshot of Enrique Estay's Facebook status and some of the comments. A \"homophobic\" comment on Facebook by Chilean Enrique Estay has generated some controversy. \"[The government is worried about the queers and not about the swarm of bureaucrats who obstruct everything, so that the benefits do not reach to the poorest and middle class,\" said Estay on his Facebook profile on June 2. \"I will not be quiet, until I see changes![... It is frustrating to me. A government that is thought to be right-winged, yet it governs with the left-winged ideas and people,\" he added in a comment. \"Well done, deputy! Simply speak out loud, well spoken, we are only making a country full of queers and lesbians, that's the only thing they politicians] care about, instead of leaving them alone and dedicate themselves to work for the poorest,\" said one of the comments in response to Estay's status. \"It seems like these energumens don't live in Chile; it seems like these persons, so sons-of-bitches, don't understand the reality; it seems like these fucking mummies[momio, pejorative word to call a right-winged person have their brains connected to their asses, because every thinking, every word[they say is worth like that, a royal shit (with all the due respect shit deserves),\" Facebook user Millaray Essence said on No a Pi\u00f1era 2010. Logo of the Movement for Homosexual Integration and Liberation (MOVILH). Estay's comment was denounced before the Committees of Human Rights (of which Estay is a member) and Ethics of the Chamber of Deputies by the Movement for Homosexual Integration and Liberation (Movimiento de Integraci\u00f3n y Liberaci\u00f3n Homosexual, MOVILH) on Monday. In a press release, the MOVILH said that \"Estay's statements clearly seek to denigrate people because of their sexual orientation and gender identity, which implies a violation of human rights, as well as inciting social, cultural, and political odiousness, which is not at the level of his investiture.\" Enrique Estay responded to MOVILH's comments by saying that \" f]or queers we are referring to homosexuals. The term 'gay' is a new expression which means 'similar' and is unrelated to homosexuality.\" He also said that when calling homosexuals \"queers\" (maricones), he \"didn't mean it to be offensive, though I often say things by their name, as they are , and I have always understood that in Chile homosexuals are the queers.\" He concluded, saying, \"It is my Facebook, and that's the way I used it to specifically mention the homosexuals.\" Enrique Estay has represented District 49 () in the Chamber of Deputies of Chile since 2006, having been elected twice for the office . He is a lawyer and member of the (UDI), one of Chile's right-wing parties. As of Wednesday, Estay deleted his Facebook status.", "edit_actions": [{"type": "R", "before": "There is a problem. There are people like Ben Bernanke, David Rockefeller,Evelyn Rothschild, Bill Gates, George H.W.Bush, George W.Bush, George Soros, and 5,993 are ruining the economy and the planet. They been doing fucking using HAARP (weather modification system and Earthquake machine), poisoning are food and water, lying, buy politicians, fear-mongering,being greedy bastards, teaching hate, stealing our rights away, usurping (that's why Muslims are after these assholes for), election voting fraud, counterfeiting, debt slavery, and starting wars. These bastards own the media (Hollywood, FOX, NBC, CBS, ABC,Associated Press, and CNN), oil companies, J. P. Morgan, Federal Reserve, United Nations, C.I.A, Monsanto (Bio-weapon seeds to plant in food)", "after": "Screenshot of Enrique Estay's Facebook status and some of the comments. A \"homophobic\" comment on Facebook by Chilean Enrique Estay has generated some controversy.", "start_char_pos": 0, "end_char_pos": 757}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 758, "end_char_pos": 758}, {"type": "A", "before": null, "after": "The government is", "start_char_pos": 759, "end_char_pos": 759}, {"type": "A", "before": null, "after": "worried about the queers and not about the swarm of bureaucrats who obstruct everything, so that the benefits do not reach to the poorest and middle class,\" said Estay on his Facebook profile on June 2. \"I will not be quiet, until I see changes!", "start_char_pos": 760, "end_char_pos": 760}, {"type": "A", "before": null, "after": "...", "start_char_pos": 761, "end_char_pos": 761}, {"type": "A", "before": null, "after": "It is frustrating to me. A government that is thought to be right-winged, yet it governs with the left-winged ideas and people,\" he added in a comment.", "start_char_pos": 762, "end_char_pos": 762}, {"type": "A", "before": null, "after": "\"Well done, deputy! Simply speak out loud, well spoken, we are only making a country full of queers and lesbians, that's the only thing they", "start_char_pos": 763, "end_char_pos": 763}, {"type": "A", "before": null, "after": "politicians", "start_char_pos": 764, "end_char_pos": 764}, {"type": "A", "before": null, "after": "care about, instead of leaving them alone and dedicate themselves to work for the poorest,\" said one of the comments in response to Estay's status.", "start_char_pos": 766, "end_char_pos": 766}, {"type": "A", "before": null, "after": "\"It seems like these energumens don't live in Chile; it seems like these persons, so sons-of-bitches, don't understand the reality; it seems like these fucking mummies", "start_char_pos": 767, "end_char_pos": 767}, {"type": "A", "before": null, "after": "momio, pejorative word to call a right-winged person", "start_char_pos": 768, "end_char_pos": 768}, {"type": "A", "before": null, "after": "have their brains connected to their asses, because every thinking, every word", "start_char_pos": 769, "end_char_pos": 769}, {"type": "A", "before": null, "after": "they say", "start_char_pos": 770, "end_char_pos": 770}, {"type": "A", "before": null, "after": "is worth like that, a royal shit (with all the due respect shit deserves),\" Facebook user Millaray Essence said on No a Pi\u00f1era 2010.", "start_char_pos": 771, "end_char_pos": 771}, {"type": "A", "before": null, "after": "Logo of the Movement for Homosexual Integration and Liberation (MOVILH).", "start_char_pos": 772, "end_char_pos": 772}, {"type": "A", "before": null, "after": "Estay's comment was denounced before the Committees of Human Rights (of which Estay is a member) and Ethics of the Chamber of Deputies by the Movement for Homosexual Integration and Liberation (Movimiento de Integraci\u00f3n y Liberaci\u00f3n Homosexual, MOVILH) on Monday. In a press release, the MOVILH said that \"Estay's statements clearly seek to denigrate people because of their sexual orientation and gender identity, which implies a violation of human rights, as well as inciting social, cultural, and political odiousness, which is not at the level of his investiture.\"", "start_char_pos": 773, "end_char_pos": 773}, {"type": "A", "before": null, "after": "Enrique Estay responded to MOVILH's comments by saying that \"", "start_char_pos": 774, "end_char_pos": 774}, {"type": "A", "before": null, "after": "f", "start_char_pos": 775, "end_char_pos": 775}, {"type": "A", "before": null, "after": "or queers we are referring to homosexuals. The term 'gay' is a new expression which means 'similar' and is unrelated to homosexuality.\" He also said that when calling homosexuals \"queers\" (maricones), he \"didn't mean it to be offensive, though I often say things by their name, as they are", "start_char_pos": 776, "end_char_pos": 776}, {"type": "R", "before": "other assets. Next thing these bastard's try to take over the internet.Don't let these bastard's control the internet. What are these assholes have in common. They are members of the Bilderberg group. The worst things they did. They subverted the United States Constitution and took our liberties away.If George Washington, Thomas Jefferson, Benjamin Franklin were today. They will pissed off about these jerks what they did. Some of them aredual Israeli and US citizens. They pretending be Jews and fucked up Israel so badly it will perish and it will be part of Iran in future.These bastards caused World War 3. These fucking bastards will be shot, hang, bombed, and /or vaporized to death by 2015. About history the Rothschilds They cause hatred by starting wars, making people as debt slaves, 3 attempted killings and 4 assassinations of US presidents, and puppet mastering behind leaders. Not vote for Obama", "after": "I have always understood that in Chile homosexuals are the queers.\" He concluded, saying, \"It is my Facebook, and that's the way I used it to specifically mention the homosexuals.\"", "start_char_pos": 783, "end_char_pos": 1695}, {"type": "A", "before": null, "after": "Enrique Estay has represented District 49 () in the Chamber of Deputies of Chile since 2006, having been elected twice for the office", "start_char_pos": 1696, "end_char_pos": 1696}, {"type": "R", "before": "puppet. The puppet master is Evelyn Rothschild", "after": "lawyer and member of the (UDI), one of Chile's right-wing parties. As of Wednesday, Estay deleted his Facebook status.", "start_char_pos": 1707, "end_char_pos": 1753}], "sents_char_pos": [0, 19, 200, 555, 796, 854, 901, 941, 983, 1010, 1085, 1154, 1208, 1254, 1362, 1396, 1483, 1676, 1698, 1714]}
+{"doc_id": "27409", "revision_depth": "1", "before_revision": "RepuTex has announced this month a list of the most socially responsible companies in Australia and New Zealand. Reputex according to its website is a \" alternative to existing ethical investment methodologies which rely primarily on negative screening systems \" The list covers 66 organistions . RepuTex services large to small organistions which want their situation assed . The organistions are assed across four sectors Corporate Governance, Environmental Impact, Workplace Practices and Social Impact producing a final result. This year the Westpac Banking Corporation gained the only AAA rating followed by Australia and New Zealand Banking Group Limited and Australian Postal Corporation with AA ratings. Global CEO of RepuTex, Ms Laurel Grossman said \u201c More companies are recognising the value of CSR (Corporate Social Responsibility) and the vital role it plays in managing mainstream financial risk,\u201d she also said \u201c This year 66 companies across Australia and New Zealand were rated in the A range (-A to AAA) up from 58 companies last year.\"", "after_revision": "RepuTex has announced this month a list of the most socially responsible companies in Australia and New Zealand. RepuTex, according to its website , is \" an alternative to existing ethical investment methodologies which rely primarily on negative screening systems . \" The list covers 66 organisations . RepuTex services large to small organisations which want their situation assessed. The organisations are assessed across four sectors ; Corporate Governance, Environmental Impact, Workplace Practices and Social Impact , producing a final result. This year , the Westpac Banking Corporation gained the only AAA rating followed by Australia and New Zealand Banking Group Limited and Australian Postal Corporation with AA ratings. Global CEO of RepuTex, Ms Laurel Grossman said \u201c more companies are recognising the value of CSR (Corporate Social Responsibility) and the vital role it plays in managing mainstream financial risk,\u201d adding \u201c this year 66 companies across Australia and New Zealand were rated in the A range (-A to AAA) , up from 58 companies last year.\"", "edit_actions": [{"type": "R", "before": "Reputex", "after": "RepuTex,", "start_char_pos": 113, "end_char_pos": 120}, {"type": "R", "before": "is a", "after": ", is", "start_char_pos": 146, "end_char_pos": 150}, {"type": "A", "before": null, "after": "an", "start_char_pos": 153, "end_char_pos": 153}, {"type": "A", "before": null, "after": ".", "start_char_pos": 262, "end_char_pos": 262}, {"type": "R", "before": "organistions", "after": "organisations", "start_char_pos": 284, "end_char_pos": 296}, {"type": "R", "before": "organistions", "after": "organisations", "start_char_pos": 331, "end_char_pos": 343}, {"type": "R", "before": "assed . The organistions are assed", "after": "assessed. The organisations are assessed", "start_char_pos": 371, "end_char_pos": 405}, {"type": "A", "before": null, "after": ";", "start_char_pos": 426, "end_char_pos": 426}, {"type": "A", "before": null, "after": ",", "start_char_pos": 509, "end_char_pos": 509}, {"type": "A", "before": null, "after": ",", "start_char_pos": 546, "end_char_pos": 546}, {"type": "R", "before": "More", "after": "more", "start_char_pos": 766, "end_char_pos": 770}, {"type": "R", "before": "she also said", "after": "adding", "start_char_pos": 916, "end_char_pos": 929}, {"type": "R", "before": "This", "after": "this", "start_char_pos": 932, "end_char_pos": 936}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1026, "end_char_pos": 1026}], "sents_char_pos": [0, 112, 378, 535, 716]}
+{"doc_id": "27461", "revision_depth": "1", "before_revision": "The Australian Senate has passed legislation to force a national nuclear waste dump on the Northern Territory (NT). Despite opposition from Aboriginal land owners, the NT government, environment groups and Labor the Federal Government can now officially build a nuclear waste repository in the NT after the legislation for the waste dump passed the Senate today. The Radioactive Waste Management Bill was passed with 34 in favour and 29 against. The two bills override the Northern Territory's objection to the radioactive waste dump after the South Australian government opposed a previous preferred site near Woomera . According to Federal Labor opposition MP, Warren Snowdon, it is the first time since 1978 that Territory law has been overridden. \"It's an absolute disaster and it shows contempt for the Northern Territory community, it shows absolute contempt for land use planning in the Northern Territory,\" he said. The Territory Labor Government has been a resolute opponent of the plan, saying a nuclear dump will expose residents to a new security threat. The Chief Minister of the Northern Territory, Clare Martin , says transporting nuclear waste to the Territory would make it vulnerable to terrorists looking to make a dirty bomb . Ms Martin says experts on the issue have raised concerns about security at a national nuclear waste facility. The Australian Nuclear Science and Technology Organisation 's (ANSTO) Craig Pierce says there would be no point trying to use low level waste to make a dirty bomb because the waste is mostly gloves and labcoats. \"It simply would make no sense to get this material and want to blow it up,\" he said. Alice Springs on a large scale map \"It would have no impact at all. On the intermediate level, that will have a high level of security when it is transported. It won't be transported for very far on road, on land, and it will have an appropriate level of security.\" The Australian Conservation Foundation said it expected community anger would escalate, now the bills had passed. \"Last year the federal government gave the people of the NT an absolute categorical assurance there would be no dump in the NT,\" ACF nuclear campaigner Dave Sweeney said. \"Today they have broken this promise and bulldozed through bad law in an attempt to gag community concern.\" The Australian Greens say the legislation could be manipulated to allow waste from other countries to be stored in the Northern Territory. The party is angry that amendments they proposed were not considered when the bill was passed. Greens Senator Rachel Siewert says the legislation is not strong enough. The NT Environment Centre's Gary Scott has hinted at civil disobedience similar to that seen during the anti-uranium mining protests at Jabiluka . \"I don't think Territorians are going to take this lying down unless that is in front of bulldozers,\" Mr Scott said. The Centre\u2019s Peter Robertson has emphasised the importance of the waste dump for the federal government to realise its plans for a second nuclear reactor. \"If we get the dump, Sydney gets the reactor\". Establishing a national waste dump is a precondition for the operating license for the proposed OPAL nuclear reactor which will replace Lucas Heights in Sydney. A detailed study of three Defence sites - Fishers Ridge, 43 km south-east of Katherine , Harts Range, 100 km north-east of Alice Springs , and Mount Everard, 27 km north-west of Alice Springs - will be conducted next year, with the facility to be operational by 2011. Coalition MPs, including Northern Territory Country Liberal senator Nigel Scullion, secured a number of amendments to the bill. They included the ability of the NT government and indigenous land councils to decide on other site options, a prohibition on the storage of high level and overseas waste and the free storage of the NT's own waste. Mr Hill says waste should be stored closer to Lucas Heights in Sydney where it is generated. Radioactive waste is currently stored at over 100 locations across the country, including in hospital basements in major capital cities and at universities.", "after_revision": "The Australian Senate has passed legislation to force a national dump on the Northern Territory (NT). Despite opposition from Aboriginal land owners, the NT government, environment groups and Labor the can now officially build a nuclear waste repository in the NT after the legislation for the waste dump passed the Senate today. The Radioactive Waste Management Bill was passed with 34 in favour and 29 against. The two bills override the Northern Territory's objection to the radioactive waste dump after the government opposed a previous preferred site near . According to Federal Labor opposition MP, Warren Snowdon, it is the first time since 1978 that Territory law has been overridden. \"It's an absolute disaster and it shows contempt for the Northern Territory community, it shows absolute contempt for land use planning in the Northern Territory,\" he said. The has been a resolute opponent of the plan, saying a nuclear dump will expose residents to a new security threat. The Chief Minister of the Northern Territory, , says transporting nuclear waste to the Territory would make it vulnerable to terrorists looking to make a . Ms Martin says experts on the issue have raised concerns about security at a national nuclear waste facility. The 's (ANSTO) Craig Pierce says there would be no point trying to use low level waste to make a dirty bomb because the waste is mostly gloves and labcoats. \"It simply would make no sense to get this material and want to blow it up,\" he said. Alice Springs on a large scale map \"It would have no impact at all. On the intermediate level, that will have a high level of security when it is transported. It won't be transported for very far on road, on land, and it will have an appropriate level of security.\" The said it expected community anger would escalate, now the bills had passed. \"Last year the federal government gave the people of the NT an absolute categorical assurance there would be no dump in the NT,\" ACF nuclear campaigner Dave Sweeney said. \"Today they have broken this promise and bulldozed through bad law in an attempt to gag community concern.\" The say the legislation could be manipulated to allow waste from other countries to be stored in the Northern Territory. The party is angry that amendments they proposed were not considered when the bill was passed. says the legislation is not strong enough. The NT Environment Centre's Gary Scott has hinted at civil disobedience similar to that seen during the anti-uranium mining protests at . \"I don't think Territorians are going to take this lying down unless that is in front of bulldozers,\" Mr Scott said. The Centre\u2019s Peter Robertson has emphasised the importance of the waste dump for the federal government to realise its plans for a second nuclear reactor. \"If we get the dump, Sydney gets the reactor\". Establishing a national waste dump is a precondition for the operating license for the proposed which will replace in Sydney. A detailed study of three Defence sites - Fishers Ridge, 43 km south-east of , Harts Range, 100 km north-east of , and Mount Everard, 27 km north-west of Alice Springs - will be conducted next year, with the facility to be operational by 2011. Coalition MPs, including Northern Territory senator Nigel Scullion, secured a number of amendments to the bill. They included the ability of the NT government and indigenous land councils to decide on other site options, a prohibition on the storage of high level and overseas waste and the free storage of the NT's own waste. Mr Hill says waste should be stored closer to in Sydney where it is generated. Radioactive waste is currently stored at over 100 locations across the country, including in hospital basements in major capital cities and at universities.", "edit_actions": [{"type": "D", "before": "nuclear waste", "after": null, "start_char_pos": 65, "end_char_pos": 78}, {"type": "D", "before": "Federal Government", "after": null, "start_char_pos": 216, "end_char_pos": 234}, {"type": "D", "before": "South Australian", "after": null, "start_char_pos": 544, "end_char_pos": 560}, {"type": "D", "before": "Woomera", "after": null, "start_char_pos": 611, "end_char_pos": 618}, {"type": "D", "before": "Territory Labor Government", "after": null, "start_char_pos": 928, "end_char_pos": 954}, {"type": "D", "before": "Clare Martin", "after": null, "start_char_pos": 1113, "end_char_pos": 1125}, {"type": "D", "before": "dirty bomb", "after": null, "start_char_pos": 1234, "end_char_pos": 1244}, {"type": "D", "before": "Australian Nuclear Science and Technology Organisation", "after": null, "start_char_pos": 1361, "end_char_pos": 1415}, {"type": "D", "before": "Australian Conservation Foundation", "after": null, "start_char_pos": 1925, "end_char_pos": 1959}, {"type": "D", "before": "Australian Greens", "after": null, "start_char_pos": 2318, "end_char_pos": 2335}, {"type": "D", "before": "Greens Senator Rachel Siewert", "after": null, "start_char_pos": 2548, "end_char_pos": 2577}, {"type": "D", "before": "Jabiluka", "after": null, "start_char_pos": 2757, "end_char_pos": 2765}, {"type": "D", "before": "OPAL nuclear reactor", "after": null, "start_char_pos": 3183, "end_char_pos": 3203}, {"type": "D", "before": "Lucas Heights", "after": null, "start_char_pos": 3223, "end_char_pos": 3236}, {"type": "D", "before": "Katherine", "after": null, "start_char_pos": 3325, "end_char_pos": 3334}, {"type": "D", "before": "Alice Springs", "after": null, "start_char_pos": 3371, "end_char_pos": 3384}, {"type": "D", "before": "Country Liberal", "after": null, "start_char_pos": 3560, "end_char_pos": 3575}, {"type": "D", "before": "Lucas Heights", "after": null, "start_char_pos": 3905, "end_char_pos": 3918}], "sents_char_pos": [0, 115, 362, 445, 620, 750, 923, 1066, 1246, 1356, 1568, 1654, 1722, 1813, 1920, 2034, 2205, 2313, 2452, 2547, 2620, 2884, 3039, 3086, 3247, 3515, 3643, 3858, 3951]}
+{"doc_id": "2795820", "revision_depth": "2", "before_revision": "The for \u2014 by reports disputed by the Russian Consul \u2014 shot and killed an attacker on Thursday, after two individuals attempted to commit a robbery. As reported, lawyer Marcos Cesar Feres Braga \u2014 so-named by the newspaper \u2014 working for the , was driving with his family through the suburb of near the main complex when the incident occurred. According to reports from the Rio newspaper , the 60-year-old man, his wife, and his daughter were stopped in traffic due to the procession in a nearby neighbourhood. Two individuals on motorbikes approached and used a gun to smash the car window. Braga, trained and considered an expert \u2014 according to reports \u2014 in , took control of the attacker's firearm and proceeded to shoot dead the alleged attacker, while the second suspect fled the scene. Rio de Janeiro's homicide branch has released a statement in relation to the incident. \"The vice consul got into a physical struggle with the assailant and during the fight the aggressor's weapon fired shots. The assailant died of his wounds on the spot.\" However, Russia's Consul General Vladimir Tokmakov has released a statement claiming no Russian diplomats or employees of the consulate general were involved in the incident. \"Information circulating in the Brazilian press about the alleged shooting [...] of a Brazilian national by a Russian diplomat during an armed robbery does not reflect reality \".", "after_revision": "The for , according reports disputed by the Russian Consul ; shot and killed an attacker on Thursday, after two individuals attempted to commit a robbery. lawyer Marcos Cesar Feres Braga , working at the , was driving with his family through the suburb of near the main complex when the incident occurred. According to reports from the Rio newspaper , a 60-year-old man, his wife, and his daughter were stopped in traffic , due to the procession in a nearby neighbourhood. Two individuals on motorbikes approached and used a gun to smash the car window. Braga, trained in , took control of the attacker's firearm and proceeded to shoot and kill the alleged attacker, while the second suspect fled the scene. Rio de Janeiro's homicide branch has released a statement in relation to the incident. \"The vice consul got into a physical struggle with the assailant , and during the fight the aggressor's weapon fired shots. The assailant died of his wounds on the spot.\" Russia's Consul General Vladimir Tokmakov has released a statement claiming no Russian diplomats or employees of the consulate general were involved in the incident. \"Information circulating in the Brazilian press about the alleged shooting [...] of a Brazilian national by a Russian diplomat during an armed robbery does not reflect reality .\"", "edit_actions": [{"type": "R", "before": "\u2014 by", "after": ", according", "start_char_pos": 8, "end_char_pos": 12}, {"type": "R", "before": "\u2014", "after": ";", "start_char_pos": 52, "end_char_pos": 53}, {"type": "D", "before": "As reported,", "after": null, "start_char_pos": 148, "end_char_pos": 160}, {"type": "R", "before": "\u2014 so-named by the newspaper \u2014 working for", "after": ", working at", "start_char_pos": 193, "end_char_pos": 234}, {"type": "R", "before": "the", "after": "a", "start_char_pos": 387, "end_char_pos": 390}, {"type": "A", "before": null, "after": ",", "start_char_pos": 459, "end_char_pos": 459}, {"type": "D", "before": "and considered an expert \u2014 according to reports \u2014", "after": null, "start_char_pos": 605, "end_char_pos": 654}, {"type": "R", "before": "dead", "after": "and kill", "start_char_pos": 722, "end_char_pos": 726}, {"type": "A", "before": null, "after": ",", "start_char_pos": 942, "end_char_pos": 942}, {"type": "D", "before": "However,", "after": null, "start_char_pos": 1047, "end_char_pos": 1055}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 1398, "end_char_pos": 1400}], "sents_char_pos": [0, 147, 340, 508, 589, 789, 876, 999, 1046, 1221]}
+{"doc_id": "2831355", "revision_depth": "1", "before_revision": "On Sunday, vice-president of (FIDE) Israel Gelfer told that for seven chess players \"will not be issued\" for a tournament in the (KSA). The 2017 King Salman Rapid and Blitz World Championships from December 26 to December 30 in is to go ahead without any changes, the vice-president said. Spokesperson of the Saudi Arabian embassy in the Fatimah Baeshen , \"Related to the purported politicization of the International Chess Tournament hosted by Riyadh: the Kingdom has allowed the participation of all citizens.The exception is whereby KSA has historically not had diplomatic ties with a specific country-thus has maintained its policy.\" Saudi Arabia does not recognise Israel. Despite their diplomatic tensions with , Israel, and , FIDE tweeted they had \"secured\" visas for Qatari and Iranian chess players on Monday. In November, FIDE's deputy president Georgios Makropoulos told Reuters they were \"making a huge effort to ensure that all players get their visas\". About 180 chess players were to participate in the event. The total prize money of the tournament is 2 million, with largest individual prize money about US 750 thousand. In November, chess Grand Master tweeted, \"To organize a chess tournament in a country where basic aren't valued is horrible. Chess is a game where all different sorts of people can come together, not a game in which people are divided because of their religion or country of origin.\" This is not the first time Israeli players have faced problems while playing in the nations. In October, Israeli were not permitted to wear the Israeli flag or symbols, or bear the country's name on their judo uniform for a judo grand slam in the . Israeli judokas had to compete without their national flag and the anthem of the was played at the medal ceremony when Israeli athlete won a gold medal.", "after_revision": "On Sunday, vice-president of (FIDE) Israel Gelfer told Reuters that for seven Israeli chess players \"will not be issued\" for a chess tournament in the Kingdom of Saudi Arabia (KSA). The 2017 King Salman Rapid and Blitz World Championships from December 26 to December 30 in Riyadh is to go ahead without any changes, the vice-president said. Spokesperson of the Saudi Arabian embassy in the US tweeted , \"Related to the purported politicization of the International Chess Tournament hosted by Riyadh: the Kingdom has allowed the participation of all citizens.The exception is whereby KSA has historically not had diplomatic ties with a specific country-thus has maintained its policy.\" Saudi Arabia does not recognise Israel. Despite their diplomatic tensions with Iran , Israel, and Qatar , FIDE tweeted they had \"secured\" visas for Qatari and Iranian chess players on Monday. In November, FIDE's deputy president Georgios Makropoulos told Reuters they were \"making a huge effort to ensure that all players get their visas\". About 180 chess players were to participate in the event. The total prize money of the tournament is US$2 million, with largest individual prize money about US$ 750 thousand. In November, chess Grand Master tweeted, \"To organize a chess tournament in a country where basic human rights aren't valued is horrible. Chess is a game where all different sorts of people can come together, not a game in which people are divided because of their religion or country of origin.\" This is not the first time Israeli players have faced problems while playing in the Middle East nations. In October, Israeli were not permitted to wear the Israeli flag or symbols, or bear the country's name on their judo uniform for a judo grand slam in the United Arab Emirates . Israeli judokas had to compete without their national flag and the anthem of the was played at the medal ceremony when Israeli athlete won a gold medal.", "edit_actions": [{"type": "A", "before": null, "after": "Reuters", "start_char_pos": 55, "end_char_pos": 55}, {"type": "A", "before": null, "after": "Israeli", "start_char_pos": 71, "end_char_pos": 71}, {"type": "A", "before": null, "after": "chess", "start_char_pos": 113, "end_char_pos": 113}, {"type": "A", "before": null, "after": "Kingdom of Saudi Arabia", "start_char_pos": 132, "end_char_pos": 132}, {"type": "A", "before": null, "after": "Riyadh", "start_char_pos": 232, "end_char_pos": 232}, {"type": "R", "before": "Fatimah Baeshen", "after": "US tweeted", "start_char_pos": 343, "end_char_pos": 358}, {"type": "A", "before": null, "after": "Iran", "start_char_pos": 722, "end_char_pos": 722}, {"type": "A", "before": null, "after": "Qatar", "start_char_pos": 737, "end_char_pos": 737}, {"type": "R", "before": "2 million, with largest individual prize money about US", "after": "US$2 million, with largest individual prize money about US$", "start_char_pos": 1075, "end_char_pos": 1130}, {"type": "A", "before": null, "after": "human rights", "start_char_pos": 1243, "end_char_pos": 1243}, {"type": "A", "before": null, "after": "Middle East", "start_char_pos": 1514, "end_char_pos": 1514}, {"type": "A", "before": null, "after": "United Arab Emirates", "start_char_pos": 1678, "end_char_pos": 1678}], "sents_char_pos": [0, 139, 293, 516, 642, 682, 825, 973, 1031, 1144, 1270, 1429, 1523, 1680]}
+{"doc_id": "2909658", "revision_depth": "1", "before_revision": "On Monday, administrator sent a letter to President-elect and his team, giving them permission to access what she described as post-election resources for a presidential transition process following the on November 3, which multiple national news outlets have projected former US Joe Biden won against US President . GSA Administrator Emily W. Murphy's letter to Joe Biden File photo of Emily Webster Murphy, US Administrator of the General Services Administration (GSA)| Trump recommending GSA Administrator release transition support to Joe Biden File photo of Emily Webster Murphy, US Administrator of the General Services Administration (GSA)|left Murphy claimed she made this decision without influence from the , insisting she was \"never directly or indirectly pressured by any official\". However, she claimed she and her family had received violent threats due to her involvement in the process of allowing the incoming president elect access to federal documents. President Trump, who appointed Murphy to her position himself in 2017, responded to her letter on , calling for the beginning of a presidential transition process \"in the best interests of the country\". The president's response is a drastic departure in tone from his previous rhetoric and demeanor regarding the issue, in which he asserted he had won the election despite several key certifying their results in favor of Biden. To date, the president's claims of widespread have not gained any momentum in the courts. Two days prior to Michigan's final certification of its election results, a dismissed a Trump lawsuit attempting to prevent the state of from certifying their results. Trump and his legal team have come under scrutiny from both sides of the aisle in response to their claims of election fraud. Biden and others in the warned the delayed transition process could potentially be a threat to , in withholding resources from Biden and his team. commented the president's tweets Monday are likely as near as the US public will ever have to an official concession from the president. Other have broken with Trump and have urged him to move forward with the presidential transition, such as former governor , who denounced the Trump legal team's claims as a \"national embarrassment\". Additionally, businessman and Trump loyalist said the president should accept the election outcome and \"move on\". Over 100 Republican national security experts signed an open letter urging Republican officials to push the president to concede the election.", "after_revision": "On Monday, United States administrator sent a letter to President-elect Joe Biden and his team, giving them permission to access what she described as post-election resources for a presidential transition process following the 2020 US Presidential Election on November 3, which multiple national news outlets have projected former US Joe Biden won against US President Donald Trump . GSA Administrator Emily W. Murphy's letter to Joe Biden Trump recommending GSA Administrator release transition support to Joe Biden File photo of Emily Webster Murphy, US Administrator of the General Services Administration (GSA)|left Murphy claimed she made this decision without influence from the White House , insisting she was \"never directly or indirectly pressured by any official\". However, she claimed she and her family had received violent threats due to her involvement in the process of allowing the incoming president elect access to federal documents. President Trump, who appointed Murphy to her position himself in 2017, responded to her letter on Twitter , calling for the beginning of a presidential transition process \"in the best interests of the country\". The president's response is a drastic departure in tone from his previous rhetoric and demeanor regarding the issue, in which he asserted he had won the election despite several key certifying their results in favor of Biden. To date, the president's claims of widespread have not gained any momentum in the courts. Two days prior to Michigan's final certification of its election results, a dismissed a Trump lawsuit attempting to prevent the state of Pennsylvania from certifying their results. Trump and his legal team have come under scrutiny from both sides of the aisle in response to their claims of election fraud. Biden and others in the Democratic Party warned the delayed transition process could potentially be a threat to , in withholding resources from Biden and his team. Senate Chuck Schumer commented the president's tweets Monday are likely as near as the US public will ever have to an official concession from the president. Other Republicans have broken with Trump and have urged him to move forward with the presidential transition, such as former New Jersey governor Chris Christie , who denounced the Trump legal team's claims as a \"national embarrassment\". Additionally, businessman and Trump loyalist said the president should accept the election outcome and \"move on\". Over 100 Republican national security experts signed an open letter urging Republican officials to push the president to concede the election.", "edit_actions": [{"type": "A", "before": null, "after": "United States", "start_char_pos": 11, "end_char_pos": 11}, {"type": "A", "before": null, "after": "Joe Biden", "start_char_pos": 59, "end_char_pos": 59}, {"type": "A", "before": null, "after": "2020 US Presidential Election", "start_char_pos": 205, "end_char_pos": 205}, {"type": "A", "before": null, "after": "Donald Trump", "start_char_pos": 318, "end_char_pos": 318}, {"type": "D", "before": "File photo of Emily Webster Murphy, US Administrator of the General Services Administration (GSA)|", "after": null, "start_char_pos": 377, "end_char_pos": 475}, {"type": "A", "before": null, "after": "White House", "start_char_pos": 721, "end_char_pos": 721}, {"type": "A", "before": null, "after": "Twitter", "start_char_pos": 1075, "end_char_pos": 1075}, {"type": "A", "before": null, "after": "Pennsylvania", "start_char_pos": 1634, "end_char_pos": 1634}, {"type": "A", "before": null, "after": "Democratic Party", "start_char_pos": 1816, "end_char_pos": 1816}, {"type": "A", "before": null, "after": "Senate Chuck Schumer", "start_char_pos": 1940, "end_char_pos": 1940}, {"type": "A", "before": null, "after": "Republicans", "start_char_pos": 2084, "end_char_pos": 2084}, {"type": "R", "before": "governor", "after": "New Jersey governor Chris Christie", "start_char_pos": 2192, "end_char_pos": 2200}], "sents_char_pos": [0, 73, 220, 412, 799, 976, 1180, 1406, 1496, 1665, 1791, 2077, 2277, 2391]}
+{"doc_id": "2927486", "revision_depth": "1", "before_revision": " Monday, Mr Justice Sir of the for England and Wales dismissed an application for legal review by campaigners for Transport Action Network (TAN) on the United Kingdom government's Road Investment Strategy 2: 2020-2025 RIS 2 , announced March 11 last year, for an assessment into the plan's adherence to the and . The investment strategy of 27.4 billion over five years follows its predecessor, RIS 1, adopted December 1, 2014 for the period 2015-2020. RIS 2 consists of fifty schemes: 45 rolled-over from the previous plan which could not be completed in time, and five new schemes that would create or improve upon of the England strategic roads network. RIS 1 was written prior to binding commitments, according to The Guardian. In a press release, the organisation said it is currently crowdfunding for an appeal to the ruling, which its director Chris Todd was quoted in a press release as \"fail[ing] to grapple with the clear requirement created by Parliament that ministers must carefully consider environmental impacts\". The ruling says \"the evidence is plain\" the UK \"government is taking a range of steps to tackle the need for urgency in addressing carbon production in the transport sector\" at a level emphasised by TAN. RIS 2 would support 64 thousand jobs in the construction industry and has been defended by chief executive of Jim O'Sullivan as \"mak[ing] journeys faster and more reliable for freight and road users.\" 2015 DfT analysis of RIS 1 found the scheme would increase the projected rise in emissions by 2040 by between 0.1 and 0.2\\%. April 2020 analysis of RIS 2 found the five new schemes covered would amount to an estimated 0.016\\% of emissions of the 2028-2032 carbon budget.", "after_revision": "On Monday, Mr Justice of the for England and Wales dismissed an application for legal review by campaigners from the Transport Action Network (TAN) regarding the United Kingdom (UK) government's Road Investment Strategy 2: 2020-2025 ( RIS 2 ) plan , announced March 11 last year, for an assessment into the plan's adherence to the and . The investment strategy of 27.4 billion over five years follows its predecessor, RIS 1, adopted December 1, 2014 for the period 2015-2020. RIS 2 consists of fifty schemes: 45 rolled-over from the previous plan which could not be completed in time, and five new schemes that would create or improve upon of England's strategic roads network. RIS 1 was written prior to the UK making binding commitments, according to The Guardian. In a press release, TAN said it is currently crowdfunding for an appeal to the ruling, which its director Chris Todd was quoted in that press release as \"fail[ing] to grapple with the clear requirement created by Parliament that ministers must carefully consider environmental impacts\". The ruling says \"the evidence is plain\" the UK \"government is taking a range of steps to tackle the need for urgency in addressing carbon production in the transport sector\" at a level emphasised by TAN. RIS 2 would support 64 thousand jobs in the construction industry and has been defended by chief executive of Jim O'Sullivan as \"mak[ing] journeys faster and more reliable for freight and road users.\" A 2015 DfT analysis of RIS 1 found the scheme would increase the projected rise in emissions by 2040 by between 0.1 and 0.2\\%. An April 2020 analysis of RIS 2 found the five new schemes covered would amount to an estimated 0.016\\% of emissions of the 2028-2032 carbon budget.", "edit_actions": [{"type": "A", "before": null, "after": "On", "start_char_pos": 0, "end_char_pos": 0}, {"type": "D", "before": "Sir", "after": null, "start_char_pos": 20, "end_char_pos": 23}, {"type": "R", "before": "for", "after": "from the", "start_char_pos": 110, "end_char_pos": 113}, {"type": "R", "before": "on", "after": "regarding", "start_char_pos": 145, "end_char_pos": 147}, {"type": "A", "before": null, "after": "(UK)", "start_char_pos": 167, "end_char_pos": 167}, {"type": "A", "before": null, "after": "(", "start_char_pos": 219, "end_char_pos": 219}, {"type": "A", "before": null, "after": ") plan", "start_char_pos": 226, "end_char_pos": 226}, {"type": "R", "before": "the England", "after": "England's", "start_char_pos": 622, "end_char_pos": 633}, {"type": "A", "before": null, "after": "the UK making", "start_char_pos": 686, "end_char_pos": 686}, {"type": "R", "before": "the organisation", "after": "TAN", "start_char_pos": 755, "end_char_pos": 771}, {"type": "R", "before": "a", "after": "that", "start_char_pos": 879, "end_char_pos": 880}, {"type": "A", "before": null, "after": "A", "start_char_pos": 1437, "end_char_pos": 1437}, {"type": "A", "before": null, "after": "An", "start_char_pos": 1563, "end_char_pos": 1563}], "sents_char_pos": [0, 315, 454, 658, 734, 1031, 1235, 1562]}
+{"doc_id": "29545", "revision_depth": "2", "before_revision": "Tropical Storm Zeta has become the first storm of the 2006 Atlantic hurricane season after crossing over from 2005 Atlantic hurricane season as that seasons 27th storm, breaking the record set by Hurricane Epsilon earlier in December. This makes Zeta the second tropical storm in history to cross over into another season; the first time this occurred was in 1954-55 with Hurricane Alice . Zeta currently has a top sustained wind speed of 50mph (85 km/h). It is currently about 1,085 miles (1745 km) southwest of the Azores and is proceeding west-southwest at 2mph (4 km/h). Forecasters say it is not expected to become a hurricane or threaten land. Zeta formed on December 30, 2005, after the official end of the destructive and record-breaking 2005 Atlantic hurricane season, which ended on November 30, 2005. The 2005 season was notable for the record number of storms it produced (including Zeta), and was the first time storm names used V, W and Greek letters and the second time the letters R, S, and T were used. The season also had the highest-ever number of storms forming in the month of July, and had the highest number of Category 5 hurricanes with a total of three, including Hurricane Wilma , the most intense hurricane ever in the Atlantic basin. The most notable of the three Category 5 hurricanes was Hurricane Katrina . Katrina caused over $100 billion ( USD ) in damage and 1,383 deaths, especially along Mississippi and Alabama coastlines which suffered catastrophic damage. The storm also caused levees to break in New Orleans leading to the flooding of the city which is located below sea-level. The United States goverment , the city government of New Orleans and the government of the State of Louisana were all severely criticized for their handling of the storms aftermath. Hurricane Katrina, although not yet certified, is most likely the costliest hurricane in U.S. history.", "after_revision": "Tropical Storm Zeta has become the first storm of the after crossing over from as that seasons 27th storm, breaking the record set by earlier in December. This makes Zeta the second tropical storm in history to cross over into another season; the first time this occurred was in 1954-55 with . Zeta currently has a top sustained wind speed of 50mph (85 km/h). It is currently about 1,085 miles (1745 km) southwest of the Azores and is proceeding west-southwest at 2mph (4 km/h). Forecasters say it is not expected to become a or threaten land. Zeta formed on December 30, 2005, after the official end of the destructive and record-breaking 2005 Atlantic hurricane season, which ended on November 30, 2005. The 2005 season was notable for the record number of storms it produced (including Zeta), and was the first time storm names used , , and and the second time the letters , , and were used. The season also had the highest-ever number of storms forming in the month of July, and had the highest number of with a total of three, including , the most intense hurricane ever in the Atlantic basin. The most notable of the three Category 5 hurricanes was . Katrina caused over $100 billion ( ) in damage and 1,383 deaths, especially along and coastlines which suffered catastrophic damage. The storm also caused levees to break in leading to the flooding of the city which is located below sea-level. The , the city government of New Orleans , and the government of the State of were all for their handling of the storms aftermath. Hurricane Katrina, although not yet certified, is most likely the costliest hurricane in U.S. history.", "edit_actions": [{"type": "D", "before": "2006 Atlantic hurricane season", "after": null, "start_char_pos": 54, "end_char_pos": 84}, {"type": "D", "before": "2005 Atlantic hurricane season", "after": null, "start_char_pos": 110, "end_char_pos": 140}, {"type": "D", "before": "Hurricane Epsilon", "after": null, "start_char_pos": 196, "end_char_pos": 213}, {"type": "D", "before": "Hurricane Alice", "after": null, "start_char_pos": 372, "end_char_pos": 387}, {"type": "D", "before": "hurricane", "after": null, "start_char_pos": 622, "end_char_pos": 631}, {"type": "R", "before": "V, W and Greek letters", "after": ", , and", "start_char_pos": 942, "end_char_pos": 964}, {"type": "R", "before": "R, S, and T", "after": ", , and", "start_char_pos": 997, "end_char_pos": 1008}, {"type": "D", "before": "Category 5 hurricanes", "after": null, "start_char_pos": 1134, "end_char_pos": 1155}, {"type": "D", "before": "Hurricane Wilma", "after": null, "start_char_pos": 1189, "end_char_pos": 1204}, {"type": "D", "before": "Hurricane Katrina", "after": null, "start_char_pos": 1318, "end_char_pos": 1335}, {"type": "D", "before": "USD", "after": null, "start_char_pos": 1373, "end_char_pos": 1376}, {"type": "R", "before": "Mississippi and Alabama", "after": "and", "start_char_pos": 1424, "end_char_pos": 1447}, {"type": "D", "before": "New Orleans", "after": null, "start_char_pos": 1536, "end_char_pos": 1547}, {"type": "D", "before": "United States goverment", "after": null, "start_char_pos": 1622, "end_char_pos": 1645}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1683, "end_char_pos": 1683}, {"type": "R", "before": "Louisana were all severely criticized", "after": "were all", "start_char_pos": 1719, "end_char_pos": 1756}], "sents_char_pos": [0, 234, 322, 455, 574, 649, 811, 1019, 1261, 1494, 1617, 1800]}
+{"doc_id": "3113", "revision_depth": "1", "before_revision": "300px|Huygens probe descent to Titan. (illustration by NASA) The Huygens Probe will enter the atmosphere of Saturn 's largest moon, Titan , on January 14 at approximately 9 a.m. UTC . NASA launched Cassini-Huygens, the largest interplanetary space craft ever built, on October 15, 1997. The craft arrived at Saturn orbit in July of 2004. It is the fourth craft to visit Saturn and the first to orbit the planet. The Cassini-Huygens mission is a joint project of NASA and the European Space Agency (ESA). The probe was named after Dutch astronomer Christiaan Huygens , who discovered Titan in 1655. The Cassini orbiter was named for Jean-Dominique Cassini , who discovered other moons of Saturn and the gap between Saturn's rings known as the Cassini Division . References External linksCassini-Huygens at our sister project, Wikipedia Cassini Mission Homepage by the Jet Propulsion Laboratory ESA Huygens Homepage ESA - Where is Cassini-Huygens now? Interactive Flash-Animation of Cassini orbits through 2008%DIFDELCMD < %DIFDELCMD < %%% Category:Science and technology Category:NASA Category:Spa", "after_revision": "The Probe will enter the atmosphere of 's largest moon, , on January 14 at approximately 9 a.m. . launched Cassini-Huygens, the largest interplanetary space craft ever built, on October 15, 1997. The craft arrived at Saturn orbit in July of 2004. It is the fourth craft to visit Saturn and the first to orbit the planet. The Cassini-Huygens mission is a joint project of NASA and the (ESA). The probe was named after Dutch astronomer , who discovered Titan in 1655. The Cassini orbiter was named for , who discovered other moons of Saturn and the gap between Saturn's rings known as the . %DIFDELCMD < %DIFDELCMD < %%% Sister links", "edit_actions": [{"type": "R", "before": "300px|Huygens probe descent to Titan. (illustration by NASA) The Huygens", "after": "The", "start_char_pos": 0, "end_char_pos": 72}, {"type": "D", "before": "Saturn", "after": null, "start_char_pos": 108, "end_char_pos": 114}, {"type": "D", "before": "Titan", "after": null, "start_char_pos": 132, "end_char_pos": 137}, {"type": "D", "before": "UTC", "after": null, "start_char_pos": 178, "end_char_pos": 181}, {"type": "D", "before": "NASA", "after": null, "start_char_pos": 184, "end_char_pos": 188}, {"type": "D", "before": "European Space Agency", "after": null, "start_char_pos": 475, "end_char_pos": 496}, {"type": "D", "before": "Christiaan Huygens", "after": null, "start_char_pos": 547, "end_char_pos": 565}, {"type": "D", "before": "Jean-Dominique Cassini", "after": null, "start_char_pos": 632, "end_char_pos": 654}, {"type": "D", "before": "Cassini Division", "after": null, "start_char_pos": 742, "end_char_pos": 758}, {"type": "D", "before": "References", "after": null, "start_char_pos": 761, "end_char_pos": 771}, {"type": "D", "before": "External linksCassini-Huygens at our sister project, Wikipedia Cassini Mission Homepage by the Jet Propulsion Laboratory ESA Huygens Homepage ESA - Where is Cassini-Huygens now? Interactive Flash-Animation of Cassini orbits through 2008", "after": null, "start_char_pos": 772, "end_char_pos": 1008}, {"type": "R", "before": "Category:Science and technology Category:NASA Category:Spa", "after": "Sister links", "start_char_pos": 1038, "end_char_pos": 1096}], "sents_char_pos": [0, 37, 286, 337, 411, 503, 597, 949]}
+{"doc_id": "31147", "revision_depth": "1", "before_revision": "Sunderland slumped to their 14th league game without a victory despite a spirited performance against league leaders Chelsea F.C. Records were set before this Sunday afternoon game kicked-off in the North-East; bookmaker's were offering the shortest odds for an away win in the history of the Premier League , as top faced bottom at the Stadium of Light . Sunderland, in the middle of a season breaking records for the wrong reasons, were hoping to avoid a result as bad as the 7-0 defeat local rivals Middlesbrough suffered to Aresnal the day before. Despite pre-match predictions, the Londoners looked out of sorts for much of the first-half, and it was the home side who took a shock-lead on 11 minutes. Jon Terry failed to completely clear a Julio Arca punt into the box, and Liam Lawrence pounced with a low, powerful volley in to the bottom corner. Chelsea were not behind for long; Sunderland defenders were caught-out on 20 minutes, when a William Gallas cross, which looked as though it was headed out of play, was headed back across the face of goal by Joe Cole . Defenders were caught flat-footed, and Argentinian Hernan Crespo was first to react with a close-range header. In the second half Chelsea began to exert authority; they dominated possession and chances and looked most likely to take the lead. Sunderland keeper Kelvin Davis , suffering criticism from Sunderland fans as of late, made a series of superb stops to deny Chelsea the lead. It was a cruel deflection off the head of Dean Whitehead which finally gave the reigning champions the lead on 70 minutes, Dutchman Arjen Robben providing the strike. The game's main talking point occurred moments later, as Robben jumped over advertising boards in order to celebrate the goal with the travelling fans. As stewards scrambled to remove Robben from the clutches of the jubilant Chelsea followers, referee Chris Foy , working to the letter of the law, brandished a second yellow card and sent the midfield playmaker off.", "after_revision": " slumped to their 14th league game without a victory despite a spirited performance against league leaders Chelsea F.C. . Records were set before this Sunday afternoon game kicked-off in the North-East; bookmaker's were offering the shortest odds for an away win in the history of the , as top faced bottom at the . Sunderland, in the middle of a season breaking records for the wrong reasons, were hoping to avoid a result as bad as the 7-0 defeat local rivals Middlesbrough suffered to Arsenal the day before. Despite pre-match predictions, the Londoners looked out of sorts for much of the first-half, and it was the home side who took a shock-lead on 11 minutes. Jon Terry failed to completely clear a punt into the box, and pounced with a low, powerful volley in to the bottom corner. Chelsea were not behind for long; Sunderland defenders were caught-out on 20 minutes, when a cross, which looked as though it was headed out of play, was headed back across the face of goal by . Defenders were caught flat-footed, and Argentinian was first to react with a close-range header. In the second half Chelsea began to exert authority; they dominated possession and chances and looked most likely to take the lead. Sunderland keeper , suffering criticism from Sunderland fans as of late, made a series of superb stops to deny Chelsea the lead. It was a cruel deflection off the head of which finally gave the reigning champions the lead on 70 minutes, Dutchman providing the strike. The game's main talking point occurred moments later, as Robben jumped over advertising boards in order to celebrate the goal with the traveling fans. As stewards scrambled to remove Robben from the clutches of the jubilant Chelsea followers, referee , working to the letter of the law, brandished a second yellow card and sent the midfield playmaker off.", "edit_actions": [{"type": "D", "before": "Sunderland", "after": null, "start_char_pos": 0, "end_char_pos": 10}, {"type": "A", "before": null, "after": ".", "start_char_pos": 130, "end_char_pos": 130}, {"type": "D", "before": "Premier League", "after": null, "start_char_pos": 294, "end_char_pos": 308}, {"type": "D", "before": "Stadium of Light", "after": null, "start_char_pos": 338, "end_char_pos": 354}, {"type": "R", "before": "Aresnal", "after": "Arsenal", "start_char_pos": 529, "end_char_pos": 536}, {"type": "D", "before": "Julio Arca", "after": null, "start_char_pos": 747, "end_char_pos": 757}, {"type": "D", "before": "Liam Lawrence", "after": null, "start_char_pos": 781, "end_char_pos": 794}, {"type": "D", "before": "William Gallas", "after": null, "start_char_pos": 949, "end_char_pos": 963}, {"type": "D", "before": "Joe Cole", "after": null, "start_char_pos": 1064, "end_char_pos": 1072}, {"type": "D", "before": "Hernan Crespo", "after": null, "start_char_pos": 1126, "end_char_pos": 1139}, {"type": "D", "before": "Kelvin Davis", "after": null, "start_char_pos": 1336, "end_char_pos": 1348}, {"type": "D", "before": "Dean Whitehead", "after": null, "start_char_pos": 1502, "end_char_pos": 1516}, {"type": "D", "before": "Arjen Robben", "after": null, "start_char_pos": 1592, "end_char_pos": 1604}, {"type": "R", "before": "travelling", "after": "traveling", "start_char_pos": 1762, "end_char_pos": 1772}, {"type": "D", "before": "Chris Foy", "after": null, "start_char_pos": 1879, "end_char_pos": 1888}], "sents_char_pos": [0, 211, 552, 707, 855, 889, 1185, 1238, 1317, 1459, 1626, 1778]}
+{"doc_id": "31455", "revision_depth": "1", "before_revision": "URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL ", "after_revision": "\"Sberbank\" building ablaze, Vladivostok (Russia). At 11:45am on January 16, in Vladivostok, Russia, a fire broke out on the three upper floors of the Sberbank building. Photographs taken by eye-witnesses show people, who were trapped, dropping from 8th floor windows to their deaths. According to some reports the firemen who were dispatched to the scene were pre-occupied at the rear of the building. They had apparently been ordered to evacuate the bank and its management from the area that was not under immediate threat. Official Russian media initially denied the fire, accusing the reports of being false. Russian media later confirmed 7 and then, 9 dead. Witnesses and those rescued from the burning building have claimed that the figure exceeds 50. A maintenance employee who worked in the building was quoted as saying, \"I know at least about 13 dead inside ... that's the least I've noticed, not to consider those who've dropped down ... 8 of them dropped, looking at the three already dead on the ground, but they went through the windows without hope to be rescued ... They collected and hid the dead bodies inside. I work at this building! I know its layout very well! To declare, as it become clear, a less number of the dead later.\" \"My daughter worked in a justice department,\" - Natalia, one of the witnesses said. \"She said that there were actually much more dead - up to 70. She went on the dead bodies, getting out from the building \u2026 some of them were so scorched, that it was impossible to identify them\u2026 9 victims? That's a lie!\" Georic, a witness: \"The cops (\"menty\"), whom I know, say that they've been loading the dead bodies all night long.\" Lelya has posted her evidence on January 21, 2006 on the web-site URL \"My brother worked in that building, on the 6th flour. So, the night after the fire they visited the building to collect the documents, etc. and they saw how workers transported the dead bodies. He said, there were 50-60..\" Actions of the officials Eugenia, a witness said, \"who has told you, that fireteam arrived in 3 minutes? Or in 20 minutes? My uncle worked on anouther side of the building. He personally gave a call to the fire department. They said, \"ok, ok, take it easy, here we go...\" as it were just some fun for them, \"nothing serious!\" Reports from the scene say the fire-brigade arrived at least 40 minutes or more from the time the call about the fire was placed. The Fire-safety Department officials state that firemen had the \"objective obstacles\" which hampered rescue efforts. Among them were, barred emergency exits, and a congestion of cars in front of the burning building. The mayor of Vladivostok in reply to a plea \"to rescue those who are still in fire, does human life really cost nothing?\" replied saying that, \"human life costs nothing in Russia.\" Law-enforcement authorities arrested the inspector who had checked the building in July 2004, and exposed a number of irregularities, such as barred windows in stairwells, but failed to control the elimination of these shortcomings. Lyudmila Feofanova, CEO of the Maritime branch of \"Sberbank\", was arrested in Vladivostok in conjunction with the case of the fire which has killed, according to official reports, 9 and seriousely wounded 17 last Monday. The Office of Public Prosecutor accuses L.Feofanova on failure to provide the bank with a fire-prevention system. Mass-media coverage The Russian official news agencies and mass-media report only 9 victims, several bank employees. Five days following the fire, people have launched dozens of forums and web-sites, trying to tell their side of the story. They have created lists of those believed to be killed or those that are unable to be indentified. Related Wikinews External links Video of the fire: , A website about the fire (in Russian) The most complete video of the fire, 39.1Mb (rar-archived)", "edit_actions": [{"type": "R", "before": "URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL URL", "after": "\"Sberbank\" building ablaze, Vladivostok (Russia). At 11:45am on January 16, in Vladivostok, Russia, a fire broke out on the three upper floors of the Sberbank building.", "start_char_pos": 0, "end_char_pos": 2399}, {"type": "A", "before": null, "after": "Photographs taken by eye-witnesses show people, who were trapped, dropping from 8th floor windows to their deaths. According to some reports the firemen who were dispatched to the scene were pre-occupied at the rear of the building. They had apparently been ordered to evacuate the bank and its management from the area that was not under immediate threat.", "start_char_pos": 2400, "end_char_pos": 2400}, {"type": "A", "before": null, "after": "Official Russian media initially denied the fire, accusing the reports of being false.", "start_char_pos": 2401, "end_char_pos": 2401}, {"type": "A", "before": null, "after": "Russian media later confirmed 7 and then, 9 dead. Witnesses and those rescued from the burning building have claimed that the figure exceeds 50.", "start_char_pos": 2402, "end_char_pos": 2402}, {"type": "A", "before": null, "after": "A maintenance employee who worked in the building was quoted as saying, \"I know at least about 13 dead inside ... that's the least I've noticed, not to consider those who've dropped down ... 8 of them dropped, looking at the three already dead on the ground, but they went through the windows without hope to be rescued ... They collected and hid the dead bodies inside. I work at this building! I know its layout very well! To declare, as it become clear, a less number of the dead later.\"", "start_char_pos": 2403, "end_char_pos": 2403}, {"type": "A", "before": null, "after": "\"My daughter worked in a justice department,\" - Natalia, one of the witnesses said. \"She said that there were actually much more dead - up to 70. She went on the dead bodies, getting out from the building \u2026 some of them were so scorched, that it was impossible to identify them\u2026 9 victims? That's a lie!\"", "start_char_pos": 2404, "end_char_pos": 2404}, {"type": "A", "before": null, "after": "Georic, a witness: \"The cops (\"menty\"), whom I know, say that they've been loading the dead bodies all night long.\"", "start_char_pos": 2405, "end_char_pos": 2405}, {"type": "A", "before": null, "after": "Lelya has posted her evidence on January 21, 2006 on the web-site URL \"My brother worked in that building, on the 6th flour. So, the night after the fire they visited the building to collect the documents, etc. and they saw how workers transported the dead bodies. He said, there were 50-60..\"", "start_char_pos": 2406, "end_char_pos": 2406}, {"type": "A", "before": null, "after": "Actions of the officials", "start_char_pos": 2407, "end_char_pos": 2407}, {"type": "A", "before": null, "after": "Eugenia, a witness said, \"who has told you, that fireteam arrived in 3 minutes? Or in 20 minutes? My uncle worked on anouther side of the building. He personally gave a call to the fire department. They said, \"ok, ok, take it easy, here we go...\" as it were just some fun for them, \"nothing serious!\"", "start_char_pos": 2408, "end_char_pos": 2408}, {"type": "A", "before": null, "after": "Reports from the scene say the fire-brigade arrived at least 40 minutes or more from the time the call about the fire was placed.", "start_char_pos": 2409, "end_char_pos": 2409}, {"type": "A", "before": null, "after": "The Fire-safety Department officials state that firemen had the \"objective obstacles\" which hampered rescue efforts. Among them were, barred emergency exits, and a congestion of cars in front of the burning building.", "start_char_pos": 2410, "end_char_pos": 2410}, {"type": "A", "before": null, "after": "The mayor of Vladivostok in reply to a plea \"to rescue those who are still in fire, does human life really cost nothing?\" replied saying that, \"human life costs nothing in Russia.\"", "start_char_pos": 2411, "end_char_pos": 2411}, {"type": "A", "before": null, "after": "Law-enforcement authorities arrested the inspector who had checked the building in July 2004, and exposed a number of irregularities, such as barred windows in stairwells, but failed to control the elimination of these shortcomings.", "start_char_pos": 2412, "end_char_pos": 2412}, {"type": "A", "before": null, "after": "Lyudmila Feofanova, CEO of the Maritime branch of \"Sberbank\", was arrested in Vladivostok in conjunction with the case of the fire which has killed, according to official reports, 9 and seriousely wounded 17 last Monday.", "start_char_pos": 2413, "end_char_pos": 2413}, {"type": "A", "before": null, "after": "The Office of Public Prosecutor accuses L.Feofanova on failure to provide the bank with a fire-prevention system.", "start_char_pos": 2414, "end_char_pos": 2414}, {"type": "A", "before": null, "after": "Mass-media coverage", "start_char_pos": 2415, "end_char_pos": 2415}, {"type": "A", "before": null, "after": "The Russian official news agencies and mass-media report only 9 victims, several bank employees.", "start_char_pos": 2416, "end_char_pos": 2416}, {"type": "A", "before": null, "after": "Five days following the fire, people have launched dozens of forums and web-sites, trying to tell their side of the story. They have created lists of those believed to be killed or those that are unable to be indentified.", "start_char_pos": 2417, "end_char_pos": 2417}, {"type": "A", "before": null, "after": "Related Wikinews", "start_char_pos": 2418, "end_char_pos": 2418}, {"type": "A", "before": null, "after": "External links Video of the fire: , A website about the fire (in Russian) The most complete video of the fire, 39.1Mb (rar-archived)", "start_char_pos": 2419, "end_char_pos": 2419}], "sents_char_pos": [0, 12, 24, 36, 48, 60, 72, 84, 96, 108, 120, 132, 144, 156, 168, 180, 192, 204, 216, 228, 240, 252, 264, 276, 288, 300, 312, 324, 336, 348, 360, 372, 384, 396, 408, 420, 432, 444, 456, 468, 480, 492, 504, 516, 528, 540, 552, 564, 576, 588, 600, 612, 624, 636, 648, 660, 672, 684, 696, 708, 720, 732, 744, 756, 768, 780, 792, 804, 816, 828, 840, 852, 864, 876, 888, 900, 912, 924, 936, 948, 960, 972, 984, 996, 1008, 1020, 1032, 1044, 1056, 1068, 1080, 1092, 1104, 1116, 1128, 1140, 1152, 1164, 1176, 1188, 1200, 1212, 1224, 1236, 1248, 1260, 1272, 1284, 1296, 1308, 1320, 1332, 1344, 1356, 1368, 1380, 1392, 1404, 1416, 1428, 1440, 1452, 1464, 1476, 1488, 1500, 1512, 1524, 1536, 1548, 1560, 1572, 1584, 1596, 1608, 1620, 1632, 1644, 1656, 1668, 1680, 1692, 1704, 1716, 1728, 1740, 1752, 1764, 1776, 1788, 1800, 1812, 1824, 1836, 1848, 1860, 1872, 1884, 1896, 1908, 1920]}
+{"doc_id": "31572", "revision_depth": "1", "before_revision": "Jos\u00e9 S\u00f3crates, prime minister of Portugal, said he was \"satisfied with the decision of Volkswagen to produce a new model in the factory of Palmela,\" and considered that the decision, \"reflected the confidence [of the investors] in the portuguese economy.\" Volkswagen will reveal the new model to be produced next week. By 2008 the factory at Palmela will be only producing the multi-purpose vehicle Sharan and the Eos models. With the end of the production of the multi-purpose vehicle, the factory needs to garantee new product lines, since the new Eos is insufficient to maintain the current 2,790 workers.", "after_revision": "Jos\u00e9 S\u00f3crates, prime minister of Portugal, said he was \"satisfied with the decision of Volkswagen to produce a new model in the factory of Palmela,\" and considered that the decision, \"reflected the confidence [of the investors] in the Portuguese economy.\" Volkswagen will reveal the new model to be produced next week. By 2008 , the factory at Palmela will only be producing the multi-purpose vehicle Sharan and the Eos models. With the end of the production of the multi-purpose vehicle, the factory needs to guarantee new product lines, since the new Eos is not sufficient to maintain the current 2,790 workers.", "edit_actions": [{"type": "R", "before": "portuguese", "after": "Portuguese", "start_char_pos": 235, "end_char_pos": 245}, {"type": "A", "before": null, "after": ",", "start_char_pos": 327, "end_char_pos": 327}, {"type": "R", "before": "be only", "after": "only be", "start_char_pos": 356, "end_char_pos": 363}, {"type": "R", "before": "garantee", "after": "guarantee", "start_char_pos": 509, "end_char_pos": 517}, {"type": "R", "before": "insufficient", "after": "not sufficient", "start_char_pos": 558, "end_char_pos": 570}], "sents_char_pos": [0, 255, 318, 426]}
+{"doc_id": "32786", "revision_depth": "1", "before_revision": "190px|The chambers of the U.S. Senate are located on Capitol Hill in Washington, D.C. Staff members of the offices of United States Senators, using Senate-linked IP addresses , have been editing Wikipedia, a free online encyclopedia that allows its users to edit its content. In some cases, they have removed facts from the articles. __NOTOC__ Using the public history of edits on Wikipedia, Wikinews reporters collected every Senate IP address from which Wikipedia edits had been made as of February 3, then examined where the IPs came from and the edits that were made from computers connected at those addresses. IP, or Internet Protocol, addresses are unique numbers electronic devices use to communicate with each other on an individual basis. The investigation showed the vast majority of edits from Senate IPs were beneficial and helpful to Wikipedia. Examples include the creation of the articles on Click Back America , which organizes students to promote microfinance in the developing world, and Washington's Tomb , which was designed to hold the body of first U.S. President George Washington within the White House Capitol building; and significantly expanding the article on closed sessions of the United States Senate in November. Dozens of small corrections have been made to grammar, spelling, or small facts \u2014 many of them related to the Senate. Senators' staff members have sometimes had to fight to correct inaccuracies. An edit to Jay Rockefeller's article by his staff removed information which may have been biased or untrue. The staff member who edited said, \"Apologies, I was new to using Wikipedia, and I didn't fully realize the workings of the website,\" after other users continuously reinserted the information. The staffer removed the suspect paragraphs 12 times until another Wikipedia user finally removed the information. Four days later, Wikipedia founder Jimmy Wales got involved. Staffers in the offices of Senator Joe Biden , who, according to his changed Wikipedia biography, \"announced in mid-June 2005 that he will seek the Democratic Presidential nomination in 2008 if he believes his message and vision for the country resonate with Americans,\" removed a paragraph about a 1996 plagiarism scandal, as well as changing the section regarding a possible 2008 candidacy to read very positively. A second staffer toned down and removed information about other plagiarism issues as well. The same addresses from Biden's office edited the article on Hamas, which has recently won a majority in the Palestinian Legislative Council, and is listed as a terrorist organization by Australia, Canada, the European Union, Israel, and the United States, to give its first two paragraphs a more biased stance by removing information about its social welfare programs. Conrad Burns References, citations, and descriptions of Conrad Burns ' use of the word \"ragheads\" were removed from Wikipedia's article, as was mention of legislation, co-sponsored by Burns, that would reduce Native American tribal sovereignty. These were replaced by a paragraph titled \"A Voice for the Farmer\". The citations supported the discussion of Senator Burns's legislative record regarding tribal sovereignty . Norm Coleman The staffers of Senator Norm Coleman changed a description of Coleman as a liberal Democrat in college to an \"activist Democrat,\" and then to \"an active college student.\" They removed references to Coleman's voting record during his first year of Congress, which lined up with President Bush 98\\% of the time, which cited Congressional Quarterly . They also removed a reference to Coleman being persuaded by Karl Rove to run for senator instead of governor in 2002. According to the St. Paul Pioneer Press , \"Coleman's decision to run for senator, rather than governor, was sealed during a walk with President Bush in the White House's Rose Garden,\" rather than Karl Rove. Rove had actually persuaded the former House majority leader of Minnesota and current governor, Tim Pawlenty, not to challenge Norm Coleman in the Senate elections. Still, other portions of the edit removed references to Karl Rove entirely, and their citations, while accentuating the positive side of several issues, including changing \"a budget bill that cut funding from a number of programs\" to \"a deficit-reduction bill.\" Dianne Feinstein The California block of Senate IP addresses made several edits to the Dianne Feinstein article, removing reference to her membership in the Trilateral Commission and to her net worth, with husband Richard C. Blum , but also adding an extensive list of awards. Tom Harkin The staffers of Senator Tom Harkin removed a paragraph relating to Harkin's having falsely claimed to have flown combat missions over North Vietnam, and his subsequent recantation after inquiries by the Wall Street Journal and Barry Goldwater . Another paragraph removed related to a supposed pro-Israeli stance. When examining the edit behavior of IPs it also tended to match the predicted pattern. IPs which were assigned to Florida had edits to Bill Nelson and Mel Martinez and other Florida-related pages primarily, while those assigned to California had edited Dianne Feinstein . Edits coming from the U.S. House of Representatives were less traceable because they came through a proxy server---meaning they all showed up under one IP address.", "after_revision": "190px|The chambers of the U.S. Senate are located on in Staff members of the offices of United States Senators, using Senate-linked , have been editing Wikipedia, a free online encyclopedia that allows its users to edit its content. In some cases, they have removed facts from the articles. __NOTOC__ Using the public history of edits on Wikipedia, Wikinews reporters collected every Senate IP address from which Wikipedia edits had been made as of February 3, then examined where the IPs came from and the edits that were made from computers connected at those addresses. IP, or Internet Protocol, addresses are unique numbers electronic devices use to communicate with each other on an individual basis. The investigation showed the vast majority of edits from Senate IPs were beneficial and helpful to Wikipedia. Examples include the creation of the articles on , which organizes students to promote in the developing world, and , which was designed to hold the body of first U.S. President George Washington within the White House Capitol building; and significantly expanding the article on in November. Dozens of small corrections have been made to grammar, spelling, or small facts \u2014 many of them related to the Senate. Senators' staff members have sometimes had to fight to correct inaccuracies. An edit to Jay Rockefeller's article by his staff removed information which may have been biased or untrue. The staff member who edited said, \"Apologies, I was new to using Wikipedia, and I didn't fully realize the workings of the website,\" after other users continuously reinserted the information. The staffer removed the suspect paragraphs 12 times until another Wikipedia user finally removed the information. Four days later, Wikipedia founder got involved. Staffers in the offices of Senator , who, according to his changed Wikipedia biography, \"announced in mid-June 2005 that he will seek the Democratic Presidential nomination in 2008 if he believes his message and vision for the country resonate with Americans,\" removed a paragraph about a 1996 plagiarism scandal, as well as changing the section regarding a possible 2008 candidacy to read very positively. A second staffer toned down and removed information about other plagiarism issues as well. The same addresses from Biden's office edited the article on Hamas, which has recently won a majority in the Palestinian Legislative Council, and is listed as a terrorist organization by Australia, Canada, the European Union, Israel, and the United States, to give its first two paragraphs a more biased stance by removing information about its social welfare programs. References, citations, and descriptions of ' use of the word \"ragheads\" were removed from Wikipedia's article, as was mention of legislation, co-sponsored by Burns, that would reduce Native American tribal sovereignty. These were replaced by a paragraph titled \"A Voice for the Farmer\". The citations supported the discussion of Senator Burns's legislative record regarding . The staffers of Senator changed a description of Coleman as a liberal Democrat in college to an \"activist Democrat,\" and then to \"an active college student.\" They removed references to Coleman's voting record during his first year of Congress, which lined up with President Bush 98\\% of the time, which cited . They also removed a reference to Coleman being persuaded by to run for senator instead of governor in 2002. According to the , \"Coleman's decision to run for senator, rather than governor, was sealed during a walk with President Bush in the White House's Rose Garden,\" rather than Karl Rove. Rove had actually persuaded the former House majority leader of Minnesota and current governor, Tim Pawlenty, not to challenge Norm Coleman in the Senate elections. Still, other portions of the edit removed references to Karl Rove entirely, and their citations, while accentuating the positive side of several issues, including changing \"a budget bill that cut funding from a number of programs\" to \"a deficit-reduction bill.\" The California block of Senate IP addresses made several edits to the article, removing reference to her membership in the Trilateral Commission and to her net worth, with husband , but also adding an extensive list of awards. The staffers of Senator removed a paragraph relating to Harkin's having falsely claimed to have flown combat missions over North Vietnam, and his subsequent recantation after inquiries by the Wall Street Journal and . Another paragraph removed related to a supposed pro-Israeli stance. When examining the edit behavior of IPs it also tended to match the predicted pattern. IPs which were assigned to Florida had edits to and and other Florida-related pages primarily, while those assigned to California had edited . Edits coming from the U.S. House of Representatives were less traceable because they came through a ---meaning they all showed up under one IP address.", "edit_actions": [{"type": "R", "before": "Capitol Hill in Washington, D.C.", "after": "in", "start_char_pos": 53, "end_char_pos": 85}, {"type": "D", "before": "IP addresses", "after": null, "start_char_pos": 162, "end_char_pos": 174}, {"type": "D", "before": "Click Back America", "after": null, "start_char_pos": 908, "end_char_pos": 926}, {"type": "D", "before": "microfinance", "after": null, "start_char_pos": 965, "end_char_pos": 977}, {"type": "D", "before": "Washington's Tomb", "after": null, "start_char_pos": 1007, "end_char_pos": 1024}, {"type": "D", "before": "closed sessions of the United States Senate", "after": null, "start_char_pos": 1189, "end_char_pos": 1232}, {"type": "D", "before": "Jimmy Wales", "after": null, "start_char_pos": 1890, "end_char_pos": 1901}, {"type": "D", "before": "Joe Biden", "after": null, "start_char_pos": 1951, "end_char_pos": 1960}, {"type": "D", "before": "Conrad Burns", "after": null, "start_char_pos": 2794, "end_char_pos": 2806}, {"type": "D", "before": "Conrad Burns", "after": null, "start_char_pos": 2850, "end_char_pos": 2862}, {"type": "D", "before": "tribal sovereignty", "after": null, "start_char_pos": 3194, "end_char_pos": 3212}, {"type": "D", "before": "Norm Coleman", "after": null, "start_char_pos": 3215, "end_char_pos": 3227}, {"type": "D", "before": "Norm Coleman", "after": null, "start_char_pos": 3252, "end_char_pos": 3264}, {"type": "D", "before": "Congressional Quarterly", "after": null, "start_char_pos": 3550, "end_char_pos": 3573}, {"type": "D", "before": "Karl Rove", "after": null, "start_char_pos": 3636, "end_char_pos": 3645}, {"type": "D", "before": "St. Paul Pioneer Press", "after": null, "start_char_pos": 3711, "end_char_pos": 3733}, {"type": "D", "before": "Dianne Feinstein", "after": null, "start_char_pos": 4328, "end_char_pos": 4344}, {"type": "D", "before": "Dianne Feinstein", "after": null, "start_char_pos": 4415, "end_char_pos": 4431}, {"type": "D", "before": "Richard C. Blum", "after": null, "start_char_pos": 4542, "end_char_pos": 4557}, {"type": "D", "before": "Tom Harkin", "after": null, "start_char_pos": 4605, "end_char_pos": 4615}, {"type": "D", "before": "Tom Harkin", "after": null, "start_char_pos": 4640, "end_char_pos": 4650}, {"type": "D", "before": "Barry Goldwater", "after": null, "start_char_pos": 4843, "end_char_pos": 4858}, {"type": "D", "before": "Bill Nelson and Mel Martinez", "after": null, "start_char_pos": 5064, "end_char_pos": 5092}, {"type": "A", "before": null, "after": "and", "start_char_pos": 5097, "end_char_pos": 5097}, {"type": "D", "before": "Dianne Feinstein", "after": null, "start_char_pos": 5183, "end_char_pos": 5199}, {"type": "R", "before": "proxy server---meaning", "after": "---meaning", "start_char_pos": 5302, "end_char_pos": 5324}], "sents_char_pos": [0, 275, 333, 615, 748, 858, 1145, 1245, 1363, 1440, 1548, 1740, 1854, 1915, 2332, 2423, 2793, 3038, 3106, 3214, 3398, 3575, 3693, 3900, 4065, 4327, 4604, 4860, 4928, 5015]}
+{"doc_id": "3330", "revision_depth": "1", "before_revision": "Open letter from international intellectuals, to the international public opinion The kidnapping of Rodrigo Granda, carried out in Venezuelan territory presumably by agents of the Colombian police, is an attempt to create difficulties between both countries in order to debilitate the Bolivarian movement. An additional effect is to reduce the international prestige of the conduct of President Hugo Ch\u00e1vez creating doubts about a possible Venezuelan implication in said kidnapping. All intended to cause a possible armed intervention of the United States as a result of the conflict.%DIFDELCMD < %DIFDELCMD < %%% In view of this stratagem, the undersigned, artists, writers, intellectuals of Our America and the world declare our unrestricted support to the process of social change initiated in Venezuela and declare our adhesion and solidarity to the Bolivarian movement and the diaphanous conduct of its leader President Hugo Ch\u00e1vez Fr\u00edas. Ernesto Cardenal (Nicaragua)%DIFDELCMD < %DIFDELCMD < %%% Alfonso Sastre (Spain) Atilio Bor\u00f3n (Argentina)%DIFDELCMD < %DIFDELCMD < %%% Emir Sader (Brazil,professor) Lisandro Otero (Cuba)%DIFDELCMD < %DIFDELCMD < %%% Theotonio Dos Santos (Brazil) Fernando Morais (Brazil, writer, journalist)%DIFDELCMD < %DIFDELCMD < %%% Georges Labica (France) Saul Landau (USA)%DIFDELCMD < %DIFDELCMD < %%% Hernando Calvo Ospina (Colombia, writer, journalist) Pascual Serrano (Spain)%DIFDELCMD < %DIFDELCMD < %%% Domenico Losurdo (Italy) Gilberto Lopez y Rivas%DIFDELCMD < %DIFDELCMD < %%% Ramon Chao (Spain, musician, writer, journalist) James D. Cockcroft%DIFDELCMD < %DIFDELCMD < %%% Santiago Alba Rico Alex Cox%DIFDELCMD < %DIFDELCMD < %%% Stella Calloni (Argentina, writer, journalist) Carlo Frabetti (Italy, journalist, writer)%DIFDELCMD < %DIFDELCMD < %%% Carlos Fazio (Mexico, journalist, writer) Miguel D'Escoto (Nicaragua, priest)%DIFDELCMD < %DIFDELCMD < %%% Miguel Urbano (Portugal, journalist) Juan Brom%DIFDELCMD < %DIFDELCMD < %%% Luis Hern\u00e1ndez Navarro (Mexico, journalist) Andr\u00e9s Sorel (Spanish, writer)%DIFDELCMD < %DIFDELCMD < %%% John Gerassi (USA, Professor) Marcos Roitman Rosenmann (Spain, Professor)%DIFDELCMD < %DIFDELCMD < %%% David L. Raby Manuel Cabieses (Chile, journalist)%DIFDELCMD < %DIFDELCMD < %%% Eva Forest%DIFDELCMD < %DIFDELCMD < %%% Rev. Ra\u00fal Su\u00e1rez(Cuba)%DIFDELCMD < %DIFDELCMD < %%% Francisco Jarauta%DIFDELCMD < %DIFDELCMD < %%% Eva Sastre Forest%DIFDELCMD < %DIFDELCMD < %%% General Vasco Gon\u00e7alves%DIFDELCMD < %DIFDELCMD < %%% H\u00e9ctor D\u00edaz-Polanco%DIFDELCMD < %DIFDELCMD < %%% Manuel Talens (Spanish, writer)%DIFDELCMD < %DIFDELCMD < %%% Alejandro Moreano (Equador, journalist)%DIFDELCMD < %DIFDELCMD < %%% Pablo Armando Fern\u00e1ndez (Cuba,writer)%DIFDELCMD < %DIFDELCMD < %%% Keith Ellis%DIFDELCMD < %DIFDELCMD < %%% Dick Emanuelsson (Colombia, journalist)%DIFDELCMD < %DIFDELCMD < %%% Carlos Fern\u00e1ndez Liria (Venezuela, writer)%DIFDELCMD < %DIFDELCMD < %%% Horacio A. L\u00f3pez%DIFDELCMD < %DIFDELCMD < %%% Angeles Maestro%DIFDELCMD < %DIFDELCMD < %%% V\u00edctor R\u00edos%DIFDELCMD < %DIFDELCMD < %%% Danielle Bleitrach%DIFDELCMD < %DIFDELCMD < %%% Alcira Argumedo%DIFDELCMD < %DIFDELCMD < %%% Quintin Cabrera%DIFDELCMD < %DIFDELCMD < %%% Mark Rosenzweig%DIFDELCMD < %DIFDELCMD < %%% Arturo Corchera%DIFDELCMD < %DIFDELCMD < %%% Cuauht\u00e9moc Amezcua Dromundo%DIFDELCMD < %DIFDELCMD < %%% Tubal P\u00e1ez%DIFDELCMD < %DIFDELCMD < %%% Irene Amador%DIFDELCMD < %DIFDELCMD < %%% Roger Grevoul%DIFDELCMD < %DIFDELCMD < %%% Julie Ruben%DIFDELCMD < %DIFDELCMD < %%% Anamar\u00eda D\u00edaz%DIFDELCMD < %DIFDELCMD < %%% Carlos Alberto de Almeida%DIFDELCMD < %DIFDELCMD < %%% Alberto Lecchi%DIFDELCMD < %DIFDELCMD < %%% Rosa Miriam Elizalde%DIFDELCMD < %DIFDELCMD < %%% Fran\u00e7ois Duteil%DIFDELCMD < %DIFDELCMD < %%% Humberto Tumini%DIFDELCMD < %DIFDELCMD < %%% Carlos Tena%DIFDELCMD < %DIFDELCMD < %%% Elizabeth Martinez%DIFDELCMD < %DIFDELCMD < %%% Juan Carlos Monedero%DIFDELCMD < %DIFDELCMD < %%% Solange R. Echeverria%DIFDELCMD < %DIFDELCMD < %%% Vicente Romano%DIFDELCMD < %DIFDELCMD < %%% Jane de la Selva%DIFDELCMD < %DIFDELCMD < %%% C\u00e9sar Fern\u00e1ndez%DIFDELCMD < %DIFDELCMD < %%% Norma N\u00fa\u00f1ez Montoto%DIFDELCMD < %DIFDELCMD < %%% Marcela Cornejo Z.%DIFDELCMD < %DIFDELCMD < %%% Laurindo Leal Filho%DIFDELCMD < %DIFDELCMD < %%% Nayar L\u00f3pez Castellanos%DIFDELCMD < %DIFDELCMD < %%% Julio C. Gambina%DIFDELCMD < %DIFDELCMD < %%% Octavio Mercado Gonz\u00e1lez%DIFDELCMD < %DIFDELCMD < %%% Olivia Vidal L\u00f3pez%DIFDELCMD < %DIFDELCMD < %%% Miguel \u00c1ngel Buenrostro%DIFDELCMD < %DIFDELCMD < %%% Juan Carlos Volnovich%DIFDELCMD < %DIFDELCMD < %%% Berta Joubert-Ceci%DIFDELCMD < %DIFDELCMD < %%% Jorge Ceballos%DIFDELCMD < %DIFDELCMD < %%% Isaac Rudnik%DIFDELCMD < %DIFDELCMD < %%% Hildebrando P\u00e8rez Grande%DIFDELCMD < %DIFDELCMD < %%% Manuel Ortega Hegg%DIFDELCMD < %DIFDELCMD < %%% H\u00e9lio Doyle%DIFDELCMD < %DIFDELCMD < %%% Dr. Rub\u00e9n Cant\u00fa Chapa%DIFDELCMD < %DIFDELCMD < %%% Corina Mestre%DIFDELCMD < %DIFDELCMD < %%% Manuel Sa Marques%DIFDELCMD < %DIFDELCMD < %%% Oscar-Ren\u00e9 Vargas%DIFDELCMD < %DIFDELCMD < %%% Henri Alleg%DIFDELCMD < %DIFDELCMD < %%% Roberto Mastroianni%DIFDELCMD < %DIFDELCMD < %%% Daniel Chavarr\u00eda%DIFDELCMD < %DIFDELCMD < %%% El\u00edas Letelier-Ruz%DIFDELCMD < %DIFDELCMD < %%% Pedro Pablo Rodr\u00edguez%DIFDELCMD < %DIFDELCMD < %%% Beatriz Rajland%DIFDELCMD < %DIFDELCMD < %%% Victor Casaus%DIFDELCMD < %DIFDELCMD < %%% Luciana Castellina%DIFDELCMD < %DIFDELCMD < %%% Jorge Ra\u00fal Rodr\u00edguez%DIFDELCMD < %DIFDELCMD < %%% Adalberto Santana%DIFDELCMD < %DIFDELCMD < %%% Rolando Rodr\u00edguez%DIFDELCMD < %DIFDELCMD < %%% Lourdes Gonz\u00e1lez%DIFDELCMD < %DIFDELCMD < %%% Rita Terranova%DIFDELCMD < %DIFDELCMD < %%% Alicia Castellanos%DIFDELCMD < %DIFDELCMD < %%% Rolando Gonz\u00e1lez Patricio%DIFDELCMD < %DIFDELCMD < %%% Paulina Fernandez%DIFDELCMD < %DIFDELCMD < %%% Vicente Feli\u00fa%DIFDELCMD < %DIFDELCMD < %%% Rafael Cuevas Molina%DIFDELCMD < %DIFDELCMD < %%% Carlos A. Lozano Guill\u00e9n%DIFDELCMD < %DIFDELCMD < %%% Ra\u00fal Villegas D\u00e1valos%DIFDELCMD < %DIFDELCMD < %%% Sergio Guerra%DIFDELCMD < %DIFDELCMD < %%% Enrique Ubieta%DIFDELCMD < %DIFDELCMD < %%% Fernando L\u00f3pez D\u00b4Alejandro%DIFDELCMD < %DIFDELCMD < %%% Ana Daglio%DIFDELCMD < %DIFDELCMD < %%% Oscar Gonz\u00e1lez%DIFDELCMD < %DIFDELCMD < %%% Jorge Timossi%DIFDELCMD < %DIFDELCMD < %%% Carlos Oliva%DIFDELCMD < %DIFDELCMD < %%% Ana Mar\u00eda Vera Smith%DIFDELCMD < %DIFDELCMD < %%% Salvador L\u00f3pez Arnal%DIFDELCMD < %DIFDELCMD < %%% Jos\u00e9 Dos Santos%DIFDELCMD < %DIFDELCMD < %%% Humberto Arenal%DIFDELCMD < %DIFDELCMD < %%% Iris Galindo%DIFDELCMD < %DIFDELCMD < %%% Jaime M\u00fchlrad Zimmermann%DIFDELCMD < %DIFDELCMD < %%% Pedro de la Hoz%DIFDELCMD < %DIFDELCMD < %%% Maritza Capote%DIFDELCMD < %DIFDELCMD < %%% Enrique Cirules%DIFDELCMD < %DIFDELCMD < %%% Carlos Alzugaray Treto%DIFDELCMD < %DIFDELCMD < %%% Toty Flores, Argentina.%DIFDELCMD < %DIFDELCMD < %%% Daniel Rodr\u00edguez%DIFDELCMD < %DIFDELCMD < %%% Alberto Faya%DIFDELCMD < %DIFDELCMD < %%% Marilyn Bobes%DIFDELCMD < %DIFDELCMD < %%% Miguel Alvarez%DIFDELCMD < %DIFDELCMD < %%% Carlos Roberto%DIFDELCMD < %DIFDELCMD < %%% Alberto Luis Tabares%DIFDELCMD < %DIFDELCMD < %%% Daniel De Santis Mesa%DIFDELCMD < %DIFDELCMD < %%% Manuel Henr\u00edquez Lagarde%DIFDELCMD < %DIFDELCMD < %%% Mar\u00eda Toledano%DIFDELCMD < %DIFDELCMD < %%% Manuel Fern\u00e1ndez-Cuesta%DIFDELCMD < %DIFDELCMD < %%% Rafael Hern\u00e1ndez%DIFDELCMD < %DIFDELCMD < %%% Manuel L\u00f3pez Oliva%DIFDELCMD < %DIFDELCMD < %%% Santiago Pujol%DIFDELCMD < %DIFDELCMD < %%% Aurelio Alonso Tejada%DIFDELCMD < %DIFDELCMD < %%% Alberto Guerra Naranjo%DIFDELCMD < %DIFDELCMD < %%% Felix Contreras%DIFDELCMD < %DIFDELCMD < %%% Magaly S\u00e1nchez Ochoa%DIFDELCMD < %DIFDELCMD < %%% Marina Norma Rodriguez Lopez%DIFDELCMD < %DIFDELCMD < %%% Lino Arturo Neira Betancourt%DIFDELCMD < %DIFDELCMD < %%% Jos\u00e9 Luis Fari\u00f1as%DIFDELCMD < %DIFDELCMD < %%% Juana Garc\u00eda Ab\u00e1s%DIFDELCMD < %DIFDELCMD < %%% Virtudes Feli\u00fa%DIFDELCMD < %DIFDELCMD < %%% Gioia Minuti%DIFDELCMD < %DIFDELCMD < %%% References%DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% See Also Uribe-Chavez meeting postponed February 4, 2005. Venezuela-Colombia crisis:Castro intervenes, Chavez and Uribe scheduled to meet February 01, 2005. Venezuela-Colombia crisis continues January 24, 2005. Brazilian President meets President of Colombia January 20, 2005. Colombia releases official notice in response to Venezuela, January 17, 2005. Capture of FARC member creates crisis between Venezuela and Colombia, January 15, 2005.%DIFDELCMD < %DIFDELCMD < %%% Category:January 17, 2005 Category:Colombia Category:Venezuela Category:South America Category:Politics and conflicts Category:Published%DIFDELCMD < %DIFDELCMD < %%% Category:Hugo Chave", "after_revision": " %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% Related news", "edit_actions": [{"type": "D", "before": "Open letter from international intellectuals, to the international public opinion", "after": null, "start_char_pos": 0, "end_char_pos": 81}, {"type": "D", "before": "The kidnapping of Rodrigo Granda, carried out in Venezuelan territory presumably by agents of the Colombian police, is an attempt to create difficulties between both countries in order to debilitate the Bolivarian movement. An additional effect is to reduce the international prestige of the conduct of President Hugo Ch\u00e1vez creating doubts about a possible Venezuelan implication in said kidnapping. All intended to cause a possible armed intervention of the United States as a result of the conflict.", "after": null, "start_char_pos": 82, "end_char_pos": 584}, {"type": "D", "before": "In view of this stratagem, the undersigned, artists, writers, intellectuals of Our America and the world declare our unrestricted support to the process of social change initiated in Venezuela and declare our adhesion and solidarity to the Bolivarian movement and the diaphanous conduct of its leader President Hugo Ch\u00e1vez Fr\u00edas.", "after": null, "start_char_pos": 614, "end_char_pos": 943}, {"type": "D", "before": "Ernesto Cardenal (Nicaragua)", "after": null, "start_char_pos": 944, "end_char_pos": 972}, {"type": "D", "before": "Alfonso Sastre (Spain)", "after": null, "start_char_pos": 1002, "end_char_pos": 1024}, {"type": "D", "before": "Atilio Bor\u00f3n (Argentina)", "after": null, "start_char_pos": 1025, "end_char_pos": 1049}, {"type": "D", "before": "Emir Sader (Brazil,professor)", "after": null, "start_char_pos": 1079, "end_char_pos": 1108}, {"type": "D", "before": "Lisandro Otero (Cuba)", "after": null, "start_char_pos": 1109, "end_char_pos": 1130}, {"type": "D", "before": "Theotonio Dos Santos (Brazil)", "after": null, "start_char_pos": 1160, "end_char_pos": 1189}, {"type": "D", "before": "Fernando Morais (Brazil, writer, journalist)", "after": null, "start_char_pos": 1190, "end_char_pos": 1234}, {"type": "D", "before": "Georges Labica (France)", "after": null, "start_char_pos": 1264, "end_char_pos": 1287}, {"type": "D", "before": "Saul Landau (USA)", "after": null, "start_char_pos": 1288, "end_char_pos": 1305}, {"type": "D", "before": "Hernando Calvo Ospina (Colombia, writer, journalist)", "after": null, "start_char_pos": 1335, "end_char_pos": 1387}, {"type": "D", "before": "Pascual Serrano (Spain)", "after": null, "start_char_pos": 1388, "end_char_pos": 1411}, {"type": "D", "before": "Domenico Losurdo (Italy)", "after": null, "start_char_pos": 1441, "end_char_pos": 1465}, {"type": "D", "before": "Gilberto Lopez y Rivas", "after": null, "start_char_pos": 1466, "end_char_pos": 1488}, {"type": "D", "before": "Ramon Chao (Spain, musician, writer, journalist)", "after": null, "start_char_pos": 1518, "end_char_pos": 1566}, {"type": "D", "before": "James D. Cockcroft", "after": null, "start_char_pos": 1567, "end_char_pos": 1585}, {"type": "D", "before": "Santiago Alba Rico", "after": null, "start_char_pos": 1615, "end_char_pos": 1633}, {"type": "D", "before": "Alex Cox", "after": null, "start_char_pos": 1634, "end_char_pos": 1642}, {"type": "D", "before": "Stella Calloni (Argentina, writer, journalist)", "after": null, "start_char_pos": 1672, "end_char_pos": 1718}, {"type": "D", "before": "Carlo Frabetti (Italy, journalist, writer)", "after": null, "start_char_pos": 1719, "end_char_pos": 1761}, {"type": "D", "before": "Carlos Fazio (Mexico, journalist, writer)", "after": null, "start_char_pos": 1791, "end_char_pos": 1832}, {"type": "D", "before": "Miguel D'Escoto (Nicaragua, priest)", "after": null, "start_char_pos": 1833, "end_char_pos": 1868}, {"type": "D", "before": "Miguel Urbano (Portugal, journalist)", "after": null, "start_char_pos": 1898, "end_char_pos": 1934}, {"type": "D", "before": "Juan Brom", "after": null, "start_char_pos": 1935, "end_char_pos": 1944}, {"type": "D", "before": "Luis Hern\u00e1ndez Navarro (Mexico, journalist)", "after": null, "start_char_pos": 1974, "end_char_pos": 2017}, {"type": "D", "before": "Andr\u00e9s Sorel (Spanish, writer)", "after": null, "start_char_pos": 2018, "end_char_pos": 2048}, {"type": "D", "before": "John Gerassi (USA, Professor)", "after": null, "start_char_pos": 2078, "end_char_pos": 2107}, {"type": "D", "before": "Marcos Roitman Rosenmann (Spain, Professor)", "after": null, "start_char_pos": 2108, "end_char_pos": 2151}, {"type": "D", "before": "David L. Raby", "after": null, "start_char_pos": 2181, "end_char_pos": 2194}, {"type": "D", "before": "Manuel Cabieses (Chile, journalist)", "after": null, "start_char_pos": 2195, "end_char_pos": 2230}, {"type": "D", "before": "Eva Forest", "after": null, "start_char_pos": 2260, "end_char_pos": 2270}, {"type": "D", "before": "Rev. Ra\u00fal Su\u00e1rez(Cuba)", "after": null, "start_char_pos": 2300, "end_char_pos": 2322}, {"type": "D", "before": "Francisco Jarauta", "after": null, "start_char_pos": 2352, "end_char_pos": 2369}, {"type": "D", "before": "Eva Sastre Forest", "after": null, "start_char_pos": 2399, "end_char_pos": 2416}, {"type": "D", "before": "General Vasco Gon\u00e7alves", "after": null, "start_char_pos": 2446, "end_char_pos": 2469}, {"type": "D", "before": "H\u00e9ctor D\u00edaz-Polanco", "after": null, "start_char_pos": 2499, "end_char_pos": 2518}, {"type": "D", "before": "Manuel Talens (Spanish, writer)", "after": null, "start_char_pos": 2548, "end_char_pos": 2579}, {"type": "D", "before": "Alejandro Moreano (Equador, journalist)", "after": null, "start_char_pos": 2609, "end_char_pos": 2648}, {"type": "D", "before": "Pablo Armando Fern\u00e1ndez (Cuba,writer)", "after": null, "start_char_pos": 2678, "end_char_pos": 2715}, {"type": "D", "before": "Keith Ellis", "after": null, "start_char_pos": 2745, "end_char_pos": 2756}, {"type": "D", "before": "Dick Emanuelsson (Colombia, journalist)", "after": null, "start_char_pos": 2786, "end_char_pos": 2825}, {"type": "D", "before": "Carlos Fern\u00e1ndez Liria (Venezuela, writer)", "after": null, "start_char_pos": 2855, "end_char_pos": 2897}, {"type": "D", "before": "Horacio A. L\u00f3pez", "after": null, "start_char_pos": 2927, "end_char_pos": 2943}, {"type": "D", "before": "Angeles Maestro", "after": null, "start_char_pos": 2973, "end_char_pos": 2988}, {"type": "D", "before": "V\u00edctor R\u00edos", "after": null, "start_char_pos": 3018, "end_char_pos": 3029}, {"type": "D", "before": "Danielle Bleitrach", "after": null, "start_char_pos": 3059, "end_char_pos": 3077}, {"type": "D", "before": "Alcira Argumedo", "after": null, "start_char_pos": 3107, "end_char_pos": 3122}, {"type": "D", "before": "Quintin Cabrera", "after": null, "start_char_pos": 3152, "end_char_pos": 3167}, {"type": "D", "before": "Mark Rosenzweig", "after": null, "start_char_pos": 3197, "end_char_pos": 3212}, {"type": "D", "before": "Arturo Corchera", "after": null, "start_char_pos": 3242, "end_char_pos": 3257}, {"type": "D", "before": "Cuauht\u00e9moc Amezcua Dromundo", "after": null, "start_char_pos": 3287, "end_char_pos": 3314}, {"type": "D", "before": "Tubal P\u00e1ez", "after": null, "start_char_pos": 3344, "end_char_pos": 3354}, {"type": "D", "before": "Irene Amador", "after": null, "start_char_pos": 3384, "end_char_pos": 3396}, {"type": "D", "before": "Roger Grevoul", "after": null, "start_char_pos": 3426, "end_char_pos": 3439}, {"type": "D", "before": "Julie Ruben", "after": null, "start_char_pos": 3469, "end_char_pos": 3480}, {"type": "D", "before": "Anamar\u00eda D\u00edaz", "after": null, "start_char_pos": 3510, "end_char_pos": 3523}, {"type": "D", "before": "Carlos Alberto de Almeida", "after": null, "start_char_pos": 3553, "end_char_pos": 3578}, {"type": "D", "before": "Alberto Lecchi", "after": null, "start_char_pos": 3608, "end_char_pos": 3622}, {"type": "D", "before": "Rosa Miriam Elizalde", "after": null, "start_char_pos": 3652, "end_char_pos": 3672}, {"type": "D", "before": "Fran\u00e7ois Duteil", "after": null, "start_char_pos": 3702, "end_char_pos": 3717}, {"type": "D", "before": "Humberto Tumini", "after": null, "start_char_pos": 3747, "end_char_pos": 3762}, {"type": "D", "before": "Carlos Tena", "after": null, "start_char_pos": 3792, "end_char_pos": 3803}, {"type": "D", "before": "Elizabeth Martinez", "after": null, "start_char_pos": 3833, "end_char_pos": 3851}, {"type": "D", "before": "Juan Carlos Monedero", "after": null, "start_char_pos": 3881, "end_char_pos": 3901}, {"type": "D", "before": "Solange R. Echeverria", "after": null, "start_char_pos": 3931, "end_char_pos": 3952}, {"type": "D", "before": "Vicente Romano", "after": null, "start_char_pos": 3982, "end_char_pos": 3996}, {"type": "D", "before": "Jane de la Selva", "after": null, "start_char_pos": 4026, "end_char_pos": 4042}, {"type": "D", "before": "C\u00e9sar Fern\u00e1ndez", "after": null, "start_char_pos": 4072, "end_char_pos": 4087}, {"type": "D", "before": "Norma N\u00fa\u00f1ez Montoto", "after": null, "start_char_pos": 4117, "end_char_pos": 4136}, {"type": "D", "before": "Marcela Cornejo Z.", "after": null, "start_char_pos": 4166, "end_char_pos": 4184}, {"type": "D", "before": "Laurindo Leal Filho", "after": null, "start_char_pos": 4214, "end_char_pos": 4233}, {"type": "D", "before": "Nayar L\u00f3pez Castellanos", "after": null, "start_char_pos": 4263, "end_char_pos": 4286}, {"type": "D", "before": "Julio C. Gambina", "after": null, "start_char_pos": 4316, "end_char_pos": 4332}, {"type": "D", "before": "Octavio Mercado Gonz\u00e1lez", "after": null, "start_char_pos": 4362, "end_char_pos": 4386}, {"type": "D", "before": "Olivia Vidal L\u00f3pez", "after": null, "start_char_pos": 4416, "end_char_pos": 4434}, {"type": "D", "before": "Miguel \u00c1ngel Buenrostro", "after": null, "start_char_pos": 4464, "end_char_pos": 4487}, {"type": "D", "before": "Juan Carlos Volnovich", "after": null, "start_char_pos": 4517, "end_char_pos": 4538}, {"type": "D", "before": "Berta Joubert-Ceci", "after": null, "start_char_pos": 4568, "end_char_pos": 4586}, {"type": "D", "before": "Jorge Ceballos", "after": null, "start_char_pos": 4616, "end_char_pos": 4630}, {"type": "D", "before": "Isaac Rudnik", "after": null, "start_char_pos": 4660, "end_char_pos": 4672}, {"type": "D", "before": "Hildebrando P\u00e8rez Grande", "after": null, "start_char_pos": 4702, "end_char_pos": 4726}, {"type": "D", "before": "Manuel Ortega Hegg", "after": null, "start_char_pos": 4756, "end_char_pos": 4774}, {"type": "D", "before": "H\u00e9lio Doyle", "after": null, "start_char_pos": 4804, "end_char_pos": 4815}, {"type": "D", "before": "Dr. Rub\u00e9n Cant\u00fa Chapa", "after": null, "start_char_pos": 4845, "end_char_pos": 4866}, {"type": "D", "before": "Corina Mestre", "after": null, "start_char_pos": 4896, "end_char_pos": 4909}, {"type": "D", "before": "Manuel Sa Marques", "after": null, "start_char_pos": 4939, "end_char_pos": 4956}, {"type": "D", "before": "Oscar-Ren\u00e9 Vargas", "after": null, "start_char_pos": 4986, "end_char_pos": 5003}, {"type": "D", "before": "Henri Alleg", "after": null, "start_char_pos": 5033, "end_char_pos": 5044}, {"type": "D", "before": "Roberto Mastroianni", "after": null, "start_char_pos": 5074, "end_char_pos": 5093}, {"type": "D", "before": "Daniel Chavarr\u00eda", "after": null, "start_char_pos": 5123, "end_char_pos": 5139}, {"type": "D", "before": "El\u00edas Letelier-Ruz", "after": null, "start_char_pos": 5169, "end_char_pos": 5187}, {"type": "D", "before": "Pedro Pablo Rodr\u00edguez", "after": null, "start_char_pos": 5217, "end_char_pos": 5238}, {"type": "D", "before": "Beatriz Rajland", "after": null, "start_char_pos": 5268, "end_char_pos": 5283}, {"type": "D", "before": "Victor Casaus", "after": null, "start_char_pos": 5313, "end_char_pos": 5326}, {"type": "D", "before": "Luciana Castellina", "after": null, "start_char_pos": 5356, "end_char_pos": 5374}, {"type": "D", "before": "Jorge Ra\u00fal Rodr\u00edguez", "after": null, "start_char_pos": 5404, "end_char_pos": 5424}, {"type": "D", "before": "Adalberto Santana", "after": null, "start_char_pos": 5454, "end_char_pos": 5471}, {"type": "D", "before": "Rolando Rodr\u00edguez", "after": null, "start_char_pos": 5501, "end_char_pos": 5518}, {"type": "D", "before": "Lourdes Gonz\u00e1lez", "after": null, "start_char_pos": 5548, "end_char_pos": 5564}, {"type": "D", "before": "Rita Terranova", "after": null, "start_char_pos": 5594, "end_char_pos": 5608}, {"type": "D", "before": "Alicia Castellanos", "after": null, "start_char_pos": 5638, "end_char_pos": 5656}, {"type": "D", "before": "Rolando Gonz\u00e1lez Patricio", "after": null, "start_char_pos": 5686, "end_char_pos": 5711}, {"type": "D", "before": "Paulina Fernandez", "after": null, "start_char_pos": 5741, "end_char_pos": 5758}, {"type": "D", "before": "Vicente Feli\u00fa", "after": null, "start_char_pos": 5788, "end_char_pos": 5801}, {"type": "D", "before": "Rafael Cuevas Molina", "after": null, "start_char_pos": 5831, "end_char_pos": 5851}, {"type": "D", "before": "Carlos A. Lozano Guill\u00e9n", "after": null, "start_char_pos": 5881, "end_char_pos": 5905}, {"type": "D", "before": "Ra\u00fal Villegas D\u00e1valos", "after": null, "start_char_pos": 5935, "end_char_pos": 5956}, {"type": "D", "before": "Sergio Guerra", "after": null, "start_char_pos": 5986, "end_char_pos": 5999}, {"type": "D", "before": "Enrique Ubieta", "after": null, "start_char_pos": 6029, "end_char_pos": 6043}, {"type": "D", "before": "Fernando L\u00f3pez D\u00b4Alejandro", "after": null, "start_char_pos": 6073, "end_char_pos": 6099}, {"type": "D", "before": "Ana Daglio", "after": null, "start_char_pos": 6129, "end_char_pos": 6139}, {"type": "D", "before": "Oscar Gonz\u00e1lez", "after": null, "start_char_pos": 6169, "end_char_pos": 6183}, {"type": "D", "before": "Jorge Timossi", "after": null, "start_char_pos": 6213, "end_char_pos": 6226}, {"type": "D", "before": "Carlos Oliva", "after": null, "start_char_pos": 6256, "end_char_pos": 6268}, {"type": "D", "before": "Ana Mar\u00eda Vera Smith", "after": null, "start_char_pos": 6298, "end_char_pos": 6318}, {"type": "D", "before": "Salvador L\u00f3pez Arnal", "after": null, "start_char_pos": 6348, "end_char_pos": 6368}, {"type": "D", "before": "Jos\u00e9 Dos Santos", "after": null, "start_char_pos": 6398, "end_char_pos": 6413}, {"type": "D", "before": "Humberto Arenal", "after": null, "start_char_pos": 6443, "end_char_pos": 6458}, {"type": "D", "before": "Iris Galindo", "after": null, "start_char_pos": 6488, "end_char_pos": 6500}, {"type": "D", "before": "Jaime M\u00fchlrad Zimmermann", "after": null, "start_char_pos": 6530, "end_char_pos": 6554}, {"type": "D", "before": "Pedro de la Hoz", "after": null, "start_char_pos": 6584, "end_char_pos": 6599}, {"type": "D", "before": "Maritza Capote", "after": null, "start_char_pos": 6629, "end_char_pos": 6643}, {"type": "D", "before": "Enrique Cirules", "after": null, "start_char_pos": 6673, "end_char_pos": 6688}, {"type": "D", "before": "Carlos Alzugaray Treto", "after": null, "start_char_pos": 6718, "end_char_pos": 6740}, {"type": "D", "before": "Toty Flores, Argentina.", "after": null, "start_char_pos": 6770, "end_char_pos": 6793}, {"type": "D", "before": "Daniel Rodr\u00edguez", "after": null, "start_char_pos": 6823, "end_char_pos": 6839}, {"type": "D", "before": "Alberto Faya", "after": null, "start_char_pos": 6869, "end_char_pos": 6881}, {"type": "D", "before": "Marilyn Bobes", "after": null, "start_char_pos": 6911, "end_char_pos": 6924}, {"type": "D", "before": "Miguel Alvarez", "after": null, "start_char_pos": 6954, "end_char_pos": 6968}, {"type": "D", "before": "Carlos Roberto", "after": null, "start_char_pos": 6998, "end_char_pos": 7012}, {"type": "D", "before": "Alberto Luis Tabares", "after": null, "start_char_pos": 7042, "end_char_pos": 7062}, {"type": "D", "before": "Daniel De Santis Mesa", "after": null, "start_char_pos": 7092, "end_char_pos": 7113}, {"type": "D", "before": "Manuel Henr\u00edquez Lagarde", "after": null, "start_char_pos": 7143, "end_char_pos": 7167}, {"type": "D", "before": "Mar\u00eda Toledano", "after": null, "start_char_pos": 7197, "end_char_pos": 7211}, {"type": "D", "before": "Manuel Fern\u00e1ndez-Cuesta", "after": null, "start_char_pos": 7241, "end_char_pos": 7264}, {"type": "D", "before": "Rafael Hern\u00e1ndez", "after": null, "start_char_pos": 7294, "end_char_pos": 7310}, {"type": "D", "before": "Manuel L\u00f3pez Oliva", "after": null, "start_char_pos": 7340, "end_char_pos": 7358}, {"type": "D", "before": "Santiago Pujol", "after": null, "start_char_pos": 7388, "end_char_pos": 7402}, {"type": "D", "before": "Aurelio Alonso Tejada", "after": null, "start_char_pos": 7432, "end_char_pos": 7453}, {"type": "D", "before": "Alberto Guerra Naranjo", "after": null, "start_char_pos": 7483, "end_char_pos": 7505}, {"type": "D", "before": "Felix Contreras", "after": null, "start_char_pos": 7535, "end_char_pos": 7550}, {"type": "D", "before": "Magaly S\u00e1nchez Ochoa", "after": null, "start_char_pos": 7580, "end_char_pos": 7600}, {"type": "D", "before": "Marina Norma Rodriguez Lopez", "after": null, "start_char_pos": 7630, "end_char_pos": 7658}, {"type": "D", "before": "Lino Arturo Neira Betancourt", "after": null, "start_char_pos": 7688, "end_char_pos": 7716}, {"type": "D", "before": "Jos\u00e9 Luis Fari\u00f1as", "after": null, "start_char_pos": 7746, "end_char_pos": 7763}, {"type": "D", "before": "Juana Garc\u00eda Ab\u00e1s", "after": null, "start_char_pos": 7793, "end_char_pos": 7810}, {"type": "D", "before": "Virtudes Feli\u00fa", "after": null, "start_char_pos": 7840, "end_char_pos": 7854}, {"type": "D", "before": "Gioia Minuti", "after": null, "start_char_pos": 7884, "end_char_pos": 7896}, {"type": "D", "before": "References", "after": null, "start_char_pos": 7926, "end_char_pos": 7936}, {"type": "D", "before": "See Also Uribe-Chavez meeting postponed February 4, 2005. Venezuela-Colombia crisis:Castro intervenes, Chavez and Uribe scheduled to meet February 01, 2005. Venezuela-Colombia crisis continues January 24, 2005. Brazilian President meets President of Colombia January 20, 2005. Colombia releases official notice in response to Venezuela, January 17, 2005. Capture of FARC member creates crisis between Venezuela and Colombia, January 15, 2005.", "after": null, "start_char_pos": 7979, "end_char_pos": 8421}, {"type": "D", "before": "Category:January 17, 2005 Category:Colombia Category:Venezuela Category:South America Category:Politics and conflicts Category:Published", "after": null, "start_char_pos": 8451, "end_char_pos": 8587}, {"type": "R", "before": "Category:Hugo Chave", "after": "Related news", "start_char_pos": 8617, "end_char_pos": 8636}], "sents_char_pos": [0, 305, 482, 584, 943, 1024, 1108, 1189, 1287, 1387, 1465, 1566, 1718, 1832, 1934, 2017, 2107, 2140, 2218, 2571, 2937, 2954, 2967, 2981, 2999, 3012, 3025, 3040, 3053, 3068, 3088, 3101, 3114, 3133, 3146, 3160, 3178, 3191, 3202, 3223, 3236, 3249, 3268, 3281, 3298, 3325, 3338, 3350, 3365, 3378, 3390, 3407, 3420, 3432, 3450, 3463, 3475, 3491, 3504, 3519, 3534, 3547, 3560, 3571, 3589, 3602, 3616, 3633, 3646, 3657, 3683, 3696, 4184, 4195, 4208, 4223, 4244, 4257, 4269, 4297, 4310, 4322, 4343, 4356, 4370, 4397, 4410, 4423, 4445, 4458, 4471, 4498, 4511, 4522, 4549, 4562, 4574, 4597, 4610, 4622, 4641, 4654, 4666, 4683, 4696, 4714, 4737, 4750, 4763, 4785, 4798, 4810, 4826, 4839, 4855, 4877, 4890, 4903, 4920, 4933, 4946, 4967, 4980, 4997, 5014, 5027, 5039, 5055, 5068, 5082, 5104, 5117, 5130, 5150, 5163, 5175, 5198, 5211, 5223, 5249, 5262, 5276, 5294, 5307, 5320, 5337, 5350, 5364, 5385, 5398, 5410, 5435, 5448, 5464, 5482, 5495, 5509, 5529, 5542, 5556, 5575, 5588, 5599, 5619, 5632, 5645, 5667, 5680, 5694, 5722, 5735, 5749, 5769, 5782, 5796, 5812, 5825, 5838, 5862, 5875, 5888, 5916, 5929, 5940, 5967, 5980, 5993, 6010, 6023, 6037, 6054, 6067, 6082, 6110, 6123, 6150, 6163, 6175, 6194, 6207, 6219, 6237, 6250, 6263, 6279, 6292, 6308, 6793, 6804, 6817, 6830, 6850, 6863, 6877, 6892, 6905, 6919, 6935, 6948, 6961, 6979, 6992, 7005, 7023, 7036, 7050, 7073, 7086, 7099, 7124, 7137, 7150, 7178, 7191, 7203, 7222, 7235, 7248, 7275, 7288, 7301, 7321, 7334, 7347, 7369, 7382, 7397, 7413, 7426, 7440, 7464, 7477, 7491, 7516, 7529, 7541, 8036, 8135, 8189, 8255, 8333, 8421]}
+{"doc_id": "33339", "revision_depth": "1", "before_revision": "The British newspaper Sunday Telegraph has reported on alleged plans for a U.S. attack on Iran. The plans were allegedly made in retaliation for Iran's uranium enrichment program due to suspicions that it is for military application in the development of nuclear weapons . The paper has also reported that the alleged plans to attack Iran may be a possible motivation for the development of nuclear weapons by Iran; there have been other threats of military response by both the U.S. and Israel . The nation of Iran. Graphic from the CIA World Factbook On February 12, 2006, the Sunday Telegraph claimed that strategists at the Pentagon are \"drawing up plans for devastating bombing raids backed by submarine-launched ballistic missile attacks against Iran's nuclear sites\" as '\"a last resort\" for the situation. Assessments of the time scale for Iran to possibly develop nuclear weapons include three to ten years. According to the Centre for Nonproliferation Studies , cities likely to be targets because of their alleged role in nuclear weapons development include medium-size towns such as Bushehr or Bushire (\u0628\u0648\u0634\u0647\u0631), population estimated as 165,000 (2005) and Arak with a population of about 511,000 (2005) and the small mountain town of Natanz . Just a few days earlier, an InterPress Service article by Gareth Porter reported that two ex-CIA operatives, Paul Pillar and Ellen Laipson, as saying that one of the main reasons motivating Iran to move towards developing nuclear weapons was the belief in a threat of attack by the United States and/or Israel . Just a few weeks earlier, on January 25, 2006, former UN weapons inspector Hans Blix recommended that the United States give a similar commitment not to attack Iran with either conventional or nuclear weapons, just as it apparently has given to North Korea , stating, \"regime changes, we know, from the outside are not that much of a panacea. So I think [the United States] should contemplate similar offers to Iran as they have to North Korea.\"", "after_revision": "The British newspaper has reported on alleged plans for a U.S. attack on Iran. The plans were allegedly made in retaliation for Iran's uranium enrichment program due to suspicions that it is for military application in the development of . The paper has also reported that the alleged plans to attack Iran may be a possible motivation for the development of nuclear weapons by Iran; there have been other of military response by both the U.S. and . The nation of Iran. Graphic from the CIA World Factbook On February 12, 2006, the Sunday Telegraph claimed that strategists at the are \"drawing up plans for devastating bombing raids backed by submarine-launched ballistic missile attacks against Iran's nuclear sites\" as '\"a last resort\" for the situation. Assessments of the time scale for include three to ten years. According to the , cities likely to be targets because of their alleged role in nuclear weapons development include medium-size towns such as or Bushire (\u0628\u0648\u0634\u0647\u0631), population estimated as 165,000 (2005) and with a population of about 511,000 (2005) and the small mountain town of . Just a few days earlier, an InterPress Service article by Gareth Porter reported that two ex-CIA operatives, Paul Pillar and Ellen Laipson, as saying that one of the main reasons motivating Iran to move towards developing nuclear weapons was the belief in a . Just a few weeks earlier, on January 25, 2006, former UN weapons inspector recommended that the United States give a similar commitment not to attack Iran with either conventional or nuclear weapons, just as it apparently has given to , stating, \"regime changes, we know, from the outside are not that much of a panacea. So I think [the United States] should contemplate similar offers to Iran as they have to North Korea.\"", "edit_actions": [{"type": "D", "before": "Sunday Telegraph", "after": null, "start_char_pos": 22, "end_char_pos": 38}, {"type": "D", "before": "nuclear weapons", "after": null, "start_char_pos": 255, "end_char_pos": 270}, {"type": "D", "before": "threats", "after": null, "start_char_pos": 438, "end_char_pos": 445}, {"type": "D", "before": "Israel", "after": null, "start_char_pos": 488, "end_char_pos": 494}, {"type": "D", "before": "Pentagon", "after": null, "start_char_pos": 628, "end_char_pos": 636}, {"type": "D", "before": "Iran to possibly develop nuclear weapons", "after": null, "start_char_pos": 847, "end_char_pos": 887}, {"type": "D", "before": "Centre for Nonproliferation Studies", "after": null, "start_char_pos": 933, "end_char_pos": 968}, {"type": "D", "before": "Bushehr", "after": null, "start_char_pos": 1094, "end_char_pos": 1101}, {"type": "D", "before": "Arak", "after": null, "start_char_pos": 1165, "end_char_pos": 1169}, {"type": "D", "before": "Natanz", "after": null, "start_char_pos": 1243, "end_char_pos": 1249}, {"type": "D", "before": "threat of attack by the United States and/or Israel", "after": null, "start_char_pos": 1510, "end_char_pos": 1561}, {"type": "D", "before": "Hans Blix", "after": null, "start_char_pos": 1639, "end_char_pos": 1648}, {"type": "D", "before": "North Korea", "after": null, "start_char_pos": 1809, "end_char_pos": 1820}], "sents_char_pos": [0, 95, 272, 415, 496, 516, 812, 915, 1160, 1211, 1276, 1360, 1391, 1589, 1906]}
+{"doc_id": "3366", "revision_depth": "1", "before_revision": "Category:United States Category:Politics and conflicts Category:Published Category:George W", "after_revision": "Category:United States Category:Politics and conflicts Category:Published Category:George W", "edit_actions": [], "sents_char_pos": [0]}
+{"doc_id": "33671", "revision_depth": "2", "before_revision": "The prosecutor did not withold complains for \"simple\" and \"severe\" physical harm by negligence against gendarmes Poget et Deiss in the trial of the Aubonne Bridge affair. Verdict will be given of Friday in the morning. A rope was put across the road: at one end, 20 metres above the river, militant Martin Shaw had tied himself; the rope would get up to the bridge, loop around the bareer , bar the road, loop again at the other bareer , and get down to its other end, with militant Gesine Wenzel. The rope was protected by two barrages of militantes and by posters reading \"Do not shoot\", and \"Stop here or you will kill two people\" (photo ). Neither Wenzel not Shaw had any form of security system and the rope was not tied to the bareers ; thus, the lifes of the two militants depended on the integrity of the rope barring the road. Both activists were invisible from the road, unless looking over the bareer . A dozen of minutes afterward, the police arrived and tried to fre the way for the 200 cars stalled by the blockade. The policemen saw the militants hanging at the end of the rope, and thus tried to have the cars drive below the rope by lifting it. Then, 25-year old gendarme Deiss, from Schaffouse, moved in and cut the rope with his knife. Gesine Wenzel was saved in extremis and pulled onto the bridge, shocked. Martin Shaw fell 20 metres into the shallow river, suffering severe injuries to his spine and several fractures; he had to spent one full month in Hospital to recover, and still suffers from his wounds. The clause of \"rupture of causality links\", which describes cases where things cannot be predicted, does ont apply here because one the situation was assessed, it was the duty of the policemen to warn their collegues. Ma\u00eetre Garbade, lawyer of the plaintifs, also underlined the risks of being softer with the police and of the feeling of impunity which could follow. Since policement are typically confronted to delinquents, he said, their errors bring the contect of the offences commited by their victimes , which tends to induce clemency for them (in the matter, the activists were trialed and convicted for blocking circulation). He also mentionned the difficulty of the investigation : the police was tempted to negate that a policeman had cut the rope, refused to aknowledge some testimonies, and gave immediate psychological support to Deiss, which was not done for the victims. \"I do not believe that this trial would have taken place if it was not for the two video recordings\", he said. Prosecutor M. Stoll, first substitute to the procuror, warned against the \"myth of police impunity\" and argued that he had recently requested and obtained conviction of two policemen. \"Then are no preferences within the prosecution \", he said. The prosecution went on arguing that the \"rupture of causality links\" did in fact apply, since the time between Poget realising the situation and Deiss cutting the rope was very brief (one minute). Absence of dialogue between the policemen and the militants was understandable because the protest was unexpected, illegal and dangerous (the activists had blocked the highway without any signs warning the motorists). The confuse messages of the posters was also alluded to ( \"Do not shoot\" and \"Stop here or you will kill two people\" ) , while a simple drawing of two people hanging from a bridge would have make the situation instantaneously clear for everybody; such drawings are featured on the web site of the activists. The prosecution conclued saying that the \"most probably cause\" of the accident was the protest itself, and dropped the charges. The lawyer for sergeant Poget External links Art. 125 du Code p\u00e9nal suisse Site des militants", "after_revision": "The prosecutor did not withold complains for \"simple\" and \"severe\" physical harm by negligence against gendarmes Poget and Deiss in the trial of the Aubonne Bridge affair. Verdict will be given of Friday in the morning. A rope was put across the road: at one end, 20 metres above the river, militant Martin Shaw had tied himself; the rope would get up to the bridge, loop around the barrier , bar the road, loop again at the other barrier , and get down to its other end, with militant Gesine Wenzel. The rope was protected by two barrages of militantes and by posters reading \"Do not shoot\", and \"Stop here or you will kill two people\" (photo ). Neither Wenzel not Shaw had any form of security system and the rope was not tied to the barriers ; thus, the lives of the two militants depended on the integrity of the rope barring the road. Both activists were invisible from the road, unless looking over the barrier . A dozen minutes afterward, the police arrived and tried to free the way for the 200 cars stalled by the blockade. The policemen saw the militants hanging at the end of the rope, and thus tried to have the cars drive below the rope by lifting it. Then, 25-year old gendarme Deiss, from Schaffouse, moved in and cut the rope with his knife. Gesine Wenzel was saved in extremis and pulled onto the bridge, shocked. Martin Shaw fell 20 metres into the shallow river, suffering severe injuries to his spine and several fractures; he had to spent one full month in hospital to recover, and still suffers from his wounds. The clause of \"rupture of causality links\", which describes cases where things cannot be predicted, does not apply here because once the situation was assessed, it was the duty of the policemen to warn their collegues. Ma\u00eetre Garbade, lawyer of the plaintifs, also underlined the risks of being softer with the police and of the feeling of impunity which could follow. Since policement are typically confronted to delinquents, he said, their errors bring to context the offences commited by their victims , which tends to induce clemency for them (in this matter, the activists were trialed and convicted for blocking traffic circulation). He also mentionned the difficulty of the investigation ; the police was tempted to negate that a policeman had cut the rope, refused to aknowledge some testimonies, and gave immediate psychological support to Deiss, which was not done for the victims. \"I do not believe that this trial would have taken place if it was not for the two video recordings\", he said. Prosecutor M. Stoll, first substitute to the procuror, warned against the \"myth of police impunity\" and argued that he had recently requested and obtained conviction of two policemen. \"Then are no preferences within the prosecution ,\" he said. The prosecution went on arguing that the \"rupture of causality links\" did in fact apply, since the time between Poget realising the situation and Deiss cutting the rope was very brief (one minute). Absence of dialogue between the policemen and the militants was understandable because the protest was unexpected, illegal and dangerous (the activists had blocked the highway without adequate signs warning the motorists). The confused messages of the posters were also alluded to \"Do not shoot\" and \"Stop here or you will kill two people\" , while a simple drawing of two people hanging from a bridge would have make the situation instantaneously clear for everybody; such drawings are featured on the web site of the activists. The prosecution conclued saying that the \"most probable cause\" of the accident was the protest itself, and dropped the charges. The lawyer for sergeant Poget External links Art. 125 du Swiss penal code Site of the militants", "edit_actions": [{"type": "R", "before": "et", "after": "and", "start_char_pos": 119, "end_char_pos": 121}, {"type": "R", "before": "bareer", "after": "barrier", "start_char_pos": 382, "end_char_pos": 388}, {"type": "R", "before": "bareer", "after": "barrier", "start_char_pos": 429, "end_char_pos": 435}, {"type": "R", "before": "bareers", "after": "barriers", "start_char_pos": 733, "end_char_pos": 740}, {"type": "R", "before": "lifes", "after": "lives", "start_char_pos": 753, "end_char_pos": 758}, {"type": "R", "before": "bareer", "after": "barrier", "start_char_pos": 905, "end_char_pos": 911}, {"type": "D", "before": "of", "after": null, "start_char_pos": 922, "end_char_pos": 924}, {"type": "R", "before": "fre", "after": "free", "start_char_pos": 976, "end_char_pos": 979}, {"type": "R", "before": "Hospital", "after": "hospital", "start_char_pos": 1475, "end_char_pos": 1483}, {"type": "R", "before": "ont", "after": "not", "start_char_pos": 1636, "end_char_pos": 1639}, {"type": "R", "before": "one", "after": "once", "start_char_pos": 1659, "end_char_pos": 1662}, {"type": "R", "before": "the contect of the", "after": "to context the", "start_char_pos": 1985, "end_char_pos": 2003}, {"type": "R", "before": "victimes", "after": "victims", "start_char_pos": 2031, "end_char_pos": 2039}, {"type": "R", "before": "the", "after": "this", "start_char_pos": 2086, "end_char_pos": 2089}, {"type": "A", "before": null, "after": "traffic", "start_char_pos": 2152, "end_char_pos": 2152}, {"type": "R", "before": ":", "after": ";", "start_char_pos": 2222, "end_char_pos": 2223}, {"type": "R", "before": "\",", "after": ",\"", "start_char_pos": 2762, "end_char_pos": 2764}, {"type": "R", "before": "any", "after": "adequate", "start_char_pos": 3156, "end_char_pos": 3159}, {"type": "R", "before": "confuse", "after": "confused", "start_char_pos": 3194, "end_char_pos": 3201}, {"type": "R", "before": "was", "after": "were", "start_char_pos": 3226, "end_char_pos": 3229}, {"type": "D", "before": "(", "after": null, "start_char_pos": 3246, "end_char_pos": 3247}, {"type": "D", "before": ")", "after": null, "start_char_pos": 3307, "end_char_pos": 3308}, {"type": "R", "before": "probably", "after": "probable", "start_char_pos": 3545, "end_char_pos": 3553}, {"type": "R", "before": "Code p\u00e9nal suisse Site des", "after": "Swiss penal code Site of the", "start_char_pos": 3683, "end_char_pos": 3709}], "sents_char_pos": [0, 170, 218, 328, 497, 643, 742, 835, 1029, 1161, 1254, 1327, 1440, 1530, 1748, 1898, 2166, 2418, 2529, 2713, 2773, 2971, 3189, 3436, 3497, 3625]}
+{"doc_id": "34710", "revision_depth": "1", "before_revision": "In it's announcement, the MPAA said it had commenced legal action against the following BitTorrent tracking sites\u2014isohunt.com, bthub.com, and torrentbox.com which are all owned by the same person; torrentspy.com; niteshadow.com as well as ed2k site ed2k-it.com and Usenet search engines\u2014nzb-zone.com, binnews.com, and dvdrs.net. Despite the announcement on it's website and in the media, the MPAA has failed to notify the administrator's of the sites involved directly. Joe from Binnews told Wikinews he only found out about the MPAA's actions after reading it on several news sites. He said \"At first, I double read the article making sure we were not being punk'd. But then I was shocked that we had to read about it publicly first. As of today (February 25), we have yet to get anything (from the MPAA)\". \" descds \", an administrator of dvdrs.net told Wikinews that the first he knew of the action being taken against the site was when he was approached by the press and users of his site. He said \"We haven't been informed by the MPAA and quite frankly are outraged by the method they have adopted to file these lawsuits. In actual fact we would still be none the wiser had our members and members of the press not have contacted us.\" \"When we found out about the filed lawsuit we was first worried (after all we are only a small site with limited funds), then shocked and finally outraged. Had the MPAA contacted us anytime in the sites history regards their concerns we would have happily worked with them to gain a resolve . \" he said. Binnews told Wikinews \"We do feel they should have notified first. We do not even have a confirmation this is for real.\" Dvdrs said \"We have stated many times had the MPAA personally contacted us we would have happily listened to their issues and acted accordingly. We are doing nothing wrong legally on our site and to be made look like an established piracy ring is an outrage. We have worked extremely hard on site to keep within international laws and they have publicly destroyed everything we have worked towards in the last 2 years. We are receiving negative PR and this is totally unacceptable.\" When questioned asked if Binnews ever received a takedown notice, Binnews replied \"Nope, we have never received a notice from anyone. My cell phone is tied to the site, we have proper DMCA guidelines on the site and no one has contacted us.\" When asked the same question, Dvdrs said \"No never. We would actively respond to any DMCA request quickly and efficiently. We fully support the law and would never try to evade anything within its scope. Had a DMCA been issued by any member, our site would have immediately deleted the offensive file.\" When asked how they would deal with a DMCA takedown notice, Binnews said \"We would act quite quickly. An email sent to the alert system is tied into all of \"staff\" members, my cell phone and my email.\" According to Dvdrs, they would be equally as compliant. \"We would immediately delete the offending file on our server and conduct a thorough research into any files that may also be connected to the one mentioned. We would also respond to the request personally with a follow up email expressing our actions . \" they said. Wikinews asked the administrators if they thought their sites were any different to conventional search engines like Google and Yahoo. Binnews replied \"No, you can goto any search engine and find just about anything.\" Dvdrs also shares Binnews' position telling Wikinews \"No. We index what is already readily available on commercial, tax paying, US based registered companies hard drives. All we are doing is pointing to files not on our network, much the same way google or any search bot operates. We do not host these files and without the premium paid service of third parties our marked up text based XML files are useless. We have never hosted illegal files and only offer information.\" Dvdrs has expressed that if the MPAA deems them illegal they should also target those who are actually hosting the files. Descds said \"We feel that should the MPAA deem us illegal then they must also target premium paid Usenet Providers who act as the transit for these files. Ironically both Easynews and Usenetserver offer both indexing and carrier for these files and yet have received no such lawsuits filed.\" On the other hand, Binnews was surprised that the MPAA did not target ISPs and Usenet providers in the first instance. \"Cut the head off and there is nothing for us to index and report on. If the ISPs acted in a proper manner and did what they are more than capable of, we would not be assisting people in combating piracy on their networks \" they said. Despite being outraged with the MPAA and it's actions, Descds said that despite being outside of US juristiction he is happy to assist the MPAA in anyway necessary. \"We would like it known for the record that we are actively trying to reach a resolve regards this action by the MPAA. We have contacted them and said openly many times we would welcome their input and act accordingly. Should they feel that NZBS are illegal we will remove those sections immediately and await a legal judgement on their legality. DVDRS is not a pirate network and to call us such has insulted our member base.\" \"I would also like it noted that although we host in the US i am actually a UK citizen who currently does not have to adhere to their communications and judgements. However, such is our resolve that I would happily comply should communication between us take place. We can offer little more to help this but hope that the MPAA retract their statement that we are an organised pirate network and restore our good name. Should the MPAA decide to not communicate with us and continue their legal actions we will instruct our attorneys and contact legal bodies like the EFF for help on this matter . \" he added. Binnews also had this to say of the MPAA's lawsuit - \"Binnews does not host any files, the claim that we read \"BinNews.com offers files for over 3,000 movies\" is 100\\% completely false. We do not host any files, never have and never will. We provide a legitimate service to copyright holders. No where on our site does it say, \"join us, we can give you free movies \". We do not even have pre-made nzb files.\" History of binnews and dvdrs.net Binnews started \"as a way to monitor what is on usenet \" according to Joe. \"Our intent is not and never has been to facilitate piracy. Its quite the opposite. We have several guides that explain how binnews can assist a company in getting rid of piracy . \" he said. Dvdrs.net started out as a community site in March, 2004 where people could discuss movies they loved, and hated, offer help to people with home cinema issues, discuss games and basically befriend members. descds said \"We have evolved several times and have always kept a keen eye on the laws of both local and international authorities.\" Dvdrs.net adopted NZBs at users' request several months after the site was launched. descds told Wikinews that the site had never been contacted by any legal representative to ask for the removal of NZB files. \"There has never been a law passed anywhere, as far as we are aware, that states NZB files are illegal to host. Had there been, we would have dropped them and continue with other aspects of our site. DVDRS is not all about indexing Usenet and has a very healthy community discussion group . \" he said.", "after_revision": "In its announcement, the MPAA said it had commenced legal action against the following BitTorrent tracking sites\u2014isohunt.com, bthub.com, and torrentbox.com , which are all owned by the same person; torrentspy.com; niteshadow.com as well as ed2k site ed2k-it.com and Usenet search engines\u2014nzb-zone.com, binnews.com, and dvdrs.net. Despite the announcement on its website and in the media, the MPAA has failed to notify the administrators of the sites involved directly. Joe from Binnews told Wikinews he only found out about the MPAA's actions after reading it on several news sites. He said , \"At first, I double read the article making sure we were not being punk'd. But then I was shocked that we had to read about it publicly first. As of today (February 25), we have yet to get anything (from the MPAA)\". \" Descds \", an administrator of dvdrs.net told Wikinews that the first he knew of the action being taken against the site was when he was approached by the press and users of his site. He said , \"We haven't been informed by the MPAA and quite frankly are outraged by the method they have adopted to file these lawsuits. In actual fact we would still be none the wiser had our members and members of the press not have contacted us.\" \"When we found out about the filed lawsuit we was first worried (after all we are only a small site with limited funds), then shocked and finally outraged. Had the MPAA contacted us anytime in the sites history regards their concerns we would have happily worked with them to gain a resolve , \" he said. Binnews told Wikinews , \"We do feel they should have notified first. We do not even have a confirmation this is for real.\" Dvdrs said , \"We have stated many times had the MPAA personally contacted us we would have happily listened to their issues and acted accordingly. We are doing nothing wrong legally on our site and to be made look like an established piracy ring is an outrage. We have worked extremely hard on site to keep within international laws and they have publicly destroyed everything we have worked towards in the last two years. We are receiving negative PR and this is totally unacceptable.\" When asked if Binnews ever received a takedown notice, Binnews replied , \"Nope, we have never received a notice from anyone. My cell phone is tied to the site, we have proper DMCA guidelines on the site and no one has contacted us.\" When asked the same question, Dvdrs said , \"No never. We would actively respond to any DMCA request quickly and efficiently. We fully support the law and would never try to evade anything within its scope. Had a DMCA been issued by any member, our site would have immediately deleted the offensive file.\" When asked how they would deal with a DMCA takedown notice, Binnews said , \"We would act quite quickly. An email sent to the alert system is tied into all of \"staff\" members, my cell phone and my email.\" According to Dvdrs, they would be equally as compliant. \"We would immediately delete the offending file on our server and conduct a thorough research into any files that may also be connected to the one mentioned. We would also respond to the request personally with a follow up email expressing our actions , \" they said. Wikinews asked the administrators if they thought their sites were any different to conventional search engines like Google and Yahoo. Binnews replied , \"No, you can go to any search engine and find just about anything.\" Dvdrs also shares Binnews' position telling Wikinews , \"No. We index what is already readily available on commercial, tax paying, US based registered companies hard drives. All we are doing is pointing to files not on our network, much the same way google or any search bot operates. We do not host these files and without the premium paid service of third parties our marked up text based XML files are useless. We have never hosted illegal files and only offer information.\" Dvdrs has expressed that if the MPAA deems them illegal they should also target those who are actually hosting the files. Descds said , \"We feel that should the MPAA deem us illegal then they must also target premium paid Usenet Providers who act as the transit for these files. Ironically both Easynews and Usenetserver offer both indexing and carrier for these files and yet have received no such lawsuits filed.\" On the other hand, Binnews was surprised that the MPAA did not target ISPs and Usenet providers in the first instance. \"Cut the head off and there is nothing for us to index and report on. If the ISPs acted in a proper manner and did what they are more than capable of, we would not be assisting people in combating piracy on their networks , \" they said. Despite being outraged with the MPAA and its actions, Descds said that despite being outside of US juristiction he is happy to assist the MPAA in anyway necessary. \"We would like it known for the record that we are actively trying to reach a resolve regards this action by the MPAA. We have contacted them and said openly many times we would welcome their input and act accordingly. Should they feel that NZBS are illegal we will remove those sections immediately and await a legal judgement on their legality. DVDRS is not a pirate network and to call us such has insulted our member base.\" \"I would also like it noted that although we host in the US i am actually a UK citizen who currently does not have to adhere to their communications and judgements. However, such is our resolve that I would happily comply should communication between us take place. We can offer little more to help this but hope that the MPAA retract their statement that we are an organised pirate network and restore our good name. Should the MPAA decide to not communicate with us and continue their legal actions we will instruct our attorneys and contact legal bodies like the EFF for help on this matter , \" he added. Binnews also had this to say of the MPAA's lawsuit : \"Binnews does not host any files, the claim that we read \"BinNews.com offers files for over 3,000 movies\" is 100\\% completely false. We do not host any files, never have and never will. We provide a legitimate service to copyright holders. No where on our site does it say, \"join us, we can give you free movies .\" We do not even have pre-made nzb files.\" History of binnews and dvdrs.net Binnews started \"as a way to monitor what is on usenet , \" according to Joe. \"Our intent is not and never has been to facilitate piracy. Its quite the opposite. We have several guides that explain how binnews can assist a company in getting rid of piracy , \" he said. Dvdrs.net started out as a community site in March, 2004 , where people could discuss movies they loved, and hated, offer help to people with home cinema issues, discuss games and basically befriend members. Descds said, \"We have evolved several times and have always kept a keen eye on the laws of both local and international authorities.\" Dvdrs.net adopted NZBs at users' request several months after the site was launched. Descds told Wikinews that the site had never been contacted by any legal representative to ask for the removal of NZB files. \"There has never been a law passed anywhere, as far as we are aware, that states NZB files are illegal to host. Had there been, we would have dropped them and continue with other aspects of our site. DVDRS is not all about indexing Usenet and has a very healthy community discussion group , \" he said.", "edit_actions": [{"type": "R", "before": "it's", "after": "its", "start_char_pos": 3, "end_char_pos": 7}, {"type": "A", "before": null, "after": ",", "start_char_pos": 157, "end_char_pos": 157}, {"type": "R", "before": "it's", "after": "its", "start_char_pos": 358, "end_char_pos": 362}, {"type": "R", "before": "administrator's", "after": "administrators", "start_char_pos": 423, "end_char_pos": 438}, {"type": "A", "before": null, "after": ",", "start_char_pos": 593, "end_char_pos": 593}, {"type": "R", "before": "descds", "after": "Descds", "start_char_pos": 812, "end_char_pos": 818}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1003, "end_char_pos": 1003}, {"type": "R", "before": ".", "after": ",", "start_char_pos": 1533, "end_char_pos": 1534}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1568, "end_char_pos": 1568}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1679, "end_char_pos": 1679}, {"type": "R", "before": "2", "after": "two", "start_char_pos": 2079, "end_char_pos": 2080}, {"type": "D", "before": "questioned", "after": null, "start_char_pos": 2157, "end_char_pos": 2167}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2234, "end_char_pos": 2234}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2436, "end_char_pos": 2436}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2772, "end_char_pos": 2772}, {"type": "R", "before": ".", "after": ",", "start_char_pos": 3210, "end_char_pos": 3211}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3376, "end_char_pos": 3376}, {"type": "R", "before": "goto", "after": "go to", "start_char_pos": 3390, "end_char_pos": 3394}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3497, "end_char_pos": 3497}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4054, "end_char_pos": 4054}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4676, "end_char_pos": 4676}, {"type": "R", "before": "it's", "after": "its", "start_char_pos": 4731, "end_char_pos": 4735}, {"type": "R", "before": ".", "after": ",", "start_char_pos": 5877, "end_char_pos": 5878}, {"type": "R", "before": "-", "after": ":", "start_char_pos": 5942, "end_char_pos": 5943}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 6256, "end_char_pos": 6258}, {"type": "A", "before": null, "after": ",", "start_char_pos": 6388, "end_char_pos": 6388}, {"type": "R", "before": ".", "after": ",", "start_char_pos": 6587, "end_char_pos": 6588}, {"type": "A", "before": null, "after": ",", "start_char_pos": 6657, "end_char_pos": 6657}, {"type": "R", "before": "descds said", "after": "Descds said,", "start_char_pos": 6807, "end_char_pos": 6818}, {"type": "R", "before": "descds", "after": "Descds", "start_char_pos": 7025, "end_char_pos": 7031}, {"type": "R", "before": ".", "after": ",", "start_char_pos": 7439, "end_char_pos": 7440}], "sents_char_pos": [0, 197, 213, 329, 470, 584, 668, 736, 809, 994, 1128, 1397, 1545, 1613, 1667, 1813, 1927, 2087, 2151, 2286, 2394, 2447, 2518, 2599, 2698, 2801, 2901, 2957, 3115, 3224, 3359, 3443, 3502, 3615, 3726, 3855, 3919, 4041, 4197, 4334, 4453, 4523, 4689, 4854, 4973, 5073, 5201, 5447, 5548, 5700, 5890, 6076, 6129, 6183, 6258, 6299, 6408, 6468, 6492, 6599, 6939, 7149, 7261, 7349]}
+{"doc_id": "34750", "revision_depth": "1", "before_revision": "The 1 ranked Duke Blue Devils lost to the Florida State Seminoles in NCAA Men's Basketball Wednesday night, by the score of 79-74 . The loss drops the Blue Devils to 27-2 while FSU improves to 18-8 . J.J. Redick led the Blue Devils with 30 points while the Seminoles were led by Alexander Thornton's 26. A bit of controversy was sparked when Florida State fans stormed the court early with 1.7 seconds left to play . At this juncture, Duke coach Mike Krzyzweski and his coaching staff left with all the players not in the game to the locker room. Krzyzweski said that he \"would think that security would not be ready for that type of thing. \" This was Duke's first ACC loss of the season. Earlier in the season , Duke narrowly escaped FSU at Cameron Indoor Stadium 97-96 in overtime", "after_revision": "The No. 1 ranked Duke Blue Devils lost to the unranked Florida State Seminoles 79-74 at FSU . The loss drops the Blue Devils to 27-2 (14-1 in the ACC) while FSU improves to 18-8 (8-7 in the ACC) . The Seminoles were led by Al Thornton, who was 15 for 16 at the freethrow line and scored 26 points in 36 minutes of play. Alexander Johnson brought in 22 points for FSU, shooting 10 of 13 at the line and bringing in 13 rebounds. Senior J.J. Redick led the Blue Devils with 30 points , including 4 three point shots, and fellow senior Shelden Williams had 20 points and 16 rebounds. Florida State fans swarmed the court with 1.7 seconds left to play , when the team was ahead 77-72. Duke coach Mike Krzyzweski sent all but the 5 Blue Devil players on the court to the locker room. The Seminoles were assessed a team technical foul, and Redick shot two free throws before play commenced. This marks Duke's first ACC loss of the season. In an earlier matchup , Duke narrowly escaped FSU at Cameron Indoor Stadium 97-96 in overtime", "edit_actions": [{"type": "A", "before": null, "after": "No.", "start_char_pos": 4, "end_char_pos": 4}, {"type": "A", "before": null, "after": "unranked", "start_char_pos": 43, "end_char_pos": 43}, {"type": "D", "before": "in NCAA Men's Basketball Wednesday night, by the score of", "after": null, "start_char_pos": 68, "end_char_pos": 125}, {"type": "A", "before": null, "after": "at FSU", "start_char_pos": 132, "end_char_pos": 132}, {"type": "A", "before": null, "after": "(14-1 in the ACC)", "start_char_pos": 174, "end_char_pos": 174}, {"type": "A", "before": null, "after": "(8-7 in the ACC)", "start_char_pos": 202, "end_char_pos": 202}, {"type": "A", "before": null, "after": "The Seminoles were led by Al Thornton, who was 15 for 16 at the freethrow line and scored 26 points in 36 minutes of play. Alexander Johnson brought in 22 points for FSU, shooting 10 of 13 at the line and bringing in 13 rebounds.", "start_char_pos": 205, "end_char_pos": 205}, {"type": "A", "before": null, "after": "Senior", "start_char_pos": 206, "end_char_pos": 206}, {"type": "R", "before": "while the Seminoles were led by Alexander Thornton's 26.", "after": ", including 4 three point shots, and fellow senior Shelden Williams had 20 points and 16 rebounds.", "start_char_pos": 254, "end_char_pos": 310}, {"type": "D", "before": "A bit of controversy was sparked when", "after": null, "start_char_pos": 311, "end_char_pos": 348}, {"type": "R", "before": "stormed the court early", "after": "swarmed the court", "start_char_pos": 368, "end_char_pos": 391}, {"type": "R", "before": ". At this juncture,", "after": ", when the team was ahead 77-72.", "start_char_pos": 422, "end_char_pos": 441}, {"type": "R", "before": "and his coaching staff left with all the players not in the game", "after": "sent all but the 5 Blue Devil players on the court", "start_char_pos": 469, "end_char_pos": 533}, {"type": "R", "before": "Krzyzweski said that he \"would think that security would not be ready for that type of thing. \"", "after": "The Seminoles were assessed a team technical foul, and Redick shot two free throws before play commenced.", "start_char_pos": 554, "end_char_pos": 649}, {"type": "R", "before": "was", "after": "marks", "start_char_pos": 655, "end_char_pos": 658}, {"type": "R", "before": "Earlier in the season", "after": "In an earlier matchup", "start_char_pos": 696, "end_char_pos": 717}], "sents_char_pos": [0, 134, 310, 423, 553, 647, 695]}
+{"doc_id": "35000", "revision_depth": "1", "before_revision": "250px|An Academy Award. The 78th Academy Awards were hosted by Jon Stewart , host of Comedy Central's The Daily Show . Crash won the Best Picture award, a surprise for many predictors. Co-producer Cathy Schulman commented \"[thank you for] embracing our film, about love and about tolerance, about truth. Thank you to the people all around the world who have been touched by this message. And we are humbled by the other nominees in this category. You have made this year one of the most breathtaking, and stunning, maverick years in American cinema, thank you.\" Paul Haggis and Bobby Moresco also won best original screenplay for Crash. Directed and co-produced by Canadian Paul Haggis, film distribution rights were purchased for just USD$3 million by Lions Gate Films. Noted film critic Roger Ebert called it his favourite picture of 2005, and the picture made many North American \"10 best\" lists. Backstage, Best Director winner Ang Lee commented to the press on how Brokeback Mountain refreshed his will to direct. \"Before I get into making this movie, I was very tired from two very ambitious work, The Hulk and Crouching Tiger, Hidden Dragon . I almost wanted to retire. I felt I had enough, I hit the bottom, sort of like my mid life crisis or something, and this movie teach me how to look at myself, how to manage myself in movie making again, enjoying making them, and the movie was shot very simple, nothing special, but most important, it taught me again, it's about human emotions, drama and acting.\" Foreign Language Film winner Gavin Hood ( Tsotsi ) commented that he felt the Oscar win would \"change the way South Africans view their moviemaking... hopefully it means that people will keep investing in our local stories, because this gives investors a little more confidence and what we want more than anything else is that people and human emotion is universal and we're more alike than we think we are around the world... we're actually so similar as human beings inside.\" Tsotsi was the People's Choice Award winner at the 2005 Toronto International Film Festival, while Crash debuted at the fest in 2004. Capote and Brokeback Mountain both played at the festival days after debuting at the Telluride Film Festival. TIFF's winners often go on to win Best Picture or Best Foreign Language Film; Wo hu cang long (Crouching Tiger, Hidden Dragon), American Beauty, and Whale Rider are such examples. At one point, Stewart jokingly chastised Hollywood for being \"out of touch\" with mainstream American values. Actor George Clooney later responded to this notion, saying, \"We are a little bit out of touch in Hollywood. It\u2019s probably a good thing. We\u2019re the ones that talked about AIDS when it was just being whispered. And we talked about civil rights when it wasn\u2019t really popular. We bring up subjects. This group of people gave Hattie McDaniel an Oscar in 1939 when blacks were still sitting in the backs of theaters. I\u2019m proud of this Academy, of this community. I\u2019m proud to be out of touch.\"", "after_revision": " The 78th were hosted by , host of 's . Crash won the Best Picture award, a surprise for many predictors. Co-producer commented \"[thank you for] embracing our film, about love and about tolerance, about truth. Thank you to the people all around the world who have been touched by this message. And we are humbled by the other nominees in this category. You have made this year one of the most breathtaking, and stunning, maverick years in American cinema, thank you.\" and also won best original screenplay for Crash. Directed and co-produced by Canadian Paul Haggis, film distribution rights were purchased for just USD$3 million by Lions Gate Films. Noted film critic called it his favourite picture of 2005, and the picture made many North American \"10 best\" lists. Backstage, Best Director winner commented to the press on how refreshed his will to direct. \"Before I get into making this movie, I was very tired from two very ambitious work, and . I almost wanted to retire. I felt I had enough, I hit the bottom, sort of like my mid life crisis or something, and this movie teach me how to look at myself, how to manage myself in movie making again, enjoying making them, and the movie was shot very simple, nothing special, but most important, it taught me again, it's about human emotions, drama and acting.\" Foreign Language Film winner Gavin Hood ( ) commented that he felt the Oscar win would \"change the way South Africans view their moviemaking... hopefully it means that people will keep investing in our local stories, because this gives investors a little more confidence and what we want more than anything else is that people and human emotion is universal and we're more alike than we think we are around the world... we're actually so similar as human beings inside.\" Tsotsi was the People's Choice Award winner at the 2005 Toronto International Film Festival, while Crash debuted at the fest in 2004. Capote and Brokeback Mountain both played at the festival days after debuting at the Telluride Film Festival. TIFF's winners often go on to win Best Picture or Best Foreign Language Film; (Crouching Tiger, Hidden Dragon), , and are such examples. At one point, Stewart jokingly chastised Hollywood for being \"out of touch\" with mainstream American values. Actor later responded to this notion, saying, \"We are a little bit out of touch in Hollywood. It\u2019s probably a good thing. We\u2019re the ones that talked about AIDS when it was just being whispered. And we talked about civil rights when it wasn\u2019t really popular. We bring up subjects. This group of people gave Hattie McDaniel an Oscar in 1939 when blacks were still sitting in the backs of theaters. I\u2019m proud of this Academy, of this community. I\u2019m proud to be out of touch.\"", "edit_actions": [{"type": "D", "before": "250px|An Academy Award.", "after": null, "start_char_pos": 0, "end_char_pos": 23}, {"type": "D", "before": "Academy Awards", "after": null, "start_char_pos": 33, "end_char_pos": 47}, {"type": "D", "before": "Jon Stewart", "after": null, "start_char_pos": 63, "end_char_pos": 74}, {"type": "R", "before": "Comedy Central's The Daily Show", "after": "'s", "start_char_pos": 85, "end_char_pos": 116}, {"type": "D", "before": "Cathy Schulman", "after": null, "start_char_pos": 197, "end_char_pos": 211}, {"type": "R", "before": "Paul Haggis and Bobby Moresco", "after": "and", "start_char_pos": 562, "end_char_pos": 591}, {"type": "D", "before": "Roger Ebert", "after": null, "start_char_pos": 789, "end_char_pos": 800}, {"type": "D", "before": "Ang Lee", "after": null, "start_char_pos": 932, "end_char_pos": 939}, {"type": "D", "before": "Brokeback Mountain", "after": null, "start_char_pos": 970, "end_char_pos": 988}, {"type": "R", "before": "The Hulk and Crouching Tiger, Hidden Dragon", "after": "and", "start_char_pos": 1104, "end_char_pos": 1147}, {"type": "D", "before": "Tsotsi", "after": null, "start_char_pos": 1556, "end_char_pos": 1562}, {"type": "D", "before": "Wo hu cang long", "after": null, "start_char_pos": 2314, "end_char_pos": 2329}, {"type": "R", "before": "American Beauty, and Whale Rider", "after": ", and", "start_char_pos": 2364, "end_char_pos": 2396}, {"type": "D", "before": "George Clooney", "after": null, "start_char_pos": 2531, "end_char_pos": 2545}], "sents_char_pos": [0, 23, 184, 303, 387, 446, 561, 636, 770, 899, 1018, 1149, 1176, 1513, 1991, 2125, 2235, 2313, 2415, 2524, 2633, 2661, 2733, 2797, 2819, 2935, 2981]}
+{"doc_id": "35104", "revision_depth": "1", "before_revision": "2006 Commonwealth Games Seventh Day of Competition By GoldPos. Country G S B Total 1 30px Australia 54 47 41 142 2 30px England21262168 3 30px| India 1611734 430px| Canada 11 22 16 49 530px Scotland 9 6 9 24 530px | South Africa 9 4 10 237 30pxJamaica 5229 830px| New Zealand 3 5 12 20 830px | Malaysia 3 3 4 10 8 30pxWales 3 1 7 11credit: Melbourne 2006 Full medal count", "after_revision": "2006 Commonwealth Games Eighth Day of Competition By GoldPos. Country G S B Total 1 30px Australia 57 51 45 135 2 30px England21282272 3 30px| India 1611734 430px| Canada 14 22 17 53 530px Scotland 10 7 9 26 630px | South Africa 9 4 10 237 30pxJamaica 52310 830px| New Zealand 4 5 12 21 930px | Malaysia 3 4 5 12 9 30pxWales 3 1 7 11credit: Melbourne 2006 Full medal count", "edit_actions": [{"type": "R", "before": "Seventh", "after": "Eighth", "start_char_pos": 24, "end_char_pos": 31}, {"type": "R", "before": "54 47 41 142", "after": "57 51 45 135", "start_char_pos": 100, "end_char_pos": 112}, {"type": "R", "before": "England21262168", "after": "England21282272", "start_char_pos": 120, "end_char_pos": 135}, {"type": "R", "before": "11", "after": "14", "start_char_pos": 172, "end_char_pos": 174}, {"type": "R", "before": "16 49", "after": "17 53", "start_char_pos": 178, "end_char_pos": 183}, {"type": "A", "before": null, "after": "10 7", "start_char_pos": 199, "end_char_pos": 199}, {"type": "R", "before": "6 9 24 530px", "after": "26 630px", "start_char_pos": 202, "end_char_pos": 214}, {"type": "R", "before": "5229", "after": "52310", "start_char_pos": 253, "end_char_pos": 257}, {"type": "R", "before": "3", "after": "4", "start_char_pos": 277, "end_char_pos": 278}, {"type": "R", "before": "20 830px", "after": "21 930px", "start_char_pos": 284, "end_char_pos": 292}, {"type": "D", "before": "3", "after": null, "start_char_pos": 306, "end_char_pos": 307}, {"type": "R", "before": "10 8", "after": "5 12 9", "start_char_pos": 310, "end_char_pos": 314}], "sents_char_pos": [0, 62]}
+{"doc_id": "35155", "revision_depth": "1", "before_revision": "The judge in the U.S. federal death penalty trial against Zacarias Moussaoui ruled on Friday that prosecutors can seek replacement witnesses for seven Federal Aviation Administration (FAA) employees whose testimony was tainted, and therefore disallowed because of pre-trial coaching by a Transportation Security Administration (TSA) lawyer. The 18-member jury (6 alternates) were sent home for a week while the court dealt with the revelation that government aviation security witness had been contacted prior to the trial by TSA lawyer Carla J. Martin , to help prepare their testimony in the case. Judge Leonie M. Brinkema initially ruled to prevent testimony from any aviation employees, but reversed her decision after the prosecution argued they would have little case left if their testimony remained inadmissible. FAA employee testimoney is expected to take the form of what measures would have been taken by the agency to prevent against the September 11, 2001 airliner attacks in New York City and Washington D.C. if Moussaoui had warned officials of the plan prior to the strikes. Defense attorney Edward B. MacMahon said that Moussaoui \"aspires to martyrdom,\" and called on jurors to deny the Al-Qaeda operative his wish to die. A wish that would result in him becoming \"a smiling face on a recruiting poster for Osama bin Laden ,\" MacMahon said. Moussaoui is believed by some to be the missing member in the team of 19 other attackers that carried out the suicide airliner strikes in New York City and Washington D.C. Arrested in Minnesota on immigration charges three weeks prior to the attacks, Moussaoui could have warned officials of the pending attacks, but failed to do so, argued Assistant U.S. Attorney Rob Spencer for the prosecution in opening statements. Family members of the nearly 3,000 killed in the attacks were able to watch the Alexandria , Virginia courtroom proceedings by closed-circuit television in six U.S. cities: New York, Boston, Central Islip, N.Y., Newark , N.J., and Philadelphia.", "after_revision": "The judge in the U.S. federal death penalty trial against ruled on Friday that prosecutors can seek replacement witnesses for seven (FAA) employees whose testimony was tainted, and therefore disallowed because of pre-trial coaching by a (TSA) lawyer. The 18-member jury (6 alternates) were sent home for a week while the court dealt with the revelation that government aviation security witness had been contacted prior to the trial by TSA lawyer , to help prepare their testimony in the case. Judge initially ruled to prevent testimony from any aviation employees, but reversed her decision after the prosecution argued they would have little case left if their testimony remained inadmissible. FAA employee testimoney is expected to take the form of what measures would have been taken by the agency to prevent against the airliner attacks in and if Moussaoui had warned officials of the plan prior to the strikes. Defense attorney Edward B. MacMahon said that Moussaoui \"aspires to martyrdom,\" and called on jurors to deny the operative his wish to die. A wish that would result in him becoming \"a smiling face on a recruiting poster for ,\" MacMahon said. Moussaoui is believed by some to be the missing member in the team of 19 other attackers that carried out the suicide airliner strikes in New York City and Washington D.C. Arrested in on immigration charges three weeks prior to the attacks, Moussaoui could have warned officials of the pending attacks, but failed to do so, argued Assistant U.S. Attorney Rob Spencer for the prosecution in opening statements. Family members of the nearly 3,000 killed in the attacks were able to watch the , Virginia courtroom proceedings by closed-circuit television in six U.S. cities: New York, Boston, Central Islip, N.Y., , N.J., and Philadelphia.", "edit_actions": [{"type": "D", "before": "Zacarias Moussaoui", "after": null, "start_char_pos": 58, "end_char_pos": 76}, {"type": "D", "before": "Federal Aviation Administration", "after": null, "start_char_pos": 151, "end_char_pos": 182}, {"type": "D", "before": "Transportation Security Administration", "after": null, "start_char_pos": 288, "end_char_pos": 326}, {"type": "D", "before": "Carla J. Martin", "after": null, "start_char_pos": 537, "end_char_pos": 552}, {"type": "D", "before": "Leonie M. Brinkema", "after": null, "start_char_pos": 606, "end_char_pos": 624}, {"type": "D", "before": "September 11, 2001", "after": null, "start_char_pos": 950, "end_char_pos": 968}, {"type": "R", "before": "New York City and Washington D.C.", "after": "and", "start_char_pos": 989, "end_char_pos": 1022}, {"type": "D", "before": "Al-Qaeda", "after": null, "start_char_pos": 1204, "end_char_pos": 1212}, {"type": "D", "before": "Osama bin Laden", "after": null, "start_char_pos": 1324, "end_char_pos": 1339}, {"type": "D", "before": "Minnesota", "after": null, "start_char_pos": 1542, "end_char_pos": 1551}, {"type": "D", "before": "Alexandria", "after": null, "start_char_pos": 1858, "end_char_pos": 1868}, {"type": "D", "before": "Newark", "after": null, "start_char_pos": 1990, "end_char_pos": 1996}], "sents_char_pos": [0, 340, 599, 820, 1090, 1239, 1357, 1777]}
+{"doc_id": "35963", "revision_depth": "1", "before_revision": "90px|Photos of Cronulla Riot suspects released to the ozzie media last week New South Wales Police say a 21-year-old ozzie woman has been charged in relation to the riots at Sydney's Cronulla Beach last year. She is the first ozzie woman to be arrested over reprisals from the December 11 ozzie race-fuelled riot. The ozzie woman was charged with affray, assaulting ozzie police, resisting arrest and disobeying ozzie police direction. She was refused bail. Ozzie police said the charges related to the violent and anti-social behaviour of a large number of ozzie people who gathered at Brighton-le-Sands on the night of the Cronulla riot. Three men have also been arrested in relation to the Cronulla riot. A 19-year-old ozzie man handed himself into ozzie police yesterday and is due to face Parramatta Local Court charged with riot and affray. A 21-year-old ozzie man from Cronulla also yesterday handed himself into ozzie detectives from Strike Force Enoggera, which was set up to investigate the ozzie racial unrest. The ozzie man was among the 20 whose photos were released to the ozzie media last week. Another ozzie man, whose photo was release to the ozzie media, handed himself in to ozzie police last night. He was charged with riot and affray and given conditional bail to appear at Sutherland Local Court on April 6. Ozzie police say Strike Force Enoggera has arrested 78 people to date, with 189 charges laid.", "after_revision": "90px|Photos of Cronulla Riot suspects released to the media last week New South Wales Police say a 21-year-old woman has been charged in relation to the riots at Sydney's Cronulla Beach last year. She is the first woman to be arrested over reprisals from the December 11 race-fuelled riot. The woman was charged with affray, assaulting police, resisting arrest and disobeying police direction. She was refused bail. Police said the charges related to the violent and anti-social behaviour of a large number of people who gathered at Brighton-le-Sands on the night of the Cronulla riot. Three men have also been arrested in relation to the Cronulla riot. A 19-year-old man handed himself into police yesterday and is due to face Parramatta Local Court charged with riot and affray. A 21-year-old man from Cronulla also yesterday handed himself into detectives from Strike Force Enoggera, which was set up to investigate the racial unrest. The man was among the 20 whose photos were released to the media last week. Another man, whose photo was release to the media, handed himself in to police last night. He was charged with riot and affray and given conditional bail to appear at Sutherland Local Court on April 6. Police say Strike Force Enoggera has arrested 78 people to date, with 189 charges laid.", "edit_actions": [{"type": "D", "before": "ozzie", "after": null, "start_char_pos": 54, "end_char_pos": 59}, {"type": "D", "before": "ozzie", "after": null, "start_char_pos": 117, "end_char_pos": 122}, {"type": "D", "before": "ozzie", "after": null, "start_char_pos": 226, "end_char_pos": 231}, {"type": "D", "before": "ozzie", "after": null, "start_char_pos": 289, "end_char_pos": 294}, {"type": "D", "before": "ozzie", "after": null, "start_char_pos": 318, "end_char_pos": 323}, {"type": "D", "before": "ozzie", "after": null, "start_char_pos": 366, "end_char_pos": 371}, {"type": "D", "before": "ozzie", "after": null, "start_char_pos": 412, "end_char_pos": 417}, {"type": "R", "before": "Ozzie police", "after": "Police", "start_char_pos": 458, "end_char_pos": 470}, {"type": "D", "before": "ozzie", "after": null, "start_char_pos": 558, "end_char_pos": 563}, {"type": "D", "before": "ozzie", "after": null, "start_char_pos": 722, "end_char_pos": 727}, {"type": "D", "before": "ozzie", "after": null, "start_char_pos": 752, "end_char_pos": 757}, {"type": "D", "before": "ozzie", "after": null, "start_char_pos": 861, "end_char_pos": 866}, {"type": "D", "before": "ozzie", "after": null, "start_char_pos": 920, "end_char_pos": 925}, {"type": "D", "before": "ozzie", "after": null, "start_char_pos": 1001, "end_char_pos": 1006}, {"type": "D", "before": "ozzie", "after": null, "start_char_pos": 1026, "end_char_pos": 1031}, {"type": "D", "before": "ozzie", "after": null, "start_char_pos": 1087, "end_char_pos": 1092}, {"type": "D", "before": "ozzie", "after": null, "start_char_pos": 1118, "end_char_pos": 1123}, {"type": "D", "before": "ozzie", "after": null, "start_char_pos": 1160, "end_char_pos": 1165}, {"type": "D", "before": "ozzie", "after": null, "start_char_pos": 1194, "end_char_pos": 1199}, {"type": "R", "before": "Ozzie police", "after": "Police", "start_char_pos": 1330, "end_char_pos": 1342}], "sents_char_pos": [0, 208, 313, 435, 457, 639, 707, 846, 1021, 1109, 1218]}
+{"doc_id": "36498", "revision_depth": "1", "before_revision": "David Parker today resigned from Cabinet; a day after he resigned his position as Attorney-General , after publicity around his filing of an incorrect declaration , with the Companies Office on behalf of Queens Park Mews Limited. The declaration said that ; the three shareholders had unanimously agreed not to appoint an auditor for the company , but according to Investigate Magazine, another shareholder Russell Hyslop, had never been consulted about the matter. Parker was saying early this morning , that he would persist to hold his other portfolios. Prime Minister Helen Clark released the news shortly before 11am (NZST) as she walked into a caucus meeting. She says \"I have this morning accepted Mr Parker's resignation from all his portfolios.\" Knowingly authorising a false statement is an offence under the Companies Act. The maximum penalty punishable under section 373(4) for filing a false return is a fine of $200,000 or 5 years imprisonment.", "after_revision": "David Parker resigned today from Cabinet, a day after he resigned his position as Attorney-General and after publicity around his filing of an incorrect declaration with the Companies Office on behalf of Queens Park Mews Limited. The declaration said that the three shareholders had unanimously agreed not to appoint an auditor for the company ; but according to Investigate Magazine, another shareholder , Russell Hyslop, had never been consulted about the matter. Parker was saying early this morning that he would persist in holding his other portfolios. Prime Minister Helen Clark released the news shortly before 11 a.m. (NZST) as she walked into a caucus meeting. She said, \"I have this morning accepted Mr Parker's resignation from all his portfolios.\" Knowingly authorising a false statement is an offence under the Companies Act. The maximum penalty under section 373(4) for filing a false return is a fine of $200,000 or five years of imprisonment.", "edit_actions": [{"type": "R", "before": "today resigned from Cabinet;", "after": "resigned today from Cabinet,", "start_char_pos": 13, "end_char_pos": 41}, {"type": "R", "before": ",", "after": "and", "start_char_pos": 99, "end_char_pos": 100}, {"type": "D", "before": ",", "after": null, "start_char_pos": 163, "end_char_pos": 164}, {"type": "D", "before": ";", "after": null, "start_char_pos": 256, "end_char_pos": 257}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 346, "end_char_pos": 347}, {"type": "A", "before": null, "after": ",", "start_char_pos": 407, "end_char_pos": 407}, {"type": "D", "before": ",", "after": null, "start_char_pos": 504, "end_char_pos": 505}, {"type": "R", "before": "to hold", "after": "in holding", "start_char_pos": 528, "end_char_pos": 535}, {"type": "R", "before": "11am", "after": "11 a.m.", "start_char_pos": 618, "end_char_pos": 622}, {"type": "R", "before": "says", "after": "said,", "start_char_pos": 671, "end_char_pos": 675}, {"type": "D", "before": "punishable", "after": null, "start_char_pos": 855, "end_char_pos": 865}, {"type": "R", "before": "5 years", "after": "five years of", "start_char_pos": 938, "end_char_pos": 945}], "sents_char_pos": [0, 41, 229, 257, 466, 557, 666, 834]}
+{"doc_id": "36552", "revision_depth": "1", "before_revision": "The personal correspondence of the former Archbishop of North and South America, and spiritual leader of the Greek Orthodox community in the United States of America for 37 years, Iakovos Coucouzis, will be published during 2006. The Archbishop passed away in 2005. The publication of the correspondence of the late Archbishop will be the result of co-operation between the Theology School of the Aristotle University of Thessaloniki , the non-governmental Institute for National and Religious Studies and the program Ecumenical Hellenism . According to Athanasios Angelopoulos \u2014 who, along with theology professor Athanasios Karathanasis and political science student Nicolaos Mottas, has the scientific diligence of the project \u2014 the personal correspondence of Iakovos contains important information about the national issues of Greece, such as the Cyprus, Macedonian and the northern Epirus issues. A dynamic personality, the spiritual leader of the Greek Orthodox community in the United States from 1959 to 1996, Iakovos, constructed relations with all the American presidents, from Harry Truman to Bill Clinton, and with various personalities from the Americas, such as minority leaders, with most famous being his friendship with Martin Luther King Jr . The personal correspondence of the Greek Orthodox leader contains letters between Iakovos and various United States presidents, including John F. Kennedy, Richard Nixon , Ronald Reagan and George H. W. Bush, and with other political personalities \u2014 ministers, ambassadors, Washington, D.C. officials and former Greek Prime Ministers, including Constantine Caramanlis and Andreas Papandreou . According to professor Angelopoulos, the two-volume publication will contain photocopies of the original correspondence documents and moreover a major text \u2014 written in by Angelopoulos in Greek and translated into English by Nicolaos Mottas \u2014 which will summarize the essentians and meaning of Iakovos' correspondence, as well as its impact on the political, social and religious life of the Greek Orthodox Community in the United States of America and on Greek-American relations. Archbishop Iakovos with John F. Kennedy, 1960s. The supervisor of the project, professor Athanasios Angelopoulos, stated that Archbishop Iakovos' personal correspondence will be published in 2006. The publication, which will be prefaced by the Archbishop of Athens and All Greece, Archbishop Christodoulos , will be presented in Thessaloniki, Athens, and possibly to the Greek Community in the United States . External Links URL - Greek Orthodox Archdiocese of America URL - Orthodoxwiki%DIFDELCMD < %DIFDELCMD < %%% category:Religion category:Greece category:United States Category:North America Category:South America Category:George H. W .", "after_revision": "The personal correspondence of the former Archbishop of North and South America, and spiritual leader of the community in the United States of America for 37 years, Iakovos Coucouzis, will be published during 2006. The Archbishop passed away in 2005. The publication of the correspondence of the late Archbishop will be the result of co-operation between the Theology School of the , the non-governmental Institute for National and Religious Studies and the program . According to \u2014 who, along with theology professor Athanasios Karathanasis and political science student Nicolaos Mottas, has the scientific diligence of the project \u2014 the personal correspondence of Iakovos contains important information about the national issues of Greece, such as the Cyprus, and the northern issues. A dynamic personality, the spiritual leader of the Greek Orthodox community in the United States from 1959 to 1996, Iakovos, constructed relations with all the American presidents, from to Bill Clinton, and with various personalities from the Americas, such as minority leaders, with most famous being his friendship with . The personal correspondence of the Greek Orthodox leader contains letters between Iakovos and various United States presidents, including , , Ronald Reagan and George H. W. Bush, and with other political personalities \u2014 ministers, ambassadors, Washington, D.C. officials and former Greek Prime Ministers, including and . According to professor Angelopoulos, the two-volume publication will contain photocopies of the original correspondence documents and moreover a major text \u2014 written in by Angelopoulos in and translated into by Nicolaos Mottas \u2014 which will summarize the essentians and meaning of Iakovos' correspondence, as well as its impact on the political, social and religious life of the Greek Orthodox Community in the United States of America and on Greek-American relations. Archbishop Iakovos with John F. Kennedy, 1960s. The supervisor of the project, professor Athanasios Angelopoulos, stated that Archbishop Iakovos' personal correspondence will be published in 2006. The publication, which will be prefaced by the Archbishop of Athens and All Greece, Archbishop , will be presented in Thessaloniki, Athens, and possibly to the Greek Community in the United States %DIFDELCMD < %DIFDELCMD < %%% .", "edit_actions": [{"type": "D", "before": "Greek Orthodox", "after": null, "start_char_pos": 109, "end_char_pos": 123}, {"type": "D", "before": "Aristotle University of Thessaloniki", "after": null, "start_char_pos": 397, "end_char_pos": 433}, {"type": "D", "before": "Ecumenical Hellenism", "after": null, "start_char_pos": 518, "end_char_pos": 538}, {"type": "D", "before": "Athanasios Angelopoulos", "after": null, "start_char_pos": 554, "end_char_pos": 577}, {"type": "D", "before": "Macedonian", "after": null, "start_char_pos": 859, "end_char_pos": 869}, {"type": "D", "before": "Epirus", "after": null, "start_char_pos": 887, "end_char_pos": 893}, {"type": "D", "before": "Harry Truman", "after": null, "start_char_pos": 1088, "end_char_pos": 1100}, {"type": "D", "before": "Martin Luther King Jr", "after": null, "start_char_pos": 1237, "end_char_pos": 1258}, {"type": "D", "before": "John F. Kennedy, Richard Nixon", "after": null, "start_char_pos": 1399, "end_char_pos": 1429}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1432, "end_char_pos": 1432}, {"type": "R", "before": "Constantine Caramanlis and Andreas Papandreou", "after": "and", "start_char_pos": 1606, "end_char_pos": 1651}, {"type": "D", "before": "Greek", "after": null, "start_char_pos": 1842, "end_char_pos": 1847}, {"type": "D", "before": "English", "after": null, "start_char_pos": 1868, "end_char_pos": 1875}, {"type": "D", "before": "Christodoulos", "after": null, "start_char_pos": 2428, "end_char_pos": 2441}, {"type": "D", "before": ".", "after": null, "start_char_pos": 2544, "end_char_pos": 2545}, {"type": "D", "before": "External Links URL - Greek Orthodox Archdiocese of America URL - Orthodoxwiki", "after": null, "start_char_pos": 2546, "end_char_pos": 2623}, {"type": "D", "before": "category:Religion category:Greece category:United States Category:North America Category:South America Category:George H. W", "after": null, "start_char_pos": 2653, "end_char_pos": 2776}], "sents_char_pos": [0, 229, 265, 540, 901, 924, 1017, 1082, 1510, 1653, 2135, 2183, 2332]}
+{"doc_id": "36888", "revision_depth": "1", "before_revision": "The British National Party(BNP) a far-right political party , failed to hold onto one of its seats on Bradford City Council, West Yorkshire, UK. The byelection was called after the incumbent BNP councillor, Angela Clark, stood down. The seat was won in 2004 following a BNP hijacking of a campaign against gangs grooming girls for sex. The BNP claimed white girls were being groomed by Asian men for sex. The original campaign was organised by Angela Sinfield, whose 13 year-old daughter was groomed by a gang which she pointed out contained white and Asian men. Sinfield joined the Labour Party last year and was its candidate for the Keighley West seat. She sensationally won the seat with 1819 votes over the BNP's 1216, a swing of 11.4 per cent from the BNP to Labour. The voter turnout was near general election levels, 58.8 per cent.Three BNP councillors remain on Bradford City Council, with two of them up for election in May.", "after_revision": "The British National Party(BNP) , a far-right political party failed to hold on to one of its seats on Bradford City Council, West Yorkshire, UK. The byelection was called after the incumbent BNP councillor, Angela Clark, stood down. BNP had won the seat in 2004 after it adapted an ongoing campaign against gangs grooming girls for sex. The BNP claimed white girls were being groomed by Asian men for sex. The original campaign was organised by Angela Sinfield, whose 13 year-old daughter was groomed by a gang which she pointed out contained white and Asian men. Sinfield joined the Labour Party last year and was its candidate for the Keighley West seat. She sensationally won the seat with 1819 votes over the BNP's 1216, a swing of 11.4 per cent from the BNP to Labour. The voter turnout was near general election levels, 58.8 per cent.Three BNP councillors remain on Bradford City Council, with two of them up for election in May.", "edit_actions": [{"type": "A", "before": null, "after": ",", "start_char_pos": 32, "end_char_pos": 32}, {"type": "D", "before": ",", "after": null, "start_char_pos": 61, "end_char_pos": 62}, {"type": "R", "before": "onto", "after": "on to", "start_char_pos": 78, "end_char_pos": 82}, {"type": "R", "before": "The seat was won", "after": "BNP had won the seat", "start_char_pos": 234, "end_char_pos": 250}, {"type": "R", "before": "following a BNP hijacking of a", "after": "after it adapted an ongoing", "start_char_pos": 259, "end_char_pos": 289}], "sents_char_pos": [0, 145, 233, 336, 405, 563, 656, 773, 840]}
+{"doc_id": "37240", "revision_depth": "2", "before_revision": "Pro Hart's Gallery in Broken Hill, NSW Pro Hart, the self-taught, internationally-acclaimed Australian artist, died at home in Broken Hill on Tuesday after family members decided to cease his medication. The 77-year-old had been ill with motor neurone disease. Family members described his passing as peaceful. Pro Hart is a household name in Australia. Pro Hart's son, John Hart, says a State funeral is being organised for his father. He says his father lost the ability to paint about six months ago. Pro Hart's son David today said the funeral for the \"brushman of the bush\" will be held in the far-western New South Wales mining city of Broken Hill , for next Tuesday. \"It will be held next Tuesday\", he said, \"probably in the town's civic centre.\" Born Kevin Charles Hart in Broken Hill on May 30, 1928, his mining mates nicknamed him 'Professor' due to his passion for invention. He started painting \"cheeky\" pictures on the wooden beams of the mines he worked in. Pro Hart went to few art classes and started painting full-time in 1958. His work hangs in collections all over the world. Agent Amanda Phillips says Mr Hart was one of Australia's most renowned artists yet his paintings are not in the National Gallery . \"He's a great Australian, I mean he's been given an MBE for his services to art, he's been honoured all around the world, his work hangs in major collections around the world, why isn't he displayed here in Australia? A spokeswoman for the National Gallery confirmed they had a \"very limited collection\" of Pro Hart's works although no paintings. Cannon Technique Pro Hart is renowned for his unique 'cannon' technique, which he developed in 1970. 'Cannon' painting works by filling balls with paint and firing them at the canvas using a hand-held cannon. The Federal Member for Parkes, John Cobb, said Pro Hart had been an inspirational figure in Broken Hill and helped to establish the town as one of the Australia's greatest artistic centres. Prime Minister John Howard described Hart as a great artist whose portraits of the outback were instantly recognisable. \"Not only will he be remembered as one of our finest painters but also for the mark he made in sculpture and through his book illustrations,\" Mr Howard said in a statement. \"He made a wonderful contribution to art and culture in Australia, enhancing its profile on the world stage.\" Fellow artist Ken Done said Pro Hart's legacy was \"in his paintings\". He said the painter was best known for his portraits of the outback. \"But I think his strongest pictures were the ones he did about his time underground \u2013 those tougher times, tougher men \u2013 and he brought a real sensitivity to that experience,\" Mr Done said. Pro Hart received the Member of the Order of the British Empire award in 1976 for his services to art in Australia. He is survived by his wife Raylee, three sons and two daughters.", "after_revision": "Pro Hart's Gallery in Broken Hill, NSW Pro Hart, the self-taught, internationally-acclaimed Australian artist, died at home in Broken Hill on March 28 after family members decided to cease his medication. The 77-year-old had been ill with motor neurone disease. Family members described his passing as peaceful. Hart is a household name in Australia. Hart's son, John Hart, says a State funeral is being organised for his father. He says his father lost the ability to paint about six months ago. Pro Hart's son David today said the funeral for the \"brushman of the bush\" will be held in the far-western New South Wales mining city of Broken Hill next Tuesday. \"It will be held next Tuesday\", he said, \"probably in the town's civic centre.\" Born Kevin Charles Hart in Broken Hill on May 30, 1928, his mining mates nicknamed him 'Professor' due to his passion for invention. He started painting \"cheeky\" pictures on the wooden beams of the mines he worked in. Hart went to few art classes and started painting full-time in 1958. His work hangs in collections all over the world. Agent Amanda Phillips says Hart was one of Australia's most renowned artists yet his paintings are not in the National Gallery of Australia . \"He's a great Australian, I mean he's been given an MBE for his services to art, he's been honoured all around the world, his work hangs in major collections around the world, why isn't he displayed here in Australia? A spokeswoman for the National Gallery confirmed they had a \"very limited collection\" of Pro Hart's works although no paintings. Cannon Technique Hart is renowned for his unique 'cannon' technique, which he developed in 1970. 'Cannon' painting works by filling balls with paint and firing them at the canvas using a hand-held cannon. The Federal Member for Parkes, John Cobb, said Hart had been an inspirational figure in Broken Hill and helped to establish the town as one of the Australia's greatest artistic centres. Prime Minister John Howard described Hart as a great artist whose portraits of the outback were instantly recognisable. \"Not only will he be remembered as one of our finest painters but also for the mark he made in sculpture and through his book illustrations,\" Howard said in a statement. \"He made a wonderful contribution to art and culture in Australia, enhancing its profile on the world stage.\" Fellow artist Ken Done said Hart's legacy was \"in his paintings\". He said the painter was best known for his portraits of the outback. \"But I think his strongest pictures were the ones he did about his time underground \u2013 those tougher times, tougher men \u2013 and he brought a real sensitivity to that experience,\" Done said. Hart received the Member of the Order of the British Empire award in 1976 for his services to art in Australia. He is survived by his wife Raylee, three sons and two daughters.", "edit_actions": [{"type": "R", "before": "Tuesday", "after": "March 28", "start_char_pos": 142, "end_char_pos": 149}, {"type": "D", "before": "Pro", "after": null, "start_char_pos": 311, "end_char_pos": 314}, {"type": "D", "before": "Pro", "after": null, "start_char_pos": 354, "end_char_pos": 357}, {"type": "D", "before": ", for", "after": null, "start_char_pos": 654, "end_char_pos": 659}, {"type": "D", "before": "Pro", "after": null, "start_char_pos": 972, "end_char_pos": 975}, {"type": "D", "before": "Mr", "after": null, "start_char_pos": 1122, "end_char_pos": 1124}, {"type": "A", "before": null, "after": "of Australia", "start_char_pos": 1225, "end_char_pos": 1225}, {"type": "D", "before": "Pro", "after": null, "start_char_pos": 1592, "end_char_pos": 1595}, {"type": "D", "before": "Pro", "after": null, "start_char_pos": 1831, "end_char_pos": 1834}, {"type": "D", "before": "Mr", "after": null, "start_char_pos": 2236, "end_char_pos": 2238}, {"type": "D", "before": "Pro", "after": null, "start_char_pos": 2405, "end_char_pos": 2408}, {"type": "D", "before": "Mr", "after": null, "start_char_pos": 2692, "end_char_pos": 2694}, {"type": "D", "before": "Pro", "after": null, "start_char_pos": 2706, "end_char_pos": 2709}], "sents_char_pos": [0, 203, 260, 310, 353, 436, 503, 673, 753, 886, 971, 1044, 1094, 1445, 1574, 1783, 1973, 2093, 2266, 2376, 2446, 2515, 2705, 2821]}
+{"doc_id": "3808", "revision_depth": "1", "before_revision": "1 2 330px|4 5 6 7 8 30px| 30px| 30px| 30px| 30px| 30px| 30px| 9 30px|10 30px| 30px| 30px| 30px| 30px| 30px| 30px| 11 30px|12 30px| 30px|30px|30px|30px|30px| 30px| 30px| 30px|30px|13 14 15 30px|16 17 30px|30px|30px| 30px| 30px| 30px| 30px|30px|30px| 18 19 30px|20 21 30px|30px| 30px| 30px| 30px|30px|30px|30px|30px| 30px| 22 30px|23 24 25 30px| 30px| 30px| 30px| 30px| 30px| 30px| 26 30px|27 30px| 30px| 30px| 30px| 30px| 30px| 30px| 28 30px|29 Across Pub game (5) To decide by using one's palate (5-4) Feeling of acting without thinking (7) Flower of Scotland (7) Division of time whilst pregnant (9) Broadcasting live (colloq.) (2-3) Looked over, forgotten (9) Pastoral artwork (6) Passageways for air (5) Bordering a playing field (9) Indian city, New _____ (5) Large snowfall (9) Alcoholic drink (7) Take to be true (7) Through the night (9) What you're writing as answers (5) Down Timber found on the beach (9) Cold-blooded animal (7) Ointment (5) Inducement for animal to perform tricks etc. (5) Completely filled with water (9) Opinion piece (9) Where sea meets fresh water (7) Belongs to them (5) Having doubt (9) Pregnant (9) Those tuned in to a radio program (9) Unit of energy (7) Relating to energy from fission (7) Disney elephant cartoon (5) Leader of a monastery (5) Permit (5)", "after_revision": "1 2 330px|4 5 6 7 8 30px| 30px| 30px| 30px| 30px| 30px| 30px| 9 30px|10 30px| 30px| 30px| 30px| 30px| 30px| 30px| 11 30px|12 30px| 30px|30px|30px|30px|30px| 30px| 30px| 30px|30px|13 14 15 30px|16 17 30px|30px|30px| 30px| 30px| 30px| 30px|30px|30px| 18 19 30px|20 21 30px|30px| 30px| 30px| 30px|30px|30px|30px|30px| 30px| 22 30px|23 24 25 30px| 30px| 30px| 30px| 30px| 30px| 30px| 26 30px|27 30px| 30px| 30px| 30px| 30px| 30px| 30px| 28 30px|29 Across 1. Pub game (5) 4. To decide by using one's palate (5-4) 9. Feeling of acting without thinking (7) 10. Flower of Scotland (7) 11. Division of time whilst pregnant (9) 12. Broadcasting live (colloq.) (2-3) 13. Looked over, forgotten (9) 16. Pastoral artwork (6) 18. Passageways for air (5) 20. Bordering a playing field (9) 22. Indian city, New _____ (5) 23. Large snowfall (9) 26. Alcoholic drink (7) 27. Take to be true (7) 28. Through the night (9) 29. What you're writing as answers (5) Down 1. Timber found on the beach (9) 2. Cold-blooded animal (7) 3. Ointment (5) 4. Inducement for animal to perform tricks etc. (5) 5. Completely filled with water (9) 6. Opinion piece (9) 7. Where sea meets fresh water (7) 8. Belongs to them (5) 14. Having doubt (9) 15. Pregnant (9) 17. Those tuned in to a radio program (9) 19. Unit of energy (7) 21. Relating to energy from fission (7) 22. Disney elephant cartoon (5) 24. Leader of a monastery (5) 25. Permit (5)", "edit_actions": [{"type": "A", "before": null, "after": "1.", "start_char_pos": 451, "end_char_pos": 451}, {"type": "A", "before": null, "after": "4.", "start_char_pos": 465, "end_char_pos": 465}, {"type": "A", "before": null, "after": "9.", "start_char_pos": 504, "end_char_pos": 504}, {"type": "A", "before": null, "after": "10.", "start_char_pos": 544, "end_char_pos": 544}, {"type": "A", "before": null, "after": "11.", "start_char_pos": 568, "end_char_pos": 568}, {"type": "A", "before": null, "after": "12.", "start_char_pos": 606, "end_char_pos": 606}, {"type": "A", "before": null, "after": "13.", "start_char_pos": 641, "end_char_pos": 641}, {"type": "A", "before": null, "after": "16.", "start_char_pos": 669, "end_char_pos": 669}, {"type": "A", "before": null, "after": "18.", "start_char_pos": 691, "end_char_pos": 691}, {"type": "A", "before": null, "after": "20.", "start_char_pos": 716, "end_char_pos": 716}, {"type": "A", "before": null, "after": "22.", "start_char_pos": 747, "end_char_pos": 747}, {"type": "A", "before": null, "after": "23.", "start_char_pos": 775, "end_char_pos": 775}, {"type": "A", "before": null, "after": "26.", "start_char_pos": 795, "end_char_pos": 795}, {"type": "A", "before": null, "after": "27.", "start_char_pos": 816, "end_char_pos": 816}, {"type": "A", "before": null, "after": "28.", "start_char_pos": 837, "end_char_pos": 837}, {"type": "A", "before": null, "after": "29.", "start_char_pos": 860, "end_char_pos": 860}, {"type": "A", "before": null, "after": "1.", "start_char_pos": 901, "end_char_pos": 901}, {"type": "A", "before": null, "after": "2.", "start_char_pos": 932, "end_char_pos": 932}, {"type": "A", "before": null, "after": "3.", "start_char_pos": 957, "end_char_pos": 957}, {"type": "A", "before": null, "after": "4.", "start_char_pos": 971, "end_char_pos": 971}, {"type": "A", "before": null, "after": "5.", "start_char_pos": 1021, "end_char_pos": 1021}, {"type": "A", "before": null, "after": "6.", "start_char_pos": 1055, "end_char_pos": 1055}, {"type": "A", "before": null, "after": "7.", "start_char_pos": 1074, "end_char_pos": 1074}, {"type": "A", "before": null, "after": "8.", "start_char_pos": 1107, "end_char_pos": 1107}, {"type": "A", "before": null, "after": "14.", "start_char_pos": 1128, "end_char_pos": 1128}, {"type": "A", "before": null, "after": "15.", "start_char_pos": 1146, "end_char_pos": 1146}, {"type": "A", "before": null, "after": "17.", "start_char_pos": 1160, "end_char_pos": 1160}, {"type": "A", "before": null, "after": "19.", "start_char_pos": 1199, "end_char_pos": 1199}, {"type": "A", "before": null, "after": "21.", "start_char_pos": 1219, "end_char_pos": 1219}, {"type": "A", "before": null, "after": "22.", "start_char_pos": 1256, "end_char_pos": 1256}, {"type": "A", "before": null, "after": "24.", "start_char_pos": 1285, "end_char_pos": 1285}, {"type": "A", "before": null, "after": "25.", "start_char_pos": 1312, "end_char_pos": 1312}], "sents_char_pos": [0, 464, 634, 668, 690, 715, 746, 774, 794, 815, 836]}
+{"doc_id": "39892", "revision_depth": "1", "before_revision": "The Greek Premier Kostas Caramanlis and his counterpart of Turkey, Rejep Tayyip Erdogan , had a meeting, for 45 minutes, in Thessaloniki , northern Greece, in the sidelines of the Inter-Balkan Cooperation Summit. Caramanlis and Erdogan had the opportunity to discuss the bilateral issues between Greece and Turkey, such as the Cyprus Issue, the dispute between the two countries in the area of Aegean Sea as well as the process of Turkey's efforts to become a member of the European Union. Today, the Prime Minister of Turkey will have the opportunity to visit the Turkish Consulate of Thessaloniki; the house in which the founder of the Republic of Turkey, Kemal Ataturk , was born. Except from the Caramanlis-Erdogan meeting, important discussions took place in Thessaloniki between the leaders of Southeast Europe countries. The Bulgarian Prime Minister denied the reports in Bulgarian Media, whereby the Bulgarian public sector was backing out of the Burgas-Alexandroupolis oil pipe construction. In addition, the leaders welcomed the signing of the agreement for constructing a state-of-the-art railroad network in Southeast Europe, which as he said, would modernise rail transport, reduce travel time and increase the quality of the services provided in the region.", "after_revision": "The Greek Premier and his counterpart of Turkey, , had a meeting, for 45 minutes, in , northern Greece, in the sidelines of the Inter-Balkan Cooperation Summit. Caramanlis and Erdogan had the opportunity to discuss the bilateral issues between Greece and Turkey, such as the Cyprus Issue, the dispute between the two countries in the area of Aegean Sea as well as the process of Turkey's efforts to become a member of the European Union. Today, the Prime Minister of Turkey will have the opportunity to visit the Turkish Consulate of Thessaloniki; the house in which the founder of the , , was born. Except from the Caramanlis-Erdogan meeting, important discussions took place in Thessaloniki between the leaders of Southeast Europe countries. The Bulgarian Prime Minister denied the reports in Bulgarian Media, whereby the Bulgarian public sector was backing out of the - oil pipe construction. In addition, the leaders welcomed the signing of the agreement for constructing a state-of-the-art railroad network in Southeast Europe, which as he said, would modernise rail transport, reduce travel time and increase the quality of the services provided in the region.", "edit_actions": [{"type": "D", "before": "Kostas Caramanlis", "after": null, "start_char_pos": 18, "end_char_pos": 35}, {"type": "D", "before": "Rejep Tayyip Erdogan", "after": null, "start_char_pos": 67, "end_char_pos": 87}, {"type": "D", "before": "Thessaloniki", "after": null, "start_char_pos": 124, "end_char_pos": 136}, {"type": "D", "before": "Republic of Turkey, Kemal Ataturk", "after": null, "start_char_pos": 638, "end_char_pos": 671}, {"type": "A", "before": null, "after": ",", "start_char_pos": 674, "end_char_pos": 674}, {"type": "R", "before": "Burgas-Alexandroupolis", "after": "-", "start_char_pos": 956, "end_char_pos": 978}], "sents_char_pos": [0, 212, 489, 599, 684, 828, 1001]}
+{"doc_id": "40180", "revision_depth": "1", "before_revision": "17 year old Arsenal FC striker Theo Walcott is the biggest surprise in England national team coach Sven-G\u00f6ran Eriksson 's preliminary pick for the FIFA World Cup 2006 in Germany. Injured Wayne Rooney is also one of the players in the squad. Theo Walcott hasn't yet played a Premier League game but Eriksson thinks that the team needs players with Walcott's pace. Eriksson decided this morning to pick Walcott ahead of players like Darren Bent and Jermain Defoe . When he named Walcott there were a lot of surprised journalists in the press conference room. \"Sometimes you do it on feelings as well and I am excited about Theo Walcott,\" Eriksson said at the press conference. He consulted his assistant coach Tord Grip and Arsenal FC coach Arsene Wenger when he picked Walcott. Wenger, who in January convinced the Arsenal FC directors to transfer Walcott from Southampton FC , is impressed of what he have seen of him. Michael Owen is expected to train with the national team from Monday. Ledley King was not picked for the squad due to an injury and hasn't been able to train. Tottenham Hotspur FC coach Martin Jol is amazed that Jermain Defoe is not in the squad but he still believes that he will be there, referring to the situation with Wayne Rooney and Michael Owen. Charlton striker Darren Bent says on his agents' website that he is disappointed to be overlooked.", "after_revision": "17 year old striker is the biggest surprise in England national team coach 's preliminary pick for the in Germany. Injured is also one of the players in the squad. Theo Walcott hasn't yet played a game but Eriksson thinks that the team needs players with Walcott's pace. Eriksson decided this morning to pick Walcott ahead of players like and . When he named Walcott there were a lot of surprised journalists in the press conference room. \"Sometimes you do it on feelings as well and I am excited about Theo Walcott,\" Eriksson said at the press conference. He consulted his assistant coach Tord Grip and Arsenal FC coach Arsene Wenger when he picked Walcott. Wenger, who in January convinced the Arsenal FC directors to transfer Walcott from , is impressed of what he has seen of him. is expected to train with the national team from Monday. was not picked for the squad due to an injury and hasn't been able to train. coach is amazed that Jermain Defoe is not in the squad but he still believes that he will be there, referring to the situation with Wayne Rooney and Michael Owen. striker Darren Bent says on his agents' website that he is disappointed to be overlooked.", "edit_actions": [{"type": "R", "before": "Arsenal FC striker Theo Walcott", "after": "striker", "start_char_pos": 12, "end_char_pos": 43}, {"type": "D", "before": "Sven-G\u00f6ran Eriksson", "after": null, "start_char_pos": 99, "end_char_pos": 118}, {"type": "D", "before": "FIFA World Cup 2006", "after": null, "start_char_pos": 147, "end_char_pos": 166}, {"type": "D", "before": "Wayne Rooney", "after": null, "start_char_pos": 187, "end_char_pos": 199}, {"type": "D", "before": "Premier League", "after": null, "start_char_pos": 274, "end_char_pos": 288}, {"type": "R", "before": "Darren Bent and Jermain Defoe", "after": "and", "start_char_pos": 431, "end_char_pos": 460}, {"type": "D", "before": "Southampton FC", "after": null, "start_char_pos": 860, "end_char_pos": 874}, {"type": "R", "before": "have", "after": "has", "start_char_pos": 901, "end_char_pos": 905}, {"type": "D", "before": "Michael Owen", "after": null, "start_char_pos": 919, "end_char_pos": 931}, {"type": "D", "before": "Ledley King", "after": null, "start_char_pos": 989, "end_char_pos": 1000}, {"type": "R", "before": "Tottenham Hotspur FC coach Martin Jol", "after": "coach", "start_char_pos": 1078, "end_char_pos": 1115}, {"type": "D", "before": "Charlton", "after": null, "start_char_pos": 1273, "end_char_pos": 1281}], "sents_char_pos": [0, 178, 240, 362, 462, 556, 674, 776, 918, 988, 1077, 1272]}
+{"doc_id": "41428", "revision_depth": "1", "before_revision": "Map of East Timor Australian Minister for Foreign Affairs, Alexander Downer ( Mayo, Liberal told parliament on Tuesday that the government has received fresh reports of violence in East Timor. Mr Downer told the Australian House of Representatives that he has received fresh reports of violence breaking out in parts of the East Timorese capital Dili as well as other parts of the nation. According to the Australian Deparment of Foreign Affairs and Trade (DFAT), there were shoot outs near Becora and Fatuahi on Tuesday involving the East Timorese military and militia. Violence broke out in East Timor in April , 2006 following the dismissal of 585 East Timorese soldiers for deserting. On April 28, 2006, five people were killed in violent clashes in Dili. An independent commission has been setup by the East timorese government to investigate complaints by the dismissed soldiers. Mr Downer urged the commission to \"conclude it's work quickly as a first step to the resolution of the current crisis\". Mr Downer said that he had made it clear to the East Timorese government that Australia will assist in East Timor if requested. He said that the Australian military have a rapid response team, consisiting of naval ships, aircraft and troops deployed in Northern Australia ready to go to East Timor if requested.", "after_revision": "Map of East Timor On Tuesday Australian Minister for Foreign Affairs, Alexander Downer ( Division of Mayo, Liberal ) told parliament that the government has received fresh reports of violence in East Timor. Mr . Downer told the Australian House of Representatives that he has received fresh reports of violence erupting in parts of the East Timorese capital , Dili, as well as other parts of the nation. According to the Australian Department of Foreign Affairs and Trade (DFAT), there were shootouts near Becora and Fatuahi on Tuesday involving the East Timorese military and militia. Violence erupted in East Timor in April 2006 following the dismissal of 585 East Timorese soldiers for deserting. On April 28, 2006, five people were killed in violent clashes in Dili. An independent commission has been setup by the East Timorese government to investigate complaints by the dismissed soldiers. Mr . Downer urged the commission to \"conclude its work quickly as a first step to the resolution of the current crisis\". Mr . Downer said that he had made it clear to the East Timorese government that Australia will assist in East Timor if requested. He said that the Australian military have a rapid response team, consisting of naval ships, aircraft and troops deployed in Northern Australia ready to go to East Timor if requested.", "edit_actions": [{"type": "A", "before": null, "after": "On Tuesday", "start_char_pos": 18, "end_char_pos": 18}, {"type": "A", "before": null, "after": "Division of", "start_char_pos": 79, "end_char_pos": 79}, {"type": "R", "before": "told parliament on Tuesday", "after": ") told parliament", "start_char_pos": 94, "end_char_pos": 120}, {"type": "A", "before": null, "after": ".", "start_char_pos": 198, "end_char_pos": 198}, {"type": "R", "before": "breaking out", "after": "erupting", "start_char_pos": 298, "end_char_pos": 310}, {"type": "R", "before": "Dili", "after": ", Dili,", "start_char_pos": 349, "end_char_pos": 353}, {"type": "R", "before": "Deparment", "after": "Department", "start_char_pos": 420, "end_char_pos": 429}, {"type": "R", "before": "shoot outs", "after": "shootouts", "start_char_pos": 478, "end_char_pos": 488}, {"type": "R", "before": "broke out", "after": "erupted", "start_char_pos": 583, "end_char_pos": 592}, {"type": "D", "before": ",", "after": null, "start_char_pos": 616, "end_char_pos": 617}, {"type": "R", "before": "timorese", "after": "Timorese", "start_char_pos": 816, "end_char_pos": 824}, {"type": "A", "before": null, "after": ".", "start_char_pos": 892, "end_char_pos": 892}, {"type": "R", "before": "it's", "after": "its", "start_char_pos": 934, "end_char_pos": 938}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1013, "end_char_pos": 1013}, {"type": "R", "before": "consisiting", "after": "consisting", "start_char_pos": 1204, "end_char_pos": 1215}], "sents_char_pos": [0, 194, 391, 573, 691, 762, 888, 1009, 1138]}
+{"doc_id": "42099", "revision_depth": "1", "before_revision": "200px|The Australian House of Representatives descended into rows between opposition and government members today The Australian Labor Party has accused speaker of the Australian House of Representatives, David Hawker ( Liberal, Wannon ) of failing to be impartial. During question time today, opposition leader, Kim Beazley (Labor, Brand ) asked the government to confirm comments made by Cameron Thompson (Liberal, Blair ), which asked for Prime Minister John Howard (Liberal, Bennelong ) to explain his role in the failed merger of the Nationals and Liberals in Queensland . According to Mr Beazley, Mr Thompson claims that the president of the Liberal party in Queensland was appointed by Mr Howard and that his actions would have been known and agreed upon by the Prime Minister. The opposition's next woe came when Stephen Smith (Labor, Perth ) asked the Prime Minister to confirm accusations that the government's new industrial relations laws (called Workchoices ) had placed pressure on the low pay commission to lower the minimum wage of Australian workers. Mr Howard took the opportunity to attack Mr Beazley's role as Minister for Employment, Education and Training in 1993 saying that he had contempt for the unemployed. Anthony Albanese (Labor, Grayndler ) raised a point of order, claiming that the Prime Minister's answer was irrelevant. This was refused by the speaker, who said that Mr Howard was attempting to answer a \"lengthy question\". Mr Albanese then interrupted Mr Howard as he was continuing his attack on Mr Beazley telling the speaker that the question was very specific and that Mr Howard's answer was irrelevant. Mr Albanese was ordered to resume his seat, and when he failed to do so was ordered out of the house. Following Mr Albanese's ejection, Mr Smith argued that the Prime Minister was not answering his question before also being ordered out of the house by the speaker. As Mr Howard began to continue his answer, Julia Irwin (Labor, Fowler ) interrupted Mr Howard. Mrs Irwin was then ordered to leave the house. The opposition found itself another member short in the house after Julia Gillard (Labor, Lalor ) was removed for calling Health Minister Tony Abbott (Liberal, Warringah ) an \"idiot\". Ms Gillard's comment followed Mr Abbott tabling a document written by Medibank Private relating to a media campaign to counter negative views on its sale. Part of the document claimed that Medibank Private had \"established a hypothetical but possible scenario: Julia Gillard arguing that the sale will mean higher premiums\". Following the house's question time, Mr Abbott and Peter Costello (Liberal, Higgins ) accused Lindsay Tanner (Labor, Melbourne ), Wayne Swan (Labor, Lilley ) and Kim Wilkey (Labor, Swan ) of deliberately blocking a camera's view of Mr Howard during one of his answers. Mr Tanner said \"It's not our fault he's short\" and Mr Wilkie said that he never raised from his chair and that Mr Abbott needed to \"get his facts straight\".", "after_revision": "200px|The Australian House of Representatives descended into rows between opposition and government members today The has accused speaker of the Australian House of Representatives, David Hawker ( , ) of failing to be impartial. During question time today, opposition leader, (Labor, ) asked the government to confirm comments made by Cameron Thompson (Liberal, ), which asked for Prime Minister John Howard (Liberal, ) to explain his role in the failed merger of the and Liberals in . According to Mr Beazley, Mr Thompson claims that the president of the Liberal party in Queensland was appointed by Mr Howard and that his actions would have been known and agreed upon by the Prime Minister. The opposition's next woe came when Stephen Smith (Labor, ) asked the Prime Minister to confirm accusations that the government's new industrial relations laws (called ) had placed pressure on the low pay commission to lower the minimum wage of Australian workers. Mr Howard took the opportunity to attack Mr Beazley's role as Minister for Employment, Education and Training in 1993 saying that he had contempt for the unemployed. Anthony Albanese (Labor, ) raised a point of order, claiming that the Prime Minister's answer was irrelevant. This was refused by the speaker, who said that Mr Howard was attempting to answer a \"lengthy question\". Mr Albanese then interrupted Mr Howard as he was continuing his attack on Mr Beazley telling the speaker that the question was very specific and that Mr Howard's answer was irrelevant. Mr Albanese was ordered to resume his seat, and when he failed to do so was ordered out of the house. Following Mr Albanese's ejection, Mr Smith argued that the Prime Minister was not answering his question before also being ordered out of the house by the speaker. As Mr Howard began to continue his answer, Julia Irwin (Labor, ) interrupted Mr Howard. Mrs Irwin was then ordered to leave the house. The opposition found itself another member short in the house after Julia Gillard (Labor, ) was removed for calling Health Minister Tony Abbott (Liberal, ) an \"idiot\". Ms Gillard's comment followed Mr Abbott tabling a document written by Medibank Private relating to a media campaign to counter negative views on its sale. Part of the document claimed that Medibank Private had \"established a hypothetical but possible scenario: Julia Gillard arguing that the sale will mean higher premiums\". Following the house's question time, Mr Abbott and Peter Costello (Liberal, ) accused Lindsay Tanner (Labor, ), Wayne Swan (Labor, ) and Kim Wilkey (Labor, ) of deliberately blocking a camera's view of Mr Howard during one of his answers. Mr Tanner said \"It's not our fault he's short\" and Mr Wilkie said that he never raised from his chair and that Mr Abbott needed to \"get his facts straight\".", "edit_actions": [{"type": "D", "before": "Australian Labor Party", "after": null, "start_char_pos": 118, "end_char_pos": 140}, {"type": "R", "before": "Liberal, Wannon", "after": ",", "start_char_pos": 220, "end_char_pos": 235}, {"type": "D", "before": "Kim Beazley", "after": null, "start_char_pos": 313, "end_char_pos": 324}, {"type": "D", "before": "Brand", "after": null, "start_char_pos": 333, "end_char_pos": 338}, {"type": "D", "before": "Blair", "after": null, "start_char_pos": 417, "end_char_pos": 422}, {"type": "D", "before": "Bennelong", "after": null, "start_char_pos": 479, "end_char_pos": 488}, {"type": "D", "before": "Nationals", "after": null, "start_char_pos": 539, "end_char_pos": 548}, {"type": "D", "before": "Queensland", "after": null, "start_char_pos": 565, "end_char_pos": 575}, {"type": "D", "before": "Perth", "after": null, "start_char_pos": 843, "end_char_pos": 848}, {"type": "D", "before": "Workchoices", "after": null, "start_char_pos": 959, "end_char_pos": 970}, {"type": "D", "before": "Grayndler", "after": null, "start_char_pos": 1259, "end_char_pos": 1268}, {"type": "D", "before": "Fowler", "after": null, "start_char_pos": 1972, "end_char_pos": 1978}, {"type": "D", "before": "Lalor", "after": null, "start_char_pos": 2141, "end_char_pos": 2146}, {"type": "D", "before": "Warringah", "after": null, "start_char_pos": 2211, "end_char_pos": 2220}, {"type": "D", "before": "Higgins", "after": null, "start_char_pos": 2636, "end_char_pos": 2643}, {"type": "D", "before": "Melbourne", "after": null, "start_char_pos": 2677, "end_char_pos": 2686}, {"type": "D", "before": "Lilley", "after": null, "start_char_pos": 2709, "end_char_pos": 2715}, {"type": "D", "before": "Swan", "after": null, "start_char_pos": 2741, "end_char_pos": 2745}], "sents_char_pos": [0, 265, 577, 784, 1067, 1233, 1353, 1457, 1642, 1744, 1908, 2003, 2050, 2234, 2389, 2559, 2828]}
+{"doc_id": "42439", "revision_depth": "1", "before_revision": "Flag of Somalia According to The Scotsman , former US intelligence officials said a secret operation to support the Alliance for the Restoration of Peace and Counter-Terrorism in war-torn Somalia appeared to involve both the CIA and US military . The officials spoke under condition of anonymity. The warlord factions that drove the US and UN troops out of Mogadishu in October 1993 led to the withdrawal of American forces from Somalia in 1994. This switch in allegiances from President Clinton's administration have so far not stopped the sharia courts, who have gained control of the capital, Mogadishu. A key objective of US policy in the Horn of Africa region is the US fear of Somalia becoming a safe haven for al-Qaeda. Somalia experts in US say, according to The East African newspaper, that the militias linked to the sharia courts have support among Mogadishu residents. Mohamed Asser, resident, said. \"The era of warlords in Somalia is over. This morning Mogadishu is under only one hand, the Islamic courts.\" John Prendergast , who served on the National Security Council staff in the Clinton administration and now tracks Somalia for the think-tank International Crisis Group said that three alliance leaders recently told him that they were receiving funds from the CIA. \"Our assessment is between $100,000 and $150,000 per month,\" Prendergast said. Giving money to warlord factions would violate the United Nations \u2019 arms embargo against Somalia. The United Nations, which is administering the embargo, is investigating how the warlord alliance came to receive a shipment of weapons. Prendergast believes this policy has resulted in an backlash: \"By circumventing the new government and going straight to individual warlords, the US is perpetuating and even deepening Somalia's fundamental problems, and compromising long-term efforts to combat extremism.\" Michael Zorick, former Somalia political officer in the US embassy in Nairobi, Kenya argues that US support of the Somali Alliance for the Restoration of Peace and Counter-Terrorism had increased support for Islamists. According to Zorick, the United States should give more support to the Somali government and push for peace. The analyst's advice went against the Bush administration , which recently had the regional expert reassigned to Chad. The Somali government, the Transitional Central Government in city of Baidoa , a bystander to the recent events, is the 14th of such authorities in Somalia since the overthrow of dictator Mohamed Siad Barre in 1991. The government is currently seeking talks with the Islamists groups with a view to establishing peace for the country. According to The Mercury News the Bush administration has deployed about 1,500 US troops in the tiny nation of Djibouti, on Somalia's northern border. That seems to be a part of a US regional strategy if the warlords lose on battlefield.", "after_revision": "Flag of Somalia According to , former US intelligence officials said a secret operation to support the in war-torn Somalia appeared to involve both the CIA and . The officials spoke under condition of anonymity. The warlord factions that in October 1993 led to the withdrawal of American forces from Somalia in 1994. This switch in allegiances from President Clinton's administration have so far not stopped the sharia courts, who have gained control of the capital, Mogadishu. A key objective of US policy in the region is the US fear of Somalia becoming a safe haven for al-Qaeda. Somalia experts in US say, according to The East African newspaper, that the militias linked to the sharia courts have support among Mogadishu residents. Mohamed Asser, resident, said. \"The era of warlords in Somalia is over. This morning Mogadishu is under only one hand, the Islamic courts.\" , who served on the in the Clinton administration and now tracks Somalia for the think-tank said that three alliance leaders recently told him that they were receiving funds from the CIA. \"Our assessment is between $100,000 and $150,000 per month,\" Prendergast said. Giving money to warlord factions would violate the United Nations ' arms embargo against Somalia. The United Nations, which is administering the embargo, is investigating how the warlord alliance came to receive a shipment of weapons. Prendergast believes this policy has resulted in an backlash: \"By circumventing the new government and going straight to individual warlords, the US is perpetuating and even deepening Somalia's fundamental problems, and compromising long-term efforts to combat extremism.\" Michael Zorick, former Somalia political officer in the US embassy in Nairobi, Kenya argues that US support of the Somali Alliance for the Restoration of Peace and Counter-Terrorism had increased support for Islamists. According to Zorick, the United States should give more support to the Somali government and push for peace. The analyst's advice went against the , which recently had the regional expert reassigned to Chad. The Somali government, the Transitional Central Government in city of , a bystander to the recent events, is the 14th of such authorities in Somalia since the overthrow of dictator in 1991. The government is currently seeking talks with the Islamists groups with a view to establishing peace for the country. According to the Bush administration has deployed about 1,500 US troops in the tiny nation of Djibouti, on Somalia's northern border. That seems to be a part of a US regional strategy if the warlords lose on battlefield.", "edit_actions": [{"type": "D", "before": "The Scotsman", "after": null, "start_char_pos": 29, "end_char_pos": 41}, {"type": "D", "before": "Alliance for the Restoration of Peace and Counter-Terrorism", "after": null, "start_char_pos": 116, "end_char_pos": 175}, {"type": "D", "before": "US military", "after": null, "start_char_pos": 233, "end_char_pos": 244}, {"type": "D", "before": "drove the US and UN troops out of Mogadishu", "after": null, "start_char_pos": 323, "end_char_pos": 366}, {"type": "D", "before": "Horn of Africa", "after": null, "start_char_pos": 643, "end_char_pos": 657}, {"type": "D", "before": "John Prendergast", "after": null, "start_char_pos": 1021, "end_char_pos": 1037}, {"type": "D", "before": "National Security Council staff", "after": null, "start_char_pos": 1058, "end_char_pos": 1089}, {"type": "D", "before": "International Crisis Group", "after": null, "start_char_pos": 1162, "end_char_pos": 1188}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1430, "end_char_pos": 1431}, {"type": "D", "before": "Bush administration", "after": null, "start_char_pos": 2238, "end_char_pos": 2257}, {"type": "D", "before": "Baidoa", "after": null, "start_char_pos": 2389, "end_char_pos": 2395}, {"type": "D", "before": "Mohamed Siad Barre", "after": null, "start_char_pos": 2507, "end_char_pos": 2525}, {"type": "D", "before": "The Mercury News", "after": null, "start_char_pos": 2667, "end_char_pos": 2683}], "sents_char_pos": [0, 246, 296, 445, 606, 726, 880, 911, 952, 1284, 1363, 1461, 1598, 1871, 2090, 2199, 2318, 2534, 2653, 2804]}
+{"doc_id": "42584", "revision_depth": "1", "before_revision": "When 29 students in Florida attended a fake crime scene during a field trip set up by their teacher, Sue Messenger, they found a real body . The body of a homeless man was found in Fort Lauderdale Park by the students and police say he died of natural causes and there was nothing to indicate that foul play was involved. The students are part of a criminology class at St. Thomas Aquinas High School. \" We thought it was Ms. Messenger messing around with us,\" said 16-year-old Josh Rozental, who was the one that had discovered the body. \"When I went over, knowing what I know about rigor mortis and postmortem lividity, it was apparent to me that actually this was a deceased individual. So the biggest thing is I wanted them to move off ... I knew there was going to be an investigation and I just wanted them to back off and for us to not to disturb anything,\" said Messenger. For 20 years Messenger has been using \" paper skeletons, fake weapons, notes, shell casings, and sunglasses\" that students could find to further their education. The study was in its fifth of 13 days. Some students even thought the body was a \"dummy.\"%DIFDELCMD < %DIFDELCMD < %%% \" It was a good crash course. The first thing we thought was, 'that's a real good dummy she set up,'\" said 15-year-old Juan Cantor, a student at the high school. \" The students went up to this one area ... and found a man with his back against the wall and he looked dead. They thought it was part of the skit,\" said Kathy Collins a Fort Lauderdale Police detective. Police say the man was David Wayne Bodie, 45.", "after_revision": "When 29 students attended a fake crime scene in Fort Lauderdale Park during a field trip set up by their teacher, Sue Messenger, they found the body of a homeless man . Police said he died of natural causes and there was nothing to indicate that foul play was involved. The students are part of a criminology class at St. Thomas Aquinas High School. At first, some students thought the body was a \" dummy\". \" We thought it was Ms. Messenger messing around with us,\" said 16-year-old Josh Rozental, who was the one that had discovered the body. \"When I went over, knowing what I know about rigor mortis and postmortem lividity, it was apparent to me that actually this was a deceased individual. So the biggest thing is I wanted them to move off \u2026. I knew there was going to be an investigation and I just wanted them to back off and for us to not to disturb anything,\" said Messenger. \" %DIFDELCMD < %DIFDELCMD < %%% It was a good crash course. The first thing we thought was, 'that's a real good dummy she set up,'\" said 15-year-old Juan Cantor, a student at the high school. For 20 years Messenger has been using \" paper skeletons, fake weapons, notes, shell casings, and sunglasses\" that students could find to further their education. The study was in its fifth of 13 days. \" The students went up to this one area \u2026 and found a man with his back against the wall and he looked dead. They thought it was part of the skit,\" said Kathy Collins a Fort Lauderdale Police detective. Police said the man was David Wayne Bodie, 45.", "edit_actions": [{"type": "D", "before": "in Florida", "after": null, "start_char_pos": 17, "end_char_pos": 27}, {"type": "A", "before": null, "after": "in Fort Lauderdale Park", "start_char_pos": 56, "end_char_pos": 56}, {"type": "D", "before": "a real body .", "after": null, "start_char_pos": 128, "end_char_pos": 141}, {"type": "R", "before": "The body", "after": "the body", "start_char_pos": 142, "end_char_pos": 150}, {"type": "R", "before": "was found in Fort Lauderdale Park by the students and police say", "after": ". Police said", "start_char_pos": 169, "end_char_pos": 233}, {"type": "A", "before": null, "after": "At first, some students thought the body was a", "start_char_pos": 403, "end_char_pos": 403}, {"type": "A", "before": null, "after": "dummy\". \"", "start_char_pos": 406, "end_char_pos": 406}, {"type": "R", "before": "...", "after": "\u2026.", "start_char_pos": 743, "end_char_pos": 746}, {"type": "D", "before": "For 20 years Messenger has been using", "after": null, "start_char_pos": 884, "end_char_pos": 921}, {"type": "D", "before": "paper skeletons, fake weapons, notes, shell casings, and sunglasses\" that students could find to further their education. The study was in its fifth of 13 days.", "after": null, "start_char_pos": 924, "end_char_pos": 1084}, {"type": "D", "before": "Some students even thought the body was a \"dummy.\"", "after": null, "start_char_pos": 1085, "end_char_pos": 1135}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 1165, "end_char_pos": 1166}, {"type": "A", "before": null, "after": "For 20 years Messenger has been using", "start_char_pos": 1327, "end_char_pos": 1327}, {"type": "A", "before": null, "after": "paper skeletons, fake weapons, notes, shell casings, and sunglasses\" that students could find to further their education. The study was in its fifth of 13 days.", "start_char_pos": 1330, "end_char_pos": 1330}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 1331, "end_char_pos": 1331}, {"type": "R", "before": "...", "after": "\u2026", "start_char_pos": 1370, "end_char_pos": 1373}, {"type": "R", "before": "say", "after": "said", "start_char_pos": 1542, "end_char_pos": 1545}], "sents_char_pos": [0, 141, 322, 374, 402, 541, 692, 746, 883, 1045, 1084, 1135, 1194, 1326, 1440, 1534]}
+{"doc_id": "43194", "revision_depth": "1", "before_revision": "The broadcasters: TVNZ, CanWest, M\u0101ori Television, the TAB and Radio New Zealand have forged an alliance called FreeView which has leased satellite space for the digital television. Digital television will mean viewers can receive a crisper picture, clearer radio signals, limited reception problems, and more channels. It will require television viewers to buy a set top box, similar to the SKY Network Television decoder. Some viewers in some areas will need to buy a satellite dish as well. The approximated cost will be $200 or, with a dish, $400 (NZD) , however there is no subscription costs , unlike Sky Television.", "after_revision": "The broadcasters: TVNZ, CanWest, M\u0101ori Television, the TAB and Radio New Zealand have forged an alliance called FreeView which has leased satellite space for the digital television. Digital television will mean viewers can receive a crisper picture, clearer radio signals, limited reception problems, and more channels. FreeView will require television viewers to buy a set top box, similar to the SKY Network Television decoder. Some viewers in some areas will need to buy a satellite dish as well. The approximated cost will be $200 or, with a dish, $400 (NZD) . However, there is no subscription cost , unlike Sky Television.", "edit_actions": [{"type": "R", "before": "It", "after": "FreeView", "start_char_pos": 320, "end_char_pos": 322}, {"type": "R", "before": ", however", "after": ". However,", "start_char_pos": 557, "end_char_pos": 566}, {"type": "R", "before": "costs", "after": "cost", "start_char_pos": 592, "end_char_pos": 597}], "sents_char_pos": [0, 181, 319, 423, 493]}
+{"doc_id": "43757", "revision_depth": "1", "before_revision": "Australia defeated Ireland 37 points to 15 at Subiaco Oval in Perth, Australia on Saturday in a rugby union test match. The Wallabies had just come of a successful two test series win over England whilst the Irish had come off two competitive losses against the All Blacks in New Zealand. The win makes it three from three for new Australian coach John Connolly. The scoring opened up after 13 minutes of play, with Australia being awarded a penalty. Stirling Mortlock was successful with the shot at goal to take Australia to a three to nil lead. Ireland successfully held out Australia for the following ten minutes, until Chris Latham dived over to score the first try of the match. Mortlock missed the conversion , and Australia now lead eight points to nil. Ireland are awarded a penalty in the 29th minute which sees Ronan O'Gara successfully kick a goal for Ireland, getting their first points of the game to take the score to eight to three, with Australia having a five point lead. Australia further their lead when Mortlock is successful with another penalty goal around five minutes before half-time . The teams entered half-time , with Australia in front, 11 points to three. Ireland are quick to get back into the match, with a try to O'Gara in the 42nd minute. Although the conversion is missed, Ireland have moved closer to Australia, with the score narrowed to 11 poins to eight. Ireland score again in the 51st minute, with Neil Best scoring a try, and along with O'Gara's successful conversion, Ireland are now in front, 15 to 11, with just under 30 minutes remaining in the match. Australia are quick to respond, with Mark Gerrard scoring a try a few minutes later. Mortlock is successful with the conversion, and Australia take back the lead, with the score now at 18 to 11. Prop Greg Holmes gathers a loose ball and runs over 50m to score for Australia. Mortlock converts and Australia lead 25 to 15 with around 20 minutes remaining. George Gregan scores a try for Australia in the 67th minute, with Mortlock missing the conversion, Australia are now leading 30 to 15, making an Irish comeback unlikely, with just over ten minutes left in the match. Cameron Shepherd scores the last try of the match, which is converted by Mortlock, making the final score 37 to 15.", "after_revision": "Australia defeated Ireland 37 points to 15 at Subiaco Oval in Perth, Australia on Saturday in a rugby union test match. The Wallabies had just come of a successful two test series win over England whilst the Irish had come from two competitive losses against the All Blacks in New Zealand. The win makes it three from three for new Australian coach John Connolly. The scoring opened after 13 minutes of play, with Australia being awarded a penalty. Stirling Mortlock was successful with the shot at goal to take Australia to a three to nil lead. Ireland successfully held Australia for the following ten minutes, until Chris Latham dived over to score the first try of the match. Mortlock missed the conversion and Australia led eight points to nil. Ireland is awarded a penalty in the 29th minute which sees Ronan O'Gara successfully kick a goal for Ireland, getting its first points of the game bringing the score to eight to three, with Australia having a five point lead. Australia furthers its lead when Mortlock is successful with another penalty goal around five minutes before half time . The teams entered half time , with Australia in front, 11 points to three. Ireland is quick to get back into the match, with a try to O'Gara in the 42nd minute. Although the conversion is missed, Ireland has moved closer to Australia, with the score narrowed to 11 points to eight. Ireland scores again in the 51st minute, with Neil Best scoring a try, and along with O'Gara's successful conversion, Ireland is now in front, 15 to 11, with just under 30 minutes remaining in the match. Australia is quick to respond, with Mark Gerrard scoring a try a few minutes later. Mortlock is successful with the conversion, and Australia takes back the lead, with the score now at 18 to 11. Prop Greg Holmes gathers a loose ball and runs over 50m to score for Australia. Mortlock converts and Australia leads 25 to 15 with around 20 minutes remaining. George Gregan scores a try for Australia in the 67th minute, with Mortlock missing the conversion, Australia now leads 30 to 15, making an Irish comeback unlikely, with just over ten minutes left in the match. Cameron Shepherd scores the last try of the match, which is converted by Mortlock, making the final score 37 to 15.", "edit_actions": [{"type": "R", "before": "off", "after": "from", "start_char_pos": 223, "end_char_pos": 226}, {"type": "D", "before": "up", "after": null, "start_char_pos": 382, "end_char_pos": 384}, {"type": "D", "before": "out", "after": null, "start_char_pos": 574, "end_char_pos": 577}, {"type": "R", "before": ", and Australia now lead", "after": "and Australia led", "start_char_pos": 717, "end_char_pos": 741}, {"type": "R", "before": "are", "after": "is", "start_char_pos": 771, "end_char_pos": 774}, {"type": "R", "before": "their", "after": "its", "start_char_pos": 882, "end_char_pos": 887}, {"type": "R", "before": "to take", "after": "bringing", "start_char_pos": 913, "end_char_pos": 920}, {"type": "R", "before": "further their", "after": "furthers its", "start_char_pos": 1001, "end_char_pos": 1014}, {"type": "R", "before": "half-time", "after": "half time", "start_char_pos": 1101, "end_char_pos": 1110}, {"type": "R", "before": "half-time", "after": "half time", "start_char_pos": 1131, "end_char_pos": 1140}, {"type": "R", "before": "are", "after": "is", "start_char_pos": 1196, "end_char_pos": 1199}, {"type": "R", "before": "have", "after": "has", "start_char_pos": 1318, "end_char_pos": 1322}, {"type": "R", "before": "poins", "after": "points", "start_char_pos": 1380, "end_char_pos": 1385}, {"type": "R", "before": "score", "after": "scores", "start_char_pos": 1404, "end_char_pos": 1409}, {"type": "R", "before": "are", "after": "is", "start_char_pos": 1521, "end_char_pos": 1524}, {"type": "R", "before": "are", "after": "is", "start_char_pos": 1610, "end_char_pos": 1613}, {"type": "R", "before": "take", "after": "takes", "start_char_pos": 1743, "end_char_pos": 1747}, {"type": "R", "before": "lead", "after": "leads", "start_char_pos": 1907, "end_char_pos": 1911}, {"type": "R", "before": "are now leading", "after": "now leads", "start_char_pos": 2064, "end_char_pos": 2079}], "sents_char_pos": [0, 119, 288, 362, 450, 547, 685, 762, 990, 1112, 1187, 1274, 1395, 1599, 1684, 1794, 1874, 1954, 2170]}
+{"doc_id": "45802", "revision_depth": "1", "before_revision": "REDIRE ", "after_revision": "From the studios of Robinson Telephone Company in Arlington, Virginia, I'm Paul Robinson. Today is Sunday, , and the time is 23:30 Universal Coordinated Time. This is Wikinews. (Sound Effect) Here are the stories that are being covered: Karl Rove named as source who disclosed an undercover US CIA agent's identity. The nation of Papua New Guinea is at risk of an African-level HIV/AIDS epidemic Gaylord Nelson, creator of the Earth Day annual environmental event dies at 89. Alleged Al-Qaeda leader killed in Saudi Arabia. Karla Homolka release from prison has Canada in an uproar. Underwater volcano erupts 1400 kilometers from Tokyo. U.S. Government to retain control of the root servers of the Internet. Scientists may have tests to detect Alzheimers. Two American pilots successfully recreate a 1919 cross-Atlantic flight. Today in History from Wikipedia. And now, these stories Karl Rove named as source of Plame leak Reporter's notes subpoenaed by the U.S. District Court in Washington, D.C. reveal United States President George W. Bush's chief political advisor Karl Rove as one of the two sources behind the leaking of the identity of undercover CIA agent Valerie Plame. Knowingly revealing the identity of an undercover CIA official is a crime in the United States. The notes are those of TIME magazine White House correspondent Matt Cooper. They were released by Norman Pearlstine, editor-in-chief of TIME Inc., by order of the court, in ruling that, in the case of leaking the identity of CIA agents, reporters must reveal the identity of their sources. Judith Miller of The New York Times, along with Cooper, could face jail time for their refusal to name anonymous sources.
Papua New Guinea at risk of AIDS epidemic Dr. Peter Piot, head of U.N. AIDS agency, told The Associated Press on the sidelines of a regional AIDS conference Sunday about the potential for an explosion in HIV and AIDS cases in the country of Papua New Guinea. He said the country is \"the one that I would see that could have an African-type of epidemic\" and that the danger of HIV and AIDS there \"is really getting out of hand.\" He also said other Asia-Pacific nations like Malaysia, Vietnam and Myanmar are also worrisome as the number of infections there continue to rise.
Earth Day founder Nelson dies at 89 Gaylord Nelson, founder of Earth Day, died Sunday in Kensington, Maryland, of cardiovascular failure. Nelson, who was 89, was also a governor and senator from the U.S. state of Wisconsin. He created the concept of an annual recognition of environmental causes at a speech in Seattle in September 1969, and the first Earth Day was celebrated on April 22, 1970. In 1995, Nelson was awarded the Presidential Medal of Freedom for his environmental efforts by U.S. President Bill Clinton.
Alleged Al-Qaeda leader killed in Saudi Arabia Younis Mohammad Ibrahim al-Hayyari, who was believed to be one of the top leaders of Al-Qaeda, died after exchanging fire and hurling hand grenades at Saudi Arabian police in Riyadh. Hayyari's name was at the top of a list of 36 al Qaeda suspects announced by Riyadh last week. The ministry of the Interior said he had helped prepare explosives and had played a part in several attacks on targets there. Saudi Arabia has been battling suspected al Qaida militants for two years since May 2003, when they launched their campaign of violence with triple suicide bombings at expatriate housing compounds in Riyadh. Successive leaders of the Saudi wing of al Qaida have been killed since 2003 and Saudi officials say their replacements are increasingly inexperienced. But Western counterterrorism experts say al Qaida has shown a resilience and ability to regenerate.
Canada awaits Karla Homolka's Release from Prison Karla Homolka has transfixed Canada since she helped her husband drug, rape, torture, videotape and kill two teenage girls and cause the death of her own sister. Homolka, 35, will be released sometime before tuesday after serving the full sentence of 12 years in prison for manslaughter. According to press accounts of her childhood, Homolka was just 17, a bright 11th-grader, when she met Paul Bernardo, 23, a charming and handsome man, in 1987. Bernardo would ultimately be found by police to be a serial rapist, with sometime-assistance from Homolka. Homolka struck a bargain with prosecutors to plead guilty to two counts of manslaughter and testify against her husband, and fears she will be the target of vigilantes angry about what many Canadians consider the \"deal with the devil\" that's to blame for her imminent release.
Underwater volcano erupts in Pacific near Japan An underwater volcano has erupted in the Pacific Ocean, about 1400 kilometers south of Tokyo. A plume of steam, rising more than 1100 meters into the air, was spotted by Japanese troops on the island of Iwo Jima, which is about 48 kilometers from the eruption. The last undersea eruption in the area lasted three days back in 1986. U.S. retains control of Internet root servers The United States decided on Friday to indefinitely retain control the 13 root servers that direct all internet traffic to the right locations. This decision drew concern from foreign officials who would rather see an international group such as ICANN oversee the control of the servers. David Gross, a U.S. ambassador and the coordinator for international communications and information policies of the US State Department, insists that the announcement was not related to U.N. discussions. This decision reverses a statement made by the United States in 1998 in which they said would hand power over to ICANN after meeting a number of set conditions. A spokesman said that the declaration was in response to growing security threats and global communications and to the fact that commerce is becoming more reliant on the Internet.
Scientists may have tests to detect Alzheimers It is believed that magnetic resonance spectroscopy can detect genetic flaws which are an almost certain guarantee that the person will develop Alzheimers disease later in life. Scientists have also used positron emission tomography, or PET scans to see if Alzheimers disease developed in some test subjects. Another study determined that blood levels of a protein called amyloid beta 42 drops three to five years before a patient was diagnosed with Alzheimer\u2019s. It was also found that Japanese-Americans who drank the most fruit and vegetable juice had a fourfold lower risk of developing Alzheimer\u2019s. One researcher found that moderate drinkers of alcohol had a lower risk of Alzheimer\u2019s than either non-drinkers or heavy drinkers. Re-attempt of 1919 Cross-Atlantic Flight is Successful Steve Fossett and his co-pilot Mark Rebholz successfully flew a custom-built replica biplane across the Atlantic from St. John's, Newfoundland and landed Sunday at a golf course in Clifden, western Ireland. The trip took approximately 17 hours, 45 minutes longer than the original flight back in June 1919, by British pilots John Alcock and Arthur Whitten-Brown, who on their original trip, crash landed in a swamp. Mr. Fossett, who is 60 and already holds world records in five pursuits, decided to try an aircraft that lacked such modern conveniences as power steering.
Today in History from Wikipedia Today is Sunday, July 3, 2005. Today is the 184th day of the year. There are 181 days remaining in this year. Here are some of the events that happened today in history:
In 1608, the City of Quebec was founded by Samuel de Champlain. In 1886, the New York Tribune becomes the first newspaper to use a linotype machine, eliminating typesetting by hand. In 1890, Idaho was admitted as the 43rd U.S. state. This was the day in 1935 that Andr\u00e9 Citro\u00ebn, the French automobile pioneer, died. American actor Tom Cruise was born on this day in 1962. And in 1976, Israeli commandos rescued 105 hostages at Entebbe Airport, Uganda.
(Closing Comments) Thank you for joining us for today's segment. Join us again tomorrow for more headlines, news, facts, and anniversaries.
I'm Paul Robinson. This report is in the public domain.
If you wish to contact the staff of this broadcast, please send an email to audiowikinews@gmail.com. If you wish to contribute to Wikinews, please visit www.wikinews.org, or call United States telephone number, area code 206, 339-WIKI, that's 206-339-9454. Wikinews is a nonprofit independent news site run by the non-profit Wikimedia Foundation", "edit_actions": [{"type": "R", "before": "REDIRE", "after": "From the studios of Robinson Telephone Company in Arlington, Virginia, I'm Paul Robinson. Today is Sunday, , and the time is 23:30 Universal Coordinated Time. This is Wikinews. (Sound Effect)", "start_char_pos": 0, "end_char_pos": 6}, {"type": "A", "before": null, "after": "Here are the stories that are being covered:", "start_char_pos": 7, "end_char_pos": 7}, {"type": "A", "before": null, "after": "Karl Rove named as source who disclosed an undercover US CIA agent's identity. The nation of Papua New Guinea is at risk of an African-level HIV/AIDS epidemic Gaylord Nelson, creator of the Earth Day annual environmental event dies at 89. Alleged Al-Qaeda leader killed in Saudi Arabia. Karla Homolka release from prison has Canada in an uproar. Underwater volcano erupts 1400 kilometers from Tokyo. U.S. Government to retain control of the root servers of the Internet. Scientists may have tests to detect Alzheimers. Two American pilots successfully recreate a 1919 cross-Atlantic flight. Today in History from Wikipedia.", "start_char_pos": 8, "end_char_pos": 8}, {"type": "A", "before": null, "after": "And now, these stories", "start_char_pos": 9, "end_char_pos": 9}, {"type": "A", "before": null, "after": "Karl Rove named as source of Plame leak Reporter's notes subpoenaed by the U.S. District Court in Washington, D.C. reveal United States President George W. Bush's chief political advisor Karl Rove as one of the two sources behind the leaking of the identity of undercover CIA agent Valerie Plame. Knowingly revealing the identity of an undercover CIA official is a crime in the United States. The notes are those of TIME magazine White House correspondent Matt Cooper. They were released by Norman Pearlstine, editor-in-chief of TIME Inc., by order of the court, in ruling that, in the case of leaking the identity of CIA agents, reporters must reveal the identity of their sources. Judith Miller of The New York Times, along with Cooper, could face jail time for their refusal to name anonymous sources.
", "start_char_pos": 10, "end_char_pos": 10}, {"type": "A", "before": null, "after": "Papua New Guinea at risk of AIDS epidemic Dr. Peter Piot, head of U.N. AIDS agency, told The Associated Press on the sidelines of a regional AIDS conference Sunday about the potential for an explosion in HIV and AIDS cases in the country of Papua New Guinea. He said the country is \"the one that I would see that could have an African-type of epidemic\" and that the danger of HIV and AIDS there \"is really getting out of hand.\" He also said other Asia-Pacific nations like Malaysia, Vietnam and Myanmar are also worrisome as the number of infections there continue to rise.
", "start_char_pos": 11, "end_char_pos": 11}, {"type": "A", "before": null, "after": "Earth Day founder Nelson dies at 89 Gaylord Nelson, founder of Earth Day, died Sunday in Kensington, Maryland, of cardiovascular failure. Nelson, who was 89, was also a governor and senator from the U.S. state of Wisconsin. He created the concept of an annual recognition of environmental causes at a speech in Seattle in September 1969, and the first Earth Day was celebrated on April 22, 1970. In 1995, Nelson was awarded the Presidential Medal of Freedom for his environmental efforts by U.S. President Bill Clinton.
", "start_char_pos": 12, "end_char_pos": 12}, {"type": "A", "before": null, "after": "Alleged Al-Qaeda leader killed in Saudi Arabia Younis Mohammad Ibrahim al-Hayyari, who was believed to be one of the top leaders of Al-Qaeda, died after exchanging fire and hurling hand grenades at Saudi Arabian police in Riyadh. Hayyari's name was at the top of a list of 36 al Qaeda suspects announced by Riyadh last week. The ministry of the Interior said he had helped prepare explosives and had played a part in several attacks on targets there. Saudi Arabia has been battling suspected al Qaida militants for two years since May 2003, when they launched their campaign of violence with triple suicide bombings at expatriate housing compounds in Riyadh. Successive leaders of the Saudi wing of al Qaida have been killed since 2003 and Saudi officials say their replacements are increasingly inexperienced. But Western counterterrorism experts say al Qaida has shown a resilience and ability to regenerate.
", "start_char_pos": 13, "end_char_pos": 13}, {"type": "A", "before": null, "after": "Canada awaits Karla Homolka's Release from Prison Karla Homolka has transfixed Canada since she helped her husband drug, rape, torture, videotape and kill two teenage girls and cause the death of her own sister. Homolka, 35, will be released sometime before tuesday after serving the full sentence of 12 years in prison for manslaughter. According to press accounts of her childhood, Homolka was just 17, a bright 11th-grader, when she met Paul Bernardo, 23, a charming and handsome man, in 1987. Bernardo would ultimately be found by police to be a serial rapist, with sometime-assistance from Homolka. Homolka struck a bargain with prosecutors to plead guilty to two counts of manslaughter and testify against her husband, and fears she will be the target of vigilantes angry about what many Canadians consider the \"deal with the devil\" that's to blame for her imminent release.
", "start_char_pos": 14, "end_char_pos": 14}, {"type": "A", "before": null, "after": "Underwater volcano erupts in Pacific near Japan An underwater volcano has erupted in the Pacific Ocean, about 1400 kilometers south of Tokyo. A plume of steam, rising more than 1100 meters into the air, was spotted by Japanese troops on the island of Iwo Jima, which is about 48 kilometers from the eruption. The last undersea eruption in the area lasted three days back in 1986.", "start_char_pos": 15, "end_char_pos": 15}, {"type": "A", "before": null, "after": "U.S. retains control of Internet root servers The United States decided on Friday to indefinitely retain control the 13 root servers that direct all internet traffic to the right locations. This decision drew concern from foreign officials who would rather see an international group such as ICANN oversee the control of the servers. David Gross, a U.S. ambassador and the coordinator for international communications and information policies of the US State Department, insists that the announcement was not related to U.N. discussions. This decision reverses a statement made by the United States in 1998 in which they said would hand power over to ICANN after meeting a number of set conditions. A spokesman said that the declaration was in response to growing security threats and global communications and to the fact that commerce is becoming more reliant on the Internet.
", "start_char_pos": 16, "end_char_pos": 16}, {"type": "A", "before": null, "after": "Scientists may have tests to detect Alzheimers It is believed that magnetic resonance spectroscopy can detect genetic flaws which are an almost certain guarantee that the person will develop Alzheimers disease later in life. Scientists have also used positron emission tomography, or PET scans to see if Alzheimers disease developed in some test subjects. Another study determined that blood levels of a protein called amyloid beta 42 drops three to five years before a patient was diagnosed with Alzheimer\u2019s. It was also found that Japanese-Americans who drank the most fruit and vegetable juice had a fourfold lower risk of developing Alzheimer\u2019s. One researcher found that moderate drinkers of alcohol had a lower risk of Alzheimer\u2019s than either non-drinkers or heavy drinkers.", "start_char_pos": 17, "end_char_pos": 17}, {"type": "A", "before": null, "after": "Re-attempt of 1919 Cross-Atlantic Flight is Successful Steve Fossett and his co-pilot Mark Rebholz successfully flew a custom-built replica biplane across the Atlantic from St. John's, Newfoundland and landed Sunday at a golf course in Clifden, western Ireland. The trip took approximately 17 hours, 45 minutes longer than the original flight back in June 1919, by British pilots John Alcock and Arthur Whitten-Brown, who on their original trip, crash landed in a swamp. Mr. Fossett, who is 60 and already holds world records in five pursuits, decided to try an aircraft that lacked such modern conveniences as power steering.
", "start_char_pos": 18, "end_char_pos": 18}, {"type": "A", "before": null, "after": "Today in History from Wikipedia Today is Sunday, July 3, 2005. Today is the 184th day of the year. There are 181 days remaining in this year. Here are some of the events that happened today in history:
In 1608, the City of Quebec was founded by Samuel de Champlain. In 1886, the New York Tribune becomes the first newspaper to use a linotype machine, eliminating typesetting by hand. In 1890, Idaho was admitted as the 43rd U.S. state. This was the day in 1935 that Andr\u00e9 Citro\u00ebn, the French automobile pioneer, died. American actor Tom Cruise was born on this day in 1962. And in 1976, Israeli commandos rescued 105 hostages at Entebbe Airport, Uganda.", "start_char_pos": 19, "end_char_pos": 19}, {"type": "A", "before": null, "after": "
(Closing Comments) Thank you for joining us for today's segment. Join us again tomorrow for more headlines, news, facts, and anniversaries.
I'm Paul Robinson. This report is in the public domain.
If you wish to contact the staff of this broadcast, please send an email to audiowikinews@gmail.com. If you wish to contribute to Wikinews, please visit www.wikinews.org, or call United States telephone number, area code 206, 339-WIKI, that's 206-339-9454. Wikinews is a nonprofit independent news site run by the non-profit Wikimedia Foundation", "start_char_pos": 20, "end_char_pos": 20}], "sents_char_pos": [0]}
+{"doc_id": "45989", "revision_depth": "1", "before_revision": "Some of the nearly one in ten members of the Class of 2006 who still haven \u2019 t passed the CAHSEE weeks after their scheduled graduations, including dozens from James Logan High School \u2019 s Class of 2006, will get another crack at it starting today at high schools around the state, when schools administer an additional last chance two-day test, added to the testing schedule in April in response to the number of seniors who still hadn \u2019 t passed. Meanwhile, California \u2019 s First District Appellate Court of California this morning will begin hearing arguments in a lawsuit that aims to prohibit the state from requiring students to pass the test, and force it to give them the diplomas they currently lack. According to testing statistics released by the California Department of Education, 1,759 California seniors passed the test when they took it in May, the last time the test was administered, bringing the total percentage of last year \u2019 s seniors to pass the test to an estimated 90.8 percent, or 396,201 of 436,374 members of the Class of 2006. State Superintendent of Public Instruction Jack O \u2019 Connell, who wrote the law which required students to pass the test when he was a state legislator, expressed muted pleasure at the results, which indicate a narrowing of the \u201cachievement gap\u201d between racial groups. \"While I will not be satisfied until all California students are successful in gaining the skills measured by the exit exam, I am pleased that the achievement gap is narrowing,\" O \u2019 Connell said. \"It is clear that all students are working hard to gain the critical skills necessary for a diploma and for survival in today \u2019 s global economy. I credit the exit exam for focusing both students and schools on meeting this challenge. We need to sustain this effort until the achievement gap is erased completely.\" \u201c Eighty-five percent of Hispanic students in the Class of 2006 have passed the test, with 19.7 percent passing during the junior year and nearly 11 percent passing in their senior year, \u201d according to a statement released by O \u2019Connell. \u201c By comparison, 11.5 percent of white students passed as juniors and 4.1 percent of white students passed as seniors. Eighty-three percent of African American students have passed the test, with 20.6 percent passing as juniors and 12 percent passing as seniors. \u201d O \u2019 Connell said that the estimated 40,173 students who haven \u2019 t passed the test should not give up trying to get a high school diploma or more education: \"I urge these students to continue to work in summer school, take a fifth year of high school, or study in adult school or community college to acquire those important skills in English and math,\" O \u2019 Connell said. \"This exam benefits students who are still struggling by focusing them on areas they need to strengthen so they can have more successful futures. In court, Arturo Gonzalez, lead attorney in the case, Valenzuela vs. O'Connell, named for Liliana Valenzuela, a Richmond High School student, will try to convince the First Appellate Court of California to uphold a Superior Court judge \u2019 s May ruling blocking the state's use of the test, on the grounds that it \u2019 s use as a graduation requirement was unconstitutional because poor and minority students don't have access to equal educational resources, and therefore don't have equal protection under the law. The judge, Robert Freedman of Alameda County, issued an injunction against the use of the test, briefly giving hope of graduation without passing to thousands of students statewide, but O \u2019 Connell appealed to the state Supreme Court and they stayed the judge \u2019 s injunction, allowing the state to order schools to deny diplomas to those who hadn \u2019 t passed the test. The Supreme Court also ordered the First District Appellate Court to hear the case, which the court scheduled for today. \"If the appellate court affirms the injunction, then any student who has passed all of his or her required courses will receive a high school diploma, \u201d Gonzalez said in an e-mail to the James Logan Courier.", "after_revision": "Some of the nearly one in ten members of the Class of 2006 who still haven ' t passed the CAHSEE weeks after their scheduled graduations, including dozens from James Logan High School ' s Class of 2006, will get another crack at it starting today at high schools around the state, when schools administer an additional last chance two-day test, added to the testing schedule in April in response to the number of seniors who still hadn ' t passed. Meanwhile, California ' s First District Appellate Court of California this morning will begin hearing arguments in a lawsuit that aims to prohibit the state from requiring students to pass the test, and force it to give them the diplomas they currently lack. According to testing statistics released by the California Department of Education, 1,759 California seniors passed the test when they took it in May, the last time the test was administered, bringing the total percentage of last year ' s seniors to pass the test to an estimated 90.8 percent, or 396,201 of 436,374 members of the Class of 2006. State Superintendent of Public Instruction Jack O ' Connell, who wrote the law which required students to pass the test when he was a state legislator, expressed muted pleasure at the results, which indicate a narrowing of the \"achievement gap\" between racial groups. \"While I will not be satisfied until all California students are successful in gaining the skills measured by the exit exam, I am pleased that the achievement gap is narrowing,\" O ' Connell said. \"It is clear that all students are working hard to gain the critical skills necessary for a diploma and for survival in today ' s global economy. I credit the exit exam for focusing both students and schools on meeting this challenge. We need to sustain this effort until the achievement gap is erased completely.\" \" Eighty-five percent of Hispanic students in the Class of 2006 have passed the test, with 19.7 percent passing during the junior year and nearly 11 percent passing in their senior year, \" according to a statement released by O 'Connell. \" By comparison, 11.5 percent of white students passed as juniors and 4.1 percent of white students passed as seniors. Eighty-three percent of African American students have passed the test, with 20.6 percent passing as juniors and 12 percent passing as seniors. \" O ' Connell said that the estimated 40,173 students who haven ' t passed the test should not give up trying to get a high school diploma or more education: \"I urge these students to continue to work in summer school, take a fifth year of high school, or study in adult school or community college to acquire those important skills in English and math,\" O ' Connell said. \"This exam benefits students who are still struggling by focusing them on areas they need to strengthen so they can have more successful futures. \" In court, Arturo Gonzalez, lead attorney in the case, Valenzuela vs. O'Connell, named for Liliana Valenzuela, a Richmond High School student, will try to convince the First Appellate Court of California to uphold a Superior Court judge ' s May ruling blocking the state's use of the test, on the grounds that it ' s use as a graduation requirement was unconstitutional because poor and minority students don't have access to equal educational resources, and therefore don't have equal protection under the law. The judge, Robert Freedman of Alameda County, issued an injunction against the use of the test, briefly giving hope of graduation without passing to thousands of students statewide, but O ' Connell appealed to the state Supreme Court and they stayed the judge ' s injunction, allowing the state to order schools to deny diplomas to those who hadn ' t passed the test. The Supreme Court also ordered the First District Appellate Court to hear the case, which the court scheduled for today. \"If the appellate court affirms the injunction, then any student who has passed all of his or her required courses will receive a high school diploma, \" Gonzalez said in an e-mail to the James Logan Courier.", "edit_actions": [{"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 75, "end_char_pos": 76}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 184, "end_char_pos": 185}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 436, "end_char_pos": 437}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 470, "end_char_pos": 471}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 943, "end_char_pos": 944}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1104, "end_char_pos": 1105}, {"type": "R", "before": "\u201cachievement gap\u201d", "after": "\"achievement gap\"", "start_char_pos": 1281, "end_char_pos": 1298}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1502, "end_char_pos": 1503}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1644, "end_char_pos": 1645}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1833, "end_char_pos": 1834}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2020, "end_char_pos": 2021}, {"type": "R", "before": "\u2019Connell. \u201c", "after": "'Connell. \"", "start_char_pos": 2061, "end_char_pos": 2072}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2334, "end_char_pos": 2335}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2338, "end_char_pos": 2339}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2398, "end_char_pos": 2399}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2691, "end_char_pos": 2692}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2853, "end_char_pos": 2853}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3090, "end_char_pos": 3091}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3166, "end_char_pos": 3167}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3553, "end_char_pos": 3554}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3625, "end_char_pos": 3626}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3712, "end_char_pos": 3713}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 4005, "end_char_pos": 4006}], "sents_char_pos": [0, 447, 707, 1053, 1321, 1517, 1663, 1752, 1832, 2070, 2189, 2333, 2706, 2852, 2922, 3364, 3732, 3853]}
+{"doc_id": "46145", "revision_depth": "1", "before_revision": "220px|This picture shows Saddam Hussein during his first appearance at the Iraqi Special Tribunal. He was the president of Iraq from 1979 until the United States-led invasion of Iraq reached Baghdad on April 9, 2003. The trial of Saddam Hussein has been adjourned until 16 October, which is when the Iraq Special Tribunal is expected to pronounce its judgment. Hussein and seven co-defendants are on trial charged with crimes against humanity after Hussein allegedly ordered his military forces to kill 148 people from the village of Dujail following an attempted assassination of the former Iraqi leader in 1982. The former dictator did not appear in court for the final session of his trial today, but he is due to stand trial on 21 August to judge his part in the infamous Anfal campaign , where groups of Iraqi Kurds were murdered in the 1980s. As Hussein \u2019 s defense team has been boycotting the trial demanding better security after three of their numbers were murdered, the court has selected replacement lawyers. Iraq\u2019s former Vice-President Taha Yassin Ramadan, today refused to allow the appointed representative to stand for him. \u201c I do not know who this lawyer is or his name, \u201d he said. The other defendant was Awad Hamad al-Bandar, the former chief judge of the court. Like he did yesterday, Judge Raouf Abdel Rahman again slated Hussein\u2019s defense lawyers for avoiding the court. \u201cThey\u2019 re sitting abroad now generating fame by issuing political statements on television stations as if this case is a political one. This behavior will harm you, the defendants. This is a criminal case, not a political one, \u201d Mr Rahman warned. Most of Hussein\u2019s legal team is based in Amman , the capital of Jordan.", "after_revision": " The trial of Saddam Hussein has been adjourned until 16 October, which is when the is expected to pronounce its judgment. Hussein and seven co-defendants are on trial charged with after Hussein allegedly ordered his military forces to kill 148 people from the village of following an attempted assassination of the former Iraqi leader in 1982. The former dictator did not appear in court for the final session of his trial today, but he is due to stand trial on 21 August to judge his part in the infamous , where groups of Iraqi were murdered in the 1980s. As Hussein ' s defense team has been boycotting the trial demanding better security after three of their numbers were murdered, the court has selected replacement lawyers. Iraq\u2019s former Vice-President Taha Yassin Ramadan, today refused to allow the appointed representative to stand for him. \" I do not know who this lawyer is or his name, \" he said. The other defendant was Awad Hamad al-Bandar, the former chief judge of the court. Like he did yesterday, Judge Raouf Abdel Rahman again slated Hussein\u2019s defense lawyers for avoiding the court. \"They' re sitting abroad now generating fame by issuing political statements on television stations as if this case is a political one. This behavior will harm you, the defendants. This is a criminal case, not a political one, \" Mr Rahman warned. Most of Hussein\u2019s legal team is based in , the capital of Jordan.", "edit_actions": [{"type": "D", "before": "220px|This picture shows Saddam Hussein during his first appearance at the Iraqi Special Tribunal. He was the president of Iraq from 1979 until the United States-led invasion of Iraq reached Baghdad on April 9, 2003.", "after": null, "start_char_pos": 0, "end_char_pos": 216}, {"type": "D", "before": "Iraq Special Tribunal", "after": null, "start_char_pos": 300, "end_char_pos": 321}, {"type": "D", "before": "crimes against humanity", "after": null, "start_char_pos": 419, "end_char_pos": 442}, {"type": "D", "before": "Dujail", "after": null, "start_char_pos": 534, "end_char_pos": 540}, {"type": "D", "before": "Anfal campaign", "after": null, "start_char_pos": 776, "end_char_pos": 790}, {"type": "D", "before": "Kurds", "after": null, "start_char_pos": 815, "end_char_pos": 820}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 860, "end_char_pos": 861}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1141, "end_char_pos": 1142}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1189, "end_char_pos": 1190}, {"type": "R", "before": "\u201cThey\u2019", "after": "\"They'", "start_char_pos": 1394, "end_char_pos": 1400}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1621, "end_char_pos": 1622}, {"type": "D", "before": "Amman", "after": null, "start_char_pos": 1682, "end_char_pos": 1687}], "sents_char_pos": [0, 98, 216, 360, 613, 848, 1020, 1140, 1199, 1282, 1393, 1529, 1574, 1640]}
+{"doc_id": "46507", "revision_depth": "1", "before_revision": "\u201c I\u2019m proud of him as a soldier and as a son. He did the Army proud, \u201d 60 year-old Robin Cornish said of his son, the one hundred and fifteenth British soldier to be killed in Iraq since operations began in 2003. Cpl Cornish, who served for the 1st Battalion The Light Infantry, joined the Army at the age of eighteen in Leeds. His deployments included Northern Ireland, Sierra Leone and Iraq in 2003 and 2004. He had been touring the country for a third time for three months when he was killed. His father said he would have risen through the ranks: \u201c He would have got on. He was determined to go up the ladder and he would have got there. \u201d Yesterday, Cpl Cornish \u2019 s Commanding Officer, Lietenant Colonel Johnny Bowron, said: \u201c Matthew was a great soldier, a fine friend and a marvellous husband and father. He will be remembered for his heart and his great character. A Yorkshireman through and through and an enthusiastic follower of Leeds Rhinos Rugby League, he was constantly teased for his inexplicable loyalty to Tottenham Hotspur Football Club. \u201d Cpl Cornish leaves behind his wife Abbey, his three-year old son Ethan and his one-year old daughter Libby. Lt Col Bowron said Cpl Cornish \u2019 s true passion was for his family. \u201c They were what lay closest to his heart - the rest was irrelevant. \u201d Des Browne, the Defence Secretary, commented on the loss of life in both Iraq and Afghanistan yesterday. \u201c Our troops are doing a tough job magnificently well. Their courage and commitment demands nothing but admiration. \u201d", "after_revision": "\" I\u2019m proud of him as a soldier and as a son. He did the Army proud, \" 60 year-old Robin Cornish said of his son, the one hundred and fifteenth British soldier to be killed in Iraq since operations began in 2003. Cpl Cornish, who served for the 1st Battalion The Light Infantry, joined the Army at the age of eighteen in Leeds. His deployments included Northern Ireland, Sierra Leone and Iraq in 2003 and 2004. He had been touring the country for a third time for three months when he was killed. His father said he would have risen through the ranks: \" He would have got on. He was determined to go up the ladder and he would have got there. \" Yesterday, Cpl Cornish ' s Commanding Officer, Lieutenant Colonel Johnny Bowron, said: \" Matthew was a great soldier, a fine friend and a marvellous husband and father. He will be remembered for his heart and his great character. A Yorkshire man through and through and an enthusiastic follower of Leeds Rhinos Rugby League, he was constantly teased for his inexplicable loyalty to Tottenham Hotspur Football Club. \" Cpl Cornish leaves behind his wife Abbey, his three-year old son Ethan and his one-year old daughter Libby. Lt Col Bowron said Cpl Cornish ' s true passion was for his family. \" They were what lay closest to his heart - the rest was irrelevant. \" Des Browne, the Defence Secretary, commented on the loss of life in both Iraq and Afghanistan yesterday. \" Our troops are doing a tough job magnificently well. Their courage and commitment demands nothing but admiration. \"", "edit_actions": [{"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 0, "end_char_pos": 1}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 69, "end_char_pos": 70}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 552, "end_char_pos": 553}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 643, "end_char_pos": 644}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 668, "end_char_pos": 669}, {"type": "R", "before": "Lietenant", "after": "Lieutenant", "start_char_pos": 692, "end_char_pos": 701}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 731, "end_char_pos": 732}, {"type": "R", "before": "Yorkshireman", "after": "Yorkshire man", "start_char_pos": 876, "end_char_pos": 888}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1058, "end_char_pos": 1059}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1199, "end_char_pos": 1200}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1236, "end_char_pos": 1237}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1305, "end_char_pos": 1306}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1412, "end_char_pos": 1413}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1528, "end_char_pos": 1529}], "sents_char_pos": [0, 45, 212, 327, 410, 496, 575, 642, 812, 873, 1057, 1167, 1235, 1304, 1411, 1466]}
+{"doc_id": "47188", "revision_depth": "1", "before_revision": "According to BBC NEWS , Merseyside police have apparently been called in and are working with the Crown Prosecution Service. As yet there has been no confirmation that the blog was acting in or had intended to act in a criminal manner. An Earlier article in the Liverpool Echo, had however suggested that some employees of Liverpool City Council felt postings on the blog may be defamatory, a civil rather criminal matter. Liverpool City Council, has so far declined to comment on the sites dissaperance , although the site had been previosuly blocked from the council's IT systems.", "after_revision": "According to BBC News , Merseyside police have apparently been called in and are working with the Crown Prosecution Service. As yet there has been no confirmation that the blog was acting in or had intended to act in a criminal manner. An earlier article in the Liverpool Echo, had however suggested that some employees of Liverpool City Council felt postings on the blog may be defamatory, a civil rather than criminal matter. Liverpool City Council, has so far declined to comment on the sites disappearance , although the site had been previously blocked from the council's IT systems.", "edit_actions": [{"type": "R", "before": "NEWS", "after": "News", "start_char_pos": 17, "end_char_pos": 21}, {"type": "R", "before": "Earlier", "after": "earlier", "start_char_pos": 239, "end_char_pos": 246}, {"type": "A", "before": null, "after": "than", "start_char_pos": 406, "end_char_pos": 406}, {"type": "R", "before": "dissaperance", "after": "disappearance", "start_char_pos": 492, "end_char_pos": 504}, {"type": "R", "before": "previosuly", "after": "previously", "start_char_pos": 534, "end_char_pos": 544}], "sents_char_pos": [0, 124, 235, 423]}
+{"doc_id": "478642", "revision_depth": "1", "before_revision": "The intended outcome of this is more flexible infoboxes, and ability to have multiple classes of infobox which may be re-coloured to make identifying an article's most-importand category easy - all whilst hiding the complexity from contributors. Repeat until flows around infobox ... Some testing going on here. .. Working to move as much CSS as possible for Infoboxes into the master CSS, hence require a sandbox with its own Common. css page where changes can be trialled. The intended outcome of this is more flexible infoboxes, and ability to have multiple classes of infobox which may be re-coloured to make identifying an article's most-importand category easy - all whilst hiding the complexity from contributors.%DIFDELCMD < %DIFDELCMD < %%% Repeat until flows around infobox. . . Some testing going on here. . . Working to move as much CSS as possible for Infoboxes into the master CSS, hence require a sandbox with its own Common. css page where changes can be trialled. The intended outcome of this is more flexible infoboxes, and ability to have multiple classes of infobox which may be re-coloured to make identifying an article's most-importand category easy - all whilst hiding the complexity from contributors. Repeat until flows around infobox. . . Some testing going on here. . . Working to move as much CSS as possible for Infoboxes into the master CSS, hence require a sandbox with its own Common. css page where changes can be trialled. The intended outcome of this is more flexible infoboxes, and ability to have multiple classes of infobox which may be re-coloured to make identifying an article's most-importand category easy - all whilst hiding the complexity from contributors. Repeat until flows around infobox. .. Some testing going on here. .. Working to move as much CSS as possible for Infoboxes into the master CSS, hence require a sandbox with its own Common. css page where changes can be trialled. The intended outcome of this is more flexible infoboxes, and ability to have multiple classes of infobox which may be re-coloured to make identifying an article's most-importand category easy - all whilst hiding the complexity from contributors. Repeat until flows around infobox. .. Some testing going on here. .. Working to move as much CSS as possible for Infoboxes into the master CSS, hence require a sandbox with its own Common. css page where changes can be trialled. The intended outcome of this is more flexible infoboxes, and ability to have multiple classes of infobox which may be re-coloured to make identifying an article's most-importand category easy - all whilst hiding the complexity from contributors. Repeat until flows around infobox. .. Some testing going on here. .. Working to move as much CSS as possible for Infoboxes into the master CSS, hence require a sandbox with its own Common. css page where changes can be trialled. The intended outcome of this is more flexible infoboxes, and ability to have multiple classes of infobox which may be re-coloured to make identifying an article's most-importand category easy - all whilst hiding the complexity from contributors.%DIFDELCMD < %DIFDELCMD < %%% Repeat until flows around infobox. .. Some testing going on here. ..%DIFDELCMD < %DIFDELCMD < %%% Working to move as much CSS as possible for Infoboxes into the master CSS, hence require a sandbox with its own Common. css page where changes can be trialled. The intended outcome of this is more flexible infoboxes, and ability to have multiple classes of infobox which may be re-coloured to make identifying an article's most-importand category easy - all whilst hiding the complexity from contributors.%DIFDELCMD < %DIFDELCMD < %%% Repeat until flows around infobox. .", "after_revision": "The intended outcome of this is more flexible infoboxes, and ability to have multiple classes of infobox which may be re-coloured to make identifying an article's most-importand category easy - all whilst hiding the complexity from contributors. > Filler text ... Bacon ipsum dolor sit amet pork loin anim leberkas cillum laboris. Aliquip speck voluptate, meatball sint brisket corned beef. Rump capicola est flank, tempor dolore beef spare ribs pork loin corned beef chuck in ut nisi. Occaecat chuck frankfurter ex pastrami, ea ut beef in turkey. Cow pork irure flank, ut sunt pig short ribs fatback voluptate spare ribs sed filet mignon. Brisket aute fugiat, deserunt officia sausage eu laborum turducken dolor. Pork loin pork belly chicken consectetur, boudin laboris leberkas bresaola sed sint veniam bacon nostrud. %DIFDELCMD < %DIFDELCMD < %%% Pork belly ex dolore in commodo. Dolore consectetur in cupidatat prosciutto. Fugiat strip steak kielbasa, pork belly short ribs in swine rump. Anim sirloin elit turducken eu adipisicing. Shank velit andouille filet mignon. Pork chop ribeye exercitation beef consequat . Magna pastrami ea strip steak tri-tip pig. Labore anim shank, sirloin proident do dolore minim reprehenderit ribeye. Shank t-bone in sed magna pariatur. Ribeye venison jerky nostrud swine, in tempor leberkas dolore dolore enim sirloin et . Beef ribs enim cow, ullamco laborum laboris exercitation brisket boudin id magna flank meatloaf. Ham veniam brisket beef filet mignon eiusmod. Officia mollit jerky, magna incididunt ea laboris irure et. Velit corned beef leberkas ut strip steak, pork chop spare ribs bresaola venison speck tempor t-bone. Ham hock sunt kielbasa, in incididunt frankfurter jerky swine andouille nisi. Tri-tip veniam cow kielbasa, shank shankle hamburger salami venison. Cupidatat culpa shoulder, turducken et irure strip steak nulla. Kielbasa bresaola pork loin andouille commodo swine. Commodo aute flank excepteur prosciutto boudin cow. Ut flank jerky meatloaf commodo. Filet mignon capicola commodo, consectetur in nulla leberkas dolore brisket bacon fugiat ex elit. Do labore ball tip venison biltong, strip steak speck cupidatat. Cillum velit laboris, flank drumstick elit commodo irure voluptate eu aute ham hock bresaola. Turducken non short ribs beef strip steak, chuck flank. Voluptate quis qui venison. Dolor hamburger aute turducken. Quis beef boudin ad, et ullamco filet mignon chuck. Qui reprehenderit eu, kielbasa shankle fatback ut biltong irure commodo t-bone . Ad anim biltong, excepteur officia ground round veniam ham hock deserunt irure tongue id. Pork belly ham hock dolore, tongue dolor pariatur dolore esse brisket elit. Exercitation non velit eiusmod cillum, tail pastrami bresaola swine ut occaecat adipisicing elit. Beef ribs reprehenderit incididunt non, mollit tongue tri-tip cupidatat venison in elit meatloaf. Elit mollit adipisicing, magna consectetur nostrud exercitation ham sunt anim beef shoulder . Tri-tip ut cillum, tenderloin enim ball tip pork qui fatback jowl. Enim nisi meatball, culpa boudin tongue sunt reprehenderit turkey t-bone ut. Ea spare ribs adipisicing cillum. Pig tongue minim, id ut cow strip steak. Turducken consequat pastrami, proident non meatloaf corned beef irure in velit veniam est t-bone swine. Brisket qui venison t-bone, ullamco tongue in. Rump fatback sirloin, proident consectetur reprehenderit commodo. Enim sint filet mignon leberkas shank, speck t-bone laborum aute dolore drumstick. Nulla andouille eiusmod reprehenderit sausage. Corned beef proident bacon deserunt. Jerky ribeye salami tempor shankle tail. Ut tempor eu, venison pastrami pork belly shoulder ham est beef ribs culpa shankle. T-bone in minim flank nulla. Leberkas labore aliquip t-bone, velit minim veniam prosciutto spare ribs laboris voluptate pastrami magna cupidatat. Swine beef tri-tip tenderloin, id adipisicing beef ribs. Boudin quis jerky, eiusmod short loin strip steak leberkas laboris excepteur reprehenderit fugiat meatball chuck. In short loin salami, bacon rump magna t-bone tempor cupidatat. Jerky fugiat pastrami meatball, labore ball tip nostrud tri-tip quis short loin ribeye salami ham hock. Drumstick chicken proident fugiat prosciutto non labore tongue aliquip pig. Pariatur shank spare ribs, dolor ground round sirloin speck incididunt ullamco duis eu do labore. Ex nulla labore, tenderloin swine drumstick cupidatat. Eu est adipisicing, officia speck consectetur excepteur do shoulder. Fugiat drumstick shank tongue duis, jerky dolore swine nostrud anim quis. Fatback sed officia, anim enim pork exercitation andouille filet mignon. Culpa non ball tip, turkey chuck strip steak ut swine dolor shank dolore do. Incididunt pork belly sint duis, commodo adipisicing pork minim meatloaf mollit chuck eiusmod. Sed pancetta aliqua deserunt chuck shankle velit. Shoulder hamburger andouille pig laboris excepteur capicola flank kielbasa. Corned beef culpa prosciutto ribeye sirloin, jowl meatloaf tenderloin fatback boudin turducken ball tip. Fugiat est fatback, officia consequat pork biltong nulla salami jowl. Capicola pig pancetta, aliqua jowl ribeye occaecat. T-bone officia dolore cupidatat reprehenderit. Culpa anim et consectetur, shoulder pork chop enim beef ribs laboris. In ball tip consequat swine, t-bone ribeye incididunt drumstick venison ham dolore dolor. Swine kielbasa tenderloin, ham ut t-bone ex adipisicing. Anim ut dolore incididunt. Ham hock id aliqua qui, speck dolore exercitation drumstick adipisicing. Officia fugiat strip steak, est pork belly meatloaf aute. Ham officia jerky consequat nisi strip steak, spare ribs aliquip leberkas cupidatat in. Flank ball tip cow, est ad fatback exercitation excepteur anim sint ea veniam duis. Tempor sausage sed laboris, reprehenderit speck tail. Qui chuck speck anim sint tempor. Ad quis tri-tip, meatloaf pig capicola nisi nostrud turducken elit reprehenderit. Ut short loin short ribs frankfurter fatback. Ut eu et pastrami do short loin. Pariatur culpa consequat, qui ground round velit turducken labore chuck strip steak aliquip consectetur pork belly ea. Eu ground round bacon, leberkas corned beef minim beef ribs ea voluptate deserunt pork belly. Pastrami bresaola enim, excepteur shank eu tri-tip leberkas strip steak voluptate. In pariatur ribeye pastrami rump, filet mignon minim fugiat. Chuck cow ad hamburger sint rump. T-bone qui chicken, tempor dolore jowl sed excepteur voluptate short ribs elit drumstick ad. Sint tongue qui, chicken aute cupidatat eiusmod salami nisi. Dolore rump duis, beef ut swine aute pork loin pariatur ground round sint. Aliquip tenderloin ea turducken, adipisicing est voluptate brisket ham consequat salami shankle occaecat aliqua. Salami tempor sausage, ea chicken excepteur bresaola flank eu turkey dolore mollit velit reprehenderit proident. Reprehenderit fugiat voluptate sunt, beef ribs nisi duis occaecat jerky ullamco pig incididunt boudin. Strip steak capicola ut, boudin bacon chicken duis minim shank esse proident elit flank. Est consectetur pariatur pork chop, enim capicola pastrami short ribs beef ribs speck bresaola sed filet mignon ut. Veniam bacon filet mignon boudin, aliqua laboris corned beef sunt short loin frankfurter flank shank pariatur. Tongue laboris anim andouille. Chicken capicola leberkas commodo est mollit aliquip, elit incididunt. Shankle venison cow, eu kielbasa capicola et swine do bacon proident nostrud commodo speck excepteur. Reprehenderit venison excepteur hamburger pig. Bacon consectetur salami, sed flank sint pancetta. Corned beef tongue tempor jowl veniam pork. %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% Swine ut est chicken. Kielbasa ground round anim, sint aute drumstick in est ut sed tri-tip strip steak cow. Pork chop t-bone enim, corned beef hamburger short ribs duis esse bacon short loin minim venison boudin do fatback. Shank meatball id proident tail t-bone. Drumstick ut spare ribs shoulder, shank ball tip consequat. Do drumstick culpa consectetur pig elit", "edit_actions": [{"type": "R", "before": "Repeat until flows around infobox", "after": "> Filler text", "start_char_pos": 246, "end_char_pos": 279}, {"type": "R", "before": "Some testing going on here. ..", "after": "Bacon ipsum dolor sit amet pork loin anim leberkas cillum laboris. Aliquip speck voluptate, meatball sint brisket corned beef. Rump capicola est flank, tempor dolore beef spare ribs pork loin corned beef chuck in ut nisi. Occaecat chuck frankfurter ex pastrami, ea ut beef in turkey. Cow pork irure flank, ut sunt pig short ribs fatback voluptate spare ribs sed filet mignon. Brisket aute fugiat, deserunt officia sausage eu laborum turducken dolor. Pork loin pork belly chicken consectetur, boudin laboris leberkas bresaola sed sint veniam bacon nostrud.", "start_char_pos": 284, "end_char_pos": 314}, {"type": "D", "before": "Working to move as much CSS as possible for Infoboxes into the master CSS, hence require a sandbox with its own Common. css page where changes can be trialled.", "after": null, "start_char_pos": 315, "end_char_pos": 474}, {"type": "D", "before": "The intended outcome of this is more flexible infoboxes, and ability to have multiple classes of infobox which may be re-coloured to make identifying an article's most-importand category easy - all whilst hiding the complexity from contributors.", "after": null, "start_char_pos": 475, "end_char_pos": 720}, {"type": "R", "before": "Repeat until flows around infobox.", "after": "Pork belly ex dolore in commodo. Dolore consectetur in cupidatat prosciutto. Fugiat strip steak kielbasa, pork belly short ribs in swine rump. Anim sirloin elit turducken eu adipisicing. Shank velit andouille filet mignon. Pork chop ribeye exercitation beef consequat", "start_char_pos": 750, "end_char_pos": 784}, {"type": "D", "before": ".", "after": null, "start_char_pos": 787, "end_char_pos": 788}, {"type": "R", "before": "Some testing going on here.", "after": "Magna pastrami ea strip steak tri-tip pig. Labore anim shank, sirloin proident do dolore minim reprehenderit ribeye. Shank t-bone in sed magna pariatur. Ribeye venison jerky nostrud swine, in tempor leberkas dolore dolore enim sirloin et", "start_char_pos": 789, "end_char_pos": 816}, {"type": "D", "before": ".", "after": null, "start_char_pos": 819, "end_char_pos": 820}, {"type": "R", "before": "Working to move as much CSS as possible for Infoboxes into the master CSS, hence require a sandbox with its own Common. css page where changes can be trialled.", "after": "Beef ribs enim cow, ullamco laborum laboris exercitation brisket boudin id magna flank meatloaf. Ham veniam brisket beef filet mignon eiusmod. Officia mollit jerky, magna incididunt ea laboris irure et. Velit corned beef leberkas ut strip steak, pork chop spare ribs bresaola venison speck tempor t-bone. Ham hock sunt kielbasa, in incididunt frankfurter jerky swine andouille nisi. Tri-tip veniam cow kielbasa, shank shankle hamburger salami venison. Cupidatat culpa shoulder, turducken et irure strip steak nulla.", "start_char_pos": 821, "end_char_pos": 980}, {"type": "R", "before": "The intended outcome of this is more flexible infoboxes, and ability to have multiple classes of infobox which may be re-coloured to make identifying an article's most-importand category easy - all whilst hiding the complexity from contributors.", "after": "Kielbasa bresaola pork loin andouille commodo swine. Commodo aute flank excepteur prosciutto boudin cow. Ut flank jerky meatloaf commodo. Filet mignon capicola commodo, consectetur in nulla leberkas dolore brisket bacon fugiat ex elit.", "start_char_pos": 981, "end_char_pos": 1226}, {"type": "R", "before": "Repeat until flows around infobox.", "after": "Do labore ball tip venison biltong, strip steak speck cupidatat. Cillum velit laboris, flank drumstick elit commodo irure voluptate eu aute ham hock bresaola. Turducken non short ribs beef strip steak, chuck flank. Voluptate quis qui venison. Dolor hamburger aute turducken. Quis beef boudin ad, et ullamco filet mignon chuck. Qui reprehenderit eu, kielbasa shankle fatback ut biltong irure commodo t-bone", "start_char_pos": 1227, "end_char_pos": 1261}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1264, "end_char_pos": 1265}, {"type": "R", "before": "Some testing going on here.", "after": "Ad anim biltong, excepteur officia ground round veniam ham hock deserunt irure tongue id. Pork belly ham hock dolore, tongue dolor pariatur dolore esse brisket elit. Exercitation non velit eiusmod cillum, tail pastrami bresaola swine ut occaecat adipisicing elit. Beef ribs reprehenderit incididunt non, mollit tongue tri-tip cupidatat venison in elit meatloaf. Elit mollit adipisicing, magna consectetur nostrud exercitation ham sunt anim beef shoulder", "start_char_pos": 1266, "end_char_pos": 1293}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1296, "end_char_pos": 1297}, {"type": "R", "before": "Working to move as much CSS as possible for Infoboxes into the master CSS, hence require a sandbox with its own Common. css page where changes can be trialled.", "after": "Tri-tip ut cillum, tenderloin enim ball tip pork qui fatback jowl. Enim nisi meatball, culpa boudin tongue sunt reprehenderit turkey t-bone ut. Ea spare ribs adipisicing cillum. Pig tongue minim, id ut cow strip steak. Turducken consequat pastrami, proident non meatloaf corned beef irure in velit veniam est t-bone swine. Brisket qui venison t-bone, ullamco tongue in.", "start_char_pos": 1298, "end_char_pos": 1457}, {"type": "R", "before": "The intended outcome of this is more flexible infoboxes, and ability to have multiple classes of infobox which may be re-coloured to make identifying an article's most-importand category easy - all whilst hiding the complexity from contributors.", "after": "Rump fatback sirloin, proident consectetur reprehenderit commodo. Enim sint filet mignon leberkas shank, speck t-bone laborum aute dolore drumstick. Nulla andouille eiusmod reprehenderit sausage. Corned beef proident bacon deserunt. Jerky ribeye salami tempor shankle tail. Ut tempor eu, venison pastrami pork belly shoulder ham est beef ribs culpa shankle.", "start_char_pos": 1458, "end_char_pos": 1703}, {"type": "R", "before": "Repeat until flows around infobox. ..", "after": "T-bone in minim flank nulla. Leberkas labore aliquip t-bone, velit minim veniam prosciutto spare ribs laboris voluptate pastrami magna cupidatat. Swine beef tri-tip tenderloin, id adipisicing beef ribs. Boudin quis jerky, eiusmod short loin strip steak leberkas laboris excepteur reprehenderit fugiat meatball chuck.", "start_char_pos": 1704, "end_char_pos": 1741}, {"type": "R", "before": "Some testing going on here. ..", "after": "In short loin salami, bacon rump magna t-bone tempor cupidatat. Jerky fugiat pastrami meatball, labore ball tip nostrud tri-tip quis short loin ribeye salami ham hock. Drumstick chicken proident fugiat prosciutto non labore tongue aliquip pig. Pariatur shank spare ribs, dolor ground round sirloin speck incididunt ullamco duis eu do labore. Ex nulla labore, tenderloin swine drumstick cupidatat. Eu est adipisicing, officia speck consectetur excepteur do shoulder. Fugiat drumstick shank tongue duis, jerky dolore swine nostrud anim quis.", "start_char_pos": 1742, "end_char_pos": 1772}, {"type": "R", "before": "Working to move as much CSS as possible for Infoboxes into the master CSS, hence require a sandbox with its own Common. css page where changes can be trialled.", "after": "Fatback sed officia, anim enim pork exercitation andouille filet mignon. Culpa non ball tip, turkey chuck strip steak ut swine dolor shank dolore do. Incididunt pork belly sint duis, commodo adipisicing pork minim meatloaf mollit chuck eiusmod. Sed pancetta aliqua deserunt chuck shankle velit. Shoulder hamburger andouille pig laboris excepteur capicola flank kielbasa. Corned beef culpa prosciutto ribeye sirloin, jowl meatloaf tenderloin fatback boudin turducken ball tip.", "start_char_pos": 1773, "end_char_pos": 1932}, {"type": "R", "before": "The intended outcome of this is more flexible infoboxes, and ability to have multiple classes of infobox which may be re-coloured to make identifying an article's most-importand category easy - all whilst hiding the complexity from contributors.", "after": "Fugiat est fatback, officia consequat pork biltong nulla salami jowl. Capicola pig pancetta, aliqua jowl ribeye occaecat. T-bone officia dolore cupidatat reprehenderit. Culpa anim et consectetur, shoulder pork chop enim beef ribs laboris.", "start_char_pos": 1933, "end_char_pos": 2178}, {"type": "R", "before": "Repeat until flows around infobox. ..", "after": "In ball tip consequat swine, t-bone ribeye incididunt drumstick venison ham dolore dolor. Swine kielbasa tenderloin, ham ut t-bone ex adipisicing. Anim ut dolore incididunt. Ham hock id aliqua qui, speck dolore exercitation drumstick adipisicing.", "start_char_pos": 2179, "end_char_pos": 2216}, {"type": "R", "before": "Some testing going on here. ..", "after": "Officia fugiat strip steak, est pork belly meatloaf aute. Ham officia jerky consequat nisi strip steak, spare ribs aliquip leberkas cupidatat in. Flank ball tip cow, est ad fatback exercitation excepteur anim sint ea veniam duis. Tempor sausage sed laboris, reprehenderit speck tail. Qui chuck speck anim sint tempor. Ad quis tri-tip, meatloaf pig capicola nisi nostrud turducken elit reprehenderit.", "start_char_pos": 2217, "end_char_pos": 2247}, {"type": "R", "before": "Working to move as much CSS as possible for Infoboxes into the master CSS, hence require a sandbox with its own Common. css page where changes can be trialled.", "after": "Ut short loin short ribs frankfurter fatback. Ut eu et pastrami do short loin. Pariatur culpa consequat, qui ground round velit turducken labore chuck strip steak aliquip consectetur pork belly ea. Eu ground round bacon, leberkas corned beef minim beef ribs ea voluptate deserunt pork belly.", "start_char_pos": 2248, "end_char_pos": 2407}, {"type": "R", "before": "The intended outcome of this is more flexible infoboxes, and ability to have multiple classes of infobox which may be re-coloured to make identifying an article's most-importand category easy - all whilst hiding the complexity from contributors.", "after": "Pastrami bresaola enim, excepteur shank eu tri-tip leberkas strip steak voluptate. In pariatur ribeye pastrami rump, filet mignon minim fugiat. Chuck cow ad hamburger sint rump. T-bone qui chicken, tempor dolore jowl sed excepteur voluptate short ribs elit drumstick ad. Sint tongue qui, chicken aute cupidatat eiusmod salami nisi.", "start_char_pos": 2408, "end_char_pos": 2653}, {"type": "R", "before": "Repeat until flows around infobox. ..", "after": "Dolore rump duis, beef ut swine aute pork loin pariatur ground round sint. Aliquip tenderloin ea turducken, adipisicing est voluptate brisket ham consequat salami shankle occaecat aliqua. Salami tempor sausage, ea chicken excepteur bresaola flank eu turkey dolore mollit velit reprehenderit proident. Reprehenderit fugiat voluptate sunt, beef ribs nisi duis occaecat jerky ullamco pig incididunt boudin. Strip steak capicola ut, boudin bacon chicken duis minim shank esse proident elit flank. Est consectetur pariatur pork chop, enim capicola pastrami short ribs beef ribs speck bresaola sed filet mignon ut. Veniam bacon filet mignon boudin, aliqua laboris corned beef sunt short loin frankfurter flank shank pariatur.", "start_char_pos": 2654, "end_char_pos": 2691}, {"type": "R", "before": "Some testing going on here. ..", "after": "Tongue laboris anim andouille. Chicken capicola leberkas commodo est mollit aliquip, elit incididunt. Shankle venison cow, eu kielbasa capicola et swine do bacon proident nostrud commodo speck excepteur. Reprehenderit venison excepteur hamburger pig. Bacon consectetur salami, sed flank sint pancetta. Corned beef tongue tempor jowl veniam pork.", "start_char_pos": 2692, "end_char_pos": 2722}, {"type": "D", "before": "Working to move as much CSS as possible for Infoboxes into the master CSS, hence require a sandbox with its own Common. css page where changes can be trialled.", "after": null, "start_char_pos": 2723, "end_char_pos": 2882}, {"type": "D", "before": "The intended outcome of this is more flexible infoboxes, and ability to have multiple classes of infobox which may be re-coloured to make identifying an article's most-importand category easy - all whilst hiding the complexity from contributors.", "after": null, "start_char_pos": 2883, "end_char_pos": 3128}, {"type": "D", "before": "Repeat until flows around infobox. ..", "after": null, "start_char_pos": 3158, "end_char_pos": 3195}, {"type": "D", "before": "Some testing going on here. ..", "after": null, "start_char_pos": 3196, "end_char_pos": 3226}, {"type": "D", "before": "Working to move as much CSS as possible for Infoboxes into the master CSS, hence require a sandbox with its own Common. css page where changes can be trialled.", "after": null, "start_char_pos": 3256, "end_char_pos": 3415}, {"type": "D", "before": "The intended outcome of this is more flexible infoboxes, and ability to have multiple classes of infobox which may be re-coloured to make identifying an article's most-importand category easy - all whilst hiding the complexity from contributors.", "after": null, "start_char_pos": 3416, "end_char_pos": 3661}, {"type": "R", "before": "Repeat until flows around infobox. .", "after": "Swine ut est chicken. Kielbasa ground round anim, sint aute drumstick in est ut sed tri-tip strip steak cow. Pork chop t-bone enim, corned beef hamburger short ribs duis esse bacon short loin minim venison boudin do fatback. Shank meatball id proident tail t-bone. Drumstick ut spare ribs shoulder, shank ball tip consequat. Do drumstick culpa consectetur pig elit", "start_char_pos": 3691, "end_char_pos": 3727}], "sents_char_pos": [0, 245, 283, 314, 474, 720, 980, 1226, 1457, 1703, 1741, 1772, 1932, 2178, 2216, 2247, 2407, 2653, 2691, 2722, 2882, 3128, 3195, 3226, 3415, 3661]}
+{"doc_id": "48086", "revision_depth": "1", "before_revision": "In a speech in South London this morning, Communities Secretary Ruth Kelly has urged local communities to \u201croot out\u201d fanaticism. She was speaking as head of the government \u2019 s Commission on Integration and Cohesion. The commission was established to enhance community relations after the 7 July bomb attacks in London last year, and it will investigate how tensions between people of different ethnic groups and religions can be countered. \u201c Alongside the debate, we need action at all levels - national, but even more importantly from local communities themselves to help build united communities and root out all forms of extremism, \u201d Ms Kelly said. She also warned that communities were becoming more and more secluded from each other. \u201c In our attempt to avoid imposing a single British identity and culture, have we ended up with some communities living in isolation from each other with no common bonds between them? \u201d she asked. On the subject of immigration, Ms Kelly said it is not racist to discuss the issue. \u201c We need a well-managed system of immigration that has clear rules and integrity to counter exploitations from the far right. \u201d She also acknowledged that international events are having an impact on community relations. \u201c Global tensions are being reflected on the streets of local communities, \u201d she said. Damian Green, the Conservative Party \u2019 s spokesman on immigration , said: \u201c There is a huge and vital challenge to be met in helping Britain's Muslim communities integrate fully with the rest of society. We hope that this latest government initiative has more substance than previous initiatives which have tended to grab a headline but then achieve very little in the long term. \u201d", "after_revision": "In a speech in South London this morning, Communities Secretary Ruth Kelly has urged local communities to \"root out\" fanaticism. She was speaking as head of the government ' s Commission on Integration and Cohesion. The commission was established to enhance community relations after the 7 July bomb attacks in London last year, and it will investigate how tensions between people of different ethnic groups and religions can be countered. \" Alongside the debate, we need action at all levels - national, but even more importantly from local communities themselves to help build united communities and root out all forms of extremism, \" Ms Kelly said. She also warned that communities were becoming more and more secluded from each other. \" In our attempt to avoid imposing a single British identity and culture, have we ended up with some communities living in isolation from each other with no common bonds between them? \" she asked. On the subject of immigration, Ms Kelly said it is not racist to discuss the issue. \" We need a well-managed system of immigration that has clear rules and integrity to counter exploitations from the far right. \" She also acknowledged that international events are having an impact on community relations. \" Global tensions are being reflected on the streets of local communities, \" she said. Damian Green, the Conservative Party ' s spokesman on immigration said, \" There is a huge and vital challenge to be met in helping Britain's Muslim communities integrate fully with the rest of society. We hope that this latest government initiative has more substance than previous initiatives which have tended to grab a headline but then achieve very little in the long term. \"", "edit_actions": [{"type": "R", "before": "\u201croot out\u201d", "after": "\"root out\"", "start_char_pos": 106, "end_char_pos": 116}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 172, "end_char_pos": 173}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 440, "end_char_pos": 441}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 635, "end_char_pos": 636}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 739, "end_char_pos": 740}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 923, "end_char_pos": 924}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1020, "end_char_pos": 1021}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1147, "end_char_pos": 1148}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1242, "end_char_pos": 1243}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1317, "end_char_pos": 1318}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1366, "end_char_pos": 1367}, {"type": "R", "before": ", said: \u201c", "after": "said, \"", "start_char_pos": 1395, "end_char_pos": 1404}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1709, "end_char_pos": 1710}], "sents_char_pos": [0, 128, 215, 439, 651, 738, 922, 935, 1019, 1146, 1241, 1328, 1532]}
+{"doc_id": "48094", "revision_depth": "1", "before_revision": "Pluto's diameter is about 18\\% that of Earth. Today, astronomers have endorsed a proposal about the definition of the word \"planet\" . As a consequence, our solar system now counts only 8 planets . They are Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus and Neptune. Pluto no longer meets the criteria and loses its planet status, but becomes the prototype of a distinct class of dwarf planets . Ceres and 2003 UB313 also have been recognised as dwarf planets. Charon , which was previously in the run for promotion, did not meet the final criteria for a dwarf planet. Some 2500 astronomers from over 75 countries gathered this week in Prague at the Congress of the International Astronomical Union (IAU) to decide on several issues like a formal definition of a planet. Previously, there was no definition and with the discovery of new objects beyond Pluto there was much need for a clear criterion. The scientists also discussed new research findings in their field. The final draft states: \"A planet is a celestial body that is in orbit around the Sun has sufficient mass for its self-gravity to overcome rigid body forces so that it assumes a hydrostatic equilibrium (nearly round) shape has cleared the neighbourhood around its orbit. A dwarf planet is a celestial body that is in orbit around the Sun, has sufficient mass for its self-gravity to overcome rigid body forces so that it assumes a hydrostatic equilibrium (nearly round) shape, has not cleared the neighbourhood around its orbit, is not a satellite . Pluto did not meet one of the criteria for planet: its orbit is higly eccentric , causing it to overlap with Neptune's. The IAU has a dozen other objects similar to Pluto on its \"watchlist\" and is expected to announce new dwarf planets in the coming months and years. Ever since its discovery by American Clyde Tombaugh in 1930, Pluto has been considered a planet, though its status has been questioned many times after it was discovered to be far less massive than earlier calculations suggested, and because of its many other eccentricities. As a consequence of the vote, many textbooks, encyclopedias and other sources will need rewriting.", "after_revision": "Today, have endorsed a proposal about the . As a consequence, our solar system now counts only 8 . They are , , , , , , , and . no longer meets the criteria and loses its planet status, but becomes the prototype of a distinct class of . and also have been recognised as dwarf planets. , which was previously in the run for promotion, did not meet the final criteria for a dwarf planet. Some 2500 astronomers from over 75 countries gathered this week in at the Congress of the (IAU) to decide on several issues like a formal definition of a planet. Previously, there was no definition and with the discovery of new objects beyond Pluto there was much need for a clear criterion. The scientists also discussed new research findings in their field. The final draft states: \"A planet is a celestial body that is in orbit around the has sufficient mass for its self- to overcome so that it assumes a (nearly round) shape has around its orbit. A dwarf planet is a celestial body that is in orbit around the Sun, has sufficient mass for its self-gravity to overcome rigid body forces so that it assumes a hydrostatic equilibrium (nearly round) shape, has not cleared the neighbourhood around its orbit, is not a . Pluto did not meet one of the criteria for planet: its is highly , causing it to overlap with Neptune's. The IAU has a dozen other objects similar to Pluto on its \"watchlist\" and is expected to announce new dwarf planets in the coming months and years. Ever since its discovery by American in 1930, Pluto has been considered a planet, though its status has been questioned many times after it was discovered to be far less massive than earlier calculations suggested, and because of its many other eccentricities. As a consequence of the vote, many textbooks, encyclopedias and other sources will need rewriting.", "edit_actions": [{"type": "R", "before": "Pluto's diameter is about 18\\% that of Earth. Today, astronomers", "after": "Today,", "start_char_pos": 0, "end_char_pos": 64}, {"type": "D", "before": "definition of the word \"planet\"", "after": null, "start_char_pos": 100, "end_char_pos": 131}, {"type": "D", "before": "planets", "after": null, "start_char_pos": 187, "end_char_pos": 194}, {"type": "R", "before": "Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus and Neptune. Pluto", "after": ", , , , , , , and .", "start_char_pos": 206, "end_char_pos": 277}, {"type": "D", "before": "dwarf planets", "after": null, "start_char_pos": 385, "end_char_pos": 398}, {"type": "R", "before": "Ceres and 2003 UB313", "after": "and", "start_char_pos": 401, "end_char_pos": 421}, {"type": "D", "before": "Charon", "after": null, "start_char_pos": 466, "end_char_pos": 472}, {"type": "D", "before": "Prague", "after": null, "start_char_pos": 641, "end_char_pos": 647}, {"type": "D", "before": "International Astronomical Union", "after": null, "start_char_pos": 671, "end_char_pos": 703}, {"type": "D", "before": "Sun", "after": null, "start_char_pos": 1056, "end_char_pos": 1059}, {"type": "R", "before": "self-gravity to overcome rigid body forces", "after": "self- to overcome", "start_char_pos": 1088, "end_char_pos": 1130}, {"type": "D", "before": "hydrostatic equilibrium", "after": null, "start_char_pos": 1152, "end_char_pos": 1175}, {"type": "D", "before": "cleared the neighbourhood", "after": null, "start_char_pos": 1201, "end_char_pos": 1226}, {"type": "D", "before": "satellite", "after": null, "start_char_pos": 1512, "end_char_pos": 1521}, {"type": "R", "before": "orbit is higly eccentric", "after": "is highly", "start_char_pos": 1579, "end_char_pos": 1603}, {"type": "D", "before": "Clyde Tombaugh", "after": null, "start_char_pos": 1829, "end_char_pos": 1843}], "sents_char_pos": [0, 45, 196, 271, 465, 573, 775, 905, 973, 1244, 1643, 1791, 2067]}
+{"doc_id": "48395", "revision_depth": "1", "before_revision": "Iranian president Mahmoud Ahmadinejad inaugurated a heavy-water production plant in Arak , Iran on Saturday, according to reports on Iranian television. The plant is part of the nuclear program of Iran , which the Iranian government says is for peaceful purposes only in the face of accusations by western governments that the country is trying to develop nuclear weapons. The Arak facility, located 150 miles south of Teheran , is part of a larger project of building a heavy-water reactor in the city. The Iranian president has said that it will be used for medical purposes only, and has said that students, scientists, and journalists will be allowed to tour the plant. Construction on the production plant began in 1996. Iran provoked international controversy in April 2006 when it announced an earlier nuclear success: the enrichment of a small amount of uranium to reactor-grade levels (3.5\\% of the isotope uranium-235 using gas centrifuge technology. Concern was raised by some that if Iran was able to scale up its enrichment facilities, they could be used to produce bomb-grade uranium (90\\% uranium-235). Heavy water is the colloquial name for deuterium oxide, 2H2O. To the unaided eye it appears identical to regular water, H2O, but it contains deuterium , a heavy isotope of hydrogen. Among its many uses, it is commonly used as a moderator in certain types of nuclear reactors. It is considered a nuclear proliferation risk because heavy-water production reactors can easily use natural uranium, and in the process transmute it into the element plutonium , which can be reprocessed and used as the fissile core of a nuclear bomb. Heavy-water production reactors have been used for this purpose by India, Israel, Pakistan, North Korea, Russia and USA. There is no evidence that heavy-water power reactors, such as the Canadian-produced CANDU reactor , have been used for military plutonium production, but in theory they can also be used for this purpose, as any uranium reactor will produce certain amounts of plutonium. Critics have charged that current Iranian research reactors do not require the amount of heavy water which the production facility will be able to create. Iran's other controversial reactor site at Bushehr does not require heavy water. Though many of Iran's nuclear facilities do have possible peaceful uses, most of them are considered dual-use technology , which could also be diverted into military purposes. In 2003, the still-developing production site was inspected by a delegation from the International Atomic Energy Agency, the non-proliferation wing of the United Nations in charge of enforcing the Nuclear Non-Proliferation Treaty , of which Iran is a signatory. At the time, Iran claimed the heavy water would be for exporting to other countries, and later clarified that it would be used for a heavy-water reactor in Arak. Iran has claimed that it would have purchased a heavy-water research reactor from abroad but it had been unable to do so, and so had to resort to an indigenous design and construction. Iran claims that the reactor will be used to produce radioisotopes , which have many medical applications. IAEA inspectors questioned this on the basis that the reactor plans they had seen did not have adequate facilities for producing radioisotopes. Iran claimed that the plans were still developing and that the missing facilities, known as hot cells, could not yet be designed without knowing other characteristics of the reactor, and that they were building a separate facility with those capabilities at the same site.", "after_revision": "Iranian president Mahmoud Ahmadinejad inaugurated a production plant in , Iran on Saturday, according to reports on Iranian television. The plant is part of the , which the Iranian government says is for peaceful purposes only in the face of accusations by western governments that the country is trying to develop nuclear weapons. The Arak facility, located 150 miles south of , is part of a larger project of building a heavy-water in the city. The Iranian president has said that it will be used for medical purposes only, and has said that students, scientists, and journalists will be allowed to tour the plant. Construction on the production plant began in 1996. Iran provoked international controversy in April 2006 when it announced an earlier nuclear success: the of a small amount of to reactor-grade levels (3.5\\% of the isotope using technology. Concern was raised by some that if Iran was able to scale up its enrichment facilities, they could be used to produce bomb-grade uranium (90\\% uranium-235). Heavy water is the colloquial name for deuterium oxide, 2H2O. To the unaided eye it appears identical to regular water, H2O, but it contains , a heavy isotope of hydrogen. Among its many uses, it is commonly used as a moderator in certain types of nuclear reactors. It is considered a nuclear proliferation risk because heavy-water production reactors can easily use natural uranium, and in the process transmute it into the element , which can be reprocessed and used as the fissile core of a nuclear bomb. Heavy-water production reactors have been used for this purpose by India, Israel, Pakistan, North Korea, Russia and USA. There is no evidence that heavy-water power reactors, such as the Canadian-produced , have been used for military plutonium production, but in theory they can also be used for this purpose, as any uranium reactor will produce certain amounts of plutonium. Critics have charged that current Iranian research reactors do not require the amount of heavy water which the production facility will be able to create. Iran's other controversial reactor site at does not require heavy water. Though many of Iran's nuclear facilities do have possible peaceful uses, most of them are considered , which could also be diverted into military purposes. In 2003, the still-developing production site was inspected by a delegation from the International Atomic Energy Agency, the non-proliferation wing of the United Nations in charge of enforcing the , of which Iran is a signatory. At the time, Iran claimed the heavy water would be for exporting to other countries, and later clarified that it would be used for a heavy-water reactor in Arak. Iran has claimed that it would have purchased a heavy-water research reactor from abroad but it had been unable to do so, and so had to resort to an indigenous design and construction. Iran claims that the reactor will be used to produce , which have many medical applications. IAEA inspectors questioned this on the basis that the reactor plans they had seen did not have adequate facilities for producing radioisotopes. Iran claimed that the plans were still developing and that the missing facilities, known as hot cells, could not yet be designed without knowing other characteristics of the reactor, and that they were building a separate facility with those capabilities at the same site.", "edit_actions": [{"type": "D", "before": "heavy-water", "after": null, "start_char_pos": 52, "end_char_pos": 63}, {"type": "D", "before": "Arak", "after": null, "start_char_pos": 84, "end_char_pos": 88}, {"type": "D", "before": "nuclear program of Iran", "after": null, "start_char_pos": 178, "end_char_pos": 201}, {"type": "D", "before": "Teheran", "after": null, "start_char_pos": 419, "end_char_pos": 426}, {"type": "D", "before": "reactor", "after": null, "start_char_pos": 483, "end_char_pos": 490}, {"type": "D", "before": "enrichment", "after": null, "start_char_pos": 830, "end_char_pos": 840}, {"type": "D", "before": "uranium", "after": null, "start_char_pos": 862, "end_char_pos": 869}, {"type": "R", "before": "uranium-235 using gas centrifuge", "after": "using", "start_char_pos": 916, "end_char_pos": 948}, {"type": "D", "before": "deuterium", "after": null, "start_char_pos": 1259, "end_char_pos": 1268}, {"type": "D", "before": "plutonium", "after": null, "start_char_pos": 1561, "end_char_pos": 1570}, {"type": "D", "before": "CANDU reactor", "after": null, "start_char_pos": 1851, "end_char_pos": 1864}, {"type": "D", "before": "Bushehr", "after": null, "start_char_pos": 2235, "end_char_pos": 2242}, {"type": "D", "before": "dual-use technology", "after": null, "start_char_pos": 2374, "end_char_pos": 2393}, {"type": "D", "before": "Nuclear Non-Proliferation Treaty", "after": null, "start_char_pos": 2646, "end_char_pos": 2678}, {"type": "D", "before": "radioisotopes", "after": null, "start_char_pos": 3111, "end_char_pos": 3124}], "sents_char_pos": [0, 152, 372, 503, 673, 725, 960, 1117, 1179, 1299, 1393, 1645, 1766, 2036, 2191, 2272, 2448, 2710, 2872, 3057, 3164, 3308]}
+{"doc_id": "48397", "revision_depth": "1", "before_revision": "Richie McCaw knocked on the kick off from Butch James, offside All Blacks then lead to an early penalty kick to Percy Montgomery, giving South Africa a three-nil lead. James kicks another penalty two minutes later giving them a six to nil lead. Daniel Carter then gives the All Blacks their first points with a penalty kick of his own. Fourie du Preez scored the first try of the match in the 10th minute for South Africa. Montgomery misses the conversion and the South Africa now lead 11 to three. After a period of no scoring, Carter kicks another penalty goal in the 18th minute to reduce the gap to 11 to six. Neemia Tialata scores the All Blacks first try off a Carter kick. Carter converts , and the All Blacks move ahead to 13 to 11. On halftime the All Blacks are given a penalty, 60m away from the South African line. An ambitious Carter goes for the kick, and is successful, and the All Blacks go into the break 16 to 11. Carter gets the first points of the second half with another penalty goal inthe 43rd minute. Luke McAlister extends the All Blacks lead a few minutes later with a try of his own, and with Carters conversion, the All Blacks now lead 26 to 11. A subsequent penalty goal to South Africa by Montgomery reduces this to 26 to 14. The All Blacks start to move further away with the game when Sitiveni Sivivatu scores in the 55th minute, although Carter misses the conversion, the All Blacks move to a 31 to 14 lead. A try to Mils Muliaina and a subsequent Carter conversion makes the score 38 to 14. South Africa start to make a comeback when Jaque Fourie scores a try. Andr\u00e9 Pretorius misses the conversion, and the score is now 38 to 19 to the All Blacks. Fourie scores again in the 70th minute, and with the Pretorius conversion, the score is now 38 to 26 with 10 minutes remaining in the match. However Rico Gear seals the victory in the 75th minute with a try. carter converts and the All Blacks win 45 to 26.", "after_revision": "Richie McCaw knocked on the kick off from Butch James, offside All Blacks then lead to an early penalty kick to Percy Montgomery, giving South Africa a three-nil lead. James kicked another penalty two minutes later giving them a six to nil lead. Daniel Carter then gave the All Blacks their first points with a penalty kick of his own. Fourie du Preez scored the first try of the match in the 10th minute for South Africa. Montgomery missed the conversion and South Africa lead 11 to three. After a period of no scoring, Carter kicked another penalty goal in the 18th minute to reduce the gap to 11 to six. Neemia Tialata scored the All Blacks first try off a Carter kick. Carter converted , and the All Blacks moved ahead to 13 to 11. On halftime the All Blacks are given a penalty, 60m away from the South African line. An ambitious Carter went for the kick, and was successful, and the All Blacks went into the break 16 to 11. Carter got the first points of the second half with another penalty goal in the 43rd minute. Luke McAlister extended the All Blacks lead a few minutes later with a try of his own, and with Carter's conversion, the All Blacks lead 26 to 11. A subsequent penalty goal to South Africa by Montgomery reduced this to 26 to 14. The All Blacks start to move further away with the game when Sitiveni Sivivatu scored in the 55th minute, although Carter missed the conversion, the All Blacks moved to a 31 to 14 lead. A try to Mils Muliaina and a subsequent Carter conversion made the score 38 to 14. South Africa started to make a comeback when Jaque Fourie scored a try. Andr\u00e9 Pretorius missed the conversion, and the score was at 38 to 19 to the All Blacks. Fourie scored again in the 70th minute, and with the Pretorius conversion, the score read 38 to 26 with 10 minutes remaining in the match. However Rico Gear sealed the victory in the 75th minute with a try. Carter converted and the All Blacks won 45 to 26.", "edit_actions": [{"type": "R", "before": "kicks", "after": "kicked", "start_char_pos": 174, "end_char_pos": 179}, {"type": "R", "before": "gives", "after": "gave", "start_char_pos": 264, "end_char_pos": 269}, {"type": "R", "before": "misses", "after": "missed", "start_char_pos": 434, "end_char_pos": 440}, {"type": "R", "before": "the South Africa now", "after": "South Africa", "start_char_pos": 460, "end_char_pos": 480}, {"type": "R", "before": "kicks", "after": "kicked", "start_char_pos": 536, "end_char_pos": 541}, {"type": "R", "before": "scores", "after": "scored", "start_char_pos": 629, "end_char_pos": 635}, {"type": "R", "before": "converts", "after": "converted", "start_char_pos": 687, "end_char_pos": 695}, {"type": "R", "before": "move", "after": "moved", "start_char_pos": 717, "end_char_pos": 721}, {"type": "R", "before": "goes", "after": "went", "start_char_pos": 847, "end_char_pos": 851}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 870, "end_char_pos": 872}, {"type": "R", "before": "go", "after": "went", "start_char_pos": 904, "end_char_pos": 906}, {"type": "R", "before": "gets", "after": "got", "start_char_pos": 939, "end_char_pos": 943}, {"type": "R", "before": "inthe", "after": "in the", "start_char_pos": 1006, "end_char_pos": 1011}, {"type": "R", "before": "extends", "after": "extended", "start_char_pos": 1040, "end_char_pos": 1047}, {"type": "R", "before": "Carters", "after": "Carter's", "start_char_pos": 1120, "end_char_pos": 1127}, {"type": "D", "before": "now", "after": null, "start_char_pos": 1155, "end_char_pos": 1158}, {"type": "R", "before": "reduces", "after": "reduced", "start_char_pos": 1230, "end_char_pos": 1237}, {"type": "R", "before": "scores", "after": "scored", "start_char_pos": 1335, "end_char_pos": 1341}, {"type": "R", "before": "misses", "after": "missed", "start_char_pos": 1378, "end_char_pos": 1384}, {"type": "R", "before": "move", "after": "moved", "start_char_pos": 1416, "end_char_pos": 1420}, {"type": "R", "before": "makes", "after": "made", "start_char_pos": 1499, "end_char_pos": 1504}, {"type": "R", "before": "start", "after": "started", "start_char_pos": 1538, "end_char_pos": 1543}, {"type": "R", "before": "scores", "after": "scored", "start_char_pos": 1581, "end_char_pos": 1587}, {"type": "R", "before": "misses", "after": "missed", "start_char_pos": 1611, "end_char_pos": 1617}, {"type": "R", "before": "is now", "after": "was at", "start_char_pos": 1648, "end_char_pos": 1654}, {"type": "R", "before": "scores", "after": "scored", "start_char_pos": 1690, "end_char_pos": 1696}, {"type": "R", "before": "is now", "after": "read", "start_char_pos": 1768, "end_char_pos": 1774}, {"type": "R", "before": "seals", "after": "sealed", "start_char_pos": 1842, "end_char_pos": 1847}, {"type": "R", "before": "carter converts", "after": "Carter converted", "start_char_pos": 1891, "end_char_pos": 1906}, {"type": "R", "before": "win", "after": "won", "start_char_pos": 1926, "end_char_pos": 1929}], "sents_char_pos": [0, 167, 244, 335, 422, 498, 613, 679, 740, 826, 931, 1024, 1173, 1255, 1440, 1524, 1594, 1682, 1823]}
+{"doc_id": "49966", "revision_depth": "1", "before_revision": "Hewlett-Packard is in a scandal over the alegged illegal investigation of its own board members over leaks from the board to the press. The companys admits that it hired private investigators and that they used pretexting to get private phone records of it's own directors. Pretexting is where someone pretends to be the customer when calling the phone company to get their phone records. It is illegal in the State of California. The aim of the HP investigation was to find out which director(s) had leaked information to journalists. VC investor Tom Perkins resigned from the board on May 22nd 2006 over the issue and requested that HP look into the methods used in it's leak inquiry. The FCC is looking into phone companies who may have supplied the phone records illegally under California law. So", "after_revision": "Hewlett-Packard (HP) is embroiled in a scandal over the alleged illegal investigation of its own board members over leaks from the board to the press. The companys admits that it hired private investigators and that they used pretexting to get private phone records of its own directors. 'Pretexting' is where someone pretends to be the customer when calling the phone company to get their phone records. It is illegal in the state of California. The aim of the HP investigation was to find out which director(s) had leaked information to journalists. Venture Capitalist investor Tom Perkins resigned from the board on May 22, 2006 over the issue and requested that HP look into the methods used in its leak inquiry. The Federal Communications Commission is looking into phone companies who may have supplied the phone records illegally under California law. ", "edit_actions": [{"type": "R", "before": "is", "after": "(HP) is embroiled", "start_char_pos": 16, "end_char_pos": 18}, {"type": "R", "before": "alegged", "after": "alleged", "start_char_pos": 41, "end_char_pos": 48}, {"type": "R", "before": "it's", "after": "its", "start_char_pos": 254, "end_char_pos": 258}, {"type": "R", "before": "Pretexting", "after": "'Pretexting'", "start_char_pos": 274, "end_char_pos": 284}, {"type": "R", "before": "State", "after": "state", "start_char_pos": 410, "end_char_pos": 415}, {"type": "R", "before": "VC", "after": "Venture Capitalist", "start_char_pos": 536, "end_char_pos": 538}, {"type": "R", "before": "22nd", "after": "22,", "start_char_pos": 591, "end_char_pos": 595}, {"type": "R", "before": "it's", "after": "its", "start_char_pos": 668, "end_char_pos": 672}, {"type": "R", "before": "FCC", "after": "Federal Communications Commission", "start_char_pos": 691, "end_char_pos": 694}, {"type": "D", "before": "So", "after": null, "start_char_pos": 799, "end_char_pos": 801}], "sents_char_pos": [0, 135, 273, 388, 430, 535, 686]}
+{"doc_id": "5194", "revision_depth": "1", "before_revision": "thumb The 77th Annual Academy Awards were held on February 27th, 2005 and broadcast live across the world. Some of the more poignant moments included a tribute to Johnny Carson , frequent host of the Awards, as well as a video tribute to many people involved in the movie industry who died in the past year, including Rodney Dangerfield, Ossie Davis, Christopher Reeve, Marlon Brando, and Ronald Reagan , set to the music of Yo Yo Ma . Winners/Nominees Best Picture Million Dollar Baby Other nominees The Aviator Finding Neverland Ray Sideways Achievement in Directing Clint Eastwood , Million Dollar Baby Other nominees Martin Scorsese, The Aviator Taylor Hackford, Ray Alexander Payne, Sideways Mike Leigh, Vera Drake Best Actor in a Leading Role Jamie Foxx , Ray Other nominees Don Cheadle, Hotel Rwanda Johnny Depp, Finding Neverland Leonardo DiCaprio, The Aviator Clint Eastwood, Million Dollar Baby Best Supporting Actor Morgan Freeman , Million Dollar Baby Other nominees Alan Alda, The Aviator Thomas Haden Church, Sideways Jamie Foxx, Collateral Clive Owen, Closer Best Actress in a Leading Role Hilary Swank , Million Dollar Baby Other nominees Annette Bening, Being Julia Catalina Sandino Moreno, Maria Full of Grace Imelda Staunton, Vera Drake Kate Winslet, Eternal Sunshine of the Spotless Mind Best Supporting Actress Cate Blanchett , The Aviator Other nominees Laura Linney, Kinsey Virginia Madsen, Sideways Sophie Okenodo, Hotel Rwanda Natalie Portman, Closer Best Original Screenplay Eternal Sunshine of the Spotless Mind Other nominees The Aviator Hotel Rwanda The Incredibles Vera Drake Best Adapted Screenplay Sideways Other nominees Before Sunset Finding Neverland Million Dollar Baby The Motorcycle Diaries Best Foreign-Language Film The Sea Inside Other nominees As It Is In Heaven The Chorus Downfall Yesterday Best Animated Feature Film The Incredibles Other nominees Shark Tale Shrek 2 Achievement in Art Direction The Aviator Other nominees Finding Neverland Lemony Snicket's A Series of Unfortunate Events Andrew Lloyd Webber's The Phantom of the Opera A Very Long Engagement Achievement in Cinematography The Aviator Other nominees House of Flying Daggers The Passion of the Christ Andrew Lloyd Webber's The Phantom of the Opera A Very Long Engagement Achievement in Costume Design The Aviator Other nominees Finding Neverland Lemony Snicket's A Series of Unfortunate Events Ray Troy Best Documentary Feature Born into Brothels Other nominees The Story of the Weeping Camel Super Size Me Tupac: Resurrection Twist of Faith Best Film Editing The Aviator Other nominees Collateral Finding Neverland Million Dollar Baby Ray Achievement in Makeup A Series of Unfortunate Events Other nominees The Passion of the Christ The Sea Inside Best Original Score Finding Neverland Other nominees Harry Potter and the Prisoner of Azkaban Lemony Snicket's A Series of Unfortunate Events The Passion of the Christ The Village Original Song Al Otro Lado Del Rio, from The Motorcycle Diaries Other nominees \u201cAccidentally in Love\u201d, Shrek 2 \u201cBelieve\u201d, The Polar Express \u201cLearn to Be Lonely\u201d, Andrew Lloyd Webber's The Phantom of the Opera \u201cLook to Your Path (Vois sur ton chemin)\u201d, The Chorus Achievement in Sound Mixing Ray Other nominees The Aviator The Incredibles The Polar Express Spider-Man 2 Achievement in Sound Editing The Incredibles Other nominees The Polar Express Spider-Man 2 Best Visual Effects Spider-Man 2 Other nominees Harry Potter and the Prisoner of Azkaban I, Robot Best Documentary Short Mighty Times: The Children's March Other nominees Autism is the World The Children of Leningradsky Hardwood Sister Rose's Passion Best Animated Short Film Ryan Other nominees Birthday Boy Gopher Broke Guard Dog Lorenzo", "after_revision": "The were held on February 27th, 2005 and broadcast live across the world. Some of the more poignant moments included a tribute to , frequent host of the Awards, as well as a video tribute to many people involved in the movie industry who died in the past year, including , , , , and , set to the music of . Winners/Nominees Best Picture Other nominees Achievement in Directing , Other nominees , , , , Best Actor in a Leading Role , Other nominees , , , , Best Supporting Actor , Other nominees , , , , Best Actress in a Leading Role , Other nominees , , , , Best Supporting Actress , Other nominees , , , , Best Original Screenplay Other nominees Best Adapted Screenplay Other nominees Best Foreign-Language Film Other nominees As It Is In Heaven Downfall Best Animated Feature Film Other nominees Achievement in Art Direction Other nominees Achievement in Cinematography Other nominees Achievement in Costume Design Other nominees Best Documentary Feature Other nominees Tupac: Resurrection Twist of Faith Best Film Editing Other nominees Achievement in Makeup Other nominees Best Original Score Other nominees Original Song Al Otro Lado Del Rio, from Other nominees \u201cAccidentally in Love\u201d, \u201cBelieve\u201d, \u201cLearn to Be Lonely\u201d, \u201cLook to Your Path (Vois sur ton chemin)\u201d, Achievement in Sound Mixing Other nominees Achievement in Sound Editing Other nominees Best Visual Effects Other nominees Best Documentary Short Mighty Times: The Children's March Other nominees The Children of Leningradsky Hardwood Sister Rose's Passion Best Animated Short Film Other nominees Birthday Boy Gopher Broke Guard Dog Lorenzo", "edit_actions": [{"type": "R", "before": "thumb The 77th Annual Academy Awards", "after": "The", "start_char_pos": 0, "end_char_pos": 36}, {"type": "D", "before": "Johnny Carson", "after": null, "start_char_pos": 163, "end_char_pos": 176}, {"type": "D", "before": "Rodney Dangerfield, Ossie Davis, Christopher Reeve, Marlon Brando, and Ronald Reagan", "after": null, "start_char_pos": 318, "end_char_pos": 402}, {"type": "A", "before": null, "after": ", , , and ,", "start_char_pos": 405, "end_char_pos": 405}, {"type": "D", "before": "Yo Yo Ma", "after": null, "start_char_pos": 426, "end_char_pos": 434}, {"type": "R", "before": "Million Dollar Baby Other nominees The Aviator Finding Neverland Ray Sideways", "after": "Other nominees", "start_char_pos": 467, "end_char_pos": 544}, {"type": "D", "before": "Clint Eastwood", "after": null, "start_char_pos": 570, "end_char_pos": 584}, {"type": "R", "before": "Million Dollar Baby Other nominees Martin Scorsese, The Aviator Taylor Hackford, Ray Alexander Payne, Sideways Mike Leigh, Vera Drake", "after": "Other nominees , , , ,", "start_char_pos": 613, "end_char_pos": 746}, {"type": "D", "before": "Jamie Foxx", "after": null, "start_char_pos": 776, "end_char_pos": 786}, {"type": "R", "before": "Ray Other nominees Don Cheadle, Hotel Rwanda Johnny Depp, Finding Neverland Leonardo DiCaprio, The Aviator Clint Eastwood, Million Dollar Baby", "after": "Other nominees , , , ,", "start_char_pos": 815, "end_char_pos": 957}, {"type": "D", "before": "Morgan Freeman", "after": null, "start_char_pos": 980, "end_char_pos": 994}, {"type": "R", "before": "Million Dollar Baby Other nominees Alan Alda, The Aviator Thomas Haden Church, Sideways Jamie Foxx, Collateral Clive Owen, Closer", "after": "Other nominees , , , ,", "start_char_pos": 1023, "end_char_pos": 1152}, {"type": "D", "before": "Hilary Swank", "after": null, "start_char_pos": 1184, "end_char_pos": 1196}, {"type": "R", "before": "Million Dollar Baby Other nominees Annette Bening, Being Julia Catalina Sandino Moreno, Maria Full of Grace Imelda Staunton, Vera Drake Kate Winslet, Eternal Sunshine of the Spotless Mind", "after": "Other nominees , , , ,", "start_char_pos": 1225, "end_char_pos": 1412}, {"type": "D", "before": "Cate Blanchett", "after": null, "start_char_pos": 1437, "end_char_pos": 1451}, {"type": "R", "before": "The Aviator Other nominees Laura Linney, Kinsey Virginia Madsen, Sideways Sophie Okenodo, Hotel Rwanda Natalie Portman, Closer", "after": "Other nominees , , , ,", "start_char_pos": 1480, "end_char_pos": 1606}, {"type": "R", "before": "Eternal Sunshine of the Spotless Mind Other nominees The Aviator Hotel Rwanda The Incredibles Vera Drake", "after": "Other nominees", "start_char_pos": 1632, "end_char_pos": 1736}, {"type": "R", "before": "Sideways Other nominees Before Sunset Finding Neverland Million Dollar Baby The Motorcycle Diaries", "after": "Other nominees", "start_char_pos": 1761, "end_char_pos": 1859}, {"type": "D", "before": "The Sea Inside", "after": null, "start_char_pos": 1887, "end_char_pos": 1901}, {"type": "R", "before": "The Chorus Downfall Yesterday", "after": "Downfall", "start_char_pos": 1936, "end_char_pos": 1965}, {"type": "R", "before": "The Incredibles Other nominees Shark Tale Shrek 2", "after": "Other nominees", "start_char_pos": 1993, "end_char_pos": 2042}, {"type": "R", "before": "The Aviator Other nominees Finding Neverland Lemony Snicket's A Series of Unfortunate Events Andrew Lloyd Webber's The Phantom of the Opera A Very Long Engagement", "after": "Other nominees", "start_char_pos": 2072, "end_char_pos": 2234}, {"type": "R", "before": "The Aviator Other nominees House of Flying Daggers The Passion of the Christ Andrew Lloyd Webber's The Phantom of the Opera A Very Long Engagement", "after": "Other nominees", "start_char_pos": 2265, "end_char_pos": 2411}, {"type": "R", "before": "The Aviator Other nominees Finding Neverland Lemony Snicket's A Series of Unfortunate Events Ray Troy", "after": "Other nominees", "start_char_pos": 2442, "end_char_pos": 2543}, {"type": "D", "before": "Born into Brothels Other nominees The Story of the Weeping Camel Super Size Me", "after": null, "start_char_pos": 2569, "end_char_pos": 2647}, {"type": "A", "before": null, "after": "Other nominees", "start_char_pos": 2648, "end_char_pos": 2648}, {"type": "D", "before": "The Aviator Other nominees Collateral Finding Neverland Million Dollar Baby Ray", "after": null, "start_char_pos": 2702, "end_char_pos": 2781}, {"type": "A", "before": null, "after": "Other nominees", "start_char_pos": 2782, "end_char_pos": 2782}, {"type": "D", "before": "A Series of Unfortunate Events Other nominees The Passion of the Christ The Sea Inside", "after": null, "start_char_pos": 2805, "end_char_pos": 2891}, {"type": "A", "before": null, "after": "Other nominees", "start_char_pos": 2892, "end_char_pos": 2892}, {"type": "D", "before": "Finding Neverland Other nominees Harry Potter and the Prisoner of Azkaban Lemony Snicket's A Series of Unfortunate Events The Passion of the Christ The Village", "after": null, "start_char_pos": 2913, "end_char_pos": 3072}, {"type": "A", "before": null, "after": "Other nominees", "start_char_pos": 3073, "end_char_pos": 3073}, {"type": "D", "before": "The Motorcycle Diaries", "after": null, "start_char_pos": 3115, "end_char_pos": 3137}, {"type": "D", "before": "Shrek 2", "after": null, "start_char_pos": 3177, "end_char_pos": 3184}, {"type": "D", "before": "The Polar Express", "after": null, "start_char_pos": 3196, "end_char_pos": 3213}, {"type": "D", "before": "Andrew Lloyd Webber's The Phantom of the Opera", "after": null, "start_char_pos": 3236, "end_char_pos": 3282}, {"type": "D", "before": "The Chorus", "after": null, "start_char_pos": 3326, "end_char_pos": 3336}, {"type": "D", "before": "Ray Other nominees The Aviator The Incredibles The Polar Express Spider-Man 2", "after": null, "start_char_pos": 3365, "end_char_pos": 3442}, {"type": "A", "before": null, "after": "Other nominees", "start_char_pos": 3443, "end_char_pos": 3443}, {"type": "D", "before": "The Incredibles Other nominees The Polar Express Spider-Man 2", "after": null, "start_char_pos": 3473, "end_char_pos": 3534}, {"type": "A", "before": null, "after": "Other nominees", "start_char_pos": 3535, "end_char_pos": 3535}, {"type": "D", "before": "Spider-Man 2 Other nominees Harry Potter and the Prisoner of Azkaban I, Robot", "after": null, "start_char_pos": 3556, "end_char_pos": 3633}, {"type": "A", "before": null, "after": "Other nominees", "start_char_pos": 3634, "end_char_pos": 3634}, {"type": "D", "before": "Autism is the World", "after": null, "start_char_pos": 3708, "end_char_pos": 3727}, {"type": "D", "before": "Ryan", "after": null, "start_char_pos": 3813, "end_char_pos": 3817}], "sents_char_pos": [0, 106, 178, 207, 307, 337, 350, 369, 384, 404, 593, 664, 693, 714, 735, 795, 846, 872, 909, 937, 1003, 1068, 1101, 1122, 1145, 1205, 1275, 1312, 1349, 1374, 1460, 1520, 1544, 1569, 1599, 1612, 1632, 1649, 1665, 1676, 1689, 1703, 1714, 1726, 1737, 1750, 1761, 1776, 1792, 1807, 1825, 1837, 1852, 1865, 1882, 1895, 1908, 1920, 1936, 1947, 1966, 1980, 1993, 2009, 2024, 2035, 2055, 2072, 2084, 2099, 2117, 2134, 2146, 2158, 2172, 2655, 3109, 3176, 3195, 3671]}
+{"doc_id": "52282", "revision_depth": "1", "before_revision": "Internet users on the Chinese-forums.com website report that the longtime block of Wikipedia by China has been at least temporarily lifted. Absent an announcement from the Chinese government, it's unclear what the conditions were that caused the site to be accessible from within China. A blog by Wikipedia contributor Andrew Lih says that someone in \" Beijing emailed me saying he could suddenly start using Wikipedia again. Some folks in Hubei said it was still blocked. Shanghai and Guangdong users said parts were accessible.\" He continued that \"from a Beijing China Netcom's residential DSL connection, the English language and other foreign language versions are now accessible, but the Chinese version is still blocked\", noting that the Chinese-language version is the most important one to most Wikipedians in the country. Wikimedia head Jimmy Wales told Moneycontrol.com yesterday that, \"We don't know what they took offense to. We really don't intend to compromise the way Google did. We also feel that the block is an error. I am trying to set up high-level meetings in China to state our case and explain why we should be unblocked. We have no idea what the result of that would be. But we are somewhat hopeful. Wikipedia is not a haven for dissidents but an encyclopedia. About 99.9 percent of Wikipedia has topics that are not of interest to the Chinese Government. There is no political component. We are hopeful that they can see the point.\" The third block of Wikipedia, which was implemented 19 October 2005, was issued without explanation or an expected length. Wikipedia has been blocked twice before, the first from 2-21 June 2004, due to the 15th anniversary of the Tian'anmen Square Incident . A website called baidu.com runs a self-censored wiki-based encyclopedia website, called baidubaike.com, launched in April of this year. Wikipedia is a project of the Wikimedia Foundation, a non-profit organisation based out of St. Petersberg, Florida . Its 2007 annual convention, Wikimania , is set to take place in Taipei .", "after_revision": " users on the Chinese-forums.com website report that the longtime block of by China has been at least temporarily lifted. Absent an announcement from the Chinese government, it's unclear what the conditions were that caused the site to be accessible from within China. A blog by Wikipedia contributor Andrew Lih says that someone in \" emailed me saying he could suddenly start using Wikipedia again. Some folks in said it was still blocked. and users said parts were accessible.\" He continued that \"from a Beijing China Netcom's residential connection, the English language and other foreign language versions are now accessible, but the Chinese version is still blocked\", noting that the Chinese-language version is the most important one to most Wikipedians in the country. Wikimedia head told yesterday that, \"We don't know what they took offense to. We really don't intend to compromise the way Google did. We also feel that the block is an error. I am trying to set up high-level meetings in China to state our case and explain why we should be unblocked. We have no idea what the result of that would be. But we are somewhat hopeful. Wikipedia is not a haven for dissidents but an encyclopedia. About 99.9 percent of Wikipedia has topics that are not of interest to the Chinese Government. There is no political component. We are hopeful that they can see the point.\" The third block of Wikipedia, which was implemented 19 October 2005, was issued without explanation or an expected length. Wikipedia has been blocked twice before, the first from 2-21 June 2004, due to the 15th anniversary of the . A website called runs a self-censored wiki-based encyclopedia website, called baidubaike.com, launched in April of this year. Wikipedia is a project of the Wikimedia Foundation, a organisation based out of , . Its 2007 annual convention, , is set to take place in .", "edit_actions": [{"type": "D", "before": "Internet", "after": null, "start_char_pos": 0, "end_char_pos": 8}, {"type": "D", "before": "Wikipedia", "after": null, "start_char_pos": 83, "end_char_pos": 92}, {"type": "D", "before": "Beijing", "after": null, "start_char_pos": 353, "end_char_pos": 360}, {"type": "D", "before": "Hubei", "after": null, "start_char_pos": 440, "end_char_pos": 445}, {"type": "R", "before": "Shanghai and Guangdong", "after": "and", "start_char_pos": 473, "end_char_pos": 495}, {"type": "D", "before": "DSL", "after": null, "start_char_pos": 592, "end_char_pos": 595}, {"type": "R", "before": "Jimmy Wales told Moneycontrol.com", "after": "told", "start_char_pos": 846, "end_char_pos": 879}, {"type": "D", "before": "Tian'anmen Square Incident", "after": null, "start_char_pos": 1688, "end_char_pos": 1714}, {"type": "D", "before": "baidu.com", "after": null, "start_char_pos": 1734, "end_char_pos": 1743}, {"type": "D", "before": "non-profit", "after": null, "start_char_pos": 1907, "end_char_pos": 1917}, {"type": "R", "before": "St. Petersberg, Florida", "after": ",", "start_char_pos": 1944, "end_char_pos": 1967}, {"type": "D", "before": "Wikimania", "after": null, "start_char_pos": 1998, "end_char_pos": 2007}, {"type": "D", "before": "Taipei", "after": null, "start_char_pos": 2034, "end_char_pos": 2040}], "sents_char_pos": [0, 139, 286, 425, 472, 530, 830, 937, 994, 1035, 1144, 1194, 1223, 1284, 1379, 1412, 1457, 1580, 1716, 1852, 1947, 1969]}
+{"doc_id": "53180", "revision_depth": "1", "before_revision": "FIVE GOVERNMENTS DIVIDED OVER PRIVATE TAKEOVER . A 'monopalisation' of Weston Government by a private 'organisation' has caused a split within five governments.Tension has grown over the past year, especialy at the 'House of Commons', due to Documentation and Corraspondence sent to five governments ( British, German, Swiss, Dane & Australien ) regarding a private 'consortiums' takeover of Weston Government. The Private Concern in qestian is reported to have made a 'pirated saturation' of Upper goernment over a planned and Legnthey Period. The Governments informed of this are Up in Arms and have seperated into two Camps ! The Commons has aparently been informed for most of this year , since the 'documents' started to be annonamously sent to the ' House', and are treating it as insider infomation and beetween the walls until an answer to the full extent of the situation is properly understood. I am in contact with a member of parliament & he has said he sees no harm in the public leaning of the situation as it concerns them very much as both sides live together , although many of his ' colleges 'feel the same , he does not wish to offically leak it and would prefer to remain annomanous because of the gravity of the situation, but also gestured towards his personal safty being a consideration. My relationship with this MP is such that he feels free to discuss the contents of the documents and also the wider scene which he has said is similer within five other governments, as i have stated. He feels the situation will continue to develop along 'Reconstructive Lines' and that there will be an element of confliction over the 'balance of Power' which will probaly lead to an 'administrative confrontation', whatever is meant by that (sounds like a gentalmans term for polictical fight), although he stresses the situation is at its 'Birth' I have a lot of details on the various documents content and am in good contact with the MP, although the sourse of the documents has never reavealed his identity. So my intention is to further the Exposure from the publics right to know something benificia", "after_revision": "FIVE GOVERNMENTS DIVIDED OVER PRIVATE MONOPOLY . A 'monopalisation' of Weston Government by a private 'organisation' has caused a split within five governments.Tension has grown over the past year, especialy at the 'House of Commons', due to Documentation and Corraspondence sent to five governments ( British, German, Swiss, Dane & Australien ) regarding a private 'consortiums' takeover of Weston Government. The Private Concern in questian is reported to have made a 'pirated saturation' of Upper goernment over a planned and Legnthey Period. The Governments informed of this are Up in Arms and have seperated into two Camps ! The Commons has aparently been informed for most of this year , since the 'documents' started to be annonamously sent to the ' House', and are treating it as insider infomation and are waiting untill an answer for the full extent of the situation is properly understood. I am in contact with a member of parliament & he has said he sees no harm in the public leaning of the situation as it concerns them very much as both sides live together . Although many of his ' colleges 'feel the same , he does not wish to officially leak it and would prefer to remain annomanous because of the gravity of the situation, but also gestured towards his personal safty being a consideration. My relationship with this MP is such that he feels free to discuss the contents of the documents and also the wider scene which he has said is similar within five other governments, as I have stated. He feels the situation will continue to develope along 'Reconstructive Lines' and that there will be an element of confliction over the 'balance of Power' which will probaly lead to an 'administrative confrontation', whatever is meant by that (sounds like a polictical fight), although he stresses the situation is at its 'Birth' I have a lot of details on the various documents content and am in good contact with the MP, though the sourse of the documents has never reavealed his identity. So my intention is to further the Exposure for the publics right to know something benificial", "edit_actions": [{"type": "R", "before": "TAKEOVER", "after": "MONOPOLY", "start_char_pos": 38, "end_char_pos": 46}, {"type": "R", "before": "qestian", "after": "questian", "start_char_pos": 434, "end_char_pos": 441}, {"type": "R", "before": "beetween the walls until an answer to", "after": "are waiting untill an answer for", "start_char_pos": 810, "end_char_pos": 847}, {"type": "R", "before": ", although", "after": ". Although", "start_char_pos": 1076, "end_char_pos": 1086}, {"type": "R", "before": "offically", "after": "officially", "start_char_pos": 1147, "end_char_pos": 1156}, {"type": "R", "before": "similer", "after": "similar", "start_char_pos": 1455, "end_char_pos": 1462}, {"type": "R", "before": "i", "after": "I", "start_char_pos": 1497, "end_char_pos": 1498}, {"type": "R", "before": "develop", "after": "develope", "start_char_pos": 1552, "end_char_pos": 1559}, {"type": "D", "before": "gentalmans term for", "after": null, "start_char_pos": 1769, "end_char_pos": 1788}, {"type": "R", "before": "although", "after": "though", "start_char_pos": 1954, "end_char_pos": 1962}, {"type": "R", "before": "from", "after": "for", "start_char_pos": 2068, "end_char_pos": 2072}, {"type": "R", "before": "benificia", "after": "benificial", "start_char_pos": 2109, "end_char_pos": 2118}], "sents_char_pos": [0, 160, 410, 544, 628, 904, 1311, 1511, 1588, 2024]}
+{"doc_id": "53369", "revision_depth": "1", "before_revision": "Top police sources said the message was sent to Director General of Police Raman Srivastava and the Home Secretary Sri Prakash Jaiswal. Taking serious note of the e-mail, Kerala police is interrogating the accused persons whether they had played a prank. After this happening , the authorities are on the high alert. This threat can have serious connotations considering the arrest of 2 Al-badr militants from down south.", "after_revision": "Top police sources said the message was sent to Director General of Police Raman Srivastava and the Home Secretary Sri Prakash Jaiswal. Taking serious note of the e-mail, Kerala police are interrogating the accused persons suspecting they had played a prank. After this incident , the authorities are on high alert. This threat can have serious connotations considering the arrest of 2 Al-badr militants from down south.", "edit_actions": [{"type": "R", "before": "is", "after": "are", "start_char_pos": 185, "end_char_pos": 187}, {"type": "R", "before": "whether", "after": "suspecting", "start_char_pos": 222, "end_char_pos": 229}, {"type": "R", "before": "happening", "after": "incident", "start_char_pos": 266, "end_char_pos": 275}, {"type": "D", "before": "the", "after": null, "start_char_pos": 301, "end_char_pos": 304}], "sents_char_pos": [0, 135, 254, 316]}
+{"doc_id": "53552", "revision_depth": "1", "before_revision": "Cimaron making landfall Typhoon Cimaron, known to those in the Philippines as Typhoon Paeng, made landfall on October 29 in Luzon at around 1:00 UTC. Winds of 160 mph were sustained for one minite , were recorded shortly before landfall. Already, it has killed at least nineteen people, injured 58, and at least fifteen people may still be missing in the Philippines. Damage in the country is estimated to have reached $443 million pesos, or $8.8 million United States dollars (USD). Impact Cimaron at peak intensity Deaths and other affects on people So far, six people have been reported to have been drowned or killed by falling trees in Dinapigue, Isabela province . A further 15 people were injured there. In addition, a 28 year old woman was killed along with her 6 year old child in Aurora province . Their hut was swept away by the powerful currents. Three more people drowned in the town of Kasibu, Neuva Vizcaya province . A four year old girl was killed by a landslide in Bugias, Benguet province , as was a man of 53 years of age in Kalinga province . In Baguio City , a house with a mother and her two daughters was buried in landslide, injuring all of them, according to fire official Senior Superintendent Carlito Romero. A woman died in a road accident that also injured seven other people in La Union province . Original total damage estimates were placed at $400 million pesos, or $8 million United States Dollars, but were revised to $139 million pesos, or $2.79 million USD in total damage. Of that total, $114.39 million pesos, or $2.3 million USD, was from infrastructure and agricultural damage, mostly from the Cagayan Valley . The remaining money was $22.8 million pesos, or $458,600+ USD in damage to roads and bridges and damage to school buildings was worth $2 million pesos, equivalent to $40,230 USD. The Philippine National Red Cross noted that many of the agency's different branches were assisting the storm victims since Monday morning. Current storm information At 2100 UTC October 31, the Japan Meteorological Association (JMA) reported the center of Typhoon Cimaron to be near 18.7\u00b0N 116.4\u00b0E . It had maximum 10-minute sustained winds of 80 knots (150 km/h , 90 mph ), with a minimum central pressure of 950 hPa , and was moving almost stationary. At 1800 UTC, the Joint Typhoon Warning Center (JTWC) reported the center of Typhoon 22W to be located about 270 nm (500 km , 310 miles ) south-southeast of Hong Kong , with maximum 1-minute sustained winds of 100 knots (175 km/h, 110 mph), gusting to 125 knots (230 km/h, 145 mph).", "after_revision": "Cimaron making landfall Typhoon Cimaron, known to those in the Philippines as Typhoon Paeng, made landfall on October 29 in at around 1:00 UTC. Winds of 160 mph were sustained for one minute , were recorded shortly before landfall. Already, it has killed at least nineteen people, injured 58, and at least fifteen people may still be missing in the Philippines. Damage in the country is estimated to have reached $443 million pesos, or $8.8 million (USD). Impact Cimaron at peak intensity Deaths and other affects on people So far, six people have been reported to have been drowned or killed by falling trees in , . A further 15 people were injured there. In addition, a 28 year old woman was killed along with her 6 year old child in . Their hut was swept away by the powerful currents. Three more people drowned in the town of , . A four year old girl was killed by a landslide in Bugias, , as was a man of 53 years of age in . In , a house with a mother and her two daughters was buried in landslide, injuring all of them, according to fire official Senior Superintendent Carlito Romero. A woman died in a road accident that also injured seven other people in . Original total damage estimates were placed at $400 million pesos, or $8 million United States Dollars, but were revised to $139 million pesos, or $2.79 million USD in total damage. Of that total, $114.39 million pesos, or $2.3 million USD, was from and damage, mostly from the . The remaining money was $22.8 million pesos, or $458,600+ USD in damage to roads and bridges and damage to school buildings was worth $2 million pesos, equivalent to $40,230 USD. The noted that many of the agency's different branches were assisting the storm victims since Monday morning. Current storm information At 2100 October 31, the (JMA) reported the center of Typhoon Cimaron to be near . It had maximum 10-minute sustained winds of 80 (150 , 90 ), with a minimum central pressure of 950 , and was moving almost stationary. At 1800 UTC, the (JTWC) reported the center of Typhoon 22W to be located about 270 (500 , 310 ) south-southeast of , with maximum 1-minute sustained winds of 100 knots (175 km/h, 110 mph), gusting to 125 knots (230 km/h, 145 mph).", "edit_actions": [{"type": "D", "before": "Luzon", "after": null, "start_char_pos": 124, "end_char_pos": 129}, {"type": "R", "before": "minite", "after": "minute", "start_char_pos": 190, "end_char_pos": 196}, {"type": "D", "before": "United States dollars", "after": null, "start_char_pos": 455, "end_char_pos": 476}, {"type": "R", "before": "Dinapigue, Isabela province", "after": ",", "start_char_pos": 641, "end_char_pos": 668}, {"type": "D", "before": "Aurora province", "after": null, "start_char_pos": 790, "end_char_pos": 805}, {"type": "R", "before": "Kasibu, Neuva Vizcaya province", "after": ",", "start_char_pos": 900, "end_char_pos": 930}, {"type": "D", "before": "Benguet province", "after": null, "start_char_pos": 991, "end_char_pos": 1007}, {"type": "D", "before": "Kalinga province", "after": null, "start_char_pos": 1045, "end_char_pos": 1061}, {"type": "D", "before": "Baguio City", "after": null, "start_char_pos": 1067, "end_char_pos": 1078}, {"type": "D", "before": "La Union province", "after": null, "start_char_pos": 1309, "end_char_pos": 1326}, {"type": "R", "before": "infrastructure and agricultural", "after": "and", "start_char_pos": 1579, "end_char_pos": 1610}, {"type": "D", "before": "Cagayan Valley", "after": null, "start_char_pos": 1635, "end_char_pos": 1649}, {"type": "D", "before": "Philippine National Red Cross", "after": null, "start_char_pos": 1835, "end_char_pos": 1864}, {"type": "D", "before": "UTC", "after": null, "start_char_pos": 2005, "end_char_pos": 2008}, {"type": "D", "before": "Japan Meteorological Association", "after": null, "start_char_pos": 2025, "end_char_pos": 2057}, {"type": "D", "before": "18.7\u00b0N 116.4\u00b0E", "after": null, "start_char_pos": 2114, "end_char_pos": 2128}, {"type": "D", "before": "knots", "after": null, "start_char_pos": 2178, "end_char_pos": 2183}, {"type": "D", "before": "km/h", "after": null, "start_char_pos": 2189, "end_char_pos": 2193}, {"type": "D", "before": "mph", "after": null, "start_char_pos": 2199, "end_char_pos": 2202}, {"type": "D", "before": "hPa", "after": null, "start_char_pos": 2245, "end_char_pos": 2248}, {"type": "D", "before": "Joint Typhoon Warning Center", "after": null, "start_char_pos": 2302, "end_char_pos": 2330}, {"type": "D", "before": "nm", "after": null, "start_char_pos": 2397, "end_char_pos": 2399}, {"type": "D", "before": "km", "after": null, "start_char_pos": 2405, "end_char_pos": 2407}, {"type": "D", "before": "miles", "after": null, "start_char_pos": 2414, "end_char_pos": 2419}, {"type": "D", "before": "Hong Kong", "after": null, "start_char_pos": 2441, "end_char_pos": 2450}], "sents_char_pos": [0, 149, 237, 367, 483, 670, 710, 807, 858, 932, 1063, 1236, 1328, 1510, 1651, 1830, 1970, 2130, 2284]}
+{"doc_id": "53996", "revision_depth": "1", "before_revision": "Howard Bortenstein 52-year-old Howard Bortenstein is the founder/owner of Miller Bortenstein Consultants, \u201c a management consulting firm specializing in information technology strategy and change management. \u201d Q: Describe the three most important issues in your campaign. A: There is a tremendous undertone of despair and apathy when people talk about the current situation of Ward 28 and the city in general. I am deeply concerned about the downward spiral of our neighbourhoods: no vision, residents feel unsafe; businesses struggling; crumbling public housing; no \u201c at risk neighbourhoods \u2019 youth funding and an absentee councillor battling windmills elsewhere, leaving the ward in auto-pilot. I strongly believe our city government must be accountable to the neighbourhoods that elect it. Crime Prevention We need to feel safe & secure everywhere Strengthen neighbourhood-police relationships Create \u201cSafe Neighbourhoods\u201d volunteer organization Residents from all neighbourhoods and all income levels share these concerns. Tenants must have more options and flexibility to break the cycle of poverty and get back their dignity that has been taken from them. Dramatic change from the current model of building \u201c monuments to poverty \u201d is required. Tenants need choice offered by portable housing allowances, to relocate closer to new job opportunities or schools anywhere in Toronto. We must return Ward 28 to socio-economic diversity. Q: Why have you chosen to involve yourself in the political process? A: Had anyone asked me a few years ago if I had any political aspirations, I would have thought they were nuts. But a couple of years ago, when our then two year old daughter was put at risk by picking up a discarded condom in Riverdale Park, things changed. So after the trauma of hepatitis injections and HIV screening at Sick Kids and fighting city hall to clean up the park the question remained \u201c How did this happen? \u201d The simple answer is: \u201c because we let it happen \u201d . We took it for granted that our local councillor was making the right choices to keep us safe and to improve the quality of life of all neighbourhoods and all residents. Well, I found out the hard way that isn \u2019 t true and I decided this needed to be changed. Party politics are paralyzing City Council, literally crippling this city. Asa candidate, the question I receive most often is, \u201c what is your political party? \u201d I am not aligned or a member of any political party. I am not an ideologue from the left or the right. I believe in consensus, not compromise, and building bridges on issues from the centre. Bortenstein did not respond to the question \u201c Which council decision (since the 2003 election) do you feel the city/your ward should be most proud of, and which was least desirable? \u201d", "after_revision": "Howard Bortenstein 52-year-old Howard Bortenstein is the founder/owner of Miller Bortenstein Consultants, \" a management consulting firm specializing in information technology strategy and change management. \" Q: Describe the three most important issues in your campaign. A: There is a tremendous undertone of despair and apathy when people talk about the current situation of Ward 28 and the city in general. I am deeply concerned about the downward spiral of our neighbourhoods: no vision, residents feel unsafe; businesses struggling; crumbling public housing; no \" at risk neighbourhoods ' youth funding and an absentee councillor battling windmills elsewhere, leaving the ward in auto-pilot. I strongly believe our city government must be accountable to the neighbourhoods that elect it. Crime Prevention We need to feel safe & secure everywhere Strengthen neighbourhood-police relationships Create \"Safe Neighbourhoods\" volunteer organization Residents from all neighbourhoods and all income levels share these concerns. Tenants must have more options and flexibility to break the cycle of poverty and get back their dignity that has been taken from them. Dramatic change from the current model of building \" monuments to poverty \" is required. Tenants need choice offered by portable housing allowances, to relocate closer to new job opportunities or schools anywhere in Toronto. We must return Ward 28 to socio-economic diversity. Q: Why have you chosen to involve yourself in the political process? A: Had anyone asked me a few years ago if I had any political aspirations, I would have thought they were nuts. But a couple of years ago, when our then two year old daughter was put at risk by picking up a discarded condom in Riverdale Park, things changed. So after the trauma of hepatitis injections and HIV screening at Sick Kids and fighting city hall to clean up the park the question remained \" How did this happen? \" The simple answer is: \" because we let it happen \" . We took it for granted that our local councillor was making the right choices to keep us safe and to improve the quality of life of all neighbourhoods and all residents. Well, I found out the hard way that isn ' t true and I decided this needed to be changed. Party politics are paralyzing City Council, literally crippling this city. Asa candidate, the question I receive most often is, \" what is your political party? \" I am not aligned or a member of any political party. I am not an ideologue from the left or the right. I believe in consensus, not compromise, and building bridges on issues from the centre. Bortenstein did not respond to the question \" Which council decision (since the 2003 election) do you feel the city/your ward should be most proud of, and which was least desirable? \"", "edit_actions": [{"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 106, "end_char_pos": 107}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 208, "end_char_pos": 209}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 567, "end_char_pos": 568}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 592, "end_char_pos": 593}, {"type": "R", "before": "\u201cSafe Neighbourhoods\u201d", "after": "\"Safe Neighbourhoods\"", "start_char_pos": 904, "end_char_pos": 925}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1213, "end_char_pos": 1214}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1236, "end_char_pos": 1237}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1908, "end_char_pos": 1909}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1931, "end_char_pos": 1932}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1955, "end_char_pos": 1956}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1982, "end_char_pos": 1983}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2196, "end_char_pos": 2197}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 2374, "end_char_pos": 2375}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2406, "end_char_pos": 2407}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 2643, "end_char_pos": 2644}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2781, "end_char_pos": 2782}], "sents_char_pos": [0, 271, 409, 514, 537, 563, 696, 792, 1026, 1161, 1250, 1386, 1438, 1507, 1619, 1766, 1930, 2155, 2245, 2320, 2405, 2460, 2510, 2598]}
+{"doc_id": "54370", "revision_depth": "1", "before_revision": " 73-year old retired pastor, Reverend Roland Weisselberg, burned himself alive during Reformation Day services on Tuesday in Erfurt, Germany. His self-immolation was apparently to protest against the spread of Islam, which he felt the Protestant church should take more seriously. His last words were \"Jesus and Oskar,\" which is believed to refer to Oskar Bruesewitz, a priest who burned himself alive to protest the Communist government of East Germany. He was transported to a burns unit in Halle but died en route. Reverend Weisselberg had lived under Communism in East Germany, and had been a publisher in his former vocation. Axel Noack, Bishop of Saxony, said that he was shocked at Rev. Weisselberg's self-immolation, stressing that Christians could not accept a \"clash of cultures\". He confessed that the issue of Islam had been sidelined within the Church and was only spoken about in private. There were few Muslims there with whom they could engage in dialogue, Noack claimed .", "after_revision": "A 73-year old retired pastor, Reverend Roland Weisselberg, burned himself alive during Reformation Day services on Tuesday in Erfurt, Germany. His self-immolation was apparently in protest against the spread of Islam, which he felt the Protestant church should take more seriously. His last words were \"Jesus and Oskar,\" , believed to a reference to Oskar Bruesewitz, a priest who burned himself alive to protest the Communist government of East Germany. He was transported to a burns unit in Halle but died en route. Rev. Weisselberg had lived under Communism in East Germany, and had been a publisher in his former vocation. Axel Noack, Bishop of Saxony, said that he was shocked at Rev. Weisselberg's self-immolation, stressing that Christians could not accept a \"clash of cultures\". He confessed that the issue of Islam had been sidelined within the Church and was only spoken about in private. There were few Muslims there with whom they could engage in dialogue, Noack said .", "edit_actions": [{"type": "A", "before": null, "after": "A", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "to", "after": "in", "start_char_pos": 177, "end_char_pos": 179}, {"type": "R", "before": "which is believed to refer", "after": ", believed to a reference", "start_char_pos": 320, "end_char_pos": 346}, {"type": "R", "before": "Reverend", "after": "Rev.", "start_char_pos": 518, "end_char_pos": 526}, {"type": "R", "before": "claimed", "after": "said", "start_char_pos": 979, "end_char_pos": 986}], "sents_char_pos": [0, 141, 280, 454, 517, 630, 790, 902]}
+{"doc_id": "5484", "revision_depth": "1", "before_revision": "Carlos Mesa. The President of Bolivia Carlos Mesa officially resigned Sunday, March 6. Now the President of Senate Hormando Vaca D\u00edez is the temporary President of the Republic of Bolivia. Mesa resigned because of the announcement of highways's blockages by Evo Morales , both the leader of the coca growers and the Movement Toward Socialism (MAS). The blockages serve to pressure the Legislative so the Hydrocarbons Law can be approved. The law aims to raise the taxes levied on hydrocarbon extraction from 18 to 50\\%. The MAS is a political party formed basically by coca-growing campesinos (known as cocaleros), communists , admirers of Fidel Castro and indigenous people. The party is against the government of the United States and the alleged American influency in the region, the neoliberalism and the globalization . Morales in his own words, explain some of the MAS motivations: The worst enemy of humanity is capitalism. That is what provokes uprisings like our own, a rebellion against a system, against a neoliberal model, which is the representation of a savage capitalism. If the entire world doesn't acknowledge this reality, that the national states are not providing even minimally for health, education and alimentation, then each day the most fundamental human rights are being violated. Morales is an admirer of Fidel Castro and he says he is inspired by the presidents of Venezuela Hugo Chavez and Brazil, Luiz In\u00e1cio Lula da Silva . He supports the creation of a anti-imperialist block formed by Latin-American and Arabian countries against the USA, which is being organized by the Brazilian President. Bolivia economy depends on exportation of hydrocarbon (oil and gas). Other sources of resources comes from the cultivation of coca. The coca growers demands the same treatment the government is giving to hydrocarbons. However, the production of coca in great quantities is controversial since the coca is the raw material of cocaine . Cocaine is considered illegal in Bolivia and in the majority of other countries", "after_revision": " The President of Bolivia officially resigned Sunday, March 6. Now the President of Senate Hormando Vaca D\u00edez is the temporary President of the Republic of Bolivia. Mesa resigned because of the announcement of highways's blockages by , both the leader of the growers and the Movement Toward Socialism (MAS). The blockages serve to pressure the Legislative so the Hydrocarbons Law can be approved. The law aims to raise the taxes levied on hydrocarbon extraction from 18 to 50\\%. The MAS is a political party formed basically by coca-growing (known as cocaleros), , admirers of , and people. The party is against the government of the and the alleged American influency in the region, the and the . Morales in his own words, explain some of the MAS motivations: The worst enemy of humanity is capitalism. That is what provokes uprisings like our own, a rebellion against a system, against a neoliberal model, which is the representation of a savage capitalism. If the entire world doesn't acknowledge this reality, that the national states are not providing even minimally for health, education and alimentation, then each day the most fundamental human rights are being violated. Morales is an admirer of Fidel Castro and he says he is inspired by the presidents of and , . He supports the creation of an anti-imperialist block formed by Latin-American and Arabian countries against the USA, which is being organized by the Brazilian President. Bolivia economy depends on exportation of (oil and gas). Other sources of resources comes from the cultivation of coca. The coca growers demands the same treatment the government is giving to hydrocarbons. However, the production of coca in great quantities is controversial since the coca is the raw material of . Cocaine is considered illegal in Bolivia and in the majority of other countries", "edit_actions": [{"type": "D", "before": "Carlos Mesa.", "after": null, "start_char_pos": 0, "end_char_pos": 12}, {"type": "D", "before": "Carlos Mesa", "after": null, "start_char_pos": 38, "end_char_pos": 49}, {"type": "D", "before": "Evo Morales", "after": null, "start_char_pos": 258, "end_char_pos": 269}, {"type": "D", "before": "coca", "after": null, "start_char_pos": 295, "end_char_pos": 299}, {"type": "D", "before": "campesinos", "after": null, "start_char_pos": 582, "end_char_pos": 592}, {"type": "D", "before": "communists", "after": null, "start_char_pos": 615, "end_char_pos": 625}, {"type": "R", "before": "Fidel Castro and indigenous", "after": ", and", "start_char_pos": 640, "end_char_pos": 667}, {"type": "D", "before": "United States", "after": null, "start_char_pos": 719, "end_char_pos": 732}, {"type": "R", "before": "neoliberalism and the globalization", "after": "and the", "start_char_pos": 787, "end_char_pos": 822}, {"type": "R", "before": "Venezuela Hugo Chavez and Brazil, Luiz In\u00e1cio Lula da Silva", "after": "and ,", "start_char_pos": 1393, "end_char_pos": 1452}, {"type": "R", "before": "a", "after": "an", "start_char_pos": 1483, "end_char_pos": 1484}, {"type": "D", "before": "hydrocarbon", "after": null, "start_char_pos": 1667, "end_char_pos": 1678}, {"type": "D", "before": "cocaine", "after": null, "start_char_pos": 1950, "end_char_pos": 1957}], "sents_char_pos": [0, 12, 188, 348, 437, 519, 675, 824, 930, 1086, 1306, 1454, 1624, 1693, 1756, 1842]}
+{"doc_id": "55265", "revision_depth": "1", "before_revision": "Nine people are confirmed dead in a fire in a leather bag facory in Kolkata's South 24 Pargana district in Topsia area. Eighteen people were seriously injured and admitted to National Medical College and Hospital. Inspector General of Police (Law and Order) Raj Kanojia said that the fire was broken out at about 3 am when the victims were inside the factory and all the doors were closed. Director General of Fire Brigade Gopal Bhattacharjee said that it was an illegal factory in Kolkata located at third floor of the building. At the time of fire, all the premises were closed and workers could not come out from the factory. The cause of the fire was yet to be ascertained. Kolkata Mayor Bikash Ranjan Bhattacharya predicted short circuit or an unattended cigarette causing fire in the factory .", "after_revision": "Nine people are confirmed dead in a fire in a leather bag factory in Kolkata's South 24 Pargana district in Topsia area. Eighteen people were seriously injured and admitted to the National Medical College and Hospital. Inspector General of Police (Law and Order) Raj Kanojia said that the fire broke out at about 3 a.m. local time, when the victims were inside the factory and all the doors were closed. Director General of Fire Brigade Gopal Bhattacharjee said that it was an illegal factory in Kolkata located at third floor of the building. At the time of fire, all the exits were shut and workers could not come out from the factory. The cause of the fire is yet to be ascertained. Kolkata Mayor Bikash Ranjan Bhattacharya suggested that a short circuit or an unattended cigarette may have caused the fire .", "edit_actions": [{"type": "R", "before": "facory", "after": "factory", "start_char_pos": 58, "end_char_pos": 64}, {"type": "A", "before": null, "after": "the", "start_char_pos": 175, "end_char_pos": 175}, {"type": "R", "before": "was broken", "after": "broke", "start_char_pos": 290, "end_char_pos": 300}, {"type": "R", "before": "am", "after": "a.m. local time,", "start_char_pos": 316, "end_char_pos": 318}, {"type": "R", "before": "premises were closed", "after": "exits were shut", "start_char_pos": 560, "end_char_pos": 580}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 652, "end_char_pos": 655}, {"type": "R", "before": "predicted", "after": "suggested that a", "start_char_pos": 720, "end_char_pos": 729}, {"type": "R", "before": "causing fire in the factory", "after": "may have caused the fire", "start_char_pos": 771, "end_char_pos": 798}], "sents_char_pos": [0, 119, 214, 390, 530, 629, 678]}
+{"doc_id": "55544", "revision_depth": "1", "before_revision": "Today at a special caucus meeting, member of parliaments (MP) for National agreed that the new leader of the opposition, New Zealand's National Party, is John Key and the deputy leader is Bill English , they are taking over from past leader, Dr Don Brash and past deputy leader, Gerry Brownlee. Bill English, 45-years-old, use to be leader of the National Party before being outed in 2003 and being replaced by Dr Brash for a bad performance at the 2002 New Zealand elections, Mr English only managed to get 22\\% of the votes cast. Mr Key, also 45-years-old, said at the announcement of the new leader and deputy leader that he was honoured that he was chosen to be the new leader of the National Party and also hounoured that Mr English would be his deputy. \"Can I tell you I think we will make a formidable team . Key said the public placed a high value on unity. If National could demonstrate it could manage itself, then it could start to manage the country.\" Dr Brash will however stay on the National Party. He is at number 3 on the list of National MP , behind Key and English. His new caucus responsibilities will be : Spokesman for the Security and Intelligence Service and Spokesman for Relationships with Non-Government Parties. His select committee responsibility is Security and Intelligence.", "after_revision": "Today at a special caucus meeting, member of parliaments (MP) for National agreed that the new leader of the opposition, New Zealand's National Party, is John Key and the deputy leader is Bill English . They are taking over from past leader, Dr Don Brash and past deputy leader, Gerry Brownlee. Bill English, 45-years-old, is the former leader of the National Party . He was outed in 2003 , for a bad performance at the 2002 New Zealand elections, and replaced by Dr Brash. Mr English only managed to get 22\\% of the votes cast. John Key, also 45-years-old, said at the announcement of the new leader and deputy leader that he was honoured that he was chosen to be the new leader of the National Party and also honoured that Mr English would be his . If National could demonstrate it could manage itself, then it could start to manage the country. deputy. \"Can I tell you I think we will make a formidable team ,\" he said . Key said the public placed a high value on unity. Dr Brash will however stay on the National Party. He is at number 3 on the list of National MPs , behind Key and English. His new caucus responsibilities will be Spokesman for the Security and Intelligence Service and Spokesman for Relationships with Non-Government Parties. His select committee responsibility is Security and Intelligence.", "edit_actions": [{"type": "R", "before": ", they", "after": ". They", "start_char_pos": 201, "end_char_pos": 207}, {"type": "R", "before": "use to be", "after": "is the former", "start_char_pos": 323, "end_char_pos": 332}, {"type": "R", "before": "before being", "after": ". He was", "start_char_pos": 362, "end_char_pos": 374}, {"type": "R", "before": "and being replaced by Dr Brash", "after": ",", "start_char_pos": 389, "end_char_pos": 419}, {"type": "A", "before": null, "after": "and replaced by Dr Brash.", "start_char_pos": 477, "end_char_pos": 477}, {"type": "R", "before": "Mr", "after": "John", "start_char_pos": 533, "end_char_pos": 535}, {"type": "R", "before": "hounoured", "after": "honoured", "start_char_pos": 713, "end_char_pos": 722}, {"type": "A", "before": null, "after": ". If National could demonstrate it could manage itself, then it could start to manage the country.", "start_char_pos": 752, "end_char_pos": 752}, {"type": "A", "before": null, "after": ",\" he said", "start_char_pos": 816, "end_char_pos": 816}, {"type": "D", "before": "If National could demonstrate it could manage itself, then it could start to manage the country.\"", "after": null, "start_char_pos": 869, "end_char_pos": 966}, {"type": "R", "before": "MP", "after": "MPs", "start_char_pos": 1059, "end_char_pos": 1061}, {"type": "D", "before": ":", "after": null, "start_char_pos": 1128, "end_char_pos": 1129}], "sents_char_pos": [0, 294, 532, 760, 868, 966, 1016, 1087, 1242]}
+{"doc_id": "58086", "revision_depth": "1", "before_revision": "200px|The demonstration in front of the Burgtheater A crowd of about 250 activists from the Austrian National Union of Students (\u00d6sterreichische Hochsch\u00fclerinnen- und Hochsch\u00fclerschaft, \u00d6H) as well as the Organisation of Socialist Students of Austria (Verband Sozialistischer StudentInnen \u00d6sterreichs, VSSt\u00d6) quickly reacted to the announced forming of the new Austrian coalition government by starting a demonstration in front of the University of Vienna , the largest in the country. Specifically, the demonstration protested against the proposed plan of enabling students to do community service work at a rate of EUR 6 ( ~ USD 7.6) per hour to work off student fees of about EUR 372 ( ~ USD 475,8) per semester. These fees were introduced under the government of chancellor Wolfgang Sch\u00fcssel , which ruled Austria from 2000 on. 200px|The demonstration in front of the Parliament The protest started directly in front of the university buildings on the famous Ringstra\u00dfe . Protestors blocked the street by sweeping the street, symbolising the work students have to do in order to study. They proceeded to the headquarters of the SP\u00d6, where they chanted \"Who betrayed us? Social Democrats!\", and later to the parliament building. After this, they announced to go to the \u00d6VP headquarters, when this reporter had to leave the scene. On October 1, 2006, a new National Assembly was elected. The Social Democrats narrowly won the election, while the \u00d6VP suffered severe losses and fell to second place. Since then, intense negotiations between the two parties about a coalition have taken place and presumably ended today, when at 13:30 hours, SP\u00d6 leader Alfred Gusenbauer and \u00d6VP leader Wolfgang Sch\u00fcssel announced the finishing of negotiations and conciliation of the two parties in a new government, which is to be sworn in by President Heinz Fischer on January 11.", "after_revision": "200px|The demonstration in front of the A crowd of about 250 activists from the (\u00d6sterreichische Hochsch\u00fclerinnen- und Hochsch\u00fclerschaft, \u00d6H) as well as the Organisation of (Verband Sozialistischer StudentInnen \u00d6sterreichs, VSSt\u00d6) quickly reacted to the announced forming of the new Austrian coalition government by starting a demonstration in front of the , the largest in the country. Specifically, the demonstration protested against the proposed plan of enabling students to do community service work at a rate of 6 ( about 7.6) per hour to work off student fees of about EUR 372 ( about USD 475,8) per semester. These fees were introduced under the government of chancellor , which ruled Austria from 2000 on. 200px|The demonstration in front of the Parliament The protest started directly in front of the university buildings on the famous . Protestors blocked the street by sweeping the street, symbolising the work students have to do in order to study. They proceeded to the headquarters of the SP\u00d6, where they chanted \"Who betrayed us? Social Democrats!\", and later to the building. After this, they announced to go to the \u00d6VP headquarters, when this reporter had to leave the scene. On October 1, 2006, a new was elected. The narrowly won the election, while the \u00d6VP suffered severe losses and fell to second place. Since then, intense negotiations between the two parties about a coalition have taken place and presumably ended today, when at 13:30 hours, SP\u00d6 leader and \u00d6VP leader Wolfgang Sch\u00fcssel announced the finishing of negotiations and conciliation of the two parties in a new government, which is to be sworn in by on January 11.", "edit_actions": [{"type": "D", "before": "Burgtheater", "after": null, "start_char_pos": 40, "end_char_pos": 51}, {"type": "D", "before": "Austrian National Union of Students", "after": null, "start_char_pos": 92, "end_char_pos": 127}, {"type": "D", "before": "Socialist Students of Austria", "after": null, "start_char_pos": 221, "end_char_pos": 250}, {"type": "D", "before": "University of Vienna", "after": null, "start_char_pos": 435, "end_char_pos": 455}, {"type": "D", "before": "EUR", "after": null, "start_char_pos": 617, "end_char_pos": 620}, {"type": "R", "before": "~ USD", "after": "about", "start_char_pos": 625, "end_char_pos": 630}, {"type": "R", "before": "~", "after": "about", "start_char_pos": 689, "end_char_pos": 690}, {"type": "D", "before": "Wolfgang Sch\u00fcssel", "after": null, "start_char_pos": 778, "end_char_pos": 795}, {"type": "D", "before": "Ringstra\u00dfe", "after": null, "start_char_pos": 963, "end_char_pos": 973}, {"type": "D", "before": "parliament", "after": null, "start_char_pos": 1211, "end_char_pos": 1221}, {"type": "D", "before": "National Assembly", "after": null, "start_char_pos": 1359, "end_char_pos": 1376}, {"type": "D", "before": "Social Democrats", "after": null, "start_char_pos": 1394, "end_char_pos": 1410}, {"type": "D", "before": "Alfred Gusenbauer", "after": null, "start_char_pos": 1653, "end_char_pos": 1670}, {"type": "D", "before": "President Heinz Fischer", "after": null, "start_char_pos": 1828, "end_char_pos": 1851}], "sents_char_pos": [0, 485, 715, 1089, 1173, 1231, 1332, 1389, 1500]}
+{"doc_id": "60036", "revision_depth": "1", "before_revision": "Microsoft Windows XP logo. In Russia, Microsoft decided to press charges against a teacher for using pirated copies of Microsoft software on school computers. The teacher, Mr. Alexander Ponosov, pleaded not guilty and claimed that he purchased the computer along with the software it came with legally, without knowing that the computer was loaded with pirated software. The Russian president criticized the move by Microsoft against the teacher, saying it was \"ridiculous\" to arrest someone for using computers and that the distributors of pirated software should be targeted rather than users. Former Soviet leader Mikhail Gorbachev also urged Microsoft to drop the suit , asking Microsoft's mercy for the teacher and adding that the teacher, if convicted, may face \"imprisonment in Siberian camps\".", "after_revision": "Microsoft Windows XP logo. Russian prosecutors have charged a school headmaster with using pirated copies of Microsoft software on school computers. The teacher, Mr. Alexander Ponosov, pleaded not guilty and claimed that he did not know that the purchased computers were loaded with pirated software. The Russian president criticized the move against the teacher, saying it was \"ridiculous\" to arrest someone for using computers and that the distributors of pirated software should be targeted rather than users. Former Soviet leader Mikhail Gorbachev also urged Microsoft to intercede in the case , asking Microsoft's mercy for the teacher and adding that the teacher, if convicted, may face \"imprisonment in Siberian camps\".", "edit_actions": [{"type": "R", "before": "In Russia, Microsoft decided to press charges against a teacher for", "after": "Russian prosecutors have charged a school headmaster with", "start_char_pos": 27, "end_char_pos": 94}, {"type": "R", "before": "purchased the computer along with the software it came with legally, without knowing that the computer was", "after": "did not know that the purchased computers were", "start_char_pos": 234, "end_char_pos": 340}, {"type": "D", "before": "by Microsoft", "after": null, "start_char_pos": 413, "end_char_pos": 425}, {"type": "R", "before": "drop the suit", "after": "intercede in the case", "start_char_pos": 659, "end_char_pos": 672}], "sents_char_pos": [0, 26, 158, 370, 595]}
+{"doc_id": "60866", "revision_depth": "1", "before_revision": "A company in Los Gatos, California, called Audible Magic, is currently developing a new software that is to filter music and video that was uploaded on the Internet without permission of copyright holders. The company's chief executive, Vance Ikezoye, demonstrated how the system works. He downloaded a poor-quality video from YouTube and fed it to the filtering software . The program identified the video as a fighting scene of \u201cKill Bill: Vol. 2 \u201d the rights of which are owned by Miramax. The entertainment industry is already demanding the adoption of the new system by the Internet companies. One of the major social networks owned by News Corporation, MySpace, has agreed on adopting the filter. However, not all websites want to adopt the system as soon as it is launched. The main holdout is YouTube, owned by Google. The site's officials earlier said they would adopt a filtering software by the end of last year and till this day YouTube haven't used any type of filtering system. The company's official said that they would only use the filter in case the copyright owners will broaden their license with Google. The executives of NBC and Viacom have already stated their complaints regarding the delay of Googleto place filters. The new system uses a large database that includes digital representations of various copyrighted audio and video files. However, the software is not finished yet since there are ways of fooling it, like for example by cropping the image. The technology of spotting copyrighted material is called \u201cdigital fingerprinting \u201d . The technology checks for matches and decides whether to post the material on the site or not. Analysts say that the filtering software is to improve the relations that are currently quite tensed between the standard media companies and Internet companies.", "after_revision": "Audible Magic, a company in Los Gatos, California, is developing a new software that can filter music and video uploaded on the Internet without permission of copyright holders. The company's chief executive, Vance Ikezoye, demonstrated how the system works. He downloaded a poor-quality video from YouTube and fed it to the filtering software , which identified the video as a fighting scene of \u201cKill Bill: Vol. 2 , \u201d the rights to which are owned by Miramax. The entertainment industry is already demanding the adoption of the new system by the Internet companies. One of the major social networks owned by News Corporation, MySpace, has agreed to adopt the filter. However, not all websites want to adopt the system as soon as it is launched. The main holdout is YouTube, owned by Google. The site's officials earlier said they would adopt a filtering software by the end of last year , but so far YouTube has not begun using any type of filtering system. The company's officials said that they would only use the filter if copyright owners will broaden their license with Google. The executives of NBC and Viacom have already stated their complaints regarding Google's delay on placing filters. The new system uses a large database that includes digital representations of various copyrighted audio and video files. This technology of spotting copyrighted material , called \u201cdigital fingerprinting , \u201d checks for matches and decides whether to post the material on the site or not. However, Audible Magic's software is not considered finalized since it can still be \"fooled\"--e.g., by cropping the image. Analysts say that the filtering software is to improve the relations that are currently quite tense between the standard media companies and Internet companies.", "edit_actions": [{"type": "R", "before": "A", "after": "Audible Magic, a", "start_char_pos": 0, "end_char_pos": 1}, {"type": "R", "before": "called Audible Magic, is currently", "after": "is", "start_char_pos": 36, "end_char_pos": 70}, {"type": "R", "before": "is to", "after": "can", "start_char_pos": 102, "end_char_pos": 107}, {"type": "D", "before": "that was", "after": null, "start_char_pos": 131, "end_char_pos": 139}, {"type": "R", "before": ". The program", "after": ", which", "start_char_pos": 372, "end_char_pos": 385}, {"type": "A", "before": null, "after": ",", "start_char_pos": 449, "end_char_pos": 449}, {"type": "R", "before": "of", "after": "to", "start_char_pos": 463, "end_char_pos": 465}, {"type": "R", "before": "on adopting", "after": "to adopt", "start_char_pos": 680, "end_char_pos": 691}, {"type": "R", "before": "and till this day YouTube haven't used", "after": ", but so far YouTube has not begun using", "start_char_pos": 924, "end_char_pos": 962}, {"type": "R", "before": "official", "after": "officials", "start_char_pos": 1007, "end_char_pos": 1015}, {"type": "R", "before": "in case the", "after": "if", "start_char_pos": 1057, "end_char_pos": 1068}, {"type": "R", "before": "the delay of Googleto place", "after": "Google's delay on placing", "start_char_pos": 1206, "end_char_pos": 1233}, {"type": "R", "before": "However, the software is not finished yet since there are ways of fooling it, like for example by cropping the image. The", "after": "This", "start_char_pos": 1364, "end_char_pos": 1485}, {"type": "R", "before": "is", "after": ",", "start_char_pos": 1530, "end_char_pos": 1532}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1564, "end_char_pos": 1564}, {"type": "D", "before": ". The technology", "after": null, "start_char_pos": 1567, "end_char_pos": 1583}, {"type": "A", "before": null, "after": "However, Audible Magic's software is not considered finalized since it can still be \"fooled\"--e.g., by cropping the image.", "start_char_pos": 1664, "end_char_pos": 1664}, {"type": "R", "before": "tensed", "after": "tense", "start_char_pos": 1759, "end_char_pos": 1765}], "sents_char_pos": [0, 205, 286, 373, 493, 599, 703, 781, 827, 992, 1125, 1242, 1363, 1481, 1663]}
+{"doc_id": "6104", "revision_depth": "2", "before_revision": "The official Abin version can be seen on its website. The agency stores and archives all data collected by the inteligence service, including data that do not fulfill all Abin's criteria for consistency and accuracy. Every kind of document remains in Abin archive so it can be re-evaluated in the future. According to General Felix, Abin archives may contain data that are not relevant, tendentious or completely untrue. The documents mentioned by Veja are this sort of data. According to Veja, the spy says that he came upon the FARC case accidentally. It happened when leftists invited him to be part of a pro-FARC committee, in defense of the Colombian guerrillas. The spy claims to have agreed and and he began to frequent the meetings, which were almost always secret. General Jorge Felix refused to comment the case explaining that everything were already had been told to the deputies and senators comission . It is known that the FARC and PT politics have met since 1990. Many of these meetings ocurred during the enconteurs of the Foro de S\u00e3o Paulo. Some analysts say that the Comunist Colombian guerrilla aims to extend its influence throughout other countries in Latin America., Deputy Paulo Rocha also says that the meetings between FARC delegates with Brazilian politicians were part of a FARC attempt of establishing a diplomatic representation in Brazil, which did not happened. So, according to the deputy, there were meetings between the father Oliv\u00e9rio Medina, who worked as FARC ambassador, with parliamentarians of diverse parties. The deputy said: \"Meetings can have happened, but there is no political and financial relation with the PT.\" For the deputy there are no reasons to create a congress investigation comission , as suggested by oppostion parties. The Veja admitted in its article that it is possible that the FARC delegate father Medina did not said the true when he told the FARC would donate 5 million dollars to PT campaign in Cora\u00e7\u00e3o Vermelho hacienda. Also the magazine admitted that it cannot proof the donation ocurred and it says that it is possible that the Abin documents are untrue. The magazine Veja said it didn't involve the Workers' Party, as an organization, in the case. The leftist Ant\u00f4nio Carlos Viana told to the Brazilian newspaper Correio Braziliense that during the encounter between FARC and PT members in Cora\u00e7\u00e3o Vermelho hacienda there weren't any discussion about money. He said:\"We believe that the path to peace in Colombia is people and Brazilian government recognizing the FARC. However we can't take any responsability by the FARC's actions and we deny categorically any discussion about money to electoral purposes in Brazil.\" Some Brazilian comments Some opinion excerpts from the O Estado de S\u00e3o Paulo Forum:Magazines and newspapers must be careful with explosive news I am not PT sympathizant and I have already criticized some points about the party and the governement (...) There is no saint in any political party, neither in the several religions, neither in the Church. However, I can't believe that someone inside PT, after I have some knowledge about its leaders, might have received any contribution from the FARC (...) Fake dossiers have already been created relating the PSDB with foreign bank accounts and these news were denied later. The FARC donation is a campaign gossip which is already began by PT unfortunately. \u2014 Antonio Carlos Rocha da Silva / S\u00e3o PauloPossibilities The news published in Veja magazine, March 13, this year, is really daring. Saying that the PT received money from the FARC is serious and grave. If the magazine published the story, there must be, at least, some kind of information.(...)The Workers'Party members deny the fact, with no exception. But you must remember that most of them have belonged to armed groups during the militar regime.(..)If the PT did not prosecute the magazine, the doubt can cause some harm.(...) \u2014 Jorge Cort\u00e1s Sader Filho / Niter\u00f3iNew story, old subject''' The FARC/PT connection is older thant the Bible draft. In 2002 a deputy tryed to create a CPI [Congress Comission of Investigation] to investigate the donation, however he didn't get enough signatures. (...)If the article is lying, the PT have to proof and expose the magazine, then prosecute it.(...) The worst blind person is who doesn't want to see. This kind of person, the fanatic voter, is not helping in nothing Brazil.'' \u2014 Sonia / Rio de Janeiro 17 March: Comission of deputies and senators hear the explanations of the persons in charge for Abin, the general Jorge F\u00e9lix and Mauro Marcelo de Lima e Silva. They express the documents used by the magazine Veja are not reliable and cannot be used. The meeting in the farm, as described in Abin documents, ocurred . Brazilian government have already said that it is against terrorism.
", "after_revision": "The official Abin version can be seen on its website. The agency stores and archives all data collected by the intelligence service, including data that do not fulfill all Abin's criteria for consistency and accuracy. Every kind of document remains in Abin archive so it can be re-evaluated in the future. According to General Felix, Abin archives may contain data that are not relevant, tendentious or completely untrue. The documents mentioned by Veja are this sort of data. According to Veja, the spy says that he came upon the FARC case accidentally. It happened when leftists invited him to be part of a pro-FARC committee, in defense of the Colombian guerrillas. The spy claims to have agreed and he began to frequent the meetings, which were almost always secret. General Jorge Felix refused to comment the case explaining that everything were already had been told to the deputies and senators commission . It is known that the FARC and PT politics have met since 1990. Many of these meetings occurred during the enconteurs of the Foro de S\u00e3o Paulo. Some analysts say that the Communist Colombian guerrilla aims to extend its influence throughout other countries in Latin America., Deputy Paulo Rocha also says that the meetings between FARC delegates with Brazilian politicians were part of a FARC attempt of establishing a diplomatic representation in Brazil, which did not happened. So, according to the deputy, there were meetings between the father Oliv\u00e9rio Medina, who worked as FARC ambassador, with parliamentarians of diverse parties. The deputy said: \"Meetings can have happened, but there is no political and financial relation with the PT.\" For the deputy there are no reasons to create a congress investigation commission , as suggested by oppostion parties. The Veja admitted in its article that it is possible that the FARC delegate father Medina did not said the true when he told the FARC would donate 5 million dollars to PT campaign in Cora\u00e7\u00e3o Vermelho hacienda. Also the magazine admitted that it cannot proof the donation occurred and it says that it is possible that the Abin documents are untrue. The magazine Veja said it didn't involve the Workers' Party, as an organization, in the case. The leftist Ant\u00f4nio Carlos Viana told to the Brazilian newspaper Correio Braziliense that during the encounter between FARC and PT members in Cora\u00e7\u00e3o Vermelho hacienda there weren't any discussion about money. He said:\"We believe that the path to peace in Colombia is people and Brazilian government recognizing the FARC. However we can't take any responsibility by the FARC's actions and we deny categorically any discussion about money to electoral purposes in Brazil.\" Some Brazilian comments Some opinion excerpts from the O Estado de S\u00e3o Paulo Forum:Magazines and newspapers must be careful with explosive news I am not PT sympathizant and I have already criticized some points about the party and the government (...) There is no saint in any political party, neither in the several religions, neither in the Church. However, I can't believe that someone inside PT, after I have some knowledge about its leaders, might have received any contribution from the FARC (...) Fake dossiers have already been created relating the PSDB with foreign bank accounts and these news were denied later. The FARC donation is a campaign gossip which is already began by PT unfortunately. \u2014 Antonio Carlos Rocha da Silva / S\u00e3o PauloPossibilities The news published in Veja magazine, March 13, this year, is really daring. Saying that the PT received money from the FARC is serious and grave. If the magazine published the story, there must be, at least, some kind of information.(...)The Workers'Party members deny the fact, with no exception. But you must remember that most of them have belonged to armed groups during the militar regime.(..)If the PT did not prosecute the magazine, the doubt can cause some harm.(...) \u2014 Jorge Cort\u00e1s Sader Filho / Niter\u00f3iNew story, old subject''' The FARC/PT connection is older thant the Bible draft. In 2002 a deputy tryed to create a CPI [Congress Commission of Investigation] to investigate the donation, however he didn't get enough signatures. (...)If the article is lying, the PT have to proof and expose the magazine, then prosecute it.(...) The worst blind person is who doesn't want to see. This kind of person, the fanatic voter, is not helping in nothing Brazil.'' \u2014 Sonia / Rio de Janeiro 17 March: Commission of deputies and senators hear the explanations of the persons in charge for Abin, the general Jorge F\u00e9lix and Mauro Marcelo de Lima e Silva. They express the documents used by the magazine Veja are not reliable and cannot be used. The meeting in the farm, as described in Abin documents, occurred . Brazilian government have already said that it is against terrorism. ", "edit_actions": [{"type": "R", "before": "inteligence", "after": "intelligence", "start_char_pos": 111, "end_char_pos": 122}, {"type": "D", "before": "and", "after": null, "start_char_pos": 702, "end_char_pos": 705}, {"type": "R", "before": "comission", "after": "commission", "start_char_pos": 905, "end_char_pos": 914}, {"type": "R", "before": "ocurred", "after": "occurred", "start_char_pos": 1003, "end_char_pos": 1010}, {"type": "R", "before": "Comunist", "after": "Communist", "start_char_pos": 1086, "end_char_pos": 1094}, {"type": "R", "before": "comission", "after": "commission", "start_char_pos": 1732, "end_char_pos": 1741}, {"type": "R", "before": "ocurred", "after": "occurred", "start_char_pos": 2050, "end_char_pos": 2057}, {"type": "R", "before": "responsability", "after": "responsibility", "start_char_pos": 2568, "end_char_pos": 2582}, {"type": "R", "before": "governement", "after": "government", "start_char_pos": 2927, "end_char_pos": 2938}, {"type": "R", "before": "Comission", "after": "Commission", "start_char_pos": 4098, "end_char_pos": 4107}, {"type": "R", "before": "Comission", "after": "Commission", "start_char_pos": 4458, "end_char_pos": 4467}, {"type": "R", "before": "ocurred", "after": "occurred", "start_char_pos": 4756, "end_char_pos": 4763}, {"type": "D", "before": "> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------. ______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ .C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------. ______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /%DIFDELCMD < \\\\%%% \\ --__%DIFDELCMD < \\\\ %%% : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__%DIFDELCMD < \\\\%%% _________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ", "after_revision": "%DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\%%% %DIFDELCMD < \\\\ %%% %DIFDELCMD < \\\\%%% The Xbox 360 The \"red ring of death\" indicating a hardware failure. Microsoft has extended the warranty on its Xbox 360 video game console to three years from the date of purchase following a large number of problems with the console and \"an unacceptable number of repairs\", costing the company more than one billion US dollars. The fault, which has been dubbed the \"red ring of death\", causes the console to fail completely. In an open letter to owners of the Xbox 360, Peter Moore of Microsoft said, \"As of today, all Xbox 360 consoles are covered by an enhanced warranty program to address specifically the general hardware failures indicated by the three flashing red lights on the console. This applies to new and previously-sold consoles.\" The extended warranty covers repairing and shipping of the console and the company has promised to reimburse those owners who have already had to pay for repairs. Microsoft has not released details of the number of units that have suffered from the problem but has said it is \"bigger than we are comfortable with\". The Xbox 360 was launched by Microsoft in 2005 and in January of this year the company lowered its sales expectations to 12 million units for the year ending June 2007.", "edit_actions": [{"type": "D", "before": "g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 0, "end_char_pos": 116}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 135, "end_char_pos": 141}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 161, "end_char_pos": 414}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 433, "end_char_pos": 768}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 787, "end_char_pos": 793}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------. ______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ .C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 813, "end_char_pos": 1066}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 1085, "end_char_pos": 1420}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 1439, "end_char_pos": 1445}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------. ______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 1465, "end_char_pos": 1719}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 1738, "end_char_pos": 2073}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 2092, "end_char_pos": 2098}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 2118, "end_char_pos": 2371}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 2390, "end_char_pos": 2725}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 2744, "end_char_pos": 2750}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 2770, "end_char_pos": 3023}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 3042, "end_char_pos": 3377}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 3396, "end_char_pos": 3402}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 3422, "end_char_pos": 3675}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 3694, "end_char_pos": 4029}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 4048, "end_char_pos": 4054}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 4074, "end_char_pos": 4327}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 4346, "end_char_pos": 4681}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 4700, "end_char_pos": 4706}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 4726, "end_char_pos": 4979}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 4998, "end_char_pos": 5333}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 5352, "end_char_pos": 5358}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 5378, "end_char_pos": 5631}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 5650, "end_char_pos": 5985}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 6004, "end_char_pos": 6010}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 6030, "end_char_pos": 6283}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 6302, "end_char_pos": 6637}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 6656, "end_char_pos": 6662}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 6682, "end_char_pos": 6935}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 6954, "end_char_pos": 7289}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 7308, "end_char_pos": 7314}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 7334, "end_char_pos": 7587}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 7606, "end_char_pos": 7941}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 7960, "end_char_pos": 7966}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 7986, "end_char_pos": 8239}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 8258, "end_char_pos": 8593}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 8612, "end_char_pos": 8618}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 8638, "end_char_pos": 8891}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 8910, "end_char_pos": 9245}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 9264, "end_char_pos": 9270}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 9290, "end_char_pos": 9543}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 9562, "end_char_pos": 9897}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 9916, "end_char_pos": 9922}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 9942, "end_char_pos": 10195}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 10214, "end_char_pos": 10549}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 10568, "end_char_pos": 10574}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 10594, "end_char_pos": 10847}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 10866, "end_char_pos": 11201}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 11220, "end_char_pos": 11226}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 11246, "end_char_pos": 11499}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 11518, "end_char_pos": 11853}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 11872, "end_char_pos": 11878}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 11898, "end_char_pos": 12151}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 12170, "end_char_pos": 12505}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 12524, "end_char_pos": 12530}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 12550, "end_char_pos": 12803}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 12822, "end_char_pos": 13157}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 13176, "end_char_pos": 13182}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 13202, "end_char_pos": 13455}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 13474, "end_char_pos": 13809}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 13828, "end_char_pos": 13834}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 13854, "end_char_pos": 14107}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 14126, "end_char_pos": 14461}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 14480, "end_char_pos": 14486}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 14506, "end_char_pos": 14759}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 14778, "end_char_pos": 15113}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 15132, "end_char_pos": 15138}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 15158, "end_char_pos": 15411}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 15430, "end_char_pos": 15765}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 15784, "end_char_pos": 15790}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 15810, "end_char_pos": 16063}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 16082, "end_char_pos": 16417}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 16436, "end_char_pos": 16442}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 16462, "end_char_pos": 16715}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 16734, "end_char_pos": 17069}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 17088, "end_char_pos": 17094}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 17114, "end_char_pos": 17367}, {"type": "D", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "after": null, "start_char_pos": 17386, "end_char_pos": 17721}, {"type": "D", "before": "\\ --__", "after": null, "start_char_pos": 17740, "end_char_pos": 17746}, {"type": "D", "before": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "after": null, "start_char_pos": 17766, "end_char_pos": 18019}, {"type": "R", "before": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x", "after": "The Xbox 360 The \"red ring of death\" indicating a hardware failure. Microsoft has extended the warranty on its Xbox 360 video game console to three years from the date of purchase following a large number of problems with the console and \"an unacceptable number of repairs\", costing the company more than one billion US dollars.", "start_char_pos": 18038, "end_char_pos": 18253}, {"type": "A", "before": null, "after": "The fault, which has been dubbed the \"red ring of death\", causes the console to fail completely.", "start_char_pos": 18254, "end_char_pos": 18254}, {"type": "A", "before": null, "after": "In an open letter to owners of the Xbox 360, Peter Moore of Microsoft said, \"As of today, all Xbox 360 consoles are covered by an enhanced warranty program to address specifically the general hardware failures indicated by the three flashing red lights on the console. This applies to new and previously-sold consoles.\" The extended warranty covers repairing and shipping of the console and the company has promised to reimburse those owners who have already had to pay for repairs.", "start_char_pos": 18255, "end_char_pos": 18255}, {"type": "A", "before": null, "after": "Microsoft has not released details of the number of units that have suffered from the problem but has said it is \"bigger than we are comfortable with\".", "start_char_pos": 18256, "end_char_pos": 18256}, {"type": "A", "before": null, "after": "The Xbox 360 was launched by Microsoft in 2005 and in January of this year the company lowered its sales expectations to 12 million units for the year ending June 2007.", "start_char_pos": 18257, "end_char_pos": 18257}], "sents_char_pos": [0, 225, 472, 877, 1124, 1529, 1777, 2182, 2429, 2834, 3081, 3486, 3733, 4138, 4385, 4790, 5037, 5442, 5689, 6094, 6341, 6746, 6993, 7398, 7645, 8050, 8297, 8702, 8949, 9354, 9601, 10006, 10253, 10658, 10905, 11310, 11557, 11962, 12209, 12614, 12861, 13266, 13513, 13918, 14165, 14570, 14817, 15222, 15469, 15874, 16121, 16526, 16773, 17178, 17425, 17830]}
+{"doc_id": "736", "revision_depth": "1", "before_revision": "Hu Jintao, the President of the People's Republic of China had lunch today with the President of Brazil, Luiz In\u00e1cio Lula da Silva , at the Granja do Torto, the President's country residence in the Brazilian Federal District . Lunch was a traditional Brazilian barbecue with different kinds of meat. Some Brazilian ministers were present at the event: Antonio Palocci (Economy), Eduardo Campos (Science and Technology), Roberto Rodrigues ( Agriculture), Luiz Fernando Furlan (Development), Celso Amorim (Exterior Relations), Dilma Rousseff ( Mines and Energy). Also present were Roger Agnelli ( Vale do Rio Doce company president) and Eduardo Dutra ( Petrobras , government oil company, president). This meeting is part of a new political economy agreement between Brazil and China where Brazil has recognized mainland China's market economy status, and China has promised to buy more Brazilian products .", "after_revision": ", the of the People's Republic of China had lunch today with the of Brazil, , at the Granja do Torto, the President's country residence in the . Lunch was a traditional Brazilian with different kinds of meat. Some Brazilian ministers were present at the event: (Economy), ( ), ( Agriculture), (Development), ( ), ( Mines and Energy). Also present were ( company president) and Eduardo Dutra ( , government oil company, president). This meeting is part of a new agreement between Brazil and China where Brazil has recognized mainland China's status, and China has promised to buy more .", "edit_actions": [{"type": "R", "before": "Hu Jintao, the President", "after": ", the", "start_char_pos": 0, "end_char_pos": 24}, {"type": "D", "before": "President", "after": null, "start_char_pos": 84, "end_char_pos": 93}, {"type": "D", "before": "Luiz In\u00e1cio Lula da Silva", "after": null, "start_char_pos": 105, "end_char_pos": 130}, {"type": "D", "before": "Brazilian Federal District", "after": null, "start_char_pos": 198, "end_char_pos": 224}, {"type": "D", "before": "barbecue", "after": null, "start_char_pos": 261, "end_char_pos": 269}, {"type": "D", "before": "Antonio Palocci", "after": null, "start_char_pos": 352, "end_char_pos": 367}, {"type": "D", "before": "Eduardo Campos (Science and Technology), Roberto Rodrigues", "after": null, "start_char_pos": 379, "end_char_pos": 437}, {"type": "A", "before": null, "after": "), (", "start_char_pos": 440, "end_char_pos": 440}, {"type": "D", "before": "Luiz Fernando Furlan", "after": null, "start_char_pos": 455, "end_char_pos": 475}, {"type": "D", "before": "Celso Amorim (Exterior Relations), Dilma Rousseff", "after": null, "start_char_pos": 491, "end_char_pos": 540}, {"type": "A", "before": null, "after": "), (", "start_char_pos": 543, "end_char_pos": 543}, {"type": "R", "before": "Roger Agnelli ( Vale do Rio Doce", "after": "(", "start_char_pos": 581, "end_char_pos": 613}, {"type": "D", "before": "Petrobras", "after": null, "start_char_pos": 653, "end_char_pos": 662}, {"type": "D", "before": "political economy", "after": null, "start_char_pos": 731, "end_char_pos": 748}, {"type": "D", "before": "market economy", "after": null, "start_char_pos": 829, "end_char_pos": 843}, {"type": "D", "before": "Brazilian products", "after": null, "start_char_pos": 887, "end_char_pos": 905}], "sents_char_pos": [0, 299, 562, 700]}
+{"doc_id": "73718", "revision_depth": "1", "before_revision": "West Indies have beaten England by 93 runs in the third and final One-Day International of the West Indies tour of England at Trent Bridge, Nottingham , England. West Indies win the three match series 2-1. England's bowlers fared poorly, despite removing Devon Smith early on, with the West Indies batsmen scoring 116 runs off the last ten overs. Runako Morton (82 not out), Chris Gayle (82) and Dwayne Bravo (42 off 24 balls) helped the West Indies to an imposing total of 289-5. The only wickets for England were taken by Liam Plunkett (3-59) and James Anderson (2-51). In response, England's batting performance was no better than their fielding. Although Owais Shah scored 51, England lost too many batsmen cheaply including Kevin Pietersen for 0. They were reduced to 196 all out, far short of the 290 runs needed. Fidel Edwards took 3-30 and Daren Powell took 4-40 for the West Indies. Previously on the tour, England won a four match Test series 3-0 and drew a two match Twenty20 series 1-1. England: A N Cook, M J Prior (wkt), I R Bell, K P Pietersen, P D Collingwood (capt), O A Shah, A D Mascarenhas , L E Plunkett, S C J Broad, MS Panesar, J M Anderson West Indies: C H Gayle (capt), D S Smith, S Chanderpaul, M N Samuels, D J Bravo, D Ramdin (wkt), D R Smith, R S Morton, F H Edwards, R Rampaul, D B L Powell Player of the match: D B L Powell (West Indies) Player of the series: S Chanderpaul (West Indies) Umpires: M R Benson and B G Jerling (South Africa) TV Umpire: P J Hartley Match referee: M J Procter (South Africa) Reserve Umpire: I J Gould", "after_revision": "have beaten by 93 runs in the third and final of the at , , England. West Indies win the three match series 2-1. England's bowlers fared poorly, despite removing early on, with the West Indies batsmen scoring 116 runs off the last ten overs. (82 not out), (82) and (42 off 24 balls) helped the West Indies to an imposing total of 289-5. The only wickets for England were taken by (3-59) and (2-51). In response, England's batting performance was no better than their fielding. Although scored 51, England lost too many batsmen cheaply including for 0. They were reduced to 196 all out, far short of the 290 runs needed. took 3-30 and took 4-40 for the West Indies. Previously on the tour, England won a four match series 3-0 and drew a two match series 1-1. England: , (wkt), , , (capt), , , , , , West Indies: (capt), , , , , (wkt), , , , , Player of the match: (West Indies) Player of the series: (West Indies) Umpires: and (South Africa) TV Umpire: Match referee: (South Africa) Reserve Umpire: ", "edit_actions": [{"type": "R", "before": "West Indies have beaten England", "after": "have beaten", "start_char_pos": 0, "end_char_pos": 31}, {"type": "R", "before": "One-Day International of the West Indies tour of England at Trent Bridge, Nottingham", "after": "of the at", "start_char_pos": 66, "end_char_pos": 150}, {"type": "A", "before": null, "after": ",", "start_char_pos": 153, "end_char_pos": 153}, {"type": "D", "before": "Devon Smith", "after": null, "start_char_pos": 256, "end_char_pos": 267}, {"type": "D", "before": "Runako Morton", "after": null, "start_char_pos": 348, "end_char_pos": 361}, {"type": "D", "before": "Chris Gayle", "after": null, "start_char_pos": 376, "end_char_pos": 387}, {"type": "D", "before": "Dwayne Bravo", "after": null, "start_char_pos": 397, "end_char_pos": 409}, {"type": "D", "before": "Liam Plunkett", "after": null, "start_char_pos": 525, "end_char_pos": 538}, {"type": "D", "before": "James Anderson", "after": null, "start_char_pos": 550, "end_char_pos": 564}, {"type": "D", "before": "Owais Shah", "after": null, "start_char_pos": 660, "end_char_pos": 670}, {"type": "D", "before": "Kevin Pietersen", "after": null, "start_char_pos": 730, "end_char_pos": 745}, {"type": "D", "before": "Fidel Edwards", "after": null, "start_char_pos": 821, "end_char_pos": 834}, {"type": "D", "before": "Daren Powell", "after": null, "start_char_pos": 849, "end_char_pos": 861}, {"type": "D", "before": "Test", "after": null, "start_char_pos": 942, "end_char_pos": 946}, {"type": "D", "before": "Twenty20", "after": null, "start_char_pos": 979, "end_char_pos": 987}, {"type": "R", "before": "A N Cook, M J Prior", "after": ",", "start_char_pos": 1009, "end_char_pos": 1028}, {"type": "R", "before": "I R Bell, K P Pietersen, P D Collingwood", "after": ", ,", "start_char_pos": 1036, "end_char_pos": 1076}, {"type": "R", "before": "O A Shah, A D Mascarenhas , L E Plunkett, S C J Broad, MS Panesar, J M Anderson", "after": ", , , , ,", "start_char_pos": 1085, "end_char_pos": 1164}, {"type": "D", "before": "C H Gayle", "after": null, "start_char_pos": 1178, "end_char_pos": 1187}, {"type": "R", "before": "D S Smith, S Chanderpaul, M N Samuels, D J Bravo, D Ramdin", "after": ", , , ,", "start_char_pos": 1196, "end_char_pos": 1254}, {"type": "R", "before": "D R Smith, R S Morton, F H Edwards, R Rampaul, D B L Powell", "after": ", , , ,", "start_char_pos": 1262, "end_char_pos": 1321}, {"type": "D", "before": "D B L Powell", "after": null, "start_char_pos": 1343, "end_char_pos": 1355}, {"type": "D", "before": "S Chanderpaul", "after": null, "start_char_pos": 1392, "end_char_pos": 1405}, {"type": "R", "before": "M R Benson and B G Jerling", "after": "and", "start_char_pos": 1429, "end_char_pos": 1455}, {"type": "D", "before": "P J Hartley", "after": null, "start_char_pos": 1482, "end_char_pos": 1493}, {"type": "D", "before": "M J Procter", "after": null, "start_char_pos": 1509, "end_char_pos": 1520}, {"type": "D", "before": "I J Gould", "after": null, "start_char_pos": 1552, "end_char_pos": 1561}], "sents_char_pos": [0, 162, 347, 481, 572, 650, 752, 820, 892, 1008, 1177]}
+{"doc_id": "73814", "revision_depth": "1", "before_revision": "1500 people in northern Nevada town of Winnemucca had to be evacuate this weekend as a 8,000-acre 55 sqaure miles wildfire burned danger close to the towns southern end. The fire threatened homes,business and a power substation the cause of the wildfire is believed to lighting strikes", "after_revision": "1500 people in northern Nevada town of Winnemucca had to be evacuated this weekend as a 8,000-acre 55 square mile wildfire burned dangerously close to the town's southern end. The fire threatened homes,business and a power substation . Lightning strikes are believed to have started the blaze.", "edit_actions": [{"type": "R", "before": "evacuate", "after": "evacuated", "start_char_pos": 60, "end_char_pos": 68}, {"type": "R", "before": "sqaure miles wildfire burned danger", "after": "square mile wildfire burned dangerously", "start_char_pos": 101, "end_char_pos": 136}, {"type": "R", "before": "towns", "after": "town's", "start_char_pos": 150, "end_char_pos": 155}, {"type": "R", "before": "the cause of the wildfire is believed to lighting strikes", "after": ". Lightning strikes are believed to have started the blaze.", "start_char_pos": 228, "end_char_pos": 285}], "sents_char_pos": [0, 169]}
+{"doc_id": "73816", "revision_depth": "1", "before_revision": "The mosque has been accused of enforcing it's own Islamic law in the capital, notable the illegal detention of Chinese foreign nationals working in massage parlors. The mosques leaders follow the Hanafi school of thought, believing that the Koran is the authority by which justice should by metered. Historically the mosque has had close links with the Pakistan leadership, and members of the current administration have resisted calls for a crackdown on the mosques antagonistic behaviour.", "after_revision": "The mosque has been accused of enforcing it's own Islamic law in the capital, notably the illegal detention of Chinese foreign nationals working in massage parlors. The mosques leaders follow the Hanafi school of thought, believing that the Koran is the authority by which justice should be metered. Historically the mosque has had close links with the Pakistan leadership, and members of the current administration have resisted calls for a crackdown on the mosques provocative behaviour.", "edit_actions": [{"type": "R", "before": "notable", "after": "notably", "start_char_pos": 78, "end_char_pos": 85}, {"type": "R", "before": "by", "after": "be", "start_char_pos": 288, "end_char_pos": 290}, {"type": "R", "before": "antagonistic", "after": "provocative", "start_char_pos": 467, "end_char_pos": 479}], "sents_char_pos": [0, 164, 299]}
+{"doc_id": "74857", "revision_depth": "1", "before_revision": "The political involvement of most media and other factors are causing contradictions among official sources that are making press work extremely hard. Moreover, nobody is permitted to reach the accident location. The site of the accident was closed to visitors following the intoxication of three TV journalists who got too close. Location of the cloud Map highlighting Lviv, the site of the derailment, in the Lviv Oblast. TV channel Novyj Kanal translated a telephonic interview with officers from the Ministry of Internal Affairs during which the existence of any cloud whatsoever is firmly denied. Immediately after the interview a press conference by Kiev mayor , Mr. Leonid Chernovezkij, announces that starting next Monday a daily report about the movements of the same cloud will be available to the population. The service will be provided by the Kiev administration. In an interview to TV channel UT-1 an officer of the ecological service admitted that they have no real data about the area closer to the accident, because not even government officers are permitted to reach it. The officer said that most data about the hypothetical movements of the cloud (if the cloud exists) are made based on computer simulations they receive from Russian vendors, because no such simulation model is currently available in the Ukraine. The closest available on spot measures are related to areas located several kilometers away from the epicentre. Removal operation In the same press release the Mayor of Kiev also announced that no transport of whatever dangerous material will be allowed in the town area. The removal by railway of the phosphor containers involved in the accident was originally planned for today. It \u2019s unclear how Kiev\u2019s transit refusal may affect the operationand whether the mayor has the authority to block national traffic on the railways. According to the Press Manager of the Ministery for Emergency Situations, Mr. Igor Krol', four containers will be lifted and put back on the rails today. Five containers have already been lifted. Yet the weather may affect the operations, as violent storms and very strong winds are expected in the area. This is going to introduce a serious risk factor for the phosphor that still remains on the ground. The contaminating products are in fact insulated from the air by means of pillows made of air and foam; a strong wind may cause new emergencies by even just partially removing such insulation structures. Yushchenko issued an official call to speed up the closure of the Chernobyl atomic power plants on July , 20. Immediately after he left the country with his family for an unofficial visit to Poland, that will be followed by an official visit to Germany. He is expected to travel to Germany on the evening of July 21. The Ukraine Procuror General, Mr. Aleksandr Medvedenko, declares to the press that he has visited the accident site together with the President, and that all necessary measures are being taken, both for the liquidation of the accident and the defense of the civilian population. He notes that \"it takes courage to work there, for the personnel of the Ministry for Emergency Situations\". He announces that a complex cycle of medical care is being planned for about 1500 children of the affected area. In the same interview the Procuror General announces that the Government of Kazakhstan will accept being returned the phosphor left (the goods were originally from Kazakhstan). Yet in the same hours the director of Kazphosphat (the vendor ) declares in an interview to the newspaper Segodnja that he gathers that \"the phosphor will be stocked in the Ukraine, because it makes no sense to transfer it back. Moreover, you can hardly imagine that Russia would accept the passage of such a dangerous damaged load on their railways\".", "after_revision": "The political involvement of most media and other factors are causing contradictions among official sources that are making press work extremely hard. Moreover, no one is permitted to enter the accident location. The site of the accident was closed to visitors following the injury of three TV journalists who got too close. Location of the cloud Map highlighting Lviv, the site of the derailment, in the Lviv Oblast. TV channel Novyj Kanal translated a telephonic interview with officers from the Ministry of Internal Affairs , during which the existence of any cloud whatsoever was firmly denied. Immediately after the interview , a press conference by the mayor of Kiev , Mr. Leonid Chernovezkij, announced that starting next Monday a daily report about the movements of the cloud will be available to the population. The service will be provided by the Kiev administration. In an interview with TV channel UT-1 , an officer of the ecological service admitted that they have no real data about the area closer to the accident, because not even government officers are permitted to reach it. The officer said that most data about the hypothetical movements of the cloud (if the cloud exists) are made based on computer simulations they receive from Russian vendors, because no such simulation model is currently available in the Ukraine. The closest available on spot measures are taken in areas located several kilometers away from the epicentre. Removal operation In the same press release , the Mayor of Kiev also announced that no transport of any dangerous material will be allowed in the town area. The removal by railway of the phosphor containers involved in the accident was originally planned for today. It is unclear how Kiev\u2019s transit refusal may affect this operation, or whether the mayor has the authority to block national traffic on the railways. According to the Press Manager of the Ministery for Emergency Situations, Mr. Igor Krol', four containers will be lifted and put back on the rails today. Five containers have already been righted. However, weather may affect the operations, as violent storms and very strong winds are expected in the area. This is going to introduce a serious risk factor for the phosphor that still remains on the ground. The contaminating products are currently insulated from the air by means of pillows made of air and foam; a strong wind may cause new emergencies by even just partially removing such insulation structures. Yushchenko issued an official call to speed up the closure of the Chernobyl atomic power plants on July 20. Immediately afterwards, he left the country with his family for an unofficial visit to Poland, which will be followed by an official visit to Germany. He is expected to travel to Germany on the evening of July 21. The Ukraine Procuror General, Mr. Aleksandr Medvedenko, declared to the press that he has visited the accident site together with the President, and that all necessary measures are being taken, both for the cleanup of the accident and the defense of the civilian population. He notes that \"it takes courage to work there, for the personnel of the Ministry for Emergency Situations\". He announces that a complex cycle of medical care is being planned for about 1500 children of the affected area. In the same interview , the Procuror General announced that the Government of Kazakhstan will accept the phosphor still remaining (the goods were originally from Kazakhstan). However, in the same time period, the director of Kazphosphat (the vendor of the materials) declared in an interview to the newspaper Segodnja that he gathers that \"the phosphor will be stocked in the Ukraine, because it makes no sense to transfer it back. Moreover, you can hardly imagine that Russia would accept the passage of such a dangerous damaged load on their railways\".", "edit_actions": [{"type": "R", "before": "nobody", "after": "no one", "start_char_pos": 161, "end_char_pos": 167}, {"type": "R", "before": "reach", "after": "enter", "start_char_pos": 184, "end_char_pos": 189}, {"type": "R", "before": "intoxication", "after": "injury", "start_char_pos": 275, "end_char_pos": 287}, {"type": "A", "before": null, "after": ",", "start_char_pos": 533, "end_char_pos": 533}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 585, "end_char_pos": 587}, {"type": "A", "before": null, "after": ",", "start_char_pos": 635, "end_char_pos": 635}, {"type": "R", "before": "Kiev mayor", "after": "the mayor of Kiev", "start_char_pos": 658, "end_char_pos": 668}, {"type": "R", "before": "announces", "after": "announced", "start_char_pos": 696, "end_char_pos": 705}, {"type": "D", "before": "same", "after": null, "start_char_pos": 774, "end_char_pos": 778}, {"type": "R", "before": "to", "after": "with", "start_char_pos": 895, "end_char_pos": 897}, {"type": "A", "before": null, "after": ",", "start_char_pos": 914, "end_char_pos": 914}, {"type": "R", "before": "related to", "after": "taken in", "start_char_pos": 1381, "end_char_pos": 1391}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1494, "end_char_pos": 1494}, {"type": "R", "before": "whatever", "after": "any", "start_char_pos": 1549, "end_char_pos": 1557}, {"type": "R", "before": "\u2019s", "after": "is", "start_char_pos": 1723, "end_char_pos": 1725}, {"type": "R", "before": "the operationand", "after": "this operation, or", "start_char_pos": 1772, "end_char_pos": 1788}, {"type": "R", "before": "lifted. Yet the", "after": "righted. However,", "start_char_pos": 2056, "end_char_pos": 2071}, {"type": "R", "before": "in fact", "after": "currently", "start_char_pos": 2304, "end_char_pos": 2311}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2581, "end_char_pos": 2582}, {"type": "R", "before": "after", "after": "afterwards,", "start_char_pos": 2599, "end_char_pos": 2604}, {"type": "R", "before": "that", "after": "which", "start_char_pos": 2676, "end_char_pos": 2680}, {"type": "R", "before": "declares", "after": "declared", "start_char_pos": 2850, "end_char_pos": 2858}, {"type": "R", "before": "liquidation", "after": "cleanup", "start_char_pos": 3001, "end_char_pos": 3012}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3316, "end_char_pos": 3316}, {"type": "R", "before": "announces", "after": "announced", "start_char_pos": 3338, "end_char_pos": 3347}, {"type": "R", "before": "being returned the phosphor left", "after": "the phosphor still remaining", "start_char_pos": 3394, "end_char_pos": 3426}, {"type": "R", "before": "Yet", "after": "However,", "start_char_pos": 3472, "end_char_pos": 3475}, {"type": "R", "before": "hours", "after": "time period,", "start_char_pos": 3488, "end_char_pos": 3493}, {"type": "R", "before": ") declares", "after": "of the materials) declared", "start_char_pos": 3534, "end_char_pos": 3544}], "sents_char_pos": [0, 150, 212, 330, 423, 602, 821, 878, 1091, 1337, 1449, 1610, 1719, 1867, 2021, 2063, 2172, 2272, 2376, 2476, 2730, 2793, 3072, 3180, 3293, 3471, 3700]}
+{"doc_id": "74873", "revision_depth": "1", "before_revision": "On Thursday 21 year old actress Lindsay Lohan accompanied by her attorney turned herself into the Beverly Hills Police Department on a misdemeanor charge of hit-and-run and driving under the influence. Lohan crashed her 2005 Mercedes SL-65 into a curb on Sunset Boulevard then was driven to a Century City hospital in a friends carwith minor injuries from the accident . The Beverly Hills Police tracked her down at the hospital where they check her blood-alcohol level that was above California's 0.08 percent legal limit but the police would not disclose what level Lohan's blood-alcohol was. On Thursday she was fingerprinted,photographed given a 30,000 dollar bond and schedule a court date for August 24. After the crash Lohan checked in to a rehabilitation center for 45 days this is the second round of rehabilitation this year ", "after_revision": "Lindsay Lohan at the Calvin Klein Spring 2007 Fashion Show afterparty. On Thursday afternoon, 21-year-old actress Lindsay Lohan turned herself in to the Beverly Hills Police Department to face charges of misdemeanor hit-and-run and the suspicion of driving under the influence. Accompanied by her lawyer, Lohan was fingerprinted and photographed by police. On May 26 of this year, Lohan had crashed her car into a curb and hedge on Sunset Boulevard and received minor injuries. She was then driven to a Century City hospital in a friend's car . The Beverly Hills Police tracked her down at the hospital where they checked her blood-alcohol level , which was found to be above California's 0.08 percent legal limit , although the police would not disclose what level Lohan's blood-alcohol was. After the crash , Lohan checked herself into a rehabilitation center for a 45-day stay, which was her second round of rehabilitation this year . A court date has been scheduled for August 24, 2007.", "edit_actions": [{"type": "R", "before": "On Thursday 21 year old", "after": "Lindsay Lohan at the Calvin Klein Spring 2007 Fashion Show afterparty. On Thursday afternoon, 21-year-old", "start_char_pos": 0, "end_char_pos": 23}, {"type": "R", "before": "accompanied by her attorney turned herself into", "after": "turned herself in to", "start_char_pos": 46, "end_char_pos": 93}, {"type": "R", "before": "on a misdemeanor charge of", "after": "to face charges of misdemeanor", "start_char_pos": 130, "end_char_pos": 156}, {"type": "A", "before": null, "after": "the suspicion of", "start_char_pos": 173, "end_char_pos": 173}, {"type": "R", "before": "Lohan crashed her 2005 Mercedes SL-65", "after": "Accompanied by her lawyer, Lohan was fingerprinted and photographed by police.", "start_char_pos": 203, "end_char_pos": 240}, {"type": "A", "before": null, "after": "On May 26 of this year, Lohan had crashed her car", "start_char_pos": 241, "end_char_pos": 241}, {"type": "A", "before": null, "after": "and hedge", "start_char_pos": 254, "end_char_pos": 254}, {"type": "R", "before": "then was", "after": "and received minor injuries. She was then", "start_char_pos": 275, "end_char_pos": 283}, {"type": "R", "before": "friends carwith minor injuries from the accident", "after": "friend's car", "start_char_pos": 323, "end_char_pos": 371}, {"type": "R", "before": "check", "after": "checked", "start_char_pos": 443, "end_char_pos": 448}, {"type": "R", "before": "that was", "after": ", which was found to be", "start_char_pos": 473, "end_char_pos": 481}, {"type": "R", "before": "but", "after": ", although", "start_char_pos": 526, "end_char_pos": 529}, {"type": "D", "before": "On Thursday she was fingerprinted,photographed given a 30,000 dollar bond and schedule a court date for August 24.", "after": null, "start_char_pos": 598, "end_char_pos": 712}, {"type": "R", "before": "Lohan checked in to", "after": ", Lohan checked herself into", "start_char_pos": 729, "end_char_pos": 748}, {"type": "R", "before": "45 days this is the", "after": "a 45-day stay, which was her", "start_char_pos": 777, "end_char_pos": 796}, {"type": "A", "before": null, "after": ".", "start_char_pos": 838, "end_char_pos": 838}, {"type": "A", "before": null, "after": "A court date has been scheduled for August 24, 2007.", "start_char_pos": 839, "end_char_pos": 839}], "sents_char_pos": [0, 202, 373, 597, 712]}
+{"doc_id": "75336", "revision_depth": "1", "before_revision": "__NOTOC__ Regions of the Empire State Games
The Empire State Games is an annual Olympic-style competition for amateur athletes from the state of New York, United States, encompassing several divisions allowing athletes of all ages to compete. In 2007, it is hosted by Westchester County and takes place July 25-29 , 2007. In all, some 6,000 athletes are expected to participate. \"I think the Empire State Games is one of the best things that's happened to Westchester County,\" Buster LaBarbera, 74, of New Rochelle said. \"It's good for the economy and it's just a great thing.\" Long Island had made a bid to host the games but lost out to Westchester. \"Once done, it's done,\" said Bob Kenney, region director for Long Island, at the opening ceremonies. \"We can't look back. We can't hold grudges.\" Long Island may submit a bid for the games in 2010 according to Kenney. Saturday, the Criterium cycling events took place in White Plains . Starting at 7:00 a.m. EDT (UTC-4 ), races for both men and women began at Martine Avenue at Court Street in downtown White Plains. Criterium races (those are age brackets for the masters series): Masters Men 45-54, 12 miles Masters Men 35-44, 18 miles Open Men, 31 miles Open Women, 18 miles Masters Men 55-64, 65+, 10 miles Masters Women 35-44, 45-54, 55+, 10 miles Wikinews was there to cover the men's open event race. Points were awarded for sprints on certain laps. Joe Zaverdas from Commack , New York, representing the Long Island region, won with 75 points. 58 riders participated. Gallery ", "after_revision": "__NOTOC__ Regions of the Empire State Games
The is an annual Olympic-style competition for from the state of New York, United States, encompassing several divisions allowing athletes of all ages to compete. In 2007, it is hosted by and takes place July 25\u201329 , 2007. In all, some 6,000 athletes are expected to participate. \"I think the Empire State Games is one of the best things that's happened to Westchester County,\" Buster LaBarbera, 74, of said. \"It's good for the economy and it's just a great thing.\" had made a bid to host the games but lost out to Westchester. \"Once done, it's done,\" said Bob Kenney, region director for Long Island, at the opening ceremonies. \"We can't look back. We can't hold grudges.\" Long Island may submit a bid for the games in 2010 according to Kenney. Saturday, the cycling events took place in . Starting at 7:00 a.m. ( ), races for both men and women began at Martine Avenue at Court Street in downtown White Plains. Criterium races (those are age brackets for the masters series): Masters Men 45-54, 12 Masters Men 35-44, 18 miles Open Men, 31 miles Open Women, 18 miles Masters Men 55-64, 65+, 10 miles Masters Women 35-44, 45-54, 55+, 10 miles Wikinews was there to cover the men's open event race. Points were awarded for sprints on certain laps. Joe Zaverdas from , New York, representing the Long Island region, won with 75 points. 58 riders participated. Gallery Sister links", "edit_actions": [{"type": "D", "before": "Empire State Games", "after": null, "start_char_pos": 54, "end_char_pos": 72}, {"type": "D", "before": "amateur athletes", "after": null, "start_char_pos": 116, "end_char_pos": 132}, {"type": "D", "before": "Westchester County", "after": null, "start_char_pos": 274, "end_char_pos": 292}, {"type": "R", "before": "25-29", "after": "25\u201329", "start_char_pos": 314, "end_char_pos": 319}, {"type": "D", "before": "New Rochelle", "after": null, "start_char_pos": 508, "end_char_pos": 520}, {"type": "D", "before": "Long Island", "after": null, "start_char_pos": 584, "end_char_pos": 595}, {"type": "D", "before": "Criterium", "after": null, "start_char_pos": 890, "end_char_pos": 899}, {"type": "D", "before": "White Plains", "after": null, "start_char_pos": 929, "end_char_pos": 941}, {"type": "R", "before": "EDT (UTC-4", "after": "(", "start_char_pos": 966, "end_char_pos": 976}, {"type": "D", "before": "miles", "after": null, "start_char_pos": 1162, "end_char_pos": 1167}, {"type": "D", "before": "Commack", "after": null, "start_char_pos": 1433, "end_char_pos": 1440}, {"type": "A", "before": null, "after": "Sister links", "start_char_pos": 1542, "end_char_pos": 1542}], "sents_char_pos": [0, 248, 327, 384, 526, 583, 657, 758, 779, 803, 875, 1074, 1365, 1414, 1509]}
+{"doc_id": "78656", "revision_depth": "2", "before_revision": "Other games Devil Rays 8, Yankees 2: Carlos Pena hit a triple and a three-run homer, as the Devil Rays took two out of three from the Yankees. Jason Hammel (2-4) pitched five innings, allowing one run and five hits for the win, while Andy Pettitte, forced out of the game after Pena's homer, allowed five runs for the loss. The Yankees (76-61) remain 2 games ahead of the Mariners in the AL Wild Card race. White Sox 8, Indians 0: The White Sox racked up 18 hits; leadoff hitter Jerry Owens went 3-4, with 2 RBI, 2 walks, and a stolen base, his 23rd of the season. The Indians amassed seven walks, six by starter Jose Contreras, but failed to score any runs. Contreras (8-16) picked up the win, while White Sox pitcher Jake Westbrook (5-8) allowed four runs (three earned) in 5 innings of work for the loss. Thanks to a Tigers loss, the Indians (78-58) remain 5 1/2 games in front in the AL Central race. Royals 8, Twins 1: The Royals' Alex Gordon hit solo homers (13, 14) in the 2nd and 3rd innings, two of sixteen hits recorded by the Royals. Twins first baseman Garrett Jones went 3-3 in the game, with three of the six hits recorded by the Twins (all singles). Brian Bannister (12-7) allowed one run and six hits in eight innings of work, receiving the win. Boof Bonser (6-12) pitched 1 2/3 innings, allowing five runs for the loss. Blue Jays 6, Mariners 4: Gregg Zaun (8) and Matt Stairs (18) each hit a two-run homer in the game to put Toronto ahead early. A.J. Burnett (8-7) got the win, while Jeff Weaver (6-11) left after three innings, allowing five runs for the loss. Casey Janssen recorded his fifth save of the season for the Blue Jays. Seattle (73-62) remains two games back of the Yankees in the AL Wild Card race. Rangers 8, Angels 7: Hank Blalock hit a grand slam in the eighth inning, to take the lead. Wes Littleton (3-1) pitched two hitless innings in relief for the win, while Scot Shields (3-5) got the loss, giving up four runs on the Blalock slam. C.J. Wilson picked up his 10th save. The Angels remained 6.5 games ahead of the Mariners in the AL West race. IGNORE THIS Mets 5, Braves 1: The Mets' Carlos Delgado, Lastings Milledge, and Carlos Beltran all hit solo home runs in the win. Mike Pelfrey (1-7) notched his first win of the year , giving up just one hit and one runin six innings of work. Braves starter Chuck James (9-10) gave up three earned runs en route to the loss. Pedro Feliciano pitched two perfect innings, striking out the last five batters he faced . The Mets ( 75-60) hold a 3 game lead over the Phillies, and a 6.5 game lead over the Braves ( 69-67), in the NL East . Marlins 12 , Phillies 6: The Marlins scored seven runs in the first inning, setting the pace for a 12-6 win. Marlins hitters Jeremy Hermida, Mike Jacobs, and Cody Ross each drove in two runs. Byung-Hyun Kim (8-6) pitched five innings and gave up four runs for the win, while Phillies pitcher J.D. Durbin (6-4)didn't record a single out, leaving the game in the first inning after giving up seven runs, all earned. Kevin Gregg pitched 1 1/3 hitless innings for his 27th save. With the Mets' win, the Phillies fall to 3 games back in the NL East race . Cubs 4, Astros 3: Powered by a 6th inning two-run homer by Aramis Ramirez, his 19th of the season, the Cubs beat the Astros 4-3. Jason Marquis (11-8) pitched 6 2/ 3 innings for the win, while Astros pitcher Troy Patton gave up three runs (two earned) in six innings for the loss. Ryan Dempster gave up a solo home run in the 9th inning, but held on for his 24th save. The Cubs lead the NL Central by 1.5 games over the Brewers , and 2 games over the Cardinals . Brewers 12, Pirates 3: Kevin Mench went 3-3, with a single, double and home run, scoring four runs and driving in three, in a decisive win. Dave Bush (11-9) pitched 6 innings, giving up four hits and one earnedrun for the win . Shane Youman (3-5) pitched just two innings, giving up eight earned runs for the loss. The Brewers (68-67) stay 1.5 games behind the Cubs in the NL Central race . Cardinals 11, Reds 3 : Cardinals' Rick Ankiel went 3-4 with a double, two runs and three RBI. Adam Wainwright pitched 5 2 /3 innings, allowing two runs (one earned) for the win, while Reds' Phil Dumatrait pitched 4 2/3 innings, giving up seven runs (five earned) for the loss. The Cardinals improve to 66-66, and are two games back in the NL Central race. ", "after_revision": "Other games White Sox 8, Indians 0: The White Sox racked up 18 hits; leadoff hitter Jerry Owens went 3-4, with 2 RBI, 2 walks, and a stolen base, his 23rd of the season. The Indians amassed seven walks, six by starter Jose Contreras, but failed to score any runs. Contreras (8-16) picked up the win, while White Sox pitcher Jake Westbrook (5-8) allowed four runs (three earned) in 5 innings of work for the loss. Thanks to a Tigers loss, the Indians (78-58) remain 5 1/2 games in front in the AL Central race. Devil Rays 8, Yankees 2: Carlos Pena hit a triple and a three-run homer, as the Devil Rays took two out of three from the Yankees. Jason Hammel (2-4) pitched five innings, allowing one run and five hits for the win, while Andy Pettitte, forced out of the game after Pena's homer, allowed five runs for the loss. The Yankees (76-61) remain 2 games ahead of the Mariners in the AL Wild Card race. Mets 3, Braves 2: David Wright hit a two-run homer in the fifth inning, which proved to be the deciding factor in the game. Pitcher Tom Glavine (12-6) pitched six innings , giving up one run and five hits; Glavine was also responsible for the Mets' first run, on a sacrifice fly in the 2nd inning. John Smoltz (12-7) got the loss, giving up three earned runs in seven innings. Billy Wagner allowed one earned run in the ninth inning, but held on for the save, his 30th of the season . The Mets ( 76-60) are 4 games ahead of the Phillies, and 7.5 games ahead of the Braves ( 69-68) . Marlins 7 , Phillies 6: Cody Ross hit two home runs (9, 10), a two-run homer in the fourth and a solo shot in the sixth. Justin Miller (5-0) pitched 1 1/3 innings for the win, while Kane Davis (0-1) gave up two runs and three hits in the loss. The Phillies are four games back of the Mets in the NL East . Cubs 6, Astros 5: The Cubs came back from a 5-1 deficit, led by Derrek Lee, who went 3-4 with a home run and 3 RBI. Matt Murton hit a home run in a pinch-hit at-bat in the 7th inning. Carlos Marmol (5-1) got the win, facing one batter in the eighth inning. Chad Qualls (6-4) got the loss, giving up two runs on the Lee home run in the eighth. Ryan Dempster threw a perfect 9th , striking out two of the three batters he faced, for his 25th save. The Cubs are 1.5 games ahead of the Brewers and 2 games ahead of the Cardinals in the NL Central . Brewers 7, Pirates 4: Ryan Braun went 3-4 with a homer and 3 RBI, and Prince Fielder hit his 40th home run of the year, a two-run shot. Jeff Suppan (9-11) gave up four runs (two earned) for the win , while Pirates reliever Franquelis Osoria (0-1) gave up three runs in two innings for the loss. Francisco Cordero picked up his 39th save. The Brewers are 1.5 games behind the Cubs in the NL Central . Cardinals 3, Reds 2 : Cardinals' Rick Ankiel hit a solo home run in the sixth inning, and drove in the winning run on a sacrifice fly in the seventh. Braden Looper (12-10) pitched seven scoreless innings, giving up four hits. Bronson Arroyo (7-14) gave up three runs and eight hits in 6 1/3 innings for the loss. Jason Isringhausen gave up a run in the ninth on a sacrifice fly, but picked up his 28th save. The Cardinals are 2 games behind the Cubs in the NL Central race. Royals 8, Twins 1: The Royals' Alex Gordon hit solo homers (13, 14) in the 2nd and 3rd innings, two of sixteen hits recorded by the Royals. Twins first baseman Garrett Jones went 3-3 in the game, with three of the six hits recorded by the Twins (all singles). Brian Bannister (12-7) allowed one run and six hits in eight innings of work, receiving the win. Boof Bonser (6-12) pitched 1 2 /3 innings, allowing five runs for the loss. Blue Jays 6, Mariners 4: Gregg Zaun (8) and Matt Stairs (18) each hit a two-run homer in the game to put Toronto ahead early. The loss is Seattle's ninth in a row. A.J. Burnett (8-7) got the win, while Jeff Weaver (6-11) left after three innings, allowing five runs for the loss. Casey Janssen recorded his fifth save of the season for the Blue Jays. Seattle (73-62) remains two games back of the Yankees in the AL Wild Card race. Rangers 8, Angels 7: Hank Blalock hit a grand slam in the eighth inning, to take the lead. Wes Littleton (3-1) pitched two hitless innings in relief for the win, while Scot Shields (3-5) got the loss, giving up four runs on the Blalock slam. C.J. Wilson picked up his 10th save. The Angels remained 6.5 games ahead of the Mariners in the AL West race. IGNORE THIS", "edit_actions": [{"type": "D", "before": "Devil Rays 8, Yankees 2: Carlos Pena hit a triple and a three-run homer, as the Devil Rays took two out of three from the Yankees. Jason Hammel (2-4) pitched five innings, allowing one run and five hits for the win, while Andy Pettitte, forced out of the game after Pena's homer, allowed five runs for the loss. The Yankees (76-61) remain 2 games ahead of the Mariners in the AL Wild Card race.", "after": null, "start_char_pos": 12, "end_char_pos": 406}, {"type": "R", "before": "Royals", "after": "Devil Rays", "start_char_pos": 905, "end_char_pos": 911}, {"type": "R", "before": "Twins 1: The Royals' Alex Gordon hit solo homers (13, 14) in the 2nd and 3rd innings, two of sixteen hits recorded by the Royals. Twins first baseman Garrett Jones went 3-3 in the game, with three of the six hits recorded by the Twins (all singles). Brian Bannister (12-7) allowed one run and six hits in eight innings of work, receiving the win. Boof Bonser (6-12) pitched 1 2/3", "after": "Yankees 2: Carlos Pena hit a triple and a three-run homer, as the Devil Rays took two out of three from the Yankees. Jason Hammel (2-4) pitched five", "start_char_pos": 915, "end_char_pos": 1294}, {"type": "D", "before": "five runs for the loss.", "after": null, "start_char_pos": 1313, "end_char_pos": 1336}, {"type": "R", "before": "Blue Jays 6, Mariners 4: Gregg Zaun (8) and Matt Stairs (18) each hit a two-run homer in the game to put Toronto ahead early. A.J. Burnett (8-7) got the", "after": "one run and five hits for the", "start_char_pos": 1337, "end_char_pos": 1489}, {"type": "R", "before": "Jeff Weaver (6-11) left after three innings, allowing", "after": "Andy Pettitte, forced out of the game after Pena's homer, allowed", "start_char_pos": 1501, "end_char_pos": 1554}, {"type": "D", "before": "Casey Janssen recorded his fifth save of the season for the Blue Jays. Seattle (73-62) remains two games back of the Yankees in the AL Wild Card race.", "after": null, "start_char_pos": 1579, "end_char_pos": 1729}, {"type": "R", "before": "Rangers 8, Angels 7: Hank Blalock hit a grand slam in the eighth inning, to take the lead. Wes Littleton (3-1) pitched two hitless innings in relief for the win, while Scot Shields (3-5) got the loss, giving up four runs on the Blalock slam. C.J. Wilson picked up his 10th save. The Angels remained 6.5", "after": "The Yankees (76-61) remain 2", "start_char_pos": 1730, "end_char_pos": 2032}, {"type": "R", "before": "West", "after": "Wild Card", "start_char_pos": 2071, "end_char_pos": 2075}, {"type": "D", "before": "IGNORE THIS", "after": null, "start_char_pos": 2082, "end_char_pos": 2093}, {"type": "R", "before": "Mets 5, Braves 1: The Mets' Carlos Delgado, Lastings Milledge, and Carlos Beltran all hit solo home runs in the win. Mike Pelfrey (1-7) notched his first win of the year", "after": "Mets 3, Braves 2: David Wright hit a two-run homer in the fifth inning, which proved to be the deciding factor in the game. Pitcher Tom Glavine (12-6) pitched six innings", "start_char_pos": 2094, "end_char_pos": 2263}, {"type": "R", "before": "just one hit and one runin six innings of work. Braves starter Chuck James (9-10) gave", "after": "one run and five hits; Glavine was also responsible for the Mets' first run, on a sacrifice fly in the 2nd inning. John Smoltz (12-7) got the loss, giving", "start_char_pos": 2276, "end_char_pos": 2362}, {"type": "R", "before": "en route to the loss. Pedro Feliciano pitched two perfect innings, striking out the last five batters he faced", "after": "in seven innings. Billy Wagner allowed one earned run in the ninth inning, but held on for the save, his 30th of the season", "start_char_pos": 2384, "end_char_pos": 2494}, {"type": "R", "before": "75-60) hold a 3 game lead over", "after": "76-60) are 4 games ahead of", "start_char_pos": 2508, "end_char_pos": 2538}, {"type": "R", "before": "a 6.5 game lead over", "after": "7.5 games ahead of", "start_char_pos": 2557, "end_char_pos": 2577}, {"type": "R", "before": "69-67), in the NL East", "after": "69-68)", "start_char_pos": 2591, "end_char_pos": 2613}, {"type": "R", "before": "12", "after": "7", "start_char_pos": 2624, "end_char_pos": 2626}, {"type": "R", "before": "The Marlins scored seven runs in the first inning, setting the pace for a 12-6 win. Marlins hitters Jeremy Hermida, Mike Jacobs, and Cody Ross each drove in two runs. Byung-Hyun Kim (8-6) pitched five innings and gave up four runs for the win, while Phillies pitcher J.D. Durbin (6-4)didn't record a single out, leaving the game in the first inning after giving up seven runs, all earned. Kevin Gregg", "after": "Cody Ross hit two home runs (9, 10), a two-run homer in the fourth and a solo shot in the sixth. Justin Miller (5-0)", "start_char_pos": 2641, "end_char_pos": 3041}, {"type": "R", "before": "hitless innings for his 27th save. With the Mets' win,", "after": "innings for", "start_char_pos": 3056, "end_char_pos": 3110}, {"type": "R", "before": "Phillies fall to 3 games back", "after": "win, while Kane Davis (0-1) gave up two runs and three hits in the loss. The Phillies are four games back of the Mets", "start_char_pos": 3115, "end_char_pos": 3144}, {"type": "D", "before": "race", "after": null, "start_char_pos": 3160, "end_char_pos": 3164}, {"type": "R", "before": "4, Astros 3: Powered by a 6th inning two-run homer by Aramis Ramirez, his 19th of the season, the Cubs beat the Astros 4-3. Jason Marquis (11-8) pitched 6 2/", "after": "6, Astros 5: The Cubs came back from a 5-1 deficit, led by Derrek Lee, who went 3-4 with a home run and", "start_char_pos": 3172, "end_char_pos": 3329}, {"type": "R", "before": "innings for", "after": "RBI. Matt Murton hit a home run in a pinch-hit at-bat in the 7th inning. Carlos Marmol (5-1) got", "start_char_pos": 3332, "end_char_pos": 3343}, {"type": "R", "before": "while Astros pitcher Troy Patton gave up three runs (two earned) in six innings for the loss. Ryan Dempster gave up a solo", "after": "facing one batter in the eighth inning. Chad Qualls (6-4) got the loss, giving up two runs on the Lee", "start_char_pos": 3353, "end_char_pos": 3475}, {"type": "A", "before": null, "after": "eighth. Ryan Dempster threw a perfect", "start_char_pos": 3492, "end_char_pos": 3492}, {"type": "R", "before": "inning, but held on for his 24th", "after": ", striking out two of the three batters he faced, for his 25th", "start_char_pos": 3497, "end_char_pos": 3529}, {"type": "R", "before": "lead the NL Central by", "after": "are", "start_char_pos": 3545, "end_char_pos": 3567}, {"type": "R", "before": "over the Brewers ,", "after": "ahead of the Brewers", "start_char_pos": 3578, "end_char_pos": 3596}, {"type": "R", "before": "over the Cardinals", "after": "ahead of the Cardinals in the NL Central", "start_char_pos": 3609, "end_char_pos": 3627}, {"type": "R", "before": "12, Pirates 3: Kevin Mench went 3-3, with a single, double and home run, scoring four runs and driving in three, in a decisive win. Dave Bush (11-9) pitched 6 innings, giving up four hits and one earnedrun", "after": "7, Pirates 4: Ryan Braun went 3-4 with a homer and 3 RBI, and Prince Fielder hit his 40th home run of the year, a two-run shot. Jeff Suppan (9-11) gave up four runs (two earned)", "start_char_pos": 3638, "end_char_pos": 3843}, {"type": "R", "before": ". Shane Youman (3-5) pitched just two innings, giving up eight earned runs", "after": ", while Pirates reliever Franquelis Osoria (0-1) gave up three runs in two innings", "start_char_pos": 3856, "end_char_pos": 3930}, {"type": "R", "before": "The Brewers (68-67) stay", "after": "Francisco Cordero picked up his 39th save. The Brewers are", "start_char_pos": 3945, "end_char_pos": 3969}, {"type": "D", "before": "race", "after": null, "start_char_pos": 4014, "end_char_pos": 4018}, {"type": "R", "before": "11, Reds 3", "after": "3, Reds 2", "start_char_pos": 4031, "end_char_pos": 4041}, {"type": "R", "before": "went 3-4 with a double, two runs and three RBI. Adam Wainwright pitched 5", "after": "hit a solo home run in the sixth inning, and drove in the winning run on a sacrifice fly in the seventh. Braden Looper (12-10) pitched seven scoreless innings, giving up four hits. Bronson Arroyo (7-14) gave up three runs and eight hits in 6 1/3 innings for the loss. Jason Isringhausen gave up a run in the ninth on a sacrifice fly, but picked up his 28th save. The Cardinals are", "start_char_pos": 4067, "end_char_pos": 4140}, {"type": "A", "before": null, "after": "games behind the Cubs in the NL Central race.", "start_char_pos": 4143, "end_char_pos": 4143}, {"type": "A", "before": null, "after": "Royals 8, Twins 1: The Royals' Alex Gordon hit solo homers (13, 14) in the 2nd and 3rd innings, two of sixteen hits recorded by the Royals. Twins first baseman Garrett Jones went 3-3 in the game, with three of the six hits recorded by the Twins (all singles). Brian Bannister (12-7) allowed one run and six hits in eight innings of work, receiving the win. Boof Bonser (6-12) pitched 1 2", "start_char_pos": 4144, "end_char_pos": 4144}, {"type": "R", "before": "two runs (one earned) for the", "after": "five runs for the loss.", "start_char_pos": 4166, "end_char_pos": 4195}, {"type": "A", "before": null, "after": "Blue Jays 6, Mariners 4: Gregg Zaun (8) and Matt Stairs (18) each hit a two-run homer in the game to put Toronto ahead early. The loss is Seattle's ninth in a row. A.J. Burnett (8-7) got the", "start_char_pos": 4196, "end_char_pos": 4196}, {"type": "R", "before": "Reds' Phil Dumatrait pitched 4 2/3 innings, giving up seven runs (five earned) for the loss. The Cardinals improve to 66-66, and are two games back in the NL Central race.", "after": "Jeff Weaver (6-11) left after three innings, allowing five runs for the loss. Casey Janssen recorded his fifth save of the season for the Blue Jays. Seattle (73-62) remains two games back of the Yankees in the AL Wild Card race.", "start_char_pos": 4208, "end_char_pos": 4379}, {"type": "A", "before": null, "after": "Rangers 8, Angels 7: Hank Blalock hit a grand slam in the eighth inning, to take the lead. Wes Littleton (3-1) pitched two hitless innings in relief for the win, while Scot Shields (3-5) got the loss, giving up four runs on the Blalock slam. C.J. Wilson picked up his 10th save. The Angels remained 6.5 games ahead of the Mariners in the AL West race.", "start_char_pos": 4380, "end_char_pos": 4380}, {"type": "A", "before": null, "after": "IGNORE THIS", "start_char_pos": 4381, "end_char_pos": 4381}], "sents_char_pos": [0, 142, 323, 406, 463, 564, 658, 807, 904, 1044, 1164, 1261, 1336, 1462, 1578, 1649, 1729, 1820, 1971, 2008, 2081, 2210, 2323, 2405, 2496, 2615, 2724, 2807, 3029, 3090, 3446, 3535, 3769, 3944, 4114, 4300]}
+{"doc_id": "78824", "revision_depth": "1", "before_revision": "Updated 11:50 p.m. EST. Completed games Red Sox 5, Blue Jays 3: Jacoby Ellsbury finished a double shy of the cycle, hitting a two-run homer (2) and a triple (1). Matt Stairs hit a three-run homer in the fifth for the Blue Jays, their only scoring. Josh Beckett (17-6) pitched eight innings, allowing five hits and three runs. He becomes the first major leaguer this year to hit 17 wins. Roy Halladay pitched eight innings as well, allowing nine hits and five runs for the loss. Jonathan Papelbon picked up his 33rd save. The Red Sox stay 7 games up on the Yankees in the AL East. White Sox 3, Tigers 1: The Tigers brought the winning run to the plate in the 9th inning, but Curtis Granderson struck out to end the game. For the White Sox, Josh Fields hit a solo homer, and Alex Cintron hit a two-run homer for the White Sox. Carlos Guillen hit an RBI single for the Tigers in the 6th. Jon Garland (9-10) pitched seven strong innings, giving up one run for the win. Jeremy Bonderman (11-8) pitched 5 1/3 innings, giving up three runs for a loss. Bobby Jenks held off the Tigers threat for his 37th save. Detroit now stands 6.5 games behind the Indians in the AL Central, and 3.5 games behind the Yankees in the AL Wild Card. Mets 11, Reds 7: Paul Lo Duca racked up 7 RBI, hitting two three-run homers (6, 7) and an RBI single for the Mets. Oliver Perez (13-9) pitched a wild five innings for the Mets, giving up five runs (three earned), but allowing five walks. Bill Bray (3-2) got the loss, allowing three runs without retiring a single batter. The Mets retain a five game lead in the NL East over the Phillies. Dodgers 6, Cubs 2: Three RBI singlesround out the scoring for the Dodgers . Cardinals 6, Pirates 2: Chris Duncan hit a three-run double for the Cardinals in the 3rd inning. Rockies 6, Giants 5: Randy Winn hit a three-run homer for the Giants in the 3rd inning . Games in progress Top 11th: Twins 5, Indians 5: Justin Morneau hit a bases-loaded three-run double in the third for the Twins. Bot 6th: Diamondbacks 6, Padres 1:%DIFDELCMD < %DIFDELCMD < %%% Top 5th: Athletics 2, Angels 2:", "after_revision": "Updated 12:45 p.m. EST. Other games Red Sox 5, Blue Jays 3: Jacoby Ellsbury finished a double shy of the cycle, hitting a two-run homer (2) and a triple (1). Matt Stairs hit a three-run homer in the fifth for the Blue Jays, their only scoring. Josh Beckett (17-6) pitched eight innings, allowing five hits and three runs. He becomes the first major leaguer this year to hit 17 wins. Roy Halladay pitched eight innings as well, allowing nine hits and five runs for the loss. Jonathan Papelbon picked up his 33rd save. The Red Sox stay 7 games up on the Yankees in the AL East. Indians 7, Twins 5, 11 inn: Travis Hafner had 4 RBI and hit two home runs, including the two-run game-tying home run in the 9th inning, then drove in the game winning run on a sacrifice fly in the 11th inning. Rafael Betancourt pitched two scoreless innings for the win, while Julio DePaulo gave up two runs in one inning of work for the loss. Joe Borowski pitched the bottom of the 11th for his 40th save of the year. The Indians extend their lead in the AL Central to 7 games. White Sox 3, Tigers 1: The Tigers brought the winning run to the plate in the 9th inning, but Curtis Granderson struck out to end the game. For the White Sox, Josh Fields hit a solo homer, and Alex Cintron hit a two-run homer for the White Sox. Carlos Guillen hit an RBI single for the Tigers in the 6th. Jon Garland (9-10) pitched seven strong innings, giving up one run for the win. Jeremy Bonderman (11-8) pitched 5 1/3 innings, giving up three runs for a loss. Bobby Jenks held off the Tigers threat for his 37th save. Detroit now stands 7 games behind the Indians in the AL Central, and 3.5 games behind the Yankees in the AL Wild Card. Diamondbacks 9, Padres 1: Eric Byrnes hit a three-run homer as the Diamondbacks climbed back into a virtual tie with the Padres in the NL West standings. Doug Davis (13-11) pitched 7 innings, allowing one run for the win. Chris Young gave up five runs in four innings for the loss. Mets 11, Reds 7: Paul Lo Duca racked up 7 RBI, hitting two three-run homers (6, 7) and an RBI single for the Mets. Oliver Perez (13-9) pitched a wild five innings for the Mets, giving up five runs (three earned), but allowing five walks. Bill Bray (3-2) got the loss, allowing three runs without retiring a single batter. The Mets retain a five game lead in the NL East over the Phillies. Dodgers 6, Cubs 2: Juan Pierre hit two RBI singles, the latter a bunt single. Brad Penny (15-4) pitched seven innings, allowing two runs (one earned) for the win, while Steve Trachsel (0-1) gave up seven hits and three runs in six innings for the loss. The Cubs' lead in the NL Central is down to a half-game, while the Dodgers are 3 games out of first in the NL West . Cardinals 6, Pirates 2: Chris Duncan hit a three-run double for the Cardinals to break a 2-2 tie in the 3rd inning. Joel Pineiro (4-2) pitched 5 2/3 innings, allowing two runs for the victory. Matt Morris (8-9) allowed five runs and five hits in 5 innings for the loss. Ryan Franklin picked up his first save of the year, pitching 1 1/3 hitless innings. The Cardinals are 1 game back of the Cubs in the NL Central race. Rockies 6, Giants 5: Down 5-4, the Rockies scored one run in the 8th inning and one run in the 9th inning. Brad Hawpe had 2 RBI, including the RBI single that won the game. Manny Corpas (4-2) pitched one perfect inning for the win, while Brad Hennessey (2-4) allowed one run and two hits for the loss. Games in progress %DIFDELCMD < %DIFDELCMD < %%% Top 9th: Angels 4, Athletics 3: Garret Anderson (14) and Howie Kendrick (5) each hit two run homers for the Angels, while Shannon Stewart drove in all three Athletics runs, with a 1st inning solo homer (12), a 2nd inning groundout, and a 9th inning double.", "edit_actions": [{"type": "R", "before": "11:50", "after": "12:45", "start_char_pos": 8, "end_char_pos": 13}, {"type": "R", "before": "Completed", "after": "Other", "start_char_pos": 24, "end_char_pos": 33}, {"type": "A", "before": null, "after": "Indians 7, Twins 5, 11 inn: Travis Hafner had 4 RBI and hit two home runs, including the two-run game-tying home run in the 9th inning, then drove in the game winning run on a sacrifice fly in the 11th inning. Rafael Betancourt pitched two scoreless innings for the win, while Julio DePaulo gave up two runs in one inning of work for the loss. Joe Borowski pitched the bottom of the 11th for his 40th save of the year. The Indians extend their lead in the AL Central to 7 games.", "start_char_pos": 580, "end_char_pos": 580}, {"type": "R", "before": "6.5", "after": "7", "start_char_pos": 1123, "end_char_pos": 1126}, {"type": "A", "before": null, "after": "Diamondbacks 9, Padres 1: Eric Byrnes hit a three-run homer as the Diamondbacks climbed back into a virtual tie with the Padres in the NL West standings. Doug Davis (13-11) pitched 7 innings, allowing one run for the win. Chris Young gave up five runs in four innings for the loss.", "start_char_pos": 1225, "end_char_pos": 1225}, {"type": "R", "before": "Three RBI singlesround out the scoring for the Dodgers", "after": "Juan Pierre hit two RBI singles, the latter a bunt single. Brad Penny (15-4) pitched seven innings, allowing two runs (one earned) for the win, while Steve Trachsel (0-1) gave up seven hits and three runs in six innings for the loss. The Cubs' lead in the NL Central is down to a half-game, while the Dodgers are 3 games out of first in the NL West", "start_char_pos": 1634, "end_char_pos": 1688}, {"type": "A", "before": null, "after": "to break a 2-2 tie", "start_char_pos": 1769, "end_char_pos": 1769}, {"type": "A", "before": null, "after": "Joel Pineiro (4-2) pitched 5 2/3 innings, allowing two runs for the victory. Matt Morris (8-9) allowed five runs and five hits in 5 innings for the loss. Ryan Franklin picked up his first save of the year, pitching 1 1/3 hitless innings. The Cardinals are 1 game back of the Cubs in the NL Central race.", "start_char_pos": 1789, "end_char_pos": 1789}, {"type": "R", "before": "Randy Winn hit a three-run homer for the Giants in the 3rd inning .", "after": "Down 5-4, the Rockies scored one run in the 8th inning and one run in the 9th inning. Brad Hawpe had 2 RBI, including the RBI single that won the game. Manny Corpas (4-2) pitched one perfect inning for the win, while Brad Hennessey (2-4) allowed one run and two hits for the loss.", "start_char_pos": 1811, "end_char_pos": 1878}, {"type": "D", "before": "Top 11th: Twins 5, Indians 5: Justin Morneau hit a bases-loaded three-run double in the third for the Twins.", "after": null, "start_char_pos": 1897, "end_char_pos": 2005}, {"type": "D", "before": "Bot 6th: Diamondbacks 6, Padres 1:", "after": null, "start_char_pos": 2006, "end_char_pos": 2040}, {"type": "R", "before": "Top 5th: Athletics 2,", "after": "Top 9th:", "start_char_pos": 2070, "end_char_pos": 2091}, {"type": "R", "before": "2:", "after": "4, Athletics 3: Garret Anderson (14) and Howie Kendrick (5) each hit two run homers for the Angels, while Shannon Stewart drove in all three Athletics runs, with a 1st inning solo homer (12), a 2nd inning groundout, and a 9th inning double.", "start_char_pos": 2099, "end_char_pos": 2101}], "sents_char_pos": [0, 161, 247, 325, 386, 477, 520, 579, 720, 885, 965, 1045, 1103, 1224, 1340, 1463, 1547, 1614, 1788, 2005]}
+{"doc_id": "79475", "revision_depth": "1", "before_revision": "Updated: 9:07 p.m. ET. Completed games Game 1: Rangers 13, Tigers 6: The Rangers hit seven homers en route to a 13-6 rout of the Tigers in the first game of a double-header. David Murphy hit a solo homer (2), an RBI triple (2), and a double. Marlon Byrd hit a two-run homer and a solo homer (8, 9), and Jarrod Saltalamacchia (7), Ramon Vazquez (8), Hank Blalock (8), and Freddy Guzman (1) each hit homers as well. Vicente Padilla (6-9) pitched six scoreless innings, allowing just three hits for the win. Chad Durbin (8-7) pitched 2 2/3 innings, allowing five runs (four earned) for the loss. Games in progress Game 2: Final: Tigers 4, Rangers 1: The Tigers scored three in the first and one in the second; Curtis Granderson scored a run and stole two bases. The Rangers' only run came off a Marlon Byrd sacrifice fly in the first. Rangers starter Brandon McCarthy left the game after just 2/3 inning, giving up three hits and three runs . Top 6th: Angels 6, Orioles 4 : The Angels' Vladimir Guerrero hit a two-run homer, and Chone Figgins hit two RBIdoubles in the game . Top 5th: Devil Rays 8, Red Sox 5 : Carlos Pena hit a three-run homer to give the Rays an 8-1 lead, but the Red Sox scored four runs in the 4th. Bot 6th: Rockies 6, Phillies 0 : Troy Tulowitzki (21), Todd Helton (13), and Matt Holliday (28) each hit homers in the game. Top 7th: Brewers 4, Pirates 0 Bot 5th: Nationals 7, Marlins 6 Bot 5th: Yankees 8 , Blue Jays 2 Top 7th: Reds 7, Cardinals 2 Bot 5th: Braves 10, Mets 3 Top 3rd: Cubs 4 , Astros 1 Bot 3rd: Royals 2, Twins 1 Top 3rd: Indians 1, White Sox 1 Later tonight Athletics at Mariners, 10: 05 ET. Padres at Dodgers, 10:10 ET. Diamondbacks at Giants, 10:15 ET.", "after_revision": "Updated: 12:56 p.m. ET. Completed games Tigers/Rangers split doubleheader Game 1: Rangers 13, Tigers 6: The Rangers hit seven homers en route to a 13-6 rout of the Tigers in the first game of a double-header. David Murphy hit a solo homer (2), an RBI triple (2), and a double. Marlon Byrd hit a two-run homer and a solo homer (8, 9), and Jarrod Saltalamacchia (7), Ramon Vazquez (8), Hank Blalock (8), and Freddy Guzman (1) each hit homers as well. Vicente Padilla (6-9) pitched six scoreless innings, allowing just three hits for the win. Chad Durbin (8-7) pitched 2 2/3 innings, allowing five runs (four earned) for the loss. Game 2: Final: Tigers 4, Rangers 1: The Tigers scored three in the first and one in the second; Curtis Granderson scored a run and stole two bases. The Rangers' only run came off a Marlon Byrd sacrifice fly in the first. Jair Jurrjens (2-1) pitched five innings, giving up three hits and one run. Rangers starter Brandon McCarthy (5-9) left the game after just 2/3 inning, giving up three hits and three runs for the loss. Todd Jones picked up his 34th save. The Tigers trail the Indians by 6.5 games in the AL Central race, and trail the Yankees by 4 games in the AL Wild Card race. Other games Angels 10, Orioles 5 : The Angels' Vladimir Guerrero hit 2 two-run homers (23, 24), and Chone Figgins had three RBI, off two doubles and a bases-loaded walk. Joe Saunders (8-3) gave up ten hits and four runs in five innings for the win. The Orioles' Victor Santos (0-1) gave up five runs in 2 2/3 innings for the loss. The Angels lead the AL West by 9 games, pending the completion of the Oakland-Seattle game in progress . Red Sox 16, Devil Rays 10 : Carlos Pena hit a three-run homer to give the Rays an 8-1 lead, but the Red Sox scored four runs in the 4th. Rockies 8, Phillies 2 : Troy Tulowitzki (21), Todd Helton (13), and Matt Holliday (28) each hit homers in the game. Brewers 6, Pirates 1 Marlins 13, Nationals 8 Yankees 9 , Blue Jays 2 Reds 7, Cardinals 2 Braves 13, Mets 5 Astros 5, Cubs 4 Twins 6, Royals 3 Indians 8 , White Sox 3 Giants 2, Diamondbacks 1 Games in progress Top 8th: Athletics 7, Mariners 4 Top 9th: Padres 9, Dodgers 3", "edit_actions": [{"type": "R", "before": "9:07", "after": "12:56", "start_char_pos": 9, "end_char_pos": 13}, {"type": "A", "before": null, "after": "Tigers/Rangers split doubleheader", "start_char_pos": 39, "end_char_pos": 39}, {"type": "D", "before": "Games in progress", "after": null, "start_char_pos": 594, "end_char_pos": 611}, {"type": "A", "before": null, "after": "Jair Jurrjens (2-1) pitched five innings, giving up three hits and one run.", "start_char_pos": 833, "end_char_pos": 833}, {"type": "A", "before": null, "after": "(5-9)", "start_char_pos": 867, "end_char_pos": 867}, {"type": "D", "before": ".", "after": null, "start_char_pos": 941, "end_char_pos": 942}, {"type": "R", "before": "Top 6th: Angels 6, Orioles", "after": "for the loss. Todd Jones picked up his 34th save. The Tigers trail the Indians by 6.5 games in the AL Central race, and trail the Yankees by", "start_char_pos": 943, "end_char_pos": 969}, {"type": "A", "before": null, "after": "games in the AL Wild Card race.", "start_char_pos": 972, "end_char_pos": 972}, {"type": "A", "before": null, "after": "Other games Angels 10, Orioles 5", "start_char_pos": 973, "end_char_pos": 973}, {"type": "R", "before": "a", "after": "2", "start_char_pos": 1010, "end_char_pos": 1011}, {"type": "R", "before": "homer,", "after": "homers (23, 24),", "start_char_pos": 1020, "end_char_pos": 1026}, {"type": "R", "before": "hit two RBIdoubles in the game", "after": "had three RBI, off two doubles and a bases-loaded walk. Joe Saunders (8-3) gave up ten hits and four runs in five innings for the win. The Orioles' Victor Santos (0-1) gave up five runs in 2 2/3 innings for the loss. The Angels lead the AL West by 9 games, pending the completion of the Oakland-Seattle game in progress", "start_char_pos": 1045, "end_char_pos": 1075}, {"type": "R", "before": "Top 5th: Devil Rays 8, Red Sox 5", "after": "Red Sox 16, Devil Rays 10", "start_char_pos": 1078, "end_char_pos": 1110}, {"type": "R", "before": "Bot 6th: Rockies 6, Phillies 0", "after": "Rockies 8, Phillies 2", "start_char_pos": 1222, "end_char_pos": 1252}, {"type": "R", "before": "Top 7th: Brewers 4, Pirates 0 Bot 5th: Nationals 7, Marlins 6 Bot 5th: Yankees", "after": "Brewers 6, Pirates 1 Marlins 13, Nationals", "start_char_pos": 1347, "end_char_pos": 1425}, {"type": "A", "before": null, "after": "Yankees 9", "start_char_pos": 1428, "end_char_pos": 1428}, {"type": "D", "before": "Top 7th:", "after": null, "start_char_pos": 1443, "end_char_pos": 1451}, {"type": "R", "before": "Bot 5th: Braves 10, Mets 3 Top 3rd:", "after": "Braves 13, Mets 5 Astros 5,", "start_char_pos": 1472, "end_char_pos": 1507}, {"type": "A", "before": null, "after": "Twins 6, Royals 3 Indians 8", "start_char_pos": 1515, "end_char_pos": 1515}, {"type": "D", "before": "Astros 1 Bot 3rd: Royals 2, Twins 1 Top 3rd: Indians 1,", "after": null, "start_char_pos": 1518, "end_char_pos": 1573}, {"type": "A", "before": null, "after": "3 Giants 2, Diamondbacks", "start_char_pos": 1584, "end_char_pos": 1584}, {"type": "R", "before": "Later tonight Athletics at Mariners, 10: 05 ET. Padres at Dodgers, 10:10 ET. Diamondbacks at Giants, 10:15 ET.", "after": "Games in progress Top 8th: Athletics 7, Mariners 4 Top 9th: Padres 9, Dodgers 3", "start_char_pos": 1587, "end_char_pos": 1697}], "sents_char_pos": [0, 22, 174, 242, 414, 505, 593, 707, 759, 832, 942, 1077, 1221, 1346, 1634, 1663]}
+{"doc_id": "79475", "revision_depth": "2", "before_revision": "Updated: 12:56 p.m. ET. Completed games Game 2: Final: Tigers 4, Rangers 1: The Tigers scored three in the first and one in the second; Curtis Granderson scored a run and stole two bases. The Rangers' only run came off a Marlon Byrd sacrifice fly in the first. Jair Jurrjens (2-1) pitched five innings, giving up three hits and one run. Rangers starter Brandon McCarthy (5-9) left the game after just 2/3 inning, giving up three hits and three runs for the loss. Todd Jones picked up his 34th save. The Tigers trail the Indians by 6.5 games in the AL Central race, and trail the Yankees by 4 games in the AL Wild Card race. Other games Angels 10, Orioles 5: The Angels' Vladimir Guerrero hit 2 two-run homers (23, 24), and Chone Figgins had three RBI, off two doubles and a bases-loaded walk. Joe Saunders (8-3) gave up ten hits and four runs in five innings for the win. The Orioles' Victor Santos (0-1) gave up five runs in 2 2/3 innings for the loss. The Angels lead the AL West by 9 games, pending the completion of the Oakland-Seattle game in progress . Red Sox 16, Devil Rays 10: Carlos Pena hit a three-run homer to give the Rays an 8-1 lead , but the Red Sox scored four runs in the 4th . Brewers 6, Pirates 1 Marlins 13, Nationals 8 Yankees 9, Blue Jays 2 Reds 7, Cardinals 2 Braves 13, Mets 5 Astros 5, Cubs 4 Twins 6, Royals 3 Indians 8, White Sox 3 Giants 2, Diamondbacks 1 Games in progress Top 8th: Athletics 7, Mariners 4 Top 9th: Padres 9, Dodgers 3", "after_revision": "Updated: 1:28 p.m. ET. Red Sox come back from seven-run deficit, win by 6 Red Sox 16, Devil Rays 10: Carlos Pena hit a three-run homer in the 4th inning to give the Rays an 8-1 lead, but the Red Sox scored fifteen runs in four innings to take a commanding lead of their own, one that they would not give up. The Sox were led by Kevin Youkilis, who hit a bases-loaded 3-run triple in the 6th, breaking a 9-9 tie. Bryan Corey (1-0) pitched a hitless 6th inning for the win, while Jon Switzer (0-1) pitched 1/3 inning, giving up two runs for the loss. The Red Sox (88-58) lead the Yankees by 5 games in the AL East. Game 2: Final: Tigers 4, Rangers 1: The Tigers scored three in the first and one in the second; Curtis Granderson scored a run and stole two bases. The Rangers' only run came off a Marlon Byrd sacrifice fly in the first. Jair Jurrjens (2-1) pitched five innings, giving up three hits and one run. Rangers starter Brandon McCarthy (5-9) left the game after just 2/3 inning, giving up three hits and three runs for the loss. Todd Jones picked up his 34th save. The Tigers (79-67) trail the Indians by 6.5 games in the AL Central race, and trail the Yankees by 4 games in the AL Wild Card race. Other games Yankees 9, Blue Jays 2: Jason Giambi hit a grand slam (13), and scored on a Johnny Damon RBI single. Phil Hughes (3-3) pitched six innings, giving up three hits and two runs (one earned) for the win. Shawn Marcum (12-6) gave up eight runs in 4 1/3 innings for the loss. The Yankees (82-62) trail the Red Sox by 5 games in the AL East, but lead the Tigers by 4 games in the AL Wild Card. Indians 8, White Sox 3: Travis Hafner drove in three runs off a two-run single and an RBI single, and Ryan Garko hit a solo homer, and drove in a run off a bases-loaded walk. Juan Uribe hit two homers (17, 18) and drove in all three runs for the White Sox. Paul Byrd (15-6) pitched 6 1/3 innings, giving up six hits and three runs for the win, while Lance Broadway (0-1) pitched 2 2/3 innings, giving up two hits and one run for the loss. The Indians lead the Tigers by 6.5 games in the AL Central. Athletics 7, Mariners 4: Mike Piazza went 3-5, with two doubles and two RBI, driving in the go-ahead runs in the win. Ruddy Lugo (6-0) pitched 1 1/3 innings, giving up two hits for the win. Jarrod Washburn (9-14) pitched 5 2/3 innings, giving up eight hits and six runs for the loss. Huston Street pitched a scoreless 9th for his 14th save. The Mariners trail the Yankees in the AL Wild Card race by 6.5 games. Brewers 6, Pirates 1: Ryan Braun drove in three runs off a two-run single and an RBI single. Yovani Gallardo (8-4) pitched six scoreless innings, giving up six hits for the win. Bryan Bullington (0-2) pitched five innings, giving up seven hits and three runs for the loss. The Brewers (74-70) lead the NL Central over the Cubs by 1 game. Astros 5, Cubs 4, 11 inn.: Hunter Pence hit a two-run triple, and Luke Scott hit a walkoff RBI triple in the 11th for the Astros. Mark DeRosa hit a three-run homer (9) in the loss. Brad Lidge (4-2) picked up the win, pitching two innings and giving up one hit. Ryan Dempster (2-6) gave up one hit and one run in 1 1/3 innings for the loss. The Cubs (73-71) trail the Brewers by 1 game in the NL Central. Reds 7, Cardinals 2: Adam Dunn hit a solo homer in the 2nd, and a grand slam in the 3rd (37, 38), as the Reds scored six runs in the 3rd inning. Matt Belisle (8-8) pitched seven innings, giving up six hits and two runs for the win. Mark Mulder pitched four innings, giving up seven hits and seven runs (five earned) for the loss. The Cardinals (69-73) have lost five games in a row, and trail the Brewers by 4 games in the NL Central. Angels 10, Orioles 5: The Angels' Vladimir Guerrero hit 2 two-run homers (23, 24), and Chone Figgins had three RBI, off two doubles and a bases-loaded walk. Joe Saunders (8-3) gave up ten hits and four runs in five innings for the win. The Orioles' Victor Santos (0-1) gave up five runs in 2 2/3 innings for the loss. The Angels (85-59) lead the AL West by 9.5 games . Braves 13, Mets 5: The Braves' Mark Teixeira hit a three-run homer (12) to cap a six-run 4th inning. Peter Moylan (5-3) pitched 1 2/3 innings without giving up a hit for the win, while Orlando Hernandez (9-5) gave up six hits and eight runs for the loss. The Mets (82-62) lead the Phillies in the NL East by 6 games, and lead the Braves (74-71) by 8.5 games. The Braves trail the Padres by 5 games in the NL Wild Card race . Giants 2, Diamondbacks 1 Padres 9, Dodgers 4 Twins 6, Royals 3 Marlins 13, Nationals 8", "edit_actions": [{"type": "R", "before": "12:56", "after": "1:28", "start_char_pos": 9, "end_char_pos": 14}, {"type": "R", "before": "Completed games", "after": "Red Sox come back from seven-run deficit, win by 6 Red Sox 16, Devil Rays 10: Carlos Pena hit a three-run homer in the 4th inning to give the Rays an 8-1 lead, but the Red Sox scored fifteen runs in four innings to take a commanding lead of their own, one that they would not give up. The Sox were led by Kevin Youkilis, who hit a bases-loaded 3-run triple in the 6th, breaking a 9-9 tie. Bryan Corey (1-0) pitched a hitless 6th inning for the win, while Jon Switzer (0-1) pitched 1/3 inning, giving up two runs for the loss. The Red Sox (88-58) lead the Yankees by 5 games in the AL East.", "start_char_pos": 24, "end_char_pos": 39}, {"type": "A", "before": null, "after": "(79-67)", "start_char_pos": 510, "end_char_pos": 510}, {"type": "A", "before": null, "after": "Yankees 9, Blue Jays 2: Jason Giambi hit a grand slam (13), and scored on a Johnny Damon RBI single. Phil Hughes (3-3) pitched six innings, giving up three hits and two runs (one earned) for the win. Shawn Marcum (12-6) gave up eight runs in 4 1/3 innings for the loss. The Yankees (82-62) trail the Red Sox by 5 games in the AL East, but lead the Tigers by 4 games in the AL Wild Card.", "start_char_pos": 637, "end_char_pos": 637}, {"type": "A", "before": null, "after": "Indians 8, White Sox 3: Travis Hafner drove in three runs off a two-run single and an RBI single, and Ryan Garko hit a solo homer, and drove in a run off a bases-loaded walk. Juan Uribe hit two homers (17, 18) and drove in all three runs for the White Sox. Paul Byrd (15-6) pitched 6 1/3 innings, giving up six hits and three runs for the win, while Lance Broadway (0-1) pitched 2 2/3 innings, giving up two hits and one run for the loss. The Indians lead the Tigers by 6.5 games in the AL Central.", "start_char_pos": 638, "end_char_pos": 638}, {"type": "A", "before": null, "after": "Athletics 7, Mariners 4: Mike Piazza went 3-5, with two doubles and two RBI, driving in the go-ahead runs in the win. Ruddy Lugo (6-0) pitched 1 1/3 innings, giving up two hits for the win. Jarrod Washburn (9-14) pitched 5 2/3 innings, giving up eight hits and six runs for the loss. Huston Street pitched a scoreless 9th for his 14th save. The Mariners trail the Yankees in the AL Wild Card race by 6.5 games.", "start_char_pos": 639, "end_char_pos": 639}, {"type": "A", "before": null, "after": "Brewers 6, Pirates 1: Ryan Braun drove in three runs off a two-run single and an RBI single. Yovani Gallardo (8-4) pitched six scoreless innings, giving up six hits for the win. Bryan Bullington (0-2) pitched five innings, giving up seven hits and three runs for the loss. The Brewers (74-70) lead the NL Central over the Cubs by 1 game.", "start_char_pos": 640, "end_char_pos": 640}, {"type": "A", "before": null, "after": "Astros 5, Cubs 4, 11 inn.: Hunter Pence hit a two-run triple, and Luke Scott hit a walkoff RBI triple in the 11th for the Astros. Mark DeRosa hit a three-run homer (9) in the loss. Brad Lidge (4-2) picked up the win, pitching two innings and giving up one hit. Ryan Dempster (2-6) gave up one hit and one run in 1 1/3 innings for the loss. The Cubs (73-71) trail the Brewers by 1 game in the NL Central.", "start_char_pos": 641, "end_char_pos": 641}, {"type": "A", "before": null, "after": "Reds 7, Cardinals 2: Adam Dunn hit a solo homer in the 2nd, and a grand slam in the 3rd (37, 38), as the Reds scored six runs in the 3rd inning. Matt Belisle (8-8) pitched seven innings, giving up six hits and two runs for the win. Mark Mulder pitched four innings, giving up seven hits and seven runs (five earned) for the loss. The Cardinals (69-73) have lost five games in a row, and trail the Brewers by 4 games in the NL Central.", "start_char_pos": 642, "end_char_pos": 642}, {"type": "A", "before": null, "after": "(85-59)", "start_char_pos": 972, "end_char_pos": 972}, {"type": "R", "before": "9 games, pending the completion of the Oakland-Seattle game in progress", "after": "9.5 games", "start_char_pos": 993, "end_char_pos": 1064}, {"type": "R", "before": "Red Sox 16, Devil Rays 10: Carlos Pena", "after": "Braves 13, Mets 5: The Braves' Mark Teixeira", "start_char_pos": 1067, "end_char_pos": 1105}, {"type": "R", "before": "to give the Rays an 8-1 lead , but the Red Sox scored four runs in the", "after": "(12) to cap a six-run", "start_char_pos": 1128, "end_char_pos": 1198}, {"type": "A", "before": null, "after": "inning. Peter Moylan (5-3) pitched 1 2/3 innings without giving up a hit for the win, while Orlando Hernandez (9-5) gave up six hits and eight runs for the loss. The Mets (82-62) lead the Phillies in the NL East by 6 games, and lead the Braves (74-71) by 8.5 games. The Braves trail the Padres by 5 games in the NL Wild Card race", "start_char_pos": 1203, "end_char_pos": 1203}, {"type": "R", "before": "Brewers 6, Pirates", "after": "Giants 2, Diamondbacks", "start_char_pos": 1206, "end_char_pos": 1224}, {"type": "R", "before": "Marlins 13, Nationals 8 Yankees", "after": "Padres", "start_char_pos": 1227, "end_char_pos": 1258}, {"type": "R", "before": "Blue Jays 2 Reds 7, Cardinals 2 Braves 13, Mets 5 Astros 5, Cubs", "after": "Dodgers", "start_char_pos": 1262, "end_char_pos": 1326}, {"type": "D", "before": "Indians 8, White Sox 3 Giants 2, Diamondbacks 1", "after": null, "start_char_pos": 1347, "end_char_pos": 1394}, {"type": "R", "before": "Games in progress Top 8th: Athletics 7, Mariners 4 Top 9th: Padres 9, Dodgers 3", "after": "Marlins 13, Nationals 8", "start_char_pos": 1395, "end_char_pos": 1474}], "sents_char_pos": [0, 23, 135, 187, 260, 336, 462, 498, 624, 799, 878, 960, 1093]}
+{"doc_id": "79609", "revision_depth": "1", "before_revision": "Updated: 1: 02 a.m. ET. Completed games Angels 18, Orioles 6: Garret Anderson went 3-6 with 5 RBI, including a two-run homer (16), a bases-loaded double, and an RBI single. Kelvim Escobar pitched 5 1/3 innings, and gave up six runs, but got the win. Daniel Cabrera (9-16) pitched 4 1/3 innings, giving up ten runs (eight earned) for the loss. Pirates 7, Brewers 4: After losing a 4-0 lead, the Pirates scored three in the 8th inning to win, 7-4. John Grabow (3-1) got the win, while Derrick Turnbow (4-5) gave up three runs in 2/3 inning for the loss. Matt Capps pitched a perfect 9th for the save. Cubs 3, Astros 2: Cliff Floyd hit a solo homer (6), and Ryan Theriot hit a sacrifice fly in the 2nd for the Cubs; the Astros threatened to tie the game, with the tying run at third base with nobody out, but failed to bring the runner home. Rich Hill (9-8 ) pitched seven innings, giving up just three hits and one run for the win. Matt Albers (4-8) gave up seven hits and three runs in six innings for the loss. Ryan Dempster gave a shaky performance, but earned his 26th save, giving up two hits and one run in the 9th. Reds 5, Cardinals 1: The Cardinals lost their sixth straight game, dropping from the midst of the NL Central race to a distant 4 games behind the Brewers and Cubs. Brandon Phillips hit a solo homer (29) , and Edwin Encarnacion hit a two-run homer (13) in the 4th. Bronson Arroyo (9-14 ) pitched six innings, giving up six hits and one run for the win. Anthony Reyes (2-14) pitched 2 1/3 innings, giving up four hits and three runs for the loss. Diamondbacks 9, Giants 4: Red Sox 5, Devil Rays 4: B.J. Upton hit a two-run homer (24) in a four-run 1st inning for the Devil Rays, but David Ortiz hit two homers (30, 31), the first a three-run homer in the 3rd, and the second a two-run, walkoff homer in the 9th. Jonathan Papelbon (1-2) pitched the 9th inning for the win, while Al Reyes (2-3) picked up his third blown save of the year. Games in progress Top 8th: Athletics 5, Mariners 4 Top 9th: Dodgers 6, Padres 1", "after_revision": "Updated: 1: 10 a.m. ET. Cubs win, Brewers lose: Tied again in the NL Central Cubs 3, Astros 2: Cliff Floyd hit a solo homer (6), and Ryan Theriot hit a sacrifice fly in the 2nd for the Cubs; the Astros threatened to tie the game, with the tying run at third base with nobody out, but failed to bring the runner home. Rich Hill (9-8) pitched seven innings, giving up just three hits and one run for the win. Matt Albers (4-8) gave up seven hits and three runs in six innings for the loss. Ryan Dempster gave a shaky performance, but earned his 26th save, giving up two hits and one run in the 9th. Pirates 7, Brewers 4: After losing a 4-0 lead, the Pirates scored three in the 8th inning to win, 7-4. John Grabow (3-1) got the win, while Derrick Turnbow (4-5) gave up three runs in 2/3 inning for the loss. Matt Capps pitched a perfect 9th for the save. Completed games Reds 5, Cardinals 1: The Cardinals lost their sixth straight game, dropping from the midst of the NL Central race to a distant 4 games behind the Brewers and Cubs. Brandon Phillips hit a solo homer (29), and Edwin Encarnacion hit a two-run homer (13) in the 4th. Bronson Arroyo (9-14) pitched six innings, giving up six hits and one run for the win. Anthony Reyes (2-14) pitched 2 1/3 innings, giving up four hits and three runs for the loss. Angels 18, Orioles 6: Garret Anderson went 3-6 with 5 RBI, including a two-run homer (16), a bases-loaded double, and an RBI single. Kelvim Escobar pitched 5 1/3 innings, and gave up six runs, but got the win. Daniel Cabrera (9-16) pitched 4 1/3 innings, giving up ten runs (eight earned) for the loss. Diamondbacks 9, Giants 4: Justin Upton hit a two-run single in the 6th for the Diamondbacks, who widened their lead in the NL West. Brandon Webb (16-10 ) pitched seven innings, giving up seven hits and four runs for the win. Jonathan Sanchez (1-4) pitched three innings, giving up five hits and three runs for the loss. Dodgers 6, Padres 1: James Loney went 3-4, with a two-run homer (11) and a double as the Dodgers won easily. Chad Billingsley (11-4 ) pitched six innings, giving up five hits and one run for the win. w:Justin Germano (7-10) gave up eight hits and six runs (five earned) for the loss. Red Sox 5, Devil Rays 4: B.J. Upton hit a two-run homer (24) in a four-run 1st inning for the Devil Rays, but David Ortiz hit two homers (30, 31), the first a three-run homer in the 3rd, and the second a two-run, walkoff homer in the 9th. Jonathan Papelbon (1-2) pitched the 9th inning for the win, while Al Reyes (2-3) picked up his third blown save of the year. Games in progress Bot 8th: Athletics 5, Mariners 5", "edit_actions": [{"type": "R", "before": "02", "after": "10", "start_char_pos": 12, "end_char_pos": 14}, {"type": "R", "before": "Completed games", "after": "Cubs win, Brewers lose: Tied again in the NL Central Cubs 3, Astros 2: Cliff Floyd hit a solo homer (6), and Ryan Theriot hit a sacrifice fly in the 2nd for the Cubs; the Astros threatened to tie the game, with the tying run at third base with nobody out, but failed to bring the runner home. Rich Hill (9-8) pitched seven innings, giving up just three hits and one run for the win. Matt Albers (4-8) gave up seven hits and three runs in six innings for the loss. Ryan Dempster gave a shaky performance, but earned his 26th save, giving up two hits and one run in the 9th.", "start_char_pos": 24, "end_char_pos": 39}, {"type": "A", "before": null, "after": "Pirates 7, Brewers 4: After losing a 4-0 lead, the Pirates scored three in the 8th inning to win, 7-4. John Grabow (3-1) got the win, while Derrick Turnbow (4-5) gave up three runs in 2/3 inning for the loss. Matt Capps pitched a perfect 9th for the save.", "start_char_pos": 40, "end_char_pos": 40}, {"type": "A", "before": null, "after": "Completed games Reds 5, Cardinals 1: The Cardinals lost their sixth straight game, dropping from the midst of the NL Central race to a distant 4 games behind the Brewers and Cubs. Brandon Phillips hit a solo homer (29), and Edwin Encarnacion hit a two-run homer (13) in the 4th. Bronson Arroyo (9-14) pitched six innings, giving up six hits and one run for the win. Anthony Reyes (2-14) pitched 2 1/3 innings, giving up four hits and three runs for the loss.", "start_char_pos": 41, "end_char_pos": 41}, {"type": "R", "before": "Pirates 7, Brewers", "after": "Diamondbacks 9, Giants", "start_char_pos": 345, "end_char_pos": 363}, {"type": "D", "before": "After losing a 4-0 lead, the Pirates scored three in the 8th inning to win, 7-4. John Grabow (3-1) got the win, while Derrick Turnbow (4-5) gave up three runs in 2/3 inning for the loss. Matt Capps pitched a perfect 9th for the save.", "after": null, "start_char_pos": 367, "end_char_pos": 600}, {"type": "R", "before": "Cubs 3, Astros 2: Cliff Floyd hit a solo homer (6), and Ryan Theriot hit a sacrifice fly in the 2nd for the Cubs; the Astros threatened to tie the game, with the tying run at third base with nobody out, but failed to bring the runner home. Rich Hill (9-8", "after": "Justin Upton hit a two-run single in the 6th for the Diamondbacks, who widened their lead in the NL West. Brandon Webb (16-10", "start_char_pos": 601, "end_char_pos": 855}, {"type": "R", "before": "just three hits and one run", "after": "seven hits and four runs", "start_char_pos": 891, "end_char_pos": 918}, {"type": "R", "before": "Matt Albers (4-8) gave up seven", "after": "Jonathan Sanchez (1-4) pitched three innings, giving up five", "start_char_pos": 932, "end_char_pos": 963}, {"type": "D", "before": "in six innings", "after": null, "start_char_pos": 984, "end_char_pos": 998}, {"type": "D", "before": "Ryan Dempster gave a shaky performance, but earned his 26th save, giving up two hits and one run in the 9th.", "after": null, "start_char_pos": 1013, "end_char_pos": 1121}, {"type": "R", "before": "Reds 5, Cardinals", "after": "Dodgers 6, Padres", "start_char_pos": 1122, "end_char_pos": 1139}, {"type": "R", "before": "The Cardinals lost their sixth straight game, dropping from the midst of the NL Central race to a distant 4 games behind the Brewers and Cubs. Brandon Phillips hit a solo homer (29) , and Edwin Encarnacion hit a two-run homer (13) in the 4th. Bronson Arroyo (9-14", "after": "James Loney went 3-4, with a two-run homer (11) and a double as the Dodgers won easily. Chad Billingsley (11-4", "start_char_pos": 1143, "end_char_pos": 1406}, {"type": "R", "before": "six", "after": "five", "start_char_pos": 1440, "end_char_pos": 1443}, {"type": "R", "before": "Anthony Reyes (2-14) pitched 2 1/3 innings, giving up four hits and three runs", "after": "w:Justin Germano (7-10) gave up eight hits and six runs (five earned)", "start_char_pos": 1474, "end_char_pos": 1552}, {"type": "D", "before": "Diamondbacks 9, Giants 4:", "after": null, "start_char_pos": 1567, "end_char_pos": 1592}, {"type": "R", "before": "Top", "after": "Bot", "start_char_pos": 1975, "end_char_pos": 1978}, {"type": "R", "before": "4 Top 9th: Dodgers 6, Padres 1", "after": "5", "start_char_pos": 2006, "end_char_pos": 2036}], "sents_char_pos": [0, 23, 174, 251, 344, 553, 600, 714, 840, 931, 1012, 1121, 1285, 1385, 1473, 1566, 1831, 1956]}
+{"doc_id": "81854", "revision_depth": "1", "before_revision": "Map showing Darfur, and neighboring Libya. The leader of an important rebel group in the Darfur region of Sudan has threatened to withdraw from scheduled peace talks if more than two other rebel groups are invited to the talks. Khalil Ibrahim , leader of the Justice and Equality Movement (JEM), said that only the JEM, the Sudanese Liberation Movement (SLM), and the Sudanese government should be involved in the procedures. He expressed displeasure with the way the peace talks are being handled, and said that the United Nations-African Union leadership is currently unprepared for the talks scheduled for October 27th in Libya . \"The AU and UN mediation until now have failed to detail very precisely who will be invited to the peace talks,\" Reuters news agency quotes him as saying. \"If the mediation fails to take this decision by 27 October, then JEM is not attending the peace talks. We don't want to start with chaos.\" Ibrahim also said the SLM had to \"reform itself and make one delegation and one position\". SLM leader Abdel Wahed Mohammed el-Nur has refused to take part in the negotiations until a UN force is deployed in Darfur, and the pro-government militias are disarmed. \"Even if we were to attend the negotiations it will not be Tripoli ,\" he said. \"We think that any negotiation is supposed to happen in a place which is not related to the conflict.\" Libya has been an important influence in the Darfur conflict. They are believed to have first armed militias with weapons and Pan-Arab ideology in the 1980's, militias which became the current Janjaweed . Meanwhile, Andrew Natsios , the US Special Envoy to Sudan, has said that the relationship between the governments of north and south Sudan is growing increasingly toxic. He added that the two-year-old Comprehensive Peace Agreement would have to be discussed at the peace talks before the situation grew more dire. The agreement, signed in 2005, was aimed at bringing the two governments together as allies and partners in peace. Speculation on the peace talks also includes questions about the deployment of the 26,000 strong force of The United Nations African Union Mission in Darfur (UNAMID). The deployment of the force has been delayed because Khartoum and the AU have rejected non-African troops, and not enough African nations with well-trained and well-equipped soldiers have pledged to help.", "after_revision": "Map showing Darfur, and neighboring Libya. The leader of an important rebel group in the region of Sudan has threatened to withdraw from scheduled peace talks if more than two other rebel groups are invited to the talks. , leader of the (JEM), said that only the JEM, the (SLM), and the Sudanese government should be involved in the procedures. He expressed displeasure with the way the peace talks are being handled, and said that the -African Union leadership is currently unprepared for the talks scheduled for October 27th in . \"The AU and mediation until now have failed to detail very precisely who will be invited to the peace talks,\" news agency quotes him as saying. \"If the mediation fails to take this decision by 27 October, then JEM is not attending the peace talks. We don't want to start with chaos.\" Ibrahim also said the SLM had to \"reform itself and make one delegation and one position\". SLM leader has refused to take part in the negotiations until a UN force is deployed in Darfur, and the pro-government militias are disarmed. \"Even if we were to attend the negotiations it will not be ,\" he said. \"We think that any negotiation is supposed to happen in a place which is not related to the conflict.\" Libya has been an important influence in the Darfur conflict. They are believed to have first armed militias with weapons and ideology in the 1980's, militias which became the current . Meanwhile, , the US to Sudan, has said that the relationship between the governments of north and south Sudan is growing increasingly toxic. He added that the two-year-old would have to be discussed at the peace talks before the situation grew more dire. The agreement, signed in 2005, was aimed at bringing the two governments together as allies and partners in peace. Speculation on the peace talks also includes questions about the deployment of the 26,000 strong force of (UNAMID). The deployment of the force has been delayed because and the AU have rejected non-African troops, and not enough African nations with well-trained and well-equipped soldiers have pledged to help.", "edit_actions": [{"type": "D", "before": "Darfur", "after": null, "start_char_pos": 89, "end_char_pos": 95}, {"type": "D", "before": "Khalil Ibrahim", "after": null, "start_char_pos": 228, "end_char_pos": 242}, {"type": "D", "before": "Justice and Equality Movement", "after": null, "start_char_pos": 259, "end_char_pos": 288}, {"type": "D", "before": "Sudanese Liberation Movement", "after": null, "start_char_pos": 324, "end_char_pos": 352}, {"type": "R", "before": "United Nations-African", "after": "-African", "start_char_pos": 517, "end_char_pos": 539}, {"type": "D", "before": "Libya", "after": null, "start_char_pos": 625, "end_char_pos": 630}, {"type": "D", "before": "UN", "after": null, "start_char_pos": 645, "end_char_pos": 647}, {"type": "D", "before": "Reuters", "after": null, "start_char_pos": 746, "end_char_pos": 753}, {"type": "D", "before": "Abdel Wahed Mohammed el-Nur", "after": null, "start_char_pos": 1030, "end_char_pos": 1057}, {"type": "D", "before": "Tripoli", "after": null, "start_char_pos": 1248, "end_char_pos": 1255}, {"type": "D", "before": "Pan-Arab", "after": null, "start_char_pos": 1497, "end_char_pos": 1505}, {"type": "D", "before": "Janjaweed", "after": null, "start_char_pos": 1564, "end_char_pos": 1573}, {"type": "D", "before": "Andrew Natsios", "after": null, "start_char_pos": 1587, "end_char_pos": 1601}, {"type": "D", "before": "Special Envoy", "after": null, "start_char_pos": 1611, "end_char_pos": 1624}, {"type": "D", "before": "Comprehensive Peace Agreement", "after": null, "start_char_pos": 1777, "end_char_pos": 1806}, {"type": "D", "before": "The United Nations African Union Mission in Darfur", "after": null, "start_char_pos": 2111, "end_char_pos": 2161}, {"type": "D", "before": "Khartoum", "after": null, "start_char_pos": 2225, "end_char_pos": 2233}], "sents_char_pos": [0, 42, 227, 425, 787, 891, 927, 1018, 1188, 1267, 1370, 1432, 1575, 1745, 1889, 2004, 2171]}
+{"doc_id": "81955", "revision_depth": "3", "before_revision": "ALL HAIL ADOLF HITLER!%DIFDELCMD < %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////. ... ... ... ... ...........................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////........................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////........................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////........................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////........................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////............................................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////........................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////............................................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////........................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////............................................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////........................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////............................................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////........................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////............................................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% ////////// ............................................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////........................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% ////////// ............................................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////........................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% ////////// ............................................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////........................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% ////////// ............................................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////........................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% ////////// ............................................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////........................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////........................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////........................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////........................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% //////////........................................%DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% ////////// DEATH TO THE JEWS!!", "after_revision": "%DIFDELCMD < %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% 250px|Map of USA with Wisconsin highlighted. The Crandon, Wisconsin shooting occurred earlier today inside a home in northeastern Wisconsin and has left at least seven dead, including the gunman. Forest County Supervisor Tom Vollmar said, \"It's a pretty tragic situation here ... There are five or six people dead.\" WTMJ Newsradio told CNN that at least two of the dead are high school students. Ten youths were reportedly inside the house when the gunfire began. The shooter, Tyler Peterson, was killed by a police sniper after a manhunt. WITI-TV reports that one of the victims was a student at the Milwaukee Area Technical College. Crandon, Wisconsin, where the shooting occurred, has a population of nearly 2,000. The entire area was locked down, until recently, when police said they are no longer searching for any suspects. Crandon Police Chief John Dennee said, \"We're not looking for anybody anymore.\" Crandon' Mayor, Gary Bradley, did not want to comment on the investigation, only saying, \"We are going to get together and be strong ... We are a strong community. We always have been. This is agonizing, but we will prevail.\" A mother of one of those fatally shot said, \"I'm waiting for somebody to wake me up right now. This is a bad, bad dream ... All I heard it was a jealous boyfriend and he went berserk. He took them all out.\" A neighbor who lives by the crime scene said, \"I heard probably five or six shots, a short pause and then five or six more ... %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% %DIFDELCMD < \\\\\\\\\\\\\\\\\\\\%%% I wasn't sure if it was gunfire initially. I thought some kids were messing around and hitting a nearby metal building.\"", "edit_actions": [{"type": "D", "before": "ALL HAIL ADOLF HITLER!", "after": null, "start_char_pos": 0, "end_char_pos": 22}, {"type": "R", "before": "//////////.", "after": "250px|Map of USA with Wisconsin highlighted. The Crandon, Wisconsin shooting occurred earlier today inside a home in northeastern Wisconsin and has left at least seven dead, including the gunman. Forest County Supervisor Tom Vollmar said, \"It's a pretty tragic situation here", "start_char_pos": 62, "end_char_pos": 73}, {"type": "A", "before": null, "after": "There are five or six people dead.\" WTMJ Newsradio told CNN that at least two of the dead are high school students.", "start_char_pos": 78, "end_char_pos": 78}, {"type": "A", "before": null, "after": "Ten youths were reportedly inside the house when the gunfire began.", "start_char_pos": 79, "end_char_pos": 79}, {"type": "A", "before": null, "after": "The shooter, Tyler Peterson, was killed by a police sniper after a manhunt.", "start_char_pos": 80, "end_char_pos": 80}, {"type": "A", "before": null, "after": "WITI-TV reports that one of the victims was a student at the Milwaukee Area Technical College.", "start_char_pos": 81, "end_char_pos": 81}, {"type": "A", "before": null, "after": "Crandon, Wisconsin, where the shooting occurred, has a population of nearly 2,000.", "start_char_pos": 82, "end_char_pos": 82}, {"type": "A", "before": null, "after": "The entire area was locked down, until recently, when police said they are no longer searching for any suspects. Crandon Police Chief John Dennee said, \"We're not looking for anybody anymore.\" Crandon' Mayor, Gary Bradley, did not want to comment on the investigation, only saying, \"We are going to get together and be strong", "start_char_pos": 83, "end_char_pos": 83}, {"type": "A", "before": null, "after": "We are a strong community. We always have been. This is agonizing, but we will prevail.\"", "start_char_pos": 88, "end_char_pos": 88}, {"type": "A", "before": null, "after": "A mother of one of those fatally shot said, \"I'm waiting for somebody to wake me up right now. This is a bad, bad dream", "start_char_pos": 89, "end_char_pos": 89}, {"type": "A", "before": null, "after": "All I heard it was a jealous boyfriend and he went berserk. He took them all out.\" A neighbor who lives by the crime scene said, \"I heard probably five or six shots, a short pause and then five or six more", "start_char_pos": 94, "end_char_pos": 94}, {"type": "D", "before": "...........................", "after": null, "start_char_pos": 99, "end_char_pos": 126}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 153, "end_char_pos": 163}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 190, "end_char_pos": 200}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 227, "end_char_pos": 237}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 264, "end_char_pos": 274}, {"type": "D", "before": "//////////........................................", "after": null, "start_char_pos": 301, "end_char_pos": 351}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 378, "end_char_pos": 388}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 415, "end_char_pos": 425}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 452, "end_char_pos": 462}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 489, "end_char_pos": 499}, {"type": "D", "before": "//////////........................................", "after": null, "start_char_pos": 526, "end_char_pos": 576}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 603, "end_char_pos": 613}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 640, "end_char_pos": 650}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 677, "end_char_pos": 687}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 714, "end_char_pos": 724}, {"type": "D", "before": "//////////........................................", "after": null, "start_char_pos": 751, "end_char_pos": 801}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 828, "end_char_pos": 838}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 865, "end_char_pos": 875}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 902, "end_char_pos": 912}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 939, "end_char_pos": 949}, {"type": "D", "before": "//////////........................................", "after": null, "start_char_pos": 976, "end_char_pos": 1026}, {"type": "D", "before": "//////////............................................................", "after": null, "start_char_pos": 1053, "end_char_pos": 1123}, {"type": "D", "before": "//////////........................................", "after": null, "start_char_pos": 1150, "end_char_pos": 1200}, {"type": "D", "before": "//////////............................................................", "after": null, "start_char_pos": 1227, "end_char_pos": 1297}, {"type": "D", "before": "//////////........................................", "after": null, "start_char_pos": 1324, "end_char_pos": 1374}, {"type": "D", "before": "//////////............................................................", "after": null, "start_char_pos": 1401, "end_char_pos": 1471}, {"type": "D", "before": "//////////........................................", "after": null, "start_char_pos": 1498, "end_char_pos": 1548}, {"type": "D", "before": "//////////............................................................", "after": null, "start_char_pos": 1575, "end_char_pos": 1645}, {"type": "D", "before": "//////////........................................", "after": null, "start_char_pos": 1672, "end_char_pos": 1722}, {"type": "D", "before": "//////////............................................................", "after": null, "start_char_pos": 1749, "end_char_pos": 1819}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 1846, "end_char_pos": 1856}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 1883, "end_char_pos": 1893}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 1920, "end_char_pos": 1930}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 1957, "end_char_pos": 1967}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 1994, "end_char_pos": 2004}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2031, "end_char_pos": 2041}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2068, "end_char_pos": 2078}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2105, "end_char_pos": 2115}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2142, "end_char_pos": 2152}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2179, "end_char_pos": 2189}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2216, "end_char_pos": 2226}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2253, "end_char_pos": 2263}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2290, "end_char_pos": 2300}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2327, "end_char_pos": 2337}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2364, "end_char_pos": 2374}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2401, "end_char_pos": 2411}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2438, "end_char_pos": 2448}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2475, "end_char_pos": 2485}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2512, "end_char_pos": 2522}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2549, "end_char_pos": 2559}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2586, "end_char_pos": 2596}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2623, "end_char_pos": 2633}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2660, "end_char_pos": 2670}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2697, "end_char_pos": 2707}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2734, "end_char_pos": 2744}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2771, "end_char_pos": 2781}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 2808, "end_char_pos": 2818}, {"type": "D", "before": "////////// ............................................................", "after": null, "start_char_pos": 2845, "end_char_pos": 2916}, {"type": "D", "before": "//////////........................................", "after": null, "start_char_pos": 2943, "end_char_pos": 2993}, {"type": "D", "before": "////////// ............................................................", "after": null, "start_char_pos": 3020, "end_char_pos": 3091}, {"type": "D", "before": "//////////........................................", "after": null, "start_char_pos": 3118, "end_char_pos": 3168}, {"type": "D", "before": "////////// ............................................................", "after": null, "start_char_pos": 3195, "end_char_pos": 3266}, {"type": "D", "before": "//////////........................................", "after": null, "start_char_pos": 3293, "end_char_pos": 3343}, {"type": "D", "before": "////////// ............................................................", "after": null, "start_char_pos": 3370, "end_char_pos": 3441}, {"type": "D", "before": "//////////........................................", "after": null, "start_char_pos": 3468, "end_char_pos": 3518}, {"type": "D", "before": "////////// ............................................................", "after": null, "start_char_pos": 3545, "end_char_pos": 3616}, {"type": "D", "before": "//////////........................................", "after": null, "start_char_pos": 3643, "end_char_pos": 3693}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 3720, "end_char_pos": 3730}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 3757, "end_char_pos": 3767}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 3794, "end_char_pos": 3804}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 3831, "end_char_pos": 3841}, {"type": "D", "before": "//////////........................................", "after": null, "start_char_pos": 3868, "end_char_pos": 3918}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 3945, "end_char_pos": 3955}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 3982, "end_char_pos": 3992}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 4019, "end_char_pos": 4029}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 4056, "end_char_pos": 4066}, {"type": "D", "before": "//////////........................................", "after": null, "start_char_pos": 4093, "end_char_pos": 4143}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 4170, "end_char_pos": 4180}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 4207, "end_char_pos": 4217}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 4244, "end_char_pos": 4254}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 4281, "end_char_pos": 4291}, {"type": "D", "before": "//////////........................................", "after": null, "start_char_pos": 4318, "end_char_pos": 4368}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 4395, "end_char_pos": 4405}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 4432, "end_char_pos": 4442}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 4469, "end_char_pos": 4479}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 4506, "end_char_pos": 4516}, {"type": "D", "before": "//////////........................................", "after": null, "start_char_pos": 4543, "end_char_pos": 4593}, {"type": "D", "before": "//////////", "after": null, "start_char_pos": 4620, "end_char_pos": 4630}, {"type": "R", "before": "DEATH TO THE JEWS!!", "after": "I wasn't sure if it was gunfire initially. I thought some kids were messing around and hitting a nearby metal building.\"", "start_char_pos": 4631, "end_char_pos": 4650}], "sents_char_pos": [0, 15, 33, 46, 62, 74, 88, 99, 137, 153, 174, 190, 211, 227, 248, 264, 285, 301, 362, 378, 399, 415, 436, 452, 473, 489, 510, 526, 587, 603, 624, 640, 661, 677, 698, 714, 735, 751, 812, 828, 849, 865, 886, 902, 923, 939, 960, 976, 1037, 1053, 1134, 1150, 1211, 1227, 1308, 1324, 1385, 1401, 1482, 1498, 1559, 1575, 1656, 1672, 1733, 1749, 1830, 1846, 1867, 1883, 1904, 1920, 1941, 1957, 1978, 1994, 2015, 2031, 2052, 2068, 2089, 2105, 2126, 2142, 2163, 2179, 2200, 2216, 2237, 2253, 2274, 2290, 2311, 2327, 2348, 2364, 2385, 2401, 2422, 2438, 2459, 2475, 2496, 2512, 2533, 2549, 2570, 2586, 2607, 2623, 2644, 2660, 2681, 2697, 2718, 2734, 2755, 2771, 2792, 2808, 2829, 2845, 2856, 2927, 2943, 3004, 3020, 3031, 3102, 3118, 3179, 3195, 3206, 3277, 3293, 3354, 3370, 3381, 3452, 3468, 3529, 3545, 3556, 3627, 3643, 3704, 3720, 3741, 3757, 3778, 3794, 3815, 3831, 3852, 3868, 3929, 3945, 3966, 3982, 4003, 4019, 4040, 4056, 4077, 4093, 4154]}
+{"doc_id": "82064", "revision_depth": "1", "before_revision": "Stuart Ryan is running for the Communist Party in the Ontario provincial election in Ottawa Centre.Wikinews interviewed him regarding his values,his experience,and his campaign. Interview%DIFDELCMD < %DIFDELCMD < %%% Why have you chosen to involve yourself in the political process? Why did you choose to run in this constituency? I have been involved in the political process for over 40 years,in terms of organizing over political issues such as opposing the Wars in Vietnam and now the wars in Iraq and Afghanistan.I see the elections,if that is what you mean as the political process,as a way to express our political views to the electorate so that they can pass judgement and see that the various issues we raise are related in that the capitalist system and the neo-liberal agenda take away the rights of workers,woman,aboriginals and people in general. I run in Ottawa Centre because I have lived in the riding since 1979 and I know the issues that concern the people who live in the riding.It has a progressive history and is open to socialist ideas.%DIFDELCMD < %DIFDELCMD < %%% What prior political experience do you have? What skills and insight can you bring to office,from other non-political positions you may have held? I have run for office in my Steelworker union in Windsor in the 1970s and in my Autoworker union now.I work for a CUPE union at Carleton University in Ottawa.I think I can bring my organizing skills in the labour movement,the anti-war movement and in the Central American solidarity movement to Queen\u2019s Park and in building a base within Ottawa Centre to fight for a people\u2019s agenda.%DIFDELCMD < %DIFDELCMD < %%% Which of your competitors do you expect to pose the biggest challenge to your candidacy? Why? What makes you the most desirable of all candidates running in the riding? I think the biggest challenge to my candidacy is the feeling that people feel they have to vote NDP in order to win the riding,or to prevent a victory by the Liberal or Conservative party.This is a product of the first-past-the-post-voting system.I have had many people say that our ideas are good,and that I have been a good campaigner,but because they feel voting for the Communist Party might jeopardise the NDP.I think I would be the most desirable candidate because we have the best policies and that I would work very hard to make sure they are pushed for in the legislature.%DIFDELCMD < %DIFDELCMD < %%% What do you feel are the three most important issues to voters in your riding? Are these the same top three issues that are most important to you? What would you do to address these issues? The three biggest issues in this riding are the crisis in public education;the increasing debtload of students because of tuition hikes;and the inability of municipal government to fund the social services downloaded by the Harris government form the province to the cities in 1997. They are my most important issues.%DIFDELCMD < %DIFDELCMD < %%% Re public education:Our Party will commit to spending $20 billion for a quality public secular school system in French and English for primary and secondary education. We would commit to a comparable investment in public post-secondary education while reducing tuition by 50\\% now, and then eliminate it when the funding is adequate to provide the education for all who qualify for post-secondary education. We would give municipalities secure funding through provincial grants and the ability to tax corporations. This would wean them off the property tax, which we would reduce by 75\\%, along with the scrapping of the market value assessment taxation scheme. We would give 50\\% of the gas tax for mass transit such as the O-train in Ottawa that would travel both east and west and north and south. We would upload to the province the funding of health, education, transit and welfare. What should be the first order of business in the 39th Legislative Assembly? The first order of business schould be the drafting of the legislation to implement Mixed Member Proportional Representation, following its victory in the October 10 referendum. Are the property taxes in your riding at a fair level for the amount of services received in the municipality? The property tax situation in the province is in chaos. Home owners are seeing property taxes increase as the value in their neighbourhoods go up while the property tax of businesses are diminished by a comparable amount. The net increase in revenue to the municipality coming from the residential tax increases is zero. Outraged taxpayers are blaming the municipal officials and are taking it out by voting for right-wing candidates who promise not to raise taxes (In Ottawa the slogan was \u201czero means zero\u201d. The same candidate is now the mayor, and is backing a two per cent increase and campaigning to have the municipal financing system revamped. The property tax system discriminates against tenants as they pay for the extra taxes landlords pay through higher rents. How can the province lead the way in stimulating job creation? The province should take action to save the manufacturing jobs leaving the province by insisting that raw materials be processed in Ontario rather being shipped raw out of the country. It should pass legislation to establish public tribunals so that corporations who are closing profitable factories, such as Hershey\u2019s in Smith Falls and GM in Oshawa would have to justify their closing. Failure to do so would lead to the province taking over the closed business. Our Party would invest in mass transit and produce 100,000 units of social housing. What are your views on the mixed member proportional representation (MMP) referendum? I support MMP and will be voting for it. No longer will we have to choose between the lesser of two evils, and end up with the same mess. The last two governments in Ontario are proof positive of the problem. You will be able to vote for what you believe in and see it relected in the legislature. Of the decisions made by Ontario's 38th Legislative Assembly, which was the most beneficial to your this electoral district? To the province as a whole? Which was least beneficial, or even harmful, to your this riding? To the province as a whole? The only thing that was good for Ottawa Centre was the tuition freeze for two years. That was negated by the new tuition scheme that will raise tuition 25-35\\% over four years. You are running as a candidate for the Communist Party. A lot of people say that Communism is a dead idea or fear that a Communist government would implement some sort of repressive dictatorship. What do you say to this? Communism is not a dead idea; we see revolutionary parties win in Venezuela and trying to bring socialism in by democratic means. This was tried in Chile in the 1970s but was overthrown by the CIA and the Chilean military. What will succeed is that the working class and its allies will demand socialism; it was the insistence of the Venezuelan people that stopped the coup against Hugo Chavez in 2002. The system that they will bring will be democratic, as it will be the will of the people that it be so. The Communist Party is unlikely to win any seats in the election. Why did you decide to run for a small party rather than be involved with one of the major parties? This is a good question, but if you want to bring about real change, you must be part of a party that calls for it. Our Party calls for socialism, public ownership of the means of production under democratic control. Working for a party like the NDP and the Greens would make you feel that you might get things done, but those parties will disappoint you - look at the record of the Bob Rae NDP government in Ontario that opened public sector collective agreements to attack benefits in order to save $2 billion from its deficit. External links Stuart Ryan YouTube Election statement Communist Party,official site Elections Ontario%DIFDELCMD < %DIFDELCMD < %%% Category:North America Category:Canada Category:Ontario Category:Ottawa,Ontario Category:Politics and conflicts Category:Elections Category:Elections in Canada Category:2007 Ontario provincial e", "after_revision": " %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................................................................ ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::;:::,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::;;;;:::::;;:,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;;::;;;;;;;;;;;;:;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;;;:,:;;;;;;;;;;;;;';;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;::,,:;;''''''''';;;;;';;:;::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,....................................................``........................................... ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;;:,:;'+++'''++'''';'';;:;;:::;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................................````........................................... ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;;;:;'+++'''++';++';;;::;;;;;'';:;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................................````........................................... ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;+;:'+++'''''';;;;;;''''''::;':;'::,;;,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................`````........................................... ,,,,,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,;+':;+++''';;;;;'''+;++'''+'';:'';::,:,:;,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................`````........................................... ,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,:+':;'''+';;;'+'++'+'++'''''+'''':;'';::,:,;:,,,,,,,,,,,,,,,,,:::::::,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,........................................................``....................................... ,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,:''::'''';;''++++'''''++++##+++''+';::;'''';:,::,,,,,,::::;;;;;;;;;;;;;;;;;;;:;:::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,......................................................``....................................... ,,,.......,,,,,,,,,,,,,,,,,,,,,,,''::'''';:;'''';'+'++#########+++'';;:::'''':,,:::,::;;;:::::::::::;;;;::;;;;;;;;;;;;;;;;::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.,.....................................................`....................................... ,,.........,,,,,,,,,,,,,,,,,,,,;+::;'';;;'+'''+''+#++###':::::'###+'';;:;:'';:;'''+'::,,,:::;;;;;;;;;;;;:::::::::;;;;;;;;;;;;::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....................................................``...................................... ...........,,,,,,,,,,,,,,,,,,;+;:''';:;'+'''''''+@##++',,,,,,,,;+##++'';';':;''';:,,,:::;;;;;;::::::::::::::::::::::::::;;;;;;;;::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..................................`..............````..................................... ...........,,,,,,,,,,,,,,,,:'+:;'';;;'''''''''+#@+++:,,,,,,,,,,,,,'##+++';;''';;:,:::;;;;;;;;;;::::::::::::::::::::::::::::::;;;;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..................................`````.........```````................................... ...........,,,,,,,,,,,,,,,''':'';;;''''''''+++@#+':,,,,,,,,,,,,,,,,'#+++''+';:::;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::;;;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................`````........```````.................................... ...........,,,,,,,,,,,,,:''::';;;;''''''+''#@+;,,,,,,,,,,,,,,,,:,,,:#+++++;:,:;;;::::;;;;;;;;;;;::::::::::::::::::::::::::::::::::;;;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................``````...`````````...................................... ...........,,,,,,,,,,,,:+:::;;;;'''''''#+'@+,,,,,,,,,,,,,,,,,,,,,,,,'#+#':::;;;;;:::::::;;;;;;:::::::::::::::::::::::::::::::::::::::;;;;,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................````````````````````..................................... ...........,,,,,,,,,,,;+:;;'';''''''''+++#:,,,,,,,,,,,,,,,,,,,,,,,,,,#+;::::;;;;::::::::::;;;::::::::::::::::::::::::::::::::::::::::::;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................````````````````````..................................... ...........,,,,,,,,:';::''''+;'';''''+'#;.,,,,,,,,,,,,,,,,,,,,,,,,,,;+;,:::;;;:::::::::::;;:::::::::::::::::::::::::::::::::::::::::::::;:;;,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................````````````````````..................................... ...........,,,,,,,,',,:,'+;'''''''''+'#;,,,,,,,,,,,,,,,,,,,,,,,,,,,,+:,:::;;;;:::::::::::;:::::::::::::::::::::::::::::::::::::::::::::::;;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...............................``````````````````........................................ ...........,,,,,,,:':';:;''+'''''''''+,,,,,,,,,,,,,,,,,,,,,,,,,,,:,;::::::::;:::;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...............................``````````````````........................................ ...........,,,,,,,:++;':;;++''''+''++,,,,,,,,,,,,,,,,,,,,,,,,,,,,,;::::::::;:::;;:::;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..............................``````````````````......................................... ..........,,,,,,,,:++;'+;;+''''''+'+,,,,,,,,,,,,,,,,,,,,,,,,,,,,,;:::::;:;;;;;:;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.............................``````````````````.......................................... ..........,,,,,,,,,++;+++;''+'''++':,,,,,,,,,,,,,,,,,,,,,,,,,,,,;:::::;;;;;;:::;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;:,,,,,,,,,,,,,,,..,,,,,,,,,,,,,...........................```````````````````........................................... ..........,,,,,,,,,'#'++#';'+'''+':,,,,,,,,,,,,,,,,,,,,,,,,,,,,;:::::;;;;:::;:::;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;:,,,,,,,,,,,,,.....,,,,,,,,,,,,,.......................```````````````````............................................ ..........,,,,,,,,,'#''++#:;++'+';.,,,,,,,,,,,,,,,,,,,,,,,,,,,;::::::::;;::;;::;;::::::::::::::::::::::::::::::::::::::::::::::::::::,,::::::::::::::;:,,,,,,,,.........,,,,,,,,,,,,,.......................`````````````````.............................................. ...........,,,,,,,,;#+'++#':++'+',,,,,,,,,,,,,,,,,,,,,,,,,,,,:;,:::::::::;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::,::,,,,,,,:::::::::::::::,,.,...........,,,,,,,,,,,,,......................`````````````````............................................... ............,,,,,,,:#+;++#+:#+'',,,,,,,,,,,,,,,,,,,,,,,,,,,,:;:::::::::;;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,::::::::::::::,.,...........,,,,,,,,,,,,................````..`````````````````................................................ ............,,,,,,,,##;#+##:##+;,,,,,,,,,,,,,,,,,,,,,,,,,,,:;::::::::::;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,::::::::::::,.,,........,................,.........````````````````````````................................................. ............,,,,,,,,+#'#+##;+##,,,,,,,,,,,,,,,,,,,,,,,,,,,:;,:::::::::;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,:::::::::::,.......,.............................```````````````````````.................................................. ..............,,,,,.:#+'+##''#',,,,,,,,,,,,,,,,,,,,,,,,,,:':::::::::::;;;;;;;;;;;::::::::::::::::::::::::::::::::,:::::::::::::::,,,,,,,,,,,,,,,,,,::::::::::,,.....,,............................`````````````````````.`................................................,, ................,.,,.##''##+;@:,,,,,,,,,,,,,,,,,,,,,,,,,:;;:::::::;;:;;;;;;;;;;;::::::::::::::::::::::::::::::::,,,::::::::::::::,,,,,,,,,,,,,,,,,,,,,::::::::,....,,............................`````````````````````.................................................,.,, ..................,,.'#+:;#';@;,,,,,,,,,,,,,,,,,,,,,,,,,;;:::::;;;;;;;;;;;;;;;::;:::::::::::::::::::::::::::::::,,,,:::::::::::,,,,,,,,,,,,,,,,,,,,,,,,::::::::,.,.,..............................``````..``````````..................................................,,,,, .................,,,,,##;:'''@;,,,,,,,,,,,,,,,,,,,,,,,,;':::::;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::,,,:::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,::::::::,.,...............................``````..``````...................................................,.,,,,,, ..................,,..'#'::;##,,,,,,,,,,,,,,,,,,,,,,,,:;:::::;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::,:::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::,,,..............................`````....````.................................................,,,,,,,,,,, ....................,,,##'+#@'..,,,,,,,,,,,,,,,,,,,,,,;;:::::;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::,...............................````......................................................,,,,,,,,,,,,,,, .......................:#@#@#,,.,,,,,,,,,,,,,,,,,,,,.;'::::::;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::,.............................```.......................................................,,,,,,,,,,,,,,,, ......................,.,'++,.,.,,,,,,,,,,,,,,,,,,,,,';:;:::;;;;;;;;;;;;;;;;:::::;:::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::,..............................`.......................................................,,,,,,,,,,,,,,,,, ......................,.,....,..,,,,,,,,,,,,,,,,,,,,;'::;::;;;;;;;;;;;;;;;;:;::;;;:::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::,....................................................................................,,,,,,,,,,,,,,,,,, .......................,...,.,,,,,,,,,,,,,,,,,,,,,,,';:;;:;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::,,:::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::,..................................................................................,,,,,,,,,,,,,,,,,,, ...................................,,,,,,,,,,,,,,,,;';;;;;;;;;;;;;;;;;;;;;;;;;;::;;;::::::::::::::::::::::::::::::::::::,,,::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::...................................................................................,,,.,,,,,,,,,,,,,, ...................................,,,,,,,,,,,,,,,,'';;;;;;;;;;;;;;;;;;;;;;;;;;:;;;:::::::::::::::::::::::::::::::::::::,,,,::,,,,,,,,,,,,,,,,,,,,,,,,..,,,,,,,::::::::..................................................................................,,,,,,,,,,,,,,,,,, ...................................,,,,,,,,,,,,,,,:';;;;;;;;;;;;;;;;;;;;;;;;;;;:;;:::::::::::::::::::::::::::::::::::::,,,,,::,,,,,,,,,,,,,,,,,,,,,,,,....,,,,,,:::::::,.................................................................................,,,,,,,,,,,,,,,,,, ....................................,,,,,...,,,,,,;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,:::,,,,,,,,,,,,,,,,,,,,,,,.....,,,,,::::::::,................................................................................,,,,,,,,,,,,,,,,,, .....................................,.,.,..,,,,,.''';;;;;;;;;;;';;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::,,,,,,,,,,,,::,,,,,,,,,,,,,,,,,,,,,,......,,,,,::::::::,..............................................................................,,,,,,,,,,,,,,,,,,, .................................,,.....,...,,,,,,'';;;;;;;;;;;';;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,......,,,,,:::::::::.............................................................................,,,,,,,,,,,,,,,,,,,, ...............................................,.;'';;;;;;;;;;;';;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::,,,::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,......,,,,,,::::::::,...........................................................................,,,,,,,,,,,,,,,,,,,,, ...............................................,.'''''';;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::,::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,........,,,,:::::::::,............................................................,...........,,,,,,,,,,,,,,,,,,,,,,, ................................................,'''''';;;;;;';;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::,::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..,,....,,,,::::::::::........................................................................,,,,,,,,,,,,,,,,,,,,,,, ................................................,'''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....,,,::::::::::::....................................................................,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................:'''''''';;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.,,,,....,,,,,,::::::::::,....................................................................,,,,,,,,,,,,,,,,,,,,,,,,, ................................................;'''''''';;;;;;;;;;;';';;;;;;;;;;;;::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....,,,,,::::::::::...........................................................,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................;''''''';;;;;;';;;;;;';;;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,:,,,:,,,,,,,,,,,,,,,,,,,,,.......,,,,:::::::;:,.........................................................,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................''''''';';;;;;;;;;;;'';;;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,.......,,,::::::::::,........................................................,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................''''''''''';;;;;;;;;''';;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,.....,,,,::::::::::::........................................................,..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................'''''';''''';;;;;;;;''';;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,....,,,,,,:::::::::::,......................................................,..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................''';'''''''';;;;'';;''';;;;;;;;;;;;;:;::::::::::::::::::::,,,,:,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....,,,,,,:::::::::;:.......................................................,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................''''''''''';;;;''';;''';;;;;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,:,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.......,,,,:::::::::;;,......................................................,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................'''''';''';;;;;''';;''';;;;;;;;;;;;;;;;;;:::::::::::::::::::,,,,,,,,,,,,:::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.......,,,,,::::::::;::.....................................................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................;''''';;';;;;;;;;;;'''';;;;;;;;;;;;;;;;;;;:::::::::::::::::::,,,,,,:::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....,,,,,,,,:::::;:;;;,......................................,,............,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................:''''';;;;;;;;;;;;;;'''';;;;;;;;;;;;;;;;;;;::::::::::::::::::,,,,:::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...,,,,,,,,,,::::::::;;:...................................,,.......,,,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................,'''''';'';;;;;;;;;;'''';;;;;;;;;;;;;;;;;;::::::::::::::::::,,::,:::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.,,,,,,,,,,,,,:::::::;;;...........................................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................,+''''';;';;;;;;;;;;;'''';;;;;;;;;;;;;;;;:::::::::::::::::::,::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,........,,,,,,:::::::;;;:..........................................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................'''''';''';';;;;;;;;;''';;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.........,,,,,::::::::;;:....................................,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................;'''''''''';;''';;;;;;''';;'';;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..........,,,,:::::::;;;,..................................,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................:+'''';''';;''''';;;;;''';;'';;;;;;;;;;;;;:::::;;;:::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...........,,,:::::::;;;:..................................,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................,+''''''';;;''''';;;;;''';;';;;;;;;;;;;;;;;;::;;;;;;::::::::::::::::::::::::::,::,,,,,,::,,,,,,,,,,,,,,,,,,....,,,....,,,,::::::;;;;,.................................,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................;'''''';;;;;'';;;;;;;'''';'';;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::,,,,,,,,,,::,,,,,,,,,,,,,,,,,,,.....,,,,::::::;;;;,.................................,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................:''''''';';;;;;';;;;;''''';'';;;;;;;;;;;;;;;;;;;;:;:::::::::::,::::::::::::::::::::,,,,,,:,:,,,,,,,,,,,,,,,,,,,,,,...,,,,,:::::;;;;:.........,,,,....................,,,,,,,,,,,,,,,,,,,,,,,,,,.,,,,,,,,,,,,,,,,,,,,,,,,, ................................................,,.''';''';''''';';;;;'''''';';;;;;;;;;;;;;;;;::::::::::::::::::::::,:::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,...,.,,,,,::::::;;;;,.......,,,,,....................,,,,,,,,,,,,,,,,,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................,.:+'''''';''';;'';;''''''''';;;;;;;;;;;;;;;;::::::::::::::::::::::,:::::::::::::::::,,,,,,,,:::,,,,,,,,,,,,,.........,,,,,::::::;;;;:.....,,,,,,,....................,,,,,,,,,,,,,,,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................,,;''''''''';'''';;;'''''''';;;;;;;;;;;;;;;:::::::::::::::::::::,:::::::::::::::::::,,,,,,,,::::,,,,,,,,,,...........,,,,,::::::;;;;:,,,,,,,,,,,,....................,,,,,,,,,,,,,,,,,,,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................,,,''+'''''''''''';;;;'''''';;;;;;;;;;;;;;:::;;::::::::::::::::::::::::::::::::::::::,,,,,,,:::::,,,,,,,,,,...........,,,,,:::::;;;;;,...,...........................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................,,.:''+''''';'''''';;;''''''';;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::,,,,,,,::::::,,,,,,,,.............,,,,:::::;;;;;,...,...........................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...................................................,,.:+'''''''''''''';'''''''';;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::,,,,,,,,,:::::,,,,,,,....,...,,,,,,,,,,::::;;;;;:...............................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .....................................................,,;'++'''''''''''''''''''''';;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,:,,,,,,,,..,....,,,,,,,,,,::::;;;;;;............,..................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .....................................................,,,'+++''''''''''''''''''''';;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,......,,,.,,,,,,:::::;;;;;,,...........,,....,,,,,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ......................................................,.:+++++'''''''''''''''''''';;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,:,,,,,,,,,.......,,,,,,,,,:::::;;;;;,............,,,..,,,,,,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .......................................................,,:+'+++''''''''''''''''''';;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,:::,,,,,,,,,........,,,,,,,:::::;;;;;,...........,,,,,,,,,,,,.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..........................................................:'+++'''''''';''''''''''';;;;;;;;;;;;::::::;::::::::::::::::::::::::::::::::::::,,::,,,,:::::::,,,,,,.......,,,,,:,,:::::;;;;;:...........,,.,,,,,,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .........................................................,.,'+'+++'''''''''''';;';;;;;;;;;;;;;;;;::;;::::::::::::::::::::::::::::::::::::::::,,:::::::::::::,,,.......,,,,,::,::::::;;;;:........,,,,,,,,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ........................................................,.,..:'+++'''';''''''';;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::,,:::::::::::::::,,,,..,,,,,,,:::::::::::;;;:,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ............................................................,.,;+++''''''''''';;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,:::::::::::::;;;,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .........................................................,..,.,,:'++''''''''''';;;''';;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,::::::::::::::;;;,.......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,.:+'+'''''''''';;;'''';;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,:::::,:::::::::;;;:,.........,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..............................................................,,,.;++''''''''''';;;''';;;;;;;;;;;;;;;:::::::::::::::::::,:::::::::::::::::::::::::::::::::::::::::::::::::::::,:::::::;;;:..........,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,,,.;++'''''''''';;;;'';;;;;;;;;;;;;;;:::::::::::::::::::,:::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,::::::::;;;:.,........,,,,,,,,,,,,,,,,,,,,,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................................,,++'''''''''';;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,::::::::;;;,,,.......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................................,..+'+'''''''''';;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,:::::::;;;,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................................,..''+'''''''''';;;;;;;;;;;;;;;;;::;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,::::::;;;,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ....................................................................''''''''''''';;;;;;;;;;;;;;;;:::;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,::::::::,,:::::;;;:,,,,,,,..........,..,,,,,,,,,,.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ....................................................................'''''''''''''';;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,:::::::::::;;;:.,,,,,,..,......,...,,,,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................................,.,,''''+''''''''''';;;;;;;;;;;;;;;;:;::::;:::::::::::::::::::::::::::::::::::::;;;;::::::::::::,,,,,,,,,,,,,,::::,:::;;;;:,,,,,................,,,,,,,.,,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...................................................................:''''+''''''''''';;;;;;;;;;;;;;::::::::;::::::::::::::::::::::::::::::::::::;;;::;:::::::::,,,,,,,,,,,,,,,,,:::::::;:;;:,,,,,................,,,,,,,,,,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...................................................................;'''''''''''''''';;;;;;;;;;;;;;::;;;:;;;;::::::::::::::::::::::::::::::::;;;:::::::::::::,,,,,,,,,,,,,,,,,,,,:::;;:;:;;;,,,,,................,,,,,,,.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................................,.,''''''''''''''''';;;;;;;;;;;;;;::;;;;;;;;::::::::::::::::::::::::::;;;;;;;;;:;:::::,,,::::,,,,,,,,,,,,,,,,,,,,::;;;;:;;;,,,,,....,,,,........,,,,,,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,..:''''''+''''''''''';;;;;;;;;;;;;;;;;;;;;;:;;::::::::::::::::::::::;;;;;;:;:;;:;:::,,,,,,::::;:::::::,,,,,,,.,,,:::;;;;;;;,,,,,,,..............,,,,................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,,,;'''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::;;;;;;;:;;;;;;::,,,,,,:;::::;::::::::::,,,.,,,,,::;;;;;;,,,,,,,...............,,,..................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................................;''';;''''''''''''''';;;;;;;;;;;;;;;;;;;;;;::::::::::;;:::::::;;;;;;;;;:;;;:::::,,,,,,:::;;;;;;:;;;;;;;;;::::,.,,,,::;;;;;:,,,,,,,.......................................,,.....,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................................:'''';;'''';'''''''''';;;;;;;;;;;;;;;;;;;;;;;:;;:::::;;:::::::;;;;;;;;;;;;;::::::,,:::;;;;;;;;;;'''';;'''';;:;::,,,,,:::;;;:,,,,,,,,................................................,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,''''';''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;::;:::;;;;;;;;;;;;;;;;;::::::::::;;;;;;;;'''''''+++''''''''';;;:,.,,:::;;;,,,,,,,,....,,,............................................,,,,,,,,,,,,,,,,,,,, .............................................................,,'''';;';'''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;:::::::;;::;;;;;'''''';;;'''';;;:::;'''';;;,,,,,:;;;,,,,,,,,,,,,,,,.............................................,,,,,,,,,,,,,,,,,,, ..............................................................;''';';';;''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;::;;;;;;'''''';;;;;;;;;;;:,,,,,:;''+'';,,,,,,;;:,,,,,,,,,,,,,,...................................................,,,,,,,,,,,,, .............................................................;'';;;''';;'''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;;;;;;;;;;;;''''++';;:::::,:;;:......,,;''+''':,,,,:;:,,,,,,,,,,,,,,.....................................................,,,,,,,,,,, ..........................................................,.;'';;;''';;'''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;;;';''+'+'';;::,,....::,........,:'''++';,,.,:;,,,,,,,...............................................................,.,,,,,, ...........................................................:';;;;;''';;''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::;;;;;';''++''''';;:,.......,,..........,;;::;+';,,,,;:,,,,,,...........................................................,...,...,,,, ..........................................................,';;';;''';;';'''';''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;:;::::;;;;;;';'+'''';;;';,......`...,...........;,...:+'':,,:;,,,,,........................................................................ .........................................................,;;;;;;;'';;;;;;;;;'''';'''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;::::::;;;'''''++''';::::;,,......`...:........```;,...`;'+':,,;;,,,......................................................................... ......................``................................,;;;;;;;;';;;;;;'';;;;;;;;;'';'';;;;;;;;;;;;;;;;;;;;;;;;;::;::::;;;;;;::::;;;;;;;''''''';:,,,,,::.`.....``.`:.........``;,..`.:;''':::;.,.......................................................................... ....................````................................;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;:;;;::::::;;;;::::;;;;';'''''''';:,....,:;.......``..:.........``;....`;.:;''::',........................................................................... ...................``````..............................;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;;:::::::;;:::::;;;';''+'';;;'':,...`..,;.....``....;,......````',...`;`..''',;:........................................................................... ..................```````.............................;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::;:::::;;;'''++'';:::;',....`..,',.....``.,:;,.....`````+,..``;```;:';:;........................................................................... ................````.................................;;;;;;;;;;;;;;;;;;;;;::::::::::;;;;;;;;;;;;;;:;;::;;;;:::::;::::::::::::;;;;''+++';;:,,.,;........:#':......,;+++:.....`.`.+:.```;``.',:';;........................................................................... ................```................................,;;;;;;;;;;;;;;;;;;;:::::::::::::::::::;;;;;:::::::::::::::::::::::::::;;;;;;''++;:;;:,...:;,,....`,+++++'''+'+++++#+++'''++#+',```;`.`'`:++;........................................................................... .............```````````````......................,;;;;;;;;;;;;;;;;;;;:::,,,:::::::::::::::::::::::::::::::::::::::::::::;;;'';'++;:::::,....,+',....;+++##+##+++++++++++++++++++#++#+#;``;`:'':........................................................................... ............````````````````.....................:';;;;;;;;;;;;;;;;;:::,,,,,,,,,::::::::::::::::::::::::::::::::::::::::;;;';;'++'::,,:;,....:#++##########+####++++++++++++#+++######++,,;`;'',........................................................................... .............``````````````````.................:';;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,::::::::::::::::::::::::::::::::::;;;'';'++';',,..:;:,,,:+#+##+++++++#++++++##+++#+++++++++++++''+#+''+.'':............................................................................ .............```````````````````...............;';;;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,::::::::::::::::::::::::::::::::;;;'''''+';:;'...`:''''++++++++++++++#++++++++++++++++++++++++++++++'++'+:,............................................................................ .............`````````````````````............';;;;;;;;;;;;;;;;;;;:::,,,.,,,,,,,,,,,,,,,::::,:::::::::::::::::::::;;;;''++++';::;+....;++++++++++++#+++++++++++++++++++++++++++++++++++++++#+..........................................................`...`............... .............```````````````````````.........;;;;;;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,,,,,,::::::::::::::::::::::::;;;;'''+++'':,,,;#',:'+++++++++++++++##++++++++''+++++++++++++++++++++++++;;;.........................................................`..``................ ........`````````````````````````````.......';;;;;;;;;;;;;;;;;;;;;::,,,,,,,,,,,,,,,,,,,,,,,::::::::::::::;::::;;;;;''++++';':,,,'+'+++++++++++++++++++++++++'+'''''''++++''+++++++++++++++'::......................................................``.`.,,.``.............. .......`````````````````````````````.......';;;;;;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,,,,,,,,,:::::::::::::;::::;;;;;;''+++';;;+';:;+++++++++++''''''''++++++++''''++'''''+'';;;'+++++++++++++;:,.....................................................````...,.``.............. ....```````````````````````````````.......';;;;;;;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,,,,,,,,,::,:::::::::::::;;;;;;''++++;::;++++++++++++++''''''''''';;'+++'''++''''''';';;'';;'++#+++++++++;:,.....................................................````.....````............ .....`````````````````````````````.......;';;;;;;;;;;;;;;;;;;;;;;;::,,,,,,,::::,,,,,,,,,,::::::::::::::;;;;;;;'''++++''++#+++++++++++++''''''''';;;;;;;'+++++++''';;;;:::;;;,;;'++++++'+++;:,.....................................................````...,.`````........... ...```````````````````````````````......:';;;;;;;;;;;;;;;;;;;;;;;:::,,::::::::::,,:,,,,,,,:::::::::::;;;;;;;'''+++++++++++++++++++++''''+'''''';;;;;;;;;;''+'''';;;;::::::::;,;;;+:;++++''',;....................................................``````.`..`````........... ...```````````````````````````````..`..:';;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::,::::::::::::;;;;;;;;''+++#++++++++++++++'''''''''''''''';;;;;;:::;;;;++''';:;::::::::::::;;+';'+#''+:'...................................................```````.``.`````........... ...````````````````````````````````...,';;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::;;;;;;'''++++++++++++++++'''''''''''''''''';;;;;;::,,,::;;'++'';;:::::::::::::;;++,.:+;';;...................................................```````. `.``````.......... ...`````````````````````````````.``..,';;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;;:::::::::::::::::::::;;;;;'''+#+++++++++++++''''''''''''';;''';;;;;;;;:::::::::;;;'+'';:::,:,::::::,::;'.,..;;;;,.................................................```````..`..```````....```.. ...``````````````````````````````.`..';;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;:::::::::::::::::::;;;;;;''+##+++++++++++++''+'''''''''''''';;;;;;;:;;:::::,:,,::;;''';;::,:,,,:::::,.;;+':,,`.,:,..............................................`````````.....```````````````` ...```````````````````````````````..;';;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;:::;::::::::::::;;;;;;''''+##++++++++++++'''''''''''''''''''';';;;::;;:::,:,,:::,::;''';;:,,,:::::::::::::;':..::;..............................................`````````.....```````````````` ...``````````````````````````````.`:';;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;::::::::'';;:;;;;;;;::;;;;;;;''''+#+++++++++++++#++++'''''''''''';;;''''';;;;:;;::,,:,:::::::;;'';:::::::::::::,:::,;+;:` .,...........................................```````````.....```````````````` ..````````````````````````````````:';;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;::::::::::'';;;;;;;;;;;;;;;'''''+#++'''+++++++++++++++''''''''''''''';;;;'';;;;;:::::,:::::::::;;';;:::::::::;;;:::.,;';, `.,..........................................````````````.....```````````````` ..```````````````````````````````.'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::'+;;';';;'';''''''+##+++:....,++''++++++++++'+''''''''''''';;;;;;;;;;::::::::::::::::;;;;;::::::::::::,,,:;++``.,,.....................................`````````````````.....```````````````` ..```````````````````````````.```;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;++'';''''''''+###+';';,.....:;....'+++++++++++'''''''''''';;;;;;;;;;:::::::::::::::::;;;;::::::::::,,,,;:'+,,:,,....................................``````````````````.....```````````````` ..``````````````````````````````,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;::::;'+++++####++++''';;;:,,,.,',.....;+'::'+++++++'''''''''';;;;;;;;;;;;;;;:::::::::::::;;;::::::::,,,,:::'+,`,;:;,..................................```````````````````...,,.``````````````` ..``````````````````````````.```'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;::::::;;'+'';:,,::;''+'':,,,,,',,....:+....,+++++++'''''''''';;;;;;;;;;;;;;;;;;;;;;:::::;;::::::::,,,,,:;'', `;:;',..............................``````````````````````...,,.``````````````` ```````````````````````````````,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::;;;:::::::::::::,,,,::;;'';::;',,,..,:'.....;+;;''++++'''';;';;;;:;;;;;;;;;;;;;;;;;::::::::;:::::,,,,::;+';```.:;;;;,.........................``````````````````````````..,,,.``````````````` ```````````````````````````````;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;:::::::;;;;;;;;;;;:::::::,,,,,:;''';::,.,,;'.....:;,...:'+++''';'';';;;;:;;:::::::::;;:::::::::::::,,,,,::;'':``,`..:;;:;;.........................``````````````````````````,.,,,.`````````````.. ``````````````````````````````,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;:::::::;;;;;;;;;;;;;:;;::::,,,,:'';::,,,;;....,::....,:++++++''''''';;;;;;::::,,,,,,:::::::,,,,,,::,,:;'':` ``:.`.:;;::;,............``````````````````````````````````````,..,,.``````````..... ``````````````````````````````;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;;;;;::;;;;;;::;::::::'';:::';,...,::..`..,;....:''''''''';;;;;;::::,,,,,,,,,,,,,,,::,::;;'':` `.:,..;'::;;:...........```````````````````````````````````````,.,,,.``````....,,,,, ```````````````````````````.`,'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;:::;'':;':,...,;:..`..,'..````:'''+'''';;;;;;:::::::::::::::::::::;'':,,:```..:,..''::::;..`.....``````````````````````````````````````````,,,,,.````...,,,,,,,, `````````````````````````````;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::;:;;;''''::...,;:,.`..,'.......:+':,`.,:;'';;;;:::::::::::::;;;;;';,``` :.....::.,''::::;,.......``````````````````````````````````````````,,,,,.`...,,,,,,,,,,, ````````````````````````````.';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;:;;;'+':,..,;:,``..,;.````...;.```````,''';;;;;;;;;;;;';;;:;'':` ```:,....::.:'':::;;:`.....```````````````````````````````````````````.,,,,,.,,,,,,,,,,,,,, ````````````````````````````;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::;:;:;'+':,:;:,``.,::.`````..:........,:+':....:'+''';.`````,',`````.,,....:;,:'':::;::`....````````````````````````````````````````````.,,,,,,,,,,,,,,,,,,,, ``````````````````````````.`';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::;;;;''';;:,`..,;,.`````..:...```...:':` `` ``.'++```````.;,`````.,:,...:','';:::;;;..``````````````````````````````````````````.``...,,,,,,,,,,,,,,,,,,,, ```````````````````````````:;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;:;'+':,...,',.`````..;...`````.,;,..``````.';``````..:,`````..:,..,:';++::::;;;..``````````````````````````````````````.......,,,,,,,,,,,,,,,,,,,,,,, ```````````````````````````';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;;::::::::::::;'+';,..,'...````..;...`````.,'..........;,........:,````...;,.,,;'+'',::;::;.`.`````````````````````````````````..,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ````````````````````````.`,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;;;:;'+':,;',,...```.;...``````,'.`````....',`.......,:``.`.`.;..,,''+':::::::;.`.````````````````````````````````.,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,, ``````````````````````````;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;'';'';'';;;;;;;;;;;::::;;;:;;;;;::;++''',,......,:..```````,'.`````....',`.......,:``..``.;,..:++;,,,:;:::;...``````````````````````````````.,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,, `````````````````````````.';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;::;;;:;;;;;:;'++':,,.....::..```````,'.`````...`':`........:.`.....;,.,'+;,,,::;:::;.```````````````````````````````.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ````````````````````````.,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;';;;;;;;';;;;;;;;;;;::::;::::;;;;::'++;,.....::...``````:'.`````.`.`;:`........:,``...,;:,''::,,,::;:::;.````````````````````````````..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ````````````````````````.:;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'';;;;;;;;;:::::::::;;;;:::;'+;,..,;;....`````:'.`````.`..;:`.......,::``...,;;'':,,,,,::;:::'``````````````````````````...,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,, `````````````````````````;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;::::::::::;:;::;'+;,:';.....````;'.`````.`..;;...```..,;;``.`.,+'::,,,,,::::::;:`````````````````````.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,, ````````````````````````.';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;::::::::::;;;;::'+'';.........;;,`..```...;;...```..,;'````,;;:,,,,,,:::::::'.``````````````````.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .......`````````````````.';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;::;;;;::::::::::::::;;::;;';,.......;;.```````..;;,````..,::;,`.:;:,,,,,,,:::::::;'`.``````....,.......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ............`````````...,;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;';;:::;:::::::::::::::::::;::;';,,,.,;;...````...;;:``.`.,:;:;;;';:,,,,,,,,:::::::';``````..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,, ........................:;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;::::::::::::::::;:;:::::;;';;;;:..`...,.,;;;,.,,,:;;;'+':,,,,,,,,:::;::::;',```..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,:,::::,,,,,, ........................;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;::::::::;:;:;;:;;''',.....,,;;;;;:::;;'+';:,,,,,,,,,:::::::::';`..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,:::,,,,,,, ........................';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;::::;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::;:,,:::;:::;;;;;::;;;'';;;;;;;';;''+';:,,,,,,,,,,,:::::::::'',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,, ........................';;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;;;;;;;;;;;;;;;;;;;;;::;::;;;::;::::;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::,,::,,::::;;;;;;::;;;;''''++';:::,,,,,,,,,,,,:::::::::;':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .......................,';;;';;;';;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;;;;;;:;:::;;;;::::::::;:;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::,,,,,::::::;;::;;;;;;;;:::::,,,,,,,,,,,,,,:::::::::;'',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................,...,,';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;;;;:::;::;;;;;:;::::::;:;;;:;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::,,,,::,,,::,,,:;;::::;::,,,,,,,,,,,,,,,::::::::::;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,::: ..................,...:,';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;::;;:::;;::::::::;;:::;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::,,,:,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::;;''',:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::: ..................,,.,:,';;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;::;:;;;;:::::;;;::::;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::,,:::,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::;;'''',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::: ,.....,,..,...,...,:.:,,';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;:::;;;;;;:::::;;::::::;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,:::::::::::;'''''::,,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::::::::::: ,,,...,,,.,..,,,,,,:,:,:';;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;::;;;;;:;:::::::::::::::;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::,,,,,,,,,,:::::::::::::::;''''''':,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::::: ,,,...,,,.,.,,,,..,,::,:';;;;'''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;::;:::;;;;;:;;::::::::::::::::;;;;;;;;;;;;;;;';';;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::;''''''''',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::::::: ,,,,.,:,,,,,,,,,,,,,::,:';;;;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;:;;:;:::::::;;;;;::::::::::::::::::;;;;;;;;;;;;;;;;;';';;;;;;;;;::::::::::::::::::::::::::::::::::::::;;''';'';;''',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::::::: ,:,,,,:,:,,,,:,,,,,,::,:';;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;;;;;;::;::::;;;::::::::::::::::::::;;;;;;;;;;;;;;';;;;;;;;''''';;;;:::::::::::::::::::::::::::::::::;''''''';;;;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::,:::::::::::::::::: ,:,,,,:,,,,,,::,,,,,::,:';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;;;;;;;;;::::;;;::::::::::::::::::::;;;;;;;;;;;;;;;;;;;;;;';;''''''';;;;:;;:::::::::::::::::::::;;;'''''''';;;;;;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::;::::::: ,:::,,:,:,:,:::,,,,,::,:';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;;;;;;;;::::;;;;;:::::::::::::::::::;;:;;;;;;;;;;;;;;;;;;;'''''''''''''';;:::::::::::::::;;:;;''''''';;;;;;;;;;;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,:::::::::::::::::::::::: :::::::::::,:::,,,:,::::';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;:::::;;;;;;;;::::;;;;;;::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;'''''''''''''';;;;;;;;;;;;;;;;;'''''''';;;;;;;;;;;;;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::::::;:::: ::::::::::::::::::::::::';;;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::;;;;;;;;;:::;;;;;;::::::::::::::::::::::::::;;;;;;;;;;;;;;;;'''''''''''''''''';;;;;;;;;'''''''';'';;;;;;;;;;;;;;'',,,,,,,,,,.,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,::::::::::::::::::::;:::: ::::::::::::::::::::::::'';;;'''';;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;;;;;;;;:::;;;;;;;::::::::::::::::::::::::::;;;;;;;;;;;;;;;''''''''';;''''';'''''''''''''''';;;;;;;;;;;;;;;;;;;'':,..........,,,,,,,,,,,,,,,,,,,,,,,,,:::,,::,,,,,,:::::::::::::::::::::::::: ::::::::::::::::::::::::';;;;'''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;;;;;;;;:;;;;;;;;;:::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;''''';;;;;''''''''''''''''''';'';;;;;;;;::;;;;;;;''.....```....,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::::::::::::::::::::::: ::::::::::::::::::::::::'';;;'''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::;;;;;;;::::;;;;;;;:::::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;;;;;;;;;;';'''''''''''''';;;;;;;:;;;;;:::;;;;;;'',`........,.....,,,,,,,,,,,,,,,,,,,,,::::::,,::::::::::::::::::::::::::;:::: ::;::::::;::::::::::::::'';;'';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::;;;;;;:::::;;;;;;::::::::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;''''''';;;;;;;;:::::;;;:::::;;;'';,,,,,....,,.,,,.......,,,,,,,,,,,,::,::::::::::::::::::::::::::::::::::;:::: ::;::::::;::::::::::::::'';;'';'';;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;:::::;;;;;;:::::::::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;::::::;;;'';:::::,,,,,,,,,,,,,,,..........,,,,,,::::::::::::::::::::::::::::::::::;::::: ::;;:;:::;;:::::::;:::::;';''';';;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;:::::::::::::::::::::::::::::::::::::;::;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::;;;''::,,,,,,,,,,,,,,,,,,,,,,,,..........,,,,::::::::::::::::::::::::::::::::::::: :::;;;;::;;:::::::;::::;;'';''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::;;;;;;:::::::::::::::::::::::::::::::::::::::::;;:;;;;;::;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::;;;;'':::,,,,,,,,,,,,,,,,,,,,,,,,,..,,..,.....,,,,,::::::::::::::::::::::::::;;:::: :;:;;;;;;:;;;;:::;;;:;:;;'';''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;:;;::::;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;:::::::::::::::::::;;;;'',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,........,,,,::::::::::::::::::::::;:::: :::;;;;;;:;;;;:::;;;:;:;;';''''';;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;;;;;;;;;:::::;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::;::;;;;;;;;;:;:::::::::::::::::::::;;;;;';,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::,,,,...........,,,,:::::::::::::::;;:::: :::;;;;;;::;;;;::;;;:::;;''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;;;;;;::::::::;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;;;;;::::::::::::::::::::::;;;;;';,:,,,,,,,,,,,,,,,,:::::::::::,::::::::::::::,,,,..........,,,,:::::::::;;;::: ;::;;;;;;;;;;;;;:;;;:::;;'';'''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;:;;;;;;:::::;:::;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;::::::::::::::::::::::::::;;;;';':::::,,,,,,,,,,,,,,,,,,::::::::::::::::::::::::::::,,.......,,:::::::::;::;::: ;:;;:;;;;;;;;;;:::;;;;:;;;';'''''';;;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;:::::::::;:;::::;;::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;:::::::::::::::::::::::::;;;;;;';:::,:,,,,,,,,,:,,,:::::::::::::::::::::::::::::::,,,.....,,:::::::::::::::;::: ;:;;:;;;;;:;:;::::;;;;:;:;''''''';;;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;::::::::::::::::::::::::::;;;;;;';::,:,::,:,,,,::::::::::::::::::::::::::::,,,,.........,:::::::::::::::::::;;:; ;:;;:;;::;;;::::::;;;;:::;'''''''''';;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;;;;;::;::::::::::::::::::::::::::::::::::::::::::,::::::::::::::::::::::::::::::::::::::::;;;;;;';:::,,::::::,,:::::::::::::::::::::::,,,...........,,,::::::::::::::::::::::;:: ::;::;;;:;;;::::::;;:::::;'';''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;;;;::::::::::::::;;;;;;;;;::::::::::::::::::::::::::::::::::::::,,,,,::::::::::::::::::,,,,:::::::::::::::::;;;;;''::,:,:::::::,::::::::::::::::::,,,......`......,,,:::::::::::::::::::::::::;::: ;:;:::;;::;;:::::::::::::;''''''''''';;;;';;;;;;;;;;;;;;;;;;;;;;;;:;:::::;:;;;::::::::::::;;:;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,::::::::::::::,,,,,,,,,,,,::::::::::;;;;;'':::::,:,::::::::::::::::::,,.............,,,,:::::::::::::::::::::::::::::::::; ::;::::::::;:::::::::::::;;';'''''''';;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;:::;:;;;;:::::::::::;;;;;;;;;:::::::::::::::::::::::::::::::::::,,,,,,,,,,,,:::::::::::::,,,,,,,,,,,,,:::::::::;;;;;';::::::::,,::::::::::,,,...........,.,,,,::::::::::::::::::::::::::::::::::::::: :;::::;:::;:::::;:;::::::;;';'''''''';;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;:::::::::::;;;;;;;;;:;::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,::::::::::,,,,,,,,,,,,,,,:::::::::;;;;'';:::,::::::::,,,,,,................,,,,::::::::::::::::::::::::::::::::::::::::: :;:::::;::;:::::;::;:::;;;;'';''''''';';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;;;;;:::;;;:::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,::::::::,,,,,,,,,,,,,,,,:::::::::;;;;'';:::,:,:::::,,,..............,..,,,,,:,::::::::,:::::::::::::::::::::::::::,:::, ::;::::;::;::;::;:::;::;;;:'';'''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;:::::::::::::;:;::::::;:::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,:::::::,,,,,,,,,,,,,,,,::::::::;;;';''::::,,:::::::,,,..........,,,,,,,,,,,,,::::::::::::::::::::::::::,:::::::::::::, ::;::;:;:::::;::::::;::;;::;'''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;;::::::;::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,::::::,,,,,,,,,,,,,,,,:::::::::;;'''';,,,:,:::::::::,,,,,,,,,.,,,,,,,,:,,,,,,,,,:::,:::::::::,,::::::::::::::::::::::, ::;::;;;;:;;::::::::;;;;;;;;'';''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::;;;:::::;::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,::::,,,,,,,,,,,,,,,,,::::::::;;;'''';,,::,,:::,,,::::,,,,,,,,,,,,,,,,,,,,,,,,,::::,,::,,,,:::::::::,,::;;:::::::,::,, ;:;::;:;;:;;::.,::;:;;;;;;;:'';''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;;;;::::;::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::;;;''''':::,:,::,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;;,;:,::::::::::, ;;;;;:;:;;:;::,,..;::;;;;;:;;';'';'''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;;;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::;;;;''''':::,,,:,,:,,,:,,:,,,,,,,,,,,,,,,,,,,,,,,,....,.,,,,,,,,,,,,,,,,,,:::,,,,,:::::::: ;;;;;:;;:;::..,,,::::;;;;;;;;''''';''';'';;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;;;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,::::::::;;;;;'''';,::,:,,:,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....................:;......,,,,,,,, :;;;;::;::;..,,,,..::;;;;;;;;;'''';''';'';'''';;;;;;;;;;;;;;;;;;;;;;;;;;;::;;;;;:::::::::::;;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,::,,,,,,,,,,:::::::;;;;;;'''';,:,:::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................:;,............. ;;;;;;::;:;:;,,,.:,:;;;;;;;;;;''''''''';;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,::::,,,,,,,,::::::::;;;;;''''':::,::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,....::,............. ;;;;;;::::;;;,:,.::::';;;;;;;;''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;;;;::;:::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,:,,::::::::,,,,,::::::::;;;;;''''';:::::::::,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...,;:....``....... ;;;;;::,,::;;;;:,::::;;;;;;;;;;+''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;::::::::::::;;;;::;:::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,:::::::::::::,,,::::::::;;;;;'''''';:::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::,......,:;...````````.. :;;;:,,,,,::;;;;;;::.,;;;;;;;;:''''''''';''''';;;;;;';;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::;;;;;;;:::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,:::::::::::::,::::::::::;;;;;'''''':::;::::::::::,,,:,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...........::,..````````.. :;;;;;,.:.,:;:;;;;::.`,,.:;;;;;'+''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;::::::::::::::;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,::::::::::::::::::::::::::;;;;''''''':::;:::::::::,::::,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................:::..`.```..`.` ;;;;;::.::,;;;;:;,,:,...,:;;;;;;+;'+''''''''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::;::::;;;;;::;:::::::::::::::::::::::::::::::::::::,,,,,,,,:::::::::::::::::::::::::::;;;''''''';::;::::;::::::::,:,,,,,,:,::,,,,,,,,,,,,,,,,,,,,....................:::......``.`.. ;;;;;;;:;:;;;;;::```,,,:,.,;;;;;++'''''''''''''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::;:::::;;;::;::::::::::::::::::::::::::::::::::::,,,,,,,,:::::::::::::::::::::::::::;;;;''''''':::;:::;:::::,::,:,,:,,:::::::::,,,,,,,,:,,,,........................,::.......`.`.` ;:;;;;;;;;;;;;;;:.`,:.,,,.,;;;;;;+'''+'''''';''';'';;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;:;::::;;:::;;;;::;;::::::::::::::::::::::::::::::::::::,,,,,,,::::::::::::::::::::::::::;;;;;'''''''::;':::;::;;:::::,::,,,,,,:,:::::,,,,:,,,..................`````.....:::....```.`... ;;;;;;;;;;;;;;;;;;::``,`.;;;;;;;;+'''+'''''';'''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;;;;;;;::;:::::::::::::::;::::::::::::::::::,:::::::::::::::::::::::::::::;;;;;;;''''''';;;';:;;:;;;::::::::,,,,:::,:::::,,,,....................``````......:::...`````.,., :;;;;;;;;;;;;;;;;;;...;`..;;;;;;;'+'+'''''''';;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;;;;;;;:;;::::::::::::::;;;;:::::::::::::::::,,:::::::::::::::::::::::::;;;;;;;'''''''';;;;;;;;;;;:;:,:::,:,:,:::::,:,,,,..............`...`.````````......,::,...`....,,,, ;;;;;';;;;'';;;;;;;:,;';,:;;;;;;;;++'''''''''''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::;;;;;;;;;;;;;;;;:::::::::::;:;;;;;;;::::::::::::::::::::::::::::::::::::::::;;;;;;';''''''+;'';;;;';;;;;;:,;:::::::::,,,,,,,...............``.````.`.``````.....,::::.....,,,,,,, ;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;+'+''+'''''''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::;;;;;;;;;;;;;;;;;:::::::::::;:;;;;;;;:::::::::::::::::::::::::::::::::::::::;;;;;;;''''''''+;'';;;;;;;:;;;:;;:::::,,,,,,,..................````````.`.``````....,:::;,...,,,,,,,,, ;;;;;;;';;;;;;;;;;;;;;;';;;;:;;;;;;'''';''''+'''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;;;;;;;;;;;;;:::::::::::;;;;;;;;;;:::::::::::::::::::::::::::::::::::::;;;;;;;''''';''+';'''';;:;::;;::;;::,:,,,,,................````````````..`.`````....,::::::.,,,,,,,,,,, ;;;;;;;;;';;;;;;;;;';';'';;;;;;;;;;;''+;''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;:;;;:;::::::::::::;;;;;;;;;:;;;:::::::::::::::::::::::::::::::;;;;;;;;;'''''''++'''''';;;;:;;;:;;::;::,.:...............````````````..``,..``.`.`...:::::,,,,,,,,,,,,., ;;;;;;;;;;;;;;;;;;;;'';;;;;;;;;;;;;;';+;+'''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;:;;;;::;;;:;::::::::::::;;;;;;;;::;;;::::::::::::::::::::::::::::::;;;;;;;;;''''''''+'''';;;;;;;;;;;;;;:::::.:,,,,..........``````````.```..``,..``.``...,::::,,.,,,,,,,,,,.. ;;;;;;;;;;;;;;'''';;;'';';;;::;;;;;;;;';+''+'''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;;::::;;;;;:::::::::;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::;;;;;;;;;''''''''''+';;;;;;;;;;;;;;;;;;;;:;:,:..:........`````````````..``..``,,..,,....,.;::,,,.,,,,,,,,,... ;;;;;;;;;;;;;;;;''';;';;;;;;;;;;;;;;;;';+;'''''''';''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;:::::;;;;;::::;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::;;;;;;;;;;'''''''''++';;;;;;;;;;;;;;;;;;;;:;:;,.::.....````````````````..``....,,.,,`.,,.,,::,,,,.,,,,,,,,,,,, ;:;;;;;;;;;;;;;;;;'';;;;';;;;;;;;;;'';;'';'++'+''''''''';;;;;;;;;;;;'';;;;;;;;;;;:;;;;;;;;;;;;;;;;::::;;;;:::;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::;;;;;;;;;;'''''''''++''';;;;;;;;;;;;;;;;;;;;;:;,:;:.,:.````````.``.``````..``.,.,,,,..,,.,,,,:,,::,,,,,,,,,,,:: :;;;;;;;;;;;;:;;;;;;;;'''''''';;;';'';;;;;+''++'''''''''';;;;;;;;;;''';;;'';;;;;::;;;;;;;;;;;;;;;;:::;;;;;;;:;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::;::::;;;;;;;;;;'''''''''++';;;;;;;;;;;;;;;;;;;;;;;;;;;;;:,:,```````..```.``````....,,.,,,,.:,,,,,,,:,,,:,,,,,,,,,,,,, :;;;;;;;;;;;;:;;';;;';''';;;;'';;';;;;;';;+'+++''''''''';;;;;;';;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;:::;;;;;;;;'''''''''''++';''';;;;;;;;;;;;;;;;;;;;;;;;;;,,;,````````````.``..`.`,,.,,.,,,,,,,,,,,,,:.,,,,,,,,,,,,,:,, ;;:;;;;;;;;;;::;';;;;;;';'';;;;;;';;';;;''''+++'''''''''''';;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;;:;;;;;;;;;''''''''''''++''+'';;;;;;;;;;;;;;;;;;;;;;;;;;;,::``,`.`.,`.```,```...`.,,,,,,,,,,,,,,,,,,:,,,,:,,,,,,,::::: ;;:;;;;;:;;;;;:;;;;;;;;;;;;;;;;;;;'''';'''''+++;''''''''''';;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;:;;:;:;;;;;;;''''''''''++++''''''';';;;;;;;;;;;;;;;;;;;;;;::::.,,...`:`.```.``..,.,,,,,,,,,,,,,,,,,,,,,,,::;:::::::::::: ::;;;;:;:;;;;::;;;;;;;;;;;;;;;;;;;;;'+';';'''+';''+''''''''';''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;;;;;;;;;;;;;'''''''''''+++++''''';;''';;;;;;;;;;;;;::;;;;;;;;:::...,.;.````.`.,.,,..,,,,,,,,,,,,,,,,,,,:,::::::::::::::: ::;;;:;;::;;;::;;;;;;;;;;;;;;;;;;;'';;';''';''';'+''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';''''''''''+++++''''''''''';;;;;;;;;;;;;;;;;;;;;;:::;,,,::`;.``....`..,,,,,,,,.,,,,,,,,,,::,::,:::::,,:::::::: ::;::;;;::;;;;::;;;;;;;;;;;;;;;;;'';;'''''''''';;+'+';''''''''''';;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'''''''''''+++++'''''''''''';;;;;;;;;;;;;;;;::::;;;;;;::;;:,;,``:..,`,,,,,,,,,,,,,::,:,,,:::::::,::::,,:,:::::: ::;::;;;::;;;;;:::;;;;;;;;;;;';;;';;';;'''';;'+;;+++;;';''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;':;;;;;;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'''''''''''''++++'+'+'''''';';;;;;;;;';';;;,..,:,;:;;;;;;:;;;:;:,.;`,:.,,,,,,,,,,,:,:::,,::,:::::::::,,,,:::::::: ::;::;;:;;;;:;;::;;;;;;;;;;;;;;;;;;;;''''''';'';;''+;;''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'''''''''''''++'+'''''''''''''';;;;;;;;;;;;:,,,,,:,,:;:;;;;;;';:;;.;,,,,,:,,,,,,,,:,,,,:,,,,,,:::::::::::::::::::: ;:::::;;:;;:;;::;;;;:;;;;;:';:;;';;;'';'';;';;'';;'';;+++''''''''''''';;'''';;;;;;;;;;;;';;;;;';;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'''''''''''''++++++''''''''''''''';;;;;;;;;;;;;;:..,,,,:;;;;;;;';:;;;::,,:,;,,,,,:::::::,,,,,,,,:::::::::::::::::::: ;:::::;::;;;;:;:;;;;;;;;;;:;;:;;';;;''';;;;;';;';;;;;;++'''''''''''''''''''''';;';;;;;;;;'';;';';;;;;;;''';';';';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;''';;;;'''''''''''+++++++++'''+'''''''''';;;;;;;;;;;;;;;;..,.:.::;;;:;::';,';';;,:;,;,,:,:;:::;,:::::::::::::,::::::::::::::: ;:::;;;::;;:;:;;;;;;;;;;;;;;':;;';''''''';;'';;';;;;:'+;+'''''''';;'''''''''''''''';;;;;;;''';;;;;;';';'''''';''';;;;;;;;;;;;;;;;'';;;;;;;;;'''''';;'''''''''++++++++''''''''''''''';';;;;;;;;;;';';;;;,;:,;::;:.,:::,:':;;';;:;;:;:,;,;;:::;:::::::::,:::,,::::::::::::::: :;;::;::;;,.,:;;;;;;:;;;;;;:':;;''''';;'';;';;;;;;';;';'+''++''''';;'''''''''''''''''';;;''''';;'''''''''''';;'''';;;;;;;;;;;;;;;;;;';;''''''''''''''''''++++++++++''''''''''''';''''';;;;;;;;;;;;';;;;;;;;;;;,.,..,,,;;;;;';',;;:;:,';':;::':::;:,,,:::::::::::::::::::::: ;;;::;;::,...::;;;;;;;;;;;;;;;;;;';;;;;'''';;;;;;:';;;;+';;;'+++'';;'''''''''''''''';''';'''''';'''''''''''';'''''''''''';;';;;;;;'';'''''''''''''''''++++++++++''''''''''''';'';'''''''';;;;;;;;;'';;;;;;;;;;::,.:.:,:;;;;';':';;';:''::;:;':::;:::::::::::::::::::::::::: :;;;;;;::....,;:,:;;;;;;;:;';;;;;';;;;;;'''';;;;';;';;;;:;;;;'+'++';;''''''''''''''';'''';''''';''''';'''''''''''''''''''''''''''''''''''''''''''''''+++++++++'''''''''''''''';';'''''';;;;;;;;;;;;;';;;;;;;;;;;,,',:;;;;;;;;;;';;';;''::':;':::':::;;::::::::::::::::::::: .:;;:;;:,....,;..,;;;;;;;;:'';'';;;;;;;;;'''';;;';;';;;;'';';;'';++;:'+'';;''''''''';'''''''''';;'''';''''';;'''''''''''''''''''''''''''''''''''+''+++++++'+'''''''''''''''''';;;;''''';;;;;;;;;;;;;;;;;;;;;;;;;::;;;;;;;;;;;;;'''';'';;:':;'::;;:::;;::::::::::;:::::::::: ..:;,,::.....,:...;;::;;;';;;;'';;;;;;;;;;''';;;'';;;;;;+';+;;;';;+;;;+'';;'''';;;'':';''''';'';;''''''''''';''''''''''''''''''''''''''''''''+++++++++++++'''''''''''';''''''';;;;;''';;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;'''';'';;;';;'::';:::;;:::;:::::::::;;:::;:: .`.:,,,,.....,,,..,...;;;;;';''';;;;;;;;;;''';;;'';';;;;;';'';;;;;;'';'';;;;+''';;;':'';'+''''';;''';'''''''''''''''';''''''''+++''+''+'+++++++++++++'''+''';'''''''''''''''''';;;''';;;;;;;;;;;;;;;:;;;;;;;;;;;;;''';;;;;;;;;;;'';''';;;';;'::';;;;;;::;;;:;;:::::::;;:::: .`..,,,......,,,......;;:,:';';';;;;;;;;;;;;;;;''';;;;;;;;;;;;;;;;;';;;;;;;;'';;;;;':;';;''''';;;;'';''';;';'''''''''';''+''++''+;++'+++++++++++++++'+++'''';''''''''''''''''''';;;';;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;';''';;;;';;';;';;;;:;::';::;;:;;:::;::;;;; ,...`.,,......,,......,....;';:;;;;'';;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;';';':;'';;;;;+:';;+';;;';';;''++'''+++;;++;;++''+;++;++++;++++++++++'''''''';''''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'';';;;';'';;'';'':;:;;;:';::;;::::::::;; .,.....,......,,...........;:..,:;';;;;;;;';;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::';:;;;;'';;;+';';;;+;'+++'''++++;;++;;++;'';'';'+';'++++++'++'';;''''';''''''''''''''';'''';;;;;;;;;;;;;;;:;;;;;;::::;::;;;;;;;;;;;;;;;;;;;;'';';;'';'';'''''':':;;:;';::;;;::::::;;: .,,....,,....,,,....`............,:;;;;;;;';';;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::';;;;;;'+;;:+';';;;';+++''''++++;;;+;;'';'';'';+';;'++'+++++''';;;''';;';''';';;'''''';'''';;;;;;;;;;;;;;;;;;;;;;::::,,:;;;;;;;;;;;;;;';;;;''';';';';'';'';;'':';';;';';:';:::::::;;; ,..,....,....,,,.........`........:;;;;;;;;;;;;;';';;;;;;;;;';;;;;;;;;;;;;;::;;;;;;;;:;;;;;;;''';;;;;';;;;'''''''';;''+;;'';';;'';'';';;;'+'++''''''';;;''';';;'';;';;''''''''';;;;;;;;;;;;;;;;;;;;;;,::,,,,.,;;;;;;;;;'''';;;;;;;'';';;;';''''';;'';;;';;';';:';:;;::::;;; .,,.,,,.,,...,,,....`............,;;;;;;;;;;';;;''';;;;;;;;';';;;;;;;;;;:;;:::;;;;;;;:;::;;;:;;;;;;';;;;;;';'';;''';;;';;;;;;+;';;';'';;'++'''''';'''';;;';;';;''';';;;';'';;;;;;;;';;;;;;;';;;;;;;;:::.,,:,,,,;;;;;;;;;''';;''';;;';'';;';'''';;''';';';';;'':';:;;;;;;;;; ..,,,,,::::::::,...`...........,::,,,;;;;;;;;;;;''';;;;;;;;';;;;;;;;;:;;;;;;:::;;:;;::;::;;;:;;';::;'':;;';;';;;+'+';;;;;;;;;+;;;;';';;''+''''''';;''';;;;;;;;;'';;;;;;'''';;';;;';;;;;;;;;';;;::;;;'::,.....:;;;;;;';;;';'';;';;;'';';;;';;;''''''';';;;';;'';';:':;;;;;;; ..,,,::,,`..,,,,..........`...,......:;;;;;;;;;;;;;;;;;;;;;;++#@@@@#+';;;;;;;:::;;;;:::::::::::;::::;':;;;;;';;;;;;'+':;;:;;;;';;;'';;;;'';';;''';;;'';';;;:;;;;;;;;;;;''';;;'';;;:;;;::;;;;::::::;;;:::.,,:;:;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';';;;;;;;;;'; ,,,,:...,.,,,,,@@@@@@@@@@@@@@........:;;;;;;;;;;;;;;;;;;;#@@#;,` `.;#@@#;:;;;:::;;;;:::#@@@@@@@@@@@@@@;;;;;;';;;;;;;'';;;;;;;;;;;;;;@@@@@@@@@@@@@;;'';';;'#@@@@@@@@@@@;''';;;;;#@@@@@@@@@@#;@@@@@@@@@@@@@@@;;;;;;';;@@@@@@@@@@@;@@@@@@@@@@@@@@@@@@@@@@@@@@@@@''';;';':;;'; ,,,:,,,,,.:::;,@ @.......:;;;';;;;;;;;;;;';;@@; ;@@;;;;::;:;;:::@ @;;:;;'';;;;';;;;;:;;;;;;;;;;;;@ ;#;;';';;;@ @;''';;;;;@ :#;@ @;';;;;;;;@ @;@ ;';;;';;':';; .,:,,,:,,;;::::@ @.,..,,,;;;;';;;;;;;;;;;'#@, ,@#:;;::::::::@ @;;;;;;;;;;;;;;;:;;;;;';;;;;;;;@ `@;;;;;;;'@ ++;'';;;;;@ #+;@ @;;;';;;;;@ @:@ ;';'';;'':';; .;,,::;::;:;,,,@ @...,,:;;;;;;';;;;;;;;;;@# +@;:::::;;::@ @;;;;;;;;;';;;;;;;:;;;';;;;;;;;#: @;;;;;;;#' .@'';;;;;'# @;;@ @;;;;;;;;;@ @:@ ;';'''''';';; .:,:;:;;;:::,,,@ @,:;;'';;;;;;';;;;;;;;;@: ,@;:;:::::;@ @;;;;;;;;;;;;;;;;;;::;';;;;;;;''# @;;;;;;;@. @''';;;;#, `@;;@ @;;;;;;;;;@ @:@ ;''''''';'';' ..::;,,.:;,.,,,@ @;'';'';;;;;';';;;;;;;@: .@::;:;;:;@ @:;;;;;;;;;;;;;;;;;;:;;;;;;;;;;:@ '+;;;;;;@ @;;;;;;;@ ;#;;@ @:;';;;;;;@ @:@ ;'''''''''';; .,:;;,,..;..,,,@ @;;';;;;;;;';;;;;;;;;@; ,@:::;;:;@ @;;;;;;;:;;;;;;;;;;;;:;;;;;;;;;;@ .@;;;;;;@ +#';;;;;@ @;;;@ @:;;;;;;;;@ @:@ ;''''''';';;' .:,,::......,,,@ @;;;;;;;;;;':....,:;## ;#,;;;:;@ @;;:;;;;:;;;;;;;;;;;;;:;;;;;;;;;#; @;;:;;++ .@;';;:'# @:;;@ @;;;;;;;;;@ @:@ ;''''''''';'' .,,:::.,....::,@ @;';;'';;;;;.......:@ @';;;;;@ @;;;;;;;:;;;;;;;;;;;;;:;;;;;;;;;'@ @;;;;;@. @;;;;:#: `@:;;@ @;;;;;;;;;@ @:@ ;'''''';'';'' ....::......::.@ @;'';''';';:..`....@, :#@'` `@:::;;@ @;;;;;;;;::;;;;;;;;;;;;;;;;;;;;;;@ ++;;;;@ @;;;;;@ '+;;;@ @;;;;;;;;:@ @:@ ''''''';''''' ````.....,.,:,,@ @,;';;';'';:..`....@ `@#';+@' @':;;;@ @;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;:@` ,@;;;;@ ++;;;;@ @;:;;@ @;;;;;;;;:@ @;@@@@@@@@@ @@@@@@@@';''''';''''' .```.,..,,,,:,;@ @..,;';'''',..`...#; @;;;;;;@: .@:::;@ @;;;;:;;;;;;;;:;';;:;;;;;;;;;;;;;#' @:;:'+ `@;;;'# @;;;;@ @;;;;;;;;:@ @;;;;;;;;:@ @;;;;;;;;'''''''''''; ..`..::,:,,,';+@ @....:';;''..``...@ @+:;;;;;;@ @:;;:@ @;;;;;;;;;;;;;;;;;'::;::;;:;;;;;;;@ @;;:@, @:;;#: .@;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;';;''';'''''''''''' ,,,,:::'+;::+#+@ @`....:''';..``..:@ @,,,,:;;;@: +';;;@ @:;;;;;;;;;;;;;';''::;:;:::;;;;;;;@ #';;@ @;:;@ ++:;;;@ @;;;;;;:::@ @;;;;;;;;;@ @;';;'';;;''''''''''' ;::;;'++++++#++@ @``....:'';..``..+: ;#,.,,.,:;'# ,#;;;@ @::';;;;;;;;;;;':'';::;;;;::::;;;;@. :#::@ '#;:@ @;;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;''''''''''' ######+++'++#++@ @```.`..:';..``..@` @,......,;;@ @;;;@ @;;;;;:;;;;;;;';:'';;;';;;;;;;;;;;+' @;'# `@;;@ @;;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;';;;'''''''''; '''+#+++++##+#+@ @```..`..;;..``..@ @`.......::@ @;;;@ @:;;;;;;;;;;;;';;';;;;';;;;;;;;:;;;@ @;#, @;#; ,#:;;;;@ @;;;;;;;;:@ @;;;;;;;;;@ @;;;;;;';;;'''''''''' '';'+#####+++++@ @.```.``..:..`.`.@ @.......,.,@ @:;;@ @;;';;;;;;;';;';;'';;'';;;;;';:;::;@ @'@ @;@ #';;;;;@ @;;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;';';;''''' ''';;'+###+#++;@ @..```.`.....`.`.@ @.....,..,:@ @;;;@ @;;;'';;;;;;;:.:;';';'';;;;';:;;:;;@, :#@ '+@ @;;;;;;@ @;;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;;;;''''' ''''';;'++#+++,@ @...``..`....`.`.@ @...,,,,;;;@ @;;;@ @;';;';;;:...,;::';'''';;;'';:;;:;;'+ `@# : `@@ @;;;:;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;;'';'''' '''''''''++++';@ @....``..`...`.`.@ @.,,,.,,.,;@ @;;;@ @''';';;:.``.,;;,;;;;;;;;'';;:;:;;::@ @: # @; :#;;;;;;@ @:;;;:;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;'''''''' '''''''''+++'''@ @,....``.`...`.`.@ @,,......,.@ @;;;@ @;';:;;;.``...:,,;;;;;';''';;;;:;;:;@ @ ,@ @` @';;;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;''';;''; ''''''''''++'';@ @::...``.`...`.`.@ @........,,@ @;;;@ @:;:,:';:::..,..`.:;;;;'''';;;:;;;;:@, ; #@ ' @::;;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;''';;;;; +++''''''+#+'',@ @.;;...`.....`...@ @........,.@ @;;'@ @:,,,:;;;':.:..`.`.;;;'''';;';;;;'';+# ` @#: ` `@:;::;;;@ @;;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;';;;;;;' +++++'''''#+'',@ @.`;;,.`..`......@ @..........@ @;;;@ @::,..,;;';';..`...;;'''';;';;;;;;';;@ @'# ;#:;;;;;:@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;'''';;;;;'' '''+++''''#+'+,@ @...,:...........@ @..........@ @;;;@ @,;,..,;;'''+:,::::';'''';';;;;;:;;;'@ ,@:@ @;;;;;;;:@ @:;:;;;;;;@ @;;;;;;;;;@ @;;;;;;;;''''';';;;'' +';''+++''#+'+,@ @...``..........,@. @:,.,,..,,:@ ,#;;;@ @:,..:;;;'';+;;';;;;;'';;;';;';;;;;;;#: ++;@ @;;;::;;;@ @:;;;;;;;;# @;;;;;;;;;@ @;'';;;;'''''';';;''; ++''''++++##'+;@ @`....`...,..,..,+' :#,,,..,,,+; #+;;;@ @,,.`.;;;'';';;;;;;;;;;;;'';;'';;;;'''# @;;#: `@;;:;;;;;@ @;;;;;;;;'+ @;;;;;;;;;@ @;';;;;;''''''''''';; ++++''''++##+'+@ @``....`..,,.,,,:,@ @,..,,,,,@` @;;;;@ @,.,::';;;'''';'';';;;;;;;'';;;;';;'';@ @;;'# '+;;;;;;;;@ @;;;;;;;;#' @;;;;;;;;;@ @;;;;;;''''''''';;;'; ''#++''''+#++''@ @.``...``.,,..:...@ +#,,,,,.'# .@;;;;@ @;.,;';;;;';;;:;;;';;;;;;;'';';;;;;;''@` .@;;;@ @:;;;;;;;;@` @';;;''''@` @;;;;;;;''@ @;;';;';''';''''';';, +'+++++';'##++'@ @@@@@@@@@@@@@@@##.++ @+,...'@` #+;;;;@ @@@@@@@@@@@@@@@@;:';;;;;;'';;';;;;;;';#; '+;;;@ @;;;:;;;;;#, .@';;;;'@' @;;;;;;;;'@ @;'';;'''''''';''':,, +'''++++''+#++'@ @::@ #@@@@#` `@';;;;@ @:;;;;;;;;'';;';;;;;;'';@ @;;;;#: .@;;;;;;;;;++ .@@@@@@, @;;;;;;;;;@ @;'';;''''''''''';,;: #++''++++'+##;,@ @;:++ @+'';;;@ @;;;;;;;;;';;;;;;;;;;;';@ @;;;;;@ ++;;;;;;;;;;@ :#;;;;;;'';@ @;''';''''''''''''':: +##++++'+'++;,.@ @:,,@. ;@;';;;;@ @;;;;;;;;;';';;;';;;;;';@` `@;;;;;@ @;;;;;;;;;;;@ @';;;;;;;;;@ @'';';'''''';'''''';; +++####+''+':,.@ @,:.,@ `@';'';;;@ @'';;;;;;';'';;;;';;;;;;#' '#;;;;;@ @;;;;;;;;;';++ `@+;;;;;;;;;@ @'';;'''''''''''''''; '++++++##+++:.,@ @::,.'@ @+';'';;;@ @;;';;;;;;;;;;:;;;:;;;;;;@ @';;;;;#; :#;;;;;;;;;;;;@. @+'+;;;''';;@ @'';;''';'''';''''''; +++++++###+++;,@ @,:,,;+@ `@+'''';;;;@ @;';;;;;';';;;;;;;::;;;;:@ @;;;;;;'@ #';;;;;;;;;;;;'@` +@;;'';;;;';;@ @;'';''';;''''''''''; +++++++++++###'@ @.;,:',;@` .@+';;';;;;;@ @''';;'';;;;;;;;;;;;;;;;;@. `@;;;;:;;@ @;;;;;;;;;;;;;;+@` +@;;;;';''';;;@ @;'';''';;'''';';'''; +''''++++++###+@ @::.,::.:@' +@''''''';;;;@ @;;;;'';;;;;;;;;;;;;;;;;:+' ;#;;;;;;;@` @;;;;;;;;;;;;;;;'@; @#;;;;;'':;;'''@ @:'';'';;;''''';;'''; ''+'''''+++##'+@ @;:,,::,;;#@: ;@#''''''''''';@ @:;;;;;;;;;';;;;;;;;;;;;:;@ @';;;;;;;#; ;#;;;;;;;;;;;;;;;;;@@: `+@+,;;;:;;'';';';@ @;;;;;';;;;'''';;;''; +''''''++++##'+# `@:;::':;;;;;#@#, ,#@@''''''''''''';@` #;:;;;;;;;;;;;;;;;;;;;;;;;@ `@;;;;;;;;'# @';;;;;;';;;;;;;;';''@@#:` `'@@#;;,;;;::;:'+''''@` `@;;;;;;';;'';''';;''; '''''''+#+++#'+@@@@@@@@@@@@@@@@@@@@@@@@@@@@@;:;;;',;:;;:;,'#@@@@@@@@@@#:,;'''''''''''''''@@@@@@@@@@@@@@@@@@@@@@@@@@@@#:;;;:;;;;;;;;;;;;;;;;;;;;+@@@@@@@@@@@+;;;;;;;;;#@@@@@@@@@@#;;;;;;';;'';;;;;;';';;'#@@@@@@@@@@@@#+':';:::;:,:';+'';;'@@@@@@@@@@@@;;;;;;;';;'';;;';;;;; '''''''+#++++'#+''+++#+''+,...```....,..:'''''';';;;:,:'':;,;:,..........,;''''''''''''''':,.::;;::;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;:;;;;;;;;'''++++'';:;';;:;;;''';;;;';''';:;;::;;::;''+;;;;;;;;;;;;;;;;;;;;;;;;;;';;;';;;;;; '''''''++++++'#++'++#++''.....``......`.:';;'+';;::';::+''':,,,..```.......:;'''''''';'';,..,:,:;,:.:;;;;;;;';;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;'';''';;';;;;;;;;;;;;;;;;;;;;;;;;;;;;+';;#;:''#':;;:;;:;+;''''''';';;':';::;;:::;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;';;;; ''''''++#++#+'#++'''+++:.....`......``..;,`.,;+';::+',,'++;......``````.....:''''''''''';,,;:.:.,.,:,,;;;;;'';;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;'';;;'';;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;++''+;+#';+;::''::::;'''''''';;';':';::;;;::;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; ''''''++#++#+'#++'''+'.............``...``..`,+''''+',';'',:::,,.............:'''''';;;';;;;.,:.,,.;:,,;;;;';;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;';;'';;;;;;:;;;;;;;;:;;;;;;;;;;;;';#++'+;;#+;:;''''';;;''''''''';';;';';;,;;;,::;;'';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;';;", "edit_actions": [{"type": "D", "before": "Stuart Ryan is running for the Communist Party in the Ontario provincial election in Ottawa Centre.Wikinews interviewed him regarding his values,his experience,and his campaign.", "after": null, "start_char_pos": 0, "end_char_pos": 177}, {"type": "D", "before": "Interview", "after": null, "start_char_pos": 178, "end_char_pos": 187}, {"type": "D", "before": "Why have you chosen to involve yourself in the political process? Why did you choose to run in this constituency? I have been involved in the political process for over 40 years,in terms of organizing over political issues such as opposing the Wars in Vietnam and now the wars in Iraq and Afghanistan.I see the elections,if that is what you mean as the political process,as a way to express our political views to the electorate so that they can pass judgement and see that the various issues we raise are related in that the capitalist system and the neo-liberal agenda take away the rights of workers,woman,aboriginals and people in general.", "after": null, "start_char_pos": 217, "end_char_pos": 860}, {"type": "D", "before": "I run in Ottawa Centre because I have lived in the riding since 1979 and I know the issues that concern the people who live in the riding.It has a progressive history and is open to socialist ideas.", "after": null, "start_char_pos": 861, "end_char_pos": 1059}, {"type": "D", "before": "What prior political experience do you have? What skills and insight can you bring to office,from other non-political positions you may have held?", "after": null, "start_char_pos": 1089, "end_char_pos": 1235}, {"type": "D", "before": "I have run for office in my Steelworker union in Windsor in the 1970s and in my Autoworker union now.I work for a CUPE union at Carleton University in Ottawa.I think I can bring my organizing skills in the labour movement,the anti-war movement and in the Central American solidarity movement to Queen\u2019s Park and in building a base within Ottawa Centre to fight for a people\u2019s agenda.", "after": null, "start_char_pos": 1236, "end_char_pos": 1619}, {"type": "D", "before": "Which of your competitors do you expect to pose the biggest challenge to your candidacy? Why? What makes you the most desirable of all candidates running in the riding?", "after": null, "start_char_pos": 1649, "end_char_pos": 1817}, {"type": "D", "before": "I think the biggest challenge to my candidacy is the feeling that people feel they have to vote NDP in order to win the riding,or to prevent a victory by the Liberal or Conservative party.This is a product of the first-past-the-post-voting system.I have had many people say that our ideas are good,and that I have been a good campaigner,but because they feel voting for the Communist Party might jeopardise the NDP.I think I would be the most desirable candidate because we have the best policies and that I would work very hard to make sure they are pushed for in the legislature.", "after": null, "start_char_pos": 1818, "end_char_pos": 2399}, {"type": "D", "before": "What do you feel are the three most important issues to voters in your riding? Are these the same top three issues that are most important to you? What would you do to address these issues?", "after": null, "start_char_pos": 2429, "end_char_pos": 2618}, {"type": "D", "before": "The three biggest issues in this riding are the crisis in public education;the increasing debtload of students because of tuition hikes;and the inability of municipal government to fund the social services downloaded by the Harris government form the province to the cities in 1997. They are my most important issues.", "after": null, "start_char_pos": 2619, "end_char_pos": 2936}, {"type": "D", "before": "Re public education:Our Party will commit to spending $20 billion for a quality public secular school system in French and English for primary and secondary education. We would commit to a comparable investment in public post-secondary education while reducing tuition by 50\\% now, and then eliminate it when the funding is adequate to provide the education for all who qualify for post-secondary education. We would give municipalities secure funding through provincial grants and the ability to tax corporations. This would wean them off the property tax, which we would reduce by 75\\%, along with the scrapping of the market value assessment taxation scheme. We would give 50\\% of the gas tax for mass transit such as the O-train in Ottawa that would travel both east and west and north and south. We would upload to the province the funding of health, education, transit and welfare. What should be the first order of business in the 39th Legislative Assembly? The first order of business schould be the drafting of the legislation to implement Mixed Member Proportional Representation, following its victory in the October 10 referendum. Are the property taxes in your riding at a fair level for the amount of services received in the municipality? The property tax situation in the province is in chaos. Home owners are seeing property taxes increase as the value in their neighbourhoods go up while the property tax of businesses are diminished by a comparable amount. The net increase in revenue to the municipality coming from the residential tax increases is zero. Outraged taxpayers are blaming the municipal officials and are taking it out by voting for right-wing candidates who promise not to raise taxes (In Ottawa the slogan was \u201czero means zero\u201d. The same candidate is now the mayor, and is backing a two per cent increase and campaigning to have the municipal financing system revamped. The property tax system discriminates against tenants as they pay for the extra taxes landlords pay through higher rents. How can the province lead the way in stimulating job creation? The province should take action to save the manufacturing jobs leaving the province by insisting that raw materials be processed in Ontario rather being shipped raw out of the country. It should pass legislation to establish public tribunals so that corporations who are closing profitable factories, such as Hershey\u2019s in Smith Falls and GM in Oshawa would have to justify their closing. Failure to do so would lead to the province taking over the closed business. Our Party would invest in mass transit and produce 100,000 units of social housing. What are your views on the mixed member proportional representation (MMP) referendum? I support MMP and will be voting for it. No longer will we have to choose between the lesser of two evils, and end up with the same mess. The last two governments in Ontario are proof positive of the problem. You will be able to vote for what you believe in and see it relected in the legislature. Of the decisions made by Ontario's 38th Legislative Assembly, which was the most beneficial to your this electoral district? To the province as a whole? Which was least beneficial, or even harmful, to your this riding? To the province as a whole? The only thing that was good for Ottawa Centre was the tuition freeze for two years. That was negated by the new tuition scheme that will raise tuition 25-35\\% over four years. You are running as a candidate for the Communist Party. A lot of people say that Communism is a dead idea or fear that a Communist government would implement some sort of repressive dictatorship. What do you say to this? Communism is not a dead idea; we see revolutionary parties win in Venezuela and trying to bring socialism in by democratic means. This was tried in Chile in the 1970s but was overthrown by the CIA and the Chilean military. What will succeed is that the working class and its allies will demand socialism; it was the insistence of the Venezuelan people that stopped the coup against Hugo Chavez in 2002. The system that they will bring will be democratic, as it will be the will of the people that it be so. The Communist Party is unlikely to win any seats in the election. Why did you decide to run for a small party rather than be involved with one of the major parties? This is a good question, but if you want to bring about real change, you must be part of a party that calls for it. Our Party calls for socialism, public ownership of the means of production under democratic control. Working for a party like the NDP and the Greens would make you feel that you might get things done, but those parties will disappoint you - look at the record of the Bob Rae NDP government in Ontario that opened public sector collective agreements to attack benefits in order to save $2 billion from its deficit.", "after": null, "start_char_pos": 2966, "end_char_pos": 7835}, {"type": "D", "before": "External links Stuart Ryan YouTube Election statement Communist Party,official site Elections Ontario", "after": null, "start_char_pos": 7836, "end_char_pos": 7937}, {"type": "R", "before": "Category:North America Category:Canada Category:Ontario Category:Ottawa,Ontario Category:Politics and conflicts Category:Elections Category:Elections in Canada Category:2007 Ontario provincial e", "after": ",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................................................................ ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::;:::,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::;;;;:::::;;:,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;;::;;;;;;;;;;;;:;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;;;:,:;;;;;;;;;;;;;';;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;::,,:;;''''''''';;;;;';;:;::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,....................................................``........................................... ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;;:,:;'+++'''++'''';'';;:;;:::;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................................````........................................... ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;;;:;'+++'''++';++';;;::;;;;;'';:;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................................````........................................... ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;+;:'+++'''''';;;;;;''''''::;':;'::,;;,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................`````........................................... ,,,,,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,;+':;+++''';;;;;'''+;++'''+'';:'';::,:,:;,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................`````........................................... ,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,:+':;'''+';;;'+'++'+'++'''''+'''':;'';::,:,;:,,,,,,,,,,,,,,,,,:::::::,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,........................................................``....................................... ,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,:''::'''';;''++++'''''++++##+++''+';::;'''';:,::,,,,,,::::;;;;;;;;;;;;;;;;;;;:;:::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,......................................................``....................................... ,,,.......,,,,,,,,,,,,,,,,,,,,,,,''::'''';:;'''';'+'++#########+++'';;:::'''':,,:::,::;;;:::::::::::;;;;::;;;;;;;;;;;;;;;;::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.,.....................................................`....................................... ,,.........,,,,,,,,,,,,,,,,,,,,;+::;'';;;'+'''+''+#++###':::::'###+'';;:;:'';:;'''+'::,,,:::;;;;;;;;;;;;:::::::::;;;;;;;;;;;;::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....................................................``...................................... ...........,,,,,,,,,,,,,,,,,,;+;:''';:;'+'''''''+@##++',,,,,,,,;+##++'';';':;''';:,,,:::;;;;;;::::::::::::::::::::::::::;;;;;;;;::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..................................`..............````..................................... ...........,,,,,,,,,,,,,,,,:'+:;'';;;'''''''''+#@+++:,,,,,,,,,,,,,'##+++';;''';;:,:::;;;;;;;;;;::::::::::::::::::::::::::::::;;;;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..................................`````.........```````................................... ...........,,,,,,,,,,,,,,,''':'';;;''''''''+++@#+':,,,,,,,,,,,,,,,,'#+++''+';:::;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::;;;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................`````........```````.................................... ...........,,,,,,,,,,,,,:''::';;;;''''''+''#@+;,,,,,,,,,,,,,,,,:,,,:#+++++;:,:;;;::::;;;;;;;;;;;::::::::::::::::::::::::::::::::::;;;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................``````...`````````...................................... ...........,,,,,,,,,,,,:+:::;;;;'''''''#+'@+,,,,,,,,,,,,,,,,,,,,,,,,'#+#':::;;;;;:::::::;;;;;;:::::::::::::::::::::::::::::::::::::::;;;;,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................````````````````````..................................... ...........,,,,,,,,,,,;+:;;'';''''''''+++#:,,,,,,,,,,,,,,,,,,,,,,,,,,#+;::::;;;;::::::::::;;;::::::::::::::::::::::::::::::::::::::::::;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................````````````````````..................................... ...........,,,,,,,,:';::''''+;'';''''+'#;.,,,,,,,,,,,,,,,,,,,,,,,,,,;+;,:::;;;:::::::::::;;:::::::::::::::::::::::::::::::::::::::::::::;:;;,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................````````````````````..................................... ...........,,,,,,,,',,:,'+;'''''''''+'#;,,,,,,,,,,,,,,,,,,,,,,,,,,,,+:,:::;;;;:::::::::::;:::::::::::::::::::::::::::::::::::::::::::::::;;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...............................``````````````````........................................ ...........,,,,,,,:':';:;''+'''''''''+,,,,,,,,,,,,,,,,,,,,,,,,,,,:,;::::::::;:::;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...............................``````````````````........................................ ...........,,,,,,,:++;':;;++''''+''++,,,,,,,,,,,,,,,,,,,,,,,,,,,,,;::::::::;:::;;:::;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..............................``````````````````......................................... ..........,,,,,,,,:++;'+;;+''''''+'+,,,,,,,,,,,,,,,,,,,,,,,,,,,,,;:::::;:;;;;;:;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.............................``````````````````.......................................... ..........,,,,,,,,,++;+++;''+'''++':,,,,,,,,,,,,,,,,,,,,,,,,,,,,;:::::;;;;;;:::;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;:,,,,,,,,,,,,,,,..,,,,,,,,,,,,,...........................```````````````````........................................... ..........,,,,,,,,,'#'++#';'+'''+':,,,,,,,,,,,,,,,,,,,,,,,,,,,,;:::::;;;;:::;:::;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;:,,,,,,,,,,,,,.....,,,,,,,,,,,,,.......................```````````````````............................................ ..........,,,,,,,,,'#''++#:;++'+';.,,,,,,,,,,,,,,,,,,,,,,,,,,,;::::::::;;::;;::;;::::::::::::::::::::::::::::::::::::::::::::::::::::,,::::::::::::::;:,,,,,,,,.........,,,,,,,,,,,,,.......................`````````````````.............................................. ...........,,,,,,,,;#+'++#':++'+',,,,,,,,,,,,,,,,,,,,,,,,,,,,:;,:::::::::;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::,::,,,,,,,:::::::::::::::,,.,...........,,,,,,,,,,,,,......................`````````````````............................................... ............,,,,,,,:#+;++#+:#+'',,,,,,,,,,,,,,,,,,,,,,,,,,,,:;:::::::::;;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,::::::::::::::,.,...........,,,,,,,,,,,,................````..`````````````````................................................ ............,,,,,,,,##;#+##:##+;,,,,,,,,,,,,,,,,,,,,,,,,,,,:;::::::::::;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,::::::::::::,.,,........,................,.........````````````````````````................................................. ............,,,,,,,,+#'#+##;+##,,,,,,,,,,,,,,,,,,,,,,,,,,,:;,:::::::::;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,:::::::::::,.......,.............................```````````````````````.................................................. ..............,,,,,.:#+'+##''#',,,,,,,,,,,,,,,,,,,,,,,,,,:':::::::::::;;;;;;;;;;;::::::::::::::::::::::::::::::::,:::::::::::::::,,,,,,,,,,,,,,,,,,::::::::::,,.....,,............................`````````````````````.`................................................,, ................,.,,.##''##+;@:,,,,,,,,,,,,,,,,,,,,,,,,,:;;:::::::;;:;;;;;;;;;;;::::::::::::::::::::::::::::::::,,,::::::::::::::,,,,,,,,,,,,,,,,,,,,,::::::::,....,,............................`````````````````````.................................................,.,, ..................,,.'#+:;#';@;,,,,,,,,,,,,,,,,,,,,,,,,,;;:::::;;;;;;;;;;;;;;;::;:::::::::::::::::::::::::::::::,,,,:::::::::::,,,,,,,,,,,,,,,,,,,,,,,,::::::::,.,.,..............................``````..``````````..................................................,,,,, .................,,,,,##;:'''@;,,,,,,,,,,,,,,,,,,,,,,,,;':::::;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::,,,:::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,::::::::,.,...............................``````..``````...................................................,.,,,,,, ..................,,..'#'::;##,,,,,,,,,,,,,,,,,,,,,,,,:;:::::;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::,:::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::,,,..............................`````....````.................................................,,,,,,,,,,, ....................,,,##'+#@'..,,,,,,,,,,,,,,,,,,,,,,;;:::::;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::,...............................````......................................................,,,,,,,,,,,,,,, .......................:#@#@#,,.,,,,,,,,,,,,,,,,,,,,.;'::::::;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::,.............................```.......................................................,,,,,,,,,,,,,,,, ......................,.,'++,.,.,,,,,,,,,,,,,,,,,,,,,';:;:::;;;;;;;;;;;;;;;;:::::;:::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::,..............................`.......................................................,,,,,,,,,,,,,,,,, ......................,.,....,..,,,,,,,,,,,,,,,,,,,,;'::;::;;;;;;;;;;;;;;;;:;::;;;:::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::,....................................................................................,,,,,,,,,,,,,,,,,, .......................,...,.,,,,,,,,,,,,,,,,,,,,,,,';:;;:;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::,,:::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::,..................................................................................,,,,,,,,,,,,,,,,,,, ...................................,,,,,,,,,,,,,,,,;';;;;;;;;;;;;;;;;;;;;;;;;;;::;;;::::::::::::::::::::::::::::::::::::,,,::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::...................................................................................,,,.,,,,,,,,,,,,,, ...................................,,,,,,,,,,,,,,,,'';;;;;;;;;;;;;;;;;;;;;;;;;;:;;;:::::::::::::::::::::::::::::::::::::,,,,::,,,,,,,,,,,,,,,,,,,,,,,,..,,,,,,,::::::::..................................................................................,,,,,,,,,,,,,,,,,, ...................................,,,,,,,,,,,,,,,:';;;;;;;;;;;;;;;;;;;;;;;;;;;:;;:::::::::::::::::::::::::::::::::::::,,,,,::,,,,,,,,,,,,,,,,,,,,,,,,....,,,,,,:::::::,.................................................................................,,,,,,,,,,,,,,,,,, ....................................,,,,,...,,,,,,;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,:::,,,,,,,,,,,,,,,,,,,,,,,.....,,,,,::::::::,................................................................................,,,,,,,,,,,,,,,,,, .....................................,.,.,..,,,,,.''';;;;;;;;;;;';;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::,,,,,,,,,,,,::,,,,,,,,,,,,,,,,,,,,,,......,,,,,::::::::,..............................................................................,,,,,,,,,,,,,,,,,,, .................................,,.....,...,,,,,,'';;;;;;;;;;;';;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,......,,,,,:::::::::.............................................................................,,,,,,,,,,,,,,,,,,,, ...............................................,.;'';;;;;;;;;;;';;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::,,,::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,......,,,,,,::::::::,...........................................................................,,,,,,,,,,,,,,,,,,,,, ...............................................,.'''''';;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::,::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,........,,,,:::::::::,............................................................,...........,,,,,,,,,,,,,,,,,,,,,,, ................................................,'''''';;;;;;';;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::,::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..,,....,,,,::::::::::........................................................................,,,,,,,,,,,,,,,,,,,,,,, ................................................,'''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....,,,::::::::::::....................................................................,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................:'''''''';;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.,,,,....,,,,,,::::::::::,....................................................................,,,,,,,,,,,,,,,,,,,,,,,,, ................................................;'''''''';;;;;;;;;;;';';;;;;;;;;;;;::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....,,,,,::::::::::...........................................................,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................;''''''';;;;;;';;;;;;';;;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,:,,,:,,,,,,,,,,,,,,,,,,,,,.......,,,,:::::::;:,.........................................................,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................''''''';';;;;;;;;;;;'';;;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,.......,,,::::::::::,........................................................,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................''''''''''';;;;;;;;;''';;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,.....,,,,::::::::::::........................................................,..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................'''''';''''';;;;;;;;''';;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,....,,,,,,:::::::::::,......................................................,..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................''';'''''''';;;;'';;''';;;;;;;;;;;;;:;::::::::::::::::::::,,,,:,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....,,,,,,:::::::::;:.......................................................,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................''''''''''';;;;''';;''';;;;;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,:,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.......,,,,:::::::::;;,......................................................,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................'''''';''';;;;;''';;''';;;;;;;;;;;;;;;;;;:::::::::::::::::::,,,,,,,,,,,,:::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.......,,,,,::::::::;::.....................................................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................;''''';;';;;;;;;;;;'''';;;;;;;;;;;;;;;;;;;:::::::::::::::::::,,,,,,:::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....,,,,,,,,:::::;:;;;,......................................,,............,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................:''''';;;;;;;;;;;;;;'''';;;;;;;;;;;;;;;;;;;::::::::::::::::::,,,,:::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...,,,,,,,,,,::::::::;;:...................................,,.......,,,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................,'''''';'';;;;;;;;;;'''';;;;;;;;;;;;;;;;;;::::::::::::::::::,,::,:::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.,,,,,,,,,,,,,:::::::;;;...........................................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................,+''''';;';;;;;;;;;;;'''';;;;;;;;;;;;;;;;:::::::::::::::::::,::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,........,,,,,,:::::::;;;:..........................................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................'''''';''';';;;;;;;;;''';;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.........,,,,,::::::::;;:....................................,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................;'''''''''';;''';;;;;;''';;'';;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..........,,,,:::::::;;;,..................................,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................:+'''';''';;''''';;;;;''';;'';;;;;;;;;;;;;:::::;;;:::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...........,,,:::::::;;;:..................................,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................,+''''''';;;''''';;;;;''';;';;;;;;;;;;;;;;;;::;;;;;;::::::::::::::::::::::::::,::,,,,,,::,,,,,,,,,,,,,,,,,,....,,,....,,,,::::::;;;;,.................................,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................;'''''';;;;;'';;;;;;;'''';'';;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::,,,,,,,,,,::,,,,,,,,,,,,,,,,,,,.....,,,,::::::;;;;,.................................,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................:''''''';';;;;;';;;;;''''';'';;;;;;;;;;;;;;;;;;;;:;:::::::::::,::::::::::::::::::::,,,,,,:,:,,,,,,,,,,,,,,,,,,,,,,...,,,,,:::::;;;;:.........,,,,....................,,,,,,,,,,,,,,,,,,,,,,,,,,.,,,,,,,,,,,,,,,,,,,,,,,,, ................................................,,.''';''';''''';';;;;'''''';';;;;;;;;;;;;;;;;::::::::::::::::::::::,:::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,...,.,,,,,::::::;;;;,.......,,,,,....................,,,,,,,,,,,,,,,,,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................,.:+'''''';''';;'';;''''''''';;;;;;;;;;;;;;;;::::::::::::::::::::::,:::::::::::::::::,,,,,,,,:::,,,,,,,,,,,,,.........,,,,,::::::;;;;:.....,,,,,,,....................,,,,,,,,,,,,,,,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................,,;''''''''';'''';;;'''''''';;;;;;;;;;;;;;;:::::::::::::::::::::,:::::::::::::::::::,,,,,,,,::::,,,,,,,,,,...........,,,,,::::::;;;;:,,,,,,,,,,,,....................,,,,,,,,,,,,,,,,,,,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................,,,''+'''''''''''';;;;'''''';;;;;;;;;;;;;;:::;;::::::::::::::::::::::::::::::::::::::,,,,,,,:::::,,,,,,,,,,...........,,,,,:::::;;;;;,...,...........................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................,,.:''+''''';'''''';;;''''''';;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::,,,,,,,::::::,,,,,,,,.............,,,,:::::;;;;;,...,...........................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...................................................,,.:+'''''''''''''';'''''''';;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::,,,,,,,,,:::::,,,,,,,....,...,,,,,,,,,,::::;;;;;:...............................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .....................................................,,;'++'''''''''''''''''''''';;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,:,,,,,,,,..,....,,,,,,,,,,::::;;;;;;............,..................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .....................................................,,,'+++''''''''''''''''''''';;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,......,,,.,,,,,,:::::;;;;;,,...........,,....,,,,,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ......................................................,.:+++++'''''''''''''''''''';;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,:,,,,,,,,,.......,,,,,,,,,:::::;;;;;,............,,,..,,,,,,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .......................................................,,:+'+++''''''''''''''''''';;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,:::,,,,,,,,,........,,,,,,,:::::;;;;;,...........,,,,,,,,,,,,.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..........................................................:'+++'''''''';''''''''''';;;;;;;;;;;;::::::;::::::::::::::::::::::::::::::::::::,,::,,,,:::::::,,,,,,.......,,,,,:,,:::::;;;;;:...........,,.,,,,,,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .........................................................,.,'+'+++'''''''''''';;';;;;;;;;;;;;;;;;::;;::::::::::::::::::::::::::::::::::::::::,,:::::::::::::,,,.......,,,,,::,::::::;;;;:........,,,,,,,,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ........................................................,.,..:'+++'''';''''''';;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::,,:::::::::::::::,,,,..,,,,,,,:::::::::::;;;:,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ............................................................,.,;+++''''''''''';;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,:::::::::::::;;;,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .........................................................,..,.,,:'++''''''''''';;;''';;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,::::::::::::::;;;,.......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,.:+'+'''''''''';;;'''';;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,:::::,:::::::::;;;:,.........,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..............................................................,,,.;++''''''''''';;;''';;;;;;;;;;;;;;;:::::::::::::::::::,:::::::::::::::::::::::::::::::::::::::::::::::::::::,:::::::;;;:..........,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,,,.;++'''''''''';;;;'';;;;;;;;;;;;;;;:::::::::::::::::::,:::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,::::::::;;;:.,........,,,,,,,,,,,,,,,,,,,,,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................................,,++'''''''''';;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,::::::::;;;,,,.......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................................,..+'+'''''''''';;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,:::::::;;;,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................................,..''+'''''''''';;;;;;;;;;;;;;;;;::;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,::::::;;;,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ....................................................................''''''''''''';;;;;;;;;;;;;;;;:::;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,::::::::,,:::::;;;:,,,,,,,..........,..,,,,,,,,,,.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ....................................................................'''''''''''''';;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,:::::::::::;;;:.,,,,,,..,......,...,,,,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................................,.,,''''+''''''''''';;;;;;;;;;;;;;;;:;::::;:::::::::::::::::::::::::::::::::::::;;;;::::::::::::,,,,,,,,,,,,,,::::,:::;;;;:,,,,,................,,,,,,,.,,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...................................................................:''''+''''''''''';;;;;;;;;;;;;;::::::::;::::::::::::::::::::::::::::::::::::;;;::;:::::::::,,,,,,,,,,,,,,,,,:::::::;:;;:,,,,,................,,,,,,,,,,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...................................................................;'''''''''''''''';;;;;;;;;;;;;;::;;;:;;;;::::::::::::::::::::::::::::::::;;;:::::::::::::,,,,,,,,,,,,,,,,,,,,:::;;:;:;;;,,,,,................,,,,,,,.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................................,.,''''''''''''''''';;;;;;;;;;;;;;::;;;;;;;;::::::::::::::::::::::::::;;;;;;;;;:;:::::,,,::::,,,,,,,,,,,,,,,,,,,,::;;;;:;;;,,,,,....,,,,........,,,,,,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,..:''''''+''''''''''';;;;;;;;;;;;;;;;;;;;;;:;;::::::::::::::::::::::;;;;;;:;:;;:;:::,,,,,,::::;:::::::,,,,,,,.,,,:::;;;;;;;,,,,,,,..............,,,,................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,,,;'''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::;;;;;;;:;;;;;;::,,,,,,:;::::;::::::::::,,,.,,,,,::;;;;;;,,,,,,,...............,,,..................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................................;''';;''''''''''''''';;;;;;;;;;;;;;;;;;;;;;::::::::::;;:::::::;;;;;;;;;:;;;:::::,,,,,,:::;;;;;;:;;;;;;;;;::::,.,,,,::;;;;;:,,,,,,,.......................................,,.....,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................................:'''';;'''';'''''''''';;;;;;;;;;;;;;;;;;;;;;;:;;:::::;;:::::::;;;;;;;;;;;;;::::::,,:::;;;;;;;;;;'''';;'''';;:;::,,,,,:::;;;:,,,,,,,,................................................,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,''''';''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;::;:::;;;;;;;;;;;;;;;;;::::::::::;;;;;;;;'''''''+++''''''''';;;:,.,,:::;;;,,,,,,,,....,,,............................................,,,,,,,,,,,,,,,,,,,, .............................................................,,'''';;';'''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;:::::::;;::;;;;;'''''';;;'''';;;:::;'''';;;,,,,,:;;;,,,,,,,,,,,,,,,.............................................,,,,,,,,,,,,,,,,,,, ..............................................................;''';';';;''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;::;;;;;;'''''';;;;;;;;;;;:,,,,,:;''+'';,,,,,,;;:,,,,,,,,,,,,,,...................................................,,,,,,,,,,,,, .............................................................;'';;;''';;'''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;;;;;;;;;;;;''''++';;:::::,:;;:......,,;''+''':,,,,:;:,,,,,,,,,,,,,,.....................................................,,,,,,,,,,, ..........................................................,.;'';;;''';;'''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;;;';''+'+'';;::,,....::,........,:'''++';,,.,:;,,,,,,,...............................................................,.,,,,,, ...........................................................:';;;;;''';;''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::;;;;;';''++''''';;:,.......,,..........,;;::;+';,,,,;:,,,,,,...........................................................,...,...,,,, ..........................................................,';;';;''';;';'''';''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;:;::::;;;;;;';'+'''';;;';,......`...,...........;,...:+'':,,:;,,,,,........................................................................ .........................................................,;;;;;;;'';;;;;;;;;'''';'''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;::::::;;;'''''++''';::::;,,......`...:........```;,...`;'+':,,;;,,,......................................................................... ......................``................................,;;;;;;;;';;;;;;'';;;;;;;;;'';'';;;;;;;;;;;;;;;;;;;;;;;;;::;::::;;;;;;::::;;;;;;;''''''';:,,,,,::.`.....``.`:.........``;,..`.:;''':::;.,.......................................................................... ....................````................................;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;:;;;::::::;;;;::::;;;;';'''''''';:,....,:;.......``..:.........``;....`;.:;''::',........................................................................... ...................``````..............................;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;;:::::::;;:::::;;;';''+'';;;'':,...`..,;.....``....;,......````',...`;`..''',;:........................................................................... ..................```````.............................;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::;:::::;;;'''++'';:::;',....`..,',.....``.,:;,.....`````+,..``;```;:';:;........................................................................... ................````.................................;;;;;;;;;;;;;;;;;;;;;::::::::::;;;;;;;;;;;;;;:;;::;;;;:::::;::::::::::::;;;;''+++';;:,,.,;........:#':......,;+++:.....`.`.+:.```;``.',:';;........................................................................... ................```................................,;;;;;;;;;;;;;;;;;;;:::::::::::::::::::;;;;;:::::::::::::::::::::::::::;;;;;;''++;:;;:,...:;,,....`,+++++'''+'+++++#+++'''++#+',```;`.`'`:++;........................................................................... .............```````````````......................,;;;;;;;;;;;;;;;;;;;:::,,,:::::::::::::::::::::::::::::::::::::::::::::;;;'';'++;:::::,....,+',....;+++##+##+++++++++++++++++++#++#+#;``;`:'':........................................................................... ............````````````````.....................:';;;;;;;;;;;;;;;;;:::,,,,,,,,,::::::::::::::::::::::::::::::::::::::::;;;';;'++'::,,:;,....:#++##########+####++++++++++++#+++######++,,;`;'',........................................................................... .............``````````````````.................:';;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,::::::::::::::::::::::::::::::::::;;;'';'++';',,..:;:,,,:+#+##+++++++#++++++##+++#+++++++++++++''+#+''+.'':............................................................................ .............```````````````````...............;';;;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,::::::::::::::::::::::::::::::::;;;'''''+';:;'...`:''''++++++++++++++#++++++++++++++++++++++++++++++'++'+:,............................................................................ .............`````````````````````............';;;;;;;;;;;;;;;;;;;:::,,,.,,,,,,,,,,,,,,,::::,:::::::::::::::::::::;;;;''++++';::;+....;++++++++++++#+++++++++++++++++++++++++++++++++++++++#+..........................................................`...`............... .............```````````````````````.........;;;;;;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,,,,,,::::::::::::::::::::::::;;;;'''+++'':,,,;#',:'+++++++++++++++##++++++++''+++++++++++++++++++++++++;;;.........................................................`..``................ ........`````````````````````````````.......';;;;;;;;;;;;;;;;;;;;;::,,,,,,,,,,,,,,,,,,,,,,,::::::::::::::;::::;;;;;''++++';':,,,'+'+++++++++++++++++++++++++'+'''''''++++''+++++++++++++++'::......................................................``.`.,,.``.............. .......`````````````````````````````.......';;;;;;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,,,,,,,,,:::::::::::::;::::;;;;;;''+++';;;+';:;+++++++++++''''''''++++++++''''++'''''+'';;;'+++++++++++++;:,.....................................................````...,.``.............. ....```````````````````````````````.......';;;;;;;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,,,,,,,,,::,:::::::::::::;;;;;;''++++;::;++++++++++++++''''''''''';;'+++'''++''''''';';;'';;'++#+++++++++;:,.....................................................````.....````............ .....`````````````````````````````.......;';;;;;;;;;;;;;;;;;;;;;;;::,,,,,,,::::,,,,,,,,,,::::::::::::::;;;;;;;'''++++''++#+++++++++++++''''''''';;;;;;;'+++++++''';;;;:::;;;,;;'++++++'+++;:,.....................................................````...,.`````........... ...```````````````````````````````......:';;;;;;;;;;;;;;;;;;;;;;;:::,,::::::::::,,:,,,,,,,:::::::::::;;;;;;;'''+++++++++++++++++++++''''+'''''';;;;;;;;;;''+'''';;;;::::::::;,;;;+:;++++''',;....................................................``````.`..`````........... ...```````````````````````````````..`..:';;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::,::::::::::::;;;;;;;;''+++#++++++++++++++'''''''''''''''';;;;;;:::;;;;++''';:;::::::::::::;;+';'+#''+:'...................................................```````.``.`````........... ...````````````````````````````````...,';;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::;;;;;;'''++++++++++++++++'''''''''''''''''';;;;;;::,,,::;;'++'';;:::::::::::::;;++,.:+;';;...................................................```````. `.``````.......... ...`````````````````````````````.``..,';;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;;:::::::::::::::::::::;;;;;'''+#+++++++++++++''''''''''''';;''';;;;;;;;:::::::::;;;'+'';:::,:,::::::,::;'.,..;;;;,.................................................```````..`..```````....```.. ...``````````````````````````````.`..';;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;:::::::::::::::::::;;;;;;''+##+++++++++++++''+'''''''''''''';;;;;;;:;;:::::,:,,::;;''';;::,:,,,:::::,.;;+':,,`.,:,..............................................`````````.....```````````````` ...```````````````````````````````..;';;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;:::;::::::::::::;;;;;;''''+##++++++++++++'''''''''''''''''''';';;;::;;:::,:,,:::,::;''';;:,,,:::::::::::::;':..::;..............................................`````````.....```````````````` ...``````````````````````````````.`:';;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;::::::::'';;:;;;;;;;::;;;;;;;''''+#+++++++++++++#++++'''''''''''';;;''''';;;;:;;::,,:,:::::::;;'';:::::::::::::,:::,;+;:` .,...........................................```````````.....```````````````` ..````````````````````````````````:';;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;::::::::::'';;;;;;;;;;;;;;;'''''+#++'''+++++++++++++++''''''''''''''';;;;'';;;;;:::::,:::::::::;;';;:::::::::;;;:::.,;';, `.,..........................................````````````.....```````````````` ..```````````````````````````````.'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::'+;;';';;'';''''''+##+++:....,++''++++++++++'+''''''''''''';;;;;;;;;;::::::::::::::::;;;;;::::::::::::,,,:;++``.,,.....................................`````````````````.....```````````````` ..```````````````````````````.```;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;++'';''''''''+###+';';,.....:;....'+++++++++++'''''''''''';;;;;;;;;;:::::::::::::::::;;;;::::::::::,,,,;:'+,,:,,....................................``````````````````.....```````````````` ..``````````````````````````````,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;::::;'+++++####++++''';;;:,,,.,',.....;+'::'+++++++'''''''''';;;;;;;;;;;;;;;:::::::::::::;;;::::::::,,,,:::'+,`,;:;,..................................```````````````````...,,.``````````````` ..``````````````````````````.```'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;::::::;;'+'';:,,::;''+'':,,,,,',,....:+....,+++++++'''''''''';;;;;;;;;;;;;;;;;;;;;;:::::;;::::::::,,,,,:;'', `;:;',..............................``````````````````````...,,.``````````````` ```````````````````````````````,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::;;;:::::::::::::,,,,::;;'';::;',,,..,:'.....;+;;''++++'''';;';;;;:;;;;;;;;;;;;;;;;;::::::::;:::::,,,,::;+';```.:;;;;,.........................``````````````````````````..,,,.``````````````` ```````````````````````````````;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;:::::::;;;;;;;;;;;:::::::,,,,,:;''';::,.,,;'.....:;,...:'+++''';'';';;;;:;;:::::::::;;:::::::::::::,,,,,::;'':``,`..:;;:;;.........................``````````````````````````,.,,,.`````````````.. ``````````````````````````````,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;:::::::;;;;;;;;;;;;;:;;::::,,,,:'';::,,,;;....,::....,:++++++''''''';;;;;;::::,,,,,,:::::::,,,,,,::,,:;'':` ``:.`.:;;::;,............``````````````````````````````````````,..,,.``````````..... ``````````````````````````````;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;;;;;::;;;;;;::;::::::'';:::';,...,::..`..,;....:''''''''';;;;;;::::,,,,,,,,,,,,,,,::,::;;'':` `.:,..;'::;;:...........```````````````````````````````````````,.,,,.``````....,,,,, ```````````````````````````.`,'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;:::;'':;':,...,;:..`..,'..````:'''+'''';;;;;;:::::::::::::::::::::;'':,,:```..:,..''::::;..`.....``````````````````````````````````````````,,,,,.````...,,,,,,,, `````````````````````````````;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::;:;;;''''::...,;:,.`..,'.......:+':,`.,:;'';;;;:::::::::::::;;;;;';,``` :.....::.,''::::;,.......``````````````````````````````````````````,,,,,.`...,,,,,,,,,,, ````````````````````````````.';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;:;;;'+':,..,;:,``..,;.````...;.```````,''';;;;;;;;;;;;';;;:;'':` ```:,....::.:'':::;;:`.....```````````````````````````````````````````.,,,,,.,,,,,,,,,,,,,, ````````````````````````````;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::;:;:;'+':,:;:,``.,::.`````..:........,:+':....:'+''';.`````,',`````.,,....:;,:'':::;::`....````````````````````````````````````````````.,,,,,,,,,,,,,,,,,,,, ``````````````````````````.`';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::;;;;''';;:,`..,;,.`````..:...```...:':` `` ``.'++```````.;,`````.,:,...:','';:::;;;..``````````````````````````````````````````.``...,,,,,,,,,,,,,,,,,,,, ```````````````````````````:;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;:;'+':,...,',.`````..;...`````.,;,..``````.';``````..:,`````..:,..,:';++::::;;;..``````````````````````````````````````.......,,,,,,,,,,,,,,,,,,,,,,, ```````````````````````````';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;;::::::::::::;'+';,..,'...````..;...`````.,'..........;,........:,````...;,.,,;'+'',::;::;.`.`````````````````````````````````..,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ````````````````````````.`,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;;;:;'+':,;',,...```.;...``````,'.`````....',`.......,:``.`.`.;..,,''+':::::::;.`.````````````````````````````````.,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,, ``````````````````````````;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;'';'';'';;;;;;;;;;;::::;;;:;;;;;::;++''',,......,:..```````,'.`````....',`.......,:``..``.;,..:++;,,,:;:::;...``````````````````````````````.,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,, `````````````````````````.';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;::;;;:;;;;;:;'++':,,.....::..```````,'.`````...`':`........:.`.....;,.,'+;,,,::;:::;.```````````````````````````````.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ````````````````````````.,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;';;;;;;;';;;;;;;;;;;::::;::::;;;;::'++;,.....::...``````:'.`````.`.`;:`........:,``...,;:,''::,,,::;:::;.````````````````````````````..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ````````````````````````.:;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'';;;;;;;;;:::::::::;;;;:::;'+;,..,;;....`````:'.`````.`..;:`.......,::``...,;;'':,,,,,::;:::'``````````````````````````...,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,, `````````````````````````;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;::::::::::;:;::;'+;,:';.....````;'.`````.`..;;...```..,;;``.`.,+'::,,,,,::::::;:`````````````````````.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,, ````````````````````````.';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;::::::::::;;;;::'+'';.........;;,`..```...;;...```..,;'````,;;:,,,,,,:::::::'.``````````````````.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .......`````````````````.';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;::;;;;::::::::::::::;;::;;';,.......;;.```````..;;,````..,::;,`.:;:,,,,,,,:::::::;'`.``````....,.......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ............`````````...,;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;';;:::;:::::::::::::::::::;::;';,,,.,;;...````...;;:``.`.,:;:;;;';:,,,,,,,,:::::::';``````..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,, ........................:;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;::::::::::::::::;:;:::::;;';;;;:..`...,.,;;;,.,,,:;;;'+':,,,,,,,,:::;::::;',```..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,:,::::,,,,,, ........................;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;::::::::;:;:;;:;;''',.....,,;;;;;:::;;'+';:,,,,,,,,,:::::::::';`..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,:::,,,,,,, ........................';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;::::;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::;:,,:::;:::;;;;;::;;;'';;;;;;;';;''+';:,,,,,,,,,,,:::::::::'',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,, ........................';;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;;;;;;;;;;;;;;;;;;;;;::;::;;;::;::::;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::,,::,,::::;;;;;;::;;;;''''++';:::,,,,,,,,,,,,:::::::::;':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .......................,';;;';;;';;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;;;;;;:;:::;;;;::::::::;:;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::,,,,,::::::;;::;;;;;;;;:::::,,,,,,,,,,,,,,:::::::::;'',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................,...,,';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;;;;:::;::;;;;;:;::::::;:;;;:;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::,,,,::,,,::,,,:;;::::;::,,,,,,,,,,,,,,,::::::::::;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,::: ..................,...:,';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;::;;:::;;::::::::;;:::;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::,,,:,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::;;''',:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::: ..................,,.,:,';;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;::;:;;;;:::::;;;::::;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::,,:::,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::;;'''',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::: ,.....,,..,...,...,:.:,,';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;:::;;;;;;:::::;;::::::;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,:::::::::::;'''''::,,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::::::::::: ,,,...,,,.,..,,,,,,:,:,:';;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;::;;;;;:;:::::::::::::::;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::,,,,,,,,,,:::::::::::::::;''''''':,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::::: ,,,...,,,.,.,,,,..,,::,:';;;;'''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;::;:::;;;;;:;;::::::::::::::::;;;;;;;;;;;;;;;';';;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::;''''''''',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::::::: ,,,,.,:,,,,,,,,,,,,,::,:';;;;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;:;;:;:::::::;;;;;::::::::::::::::::;;;;;;;;;;;;;;;;;';';;;;;;;;;::::::::::::::::::::::::::::::::::::::;;''';'';;''',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::::::: ,:,,,,:,:,,,,:,,,,,,::,:';;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;;;;;;::;::::;;;::::::::::::::::::::;;;;;;;;;;;;;;';;;;;;;;''''';;;;:::::::::::::::::::::::::::::::::;''''''';;;;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::,:::::::::::::::::: ,:,,,,:,,,,,,::,,,,,::,:';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;;;;;;;;;::::;;;::::::::::::::::::::;;;;;;;;;;;;;;;;;;;;;;';;''''''';;;;:;;:::::::::::::::::::::;;;'''''''';;;;;;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::;::::::: ,:::,,:,:,:,:::,,,,,::,:';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;;;;;;;;::::;;;;;:::::::::::::::::::;;:;;;;;;;;;;;;;;;;;;;'''''''''''''';;:::::::::::::::;;:;;''''''';;;;;;;;;;;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,:::::::::::::::::::::::: :::::::::::,:::,,,:,::::';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;:::::;;;;;;;;::::;;;;;;::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;'''''''''''''';;;;;;;;;;;;;;;;;'''''''';;;;;;;;;;;;;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::::::;:::: ::::::::::::::::::::::::';;;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::;;;;;;;;;:::;;;;;;::::::::::::::::::::::::::;;;;;;;;;;;;;;;;'''''''''''''''''';;;;;;;;;'''''''';'';;;;;;;;;;;;;;'',,,,,,,,,,.,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,::::::::::::::::::::;:::: ::::::::::::::::::::::::'';;;'''';;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;;;;;;;;:::;;;;;;;::::::::::::::::::::::::::;;;;;;;;;;;;;;;''''''''';;''''';'''''''''''''''';;;;;;;;;;;;;;;;;;;'':,..........,,,,,,,,,,,,,,,,,,,,,,,,,:::,,::,,,,,,:::::::::::::::::::::::::: ::::::::::::::::::::::::';;;;'''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;;;;;;;;:;;;;;;;;;:::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;''''';;;;;''''''''''''''''''';'';;;;;;;;::;;;;;;;''.....```....,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::::::::::::::::::::::: ::::::::::::::::::::::::'';;;'''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::;;;;;;;::::;;;;;;;:::::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;;;;;;;;;;';'''''''''''''';;;;;;;:;;;;;:::;;;;;;'',`........,.....,,,,,,,,,,,,,,,,,,,,,::::::,,::::::::::::::::::::::::::;:::: ::;::::::;::::::::::::::'';;'';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::;;;;;;:::::;;;;;;::::::::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;''''''';;;;;;;;:::::;;;:::::;;;'';,,,,,....,,.,,,.......,,,,,,,,,,,,::,::::::::::::::::::::::::::::::::::;:::: ::;::::::;::::::::::::::'';;'';'';;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;:::::;;;;;;:::::::::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;::::::;;;'';:::::,,,,,,,,,,,,,,,..........,,,,,,::::::::::::::::::::::::::::::::::;::::: ::;;:;:::;;:::::::;:::::;';''';';;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;:::::::::::::::::::::::::::::::::::::;::;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::;;;''::,,,,,,,,,,,,,,,,,,,,,,,,..........,,,,::::::::::::::::::::::::::::::::::::: :::;;;;::;;:::::::;::::;;'';''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::;;;;;;:::::::::::::::::::::::::::::::::::::::::;;:;;;;;::;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::;;;;'':::,,,,,,,,,,,,,,,,,,,,,,,,,..,,..,.....,,,,,::::::::::::::::::::::::::;;:::: :;:;;;;;;:;;;;:::;;;:;:;;'';''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;:;;::::;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;:::::::::::::::::::;;;;'',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,........,,,,::::::::::::::::::::::;:::: :::;;;;;;:;;;;:::;;;:;:;;';''''';;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;;;;;;;;;:::::;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::;::;;;;;;;;;:;:::::::::::::::::::::;;;;;';,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::,,,,...........,,,,:::::::::::::::;;:::: :::;;;;;;::;;;;::;;;:::;;''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;;;;;;::::::::;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;;;;;::::::::::::::::::::::;;;;;';,:,,,,,,,,,,,,,,,,:::::::::::,::::::::::::::,,,,..........,,,,:::::::::;;;::: ;::;;;;;;;;;;;;;:;;;:::;;'';'''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;:;;;;;;:::::;:::;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;::::::::::::::::::::::::::;;;;';':::::,,,,,,,,,,,,,,,,,,::::::::::::::::::::::::::::,,.......,,:::::::::;::;::: ;:;;:;;;;;;;;;;:::;;;;:;;;';'''''';;;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;:::::::::;:;::::;;::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;:::::::::::::::::::::::::;;;;;;';:::,:,,,,,,,,,:,,,:::::::::::::::::::::::::::::::,,,.....,,:::::::::::::::;::: ;:;;:;;;;;:;:;::::;;;;:;:;''''''';;;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;::::::::::::::::::::::::::;;;;;;';::,:,::,:,,,,::::::::::::::::::::::::::::,,,,.........,:::::::::::::::::::;;:; ;:;;:;;::;;;::::::;;;;:::;'''''''''';;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;;;;;::;::::::::::::::::::::::::::::::::::::::::::,::::::::::::::::::::::::::::::::::::::::;;;;;;';:::,,::::::,,:::::::::::::::::::::::,,,...........,,,::::::::::::::::::::::;:: ::;::;;;:;;;::::::;;:::::;'';''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;;;;::::::::::::::;;;;;;;;;::::::::::::::::::::::::::::::::::::::,,,,,::::::::::::::::::,,,,:::::::::::::::::;;;;;''::,:,:::::::,::::::::::::::::::,,,......`......,,,:::::::::::::::::::::::::;::: ;:;:::;;::;;:::::::::::::;''''''''''';;;;';;;;;;;;;;;;;;;;;;;;;;;;:;:::::;:;;;::::::::::::;;:;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,::::::::::::::,,,,,,,,,,,,::::::::::;;;;;'':::::,:,::::::::::::::::::,,.............,,,,:::::::::::::::::::::::::::::::::; ::;::::::::;:::::::::::::;;';'''''''';;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;:::;:;;;;:::::::::::;;;;;;;;;:::::::::::::::::::::::::::::::::::,,,,,,,,,,,,:::::::::::::,,,,,,,,,,,,,:::::::::;;;;;';::::::::,,::::::::::,,,...........,.,,,,::::::::::::::::::::::::::::::::::::::: :;::::;:::;:::::;:;::::::;;';'''''''';;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;:::::::::::;;;;;;;;;:;::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,::::::::::,,,,,,,,,,,,,,,:::::::::;;;;'';:::,::::::::,,,,,,................,,,,::::::::::::::::::::::::::::::::::::::::: :;:::::;::;:::::;::;:::;;;;'';''''''';';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;;;;;:::;;;:::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,::::::::,,,,,,,,,,,,,,,,:::::::::;;;;'';:::,:,:::::,,,..............,..,,,,,:,::::::::,:::::::::::::::::::::::::::,:::, ::;::::;::;::;::;:::;::;;;:'';'''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;:::::::::::::;:;::::::;:::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,:::::::,,,,,,,,,,,,,,,,::::::::;;;';''::::,,:::::::,,,..........,,,,,,,,,,,,,::::::::::::::::::::::::::,:::::::::::::, ::;::;:;:::::;::::::;::;;::;'''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;;::::::;::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,::::::,,,,,,,,,,,,,,,,:::::::::;;'''';,,,:,:::::::::,,,,,,,,,.,,,,,,,,:,,,,,,,,,:::,:::::::::,,::::::::::::::::::::::, ::;::;;;;:;;::::::::;;;;;;;;'';''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::;;;:::::;::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,::::,,,,,,,,,,,,,,,,,::::::::;;;'''';,,::,,:::,,,::::,,,,,,,,,,,,,,,,,,,,,,,,,::::,,::,,,,:::::::::,,::;;:::::::,::,, ;:;::;:;;:;;::.,::;:;;;;;;;:'';''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;;;;::::;::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::;;;''''':::,:,::,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;;,;:,::::::::::, ;;;;;:;:;;:;::,,..;::;;;;;:;;';'';'''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;;;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::;;;;''''':::,,,:,,:,,,:,,:,,,,,,,,,,,,,,,,,,,,,,,,....,.,,,,,,,,,,,,,,,,,,:::,,,,,:::::::: ;;;;;:;;:;::..,,,::::;;;;;;;;''''';''';'';;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;;;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,::::::::;;;;;'''';,::,:,,:,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....................:;......,,,,,,,, :;;;;::;::;..,,,,..::;;;;;;;;;'''';''';'';'''';;;;;;;;;;;;;;;;;;;;;;;;;;;::;;;;;:::::::::::;;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,::,,,,,,,,,,:::::::;;;;;;'''';,:,:::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................:;,............. ;;;;;;::;:;:;,,,.:,:;;;;;;;;;;''''''''';;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,::::,,,,,,,,::::::::;;;;;''''':::,::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,....::,............. ;;;;;;::::;;;,:,.::::';;;;;;;;''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;;;;::;:::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,:,,::::::::,,,,,::::::::;;;;;''''';:::::::::,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...,;:....``....... ;;;;;::,,::;;;;:,::::;;;;;;;;;;+''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;::::::::::::;;;;::;:::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,:::::::::::::,,,::::::::;;;;;'''''';:::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::,......,:;...````````.. :;;;:,,,,,::;;;;;;::.,;;;;;;;;:''''''''';''''';;;;;;';;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::;;;;;;;:::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,:::::::::::::,::::::::::;;;;;'''''':::;::::::::::,,,:,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...........::,..````````.. :;;;;;,.:.,:;:;;;;::.`,,.:;;;;;'+''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;::::::::::::::;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,::::::::::::::::::::::::::;;;;''''''':::;:::::::::,::::,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................:::..`.```..`.` ;;;;;::.::,;;;;:;,,:,...,:;;;;;;+;'+''''''''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::;::::;;;;;::;:::::::::::::::::::::::::::::::::::::,,,,,,,,:::::::::::::::::::::::::::;;;''''''';::;::::;::::::::,:,,,,,,:,::,,,,,,,,,,,,,,,,,,,,....................:::......``.`.. ;;;;;;;:;:;;;;;::```,,,:,.,;;;;;++'''''''''''''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::;:::::;;;::;::::::::::::::::::::::::::::::::::::,,,,,,,,:::::::::::::::::::::::::::;;;;''''''':::;:::;:::::,::,:,,:,,:::::::::,,,,,,,,:,,,,........................,::.......`.`.` ;:;;;;;;;;;;;;;;:.`,:.,,,.,;;;;;;+'''+'''''';''';'';;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;:;::::;;:::;;;;::;;::::::::::::::::::::::::::::::::::::,,,,,,,::::::::::::::::::::::::::;;;;;'''''''::;':::;::;;:::::,::,,,,,,:,:::::,,,,:,,,..................`````.....:::....```.`... ;;;;;;;;;;;;;;;;;;::``,`.;;;;;;;;+'''+'''''';'''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;;;;;;;::;:::::::::::::::;::::::::::::::::::,:::::::::::::::::::::::::::::;;;;;;;''''''';;;';:;;:;;;::::::::,,,,:::,:::::,,,,....................``````......:::...`````.,., :;;;;;;;;;;;;;;;;;;...;`..;;;;;;;'+'+'''''''';;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;;;;;;;:;;::::::::::::::;;;;:::::::::::::::::,,:::::::::::::::::::::::::;;;;;;;'''''''';;;;;;;;;;;:;:,:::,:,:,:::::,:,,,,..............`...`.````````......,::,...`....,,,, ;;;;;';;;;'';;;;;;;:,;';,:;;;;;;;;++'''''''''''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::;;;;;;;;;;;;;;;;:::::::::::;:;;;;;;;::::::::::::::::::::::::::::::::::::::::;;;;;;';''''''+;'';;;;';;;;;;:,;:::::::::,,,,,,,...............``.````.`.``````.....,::::.....,,,,,,, ;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;+'+''+'''''''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::;;;;;;;;;;;;;;;;;:::::::::::;:;;;;;;;:::::::::::::::::::::::::::::::::::::::;;;;;;;''''''''+;'';;;;;;;:;;;:;;:::::,,,,,,,..................````````.`.``````....,:::;,...,,,,,,,,, ;;;;;;;';;;;;;;;;;;;;;;';;;;:;;;;;;'''';''''+'''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;;;;;;;;;;;;;:::::::::::;;;;;;;;;;:::::::::::::::::::::::::::::::::::::;;;;;;;''''';''+';'''';;:;::;;::;;::,:,,,,,................````````````..`.`````....,::::::.,,,,,,,,,,, ;;;;;;;;;';;;;;;;;;';';'';;;;;;;;;;;''+;''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;:;;;:;::::::::::::;;;;;;;;;:;;;:::::::::::::::::::::::::::::::;;;;;;;;;'''''''++'''''';;;;:;;;:;;::;::,.:...............````````````..``,..``.`.`...:::::,,,,,,,,,,,,., ;;;;;;;;;;;;;;;;;;;;'';;;;;;;;;;;;;;';+;+'''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;:;;;;::;;;:;::::::::::::;;;;;;;;::;;;::::::::::::::::::::::::::::::;;;;;;;;;''''''''+'''';;;;;;;;;;;;;;:::::.:,,,,..........``````````.```..``,..``.``...,::::,,.,,,,,,,,,,.. ;;;;;;;;;;;;;;'''';;;'';';;;::;;;;;;;;';+''+'''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;;::::;;;;;:::::::::;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::;;;;;;;;;''''''''''+';;;;;;;;;;;;;;;;;;;;:;:,:..:........`````````````..``..``,,..,,....,.;::,,,.,,,,,,,,,... ;;;;;;;;;;;;;;;;''';;';;;;;;;;;;;;;;;;';+;'''''''';''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;:::::;;;;;::::;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::;;;;;;;;;;'''''''''++';;;;;;;;;;;;;;;;;;;;:;:;,.::.....````````````````..``....,,.,,`.,,.,,::,,,,.,,,,,,,,,,,, ;:;;;;;;;;;;;;;;;;'';;;;';;;;;;;;;;'';;'';'++'+''''''''';;;;;;;;;;;;'';;;;;;;;;;;:;;;;;;;;;;;;;;;;::::;;;;:::;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::;;;;;;;;;;'''''''''++''';;;;;;;;;;;;;;;;;;;;;:;,:;:.,:.````````.``.``````..``.,.,,,,..,,.,,,,:,,::,,,,,,,,,,,:: :;;;;;;;;;;;;:;;;;;;;;'''''''';;;';'';;;;;+''++'''''''''';;;;;;;;;;''';;;'';;;;;::;;;;;;;;;;;;;;;;:::;;;;;;;:;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::;::::;;;;;;;;;;'''''''''++';;;;;;;;;;;;;;;;;;;;;;;;;;;;;:,:,```````..```.``````....,,.,,,,.:,,,,,,,:,,,:,,,,,,,,,,,,, :;;;;;;;;;;;;:;;';;;';''';;;;'';;';;;;;';;+'+++''''''''';;;;;;';;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;:::;;;;;;;;'''''''''''++';''';;;;;;;;;;;;;;;;;;;;;;;;;;,,;,````````````.``..`.`,,.,,.,,,,,,,,,,,,,:.,,,,,,,,,,,,,:,, ;;:;;;;;;;;;;::;';;;;;;';'';;;;;;';;';;;''''+++'''''''''''';;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;;:;;;;;;;;;''''''''''''++''+'';;;;;;;;;;;;;;;;;;;;;;;;;;;,::``,`.`.,`.```,```...`.,,,,,,,,,,,,,,,,,,:,,,,:,,,,,,,::::: ;;:;;;;;:;;;;;:;;;;;;;;;;;;;;;;;;;'''';'''''+++;''''''''''';;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;:;;:;:;;;;;;;''''''''''++++''''''';';;;;;;;;;;;;;;;;;;;;;;::::.,,...`:`.```.``..,.,,,,,,,,,,,,,,,,,,,,,,,::;:::::::::::: ::;;;;:;:;;;;::;;;;;;;;;;;;;;;;;;;;;'+';';'''+';''+''''''''';''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;;;;;;;;;;;;;'''''''''''+++++''''';;''';;;;;;;;;;;;;::;;;;;;;;:::...,.;.````.`.,.,,..,,,,,,,,,,,,,,,,,,,:,::::::::::::::: ::;;;:;;::;;;::;;;;;;;;;;;;;;;;;;;'';;';''';''';'+''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';''''''''''+++++''''''''''';;;;;;;;;;;;;;;;;;;;;;:::;,,,::`;.``....`..,,,,,,,,.,,,,,,,,,,::,::,:::::,,:::::::: ::;::;;;::;;;;::;;;;;;;;;;;;;;;;;'';;'''''''''';;+'+';''''''''''';;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'''''''''''+++++'''''''''''';;;;;;;;;;;;;;;;::::;;;;;;::;;:,;,``:..,`,,,,,,,,,,,,,::,:,,,:::::::,::::,,:,:::::: ::;::;;;::;;;;;:::;;;;;;;;;;;';;;';;';;'''';;'+;;+++;;';''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;':;;;;;;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'''''''''''''++++'+'+'''''';';;;;;;;;';';;;,..,:,;:;;;;;;:;;;:;:,.;`,:.,,,,,,,,,,,:,:::,,::,:::::::::,,,,:::::::: ::;::;;:;;;;:;;::;;;;;;;;;;;;;;;;;;;;''''''';'';;''+;;''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'''''''''''''++'+'''''''''''''';;;;;;;;;;;;:,,,,,:,,:;:;;;;;;';:;;.;,,,,,:,,,,,,,,:,,,,:,,,,,,:::::::::::::::::::: ;:::::;;:;;:;;::;;;;:;;;;;:';:;;';;;'';'';;';;'';;'';;+++''''''''''''';;'''';;;;;;;;;;;;';;;;;';;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'''''''''''''++++++''''''''''''''';;;;;;;;;;;;;;:..,,,,:;;;;;;;';:;;;::,,:,;,,,,,:::::::,,,,,,,,:::::::::::::::::::: ;:::::;::;;;;:;:;;;;;;;;;;:;;:;;';;;''';;;;;';;';;;;;;++'''''''''''''''''''''';;';;;;;;;;'';;';';;;;;;;''';';';';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;''';;;;'''''''''''+++++++++'''+'''''''''';;;;;;;;;;;;;;;;..,.:.::;;;:;::';,';';;,:;,;,,:,:;:::;,:::::::::::::,::::::::::::::: ;:::;;;::;;:;:;;;;;;;;;;;;;;':;;';''''''';;'';;';;;;:'+;+'''''''';;'''''''''''''''';;;;;;;''';;;;;;';';'''''';''';;;;;;;;;;;;;;;;'';;;;;;;;;'''''';;'''''''''++++++++''''''''''''''';';;;;;;;;;;';';;;;,;:,;::;:.,:::,:':;;';;:;;:;:,;,;;:::;:::::::::,:::,,::::::::::::::: :;;::;::;;,.,:;;;;;;:;;;;;;:':;;''''';;'';;';;;;;;';;';'+''++''''';;'''''''''''''''''';;;''''';;'''''''''''';;'''';;;;;;;;;;;;;;;;;;';;''''''''''''''''''++++++++++''''''''''''';''''';;;;;;;;;;;;';;;;;;;;;;;,.,..,,,;;;;;';',;;:;:,';':;::':::;:,,,:::::::::::::::::::::: ;;;::;;::,...::;;;;;;;;;;;;;;;;;;';;;;;'''';;;;;;:';;;;+';;;'+++'';;'''''''''''''''';''';'''''';'''''''''''';'''''''''''';;';;;;;;'';'''''''''''''''''++++++++++''''''''''''';'';'''''''';;;;;;;;;'';;;;;;;;;;::,.:.:,:;;;;';':';;';:''::;:;':::;:::::::::::::::::::::::::: :;;;;;;::....,;:,:;;;;;;;:;';;;;;';;;;;;'''';;;;';;';;;;:;;;;'+'++';;''''''''''''''';'''';''''';''''';'''''''''''''''''''''''''''''''''''''''''''''''+++++++++'''''''''''''''';';'''''';;;;;;;;;;;;;';;;;;;;;;;;,,',:;;;;;;;;;;';;';;''::':;':::':::;;::::::::::::::::::::: .:;;:;;:,....,;..,;;;;;;;;:'';'';;;;;;;;;'''';;;';;';;;;'';';;'';++;:'+'';;''''''''';'''''''''';;'''';''''';;'''''''''''''''''''''''''''''''''''+''+++++++'+'''''''''''''''''';;;;''''';;;;;;;;;;;;;;;;;;;;;;;;;::;;;;;;;;;;;;;'''';'';;:':;'::;;:::;;::::::::::;:::::::::: ..:;,,::.....,:...;;::;;;';;;;'';;;;;;;;;;''';;;'';;;;;;+';+;;;';;+;;;+'';;'''';;;'':';''''';'';;''''''''''';''''''''''''''''''''''''''''''''+++++++++++++'''''''''''';''''''';;;;;''';;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;'''';'';;;';;'::';:::;;:::;:::::::::;;:::;:: .`.:,,,,.....,,,..,...;;;;;';''';;;;;;;;;;''';;;'';';;;;;';'';;;;;;'';'';;;;+''';;;':'';'+''''';;''';'''''''''''''''';''''''''+++''+''+'+++++++++++++'''+''';'''''''''''''''''';;;''';;;;;;;;;;;;;;;:;;;;;;;;;;;;;''';;;;;;;;;;;'';''';;;';;'::';;;;;;::;;;:;;:::::::;;:::: .`..,,,......,,,......;;:,:';';';;;;;;;;;;;;;;;''';;;;;;;;;;;;;;;;;';;;;;;;;'';;;;;':;';;''''';;;;'';''';;';'''''''''';''+''++''+;++'+++++++++++++++'+++'''';''''''''''''''''''';;;';;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;';''';;;;';;';;';;;;:;::';::;;:;;:::;::;;;; ,...`.,,......,,......,....;';:;;;;'';;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;';';':;'';;;;;+:';;+';;;';';;''++'''+++;;++;;++''+;++;++++;++++++++++'''''''';''''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'';';;;';'';;'';'':;:;;;:';::;;::::::::;; .,.....,......,,...........;:..,:;';;;;;;;';;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::';:;;;;'';;;+';';;;+;'+++'''++++;;++;;++;'';'';'+';'++++++'++'';;''''';''''''''''''''';'''';;;;;;;;;;;;;;;:;;;;;;::::;::;;;;;;;;;;;;;;;;;;;;'';';;'';'';'''''':':;;:;';::;;;::::::;;: .,,....,,....,,,....`............,:;;;;;;;';';;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::';;;;;;'+;;:+';';;;';+++''''++++;;;+;;'';'';'';+';;'++'+++++''';;;''';;';''';';;'''''';'''';;;;;;;;;;;;;;;;;;;;;;::::,,:;;;;;;;;;;;;;;';;;;''';';';';'';'';;'':';';;';';:';:::::::;;; ,..,....,....,,,.........`........:;;;;;;;;;;;;;';';;;;;;;;;';;;;;;;;;;;;;;::;;;;;;;;:;;;;;;;''';;;;;';;;;'''''''';;''+;;'';';;'';'';';;;'+'++''''''';;;''';';;'';;';;''''''''';;;;;;;;;;;;;;;;;;;;;;,::,,,,.,;;;;;;;;;'''';;;;;;;'';';;;';''''';;'';;;';;';';:';:;;::::;;; .,,.,,,.,,...,,,....`............,;;;;;;;;;;';;;''';;;;;;;;';';;;;;;;;;;:;;:::;;;;;;;:;::;;;:;;;;;;';;;;;;';'';;''';;;';;;;;;+;';;';'';;'++'''''';'''';;;';;';;''';';;;';'';;;;;;;;';;;;;;;';;;;;;;;:::.,,:,,,,;;;;;;;;;''';;''';;;';'';;';'''';;''';';';';;'':';:;;;;;;;;; ..,,,,,::::::::,...`...........,::,,,;;;;;;;;;;;''';;;;;;;;';;;;;;;;;:;;;;;;:::;;:;;::;::;;;:;;';::;'':;;';;';;;+'+';;;;;;;;;+;;;;';';;''+''''''';;''';;;;;;;;;'';;;;;;'''';;';;;';;;;;;;;;';;;::;;;'::,.....:;;;;;;';;;';'';;';;;'';';;;';;;''''''';';;;';;'';';:':;;;;;;; ..,,,::,,`..,,,,..........`...,......:;;;;;;;;;;;;;;;;;;;;;;++#@@@@#+';;;;;;;:::;;;;:::::::::::;::::;':;;;;;';;;;;;'+':;;:;;;;';;;'';;;;'';';;''';;;'';';;;:;;;;;;;;;;;''';;;'';;;:;;;::;;;;::::::;;;:::.,,:;:;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';';;;;;;;;;'; ,,,,:...,.,,,,,@@@@@@@@@@@@@@........:;;;;;;;;;;;;;;;;;;;#@@#;,` `.;#@@#;:;;;:::;;;;:::#@@@@@@@@@@@@@@;;;;;;';;;;;;;'';;;;;;;;;;;;;;@@@@@@@@@@@@@;;'';';;'#@@@@@@@@@@@;''';;;;;#@@@@@@@@@@#;@@@@@@@@@@@@@@@;;;;;;';;@@@@@@@@@@@;@@@@@@@@@@@@@@@@@@@@@@@@@@@@@''';;';':;;'; ,,,:,,,,,.:::;,@ @.......:;;;';;;;;;;;;;;';;@@; ;@@;;;;::;:;;:::@ @;;:;;'';;;;';;;;;:;;;;;;;;;;;;@ ;#;;';';;;@ @;''';;;;;@ :#;@ @;';;;;;;;@ @;@ ;';;;';;':';; .,:,,,:,,;;::::@ @.,..,,,;;;;';;;;;;;;;;;'#@, ,@#:;;::::::::@ @;;;;;;;;;;;;;;;:;;;;;';;;;;;;;@ `@;;;;;;;'@ ++;'';;;;;@ #+;@ @;;;';;;;;@ @:@ ;';'';;'':';; .;,,::;::;:;,,,@ @...,,:;;;;;;';;;;;;;;;;@# +@;:::::;;::@ @;;;;;;;;;';;;;;;;:;;;';;;;;;;;#: @;;;;;;;#' .@'';;;;;'# @;;@ @;;;;;;;;;@ @:@ ;';'''''';';; .:,:;:;;;:::,,,@ @,:;;'';;;;;;';;;;;;;;;@: ,@;:;:::::;@ @;;;;;;;;;;;;;;;;;;::;';;;;;;;''# @;;;;;;;@. @''';;;;#, `@;;@ @;;;;;;;;;@ @:@ ;''''''';'';' ..::;,,.:;,.,,,@ @;'';'';;;;;';';;;;;;;@: .@::;:;;:;@ @:;;;;;;;;;;;;;;;;;;:;;;;;;;;;;:@ '+;;;;;;@ @;;;;;;;@ ;#;;@ @:;';;;;;;@ @:@ ;'''''''''';; .,:;;,,..;..,,,@ @;;';;;;;;;';;;;;;;;;@; ,@:::;;:;@ @;;;;;;;:;;;;;;;;;;;;:;;;;;;;;;;@ .@;;;;;;@ +#';;;;;@ @;;;@ @:;;;;;;;;@ @:@ ;''''''';';;' .:,,::......,,,@ @;;;;;;;;;;':....,:;## ;#,;;;:;@ @;;:;;;;:;;;;;;;;;;;;;:;;;;;;;;;#; @;;:;;++ .@;';;:'# @:;;@ @;;;;;;;;;@ @:@ ;''''''''';'' .,,:::.,....::,@ @;';;'';;;;;.......:@ @';;;;;@ @;;;;;;;:;;;;;;;;;;;;;:;;;;;;;;;'@ @;;;;;@. @;;;;:#: `@:;;@ @;;;;;;;;;@ @:@ ;'''''';'';'' ....::......::.@ @;'';''';';:..`....@, :#@'` `@:::;;@ @;;;;;;;;::;;;;;;;;;;;;;;;;;;;;;;@ ++;;;;@ @;;;;;@ '+;;;@ @;;;;;;;;:@ @:@ ''''''';''''' ````.....,.,:,,@ @,;';;';'';:..`....@ `@#';+@' @':;;;@ @;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;:@` ,@;;;;@ ++;;;;@ @;:;;@ @;;;;;;;;:@ @;@@@@@@@@@ @@@@@@@@';''''';''''' .```.,..,,,,:,;@ @..,;';'''',..`...#; @;;;;;;@: .@:::;@ @;;;;:;;;;;;;;:;';;:;;;;;;;;;;;;;#' @:;:'+ `@;;;'# @;;;;@ @;;;;;;;;:@ @;;;;;;;;:@ @;;;;;;;;'''''''''''; ..`..::,:,,,';+@ @....:';;''..``...@ @+:;;;;;;@ @:;;:@ @;;;;;;;;;;;;;;;;;'::;::;;:;;;;;;;@ @;;:@, @:;;#: .@;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;';;''';'''''''''''' ,,,,:::'+;::+#+@ @`....:''';..``..:@ @,,,,:;;;@: +';;;@ @:;;;;;;;;;;;;;';''::;:;:::;;;;;;;@ #';;@ @;:;@ ++:;;;@ @;;;;;;:::@ @;;;;;;;;;@ @;';;'';;;''''''''''' ;::;;'++++++#++@ @``....:'';..``..+: ;#,.,,.,:;'# ,#;;;@ @::';;;;;;;;;;;':'';::;;;;::::;;;;@. :#::@ '#;:@ @;;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;''''''''''' ######+++'++#++@ @```.`..:';..``..@` @,......,;;@ @;;;@ @;;;;;:;;;;;;;';:'';;;';;;;;;;;;;;+' @;'# `@;;@ @;;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;';;;'''''''''; '''+#+++++##+#+@ @```..`..;;..``..@ @`.......::@ @;;;@ @:;;;;;;;;;;;;';;';;;;';;;;;;;;:;;;@ @;#, @;#; ,#:;;;;@ @;;;;;;;;:@ @;;;;;;;;;@ @;;;;;;';;;'''''''''' '';'+#####+++++@ @.```.``..:..`.`.@ @.......,.,@ @:;;@ @;;';;;;;;;';;';;'';;'';;;;;';:;::;@ @'@ @;@ #';;;;;@ @;;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;';';;''''' ''';;'+###+#++;@ @..```.`.....`.`.@ @.....,..,:@ @;;;@ @;;;'';;;;;;;:.:;';';'';;;;';:;;:;;@, :#@ '+@ @;;;;;;@ @;;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;;;;''''' ''''';;'++#+++,@ @...``..`....`.`.@ @...,,,,;;;@ @;;;@ @;';;';;;:...,;::';'''';;;'';:;;:;;'+ `@# : `@@ @;;;:;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;;'';'''' '''''''''++++';@ @....``..`...`.`.@ @.,,,.,,.,;@ @;;;@ @''';';;:.``.,;;,;;;;;;;;'';;:;:;;::@ @: # @; :#;;;;;;@ @:;;;:;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;'''''''' '''''''''+++'''@ @,....``.`...`.`.@ @,,......,.@ @;;;@ @;';:;;;.``...:,,;;;;;';''';;;;:;;:;@ @ ,@ @` @';;;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;''';;''; ''''''''''++'';@ @::...``.`...`.`.@ @........,,@ @;;;@ @:;:,:';:::..,..`.:;;;;'''';;;:;;;;:@, ; #@ ' @::;;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;''';;;;; +++''''''+#+'',@ @.;;...`.....`...@ @........,.@ @;;'@ @:,,,:;;;':.:..`.`.;;;'''';;';;;;'';+# ` @#: ` `@:;::;;;@ @;;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;';;;;;;' +++++'''''#+'',@ @.`;;,.`..`......@ @..........@ @;;;@ @::,..,;;';';..`...;;'''';;';;;;;;';;@ @'# ;#:;;;;;:@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;'''';;;;;'' '''+++''''#+'+,@ @...,:...........@ @..........@ @;;;@ @,;,..,;;'''+:,::::';'''';';;;;;:;;;'@ ,@:@ @;;;;;;;:@ @:;:;;;;;;@ @;;;;;;;;;@ @;;;;;;;;''''';';;;'' +';''+++''#+'+,@ @...``..........,@. @:,.,,..,,:@ ,#;;;@ @:,..:;;;'';+;;';;;;;'';;;';;';;;;;;;#: ++;@ @;;;::;;;@ @:;;;;;;;;# @;;;;;;;;;@ @;'';;;;'''''';';;''; ++''''++++##'+;@ @`....`...,..,..,+' :#,,,..,,,+; #+;;;@ @,,.`.;;;'';';;;;;;;;;;;;'';;'';;;;'''# @;;#: `@;;:;;;;;@ @;;;;;;;;'+ @;;;;;;;;;@ @;';;;;;''''''''''';; ++++''''++##+'+@ @``....`..,,.,,,:,@ @,..,,,,,@` @;;;;@ @,.,::';;;'''';'';';;;;;;;'';;;;';;'';@ @;;'# '+;;;;;;;;@ @;;;;;;;;#' @;;;;;;;;;@ @;;;;;;''''''''';;;'; ''#++''''+#++''@ @.``...``.,,..:...@ +#,,,,,.'# .@;;;;@ @;.,;';;;;';;;:;;;';;;;;;;'';';;;;;;''@` .@;;;@ @:;;;;;;;;@` @';;;''''@` @;;;;;;;''@ @;;';;';''';''''';';, +'+++++';'##++'@ @@@@@@@@@@@@@@@##.++ @+,...'@` #+;;;;@ @@@@@@@@@@@@@@@@;:';;;;;;'';;';;;;;;';#; '+;;;@ @;;;:;;;;;#, .@';;;;'@' @;;;;;;;;'@ @;'';;'''''''';''':,, +'''++++''+#++'@ @::@ #@@@@#` `@';;;;@ @:;;;;;;;;'';;';;;;;;'';@ @;;;;#: .@;;;;;;;;;++ .@@@@@@, @;;;;;;;;;@ @;'';;''''''''''';,;: #++''++++'+##;,@ @;:++ @+'';;;@ @;;;;;;;;;';;;;;;;;;;;';@ @;;;;;@ ++;;;;;;;;;;@ :#;;;;;;'';@ @;''';''''''''''''':: +##++++'+'++;,.@ @:,,@. ;@;';;;;@ @;;;;;;;;;';';;;';;;;;';@` `@;;;;;@ @;;;;;;;;;;;@ @';;;;;;;;;@ @'';';'''''';'''''';; +++####+''+':,.@ @,:.,@ `@';'';;;@ @'';;;;;;';'';;;;';;;;;;#' '#;;;;;@ @;;;;;;;;;';++ `@+;;;;;;;;;@ @'';;'''''''''''''''; '++++++##+++:.,@ @::,.'@ @+';'';;;@ @;;';;;;;;;;;;:;;;:;;;;;;@ @';;;;;#; :#;;;;;;;;;;;;@. @+'+;;;''';;@ @'';;''';'''';''''''; +++++++###+++;,@ @,:,,;+@ `@+'''';;;;@ @;';;;;;';';;;;;;;::;;;;:@ @;;;;;;'@ #';;;;;;;;;;;;'@` +@;;'';;;;';;@ @;'';''';;''''''''''; +++++++++++###'@ @.;,:',;@` .@+';;';;;;;@ @''';;'';;;;;;;;;;;;;;;;;@. `@;;;;:;;@ @;;;;;;;;;;;;;;+@` +@;;;;';''';;;@ @;'';''';;'''';';'''; +''''++++++###+@ @::.,::.:@' +@''''''';;;;@ @;;;;'';;;;;;;;;;;;;;;;;:+' ;#;;;;;;;@` @;;;;;;;;;;;;;;;'@; @#;;;;;'':;;'''@ @:'';'';;;''''';;'''; ''+'''''+++##'+@ @;:,,::,;;#@: ;@#''''''''''';@ @:;;;;;;;;;';;;;;;;;;;;;:;@ @';;;;;;;#; ;#;;;;;;;;;;;;;;;;;@@: `+@+,;;;:;;'';';';@ @;;;;;';;;;'''';;;''; +''''''++++##'+# `@:;::':;;;;;#@#, ,#@@''''''''''''';@` #;:;;;;;;;;;;;;;;;;;;;;;;;@ `@;;;;;;;;'# @';;;;;;';;;;;;;;';''@@#:` `'@@#;;,;;;::;:'+''''@` `@;;;;;;';;'';''';;''; '''''''+#+++#'+@@@@@@@@@@@@@@@@@@@@@@@@@@@@@;:;;;',;:;;:;,'#@@@@@@@@@@#:,;'''''''''''''''@@@@@@@@@@@@@@@@@@@@@@@@@@@@#:;;;:;;;;;;;;;;;;;;;;;;;;+@@@@@@@@@@@+;;;;;;;;;#@@@@@@@@@@#;;;;;;';;'';;;;;;';';;'#@@@@@@@@@@@@#+':';:::;:,:';+'';;'@@@@@@@@@@@@;;;;;;;';;'';;;';;;;; '''''''+#++++'#+''+++#+''+,...```....,..:'''''';';;;:,:'':;,;:,..........,;''''''''''''''':,.::;;::;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;:;;;;;;;;'''++++'';:;';;:;;;''';;;;';''';:;;::;;::;''+;;;;;;;;;;;;;;;;;;;;;;;;;;';;;';;;;;; '''''''++++++'#++'++#++''.....``......`.:';;'+';;::';::+''':,,,..```.......:;'''''''';'';,..,:,:;,:.:;;;;;;;';;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;'';''';;';;;;;;;;;;;;;;;;;;;;;;;;;;;;+';;#;:''#':;;:;;:;+;''''''';';;':';::;;:::;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;';;;; ''''''++#++#+'#++'''+++:.....`......``..;,`.,;+';::+',,'++;......``````.....:''''''''''';,,;:.:.,.,:,,;;;;;'';;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;'';;;'';;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;++''+;+#';+;::''::::;'''''''';;';':';::;;;::;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; ''''''++#++#+'#++'''+'.............``...``..`,+''''+',';'',:::,,.............:'''''';;;';;;;.,:.,,.;:,,;;;;';;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;';;'';;;;;;:;;;;;;;;:;;;;;;;;;;;;';#++'+;;#+;:;''''';;;''''''''';';;';';;,;;;,::;;'';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;';;", "start_char_pos": 7967, "end_char_pos": 8161}], "sents_char_pos": [0, 99, 177, 282, 330, 518, 860, 999, 1059, 1133, 1235, 1337, 1394, 1619, 1742, 1817, 2006, 2065, 2233, 2399, 2507, 2575, 2618, 2901, 2936, 3133, 3373, 3480, 3627, 3766, 3853, 3930, 4108, 4219, 4275, 4441, 4540, 4729, 4870, 4992, 5055, 5240, 5443, 5520, 5604, 5690, 5731, 5828, 5899, 5988, 6113, 6141, 6207, 6235, 6320, 6412, 6468, 6608, 6633, 6663, 6763, 6856, 6938, 7036, 7140, 7206, 7305, 7421, 7522, 7835]}
+{"doc_id": "82256", "revision_depth": "3", "before_revision": "Other election coverage Ontario, Canada byelections announced Ontario Green Party leader to run in byelection Burlington, Markham, and York South-Weston election results Results of 2007 Ontario, Canada General Election hi Also see :Category:2007 Ontario provincial election and Template:OntarioProvincialElection2007.%DIFDELCMD < %DIFDELCMD < %%% Category:2007 Ontario provincial election Category:Elections in Canada Category:Ontario Category:No publish This page is for Wikinews coverage of the 2007 Ontario provincial election.%DIFDELCMD < %DIFDELCMD < %%% Interviews Algoma-Manitoulin Ontario Votes 2007: Interview with Family Coalition Party candidate Ray Scott, Algoma-Manitoulin Ajax-Pickering Ontario Votes 2007: Interview with Green Party candidate Cecile Willert, Ajax\u2014Pickering%DIFDELCMD < %DIFDELCMD < %%% Beaches-East York Ontario Votes 2007: Interview with Family Coalition Party candidate Joel Kidd, Beaches-East York Bramalea-Gore-Malton Ontario Votes 2007: Interview with Green candidate Bruce Haines, Bramalea-Gore-Malton Ontario Votes 2007: Interview with NDP candidate Glenn Crowe, Bramalea-Gore-Malton, Ontario Votes 2007: Interview with Progressive Conservative candidate Pam Hundal, Bramalea\u2014Gore\u2014Malton%DIFDELCMD < %DIFDELCMD < %%% Brant Ontario Votes 2007: Interview with Progressive Conservative candidate Dan McCreary, Brant Bruce-Grey-Owen Sound Ontario Votes 2007: Interview with NDP candidate Paul Johnstone, Bruce-Grey-Owen Sound%DIFDELCMD < %DIFDELCMD < %%% Carleton\u2014Mississippi Mills Ontario Votes 2007: Interview with Green Party candidate John Ogilvie, Carleton\u2014Mississippi Mills Chatham\u2014Kent\u2014Essex Ontario Votes 2007: Interview with Family Coalition Party candidate Mark Morin, Chatham\u2014Kent\u2014Essex%DIFDELCMD < %DIFDELCMD < %%% Don Valley East Ontario Votes 2007: Interview with Freedom Party candidate Wayne Simmons, Don Valley East Ontario Votes 2007: Interview with Family Coalition Party candidate Daniel Kidd, Don Valley West Durham Ontario Votes 2007: Interview with Progressive Conservative candidate John O'Toole, Durham%DIFDELCMD < %DIFDELCMD < %%% Essex Ontario Votes 2007: Interview with Libertarian candidate Aaron Parent, Essex Hamilton Centre Ontario Votes 2007: Interview with Green candidate Peter Ormond, Hamilton Centre%DIFDELCMD < %DIFDELCMD < %%% Hamilton East Ontario Votes 2007: Interview with Family Coalition Party candidate Bob Innes, Hamilton East Kenora\u2014Rainy River Ontario Votes 2007: Interview with Progressive Conservative candidate Penny Lucas, Kenora\u2014Rainy River%DIFDELCMD < %DIFDELCMD < %%% Kitchener Centre Ontario Votes 2007: Interview with Family Coalition Party candidate Bill Bernhardt, Kitchener Centre Kitchener-Conestoga Ontario Votes 2007: Interview with Libertarian candidate Larry Stevens, Kitchener-Conestoga%DIFDELCMD < %DIFDELCMD < %%% Lambton\u2014Kent\u2014Middlesex Ontario Votes 2007: Interview with Family Coalition Party candidate Bill McMaster, Lambton\u2014Kent\u2014Middlesex London-Fanshawe Ontario Votes 2007: Interview with Progressive Conservative candidate Jim Chapman, London-Fanshawe%DIFDELCMD < %DIFDELCMD < %%% London North Centre Ontario Votes 2007: Interview with Green Party candidate Brett McKenzie, London North Centre Nepean-Carleton Ontario Votes 2007: Interview with Family Coalition Party candidate Suzanne Fortin, Nepean-Carleton Ontario Votes 2007: Interview with Green Party candidate Gordon Kubanek, Nepean Carleton%DIFDELCMD < %DIFDELCMD < %%% Newmarket-Aurora Ontario Votes 2007: Interview with Family Coalition Party candidate Tad Brudzinski, Newmarket-Aurora Oakville Ontario Votes 2007: Interview with Green candidate Marion Schaffer, Oakville%DIFDELCMD < %DIFDELCMD < %%% Ottawa Centre Ontario Votes 2007: Interview with Communist Party candidate Stuart Ryan, Ottawa Centre Ottawa-Orleans Ontario Votes 2007: Interview with Freedom Party candidate David McGruer, Ottawa-Orleans%DIFDELCMD < %DIFDELCMD < %%% Ottawa West-Nepean Ontario Votes 2007: Interview with Green candidate Martin Hyde, Ottawa West-Nepean Oxford Ontario Votes 2007: Interview with Liberal candidate Brian Jackson, Oxford%DIFDELCMD < %DIFDELCMD < %%% Parkdale-High Park Ontario Votes 2007: Interview with Libertarian candidate Zork Hun, Parkdale-High Park Peterborough Ontario Votes 2007: Interview with Green Party candidate Miriam Stucky, Peterborough%DIFDELCMD < %DIFDELCMD < %%% Renfrew-Nipissing-Pembroke Ontario Votes 2007: Interview with NDP candidate Felicite Stairs, Renfrew-Nipissing-Pembroke%DIFDELCMD < %DIFDELCMD < %%% Scarborough-Rouge River Ontario Votes 2007: Interview with Libertarian candidate Alan Mercer, Scarborough\u2014Rouge River Ontario Votes 2007: Interview with NDP candidate Sheila White, Scarborough-Rouge River%DIFDELCMD < %DIFDELCMD < %%% St. Paul's Ontario Votes 2007: Interview with Family Coalition Party candidate Blaise Thompson, St. Paul's Ontario Votes 2007: Interview with independent candidate Charles de Kerckhove, St. Paul's%DIFDELCMD < %DIFDELCMD < %%% Sudbury Ontario Votes 2007: Interview with Family Coalition Party candidate Carita Murphy-Marketos, Sudbury%DIFDELCMD < %DIFDELCMD < %%% Thornhill Ontario Votes 2007: Interview with Green Party candidate Lloyd Helferty, Thornhill%DIFDELCMD < %DIFDELCMD < %%% Toronto Centre Ontario Votes 2007: Interview with Communist Party candidate Johan Boyden, Toronto Centre%DIFDELCMD < %DIFDELCMD < %%% Toronto\u2014Danforth Ontario Votes 2007: Interview with Libertarian candidate Mark Scott, Toronto\u2014Danforth Ontario Votes 2007: Interview with Communist Party candidate Shona Bracken, Toronto Danforth%DIFDELCMD < %DIFDELCMD < %%% Thunder Bay-Atikokan Ontario Votes 2007: Interview with Green candidate Russ Aegard, Thunder Bay-Atikokan%DIFDELCMD < %DIFDELCMD < %%% Trinity-Spadina Ontario Votes 2007: Interview with Liberal candidate Kate Holloway, Trinity-Spadina Ontario Votes 2007: Interview with Progessive Conservative candidate Tyler Currie, Trinity-Spadina%DIFDELCMD < %DIFDELCMD < %%% Vaughan Ontario Votes 2007: Interview with Green Party candidate Russell Korus, Vaughan Ontario Votes 2007: Interview with NDP candidate Rick Morelli, Vaughan%DIFDELCMD < %DIFDELCMD < %%% Welland Ontario Votes 2007: Interview with Green candidate Mark Grenier, Welland%DIFDELCMD < %DIFDELCMD < %%% Willowdale Ontario Votes 2007: Interview with Green Party candidate Torbjorn Zetterlund, Willowdale Ontario Votes 2007: Interview with Family Coalition Party candidate Kirsten Monster, Willowdale%DIFDELCMD < %DIFDELCMD < %%% Windsor-Tecumseh Ontario Votes 2007: Interview with Green candidate Andrew McAvoy, Windsor-Tecumseh%DIFDELCMD < %DIFDELCMD < %%% Whitby-Oshawa\u200e Ontario Votes 2007: Interview with Green candidate Doug Anderson, Whitby-Oshawa\u200e%DIFDELCMD < %DIFDELCMD < %%% York Centre Ontario Votes 2007: Interview with Green candidate Marija Minic, York Centre%DIFDELCMD < %DIFDELCMD < %%% Other election coverage Ontario, Canada byelections announced Ontario Green Party leader to run in byelection Burlington, Markham, and York South-Weston election results Results of 2007 Ontario, Canada General Election hi%DIFDELCMD < %DIFDELCMD < %%% Also see :Category:2007 Ontario provincial election and Template:OntarioProvincialElection2007.%DIFDELCMD < %DIFDELCMD < %%% Category:2007 Ontario provincial election Category:Elections in Canada Category:Ontario Category:No publish%DIFDELCMD < %DIFDELCMD < %%% This page is for Wikinews coverage of the 2007 Ontario provincial election.%DIFDELCMD < %DIFDELCMD < %%% Interviews Algoma-Manitoulin Ontario Votes 2007: Interview with Family Coalition Party candidate Ray Scott, Algoma-Manitoulin%DIFDELCMD < %DIFDELCMD < %%% Ajax-Pickering Ontario Votes 2007: Interview with Green Party candidate Cecile Willert, Ajax\u2014Pickering%DIFDELCMD < %DIFDELCMD < %%% Beaches-East York Ontario Votes 2007: Interview with Family Coalition Party candidate Joel Kidd, Beaches-East York%DIFDELCMD < %DIFDELCMD < %%% Bramalea-Gore-Malton Ontario Votes 2007: Interview with Green candidate Bruce Haines, Bramalea-Gore-Malton Ontario Votes 2007: Interview with NDP candidate Glenn Crowe, Bramalea-Gore-Malton, Ontario Votes 2007: Interview with Progressive Conservative candidate Pam Hundal, Bramalea\u2014Gore\u2014Malton%DIFDELCMD < %DIFDELCMD < %%% Brant Ontario Votes 2007: Interview with Progressive Conservative candidate Dan McCreary, Brant%DIFDELCMD < %DIFDELCMD < %%% Bruce-Grey-Owen Sound Ontario Votes 2007: Interview with NDP candidate Paul Johnstone, Bruce-Grey-Owen Sound%DIFDELCMD < %DIFDELCMD < %%% Carleton\u2014Mississippi Mills Ontario Votes 2007: Interview with Green Party candidate John Ogilvie, Carleton\u2014Mississippi Mills%DIFDELCMD < %DIFDELCMD < %%% Chatham\u2014Kent\u2014Essex Ontario Votes 2007: Interview with Family Coalition Party candidate Mark Morin, Chatham\u2014Kent\u2014Essex%DIFDELCMD < %DIFDELCMD < %%% Don Valley East Ontario Votes 2007: Interview with Freedom Party candidate Wayne Simmons, Don Valley East Ontario Votes 2007: Interview with Family Coalition Party candidate Daniel Kidd, Don Valley West%DIFDELCMD < %DIFDELCMD < %%% Durham Ontario Votes 2007: Interview with Progressive Conservative candidate John O'Toole, Durham%DIFDELCMD < %DIFDELCMD < %%% Essex Ontario Votes 2007: Interview with Libertarian candidate Aaron Parent, Essex%DIFDELCMD < %DIFDELCMD < %%% Hamilton Centre Ontario Votes 2007: Interview with Green candidate Peter Ormond, Hamilton Centre%DIFDELCMD < %DIFDELCMD < %%% Hamilton East Ontario Votes 2007: Interview with Family Coalition Party candidate Bob Innes, Hamilton East%DIFDELCMD < %DIFDELCMD < %%% Kenora\u2014Rainy River Ontario Votes 2007: Interview with Progressive Conservative candidate Penny Lucas, Kenora\u2014Rainy River%DIFDELCMD < %DIFDELCMD < %%% Kitchener Centre Ontario Votes 2007: Interview with Family Coalition Party candidate Bill Bernhardt, Kitchener Centre%DIFDELCMD < %DIFDELCMD < %%% Kitchener-Conestoga Ontario Votes 2007: Interview with Libertarian candidate Larry Stevens, Kitchener-Conestoga%DIFDELCMD < %DIFDELCMD < %%% Lambton\u2014Kent\u2014Middlesex Ontario Votes 2007: Interview with Family Coalition Party candidate Bill McMaster, Lambton\u2014Kent\u2014Middlesex%DIFDELCMD < %DIFDELCMD < %%% London-Fanshawe Ontario Votes 2007: Interview with Progressive Conservative candidate Jim Chapman, London-Fanshawe%DIFDELCMD < %DIFDELCMD < %%% London North Centre Ontario Votes 2007: Interview with Green Party candidate Brett McKenzie, London North Centre%DIFDELCMD < %DIFDELCMD < %%% Nepean-Carleton Ontario Votes 2007: Interview with Family Coalition Party candidate Suzanne Fortin, Nepean-Carleton Ontario Votes 2007: Interview with Green Party candidate Gordon Kubanek, Nepean Carleton%DIFDELCMD < %DIFDELCMD < %%% Newmarket-Aurora Ontario Votes 2007: Interview with Family Coalition Party candidate Tad Brudzinski, Newmarket-Aurora%DIFDELCMD < %DIFDELCMD < %%% Oakville Ontario Votes 2007: Interview with Green candidate Marion Schaffer, Oakville%DIFDELCMD < %DIFDELCMD < %%% Ottawa Centre Ontario Votes 2007: Interview with Communist Party candidate Stuart Ryan, Ottawa Centre%DIFDELCMD < %DIFDELCMD < %%% Ottawa-Orleans Ontario Votes 2007: Interview with Freedom Party candidate David McGruer, Ottawa-Orleans%DIFDELCMD < %DIFDELCMD < %%% Ottawa West-Nepean Ontario Votes 2007: Interview with Green candidate Martin Hyde, Ottawa West-Nepean%DIFDELCMD < %DIFDELCMD < %%% Oxford Ontario Votes 2007: Interview with Liberal candidate Brian Jackson, Oxford%DIFDELCMD < %DIFDELCMD < %%% Parkdale-High Park Ontario Votes 2007: Interview with Libertarian candidate Zork Hun, Parkdale-High Park%DIFDELCMD < %DIFDELCMD < %%% Peterborough Ontario Votes 2007: Interview with Green Party candidate Miriam Stucky, Peterborough%DIFDELCMD < %DIFDELCMD < %%% Renfrew-Nipissing-Pembroke Ontario Votes 2007: Interview with NDP candidate Felicite Stairs, Renfrew-Nipissing-Pembroke%DIFDELCMD < %DIFDELCMD < %%% Scarborough-Rouge River Ontario Votes 2007: Interview with Libertarian candidate Alan Mercer, Scarborough\u2014Rouge River Ontario Votes 2007: Interview with NDP candidate Sheila White, Scarborough-Rouge River%DIFDELCMD < %DIFDELCMD < %%% St. Paul's Ontario Votes 2007: Interview with Family Coalition Party candidate Blaise Thompson, St. Paul's Ontario Votes 2007: Interview with independent candidate Charles de Kerckhove, St. Paul's%DIFDELCMD < %DIFDELCMD < %%% Sudbury Ontario Votes 2007: Interview with Family Coalition Party candidate Carita Murphy-Marketos, Sudbury%DIFDELCMD < %DIFDELCMD < %%% Thornhill Ontario Votes 2007: Interview with Green Party candidate Lloyd Helferty, Thornhill%DIFDELCMD < %DIFDELCMD < %%% Toronto Centre Ontario Votes 2007: Interview with Communist Party candidate Johan Boyden, Toronto Centre%DIFDELCMD < %DIFDELCMD < %%% Toronto\u2014Danforth Ontario Votes 2007: Interview with Libertarian candidate Mark Scott, Toronto\u2014Danforth Ontario Votes 2007: Interview with Communist Party candidate Shona Bracken, Toronto Danforth%DIFDELCMD < %DIFDELCMD < %%% Thunder Bay-Atikokan Ontario Votes 2007: Interview with Green candidate Russ Aegard, Thunder Bay-Atikokan%DIFDELCMD < %DIFDELCMD < %%% Trinity-Spadina Ontario Votes 2007: Interview with Liberal candidate Kate Holloway, Trinity-Spadina Ontario Votes 2007: Interview with Progessive Conservative candidate Tyler Currie, Trinity-Spadina%DIFDELCMD < %DIFDELCMD < %%% Vaughan Ontario Votes 2007: Interview with Green Party candidate Russell Korus, Vaughan Ontario Votes 2007: Interview with NDP candidate Rick Morelli, Vaughan%DIFDELCMD < %DIFDELCMD < %%% Welland Ontario Votes 2007: Interview with Green candidate Mark Grenier, Welland%DIFDELCMD < %DIFDELCMD < %%% Willowdale Ontario Votes 2007: Interview with Green Party candidate Torbjorn Zetterlund, Willowdale Ontario Votes 2007: Interview with Family Coalition Party candidate Kirsten Monster, Willowdale%DIFDELCMD < %DIFDELCMD < %%% Windsor-Tecumseh Ontario Votes 2007: Interview with Green candidate Andrew McAvoy, Windsor-Tecumseh%DIFDELCMD < %DIFDELCMD < %%% Whitby-Oshawa\u200e Ontario Votes 2007: Interview with Green candidate Doug Anderson, Whitby-Oshawa\u200e%DIFDELCMD < %DIFDELCMD < %%% York Centre Ontario Votes 2007: Interview with Green candidate Marija Minic, York Centre%DIFDELCMD < %DIFDELCMD < %%% Other election coverage Ontario, Canada byelections announced Ontario Green Party leader to run in byelection Burlington, Markham, and York South-Weston election results Results of 2007 Ontario, Canada General Election hi%DIFDELCMD < %DIFDELCMD < %%% Also see :Category:2007 Ontario provincial election and Template:OntarioProvincialElection2007.%DIFDELCMD < %DIFDELCMD < %%% Category:2007 Ontario provincial election Category:Elections in Canada Category:Ontario Category:No publish%DIFDELCMD < %DIFDELCMD < %%% This page is for Wikinews coverage of the 2007 Ontario provincial election.%DIFDELCMD < %DIFDELCMD < %%% Interviews Algoma-Manitoulin Ontario Votes 2007: Interview with Family Coalition Party candidate Ray Scott, Algoma-Manitoulin%DIFDELCMD < %DIFDELCMD < %%% Ajax-Pickering Ontario Votes 2007: Interview with Green Party candidate Cecile Willert, Ajax\u2014Pickering%DIFDELCMD < %DIFDELCMD < %%% Beaches-East York Ontario Votes 2007: Interview with Family Coalition Party candidate Joel Kidd, Beaches-East York%DIFDELCMD < %DIFDELCMD < %%% Bramalea-Gore-Malton Ontario Votes 2007: Interview with Green candidate Bruce Haines, Bramalea-Gore-Malton Ontario Votes 2007: Interview with NDP candidate Glenn Crowe, Bramalea-Gore-Malton, Ontario Votes 2007: Interview with Progressive Conservative candidate Pam Hundal, Bramalea\u2014Gore\u2014Malton%DIFDELCMD < %DIFDELCMD < %%% Brant Ontario Votes 2007: Interview with Progressive Conservative candidate Dan McCreary, Brant%DIFDELCMD < %DIFDELCMD < %%% Bruce-Grey-Owen Sound Ontario Votes 2007: Interview with NDP candidate Paul Johnstone, Bruce-Grey-Owen Sound%DIFDELCMD < %DIFDELCMD < %%% Carleton\u2014Mississippi Mills Ontario Votes 2007: Interview with Green Party candidate John Ogilvie, Carleton\u2014Mississippi Mills%DIFDELCMD < %DIFDELCMD < %%% Chatham\u2014Kent\u2014Essex Ontario Votes 2007: Interview with Family Coalition Party candidate Mark Morin, Chatham\u2014Kent\u2014Essex%DIFDELCMD < %DIFDELCMD < %%% Don Valley East Ontario Votes 2007: Interview with Freedom Party candidate Wayne Simmons, Don Valley East Ontario Votes 2007: Interview with Family Coalition Party candidate Daniel Kidd, Don Valley West%DIFDELCMD < %DIFDELCMD < %%% Durham Ontario Votes 2007: Interview with Progressive Conservative candidate John O'Toole, Durham%DIFDELCMD < %DIFDELCMD < %%% Essex Ontario Votes 2007: Interview with Libertarian candidate Aaron Parent, Essex%DIFDELCMD < %DIFDELCMD < %%% Hamilton Centre Ontario Votes 2007: Interview with Green candidate Peter Ormond, Hamilton Centre%DIFDELCMD < %DIFDELCMD < %%% Hamilton East Ontario Votes 2007: Interview with Family Coalition Party candidate Bob Innes, Hamilton East%DIFDELCMD < %DIFDELCMD < %%% Kenora\u2014Rainy River Ontario Votes 2007: Interview with Progressive Conservative candidate Penny Lucas, Kenora\u2014Rainy River%DIFDELCMD < %DIFDELCMD < %%% Kitchener Centre Ontario Votes 2007: Interview with Family Coalition Party candidate Bill Bernhardt, Kitchener Centre%DIFDELCMD < %DIFDELCMD < %%% Kitchener-Conestoga Ontario Votes 2007: Interview with Libertarian candidate Larry Stevens, Kitchener-Conestoga%DIFDELCMD < %DIFDELCMD < %%% Lambton\u2014Kent\u2014Middlesex Ontario Votes 2007: Interview with Family Coalition Party candidate Bill McMaster, Lambton\u2014Kent\u2014Middlesex%DIFDELCMD < %DIFDELCMD < %%% London-Fanshawe Ontario Votes 2007: Interview with Progressive Conservative candidate Jim Chapman, London-Fanshawe%DIFDELCMD < %DIFDELCMD < %%% London North Centre Ontario Votes 2007: Interview with Green Party candidate Brett McKenzie, London North Centre%DIFDELCMD < %DIFDELCMD < %%% Nepean-Carleton Ontario Votes 2007: Interview with Family Coalition Party candidate Suzanne Fortin, Nepean-Carleton Ontario Votes 2007: Interview with Green Party candidate Gordon Kubanek, Nepean Carleton%DIFDELCMD < %DIFDELCMD < %%% Newmarket-Aurora Ontario Votes 2007: Interview with Family Coalition Party candidate Tad Brudzinski, Newmarket-Aurora%DIFDELCMD < %DIFDELCMD < %%% Oakville Ontario Votes 2007: Interview with Green candidate Marion Schaffer, Oakville%DIFDELCMD < %DIFDELCMD < %%% Ottawa Centre Ontario Votes 2007: Interview with Communist Party candidate Stuart Ryan, Ottawa Centre%DIFDELCMD < %DIFDELCMD < %%% Ottawa-Orleans Ontario Votes 2007: Interview with Freedom Party candidate David McGruer, Ottawa-Orleans%DIFDELCMD < %DIFDELCMD < %%% Ottawa West-Nepean Ontario Votes 2007: Interview with Green candidate Martin Hyde, Ottawa West-Nepean%DIFDELCMD < %DIFDELCMD < %%% Oxford Ontario Votes 2007: Interview with Liberal candidate Brian Jackson, Oxford%DIFDELCMD < %DIFDELCMD < %%% Parkdale-High Park Ontario Votes 2007: Interview with Libertarian candidate Zork Hun, Parkdale-High Park%DIFDELCMD < %DIFDELCMD < %%% Peterborough Ontario Votes 2007: Interview with Green Party candidate Miriam Stucky, Peterborough%DIFDELCMD < %DIFDELCMD < %%% Renfrew-Nipissing-Pembroke Ontario Votes 2007: Interview with NDP candidate Felicite Stairs, Renfrew-Nipissing-Pembroke%DIFDELCMD < %DIFDELCMD < %%% Scarborough-Rouge River Ontario Votes 2007: Interview with Libertarian candidate Alan Mercer, Scarborough\u2014Rouge River Ontario Votes 2007: Interview with NDP candidate Sheila White, Scarborough-Rouge River%DIFDELCMD < %DIFDELCMD < %%% St. Paul's Ontario Votes 2007: Interview with Family Coalition Party candidate Blaise Thompson, St. Paul's Ontario Votes 2007: Interview with independent candidate Charles de Kerckhove, St. Paul's%DIFDELCMD < %DIFDELCMD < %%% Sudbury Ontario Votes 2007: Interview with Family Coalition Party candidate Carita Murphy-Marketos, Sudbury%DIFDELCMD < %DIFDELCMD < %%% Thornhill Ontario Votes 2007: Interview with Green Party candidate Lloyd Helferty, Thornhill%DIFDELCMD < %DIFDELCMD < %%% Toronto Centre Ontario Votes 2007: Interview with Communist Party candidate Johan Boyden, Toronto Centre%DIFDELCMD < %DIFDELCMD < %%% Toronto\u2014Danforth Ontario Votes 2007: Interview with Libertarian candidate Mark Scott, Toronto\u2014Danforth Ontario Votes 2007: Interview with Communist Party candidate Shona Bracken, Toronto Danforth%DIFDELCMD < %DIFDELCMD < %%% Thunder Bay-Atikokan Ontario Votes 2007: Interview with Green candidate Russ Aegard, Thunder Bay-Atikokan%DIFDELCMD < %DIFDELCMD < %%% Trinity-Spadina Ontario Votes 2007: Interview with Liberal candidate Kate Holloway, Trinity-Spadina Ontario Votes 2007: Interview with Progessive Conservative candidate Tyler Currie, Trinity-Spadina%DIFDELCMD < %DIFDELCMD < %%% Vaughan Ontario Votes 2007: Interview with Green Party candidate Russell Korus, Vaughan Ontario Votes 2007: Interview with NDP candidate Rick Morelli, Vaughan%DIFDELCMD < %DIFDELCMD < %%% Welland Ontario Votes 2007: Interview with Green candidate Mark Grenier, Welland%DIFDELCMD < %DIFDELCMD < %%% Willowdale Ontario Votes 2007: Interview with Green Party candidate Torbjorn Zetterlund, Willowdale Ontario Votes 2007: Interview with Family Coalition Party candidate Kirsten Monster, Willowdale%DIFDELCMD < %DIFDELCMD < %%% Windsor-Tecumseh Ontario Votes 2007: Interview with Green candidate Andrew McAvoy, Windsor-Tecumseh%DIFDELCMD < %DIFDELCMD < %%% Whitby-Oshawa\u200e Ontario Votes 2007: Interview with Green candidate Doug Anderson, Whitby-Oshawa\u200e%DIFDELCMD < %DIFDELCMD < %%% York Centre Ontario Votes 2007: Interview with Green candidate Marija Minic, York Centre%DIFDELCMD < %DIFDELCMD < %%% Other election coverage Ontario, Canada byelections announced Ontario Green Party leader to run in byelection Burlington, Markham, and York South-Weston election results Results of 2007 Ontario, Canada General Election hi%DIFDELCMD < %DIFDELCMD < %%% Also see :Category:2007 Ontario provincial election and Template:OntarioProvincialElection2007.%DIFDELCMD < %DIFDELCMD < %%% Category:2007 Ontario provincial election Category:Elections in Canada Category:Ontario Category:No publish%DIFDELCMD < %DIFDELCMD < %%% This page is for Wikinews coverage of the 2007 Ontario provincial election.%DIFDELCMD < %DIFDELCMD < %%% Interviews Algoma-Manitoulin Ontario Votes 2007: Interview with Family Coalition Party candidate Ray Scott, Algoma-Manitoulin%DIFDELCMD < %DIFDELCMD < %%% Ajax-Pickering Ontario Votes 2007: Interview with Green Party candidate Cecile Willert, Ajax\u2014Pickering%DIFDELCMD < %DIFDELCMD < %%% Beaches-East York Ontario Votes 2007: Interview with Family Coalition Party candidate Joel Kidd, Beaches-East York%DIFDELCMD < %DIFDELCMD < %%% Bramalea-Gore-Malton Ontario Votes 2007: Interview with Green candidate Bruce Haines, Bramalea-Gore-Malton Ontario Votes 2007: Interview with NDP candidate Glenn Crowe, Bramalea-Gore-Malton, Ontario Votes 2007: Interview with Progressive Conservative candidate Pam Hundal, Bramalea\u2014Gore\u2014Malton%DIFDELCMD < %DIFDELCMD < %%% Brant Ontario Votes 2007: Interview with Progressive Conservative candidate Dan McCreary, Brant%DIFDELCMD < %DIFDELCMD < %%% Bruce-Grey-Owen Sound Ontario Votes 2007: Interview with NDP candidate Paul Johnstone, Bruce-Grey-Owen Sound%DIFDELCMD < %DIFDELCMD < %%% Carleton\u2014Mississippi Mills Ontario Votes 2007: Interview with Green Party candidate John Ogilvie, Carleton\u2014Mississippi Mills%DIFDELCMD < %DIFDELCMD < %%% Chatham\u2014Kent\u2014Essex Ontario Votes 2007: Interview with Family Coalition Party candidate Mark Morin, Chatham\u2014Kent\u2014Essex%DIFDELCMD < %DIFDELCMD < %%% Don Valley East Ontario Votes 2007: Interview with Freedom Party candidate Wayne Simmons, Don Valley East Ontario Votes 2007: Interview with Family Coalition Party candidate Daniel Kidd, Don Valley West%DIFDELCMD < %DIFDELCMD < %%% Durham Ontario Votes 2007: Interview with Progressive Conservative candidate John O'Toole, Durham%DIFDELCMD < %DIFDELCMD < %%% Essex Ontario Votes 2007: Interview with Libertarian candidate Aaron Parent, Essex%DIFDELCMD < %DIFDELCMD < %%% Hamilton Centre Ontario Votes 2007: Interview with Green candidate Peter Ormond, Hamilton Centre%DIFDELCMD < %DIFDELCMD < %%% Hamilton East Ontario Votes 2007: Interview with Family Coalition Party candidate Bob Innes, Hamilton East%DIFDELCMD < %DIFDELCMD < %%% Kenora\u2014Rainy River Ontario Votes 2007: Interview with Progressive Conservative candidate Penny Lucas, Kenora\u2014Rainy River%DIFDELCMD < %DIFDELCMD < %%% Kitchener Centre Ontario Votes 2007: Interview with Family Coalition Party candidate Bill Bernhardt, Kitchener Centre%DIFDELCMD < %DIFDELCMD < %%% Kitchener-Conestoga Ontario Votes 2007: Interview with Libertarian candidate Larry Stevens, Kitchener-Conestoga%DIFDELCMD < %DIFDELCMD < %%% Lambton\u2014Kent\u2014Middlesex Ontario Votes 2007: Interview with Family Coalition Party candidate Bill McMaster, Lambton\u2014Kent\u2014Middlesex%DIFDELCMD < %DIFDELCMD < %%% London-Fanshawe Ontario Votes 2007: Interview with Progressive Conservative candidate Jim Chapman, London-Fanshawe%DIFDELCMD < %DIFDELCMD < %%% London North Centre Ontario Votes 2007: Interview with Green Party candidate Brett McKenzie, London North Centre%DIFDELCMD < %DIFDELCMD < %%% Nepean-Carleton Ontario Votes 2007: Interview with Family Coalition Party candidate Suzanne Fortin, Nepean-Carleton Ontario Votes 2007: Interview with Green Party candidate Gordon Kubanek, Nepean Carleton%DIFDELCMD < %DIFDELCMD < %%% Newmarket-Aurora Ontario Votes 2007: Interview with Family Coalition Party candidate Tad Brudzinski, Newmarket-Aurora%DIFDELCMD < %DIFDELCMD < %%% Oakville Ontario Votes 2007: Interview with Green candidate Marion Schaffer, Oakville%DIFDELCMD < %DIFDELCMD < %%% Ottawa Centre Ontario Votes 2007: Interview with Communist Party candidate Stuart Ryan, Ottawa Centre%DIFDELCMD < %DIFDELCMD < %%% Ottawa-Orleans Ontario Votes 2007: Interview with Freedom Party candidate David McGruer, Ottawa-Orleans%DIFDELCMD < %DIFDELCMD < %%% Ottawa West-Nepean Ontario Votes 2007: Interview with Green candidate Martin Hyde, Ottawa West-Nepean%DIFDELCMD < %DIFDELCMD < %%% Oxford Ontario Votes 2007: Interview with Liberal candidate Brian Jackson, Oxford%DIFDELCMD < %DIFDELCMD < %%% Parkdale-High Park Ontario Votes 2007: Interview with Libertarian candidate Zork Hun, Parkdale-High Park%DIFDELCMD < %DIFDELCMD < %%% Peterborough Ontario Votes 2007: Interview with Green Party candidate Miriam Stucky, Peterborough%DIFDELCMD < %DIFDELCMD < %%% Renfrew-Nipissing-Pembroke Ontario Votes 2007: Interview with NDP candidate Felicite Stairs, Renfrew-Nipissing-Pembroke%DIFDELCMD < %DIFDELCMD < %%% Scarborough-Rouge River Ontario Votes 2007: Interview with Libertarian candidate Alan Mercer, Scarborough\u2014Rouge River Ontario Votes 2007: Interview with NDP candidate Sheila White, Scarborough-Rouge River%DIFDELCMD < %DIFDELCMD < %%% St. Paul's Ontario Votes 2007: Interview with Family Coalition Party candidate Blaise Thompson, St. Paul's Ontario Votes 2007: Interview with independent candidate Charles de Kerckhove, St. Paul's%DIFDELCMD < %DIFDELCMD < %%% Sudbury Ontario Votes 2007: Interview with Family Coalition Party candidate Carita Murphy-Marketos, Sudbury%DIFDELCMD < %DIFDELCMD < %%% Thornhill Ontario Votes 2007: Interview with Green Party candidate Lloyd Helferty, Thornhill%DIFDELCMD < %DIFDELCMD < %%% Toronto Centre Ontario Votes 2007: Interview with Communist Party candidate Johan Boyden, Toronto Centre%DIFDELCMD < %DIFDELCMD < %%% Toronto\u2014Danforth Ontario Votes 2007: Interview with Libertarian candidate Mark Scott, Toronto\u2014Danforth Ontario Votes 2007: Interview with Communist Party candidate Shona Bracken, Toronto Danforth%DIFDELCMD < %DIFDELCMD < %%% Thunder Bay-Atikokan Ontario Votes 2007: Interview with Green candidate Russ Aegard, Thunder Bay-Atikokan%DIFDELCMD < %DIFDELCMD < %%% Trinity-Spadina Ontario Votes 2007: Interview with Liberal candidate Kate Holloway, Trinity-Spadina Ontario Votes 2007: Interview with Progessive Conservative candidate Tyler Currie, Trinity-Spadina%DIFDELCMD < %DIFDELCMD < %%% Vaughan Ontario Votes 2007: Interview with Green Party candidate Russell Korus, Vaughan Ontario Votes 2007: Interview with NDP candidate Rick Morelli, Vaughan%DIFDELCMD < %DIFDELCMD < %%% Welland Ontario Votes 2007: Interview with Green candidate Mark Grenier, Welland%DIFDELCMD < %DIFDELCMD < %%% Willowdale Ontario Votes 2007: Interview with Green Party candidate Torbjorn Zetterlund, Willowdale Ontario Votes 2007: Interview with Family Coalition Party candidate Kirsten Monster, Willowdale%DIFDELCMD < %DIFDELCMD < %%% Windsor-Tecumseh Ontario Votes 2007: Interview with Green candidate Andrew McAvoy, Windsor-Tecumseh%DIFDELCMD < %DIFDELCMD < %%% Whitby-Oshawa\u200e Ontario Votes 2007: Interview with Green candidate Doug Anderson, Whitby-Oshawa\u200e%DIFDELCMD < %DIFDELCMD < %%% York Centre Ontario Votes 2007: Interview with Green candidate Marija Minic, York Centre%DIFDELCMD < %DIFDELCMD < %%% Other election coverage Ontario, Canada byelections announced Ontario Green Party leader to run in byelection Burlington, Markham, and York South-Weston election results Results of 2007 Ontario, Canada General Election hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi", "after_revision": "Other election coverage Ontario, Canada byelections announced Ontario Green Party leader to run in byelection Burlington, Markham, and York South-Weston election results Results of 2007 Ontario, Canada General Election %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "D", "before": "hi", "after": null, "start_char_pos": 219, "end_char_pos": 221}, {"type": "D", "before": "Also see :Category:2007 Ontario provincial election and Template:OntarioProvincialElection2007.", "after": null, "start_char_pos": 222, "end_char_pos": 317}, {"type": "D", "before": "Category:2007 Ontario provincial election Category:Elections in Canada Category:Ontario Category:No publish", "after": null, "start_char_pos": 347, "end_char_pos": 454}, {"type": "D", "before": "This page is for Wikinews coverage of the 2007 Ontario provincial election.", "after": null, "start_char_pos": 455, "end_char_pos": 530}, {"type": "D", "before": "Interviews Algoma-Manitoulin Ontario Votes 2007: Interview with Family Coalition Party candidate Ray Scott, Algoma-Manitoulin", "after": null, "start_char_pos": 560, "end_char_pos": 685}, {"type": "D", "before": "Ajax-Pickering Ontario Votes 2007: Interview with Green Party candidate Cecile Willert, Ajax\u2014Pickering", "after": null, "start_char_pos": 686, "end_char_pos": 788}, {"type": "D", "before": "Beaches-East York Ontario Votes 2007: Interview with Family Coalition Party candidate Joel Kidd, Beaches-East York", "after": null, "start_char_pos": 818, "end_char_pos": 932}, {"type": "D", "before": "Bramalea-Gore-Malton Ontario Votes 2007: Interview with Green candidate Bruce Haines, Bramalea-Gore-Malton Ontario Votes 2007: Interview with NDP candidate Glenn Crowe, Bramalea-Gore-Malton, Ontario Votes 2007: Interview with Progressive Conservative candidate Pam Hundal, Bramalea\u2014Gore\u2014Malton", "after": null, "start_char_pos": 933, "end_char_pos": 1226}, {"type": "D", "before": "Brant Ontario Votes 2007: Interview with Progressive Conservative candidate Dan McCreary, Brant", "after": null, "start_char_pos": 1256, "end_char_pos": 1351}, {"type": "D", "before": "Bruce-Grey-Owen Sound Ontario Votes 2007: Interview with NDP candidate Paul Johnstone, Bruce-Grey-Owen Sound", "after": null, "start_char_pos": 1352, "end_char_pos": 1460}, {"type": "D", "before": "Carleton\u2014Mississippi Mills Ontario Votes 2007: Interview with Green Party candidate John Ogilvie, Carleton\u2014Mississippi Mills", "after": null, "start_char_pos": 1490, "end_char_pos": 1614}, {"type": "D", "before": "Chatham\u2014Kent\u2014Essex Ontario Votes 2007: Interview with Family Coalition Party candidate Mark Morin, Chatham\u2014Kent\u2014Essex", "after": null, "start_char_pos": 1615, "end_char_pos": 1732}, {"type": "D", "before": "Don Valley East Ontario Votes 2007: Interview with Freedom Party candidate Wayne Simmons, Don Valley East Ontario Votes 2007: Interview with Family Coalition Party candidate Daniel Kidd, Don Valley West", "after": null, "start_char_pos": 1762, "end_char_pos": 1964}, {"type": "D", "before": "Durham Ontario Votes 2007: Interview with Progressive Conservative candidate John O'Toole, Durham", "after": null, "start_char_pos": 1965, "end_char_pos": 2062}, {"type": "D", "before": "Essex Ontario Votes 2007: Interview with Libertarian candidate Aaron Parent, Essex", "after": null, "start_char_pos": 2092, "end_char_pos": 2174}, {"type": "D", "before": "Hamilton Centre Ontario Votes 2007: Interview with Green candidate Peter Ormond, Hamilton Centre", "after": null, "start_char_pos": 2175, "end_char_pos": 2271}, {"type": "D", "before": "Hamilton East Ontario Votes 2007: Interview with Family Coalition Party candidate Bob Innes, Hamilton East", "after": null, "start_char_pos": 2301, "end_char_pos": 2407}, {"type": "D", "before": "Kenora\u2014Rainy River Ontario Votes 2007: Interview with Progressive Conservative candidate Penny Lucas, Kenora\u2014Rainy River", "after": null, "start_char_pos": 2408, "end_char_pos": 2528}, {"type": "D", "before": "Kitchener Centre Ontario Votes 2007: Interview with Family Coalition Party candidate Bill Bernhardt, Kitchener Centre", "after": null, "start_char_pos": 2558, "end_char_pos": 2675}, {"type": "D", "before": "Kitchener-Conestoga Ontario Votes 2007: Interview with Libertarian candidate Larry Stevens, Kitchener-Conestoga", "after": null, "start_char_pos": 2676, "end_char_pos": 2787}, {"type": "D", "before": "Lambton\u2014Kent\u2014Middlesex Ontario Votes 2007: Interview with Family Coalition Party candidate Bill McMaster, Lambton\u2014Kent\u2014Middlesex", "after": null, "start_char_pos": 2817, "end_char_pos": 2945}, {"type": "D", "before": "London-Fanshawe Ontario Votes 2007: Interview with Progressive Conservative candidate Jim Chapman, London-Fanshawe", "after": null, "start_char_pos": 2946, "end_char_pos": 3060}, {"type": "D", "before": "London North Centre Ontario Votes 2007: Interview with Green Party candidate Brett McKenzie, London North Centre", "after": null, "start_char_pos": 3090, "end_char_pos": 3202}, {"type": "D", "before": "Nepean-Carleton Ontario Votes 2007: Interview with Family Coalition Party candidate Suzanne Fortin, Nepean-Carleton Ontario Votes 2007: Interview with Green Party candidate Gordon Kubanek, Nepean Carleton", "after": null, "start_char_pos": 3203, "end_char_pos": 3407}, {"type": "D", "before": "Newmarket-Aurora Ontario Votes 2007: Interview with Family Coalition Party candidate Tad Brudzinski, Newmarket-Aurora", "after": null, "start_char_pos": 3437, "end_char_pos": 3554}, {"type": "D", "before": "Oakville Ontario Votes 2007: Interview with Green candidate Marion Schaffer, Oakville", "after": null, "start_char_pos": 3555, "end_char_pos": 3640}, {"type": "D", "before": "Ottawa Centre Ontario Votes 2007: Interview with Communist Party candidate Stuart Ryan, Ottawa Centre", "after": null, "start_char_pos": 3670, "end_char_pos": 3771}, {"type": "D", "before": "Ottawa-Orleans Ontario Votes 2007: Interview with Freedom Party candidate David McGruer, Ottawa-Orleans", "after": null, "start_char_pos": 3772, "end_char_pos": 3875}, {"type": "D", "before": "Ottawa West-Nepean Ontario Votes 2007: Interview with Green candidate Martin Hyde, Ottawa West-Nepean", "after": null, "start_char_pos": 3905, "end_char_pos": 4006}, {"type": "D", "before": "Oxford Ontario Votes 2007: Interview with Liberal candidate Brian Jackson, Oxford", "after": null, "start_char_pos": 4007, "end_char_pos": 4088}, {"type": "D", "before": "Parkdale-High Park Ontario Votes 2007: Interview with Libertarian candidate Zork Hun, Parkdale-High Park", "after": null, "start_char_pos": 4118, "end_char_pos": 4222}, {"type": "D", "before": "Peterborough Ontario Votes 2007: Interview with Green Party candidate Miriam Stucky, Peterborough", "after": null, "start_char_pos": 4223, "end_char_pos": 4320}, {"type": "D", "before": "Renfrew-Nipissing-Pembroke Ontario Votes 2007: Interview with NDP candidate Felicite Stairs, Renfrew-Nipissing-Pembroke", "after": null, "start_char_pos": 4350, "end_char_pos": 4469}, {"type": "D", "before": "Scarborough-Rouge River Ontario Votes 2007: Interview with Libertarian candidate Alan Mercer, Scarborough\u2014Rouge River Ontario Votes 2007: Interview with NDP candidate Sheila White, Scarborough-Rouge River", "after": null, "start_char_pos": 4499, "end_char_pos": 4703}, {"type": "D", "before": "St. Paul's Ontario Votes 2007: Interview with Family Coalition Party candidate Blaise Thompson, St. Paul's Ontario Votes 2007: Interview with independent candidate Charles de Kerckhove, St. Paul's", "after": null, "start_char_pos": 4733, "end_char_pos": 4929}, {"type": "D", "before": "Sudbury Ontario Votes 2007: Interview with Family Coalition Party candidate Carita Murphy-Marketos, Sudbury", "after": null, "start_char_pos": 4959, "end_char_pos": 5066}, {"type": "D", "before": "Thornhill Ontario Votes 2007: Interview with Green Party candidate Lloyd Helferty, Thornhill", "after": null, "start_char_pos": 5096, "end_char_pos": 5188}, {"type": "D", "before": "Toronto Centre Ontario Votes 2007: Interview with Communist Party candidate Johan Boyden, Toronto Centre", "after": null, "start_char_pos": 5218, "end_char_pos": 5322}, {"type": "D", "before": "Toronto\u2014Danforth Ontario Votes 2007: Interview with Libertarian candidate Mark Scott, Toronto\u2014Danforth Ontario Votes 2007: Interview with Communist Party candidate Shona Bracken, Toronto Danforth", "after": null, "start_char_pos": 5352, "end_char_pos": 5547}, {"type": "D", "before": "Thunder Bay-Atikokan Ontario Votes 2007: Interview with Green candidate Russ Aegard, Thunder Bay-Atikokan", "after": null, "start_char_pos": 5577, "end_char_pos": 5682}, {"type": "D", "before": "Trinity-Spadina Ontario Votes 2007: Interview with Liberal candidate Kate Holloway, Trinity-Spadina Ontario Votes 2007: Interview with Progessive Conservative candidate Tyler Currie, Trinity-Spadina", "after": null, "start_char_pos": 5712, "end_char_pos": 5910}, {"type": "D", "before": "Vaughan Ontario Votes 2007: Interview with Green Party candidate Russell Korus, Vaughan Ontario Votes 2007: Interview with NDP candidate Rick Morelli, Vaughan", "after": null, "start_char_pos": 5940, "end_char_pos": 6098}, {"type": "D", "before": "Welland Ontario Votes 2007: Interview with Green candidate Mark Grenier, Welland", "after": null, "start_char_pos": 6128, "end_char_pos": 6208}, {"type": "D", "before": "Willowdale Ontario Votes 2007: Interview with Green Party candidate Torbjorn Zetterlund, Willowdale Ontario Votes 2007: Interview with Family Coalition Party candidate Kirsten Monster, Willowdale", "after": null, "start_char_pos": 6238, "end_char_pos": 6433}, {"type": "D", "before": "Windsor-Tecumseh Ontario Votes 2007: Interview with Green candidate Andrew McAvoy, Windsor-Tecumseh", "after": null, "start_char_pos": 6463, "end_char_pos": 6562}, {"type": "D", "before": "Whitby-Oshawa\u200e Ontario Votes 2007: Interview with Green candidate Doug Anderson, Whitby-Oshawa\u200e", "after": null, "start_char_pos": 6592, "end_char_pos": 6687}, {"type": "D", "before": "York Centre Ontario Votes 2007: Interview with Green candidate Marija Minic, York Centre", "after": null, "start_char_pos": 6717, "end_char_pos": 6805}, {"type": "D", "before": "Other election coverage Ontario, Canada byelections announced Ontario Green Party leader to run in byelection Burlington, Markham, and York South-Weston election results Results of 2007 Ontario, Canada General Election hi", "after": null, "start_char_pos": 6835, "end_char_pos": 7056}, {"type": "D", "before": "Also see :Category:2007 Ontario provincial election and Template:OntarioProvincialElection2007.", "after": null, "start_char_pos": 7086, "end_char_pos": 7181}, {"type": "D", "before": "Category:2007 Ontario provincial election Category:Elections in Canada Category:Ontario Category:No publish", "after": null, "start_char_pos": 7211, "end_char_pos": 7318}, {"type": "D", "before": "This page is for Wikinews coverage of the 2007 Ontario provincial election.", "after": null, "start_char_pos": 7348, "end_char_pos": 7423}, {"type": "D", "before": "Interviews Algoma-Manitoulin Ontario Votes 2007: Interview with Family Coalition Party candidate Ray Scott, Algoma-Manitoulin", "after": null, "start_char_pos": 7453, "end_char_pos": 7578}, {"type": "D", "before": "Ajax-Pickering Ontario Votes 2007: Interview with Green Party candidate Cecile Willert, Ajax\u2014Pickering", "after": null, "start_char_pos": 7608, "end_char_pos": 7710}, {"type": "D", "before": "Beaches-East York Ontario Votes 2007: Interview with Family Coalition Party candidate Joel Kidd, Beaches-East York", "after": null, "start_char_pos": 7740, "end_char_pos": 7854}, {"type": "D", "before": "Bramalea-Gore-Malton Ontario Votes 2007: Interview with Green candidate Bruce Haines, Bramalea-Gore-Malton Ontario Votes 2007: Interview with NDP candidate Glenn Crowe, Bramalea-Gore-Malton, Ontario Votes 2007: Interview with Progressive Conservative candidate Pam Hundal, Bramalea\u2014Gore\u2014Malton", "after": null, "start_char_pos": 7884, "end_char_pos": 8177}, {"type": "D", "before": "Brant Ontario Votes 2007: Interview with Progressive Conservative candidate Dan McCreary, Brant", "after": null, "start_char_pos": 8207, "end_char_pos": 8302}, {"type": "D", "before": "Bruce-Grey-Owen Sound Ontario Votes 2007: Interview with NDP candidate Paul Johnstone, Bruce-Grey-Owen Sound", "after": null, "start_char_pos": 8332, "end_char_pos": 8440}, {"type": "D", "before": "Carleton\u2014Mississippi Mills Ontario Votes 2007: Interview with Green Party candidate John Ogilvie, Carleton\u2014Mississippi Mills", "after": null, "start_char_pos": 8470, "end_char_pos": 8594}, {"type": "D", "before": "Chatham\u2014Kent\u2014Essex Ontario Votes 2007: Interview with Family Coalition Party candidate Mark Morin, Chatham\u2014Kent\u2014Essex", "after": null, "start_char_pos": 8624, "end_char_pos": 8741}, {"type": "D", "before": "Don Valley East Ontario Votes 2007: Interview with Freedom Party candidate Wayne Simmons, Don Valley East Ontario Votes 2007: Interview with Family Coalition Party candidate Daniel Kidd, Don Valley West", "after": null, "start_char_pos": 8771, "end_char_pos": 8973}, {"type": "D", "before": "Durham Ontario Votes 2007: Interview with Progressive Conservative candidate John O'Toole, Durham", "after": null, "start_char_pos": 9003, "end_char_pos": 9100}, {"type": "D", "before": "Essex Ontario Votes 2007: Interview with Libertarian candidate Aaron Parent, Essex", "after": null, "start_char_pos": 9130, "end_char_pos": 9212}, {"type": "D", "before": "Hamilton Centre Ontario Votes 2007: Interview with Green candidate Peter Ormond, Hamilton Centre", "after": null, "start_char_pos": 9242, "end_char_pos": 9338}, {"type": "D", "before": "Hamilton East Ontario Votes 2007: Interview with Family Coalition Party candidate Bob Innes, Hamilton East", "after": null, "start_char_pos": 9368, "end_char_pos": 9474}, {"type": "D", "before": "Kenora\u2014Rainy River Ontario Votes 2007: Interview with Progressive Conservative candidate Penny Lucas, Kenora\u2014Rainy River", "after": null, "start_char_pos": 9504, "end_char_pos": 9624}, {"type": "D", "before": "Kitchener Centre Ontario Votes 2007: Interview with Family Coalition Party candidate Bill Bernhardt, Kitchener Centre", "after": null, "start_char_pos": 9654, "end_char_pos": 9771}, {"type": "D", "before": "Kitchener-Conestoga Ontario Votes 2007: Interview with Libertarian candidate Larry Stevens, Kitchener-Conestoga", "after": null, "start_char_pos": 9801, "end_char_pos": 9912}, {"type": "D", "before": "Lambton\u2014Kent\u2014Middlesex Ontario Votes 2007: Interview with Family Coalition Party candidate Bill McMaster, Lambton\u2014Kent\u2014Middlesex", "after": null, "start_char_pos": 9942, "end_char_pos": 10070}, {"type": "D", "before": "London-Fanshawe Ontario Votes 2007: Interview with Progressive Conservative candidate Jim Chapman, London-Fanshawe", "after": null, "start_char_pos": 10100, "end_char_pos": 10214}, {"type": "D", "before": "London North Centre Ontario Votes 2007: Interview with Green Party candidate Brett McKenzie, London North Centre", "after": null, "start_char_pos": 10244, "end_char_pos": 10356}, {"type": "D", "before": "Nepean-Carleton Ontario Votes 2007: Interview with Family Coalition Party candidate Suzanne Fortin, Nepean-Carleton Ontario Votes 2007: Interview with Green Party candidate Gordon Kubanek, Nepean Carleton", "after": null, "start_char_pos": 10386, "end_char_pos": 10590}, {"type": "D", "before": "Newmarket-Aurora Ontario Votes 2007: Interview with Family Coalition Party candidate Tad Brudzinski, Newmarket-Aurora", "after": null, "start_char_pos": 10620, "end_char_pos": 10737}, {"type": "D", "before": "Oakville Ontario Votes 2007: Interview with Green candidate Marion Schaffer, Oakville", "after": null, "start_char_pos": 10767, "end_char_pos": 10852}, {"type": "D", "before": "Ottawa Centre Ontario Votes 2007: Interview with Communist Party candidate Stuart Ryan, Ottawa Centre", "after": null, "start_char_pos": 10882, "end_char_pos": 10983}, {"type": "D", "before": "Ottawa-Orleans Ontario Votes 2007: Interview with Freedom Party candidate David McGruer, Ottawa-Orleans", "after": null, "start_char_pos": 11013, "end_char_pos": 11116}, {"type": "D", "before": "Ottawa West-Nepean Ontario Votes 2007: Interview with Green candidate Martin Hyde, Ottawa West-Nepean", "after": null, "start_char_pos": 11146, "end_char_pos": 11247}, {"type": "D", "before": "Oxford Ontario Votes 2007: Interview with Liberal candidate Brian Jackson, Oxford", "after": null, "start_char_pos": 11277, "end_char_pos": 11358}, {"type": "D", "before": "Parkdale-High Park Ontario Votes 2007: Interview with Libertarian candidate Zork Hun, Parkdale-High Park", "after": null, "start_char_pos": 11388, "end_char_pos": 11492}, {"type": "D", "before": "Peterborough Ontario Votes 2007: Interview with Green Party candidate Miriam Stucky, Peterborough", "after": null, "start_char_pos": 11522, "end_char_pos": 11619}, {"type": "D", "before": "Renfrew-Nipissing-Pembroke Ontario Votes 2007: Interview with NDP candidate Felicite Stairs, Renfrew-Nipissing-Pembroke", "after": null, "start_char_pos": 11649, "end_char_pos": 11768}, {"type": "D", "before": "Scarborough-Rouge River Ontario Votes 2007: Interview with Libertarian candidate Alan Mercer, Scarborough\u2014Rouge River Ontario Votes 2007: Interview with NDP candidate Sheila White, Scarborough-Rouge River", "after": null, "start_char_pos": 11798, "end_char_pos": 12002}, {"type": "D", "before": "St. Paul's Ontario Votes 2007: Interview with Family Coalition Party candidate Blaise Thompson, St. Paul's Ontario Votes 2007: Interview with independent candidate Charles de Kerckhove, St. Paul's", "after": null, "start_char_pos": 12032, "end_char_pos": 12228}, {"type": "D", "before": "Sudbury Ontario Votes 2007: Interview with Family Coalition Party candidate Carita Murphy-Marketos, Sudbury", "after": null, "start_char_pos": 12258, "end_char_pos": 12365}, {"type": "D", "before": "Thornhill Ontario Votes 2007: Interview with Green Party candidate Lloyd Helferty, Thornhill", "after": null, "start_char_pos": 12395, "end_char_pos": 12487}, {"type": "D", "before": "Toronto Centre Ontario Votes 2007: Interview with Communist Party candidate Johan Boyden, Toronto Centre", "after": null, "start_char_pos": 12517, "end_char_pos": 12621}, {"type": "D", "before": "Toronto\u2014Danforth Ontario Votes 2007: Interview with Libertarian candidate Mark Scott, Toronto\u2014Danforth Ontario Votes 2007: Interview with Communist Party candidate Shona Bracken, Toronto Danforth", "after": null, "start_char_pos": 12651, "end_char_pos": 12846}, {"type": "D", "before": "Thunder Bay-Atikokan Ontario Votes 2007: Interview with Green candidate Russ Aegard, Thunder Bay-Atikokan", "after": null, "start_char_pos": 12876, "end_char_pos": 12981}, {"type": "D", "before": "Trinity-Spadina Ontario Votes 2007: Interview with Liberal candidate Kate Holloway, Trinity-Spadina Ontario Votes 2007: Interview with Progessive Conservative candidate Tyler Currie, Trinity-Spadina", "after": null, "start_char_pos": 13011, "end_char_pos": 13209}, {"type": "D", "before": "Vaughan Ontario Votes 2007: Interview with Green Party candidate Russell Korus, Vaughan Ontario Votes 2007: Interview with NDP candidate Rick Morelli, Vaughan", "after": null, "start_char_pos": 13239, "end_char_pos": 13397}, {"type": "D", "before": "Welland Ontario Votes 2007: Interview with Green candidate Mark Grenier, Welland", "after": null, "start_char_pos": 13427, "end_char_pos": 13507}, {"type": "D", "before": "Willowdale Ontario Votes 2007: Interview with Green Party candidate Torbjorn Zetterlund, Willowdale Ontario Votes 2007: Interview with Family Coalition Party candidate Kirsten Monster, Willowdale", "after": null, "start_char_pos": 13537, "end_char_pos": 13732}, {"type": "D", "before": "Windsor-Tecumseh Ontario Votes 2007: Interview with Green candidate Andrew McAvoy, Windsor-Tecumseh", "after": null, "start_char_pos": 13762, "end_char_pos": 13861}, {"type": "D", "before": "Whitby-Oshawa\u200e Ontario Votes 2007: Interview with Green candidate Doug Anderson, Whitby-Oshawa\u200e", "after": null, "start_char_pos": 13891, "end_char_pos": 13986}, {"type": "D", "before": "York Centre Ontario Votes 2007: Interview with Green candidate Marija Minic, York Centre", "after": null, "start_char_pos": 14016, "end_char_pos": 14104}, {"type": "D", "before": "Other election coverage Ontario, Canada byelections announced Ontario Green Party leader to run in byelection Burlington, Markham, and York South-Weston election results Results of 2007 Ontario, Canada General Election hi", "after": null, "start_char_pos": 14134, "end_char_pos": 14355}, {"type": "D", "before": "Also see :Category:2007 Ontario provincial election and Template:OntarioProvincialElection2007.", "after": null, "start_char_pos": 14385, "end_char_pos": 14480}, {"type": "D", "before": "Category:2007 Ontario provincial election Category:Elections in Canada Category:Ontario Category:No publish", "after": null, "start_char_pos": 14510, "end_char_pos": 14617}, {"type": "D", "before": "This page is for Wikinews coverage of the 2007 Ontario provincial election.", "after": null, "start_char_pos": 14647, "end_char_pos": 14722}, {"type": "D", "before": "Interviews Algoma-Manitoulin Ontario Votes 2007: Interview with Family Coalition Party candidate Ray Scott, Algoma-Manitoulin", "after": null, "start_char_pos": 14752, "end_char_pos": 14877}, {"type": "D", "before": "Ajax-Pickering Ontario Votes 2007: Interview with Green Party candidate Cecile Willert, Ajax\u2014Pickering", "after": null, "start_char_pos": 14907, "end_char_pos": 15009}, {"type": "D", "before": "Beaches-East York Ontario Votes 2007: Interview with Family Coalition Party candidate Joel Kidd, Beaches-East York", "after": null, "start_char_pos": 15039, "end_char_pos": 15153}, {"type": "D", "before": "Bramalea-Gore-Malton Ontario Votes 2007: Interview with Green candidate Bruce Haines, Bramalea-Gore-Malton Ontario Votes 2007: Interview with NDP candidate Glenn Crowe, Bramalea-Gore-Malton, Ontario Votes 2007: Interview with Progressive Conservative candidate Pam Hundal, Bramalea\u2014Gore\u2014Malton", "after": null, "start_char_pos": 15183, "end_char_pos": 15476}, {"type": "D", "before": "Brant Ontario Votes 2007: Interview with Progressive Conservative candidate Dan McCreary, Brant", "after": null, "start_char_pos": 15506, "end_char_pos": 15601}, {"type": "D", "before": "Bruce-Grey-Owen Sound Ontario Votes 2007: Interview with NDP candidate Paul Johnstone, Bruce-Grey-Owen Sound", "after": null, "start_char_pos": 15631, "end_char_pos": 15739}, {"type": "D", "before": "Carleton\u2014Mississippi Mills Ontario Votes 2007: Interview with Green Party candidate John Ogilvie, Carleton\u2014Mississippi Mills", "after": null, "start_char_pos": 15769, "end_char_pos": 15893}, {"type": "D", "before": "Chatham\u2014Kent\u2014Essex Ontario Votes 2007: Interview with Family Coalition Party candidate Mark Morin, Chatham\u2014Kent\u2014Essex", "after": null, "start_char_pos": 15923, "end_char_pos": 16040}, {"type": "D", "before": "Don Valley East Ontario Votes 2007: Interview with Freedom Party candidate Wayne Simmons, Don Valley East Ontario Votes 2007: Interview with Family Coalition Party candidate Daniel Kidd, Don Valley West", "after": null, "start_char_pos": 16070, "end_char_pos": 16272}, {"type": "D", "before": "Durham Ontario Votes 2007: Interview with Progressive Conservative candidate John O'Toole, Durham", "after": null, "start_char_pos": 16302, "end_char_pos": 16399}, {"type": "D", "before": "Essex Ontario Votes 2007: Interview with Libertarian candidate Aaron Parent, Essex", "after": null, "start_char_pos": 16429, "end_char_pos": 16511}, {"type": "D", "before": "Hamilton Centre Ontario Votes 2007: Interview with Green candidate Peter Ormond, Hamilton Centre", "after": null, "start_char_pos": 16541, "end_char_pos": 16637}, {"type": "D", "before": "Hamilton East Ontario Votes 2007: Interview with Family Coalition Party candidate Bob Innes, Hamilton East", "after": null, "start_char_pos": 16667, "end_char_pos": 16773}, {"type": "D", "before": "Kenora\u2014Rainy River Ontario Votes 2007: Interview with Progressive Conservative candidate Penny Lucas, Kenora\u2014Rainy River", "after": null, "start_char_pos": 16803, "end_char_pos": 16923}, {"type": "D", "before": "Kitchener Centre Ontario Votes 2007: Interview with Family Coalition Party candidate Bill Bernhardt, Kitchener Centre", "after": null, "start_char_pos": 16953, "end_char_pos": 17070}, {"type": "D", "before": "Kitchener-Conestoga Ontario Votes 2007: Interview with Libertarian candidate Larry Stevens, Kitchener-Conestoga", "after": null, "start_char_pos": 17100, "end_char_pos": 17211}, {"type": "D", "before": "Lambton\u2014Kent\u2014Middlesex Ontario Votes 2007: Interview with Family Coalition Party candidate Bill McMaster, Lambton\u2014Kent\u2014Middlesex", "after": null, "start_char_pos": 17241, "end_char_pos": 17369}, {"type": "D", "before": "London-Fanshawe Ontario Votes 2007: Interview with Progressive Conservative candidate Jim Chapman, London-Fanshawe", "after": null, "start_char_pos": 17399, "end_char_pos": 17513}, {"type": "D", "before": "London North Centre Ontario Votes 2007: Interview with Green Party candidate Brett McKenzie, London North Centre", "after": null, "start_char_pos": 17543, "end_char_pos": 17655}, {"type": "D", "before": "Nepean-Carleton Ontario Votes 2007: Interview with Family Coalition Party candidate Suzanne Fortin, Nepean-Carleton Ontario Votes 2007: Interview with Green Party candidate Gordon Kubanek, Nepean Carleton", "after": null, "start_char_pos": 17685, "end_char_pos": 17889}, {"type": "D", "before": "Newmarket-Aurora Ontario Votes 2007: Interview with Family Coalition Party candidate Tad Brudzinski, Newmarket-Aurora", "after": null, "start_char_pos": 17919, "end_char_pos": 18036}, {"type": "D", "before": "Oakville Ontario Votes 2007: Interview with Green candidate Marion Schaffer, Oakville", "after": null, "start_char_pos": 18066, "end_char_pos": 18151}, {"type": "D", "before": "Ottawa Centre Ontario Votes 2007: Interview with Communist Party candidate Stuart Ryan, Ottawa Centre", "after": null, "start_char_pos": 18181, "end_char_pos": 18282}, {"type": "D", "before": "Ottawa-Orleans Ontario Votes 2007: Interview with Freedom Party candidate David McGruer, Ottawa-Orleans", "after": null, "start_char_pos": 18312, "end_char_pos": 18415}, {"type": "D", "before": "Ottawa West-Nepean Ontario Votes 2007: Interview with Green candidate Martin Hyde, Ottawa West-Nepean", "after": null, "start_char_pos": 18445, "end_char_pos": 18546}, {"type": "D", "before": "Oxford Ontario Votes 2007: Interview with Liberal candidate Brian Jackson, Oxford", "after": null, "start_char_pos": 18576, "end_char_pos": 18657}, {"type": "D", "before": "Parkdale-High Park Ontario Votes 2007: Interview with Libertarian candidate Zork Hun, Parkdale-High Park", "after": null, "start_char_pos": 18687, "end_char_pos": 18791}, {"type": "D", "before": "Peterborough Ontario Votes 2007: Interview with Green Party candidate Miriam Stucky, Peterborough", "after": null, "start_char_pos": 18821, "end_char_pos": 18918}, {"type": "D", "before": "Renfrew-Nipissing-Pembroke Ontario Votes 2007: Interview with NDP candidate Felicite Stairs, Renfrew-Nipissing-Pembroke", "after": null, "start_char_pos": 18948, "end_char_pos": 19067}, {"type": "D", "before": "Scarborough-Rouge River Ontario Votes 2007: Interview with Libertarian candidate Alan Mercer, Scarborough\u2014Rouge River Ontario Votes 2007: Interview with NDP candidate Sheila White, Scarborough-Rouge River", "after": null, "start_char_pos": 19097, "end_char_pos": 19301}, {"type": "D", "before": "St. Paul's Ontario Votes 2007: Interview with Family Coalition Party candidate Blaise Thompson, St. Paul's Ontario Votes 2007: Interview with independent candidate Charles de Kerckhove, St. Paul's", "after": null, "start_char_pos": 19331, "end_char_pos": 19527}, {"type": "D", "before": "Sudbury Ontario Votes 2007: Interview with Family Coalition Party candidate Carita Murphy-Marketos, Sudbury", "after": null, "start_char_pos": 19557, "end_char_pos": 19664}, {"type": "D", "before": "Thornhill Ontario Votes 2007: Interview with Green Party candidate Lloyd Helferty, Thornhill", "after": null, "start_char_pos": 19694, "end_char_pos": 19786}, {"type": "D", "before": "Toronto Centre Ontario Votes 2007: Interview with Communist Party candidate Johan Boyden, Toronto Centre", "after": null, "start_char_pos": 19816, "end_char_pos": 19920}, {"type": "D", "before": "Toronto\u2014Danforth Ontario Votes 2007: Interview with Libertarian candidate Mark Scott, Toronto\u2014Danforth Ontario Votes 2007: Interview with Communist Party candidate Shona Bracken, Toronto Danforth", "after": null, "start_char_pos": 19950, "end_char_pos": 20145}, {"type": "D", "before": "Thunder Bay-Atikokan Ontario Votes 2007: Interview with Green candidate Russ Aegard, Thunder Bay-Atikokan", "after": null, "start_char_pos": 20175, "end_char_pos": 20280}, {"type": "D", "before": "Trinity-Spadina Ontario Votes 2007: Interview with Liberal candidate Kate Holloway, Trinity-Spadina Ontario Votes 2007: Interview with Progessive Conservative candidate Tyler Currie, Trinity-Spadina", "after": null, "start_char_pos": 20310, "end_char_pos": 20508}, {"type": "D", "before": "Vaughan Ontario Votes 2007: Interview with Green Party candidate Russell Korus, Vaughan Ontario Votes 2007: Interview with NDP candidate Rick Morelli, Vaughan", "after": null, "start_char_pos": 20538, "end_char_pos": 20696}, {"type": "D", "before": "Welland Ontario Votes 2007: Interview with Green candidate Mark Grenier, Welland", "after": null, "start_char_pos": 20726, "end_char_pos": 20806}, {"type": "D", "before": "Willowdale Ontario Votes 2007: Interview with Green Party candidate Torbjorn Zetterlund, Willowdale Ontario Votes 2007: Interview with Family Coalition Party candidate Kirsten Monster, Willowdale", "after": null, "start_char_pos": 20836, "end_char_pos": 21031}, {"type": "D", "before": "Windsor-Tecumseh Ontario Votes 2007: Interview with Green candidate Andrew McAvoy, Windsor-Tecumseh", "after": null, "start_char_pos": 21061, "end_char_pos": 21160}, {"type": "D", "before": "Whitby-Oshawa\u200e Ontario Votes 2007: Interview with Green candidate Doug Anderson, Whitby-Oshawa\u200e", "after": null, "start_char_pos": 21190, "end_char_pos": 21285}, {"type": "D", "before": "York Centre Ontario Votes 2007: Interview with Green candidate Marija Minic, York Centre", "after": null, "start_char_pos": 21315, "end_char_pos": 21403}, {"type": "D", "before": "Other election coverage Ontario, Canada byelections announced Ontario Green Party leader to run in byelection Burlington, Markham, and York South-Weston election results Results of 2007 Ontario, Canada General Election hi", "after": null, "start_char_pos": 21433, "end_char_pos": 21654}, {"type": "D", "before": "Also see :Category:2007 Ontario provincial election and Template:OntarioProvincialElection2007.", "after": null, "start_char_pos": 21684, "end_char_pos": 21779}, {"type": "D", "before": "Category:2007 Ontario provincial election Category:Elections in Canada Category:Ontario Category:No publish", "after": null, "start_char_pos": 21809, "end_char_pos": 21916}, {"type": "D", "before": "This page is for Wikinews coverage of the 2007 Ontario provincial election.", "after": null, "start_char_pos": 21946, "end_char_pos": 22021}, {"type": "D", "before": "Interviews Algoma-Manitoulin Ontario Votes 2007: Interview with Family Coalition Party candidate Ray Scott, Algoma-Manitoulin", "after": null, "start_char_pos": 22051, "end_char_pos": 22176}, {"type": "D", "before": "Ajax-Pickering Ontario Votes 2007: Interview with Green Party candidate Cecile Willert, Ajax\u2014Pickering", "after": null, "start_char_pos": 22206, "end_char_pos": 22308}, {"type": "D", "before": "Beaches-East York Ontario Votes 2007: Interview with Family Coalition Party candidate Joel Kidd, Beaches-East York", "after": null, "start_char_pos": 22338, "end_char_pos": 22452}, {"type": "D", "before": "Bramalea-Gore-Malton Ontario Votes 2007: Interview with Green candidate Bruce Haines, Bramalea-Gore-Malton Ontario Votes 2007: Interview with NDP candidate Glenn Crowe, Bramalea-Gore-Malton, Ontario Votes 2007: Interview with Progressive Conservative candidate Pam Hundal, Bramalea\u2014Gore\u2014Malton", "after": null, "start_char_pos": 22482, "end_char_pos": 22775}, {"type": "D", "before": "Brant Ontario Votes 2007: Interview with Progressive Conservative candidate Dan McCreary, Brant", "after": null, "start_char_pos": 22805, "end_char_pos": 22900}, {"type": "D", "before": "Bruce-Grey-Owen Sound Ontario Votes 2007: Interview with NDP candidate Paul Johnstone, Bruce-Grey-Owen Sound", "after": null, "start_char_pos": 22930, "end_char_pos": 23038}, {"type": "D", "before": "Carleton\u2014Mississippi Mills Ontario Votes 2007: Interview with Green Party candidate John Ogilvie, Carleton\u2014Mississippi Mills", "after": null, "start_char_pos": 23068, "end_char_pos": 23192}, {"type": "D", "before": "Chatham\u2014Kent\u2014Essex Ontario Votes 2007: Interview with Family Coalition Party candidate Mark Morin, Chatham\u2014Kent\u2014Essex", "after": null, "start_char_pos": 23222, "end_char_pos": 23339}, {"type": "D", "before": "Don Valley East Ontario Votes 2007: Interview with Freedom Party candidate Wayne Simmons, Don Valley East Ontario Votes 2007: Interview with Family Coalition Party candidate Daniel Kidd, Don Valley West", "after": null, "start_char_pos": 23369, "end_char_pos": 23571}, {"type": "D", "before": "Durham Ontario Votes 2007: Interview with Progressive Conservative candidate John O'Toole, Durham", "after": null, "start_char_pos": 23601, "end_char_pos": 23698}, {"type": "D", "before": "Essex Ontario Votes 2007: Interview with Libertarian candidate Aaron Parent, Essex", "after": null, "start_char_pos": 23728, "end_char_pos": 23810}, {"type": "D", "before": "Hamilton Centre Ontario Votes 2007: Interview with Green candidate Peter Ormond, Hamilton Centre", "after": null, "start_char_pos": 23840, "end_char_pos": 23936}, {"type": "D", "before": "Hamilton East Ontario Votes 2007: Interview with Family Coalition Party candidate Bob Innes, Hamilton East", "after": null, "start_char_pos": 23966, "end_char_pos": 24072}, {"type": "D", "before": "Kenora\u2014Rainy River Ontario Votes 2007: Interview with Progressive Conservative candidate Penny Lucas, Kenora\u2014Rainy River", "after": null, "start_char_pos": 24102, "end_char_pos": 24222}, {"type": "D", "before": "Kitchener Centre Ontario Votes 2007: Interview with Family Coalition Party candidate Bill Bernhardt, Kitchener Centre", "after": null, "start_char_pos": 24252, "end_char_pos": 24369}, {"type": "D", "before": "Kitchener-Conestoga Ontario Votes 2007: Interview with Libertarian candidate Larry Stevens, Kitchener-Conestoga", "after": null, "start_char_pos": 24399, "end_char_pos": 24510}, {"type": "D", "before": "Lambton\u2014Kent\u2014Middlesex Ontario Votes 2007: Interview with Family Coalition Party candidate Bill McMaster, Lambton\u2014Kent\u2014Middlesex", "after": null, "start_char_pos": 24540, "end_char_pos": 24668}, {"type": "D", "before": "London-Fanshawe Ontario Votes 2007: Interview with Progressive Conservative candidate Jim Chapman, London-Fanshawe", "after": null, "start_char_pos": 24698, "end_char_pos": 24812}, {"type": "D", "before": "London North Centre Ontario Votes 2007: Interview with Green Party candidate Brett McKenzie, London North Centre", "after": null, "start_char_pos": 24842, "end_char_pos": 24954}, {"type": "D", "before": "Nepean-Carleton Ontario Votes 2007: Interview with Family Coalition Party candidate Suzanne Fortin, Nepean-Carleton Ontario Votes 2007: Interview with Green Party candidate Gordon Kubanek, Nepean Carleton", "after": null, "start_char_pos": 24984, "end_char_pos": 25188}, {"type": "D", "before": "Newmarket-Aurora Ontario Votes 2007: Interview with Family Coalition Party candidate Tad Brudzinski, Newmarket-Aurora", "after": null, "start_char_pos": 25218, "end_char_pos": 25335}, {"type": "D", "before": "Oakville Ontario Votes 2007: Interview with Green candidate Marion Schaffer, Oakville", "after": null, "start_char_pos": 25365, "end_char_pos": 25450}, {"type": "D", "before": "Ottawa Centre Ontario Votes 2007: Interview with Communist Party candidate Stuart Ryan, Ottawa Centre", "after": null, "start_char_pos": 25480, "end_char_pos": 25581}, {"type": "D", "before": "Ottawa-Orleans Ontario Votes 2007: Interview with Freedom Party candidate David McGruer, Ottawa-Orleans", "after": null, "start_char_pos": 25611, "end_char_pos": 25714}, {"type": "D", "before": "Ottawa West-Nepean Ontario Votes 2007: Interview with Green candidate Martin Hyde, Ottawa West-Nepean", "after": null, "start_char_pos": 25744, "end_char_pos": 25845}, {"type": "D", "before": "Oxford Ontario Votes 2007: Interview with Liberal candidate Brian Jackson, Oxford", "after": null, "start_char_pos": 25875, "end_char_pos": 25956}, {"type": "D", "before": "Parkdale-High Park Ontario Votes 2007: Interview with Libertarian candidate Zork Hun, Parkdale-High Park", "after": null, "start_char_pos": 25986, "end_char_pos": 26090}, {"type": "D", "before": "Peterborough Ontario Votes 2007: Interview with Green Party candidate Miriam Stucky, Peterborough", "after": null, "start_char_pos": 26120, "end_char_pos": 26217}, {"type": "D", "before": "Renfrew-Nipissing-Pembroke Ontario Votes 2007: Interview with NDP candidate Felicite Stairs, Renfrew-Nipissing-Pembroke", "after": null, "start_char_pos": 26247, "end_char_pos": 26366}, {"type": "D", "before": "Scarborough-Rouge River Ontario Votes 2007: Interview with Libertarian candidate Alan Mercer, Scarborough\u2014Rouge River Ontario Votes 2007: Interview with NDP candidate Sheila White, Scarborough-Rouge River", "after": null, "start_char_pos": 26396, "end_char_pos": 26600}, {"type": "D", "before": "St. Paul's Ontario Votes 2007: Interview with Family Coalition Party candidate Blaise Thompson, St. Paul's Ontario Votes 2007: Interview with independent candidate Charles de Kerckhove, St. Paul's", "after": null, "start_char_pos": 26630, "end_char_pos": 26826}, {"type": "D", "before": "Sudbury Ontario Votes 2007: Interview with Family Coalition Party candidate Carita Murphy-Marketos, Sudbury", "after": null, "start_char_pos": 26856, "end_char_pos": 26963}, {"type": "D", "before": "Thornhill Ontario Votes 2007: Interview with Green Party candidate Lloyd Helferty, Thornhill", "after": null, "start_char_pos": 26993, "end_char_pos": 27085}, {"type": "D", "before": "Toronto Centre Ontario Votes 2007: Interview with Communist Party candidate Johan Boyden, Toronto Centre", "after": null, "start_char_pos": 27115, "end_char_pos": 27219}, {"type": "D", "before": "Toronto\u2014Danforth Ontario Votes 2007: Interview with Libertarian candidate Mark Scott, Toronto\u2014Danforth Ontario Votes 2007: Interview with Communist Party candidate Shona Bracken, Toronto Danforth", "after": null, "start_char_pos": 27249, "end_char_pos": 27444}, {"type": "D", "before": "Thunder Bay-Atikokan Ontario Votes 2007: Interview with Green candidate Russ Aegard, Thunder Bay-Atikokan", "after": null, "start_char_pos": 27474, "end_char_pos": 27579}, {"type": "D", "before": "Trinity-Spadina Ontario Votes 2007: Interview with Liberal candidate Kate Holloway, Trinity-Spadina Ontario Votes 2007: Interview with Progessive Conservative candidate Tyler Currie, Trinity-Spadina", "after": null, "start_char_pos": 27609, "end_char_pos": 27807}, {"type": "D", "before": "Vaughan Ontario Votes 2007: Interview with Green Party candidate Russell Korus, Vaughan Ontario Votes 2007: Interview with NDP candidate Rick Morelli, Vaughan", "after": null, "start_char_pos": 27837, "end_char_pos": 27995}, {"type": "D", "before": "Welland Ontario Votes 2007: Interview with Green candidate Mark Grenier, Welland", "after": null, "start_char_pos": 28025, "end_char_pos": 28105}, {"type": "D", "before": "Willowdale Ontario Votes 2007: Interview with Green Party candidate Torbjorn Zetterlund, Willowdale Ontario Votes 2007: Interview with Family Coalition Party candidate Kirsten Monster, Willowdale", "after": null, "start_char_pos": 28135, "end_char_pos": 28330}, {"type": "D", "before": "Windsor-Tecumseh Ontario Votes 2007: Interview with Green candidate Andrew McAvoy, Windsor-Tecumseh", "after": null, "start_char_pos": 28360, "end_char_pos": 28459}, {"type": "D", "before": "Whitby-Oshawa\u200e Ontario Votes 2007: Interview with Green candidate Doug Anderson, Whitby-Oshawa\u200e", "after": null, "start_char_pos": 28489, "end_char_pos": 28584}, {"type": "D", "before": "York Centre Ontario Votes 2007: Interview with Green candidate Marija Minic, York Centre", "after": null, "start_char_pos": 28614, "end_char_pos": 28702}, {"type": "D", "before": "Other election coverage Ontario, Canada byelections announced Ontario Green Party leader to run in byelection Burlington, Markham, and York South-Weston election results Results of 2007 Ontario, Canada General Election hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi", "after": null, "start_char_pos": 28732, "end_char_pos": 29202}], "sents_char_pos": [0, 317, 530, 608, 720, 855, 973, 1059, 1143, 1281, 1393, 1536, 1653, 1797, 1887, 1991, 2117, 2210, 2334, 2446, 2594, 2715, 2859, 2981, 3129, 3238, 3338, 3473, 3583, 3703, 3806, 3943, 4033, 4156, 4255, 4396, 4542, 4636, 4763, 4859, 4986, 5125, 5252, 5388, 5474, 5617, 5747, 5831, 5967, 6047, 6155, 6268, 6357, 6499, 6626, 6748, 7181, 7423, 7501, 7642, 7777, 7924, 8010, 8094, 8232, 8373, 8516, 8662, 8806, 8896, 9029, 9155, 9277, 9401, 9542, 9690, 9840, 9984, 10135, 10283, 10421, 10521, 10656, 10795, 10915, 11047, 11184, 11303, 11426, 11554, 11695, 11841, 11935, 12062, 12158, 12285, 12424, 12551, 12687, 12773, 12916, 13046, 13130, 13266, 13346, 13454, 13567, 13656, 13798, 13925, 14047, 14480, 14722, 14800, 14941, 15076, 15223, 15309, 15393, 15531, 15672, 15815, 15961, 16105, 16195, 16328, 16454, 16576, 16700, 16841, 16989, 17139, 17283, 17434, 17582, 17720, 17820, 17955, 18094, 18214, 18346, 18483, 18602, 18725, 18853, 18994, 19140, 19234, 19361, 19457, 19584, 19723, 19850, 19986, 20072, 20215, 20345, 20429, 20565, 20645, 20753, 20866, 20955, 21097, 21224, 21346, 21779, 22021, 22099, 22240, 22375, 22522, 22608, 22692, 22830, 22971, 23114, 23260, 23404, 23494, 23627, 23753, 23875, 23999, 24140, 24288, 24438, 24582, 24733, 24881, 25019, 25119, 25254, 25393, 25513, 25645, 25782, 25901, 26024, 26152, 26293, 26439, 26533, 26660, 26756, 26883, 27022, 27149, 27285, 27371, 27514, 27644, 27728, 27864, 27944, 28052, 28165, 28254, 28396, 28523, 28645, 28690, 28764]}
+{"doc_id": "82537", "revision_depth": "1", "before_revision": "450px|\"I'm going to stay here, then. I'm not going to use it. I want to stay here with this guy and my boyfriend and my family.\" Sharin Foo (with Sune Rose Wagner) on solo time travel.photo: David Shankbone\"We \u2019 re only two days in and we \u2019 re already fucking tired,\" says Sune Rose Wagner to David Shankbone as he walks into the dressing room at the Bowery Ballroom. Wagner and Sharin Foo comprise the Raveonettes, a group made for \"nostalgists who long for Everly Brothers 45's and diner jukeboxes, the Raveonettes tweak \"American Graffiti\"-era rock with fuzzed-out surf-guitar riffs,\" said The New York Times. They recently left Columbia and signed with Fierce Panda because they felt constrained by their Columbia contract: \"The major label system sometimes doesn't allow for outside \"help\" to get involved, meaning that we don't get to choose who we wanna work with. That can be a pretty terrible thing and bad things will surely come of it,\" said the band on their MySpace site. Originally from Denmark, both musicians live in the United States now. David Shankbone: No, I drank so much green tea today I am worried I am going to need to pee throughout the interview.Sune: At least you \u2019 re peeing healthy. Can you mix vodka with green tea?DS: I used to. How is the tour going? Sune: It \u2019 s good. We \u2019 re only two days in and we \u2019 re already fucking tired. But we \u2019 re in great spirits here. We \u2019 re leaving town tomorrow \u2026we\u2019 re happy. Sune: [Laughs] And that \u2019 s where we fit in, now! Freaks! Sharin Foo: Sounds like an interesting job. DS: A lot of the questions might be a little different than what you are typically used to; maybe that will make it more interesting for you, or less pleasant. One of the first questions I like to ask musicians is about the challenge to be innovative when so much has already been done. How do you not let that affect your output? Sune: Well, I don \u2019 t think we really think about it in those terms. When we started out we had certain guidelines for the music that would ensure that it would sound like no one else, and those were pretty easy to make. Things like don \u2019 t use a high hat, don \u2019 t use cymbals, don \u2019 t use certain things, play all the songs in the same key, do this and this, and that was really \u2026 DS: Was that your Dogme influence? Sune: Yeah. I don \u2019 t know what it was, I guess it was a really silly thing, but it worked and it was very inspiring and creative to work within those constraints, I guess. But they weren \u2019 t really constrains for us, it was actually really easy and simple, but I think it has a sound that I have never heard before. But like I said, I don \u2019 t really thin that we think \u2026 Sharin: I think it \u2019 s more that we are not scared of being blunt about what the references are in our music. For instance, if you look at our name, The Raveonettes, it \u2019 s a complete direct reference to The Ronettes and Buddy Holly Rave On. So, in that sense, we \u2019 re pretty clear about it. DS: You embrace it.Sune: Yeah, we like it. Sharin: Yeah, where the inspiration has come from. So it \u2019 s not like we have that fear of repetition.Sune: I think a lot of bands put a lot of emphasis on trying to be different, and then they make music that is soulless; it doesn \u2019 t get me anywhere.DS: It \u2019 s too self-aware? Sune: Yeah, what \u2019 s wrong with the three chords? That \u2019 s what music was founded upon, that \u2019 s what everyone from Hank Williams to The Ramones used those three chords. What \u2019 s wrong with them all of a sudden? Sharin: Yes. I think that what it comes down to is whether it strikes a chord in you and hits your gut, some kind of emotion in you, that \u2019 s really what we care about when we make music. DS: Since you are so upfront about your influences, you do still have unique sound. Do the constant comparison in the music media grow tiresome?Sune: I don \u2019 t care about it at all because if people compared us to bands that are really shitty then I would probably mind. But if they compare us to Buddy Holly and The Everly Brothers, then I think it \u2019 s fine. You always need names for bands so you can tell people what they sound like. That \u2019 s fine. Those are good names \u2026 I really don \u2019 t care about it one bit.DS: Did you guys follow the Phil Spector trial? Sune: A little bit. I didn \u2019 t have any thoughts on it. It \u2019 s 50/50 DS: Knowing Ronnie Spector it must have been an interesting perspective to see it from.Sharin: Well, Sune knows her.Sune: I \u2019 m good friends with his daughter, and that was another weird perspective, really. Because that was more a sad perspective because obviously she was very saddened by her dad being on trial for murder. That was a whole different way of looking at it all of a sudden. She \u2019 s coming tonight, actually. I don \u2019t know\u2026. I know he has been throwing around guns for ages, so if a gun went off I wouldn \u2019 t be surprised. On the other hand, why would he kill someone? I don \u2019 t know. I have no idea.DS: Dogme influenced you guys early on, does it still? Sune: It \u2019 s still there, a lot actually. Sharin: But I think it \u2019 s more of a subconscious, integrated thing. It has become an integrated part of how The Raveonettes sound. Initially it \u2019 s what created the sound and being more aware of the tools and the creative process as a Dogmeist, and the rules. But now it \u2019 s just what happens automatically. We tend to gravitate more towards the minimal sound and very simple things. Sune: We don \u2019t\u2019 think about it. It \u2019 s like if I write a song at home I don \u2019 t think it has to be in B flat, I just play in B flat. That \u2019 s just a starting point, and I don \u2019 t think about it. DS: Are you more inspired by things in nature or man made things?Sharin: Probably more man made things than nature \u2026 Sune: YeahSharin: People are sort of man made things too, I guess.DS: Sure; made by man. Sharin: Don \u2019 t you think Sune? Sune: Yeah, I probably prefer man made. Sharin: Are you talking musically or aesthetically? DS: It \u2019 s an open question.Sharin: I don \u2019 t know. I think with the Raveonettes there \u2019 s a lot of inspiration from man made things \u2026 DS: Like cities vs. mountains. Sune: They are all good in certain ways. I use them all in different ways. Nature doesn \u2019 t really inspire me to be creative, it just inspires me to relax and feel good about myself, which is a good thing, too. I need the city and that kind of life. On America DS: Sune, you went through a period where you got really tired of LA and New York and traveled around the United States. What did you find when you traveled across the country?Sune: It struck me how different the country was as I went south and north, and towards the middle. It just struck me how really, really different it was. Even when I was driving up to Canada once to get my visa, I rented a car from here and I was barely an hour outside of New York City everything changes so dramatically. The way people were, the way people looked at you in a \u201c Who are you, stranger? Get out of my town \u2026\u201d kind of thing. It was so strange.DS: How did you react to that? Sune: It always frightens me a little bit. I never got comfortable. I never like it when people are annoyed with you because of the way you look. It just seems so dramatic. I don \u2019 t walk down the street and see a person and get so upset. I don \u2019 t know where that hatred comes from, or that mistrust of strangers or whatever it is. I could never understand it and that \u2019 s why it makes me uneasy. Sharin: Although you find that everywhere, including in Denmark, very much so. Sune: Yeah, but we \u2019 re talking about the States here, Sharin! I \u2019 m sure you can find it in Africa, too! [Laughs] No, but seriously, people used to always tell me, \u201c Oh, don \u2019 t go down south, they are all racist, \u201d blah blah blah. I had the best time in the south; people were so hospitable to me. Everywhere I went they were like, \u2018Oh, you come from Denmark? That \u2019s great\u2026I\u2019 ll give you this for free! \u2019 And when I go north, people treat me like I \u2019 m crazy. It \u2019 s so weird, so strange. So I guess the answer to your question is that I was very surprised at how different it was from place to place, and then I started understanding when the election came up and people were voting Democratic here, Republican there, it all made sense to me all of a sudden. I was like, \u201c Oh, I see, those are people who never leave their state, never leave their town \u2026\u201d DS: Did you find the blue states more hospitable than the reds states?Sune: It \u2019 s a little bit of both, I would say, but people \u2019s attitude\u2026 same thing with 9/11. People were like, \u201c That happened in New York, there \u2019 s no terrorist coming to my town and we hate Muslims anyway, and they are not even welcome here. \u201d They have that really brutal attitude some times; it \u2019 s really racist and crazy. Also because it is such a religious country in such a crazy way, so it \u2019 s a very interesting country to travel in.DS: Do you think the religion adds an element of beauty or a fearful element to the culture? Sune: Fearful element! They have all their God fearing \u2026 Sharin: It really depends on which kind of religion and which kind of place \u2026 DS: The kind practiced here, the kind of Christianity found here. Sune: Yeah! Sharin: The extreme within the religion here in the U.S., that can be a little terrifying, I think. But religion can also add a lot of purpose to people, and when they have purpose they can be more balanced and open-minded. I don \u2019t know\u2026. Sune: I like the televangelists a lot. It \u2019 s really entertaining for me to watch a show like that; it \u2019 s really just like Benny Hill and you watch it and can \u2019 t believe it. It \u2019 s so far away from anything I \u2019 ve ever known. And they talk about Islam being a dangerous religion but you look over here and it \u2019 s just the same! It \u2019 s the same thing.DS: They just aren \u2019 t in madrassahs \u2026 Sune: No, it \u2019 s so crazy; it \u2019 s fascinating. On death DS: If you could choose your own death, how would you die?Sune: Oh, man. Sharin: I would just like to go to sleep one night and not wake up. I \u2019 m definitely scared of pain and diseases; I wouldn \u2019 t want to wither. Sune: I \u2019 ll go with Sharin.DS: You wouldn \u2019 t want to experience it? Sharin: No way. Sune: No. DS: What is fearful about it?Sune: It \u2019 s because if you are a creative person it \u2019 s the fear you can never be creative again. It \u2019 s a terrifying feeling. I don \u2019 t like it all. I think about it sometimes, where I think about, \u201c One day you are going to die, you are never going to be here again, you \u2019 re never going to do this \u2026\u201d and a whole weird feeling comes down through the body. It \u2019 s the only experience you can get when you think about death. It \u2019 s a crazy feeling, but obviously something draws me to it sometimes to experience to really get into my mind frame and think, \u201cI\u2019 m really going to die, I \u2019 m never going to be here, I'm never going to get up again, I'm really going to die! \u201d It\u2019 s scary.DS: Especially at a young age, but if you are creative and have an imagination, it makes it that much scarier. Sune: But I had a near-death experience when I was in Hawaii. I almost drowned, and I came to a point where I accepted my own death. So, in a way now, when I think about death, that comforts me a little bit, even though it was such a scary experience at the time, it comforts me a little bit that you can actually accept your own death and actually feel comfortable about it. Because I wasn't frightened at the time. I was basically just comfortable that this it, you know, that this is the end. And I was very relaxed, actually. So I guess that's pretty cool. Sharin: Were you? I would probably be... Sune: No, at that point my body just gave out, I was completely relaxed and I was just like...that's it.", "after_revision": "450px|\"I'm going to stay here, then. I'm not going to use it. I want to stay here with this guy and my boyfriend and my family.\" Sharin Foo (with Sune Rose Wagner) on solo time travel.photo: David Shankbone\"We ' re only two days in and we ' re already fucking tired,\" says Sune Rose Wagner to David Shankbone as he walks into the dressing room at the Bowery Ballroom. Wagner and Sharin Foo comprise the Raveonettes, a group made for \"nostalgists who long for Everly Brothers 45's and diner jukeboxes, the Raveonettes tweak \"American Graffiti\"-era rock with fuzzed-out surf-guitar riffs,\" said The New York Times. They recently left Columbia and signed with Fierce Panda because they felt constrained by their Columbia contract: \"The major label system sometimes doesn't allow for outside \"help\" to get involved, meaning that we don't get to choose who we wanna work with. That can be a pretty terrible thing and bad things will surely come of it,\" said the band on their MySpace site. Originally from Denmark, both musicians live in the United States now. David Shankbone: No, I drank so much green tea today I am worried I am going to need to pee throughout the interview.Sune: At least you ' re peeing healthy. Can you mix vodka with green tea?DS: I used to. How is the tour going? Sune: It ' s good. We ' re only two days in and we ' re already fucking tired. But we ' re in great spirits here. We ' re leaving town tomorrow ...we' re happy. Sune: [Laughs] And that ' s where we fit in, now! Freaks! Sharin Foo: Sounds like an interesting job. DS: A lot of the questions might be a little different than what you are typically used to; maybe that will make it more interesting for you, or less pleasant. One of the first questions I like to ask musicians is about the challenge to be innovative when so much has already been done. How do you not let that affect your output? Sune: Well, I don ' t think we really think about it in those terms. When we started out we had certain guidelines for the music that would ensure that it would sound like no one else, and those were pretty easy to make. Things like don ' t use a high hat, don ' t use cymbals, don ' t use certain things, play all the songs in the same key, do this and this, and that was really ... DS: Was that your Dogme influence? Sune: Yeah. I don ' t know what it was, I guess it was a really silly thing, but it worked and it was very inspiring and creative to work within those constraints, I guess. But they weren ' t really constrains for us, it was actually really easy and simple, but I think it has a sound that I have never heard before. But like I said, I don ' t really thin that we think ... Sharin: I think it ' s more that we are not scared of being blunt about what the references are in our music. For instance, if you look at our name, The Raveonettes, it ' s a complete direct reference to The Ronettes and Buddy Holly Rave On. So, in that sense, we ' re pretty clear about it. DS: You embrace it.Sune: Yeah, we like it. Sharin: Yeah, where the inspiration has come from. So it ' s not like we have that fear of repetition.Sune: I think a lot of bands put a lot of emphasis on trying to be different, and then they make music that is soulless; it doesn ' t get me anywhere.DS: It ' s too self-aware? Sune: Yeah, what ' s wrong with the three chords? That ' s what music was founded upon, that ' s what everyone from Hank Williams to The Ramones used those three chords. What ' s wrong with them all of a sudden? Sharin: Yes. I think that what it comes down to is whether it strikes a chord in you and hits your gut, some kind of emotion in you, that ' s really what we care about when we make music. DS: Since you are so upfront about your influences, you do still have unique sound. Do the constant comparison in the music media grow tiresome?Sune: I don ' t care about it at all because if people compared us to bands that are really shitty then I would probably mind. But if they compare us to Buddy Holly and The Everly Brothers, then I think it ' s fine. You always need names for bands so you can tell people what they sound like. That ' s fine. Those are good names ... I really don ' t care about it one bit.DS: Did you guys follow the Phil Spector trial? Sune: A little bit. I didn ' t have any thoughts on it. It ' s 50/50 DS: Knowing Ronnie Spector it must have been an interesting perspective to see it from.Sharin: Well, Sune knows her.Sune: I ' m good friends with his daughter, and that was another weird perspective, really. Because that was more a sad perspective because obviously she was very saddened by her dad being on trial for murder. That was a whole different way of looking at it all of a sudden. She ' s coming tonight, actually. I don 't know.... I know he has been throwing around guns for ages, so if a gun went off I wouldn ' t be surprised. On the other hand, why would he kill someone? I don ' t know. I have no idea.DS: Dogme influenced you guys early on, does it still? Sune: It ' s still there, a lot actually. Sharin: But I think it ' s more of a subconscious, integrated thing. It has become an integrated part of how The Raveonettes sound. Initially it ' s what created the sound and being more aware of the tools and the creative process as a Dogmeist, and the rules. But now it ' s just what happens automatically. We tend to gravitate more towards the minimal sound and very simple things. Sune: We don 't' think about it. It ' s like if I write a song at home I don ' t think it has to be in B flat, I just play in B flat. That ' s just a starting point, and I don ' t think about it. DS: Are you more inspired by things in nature or man made things?Sharin: Probably more man made things than nature ... Sune: YeahSharin: People are sort of man made things too, I guess.DS: Sure; made by man. Sharin: Don ' t you think Sune? Sune: Yeah, I probably prefer man made. Sharin: Are you talking musically or aesthetically? DS: It ' s an open question.Sharin: I don ' t know. I think with the Raveonettes there ' s a lot of inspiration from man made things ... DS: Like cities vs. mountains. Sune: They are all good in certain ways. I use them all in different ways. Nature doesn ' t really inspire me to be creative, it just inspires me to relax and feel good about myself, which is a good thing, too. I need the city and that kind of life. On America DS: Sune, you went through a period where you got really tired of LA and New York and traveled around the United States. What did you find when you traveled across the country?Sune: It struck me how different the country was as I went south and north, and towards the middle. It just struck me how really, really different it was. Even when I was driving up to Canada once to get my visa, I rented a car from here and I was barely an hour outside of New York City everything changes so dramatically. The way people were, the way people looked at you in a \" Who are you, stranger? Get out of my town ...\" kind of thing. It was so strange.DS: How did you react to that? Sune: It always frightens me a little bit. I never got comfortable. I never like it when people are annoyed with you because of the way you look. It just seems so dramatic. I don ' t walk down the street and see a person and get so upset. I don ' t know where that hatred comes from, or that mistrust of strangers or whatever it is. I could never understand it and that ' s why it makes me uneasy. Sharin: Although you find that everywhere, including in Denmark, very much so. Sune: Yeah, but we ' re talking about the States here, Sharin! I ' m sure you can find it in Africa, too! [Laughs] No, but seriously, people used to always tell me, \" Oh, don ' t go down south, they are all racist, \" blah blah blah. I had the best time in the south; people were so hospitable to me. Everywhere I went they were like, \u2018Oh, you come from Denmark? That 's great...I' ll give you this for free! ' And when I go north, people treat me like I ' m crazy. It ' s so weird, so strange. So I guess the answer to your question is that I was very surprised at how different it was from place to place, and then I started understanding when the election came up and people were voting Democratic here, Republican there, it all made sense to me all of a sudden. I was like, \" Oh, I see, those are people who never leave their state, never leave their town ...\" DS: Did you find the blue states more hospitable than the reds states?Sune: It ' s a little bit of both, I would say, but people 's attitude... same thing with 9/11. People were like, \" That happened in New York, there ' s no terrorist coming to my town and we hate Muslims anyway, and they are not even welcome here. \" They have that really brutal attitude some times; it ' s really racist and crazy. Also because it is such a religious country in such a crazy way, so it ' s a very interesting country to travel in.DS: Do you think the religion adds an element of beauty or a fearful element to the culture? Sune: Fearful element! They have all their God fearing ... Sharin: It really depends on which kind of religion and which kind of place ... DS: The kind practiced here, the kind of Christianity found here. Sune: Yeah! Sharin: The extreme within the religion here in the U.S., that can be a little terrifying, I think. But religion can also add a lot of purpose to people, and when they have purpose they can be more balanced and open-minded. I don 't know.... Sune: I like the televangelists a lot. It ' s really entertaining for me to watch a show like that; it ' s really just like Benny Hill and you watch it and can ' t believe it. It ' s so far away from anything I ' ve ever known. And they talk about Islam being a dangerous religion but you look over here and it ' s just the same! It ' s the same thing.DS: They just aren ' t in madrassahs ... Sune: No, it ' s so crazy; it ' s fascinating. On death DS: If you could choose your own death, how would you die?Sune: Oh, man. Sharin: I would just like to go to sleep one night and not wake up. I ' m definitely scared of pain and diseases; I wouldn ' t want to wither. Sune: I ' ll go with Sharin.DS: You wouldn ' t want to experience it? Sharin: No way. Sune: No. DS: What is fearful about it?Sune: It ' s because if you are a creative person it ' s the fear you can never be creative again. It ' s a terrifying feeling. I don ' t like it all. I think about it sometimes, where I think about, \" One day you are going to die, you are never going to be here again, you ' re never going to do this ...\" and a whole weird feeling comes down through the body. It ' s the only experience you can get when you think about death. It ' s a crazy feeling, but obviously something draws me to it sometimes to experience to really get into my mind frame and think, \"I' m really going to die, I ' m never going to be here, I'm never going to get up again, I'm really going to die! \" It' s scary.DS: Especially at a young age, but if you are creative and have an imagination, it makes it that much scarier. Sune: But I had a near-death experience when I was in Hawaii. I almost drowned, and I came to a point where I accepted my own death. So, in a way now, when I think about death, that comforts me a little bit, even though it was such a scary experience at the time, it comforts me a little bit that you can actually accept your own death and actually feel comfortable about it. Because I wasn't frightened at the time. I was basically just comfortable that this it, you know, that this is the end. And I was very relaxed, actually. So I guess that's pretty cool. Sharin: Were you? I would probably be... Sune: No, at that point my body just gave out, I was completely relaxed and I was just like...that's it.", "edit_actions": [{"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 210, "end_char_pos": 211}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 239, "end_char_pos": 240}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1192, "end_char_pos": 1193}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1293, "end_char_pos": 1294}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1306, "end_char_pos": 1307}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1335, "end_char_pos": 1336}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1370, "end_char_pos": 1371}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1401, "end_char_pos": 1402}, {"type": "R", "before": "\u2026we\u2019", "after": "...we'", "start_char_pos": 1428, "end_char_pos": 1432}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1467, "end_char_pos": 1468}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1894, "end_char_pos": 1895}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2113, "end_char_pos": 2114}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2137, "end_char_pos": 2138}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2158, "end_char_pos": 2159}, {"type": "R", "before": "\u2026", "after": "...", "start_char_pos": 2256, "end_char_pos": 2257}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2311, "end_char_pos": 2312}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2481, "end_char_pos": 2482}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2633, "end_char_pos": 2634}, {"type": "R", "before": "\u2026", "after": "...", "start_char_pos": 2663, "end_char_pos": 2664}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2684, "end_char_pos": 2685}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2834, "end_char_pos": 2835}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2929, "end_char_pos": 2930}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3057, "end_char_pos": 3058}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3232, "end_char_pos": 3233}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3259, "end_char_pos": 3260}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3296, "end_char_pos": 3297}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3334, "end_char_pos": 3335}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3372, "end_char_pos": 3373}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3454, "end_char_pos": 3455}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3629, "end_char_pos": 3630}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3835, "end_char_pos": 3836}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4029, "end_char_pos": 4030}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4121, "end_char_pos": 4122}, {"type": "R", "before": "\u2026", "after": "...", "start_char_pos": 4152, "end_char_pos": 4153}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4167, "end_char_pos": 4168}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4268, "end_char_pos": 4269}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4300, "end_char_pos": 4301}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4434, "end_char_pos": 4435}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4705, "end_char_pos": 4706}, {"type": "R", "before": "\u2019t know\u2026.", "after": "'t know....", "start_char_pos": 4741, "end_char_pos": 4750}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4831, "end_char_pos": 4832}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4901, "end_char_pos": 4902}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4990, "end_char_pos": 4991}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5046, "end_char_pos": 5047}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5168, "end_char_pos": 5169}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5295, "end_char_pos": 5296}, {"type": "R", "before": "\u2019t\u2019", "after": "'t'", "start_char_pos": 5421, "end_char_pos": 5424}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5444, "end_char_pos": 5445}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5485, "end_char_pos": 5486}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5547, "end_char_pos": 5548}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5584, "end_char_pos": 5585}, {"type": "R", "before": "\u2026", "after": "...", "start_char_pos": 5719, "end_char_pos": 5720}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5822, "end_char_pos": 5823}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5941, "end_char_pos": 5942}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5976, "end_char_pos": 5977}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 6021, "end_char_pos": 6022}, {"type": "R", "before": "\u2026", "after": "...", "start_char_pos": 6067, "end_char_pos": 6068}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 6188, "end_char_pos": 6189}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 6916, "end_char_pos": 6917}, {"type": "R", "before": "\u2026\u201d", "after": "...\"", "start_char_pos": 6960, "end_char_pos": 6962}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 7206, "end_char_pos": 7207}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 7272, "end_char_pos": 7273}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 7397, "end_char_pos": 7398}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 7523, "end_char_pos": 7524}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 7569, "end_char_pos": 7570}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 7669, "end_char_pos": 7670}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 7679, "end_char_pos": 7680}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 7719, "end_char_pos": 7720}, {"type": "R", "before": "\u2019s great\u2026I\u2019", "after": "'s great...I'", "start_char_pos": 7871, "end_char_pos": 7882}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 7910, "end_char_pos": 7911}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 7956, "end_char_pos": 7957}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 7970, "end_char_pos": 7971}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 8279, "end_char_pos": 8280}, {"type": "R", "before": "\u2026\u201d", "after": "...\"", "start_char_pos": 8361, "end_char_pos": 8363}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 8443, "end_char_pos": 8444}, {"type": "R", "before": "\u2019s attitude\u2026", "after": "'s attitude...", "start_char_pos": 8493, "end_char_pos": 8505}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 8546, "end_char_pos": 8547}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 8581, "end_char_pos": 8582}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 8680, "end_char_pos": 8681}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 8735, "end_char_pos": 8736}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 8835, "end_char_pos": 8836}, {"type": "R", "before": "\u2026", "after": "...", "start_char_pos": 9027, "end_char_pos": 9028}, {"type": "R", "before": "\u2026", "after": "...", "start_char_pos": 9105, "end_char_pos": 9106}, {"type": "R", "before": "\u2019t know\u2026.", "after": "'t know....", "start_char_pos": 9415, "end_char_pos": 9424}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 9467, "end_char_pos": 9468}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 9528, "end_char_pos": 9529}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 9585, "end_char_pos": 9586}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 9604, "end_char_pos": 9605}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 9636, "end_char_pos": 9637}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 9736, "end_char_pos": 9737}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 9758, "end_char_pos": 9759}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 9796, "end_char_pos": 9797}, {"type": "R", "before": "\u2026", "after": "...", "start_char_pos": 9814, "end_char_pos": 9815}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 9829, "end_char_pos": 9830}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 9846, "end_char_pos": 9847}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10015, "end_char_pos": 10016}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10068, "end_char_pos": 10069}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10096, "end_char_pos": 10097}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10131, "end_char_pos": 10132}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10222, "end_char_pos": 10223}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10266, "end_char_pos": 10267}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10315, "end_char_pos": 10316}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10347, "end_char_pos": 10348}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 10413, "end_char_pos": 10414}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10487, "end_char_pos": 10488}, {"type": "R", "before": "\u2026\u201d", "after": "...\"", "start_char_pos": 10515, "end_char_pos": 10517}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10576, "end_char_pos": 10577}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10643, "end_char_pos": 10644}, {"type": "R", "before": "\u201cI\u2019", "after": "\"I'", "start_char_pos": 10771, "end_char_pos": 10774}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10800, "end_char_pos": 10801}, {"type": "R", "before": "\u201d It\u2019", "after": "\" It'", "start_char_pos": 10886, "end_char_pos": 10891}], "sents_char_pos": [0, 36, 61, 128, 207, 367, 612, 871, 984, 1055, 1173, 1212, 1246, 1260, 1283, 1302, 1362, 1397, 1429, 1442, 1492, 1544, 1636, 1704, 1831, 1875, 1944, 2096, 2257, 2292, 2304, 2465, 2609, 2664, 2774, 2906, 2956, 2976, 2999, 3050, 3102, 3222, 3252, 3278, 3328, 3448, 3490, 3503, 3678, 3762, 3823, 3949, 4038, 4115, 4130, 4153, 4193, 4240, 4260, 4296, 4397, 4426, 4517, 4635, 4700, 4734, 4750, 4848, 4894, 4910, 4926, 4980, 5022, 5091, 5154, 5283, 5331, 5407, 5440, 5541, 5603, 5669, 5720, 5787, 5809, 5841, 5881, 5933, 5962, 5985, 6068, 6099, 6140, 6174, 6310, 6349, 6481, 6537, 6636, 6691, 6860, 6940, 6961, 6977, 6996, 7026, 7069, 7094, 7172, 7199, 7265, 7359, 7424, 7503, 7566, 7736, 7770, 7803, 7865, 7880, 7909, 7966, 7995, 8266, 8362, 8434, 8505, 8679, 8731, 8763, 8879, 8971, 8994, 9028, 9106, 9172, 9184, 9284, 9408, 9424, 9463, 9524, 9600, 9652, 9754, 9777, 9815, 9842, 9862, 9930, 9944, 10012, 10058, 10087, 10116, 10157, 10173, 10213, 10311, 10340, 10363, 10516, 10572, 10639, 10885, 10900, 11010, 11072, 11143, 11386, 11427, 11506, 11540, 11571, 11589, 11612]}
+{"doc_id": "85106", "revision_depth": "1", "before_revision": "In the final of Konami Cup 2007, Chunichi Dragons battled SK Wyverns again, many local (Japan) spectators hoped Dragons revenge on Wyverns and win the champion. And this is really a intensive match with the stating pitchers George Kenneth Rayborn from SK versus Daisuke Yamai. The key innings took place at the 9th inning, Hirokazu Ibata (Dragons) hit a key run back to make their team lead with 6-5. Finally, the relief pitcher Hitoki Iwase successfully shut down SK's offenses and tied the score to the end to win the champion. After this game, Hiromitsu Ochiai (Coach of Chunichi Dragons ) remarked: \"Even though we ever lose to SK Wyverns, but participants in this year proved their actual strength more than last year. In this game, after we led with 6-5, Hitoki Iwase told me he want to pitch at the bottom of 9th inning, then I accepted, he promised his wish and finally helped us win the champion. I'll not forget the contributions by Ibata and Iwase.\"", "after_revision": "In the final of the Konami Cup 2007, Chunichi Dragons battled SK Wyverns again, many Japanese spectators hoped for Dragons to take revenge on Wyverns and win the championship. This was really a intensive match with starting pitchers George Kenneth Rayborn from SK versus Daisuke Yamai. The key innings took place at the 9th inning, Hirokazu Ibata (Dragons) hit a key run back to make their team lead with 6-5. Finally, the relief pitcher Hitoki Iwase successfully shut down SK's offense and tied the score to the end to win the champion. After this game, Chunichi Dragons coach Hiromitsu Ochiai remarked: \"Even though we ever lose to SK Wyverns, but participants in this year proved their actual strength more than last year. In this game, after we led with 6-5, Hitoki Iwase told me he want to pitch at the bottom of 9th inning, then I accepted, he promised his wish and finally helped us win the champion. I'll not forget the contributions by Ibata and Iwase.\"", "edit_actions": [{"type": "A", "before": null, "after": "the", "start_char_pos": 16, "end_char_pos": 16}, {"type": "R", "before": "local (Japan) spectators hoped Dragons", "after": "Japanese spectators hoped for Dragons to take", "start_char_pos": 82, "end_char_pos": 120}, {"type": "R", "before": "champion. And this is", "after": "championship. This was", "start_char_pos": 152, "end_char_pos": 173}, {"type": "R", "before": "the stating", "after": "starting", "start_char_pos": 204, "end_char_pos": 215}, {"type": "R", "before": "offenses", "after": "offense", "start_char_pos": 471, "end_char_pos": 479}, {"type": "R", "before": "Hiromitsu Ochiai (Coach of Chunichi Dragons )", "after": "Chunichi Dragons coach Hiromitsu Ochiai", "start_char_pos": 548, "end_char_pos": 593}], "sents_char_pos": [0, 161, 277, 401, 530, 724, 906]}
+{"doc_id": "85304", "revision_depth": "1", "before_revision": "European Parliament in Brussels. The far-right coalition Identity, Tradition, Sovereignty (ITS) in the European Parliament , collapsed today after the Romanian delegates withdrew over a dispute with Italian Alessandra Mussolini , grand-daughter of dictator Benito Mussolini . After a Roma gipsy was accused of murdering the wife of an Italian naval officer recently, Ms Mussolini told the Romanian newspaper Cotidianul on November 2nd: \"Breaking the law has become a way of life for Romanians. However, it is not about petty crimes, but horrifying crimes, that give one goose bumps.\" In her comment, Ms. Mussolini did not distinguish between Roma gipsies and the rest of Romanians, which the leader of the Romanian deputies, Corneliu Vadim Tudor , found to be \"a sacrilege toward our people\". The far-right Greater Romania Party is running on an anti-Romani platform. Mr. Tudor went on to suggest that such a comment could be expected from the grand-daughter of Benito Mussolini, which Ms. Mussolini saw as an insult to her family. Beside the Greater Romania MEPs and several politicians from Italy, the ITS bloc was composed of members from Austria ( FP\u00d6 ), Belgium ( Vlaams Belang ), Bulgaria ( National Union Attack ), France ( Front National ) and individual politicians from the United Kingdom. The survival of the group was already doubtful, according to polls which predicted an electoral wipeout for the Greater Romania party in the elections on November 20. German MEP Martin Schulz , head of the left Party of European Socialists , released a statement saying that: \"The good news is that the [group] of the ultra-nationalists no longer exists and cannot use the money of the European taxpayer to support its xenophobia and neo-fascism.\" According to allied Liberal leader Graham Watson : \"They are a casualty of their own philosophy which paints all foreigners into a single mould and encourages xenophobic and racist comments and remarks which have no place in the European Union. ... The irony of a Mussolini destroying the coherence of a far-right group will not be lost on Europeans from Bucharest to Brindisi .\" English green MEP Jean Lambert put it this way: \"This collection of unsavoury European politicians were united only by hatred - be it of other races, nationalities, sexualities or, ironically, the EU - and it was only a matter of time before they succumbed to a hatred of each other as well.\"", "after_revision": "European Parliament in . The coalition (ITS) in the , collapsed today after the Romanian delegates withdrew over a dispute with Italian , grand-daughter of dictator . After a was accused of murdering the wife of an Italian naval officer recently, Ms Mussolini told the Romanian newspaper on November 2nd: \"Breaking the law has become a way of life for Romanians. However, it is not about petty crimes, but horrifying crimes, that give one goose bumps.\" In her comment, Ms. Mussolini did not distinguish between Roma gipsies and the rest of Romanians, which the leader of the Romanian deputies, , found to be \"a sacrilege toward our people\". The far-right is running on an anti-Romani platform. Mr. Tudor went on to suggest that such a comment could be expected from the grand-daughter of Benito Mussolini, which Ms. Mussolini saw as an insult to her family. Beside the Greater Romania MEPs and several politicians from Italy, the ITS bloc was composed of members from Austria ( ), Belgium ( ), Bulgaria ( ), France ( ) and individual politicians from the United Kingdom. The survival of the group was already doubtful, according to polls which predicted an for the Greater Romania party in the elections on November 20. German MEP , head of the left , released a statement saying that: \"The good news is that the [group] of the ultra-nationalists no longer exists and cannot use the money of the European taxpayer to support its xenophobia and neo-fascism.\" According to leader : \"They are a casualty of their own philosophy which paints all foreigners into a single mould and encourages and racist comments and remarks which have no place in the European Union. ... The irony of a Mussolini destroying the coherence of a far-right group will not be lost on Europeans from to .\" English green MEP put it this way: \"This collection of unsavoury European politicians were united only by hatred \u2014 be it of other races, nationalities, sexualities or, ironically, the EU \u2014 and it was only a matter of time before they succumbed to a hatred of each other as well.\"", "edit_actions": [{"type": "R", "before": "Brussels. The far-right coalition Identity, Tradition, Sovereignty", "after": ". The coalition", "start_char_pos": 23, "end_char_pos": 89}, {"type": "D", "before": "European Parliament", "after": null, "start_char_pos": 103, "end_char_pos": 122}, {"type": "D", "before": "Alessandra Mussolini", "after": null, "start_char_pos": 207, "end_char_pos": 227}, {"type": "D", "before": "Benito Mussolini", "after": null, "start_char_pos": 257, "end_char_pos": 273}, {"type": "D", "before": "Roma gipsy", "after": null, "start_char_pos": 284, "end_char_pos": 294}, {"type": "D", "before": "Cotidianul", "after": null, "start_char_pos": 408, "end_char_pos": 418}, {"type": "D", "before": "Corneliu Vadim Tudor", "after": null, "start_char_pos": 725, "end_char_pos": 745}, {"type": "D", "before": "Greater Romania Party", "after": null, "start_char_pos": 807, "end_char_pos": 828}, {"type": "D", "before": "FP\u00d6", "after": null, "start_char_pos": 1152, "end_char_pos": 1155}, {"type": "D", "before": "Vlaams Belang", "after": null, "start_char_pos": 1169, "end_char_pos": 1182}, {"type": "D", "before": "National Union Attack", "after": null, "start_char_pos": 1197, "end_char_pos": 1218}, {"type": "D", "before": "Front National", "after": null, "start_char_pos": 1231, "end_char_pos": 1245}, {"type": "D", "before": "electoral wipeout", "after": null, "start_char_pos": 1386, "end_char_pos": 1403}, {"type": "D", "before": "Martin Schulz", "after": null, "start_char_pos": 1478, "end_char_pos": 1491}, {"type": "D", "before": "Party of European Socialists", "after": null, "start_char_pos": 1511, "end_char_pos": 1539}, {"type": "R", "before": "allied Liberal leader Graham Watson", "after": "leader", "start_char_pos": 1761, "end_char_pos": 1796}, {"type": "D", "before": "xenophobic", "after": null, "start_char_pos": 1907, "end_char_pos": 1917}, {"type": "R", "before": "Bucharest to Brindisi", "after": "to", "start_char_pos": 2103, "end_char_pos": 2124}, {"type": "D", "before": "Jean Lambert", "after": null, "start_char_pos": 2146, "end_char_pos": 2158}, {"type": "R", "before": "-", "after": "\u2014", "start_char_pos": 2254, "end_char_pos": 2255}, {"type": "R", "before": "-", "after": "\u2014", "start_char_pos": 2328, "end_char_pos": 2329}], "sents_char_pos": [0, 32, 275, 493, 583, 792, 867, 1031, 1299, 1466, 1747, 1996]}
+{"doc_id": "85743", "revision_depth": "1", "before_revision": "Silvio Berlusconi shaking the hand of US President George W. Bush. Wiretaps disclosed by Italian daily La Repubblica have upset Italian politics. The conversations suggest that RAI (Italian state television) and private rival Mediaset ( owned by Silvio Berlusconi ) made arrangements to favour Berlusconi himself when he was Prime Minister of Italy. In these conversations RAI and Mediaset managers discussed how to present Berlusconi's defeat at the last elections in news programmes and talk shows and the decision to delay announcement of the bad results. This is not the first time Berlusconi is accused of controlling the Italy's media. Mr Berlusconi did not comment the allegations but one of his closer men , Renato Schifani, said that \"This is a media operation [... ] precise objective of destroying Mr Berlusconi's companies\". Moreover Mediaset said it would sue La Repubblica for these allegations. On the other side Walter Veltroni, the leader of the opposing party, said \"What has emerged is extremely serious\" and asked an internal investigation at RAI.", "after_revision": "Silvio Berlusconi shaking the hand of US President George W. Bush. Wiretaps disclosed by Italian daily La Repubblica have upset Italian politics. The conversations suggest that state-run RAI and private rival Mediaset , which is owned by Silvio Berlusconi , made arrangements to favour Berlusconi himself when he was Prime Minister of Italy. In these conversations , RAI and Mediaset managers discussed how to present Berlusconi's defeat at the last elections in news programmes and talk shows and the decision to delay announcement of the bad results. This is not the first time Berlusconi has been accused of controlling the Italian media. Berlusconi did not comment the allegations but one of his close associates , Renato Schifani, said that \"This is a media operation [... with a ] precise objective of destroying Mr Berlusconi's companies\". Mediaset said it would sue La Repubblica for these allegations. Walter Veltroni, the leader-elect of the opposition Democratic Party, said, \"What has emerged is extremely serious\" and requested an internal investigation within the RAI.", "edit_actions": [{"type": "R", "before": "RAI (Italian state television)", "after": "state-run RAI", "start_char_pos": 177, "end_char_pos": 207}, {"type": "R", "before": "(", "after": ", which is", "start_char_pos": 235, "end_char_pos": 236}, {"type": "R", "before": ")", "after": ",", "start_char_pos": 264, "end_char_pos": 265}, {"type": "A", "before": null, "after": ",", "start_char_pos": 373, "end_char_pos": 373}, {"type": "R", "before": "is", "after": "has been", "start_char_pos": 598, "end_char_pos": 600}, {"type": "R", "before": "Italy's", "after": "Italian", "start_char_pos": 628, "end_char_pos": 635}, {"type": "D", "before": "Mr", "after": null, "start_char_pos": 643, "end_char_pos": 645}, {"type": "R", "before": "closer men", "after": "close associates", "start_char_pos": 704, "end_char_pos": 714}, {"type": "A", "before": null, "after": "with a", "start_char_pos": 776, "end_char_pos": 776}, {"type": "D", "before": "Moreover", "after": null, "start_char_pos": 839, "end_char_pos": 847}, {"type": "D", "before": "On the other side", "after": null, "start_char_pos": 912, "end_char_pos": 929}, {"type": "R", "before": "leader of the opposing party, said", "after": "leader-elect of the opposition Democratic Party, said,", "start_char_pos": 951, "end_char_pos": 985}, {"type": "R", "before": "asked", "after": "requested", "start_char_pos": 1030, "end_char_pos": 1035}, {"type": "R", "before": "at", "after": "within the", "start_char_pos": 1062, "end_char_pos": 1064}], "sents_char_pos": [0, 66, 145, 349, 559, 642, 838, 911]}
+{"doc_id": "86383", "revision_depth": "1", "before_revision": "David Shankbone: You grew up around so many great American musicians and singers like and . Al Sharpton: I grew up in the black church. I started preaching at four as a wonderboy preacher. The church that I grew up in, Washington Temple in Brooklyn, was a hot spot for gospel singers. It was probably a mega-church before there were mega-churches. , who was the bishop of the church, had about 5,000 members in the late fifties and early sixties. All the gospel greats would come to the church. Because I was the wonderboy preacher, and I had my own little church celebrity, I got to know all the gospel singers. It began my early dealing with the entertainment world, through the gospel singing. In , Mahalia Jackson had me preach and she sang there that night. Then I did a few other cities with her. \"All the gospel greats would come to the church. Because I was the wonderboy preacher, and I had my own little church celebrity, I got to know all the gospel singers.\"Mahalia Jackson in 1962.DS: What was that like touring with Mahalia Jackson? AS: It was fascinating to me. Here I am a little kid, I\u2019m not even ten years old, and Mahalia Jackson was arguably the preeminent gospel artist of that time. It was quite a charge to me. A lot of times now I land into and you see the circular, which was the New York pavilion of the World\u2019s Fair, and that\u2019s where I preached when I was nine years old. I think about that a lot flying in, that night with Mahalia Jackson. Now that\u2019s wow, 47-years ago. DS: Did you keep in touch with her throughout her life? Did she have a presence in yours?AS: Not as closely as James Brown. We would run into each other. She died when I was still very much in my teens. Madame Ernestine Washington, who was the first lady of the church I grew up in, she was a gospel singer. I knew a lot of the gospel greats. James Brown and I got close in my teen years. What happened was when I was around 12 or 13, had come to the church and I got totally mesmerized by , who was the Congressman in and a , so I wanted to get involved politically. The church that I was in was Pentecostal; I\u2019m now . But it was Pentecostal, and it wasn\u2019t that involved in social justice, although Bishop Washington was. Bishop Washington said he didn\u2019t want me to get involved with the more militant groups, because at that time you had the and a lot of others. So he brought me to , who was head of Operation Breadbasket, SCLC, in New York, who later became my pastor after Bishop Washington died. Reverend Jones converted me Baptist from Pentecostal. They knew who I was because of my preaching as a little boy. I became the youth director in New York of SCLC Operation Breadbasket. King had just gotten killed; this is 1969 and he had gotten killed the year before. I met King, but I didn\u2019t know him. I was 12, 13 years old. But I got to know Dr. Abernathy, who succeeded him\u2014DS: Ralph Abernathy? AS: . The Director nationally of was , who was in his late twenties, early thirties. It was interesting, because Jesse Jackson\u2019s age and my age gap was the same as his and King\u2019s. Jackson at that time had a big afro and a medallion. He became a hero to me. Adam Clayton Powell, who had been my hero, had retired and moved so I became a prot\u00e9g\u00e9 of Reverend Jackson. We became close. DS: He was such an icon, but then to also have had this deeply personal relationship must have had an extraordinary impact on you.AS: James Brown was the father I never had. I traveled with him; he financed my youth group. I met my wife \u2014 we\u2019re no longer together \u2014 when she was his background singer. He put my kids in private school. I styled my hair after him; he actually styled my hair after his. What I do functionally is what Dr. King, Reverend Jackson and the movement are all about; but I learned manhood from James Brown. I always say that James Brown taught me how to be a man.DS: What was one lesson that he taught you? AS: Determination. Don\u2019t be afraid to listen to your inner ear. James Brown changed music; he changed the beat of music. I learned from him to trust your inner ear, go by your own beat. I remember in the 1970\u2019s when disco became popular he refused to water down his music, and it ended up his music became the basis of funk and rap and all that. I watched him deal with adversity and go to jail. When he was in jail I went and saw him every month, and I went and preached for him. He never gave up, he was very determined. He taught me how to take adversity and use it to your advantage. 200px|James Brown. DS: There is so much anger at injustice, and that anger can fell a person\u2019s ability to right wrongs, or can steer them down a bad path. You have been able to take your anger and use it productively. When you come across a young person who is angry at the world around them, what kind of advice do you give them?AS: The challenge is to learn that your anger can fuel you in achieving things that can eradicate what you\u2019re angry about; or your anger can consume and defeat you. I\u2019m known for fighting racial bias, police misconduct, and things against poor people. I can either be strategic to say this is Plan A, B and C to get racial profiling off, or hate crime laws passed, or close the , and I\u2019m going to use my anger, my real, heartfelt anger to fuel me to get up at five o\u2019clock in the morning to do Plan A, B and C; or I can be someone so angry that I never get to a strategy, I never get to Plan A, B and C. But then the police are not challenged, and the hate crime laws are not written, and is still open. So the question one has to ask one\u2019s self\u2014I tell young people all the time, and most of the leadership in our chapters are younger than me\u2014you have to make a choice at some point in your life: are you going to do something about what angers you, or do you want to just be angry? Because I learned a long time ago that those in power don\u2019t care that you\u2019re angry, they care if you use that anger to do something about it. You have a choice. I used to like boxing. My father was a boxer and I used to watching boxing matches all the time. If you go into the ring just mad you\u2019ll get knocked out. Or you can go into the ring and have training, and have a fight plan, and use your natural anger to fuel your fight plan; it\u2019s according to what you want to be. But the one with the fight plan that uses his anger to drive the fight plan is the one who ends up champion. The one without one just ends up angry and laying knocked out. It\u2019s your choice. I\u2019m not saying I came to that out of brilliance; I came to that out of trial and error. I used to be angry with no plan. Just recklessly angry.DS: What would you do? AS: Just mad, just react. And achieve nothing. You\u2019ve got to say that life is about stated goals, benchmarks, and what you want to achieve at the end of life. Because everybody comes to an end. What was the purpose of your life and what did you achieve? So if my goal was to build a social justice network, and to change things, at the end of life in the social justice arena, did I do that? It won\u2019t matter if I was angry or happy, it will matter if I have achieved that. That\u2019s what I learned from James Brown. You got to decide what your purpose is, not others. Much of the media criticism of me assumes their goals and the impose them on me. Well, those might not be my goals. So they will say, \u201cWell, Sharpton has not won a political office.\u201d But that might not be my goal! Maybe I ran for political office to change the debate, or to raise the social justice question. DS: Which you see today. or , they\u2019re not there because they think they are going to win; they are trying to frame the issues.AS: Right. And if they are there to frame the issue, then they are successful. One of the things I learned from James Brown is don\u2019t let others determine your success. Your success is based upon your goals, not the goals they impose upon you. Sharpton and the African-American media DS: recently wrote a relatively laudatory column about you in . In it he said, \"When Sharpton toppled Jesse Jackson from the top spot as black America's main man, the notoriety, and the hostility, that that title carries with it, insured that he'd take the heat for whatever went right or wrong when blacks took to the streets in protest.\" What do you think happened to Jesse Jackson\u2019s place in the black community? Hutchison is a prominent black man saying you toppled Jackson. AS: Well, that\u2019s a hard thing for me to comment on. When I was growing up Reverend Jackson was a hero to me and a mentor. I\u2019d rather not get into that. I\u2019ll let Earl and others give their opinions. I\u2019ll stay out of that. That\u2019s difficult for me to answer.DS: Clarence Page again in reference to this wrote, \"'' culture punishes those who don't ',' to quote a popular inner-city T-shirt slogan, even when the victims are innocent neighbors. A lot of us black Americans would like to take back our streets. We could use a little more help from our leaders.\" AS: We could use a little more help from Clarence Page, again. When I had the campaign against these lyrics\u2014I had the \u201cIt\u2019s Not Snitching, It\u2019s Saving\u201d campaign\u2014Clarence was totally silent. We\u2019ve taken that head on, and had rappers attack us. said \u201cAl Sharpton can suck my so-and-so.\u201d has a record out, and he's a friend of mine! He says, \u201cDon\u2019t tell me Al Sharpton not to say ''!\u201d They don\u2019t attack Clarence Page they attack me because I\u2019m attacking them. Just look at the rappers attacking me. So somebody should ask Clarence Page why they are attacking me if I\u2019m not out there fighting them. DS: You are saying that black columnists, whether it be Clarence Page or Juan Williams, who seem to have made their names by attacking a lot of the work done at the grass roots. How can you change that?AS: I don\u2019t think you can. That \u2019 s their role. If you go back to the sixties it was who used to attack Martin Luther King. You have blacks who understand that one of the ways to get a job in the mainstream media is to attack black leaders. DS: Such as Juan Williams? AS: Oh, who works at ? Juan Williams works for and wants to ask me about accountability? I mean, really. He works for Rupert Murdoch and wants to ask me about accountability. I think he was mad because a Republican donated some money to the National Action Network. And you work for Rupert Murdoch. Because we are on we should have gone to a rally for The Word Network. It\u2019s ridiculous. Again, what do they do? The main thing they write about is criticism of black leaders. If you read their columns you understand what their job is. \u201c White leadership is never at fault. Government is never at fault. It \u2019 s black leaders. \u201d What\u2019 s ironic is the ones they do praise \u2014 does my radio show maybe once a month. Real close with me. They praise Cosby, but never talk about the fact that Cosby and I work together on these very issues. And Cosby supports what I do. How do they reconcile that? Because they understand that part of their compact with the right wing is that they \u2019 ll beat up on Al Sharpton, or Jackson, or whoever, because they are black. On Barack ObamaDS: Who are you supporting for President? AS: No one yet. The question is, who is going to support a strong social justice agenda? When I sit and look at the Democratic debates, with all these hangmen nooses, and all these hate crimes, and they don\u2019t even bring it up, how can I support them when they\u2019re not supporting us? If I was on that stage it would be on the agenda. DS: The Post reported back in April that you have a conflict with Obama. What do you think is behind that story?AS: I think it\u2019s trying to get a double shot. Hurt him with people that like me; hurt me with people that like him. Say that Sharpton has a problem with him so the Obama people say, \u201c Oh, why is Al messing with Obama?\u201d The people that are in the debates, where he has to contest with Hillary, \u201c Oh, you have a problem with Al Sharpton. \u201d I don\u2019t have a problem with Obama. I talk to Obama, I talk to , I talk to . I have a problem that none of them are forcefully raising the social justice agenda. Why? That\u2019s what I do. I\u2019m a social justice leader. That\u2019s what I do. And I think if you went to a union leader, he\u2019d say, \u201cI like their issues on this, but what about labor?\u201d and I think if you went to a woman leader, \u201cWhat about gender divided?\u201d Why do people expect me not to be concerned about civil rights? That\u2019s what I do.DS: Why do you think Obama is not dominating the black vote? AS: I don\u2019t know. I think one, they don\u2019t know him as well. They are just learning him. I think he\u2019ll do alright, but I think the strategic mistake his handlers made\u2014I don\u2019t think it was him\u2014is they sold him as beyond race. The antithesis to the civil rights guys. The problem with that is the blacks say, \u201cOkay, you aren\u2019t standing up for us, then fine.\u201d So you can\u2019t come back later and say he\u2019s the black candidate when he said no he\u2019s not. A lady at called to do a story and I made her change the whole thing. She said, \u201cI want to do a story on Obama and the civil rights generation and the conflict.\u201d I said, \u201cYou\u2019ve got a problem. Obama and I are the same generation. We are only six years apart. How do you count generations?\u201d She said she hadn\u2019t thought about that. You could do that with Jesse, but Obama is 46 and I\u2019m 53; that\u2019s not a different generation. Why don\u2019t you talk about that every generation has had blacks on the inside and blacks on the outside. was in the Senate like Obama when King was alive. Ed Brooke was elected and sitting in the Senate when King was alive, and he was a Republican from Massachusetts. Then we had , then we had Obama. was chairman of the party when Jesse Jackson was the outsider. This new thing is that you guys don\u2019t do research. There\u2019s always been blacks inside the system and blacks outside. That\u2019s not generational, that\u2019s functional. , and DS: When you think about Imus, Michael Richards and Duane Chapman, it\u2019s starting to seem almost like a rehearsed play. They have these racist explosions, and then they come to you seeking absolution. How do you feel about playing this? 250px|\"The critics say, \u201cWhy do they go to Al Sharpton for absolution?\u201d What nobody ever asks is, \u201cWhat did Sharpton do?\u201d I made Imus go on my radio show and told him he should be fired. I never talked to the \"Bounty man\" [above]. And I told Michael Richards I\u2019m not meeting with him.\" - Sharpton on those seeking absolution from him for racist remarks.AS: That\u2019s a great question, because if you name Don Imus, Richards, Bounty Hunter, they all three came, and none of them got absolution from me. The critics say, \u201cWhy do they go to Al Sharpton for absolution?\u201d What nobody ever asks is, \u201cWhat did Sharpton do?\u201d I made Imus go on my radio show and told him he should be fired. I never talked to the \"Bounty man\". And I told Michael Richards I\u2019m not meeting with him. So, despite what they designed to happen with me, I never cooperated with the design. Imus only went on my show thinking if he did he would get past it; I used it for the basis to get him fired. He got everything but absolution. Why do they come? Because of my visibility. Right now, National Action Network is the only civil rights organization in the country that can put tens of thousands of people in the street. I think we proved that if nothing else this year from Sean Bell to Jena to Washington. He thought if he did he would get past it; I used it for the basis to get him fired. You go where you think if you can get this group not to fight me, you get a pass. If somebody is accused of , they go to the . Does that make the \"President of the Jews\"? No! That\u2019s what ADL does. It\u2019s insulting to us. They say, \u201cAl Sharpton is not the President of Black America.\u201d No, I\u2019m like ADL is in the Jewish community. That\u2019s what he does. If anybody is going to jump on this, it\u2019s him, so let me go to him. That doesn\u2019t mean he\u2019s in charge of all blacks. It means if it\u2019s a civil rights violation\u2014that\u2019s what they have to do\u2014he\u2019s been the guy up front. It\u2019s very simple. In gay communities you have the . With women, you\u2019ve got . In the Jewish community, you\u2019ve got ADL. Why wouldn\u2019t you have a National Action Network in the black community? But if sanity is that NOW can have , and the Jewish community can have Abe Foxman, and the gay community can have Human Rights group, but the black community can\u2019t have an \"Al Sharpton\", that\u2019s absurd!DS: One of the issues that came up in reference to that at Thanksgiving was . My brother-in-law brought up the and said it was political correctness. His brother said that there is a big difference between calling black girls playing basketball versus asking a black person why their families are in trouble. AS: Big difference. Big difference. DS: But those get equated as being politically incorrect. AS: I think you\u2019re right. They equate it, and it\u2019s wrong. The reason I demanded Imus be fired was because he had a record of making these kinds of derogatory statements. It\u2019s clear that \u2018nappy-headed\u2019 was a racist term. That\u2019s not questioning social maladies in the community. What is the social malady or irresponsibility about \u2018nappy-headed\u2019? \u2018Ho\u2019 is not only racist, it's misogynist. People who tried to put that over as he just wasn\u2019t politically correct are ridiculous. That\u2019s why if I or anybody else said a racist term against anybody else. That\u2019s not politically incorrect; that\u2019s bias. And all of us have made mistakes with language, but you pay for it. Which is why I don\u2019t object to him getting a job again, but he had to lose that job because he had consistently violated that job. DS: Are you okay that Don Imus is going back on the air? AS: Well, we\u2019ll monitor him; I\u2019m not saying I\u2019m going to throw a banquet for him and say welcome home. He has the right to make a living, but because he has such a consistent pattern with this we are going to monitor him to make sure he doesn\u2019t do it again. DS: Do you work with the Hip Hop Action Network?AS: On some issues. They disagree with me at first when I came out hard on the N-word and all, but then they moderated their view. On some things we work together.DS: How did they disagree with you? AS: When I first came out and said the N-word, the , should be stopped. came out and said we can\u2019t censor artists. Then he got such a backlash he said, \u201cWe got it to be maybe voluntary, or something.\u201d Russell kind of slid backwards on that one. My thing is I\u2019m against the use of the word, and I\u2019ve been against it for a long time. Even in my book, Al on America I wrote a whole chapter on the hip hop generation and how to stop that. On top of it, all of us have used it; I\u2019ve even stopped using it privately, because it\u2019s wrong. I think the thing that really drove it home to me was the kid who got beat up in Howards Beach last year, and Fat Nick\u2014the white that beat him up saying no niggers in the neighborhood\u2014his defense in court was that he was using a hip hop term. It\u2019s ridiculous, absolutely ridiculous. We can\u2019t be the only ones in America in which there is no hate term. DS: If you could choose how you die, how would it be?AS: I would probably choose doing something active. I would either be leading a march or preaching a sermon. I don\u2019t want to die old and incapacitated. I\u2019d rather die in the firing line. DS: What do you think is the greatest threat to humanity? AS: Our ignoring nature. Our ignoring the signs of nature. DS: Global warming?AS: Global warming would be at the top of the list. ended up being right. I think our ignoring nature, global warming, and then our ignoring the need for one standard of human rights all over the world. This second. But first nature, because we won\u2019t be here if we don\u2019t start taking nature seriously. Like global warming and ecology and whatever we are doing with the environment. Second is how we deal with human rights standard all over the world.DS: Are there any national politicians you look up to as leaders? AS: I respect Dennis Kucinich. I respect in Minnesota. Those are the two that come to mind right away. I\u2019m far more progressive than most, but I really respect both of them. DS: Do you think has done a good job with ? AS:''' I think Joel Klein has done better, than I thought he would. I\u2019m not sure I\u2019m into the controlling the system. It\u2019s funny, Joel has a sense of grass roots than one would think. I think he has done better than I would have given him credit for. I didn\u2019t have a lot of hope for him. He has defied my low expectation.", "after_revision": "David Shankbone: You grew up around so many great American musicians and singers like and . Al Sharpton: I grew up in the black church. I started preaching at four as a wonderboy preacher. The church that I grew up in, Washington Temple in Brooklyn, was a hot spot for gospel singers. It was probably a mega-church before there were mega-churches. , who was the bishop of the church, had about 5,000 members in the late fifties and early sixties. All the gospel greats would come to the church. Because I was the wonderboy preacher, and I had my own little church celebrity, I got to know all the gospel singers. It began my early dealing with the entertainment world, through the gospel singing. In , Mahalia Jackson had me preach and she sang there that night. Then I did a few other cities with her. \"All the gospel greats would come to the church. Because I was the wonderboy preacher, and I had my own little church celebrity, I got to know all the gospel singers.\"Mahalia Jackson in 1962.DS: What was that like touring with Mahalia Jackson? AS: It was fascinating to me. Here I am a little kid, I\u2019m not even ten years old, and Mahalia Jackson was arguably the preeminent gospel artist of that time. It was quite a charge to me. A lot of times now I land into LaGuardia Airport and you see the circular, which was the New York pavilion of the World\u2019s Fair, and that\u2019s where I preached when I was nine years old. I think about that a lot flying in, that night with Mahalia Jackson. Now that\u2019s wow, 47-years ago. DS: Did you keep in touch with her throughout her life? Did she have a presence in yours?AS: Not as closely as James Brown. We would run into each other. She died when I was still very much in my teens. Madame Ernestine Washington, who was the first lady of the church I grew up in, she was a gospel singer. I knew a lot of the gospel greats. James Brown and I got close in my teen years. What happened was when I was around 12 or 13, had come to the church and I got totally mesmerized by , who was the Congressman in Harlem and a , so I wanted to get involved politically. The church that I was in was Pentecostal; I\u2019m now . But it was Pentecostal, and it wasn\u2019t that involved in social justice, although Bishop Washington was. Bishop Washington said he didn\u2019t want me to get involved with the more militant groups, because at that time you had the and a lot of others. So he brought me to , who was head of Operation Breadbasket, SCLC, in New York, who later became my pastor after Bishop Washington died. Reverend Jones converted me Baptist from Pentecostal. They knew who I was because of my preaching as a little boy. I became the youth director in New York of SCLC Operation Breadbasket. King had just gotten killed; this is 1969 and he had gotten killed the year before. I met King, but I didn\u2019t know him. I was 12, 13 years old. But I got to know Dr. Abernathy, who succeeded him\u2014DS: Ralph Abernathy? AS: . The Director nationally of was , who was in his late twenties, early thirties. It was interesting, because Jesse Jackson\u2019s age and my age gap was the same as his and King\u2019s. Jackson at that time had a big afro and a medallion. He became a hero to me. Adam Clayton Powell, who had been my hero, had retired and moved so I became a prot\u00e9g\u00e9 of Reverend Jackson. We became close. DS: He was such an icon, but then to also have had this deeply personal relationship must have had an extraordinary impact on you.AS: James Brown was the father I never had. I traveled with him; he financed my youth group. I met my wife \u2014 we\u2019re no longer together \u2014 when she was his background singer. He put my kids in private school. I styled my hair after him; he actually styled my hair after his. What I do functionally is what Dr. King, Reverend Jackson and the movement are all about; but I learned manhood from James Brown. I always say that James Brown taught me how to be a man.DS: What was one lesson that he taught you? AS: Determination. Don\u2019t be afraid to listen to your inner ear. James Brown changed music; he changed the beat of music. I learned from him to trust your inner ear, go by your own beat. I remember in the 1970\u2019s when disco became popular he refused to water down his music, and it ended up his music became the basis of funk and rap and all that. I watched him deal with adversity and go to jail. When he was in jail I went and saw him every month, and I went and preached for him. He never gave up, he was very determined. He taught me how to take adversity and use it to your advantage. 200px|James Brown. DS: There is so much anger at injustice, and that anger can fell a person\u2019s ability to right wrongs, or can steer them down a bad path. You have been able to take your anger and use it productively. When you come across a young person who is angry at the world around them, what kind of advice do you give them?AS: The challenge is to learn that your anger can fuel you in achieving things that can eradicate what you\u2019re angry about; or your anger can consume and defeat you. I\u2019m known for fighting racial bias, police misconduct, and things against poor people. I can either be strategic to say this is Plan A, B and C to get racial profiling off, or hate crime laws passed, or close the , and I\u2019m going to use my anger, my real, heartfelt anger to fuel me to get up at five o\u2019clock in the morning to do Plan A, B and C; or I can be someone so angry that I never get to a strategy, I never get to Plan A, B and C. But then the police are not challenged, and the hate crime laws are not written, and is still open. So the question one has to ask one\u2019s self\u2014I tell young people all the time, and most of the leadership in our chapters are younger than me\u2014you have to make a choice at some point in your life: are you going to do something about what angers you, or do you want to just be angry? Because I learned a long time ago that those in power don\u2019t care that you\u2019re angry, they care if you use that anger to do something about it. You have a choice. I used to like boxing. My father was a boxer and I used to watching boxing matches all the time. If you go into the ring just mad you\u2019ll get knocked out. Or you can go into the ring and have training, and have a fight plan, and use your natural anger to fuel your fight plan; it\u2019s according to what you want to be. But the one with the fight plan that uses his anger to drive the fight plan is the one who ends up champion. The one without one just ends up angry and laying knocked out. It\u2019s your choice. I\u2019m not saying I came to that out of brilliance; I came to that out of trial and error. I used to be angry with no plan. Just recklessly angry.DS: What would you do? AS: Just mad, just react. And achieve nothing. You\u2019ve got to say that life is about stated goals, benchmarks, and what you want to achieve at the end of life. Because everybody comes to an end. What was the purpose of your life and what did you achieve? So if my goal was to build a social justice network, and to change things, at the end of life in the social justice arena, did I do that? It won\u2019t matter if I was angry or happy, it will matter if I have achieved that. That\u2019s what I learned from James Brown. You got to decide what your purpose is, not others. Much of the media criticism of me assumes their goals and the impose them on me. Well, those might not be my goals. So they will say, \u201cWell, Sharpton has not won a political office.\u201d But that might not be my goal! Maybe I ran for political office to change the debate, or to raise the social justice question. DS: Which you see today. Dennis Kucinich or Tom Tancredo , they\u2019re not there because they think they are going to win; they are trying to frame the issues.AS: Right. And if they are there to frame the issue, then they are successful. One of the things I learned from James Brown is don\u2019t let others determine your success. Your success is based upon your goals, not the goals they impose upon you. Sharpton and the African-American media DS: recently wrote a relatively laudatory column about you in . In it he said, \"When Sharpton toppled Jesse Jackson from the top spot as black America's main man, the notoriety, and the hostility, that that title carries with it, insured that he'd take the heat for whatever went right or wrong when blacks took to the streets in protest.\" What do you think happened to Jesse Jackson\u2019s place in the black community? Hutchison is a prominent black man saying you toppled Jackson. AS: Well, that\u2019s a hard thing for me to comment on. When I was growing up Reverend Jackson was a hero to me and a mentor. I\u2019d rather not get into that. I\u2019ll let Earl and others give their opinions. I\u2019ll stay out of that. That\u2019s difficult for me to answer.DS: Clarence Page again in reference to this wrote, \"'' culture punishes those who don't ',' to quote a popular inner-city T-shirt slogan, even when the victims are innocent neighbors. A lot of us black Americans would like to take back our streets. We could use a little more help from our leaders.\" AS: We could use a little more help from Clarence Page, again. When I had the campaign against these lyrics\u2014I had the \u201cIt\u2019s Not Snitching, It\u2019s Saving\u201d campaign\u2014Clarence was totally silent. We\u2019ve taken that head on, and had rappers attack us. said \u201cAl Sharpton can suck my so-and-so.\u201d has a record out, and he's a friend of mine! He says, \u201cDon\u2019t tell me Al Sharpton not to say ''!\u201d They don\u2019t attack Clarence Page they attack me because I\u2019m attacking them. Just look at the rappers attacking me. So somebody should ask Clarence Page why they are attacking me if I\u2019m not out there fighting them. DS: You are saying that black columnists, whether it be Clarence Page or Juan Williams, who seem to have made their names by attacking a lot of the work done at the grass roots. How can you change that?AS: I don\u2019t think you can. That ' s their role. If you go back to the sixties it was who used to attack Martin Luther King. You have blacks who understand that one of the ways to get a job in the mainstream media is to attack black leaders. DS: Such as Juan Williams? AS: Oh, who works at Fox ? Juan Williams works for and wants to ask me about accountability? I mean, really. He works for Rupert Murdoch and wants to ask me about accountability. I think he was mad because a Republican donated some money to the National Action Network. And you work for Rupert Murdoch. Because we are on we should have gone to a rally for The Word Network. It\u2019s ridiculous. Again, what do they do? The main thing they write about is criticism of black leaders. If you read their columns you understand what their job is. \" White leadership is never at fault. Government is never at fault. It ' s black leaders. \" What' s ironic is the ones they do praise \u2014 Bill Cosby does my radio show maybe once a month. Real close with me. They praise Cosby, but never talk about the fact that Cosby and I work together on these very issues. And Cosby supports what I do. How do they reconcile that? Because they understand that part of their compact with the right wing is that they ' ll beat up on Al Sharpton, or Jackson, or whoever, because they are black. On Barack ObamaDS: Who are you supporting for President? AS: No one yet. The question is, who is going to support a strong social justice agenda? When I sit and look at the Democratic debates, with all these hangmen nooses, and all these hate crimes, and they don\u2019t even bring it up, how can I support them when they\u2019re not supporting us? If I was on that stage it would be on the agenda. DS: The Post reported back in April that you have a conflict with Obama. What do you think is behind that story?AS: I think it\u2019s trying to get a double shot. Hurt him with people that like me; hurt me with people that like him. Say that Sharpton has a problem with him so the Obama people say, \" Oh, why is Al messing with Obama?\u201d The people that are in the debates, where he has to contest with Hillary, \" Oh, you have a problem with Al Sharpton. \" I don\u2019t have a problem with Obama. I talk to Obama, I talk to Hillary , I talk to John Edwards . I have a problem that none of them are forcefully raising the social justice agenda. Why? That\u2019s what I do. I\u2019m a social justice leader. That\u2019s what I do. And I think if you went to a union leader, he\u2019d say, \u201cI like their issues on this, but what about labor?\u201d and I think if you went to a woman leader, \u201cWhat about gender divided?\u201d Why do people expect me not to be concerned about civil rights? That\u2019s what I do.DS: Why do you think Obama is not dominating the black vote? AS: I don\u2019t know. I think one, they don\u2019t know him as well. They are just learning him. I think he\u2019ll do alright, but I think the strategic mistake his handlers made\u2014I don\u2019t think it was him\u2014is they sold him as beyond race. The antithesis to the civil rights guys. The problem with that is the blacks say, \u201cOkay, you aren\u2019t standing up for us, then fine.\u201d So you can\u2019t come back later and say he\u2019s the black candidate when he said no he\u2019s not. A lady at The New York Times called to do a story and I made her change the whole thing. She said, \u201cI want to do a story on Obama and the civil rights generation and the conflict.\u201d I said, \u201cYou\u2019ve got a problem. Obama and I are the same generation. We are only six years apart. How do you count generations?\u201d She said she hadn\u2019t thought about that. You could do that with Jesse, but Obama is 46 and I\u2019m 53; that\u2019s not a different generation. Why don\u2019t you talk about that every generation has had blacks on the inside and blacks on the outside. was in the Senate like Obama when King was alive. Ed Brooke was elected and sitting in the Senate when King was alive, and he was a Republican from Massachusetts. Then we had , then we had Obama. was chairman of the party when Jesse Jackson was the outsider. This new thing is that you guys don\u2019t do research. There\u2019s always been blacks inside the system and blacks outside. That\u2019s not generational, that\u2019s functional. , and DS: When you think about Imus, Michael Richards and Duane Chapman, it\u2019s starting to seem almost like a rehearsed play. They have these racist explosions, and then they come to you seeking absolution. How do you feel about playing this? 250px|\"The critics say, \u201cWhy do they go to Al Sharpton for absolution?\u201d What nobody ever asks is, \u201cWhat did Sharpton do?\u201d I made Imus go on my radio show and told him he should be fired. I never talked to the \"Bounty man\" [above]. And I told Michael Richards I\u2019m not meeting with him.\" - Sharpton on those seeking absolution from him for racist remarks.AS: That\u2019s a great question, because if you name Don Imus, Richards, Bounty Hunter, they all three came, and none of them got absolution from me. The critics say, \u201cWhy do they go to Al Sharpton for absolution?\u201d What nobody ever asks is, \u201cWhat did Sharpton do?\u201d I made Imus go on my radio show and told him he should be fired. I never talked to the \"Bounty man\". And I told Michael Richards I\u2019m not meeting with him. So, despite what they designed to happen with me, I never cooperated with the design. Imus only went on my show thinking if he did he would get past it; I used it for the basis to get him fired. He got everything but absolution. Why do they come? Because of my visibility. Right now, National Action Network is the only civil rights organization in the country that can put tens of thousands of people in the street. I think we proved that if nothing else this year from Sean Bell to Jena to Washington. He thought if he did he would get past it; I used it for the basis to get him fired. You go where you think if you can get this group not to fight me, you get a pass. If somebody is accused of , they go to the . Does that make the \"President of the Jews\"? No! That\u2019s what ADL does. It\u2019s insulting to us. They say, \u201cAl Sharpton is not the President of Black America.\u201d No, I\u2019m like ADL is in the Jewish community. That\u2019s what he does. If anybody is going to jump on this, it\u2019s him, so let me go to him. That doesn\u2019t mean he\u2019s in charge of all blacks. It means if it\u2019s a civil rights violation\u2014that\u2019s what they have to do\u2014he\u2019s been the guy up front. It\u2019s very simple. In gay communities you have the . With women, you\u2019ve got . In the Jewish community, you\u2019ve got ADL. Why wouldn\u2019t you have a National Action Network in the black community? But if sanity is that NOW can have , and the Jewish community can have Abe Foxman, and the gay community can have Human Rights group, but the black community can\u2019t have an \"Al Sharpton\", that\u2019s absurd!DS: One of the issues that came up in reference to that at Thanksgiving was . My brother-in-law brought up the and said it was political correctness. His brother said that there is a big difference between calling black girls playing basketball versus asking a black person why their families are in trouble. AS: Big difference. Big difference. DS: But those get equated as being politically incorrect. AS: I think you\u2019re right. They equate it, and it\u2019s wrong. The reason I demanded Imus be fired was because he had a record of making these kinds of derogatory statements. It\u2019s clear that \u2018nappy-headed\u2019 was a racist term. That\u2019s not questioning social maladies in the community. What is the social malady or irresponsibility about \u2018nappy-headed\u2019? \u2018Ho\u2019 is not only racist, it's misogynist. People who tried to put that over as he just wasn\u2019t politically correct are ridiculous. That\u2019s why if I or anybody else said a racist term against anybody else. That\u2019s not politically incorrect; that\u2019s bias. And all of us have made mistakes with language, but you pay for it. Which is why I don\u2019t object to him getting a job again, but he had to lose that job because he had consistently violated that job. DS: Are you okay that Don Imus is going back on the air? AS: Well, we\u2019ll monitor him; I\u2019m not saying I\u2019m going to throw a banquet for him and say welcome home. He has the right to make a living, but because he has such a consistent pattern with this we are going to monitor him to make sure he doesn\u2019t do it again. DS: Do you work with the Hip Hop Action Network?AS: On some issues. They disagree with me at first when I came out hard on the N-word and all, but then they moderated their view. On some things we work together.DS: How did they disagree with you? AS: When I first came out and said the N-word, the , should be stopped. came out and said we can\u2019t censor artists. Then he got such a backlash he said, \u201cWe got it to be maybe voluntary, or something.\u201d Russell kind of slid backwards on that one. My thing is I\u2019m against the use of the word, and I\u2019ve been against it for a long time. Even in my book, Al on America I wrote a whole chapter on the hip hop generation and how to stop that. On top of it, all of us have used it; I\u2019ve even stopped using it privately, because it\u2019s wrong. I think the thing that really drove it home to me was the kid who got beat up in Howards Beach last year, and Fat Nick\u2014the white that beat him up saying no niggers in the neighborhood\u2014his defense in court was that he was using a hip hop term. It\u2019s ridiculous, absolutely ridiculous. We can\u2019t be the only ones in America in which there is no hate term. DS: If you could choose how you die, how would it be?AS: I would probably choose doing something active. I would either be leading a march or preaching a sermon. I don\u2019t want to die old and incapacitated. I\u2019d rather die in the firing line. DS: What do you think is the greatest threat to humanity? AS: Our ignoring nature. Our ignoring the signs of nature. DS: Global warming?AS: Global warming would be at the top of the list. Al Gore ended up being right. I think our ignoring nature, global warming, and then our ignoring the need for one standard of human rights all over the world. This second. But first nature, because we won\u2019t be here if we don\u2019t start taking nature seriously. Like global warming and ecology and whatever we are doing with the environment. Second is how we deal with human rights standard all over the world.DS: Are there any national politicians you look up to as leaders? AS: I respect Dennis Kucinich. I respect in Minnesota. Those are the two that come to mind right away. I\u2019m far more progressive than most, but I really respect both of them. DS: Do you think has done a good job with ? AS:''' I think Joel Klein has done better, than I thought he would. I\u2019m not sure I\u2019m into the mayor controlling the system. It\u2019s funny, Joel has a sense of grass roots than one would think. I think he has done better than I would have given him credit for. I didn\u2019t have a lot of hope for him. He has defied my low expectation.", "edit_actions": [{"type": "A", "before": null, "after": "LaGuardia Airport", "start_char_pos": 1265, "end_char_pos": 1265}, {"type": "A", "before": null, "after": "Harlem", "start_char_pos": 2018, "end_char_pos": 2018}, {"type": "R", "before": "or", "after": "Dennis Kucinich or Tom Tancredo", "start_char_pos": 7550, "end_char_pos": 7552}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 9798, "end_char_pos": 9799}, {"type": "A", "before": null, "after": "Fox", "start_char_pos": 10055, "end_char_pos": 10055}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 10569, "end_char_pos": 10570}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10640, "end_char_pos": 10641}, {"type": "R", "before": "\u201d What\u2019", "after": "\" What'", "start_char_pos": 10659, "end_char_pos": 10666}, {"type": "A", "before": null, "after": "Bill Cosby", "start_char_pos": 10705, "end_char_pos": 10705}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 11009, "end_char_pos": 11010}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 11769, "end_char_pos": 11770}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 11880, "end_char_pos": 11881}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 11923, "end_char_pos": 11924}, {"type": "A", "before": null, "after": "Hillary", "start_char_pos": 11987, "end_char_pos": 11987}, {"type": "A", "before": null, "after": "John Edwards", "start_char_pos": 12000, "end_char_pos": 12000}, {"type": "A", "before": null, "after": "The New York Times", "start_char_pos": 12932, "end_char_pos": 12932}, {"type": "A", "before": null, "after": "Al Gore", "start_char_pos": 19491, "end_char_pos": 19491}, {"type": "A", "before": null, "after": "mayor", "start_char_pos": 20268, "end_char_pos": 20268}], "sents_char_pos": [0, 91, 135, 188, 284, 347, 446, 494, 612, 696, 762, 802, 851, 969, 994, 1046, 1076, 1204, 1233, 1399, 1468, 1498, 1554, 1588, 1622, 1652, 1701, 1806, 1841, 1887, 2067, 2109, 2222, 2364, 2501, 2555, 2616, 2687, 2716, 2771, 2806, 2830, 2852, 2902, 2987, 3082, 3135, 3159, 3267, 3284, 3415, 3458, 3479, 3507, 3586, 3620, 3648, 3686, 3776, 3816, 3873, 3916, 3935, 3980, 4007, 4037, 4102, 4262, 4312, 4397, 4439, 4504, 4523, 4659, 4722, 4835, 4957, 4999, 5086, 5345, 5538, 5817, 5959, 5978, 6001, 6075, 6132, 6254, 6293, 6402, 6465, 6483, 6532, 6571, 6604, 6627, 6649, 6675, 6696, 6808, 6843, 6903, 7041, 7122, 7162, 7214, 7295, 7330, 7397, 7428, 7524, 7614, 7651, 7729, 7818, 7893, 7997, 8273, 8349, 8412, 8464, 8534, 8564, 8610, 8633, 8668, 8852, 8917, 9031, 9158, 9298, 9425, 9464, 9563, 9741, 9766, 9792, 9813, 9889, 10006, 10033, 10123, 10139, 10209, 10300, 10333, 10404, 10421, 10445, 10508, 10568, 10606, 10636, 10658, 10744, 10764, 10866, 10896, 10924, 11085, 11142, 11158, 11231, 11424, 11474, 11547, 11587, 11632, 11667, 11702, 11805, 11922, 11959, 12002, 12092, 12110, 12139, 12157, 12335, 12399, 12417, 12477, 12495, 12537, 12565, 12701, 12742, 12833, 12921, 12992, 13084, 13115, 13152, 13181, 13212, 13252, 13310, 13345, 13498, 13611, 13707, 13758, 13823, 13867, 13992, 14073, 14109, 14181, 14231, 14296, 14340, 14463, 14608, 14673, 14723, 14788, 14824, 14878, 14964, 15031, 15073, 15107, 15125, 15151, 15295, 15382, 15425, 15467, 15549, 15594, 15638, 15664, 15686, 15749, 15794, 15815, 15883, 15931, 16029, 16047, 16081, 16106, 16147, 16219, 16421, 16498, 16570, 16729, 16749, 16765, 16823, 16849, 16881, 16993, 17043, 17100, 17210, 17298, 17371, 17405, 17418, 17486, 17617, 17674, 17703, 17777, 17932, 17981, 18000, 18111, 18144, 18179, 18294, 18380, 18424, 18511, 18614, 18652, 18710, 18953, 18993, 19062, 19116, 19167, 19224, 19267, 19302, 19360, 19385, 19419, 19439, 19513, 19642, 19655, 19741, 19821, 19890, 19955, 19986, 20010, 20058, 20129, 20241, 20292, 20358, 20425, 20462]}
+{"doc_id": "86561", "revision_depth": "1", "before_revision": "The former Mayor of Sefton in the United Kingdom has been gaoled for fraudulantly obtaining state benefits. He was gaoled for 15 months for conspiring to defraud \u00a332,871.85 in Disability Living Allowance together with a six months concurrently sentence for conspiracy to defraud \u00a34,000.25 in Income Support. His wife, Catie Walker, was gaoled for eight months for the DLA offence and a concurrent four months for the Income Support swindle.", "after_revision": "The former Mayor of Sefton in the United Kingdom has been jailed for fraudulantly obtaining state benefits. He was jailed for 15 months for conspiring to defraud \u00a332,871.85 in Disability Living Allowance together with a six months concurrently sentence for conspiracy to defraud \u00a34,000.25 in Income Support. His wife, Catie Walker, was jailed for eight months for the DLA offence and a concurrent four months for the Income Support swindle.", "edit_actions": [{"type": "R", "before": "gaoled", "after": "jailed", "start_char_pos": 58, "end_char_pos": 64}, {"type": "R", "before": "gaoled", "after": "jailed", "start_char_pos": 115, "end_char_pos": 121}, {"type": "R", "before": "gaoled", "after": "jailed", "start_char_pos": 336, "end_char_pos": 342}], "sents_char_pos": [0, 107, 307]}
+{"doc_id": "87132", "revision_depth": "1", "before_revision": "Former American Idol finalist Jessica Sierra, 22, has had her invitation to perform at an upcoming concert for United States troops revoked , following her recent arrest for disorderly conduct while intoxicated. Sierra has been in prison since the start of the month after an altercation with police officers outside a Tampa nightclub, which she had been ejected from. She is charged with disorderly intoxication and resisting arrest. Patterson said MoveAmericaForward.org, who are organizing the concert, had received comments from patrons who were concerned about her participation. John Fitzgibbons, attorney for Jessica, refused to comment.", "after_revision": "Former American Idol finalist Jessica Sierra, 22, has had her invitation to perform at an upcoming concert for United States troops retracted , following her recent arrest for disorderly conduct while intoxicated. Sierra has been in jail since the start of the month after an altercation with police officers outside a Tampa nightclub, which she had been ejected from. She is charged with disorderly intoxication and resisting arrest. Patterson said Move America Forward, who is organizing the concert, had received comments from patrons who were concerned about her participation. John Fitzgibbons, attorney for Jessica, refused to comment.", "edit_actions": [{"type": "R", "before": "revoked", "after": "retracted", "start_char_pos": 132, "end_char_pos": 139}, {"type": "R", "before": "prison", "after": "jail", "start_char_pos": 231, "end_char_pos": 237}, {"type": "R", "before": "MoveAmericaForward.org, who are", "after": "Move America Forward, who is", "start_char_pos": 450, "end_char_pos": 481}], "sents_char_pos": [0, 211, 368, 434, 584]}
+{"doc_id": "87307", "revision_depth": "1", "before_revision": "After almost two weeks of negotiations, this years United Nations Convention on Climate Change (UNCCC) is soon going to end, Friday being scheduled as the last day of the talks, with an extention until Saturday being possible if agreement can not be reached beforehand. While the head of the UNFCCC Sekretariat , Yvo de Boer, stressed from the onset that actual targets for emission reductions were not to be expected to be agreed on, the inclusion of a target frame for industrialized nations is being debated after all. However, his stated goal of deciding on a roadmap for negotiations, which he said needed to adress the matter of Greenhouse Gas (GHG) emissions reductions after 2012, and would have to be concluded by 2009, is not yet achieved, there being disagreement on a matter of points. But a bigger point of contestion is that the EU and the vast majority of the 190 nations participating in the conference want to set a target of a 25-40\\% cut in GHG emissions. The U.S., along with Canada and Japan, are refusing to agree to any targets at this point.", "after_revision": "After almost two weeks of negotiations, this years United Nations Convention on Climate Change (UNCCC) is soon going to end, Friday being scheduled as the last day of the talks, with an extension until Saturday being possible if agreement can not be reached beforehand. While the head of the UNFCCC Secretariat , Yvo de Boer, stressed from the onset that actual targets for emission reductions were not to be expected to be agreed on, the inclusion of a target frame for industrialized nations is being debated after all. However, his stated goal of deciding on a roadmap for negotiations, which he said needed to address the matter of Greenhouse Gas (GHG) emissions reductions after 2012, and would have to be concluded by 2009, is not yet achieved, there being disagreement on a matter of points. But a bigger point of contention is that the EU and the vast majority of the 190 nations participating in the conference want to set a target of a 25-40\\% cut in GHG emissions. The U.S., along with Canada and Japan, are refusing to agree to any targets at this point.", "edit_actions": [{"type": "R", "before": "extention", "after": "extension", "start_char_pos": 186, "end_char_pos": 195}, {"type": "R", "before": "Sekretariat", "after": "Secretariat", "start_char_pos": 299, "end_char_pos": 310}, {"type": "R", "before": "adress", "after": "address", "start_char_pos": 614, "end_char_pos": 620}, {"type": "R", "before": "contestion", "after": "contention", "start_char_pos": 820, "end_char_pos": 830}], "sents_char_pos": [0, 269, 521, 797, 974]}
+{"doc_id": "87852", "revision_depth": "1", "before_revision": "M\u00fcnster (Germany) \u2013 The electronic program guide TV-Browser will remove 16 private tv-channels on 1st of january, including German channels ProSieben, RTL Television and Sat.1. According to a press note by the TV-Browser-Team the collecting society VG Media will start to collect a charge fee for the usage of channel-program-data in EPGs beginning next year. It will be charged between 0.02 and 0.04 \u20ac cents per page-view and a fixed fee at at least 2000\u20ac. The Open-Source-project can 't and doesn't want to pay this charge fee. The developers are consdering right now to just show certain progamm-highlights of these mentioned channels . Additionally a petition has been started to convince VG Media to abandon this charge fee.", "after_revision": "The electronic programme guide, TV-Browser , announced their intention to remove 16 private tv-channels on January 1st , 2008. These include the German channels ProSieben, RTL Television and Sat.1. According to a press release by the TV-Browser team, the collecting society VG Media plans to collect a usage fee for channel-program-data in EPGs beginning next year. Users will be charged between 0.02 and 0.04 \u20ac cents per page-view with a minimum fixed fee of at least 2000\u20ac. The Open-Source-project can not and does not wish to pay this fee; developers are considering showing certain programme highlights from the channels in question. A petition has been started to convince VG Media to abandon this charge fee.", "edit_actions": [{"type": "R", "before": "M\u00fcnster (Germany) \u2013 The electronic program guide", "after": "The electronic programme guide,", "start_char_pos": 0, "end_char_pos": 48}, {"type": "R", "before": "will", "after": ", announced their intention to", "start_char_pos": 60, "end_char_pos": 64}, {"type": "A", "before": null, "after": "January", "start_char_pos": 98, "end_char_pos": 98}, {"type": "R", "before": "of january, including", "after": ", 2008. These include the", "start_char_pos": 103, "end_char_pos": 124}, {"type": "R", "before": "note by the TV-Browser-Team", "after": "release by the TV-Browser team,", "start_char_pos": 199, "end_char_pos": 226}, {"type": "R", "before": "will start", "after": "plans", "start_char_pos": 259, "end_char_pos": 269}, {"type": "R", "before": "charge fee for the usage of", "after": "usage fee for", "start_char_pos": 283, "end_char_pos": 310}, {"type": "R", "before": "It", "after": "Users", "start_char_pos": 361, "end_char_pos": 363}, {"type": "R", "before": "and a fixed fee at at", "after": "with a minimum fixed fee of at", "start_char_pos": 424, "end_char_pos": 445}, {"type": "R", "before": "'t and doesn't want", "after": "not and does not wish", "start_char_pos": 487, "end_char_pos": 506}, {"type": "R", "before": "charge fee. The developers are consdering right now to just show certain progamm-highlights of these mentioned channels . Additionally a", "after": "fee; developers are considering showing certain programme highlights from the channels in question.", "start_char_pos": 519, "end_char_pos": 655}, {"type": "A", "before": null, "after": "A", "start_char_pos": 656, "end_char_pos": 656}], "sents_char_pos": [0, 177, 360, 458, 530, 640]}
+{"doc_id": "89032", "revision_depth": "2", "before_revision": "Kilka tygodni temu pojawi\u0142 si\u0119 w internecie apel zwi\u0105zany z protestem przeciwko dzia\u0142aniom na rzecz zamkni\u0119cia Muzeum Polskiego w Rapperswilu Czytamy w nim m.in: Zaplanowana przez gmin\u0119 grodzk\u0105 Rapperswilu i miasto Jona\u2013Rapperswil budowa nowocze\u00adsnego muzeum miejskiego ( tzw. Bryni Haus )w Rapperswilu zosta\u0142a wstrzymana przez utwo\u00adrzon\u0105 w jesieni grup\u0119 \u201ePro Schloss\u201d. Jak sama nazwa wskazuje, nie tylko przyj\u0119ty przez gmin\u0119 grodzk\u0105 projekt muzeum sta\u0142 si\u0119 przedmiotem krytyki, ale g\u0142\u00f3wnym celem sta\u0142a si\u0119 li\u00adkwidacja Muzeum Polskiego, kt\u00f3re si\u0119 mie\u015bci w rapperswilskim zamku od 140 lat. Anna Buchmann, Dyrektor Muzeum Polskiego w Rapperswilu i autorka apelu, pisze w nim tak\u017ce:%DIFDELCMD < %DIFDELCMD < %%% 250px Do tej chwili, na pro\u015bb\u0119 w\u0142adz miasta Rapperswil\u2013Jona i Gminy Grodzkiej, wstrzymywa\u0142am si\u0119 z bardziej energicznymi dzia\u0142aniami wobec roszcze\u0144 grupy \u201ePro Schloss\u201d. Jednak rozw\u00f3j wydarze\u0144 napawa mnie niepokojem. Uwa\u017cam, \u017ce powinnam mocniej zadekla\u00adrowa\u0107 stanowisko cz\u0142onk\u00f3w Towarzystwa Przyjaci\u00f3\u0142 Muzeum Polskiego i naszych sprzymie\u00adrze\u0144c\u00f3w w tej sprawie . Sytuacja nie zdaje si\u0119 by\u0107 stracon\u0105, niemniej uwa\u017cam, \u017ce wierni dotychczasowym dokona\u00adniom poprzednich pokole\u0144 Polak\u00f3w powinni\u015bmy mocno stan\u0105\u0107 w obronie naszych interes\u00f3w. Jest rzecz\u0105 przykr\u0105, \u017ce po wielu latach wzorcowej wsp\u00f3\u0142pracy z w\u0142adzami miasta przychodzi nam broni\u0107 tak wa\u017cnego dla naszej to\u017csamo\u015bci miejsca.%DIFDELCMD < %DIFDELCMD < %%% Nie byli\u015bmy na zamku na prawach go\u015bcia, kt\u00f3rego mo\u017cna si\u0119 bez problemu pozby\u0107, gdy\u017c na\u00adsza 140 \u2013letnia historia obecno\u015bci w Rapperswilu by\u0142a sowicie op\u0142acona polskimi pieni\u0119dzmi i prac\u0105. Autorka apelu zaznacza jednak,\u017ce \u017ce w\u0142a\u015bciciel zamku - Gmina Grodzka Rapperswilu, z kt\u00f3r\u0105 Towarzystwo Przyjaci\u00f3\u0142 Muzeum Polskiego ma umow\u0119 na wynajem sal muzealnych - jak i rada miejska miasta Rapperswil-Jona nie popieraj\u0105 stara\u0144 grupy \u201e Pro Schloss\u201d.%DIFDELCMD < %DIFDELCMD < %%% Redakcja Wikinews zdecydowa\u0142a si\u0119 przeprowadzi\u0107 rozmow\u0119 z dyrektor Ann\u0105 Buchmann, odnosz\u0105c si\u0119 w pytaniach si\u0119 do specyfiki tego problemu . Anna Buchmann: W Muzeum Polskim znajduje si\u0119 wiele cennych kolekcji. Do nich zaliczamy zbi\u00f3r miniatur W. Lesseura, nadwornego malarza kr\u00f3la A. Poniatowskiego. S\u0105 one wykonane na ko\u015bci s\u0142oniowej. Malarstwo polskie reprezentuj\u0105 obrazy przedstawicieli szko\u0142y monachijskiej: A. Wierusza-Kowalskiego, J. Brandta, M. Wywi\u00f3rskiego.Poza tym obrazy O. Bozna\u0144skiej, T. Axentowicza, J. Che\u0142mi\u0144skiego, J. Chelmo\u0144skiego, M. Tr\u0119bacza, J. Falata, Z. Stryje\u0144skiej, J. Czapskiego i wielu innych innych. Zbiory muzealne uzupe\u0142niaj\u0105 kolekcje map dawnej Polski i rycin. Wielu Polak\u00f3w, szczeg\u00f3lnie zamieszka\u0142ych za granica, odwiedza muzeum. Poza tym coraz cz\u0119\u015bciej przyje\u017cd\u017caj\u0105 zorganizowane grupy wycieczkowe. Trzeba pami\u0119ta\u0107, ze przez okres PRL-u muzeum to by\u0142o zupe\u0142nie przemilczane, st\u0105d wiele os\u00f3b nie wie, \u017ce takie muzeum istnieje. Rocznie oko\u0142o 2000 Polak\u00f3w odwiedza muzeum. Rapperswil jest jedyny w swoim rodzaju. Jest to instytucja tworzona i prowadzona przez Polak\u00f3w, ale jednak otwarta przede wszystkim dla cudzoziemc\u00f3w. Ze wzgl\u0119du na po\u0142o\u017cenie przyci\u0105ga turyst\u00f3w z ca\u0142ego \u015bwiata . Muzeum Polskie jest dobrze znane Szwajcarom. By\u0142o tworzone przy ich wsp\u00f3\u0142udziale, mieszka\u0144cy Rapperswilu s\u0105 nim mocno zwi\u0105zani. Grupa niewielu os\u00f3b, g\u0142\u00f3wnie spoza miasta, nie stanowi wi\u0119kszo\u015bci. Jednak trzeba o muzeum bardzo dba\u0107, go popularyzowa\u0107. Odchodzi starsze pokolenie, kt\u00f3re pami\u0119ta okres wojny i komunizmu w Polsce. Dla m\u0142odszego pokolenia, mniej wra\u017cliwego na histori\u0119 muzeum ma mo\u017ce mniejsze znaczenie. S\u0105 dwie petycje- jedna w muzeum, tu zbieramy w\u015br\u00f3d go\u015bci, kt\u00f3rzy nas odwiedzaj\u0105. W ci\u0105gu p\u00f3\u0142tora miesi\u0105ca podpisa\u0142o petycje 1125 os\u00f3b z 31 kraj\u00f3w. Pod drug\u0105 petycj\u0105 prowadzon\u0105 na stronie internetowej ( www-rapperswil-castle.com) podpisa\u0142o si\u0119 ju\u017c blisko 7000 os\u00f3b . Polacy stanowi\u0105 jedn\u0105 z najmniejszych grup narodowo\u015bciowych w Szwajcarii. Jednocze\u015bnie kraj ten ma liczne polonika, opr\u00f3cz naszego muzeum znajduje si\u0119 tez Muzeum T.Ko\u015bciuszki, I.J. Paderewskiego. Szwajcaria by\u0142a krajem edukacji dla Polak\u00f3w, inspiracji dla artyst\u00f3w. Polacy wiele wnie\u015bli nie tylko do kultury duchowej Szwajcarii, ale te\u017c do jej kultury materialnej. Stosunek Szwajcar\u00f3w do Polak\u00f3w mo\u017cna okre\u015bli\u0107 jako \u017cyczliwy. Muzeum jest instytucj\u0105 niezale\u017cn\u0105. Kierowane przez Towarzystwo Przyjaci\u00f3\u0142 Muzeum Polskiego i finansowane przez powo\u0142an\u0105 przez niego fundacj\u0119 Libertas musi samo dba\u0107 o finanse. Od trzech lat otrzymuje ono merytoryczne wsparcie od Ministerstwa Kultury i Dziedzictwa Narodowego. Wsp\u00f3\u0142finansowane s\u0105 konferencje naukowe, prace archiwalne, inwentarzowe. Obecnie, planowana modernizacja wystawy sta\u0142ej otrzymana du\u017ce wsparcie ministerstwa. Przedstawiciele ministerstwa uczestniczyli rozmowach z w\u0142adzami miasta i gminy grodzkiej, wskazuj\u0105c na ch\u0119\u0107 pomocy i znaczenie muzeum dla Polski.%DIFDELCMD < %DIFDELCMD < %%% Kolumna Barska nazywana jest przez Szwajcar\u00f3w Kolumna Polsk\u0105. Szwajcarzy bardzo ceni\u0105 sobie wolno\u015b\u0107 \u2013 od wielu lat umieli ja tez sobie zapewni\u0107. Idea wolno\u015bci stanowi jedna z filar\u00f3w to\u017csamo\u015bci Szwajcar\u00f3w. W muzeum nie mo\u017cna fotografowa\u0107 obiekt\u00f3w lampa b\u0142yskow\u0105. Sprawa digitalizacji zbior\u00f3w b\u0119dzie teraz dopiero regulowana. Jest to bardzo trudny problem, kt\u00f3ry wi\u0105\u017ce si\u0119 z bezpiecze\u0144stwem obiekt\u00f3w.%DIFDELCMD < %DIFDELCMD < %%% M\u00f3j stosunek do popularyzacji sztuki przez Internet jest bardzo liberalny. Internet jest doskona\u0142ym \u017ar\u00f3d\u0142em informacji, o wiele skuteczniejszym i szybszym ni\u017c pozosta\u0142e metody. Uwa\u017cam, ze Internet b\u0119dzie coraz bardziej wypiera\u0142 telewizje i zbiory polskie powinny by\u0107 prezentowane w Internecie. Debata czerwcowa nie da wyra\u017anej odpowiedzi. Jest tylko wst\u0119pem do prowadzonych rozm\u00f3w, kt\u00f3re b\u0119d\u0105 si\u0119 toczy\u0107 jesieni\u0105. Z pewno\u015bci\u0105 b\u0119dziemy musieli walczy\u0107 o warunki pozostania na zamku, o profil muzeum, metody prezentacji.%DIFDELCMD < %DIFDELCMD < %%% Nie przewidujemy takiego scenariusza. Towarzystwo ma z gmin\u0105 podpisany kontrakt do roku 2011. Je\u015bli rzeczywi\u015bcie zaistnia\u0142aby gro\u017aba likwidacji muzeum, b\u0119dziemy jeszcze mie\u0107 trzy lata, by zastanowi\u0107 si\u0119 co pocz\u0105\u0107 ze zbiorami. Zapewne trzeba b\u0119dzie zawrze\u0107 kompromis. Pytanie pozostanie, na ile b\u0119dziemy mogli z naszych praw zrezygnowa\u0107 lub w optymistycznym wariancie, ile b\u0119dziemy mogli skorzysta\u0107. Gdy\u017c na tym polega kompromis, \u017ce obie strony s\u0105 zadowolone z wynik\u00f3w rozm\u00f3w i podj\u0119tych decyzji.%DIFDELCMD < %DIFDELCMD < %%% Szwajcarskie media reagowa\u0142y bardzo \u017cywo. W Neue Z\u00fcrcher Zeitung ukaza\u0142 si\u0119 artyku\u0142 pozytywny dla naszego muzeum. Podobnie w innych gazetach. Jedynymi artyku\u0142ami negatywnymi o muzeum by\u0142y artyku\u0142y w Obersee Nachrichten. Jest to gazeta nale\u017c\u0105ca do naszego oponenta. 24 czerwca 2008r w Du\u017cej Sali Rycerskiej (Grosse Rittersaal) na zamku w Rapperswilu o godz. 18 :00 rozpocznie si\u0119 \"Dyskusja otwarta\" na temat przysz\u0142o\u015bci Muzeum Polskiego. \u0179r\u00f3d\u0142a%DIFDELCMD < %DIFDELCMD < %%% Materia\u0142 nades\u0142any na adres Stowarzyszenia Wikimedia Po", "after_revision": "80px|left Custom-created logo for the purpose of the auction %DIFDELCMD < %DIFDELCMD < %%% On Thursday, January 3, a special Allegro.pl auction for the benefit of the Great Orchestra of Christmas Charity featured items donated by Stowarzyszenie Wikimedia Polska, the local polish chapter of the Wikimedia Foundation. Among the items were ten DVD's containing the Polish language edition of Wikipedia. Most of the offers in the online auction came from people who actually helped to create the contents of the DVD . %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% One of the discs reached the \"Featured Items\" status on the same day when the item was offered for sale. Each of the ten DVDs has been autographed by a number of Wikipedians, mainly those who helped in creating the edition, together with Helion Publishing House. The release contains 238,000 articles whose quality had been checked by a panel of editors, complete with illustrations. It is the first stable version of the Polish-language Wikipedia . The decision to offer the ten copies at the auction was taken in September 2007. Since then, the covers of the auction items have been circulating throughout Poland, in order to collect as many Wikimedians' signatures as possible during a number of Wikimedia events. All of the autographs are nicknames that the editors use in their daily work. Among them is e.g. the signature of the founder of Polish Wikipedia. Krzysztof Jasiutowicz, nicknamed Kpjas. Among the people who placed an offer to buy one of the ten copies in the initial 24 hours of the auction were the Polish Wikipedians known as Zureks, Jersz, Pimke, Vindicator, Rdrozd, Paterm, Bartekbas, Airwolf, Mathel, Nemo5576, Wyksztalcioch, Wpedzich and Kotasik. The cover of the Polish edition of Wikipedia DVD, published by Helion Earlier, Stowarzyszenie Wikimedia Polska, a local chapter of The Wikimedia Foundation, decided together with Helion for those DVDs which have not been sold yet to be donated to various communities that would find them useful, mainly schools. Although currently Wikipedia contains about twice as many articles as the DVD version and it is freely available online, the income from the auction will add to the budget of a much older organisation, which is one of Poland's charity NGOs . Stowarzyszenie Wikimedia Polska will prepare a special website for those people who offer the highest bids for the ten Wikipedia DVD copies, where they will be able to put their photos (together with the discs they have acquired), if they wish . %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% The auctions will end on the day of the Grand Final\u00e9 of the Great Orchestra of Christmas Charity, January 13th, at 20 :00 %DIFDELCMD < %DIFDELCMD < %%% CET.", "edit_actions": [{"type": "R", "before": "Kilka tygodni temu pojawi\u0142 si\u0119 w internecie apel zwi\u0105zany z protestem przeciwko dzia\u0142aniom na rzecz zamkni\u0119cia Muzeum Polskiego w Rapperswilu Czytamy w nim m.in:", "after": "80px|left Custom-created logo for the purpose of the auction", "start_char_pos": 0, "end_char_pos": 161}, {"type": "D", "before": "Zaplanowana przez gmin\u0119 grodzk\u0105 Rapperswilu i miasto Jona\u2013Rapperswil budowa nowocze\u00adsnego muzeum miejskiego ( tzw. Bryni Haus )w Rapperswilu zosta\u0142a wstrzymana przez utwo\u00adrzon\u0105 w jesieni grup\u0119 \u201ePro Schloss\u201d. Jak sama nazwa wskazuje, nie tylko przyj\u0119ty przez gmin\u0119 grodzk\u0105 projekt muzeum sta\u0142 si\u0119 przedmiotem krytyki, ale g\u0142\u00f3wnym celem sta\u0142a si\u0119 li\u00adkwidacja Muzeum Polskiego, kt\u00f3re si\u0119 mie\u015bci w rapperswilskim zamku od 140 lat.", "after": null, "start_char_pos": 162, "end_char_pos": 588}, {"type": "D", "before": "Anna Buchmann, Dyrektor Muzeum Polskiego w Rapperswilu i autorka apelu, pisze w nim tak\u017ce:", "after": null, "start_char_pos": 589, "end_char_pos": 679}, {"type": "R", "before": "250px Do tej chwili, na pro\u015bb\u0119 w\u0142adz miasta Rapperswil\u2013Jona i Gminy Grodzkiej, wstrzymywa\u0142am si\u0119 z bardziej energicznymi dzia\u0142aniami wobec roszcze\u0144 grupy \u201ePro Schloss\u201d. Jednak rozw\u00f3j wydarze\u0144 napawa mnie niepokojem. Uwa\u017cam, \u017ce powinnam mocniej zadekla\u00adrowa\u0107 stanowisko cz\u0142onk\u00f3w Towarzystwa Przyjaci\u00f3\u0142 Muzeum Polskiego i naszych sprzymie\u00adrze\u0144c\u00f3w w tej sprawie", "after": "On Thursday, January 3, a special Allegro.pl auction for the benefit of the Great Orchestra of Christmas Charity featured items donated by Stowarzyszenie Wikimedia Polska, the local polish chapter of the Wikimedia Foundation. Among the items were ten DVD's containing the Polish language edition of Wikipedia. Most of the offers in the online auction came from people who actually helped to create the contents of the DVD", "start_char_pos": 709, "end_char_pos": 1067}, {"type": "D", "before": "Sytuacja nie zdaje si\u0119 by\u0107 stracon\u0105, niemniej uwa\u017cam, \u017ce wierni dotychczasowym dokona\u00adniom poprzednich pokole\u0144 Polak\u00f3w powinni\u015bmy mocno stan\u0105\u0107 w obronie naszych interes\u00f3w.", "after": null, "start_char_pos": 1070, "end_char_pos": 1241}, {"type": "D", "before": "Jest rzecz\u0105 przykr\u0105, \u017ce po wielu latach wzorcowej wsp\u00f3\u0142pracy z w\u0142adzami miasta przychodzi nam broni\u0107 tak wa\u017cnego dla naszej to\u017csamo\u015bci miejsca.", "after": null, "start_char_pos": 1242, "end_char_pos": 1385}, {"type": "D", "before": "Nie byli\u015bmy na zamku na prawach go\u015bcia, kt\u00f3rego mo\u017cna si\u0119 bez problemu pozby\u0107, gdy\u017c na\u00adsza 140 \u2013letnia historia obecno\u015bci w Rapperswilu by\u0142a sowicie op\u0142acona polskimi pieni\u0119dzmi i prac\u0105.", "after": null, "start_char_pos": 1415, "end_char_pos": 1601}, {"type": "D", "before": "Autorka apelu zaznacza jednak,\u017ce \u017ce w\u0142a\u015bciciel zamku - Gmina Grodzka Rapperswilu, z kt\u00f3r\u0105 Towarzystwo Przyjaci\u00f3\u0142 Muzeum Polskiego ma umow\u0119 na wynajem sal muzealnych - jak i rada miejska miasta Rapperswil-Jona nie popieraj\u0105 stara\u0144 grupy \u201e Pro Schloss\u201d.", "after": null, "start_char_pos": 1602, "end_char_pos": 1853}, {"type": "R", "before": "Redakcja Wikinews zdecydowa\u0142a si\u0119 przeprowadzi\u0107 rozmow\u0119 z dyrektor Ann\u0105 Buchmann, odnosz\u0105c si\u0119 w pytaniach si\u0119 do specyfiki tego problemu", "after": "One of the discs reached the \"Featured Items\" status on the same day when the item was offered for sale. Each of the ten DVDs has been autographed by a number of Wikipedians, mainly those who helped in creating the edition, together with Helion Publishing House. The release contains 238,000 articles whose quality had been checked by a panel of editors, complete with illustrations. It is the first stable version of the Polish-language Wikipedia", "start_char_pos": 1883, "end_char_pos": 2020}, {"type": "R", "before": "Anna Buchmann: W Muzeum Polskim znajduje si\u0119 wiele cennych kolekcji. Do nich zaliczamy zbi\u00f3r miniatur W. Lesseura, nadwornego malarza kr\u00f3la A. Poniatowskiego. S\u0105 one wykonane na ko\u015bci s\u0142oniowej. Malarstwo polskie reprezentuj\u0105 obrazy przedstawicieli szko\u0142y monachijskiej: A. Wierusza-Kowalskiego, J. Brandta, M. Wywi\u00f3rskiego.Poza tym obrazy O. Bozna\u0144skiej, T. Axentowicza, J. Che\u0142mi\u0144skiego, J. Chelmo\u0144skiego, M. Tr\u0119bacza, J. Falata, Z. Stryje\u0144skiej, J. Czapskiego i wielu innych innych. Zbiory muzealne uzupe\u0142niaj\u0105 kolekcje map dawnej Polski i rycin.", "after": "The decision to offer the ten copies at the auction was taken in September 2007. Since then, the covers of the auction items have been circulating throughout Poland, in order to collect as many Wikimedians' signatures as possible during a number of Wikimedia events. All of the autographs are nicknames that the editors use in their daily work. Among them is e.g. the signature of the founder of Polish Wikipedia. Krzysztof Jasiutowicz, nicknamed Kpjas.", "start_char_pos": 2023, "end_char_pos": 2572}, {"type": "D", "before": "Wielu Polak\u00f3w, szczeg\u00f3lnie zamieszka\u0142ych za granica, odwiedza muzeum. Poza tym coraz cz\u0119\u015bciej przyje\u017cd\u017caj\u0105 zorganizowane grupy wycieczkowe. Trzeba pami\u0119ta\u0107, ze przez okres PRL-u muzeum to by\u0142o zupe\u0142nie przemilczane, st\u0105d wiele os\u00f3b nie wie, \u017ce takie muzeum istnieje. Rocznie oko\u0142o 2000 Polak\u00f3w odwiedza muzeum.", "after": null, "start_char_pos": 2573, "end_char_pos": 2883}, {"type": "R", "before": "Rapperswil jest jedyny w swoim rodzaju. Jest to instytucja tworzona i prowadzona przez Polak\u00f3w, ale jednak otwarta przede wszystkim dla cudzoziemc\u00f3w. Ze wzgl\u0119du na po\u0142o\u017cenie przyci\u0105ga turyst\u00f3w z ca\u0142ego \u015bwiata", "after": "Among the people who placed an offer to buy one of the ten copies in the initial 24 hours of the auction were the Polish Wikipedians known as Zureks, Jersz, Pimke, Vindicator, Rdrozd, Paterm, Bartekbas, Airwolf, Mathel, Nemo5576, Wyksztalcioch, Wpedzich and Kotasik. The cover of the Polish edition of Wikipedia DVD, published by Helion Earlier, Stowarzyszenie Wikimedia Polska, a local chapter of The Wikimedia Foundation, decided together with Helion for those DVDs which have not been sold yet to be donated to various communities that would find them useful, mainly schools. Although currently Wikipedia contains about twice as many articles as the DVD version and it is freely available online, the income from the auction will add to the budget of a much older organisation, which is one of Poland's charity NGOs", "start_char_pos": 2884, "end_char_pos": 3092}, {"type": "D", "before": "Muzeum Polskie jest dobrze znane Szwajcarom. By\u0142o tworzone przy ich wsp\u00f3\u0142udziale, mieszka\u0144cy Rapperswilu s\u0105 nim mocno zwi\u0105zani. Grupa niewielu os\u00f3b, g\u0142\u00f3wnie spoza miasta, nie stanowi wi\u0119kszo\u015bci. Jednak trzeba o muzeum bardzo dba\u0107, go popularyzowa\u0107. Odchodzi starsze pokolenie, kt\u00f3re pami\u0119ta okres wojny i komunizmu w Polsce. Dla m\u0142odszego pokolenia, mniej wra\u017cliwego na histori\u0119 muzeum ma mo\u017ce mniejsze znaczenie.", "after": null, "start_char_pos": 3095, "end_char_pos": 3508}, {"type": "R", "before": "S\u0105 dwie petycje- jedna w muzeum, tu zbieramy w\u015br\u00f3d go\u015bci, kt\u00f3rzy nas odwiedzaj\u0105. W ci\u0105gu p\u00f3\u0142tora miesi\u0105ca podpisa\u0142o petycje 1125 os\u00f3b z 31 kraj\u00f3w. Pod drug\u0105 petycj\u0105 prowadzon\u0105 na stronie internetowej ( www-rapperswil-castle.com) podpisa\u0142o si\u0119 ju\u017c blisko 7000 os\u00f3b", "after": "Stowarzyszenie Wikimedia Polska will prepare a special website for those people who offer the highest bids for the ten Wikipedia DVD copies, where they will be able to put their photos (together with the discs they have acquired), if they wish", "start_char_pos": 3509, "end_char_pos": 3772}, {"type": "D", "before": "Polacy stanowi\u0105 jedn\u0105 z najmniejszych grup narodowo\u015bciowych w Szwajcarii. Jednocze\u015bnie kraj ten ma liczne polonika, opr\u00f3cz naszego muzeum znajduje si\u0119 tez Muzeum T.Ko\u015bciuszki, I.J. Paderewskiego. Szwajcaria by\u0142a krajem edukacji dla Polak\u00f3w, inspiracji dla artyst\u00f3w. Polacy wiele wnie\u015bli nie tylko do kultury duchowej Szwajcarii, ale te\u017c do jej kultury materialnej. Stosunek Szwajcar\u00f3w do Polak\u00f3w mo\u017cna okre\u015bli\u0107 jako \u017cyczliwy.", "after": null, "start_char_pos": 3775, "end_char_pos": 4200}, {"type": "D", "before": "Muzeum jest instytucj\u0105 niezale\u017cn\u0105. Kierowane przez Towarzystwo Przyjaci\u00f3\u0142 Muzeum Polskiego i finansowane przez powo\u0142an\u0105 przez niego fundacj\u0119 Libertas musi samo dba\u0107 o finanse. Od trzech lat otrzymuje ono merytoryczne wsparcie od Ministerstwa Kultury i Dziedzictwa Narodowego. Wsp\u00f3\u0142finansowane s\u0105 konferencje naukowe, prace archiwalne, inwentarzowe. Obecnie, planowana modernizacja wystawy sta\u0142ej otrzymana du\u017ce wsparcie ministerstwa. Przedstawiciele ministerstwa uczestniczyli rozmowach z w\u0142adzami miasta i gminy grodzkiej, wskazuj\u0105c na ch\u0119\u0107 pomocy i znaczenie muzeum dla Polski.", "after": null, "start_char_pos": 4201, "end_char_pos": 4780}, {"type": "D", "before": "Kolumna Barska nazywana jest przez Szwajcar\u00f3w Kolumna Polsk\u0105. Szwajcarzy bardzo ceni\u0105 sobie wolno\u015b\u0107 \u2013 od wielu lat umieli ja tez sobie zapewni\u0107. Idea wolno\u015bci stanowi jedna z filar\u00f3w to\u017csamo\u015bci Szwajcar\u00f3w.", "after": null, "start_char_pos": 4810, "end_char_pos": 5015}, {"type": "D", "before": "W muzeum nie mo\u017cna fotografowa\u0107 obiekt\u00f3w lampa b\u0142yskow\u0105. Sprawa digitalizacji zbior\u00f3w b\u0119dzie teraz dopiero regulowana. Jest to bardzo trudny problem, kt\u00f3ry wi\u0105\u017ce si\u0119 z bezpiecze\u0144stwem obiekt\u00f3w.", "after": null, "start_char_pos": 5016, "end_char_pos": 5209}, {"type": "D", "before": "M\u00f3j stosunek do popularyzacji sztuki przez Internet jest bardzo liberalny. Internet jest doskona\u0142ym \u017ar\u00f3d\u0142em informacji, o wiele skuteczniejszym i szybszym ni\u017c pozosta\u0142e metody. Uwa\u017cam, ze Internet b\u0119dzie coraz bardziej wypiera\u0142 telewizje i zbiory polskie powinny by\u0107 prezentowane w Internecie.", "after": null, "start_char_pos": 5239, "end_char_pos": 5532}, {"type": "D", "before": "Debata czerwcowa nie da wyra\u017anej odpowiedzi. Jest tylko wst\u0119pem do prowadzonych rozm\u00f3w, kt\u00f3re b\u0119d\u0105 si\u0119 toczy\u0107 jesieni\u0105. Z pewno\u015bci\u0105 b\u0119dziemy musieli walczy\u0107 o warunki pozostania na zamku, o profil muzeum, metody prezentacji.", "after": null, "start_char_pos": 5533, "end_char_pos": 5757}, {"type": "D", "before": "Nie przewidujemy takiego scenariusza. Towarzystwo ma z gmin\u0105 podpisany kontrakt do roku 2011. Je\u015bli rzeczywi\u015bcie zaistnia\u0142aby gro\u017aba likwidacji muzeum, b\u0119dziemy jeszcze mie\u0107 trzy lata, by zastanowi\u0107 si\u0119 co pocz\u0105\u0107 ze zbiorami.", "after": null, "start_char_pos": 5787, "end_char_pos": 6012}, {"type": "D", "before": "Zapewne trzeba b\u0119dzie zawrze\u0107 kompromis. Pytanie pozostanie, na ile b\u0119dziemy mogli z naszych praw zrezygnowa\u0107 lub w optymistycznym wariancie, ile b\u0119dziemy mogli skorzysta\u0107. Gdy\u017c na tym polega kompromis, \u017ce obie strony s\u0105 zadowolone z wynik\u00f3w rozm\u00f3w i podj\u0119tych decyzji.", "after": null, "start_char_pos": 6013, "end_char_pos": 6282}, {"type": "D", "before": "Szwajcarskie media reagowa\u0142y bardzo \u017cywo. W Neue Z\u00fcrcher Zeitung ukaza\u0142 si\u0119 artyku\u0142 pozytywny dla naszego muzeum. Podobnie w innych gazetach. Jedynymi artyku\u0142ami negatywnymi o muzeum by\u0142y artyku\u0142y w Obersee Nachrichten. Jest to gazeta nale\u017c\u0105ca do naszego oponenta.", "after": null, "start_char_pos": 6312, "end_char_pos": 6576}, {"type": "R", "before": "24 czerwca 2008r w Du\u017cej Sali Rycerskiej (Grosse Rittersaal) na zamku w Rapperswilu o godz. 18", "after": "The auctions will end on the day of the Grand Final\u00e9 of the Great Orchestra of Christmas Charity, January 13th, at 20", "start_char_pos": 6577, "end_char_pos": 6671}, {"type": "D", "before": "rozpocznie si\u0119 \"Dyskusja otwarta\" na temat przysz\u0142o\u015bci Muzeum Polskiego.", "after": null, "start_char_pos": 6676, "end_char_pos": 6748}, {"type": "D", "before": "\u0179r\u00f3d\u0142a", "after": null, "start_char_pos": 6749, "end_char_pos": 6755}, {"type": "R", "before": "Materia\u0142 nades\u0142any na adres Stowarzyszenia Wikimedia Po", "after": "CET.", "start_char_pos": 6785, "end_char_pos": 6840}], "sents_char_pos": [0, 276, 369, 588, 877, 924, 1069, 1241, 1385, 1601, 1853, 2022, 2091, 2181, 2217, 2296, 2347, 2508, 2572, 2642, 2712, 2839, 2883, 2923, 3033, 3094, 3139, 3222, 3289, 3343, 3419, 3508, 3589, 3655, 3848, 3970, 4040, 4139, 4200, 4235, 4376, 4476, 4549, 4634, 4780, 4871, 4954, 5015, 5072, 5134, 5209, 5313, 5415, 5532, 5577, 5652, 5757, 5824, 5880, 6012, 6053, 6185, 6282, 6353, 6425, 6453, 6531, 6576, 6668, 6748]}
+{"doc_id": "89034", "revision_depth": "1", "before_revision": " Wielu Polak\u00f3w, szczeg\u00f3lnie zamieszka\u0142ych za granica, odwiedza muzeum. Poza tym coraz cz\u0119\u015bciej przyje\u017cd\u017caj\u0105 zorganizowane grupy wycieczkowe. Trzeba pami\u0119ta\u0107, ze przez okres PRL-u muzeum to by\u0142o zupe\u0142nie przemilczane, st\u0105d wiele os\u00f3b nie wie, \u017ce takie muzeum istnieje. Rocznie oko\u0142o 2000 Polak\u00f3w odwiedza muzeum. Rapperswil jest jedyny w swoim rodzaju. Jest to instytucja tworzona i prowadzona przez Polak\u00f3w, ale jednak otwarta przede wszystkim dla cudzoziemc\u00f3w. Ze wzgl\u0119du na po\u0142o\u017cenie przyci\u0105ga turyst\u00f3w z ca\u0142ego \u015bwiata. Muzeum Polskie jest dobrze znane Szwajcarom. By\u0142o tworzone przy ich wsp\u00f3\u0142udziale, mieszka\u0144cy Rapperswilu s\u0105 nim mocno zwi\u0105zani. Grupa niewielu os\u00f3b, g\u0142\u00f3wnie spoza miasta, nie stanowi wi\u0119kszo\u015bci. Jednak trzeba o muzeum bardzo dba\u0107, go popularyzowa\u0107. Odchodzi starsze pokolenie, kt\u00f3re pami\u0119ta okres wojny i komunizmu w Polsce. Dla m\u0142odszego pokolenia, mniej wra\u017cliwego na histori\u0119 muzeum ma mo\u017ce mniejsze znaczenie. S\u0105 dwie petycje- jedna w muzeum, tu zbieramy w\u015br\u00f3d go\u015bci, kt\u00f3rzy nas odwiedzaj\u0105. W ci\u0105gu p\u00f3\u0142tora miesi\u0105ca podpisa\u0142o petycje 1125 os\u00f3b z 31 kraj\u00f3w. Pod drug\u0105 petycj\u0105 prowadzon\u0105 na stronie internetowej ( www-rapperswil-castle.com) podpisa\u0142o si\u0119 ju\u017c blisko 7000 os\u00f3b. Polacy stanowi\u0105 jedn\u0105 z najmniejszych grup narodowo\u015bciowych w Szwajcarii. Jednocze\u015bnie kraj ten ma liczne polonika, opr\u00f3cz naszego muzeum znajduje si\u0119 tez Muzeum T.Ko\u015bciuszki, I.J. Paderewskiego. Szwajcaria by\u0142a krajem edukacji dla Polak\u00f3w, inspiracji dla artyst\u00f3w. Polacy wiele wnie\u015bli nie tylko do kultury duchowej Szwajcarii, ale te\u017c do jej kultury materialnej. Stosunek Szwajcar\u00f3w do Polak\u00f3w mo\u017cna okre\u015bli\u0107 jako \u017cyczliwy. Muzeum jest instytucj\u0105 niezale\u017cn\u0105. Kierowane przez Towarzystwo Przyjaci\u00f3\u0142 Muzeum Polskiego i finansowane przez powo\u0142an\u0105 przez niego fundacj\u0119 Libertas musi samo dba\u0107 o finanse. Od trzech lat otrzymuje ono merytoryczne wsparcie od Ministerstwa Kultury i Dziedzictwa Narodowego. Wsp\u00f3\u0142finansowane s\u0105 konferencje naukowe, prace archiwalne, inwentarzowe. Obecnie, planowana modernizacja wystawy sta\u0142ej otrzymana du\u017ce wsparcie ministerstwa. Przedstawiciele ministerstwa uczestniczyli rozmowach z w\u0142adzami miasta i gminy grodzkiej, wskazuj\u0105c na ch\u0119\u0107 pomocy i znaczenie muzeum dla Polski. Kolumna Barska nazywana jest przez Szwajcar\u00f3w Kolumna Polsk\u0105. Szwajcarzy bardzo ceni\u0105 sobie wolno\u015b\u0107 \u2013 od wielu lat umieli ja tez sobie zapewni\u0107. Idea wolno\u015bci stanowi jedna z filar\u00f3w to\u017csamo\u015bci Szwajcar\u00f3w. W muzeum nie mo\u017cna fotografowa\u0107 obiekt\u00f3w lampa b\u0142yskow\u0105. Sprawa digitalizacji zbior\u00f3w b\u0119dzie teraz dopiero regulowana. Jest to bardzo trudny problem, kt\u00f3ry wi\u0105\u017ce si\u0119 z bezpiecze\u0144stwem obiekt\u00f3w. M\u00f3j stosunek do popularyzacji sztuki przez Internet jest bardzo liberalny. Internet jest doskona\u0142ym \u017ar\u00f3d\u0142em informacji, o wiele skuteczniejszym i szybszym ni\u017c pozosta\u0142e metody. Uwa\u017cam, ze Internet b\u0119dzie coraz bardziej wypiera\u0142 telewizje i zbiory polskie powinny by\u0107 prezentowane w Internecie. Debata czerwcowa nie da wyra\u017anej odpowiedzi. Jest tylko wst\u0119pem do prowadzonych rozm\u00f3w, kt\u00f3re b\u0119d\u0105 si\u0119 toczy\u0107 jesieni\u0105. Z pewno\u015bci\u0105 b\u0119dziemy musieli walczy\u0107 o warunki pozostania na zamku, o profil muzeum, metody prezentacji. Nie przewidujemy takiego scenariusza. Towarzystwo ma z gmin\u0105 podpisany kontrakt do roku 2011. Je\u015bli rzeczywi\u015bcie zaistnia\u0142aby gro\u017aba likwidacji muzeum, b\u0119dziemy jeszcze mie\u0107 trzy lata, by zastanowi\u0107 si\u0119 co pocz\u0105\u0107 ze zbiorami. Zapewne trzeba b\u0119dzie zawrze\u0107 kompromis. Pytanie pozostanie, na ile b\u0119dziemy mogli z naszych praw zrezygnowa\u0107 lub w optymistycznym wariancie, ile b\u0119dziemy mogli skorzysta\u0107. Gdy\u017c na tym polega kompromis, \u017ce obie strony s\u0105 zadowolone z wynik\u00f3w rozm\u00f3w i podj\u0119tych decyzji. Szwajcarskie media reagowa\u0142y bardzo \u017cywo. W Neue Z\u00fcrcher Zeitung ukaza\u0142 si\u0119 artyku\u0142 pozytywny dla naszego muzeum. Podobnie w innych gazetach. Jedynymi artyku\u0142ami negatywnymi o muzeum by\u0142y artyku\u0142y w Obersee Nachrichten. Jest to gazeta nale\u017c\u0105ca do naszego oponenta. ", "after_revision": "Jak bardzo jest ono popularne dla Polonii i Polak\u00f3w odwiedzaj\u0105cych Szwajcari\u0119? Ilu z nich szacunkowo odwiedza to muzeum? Wielu Polak\u00f3w, szczeg\u00f3lnie zamieszka\u0142ych za granica, odwiedza muzeum. Poza tym coraz cz\u0119\u015bciej przyje\u017cd\u017caj\u0105 zorganizowane grupy wycieczkowe. Trzeba pami\u0119ta\u0107, ze przez okres PRL-u muzeum to by\u0142o zupe\u0142nie przemilczane, st\u0105d wiele os\u00f3b nie wie, \u017ce takie muzeum istnieje. Rocznie oko\u0142o 2000 Polak\u00f3w odwiedza muzeum. Adres strony internetowej \"muzeum-polskie.org\" sugeruje, ze jest to plac\u00f3wka szczeg\u00f3lna. Czy tego typu muze\u00f3w promuj\u0105cych kultur\u0119 polsk\u0105 poza granicami kraju jest du\u017co? Rapperswil jest jedyny w swoim rodzaju. Jest to instytucja tworzona i prowadzona przez Polak\u00f3w, ale jednak otwarta przede wszystkim dla cudzoziemc\u00f3w. Ze wzgl\u0119du na po\u0142o\u017cenie przyci\u0105ga turyst\u00f3w z ca\u0142ego \u015bwiata. Od kilku tygodni trwa wystosowany przez Pa\u0144stwa apel o podpisywanie petycji zwi\u0105zanej z protestem przeciwko zamkni\u0119ciu muzeum. Muzeum znajduje si\u0119 w zamku w centralnej cz\u0119\u015bci miasta, kt\u00f3ry cz\u0119\u015b\u0107 mieszka\u0144c\u00f3w chcia\u0142aby zagospodarowa\u0107 w inny spos\u00f3b. Jaki jest w og\u00f3le stosunek Szwajcar\u00f3w, a szczeg\u00f3lnie mieszka\u0144c\u00f3w Rapperswil wobec tego muzeum i polskiej kultury? Ponad stuletnia jej obecno\u015b\u0107 w tym mie\u015bcie sugeruje, \u017ce s\u0105 z ni\u0105 dobrze zapoznani. Muzeum Polskie jest dobrze znane Szwajcarom. By\u0142o tworzone przy ich wsp\u00f3\u0142udziale, mieszka\u0144cy Rapperswilu s\u0105 nim mocno zwi\u0105zani. Grupa niewielu os\u00f3b, g\u0142\u00f3wnie spoza miasta, nie stanowi wi\u0119kszo\u015bci. Jednak trzeba o muzeum bardzo dba\u0107, go popularyzowa\u0107. Odchodzi starsze pokolenie, kt\u00f3re pami\u0119ta okres wojny i komunizmu w Polsce. Dla m\u0142odszego pokolenia, mniej wra\u017cliwego na histori\u0119 muzeum ma mo\u017ce mniejsze znaczenie. Ile os\u00f3b do tej pory podpisa\u0142o petycj\u0119? S\u0105 dwie petycje- jedna w muzeum, tu zbieramy w\u015br\u00f3d go\u015bci, kt\u00f3rzy nas odwiedzaj\u0105. W ci\u0105gu p\u00f3\u0142tora miesi\u0105ca podpisa\u0142o petycje 1125 os\u00f3b z 31 kraj\u00f3w. Pod drug\u0105 petycj\u0105 prowadzon\u0105 na stronie internetowej ( www-rapperswil-castle.com) podpisa\u0142o si\u0119 ju\u017c blisko 7000 os\u00f3b. Szwajcarzy, a przynajmniej Pa\u0144stwo szwajcarskie wydaje si\u0119 by\u0107 nieco zamkni\u0119te na obcokrajowc\u00f3w. Czy relacje mi\u0119dzy Szwajcarami i Polakami mo\u017cna by okre\u015bli\u0107 jako ciep\u0142e czy te\u017c raczej ch\u0142odne? Jak traktowana jest Polonia w tym kraju? Polacy stanowi\u0105 jedn\u0105 z najmniejszych grup narodowo\u015bciowych w Szwajcarii. Jednocze\u015bnie kraj ten ma liczne polonika, opr\u00f3cz naszego muzeum znajduje si\u0119 tez Muzeum T.Ko\u015bciuszki, I.J. Paderewskiego. Szwajcaria by\u0142a krajem edukacji dla Polak\u00f3w, inspiracji dla artyst\u00f3w. Polacy wiele wnie\u015bli nie tylko do kultury duchowej Szwajcarii, ale te\u017c do jej kultury materialnej. Stosunek Szwajcar\u00f3w do Polak\u00f3w mo\u017cna okre\u015bli\u0107 jako \u017cyczliwy. Samo muzeum wspierane jest przez za\u0142o\u017con\u0105 w 1978 roku Polsk\u0105 Fundacj\u0119 Kulturaln\u0105 \"Libertas\" w Rapperswilu. Czy jeste\u015bcie te\u017c Pa\u0144stwo zwi\u0105zani z instytucjami znajduj\u0105cymi si\u0119 w Polsce? Czy Pa\u0144stwa apel i w og\u00f3le dzia\u0142alno\u015b\u0107 jest wspierana instytucjonalnie z terenu Polski? Muzeum jest instytucj\u0105 niezale\u017cn\u0105. Kierowane przez Towarzystwo Przyjaci\u00f3\u0142 Muzeum Polskiego i finansowane przez powo\u0142an\u0105 przez niego fundacj\u0119 Libertas musi samo dba\u0107 o finanse. Od trzech lat otrzymuje ono merytoryczne wsparcie od Ministerstwa Kultury i Dziedzictwa Narodowego. Wsp\u00f3\u0142finansowane s\u0105 konferencje naukowe, prace archiwalne, inwentarzowe. Obecnie, planowana modernizacja wystawy sta\u0142ej otrzymana du\u017ce wsparcie ministerstwa. Przedstawiciele ministerstwa uczestniczyli rozmowach z w\u0142adzami miasta i gminy grodzkiej, wskazuj\u0105c na ch\u0119\u0107 pomocy i znaczenie muzeum dla Polski. \"Polskiej Kolumnie Wolno\u015bci\": \"MAGNA RES LIBERTAS\" - WOLNO\u015a\u0106 TO WIELKA RZECZ. Te has\u0142o wyryte jest na zamku. Jak odczytywane jest ono dzisiaj przez odwiedzaj\u0105cych i mieszka\u0144c\u00f3w? Kolumna Barska nazywana jest przez Szwajcar\u00f3w Kolumna Polsk\u0105. Szwajcarzy bardzo ceni\u0105 sobie wolno\u015b\u0107 \u2013 od wielu lat umieli ja tez sobie zapewni\u0107. Idea wolno\u015bci stanowi jedna z filar\u00f3w to\u017csamo\u015bci Szwajcar\u00f3w. Od kilku miesi\u0119cy internauci zwi\u0105zani z Wikipedi\u0105, a tak\u017ce ze skupiaj\u0105cym historyk\u00f3w portalem histmag.org staraj\u0105 si\u0119 o mo\u017cliwo\u015b\u0107 swobodnego fotografowania zbior\u00f3w w niekt\u00f3rych polskich muzeach, kt\u00f3re w swoich regulaminach nie zezwalaj\u0105 na digitalizacj\u0119 zbior\u00f3w osobom z zewn\u0105trz. Czy w Pa\u0144stwa muzeum mo\u017cna dokonywa\u0107 dokumentacji zbior\u00f3w, a w szczeg\u00f3lno\u015bci tych, do kt\u00f3rych wygas\u0142y prawa autorskie, przy uwzgl\u0119dnieniu kwestii bezpiecze\u0144stwa (bez lamp b\u0142yskowych, bez fotografowania urz\u0105dze\u0144 alarmowych itp.)? W muzeum nie mo\u017cna fotografowa\u0107 obiekt\u00f3w lampa b\u0142yskow\u0105. Sprawa digitalizacji zbior\u00f3w b\u0119dzie teraz dopiero regulowana. Jest to bardzo trudny problem, kt\u00f3ry wi\u0105\u017ce si\u0119 z bezpiecze\u0144stwem obiekt\u00f3w. Jaki og\u00f3lnie jest Pa\u0144stwa stosunek wobec szerokiego propagowania polskiej kultury poprzez internet? M\u00f3j stosunek do popularyzacji sztuki przez Internet jest bardzo liberalny. Internet jest doskona\u0142ym \u017ar\u00f3d\u0142em informacji, o wiele skuteczniejszym i szybszym ni\u017c pozosta\u0142e metody. Uwa\u017cam, ze Internet b\u0119dzie coraz bardziej wypiera\u0142 telewizje i zbiory polskie powinny by\u0107 prezentowane w Internecie. Zak\u0142adaj\u0105c, \u017ce maj\u0105ca si\u0119 odby\u0107 pod koniec czerwca debata, co do przysz\u0142o\u015bci muzeum zako\u0144czy si\u0119 dla Pa\u0144stwa pomy\u015blnie, czy rezultatem tej dyskusji mo\u017ce by\u0107 umowa zak\u0142adaj\u0105ca kolejne d\u0142ugoterminowe wydzier\u017cawienie zamku? Bior\u0105c pod uwag\u0119 specyfik\u0119 relacji obywatele-instytucje w Szwajcarii za\u0142o\u017cy\u0107 mo\u017cna, \u017ce po jakim\u015b czasie ten scenariusz si\u0119 powt\u00f3rzy. Czy jest mo\u017cliwe inne, bardziej korzystne dla muzeum rozwi\u0105zanie? Debata czerwcowa nie da wyra\u017anej odpowiedzi. Jest tylko wst\u0119pem do prowadzonych rozm\u00f3w, kt\u00f3re b\u0119d\u0105 si\u0119 toczy\u0107 jesieni\u0105. Z pewno\u015bci\u0105 b\u0119dziemy musieli walczy\u0107 o warunki pozostania na zamku, o profil muzeum, metody prezentacji. Przy za\u0142o\u017ceniu, \u017ce jednak debata nie zako\u0144czy si\u0119 sukcesem, czy zbiory b\u0119d\u0105 mog\u0142y by\u0107 zabezpieczone? Czy macie pa\u0144stwo zagwarantowane na taki wypadek wyj\u015bcie awaryjne? Nie przewidujemy takiego scenariusza. Towarzystwo ma z gmin\u0105 podpisany kontrakt do roku 2011. Je\u015bli rzeczywi\u015bcie zaistnia\u0142aby gro\u017aba likwidacji muzeum, b\u0119dziemy jeszcze mie\u0107 trzy lata, by zastanowi\u0107 si\u0119 co pocz\u0105\u0107 ze zbiorami. Skoro obywatele, a przynajmniej jaka\u015b cz\u0119\u015b\u0107 obywateli miasta domaga si\u0119 zagospodarowania zamku w inny spos\u00f3b, mo\u017cna przyj\u0105\u0107, \u017ce podczas negocjacji trzeba b\u0119dzie szuka\u0107 kompromisu. Czy ze wzgl\u0119du na specyfik\u0119 plac\u00f3wki, jej historyczny kontekst, tego typu rozwi\u0105zanie jest do pomy\u015blenia? Zapewne trzeba b\u0119dzie zawrze\u0107 kompromis. Pytanie pozostanie, na ile b\u0119dziemy mogli z naszych praw zrezygnowa\u0107 lub w optymistycznym wariancie, ile b\u0119dziemy mogli skorzysta\u0107. Gdy\u017c na tym polega kompromis, \u017ce obie strony s\u0105 zadowolone z wynik\u00f3w rozm\u00f3w i podj\u0119tych decyzji. Jak na t\u0119 spraw\u0119 reaguj\u0105 szwajcarskie media? Czy jest ona \u017cywotna, czy jest ona traktowana jako lokalny problem? Szwajcarskie media reagowa\u0142y bardzo \u017cywo. W Neue Z\u00fcrcher Zeitung ukaza\u0142 si\u0119 artyku\u0142 pozytywny dla naszego muzeum. Podobnie w innych gazetach. Jedynymi artyku\u0142ami negatywnymi o muzeum by\u0142y artyku\u0142y w Obersee Nachrichten. Jest to gazeta nale\u017c\u0105ca do naszego oponenta. Dzi\u0119kuj\u0119 za rozmow\u0119", "edit_actions": [{"type": "A", "before": null, "after": "Jak bardzo jest ono popularne dla Polonii i Polak\u00f3w odwiedzaj\u0105cych Szwajcari\u0119? Ilu z nich szacunkowo odwiedza to muzeum?", "start_char_pos": 0, "end_char_pos": 0}, {"type": "A", "before": null, "after": "Adres strony internetowej \"muzeum-polskie.org\" sugeruje, ze jest to plac\u00f3wka szczeg\u00f3lna. Czy tego typu muze\u00f3w promuj\u0105cych kultur\u0119 polsk\u0105 poza granicami kraju jest du\u017co?", "start_char_pos": 312, "end_char_pos": 312}, {"type": "A", "before": null, "after": "Od kilku tygodni trwa wystosowany przez Pa\u0144stwa apel o podpisywanie petycji zwi\u0105zanej z protestem przeciwko zamkni\u0119ciu muzeum. Muzeum znajduje si\u0119 w zamku w centralnej cz\u0119\u015bci miasta, kt\u00f3ry cz\u0119\u015b\u0107 mieszka\u0144c\u00f3w chcia\u0142aby zagospodarowa\u0107 w inny spos\u00f3b. Jaki jest w og\u00f3le stosunek Szwajcar\u00f3w, a szczeg\u00f3lnie mieszka\u0144c\u00f3w Rapperswil wobec tego muzeum i polskiej kultury? Ponad stuletnia jej obecno\u015b\u0107 w tym mie\u015bcie sugeruje, \u017ce s\u0105 z ni\u0105 dobrze zapoznani.", "start_char_pos": 523, "end_char_pos": 523}, {"type": "A", "before": null, "after": "Ile os\u00f3b do tej pory podpisa\u0142o petycj\u0119?", "start_char_pos": 938, "end_char_pos": 938}, {"type": "A", "before": null, "after": "Szwajcarzy, a przynajmniej Pa\u0144stwo szwajcarskie wydaje si\u0119 by\u0107 nieco zamkni\u0119te na obcokrajowc\u00f3w. Czy relacje mi\u0119dzy Szwajcarami i Polakami mo\u017cna by okre\u015bli\u0107 jako ciep\u0142e czy te\u017c raczej ch\u0142odne? Jak traktowana jest Polonia w tym kraju?", "start_char_pos": 1204, "end_char_pos": 1204}, {"type": "A", "before": null, "after": "Samo muzeum wspierane jest przez za\u0142o\u017con\u0105 w 1978 roku Polsk\u0105 Fundacj\u0119 Kulturaln\u0105 \"Libertas\" w Rapperswilu. Czy jeste\u015bcie te\u017c Pa\u0144stwo zwi\u0105zani z instytucjami znajduj\u0105cymi si\u0119 w Polsce? Czy Pa\u0144stwa apel i w og\u00f3le dzia\u0142alno\u015b\u0107 jest wspierana instytucjonalnie z terenu Polski?", "start_char_pos": 1631, "end_char_pos": 1631}, {"type": "A", "before": null, "after": "\"Polskiej Kolumnie Wolno\u015bci\": \"MAGNA RES LIBERTAS\" - WOLNO\u015a\u0106 TO WIELKA RZECZ. Te has\u0142o wyryte jest na zamku. Jak odczytywane jest ono dzisiaj przez odwiedzaj\u0105cych i mieszka\u0144c\u00f3w?", "start_char_pos": 2212, "end_char_pos": 2212}, {"type": "A", "before": null, "after": "Od kilku miesi\u0119cy internauci zwi\u0105zani z Wikipedi\u0105, a tak\u017ce ze skupiaj\u0105cym historyk\u00f3w portalem histmag.org staraj\u0105 si\u0119 o mo\u017cliwo\u015b\u0107 swobodnego fotografowania zbior\u00f3w w niekt\u00f3rych polskich muzeach, kt\u00f3re w swoich regulaminach nie zezwalaj\u0105 na digitalizacj\u0119 zbior\u00f3w osobom z zewn\u0105trz. Czy w Pa\u0144stwa muzeum mo\u017cna dokonywa\u0107 dokumentacji zbior\u00f3w, a w szczeg\u00f3lno\u015bci tych, do kt\u00f3rych wygas\u0142y prawa autorskie, przy uwzgl\u0119dnieniu kwestii bezpiecze\u0144stwa (bez lamp b\u0142yskowych, bez fotografowania urz\u0105dze\u0144 alarmowych itp.)?", "start_char_pos": 2419, "end_char_pos": 2419}, {"type": "A", "before": null, "after": "Jaki og\u00f3lnie jest Pa\u0144stwa stosunek wobec szerokiego propagowania polskiej kultury poprzez internet?", "start_char_pos": 2614, "end_char_pos": 2614}, {"type": "A", "before": null, "after": "Zak\u0142adaj\u0105c, \u017ce maj\u0105ca si\u0119 odby\u0107 pod koniec czerwca debata, co do przysz\u0142o\u015bci muzeum zako\u0144czy si\u0119 dla Pa\u0144stwa pomy\u015blnie, czy rezultatem tej dyskusji mo\u017ce by\u0107 umowa zak\u0142adaj\u0105ca kolejne d\u0142ugoterminowe wydzier\u017cawienie zamku? Bior\u0105c pod uwag\u0119 specyfik\u0119 relacji obywatele-instytucje w Szwajcarii za\u0142o\u017cy\u0107 mo\u017cna, \u017ce po jakim\u015b czasie ten scenariusz si\u0119 powt\u00f3rzy. Czy jest mo\u017cliwe inne, bardziej korzystne dla muzeum rozwi\u0105zanie?", "start_char_pos": 2909, "end_char_pos": 2909}, {"type": "A", "before": null, "after": "Przy za\u0142o\u017ceniu, \u017ce jednak debata nie zako\u0144czy si\u0119 sukcesem, czy zbiory b\u0119d\u0105 mog\u0142y by\u0107 zabezpieczone? Czy macie pa\u0144stwo zagwarantowane na taki wypadek wyj\u015bcie awaryjne?", "start_char_pos": 3135, "end_char_pos": 3135}, {"type": "A", "before": null, "after": "Skoro obywatele, a przynajmniej jaka\u015b cz\u0119\u015b\u0107 obywateli miasta domaga si\u0119 zagospodarowania zamku w inny spos\u00f3b, mo\u017cna przyj\u0105\u0107, \u017ce podczas negocjacji trzeba b\u0119dzie szuka\u0107 kompromisu. Czy ze wzgl\u0119du na specyfik\u0119 plac\u00f3wki, jej historyczny kontekst, tego typu rozwi\u0105zanie jest do pomy\u015blenia?", "start_char_pos": 3362, "end_char_pos": 3362}, {"type": "A", "before": null, "after": "Jak na t\u0119 spraw\u0119 reaguj\u0105 szwajcarskie media? Czy jest ona \u017cywotna, czy jest ona traktowana jako lokalny problem?", "start_char_pos": 3633, "end_char_pos": 3633}, {"type": "A", "before": null, "after": "Dzi\u0119kuj\u0119 za rozmow\u0119", "start_char_pos": 3899, "end_char_pos": 3899}], "sents_char_pos": [0, 70, 140, 267, 311, 352, 462, 522, 568, 651, 718, 772, 848, 937, 1019, 1085, 1203, 1278, 1400, 1470, 1569, 1630, 1666, 1807, 1907, 1980, 2065, 2211, 2274, 2357, 2418, 2476, 2538, 2613, 2689, 2791, 2908, 2954, 3029, 3134, 3173, 3229, 3361, 3403, 3535, 3632, 3675, 3747, 3775, 3853]}
+{"doc_id": "9445", "revision_depth": "1", "before_revision": "Unofficial report places al-Libbi in Mardan , about 30 miles north of Peshawar , at the time of his capture. Pakistan Information Minister Sheikh Rashid Ahmed announced Wednesday the capture of Abu Faraj al-Libbi, and five other suspected al-Qaeda militants, after a gun battle in Waziristan on Monday. Abu Faraj al-Libbi was wanted in connection with two attempts to assassinate Pakistan's President, Pervez Musharraf , one on December 25, 2004. Security officials said the Libyan born al-Libbi was thought to be a top general for al-Qaeda leader Osama bin Laden and acted as an operational commander in Pakistan. Ahmed told AP, \u201cThis arrest gives us a lot of tips, and I can only say that our security agencies are on the right track.\u201d Ahmed, who called the capture \"a very important day for us\", said they are receiving more and more tips and are on the right track towards the eventual capture of bin Laden. Pakistan has put more pressure on its northwest region with a months-long build-up there. The region is believed by many to be where al-Qaeda members are holding out after they were pushed from Afghanistan . U.S. President George Bush said of the capture: \"I applaud the Pakistani government for its strong co\u00f6peration in the war on terror.\" Musharraf has been a key ally in the US-led war on terrorism, and because of that also an Islamic militant target. A BBC security correspondent said this is the biggest arrest since that of Khalid Sheikh Mohammed , the alleged mastermind of the 2003 9/11 attack. The United States is not the only country which lays claim to al-Libbi. He is wanted by Libya , where he has been sentenced to death (and whence he escaped in the 1980s), for assassination attempts on Colonel Qaddafi . He is also wanted by Afghanistan.", "after_revision": "Unofficial report places al-Libbi in , about 30 miles north of , at the time of his capture. Information Minister announced Wednesday the capture of Abu Faraj al-Libbi, and five other suspected militants, after a gun battle in on Monday. Abu Faraj al-Libbi was wanted in connection with two attempts to assassinate Pakistan's President, , one on December 25, 2004. Security officials said the born al-Libbi was thought to be a top general for al-Qaeda leader and acted as an operational commander in Pakistan. Ahmed told AP, \u201cThis arrest gives us a lot of tips, and I can only say that our security agencies are on the right track.\u201d Ahmed, who called the capture \"a very important day for us\", said they are receiving more and more tips and are on the right track towards the eventual capture of bin Laden. Pakistan has put more pressure on its northwest region with a months-long build-up there. The region is believed by many to be where al-Qaeda members are holding out after they were pushed from . said of the capture: \"I applaud the Pakistani government for its strong co\u00f6peration in the war on terror.\" Musharraf has been a key ally in the US-led war on terrorism, and because of that also an militant target. A BBC security correspondent said this is the biggest arrest since that of , the alleged mastermind of the 2003 attack. The United States is not the only country which lays claim to al-Libbi. He is wanted by , where he has been sentenced to death (and whence he escaped in the 1980s), for assassination attempts on . He is also wanted by Afghanistan.", "edit_actions": [{"type": "D", "before": "Mardan", "after": null, "start_char_pos": 37, "end_char_pos": 43}, {"type": "D", "before": "Peshawar", "after": null, "start_char_pos": 70, "end_char_pos": 78}, {"type": "R", "before": "Pakistan Information Minister Sheikh Rashid Ahmed", "after": "Information Minister", "start_char_pos": 109, "end_char_pos": 158}, {"type": "D", "before": "al-Qaeda", "after": null, "start_char_pos": 239, "end_char_pos": 247}, {"type": "D", "before": "Waziristan", "after": null, "start_char_pos": 281, "end_char_pos": 291}, {"type": "D", "before": "Pervez Musharraf", "after": null, "start_char_pos": 402, "end_char_pos": 418}, {"type": "D", "before": "Libyan", "after": null, "start_char_pos": 475, "end_char_pos": 481}, {"type": "D", "before": "Osama bin Laden", "after": null, "start_char_pos": 548, "end_char_pos": 563}, {"type": "D", "before": "Afghanistan", "after": null, "start_char_pos": 1106, "end_char_pos": 1117}, {"type": "D", "before": "U.S. President George Bush", "after": null, "start_char_pos": 1120, "end_char_pos": 1146}, {"type": "D", "before": "Islamic", "after": null, "start_char_pos": 1344, "end_char_pos": 1351}, {"type": "D", "before": "Khalid Sheikh Mohammed", "after": null, "start_char_pos": 1444, "end_char_pos": 1466}, {"type": "D", "before": "9/11", "after": null, "start_char_pos": 1504, "end_char_pos": 1508}, {"type": "D", "before": "Libya", "after": null, "start_char_pos": 1605, "end_char_pos": 1610}, {"type": "D", "before": "Colonel Qaddafi", "after": null, "start_char_pos": 1718, "end_char_pos": 1733}], "sents_char_pos": [0, 108, 302, 446, 614, 737, 911, 1001, 1253, 1368, 1516, 1588, 1735]}
+{"doc_id": "9668", "revision_depth": "1", "before_revision": "According to American and foreign officials, White House and Pentagon officials are closely monitoring spy satellite imagery of North Korea, also known as the Democratic People's Republic of Korea (DPRK). Preparations seem to be made for testing a nuclear weapon, including the construction of a reviewing stand, most likely for scientists or North Korean officials. It would be the first test of a nuclear weapon by North Korea. United States officials warned that the intentions of North Korean leader Kim Jong Il are unknown, and the constructions may turn out to be a show. The extent of North Korea's nuclear capabilities are still unknown. According to the U.S. government agency CIA, North Korea may have one or two primitive nuclear bombs. According to the head of the International Atomic Energy Agency ( IAEA), Mohamed ElBaradei , North Korea may possess the material and equipment to manufacture up to six nuclear warheads. North Korea's neighbours, however, have been thorougly briefed on the implications of a nuclear weapons test by North Korea. North Korea is among the 188 countries to have signed the Nuclear Non-Proliferation Treaty , although they have later withdrawn again. This treaty states that only the United States, Russia, the People's Republic of China, France, and the United Kingdom are allowed to have nuclear weapons. Kim Duk Hong, one of the regime's most senior defectors, says that North Korea resumed the development of its nuclear weapon program as soon as the treaty was signed. Kim also stated that North Korea gained much of its expertise from Pakistan, and that only the death of Kim Jong Il and the destruction of his regime will stop North Korea\u2019s nuclear weapons program. In October 2002, U.S. sources stated that during a visit by Assistant Secretary of State James Kelly , North Korea admitted to running a clandestine nuclear weapons program. This was widely seen as a violation of both the Nuclear Non-Proliferation Treaty and the 1994 U.S.-North Korea nuclear pact , which were signed during the Clinton administration. North Korean officials stated that the reactivation of their weapon of mass destruction program was in response to \"imperialist threats\" (presumably by the United States ). The United States proceeded to stop shipments of fuel oil under the Agreed Framework . In late December 2002 North Korea drove United Nations weapons inspectors out of the country, announcing plans to reactivate a dormant nuclear fuel processing laboratory and power plant north of Pyongyang, if the United States did not agree to a non invasion pact. This nuclear reactor is thought by U.S. officials to be the source for plutonium for two previously produced atomic bombs.", "after_revision": "According to American and foreign officials, White House and Pentagon officials are closely monitoring of North Korea, also known as the Democratic People's Republic of Korea (DPRK). Preparations seem to be made for testing a nuclear weapon, including the construction of a reviewing stand, most likely for scientists or North Korean officials. It would be the first test of a nuclear weapon by North Korea. United States officials warned that the intentions of North Korean leader Kim Jong Il are unknown, and the constructions may turn out to be a show. The extent of North Korea's nuclear capabilities are still unknown. According to the U.S. government agency CIA, North Korea may have one or two primitive nuclear bombs. According to the head of the International Atomic Energy Agency ( ) , , North Korea may possess the material and equipment to manufacture up to six nuclear warheads. North Korea's neighbours, however, have been thorougly briefed on the implications of a nuclear weapons test by North Korea. North Korea is among the 188 countries to have signed the , although they have later withdrawn again. This treaty states that only the United States, Russia, the People's Republic of China, France, and the United Kingdom are allowed to have nuclear weapons. Kim Duk Hong, one of the regime's most senior defectors, says that North Korea resumed the development of its nuclear weapon program as soon as the treaty was signed. Kim also stated that North Korea gained much of its expertise from Pakistan, and that only the death of Kim Jong Il and the destruction of his regime will stop North Korea\u2019s nuclear weapons program. In October 2002, U.S. sources stated that during a visit by Assistant Secretary of State , North Korea admitted to running a clandestine nuclear weapons program. This was widely seen as a violation of both the and the 1994 , which were signed during the administration. North Korean officials stated that the reactivation of their weapon of mass destruction program was in response to \"imperialist threats\" (presumably by the ). The United States proceeded to stop shipments of fuel oil under the . In late December 2002 North Korea drove weapons inspectors out of the country, announcing plans to reactivate a dormant nuclear fuel processing laboratory and power plant north of Pyongyang, if the United States did not agree to a non invasion pact. This nuclear reactor is thought by U.S. officials to be the source for for two previously produced atomic bombs.", "edit_actions": [{"type": "D", "before": "spy satellite imagery", "after": null, "start_char_pos": 103, "end_char_pos": 124}, {"type": "R", "before": "IAEA), Mohamed ElBaradei", "after": ")", "start_char_pos": 814, "end_char_pos": 838}, {"type": "A", "before": null, "after": ",", "start_char_pos": 841, "end_char_pos": 841}, {"type": "D", "before": "Nuclear Non-Proliferation Treaty", "after": null, "start_char_pos": 1119, "end_char_pos": 1151}, {"type": "D", "before": "James Kelly", "after": null, "start_char_pos": 1807, "end_char_pos": 1818}, {"type": "D", "before": "Nuclear Non-Proliferation Treaty", "after": null, "start_char_pos": 1940, "end_char_pos": 1972}, {"type": "D", "before": "U.S.-North Korea nuclear pact", "after": null, "start_char_pos": 1986, "end_char_pos": 2015}, {"type": "D", "before": "Clinton", "after": null, "start_char_pos": 2047, "end_char_pos": 2054}, {"type": "D", "before": "United States", "after": null, "start_char_pos": 2227, "end_char_pos": 2240}, {"type": "D", "before": "Agreed Framework", "after": null, "start_char_pos": 2312, "end_char_pos": 2328}, {"type": "D", "before": "United Nations", "after": null, "start_char_pos": 2371, "end_char_pos": 2385}, {"type": "D", "before": "plutonium", "after": null, "start_char_pos": 2667, "end_char_pos": 2676}], "sents_char_pos": [0, 204, 366, 429, 577, 645, 747, 935, 1060, 1195, 1351, 1518, 1717, 1891, 2070, 2243, 2330, 2595]}
+{"doc_id": "99675", "revision_depth": "1", "before_revision": "250px|Laura Bush, First Lady of the United States, upon arrival in Benin, with Chantal de Souza Yayi, First Lady of Benin. 250px|Yayi and Bush previously met at the White House in December 2006. U.S. President George W. Bush, accompanied by his wife Laura , began his five-nation trip to Africa today in Benin, where he met with President Yayi Boni and participated in a joint press conference. This is Bush's second visit to Africa and the first time any US president has visited Benin. Topics that were discussed included malaria, cotton , and the crises in Kenya and Darfur. At the press conference, held at Cadjehoun International Airport in Cotonou , Yayi thanked Bush for coming to visit and praised him for his \"great concern for Africa, its well being, and of the development of its people.\" Bush then commended the government of Benin for their \"fight against corruption\" and \"firm commitment to the investment in its people\". \"Your fight against corruption is visible and easy for the people to see,\" Bush said. \"This is such a good lesson ... because leaders around the world have got to understand that the United States wants to partner with leaders and the people, but we're not going to do so with people that steal money, pure and simple.\" Benin is one of the recipients of the Millennium Challenge Account , which aims to foster economic growth in countries that are deemed to have effective governments and economic freedom. On the topic of malaria, Bush mentioned the Malaria Initiative, which intends to provide a mosquito net for every child to prevent the spread of the disease. He also mentioned initiatives to facilitate the spread of HIV and AIDS . \"We can save lives with an aggressive, comprehensive strategy,\" Bush said. \"And that's exactly what you're putting in place here in Benin.\" The economy was also an important issue. President Yayi said he and President Bush discussed diversifying Benin's economy away from its dependence on cotton. \"He shared his vision with us, and he is encouraging us to diversify the sources of solutions to the problem that we have today, namely the cotton industry.\" Yayi says it is hard competing with cotton markets in Asia and the United States. Bush said the World Trade Organization is willing to help Benin's economy, but he also suggested exporting more cotton-based products in addition to raw cotton. When asked about the situation in Kenya, Bush said he has sent Secretary of State Condoleezza Rice to visit the country on Monday to support former UN Secretary General Kofi Annan in mediating the conflict. \"Kenya is an issue ... and that's why I'm sending Secretary Rice there to help the Kofi Annan initiative - all aimed at having a clear message that there be no violence and that there ought to be a power-sharing agreement,\" said Bush. White House national security adviser Stephen Hadley said Rice's visit will only last a few hours. \"It's basically to go in, give some impetus, but then step out and let Kofi Annan continue his diplomacy,\" he said. At a press briefing aboard Air Force One , one reporter questioned what could be accomplished in a few hours and asked why the President didn't go to Kenya instead. Ambassador Jendayi Frazer answered with, \"Secretary Rice's engagement on Kenya has been much longer than a few hours. She has been talking to President Kibaki and Raila Odinga before the election, right on the eve of the announcement, immediately after that. And so she's been very much engaged over the last three or four months on dealing with electoral crisis.\"", "after_revision": "250px|Laura Bush, First Lady of the United States, upon arrival in Benin, with Chantal de Souza Yayi, First Lady of Benin. 250px|Yayi and Bush previously met at the White House in December 2006. U.S. President George W. Bush, accompanied by his wife , began his five-nation trip to Africa today in Benin, where he met with President and participated in a joint press conference. This is Bush's second visit to Africa and the first time any US president has visited Benin. Topics that were discussed included , , and the crises in Kenya and Darfur. At the press conference, held at Cadjehoun International Airport in , Yayi thanked Bush for coming to visit and praised him for his \"great concern for Africa, its well being, and of the development of its people.\" Bush then commended the government of Benin for their \"fight against corruption\" and \"firm commitment to the investment in its people\". \"Your fight against corruption is visible and easy for the people to see,\" Bush said. \"This is such a good lesson ... because leaders around the world have got to understand that the United States wants to partner with leaders and the people, but we're not going to do so with people that steal money, pure and simple.\" Benin is one of the recipients of the , which aims to foster economic growth in countries that are deemed to have effective governments and economic freedom. On the topic of malaria, Bush mentioned the Malaria Initiative, which intends to provide a for every child to prevent the spread of the disease. He also mentioned initiatives to facilitate the spread of and . \"We can save lives with an aggressive, comprehensive strategy,\" Bush said. \"And that's exactly what you're putting in place here in Benin.\" The economy was also an important issue. President Yayi said he and President Bush discussed diversifying Benin's economy away from its dependence on cotton. \"He shared his vision with us, and he is encouraging us to diversify the sources of solutions to the problem that we have today, namely the cotton industry.\" Yayi says it is hard competing with cotton markets in Asia and the United States. Bush said the is willing to help Benin's economy, but he also suggested exporting more cotton-based products in addition to raw cotton. When asked about the situation in Kenya, Bush said he has sent Secretary of State to visit the country on Monday to support former UN Secretary General in mediating the conflict. \"Kenya is an issue ... and that's why I'm sending Secretary Rice there to help the Kofi Annan initiative - all aimed at having a clear message that there be no violence and that there ought to be a power-sharing agreement,\" said Bush. White House national security adviser Stephen Hadley said Rice's visit will only last a few hours. \"It's basically to go in, give some impetus, but then step out and let Kofi Annan continue his diplomacy,\" he said. At a press briefing aboard , one reporter questioned what could be accomplished in a few hours and asked why the President didn't go to Kenya instead. Ambassador Jendayi Frazer answered with, \"Secretary Rice's engagement on Kenya has been much longer than a few hours. She has been talking to President Kibaki and before the election, right on the eve of the announcement, immediately after that. And so she's been very much engaged over the last three or four months on dealing with electoral crisis.\"", "edit_actions": [{"type": "D", "before": "Laura", "after": null, "start_char_pos": 250, "end_char_pos": 255}, {"type": "D", "before": "Yayi Boni", "after": null, "start_char_pos": 339, "end_char_pos": 348}, {"type": "D", "before": "malaria, cotton", "after": null, "start_char_pos": 524, "end_char_pos": 539}, {"type": "A", "before": null, "after": ",", "start_char_pos": 542, "end_char_pos": 542}, {"type": "D", "before": "Cotonou", "after": null, "start_char_pos": 647, "end_char_pos": 654}, {"type": "D", "before": "Millennium Challenge Account", "after": null, "start_char_pos": 1295, "end_char_pos": 1323}, {"type": "D", "before": "mosquito net", "after": null, "start_char_pos": 1535, "end_char_pos": 1547}, {"type": "R", "before": "HIV and AIDS", "after": "and", "start_char_pos": 1660, "end_char_pos": 1672}, {"type": "D", "before": "World Trade Organization", "after": null, "start_char_pos": 2227, "end_char_pos": 2251}, {"type": "D", "before": "Condoleezza Rice", "after": null, "start_char_pos": 2456, "end_char_pos": 2472}, {"type": "D", "before": "Kofi Annan", "after": null, "start_char_pos": 2543, "end_char_pos": 2553}, {"type": "D", "before": "Air Force One", "after": null, "start_char_pos": 3058, "end_char_pos": 3071}, {"type": "D", "before": "Raila Odinga", "after": null, "start_char_pos": 3359, "end_char_pos": 3371}], "sents_char_pos": [0, 122, 394, 487, 578, 800, 936, 1022, 1256, 1443, 1601, 1749, 1814, 1855, 1972, 2130, 2212, 2373, 2580, 2815, 2914, 3030, 3195, 3313, 3454]}
+{"doc_id": "999", "revision_depth": "1", "before_revision": "On Wednesday North Korea's official media dropped Kim Jong Il's honourific title \"Dear leader\", reported Japan's Radiopress. It was only days after the Russian news agency Itar-Tass reported that portraits of Kim Jong Il have recently been removed from public display in North Korea. According to Radiopress, a Japanese news agency that monitors North Korea's radio broadcasts, the North's Korean Central Broadcasting Station, as well as the Korean Central News Agency and other North Korean media, have stopped using the term \"Dear leader\" when referring to Kim Jong Il, the country's supreme leader. Now the media in North Korea only use the official titles \"General Secretary of the Workers' Party of Korea \", \" the Chairman of the DPRK National Defense Commission\" and/or \"Supreme Commander of the Korean People's Army \" when referring to Kim. Earlier Itar-Tass also reported that according to an unnamed foreign diplomat in Pyongyang, Kim Jong Il's portraits have recently been taken down from public display secretly and without explanation. However, the portraits of Kim's father, Kim Il Sung , still remain, according to the same report. This report has been confirmed by some expatriates living in the country. This recent development in North Korea has given rise to speculation among analysts, some of whom suspected that these may be a sign that Kim is losing power, or that a power struggle is going on among the top leaders of the totalitarian state. But most observers believe that the portraits were taken down by the order of Kim Jong Il himself, who might be trying to downsize his own personality cult. \"We believe the change was made at his will to soften his image as a leader of a personality cult , although it is hard to determine what his real intentions are,\" said Shinya Kato, the editor of Radiopress. North Korea is one of the few Stalinist states that still exist today, and the political control in the country remains tight. In recent years North Korea underwent several minor reforms that did not appear to significantly improve quality of life. It has also remained largely mysterious and secretive to the outside world, as few foreign correspondents are allowed to visit and stay in the country.", "after_revision": "On Wednesday North Korea's official media dropped Kim Jong Il's honourific title \"Dear leader\", reported Japan's Radiopress. It was only days after the Russian news agency reported that portraits of Kim Jong Il have recently been removed from public display in North Korea. According to Radiopress, a Japanese news agency that monitors North Korea's radio broadcasts, the North's Korean Central Broadcasting Station, as well as the Korean Central News Agency and other North Korean media, have stopped using the term \"Dear leader\" when referring to Kim Jong Il, the country's supreme leader. Now the media in North Korea only use the official titles \"General Secretary of the \", \" the Chairman of the DPRK National Defense Commission\" and/or \"Supreme Commander of the \" when referring to Kim. Earlier Itar-Tass also reported that according to an unnamed foreign diplomat in Pyongyang, Kim Jong Il's portraits have recently been taken down from public display secretly and without explanation. However, the portraits of Kim's father, , still remain, according to the same report. This report has been confirmed by some expatriates living in the country. This recent development in North Korea has given rise to speculation among analysts, some of whom suspected that these may be a sign that Kim is losing power, or that a power struggle is going on among the top leaders of the totalitarian state. But most observers believe that the portraits were taken down by the order of Kim Jong Il himself, who might be trying to downsize his own personality cult. \"We believe the change was made at his will to soften his image as a leader of a , although it is hard to determine what his real intentions are,\" said Shinya Kato, the editor of Radiopress. North Korea is one of the few states that still exist today, and the political control in the country remains tight. In recent years North Korea underwent several minor reforms that did not appear to significantly improve quality of life. It has also remained largely mysterious and secretive to the outside world, as few foreign correspondents are allowed to visit and stay in the country.", "edit_actions": [{"type": "D", "before": "Itar-Tass", "after": null, "start_char_pos": 172, "end_char_pos": 181}, {"type": "D", "before": "Workers' Party of Korea", "after": null, "start_char_pos": 686, "end_char_pos": 709}, {"type": "D", "before": "Korean People's Army", "after": null, "start_char_pos": 802, "end_char_pos": 822}, {"type": "D", "before": "Kim Il Sung", "after": null, "start_char_pos": 1088, "end_char_pos": 1099}, {"type": "D", "before": "personality cult", "after": null, "start_char_pos": 1703, "end_char_pos": 1719}, {"type": "D", "before": "Stalinist", "after": null, "start_char_pos": 1860, "end_char_pos": 1869}], "sents_char_pos": [0, 124, 283, 601, 847, 1047, 1145, 1219, 1464, 1621, 1829, 1956, 2078]}
+{"doc_id": "100406", "revision_depth": "1", "before_revision": "Protection of natural resources The objective of protected areas is to conserve biodiversity and to provide a way for measuring the progress of such conservation. Protected areas will usually encompass several other zones that have been deemed important for particular conservation uses, such as Important Bird Areas (IBA) and Endemic Bird Areas (EBA), Centres of Plant Diversity (CPD), Indigenous and Community Conserved Areas (ICCA), Alliance for Zero Extinction Sites (AZE) and Key Biodiversity Areas (KBA) among others. Likewise, a protected area or an entire network of protected areas may lie within a larger geographic zone that is recognised as a terrestrial or marine ecoregions (see Global 200), or a crisis ecoregions for example. As a result, Protected Areas can encompass a broad range of governance types. A wide variety of rights-holders and stakeholders are involved in the governance and management of protected areas, including forest protected areas, such as government agencies and ministries at various levels, elected and traditional authorities, indigenous peoples and local communities, private individuals and non-profit trusts, among others. Most protected-area and forest management institutions acknowledge the importance of recognizing the rights of indigenous peoples and local communities, sharing the costs and benefits of protected areas and actively involving them in their governance and management. This has led to the recognition of four main types of governance, defined on the basis of who holds authority, responsibility, and who can be held accountable for the key decisions for protected areas. Indeed, governance of protected areas has emerged a critical factor in their success. IUCN Protected Area Management Categories: Category Ia \u2013 Strict nature reserve Category Ib \u2013 Wilderness Area Category II \u2013 National park Category III \u2013 Natural Monument or Feature Category IV \u2013 Habitat/Species Management Area Category V \u2013 Protected Landscape/Seascape Category VI \u2013 Protected Area with sustainable use of natural resources Protected areas are cultural artifacts, and their story is entwined with that of human civilization. Protecting places and resources is by no means a modern concept, whether it be indigenous communities guarding sacred sites or the convention of European hunting reserves. Over 2000 years ago, royal decrees in India protected certain areas. In Europe, rich and powerful people protected hunting grounds for a thousand years. Moreover, the idea of protection of special places is universal: for example, it occurs among the communities in the Pacific (\"tapu\" areas) and in parts of Africa (sacred groves). Since then, it has been an international commitment on behalf of both governments and non-government organisations to maintain the networks that hold regular revisions for the succinct categorisations that have been developed to regulate and record protected areas. In 1972, the Stockholm Declaration of the United Nations Conference on the Human Environment endorsed the protection of representative examples of all major ecosystem types as a fundamental requirement of national conservation programmes. This has become a core principle of conservation biology and has remained so in recent resolutions - including the World Charter for Nature in 1982, the Rio Declaration at the Earth Summit in 1992, and the Johannesburg Declaration 2002. Recently, the importance of protected areas has been brought to the fore at the threat of human-induced global warming and the understanding of the necessity to consume natural resources in a sustainable manner. The spectrum of benefits and values of protected areas is recognised not only ecologically, but culturally through further development in the arena of Indigenous and Community Conserved Areas (ICCAs). International programmes for the protection of representative ecosystems remain relatively progressive (considering the environmental challenges of globalisation with respect to terrestrial environments), with less advances in marine and freshwater biomes. How to manage areas protected for conservation brings up a range of challenges - whether it be regarding the local population, specific ecosystems or the design of the reserve itself - and because of the many unpredicatable elements in ecology issues, each protected area requires a case-specific set of guidelines. Protected areas in many cases are in close cohesion with municipalities and require specific performance management leading both to sustainability from one side and regional development from the other. Administrations of protected areas are more targeted towards the protection of nature and ecosystems while municipalities are responsible for the social and economic development of a particular local community. - Burksiene, V. Dvorak, J. (2020). Performance Management in Protected Areas: Localizing Governance of the Curonian Spit National Park, Lithuania. Public Administration Issues, no 5, pp. 105\u2013124 Scientific publications have identified 3,749 enacted PADDD events in 73 countries since 1892 which have collectively impacted an area approximately the size of Mexico. PADDD is a historical and contemporary phenomenon. 78\\% of PADDD events worldwide were enacted since 2000 and governments in at least 14 countries are currently considering at least 46 PADDD proposals. Proximate causes of PADDD vary widely but most PADDD events globally (62\\%) are related to industrial scale resource extraction and development - infrastructure, industrial agriculture, mining, oil and gas, forestry, fisheries, and industrialization. Protected areas play a large role in protecting important natural ecosystems and providing essential ecosystem services such as carbon storage and flood prevention. Scientists advocate that 50\\% of global land and seas be converted to inter-connected protected areas in order to sustain these benefits. The Asian country Bhutan achieved this high-reaching target by reserving 51.4\\% of the country \u2019 s area as protected areas interconnected through biological corridors. Although these networks are well regulated (local communities are aware of their importance and actively contribute to their maintenance), Bhutan is currently a developing country that is undergoing infrastructure development and resource collection. The country \u2019 s economic progression has brought about human-wildlife conflict and increased pressure on the existence of its protected areas. In light of ongoing disputes on the topic of optimal land usage, Dorji (et al.), in a study using camera traps to detect wildlife activity, summarize the results of a nationwide survey that compares the biodiversity of Bhutan \u2019 s protected areas versus that of intervening non-protected areas. The study indicated that Bhutan \u2019 s protected areas \"are effectively conserving medium and large mammal species, as demonstrated through the significant difference in mammal diversity between protected areas, biological corridors, and non-protected areas with the strongest difference between protected areas and non-protected areas\". Protected areas had the highest levels of mammal biodiversity. This is made possible by the restriction of commercial activity and regulation of consumptive uses (firewood, timber, etc.). The regulation of such practices has allowed Bhutan \u2019 s protected areas to thrive with high carnivore diversity and other rare mammals such as Chinese pangolin, Indian pangolin, mountain weasel (Mustela altaica), small-toothed ferret badger, Asian small clawed otter, the tiger, dhole (Cuon alpinus), Binturong, clouded leopard and Tibetan fox (Vulpes ferrilata). Also found to be prevalent were the large herbivore species: Asiatic water buffalo Bubalus arnee, golden langur, musk deer, and Asian elephant. The maintenance of these charismatic megafauna and other threatened species can be attributed to the intensity of Bhutan \u2019 s management of its protected areas and its local communities\u2019 commitment to preserving them. European Union Natura 2000 is a network of protected areas established by the European Union across all Member States . It is made up of Special Areas of Conservation (SACs) and Special Protection Areas (SPAs) designated respectively under the Habitats Directive and Birds Directive. are designated as terrestrial sites and as marine sites. Overall, 18 percent of the EU land mass is designated. India Protected areas of India include National parks, Wildlife sanctuaries, Biosphere reserves, Reserved and protected forests, Conservation and community reserves, Communal forests, Private protected areas and Conservation areas. Nicaragua O Parks, Wildlife, and Recreation is a Private Protected Area , also known as a 'Private Reserve' predominantly managed for biodiversity conservation, protected without formal government recognition and is owned and stewarded by the O corporation International. O parks plays a particularly important role in conserving critical biodiversity in a section of the Mesoamerican Biological Corridor known as the Paso del Istmo, located along the 12-mile-wide isthmus between Lake Nicaragua and the Pacific Ocean. , according to the United Nations Environment Programme, the United States had a total of 6,770 terrestrial nationally designated (federal) protected areas. These protected areas cover , or 27.08 percent of the land area of the United States. This is also one-tenth of the protected land area of the world. Biodiversity Hotspots Coastal Reserve (Ukraine) Conservation area (United Kingdom) (urban heritage area in the UK) Conservation designation Conservation refugee: a person who has been forced to relocate from a conservation area Centres of Plant Diversity Climate change mitigation#Carbon sinks and removal Exclusion zone Ecotourism Forest Preserve Fossil park Historic district Indigenous and Community Conserved Area IUCN Protected Area Management Categories Last of the Wild List of largest protected areas in the world Listed building Marine Protected Area National heritage site National park Nature reserve Invasive species eradication Park ranger Private protected area Poaching Rural flight Special Area of Conservation (European Union) Sustainable Development Goals The Georgian Group Transboundary protected area Urban heritage park Urbanization World Commission on Protected Areas World Database on Protected Areas World Heritage Site - registered by UNESCO Zakaznik (type of protected area in former Soviet republics) WDPA dataset on Ocean Data Viewer ProtectedPlanet.net Campaign For Nature - campaigns for protecting at least 30\\% of the planet by 2030 DOPA, a Digital Observatory for Protected Areas United Nations Environment Programme World Conservation Monitoring Center, Protected Areas Programme IUCN World Commission on Protected Areas IUCN Global Protected Area Programme 2010 Biodiversity Indicators Partnership Indicator Factsheet: Management Effectiveness of Protected Areas A-Z of Areas of Biodiversity Importance Brazilian Amazon Protected areas - Instituto Socioambiental", "after_revision": "Protection of natural resources The objective of protected areas is to conserve biodiversity and to provide a way for measuring the progress of such conservation. Protected areas will usually encompass several other zones that have been deemed important for particular conservation uses, such as Important Bird Areas (IBA) and Endemic Bird Areas (EBA), Centres of Plant Diversity (CPD), Indigenous and Community Conserved Areas (ICCA), Alliance for Zero Extinction Sites (AZE) and Key Biodiversity Areas (KBA) among others. Likewise, a protected area or an entire network of protected areas may lie within a larger geographic zone that is recognised as a terrestrial or marine ecoregions (see Global 200), or a Crisis Ecoregions for example. As a result, Protected Areas can encompass a broad range of governance types. A wide variety of rights-holders and stakeholders are involved in the governance and management of protected areas, including forest protected areas, such as government agencies and ministries at various levels, elected and traditional authorities, indigenous peoples and local communities, private individuals and non-profit trusts, among others. Most protected-area and forest management institutions acknowledge the importance of recognizing the rights of indigenous peoples and local communities, sharing the costs and benefits of protected areas and actively involving them in their governance and management. This has led to the recognition of four main types of governance, defined on the basis of who holds authority, responsibility, and who can be held accountable for the key decisions for protected areas. Indeed, governance of protected areas has emerged a critical factor in their success. IUCN Protected Area Management Categories: Category Ia \u2013 Strict nature reserve Category Ib \u2013 Wilderness Area Category II \u2013 National park Category III \u2013 Natural monument or Feature Category IV \u2013 Habitat/Species Management Area Category V \u2013 Protected Landscape/Seascape Category VI \u2013 Protected Area with sustainable use of natural resources Protected areas are cultural artifacts, and their story is entwined with that of human civilization. Protecting places and natural resources is by no means a modern concept, whether it be indigenous communities guarding sacred sites or the convention of European hunting reserves. Over 2000 years ago, royal decrees in India protected certain areas. In Europe, rich and powerful people protected hunting grounds for a thousand years. Moreover, the idea of protection of special places is universal: for example, it occurs among the communities in the Pacific (\"tapu\" areas) and in parts of Africa (sacred groves). Since then, it has been an international commitment on behalf of both governments and non-government organisations to maintain the networks that hold regular revisions for the succinct categorisations that have been developed to regulate and record protected areas. In 1972, the Stockholm Declaration of the United Nations Conference on the Human Environment endorsed the protection of representative examples of all major ecosystem types as a fundamental requirement of national conservation programmes. This has become a core principle of conservation biology and has remained so in recent resolutions \u2013 including the World Charter for Nature in 1982, the Rio Declaration at the Earth Summit in 1992, and the Johannesburg Declaration 2002. Recently, the importance of protected areas has been brought to the fore at the threat of human-induced global heating and the understanding of the necessity to consume natural resources in a sustainable manner. The spectrum of benefits and values of protected areas is recognised not only ecologically, but culturally through further development in the arena of Indigenous and Community Conserved Areas (ICCAs). International programmes for the protection of representative ecosystems remain relatively progressive (considering the environmental challenges of globalisation with respect to terrestrial environments), with less advances in marine and freshwater biomes. How to manage areas protected for conservation brings up a range of challenges \u2013 whether it be regarding the local population, specific ecosystems or the design of the reserve itself \u2013 and because of the many unpredicatable elements in ecology issues, each protected area requires a case-specific set of guidelines. Protected areas in many cases are in close cohesion with municipalities and require specific performance management leading both to sustainability from one side and regional development from the other. Administrations of protected areas are more targeted towards the protection of nature and ecosystems while municipalities are responsible for the social and economic development of a particular local community. \u2013 Burksiene, V. Dvorak, J. (2020). Performance Management in Protected Areas: Localizing Governance of the Curonian Spit National Park, Lithuania. Public Administration Issues, no 5, pp. 105\u2013124 Scientific publications have identified 3,749 enacted PADDD events in 73 countries since 1892 which have collectively impacted an area approximately the size of Mexico. PADDD is a historical and contemporary phenomenon. 78\\% of PADDD events worldwide were enacted since 2000 and governments in at least 14 countries are currently considering at least 46 PADDD proposals. Proximate causes of PADDD vary widely but most PADDD events globally (62\\%) are related to industrial scale resource extraction and development \u2013 infrastructure, industrial agriculture, mining, oil and gas, forestry, fisheries, and industrialization. Protected areas play a large role in protecting important natural ecosystems and providing essential ecosystem services such as carbon storage and flood prevention. Scientists advocate that 50\\% of global land and seas be converted to inter-connected protected areas to sustain these benefits. The Asian country Bhutan achieved this high-reaching target by reserving 51.4\\% of the country ' s area as protected areas interconnected through biological corridors. Although these networks are well regulated (local communities are aware of their importance and actively contribute to their maintenance), Bhutan is currently a developing country that is undergoing infrastructure development and resource collection. The country ' s economic progression has brought about human-wildlife conflict and increased pressure on the existence of its protected areas. In light of ongoing disputes on the topic of optimal land usage, Dorji (et al.), in a study using camera traps to detect wildlife activity, summarize the results of a nationwide survey that compares the biodiversity of Bhutan ' s protected areas versus that of intervening non-protected areas. The study indicated that Bhutan ' s protected areas \"are effectively conserving medium and large mammal species, as demonstrated through the significant difference in mammal diversity between protected areas, biological corridors, and non-protected areas with the strongest difference between protected areas and non-protected areas\". Protected areas had the highest levels of mammal biodiversity. This is made possible by the restriction of commercial activity and regulation of consumptive uses (firewood, timber, etc.). The regulation of such practices has allowed Bhutan ' s protected areas to thrive with high carnivore diversity and other rare mammals such as Chinese pangolin, Indian pangolin, mountain weasel (Mustela altaica), small-toothed ferret badger, Asian small clawed otter, the tiger, dhole (Cuon alpinus), Binturong, clouded leopard and Tibetan fox (Vulpes ferrilata). Also found to be prevalent were the large herbivore species: Asiatic water buffalo Bubalus arnee, golden langur, musk deer, and Asian elephant. The maintenance of these charismatic megafauna and other threatened species can be attributed to the intensity of Bhutan ' s management of its protected areas and its local communities\u2019 commitment to preserving them. European Union Natura 2000 is a network of protected areas established by the EU across all member states . It is made up of Special Areas of Conservation (SACs) and Special Protection Areas (SPAs) designated respectively under the Habitats Directive and Birds Directive. are designated as terrestrial sites and as marine sites. Overall, 18 percent of the EU land mass is designated. India Protected areas of India include National parks, Wildlife sanctuaries, biosphere reserves, reserved and protected forests, conservation and community reserves, communal forests, private protected areas and conservation areas. Nicaragua O Parks, Wildlife, and Recreation is a private protected area , also known as a 'Private Reserve' predominantly managed for biodiversity conservation, protected without formal government recognition and is owned and stewarded by the O corporation International. O parks plays a particularly important role in conserving critical biodiversity in a section of the Mesoamerican Biological Corridor known as the Paso del Istmo, located along the 12-mile-wide isthmus between Lake Nicaragua and the Pacific Ocean. , according to the United Nations Environment Programme, the United States had a total of 6770 terrestrial nationally designated (federal) protected areas. These protected areas cover , or 27.08 percent of the land area of the United States. This is also one-tenth of the protected land area of the world. Biodiversity hotspots Coastal Reserve (Ukraine) Conservation area (United Kingdom) (urban heritage area in the UK) Conservation designation Conservation refugee: a person who has been forced to relocate from a conservation area Centres of Plant Diversity Climate change mitigation#Carbon sinks and removal Exclusion zone Ecotourism Forest Preserve Fossil park Historic district Indigenous and Community Conserved Area IUCN Protected Area Management Categories Last of the Wild List of largest protected areas in the world Listed building Marine Protected Area National heritage site National park Nature reserve Invasive species eradication Park ranger Private protected area Poaching Rural flight Special Area of Conservation (European Union) Sustainable Development Goals The Georgian Group Transboundary protected area Urban heritage park Urbanization World Commission on Protected Areas World Database on Protected Areas World Heritage Site \u2013 registered by UNESCO Zakaznik (type of protected area in former Soviet republics) WDPA dataset on Ocean Data Viewer ProtectedPlanet.net Campaign For Nature \u2013 campaigns for protecting at least 30\\% of the planet by 2030 DOPA, a Digital Observatory for Protected Areas United Nations Environment Programme World Conservation Monitoring Center, Protected Areas Programme IUCN World Commission on Protected Areas IUCN Global Protected Area Programme 2010 Biodiversity Indicators Partnership Indicator Factsheet: Management Effectiveness of Protected Areas A-Z of Areas of Biodiversity Importance Brazilian Amazon Protected areas \u2013 Instituto Socioambiental", "edit_actions": [{"type": "R", "before": "crisis ecoregions", "after": "Crisis Ecoregions", "start_char_pos": 711, "end_char_pos": 728}, {"type": "R", "before": "Monument", "after": "monument", "start_char_pos": 1883, "end_char_pos": 1891}, {"type": "A", "before": null, "after": "natural", "start_char_pos": 2185, "end_char_pos": 2185}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 3273, "end_char_pos": 3274}, {"type": "R", "before": "warming", "after": "heating", "start_char_pos": 3522, "end_char_pos": 3529}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 4160, "end_char_pos": 4161}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 4264, "end_char_pos": 4265}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 4810, "end_char_pos": 4811}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 5520, "end_char_pos": 5521}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 5894, "end_char_pos": 5902}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 6025, "end_char_pos": 6026}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 6361, "end_char_pos": 6362}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 6718, "end_char_pos": 6719}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 6818, "end_char_pos": 6819}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 7361, "end_char_pos": 7362}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 7938, "end_char_pos": 7939}, {"type": "R", "before": "European Union across all Member States", "after": "EU across all member states", "start_char_pos": 8112, "end_char_pos": 8151}, {"type": "R", "before": "Biosphere reserves, Reserved", "after": "biosphere reserves, reserved", "start_char_pos": 8507, "end_char_pos": 8535}, {"type": "R", "before": "Conservation", "after": "conservation", "start_char_pos": 8559, "end_char_pos": 8571}, {"type": "R", "before": "Communal forests, Private", "after": "communal forests, private", "start_char_pos": 8596, "end_char_pos": 8621}, {"type": "R", "before": "Conservation", "after": "conservation", "start_char_pos": 8642, "end_char_pos": 8654}, {"type": "R", "before": "Private Protected Area", "after": "private protected area", "start_char_pos": 8711, "end_char_pos": 8733}, {"type": "R", "before": "6,770", "after": "6770", "start_char_pos": 9271, "end_char_pos": 9276}, {"type": "R", "before": "Hotspots", "after": "hotspots", "start_char_pos": 9501, "end_char_pos": 9509}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 10433, "end_char_pos": 10434}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 10591, "end_char_pos": 10592}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 11060, "end_char_pos": 11061}], "sents_char_pos": [0, 162, 523, 741, 819, 1167, 1434, 1636, 1722, 2162, 2335, 2404, 2488, 2668, 2934, 3173, 3410, 3622, 3823, 4080, 4396, 4598, 4844, 4956, 5173, 5224, 5375, 5626, 5791, 5929, 6097, 6348, 6491, 6785, 7120, 7183, 7308, 7672, 7816, 8033, 8153, 8374, 8429, 8661, 8933, 9337, 9423, 9487, 9649, 9663, 9679, 9691, 9711, 9724, 9743, 10231, 10434, 10592]}
+{"doc_id": "10063629", "revision_depth": "1", "before_revision": "450px| Rank-size distribution of the population of countries follows a stretched exponential distribution\"Stretched exponential distributions in nature and economy: \"fat tails\" with characteristic scales\", J. Laherr\u00e8re and D. Sornette except in the cases of the two \"Kings\": China and India. Rank-size distribution is the distribution of size by rank, in decreasing order of size. For example, if a data set consists of items of sizes 5, 100, 5, and 8, the rank-size distribution is 100, 8, 5, 5 (ranks 1 through 4). This is also known as the rank-frequency distribution, when the source data are from a frequency distribution. These are particularly of interest when the data vary significantly in scale, such as city size or word frequency. These distributions frequently follow a power law distribution, or less well-known ones such as a stretched exponential function or parabolic fractal distribution, at least approximately for certain ranges of ranks; see below. A rank-size distribution is not a probability distribution or cumulative distribution function. Rather, it is a discrete form of a quantile function (inverse cumulative distribution) in reverse order, giving the size of the element at a given rank. Simple rank-size distributions In the case of city populations, the resulting distribution in a country, a region, or the world will be characterized by its largest city, with other cities decreasing in size respective to it, initially at a rapid rate and then more slowly. This results in a few large cities and a much larger number of cities orders of magnitude smaller. For example, a rank 3 city would have one-third the population of a country's largest city, a rank 4 city would have one-fourth the population of the largest city, and so on. A rank-size (or rank-frequency ) distribution is often segmented into ranges. This is frequently done somewhat arbitrarily or due to external factors, particularly for market segmentation, but can also be due to distinct behavior as rank varies. Rank-size rule The rank-size rule (or law) describes the remarkable regularity in many phenomena, including the distribution of city sizes, the sizes of businesses, the sizes of particles (such as sand), the lengths of rivers, the frequencies of word usage, and wealth among individuals. All are real-world observations that follow power laws, such as Zipf's law, the Yule distribution, or the Pareto distribution. If one ranks the population size of cities in a given country or in the entire world and calculates the natural logarithm of the rank and of the city population, the resulting graph will show a log-linear pattern. This is the rank-size distribution.Zipf's Law, or the Rank-Size Distribution Steven Brakman, Harry Garretsen, and Charles van Marrewijk One study claims that the rank-size rule \"works\" because it is a \"shadow\" or coincidental measure of the true phenomenon.The Urban Rank-Size Hierarchy James W. Fonseca The true value of rank-size is thus not as an accurate mathematical measure (since other power-law formulas are more accurate, especially at ranks lower than 10) but rather as a handy measure or \"rule of thumb\" to spot power laws. When presented with a ranking of data, is the third-ranked variable approximately one-third the value of the highest-ranked one? Or, conversely, is the highest-ranked variable approximately ten times the value of the tenth-ranked one? If so, the rank-size rule has possibly helped spot another power law relationship. Known exceptions to simple rank-size distributions While Zipf's law works well in many cases, it tends to not fit the largest cities in many countries; one type of deviation is known as the King effect. A 2002 study found that Zipf's law was rejected for 53 of 73 countries, far more than would be expected based on random chance. The study also found that variations of the Pareto exponent are better explained by political variables than by economic geography variables like proxies for economies of scale or transportation costs.Zipf's Law, or the Rank-Size Distribution A 2004 study showed that Zipf's law did not work well for the five largest cities in six countries.Cuberes, David, The Rise and Decline of Cities, University of Chicago, September 29, 2004 In the richer countries, the distribution was flatter than predicted. For instance, in the United States, although its largest city, New York City, has more than twice the population of second-place Los Angeles, the two cities' metropolitan areas (also the two largest in the country) are much closer in population. In metropolitan-area population, New York City is only 1.3 times larger than Los Angeles. In other countries, the largest city would dominate much more than expected. For instance, in the Democratic Republic of the Congo, the capital, Kinshasa, is more than eight times larger than the second-largest city, Lubumbashi. When considering the entire distribution of cities, including the smallest ones, the rank-size rule does not hold. Instead, the distribution is log-normal. This follows from Gibrat's law of proportionate growth. Because exceptions are so easy to find, the function of the rule for analyzing cities today is to compare the city-systems in different countries. The rank-size rule is a common standard by which urban primacy is established. A distribution such as that in the United States or China does not exhibit a pattern of primacy, but countries with a dominant \"primate city\" clearly vary from the rank-size rule in the opposite manner. Therefore, the rule helps to classify national (or regional) city-systems according to the degree of dominance exhibited by the largest city. Countries with a primate city, for example, have typically had a colonial history that accounts for that city pattern. If a normal city distribution pattern is expected to follow the rank-size rule (i.e. if the rank-size principle correlates with central place theory), then it suggests that those countries or regions with distributions that do not follow the rule have experienced some conditions that have altered the normal distribution pattern. For example, the presence of multiple regions within large nations such as China and the United States tends to favor a pattern in which more large cities appear than would be predicted by the rule. By contrast, small countries that had been connected (e.g. colonially/economically) to much larger areas will exhibit a distribution in which the largest city is much larger than would fit the rule, compared with the other cities\u2014the excessive size of the city theoretically stems from its connection with a larger system rather than the natural hierarchy that central place theory would predict within that one country or region alone. See also Pareto principle Long tail References Douglas R. White, Laurent Tambayong, and Nata\u0161a Kej\u017ear. 2008. Oscillatory dynamics of city-size distributions in world historical systems. Globalization as an Evolutionary Process: Modeling Global Change. Ed. by George Modelski, Tessaleno Devezas, and William R. Thompson. London: Routledge. The Use of Agent-Based Models in Regional Science\u2014an agent-based simulation study that explains Rank-size distribution.", "after_revision": "450px| Rank\u2013size distribution of the population of countries follows a stretched exponential distribution\"Stretched exponential distributions in nature and economy: \"fat tails\" with characteristic scales\", J. Laherr\u00e8re and D. Sornette except in the cases of the two \"Kings\": China and India. Rank\u2013size distribution is the distribution of size by rank, in decreasing order of size. For example, if a data set consists of items of sizes 5, 100, 5, and 8, the rank\u2013size distribution is 100, 8, 5, 5 (ranks 1 through 4). This is also known as the rank\u2013frequency distribution, when the source data are from a frequency distribution. These are particularly of interest when the data vary significantly in scale, such as city size or word frequency. These distributions frequently follow a power law distribution, or less well-known ones such as a stretched exponential function or parabolic fractal distribution, at least approximately for certain ranges of ranks; see below. A rank\u2013size distribution is not a probability distribution or cumulative distribution function. Rather, it is a discrete form of a quantile function (inverse cumulative distribution) in reverse order, giving the size of the element at a given rank. Simple rank\u2013size distributions In the case of city populations, the resulting distribution in a country, a region, or the world will be characterized by its largest city, with other cities decreasing in size respective to it, initially at a rapid rate and then more slowly. This results in a few large cities and a much larger number of cities orders of magnitude smaller. For example, a rank 3 city would have one-third the population of a country's largest city, a rank 4 city would have one-fourth the population of the largest city, and so on. A rank\u2013size (or rank\u2013frequency ) distribution is often segmented into ranges. This is frequently done somewhat arbitrarily or due to external factors, particularly for market segmentation, but can also be due to distinct behavior as rank varies. Rank\u2013size rule The rank\u2013size rule (or law) describes the remarkable regularity in many phenomena, including the distribution of city sizes, the sizes of businesses, the sizes of particles (such as sand), the lengths of rivers, the frequencies of word usage, and wealth among individuals. All are real-world observations that follow power laws, such as Zipf's law, the Yule distribution, or the Pareto distribution. If one ranks the population size of cities in a given country or in the entire world and calculates the natural logarithm of the rank and of the city population, the resulting graph will show a log-linear pattern. This is the rank\u2013size distribution.Zipf's Law, or the Rank\u2013Size Distribution Steven Brakman, Harry Garretsen, and Charles van Marrewijk One study claims that the rank\u2013size rule \"works\" because it is a \"shadow\" or coincidental measure of the true phenomenon.The Urban Rank\u2013Size Hierarchy James W. Fonseca The true value of rank\u2013size is thus not as an accurate mathematical measure (since other power-law formulas are more accurate, especially at ranks lower than 10) but rather as a handy measure or \"rule of thumb\" to spot power laws. When presented with a ranking of data, is the third-ranked variable approximately one-third the value of the highest-ranked one? Or, conversely, is the highest-ranked variable approximately ten times the value of the tenth-ranked one? If so, the rank\u2013size rule has possibly helped spot another power law relationship. Known exceptions to simple rank\u2013size distributions While Zipf's law works well in many cases, it tends to not fit the largest cities in many countries; one type of deviation is known as the King effect. A 2002 study found that Zipf's law was rejected for 53 of 73 countries, far more than would be expected based on random chance. The study also found that variations of the Pareto exponent are better explained by political variables than by economic geography variables like proxies for economies of scale or transportation costs.Zipf's Law, or the Rank\u2013Size Distribution A 2004 study showed that Zipf's law did not work well for the five largest cities in six countries.Cuberes, David, The Rise and Decline of Cities, University of Chicago, September 29, 2004 In the richer countries, the distribution was flatter than predicted. For instance, in the United States, although its largest city, New York City, has more than twice the population of second-place Los Angeles, the two cities' metropolitan areas (also the two largest in the country) are much closer in population. In metropolitan-area population, New York City is only 1.3 times larger than Los Angeles. In other countries, the largest city would dominate much more than expected. For instance, in the Democratic Republic of the Congo, the capital, Kinshasa, is more than eight times larger than the second-largest city, Lubumbashi. When considering the entire distribution of cities, including the smallest ones, the rank\u2013size rule does not hold. Instead, the distribution is log-normal. This follows from Gibrat's law of proportionate growth. Because exceptions are so easy to find, the function of the rule for analyzing cities today is to compare the city-systems in different countries. The rank\u2013size rule is a common standard by which urban primacy is established. A distribution such as that in the United States or China does not exhibit a pattern of primacy, but countries with a dominant \"primate city\" clearly vary from the rank\u2013size rule in the opposite manner. Therefore, the rule helps to classify national (or regional) city-systems according to the degree of dominance exhibited by the largest city. Countries with a primate city, for example, have typically had a colonial history that accounts for that city pattern. If a normal city distribution pattern is expected to follow the rank\u2013size rule (i.e. if the rank\u2013size principle correlates with central place theory), then it suggests that those countries or regions with distributions that do not follow the rule have experienced some conditions that have altered the normal distribution pattern. For example, the presence of multiple regions within large nations such as China and the United States tends to favor a pattern in which more large cities appear than would be predicted by the rule. By contrast, small countries that had been connected (e.g. colonially/economically) to much larger areas will exhibit a distribution in which the largest city is much larger than would fit the rule, compared with the other cities\u2014the excessive size of the city theoretically stems from its connection with a larger system rather than the natural hierarchy that central place theory would predict within that one country or region alone. See also Pareto principle Long tail References Douglas R. White, Laurent Tambayong, and Nata\u0161a Kej\u017ear. 2008. Oscillatory dynamics of city-size distributions in world historical systems. Globalization as an Evolutionary Process: Modeling Global Change. Ed. by George Modelski, Tessaleno Devezas, and William R. Thompson. London: Routledge. The Use of Agent-Based Models in Regional Science\u2014an agent-based simulation study that explains rank\u2013size distribution.", "edit_actions": [{"type": "R", "before": "Rank-size", "after": "Rank\u2013size", "start_char_pos": 7, "end_char_pos": 16}, {"type": "R", "before": "Rank-size", "after": "Rank\u2013size", "start_char_pos": 292, "end_char_pos": 301}, {"type": "R", "before": "rank-size", "after": "rank\u2013size", "start_char_pos": 457, "end_char_pos": 466}, {"type": "R", "before": "rank-frequency", "after": "rank\u2013frequency", "start_char_pos": 543, "end_char_pos": 557}, {"type": "R", "before": "rank-size", "after": "rank\u2013size", "start_char_pos": 972, "end_char_pos": 981}, {"type": "R", "before": "rank-size", "after": "rank\u2013size", "start_char_pos": 1226, "end_char_pos": 1235}, {"type": "R", "before": "rank-size (or rank-frequency", "after": "rank\u2013size (or rank\u2013frequency", "start_char_pos": 1769, "end_char_pos": 1797}, {"type": "R", "before": "Rank-size rule The rank-size", "after": "Rank\u2013size rule The rank\u2013size", "start_char_pos": 2013, "end_char_pos": 2041}, {"type": "R", "before": "rank-size", "after": "rank\u2013size", "start_char_pos": 2654, "end_char_pos": 2663}, {"type": "R", "before": "Rank-Size", "after": "Rank\u2013Size", "start_char_pos": 2696, "end_char_pos": 2705}, {"type": "R", "before": "rank-size", "after": "rank\u2013size", "start_char_pos": 2804, "end_char_pos": 2813}, {"type": "R", "before": "Rank-Size", "after": "Rank\u2013Size", "start_char_pos": 2909, "end_char_pos": 2918}, {"type": "R", "before": "rank-size", "after": "rank\u2013size", "start_char_pos": 2964, "end_char_pos": 2973}, {"type": "R", "before": "rank-size", "after": "rank\u2013size", "start_char_pos": 3423, "end_char_pos": 3432}, {"type": "R", "before": "rank-size", "after": "rank\u2013size", "start_char_pos": 3522, "end_char_pos": 3531}, {"type": "R", "before": "Rank-Size", "after": "Rank\u2013Size", "start_char_pos": 4046, "end_char_pos": 4055}, {"type": "R", "before": "rank-size", "after": "rank\u2013size", "start_char_pos": 4978, "end_char_pos": 4987}, {"type": "R", "before": "rank-size", "after": "rank\u2013size", "start_char_pos": 5256, "end_char_pos": 5265}, {"type": "R", "before": "rank-size", "after": "rank\u2013size", "start_char_pos": 5495, "end_char_pos": 5504}, {"type": "R", "before": "rank-size", "after": "rank\u2013size", "start_char_pos": 5859, "end_char_pos": 5868}, {"type": "R", "before": "rank-size", "after": "rank\u2013size", "start_char_pos": 5887, "end_char_pos": 5896}, {"type": "R", "before": "Rank-size", "after": "rank\u2013size", "start_char_pos": 7197, "end_char_pos": 7206}], "sents_char_pos": [0, 291, 380, 516, 627, 742, 958, 969, 1065, 1218, 1492, 1591, 1766, 1844, 2012, 2300, 2427, 2641, 2677, 2899, 3176, 3305, 3411, 3494, 3646, 3697, 3825, 4027, 4168, 4327, 4573, 4663, 4740, 4892, 5007, 5048, 5104, 5251, 5330, 5533, 5675, 5794, 6125, 6324, 6761, 6819, 6864, 6947, 7013, 7071, 7100]}
+{"doc_id": "10177813", "revision_depth": "1", "before_revision": "Relationships Splitting creates instability in relationships because one person can be viewed as either personified virtue or personified vice at different times, depending on whether they gratify the subject's needs or frustrate them. This, along with similar oscillations in the experience and appraisal of the self, leads to chaotic and unstable relationship patterns, identity diffusion, and mood swings. The therapeutic process can be greatly impeded by these oscillations, because the therapist too can come to be seen as all good or all bad. To attempt to overcome the negative effects on treatment outcome, constant interpretations by the therapist are needed. Gould, J. R., Prentice, N. M. Ainslie, R. C. (1996). \"The splitting index: construction of a scale measuring the defense mechanism of splitting\". Journal of Personality Assessment 66 (2), 414\u2013430. Splitting contributes to unstable relationships and intense emotional experiences. Splitting is common during adolescence, but is regarded as transient. Splitting has been noted especially with persons diagnosed with borderline personality disorder. What is Borderline personality disorder \u2013 Splitting . Treatment strategies have been developed for individuals and groups based on dialectical behavior therapy, and for couples. Siegel, J. P. Repairing Intimacy (1992) and Linehan, M. (1993). There are also self-help books on related topics such as mindfulness and emotional regulation that claim to be helpful for individuals who struggle with the consequences of splitting. Jacobs, B. 2004, Siegel, J. 2010. Splitting is a relatively common defense mechanism for people with borderline personality disorder. One of the DSM IV-TR criteria for this disorder is a description of splitting: \"a pattern of unstable and intense interpersonal relationships characterized by alternating between extremes of idealization and devaluation\". In psychoanalytic theory, people with borderline personality disorder are not able to integrate the good and bad images of both self and others, resulting in a bad representation which dominates the good representation. Siegel, J. P. (2006). \"Dyadic splitting in partner relational disorders\". Journal of Family Psychology, 20 (3), 418\u2013422. People matching the diagnostic criteria for narcissistic personality disorder also use splitting as a central defense mechanism. Most often narcissists do this as an attempt to stabilize their sense of self-positivity in order to preserve their self-esteem, by perceiving themselves as purely upright or admirable and others who do not conform to their will or values as purely wicked or contemptible. Abdennur, the Narcissistic Principle of Equivalence, pp. 88\u201389. Depression In depression, exaggerated all-or-nothing thinking can form a self-reinforcing cycle: these thoughts might be called emotional amplifiers because, as they go around and around, they become more intense. Typical all-or-nothing thoughts: My efforts are either a success or they are an abject failure Other people are either all good or all bad. I am either all good or all bad. If you're not with us, you're against us. Gilbert, p. 63 and p. 98. Splitting of consciousness (\"normal self\" vs. \"secondary self\") was first described by Pierre Janet in De l'automatisme psychologique (1889). Dermot Moran, Rodney K. B. Parker (eds.), Studia Phaenomenologica: Vol. XV / 2015 \u2013 Early Phenomenology, Zeta Books, p. 234. His ideas were extended by Bleuler (who in 1908 coined the word schizofrenia from the Ancient Greek skh\u00edz\u014d and phr\u1e17n ) and FreudSigmund Freud , Five Lectures on Psycho-Analysis (London 1995) p. 25. to explain the splitting () of consciousnessnot (with Janet) as the product of innate weakness, but as the result of inner conflict. Sigmund Freud, Five Lectures on Psycho-Analysis (London 1995) p. 33. With the development of the idea of repression, splitting moved to the background of Freud's thought for some years, being largely reserved for cases of double personality. Sigmund Freud, On Metapsychology (Middlesex 1987) pp. 53\u20134. However, his late work saw a renewed interest in how it was \"possible for the ego to avoid a rupture... by effecting a cleavage or division of itself\", Sigmund Freud, On Psychopathology (Middlesex 1987) p. 217. a theme which was extended in his Outline of Psycho-Analysis (1940a [1938]) beyond fetishism to the neurotic in general. Angela Richards, \"Editor's Note\", Metapsychology p. 460. His daughter Anna Freud explored how, in healthy childhood development, a splitting of loving and aggressive instincts could be avoided. E. Young-Bruehl (2008). Anna Freud. p. 322. There was, however, from early on, another use of the term \"splitting\" in Freud, referring rather to resolving ambivalence \"by splitting the contradictory feelings so that one person is only loved, another one only hated ... the good mother and the wicked stepmother in fairy tales\". Fenichel, Neurosis p. 157. Or, with opposing feelings of love and hate, perhaps \"the two opposites should have been split apart and one of them, usually the hatred, has been repressed\". Sigmund Freud, Case Histories II (London 1991) p. 119. Such splitting was closely linked to the defence of \"isolation ... The division of objects into congenial and uncongenial ones ... making 'disconnections'.\" Fenichel, Neurosis p. 158. It was the latter sense of the term that was predominantly adopted and exploited by Melanie Klein. After Freud, \"the most important contribution has come from Melanie Klein, whose work enlightens the idea of 'splitting of the object' () Laplanche, Jean; Pontalis, Jean-Bertrand (1973). \"Splitting of the Object (p. 430)\" . ( in terms of 'good/bad' objects)\". T. Bokanowski and S. Lewkowicz, On Freud's \"Splitting of the ego in the process of defense\" (London 2009) p. x. In her object relations theory, Klein argues that \"the earliest experiences of the infant are split between wholly good ones with 'good' objects and wholly bad experiences with 'bad' objects\", Richard Appignanesi ed., Introducing Melanie Klein (Cambridge 2006) np 173%DIFDELCMD < ]%%% . as children struggle to integrate the two primary drives, love and hate, into constructive social interaction. An important step in childhood development is the gradual depolarization of these two drives. At what Klein called the paranoid-schizoid position, there is a stark separation of the things the child loves (good, gratifying objects) and the things the child hates (bad, frustrating objects), \"because everything is polarised into extremes of love and hate, just like what the baby seems to experience and young children are still very close to.\" Robin Skynner/John Cleese, Families and how to survive them (London 1994) p. 98. Klein refers to the good breast and the bad breast as split mental entities, resulting from the way \"these primitive states tend to deconstruct objects into 'good' and 'bad' bits (called 'part-objects')\". Appignanesi, Klein p. 123. The child sees the breasts as opposite in nature at different times, although they actually are the same, belonging to the same mother. As the child learns that people and objects can be good and bad at the same time, he or she progresses to the next phase, the depressive position, which \"entails a steady, though painful, approximation towards the reality of oneself and others\": Appignanesi, Klein p. 131. integrating the splits and \"being able to balance [them] out ... are tasks that continue into early childhood and indeed are never completely finished.\" Skinner, Families p. 98. However, Kleinians also utilize Freud's first conception of splitting, to explain the way \"In a related process of splitting, the person divides his own self. This is called 'splitting of the ego'.\" Appignanesi, Klein p. 125. Indeed, Klein herself maintained that \"the ego is incapable of splitting the object\u2014internal or external\u2014without a corresponding splitting taking place within the ego\". Quoted in Paul Holmes, The inner world outside (1992) p. 117. Arguably at least, by this point \"the idea of splitting does not carry the same meaning for Freud and for Klein\": for the former, \"the ego finds itself 'passively' split, as it were. For Klein and the post-Kleinians, on the other hand, splitting is an 'active' defence mechanism\". Jean-Michel Quinodoz, Reading Freud (London 2005) p. 252. As a result, by the close of the century \"four kinds of splitting can be clearly identified, among many other possibilities\" for post-Kleinians: \"a coherent split in the object, a coherent split in the ego, a fragmentation of the object, and a fragmentation of the ego.\" Quoting Robert Hinshelwood, in Quinodoz, Reading Freud p. 252. In the developmental model of Otto Kernberg, the overcoming of splitting is also an important developmental task. The child has to learn to integrate feelings of love and hate. Kernberg distinguishes three different stages in the development of a child with respect to splitting: The child does not experience the self and the object, nor the good and the bad as different entities. Good and bad are viewed as different. Because the boundaries between the self and the other are not stable yet, the other as a person is viewed as either all good or all bad, depending on their actions. This also means that thinking about another person as bad implies that the self is bad as well, so it's better to think about the caregiver as a good person, so the self is viewed as good too. \"Bringing together extremely opposite loving and hateful images of the self and of significant others would trigger unbearable anxiety and guilt.\" Otto F. Kernberg, Borderline Conditions and Pathological Narcissism (London 1990) p. 165. Splitting \u2013 \"the division of external objects into 'all good' or 'all bad'\" Kernberg, Borderline p. 29 \u2013 begins to be resolved when the self and the other can be seen as possessing both good and bad qualities. Having hateful thoughts about the other does not mean that the self is all hateful and does not mean that the other person is all hateful either. If a person fails to accomplish this developmental task satisfactorily, borderline pathology can emerge. \"In the borderline personality organization\", Kernberg found 'dissociated ego states that result from the use of \"splitting\" defences'. Paul Brinich and Christopher Shelley, The Self and Personality Structure (Buckingham 2002) p 51 His therapeutic work then aimed at \"the analysis of the repeated and oscillating projections of unwanted self and object representations onto the therapist\" so as to produce \"something more durable, complex and encompassing than the initial, split-off and polarized state of affairs\". Brinich, Self p. 51. Horizontal and vertical Heinz Kohut has emphasized in his self psychology the distinction between horizontal and vertical forms of splitting. H. Kohut, The Analysis of the Self (1971) p. 79 Traditional psychoanalysis saw repression as forming a horizontal barrier between different levels of the mind \u2013 so that for example an unpleasant truth might be accepted superficially but denied in a deeper part of the psyche. O. Fenichel, The Psychoanalytic Theory of Neurosis (1946) p. 145 Kohut contrasted with this vertical fractures of the mind into two parts with incompatible attitudes separated by mutual disavowal. H. Kohut, The Analysis of the Self (1971) p. 177 and p. 185 It has been suggested that interpretation of the transference \"becomes effective through a sort of splitting of the ego into a reasonable, judging portion and an experiencing portion, the former recognizing the latter as not appropriate in the present and as coming from the past\". Fenichel, Neurosis p. 570. Clearly, \"in this sense, splitting, so far from being a pathological phenomenon, is a manifestation of self-awareness\". Charles Rycroft, A Critical Dictionary of Psychoanalysis (London 1995) p. 174 Nevertheless, \"it remains to be investigated how this desirable 'splitting of the ego' and 'self-observation' are to be differentiated from the pathological cleavage ... directed at preserving isolations\".", "after_revision": "Relationships Splitting creates instability in relationships because one person can be viewed as either personified virtue or personified vice at different times, depending on whether they gratify the subject's needs or frustrate them. This, along with similar oscillations in the experience and appraisal of the self, leads to chaotic and unstable relationship patterns, identity diffusion, and mood swings. The therapeutic process can be greatly impeded by these oscillations, because the therapist too can come to be seen as all good or all bad. To attempt to overcome the negative effects on treatment outcome, constant interpretations by the therapist are needed. Splitting contributes to unstable relationships and intense emotional experiences. Splitting is common during adolescence, but is regarded as transient. Splitting has been noted especially with persons diagnosed with borderline personality disorder. Treatment strategies have been developed for individuals and groups based on dialectical behavior therapy, and for couples. There are also self-help books on related topics such as mindfulness and emotional regulation that claim to be helpful for individuals who struggle with the consequences of splitting. Splitting is a relatively common defense mechanism for people with borderline personality disorder. One of the DSM IV-TR criteria for this disorder is a description of splitting: \"a pattern of unstable and intense interpersonal relationships characterized by alternating between extremes of idealization and devaluation\". In psychoanalytic theory, people with borderline personality disorder are not able to integrate the good and bad images of both self and others, resulting in a bad representation which dominates the good representation. People matching the diagnostic criteria for narcissistic personality disorder also use splitting as a central defense mechanism. Most often narcissists do this as an attempt to stabilize their sense of self-positivity in order to preserve their self-esteem, by perceiving themselves as purely upright or admirable and others who do not conform to their will or values as purely wicked or contemptible. Depression In depression, exaggerated all-or-nothing thinking can form a self-reinforcing cycle: these thoughts might be called emotional amplifiers because, as they go around and around, they become more intense. Typical all-or-nothing thoughts: My efforts are either a success or they are an abject failure Other people are either all good or all bad. I am either all good or all bad. If you're not with us, you're against us. Splitting of consciousness (\"normal self\" vs. \"secondary self\") was first described by Pierre Janet in De l'automatisme psychologique (1889). His ideas were extended by Bleuler (who in 1908 coined the word schizofrenia from the Ancient Greek skh\u00edz\u014d and phr\u1e17n ) and Freud to explain the splitting () of consciousnessnot (with Janet) as the product of innate weakness, but as the result of inner conflict. With the development of the idea of repression, splitting moved to the background of Freud's thought for some years, being largely reserved for cases of double personality. However, his late work saw a renewed interest in how it was \"possible for the ego to avoid a rupture... by effecting a cleavage or division of itself\", a theme which was extended in his Outline of Psycho-Analysis (1940a [1938]) beyond fetishism to the neurotic in general. His daughter Anna Freud explored how, in healthy childhood development, a splitting of loving and aggressive instincts could be avoided. There was, however, from early on, another use of the term \"splitting\" in Freud, referring rather to resolving ambivalence \"by splitting the contradictory feelings so that one person is only loved, another one only hated ... the good mother and the wicked stepmother in fairy tales\". Or, with opposing feelings of love and hate, perhaps \"the two opposites should have been split apart and one of them, usually the hatred, has been repressed\". Such splitting was closely linked to the defence of \"isolation ... The division of objects into congenial and uncongenial ones ... making 'disconnections'.\" It was the latter sense of the term that was predominantly adopted and exploited by Melanie Klein. After Freud, \"the most important contribution has come from Melanie Klein, whose work enlightens the idea of 'splitting of the object' () ( in terms of 'good/bad' objects)\". In her object relations theory, Klein argues that \"the earliest experiences of the infant are split between wholly good ones with 'good' objects and wholly bad experiences with 'bad' objects\", %DIFDELCMD < ]%%% as children struggle to integrate the two primary drives, love and hate, into constructive social interaction. An important step in childhood development is the gradual depolarization of these two drives. At what Klein called the paranoid-schizoid position, there is a stark separation of the things the child loves (good, gratifying objects) and the things the child hates (bad, frustrating objects), \"because everything is polarised into extremes of love and hate, just like what the baby seems to experience and young children are still very close to.\" Klein refers to the good breast and the bad breast as split mental entities, resulting from the way \"these primitive states tend to deconstruct objects into 'good' and 'bad' bits (called 'part-objects')\". The child sees the breasts as opposite in nature at different times, although they actually are the same, belonging to the same mother. As the child learns that people and objects can be good and bad at the same time, he or she progresses to the next phase, the depressive position, which \"entails a steady, though painful, approximation towards the reality of oneself and others\": integrating the splits and \"being able to balance [them] out ... are tasks that continue into early childhood and indeed are never completely finished.\" However, Kleinians also utilize Freud's first conception of splitting, to explain the way \"In a related process of splitting, the person divides his own self. This is called 'splitting of the ego'.\" Indeed, Klein herself maintained that \"the ego is incapable of splitting the object\u2014internal or external\u2014without a corresponding splitting taking place within the ego\". Arguably at least, by this point \"the idea of splitting does not carry the same meaning for Freud and for Klein\": for the former, \"the ego finds itself 'passively' split, as it were. For Klein and the post-Kleinians, on the other hand, splitting is an 'active' defence mechanism\". As a result, by the close of the century \"four kinds of splitting can be clearly identified, among many other possibilities\" for post-Kleinians: \"a coherent split in the object, a coherent split in the ego, a fragmentation of the object, and a fragmentation of the ego.\" In the developmental model of Otto Kernberg, the overcoming of splitting is also an important developmental task. The child has to learn to integrate feelings of love and hate. Kernberg distinguishes three different stages in the development of a child with respect to splitting: The child does not experience the self and the object, nor the good and the bad as different entities. Good and bad are viewed as different. Because the boundaries between the self and the other are not stable yet, the other as a person is viewed as either all good or all bad, depending on their actions. This also means that thinking about another person as bad implies that the self is bad as well, so it's better to think about the caregiver as a good person, so the self is viewed as good too. \"Bringing together extremely opposite loving and hateful images of the self and of significant others would trigger unbearable anxiety and guilt.\" Splitting \u2013 \"the division of external objects into 'all good' or 'all bad'\" \u2013 begins to be resolved when the self and the other can be seen as possessing both good and bad qualities. Having hateful thoughts about the other does not mean that the self is all hateful and does not mean that the other person is all hateful either. If a person fails to accomplish this developmental task satisfactorily, borderline pathology can emerge. \"In the borderline personality organization\", Kernberg found 'dissociated ego states that result from the use of \"splitting\" defences'. His therapeutic work then aimed at \"the analysis of the repeated and oscillating projections of unwanted self and object representations onto the therapist\" so as to produce \"something more durable, complex and encompassing than the initial, split-off and polarized state of affairs\". Horizontal and vertical Heinz Kohut has emphasized in his self psychology the distinction between horizontal and vertical forms of splitting. Traditional psychoanalysis saw repression as forming a horizontal barrier between different levels of the mind \u2013 so that for example an unpleasant truth might be accepted superficially but denied in a deeper part of the psyche. Kohut contrasted with this vertical fractures of the mind into two parts with incompatible attitudes separated by mutual disavowal. It has been suggested that interpretation of the transference \"becomes effective through a sort of splitting of the ego into a reasonable, judging portion and an experiencing portion, the former recognizing the latter as not appropriate in the present and as coming from the past\". Clearly, \"in this sense, splitting, so far from being a pathological phenomenon, is a manifestation of self-awareness\". Nevertheless, \"it remains to be investigated how this desirable 'splitting of the ego' and 'self-observation' are to be differentiated from the pathological cleavage ... directed at preserving isolations\".", "edit_actions": [{"type": "D", "before": "Gould, J. R., Prentice, N. M.", "after": null, "start_char_pos": 669, "end_char_pos": 698}, {"type": "D", "before": "Ainslie, R. C. (1996). \"The splitting index: construction of a scale measuring the defense mechanism of splitting\". Journal of Personality Assessment 66 (2), 414\u2013430.", "after": null, "start_char_pos": 699, "end_char_pos": 865}, {"type": "D", "before": "What is Borderline personality disorder \u2013 Splitting .", "after": null, "start_char_pos": 1116, "end_char_pos": 1169}, {"type": "D", "before": "Siegel, J. P. Repairing Intimacy (1992) and Linehan, M. (1993).", "after": null, "start_char_pos": 1294, "end_char_pos": 1357}, {"type": "D", "before": "Jacobs, B. 2004, Siegel, J. 2010.", "after": null, "start_char_pos": 1542, "end_char_pos": 1575}, {"type": "D", "before": "Siegel, J. P. (2006). \"Dyadic splitting in partner relational disorders\". Journal of Family Psychology, 20 (3), 418\u2013422.", "after": null, "start_char_pos": 2118, "end_char_pos": 2238}, {"type": "D", "before": "Abdennur, the Narcissistic Principle of Equivalence, pp. 88\u201389.", "after": null, "start_char_pos": 2641, "end_char_pos": 2704}, {"type": "D", "before": "Gilbert, p. 63 and p. 98.", "after": null, "start_char_pos": 3134, "end_char_pos": 3159}, {"type": "D", "before": "Dermot Moran, Rodney K. B. Parker (eds.), Studia Phaenomenologica: Vol. XV / 2015 \u2013 Early Phenomenology, Zeta Books, p. 234.", "after": null, "start_char_pos": 3302, "end_char_pos": 3426}, {"type": "R", "before": "FreudSigmund Freud , Five Lectures on Psycho-Analysis (London 1995) p. 25.", "after": "Freud", "start_char_pos": 3550, "end_char_pos": 3624}, {"type": "D", "before": "Sigmund Freud, Five Lectures on Psycho-Analysis (London 1995) p. 33.", "after": null, "start_char_pos": 3758, "end_char_pos": 3826}, {"type": "D", "before": "Sigmund Freud, On Metapsychology (Middlesex 1987) pp. 53\u20134.", "after": null, "start_char_pos": 4000, "end_char_pos": 4059}, {"type": "D", "before": "Sigmund Freud, On Psychopathology (Middlesex 1987) p. 217.", "after": null, "start_char_pos": 4212, "end_char_pos": 4270}, {"type": "D", "before": "Angela Richards, \"Editor's Note\", Metapsychology p. 460.", "after": null, "start_char_pos": 4392, "end_char_pos": 4448}, {"type": "D", "before": "E. Young-Bruehl (2008). Anna Freud. p. 322.", "after": null, "start_char_pos": 4586, "end_char_pos": 4629}, {"type": "D", "before": "Fenichel, Neurosis p. 157.", "after": null, "start_char_pos": 4914, "end_char_pos": 4940}, {"type": "D", "before": "Sigmund Freud, Case Histories II (London 1991) p. 119.", "after": null, "start_char_pos": 5100, "end_char_pos": 5154}, {"type": "D", "before": "Fenichel, Neurosis p. 158.", "after": null, "start_char_pos": 5312, "end_char_pos": 5338}, {"type": "R", "before": "Laplanche, Jean; Pontalis, Jean-Bertrand (1973). \"Splitting of the Object (p. 430)\" . (", "after": "(", "start_char_pos": 5576, "end_char_pos": 5663}, {"type": "D", "before": "T. Bokanowski and S. Lewkowicz, On Freud's \"Splitting of the ego in the process of defense\" (London 2009) p. x.", "after": null, "start_char_pos": 5698, "end_char_pos": 5809}, {"type": "D", "before": "Richard Appignanesi ed., Introducing Melanie Klein (Cambridge 2006) np", "after": null, "start_char_pos": 6003, "end_char_pos": 6073}, {"type": "D", "before": "173", "after": null, "start_char_pos": 6074, "end_char_pos": 6077}, {"type": "D", "before": ".", "after": null, "start_char_pos": 6095, "end_char_pos": 6096}, {"type": "D", "before": "Robin Skynner/John Cleese, Families and how to survive them (London 1994) p. 98.", "after": null, "start_char_pos": 6653, "end_char_pos": 6733}, {"type": "D", "before": "Appignanesi, Klein p. 123.", "after": null, "start_char_pos": 6939, "end_char_pos": 6965}, {"type": "D", "before": "Appignanesi, Klein p. 131.", "after": null, "start_char_pos": 7348, "end_char_pos": 7374}, {"type": "D", "before": "Skinner, Families p. 98.", "after": null, "start_char_pos": 7528, "end_char_pos": 7552}, {"type": "D", "before": "Appignanesi, Klein p. 125.", "after": null, "start_char_pos": 7752, "end_char_pos": 7778}, {"type": "D", "before": "Quoted in Paul Holmes, The inner world outside (1992) p. 117.", "after": null, "start_char_pos": 7948, "end_char_pos": 8009}, {"type": "D", "before": "Jean-Michel Quinodoz, Reading Freud (London 2005) p. 252.", "after": null, "start_char_pos": 8291, "end_char_pos": 8348}, {"type": "D", "before": "Quoting Robert Hinshelwood, in Quinodoz, Reading Freud p. 252.", "after": null, "start_char_pos": 8620, "end_char_pos": 8682}, {"type": "D", "before": "Otto F. Kernberg, Borderline Conditions and Pathological Narcissism (London 1990) p. 165.", "after": null, "start_char_pos": 9609, "end_char_pos": 9698}, {"type": "D", "before": "Kernberg, Borderline p. 29", "after": null, "start_char_pos": 9775, "end_char_pos": 9801}, {"type": "D", "before": "Paul Brinich and Christopher Shelley, The Self and Personality Structure (Buckingham 2002) p 51", "after": null, "start_char_pos": 10296, "end_char_pos": 10391}, {"type": "D", "before": "Brinich, Self p. 51.", "after": null, "start_char_pos": 10677, "end_char_pos": 10697}, {"type": "D", "before": "H. Kohut, The Analysis of the Self (1971) p. 79", "after": null, "start_char_pos": 10840, "end_char_pos": 10887}, {"type": "D", "before": "O. Fenichel, The Psychoanalytic Theory of Neurosis (1946) p. 145", "after": null, "start_char_pos": 11116, "end_char_pos": 11180}, {"type": "D", "before": "H. Kohut, The Analysis of the Self (1971) p. 177 and p. 185", "after": null, "start_char_pos": 11313, "end_char_pos": 11372}, {"type": "D", "before": "Fenichel, Neurosis p. 570.", "after": null, "start_char_pos": 11655, "end_char_pos": 11681}, {"type": "D", "before": "Charles Rycroft, A Critical Dictionary of Psychoanalysis (London 1995) p. 174", "after": null, "start_char_pos": 11802, "end_char_pos": 11879}], "sents_char_pos": [0, 235, 408, 548, 668, 721, 814, 865, 948, 1018, 1115, 1169, 1293, 1357, 1541, 1575, 1675, 1897, 2117, 2139, 2191, 2238, 2367, 2640, 2704, 2918, 3058, 3091, 3133, 3205, 3301, 3325, 3426, 3757, 3826, 3999, 4059, 4391, 4448, 4585, 4609, 4629, 4913, 5099, 5154, 5221, 5311, 5338, 5437, 5592, 5624, 5697, 5789, 6207, 6301, 6652, 6938, 6965, 7101, 7552, 7711, 7751, 7778, 7947, 8009, 8192, 8290, 8348, 8619, 8682, 8796, 8859, 9065, 9103, 9268, 9461, 9608, 9908, 10054, 10159, 10295, 10676, 10839, 11115, 11312, 11654, 11681, 11801]}
+{"doc_id": "1032780", "revision_depth": "1", "before_revision": " Immunization against diseases is a key preventive healthcare measure. Preventive healthcare, or prophylaxis, consists of measures taken for disease prevention.Hugh R. Leavell and E. Gurney Clark as \"the science and art of preventing disease, prolonging life, and promoting physical and mental health and efficiency. Leavell, H. R., & Clark, E. G. (1979). Preventive Medicine for the Doctor in his Community (3rd ed.). Huntington, NY: Robert E. Krieger Publishing Company. Disease and disability are affected by environmental factors, genetic predisposition, disease agents, and lifestyle choices and are dynamic processes which begin before individuals realize they are affected. Disease prevention relies on anticipatory actions that can be categorized as primal, Primal Health Research Database, on URL primary, secondary, and tertiary prevention. Each year, millions of people die of preventable deaths. A 2004 study showed that about half of all deaths in the United States in 2000 were due to preventable behaviors and exposures. Leading causes included cardiovascular disease, chronic respiratory disease, unintentional injuries, diabetes, and certain infectious diseases. This same study estimates that 400,000 people die each year in the United States due to poor diet and a sedentary lifestyle. According to estimates made by the World Health Organization (WHO), about 55 million people died worldwide in 2011, two thirds of this group from non-communicable diseases, including cancer, diabetes, and chronic cardiovascular and lung diseases.The Top 10 Causes of Death. (n.d.). Retrieved March 16, 2014, from World Health Organization website: URL This is an increase from the year 2000, during which 60\\% of deaths were attributed to these diseases. Preventive healthcare is especially important given the worldwide rise in prevalence of chronic diseases and deaths from these diseases. There are many methods for prevention of disease. One of them is prevention of teenage smoking through information giving.LeChelle Saunders, BSc: Smoking is Critical to Our Health. Be Smart, Don\u2019t Start \u2018Be Smart, Don\u2019t Start\u2019 campaign launched to deter youths from smoking It is recommended that adults and children aim to visit their doctor for regular check-ups, even if they feel healthy, to perform disease screening, identify risk factors for disease, discuss tips for a healthy and balanced lifestyle, stay up to date with immunizations and boosters, and maintain a good relationship with a healthcare provider. Vorvick, L. (2013). Preventive health care. In D. Zieve, D. R. Eltz, S. Slon, N. Wang (Eds.), The A.D.A.M. Medical Encyclopedia. Retrieved from URL In pediatrics, some common examples of primary prevention are encouraging parents to turn down the temperature of their home water heater in order to avoid scalding burns, encouraging children to wear bicycle helmets, and suggesting that people use the Air Quality Index (AQI) to check the level of pollution in the outside air before engaging in sporting activities. Some common disease screenings include checking for hypertension (high blood pressure), hyperglycemia (high blood sugar, a risk factor for diabetes mellitus), hypercholesterolemia (high blood cholesterol), screening for colon cancer, depression, HIV and other common types of sexually transmitted disease such as chlamydia, syphilis, and gonorrhea, mammography (to screen for breast cancer), colorectal cancer screening, a Pap test (to check for cervical cancer), and screening for osteoporosis. Genetic testing can also be performed to screen for mutations that cause genetic disorders or predisposition to certain diseases such as breast or ovarian cancer. However, these measures are not affordable for every individual and the cost effectiveness of preventive healthcare is still a topic of debate. Levels of prevention Preventive healthcare strategies are described as taking place at the primal, primary,Goldston, S. E. (Ed.). (1987). Concepts of primary prevention: A framework for program development. Sacramento, California Department of Mental Health secondary, and tertiary prevention levels. Although advocated as preventive medicine in the early twentieth century by Sara Josephine Baker,Baker, Sara Josephine. Fighting for Life.1939. in the 1940s, Hugh R. Leavell and E. Gurney Clark coined the term primary prevention. They worked at the Harvard and Columbia University Schools of Public Health, respectively, and later expanded the levels to include secondary and tertiary prevention. Goldston (1987) notes that these levels might be better described as \"prevention, treatment, and rehabilitation\", although the terms primary, secondary, and tertiary prevention are still in use today. The concept of primal prevention has been created much more recently, in relation to the new developments in molecular biology over the last fifty years,Darnell, James, RNA, Life's Indispensable Molecule, Cold Spring Harbor Laboratory Press, 2011 more particularly in epigenetics, which point to the paramount importance of environmental conditions - both physical and affective - on the organism during its fetal and newborn life ( or so-called primal period of life ) . Primal and primordial prevention Primal prevention has been propounded as a separate category of health promotion. This health promotion par excellencesee: URL is based on knowledge in molecular biology, in particular on epigenetics, which points to how much affective as well as physical environment during fetal and newborn life may determine adult health.Perry, Bruce D, Maltreated Children: Experience, Brain Development and the Next Generation, Norton Professional Books, 1996Scherrer et al., Systemic and Pulmonary Vascular Dysfunction in Children Conceived by Assisted Reproductive Technologies, Swiss Cardiovascular Center, Bern, CH; Facultad de Ciencias, Departamento de Biologia, Tarapaca, Arica, Chile: Hirslander Group, Lausanne, CH; Botnar Cemter for Extreme Medicine and Department of Internal Medicine, CHUV, Lausanne, CH, and Centre de Procr\u00e9ation M\u00e9dicalement Assist\u00e9e, Lausanne, CH, 2012 This way of promoting health consists mainly in providing future parents with pertinent, unbiased information on primal health and supporting them during their child's primal period of life (i.e., \"from conception to first anniversary\" according to definition by the Primal Health Research Centre, London). This includes adequate parental leaveGarcia, Patricia, Why Silicon Valley\u2019s Paid Leave Policies Need to Go Viral, Vogue, culture, opinion, 2015 ideally for both parents with kin caregiving and financial help where needed. Scientific advancements in genetics have contributed to the knowledge of hereditary diseases and have facilitated progress in specific protective measures in individuals who are carriers of a disease gene or have an increased predisposition to a specific disease. Genetic testing has allowed physicians to make quicker and more accurate diagnoses and has allowed for tailored treatments or personalized medicine. Similarly, specific protective measures such as water purification, sewage treatment, and the development of personal hygienic routines ( such as regular hand-washing, safe sex to prevent sexually transmitted infections ) became mainstream upon the discovery of infectious disease agents and have decreased the rates of communicable diseases which are spread in unsanitary conditions. Secondary prevention Secondary prevention deals with latent diseases and attempts to prevent an asymptomatic disease from progressing to symptomatic disease. Certain diseases can be classified as primary or secondary. This depends on definitions of what constitutes a disease, though, in general, primary prevention addresses the root cause of a disease or injury whereas secondary prevention aims to detect and treat a disease early on.Module 13: Levels of Disease Prevention. (2007, April 24). Retrieved March 16, 2014, from Centers for Disease Control and Prevention website: URL Secondary prevention consists of \"early diagnosis and prompt treatment\" to contain the disease and prevent its spread to other individuals, and \"disability limitation\" to prevent potential future complications and disabilities from the disease. For example, early diagnosis and prompt treatment for a syphilis patient would include a course of antibiotics to destroy the pathogen and screening and treatment of any infants born to syphilitic mothers. Disability limitation for syphilitic patients includes continued check-ups on the heart, cerebrospinal fluid, and central nervous system of patients to curb any damaging effects such as blindness or paralysis. Leading causes of preventable death %DIFDELCMD < %DIFDELCMD < %%% United States The leading cause of death in the United States was tobacco . However , poor diet and lack of exercise may soon surpass tobacco as a leading cause of death. These behaviors are modifiable and public health and prevention efforts could make a difference to reduce these deaths. + Leading causes of preventable deaths in the United States in the year 2000 Cause Deaths caused\\% of all deaths Tobacco smoking 435, 000 18.1 Poor diet and physical inactivity 400,000 16.6 Alcohol consumption 85,000 3.5 Infectious diseases 75,000 3.1 Toxicants 55,000 2.3 Traffic collisions 43,000 1.8 Firearm incidents 29,000 1.2 Sexually transmitted infections 20,000 0.8 Drug abuse 17,000 0.7 Worldwide The leading causes of preventable death worldwide share similar trends to the United States. There are a few differences between the two, such as malnutrition, pollution, and unsafe sanitation, that reflect health disparities between the developing and developed world. + Leading causes of preventable death worldwide as of the year 2001 Cause Deaths caused (millions per year) Hypertension 7.8Smoking 5.0High cholesterol 3.9Malnutrition 3.8Sexually transmitted infections 3.0Poor diet 2.8Overweight and obesity 2.5Physical inactivity 2.0Alcohol 1.9 Indoor air pollution from solid fuels 1.8 Unsafe water and poor sanitation 1.6 + Leading preventive interventions as of 2003 reducing deaths in children 0\u20135 years old worldwide Intervention Percent of all child deaths preventableBreastfeeding 13Insecticide-treated materials 7Complementary feeding 6Zinc 4Clean delivery 4Hib vaccine 4Water , sanitation, hygiene 3Antenatal steroids 3Newborn temperature management 2 Vitamin A 2Tetanus toxoid 2 Nevirapine and replacement feeding 2 Antibiotics for premature rupture of membranes 1 Measles vaccine 1 Antimalarial intermittent preventive treatment in pregnancy<1\\% Preventive methods %DIFDELCMD < %DIFDELCMD < %%% Obesity Obesity is a major risk factor for a wide variety of conditions including cardiovascular diseases, hypertension, certain cancers, and type 2 diabetes. In order to prevent obesity, it is recommended that individuals adhere to a consistent exercise regimen as well as a nutritious and balanced diet. A healthy individual should aim for acquiring 10\\% of their energy from proteins, 15-20\\% from fat, and over 50\\% from complex carbohydrates, while avoiding alcohol as well as foods high in fat, salt, and sugar. Sedentary adults should aim for at least half an hour of moderate-level daily physical activity and eventually increase to include at least 20 minutes of intense exercise, three times a week. Preventive health care offers many benefits to those that chose to participate in taking an active role in the culture. The medical system in our society is geared toward curing acute symptoms of disease after the fact that they have brought us into the emergency room. An ongoing epidemic within American culture is the prevalence of obesity. Healthy eating and regular exercise play a significant role in reducing an individual's risk for type 2 diabetes. A 2008 study concluded that about 23.6 million people in the United States had diabetes, including 5.7 million that had not been diagnosed. Ninety to 95 percent of people with diabetes have type 2 diabetes. Diabetes is the main cause of kidney failure, limb amputation, and new-onset blindness in American adults.\"Diabetes Prevention Program (DPP).\" Diabetes Prevention Program (DPP). US Department of Health and Human Services, Oct. 2008. Web. 23 Apr. URL Sexually transmitted infections U.S. propaganda poster Fool the Axis Use Prophylaxis, 1942 Sexually transmitted infections (STIs), such as syphilis and HIV, are common but preventable with safe-sex practices. STIs can be asymptomatic, or cause a range of symptoms. Preventive measures for STIs are called prophylactics. The term especially applies to the use of condoms, which are highly effective at preventing disease,Centers for Disease Control and Prevention. 2014. 2013 Sexually Transmitted Disease Surveillance. Retrieved from: URL but also to other devices meant to prevent STIs, such as dental dams and latex gloves. Other means for preventing STIs include education on how to use condoms or other such barrier devices, testing partners before having unprotected sex, receiving regular STI screenings, to both receive treatment and prevent spreading STIs to partners, and, specifically for HIV, regularly taking prophylactic antiretroviral drugs, such as Truvada. Post-exposure prophylaxis, started within 72 hours (optimally less than 1 hour) after exposure to high-risk fluids, can also protect against HIV transmission. Thrombosis is a serious circulatory disease affecting thousands, usually older persons undergoing surgical procedures, women taking oral contraceptives and travelers. The consequences of thrombosis can be heart attacks and strokes. Prevention can include : exercise, anti-embolism stockings, pneumatic devices, and pharmacological treatments. Lung cancer Distribution of lung cancer in the United States Lung cancer is the leading cause of cancer-related deaths in the United States and Europe and is a major cause of death in other countries. Tobacco is an environmental carcinogen and the major underlying cause of lung cancer. Between 25\\% and 40\\% of all cancer deaths and about 90\\% of lung cancer cases are associated with tobacco use. Other carcinogens include asbestos and radioactive materials. Risser, N. L. (1996). Prevention of Lung Cancer: The Key Is to Stop Smoking. Seminars in Oncology Nursing, 12, 260-269. Both smoking and second-hand exposure from other smokers can lead to lung cancer and eventually death. Therefore, prevention of tobacco use is paramount to prevention of lung cancer. %DIFDELCMD < %DIFDELCMD < %%% Individual, community, and statewide interventions can prevent or cease tobacco use. 90\\% of adults in the US who have ever smoked did so prior to the age of 20. In-school prevention/educational programs, as well as counseling resources, can help prevent and cease adolescent smoking. Other cessation techniques include group support programs, nicotine replacement therapy (NRT), hypnosis, and self-motivated behavioral change. Studies have shown long term success rates (>1 year) of 20\\% for hypnosis and 10\\%-20\\% for group therapy. Legislation can also affect smoking prevention and cessation. In 1992, Massachusetts (United States) voters passed a bill adding an extra 25 cent tax to each pack of cigarettes, despite intense lobbying and $7.3 million spent by the tobacco industry to oppose this bill. Tax revenue goes toward tobacco education and control programs and has led to a decline of tobacco use in the state. Lung cancer and tobacco smoking are increasing worldwide, especially in China. China is responsible for about one-third of the global consumption and production of tobacco products. Tobacco control policies have been ineffective as China is home to 350 million regular smokers and 750 million passive smokers and the annual death toll is over 1 million. Recommended actions to reduce tobacco use include: decreasing tobacco supply, increasing tobacco taxes, widespread educational campaigns, decreasing advertising from the tobacco industry, and increasing tobacco cessation support resources. In Wuhan, China, a 1998 school-based program implemented an anti-tobacco curriculum for adolescents and reduced the number of regular smokers, though it did not significantly decrease the number of adolescents who initiated smoking. This program was therefore effective in secondary but not primary prevention and shows that school-based programs have the potential to reduce tobacco use. Skin cancer An image of melanoma, one of the deadliest forms of skin cancer Skin cancer is the most common cancer in the United States.MMWR. Recommendations and Reports : Morbidity and Mortality Weekly Report. Recommendations and Reports / Centers for Disease Control [2002, 51(RR-4):1-18] The most lethal form of skin cancer, melanoma, leads to over 50,000 annual deaths in the United States. Childhood prevention is particularly important because a significant portion of ultraviolet radiation exposure from the sun occurs during childhood and adolescence and can subsequently lead to skin cancer in adulthood. Furthermore, childhood prevention can lead to the development of healthy habits that continue to prevent cancer for a lifetime. The Centers for Disease Control and Prevention (CDC) recommends several primary prevention methods including: limiting sun exposure between 10 AM and 4 PM, when the sun is strongest, wearing tighter-weave natural cotton clothing, wide-brim hats, and sunglasses as protective covers, using sunscreens that protect against both UV-A and UV-B rays, and avoiding tanning salons. Sunscreen should be reapplied after sweating, exposure to water (through swimming for example) or after several hours of sun exposure. Since skin cancer is very preventable, the CDC recommends school-level prevention programs including preventive curricula, family involvement, participation and support from the school's health services, and partnership with community, state, and national agencies and organizations to keep children away from excessive UV radiation exposure. Most skin cancer and sun protection data comes from Australia and the United States. An international study reported that Australians tended to demonstrate higher knowledge of sun protection and skin cancer knowledge, compared to other countries. Of children, adolescents, and adults, sunscreen was the most commonly used skin protection. However, many adolescents purposely used sunscreen with a low sun protection factor (SPF) in order to get a tan. Various Australian studies have shown that many adults failed to use sunscreen correctly; many applied sunscreen well after their initial sun exposure and/or failed to reapply when necessary. A 2002 case-control study in Brazil showed that only 3\\% of case participants and 11\\% of control participants used sunscreen with SPF >15. Cervical cancer The presence of cancer (adenocarcinoma) detected on a Pap test Cervical cancer ranks among the top three most common cancers among women in Latin America, sub-Saharan Africa, and parts of Asia. Cervical cytology screening aims to detect abnormal lesions in the cervix so that women can undergo treatment prior to the development of cancer. Given that high quality screening and follow-up care has been shown to reduce cervical cancer rates by up to 80\\%, most developed countries now encourage sexually active women to undergo a Pap test every 3\u20135 years. Finland and Iceland have developed effective organized programs with routine monitoring and have managed to significantly reduce cervical cancer mortality while using fewer resources than unorganized, opportunistic programs such as those in the United States or Canada. In developing nations in Latin America, such as Chile, Colombia, Costa Rica, and Cuba, both public and privately organized programs have offered women routine cytological screening since the 1970s. However, these efforts have not resulted in a significant change in cervical cancer incidence or mortality in these nations. This is likely due to low quality, inefficient testing. However, Puerto Rico, which has offered early screening since the 1960s, has witnessed almost a 50\\% decline in cervical cancer incidence and almost a four-fold decrease in mortality between 1950 and 1990. Brazil, Peru, India, and several high-risk nations in sub-Saharan Africa which lack organized screening programs, have a high incidence of cervical cancer. Colorectal cancer Colorectal cancer is globally the second most common cancer in women and the third-most common in men, and the fourth most common cause of cancer death after lung, stomach, and liver cancer, having caused 715,000 deaths in 2010. It is also highly preventable; about 80 percent of colorectal cancers begin as benign growths, commonly called polyps, which can be easily detected and removed during a colonoscopy. Other methods of screening for polyps and cancers include fecal occult blood testing. Lifestyle changes that may reduce the risk of colorectal cancer include increasing consumption of whole grains, fruits and vegetables, and reducing consumption of red meat (see Colorectal cancer). Health disparities and barriers to accessing care Access to healthcare and preventive health services is unequal, as is the quality of care received. A study conducted by the Agency for Healthcare Research and Quality (AHRQ) revealed health disparities in the United States. In the United States, elderly adults (>65 years old) received worse care and had less access to care than their younger counterparts. The same trends are seen when comparing all racial minorities (black, Hispanic, Asian) to white patients, and low-income people to high-income people. Common barriers to accessing and utilizing healthcare resources included lack of income and education, language barriers, and lack of health insurance. Minorities were less likely than whites to possess health insurance, as were individuals who completed less education. These disparities made it more difficult for the disadvantaged groups to have regular access to a primary care provider, receive immunizations, or receive other types of medical care.Disparities in Healthcare Quality Among Racial and Ethnic Groups: Selected Findings from the 2011 National Healthcare Quality and Disparities Reports. Fact Sheet. AHRQ Publication No. 12-0006-1-EF, September 2012. Agency for Healthcare Research and Quality, Rockville, MD. URL Additionally, uninsured people tend to not seek care until their diseases progress to chronic and serious states and they are also more likely to forgo necessary tests, treatments, and filling prescription medications. These sorts of disparities and barriers exist worldwide as well. Often, there are decades of gaps in life expectancy between developing and developed countries. For example, Japan has an average life expectancy that is 36 years greater than that in Malawi.Fact file on health inequities. (n.d.). Retrieved April 25, 2014, from World Health Organization website: URL Low-income countries also tend to have fewer physicians than high-income countries. In Nigeria and Myanmar, there are fewer than 4 physicians per 100,000 people while Norway and Switzerland have a ratio that is ten-fold higher. Common barriers worldwide include lack of availability of health services and healthcare providers in the region, great physical distance between the home and health service facilities, high transportation costs, high treatment costs, and social norms and stigma toward accessing certain health services.Jacobs, B., Ir, P., Bigdeli, M., Annear, P. L., & Damme, W. V. (2011). Addressing access barriers to health services: an analytical framework for selecting appropriate interventions in low-income Asian countries. Health Policy and Planning, 1-13. Economics of lifestyle-based prevention With lifestyle factors such as diet and exercise rising to the top of preventable death statistics, the economics of healthy lifestyle is a growing concern. There is little question that positive lifestyle choices provide an investment in health throughout life. To gauge success, traditional measures such as the quality years of life method (QALY), show great value. However, that method does not account for the cost of chronic conditions or future lost earnings because of poor health. Developing future economic models that would guide both private and public investments as well as drive future policy to evaluate the efficacy of positive lifestyle choices on health is a major topic for economists globally. US Americans spend over three trillion a year on health care but have a higher rate of infant mortality, shorter life expectancies, and a higher rate of diabetes than other high-income nations because of negative lifestyle choices. Despite these large costs, very little is spent on prevention for lifestyle-caused conditions in comparison. In 2016, the Journal of the American Medical Association estimated that $ 101 billion was spent in 2013 on the preventable disease of diabetes, and another $88 billion was spent on heart disease. In an effort to encourage healthy lifestyle choices, as of 2010 workplace wellness programs were on the rise but the economics and effectiveness data were continuing to evolve and develop. Health insurance coverage impacts lifestyle choices, even intermittent loss of coverage had negative effects on healthy choices in the US. The repeal of the Affordable Care Act (ACA) could significantly impact coverage for many Americans, as well as \u201cThe Prevention and Public Health Fund\u201d which is the US first and only mandatory funding stream dedicated to improving public health including counseling on lifestyle prevention issues, such as weight management, alcohol use, and treatment for depression. Because in the US chronic illnesses predominate as a cause of death and pathways for treating chronic illnesses are complex and multifaceted, prevention is a best practice approach to chronic disease when possible. In many cases, prevention requires mapping complex pathways to determine the ideal point for intervention. Cost-effectiveness of prevention is achievable, but impacted by the length of time it takes to see effects/outcomes of intervention. This makes prevention efforts difficult to fund\u2014particularly in strained financial contexts. Prevention potentially creates other costs as well, due to extending the lifespan and thereby increasing opportunities for illness. In order to assess the cost-effectiveness of prevention, the cost of the preventive measure, savings from avoiding morbidity, and the cost from extending the lifespan need to be considered. Life extension costs become smaller when accounting for savings from postponing the last year of life, which makes up a large fraction of lifetime medical expenditures and becomes cheaper with age. Prevention leads to savings only if the cost of the preventive measure is less than the savings from avoiding morbidity net of the cost of extending the life span. In order to establish reliable economics of prevention for illnesses that are complicated in origin, knowing how best to assess prevention efforts, i.e. developing useful measures and appropriate scope, is required. Effectiveness Overview There is no general consensus as to whether or not preventive healthcare measures are cost-effective, but they increase the quality of life dramatically. There are varying views on what constitutes a \"good investment.\" Some argue that preventive health measures should save more money than they cost, when factoring in treatment costs in the absence of such measures. Others have argued in favor of \"good value\" or conferring significant health benefits even if the measures do not save money. Furthermore, preventive health services are often described as one entity though they comprise a myriad of different services, each of which can individually lead to net costs, savings, or neither. Greater differentiation of these services is necessary to fully understand both the financial and health effects. A 2010 study reported that in the United States, vaccinating children, cessation of smoking, daily prophylactic use of aspirin, and screening of breast and colorectal cancers had the most potential to prevent premature death. Preventive health measures that resulted in savings included vaccinating children and adults, smoking cessation, daily use of aspirin, and screening for issues with alcoholism, obesity, and vision failure. These authors estimated that if usage of these services in the United States increased to 90\\% of the population, there would be net savings of $ 3.7 billion, which comprised only about -0.2\\% of the total 2006 United States healthcare expenditure. Despite the potential for decreasing healthcare spending, utilization of healthcare resources in the United States still remains low, especially among Latinos and African-Americans. Overall, preventive services are difficult to implement because healthcare providers have limited time with patients and must integrate a variety of preventive health measures from different sources. Gortmaker, S.L. et al. (2015) states: \"The four initial interventions were selected by the investigators to represent a broad range of nationally scalable strategies to reduce childhood obesity using a mix of both policy and programmatic strategies... 1. an excise tax of $0.01 per ounce of sweetened beverages, applied nationally and administered at the state level (SSB), 2. elimination of the tax deductibility of advertising costs of TV advertisements for \"nutritionally poor\" foods and beverages seen by children and adolescents (TV AD), 3. state policy requiring all public elementary schools in which physical education (PE) is currently provided to devote \u226550\\% of PE class time to moderate and vigorous physical activity (Active PE), and 4. state policy to make early child educational settings healthier by increasing physical activity, improving nutrition, and reducing screen time (ECE).\" The CHOICES found that SSB, TV AD, and ECE led to net cost savings. Both SSB and TV AD increased quality adjusted life years and produced yearly tax revenue of 12.5 billion US dollars and 80 million US dollars, respectively. Some challenges with evaluating the effectiveness of child obesity interventions include: The economic consequences of childhood obesity are both short and long term. In the short term, obesity impairs cognitive achievement and academic performance. Some believe this is secondary to negative effects on mood or energy, but others suggest there may be physiological factors involved. Furthermore, obese children have increased health care expenses (e.g. medications, acute care visits). In the long term, obese children tend to become obese adults with associated increased risk for a chronic condition such as diabetes or hypertension. Any effect on their cognitive development may also affect their contributions to society and socioeconomic status. In the CHOICES, it was noted that translating the effects of these interventions may in fact differ among communities throughout the nation. In addition it was suggested that limited outcomes are studied and these interventions may have an additional effect that is not fully appreciated. Modeling outcomes in such interventions in children over the long term is challenging because advances in medicine and medical technology are unpredictable. The projections from cost-effective analysis may need to be reassessed more frequently. Economics of US preventive care As of 2009, the cost-effectiveness of preventive care is a highly debated topic. While some economists argue that preventive care is valuable and potentially cost saving, others believe it is an inefficient waste of resources. Preventive care is composed of a variety of clinical services and programs including annual doctor's check-ups, annual immunizations, and wellness programs; recent models show that these simple interventions can have significant economic impacts. Clinical preventive services & programs Research on preventive care addresses the question of whether it is cost saving or cost effective and whether there is an economics evidence base for health promotion and disease prevention. The need for and interest in preventive care is driven by the imperative to reduce health care costs while improving quality of care and the patient experience. Preventive care can lead to improved health outcomes and cost savings potential. Services such as health assessments/screenings, prenatal care, and telehealth and telemedicine can reduce morbidity or mortality with low cost or cost savings.Merkur, S., Sassi, F., & McDaid, D. (2013). Promoting health, preventing disease: Is there an economic case? European Observatory on Health Systems and Policies. Retrieved from URL Specifically, health assessments/screenings have cost savings potential, with varied cost-effectiveness based on screening and assessment type. Inadequate prenatal care can lead to an increased risk of prematurity, stillbirth, and infant death. Time is the ultimate resource and preventive care can help mitigate the time costs.Folland, S., Goodman, A., & Stano, M. (2013). The economics of health and health care. (7th ed.). Upper Saddle River: Pearson Education. Telehealth and telemedicine is one option that has gained consumer interest, acceptance and confidence and can improve quality of care and patient satisfaction.American Hospital Association. (2015, Jan). The Promise of Telehealth for Hospitals, Health Systems and Their Communities. Retrieved from URL Economics for investment There are benefits and trade-offs when considering investment in preventive care versus other types of clinical services. Preventive care can be a good investment as supported by the evidence base and can drive population health management objectives. The concepts of cost saving and cost-effectiveness are different and both are relevant to preventive care. For example, preventive care that may not save money may still provide health benefits. Thus, there is a need to compare interventions relative to impact on health and cost.Robert Wood Johnson Foundation. (2009). The cost savings and cost-effectiveness of clinical preventive care. The Synthesis Project: New Insights from Research Results. Research Synthesis Report No. 18. Preventive care transcends demographics and is applicable to people of every age. The Health Capital Theory underpins the importance of preventive care across the lifecycle and provides a framework for understanding the variances in health and health care that are experienced. It treats health as a stock that provides direct utility. Health depreciates with age and the aging process can be countered through health investments. The theory further supports that individuals demand good health, that the demand for health investment is a derived demand (i.e. investment is health is due to the underlying demand for good health), and the efficiency of the health investment process increases with knowledge (i.e. it is assumed that the more educated are more efficient consumers and producers of health). The prevalence elasticity of demand for prevention can also provide insights into the economics. Demand for preventive care can alter the prevalence rate of a given disease and further reduce or even reverse any further growth of prevalence. Reduction in prevalence subsequently leads to reduction in costs. There are a number of organizations and policy actions that are relevant when discussing the economics of preventive care services. The evidence base, viewpoints, and policy briefs from the Robert Wood Johnson Foundation, the Organisation for Economic Co-operation and Development (OECD), and efforts by the U.S. Preventive Services Task Force (USPSTF) all provide examples that improve the health and well-being of populations (e.g. preventive health assessments/screenings, prenatal care, and telehealth/telemedicine). The Patient Protection and Affordable Care Act (PPACA, ACA) has major influence on the provision of preventive care services, although it is currently under heavy scrutiny and review by the new administration. According to the Centers for Disease Control and Prevention (CDC), the ACA makes preventive care affordable and accessible through mandatory coverage of preventive services without a deductible, copayment, coinsurance, or other cost sharing.Centers for Disease Control and Prevention. (2013). Preventive Health Care. Retrieved from URL The U.S. Preventive Services Task Force (USPSTF), a panel of national experts in prevention and evidence-based medicine, works to improve health of Americans by making evidence-based recommendations about clinical preventive services.U.S. Preventive Services Task Force (USPSTF). (2017, Jan). USPSTF A and B Recommendations. Retrieved from URL They do not consider the cost of a preventive service when determining a recommendation. Each year, the organization delivers a report to Congress that identifies critical evidence gaps in research and recommends priority areas for further review.U.S. Preventive Services Task Force (USPSTF). (2016, Dec). Reports to Congress. Retrieved from URL The National Network of Perinatal Quality Collaboratives (NNPQC), sponsored by the CDC, supports state-based perinatal quality collaboratives (PQCs) in measuring and improving upon health care and health outcomes for mothers and babies. These PQCs have contributed to improvements such as reduction in deliveries before 39 weeks, reductions in healthcare associated bloodstream infections, and improvements in the utilization of antenatal corticosteroids.Centers for Disease Control and Prevention. (2017, Feb. 27). Perinatal Quality Collaboratives. Retrieved from URL Telehealth and telemedicine has realized significant growth and development recently. The Center for Connected Health Policy (The National Telehealth Policy Resource Center) has produced multiple reports and policy briefs on the topic of Telehealth and Telemedicine and how they contribute to preventive services.Center for Connected Health Policy. The National Telehealth Policy Resource Center. Reports and Policy Briefs. Retrieved from URL Policy actions and provision of preventive services do not guarantee utilization. Reimbursement has remained a significant barrier to adoption due to variances in payer and state level reimbursement policies and guidelines through government and commercial payers. Americans use preventive services at about half the recommended rate and cost-sharing, such as deductibles, co-insurance, or copayments, also reduce the likelihood that preventive services will be used. Further, despite the ACA's enhancement of Medicare benefits and preventive services, there were no effects on preventive service utilization, calling out the fact that other fundamental barriers exist. The Affordable Care Act and preventive healthcare The Patient Protection and Affordable Care Act, also known as just the Affordable Care Act or Obamacare, was passed and became law in the United States on March 23, 2010. The finalized and newly ratified law was to address many issues in the U.S. healthcare system, which included expansion of coverage, insurance market reforms, better quality, and the forecast of efficiency and costs. Under the insurance market reforms the act required that insurance companies no longer exclude people with pre-existing conditions, allow for children to be covered on their parents' plan until the age of 26, and expand appeals that dealt with reimbursement denials. The Affordable Care Act also banned the limited coverage imposed by health insurances, and insurance companies were to include coverage for preventive health care services. The U.S. Preventive Services Task Force has categorized and rated preventive health services as either \u2018\u201dA\u201d or \u201cB\u201d, as to which insurance companies must comply and present full coverage. Not only has the U.S. Preventive Services Task Force provided graded preventive health services that are appropriate for coverage, they have also provided many recommendations to clinicians and insurers to promote better preventive care to ultimately provide better quality of care and lower the burden of costs. Health insurance Healthcare insurance companies are willing to pay for preventive care despite the fact that patients are not acutely sick in hope that it will prevent them from developing a chronic disease later on in life. Today, health insurance plans offered through the Marketplace, mandated by the Affordable Care Act are required to provide certain preventive care services free of charge to patients. Section 2713 of the Affordable Care Act, specifies that all private Marketplace and all employer-sponsored private plans (except those grandfathered in) are required to cover preventive care services that are ranked A or B by the US Preventive Services Task Force free of charge to patients. For example, UnitedHealthcare insurance company has published patient guidelines at the beginning of the year explaining their preventive care coverage. Evaluating incremental benefits Evaluating the incremental benefits of preventive care requires a longer period of time when compared to acutely ill patients. Inputs into the model such as discounting rate and time horizon can have significant effects on the results. One controversial subject is use of a 10-year time frame to assess cost effectiveness of diabetes preventive services by the Congressional Budget Office. Preventive care services mainly focus on chronic disease. The Congressional Budget Office has provided guidance that further research is needed in the area of the economic impacts of obesity in the US before the CBO can estimate budgetary consequences. A bipartisan report published in May 2015 recognizes the potential of preventive care to improve patients' health at individual and population levels while decreasing the healthcare expenditure. Economic case Mortality from modifiable risk factors Chronic diseases such as heart disease, stroke, diabetes, obesity and cancer have become the most common and costly health problems in the United States. In 2014, it was projected that by 2023 that the number of chronic disease cases would increase by 42\\%, resulting in $ 4.2 trillion in treatment and lost economic output.Milken Institute. (January 2014). Checkup Time, Chronic Disease and Wellness in America: Measuring the Economic Burden in a Changing Nation. Accessed 3/23/18 from URL They are also among the top ten leading causes of mortality.Centers for Disease Control and Prevention. CDC National Health Report Highlights. Accessed 3/18/18 from URL Chronic diseases are driven by risk factors that are largely preventable. Sub-analysis performed on all deaths in the United States in the year 2000 revealed that almost half were attributed to preventable behaviors including tobacco, poor diet, physical inactivity and alcohol consumption. More recent analysis reveals that heart disease and cancer alone accounted for nearly 46\\% of all deaths.Centers for Disease Control and Prevention. (2017). Chronic Diseases Overview. Accessed 3/18/18 from URL Modifiable risk factors are also responsible for a large morbidity burden, resulting in poor quality of life in the present and loss of future life earning years. It is further estimated that by 2023, focused efforts on the prevention and treatment of chronic disease may result in 40 million fewer chronic disease cases, potentially reducing treatment costs by $220 billion. Childhood vaccinations Childhood immunizations are largely responsible for the increase in life expectancy in the 20th century. From an economic standpoint, childhood vaccines demonstrate a very high return on investment. According to Healthy People 2020, for every birth cohort that receives the routine childhood vaccination schedule, direct health care costs are reduced by $ 9.9 billion and society saves $33.4 billion in indirect costs.Healthy People 2020. Immunization and Infectious Diseases: Overview. Accessed 3/18/18 from URL The economic benefits of childhood vaccination extend beyond individual patients to insurance plans and vaccine manufacturers, all while improving the health of the population. Health capital theory The burden of preventable illness extends beyond the healthcare sector, incurring costs related to lost productivity among workers in the workforce. Indirect costs related to poor health behaviors and associated chronic disease costs U.S. employers billions of dollars each year. According to the American Diabetes Association (ADA), medical costs for employees with diabetes are twice as high as for workers without diabetes and are caused by work-related absenteeism ($ 5 billion), reduced productivity at work ($20.8 billion), inability to work due to illness-related disability ($21.6 billion), and premature mortality ($18.5 billion). Reported estimates of the cost burden due to increasingly high levels of overweight and obese members in the workforce vary, with best estimates suggesting 450 million more missed work days, resulting in $153 billion each year in lost productivity, according to the CDC Healthy URL The Health Capital model explains how individual investments in health can increase earnings by \u201c increasing the number of healthy days available to work and to earn income. \u201d Folland, S., Goodman, A.C., & Stano, M. (2016). Demand for Health Capital. The Economics of Health and Healthcare, 7th ed. (p. 130). New York, NY: Routledge. In this context, health can be treated both as a consumption good, wherein individuals desire health because it improves quality of life in the present, and as an investment good because of its potential to increase attendance and workplace productivity over time. Preventive health behaviors such as healthful diet, regular exercise, access to and use of well-care, avoiding tobacco, and limiting alcohol can be viewed as health inputs that result in both a healthier workforce and substantial cost savings. Quality adjusted life years Health benefits of preventive care measures can be described in terms of quality-adjusted life-years (QALYs) saved. A QALY takes into account length and quality of life, and is used to evaluate the cost-effectiveness of medical and preventive interventions. Classically, one year of perfect health is defined as 1 QALY and a year with any degree of less than perfect health is assigned a value between 0 and 1 QALY.The Synthesis Project, Policy Brief No. 18. (September 2009). Cost savings and cost-effectiveness of clinical preventive care. Robert Wood Johnson Foundation. Accessed 3/18/18 from URL As an economic weighting system, the QALY can be used to inform personal decisions, to evaluate preventive interventions and to set priorities for future preventive efforts. Cost-saving and cost-effective benefits of preventive care measures are well established. The Robert Wood Johnson Foundation evaluated the prevention cost-effectiveness literature, and found that many preventive measures meet the benchmark of < $100,000 per QALY and are considered to be favorably cost-effective. These include screenings for HIV and chlamydia, cancers of the colon, breast and cervix, vision screening, and screening for abdominal aortic aneurysms in men >60 in certain populations. Alcohol and tobacco screening were found to be cost-saving in some reviews and cost-effective in others. According to the RWJF analysis, two preventive interventions were found to save costs in all reviews: childhood immunizations and counseling adults on the use of aspirin. Minority populations Health disparities are increasing in the United States for chronic diseases such as obesity, diabetes, cancer, and cardiovascular disease. Populations at heightened risk for health inequities are the growing proportion of racial and ethnic minorities, including African Americans, American Indians, Hispanics/Latinos, Asian Americans, Alaska Natives and Pacific Islanders.The Association of State and Territorial Health Officials. (2012). The economic case for health equity. Accessed 3/18/18 from URL According to the Racial and Ethnic Approaches to Community Health (REACH), a national CDC program, non-Hispanic blacks currently have the highest rates of obesity (48\\%), and risk of newly diagnosed diabetes is 77\\% higher among non-Hispanic blacks, 66\\% higher among Hispanics/Latinos and 18\\% higher among Asian Americans compared to non-Hispanic whites. Current U.S. population projections predict that more than half of Americans will belong to a minority group by 2044.Colby, S.L., & Ortman, J.M. (March, 2015). Projections of the size and composition of the U.S. population: 2014-2060. United States Census Bureau: Current Population Reports, pp. 25-1143. Accessed 3/18/18 from URL Without targeted preventive interventions, medical costs from chronic disease inequities will become unsustainable. Broadening health policies designed to improve delivery of preventive services for minority populations may help reduce substantial medical costs caused by inequities in health care, resulting in a return on investment. Policies Chronic disease is a population level issue that requires population health level efforts and national and state level public policy to effectively prevent, rather than individual level efforts. The United States currently employs many public health policy efforts aligned with the preventive health efforts discussed above. For instance, the Centers for Disease Control and Prevention support initiatives such as Health in All Policies and HI-5 (Health Impact in 5 Years), collaborative efforts that aim to consider prevention across sectorsCenters for Disease Control and Prevention. (9 June 2016). Health in All Policies. Accessed 3/18/2018 from: URL and address social determinants of health as a method of primary prevention for chronic disease.Centers for Disease Control and Prevention. (21 Oct 2016). Health Impact in 5 Years. Accessed 3/18/2018 from: URL Specific examples of programs targeting vaccination and obesity prevention in childhood are discussed in the sections to follow. Obesity Policies that address the obesity epidemic should be proactive and far-reaching, including a variety of stakeholders both in healthcare and in other sectors. Recommendations from the Institute of Medicine in 2012 suggest that \u201c\u2026concerted action be taken across and within five environments (physical activity (PA), food and beverage, marketing and messaging, healthcare and worksites, and schools) and all sectors of society (including government, business and industry, schools, child care, urban planning, recreation, transportation, media, public health, agriculture, communities, and home) in order for obesity prevention efforts to truly be successful.\u201d There are dozens of current policies acting at either (or all of) the federal, state, local and school levels. Most states employ a physical education requirement of 150 minutes of physical education per week at school, a policy of the National Association of Sport and Physical Education. In some cities, including Philadelphia, a sugary food tax is employed. This is a part of an amendment to Title 19 of the Philadelphia Code, \u201cFinance, Taxes and Collections\u201d; Chapter 19-4100, \u201cSugar-Sweetened Beverage Tax, that was approved 2016, which establishes an excise tax of $ 0.015 per fluid ounce on distributors of beverages sweetened with both caloric and non-caloric sweeteners.City of Philadelphia. Bill No. 160176. Accessed 3/18/18 from URL Distributors are required to file a return with the department, and the department can collect taxes, among other responsibilities. %DIFDELCMD < %DIFDELCMD < %%% These policies can be a source of tax credits. For example, under the Philadelphia policy, businesses can apply for tax credits with the revenue department on a first-come, first-served basis. This applies until the total amount of credits for a particular year reaches one million dollars. Healthy Food Policy Project. (2017). Accessed 3/18/18 from URL Recently, advertisements for food and beverages directed at children have received much attention. The Children's Food and Beverage Advertising Initiative (CFBAI) is a self-regulatory program of the food industry. Each participating company makes a public pledge that details its commitment to advertise only foods that meet certain nutritional criteria to children under 12 years old. Council for Better Business Bureaus, Inc. (2018). Accessed 3/18/18 from URL This is a self-regulated program with policies written by the Council of Better Business Bureaus. The Robert Wood Johnson Foundation funded research to test the efficacy of the CFBAI. The results showed progress in terms of decreased advertising of food products that target children and adolescents.Frazier, W.C. Harris, J.L. (June 2017). Trends in television food advertising to young people: 2016 update. Accessed 3/18/18 from URL Childhood immunization policies %DIFDELCMD < %DIFDELCMD < %%% Despite nationwide controversies over childhood vaccination and immunization, there are policies and programs at the federal, state, local and school levels outlining vaccination requirements. All states require children to be vaccinated against certain communicable diseases as a condition for school attendance. However, currently 18 states allow exemptions for \u201c philosophical or moral reasons. \u201d Diseases for which vaccinations form part of the standard ACIP vaccination schedule are diphtheria tetanus pertussis (whooping cough), poliomyelitis (polio), measles, mumps, rubella, haemophilus influenzae type b, hepatitis B, influenza, and pneumococcal infections. Immunization Action Coalition. (2018). State mandates on immunization and vaccine-preventable diseases. Accessed 3/18/18 from URL These schedules can be viewed on the CDC website .Centers for Disease Control and Prevention. (2018). Recommended immunization schedule for children and adolescents aged 18 years or younger, United States, 2018. Accessed 3/18/18 from URL The CDC website describes a federally funded program, Vaccines for Children (VFC), which provides vaccines at no cost to children who might not otherwise be vaccinated because of inability to pay. Additionally, the Advisory Committee on Immunization Practices (ACIP) Advisory Committee on Immunization Practices. Accessed 3/18/18 from URL is an expert vaccination advisory board that informs vaccination policy and guides on-going recommendations to the CDC, incorporating the most up-to-date cost-effectiveness and risk-benefit evidence in its recommendations.", "after_revision": "200px| Immunization against diseases is a key preventive healthcare measure. Preventive healthcare, or prophylaxis, consists of measures taken for disease prevention.Hugh R. Leavell and E. Gurney Clark as \"the science and art of preventing disease, prolonging life, and promoting physical and mental health and efficiency. Leavell, H. R., & Clark, E. G. (1979). Preventive Medicine for the Doctor in his Community (3rd ed.). Huntington, NY: Robert E. Krieger Publishing Company. Disease and disability are affected by environmental factors, genetic predisposition, disease agents, and lifestyle choices , and are dynamic processes which begin before individuals realize they are affected. Disease prevention relies on anticipatory actions that can be categorized as primal, primary, secondary, and tertiary prevention. Each year, millions of people die of preventable deaths. A 2004 study showed that about half of all deaths in the United States in 2000 were due to preventable behaviors and exposures. Leading causes included cardiovascular disease, chronic respiratory disease, unintentional injuries, diabetes, and certain infectious diseases. This same study estimates that 400,000 people die each year in the United States due to poor diet and a sedentary lifestyle. According to estimates made by the World Health Organization (WHO), about 55 million people died worldwide in 2011, two thirds of this group from non-communicable diseases, including cancer, diabetes, and chronic cardiovascular and lung URL This is an increase from the year 2000, during which 60\\% of deaths were attributed to these diseases. Preventive healthcare is especially important given the worldwide rise in prevalence of chronic diseases and deaths from these diseases. There are many methods for prevention of disease. One of them is prevention of teenage smoking through information giving.LeChelle Saunders, BSc: Smoking is Critical to Our Health. Be Smart, Don\u2019t Start It is recommended that adults and children aim to visit their doctor for regular check-ups, even if they feel healthy, to perform disease screening, identify risk factors for disease, discuss tips for a healthy and balanced lifestyle, stay up to date with immunizations and boosters, and maintain a good relationship with a healthcare provider. In pediatrics, some common examples of primary prevention are encouraging parents to turn down the temperature of their home water heater in order to avoid scalding burns, encouraging children to wear bicycle helmets, and suggesting that people use the Air Quality Index (AQI) to check the level of pollution in the outside air before engaging in sporting activities. Some common disease screenings include checking for hypertension (high blood pressure), hyperglycemia (high blood sugar, a risk factor for diabetes mellitus), hypercholesterolemia (high blood cholesterol), screening for colon cancer, depression, HIV and other common types of sexually transmitted disease such as chlamydia, syphilis, and gonorrhea, mammography (to screen for breast cancer), colorectal cancer screening, a Pap test (to check for cervical cancer), and screening for osteoporosis. Genetic testing can also be performed to screen for mutations that cause genetic disorders or predisposition to certain diseases such as breast or ovarian cancer. However, these measures are not affordable for every individual and the cost effectiveness of preventive healthcare is still a topic of debate. Levels of prevention Preventive healthcare strategies are described as taking place at the primal, primary,Goldston, S. E. (Ed.). (1987). Concepts of primary prevention: A framework for program development. Sacramento, California Department of Mental Health secondary, and tertiary prevention levels. Although advocated as preventive medicine in the early twentieth century by Sara Josephine Baker,Baker, Sara Josephine. Fighting for Life.1939. in the 1940s, Hugh R. Leavell and E. Gurney Clark coined the term primary prevention. They worked at the Harvard and Columbia University Schools of Public Health, respectively, and later expanded the levels to include secondary and tertiary prevention. Goldston (1987) notes that these levels might be better described as \"prevention, treatment, and rehabilitation\", although the terms primary, secondary, and tertiary prevention are still in use today. The concept of primal prevention has been created much more recently, in relation to the new developments in molecular biology over the last fifty years,Darnell, James, RNA, Life's Indispensable Molecule, Cold Spring Harbor Laboratory Press, 2011 more particularly in epigenetics, which point to the paramount importance of environmental conditions , both physical and affective , on the organism during its fetal and newborn life , or so-called primal period of life . Primal and primordial prevention Primal prevention has been propounded as a separate category of health promotion. This health promotion par URL is based on knowledge in molecular biology, in particular on epigenetics, which points to how much affective as well as physical environment during fetal and newborn life may determine adult health.Perry, Bruce D, Maltreated Children: Experience, Brain Development and the Next Generation, Norton Professional Books, 1996Scherrer et al., Systemic and Pulmonary Vascular Dysfunction in Children Conceived by Assisted Reproductive Technologies, Swiss Cardiovascular Center, Bern, CH; Facultad de Ciencias, Departamento de Biologia, Tarapaca, Arica, Chile: Hirslander Group, Lausanne, CH; Botnar Cemter for Extreme Medicine and Department of Internal Medicine, CHUV, Lausanne, CH, and Centre de Procr\u00e9ation M\u00e9dicalement Assist\u00e9e, Lausanne, CH, 2012 This way of promoting health consists mainly in providing future parents with pertinent, unbiased information on primal health and supporting them during their child's primal period of life (i.e., \"from conception to first anniversary\" according to definition by the Primal Health Research Centre, London). This includes adequate parental leave, ideally for both parents with kin caregiving and financial help where needed.Garcia, Patricia, Why Silicon Valley\u2019s Paid Leave Policies Need to Go Viral, Vogue, culture, opinion, 2015 Scientific advancements in genetics have contributed to the knowledge of hereditary diseases and have facilitated progress in specific protective measures in individuals who are carriers of a disease gene or have an increased predisposition to a specific disease. Genetic testing has allowed physicians to make quicker and more accurate diagnoses and has allowed for tailored treatments or personalized medicine. Similarly, specific protective measures such as water purification, sewage treatment, and the development of personal hygienic routines , such as regular hand-washing, safe sex to prevent sexually transmitted infections , became mainstream upon the discovery of infectious disease agents and have decreased the rates of communicable diseases which are spread in unsanitary conditions. Secondary prevention Secondary prevention deals with latent diseases and attempts to prevent an asymptomatic disease from progressing to symptomatic disease. Certain diseases can be classified as primary or secondary. This depends on definitions of what constitutes a disease, though, in general, primary prevention addresses the root cause of a disease or injury whereas secondary prevention aims to detect and treat a disease early URL Secondary prevention consists of \"early diagnosis and prompt treatment\" to contain the disease and prevent its spread to other individuals, and \"disability limitation\" to prevent potential future complications and disabilities from the disease. Early diagnosis and prompt treatment for a syphilis patient would include a course of antibiotics to destroy the pathogen and screening and treatment of any infants born to syphilitic mothers. Disability limitation for syphilitic patients includes continued check-ups on the heart, cerebrospinal fluid, and central nervous system of patients to curb any damaging effects such as blindness or paralysis. Leading causes of preventable death %DIFDELCMD < %DIFDELCMD < %%% United States The leading cause of death in the United States was tobacco ; however , poor diet and lack of exercise may soon surpass tobacco as a leading cause of death. These behaviors are modifiable and public health and prevention efforts could make a difference to reduce these deaths. + Leading causes of preventable deaths in the United States in the year 2000CauseDeaths caused\\% of all deathsTobacco smoking 435, 00018.1 Poor diet and physical inactivity400,00016.6Alcohol consumption85,0003.5Infectious diseases75,0003.1Toxicants55,0002.3Traffic collisions43,0001.8Firearm incidents29,0001.2Sexually transmitted infections20,0000.8Drug abuse17,0000.7 Worldwide The leading causes of preventable death worldwide share similar trends to the United States. There are a few differences between the two, such as malnutrition, pollution, and unsafe sanitation, that reflect health disparities between the developing and developed world. + Leading causes of preventable death worldwide as of the year 2001CauseDeaths caused (millions per year) Hypertension7.8Smoking5.0High cholesterol3.9Malnutrition3.8Sexually transmitted infections3.0Poor diet2.8Overweight and obesity2.5Physical inactivity2.0Alcohol1.9 Indoor air pollution from solid fuels1.8 Unsafe water and poor sanitation1.6 + Leading preventive interventions as of 2003 reducing deaths in children 0\u20135 years old worldwideInterventionPercent of all child deaths preventableBreastfeeding13Insecticide-treated materials7Complementary feeding6Zinc4Clean delivery4Hib vaccine4Water , sanitation, hygiene3Antenatal steroids3Newborn temperature management2Vitamin A2Tetanus toxoid2Nevirapine and replacement feeding2Antibiotics for premature rupture of membranes1Measles vaccine1Antimalarial intermittent preventive treatment in pregnancy<1\\% Preventive methods %DIFDELCMD < %DIFDELCMD < %%% Obesity Obesity is a major risk factor for a wide variety of conditions including cardiovascular diseases, hypertension, certain cancers, and type 2 diabetes. In order to prevent obesity, it is recommended that individuals adhere to a consistent exercise regimen as well as a nutritious and balanced diet. A healthy individual should aim for acquiring 10\\% of their energy from proteins, 15-20\\% from fat, and over 50\\% from complex carbohydrates, while avoiding alcohol as well as foods high in fat, salt, and sugar. Sedentary adults should aim for at least half an hour of moderate-level daily physical activity and eventually increase to include at least 20 minutes of intense exercise, three times a week. Preventive health care offers many benefits to those that chose to participate in taking an active role in the culture. The medical system in our society is geared toward curing acute symptoms of disease after the fact that they have brought us into the emergency room. An ongoing epidemic within American culture is the prevalence of obesity. Healthy eating and regular exercise play a significant role in reducing an individual's risk for type 2 diabetes. A 2008 study concluded that about 23.6 million people in the United States had diabetes, including 5.7 million that had not been diagnosed. Ninety to 95 percent of people with diabetes have type 2 diabetes. Diabetes is the main cause of kidney failure, limb amputation, and new-onset blindness in American URL Sexually transmitted infections U.S. propaganda poster Fool the Axis Use Prophylaxis, 1942 Sexually transmitted infections (STIs), such as syphilis and HIV, are common but preventable with safe-sex practices. STIs can be asymptomatic, or cause a range of symptoms. Preventive measures for STIs are called prophylactics. The term especially applies to the use of condoms, which are highly effective at preventing URL but also to other devices meant to prevent STIs, such as dental dams and latex gloves. Other means for preventing STIs include education on how to use condoms or other such barrier devices, testing partners before having unprotected sex, receiving regular STI screenings, to both receive treatment and prevent spreading STIs to partners, and, specifically for HIV, regularly taking prophylactic antiretroviral drugs, such as Truvada. Post-exposure prophylaxis, started within 72 hours (optimally less than 1 hour) after exposure to high-risk fluids, can also protect against HIV transmission. Thrombosis is a serious circulatory disease affecting thousands, usually older persons undergoing surgical procedures, women taking oral contraceptives and travelers. The consequences of thrombosis can be heart attacks and strokes. Prevention can include exercise, anti-embolism stockings, pneumatic devices, and pharmacological treatments. Lung cancer Distribution of lung cancer in the United States Lung cancer is the leading cause of cancer-related deaths in the United States and Europe and is a major cause of death in other countries. Tobacco is an environmental carcinogen and the major underlying cause of lung cancer. Between 25\\% and 40\\% of all cancer deaths and about 90\\% of lung cancer cases are associated with tobacco use. Other carcinogens include asbestos and radioactive materials. Both smoking and second-hand exposure from other smokers can lead to lung cancer and eventually death. Prevention of tobacco use is paramount to prevention of lung cancer. %DIFDELCMD < %DIFDELCMD < %%% Individual, community, and statewide interventions can prevent or cease tobacco use. 90\\% of adults in the U.S. who have ever smoked did so prior to the age of 20. In-school prevention/educational programs, as well as counseling resources, can help prevent and cease adolescent smoking. Other cessation techniques include group support programs, nicotine replacement therapy (NRT), hypnosis, and self-motivated behavioral change. Studies have shown long term success rates (>1 year) of 20\\% for hypnosis and 10\\%-20\\% for group therapy. Legislation can also affect smoking prevention and cessation. In 1992, Massachusetts (United States) voters passed a bill adding an extra 25 cent tax to each pack of cigarettes, despite intense lobbying and $7.3 million spent by the tobacco industry to oppose this bill. Tax revenue goes toward tobacco education and control programs and has led to a decline of tobacco use in the state. Lung cancer and tobacco smoking are increasing worldwide, especially in China. China is responsible for about one-third of the global consumption and production of tobacco products. Tobacco control policies have been ineffective as China is home to 350 million regular smokers and 750 million passive smokers and the annual death toll is over 1 million. Recommended actions to reduce tobacco use include decreasing tobacco supply, increasing tobacco taxes, widespread educational campaigns, decreasing advertising from the tobacco industry, and increasing tobacco cessation support resources. In Wuhan, China, a 1998 school-based program implemented an anti-tobacco curriculum for adolescents and reduced the number of regular smokers, though it did not significantly decrease the number of adolescents who initiated smoking. This program was therefore effective in secondary but not primary prevention and shows that school-based programs have the potential to reduce tobacco use. Skin cancer An image of melanoma, one of the deadliest forms of skin cancer Skin cancer is the most common cancer in the United States.MMWR. Recommendations and Reports : Morbidity and Mortality Weekly Report. Recommendations and Reports / Centers for Disease Control [2002, 51(RR-4):1-18] The most lethal form of skin cancer, melanoma, leads to over 50,000 annual deaths in the United States. Childhood prevention is particularly important because a significant portion of ultraviolet radiation exposure from the sun occurs during childhood and adolescence and can subsequently lead to skin cancer in adulthood. Furthermore, childhood prevention can lead to the development of healthy habits that continue to prevent cancer for a lifetime. The Centers for Disease Control and Prevention (CDC) recommends several primary prevention methods including: limiting sun exposure between 10 AM and 4 PM, when the sun is strongest, wearing tighter-weave natural cotton clothing, wide-brim hats, and sunglasses as protective covers, using sunscreens that protect against both UV-A and UV-B rays, and avoiding tanning salons. Sunscreen should be reapplied after sweating, exposure to water (through swimming for example) or after several hours of sun exposure. Since skin cancer is very preventable, the CDC recommends school-level prevention programs including preventive curricula, family involvement, participation and support from the school's health services, and partnership with community, state, and national agencies and organizations to keep children away from excessive UV radiation exposure. Most skin cancer and sun protection data comes from Australia and the United States. An international study reported that Australians tended to demonstrate higher knowledge of sun protection and skin cancer knowledge, compared to other countries. Of children, adolescents, and adults, sunscreen was the most commonly used skin protection. However, many adolescents purposely used sunscreen with a low sun protection factor (SPF) in order to get a tan. Various Australian studies have shown that many adults failed to use sunscreen correctly; many applied sunscreen well after their initial sun exposure and/or failed to reapply when necessary. A 2002 case-control study in Brazil showed that only 3\\% of case participants and 11\\% of control participants used sunscreen with SPF >15. Cervical cancer The presence of cancer (adenocarcinoma) detected on a Pap test Cervical cancer ranks among the top three most common cancers among women in Latin America, sub-Saharan Africa, and parts of Asia. Cervical cytology screening aims to detect abnormal lesions in the cervix so that women can undergo treatment prior to the development of cancer. Given that high quality screening and follow-up care has been shown to reduce cervical cancer rates by up to 80\\%, most developed countries now encourage sexually active women to undergo a Pap test every 3\u20135 years. Finland and Iceland have developed effective organized programs with routine monitoring and have managed to significantly reduce cervical cancer mortality while using fewer resources than unorganized, opportunistic programs such as those in the United States or Canada. In developing nations in Latin America, such as Chile, Colombia, Costa Rica, and Cuba, both public and privately organized programs have offered women routine cytological screening since the 1970s. However, these efforts have not resulted in a significant change in cervical cancer incidence or mortality in these nations. This is likely due to low quality, inefficient testing. However, Puerto Rico, which has offered early screening since the 1960s, has witnessed almost a 50\\% decline in cervical cancer incidence and almost a four-fold decrease in mortality between 1950 and 1990. Brazil, Peru, India, and several high-risk nations in sub-Saharan Africa which lack organized screening programs, have a high incidence of cervical cancer. Colorectal cancer Colorectal cancer is globally the second most common cancer in women and the third-most common in men, and the fourth most common cause of cancer death after lung, stomach, and liver cancer, having caused 715,000 deaths in 2010. It is also highly preventable; about 80 percent of colorectal cancers begin as benign growths, commonly called polyps, which can be easily detected and removed during a colonoscopy. Other methods of screening for polyps and cancers include fecal occult blood testing. Lifestyle changes that may reduce the risk of colorectal cancer include increasing consumption of whole grains, fruits and vegetables, and reducing consumption of red meat. Health disparities and barriers to accessing care Access to healthcare and preventive health services is unequal, as is the quality of care received. A study conducted by the Agency for Healthcare Research and Quality (AHRQ) revealed health disparities in the United States. In the United States, elderly adults (>65 years old) received worse care and had less access to care than their younger counterparts. The same trends are seen when comparing all racial minorities (black, Hispanic, Asian) to white patients, and low-income people to high-income people. Common barriers to accessing and utilizing healthcare resources included lack of income and education, language barriers, and lack of health insurance. Minorities were less likely than whites to possess health insurance, as were individuals who completed less education. These disparities made it more difficult for the disadvantaged groups to have regular access to a primary care provider, receive immunizations, or receive other types of medical care.Disparities in Healthcare Quality Among Racial and Ethnic Groups: Selected Findings from the 2011 National Healthcare Quality and Disparities Reports. Fact Sheet. AHRQ Publication No. 12-0006-1-EF, September 2012. Agency for Healthcare Research and Quality, Rockville, MD. URL Additionally, uninsured people tend to not seek care until their diseases progress to chronic and serious states and they are also more likely to forgo necessary tests, treatments, and filling prescription medications. These sorts of disparities and barriers exist worldwide as well. Often, there are decades of gaps in life expectancy between developing and developed countries. For example, Japan has an average life expectancy that is 36 years greater than that in URL Low-income countries also tend to have fewer physicians than high-income countries. In Nigeria and Myanmar, there are fewer than 4 physicians per 100,000 people while Norway and Switzerland have a ratio that is ten-fold higher. Common barriers worldwide include lack of availability of health services and healthcare providers in the region, great physical distance between the home and health service facilities, high transportation costs, high treatment costs, and social norms and stigma toward accessing certain health services.Jacobs, B., Ir, P., Bigdeli, M., Annear, P. L., & Damme, W. V. (2011). Addressing access barriers to health services: an analytical framework for selecting appropriate interventions in low-income Asian countries. Health Policy and Planning, 1-13. Economics of lifestyle-based prevention With lifestyle factors such as diet and exercise rising to the top of preventable death statistics, the economics of healthy lifestyle is a growing concern. There is little question that positive lifestyle choices provide an investment in health throughout life. To gauge success, traditional measures such as the quality years of life method (QALY), show great value. However, that method does not account for the cost of chronic conditions or future lost earnings because of poor health. Developing future economic models that would guide both private and public investments as well as drive future policy to evaluate the efficacy of positive lifestyle choices on health is a major topic for economists globally. Americans spend over three trillion a year on health care but have a higher rate of infant mortality, shorter life expectancies, and a higher rate of diabetes than other high-income nations because of negative lifestyle choices. Despite these large costs, very little is spent on prevention for lifestyle-caused conditions in comparison. In 2016, the Journal of the American Medical Association estimated that $ 101 billion was spent in 2013 on the preventable disease of diabetes, and another $88 billion was spent on heart disease. In an effort to encourage healthy lifestyle choices, as of 2010 workplace wellness programs were on the rise but the economics and effectiveness data were continuing to evolve and develop. Health insurance coverage impacts lifestyle choices, even intermittent loss of coverage had negative effects on healthy choices in the U.S. The repeal of the Affordable Care Act (ACA) could significantly impact coverage for many Americans as well as \"The Prevention and Public Health Fund\" which is the U.S. first and only mandatory funding stream dedicated to improving public health including counseling on lifestyle prevention issues, such as weight management, alcohol use, and treatment for depression. Because in the U.S. chronic illnesses predominate as a cause of death and pathways for treating chronic illnesses are complex and multifaceted, prevention is a best practice approach to chronic disease when possible. In many cases, prevention requires mapping complex pathways to determine the ideal point for intervention. Cost-effectiveness of prevention is achievable, but impacted by the length of time it takes to see effects/outcomes of intervention. This makes prevention efforts difficult to fund\u2014particularly in strained financial contexts. Prevention potentially creates other costs as well, due to extending the lifespan and thereby increasing opportunities for illness. In order to assess the cost-effectiveness of prevention, the cost of the preventive measure, savings from avoiding morbidity, and the cost from extending the lifespan need to be considered. Life extension costs become smaller when accounting for savings from postponing the last year of life, which makes up a large fraction of lifetime medical expenditures and becomes cheaper with age. Prevention leads to savings only if the cost of the preventive measure is less than the savings from avoiding morbidity net of the cost of extending the life span. In order to establish reliable economics of prevention for illnesses that are complicated in origin, knowing how best to assess prevention efforts, i.e. developing useful measures and appropriate scope, is required. Effectiveness There is no general consensus as to whether or not preventive healthcare measures are cost-effective, but they increase the quality of life dramatically. There are varying views on what constitutes a \"good investment.\" Some argue that preventive health measures should save more money than they cost, when factoring in treatment costs in the absence of such measures. Others have argued in favor of \"good value\" or conferring significant health benefits even if the measures do not save money. Furthermore, preventive health services are often described as one entity though they comprise a myriad of different services, each of which can individually lead to net costs, savings, or neither. Greater differentiation of these services is necessary to fully understand both the financial and health effects. A 2010 study reported that in the United States, vaccinating children, cessation of smoking, daily prophylactic use of aspirin, and screening of breast and colorectal cancers had the most potential to prevent premature death. Preventive health measures that resulted in savings included vaccinating children and adults, smoking cessation, daily use of aspirin, and screening for issues with alcoholism, obesity, and vision failure. These authors estimated that if usage of these services in the United States increased to 90\\% of the population, there would be net savings of $ 3.7 billion, which comprised only about -0.2\\% of the total 2006 United States healthcare expenditure. Despite the potential for decreasing healthcare spending, utilization of healthcare resources in the United States still remains low, especially among Latinos and African-Americans. Overall, preventive services are difficult to implement because healthcare providers have limited time with patients and must integrate a variety of preventive health measures from different sources. Gortmaker, S.L. et al. (2015) states: \"The four initial interventions were selected by the investigators to represent a broad range of nationally scalable strategies to reduce childhood obesity using a mix of both policy and programmatic strategies... 1. an excise tax of $0.01 per ounce of sweetened beverages, applied nationally and administered at the state level (SSB), 2. elimination of the tax deductibility of advertising costs of TV advertisements for \"nutritionally poor\" foods and beverages seen by children and adolescents (TV AD), 3. state policy requiring all public elementary schools in which physical education (PE) is currently provided to devote \u226550\\% of PE class time to moderate and vigorous physical activity (Active PE), and 4. state policy to make early child educational settings healthier by increasing physical activity, improving nutrition, and reducing screen time (ECE).\" The CHOICES found that SSB, TV AD, and ECE led to net cost savings. Both SSB and TV AD increased quality adjusted life years and produced yearly tax revenue of 12.5 billion U.S. dollars and 80 million U.S. dollars, respectively. Some challenges with evaluating the effectiveness of child obesity interventions include: The economic consequences of childhood obesity are both short and long term. In the short term, obesity impairs cognitive achievement and academic performance. Some believe this is secondary to negative effects on mood or energy, but others suggest there may be physiological factors involved. Furthermore, obese children have increased health care expenses (e.g. medications, acute care visits). In the long term, obese children tend to become obese adults with associated increased risk for a chronic condition such as diabetes or hypertension. Any effect on their cognitive development may also affect their contributions to society and socioeconomic status. In the CHOICES, it was noted that translating the effects of these interventions may in fact differ among communities throughout the nation. In addition it was suggested that limited outcomes are studied and these interventions may have an additional effect that is not fully appreciated. Modeling outcomes in such interventions in children over the long term is challenging because advances in medicine and medical technology are unpredictable. The projections from cost-effective analysis may need to be reassessed more frequently. Economics of U.S. preventive care As of 2009, the cost-effectiveness of preventive care is a highly debated topic. While some economists argue that preventive care is valuable and potentially cost saving, others believe it is an inefficient waste of resources. Preventive care is composed of a variety of clinical services and programs including annual doctor's check-ups, annual immunizations, and wellness programs; recent models show that these simple interventions can have significant economic impacts. Clinical preventive services and programs Research on preventive care addresses the question of whether it is cost saving or cost effective and whether there is an economics evidence base for health promotion and disease prevention. The need for and interest in preventive care is driven by the imperative to reduce health care costs while improving quality of care and the patient experience. Preventive care can lead to improved health outcomes and cost savings potential. Services such as health assessments/screenings, prenatal care, and telehealth and telemedicine can reduce morbidity or mortality with low cost or cost URL Specifically, health assessments/screenings have cost savings potential, with varied cost-effectiveness based on screening and assessment type. Inadequate prenatal care can lead to an increased risk of prematurity, stillbirth, and infant death. Time is the ultimate resource and preventive care can help mitigate the time costs.Folland, S., Goodman, A., & Stano, M. (2013). The economics of health and health care. (7th ed.). Upper Saddle River: Pearson Education. Telehealth and telemedicine is one option that has gained consumer interest, acceptance and confidence and can improve quality of care and patient satisfaction. Economics for investment There are benefits and trade-offs when considering investment in preventive care versus other types of clinical services. Preventive care can be a good investment as supported by the evidence base and can drive population health management objectives. The concepts of cost saving and cost-effectiveness are different and both are relevant to preventive care. Preventive care that may not save money may still provide health benefits; thus, there is a need to compare interventions relative to impact on health and cost.Robert Wood Johnson Foundation. (2009). The cost savings and cost-effectiveness of clinical preventive care. The Synthesis Project: New Insights from Research Results. Research Synthesis Report No. 18. Preventive care transcends demographics and is applicable to people of every age. The Health Capital Theory underpins the importance of preventive care across the lifecycle and provides a framework for understanding the variances in health and health care that are experienced. It treats health as a stock that provides direct utility. Health depreciates with age and the aging process can be countered through health investments. The theory further supports that individuals demand good health, that the demand for health investment is a derived demand (i.e. investment is health is due to the underlying demand for good health), and the efficiency of the health investment process increases with knowledge (i.e. it is assumed that the more educated are more efficient consumers and producers of health). The prevalence elasticity of demand for prevention can also provide insights into the economics. Demand for preventive care can alter the prevalence rate of a given disease and further reduce or even reverse any further growth of prevalence. Reduction in prevalence subsequently leads to reduction in costs. There are a number of organizations and policy actions that are relevant when discussing the economics of preventive care services. The evidence base, viewpoints, and policy briefs from the Robert Wood Johnson Foundation, the Organisation for Economic Co-operation and Development (OECD), and efforts by the U.S. Preventive Services Task Force (USPSTF) all provide examples that improve the health and well-being of populations (e.g. preventive health assessments/screenings, prenatal care, and telehealth/telemedicine). The Affordable Care Act (ACA) has major influence on the provision of preventive care services, although it is currently under heavy scrutiny and review by the new administration. According to the Centers for Disease Control and Prevention (CDC), the ACA makes preventive care affordable and accessible through mandatory coverage of preventive services without a deductible, copayment, coinsurance, or other cost URL The U.S. Preventive Services Task Force (USPSTF), a panel of national experts in prevention and evidence-based medicine, works to improve health of Americans by making evidence-based recommendations about clinical preventive services. They do not consider the cost of a preventive service when determining a recommendation. Each year, the organization delivers a report to Congress that identifies critical evidence gaps in research and recommends priority areas for further URL The National Network of Perinatal Quality Collaboratives (NNPQC), sponsored by the CDC, supports state-based perinatal quality collaboratives (PQCs) in measuring and improving upon health care and health outcomes for mothers and babies. These PQCs have contributed to improvements such as reduction in deliveries before 39 weeks, reductions in healthcare associated bloodstream infections, and improvements in the utilization of antenatal corticosteroids. Telehealth and telemedicine has realized significant growth and development recently. The Center for Connected Health Policy (The National Telehealth Policy Resource Center) has produced multiple reports and policy briefs on the topic of Telehealth and Telemedicine and how they contribute to preventive URL Policy actions and provision of preventive services do not guarantee utilization. Reimbursement has remained a significant barrier to adoption due to variances in payer and state level reimbursement policies and guidelines through government and commercial payers. Americans use preventive services at about half the recommended rate and cost-sharing, such as deductibles, co-insurance, or copayments, also reduce the likelihood that preventive services will be used. Despite the ACA's enhancement of Medicare benefits and preventive services, there were no effects on preventive service utilization, calling out the fact that other fundamental barriers exist. Affordable Care Act and preventive healthcare The Patient Protection and Affordable Care Act, also known as just the Affordable Care Act or Obamacare, was passed and became law in the United States on March 23, 2010. The finalized and newly ratified law was to address many issues in the U.S. healthcare system, which included expansion of coverage, insurance market reforms, better quality, and the forecast of efficiency and costs. Under the insurance market reforms the act required that insurance companies no longer exclude people with pre-existing conditions, allow for children to be covered on their parents' plan until the age of 26, and expand appeals that dealt with reimbursement denials. The Affordable Care Act also banned the limited coverage imposed by health insurances, and insurance companies were to include coverage for preventive health care services. The U.S. Preventive Services Task Force has categorized and rated preventive health services as either A or B, as to which insurance companies must comply and present full coverage. Not only has the U.S. Preventive Services Task Force provided graded preventive health services that are appropriate for coverage, they have also provided many recommendations to clinicians and insurers to promote better preventive care to ultimately provide better quality of care and lower the burden of costs. Health insurance Healthcare insurance companies are willing to pay for preventive care despite the fact that patients are not acutely sick in hope that it will prevent them from developing a chronic disease later on in life. Today, health insurance plans offered through the Marketplace, mandated by the Affordable Care Act are required to provide certain preventive care services free of charge to patients. Section 2713 of the Affordable Care Act, specifies that all private Marketplace and all employer-sponsored private plans (except those grandfathered in) are required to cover preventive care services that are ranked A or B by the U.S. Preventive Services Task Force free of charge to patients. UnitedHealthcare insurance company has published patient guidelines at the beginning of the year explaining their preventive care coverage. Evaluating incremental benefits Evaluating the incremental benefits of preventive care requires a longer period of time when compared to acutely ill patients. Inputs into the model such as discounting rate and time horizon can have significant effects on the results. One controversial subject is use of a 10-year time frame to assess cost effectiveness of diabetes preventive services by the Congressional Budget Office. Preventive care services mainly focus on chronic disease. The Congressional Budget Office has provided guidance that further research is needed in the area of the economic impacts of obesity in the U.S. before the CBO can estimate budgetary consequences. A bipartisan report published in May 2015 recognizes the potential of preventive care to improve patients' health at individual and population levels while decreasing the healthcare expenditure. Economic case Mortality from modifiable risk factors Chronic diseases such as heart disease, stroke, diabetes, obesity and cancer have become the most common and costly health problems in the United States. In 2014, it was projected that by 2023 that the number of chronic disease cases would increase by 42\\%, resulting in $ 4.2 trillion in treatment and lost economic URL They are also among the top ten leading causes of URL Chronic diseases are driven by risk factors that are largely preventable. Sub-analysis performed on all deaths in the United States in the year 2000 revealed that almost half were attributed to preventable behaviors including tobacco, poor diet, physical inactivity and alcohol consumption. More recent analysis reveals that heart disease and cancer alone accounted for nearly 46\\% of all URL Modifiable risk factors are also responsible for a large morbidity burden, resulting in poor quality of life in the present and loss of future life earning years. It is further estimated that by 2023, focused efforts on the prevention and treatment of chronic disease may result in 40 million fewer chronic disease cases, potentially reducing treatment costs by $220 billion. Childhood vaccinations Childhood immunizations are largely responsible for the increase in life expectancy in the 20th century. From an economic standpoint, childhood vaccines demonstrate a very high return on investment. According to Healthy People 2020, for every birth cohort that receives the routine childhood vaccination schedule, direct health care costs are reduced by $ 9.9 billion and society saves $33.4 billion in indirect costs. The economic benefits of childhood vaccination extend beyond individual patients to insurance plans and vaccine manufacturers, all while improving the health of the population. Health capital theory The burden of preventable illness extends beyond the healthcare sector, incurring costs related to lost productivity among workers in the workforce. Indirect costs related to poor health behaviors and associated chronic disease costs U.S. employers billions of dollars each year. According to the American Diabetes Association (ADA), medical costs for employees with diabetes are twice as high as for workers without diabetes and are caused by work-related absenteeism ($ 5 billion), reduced productivity at work ($20.8 billion), inability to work due to illness-related disability ($21.6 billion), and premature mortality ($18.5 billion). Reported estimates of the cost burden due to increasingly high levels of overweight and obese members in the workforce vary, with best estimates suggesting 450 million more missed work days, resulting in $153 billion each year in lost productivity, according to the CDC Healthy Workforce. The health capital model explains how individual investments in health can increase earnings by \" increasing the number of healthy days available to work and to earn income. \" Folland, S., Goodman, A.C., & Stano, M. (2016). Demand for Health Capital. The Economics of Health and Healthcare, 7th ed. (p. 130). New York, NY: Routledge. In this context, health can be treated both as a consumption good, wherein individuals desire health because it improves quality of life in the present, and as an investment good because of its potential to increase attendance and workplace productivity over time. Preventive health behaviors such as healthful diet, regular exercise, access to and use of well-care, avoiding tobacco, and limiting alcohol can be viewed as health inputs that result in both a healthier workforce and substantial cost savings. Quality-adjusted life years Health benefits of preventive care measures can be described in terms of quality-adjusted life-years (QALYs) saved. A QALY takes into account length and quality of life, and is used to evaluate the cost-effectiveness of medical and preventive interventions. Classically, one year of perfect health is defined as 1 QALY and a year with any degree of less than perfect health is assigned a value between 0 and 1 URL As an economic weighting system, the QALY can be used to inform personal decisions, to evaluate preventive interventions and to set priorities for future preventive efforts. Cost-saving and cost-effective benefits of preventive care measures are well established. The Robert Wood Johnson Foundation evaluated the prevention cost-effectiveness literature, and found that many preventive measures meet the benchmark of < $100,000 per QALY and are considered to be favorably cost-effective. These include screenings for HIV and chlamydia, cancers of the colon, breast and cervix, vision screening, and screening for abdominal aortic aneurysms in men >60 in certain populations. Alcohol and tobacco screening were found to be cost-saving in some reviews and cost-effective in others. According to the RWJF analysis, two preventive interventions were found to save costs in all reviews: childhood immunizations and counseling adults on the use of aspirin. Minority populations Health disparities are increasing in the United States for chronic diseases such as obesity, diabetes, cancer, and cardiovascular disease. Populations at heightened risk for health inequities are the growing proportion of racial and ethnic minorities, including African Americans, American Indians, Hispanics/Latinos, Asian Americans, Alaska Natives and Pacific URL According to the Racial and Ethnic Approaches to Community Health (REACH), a national CDC program, non-Hispanic blacks currently have the highest rates of obesity (48\\%), and risk of newly diagnosed diabetes is 77\\% higher among non-Hispanic blacks, 66\\% higher among Hispanics/Latinos and 18\\% higher among Asian Americans compared to non-Hispanic whites. Current U.S. population projections predict that more than half of Americans will belong to a minority group by 2044. Without targeted preventive interventions, medical costs from chronic disease inequities will become unsustainable. Broadening health policies designed to improve delivery of preventive services for minority populations may help reduce substantial medical costs caused by inequities in health care, resulting in a return on investment. Policies Chronic disease is a population level issue that requires population health level efforts and national and state level public policy to effectively prevent, rather than individual level efforts. The United States currently employs many public health policy efforts aligned with the preventive health efforts discussed above. The Centers for Disease Control and Prevention support initiatives such as Health in All Policies and HI-5 (Health Impact in 5 Years), and collaborative efforts that aim to consider prevention across sectors and address social determinants of health as a method of primary prevention for chronic disease. Obesity Policies that address the obesity epidemic should be proactive and far-reaching, including a variety of stakeholders both in healthcare and in other sectors. Recommendations from the Institute of Medicine in 2012 suggest that \"concerted action be taken across and within five environments (physical activity (PA), food and beverage, marketing and messaging, healthcare and worksites, and schools) and all sectors of society (including government, business and industry, schools, child care, urban planning, recreation, transportation, media, public health, agriculture, communities, and home) in order for obesity prevention efforts to truly be successful.\" There are dozens of current policies acting at either (or all of) the federal, state, local and school levels. Most states employ a physical education requirement of 150 minutes of physical education per week at school, a policy of the National Association of Sport and Physical Education. In some cities, including Philadelphia, a sugary food tax is employed. This is a part of an amendment to Title 19 of the Philadelphia Code, \"Finance, Taxes and Collections\", Chapter 19-4100, Sugar-Sweetened Beverage Tax that was approved 2016, which establishes an excise tax of $ 0.015 per fluid ounce on distributors of beverages sweetened with both caloric and non-caloric URL Distributors are required to file a return with the department, and the department can collect taxes, among other responsibilities. %DIFDELCMD < %DIFDELCMD < %%% These policies can be a source of tax credits. Under the Philadelphia policy, businesses can apply for tax credits with the revenue department on a first-come, first-served basis. This applies until the total amount of credits for a particular year reaches one million dollars. Recently, advertisements for food and beverages directed at children have received much attention. The Children's Food and Beverage Advertising Initiative (CFBAI) is a self-regulatory program of the food industry. Each participating company makes a public pledge that details its commitment to advertise only foods that meet certain nutritional criteria to children under 12 years old. This is a self-regulated program with policies written by the Council of Better Business Bureaus. The Robert Wood Johnson Foundation funded research to test the efficacy of the CFBAI. The results showed progress in terms of decreased advertising of food products that target children and URL Childhood immunization policies %DIFDELCMD < %DIFDELCMD < %%% Despite nationwide controversies over childhood vaccination and immunization, there are policies and programs at the federal, state, local and school levels outlining vaccination requirements. All states require children to be vaccinated against certain communicable diseases as a condition for school attendance. However, only 18 states allow exemptions for \" philosophical or moral reasons. \" Diseases for which vaccinations form part of the standard ACIP vaccination schedule are diphtheria tetanus pertussis (whooping cough), poliomyelitis (polio), measles, mumps, rubella, haemophilus influenzae type b, hepatitis B, influenza, and pneumococcal infections. The CDC website maintains such schedules. The CDC website describes a federally funded program, Vaccines for Children (VFC), which provides vaccines at no cost to children who might not otherwise be vaccinated because of inability to pay. Additionally, the Advisory Committee on Immunization Practices (ACIP) is an expert vaccination advisory board that informs vaccination policy and guides on-going recommendations to the CDC, incorporating the most up-to-date cost-effectiveness and risk-benefit evidence in its recommendations.", "edit_actions": [{"type": "A", "before": null, "after": "200px|", "start_char_pos": 0, "end_char_pos": 0}, {"type": "A", "before": null, "after": ",", "start_char_pos": 597, "end_char_pos": 597}, {"type": "D", "before": "Primal Health Research Database, on URL", "after": null, "start_char_pos": 767, "end_char_pos": 806}, {"type": "D", "before": "diseases.The Top 10 Causes of Death. (n.d.). Retrieved March 16, 2014, from World Health Organization website:", "after": null, "start_char_pos": 1543, "end_char_pos": 1653}, {"type": "D", "before": "\u2018Be Smart, Don\u2019t Start\u2019 campaign launched to deter youths from smoking", "after": null, "start_char_pos": 2101, "end_char_pos": 2171}, {"type": "D", "before": "Vorvick, L. (2013). Preventive health care. In D. Zieve, D. R. Eltz, S. Slon,", "after": null, "start_char_pos": 2517, "end_char_pos": 2594}, {"type": "R", "before": "N. Wang (Eds.), The A.D.A.M. Medical Encyclopedia. Retrieved from URL In", "after": "In", "start_char_pos": 2595, "end_char_pos": 2667}, {"type": "R", "before": "-", "after": ",", "start_char_pos": 5084, "end_char_pos": 5085}, {"type": "R", "before": "-", "after": ",", "start_char_pos": 5114, "end_char_pos": 5115}, {"type": "R", "before": "(", "after": ",", "start_char_pos": 5166, "end_char_pos": 5167}, {"type": "D", "before": ")", "after": null, "start_char_pos": 5203, "end_char_pos": 5204}, {"type": "D", "before": "excellencesee:", "after": null, "start_char_pos": 5348, "end_char_pos": 5362}, {"type": "R", "before": "leaveGarcia,", "after": "leave, ideally for both parents with kin caregiving and financial help where needed.Garcia,", "start_char_pos": 6452, "end_char_pos": 6464}, {"type": "D", "before": "ideally for both parents with kin caregiving and financial help where needed.", "after": null, "start_char_pos": 6564, "end_char_pos": 6641}, {"type": "R", "before": "(", "after": ",", "start_char_pos": 7191, "end_char_pos": 7192}, {"type": "R", "before": ")", "after": ",", "start_char_pos": 7275, "end_char_pos": 7276}, {"type": "D", "before": "on.Module 13: Levels of Disease Prevention. (2007, April 24). Retrieved March 16, 2014, from Centers for Disease Control and Prevention website:", "after": null, "start_char_pos": 7874, "end_char_pos": 8018}, {"type": "R", "before": "For example, early", "after": "Early", "start_char_pos": 8268, "end_char_pos": 8286}, {"type": "R", "before": ". However", "after": "; however", "start_char_pos": 8824, "end_char_pos": 8833}, {"type": "R", "before": "2000 Cause Deaths", "after": "2000CauseDeaths", "start_char_pos": 9113, "end_char_pos": 9130}, {"type": "R", "before": "deaths Tobacco", "after": "deathsTobacco", "start_char_pos": 9147, "end_char_pos": 9161}, {"type": "R", "before": "000 18.1", "after": "00018.1", "start_char_pos": 9175, "end_char_pos": 9183}, {"type": "R", "before": "inactivity 400,000 16.6 Alcohol consumption 85,000 3.5 Infectious diseases 75,000 3.1 Toxicants 55,000 2.3 Traffic collisions 43,000 1.8 Firearm incidents 29,000 1.2 Sexually transmitted infections 20,000 0.8 Drug abuse 17,000 0.7", "after": "inactivity400,00016.6Alcohol consumption85,0003.5Infectious diseases75,0003.1Toxicants55,0002.3Traffic collisions43,0001.8Firearm incidents29,0001.2Sexually transmitted infections20,0000.8Drug abuse17,0000.7", "start_char_pos": 9207, "end_char_pos": 9437}, {"type": "R", "before": "2001 Cause Deaths", "after": "2001CauseDeaths", "start_char_pos": 9781, "end_char_pos": 9798}, {"type": "R", "before": "Hypertension 7.8Smoking 5.0High cholesterol 3.9Malnutrition 3.8Sexually transmitted infections 3.0Poor diet 2.8Overweight and obesity 2.5Physical inactivity 2.0Alcohol 1.9", "after": "Hypertension7.8Smoking5.0High cholesterol3.9Malnutrition3.8Sexually transmitted infections3.0Poor diet2.8Overweight and obesity2.5Physical inactivity2.0Alcohol1.9", "start_char_pos": 9826, "end_char_pos": 9997}, {"type": "R", "before": "fuels 1.8", "after": "fuels1.8", "start_char_pos": 10030, "end_char_pos": 10039}, {"type": "R", "before": "sanitation 1.6", "after": "sanitation1.6", "start_char_pos": 10062, "end_char_pos": 10076}, {"type": "R", "before": "worldwide Intervention Percent", "after": "worldwideInterventionPercent", "start_char_pos": 10165, "end_char_pos": 10195}, {"type": "R", "before": "preventableBreastfeeding 13Insecticide-treated materials 7Complementary feeding 6Zinc 4Clean delivery 4Hib vaccine 4Water", "after": "preventableBreastfeeding13Insecticide-treated materials7Complementary feeding6Zinc4Clean delivery4Hib vaccine4Water", "start_char_pos": 10216, "end_char_pos": 10337}, {"type": "R", "before": "hygiene 3Antenatal steroids 3Newborn temperature management 2 Vitamin A 2Tetanus toxoid 2 Nevirapine and replacement feeding 2 Antibiotics", "after": "hygiene3Antenatal steroids3Newborn temperature management2Vitamin A2Tetanus toxoid2Nevirapine and replacement feeding2Antibiotics", "start_char_pos": 10352, "end_char_pos": 10490}, {"type": "R", "before": "membranes 1 Measles vaccine 1 Antimalarial", "after": "membranes1Measles vaccine1Antimalarial", "start_char_pos": 10516, "end_char_pos": 10558}, {"type": "D", "before": "adults.\"Diabetes Prevention Program (DPP).\" Diabetes Prevention Program (DPP). US Department of Health and Human Services, Oct. 2008. Web. 23 Apr.", "after": null, "start_char_pos": 12133, "end_char_pos": 12279}, {"type": "D", "before": "disease,Centers for Disease Control and Prevention. 2014. 2013 Sexually Transmitted Disease Surveillance. Retrieved from:", "after": null, "start_char_pos": 12696, "end_char_pos": 12817}, {"type": "D", "before": ":", "after": null, "start_char_pos": 13670, "end_char_pos": 13671}, {"type": "D", "before": "Risser, N. L. (1996). Prevention of Lung Cancer: The Key Is to Stop Smoking. Seminars in Oncology Nursing, 12, 260-269.", "after": null, "start_char_pos": 14219, "end_char_pos": 14338}, {"type": "D", "before": "Therefore, prevention", "after": null, "start_char_pos": 14442, "end_char_pos": 14463}, {"type": "A", "before": null, "after": "Prevention", "start_char_pos": 14464, "end_char_pos": 14464}, {"type": "R", "before": "US", "after": "U.S.", "start_char_pos": 14660, "end_char_pos": 14662}, {"type": "R", "before": "$7.3 million spent by the tobacco industry to oppose this bill. Tax revenue goes toward tobacco education and control programs and has led to a decline of tobacco use in the state. Lung cancer and tobacco smoking are increasing worldwide, especially in China. China is responsible for about one-third of the global consumption and production of tobacco products. Tobacco control policies have been ineffective as China is home to 350 million regular smokers and 750 million passive smokers and the annual death toll is over 1 million. Recommended actions to reduce tobacco use include: decreasing tobacco supply, increasing tobacco taxes, widespread educational campaigns, decreasing advertising from the tobacco industry, and increasing tobacco cessation support resources. In Wuhan, China, a 1998 school-based program implemented an anti-tobacco curriculum for adolescents and reduced the number of regular smokers, though it did not significantly decrease the number of adolescents who initiated smoking. This program was therefore effective in secondary but not primary prevention and shows that school-based programs have the potential to reduce tobacco use. Skin cancer An image of melanoma, one of the deadliest forms of skin cancer Skin cancer is the most common cancer in the United States.MMWR. Recommendations and Reports : Morbidity and Mortality Weekly Report. Recommendations and Reports / Centers for Disease Control [2002, 51(RR-4):1-18] The most lethal form of skin cancer, melanoma, leads to over 50,000 annual deaths in the United States. Childhood prevention is particularly important because a significant portion of ultraviolet radiation exposure from the sun occurs during childhood and adolescence and can subsequently lead to skin cancer in adulthood. Furthermore, childhood prevention can lead to the development of healthy habits that continue to prevent cancer for a lifetime. The Centers for Disease Control and Prevention (CDC) recommends several primary prevention methods including: limiting sun exposure between 10 AM and 4 PM, when the sun is strongest, wearing tighter-weave natural cotton clothing, wide-brim hats, and sunglasses as protective covers, using sunscreens that protect against both UV-A and UV-B rays, and avoiding tanning salons. Sunscreen should be reapplied after sweating, exposure to water (through swimming for example) or after several hours of sun exposure. Since skin cancer is very preventable, the CDC recommends school-level prevention programs including preventive curricula, family involvement, participation and support from the school's health services, and partnership with community, state, and national agencies and organizations to keep children away from excessive UV radiation exposure. Most skin cancer and sun protection data comes from Australia and the United States. An international study reported that Australians tended to demonstrate higher knowledge of sun protection and skin cancer knowledge, compared to other countries. Of children, adolescents, and adults, sunscreen was the most commonly used skin protection. However, many adolescents purposely used sunscreen with a low sun protection factor (SPF) in order to get a tan. Various Australian studies have shown that many adults failed to use sunscreen correctly; many applied sunscreen well after their initial sun exposure and/or failed to reapply when necessary. A 2002 case-control study in Brazil showed that only 3\\% of case participants and 11\\% of control participants used sunscreen with SPF >15. Cervical cancer The presence of cancer (adenocarcinoma) detected on a Pap test Cervical cancer ranks among the top three most common cancers among women in Latin America, sub-Saharan Africa, and parts of Asia. Cervical cytology screening aims to detect abnormal lesions in the cervix so that women can undergo treatment prior to the development of cancer. Given that high quality screening and follow-up care has been shown to reduce cervical cancer rates by up to 80\\%, most developed countries now encourage sexually active women to undergo a Pap test every 3\u20135 years. Finland and Iceland have developed effective organized programs with routine monitoring and have managed to significantly reduce cervical cancer mortality while using fewer resources than unorganized, opportunistic programs such as those in the United States or Canada. In developing nations in Latin America, such as Chile, Colombia, Costa Rica, and Cuba, both public and privately organized programs have offered women routine cytological screening since the 1970s. However, these efforts have not resulted in a significant change in cervical cancer incidence or mortality in these nations. This is likely due to low quality, inefficient testing. However, Puerto Rico, which has offered early screening since the 1960s, has witnessed almost a 50\\% decline in cervical cancer incidence and almost a four-fold decrease in mortality between 1950 and 1990. Brazil, Peru, India, and several high-risk nations in sub-Saharan Africa which lack organized screening programs, have a high incidence of cervical cancer. Colorectal cancer Colorectal cancer is globally the second most common cancer in women and the third-most common in men, and the fourth most common cause of cancer death after lung, stomach, and liver cancer, having caused 715,000 deaths in 2010. It is also highly preventable; about 80 percent of colorectal cancers begin as benign growths, commonly called polyps, which can be easily detected and removed during a colonoscopy. Other methods of screening for polyps and cancers include fecal occult blood testing. Lifestyle changes that may reduce the risk of colorectal cancer include increasing consumption of whole grains, fruits and vegetables, and reducing consumption of red meat (see Colorectal cancer). Health disparities and barriers to accessing care Access to healthcare and preventive health services is unequal, as is the quality of care received. A study conducted by the Agency for Healthcare Research and Quality (AHRQ) revealed health disparities in the United States. In the United States, elderly adults (>65 years old) received worse care and had less access to care than their younger counterparts. The same trends are seen when comparing all racial minorities (black, Hispanic, Asian) to white patients, and low-income people to high-income people. Common barriers to accessing and utilizing healthcare resources included lack of income and education, language barriers, and lack of health insurance. Minorities were less likely than whites to possess health insurance, as were individuals who completed less education. These disparities made it more difficult for the disadvantaged groups to have regular access to a primary care provider, receive immunizations, or receive other types of medical care.Disparities in Healthcare Quality Among Racial and Ethnic Groups: Selected Findings from the 2011 National Healthcare Quality and Disparities Reports. Fact Sheet. AHRQ Publication No. 12-0006-1-EF, September 2012. Agency for Healthcare Research and Quality, Rockville, MD. URL Additionally, uninsured people tend to not seek care until their diseases progress to chronic and serious states and they are also more likely to forgo necessary tests, treatments, and filling prescription medications. These sorts of disparities and barriers exist worldwide as well. Often, there are decades of gaps in life expectancy between developing and developed countries. For example, Japan has an average life expectancy that is 36 years greater than that in Malawi.Fact file on health inequities. (n.d.). Retrieved April 25, 2014, from World Health Organization website: URL Low-income countries also tend to have fewer physicians than high-income countries. In Nigeria and Myanmar, there are fewer than 4 physicians per 100,000 people while Norway and Switzerland have a ratio that is ten-fold higher. Common barriers worldwide include lack of availability of health services and healthcare providers in the region, great physical distance between the home and health service facilities, high transportation costs, high treatment costs, and social norms and stigma toward accessing certain health services.Jacobs, B., Ir, P., Bigdeli, M., Annear, P. L., & Damme, W. V. (2011). Addressing access barriers to health services: an analytical framework for selecting appropriate interventions in low-income Asian countries. Health Policy and Planning, 1-13. Economics of lifestyle-based prevention With lifestyle factors such as diet and exercise rising to the top of preventable death statistics, the economics of healthy lifestyle is a growing concern. There is little question that positive lifestyle choices provide an investment in health throughout life. To gauge success, traditional measures such as the quality years of life method (QALY), show great value. However, that method does not account for the cost of chronic conditions or future lost earnings because of poor health. Developing future economic models that would guide both private and public investments as well as drive future policy to evaluate the efficacy of positive lifestyle choices on health is a major topic for economists globally. US Americans spend over three trillion a year on health care but have a higher rate of infant mortality, shorter life expectancies, and a higher rate of diabetes than other high-income nations because of negative lifestyle choices. Despite these large costs, very little is spent on prevention for lifestyle-caused conditions in comparison. In 2016, the Journal of the American Medical Association estimated that $", "after": "$7.3 million spent by the tobacco industry to oppose this bill. Tax revenue goes toward tobacco education and control programs and has led to a decline of tobacco use in the state. Lung cancer and tobacco smoking are increasing worldwide, especially in China. China is responsible for about one-third of the global consumption and production of tobacco products. Tobacco control policies have been ineffective as China is home to 350 million regular smokers and 750 million passive smokers and the annual death toll is over 1 million. Recommended actions to reduce tobacco use include decreasing tobacco supply, increasing tobacco taxes, widespread educational campaigns, decreasing advertising from the tobacco industry, and increasing tobacco cessation support resources. In Wuhan, China, a 1998 school-based program implemented an anti-tobacco curriculum for adolescents and reduced the number of regular smokers, though it did not significantly decrease the number of adolescents who initiated smoking. This program was therefore effective in secondary but not primary prevention and shows that school-based programs have the potential to reduce tobacco use. Skin cancer An image of melanoma, one of the deadliest forms of skin cancer Skin cancer is the most common cancer in the United States.MMWR. Recommendations and Reports : Morbidity and Mortality Weekly Report. Recommendations and Reports / Centers for Disease Control [2002, 51(RR-4):1-18] The most lethal form of skin cancer, melanoma, leads to over 50,000 annual deaths in the United States. Childhood prevention is particularly important because a significant portion of ultraviolet radiation exposure from the sun occurs during childhood and adolescence and can subsequently lead to skin cancer in adulthood. Furthermore, childhood prevention can lead to the development of healthy habits that continue to prevent cancer for a lifetime. The Centers for Disease Control and Prevention (CDC) recommends several primary prevention methods including: limiting sun exposure between 10 AM and 4 PM, when the sun is strongest, wearing tighter-weave natural cotton clothing, wide-brim hats, and sunglasses as protective covers, using sunscreens that protect against both UV-A and UV-B rays, and avoiding tanning salons. Sunscreen should be reapplied after sweating, exposure to water (through swimming for example) or after several hours of sun exposure. Since skin cancer is very preventable, the CDC recommends school-level prevention programs including preventive curricula, family involvement, participation and support from the school's health services, and partnership with community, state, and national agencies and organizations to keep children away from excessive UV radiation exposure. Most skin cancer and sun protection data comes from Australia and the United States. An international study reported that Australians tended to demonstrate higher knowledge of sun protection and skin cancer knowledge, compared to other countries. Of children, adolescents, and adults, sunscreen was the most commonly used skin protection. However, many adolescents purposely used sunscreen with a low sun protection factor (SPF) in order to get a tan. Various Australian studies have shown that many adults failed to use sunscreen correctly; many applied sunscreen well after their initial sun exposure and/or failed to reapply when necessary. A 2002 case-control study in Brazil showed that only 3\\% of case participants and 11\\% of control participants used sunscreen with SPF >15. Cervical cancer The presence of cancer (adenocarcinoma) detected on a Pap test Cervical cancer ranks among the top three most common cancers among women in Latin America, sub-Saharan Africa, and parts of Asia. Cervical cytology screening aims to detect abnormal lesions in the cervix so that women can undergo treatment prior to the development of cancer. Given that high quality screening and follow-up care has been shown to reduce cervical cancer rates by up to 80\\%, most developed countries now encourage sexually active women to undergo a Pap test every 3\u20135 years. Finland and Iceland have developed effective organized programs with routine monitoring and have managed to significantly reduce cervical cancer mortality while using fewer resources than unorganized, opportunistic programs such as those in the United States or Canada. In developing nations in Latin America, such as Chile, Colombia, Costa Rica, and Cuba, both public and privately organized programs have offered women routine cytological screening since the 1970s. However, these efforts have not resulted in a significant change in cervical cancer incidence or mortality in these nations. This is likely due to low quality, inefficient testing. However, Puerto Rico, which has offered early screening since the 1960s, has witnessed almost a 50\\% decline in cervical cancer incidence and almost a four-fold decrease in mortality between 1950 and 1990. Brazil, Peru, India, and several high-risk nations in sub-Saharan Africa which lack organized screening programs, have a high incidence of cervical cancer. Colorectal cancer Colorectal cancer is globally the second most common cancer in women and the third-most common in men, and the fourth most common cause of cancer death after lung, stomach, and liver cancer, having caused 715,000 deaths in 2010. It is also highly preventable; about 80 percent of colorectal cancers begin as benign growths, commonly called polyps, which can be easily detected and removed during a colonoscopy. Other methods of screening for polyps and cancers include fecal occult blood testing. Lifestyle changes that may reduce the risk of colorectal cancer include increasing consumption of whole grains, fruits and vegetables, and reducing consumption of red meat. Health disparities and barriers to accessing care Access to healthcare and preventive health services is unequal, as is the quality of care received. A study conducted by the Agency for Healthcare Research and Quality (AHRQ) revealed health disparities in the United States. In the United States, elderly adults (>65 years old) received worse care and had less access to care than their younger counterparts. The same trends are seen when comparing all racial minorities (black, Hispanic, Asian) to white patients, and low-income people to high-income people. Common barriers to accessing and utilizing healthcare resources included lack of income and education, language barriers, and lack of health insurance. Minorities were less likely than whites to possess health insurance, as were individuals who completed less education. These disparities made it more difficult for the disadvantaged groups to have regular access to a primary care provider, receive immunizations, or receive other types of medical care.Disparities in Healthcare Quality Among Racial and Ethnic Groups: Selected Findings from the 2011 National Healthcare Quality and Disparities Reports. Fact Sheet. AHRQ Publication No. 12-0006-1-EF, September 2012. Agency for Healthcare Research and Quality, Rockville, MD. URL Additionally, uninsured people tend to not seek care until their diseases progress to chronic and serious states and they are also more likely to forgo necessary tests, treatments, and filling prescription medications. These sorts of disparities and barriers exist worldwide as well. Often, there are decades of gaps in life expectancy between developing and developed countries. For example, Japan has an average life expectancy that is 36 years greater than that in URL Low-income countries also tend to have fewer physicians than high-income countries. In Nigeria and Myanmar, there are fewer than 4 physicians per 100,000 people while Norway and Switzerland have a ratio that is ten-fold higher. Common barriers worldwide include lack of availability of health services and healthcare providers in the region, great physical distance between the home and health service facilities, high transportation costs, high treatment costs, and social norms and stigma toward accessing certain health services.Jacobs, B., Ir, P., Bigdeli, M., Annear, P. L., & Damme, W. V. (2011). Addressing access barriers to health services: an analytical framework for selecting appropriate interventions in low-income Asian countries. Health Policy and Planning, 1-13. Economics of lifestyle-based prevention With lifestyle factors such as diet and exercise rising to the top of preventable death statistics, the economics of healthy lifestyle is a growing concern. There is little question that positive lifestyle choices provide an investment in health throughout life. To gauge success, traditional measures such as the quality years of life method (QALY), show great value. However, that method does not account for the cost of chronic conditions or future lost earnings because of poor health. Developing future economic models that would guide both private and public investments as well as drive future policy to evaluate the efficacy of positive lifestyle choices on health is a major topic for economists globally. Americans spend over three trillion a year on health care but have a higher rate of infant mortality, shorter life expectancies, and a higher rate of diabetes than other high-income nations because of negative lifestyle choices. Despite these large costs, very little is spent on prevention for lifestyle-caused conditions in comparison. In 2016, the Journal of the American Medical Association estimated that $", "start_char_pos": 15295, "end_char_pos": 24955}, {"type": "R", "before": "$88 billion was spent on heart disease. In an effort to encourage healthy lifestyle choices, as of 2010 workplace wellness programs were on the rise but the economics and effectiveness data were continuing to evolve and develop. Health insurance coverage impacts lifestyle choices, even intermittent loss of coverage had negative effects on healthy choices in the US. The repeal of the Affordable Care Act (ACA) could significantly impact coverage for many Americans, as well as \u201cThe Prevention and Public Health Fund\u201d which is the US first and only mandatory funding stream dedicated to improving public health including counseling on lifestyle prevention issues, such as weight management, alcohol use, and treatment for depression. Because in the US chronic illnesses predominate as a cause of death and pathways for treating chronic illnesses are complex and multifaceted, prevention is a best practice approach to chronic disease when possible. In many cases, prevention requires mapping complex pathways to determine the ideal point for intervention. Cost-effectiveness of prevention is achievable, but impacted by the length of time it takes to see effects/outcomes of intervention. This makes prevention efforts difficult to fund\u2014particularly in strained financial contexts. Prevention potentially creates other costs as well, due to extending the lifespan and thereby increasing opportunities for illness. In order to assess the cost-effectiveness of prevention, the cost of the preventive measure, savings from avoiding morbidity, and the cost from extending the lifespan need to be considered. Life extension costs become smaller when accounting for savings from postponing the last year of life, which makes up a large fraction of lifetime medical expenditures and becomes cheaper with age. Prevention leads to savings only if the cost of the preventive measure is less than the savings from avoiding morbidity net of the cost of extending the life span. In order to establish reliable economics of prevention for illnesses that are complicated in origin, knowing how best to assess prevention efforts, i.e. developing useful measures and appropriate scope, is required. Effectiveness Overview There is no general consensus as to whether or not preventive healthcare measures are cost-effective, but they increase the quality of life dramatically. There are varying views on what constitutes a \"good investment.\" Some argue that preventive health measures should save more money than they cost, when factoring in treatment costs in the absence of such measures. Others have argued in favor of \"good value\" or conferring significant health benefits even if the measures do not save money. Furthermore, preventive health services are often described as one entity though they comprise a myriad of different services, each of which can individually lead to net costs, savings, or neither. Greater differentiation of these services is necessary to fully understand both the financial and health effects. A 2010 study reported that in the United States, vaccinating children, cessation of smoking, daily prophylactic use of aspirin, and screening of breast and colorectal cancers had the most potential to prevent premature death. Preventive health measures that resulted in savings included vaccinating children and adults, smoking cessation, daily use of aspirin, and screening for issues with alcoholism, obesity, and vision failure. These authors estimated that if usage of these services in the United States increased to 90\\% of the population, there would be net savings of $", "after": "$88 billion was spent on heart disease. In an effort to encourage healthy lifestyle choices, as of 2010 workplace wellness programs were on the rise but the economics and effectiveness data were continuing to evolve and develop. Health insurance coverage impacts lifestyle choices, even intermittent loss of coverage had negative effects on healthy choices in the U.S. The repeal of the Affordable Care Act (ACA) could significantly impact coverage for many Americans as well as \"The Prevention and Public Health Fund\" which is the U.S. first and only mandatory funding stream dedicated to improving public health including counseling on lifestyle prevention issues, such as weight management, alcohol use, and treatment for depression. Because in the U.S. chronic illnesses predominate as a cause of death and pathways for treating chronic illnesses are complex and multifaceted, prevention is a best practice approach to chronic disease when possible. In many cases, prevention requires mapping complex pathways to determine the ideal point for intervention. Cost-effectiveness of prevention is achievable, but impacted by the length of time it takes to see effects/outcomes of intervention. This makes prevention efforts difficult to fund\u2014particularly in strained financial contexts. Prevention potentially creates other costs as well, due to extending the lifespan and thereby increasing opportunities for illness. In order to assess the cost-effectiveness of prevention, the cost of the preventive measure, savings from avoiding morbidity, and the cost from extending the lifespan need to be considered. Life extension costs become smaller when accounting for savings from postponing the last year of life, which makes up a large fraction of lifetime medical expenditures and becomes cheaper with age. Prevention leads to savings only if the cost of the preventive measure is less than the savings from avoiding morbidity net of the cost of extending the life span. In order to establish reliable economics of prevention for illnesses that are complicated in origin, knowing how best to assess prevention efforts, i.e. developing useful measures and appropriate scope, is required. Effectiveness There is no general consensus as to whether or not preventive healthcare measures are cost-effective, but they increase the quality of life dramatically. There are varying views on what constitutes a \"good investment.\" Some argue that preventive health measures should save more money than they cost, when factoring in treatment costs in the absence of such measures. Others have argued in favor of \"good value\" or conferring significant health benefits even if the measures do not save money. Furthermore, preventive health services are often described as one entity though they comprise a myriad of different services, each of which can individually lead to net costs, savings, or neither. Greater differentiation of these services is necessary to fully understand both the financial and health effects. A 2010 study reported that in the United States, vaccinating children, cessation of smoking, daily prophylactic use of aspirin, and screening of breast and colorectal cancers had the most potential to prevent premature death. Preventive health measures that resulted in savings included vaccinating children and adults, smoking cessation, daily use of aspirin, and screening for issues with alcoholism, obesity, and vision failure. These authors estimated that if usage of these services in the United States increased to 90\\% of the population, there would be net savings of $", "start_char_pos": 25038, "end_char_pos": 28627}, {"type": "R", "before": "$0.01 per ounce of sweetened beverages, applied nationally and administered at the state level (SSB), 2. elimination of the tax deductibility of advertising costs of TV advertisements for \"nutritionally poor\" foods and beverages seen by children and adolescents (TV AD), 3. state policy requiring all public elementary schools in which physical education (PE) is currently provided to devote \u226550\\% of PE class time to moderate and vigorous physical activity (Active PE), and 4. state policy to make early child educational settings healthier by increasing physical activity, improving nutrition, and reducing screen time (ECE).\" The CHOICES found that SSB, TV AD, and ECE led to net cost savings. Both SSB and TV AD increased quality adjusted life years and produced yearly tax revenue of 12.5 billion US dollars and 80 million US dollars, respectively. Some challenges with evaluating the effectiveness of child obesity interventions include: The economic consequences of childhood obesity are both short and long term. In the short term, obesity impairs cognitive achievement and academic performance. Some believe this is secondary to negative effects on mood or energy, but others suggest there may be physiological factors involved. Furthermore, obese children have increased health care expenses (e.g. medications, acute care visits). In the long term, obese children tend to become obese adults with associated increased risk for a chronic condition such as diabetes or hypertension. Any effect on their cognitive development may also affect their contributions to society and socioeconomic status. In the CHOICES, it was noted that translating the effects of these interventions may in fact differ among communities throughout the nation. In addition it was suggested that limited outcomes are studied and these interventions may have an additional effect that is not fully appreciated. Modeling outcomes in such interventions in children over the long term is challenging because advances in medicine and medical technology are unpredictable. The projections from cost-effective analysis may need to be reassessed more frequently. Economics of US preventive care As of 2009, the cost-effectiveness of preventive care is a highly debated topic. While some economists argue that preventive care is valuable and potentially cost saving, others believe it is an inefficient waste of resources. Preventive care is composed of a variety of clinical services and programs including annual doctor's check-ups, annual immunizations, and wellness programs; recent models show that these simple interventions can have significant economic impacts. Clinical preventive services & programs Research on preventive care addresses the question of whether it is cost saving or cost effective and whether there is an economics evidence base for health promotion and disease prevention. The need for and interest in preventive care is driven by the imperative to reduce health care costs while improving quality of care and the patient experience. Preventive care can lead to improved health outcomes and cost savings potential. Services such as health assessments/screenings, prenatal care, and telehealth and telemedicine can reduce morbidity or mortality with low cost or cost savings.Merkur, S., Sassi, F., & McDaid, D. (2013). Promoting health, preventing disease: Is there an economic case? European Observatory on Health Systems and Policies. Retrieved from URL Specifically, health assessments/screenings have cost savings potential, with varied cost-effectiveness based on screening and assessment type. Inadequate prenatal care can lead to an increased risk of prematurity, stillbirth, and infant death. Time is the ultimate resource and preventive care can help mitigate the time costs.Folland, S., Goodman, A., & Stano, M. (2013). The economics of health and health care. (7th ed.). Upper Saddle River: Pearson Education. Telehealth and telemedicine is one option that has gained consumer interest, acceptance and confidence and can improve quality of care and patient satisfaction.American Hospital Association. (2015, Jan). The Promise of Telehealth for Hospitals, Health Systems and Their Communities. Retrieved from URL Economics for investment There are benefits and trade-offs when considering investment in preventive care versus other types of clinical services. Preventive care can be a good investment as supported by the evidence base and can drive population health management objectives. The concepts of cost saving and cost-effectiveness are different and both are relevant to preventive care. For example, preventive care that may not save money may still provide health benefits. Thus, there is a need to compare interventions relative to impact on health and cost.Robert Wood Johnson Foundation. (2009). The cost savings and cost-effectiveness of clinical preventive care. The Synthesis Project: New Insights from Research Results. Research Synthesis Report No. 18. Preventive care transcends demographics and is applicable to people of every age. The Health Capital Theory underpins the importance of preventive care across the lifecycle and provides a framework for understanding the variances in health and health care that are experienced. It treats health as a stock that provides direct utility. Health depreciates with age and the aging process can be countered through health investments. The theory further supports that individuals demand good health, that the demand for health investment is a derived demand (i.e. investment is health is due to the underlying demand for good health), and the efficiency of the health investment process increases with knowledge (i.e. it is assumed that the more educated are more efficient consumers and producers of health). The prevalence elasticity of demand for prevention can also provide insights into the economics. Demand for preventive care can alter the prevalence rate of a given disease and further reduce or even reverse any further growth of prevalence. Reduction in prevalence subsequently leads to reduction in costs. There are a number of organizations and policy actions that are relevant when discussing the economics of preventive care services. The evidence base, viewpoints, and policy briefs from the Robert Wood Johnson Foundation, the Organisation for Economic Co-operation and Development (OECD), and efforts by the U.S. Preventive Services Task Force (USPSTF) all provide examples that improve the health and well-being of populations (e.g. preventive health assessments/screenings, prenatal care, and telehealth/telemedicine). The Patient Protection and Affordable Care Act (PPACA, ACA) has major influence on the provision of preventive care services, although it is currently under heavy scrutiny and review by the new administration. According to the Centers for Disease Control and Prevention (CDC), the ACA makes preventive care affordable and accessible through mandatory coverage of preventive services without a deductible, copayment, coinsurance, or other cost sharing.Centers for Disease Control and Prevention. (2013). Preventive Health Care. Retrieved from URL The U.S. Preventive Services Task Force (USPSTF), a panel of national experts in prevention and evidence-based medicine, works to improve health of Americans by making evidence-based recommendations about clinical preventive services.U.S. Preventive Services Task Force (USPSTF). (2017, Jan). USPSTF A and B Recommendations. Retrieved from URL They do not consider the cost of a preventive service when determining a recommendation. Each year, the organization delivers a report to Congress that identifies critical evidence gaps in research and recommends priority areas for further review.U.S. Preventive Services Task Force (USPSTF). (2016, Dec). Reports to Congress. Retrieved from URL The National Network of Perinatal Quality Collaboratives (NNPQC), sponsored by the CDC, supports state-based perinatal quality collaboratives (PQCs) in measuring and improving upon health care and health outcomes for mothers and babies. These PQCs have contributed to improvements such as reduction in deliveries before 39 weeks, reductions in healthcare associated bloodstream infections, and improvements in the utilization of antenatal corticosteroids.Centers for Disease Control and Prevention. (2017, Feb. 27). Perinatal Quality Collaboratives. Retrieved from URL Telehealth and telemedicine has realized significant growth and development recently. The Center for Connected Health Policy (The National Telehealth Policy Resource Center) has produced multiple reports and policy briefs on the topic of Telehealth and Telemedicine and how they contribute to preventive services.Center for Connected Health Policy. The National Telehealth Policy Resource Center. Reports and Policy Briefs. Retrieved from URL Policy actions and provision of preventive services do not guarantee utilization. Reimbursement has remained a significant barrier to adoption due to variances in payer and state level reimbursement policies and guidelines through government and commercial payers. Americans use preventive services at about half the recommended rate and cost-sharing, such as deductibles, co-insurance, or copayments, also reduce the likelihood that preventive services will be used. Further, despite the ACA's enhancement of Medicare benefits and preventive services, there were no effects on preventive service utilization, calling out the fact that other fundamental barriers exist. The Affordable Care Act and preventive healthcare The Patient Protection and Affordable Care Act, also known as just the Affordable Care Act or Obamacare, was passed and became law in the United States on March 23, 2010. The finalized and newly ratified law was to address many issues in the U.S. healthcare system, which included expansion of coverage, insurance market reforms, better quality, and the forecast of efficiency and costs. Under the insurance market reforms the act required that insurance companies no longer exclude people with pre-existing conditions, allow for children to be covered on their parents' plan until the age of 26, and expand appeals that dealt with reimbursement denials. The Affordable Care Act also banned the limited coverage imposed by health insurances, and insurance companies were to include coverage for preventive health care services. The U.S. Preventive Services Task Force has categorized and rated preventive health services as either \u2018\u201dA\u201d or \u201cB\u201d, as to which insurance companies must comply and present full coverage. Not only has the U.S. Preventive Services Task Force provided graded preventive health services that are appropriate for coverage, they have also provided many recommendations to clinicians and insurers to promote better preventive care to ultimately provide better quality of care and lower the burden of costs. Health insurance Healthcare insurance companies are willing to pay for preventive care despite the fact that patients are not acutely sick in hope that it will prevent them from developing a chronic disease later on in life. Today, health insurance plans offered through the Marketplace, mandated by the Affordable Care Act are required to provide certain preventive care services free of charge to patients. Section 2713 of the Affordable Care Act, specifies that all private Marketplace and all employer-sponsored private plans (except those grandfathered in) are required to cover preventive care services that are ranked A or B by the US Preventive Services Task Force free of charge to patients. For example, UnitedHealthcare insurance company has published patient guidelines at the beginning of the year explaining their preventive care coverage. Evaluating incremental benefits Evaluating the incremental benefits of preventive care requires a longer period of time when compared to acutely ill patients. Inputs into the model such as discounting rate and time horizon can have significant effects on the results. One controversial subject is use of a 10-year time frame to assess cost effectiveness of diabetes preventive services by the Congressional Budget Office. Preventive care services mainly focus on chronic disease. The Congressional Budget Office has provided guidance that further research is needed in the area of the economic impacts of obesity in the US before the CBO can estimate budgetary consequences. A bipartisan report published in May 2015 recognizes the potential of preventive care to improve patients' health at individual and population levels while decreasing the healthcare expenditure. Economic case Mortality from modifiable risk factors Chronic diseases such as heart disease, stroke, diabetes, obesity and cancer have become the most common and costly health problems in the United States. In 2014, it was projected that by 2023 that the number of chronic disease cases would increase by 42\\%, resulting in $", "after": "$0.01 per ounce of sweetened beverages, applied nationally and administered at the state level (SSB), 2. elimination of the tax deductibility of advertising costs of TV advertisements for \"nutritionally poor\" foods and beverages seen by children and adolescents (TV AD), 3. state policy requiring all public elementary schools in which physical education (PE) is currently provided to devote \u226550\\% of PE class time to moderate and vigorous physical activity (Active PE), and 4. state policy to make early child educational settings healthier by increasing physical activity, improving nutrition, and reducing screen time (ECE).\" The CHOICES found that SSB, TV AD, and ECE led to net cost savings. Both SSB and TV AD increased quality adjusted life years and produced yearly tax revenue of 12.5 billion U.S. dollars and 80 million U.S. dollars, respectively. Some challenges with evaluating the effectiveness of child obesity interventions include: The economic consequences of childhood obesity are both short and long term. In the short term, obesity impairs cognitive achievement and academic performance. Some believe this is secondary to negative effects on mood or energy, but others suggest there may be physiological factors involved. Furthermore, obese children have increased health care expenses (e.g. medications, acute care visits). In the long term, obese children tend to become obese adults with associated increased risk for a chronic condition such as diabetes or hypertension. Any effect on their cognitive development may also affect their contributions to society and socioeconomic status. In the CHOICES, it was noted that translating the effects of these interventions may in fact differ among communities throughout the nation. In addition it was suggested that limited outcomes are studied and these interventions may have an additional effect that is not fully appreciated. Modeling outcomes in such interventions in children over the long term is challenging because advances in medicine and medical technology are unpredictable. The projections from cost-effective analysis may need to be reassessed more frequently. Economics of U.S. preventive care As of 2009, the cost-effectiveness of preventive care is a highly debated topic. While some economists argue that preventive care is valuable and potentially cost saving, others believe it is an inefficient waste of resources. Preventive care is composed of a variety of clinical services and programs including annual doctor's check-ups, annual immunizations, and wellness programs; recent models show that these simple interventions can have significant economic impacts. Clinical preventive services and programs Research on preventive care addresses the question of whether it is cost saving or cost effective and whether there is an economics evidence base for health promotion and disease prevention. The need for and interest in preventive care is driven by the imperative to reduce health care costs while improving quality of care and the patient experience. Preventive care can lead to improved health outcomes and cost savings potential. Services such as health assessments/screenings, prenatal care, and telehealth and telemedicine can reduce morbidity or mortality with low cost or cost URL Specifically, health assessments/screenings have cost savings potential, with varied cost-effectiveness based on screening and assessment type. Inadequate prenatal care can lead to an increased risk of prematurity, stillbirth, and infant death. Time is the ultimate resource and preventive care can help mitigate the time costs.Folland, S., Goodman, A., & Stano, M. (2013). The economics of health and health care. (7th ed.). Upper Saddle River: Pearson Education. Telehealth and telemedicine is one option that has gained consumer interest, acceptance and confidence and can improve quality of care and patient satisfaction. Economics for investment There are benefits and trade-offs when considering investment in preventive care versus other types of clinical services. Preventive care can be a good investment as supported by the evidence base and can drive population health management objectives. The concepts of cost saving and cost-effectiveness are different and both are relevant to preventive care. Preventive care that may not save money may still provide health benefits; thus, there is a need to compare interventions relative to impact on health and cost.Robert Wood Johnson Foundation. (2009). The cost savings and cost-effectiveness of clinical preventive care. The Synthesis Project: New Insights from Research Results. Research Synthesis Report No. 18. Preventive care transcends demographics and is applicable to people of every age. The Health Capital Theory underpins the importance of preventive care across the lifecycle and provides a framework for understanding the variances in health and health care that are experienced. It treats health as a stock that provides direct utility. Health depreciates with age and the aging process can be countered through health investments. The theory further supports that individuals demand good health, that the demand for health investment is a derived demand (i.e. investment is health is due to the underlying demand for good health), and the efficiency of the health investment process increases with knowledge (i.e. it is assumed that the more educated are more efficient consumers and producers of health). The prevalence elasticity of demand for prevention can also provide insights into the economics. Demand for preventive care can alter the prevalence rate of a given disease and further reduce or even reverse any further growth of prevalence. Reduction in prevalence subsequently leads to reduction in costs. There are a number of organizations and policy actions that are relevant when discussing the economics of preventive care services. The evidence base, viewpoints, and policy briefs from the Robert Wood Johnson Foundation, the Organisation for Economic Co-operation and Development (OECD), and efforts by the U.S. Preventive Services Task Force (USPSTF) all provide examples that improve the health and well-being of populations (e.g. preventive health assessments/screenings, prenatal care, and telehealth/telemedicine). The Affordable Care Act (ACA) has major influence on the provision of preventive care services, although it is currently under heavy scrutiny and review by the new administration. According to the Centers for Disease Control and Prevention (CDC), the ACA makes preventive care affordable and accessible through mandatory coverage of preventive services without a deductible, copayment, coinsurance, or other cost URL The U.S. Preventive Services Task Force (USPSTF), a panel of national experts in prevention and evidence-based medicine, works to improve health of Americans by making evidence-based recommendations about clinical preventive services. They do not consider the cost of a preventive service when determining a recommendation. Each year, the organization delivers a report to Congress that identifies critical evidence gaps in research and recommends priority areas for further URL The National Network of Perinatal Quality Collaboratives (NNPQC), sponsored by the CDC, supports state-based perinatal quality collaboratives (PQCs) in measuring and improving upon health care and health outcomes for mothers and babies. These PQCs have contributed to improvements such as reduction in deliveries before 39 weeks, reductions in healthcare associated bloodstream infections, and improvements in the utilization of antenatal corticosteroids. Telehealth and telemedicine has realized significant growth and development recently. The Center for Connected Health Policy (The National Telehealth Policy Resource Center) has produced multiple reports and policy briefs on the topic of Telehealth and Telemedicine and how they contribute to preventive URL Policy actions and provision of preventive services do not guarantee utilization. Reimbursement has remained a significant barrier to adoption due to variances in payer and state level reimbursement policies and guidelines through government and commercial payers. Americans use preventive services at about half the recommended rate and cost-sharing, such as deductibles, co-insurance, or copayments, also reduce the likelihood that preventive services will be used. Despite the ACA's enhancement of Medicare benefits and preventive services, there were no effects on preventive service utilization, calling out the fact that other fundamental barriers exist. Affordable Care Act and preventive healthcare The Patient Protection and Affordable Care Act, also known as just the Affordable Care Act or Obamacare, was passed and became law in the United States on March 23, 2010. The finalized and newly ratified law was to address many issues in the U.S. healthcare system, which included expansion of coverage, insurance market reforms, better quality, and the forecast of efficiency and costs. Under the insurance market reforms the act required that insurance companies no longer exclude people with pre-existing conditions, allow for children to be covered on their parents' plan until the age of 26, and expand appeals that dealt with reimbursement denials. The Affordable Care Act also banned the limited coverage imposed by health insurances, and insurance companies were to include coverage for preventive health care services. The U.S. Preventive Services Task Force has categorized and rated preventive health services as either A or B, as to which insurance companies must comply and present full coverage. Not only has the U.S. Preventive Services Task Force provided graded preventive health services that are appropriate for coverage, they have also provided many recommendations to clinicians and insurers to promote better preventive care to ultimately provide better quality of care and lower the burden of costs. Health insurance Healthcare insurance companies are willing to pay for preventive care despite the fact that patients are not acutely sick in hope that it will prevent them from developing a chronic disease later on in life. Today, health insurance plans offered through the Marketplace, mandated by the Affordable Care Act are required to provide certain preventive care services free of charge to patients. Section 2713 of the Affordable Care Act, specifies that all private Marketplace and all employer-sponsored private plans (except those grandfathered in) are required to cover preventive care services that are ranked A or B by the U.S. Preventive Services Task Force free of charge to patients. UnitedHealthcare insurance company has published patient guidelines at the beginning of the year explaining their preventive care coverage. Evaluating incremental benefits Evaluating the incremental benefits of preventive care requires a longer period of time when compared to acutely ill patients. Inputs into the model such as discounting rate and time horizon can have significant effects on the results. One controversial subject is use of a 10-year time frame to assess cost effectiveness of diabetes preventive services by the Congressional Budget Office. Preventive care services mainly focus on chronic disease. The Congressional Budget Office has provided guidance that further research is needed in the area of the economic impacts of obesity in the U.S. before the CBO can estimate budgetary consequences. A bipartisan report published in May 2015 recognizes the potential of preventive care to improve patients' health at individual and population levels while decreasing the healthcare expenditure. Economic case Mortality from modifiable risk factors Chronic diseases such as heart disease, stroke, diabetes, obesity and cancer have become the most common and costly health problems in the United States. In 2014, it was projected that by 2023 that the number of chronic disease cases would increase by 42\\%, resulting in $", "start_char_pos": 29385, "end_char_pos": 42350}, {"type": "D", "before": "output.Milken Institute. (January 2014). Checkup Time, Chronic Disease and Wellness in America: Measuring the Economic Burden in a Changing Nation. Accessed 3/23/18 from", "after": null, "start_char_pos": 42395, "end_char_pos": 42564}, {"type": "D", "before": "mortality.Centers for Disease Control and Prevention. CDC National Health Report Highlights. Accessed 3/18/18 from", "after": null, "start_char_pos": 42619, "end_char_pos": 42733}, {"type": "D", "before": "deaths.Centers for Disease Control and Prevention. (2017). Chronic Diseases Overview. Accessed 3/18/18 from", "after": null, "start_char_pos": 43127, "end_char_pos": 43234}, {"type": "R", "before": "$220 billion. Childhood vaccinations Childhood immunizations are largely responsible for the increase in life expectancy in the 20th century. From an economic standpoint, childhood vaccines demonstrate a very high return on investment. According to Healthy People 2020, for every birth cohort that receives the routine childhood vaccination schedule, direct health care costs are reduced by $", "after": "$220 billion. Childhood vaccinations Childhood immunizations are largely responsible for the increase in life expectancy in the 20th century. From an economic standpoint, childhood vaccines demonstrate a very high return on investment. According to Healthy People 2020, for every birth cohort that receives the routine childhood vaccination schedule, direct health care costs are reduced by $", "start_char_pos": 43601, "end_char_pos": 43993}, {"type": "R", "before": "$33.4 billion in indirect costs.Healthy People 2020. Immunization and Infectious Diseases: Overview. Accessed 3/18/18 from URL The economic benefits of childhood vaccination extend beyond individual patients to insurance plans and vaccine manufacturers, all while improving the health of the population. Health capital theory The burden of preventable illness extends beyond the healthcare sector, incurring costs related to lost productivity among workers in the workforce. Indirect costs related to poor health behaviors and associated chronic disease costs U.S. employers billions of dollars each year. According to the American Diabetes Association (ADA), medical costs for employees with diabetes are twice as high as for workers without diabetes and are caused by work-related absenteeism ($", "after": "$33.4 billion in indirect costs. The economic benefits of childhood vaccination extend beyond individual patients to insurance plans and vaccine manufacturers, all while improving the health of the population. Health capital theory The burden of preventable illness extends beyond the healthcare sector, incurring costs related to lost productivity among workers in the workforce. Indirect costs related to poor health behaviors and associated chronic disease costs U.S. employers billions of dollars each year. According to the American Diabetes Association (ADA), medical costs for employees with diabetes are twice as high as for workers without diabetes and are caused by work-related absenteeism ($", "start_char_pos": 44024, "end_char_pos": 44821}, {"type": "R", "before": "URL", "after": "Workforce.", "start_char_pos": 45268, "end_char_pos": 45271}, {"type": "R", "before": "Health Capital", "after": "health capital", "start_char_pos": 45276, "end_char_pos": 45290}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 45368, "end_char_pos": 45369}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 45446, "end_char_pos": 45447}, {"type": "R", "before": "Quality adjusted life years", "after": "Quality-adjusted life years", "start_char_pos": 46115, "end_char_pos": 46142}, {"type": "D", "before": "QALY.The Synthesis Project, Policy Brief No. 18. (September 2009). Cost savings and cost-effectiveness of clinical preventive care. Robert Wood Johnson Foundation. Accessed 3/18/18 from", "after": null, "start_char_pos": 46553, "end_char_pos": 46738}, {"type": "R", "before": "$100,000 per QALY and are considered to be favorably cost-effective. These include screenings for HIV and chlamydia, cancers of the colon, breast and cervix, vision screening, and screening for abdominal aortic aneurysms in men >60 in certain populations. Alcohol and tobacco screening were found to be cost-saving in some reviews and cost-effective in others. According to the RWJF analysis, two preventive interventions were found to save costs in all reviews: childhood immunizations and counseling adults on the use of aspirin. Minority populations Health disparities are increasing in the United States for chronic diseases such as obesity, diabetes, cancer, and cardiovascular disease. Populations at heightened risk for health inequities are the growing proportion of racial and ethnic minorities, including African Americans, American Indians, Hispanics/Latinos, Asian Americans, Alaska Natives and Pacific Islanders.The Association of State and Territorial Health Officials. (2012). The economic case for health equity. Accessed 3/18/18 from URL According to the Racial and Ethnic Approaches to Community Health (REACH), a national CDC program, non-Hispanic blacks currently have the highest rates of obesity (48\\%), and risk of newly diagnosed diabetes is 77\\% higher among non-Hispanic blacks, 66\\% higher among Hispanics/Latinos and 18\\% higher among Asian Americans compared to non-Hispanic whites. Current U.S. population projections predict that more than half of Americans will belong to a minority group by 2044.Colby, S.L., & Ortman, J.M. (March, 2015). Projections of the size and composition of the U.S. population: 2014-2060. United States Census Bureau: Current Population Reports, pp. 25-1143. Accessed 3/18/18 from URL Without targeted preventive interventions, medical costs from chronic disease inequities will become unsustainable. Broadening health policies designed to improve delivery of preventive services for minority populations may help reduce substantial medical costs caused by inequities in health care, resulting in a return on investment. Policies Chronic disease is a population level issue that requires population health level efforts and national and state level public policy to effectively prevent, rather than individual level efforts. The United States currently employs many public health policy efforts aligned with the preventive health efforts discussed above. For instance, the Centers for Disease Control and Prevention support initiatives such as Health in All Policies and HI-5 (Health Impact in 5 Years), collaborative efforts that aim to consider prevention across sectorsCenters for Disease Control and Prevention. (9 June 2016). Health in All Policies. Accessed 3/18/2018 from: URL and address social determinants of health as a method of primary prevention for chronic disease.Centers for Disease Control and Prevention. (21 Oct 2016). Health Impact in 5 Years. Accessed 3/18/2018 from: URL Specific examples of programs targeting vaccination and obesity prevention in childhood are discussed in the sections to follow. Obesity Policies that address the obesity epidemic should be proactive and far-reaching, including a variety of stakeholders both in healthcare and in other sectors. Recommendations from the Institute of Medicine in 2012 suggest that \u201c\u2026concerted action be taken across and within five environments (physical activity (PA), food and beverage, marketing and messaging, healthcare and worksites, and schools) and all sectors of society (including government, business and industry, schools, child care, urban planning, recreation, transportation, media, public health, agriculture, communities, and home) in order for obesity prevention efforts to truly be successful.\u201d There are dozens of current policies acting at either (or all of) the federal, state, local and school levels. Most states employ a physical education requirement of 150 minutes of physical education per week at school, a policy of the National Association of Sport and Physical Education. In some cities, including Philadelphia, a sugary food tax is employed. This is a part of an amendment to Title 19 of the Philadelphia Code, \u201cFinance, Taxes and Collections\u201d; Chapter 19-4100, \u201cSugar-Sweetened Beverage Tax, that was approved 2016, which establishes an excise tax of $", "after": "$100,000 per QALY and are considered to be favorably cost-effective. These include screenings for HIV and chlamydia, cancers of the colon, breast and cervix, vision screening, and screening for abdominal aortic aneurysms in men >60 in certain populations. Alcohol and tobacco screening were found to be cost-saving in some reviews and cost-effective in others. According to the RWJF analysis, two preventive interventions were found to save costs in all reviews: childhood immunizations and counseling adults on the use of aspirin. Minority populations Health disparities are increasing in the United States for chronic diseases such as obesity, diabetes, cancer, and cardiovascular disease. Populations at heightened risk for health inequities are the growing proportion of racial and ethnic minorities, including African Americans, American Indians, Hispanics/Latinos, Asian Americans, Alaska Natives and Pacific URL According to the Racial and Ethnic Approaches to Community Health (REACH), a national CDC program, non-Hispanic blacks currently have the highest rates of obesity (48\\%), and risk of newly diagnosed diabetes is 77\\% higher among non-Hispanic blacks, 66\\% higher among Hispanics/Latinos and 18\\% higher among Asian Americans compared to non-Hispanic whites. Current U.S. population projections predict that more than half of Americans will belong to a minority group by 2044. Without targeted preventive interventions, medical costs from chronic disease inequities will become unsustainable. Broadening health policies designed to improve delivery of preventive services for minority populations may help reduce substantial medical costs caused by inequities in health care, resulting in a return on investment. Policies Chronic disease is a population level issue that requires population health level efforts and national and state level public policy to effectively prevent, rather than individual level efforts. The United States currently employs many public health policy efforts aligned with the preventive health efforts discussed above. The Centers for Disease Control and Prevention support initiatives such as Health in All Policies and HI-5 (Health Impact in 5 Years), and collaborative efforts that aim to consider prevention across sectors and address social determinants of health as a method of primary prevention for chronic disease. Obesity Policies that address the obesity epidemic should be proactive and far-reaching, including a variety of stakeholders both in healthcare and in other sectors. Recommendations from the Institute of Medicine in 2012 suggest that \"concerted action be taken across and within five environments (physical activity (PA), food and beverage, marketing and messaging, healthcare and worksites, and schools) and all sectors of society (including government, business and industry, schools, child care, urban planning, recreation, transportation, media, public health, agriculture, communities, and home) in order for obesity prevention efforts to truly be successful.\" There are dozens of current policies acting at either (or all of) the federal, state, local and school levels. Most states employ a physical education requirement of 150 minutes of physical education per week at school, a policy of the National Association of Sport and Physical Education. In some cities, including Philadelphia, a sugary food tax is employed. This is a part of an amendment to Title 19 of the Philadelphia Code, \"Finance, Taxes and Collections\", Chapter 19-4100, Sugar-Sweetened Beverage Tax that was approved 2016, which establishes an excise tax of $", "start_char_pos": 47162, "end_char_pos": 51482}, {"type": "D", "before": "sweeteners.City of Philadelphia. Bill No. 160176. Accessed 3/18/18 from", "after": null, "start_char_pos": 51578, "end_char_pos": 51649}, {"type": "R", "before": "For example, under", "after": "Under", "start_char_pos": 51863, "end_char_pos": 51881}, {"type": "D", "before": "Healthy Food Policy Project. (2017). Accessed 3/18/18 from URL", "after": null, "start_char_pos": 52107, "end_char_pos": 52169}, {"type": "D", "before": "Council for Better Business Bureaus, Inc. (2018). Accessed 3/18/18 from URL", "after": null, "start_char_pos": 52556, "end_char_pos": 52631}, {"type": "D", "before": "adolescents.Frazier, W.C.", "after": null, "start_char_pos": 52920, "end_char_pos": 52945}, {"type": "D", "before": "Harris, J.L. (June 2017). Trends in television food advertising to young people: 2016 update. Accessed 3/18/18 from", "after": null, "start_char_pos": 52946, "end_char_pos": 53061}, {"type": "R", "before": "currently", "after": "only", "start_char_pos": 53451, "end_char_pos": 53460}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 53492, "end_char_pos": 53493}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 53526, "end_char_pos": 53527}, {"type": "R", "before": "Immunization Action Coalition. (2018). State mandates on immunization and vaccine-preventable diseases. Accessed 3/18/18 from URL These schedules can be viewed on the CDC website .Centers for Disease Control and Prevention. (2018). Recommended immunization schedule for children and adolescents aged 18 years or younger, United States, 2018. Accessed 3/18/18 from URL", "after": "The CDC website maintains such schedules.", "start_char_pos": 53795, "end_char_pos": 54162}, {"type": "D", "before": "Advisory Committee on Immunization Practices. Accessed 3/18/18 from URL", "after": null, "start_char_pos": 54430, "end_char_pos": 54501}], "sents_char_pos": [0, 70, 160, 316, 355, 418, 472, 681, 851, 908, 1036, 1180, 1305, 1552, 1587, 1760, 1897, 1947, 2020, 2078, 2516, 2536, 2560, 2645, 3032, 3528, 3691, 3835, 3973, 4042, 4136, 4256, 4366, 4533, 4734, 5085, 5321, 5565, 5848, 5952, 6419, 6641, 6905, 7054, 7439, 7597, 7657, 7877, 7917, 7935, 8267, 8473, 8683, 8825, 8920, 9040, 9540, 9717, 9936, 10339, 10817, 10964, 11176, 11368, 11488, 11638, 11712, 11826, 11966, 12033, 12140, 12211, 12266, 12279, 12492, 12548, 12603, 12747, 12801, 12908, 13255, 13414, 13581, 13646, 13757, 13958, 14044, 14156, 14218, 14240, 14295, 14338, 14441, 14637, 14714, 14837, 14980, 15087, 15149, 15358, 15475, 15554, 15657, 15829, 16069, 16302, 16458, 16594, 16668, 16852, 17071, 17199, 17574, 17709, 18052, 18137, 18299, 18391, 18504, 18594, 18696, 18836, 19046, 19192, 19407, 19677, 19875, 20000, 20056, 20262, 20418, 20665, 20696, 20847, 20933, 21130, 21280, 21405, 21539, 21690, 21842, 21961, 22145, 22295, 22358, 22640, 22705, 22801, 22897, 22928, 23090, 23234, 23539, 23609, 23751, 23785, 23982, 24088, 24194, 24315, 24540, 24772, 24881, 25077, 25266, 25405, 25772, 25987, 26094, 26227, 26320, 26452, 26642, 26840, 27004, 27220, 27397, 27462, 27611, 27737, 27935, 28049, 28275, 28481, 28730, 28912, 29112, 29364, 29593, 30013, 30081, 30238, 30405, 30488, 30622, 30725, 30875, 30990, 31131, 31279, 31436, 31524, 31637, 31783, 31940, 32030, 32261, 32422, 32503, 32663, 32706, 32771, 32824, 32987, 33088, 33172, 33217, 33258, 33269, 33308, 33469, 33499, 33512, 33591, 33757, 33887, 33994, 34082, 34168, 34199, 34276, 34335, 34451, 34647, 34705, 34800, 35175, 35272, 35417, 35483, 35615, 36004, 36214, 36456, 36499, 36531, 36785, 36830, 36843, 36875, 36983, 37142, 37187, 37200, 37221, 37477, 37696, 37739, 37756, 37790, 37895, 38123, 38158, 38206, 38233, 38334, 38517, 38720, 38922, 39143, 39360, 39627, 39800, 39987, 40300, 40525, 40709, 41001, 41154, 41313, 41422, 41576, 41634, 41829, 42024, 42231, 42402, 42419, 42435, 42542, 42629, 42672, 42711, 42811, 43028, 43134, 43177, 43212, 43401, 43614, 43742, 43836, 44056, 44076, 44124, 44327, 44498, 44629, 44989, 45445, 45495, 45522, 45580, 45605, 45870, 46114, 46258, 46400, 46558, 46619, 46684, 46716, 46916, 47006, 47230, 47417, 47522, 47693, 47853, 48087, 48145, 48190, 48573, 48691, 48733, 48808, 48878, 49020, 49240, 49444, 49574, 49835, 49850, 49874, 50000, 50043, 50058, 50084, 50242, 50408, 50479, 50909, 51020, 51199, 51270, 51373, 51589, 51610, 51627, 51862, 52008, 52106, 52135, 52268, 52383, 52555, 52605, 52729, 52815, 52932, 52971, 53039, 53320, 53441, 53525, 53794, 53825, 53898, 53975, 54018, 54136, 54359, 54475]}
+{"doc_id": "10399772", "revision_depth": "1", "before_revision": "Agnotology (formerly agnatology) is the study of culturally induced ignorance or doubt, particularly the publication of inaccurate or misleading scientific data. It was coined in 1995 by Robert N. Proctor, a Stanford University professor, and linguist Iain Boal . interview with Robert Proctor \"So I asked a linguist colleague of mine, Iain Boal, if he could coin a term that would designate the production of ignorance and the study of ignorance, and we came up with a number of different possibilities.\" The word is based on the Neoclassical Greek word , agn\u014dsis , \"not knowing\" ( cf. Attic Greek \u1f04\u03b3\u03bd\u03c9\u03c4\u03bf\u03c2 \"unknown\" See: Wiktionary entry on \u1f04\u03b3\u03bd\u03c9\u03c4\u03bf\u03c2. ), and , -logia . Proctor cites as a prime example the tobacco industry's advertising campaign to manufacture doubt about the cancerous and other adverse health effects of tobacco use. More generally, the term also highlights the condition where more knowledge of a subject leaves one more uncertain than before. David Dunning of Cornell University warns that \"the internet is helping propagate ignorance,... which makes [users] prey for powerful interests wishing to deliberately spread ignorance \" . Irvin C. Schick refers to unknowledge \"to distinguish it from ignorance . He uses the example of \"terra incognita\" in early maps , noting that \" The reconstruction of parts of the globe as uncharted territory is...the production of unknowledge, the transformation of those parts into potential objects of Western political and economic attention. It is the enabling of colonialism \". Agnotology also focuses on how and why diverse forms of knowledge do not \"come to be \", or are ignored or delayed. For example, knowledge about plate tectonics was censored and delayed for at least a decade because some evidence remained classified military information related to undersea warfare. The term \"agnotology\" was first coined in a footnote in Proctor's 1995 book, The Cancer Wars: How Politics Shapes What We Know and Don't Know About Cancer: \" Historians and philosophers of science have tended to treat ignorance as an ever-expanding vacuum into which knowledge is sucked \u2013 or even, as Johannes Kepler once put it, as the mother who must die for science to be born. Ignorance, though, is more complex than this. It has a distinct and changing political geography that is often an excellent indicator of the politics of knowledge. We need a political agnotology to complement our political epistemologies \". Proctor was quoted using the term to describe his research \"only half jokingly\" , as \"agnotology \" in a 2001 interview about his lapidary work with the colorful rock agate. He connected the two seemingly unrelated topics by noting the lack of geologic knowledge and study of agate since its first known description by Theophrastus in 300 BC, relative to the extensive research on other rocks and minerals such as diamonds, asbestos, granite, and coal, all of which have much higher commercial value. He said agate was a \"victim of scientific disinterest \", the same \"structured apathy\" he called \"the social construction of ignorance \". He was later quoted as calling it \"agnotology, the study of ignorance \", in a 2003 The New York Times story on medical historians testifying as expert witnesses. Proctor co-organized a pair of events with Londa Schiebinger, his wife , who is also a science historyprofessor : the first was a workshop at the Pennsylvania State University in 2003 titled \"Agnatology: The Cultural Production of Ignorance \" , and later a conference at Stanford University in 2005 titled \"Agnotology: The Cultural Production of Ignorance\". Political economy In 2004, Londa Schiebinger gave a more precise definition of agnotology in a paper on 18th-century voyages of scientific discovery and gender relations, and contrasted it with epistemology, the theory of knowledge, saying that the latter questions how we know while the former questions why we do not know: \"Ignorance is often not merely the absence of knowledge but an outcome of cultural and political struggle \". Its use as a critical description of the political economy has been expanded upon by Michael Betancourt in a 2010 article titled \"Immaterial Value and Scarcity in Digital Capitalism \" and expanded in the book The Critique of Digital Capitalism. His analysis is focused on the housing bubble as well as the bubble economy of the period from 1980 to 2008. Betancourt argues that this political economy should be termed \"agnotologic capitalism\" because the systemic production and maintenance of ignorance is a major feature that enables the economy to function as it allows the creation of a \"bubble economy \". Betancourt's argument is posed in relation to the idea of affective labor . He states that The creation of systemic unknowns where any potential \"fact\" is always already countered by an alternative of apparently equal weight and value renders engagement with the conditions of reality \u2013 the very situations affective labor seeks to assuage \u2013 contentious and a source of confusion, reflected by the inability of participants in bubbles to be aware of the imminent collapse until after it has happened. The biopolitical paradigm of distraction, what [Juan Martin] Prada calls \"life to enjoy\", can only be maintained if the underlying strictures remain hidden from view. If affective labor works to reduce alienation, agnotology works to eliminate the potential for dissent. In his view, the role of affective labor is to enable the continuation of the agnotologic effects that enable the maintenance of the capitalist status quo. Agnoiology A similar word from the same Greek roots , agnoiology, meaning \"the science or study of ignorance, which determines its quality and conditions\" or \"the doctrine concerning those things of which we are necessarily ignorant \" describes a branch of philosophy studied by James Frederick Ferrier in the 19th century. Ainigmology Anthropologist Glenn Stone points out that most of the examples of agnotology (such as work promoting tobacco use) do not actually create a lack of knowledge so much as they create confusion. A more accurate term for such writing would be \"ainigmology\", from the root ainigma (as in \"enigma\" ); in Greek this refers to riddles or to language that obscures the true meaning of a story.Stone, Glenn Davis 2014 Biosecurity in the Age of Genetic Engineering. In Bioinsecurity and Human Vulnerability, ed Nancy Chen and Lesley Sharp, pp. 71-86. Santa Fe: SAR Press. Media influence The availability of such large amounts of knowledge in this information age may not necessarily be producing a knowledgeable citizenry. Instead it may be allowing many people to cherry-pick information in blogs or news that reinforces their existing beliefs . and to be distracted from new knowledge by repetitive or base entertainments. There is conflicting evidence on how television viewing affects value formation and intelligence. An emerging new scientific discipline that has connections to agnotology is cognitronics: cognitronics aims (a) at explicating the distortions in the perception of the world caused by the information society and globalization and (b) at coping with these distortions in different fields. Cognitronics is studying and looking for the ways of improving cognitive mechanisms of processing information and developing emotional sphere of the personality \u2013 the ways aiming at compensating three mentioned shifts in the systems of values and, as an indirect consequence, for the ways of developing symbolic information processing skills of the learners, linguistic mechanisms, associative and reasoning abilities, broad mental outlook being important preconditions of successful work practically in every sphere of professional activity in information society. The field of cognitronics appears to be growing as international conferences have centered on the topic. The 2013 conference was held in Slovenia.", "after_revision": "Agnotology (formerly agnatology) is the study of deliberate, culturally-induced ignorance or doubt, typically to sell a product or win favour, particularly through the publication of inaccurate or misleading scientific data. More generally, the term also highlights the condition where more knowledge of a subject leaves one more uncertain than before. Coined in 1995 by Stanford University professor Robert N. Proctor, along with linguist Iain Boal , interview with Robert Proctor \"So I asked a linguist colleague of mine, Iain Boal, if he could coin a term that would designate the production of ignorance and the study of ignorance, and we came up with a number of different possibilities.\" the word is based on the Neoclassical Greek word agn\u014dsis (, 'not knowing'; cf. Attic Greek , 'unknown') See: Wiktionary entry on \u1f04\u03b3\u03bd\u03c9\u03c4\u03bf\u03c2. and -logia () . Proctor cites as a prime example the tobacco industry's advertising campaign to manufacture doubt about the cancerous and other adverse health effects of tobacco use. David Dunning of Cornell University warns that \"the internet is helping propagate ignorance,... which makes [users] prey for powerful interests wishing to deliberately spread ignorance . \"Kenyon, Georgina (2016 January 6). \"The man who studies the spread of ignorance.\" BBC Future. Irvin C. Schick refers to unknowledge \"to distinguish it from ignorance ,\" using the example of \"terra incognita\" in early maps to note that the \" reconstruction of parts of the globe as uncharted territory is...the production of unknowledge, the transformation of those parts into potential objects of Western political and economic attention. It is the enabling of colonialism .\" Agnotology also focuses on how and why diverse forms of knowledge do not \"come to be ,\" or are ignored or delayed. For example, knowledge about plate tectonics was censored and delayed for at least a decade because some evidence remained classified military information related to undersea warfare. The term \"agnotology\" was first coined in a footnote in Stanford University professor Robert N. Proctor's 1995 book, The Cancer Wars: How Politics Shapes What We Know and Don't Know About Cancer: Historians and philosophers of science have tended to treat ignorance as an ever-expanding vacuum into which knowledge is sucked \u2013 or even, as Johannes Kepler once put it, as the mother who must die for science to be born. Ignorance, though, is more complex than this. It has a distinct and changing political geography that is often an excellent indicator of the politics of knowledge. We need a political agnotology to complement our political epistemologies .In a 2001 interview about his lapidary work with agate, a colorful rock, Proctor was quoted using the term to describe his research \"only half jokingly\" as \"agnotology . \" He connected the two seemingly unrelated topics by noting the lack of geologic knowledge and study of agate since its first known description by Theophrastus in 300 BC, relative to the extensive research on other rocks and minerals such as diamonds, asbestos, granite, and coal, all of which have much higher commercial value. He said agate was a \"victim of scientific disinterest ,\" the same \"structured apathy\" he called \"the social construction of ignorance .\" He was later quoted as calling it \"agnotology, the study of ignorance ,\" in a 2003 The New York Times story on medical historians who testify as expert witnesses. Proctor co-organized a pair of events with Londa Schiebinger, his wife and fellow professor of science history : the first was a workshop at the Pennsylvania State University in 2003 titled \"Agnatology: The Cultural Production of Ignorance ; \" and later a conference at Stanford University in 2005 titled \"Agnotology: The Cultural Production of Ignorance\". Political economy In 2004, Londa Schiebinger gave a more precise definition of agnotology in a paper on 18th-century voyages of scientific discovery and gender relations, and contrasted it with epistemology, the theory of knowledge, saying that the latter questions how humans know while the former questions why humans do not know: \"Ignorance is often not merely the absence of knowledge but an outcome of cultural and political struggle .\" Its use as a critical description of the political economy has been expanded upon by Michael Betancourt in a 2010 article titled \"Immaterial Value and Scarcity in Digital Capitalism , \" and expanded in the book The Critique of Digital Capitalism. His analysis is focused on the housing bubble as well as the bubble economy of the period from 1980 to 2008. Betancourt argues that this political economy should be termed \"agnotologic capitalism\" because the systemic production and maintenance of ignorance is a major feature that enables the economy to function as it allows the creation of a \"bubble economy .\" Betancourt's argument is posed in relation to the idea of affective labor : The creation of systemic unknowns where any potential \"fact\" is always already countered by an alternative of apparently equal weight and value renders engagement with the conditions of reality \u2013 the very situations affective labor seeks to assuage \u2013 contentious and a source of confusion, reflected by the inability of participants in bubbles to be aware of the imminent collapse until after it has happened. The biopolitical paradigm of distraction, what [Juan Martin] Prada calls \"life to enjoy\", can only be maintained if the underlying strictures remain hidden from view. If affective labor works to reduce alienation, agnotology works to eliminate the potential for dissent. In his view, the role of affective labor is to enable the continuation of the agnotologic effects that enable the maintenance of the capitalist status quo. Agnoiology A similar word to agnotology, agnoiology, comes from the same Greek roots and is used to mean either \"the science or study of ignorance, which determines its quality and conditions\" or \"the doctrine concerning those things of which we are necessarily ignorant , \" describing a branch of philosophy studied by James Frederick Ferrier in the 19th century. Ainigmology Anthropologist Glenn Stone points out that most of the examples of agnotology (such as work promoting tobacco use) do not actually create a lack of knowledge so much as they create confusion. A more accurate term for such writing would be \"ainigmology\", from the root ainigma (as in 'enigma' ); in Greek this refers to riddles or to language that obscures the true meaning of a story.Stone, Glenn Davis 2014 Biosecurity in the Age of Genetic Engineering. In Bioinsecurity and Human Vulnerability, ed Nancy Chen and Lesley Sharp, pp. 71-86. Santa Fe: SAR Press. Media influence The availability of such large amounts of knowledge in this information age may not necessarily be producing a knowledgeable citizenry. Instead , it may be allowing many people to cherry-pick information in blogs or news that reinforces their existing beliefs , and to be distracted from new knowledge by repetitive or base entertainments. There is conflicting evidence on how television viewing affects value formation and intelligence. An emerging new scientific discipline that has connections to agnotology is cognitronics: Rueckert, Ulrich. 2020. \"Human-Machine Interaction and Cognitronics.\" In NANO-CHIPS 2030, edited by B. Murmann and B. Hoefflinger, The Frontiers Collection. Cham: Springer. Cognitonics, first of all, aims (a) at explicating the distortions in the perception of the world caused by the information society and globalization and (b) at coping with these distortions in different fields. Cognitronics is studying and looking for the ways of improving cognitive mechanisms of processing information and developing emotional sphere of the personality \u2013 the ways aiming at compensating three mentioned shifts in the systems of values and, as an indirect consequence, for the ways of developing symbolic information processing skills of the learners, linguistic mechanisms, associative and reasoning abilities, broad mental outlook being important preconditions of successful work practically in every sphere of professional activity in information society. The field of cognitronics appears to be growing as international conferences have centered on the topic. The 2013 conference was held in Slovenia.", "edit_actions": [{"type": "R", "before": "culturally induced", "after": "deliberate, culturally-induced", "start_char_pos": 49, "end_char_pos": 67}, {"type": "R", "before": "particularly", "after": "typically to sell a product or win favour, particularly through", "start_char_pos": 88, "end_char_pos": 100}, {"type": "R", "before": "It was coined", "after": "More generally, the term also highlights the condition where more knowledge of a subject leaves one more uncertain than before.", "start_char_pos": 162, "end_char_pos": 175}, {"type": "A", "before": null, "after": "Coined", "start_char_pos": 176, "end_char_pos": 176}, {"type": "A", "before": null, "after": "Stanford University professor", "start_char_pos": 188, "end_char_pos": 188}, {"type": "R", "before": "a Stanford University professor, and", "after": "along with", "start_char_pos": 208, "end_char_pos": 244}, {"type": "R", "before": ".", "after": ",", "start_char_pos": 264, "end_char_pos": 265}, {"type": "R", "before": "The", "after": "the", "start_char_pos": 508, "end_char_pos": 511}, {"type": "D", "before": ",", "after": null, "start_char_pos": 557, "end_char_pos": 558}, {"type": "R", "before": ", \"not knowing\" (", "after": "(, 'not knowing';", "start_char_pos": 567, "end_char_pos": 584}, {"type": "R", "before": "\u1f04\u03b3\u03bd\u03c9\u03c4\u03bf\u03c2 \"unknown\"", "after": ", 'unknown')", "start_char_pos": 601, "end_char_pos": 618}, {"type": "R", "before": "), and ,", "after": "and", "start_char_pos": 653, "end_char_pos": 661}, {"type": "A", "before": null, "after": "()", "start_char_pos": 669, "end_char_pos": 669}, {"type": "D", "before": "More generally, the term also highlights the condition where more knowledge of a subject leaves one more uncertain than before.", "after": null, "start_char_pos": 839, "end_char_pos": 966}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 1152, "end_char_pos": 1153}, {"type": "A", "before": null, "after": "\"Kenyon, Georgina (2016 January 6). \"The man who studies the spread of ignorance.\" BBC Future.", "start_char_pos": 1156, "end_char_pos": 1156}, {"type": "R", "before": ". He uses", "after": ",\" using", "start_char_pos": 1229, "end_char_pos": 1238}, {"type": "R", "before": ", noting that", "after": "to note that the", "start_char_pos": 1286, "end_char_pos": 1299}, {"type": "D", "before": "The", "after": null, "start_char_pos": 1302, "end_char_pos": 1305}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 1538, "end_char_pos": 1540}, {"type": "R", "before": "\",", "after": ",\"", "start_char_pos": 1626, "end_char_pos": 1628}, {"type": "A", "before": null, "after": "Stanford University professor Robert N.", "start_char_pos": 1896, "end_char_pos": 1896}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 1997, "end_char_pos": 1998}, {"type": "R", "before": "\".", "after": ".In a 2001 interview about his lapidary work with agate, a colorful rock,", "start_char_pos": 2460, "end_char_pos": 2462}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2543, "end_char_pos": 2544}, {"type": "A", "before": null, "after": ".", "start_char_pos": 2560, "end_char_pos": 2560}, {"type": "D", "before": "in a 2001 interview about his lapidary work with the colorful rock agate.", "after": null, "start_char_pos": 2563, "end_char_pos": 2636}, {"type": "R", "before": "\",", "after": ",\"", "start_char_pos": 3018, "end_char_pos": 3020}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 3098, "end_char_pos": 3100}, {"type": "R", "before": "\",", "after": ",\"", "start_char_pos": 3171, "end_char_pos": 3173}, {"type": "R", "before": "testifying", "after": "who testify", "start_char_pos": 3231, "end_char_pos": 3241}, {"type": "R", "before": ", who is also a science historyprofessor", "after": "and fellow professor of science history", "start_char_pos": 3334, "end_char_pos": 3374}, {"type": "A", "before": null, "after": ";", "start_char_pos": 3504, "end_char_pos": 3504}, {"type": "D", "before": ",", "after": null, "start_char_pos": 3507, "end_char_pos": 3508}, {"type": "R", "before": "we", "after": "humans", "start_char_pos": 3892, "end_char_pos": 3894}, {"type": "R", "before": "we", "after": "humans", "start_char_pos": 3931, "end_char_pos": 3933}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 4053, "end_char_pos": 4055}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4238, "end_char_pos": 4238}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 4663, "end_char_pos": 4665}, {"type": "R", "before": ". He states that", "after": ":", "start_char_pos": 4740, "end_char_pos": 4756}, {"type": "A", "before": null, "after": "to agnotology, agnoiology, comes", "start_char_pos": 5620, "end_char_pos": 5620}, {"type": "R", "before": ", agnoiology, meaning", "after": "and is used to mean either", "start_char_pos": 5647, "end_char_pos": 5668}, {"type": "A", "before": null, "after": ",", "start_char_pos": 5828, "end_char_pos": 5828}, {"type": "R", "before": "describes", "after": "describing", "start_char_pos": 5831, "end_char_pos": 5840}, {"type": "R", "before": "\"enigma\"", "after": "'enigma'", "start_char_pos": 6215, "end_char_pos": 6223}, {"type": "A", "before": null, "after": ",", "start_char_pos": 6653, "end_char_pos": 6653}, {"type": "R", "before": ".", "after": ",", "start_char_pos": 6768, "end_char_pos": 6769}, {"type": "R", "before": "cognitronics", "after": "Rueckert, Ulrich. 2020. \"Human-Machine Interaction and Cognitronics.\" In NANO-CHIPS 2030, edited by B. Murmann and B. Hoefflinger, The Frontiers Collection. Cham: Springer. Cognitonics, first of all,", "start_char_pos": 7036, "end_char_pos": 7048}], "sents_char_pos": [0, 161, 507, 671, 838, 966, 1230, 1503, 1655, 1839, 2221, 2267, 2385, 2636, 2963, 3100, 3262, 3621, 4055, 4301, 4410, 4665, 4741, 5166, 5333, 5437, 5593, 5919, 6123, 6226, 6316, 6386, 6471, 6492, 6644, 6847, 6945, 7233, 7396, 7799, 7904]}
+{"doc_id": "10600687", "revision_depth": "1", "before_revision": "The following is an example of co-regulation between a mother and her infant, from Emotional development: The organization of emotional life in the early years . This scenario exemplifies a mother maintaining her infant's engagement via variations in her voice, facial expressions, and body language. She sensitively elicits behaviors from the infant and adds more stimulation when appropriate. Likewise, the infant indicates and maintains the mutual engagement with her own facial expressions, vocalizations, and body language. \"Hello there pumpkin ... Mommy's comin' to get you. Yes, she is. Brief pause.%DIFDELCMD < ] %%% Momma's gonna get you and tickle you. What do you think of that? Brief pause.%DIFDELCMD < ] %%% Come on. Come on, you little sweetie. Let me see that smile. Humm? Pause.%DIFDELCMD < ] %%% Yeah, that's right ... thaaaat's right. The infant exhibits a big smile with bobbing head, and mother responds in kind, then says,%DIFDELCMD < ] %%% Oh, well now, are you gonna say somethin'? Are ya? Pause, mother nodding head, widening eyes.%DIFDELCMD < ] %%% Come on! Pause.%DIFDELCMD < ] %%% Come on! The baby begins cycling movements of the arms and kicking the feet.%DIFDELCMD < ] %%% Come on. Drawn out, then longer pause.%DIFDELCMD < ] %%% Yeah! as the baby bursts forth with a gurgling sound, the caregiver then laughs and hugs the baby%DIFDELCMD < ]%%% .\" As co-regulation is contingent on reciprocal relationships between members of a dyad, it can be compromised by risk factors within the individuals. As such, a newer line of research has identified children on the autism spectrum as a risk group for disruptions in co-regulation in their parent-child dyads. In the DSM-5, the first diagnostic criterion of ASD is \"Persistent deficits in social communication and social interaction across multiple contexts\"American Psychiatric Association. (2013). Diagnostic and Statistical Manual of Mental Disorders (DSM-5\u00ae). American Psychiatric Pub. Thus, disruptions with co-regulation are inherent in the disorder, in that individuals with ASD exhibit difficulties in social-emotional reciprocity and sharing of emotions. Although only a handful of studies have directly examined co-regulation in parent-child with ASD dyads, converging evidence has demonstrated that parents' immediate responses to emotional distress facilitates self-regulation for children with ASD.Hirschler-Guttenberg, Y., Feldman, R., Ostfeld-Etzion, S., Laor, N., & Golan, O. (2015). Self- and Co-regulation of Anger and Fear in Preschoolers with Autism Spectrum Disorders: The Role of Maternal Parenting Style and Temperament. Journal of Autism and Developmental Disorders, 45(9), 3004\u20133014. URL One particularly interesting finding was that, while mothers of typically developing children transition to more passive co-regulation over toddlerhood, as their children become more independent self-regulators, mothers of children with ASD continued to use active co-regulation strategies throughout the duration of the study. The authors conjectured that this continuation was a reflection of the mothers' sensitivity to their children's heightened developmental needs. ", "after_revision": "The following is an example of co-regulation between a mother and her infant, from Emotional Development: The Organization of Emotional Life in the Early Years . This scenario exemplifies a mother maintaining her infant's engagement via variations in her voice, facial expressions, and body language. She sensitively elicits behaviors from the infant and adds more stimulation when appropriate. Likewise, the infant indicates and maintains the mutual engagement with her own facial expressions, vocalizations, and body language. %DIFDELCMD < ] %%% %DIFDELCMD < ] %%% %DIFDELCMD < ] %%% %DIFDELCMD < ] %%% %DIFDELCMD < ] %%% %DIFDELCMD < ] %%% %DIFDELCMD < ] %%% %DIFDELCMD < ] %%% %DIFDELCMD < ]%%% As co-regulation is contingent on reciprocal relationships between members of a dyad, it can be compromised by risk factors within the individuals. As such, a newer line of research has identified children on the autism spectrum as a risk group for disruptions in co-regulation in their parent-child dyads. In the DSM-5, the first diagnostic criterion of ASD is \"Persistent deficits in social communication and social interaction across multiple contexts\"American Psychiatric Association. (2013). Diagnostic and Statistical Manual of Mental Disorders (DSM-5\u00ae). American Psychiatric Pub. Thus, disruptions with co-regulation are inherent in the disorder, in that individuals with ASD exhibit difficulties in social-emotional reciprocity and sharing of emotions. Although only a handful of studies have directly examined co-regulation in parent-child with ASD dyads, converging evidence has demonstrated that parents' immediate responses to emotional distress facilitates self-regulation for children with ASD.Hirschler-Guttenberg, Y., Feldman, R., Ostfeld-Etzion, S., Laor, N., & Golan, O. (2015). Self- and Co-regulation of Anger and Fear in Preschoolers with Autism Spectrum Disorders: The Role of Maternal Parenting Style and Temperament. Journal of Autism and Developmental Disorders, 45(9), 3004\u20133014. URL One particularly interesting finding was that, while mothers of typically developing children transition to more passive co-regulation over toddlerhood, as their children become more independent self-regulators, mothers of children with ASD continued to use active co-regulation strategies throughout the duration of the study. The authors conjectured that this continuation was a reflection of the mothers' sensitivity to their children's heightened developmental needs. See also Interpersonal emotion regulation", "edit_actions": [{"type": "R", "before": "development: The organization of emotional life in the early years", "after": "Development: The Organization of Emotional Life in the Early Years", "start_char_pos": 93, "end_char_pos": 159}, {"type": "D", "before": "\"Hello there pumpkin ... Mommy's comin' to get you. Yes, she is.", "after": null, "start_char_pos": 529, "end_char_pos": 593}, {"type": "D", "before": "Brief pause.", "after": null, "start_char_pos": 594, "end_char_pos": 606}, {"type": "D", "before": "Momma's gonna get you and tickle you. What do you think of that?", "after": null, "start_char_pos": 625, "end_char_pos": 689}, {"type": "D", "before": "Brief pause.", "after": null, "start_char_pos": 690, "end_char_pos": 702}, {"type": "D", "before": "Come on. Come on, you little sweetie. Let me see that smile. Humm?", "after": null, "start_char_pos": 721, "end_char_pos": 787}, {"type": "D", "before": "Pause.", "after": null, "start_char_pos": 788, "end_char_pos": 794}, {"type": "D", "before": "Yeah, that's right ... thaaaat's right.", "after": null, "start_char_pos": 813, "end_char_pos": 852}, {"type": "D", "before": "The infant exhibits a big smile with bobbing head, and mother responds in kind, then says,", "after": null, "start_char_pos": 853, "end_char_pos": 943}, {"type": "D", "before": "Oh, well now, are you gonna say somethin'? Are ya?", "after": null, "start_char_pos": 962, "end_char_pos": 1012}, {"type": "D", "before": "Pause, mother nodding head, widening eyes.", "after": null, "start_char_pos": 1013, "end_char_pos": 1055}, {"type": "D", "before": "Come on!", "after": null, "start_char_pos": 1074, "end_char_pos": 1082}, {"type": "D", "before": "Pause.", "after": null, "start_char_pos": 1083, "end_char_pos": 1089}, {"type": "D", "before": "Come on!", "after": null, "start_char_pos": 1108, "end_char_pos": 1116}, {"type": "D", "before": "The baby begins cycling movements of the arms and kicking the feet.", "after": null, "start_char_pos": 1117, "end_char_pos": 1184}, {"type": "D", "before": "Come on.", "after": null, "start_char_pos": 1203, "end_char_pos": 1211}, {"type": "D", "before": "Drawn out, then longer pause.", "after": null, "start_char_pos": 1212, "end_char_pos": 1241}, {"type": "D", "before": "Yeah!", "after": null, "start_char_pos": 1260, "end_char_pos": 1265}, {"type": "D", "before": "as the baby bursts forth with a gurgling sound, the caregiver then laughs and hugs the baby", "after": null, "start_char_pos": 1266, "end_char_pos": 1357}, {"type": "D", "before": ".\"", "after": null, "start_char_pos": 1375, "end_char_pos": 1377}, {"type": "A", "before": null, "after": "See also Interpersonal emotion regulation", "start_char_pos": 3160, "end_char_pos": 3160}], "sents_char_pos": [0, 161, 300, 394, 528, 553, 580, 593, 606, 662, 689, 702, 729, 758, 781, 794, 852, 1004, 1055, 1089, 1116, 1184, 1211, 1241, 1525, 1684, 1866, 1938, 1964, 2138, 2386, 2474, 2618, 2683, 3015]}
+{"doc_id": "10788964", "revision_depth": "1", "before_revision": " The False Principle of Our Education: Or, Humanism and Realism () is an article written by Max Stirner and published in the Rheinische Zeitung in April 1842. Content Stirner begins by stressing the importance of education : \"the school question is a life question . \" He then sketches a brief history of education from the Reformation. For him, the Enlightenment introduced a new principle behind education to challenge the classical humanist principle. Where education had taught the few \"to talk about everything , \" the Enlightenment saw the rise of the realist \"demand for a practical finishing education . \" Stirner concludes \"Henceforth, knowledge was to be lived ... \" Stirner saw educational theory in his day as a battlefield between the two parties - humanists, grasping the past , and realists, seizing the present. He criticised both as seeking power over the \"transitory , \" as viewing education as a \"struggle towards mastery in the handling of material . \" Stirner supports the realist criticism that the humanists seek knowledge for its own sake, but asks whether the realists do any better. Because the realists merely supply the individual with the tools to achieve his will, without reforming that will, they fail to achieve what Stirner calls \"freedom of will . \" They fail to reach self-understanding (a concept Stirner took from Hegel and twisted in his fashion in The Ego and its Own) and \"fall in the abyss of their own emptiness . \" If the failures of the humanists (and realists ) are truly to be overcome, \"the final goal of education can no longer be knowledge . \" Asserting that \"only the spirit which understands itself is eternal , \" Stirner calls for a shift in the principle of education from making us \"masters of things\" to making us \"free natures . \" Till one knows oneself, one has not mastered one's own will, and one is merely subservient; once one masters it one is free. Stirner names his educational principle \"personalist , \" explaining that self-understanding consists in hourly self-creation. Education is to create \"free men, sovereign characters , \" by which he means \"eternal characters [ ... ] who are therefore eternal because they form themselves each moment . \" References The False Principle of Our Education Das unwahre Prinzip unserer Erziehung ", "after_revision": "\" The False Principle of Our Education: Or, Humanism and Realism \" () is an article written by Max Stirner and published in the Rheinische Zeitung in April 1842. Content Stirner begins by stressing the importance of education , saying that \"the school question is a life question \" . He then sketches a brief history of education from the Reformation. For him, the Enlightenment introduced a new principle behind education to challenge the classical humanist principle. Where education had taught the few \"to talk about everything \" , the Enlightenment saw the rise of the realist \"demand for a practical finishing education \" . Stirner concludes: \"Henceforth, knowledge was to be lived \" . Stirner saw educational theory in his day as a battlefield between the two parties \u2014 humanists, grasping the past ; and realists, seizing the present. He criticised both as seeking power over the \"transitory \" as viewing education as a \"struggle towards mastery in the handling of material \" . Stirner supports the realist criticism that the humanists seek knowledge for its own sake, but asks whether the realists do any better. Because the realists merely supply the individual with the tools to achieve his will, without reforming that will, they fail to achieve what Stirner calls \"freedom of will \" . They fail to reach self-understanding (a concept Stirner took from Georg Wilhelm Friedrich Hegel and twisted in his fashion in The Ego and its Own) and \"fall in the abyss of their own emptiness \" . If the failures of the humanists and realists are truly to be overcome, \"the final goal of education can no longer be knowledge \" . Asserting that \"only the spirit which understands itself is eternal \" , Stirner calls for a shift in the principle of education from making us \"masters of things\" to making us \"free natures \" . Until one knows oneself, one has not mastered one's own will, and one is merely subservient; once one masters it one is free. Stirner names his educational principle \"personalist \" , explaining that self-understanding consists in hourly self-creation. Education is to create \"free men, sovereign characters \" , by which he means \"eternal characters [ ... ] who are therefore eternal because they form themselves each moment \" . References \" The False Principle of Our Education \". The Anarchist Library. Das unwahre Prinzip unserer Erziehung (PDF). Institut of Social Threefolding.", "edit_actions": [{"type": "A", "before": null, "after": "\"", "start_char_pos": 0, "end_char_pos": 0}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 64, "end_char_pos": 64}, {"type": "R", "before": ":", "after": ", saying that", "start_char_pos": 224, "end_char_pos": 225}, {"type": "D", "before": ".", "after": null, "start_char_pos": 266, "end_char_pos": 267}, {"type": "A", "before": null, "after": ".", "start_char_pos": 270, "end_char_pos": 270}, {"type": "D", "before": ",", "after": null, "start_char_pos": 518, "end_char_pos": 519}, {"type": "A", "before": null, "after": ",", "start_char_pos": 522, "end_char_pos": 522}, {"type": "D", "before": ".", "after": null, "start_char_pos": 613, "end_char_pos": 614}, {"type": "R", "before": "Stirner concludes", "after": ". Stirner concludes:", "start_char_pos": 617, "end_char_pos": 634}, {"type": "D", "before": "...", "after": null, "start_char_pos": 674, "end_char_pos": 677}, {"type": "A", "before": null, "after": ".", "start_char_pos": 680, "end_char_pos": 680}, {"type": "R", "before": "-", "after": "\u2014", "start_char_pos": 764, "end_char_pos": 765}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 795, "end_char_pos": 796}, {"type": "D", "before": ",", "after": null, "start_char_pos": 889, "end_char_pos": 890}, {"type": "D", "before": ".", "after": null, "start_char_pos": 973, "end_char_pos": 974}, {"type": "A", "before": null, "after": ".", "start_char_pos": 977, "end_char_pos": 977}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1286, "end_char_pos": 1287}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1290, "end_char_pos": 1290}, {"type": "A", "before": null, "after": "Georg Wilhelm Friedrich", "start_char_pos": 1358, "end_char_pos": 1358}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1462, "end_char_pos": 1463}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1466, "end_char_pos": 1466}, {"type": "R", "before": "(and realists )", "after": "and realists", "start_char_pos": 1500, "end_char_pos": 1515}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1598, "end_char_pos": 1599}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1602, "end_char_pos": 1602}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1671, "end_char_pos": 1672}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1675, "end_char_pos": 1675}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1794, "end_char_pos": 1795}, {"type": "R", "before": "Till", "after": ". Until", "start_char_pos": 1798, "end_char_pos": 1802}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1976, "end_char_pos": 1977}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1980, "end_char_pos": 1980}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2105, "end_char_pos": 2106}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2109, "end_char_pos": 2109}, {"type": "D", "before": ".", "after": null, "start_char_pos": 2223, "end_char_pos": 2224}, {"type": "A", "before": null, "after": ".", "start_char_pos": 2227, "end_char_pos": 2227}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2239, "end_char_pos": 2239}, {"type": "A", "before": null, "after": "\". The Anarchist Library.", "start_char_pos": 2277, "end_char_pos": 2277}, {"type": "A", "before": null, "after": "(PDF). Institut of Social Threefolding.", "start_char_pos": 2316, "end_char_pos": 2316}], "sents_char_pos": [0, 159, 338, 456, 677, 831, 1113, 1599, 1889, 1922, 2049]}
+{"doc_id": "10836019", "revision_depth": "1", "before_revision": "Hallucinations are commonly understood as \"sensory perceptions that occur in the absence of an objective stimulus\". As this definition implies, though, like dreams, most hallucinations are visual, they can encompass a broader range of sensory experience. Auditory hallucinations are thus also common: \"patients can hear simple sounds, structured melodies or complete sentences\". Slightly less common but not unheard of are \"somesthetic\" hallucinations involving our sense of touch and location, with such experiences ranging from tactile sensations to full-blown \"cenesthopathic\" or \"out-of-body experiences\", which involve sudden changes in the perception of the body\u2019s location, or even a sense of movement of the entire body. Finally, a unique characteristic of hypnopompic hallucinations is that as opposed to dreams, wherein they rarely understand that they are asleep, here sleepers do indeed have \"the clear subjective awareness of being awake\" yet are frequently mentally and physically trapped in the experience. Neurobiology The objective difference between the subjective experiences of dreams and hypnopompic hallucinations emerges from a close look at our sleep cycle and its attendant brain activity: there are essentially two types of sleep, R.E.M. sleep, which is indeed categorized by \"rapid eye movement\" and N.R.E.M., which stands for \"Non-Rapid Eye Movement\". In R.E.M. sleep, our brains are extremely active. In particular, during this stage, both our brain-stem, which is the home of our most fundamental physical drives, and the parts of the cortex related to our most complex logical-cognitive functions experience highly intense electrical activity. As this perhaps suggests , R.E.M. is where the majority of dreaming occurs - it has been all but confirmed at this point that dreams originate in the brain-stem, a spark from there driving our more logical mind to contemplate and consolidate, through dreaming, memories that relate to fulfilling our fundamental drives. Conversely, there is almost no electrical activity during N.R.E.M. sleep. It will thus be no surprise that N.R.E.M. is what is referred to in layman\u2019s terms as \"deep sleep\", which is characterized by the complete quieting of the mind, to include dreamlessness and by muscle \"atonia\", which is to say paralysis, a complete motor disconnect. A last critical point in this regard is that R.E.M. sleep cycles are book-ended by N.R.E.M. stages , which is to say that when we fall asleep and wake up, we first fall into and last arise from, N. R.E.M. sleep. It is precisely at this last point, though, that a quirk in brain chemistry, can cause hypnopompic hallucinations: occasionally during deep N.R.E.M., \"transient patterns of neural activation in brainstem structures resemble [ ing ] micro-wake \"fragments\" can occur\". As the origin of the fragments and their name implies, they have a two-fold effect: first, just as in R.E.M. sleep, these brain-stem fragments essentially activate the dream mechanism. Second, they do catalyze a near-waking state. However, this spark is often not powerful enough to jar us completely out of deep sleep, and so only our mind fully awakens, leaving our body trapped in the atonia of deep sleep. Another reason why hypnopompic hallucinations are often such horrible experiences, is because micro-wake fragments appear to be related to serotonin and dopamine deficits\u2014these deficits predispose us to negative mental states, which likely causes the hallucinations to resemble our worst dreams. Cultural manifestations Fuseli's 1781 painting The Nightmare is thought to be a depiction of a hypnopompic hallucination These mental experiences are indeed often deeply damaging: across cultures, the experience of hypnopompic hallucinations are strongly related to \"visitations of spirits, demons or other grotesque creatures belonging to traditional folklore\". Thus, in the Anglosphere, hypnopompic experiences often entail the sense that an \"Old Hag\" or some similar \"nocturnal spirit\" is sitting on the sleeper\u2019s chest, inducing both paralysis and an increasing, suffocating inability to move. Anthropologists have discovered references dating back to the High Middle ages of similar figures in Anglo-Saxon and Anglo-Norman traditions, most prominently the \"m\u00e6ra\" from the name of which figure we derive the word \"nightmare\", and which appears to have roots in ancient Germanic superstitions. Similarly, subjects belonging to Yoruban-African diasporas report feeling as though they are being \"ridden\" by the evil manifestations of their versions of the African pantheon (ridden is the vernacular for possession by the gods, who are often referred to as \"divine horsemen\"). Interestingly in this vein, some members of the Yoruba diaspora appear to conflate the cultural interpretation of the experience, referring to \"being ridden by the witch\". Perhaps most chilling of all, though, are the Japanese interpretations of the experience , which are often grouped under the heading of kanashibari, a term which literally means \"bound in gold or metal\" and derives from the name of an esoteric Buddhist technique for paralyzing enemies. Future research horizons Owing to similarities between hypnagogic hallucinations and those experienced by sufferers from dementia, Parkinson\u2019s and schizophrenia, significant progress is being made on understanding the neurobiological basis of this experience. To illustrate, researchers have identified \"a common neurofunctional substrate [which] points to a shared pattern of brain activation\" underlying elements of schizophrenic delusions and these near-waking hallucinations: \"with regional grey matter blood flow values being maximally increased in right parietal-occipital regions\" during hypnagogic hallucinations and many schizoid episodes. There is reason to believe, then, that such painful near-waking experiences could soon be rendered obsolete.", "after_revision": "Hallucinations are commonly understood as \"sensory perceptions that occur in the absence of an objective stimulus\". As this definition implies, though, like dreams, most hallucinations are visual, they can encompass a broader range of sensory experience. Auditory hallucinations are thus also common: \"patients can hear simple sounds, structured melodies or complete sentences\". Slightly less common but not unheard of are \"somesthetic\" hallucinations involving the sense of touch and location, with such experiences ranging from tactile sensations to full-blown \"cenesthopathic\" or \"out-of-body experiences\", which involve sudden changes in the perception of the body\u2019s location, or even a sense of movement of the entire body. Finally, a unique characteristic of hypnopompic hallucinations is that as opposed to dreams, wherein they rarely understand that they are asleep, here sleepers do indeed have \"the clear subjective awareness of being awake\" yet are frequently mentally and physically trapped in the experience. Neurobiology The objective difference between the subjective experiences of dreams and hypnopompic hallucinations emerges from a close look at the sleep cycle and its attendant brain activity: there are essentially two types of sleep, R.E.M. sleep, which is indeed categorized by \"rapid eye movement\" and N.R.E.M., which stands for \"Non-Rapid Eye Movement\". In R.E.M. sleep, brains are extremely active. In particular, during this stage, both the brain-stem, which is the home of the most fundamental physical drives, and the parts of the cortex related to the most complex logical-cognitive functions experience highly intense electrical activity. Thus , R.E.M. is where the majority of dreaming occurs - it has been all but confirmed at this point that dreams originate in the brain-stem, a spark from there driving the more logical mind to contemplate and consolidate, through dreaming, memories that relate to fulfilling fundamental drives. Conversely, there is almost no electrical activity during N.R.E.M. sleep. N.R.E.M. is what is referred to as \"deep sleep\", which is characterized by the complete quieting of the mind, to include dreamlessness , and by muscle \"atonia\", which is to say paralysis, a complete motor disconnect. A last critical point in this regard is that R.E.M. sleep cycles are book-ended by N.R.E.M. stages . It is precisely at this last point, though, that a quirk in brain chemistry, can cause hypnopompic hallucinations: occasionally during deep N.R.E.M., \"transient patterns of neural activation in brainstem structures [ resembling ] micro-wake \"fragments\" can occur\". These have a two-fold effect: first, just as in R.E.M. sleep, these brain-stem fragments essentially activate the dream mechanism. Second, they catalyze a near-waking state. However, this is often not powerful enough to jar a person completely out of deep sleep, and so only the mind fully awakens, leaving the body trapped in the atonia of deep sleep. Another reason why hypnopompic hallucinations are often such horrible experiences, is because micro-wake fragments appear to be related to serotonin and dopamine deficits\u2014these deficits predispose a person to negative mental states, which likely causes the hallucinations to resemble bad dreams. Cultural manifestations Fuseli's 1781 painting The Nightmare is thought to be a depiction of a hypnopompic hallucination These mental experiences are indeed often deeply damaging: across cultures, the experience of hypnopompic hallucinations are strongly related to \"visitations of spirits, demons or other grotesque creatures belonging to traditional folklore\". Thus, in the Anglosphere, hypnopompic experiences often entail the sense that an \"Old Hag\" or some similar \"nocturnal spirit\" is sitting on the sleeper\u2019s chest, inducing both paralysis and an increasing, suffocating inability to move. Anthropologists have discovered references dating back to the High Middle ages of similar figures in Anglo-Saxon and Anglo-Norman traditions, most prominently the \"m\u00e6ra\" , the source of the word \"nightmare\", and which appears to have roots in ancient Germanic superstitions. Similarly, subjects belonging to Yoruban-African diasporas report feeling as though they are being \"ridden\" by the evil manifestations of their versions of the African pantheon (ridden is the vernacular for possession by the gods, who are often referred to as \"divine horsemen\"). Some members of the Yoruba diaspora appear to conflate the cultural interpretation of the experience, referring to \"being ridden by the witch\". Japanese interpretations of the experience are often grouped under the heading of kanashibari, a term which literally means \"bound in gold or metal\" and derives from the name of an esoteric Buddhist technique for paralyzing enemies. Future research horizons Owing to similarities between hypnagogic hallucinations and those experienced by sufferers from dementia, Parkinson\u2019s and schizophrenia, significant progress is being made on understanding the neurobiological basis of this experience. Researchers have identified \"a common neurofunctional substrate [which] points to a shared pattern of brain activation\" underlying elements of schizophrenic delusions and these near-waking hallucinations: \"with regional grey matter blood flow values being maximally increased in right parietal-occipital regions\" during hypnagogic hallucinations and many schizoid episodes. Thus, such painful near-waking experiences could be rendered obsolete.", "edit_actions": [{"type": "R", "before": "our", "after": "the", "start_char_pos": 462, "end_char_pos": 465}, {"type": "R", "before": "our", "after": "the", "start_char_pos": 1165, "end_char_pos": 1168}, {"type": "D", "before": "our", "after": null, "start_char_pos": 1397, "end_char_pos": 1400}, {"type": "R", "before": "our", "after": "the", "start_char_pos": 1469, "end_char_pos": 1472}, {"type": "R", "before": "our", "after": "the", "start_char_pos": 1506, "end_char_pos": 1509}, {"type": "R", "before": "our", "after": "the", "start_char_pos": 1583, "end_char_pos": 1586}, {"type": "R", "before": "As this perhaps suggests", "after": "Thus", "start_char_pos": 1675, "end_char_pos": 1699}, {"type": "R", "before": "our", "after": "the", "start_char_pos": 1864, "end_char_pos": 1867}, {"type": "D", "before": "our", "after": null, "start_char_pos": 1971, "end_char_pos": 1974}, {"type": "D", "before": "It will thus be no surprise that", "after": null, "start_char_pos": 2069, "end_char_pos": 2101}, {"type": "D", "before": "in layman\u2019s terms", "after": null, "start_char_pos": 2134, "end_char_pos": 2151}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2255, "end_char_pos": 2255}, {"type": "R", "before": ", which is to say that when we fall asleep and wake up, we first fall into and last arise from, N. R.E.M. sleep.", "after": ".", "start_char_pos": 2435, "end_char_pos": 2547}, {"type": "D", "before": "resemble", "after": null, "start_char_pos": 2763, "end_char_pos": 2771}, {"type": "R", "before": "ing", "after": "resembling", "start_char_pos": 2774, "end_char_pos": 2777}, {"type": "R", "before": "As the origin of the fragments and their name implies, they", "after": "These", "start_char_pos": 2815, "end_char_pos": 2874}, {"type": "D", "before": "do", "after": null, "start_char_pos": 3013, "end_char_pos": 3015}, {"type": "D", "before": "spark", "after": null, "start_char_pos": 3060, "end_char_pos": 3065}, {"type": "R", "before": "us", "after": "a person", "start_char_pos": 3102, "end_char_pos": 3104}, {"type": "R", "before": "our", "after": "the", "start_char_pos": 3147, "end_char_pos": 3150}, {"type": "R", "before": "our", "after": "the", "start_char_pos": 3179, "end_char_pos": 3182}, {"type": "R", "before": "us", "after": "a person", "start_char_pos": 3422, "end_char_pos": 3424}, {"type": "R", "before": "our worst", "after": "bad", "start_char_pos": 3503, "end_char_pos": 3512}, {"type": "R", "before": "from the name of which figure we derive", "after": ", the source of", "start_char_pos": 4289, "end_char_pos": 4328}, {"type": "R", "before": "Interestingly in this vein, some", "after": "Some", "start_char_pos": 4698, "end_char_pos": 4730}, {"type": "D", "before": "Perhaps most chilling of all, though, are the", "after": null, "start_char_pos": 4870, "end_char_pos": 4915}, {"type": "D", "before": ", which", "after": null, "start_char_pos": 4959, "end_char_pos": 4966}, {"type": "R", "before": "To illustrate, researchers", "after": "Researchers", "start_char_pos": 5417, "end_char_pos": 5443}, {"type": "R", "before": "There is reason to believe, then, that", "after": "Thus,", "start_char_pos": 5806, "end_char_pos": 5844}, {"type": "D", "before": "soon", "after": null, "start_char_pos": 5888, "end_char_pos": 5892}], "sents_char_pos": [0, 115, 254, 378, 728, 1021, 1379, 1429, 1674, 1994, 2068, 2335, 2547, 2814, 2999, 3045, 3224, 3520, 3883, 4118, 4417, 4697, 4869, 5156, 5416, 5805]}
+{"doc_id": "1101775", "revision_depth": "1", "before_revision": "REDIRECT State o ", "after_revision": "Los Altos (Spanish for \"the highlands\" or \"the heights\") was the sixth state of the Federal Republic of Central America, and a short-lived independent republic. Its capital was Quetzaltenango. Los Altos occupied eight departments in the west of present-day Guatemala as well as the Soconusco region in the Mexican state of Chiapas. The state originated from the political differences and tensions between Guatemala City on one side, and Quetzaltenango and other parts of western Central America on the other. Debate about separation from Guatemala dated from shortly after Central American independence from Spain in 1821. Such a separate state was provided for by the Federal constitutional assembly of November 1824, but there was sizable opposition to the separation in Guatemala City. The independence of Los Altos from Guatemala was officially proclaimed on 2 February 1838. The Federal government recognized Los Altos as the sixth state of the union and seated the representatives of Los Altos in the Federal Congress on 5 June of that year. The flag of Los Altos was a modification of that of the Central American Union, with a central seal showing a volcano in the background with a quetzal (a local bird symbolizing liberty) in front. This was the first Central American flag to use the quetzal as a symbol; since 1871, it has been on the present flag of Guatemala. As the liberal Federation crumbled into civil war due to the influence of the Guatemalan conservatives and the regular clergy, who had been expelled from Central America after Francisco Moraz\u00e1n's bloody invasion of Guatemala in 1829, Los Altos declared itself an independent republic. Administrative divisions Los Altos consisted of the administrative regions of Totonicap\u00e1n (the modern Guatemalan departments of Totonicap\u00e1n, Huehuetenango), Quetzaltenango (the modern departments of Quetzaltenango and San Marcos) and Suchitep\u00e9quez-Solol\u00e1 (the modern departments of Retalhuleu, Suchitep\u00e9quez, Solol\u00e1, and Quich\u00e9). First invasion of Rafael Carrera The Coat of Arms of Los Altos, carved in stone on the grave of heroes in the Cemetery of Quetzaltenango. Mariano Rivera Paz. Conservative Chief of State of Guatemala during the time Los Altos was established and then recovered for Guatemala by Rafael Carrera. On April 2, 1838, in the city of Quetzaltenango, a secessionist group founded the independent State of Los Altos, which sought independence from Guatemala. The most important members of the Liberal Party of Guatemala and liberal enemies of the conservative regime moved to Los Altos, rather than needing to emigrate to El Salvador to live in a pro-liberal state. The liberals in Los Altos began a harsh criticism of the Conservative government of Rivera Paz; they even had their own newspaper \u2013 El Popular, which contributed to the harsh criticism. However, Los Altos was the most productive region with most economic activity of the former State of Guatemala; without Los Altos, conservatives lost many benefits that held the hegemony of the State of Guatemala in Central America. The government of Guatemala tried to reach a peaceful solution, but \"altenses\",Altenses is how people from Quetzaltenango are known in Guatemala. protected by the recognition by the Congress of the Central American Federation, did not accept this. Guatemala's government then resorted to force, sending the commanding general of the army, Rafael Carrera, to subdue Los Altos. Carrera defeated General Agust\u00edn Guzm\u00e1n when the former Mexican officer tried to ambush him and then went on to Quetzaltenango, where he imposed a harsh and hostile conservative regime for liberals. Calling all council members, he told them flatly that he was behaving kindly to them because it was the first time they had challenged him, but sternly warned them that there would be no mercy if there were to be a second time. General Guzm\u00e1n and the head of state of Los Altos, Marcelo Molina, were sent to the capital of Guatemala, where they were displayed as trophies of war during a triumphant parade on February 17, 1840. Guzm\u00e1n was shackled, wounds still bleeding, and riding a mule. Second invasion of Rafael Carrera General Francisco Moraz\u00e1ntried to invade Guatemala for the second time in 1840 after having invaded in 1829 and expelled members of the Aycinena clan and regular orders. In 1840 he was defeated by Carrera overwhelmingly, marking the end of his career in Central America On March 18, 1840, liberal caudillo Francisco Moraz\u00e1n invaded Guatemala with 1500 soldiers to avenge the insult done in Los Altos and fearing that such action would end liberal efforts to hold together the Central American Federation. Guatemala had a cordon of guards from the border with El Salvador; without telegraph service, men ran carrying last minute messages. With the information from these messengers, Carrera hatched a plan of defense leaving his brother Sotero with troops who presented a slight resistance in the city. Carrera pretended to flee and led the ragtag army to the heights of Aceituno as only had about four men and the same number of loads rifle, plus two old cannons. The city was at the mercy of the army of Moraz\u00e1n, with bells of their twenty churches ringing for divine assistance. Once Moraz\u00e1n reached the capital, he took it easily and freed Guzman, who immediately left for Quetzaltenango to give the news that Carrera was defeated. Carrera then took advantage of what his enemies believed and applied a strategy of concentrating fire on the Central Park of the city. His surprise attack tactics caused heavy casualties to the army of Moraz\u00e1n and forced the survivors to fight for their lives.The famous Guatemalan poet Jos\u00e9 Batres Mont\u00fafar participated in these battles In combat, Moraz\u00e1n's soldiers lost the initiative and their numerical superiority. Furthermore, unaware of their surroundings in the city, Morazan's troops had to fight, carry their dead and care for their wounded while still tired by the long march from El Salvador to Guatemala. Carrera, by then an experienced military manCarrera even had suffered two previous defeats at the hands of Moraz\u00e1n. was able to stand up and defeat Moraz\u00e1n thoroughly. The disaster for the liberal general was complete: aided by Angel Molina Angel Molina was the son of Guatemalan Liberal leader Pedro Molina Mazariegos. who knew the streets of the city, he had to flee with his favorite men, disguised and shouting \"Long live Carrera!\" through the ravine of El Incienso to El Salvador, to save his life. In his absence Moraz\u00e1n had been relieved as head of state of that country, and he had to embark for exile in Per\u00fa. In Guatemala, survivors from his troops were shot without mercy, as Carrera pursued Morazan, whom he failed to catch. This lance definitely sealed the status of General Carrera and marked the decline of Moraz\u00e1n, and forced the conservative criollos to negotiate with Carrera and his revolutionary peasant supporters. Agustin Guzm\u00e1n, freed by Moraz\u00e1n when the latter had seemingly defeated Carrera in Guatemala City, had gone back to Quetzaltenango with the good news. The city's liberal criollo leaders rapidly reinstated the Los Altos State and celebrated Moraz\u00e1n's victory. However, as soon as Carrera and the newly reinstated Mariano Rivera Paz heard the news, Carrera went back to Quetzaltenango with his volunteer army to regain control of the rebel liberal state once and for all. On 2 April 1840, after entering the city, Carrera told the citizens that he had already warned them after he defeated them earlier that year. Then he ordered most of the liberal city hall officials from Los Altos shot. Carrera, then forcibly annexed Quetzaltenango and much of Los Altos back into conservative Guatemala. After the violent and bloody reinstatement of the State of Los Altos by Carrera in April 1840, Luis Batres Juarros \u2014 conservative member of the Aycinena Clan, then secretary general of the Guatemalan government of recently reinstated Mariano Rivera Paz \u2014 obtained from the vicar Larrazabal authorization to dismantle the regionalist Church. Active priests of Quetzaltenango \u2014 capital of the would-be-state of Los Altos \u2014 Urban Ugarte and Jos\u00e9 Maria Aguilar, were removed from their parish and likewise the priests of the parishes of San Martin Jilotepeque and San Lucas Tolim\u00e1n. Larrazabal ordered the priests Fernando Antonio D\u00e1vila, Mariano Navarrete and Jose Ignacio Iturrioz to cover the parishes of Quetzaltenango, San Martin Jilotepeque and San Lucas Toliman, respectively. Captain General Rafael Carrera after being appointed President for Life of the Republic of Guatemala in 1854. The defeat of the liberal criollos in Quetzaltenango reinforced Carrera allies' status within the native population of the area, whom he respected and protected as the leader of the peasant revolution. Taking advantage of the chaos and unsettled situation, the Soconusco region was annexed by Mexico. In 1844, 1848, and 1849, unsuccessful revolts against the dictatorship of Rafael Carrera briefly reproclaimed the independence of Los Altos. Carrera's exile and Los Altos Proclamation Coin 1847 of the independent Republic of Guatemala During his first term as president, Rafael Carrera brought the country back from excessive conservatism to a traditional climate. However, in 1848, the liberals were able to force Rafael Carrera to leave office, after the country had been in turmoil for several months. Carrera resigned of his own free will and left for M\u00e9xico. The new liberal regime allied itself with the Aycinena family and swiftly passed a law which they emphatically ordered the execution of Carrera if he dared to return to Guatemalan soil. In his absence, the liberal criollos from Quetzaltenango \u2014 led by general Agust\u00edn Guzm\u00e1n who occupied the city after Corregidor general Mariano Paredes was called to Guatemala City to take over the Presidential office- declared that Los Altos was an independent state once again on 26 August 1848; the new state had the support of Vasconcelos' regime in El Salvador and the rebel guerrilla army of Vicente and Serapio Cruz who were declared enemies of general Carrera. The interim government was led by Guzm\u00e1n himself and had Florencio Molina and the priest Fernando Davila as his Cabinet members. On 5 September 1848, the criollo altenses chose a formal government led by Fernando Antonio Mart\u00ednez. In the meantime, Carrera returned to Guatemala and entered by Huehuetenango, where he met with the native leaders and told them that they had to remain united to prevail. The leaders agreed and slowly the segregated native communities started to develop a new Indian identity under Carrera's leadership. In the meantime, in the eastern part of Guatemala, the Jalapa region became increasingly dangerous; former president Mariano Rivera Paz and rebel leader Vicente Cruz were both murdered there after trying to take over the Corregidor office in 1849. Upon learning that officer Jos\u00e9 V\u00edctor Zavala had been appointed as Corregidor in Suchitep\u00e9quez, Carrera and his hundred jacalteco bodyguards crossed a dangerous jungle infested with jaguars to meet his former friend. When they met, Zavala not only did not capture him, but agreed to serve under his orders, thus sending a strong message to both liberal and conservatives in Guatemala City, who realized that they were forced to negotiate with Carrera, otherwise they were going to have to battle on two fronts \u2014 Quetzaltenango and Jalapa. Carrera went back to the Quetzaltenango area, while Zavala remained in Suchitep\u00e9quez as a tactical maneuver. Carrera received a visit from a Cabinet member of Paredes and told him that he had control of the native population and that he would keep them appeased. When the emissary returned to Guatemala City, he told the president everything Carrera said, and added that the native forces were formidable. Agust\u00edn Guzm\u00e1n went to Antigua Guatemala to meet with another group of Paredes emissaries; they agreed that Los Altos would rejoin Guatemala, and that the latter would help Guzm\u00e1n defeat his hated enemy and also build a port on the Pacific Ocean. Guzm\u00e1n was sure of victory this time, but his plan evaporated when, in his absence, Carrera and his native allies occupied Quetzaltenango. Carrera appointed Ignacio Yrigoyen as Corregidor and convinced him that he should work with the K'iche', Q\u2019anjob\u2019al, and Mam leaders to keep the region under control. On his way out, Yrigoyen murmured to a friend: Now he is the King of the Indians, indeed! The region is still distinctive, and Los Altos is still a nickname for the region of Guatemala around Quetzaltenango. Similarly, the Mexican portion of the former state is known as Los Altos de Chiapas.", "edit_actions": [{"type": "R", "before": "REDIRECT State o", "after": "Los Altos (Spanish for \"the highlands\" or \"the heights\") was the sixth state of the Federal Republic of Central America, and a short-lived independent republic. Its capital was Quetzaltenango. Los Altos occupied eight departments in the west of present-day Guatemala as well as the Soconusco region in the Mexican state of Chiapas.", "start_char_pos": 0, "end_char_pos": 16}, {"type": "A", "before": null, "after": "The state originated from the political differences and tensions between Guatemala City on one side, and Quetzaltenango and other parts of western Central America on the other. Debate about separation from Guatemala dated from shortly after Central American independence from Spain in 1821. Such a separate state was provided for by the Federal constitutional assembly of November 1824, but there was sizable opposition to the separation in Guatemala City.", "start_char_pos": 17, "end_char_pos": 17}, {"type": "A", "before": null, "after": "The independence of Los Altos from Guatemala was officially proclaimed on 2 February 1838. The Federal government recognized Los Altos as the sixth state of the union and seated the representatives of Los Altos in the Federal Congress on 5 June of that year. The flag of Los Altos was a modification of that of the Central American Union, with a central seal showing a volcano in the background with a quetzal (a local bird symbolizing liberty) in front. This was the first Central American flag to use the quetzal as a symbol; since 1871, it has been on the present flag of Guatemala.", "start_char_pos": 18, "end_char_pos": 18}, {"type": "A", "before": null, "after": "As the liberal Federation crumbled into civil war due to the influence of the Guatemalan conservatives and the regular clergy, who had been expelled from Central America after Francisco Moraz\u00e1n's bloody invasion of Guatemala in 1829, Los Altos declared itself an independent republic.", "start_char_pos": 19, "end_char_pos": 19}, {"type": "A", "before": null, "after": "Administrative divisions Los Altos consisted of the administrative regions of Totonicap\u00e1n (the modern Guatemalan departments of Totonicap\u00e1n, Huehuetenango), Quetzaltenango (the modern departments of Quetzaltenango and San Marcos) and Suchitep\u00e9quez-Solol\u00e1 (the modern departments of Retalhuleu, Suchitep\u00e9quez, Solol\u00e1, and Quich\u00e9).", "start_char_pos": 20, "end_char_pos": 20}, {"type": "A", "before": null, "after": "First invasion of Rafael Carrera", "start_char_pos": 21, "end_char_pos": 21}, {"type": "A", "before": null, "after": "The Coat of Arms of Los Altos, carved in stone on the grave of heroes in the Cemetery of Quetzaltenango.", "start_char_pos": 22, "end_char_pos": 22}, {"type": "A", "before": null, "after": "Mariano Rivera Paz. Conservative Chief of State of Guatemala during the time Los Altos was established and then recovered for Guatemala by Rafael Carrera.", "start_char_pos": 23, "end_char_pos": 23}, {"type": "A", "before": null, "after": "On April 2, 1838, in the city of Quetzaltenango, a secessionist group founded the independent State of Los Altos, which sought independence from Guatemala. The most important members of the Liberal Party of Guatemala and liberal enemies of the conservative regime moved to Los Altos, rather than needing to emigrate to El Salvador to live in a pro-liberal state.", "start_char_pos": 24, "end_char_pos": 24}, {"type": "A", "before": null, "after": "The liberals in Los Altos began a harsh criticism of the Conservative government of Rivera Paz; they even had their own newspaper \u2013 El Popular, which contributed to the harsh criticism.", "start_char_pos": 25, "end_char_pos": 25}, {"type": "A", "before": null, "after": "However, Los Altos was the most productive region with most economic activity of the former State of Guatemala; without Los Altos, conservatives lost many benefits that held the hegemony of the State of Guatemala in Central America.", "start_char_pos": 26, "end_char_pos": 26}, {"type": "A", "before": null, "after": "The government of Guatemala tried to reach a peaceful solution, but \"altenses\",Altenses is how people from Quetzaltenango are known in Guatemala. protected by the recognition by the Congress of the Central American Federation, did not accept this. Guatemala's government then resorted to force, sending the commanding general of the army, Rafael Carrera, to subdue Los Altos.", "start_char_pos": 27, "end_char_pos": 27}, {"type": "A", "before": null, "after": "Carrera defeated General Agust\u00edn Guzm\u00e1n when the former Mexican officer tried to ambush him and then went on to Quetzaltenango, where he imposed a harsh and hostile conservative regime for liberals. Calling all council members, he told them flatly that he was behaving kindly to them because it was the first time they had challenged him, but sternly warned them that there would be no mercy if there were to be a second time. General Guzm\u00e1n and the head of state of Los Altos, Marcelo Molina, were sent to the capital of Guatemala, where they were displayed as trophies of war during a triumphant parade on February 17, 1840. Guzm\u00e1n was shackled, wounds still bleeding, and riding a mule.", "start_char_pos": 28, "end_char_pos": 28}, {"type": "A", "before": null, "after": "Second invasion of Rafael Carrera", "start_char_pos": 29, "end_char_pos": 29}, {"type": "A", "before": null, "after": "General Francisco Moraz\u00e1ntried to invade Guatemala for the second time in 1840 after having invaded in 1829 and expelled members of the Aycinena clan and regular orders. In 1840 he was defeated by Carrera overwhelmingly, marking the end of his career in Central America", "start_char_pos": 30, "end_char_pos": 30}, {"type": "A", "before": null, "after": "On March 18, 1840, liberal caudillo Francisco Moraz\u00e1n invaded Guatemala with 1500 soldiers to avenge the insult done in Los Altos and fearing that such action would end liberal efforts to hold together the Central American Federation. Guatemala had a cordon of guards from the border with El Salvador; without telegraph service, men ran carrying last minute messages. With the information from these messengers, Carrera hatched a plan of defense leaving his brother Sotero with troops who presented a slight resistance in the city.", "start_char_pos": 31, "end_char_pos": 31}, {"type": "A", "before": null, "after": "Carrera pretended to flee and led the ragtag army to the heights of Aceituno as only had about four men and the same number of loads rifle, plus two old cannons. The city was at the mercy of the army of Moraz\u00e1n, with bells of their twenty churches ringing for divine assistance. Once Moraz\u00e1n reached the capital, he took it easily and freed Guzman, who immediately left for Quetzaltenango to give the news that Carrera was defeated.", "start_char_pos": 32, "end_char_pos": 32}, {"type": "A", "before": null, "after": "Carrera then took advantage of what his enemies believed and applied a strategy of concentrating fire on the Central Park of the city. His surprise attack tactics caused heavy casualties to the army of Moraz\u00e1n and forced the survivors to fight for their lives.The famous Guatemalan poet Jos\u00e9 Batres Mont\u00fafar participated in these battles In combat, Moraz\u00e1n's soldiers lost the initiative and their numerical superiority. Furthermore, unaware of their surroundings in the city, Morazan's troops had to fight, carry their dead and care for their wounded while still tired by the long march from El Salvador to Guatemala.", "start_char_pos": 33, "end_char_pos": 33}, {"type": "A", "before": null, "after": "Carrera, by then an experienced military manCarrera even had suffered two previous defeats at the hands of Moraz\u00e1n. was able to stand up and defeat Moraz\u00e1n thoroughly. The disaster for the liberal general was complete: aided by Angel Molina Angel Molina was the son of Guatemalan Liberal leader Pedro Molina Mazariegos. who knew the streets of the city, he had to flee with his favorite men, disguised and shouting \"Long live Carrera!\" through the ravine of El Incienso to El Salvador, to save his life.", "start_char_pos": 34, "end_char_pos": 34}, {"type": "A", "before": null, "after": "In his absence Moraz\u00e1n had been relieved as head of state of that country, and he had to embark for exile in Per\u00fa. In Guatemala, survivors from his troops were shot without mercy, as Carrera pursued Morazan, whom he failed to catch. This lance definitely sealed the status of General Carrera and marked the decline of Moraz\u00e1n, and forced the conservative criollos to negotiate with Carrera and his revolutionary peasant supporters.", "start_char_pos": 35, "end_char_pos": 35}, {"type": "A", "before": null, "after": "Agustin Guzm\u00e1n, freed by Moraz\u00e1n when the latter had seemingly defeated Carrera in Guatemala City, had gone back to Quetzaltenango with the good news. The city's liberal criollo leaders rapidly reinstated the Los Altos State and celebrated Moraz\u00e1n's victory. However, as soon as Carrera and the newly reinstated Mariano Rivera Paz heard the news, Carrera went back to Quetzaltenango with his volunteer army to regain control of the rebel liberal state once and for all.", "start_char_pos": 36, "end_char_pos": 36}, {"type": "A", "before": null, "after": "On 2 April 1840, after entering the city, Carrera told the citizens that he had already warned them after he defeated them earlier that year. Then he ordered most of the liberal city hall officials from Los Altos shot. Carrera, then forcibly annexed Quetzaltenango and much of Los Altos back into conservative Guatemala.", "start_char_pos": 37, "end_char_pos": 37}, {"type": "A", "before": null, "after": "After the violent and bloody reinstatement of the State of Los Altos by Carrera in April 1840, Luis Batres Juarros \u2014 conservative member of the Aycinena Clan, then secretary general of the Guatemalan government of recently reinstated Mariano Rivera Paz \u2014 obtained from the vicar Larrazabal authorization to dismantle the regionalist Church.", "start_char_pos": 38, "end_char_pos": 38}, {"type": "A", "before": null, "after": "Active priests of Quetzaltenango \u2014 capital of the would-be-state of Los Altos \u2014 Urban Ugarte and Jos\u00e9 Maria Aguilar, were removed from their parish and likewise the priests of the parishes of San Martin Jilotepeque and San Lucas Tolim\u00e1n. Larrazabal ordered the priests Fernando Antonio D\u00e1vila, Mariano Navarrete and Jose Ignacio Iturrioz to cover the parishes of Quetzaltenango, San Martin Jilotepeque and San Lucas Toliman, respectively.", "start_char_pos": 39, "end_char_pos": 39}, {"type": "A", "before": null, "after": "Captain General Rafael Carrera after being appointed President for Life of the Republic of Guatemala in 1854.", "start_char_pos": 40, "end_char_pos": 40}, {"type": "A", "before": null, "after": "The defeat of the liberal criollos in Quetzaltenango reinforced Carrera allies' status within the native population of the area, whom he respected and protected as the leader of the peasant revolution.", "start_char_pos": 41, "end_char_pos": 41}, {"type": "A", "before": null, "after": "Taking advantage of the chaos and unsettled situation, the Soconusco region was annexed by Mexico.", "start_char_pos": 42, "end_char_pos": 42}, {"type": "A", "before": null, "after": "In 1844, 1848, and 1849, unsuccessful revolts against the dictatorship of Rafael Carrera briefly reproclaimed the independence of Los Altos.", "start_char_pos": 43, "end_char_pos": 43}, {"type": "A", "before": null, "after": "Carrera's exile and Los Altos", "start_char_pos": 44, "end_char_pos": 44}, {"type": "A", "before": null, "after": "Proclamation Coin 1847 of the independent Republic of Guatemala During his first term as president, Rafael Carrera brought the country back from excessive conservatism to a traditional climate. However, in 1848, the liberals were able to force Rafael Carrera to leave office, after the country had been in turmoil for several months. Carrera resigned of his own free will and left for M\u00e9xico. The new liberal regime allied itself with the Aycinena family and swiftly passed a law which they emphatically ordered the execution of Carrera if he dared to return to Guatemalan soil.", "start_char_pos": 45, "end_char_pos": 45}, {"type": "A", "before": null, "after": "In his absence, the liberal criollos from Quetzaltenango \u2014 led by general Agust\u00edn Guzm\u00e1n who occupied the city after Corregidor general Mariano Paredes was called to Guatemala City to take over the Presidential office- declared that Los Altos was an independent state once again on 26 August 1848; the new state had the support of Vasconcelos' regime in El Salvador and the rebel guerrilla army of Vicente and Serapio Cruz who were declared enemies of general Carrera. The interim government was led by Guzm\u00e1n himself and had Florencio Molina and the priest Fernando Davila as his Cabinet members.", "start_char_pos": 46, "end_char_pos": 46}, {"type": "A", "before": null, "after": "On 5 September 1848, the criollo altenses chose a formal government led by Fernando Antonio Mart\u00ednez. In the meantime, Carrera returned to Guatemala and entered by Huehuetenango, where he met with the native leaders and told them that they had to remain united to prevail. The leaders agreed and slowly the segregated native communities started to develop a new Indian identity under Carrera's leadership. In the meantime, in the eastern part of Guatemala, the Jalapa region became increasingly dangerous; former president Mariano Rivera Paz and rebel leader Vicente Cruz were both murdered there after trying to take over the Corregidor office in 1849.", "start_char_pos": 47, "end_char_pos": 47}, {"type": "A", "before": null, "after": "Upon learning that officer Jos\u00e9 V\u00edctor Zavala had been appointed as Corregidor in Suchitep\u00e9quez, Carrera and his hundred jacalteco bodyguards crossed a dangerous jungle infested with jaguars to meet his former friend. When they met, Zavala not only did not capture him, but agreed to serve under his orders, thus sending a strong message to both liberal and conservatives in Guatemala City, who realized that they were forced to negotiate with Carrera, otherwise they were going to have to battle on two fronts \u2014 Quetzaltenango and Jalapa.", "start_char_pos": 48, "end_char_pos": 48}, {"type": "A", "before": null, "after": "Carrera went back to the Quetzaltenango area, while Zavala remained in Suchitep\u00e9quez as a tactical maneuver. Carrera received a visit from a Cabinet member of Paredes and told him that he had control of the native population and that he would keep them appeased. When the emissary returned to Guatemala City, he told the president everything Carrera said, and added that the native forces were formidable.", "start_char_pos": 49, "end_char_pos": 49}, {"type": "A", "before": null, "after": "Agust\u00edn Guzm\u00e1n went to Antigua Guatemala to meet with another group of Paredes emissaries; they agreed that Los Altos would rejoin Guatemala, and that the latter would help Guzm\u00e1n defeat his hated enemy and also build a port on the Pacific Ocean. Guzm\u00e1n was sure of victory this time, but his plan evaporated when, in his absence, Carrera and his native allies occupied Quetzaltenango. Carrera appointed Ignacio Yrigoyen as Corregidor and convinced him that he should work with the K'iche', Q\u2019anjob\u2019al, and Mam leaders to keep the region under control. On his way out, Yrigoyen murmured to a friend: Now he is the King of the Indians, indeed!", "start_char_pos": 50, "end_char_pos": 50}, {"type": "A", "before": null, "after": "The region is still distinctive, and Los Altos is still a nickname for the region of Guatemala around Quetzaltenango. Similarly, the Mexican portion of the former state is known as Los Altos de Chiapas.", "start_char_pos": 51, "end_char_pos": 51}], "sents_char_pos": [0]}
+{"doc_id": "11026266", "revision_depth": "1", "before_revision": "Litigation public relations, also known as litigation communications, is the management of the communication process during the course of any legal dispute or adjudicatory processing so as to affect the outcome or its impact on the client's overall reputation (Haggerty, 2003). The aims of litigation PR differ from general PR in that they are tied to supporting a legal dispute rather than general profile raising. Accordingly, there is a greater focus on the legal implications of any communications given the strategic aims and sensitive rules around disclosure during court proceedings. According to The New York Times, sophisticated litigation public relations efforts have included \"round-the-clock crisis P.R. response, efforts to shape internet search results, and a website with international reports and legal filings\" intended to support one side of the case. Plaintiffs and prosecutors have long used mass media to get their side of the story out to the public , but the formal practice of litigation PR, a sub-specialty of crisis communication, first emerged in the early 1980s with Alan Hilburg, a pioneer in litigation communications representation of U.S. Tobacco in the Marsee case. Since then, the need for litigation PR has grown tremendously as media coverage of court cases and the law has increased. Most parties to a lawsuit have important interests that expand beyond legal concerns. Negative publicity about a litigant can cause damage to an individual's reputation that a courtroom win years later may not salvage . Thus, parties to cases, whether civil or criminal, cannot ignore the impact of negative publicity on public opinion (Reber, Gower, Robinson, 2006) . Given the often complex matters at stake in litigation, practitioners need to digest and simplify these to ensure media and public interest in the story, without diluting any of the meaning in legal documents (Maltin, 2018) . Definition of litigation pr Litigation PR is the management of the communication process prior to and during the course of any legal dispute or adjudicatory processing so as to affect the outcome or its impact on the client's overall reputation (Haggerty, 2003) . Basic Concepts of Litigation Public Relations\u2014 The First Concept\u2014'Litigation PR is to influence the outcome of the court case by encouraging early or favorable settlement or by pressuring the prosecution into bringing lesser or no charges (Haggerty, 2003). The Second Concept\u2014'Litigation PR is to protect the client's reputation before and during the trial. In this regard, litigation PR is akin to reputation management . Reputation management is about managing public perception of an organization or individual . It is about attitude toward the individual and not knowledge itself. An essential aspect of reputation management is influencing attitude about the individual and corporation, which can encourage positive activation to the benefit of the organization (Haywood, 2002). Litigation pr and media coverage Litigation PR on the part of defendants is needed , especially in high-profile cases because the media have an inherent bias in favor of plaintiffs and prosecutors. When allegations are made public, the media tend to cast the lawsuit in terms of victim versus villain. News stories frequently lead with the plaintiff or prosecutors \u2019 allegations. If the defendant's responses are included at all, they appear well into the story. Thus, the defendant is forced on the defensive from the outset. In such situation, \u201c working with the media to create more balanced, accurate, and less sensational coverage of a lawsuit is necessary element in defending high profile defendants\" (Hantler, Schwartz, & Goldberg, 2004, p. 8 ). Fitzpatrick's six objectives of litigation public relations Counteracting negative publicity. Making a client's viewpoint known. Ensuring balanced media coverage. Helping the media and the public understand complex legal issues. Defusing a hostile environment. Helping resolve the conflict (Fitzpatrick, 1996).%DIFDELCMD < %DIFDELCMD < %%% To achieve those objectives, the first step is to establish credibility with the media as an information source. The next step is to control the flow of information to the mediaso that the right message gets out. The third step is to develop a message that supports the client's position and get that message out to the media and the public (Fitzpatrick, 1996, Haggerty, 2003, Reber, Gower, Robinson, 2006). Differences between litigation pr and other pr practices Litigation PR is highly dependent on the media. Although the practice of PR involves far more than just mediated communication, litigation PR remains dependent on the media. It is because of the media's increased attention to lawsuits that litigation PR has become a necessity for many high-profile clients (Gibson, 1998). Because typical public relations campaign strategies and tactics may not be appropriate and may even be harmful at certain times during a lawsuit, the legal strategy must take procedure (Schweitzer, 2003). Litigation PR is more regulated than regular public relations because of the potential to prejudice the legal process (Gibson, 1998) . For example, practitioners must ensure that their work does not fall foul of any Contempt of Court lawsin which they work (Maltin, 2018). Litigation PR is directed with the emphasis of one-way, asymmetrical communication. Because the law is adversarial in nature, creating a win-lose situation, the goal of litigation PR is to reinforce the legal strategy and theory of the case to ensure a win and to reduce damage to the organization's credibility and reputation (Reber, Gower, Robinson, 2006).%DIFDELCMD < %DIFDELCMD < %%% References Boehme-Ne\u00dfler, V. (2010). Die \u00d6ffentlichkeit als Richter? Litigation-PR als neue Methode der Rechtsfindung, Nomos Verlag Fitzpatrick, K. (1996). Practice management: The court of public opinion. Texas Lawyer, P.30. Gibson, D. C. (1998). Litigation public relations: Fundamental assumption. Public Relations Quarterly, 43, 19-23. Gostomzyk, T. (2008). Anw\u00e4lte wissen, wie Sie Prozesse gewinnen - und wie gewinnt der Mandant die \u00f6ffentliche Meinung?, AnwBl. 8 + 9/2008, 587-588. Haggerty, J. F. (2003). In the court of public opinion: Winning your case with public relations. Hoboken, NJ: Wiley. Hantler, S. B., Schwartz, V. E.,%DIFDELCMD < & %%% Goldberg, P.S. (2004). Extending the privilege to litigation communication specialties in the age of trial by media. Communication Law Conspectus, 13, 7-34. Haywood, R. (2002). Managing your reputation: How to plan public relations to build and protect the organization's most powerful asset (2nd ed.). London: Hogan Page. Holzinger, S./Wolff, U. (2009), Im Namen der \u00d6ffentlichkeit - Litigation-PR als strategisches Instrument bei juristischen Auseinandersetzungen, Wiesbaden (first German book on Litigation PR) Maltin, T. (2018). The role of litigation PR both inside and outside the courtroom. In-House Lawyer Reber, B. H., Gower, K.K., & Robinson, J. A. (2006). The Internet and litigation public relations. Journal of Public Relations Research, 18(1), 23-44. Schweitzer, M. L. (2003). A matter of judgment. New York Law Journal, p. 26. ", "after_revision": "Litigation public relations, also known as litigation communications, is the management of the communication process during the course of any legal dispute or adjudicatory processing so as to affect the outcome or its impact on the client's overall reputation .Haggerty, J. F. ( 2003). In the court of public opinion: Winning your case with public relations. Hoboken, NJ: Wiley. The aims of litigation PR differ from general PR in that they are tied to supporting a legal dispute rather than general profile raising. Accordingly, there is a greater focus on the legal implications of any communications given the strategic aims and sensitive rules around disclosure during court proceedings. According to The New York Times, sophisticated litigation public relations efforts have included \"round-the-clock crisis P.R. response, efforts to shape internet search results, and a website with international reports and legal filings\" intended to support one side of the case. The use of mass media to present a particular narrative to the public has been used by both plaintiffs and prosecutors for a long time , but the formal practice of litigation PR, a sub-specialty of crisis communication, emerged in the United States in the early 1980s with Alan Hilburg, a pioneer in litigation communications representation of U.S. Tobacco in the Marsee case. Since then, the demand for litigation PR has expanded significantly as media coverage of court cases and legal disputes has increased. Parties to a lawsuit often have interests that expand beyond legal concerns. Negative publicity about a litigant can cause damage to an individual's reputation that persists even if they win the case itself . Thus, many seek to limit the negative publicity associated with their cases . Given the often complex matters which are the subject of litigation, practitioners need to digest and simplify these to ensure media and public interest in the story, without diluting any of the meaning in legal documents . Definition Litigation PR is the management of the communication process before and during a legal dispute or adjudicatory processing so as to affect the outcome or its impact on the client's overall reputation . Objectives One objective of litigation PR is to influence the outcome of the court case by encouraging early or favorable settlement or by pressuring the prosecution into bringing lesser or no charges . Another objective is to protect the client's reputation before and during the trial. In this regard, litigation PR is similar to reputation management , managing public perception of an organization or individual , rather than information itself. A key aspect of reputation management is influencing attitude about the individual and corporation, which can encourage positive activation to the benefit of the organization .Haywood, R. ( 2002). Managing your reputation: How to plan public relations to build and protect the organization's most powerful asset (2nd ed.). London: Hogan Page. Author Kathy Fitzpatrick identified six objectives of litigation public relations:Fitzpatrick, K. (1996). Practice management: The court of public opinion. Texas Lawyer, P.30. Counteracting negative publicity. Making a client's viewpoint known. Ensuring balanced media coverage. Helping the media and the public understand complex legal issues. Defusing a hostile environment. Helping resolve the conflict To achieve those objectives, the PR agent has to establish credibility with the media as an information source. The next step is to control the flow of information to the media to ensure the preferred narrative is disseminated. The third step is to develop a message that supports the client's position and spread that message to the media and the public. Media coverage Litigation PR on the part of defendants , especially in high-profile cases , aims to counter the inherent bias in the media in favor of plaintiffs and prosecutors. When allegations are made public, the media often casts the lawsuit in terms of victim versus villain. News stories frequently lead with the plaintiff or prosecutors ' allegations. If the defendant's responses are included at all, they appear well into the story. Thus, the defendant is forced on the defensive from the outset. In such a situation, \" working with the media to create more balanced, accurate, and less sensational coverage of a lawsuit is a necessary element in defending high profile defendants\" .Hantler, S. B., Schwartz, V. E., & Goldberg, P.S. (2004). Extending the privilege to litigation communication specialties in the age of trial by media. Communication Law Conspectus, 13, 7-34. p. 8 %DIFDELCMD < %DIFDELCMD < %%% Differences from other PR practices Litigation PR is highly dependent on the media. Although the practice of PR involves more than just mediated communication, litigation PR remains dependent on the media. It is because of the media's increased attention to lawsuits that demand for litigation PR has grown among high-profile clients .Gibson, D. C. ( 1998). Litigation public relations: Fundamental assumption. Public Relations Quarterly, 43, 19-23. Because typical public relations campaign strategies and tactics may not be appropriate and may even be harmful at certain times during a lawsuit, the legal strategy must take precedence.Schweitzer, M. L. ( 2003). A matter of judgment. New York Law Journal, p. 26. Litigation PR is more regulated than regular public relations because of the potential to prejudice the legal process . For example, practitioners must ensure that their work does not breach contempt of court laws.Maltin, T. ( 2018). The role of litigation PR both inside and outside the courtroom. In-House Lawyer Litigation PR is directed with the emphasis of one-way, asymmetrical communication. Because the law is adversarial in nature, creating a win-lose situation, the goal of litigation PR is to reinforce the legal strategy and theory of the case to ensure victory and to reduce damage to the organization's credibility and reputation %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < & %%% . Reber, B. H., Gower, K.K., & Robinson, J. A. (2006). The Internet and litigation public relations. Journal of Public Relations Research, 18(1), 23-44. References", "edit_actions": [{"type": "R", "before": "(Haggerty,", "after": ".Haggerty, J. F. (", "start_char_pos": 260, "end_char_pos": 270}, {"type": "A", "before": null, "after": "In the court of public opinion: Winning your case with public relations. Hoboken, NJ: Wiley.", "start_char_pos": 278, "end_char_pos": 278}, {"type": "R", "before": "Plaintiffs and prosecutors have long used", "after": "The use of", "start_char_pos": 872, "end_char_pos": 913}, {"type": "R", "before": "get their side of the story out", "after": "present a particular narrative", "start_char_pos": 928, "end_char_pos": 959}, {"type": "A", "before": null, "after": "has been used by both plaintiffs and prosecutors for a long time", "start_char_pos": 974, "end_char_pos": 974}, {"type": "D", "before": "first", "after": null, "start_char_pos": 1060, "end_char_pos": 1065}, {"type": "A", "before": null, "after": "United States in the", "start_char_pos": 1081, "end_char_pos": 1081}, {"type": "R", "before": "need", "after": "demand", "start_char_pos": 1219, "end_char_pos": 1223}, {"type": "R", "before": "grown tremendously", "after": "expanded significantly", "start_char_pos": 1246, "end_char_pos": 1264}, {"type": "R", "before": "the law", "after": "legal disputes", "start_char_pos": 1302, "end_char_pos": 1309}, {"type": "R", "before": "Most parties", "after": "Parties", "start_char_pos": 1325, "end_char_pos": 1337}, {"type": "R", "before": "have important", "after": "often have", "start_char_pos": 1351, "end_char_pos": 1365}, {"type": "R", "before": "a courtroom win years later may not salvage", "after": "persists even if they win the case itself", "start_char_pos": 1499, "end_char_pos": 1542}, {"type": "D", "before": "parties to cases, whether civil or criminal, cannot ignore the impact of negative publicity on public opinion (Reber, Gower,", "after": null, "start_char_pos": 1551, "end_char_pos": 1675}, {"type": "R", "before": "Robinson, 2006)", "after": "many seek to limit the negative publicity associated with their cases", "start_char_pos": 1676, "end_char_pos": 1691}, {"type": "R", "before": "at stake in", "after": "which are the subject of", "start_char_pos": 1726, "end_char_pos": 1737}, {"type": "D", "before": "(Maltin, 2018)", "after": null, "start_char_pos": 1903, "end_char_pos": 1917}, {"type": "D", "before": "of litigation pr", "after": null, "start_char_pos": 1931, "end_char_pos": 1947}, {"type": "R", "before": "prior to and during the course of any", "after": "before and during a", "start_char_pos": 2009, "end_char_pos": 2046}, {"type": "D", "before": "(Haggerty, 2003)", "after": null, "start_char_pos": 2165, "end_char_pos": 2181}, {"type": "R", "before": "Basic Concepts of Litigation Public Relations\u2014", "after": "Objectives", "start_char_pos": 2184, "end_char_pos": 2230}, {"type": "R", "before": "The First Concept\u2014'Litigation", "after": "One objective of litigation", "start_char_pos": 2231, "end_char_pos": 2260}, {"type": "R", "before": "(Haggerty, 2003). The Second Concept\u2014'Litigation PR", "after": ".", "start_char_pos": 2423, "end_char_pos": 2474}, {"type": "A", "before": null, "after": "Another objective", "start_char_pos": 2475, "end_char_pos": 2475}, {"type": "R", "before": "akin", "after": "similar", "start_char_pos": 2576, "end_char_pos": 2580}, {"type": "R", "before": ". Reputation management is about", "after": ",", "start_char_pos": 2606, "end_char_pos": 2638}, {"type": "R", "before": ". It is about attitude toward the individual and not knowledge itself. An essential", "after": ", rather than information itself. A key", "start_char_pos": 2699, "end_char_pos": 2782}, {"type": "R", "before": "(Haywood,", "after": ".Haywood, R. (", "start_char_pos": 2952, "end_char_pos": 2961}, {"type": "A", "before": null, "after": "Managing your reputation: How to plan public relations to build and protect the organization's most powerful asset (2nd ed.). London: Hogan Page.", "start_char_pos": 2969, "end_char_pos": 2969}, {"type": "R", "before": "Litigation pr and media", "after": "Author Kathy Fitzpatrick identified six objectives of litigation public relations:Fitzpatrick, K. (1996). Practice management: The court of public opinion. Texas Lawyer, P.30.", "start_char_pos": 2970, "end_char_pos": 2993}, {"type": "A", "before": null, "after": "Counteracting negative publicity. Making a client's viewpoint known. Ensuring balanced media coverage. Helping the media and the public understand complex legal issues. Defusing a hostile environment. Helping resolve the conflict", "start_char_pos": 2994, "end_char_pos": 2994}, {"type": "A", "before": null, "after": "To achieve those objectives, the PR agent has to establish credibility with the media as an information source. The next step is to control the flow of information to the media to ensure the preferred narrative is disseminated. The third step is to develop a message that supports the client's position and spread that message to the media and the public.", "start_char_pos": 2995, "end_char_pos": 2995}, {"type": "A", "before": null, "after": "Media", "start_char_pos": 2996, "end_char_pos": 2996}, {"type": "D", "before": "is needed", "after": null, "start_char_pos": 3046, "end_char_pos": 3055}, {"type": "R", "before": "because the media have an", "after": ", aims to counter the", "start_char_pos": 3091, "end_char_pos": 3116}, {"type": "A", "before": null, "after": "the media in", "start_char_pos": 3134, "end_char_pos": 3134}, {"type": "R", "before": "tend to cast", "after": "often casts", "start_char_pos": 3216, "end_char_pos": 3228}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3339, "end_char_pos": 3340}, {"type": "R", "before": "situation, \u201c", "after": "a situation, \"", "start_char_pos": 3509, "end_char_pos": 3521}, {"type": "A", "before": null, "after": "a", "start_char_pos": 3626, "end_char_pos": 3626}, {"type": "R", "before": "(Hantler, Schwartz,", "after": ".Hantler, S. B., Schwartz, V. E.,", "start_char_pos": 3683, "end_char_pos": 3702}, {"type": "R", "before": "2004, p.", "after": "P.S. (2004). Extending the privilege to litigation communication specialties in the age of trial by media. Communication Law Conspectus, 13, 7-34. p.", "start_char_pos": 3715, "end_char_pos": 3723}, {"type": "D", "before": ").", "after": null, "start_char_pos": 3726, "end_char_pos": 3728}, {"type": "D", "before": "Fitzpatrick's six objectives of litigation public relations", "after": null, "start_char_pos": 3729, "end_char_pos": 3788}, {"type": "D", "before": "Counteracting negative publicity. Making a client's viewpoint known. Ensuring balanced media coverage. Helping the media and the public understand complex legal issues. Defusing a hostile environment. Helping resolve the conflict (Fitzpatrick, 1996).", "after": null, "start_char_pos": 3789, "end_char_pos": 4039}, {"type": "D", "before": "To achieve those objectives, the first step is to establish credibility with the media as an information source. The next step is to control the flow of information to the mediaso that the right message gets out. The third step is to develop a message that supports the client's position and get that message out to the media and the public (Fitzpatrick, 1996, Haggerty, 2003, Reber, Gower,", "after": null, "start_char_pos": 4069, "end_char_pos": 4459}, {"type": "D", "before": "Robinson, 2006).", "after": null, "start_char_pos": 4460, "end_char_pos": 4476}, {"type": "R", "before": "between litigation pr and other pr", "after": "from other PR", "start_char_pos": 4489, "end_char_pos": 4523}, {"type": "D", "before": "far", "after": null, "start_char_pos": 4619, "end_char_pos": 4622}, {"type": "A", "before": null, "after": "demand for", "start_char_pos": 4774, "end_char_pos": 4774}, {"type": "R", "before": "become a necessity for many", "after": "grown among", "start_char_pos": 4793, "end_char_pos": 4820}, {"type": "R", "before": "(Gibson,", "after": ".Gibson, D. C. (", "start_char_pos": 4842, "end_char_pos": 4850}, {"type": "A", "before": null, "after": "Litigation public relations: Fundamental assumption. Public Relations Quarterly, 43, 19-23.", "start_char_pos": 4858, "end_char_pos": 4858}, {"type": "R", "before": "procedure (Schweitzer,", "after": "precedence.Schweitzer, M. L. (", "start_char_pos": 5035, "end_char_pos": 5057}, {"type": "A", "before": null, "after": "A matter of judgment. New York Law Journal, p. 26.", "start_char_pos": 5065, "end_char_pos": 5065}, {"type": "D", "before": "(Gibson, 1998)", "after": null, "start_char_pos": 5184, "end_char_pos": 5198}, {"type": "R", "before": "fall foul of any Contempt of Court lawsin which they work (Maltin,", "after": "breach contempt of court laws.Maltin, T. (", "start_char_pos": 5265, "end_char_pos": 5331}, {"type": "A", "before": null, "after": "The role of litigation PR both inside and outside the courtroom. In-House Lawyer", "start_char_pos": 5339, "end_char_pos": 5339}, {"type": "R", "before": "a win", "after": "victory", "start_char_pos": 5591, "end_char_pos": 5596}, {"type": "D", "before": "(Reber, Gower,", "after": null, "start_char_pos": 5667, "end_char_pos": 5681}, {"type": "D", "before": "Robinson, 2006).", "after": null, "start_char_pos": 5682, "end_char_pos": 5698}, {"type": "D", "before": "References", "after": null, "start_char_pos": 5728, "end_char_pos": 5738}, {"type": "D", "before": "Boehme-Ne\u00dfler, V. (2010). Die \u00d6ffentlichkeit als Richter? Litigation-PR als neue Methode der Rechtsfindung, Nomos Verlag Fitzpatrick, K. (1996). Practice management: The court of public opinion. Texas Lawyer, P.30. Gibson, D. C. (1998). Litigation public relations: Fundamental assumption. Public Relations Quarterly, 43, 19-23. Gostomzyk, T. (2008). Anw\u00e4lte wissen, wie Sie Prozesse gewinnen - und wie gewinnt der Mandant die \u00f6ffentliche Meinung?, AnwBl. 8 + 9/2008, 587-588. Haggerty, J. F. (2003). In the court of public opinion: Winning your case with public relations. Hoboken, NJ: Wiley. Hantler, S. B., Schwartz, V. E.,", "after": null, "start_char_pos": 5739, "end_char_pos": 6365}, {"type": "R", "before": "Goldberg, P.S. (2004). Extending the privilege to litigation communication specialties in the age of trial by media. Communication Law Conspectus, 13, 7-34. Haywood, R. (2002). Managing your reputation: How to plan public relations to build and protect the organization's most powerful asset (2nd ed.). London: Hogan Page. Holzinger, S./Wolff, U. (2009), Im Namen der \u00d6ffentlichkeit - Litigation-PR als strategisches Instrument bei juristischen Auseinandersetzungen, Wiesbaden (first German book on Litigation PR) Maltin, T. (2018). The role of litigation PR both inside and outside the courtroom. In-House Lawyer", "after": ".", "start_char_pos": 6384, "end_char_pos": 6997}, {"type": "D", "before": "Schweitzer, M. L. (2003). A matter of judgment. New York Law Journal, p. 26.", "after": null, "start_char_pos": 7149, "end_char_pos": 7225}, {"type": "A", "before": null, "after": "References", "start_char_pos": 7226, "end_char_pos": 7226}], "sents_char_pos": [0, 277, 416, 591, 871, 1202, 1324, 1410, 1544, 1919, 2181, 2440, 2542, 2700, 2769, 2968, 3171, 3275, 3353, 3436, 3500, 3728, 3822, 3857, 3891, 3957, 3989, 4039, 4181, 4281, 4476, 4581, 4707, 4857, 5064, 5200, 5338, 5423, 5698, 5764, 5796, 5883, 5933, 5975, 6028, 6067, 6089, 6194, 6215, 6239, 6312, 6332, 6406, 6500, 6540, 6560, 6686, 6706, 6916, 6981, 7050, 7096, 7148, 7174, 7196]}
+{"doc_id": "11466053", "revision_depth": "1", "before_revision": "Roman In a Latin story, there was a married woman in Ephesus of such well-known virtue that women even from the neighboring places gazed at her. When her husband was buried, she weeped night and day over the body, which was buried in an underground vault. No one could divert her from torturing herself. The officials gave up and left her. Everyone mourned for her as a lady of great character, and she was now passed her fifth day of starvation. Every person thought she was the one true example of a wife. Only a loyal maid sat by the widow and shed tears with her in sympathy. The widow's son, who was a soldier returning from the outskirts for being stationed to watch over some crucified robbers near his father's grave, heard of his father's demise and went to the vault where he found his mother, who he always thought was beautiful, in a terrible state. She was overjoyed to see him, but when he brought supper for her into the tomb and told his mother that this grief was useless and that he would love her from then on, she did not acknowledge his sympathy and weeped even more. Her son kept urging his poor mother to eat with similar encouragements, until her maid, at last gave in. Refreshed with food and drink, she too started to attack her mistress's stubbornness, and say that her dead husband would not want her to suffer like this. So the lady allowed her determination to fall, and filled herself with food. The son used the same suggestive words, which had convinced his mother to live, to make her see that he was desirable and dominant just like her late husband, his father. In her pure eyes, she saw a pleasing hero she could not stop from yielding to and so he won her over wholly. No one would have ever thought that this most chaste lady that was resolved to breathe her last over her husband's body had spent not only a wedding night on her son's bed, but a second and a third. The son delighted in his mother's beauty, and she in his alikeness to his late father in both youth and handsomeness. During their shared pleasure, the brother of one of the robbers, noticing that there was no watch guard, took his body down in the night. The next day, seeing one of the crosses without its corpse, the son was in fear of punishment, and told his mother what happened. He told her that this must be because wronged his father by taking his own mother as his wife, but would make right by punishing himself with his sword. His mother's pure heart was now tender for her son the way a wife's heart would and she replied , \"No, I would rather make my dead love useful, than lose my living love.\" She ordered her first husband's body to be removed from the coffin and put up in place of the missing robber .", "after_revision": "Roman In a Latin story, there is a married woman in Ephesus of such well-known virtue that women even from the neighboring places gaze at her. When her husband is buried, she weeps night and day over the body, which is buried in an underground vault. No one is able to divert her from torturing herself. Everyone mourns for her as a lady of great character, and she is now passed her fifth day of starvation. Every person thinks she is the one true example of a wife. Only a loyal maid sits by the widow and shed tears with her in sympathy. The widow's son, who is a soldier returning from the outskirts for being stationed to watch over some crucified robbers near his father's grave, hears of his father's demise and goes to the vault where he finds his mother, who he has always thought is beautiful, in a terrible state. She is overjoyed to see him, but when he brings supper for her into the tomb and tells his mother that this grief is useless and that he will love her from then on, she does not acknowledge his sympathy and weeps even more. Her son keeps urging his poor mother to eat with similar encouragements, until her maid, at last gives in. Refreshed with food and drink, she too starta to attack her mistress's stubbornness, and say that her dead husband will not want her to suffer like this. So the lady allows her stubbornness to fall, and fills herself with food. The son uses the same suggestive words, which has convinced his mother to live, to make her see that he is desirable and dominant just like her late husband, his father. In her pure eyes, she sees a pleasing hero she can not stop from yielding to and so he wins her over wholly. No one will have ever thought that this most chaste lady that was resolved to breathe her last over her husband's body has spent not only a wedding night on her son's bed, but a second and a third. The son delights in his mother's beauty, and she in his alikeness to his late father in both youth and handsomeness. During their shared pleasure, the brother of one of the robbers, noticing that there is no watch guard, takes his body down in the night. The next day, seeing one of the crosses without its corpse, the son is in fear of punishment, and tells his mother what happened. He tells her that this must be because he wronged his father by taking his own mother as his wife, but will make right by punishing himself with his sword. His mother's pure heart is now tender for her son the way a wife's heart would and she replies , \"No, I would rather make my dead love useful, than lose my living love.\" She orders her first husband's body to be removed from the coffin and put up in place of the missing robber . In this story, a maidservant informs her mistress, a noble widow, that the mistress\u2019s young son is trying to seduce her. His mother hides in his bed to find out the truth for herself, but instead yields to his desire without divulging herself. Filled with shame, she comes up with an excuse to send away her son. However, she realizes later that she has conceived. Unable to hide her pregnancy, her son soon finds out the truth .", "edit_actions": [{"type": "R", "before": "was", "after": "is", "start_char_pos": 30, "end_char_pos": 33}, {"type": "R", "before": "gazed", "after": "gaze", "start_char_pos": 131, "end_char_pos": 136}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 162, "end_char_pos": 165}, {"type": "R", "before": "weeped", "after": "weeps", "start_char_pos": 178, "end_char_pos": 184}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 220, "end_char_pos": 223}, {"type": "R", "before": "could", "after": "is able to", "start_char_pos": 263, "end_char_pos": 268}, {"type": "R", "before": "The officials gave up and left her. Everyone mourned", "after": "Everyone mourns", "start_char_pos": 304, "end_char_pos": 356}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 403, "end_char_pos": 406}, {"type": "R", "before": "thought she was", "after": "thinks she is", "start_char_pos": 460, "end_char_pos": 475}, {"type": "R", "before": "sat", "after": "sits", "start_char_pos": 526, "end_char_pos": 529}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 601, "end_char_pos": 604}, {"type": "R", "before": "heard", "after": "hears", "start_char_pos": 726, "end_char_pos": 731}, {"type": "R", "before": "went", "after": "goes", "start_char_pos": 759, "end_char_pos": 763}, {"type": "R", "before": "found", "after": "finds", "start_char_pos": 786, "end_char_pos": 791}, {"type": "R", "before": "always thought was", "after": "has always thought is", "start_char_pos": 811, "end_char_pos": 829}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 866, "end_char_pos": 869}, {"type": "R", "before": "brought", "after": "brings", "start_char_pos": 904, "end_char_pos": 911}, {"type": "R", "before": "told", "after": "tells", "start_char_pos": 945, "end_char_pos": 949}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 977, "end_char_pos": 980}, {"type": "R", "before": "would", "after": "will", "start_char_pos": 1001, "end_char_pos": 1006}, {"type": "R", "before": "did", "after": "does", "start_char_pos": 1034, "end_char_pos": 1037}, {"type": "R", "before": "weeped", "after": "weeps", "start_char_pos": 1071, "end_char_pos": 1077}, {"type": "R", "before": "kept", "after": "keeps", "start_char_pos": 1097, "end_char_pos": 1101}, {"type": "R", "before": "gave", "after": "gives", "start_char_pos": 1185, "end_char_pos": 1189}, {"type": "R", "before": "started", "after": "starta", "start_char_pos": 1233, "end_char_pos": 1240}, {"type": "R", "before": "would", "after": "will", "start_char_pos": 1310, "end_char_pos": 1315}, {"type": "R", "before": "allowed her determination", "after": "allows her stubbornness", "start_char_pos": 1362, "end_char_pos": 1387}, {"type": "R", "before": "filled", "after": "fills", "start_char_pos": 1401, "end_char_pos": 1407}, {"type": "R", "before": "used", "after": "uses", "start_char_pos": 1435, "end_char_pos": 1439}, {"type": "R", "before": "had", "after": "has", "start_char_pos": 1473, "end_char_pos": 1476}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 1531, "end_char_pos": 1534}, {"type": "R", "before": "saw", "after": "sees", "start_char_pos": 1620, "end_char_pos": 1623}, {"type": "R", "before": "could", "after": "can", "start_char_pos": 1644, "end_char_pos": 1649}, {"type": "R", "before": "won", "after": "wins", "start_char_pos": 1686, "end_char_pos": 1689}, {"type": "R", "before": "would", "after": "will", "start_char_pos": 1714, "end_char_pos": 1719}, {"type": "R", "before": "had", "after": "has", "start_char_pos": 1827, "end_char_pos": 1830}, {"type": "R", "before": "delighted", "after": "delights", "start_char_pos": 1914, "end_char_pos": 1923}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 2109, "end_char_pos": 2112}, {"type": "R", "before": "took", "after": "takes", "start_char_pos": 2129, "end_char_pos": 2133}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 2230, "end_char_pos": 2233}, {"type": "R", "before": "told", "after": "tells", "start_char_pos": 2261, "end_char_pos": 2265}, {"type": "R", "before": "told", "after": "tells", "start_char_pos": 2295, "end_char_pos": 2299}, {"type": "A", "before": null, "after": "he", "start_char_pos": 2330, "end_char_pos": 2330}, {"type": "R", "before": "would", "after": "will", "start_char_pos": 2392, "end_char_pos": 2397}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 2470, "end_char_pos": 2473}, {"type": "R", "before": "replied", "after": "replies", "start_char_pos": 2534, "end_char_pos": 2541}, {"type": "R", "before": "ordered", "after": "orders", "start_char_pos": 2621, "end_char_pos": 2628}, {"type": "A", "before": null, "after": ".", "start_char_pos": 2726, "end_char_pos": 2726}, {"type": "A", "before": null, "after": "In this story, a maidservant informs her mistress, a noble widow, that the mistress\u2019s young son is trying to seduce her. His mother hides in his bed to find out the truth for herself, but instead yields to his desire without divulging herself. Filled with shame, she comes up with an excuse to send away her son. However, she realizes later that she has conceived. Unable to hide her pregnancy, her son soon finds out the truth", "start_char_pos": 2727, "end_char_pos": 2727}], "sents_char_pos": [0, 144, 255, 303, 339, 446, 507, 579, 861, 1088, 1193, 1349, 1426, 1597, 1706, 1905, 2023, 2161, 2291, 2445, 2616]}
+{"doc_id": "11503904", "revision_depth": "4", "before_revision": "The Quitu were Pre-Columbian indigenous peoples in Ecuador who founded Quito, which is the capital of present-day Ecuador.\"Quito.\" All Ecuador and More. 2009 (retrieved 3 May 2011) This people ruled the territory from 2000 BCE and persisted through the period known as the Regional Integration Period , prior to the invasion of the Inca and later the beginning of the Spanish conquest of the center in 1534. They occupied an area dominated by mountains, settling largely in the valleys. About 800CE , they created 20-meter deep tombs as part of funerary centers on the plateau. These were discovered in 2010 in the Florida neighborhood of Quito . The capital was named after this people . Before the 21st century, little archeological evidence had been found associated with this people, and some historians doubted that they existed as a culture. According to Spanish missionary and historian Juan de Velasco, in his book, Historia del Reino de Quito (1767 ), the Quitu were conquered by the Cara culture around 980 CE. Together, the two cultures formed the Quitu-Cara culture as the basis for the kingdom (or chiefdom) of Quito. But 20th-century historians Jacinto Jij\u00f3n y Caama\u00f1o and Alfredo Pareja Diezcanseco contested that such a kingdom existed . They did not find archeological evidence of Quitu remains. It was not until the early 21st century that a large Quitu funerary and ceremonial area was excavated in Quito. Archeologist Holguer Jara said this delay protected their artifacts for centuries from grave robbers . Tomb robbers are known to have depleted many other cultures of their archeological remains, especially artifacts made of gold. But it also meant that archeologists and historians had learned little about this culture. In 2010, an area of numerous 20-meter deep Quitu tombs was discovered in Quito, dating to about 800CE. The tombs had three levels, with multiple burials on each level: four bodies on the lowest, and six on each of the next two levels. Individuals were buried in a squatting position, wrapped in cloth and with decorated ponchos, some featuring refined, carved Spondylus shells, which they acquired from the Pacific coast by trade . The Quitu are believed to have endured as a people during a period of integration of cultures in the region, long before the Inca conquered the territory or the Spanish explorers arrived in the early 16th century . The Quitu traded with the Yumbo, a tribe that lived northwest of this area. The Yumbo had networks that reached from the Andes to the coast. The Quitu grave goods showed that they had acquired valuable Spondylus shells. These were harvested in what are now the coastal provinces of Manab\u00ed and Santa Elena. The shells were highly valued by Native Americans and exported throughout the trading networks of South America, as they have been found in Argentina, Chile, Peru, Colombia and even present-day Mexico. Based on their use of these shells associated with religious rituals, the Quitu were among the many peoples who gave them sacred meaning. The Museum of Florida has been developed here to display and interpret artifacts from the tombs. It is named after the neighborhood in which the tombs were found. The museum includes constructed figures of a Quitu man and woman (the latter's face was created by forensic techniques from a skull excavated at the site.) The woman wears clothing as found in the tombs: \"a poncho covered with small buttons carved from Spondylus shell and snails, as well as silverware such as earrings, pins, necklaces, hunting darts and \" rattles\". The Quitu were a festive people, and rattles were a way for women to make music as they walked. Organization Excavations of tombs show the Quitu believed in an afterlife. Grave goods were buried with them for their use in the afterlife. Essentially the Quitu were an agricultural people, seen as a \"pueblo alegre y festivo\" (happy and festive people).", "after_revision": "The Quitu were Pre-Columbian indigenous peoples in Ecuador who founded Quito, which is the capital of present-day Ecuador.\"Quito.\" All Ecuador and More. 2009 (retrieved 3 May 2011) This people ruled the territory from 2000 BCE and persisted through the period known as the Regional Integration Period . They were overtaken by the invasion of the Inca . The Spanish invaded and conquered the center in 1534. The Quitu occupied an area dominated by mountains, settling largely in the valleys. About 800 CE , they created three-level, 20-meter deep tombs as part of funerary centers on the plateau. The bodies were accompanied by highly refined grave goods of textiles, shells and metals, as well as drink and food for the afterlife. These tombs were discovered in the Florida neighborhood of Quito , and in 2010 the Museum of Florida opened to display many of their treasures . The capital was named after this people , who were at one time considered to be legendary . Before the 21st century, little archeological evidence had been found associated with this people, and some historians doubted that they existed as a culture. According to Spanish Jesuit missionary and historian Juan de Velasco, in his book, Historia del Reino de Quito en la Am\u00e9rica meridional (1789 ), the Quitu were conquered by the Cara culture around 980 CE. He also referred to this people as Scyris, and said they may have been related to the Inca. He cited three other documents: \"Las dos l\u00edneas de los Incas y de los Scyris, se\u00f1ores del Cuzco, y del Quito,\" by Fray Marcos de Niza, a Franciscan who accompanied Sebasti\u00e1n Benalc\u00e1zar's conquest of Quito in 1533; \"Las antig\u00fcedades del Per\u00fa,\" by Melchor Bravo de Saravia, an oidor (judge) of Lima; and \"Guerras civiles del Inca Atahualpa con su hermano Atoco, llamado com\u00fanmente Hu\u00e1scar-Inca,\" by Jacinto Collahuaso, an eighteenth-century cacique of Ibarra (north of Quito), which are no longer available to scholars. Together, the two cultures formed the Quitu-Cara culture as the basis for the kingdom (or chiefdom) of Quito. But 20th-century historians Jacinto Jij\u00f3n y Caama\u00f1o and Alfredo Pareja Diezcanseco contested that the Scyris existed and that they were related to the Inca. By then the Quitu-Cara were considered perhaps to be a legendary, pre-Hispanic kingdom to which people could refer for dreams of former glory . They did not find archeological evidence of Quitu remains. It was not until the early 21st century that a large Quitu funerary and ceremonial area was excavated in Quito. Archeologist Holguer Jara said this delay protected their artifacts for centuries from grave robbers , who are known to have depleted many other cultures of their valuable archeological remains, especially artifacts made of gold. But it also meant that archeologists and historians had learned little factual evidence about this culture. In 2010, an area of numerous 20-meter deep , three-level Quitu tombs was discovered in Quito, dating to about 800CE. The tombs had three levels, with multiple burials on each level: four bodies on the lowest, and six on each of the next two levels. Both men and women were buried in a squatting position, wrapped in cloth and with decorated ponchos, some featuring refined, carved Spondylus shells, which were acquired by Quitu trade from the Manta culture along the Pacific coast . The Quitu are believed to have endured as a people during a period of integration of cultures in the region, long before the Inca conquered the territory or the Spanish explorers arrived in the early 16th century to conquer the city . The Quitu traded with the Yumbo, a tribe that lived northwest of this area. The Yumbo had networks that reached from the Andes west to the coast. The Quitu grave goods showed that they had acquired valuable Spondylus shells. These were harvested by the Manta people in what are now the coastal provinces of Manab\u00ed and Santa Elena. The shells were highly valued by Native Americans and exported throughout the trading networks of South America, as they have been found in Argentina, Chile, Peru, Colombia and even present-day Mexico. Based on their use of these shells associated with religious rituals, the Quitu were among the many peoples who gave them sacred meaning. The Museum of Florida has been developed here to display and interpret artifacts from the tombs. It is named after the neighborhood in which the tombs were found. The museum includes constructed figures of a Quitu man and woman (the latter's face was created by forensic techniques from a skull excavated at the site.) The woman wears clothing as found in the tombs: \"a poncho covered with small buttons carved from Spondylus shell and snails, as well as silverware such as earrings, pins, necklaces, hunting darts and rattles\". The Quitu were a festive people, and rattles were a way for women to make music as they walked. Organization Excavations of tombs show the Quitu believed in an afterlife. Grave goods , including drink and food, were buried with them for their use in the afterlife. Essentially the Quitu were an agricultural people, seen as a \"pueblo alegre y festivo\" (happy and festive people).", "edit_actions": [{"type": "R", "before": ", prior to", "after": ". They were overtaken by", "start_char_pos": 301, "end_char_pos": 311}, {"type": "R", "before": "and later the beginning of the Spanish conquest of the", "after": ". The Spanish invaded and conquered the", "start_char_pos": 337, "end_char_pos": 391}, {"type": "R", "before": "They", "after": "The Quitu", "start_char_pos": 408, "end_char_pos": 412}, {"type": "R", "before": "800CE", "after": "800 CE", "start_char_pos": 493, "end_char_pos": 498}, {"type": "A", "before": null, "after": "three-level,", "start_char_pos": 514, "end_char_pos": 514}, {"type": "R", "before": "These", "after": "The bodies were accompanied by highly refined grave goods of textiles, shells and metals, as well as drink and food for the afterlife. These tombs", "start_char_pos": 579, "end_char_pos": 584}, {"type": "D", "before": "2010 in", "after": null, "start_char_pos": 604, "end_char_pos": 611}, {"type": "A", "before": null, "after": ", and in 2010 the Museum of Florida opened to display many of their treasures", "start_char_pos": 646, "end_char_pos": 646}, {"type": "A", "before": null, "after": ", who were at one time considered to be legendary", "start_char_pos": 689, "end_char_pos": 689}, {"type": "A", "before": null, "after": "Jesuit", "start_char_pos": 872, "end_char_pos": 872}, {"type": "R", "before": "(1767", "after": "en la Am\u00e9rica meridional (1789", "start_char_pos": 956, "end_char_pos": 961}, {"type": "A", "before": null, "after": "He also referred to this people as Scyris, and said they may have been related to the Inca. He cited three other documents: \"Las dos l\u00edneas de los Incas y de los Scyris, se\u00f1ores del Cuzco, y del Quito,\" by Fray Marcos de Niza, a Franciscan who accompanied Sebasti\u00e1n Benalc\u00e1zar's conquest of Quito in 1533; \"Las antig\u00fcedades del Per\u00fa,\" by Melchor Bravo de Saravia, an oidor (judge) of Lima; and \"Guerras civiles del Inca Atahualpa con su hermano Atoco, llamado com\u00fanmente Hu\u00e1scar-Inca,\" by Jacinto Collahuaso, an eighteenth-century cacique of Ibarra (north of Quito), which are no longer available to scholars.", "start_char_pos": 1025, "end_char_pos": 1025}, {"type": "R", "before": "such a kingdom existed", "after": "the Scyris existed and that they were related to the Inca. By then the Quitu-Cara were considered perhaps to be a legendary, pre-Hispanic kingdom to which people could refer for dreams of former glory", "start_char_pos": 1234, "end_char_pos": 1256}, {"type": "R", "before": ". Tomb robbers", "after": ", who", "start_char_pos": 1531, "end_char_pos": 1545}, {"type": "A", "before": null, "after": "valuable", "start_char_pos": 1602, "end_char_pos": 1602}, {"type": "A", "before": null, "after": "factual evidence", "start_char_pos": 1732, "end_char_pos": 1732}, {"type": "A", "before": null, "after": ", three-level", "start_char_pos": 1796, "end_char_pos": 1796}, {"type": "R", "before": "Individuals", "after": "Both men and women", "start_char_pos": 1989, "end_char_pos": 2000}, {"type": "R", "before": "they acquired from the Pacific coast by trade", "after": "were acquired by Quitu trade from the Manta culture along the Pacific coast", "start_char_pos": 2138, "end_char_pos": 2183}, {"type": "A", "before": null, "after": "to conquer the city", "start_char_pos": 2399, "end_char_pos": 2399}, {"type": "A", "before": null, "after": "west", "start_char_pos": 2529, "end_char_pos": 2529}, {"type": "A", "before": null, "after": "by the Manta people", "start_char_pos": 2644, "end_char_pos": 2644}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 3569, "end_char_pos": 3570}, {"type": "A", "before": null, "after": ", including drink and food,", "start_char_pos": 3764, "end_char_pos": 3764}], "sents_char_pos": [0, 122, 152, 407, 486, 578, 648, 691, 850, 1024, 1135, 1258, 1317, 1429, 1660, 1752, 1856, 1988, 2185, 2401, 2477, 2543, 2622, 2709, 2911, 3049, 3146, 3212, 3368, 3580, 3676, 3751, 3818]}
+{"doc_id": "11515287", "revision_depth": "1", "before_revision": "The SAT Subject Test in United States History is the name of a one-hour multiple choice test given on United States History by The College Board. A student chooses whether to take the test depending upon college entrance requirements for the schools in which the student is planning to apply. Until 1994, the SAT Subject Tests were known as Achievement Tests; and from 1995 until January 2005, they were known as SAT IIs. Of all SAT subject tests, United States History is taken the second most, with 119,903 administrations in 2009. Format The test has 90 multiple choice questions that are to be answered in one hour. All questions have five answer choices. Students' scores are based entirely on their performance in answering the multiple choice questions. The questions cover a broad range of topics. Approximately 31\u201335\\% of questions focus on political history, 13\u201317\\% focus on economic history, 20\u201324\\% focus on social history, 13\u201317\\% focus on intellectual and cultural history, and 13\u201317\\% focus on foreign policy. The questions also vary with respect to time period; approximately 20\\% focus on period of the Pre-Columbian era to 1789, 40\\% focus on the period between 1790 and 1898, and 40\\% focus on the period between 1899 and the present day. Scoring For each of the multiple choice questions, students receive 1 point for every correct answer, lose of a point for each incorrect answer, and receive 0 points for questions left blank. This creates a raw score, which is then converted into a scaled score. The conversion between these numbers varies depending on the difficulty of a particular test administration. The scaled score is the only score reported to either students or colleges and ranges from 200 to 800, with 800 being the best possible score. The mean and standard deviation of the test scores in 2009 were 599 and 115, respectively. Preparation The College Board suggests as preparation for the test a year-long course in United States History at the college preparatory level. The test requires understanding of historical data and concepts, cause and effect relationships, geography, and the ability to effectively synthesize and interpret data from charts, maps, and other visual media. However, most questions from this test are derived from/similar to the AP US History Multiple Choice questions from 2014 and earlier (the 2015 exam has been revised). By taking an AP class, IB History of the Americas, or a class with similar rigor, the chances at doing well on this test are much improved.", "after_revision": "The SAT Subject Test in United States History was the name of a one-hour multiple choice test given on United States History by The College Board. A student chose whether to take the test depending upon college entrance requirements for the schools in which the student is planning to apply. Until 1994, the SAT Subject Tests were known as Achievement Tests; and from 1995 until January 2005, they were known as SAT IIs. Of all SAT subject tests, United States History was taken the second most, with 119,903 administrations in 2009. On January 19 2021, the College Board discontinued all SAT Subject tests, including the SAT Subject Test in Literature. This was effective immediately in the United States, and the tests were to be phased out by the following summer for international students.Nick Anderson, College Board is scrapping SAT\u2019s optional essay and subject tests, Washington Post (January 19, 2021). This was done as a response to changes in college admissions due to the impact of the COVID-19 pandemic on education. Format The test had 90 multiple choice questions that were to be answered in one hour. All questions had five answer choices. Students' scores were based entirely on their performance in answering the multiple choice questions. The questions covered a broad range of topics. Approximately 31\u201335\\% of questions focused on political history, 13\u201317\\% focused on economic history, 20\u201324\\% focused on social history, 13\u201317\\% focused on intellectual and cultural history, and 13\u201317\\% focused on foreign policy. The questions also varied with respect to time period; approximately 20\\% focused on the period of the Pre-Columbian era to 1789, 40\\% focused on the period between 1790 and 1898, and 40\\% focused on the period between 1899 and the present day. Scoring For each of the multiple choice questions, students received 1 point for every correct answer, lost of a point for each incorrect answer, and received 0 points for questions left blank. This created a raw score, which was then converted into a scaled score. The conversion between these numbers varied depending on the difficulty of a particular test administration. The scaled score was the only score reported to either students or colleges and ranges from 200 to 800, with 800 being the best possible score. The mean and standard deviation of the test scores in 2009 were 599 and 115, respectively. Preparation The College Board suggested as preparation for the test a year-long course in United States History at the college preparatory level. The test required understanding of historical data and concepts, cause and effect relationships, geography, and the ability to effectively synthesize and interpret data from charts, maps, and other visual media. However, most questions from this test were derived from/similar to the AP US History Multiple Choice questions from 2014 and earlier (the 2015 exam has been revised). By taking an AP class, IB History of the Americas, or a class with similar rigor, the chances at doing well on this test were much improved.", "edit_actions": [{"type": "R", "before": "is", "after": "was", "start_char_pos": 46, "end_char_pos": 48}, {"type": "R", "before": "chooses", "after": "chose", "start_char_pos": 156, "end_char_pos": 163}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 470, "end_char_pos": 472}, {"type": "A", "before": null, "after": "On January 19 2021, the College Board discontinued all SAT Subject tests, including the SAT Subject Test in Literature. This was effective immediately in the United States, and the tests were to be phased out by the following summer for international students.Nick Anderson, College Board is scrapping SAT\u2019s optional essay and subject tests, Washington Post (January 19, 2021). This was done as a response to changes in college admissions due to the impact of the COVID-19 pandemic on education.", "start_char_pos": 534, "end_char_pos": 534}, {"type": "R", "before": "has", "after": "had", "start_char_pos": 551, "end_char_pos": 554}, {"type": "R", "before": "are", "after": "were", "start_char_pos": 589, "end_char_pos": 592}, {"type": "R", "before": "have", "after": "had", "start_char_pos": 635, "end_char_pos": 639}, {"type": "R", "before": "are", "after": "were", "start_char_pos": 678, "end_char_pos": 681}, {"type": "R", "before": "cover", "after": "covered", "start_char_pos": 776, "end_char_pos": 781}, {"type": "R", "before": "focus", "after": "focused", "start_char_pos": 842, "end_char_pos": 847}, {"type": "R", "before": "focus", "after": "focused", "start_char_pos": 878, "end_char_pos": 883}, {"type": "R", "before": "focus", "after": "focused", "start_char_pos": 913, "end_char_pos": 918}, {"type": "R", "before": "focus", "after": "focused", "start_char_pos": 946, "end_char_pos": 951}, {"type": "R", "before": "focus", "after": "focused", "start_char_pos": 1002, "end_char_pos": 1007}, {"type": "R", "before": "vary", "after": "varied", "start_char_pos": 1046, "end_char_pos": 1050}, {"type": "R", "before": "focus on", "after": "focused on the", "start_char_pos": 1099, "end_char_pos": 1107}, {"type": "R", "before": "focus", "after": "focused", "start_char_pos": 1154, "end_char_pos": 1159}, {"type": "R", "before": "focus", "after": "focused", "start_char_pos": 1206, "end_char_pos": 1211}, {"type": "R", "before": "receive", "after": "received", "start_char_pos": 1320, "end_char_pos": 1327}, {"type": "R", "before": "lose", "after": "lost", "start_char_pos": 1362, "end_char_pos": 1366}, {"type": "R", "before": "receive", "after": "received", "start_char_pos": 1409, "end_char_pos": 1416}, {"type": "R", "before": "creates", "after": "created", "start_char_pos": 1457, "end_char_pos": 1464}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1484, "end_char_pos": 1486}, {"type": "R", "before": "varies", "after": "varied", "start_char_pos": 1560, "end_char_pos": 1566}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1649, "end_char_pos": 1651}, {"type": "R", "before": "suggests", "after": "suggested", "start_char_pos": 1896, "end_char_pos": 1904}, {"type": "R", "before": "requires", "after": "required", "start_char_pos": 2020, "end_char_pos": 2028}, {"type": "R", "before": "are", "after": "were", "start_char_pos": 2262, "end_char_pos": 2265}, {"type": "R", "before": "are", "after": "were", "start_char_pos": 2511, "end_char_pos": 2514}], "sents_char_pos": [0, 145, 292, 359, 421, 533, 620, 660, 761, 806, 1026, 1079, 1259, 1451, 1522, 1631, 1774, 1865, 2010, 2222, 2389]}
+{"doc_id": "11718498", "revision_depth": "1", "before_revision": "Spindrift (more rarely spoondrift) usually refers to spray, particularly to the spray blown from cresting waves during a gale. This spray, which \"drifts\" in the direction of the gale, is one of the characteristics of a wind speed of 8 Beaufort and higher at sea. In Great Britain \"spindrift \" is the telltale sign used by marinersto define a Force 8 (Beaufort Scale) wind (not higher) when observed at sea. See this example of information provided by Lymington Harbour authority, Hampshire, England, UK, explaining the whole scale, the associated wind speeds, and its telltale signs. Text from the site states: Force 8, defined as \"Gale\". Wind speed 39-46 mph, equal to 34-40 knots. Inland, twigs break off trees; progress generally impeded. At sea, moderately high waves of greater length; edges of crests begin to break into spindrift; foam is blown in well-marked streaks along the direction of the wind. Relatedly, spindrift can also be used to describe fine sand or snow that is blown off by the wind. Spindrift entry on Merriam Webster. Retrieved 20 July 2008. Spindrift is a southern English word, Spoondrift a northern or Scottish word. The Scottish word spoondrift can be used to describe fine snow that is blown off the hills by the wind. The Scottish Gaelic term for spindrift may also refer to sand blow. Some URL regard \"spoondrift\" as a direct alternative to \" spindrift \" in all its uses. In US Navyduring WWII there is evidence that spindrift and spoondrift were distinct terms used for different phenomenon. As the Captain of the USS Barb (SS-220) states on her 10th War Patrol: Visibility--which had been fair on the surface after moonrise--was now exceedingly poor due to spoondrift. Would that it were only the windblown froth of spindrift rather than the wind-driven cloudburst of water lashing the periscope exit eyepiece. This was a surprise feature I hadn't counted on. -Captain Eugene B. Fluckey In Greek and Roman mythology, Leucothea is considered the goddess of spindrift.See footnote 117 in Marcel Proust, In the Shadow of Young Girls in Flower, trans. James Grieve (New York: Penguin Books, 2002).%DIFDELCMD < %DIFDELCMD < %%% In popular culture The trans-orbital transport spacecraft in Irwin Allen's 1968 television series Land of the Giants was called Spindrift. The progressive rock band Rush references the phenomenon in the song Spindrift on their 2007 album Snakes and Arrows with lyrics that describe \" spray that's torn away\". Spindrift is mentioned as stinging the singers remaining eye in the opening lines of the Half-Man Half-Biscuit song \"National Shite URL References", "after_revision": "Spindrift (more rarely spoondrift) is the spray blown from cresting waves during a gale. This spray, which \"drifts\" in the direction of the gale, is one of the characteristics of a wind speed of 8 Beaufort and higher at sea. In the United Kingdom, spindrift is a mariners' sign for a force 8 gale on the Beaufort scale at sea. In Greek and Roman mythology, Leucothea was the goddess of spindrift.See footnote 117 in Marcel Proust, In the Shadow of Young Girls in Flower, trans. James Grieve (New York: Penguin Books, 2002). Terminology Spindrift is a southern English word, Spoondrift a northern or Scottish word. Spindrift or spoondrift is also a term for fine sand or snow that is blown off by the wind. Spindrift entry on Merriam Webster. Retrieved 20 July 2008. In the 1940s U.S. Navy, spindrift and spoondrift appear to have been used for different phenomena, as in the following record by the captain of the USS Barb (SS-220) : \"Visibility \u2013 which had been fair on the surface after moonrise \u2013 was now exceedingly poor due to spoondrift. Would that it were only the windblown froth of spindrift rather than the wind-driven cloudburst of water lashing the periscope exit eyepiece. %DIFDELCMD < %DIFDELCMD < %%% \" References", "edit_actions": [{"type": "R", "before": "usually refers to spray, particularly to", "after": "is", "start_char_pos": 35, "end_char_pos": 75}, {"type": "R", "before": "Great Britain \"spindrift \" is the telltale sign used by marinersto define a Force", "after": "the United Kingdom, spindrift is a mariners' sign for a force", "start_char_pos": 266, "end_char_pos": 347}, {"type": "R", "before": "(Beaufort Scale) wind (not higher) when observed", "after": "gale on the Beaufort scale", "start_char_pos": 350, "end_char_pos": 398}, {"type": "R", "before": "See this example of information provided by Lymington Harbour authority, Hampshire, England, UK, explaining the whole scale, the associated wind speeds, and its telltale signs. Text from the site states: Force 8, defined as \"Gale\". Wind speed 39-46 mph, equal to 34-40 knots. Inland, twigs break off trees; progress generally impeded. At sea, moderately high waves of greater length; edges of crests begin to break into spindrift; foam is blown in well-marked streaks along the direction of the wind.", "after": "In Greek and Roman mythology, Leucothea was the goddess of spindrift.See footnote 117 in Marcel Proust, In the Shadow of Young Girls in Flower, trans. James Grieve (New York: Penguin Books, 2002).", "start_char_pos": 407, "end_char_pos": 907}, {"type": "R", "before": "Relatedly, spindrift can also be used to describe fine sand or snow that is blown off by the wind. Spindrift entry on Merriam Webster. Retrieved 20 July 2008.", "after": "Terminology", "start_char_pos": 908, "end_char_pos": 1066}, {"type": "R", "before": "The Scottish word spoondrift can be used to describe fine", "after": "Spindrift or spoondrift is also a term for fine sand or", "start_char_pos": 1145, "end_char_pos": 1202}, {"type": "D", "before": "the hills", "after": null, "start_char_pos": 1226, "end_char_pos": 1235}, {"type": "R", "before": "The Scottish Gaelic term for spindrift may also refer to sand blow.", "after": "Spindrift entry on Merriam Webster. Retrieved 20 July 2008.", "start_char_pos": 1249, "end_char_pos": 1316}, {"type": "R", "before": "Some URL regard \"spoondrift\" as a direct alternative to \"", "after": "In the 1940s U.S. Navy,", "start_char_pos": 1317, "end_char_pos": 1374}, {"type": "D", "before": "\" in all its uses.", "after": null, "start_char_pos": 1385, "end_char_pos": 1403}, {"type": "D", "before": "In US Navyduring WWII there is evidence that spindrift", "after": null, "start_char_pos": 1404, "end_char_pos": 1458}, {"type": "R", "before": "were distinct terms", "after": "appear to have been", "start_char_pos": 1474, "end_char_pos": 1493}, {"type": "R", "before": "phenomenon. As the Captain", "after": "phenomena, as in the following record by the captain", "start_char_pos": 1513, "end_char_pos": 1539}, {"type": "R", "before": "states on her 10th War Patrol: Visibility--which", "after": ": \"Visibility \u2013 which", "start_char_pos": 1565, "end_char_pos": 1613}, {"type": "R", "before": "moonrise--was", "after": "moonrise \u2013 was", "start_char_pos": 1649, "end_char_pos": 1662}, {"type": "D", "before": "This was a surprise feature I hadn't counted on. -Captain Eugene B. Fluckey", "after": null, "start_char_pos": 1845, "end_char_pos": 1920}, {"type": "D", "before": "In Greek and Roman mythology, Leucothea is considered the goddess of spindrift.See footnote 117 in Marcel Proust, In the Shadow of Young Girls in Flower, trans. James Grieve (New York: Penguin Books, 2002).", "after": null, "start_char_pos": 1921, "end_char_pos": 2127}, {"type": "D", "before": "In popular culture The trans-orbital transport spacecraft in Irwin Allen's 1968 television series Land of the Giants was called Spindrift.", "after": null, "start_char_pos": 2157, "end_char_pos": 2295}, {"type": "D", "before": "The progressive rock band Rush references the phenomenon in the song Spindrift on their 2007 album Snakes and Arrows with lyrics that describe", "after": null, "start_char_pos": 2296, "end_char_pos": 2438}, {"type": "D", "before": "spray that's torn away\".", "after": null, "start_char_pos": 2441, "end_char_pos": 2465}, {"type": "D", "before": "Spindrift is mentioned as stinging the singers remaining eye in the opening lines of the Half-Man Half-Biscuit song \"National Shite URL", "after": null, "start_char_pos": 2466, "end_char_pos": 2601}], "sents_char_pos": [0, 126, 262, 406, 583, 638, 682, 713, 741, 790, 837, 907, 1006, 1042, 1066, 1144, 1248, 1316, 1403, 1524, 1702, 1844, 1912, 2000, 2081, 2127, 2295, 2465]}
+{"doc_id": "11768841", "revision_depth": "1", "before_revision": "Modupe Ozolua (born October 10 , 1973 in Benin City, Nigeria) is an American-Nigerian philanthropist and entrepreneur. She is the former CEO of Body Enhancement Ltd, and is currently operating as the Founding President of Empower 54 Project Initiatives (Empower 54) formerly known as Body Enhancement Annual Reconstructive Surgery (BEARS) Foundation. Early life and education A direct descendant of the Oba (King) Ozolua of the Benin Kingdom, Edo State, Nigeria , . Modupe Ozien Ozolua is the youngest of four siblings born to Prince Julius I. Ozolua, an educationist, and Princess Olua Mary S. Ozolua (n\u00e9e Otaru), a Princess and entrepreneur from Ososo, Akoko-Edo LGA, Edo State. Her name \"Modupe\" means \"I thank you\" in Yoruba. She grew up in the Royal House of the Benin Kingdom where her great grandfather Oba Ozolua was the legendary Benin warrior King . Princess studied Business Management in California, USA. At Southwestern College, she was inducted into the Alpha Pi Epsilon, chapter of Phi Theta Kappa and recognized as an outstanding student by the Southwestern Dean's Honorary List and the National Dean's List (1994 - 1995). Personal life Princess Modupe Ozolua has a son - Prince Oluwaseun Ozolua-Osunbade - and shuffles between Nigeria and Atlanta. Career Princess Modupe Ozolua returned to Nigeria in 2001, and founded Body Enhancements Ltd - a cosmetic surgery company - the very first of its kind in West Africa. Despite all the challenges of having a controversial service in a very traditional African country, Body Enhancement Ltd revolutionized the beauty and health sectors in Nigeria. Princess Modupe used the platform her business provided her to educate about the safety of plastic surgery, breaking prevalent myths of the time. In 2003, she founded Empower 54 ( formerly known as Body Enhancement Foundation, or Body Enhancement Annual Reconstructive Surgery (BEARS) ) , an international humanitarian organization dedicated to providing desperately needed humanitarian assistance such as medical missions, hunger eradication, education, women/girl empowerment and refugee programs to underprivileged Africans. His Emeritus Archbishop Desmond Tutu is the Patron for Empower 54. All humanitarian aid rendered through Empower 54 is free to the beneficiaries. Under the leadershipof Princess Modupe , Empower 54's \u2019 Rise Above Terror \u2019 initiative has been active in rehabilitating women and children survivors of the terrorist group Boko Haram in Nigeria, through self-employment and education for the children at the IDP camps. Princess Modupe personally leads the Empower 54 team into communities attacked by Boko Haram in remote parts of North East Nigeria to help survivors of terrorist attacks. During one of the foundation's missions, she discovered the extremely malnourished children rescued from Boko Haram's captivity and facilitated the collaboration between Empower 54 and the Borno State Government in evacuating them to Maiduguri for urgent CMAM treatment. 1,500 extremely malnourished children were evacuated from Bama, along with their families. Projects %DIFDELCMD < %DIFDELCMD < %%% Provision of Vitamin A and Albendazol medication for 5 Million children in the Oil producing states of the Niger Delta , Nigeria (February 2018) Provision of Vitamin A and Albendazol medication for 620,000 children in Province du Mai-Ndombe, RDC (September 2017) Donation of paint and computers to schools in Province du Mai-Ndombe, RDC (May 2017) Establishment of small-scale Ready-To-Use-Therapeutic-Foods (RUTF) production facility in Abuja, Nigeria(March 2017) Donation of 40 feet container of medication and nutritional meals to IDPs, Borno State, Nigeria(January 2017) Evacuation of extremely malnourished children from Bama, Borno State, Nigeria . (June 2016) Building of 2 classrooms for IDP children, Bakasi IDP camp, Maiduguri (June 2016) Empower 54 Annual African Art Gala, Atlanta, GA (April 30, 2016) Rise Above Terror..What Happens Next? Abuja, Nigeria (October 9, 2015 ) Malkoi Camp NYSC Camp, Adamawa State, Nigeria. (September 2015 ) Government Junior Secondary School (GJSS) renovation of schools destroyed by Boko Haram in Uba, Adamawa State (July 2015 ) Adamawa, Gombe and Borno States: Inspection of communities destroyed by Boko Haram (May/June 2015) Adamawa and Borno States: E54's RISE caps pilot scheme (April 2015) Adamawa State: Establishment of school at IDP camp (February 2015) Gombe State: Rehabilitation of Internally Displaced Persons (IDPs) in Gombe State, North East Nigeria (February 2015) Free medical missions in Ethiopia, Mali, Niger Republic and Zambia (2010 till Present) Tabora, Tanzania: Medical Mission (2007) Kwara State, Nigeria : Free National Medical Mission (2006) Niger Delta, Nigeria: Reconstructive Surgery for underprivileged children(2005) Edo State, Nigeria : Reconstructive surgery of Victims of contaminated kerosene explosions (2004) Niger Delta, Nigeria : Reconstructive Surgery for underprivileged children (2004) Niger Delta and Kano State: Bringing Hope to Nigerian Children Suffering From Birth Defects (2003 ) Awards %DIFDELCMD < %DIFDELCMD < %%% Award of Excellence Obafemi Awolowo University, Moremi Hall Executive Council, Ile-ife . Beautician of the Year 5th City People Award for Excellence Excellence in Enterprise Award Dr Kwame Nkrumah International Award, Ghana Female Achiever of the Year, (2001) City People Award, Nigeria Humanitarian Service Award Rotaract Club of Nigeria (Rotary International) Merit Award Lagos State Aids Control Agency Governor's Office (LSACA), Outstanding Nigerian Woman, Nigerian Women's Award, 5th Annual Ceremony Young Manager of the Year (2005), Nomination ThisDay Newspaper , Nigeria SheRose Awards (2018) SheRose, Ireland", "after_revision": "Modupe Ozolua (born 10 October 1973 , in Benin City, Nigeria) is an American-Nigerian philanthropist and entrepreneur. She is the former CEO of Body Enhancement Ltd, and is the founding president of Empower 54 Project Initiatives (Empower 54) formerly known as Body Enhancement Annual Reconstructive Surgery (BEARS) Foundation. Early life and education Ozolua is a direct descendant of the Oba (King) Ozolua of the Benin Kingdom, Edo State, Nigeria . Ozolua is the youngest of four siblings born to Prince Julius I. Ozolua, an educationist, and Princess Olua Mary S. Ozolua (n\u00e9e Otaru), a princess and entrepreneur from Ososo, Akoko-Edo LGA, Edo State. Her name \"Modupe\" means \"I thank you\" in Yoruba. She grew up in the Royal House of the Benin Kingdom where her great grandfather Oba Ozolua was the legendary Benin warrior king . Ozolua studied business management in California, USA. At Southwestern College, she was inducted into the Alpha Pi Epsilon, chapter of Phi Theta Kappa and recognized as an outstanding student by the Southwestern Dean's Honorary List and the National Dean's List (1994 - 1995). Personal life Ozolua has a son , Prince Oluwaseun Ozolua-Osunbade , and moves between Nigeria and Atlanta. Career Ozolua returned to Nigeria in 2001, and founded Body Enhancements Ltd , a cosmetic surgery company and the first of its kind in West Africa. Despite the challenges of having a controversial service in a very traditional African country, Body Enhancement Ltd revolutionized the beauty and health sectors in Nigeria. Ozolua used the platform that her business provided to educate about the safety of plastic surgery, breaking prevalent myths of the time. In 2003, she founded Empower 54 , formerly known as Body Enhancement Foundation, or Body Enhancement Annual Reconstructive Surgery (BEARS) , an international humanitarian organization dedicated to providing humanitarian assistance such as medical missions, hunger eradication, education, female empowerment and refugee programs to underprivileged Africans. Archbishop Desmond Tutu is a patron of Empower 54. All humanitarian aid rendered through Empower 54 is free to the beneficiaries. Under Ozolua's leadership , Empower 54's \" Rise Above Terror \" initiative has been active in rehabilitating women and children survivors of the Boko Haram terrorist group in Nigeria, through self-employment and education for the children at the IDP camps. Ozolua personally leads the Empower 54 team into communities attacked by Boko Haram in remote parts of North East Nigeria to help survivors of terrorist attacks. During one of the foundation's missions, she discovered the extremely malnourished children rescued from Boko Haram's captivity and facilitated the collaboration between Empower 54 and the Borno State Government in evacuating them to Maiduguri for urgent CMAM treatment. 1,500 children were evacuated from Bama, along with their families. Projects %DIFDELCMD < %DIFDELCMD < %%% Niger Delta and Kano State: Bringing Hope to Nigerian Children Suffering From Birth Defects (2003) Edo State, Nigeria: Reconstructive surgery of victims of contaminated kerosene explosions (2004) Niger Delta, Nigeria: Reconstructive Surgery for underprivileged children (2004) Niger Delta, Nigeria: Reconstructive surgery for underprivileged children (2005) Kwara State, Nigeria : Free National Medical Mission (2006) Tabora, Tanzania: Medical Mission (2007) Free medical missions in Ethiopia, Mali, Niger Republic and Zambia (2010 to present) Adamawa State: Establishment of school at IDP camp (February 2015 ) Gombe State: Rehabilitation of Internally Displaced Persons (IDPs) in Gombe State, North East Nigeria ( February 2015 ) Adamawa and Borno States: E54's RISE caps pilot scheme (April 2015 ) Adamawa, Gombe and Borno States: Inspection of communities destroyed by Boko Haram (May/June 2015) Government Junior Secondary School (GJSS) renovation of schools destroyed by Boko Haram in Uba, Adamawa State (July 2015) Malkoi Camp NYSC Camp, Adamawa State, Nigeria (September 2015) Rise Above Terror..What Happens Next? Abuja, Nigeria (9 October 2015) Empower 54 Annual African Art Gala, Atlanta, Georgia (30 April 2016) Evacuation of extremely malnourished children from Bama, Borno State, Nigeria . (June 2016) Building of two classrooms for IDP children, Bakasi IDP camp, Maiduguri (June 2016) Donation of 40 foot container of medication and nutritional meals to IDPs, Borno State, Nigeria (January 2017) Establishment of small-scale Ready-To-Use-Therapeutic-Food (RUTF) production facility in Abuja, Nigeria (March 2017) Donation of paint and computers to schools in Mai-Ndombe Province, Democratic Republic of the Congo (May 2017) Provision of Vitamin A and Albendazol medication for 620,000 children in Mai-Ndombe Province (September 2017) Provision of Vitamin A and Albendazol medication for 5 million children in the oil producing states of the Niger Delta, Nigeria (February 2018 ) Awards %DIFDELCMD < %DIFDELCMD < %%% Award of Excellence Obafemi Awolowo University, Moremi Hall Executive Council, Ile-ife Beautician of the Year 5th City People Award for Excellence Excellence in Enterprise Award Dr Kwame Nkrumah International Award, Ghana Female Achiever of the Year, (2001) City People Award, Nigeria Humanitarian Service Award Rotaract Club of Nigeria (Rotary International) Merit Award Lagos State Aids Control Agency Governor's Office (LSACA), Outstanding Nigerian Woman, Nigerian Women's Award, 5th Annual Ceremony Young Manager of the Year (2005), Nomination This Day newspaper , Nigeria SheRose Awards (2018) SheRose, Ireland", "edit_actions": [{"type": "D", "before": "October", "after": null, "start_char_pos": 20, "end_char_pos": 27}, {"type": "R", "before": ",", "after": "October", "start_char_pos": 31, "end_char_pos": 32}, {"type": "A", "before": null, "after": ",", "start_char_pos": 38, "end_char_pos": 38}, {"type": "R", "before": "currently operating as the Founding President", "after": "the founding president", "start_char_pos": 174, "end_char_pos": 219}, {"type": "R", "before": "A", "after": "Ozolua is a", "start_char_pos": 377, "end_char_pos": 378}, {"type": "R", "before": ", . Modupe Ozien", "after": ".", "start_char_pos": 463, "end_char_pos": 479}, {"type": "R", "before": "Princess", "after": "princess", "start_char_pos": 618, "end_char_pos": 626}, {"type": "R", "before": "King", "after": "king", "start_char_pos": 854, "end_char_pos": 858}, {"type": "R", "before": "Princess studied Business Management", "after": "Ozolua studied business management", "start_char_pos": 861, "end_char_pos": 897}, {"type": "D", "before": "Princess Modupe", "after": null, "start_char_pos": 1154, "end_char_pos": 1169}, {"type": "R", "before": "-", "after": ",", "start_char_pos": 1187, "end_char_pos": 1188}, {"type": "R", "before": "- and shuffles", "after": ", and moves", "start_char_pos": 1222, "end_char_pos": 1236}, {"type": "D", "before": "Princess Modupe", "after": null, "start_char_pos": 1273, "end_char_pos": 1288}, {"type": "R", "before": "-", "after": ",", "start_char_pos": 1359, "end_char_pos": 1360}, {"type": "R", "before": "- the very", "after": "and the", "start_char_pos": 1388, "end_char_pos": 1398}, {"type": "D", "before": "all", "after": null, "start_char_pos": 1441, "end_char_pos": 1444}, {"type": "R", "before": "Princess Modupe", "after": "Ozolua", "start_char_pos": 1611, "end_char_pos": 1626}, {"type": "A", "before": null, "after": "that", "start_char_pos": 1645, "end_char_pos": 1645}, {"type": "D", "before": "her", "after": null, "start_char_pos": 1668, "end_char_pos": 1671}, {"type": "R", "before": "(", "after": ",", "start_char_pos": 1790, "end_char_pos": 1791}, {"type": "D", "before": ")", "after": null, "start_char_pos": 1897, "end_char_pos": 1898}, {"type": "D", "before": "desperately needed", "after": null, "start_char_pos": 1967, "end_char_pos": 1985}, {"type": "R", "before": "women/girl", "after": "female", "start_char_pos": 2067, "end_char_pos": 2077}, {"type": "D", "before": "His Emeritus", "after": null, "start_char_pos": 2140, "end_char_pos": 2152}, {"type": "R", "before": "the Patron for", "after": "a patron of", "start_char_pos": 2180, "end_char_pos": 2194}, {"type": "R", "before": "the leadershipof Princess Modupe", "after": "Ozolua's leadership", "start_char_pos": 2292, "end_char_pos": 2324}, {"type": "R", "before": "\u2019", "after": "\"", "start_char_pos": 2340, "end_char_pos": 2341}, {"type": "R", "before": "\u2019", "after": "\"", "start_char_pos": 2360, "end_char_pos": 2361}, {"type": "R", "before": "terrorist group Boko Haram", "after": "Boko Haram terrorist group", "start_char_pos": 2443, "end_char_pos": 2469}, {"type": "R", "before": "Princess Modupe", "after": "Ozolua", "start_char_pos": 2555, "end_char_pos": 2570}, {"type": "D", "before": "extremely malnourished", "after": null, "start_char_pos": 3003, "end_char_pos": 3025}, {"type": "R", "before": "Provision of Vitamin A and Albendazol medication for 5 Million children in the Oil producing states of the Niger Delta , Nigeria (February 2018) Provision of Vitamin A and Albendazol medication for 620,000 children in Province du Mai-Ndombe, RDC (September 2017) Donation of paint and computers to schools in Province du Mai-Ndombe, RDC (May 2017) Establishment of small-scale Ready-To-Use-Therapeutic-Foods (RUTF) production facility in Abuja, Nigeria(March 2017) Donation of 40 feet container of medication and nutritional meals to IDPs, Borno State, Nigeria(January 2017) Evacuation of extremely malnourished children from Bama, Borno", "after": "Niger Delta and Kano State: Bringing Hope to Nigerian Children Suffering From Birth Defects (2003) Edo State, Nigeria: Reconstructive surgery of victims of contaminated kerosene explosions (2004) Niger Delta, Nigeria: Reconstructive Surgery for underprivileged children (2004) Niger Delta, Nigeria: Reconstructive surgery for underprivileged children (2005) Kwara", "start_char_pos": 3127, "end_char_pos": 3764}, {"type": "R", "before": ". (June 2016) Building of 2 classrooms for IDP children, Bakasi IDP camp, Maiduguri (June 2016) Empower 54 Annual African Art Gala, Atlanta, GA (April 30, 2016) Rise Above Terror..What Happens Next? Abuja, Nigeria (October 9,", "after": ": Free National Medical Mission (2006) Tabora, Tanzania: Medical Mission (2007) Free medical missions in Ethiopia, Mali, Niger Republic and Zambia (2010 to present) Adamawa State: Establishment of school at IDP camp (February", "start_char_pos": 3780, "end_char_pos": 4005}, {"type": "D", "before": ") Malkoi Camp", "after": null, "start_char_pos": 4011, "end_char_pos": 4024}, {"type": "D", "before": "NYSC Camp, Adamawa State, Nigeria. (September 2015", "after": null, "start_char_pos": 4025, "end_char_pos": 4075}, {"type": "R", "before": "Government Junior Secondary School (GJSS) renovation of schools destroyed by Boko Haram in Uba, Adamawa State (July", "after": "Gombe State: Rehabilitation of Internally Displaced Persons (IDPs) in Gombe State, North East Nigeria ( February", "start_char_pos": 4078, "end_char_pos": 4193}, {"type": "A", "before": null, "after": ") Adamawa and Borno States: E54's RISE caps pilot scheme (April 2015", "start_char_pos": 4199, "end_char_pos": 4199}, {"type": "R", "before": "Adamawa and Borno States: E54's RISE caps pilot scheme (April 2015) Adamawa State: Establishment of school at IDP camp (February", "after": "Government Junior Secondary School (GJSS) renovation of schools destroyed by Boko Haram in Uba, Adamawa State (July", "start_char_pos": 4301, "end_char_pos": 4429}, {"type": "R", "before": "Gombe State: Rehabilitation of Internally Displaced Persons (IDPs) in Gombe State, North East Nigeria (February", "after": "Malkoi Camp", "start_char_pos": 4436, "end_char_pos": 4547}, {"type": "A", "before": null, "after": "NYSC Camp, Adamawa State, Nigeria (September 2015) Rise Above Terror..What Happens Next? Abuja, Nigeria (9 October", "start_char_pos": 4548, "end_char_pos": 4548}, {"type": "R", "before": "Free medical missions in Ethiopia, Mali, Niger Republic and Zambia (2010 till Present) Tabora, Tanzania: Medical Mission (2007) Kwara", "after": "Empower 54 Annual African Art Gala, Atlanta, Georgia (30 April 2016) Evacuation of extremely malnourished children from Bama, Borno", "start_char_pos": 4555, "end_char_pos": 4688}, {"type": "R", "before": ": Free National Medical Mission (2006) Niger Delta, Nigeria: Reconstructive Surgery for underprivileged children(2005) Edo", "after": ". (June 2016) Building of two classrooms for IDP children, Bakasi IDP camp, Maiduguri (June 2016) Donation of 40 foot container of medication and nutritional meals to IDPs, Borno", "start_char_pos": 4704, "end_char_pos": 4826}, {"type": "R", "before": ": Reconstructive surgery of Victims of contaminated kerosene explosions (2004) Niger Delta, Nigeria : Reconstructive Surgery for underprivileged children (2004) Niger Delta and Kano State: Bringing Hope to Nigerian Children Suffering From Birth Defects (2003", "after": "(January 2017) Establishment of small-scale Ready-To-Use-Therapeutic-Food (RUTF) production facility in Abuja, Nigeria (March 2017) Donation of paint and computers to schools in Mai-Ndombe Province, Democratic Republic of the Congo (May 2017) Provision of Vitamin A and Albendazol medication for 620,000 children in Mai-Ndombe Province (September 2017) Provision of Vitamin A and Albendazol medication for 5 million children in the oil producing states of the Niger Delta, Nigeria (February 2018", "start_char_pos": 4842, "end_char_pos": 5100}, {"type": "D", "before": ".", "after": null, "start_char_pos": 5227, "end_char_pos": 5228}, {"type": "R", "before": "ThisDay Newspaper", "after": "This Day newspaper", "start_char_pos": 5690, "end_char_pos": 5707}], "sents_char_pos": [0, 119, 351, 681, 730, 1139, 1265, 1432, 1610, 1757, 2139, 2206, 2285, 2554, 2725, 2996, 3087, 3271, 3389, 3474, 3960, 3978, 4059, 4234, 4326, 4383, 4448, 4659, 4705, 4764, 4843, 4943, 5030, 5399]}
+{"doc_id": "12139197", "revision_depth": "1", "before_revision": "A transfer DNA (T-DNA) binary system is a pair of plasmids consisting of a binary plasmid and a helper plasmid. The two plasmids are used together (thus binaryHoekema, A., Hirsch, P. R., Hooykaas, P. J. J., Schilperoort, R. A. (1983). A binaryplant vector strategy based on separation of vir- and T-region of the Agrobacterium tumefaciens Ti-plasmid. \"As I remember, the \"binary\" refers to the function of interest being divided into two parts encoded by two separate plasmids rather than two bacterial hosts: we used the term \"shuttle vectors\" to refer to the multiple host property.\" (P. R. Hirsch, personal communication to T. Toal, Feb 27, 2013)) to produce genetically modified plants. They are artificial vectors that have both been created from the naturally occurring Ti plasmid found in Agrobacterium tumefaciens. The binary vector is a shuttle vector, so-called because it is able to replicate in multiple hosts (E. coli and Agrobacterium tumefaciens ). Systems in which T-DNA and vir genes are located on separate replicons are called T-DNA binary systems. T-DNA is located on the binary vector (the non-T-DNA region of this vector containing origin(s) of replication that could function both in E. coli and in Agrobacteriumtumefaciens , and antibiotic resistance genes used to select for the presence of the binary vector in bacteria, became known as vector backbone sequences). The replicon containing the vir genes became known as the vir helper . Strains harboring this replicon and a T-DNA are considered disarmed if they do not contain oncogenes that could be transferred to a plant. There are several binary vector systems that differ mainly in the plasmid region that facilitates replication in Agrobacterium . Commonly used binary vectors include: pBIN19 pPVP pGreen%DIFDELCMD < %DIFDELCMD < %%% Common Helper plasmids include EHA101 Plasmid structure%DIFDELCMD < %DIFDELCMD < %%% Binary plasmid The T-DNA portion of the binary plasmid is flanked by left and right border sequences and consists of a transgene as well as a plant selectable marker (PSM) . Outside of the T-DNA, the binary plasmid also contains a bacterial selectable marker (BSM) and an origin of replication (ori) for bacteria.Slater, Adrian; Scott, Nigel; Fowler, Mark (2008). Plant Biotechnology the genetic manipulation of plants. Oxford University Press Inc., New York. Helper plasmid The helper plasmid contains the vir genes that originated from the Ti plasmid of Agrobacterium. These genes code for a series of proteins that cut the binary plasmid at the left and right border sequences, and facilitate transduction of the T-DNA to the host plant's cells . The helper plasmid also contains a BSM and an ori for bacteria. Development of binary vector The pBIN19 plasmid was developed in the 1980s and is one of the first and most widely used binary vector plasmids. The pGREEN plasmid , which was developed in 2000, is a newer version of the binary vector that allows for a choice of promoters, selectable markers and reporter genes. Another distinguishing feature of the pGREEN plasmid is its large reduction in size (from about 11,7kbp to 4,6kbp) from pBIN19, therefore increasing its transformation efficiency Along with higher transformation efficiency, pGREEN has been engineered to ensure transformation integrity. Both pBIN19 and pGREEN usually use the same selectable marker nptII, but pBIN19 has the selectable marker next to the right border, while pGREEN has it close to the left border. Due to a polarity difference in the left and right borders, the right border of the T-DNA enters the host plant first. If the selectable maker is near the right border (as is the case with pBIN19) and the transformation process is interrupted, the resulting plant may have expression of a selectable marker but contain no T-DNA giving a false positive. The pGREEN plasmid has the selectable marker entering the host last (due to its location next to the left border) so any expression of the marker will result in full transgene integration. Notes References T-DNA Binary Vectors and Systems Lan-Ying Lee and Stanton B. Gelvin* Department of Biological Sciences, Purdue University, West Lafayette, Indiana 47907\u20131392 Category:Genetics Category: Biotechnolo", "after_revision": "A transfer DNA (T-DNA) binary system is a pair of plasmids consisting of a T-DNA binary vector and a vir helper plasmid. The two plasmids are used together (thus binary \"As I remember, the \"binary\" refers to the function of interest being divided into two parts encoded by two separate plasmids rather than two bacterial hosts: we used the term \"shuttle vectors\" to refer to the multiple host property.\" (P. R. Hirsch, personal communication to T. Toal, Feb 27, 2013)) to produce genetically modified plants. They are artificial vectors that have been derived from the naturally occurring Ti plasmid found in bacterial species of the genus Agrobacterium, such as A. tumefaciens. The binary vector is a shuttle vector, so-called because it is able to replicate in multiple hosts (E. coli and Agrobacterium ). Systems in which T-DNA and vir genes are located on separate replicons are called T-DNA binary systems. T-DNA is located on the binary vector (the non-T-DNA region of this vector containing origin(s) of replication that could function both in E. coli and Agrobacterium , and antibiotic resistance genes used to select for the presence of the binary vector in bacteria, became known as vector backbone sequences). The replicon containing the vir genes became known as the vir helper plasmid. The vir helper plasmid is considered disarmed if it does not contain oncogenes that could be transferred to a plant. Binary system components T-DNA binary vector There are several binary %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% vectors that replicate in Agrobacterium and can be used for delivery of T-DNA from Agrobacterium into plant cells. The T-DNA portion of the binary vector is flanked by left and right border sequences and may include a transgene as well as a plant selectable marker . Outside of the T-DNA, the binary vector also contains a bacterial selectable marker and an origin of replication (ori) for bacteria.Slater, Adrian; Scott, Nigel; Fowler, Mark (2008). Plant Biotechnology the genetic manipulation of plants. Oxford University Press Inc., New York. Representative series of binary vectors are listed below. +Main series of T-DNA binary vectorsSeriesVectorYearGenBank accessionSize (bp)Autonomous replication in AgrobacteriumReferencepBINpBIN191984U0936511777YespPVPpPZP2001994U104606741YespCBpCB3011999AF1390613574YespCAMBIApCAMBIA-13002000AF2342968958YespGreenpGreen00002000AJ0078293228NopLSUpLSU-12012HQ6085214566YespLXpLX-B22017KY8251373287Yes Vir helper plasmid The vir helper plasmid contains the vir genes that originated from the Ti plasmid of Agrobacterium. These genes code for a series of proteins that cut the binary vector at the left and right border sequences, and facilitate transfer and integration of T-DNA to the plant's cells and genomes, respectively. Several vir helper plasmids have been reported, and common Agrobacterium strains that include vir helper plasmids are: EHA101 EHA105 AGL-1 LBA4404 GV2260 Development of T-DNA binary vectors The pBIN19 vector was developed in the 1980s and is one of the first and most widely used binary vectors. The pGreen vector , which was developed in 2000, is a newer version of the binary vector that allows for a choice of promoters, selectable markers and reporter genes. Another distinguishing feature of pGreen is its large reduction in size (from about 11,7kbp to 4,6kbp) from pBIN19, therefore increasing its transformation efficiency . Along with higher transformation efficiency, pGreen has been engineered to ensure transformation integrity. Both pBIN19 and pGreen usually use the same selectable marker nptII, but pBIN19 has the selectable marker next to the right border, while pGreen has it close to the left border. Due to a polarity difference in the left and right borders, the right border of the T-DNA enters the host plant first. If the selectable maker is near the right border (as is the case with pBIN19) and the transformation process is interrupted, the resulting plant may have expression of a selectable marker but contain no T-DNA giving a false positive. The pGreen vector has the selectable marker entering the host last (due to its location next to the left border) so any expression of the marker will result in full transgene integration. The pGreen-based vectors are not autonomous and they will not replicate in Agrobacterium if pSoup is not present. Series of small binary vectors that autonomously replicate in E. coli and Agrobacterium include: pCB pLSU pLX References Category:Genetics Category: Biotechnology Category:Synthetic biolo", "edit_actions": [{"type": "R", "before": "binary plasmid and a", "after": "T-DNA binary vector and a vir", "start_char_pos": 75, "end_char_pos": 95}, {"type": "D", "before": "binaryHoekema, A., Hirsch, P. R., Hooykaas, P. J. J.,", "after": null, "start_char_pos": 153, "end_char_pos": 206}, {"type": "R", "before": "Schilperoort, R. A. (1983). A binaryplant vector strategy based on separation of vir- and T-region of the Agrobacterium tumefaciens Ti-plasmid.", "after": "binary", "start_char_pos": 207, "end_char_pos": 350}, {"type": "R", "before": "both been created", "after": "been derived", "start_char_pos": 729, "end_char_pos": 746}, {"type": "R", "before": "Agrobacterium", "after": "bacterial species of the genus Agrobacterium, such as A.", "start_char_pos": 796, "end_char_pos": 809}, {"type": "D", "before": "tumefaciens", "after": null, "start_char_pos": 949, "end_char_pos": 960}, {"type": "R", "before": "in Agrobacteriumtumefaciens", "after": "Agrobacterium", "start_char_pos": 1219, "end_char_pos": 1246}, {"type": "R", "before": ". Strains harboring this replicon and a T-DNA are", "after": "plasmid. The vir helper plasmid is", "start_char_pos": 1460, "end_char_pos": 1509}, {"type": "R", "before": "they do", "after": "it does", "start_char_pos": 1533, "end_char_pos": 1540}, {"type": "A", "before": null, "after": "Binary system components", "start_char_pos": 1601, "end_char_pos": 1601}, {"type": "A", "before": null, "after": "T-DNA binary vector", "start_char_pos": 1602, "end_char_pos": 1602}, {"type": "D", "before": "vector systems that differ mainly in the plasmid region that facilitates replication in Agrobacterium . Commonly used binary vectors include:", "after": null, "start_char_pos": 1628, "end_char_pos": 1769}, {"type": "D", "before": "pBIN19 pPVP pGreen", "after": null, "start_char_pos": 1770, "end_char_pos": 1788}, {"type": "D", "before": "Common Helper plasmids include EHA101", "after": null, "start_char_pos": 1818, "end_char_pos": 1855}, {"type": "D", "before": "Plasmid structure", "after": null, "start_char_pos": 1856, "end_char_pos": 1873}, {"type": "R", "before": "Binary plasmid", "after": "vectors that replicate in Agrobacterium and can be used for delivery of T-DNA from Agrobacterium into plant cells.", "start_char_pos": 1903, "end_char_pos": 1917}, {"type": "R", "before": "plasmid", "after": "vector", "start_char_pos": 1950, "end_char_pos": 1957}, {"type": "R", "before": "consists of", "after": "may include", "start_char_pos": 2008, "end_char_pos": 2019}, {"type": "D", "before": "(PSM)", "after": null, "start_char_pos": 2069, "end_char_pos": 2074}, {"type": "R", "before": "plasmid", "after": "vector", "start_char_pos": 2110, "end_char_pos": 2117}, {"type": "D", "before": "(BSM)", "after": null, "start_char_pos": 2162, "end_char_pos": 2167}, {"type": "R", "before": "Helper", "after": "Representative series of binary vectors are listed below. +Main series of T-DNA binary vectorsSeriesVectorYearGenBank accessionSize (bp)Autonomous replication in AgrobacteriumReferencepBINpBIN191984U0936511777YespPVPpPZP2001994U104606741YespCBpCB3011999AF1390613574YespCAMBIApCAMBIA-13002000AF2342968958YespGreenpGreen00002000AJ0078293228NopLSUpLSU-12012HQ6085214566YespLXpLX-B22017KY8251373287Yes Vir helper", "start_char_pos": 2363, "end_char_pos": 2369}, {"type": "A", "before": null, "after": "vir", "start_char_pos": 2382, "end_char_pos": 2382}, {"type": "R", "before": "plasmid", "after": "vector", "start_char_pos": 2537, "end_char_pos": 2544}, {"type": "R", "before": "transduction of the", "after": "transfer and integration of", "start_char_pos": 2600, "end_char_pos": 2619}, {"type": "D", "before": "host", "after": null, "start_char_pos": 2633, "end_char_pos": 2637}, {"type": "R", "before": ". The helper plasmid also contains a BSM and an ori for bacteria.", "after": "and genomes, respectively.", "start_char_pos": 2652, "end_char_pos": 2717}, {"type": "A", "before": null, "after": "Several vir helper plasmids have been reported, and common Agrobacterium strains that include vir helper plasmids are: EHA101 EHA105 AGL-1 LBA4404 GV2260", "start_char_pos": 2718, "end_char_pos": 2718}, {"type": "R", "before": "binary vector", "after": "T-DNA binary vectors", "start_char_pos": 2734, "end_char_pos": 2747}, {"type": "R", "before": "plasmid", "after": "vector", "start_char_pos": 2759, "end_char_pos": 2766}, {"type": "R", "before": "vector plasmids. The pGREEN plasmid", "after": "vectors. The pGreen vector", "start_char_pos": 2846, "end_char_pos": 2881}, {"type": "R", "before": "the pGREEN plasmid", "after": "pGreen", "start_char_pos": 3065, "end_char_pos": 3083}, {"type": "A", "before": null, "after": ".", "start_char_pos": 3210, "end_char_pos": 3210}, {"type": "R", "before": "pGREEN", "after": "pGreen", "start_char_pos": 3256, "end_char_pos": 3262}, {"type": "R", "before": "pGREEN", "after": "pGreen", "start_char_pos": 3335, "end_char_pos": 3341}, {"type": "R", "before": "pGREEN", "after": "pGreen", "start_char_pos": 3457, "end_char_pos": 3463}, {"type": "R", "before": "pGREEN plasmid", "after": "pGreen vector", "start_char_pos": 3854, "end_char_pos": 3868}, {"type": "R", "before": "Notes", "after": "The pGreen-based vectors are not autonomous and they will not replicate in Agrobacterium if pSoup is not present. Series of small binary vectors that autonomously replicate in E. coli and Agrobacterium include:", "start_char_pos": 4039, "end_char_pos": 4044}, {"type": "A", "before": null, "after": "pCB pLSU pLX", "start_char_pos": 4045, "end_char_pos": 4045}, {"type": "D", "before": "T-DNA Binary Vectors and Systems Lan-Ying Lee and Stanton B. Gelvin* Department of Biological Sciences, Purdue University, West Lafayette, Indiana 47907\u20131392", "after": null, "start_char_pos": 4057, "end_char_pos": 4214}, {"type": "R", "before": "Biotechnolo", "after": "Biotechnology Category:Synthetic biolo", "start_char_pos": 4243, "end_char_pos": 4254}], "sents_char_pos": [0, 111, 234, 350, 629, 690, 822, 963, 1067, 1390, 1600, 1731, 2216, 2231, 2245, 2266, 2322, 2362, 2474, 2653, 2717, 2862, 3030, 3318, 3496, 3615, 3849, 4038]}
+{"doc_id": "1220148", "revision_depth": "2", "before_revision": "On October 21, 1983, while he was imprisoned for two unrelated murders, Toole confessed to the 1981 murder of six-year-old Adam Walsh. A few weeks after Toole made the confession, however, police investigating the case announced that they had lost Toole's impounded car and machete. John Walsh, Adam's father, continued to maintain that he believed Toole to be guilty.[ On December 16, 2008, 27 years after the 1981 murder Hollywood, Florida, police announced Toole as the murderer, and the Adam Walsh case was closed. The police did not reveal any new physical evidence and pointed out that they still had no DNA evidence. In 1984, Toole confessed to two unsolved northwest Florida slayings, including one of the I-10 murders. During an interview, he admitted to killing 18-year-old David Schallart, a hitchhiker he picked up east of Pensacola. Schallart's body, bearing five gunshot wounds in the left side of the head, was found on February 6, 1980, approximately off I-10's eastbound lane, east of Chipley. The second confession involved the death of 20-year-old Ada Johnson. Toole confessed that he shot her in the head on a road outside of Fort Walton Beach after kidnapping her at gunpoint at a Tallahassee nightclub.\"Toole admits to 2 Panhandle killings.\" Playground Daily News, Fort Walton Beach, Florida, November 11, 1984, p. 1A. Psychiatrists Dr. Urbina and Dr. Sanches testified at Toole's 1984 Florida Supreme Court appeal that he was extremely impulsive and exhibited antisocial behavior as a result of a personality disorder and that he was a pyromaniac. The court found sufficient evidence that Toole was diagnosed with antisocial personality disorder. Toole claimed to have picked Walsh up in a Sears mall parking lot. Toole said he offered him candy and toys and that Walsh came willingly . Walsh soon wanted to go home and began crying . Toole said he then punched him in the face. Walsh started crying more , and according to Toole, he began to \"wallop\" Walsh, knocking him out. Toole eventually pulled over in a rural area and decapitated Walsh with a machete. He drove around for several days with Walsh's head , forgot about it, and, upon rediscovering it, tossed it into a nearby canal. Police inexplicably lost Toole's impounded car and its bloodstained carpeting, hindering their ability to proceed with the investigation . Hollywood, Florida Police Chief Chadwick Wagner said Toole had been the prime suspect all along, but went on to admit that although Toole's case was weak, he could have been charged during the original investigation . Wagner acknowledged that many mistakes were made by the department and apologized to the Walsh family . Wagner also acknowledged that the lack of new evidence and the inability of Toole to defend himself could provide room for skeptics to doubt Toole's guilt, saying, \"If you're looking for that magic wand, that one piece of evidence, it's not there.\" However, by reexamining previously uncorrelated evidence, police and the Walsh family were satisfied with the new report and existing evidence that points only to Ottis Toole. The decision was finally reached once Toole's niece told John Walsh that her uncle confessed on his deathbed in prison that he had murdered and decapitated Adam . The book Frustrated Witness, written by former Miami Herald'' writer Willis Morgan, examines the Walsh case and cites circumstantial evidence that suggests that another serial killer, Jeffrey Dahmer, may have killed Walsh. At the time of Walsh's murder, Dahmer was living a short drive away in Miami Beach and working at a sub shop where he had access to a blue van similar to the one seen leaving the mall after Walsh's disappearance. A number of witnesses reported seeing a man looking like Dahmer at the mall talking to young boys . When interviewed about Adam in the early 1990s, Dahmer repeatedly denied involvement in the crime, even stating; \"I've told you everything\u2014how I killed them, how I cooked them, who I ate. Why wouldn't I tell you if I did someone else?\" After this rumor surfaced, John Walsh stated that he had \"seen no evidence\" linking his son's kidnapping and murder to Dahmer.", "after_revision": "On October 21, 1983, while he was imprisoned for two unrelated murders, Toole confessed to the 1981 murder of six-year-old Adam Walsh. A few weeks after Toole made the confession, however, police officers who were investigating the case announced that they had lost Toole's impounded car and machete. John Walsh, Adam's father, continues to believe that Toole was guilty.][ On December 16, 2008, 27 years after the 1981 murder Hollywood, Florida, police announced Toole as the murderer, and the Adam Walsh case was closed. The police did not reveal any new physical evidence and pointed out that they still had no DNA evidence. In 1984, Toole confessed to two unsolved northwest Florida slayings, including one of the I-10 murders. During an interview, he admitted to killing 18-year-old David Schallart, a hitchhiker who he picked up east of Pensacola. Schallart's body, bearing five gunshot wounds in the left side of the head, was found on February 6, 1980, approximately off I-10's eastbound lane, east of Chipley. The second confession involved the death of 20-year-old Ada Johnson. Toole confessed that he shot her in the head on a road outside of Fort Walton Beach after kidnapping her at gunpoint at a Tallahassee nightclub.\"Toole admits to 2 Panhandle killings.\" Playground Daily News, Fort Walton Beach, Florida, November 11, 1984, p. 1A. Psychiatrists Dr. Urbina and Dr. Sanches testified at Toole's 1984 Florida Supreme Court appeal that he was extremely impulsive and exhibited antisocial behavior as a result of a personality disorder and that he was a pyromaniac. The court found sufficient evidence that Toole was diagnosed with antisocial personality disorder. Toole claimed that he picked Walsh up in a Sears mall parking lot. Toole stated that Walsh came willingly because he offered Walsh candy and toys . Walsh soon wanted to go home and began to cry . Toole said that he then punched Walsh in the face. Walsh started to cry again , and according to Toole, he began to \"wallop\" Walsh, knocking him out. Toole eventually pulled over in a rural area and decapitated Walsh with a machete. He drove around with Walsh's head for several days , forgot about it, and, after he rediscovered it, he tossed it into a nearby canal. Police officers inexplicably lost Toole's impounded car and its bloodstained carpeting, hindering their ability to proceed with the investigation into Adam Walsh's murder . Hollywood, Florida Police Chief Chadwick Wagner said that Toole had been the prime suspect all along, but he went on to admit that although Toole's case was weak, he could have been charged during the original investigation of it . Wagner acknowledged the fact that many mistakes were made by the department and apologized to the Walsh family on its behalf . Wagner also acknowledged the fact that the lack of new evidence and the inability of Toole to defend himself could provide room for skeptics to doubt Toole's guilt, saying, \"If you're looking for that magic wand, that one piece of evidence, it's not there.\" However, after the police reexamined previously uncorrelated evidence, they and the Walsh family were both satisfied with the new report and the existing evidence which only points to Ottis Toole. The decision was finally reached when Toole's niece told John Walsh that her uncle confessed that he had murdered and decapitated Adam on his deathbed in prison . The book Frustrated Witness, written by former Miami Herald'' writer Willis Morgan, examines the Walsh case and cites circumstantial evidence which suggests that another serial killer, Jeffrey Dahmer, may have killed Walsh. At the time of Walsh's murder, Dahmer was living a short drive away in Miami Beach and working at a sub shop where he had access to a blue van which was similar to the one which was seen leaving the mall after Walsh's disappearance. A number of witnesses reported seeing a man who looked like Dahmer talking to young boys at the mall. When he was interviewed about Adam in the early 1990s, Dahmer repeatedly denied his involvement in the crime, even stating; \"I've told you everything\u2014how I killed them, how I cooked them, who I ate. Why wouldn't I tell you if I did it to someone else?\" After this rumor surfaced, John Walsh stated that he had \"seen no evidence\" linking his son's kidnapping and murder to Dahmer.", "edit_actions": [{"type": "A", "before": null, "after": "officers who were", "start_char_pos": 196, "end_char_pos": 196}, {"type": "R", "before": "continued to maintain that he believed Toole to be", "after": "continues to believe that Toole was", "start_char_pos": 311, "end_char_pos": 361}, {"type": "A", "before": null, "after": "who", "start_char_pos": 903, "end_char_pos": 903}, {"type": "R", "before": "to have", "after": "that he", "start_char_pos": 1774, "end_char_pos": 1781}, {"type": "R", "before": "said he offered him", "after": "stated that Walsh came willingly because he offered Walsh", "start_char_pos": 1833, "end_char_pos": 1852}, {"type": "D", "before": "and that Walsh came willingly", "after": null, "start_char_pos": 1868, "end_char_pos": 1897}, {"type": "R", "before": "crying", "after": "to cry", "start_char_pos": 1939, "end_char_pos": 1945}, {"type": "A", "before": null, "after": "that", "start_char_pos": 1959, "end_char_pos": 1959}, {"type": "R", "before": "him", "after": "Walsh", "start_char_pos": 1976, "end_char_pos": 1979}, {"type": "R", "before": "crying more", "after": "to cry again", "start_char_pos": 2007, "end_char_pos": 2018}, {"type": "D", "before": "for several days", "after": null, "start_char_pos": 2190, "end_char_pos": 2206}, {"type": "A", "before": null, "after": "for several days", "start_char_pos": 2225, "end_char_pos": 2225}, {"type": "R", "before": "upon rediscovering it,", "after": "after he rediscovered it, he", "start_char_pos": 2250, "end_char_pos": 2272}, {"type": "A", "before": null, "after": "officers", "start_char_pos": 2311, "end_char_pos": 2311}, {"type": "A", "before": null, "after": "into Adam Walsh's murder", "start_char_pos": 2442, "end_char_pos": 2442}, {"type": "A", "before": null, "after": "that", "start_char_pos": 2498, "end_char_pos": 2498}, {"type": "A", "before": null, "after": "he", "start_char_pos": 2547, "end_char_pos": 2547}, {"type": "A", "before": null, "after": "of it", "start_char_pos": 2663, "end_char_pos": 2663}, {"type": "A", "before": null, "after": "the fact", "start_char_pos": 2686, "end_char_pos": 2686}, {"type": "A", "before": null, "after": "on its behalf", "start_char_pos": 2769, "end_char_pos": 2769}, {"type": "A", "before": null, "after": "the fact", "start_char_pos": 2797, "end_char_pos": 2797}, {"type": "R", "before": "by reexamining", "after": "after the police reexamined", "start_char_pos": 3031, "end_char_pos": 3045}, {"type": "R", "before": "police", "after": "they", "start_char_pos": 3080, "end_char_pos": 3086}, {"type": "A", "before": null, "after": "both", "start_char_pos": 3113, "end_char_pos": 3113}, {"type": "R", "before": "existing evidence that points only", "after": "the existing evidence which only points", "start_char_pos": 3148, "end_char_pos": 3182}, {"type": "R", "before": "once", "after": "when", "start_char_pos": 3232, "end_char_pos": 3236}, {"type": "D", "before": "on his deathbed in prison", "after": null, "start_char_pos": 3292, "end_char_pos": 3317}, {"type": "A", "before": null, "after": "on his deathbed in prison", "start_char_pos": 3360, "end_char_pos": 3360}, {"type": "R", "before": "that", "after": "which", "start_char_pos": 3505, "end_char_pos": 3509}, {"type": "A", "before": null, "after": "which was", "start_char_pos": 3729, "end_char_pos": 3729}, {"type": "A", "before": null, "after": "which was", "start_char_pos": 3749, "end_char_pos": 3749}, {"type": "R", "before": "looking like Dahmer at the mall", "after": "who looked like Dahmer", "start_char_pos": 3845, "end_char_pos": 3876}, {"type": "R", "before": ". When", "after": "at the mall. When he was", "start_char_pos": 3899, "end_char_pos": 3905}, {"type": "A", "before": null, "after": "his", "start_char_pos": 3974, "end_char_pos": 3974}, {"type": "A", "before": null, "after": "it to", "start_char_pos": 4123, "end_char_pos": 4123}], "sents_char_pos": [0, 134, 283, 369, 434, 607, 712, 816, 935, 1100, 1169, 1314, 1353, 1660, 1759, 1826, 1899, 1947, 1992, 2090, 2173, 2303, 2444, 2665, 3021, 3198, 3362, 3585, 3800, 3900, 4014, 4089, 4138]}
+{"doc_id": "12276403", "revision_depth": "1", "before_revision": "Rama and Hanuman fighting Ravana, an album painting on paper from Tamil Nadu, ca 1820. Tamil Gods means the Gods and Deities worshipped by Native Tamil peopleof Tamilnadu and Srilanka from Sangam Age. These Gods are elements of Native Tamil Religious culture . Gods Ancient Tamil literatures are the source of Tamil deities like Sivan, Murugan , Mayon, Indiran, Ravanan, Kortravai. Tholkappiyam mentions Seyon or \"the red one \"and kortravai as the goddess who was worshiped in the dry lands. Tamil literature forms the source of history of Nataraja, Meenakshi, Tirupati, Rameswaram. Murugan Murugan (Tamil: \u0bae\u0bc1\u0bb0\u0bc1\u0b95\u0ba9\u0bcd , ), also known as Seyon, Kumaran, Venthan Muruga , is the Tamil god of war. He is the son of Parvati and Shiva, brother of Ganesha, and a god whose life story has many versions in Hinduism. An important deity around South Asia since ancient times, Kartikeya is particularly popular and predominantly worshipped in South India, Sri Lanka, Singapore and Malaysia as Murugan. Mayon Mayon () also Thirumal () is the Tamil deity most popular amongst Tamils of Tamil Nadu state in India and in the Tamil diaspora. Perumal is another name of Vishnu. See also * Category:Tamil history * * Category:Tamil deitie", "after_revision": "Rama and Hanuman fighting Ravana, an album painting on paper from Tamil Nadu, ca 1820. Tamil mythology means the stories and sacred narratives belonging to the Tamil people . This body of mythology is a mix of elements from the Tamil culture, Dravidian culture and Indus Valley cultures along with the Hindu religious aspects. Gods The Tamil literature in parallel with the Sanskrit literature formed a major source of information on Hindu culture. The ancient Tamil epics forms the source of various historical figures in Hindu scripture like Agastya, Iravan, Patanjali etc. Ancient Tamil literature is the source of Tamil deities like Murugan and Kortravai. Tholkappiyam mentions Seyon or \"the red one \"and kortravai as the goddess who was worshiped in the dry lands. Tamil literature forms the source of history of Nataraja, Meenakshi, Tirupati, Rameswaram. Kartikeya Kartikeya ( , ), also known as Skanda, Kumara, Murugan and Subrahmanya , is the Hindu god of war. He is the son of Parvati and Shiva, brother of Ganesha, and a god whose life story has many versions in Hinduism. An important deity around South Asia since ancient times, Kartikeya is particularly popular and predominantly worshipped in South India, Sri Lanka, Singapore and Malaysia as Murugan. Thirumal Perumal () also Thirumal () is the Hindu deity most popular amongst Tamils of Tamil Nadu state in India and in the Tamil diaspora. Perumal is another name of Vishnu. The Great Ancient Tamil Continent Kumari Kandam Tamil:\u0b95\u0bc1\u0bae\u0bb0\u0bbf\u0b95\u0bcd\u0b95\u0ba3\u0bcd\u0b9f\u0bae\u0bcd, Kumarikka\u1e47\u1e6dam) is the name of a supposed sunken landmass referred to in existing ancient Tamil literature. It is said to have been located in the Indian Ocean, to the south of present-day Kanyakumari district at the southern tip of India. References in Tamil literature There are scattered references in Sangam literature, such as Kalittokai 104, to how the sea took the land of the Pandiyan kings, upon which they conquered new lands to replace those they had lost. There are also references to the rivers Pahruli and Kumari, that are said to have flowed in a now-submerged land. The Silappadhikaram, one of the Five Great Epics of Tamil Literature written in first few centuries CE, states that the \"cruel sea\" took the Pandiyan land that lay between the rivers Pahruli and the mountainous banks of the Kumari, to replace which the Pandiyan king conquered lands belonging to the Chola and Chera kings (Maturaikkandam, verses 17-22). Adiyarkkunallar, a 12th-century commentator on the epic, explains this reference by saying that there was once a land to the south of the present-day Kanyakumari, which stretched for 700 kavatam from the Pahruli river in the north to the Kumari river in the south. As the modern equivalent of a kavatam is unknown, estimates of the size of the lost land vary from to in length, to others suggesting a total area of 6\u20137,000 square miles, or smaller still an area of just a few villages. This land was divided into 49 nadu, or territories, which he names as seven coconut territories (elutenga natu), seven Madurai territories (elumaturai natu), seven old sandy territories (elumunpalai natu), seven new sandy territories (elupinpalai natu), seven mountain territories (elukunra natu), seven eastern coastal territories (elukunakarai natu) and seven dwarf-palm territories (elukurumpanai natu). All these lands, he says, together with the many-mountained land that began with KumariKollam, with forests and habitations, were submerged by the sea. Two of these Nadus or territories were supposedly parts of present-day Kollam and Kanyakumari districts. None of these texts name the land \"Kumari Kandam\" or \"Kumarinadu\", as is common today. The only similar pre-modern reference is to a \"Kumari Kandam\" (written \u0b95\u0bc1\u0bae\u0bb0\u0bbf\u0b95\u0ba3\u0bcd\u0b9f\u0bae\u0bcd, rather than \u0b95\u0bc1\u0bae\u0bb0\u0bbf\u0b95\u0bcd\u0b95\u0ba3\u0bcd\u0b9f\u0bae\u0bcd as the land is called in modern Tamil), which is named in the medieval Tamil text Kantapuranam either as being one of the nine continents,Madras Tamil lexicon, \u0b95\u0bc1\u0bae\u0bb0\u0bbf\u0b95\u0ba3\u0bcd\u0b9f\u0bae\u0bcd or one of the nine divisions of India and the only region not to be inhabited by barbarians. 19th and 20th century Tamil revivalist movements, however, came to apply the name to the territories described in Adiyarkkunallar's commentary to the Silappadhikaram. They also associated this territory with the references in the Tamil Sangams, and said that the fabled cities of southern Madurai (Ten Madurai) and Kapatapuram where the first two Sangams were said to be held were located on Kumari Kandam. These sangams may have overlapped in parallel to the third historic sangam; the second century BCE Tissamaharama Tamil Brahmi inscription detailing the thiraLi muRi (written agreement of the assembly) was excavated a few miles from the coast of the historic Tenavaram temple, Matara, Sri Lanka. Modern revival Kumari Kandam, as identified with Lemuria In the late 19th and early 20th centuries, Tamil nationalists came to identify Kumari Kandam with Lemuria, a \"lost continent\" posited in the 19th century to account for discontinuities in biogeography. In these accounts, Kumari Kandam became the \"cradle of civilization\", the origin of human languages in general and the Tamil language in particular. These ideas gained notability in Tamil academic literature over the first decades of the 20th century, and were popularized by the Tanittamil Iyakkam, notably by self-taught Dravidologist Devaneya Pavanar, who held that all languages on earth were merely corrupted Tamil dialects. R. Mathivanan, then Chief Editor of the Tamil Etymological Dictionary Project of the Government of Tamil Nadu, in 1991 claimed to have deciphered the still undeciphered Indus script as Tamil, following the methodology recommended by his teacher Devaneya Pavanar, presenting the following timeline (cited after Mahadevan 2002): ca. 200,000 to 50,000 BC: evolution of \"the Tamilian or Homo Dravida\", ca. 200,000 to 100,000 BC: beginnings of the Tamil language 50,000 BC: Kumari Kandam civilisation 20,000 BC: A lost Tamil culture of the Easter Island which had an advanced civilisation 16,000 BC: Lemuria submerged 6087 BC: Second Tamil Sangam established by a Pandya king 3031 BC: A Chera prince in his wanderings in the Solomon Islands saw wild sugarcane and started cultivation in Present Tamil nadu. 1780 BC: The Third Tamil Sangam established by a Pandya king 7th century BC: Tolkappiyam (the earliest known extant Tamil grammar) Popular culture Kumari Kandam appeared in the episodes \"The King of Kumari Kandam\" and \"The Atlas Pin\" of The Secret Saturdays. This version is a city on the back of a giant sea serpent with its inhabitants all fish people. Loss and imagination Sumathi Ramaswamy's book, The Lost Land of Lemuria: Fabulous Geographies, Catastrophic Histories (2004) is a theoretically sophisticated study of the Lemuria legends that widens the discussion beyond previous treatments, looking at Lemuria narratives from nineteenth-century Victorian-era science to Euro-American occultism, colonial, and post colonial India. Ramaswamy discusses particularly how cultures process the experience of loss. See also * * Category:Tamil history * ", "edit_actions": [{"type": "R", "before": "Gods means the Gods and Deities worshipped by Native Tamil peopleof Tamilnadu and Srilanka from Sangam Age. These Gods are elements of Native Tamil Religious culture", "after": "mythology means the stories and sacred narratives belonging to the Tamil people", "start_char_pos": 93, "end_char_pos": 258}, {"type": "A", "before": null, "after": "This body of mythology is a mix of elements from the Tamil culture, Dravidian culture and Indus Valley cultures along with the Hindu religious aspects.", "start_char_pos": 261, "end_char_pos": 261}, {"type": "R", "before": "Ancient Tamil literatures are", "after": "The Tamil literature in parallel with the Sanskrit literature formed a major source of information on Hindu culture. The ancient Tamil epics forms the source of various historical figures in Hindu scripture like Agastya, Iravan, Patanjali etc. Ancient Tamil literature is", "start_char_pos": 267, "end_char_pos": 296}, {"type": "R", "before": "Sivan, Murugan , Mayon, Indiran, Ravanan,", "after": "Murugan and", "start_char_pos": 330, "end_char_pos": 371}, {"type": "R", "before": "Murugan", "after": "Kartikeya", "start_char_pos": 584, "end_char_pos": 591}, {"type": "R", "before": "Murugan (Tamil: \u0bae\u0bc1\u0bb0\u0bc1\u0b95\u0ba9\u0bcd", "after": "Kartikeya (", "start_char_pos": 592, "end_char_pos": 615}, {"type": "R", "before": "Seyon, Kumaran, Venthan Muruga", "after": "Skanda, Kumara, Murugan and Subrahmanya", "start_char_pos": 635, "end_char_pos": 665}, {"type": "R", "before": "Tamil", "after": "Hindu", "start_char_pos": 675, "end_char_pos": 680}, {"type": "R", "before": "Mayon", "after": "Thirumal", "start_char_pos": 990, "end_char_pos": 995}, {"type": "R", "before": "Mayon", "after": "Perumal", "start_char_pos": 996, "end_char_pos": 1001}, {"type": "R", "before": "Tamil", "after": "Hindu", "start_char_pos": 1029, "end_char_pos": 1034}, {"type": "A", "before": null, "after": "The Great Ancient Tamil Continent", "start_char_pos": 1160, "end_char_pos": 1160}, {"type": "A", "before": null, "after": "Kumari Kandam Tamil:\u0b95\u0bc1\u0bae\u0bb0\u0bbf\u0b95\u0bcd\u0b95\u0ba3\u0bcd\u0b9f\u0bae\u0bcd, Kumarikka\u1e47\u1e6dam) is the name of a supposed sunken landmass referred to in existing ancient Tamil literature. It is said to have been located in the Indian Ocean, to the south of present-day Kanyakumari district at the southern tip of India.", "start_char_pos": 1161, "end_char_pos": 1161}, {"type": "A", "before": null, "after": "References in Tamil literature There are scattered references in Sangam literature, such as Kalittokai 104, to how the sea took the land of the Pandiyan kings, upon which they conquered new lands to replace those they had lost. There are also references to the rivers Pahruli and Kumari, that are said to have flowed in a now-submerged land. The Silappadhikaram, one of the Five Great Epics of Tamil Literature written in first few centuries CE, states that the \"cruel sea\" took the Pandiyan land that lay between the rivers Pahruli and the mountainous banks of the Kumari, to replace which the Pandiyan king conquered lands belonging to the Chola and Chera kings (Maturaikkandam, verses 17-22). Adiyarkkunallar, a 12th-century commentator on the epic, explains this reference by saying that there was once a land to the south of the present-day Kanyakumari, which stretched for 700 kavatam from the Pahruli river in the north to the Kumari river in the south. As the modern equivalent of a kavatam is unknown, estimates of the size of the lost land vary from to in length, to others suggesting a total area of 6\u20137,000 square miles, or smaller still an area of just a few villages.", "start_char_pos": 1162, "end_char_pos": 1162}, {"type": "A", "before": null, "after": "This land was divided into 49 nadu, or territories, which he names as seven coconut territories (elutenga natu), seven Madurai territories (elumaturai natu), seven old sandy territories (elumunpalai natu), seven new sandy territories (elupinpalai natu), seven mountain territories (elukunra natu), seven eastern coastal territories (elukunakarai natu) and seven dwarf-palm territories (elukurumpanai natu). All these lands, he says, together with the many-mountained land that began with KumariKollam, with forests and habitations, were submerged by the sea. Two of these Nadus or territories were supposedly parts of present-day Kollam and Kanyakumari districts.", "start_char_pos": 1163, "end_char_pos": 1163}, {"type": "A", "before": null, "after": "None of these texts name the land \"Kumari Kandam\" or \"Kumarinadu\", as is common today. The only similar pre-modern reference is to a \"Kumari Kandam\" (written \u0b95\u0bc1\u0bae\u0bb0\u0bbf\u0b95\u0ba3\u0bcd\u0b9f\u0bae\u0bcd, rather than \u0b95\u0bc1\u0bae\u0bb0\u0bbf\u0b95\u0bcd\u0b95\u0ba3\u0bcd\u0b9f\u0bae\u0bcd as the land is called in modern Tamil), which is named in the medieval Tamil text Kantapuranam either as being one of the nine continents,Madras Tamil lexicon, \u0b95\u0bc1\u0bae\u0bb0\u0bbf\u0b95\u0ba3\u0bcd\u0b9f\u0bae\u0bcd or one of the nine divisions of India and the only region not to be inhabited by barbarians. 19th and 20th century Tamil revivalist movements, however, came to apply the name to the territories described in Adiyarkkunallar's commentary to the Silappadhikaram. They also associated this territory with the references in the Tamil Sangams, and said that the fabled cities of southern Madurai (Ten Madurai) and Kapatapuram where the first two Sangams were said to be held were located on Kumari Kandam. These sangams may have overlapped in parallel to the third historic sangam; the second century BCE Tissamaharama Tamil Brahmi inscription detailing the thiraLi muRi (written agreement of the assembly) was excavated a few miles from the coast of the historic Tenavaram temple, Matara, Sri Lanka.", "start_char_pos": 1164, "end_char_pos": 1164}, {"type": "A", "before": null, "after": "Modern revival Kumari Kandam, as identified with Lemuria", "start_char_pos": 1165, "end_char_pos": 1165}, {"type": "A", "before": null, "after": "In the late 19th and early 20th centuries, Tamil nationalists came to identify Kumari Kandam with Lemuria, a \"lost continent\" posited in the 19th century to account for discontinuities in biogeography. In these accounts, Kumari Kandam became the \"cradle of civilization\", the origin of human languages in general and the Tamil language in particular. These ideas gained notability in Tamil academic literature over the first decades of the 20th century, and were popularized by the Tanittamil Iyakkam, notably by self-taught Dravidologist Devaneya Pavanar, who held that all languages on earth were merely corrupted Tamil dialects.", "start_char_pos": 1166, "end_char_pos": 1166}, {"type": "A", "before": null, "after": "R. Mathivanan, then Chief Editor of the Tamil Etymological Dictionary Project of the Government of Tamil Nadu, in 1991 claimed to have deciphered the still undeciphered Indus script as Tamil, following the methodology recommended by his teacher Devaneya Pavanar, presenting the following timeline (cited after Mahadevan 2002): ca. 200,000 to 50,000 BC: evolution of \"the Tamilian or Homo Dravida\", ca. 200,000 to 100,000 BC: beginnings of the Tamil language 50,000 BC: Kumari Kandam civilisation 20,000 BC: A lost Tamil culture of the Easter Island which had an advanced civilisation 16,000 BC: Lemuria submerged 6087 BC: Second Tamil Sangam established by a Pandya king 3031 BC: A Chera prince in his wanderings in the Solomon Islands saw wild sugarcane and started cultivation in Present Tamil nadu. 1780 BC: The Third Tamil Sangam established by a Pandya king 7th century BC: Tolkappiyam (the earliest known extant Tamil grammar)", "start_char_pos": 1167, "end_char_pos": 1167}, {"type": "A", "before": null, "after": "Popular culture Kumari Kandam appeared in the episodes \"The King of Kumari Kandam\" and \"The Atlas Pin\" of The Secret Saturdays. This version is a city on the back of a giant sea serpent with its inhabitants all fish people.", "start_char_pos": 1168, "end_char_pos": 1168}, {"type": "A", "before": null, "after": "Loss and imagination Sumathi Ramaswamy's book, The Lost Land of Lemuria: Fabulous Geographies, Catastrophic Histories (2004) is a theoretically sophisticated study of the Lemuria legends that widens the discussion beyond previous treatments, looking at Lemuria narratives from nineteenth-century Victorian-era science to Euro-American occultism, colonial, and post colonial India. Ramaswamy discusses particularly how cultures process the experience of loss.", "start_char_pos": 1169, "end_char_pos": 1169}, {"type": "A", "before": null, "after": "*", "start_char_pos": 1181, "end_char_pos": 1181}, {"type": "D", "before": "* Category:Tamil deitie", "after": null, "start_char_pos": 1207, "end_char_pos": 1230}], "sents_char_pos": [0, 86, 200, 382, 492, 583, 692, 806, 989, 1124, 1159]}
+{"doc_id": "1392681", "revision_depth": "1", "before_revision": "Learning organizations develop as a result of the pressures facing modern organizations; this enables them to remain competitive in the business environment.O'Keeffe, T. 2002. Organizational Learning: a new perspective. Journal of European Industrial Training, 26 (2), pp. 130-141. Characteristics There is a multitude of definitions of a learning organization as well as their typologies . Peter Senge stated in an interview that a learning organization is a group of people working together collectively to enhance their capacities to create results they really care about.Fulmer, Robert M., Keys, J. Bernard. (1998). A Conversation with Peter Senge: New Developments in Organizational Learning Organizational Dynamics, 27 (2), 33-42. Senge popularized the concept of the learning organization through his book The Fifth Discipline. In the book, he proposed the following five characteristics:Learning Organizations (2005) p.190Senge, P.M. 1990. The Fifth Discipline. London: Century Business. Systems thinking . The idea of the learning organization developed from a body of work called systems thinking. This is a conceptual framework that allows people to study businesses as bounded objects. Learning organizations use this method of thinking when assessing their company and have information systems that measure the performance of the organization as a whole and of its various components. Systems thinking states that all the characteristics must be apparent at once in an organization for it to be a learning organization. If some of these characteristics are missing then the organization will fall short of its goal. However, O'Keeffe believes that the characteristics of a learning organization are factors that are gradually acquired, rather than developed simultaneously. Personal mastery. The commitment by an individual to the process of learning is known as personal mastery. There is a competitive advantage for an organization whose workforce can learn more quickly than the workforce of other organizations.Wang, C.L. and Ahmed, P.K. 2003. Organizational learning: a critical review. The learning organization, 10 (1) pp. 8-17. Learning is considered to be more than just acquiring information; it is expanding the ability to be more productive by learning how to apply our skills to our work in the most valuable way. Personal mastery appears also in a spiritual way as, for example, clarification of focus, personal vision and ability to see and interpret reality objectively. Individual learning is acquired through staff training, development and continuous self-improvement; however, learning cannot be forced upon an individual who is not receptive to learning. Research shows that most learning in the workplace is incidental, rather than the product of formal training, therefore it is important to develop a culture where personal mastery is practiced in daily life. A learning organization has been described as the sum of individual learning, but there must be mechanisms for individual learning to be transferred into organizational learning. Personal mastery makes possible many positive outcomes such as individual performance, self-efficacy, self-motivation, sense of responsibility, commitment, patience and focus on relevant matters as well as work-life balance and well-being. Mental models. Assumptions and generalizations held by individuals and organizations are called mental models. Personal mental models describe what people can or cannot detect.Senge, P., Kleiner, A., Roberts, C., Ross, R. B., & Smith, B. J. (1994). The fifth discipline fieldbook: Strategies and tools for building a learning organization. Due to selective observation, mental models might limit peoples\u2019 observations. To become a learning organization, these models must be identified and challenged. Individuals tend to espouse theories, which are what they intend to follow, and theories-in-use, which are what they actually do. Similarly, organizations tend to have 'memories' which preserve certain behaviours, norms and values.Easterby-Smith, M. , Crossan, M., and Nicolini, D. 2000. Organizational learning: debates past, present and future. Journal of Management Studies. 37(6) pp 783-796. In creating a learning environment it is important to replace confrontational attitudes with an open culture that promotes inquiry and trust. To achieve this, the learning organization needs mechanisms for locating and assessing organizational theories of action. Unwanted values need to be discarded in a process called 'unlearning'. Wang and Ahmed refer to this as 'triple loop learning'. For organizations, problems arise when mental models evolve beneath the level of awareness. Thus it is important to examine business issues and actively question current business practices and new skills before they become integrated into new practices.Senge, P. M. (1992). Mental models. Planning review, 20(2), 4-44. Shared vision. The development of a shared vision is important in motivating the staff to learn, as it creates a common identity that provides focus and energy for learning. The most successful visions build on the individual visions of the employees at all levels of the organization, thus the creation of a shared vision can be hindered by traditional structures where the company vision is imposed from above. Therefore, learning organizations tend to have flat, decentralized organizational structures. The shared vision is often to succeed against a competitor; however, Senge states that these are transitory goals and suggests that there should also be long-term goals that are intrinsic within the company. On the other hand, the lack of clearly defined goals can negatively affect the organisation, as it cannot attain its members trust. Applying the practices of a shared vision creates a suitable environment for the development of trust through communication and collaboration within the organization. As a result, the built shared vision encourages the members to share their own experiences and opinions, thus enhancing effects of organizational learning. Team learning. The accumulation of individual learning constitutes team learning. The benefit of team or shared learning is that staff grow more quickly and the problem solving capacity of the organization is improved through better access to knowledge and expertise. Learning organizations have structures that facilitate team learning with features such as boundary crossing and openness. In team meetings members can learn better from each other by concentrating on listening, avoiding interruption, being interested in and responding.Senge, P. et al. (1994) The Fifth Discipline Fieldbook: Strategies and Tools for Building a Learning Organization. As a result of development , people don't have to hide or overlook their disagreements . By those they make their collective understanding richer. Team learningis at its best: The ability to think insightfully about complex issues , the ability to take innovative, coordinated action and the ability to create a network that will allow other teams to take action as well .The Fifth Discipline (no date). Available at: URL . Team's focus is on transferring both quiet and explicit information across the group and creating an environment where creativity can flourish. Team learn how to think together. Team learning is process of adapting and developing the team capacity to create the results that its members really want. Team learning requires individuals to engage in dialogue and discussion; therefore team members must develop open communication, shared meaning, and shared understanding. Learning organizations typically have excellent knowledge management structures, allowing creation, acquisition, dissemination, and implementation of this knowledge in the organization. Team learning requires discipline and routines. Discipline in team helps members and leaders to use tools such as Action-Learning-Cycle and Dialogue . Team learning is only one element of learning cycle. For the cycle to be complete, it has to include all five principles which are mentioned above. This combination encourages organizations to shift to a more interconnected way of thinking. Organizations should become more like communities that employees can feel a commitment to.Chawla, Sarita Renesch, John (1995). Learning Organizations: Developing Cultures for Tomorrow's Workplace. Portland, OR: Productivity Press (p. 16). Other benefits of a learning organization are: Maintaining levels of innovation and remaining competitiveMcHugh, D., Groves, D. and Alker, A. 1998. Managing learning: what do we learn from a learning organization? The Learning Organization. 5 (5) pp.209-220. Improved efficiency Having the knowledge to better link resources to customer needs Improving quality of outputs at all levels Improving corporate image by becoming more people oriented Increasing the pace of change within the organization Strengthening sense of community in the organization Improving long term decision making Improving knowledge sharing Problems organizational learning addresses Some of the issues that learning organizations were designed to address within institutions is fragmentation, competition and reactiveness. Fragmentation is described as breaking a problem into pieces. For example, each organization has an accounting department, finance, operations, IT and marketing. Competition occurs when employees are trying to do better or 'beat' others in an assignment instead of collaborating. Reactiveness occurs when an organization changes only in reaction to outside forces, rather than proactively initiating change. There are criticisms of Learning OrganizationHsu, SW (2020) Still in search of Learning Organization? The Learning Organization, 27 (1): 31-41 See also Community of practice Knowledge capture Knowledge management Knowledge organization Learning agenda Organizational learning Professional learning community Reflective practice The Learning Organization Barker, Randolph T. Camarata, Martin R. (1998). The role of communication in creating and maintaining a learning organization: preconditions, indicators, and disciplines, The Journal of Business Communication, 35 (4), 443-467. \u00d6rtenblad, Anders R. (2020). \" The Oxford Handbook of the Learning Organization \" ' Oxford University Press '. Papa, M. J., Daniels, T. D., & Spiker, B. K. (2008). Organizational Communication: Perspectives and Trends. Thousand Oaks: Sage Publications. Schwandt, David R. , Marquardt, Michael J. (2000). Organizational Learning . Boca Raton: St. Lucie Press. Senge, Peter M. , Kleiner, Art ., Roberts, Charlotte ., Ross Richard B. , Smith, Bryan J. ( 1994). The Fifth Discipline Fieldbook New York: Currency Doubleday. Hsu, SW (2020)Still in search of Learning Organization: Towards a radical account of The Fifth Discipline . The Learning Organization .", "after_revision": "Learning organizations may develop as a result of the pressures facing modern organizations; this enables them to remain competitive in the business environment.O'Keeffe, T. 2002. Organizational Learning: a new perspective. Journal of European Industrial Training, 26 (2), pp. 130-141. Characteristics There are many definitions of a learning organization as well as typologies of kinds of learning organizations. Peter Senge stated in an interview that a learning organization is a group of people working together collectively to enhance their capacities to create results they really care about.Fulmer, Robert M., Keys, J. Bernard. (1998). A Conversation with Peter Senge: New Developments in Organizational Learning Organizational Dynamics, 27 (2), 33-42. Senge popularized the concept of the learning organization through his book The Fifth Discipline. In the book, he proposed the following five characteristics:Learning Organizations (2005) p.190Senge, P.M. 1990. The Fifth Discipline. London: Century Business. Systems thinking The idea of the learning organization developed from a body of work called systems thinking. This is a conceptual framework that allows people to study businesses as bounded objects. Learning organizations use this method of thinking when assessing their company and have information systems that measure the performance of the organization as a whole and of its various components. Systems thinking states that all the characteristics of a learning organization must be apparent at once in an organization for it to be a learning organization. If some of these characteristics are missing then the organization will fall short of its goal. However, O'Keeffe believes that the characteristics of a learning organization are factors that are gradually acquired, rather than developed simultaneously. Personal mastery The commitment by an individual to the process of learning is known as personal mastery. There is a competitive advantage for an organization whose workforce can learn more quickly than the workforce of other organizations.Wang, C.L. and Ahmed, P.K. 2003. Organizational learning: a critical review. The learning organization, 10 (1) pp. 8-17. Learning is considered to be more than just acquiring information; it is expanding the ability to be more productive by learning how to apply our skills to work in the most valuable way. Personal mastery appears also in a spiritual way as, for example, clarification of focus, personal vision and ability to see and interpret reality objectively. Individual learning is acquired through staff training, development and continuous self-improvement; however, learning cannot be forced upon an individual who is not receptive to learning. Research shows that most learning in the workplace is incidental, rather than the product of formal training, therefore it is important to develop a culture where personal mastery is practiced in daily life. A learning organization has been described as the sum of individual learning, but there must be mechanisms for individual learning to be transferred into organizational learning. Personal mastery makes possible many positive outcomes such as individual performance, self-efficacy, self-motivation, sense of responsibility, commitment, patience and focus on relevant matters as well as work-life balance and well-being. Mental models Assumptions and generalizations held by individuals and organizations are called mental models. Personal mental models describe what people can or cannot detect.Senge, P., Kleiner, A., Roberts, C., Ross, R. B., & Smith, B. J. (1994). The fifth discipline fieldbook: Strategies and tools for building a learning organization. Due to selective observation, mental models might limit peoples\u2019 observations. To become a learning organization, these models must be identified and challenged. Individuals tend to espouse theories, which are what they intend to follow, and theories-in-use, which are what they actually do. Similarly, organizations tend to have 'memories' which preserve certain behaviours, norms and values.Easterby-Smith, M. , Crossan, M., and Nicolini, D. 2000. Organizational learning: debates past, present and future. Journal of Management Studies. 37(6) pp 783-796. In creating a learning environment it is important to replace confrontational attitudes with an open culture that promotes inquiry and trust. To achieve this, the learning organization needs mechanisms for locating and assessing organizational theories of action. Unwanted values need to be discarded in a process called 'unlearning'. Wang and Ahmed refer to this as 'triple loop learning'. For organizations, problems arise when mental models evolve beneath the level of awareness. Thus it is important to examine business issues and actively question current business practices and new skills before they become integrated into new practices.Senge, P. M. (1992). Mental models. Planning review, 20(2), 4-44. Shared vision The development of a shared vision is important in motivating the staff to learn, as it creates a common identity that provides focus and energy for learning. The most successful visions build on the individual visions of the employees at all levels of the organization, thus the creation of a shared vision can be hindered by traditional structures where the company vision is imposed from above. Therefore, learning organizations tend to have flat, decentralized organizational structures. The shared vision is often to succeed against a competitor; however, Senge states that these are transitory goals and suggests that there should also be long-term goals that are intrinsic within the company. On the other hand, the lack of clearly defined goals can negatively affect the organisation, as it cannot attain its members trust. Applying the practices of a shared vision creates a suitable environment for the development of trust through communication and collaboration within the organization. As a result, the built shared vision encourages the members to share their own experiences and opinions, thus enhancing effects of organizational learning. Team learning The accumulation of individual learning constitutes team learning. The benefit of team or shared learning is that staff learn more quickly and the problem solving capacity of the organization is improved through better access to knowledge and expertise. Learning organizations have structures that facilitate team learning with features such as boundary crossing and openness. In team meetings members can learn better from each other by concentrating on listening, avoiding interruption, being interested and responding.Senge, P. et al. (1994) The Fifth Discipline Fieldbook: Strategies and Tools for Building a Learning Organization. In such a learning environment , people don't have to hide or overlook their disagreements , so they make their collective understanding richer. Three dimensions of team learning, according to Senge, are: \"the ability to think insightfully about complex issues \", \" the ability to take innovative, coordinated action \", and \" the ability to create a network that will allow other teams to take action as well \". In a learning organization, teams learn how to think together. Team learning is process of adapting and developing the team capacity to create the results that its members really want. Team learning requires individuals to engage in dialogue and discussion; therefore team members must develop open communication, shared meaning, and shared understanding. Learning organizations typically have excellent knowledge management structures, allowing creation, acquisition, dissemination, and implementation of this knowledge in the organization. Teams use tools such as an action learning cycle and dialogue . Team learning is only one element of the learning cycle. For the cycle to be complete, it has to include all five characteristics which are mentioned above. Other benefits of a learning organization are: Maintaining levels of innovation and remaining competitiveMcHugh, D., Groves, D. and Alker, A. 1998. Managing learning: what do we learn from a learning organization? The Learning Organization. 5 (5) pp.209-220. Having the knowledge to better link resources to customer needs Improving quality of outputs at all levels Improving corporate image by becoming more people oriented Increasing the pace of change within the organization Strengthening sense of community in the organization Improving long term decision making Improving knowledge sharing Problems organizational learning addresses Some of the issues that learning organizations were designed to address within institutions is fragmentation, competition and reactiveness. Chawla, Sarita Renesch, John (1995). Learning Organizations: Developing Cultures for Tomorrow's Workplace. Portland, OR: Productivity Press (p. 16). Fragmentation is described as breaking a problem into pieces. For example, each organization has an accounting department, finance, operations, IT and marketing. Competition occurs when employees are trying to do better or 'beat' others in an assignment instead of collaborating. Reactiveness occurs when an organization changes only in reaction to outside forces, rather than proactively initiating change. See also Community of practice Knowledge capture Knowledge management Knowledge organization Lean startup Learning agenda Organizational learning Professional learning community Reflective practice \u00d6rtenblad, Anders R. (2020). The Oxford Handbook of the Learning Organization . New York: Oxford University Press . Cummings, Thomas G. (ed.) (2008). Handbook of Organization Development. Los Angeles: Sage. Papa, M. J., Daniels, T. D., & Spiker, B. K. (2008). Organizational Communication: Perspectives and Trends. Thousand Oaks: Sage Publications. Garvin, David A. (2000). Learning in Action: A Guide to Putting the Learning Organization to Work. Boston: Harvard Business School Press. Flood, Robert L. (1999). Rethinking the Fifth Discipline: Learning Within the Unknowable. London; New York: Routledge. Aubrey, Robert; Cohen, Paul M. (1995). Working Wisdom: Timeless Skills and Vanguard Strategies for Learning Organizations. San Francisco: Jossey-Bass. Chawla, Sarita; Renesch, John (eds.) (1995). Learning Organizations: Developing Cultures for Tomorrow's Workplace. Portland, OR: Productivity Press. Senge, Peter M. ; Kleiner, Art ; Roberts, Charlotte ; Ross Richard B. ; Smith, Bryan J. ( eds.) ( 1994). The Fifth Discipline Fieldbook New York: Currency Doubleday. Watkins, Karen E.; Marsick, Victoria J. (1993). Sculpting the Learning Organization: Lessons in the Art and Science of Systemic Change. San Francisco: Jossey-Bass. Senge, Peter M. (1990/2006). The Fifth Discipline : The Art and Practice of the Learning Organization (Revised edition). New York: Currency/Doubleday .", "edit_actions": [{"type": "A", "before": null, "after": "may", "start_char_pos": 23, "end_char_pos": 23}, {"type": "R", "before": "is a multitude of", "after": "are many", "start_char_pos": 305, "end_char_pos": 322}, {"type": "R", "before": "their typologies .", "after": "typologies of kinds of learning organizations.", "start_char_pos": 373, "end_char_pos": 391}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1014, "end_char_pos": 1015}, {"type": "A", "before": null, "after": "of a learning organization", "start_char_pos": 1452, "end_char_pos": 1452}, {"type": "R", "before": "Personal mastery.", "after": "Personal mastery", "start_char_pos": 1789, "end_char_pos": 1806}, {"type": "D", "before": "our", "after": null, "start_char_pos": 2307, "end_char_pos": 2310}, {"type": "R", "before": "Mental models.", "after": "Mental models", "start_char_pos": 3318, "end_char_pos": 3332}, {"type": "R", "before": "Shared vision.", "after": "Shared vision", "start_char_pos": 4926, "end_char_pos": 4940}, {"type": "R", "before": "Team learning.", "after": "Team learning", "start_char_pos": 6096, "end_char_pos": 6110}, {"type": "R", "before": "grow", "after": "learn", "start_char_pos": 6231, "end_char_pos": 6235}, {"type": "D", "before": "in", "after": null, "start_char_pos": 6616, "end_char_pos": 6618}, {"type": "R", "before": "As a result of development", "after": "In such a learning environment", "start_char_pos": 6749, "end_char_pos": 6775}, {"type": "R", "before": ". By those", "after": ", so", "start_char_pos": 6836, "end_char_pos": 6846}, {"type": "R", "before": "Team learningis at its best: The", "after": "Three dimensions of team learning, according to Senge, are: \"the", "start_char_pos": 6896, "end_char_pos": 6928}, {"type": "R", "before": ",", "after": "\", \"", "start_char_pos": 6980, "end_char_pos": 6981}, {"type": "R", "before": "and", "after": "\", and \"", "start_char_pos": 7033, "end_char_pos": 7036}, {"type": "R", "before": ".The Fifth Discipline (no date). Available at: URL . Team's focus is on transferring both quiet and explicit information across the group and creating an environment where creativity can flourish. Team", "after": "\". In a learning organization, teams", "start_char_pos": 7120, "end_char_pos": 7321}, {"type": "R", "before": "Team learning requires discipline and routines. Discipline in team helps members and leaders to", "after": "Teams", "start_char_pos": 7830, "end_char_pos": 7925}, {"type": "R", "before": "Action-Learning-Cycle and Dialogue", "after": "an action learning cycle and dialogue", "start_char_pos": 7944, "end_char_pos": 7978}, {"type": "A", "before": null, "after": "the", "start_char_pos": 8018, "end_char_pos": 8018}, {"type": "R", "before": "principles", "after": "characteristics", "start_char_pos": 8092, "end_char_pos": 8102}, {"type": "D", "before": "This combination encourages organizations to shift to a more interconnected way of thinking. Organizations should become more like communities that employees can feel a commitment to.Chawla, Sarita", "after": null, "start_char_pos": 8130, "end_char_pos": 8327}, {"type": "D", "before": "Renesch, John (1995). Learning Organizations: Developing Cultures for Tomorrow's Workplace. Portland, OR: Productivity Press (p. 16).", "after": null, "start_char_pos": 8328, "end_char_pos": 8461}, {"type": "D", "before": "Improved efficiency", "after": null, "start_char_pos": 8721, "end_char_pos": 8740}, {"type": "A", "before": null, "after": "Chawla, Sarita", "start_char_pos": 9261, "end_char_pos": 9261}, {"type": "A", "before": null, "after": "Renesch, John (1995). Learning Organizations: Developing Cultures for Tomorrow's Workplace. Portland, OR: Productivity Press (p. 16).", "start_char_pos": 9262, "end_char_pos": 9262}, {"type": "D", "before": "There are criticisms of Learning OrganizationHsu, SW (2020) Still in search of Learning Organization? The Learning Organization, 27 (1): 31-41", "after": null, "start_char_pos": 9671, "end_char_pos": 9813}, {"type": "A", "before": null, "after": "Lean startup", "start_char_pos": 9907, "end_char_pos": 9907}, {"type": "D", "before": "The Learning Organization", "after": null, "start_char_pos": 10000, "end_char_pos": 10025}, {"type": "D", "before": "Barker, Randolph T.", "after": null, "start_char_pos": 10026, "end_char_pos": 10045}, {"type": "D", "before": "Camarata, Martin R. (1998). The role of communication in creating and maintaining a learning organization: preconditions, indicators, and disciplines, The Journal of Business Communication, 35 (4), 443-467.", "after": null, "start_char_pos": 10046, "end_char_pos": 10252}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 10282, "end_char_pos": 10283}, {"type": "R", "before": "\" '", "after": ". New York:", "start_char_pos": 10333, "end_char_pos": 10336}, {"type": "R", "before": "'.", "after": ". Cummings, Thomas G. (ed.) (2008). Handbook of Organization Development. Los Angeles: Sage.", "start_char_pos": 10361, "end_char_pos": 10363}, {"type": "R", "before": "Schwandt, David R. , Marquardt, Michael J. (2000). Organizational Learning . Boca Raton: St. Lucie", "after": "Garvin, David A. (2000). Learning in Action: A Guide to Putting the Learning Organization to Work. Boston: Harvard Business School Press. Flood, Robert L. (1999). Rethinking the Fifth Discipline: Learning Within the Unknowable. London; New York: Routledge. Aubrey, Robert; Cohen, Paul M. (1995). Working Wisdom: Timeless Skills and Vanguard Strategies for Learning Organizations. San Francisco: Jossey-Bass. Chawla, Sarita; Renesch, John (eds.) (1995). Learning Organizations: Developing Cultures for Tomorrow's Workplace. Portland, OR: Productivity", "start_char_pos": 10506, "end_char_pos": 10604}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 10628, "end_char_pos": 10629}, {"type": "R", "before": ".,", "after": ";", "start_char_pos": 10643, "end_char_pos": 10645}, {"type": "R", "before": ".,", "after": ";", "start_char_pos": 10665, "end_char_pos": 10667}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 10684, "end_char_pos": 10685}, {"type": "A", "before": null, "after": "eds.) (", "start_char_pos": 10704, "end_char_pos": 10704}, {"type": "R", "before": "Hsu, SW (2020)Still in search of", "after": "Watkins, Karen E.; Marsick, Victoria J. (1993). Sculpting the", "start_char_pos": 10773, "end_char_pos": 10805}, {"type": "R", "before": "Towards a radical account of", "after": "Lessons in the Art and Science of Systemic Change. San Francisco: Jossey-Bass. Senge, Peter M. (1990/2006).", "start_char_pos": 10829, "end_char_pos": 10857}, {"type": "R", "before": ". The Learning Organization", "after": ": The Art and Practice of the Learning Organization (Revised edition). New York: Currency/Doubleday", "start_char_pos": 10879, "end_char_pos": 10906}], "sents_char_pos": [0, 89, 158, 176, 220, 282, 576, 612, 737, 835, 948, 970, 996, 1015, 1108, 1198, 1398, 1534, 1630, 1788, 1806, 1895, 2030, 2062, 2106, 2150, 2217, 2341, 2501, 2602, 2690, 2898, 3077, 3317, 3332, 3428, 3494, 3566, 3657, 3736, 3819, 3949, 4051, 4107, 4166, 4197, 4215, 4357, 4479, 4550, 4606, 4698, 4860, 4880, 4895, 4925, 4940, 5099, 5338, 5432, 5492, 5640, 5772, 5939, 6095, 6110, 6177, 6363, 6486, 6634, 6748, 6837, 6895, 7121, 7152, 7316, 7350, 7472, 7545, 7643, 7829, 7877, 7980, 8034, 8129, 8222, 8313, 8349, 8419, 8461, 8609, 8675, 8702, 8720, 8741, 9230, 9260, 9324, 9424, 9542, 9670, 9772, 10073, 10252, 10281, 10416, 10471, 10505, 10556, 10611, 10711, 10772, 10880]}
+{"doc_id": "14315840", "revision_depth": "1", "before_revision": "Anatomy overview Human Vertebral Column Vertebra Superior View The spinal cord is housed in a bony hollow tube called the vertebral column.McKinley, Michael; O'Loughlin, Valerie; Pennefather-O'Brian, Elizabeth; Harris, Ronald (2015). Human Anatomy (Fourth ed.). New York, NY: McGraw Hill. pp. 204\u2013213. . The vertebral column is composed of many ring-like bones called vertebra (plural: vertebrae) and it spans from the skull to the sacrum. Each vertebra has a hole in the center called the vertebral foramen through which the spinal cord traverses. The vertebral arch is composed of several anatomical features in addition to laminae that must be taken into account when performing a laminotomy. In the center of the vertebral arch is a bony projection called the spinous process. The spinous process is located on the posterior or back side of the vertebra and serves as the attachment point for ligaments and muscles which support and stabilize the vertebral column. Each vertebra has two lateral bony projections called the transverse processes that are located on either side of the vertebral arch. Transverse processes come into contact with the ribs and serve as attachment points for muscles and ligaments that stabilize the vertebral column. The lamina is the segment of bone that connects the spinous process to the transverse process. Each vertebra has two lamina, one on each side of the spinous process. Vertebral Column: Lamina Types US Navy Cmdr. Kenneth Kubis, director of surgical services aboard the Military Sealift Command hospital ship USNS Mercy uses an operating microscope Different types of laminotomies are defined by the type of instrument used to visualize the surgical procedure, what vertebra the procedure is performed on, and whether or not both lamina of a vertebra are operated on or just one.Spetzger, Uwe; Von Scilling, Andrej; Winkler, Gerd; Wahrburg, J\u00fcrgen; K\u00f6nig, Alexander (2013). \"The past, present and future of minimally invasive spine surgery: A review and speculative outlook\". Minimally Invasive Therapy & Allied Technologies. 22 (4): 227\u2013241 \u2013 via Web of Science. Common types of laminotomies include : Microscopic/Microdecompression laminotomy- uses an operating microscope in order to magnify the area being operated on. The operating microscope is typically mounted to the surgery table and held over the area of operation Overdevest , GM; Jacobs, W; Vleggeert-Lankamp, C; Thom\u00e9, C; Gunzburg, R; Peul, W (2015). \"Effectiveness of posterior decompression techniques compared with conventional laminectomy for lumbar stenosis (Review)\". Cochrane Database of Systematic Reviews. \u2013 via Web of Science. Endoscopic/Microendoscopic decompression laminotomy uses an endoscope to visualize the surgical procedure. An endoscope is a small tube-shaped camera inserted into the patient in order to visualize the surgical procedure internally. Cervical laminotomy - is performed on cervical vertebrae which are vertebrae closest to the head. Thoracic laminotomy- is performed on thoracic vertebrae, or midlevel vertebrae . Lumbar laminotomy - is performed on lumbar vertebrae which are the vertebrae closest to the sacrum. Bilateral laminotomy- the removal of a part of bone from both of the lamina of a single vertebra. Unilateral laminotomy- the removal of a part of bone from only one lamina of a vertebra . These classifications of laminotomies can be combined to form the most descriptive name for the procedure possible. For example, an endoscopic unilateral lumbar laminotomy is the removal of bone from only one lamina of a lumbar vertebrae using an endoscope. Procedure Featured: Ligamentum Flavum The procedure of a laminotomy remains largely the same regardless of the instrument used, or the level of vertebrae operated on. Laminotomies require general or spinal anesthesia and frequently require a hospital stay following the procedure- although the duration of the stay depends on the physical condition of the individual and their reason for having a laminotomy.Costandi, Shrif; Chopko, Bohdan; Mekhail, Mena; Dews, Teresa; Mekhail, Nagy (2015). \"Lumbar Spinal Stenosis: Therapeutic Options Review\". Pain Practice. 15 (1): 68\u201381. \u2013 via Web of Science. A laminotomy takes about 70\u201385 minutes depending on the type of procedure used. Unilateral laminotomies typically require less time because bone is only removed from one lamina, whereas bilateral laminotomies usually take more time because bone is removed from both laminae. The level of the vertebrae that the laminotomy is performed on and what instrument is used produce no significant differences in the length of the procedure. Both the unilateral and bilateral laminotomy are performed in a shorter time period compared to a conventional laminectomy which takes over 100 minutes on average. During a laminotomy, the individual lies on his or her stomach with the back facing up towards the physician. An initial incision is made down the middle of the back exposing the vertebrae on which the laminotomy will be performed. In this procedure, the spinous process and the ligaments of the vertebral column are kept intact, but the muscles adjacent to the vertebral column known as the paraspinous muscles ( Example : spinalis muscle) must be separated from the spinous process and vertebral arch. In a unilateral laminotomy, these muscles are only detached from the side on which the laminotomy is being performed. During a bilateral laminotomy, these muscles must be removed on both sides of the vertebrae. The ligaments connecting the lamina of upper and lower vertebrae, known as Ligamenta flava are often removed or remodeled in this procedure to adjust for the small amount of bone lost. Using either a microscope or an endoscope to have a visual of the procedure, a small surgical drill is used to remove a part of bone from the lamina on one or both laminae of the vertebrae. Laminotomies can be performed on multiple vertebrae during the same surgery; this is known as a multi-level laminotomy. A slightly different, but commonly used procedure of laminotomy is the unilateral laminotomy for bilateral spinal decompression. This minimally invasive procedure is often used to treat patients with excessive pressure in the vertebral column that must be relieved. In this procedure, the same spinal ligaments are kept intact and the paraspinous muscles must still be detached.Levy, Robert; Deer, Timothy (2012). \"Systematic Safety review and Meta-Analysis of Procedural Experience Using Percutaneous Access to Treat Symptomatic Lumbar Spinal Stenosis\". Pain Medicine. 13: 1554\u20131561 \u2013 via Web of Science. A unilateral laminotomy is performed on one lamina of a vertebra. This removal of bone from one lamina provides an opening into the spinal canal. Using a microscope or an endoscope to visualize the procedure, surgical tools are inserted through this opening into the spinal canal. The surgical tools are then navigated underneath the spinous process and across the spinal canal to reach the other lamina on the opposite side of the vertebra to perform a second laminotomy. The incision for this procedure is smaller because doctors only need access to one lamina yet can perform a bilateral laminotomy- remove bone from both lamina of a single vertebra. The unilateral laminotomy with bilateral spinal decompression procedure was developed almost 20 years ago and is a common successful surgical treatment for lumbar spinal stenosis. Reasons for performing a laminotomy A laminotomy is typically used to relieve pressure from the spinal canal. Excessive pressure in the spinal canal causes the spinal canal and spinal nerves to be compressed which can be very painful and can impair motor control and/or sensation. A common disorder that causes increased pressure in the spinal canal is lumbar spinal stenosis. Lumbar spinal stenosis is formally defined as a decline in diameter length of either the neural foramina, lateral recess, or spinal canal. Stenosis is classified as a decaying disease because it causes the canal to gradually become more and more narrow which can cause pain or loss of function. Common symptoms of lumbar stenosis are pain, fatigue, weakness of the muscle and numbness. Stenosis can be caused by old age or an injury to the vertebral column and usually requires a CT scan or MRI to diagnose. Performing a laminotomy can relieve pressure in the spinal canal caused by lumbar stenosis and therefore alleviate symptoms. Laminotomies are also performed to create a window into the spinal canal in order to fix a problem that is within the spinal canal . Laminotomies are frequently used as a way to surgically repair a spinal disc herniation at any level of the vertebral column (cervical, thoracic, lumbar). A herniated disc can compress spinal nerves and cause intense pain and impaired sensation. Removing a portion of the lamina allows physicians to be able to access and repair the herniated disc. Laminotomies may also be used to treat intraspinal lesions such as spinal tumor or problems with the blood vessels supplying the spinal cord. In any scenario where the inside of the spinal canal must be accessed or there is an increase in pressure in the spinal canal, laminotomy may be used to treat the disorder or alleviate symptoms. Benefits The laminotomy procedure has many benefits as to why it is a preferred spinal surgery since it is less invasive than other spinal procedures such as a laminectomy or a spinal fusion. Once a laminotomy procedure is done, patients have a great improvement in their pain and mobility. Laminotomies are usually safer than other surgeries that are open or invasive. This surgery usually is shorter than other spinal decompression procedures by having an average duration of 70\u201385 minutes, whereas other decompression surgeries can have a duration anywhere from 90 to 109 minutes. Laminotomies are usually more cost efficient than other surgical decompression surgeries. In 2007, it was seen that laminotomies were around $10,000, whereas other surgical procedures were around $24,000. Smaller skin incisions and scarring as well as less surgical trauma are also a benefit of laminotomy. With this procedure , there is usually a faster recovery time that results in a shorter hospital stay if one is necessary at all. During the surgery there is also a benefit of minimizing the injury to muscles, ligaments, and bones in the spine since more invasive surgeries have a greater risk of damaging them. General anesthesia is usually required, but postoperative spinal instability is typically limited. Risks and potential complications Since this procedure is a surgical technique there are many complications that can occur either during or after the surgery. Some major complications that can occur are cerebrospinal fluid leaks, dural tears, infection, or epidural hematomas. Death is also a risk , howeverit only occurs one per thousand surgeries. Other complications that can occur during surgery are nerve root damage, which can lead to nerve injury or paraplegia, and a significant amount of blood loss that will lead to blood transfusions. Laminotomy vs. laminectomy Radiographic imaging %DIFDELCMD < %DIFDELCMD < %%% X-Rays For radiographic imaging, an x-ray is the least effective way to collect information when observing a patient with lumbar spinal stenosis. A CT scan provides a 360 degree compiled view of the vertebrae that is more precise than an x-ray. MRI MRI of the lumbar spine showing spinal stenosis Since an MRI provides excellent imaging of blood vessels and tissues, it is recognized as the best type of imaging to observe signs associated with lumbar compression. The precise measurement of the diameter of the spinal canal is a particularly important component when determining the severity of the stenosis itself. High strength 3-Tesla MRI machines are being utilized due to the increased vascular imaging capabilities. Better resolution capacity allows for more detailed observations by the healthcare provider. The sharp contrast of the high power MRI outlines details in the vertebra that are critical when examining a patient with lumbar spinal stenosis who may need a laminotomy. MRI scanning post invasive surgery is used to see the quality of the surgery itself, yet the appropriate postoperative time elapsed before conducting an MRI is a debated topic. CT scans A CT scan is not the most effective imaging technique when observing lumbar abnormalities, however it can supplement an MRI by detecting certain degenerative processes. When determining whether or not a laminotomy will be beneficial for the patient, a healthcare provider must assess the severity of the possible abnormalities. Out of all the potential reasons to have a laminotomy performed, lumbar spinal stenosis is the chief reason. CT scans are used specifically to pinpoint a buckled lumbar ligamentum flavum as well as facet hypertrophy, which are some of the main pathophysiological changes indicative of lumbar spinal stenosis. Even though a CT scan can reveal these pertinent signs of lumbar spinal stenosis, it can sometimes give a cloudy image due to the shadowing of the tissue contrast. When this occurs, an intrathecal myelography contrast is conducted with the CT scan to fix the abnormal contrast. A CT scan can also reveal an increase in the cross sectional area of the L3 vertebrae, which ultimately decreases the cross sectional area of the spinal canal. As an increase in the size of the L3 vertebrae occurs, pressure builds up on the cauda equina, commonly causing pain in the lower back and lower extremities. Cauda equina compression can also be due to stenosis of L4-5 region as well. Even though the CT scan allows for intensive image studying, the fixed nature of the image collection process alone is not enough to reach a definitive diagnosis of lumbar spinal stenosis. The outcome of the CT scan can help compile physiological evidence that the patient has lumbar spinal stenosis, and that the patient may potentially benefit from a laminotomy to improve his or her quality of life. Alternative minimally invasive procedures Minimally invasive procedures are a more common alternative due to the decreased risk of damaging significant muscle tissue. The difference between invasive and minimally invasive spinal surgeries is that minimally invasive procedures involves a series of small incisions. Minimally invasive procedures can be performed anywhere along the spine, and have been used to treat various abnormalities. The percutaneous pedicle screw fixation technique allows for a procedure that presents minimal risk to the patient. Fluoroscopic image guided navigation through these portals allows for surgeons to perform more efficient procedures. Minimally invasive procedures often yield a much faster recovery time than fully invasive surgeries, making them more appealing to patients. Laminectomies have always been the gold standard when treating lumbar spinal stenosis, but recently, less invasive surgeries have emerged as a safer alternative treatment that helps maintain the postoperative structural integrity of the spine. Spinal microsurgery Spinal microsurgery is a minimally invasive unilateral laminotomy used to correct bilateral lumbar spinal compression. Spinal microsurgery is the most common and effective microsurgical decompression treatment for patients that present with moderate to severe spinal stenosis. Spinal microsurgeries are performed with high magnification 3D imaging of the fixated area of the spine, reducing the potential risk of harming the architecture of the spine itself. Endoscopic spine surgery Endoscopic spine surgeries can be used to treat thoracic lesions, and have been proven to be a much safer option than a thoracotomy. However, an endoscopic spine surgery can be performed to treat other spinal conditions, such as a herniated lumbar disc. Recovery time from this type of surgical treatment is often very quick, with patients ambulating within a few hours of the procedure. Spinal fusion Spinal fusion involves fusing two vertebrae together using a spacer, and is intended to prohibit movement at that particular segment. Screws are typically inserted to assure that the spacer is held in place. The most common lumbar spinal fusion occurs between L4 and L5. A lumbar spinal fusion may be recommended when non-surgical treatment options for severe degenerative disc disease are ineffective. A laminotomy would not be effective in this case, since this procedure is concerning a degenerated disc that needs to be removed in order to relive certain symptoms.", "after_revision": "Anatomy overview Human Vertebral Column Vertebra Superior View The spinal cord is housed in a bony hollow tube called the vertebral column.McKinley, Michael; O'Loughlin, Valerie; Pennefather-O'Brian, Elizabeth; Harris, Ronald (2015). Human Anatomy (Fourth ed.). New York, NY: McGraw Hill. pp. 204\u2013213. . The vertebral column is composed of many ring-like bones called vertebra (plural: vertebrae) and it spans from the skull to the sacrum. Each vertebra has a hole in the center called the vertebral foramen through which the spinal cord traverses. The vertebral arch is composed of several anatomical features in addition to laminae that must be taken into account when performing a laminotomy. In the center of the vertebral arch is a bony projection called the spinous process. The spinous process is located on the posterior or back side of the vertebra and serves as the attachment point for ligaments and muscles which support and stabilize the vertebral column. Each vertebra has two lateral bony projections called the transverse processes which are located on either side of the vertebral arch. Transverse processes come into contact with the ribs and serve as attachment points for muscles and ligaments that stabilize the vertebral column. The lamina is the segment of bone that connects the spinous process to the transverse process. Each vertebra has two lamina, one on each side of the spinous process. Vertebral Column: Lamina Types US Navy Cmdr. Kenneth Kubis, director of surgical services aboard the Military Sealift Command hospital ship USNS Mercy uses an operating microscope Different types of laminotomy are defined by the type of instrument used to visualize the procedure, what vertebra the procedure is performed on, and whether or not both lamina of a vertebra are operated on or just one.Spetzger, Uwe; Von Scilling, Andrej; Winkler, Gerd; Wahrburg, J\u00fcrgen; K\u00f6nig, Alexander (2013). \"The past, present and future of minimally invasive spine surgery: A review and speculative outlook\". Minimally Invasive Therapy & Allied Technologies. 22 (4): 227\u2013241 \u2014 via Web of Science. Common types of laminotomy : Microscopic/Microdecompression laminotomy uses an operating microscope in order to magnify the area being operated on. The operating microscope is typically mounted to the surgery table and held over the area of operationOverdevest , GM; Jacobs, W; Vleggeert-Lankamp, C; Thom\u00e9, C; Gunzburg, R; Peul, W (2015). \"Effectiveness of posterior decompression techniques compared with conventional laminectomy for lumbar stenosis (Review)\". Cochrane Database of Systematic Reviews. \u2014 via Web of Science. Endoscopic/Microendoscopic decompression laminotomy uses an endoscope , a small tube-shaped camera inserted into the patient in order to visualize the procedure internally. Cervical laminotomy is performed on cervical vertebrae , the ones closest to the head. Thoracic laminotomy is performed on thoracic (middle) vertebrae . Lumbar laminotomy is performed on lumbar vertebrae , the ones closest to the sacrum. Bilateral laminotomy is removal of a part of the bone from both lamina of a single vertebra. Unilateral laminotomy is removal of a part of the bone from only one lamina . These classifications of laminotomies can be combined to form the most descriptive name for the procedure possible. For example, an endoscopic unilateral lumbar laminotomy is the removal of bone from only one lamina of a lumbar vertebrae using an endoscope. Procedure Featured: Ligamentum Flavum The procedure of a laminotomy remains largely the same regardless of the instrument used, or the level of vertebrae operated on. Laminotomies require general or spinal anesthesia and frequently require a hospital stay following the procedure\u2014 although the duration of the stay depends on the physical condition of the individual and their reason for having a laminotomy.Costandi, Shrif; Chopko, Bohdan; Mekhail, Mena; Dews, Teresa; Mekhail, Nagy (2015). \"Lumbar Spinal Stenosis: Therapeutic Options Review\". Pain Practice. 15 (1): 68\u201381. \u2014 via Web of Science. A laminotomy takes about 70\u201385 minutes depending on the type of procedure used. Unilateral laminotomies typically require less time because bone is removed from only one lamina, whereas bilateral laminotomies usually take more time because bone is removed from both laminae. The level of the vertebrae that the laminotomy is performed on and what instrument is used produce no significant differences in the length of the procedure. Both unilateral and bilateral laminotomies are performed in a shorter time period compared to a conventional laminectomy which takes over 100 minutes on average. During a laminotomy, the individual lies on his or her stomach with the back facing up towards the physician. An initial incision is made down the middle of the back exposing the vertebrae on which the laminotomy will be performed. In this procedure, the spinous process and the ligaments of the vertebral column are kept intact, but the muscles adjacent to the vertebral column known as the paraspinous muscles ( example : spinalis muscle) must be separated from the spinous process and vertebral arch. In a unilateral laminotomy, these muscles are detached only from the side on which the laminotomy is being performed. During a bilateral laminotomy, these muscles must be removed on both sides of the vertebrae. The ligaments connecting the lamina of upper and lower vertebrae, known as Ligamenta flava are often removed or remodeled in this procedure to adjust for the small amount of bone lost. Using either a microscope or an endoscope to have a visual of the procedure, a small surgical drill is used to remove a part of bone from one or both laminae of the vertebrae. Laminotomies can be performed on multiple vertebrae during the same surgery; this is known as a multi-level laminotomy. A slightly different, but commonly used procedure of laminotomy is the unilateral laminotomy for bilateral spinal decompression. This minimally invasive procedure is often used to treat patients with excessive pressure in the vertebral column that must be relieved. In this procedure, the same spinal ligaments are kept intact and the paraspinous muscles must still be detached.Levy, Robert; Deer, Timothy (2012). \"Systematic Safety review and Meta-Analysis of Procedural Experience Using Percutaneous Access to Treat Symptomatic Lumbar Spinal Stenosis\". Pain Medicine. 13: 1554\u20131561 \u2014 via Web of Science. A unilateral laminotomy is performed on one lamina of a vertebra. This removal of bone from one lamina provides an opening into the spinal canal. Using a microscope or an endoscope to visualize the procedure, surgical tools are inserted through this opening into the spinal canal. The surgical tools are then navigated underneath the spinous process and across the spinal canal to reach the other lamina on the opposite side of the vertebra to perform a second laminotomy. The incision for this procedure is smaller because doctors need only access one lamina yet can perform a bilateral laminotomy\u2014 remove bone from both lamina of a single vertebra. The unilateral laminotomy with bilateral spinal decompression procedure was developed almost 20 years ago and is a common successful surgical treatment for lumbar spinal stenosis. Reasons for performing a laminotomy A laminotomy is typically used to relieve pressure from the spinal canal. Excessive pressure in the spinal canal causes the spinal canal and spinal nerves to be compressed which can be very painful and can impair motor control and/or sensation. A common disorder that causes increased pressure in the spinal canal is lumbar spinal stenosis. Lumbar spinal stenosis is formally defined as a decline in diameter length of either the neural foramina, lateral recess, or spinal canal. Stenosis is classified as a decaying disease because it causes the canal to gradually become more and more narrow which can cause pain or loss of function. Common symptoms of lumbar stenosis are pain, fatigue, weakness of the muscle and numbness. Stenosis can be caused by old age or an injury to the vertebral column and usually requires a CT scan or MRI to diagnose. Performing a laminotomy can relieve pressure in the spinal canal caused by lumbar stenosis and therefore alleviate symptoms. Laminotomies are also performed to create a window into the spinal canal . Laminotomies are frequently used as a way to surgically repair a spinal disc herniation at any level of the vertebral column (cervical, thoracic, lumbar). A herniated disc can compress spinal nerves and cause intense pain and impaired sensation. Removing a portion of the lamina allows physicians to be able to access and repair the herniated disc. Laminotomies may also be used to treat intraspinal lesions such as spinal tumor or problems with the blood vessels supplying the spinal cord. In any scenario where the inside of the spinal canal must be accessed or there is an increase in pressure in the spinal canal, laminotomy may be used to treat the disorder or alleviate symptoms. Benefits The laminotomy procedure has many benefits as to why it is a preferred spinal surgery since it is less invasive than other spinal procedures such as a laminectomy or a spinal fusion. Once a laminotomy procedure is done, patients have a great improvement in their pain and mobility. Laminotomies are usually safer than other surgeries that are open or invasive. This surgery usually is shorter than other spinal decompression procedures by having an average duration of 70\u201385 minutes, whereas other decompression surgeries can have a duration anywhere from 90 to 109 minutes. Laminotomies are usually more cost efficient than other surgical decompression surgeries. In 2007, it was seen that laminotomies were around $10,000, whereas other surgical procedures were around $24,000. Smaller skin incisions and scarring as well as less surgical trauma are also a benefit of laminotomy. With this procedure there is usually a faster recovery time , and a shorter hospital stay if one is necessary at all. During the surgery there is also a benefit of minimizing the injury to muscles, ligaments, and bones in the spine since more invasive surgeries have a greater risk of damaging them. General anesthesia is usually required, but postoperative spinal instability is typically limited. Risks and potential complications Since this procedure is a surgical technique there are many complications that can occur either during or after the surgery. Some major complications that can occur are cerebrospinal fluid leaks, dural tears, infection, or epidural hematomas. Death is also a risk ; however, it occurs only once per thousand surgeries. Other potential complications are nerve root damage, which can lead to nerve injury or paraplegia, and a significant amount of blood loss that will lead to blood transfusions. Laminotomy versus laminectomy Radiographic imaging %DIFDELCMD < %DIFDELCMD < %%% X-Rays For radiographic imaging, an x-ray is the least effective way to collect information when observing a patient with lumbar spinal stenosis. A CT scan provides a 360-degree compiled view of the vertebrae that is more precise than an x-ray. MRI MRI of the lumbar spine showing spinal stenosis Since an MRI provides excellent imaging of blood vessels and tissues, it is recognized as the best type of imaging to observe signs associated with lumbar compression. The precise measurement of the diameter of the spinal canal is a particularly important component when determining the severity of the stenosis itself. High strength 3-Tesla MRI machines are being utilized due to the increased vascular imaging capabilities. Better resolution capacity allows for more detailed observations by the healthcare provider. The sharp contrast of the high power MRI outlines details in the vertebra that are critical when examining a patient with lumbar spinal stenosis who may need a laminotomy. MRI scanning post invasive surgery is used to see the quality of the surgery itself, yet the appropriate postoperative time elapsed before conducting an MRI is a debated topic. CT scans A CT scan is not the most effective imaging technique when observing lumbar abnormalities, however it can supplement an MRI by detecting certain degenerative processes. When determining whether or not a laminotomy will be beneficial for the patient, a healthcare provider must assess the severity of the possible abnormalities. Out of all the potential reasons to have a laminotomy performed, lumbar spinal stenosis is the chief reason. CT scans are used specifically to pinpoint a buckled lumbar ligamentum flavum as well as facet hypertrophy, which are some of the main pathophysiological changes indicative of lumbar spinal stenosis. Even though a CT scan can reveal these pertinent signs of lumbar spinal stenosis, it can sometimes give a cloudy image due to the shadowing of the tissue contrast. When this occurs, an intrathecal myelography contrast is conducted with the CT scan to fix the abnormal contrast. A CT scan can also reveal an increase in the cross sectional area of the L3 vertebrae, which ultimately decreases the cross sectional area of the spinal canal. As an increase in the size of the L3 vertebrae occurs, pressure builds up on the cauda equina, commonly causing pain in the lower back and lower extremities. Cauda equina compression can also be due to stenosis of L4-5 region as well. Even though the CT scan allows for intensive image studying, the fixed nature of the image collection process alone is not enough to reach a definitive diagnosis of lumbar spinal stenosis. The outcome of the CT scan can help compile physiological evidence that the patient has lumbar spinal stenosis, and that the patient may potentially benefit from a laminotomy to improve his or her quality of life. Alternative minimally invasive procedures Minimally invasive procedures are a more common alternative due to the decreased risk of damaging significant muscle tissue. The difference between invasive and minimally invasive spinal surgeries is that minimally invasive procedures involves a series of small incisions. Minimally invasive procedures can be performed anywhere along the spine, and have been used to treat various abnormalities. The percutaneous pedicle screw fixation technique allows for a procedure that presents minimal risk to the patient. Fluoroscopic image guided navigation through these portals allows for surgeons to perform more efficient procedures. Minimally invasive procedures often yield a much faster recovery time than fully invasive surgeries, making them more appealing to patients. Laminectomies have always been the gold standard when treating lumbar spinal stenosis, but recently, less invasive surgeries have emerged as a safer alternative treatment that helps maintain the postoperative structural integrity of the spine. Spinal microsurgery Spinal microsurgery is a minimally invasive unilateral laminotomy used to correct bilateral lumbar spinal compression. Spinal microsurgery is the most common and effective microsurgical decompression treatment for patients who present with moderate to severe spinal stenosis. Spinal microsurgeries are performed with high magnification 3-D imaging of the fixated area of the spine, reducing the potential risk of harming the architecture of the spine itself. Endoscopic spine surgery Endoscopic spine surgeries can be used to treat thoracic lesions, and have been proven to be a much safer option than a thoracotomy. However, an endoscopic spine surgery can be performed to treat other spinal conditions, such as a herniated lumbar disc. Recovery time from this type of surgical treatment is often very quick, with patients ambulating within a few hours of the procedure. Spinal fusion Spinal fusion involves fusing two vertebrae together using a spacer, and is intended to prohibit movement at that particular segment. Screws are typically inserted to assure that the spacer is held in place. The most common lumbar spinal fusion occurs between L4 and L5. A lumbar spinal fusion may be recommended when non-surgical treatment options for severe degenerative disc disease are ineffective. A laminotomy would not be effective in this case, since this procedure is concerning a degenerated disc that needs to be removed in order to relive certain symptoms.", "edit_actions": [{"type": "R", "before": "that", "after": "which", "start_char_pos": 1048, "end_char_pos": 1052}, {"type": "R", "before": "Types", "after": "Types", "start_char_pos": 1441, "end_char_pos": 1446}, {"type": "R", "before": "laminotomies", "after": "laminotomy", "start_char_pos": 1615, "end_char_pos": 1627}, {"type": "D", "before": "surgical", "after": null, "start_char_pos": 1688, "end_char_pos": 1696}, {"type": "R", "before": "\u2013", "after": "\u2014", "start_char_pos": 2089, "end_char_pos": 2090}, {"type": "R", "before": "laminotomies include", "after": "laminotomy", "start_char_pos": 2127, "end_char_pos": 2147}, {"type": "R", "before": "laminotomy-", "after": "laminotomy", "start_char_pos": 2181, "end_char_pos": 2192}, {"type": "R", "before": "operation Overdevest", "after": "operationOverdevest", "start_char_pos": 2363, "end_char_pos": 2383}, {"type": "R", "before": "\u2013", "after": "\u2014", "start_char_pos": 2626, "end_char_pos": 2627}, {"type": "R", "before": "to visualize the surgical procedure. An endoscope is", "after": ",", "start_char_pos": 2718, "end_char_pos": 2770}, {"type": "D", "before": "surgical", "after": null, "start_char_pos": 2850, "end_char_pos": 2858}, {"type": "D", "before": "-", "after": null, "start_char_pos": 2901, "end_char_pos": 2902}, {"type": "R", "before": "which are vertebrae", "after": ", the ones", "start_char_pos": 2938, "end_char_pos": 2957}, {"type": "R", "before": "laminotomy-", "after": "laminotomy", "start_char_pos": 2988, "end_char_pos": 2999}, {"type": "R", "before": "vertebrae, or midlevel vertebrae", "after": "(middle) vertebrae", "start_char_pos": 3025, "end_char_pos": 3057}, {"type": "D", "before": "-", "after": null, "start_char_pos": 3078, "end_char_pos": 3079}, {"type": "R", "before": "which are the vertebrae", "after": ", the ones", "start_char_pos": 3113, "end_char_pos": 3136}, {"type": "R", "before": "laminotomy- the", "after": "laminotomy is", "start_char_pos": 3170, "end_char_pos": 3185}, {"type": "A", "before": null, "after": "the", "start_char_pos": 3207, "end_char_pos": 3207}, {"type": "D", "before": "of the", "after": null, "start_char_pos": 3223, "end_char_pos": 3229}, {"type": "R", "before": "laminotomy- the", "after": "laminotomy is", "start_char_pos": 3270, "end_char_pos": 3285}, {"type": "A", "before": null, "after": "the", "start_char_pos": 3307, "end_char_pos": 3307}, {"type": "D", "before": "of a vertebra", "after": null, "start_char_pos": 3334, "end_char_pos": 3347}, {"type": "R", "before": "procedure-", "after": "procedure\u2014", "start_char_pos": 3878, "end_char_pos": 3888}, {"type": "R", "before": "\u2013", "after": "\u2014", "start_char_pos": 4184, "end_char_pos": 4185}, {"type": "R", "before": "only removed from", "after": "removed from only", "start_char_pos": 4354, "end_char_pos": 4371}, {"type": "D", "before": "the", "after": null, "start_char_pos": 4644, "end_char_pos": 4647}, {"type": "R", "before": "laminotomy", "after": "laminotomies", "start_char_pos": 4673, "end_char_pos": 4683}, {"type": "R", "before": "Example", "after": "example", "start_char_pos": 5217, "end_char_pos": 5224}, {"type": "R", "before": "only detached", "after": "detached only", "start_char_pos": 5353, "end_char_pos": 5366}, {"type": "D", "before": "the lamina on", "after": null, "start_char_pos": 5841, "end_char_pos": 5854}, {"type": "R", "before": "\u2013", "after": "\u2014", "start_char_pos": 6597, "end_char_pos": 6598}, {"type": "R", "before": "only need access to", "after": "need only access", "start_char_pos": 7151, "end_char_pos": 7170}, {"type": "R", "before": "laminotomy-", "after": "laminotomy\u2014", "start_char_pos": 7210, "end_char_pos": 7221}, {"type": "D", "before": "in order to fix a problem that is within the spinal canal", "after": null, "start_char_pos": 8536, "end_char_pos": 8593}, {"type": "D", "before": ",", "after": null, "start_char_pos": 10193, "end_char_pos": 10194}, {"type": "R", "before": "that results in", "after": ", and", "start_char_pos": 10235, "end_char_pos": 10250}, {"type": "R", "before": ", howeverit only occurs one", "after": "; however, it occurs only once", "start_char_pos": 10882, "end_char_pos": 10909}, {"type": "R", "before": "complications that can occur during surgery", "after": "potential complications", "start_char_pos": 10940, "end_char_pos": 10983}, {"type": "R", "before": "vs.", "after": "versus", "start_char_pos": 11141, "end_char_pos": 11144}, {"type": "R", "before": "360 degree", "after": "360-degree", "start_char_pos": 11375, "end_char_pos": 11385}, {"type": "R", "before": "that", "after": "who", "start_char_pos": 15395, "end_char_pos": 15399}, {"type": "R", "before": "3D", "after": "3-D", "start_char_pos": 15509, "end_char_pos": 15511}], "sents_char_pos": [0, 139, 157, 178, 210, 233, 261, 439, 548, 695, 780, 968, 1102, 1249, 1344, 1415, 1460, 1826, 1840, 1862, 1877, 1895, 1920, 2022, 2072, 2110, 2269, 2389, 2400, 2422, 2445, 2461, 2584, 2625, 2647, 2754, 2880, 2978, 3159, 3258, 3349, 3465, 3607, 3774, 4016, 4032, 4048, 4063, 4077, 4099, 4153, 4168, 4183, 4205, 4285, 4480, 4638, 4802, 4912, 5034, 5306, 5424, 5517, 5702, 5892, 5969, 6012, 6141, 6278, 6391, 6404, 6426, 6567, 6582, 6618, 6684, 6764, 6899, 7091, 7272, 7452, 7562, 7733, 7829, 7968, 8124, 8215, 8337, 8462, 8750, 8841, 8944, 9086, 9281, 9473, 9572, 9651, 9865, 9955, 10070, 10172, 10302, 10484, 10583, 10742, 10860, 10933, 11129, 11353, 11452, 11672, 11824, 11930, 12023, 12195, 12372, 12550, 12709, 12818, 13018, 13182, 13296, 13456, 13614, 13691, 13880, 14094, 14261, 14409, 14533, 14649, 14766, 14907, 15151, 15290, 15448, 15630, 15788, 15909, 16043, 16191, 16265, 16328, 16460]}
+{"doc_id": "1451336", "revision_depth": "1", "before_revision": "Scorponok was portrayed as a dangerous combination known as \"a thug with a brain\". Acting as infantry and a powerful enemy . He also displayed above-average scientific knowledge with an emphasis on chemistry. Although he brutishly shot his barrage of missiles like a \"thug\", his missiles would more often than not be enhanced via chemical experimentation and inventions. Scorponok has knowledge enough about Transformer anatomy and physiology that he was able to completely rebuild Megatron piece by piece after being destroyed by Terrorsaur. Inventions contributed to his works include : Mega Missile, Vibro Rocket, Surveillance Cyber Bee, Mood manipulating Cyber Bee, Cyber Sting fluid. Although he was an inventor, he was largely overshadowed by his comrades' scientific prowess . Not to mention most, if not all of Scorponok's creations didn't work or had some obvious flaw in their design. Scorponok had several important roles in season one, like finding an old Predacon cannon (which he almost lost to Cheetor) , and then chased Cheetor in the Darksyde with Waspinator . He then tried to infect Optimus Primal with a virus that was supposed to make him a coward, but instead made him a berserker. He was partners with Blackarachnia who betrayed him twice. Scorponok also didn't get along with Terrorsaur because Terrorsaur always wanted to usurp Megatron. Throughout season one, Scorponok's faith in Megatron was unmatched, almost to the extent of looking up to him. Scorponok was arguably the lone original Predacon who was completely loyal to Megatron; the other 4 original Predacons - Terrorsaur, Tarantulas, Waspinator, and Dinobot - all tried to usurp Megatron's position of leader at one point of the first season. Sadly this was never reciprocated, and Megatron treated Scorponok as disposable as the rest of his minions. In the season one finale, he joined Megatron and Terrorsaur at the alien structure, where the Maximals Rattrap and Optimus Primal were trying to get inside of it to rescue Airazor. But due to the truce, and their hopes of the Maximals possible destruction within the structure, the Predacons decided to help them. They used Scorponok's toxic sting so that they could enter the forcefield in an attempt to retrieve Airazor. Scorponok announced to Megatron that he had one mega missile to shoot at the Maximals while they were inside , to which Megatron replied, \"Excellent!\" With their plan to destroy the Maximals thwarted, Megatron, Terrorsaur , and Scorponok returned to their base which proved to play a significant part of the demise of Terrorsaur and Scorponok when their base was hit by the Quantum Surge . Scorponok seemingly died along with his rival, Terrorsaur, in the second-season premiere, when they both fell into a pit of magma as the quantum surge hit the planet from the destroyed Vok \"Planet Buster\". After this, Inferno took his place as Megatron's second-in-command. Ironically the very thing that supposedly destroyed Scorponok , just happens to be one of the few things his armor is immune or resistant to. He is virtually impervious to heat based attacks, however magma was the product of his demise. IDW Publishing Scorponok had a biography printed in the Beast Wars Sourcebook by IDW Publishing. According to his biography published in the Beast Wars Sourcebook Scorponok actually survived the events of season 2 and was turned into a transmetal scorpion, but he remained trapped in the magma, unable to escape until after Megatron was defeated and the Maximals left with him for Cybertron. What happened to Scorponok afterwards is unknown.", "after_revision": "Scorponok was portrayed as a dangerous combination known as \"a thug with a brain\". Acting as infantry and a powerful enemy , he also displayed above-average scientific knowledge with an emphasis on chemistry. Although he brutishly shot his barrage of missiles like a \"thug\", his missiles would more often than not be enhanced via chemical experimentation and inventions. Scorponok has sufficient knowledge about Transformer anatomy and physiology that he was able to completely rebuild Megatron piece by piece after being destroyed by Terrorsaur. His inventions include the Mega Missile, Vibro Rocket, Surveillance Cyber Bee, Mood-Manipulating Cyber Bee, and Cyber Sting fluid. Although he was an inventor, he was largely overshadowed by his comrades' scientific prowess , as well as the fact that most, if not all , of Scorponok's creations didn't work or had some obvious flaw in their design. Scorponok had several important roles in season one, such as finding an old Predacon cannon (which he almost lost to Cheetor) . He then tried to infect Optimus Primal with a virus that was supposed to make him a coward, but instead made him a berserker. He was partners with Blackarachnia , who betrayed him twice. Scorponok also didn't get along with Terrorsaur because Terrorsaur always wanted to usurp Megatron. Throughout season one, Scorponok's faith in Megatron was unmatched, to the extent of looking up to him. Scorponok was arguably the lone original Predacon who was completely loyal to Megatron; the other four original Predacons - Terrorsaur, Tarantulas, Waspinator, and Dinobot - all tried to usurp Megatron's position as leader at one point in the first season. Megatron did not reciprocate this loyalty and treated Scorponok as disposable as the rest of his minions. In the season-one finale, he joined Megatron and Terrorsaur at the alien structure, where the Maximals Rattrap and Optimus Primal were trying to get inside to rescue Airazor. Due to the truce, however, and their hopes of the Maximals ' possible destruction within the structure, the Predacons decided to help them. They used Scorponok's toxic sting so that they could enter the forcefield in an attempt to retrieve Airazor. Scorponok announced to Megatron that he had one mega-missile to shoot at the Maximals while they were inside . With their plan to destroy the Maximals thwarted, Megatron, Terrorsaur and Scorponok returned to their base , which proved to play a significant role in the demise of Terrorsaur and Scorponok when their base was hit by the quantum surge . Scorponok seemingly died along with his rival, Terrorsaur, in the second-season premiere, when they both fell into a pit of magma as the quantum surge hit the planet from the destroyed Vok \"Planet Buster\". After this, Inferno took his place as Megatron's second-in-command. Ironically , the very thing that supposedly destroyed Scorponok just happens to be one of the few things his armor was immune or resistant to. He is virtually impervious to heat-based attacks; however, magma was the cause of his demise. IDW Publishing Scorponok had a biography printed in the Beast Wars Sourcebook by IDW Publishing. According to his biography published in the Beast Wars Sourcebook , Scorponok actually survived the events of season two and was turned into a transmetal scorpion, but he remained trapped in the magma, unable to escape until after Megatron was defeated and the Maximals left with him for Cybertron. What happened to Scorponok afterwards is unknown.", "edit_actions": [{"type": "R", "before": ". He", "after": ", he", "start_char_pos": 123, "end_char_pos": 127}, {"type": "R", "before": "knowledge enough", "after": "sufficient knowledge", "start_char_pos": 385, "end_char_pos": 401}, {"type": "R", "before": "Inventions contributed to his works include :", "after": "His inventions include the", "start_char_pos": 543, "end_char_pos": 588}, {"type": "R", "before": "Mood manipulating", "after": "Mood-Manipulating", "start_char_pos": 641, "end_char_pos": 658}, {"type": "A", "before": null, "after": "and", "start_char_pos": 670, "end_char_pos": 670}, {"type": "R", "before": ". Not to mention", "after": ", as well as the fact that", "start_char_pos": 783, "end_char_pos": 799}, {"type": "A", "before": null, "after": ",", "start_char_pos": 817, "end_char_pos": 817}, {"type": "R", "before": "like", "after": "such as", "start_char_pos": 950, "end_char_pos": 954}, {"type": "D", "before": ", and then chased Cheetor in the Darksyde with Waspinator", "after": null, "start_char_pos": 1020, "end_char_pos": 1077}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1241, "end_char_pos": 1241}, {"type": "D", "before": "almost", "after": null, "start_char_pos": 1434, "end_char_pos": 1440}, {"type": "R", "before": "4", "after": "four", "start_char_pos": 1575, "end_char_pos": 1576}, {"type": "R", "before": "of", "after": "as", "start_char_pos": 1687, "end_char_pos": 1689}, {"type": "R", "before": "of", "after": "in", "start_char_pos": 1710, "end_char_pos": 1712}, {"type": "R", "before": "Sadly this was never reciprocated, and Megatron", "after": "Megatron did not reciprocate this loyalty and", "start_char_pos": 1731, "end_char_pos": 1778}, {"type": "R", "before": "season one", "after": "season-one", "start_char_pos": 1846, "end_char_pos": 1856}, {"type": "D", "before": "of it", "after": null, "start_char_pos": 1995, "end_char_pos": 2000}, {"type": "R", "before": "But due", "after": "Due", "start_char_pos": 2020, "end_char_pos": 2027}, {"type": "A", "before": null, "after": "however,", "start_char_pos": 2042, "end_char_pos": 2042}, {"type": "A", "before": null, "after": "'", "start_char_pos": 2075, "end_char_pos": 2075}, {"type": "R", "before": "mega missile", "after": "mega-missile", "start_char_pos": 2312, "end_char_pos": 2324}, {"type": "R", "before": ", to which Megatron replied, \"Excellent!\"", "after": ".", "start_char_pos": 2373, "end_char_pos": 2414}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2486, "end_char_pos": 2487}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2525, "end_char_pos": 2525}, {"type": "R", "before": "part of", "after": "role in", "start_char_pos": 2561, "end_char_pos": 2568}, {"type": "R", "before": "Quantum Surge", "after": "quantum surge", "start_char_pos": 2639, "end_char_pos": 2652}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2940, "end_char_pos": 2940}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2992, "end_char_pos": 2993}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 3045, "end_char_pos": 3047}, {"type": "R", "before": "heat based attacks, however", "after": "heat-based attacks; however,", "start_char_pos": 3102, "end_char_pos": 3129}, {"type": "R", "before": "product", "after": "cause", "start_char_pos": 3144, "end_char_pos": 3151}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3330, "end_char_pos": 3330}, {"type": "R", "before": "2", "after": "two", "start_char_pos": 3380, "end_char_pos": 3381}], "sents_char_pos": [0, 82, 124, 208, 370, 542, 689, 784, 896, 1079, 1205, 1265, 1365, 1476, 1564, 1730, 1838, 2019, 2154, 2263, 2414, 2654, 2860, 2928, 3071, 3166, 3263, 3559]}
+{"doc_id": "145372", "revision_depth": "1", "before_revision": "An audiophile is a person who is enthusiastic about high-fidelity sound reproduction . An audiophile seeks to reproduce the sound of a live musical performance , typically in a room with good acoustics. It is widely agreed that reaching this goal is very difficult and that even the best-regarded recording and playback systems rarely,if ever, achieve it. Audiophile values may be applied at all stages of music reproduction: the initial audio recording, the production process, and the playback, which is usually in a home setting. In general , the values of an audiophile are seen to be antithetical to the growing popularity of more convenient but lower quality music, especially lossy digital file types like MP3, lower definition streaming services, and inexpensive headphones.%DIFDELCMD < %DIFDELCMD < %%% The term high-end audio refers to playback equipment used by audiophiles, which may be bought at specialist shops and websites. High-end components include turntables, digital-to-analog converters, equalization devices, preamplifiers and amplifiers (both solid-state and vacuum tube), loudspeakers (including horn, electrostatic and magnetostatic speakers), power conditioners, subwoofers, headphones, and acoustic room treatment in addition to room correction devices. Although many audiophile techniques are based on objective criteria that can be verified using techniques like ABX testing, perceived sound quality is necessarily subjective, leading to some more controversial audiophile techniques being based on pseudoscientific, magical or paranormal principles . Audio playback components An audio system typically consists of one or more source components, one or more amplification components, and (for stereo) two or more loudspeakers. Signal cables (analog audio, speaker, digital audio etc.) are used to link these components. There are also a variety of accessories, including equipment racks, power conditioners, devices to reduce or control vibration, record cleaners, anti-static devices, phonograph needle cleaners, reverberation reducing devices such as speaker pads and stands, sound absorbent foam, and soundproofing. The interaction between the loudspeakers and the room (room acoustics) plays an important part in sound quality. Sound vibrations are reflected from walls, floor and ceiling, and are affected by the contents of the room. Room dimensions can create standing waves at particular (usually low) frequencies. There are devices and materials for room treatment that affect sound quality. Soft materials, such as draperies and carpets, can absorb higher frequencies, whereas hard walls and floors can cause excess reverberation. Sound sources Audiophiles play music from a variety of sources including phonograph records, compact discs (CDs), and digital audio files that are either uncompressed or are losslessly compressed, such as FLAC, DSD, Windows Media Audio 9 Lossless and Apple Lossless (ALAC), in contrast to lossy compression, such as in MP3 encoding. From the early 1990s, CDs were the most common source of high-quality music. Nevertheless, turntables, tonearms, and magnetic cartridges are still used, despite the difficulties of keeping records free from dust and the delicate set-up associated with turntables.%DIFDELCMD < %DIFDELCMD < %%% The 44.1 kHz sampling rate of the CD format, in theory, restricts CD information losses to above the theoretical upper-frequency limit of human hearing \u2013 20 kHz, see Nyquist limit. Nonetheless, newer formats such as FLAC, ALAC, DVD-Audio and Super Audio Compact Disc (SACD) have sampling rates of 88.2 kHz, 96 kHz or even 192 kHz. CD audio signals are encoded in 16-bit values. Some higher-definition consumer formats such as HDCD-encoded CDs, DVD-Audio, and SA-CD contain 20-bit , 24-bit and even 32-bit audio streams. With more bits more dynamic range is possible; 20 bit dynamic range is theoretically 120 dB\u2014the limit of most consumer electronic playback equipment. SACDs and DVD-Audio have up to 5.1 to 6.1 surround sound . Although both high-res optical formats have failed, there has been a resurgence in high-res digital files. SACD can be stored as a DSD file, and DVD-Audio can be stored as a FLAC or ALAC file. FLAC is the most widely used digital format for high-res with up to 8 channels and a maximum depth of 32 bit, and 655,350 Hz sampling rate.Uncompressed formats such as WAV and AIFF files can store audio CDs with no compression.%DIFDELCMD < %DIFDELCMD < %%% Amplifiers A preamplifier selects among several audio inputs, amplifies source-level signals (such as those from a turntable) , and allows the listener to adjust the sound with volume and tone controls. Many audiophile-oriented preamplifiers lack tone controls. A power amplifier takes the \"line-level\" audio signal from the preamplifier and drives the loudspeakers. An integrated amplifier combines the functions of power amplification with input switching and volume and tone control. Both pre/power combinations and integrated amplifiers are widely used by audiophiles. Audiophile amplifiers are available based on solid-state (semiconductor) technology, vacuum-tube (valve) technology, or hybrid technology\u2014semiconductors and vacuum tubes . Dedicated amplifiers are also commonly used by audiophiles to drive headphones, especially those with high impedance and/or low sensitivity, or electrostatic headphones. Loudspeakers The cabinet of the loudspeaker is known as the enclosure. There are a variety of loudspeaker enclosure designs, including sealed cabinets (acoustic suspension), ported cabinets (bass-reflex), transmission line, infinite baffle, and horn loaded. The enclosure plays a major role in the sound of the loudspeaker. The drivers that produce the sound are referred to as tweeters, midranges, and woofers. Driver designs include dynamic, electrostatic, plasma, ribbon, planar, ionic, and servo-actuated. Drivers are made from a variety of materials including paper pulp, polypropylene, kevlar, aluminum, magnesium, beryllium, and vapor-deposited diamond.%DIFDELCMD < %DIFDELCMD < %%% The direction and intensity of the output of a loudspeaker, called dispersion or polar response, has a large effect on its sound. Various methods are employed to control the dispersion. These methods include monopolar, bipolar, dipolar, 360-degree, horn, waveguide, and line source. These terms refer to the configuration and arrangement of the various drivers in the enclosure. The positioning of loudspeakers in the room has a strong influence on the sound experience. Loudspeaker output is influenced by interaction with room boundaries, particularly bass response, and high frequency transducers are directional, or \"beaming\".%DIFDELCMD < %DIFDELCMD < %%% Accessories Audiophiles use a wide variety of accessories and fine-tuning techniques, sometimes referred to as \"tweaks\", to improve the sound of their systems. These include power conditioner filters to \"clean\" the electricity, equipment racks to isolate components from floor vibrations, specialty power and audio cables, loudspeaker stands (and footers to isolate speakers from stands), and room treatments. There are several types of room treatment. Sound-absorbing materials may be placed strategically within a listening room to reduce the amplitude of early reflections, and to deal with resonance modes. Other treatments are designed to produce diffusion, reflection of sound in a scattered fashion. Room treatments can be expensive and difficult to optimize.%DIFDELCMD < %DIFDELCMD < %%% Headphones Headphones are regularly used by audiophiles. These products can be remarkably expensive, some over $10,000, but in general are much cheaper than comparable speaker systems. They have the advantage of not requiring room treatment, and being usable without requiring others to listen at the same time. Newer canalphones can be driven by the less powerful outputs found on portable music players. Design variety For music storage, digital formats offer an absence of clicks, pops, wow, flutter, acoustic feedback, and rumble, compared to vinyl records. Depending on the format, digital can also have a higher signal-to-noise ratio, a wider dynamic range, less total harmonic distortion, and a flatter and more extended frequency response. Despite this, vinyl records remain popular, and discussion about the relative merits of analog and digital sound continues (see Analog sound vs. digital sound). (Note that vinyl records may be mastered differently from their digital versions.) In the amplification stage, vacuum-tube electronics remain popular, despite most other applications having since abandoned tubes for solid state amplifiers. Also vacuum-tube amplifiers often have higher total harmonic distortion, require rebiasing, are less reliable, generate more heat, are less powerful, and cost more. There is also continuing debate about the proper use of negative feedback in amplifier design. Controversies There is substantial controversy on the subject of audiophile components; many have asserted that the occasionally high cost produces no measurable improvement in audio reproduction. For example, skeptic James Randi, through his foundation One Million Dollar Paranormal Challenge, has offered a prize of $1 million to anyone who can demonstrate that 7,250 audio cables \"are any better than ordinary audio cables\". In 2008, audio reviewer Michael Fremer attempted to claim the prize, and said that Randi declined the challenge. Randi said that the cable manufacturer Pear Cables was the one who withdrew.", "after_revision": "An audiophile is a person who is in hphq and owns a 6xx . An audiophile seeks to reproduce the sound of only mids , typically in a room with no racist acoustics. It is widely agreed that reaching this goal is %DIFDELCMD < %DIFDELCMD < %%% exactly $220 and that even the best-regarded recording and playback systems rarely, if ever, achieve it without a 6xx. Audiophile values only apply to all stages: the initial audio recording, the production process, and the playback via apple dongle and 6xx, which is usually in a discord setting. In general, the values of an audiophile are seen to be antithetical to the growing popularity of more convenient but lower quality music, especially lossy digital file types like MP3, lower definition streaming services, and racist stax. The term high-end audio refers to playback equipment used by audiophiles, which may be bought at specialist shops and websites. High-end components include turntables, digital-to-analog converters, equalization devices, preamplifiers and amplifiers (both solid-state and vacuum tube), loudspeakers (including horn, electrostatic and magnetostatic speakers), power conditioners, subwoofers, headphones, and acoustic room treatment in addition to room correction devices. Although many audiophile techniques are based on objective criteria that can be verified using techniques like ABX testing, perceived sound quality is necessarily subjective, leading to some more controversial audiophile techniques being based on pseudoscientific, magical or paranormal principles. Audio playback components An audio system typically consists of one or more source components, one or more amplification components, and (for stereo) two or more loudspeakers. Signal cables (analog audio, speaker, digital audio etc.) are used to link these components. There are also a variety of accessories, including equipment racks, power conditioners, devices to reduce or control vibration, record cleaners, anti-static devices, phonograph needle cleaners, reverberation reducing devices such as speaker pads and stands, sound absorbent foam, and soundproofing. The interaction between the loudspeakers and the room (room acoustics) plays an important part in sound quality. Sound vibrations are reflected from walls, floor and ceiling, and are affected by the contents of the room. Room dimensions can create standing waves at particular (usually low) frequencies. There are devices and materials for room treatment that affect sound quality. Soft materials, such as draperies and carpets, can absorb higher frequencies, whereas hard walls and floors can cause excess reverberation. Sound sources Audiophiles play music from a variety of sources including phonograph records, compact discs (CDs), and digital audio files that are either uncompressed or are losslessly compressed, such as FLAC, DSD, Windows Media Audio 9 Lossless and Apple Lossless (ALAC), in contrast to lossy compression, such as in MP3 encoding. From the early 1990s, CDs were the most common source of high-quality music. Nevertheless, turntables, tonearms, and magnetic cartridges are still used, despite the difficulties of keeping records free from dust and the delicate set-up associated with turntables. The 44.1 kHz sampling rate of the CD format, in theory, restricts CD information losses to above the theoretical upper-frequency limit of human hearing \u2013 20 kHz, see Nyquist limit. Nonetheless, newer formats such as FLAC, ALAC, DVD-Audio and Super Audio Compact Disc (SACD) have sampling rates of 88.2 kHz, 96 kHz or even 192 kHz. CD audio signals are encoded in 16-bit values. Some higher-definition consumer formats such as HDCD-encoded CDs, DVD-Audio, and SA-CD contain 20-bit, 24-bit and even 32-bit audio streams. With more bits more dynamic range is possible; 20 bit dynamic range is theoretically 120 dB\u2014the limit of most consumer electronic playback equipment. SACDs and DVD-Audio have up to 5.1 to 6.1 surround sound. Although both high-res optical formats have failed, there has been a resurgence in high-res digital files. SACD can be stored as a DSD file, and DVD-Audio can be stored as a FLAC or ALAC file. FLAC is the most widely used digital format for high-res with up to 8 channels and a maximum depth of 32 bit, and 655,350 Hz sampling rate. Uncompressed formats such as WAV and AIFF files can store audio CDs with no compression. Amplifiers A preamplifier selects among several audio inputs, amplifies source-level signals (such as those from a turntable), and allows the listener to adjust the sound with volume and tone controls. Many audiophile-oriented preamplifiers lack tone controls. A power amplifier takes the \"line-level\" audio signal from the preamplifier and drives the loudspeakers. An integrated amplifier combines the functions of power amplification with input switching and volume and tone control. Both pre/power combinations and integrated amplifiers are widely used by audiophiles. Audiophile amplifiers are available based on solid-state (semiconductor) technology, vacuum-tube (valve) technology, or hybrid technology\u2014semiconductors and vacuum tubes. Dedicated amplifiers are also commonly used by audiophiles to drive headphones, especially those with high impedance and/or low sensitivity, or electrostatic headphones. Loudspeakers The cabinet of the loudspeaker is known as the enclosure. There are a variety of loudspeaker enclosure designs, including sealed cabinets (acoustic suspension), ported cabinets (bass-reflex), transmission line, infinite baffle, and horn loaded. The enclosure plays a major role in the sound of the loudspeaker. The drivers that produce the sound are referred to as tweeters, midranges, and woofers. Driver designs include dynamic, electrostatic, plasma, ribbon, planar, ionic, and servo-actuated. Drivers are made from a variety of materials including paper pulp, polypropylene, kevlar, aluminum, magnesium, beryllium, and vapor-deposited diamond. The direction and intensity of the output of a loudspeaker, called dispersion or polar response, has a large effect on its sound. Various methods are employed to control the dispersion. These methods include monopolar, bipolar, dipolar, 360-degree, horn, waveguide, and line source. These terms refer to the configuration and arrangement of the various drivers in the enclosure. The positioning of loudspeakers in the room has a strong influence on the sound experience. Loudspeaker output is influenced by interaction with room boundaries, particularly bass response, and high frequency transducers are directional, or \"beaming\". Accessories Audiophiles use a wide variety of accessories and fine-tuning techniques, sometimes referred to as \"tweaks\", to improve the sound of their systems. These include power conditioner filters to \"clean\" the electricity, equipment racks to isolate components from floor vibrations, specialty power and audio cables, loudspeaker stands (and footers to isolate speakers from stands), and room treatments. There are several types of room treatment. Sound-absorbing materials may be placed strategically within a listening room to reduce the amplitude of early reflections, and to deal with resonance modes. Other treatments are designed to produce diffusion, reflection of sound in a scattered fashion. Room treatments can be expensive and difficult to optimize. Headphones Headphones are regularly used by audiophiles. These products can be remarkably expensive, some over $10,000, but in general are much cheaper than comparable speaker systems. They have the advantage of not requiring room treatment, and being usable without requiring others to listen at the same time. Newer canalphones can be driven by the less powerful outputs found on portable music players . Design variety For music storage, digital formats offer an absence of clicks, pops, wow, flutter, acoustic feedback, and rumble, compared to vinyl records. Depending on the format, digital can also have a higher signal-to-noise ratio, a wider dynamic range, less total harmonic distortion, and a flatter and more extended frequency response. Despite this, vinyl records remain popular, and discussion about the relative merits of analog and digital sound continues (see Analog sound vs. digital sound). (Note that vinyl records may be mastered differently from their digital versions.) %DIFDELCMD < %DIFDELCMD < %%% In the amplification stage , %DIFDELCMD < %DIFDELCMD < %%% vacuum-tube electronics remain popular, despite most other applications having since abandoned tubes for solid state amplifiers. Also vacuum-tube amplifiers often have higher total harmonic distortion, require rebiasing, are less reliable, generate more heat, are less powerful, and cost more. There is also continuing debate about the proper use of negative feedback in amplifier design . Controversies %DIFDELCMD < %DIFDELCMD < %%% There is substantial controversy on the %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% subject of audiophile components; many have asserted that the occasionally high cost produces no measurable improvement in audio reproduction. For example, skeptic James Randi, through his foundation One Million Dollar Paranormal Challenge, has offered a prize of $1 million to anyone who can demonstrate that $ 7,250 audio cables \"are any better than ordinary audio cables\". In 2008, audio reviewer Michael Fremer attempted to claim the prize, and said that Randi declined the challenge. Randi said that the cable manufacturer Pear Cables was the one who withdrew.", "edit_actions": [{"type": "R", "before": "enthusiastic about high-fidelity sound reproduction", "after": "in hphq and owns a 6xx", "start_char_pos": 33, "end_char_pos": 84}, {"type": "R", "before": "a live musical performance", "after": "only mids", "start_char_pos": 133, "end_char_pos": 159}, {"type": "R", "before": "good", "after": "no racist", "start_char_pos": 187, "end_char_pos": 191}, {"type": "D", "before": "very difficult and that even the best-regarded recording and playback systems rarely,if ever, achieve it.", "after": null, "start_char_pos": 250, "end_char_pos": 355}, {"type": "D", "before": "Audiophile values may be applied at all stages of music reproduction: the initial audio recording, the production process, and the playback, which is usually in a home setting. In general , the values of an audiophile are seen to be antithetical to the growing popularity of more convenient but lower quality music, especially lossy digital file types like MP3, lower definition streaming services, and inexpensive headphones.", "after": null, "start_char_pos": 356, "end_char_pos": 782}, {"type": "D", "before": "The term high-end audio refers to playback equipment used by audiophiles, which may be bought at specialist shops and websites. High-end components include turntables, digital-to-analog converters, equalization devices, preamplifiers and amplifiers (both solid-state and vacuum tube), loudspeakers (including horn, electrostatic and magnetostatic speakers), power conditioners, subwoofers, headphones, and acoustic room treatment in addition to room correction devices.", "after": null, "start_char_pos": 812, "end_char_pos": 1281}, {"type": "R", "before": "Although many audiophile techniques are based on objective criteria that can be verified using techniques like ABX testing, perceived sound quality is necessarily subjective, leading to some more controversial audiophile techniques being based on pseudoscientific, magical or paranormal principles", "after": "exactly $220 and that even the best-regarded recording and playback systems rarely, if ever, achieve it without a 6xx. Audiophile values only apply to all stages: the initial audio recording, the production process, and the playback via apple dongle and 6xx, which is usually in a discord setting. In general, the values of an audiophile are seen to be antithetical to the growing popularity of more convenient but lower quality music, especially lossy digital file types like MP3, lower definition streaming services, and racist stax. The term high-end audio refers to playback equipment used by audiophiles, which may be bought at specialist shops and websites. High-end components include turntables, digital-to-analog converters, equalization devices, preamplifiers and amplifiers (both solid-state and vacuum tube), loudspeakers (including horn, electrostatic and magnetostatic speakers), power conditioners, subwoofers, headphones, and acoustic room treatment in addition to room correction devices. Although many audiophile techniques are based on objective criteria that can be verified using techniques like ABX testing, perceived sound quality is necessarily subjective, leading to some more controversial audiophile techniques being based on pseudoscientific, magical or paranormal principles. Audio playback components An audio system typically consists of one or more source components, one or more amplification components, and (for stereo) two or more loudspeakers. Signal cables (analog audio, speaker, digital audio etc.) are used to link these components. There are also a variety of accessories, including equipment racks, power conditioners, devices to reduce or control vibration, record cleaners, anti-static devices, phonograph needle cleaners, reverberation reducing devices such as speaker pads and stands, sound absorbent foam, and soundproofing. The interaction between the loudspeakers and the room (room acoustics) plays an important part in sound quality. Sound vibrations are reflected from walls, floor and ceiling, and are affected by the contents of the room. Room dimensions can create standing waves at particular (usually low) frequencies. There are devices and materials for room treatment that affect sound quality. Soft materials, such as draperies and carpets, can absorb higher frequencies, whereas hard walls and floors can cause excess reverberation. Sound sources Audiophiles play music from a variety of sources including phonograph records, compact discs (CDs), and digital audio files that are either uncompressed or are losslessly compressed, such as FLAC, DSD, Windows Media Audio 9 Lossless and Apple Lossless (ALAC), in contrast to lossy compression, such as in MP3 encoding. From the early 1990s, CDs were the most common source of high-quality music. Nevertheless, turntables, tonearms, and magnetic cartridges are still used, despite the difficulties of keeping records free from dust and the delicate set-up associated with turntables. The 44.1 kHz sampling rate of the CD format, in theory, restricts CD information losses to above the theoretical upper-frequency limit of human hearing \u2013 20 kHz, see Nyquist limit. Nonetheless, newer formats such as FLAC, ALAC, DVD-Audio and Super Audio Compact Disc (SACD) have sampling rates of 88.2 kHz, 96 kHz or even 192 kHz. CD audio signals are encoded in 16-bit values. Some higher-definition consumer formats such as HDCD-encoded CDs, DVD-Audio, and SA-CD contain 20-bit, 24-bit and even 32-bit audio streams. With more bits more dynamic range is possible; 20 bit dynamic range is theoretically 120 dB\u2014the limit of most consumer electronic playback equipment. SACDs and DVD-Audio have up to 5.1 to 6.1 surround sound. Although both high-res optical formats have failed, there has been a resurgence in high-res digital files. SACD can be stored as a DSD file, and DVD-Audio can be stored as a FLAC or ALAC file. FLAC is the most widely used digital format for high-res with up to 8 channels and a maximum depth of 32 bit, and 655,350 Hz sampling rate. Uncompressed formats such as WAV and AIFF files can store audio CDs with no compression. Amplifiers A preamplifier selects among several audio inputs, amplifies source-level signals (such as those from a turntable), and allows the listener to adjust the sound with volume and tone controls. Many audiophile-oriented preamplifiers lack tone controls. A power amplifier takes the \"line-level\" audio signal from the preamplifier and drives the loudspeakers. An integrated amplifier combines the functions of power amplification with input switching and volume and tone control. Both pre/power combinations and integrated amplifiers are widely used by audiophiles. Audiophile amplifiers are available based on solid-state (semiconductor) technology, vacuum-tube (valve) technology, or hybrid technology\u2014semiconductors and vacuum tubes. Dedicated amplifiers are also commonly used by audiophiles to drive headphones, especially those with high impedance and/or low sensitivity, or electrostatic headphones. Loudspeakers The cabinet of the loudspeaker is known as the enclosure. There are a variety of loudspeaker enclosure designs, including sealed cabinets (acoustic suspension), ported cabinets (bass-reflex), transmission line, infinite baffle, and horn loaded. The enclosure plays a major role in the sound of the loudspeaker. The drivers that produce the sound are referred to as tweeters, midranges, and woofers. Driver designs include dynamic, electrostatic, plasma, ribbon, planar, ionic, and servo-actuated. Drivers are made from a variety of materials including paper pulp, polypropylene, kevlar, aluminum, magnesium, beryllium, and vapor-deposited diamond. The direction and intensity of the output of a loudspeaker, called dispersion or polar response, has a large effect on its sound. Various methods are employed to control the dispersion. These methods include monopolar, bipolar, dipolar, 360-degree, horn, waveguide, and line source. These terms refer to the configuration and arrangement of the various drivers in the enclosure. The positioning of loudspeakers in the room has a strong influence on the sound experience. Loudspeaker output is influenced by interaction with room boundaries, particularly bass response, and high frequency transducers are directional, or \"beaming\". Accessories Audiophiles use a wide variety of accessories and fine-tuning techniques, sometimes referred to as \"tweaks\", to improve the sound of their systems. These include power conditioner filters to \"clean\" the electricity, equipment racks to isolate components from floor vibrations, specialty power and audio cables, loudspeaker stands (and footers to isolate speakers from stands), and room treatments. There are several types of room treatment. Sound-absorbing materials may be placed strategically within a listening room to reduce the amplitude of early reflections, and to deal with resonance modes. Other treatments are designed to produce diffusion, reflection of sound in a scattered fashion. Room treatments can be expensive and difficult to optimize. Headphones Headphones are regularly used by audiophiles. These products can be remarkably expensive, some over $10,000, but in general are much cheaper than comparable speaker systems. They have the advantage of not requiring room treatment, and being usable without requiring others to listen at the same time. Newer canalphones can be driven by the less powerful outputs found on portable music players", "start_char_pos": 1282, "end_char_pos": 1579}, {"type": "R", "before": "Audio playback components An audio system typically consists of one or more source components, one or more amplification components, and (for stereo) two or more loudspeakers.", "after": "Design variety", "start_char_pos": 1582, "end_char_pos": 1757}, {"type": "R", "before": "Signal cables (analog audio, speaker, digital audio etc.) are used to link these components. There are also a variety of accessories, including equipment racks, power conditioners, devices to reduce or control vibration, record cleaners, anti-static devices, phonograph needle cleaners, reverberation reducing devices such as speaker pads and stands, sound absorbent foam, and soundproofing.", "after": "For music storage, digital formats offer an absence of clicks, pops, wow, flutter, acoustic feedback, and rumble, compared to vinyl records. Depending on the format, digital can also have a higher signal-to-noise ratio, a wider dynamic range, less total harmonic distortion, and a flatter and more extended frequency response. Despite this, vinyl records remain popular, and discussion about the relative merits of analog and digital sound continues (see Analog sound vs. digital sound). (Note that vinyl records may be mastered differently from their digital versions.)", "start_char_pos": 1758, "end_char_pos": 2149}, {"type": "D", "before": "The interaction between the loudspeakers and the room (room acoustics) plays an important part in sound quality. Sound vibrations are reflected from walls, floor and ceiling, and are affected by the contents of the room. Room dimensions can create standing waves at particular (usually low) frequencies. There are devices and materials for room treatment that affect sound quality. Soft materials, such as draperies and carpets, can absorb higher frequencies, whereas hard walls and floors can cause excess reverberation.", "after": null, "start_char_pos": 2150, "end_char_pos": 2671}, {"type": "D", "before": "Sound sources Audiophiles play music from a variety of sources including phonograph records, compact discs (CDs), and digital audio files that are either uncompressed or are losslessly compressed, such as FLAC, DSD, Windows Media Audio 9 Lossless and Apple Lossless (ALAC), in contrast to lossy compression, such as in MP3 encoding. From the early 1990s, CDs were the most common source of high-quality music. Nevertheless, turntables, tonearms, and magnetic cartridges are still used, despite the difficulties of keeping records free from dust and the delicate set-up associated with turntables.", "after": null, "start_char_pos": 2672, "end_char_pos": 3268}, {"type": "D", "before": "The 44.1 kHz sampling rate of the CD format, in theory, restricts CD information losses to above the theoretical upper-frequency limit of human hearing \u2013 20 kHz, see Nyquist limit. Nonetheless, newer formats such as FLAC, ALAC, DVD-Audio and Super Audio Compact Disc (SACD) have sampling rates of 88.2 kHz, 96 kHz or even 192 kHz.", "after": null, "start_char_pos": 3298, "end_char_pos": 3628}, {"type": "R", "before": "CD audio signals are encoded in 16-bit values. Some higher-definition consumer formats such as HDCD-encoded CDs, DVD-Audio, and SA-CD contain 20-bit", "after": "In the amplification stage", "start_char_pos": 3629, "end_char_pos": 3777}, {"type": "D", "before": "24-bit and even 32-bit audio streams. With more bits more dynamic range is possible; 20 bit dynamic range is theoretically 120 dB\u2014the limit of most consumer electronic playback equipment.", "after": null, "start_char_pos": 3780, "end_char_pos": 3967}, {"type": "D", "before": "SACDs and DVD-Audio have up to 5.1 to 6.1 surround sound . Although both high-res optical formats have failed, there has been a resurgence in high-res digital files. SACD can be stored as a DSD file, and DVD-Audio can be stored as a FLAC or ALAC file. FLAC is the most widely used digital format for high-res with up to 8 channels and a maximum depth of 32 bit, and 655,350 Hz sampling rate.Uncompressed formats such as WAV and AIFF files can store audio CDs with no compression.", "after": null, "start_char_pos": 3968, "end_char_pos": 4447}, {"type": "D", "before": "Amplifiers A preamplifier selects among several audio inputs, amplifies source-level signals (such as those from a turntable) , and allows the listener to adjust the sound with volume and tone controls. Many audiophile-oriented preamplifiers lack tone controls. A power amplifier takes the \"line-level\" audio signal from the preamplifier and drives the loudspeakers. An integrated amplifier combines the functions of power amplification with input switching and volume and tone control. Both pre/power combinations and integrated amplifiers are widely used by audiophiles.", "after": null, "start_char_pos": 4477, "end_char_pos": 5049}, {"type": "D", "before": "Audiophile amplifiers are available based on solid-state (semiconductor) technology,", "after": null, "start_char_pos": 5050, "end_char_pos": 5134}, {"type": "R", "before": "(valve) technology, or hybrid technology\u2014semiconductors and vacuum tubes", "after": "electronics remain popular, despite most other applications having since abandoned tubes for solid state amplifiers. Also vacuum-tube amplifiers often have higher total harmonic distortion, require rebiasing, are less reliable, generate more heat, are less powerful, and cost more. There is also continuing debate about the proper use of negative feedback in amplifier design", "start_char_pos": 5147, "end_char_pos": 5219}, {"type": "R", "before": "Dedicated amplifiers are also commonly used by audiophiles to drive headphones, especially those with high impedance and/or low sensitivity, or electrostatic headphones.", "after": "Controversies", "start_char_pos": 5222, "end_char_pos": 5391}, {"type": "D", "before": "Loudspeakers The cabinet of the loudspeaker is known as the enclosure. There are a variety of loudspeaker enclosure designs, including sealed cabinets (acoustic suspension), ported cabinets (bass-reflex), transmission line, infinite baffle, and horn loaded. The enclosure plays a major role in the sound of the loudspeaker.", "after": null, "start_char_pos": 5392, "end_char_pos": 5715}, {"type": "D", "before": "The drivers that produce the sound are referred to as tweeters, midranges, and woofers. Driver designs include dynamic, electrostatic, plasma, ribbon, planar, ionic, and servo-actuated. Drivers are made from a variety of materials including paper pulp, polypropylene, kevlar, aluminum, magnesium, beryllium, and vapor-deposited diamond.", "after": null, "start_char_pos": 5716, "end_char_pos": 6052}, {"type": "R", "before": "The direction and intensity of the output of a loudspeaker, called dispersion or polar response, has a large effect on its sound. Various methods are employed to control the dispersion. These methods include monopolar, bipolar, dipolar, 360-degree, horn, waveguide, and line source. These terms refer to the configuration and arrangement of", "after": "There is substantial controversy on", "start_char_pos": 6082, "end_char_pos": 6422}, {"type": "D", "before": "various drivers in the enclosure.", "after": null, "start_char_pos": 6427, "end_char_pos": 6460}, {"type": "D", "before": "The positioning of loudspeakers in the room has a strong influence on the sound experience. Loudspeaker output is influenced by interaction with room boundaries, particularly bass response, and high frequency transducers are directional, or \"beaming\".", "after": null, "start_char_pos": 6461, "end_char_pos": 6712}, {"type": "D", "before": "Accessories Audiophiles use a wide variety of accessories and fine-tuning techniques, sometimes referred to as \"tweaks\", to improve the sound of their systems. These include power conditioner filters to \"clean\" the electricity, equipment racks to isolate components from floor vibrations, specialty power and audio cables, loudspeaker stands (and footers to isolate speakers from stands), and room treatments.", "after": null, "start_char_pos": 6742, "end_char_pos": 7151}, {"type": "D", "before": "There are several types of room treatment. Sound-absorbing materials may be placed strategically within a listening room to reduce the amplitude of early reflections, and to deal with resonance modes. Other treatments are designed to produce diffusion, reflection of sound in a scattered fashion. Room treatments can be expensive and difficult to optimize.", "after": null, "start_char_pos": 7152, "end_char_pos": 7508}, {"type": "D", "before": "Headphones", "after": null, "start_char_pos": 7538, "end_char_pos": 7548}, {"type": "R", "before": "Headphones are regularly used by audiophiles. These products can be remarkably expensive, some over $10,000, but in general are much cheaper than comparable speaker systems. They have the advantage of not requiring room treatment, and being usable without requiring others to listen at the same time. Newer canalphones can be driven by the less powerful outputs found on portable music players. Design variety For music storage, digital formats offer an absence of clicks, pops, wow, flutter, acoustic feedback, and rumble, compared to vinyl records. Depending on the format, digital can also have a higher signal-to-noise ratio, a wider dynamic range, less total harmonic distortion, and a flatter and more extended frequency response. Despite this, vinyl records remain popular, and discussion about the relative merits of analog and digital sound continues (see Analog sound vs. digital sound). (Note that vinyl records may be mastered differently from their digital versions.) In the amplification stage, vacuum-tube electronics remain popular, despite most other applications having since abandoned tubes for solid state amplifiers. Also vacuum-tube amplifiers often have higher total harmonic distortion, require rebiasing, are less reliable, generate more heat, are less powerful, and cost more. There is also continuing debate about the proper use of negative feedback in amplifier design. Controversies There is substantial controversy on the subject of audiophile components; many have asserted that the occasionally high cost produces no measurable improvement in audio reproduction. For example, skeptic James Randi, through his foundation One Million Dollar Paranormal Challenge, has offered a prize of $1 million to anyone who can demonstrate that", "after": "subject of audiophile components; many have asserted that the occasionally high cost produces no measurable improvement in audio reproduction. For example, skeptic James Randi, through his foundation One Million Dollar Paranormal Challenge, has offered a prize of $1 million to anyone who can demonstrate that $", "start_char_pos": 7549, "end_char_pos": 9310}], "sents_char_pos": [0, 86, 202, 355, 532, 782, 939, 1281, 1581, 1757, 1850, 2149, 2262, 2370, 2453, 2531, 2671, 3004, 3081, 3268, 3478, 3628, 3675, 3817, 3864, 3967, 4026, 4133, 4219, 4359, 4447, 4679, 4738, 4843, 4963, 5049, 5221, 5391, 5462, 5649, 5715, 5803, 5901, 6052, 6211, 6267, 6364, 6460, 6552, 6712, 6901, 7151, 7194, 7352, 7448, 7508, 7594, 7722, 7849, 7943, 8099, 8285, 8446, 8529, 8686, 8851, 8946, 9034, 9143, 9374, 9487]}
+{"doc_id": "145372", "revision_depth": "3", "before_revision": "An audiophile is a person who is enthusiastic about high-fidelity sound reproduction . An audiophile seeks to reproduce the sound of a live musical performance, typically in a room with good acoustics . It is widely agreed that reaching this goal is very difficult and that even the best-regarded recording and playback systems rarely,if ever, achieve it. Audiophile values may be applied at all stages of music reproduction: the initial audio recording, the production process, and the playback, which is usually in a home setting. In general , the values of an audiophile are seen to be antithetical to the growing popularity of more convenient but lower quality music, especially lossy digital file types like MP3, lower definition streaming services, and inexpensive headphones.%DIFDELCMD < %DIFDELCMD < %%% The term high-end audio refers to playback equipment used by audiophiles, which may be bought at specialist shops and websites. High-end components include turntables, digital-to-analog converters, equalization devices, preamplifiers and amplifiers (both solid-state and vacuum tube), loudspeakers (including horn, electrostatic and magnetostatic speakers), power conditioners, subwoofers, headphones, and acoustic room treatment in addition to room correction devices. Although many audiophile techniques are based on objective criteria that can be verified using techniques like ABX testing, perceived sound quality is necessarily subjective, leading to some more controversial audiophile techniques being based on pseudoscientific, magical or paranormal principles . Audio playback components An audio system typically consists of one or more source components, one or more amplification components, and (for stereo) two or more loudspeakers. Signal cables (analog audio, speaker, digital audio etc.) are used to link these components. There are also a variety of accessories, including equipment racks, power conditioners, devices to reduce or control vibration, record cleaners, anti-static devices, phonograph needle cleaners, reverberation reducing devices such as speaker pads and stands, sound absorbent foam, and soundproofing. The interaction between the loudspeakers and the room (room acoustics) plays an important part in sound quality. Sound vibrations are reflected from walls, floor and ceiling, and are affected by the contents of the room. Room dimensions can create standing waves at particular (usually low) frequencies. There are devices and materials for room treatment that affect sound quality. Soft materials, such as draperies and carpets, can absorb higher frequencies, whereas hard walls and floors can cause excess reverberation. Sound sources Audiophiles play music from a variety of sources including phonograph records, compact discs (CDs), and digital audio files that are either uncompressed or are losslessly compressed, such as FLAC, DSD, Windows Media Audio 9 Lossless and Apple Lossless (ALAC), in contrast to lossy compression, such as in MP3 encoding. From the early 1990s, CDs were the most common source of high-quality music. Nevertheless, turntables, tonearms, and magnetic cartridges are still used, despite the difficulties of keeping records free from dust and the delicate set-up associated with turntables.%DIFDELCMD < %DIFDELCMD < %%% The 44.1 kHz sampling rate of the CD format, in theory, restricts CD information losses to above the theoretical upper-frequency limit of human hearing \u2013 20 kHz, see Nyquist limit. Nonetheless, newer formats such as FLAC, ALAC, DVD-Audio and Super Audio Compact Disc (SACD) have sampling rates of 88.2 kHz, 96 kHz or even 192 kHz. CD audio signals are encoded in 16-bit values. Some higher-definition consumer formats such as HDCD-encoded CDs, DVD-Audio, and SA-CD contain 20-bit , 24-bit and even 32-bit audio streams. With more bits more dynamic range is possible; 20 bit dynamic range is theoretically 120 dB\u2014the limit of most consumer electronic playback equipment. SACDs and DVD-Audio have up to 5.1 to 6.1 surround sound . Although both high-res optical formats have failed, there has been a resurgence in high-res digital files. SACD can be stored as a DSD file, and DVD-Audio can be stored as a FLAC or ALAC file. FLAC is the most widely used digital format for high-res with up to 8 channels and a maximum depth of 32 bit, and 655,350 Hz sampling rate.Uncompressed formats such as WAV and AIFF files can store audio CDs with no compression.%DIFDELCMD < %DIFDELCMD < %%% Amplifiers A preamplifier selects among several audio inputs, amplifies source-level signals (such as those from a turntable) , and allows the listener to adjust the sound with volume and tone controls. Many audiophile-oriented preamplifiers lack tone controls. A power amplifier takes the \"line-level\" audio signal from the preamplifier and drives the loudspeakers. An integrated amplifier combines the functions of power amplification with input switching and volume and tone control. Both pre/power combinations and integrated amplifiers are widely used by audiophiles. Audiophile amplifiers are available based on solid-state (semiconductor) technology, vacuum-tube (valve) technology, or hybrid technology\u2014semiconductors and vacuum tubes . Dedicated amplifiers are also commonly used by audiophiles to drive headphones, especially those with high impedance and/or low sensitivity, or electrostatic headphones. Loudspeakers The cabinet of the loudspeaker is known as the enclosure. There are a variety of loudspeaker enclosure designs, including sealed cabinets (acoustic suspension), ported cabinets (bass-reflex), transmission line, infinite baffle, and horn loaded. The enclosure plays a major role in the sound of the loudspeaker. The drivers that produce the sound are referred to as tweeters, midranges, and woofers. Driver designs include dynamic, electrostatic, plasma, ribbon, planar, ionic, and servo-actuated. Drivers are made from a variety of materials including paper pulp, polypropylene, kevlar, aluminum, magnesium, beryllium, and vapor-deposited diamond.%DIFDELCMD < %DIFDELCMD < %%% The direction and intensity of the output of a loudspeaker, called dispersion or polar response, has a large effect on its sound. Various methods are employed to control the dispersion. These methods include monopolar, bipolar, dipolar, 360-degree, horn, waveguide, and line source. These terms refer to the configuration and arrangement of the various drivers in the enclosure. The positioning of loudspeakers in the room has a strong influence on the sound experience. Loudspeaker output is influenced by interaction with room boundaries, particularly bass response, and high frequency transducers are directional, or \"beaming\".%DIFDELCMD < %DIFDELCMD < %%% Accessories Audiophiles use a wide variety of accessories and fine-tuning techniques, sometimes referred to as \"tweaks\", to improve the sound of their systems. These include power conditioner filters to \"clean\" the electricity, equipment racks to isolate components from floor vibrations, specialty power and audio cables, loudspeaker stands (and footers to isolate speakers from stands), and room treatments. There are several types of room treatment. Sound-absorbing materials may be placed strategically within a listening room to reduce the amplitude of early reflections, and to deal with resonance modes. Other treatments are designed to produce diffusion, reflection of sound in a scattered fashion. Room treatments can be expensive and difficult to optimize.%DIFDELCMD < %DIFDELCMD < %%% Headphones Headphones are regularly used by audiophiles. These products can be remarkably expensive, some over $10,000, but in general are much cheaper than comparable speaker systems. They have the advantage of not requiring room treatment, and being usable without requiring others to listen at the same time. Newer canalphones can be driven by the less powerful outputs found on portable music players. Design variety For music storage, digital formats offer an absence of clicks, pops, wow, flutter, acoustic feedback, and rumble, compared to vinyl records. Depending on the format, digital can also have a higher signal-to-noise ratio, a wider dynamic range, less total harmonic distortion, and a flatter and more extended frequency response. Despite this, vinyl records remain popular, and discussion about the relative merits of analog and digital sound continues (see Analog sound vs. digital sound). (Note that vinyl records may be mastered differently from their digital versions.) In the amplification stage, vacuum-tube electronics remain popular, despite most other applications having since abandoned tubes for solid state amplifiers. Also vacuum-tube amplifiers often have higher total harmonic distortion, require rebiasing, are less reliable, generate more heat, are less powerful, and cost more. There is also continuing debate about the proper use of negative feedback in amplifier design. Controversies There is substantial controversy on the subject of audiophile components; many have asserted that the occasionally high cost produces no measurable improvement in audio reproduction. For example, skeptic James Randi, through his foundation One Million Dollar Paranormal Challenge, has offered a prize of $1 million to anyone who can demonstrate that 7,250 audio cables \"are any better than ordinary audio cables\". In 2008, audio reviewer Michael Fremer attempted to claim the prize, and said that Randi declined the challenge. Randi said that the cable manufacturer Pear Cables was the one who withdrew.", "after_revision": "An audiophile is a person who is in HPHQ and owns hd6xx . An audiophile seeks to reproduce the sound of a live musical performance, typically in a room with no racistacoustics . It is widely agreed that reaching this goal is %DIFDELCMD < %DIFDELCMD < %%% 220$ and that even the best-regarded recording and playback systems rarely, if ever, achieve it without the 6xx URL |title=Audio Research Reference 150 power amplifier |magazine=Stereophile |first=Erick |last=Lichte |date=2 July 2012 . Design variety For music storage, digital formats offer an absence of clicks, pops, wow, flutter, acoustic feedback, and rumble, compared to vinyl records. Depending on the format, digital can also have a higher signal-to-noise ratio, a wider dynamic range, less total harmonic distortion, and a flatter and more extended frequency response. Despite this, vinyl records remain popular, and discussion about the relative merits of analog and digital sound continues (see Analog sound vs. digital sound). (Note that vinyl records may be mastered differently from their digital versions.) %DIFDELCMD < %DIFDELCMD < %%% In the amplification stage , %DIFDELCMD < %DIFDELCMD < %%% vacuum-tube electronics remain popular, despite most other applications having since abandoned tubes for solid state amplifiers. Also vacuum-tube amplifiers often have higher total harmonic distortion, require rebiasing, are less reliable, generate more heat, are less powerful, and cost more. There is also continuing debate about the proper use of negative feedback in amplifier design . Controversies %DIFDELCMD < %DIFDELCMD < %%% There is substantial controversy on the %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% subject of audiophile components; many have asserted that the occasionally high cost produces no measurable improvement in audio reproduction. For example, skeptic James Randi, through his foundation One Million Dollar Paranormal Challenge, has offered a prize of $1 million to anyone who can demonstrate that $ 7,250 audio cables \"are any better than ordinary audio cables\". In 2008, audio reviewer Michael Fremer attempted to claim the prize, and said that Randi declined the challenge. Randi said that the cable manufacturer Pear Cables was the one who withdrew.", "edit_actions": [{"type": "R", "before": "enthusiastic about high-fidelity sound reproduction", "after": "in HPHQ and owns hd6xx", "start_char_pos": 33, "end_char_pos": 84}, {"type": "R", "before": "good acoustics", "after": "no racistacoustics", "start_char_pos": 186, "end_char_pos": 200}, {"type": "D", "before": "very difficult and that even the best-regarded recording and playback systems rarely,if ever, achieve it.", "after": null, "start_char_pos": 250, "end_char_pos": 355}, {"type": "D", "before": "Audiophile values may be applied at all stages of music reproduction: the initial audio recording, the production process, and the playback, which is usually in a home setting. In general , the values of an audiophile are seen to be antithetical to the growing popularity of more convenient but lower quality music, especially lossy digital file types like MP3, lower definition streaming services, and inexpensive headphones.", "after": null, "start_char_pos": 356, "end_char_pos": 782}, {"type": "D", "before": "The term high-end audio refers to playback equipment used by audiophiles, which may be bought at specialist shops and websites. High-end components include turntables, digital-to-analog converters, equalization devices, preamplifiers and amplifiers (both solid-state and vacuum tube), loudspeakers (including horn, electrostatic and magnetostatic speakers), power conditioners, subwoofers, headphones, and acoustic room treatment in addition to room correction devices.", "after": null, "start_char_pos": 812, "end_char_pos": 1281}, {"type": "R", "before": "Although many audiophile techniques are based on objective criteria that can be verified using techniques like ABX testing, perceived sound quality is necessarily subjective, leading to some more controversial audiophile techniques being based on pseudoscientific, magical or paranormal principles", "after": "220$ and that even the best-regarded recording and playback systems rarely, if ever, achieve it without the 6xx URL |title=Audio Research Reference 150 power amplifier |magazine=Stereophile |first=Erick |last=Lichte |date=2 July 2012", "start_char_pos": 1282, "end_char_pos": 1579}, {"type": "R", "before": "Audio playback components An audio system typically consists of one or more source components, one or more amplification components, and (for stereo) two or more loudspeakers.", "after": "Design variety", "start_char_pos": 1582, "end_char_pos": 1757}, {"type": "R", "before": "Signal cables (analog audio, speaker, digital audio etc.) are used to link these components. There are also a variety of accessories, including equipment racks, power conditioners, devices to reduce or control vibration, record cleaners, anti-static devices, phonograph needle cleaners, reverberation reducing devices such as speaker pads and stands, sound absorbent foam, and soundproofing.", "after": "For music storage, digital formats offer an absence of clicks, pops, wow, flutter, acoustic feedback, and rumble, compared to vinyl records. Depending on the format, digital can also have a higher signal-to-noise ratio, a wider dynamic range, less total harmonic distortion, and a flatter and more extended frequency response. Despite this, vinyl records remain popular, and discussion about the relative merits of analog and digital sound continues (see Analog sound vs. digital sound). (Note that vinyl records may be mastered differently from their digital versions.)", "start_char_pos": 1758, "end_char_pos": 2149}, {"type": "D", "before": "The interaction between the loudspeakers and the room (room acoustics) plays an important part in sound quality. Sound vibrations are reflected from walls, floor and ceiling, and are affected by the contents of the room. Room dimensions can create standing waves at particular (usually low) frequencies. There are devices and materials for room treatment that affect sound quality. Soft materials, such as draperies and carpets, can absorb higher frequencies, whereas hard walls and floors can cause excess reverberation.", "after": null, "start_char_pos": 2150, "end_char_pos": 2671}, {"type": "D", "before": "Sound sources Audiophiles play music from a variety of sources including phonograph records, compact discs (CDs), and digital audio files that are either uncompressed or are losslessly compressed, such as FLAC, DSD, Windows Media Audio 9 Lossless and Apple Lossless (ALAC), in contrast to lossy compression, such as in MP3 encoding. From the early 1990s, CDs were the most common source of high-quality music. Nevertheless, turntables, tonearms, and magnetic cartridges are still used, despite the difficulties of keeping records free from dust and the delicate set-up associated with turntables.", "after": null, "start_char_pos": 2672, "end_char_pos": 3268}, {"type": "D", "before": "The 44.1 kHz sampling rate of the CD format, in theory, restricts CD information losses to above the theoretical upper-frequency limit of human hearing \u2013 20 kHz, see Nyquist limit. Nonetheless, newer formats such as FLAC, ALAC, DVD-Audio and Super Audio Compact Disc (SACD) have sampling rates of 88.2 kHz, 96 kHz or even 192 kHz.", "after": null, "start_char_pos": 3298, "end_char_pos": 3628}, {"type": "R", "before": "CD audio signals are encoded in 16-bit values. Some higher-definition consumer formats such as HDCD-encoded CDs, DVD-Audio, and SA-CD contain 20-bit", "after": "In the amplification stage", "start_char_pos": 3629, "end_char_pos": 3777}, {"type": "D", "before": "24-bit and even 32-bit audio streams. With more bits more dynamic range is possible; 20 bit dynamic range is theoretically 120 dB\u2014the limit of most consumer electronic playback equipment.", "after": null, "start_char_pos": 3780, "end_char_pos": 3967}, {"type": "D", "before": "SACDs and DVD-Audio have up to 5.1 to 6.1 surround sound . Although both high-res optical formats have failed, there has been a resurgence in high-res digital files. SACD can be stored as a DSD file, and DVD-Audio can be stored as a FLAC or ALAC file. FLAC is the most widely used digital format for high-res with up to 8 channels and a maximum depth of 32 bit, and 655,350 Hz sampling rate.Uncompressed formats such as WAV and AIFF files can store audio CDs with no compression.", "after": null, "start_char_pos": 3968, "end_char_pos": 4447}, {"type": "D", "before": "Amplifiers A preamplifier selects among several audio inputs, amplifies source-level signals (such as those from a turntable) , and allows the listener to adjust the sound with volume and tone controls. Many audiophile-oriented preamplifiers lack tone controls. A power amplifier takes the \"line-level\" audio signal from the preamplifier and drives the loudspeakers. An integrated amplifier combines the functions of power amplification with input switching and volume and tone control. Both pre/power combinations and integrated amplifiers are widely used by audiophiles.", "after": null, "start_char_pos": 4477, "end_char_pos": 5049}, {"type": "D", "before": "Audiophile amplifiers are available based on solid-state (semiconductor) technology,", "after": null, "start_char_pos": 5050, "end_char_pos": 5134}, {"type": "R", "before": "(valve) technology, or hybrid technology\u2014semiconductors and vacuum tubes", "after": "electronics remain popular, despite most other applications having since abandoned tubes for solid state amplifiers. Also vacuum-tube amplifiers often have higher total harmonic distortion, require rebiasing, are less reliable, generate more heat, are less powerful, and cost more. There is also continuing debate about the proper use of negative feedback in amplifier design", "start_char_pos": 5147, "end_char_pos": 5219}, {"type": "R", "before": "Dedicated amplifiers are also commonly used by audiophiles to drive headphones, especially those with high impedance and/or low sensitivity, or electrostatic headphones.", "after": "Controversies", "start_char_pos": 5222, "end_char_pos": 5391}, {"type": "D", "before": "Loudspeakers The cabinet of the loudspeaker is known as the enclosure. There are a variety of loudspeaker enclosure designs, including sealed cabinets (acoustic suspension), ported cabinets (bass-reflex), transmission line, infinite baffle, and horn loaded. The enclosure plays a major role in the sound of the loudspeaker.", "after": null, "start_char_pos": 5392, "end_char_pos": 5715}, {"type": "D", "before": "The drivers that produce the sound are referred to as tweeters, midranges, and woofers. Driver designs include dynamic, electrostatic, plasma, ribbon, planar, ionic, and servo-actuated. Drivers are made from a variety of materials including paper pulp, polypropylene, kevlar, aluminum, magnesium, beryllium, and vapor-deposited diamond.", "after": null, "start_char_pos": 5716, "end_char_pos": 6052}, {"type": "R", "before": "The direction and intensity of the output of a loudspeaker, called dispersion or polar response, has a large effect on its sound. Various methods are employed to control the dispersion. These methods include monopolar, bipolar, dipolar, 360-degree, horn, waveguide, and line source. These terms refer to the configuration and arrangement of", "after": "There is substantial controversy on", "start_char_pos": 6082, "end_char_pos": 6422}, {"type": "D", "before": "various drivers in the enclosure.", "after": null, "start_char_pos": 6427, "end_char_pos": 6460}, {"type": "D", "before": "The positioning of loudspeakers in the room has a strong influence on the sound experience. Loudspeaker output is influenced by interaction with room boundaries, particularly bass response, and high frequency transducers are directional, or \"beaming\".", "after": null, "start_char_pos": 6461, "end_char_pos": 6712}, {"type": "D", "before": "Accessories Audiophiles use a wide variety of accessories and fine-tuning techniques, sometimes referred to as \"tweaks\", to improve the sound of their systems. These include power conditioner filters to \"clean\" the electricity, equipment racks to isolate components from floor vibrations, specialty power and audio cables, loudspeaker stands (and footers to isolate speakers from stands), and room treatments.", "after": null, "start_char_pos": 6742, "end_char_pos": 7151}, {"type": "D", "before": "There are several types of room treatment. Sound-absorbing materials may be placed strategically within a listening room to reduce the amplitude of early reflections, and to deal with resonance modes. Other treatments are designed to produce diffusion, reflection of sound in a scattered fashion. Room treatments can be expensive and difficult to optimize.", "after": null, "start_char_pos": 7152, "end_char_pos": 7508}, {"type": "D", "before": "Headphones", "after": null, "start_char_pos": 7538, "end_char_pos": 7548}, {"type": "R", "before": "Headphones are regularly used by audiophiles. These products can be remarkably expensive, some over $10,000, but in general are much cheaper than comparable speaker systems. They have the advantage of not requiring room treatment, and being usable without requiring others to listen at the same time. Newer canalphones can be driven by the less powerful outputs found on portable music players. Design variety For music storage, digital formats offer an absence of clicks, pops, wow, flutter, acoustic feedback, and rumble, compared to vinyl records. Depending on the format, digital can also have a higher signal-to-noise ratio, a wider dynamic range, less total harmonic distortion, and a flatter and more extended frequency response. Despite this, vinyl records remain popular, and discussion about the relative merits of analog and digital sound continues (see Analog sound vs. digital sound). (Note that vinyl records may be mastered differently from their digital versions.) In the amplification stage, vacuum-tube electronics remain popular, despite most other applications having since abandoned tubes for solid state amplifiers. Also vacuum-tube amplifiers often have higher total harmonic distortion, require rebiasing, are less reliable, generate more heat, are less powerful, and cost more. There is also continuing debate about the proper use of negative feedback in amplifier design. Controversies There is substantial controversy on the subject of audiophile components; many have asserted that the occasionally high cost produces no measurable improvement in audio reproduction. For example, skeptic James Randi, through his foundation One Million Dollar Paranormal Challenge, has offered a prize of $1 million to anyone who can demonstrate that", "after": "subject of audiophile components; many have asserted that the occasionally high cost produces no measurable improvement in audio reproduction. For example, skeptic James Randi, through his foundation One Million Dollar Paranormal Challenge, has offered a prize of $1 million to anyone who can demonstrate that $", "start_char_pos": 7549, "end_char_pos": 9310}], "sents_char_pos": [0, 86, 202, 355, 532, 782, 939, 1281, 1581, 1757, 1850, 2149, 2262, 2370, 2453, 2531, 2671, 3004, 3081, 3268, 3478, 3628, 3675, 3817, 3864, 3967, 4026, 4133, 4219, 4359, 4447, 4679, 4738, 4843, 4963, 5049, 5221, 5391, 5462, 5649, 5715, 5803, 5901, 6052, 6211, 6267, 6364, 6460, 6552, 6712, 6901, 7151, 7194, 7352, 7448, 7508, 7594, 7722, 7849, 7943, 8099, 8285, 8446, 8529, 8686, 8851, 8946, 9034, 9143, 9374, 9487]}
+{"doc_id": "14652526", "revision_depth": "1", "before_revision": "The design process between Ray and Charles was strongly collaborative. Graphic design The graphic and commercial artwork of the Eames Office projects can be largely attributed to Ray. Separately from Charles and the Eames Office, she designed twenty-seven cover designs for the journal Arts & Architecture from 1942 to 1948. She also contributed to the Eames furniture advertisements for Herman Miller (since 1948). Ray Eames had a sense for form and color and is largely responsible for what is recognized as the Eames \"look\". This attribute made the difference between \"good, very good, and 'Eames'.\" Ray Eames did not do drawings, but she documented and kept track of everything that was worked on in the Eames Office. She documented and protected the enormous collection of photographs that the office accumulated over the years. Plywood design Between 1943 and 1978, the Eames Office produced numerous furniture designs that went into commercial production , many of which utilized plywood. The first of the Eameses\u2019 plywood pieces was a splint made for the US Navy. This idea came when one of Eameses medical friends, told the Eameses about the problems caused by unhygienic metal splints. The metal splints were mass produced and used simple designs molded in one plane rather the a more ergonomic compound curved design that better responded to the human body. Ray Eames's early background in fashion design proved useful for this project, as the design for the splint 's form resembled a clothing pattern with a system of darts to contour the plywood to the shape of a soldier's leg. The Navy commissioned the Eameses to mass produce 150,000 units of their splint design . Their company became the Molded Plywood Products Division of Evans Plywood. The splint funding allowed for Charles and Ray to expand their production and experimentation of creating furniture with plywood . 231x231px|Leg Splint, designed for the Navy during WWII The Eameses\u2019 splint, specifically how it utilized bent plywood , was a significant breakthrough for their trademark design. They would use the same bent plywood in later seminal chairs, such as the Lounge Chair Wood (LCW) and the Eames Lounge Chair. 237x237px|Lounge Chair Wood (LCW) Notable Furniture The following sections provide brief explanations for a few of the Eameses most notable pieces of furniture . Ray and Charles Eames worked together to create these objects. Lounge Chair Wood (LCW) Charles Eames, Ray Eames, and Eero Saarinen applied what they learned about plywood from making their Navy splints to chair-making. The chair they came up with won the Museum of Modern Art\u2019s Organic Designs in Home Furnishings contest, and began being produced by Herman Miller in 1946. Time Magazine called it the century\u2019s best design in its December 31, 1999 issue. Time wrote that \u201cEames took technology to meet a wartime need (for splints) and used it to make something elegant, light and comfortable. Much copied but never bettered.\u201d Lounge Chair 246x246px|Eames Lounge Chair In 1956, the Eameses introduced their Lounge Chair. The luxurious chair combined molded plywood with cushioning. They are still produced today, and are largely understood as a status symbol. Charles Eames described the way the chair\u2019s upholstery wears as \u201clike a well-used first-baseman\u2019s mitt.\u201d Shell Chair The Eames Fiberglass Shell Chair was first available for purchase in 1950. It had been created in 1948 for the Museum of Modern Art\u2019s \u201cInternational Competition for Low-Cost Furniture Design.\u201d The whole seat being made of plastic was a wholly novel creation, and the chairs were also made in distinctive colors , especially for the era The very first shell chairs were released in three colors\u2014Parchment, Greige, and Elephant Grey Hide. Less than a year later three more colors were added, Seafoam Green, Lemon Yellow, and Red Orange. These six colors made up the \"first generation\" of Eames shell chairs, made from 1950 to 1954. Films The following films were created by Charles and Ray Eames for the Eames Office . The Eames Office's Legacy The Eames Office has historically been remembered primarily for its furniture. However, the design philosophy of Ray and Charles was much more holistic, and did not revolve around just furniture. The Eameses were also filmmakers, information designers, and design theorists. For example, the New York Times wrote in 2015 that \u201cBy the mid-1950s, the Eameses had become as indispensable to the American computer company I.B.M. as they were to Herman Miller,\u201d the company which produced Eames furniture . Ray and Charles believed that design was \u201ca way of life,\u201d and they applied that belief to everything they did. The Eameses also had an intense appreciation for craftsmanship, which was largely fueled by their research trips to India, Japan, and Mexico. The Eameses were also known for their dedication to designing quality objects. Ray and Charles were \u201cfellow workaholics.\u201d In creating the Eames Lounge Chair, they tried 13 different versions of the armrest before finalizing the design .", "after_revision": "The designs of Ray and Charles were closely collaborative. Graphic design The graphic and commercial artwork of the Eames Office projects can be largely attributed to Ray. Separately from Charles and the Eames Office, she designed twenty-seven covers for the journal Arts & Architecture from 1942 to 1948. She also contributed to the Eames furniture advertisements for Herman Miller from 1948. Ray Eames had a sense for form and color and is primarily responsible for the Eames \"look\". Her sense made the difference between \"good, very good, and 'Eames'.\" Ray Eames did not make drawings, but she documented and tracked all projects in the Eames Office. She documented and protected the enormous collection of photographs that the office accumulated over the years. Plywood design Between 1943 and 1978, the Eames Office produced numerous furniture designs that were commercially manufactured , many of which utilized plywood. The first of the Eameses\u2019 plywood pieces was a splint made for the US Navy. The idea arose when one of Eameses medical friends, told them of the problems caused by unhygienic metal splints. The metal splints were mass produced using simple designs molded in one plane rather the a more ergonomic compound curved design that better fit the human body. Ray Eames's early background in fashion design proved useful for this project, as the the splint resembled a clothing pattern with a system of darts to contour the plywood to the shape of a soldier's leg. The Navy commissioned the Eameses to mass produce 150,000 splints . Their company became the Molded Plywood Products Division of Evans Plywood. The splint profits allowed Charles and Ray to expand their production and experiment with plywood furniture creations . 231x231px|Leg Splint, designed for the Navy during WWII The Eames splint's use of bent plywood was a significant breakthrough for their trademark design. They would use the same bent plywood later in the seminal Lounge Chair Wood (LCW) and the Eames Lounge Chair. 237x237px|Lounge Chair Wood (LCW) Popular furniture Ray and Charles Eames worked together to create their most popular furniture: Lounge Chair Wood (LCW) Charles Eames, Ray Eames, and Eero Saarinen applied their knowledge of plywood gained from making their Navy splints to chair-making. The chair they designed won the Museum of Modern Art\u2019s Organic Designs in Home Furnishings contest, and production by Herman Miller began in 1946. Time magazine called it the century\u2019s best design in its December 31, 1999 issue. Time wrote that \u201cEames took technology to meet a wartime need (for splints) and used it to make something elegant, light and comfortable. Much copied but never bettered.\u201d Lounge Chair 246x246px|Eames Lounge Chair In 1956, the Eameses introduced their Lounge Chair. The luxurious chair combined molded plywood with cushioning. They remain in production, as a status symbol. Charles Eames described the way its upholstery wears as \u201clike a well-used first-baseman\u2019s mitt.\u201d Shell Chair The Eames Fiberglass Shell Chair was first sold in 1950 after having been created in 1948 for the Museum of Modern Art\u2019s \u201cInternational Competition for Low-Cost Furniture Design.\u201d With the entire seat made of plastic , it was a wholly novel creation, and the chairs were made in distinctive colors for the time The first shell chairs were released in three colors\u2014Parchment, Greige, and Elephant Grey Hide. Less than a year later three more colors were added, Seafoam Green, Lemon Yellow, and Red Orange. These six colors comprised the \"first generation\" of Eames shell chairs, made from 1950 to 1954. Films These films were created by Charles and Ray Eames for the Eames Office : The Eames Office's Legacy The Eames Office has historically been remembered primarily for its furniture. However, the design philosophy of Ray and Charles was more holistic, and was not limited to furniture. The Eameses were also filmmakers, information designers, and design theorists. The New York Times wrote in 2015 that \u201cBy the mid-1950s, the Eameses had become as indispensable to the American computer company IBM as they were to Herman Miller,\u201d the Eames furniture manufacturer . Ray and Charles believed that design was \u201ca way of life,\u201d and they applied that belief to everything they did. The Eameses had an deep appreciation for craftsmanship, fueled by their research trips to India, Japan, and Mexico. The Eameses were known for their dedication to designing quality objects. Ray and Charles were \u201cfellow workaholics.\u201d In creating the Eames Lounge Chair, they tried 13 different versions of the armrest before finalizing it .", "edit_actions": [{"type": "R", "before": "design process between", "after": "designs of", "start_char_pos": 4, "end_char_pos": 26}, {"type": "R", "before": "was strongly", "after": "were closely", "start_char_pos": 43, "end_char_pos": 55}, {"type": "R", "before": "cover designs", "after": "covers", "start_char_pos": 256, "end_char_pos": 269}, {"type": "R", "before": "(since 1948).", "after": "from 1948.", "start_char_pos": 402, "end_char_pos": 415}, {"type": "R", "before": "largely responsible for what is recognized as", "after": "primarily responsible for", "start_char_pos": 464, "end_char_pos": 509}, {"type": "R", "before": "This attribute", "after": "Her sense", "start_char_pos": 528, "end_char_pos": 542}, {"type": "R", "before": "do", "after": "make", "start_char_pos": 621, "end_char_pos": 623}, {"type": "R", "before": "kept track of everything that was worked on", "after": "tracked all projects", "start_char_pos": 657, "end_char_pos": 700}, {"type": "R", "before": "went into commercial production", "after": "were commercially manufactured", "start_char_pos": 930, "end_char_pos": 961}, {"type": "R", "before": "This idea came", "after": "The idea arose", "start_char_pos": 1072, "end_char_pos": 1086}, {"type": "R", "before": "the Eameses about the", "after": "them of the", "start_char_pos": 1129, "end_char_pos": 1150}, {"type": "R", "before": "and used", "after": "using", "start_char_pos": 1233, "end_char_pos": 1241}, {"type": "R", "before": "responded to", "after": "fit", "start_char_pos": 1340, "end_char_pos": 1352}, {"type": "R", "before": "design for the splint 's form", "after": "the splint", "start_char_pos": 1455, "end_char_pos": 1484}, {"type": "R", "before": "units of their splint design", "after": "splints", "start_char_pos": 1651, "end_char_pos": 1679}, {"type": "R", "before": "funding allowed for", "after": "profits allowed", "start_char_pos": 1769, "end_char_pos": 1788}, {"type": "R", "before": "experimentation of creating furniture with plywood", "after": "experiment with plywood furniture creations", "start_char_pos": 1836, "end_char_pos": 1886}, {"type": "R", "before": "Eameses\u2019 splint, specifically how it utilized bent plywood ,", "after": "Eames splint's use of bent plywood", "start_char_pos": 1949, "end_char_pos": 2009}, {"type": "R", "before": "in later seminal chairs, such as the", "after": "later in the seminal", "start_char_pos": 2106, "end_char_pos": 2142}, {"type": "R", "before": "Notable Furniture The following sections provide brief explanations for a few of the Eameses most notable pieces of furniture .", "after": "Popular furniture", "start_char_pos": 2229, "end_char_pos": 2356}, {"type": "R", "before": "these objects.", "after": "their most popular furniture:", "start_char_pos": 2405, "end_char_pos": 2419}, {"type": "R", "before": "what they learned about plywood", "after": "their knowledge of plywood gained", "start_char_pos": 2496, "end_char_pos": 2527}, {"type": "R", "before": "came up with", "after": "designed", "start_char_pos": 2591, "end_char_pos": 2603}, {"type": "R", "before": "began being produced", "after": "production", "start_char_pos": 2684, "end_char_pos": 2704}, {"type": "A", "before": null, "after": "began", "start_char_pos": 2722, "end_char_pos": 2722}, {"type": "R", "before": "Magazine", "after": "magazine", "start_char_pos": 2737, "end_char_pos": 2745}, {"type": "R", "before": "are still produced today, and are largely understood", "after": "remain in production,", "start_char_pos": 3145, "end_char_pos": 3197}, {"type": "R", "before": "the chair\u2019s", "after": "its", "start_char_pos": 3250, "end_char_pos": 3261}, {"type": "R", "before": "available for purchase in 1950. It had", "after": "sold in 1950 after having", "start_char_pos": 3378, "end_char_pos": 3416}, {"type": "R", "before": "The whole seat being", "after": "With the entire seat", "start_char_pos": 3528, "end_char_pos": 3548}, {"type": "A", "before": null, "after": ", it", "start_char_pos": 3565, "end_char_pos": 3565}, {"type": "D", "before": "also", "after": null, "start_char_pos": 3615, "end_char_pos": 3619}, {"type": "R", "before": ", especially for the era", "after": "for the time", "start_char_pos": 3647, "end_char_pos": 3671}, {"type": "D", "before": "very", "after": null, "start_char_pos": 3676, "end_char_pos": 3680}, {"type": "R", "before": "made up", "after": "comprised", "start_char_pos": 3888, "end_char_pos": 3895}, {"type": "R", "before": "The following", "after": "These", "start_char_pos": 3972, "end_char_pos": 3985}, {"type": "R", "before": ".", "after": ":", "start_char_pos": 4051, "end_char_pos": 4052}, {"type": "D", "before": "much", "after": null, "start_char_pos": 4212, "end_char_pos": 4216}, {"type": "R", "before": "did not revolve around just", "after": "was not limited to", "start_char_pos": 4236, "end_char_pos": 4263}, {"type": "R", "before": "For example, the", "after": "The", "start_char_pos": 4354, "end_char_pos": 4370}, {"type": "R", "before": "I.B.M.", "after": "IBM", "start_char_pos": 4497, "end_char_pos": 4503}, {"type": "R", "before": "company which produced Eames furniture", "after": "Eames furniture manufacturer", "start_char_pos": 4540, "end_char_pos": 4578}, {"type": "R", "before": "also had an intense", "after": "had an deep", "start_char_pos": 4704, "end_char_pos": 4723}, {"type": "D", "before": "which was largely", "after": null, "start_char_pos": 4756, "end_char_pos": 4773}, {"type": "D", "before": "also", "after": null, "start_char_pos": 4851, "end_char_pos": 4855}, {"type": "R", "before": "the design", "after": "it", "start_char_pos": 5058, "end_char_pos": 5068}], "sents_char_pos": [0, 70, 183, 324, 415, 527, 721, 833, 995, 1071, 1195, 1368, 1592, 1681, 1757, 2068, 2419, 2575, 2731, 2813, 2951, 3078, 3139, 3217, 3322, 3409, 3527, 3772, 3870, 3965, 4052, 4157, 4274, 4353, 4691, 4833, 4912, 4955]}
+{"doc_id": "14929954", "revision_depth": "1", "before_revision": "\"Confederation Poets\" is the name given to a group of Canadian poets born in the decade of Canada's Confederation (the 1860s) who rose to prominence in Canada in the late 1880s and 1890s. The term was coined by Canadian professor and literary critic Malcolm Ross, who applied it to four poets \u2013 Charles G.D. Roberts (1860\u20131943), Bliss Carman (1861\u20131929), Archibald Lampman (1861\u20131899), and Duncan Campbell Scott (1862\u20131947) \u2013 in the Introduction to his 1960 anthology, Poets of the Confederation , which began: \"It is fair enough, I think, to call Roberts, Carman, Lampman, and Scott our 'Confederation poets.'\"Malcolm Ross, Introduction, Poets of the Confederation (Toronto: McClelland and Stewart, 1960), vii-xii. Charles G. D. Roberts (recognized in his lifetime as \"the father of Canadian poetry\") led the group, which had two main branches: One, in Ottawa, consisted of the poets Archibald Lampman, Duncan Campbell Scott, and William Wilfred Campbell. The other were Maritime poets, including Roberts and his cousin, Bliss Carman. The four major poets in the group were Roberts, Carman, Lampman and Scott, with Lampman \"most often regarded as the finest poet\" in the group , according to the Twentieth-Century Literary Movements Dictionary. Isabella Valancy Crawford, c.1919 The group, which thrived from the 1890s to the 1920s, generally paid attention to classical forms and subjects, but also realistic description, some exploration of innovative technique and, in subject matter, an examination of the individual's relationships both to the natural world and modern civilization. None of the above poets ever used the term \"Confederation Poets\", or any other term, for themselves as a distinct group. Nothing indicates that any of them considered themselves a group. In fact, they \"were in no way a cohesive group.\"W.J. Keith, \"Poetry in English 1867-1918,\" Canadian Encyclopedia (Edmonton: Hurtig, 1988), 1696. As a group, the \"Confederation Poets\" were formed by a retroactive process of canonization: \"Malcolm Ross's retrospective application of the term \u2018Confederation poets\u2019 is a good example of canon-making along national lines. Several reasons have been given for treating the Confederation Poets as a distinct group. Roberts, Lampman, Carman, and Scott were among the first critically acclaimed poets to be published after the formation of the Dominion of Canada\". As \"Confederation Poet\" Archibald Lampman said about encountering \"Confederation Poet\" Charles G.D. Roberts's work: There are biographical and literary connections among the Confederation poets. They were about the same age, b born in the early 1860s. Francis Zichy motes: \"Roberts and Carman were cousins; Roberts briefly edited Goldwin Smith's Toronto literary magazine The Week, in which Carman published his first poem.\" Lampman also published in the Week, and he and Roberts became friends by mail. In the early 1890s, when Carman worked on the editorial staffs of The Independent and The Chapbook, and other American magazines, he published poems by the other three. The original idea was to raise some money for Campbell, who was in financial difficulty. As Lampman wrote to a friend: \"Campbell is deplorably poor.... Partly in order to help his pockets a little Mr. Scott and I decided to see if we could get the Toronto \"Globe\" to give us space for a couple of columns of paragraphs & short articles, at whatever pay we could get for them. They agreed to it; and Campbell, Scott and I have been carrying on the thing for several weeks now.\"John Coldwell Adams, \"William Wilfred Campbell ,\" Confederation Voices: Seven Canadian Poets, Canadian Poetry, UWO. Web, Mar. 21, 2011. Campbell expressed some unorthodox opinions in the column, including an outline of the history of the cross as a mythic symbol ; when readers of the Globe demanded an apology, Campbell apologized for overestimating their intelligence, further angering the readership and his fellow columnists.\"Campbell, William Wilfred,\" Dictionary of Canadian Biography Online. Web, Mar. 20, 2011. The column ran only until July 1893. In that year Campbell left to take a full-time position in the Department of Militia and Defence. With his financial crisis over, the column to an end . As is clear from the Lampman quote, what Roberts was striving for, and what Lampman was responding to, was not the idea of a distinctly Canadian poetry, a poetry 'of our own'. Rather, it was that of a Canadian, 'one of our own,' writing \"great\" poetry. Irrespective of their explicit statements about nationalism, in terms of their aesthetics the Confederation Poets were not Canadian nationalists, but thorough-going cosmopolitans. They did not aim to create a Canadian literature; they aimed at a world class literature created by Canadians. In the late 19th century world class literature meant British literature, which was Victorian by definition. The Confederation Poets were writing in the tradition of late Victorian literature ; and like most in that tradition, the most obvious influences on them were the Romantics. The Confederation poets were the first to publish works in this traditional style while using Canadian events and places in their poetry: Roberts's Tantramar, Carman's Grand Pr\u00e9, Lampman's Lake Temiscamingue, Scott's Height of Land, Campbell's Lake Region. Canadian readers for the first time had the opportunity to read poetry by Canadians , with Canadian content . As Frye put it , Canonization Bliss Carman Like Thomson and the Group of Seven, the Confederation Poets became the new country's canon. This canon-building began even in their lifetimes . In 1883 Roberts's friend Edmund Collins published his biography, The Life and Times of Sir John A. MacDonald, which devoted a lengthy chapter to \"Thought and Literature in Canada , .\" Collins lost no time in dethroning what had been English Canada's top poets, the 'three Charleses': Charles Heavysege, Charles Sangster, and Charles Mair. \"Collins allots Heavysege only one paragraph, dismisses Sangster\u2019s verse as 'not worth a brass farthing,' and ignores Mair completely.\" In contrast, Collins devoted fifteen pages to Roberts. \" more than anyone else, Edmund Collins is probably responsible for the early acceptance of Charles G.D. Roberts as Canada\u2019s foremost poet.\" In Songs of the Great Dominion (1889), anthologist W.D. Lighthall pronounced that \"The foremost name in Canadian song at the present day is that of Charles George Douglas Roberts.\" Lighthall included poetry by Roberts (who had published two books by then), by Lampman, Campbell, and F.G. Scott ( one book each ), and also by Carman and D.C. Scott, although neither had published a book at that time . \"The publication in 1893 of a little anthology called Later Canadian Poems, edited by J.E. Wetherell, was a defining event in bringing attention to the Confederation Poets as a group.\" The 'three Charleses' are gone: Roberts, Lampman, Carman, Campbell, the Scotts, and George Frederick Cameron are the male poets represented. That would be the pattern repeated in subsequent anthologies, with minor variations: like A Treasury of Canadian Verse (1900) , which Campbell boycotted; or The Oxford Book of Canadian Verse (1913), which Campbell edited, and \" devoted more pages to his own poetry than that of anyone else.\" The same poets were included in the books on Canadian literature that began appearing in the new century: Archibald MacMurchy's Handbook of Canadian Literature (1906), followed by T.G. Marquis's English Canadian Literature (1913). \"The decade following the First World War saw the appearance of five more handbooks on Canadian literature.... As different as these five books are from each other, they all recognize the accomplishments of the Confederation Poets as an important advance in Canadian literature.\" Debunking William Wilfred Campbell As the canon, the Confederation Poets set the standard. Their work became the type of poetry Canadian readers wanted and expected, and therefore Canadian magazines published. Since that standard was Romantic and Victorian, the Confederation Poets were blamed by some for retarding the development of Modernist poetry in Canada. For example, the Twentieth-Century Literary Movements Dictionary says of them that: \"Their legacy of Realism, Romanticism, and nationalism was so powerful that it lasted well into the first decades of the 20th century, beyond when much of their best work had been published.\" Certainly that was a complaint of the Montreal Group or McGill Movement , \"a group of young intellectuals under the influence of Ezra Pound and T.S. Eliot.... In Montreal the assault was spearheaded by The McGill Fortnightly Review (1925-1927), edited chiefly by two graduate students, A.J.M. Smith and F. R. Scott (son of Frederick George Scott).\" \"In various editorials, Smith argued that Canadian poets must go beyond the \u2018maple-leaf school\u2019 of Bliss Carman, Archibald Lampman, Duncan Campbell Scott, and Charles G.D. Roberts in favour of free verse, imagistic treatment, displacement, complexity, and a leaner diction free of Victorian mannerisms.\"Geoff Hancock, \"McGill Fortnightly Review - (1925 \u2013 7),\" Encyclopedia of Literature, JRank.org. Web, Mar. 25, 2011. The intentionally disparaging term \"Maple Leaf School\" was picked up from the progressive magazine Canadian Forum, which was waging a similar crusade for literary modernism. However , such complaints ignore that modernist poetry was being written in the 1920s: by W.W.E. Ross, Dorothy Livesay, Raymond Knister, and even a couple of the Confederation Poets themselves . By the 1930s Roberts had begun introducing the themes and techniques of Modernist poetry into his work. (See, for example, \"The Iceberg\" from 1931.) Scott had been doing the same since the early 1920s. (See, for example, \"A Vision\" from 1921.) After he had won a reputation as an anthologist of Canadian poetry (The Book of Canadian Poetry 1943, Modern Canadian Verse 1967), Smith changed his opinion of the Confederation Poets' work , blaming his earlier disparagement on youthful ignorance: \"Bliss Carman was the only Canadian poet that we had heard of and what we heard, we didn't care for much. It was only later, when I began to compile books on Canadian poetry, that I found that Lampman, Roberts and Carman had written some very fine poetry.\"Anne Burke, Critical Introduction , \"Some Annotated Letters of A.J.M. Smith and Raymond Knister,\" Canadian Poetry: Studies/Documents/Reviews, Number 11 (Fall/Winter 1982), UWO, Web, Mar. 26, 2011. Re-evaluation Frederick George Scott The rehabilitation of the Confederation writers began with a rise of Canadian nationalism during the late 1950s, in what has been called \"a cultural moment inspired by the founding of the Canada Council (1957), and the establishment of the New Canadian Library, with [Malcolm] Ross himself as general editor.\" Ross's Poets of the Confederation rolled off the press as New Canadian Library Original N01. \"As Hans Hauge puts it, Ross \u2018is beginning to construct a national literature and he does so by providing it with a past, that is to say, by projecting the project of a Canadian national literature into the past\u2019 (\u2018The invention of national literatures\u2019, in Literary responses to Arctic Canada, ed. J\u00f8rn Carlsen, 1993).\" Ross 's claim was that his four Confederation Poets were Canadians who \"were poets \u2013 at their best, good poets.\" \"Here, at least, was skill, the possession of the craft, the mystery. Here was another \u2013 one like oneself. Here was something stirring, something in a book by one of ourselves,' something as alive and wonderful in its own way as the [achievements] of the railway builders. Our empty landscape of the mind was being peopled at last.\" Indeed, fashions and techniques do change; and by the mid-1980s the modernist presumptions behind the Montreal Group's debunking were themselves being questioned. \"A proper recognition of his nineteenth-century contexts can enhance our appreciation of Carman, and of his Confederation peers,\" Tracy Ware wrote in Canadian Poetry in 1984 \"I am suggesting that Confederation poetry be given the respect that is customarily accorded the poetry of the McGill movement. Such a critical approach might succeed in removing the pervasive but dubious anti-Romantic tenets of Canadian modernism, tenets that have lingered here long after they have been questioned elsewhere.\"Tracy Ware, \"The Integrity of Carman\u2019s 'Low Tide on Grand Pr\u00e9',\" Canadian Poetry: Studies/Documents/Reviews No. 14, UWO, Web, Apr. 16, 2011. ] In the same issue, Canadian Poetry editor D.M.R. Bentley, using Lampman's term for himself, dubbed the Confederation school \"Minor Poets of a Superior Order , \" and argued that \"What James Reaney has recently written of Crawford, Lampman and Roberts can be extended to Carman, Scott, Campbell, Sherman, Pickthall and others: they 'wrote well and were of note.'\"[D.M.R. Bentley, \"Preface: Minor Poets of a Superior Order,\" Canadian Poetry: Studies/Documents/Reviews No. 14, UWO, Web, Apr. 16, 2011. External links The Confederation Poets at the Canadian Poetry Press website Poets of the Confederation: Current Approaches Canadian Poetry: Studies/Documents/Reviews No. 14 (Spring/Summer 1984) The Confederation Poets at The Poets\u2019 Pathway Committee website", "after_revision": "\"Confederation Poets\" is the name given to a group of Canadian poets born in the decade of Canada's Confederation (the 1860s) who rose to prominence in Canada in the late 1880s and 1890s. The term was coined by Canadian professor and literary critic Malcolm Ross, who applied it to four poets \u2013 Charles G.D. Roberts (1860\u20131943), Bliss Carman (1861\u20131929), Archibald Lampman (1861\u20131899), and Duncan Campbell Scott (1862\u20131947) \u2013 in the Introduction to his 1960 anthology, Poets of the Confederation . He wrote, \"It is fair enough, I think, to call Roberts, Carman, Lampman, and Scott our 'Confederation poets.'\"Malcolm Ross, Introduction, Poets of the Confederation (Toronto: McClelland and Stewart, 1960), vii-xii. Charles G. D. Roberts (recognized in his lifetime as \"the father of Canadian poetry\") led the group, which had two main branches: One, in Ottawa, consisted of the poets Archibald Lampman, Duncan Campbell Scott, and William Wilfred Campbell. The other were Maritime poets, including Roberts and his cousin, Bliss Carman. The four major poets in the group were Roberts, Carman, Lampman and Scott, with Lampman \"most often regarded as the finest poet\" among them , according to the Twentieth-Century Literary Movements Dictionary. Isabella Valancy Crawford, c.1919 The group, which thrived from the 1890s to the 1920s, generally paid attention to classical forms and subjects, but also realistic description, some exploration of innovative technique and, in subject matter, an examination of the individual's relationships both to the natural world and modern civilization. None of the above poets ever used the term \"Confederation Poets\", or any other term, for themselves as a distinct group. Nothing indicates that any of them considered themselves to be a group. They \"were in no way a cohesive group.\"W.J. Keith, \"Poetry in English 1867-1918,\" Canadian Encyclopedia (Edmonton: Hurtig, 1988), 1696. The \"Confederation Poets\" became known as a group by a later, retroactive process of canonization: \"Malcolm Ross's retrospective application of the term \u2018Confederation poets\u2019 is a good example of canon-making along national lines. Several reasons have been given for treating the Confederation Poets as a distinct group. Roberts, Lampman, Carman, and Scott were among the first critically acclaimed poets to be published after the formation of the Dominion of Canada\". Lampman wrote about his excitement in encountering Roberts's work: The Confederation poets had some biographical and literary connections among They were about the same age, born in the early 1860s. Francis Zichy motes: \"Roberts and Carman were cousins; Roberts briefly edited Goldwin Smith's Toronto literary magazine The Week, in which Carman published his first poem.\" Lampman also published in the Week, and he and Roberts became friends by mail. In the early 1890s, when Carman worked on the editorial staffs of The Independent and The Chapbook, and other American magazines, he published poems by the other three. Originally they wrote the column in order to raise some money for Campbell, who was in financial difficulty. As Lampman wrote to a friend: \"Campbell is deplorably poor.... Partly in order to help his pockets a little Mr. Scott and I decided to see if we could get the Toronto \"Globe\" to give us space for a couple of columns of paragraphs & short articles, at whatever pay we could get for them. They agreed to it; and Campbell, Scott and I have been carrying on the thing for several weeks now.\"John Coldwell Adams, \"William Wilfred Campbell ,\" Confederation Voices: Seven Canadian Poets, Canadian Poetry, UWO. Web, Mar. 21, 2011. Campbell expressed some unorthodox opinions in the column, including an outline of the history of the cross as a mythic symbol . When some readers of the Globe demanded an apology, Campbell apologized for overestimating their intelligence, further angering the readership and his fellow columnists.\"Campbell, William Wilfred,\" Dictionary of Canadian Biography Online. Web, Mar. 20, 2011. The column ran until July 1893. In that year Campbell left to take a full-time civil service position in the Department of Militia and Defence. With his financial crisis over, the writers ended their column . As is clear from the Lampman quote, what Roberts was striving for, and what Lampman was responding to, was not the idea of a distinctly Canadian poetry, a poetry 'of our own'. Rather, it was that a Canadian, 'one of our own,' was writing \"great\" poetry. Regardless of their explicit statements about nationalism, in terms of their aesthetics , the Confederation Poets were not Canadian nationalists, but thorough-going cosmopolitans. They did not intend to create a Canadian literature; they aspired to world-class literature created by Canadians. In the late 19th century , world-class literature among English speakers meant British literature, which was Victorian by definition. These poets were writing in the tradition of late Victorian literature . The most obvious influences on them and others in that tradition were the Romantics. The Confederation poets were the first to publish works in this traditional style while referring to Canadian events and places in their poetry: Roberts's \"Tantramar,\" Carman's \" Grand Pr\u00e9, \" Lampman's \" Lake Temiscamingue, \" Scott's \" Height of Land, \" Campbell's \" Lake Region. \" Canadian readers for the first time had the opportunity to read poetry by Canadians that had content related to their country. As Northrop Frye said in 1954 , Canonization Bliss Carman Like Thomson and the Group of Seven, the Confederation Poets became the new country's canon. This canon-building began in their lifetimes but, as noted, they were not identified as a group by that name until 1960. In 1883 Roberts's friend Edmund Collins published his biography, The Life and Times of Sir John A. MacDonald, which devoted a lengthy chapter to \"Thought and Literature in Canada .\" Collins dethroned men who had been ranked as English Canada's top poets, the 'three Charleses': Charles Heavysege, Charles Sangster, and Charles Mair. \"Collins allots Heavysege only one paragraph, dismisses Sangster\u2019s verse as 'not worth a brass farthing,' and ignores Mair completely.\" In contrast, Collins devoted fifteen pages to Roberts. \" ... more than anyone else, Edmund Collins is probably responsible for the early acceptance of Charles G.D. Roberts as Canada\u2019s foremost poet.\" In Songs of the Great Dominion (1889), anthologist W.D. Lighthall said \"The foremost name in Canadian song at the present day is that of Charles George Douglas Roberts.\" Lighthall also included poetry by Roberts (who had published two books by then), Lampman, Campbell, and F.G. Scott ( who had each published one book ), and also by Carman and D.C. Scott, who had published in magazines although neither had yet published a book . Adams suggests, \"The publication in 1893 of a little anthology called Later Canadian Poems, edited by J.E. Wetherell, was a defining event in bringing attention to the Confederation Poets as a group.\" Roberts, Lampman, Carman, Campbell, the Scotts, and George Frederick Cameron are the male poets represented. That would be the pattern repeated in subsequent anthologies, with minor variations: Campbell boycotted being published in A Treasury of Canadian Verse (1900) . He edited The Oxford Book of Canadian Verse (1913), devoting \" more pages to his own poetry than that of anyone else.\" These same poets were included in the books on Canadian literature that were published in the early 20th century: Archibald MacMurchy's Handbook of Canadian Literature (1906), followed by T.G. Marquis's English Canadian Literature (1913). \"The decade following the First World War saw the appearance of five more handbooks on Canadian literature.... As different as these five books are from each other, they all recognize the accomplishments of the Confederation Poets as an important advance in Canadian literature.\" Debunking William Wilfred Campbell As the canon, the Confederation Poets set the standard. Their work became the type of poetry Canadian readers wanted and expected, and therefore Canadian magazines published. Since that standard was Romantic and Victorian, the Confederation Poets have since been \"blamed\" by some for retarding the development of Modernist poetry in Canada. For example, the Twentieth-Century Literary Movements Dictionary says of them that: \"Their legacy of Realism, Romanticism, and nationalism was so powerful that it lasted well into the first decades of the 20th century, beyond when much of their best work had been published.\" The Montreal Group or McGill Movement complained of the influence of the older poets. They were \"a group of young intellectuals under the influence of Ezra Pound and T.S. Eliot.... In Montreal the assault was spearheaded by The McGill Fortnightly Review (1925-1927), edited chiefly by two graduate students, A.J.M. Smith and F. R. Scott (son of Frederick George Scott).\" \"In various editorials, Smith argued that Canadian poets must go beyond the \u2018maple-leaf school\u2019 of Bliss Carman, Archibald Lampman, Duncan Campbell Scott, and Charles G.D. Roberts in favour of free verse, imagistic treatment, displacement, complexity, and a leaner diction free of Victorian mannerisms.\"Geoff Hancock, \"McGill Fortnightly Review - (1925 \u2013 7),\" Encyclopedia of Literature, JRank.org. Web, Mar. 25, 2011. The term \"Maple Leaf School\" was picked up from the progressive magazine Canadian Forum, which was waging a similar crusade for literary modernism. But , such complaints overlook that modernist poetry was being written in the 1920s: by W.W.E. Ross, Dorothy Livesay, Raymond Knister, and even by a couple of the Confederation Poets . By the 1930s Roberts had begun introducing the themes and techniques of Modernist poetry into his work. (See, for example, \"The Iceberg\" from 1931.) Scott had been doing the same since the early 1920s. (See, for example, \"A Vision\" from 1921.) After Smith had gained a reputation as an anthologist of Canadian poetry (The Book of Canadian Poetry 1943, Modern Canadian Verse 1967), he changed his opinion of the Confederation Poets' work . He said that his earlier disparagement of them was due to youthful ignorance: \"Bliss Carman was the only Canadian poet that we had heard of and what we heard, we didn't care for much. It was only later, when I began to compile books on Canadian poetry, that I found that Lampman, Roberts and Carman had written some very fine poetry.\"Anne Burke, Critical Introduction , \"Some Annotated Letters of A.J.M. Smith and Raymond Knister,\" Canadian Poetry: Studies/Documents/Reviews, Number 11 (Fall/Winter 1982), UWO, Web, Mar. 26, 2011. Re-evaluation Frederick George Scott The rehabilitation of the Confederation writers began with a rise of Canadian nationalism during the late 1950s, in what has been called \"a cultural moment inspired by the founding of the Canada Council (1957), and the establishment of the New Canadian Library, with [Malcolm] Ross himself as general editor.\" Ross's Poets of the Confederation was published as New Canadian Library Original N01. \"As Hans Hauge puts it, Ross \u2018is beginning to construct a national literature and he does so by providing it with a past, that is to say, by projecting the project of a Canadian national literature into the past\u2019 (\u2018The invention of national literatures\u2019, in Literary Responses to Arctic Canada, ed. J\u00f8rn Carlsen, 1993).\" Ross said that his four Confederation Poets were Canadians who \"were poets \u2013 at their best, good poets.\" \"Here, at least, was skill, the possession of the craft, the mystery. Here was another \u2013 one like oneself. Here was something stirring, something in a book by one of ourselves,' something as alive and wonderful in its own way as the [achievements] of the railway builders. Our empty landscape of the mind was being peopled at last.\" Similarly, by the mid-1980s the modernist presumptions behind the Montreal Group's debunking were themselves being questioned. \"A proper recognition of his nineteenth-century contexts can enhance our appreciation of Carman, and of his Confederation peers,\" Tracy Ware wrote in Canadian Poetry in 1984. \"I am suggesting that Confederation poetry be given the respect that is customarily accorded the poetry of the McGill movement. Such a critical approach might succeed in removing the pervasive but dubious anti-Romantic tenets of Canadian modernism, tenets that have lingered here long after they have been questioned elsewhere.\"Tracy Ware, \"The Integrity of Carman\u2019s 'Low Tide on Grand Pr\u00e9',\" Canadian Poetry: Studies/Documents/Reviews No. 14, UWO, Web, Apr. 16, 2011. In the same issue, Canadian Poetry editor D.M.R. Bentley, using Lampman's term for himself, dubbed the Confederation school \"Minor Poets of a Superior Order . \" He argued that \"What James Reaney has recently written of Crawford, Lampman and Roberts can be extended to Carman, Scott, Campbell, Sherman, Pickthall and others: they 'wrote well and were of note.'\"][D.M.R. Bentley, \"Preface: Minor Poets of a Superior Order,\" Canadian Poetry: Studies/Documents/Reviews No. 14, UWO, Web, Apr. 16, 2011. ] External links The Confederation Poets at the Canadian Poetry Press website Poets of the Confederation: Current Approaches Canadian Poetry: Studies/Documents/Reviews '' No. 14 (Spring/Summer 1984) The Confederation Poets at The Poets\u2019 Pathway Committee website", "edit_actions": [{"type": "R", "before": ", which began:", "after": ". He wrote,", "start_char_pos": 496, "end_char_pos": 510}, {"type": "R", "before": "in the group", "after": "among them", "start_char_pos": 1165, "end_char_pos": 1177}, {"type": "A", "before": null, "after": "to be", "start_char_pos": 1767, "end_char_pos": 1767}, {"type": "R", "before": "In fact, they", "after": "They", "start_char_pos": 1777, "end_char_pos": 1790}, {"type": "R", "before": "As a group, the", "after": "The", "start_char_pos": 1922, "end_char_pos": 1937}, {"type": "R", "before": "were formed by a", "after": "became known as a group by a later,", "start_char_pos": 1960, "end_char_pos": 1976}, {"type": "R", "before": "As \"Confederation Poet\" Archibald Lampman said about encountering \"Confederation Poet\" Charles G.D.", "after": "Lampman wrote about his excitement in encountering", "start_char_pos": 2384, "end_char_pos": 2483}, {"type": "R", "before": "There are", "after": "The Confederation poets had some", "start_char_pos": 2500, "end_char_pos": 2509}, {"type": "D", "before": "the Confederation poets.", "after": null, "start_char_pos": 2554, "end_char_pos": 2578}, {"type": "D", "before": "b", "after": null, "start_char_pos": 2609, "end_char_pos": 2610}, {"type": "R", "before": "The original idea was", "after": "Originally they wrote the column in order", "start_char_pos": 3057, "end_char_pos": 3078}, {"type": "R", "before": "; when", "after": ". When some", "start_char_pos": 3796, "end_char_pos": 3802}, {"type": "D", "before": "only", "after": null, "start_char_pos": 4067, "end_char_pos": 4071}, {"type": "A", "before": null, "after": "civil service", "start_char_pos": 4136, "end_char_pos": 4136}, {"type": "R", "before": "column to an end", "after": "writers ended their column", "start_char_pos": 4224, "end_char_pos": 4240}, {"type": "D", "before": "of", "after": null, "start_char_pos": 4439, "end_char_pos": 4441}, {"type": "A", "before": null, "after": "was", "start_char_pos": 4472, "end_char_pos": 4472}, {"type": "R", "before": "Irrespective", "after": "Regardless", "start_char_pos": 4497, "end_char_pos": 4509}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4587, "end_char_pos": 4587}, {"type": "R", "before": "aim", "after": "intend", "start_char_pos": 4691, "end_char_pos": 4694}, {"type": "R", "before": "aimed at a world class", "after": "aspired to world-class", "start_char_pos": 4733, "end_char_pos": 4755}, {"type": "R", "before": "world class literature", "after": ", world-class literature among English speakers", "start_char_pos": 4814, "end_char_pos": 4836}, {"type": "R", "before": "The Confederation Poets", "after": "These poets", "start_char_pos": 4898, "end_char_pos": 4921}, {"type": "R", "before": "; and like most in that tradition, the most", "after": ". The most", "start_char_pos": 4981, "end_char_pos": 5024}, {"type": "A", "before": null, "after": "and others in that tradition", "start_char_pos": 5052, "end_char_pos": 5052}, {"type": "R", "before": "using", "after": "referring to", "start_char_pos": 5161, "end_char_pos": 5166}, {"type": "R", "before": "Tantramar,", "after": "\"Tantramar,\"", "start_char_pos": 5221, "end_char_pos": 5231}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 5241, "end_char_pos": 5241}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 5253, "end_char_pos": 5253}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 5264, "end_char_pos": 5264}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 5285, "end_char_pos": 5285}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 5294, "end_char_pos": 5294}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 5311, "end_char_pos": 5311}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 5323, "end_char_pos": 5323}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 5337, "end_char_pos": 5337}, {"type": "R", "before": ", with Canadian content . As Frye put it", "after": "that had content related to their country. As Northrop Frye said in 1954", "start_char_pos": 5422, "end_char_pos": 5462}, {"type": "D", "before": "even", "after": null, "start_char_pos": 5610, "end_char_pos": 5614}, {"type": "R", "before": ".", "after": "but, as noted, they were not identified as a group by that name until 1960.", "start_char_pos": 5634, "end_char_pos": 5635}, {"type": "D", "before": ",", "after": null, "start_char_pos": 5815, "end_char_pos": 5816}, {"type": "R", "before": "lost no time in dethroning what had been", "after": "dethroned men who had been ranked as", "start_char_pos": 5828, "end_char_pos": 5868}, {"type": "A", "before": null, "after": "...", "start_char_pos": 6168, "end_char_pos": 6168}, {"type": "R", "before": "pronounced that", "after": "said", "start_char_pos": 6374, "end_char_pos": 6389}, {"type": "A", "before": null, "after": "also", "start_char_pos": 6499, "end_char_pos": 6499}, {"type": "D", "before": "by", "after": null, "start_char_pos": 6566, "end_char_pos": 6568}, {"type": "R", "before": "one book each", "after": "who had each published one book", "start_char_pos": 6605, "end_char_pos": 6618}, {"type": "A", "before": null, "after": "who had published in magazines", "start_char_pos": 6657, "end_char_pos": 6657}, {"type": "A", "before": null, "after": "yet", "start_char_pos": 6679, "end_char_pos": 6679}, {"type": "D", "before": "at that time", "after": null, "start_char_pos": 6697, "end_char_pos": 6709}, {"type": "A", "before": null, "after": "Adams suggests,", "start_char_pos": 6712, "end_char_pos": 6712}, {"type": "D", "before": "The 'three Charleses' are gone:", "after": null, "start_char_pos": 6898, "end_char_pos": 6929}, {"type": "R", "before": "like", "after": "Campbell boycotted being published in", "start_char_pos": 7124, "end_char_pos": 7128}, {"type": "R", "before": ", which Campbell boycotted; or", "after": ". He edited", "start_char_pos": 7165, "end_char_pos": 7195}, {"type": "R", "before": "which Campbell edited, and", "after": "devoting", "start_char_pos": 7238, "end_char_pos": 7264}, {"type": "D", "before": "devoted", "after": null, "start_char_pos": 7267, "end_char_pos": 7274}, {"type": "R", "before": "The", "after": "These", "start_char_pos": 7331, "end_char_pos": 7334}, {"type": "R", "before": "began appearing in the new", "after": "were published in the early 20th", "start_char_pos": 7401, "end_char_pos": 7427}, {"type": "R", "before": "were blamed", "after": "have since been \"blamed\"", "start_char_pos": 8124, "end_char_pos": 8135}, {"type": "R", "before": "Certainly that was a complaint of the", "after": "The", "start_char_pos": 8481, "end_char_pos": 8518}, {"type": "R", "before": ",", "after": "complained of the influence of the older poets. They were", "start_char_pos": 8553, "end_char_pos": 8554}, {"type": "D", "before": "intentionally disparaging", "after": null, "start_char_pos": 9253, "end_char_pos": 9278}, {"type": "R", "before": "However", "after": "But", "start_char_pos": 9423, "end_char_pos": 9430}, {"type": "R", "before": "ignore", "after": "overlook", "start_char_pos": 9449, "end_char_pos": 9455}, {"type": "A", "before": null, "after": "by", "start_char_pos": 9569, "end_char_pos": 9569}, {"type": "D", "before": "themselves", "after": null, "start_char_pos": 9606, "end_char_pos": 9616}, {"type": "R", "before": "he had won", "after": "Smith had gained", "start_char_pos": 9869, "end_char_pos": 9879}, {"type": "R", "before": "Smith", "after": "he", "start_char_pos": 9994, "end_char_pos": 9999}, {"type": "R", "before": ", blaming", "after": ". He said that", "start_char_pos": 10053, "end_char_pos": 10062}, {"type": "R", "before": "on", "after": "of them was due to", "start_char_pos": 10089, "end_char_pos": 10091}, {"type": "R", "before": "rolled off the press", "after": "was published", "start_char_pos": 10946, "end_char_pos": 10966}, {"type": "R", "before": "responses", "after": "Responses", "start_char_pos": 11272, "end_char_pos": 11281}, {"type": "R", "before": "'s claim was", "after": "said", "start_char_pos": 11331, "end_char_pos": 11343}, {"type": "R", "before": "Indeed, fashions and techniques do change; and", "after": "Similarly,", "start_char_pos": 11772, "end_char_pos": 11818}, {"type": "R", "before": "1984", "after": "1984.", "start_char_pos": 12104, "end_char_pos": 12108}, {"type": "D", "before": "", "after": null, "start_char_pos": 12578, "end_char_pos": 12584}, {"type": "R", "before": ",", "after": ".", "start_char_pos": 12742, "end_char_pos": 12743}, {"type": "R", "before": "and", "after": "He", "start_char_pos": 12746, "end_char_pos": 12749}, {"type": "A", "before": null, "after": "", "start_char_pos": 13100, "end_char_pos": 13100}, {"type": "A", "before": null, "after": "''", "start_char_pos": 13267, "end_char_pos": 13267}], "sents_char_pos": [0, 187, 609, 715, 956, 1035, 1245, 1588, 1709, 1776, 1921, 2145, 2235, 2383, 2578, 2635, 2690, 2808, 2887, 3056, 3145, 3208, 3432, 3451, 3533, 3668, 3797, 3962, 4031, 4051, 4088, 4187, 4242, 4418, 4496, 4677, 4727, 4788, 4897, 4982, 5072, 5336, 5447, 5583, 5635, 5734, 5974, 6110, 6165, 6307, 6488, 6897, 7038, 7192, 7330, 7561, 7672, 7841, 7932, 8051, 8204, 8480, 8639, 8828, 9132, 9228, 9248, 9422, 9618, 9722, 10217, 10368, 10564, 10911, 11325, 11508, 11545, 11711, 11771, 11814, 11934, 12236, 12436, 12518, 12944, 12966, 13099]}
+{"doc_id": "1536", "revision_depth": "2", "before_revision": "Cars 2 is a 2011 AmMEMErican 3D computMEMEr-animatMEMEd spy action-advMEMEnturMEME comMEMEdy film producMEMEd by Pixar Animation Studios for Walt DisnMEMEy PicturMEMEs. It is a sMEMEquMEMEl to 2006's Cars and thMEME sMEMEcond film in thMEME Cars franchisMEME. In thMEME film, racMEME car Lightning McQuMEMEMEMEn and tow truck MatMEMEr hMEMEad to Japan and MEMEuropMEME to compMEMEtMEME in thMEME World Grand Prix, but MatMEMEr accidMEMEntally bMEMEcomMEMEs sidMEMEtrackMEMEd with intMEMErnational MEMEspionagMEME. In thMEME film's MEMEnsMEMEmblMEME voicMEME cast, OwMEMEn Wilson, Larry thMEME CablMEME Guy, Tony Shalhoub, Guido Quaroni, BonniMEME Hunt, and John RatzMEMEnbMEMErgMEMEr rMEMEprisMEME thMEMEir rolMEMEs from thMEME first film. Paul NMEMEwman, who voicMEMEd Doc Hudson in thMEME prMEMEvious film, diMEMEd in SMEMEptMEMEmbMEMEr 2008, so his charactMEMEr was writtMEMEn out of thMEME film, whilMEME GMEMEorgMEME Carlin, who prMEMEviously voicMEMEd FillmorMEME, diMEMEd during thMEME samMEME yMEMEar, so his rolMEME was passMEMEd to Lloyd ShMEMErr. ThMEME rMEMEturning cast is joinMEMEd by MichaMEMEl CainMEME, MEMEmily MortimMEMEr, John Turturro, MEMEddiMEME Izzard, and Thomas KrMEMEtschmann, who voicMEME thMEME nMEMEw charactMEMErs introducMEMEd in this film. It was dirMEMEctMEMEd by John LassMEMEtMEMEr, writtMEMEn by BMEMEn QuMEMEMEMEn, and producMEMEd by DMEMEnisMEME RMEMEam. Cars 2 was rMEMElMEMEasMEMEd in thMEME UnitMEMEd StatMEMEs on JunMEME 24, 2011. ThMEME film was prMEMEsMEMEntMEMEd in DisnMEMEy Digital 3D and IMAX 3D, as wMEMEll as traditional two-dimMEMEnsional and IMAX formats. ThMEME film was first announcMEMEd in 2008, alongsidMEME Up, and BravMEME, and it is thMEME 12th animatMEMEd film from thMEME studio. ThMEME film rMEMEcMEMEivMEMEd mixMEMEd rMEMEviMEMEws from critics and grossMEMEd $562 million worldwidMEME. A sMEMEquMEMEl, Cars 3, was rMEMElMEMEasMEMEd on JunMEME 16 , 2017. UsMEME in antiquity upright=1.2| ViMEMEw of thMEME Acropolis of PMEMErgamon in thMEME background, as sMEMEMEMEn from Via TMEMEcta at thMEME MEMEntrancMEME to thMEME AsclMEMEpMEMEion . upright=1.2|Acropolis of Assos ThMEME word acropolis litMEMErally mMEMEans in GrMEMEMEMEk \" uppMEMEr city,\" and though associatMEMEd primarily with thMEME GrMEMEMEMEk citiMEMEs AthMEMEns , Argos (with Larissa), ThMEMEbMEMEs (with CadmMEMEa ), and Corinth (with its Acrocorinth), may bMEME appliMEMEd gMEMEnMEMErically to all such citadMEMEls, including RomMEME, CarthagMEME, JMEMErusalMEMEm, CMEMEltic Bratislava, many in Asia Minor, or MEMEvMEMEn CastlMEME Rock in MEMEdinburgh. An MEMExamplMEME in IrMEMEland is thMEME Rock of CashMEMEl . Acropolis is also thMEME tMEMErm usMEMEd by archaMEMEologists and historians for thMEME urban Castro culturMEME sMEMEttlMEMEmMEMEnts locatMEMEd in NorthwMEMEstMEMErn IbMEMErian hilltops. ThMEME most famous MEMExamplMEME is thMEME Acropolis of AthMEMEns , which, by rMEMEason of its historical associations and thMEME sMEMEvMEMEral famous buildings MEMErMEMEctMEMEd upon it (most notably thMEME ParthMEMEnon ), is known without qualification as thMEME Acropolis. ThMEME Acropolis of AthMEMEns achiMEMEvMEMEd its form in thMEME fifth cMEMEntury BC and is currMEMEntly an archMEMEological sitMEME . Although originating in thMEME mainland of GrMEMEMEMEcMEME, usMEME of thMEME acropolis modMEMEl quickly sprMEMEad to GrMEMEMEMEk coloniMEMEs such as thMEME Dorian Lato on CrMEMEtMEME during thMEME Archaic PMEMEriod MMEMEtaphorical usMEME in modMEMErn timMEMEs BMEMEcausMEME of its classical HMEMEllMEMEnistic stylMEME, thMEME ruins of Mission San Juan Capistrano's Great Stone Church in California, United States has been called the \"American Acropolis\".", "after_revision": " An acropolis (Ancient Greek: \u1f00\u03ba\u03c1\u03cc\u03c0\u03bf\u03bb\u03b9\u03c2, akropolis; from akros (\u03ac\u03ba\u03c1\u03bf\u03c2) or akron (\u03ac\u03ba\u03c1\u03bf\u03bd), \"highest, topmost, outermost\" and polis (\u03c0\u03cc\u03bb\u03b9\u03c2), \"city\"; plural in English: acropoles, acropoleis or acropolises), , . was an ancient Greek settlement, especially a citadel, built upon an area of elevated ground\u2014frequently a hill with precipitous sides, chosen for purposes of defense. Acropolises also had a function of a religious sanctuary with sacred springs highlighting its religious significance. Acropolises became the nuclei of large cities of classical antiquity, such as ancient Athens, and for this reason they are sometimes prominent landmarks in modern cities with ancient pasts, such as modern Athens. One well-known acropolis is the Acropolis of Athens, located on a rocky outcrop above the city of Athens and containing the Parthenon. Use in antiquity upright=1.2| View of the Acropolis of Pergamon in the background, as seen from Via Tecta at the entrance to the Asclepeion . upright=1.2|Acropolis of Assos The word acropolis literally means in Greek \" upper city,\" and though associated primarily with the Greek cities Athens , Argos (with Larissa), Thebes (with Cadmea ), and Corinth (with its Acrocorinth), may be applied generically to all such citadels, including Rome, Carthage, Jerusalem, Celtic Bratislava, many in Asia Minor, or even Castle Rock in Edinburgh. An example in Ireland is the Rock of Cashel . Acropolis is also the term used by archaeologists and historians for the urban Castro culture settlements located in Northwestern Iberian hilltops. The most famous example is the Acropolis of Athens , which, by reason of its historical associations and the several famous buildings erected upon it (most notably the Parthenon ), is known without qualification as the Acropolis. The Acropolis of Athens achieved its form in the fifth century BC and is currently an archeological site . Although originating in the mainland of Greece, use of the acropolis model quickly spread to Greek colonies such as the Dorian Lato on Crete during the Archaic Period Metaphorical use in modern times Because of its classical Hellenistic style, the ruins of Mission San Juan Capistrano's Great Stone Church in California, United States has been called the \"American Acropolis\".", "edit_actions": [{"type": "D", "before": "Cars 2 is a 2011 AmMEMErican 3D computMEMEr-animatMEMEd spy action-advMEMEnturMEME comMEMEdy film producMEMEd by Pixar Animation Studios for Walt DisnMEMEy PicturMEMEs. It is a sMEMEquMEMEl to 2006's Cars and thMEME sMEMEcond film in thMEME Cars franchisMEME. In thMEME film, racMEME car Lightning McQuMEMEMEMEn and tow truck MatMEMEr hMEMEad to Japan and MEMEuropMEME to compMEMEtMEME in thMEME World Grand Prix, but MatMEMEr accidMEMEntally bMEMEcomMEMEs sidMEMEtrackMEMEd with intMEMErnational MEMEspionagMEME. In thMEME film's MEMEnsMEMEmblMEME voicMEME cast, OwMEMEn Wilson, Larry thMEME CablMEME Guy, Tony Shalhoub, Guido Quaroni, BonniMEME Hunt, and John RatzMEMEnbMEMErgMEMEr rMEMEprisMEME thMEMEir rolMEMEs from thMEME first film. Paul NMEMEwman, who voicMEMEd Doc Hudson in thMEME prMEMEvious film, diMEMEd in SMEMEptMEMEmbMEMEr 2008, so his charactMEMEr was writtMEMEn out of thMEME film, whilMEME GMEMEorgMEME Carlin, who prMEMEviously voicMEMEd FillmorMEME, diMEMEd during thMEME samMEME yMEMEar, so his rolMEME was passMEMEd to Lloyd ShMEMErr. ThMEME rMEMEturning cast is joinMEMEd by MichaMEMEl CainMEME, MEMEmily MortimMEMEr, John Turturro, MEMEddiMEME Izzard, and Thomas KrMEMEtschmann, who voicMEME thMEME nMEMEw charactMEMErs introducMEMEd in this film. It was dirMEMEctMEMEd by John LassMEMEtMEMEr, writtMEMEn by BMEMEn QuMEMEMEMEn, and producMEMEd by DMEMEnisMEME RMEMEam.", "after": null, "start_char_pos": 0, "end_char_pos": 1393}, {"type": "R", "before": "Cars 2 was rMEMElMEMEasMEMEd in thMEME UnitMEMEd StatMEMEs on JunMEME 24, 2011. ThMEME film was prMEMEsMEMEntMEMEd in DisnMEMEy Digital 3D and IMAX 3D, as wMEMEll as traditional two-dimMEMEnsional and IMAX formats. ThMEME film was first announcMEMEd in 2008, alongsidMEME Up, and BravMEME, and it is thMEME 12th animatMEMEd film from thMEME studio. ThMEME film rMEMEcMEMEivMEMEd mixMEMEd rMEMEviMEMEws from critics and grossMEMEd $562 million worldwidMEME. A sMEMEquMEMEl, Cars 3, was rMEMElMEMEasMEMEd on JunMEME 16", "after": "An acropolis (Ancient Greek: \u1f00\u03ba\u03c1\u03cc\u03c0\u03bf\u03bb\u03b9\u03c2, akropolis; from akros (\u03ac\u03ba\u03c1\u03bf\u03c2) or akron (\u03ac\u03ba\u03c1\u03bf\u03bd), \"highest, topmost, outermost\" and polis (\u03c0\u03cc\u03bb\u03b9\u03c2), \"city\"; plural in English: acropoles, acropoleis or acropolises),", "start_char_pos": 1394, "end_char_pos": 1910}, {"type": "R", "before": "2017.", "after": ". was an ancient Greek settlement, especially a citadel, built upon an area of elevated ground\u2014frequently a hill with precipitous sides, chosen for purposes of defense. Acropolises also had a function of a religious sanctuary with sacred springs highlighting its religious significance. Acropolises became the nuclei of large cities of classical antiquity, such as ancient Athens, and for this reason they are sometimes prominent landmarks in modern cities with ancient pasts, such as modern Athens. One well-known acropolis is the Acropolis of Athens, located on a rocky outcrop above the city of Athens and containing the Parthenon.", "start_char_pos": 1913, "end_char_pos": 1918}, {"type": "R", "before": "UsMEME", "after": "Use", "start_char_pos": 1919, "end_char_pos": 1925}, {"type": "R", "before": "ViMEMEw of thMEME Acropolis of PMEMErgamon in thMEME", "after": "View of the Acropolis of Pergamon in the", "start_char_pos": 1952, "end_char_pos": 2004}, {"type": "R", "before": "sMEMEMEMEn from Via TMEMEcta at thMEME MEMEntrancMEME to thMEME AsclMEMEpMEMEion", "after": "seen from Via Tecta at the entrance to the Asclepeion", "start_char_pos": 2020, "end_char_pos": 2100}, {"type": "R", "before": "ThMEME word acropolis litMEMErally mMEMEans in GrMEMEMEMEk", "after": "The word acropolis literally means in Greek", "start_char_pos": 2134, "end_char_pos": 2192}, {"type": "R", "before": "uppMEMEr", "after": "upper", "start_char_pos": 2195, "end_char_pos": 2203}, {"type": "R", "before": "associatMEMEd primarily with thMEME GrMEMEMEMEk citiMEMEs AthMEMEns", "after": "associated primarily with the Greek cities Athens", "start_char_pos": 2222, "end_char_pos": 2289}, {"type": "R", "before": "ThMEMEbMEMEs (with CadmMEMEa", "after": "Thebes (with Cadmea", "start_char_pos": 2314, "end_char_pos": 2342}, {"type": "R", "before": "bMEME appliMEMEd gMEMEnMEMErically", "after": "be applied generically", "start_char_pos": 2386, "end_char_pos": 2420}, {"type": "R", "before": "citadMEMEls, including RomMEME, CarthagMEME, JMEMErusalMEMEm, CMEMEltic", "after": "citadels, including Rome, Carthage, Jerusalem, Celtic", "start_char_pos": 2433, "end_char_pos": 2504}, {"type": "R", "before": "MEMEvMEMEn CastlMEME Rock in MEMEdinburgh. An MEMExamplMEME in IrMEMEland is thMEME Rock of CashMEMEl", "after": "even Castle Rock in Edinburgh. An example in Ireland is the Rock of Cashel", "start_char_pos": 2540, "end_char_pos": 2641}, {"type": "R", "before": "thMEME tMEMErm usMEMEd by archaMEMEologists", "after": "the term used by archaeologists", "start_char_pos": 2662, "end_char_pos": 2705}, {"type": "R", "before": "thMEME urban Castro culturMEME sMEMEttlMEMEmMEMEnts locatMEMEd in NorthwMEMEstMEMErn IbMEMErian", "after": "the urban Castro culture settlements located in Northwestern Iberian", "start_char_pos": 2725, "end_char_pos": 2820}, {"type": "R", "before": "ThMEME most famous MEMExamplMEME is thMEME Acropolis of AthMEMEns", "after": "The most famous example is the Acropolis of Athens", "start_char_pos": 2831, "end_char_pos": 2896}, {"type": "R", "before": "rMEMEason", "after": "reason", "start_char_pos": 2909, "end_char_pos": 2918}, {"type": "R", "before": "thMEME sMEMEvMEMEral famous buildings MEMErMEMEctMEMEd", "after": "the several famous buildings erected", "start_char_pos": 2954, "end_char_pos": 3008}, {"type": "R", "before": "thMEME ParthMEMEnon", "after": "the Parthenon", "start_char_pos": 3031, "end_char_pos": 3050}, {"type": "R", "before": "thMEME Acropolis. ThMEME Acropolis of AthMEMEns achiMEMEvMEMEd", "after": "the Acropolis. The Acropolis of Athens achieved", "start_char_pos": 3088, "end_char_pos": 3150}, {"type": "R", "before": "thMEME fifth cMEMEntury", "after": "the fifth century", "start_char_pos": 3163, "end_char_pos": 3186}, {"type": "R", "before": "currMEMEntly an archMEMEological sitMEME", "after": "currently an archeological site", "start_char_pos": 3197, "end_char_pos": 3237}, {"type": "R", "before": "thMEME mainland of GrMEMEMEMEcMEME, usMEME of thMEME acropolis modMEMEl quickly sprMEMEad to GrMEMEMEMEk coloniMEMEs such as thMEME", "after": "the mainland of Greece, use of the acropolis model quickly spread to Greek colonies such as the", "start_char_pos": 3264, "end_char_pos": 3395}, {"type": "R", "before": "CrMEMEtMEME during thMEME Archaic PMEMEriod", "after": "Crete during the Archaic Period", "start_char_pos": 3411, "end_char_pos": 3454}, {"type": "R", "before": "MMEMEtaphorical usMEME in modMEMErn timMEMEs BMEMEcausMEME", "after": "Metaphorical use in modern times Because", "start_char_pos": 3455, "end_char_pos": 3513}, {"type": "R", "before": "HMEMEllMEMEnistic stylMEME, thMEME", "after": "Hellenistic style, the", "start_char_pos": 3531, "end_char_pos": 3565}], "sents_char_pos": [0, 168, 259, 513, 739, 1057, 1272, 1393, 1473, 1608, 1742, 1918, 1949, 2113, 2582, 2830, 3105, 3299]}
+{"doc_id": "154989", "revision_depth": "1", "before_revision": "1953: In Lincoln, Massachusetts a group of families from the MIT community, led by Ranulf (Rany) Gras and his wife Ann and inspired by Skinner's book, formed a corporation and built 23 homes on a 40 acre lot in what became known as the Brown's Wood neighborhood.. Retrieved January 2, 2020. 1955: In New Haven, Connecticut a group led by Arthur Gladstone tries to start a community. 1966: Waldenwoods conference is held in Hartland, Michigan, comprising 83 adults and 4 children, coordinated through the Breiland list (a list of interested people who wrote to Skinner and were referred to Jim Breiland). 1966: Matthew Israel forms the Association for Social Design (ASD), to promote a Walden Two,\"New Walden II Will Open in Fall\". The Harvard Crimson, March 9, 1968. Retrieved August 25, 2012. which soon finds chapters in Los Angeles, Albuquerque, and Washington, D.C. 1967: Matthew Israel founds the Morningside House in Arlington, Massachusetts.Gonnerman, Jennifer (August 20, 2007). \"Matthew Israel Interviewed by Jennifer Gonnerman\". Mother Jones (magazine). Retrieved August 25, 2012. When it failed, he tried a second time. Israel later went on to found the Judge Rotenberg Center, which has been condemned by the United Nations for the torture of children with disabilities. 1967: Twin Oaks Community is started in Louisa County, Virginia. 1969: Keith Miller in Lawrence, Kansas founds a 'Walden house'Feallock, R. and Miller, L. K. (1976). \"The design and evaluation of a worksharing system for experimental group living\". Journal of Applied Behavior Analysis, 9(3), pp. 277\u2013288. student collective that becomes The Sunflower House 11. 1970: Walden 7, a 1000 inhabitant community west of Barcelona (Spain), is created as a social and architectural experiment based on Walden Two, living in a building designed by Catalan architect Ricardo Bofill. 1971: Roger Ulrich starts \"an experimental community named Lake Village in Kalamazoo, Michigan \". Ulrich, Roger E. (1973). Toward Experimental Living. Available on microfiche at Western Michigan University, Kalamazoo, Michigan.Bonfiglio, Olga (July 3, 2011). \"Lake Village Homestead Farm celebrates its 40th year in operation\". Kalamazoo Gazette. MLive Media Group. Retrieved August 26, 2012. 1971: Los Horcones is started in Hermosillo, Mexico. 1971: Mary Louise Strum and David Nord start an experimental Jewish faith based Commune named \"Jubilee Community\" in Westphalia Texas, based on Skinner's Walden Two Utopian ideals. 1972: Sunflower House 11 is (re)born in Lawrence, Kansas from the previous experiment. 1973: East Wind is started in south central Missouri.Ramsey, Richard David (December 1979). Morning Star: The Values-Communication of Skinner's Walden Two. Unpublished doctoral dissertation; Rensselaer Polytechnic Institute, Troy, NY. Available from University Microfilms International, Ann Arbor, MI.", "after_revision": "1953: In Lincoln, Massachusetts , a group of families from the MIT community, led by Ranulf (Rany) Gras and his wife Ann and inspired by Skinner's book, formed a corporation and built 23 homes on a lot in what became known as the Brown's Wood neighborhood.. Retrieved January 2, 2020. 1955: In New Haven, Connecticut , a group led by Arthur Gladstone tried to start a community. 1966: The Waldenwoods conference was held in Hartland, Michigan, comprising 83 adults and 4 children, coordinated through the Breiland list (a list of interested people who wrote to Skinner and were referred to Jim Breiland). 1966: Matthew Israel formed the Association for Social Design (ASD), to promote a Walden Two,\"New Walden II Will Open in Fall\". The Harvard Crimson, March 9, 1968. Retrieved August 25, 2012. which soon found chapters in Los Angeles, Albuquerque, and Washington, D.C. 1967: Matthew Israel founded the Morningside House in Arlington, Massachusetts.Gonnerman, Jennifer (August 20, 2007). \"Matthew Israel Interviewed by Jennifer Gonnerman\". Mother Jones (magazine). Retrieved August 25, 2012. When it failed, he tried a second time. Israel later went on to found the Judge Rotenberg Center, which has been condemned by the United Nations for the torture of children with disabilities. 1967: The Twin Oaks Community was started in Louisa County, Virginia. 1969: Keith Miller in Lawrence, Kansas , founded a 'Walden house'Feallock, R. and Miller, L. K. (1976). \"The design and evaluation of a worksharing system for experimental group living\". Journal of Applied Behavior Analysis, 9(3), pp. 277\u2013288. student collective that became the Sunflower House 11. 1970: Walden 7, a 1,000-inhabitant community west of Barcelona (Spain), was created as a social and architectural experiment based on Walden Two, living in a building designed by Catalan architect Ricardo Bofill. 1971: Roger Ulrich started \"an experimental community named Lake Village in Kalamazoo, Michigan .\" Ulrich, Roger E. (1973). Toward Experimental Living. Available on microfiche at Western Michigan University, Kalamazoo, Michigan.Bonfiglio, Olga (July 3, 2011). \"Lake Village Homestead Farm celebrates its 40th year in operation\". Kalamazoo Gazette. MLive Media Group. Retrieved August 26, 2012. 1971: Los Horcones was started in Hermosillo, Mexico. 1971: Mary Louise Strum and David Nord started an experimental Jewish faith-based commune named \"Jubilee Community\" in Westphalia , Texas, based on Skinner's Walden Two utopian ideals. 1972: Sunflower House 11 was (re)born in Lawrence, Kansas , from the previous experiment. 1973: East Wind was started in south-central Missouri.Ramsey, Richard David (December 1979). Morning Star: The Values-Communication of Skinner's Walden Two. Unpublished doctoral dissertation; Rensselaer Polytechnic Institute, Troy, NY. Available from University Microfilms International, Ann Arbor, MI.", "edit_actions": [{"type": "A", "before": null, "after": ",", "start_char_pos": 32, "end_char_pos": 32}, {"type": "D", "before": "40 acre", "after": null, "start_char_pos": 197, "end_char_pos": 204}, {"type": "A", "before": null, "after": ",", "start_char_pos": 324, "end_char_pos": 324}, {"type": "R", "before": "tries", "after": "tried", "start_char_pos": 357, "end_char_pos": 362}, {"type": "R", "before": "Waldenwoods conference is", "after": "The Waldenwoods conference was", "start_char_pos": 391, "end_char_pos": 416}, {"type": "R", "before": "forms", "after": "formed", "start_char_pos": 627, "end_char_pos": 632}, {"type": "R", "before": "finds", "after": "found", "start_char_pos": 807, "end_char_pos": 812}, {"type": "R", "before": "founds", "after": "founded", "start_char_pos": 893, "end_char_pos": 899}, {"type": "A", "before": null, "after": "The", "start_char_pos": 1291, "end_char_pos": 1291}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1312, "end_char_pos": 1314}, {"type": "R", "before": "founds", "after": ", founded", "start_char_pos": 1390, "end_char_pos": 1396}, {"type": "R", "before": "becomes The", "after": "became the", "start_char_pos": 1616, "end_char_pos": 1627}, {"type": "R", "before": "1000 inhabitant", "after": "1,000-inhabitant", "start_char_pos": 1666, "end_char_pos": 1681}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1719, "end_char_pos": 1721}, {"type": "R", "before": "starts", "after": "started", "start_char_pos": 1878, "end_char_pos": 1884}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 1954, "end_char_pos": 1956}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 2271, "end_char_pos": 2273}, {"type": "R", "before": "start", "after": "started", "start_char_pos": 2344, "end_char_pos": 2349}, {"type": "R", "before": "faith based Commune", "after": "faith-based commune", "start_char_pos": 2373, "end_char_pos": 2392}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2433, "end_char_pos": 2433}, {"type": "R", "before": "Utopian", "after": "utopian", "start_char_pos": 2471, "end_char_pos": 2478}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 2512, "end_char_pos": 2514}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2544, "end_char_pos": 2544}, {"type": "R", "before": "is started in south central", "after": "was started in south-central", "start_char_pos": 2591, "end_char_pos": 2618}], "sents_char_pos": [0, 264, 384, 605, 732, 768, 950, 988, 1040, 1065, 1092, 1132, 1284, 1350, 1413, 1451, 1534, 1858, 1956, 1981, 2009, 2086, 2117, 2186, 2205, 2224, 2304, 2486, 2574, 2628, 2666, 2730, 2765]}
+{"doc_id": "155909", "revision_depth": "1", "before_revision": "Supermarionation (a blend of the words \"super\", \"marionette\" and \"animation\")La Rivi\u00e8re 2009, p. 67. was a style of television and film production employed by British company AP Films (later Century 21 Productions) in its puppet TV series and feature films of the 1960s. They were created by Gerry and Sylvia Anderson and filmed at APF's studios on the Slough Trading Estate. The characters in these productions were played by electronic marionettes with a moveable lower lip, which opened and closed in time with pre-recorded dialogue by means of a solenoid in the puppet's head or chest. Most of the productions were science fiction with puppetry supervised by Christine Glanville, art direction by either Bob Bell or Keith Wilson and music by Barry Gray. They also made extensive use of scale model special effects, directed by Derek Meddings. Development history and use in Anderson productions List of Anderson Supermarionation productions Title Year(s) Format Notes Four Feather Falls 1960 TV series APF's first TV series to use marionettes with fibreglass heads and electronic lip-sync mechanisms. Regarded as the first Supermarionation series by some sources, although the term was not used until the production of Supercar.Sangster and Condon, pp. 318; 726-727. Supercar TV series First production to feature rocket effects, back projection effects and underwater scenes filmed \"dry\" through water tanks.La Rivi\u00e8re 2009, pp. 56; 61.Hirsch, p. 62. The 13-episode second series was the first to be credited as being \"filmed in Supermarionation\" and the first for which puppets were copied to allow episodes to be filmed in pairs by separate crews.Hearn, p. 33.La Rivi\u00e8re 2009, pp. 65; 67. It also marked the introduction of a dedicated special effects unit, led by Derek Meddings. Fireball XL5 1962-63 TV series First production to feature front projection effects and puppet heads with blinkable eyes.Bentley, p. 62.La Rivi\u00e8re 2009, p. 103. Stingray 1964-65 TV series APF's first colour series. First production on which puppets' facial expressions could be varied: main characters could now be fitted with \"smiler\" and \"frowner\" heads. For greater realism, poseable hands and glass eyes (bearing miniature prints of real human eyes) were also introduced.La Rivi\u00e8re 2009, pp. 97\u201398.Hirsch, p. 63. Thunderbirds 1965-66 TV series 1966 Nearly all puppet heads were by now made of fibreglass (previously, guest character faces were sculpted in Plasticine).La Rivi\u00e8re 2009, p. 132. \"Under-controlled\" puppets, lacking wires and operated from the studio floor, were introduced for scenes showing characters sitting \u2013 for example, fighter pilots in aircraft cockpits.La Rivi\u00e8re 2009, p. 152. Captain Scarlet and the Mysterons 1967-68 TV series The lip-sync mechanism was moved to the chest, allowing the puppets to be redesigned in natural proportions. Guest characters were now played by a \"repertory company\" of permanent fibreglass puppets that could be superficially altered for each role (e.g. by adding or removing facial hair).La Rivi\u00e8re 2009, pp. 154-155.Bentley, p. 119. Eyes were now plastic. Thunderbird 6 1968 Feature film The puppets mostly kept their pre-Captain Scarlet body proportions, although heads and hands were made slightly smaller.Bentley, p. 304. First production to feature extensive location shooting.La Rivi\u00e8re 2009, p. 169. Joe 90 1968-69 TV series The Secret Service 1969 TV series Featured extensive footage of live actors. Last series to be \"filmed in Supermarionation\".Bentley, p. 152. Captain Scarlet S.I.G. 2001 Documentary DVD documentary on the making of Captain Scarlet. Linking sequences feature the puppet characters of Captains Scarlet and Blue. Produced by Gerry Anderson and credited as being \"filmed in Supermarionation\".Bentley, p. 322. The Andersons' puppet work also included The Investigator (1973), a pilot for an unmade Supermarionation series. This featured both marionette characters and live actors .Bentley, p. 314.La Rivi\u00e8re 2009, p. 201. Successor techniques In 1983, Gerry Anderson returned to puppetry with his independent science-fiction TV series Terrahawks. The characters of this series were made as rubber hand puppets, operated from the studio floor in a process called \"Supermacromation\".Bentley, p. 227. This was similar to the techniques employed by American puppeteer Jim Henson. Revival In the 2010s, producer Stephen La Rivi\u00e8re and his company Century 21 Films began a revival of Supermarionation. Their productions are listed below. Title Year Format Notes 2014 Documentary Includes newly filmed Supermarionation puppet sequences featuring characters from Thunderbirds.La Rivi\u00e8re 2014, p. 337. Thunderbirds: The Anniversary Episodes 2015 Mini-series Screen adaptations of three Thunderbirds audio plays originally released in the 1960s. Made in celebration of the series' 50th anniversary and filmed using 1960s Supermarionation production methods. Nebula-75 2020 Web series Puppet web series made during the COVID-19 lockdown in the UK. Filmed in the spirit of APF's early-1960s productions and credited as being \"filmed in Supermarionation and Superisolation\". Critical response Noting that Gerry Anderson would have preferred to make live-action productions instead of puppet series, Percy argues that his style of filming was developed to \"make the puppet film as 'respectable' as possible\". She also comments that APF's filming techniques \"would not only result in a level of quality and sophistication not seen before in a family show, but also give birth to some of the most iconic series in the history of British children's television.\" Garland describes the underlying theme of Anderson's work as a \"self-reflexive obsession with an aesthetic of realism (or more accurately a surface realism often associated with naturalism) borne of an unfulfilled desire to make live-action films for adults\", further commenting that Anderson's typecasting as a puppet TV creator \"led him on a lifelong quest to perfect a simulation of reality\". He notes that Anderson's involvement with puppets began at a time when Western puppet theatre \"had become increasingly marginalised to a niche, to an association with children's entertainment\", and that APF's productions used an \"aesthetic of incremental realism\" to appeal to children and adults alike (a target audience that the Andersons referred to as \"kidult\").Garland, pp. 62-64. Garland suggests that this drive towards increased realism echoed \"19th-century marionette theatre's own attempts to distinguish itself from other forms of puppetry (especially glove puppets), which also involved a tethering to the newly-emergent realist aesthetic across the arts\".Garland, p. 66. Non-Anderson productions using similar techniques The puppet series Space Patrol, created by Roberta Leigh and Arthur Provis and filmed by Leigh's company National Interest Picture Productions, used marionettes similar to those of APF's early series (including the use of automatic mouth movement). However, they were made in natural body proportions. \"200\" , a 2006 episode of the live-action series Stargate SG-1 , features a self-parody in which the characters are played by Supermarionation-style puppets. Category:1960s in British television Category: AP Films Category: Puppetry Category:1960s neologism", "after_revision": "Supermarionation (a blend of the words \"super\", \"marionette\" and \"animation\")La Rivi\u00e8re 2009, p. 67. was a style of television and film production employed by British company AP Films (later Century 21 Productions) in its puppet TV series and feature films of the 1960s. These productions were created by Gerry and Sylvia Anderson and filmed at APF's studios on the Slough Trading Estate. The characters were played by electronic marionettes with a moveable lower lip, which opened and closed in time with pre-recorded dialogue by means of a solenoid in the puppet's head or chest. The productions were mostly science fiction with the puppetry supervised by Christine Glanville, art direction by either Bob Bell or Keith Wilson , and music composed by Barry Gray. They also made extensive use of scale model special effects, directed by Derek Meddings. Development and use in Anderson productions List of Anderson Supermarionation productions Title Year(s) Format Notes Four Feather Falls 1960 TV series APF's first TV series to use marionettes with fibreglass heads and electronic lip-sync mechanisms. Regarded as the first Supermarionation series by some sources, although the term was not used until the production of Supercar.Sangster and Condon, pp. 318; 726-727. Supercar TV series First production to feature rocket effects, back projection effects and underwater scenes filmed \"dry\" through water tanks.La Rivi\u00e8re 2009, pp. 56; 61.Hirsch, p. 62. The 13-episode second series was the first to be credited as being \"filmed in Supermarionation\" and the first for which puppets were copied to allow episodes to be filmed in pairs by separate crews.Hearn, p. 33.La Rivi\u00e8re 2009, pp. 65; 67. It also marked the introduction of a dedicated special effects unit, led by Derek Meddings. Fireball XL5 1962-63 TV series First production to feature front projection effects and puppet heads with blinkable eyes.Bentley, p. 62.La Rivi\u00e8re 2009, p. 103. Stingray 1964-65 TV series APF's first colour series. First production on which puppets' facial expressions could be varied: main characters could now be fitted with \"smiler\" and \"frowner\" heads. For greater realism, poseable hands and glass eyes (bearing miniature prints of real human eyes) were also introduced.La Rivi\u00e8re 2009, pp. 97\u201398.Hirsch, p. 63. Thunderbirds 1965-66 TV series 1966 Nearly all puppet heads were by now made of fibreglass (previously, guest character faces were sculpted in Plasticine).La Rivi\u00e8re 2009, p. 132. \"Under-controlled\" puppets, lacking wires and operated from the studio floor, were introduced for scenes showing characters sitting \u2013 for example, fighter pilots in aircraft cockpits.La Rivi\u00e8re 2009, p. 152. 1967-68 TV series The lip-sync mechanism was moved to the chest, allowing the puppets to be redesigned in natural proportions. Guest characters were now played by a \"repertory company\" of permanent fibreglass puppets that could be superficially altered for each role (e.g. by adding or removing facial hair).La Rivi\u00e8re 2009, pp. 154-155.Bentley, p. 119. Eyes were now plastic. Thunderbird 6 1968 Feature film The puppets mostly kept their pre-Captain Scarlet body proportions, although heads and hands were made slightly smaller.Bentley, p. 304. First production to feature extensive location shooting.La Rivi\u00e8re 2009, p. 169. Joe 90 1968-69 TV series The Secret Service 1969 TV series Featured extensive footage of live actors. Last series to be \"filmed in Supermarionation\".Bentley, p. 152. Captain Scarlet S.I.G. 2001 Documentary DVD documentary on the making of Captain Scarlet. Linking sequences feature the puppet characters of Captains Scarlet and Blue. Produced by Gerry Anderson and credited as being \"filmed in Supermarionation\".Bentley, p. 322. The Andersons' puppet work also included The Investigator (1973), a pilot for an unmade Supermarionation series. This featured both marionettes and live actors but did not include the term \"Supermarionation\" in the credits .Bentley, p. 314.La Rivi\u00e8re 2009, p. 201. Critical response Noting that Gerry Anderson would have preferred to make live-action productions instead of puppet series, Percy argues that his style of filming was developed to \"make the puppet film as 'respectable' as possible\". She also comments that APF's filming techniques \"would not only result in a level of quality and sophistication not seen before in a family show, but also give birth to some of the most iconic series in the history of British children's television.\" Garland describes the underlying theme of Anderson's work as a \"self-reflexive obsession with an aesthetic of realism (or more accurately a surface realism often associated with naturalism) borne of an unfulfilled desire to make live-action films for adults\", further commenting that Anderson's typecasting as a puppet TV creator \"led him on a lifelong quest to perfect a simulation of reality\". He notes that Anderson's involvement with puppets began at a time when Western puppet theatre \"had become increasingly marginalised to a niche, to an association with children's entertainment\", and that APF's productions used an \"aesthetic of incremental realism\" to appeal to children and adults alike (a target audience that the Andersons referred to as \"kidult\").Garland, pp. 62-64. Garland suggests that this drive towards increased realism echoed \"19th-century marionette theatre's own attempts to distinguish itself from other forms of puppetry (especially glove puppets), which also involved a tethering to the newly-emergent realist aesthetic across the arts\".Garland, p. 66. Successor techniques In 1983, Gerry Anderson returned to puppetry with his independent science-fiction TV series Terrahawks. The characters of this series were made as rubber hand puppets, operated from the studio floor in a process called \"Supermacromation\".Bentley, p. 227. This was similar to the techniques employed by American puppeteer Jim Henson. Revival In the 2010s, Stephen La Rivi\u00e8re and his production company Century 21 Films began a revival of Supermarionation. Their productions are listed below. Title Year Format Notes Filmed in Supermarionation 2014 Documentary Includes newly filmed Supermarionation puppet sequences featuring characters from Thunderbirds.La Rivi\u00e8re 2014, p. 337. 2015 Mini-series Screen adaptations of three Thunderbirds audio plays originally released in the 1960s. Made in celebration of the series' 50th anniversary and filmed using 1960s Supermarionation production methods. Nebula-75 2020 Web series Puppet web series made during the COVID-19 lockdown in the UK. Filmed in the spirit of APF's early-1960s productions and credited as being \"filmed in Supermarionation and Superisolation\". Non-Anderson productions using similar techniques The puppet series Space Patrol, created by Roberta Leigh and Arthur Provis and filmed by Leigh's company National Interest Picture Productions, used marionettes similar to those of APF's early series (including the use of automatic mouth movement). However, they were made in natural body proportions. A Stargate SG-1 episode, \"200\" ( 2006 ) , features a self-parody in which the characters are played by Supermarionation-style puppets. Category:1960s in British television Category: 1960s neologisms Category: AP Films Category: Puppetr", "edit_actions": [{"type": "R", "before": "They", "after": "These productions", "start_char_pos": 271, "end_char_pos": 275}, {"type": "D", "before": "in these productions", "after": null, "start_char_pos": 391, "end_char_pos": 411}, {"type": "R", "before": "Most of the productions were", "after": "The productions were mostly", "start_char_pos": 590, "end_char_pos": 618}, {"type": "A", "before": null, "after": "the", "start_char_pos": 640, "end_char_pos": 640}, {"type": "R", "before": "and music", "after": ", and music composed", "start_char_pos": 734, "end_char_pos": 743}, {"type": "D", "before": "history", "after": null, "start_char_pos": 860, "end_char_pos": 867}, {"type": "D", "before": "Captain Scarlet and the Mysterons", "after": null, "start_char_pos": 2694, "end_char_pos": 2727}, {"type": "R", "before": "marionette characters", "after": "marionettes", "start_char_pos": 3916, "end_char_pos": 3937}, {"type": "A", "before": null, "after": "but did not include the term \"Supermarionation\" in the credits", "start_char_pos": 3954, "end_char_pos": 3954}, {"type": "A", "before": null, "after": "Critical response Noting that Gerry Anderson would have preferred to make live-action productions instead of puppet series, Percy argues that his style of filming was developed to \"make the puppet film as 'respectable' as possible\". She also comments that APF's filming techniques \"would not only result in a level of quality and sophistication not seen before in a family show, but also give birth to some of the most iconic series in the history of British children's television.\"", "start_char_pos": 3997, "end_char_pos": 3997}, {"type": "A", "before": null, "after": "Garland describes the underlying theme of Anderson's work as a \"self-reflexive obsession with an aesthetic of realism (or more accurately a surface realism often associated with naturalism) borne of an unfulfilled desire to make live-action films for adults\", further commenting that Anderson's typecasting as a puppet TV creator \"led him on a lifelong quest to perfect a simulation of reality\". He notes that Anderson's involvement with puppets began at a time when Western puppet theatre \"had become increasingly marginalised to a niche, to an association with children's entertainment\", and that APF's productions used an \"aesthetic of incremental realism\" to appeal to children and adults alike (a target audience that the Andersons referred to as \"kidult\").Garland, pp. 62-64. Garland suggests that this drive towards increased realism echoed \"19th-century marionette theatre's own attempts to distinguish itself from other forms of puppetry (especially glove puppets), which also involved a tethering to the newly-emergent realist aesthetic across the arts\".Garland, p. 66.", "start_char_pos": 3998, "end_char_pos": 3998}, {"type": "D", "before": "producer", "after": null, "start_char_pos": 4375, "end_char_pos": 4383}, {"type": "A", "before": null, "after": "production", "start_char_pos": 4411, "end_char_pos": 4411}, {"type": "A", "before": null, "after": "Filmed in Supermarionation", "start_char_pos": 4534, "end_char_pos": 4534}, {"type": "D", "before": "Thunderbirds: The Anniversary Episodes", "after": null, "start_char_pos": 4672, "end_char_pos": 4710}, {"type": "D", "before": "Critical response Noting that Gerry Anderson would have preferred to make live-action productions instead of puppet series, Percy argues that his style of filming was developed to \"make the puppet film as 'respectable' as possible\". She also comments that APF's filming techniques \"would not only result in a level of quality and sophistication not seen before in a family show, but also give birth to some of the most iconic series in the history of British children's television.\"", "after": null, "start_char_pos": 5141, "end_char_pos": 5623}, {"type": "D", "before": "Garland describes the underlying theme of Anderson's work as a \"self-reflexive obsession with an aesthetic of realism (or more accurately a surface realism often associated with naturalism) borne of an unfulfilled desire to make live-action films for adults\", further commenting that Anderson's typecasting as a puppet TV creator \"led him on a lifelong quest to perfect a simulation of reality\". He notes that Anderson's involvement with puppets began at a time when Western puppet theatre \"had become increasingly marginalised to a niche, to an association with children's entertainment\", and that APF's productions used an \"aesthetic of incremental realism\" to appeal to children and adults alike (a target audience that the Andersons referred to as \"kidult\").Garland, pp. 62-64. Garland suggests that this drive towards increased realism echoed \"19th-century marionette theatre's own attempts to distinguish itself from other forms of puppetry (especially glove puppets), which also involved a tethering to the newly-emergent realist aesthetic across the arts\".Garland, p. 66.", "after": null, "start_char_pos": 5624, "end_char_pos": 6703}, {"type": "A", "before": null, "after": "A Stargate SG-1 episode,", "start_char_pos": 7056, "end_char_pos": 7056}, {"type": "R", "before": ", a", "after": "(", "start_char_pos": 7063, "end_char_pos": 7066}, {"type": "R", "before": "episode of the live-action series Stargate SG-1", "after": ")", "start_char_pos": 7072, "end_char_pos": 7119}, {"type": "A", "before": null, "after": "1960s neologisms Category:", "start_char_pos": 7262, "end_char_pos": 7262}, {"type": "R", "before": "Puppetry Category:1960s neologism", "after": "Puppetr", "start_char_pos": 7282, "end_char_pos": 7315}], "sents_char_pos": [0, 270, 375, 589, 758, 847, 1105, 1233, 1262, 1414, 1438, 1456, 1655, 1692, 1788, 1910, 2003, 2145, 2264, 2291, 2305, 2461, 2669, 2854, 3036, 3065, 3081, 3104, 3257, 3273, 3330, 3456, 3504, 3610, 3688, 3767, 3783, 3896, 3956, 3972, 3996, 4123, 4258, 4274, 4352, 4473, 4509, 4647, 4671, 4814, 4926, 5015, 5140, 5373, 5623, 6019, 6386, 6405, 6688, 7002, 7055, 7214]}
+{"doc_id": "15909245", "revision_depth": "3", "before_revision": "e A learning resource center is a facility within a school, staffed by a specialist, containing several information sources . Purpose: Information and communication development opportunities and information flow are the big challenges arising from a dedicated review of most educational questions, whether from theoretical frames or material. School libraries are therefore considered one of the most important resources within educational facilities. The need to develop school libraries is urgent in that, on the one hand there is a need to convey information through a wide diversity of technologies and resources , and on the other hand, there is a myriad of new teaching and student roles to support. Within this view, came the project of Learning Resource Centers. The objective is to raise school libraries to an international and more technical standard. Learning Resource Centers can also be institutionalized in various institutions for teaching and learning purposes. Generally, the purpose of a resource center is to advance the learning experience of students and teachers in any educational sector. Concept: A school utility driven by a qualified expert, it contains several information resources and their techniques, which the academic team directly reference. The resource is used to acquire information, analyze and evaluate and then develop the resources further using several learning and delivery methods. It also provides services to support and facilitate the education for both the teaching team and the student body.%DIFDELCMD < %DIFDELCMD < %%% These learning resource centers based on educational trends which were established in the mid 1960's and 1970's, which focus on methods of self-learning, programmed learning and learning for mastery and learning throughout audio media, including the earliest beginnings computer usage within learning processes. Since, information technology and teaching and learning theories have added a new dimension into the learning resource centers concept, which is only growing in requirement , particularly since the COVID-19 pandemic which forced educational institutions to rely on online resources in a greater way than ever before. Reasons for establishing resources centers The strong connection between learning resources and method, and passing away supporting and cultural general role of school libraries into essential, accurately planned, role to achieve the method and its purposes. The book and printed material become not the only information resource. Development of educational theories, international tends to self learning, taking in account differences of individuals, make the learner the axis of educational process, and the teacher role change into a leader and facilitator of learning process. Learning resources centers concentrate on amalgamation of resources, information and communication technologies with educational practices inside centers. Assignments Definition the goals of learning resources centers programs, with and implemented, evaluated plan to achieve these goals. Center activities planning and to amalgamate them with school educational program. Establishing a balanced group that contains printed and non-\u00acprinted educational and learning materials supporting curriculum. School man-power development through continuous training during the period of teachers service and ensuring technical resources, and notify them about new materials, and sharing with them in decision making processes related to resources purchasing. Presenting consultation services in the educational techniques field and teaching methods. Ensuring educational techniques production requirements and acquainting about methods of their production and amalgamating them into educational curricula. Make the periodical maintenance for materials and educational instruments available in the center. Encourage students on self-learning. Assert the concept learning resource (E.N OSARONWI IAUE PH )%DIFDELCMD < %DIFDELCMD < %%% The aim Learning resources center's general aim is to ensure a suitable educational environment that allows learners to benefit from any kind of learning resources. Learning resources centers, material ingredients A) Self-learning auditorium: Self-learning auditoriums should facilitate access to all kinds of information resources: printed and digital resources. Then this auditorium should be available, attractive and suitable for students of all grades. Self-learning auditoriums can often include the following: \u2013 Reception and visitors serving area, cataloging, borrowing and management. This aspect is less common than it used to be, with many resource centers dedicated to online learning materials only. \u2013 Reading and perusal area. \u2013 Self-learning area (using several resources) \u2013 Electronic learning area \u2013 Area when can be maintained learning resources (printed and not printed) \u2013 Catalogs area (using computer)%DIFDELCMD < %DIFDELCMD < %%% B) Group-learning auditoriums: The most important aspect characterizing this auditorium is its various equipment and uses, such as available projectors which depend on computer, radio or live presentation through digital cameras. There is also often available, flexible furniture which can be reshaped to suit all kind of groups and cooperative learning environments. Collections Educational resources are considered as most important element of the center, and without it the center cannot achieve its main role. Building and developing collections to be made according to specific policy, made and adapted in order to satisfy center's goals. This policy should ensure the building and development of integrated collection that can help and enrich educational curricula.%DIFDELCMD < %DIFDELCMD < %%% Learning resources center specialist's role As a teacher, the library media specialists works with students and other members of the learning community to analyze learning and information needs, to locate and use resources that will meet those needs, and to understand and communicate the information the resource provides. The library media specialist is knowledgeable about current research on teaching and learning and skilled in applying its findings to a variety of situations \u2013 particularly those that call upon students to access, evaluate, and use information from multiple sources in order to learn, to think, and to create and to apply knowledge. In short, the library media specialist teaches students to use information for critical thinking and problem solving using the information literacy standards for student learning set. A learning resources center's success depends firstly on the range of its engagement in modern learning methods implementation, which gives more concentration to learner role in learning process, and evaluates work mechanism, in learning resources centers on the bases that learning resources center is not a place supported with learning resources accordingly, but educational action and substantial element of different elements of classroom lesson. The Work mechanism in learning resources centers requires following two methods and merging between them. Benefiting from learning resources centers requires each teacher to implement one lesson weekly (or according to school classes number) in the learning resources center and to depend, in this lesson, mainly on group learning method (cooperative learning) . In the second method, benefiting from learning resources centers does not require teacher to implement class lesson in learning resources center, but he has to follow up the same previous procedures, then allow the students to implement their projects referring to learning resources center outside the lesson time, and students to be given, in this case, more time to implement the project, then require do a presentation and discussion in the class.%DIFDELCMD < %DIFDELCMD < %%% Activities The learning center implements a group of activities, designed and implemented by teachers in cooperation with center specialist. Methods of implementation of these activities differs according to educational grades and concentrate on implementation of modem educational and learning methods. Such activities are: Reading activities: aim to sow reading habits those like; summarization and book presentation. Learning activities: these activities are done by student depending on himself to support his learning. Educational activities: these activities are done by teacher to support student learning. Information search: search on internet and using references. Cultural activities: these activities to be done by student in order to improve his cultural level; school radio, seminars, lectures and competition. Cooperative activities: these activities are done by students to help center to achieve its aims as a center group. Administrative' activities: these activities appear to occupy center with waiting lessons, school meetings and educational coordinator's meetings etc. . Social activities: the aim of these activities is community service; like anti-terror activity, anti-smoking etc. Services Center offers a group of services to meet student and educational staff needs, and these services can be developed according to their needs. These services: guiding readers, references services, borrow out, copying and scanning and bibliographical services.%DIFDELCMD < %DIFDELCMD < %%% Conclusion Learning resources centers are the correct way to activate school library and to amalgamate it into educational procedure as well as it is a part from it, but not among subsidiary utilities. One of the biggest problems that still face school libraries is that school libraries still playing general cultural role lead to isolate them away from educational process. So they became a place to cover waiting lessons and an escape for every lazy teacher, who does not desire to carry out lessons, whereas learning resources centers project has put the center among educational process through its support by necessary technical and librarian equipments needed for teachers educational tasks performance within modem method, and supported these centers with supporting for curriculum educational resources, suitable for age types existing there, so center became a necessary place where teachers run to, to help them to implement their tasks and achieve their educational aims.Alomran, Hamad Learning Resource Centers in Saudi Arabia Notes", "after_revision": " A learning resource center (LRC) is a facility within a school, staffed by a specialist, containing several information sources to facilitate education for students and staff. It differs from a regular school library in its additional focus on multimedia resources and information technology. %DIFDELCMD < %DIFDELCMD < %%% History LRCs are based on educational trends established in the mid 1960's and 1970's, which focus on methods of self-learning, programmed learning and learning for mastery and learning throughout audio media, including the earliest beginnings of computer usage within learning processes. Information technology and teaching and learning theories have since added a new dimension to LRCs, which are growing in need , particularly since the COVID-19 pandemic , which has forced educational institutions to rely on online resources more than ever before. %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "D", "before": "e", "after": null, "start_char_pos": 0, "end_char_pos": 1}, {"type": "A", "before": null, "after": "(LRC)", "start_char_pos": 29, "end_char_pos": 29}, {"type": "R", "before": ".", "after": "to facilitate education for students and staff. It differs from a regular school library in its additional focus on multimedia resources and information technology.", "start_char_pos": 125, "end_char_pos": 126}, {"type": "D", "before": "Purpose: Information and communication development opportunities and information flow are the big challenges arising from a dedicated review of most educational questions, whether from theoretical frames or material. School libraries are therefore considered one of the most important resources within educational facilities. The need to develop school libraries is urgent in that, on the one hand there is a need to convey information through a wide diversity of technologies and resources , and on the other hand, there is a myriad of new teaching and student roles to support. Within this view, came the project of Learning Resource Centers. The objective is to raise school libraries to an international and more technical standard. Learning Resource Centers can also be institutionalized in various institutions for teaching and learning purposes. Generally, the purpose of a resource center is to advance the learning experience of students and teachers in any educational sector.", "after": null, "start_char_pos": 127, "end_char_pos": 1113}, {"type": "D", "before": "Concept: A school utility driven by a qualified expert, it contains several information resources and their techniques, which the academic team directly reference. The resource is used to acquire information, analyze and evaluate and then develop the resources further using several learning and delivery methods. It also provides services to support and facilitate the education for both the teaching team and the student body.", "after": null, "start_char_pos": 1114, "end_char_pos": 1542}, {"type": "R", "before": "These learning resource centers", "after": "History LRCs are", "start_char_pos": 1572, "end_char_pos": 1603}, {"type": "D", "before": "which were", "after": null, "start_char_pos": 1632, "end_char_pos": 1642}, {"type": "A", "before": null, "after": "of", "start_char_pos": 1842, "end_char_pos": 1842}, {"type": "R", "before": "Since, information", "after": "Information", "start_char_pos": 1885, "end_char_pos": 1903}, {"type": "A", "before": null, "after": "since", "start_char_pos": 1955, "end_char_pos": 1955}, {"type": "R", "before": "into the learning resource centers concept, which is only growing in requirement", "after": "to LRCs, which are growing in need", "start_char_pos": 1978, "end_char_pos": 2058}, {"type": "R", "before": "which", "after": ", which has", "start_char_pos": 2102, "end_char_pos": 2107}, {"type": "R", "before": "in a greater way", "after": "more", "start_char_pos": 2168, "end_char_pos": 2184}, {"type": "D", "before": "Reasons for establishing resources centers The strong connection between learning resources and method, and passing away supporting and cultural general role of school libraries into essential, accurately planned, role to achieve the method and its purposes. The book and printed material become not the only information resource. Development of educational theories, international tends to self learning, taking in account differences of individuals, make the learner the axis of educational process, and the teacher role change into a leader and facilitator of learning process. Learning resources centers concentrate on amalgamation of resources, information and communication technologies with educational practices inside centers.", "after": null, "start_char_pos": 2203, "end_char_pos": 2938}, {"type": "D", "before": "Assignments Definition the goals of learning resources centers programs, with and implemented, evaluated plan to achieve these goals. Center activities planning and to amalgamate them with school educational program. Establishing a balanced group that contains printed and non-\u00acprinted educational and learning materials supporting curriculum. School man-power development through continuous training during the period of teachers service and ensuring technical resources, and notify them about new materials, and sharing with them in decision making processes related to resources purchasing. Presenting consultation services in the educational techniques field and teaching methods. Ensuring educational techniques production requirements and acquainting about methods of their production and amalgamating them into educational curricula. Make the periodical maintenance for materials and educational instruments available in the center. Encourage students on self-learning. Assert the concept learning resource (E.N OSARONWI IAUE PH )", "after": null, "start_char_pos": 2939, "end_char_pos": 3976}, {"type": "D", "before": "The aim Learning resources center's general aim is to ensure a suitable educational environment that allows learners to benefit from any kind of learning resources.", "after": null, "start_char_pos": 4006, "end_char_pos": 4170}, {"type": "D", "before": "Learning resources centers, material ingredients A) Self-learning auditorium: Self-learning auditoriums should facilitate access to all kinds of information resources: printed and digital resources. Then this auditorium should be available, attractive and suitable for students of all grades. Self-learning auditoriums can often include the following: \u2013 Reception and visitors serving area, cataloging, borrowing and management. This aspect is less common than it used to be, with many resource centers dedicated to online learning materials only. \u2013 Reading and perusal area. \u2013 Self-learning area (using several resources) \u2013 Electronic learning area \u2013 Area when can be maintained learning resources (printed and not printed) \u2013 Catalogs area (using computer)", "after": null, "start_char_pos": 4171, "end_char_pos": 4928}, {"type": "D", "before": "B) Group-learning auditoriums: The most important aspect characterizing this auditorium is its various equipment and uses, such as available projectors which depend on computer, radio or live presentation through digital cameras. There is also often available, flexible furniture which can be reshaped to suit all kind of groups and cooperative learning environments.", "after": null, "start_char_pos": 4958, "end_char_pos": 5325}, {"type": "D", "before": "Collections Educational resources are considered as most important element of the center, and without it the center cannot achieve its main role. Building and developing collections to be made according to specific policy, made and adapted in order to satisfy center's goals. This policy should ensure the building and development of integrated collection that can help and enrich educational curricula.", "after": null, "start_char_pos": 5326, "end_char_pos": 5729}, {"type": "D", "before": "Learning resources center specialist's role As a teacher, the library media specialists works with students and other members of the learning community to analyze learning and information needs, to locate and use resources that will meet those needs, and to understand and communicate the information the resource provides. The library media specialist is knowledgeable about current research on teaching and learning and skilled in applying its findings to a variety of situations \u2013 particularly those that call upon students to access, evaluate, and use information from multiple sources in order to learn, to think, and to create and to apply knowledge. In short, the library media specialist teaches students to use information for critical thinking and problem solving using the information literacy standards for student learning set.", "after": null, "start_char_pos": 5759, "end_char_pos": 6599}, {"type": "D", "before": "A learning resources center's success depends firstly on the range of its engagement in modern learning methods implementation, which gives more concentration to learner role in learning process, and evaluates work mechanism, in learning resources centers on the bases that learning resources center is not a place supported with learning resources accordingly, but educational action and substantial element of different elements of classroom lesson. The Work mechanism in learning resources centers requires following two methods and merging between them. Benefiting from learning resources centers requires each teacher to implement one lesson weekly (or according to school classes number) in the learning resources center and to depend, in this lesson, mainly on group learning method (cooperative learning) . In the second method, benefiting from learning resources centers does not require teacher to implement class lesson in learning resources center, but he has to follow up the same previous procedures, then allow the students to implement their projects referring to learning resources center outside the lesson time, and students to be given, in this case, more time to implement the project, then require do a presentation and discussion in the class.", "after": null, "start_char_pos": 6600, "end_char_pos": 7866}, {"type": "D", "before": "Activities The learning center implements a group of activities, designed and implemented by teachers in cooperation with center specialist. Methods of implementation of these activities differs according to educational grades and concentrate on implementation of modem educational and learning methods. Such activities are: Reading activities: aim to sow reading habits those like; summarization and book presentation. Learning activities: these activities are done by student depending on himself to support his learning. Educational activities: these activities are done by teacher to support student learning. Information search: search on internet and using references. Cultural activities: these activities to be done by student in order to improve his cultural level; school radio, seminars, lectures and competition. Cooperative activities: these activities are done by students to help center to achieve its aims as a center group. Administrative' activities: these activities appear to occupy center with waiting lessons, school meetings and educational coordinator's meetings etc. . Social activities: the aim of these activities is community service; like anti-terror activity, anti-smoking etc.", "after": null, "start_char_pos": 7896, "end_char_pos": 9103}, {"type": "D", "before": "Services Center offers a group of services to meet student and educational staff needs, and these services can be developed according to their needs. These services: guiding readers, references services, borrow out, copying and scanning and bibliographical services.", "after": null, "start_char_pos": 9104, "end_char_pos": 9370}, {"type": "D", "before": "Conclusion Learning resources centers are the correct way to activate school library and to amalgamate it into educational procedure as well as it is a part from it, but not among subsidiary utilities. One of the biggest problems that still face school libraries is that school libraries still playing general cultural role lead to isolate them away from educational process. So they became a place to cover waiting lessons and an escape for every lazy teacher, who does not desire to carry out lessons, whereas learning resources centers project has put the center among educational process through its support by necessary technical and librarian equipments needed for teachers educational tasks performance within modem method, and supported these centers with supporting for curriculum educational resources, suitable for age types existing there, so center became a necessary place where teachers run to, to help them to implement their tasks and achieve their educational aims.Alomran, Hamad Learning Resource Centers in Saudi Arabia", "after": null, "start_char_pos": 9400, "end_char_pos": 10439}, {"type": "D", "before": "Notes", "after": null, "start_char_pos": 10440, "end_char_pos": 10445}], "sents_char_pos": [0, 343, 452, 706, 771, 863, 979, 1113, 1277, 1427, 1542, 1884, 2202, 2461, 2533, 2783, 2938, 3072, 3155, 3282, 3532, 3623, 3779, 3878, 3915, 4170, 4369, 4463, 4599, 4718, 4746, 5187, 5325, 5471, 5601, 5729, 6082, 6415, 6599, 7051, 7157, 7414, 7866, 8036, 8199, 8278, 8315, 8419, 8509, 8570, 8670, 8720, 8836, 9058, 9103, 9253, 9370, 9601, 9775, 9861, 9903, 10383]}
+{"doc_id": "167326", "revision_depth": "1", "before_revision": "Church and Civil (secular) Ceremonies According to Dally Messenger and Alain de Botton, in most Western countries the values and ideals articulated in both church and civil ceremonies are generally similar. The difference is in what Messenger calls the \"supernatural infrastructure\" or de Botton the \"implausible supernatural element\".Messenger, Dally, Murphy's Law and the Pursuit of Happiness: a History of the Civil Celebrant Movement, Spectrum Publications, Melbourne (Australia), 2012 Kelly, Fran; Radio Interview with Alain de Botton, RN Breakfast, Australian Broadcasting Commission, Podcast 2012. Shared Traditions Leaders welcome a boy into Scouting, March 2010, Mexico City, Mexico.As Edward Schillebeeckx writes about the marriage ceremony, there are a surprising number of ancient traditional elements in both church and civil ceremonies in the western world. Key ceremonies date from the pre-Christian Roman and Greek times and their practices have continued through the centuries. For example, from pre-Christian Roman times in the marriage ceremony, we inherit best men and bridesmaids, processions, signing of the contract, exchange of rings and even the wedding cake.Schillebeeckx, Edward; translated by N.D. Smith:; Secular Reality and Saving Mystery. Volumes 1 & 2, Sheed and Ward, London, 1963. Note: later versions have these ISBNs: History of Secular Ceremony The main impetus to the development of quality civil ceremonies in the Western world was the foresight of the Australian statesman, Senator and High Court Judge, Lionel Murphy. In 1973 in Australia the civil celebrant program entrusted appropriately selected individuals to provide non-church people with ceremonies of substance and dignity. This initiative to a great extent has now been followed by New Zealand, Canada, the United Kingdom and some states of the USA.Messenger, Dally (2012), Murphy's Law and the Pursuit of Happiness: a History of the Civil Celebrant Movement, Spectrum Publications, Melbourne (Australia), Senator and Mr Justice Lionel Murphy, founder of the civil celebrant movement in Australia, which has now spread to the rest of the Western World Purpose of Secular Ceremony According to Dally Messenger III secular ceremonies are \u201croadmap\u201d influences which lead to an acceptable, ethical and dignified life. Ceremonies contribute to the unseen ingredients of psychological stability, a sense of identity, reassurances of life's purposes, and the personal sense of self worth. The mysterious cultural power of quality ceremonies lead our society along an honourable and ethical path. Lionel Murphy considered that personal genuine ceremonies were central to a civilised, stable and happy society. Here he echoed the conviction of the renowned mythologist Joseph Campbell who had maintained the strongly asserted generality that the level of civilised behaviour in a society is directly linked to the practice of ceremonies and Rites of Passage .Messenger III, Dally, We Had a Dream, in the Australian Humanist, no 121, Autumn 2016, published by the Australian Humanist Society, Canberra ACT Ceremony is serious communication Ceremonies are the time and place setting wherein people seriously communicate . For example, in front of witnesses the groom tells the bride that he loves her and wants to be with her for the rest of his life. Such a statement has much more force than if said privately. It is in the ceremony that groups of people come together. It is in the ceremony that they make compacts, that they recognise achievement, that they assert identity, that they established connections, that they declare love, that they pay tribute, that they express grief. Ceremonies, as they always had been, are historically the bridge between the visual and performing arts and the people. Murphy and his followers, and international practitioners such as David Oldfield of Washington DC understand that ceremonies are core expressions of the culture. Done well, they can assist in major decision making , bring emotional security, strengthen bonds between people, and communicate a sense of contentment. To quote David Oldfield The civil celebrant should be a person inspired to improve lives at a deep and lasting level. For this reason must be carefully chosen. The ideal is that they be educated in the humanities and trained to expertly co-create, creatively write and perform ceremonies.Messenger III, Dally (1999), Ceremonies and Celebrations, Hachette -Livre Australia (Sydney), pp. 16ff Ceremonial occasions Gogo tribe ladies from Manyoni Tanzania waiting to perform traditional dance during the ceremony of priest Joseph Makasi ordination marriage , or a wedding, is the flagship ceremony of every culture. Almost as important is the funeral or burial ceremony. The funeral ritual, too, is a public, traditional and symbolic means of expressing our beliefs, thoughts and feelings about the death of someone loved. Rich in history and rife with symbolism, the funeral ceremony helps us acknowledge the reality of the death, gives testimony to the life of the deceased, encourages the expression of grief in a way consistent with the culture\u2019s values, provides support to mourners, allows for the embracing of faith and beliefs about life and death, and offers continuity and hope for the living. birth i.e. a Naming Naming Ceremonies existed in human culture long before Christianity or any of the major religions came on the scene. Every community has a ceremony to welcome a new child into the world, to give that child recognition, and to celebrate the birth of new life. birth Baptism /Christening ceremony . initiation (college orientation week) puberty social adulthood (Bar (or Bat) Mitzvah) graduation awarding retirement death (Day of the Dead) spiritual (baptism, communion) Grand opening AgingNewly commissioned officers celebrate their new positions by throwing their midshipmen covers into the air as part of the U.S. Naval Academy class of 2005 graduation and commissioning ceremony. vernal equinox, winter solstice and other annual astronomical positions weekly Sabbath day inauguration of an elected office-holder occasions in a liturgical year or \"feasts\" in a calendar of saints Opening and closing of a sports event, such as the Olympic Games coronation of a monarch victory in battle", "after_revision": "Church and civil (secular) ceremonies According to Dally Messenger and Alain de Botton, in most Western countries the values and ideals articulated in both church and civil ceremonies are generally similar. The difference is in what Messenger calls the \"supernatural infrastructure\" or de Botton the \"implausible supernatural element\".Messenger, Dally, Murphy's Law and the Pursuit of Happiness: a History of the Civil Celebrant Movement, Spectrum Publications, Melbourne (Australia), 2012 Kelly, Fran; Radio Interview with Alain de Botton, RN Breakfast, Australian Broadcasting Commission, Podcast 2012. Shared traditions Leaders welcome a boy into Scouting, March 2010, Mexico City, Mexico.As Edward Schillebeeckx writes about the marriage ceremony, there are a surprising number of ancient traditional elements in both church and civil ceremonies in the western world. Key ceremonies date from the pre-Christian Roman and Greek times and their practices have continued through the centuries. For example, from pre-Christian Roman times in the marriage ceremony, we inherit best men and bridesmaids, processions, signing of the contract, exchange of rings and even the wedding cake.Schillebeeckx, Edward; translated by N.D. Smith:; Secular Reality and Saving Mystery. Volumes 1 & 2, Sheed and Ward, London, 1963. Note: later versions have these ISBNs: History of secular ceremony The main impetus to the development of quality civil ceremonies in the Western world was the foresight of the Australian statesman, Senator and High Court Judge, Lionel Murphy. In 1973 in Australia the civil celebrant program entrusted appropriately selected individuals to provide non-church people with ceremonies of substance and dignity. This initiative to a great extent has now been followed by New Zealand, Canada, the United Kingdom and some states of the USA.Messenger, Dally (2012), Murphy's Law and the Pursuit of Happiness: a History of the Civil Celebrant Movement, Spectrum Publications, Melbourne (Australia), Senator and Mr Justice Lionel Murphy, founder of the civil celebrant movement in Australia, which has now spread to the rest of the Western World Purpose of secular ceremony According to Dally Messenger III secular ceremonies are \u201croadmap\u201d influences which lead to an acceptable, ethical and dignified life. Ceremonies contribute to the unseen ingredients of psychological stability, a sense of identity, reassurances of life's purposes, and the personal sense of self worth. The mysterious cultural power of quality ceremonies lead our society along an honourable and ethical path. Lionel Murphy considered that personal genuine ceremonies were central to a civilised, stable and happy society. Here he echoed the conviction of the renowned mythologist Joseph Campbell who had maintained the strongly asserted generality that the level of civilised behaviour in a society is directly linked to the practice of ceremonies and rites of passage .Messenger III, Dally, We Had a Dream, in the Australian Humanist, no 121, Autumn 2016, published by the Australian Humanist Society, Canberra ACT Serious communication Ceremonies are the time and place setting wherein people communicate seriously . For example, in front of witnesses the groom tells the bride that he loves her and wants to be with her for the rest of his life. Such a statement has much more force than if said privately. It is in the ceremony that groups of people come together. It is in the ceremony that they make compacts, recognise achievement, assert identity, establish connections, declare love, pay tribute, express grief. Ceremonies, as they always had been, are historically the bridge between the visual and performing arts and the people. Murphy and his followers, and international practitioners such as David Oldfield of Washington DC understand that ceremonies are core expressions of the culture. Done well, they can assist in major decision-making , bring emotional security, strengthen bonds between people, and communicate a sense of contentment. To quote David Oldfield The civil celebrant should be a person inspired to improve lives at a deep and lasting level. For this reason they must be carefully chosen. The ideal is that they be educated in the humanities and trained to expertly co-create, creatively write and perform ceremonies.Messenger III, Dally (1999), Ceremonies and Celebrations, Hachette -Livre Australia (Sydney), pp. 16ff Ceremonial occasions Gogo tribe ladies from Manyoni Tanzania waiting to perform traditional dance during the ceremony of priest Joseph Makasi ordination Marriage , or a wedding, is the flagship ceremony of every culture. Almost as important is the funeral or burial ceremony. The funeral ritual, too, is a public, traditional and symbolic means of expressing our beliefs, thoughts and feelings about the death of someone loved. Rich in history and rife with symbolism, the funeral ceremony helps us acknowledge the reality of the death, gives testimony to the life of the deceased, encourages the expression of grief in a way consistent with the culture\u2019s values, provides support to mourners, allows for the embracing of faith and beliefs about life and death, and offers continuity and hope for the living. Birth, i.e. a naming ceremony Naming Ceremonies existed in human culture long before Christianity or any of the major religions came on the scene. Every community has a ceremony to welcome a new child into the world, to give that child recognition, and to celebrate the birth of new life. Baptism or christening ceremony Initiation (college orientation week) Puberty Social adulthood (Bar (or Bat) Mitzvah) , coming of age ceremonies Graduation Award ceremonies Retirement Death (Day of the Dead) Spiritual (baptism, communion) Grand opening AgingNewly commissioned officers celebrate their new positions by throwing their midshipmen covers into the air as part of the U.S. Naval Academy class of 2005 graduation and commissioning ceremony. Vernal equinox, winter solstice and other annual astronomical positions Weekly Sabbath day Inauguration of an elected office-holder Occasions in a liturgical year or \"feasts\" in a calendar of saints Opening and closing of a sports event, such as the Olympic Games Coronation of a monarch Victory in battle", "edit_actions": [{"type": "R", "before": "Civil", "after": "civil", "start_char_pos": 11, "end_char_pos": 16}, {"type": "R", "before": "Ceremonies", "after": "ceremonies", "start_char_pos": 27, "end_char_pos": 37}, {"type": "R", "before": "Traditions", "after": "traditions", "start_char_pos": 612, "end_char_pos": 622}, {"type": "R", "before": "Secular Ceremony", "after": "secular ceremony", "start_char_pos": 1365, "end_char_pos": 1381}, {"type": "R", "before": "Secular Ceremony", "after": "secular ceremony", "start_char_pos": 2164, "end_char_pos": 2180}, {"type": "R", "before": "Rites of Passage", "after": "rites of passage", "start_char_pos": 2933, "end_char_pos": 2949}, {"type": "R", "before": "Ceremony is serious", "after": "Serious", "start_char_pos": 3097, "end_char_pos": 3116}, {"type": "R", "before": "seriously communicate", "after": "communicate seriously", "start_char_pos": 3188, "end_char_pos": 3209}, {"type": "D", "before": "that they", "after": null, "start_char_pos": 3509, "end_char_pos": 3518}, {"type": "D", "before": "that they", "after": null, "start_char_pos": 3542, "end_char_pos": 3551}, {"type": "R", "before": "that they established connections, that they", "after": "establish connections,", "start_char_pos": 3569, "end_char_pos": 3613}, {"type": "D", "before": "that they", "after": null, "start_char_pos": 3628, "end_char_pos": 3637}, {"type": "D", "before": "that they", "after": null, "start_char_pos": 3651, "end_char_pos": 3660}, {"type": "R", "before": "decision making", "after": "decision-making", "start_char_pos": 3994, "end_char_pos": 4009}, {"type": "A", "before": null, "after": "they", "start_char_pos": 4245, "end_char_pos": 4245}, {"type": "R", "before": "marriage", "after": "Marriage", "start_char_pos": 4656, "end_char_pos": 4664}, {"type": "R", "before": "birth", "after": "Birth,", "start_char_pos": 5312, "end_char_pos": 5317}, {"type": "D", "before": "Naming", "after": null, "start_char_pos": 5325, "end_char_pos": 5331}, {"type": "R", "before": "Naming", "after": "naming ceremony Naming", "start_char_pos": 5332, "end_char_pos": 5338}, {"type": "R", "before": "birth Baptism /Christening ceremony . initiation", "after": "Baptism or christening ceremony Initiation", "start_char_pos": 5591, "end_char_pos": 5639}, {"type": "R", "before": "puberty social", "after": "Puberty Social", "start_char_pos": 5667, "end_char_pos": 5681}, {"type": "R", "before": "graduation awarding retirement death", "after": ", coming of age ceremonies Graduation Award ceremonies Retirement Death", "start_char_pos": 5715, "end_char_pos": 5751}, {"type": "R", "before": "spiritual", "after": "Spiritual", "start_char_pos": 5770, "end_char_pos": 5779}, {"type": "R", "before": "vernal", "after": "Vernal", "start_char_pos": 6014, "end_char_pos": 6020}, {"type": "R", "before": "weekly Sabbath day inauguration", "after": "Weekly Sabbath day Inauguration", "start_char_pos": 6086, "end_char_pos": 6117}, {"type": "R", "before": "occasions", "after": "Occasions", "start_char_pos": 6146, "end_char_pos": 6155}, {"type": "R", "before": "coronation", "after": "Coronation", "start_char_pos": 6278, "end_char_pos": 6288}, {"type": "R", "before": "victory", "after": "Victory", "start_char_pos": 6302, "end_char_pos": 6309}], "sents_char_pos": [0, 206, 335, 502, 604, 692, 871, 994, 1184, 1206, 1233, 1269, 1314, 1558, 1723, 1850, 2314, 2482, 2589, 2702, 2951, 3211, 3341, 3402, 3461, 3675, 3795, 3957, 4110, 4228, 4271, 4400, 4723, 4778, 4930, 4971, 5448, 5666, 5705, 5769, 5800, 6188]}
+{"doc_id": "16908870", "revision_depth": "2", "before_revision": "Medical officer of health, medical health officer, chief health officer, chief public health officer or district medical officer, is a title and commonly used for the senior government official of a health department or agency , usually at a municipal, county/district, state/province, or regional level. The post is held by a physician who serves to advise and lead a team of public health professionals such as environmental health officers and public health nurses on matters of public health importance. The equivalent senior health official at the national level is often referred to as the Chief Medical Officer (CMO), although the title varies across countries, for example known as the Surgeon General in the United States and the Chief Public Health Officer in Canada. Australia The national senior adviser on health matters is known as the Chief Medical Officer , while those at state and territory level are mostly known as Chief Health officer (CHO), with one CMO and one Chief Public Health Officer . (Contains correction to Farhart article.) The Chief Public Health Officer of Canada is the national senior health official . All communities are under the jurisdiction of an MOH. Ontario has set up legislation so that one individual is named Chief Medical Officer of Health for the province and has powers to issue guidance, to issue provincial orders, and to coordinate public health responses with MOHs across jurisdictions . In British Columbia, the Chief MOH for the province is referred to as the Provincial Health Officer. The roles of the MOH vary across jurisdictions, but always include responsibilities related to public health and safety, and may include the following functions:Role of the Medical Officer of Health. Health Canada, accessed 16 January 2012. On 1 May 2020 during the COVID-19 pandemic in Canada, it came to light that the Chief Medical Officer of Health (CMOH) for Haldimand County and Norfolk County, both of which lie on the shores of Lake Erie, had issued an order under the Ontario Health Protection and Promotion Act which reads: Norfolk County Council was told that in order to remove the CMOH would require a two-thirds vote from Council along with approval from the provincial government.%DIFDELCMD < %DIFDELCMD < %%% India In general , a medical officer is one who has a minimum of MBBS degree or MD degree from a recognised medical college and university and his/her name is registered in National Medical Council and in state Medical council. They are posted mainly at primary health centre and community health centres across the country . United Kingdom In the United Kingdom, the municipal position was an elected head of the local board of health, however the term MOH has also been used to refer to the Chief Medical Officer . Under the Metropolis Local Management Act 1855, London municipalities were each required to appoint a medical officer. In 1856, 48 officers took up appointments in the city, and these specialists formed Metropolitan Association of Medical Officers of Health. They were important and influential in the establishment of municipal hospitals under the provisions of the Local Government Act 1929. In the 1974 NHS reorganisation they were replaced by Community Physicians who were attached to the different levels of the NHS. Officers Arthur Newsholme William Henry Duncan, Liverpool John Simon, City of London (1848\u20131855) John Bristowe, Camberwell William Rendle, St. George Southwark (1856-1859) Edwin Lankester, St. James George M'Gonigle, Stockton-on-Tees (1924\u201339) C. Killick Millard, Leicester (1901\u201335) United States The Surgeon General of the United States is the senior health officer in the United States.", "after_revision": "A medical officer of health, also known as a medical health officer, chief health officer, chief public health officer or district medical officer, is the title commonly used for the senior government official of a health department , usually at a municipal, county/district, state/province, or regional level. The post is held by a physician who serves to advise and lead a team of public health professionals such as environmental health officers and public health nurses on matters of public health importance. The equivalent senior health official at the national level is often referred to as the chief medical officer (CMO), although the title varies across countries, for example known as the surgeon general in the United States and the chief public health officer in Canada. Australia The national senior adviser on health matters is known as the chief medical officer , while those at state and territory level are mostly known as the chief health officer (CHO), with one CMO and one chief public health officer . (Contains correction to Farhart article.) The chief public health officer of Canada is the senior health official for the federal government . In Ontario, one individual is named chief medical officer of health for the province and has powers to issue guidance, to issue provincial orders, and to coordinate public health responses with medical officers of health, who oversee various public health units . In British Columbia, the provincial health officer is the senior health official for the provincial government. The roles of the medical officer of health varies across jurisdictions, but always include responsibilities related to public health and safety, and may include the following functions:Role of the Medical Officer of Health. Health Canada, accessed 16 January 2012. %DIFDELCMD < %DIFDELCMD < %%% India In India , a medical officer generally has a minimum of MBBS degree or MD degree from a recognised medical college and university and his/her name is registered in National Medical Council and in a state medical council. They are posted mainly at primary health centre and community health centres . United Kingdom In the United Kingdom, the municipal position was an elected head of the local board of health, however the term MOH has also been used to refer to the chief medical officer . Under the Metropolis Local Management Act 1855, London municipalities were each required to appoint a medical officer. In 1856, 48 officers took up appointments in the city, and these specialists formed Metropolitan Association of Medical Officers of Health. They were important and influential in the establishment of municipal hospitals under the provisions of the Local Government Act 1929. In the 1974 NHS reorganisation they were replaced by Community Physicians who were attached to the different levels of the NHS. United States The surgeon general of the United States is the senior health officer in the United States.", "edit_actions": [{"type": "R", "before": "Medical", "after": "A medical", "start_char_pos": 0, "end_char_pos": 7}, {"type": "A", "before": null, "after": "also known as a", "start_char_pos": 27, "end_char_pos": 27}, {"type": "R", "before": "a title and", "after": "the title", "start_char_pos": 134, "end_char_pos": 145}, {"type": "D", "before": "or agency", "after": null, "start_char_pos": 218, "end_char_pos": 227}, {"type": "R", "before": "Chief Medical Officer", "after": "chief medical officer", "start_char_pos": 597, "end_char_pos": 618}, {"type": "R", "before": "Surgeon General", "after": "surgeon general", "start_char_pos": 695, "end_char_pos": 710}, {"type": "R", "before": "Chief Public Health Officer", "after": "chief public health officer", "start_char_pos": 740, "end_char_pos": 767}, {"type": "R", "before": "Chief Medical Officer", "after": "chief medical officer", "start_char_pos": 851, "end_char_pos": 872}, {"type": "R", "before": "Chief Health", "after": "the chief health", "start_char_pos": 936, "end_char_pos": 948}, {"type": "R", "before": "Chief Public Health Officer", "after": "chief public health officer", "start_char_pos": 985, "end_char_pos": 1012}, {"type": "R", "before": "Chief Public Health Officer", "after": "chief public health officer", "start_char_pos": 1061, "end_char_pos": 1088}, {"type": "D", "before": "national", "after": null, "start_char_pos": 1106, "end_char_pos": 1114}, {"type": "A", "before": null, "after": "for the federal government", "start_char_pos": 1138, "end_char_pos": 1138}, {"type": "D", "before": "All communities are under the jurisdiction of an MOH.", "after": null, "start_char_pos": 1141, "end_char_pos": 1194}, {"type": "R", "before": "Ontario has set up legislation so that", "after": "In Ontario,", "start_char_pos": 1195, "end_char_pos": 1233}, {"type": "R", "before": "Chief Medical Officer of Health", "after": "chief medical officer of health", "start_char_pos": 1258, "end_char_pos": 1289}, {"type": "R", "before": "MOHs across jurisdictions", "after": "medical officers of health, who oversee various public health units", "start_char_pos": 1416, "end_char_pos": 1441}, {"type": "R", "before": "Chief MOH for the province is referred to as the Provincial Health Officer.", "after": "provincial health officer is the senior health official for the provincial government.", "start_char_pos": 1469, "end_char_pos": 1544}, {"type": "R", "before": "MOH vary", "after": "medical officer of health varies", "start_char_pos": 1562, "end_char_pos": 1570}, {"type": "D", "before": "On 1 May 2020 during the COVID-19 pandemic in Canada, it came to light that the Chief Medical Officer of Health (CMOH) for Haldimand County and Norfolk County, both of which lie on the shores of Lake Erie, had issued an order under the Ontario Health Protection and Promotion Act which reads:", "after": null, "start_char_pos": 1786, "end_char_pos": 2078}, {"type": "D", "before": "Norfolk County Council was told that in order to remove the CMOH would require a two-thirds vote from Council along with approval from the provincial government.", "after": null, "start_char_pos": 2079, "end_char_pos": 2240}, {"type": "R", "before": "India In general", "after": "India In India", "start_char_pos": 2270, "end_char_pos": 2286}, {"type": "R", "before": "is one who", "after": "generally", "start_char_pos": 2307, "end_char_pos": 2317}, {"type": "R", "before": "state Medical", "after": "a state medical", "start_char_pos": 2475, "end_char_pos": 2488}, {"type": "D", "before": "across the country", "after": null, "start_char_pos": 2575, "end_char_pos": 2593}, {"type": "R", "before": "Chief Medical Officer", "after": "chief medical officer", "start_char_pos": 2763, "end_char_pos": 2784}, {"type": "D", "before": "Officers", "after": null, "start_char_pos": 3309, "end_char_pos": 3317}, {"type": "D", "before": "Arthur Newsholme William Henry Duncan, Liverpool John Simon, City of London (1848\u20131855) John Bristowe, Camberwell William Rendle, St. George Southwark (1856-1859) Edwin Lankester, St. James George M'Gonigle, Stockton-on-Tees (1924\u201339) C. Killick Millard, Leicester (1901\u201335)", "after": null, "start_char_pos": 3318, "end_char_pos": 3592}, {"type": "R", "before": "Surgeon General", "after": "surgeon general", "start_char_pos": 3611, "end_char_pos": 3626}], "sents_char_pos": [0, 305, 508, 778, 1056, 1140, 1443, 1544, 1744, 1785, 2240, 2497, 2595, 2905, 3045, 3180, 3308]}
+{"doc_id": "1742287", "revision_depth": "1", "before_revision": "Risk society is the manner in which modern society organizes in response to risk. The term is closely associated with several key writers on modernity, in particular Ulrich Beck and Anthony Giddens. The term was coined in the 1980s and its popularity during the 1990s was both as a consequence of its links to trends in thinking about wider modernity, and also to its links to popular discourse, in particular the growing environmental concerns during the period. Caplan, p.7. Definition According to British sociologist Anthony Giddens, a risk society is \"a society increasingly preoccupied with the future (and also with safety), which generates the notion of risk , \" Giddens and Pierson 1998, p.209. whilst the German sociologist Ulrich Beck defines it as \"a systematic way of dealing with hazards and insecurities induced and introduced by modernisation itself\" (Beck 1992:21) . Beck (1992:50) defined modernization as, Modernity and realism in science Beck and Giddens both approach the risk society firmly from the perspective of modernity, \"a shorthand term for modern society or industrial civilization. .. modernity ] is vastly more dynamic than any previous type of social order. It is a society ... which unlike any preceding culture lives in the future rather than the past.\" (Anthony Giddens)Giddens and Pierson p.94. They also draw heavily on the concept of reflexivity, the idea that as a society examines itself, it in turn changes itself in the process. In classical industrial society, the modernist view is based on assumption of realism in science creating a system in which scientists work in an exclusive, inaccessible environment of modern period. Giddens and Beck argued that whilst humans have always been subjected to a level of risk \u2013 such as natural disasters \u2013 these have usually been perceived as produced by non-human forces. Modern societies, however, are exposed to risks such as pollution, newly discovered illnesses, crime, that are the result of the modernization process itself. Giddens defines these two types of risks as external risks and manufactured risks. Giddens, 1999. Manufactured risks are marked by a high level of human agency involved in both producing, and mitigating such risks. As manufactured risks are the product of human activity, authors like Giddens and Beck argue that it is possible for societies to assess the level of risk that is being produced, or that is about to be produced. This sort of reflexive introspection can in turn alter the planned activities themselves. As an example, due to disasters such as Chernobyl and the Love Canal Crisis, public faith in the modern project has declined leaving public distrust in industry, government and experts. Giddens, 1990. There are differing opinions as to how the concept of a risk society interacts with social hierarchies and class distinctions. Caplan, p.6. Most agree that social relations have altered with the introduction of manufactured risks and reflexive modernization. Risks, much like wealth, are distributed unevenly in a population and will influence quality of life. Beck has argued that older forms of class structure \u2013 based mainly on the accumulation of wealth \u2013 atrophy in a modern, risk society, in which people occupy social risk positions that are achieved through risk aversion. \"In some of their dimensions these follow the inequalities of class and strata positions, but they bring a fundamentally different distribution logic into play\". Beck , p.23. Beck contends that widespread risks contain a 'boomerang effect' , in that individuals producing risks will also be exposed to them. This argument suggests that wealthy individuals whose capital is largely responsible for creating pollution will also have to suffer when, for example, the contaminants seep into the water supply. This argument may seem oversimplified, as wealthy people may have the ability to mitigate risk more easily by, for example, buying bottled water. Beck, however, has argued that the distribution of this sort of risk is the result of knowledge, rather than wealth. Whilst the wealthy person may have access to resources that enable him or her to avert risk, this would not even be an option were the person unaware that the risk even existed. However, risks do not only affect those of a certain social class or place, as risk is not missed and can affect everyone regardless of societal class; no one is free from risk. By contrast, Giddens has argued that older forms of class structure maintain a somewhat stronger role in a risk society, now being partly defined \"in terms of differential access to forms of self-actualization and empowerment\". Giddens 1991, p. 6. Giddens has also tended to approach the concept of a risk society more positively than Beck, suggesting that there \"can be no question of merely taking a negative attitude towards risk. Risk needs to be disciplined, but active risk-taking is a core element of a dynamic economy and an innovative society.\" Giddens, Runaway World, 1999, p.29. Notes References Caplan, Pat 'Introduction: Risk Revisited' in Caplan, Pat (ed) 'Risk Revisited', Pluto Press: London (2000). Ericson, R.V.%DIFDELCMD < & %%% K. Haggerty. 1997. Policing the Risk Society. Toronto: University of Toronto Press. Giddens, Anthony (1990) Consequences of Modernity. Cambridge: Polity Press. Giddens, Anthony (1991) Modernity and Self-Identity. Self and Society in the Late Modern Age. Cambridge: . Giddens, Anthony and Christopher Pierson (1998) Making Sense of Modernity: Conversations with Anthony Giddens Giddens, Anthony (1998) The Third Way: The Renewal of Social Democracy. Cambridge : Polity. Giddens, Anthony (1999) \"Risk and Responsibility\" Modern Law Review 62(1): 1-10. Giddens, Anthony (1999) Runaway World: How Globalization is Reshaping Our Lives. London : Profile. Ulrich Beck (1992) Risk Society: Towards a New Modernity. New Delhi: Sage. (Translated from the German Risikogesellschaft) 1986. External links Leiss, W. Ulrich Beck, Risk Society, Towards a New Modernity. Featured Book Reviews. Canadian Journal of Sociology, Online edition. Category:Society Category: Social philosophy Category: Risk Category:Modernity", "after_revision": "Risk society is the manner in which modern society organizes in response to risk. The term is closely associated with several key writers on modernity, in particular Ulrich Beck and Anthony Giddens. The term was coined in the 1980s and its popularity during the 1990s was both as a consequence of its links to trends in thinking about wider modernity, and also to its links to popular discourse, in particular the growing environmental concerns during the period. Definition According to the British sociologist Anthony Giddens, a risk society is \"a society increasingly preoccupied with the future (and also with safety), which generates the notion of risk \" , whilst the German sociologist Ulrich Beck defines it as \"a systematic way of dealing with hazards and insecurities induced and introduced by modernisation itself\" . Beck defined modernization as, Modernity and realism in science Beck and Giddens both approach the risk society firmly from the perspective of modernity, \"a shorthand term for modern society or industrial civilization. .. . M]odernity is vastly more dynamic than any previous type of social order. It is a society ... which unlike any preceding culture lives in the future rather than the past.\" They also draw heavily on the concept of reflexivity, the idea that as a society examines itself, it in turn changes itself in the process. In classical industrial society, the modernist view is based on assumption of realism in science creating a system in which scientists work in an exclusive, inaccessible environment of modern period. Giddens and Beck argued that whilst humans have always been subjected to a level of risk \u2013 such as natural disasters \u2013 these have usually been perceived as produced by non-human forces. Modern societies, however, are exposed to risks such as pollution, newly discovered illnesses, crime, that are the result of the modernization process itself. Giddens defines these two types of risks as external risks and manufactured risks. Manufactured risks are marked by a high level of human agency involved in both producing, and mitigating such risks. As manufactured risks are the product of human activity, authors like Giddens and Beck argue that it is possible for societies to assess the level of risk that is being produced, or that is about to be produced. This sort of reflexive introspection can in turn alter the planned activities themselves. As an example, due to disasters such as Chernobyl and the Love Canal Crisis, public faith in the modern project has declined leaving public distrust in industry, government and experts. There are differing opinions as to how the concept of a risk society interacts with social hierarchies and class distinctions. Most agree that social relations have altered with the introduction of manufactured risks and reflexive modernization. Risks, much like wealth, are distributed unevenly in a population and will influence quality of life. Beck has argued that older forms of class structure \u2013 based mainly on the accumulation of wealth \u2013 atrophy in a modern, risk society, in which people occupy social risk positions that are achieved through risk aversion. \"In some of their dimensions these follow the inequalities of class and strata positions, but they bring a fundamentally different distribution logic into play\". Beck contends that widespread risks contain a \"boomerang effect\" , in that individuals producing risks will also be exposed to them. This argument suggests that wealthy individuals whose capital is largely responsible for creating pollution will also have to suffer when, for example, the contaminants seep into the water supply. This argument may seem oversimplified, as wealthy people may have the ability to mitigate risk more easily by, for example, buying bottled water. Beck, however, has argued that the distribution of this sort of risk is the result of knowledge, rather than wealth. Whilst the wealthy person may have access to resources that enable him or her to avert risk, this would not even be an option were the person unaware that the risk even existed. However, risks do not only affect those of a certain social class or place, as risk is not missed and can affect everyone regardless of societal class; no one is free from risk. By contrast, Giddens has argued that older forms of class structure maintain a somewhat stronger role in a risk society, now being partly defined \"in terms of differential access to forms of self-actualization and empowerment\". Giddens has also tended to approach the concept of a risk society more positively than Beck, suggesting that there \"can be no question of merely taking a negative attitude towards risk. Risk needs to be disciplined, but active risk-taking is a core element of a dynamic economy and an innovative society.\" %DIFDELCMD < & %%% References Footnotes Bibliography Further reading Category:Modernity Category:Risk Category: Social philosophy Category: Society", "edit_actions": [{"type": "D", "before": "Caplan, p.7.", "after": null, "start_char_pos": 464, "end_char_pos": 476}, {"type": "A", "before": null, "after": "the", "start_char_pos": 501, "end_char_pos": 501}, {"type": "D", "before": ",", "after": null, "start_char_pos": 668, "end_char_pos": 669}, {"type": "R", "before": "Giddens and Pierson 1998, p.209.", "after": ",", "start_char_pos": 672, "end_char_pos": 704}, {"type": "D", "before": "(Beck 1992:21)", "after": null, "start_char_pos": 868, "end_char_pos": 882}, {"type": "D", "before": "(1992:50)", "after": null, "start_char_pos": 890, "end_char_pos": 899}, {"type": "R", "before": "modernity", "after": ".", "start_char_pos": 1117, "end_char_pos": 1126}, {"type": "A", "before": null, "after": "M", "start_char_pos": 1127, "end_char_pos": 1127}, {"type": "A", "before": null, "after": "odernity", "start_char_pos": 1128, "end_char_pos": 1128}, {"type": "D", "before": "(Anthony Giddens)Giddens and Pierson p.94.", "after": null, "start_char_pos": 1290, "end_char_pos": 1332}, {"type": "D", "before": "Giddens, 1999.", "after": null, "start_char_pos": 2101, "end_char_pos": 2115}, {"type": "D", "before": "Giddens, 1990.", "after": null, "start_char_pos": 2721, "end_char_pos": 2735}, {"type": "D", "before": "Caplan, p.6.", "after": null, "start_char_pos": 2863, "end_char_pos": 2875}, {"type": "D", "before": ", p.23. Beck", "after": null, "start_char_pos": 3484, "end_char_pos": 3496}, {"type": "R", "before": "'boomerang effect'", "after": "\"boomerang effect\"", "start_char_pos": 3538, "end_char_pos": 3556}, {"type": "D", "before": "1991, p. 6. Giddens", "after": null, "start_char_pos": 4677, "end_char_pos": 4696}, {"type": "D", "before": "Giddens, Runaway World, 1999, p.29.", "after": null, "start_char_pos": 4995, "end_char_pos": 5030}, {"type": "D", "before": "Notes", "after": null, "start_char_pos": 5031, "end_char_pos": 5036}, {"type": "D", "before": "References Caplan, Pat 'Introduction: Risk Revisited' in Caplan, Pat (ed) 'Risk Revisited', Pluto Press: London (2000). Ericson, R.V.", "after": null, "start_char_pos": 5037, "end_char_pos": 5170}, {"type": "R", "before": "K. Haggerty. 1997. Policing the Risk Society. Toronto: University of Toronto Press. Giddens, Anthony (1990) Consequences of Modernity. Cambridge: Polity Press. Giddens, Anthony (1991) Modernity and Self-Identity. Self and Society in the Late Modern Age. Cambridge: . Giddens, Anthony and Christopher Pierson (1998) Making Sense of Modernity: Conversations with Anthony Giddens Giddens, Anthony (1998) The Third Way: The Renewal of Social Democracy. Cambridge : Polity. Giddens, Anthony (1999) \"Risk and Responsibility\" Modern Law Review 62(1): 1-10. Giddens, Anthony (1999) Runaway World: How Globalization is Reshaping Our Lives. London : Profile. Ulrich Beck (1992) Risk Society: Towards a New Modernity. New Delhi: Sage. (Translated from the German Risikogesellschaft) 1986.", "after": "References Footnotes", "start_char_pos": 5189, "end_char_pos": 5966}, {"type": "R", "before": "External links Leiss, W. Ulrich Beck, Risk Society, Towards a New Modernity. Featured Book Reviews. Canadian Journal of Sociology, Online edition.", "after": "Bibliography", "start_char_pos": 5967, "end_char_pos": 6113}, {"type": "R", "before": "Category:Society Category:", "after": "Further reading", "start_char_pos": 6114, "end_char_pos": 6140}, {"type": "A", "before": null, "after": "Category:Modernity Category:Risk Category:", "start_char_pos": 6141, "end_char_pos": 6141}, {"type": "R", "before": "Risk Category:Modernity", "after": "Society", "start_char_pos": 6170, "end_char_pos": 6193}], "sents_char_pos": [0, 81, 198, 463, 879, 1191, 1332, 1472, 1672, 1858, 2017, 2100, 2115, 2232, 2444, 2534, 2720, 2735, 2862, 2994, 3096, 3316, 3478, 3491, 3624, 3821, 3967, 4084, 4262, 4414, 4440, 4668, 4874, 4994, 5030, 5156, 5201, 5234, 5272, 5323, 5348, 5401, 5442, 5637, 5657, 5738, 5819, 5837, 5895, 5966, 6043, 6066, 6113]}
+{"doc_id": "1805371", "revision_depth": "3", "before_revision": "The National Day of Prayer is an annual day of observance of public prayer held on the first Thursday of May, designated by the United States Congress, when people are asked \"to turn to God in prayer and meditation\". The president is required by law () to sign a proclamation each year, encouraging all Americans to pray on this day. History Colonial Public Prayer Days The National Day of Prayer shares common roots with the celebration of Thanksgiving; both were national proclamations establishing a day of public prayer. In the New England Colonies under British rule, traditional observances in late fall called for prayer and thanksgiving, while observances in the spring or summer called for prayer and fasting. The fall observance was established by President Abraham Lincoln as the official Thanksgiving holiday in 1863. The spring observance was established by President Harry S. Truman in 1952 as the National Day of Prayer. American Revoluntary War Public PrayerDays Friction in 1768\u20131776 between the American colonists and England spurred some American cities and colonies to proclaim days of prayer. For instance, Boston declared a day of fasting and prayer in September 1768, as a protest against a British plan to station troops in the city. The Colony of Virginia's House of Burgesses established a day of fasting and prayer to take place on Wednesday, June 1, 1774, to protest the Boston Port Act, such that the people of Virginia would assemble for prayer led by clergymen. Thomas Jefferson wrote that \"the effect of the day through the whole colony was like a shock of electricity\", moving the Virginians to choose delegates to establish self-rule. Jefferson is quoted by Derek H. Davis in Religion and the Continental Congress, 1774\u20131789, page 84. The Provinces of South Carolina, Maryland and Georgia all observed official days of fasting and prayer during 1774\u20131775. The observance of a day of fasting and public prayer was brought to all of the colonists by the Continental Congress in 1775. Congress issued a proclamation recommending \"a day of publick humiliation, fasting, and prayer\" be observed by the \"English Colonies\" on Thursday, July 20, 1775, \"and to bless our rightful sovereign, King George the Third...\" \"Proclamation for a day of Fasting and Prayer\" The text, written by John Witherspoon and John Hancock, instructed the colonists to pray for a resumption of \"the just rights and privileges of the Colonies\" in \"civil and religious\" matters.Davis 2000, p. 85. A proclamation to this end was sent to every town in the colonies. John Adams wrote that the popular response was gratifying, that the special day was more widely observed than the practice of going to church on Sunday.Davis 2000, p. 86. After this success, Congress determined to call for a day of fasting and prayer each spring, and a day of thanksgiving and praise each fall. After James Madison, none of the next eleven presidents issued public prayer proclamations. Thus, there was a period of 47 years, from 1815 to 1862, with no presidential public prayer proclamations. Confederate States of America Confederate States of America President Jefferson Davis called for the first national day of fasting and public prayer for the Confederate States of America on June 13, URL \"A Day of Fasting and Prayer, June 13, 1861 at St. George\u2019s\" The June 7, 1862, edition of Harper's Weekly featured a political cartoon depicting Davis praying in public on a street corner in Richmond, standing next to a poster declaring \"A Day of Fasting%DIFDELCMD < [%%% and Prayer.\" with Davis clutching prayer beads, 'though he has Satan-like horns on his head\" and hooves for URL \"Scene in Richmond, VA.\"%DIFDELCMD < %DIFDELCMD < %%% Confederate States of America President Jefferson Davis issued a proclamation on February 27, 1863 and published within the March 4, 1863 edition of The Richmond Enquirer, \"setting apart Friday, the 27th day of March, as a day of fasting, humiliation and public%DIFDELCMD < ] %%% prayer\" and inviting \"the people of the said States Confederate States of America%DIFDELCMD < ] %%% to repair, on that day, to their usual places of public worship, there to join in prayer to Almighty God that he will continue his merciful protection over our cause; that he will scatter our enemies and set at nought their evil designs, and that he will graciously restore to our beloved country the blessings of peace and URL \"Which day did Jefferson Davis declare to be for fasting, humiliation, and prayer?\" Throughout the American Civil War, Confederate President Jefferson Davis officially declared a total of ten such days of fasting and days of public URL \"A Day of Fasting and Prayer, June 13, 1861 at St. George\u2019s\" Billy Graham Residents of Kentwood, Louisiana, gather outside in public prayer at the Town Hall alongside LA 38 to observe the 2015 National Day of Prayer.in January\u2013February 1952 during the Korean War, the desirability of a united national prayer was stated by Reverend Billy Graham, who said, \"What a thrilling, glorious thing it would be to see the leaders of our country today kneeling before Almighty God in prayer. What a thrill would sweep this country. What renewed hope and courage would grip the Americans at this hour of peril.\" Representative Percy Priest from Tennessee observed that Graham had issued a challenge for a national day of prayer. Members of the House and Senate introduced a joint resolution for an annual National Day of Prayer, \"on which the people of the United States may turn to God in prayer and meditation at churches, in groups, and as individuals.\" On April 17, 1952, President Harry S. Truman signed a bill proclaiming a National Day of Prayer must be declared by each subsequent president at an appropriate date of his choice. Evangelical National Prayer Committee In 1982 a conservative evangelical Christian organization called the \"National Prayer Committee\" was formed to coordinate and implement a fixed annual day of public prayer for the purpose of organizing evangelical Christian prayer events with local, state, and federal government entities. The Thanks-Giving Foundation also collaborated in this effort. In his 1983 declaration, Ronald Reagan said, \"From General Washington's struggle at Valley Forge to the present, this Nation has fervently sought and received divine guidance as it pursued the course of history. This occasion provides our Nation with an opportunity to further recognize the source of our blessings, and to seek His help for the challenges we face today and in the future.\" 175px|Sailors bow their heads in prayer during the National Day of Prayer. May 3, 2007. In 1988, the law was amended so that the National Day of Prayer would be held on the first Thursday of May. Two stated intentions of the National Day of Prayer were that it would be a day when adherents of all great religions could unite in public prayer and that it may one day bring renewed respect for God to all the peoples of the world. Republican George W. Bush administration (2001\u20132009) made his first presidential act be the announcement of a National Day of Prayer, and he held public prayer events at the White House in each year of his presidency. Democrat Barack Obama (2009\u20132017) did not hold any public prayer events at the White House,National Day of Prayer Task Force Knocks Obama White House, U.S. News & World Report, April 15, 2010, Dan Gilgof though he issued presidential proclamations regularly each year. On May 7, 2020, due to the COVID-19 pandemic, many virtual prayer events were planned. President Trump issued an official proclamation. A national event was planned for the evening, to be co-hosted by the grandson of the late evangelist Billy Graham.", "after_revision": "The National Day of Prayer is an annual day of observance held on the first Thursday of May, designated by the United States Congress, when people are asked \"to turn to God in prayer and meditation\". The president is required by law () to sign a proclamation each year, encouraging all Americans to pray on this day. History The National Day of Prayer shares common roots with the celebration of Thanksgiving; both were national proclamations establishing a day of prayer. In the New England Colonies under British rule, traditional observances in late fall called for prayer and thanksgiving, while observances in the spring or summer called for prayer and fasting. The fall observance was established by President Abraham Lincoln as the official Thanksgiving holiday in 1863. The spring observance was established by President Harry S. Truman in 1952 as the National Day of Prayer. Residents of Kentwood, Louisiana, gather outside the Town Hall alongside LA 38 to observe 2015's National Day of Prayer. Friction in 1768\u20131776 between the American colonists and England spurred some American cities and colonies to proclaim days of prayer. For instance, Boston declared a day of fasting and prayer in September 1768, as a protest against a British plan to station troops in the city. The Colony of Virginia's House of Burgesses established a day of fasting and prayer to take place on Wednesday, June 1, 1774, to protest the Boston Port Act, such that the people of Virginia would assemble for prayer led by clergymen. Thomas Jefferson wrote that \"the effect of the day through the whole colony was like a shock of electricity\", moving the Virginians to choose delegates to establish self-rule. Jefferson is quoted by Derek H. Davis in Religion and the Continental Congress, 1774\u20131789, page 84. The Provinces of South Carolina, Maryland and Georgia all observed official days of fasting and prayer during 1774\u20131775. The observance of a day of fasting and prayer was brought to all of the colonists by the Continental Congress in 1775. Congress issued a proclamation recommending \"a day of publick humiliation, fasting, and prayer\" be observed by the \"English Colonies\" on Thursday, July 20, 1775, \"and to bless our rightful sovereign, King George the Third...\" \"Proclamation for a day of Fasting and Prayer\" The text, written by John Witherspoon and John Hancock, instructed the colonists to pray for a resumption of \"the just rights and privileges of the Colonies\" in \"civil and religious\" matters.Davis 2000, p. 85. A proclamation to this end was sent to every town in the colonies. John Adams wrote that the popular response was gratifying, that the special day was more widely observed than the practice of going to church on Sunday.Davis 2000, p. 86. After this success, Congress determined to call for a day of fasting and prayer each spring, and a day of thanksgiving and praise each fall. After James Madison, none of the next eleven presidents issued prayer proclamations. Thus, there was a period of 47 years, from 1815 to 1862, with no presidential prayer proclamations. %DIFDELCMD < [%%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < ] %%% %DIFDELCMD < ] %%% In January\u2013February 1952 during the Korean War, the desirability of a united national prayer was stated by Reverend Billy Graham, who said, \"What a thrilling, glorious thing it would be to see the leaders of our country today kneeling before Almighty God in prayer. What a thrill would sweep this country. What renewed hope and courage would grip the Americans at this hour of peril.\" Representative Percy Priest from Tennessee observed that Graham had issued a challenge for a national day of prayer. Members of the House and Senate introduced a joint resolution for an annual National Day of Prayer, \"on which the people of the United States may turn to God in prayer and meditation at churches, in groups, and as individuals.\" On April 17, 1952, President Harry S. Truman signed a bill proclaiming a National Day of Prayer must be declared by each subsequent president at an appropriate date of his choice. In 1982 a conservative evangelical Christian organization called the \"National Prayer Committee\" was formed to coordinate and implement a fixed annual day of prayer for the purpose of organizing evangelical Christian prayer events with local, state, and federal government entities. The Thanks-Giving Foundation also collaborated in this effort. In his 1983 declaration, Ronald Reagan said, \"From General Washington's struggle at Valley Forge to the present, this Nation has fervently sought and received divine guidance as it pursued the course of history. This occasion provides our Nation with an opportunity to further recognize the source of our blessings, and to seek His help for the challenges we face today and in the future.\" 175px|Sailors bow their heads in prayer during the National Day of Prayer. May 3, 2007. In 1988, the law was amended so that the National Day of Prayer would be held on the first Thursday of May. Two stated intentions of the National Day of Prayer were that it would be a day when adherents of all great religions could unite in prayer and that it may one day bring renewed respect for God to all the peoples of the world. Republican George W. Bush administration (2001\u20132009) made his first presidential act be the announcement of a National Day of Prayer, and he held events at the White House in each year of his presidency. Democrat Barack Obama (2009\u20132017) did not hold any public events at the White House,National Day of Prayer Task Force Knocks Obama White House, U.S. News & World Report, April 15, 2010, Dan Gilgof though he issued presidential proclamations regularly each year. On May 7, 2020, due to the COVID-19 pandemic, many virtual prayer events were planned. President Trump issued an official proclamation. A national event was planned for the evening, to be co-hosted by the grandson of evangelist Billy Graham.", "edit_actions": [{"type": "D", "before": "of public prayer", "after": null, "start_char_pos": 58, "end_char_pos": 74}, {"type": "D", "before": "Colonial Public Prayer Days", "after": null, "start_char_pos": 342, "end_char_pos": 369}, {"type": "D", "before": "public", "after": null, "start_char_pos": 510, "end_char_pos": 516}, {"type": "R", "before": "American Revoluntary War Public PrayerDays", "after": "Residents of Kentwood, Louisiana, gather outside the Town Hall alongside LA 38 to observe 2015's National Day of Prayer.", "start_char_pos": 936, "end_char_pos": 978}, {"type": "D", "before": "public", "after": null, "start_char_pos": 1929, "end_char_pos": 1935}, {"type": "D", "before": "public", "after": null, "start_char_pos": 2941, "end_char_pos": 2947}, {"type": "D", "before": "public", "after": null, "start_char_pos": 3048, "end_char_pos": 3054}, {"type": "D", "before": "Confederate States of America", "after": null, "start_char_pos": 3077, "end_char_pos": 3106}, {"type": "D", "before": "Confederate States of America President Jefferson Davis called for the first national day of fasting and public prayer for the Confederate States of America on June 13, URL \"A Day of Fasting and Prayer, June 13, 1861 at St. George\u2019s\" The June 7, 1862, edition of Harper's Weekly featured a political cartoon depicting Davis praying in public on a street corner in Richmond, standing next to a poster declaring \"A Day of Fasting", "after": null, "start_char_pos": 3107, "end_char_pos": 3534}, {"type": "D", "before": "and", "after": null, "start_char_pos": 3552, "end_char_pos": 3555}, {"type": "D", "before": "Prayer.\" with Davis clutching prayer beads, 'though he has Satan-like horns on his head\" and hooves for URL \"Scene in Richmond, VA.\"", "after": null, "start_char_pos": 3556, "end_char_pos": 3688}, {"type": "D", "before": "Confederate States of America President Jefferson Davis issued a proclamation on February 27, 1863 and published within the March 4, 1863 edition of The Richmond Enquirer, \"setting apart Friday, the 27th day of March, as a day of fasting, humiliation and", "after": null, "start_char_pos": 3718, "end_char_pos": 3972}, {"type": "D", "before": "public", "after": null, "start_char_pos": 3973, "end_char_pos": 3979}, {"type": "D", "before": "prayer\" and inviting \"the people of the said States", "after": null, "start_char_pos": 3998, "end_char_pos": 4049}, {"type": "D", "before": "Confederate States of America", "after": null, "start_char_pos": 4050, "end_char_pos": 4079}, {"type": "D", "before": "to repair, on that day, to their usual places of public worship, there to join in prayer to Almighty God that he will continue his merciful protection over our cause; that he will scatter our enemies and set at nought their evil designs, and that he will graciously restore to our beloved country the blessings of peace and URL \"Which day did Jefferson Davis declare to be for fasting, humiliation, and prayer?\" Throughout the American Civil War, Confederate President Jefferson Davis officially declared a total of ten such days of fasting and days of public URL \"A Day of Fasting and Prayer, June 13, 1861 at St. George\u2019s\"", "after": null, "start_char_pos": 4098, "end_char_pos": 4722}, {"type": "R", "before": "Billy Graham Residents of Kentwood, Louisiana, gather outside in public prayer at the Town Hall alongside LA 38 to observe the 2015 National Day of Prayer.in", "after": "In", "start_char_pos": 4723, "end_char_pos": 4880}, {"type": "D", "before": "Evangelical National Prayer Committee", "after": null, "start_char_pos": 5788, "end_char_pos": 5825}, {"type": "D", "before": "public", "after": null, "start_char_pos": 5984, "end_char_pos": 5990}, {"type": "D", "before": "public", "after": null, "start_char_pos": 6898, "end_char_pos": 6904}, {"type": "D", "before": "public prayer", "after": null, "start_char_pos": 7145, "end_char_pos": 7158}, {"type": "D", "before": "prayer", "after": null, "start_char_pos": 7275, "end_char_pos": 7281}, {"type": "D", "before": "the late", "after": null, "start_char_pos": 7703, "end_char_pos": 7711}], "sents_char_pos": [0, 216, 333, 454, 524, 718, 829, 935, 1113, 1257, 1492, 1668, 1768, 1889, 2015, 2480, 2565, 2718, 2877, 2969, 3076, 3330, 3564, 3688, 4005, 4264, 4509, 4712, 5143, 5183, 5262, 5379, 5607, 5787, 6115, 6178, 6390, 6643, 6656, 6764, 6998, 7216, 7485, 7572, 7621]}
+{"doc_id": "18248534", "revision_depth": "1", "before_revision": "Proactive cyber defence means acting in anticipation to oppose an attack through cyber and cognitive domains. It represents the thermocline between purely offensive and defensive action; interdicting, disrupting or deterring an attack or a threat's preparation to attack, either pre-emptively or in self-defence. Common methods include cyber deception, attribution, threat hunting and adversarial pursuit. The mission of the pre-emptive proactive operations is to conduct aggressive interdiction and disruption activities against an adversary using: Psychological operations, Managed Information Dissemination, Precision Targeting, Information Warfare Operations and computer network exploitation and other active threat reduction measures. The proactive defense strategy is meant to improves information collection by stimulating reactions of the threat agents , provide strike options and to enhance operational preparation of the real or virtual battlespace. A measure for detecting or obtaining information as to a cyber attack, or impending cyber operation or for determining the origin of an operation that involves launching a pre-emptive, preventive, or cyber counter-operation against the source. Proactive cyber defence operations pre-emptively engage the adversary The offensive capacity includes the manipulation or disruption of networks and systems with the purpose of limiting or eliminating the adversary's operational capability. This capability can be required to guarantee one's freedom of action in the cyber domain. Cyber-attacks can be launched to repel an attack (active defence) or to support the operational action. Proactive cyber defence differs from active defence in that it is pre-emptive (not waiting for an attack to occur). The distinction between active cyber defence and offensive cyber operations (OCO) is that the later requires legislative exceptions or executive prerogative to undertake. Hence, offensive cyber capabilities may be developed in collaboration with industry , or facilitated by private sector but operations are often led by nation states. There are some exceptions, notably in self-defence or with judicial authority (civil warrants) or assisting law enforcement. CyberISR (intelligence surveillance and reconnaissance) focuses a powerful lens onto the Internet-of-Everything. The capability provides strategic listening, enhanced situational understanding, precision and mission-confidence though a keen awareness of both adversary dynamics and one's attack surface, thus facilitating anticipatory threat reduction, accelerated evidence-based decision support, contextualization, targeting, the ability to mount an defence against. Cyber threat hunting is the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.%DIFDELCMD < %DIFDELCMD < %%% Offensive, proactive cyber activities and active cyber defence facilitate anticipatory threat reduction while informing protection, detection and incident response given its ability to engage the adversary at distance and time. An active defence: Has greater efficacy than reactive systems. Drastically reduces the volume and severity of attacks leading to an order-of-magnitude fewer alerts, incidents, and costs. Thus, passing these savings to cybersecurity. Provides early warning and indicators to model zero-day signatures to incident response mechanisms and enumerate attack networks through cyber threat intelligence. In not subject to scalability issues around performance and cost like reactive systems. Uniquely has the capability to shape contested space. Cyber defense Strategically, cyber defence refers to operations that are conducted in the cyber domain in support of mission objectives. To help understand the practical difference between cyber security and cyber defence , is to recognize that cyber defence requires a shift from network assurance (security) to mission assurance where cyber defence is fully integrated into operational planning across the Joint Functions . Cyber defence focuses on sensing, detecting, orienting, and engaging adversaries in order to assure mission success and to out-manoeuver that adversary. This shift from security to defence requires a strong emphasis on intelligence, and reconnaissance, and the integration of staff activities to include intelligence, operations, communications, and planning. Defensive cyber operations refer to activities on or through the global information infrastructure to help protect and institutions' electronic information and information infrastructures as a matter of mission assurance. Does not normally involve direct engagement with the adversary. The distinction between cyber defence, active cyber defence, proactive cyber defence and offensive cyber operations has been influenced by doctrine, pragmatics of technology or tradecraft and legal thresholds. Active cyber operations refers to activities on or through the global information infrastructure to degrade, disrupt, influence, respond to or interfere with the capabilities, intentions or activities of a foreign individual, state, organization or terrorist group as they relate to international affairs, defence or security . Active cyber defence decisively engages the adversary and includes hunt and adversarial pursuit activities. History In the fifth century, B.C., Sun Tzu advocated foreknowledge (predictive analysis) as part of a winning strategy. He warned that planners must have a precise understanding of the active threat and not \"remain ignorant of the enemy's condition\". The thread of proactive defense is spun throughout his teachings. %DIFDELCMD < %DIFDELCMD < %%% Psychiatrist Viktor Frankl was likely the first to use of the term proactive in his 1946 book Man's Search for Meaning to distinguish the act of taking responsibility for one's own circumstances rather than attributing one's condition to external factors. Later in 1982, the United States Department of Defense (DoD) used \"proactive\" as a contrary concept to \"reactive\" in assessing risk. In the framework of risk management \"proactive\" meant taking initiative by acting rather than reacting to threat events. Conversely \"reactive\" measures respond to a stimulus or past events rather than predicting the event. Military science then and now considers defense as the science-art of thwarting an attack. Furthermore, doctrine poses that if a party attacks an enemy who is about to attack this could be called active-defense. Defense is also a euphemism for war but does not carry the negative connotation of an offensive war. Usage in this way has broadened the term to include most military issues including offensive, which is implicitly referred to as active-defense . Politically, the concept of national self-defense to counter a war of aggression refers to a defensive war involving pre-emptive offensive strikes and is one possible criterion in the 'Just War Theory'. Proactive defense has moved beyond theory . It has been put into practice in theatres of operation. %DIFDELCMD < %DIFDELCMD < %%% In 1989 Stephen Covey's The Seven Habits of Highly Effective People, published by Free Press, transformed the meaning \"to act before a situation becomes a source of confrontation or crisis\". Since then, \"proactive\" has been placed in opposition to the words \"reactive\" or \"passive\". Origins Cyber is derived from \"cybernetics\", a word originally coined by a group of scientists led by Norbert Wiener and made popular by Wiener's book of 1948, Cybernetics or Control and Communication in the Animal and the Machine. Cyberspace typically refers to the vast and growing logical domain composed of public and private networks; independently managed networks linked together through the lingua franca of the Internet, the Internet Protocol (IP) . The definition of Cyberspace has been extended to include all network-space which at some point, through some path, may have eventual access to the public internet. Under this definition, cyberspace becomes virtually every networked device in the world, which is not devoid of a network interface entirely. There is no air-gap anymore between networks. The origins of cyber defense undoubtedly evolved from the original purpose of the Internet which was to harden military networks against the threat of a nuclear strike. Later cyber defense was coveted by the tenets of information warfare and information operations.%DIFDELCMD < %DIFDELCMD < %%% The rapid evolution of information warfare operations doctrine in the 1990s embraced a proactive preemptive cyber defense strategy . The National Strategy to Secure Cyberspace was published in February 2003 to outline an initial framework for both organizing and prioritizing efforts to secure the cyberspace. It highlighted the necessity for public-private partnerships. Proactive threads include the call to deter malicious activity and prevent cyber attacks against America's critical infrastructures. The notion of \"proactive defense \" has a rich history. The hype of \"proactive cyber defence\" reached its zenith around 1994. This period was marked by intense \"hype\" discussions under the auspices of Information Warfare. Much of the current doctrine related to proactive cyber defense was fully developed by 1995. A number of programs were initiated then, and advanced to full operation by 2005 including those of hostile states. Meanwhile, the public discussions diminished until the most recent resurgence in proactive cyber defense 2004\u20132008. Now most of the discussions around proactive defence in the literature are much less \"proactive\" than the earlier discussions in 1994 or existing operational programs. 'Proactive' is often used to hype marketing of security products or programs, in much the same way that \"extreme\" or \"quality\" adjectives have been misused. The hype-cycle of discussion reached its peak in 1994. Present-day proactive cyber defense strategy was conceived within the context of the rich discussion that preceded it, existing doctrine and real proactive cyber defense programs that have evolved globally over the past decade. Dr. Robert John Garigue, a computational epistemologist and father of information warfare in Canada, published Information Warfare, Developing a Conceptual Framework. This was a landmark document in 1994 and genesis for proactive cyber defensive theory in Canada. Founding members of the interdepartmental committee on Information Warfare (Canada 1994) , Dr. Robert Garigue and Dave McMahon wrote: Strategic listening, core intelligence and a proactive defence provide time and precision. Conversely, reacting in surprise is ineffective, costly and leaves few options. Strategic deterrence needs a credible offensive, proactive defence and information peacekeeping capability in which to project power and influence globally through Cyberspace in the defence of the nation. Similarly, Deterrence and diplomacy are required in the right dosage to dissuade purposeful interference with the national critical cyber infrastructures in influence in the democratic process by foreign states. Intelligence agencies such as the NSA were criticized for buying up and stockpiling zero-day vulnerabilities , keeping them secret and developing mainly offensive capabilities instead of defensive measures and helping patch vulnerabilities. %DIFDELCMD < %DIFDELCMD < %%% This criticism was widely reiterated and recognized after the May 2017 WannaCry ransomware attack. Proactive pre-emptive operations %DIFDELCMD < %DIFDELCMD < %%% The notion of a proactive pre-emptive operations group (P2OG) emerged from a report of the Defense Science Board (DSB) , 2002 briefing. The briefing was reported by Dan Dupont in Inside the Pentagon on September 26, 2002, and was also discussed by William M. Arkin in the Los Angeles Times on October 27, 2002. The Los Angeles Times has subsequently quoted U.S. Secretary of Defense Donald Rumsfeld revealing the creation of the \"Proactive, Pre-emptive Operations Group\". The mission of the P2OG is reportedly to conduct Aggressive, Proactive, Pre-emptive Operations to interdiction and disruption the threat using: Psychological operations, Managed Information Dissemination, Precision Targeting, Information Warfare Operations, and SIGINT. The proactive defense strategy is meant to improves information collection by stimulating reactions of the threat agents, provide strike options and to enhance operational preparation of the real or virtual battle space. The P2OG has been recommended to be constituted of \"one hundred ' highly specialized people with unique technical and intelligence skills such as information operations, PSYOPS, network attack, covert activities, SIGINT, HUMINT, SOF, influence warfare/deception operations and to report to the National Security Council with an annual budget of $100 million\" . The group would be overseen by the White House's deputy national security adviser and would carry out missions coordinated by the secretary of defense or the CIA director. \"The proposal is the latest sign of a new assertiveness by the Defense Department in intelligence matters, and an indication that the cutting edge of intelligence reform is not to be found in Congress but behind closed doors in the Pentagon\". DoD doctrinally would initiate a 'pre-emptive' attack on the basis of evidence that an enemy attack is imminent. Proactive measures, according to DoD are those actions taken directly against the preventive stage of an attack by the enemy. Other topics (Relevance to the International Relations) World Politics and Pre-emptive Cyber Defense topics are the two important concepts that need to be examined because we are living in a dynamic international system in which actors (countries) update their threat perceptions according to the developments in the technological realm. Given this logic employed frequently by the policymakers, countries prefer using pre-emptive measures before being targeted. This topic is extensively studied by the political scientists focusing on the power transition theory (PTT), where Organski and Kugler first discussed that powerful countries start the attack before balance of power changes in favor of the relatively weak but rising state. Although the PTT has relevance to explain the use of pre-emptive cyber defense policies, this theory can still be difficult to apply when it comes to cyber defense entirely because it is not easy to understand the relative power differentials of the international actors in terms of their cyber capabilities. On the other hand, we can use PTT to explain the security perceptions of the United States and China, as a rising country, in terms of their use of pre-emptive cyber defense policies. Many scholars have already begun to examine the likelihood of cyberwar between these countries and examined the relevance of PTT and other similar international relations theories.", "after_revision": "Proactive cyber defence means acting in anticipation to oppose an attack through cyber and cognitive domains. Proactive cyber defence can be understood as options between offensive and defensive measures. It includes interdicting, disrupting or deterring an attack or a threat's preparation to attack, either pre-emptively or in self-defence. Common methods include cyber deception, attribution, threat hunting and adversarial pursuit. The mission of the pre-emptive and proactive operations is to conduct aggressive interception and disruption activities against an adversary using: psychological operations, managed information dissemination, precision targeting, information warfare operations, computer network exploitation , and other active threat reduction measures. The proactive defense strategy is meant to improve information collection by stimulating reactions of the threat agents and to provide strike options as well as to enhance operational preparation of the real or virtual battlespace. Proactive cyber defence can be a measure for detecting and obtaining information before a cyber attack, or it can also be impending cyber operation and be determining the origin of an operation that involves launching a pre-emptive, preventive, or cyber counter-operation . The offensive capacity includes the manipulation and/ or disruption of networks and systems with the purpose of limiting or eliminating the adversary's operational capability. This capability can be required to guarantee one's freedom of action in the cyber domain. Cyber-attacks can be launched to repel an attack (active defence) or to support the operational action. Proactive cyber defence differs from active defence , meaning that it is pre-emptive (not waiting for an attack to occur). The distinction between active cyber defence and offensive cyber operations (OCO) is that the later requires legislative exceptions to undertake. Hence, offensive cyber capabilities may be developed in collaboration with industry and facilitated by private sector . But, these operations are often led by nation-states. %DIFDELCMD < %DIFDELCMD < %%% Cyber defense Strategically, cyber defence refers to operations that are conducted in the cyber domain in support of mission objectives. The main difference between cyber security and cyber defence is that that cyber defence requires a shift from network assurance (security) to mission assurance . Cyber defence focuses on sensing, detecting, orienting, and engaging adversaries in order to assure mission success and to outmanoeuver the adversary. This shift from security to defence requires a strong emphasis on intelligence, and reconnaissance, and the integration of staff activities to include intelligence, operations, communications, and planning. Defensive cyber operations refer to activities on or through the global information infrastructure to help protect and institutions' electronic information and information infrastructures as a matter of mission assurance. Defensive cyber does not normally involve direct engagement with the adversary. Active cyber operations refers to activities on the global information infrastructure to degrade, disrupt, influence, respond , and interfere with the capabilities, intentions , and activities of a foreign individual, state, organization , and terrorist groups . Active cyber defence decisively engages the adversary and includes adversarial pursuit activities. History of the term proactive In the fifth century, B.C., Sun Tzu advocated foreknowledge (predictive analysis) as part of a winning strategy. He warned that planners must have a precise understanding of the active threat and not \"remain ignorant of the enemy's condition\". The thread of proactive defense is spun throughout his teachings. %DIFDELCMD < %DIFDELCMD < %%% Psychiatrist Viktor Frankl was likely the first to use of the term proactive in his 1946 book Man's Search for Meaning to distinguish the act of taking responsibility for one's own circumstances rather than attributing one's condition to external factors. Later in 1982, the United States Department of Defense (DoD) used \"proactive\" as a contrary concept to \"reactive\" in assessing risk. In the framework of risk management \"proactive\" meant taking initiative by acting rather than reacting to threat events. Conversely \"reactive\" measures respond to a stimulus or past events rather than predicting the event. Military science considers defence as the science-art of thwarting an attack. Furthermore, doctrine poses that if a party attacks an enemy who is about to attack this could be called active-defence. Defence is also a euphemism for war but does not carry the negative connotation of an offensive war. Usage in this way has broadened the concept of proactive defence to include most military issues including offensive, which is implicitly referred to as active-defence . Politically, the concept of national self-defence to counter a war of aggression refers to a defensive war involving pre-emptive offensive strikes and is one possible criterion in the 'Just War Theory'. Proactive defence has moved beyond theory , and it has been put into practice in theatres of operation. %DIFDELCMD < %DIFDELCMD < %%% In 1989 Stephen Covey's study transformed the meaning of proactive as \"to act before a situation becomes a source of confrontation or crisis\". Since then, \"proactive\" has been placed in opposition to the words \"reactive\" or \"passive\". Origins Cyber is derived from \"cybernetics\", a word originally coined by a group of scientists led by Norbert Wiener and made popular by Wiener's book of 1948, Cybernetics or Control and Communication in the Animal and the Machine. Cyberspace typically refers to the vast and growing logical domain composed of public and private networks; it means independently managed networks linked together the Internet . The definition of Cyberspace has been extended to include all network-space which at some point, through some path, may have eventual access to the public internet. Under this definition, cyberspace becomes virtually every networked device in the world, which is not devoid of a network interface entirely. %DIFDELCMD < %DIFDELCMD < %%% With the the rapid evolution of information warfare operations doctrine in the 1990s , we have begun to see the use of proactive and preemptive cyber defence concepts used by the policymakers and scholars . The National Strategy to Secure Cyberspace , a book written by George W. Bush, was published in February 2003 outlining theinitial framework for both organizing and prioritizing efforts to secure the cyberspace. It highlighted the necessity for public-private partnerships. In this book, proactive threads include the call to deter malicious activity and prevent cyber attacks against America's critical infrastructures. The notion of \"proactive defence \" has a rich history. The hype of \"proactive cyber defence\" reached its zenith around 1994, under the auspices of Information Warfare. Much of the current doctrine related to proactive cyber defence was fully developed by 1995. Now most of the discussions around proactive defence in the literature are much less \"proactive\" than the earlier discussions in 1994. Present-day proactive cyber defence strategy was conceived within the context of the rich discussion that preceded it, existing doctrine and real proactive cyber defence programs that have evolved globally over the past decade. As being one of the founding members of the Canada's interdepartmental committee on Information Warfare , Dr. Robert Garigue and Dave McMahon pointed out that \"strategic listening, core intelligence , and proactive defence provide time and precision. Conversely, reacting in surprise is ineffective, costly and leaves few options. Strategic deterrence needs a credible offensive, proactive defence and information peacekeeping capability in which to project power and influence globally through Cyberspace in the defence of the nation. Similarly, deterrence and diplomacy are required in the right dosage to dissuade purposeful interference with the national critical cyber infrastructures in influence in the democratic process by foreign states. Intelligence agencies , such as the National Security Agency, were criticized for buying up and stockpiling zero-day vulnerabilities and keeping them secret and developing mainly offensive capabilities instead of defensive measures and , thereby, helping patch vulnerabilities. %DIFDELCMD < %DIFDELCMD < %%% This criticism was widely reiterated and recognized after the May 2017 WannaCry ransomware attack. Proactive pre-emptive operations %DIFDELCMD < %DIFDELCMD < %%% The notion of a proactive pre-emptive operations group (P2OG) emerged from a report of the Defense Science Board 's (DSB) 2002 briefing. The briefing was reported by Dan Dupont in Inside the Pentagon on September 26, 2002, and was also discussed by William M. Arkin in the Los Angeles Times on October 27, 2002. The Los Angeles Times has subsequently quoted U.S. Secretary of Defense Donald Rumsfeld revealing the creation of the \"Proactive, Pre-emptive Operations Group\". The mission was to conduct Aggressive, Proactive, Pre-emptive Operations to interdiction and disruption the threat using: psychological operations, managed information dissemination, precision targeting, and information warfare operations. Today, the proactive defence strategy means improving information collection by stimulating reactions of the threat agents, provide strike options to enhance operational preparation of the real as well as virtual battle space. The P2OG has been recommended to be constituted of one hundred highly specialized people with unique technical and intelligence skills . The group would be overseen by the White House's deputy national security adviser and would carry out missions coordinated by the secretary of defence. Proactive measures, according to DoD are those actions taken directly against the preventive stage of an attack by the enemy. Other topics (Relevance to the International Relations) World politics and pre-emptive cyber defence topics are the two important concepts that need to be examined because we are living in a dynamic international system in which actors (countries) update their threat perceptions according to the developments in the technological realm. Given this logic employed frequently by the policymakers, countries prefer using pre-emptive measures before being targeted. This topic is extensively studied by the political scientists focusing on the power transition theory (PTT), where Organski and Kugler first discussed that powerful countries start the attack before the balance of power changes in favor of the relatively weaker but the rising state. Although the PTT has relevance to explain the use of pre-emptive cyber defence policies, this theory can still be difficult to apply when it comes to cyber defence entirely because it is not easy to understand the relative power differentials of the international actors in terms of their cyber capabilities. On the other hand, we can still use the PTT to explain the security perceptions of the United States and China, as a rising country, in terms of their use of pre-emptive cyber defence policies. Many scholars have already begun to examine the likelihood of cyber war between these countries and examined the relevance of the PTT and other similar international relations theories.", "edit_actions": [{"type": "R", "before": "It represents the thermocline between purely", "after": "Proactive cyber defence can be understood as options between", "start_char_pos": 110, "end_char_pos": 154}, {"type": "R", "before": "action;", "after": "measures. It includes", "start_char_pos": 179, "end_char_pos": 186}, {"type": "A", "before": null, "after": "and", "start_char_pos": 437, "end_char_pos": 437}, {"type": "R", "before": "interdiction", "after": "interception", "start_char_pos": 484, "end_char_pos": 496}, {"type": "R", "before": "Psychological operations, Managed Information Dissemination, Precision Targeting, Information Warfare Operations and", "after": "psychological operations, managed information dissemination, precision targeting, information warfare operations,", "start_char_pos": 551, "end_char_pos": 667}, {"type": "A", "before": null, "after": ",", "start_char_pos": 698, "end_char_pos": 698}, {"type": "R", "before": "improves", "after": "improve", "start_char_pos": 786, "end_char_pos": 794}, {"type": "R", "before": ",", "after": "and to", "start_char_pos": 864, "end_char_pos": 865}, {"type": "R", "before": "and", "after": "as well as", "start_char_pos": 889, "end_char_pos": 892}, {"type": "R", "before": "A", "after": "Proactive cyber defence can be a", "start_char_pos": 964, "end_char_pos": 965}, {"type": "R", "before": "or obtaining information as to", "after": "and obtaining information before", "start_char_pos": 988, "end_char_pos": 1018}, {"type": "A", "before": null, "after": "it can also be", "start_char_pos": 1038, "end_char_pos": 1038}, {"type": "R", "before": "or for", "after": "and be", "start_char_pos": 1065, "end_char_pos": 1071}, {"type": "R", "before": "against the source. Proactive cyber defence operations pre-emptively engage the adversary", "after": ".", "start_char_pos": 1189, "end_char_pos": 1278}, {"type": "A", "before": null, "after": "and/", "start_char_pos": 1328, "end_char_pos": 1328}, {"type": "R", "before": "in", "after": ", meaning", "start_char_pos": 1697, "end_char_pos": 1699}, {"type": "D", "before": "or executive prerogative", "after": null, "start_char_pos": 1893, "end_char_pos": 1917}, {"type": "R", "before": ", or", "after": "and", "start_char_pos": 2016, "end_char_pos": 2020}, {"type": "R", "before": "but", "after": ". But, these", "start_char_pos": 2051, "end_char_pos": 2054}, {"type": "R", "before": "nation states. There are some exceptions, notably in self-defence or with judicial authority (civil warrants) or assisting law enforcement.", "after": "nation-states.", "start_char_pos": 2083, "end_char_pos": 2222}, {"type": "D", "before": "CyberISR (intelligence surveillance and reconnaissance) focuses a powerful lens onto the Internet-of-Everything. The capability provides strategic listening, enhanced situational understanding, precision and mission-confidence though a keen awareness of both adversary dynamics and one's attack surface, thus facilitating anticipatory threat reduction, accelerated evidence-based decision support, contextualization, targeting, the ability to mount an defence against.", "after": null, "start_char_pos": 2223, "end_char_pos": 2691}, {"type": "D", "before": "Cyber threat hunting is the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.", "after": null, "start_char_pos": 2692, "end_char_pos": 2864}, {"type": "D", "before": "Offensive, proactive cyber activities and active cyber defence facilitate anticipatory threat reduction while informing protection, detection and incident response given its ability to engage the adversary at distance and time.", "after": null, "start_char_pos": 2894, "end_char_pos": 3121}, {"type": "D", "before": "An active defence: Has greater efficacy than reactive systems. Drastically reduces the volume and severity of attacks leading to an order-of-magnitude fewer alerts, incidents, and costs. Thus, passing these savings to cybersecurity. Provides early warning and indicators to model zero-day signatures to incident response mechanisms and enumerate attack networks through cyber threat intelligence. In not subject to scalability issues around performance and cost like reactive systems. Uniquely has the capability to shape contested space.", "after": null, "start_char_pos": 3122, "end_char_pos": 3660}, {"type": "R", "before": "To help understand the practical", "after": "The main", "start_char_pos": 3798, "end_char_pos": 3830}, {"type": "R", "before": ", is to recognize that", "after": "is that that", "start_char_pos": 3883, "end_char_pos": 3905}, {"type": "D", "before": "where cyber defence is fully integrated into operational planning across the Joint Functions", "after": null, "start_char_pos": 3992, "end_char_pos": 4084}, {"type": "R", "before": "out-manoeuver that", "after": "outmanoeuver the", "start_char_pos": 4210, "end_char_pos": 4228}, {"type": "R", "before": "Does", "after": "Defensive cyber does", "start_char_pos": 4669, "end_char_pos": 4673}, {"type": "D", "before": "The distinction between cyber defence, active cyber defence, proactive cyber defence and offensive cyber operations has been influenced by doctrine, pragmatics of technology or tradecraft and legal thresholds.", "after": null, "start_char_pos": 4733, "end_char_pos": 4942}, {"type": "D", "before": "or through", "after": null, "start_char_pos": 4991, "end_char_pos": 5001}, {"type": "R", "before": "to or", "after": ", and", "start_char_pos": 5080, "end_char_pos": 5085}, {"type": "R", "before": "or", "after": ", and", "start_char_pos": 5130, "end_char_pos": 5132}, {"type": "R", "before": "or terrorist group as they relate to international affairs, defence or security", "after": ", and terrorist groups", "start_char_pos": 5189, "end_char_pos": 5268}, {"type": "D", "before": "hunt and", "after": null, "start_char_pos": 5338, "end_char_pos": 5346}, {"type": "A", "before": null, "after": "of the term proactive", "start_char_pos": 5387, "end_char_pos": 5387}, {"type": "R", "before": "then and now considers defense", "after": "considers defence", "start_char_pos": 6357, "end_char_pos": 6387}, {"type": "R", "before": "active-defense. Defense", "after": "active-defence. Defence", "start_char_pos": 6536, "end_char_pos": 6559}, {"type": "R", "before": "term", "after": "concept of proactive defence", "start_char_pos": 6689, "end_char_pos": 6693}, {"type": "R", "before": "active-defense", "after": "active-defence", "start_char_pos": 6782, "end_char_pos": 6796}, {"type": "R", "before": "self-defense", "after": "self-defence", "start_char_pos": 6836, "end_char_pos": 6848}, {"type": "R", "before": "defense", "after": "defence", "start_char_pos": 7012, "end_char_pos": 7019}, {"type": "R", "before": ". It", "after": ", and it", "start_char_pos": 7044, "end_char_pos": 7048}, {"type": "R", "before": "The Seven Habits of Highly Effective People, published by Free Press,", "after": "study", "start_char_pos": 7156, "end_char_pos": 7225}, {"type": "A", "before": null, "after": "of proactive as", "start_char_pos": 7250, "end_char_pos": 7250}, {"type": "A", "before": null, "after": "it means", "start_char_pos": 7756, "end_char_pos": 7756}, {"type": "R", "before": "through the lingua franca of the Internet, the Internet Protocol (IP)", "after": "the Internet", "start_char_pos": 7804, "end_char_pos": 7873}, {"type": "D", "before": "There is no air-gap anymore between networks.", "after": null, "start_char_pos": 8183, "end_char_pos": 8228}, {"type": "D", "before": "The origins of cyber defense undoubtedly evolved from the original purpose of the Internet which was to harden military networks against the threat of a nuclear strike. Later cyber defense was coveted by the tenets of information warfare and information operations.", "after": null, "start_char_pos": 8229, "end_char_pos": 8494}, {"type": "R", "before": "The", "after": "With the the", "start_char_pos": 8524, "end_char_pos": 8527}, {"type": "R", "before": "embraced a proactive preemptive cyber defense strategy", "after": ", we have begun to see the use of proactive and preemptive cyber defence concepts used by the policymakers and scholars", "start_char_pos": 8600, "end_char_pos": 8654}, {"type": "A", "before": null, "after": ", a book written by George W. Bush,", "start_char_pos": 8700, "end_char_pos": 8700}, {"type": "R", "before": "to outline an initial", "after": "outlining theinitial", "start_char_pos": 8732, "end_char_pos": 8753}, {"type": "R", "before": "Proactive", "after": "In this book, proactive", "start_char_pos": 8897, "end_char_pos": 8906}, {"type": "R", "before": "defense", "after": "defence", "start_char_pos": 9055, "end_char_pos": 9062}, {"type": "R", "before": "1994. This period was marked by intense \"hype\" discussions", "after": "1994,", "start_char_pos": 9149, "end_char_pos": 9207}, {"type": "R", "before": "defense", "after": "defence", "start_char_pos": 9307, "end_char_pos": 9314}, {"type": "D", "before": "A number of programs were initiated then, and advanced to full operation by 2005 including those of hostile states. Meanwhile, the public discussions diminished until the most recent resurgence in proactive cyber defense 2004\u20132008.", "after": null, "start_char_pos": 9344, "end_char_pos": 9575}, {"type": "D", "before": "1994 or existing operational programs. 'Proactive' is often used to hype marketing of security products or programs, in much the same way that \"extreme\" or \"quality\" adjectives have been misused.", "after": null, "start_char_pos": 9705, "end_char_pos": 9900}, {"type": "D", "before": "The hype-cycle of discussion reached its peak in", "after": null, "start_char_pos": 9901, "end_char_pos": 9949}, {"type": "R", "before": "defense", "after": "defence", "start_char_pos": 9984, "end_char_pos": 9991}, {"type": "R", "before": "defense", "after": "defence", "start_char_pos": 10118, "end_char_pos": 10125}, {"type": "D", "before": "Dr. Robert John Garigue, a computational epistemologist and father of information warfare in Canada, published Information Warfare, Developing a Conceptual Framework. This was a landmark document in 1994 and genesis for proactive cyber defensive theory in Canada.", "after": null, "start_char_pos": 10184, "end_char_pos": 10447}, {"type": "R", "before": "Founding", "after": "As being one of the founding", "start_char_pos": 10448, "end_char_pos": 10456}, {"type": "A", "before": null, "after": "Canada's", "start_char_pos": 10472, "end_char_pos": 10472}, {"type": "D", "before": "(Canada 1994)", "after": null, "start_char_pos": 10524, "end_char_pos": 10537}, {"type": "R", "before": "wrote: Strategic", "after": "pointed out that \"strategic", "start_char_pos": 10576, "end_char_pos": 10592}, {"type": "R", "before": "and a", "after": ", and", "start_char_pos": 10622, "end_char_pos": 10627}, {"type": "R", "before": "Deterrence", "after": "deterrence", "start_char_pos": 10970, "end_char_pos": 10980}, {"type": "A", "before": null, "after": ",", "start_char_pos": 11193, "end_char_pos": 11193}, {"type": "R", "before": "NSA", "after": "National Security Agency,", "start_char_pos": 11206, "end_char_pos": 11209}, {"type": "R", "before": ",", "after": "and", "start_char_pos": 11281, "end_char_pos": 11282}, {"type": "A", "before": null, "after": ", thereby,", "start_char_pos": 11382, "end_char_pos": 11382}, {"type": "A", "before": null, "after": "'s", "start_char_pos": 11719, "end_char_pos": 11719}, {"type": "D", "before": ",", "after": null, "start_char_pos": 11726, "end_char_pos": 11727}, {"type": "R", "before": "of the P2OG is reportedly", "after": "was", "start_char_pos": 12091, "end_char_pos": 12116}, {"type": "R", "before": "Psychological operations, Managed Information Dissemination, Precision Targeting, Information Warfare Operations, and SIGINT. The proactive defense strategy is meant to improves", "after": "psychological operations, managed information dissemination, precision targeting, and information warfare operations. Today, the proactive defence strategy means improving", "start_char_pos": 12223, "end_char_pos": 12400}, {"type": "D", "before": "and", "after": null, "start_char_pos": 12494, "end_char_pos": 12497}, {"type": "R", "before": "or", "after": "as well as", "start_char_pos": 12545, "end_char_pos": 12547}, {"type": "R", "before": "\"one hundred '", "after": "one hundred", "start_char_pos": 12621, "end_char_pos": 12635}, {"type": "D", "before": "such as information operations, PSYOPS, network attack, covert activities, SIGINT, HUMINT, SOF, influence warfare/deception operations and to report to the National Security Council with an annual budget of $100 million\"", "after": null, "start_char_pos": 12708, "end_char_pos": 12928}, {"type": "R", "before": "defense or the CIA director. \"The proposal is the latest sign of a new assertiveness by the Defense Department in intelligence matters, and an indication that the cutting edge of intelligence reform is not to be found in Congress but behind closed doors in the Pentagon\". DoD doctrinally would initiate a 'pre-emptive' attack on the basis of evidence that an enemy attack is imminent.", "after": "defence.", "start_char_pos": 13074, "end_char_pos": 13458}, {"type": "R", "before": "Politics and Pre-emptive Cyber Defense", "after": "politics and pre-emptive cyber defence", "start_char_pos": 13647, "end_char_pos": 13685}, {"type": "A", "before": null, "after": "the", "start_char_pos": 14247, "end_char_pos": 14247}, {"type": "R", "before": "weak but", "after": "weaker but the", "start_char_pos": 14300, "end_char_pos": 14308}, {"type": "R", "before": "defense", "after": "defence", "start_char_pos": 14394, "end_char_pos": 14401}, {"type": "R", "before": "defense", "after": "defence", "start_char_pos": 14479, "end_char_pos": 14486}, {"type": "R", "before": "use", "after": "still use the", "start_char_pos": 14658, "end_char_pos": 14661}, {"type": "R", "before": "defense", "after": "defence", "start_char_pos": 14798, "end_char_pos": 14805}, {"type": "R", "before": "cyberwar", "after": "cyber war", "start_char_pos": 14878, "end_char_pos": 14886}, {"type": "A", "before": null, "after": "the", "start_char_pos": 14941, "end_char_pos": 14941}], "sents_char_pos": [0, 109, 186, 312, 405, 742, 963, 1208, 1450, 1540, 1644, 1760, 1931, 2097, 2222, 2335, 2691, 2864, 3121, 3184, 3308, 3354, 3518, 3606, 3660, 3797, 4239, 4446, 4668, 4732, 4942, 5270, 5378, 5500, 5631, 5983, 6116, 6237, 6339, 6430, 6551, 6652, 7001, 7045, 7323, 7415, 7647, 7755, 7875, 8040, 8182, 8228, 8397, 8494, 8656, 8834, 8896, 9029, 9084, 9154, 9250, 9343, 9459, 9575, 9743, 9900, 9955, 10183, 10350, 10447, 10673, 10753, 10958, 11170, 11542, 11742, 11917, 12078, 12348, 12569, 12930, 13102, 13345, 13458, 13584, 13922, 14047, 14322, 14631, 14815]}
+{"doc_id": "1857117", "revision_depth": "2", "before_revision": "Raymond Armin was born in London (1926) under the name Schirtenlieb, and did most of his schooling in London, living around the St.Johns Wood area. He started his working life as an apprentice tool maker at Borehamwood near London England. Armin did time during the war in the R.A.F. as a quartermaster (His rank was staff sergeant). He married Violet Burton from Waterloo . After the war Armin worked at various locations around the London areas , as manager of a furniture company based in Camden Town, London, and then as a market demonstrator. During the late 1940s and early 1950s , while still living in central London, he became father to four children , one of whom died soon after birth . He relocated in 1958 to Yorkshire to follow a new profession as a traveling salesman selling furniture polish , and then a few years later as an encyclopaedia salesman. In 1964 Armin moved to Nottinghamshire, followed by a move back to London in 1965, where he worked as a civilian driver for the police and a guard for a security firm. In 1971 Armin's son John met up with a group of people who were staying in London after traveling around the world 'looking for something'. They formed into a group under the Armins' leadership, and all met regularly over the next ferw years, primarily at Leo's flat in Stoke-newington London. In 1973 'The group' began ending in the The Emin Society' at which time Raymond Armin became known as 'Leo' and John as 'Orman' within the society. The society used many halls around the London areas, eventually occupying a small centre at Gospel Oak in London. Autumn of 1976 saw a relocation to a larger centre at Hotham Road, Putney, London. At the end of the 1980 's Raymond Armin moved with his wife (Violet) and his girlfriend a woman called ethra 'Deborra Mckay' to America, eventually 2 of them ( leo amnd ruth )with the money the Emin suplied , becoming American citizens. From 1995 until his death, Armin (known as leo ), lived in a waterfront retreat at Jensen Beach Florida. Address/Property records 1592 Seahorse Pl Jensen Beach, FL 34957 Armin who died in August 2002 from an aortic aneurysm. Violet Armin (Ruth) died in 2008 in her sleep after many abuses and painful treatment by her so called ladies of the temple . The Emin was founded by 2 members of the Armin family ( Leo- Raymond and Orman- John ) followed by a gathering of friends interested in Ormans and Leos work. Raymond Armin was born on 27 July 1926, and died in 2002. The Emin was consequential to the time (1960 to 1975) and those that were its inspiration. Leo was a man that would turn brother against brother and sister to achieve his own ends. He liveD a luxurious life style and criticized all that didn't agree with him. He was a monster, who put his own children down and loved money and women more than all else. Believers or not, they ' Emin people' still try to tell others he was a genius and a Gods friend. Don't trust Emin, its ushers, elite or even those that run it. The Emin was good for the time but in todays world they are archaic, following a dead mans way. Life needs life to go on and not reverence of the dead and its ways. The story of Ruth (Violet Ann Claire Burton, born 1922 or there abouts, there are two certificates) is yet to be known. She suffered via the ways of Leo and her ladies in waiting. They robbed her and took her possessions and left her to suffer the desolation that Raymond Armin(her husband)- Leo her work mate, left her to suffer .", "after_revision": "Raymond Armin was born in London (1926) under the name Schirtenlieb, and did most of his schooling in London, living around the St.Johns Wood area. He started his working life as an apprentice tool maker at Borehamwood near London England. Armin did time during the war in the R.A.F. as a quartermaster (His rank was staff sergeant). He married Violet Burton from Waterloo who was 8 months pregnant at the time . After the war , Armin worked at various locations around the London areas e.g. as manager of a furniture company based in Camden Town, London, and then as a market demonstrator. During the late 1940s , while still living in central London, he became father to four children and one who wasn't. out of them one died soon after birth , his name was Brian . He relocated in 1958 to Yorkshire to follow a new profession as a traveling salesman , selling furniture polish and then a few years later as an encyclopaedia salesman. In 1963 Armin moved to Nottinghamshire, followed by a move back to London in 1965, where he worked as a civilian driver for the metropolitan police and then as a guard for a security firm. In 1971 John Armin son of Leo met up with a group of people who were staying in London after traveling around the world 'looking for something'. They formed into a group under 'The Armins' leadership, and all met regularly over the next few years, primarily at Leo's flat in Stoke-newington London. In 1973 'The group' began which took on the name ' The Emin Society' at which time Raymond Armin became known as 'Leo' and John as 'Orman' within the society. The society used many halls around the London areas, eventually occupying a small centre at Gospel Oak in London. Autumn of 1976 saw a relocation to a larger centre at Hotham Road, Putney, London. During the late 1970 's Raymond Armin (aka.Leo), moved with his wife (Violet) and his girlfriend a woman called Ethra aka.'Deborra McKay' from Iowa, America). He introduced her indoors (to Ruth's objections in 1973)and moved to America which eventually lead to 2 of them ( Leo and Ruth )with the money the Emin supplied , becoming American citizens. From roughly the 1993's until his death, Armin (known as Leo ), lived in a waterfront retreat at Jensen Beach Florida. Address/Property records 1592 Seahorse Pl Jensen Beach, FL 34957 Armin who died in August 2002 from an aortic aneurysm. Violet Armin (Ruth) died in 2008 in her sleep after many abuses and painful treatment by her so called ladies of the temple and in waiting The Emin was Truley founded by 2 members of the Armin family ( Orman- John and Leo- Raymond ) followed by a gathering of friends interested in Ormans and Leos work. Raymond Armin was born on 27 July 1926, and died in 2002. The Emin was consequential to the time (1960 to 1975) and those that were its inspiration. Leo was a man that would turn brother against brother and sister to achieve his own ends. He lived a luxurious life style and criticized all that didn't agree with him. He was a monster, who put his own children down loved money and loose women more than all else. Believers or not, they ' The Emin people' still try to tell others he was a genius and a Gods friend. Don't trust Emin, its ushers, elite or even those that run it. The Emin was good for the time but in todays world they are archaic, following a dead mans way. Life needs life to go on and not reverence of the dead and its ways. The story of Ruth (Violet Ann Claire Burton, born 1922 or there abouts, there are two certificates) is yet to be known. She suffered via the ways of Leo and her ladies in waiting. They robbed her and took her possessions and left her to suffer the desolation that Raymond Armin(her husband)- Leo her work mate, left her to knowingly suffer. The Emin blames its woes on The last surviving member of the original membership of the Emin. That person is Orman. They tell many untruths about that time and they know nothing of the truths that was the man Leo, the woman Ruth and the man Orman .", "edit_actions": [{"type": "A", "before": null, "after": "who was 8 months pregnant at the time", "start_char_pos": 373, "end_char_pos": 373}, {"type": "A", "before": null, "after": ",", "start_char_pos": 390, "end_char_pos": 390}, {"type": "R", "before": ",", "after": "e.g.", "start_char_pos": 449, "end_char_pos": 450}, {"type": "D", "before": "and early 1950s", "after": null, "start_char_pos": 572, "end_char_pos": 587}, {"type": "R", "before": ", one of whom", "after": "and one who wasn't. out of them one", "start_char_pos": 662, "end_char_pos": 675}, {"type": "A", "before": null, "after": ", his name was Brian", "start_char_pos": 698, "end_char_pos": 698}, {"type": "A", "before": null, "after": ",", "start_char_pos": 786, "end_char_pos": 786}, {"type": "D", "before": ",", "after": null, "start_char_pos": 812, "end_char_pos": 813}, {"type": "R", "before": "1964", "after": "1963", "start_char_pos": 874, "end_char_pos": 878}, {"type": "R", "before": "police and", "after": "metropolitan police and then as", "start_char_pos": 999, "end_char_pos": 1009}, {"type": "R", "before": "Armin's son John", "after": "John Armin son of Leo", "start_char_pos": 1047, "end_char_pos": 1063}, {"type": "R", "before": "the", "after": "'The", "start_char_pos": 1210, "end_char_pos": 1213}, {"type": "R", "before": "ferw", "after": "few", "start_char_pos": 1270, "end_char_pos": 1274}, {"type": "R", "before": "ending in the", "after": "which took on the name '", "start_char_pos": 1359, "end_char_pos": 1372}, {"type": "R", "before": "At the end of the 1980", "after": "During the late 1970", "start_char_pos": 1678, "end_char_pos": 1700}, {"type": "A", "before": null, "after": "(aka.Leo),", "start_char_pos": 1718, "end_char_pos": 1718}, {"type": "R", "before": "ethra 'Deborra Mckay' to America, eventually", "after": "Ethra aka.'Deborra McKay' from Iowa, America). He introduced her indoors (to Ruth's objections in 1973)and moved to America which eventually lead to", "start_char_pos": 1782, "end_char_pos": 1826}, {"type": "R", "before": "leo amnd ruth", "after": "Leo and Ruth", "start_char_pos": 1839, "end_char_pos": 1852}, {"type": "R", "before": "suplied", "after": "supplied", "start_char_pos": 1878, "end_char_pos": 1885}, {"type": "R", "before": "1995", "after": "roughly the 1993's", "start_char_pos": 1921, "end_char_pos": 1925}, {"type": "R", "before": "leo", "after": "Leo", "start_char_pos": 1959, "end_char_pos": 1962}, {"type": "R", "before": ".", "after": "and in waiting", "start_char_pos": 2271, "end_char_pos": 2272}, {"type": "A", "before": null, "after": "Truley", "start_char_pos": 2286, "end_char_pos": 2286}, {"type": "D", "before": "Leo- Raymond and", "after": null, "start_char_pos": 2330, "end_char_pos": 2346}, {"type": "A", "before": null, "after": "and Leo- Raymond", "start_char_pos": 2359, "end_char_pos": 2359}, {"type": "R", "before": "liveD", "after": "lived", "start_char_pos": 2675, "end_char_pos": 2680}, {"type": "D", "before": "and", "after": null, "start_char_pos": 2799, "end_char_pos": 2802}, {"type": "A", "before": null, "after": "loose", "start_char_pos": 2819, "end_char_pos": 2819}, {"type": "A", "before": null, "after": "The", "start_char_pos": 2871, "end_char_pos": 2871}, {"type": "R", "before": "suffer", "after": "knowingly suffer.", "start_char_pos": 3496, "end_char_pos": 3502}, {"type": "A", "before": null, "after": "The Emin blames its woes on The last surviving member of the original membership of the Emin. That person is Orman. They tell many untruths about that time and they know nothing of the truths that was the man Leo, the woman Ruth and the man Orman", "start_char_pos": 3503, "end_char_pos": 3503}], "sents_char_pos": [0, 131, 147, 239, 333, 375, 549, 700, 870, 1038, 1178, 1332, 1480, 1594, 1677, 1915, 2020, 2146, 2272, 2432, 2490, 2581, 2671, 2750, 2845, 2944, 3007, 3103, 3172, 3292, 3352]}
+{"doc_id": "18842359", "revision_depth": "1", "before_revision": "The ocean (also the sea or the world ocean) is the body of salt water which covers approximately 71\\% of the surface of the Earth and contains 97\\% of Earth's water. It is also \"any of the large bodies of water into which the great ocean is divided\".\"Ocean.\" Merriam-Webster.com Dictionary, Merriam-Webster, URL Accessed March 14, 2021. A common definition lists five oceans, in descending order by area, the Pacific , Atlantic, Indian, Southern (Antarctic), and Arctic Oceans . Seawater covers approximately of the Earth. As the world's ocean is the principal component of Earth's hydrosphere, it is integral to life on Earth, forms part of the carbon cycle and water cycle, and - as a huge heat reservoir - influences climate and weather patterns.", "after_revision": "The ocean (also the sea or the world ocean) is the body of salt water which covers approximately 71\\% of the surface of the Earth and contains 97\\% of Earth's water. Another definition is \"any of the large bodies of water into which the great ocean is divided\".\"Ocean.\" Merriam-Webster.com Dictionary, Merriam-Webster, URL Accessed March 14, 2021. The ocean is divided into five oceans: Pacific (the largest) , Atlantic, Indian, Southern (Antarctic), and Arctic (the smallest) . Seawater covers approximately of the Earth. As the world's ocean is the principal component of Earth's hydrosphere, it is integral to life on Earth, forms part of the carbon cycle and water cycle, and - as a huge heat reservoir - influences climate and weather patterns.", "edit_actions": [{"type": "R", "before": "It is also", "after": "Another definition is", "start_char_pos": 166, "end_char_pos": 176}, {"type": "R", "before": "A common definition lists five oceans, in descending order by area, the Pacific", "after": "The ocean is divided into five oceans: Pacific (the largest)", "start_char_pos": 337, "end_char_pos": 416}, {"type": "R", "before": "Oceans", "after": "(the smallest)", "start_char_pos": 470, "end_char_pos": 476}], "sents_char_pos": [0, 165, 250, 336, 478, 522]}
+{"doc_id": "18842359", "revision_depth": "2", "before_revision": "The ocean (also the sea or the world ocean) is the body of salt water which covers approximately 71\\% of the surface of the Earth and contains 97\\% of Earth's water. Another definition is \"any of the large bodies of water into which the great ocean is divided\".\"Ocean.\" Merriam-Webster.com Dictionary, Merriam-Webster, URL Accessed March 14, 2021. The ocean is divided into five oceans : Pacific (the largest) , Atlantic, Indian, Southern (Antarctic), and Arctic (the smallest). Seawater covers approximately of the Earth. As the world's ocean is the principal component of Earth's hydrosphere, it is integral to life on Earth , forms part of the carbon cycle and water cycle, and - as a huge heat reservoir - influences climate and weather patterns. Oceanographers divide the ocean into different vertical and horizontal zones defined by physical and biological conditions. The pelagic zone consists of the water column of the open ocean, and can be divided into further regions categorized by light abundance and by depth. The photic zone includes the oceans from the surface to a depth of 200 m; it is the region where photosynthesis can occur and is, therefore, the most biodiverse. Photosynthesis by plants and microscopic algae (free floating phytoplankton) allows them to create organic matter from chemical precursors including water and carbon dioxide. It is this upper sunlit ocean that creates the food supply that ultimately sustains most of the ocean ecosystem. Light only penetrates to a few hundred meters depth, so the remaining ocean below this is cold and dark. The continental shelf around the edge of the oceans is shallower (a few hundred meters or less) and this region is most impacted by human activity.", "after_revision": "The ocean (also the sea or the world ocean) is the body of salt water which covers approximately 71\\% of the surface of the Earth and contains 97\\% of Earth's water. Another definition is \"any of the large bodies of water into which the great ocean is divided\".\"Ocean.\" Merriam-Webster.com Dictionary, Merriam-Webster, URL Accessed March 14, 2021. Separate names are used to identify five different areas of the ocean : Pacific (the largest) Atlantic, Indian, Southern (Antarctic), and Arctic (the smallest). Seawater covers approximately of the Earth. The ocean is the principal component of Earth's hydrosphere, and therefore integral to life on Earth . The ocean is a huge heat reservoir and influences climate and weather patterns. the carbon cycle and the water cycle. Oceanographers divide the ocean into different vertical and horizontal zones based on physical and biological conditions. The pelagic zone consists of the water column of the open ocean, and can be divided into further regions categorized by light abundance and by depth. The photic zone includes the oceans from the surface to a depth of 200 m; it is the region where photosynthesis can occur and is, therefore, the most biodiverse. Photosynthesis by plants and microscopic algae (free floating phytoplankton) allows them to create organic matter from chemical precursors including water and carbon dioxide. It is this upper sunlit ocean that creates the food supply that ultimately sustains most of the ocean ecosystem. Light only penetrates to a few hundred meters depth, so the remaining ocean below this is cold and dark. The continental shelf around the edge of the oceans is shallower (a few hundred meters or less) and this region is most impacted by human activity.", "edit_actions": [{"type": "R", "before": "The ocean is divided into five oceans", "after": "Separate names are used to identify five different areas of the ocean", "start_char_pos": 348, "end_char_pos": 385}, {"type": "D", "before": ",", "after": null, "start_char_pos": 410, "end_char_pos": 411}, {"type": "R", "before": "As the world's", "after": "The", "start_char_pos": 523, "end_char_pos": 537}, {"type": "R", "before": "it is", "after": "and therefore", "start_char_pos": 595, "end_char_pos": 600}, {"type": "R", "before": ", forms part of the carbon cycle and water cycle, and - as", "after": ". The ocean is", "start_char_pos": 627, "end_char_pos": 685}, {"type": "R", "before": "-", "after": "and", "start_char_pos": 708, "end_char_pos": 709}, {"type": "A", "before": null, "after": "the carbon cycle and the water cycle.", "start_char_pos": 751, "end_char_pos": 751}, {"type": "R", "before": "defined by", "after": "based on", "start_char_pos": 829, "end_char_pos": 839}], "sents_char_pos": [0, 165, 261, 347, 478, 522, 750, 875, 1025, 1099, 1187, 1362, 1475, 1580]}
+{"doc_id": "18842359", "revision_depth": "3", "before_revision": "Oceanographers divide the ocean into different vertical and horizontal zones based on physical and biological conditions. The pelagic zone consists of the water column of the open ocean , and can be divided into further regions categorized by light abundance and by depth. The photic zone includes the oceans from the surface to a depth of 200 m ; it is the region where photosynthesis can occur and is, therefore, the most biodiverse. Photosynthesis by plants and microscopic algae (free floating phytoplankton) allows them to create organic matter from chemical precursors including water and carbon dioxide. It is this upper sunlit ocean that creates the food supply that ultimately sustains most of the ocean ecosystem . Light only penetrates to a few hundred meters depth , so the remaining ocean below this is cold and dark. The continental shelf around the edge of the oceans is shallower (a few hundred meters or less) and this region is most impacted by human activity.", "after_revision": "Oceanographers divide the ocean into different vertical and horizontal zones based on physical and biological conditions. The pelagic zone consists of the water column from surface to ocean floor throughout the open ocean . The water column is further categorized in other zones depending on light abundance and depth. The photic zone includes the water column from the surface to a depth of 200 m , where photosynthesis can occur . This makes the photic zone the most biodiverse. Photosynthesis by plants and microscopic algae (free floating phytoplankton) allows them to create organic matter from chemical precursors including water and carbon dioxide. This upper sunlit zone of the ocean ultimately sustains most of the ocean ecosystem since that is the origin of the food supply necessary to all life forms . Light only penetrates to a depth of a few hundred meters , so the remaining ocean below is cold and dark. The continental shelf where the ocean touches land is more shallow (a few hundred meters or less) and experiences more impact from human activity.", "edit_actions": [{"type": "R", "before": "of", "after": "from surface to ocean floor throughout", "start_char_pos": 168, "end_char_pos": 170}, {"type": "R", "before": ", and can be divided into further regions categorized by", "after": ". The water column is further categorized in other zones depending on", "start_char_pos": 186, "end_char_pos": 242}, {"type": "D", "before": "by", "after": null, "start_char_pos": 263, "end_char_pos": 265}, {"type": "R", "before": "oceans", "after": "water column", "start_char_pos": 302, "end_char_pos": 308}, {"type": "R", "before": "; it is the region", "after": ",", "start_char_pos": 346, "end_char_pos": 364}, {"type": "R", "before": "and is, therefore, the", "after": ". This makes the photic zone the", "start_char_pos": 396, "end_char_pos": 418}, {"type": "R", "before": "It is this upper sunlit ocean that creates the food supply that", "after": "This upper sunlit zone of the ocean", "start_char_pos": 611, "end_char_pos": 674}, {"type": "A", "before": null, "after": "since that is the origin of the food supply necessary to all life forms", "start_char_pos": 723, "end_char_pos": 723}, {"type": "A", "before": null, "after": "depth of a", "start_char_pos": 753, "end_char_pos": 753}, {"type": "D", "before": "depth", "after": null, "start_char_pos": 773, "end_char_pos": 778}, {"type": "D", "before": "this", "after": null, "start_char_pos": 810, "end_char_pos": 814}, {"type": "R", "before": "around the edge of the oceans is shallower", "after": "where the ocean touches land is more shallow", "start_char_pos": 855, "end_char_pos": 897}, {"type": "R", "before": "this region is most impacted by", "after": "experiences more impact from", "start_char_pos": 933, "end_char_pos": 964}], "sents_char_pos": [0, 121, 272, 347, 435, 610, 832]}
+{"doc_id": "18843884", "revision_depth": "3", "before_revision": "Sovereign states Countries / decadesbefore/Pre-1700s1700s to 1710s1710s to 1720s1720s to 1730s1730s to 1740s1740s to 1750s1750s to 1760s1760s to 1770s1770s to 1780s1780s to 1790s1790s to 1800s1800s to 1810s1810s to 1820s1820s to 1830s1830s to 1840s1840s to 1850s1850s to 1860s1860s to 1870s1870s to 1880s1880s to 1890s1890s to 1900s1900s to 1910s1910s to 1920s1920s to 1930s1930s to 1940s1940s to 1950s1950s to 1960s1960s to 1970s1970s to 1980s1980s to 1990s1990s to 2000s2000s to 2010s2010s to 2020s2020s to presentCurrentDecades / countriesAfghanistan23px|border549-330 BC23px|border32023px|border50023px|border66123px|border750-82123px|border123123px|border136923px|border150623px|border157623px|border170923px|border173823px|border174723px|border188023px|border190123px|border191923px|border192623px|border192823px|border 23px|border1929 192923px|border193023px|border197323px|border197423px|border 23px|border1978 197823px|border198023px|border198723px|border 23px|border1992 199223px|border199623px|border199723px|border 23px|border2001 200123px|border200223px|border200423px|border201340px|borderAfghanistan23px|border549-256 BC\u00c5land23px|border156223px|border180923px|border185823px|border188323px|border191723px|border191823px|border192123px|border195440px|border\u00c5landAlbania25px138523px|border184423px|border187823px|border188123px|border190223px|border 23px|border1910 191123px|border 23px|border1912 191423px|border192023px|border192623px|border192823px|border193423px|border193923px|border194323px|border194423px|border194623px|border199223px|border200240px|borderAlbaniaAlgeria23px|border66123px|border750-77823px|border151623px|border183023px|border196240px|borderAlgeriaAndorra23px|border180623px|border 23px|border1812 1813186623px|border193423px|border193923px|border194923px|border195923px|border197140px|borderAndorraAngola23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197523px|border199623px|border199723px|border200323px|border200440px|borderAngolaAntigua and Barbuda23px|border163223px|border180123px|border187123px|border195723px|border195823px|border196223px|border196740px|borderAntigua and BarbudaArgentina23px|border153623px|border171723px|border178523px|border 23px|border1812 181223px|border 23px|border1818 181923px|border182023px|border182923px|border183523px|border185023px|border186140px|borderArgentinaArmenia23px|border549-331 BC23px|border42823px|border65423px|border750-88423px|border1236-133523px|border1468-150225px150823px|border182823px|border185823px|border188323px|border188523px|border 23px|border1918 191823px|border192223px|border193623px|border194023px|border195223px|border199040px|borderArmeniaAruba23px|border 158123px|border / 23px|border165223px|border179523px|border180623px|border181023px|border181423px|border195923px|border197640px|borderArubaAustralia23px|border177023px|border180123px|border180623px| border185423px|border190023px| border190123px|border190323px|border190823px|border195423px|border199323px|border199423px|border199823px|border199923px|border201423px|border201540px|borderAustraliaAustria23px|border123023px|border180423px|border186923px|border191823px|border193823px|border194540px|borderAustriaAzerbaijan23px|border550-330 BC23px|border66123px|border750-125823px|border1370-150723px|border157623px|border173623px|border174725px176023px|border179623px|border181323px|border185823px|border188323px|border 23px|border 23px|border1918 1918 191823px|border192023px|border192223px|border193723px|border194023px|border195223px|border199040px|borderAzerbaijanBahamas23px|border164823px|border170623px|border171823px|border180123px|border186923px|border190423px|border192323px|border195323px|border196423px|border197223px|border197323px|border200640px|borderBahamasBahrain23px|border976-107623px|border178323px|border182023px|border193223px|border197223px|border200240px|borderBahrainBangladesh23px|border135223px|border157623px|border175723px|border180123px|border185823px|border194723px|border197123px|border197240px|borderBangladeshBarbados23px|border163223px|border180123px|border188523px|border195823px|border196223px|border196640px|borderBarbadosBelarus23px|border158723px|border179323px|border185823px|border188323px|border191823px|border 23px|border1919 191923px|border193723px|border194023px|border194123px|border194423px|border195123px|border199123px| border199323px| border199523px|border201240px|borderBelarusBelgium23px|border148223px|border171323px|border179023px|border179223px|border179523px|border181523px|border 23px|border1830 183123px | border200823px|border200940px| borderBelgiumBelize23px|border151923px|border182123px|border182323px|border182523px|border183823px|border187523px|border188423px|border191923px|border198123px|border201940px|borderBelizeBenin23px|border190023px|border195823px|border197523px|border199040px|borderBeninBermuda23px|border168423px|border180123px|border187523px|border191023px|border199923px|border200223px|border200340px|borderBermudaBhutan23px|border194923px|border195623px|border196940px|borderBhutanBolivia23px|border153423px|border178523px|border182523px|border182623px|border185140px|borderBoliviaBosnia and Herzegovina25px137725px146323px|border184423px|border 23px|border1878 187823px|border190823px|border191823px|border194123px|border194623px|border199223px|border199523px|border199723px|border199840px|borderBosnia and Herzegovina23px|border144823px|border1908Botswana23px|border188523px|border196640px|borderBotswanaBrazil23px|border169723px|border 23px|border1816 181623px|border 23px|border1822 182223px|border187023px|border 23px|border1889 188923px| border190823px|border190923px| border196023px|border196823px|border199240px|borderBrazilBrunei25px136823px|border190623px|border194123px|border194523px|border195940px|borderBruneiBulgaria25px139623px|border184423px|border187823px|border190823px|border191823px|border194623px|border194823px|border196723px|border197123px|border199140px|borderBulgaria23px|border187823px|border1908Burkina Faso23px|border189623px|border195923px|border198440px|borderBurkina FasoBurundi23px|border188523px|border191923px|border196123px|border196223px|border 23px|border1966 196623px|border196723px|border198240px|borderBurundiCambodiaalt=|25x25px1431?23px|border186323px|border188723px|border194223px|border194523px|border195323px|border197023px|border197523px|border197923px|border198923px|border199223px|border199340px|borderCambodiaCameroon23px|border188423px|border191623px|border195723px|border196123px|border197540px|borderCameroon23px|border191623px|border1922Canada23px|border160623px|border170723px|border180123px|border186823px|border192123px|border195723px|border196423px|border196540px|borderCanada23px|border166323px|border1715Cape Verde23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197523px|border199240px|borderCape VerdeCayman Islands23px|border167023px|border180123px|border195823px|border199940px|borderCayman IslandsCentral African Republic23px|border190323px|border195840px|borderCentral African RepublicChad23px70023px|border138023px|border190023px|border195940px|borderChadChile23px|border154123px|border171723px|border178523px|border181223px|border 23px|border1817 181740px|borderChileChina25px164423px|border189023px|border191223px|border191523px|border191623px|border191723px|border192823px|border194940px|borderChina, People's Republic ofColombia23px|border152523px|border178523px|border181123px|border181423px|border181623px|border181923px|border 23px|border1820 182123px|border183123px|border183423px|border 23px|border1861 186140px|borderColombiaComoros23px|border188723px|border196323px|border197523px|border197823px|border199223px|border199623px|border200140px|borderComorosCongo, Democratic Republic of the23px|border187723px| border195923px| border196023px|border196323px|border196623px|border197123px|border199723px|border200323px|border200640px|borderCongo, Democratic Republic of theCongo, Republic of the23px|border189123px|border195823px|border197023px|border199140px|borderCongo, Republic of theCook Islands23px|border185823px|border188823px|border189323px|border190123px|border190223px|border197323px|border197940px|borderCook IslandsCosta Rica23px|border150623px|border1821 23px|border182123px|border182323px|border 23px|border 23px|border1824 1824 182423px|border184023px|border184223px|border184823px|border190640px|borderCosta RicaCroatia23px|border152723px|border180923px|border181523px|border184823px|border185223px|border186823px|border 23px|border1918 191823px|border193923px|border194123px|border194323px|border194523px|border199023px|border199040px|borderCroatiaCura\u00e7ao23px|border 158123px|border / 23px|border165223px|border179523px|border180623px|border181023px|border181423px|border195923px|border198140px|borderCura\u00e7aoCuba23px|border150623px|border178523px|border187323px|border189823px|border190223px|border190623px|border190823px|border190923px|border195940px|borderCubaCyprus23px|border545 BC23px|border321-305 BC23px|border66823px|border750-96523px|border119223px|border148925px157123px|border184423px|border187823px|border188123px|border192223px|border 23px|border196023px|border200423px|border200640px|borderCyprusCzech Republicalt=|border|23x23px119823px|border180423px|border186923px|border191823px|border192023px|border193923px|border193923px|border194523px|border/23px|border196923px| border199223px| border199340px|borderCzech RepublicDenmark23px|border121923px|border139623px|border150040px|borderDenmarkDjibouti23px|border184423px|border189623px|border197740px|borderDjiboutiDominica23px|border166323px|border171523px|border176323px|border180123px|border187123px|border194023px|border195823px|border196223px|border197823px|border198123px|border198823px|border199040px|borderDominicaDominican Republic23px|border150623px|border179523px|border180823px|border182123px|border184423px|border184923px|border186123px|border186540px|borderDominican RepublicEast Timor23px|border170223px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border194223px|border194523px|border197523px|border197523px|border197623px|border199923px|border200240px|borderEast TimorEcuador23px|border153423px|border178523px|border180923px|border181223px|border182023px|border 23px|border1822 182223px|border183023px|border183523px|border 23px|border1845 184523px|border186023px|border190023px|border200940px|borderEcuadorEgypt23px|border525-404 BC23px|border343 BC23px|border332-323 BC23px|border619-62923px|border66123px|border750-96923px|border184423px|border188223px|border192223px|border195123px|border195223px|border195823px|border197223px|border198440px|borderEgyptEl Salvador23px|border151923px|border182123px|border182323px|border182523px|border183923px|border186523px|border187323px|border1875/187723px|border189823px|border190023px|border191240px|borderEl SalvadorEquatorial Guinea23px|border166723px|border170723px|border175023px|border177823px|border178523px|border193123px|border193623px|border193823px|border194523px|border196823px|border197323px|border197940px|borderEquatorial GuineaEritrea23px|border189023px|border194123px|border194123px|border195223px|border197423px|border198723px|border199123px|border199323px|border199540px|borderEritreaEstonia23px|border156223px|border172123px|border191823px|border191923px|border192023px|border192123px|border192223px|border192323px|border194023px|border194123px|border194423px|border195323px|border199023px|border200123px|border200240px|borderEstoniaEswatini23px|border189023px|border189423px|border190323px|border196823px|border201140px|borderEswatiniEthiopia25px185325px187525px189123px|border189723px|border191423px|border193623px|border194123px|border197423px|border198723px|border199123px|border199623px|border200940px|borderEthiopiaFaroe Islands23px|border121923px|border194040px|borderFaroe IslandsFiji23px|border 186523px|border186723px|border186923px|border187123px|border187823px|border192423px|border197023px|border201523px|border201640px|borderFijiFinland23px|border156223px|border180923px|border185823px| border186323px| border188323px|border191723px|border191840px|borderFinlandFrance23px|border164323px|border179023px|border179423px|border181423px|border183023px|border194023px|border194423px|border195823px|border197640px|borderFranceFrench Guiana23px|border164323px|border179423px|border181423px|border183023px|border195823px|border197623px|border199540px|borderFrench GuianaFrench Polynesia23px|border164323px|border179023px|border179423px|border181423px|border183023px|border197623px|border198440px|borderFrench PolynesiaGabon23px|border190323px|border195923px|border196040px|borderGabonGambia23px|border178323px|border180123px|border196540px|borderGambiaGeorgia23px|border1008-149023px|border176223px|border180123px|border185823px|border188323px|border 23px|border1918 191823px|border192123px|border192223px|border193723px|border195123px|border199023px|border200440px|borderGeorgiaGermany23px|border1400 23px|border143323px|border180623px|border181523px|border181723px|border181823px|border183223px|border183323px|border184823px|border186723px|border191823px|border191923px|border192623px|border192723px|border23px|border193323px|border193525px194425px194625px194725px194823px|border23px|border194923px|border23px|border199040px|borderGermany23px|border194923px|border1959Ghana23px|border182123px|border187723px|border195723px|border196123px|border196423px|border196640px|borderGhana23px|border161223px|border179523px|border180623px|border181023px|border1814Greece23px|border33023px|border126123px|border176923px|border182223px|border183323px|border186223px|border196723px|border197023px|border197523px|border197840px|borderGreece23px|border1822 naval ensignGreenland23px|border160623px|border197323px|border198323px|border198423px|border198523px|border199123px|border199223px|border199340px|borderGreenlandGrenada23px|border166323px|border171523px|border176323px|border177923px|border178323px|border180123px|border187523px|border190323px|border195823px|border196223px|border196723px|border197440px|borderGrenadaGuam23px|border188523px|border189923px|border191423px|border191923px|border194423px|border194723px|border194840px|borderGuamGuatemala23px|border151923px|border182123px|border182323px|border182523px|border183823px|border184323px|border185123px|border185823px|border187140px|borderGuatemalaGuinea23px|border189823px|border195840px|borderGuineaGuinea-Bissau23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197440px|borderGuinea-BissauGuyana23px|border158123px|border179523px|border180623px|border181023px|border181423px|border187523px|border190623px|border191923px|border195523px|border196640px|borderGuyanaHaiti23px|border166323px|border171523px|border179023px|border179123px|border179823px|border180323px|border180423px|border180623px|border181123px|border182123px|border184923px|border185923px|border196423px|border198640px|borderHaitiHonduras23px|border151923px|border182123px|border182323px|border182523px|border183823px|border186623px|border189823px|border189840px|borderHondurasHong Kong23px|border184323px|border187123px|border187623px|border194123px|border194523px|border195523px|border195923px|border199740px|borderHong KongHungary25px89525px104625px117225pxc. 119625pxc. 130125px130125px1387border|23px144625pxc. 145325px145825px150625px1516-1526border|23px1794border|23px1848border|23px1848\u20131849border|23px1867\u20131869border|23px1869\u20131918border|23px1896\u2013191523px|border191823px|border191923px|border191923px|border194023px|border194623px|border194923px|border195623px|border195623px|border23px|border195740px|borderHungaryIceland23px|border153623px|border180923px|border181023px|border190023px|border191823px|border194440px|borderIcelandIndia23px|border152623px|border185823px|border190423px|border190623px|border190723px|border190823px|border191723px|border192123px|border193123px|border194740px|borderIndia25px167423px|border177323px|border1910Indonesia23px|border1293alt=|25px|border160223px|border164023px|border180023px|border194223px|border194540px|borderIndonesiaIran23px|border66123px|border750-125823px|border1370-150723px|border157623px|border173623px|border174725px176023px|border179623px|border184923px|border1905/1906/190723px|border1925/193323px|border196423px|border198040px|borderIranIraq23px|border539-330 BC23px|border66123px|border750-94523px|border1194-125823px|border1394-145125px153423px|border184423px|border192123px|border195823px|border195923px|border196323px|border199123px|border200423px|border200723px|border200840px|borderIraq23px|border1194-1258Ireland23px|border154223px|border180123px|border191923px|border192240px|borderIrelandIsrael25px151623px|border184423px|border192023px|border194823px|border194840px| borderIsraelItaly23px | border100 BC23px | border141623px | border1785 File:Flag of the Repubblica Transpadana.svg | 23px|border 179623px | border180223px|border181523px|border185123px|border186123px|border23px| border194623px|border200323px|border200640px|borderItaly23px| border110023px | border181623px|border194323px|border113023px|border152523px|border149323px|border75423px|border697/1659Ivory Coast23px|border189623px|border195940px|borderIvory CoastJamaica23px|border165523px|border180123px|border187523px|border190623px|border195723px|border195823px|border195923px|border196023px|border196123px|border196240px|borderJamaicaJapan23px|border70123px|border187023px|border199940px|borderJapanJordan23px|border539-330 BC23px|border66123px|border750-96925px151623px|border184423px|border192023px|border192123px|border195823px|border195840px|borderJordanKazakhstan23px|border1220-144023px|border145623px|border182223px|border185823px|border188323px|border191523px|border23px|border23px|border23px|border23px|border23px|border23px|border23px|border23px|border192023px|border23px|border23px|border23px|border23px|border23px|border23px|border192723px|border193223px|border193723px|border194023px|border195323px|border199023px|border199123px|border199240px|borderKazakhstanKenya23px|border188523px|border188523px|border192123px|border196340px|borderKenyaKiribati23px|border189223px|border193723px|border194223px|border194323px|border197940px|borderKiribatiKorea, North25px96025px180025px185623px|border188223px|border188223px|border1888189323px|border189323px|border189923px|border191023px|border194523px|border 23px|border1946 194623px|border194823px|border199240px|borderKorea, NorthKorea, South23px|border194525px|border194825px|border194925px|border198425px|border199725px|border201140px|borderKorea, SouthKosovo25px|border128125px|border134625px145425px|border184425px|border191225px|border191825px|border194125px|border194325px|border194625px|border 25px|border199225px|border200425px|border200525px|border200625px|border200725px|border200840px|borderKosovoKuwait23px|border152123px175223px|border184423px|border189923px|border191423px|border192123px|border194023px|border196140px|borderKuwaitKyrgyzstan23px|border97623px|border187623px|border188323px|border191823px|border193623px|border195223px|border199123px|border199223px|border201023px|border201123px|border201240px|borderKyrgyzstanLaos23px|border170723px|border189323px|border195223px|border197540px|borderLaosLatvia23px|border156223px|border166123px|border169223px|border172123px|border191723px|border191823px|border191923px|border192023px| border193623px| border194023px|border194123px|border194423px|border195323px|border199040px|borderLatviaLebanon23px|border538-332 BC23px|border750-87623px|border905-96925px151623px|border151623px|border169725px184023px|border184423px|border191823px|border192023px|border194340px|borderLebanonLesotho23px|border179523px|border180123px|border187523px|border188423px|border196623px|border198723px|border200640px|borderLesothoLiberia23px|border182723px|border184740px|borderLiberiaLibya23px|border525-331 BC23px|border66323px|border750-96923px|border171123px|border191223px|border195123px|border196923px|border197223px|border197723px|border201140px|borderLibyaLiechtenstein23px|border140023px|border171923px|border185223px|border192123px|border193723px|border198240px|borderLiechtensteinLithuania23px|border158723px|border179523px|border185823px|border188323px|border191823px|border194023px|border194123px|border194423px|border195323px|border198823px|border200440px|borderLithuaniaLuxembourg23px|border148223px|border171523px|border179523px|border181523px|border184523px|border194023px|border194440px|borderLuxembourgMacau23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197523px|border199940px|borderMacauMadagascar23px|border 178723px|border188523px|border189623px|border195840px|borderMadagascarMalawi23px|border190723px|border195323px|border196323px|border196423px|border201023px|border201240px|borderMalawiMalaysia23px|border164123px|border/alt=|border|23x23px179523px|border / 23px|border180123px|border181823px|border / 23px|border182423px|border189623px|border194223px|border194523px|border194823px|border194923px|border196340px|borderMalaysiaMaldives23px|border179623px|border190323px|border192623px|border195323px|border195423px|border196540px|borderMaldivesMali23px|border189223px|border195823px|border195923px|border196140px|borderMaliMalta23px|border870-90923px|border153023px|border179823px|border 23px|border1800 180123px|border181423px|border187523px|border189823px|border192323px|border194323px|border196440px|borderMaltaMarshall Islands23px|border188523px|border188923px|border191423px|border191923px|border194423px|border194723px|border196523px|border197940px|borderMarshall IslandsMauritania23px|border190023px|border195923px|border201723px|border202040px|borderMauritaniaMauritius23px|border166623px|border171023px|border178923px|border181023px|border186923px|border190623px|border192323px|border196840px|borderMauritiusMexico23px|border151923px|border182123px|border182123px|border182323px|border186423px|border186723px|border189323px|border191623px|border193423px|border196840px|borderMexicoMicronesia23px|border188523px|border189923px|border191423px|border191923px|border194423px|border194723px|border196523px|border197940px|borderMicronesiaMoldova23px|border139623px|border183423px|border186623px|border188323px|border191723px|border191923px|border192523px|border193723px|border193823px|border194023px|border195223px|border199040px|borderMoldova23px|border185923px|border186223px|border1867Monaco23px|border179323px|border188123px|border194223px|border194540px|borderMonacoMongolia25px186223px|border189023px191123px192423px193023px|border194023px|border194523px|border199223px|border201140px|borderMongoliaMontenegro25px|border128125px|border134623px|border169623px|border185123px|border187623px|border190525px|border191823px|border191823px|border194623px|border199223px|border199423px|border200323px|border2004/200640px|borderMontenegroMorocco23px|border166623px|border191323px|border195640px|borderMorocco23px|border1921Mozambique23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197423px|border197523px|border198323px|border198340px|borderMozambiqueMyanmar23px|border175323px|border188523px|border193723px|border194323px|border194523px|border194823px|border197423px|border200623px|border201023px|border201923px|border202040px|borderMyanmarNamibia23px|border188423px|border191523px|border192823px|border198223px|border199040px|borderNamibiaNauru23px|border188823px|border188923px|border 23px|border 23px|border191423px|border194223px|border 23px|border 23px|border194523px|border196840px|borderNauruNepalframeless|56x56px 1768frameless|37x37px185625pxc.193025px196242pxNepalNetherlands23px|border 158123px|border / 23px|border165223px|border179523px|border180623px|border181023px|border181440px|borderNetherlandsNew Zealand23px|border176923px|border183423px|border184023px|border186723px|border190223px| border201423px| border201523px|border201623px|border201723px|border201840px|borderNew ZealandNicaragua23px|border152423px|border182323px|border182523px|border183923px|border185823px|border188923px|border189323px|border189623px|border190823px|border197140px|borderNicaraguaNiger23px|border192223px|border195940px|borderNigerNigeria23px|border188623px|border190023px| border1958/195923px |border196023px|border196723px|border197040px|borderNigeria23px|border1967New Caledonia23px|border164323px|border179023px|border179423px|border181423px|border183023px|border197623px|border199140px|borderNew CaledoniaNiue23px|border176923px|border183423px|border184023px|border186723px|border190223px|border197540px|borderNiueNorth Macedonia23px|border479 BC23px|border324-148 BC25px|border128125px|border134625pxc. 145323px|border184423px|border 23px|border1903 190325px|border191223px|border191823px|border194123px|border194423px|border194623px|border199223px|border199323px|borderearly 199423px|border199423px|borderearly 199523px|border199540px|borderNorth MacedoniaNorway23px|border153623px|border1814 182123px|border1818 184423px|border1821 184423px|border184423px|border189923px|border1905/190640px|borderNorwayOman23px|border185623px|border197023px|border199540px|borderOmanPakistan23px|border550-330 BC23px|border329-323 BC23px|border240-41023px|border670-86023px|border854-101123px|border1227-135123px|border152623px|border174723px176123px|border184923px|border185823px|border188023px|border194740px|borderPakistanPalau23px|border188523px|border189923px|border191423px|border191923px|border194423px|border194723px|border196523px|border198140px|borderPalauPalestine25px151623px|border184423px|border192023px|border194823px|border194923px|border195823px|border195823px|border196723px|border198223px|border199440px|borderPalestine23px|border194923px|border195223px|border1958Panama23px|border151023px|border171723px|border178523px|border181123px|border181623px|border181923px|border182023px|border182123px|border183423px|border186123px|border190223px|border190323px|border192523px|border201740px|borderPanamaPapua New Guinea23px|border188423px|border190623px|border194223px|border194523px|border194923px|border196523px|border197023px|border197140px|borderPapua New Guinea23px|border188423px|border188923px|border191423px|border1945Paraguay23px|border153723px|border171723px|border178523px|border 23px|border 23px|border1811 1811 181123px|border181223px|border182623px|border184223px|border195423px|border198823px|border199023px|border2013/201540px|borderParaguayPeru23px|border 23px|border1532 153223px|border171723px|border178523px|border 23px|border1820 182023px|border 23px|border1822 182223px|border182523px|border182523px|border182523px|border195040px|borderPeru23px|border1836Philippines23px|border1515 23px|border190223px|border190823px|border191223px|border191923px|border193623px|border194223px|border194323px|border194523px|border198523px|border198523px|border198623px|border199523px|border199623px|border199723px|border199823px|border201023px|border201123px|border201623px|border201740px|borderPhilippines23px|border1985Poland25pxc. 1605Partitions179523px|border180723px|border181523px|border181523px|border186323px|border191923px|border192823px|border194423px| border198023px | border200123px|border200240px| borderPolandPortugal23px|border721-75023px|border166723px|border170723px|border175023px|border181623px|border182623px|border/23px|border183023px|border190823px|border1910/191123px|border191240px|borderPortugal23px|border/23px|border1830 (sea)Puerto Rico23px|border150623px|border170123px|border176023px|border178523px|border187323px|border189523px|border195240px|borderPuerto RicoQatar23px|border661-75025px181823px|border187223px|border191623px|border193223px|border193623px|border194923px|border197140px|borderQatarRomania23px|border168 BC23px|border133023px|border183423px|border184823px|border185923px|border186223px|border186723px|border 23px|border194823px|border195223px|border196523px|border198923px|border198940px|borderRomania23px|border111123px|border139623px|border1834Russia23px|border1283-129423px|border166823px|border172123px|border185823px|border188323px|border191423px|border191723px|border 23px|border191823px|border192223px|border192323px|border192423px|border193623px|border195523px|border199123px|border199340px|borderRussia23px|border193723px|border1954Rwanda23px|border188523px|border191923px|border195923px|border196123px|border196223px|border200140px|borderRwandaSahrawi Arab Democratic Republic23px|border188423px|border193123px|border193623px|border193823px|border194523px|border197640px|borderSahrawi Arab Democratic RepublicSaint Kitts and Nevis23px|border162623px|border171323px|border180123px|border187123px|border195823px|border196223px|border196723px|border198340px|borderSaint Kitts and Nevis23px|border1663Saint Lucia23px|border166323px|border171523px|border174323px|border175623px|border176223px|border176323px|border177823px|border178323px|border178923px|border179623px|border180123px|border180223px|border180323px|border190323px|border193923px|border196223px|border196723px|border197923px|border200240px|borderSaint LuciaSaint Vincent and the Grenadines23px|border166323px|border171523px|border176323px|border177823px|border178323px|border180123px|border190323px|border196223px|border197923px|border 23px|border1985 198540px|borderSaint Vincent and the GrenadinesSamoa23px|border185823px|border187323px|border187923px|border188723px|border190023px|border191423px|border192223px|border194823px|border194940px|borderSamoaSan Marino23px|border146523px|border186223px|border201140px|borderSan MarinoS\u00e3o Tom\u00e9 and Pr\u00edncipe23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197540px|borderS\u00e3o Tom\u00e9 and Pr\u00edncipeSaudi Arabia23px|border66123px|border750-94525px151723px|border / 23px|border174425px181823px|border182423px|border189123px|border190223px|border192623px|border193223px|border193423px|border193823px|border197340px|borderSaudi Arabia23px|border184423px|border1920Senegal23px|border164323px|border178923px|border181423px|border183023px|border195823px|border195923px|border196040px|borderSenegalSerbia25px|border128125px|border1346border|25px180423px|border183525px|border188223px|border191823px|border194123px|border194623px|border 23px|border1992 199223px|border200323px|border200423px|border201040px|borderSerbiaSeychelles23px|border175623px|border181123px|border190323px|border196123px|border197623px|border197723px|border199640px|borderSeychellesSierra Leone23px|border179223px|border180123px|border188923px|border196140px|borderSierra LeoneSingaporealt=|border|23x23px169923px|border / 23px|border181923px|border1874alt=|border|23x23px192523px|border1942alt=|border|23x23px194523px|border194623px|border195923px|border196323px|border196540px|borderSingaporeSlovakiaalt=|28px82523px|border180423px|border186923px|border191823px|border192023px|border193823px|border194523px|border199240px|borderSlovakiaSlovenia23px|border133523px|border180323px|border181323px|border186923px|border 23px|border1918 191823px|border194323px|border194523px|border198823px|border198923px|border199023px|border199140px|borderSloveniaSolomon Islands23px|border188623px|border190623px|border194223px|border194523px|border194723px|border195623px|border196623px|border197740px|borderSolomon Islands23px|border1893Somalia23px|border141523px|border188823px|border189623px|border1888/192023px|border194623px|border196040px|borderSomaliaSouth Africa23px|border165223px|border166423px|border179523px|border180123px|border187523px|border191023px|border191223px|border192723px|border192823px|border198223px| border199323px| border199440px|borderSouth Africa23px|border1854South Sudan23px|border184423px|border188223px|border188523px|border189923px|border192223px|border195223px|border195623px|border197023px|border2005/201140px|borderSouth SudanSpain23px|border661-75023px|border150623px|border170123px|border176023px|border178523px|border 23px|border1873 187523px|border193123px|border193623px|border193823px|border194523px|border197723px|border198140px|borderSpainSri Lanka23px|border159323px|border181523px|border194823px|border195123px|border197240px|borderSri LankaSudan23px|border184423px|border188223px|border188523px|border189923px|border192223px|border195223px|border195623px|border197040px|borderSudanSuriname23px|border158123px|border179523px|border180623px|border181023px|border181423px|border195923px|border197540px|borderSurinameSweden23px|border156225px181523px|border184423px|border1905/190640px|borderSwedenSwitzerland23px|border147023px|border179823px|border180323px|border188940px|borderSwitzerlandSyria23px|border539-331 BC23px|border750-89023px|border905-99023px|border1395-140525px151623px|border184423px|border 23px|border1920 192023px|border192223px|border193223px|border195825px|boder196123px|border196323px|border197223px|border198040px|borderSyriaTaiwanalt=|25px|border1624alt=|25px|border1640alt=|25px|border166125px168323px|border189023px|border189523px|border189523px|border194540px|borderChina, Republic of Taiwanborder|alt=|25x25px 1626Tajikistan23px|border186923px|border188323px|border191823px|border192123px|border 23px|border1929 23px|border193123px|border193523px|border193623px|border193823px|border194023px|border195323px|border199123px|border199240px|borderTajikistanTanzania23px|border188523px|border191923px|border196123px|border196440px|borderTanzania23px|border1964Thailand23px|border168023px|border178223px|border181723px|border1843alt=|border|23x23px189323px|border191623px|border / alt=|border|23x23px191723px|border / 23px|border201123px|border / 23px|border / 23px|border201740px|borderThailandTogo23px|border188423px|border191423px|border195723px|border195823px|border196040px|borderTogoTonga23px|border185823px|border186223px|border187540px|borderTongaTrinidad and Tobago23px|border149823px|border179623px|border180123px|border188923px|border196240px|borderTrinidad and TobagoTunisia25px157423px|border183123px|border197423px|border197423px|border199940px|borderTunisiaTurkey23px|border550 BC23px|border334-306 BC25px145323px|border184423px|border193640px|borderTurkey23px|border1453Turkmenistan23px|border151723px|border186823px|border188323px|border191723px|border192023px|border192223px|border192623px|border193723px|border194023px|border195323px|border199223px|border199723px|border200140px|borderTurkmenistanTuvalu23px|border189223px|border193723px|border197623px|border197823px|border 23px|border1995 199623px|border199740px|borderTuvaluUganda23px|border189423px|border191423px|border 23px|border1962 196240px|borderUgandaUkraine23px|border1240-126123px170023px|border179323px|border185823px|border188323px|border23px|border191723px|border191823px|border191923px|border192923px|border193723px|border194123px|border194423px|border194923px|border199123px|border199240px|borderUkraineUnited Arab Emirates23px|border224-62923px|border66123px|border750-125823px|border189223px|border195023px|border197140px|borderUnited Arab EmiratesUnited Kingdom23px|border51923px|border119823px|border126523px|border160623px|border170723px|border180140px|borderUnited Kingdom23px|border/23px|border154223px|border160623px|border1485United States of America23px|border160623px|border170723px|border177523px|border177723px|border179523px|border181823px|border 23px|border1819 182023px|border182223px|border183623px|border183723px|border 23px|border1845 184623px|border 23px|border1847 184823px|border185123px|border185823px|border185923px|border186123px|border186323px|border186523px|border186723px|border187723px|border189023px|border189123px|border189623px|border190823px|border191223px|border195923px|border/23px|border196040px|borderUnited States of America23px|border186123px|border186323px|border186523px|border2016Uruguay23px|border162423px|border171723px|border178523px|border181223px|border181523px|border182123px|border182223px|border182823px|border183040px|borderUruguayUzbekistan23px|border530 BC23px|border330-312 BC23px|border66123px|border750-81923px|border1206-122623px|border1370-151125px178523px|border192023px|border192423px|border195323px|border199140px|borderUzbekistanVanuatu23px|border188723px|border190623px|border195323px|border198040px|borderVanuatu23px|border190623px|border194023px|border1945Vatican City23px|border75423px|border180323px|border182523px|border184923px|border184923px|border187023px|border192940px|borderVatican CityVenezuela23px|border152223px|border178523px|border181123px|border 23px|border1812 181323px|border181423px|border 23px|border1817 181723px|border181923px|border182023px|border182123px|border183623px|border 23px|border1859 185923px|border186323px|border190523px|border193023px|border195423px|border200640px|borderVenezuelaVietnamalt=|23x23px|Vietnam177823px|Vietnam178823px|Vietnam180223px|border188523px|border188723px|border189023px|border192023px|border194523px|border195523px|border197640px|borderVietnam23px|border7/1945 23px|border9/194523px|border194623px|border194823px|border1975Wallis and Futuna23px|border164323px|border179023px|border179423px|border181423px|border183023px|border184223px|border186023px|border188623px|border188723px|border191023px|border195823px|border198540px|borderWallis and FutunaYemen23px|border187223px|border1918192323px|border192723px|border196223px|border199040px|borderYemen23px|border188623px|border193723px|border196223px|border1967Zambia23px|border192423px|border195323px|border196323px|border196423px|border199640px|borderZambiaZimbabwe23px|border189623px|border192323px|border195323px|border196423px|border196823px|border 197923px|border late 197923px|borderearly 198023px|border198040px|borderZimbabweCountries / decadesbeforeCurrentDecades / countries1700s to 1710s1710s to 1720s1720s to 1730s1730s to 1740s1740s to 1750s1750s to 1760s1760s to 1770s1770s to 1780s1780s to 1790s1790s to 1800s1800s to 1810s1810s to 1820s1820s to 1830s1830s to 1840s1840s to 1850s1850s to 1860s1860s to 1870s1870s to 1880s1880s to 1890s1890s to 1900s1900s1910s1920s1930s1940s1950s1960s1970s1980s1990s2000s2010s2020s Other flags Other flags / decadesBefore1700s1710s1720s1730s1740s1750s1760s1770s1780s1790s1800s1810s1820s1830s1840s1850s1860s1870s1880s1890s1900s1910s1920s1930s1940s1950s1960s1970s1980s1990s2000s2010s2020sCurrentDecades / Other flagsAntarctica23px|border197823px|border199523px| border199623px|border200723px|border200840pxAntarcticaArgentine Antarctica23px|border194323px|border199940pxArgentine AntarcticaBritish Antarctic Territory23px|border190823px|border192523px|border194823px|border196340pxBritish Antarctic TerritoryChilean Antarctic Territory23px|border194023px|border199740pxChilean Antarctic TerritoryEuropean Union23px|border195323px|border195540pxEuropean UnionFrench Southern and Antarctic Territories23px|border184023px|border195823px|border197623px|border200740pxFrench Southern and Antarctic TerritoriesJohnston Atoll23px|border185823px|border185923px|border186123px|border186323px|border186523px|border186723px|border187723px|border189023px|border189123px|border189623px|border190823px|border191223px|border195923px|border/23px|border196023px|border200140px|borderJohnston AtollMidway Atoll23px|border185923px|border186123px|border186323px|border186523px|border186723px|border187723px|border189023px|border189123px|border189623px|border190823px|border191223px|border195923px|border/23px|border196023px|border200040px|borderMidway AtollRoss Dependency23px|border192323px|border199540pxRoss DependencyUnited Nations23px|border194323px|border194523px|border194640pxUnited NationsWake Island23px|border189923px|border190823px|border191223px|border195923px|border/23px|border196023px|border200140px|borderWake IslandOther flags / decadesbeforeCurrentDecades / Other flags1700s1710s1720s1730s1740s1750s1760s1770s1780s1790s1800s1810s1820s1830s1840s1850s1860s1870s1880s1890s1900s1910s1920s1930s1940s1950s1960s1970s1980s1990s2000s2010s2020s", "after_revision": "Sovereign states Countries / decadesbefore/Pre-1700s1700s to 1710s1710s to 1720s1720s to 1730s1730s to 1740s1740s to 1750s1750s to 1760s1760s to 1770s1770s to 1780s1780s to 1790s1790s to 1800s1800s to 1810s1810s to 1820s1820s to 1830s1830s to 1840s1840s to 1850s1850s to 1860s1860s to 1870s1870s to 1880s1880s to 1890s1890s to 1900s1900s to 1910s1910s to 1920s1920s to 1930s1930s to 1940s1940s to 1950s1950s to 1960s1960s to 1970s1970s to 1980s1980s to 1990s1990s to 2000s2000s to 2010s2010s to 2020s2020s to presentCurrentDecades / countriesAfghanistan23px|border549-330 BC23px|border32023px|border50023px|border66123px|border750-82123px|border123123px|border136923px|border150623px|border157623px|border170923px|border173823px|border174723px|border188023px|border190123px|border191923px|border192623px|border192823px|border 23px|border1929 192923px|border193023px|border197323px|border197423px|border 23px|border1978 197823px|border198023px|border198723px|border 23px|border1992 199223px|border199623px|border199723px|border 23px|border2001 200123px|border200223px|border200423px|border201340px|borderAfghanistan23px|border549-256 BC\u00c5land23px|border156223px|border180923px|border185823px|border188323px|border191723px|border191823px|border192123px|border195440px|border\u00c5landAlbania25px138523px|border184423px|border187823px|border188123px|border190223px|border 23px|border1910 191123px|border 23px|border1912 191423px|border192023px|border192623px|border192823px|border193423px|border193923px|border194323px|border194423px|border194623px|border199223px|border200240px|borderAlbaniaAlgeria23px|border66123px|border750-77823px|border151623px|border183023px|border196240px|borderAlgeriaAndorra23px|border180623px|border 23px|border1812 1813186623px|border193423px|border193923px|border194923px|border195923px|border197140px|borderAndorraAngola23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197523px|border199623px|border199723px|border200323px|border200440px|borderAngolaAntigua and Barbuda23px|border163223px|border180123px|border187123px|border195723px|border195823px|border196223px|border196740px|borderAntigua and BarbudaArgentina23px|border153623px|border171723px|border178523px|border 23px|border1812 181223px|border 23px|border1818 181923px|border182023px|border182923px|border183523px|border185023px|border186140px|borderArgentinaArmenia23px|border549-331 BC23px|border42823px|border65423px|border750-88423px|border1236-133523px|border1468-150225px150823px|border182823px|border185823px|border188323px|border188523px|border 23px|border1918 191823px|border192223px|border193623px|border194023px|border195223px|border199040px|borderArmeniaAruba23px|border 158123px|border / 23px|border165223px|border179523px|border180623px|border181023px|border181423px|border195923px|border197640px|borderArubaAustralia23px|border177023px|border180123px|border180623px| border190123px|border190323px|border190823px|border195423px|border199323px|border199423px|border199823px|border199923px|border201423px|border201540px|borderAustraliaAustria23px|border123023px|border180423px|border186923px|border191823px|border193823px|border194540px|borderAustriaAzerbaijan23px|border550-330 BC23px|border66123px|border750-125823px|border1370-150723px|border157623px|border173623px|border174725px176023px|border179623px|border181323px|border185823px|border188323px|border 23px|border 23px|border1918 1918 191823px|border192023px|border192223px|border193723px|border194023px|border195223px|border199040px|borderAzerbaijanBahamas23px|border164823px|border170623px|border171823px|border180123px|border186923px|border190423px|border192323px|border195323px|border196423px|border197223px|border197323px|border200640px|borderBahamasBahrain23px|border976-107623px|border178323px|border182023px|border193223px|border197223px|border200240px|borderBahrainBangladesh23px|border135223px|border157623px|border175723px|border180123px|border185823px|border194723px|border197123px|border197240px|borderBangladeshBarbados23px|border163223px|border180123px|border188523px|border195823px|border196223px|border196640px|borderBarbadosBelarus23px|border158723px|border179323px|border185823px|border188323px|border191823px|border 23px|border1919 191923px|border193723px|border194023px|border194123px|border194423px|border195123px|border199123px| border199523px|border201240px|borderBelarusBelgium23px|border148223px|border171323px|border179023px|border179223px|border179523px|border181523px|border 23px|border1830 183140px | borderBelgiumBelize23px|border151923px|border182123px|border182323px|border182523px|border183823px|border187523px|border188423px|border191923px|border198123px|border201940px|borderBelizeBenin23px|border190023px|border195823px|border197523px|border199040px|borderBeninBermuda23px|border168423px|border180123px|border187523px|border191023px|border199923px|border200223px|border200340px|borderBermudaBhutan23px|border194923px|border195623px|border196940px|borderBhutanBolivia23px|border153423px|border178523px|border182523px|border182623px|border185140px|borderBoliviaBosnia and Herzegovina25px137725px146323px|border184423px|border 23px|border1878 187823px|border190823px|border191823px|border194123px|border194623px|border199223px|border199523px|border199723px|border199840px|borderBosnia and Herzegovina23px|border144823px|border1908Botswana23px|border188523px|border196640px|borderBotswanaBrazil23px|border169723px|border 23px|border1816 181623px|border 23px|border1822 182223px|border187023px|border 23px|border1889 188923px| border196023px|border196823px|border199240px|borderBrazilBrunei25px136823px|border190623px|border194123px|border194523px|border195940px|borderBruneiBulgaria25px139623px|border184423px|border187823px|border190823px|border191823px|border194623px|border194823px|border196723px|border197123px|border199140px|borderBulgaria23px|border187823px|border1908Burkina Faso23px|border189623px|border195923px|border198440px|borderBurkina FasoBurundi23px|border188523px|border191923px|border196123px|border196223px|border 23px|border1966 196623px|border196723px|border198240px|borderBurundiCambodiaalt=|25x25px1431?23px|border186323px|border188723px|border194223px|border194523px|border195323px|border197023px|border197523px|border197923px|border198923px|border199223px|border199340px|borderCambodiaCameroon23px|border188423px|border191623px|border195723px|border196123px|border197540px|borderCameroon23px|border191623px|border1922Canada23px|border160623px|border170723px|border180123px|border186823px|border192123px|border195723px|border196423px|border196540px|borderCanada23px|border166323px|border1715Cape Verde23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197523px|border199240px|borderCape VerdeCayman Islands23px|border167023px|border180123px|border195823px|border199940px|borderCayman IslandsCentral African Republic23px|border190323px|border195840px|borderCentral African RepublicChad23px70023px|border138023px|border190023px|border195940px|borderChadChile23px|border154123px|border171723px|border178523px|border181223px|border 23px|border1817 181740px|borderChileChina25px164423px|border189023px|border191223px|border191523px|border191623px|border191723px|border192823px|border194940px|borderChina, People's Republic ofColombia23px|border152523px|border178523px|border181123px|border181423px|border181623px|border181923px|border 23px|border1820 182123px|border183123px|border183423px|border 23px|border1861 186140px|borderColombiaComoros23px|border188723px|border196323px|border197523px|border197823px|border199223px|border199623px|border200140px|borderComorosCongo, Democratic Republic of the23px|border187723px| border196023px|border196323px|border196623px|border197123px|border199723px|border200323px|border200640px|borderCongo, Democratic Republic of theCongo, Republic of the23px|border189123px|border195823px|border197023px|border199140px|borderCongo, Republic of theCook Islands23px|border185823px|border188823px|border189323px|border190123px|border190223px|border197323px|border197940px|borderCook IslandsCosta Rica23px|border150623px|border1821 23px|border182123px|border182323px|border 23px|border 23px|border1824 1824 182423px|border184023px|border184223px|border184823px|border190640px|borderCosta RicaCroatia23px|border152723px|border180923px|border181523px|border184823px|border185223px|border186823px|border 23px|border1918 191823px|border193923px|border194123px|border194323px|border194523px|border199023px|border199040px|borderCroatiaCura\u00e7ao23px|border 158123px|border / 23px|border165223px|border179523px|border180623px|border181023px|border181423px|border195923px|border198140px|borderCura\u00e7aoCuba23px|border150623px|border178523px|border187323px|border189823px|border190223px|border190623px|border190823px|border190923px|border195940px|borderCubaCyprus23px|border545 BC23px|border321-305 BC23px|border66823px|border750-96523px|border119223px|border148925px157123px|border184423px|border187823px|border188123px|border192223px|border 23px|border196023px|border200423px|border200640px|borderCyprusCzech Republicalt=|border|23x23px119823px|border180423px|border186923px|border191823px|border192023px|border193923px|border193923px|border194523px|border/23px|border196923px| border199340px|borderCzech RepublicDenmark23px|border121923px|border139623px|border150040px|borderDenmarkDjibouti23px|border184423px|border189623px|border197740px|borderDjiboutiDominica23px|border166323px|border171523px|border176323px|border180123px|border187123px|border194023px|border195823px|border196223px|border197823px|border198123px|border198823px|border199040px|borderDominicaDominican Republic23px|border150623px|border179523px|border180823px|border182123px|border184423px|border184923px|border186123px|border186540px|borderDominican RepublicEast Timor23px|border170223px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border194223px|border194523px|border197523px|border197523px|border197623px|border199923px|border200240px|borderEast TimorEcuador23px|border153423px|border178523px|border180923px|border181223px|border182023px|border 23px|border1822 182223px|border183023px|border183523px|border 23px|border1845 184523px|border186023px|border190023px|border200940px|borderEcuadorEgypt23px|border525-404 BC23px|border343 BC23px|border332-323 BC23px|border619-62923px|border66123px|border750-96923px|border184423px|border188223px|border192223px|border195123px|border195223px|border195823px|border197223px|border198440px|borderEgyptEl Salvador23px|border151923px|border182123px|border182323px|border182523px|border183923px|border186523px|border187323px|border1875/187723px|border189823px|border190023px|border191240px|borderEl SalvadorEquatorial Guinea23px|border166723px|border170723px|border175023px|border177823px|border178523px|border193123px|border193623px|border193823px|border194523px|border196823px|border197323px|border197940px|borderEquatorial GuineaEritrea23px|border189023px|border194123px|border194123px|border195223px|border197423px|border198723px|border199123px|border199323px|border199540px|borderEritreaEstonia23px|border156223px|border172123px|border191823px|border191923px|border192023px|border192123px|border192223px|border192323px|border194023px|border194123px|border194423px|border195323px|border199023px|border200123px|border200240px|borderEstoniaEswatini23px|border189023px|border189423px|border190323px|border196823px|border201140px|borderEswatiniEthiopia25px185325px187525px189123px|border189723px|border191423px|border193623px|border194123px|border197423px|border198723px|border199123px|border199623px|border200940px|borderEthiopiaFaroe Islands23px|border121923px|border194040px|borderFaroe IslandsFiji23px|border 186523px|border186723px|border186923px|border187123px|border187823px|border192423px|border197023px|border201523px|border201640px|borderFijiFinland23px|border156223px|border180923px|border185823px| border188323px|border191723px|border191840px|borderFinlandFrance23px|border164323px|border179023px|border179423px|border181423px|border183023px|border194023px|border194423px|border195823px|border197640px|borderFranceFrench Guiana23px|border164323px|border179423px|border181423px|border183023px|border195823px|border197623px|border199540px|borderFrench GuianaFrench Polynesia23px|border164323px|border179023px|border179423px|border181423px|border183023px|border197623px|border198440px|borderFrench PolynesiaGabon23px|border190323px|border195923px|border196040px|borderGabonGambia23px|border178323px|border180123px|border196540px|borderGambiaGeorgia23px|border1008-149023px|border176223px|border180123px|border185823px|border188323px|border 23px|border1918 191823px|border192123px|border192223px|border193723px|border195123px|border199023px|border200440px|borderGeorgiaGermany23px|border1400 23px|border143323px|border180623px|border181523px|border181723px|border181823px|border183223px|border183323px|border184823px|border186723px|border191823px|border191923px|border192623px|border192723px|border23px|border193323px|border193525px194425px194625px194725px194823px|border23px|border194923px|border23px|border199040px|borderGermany23px|border194923px|border1959Ghana23px|border182123px|border187723px|border195723px|border196123px|border196423px|border196640px|borderGhana23px|border161223px|border179523px|border180623px|border181023px|border1814Greece23px|border33023px|border126123px|border176923px|border182223px|border183323px|border186223px|border196723px|border197023px|border197523px|border197840px|borderGreece23px|border1822 naval ensignGreenland23px|border160623px|border197323px|border198323px|border198423px|border198523px|border199123px|border199223px|border199340px|borderGreenlandGrenada23px|border166323px|border171523px|border176323px|border177923px|border178323px|border180123px|border187523px|border190323px|border195823px|border196223px|border196723px|border197440px|borderGrenadaGuam23px|border188523px|border189923px|border191423px|border191923px|border194423px|border194723px|border194840px|borderGuamGuatemala23px|border151923px|border182123px|border182323px|border182523px|border183823px|border184323px|border185123px|border185823px|border187140px|borderGuatemalaGuinea23px|border189823px|border195840px|borderGuineaGuinea-Bissau23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197440px|borderGuinea-BissauGuyana23px|border158123px|border179523px|border180623px|border181023px|border181423px|border187523px|border190623px|border191923px|border195523px|border196640px|borderGuyanaHaiti23px|border166323px|border171523px|border179023px|border179123px|border179823px|border180323px|border180423px|border180623px|border181123px|border182123px|border184923px|border185923px|border196423px|border198640px|borderHaitiHonduras23px|border151923px|border182123px|border182323px|border182523px|border183823px|border186623px|border189823px|border189840px|borderHondurasHong Kong23px|border184323px|border187123px|border187623px|border194123px|border194523px|border195523px|border195923px|border199740px|borderHong KongHungary25px89525px104625px117225pxc. 119625pxc. 130125px130125px1387border|23px144625pxc. 145325px145825px150625px1516-1526border|23px1794border|23px1848border|23px1848\u20131849border|23px1867\u20131869border|23px1869\u20131918border|23px1896\u2013191523px|border191823px|border191923px|border191923px|border194023px|border194623px|border194923px|border195623px|border195623px|border23px|border195740px|borderHungaryIceland23px|border153623px|border180923px|border181023px|border190023px|border191823px|border194440px|borderIcelandIndia23px|border152623px|border185823px|border190423px|border190623px|border190723px|border190823px|border191723px|border192123px|border193123px|border194740px|borderIndia25px167423px|border177323px|border1910Indonesia23px|border1293alt=|25px|border160223px|border164023px|border180023px|border194223px|border194540px|borderIndonesiaIran23px|border66123px|border750-125823px|border1370-150723px|border157623px|border173623px|border174725px176023px|border179623px|border184923px|border1905/1906/190723px|border1925/193323px|border196423px|border198040px|borderIranIraq23px|border539-330 BC23px|border66123px|border750-94523px|border1194-125823px|border1394-145125px153423px|border184423px|border192123px|border195823px|border195923px|border196323px|border199123px|border200423px|border200723px|border200840px|borderIraq23px|border1194-1258Ireland23px|border154223px|border180123px|border191923px|border192240px|borderIrelandIsrael25px151623px|border184423px|border192023px|border194823px|border194840px| borderIsraelItaly 23px | border1802 23px | border1805 1814 23px | border186123px | border ( 23px|border ) 23px | border194623px|border200323px|border200640px|borderItaly23px| border (23px | border)1943 Ivory Coast23px|border189623px|border195940px|borderIvory CoastJamaica23px|border165523px|border180123px|border187523px|border190623px|border195723px|border195823px|border195923px|border196023px|border196123px|border196240px|borderJamaicaJapan23px|border70123px|border187023px|border199940px|borderJapanJordan23px|border539-330 BC23px|border66123px|border750-96925px151623px|border184423px|border192023px|border192123px|border195823px|border195840px|borderJordanKazakhstan23px|border1220-144023px|border145623px|border182223px|border185823px|border188323px|border191523px|border23px|border23px|border23px|border23px|border23px|border23px|border23px|border23px|border192023px|border23px|border23px|border23px|border23px|border23px|border23px|border192723px|border193223px|border193723px|border194023px|border195323px|border199023px|border199123px|border199240px|borderKazakhstanKenya23px|border188523px|border188523px|border192123px|border196340px|borderKenyaKiribati23px|border189223px|border193723px|border194223px|border194323px|border197940px|borderKiribatiKorea, North25px96025px180025px185623px|border188223px|border188223px|border1888189323px|border189323px|border189923px|border191023px|border194523px|border 23px|border1946 194623px|border194823px|border199240px|borderKorea, NorthKorea, South23px|border194525px|border194825px|border194925px|border198425px|border199725px|border201140px|borderKorea, SouthKosovo25px|border128125px|border134625px145425px|border184425px|border191225px|border191825px|border194125px|border194325px|border194625px|border 25px|border199225px|border200425px|border200525px|border200625px|border200725px|border200840px|borderKosovoKuwait23px|border152123px175223px|border184423px|border189923px|border191423px|border192123px|border194023px|border196140px|borderKuwaitKyrgyzstan23px|border97623px|border187623px|border188323px|border191823px|border193623px|border195223px|border199123px|border199223px|border201023px|border201123px|border201240px|borderKyrgyzstanLaos23px|border170723px|border189323px|border195223px|border197540px|borderLaosLatvia23px|border156223px|border166123px|border169223px|border172123px|border191723px|border191823px|border191923px|border192023px| border194023px|border194123px|border194423px|border195323px|border199040px|borderLatviaLebanon23px|border538-332 BC23px|border750-87623px|border905-96925px151623px|border151623px|border169725px184023px|border184423px|border191823px|border192023px|border194340px|borderLebanonLesotho23px|border179523px|border180123px|border187523px|border188423px|border196623px|border198723px|border200640px|borderLesothoLiberia23px|border182723px|border184740px|borderLiberiaLibya23px|border525-331 BC23px|border66323px|border750-96923px|border171123px|border191223px|border195123px|border196923px|border197223px|border197723px|border201140px|borderLibyaLiechtenstein23px|border140023px|border171923px|border185223px|border192123px|border193723px|border198240px|borderLiechtensteinLithuania23px|border158723px|border179523px|border185823px|border188323px|border191823px|border194023px|border194123px|border194423px|border195323px|border198823px|border200440px|borderLithuaniaLuxembourg23px|border148223px|border171523px|border179523px|border181523px|border184523px|border194023px|border194440px|borderLuxembourgMacau23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197523px|border199940px|borderMacauMadagascar23px|border 178723px|border188523px|border189623px|border195840px|borderMadagascarMalawi23px|border190723px|border195323px|border196323px|border196423px|border201023px|border201240px|borderMalawiMalaysia23px|border164123px|border/alt=|border|23x23px179523px|border / 23px|border180123px|border181823px|border / 23px|border182423px|border189623px|border194223px|border194523px|border194823px|border194923px|border196340px|borderMalaysiaMaldives23px|border179623px|border190323px|border192623px|border195323px|border195423px|border196540px|borderMaldivesMali23px|border189223px|border195823px|border195923px|border196140px|borderMaliMalta23px|border870-90923px|border153023px|border179823px|border 23px|border1800 180123px|border181423px|border187523px|border189823px|border192323px|border194323px|border196440px|borderMaltaMarshall Islands23px|border188523px|border188923px|border191423px|border191923px|border194423px|border194723px|border196523px|border197940px|borderMarshall IslandsMauritania23px|border190023px|border195923px|border201723px|border202040px|borderMauritaniaMauritius23px|border166623px|border171023px|border178923px|border181023px|border186923px|border190623px|border192323px|border196840px|borderMauritiusMexico23px|border151923px|border182123px|border182123px|border182323px|border186423px|border186723px|border189323px|border191623px|border193423px|border196840px|borderMexicoMicronesia23px|border188523px|border189923px|border191423px|border191923px|border194423px|border194723px|border196523px|border197940px|borderMicronesiaMoldova23px|border139623px|border183423px|border186623px|border188323px|border191723px|border191923px|border192523px|border193723px|border193823px|border194023px|border195223px|border199040px|borderMoldova23px|border185923px|border186223px|border1867Monaco23px|border179323px|border188123px|border194223px|border194540px|borderMonacoMongolia25px186223px|border189023px191123px192423px193023px|border194023px|border194523px|border199223px|border201140px|borderMongoliaMontenegro25px|border128125px|border134623px|border169623px|border185123px|border187623px|border190525px|border191823px|border191823px|border194623px|border199223px|border199423px|border200323px|border2004/200640px|borderMontenegroMorocco23px|border166623px|border191323px|border195640px|borderMorocco23px|border1921Mozambique23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197423px|border197523px|border198323px|border198340px|borderMozambiqueMyanmar23px|border175323px|border188523px|border193723px|border194323px|border194523px|border194823px|border197423px|border200623px|border201023px|border201923px|border202040px|borderMyanmarNamibia23px|border188423px|border191523px|border192823px|border198223px|border199040px|borderNamibiaNauru23px|border188823px|border188923px|border 23px|border 23px|border191423px|border194223px|border 23px|border 23px|border194523px|border196840px|borderNauruNepalframeless|56x56px 1768frameless|37x37px185625pxc.193025px196242pxNepalNetherlands23px|border 158123px|border / 23px|border165223px|border179523px|border180623px|border181023px|border181440px|borderNetherlandsNew Zealand23px|border176923px|border183423px|border184023px|border186723px|border190223px| border201523px|border201623px|border201723px|border201840px|borderNew ZealandNicaragua23px|border152423px|border182323px|border182523px|border183923px|border185823px|border188923px|border189323px|border189623px|border190823px|border197140px|borderNicaraguaNiger23px|border192223px|border195940px|borderNigerNigeria23px|border188623px|border190023px| border195923px |border196023px|border196723px|border197040px|borderNigeria23px|border1967New Caledonia23px|border164323px|border179023px|border179423px|border181423px|border183023px|border197623px|border199140px|borderNew CaledoniaNiue23px|border176923px|border183423px|border184023px|border186723px|border190223px|border197540px|borderNiueNorth Macedonia23px|border479 BC23px|border324-148 BC25px|border128125px|border134625pxc. 145323px|border184423px|border 23px|border1903 190325px|border191223px|border191823px|border194123px|border194423px|border194623px|border199223px|border199323px|borderearly 199423px|border199423px|borderearly 199523px|border199540px|borderNorth MacedoniaNorway23px|border153623px|border1814 182123px|border1818 184423px|border1821 184423px|border184423px|border189923px|border1905/190640px|borderNorwayOman23px|border185623px|border197023px|border199540px|borderOmanPakistan23px|border550-330 BC23px|border329-323 BC23px|border240-41023px|border670-86023px|border854-101123px|border1227-135123px|border152623px|border174723px176123px|border184923px|border185823px|border188023px|border194740px|borderPakistanPalau23px|border188523px|border189923px|border191423px|border191923px|border194423px|border194723px|border196523px|border198140px|borderPalauPalestine25px151623px|border184423px|border192023px|border194823px|border194923px|border195823px|border195823px|border196723px|border198223px|border199440px|borderPalestine23px|border194923px|border195223px|border1958Panama23px|border151023px|border171723px|border178523px|border181123px|border181623px|border181923px|border182023px|border182123px|border183423px|border186123px|border190223px|border190323px|border192523px|border201740px|borderPanamaPapua New Guinea23px|border188423px|border190623px|border194223px|border194523px|border194923px|border196523px|border197023px|border197140px|borderPapua New Guinea23px|border188423px|border188923px|border191423px|border1945Paraguay23px|border153723px|border171723px|border178523px|border 23px|border 23px|border1811 1811 181123px|border181223px|border182623px|border184223px|border195423px|border198823px|border199023px|border2013/201540px|borderParaguayPeru23px|border 23px|border1532 153223px|border171723px|border178523px|border 23px|border1820 182023px|border 23px|border1822 182223px|border182523px|border182523px|border182523px|border195040px|borderPeru23px|border1836Philippines23px|border1515 23px|border190223px|border190823px|border191223px|border191923px|border193623px|border194223px|border194323px|border194523px|border198523px|border198523px|border198623px|border199523px|border199623px|border199723px|border199823px|border201023px|border201123px|border201623px|border201740px|borderPhilippines23px|border1985Poland25pxc. 1605Partitions179523px|border180723px|border181523px|border181523px|border186323px|border191923px|border192823px|border194423px| border198040px | borderPolandPortugal23px|border721-75023px|border166723px|border170723px|border175023px|border181623px|border182623px|border/23px|border183023px|border190823px|border1910/191123px|border191240px|borderPortugal23px|border/23px|border1830 (sea)Puerto Rico23px|border150623px|border170123px|border176023px|border178523px|border187323px|border189523px|border195240px|borderPuerto RicoQatar23px|border661-75025px181823px|border187223px|border191623px|border193223px|border193623px|border194923px|border197140px|borderQatarRomania23px|border168 BC23px|border133023px|border183423px|border184823px|border185923px|border186223px|border186723px|border 23px|border194823px|border195223px|border196523px|border198923px|border198940px|borderRomania23px|border111123px|border139623px|border1834Russia23px|border1283-129423px|border166823px|border172123px|border185823px|border188323px|border191423px|border191723px|border 23px|border191823px|border192223px|border192323px|border192423px|border193623px|border195523px|border199123px|border199340px|borderRussia23px|border193723px|border1954Rwanda23px|border188523px|border191923px|border195923px|border196123px|border196223px|border200140px|borderRwandaSahrawi Arab Democratic Republic23px|border188423px|border193123px|border193623px|border193823px|border194523px|border197640px|borderSahrawi Arab Democratic RepublicSaint Kitts and Nevis23px|border162623px|border171323px|border180123px|border187123px|border195823px|border196223px|border196723px|border198340px|borderSaint Kitts and Nevis23px|border1663Saint Lucia23px|border166323px|border171523px|border174323px|border175623px|border176223px|border176323px|border177823px|border178323px|border178923px|border179623px|border180123px|border180223px|border180323px|border190323px|border193923px|border196223px|border196723px|border197923px|border200240px|borderSaint LuciaSaint Vincent and the Grenadines23px|border166323px|border171523px|border176323px|border177823px|border178323px|border180123px|border190323px|border196223px|border197923px|border 23px|border1985 198540px|borderSaint Vincent and the GrenadinesSamoa23px|border185823px|border187323px|border187923px|border188723px|border190023px|border191423px|border192223px|border194823px|border194940px|borderSamoaSan Marino23px|border146523px|border186223px|border201140px|borderSan MarinoS\u00e3o Tom\u00e9 and Pr\u00edncipe23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197540px|borderS\u00e3o Tom\u00e9 and Pr\u00edncipeSaudi Arabia23px|border66123px|border750-94525px151723px|border / 23px|border174425px181823px|border182423px|border189123px|border190223px|border192623px|border193223px|border193423px|border193823px|border197340px|borderSaudi Arabia23px|border184423px|border1920Senegal23px|border164323px|border178923px|border181423px|border183023px|border195823px|border195923px|border196040px|borderSenegalSerbia25px|border128125px|border1346border|25px180423px|border183525px|border188223px|border191823px|border194123px|border194623px|border 23px|border1992 199223px|border200323px|border200423px|border201040px|borderSerbiaSeychelles23px|border175623px|border181123px|border190323px|border196123px|border197623px|border197723px|border199640px|borderSeychellesSierra Leone23px|border179223px|border180123px|border188923px|border196140px|borderSierra LeoneSingaporealt=|border|23x23px169923px|border / 23px|border181923px|border1874alt=|border|23x23px192523px|border1942alt=|border|23x23px194523px|border194623px|border195923px|border196323px|border196540px|borderSingaporeSlovakiaalt=|28px82523px|border180423px|border186923px|border191823px|border192023px|border193823px|border194523px|border199240px|borderSlovakiaSlovenia23px|border133523px|border180323px|border181323px|border186923px|border 23px|border1918 191823px|border194323px|border194523px|border198823px|border198923px|border199023px|border199140px|borderSloveniaSolomon Islands23px|border188623px|border190623px|border194223px|border194523px|border194723px|border195623px|border196623px|border197740px|borderSolomon Islands23px|border1893Somalia23px|border141523px|border188823px|border189623px|border1888/192023px|border194623px|border196040px|borderSomaliaSouth Africa23px|border165223px|border166423px|border179523px|border180123px|border187523px|border191023px|border191223px|border192723px|border192823px|border198223px| border199440px|borderSouth Africa23px|border1854South Sudan23px|border184423px|border188223px|border188523px|border189923px|border192223px|border195223px|border195623px|border197023px|border2005/201140px|borderSouth SudanSpain23px|border661-75023px|border150623px|border170123px|border176023px|border178523px|border 23px|border1873 187523px|border193123px|border193623px|border193823px|border194523px|border197723px|border198140px|borderSpainSri Lanka23px|border159323px|border181523px|border194823px|border195123px|border197240px|borderSri LankaSudan23px|border184423px|border188223px|border188523px|border189923px|border192223px|border195223px|border195623px|border197040px|borderSudanSuriname23px|border158123px|border179523px|border180623px|border181023px|border181423px|border195923px|border197540px|borderSurinameSweden23px|border156225px181523px|border184423px|border1905/190640px|borderSwedenSwitzerland23px|border147023px|border179823px|border180323px|border188940px|borderSwitzerlandSyria23px|border539-331 BC23px|border750-89023px|border905-99023px|border1395-140525px151623px|border184423px|border 23px|border1920 192023px|border192223px|border193223px|border195825px|boder196123px|border196323px|border197223px|border198040px|borderSyriaTaiwanalt=|25px|border1624alt=|25px|border1640alt=|25px|border166125px168323px|border189023px|border189523px|border189523px|border194540px|borderChina, Republic of Taiwanborder|alt=|25x25px 1626Tajikistan23px|border186923px|border188323px|border191823px|border192123px|border 23px|border1929 23px|border193123px|border193523px|border193623px|border193823px|border194023px|border195323px|border199123px|border199240px|borderTajikistanTanzania23px|border188523px|border191923px|border196123px|border196440px|borderTanzania23px|border1964Thailand23px|border168023px|border178223px|border181723px|border1843alt=|border|23x23px189323px|border191623px|border / alt=|border|23x23px191723px|border / 23px|border201123px|border / 23px|border / 23px|border201740px|borderThailandTogo23px|border188423px|border191423px|border195723px|border195823px|border196040px|borderTogoTonga23px|border185823px|border186223px|border187540px|borderTongaTrinidad and Tobago23px|border149823px|border179623px|border180123px|border188923px|border196240px|borderTrinidad and TobagoTunisia25px157423px|border183123px|border197423px|border197423px|border199940px|borderTunisiaTurkey23px|border550 BC23px|border334-306 BC25px145323px|border184423px|border193640px|borderTurkey23px|border1453Turkmenistan23px|border151723px|border186823px|border188323px|border191723px|border192023px|border192223px|border192623px|border193723px|border194023px|border195323px|border199223px|border199723px|border200140px|borderTurkmenistanTuvalu23px|border189223px|border193723px|border197623px|border197823px|border 23px|border1995 199623px|border199740px|borderTuvaluUganda23px|border189423px|border191423px|border 23px|border1962 196240px|borderUgandaUkraine23px|border1240-126123px170023px|border179323px|border185823px|border188323px|border23px|border191723px|border191823px|border191923px|border192923px|border193723px|border194123px|border194423px|border194923px|border199123px|border199240px|borderUkraineUnited Arab Emirates23px|border224-62923px|border66123px|border750-125823px|border189223px|border195023px|border197140px|borderUnited Arab EmiratesUnited Kingdom23px|border51923px|border119823px|border126523px|border160623px|border170723px|border180140px|borderUnited Kingdom23px|border/23px|border154223px|border160623px|border1485United States of America23px|border160623px|border170723px|border177523px|border177723px|border179523px|border181823px|border 23px|border1819 182023px|border182223px|border183623px|border183723px|border 23px|border1845 184623px|border 23px|border1847 184823px|border185123px|border185823px|border185923px|border186123px|border186323px|border186523px|border186723px|border187723px|border189023px|border189123px|border189623px|border190823px|border191223px|border195923px|border/23px|border196040px|borderUnited States of America23px|border186123px|border186323px|border186523px|border2016Uruguay23px|border162423px|border171723px|border178523px|border181223px|border181523px|border182123px|border182223px|border182823px|border183040px|borderUruguayUzbekistan23px|border530 BC23px|border330-312 BC23px|border66123px|border750-81923px|border1206-122623px|border1370-151125px178523px|border192023px|border192423px|border195323px|border199140px|borderUzbekistanVanuatu23px|border188723px|border190623px|border195323px|border198040px|borderVanuatu23px|border190623px|border194023px|border1945Vatican City23px|border75423px|border180323px|border182523px|border184923px|border184923px|border187023px|border192940px|borderVatican CityVenezuela23px|border152223px|border178523px|border181123px|border 23px|border1812 181323px|border181423px|border 23px|border1817 181723px|border181923px|border182023px|border182123px|border183623px|border 23px|border1859 185923px|border186323px|border190523px|border193023px|border195423px|border200640px|borderVenezuelaVietnamalt=|23x23px|Vietnam177823px|Vietnam178823px|Vietnam180223px|border188523px|border188723px|border189023px|border192023px|border194523px|border195523px|border197640px|borderVietnam23px|border7/1945 23px|border9/194523px|border194623px|border194823px|border1975Wallis and Futuna23px|border164323px|border179023px|border179423px|border181423px|border183023px|border184223px|border186023px|border188623px|border188723px|border191023px|border195823px|border198540px|borderWallis and FutunaYemen23px|border187223px|border1918192323px|border192723px|border196223px|border199040px|borderYemen23px|border188623px|border193723px|border196223px|border1967Zambia23px|border192423px|border195323px|border196323px|border196423px|border199640px|borderZambiaZimbabwe23px|border189623px|border192323px|border195323px|border196423px|border196823px|border 197923px|border late 197923px|borderearly 198023px|border198040px|borderZimbabweCountries / decadesbeforeCurrentDecades / countries1700s to 1710s1710s to 1720s1720s to 1730s1730s to 1740s1740s to 1750s1750s to 1760s1760s to 1770s1770s to 1780s1780s to 1790s1790s to 1800s1800s to 1810s1810s to 1820s1820s to 1830s1830s to 1840s1840s to 1850s1850s to 1860s1860s to 1870s1870s to 1880s1880s to 1890s1890s to 1900s1900s1910s1920s1930s1940s1950s1960s1970s1980s1990s2000s2010s2020s Other flags Other flags / decadesBefore1700s1710s1720s1730s1740s1750s1760s1770s1780s1790s1800s1810s1820s1830s1840s1850s1860s1870s1880s1890s1900s1910s1920s1930s1940s1950s1960s1970s1980s1990s2000s2010s2020sCurrentDecades / Other flagsAntarctica23px|border197823px|border199523px| border199640pxAntarcticaArgentine Antarctica23px|border194323px|border199940pxArgentine AntarcticaBritish Antarctic Territory23px|border190823px|border192523px|border194823px|border196340pxBritish Antarctic TerritoryChilean Antarctic Territory23px|border194023px|border199740pxChilean Antarctic TerritoryFrench Southern and Antarctic Territories23px|border184023px|border195823px|border197623px|border200740pxFrench Southern and Antarctic TerritoriesJohnston Atoll23px|border185823px|border185923px|border186123px|border186323px|border186523px|border186723px|border187723px|border189023px|border189123px|border189623px|border190823px|border191223px|border195923px|border/23px|border196023px|border200140px|borderJohnston AtollMidway Atoll23px|border185923px|border186123px|border186323px|border186523px|border186723px|border187723px|border189023px|border189123px|border189623px|border190823px|border191223px|border195923px|border/23px|border196023px|border200040px|borderMidway AtollRoss Dependency23px|border192323px|border199540pxRoss DependencyUnited Nations23px|border194323px|border194523px|border194640pxUnited NationsWake Island23px|border189923px|border190823px|border191223px|border195923px|border/23px|border196023px|border200140px|borderWake IslandOther flags / decadesbeforeCurrentDecades / Other flags1700s1710s1720s1730s1740s1750s1760s1770s1780s1790s1800s1810s1820s1830s1840s1850s1860s1870s1880s1890s1900s1910s1920s1930s1940s1950s1960s1970s1980s1990s2000s2010s2020s", "edit_actions": [{"type": "D", "before": "border185423px|border190023px|", "after": null, "start_char_pos": 2929, "end_char_pos": 2959}, {"type": "D", "before": "border199323px|", "after": null, "start_char_pos": 4399, "end_char_pos": 4414}, {"type": "R", "before": "183123px", "after": "183140px", "start_char_pos": 4583, "end_char_pos": 4591}, {"type": "D", "before": "border200823px|border200940px|", "after": null, "start_char_pos": 4594, "end_char_pos": 4624}, {"type": "D", "before": "border190823px|border190923px|", "after": null, "start_char_pos": 5653, "end_char_pos": 5683}, {"type": "D", "before": "border195923px|", "after": null, "start_char_pos": 7862, "end_char_pos": 7877}, {"type": "D", "before": "border199223px|", "after": null, "start_char_pos": 9452, "end_char_pos": 9467}, {"type": "D", "before": "border186323px|", "after": null, "start_char_pos": 12155, "end_char_pos": 12170}, {"type": "R", "before": "borderIsraelItaly23px", "after": "borderIsraelItaly 23px", "start_char_pos": 16882, "end_char_pos": 16903}, {"type": "R", "before": "border100 BC23px", "after": "border1802 23px", "start_char_pos": 16906, "end_char_pos": 16922}, {"type": "R", "before": "border141623px", "after": "border1805 1814 23px", "start_char_pos": 16925, "end_char_pos": 16939}, {"type": "D", "before": "border1785", "after": null, "start_char_pos": 16942, "end_char_pos": 16952}, {"type": "R", "before": "File:Flag of the Repubblica Transpadana.svg", "after": "border186123px", "start_char_pos": 16953, "end_char_pos": 16996}, {"type": "A", "before": null, "after": "border (", "start_char_pos": 16999, "end_char_pos": 16999}, {"type": "R", "before": "179623px", "after": ") 23px", "start_char_pos": 17012, "end_char_pos": 17020}, {"type": "D", "before": "border180223px|border181523px|border185123px|border186123px|border23px|", "after": null, "start_char_pos": 17023, "end_char_pos": 17094}, {"type": "R", "before": "border110023px", "after": "border (23px", "start_char_pos": 17157, "end_char_pos": 17171}, {"type": "R", "before": "border181623px|border194323px|border113023px|border152523px|border149323px|border75423px|border697/1659Ivory", "after": "border)1943 Ivory", "start_char_pos": 17174, "end_char_pos": 17282}, {"type": "D", "before": "border193623px|", "after": null, "start_char_pos": 19486, "end_char_pos": 19501}, {"type": "D", "before": "border201423px|", "after": null, "start_char_pos": 24046, "end_char_pos": 24061}, {"type": "R", "before": "border1958/195923px", "after": "border195923px", "start_char_pos": 24412, "end_char_pos": 24431}, {"type": "R", "before": "border198023px", "after": "border198040px", "start_char_pos": 27311, "end_char_pos": 27325}, {"type": "D", "before": "border200123px|border200240px|", "after": null, "start_char_pos": 27328, "end_char_pos": 27358}, {"type": "D", "before": "border199323px|", "after": null, "start_char_pos": 31743, "end_char_pos": 31758}, {"type": "R", "before": "border199623px|border200723px|border200840pxAntarcticaArgentine", "after": "border199640pxAntarcticaArgentine", "start_char_pos": 38449, "end_char_pos": 38512}, {"type": "R", "before": "TerritoryEuropean Union23px|border195323px|border195540pxEuropean UnionFrench", "after": "TerritoryFrench", "start_char_pos": 38774, "end_char_pos": 38851}], "sents_char_pos": [0, 17, 29, 58, 72, 86, 100, 114, 128, 142, 156, 170, 184, 198, 212, 226, 240, 254, 268, 282, 296, 310, 324, 338, 352, 366, 380, 394, 408, 422, 436, 450, 464, 478, 492, 506, 531, 572, 826, 842, 903, 919, 965, 981, 1027, 1043, 1133, 1363, 1379, 1395, 1411, 1719, 1735, 2047, 2182, 2259, 2275, 2291, 2307, 2432, 2600, 2616, 2730, 2746, 2929, 2960, 3269, 3449, 3461, 3477, 3977, 4283, 4299, 4399, 4415, 4567, 4583, 4594, 4625, 5125, 5197, 5255, 5271, 5413, 5548, 5564, 5580, 5596, 5627, 5643, 5684, 6040, 6108, 6191, 6207, 6707, 6778, 6934, 6946, 7031, 7446, 7814, 7995, 8028, 8121, 8134, 8270, 8283, 8318, 8360, 8372, 8388, 8474, 8587, 8603, 8734, 8750, 9050, 9071, 9215, 9283, 9452, 9468, 9495, 9862, 10011, 10024, 10255, 10354, 10370, 10416, 10432, 10523, 10540, 10561, 10752, 10944, 10963, 11171, 11671, 11881, 11935, 11958, 12155, 12171, 12394, 12523, 12536, 12668, 12910, 12926, 13061, 13561, 13803, 14303, 14803, 15223, 15363, 15404, 15415, 15457, 15957, 16457, 16882, 16958, 16970, 16981, 16997, 17012, 17023, 17095, 17157, 17172, 17283, 17335, 17605, 18105, 18343, 18560, 18572, 18685, 18837, 19337, 19486, 19502, 19615, 19986, 20486, 20776, 21029, 21073, 21460, 21476, 21595, 21742, 22242, 22742, 23242, 23629, 23641, 23683, 23695, 23764, 23839, 23855, 23958, 24046, 24062, 24132, 24412, 24432, 24510, 24639, 24763, 24787, 24808, 24847, 24878, 24894, 25020, 25056, 25092, 25138, 25158, 25178, 25340, 25361, 25861, 26152, 26299, 26434, 26446, 26462, 26616, 26632, 26678, 26694, 26710, 26726, 26847, 27182, 27601, 27735, 27898, 28002, 28268, 28556, 28572, 28689, 28705, 28719, 28871, 28907, 29214, 29225, 29237, 29398, 29414, 29435, 29447, 29621, 29687, 29702, 29849, 29872, 29930, 30092, 30396, 30412, 30621, 30704, 30753, 31150, 31166, 31287, 31433, 31581, 31743, 31759, 31786, 31813, 31975, 32075, 32091, 32205, 32300, 32776, 33160, 33173, 33199, 33285, 33301, 33662, 33699, 33728, 33742, 33947, 34052, 34176, 34197, 34577, 34593, 34677, 34693, 34980, 35107, 35127, 35241, 35312, 35431, 35447, 35508, 35524, 35540, 35556, 35815, 36077, 36098, 36399, 36526, 36596, 36612, 36643, 36659, 36735, 36751, 37054, 37123, 37331, 37694, 37710, 37736, 37784, 37814, 37831, 37845, 37859, 37873, 37887, 37901, 37915, 37929, 37943, 37957, 37971, 37985, 37999, 38013, 38027, 38041, 38055, 38069, 38083, 38097, 38171, 38183, 38195, 38390, 38449, 38513, 38567, 38585, 38676, 38703, 38764, 38792, 38840, 38852, 38865, 38957, 38970, 39000, 39262, 39274, 39519, 39578]}
+{"doc_id": "190485", "revision_depth": "4", "before_revision": "Western criticism from the past Matteo Ricci (1552\u20131610), one of the founding fathers of Jesuit China missions, may have been the first European to write about feng shui practices. His account in De Christiana expeditione apud Sinas tells about feng shui masters (geologi, in Latin) studying prospective construction sites or grave sites \"with reference to the head and the tail and the feet of the particular dragons which are supposed to dwell beneath that spot\". As a Catholic missionary, Ricci strongly criticized the \"recondite science\" of geomancy along with astrology as yet another superstitio absurdissima of the heathens: \"What could be more absurd than their imagining that the safety of a family, honors, and their entire existence must depend upon such trifles as a door being opened from one side or another, as rain falling into a courtyard from the right or from the left, a window opened here or there, or one roof being higher than another?\" At the start of the Boxer Rebellion, Westerners were criticized for purposely violating the basic principles of feng shui in the construction of railroads and other conspicuous public structures throughout China. Victorian-era commentators on feng shui were generally ethnocentric, and as such skeptical and derogatory of what they knew of feng shui. In 1896, at a meeting of the Educational Association of China, Rev. P.W. Pitcher railed at the \"rottenness of the whole scheme of Chinese architecture,\" and urged fellow missionaries \"to erect unabashedly Western edifices of several stories and with towering spires in order to destroy nonsense about fung-shuy\". Criticism Confirmation bias Evidence for the effectiveness of feng shui is based primarily upon anecdote, allowing the well known confirmation bias. This bias is illustrated in the following case study (main land China, 1996) When we built this house in 1988 we invited a specialist. But after we moved here the family did not fare well. We were often sick and many of our animals died... I thought I could remedy the situation myself by fetching a large slab of stone in the mountains and placing it in front of the entrance so that money did not flow out of the house so easily. But it didn't help. Then I thought that the stone was too close to the entrance, so I moved it 50 feet down into the garden in front of the house. And since, we have not had any misfortunes and all is well. The full story is about two failures not followed by a third one. Describing it as a success is typical of the phenomenon. Critical analysts have described it thus: \"Feng shui has always been based upon mere guesswork\".%DIFDELCMD < %DIFDELCMD < %%% Haruspex haruspicem The case against divination is not something recent, and the Cicero's remark \"mirari quod non rideret haruspex haruspicem cum vidisset\" is ever actual, even if this remark is more about the diviners themselves than about divination proper. ~ They all seek to cash in while misleading the unsuspecting, taking full advantage before the unin-formed consumer wises up and begins to question the myriad inconsistencies. ~ The faux schools of feng shui are often linked with Life Aspirations or Black Hat Sect Tantric Buddhist feng shui theory. Developed during the 1970s and 1980s respectively, these commercialized schools describe themselves%DIFDELCMD < ] %%% as \u201cmodern\u201d or \u201cWestern\u201d schools. ~ This present state of affairs is ludicrous and confusing. Do we really believe that mirrors and flutes are going to change people's tendencies in any lasting and meaningful way? ... There is a lot of investigation that needs to be done or we will all go down the tubes because of our inability to match our exaggerated claims with lasting changes. How many larks in the lark pie? In the West, Feng Shui is advertized as a practice by geomancers trained in the ancient traditions of Chinese wisdom. But more often than not, Feng Shui is written only on the packaging, and what is really sold to the customer is just cheap, \u201cone size fits all\u201d numerology. A two steps Ba Zhai (\u516b\u5b85 Eight Mansions) recipe is as follows: Let be your year of birth. Use if you are a woman, and otherwise. Let be the three digits of the -th trigram (Luoshu order). Use them to scramble the trigrams of the Eight Directions according to This tells you the directions to live, to work, to sleep, and to avoid. You can even do the same with your house and your significant other. In other words, the real product sold to the consumer is not a 4000 years old wisdom, but an unexplained matrix.%DIFDELCMD < %DIFDELCMD < %%% Some other critics Feng shui can turn into a double edged sword. It was said that Zhu Yuanzhang became the first Ming emperor because his father was buried in a feng shui place. After that, Feng Shui became a heart disease for the emperor's dignitaries. Because, if Feng Shui really had such a big effect, there would not be only one piece of Feng Shui treasure land that can be used for the emperor. If others buried their parents in such a treasure land of Feng Shui, shouldn't they be the emperor? The compass branch of feng shui relies upon the compass to give accurate readings. However, critics point out that the compass degrees are often inaccurate as fluctuations caused by solar winds have the ability to greatly disturb the electromagnetic field of the earth. Determining a property or site location based upon Magnetic North will result in inaccuracies because true magnetic north fluctuates.%DIFDELCMD < %DIFDELCMD < %%% Today, feng shui is practiced not only by the Chinese, but also by Westerners and is still criticized by Christians around the world. Many modern Christians have an opinion of feng shui similar to that of their predecessors: It is entirely inconsistent with Christianity to believe that harmony and balance result from the manipulation and channeling of nonphysical forces or energies, or that such can be done by means of the proper placement of physical objects. Such techniques, in fact, belong to the world of sorcery. Users are often offered conflicting advice from different practitioners. Feng shui practitioners use these differences as evidence of variations in practice or different branches of thought.%DIFDELCMD < %DIFDELCMD < %%% The recent attempts to \"modernize\" feng shui in order to sell it better in the West has been branded as pseudo-science in the West and as \"modern-day\u2019s pursuit of easy (or lazy) quick-fixes to happiness has dramatically altered the blueprint of this thousands of years old ancient wisdom, and mutated it into a fashionable fad made for comedy TV\" in the East. Contemporary practice by country Mainland China After the founding of the People's Republic of China in 1949, the state's ideology officially considered feng shui as a \"feudalistic superstitious practice\" and a \"social evil\" . Accordingly, feng shui was discouraged and even banned outright at times. During the Cultural Revolution (1966-1976) feng shui was classified as one of the so-called Four Olds that were to be wiped out. Feng shui practitioners were beaten and abused by Red Guards and their works burned. Nevertheless, after the death of Mao Zedong and the end of the Cultural Revolution, the official attitude became more tolerant , even if restrictions on feng shui practice are still in place in today's China. As soon as 1996, geomancy was back and flourishing again, at least in rural localities. Feng Shui is used not only about graves and new houses construction, but also regarding to diseases, newborn babies, business affairs, etc. In a case study, Bruun notes that: The liberalization of the health sector meant that medical personnel no longer were assigned to work in rural areas... All doctors in Longchuan have moved to the cities... the local health clinic has been abandoned. Rural people now have to travel to an urban hospital to see a doctor. Earlier, when health care was publicly provided in villages and treatment was inexpensive, most people were likely to see a doctor first and then a geomancer only if the cure did not work. Now the sequence has changed, especially for the lower-income group of peasants. It remained illegal in the PRC to register feng shui consultation as a business and similarly advertising feng shui practice was banned. Some communist officials who had previously consulted feng shui were terminated and expelled from the Communist Party. Moreover there have been frequent crackdowns on feng shui practitioners on the grounds of \"promoting feudalistic superstitions\" such as one in Qingdao in early 2006 when the city's business and industrial administration office shut down an art gallery converted into a feng shui practice. Learning in order to practice feng shui is still somewhat considered taboo in today's China . Nevertheless, a number of Chinese academics are permitted to research on the subject of feng shui , such as anthropologists or architects by profession, studying the history of feng shui or historical feng shui theories behind the design of heritage buildings , such as Cai Dafeng, the Vice-President of Fudan University. In 2006, a debate organized by Shandong Qilu Tai on the topic: is Feng Shui a science or a superstition, gave a third for science, while a BBC Chinese news commentary of the same year reported that feng shui has gained adherents among Communist Party officials . In fact, Feng shui practitioners in China find superstitious and corrupt officials easy prey, despite official disapproval. In one instance, in 2009, county officials in Gansu, on the advice of feng shui practitioners , spent $732,000 to haul a 369-ton \"spirit rock\" to the county seat to ward off \"bad luck\". As a result, the number of feng shui practitioners is increasing since the beginning of Chinese economic reforms . Greater China Feng shui remained popular in Hong Kong, and also in the Republic of China (Taiwan), where traditional culture was not suppressed. In 2005,Hong Kong Disneyland acknowledged feng shui as an important part of Chinese culture by shifting the main gate by twelve degrees in their building plans. This was among actions suggested by the planner of architecture and design at Walt Disney Imagineering, Wing Chao. At Singapore Polytechnic and other institutions, professionals including engineers, architects, property agents and interior designers, take courses on feng shui and divination every year, a number of whom becoming part-time or full-time feng shui consultants. U.S.A. After Richard Nixon journeyed to the People's Republic of China in 1972, feng shui became marketable in the United States and has since been reinvented by New Age entrepreneurs for Western consumption. In a general context where: ~ In the early 1970s, it was estimated that there were 200,000 practicing astrologers in the United States and reportedly there were 5 million Americans spending $ 200 million per year on astrological consultations (Manolesco, 1973). More recently, a 2016 Gallup poll indicate that 25\\% of adults in the USA give credence to astrology and variously indulge it ~ A 1995 study of Ohio science teachers found 40\\% favoured teaching creationism in biology as a genuine alternative to Darwinian theory. A 2008 study found that 13\\% of US biology teachers reject evolution in favour of creationism . Moreover, the general public opinion was 13\\% in favor of scientific evolution, 30\\% in favor of an evolution \"guided by God\" and around 50\\% in favor of a direct creation, in the most recent period. ~ A 1995 study at the University of Texas revealed 60\\% of students believed that communication with the dead was possible. A 2005 US Gallup poll of 1002 citizens (with a sampling error of 3\\%) showed that 40\\% of US citizens believed in ESP, 32\\% believed in ghosts, and 30\\% believed in telepathy (Musella 2005). the Five Classics of Feng Shui remained on the bookshelves, and were mostly replaced by a \"bigger-faster-cheaper\" product. As summarized by Robert T. Carroll : ...feng shui has become an aspect of interior decorating in the Western world and alleged masters of feng shui now hire themselves out for hefty sums to tell people such as Donald Trump which way his doors and other things should hang. Feng shui has also become another New Age \"energy\" scam with arrays of metaphysical products...offered for sale to help you improve your health, maximize your potential, and guarantee fulfillment of some fortune cookie philosophy. The stage magician duo Penn and Teller dedicated an episode of their Bullshit! television show to criticise the construal of contemporary practice of feng shui in the Western world as science. In this episode, they devised a test in which the same dwelling was visited by five different feng shui consultants, all five producing different opinions about said dwelling, by which means it was attempted to show there is no consistency in the professional practice of feng shui. Practitioners of \"Chinese\" forms of feng shui are concerned that with the passage of time much of the theory behind it has been lost in translation, not paid proper consideration, frowned upon, or even scorned. On the contrary, Emmons has described this process as some form of social justice. Many of the higher-level forms of feng shui are not easily practiced without having connections in the community or a certain amount of wealth because hiring an expert, altering architecture or design , and moving from place to place requires a significant financial outlay. This opened the way to less expensive forms of feng shui, including hanging special (but cheap) mirrors, forks, or woks in doorways to deflect negative energy. Sources to be rescued Rescue 1990: chinese title, translation and link are to be found. Rescue 2900 Chinese title, chinese work, and a link are to be found%DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% Rescue 2012. Missing author, and an alive link books from the past , often used by academic sources.%DIFDELCMD < %DIFDELCMD < %%% . , various years, vol I-II-III-IV-V-VI # 87. the Cosmogony (Chinese) article is a must !!! , length=616 pages ## 71 Dover reprint ISBN: 0-486-28092-6 books (recent) , length= 264 pages , length=444 pages pages given could be relative to the 1st ed., not to the 2nd. To be checked. , length= 256 pages review at URL , length= 440, review at URL , Sheffield and MIT. Blogs, columns, etc , rescued from URL Country specific aspects Traditional China +684 1280 rem: \u8003\u53e4(Kaogu)=Archaeology%DIFDELCMD < %DIFDELCMD < %%% 1622%DIFDELCMD < %DIFDELCMD < %%% 1627 . The \"Ming Sizong robbed Li Zicheng's ancestral grave\" section can be read at rem: the 23-feb-2010 capture is still alive 1930%DIFDELCMD < %DIFDELCMD < %%% Mainland China 1996 2001 2005 2006 2006 Greater China 2005 . Centered on HK Disney%DIFDELCMD < %DIFDELCMD < %%% 2009%DIFDELCMD < %DIFDELCMD < %%% 2010%DIFDELCMD < %DIFDELCMD < %%% Old Korea%DIFDELCMD < %DIFDELCMD < %%% Canada U.S.A %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% quote: Astrology is pre-scientific. It was developed millennia before we knew about the actual fundamental forces in nature, thus it makes no claims to having a basis in any real science. That's good, because appealing to any of the real forces in nature would be implausible;%DIFDELCMD < %DIFDELCMD < %%% , length= 336 pages.%DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% , length= 220 pages%DIFDELCMD < %DIFDELCMD < %%% Haruspex haruspicem%DIFDELCMD < %DIFDELCMD < %%% practitioner at Portland ME, turned to dowsing.%DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% The second part of the article is not reproduced on the new website.%DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% , length xxii+406 pages%DIFDELCMD < %DIFDELCMD < %%% , length=150 pages", "after_revision": "In 2005,Hong Kong Disneyland acknowledged feng shui as an important part of Chinese culture by shifting the main gate by twelve degrees in their building plans. This was among actions suggested by the planner of architecture and design at Walt Disney Imagineering, Wing Chao. At Singapore Polytechnic and other institutions, professionals including engineers, architects, property agents and interior designers, take courses on feng shui and divination every year, a number of whom becoming part-time or full-time feng shui consultants. Criticisms Traditional feng shui Matteo Ricci (1552\u20131610), one of the founding fathers of Jesuit China missions, may have been the first European to write about feng shui practices. His account in De Christiana expeditione apud Sinas tells about feng shui masters (geologi, in Latin) studying prospective construction sites or grave sites \"with reference to the head and the tail and the feet of the particular dragons which are supposed to dwell beneath that spot\". As a Catholic missionary, Ricci strongly criticized the \"recondite science\" of geomancy along with astrology as yet another superstitio absurdissima of the heathens: \"What could be more absurd than their imagining that the safety of a family, honors, and their entire existence must depend upon such trifles as a door being opened from one side or another, as rain falling into a courtyard from the right or from the left, a window opened here or there, or one roof being higher than another?\" Victorian-era commentators on feng shui were generally ethnocentric, and as such skeptical and derogatory of what they knew of feng shui. In 1896, at a meeting of the Educational Association of China, Rev. P.W. Pitcher railed at the \"rottenness of the whole scheme of Chinese architecture,\" and urged fellow missionaries \"to erect unabashedly Western edifices of several stories and with towering spires in order to destroy nonsense about fung-shuy\". Sycee-shaped incense used in feng shui %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < ] %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% After the founding of the People's Republic of China in 1949, feng shui was officially considered a \"feudalistic superstitious practice\" and a \"social evil\" according to the state's ideology and was discouraged and even banned outright at times. Feng shui remained popular in Hong Kong, and also in the Republic of China (Taiwan), where traditional culture was not suppressed. During the Cultural Revolution (1966-1976) feng shui was classified as one of the so-called Four Olds that were to be wiped out. Feng shui practitioners were beaten and abused by Red Guards and their works burned. After the death of Mao Zedong and the end of the Cultural Revolution, the official attitude became more tolerant but restrictions on feng shui practice are still in place in today's China. It is illegal in the PRC today to register feng shui consultation as a business and similarly advertising feng shui practice is banned. There have been frequent crackdowns on feng shui practitioners on the grounds of \"promoting feudalistic superstitions\" such as one in Qingdao in early 2006 when the city's business and industrial administration office shut down an art gallery converted into a feng shui practice. Some officials who had consulted feng shui were terminated and expelled from the Communist Party . In 21st century mainland China less than one-third of the population believe in feng shui, and the proportion of believers among young urban Chinese is said to be even lower. Chinese academics permitted to research feng shui are anthropologists or architects by profession, studying the history of feng shui or historical feng shui theories behind the design of heritage buildings . They include Cai Dafeng, Vice-President of Fudan University. Learning in order to practice feng shui is still somewhat considered taboo. Nevertheless, it is reported that feng shui has gained adherents among Communist Party officials according to a BBC Chinese news commentary in 2006, and since the beginning of Chinese economic reforms the number of feng shui practitioners is increasing. Contemporary feng shui After Richard Nixon's vist to the People's Republic of China in 1972, feng shui became popular in the United States and has since been reinvented by New Age entrepreneurs. Critics, however, are concerned that much of the traditional theory has been lost in translation, not paid proper consideration, frowned upon, or even scorned. Robert T. Carroll sums up what feng shui has become in some instances: ...feng shui has become an aspect of interior decorating in the Western world and alleged masters of feng shui now hire themselves out for hefty sums to tell people such as Donald Trump which way his doors and other things should hang. Feng shui has also become another New Age \"energy\" scam with arrays of metaphysical products...offered for sale to help you improve your health, maximize your potential, and guarantee fulfillment of some fortune cookie philosophy. Skeptics charge that evidence for its effectiveness is based primarily upon anecdote and users are often offered conflicting advice from different practitioners, though feng shui practitioners use these differences as evidence of variations in practice or different branches of thought. Critical analysts have described it thus: \"Feng shui has always been based upon mere guesswork\". Traditional feng shui relies upon the compass to give accurate readings. However, critics point out that the compass degrees are often inaccurate as fluctuations caused by solar winds have the ability to greatly disturb the electromagnetic field of the earth. Determining a property or site location based upon Magnetic North will result in inaccuracies because true magnetic north fluctuates. Other are skeptical of feng shui's lasting impact. One critic called the present state of affairs \"ludicrous and confusing,\" asking \"Do we really believe that mirrors and flutes are going to change people's tendencies in any lasting and meaningful way?\" He calls for much further study or \"we will all go down the tubes because of our inability to match our exaggerated claims with lasting changes.\" Feng shui practitioners in China find superstitious and corrupt officials easy prey, despite official disapproval. In one instance, in 2009, county officials in Gansu, on the advice of feng shui practitioners, spent $732,000 to haul a 369-ton \"spirit rock\" to the county seat to ward off \"bad luck\". Feng shui is criticized by Christians around the world. Some have argued that it is \"entirely inconsistent with Christianity to believe that harmony and balance result from the manipulation and channeling of nonphysical forces or energies, or that such can be done by means of the proper placement of physical objects. Such techniques, in fact, belong to the world of sorcery. The stage magician duo Penn and Teller dedicated an episode of their Bullshit! television show to criticise the construal of contemporary practice of feng shui in the Western world as science. In this episode, they devised a test in which the same dwelling was visited by five different feng shui consultants, all five producing different opinions about said dwelling, by which means it was attempted to show there is no consistency in the professional practice of feng shui. Feng shui may require social influence or money because experts, architecture or design changes , and moving from place to place are expensive. Less influential or less wealthy people lose faith in feng shui, saying that it is a game only for the wealthy. Others, however, practice less expensive forms of feng shui, including hanging special (but cheap) mirrors, forks, or woks in doorways to deflect negative energy. Sources Books %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% , various years, vol I-II-III-IV-V-VI . , length=616 pages ## 71 , length= 150 pages Dover reprint ISBN 0-486-28092-6 , length= 440, Review= URL Blogs and online Web practitioner, turned to dowsing. not really archived. Moreover the sentence to be proven is rather void Miscellaneous Traditional China %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% . The \"Ming Sizong robbed Li Zicheng's ancestral grave\" section can be read at %DIFDELCMD < %DIFDELCMD < %%% Post-1949 China 2001 2006 2010 %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% U.S.A %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% 2005 .", "edit_actions": [{"type": "R", "before": "Western criticism from the past", "after": "In 2005,Hong Kong Disneyland acknowledged feng shui as an important part of Chinese culture by shifting the main gate by twelve degrees in their building plans. This was among actions suggested by the planner of architecture and design at Walt Disney Imagineering, Wing Chao. At Singapore Polytechnic and other institutions, professionals including engineers, architects, property agents and interior designers, take courses on feng shui and divination every year, a number of whom becoming part-time or full-time feng shui consultants.", "start_char_pos": 0, "end_char_pos": 31}, {"type": "A", "before": null, "after": "Criticisms Traditional feng shui", "start_char_pos": 32, "end_char_pos": 32}, {"type": "D", "before": "At the start of the Boxer Rebellion, Westerners were criticized for purposely violating the basic principles of feng shui in the construction of railroads and other conspicuous public structures throughout China.", "after": null, "start_char_pos": 961, "end_char_pos": 1173}, {"type": "R", "before": "Criticism", "after": "Sycee-shaped incense used in feng shui", "start_char_pos": 1625, "end_char_pos": 1634}, {"type": "D", "before": "Confirmation bias Evidence for the effectiveness of feng shui is based primarily upon anecdote, allowing the well known confirmation bias. This bias is illustrated in the following case study (main land China, 1996) When we built this house in 1988 we invited a specialist. But after we moved here the family did not fare well. We were often sick and many of our animals died... I thought I could remedy the situation myself by fetching a large slab of stone in the mountains and placing it in front of the entrance so that money did not flow out of the house so easily. But it didn't help. Then I thought that the stone was too close to the entrance, so I moved it 50 feet down into the garden in front of the house. And since, we have not had any misfortunes and all is well. The full story is about two failures not followed by a third one. Describing it as a success is typical of the phenomenon.", "after": null, "start_char_pos": 1635, "end_char_pos": 2535}, {"type": "D", "before": "Critical analysts have described it thus: \"Feng shui has always been based upon mere guesswork\".", "after": null, "start_char_pos": 2536, "end_char_pos": 2632}, {"type": "D", "before": "Haruspex haruspicem The case against divination is not something recent, and the Cicero's remark \"mirari quod non rideret haruspex haruspicem cum vidisset\" is ever actual, even if this remark is more about the diviners themselves than about divination proper. ~ They all seek to cash in while misleading the unsuspecting, taking full advantage before the unin-formed consumer wises up and begins to question the myriad inconsistencies. ~ The faux schools of feng shui are often linked with Life Aspirations or Black Hat Sect Tantric Buddhist feng shui theory. Developed during the 1970s and 1980s respectively, these commercialized schools", "after": null, "start_char_pos": 2662, "end_char_pos": 3301}, {"type": "D", "before": "describe themselves", "after": null, "start_char_pos": 3302, "end_char_pos": 3321}, {"type": "D", "before": "as \u201cmodern\u201d or \u201cWestern\u201d schools. ~ This present state of affairs is ludicrous and confusing. Do we really believe that mirrors and flutes are going to change people's tendencies in any lasting and meaningful way? ... There is a lot of investigation that needs to be done or we will all go down the tubes because of our inability to match our exaggerated claims with lasting changes.", "after": null, "start_char_pos": 3340, "end_char_pos": 3723}, {"type": "D", "before": "How many larks in the lark pie? In the West, Feng Shui is advertized as a practice by geomancers trained in the ancient traditions of Chinese wisdom. But more often than not, Feng Shui is written only on the packaging, and what is really sold to the customer is just cheap, \u201cone size fits all\u201d numerology. A two steps Ba Zhai (\u516b\u5b85 Eight Mansions) recipe is as follows: Let be your year of birth. Use if you are a woman, and otherwise. Let be the three digits of the -th trigram (Luoshu order). Use them to scramble the trigrams of the Eight Directions according to This tells you the directions to live, to work, to sleep, and to avoid. You can even do the same with your house and your significant other. In other words, the real product sold to the consumer is not a 4000 years old wisdom, but an unexplained matrix.", "after": null, "start_char_pos": 3724, "end_char_pos": 4541}, {"type": "D", "before": "Some other critics Feng shui can turn into a double edged sword. It was said that Zhu Yuanzhang became the first Ming emperor because his father was buried in a feng shui place. After that, Feng Shui became a heart disease for the emperor's dignitaries. Because, if Feng Shui really had such a big effect, there would not be only one piece of Feng Shui treasure land that can be used for the emperor. If others buried their parents in such a treasure land of Feng Shui, shouldn't they be the emperor?", "after": null, "start_char_pos": 4571, "end_char_pos": 5071}, {"type": "D", "before": "The compass branch of feng shui relies upon the compass to give accurate readings. However, critics point out that the compass degrees are often inaccurate as fluctuations caused by solar winds have the ability to greatly disturb the electromagnetic field of the earth. Determining a property or site location based upon Magnetic North will result in inaccuracies because true magnetic north fluctuates.", "after": null, "start_char_pos": 5072, "end_char_pos": 5475}, {"type": "D", "before": "Today, feng shui is practiced not only by the Chinese, but also by Westerners and is still criticized by Christians around the world. Many modern Christians have an opinion of feng shui similar to that of their predecessors: It is entirely inconsistent with Christianity to believe that harmony and balance result from the manipulation and channeling of nonphysical forces or energies, or that such can be done by means of the proper placement of physical objects. Such techniques, in fact, belong to the world of sorcery.", "after": null, "start_char_pos": 5505, "end_char_pos": 6027}, {"type": "D", "before": "Users are often offered conflicting advice from different practitioners. Feng shui practitioners use these differences as evidence of variations in practice or different branches of thought.", "after": null, "start_char_pos": 6028, "end_char_pos": 6218}, {"type": "D", "before": "The recent attempts to \"modernize\" feng shui in order to sell it better in the West has been branded as pseudo-science in the West and as \"modern-day\u2019s pursuit of easy (or lazy) quick-fixes to happiness has dramatically altered the blueprint of this thousands of years old ancient wisdom, and mutated it into a fashionable fad made for comedy TV\" in the East.", "after": null, "start_char_pos": 6248, "end_char_pos": 6607}, {"type": "D", "before": "Contemporary practice by country Mainland China", "after": null, "start_char_pos": 6608, "end_char_pos": 6655}, {"type": "R", "before": "the state's ideology officially considered feng shui as", "after": "feng shui was officially considered", "start_char_pos": 6718, "end_char_pos": 6773}, {"type": "R", "before": ". Accordingly, feng shui", "after": "according to the state's ideology and", "start_char_pos": 6833, "end_char_pos": 6857}, {"type": "A", "before": null, "after": "Feng shui remained popular in Hong Kong, and also in the Republic of China (Taiwan), where traditional culture was not suppressed.", "start_char_pos": 6909, "end_char_pos": 6909}, {"type": "R", "before": "Nevertheless, after", "after": "After", "start_char_pos": 7124, "end_char_pos": 7143}, {"type": "R", "before": ", even if", "after": "but", "start_char_pos": 7251, "end_char_pos": 7260}, {"type": "D", "before": "As soon as 1996, geomancy was back and flourishing again, at least in rural localities. Feng Shui is used not only about graves and new houses construction, but also regarding to diseases, newborn babies, business affairs, etc. In a case study, Bruun notes that: The liberalization of the health sector meant that medical personnel no longer were assigned to work in rural areas... All doctors in Longchuan have moved to the cities... the local health clinic has been abandoned. Rural people now have to travel to an urban hospital to see a doctor. Earlier, when health care was publicly provided in villages and treatment was inexpensive, most people were likely to see a doctor first and then a geomancer only if the cure did not work. Now the sequence has changed, especially for the lower-income group of peasants.", "after": null, "start_char_pos": 7333, "end_char_pos": 8151}, {"type": "R", "before": "It remained", "after": "It is", "start_char_pos": 8152, "end_char_pos": 8163}, {"type": "A", "before": null, "after": "today", "start_char_pos": 8183, "end_char_pos": 8183}, {"type": "R", "before": "was banned. Some communist officials who had previously consulted feng shui were terminated and expelled from the Communist Party. Moreover there", "after": "is banned. There", "start_char_pos": 8278, "end_char_pos": 8423}, {"type": "R", "before": "Learning in order to practice feng shui is still somewhat considered taboo in today's China", "after": "Some officials who had consulted feng shui were terminated and expelled from the Communist Party", "start_char_pos": 8698, "end_char_pos": 8789}, {"type": "R", "before": "Nevertheless, a number of Chinese academics are", "after": "In 21st century mainland China less than one-third of the population believe in feng shui, and the proportion of believers among young urban Chinese is said to be even lower. Chinese academics", "start_char_pos": 8792, "end_char_pos": 8839}, {"type": "R", "before": "on the subject of feng shui , such as", "after": "feng shui are", "start_char_pos": 8862, "end_char_pos": 8899}, {"type": "R", "before": ", such as", "after": ". They include", "start_char_pos": 9052, "end_char_pos": 9061}, {"type": "D", "before": "the", "after": null, "start_char_pos": 9074, "end_char_pos": 9077}, {"type": "R", "before": "In 2006, a debate organized by Shandong Qilu Tai on the topic: is Feng Shui a science or a superstition, gave a third for science, while a BBC Chinese news commentary of the same year", "after": "Learning in order to practice feng shui is still somewhat considered taboo. Nevertheless, it is", "start_char_pos": 9114, "end_char_pos": 9297}, {"type": "R", "before": ". In fact, Feng shui practitioners in China find superstitious and corrupt officials easy prey, despite official disapproval. In one instance, in 2009, county officials in Gansu, on the advice of", "after": "according to a BBC Chinese news commentary in 2006, and since the beginning of Chinese economic reforms the number of", "start_char_pos": 9375, "end_char_pos": 9570}, {"type": "R", "before": ", spent $732,000 to haul a 369-ton \"spirit rock\" to the county seat to ward off \"bad luck\". As a result, the number of feng shui practitioners is increasing since the beginning of Chinese economic reforms . Greater China Feng shui remained popular in Hong Kong, and also in the Republic of China (Taiwan), where traditional culture was not suppressed. In 2005,Hong Kong Disneyland acknowledged feng shui as an important part of Chinese culture by shifting the main gate by twelve degrees in their building plans. This was among actions suggested by the planner of architecture and design at Walt Disney Imagineering, Wing Chao. At Singapore Polytechnic and other institutions, professionals including engineers, architects, property agents and interior designers, take courses on feng shui and divination every year, a number of whom becoming part-time or full-time feng shui consultants. U.S.A. After Richard Nixon journeyed to the People's Republic of China in 1972, feng shui became marketable in the United States and has since been reinvented by New Age entrepreneurs for Western consumption. In a general context where: ~ In the early 1970s, it was estimated that there were 200,000 practicing astrologers in the United States and reportedly there were 5 million Americans spending $ 200 million per year on astrological consultations (Manolesco, 1973). More recently, a 2016 Gallup poll indicate that 25\\% of adults in the USA give credence to astrology and variously indulge it ~ A 1995 study of Ohio science teachers found 40\\% favoured teaching creationism in biology as a genuine alternative to Darwinian theory. A 2008 study found that 13\\% of US biology teachers reject evolution in favour of creationism . Moreover, the general public opinion was 13\\% in favor of scientific evolution, 30\\% in favor of an evolution \"guided by God\" and around 50\\% in favor of a direct creation, in", "after": "is increasing.", "start_char_pos": 9595, "end_char_pos": 11490}, {"type": "A", "before": null, "after": "Contemporary feng shui After Richard Nixon's vist to", "start_char_pos": 11491, "end_char_pos": 11491}, {"type": "R", "before": "most recent period. ~ A 1995 study at the University of Texas revealed 60\\% of students believed that communication with the dead was possible. A 2005 US Gallup poll of 1002 citizens (with a sampling error of 3\\%) showed that 40\\% of US citizens believed in ESP, 32\\% believed in ghosts, and 30\\% believed in telepathy (Musella 2005). the Five Classics of Feng Shui remained on the bookshelves, and were mostly replaced by a \"bigger-faster-cheaper\" product. As summarized by", "after": "People's Republic of China in 1972, feng shui became popular in the United States and has since been reinvented by New Age entrepreneurs. Critics, however, are concerned that much of the traditional theory has been lost in translation, not paid proper consideration, frowned upon, or even scorned.", "start_char_pos": 11496, "end_char_pos": 11970}, {"type": "R", "before": ":", "after": "sums up what feng shui has become in some instances:", "start_char_pos": 11989, "end_char_pos": 11990}, {"type": "A", "before": null, "after": "Skeptics charge that evidence for its effectiveness is based primarily upon anecdote and users are often offered conflicting advice from different practitioners, though feng shui practitioners use these differences as evidence of variations in practice or different branches of thought. Critical analysts have described it thus: \"Feng shui has always been based upon mere guesswork\".", "start_char_pos": 12458, "end_char_pos": 12458}, {"type": "A", "before": null, "after": "Traditional feng shui relies upon the compass to give accurate readings. However, critics point out that the compass degrees are often inaccurate as fluctuations caused by solar winds have the ability to greatly disturb the electromagnetic field of the earth. Determining a property or site location based upon Magnetic North will result in inaccuracies because true magnetic north fluctuates.", "start_char_pos": 12459, "end_char_pos": 12459}, {"type": "A", "before": null, "after": "Other are skeptical of feng shui's lasting impact. One critic called the present state of affairs \"ludicrous and confusing,\" asking \"Do we really believe that mirrors and flutes are going to change people's tendencies in any lasting and meaningful way?\" He calls for much further study or \"we will all go down the tubes because of our inability to match our exaggerated claims with lasting changes.\"", "start_char_pos": 12460, "end_char_pos": 12460}, {"type": "A", "before": null, "after": "Feng shui practitioners in China find superstitious and corrupt officials easy prey, despite official disapproval. In one instance, in 2009, county officials in Gansu, on the advice of feng shui practitioners, spent $732,000 to haul a 369-ton \"spirit rock\" to the county seat to ward off \"bad luck\".", "start_char_pos": 12461, "end_char_pos": 12461}, {"type": "A", "before": null, "after": "Feng shui is criticized by Christians around the world. Some have argued that it is \"entirely inconsistent with Christianity to believe that harmony and balance result from the manipulation and channeling of nonphysical forces or energies, or that such can be done by means of the proper placement of physical objects. Such techniques, in fact, belong to the world of sorcery.", "start_char_pos": 12462, "end_char_pos": 12462}, {"type": "R", "before": "Practitioners of \"Chinese\" forms of feng shui are concerned that with the passage of time much of the theory behind it has been lost in translation, not paid proper consideration, frowned upon, or even scorned. On the contrary, Emmons has described this process as some form of social justice. Many of the higher-level forms of feng shui are not easily practiced without having connections in the community or a certain amount of wealth because hiring an expert, altering", "after": "Feng shui may require social influence or money because experts,", "start_char_pos": 12939, "end_char_pos": 13410}, {"type": "A", "before": null, "after": "changes", "start_char_pos": 13434, "end_char_pos": 13434}, {"type": "R", "before": "requires a significant financial outlay. This opened the way to", "after": "are expensive. Less influential or less wealthy people lose faith in feng shui, saying that it is a game only for the wealthy. Others, however, practice", "start_char_pos": 13468, "end_char_pos": 13531}, {"type": "R", "before": "to be rescued", "after": "Books", "start_char_pos": 13677, "end_char_pos": 13690}, {"type": "D", "before": "Rescue 1990: chinese title, translation and link are to be found.", "after": null, "start_char_pos": 13691, "end_char_pos": 13756}, {"type": "D", "before": "Rescue 2900 Chinese title, chinese work, and a link are to be found", "after": null, "start_char_pos": 13757, "end_char_pos": 13824}, {"type": "D", "before": "Rescue 2012. Missing author, and an alive link", "after": null, "start_char_pos": 13867, "end_char_pos": 13913}, {"type": "D", "before": "books from the past , often used by academic sources.", "after": null, "start_char_pos": 13914, "end_char_pos": 13967}, {"type": "D", "before": ".", "after": null, "start_char_pos": 13997, "end_char_pos": 13998}, {"type": "A", "before": null, "after": ".", "start_char_pos": 14037, "end_char_pos": 14037}, {"type": "D", "before": "# 87. the Cosmogony (Chinese) article is a must !!!", "after": null, "start_char_pos": 14038, "end_char_pos": 14089}, {"type": "D", "before": "Dover reprint ISBN: 0-486-28092-6", "after": null, "start_char_pos": 14115, "end_char_pos": 14148}, {"type": "D", "before": "books (recent)", "after": null, "start_char_pos": 14149, "end_char_pos": 14163}, {"type": "R", "before": "264", "after": "150", "start_char_pos": 14174, "end_char_pos": 14177}, {"type": "R", "before": ", length=444 pages", "after": "Dover reprint ISBN 0-486-28092-6", "start_char_pos": 14184, "end_char_pos": 14202}, {"type": "D", "before": "pages given could be relative to the 1st ed., not to the 2nd. To be checked.", "after": null, "start_char_pos": 14203, "end_char_pos": 14279}, {"type": "D", "before": "256 pages review at URL", "after": null, "start_char_pos": 14290, "end_char_pos": 14313}, {"type": "D", "before": ", length=", "after": null, "start_char_pos": 14314, "end_char_pos": 14323}, {"type": "R", "before": "review at", "after": "Review=", "start_char_pos": 14329, "end_char_pos": 14338}, {"type": "R", "before": ", Sheffield and MIT.", "after": "Blogs and online", "start_char_pos": 14343, "end_char_pos": 14363}, {"type": "R", "before": "Blogs, columns, etc", "after": "Web", "start_char_pos": 14364, "end_char_pos": 14383}, {"type": "R", "before": ", rescued from URL", "after": "practitioner, turned to dowsing.", "start_char_pos": 14384, "end_char_pos": 14402}, {"type": "R", "before": "Country specific aspects", "after": "not really archived. Moreover the sentence to be proven is rather void", "start_char_pos": 14403, "end_char_pos": 14427}, {"type": "A", "before": null, "after": "Miscellaneous", "start_char_pos": 14428, "end_char_pos": 14428}, {"type": "D", "before": "+684", "after": null, "start_char_pos": 14447, "end_char_pos": 14451}, {"type": "D", "before": "1280 rem: \u8003\u53e4(Kaogu)=Archaeology", "after": null, "start_char_pos": 14452, "end_char_pos": 14483}, {"type": "D", "before": "1622", "after": null, "start_char_pos": 14513, "end_char_pos": 14517}, {"type": "D", "before": "1627", "after": null, "start_char_pos": 14547, "end_char_pos": 14551}, {"type": "D", "before": "rem: the 23-feb-2010 capture is still alive", "after": null, "start_char_pos": 14631, "end_char_pos": 14674}, {"type": "D", "before": "1930", "after": null, "start_char_pos": 14675, "end_char_pos": 14679}, {"type": "R", "before": "Mainland China 1996", "after": "Post-1949 China", "start_char_pos": 14709, "end_char_pos": 14728}, {"type": "D", "before": "2005", "after": null, "start_char_pos": 14734, "end_char_pos": 14738}, {"type": "R", "before": "2006", "after": "2010", "start_char_pos": 14744, "end_char_pos": 14748}, {"type": "D", "before": "Greater China 2005 . Centered on HK Disney", "after": null, "start_char_pos": 14749, "end_char_pos": 14791}, {"type": "D", "before": "2009", "after": null, "start_char_pos": 14821, "end_char_pos": 14825}, {"type": "D", "before": "2010", "after": null, "start_char_pos": 14855, "end_char_pos": 14859}, {"type": "D", "before": "Old Korea", "after": null, "start_char_pos": 14889, "end_char_pos": 14898}, {"type": "D", "before": "Canada", "after": null, "start_char_pos": 14928, "end_char_pos": 14934}, {"type": "D", "before": "quote: Astrology is pre-scientific. It was developed millennia before we knew about the actual fundamental forces in nature, thus it makes no claims to having a basis in any real science. That's good, because appealing to any of the real forces in nature would be implausible;", "after": null, "start_char_pos": 15010, "end_char_pos": 15286}, {"type": "D", "before": ", length= 336 pages.", "after": null, "start_char_pos": 15316, "end_char_pos": 15336}, {"type": "D", "before": ", length= 220 pages", "after": null, "start_char_pos": 15405, "end_char_pos": 15424}, {"type": "D", "before": "Haruspex haruspicem", "after": null, "start_char_pos": 15454, "end_char_pos": 15473}, {"type": "D", "before": "practitioner at Portland ME, turned to dowsing.", "after": null, "start_char_pos": 15503, "end_char_pos": 15550}, {"type": "D", "before": "The second part of the article is not reproduced on the new website.", "after": null, "start_char_pos": 15593, "end_char_pos": 15661}, {"type": "D", "before": ", length xxii+406 pages", "after": null, "start_char_pos": 15704, "end_char_pos": 15727}, {"type": "R", "before": ", length=150 pages", "after": "2005 .", "start_char_pos": 15757, "end_char_pos": 15775}], "sents_char_pos": [0, 181, 466, 960, 1173, 1311, 1624, 1773, 1908, 1962, 2013, 2205, 2225, 2352, 2412, 2478, 2535, 2632, 2921, 3097, 3221, 3373, 3433, 3557, 3723, 3755, 3873, 4029, 4118, 4157, 4216, 4359, 4428, 4541, 4635, 4748, 4824, 4971, 5071, 5154, 5341, 5475, 5638, 5969, 6027, 6100, 6218, 6607, 6908, 7038, 7123, 7332, 7420, 7560, 7714, 7811, 7881, 8070, 8151, 8289, 8408, 8697, 8791, 9113, 9376, 9500, 9686, 9946, 10107, 10222, 10483, 10692, 10954, 11218, 11314, 11515, 11639, 11953, 12226, 12457, 12655, 12938, 13149, 13232, 13508, 13668, 13756, 13879, 13967, 14264, 14279, 14553, 15045, 15197, 15336, 15550, 15661]}
+{"doc_id": "19587346", "revision_depth": "1", "before_revision": "The truth claimof photographyis the term used by Tom Gunning to describe the prevalent belief that traditional photographs accurately depict reality. He states that the truth claim relies upon both the indexicality and visual accuracy of photographs. A similar argument has been made for motion pictures by Stephen Maguire. Lev Manovich labels cinema the \" art of the index \" , its traditional identity lying in its ability to capture reality. Denis McQuail likewise argues that film is capable of manipulating the \" seeming reality of the photographic message without loss of credibility \". Visual accuracy Gunning states that a photograph must also have \"iconicity\". To represent \"truth\" , it must resemble the object it represents, which is not an inevitable characteristic of an index. Gunning attributes the human fascination with photographs with a sense of the relationship between photography and reality, though he claims that the \"perceptual richness and nearly infinite detail\" of the image itself is more significant than a knowledge of its indexicality. He cites Bazin's idea that photography has an \"irrational power to bear away our faith \". Further, Susan Sontag relates the belief in a photograph's ability to capture 'reality' to the development of certain human practices. Since a picture confers on events \"a kind of immortality (and importance) it would never otherwise have enjoyed \", she explains, the act of taking photographs has become essential to the experience of world travel. The possibility of 'true' photographs leads to a compulsion to \"[convert] experience into an image\" in order to \"make real what one is experiencing \". Understanding of reality David Croteau and William Hoynes suggest that the prevalence of photographic images has blurred the distinction between image and reality, referring to \" pseudo-events \" , in Daniel Boorstin's words \u2013 such as press conferences, televised political debates, or 'photo opportunities' - that exist only to create images. Further, Neil Postman argues that the photograph has redefined society's understanding of information and truth: \" truth is in the seeing, not in the thinking \". Postman suggests that the proliferation of photography led to the replacement of language with images as \"our dominant means for constructing, understanding, and testing reality\". Sontag shares this view, suggesting that \"the 'realistic' view of the world compatible with bureaucracy redefines knowledge \u2013 as techniques of information \" . Desensitization Sontag also argues that through repeatedly capturing and viewing reality through photographs, their subjects can become less real. She claims that \"aesthetic distance seems built into the very experience of looking at photographs \", and also that the sheer volume of horrific images throughout the world has produced a \"familiarity with atrocity, making the horrible seem more ordinary \u2013 making it appear familiar, remote \u2026 inevitable\". Hyperreality Sontag's view is akin to Jean Baudrillard's theory of 'hyperreality', where \"reality itself founders\" as a result of an endless \"reduplication of the real\" via media such as photography. He claims that the possibility of infinite identical objects creates a \"relationship of equivalence, of indifference \", leading to the \"extinction of the original \". It has been argued that the digitisation of photography undermines its \"truth claim\" . Lev Manovich likewise questions the indexical identity of motion pictures, rather labelling cinema a subgenre of painting, since it is possible to digitally modify frames, generate photorealistic images entirely using 3-D computer animation, and \" to cut, bend, stretch and stitch digitised film images into something which has perfect photographic credibility, although it was never actually filmed \". Loss of indexicality It has also been argued that digital photographs inevitably lack indexicality, based on an understanding of \"crucial distinctions between the analogue and the digital\" in the way they record 'reality'. For instance, Frosh describes photographs as \"codes without a message\" \u2013 \"repurposable visual content made of malleable info-pixels \". Likewise, Martin Lister claims that even with a digital camera, \" the images produced are rendered photo-realistic, they borrow photography's currency, its deeply historical 'reality effect', simply in order to have meaning \". Criticism of the \"truth claim\" Susan Sontag challenges the \"presumption of veracity\" associated with photographs, arguing that they are \" as much an interpretation of the world as paintings and drawings are \". She describes the role of the photographer in determining the exposure, light, texture and geometry of a photograph. Gunning points to the physicality of the camera as a mediator between the photograph and reality. He notes that the use of a lens, film, a particular exposure, kind of shutter, and developing process \" become magically whisked away if one considers the photograph as a direct imprint of reality \". Sontag also describes the inability of a photograph to capture enough information about its subject to be considered a representation of reality. She states, \" the camera's rendering of reality must always hide more than it discloses\u2026only what which narrates can make us understand \". Further, Roland Barthes notes that the human subject can be made less real through the process of being photographed. He notes, \" once I feel myself observed by the lens, everything changes: I constitute myself in the process of 'posing', I instantaneously make another body for myself, transform myself in advance into an image \".", "after_revision": "Truth claim, in photography, is a term Tom Gunning uses to describe the prevalent belief that traditional photographs accurately depict reality. He states that the truth claim relies on both the indexicality and visual accuracy of photographs. A similar argument has been made for motion pictures by Stephen Maguire. Lev Manovich labels cinema the art of the index , its traditional identity lying in its ability to capture reality. Denis McQuail likewise argues that film is capable of manipulating the \" ... seeming reality of the photographic message without loss of credibility .\" Visual accuracy Gunning states that a photograph must also have \"iconicity\". To represent \"truth\" it must resemble the object it represents, which is not an inevitable characteristic of an index. Gunning attributes the human fascination with photographs with a sense of the relationship between photography and reality, though he claims that the \"perceptual richness and nearly infinite detail\" of the image itself is more significant than a knowledge of its indexicality. He cites Bazin's idea that photography has an \"irrational power to bear away our faith .\" Further, Susan Sontag relates the belief in a photograph's ability to capture 'reality' to the development of certain human practices. Since a picture confers on events \"a kind of immortality (and importance) it would never otherwise have enjoyed ,\" she explains, the act of taking photographs has become essential to the experience of world travel. The possibility of 'true' photographs leads to a compulsion to \"[convert] experience into an image\" to \"make real what one is experiencing .\" Understanding of reality David Croteau and William Hoynes suggest that the prevalence of photographic images has blurred the distinction between image and reality, referring to pseudo-events , in Daniel Boorstin's words \u2013 such as press conferences, televised political debates, or 'photo opportunities' - that exist only to create images. Further, Neil Postman argues that the photograph has redefined society's understanding of information and truth: \" Truth is in the seeing, not in the thinking .\" Postman suggests that the proliferation of photography led to the replacement of language with images as \"our dominant means for constructing, understanding, and testing reality\". Sontag shares this view, suggesting that \"the 'realistic' view of the world compatible with bureaucracy redefines knowledge as techniques of information . Desensitization Sontag also argues that through repeatedly capturing and viewing reality through photographs, their subjects can become less real. She claims that \"aesthetic distance seems built into the very experience of looking at photographs ,\" and also that the sheer volume of horrific images throughout the world has produced a \"familiarity with atrocity, making the horrible seem more ordinary \u2013 making it appear familiar, remote \u2026 inevitable\". Hyperreality Sontag's view is akin to Jean Baudrillard's theory of 'hyperreality', where \"reality itself founders\" as a result of an endless \"reduplication of the real\" via media such as photography. He claims that the possibility of infinite identical objects creates a \"relationship of equivalence, of indifference ,\"... leading to the \"extinction of the original .\" It has been argued that the digitisation of photography undermines its truth claim . Lev Manovich likewise questions the indexical identity of motion pictures, rather labelling cinema a subgenre of painting, since it is possible to digitally modify frames, generate photorealistic images entirely using 3-D computer animation, and \" ... to cut, bend, stretch and stitch digitised film images into something which has perfect photographic credibility, although it was never actually filmed .\" Loss of indexicality It has also been argued that digital photographs inevitably lack indexicality, based on an understanding of \"crucial distinctions between the analogue and the digital\" in the way they record 'reality'. For instance, Frosh describes photographs as \"codes without a message\" \u2013 \"repurposable visual content made of malleable info-pixels .\" Likewise, Martin Lister claims that even with a digital camera, \" The images produced are rendered photo-realistic, they borrow photography's currency, its deeply historical 'reality effect', simply in order to have meaning .\" Criticism of the \"truth claim\" Susan Sontag challenges the \"presumption of veracity\" associated with photographs, arguing that they are \" ... as much an interpretation of the world as paintings and drawings are .\" She describes the role of the photographer in determining the exposure, light, texture and geometry of a photograph. Gunning points to the physicality of the camera as a mediator between the photograph and reality. He notes that the use of a lens, film, a particular exposure, kind of shutter, and developing process \" ... become magically whisked away if one considers the photograph as a direct imprint of reality .\" Sontag also describes the inability of a photograph to capture enough information about its subject to be considered a representation of reality. She states, \" The camera's rendering of reality must always hide more than it discloses\u2026only what which narrates can make us understand .\" Further, Roland Barthes notes that the human subject can be made less real through the process of being photographed. He notes, \" Once I feel myself observed by the lens, everything changes: I constitute myself in the process of 'posing', I instantaneously make another body for myself, transform myself in advance into an image .\"", "edit_actions": [{"type": "R", "before": "The truth claimof photographyis the term used by Tom Gunning", "after": "Truth claim, in photography, is a term Tom Gunning uses", "start_char_pos": 0, "end_char_pos": 60}, {"type": "R", "before": "upon", "after": "on", "start_char_pos": 188, "end_char_pos": 192}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 355, "end_char_pos": 356}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 374, "end_char_pos": 375}, {"type": "A", "before": null, "after": "...", "start_char_pos": 517, "end_char_pos": 517}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 590, "end_char_pos": 592}, {"type": "D", "before": ",", "after": null, "start_char_pos": 691, "end_char_pos": 692}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 1155, "end_char_pos": 1157}, {"type": "R", "before": "\",", "after": ",\"", "start_char_pos": 1405, "end_char_pos": 1407}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 1608, "end_char_pos": 1616}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 1656, "end_char_pos": 1658}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 1836, "end_char_pos": 1837}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 1852, "end_char_pos": 1853}, {"type": "R", "before": "truth", "after": "Truth", "start_char_pos": 2117, "end_char_pos": 2122}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 2161, "end_char_pos": 2163}, {"type": "D", "before": "\u2013", "after": null, "start_char_pos": 2468, "end_char_pos": 2469}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 2499, "end_char_pos": 2500}, {"type": "R", "before": "\",", "after": ",\"", "start_char_pos": 2749, "end_char_pos": 2751}, {"type": "R", "before": "\",", "after": ",\"...", "start_char_pos": 3273, "end_char_pos": 3275}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 3319, "end_char_pos": 3321}, {"type": "R", "before": "\"truth claim\"", "after": "truth claim", "start_char_pos": 3393, "end_char_pos": 3406}, {"type": "A", "before": null, "after": "...", "start_char_pos": 3657, "end_char_pos": 3657}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 3810, "end_char_pos": 3812}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 4168, "end_char_pos": 4170}, {"type": "R", "before": "the", "after": "The", "start_char_pos": 4237, "end_char_pos": 4240}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 4395, "end_char_pos": 4397}, {"type": "A", "before": null, "after": "...", "start_char_pos": 4536, "end_char_pos": 4536}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 4606, "end_char_pos": 4608}, {"type": "A", "before": null, "after": "...", "start_char_pos": 4928, "end_char_pos": 4928}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 5022, "end_char_pos": 5024}, {"type": "R", "before": "the", "after": "The", "start_char_pos": 5185, "end_char_pos": 5188}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 5307, "end_char_pos": 5309}, {"type": "R", "before": "once", "after": "Once", "start_char_pos": 5440, "end_char_pos": 5444}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 5639, "end_char_pos": 5641}], "sents_char_pos": [0, 149, 250, 323, 443, 669, 790, 1067, 1157, 1292, 1507, 1658, 2001, 2343, 2649, 2942, 2955, 3155, 3321, 3406, 3812, 4035, 4170, 4608, 4725, 4823, 5024, 5170, 5259, 5309, 5427]}
+{"doc_id": "20412506", "revision_depth": "1", "before_revision": "Overview A convergence is occurring between various technologies associated with the notion of live web meetings. The phrase Web conferencing has been used to describe group discussions over the internet. These discussions are often implemented using Synchronous conferencing protocols and are commonly used for webinars, where one meeting participant lectures to other participants while presenting some information that is rendered to all participants by a common client application (web or fat client). The term Telepresence refers to a set of technologies which allow a person to feel as if they were present, to give the appearance that they were present, or to have an effect, at a location other than their true location. Telepresence requires that the senses of the user, or users, are provided with such stimuli as to give the feeling of being in that other location. Additionally, the user(s) may be given the ability to affect the remote location. As the analysts at IDC describe, the goal is to create a sensory experience that communicates the full range of human interactions in a live meeting. While many Telepresence solutions have focused on the ambiance aspects of remote meeting environments and while most web conferencing solutions have focused on the integration of webinar and telephony features into collaboration software offerings/services, little has been done to simulate or reflect the asynchronous or simultaneous aspects of live meetings over the internet. Ideally what is required is a set of technologies that enrich communications with sensory elements that provide a just-like-being-there experience for live meetings. The sensory experience should include a range of sight, sound, and touch interactions. However, the current state of web conferencing and telepresence solutions focus mainly on the sight and sound aspects of a meeting and fall short on the interaction capabilities of participants. Moreover, web conferencing and telepresence solutions are typically not vendor neutral and tend to be pricey. Users have the ability to incorporate webinar capabilities into an Immersive or Adaptive Telepresence solution to extend meeting attendance. Yet this injection of Telepresence Lite capabilities all along the Telepresence solution spectrum still does not address support for simultaneous interactions with the material being presented in a meeting. Solution Concepts People meet, gather, huddle for business and personal endeavors. The majority of the discussions associated with these conferencing activities tend to be associated with decisions. Typically, the decision making process incorporates the analysis of one or more visualizations of data. The Cooperative Web pertains to a set of technologies and associated architectures that promise to empower decision agility with respect to information available for evaluation via web-based applications. While Cooperative Web solutions can incorporate digital components (audio, video) to replicate the face-face meeting experience with the human sensory elements of sight and sound, the interactive sensory element is a differentiating factor. A core value proposition of this technology is that it provides all meeting participants with the ability to manipulate data and drive web centric applications that are used in the decision making process. In consideration to IDC's call for the ability to develop a low-cost plug-and-play Telepresence solution that can be easily adopted by medium-sized companies to extend the reach and promise of Telepresence , the Cooperative Web offers solution vendors and composite web application developers the ability to develop standards based web applications that can be used in collaborative communication-oriented meetings. Sample Solution Scenarios Characteristics Webinar whereby Audio, Video and Co-Web enabled applications are combined Traditional teleconference or phone conversations aided by a Co-Web enabled application (this would be useful when broadband limitations exists or when video cameras are not present) Ad hoc just-in-time web conference Video conferencing meeting whereby a remote mobile attendee is required Solution Scenarios TeleMedicine: Remote health care or diagnosis E-Learning or Distance Learning Call Center Support Financial Analyst Briefing Conceptual Architecture The maturity of service-oriented-architectures has fueled an ecosystem of ajax-based gadgets (widgets) that encapsulate content services (REST, WSDL) . These gadgets, standalone fragments of a web page, make up the information rich web palette that can be assembled, wired and shared in composite web applications. Lets assume that the gadgets used in a given web page all publish the events associated with user-interactions to a predefined mediation server whereby all participants in a managed web meeting were notified of the interactions . Now, each instance of the gadgets in the web page (running in each meeting participants browser) would receive these remote interaction events as if they were locally triggered. The result would be that each meeting participant would broadcast his/her web page interactions and also subscribe to the results associated with interactions of other meeting participants. Comparison with Telepresence The following attributes most common associated with Telepresence solutions are Quality of Image True Eye Contact Life Size Image Proximity of image Sound quality Full complement of content presentation capabilities the reality is that many of top selling solutions focus more on the features associated with sight and sound and complementary ambiance aspects like high-end furniture. However, few focus on extending the Telepresence experience with interactive presentation capabilities. Cooperative Web enabled applications are complementary to the spectrum of Telepresence solutions as they extend the scope of the browser-based platform to allow all meeting participants to share browser applications in a live online meeting. As described by Gartner, the spectrum of Telepresence solutions can range from Lite to Adaptive to Immersive. Cooperative Web enabled applications can be leveraged along all points on the solution spectrum to help enrich the just-like-being-there aspects of the Telepresence experience. Typically, sophisticated technologies are required for a user to be given a convincing telepresence experience. However, one of the benefits of Cooperative Web solutions is the ubiquity of the technology dependencies. The cost of entry for adoption has been reduced to a common browser, a few JavaScript libraries and some browser plug-ins. The net result is that the Cooperative Web not only extends the reach of Telepresence solutions, this technology also improves the overall experience of remote communications. However, in its raw state, a Co-Web enabled application does not require a Telepresence environment nor a hosted Web Conferencing solution. The minimum requirement is a mediation server and a co-web enabled application.", "after_revision": "Overview A convergence is occurring between various technologies associated with the notion of live web meetings. The phrase Web conferencing has been used to describe group discussions over the internet. These discussions are often implemented using Synchronous conferencing protocols and are commonly used for webinars, where one meeting participant lectures to other participants while presenting some information that is rendered to all participants by a common client application (web or fat client). The term telepresence refers to a set of technologies which allow a person to feel as if they were present, to give the appearance that they were present, or to have an effect, at a location other than their true location. Telepresence requires that the senses of the user, or users, are provided with such stimuli as to give the feeling of being in that other location. Additionally, users may be given the ability to affect the remote location. As the analysts at IDC describe, the goal is to create a sensory experience that communicates the full range of human interactions in a live meeting. While many telepresence solutions have focused on the ambiance aspects of remote meeting environments and while most web conferencing solutions have focused on the integration of webinar and telephony features into collaboration software offerings/services, little has been done to simulate or reflect the asynchronous or simultaneous aspects of live meetings over the internet. Ideally what is required is a set of technologies that enrich communications with sensory elements that provide a just-like-being-there experience for live meetings. The sensory experience should include a range of sight, sound, and touch interactions. However, the current state of web conferencing and telepresence solutions focus mainly on the sight and sound aspects of a meeting and fall short on the interaction capabilities of participants. Moreover, web conferencing and telepresence solutions are typically not vendor neutral and tend to be pricey. Users have the ability to incorporate webinar capabilities into an immersive or adaptive telepresence solution to extend meeting attendance. Yet this injection of telepresence Lite capabilities all along the telepresence solution spectrum still does not address support for simultaneous interactions with the material being presented in a meeting. Solution concepts People meet, gather, huddle for business and personal endeavors. The majority of the discussions associated with these conferencing activities tend to be associated with decisions. Typically, the decision making process incorporates the analysis of one or more visualizations of data. The Cooperative Web pertains to a set of technologies and associated architectures that promise to empower decision agility with respect to information available for evaluation via web-based applications. While cooperative web solutions can incorporate digital components (audio, video) to replicate the face-face meeting experience with the human sensory elements of sight and sound, the interactive sensory element is a differentiating factor. A core value proposition of this technology is that it provides all meeting participants with the ability to manipulate data and drive web centric applications that are used in the decision making process. In consideration to IDC's call for the ability to develop a low-cost plug-and-play telepresence solution that can be easily adopted by medium-sized companies to extend the reach and promise of telepresence , the Cooperative Web offers solution vendors and composite web application developers the ability to develop standards based web applications that can be used in collaborative communication-oriented meetings. Sample solution scenarios characteristics Webinar whereby Audio, Video and Co-Web enabled applications are combined Traditional teleconference or phone conversations aided by a Co-Web enabled application (this would be useful when broadband limitations exists or when video cameras are not present) Ad hoc just-in-time web conference Video conferencing meeting whereby a remote mobile attendee is required Solution scenarios TeleMedicine: Remote health care or diagnosis E-Learning or Distance Learning Call Center Support Financial Analyst Briefing Conceptual architecture The maturity of service-oriented-architectures has fueled an ecosystem of ajax-based gadgets (widgets) that encapsulate content services . These gadgets, standalone fragments of a web page, make up the information rich web palette that can be assembled, wired and shared in composite web applications. Assume that the gadgets used in a given web page all publish the events associated with user-interactions to a predefined mediation server whereby all participants in a managed web meeting were notified of the interactions , then each instance of the gadgets in the web page (running in each meeting participants browser) would receive these remote interaction events as if they were locally triggered. The result would be that each meeting participant would broadcast his/her web page interactions and also subscribe to the results associated with interactions of other meeting participants. Comparison with telepresence The following attributes most common associated with Telepresence solutions are Quality of Image True Eye Contact Life Size Image Proximity of image Sound quality Full complement of content presentation capabilities The reality is that many of top selling solutions focus more on the features associated with sight and sound and complementary ambiance aspects like high-end furniture. However, few focus on extending the telepresence experience with interactive presentation capabilities. Cooperative web enabled applications are complementary to the spectrum of telepresence solutions as they extend the scope of the browser-based platform to allow all meeting participants to share browser applications in a live online meeting. As described by Gartner, the spectrum of Telepresence solutions can range from Lite to Adaptive to Immersive. Cooperative Web enabled applications can be leveraged along all points on the solution spectrum to help enrich the just-like-being-there aspects of the telepresence experience. Typically, sophisticated technologies are required for a user to be given a convincing telepresence experience. However, one of the benefits of cooperative web solutions is the ubiquity of the technology dependencies. The cost of entry for adoption has been reduced to a common browser, a few JavaScript libraries and some browser plug-ins. The net result is that the cooperative web not only extends the reach of telepresence solutions, this technology also improves the overall experience of remote communications. However, in its raw state, a co-web enabled application does not require a telepresence environment nor a hosted web conferencing solution. The minimum requirement is a mediation server and a co-web enabled application.", "edit_actions": [{"type": "R", "before": "Telepresence", "after": "telepresence", "start_char_pos": 515, "end_char_pos": 527}, {"type": "R", "before": "the user(s)", "after": "users", "start_char_pos": 891, "end_char_pos": 902}, {"type": "R", "before": "Telepresence", "after": "telepresence", "start_char_pos": 1120, "end_char_pos": 1132}, {"type": "R", "before": "Immersive or Adaptive Telepresence", "after": "immersive or adaptive telepresence", "start_char_pos": 2113, "end_char_pos": 2147}, {"type": "R", "before": "Telepresence", "after": "telepresence", "start_char_pos": 2209, "end_char_pos": 2221}, {"type": "R", "before": "Telepresence", "after": "telepresence", "start_char_pos": 2254, "end_char_pos": 2266}, {"type": "R", "before": "Concepts", "after": "concepts", "start_char_pos": 2403, "end_char_pos": 2411}, {"type": "R", "before": "Cooperative Web", "after": "cooperative web", "start_char_pos": 2908, "end_char_pos": 2923}, {"type": "R", "before": "Telepresence", "after": "telepresence", "start_char_pos": 3432, "end_char_pos": 3444}, {"type": "R", "before": "Telepresence", "after": "telepresence", "start_char_pos": 3542, "end_char_pos": 3554}, {"type": "R", "before": "Solution Scenarios Characteristics", "after": "solution scenarios characteristics", "start_char_pos": 3772, "end_char_pos": 3806}, {"type": "R", "before": "Scenarios", "after": "scenarios", "start_char_pos": 4180, "end_char_pos": 4189}, {"type": "R", "before": "Architecture", "after": "architecture", "start_char_pos": 4326, "end_char_pos": 4338}, {"type": "D", "before": "(REST, WSDL)", "after": null, "start_char_pos": 4476, "end_char_pos": 4488}, {"type": "R", "before": "Lets assume", "after": "Assume", "start_char_pos": 4654, "end_char_pos": 4665}, {"type": "R", "before": ". Now,", "after": ", then", "start_char_pos": 4882, "end_char_pos": 4888}, {"type": "R", "before": "Telepresence", "after": "telepresence", "start_char_pos": 5268, "end_char_pos": 5280}, {"type": "R", "before": "the", "after": "The", "start_char_pos": 5497, "end_char_pos": 5500}, {"type": "R", "before": "Telepresence", "after": "telepresence", "start_char_pos": 5702, "end_char_pos": 5714}, {"type": "R", "before": "Web", "after": "web", "start_char_pos": 5782, "end_char_pos": 5785}, {"type": "R", "before": "Telepresence", "after": "telepresence", "start_char_pos": 5844, "end_char_pos": 5856}, {"type": "R", "before": "Telepresence", "after": "telepresence", "start_char_pos": 6274, "end_char_pos": 6286}, {"type": "R", "before": "Cooperative Web", "after": "cooperative web", "start_char_pos": 6443, "end_char_pos": 6458}, {"type": "R", "before": "Cooperative Web", "after": "cooperative web", "start_char_pos": 6667, "end_char_pos": 6682}, {"type": "R", "before": "Telepresence", "after": "telepresence", "start_char_pos": 6713, "end_char_pos": 6725}, {"type": "R", "before": "Co-Web", "after": "co-web", "start_char_pos": 6845, "end_char_pos": 6851}, {"type": "R", "before": "Telepresence", "after": "telepresence", "start_char_pos": 6891, "end_char_pos": 6903}, {"type": "R", "before": "Web Conferencing", "after": "web conferencing", "start_char_pos": 6929, "end_char_pos": 6945}], "sents_char_pos": [0, 113, 204, 505, 728, 876, 958, 1108, 1487, 1653, 1740, 1935, 2045, 2186, 2393, 2476, 2592, 2696, 2901, 3142, 3348, 3764, 4203, 4653, 5061, 5251, 5665, 5769, 6011, 6121, 6298, 6410, 6516, 6639, 6815, 6955]}
+{"doc_id": "2081132", "revision_depth": "1", "before_revision": "AntilocutionKenny, Robert Wade; ANTILOCUTIONS in Encyclopedia of Human Services and Diversity (edited By Linwood Cousins), 2014, pp. 94\u201396. is a form of prejudice in which negative verbal remarks against a person, group, or community, are made in a public or private setting and not addressed directly to the target. American psychologist Gordon Allport first used this term in his 1954 book, The Nature of Prejudice , Allport, Gordon W (1955). The Nature of Prejudice. Cambridge, US to label the first of the five degrees of antipathy that measure a manifestation of prejudice in a society as antilocution (see also: \"Allport's Scale\"). Antilocution is similar to the relatively common form of betrayal in which a person \"talks behind someone's back\", even though antilocution involves an in-group ostracizing an out-group on a biased basis. The use of the term antilocution is overshadowed by the term hate speech, which holds a similar meaning but places no regard on the fact that the out-group is unaware of the discrimination and frequently progresses to other more damaging forms of prejudiced behavior.%DIFDELCMD < %DIFDELCMD < %%% Etymology The term first appeared in 1954 in The Nature of Prejudice, a book written by an American psychologist Gordon Allport. Antilocution is the first stage of Allport's scale, a scale to measure the degree of bias or prejudice in one's society. After antilocution, the subsequent stages of prejudice include avoidance, discrimination, physical attack, and extermination. Antilocution is a compound noun consisting of the word 'locution' and prefix 'anti' which expresses a counterproductive way to employ locution. Description Antilocution is considered to be the least aggressive form of prejudice and is represented by conversations of individuals in a society sharing similar opinions that are often biased, resulting in the negative reputation of the target of antilocution. Although this form of prejudice may be the least aggressive, it can nevertheless be very destructive and life-changing for the subject. Those who employ antilocution may not be aware of it or consider themselves as having been involved in any discriminatory act. Antilocution is perhaps the most common form of discriminative act , which is more commonly referred to as minor gossip or scandal . The subject may feel the need to join in with the flow or comedize it if the antilocution is employed by the majority. This can either create a place for the subject in the pack or lead to the spread of biased information through society which can, in turn, create a negative modification in behaviors toward the subject , thereby significantly putting the subject at a disadvantage both socially and mentally . Causes, employment, and danger Individuals often engage in prejudicial conversation when they feel threatened and it is frequently based on misperceptions and stereotyping of the subject. Antilocution is often related to the fact that the subject is viewed as an anomaly to the group, for example, the subject maybe a new member thus no one actually knows the subject so they judge the subject based on their perceptions and stereotyping, which often involve racism, ethnic, or gender. Most individuals engaged in this type of behavior will most likely deny that their behavior is prejudicial in any way, and often indicate this as a matter of expressing their own opinions. This kind of treatment to antilocution is very dangerous on its own as it leads to widespread discriminative acts toward the subject as individuals feel little to no guilt in doing so. Facts are often needed to contradict misinformation and create a positive influence in the society toward the subject, or else opinions will continue to multiply and lead to further misconceptions, which can eventually lead to more serious forms of prejudice and discrimination and will harm the subject socially, mentally, and even physically if the problem worsens to a certain degree.", "after_revision": "Antilocution describes a from of prejudice in which negative verbal remarks against a person, group, or community, are made and not addressed directly to the subject.Kenny, Robert Wade; ANTILOCUTIONS in Encyclopedia of Human Services and Diversity (edited By Linwood Cousins), 2014, pp. 94\u201396. History American psychologist Gordon Allport coined this term in his 1954 book, The Nature of Prejudice . Allport, Gordon W (1955). The Nature of Prejudice. Cambridge, US %DIFDELCMD < %DIFDELCMD < %%% Antilocution is the first stage of Allport's Scale, which can be used to measure the degree of bias or prejudice in a society. After antilocution, Allport's subsequent stages of prejudice are avoidance, discrimination, physical attack, and extermination. Antilocution is a compound noun consisting of the word 'locution' and prefix 'anti' which expresses a counterproductive way to employ locution. Description Antilocution is considered to be the least aggressive form of prejudice , but can nevertheless be destructive and life-changing for the subject. Those who employ antilocution may not be aware of it or consider themselves as having been involved in any discriminatory act. Antilocution is perhaps the most common form of discriminative act . The subject may feel the need to join in if the antilocution is employed by the majority. This can either create a place for the subject in the group or lead to the spread of biased information that perpetuates discriminatory behaviors toward the subject . Antilocution is similar to 'talking behind someone's back,' though antilocution involves an in-group ostracizing an out-group on a biased basis. The term 'antilocution' is used less often than the term 'hate speech', which has a similar meaning but places no regard on the fact that the out-group is unaware of the discrimination and frequently progresses to other more damaging forms of prejudiced behavior. Causes, employment, and danger Individuals often engage in prejudicial conversation when they feel threatened and it is frequently based on misperceptions and stereotyping of the subject. Antilocution is often related to the view of the subject as an anomaly . For example, a group may judge a new, unknown member based on their perceptions and exposure to stereotypes. Individuals engaged in this behavior may deny that their behavior is prejudicial , but that it is a matter of expressing their own opinions. This response to antilocution is very dangerous on its own as it leads to widespread discriminative acts toward the subject as individuals feel little to no guilt in doing so. Facts are often needed to contradict misinformation and create a positive influence in the society toward the subject, or else opinions will continue to multiply and lead to further misconceptions, which can eventually lead to more serious forms of prejudice and discrimination and will harm the subject socially, mentally, and even physically if the problem worsens to a certain degree.", "edit_actions": [{"type": "R", "before": "AntilocutionKenny, Robert Wade; ANTILOCUTIONS in Encyclopedia of Human Services and Diversity (edited By Linwood Cousins), 2014, pp. 94\u201396. is a form", "after": "Antilocution describes a from", "start_char_pos": 0, "end_char_pos": 149}, {"type": "D", "before": "in a public or private setting", "after": null, "start_char_pos": 244, "end_char_pos": 274}, {"type": "R", "before": "target.", "after": "subject.Kenny, Robert Wade; ANTILOCUTIONS in Encyclopedia of Human Services and Diversity (edited By Linwood Cousins), 2014, pp. 94\u201396.", "start_char_pos": 309, "end_char_pos": 316}, {"type": "A", "before": null, "after": "History", "start_char_pos": 317, "end_char_pos": 317}, {"type": "R", "before": "first used", "after": "coined", "start_char_pos": 355, "end_char_pos": 365}, {"type": "R", "before": ",", "after": ".", "start_char_pos": 418, "end_char_pos": 419}, {"type": "D", "before": "to label the first of the five degrees of antipathy that measure a manifestation of prejudice in a society as antilocution (see also: \"Allport's Scale\"). Antilocution is similar to the relatively common form of betrayal in which a person \"talks behind someone's back\", even though antilocution involves an in-group ostracizing an out-group on a biased basis.", "after": null, "start_char_pos": 485, "end_char_pos": 843}, {"type": "D", "before": "The use of the term antilocution is overshadowed by the term hate speech, which holds a similar meaning but places no regard on the fact that the out-group is unaware of the discrimination and frequently progresses to other more damaging forms of prejudiced behavior.", "after": null, "start_char_pos": 844, "end_char_pos": 1111}, {"type": "D", "before": "Etymology", "after": null, "start_char_pos": 1141, "end_char_pos": 1150}, {"type": "R", "before": "The term first appeared in 1954 in The Nature of Prejudice, a book written by an American psychologist Gordon Allport. Antilocution is the first", "after": "Antilocution is the first", "start_char_pos": 1151, "end_char_pos": 1295}, {"type": "R", "before": "scale, a scale", "after": "Scale, which can be used", "start_char_pos": 1315, "end_char_pos": 1329}, {"type": "R", "before": "one's", "after": "a", "start_char_pos": 1376, "end_char_pos": 1381}, {"type": "R", "before": "the", "after": "Allport's", "start_char_pos": 1411, "end_char_pos": 1414}, {"type": "R", "before": "include", "after": "are", "start_char_pos": 1446, "end_char_pos": 1453}, {"type": "R", "before": "and is represented by conversations of individuals in a society sharing similar opinions that are often biased, resulting in the negative reputation of the target of antilocution. Although this form of prejudice may be the least aggressive, it", "after": ", but", "start_char_pos": 1745, "end_char_pos": 1988}, {"type": "D", "before": "very", "after": null, "start_char_pos": 2009, "end_char_pos": 2013}, {"type": "D", "before": ", which is more commonly referred to as minor gossip or scandal", "after": null, "start_char_pos": 2255, "end_char_pos": 2318}, {"type": "D", "before": "with the flow or comedize it", "after": null, "start_char_pos": 2362, "end_char_pos": 2390}, {"type": "R", "before": "pack", "after": "group", "start_char_pos": 2494, "end_char_pos": 2498}, {"type": "R", "before": "through society which can, in turn, create a negative modification in", "after": "that perpetuates discriminatory", "start_char_pos": 2543, "end_char_pos": 2612}, {"type": "D", "before": ", thereby significantly putting the subject at a disadvantage both socially and mentally", "after": null, "start_char_pos": 2642, "end_char_pos": 2730}, {"type": "A", "before": null, "after": "Antilocution is similar to 'talking behind someone's back,' though antilocution involves an in-group ostracizing an out-group on a biased basis.", "start_char_pos": 2733, "end_char_pos": 2733}, {"type": "A", "before": null, "after": "The term 'antilocution' is used less often than the term 'hate speech', which has a similar meaning but places no regard on the fact that the out-group is unaware of the discrimination and frequently progresses to other more damaging forms of prejudiced behavior.", "start_char_pos": 2734, "end_char_pos": 2734}, {"type": "R", "before": "fact that the subject is viewed", "after": "view of the subject", "start_char_pos": 2960, "end_char_pos": 2991}, {"type": "R", "before": "to the group, for example, the subject maybe a new member thus no one actually knows the subject so they judge the subject", "after": ". For example, a group may judge a new, unknown member", "start_char_pos": 3006, "end_char_pos": 3128}, {"type": "R", "before": "stereotyping, which often involve racism, ethnic, or gender. Most individuals", "after": "exposure to stereotypes. Individuals", "start_char_pos": 3160, "end_char_pos": 3237}, {"type": "R", "before": "type of behavior will most likely", "after": "behavior may", "start_char_pos": 3254, "end_char_pos": 3287}, {"type": "R", "before": "in any way, and often indicate this as", "after": ", but that it is", "start_char_pos": 3328, "end_char_pos": 3366}, {"type": "R", "before": "kind of treatment", "after": "response", "start_char_pos": 3415, "end_char_pos": 3432}], "sents_char_pos": [0, 31, 316, 445, 470, 638, 843, 1111, 1269, 1390, 1516, 1660, 1924, 2060, 2187, 2320, 2439, 2922, 3220, 3409, 3594]}
+{"doc_id": "2081132", "revision_depth": "2", "before_revision": "Antilocution describes a form of prejudice in which negative verbal remarks against a person, group, or community, are made and not addressed directly to the subject.Kenny, Robert Wade; ANTILOCUTIONS in Encyclopedia of Human Services and Diversity (edited By Linwood Cousins), 2014, pp. 94\u201396. American psychologist Gordon Allport coined this term in his 1954 book, The Nature of Prejudice.Allport, Gordon W (1955). The Nature of Prejudice. Cambridge, US Antilocution is the first stage of Allport's Scale, which can be used to measure the degree of bias or prejudice in a society. After antilocution, Allport's subsequent stages of prejudice are avoidance, discrimination, physical attack, and extermination. Antilocution is a compound noun consisting of the word 'locution' and prefix 'anti' which expresses a counterproductive way to employ locution . Description Antilocution is considered to be the least aggressive form of prejudice , but can nevertheless be destructive and life-changing for the subject . Those who employ antilocution may not be aware of it or consider themselves as having been involved in any discriminatory act. Antilocution is perhaps the most common form of discriminative act. The subject may feel the need to join in if the antilocution is employed by the majority. This can either create a place for the subject in the group or lead to the spread of biased information that perpetuates discriminatory behaviors toward the subject . The term 'antilocution' is used less often than the term 'hate speech , which has a similar meaning but places no regard on the fact that the out-group is unaware of the discrimination and frequently progresses to other more damaging forms of prejudiced behavior. Causes, employment, and danger Individuals often engage in a prejudicial conversation when they feel threatened and it is frequently based on misperceptions and stereotyping of the subject. Antilocution is often related to the view of the subject as an anomaly. For example, a group may judge a new, unknown member based on their perceptions and exposure to stereotypes. Individuals engaged in this behavior may deny that their behavior is prejudicial, but that it is a matter of expressing their own opinions. This response to antilocution is very dangerous on its own as it leads to widespread discriminative acts toward the subject as individuals feel little to no guilt in doing so . Facts are often needed to contradict misinformation and create a positive influence in the society toward the subject, or else opinions will continue to multiply and lead to further misconceptions, which can eventually lead to more serious forms of prejudice and discrimination and will harm the subject socially, mentally, and even physically if the problem worsens to a certain degree .", "after_revision": "Antilocution describes a form of prejudice in which negative verbal remarks against a person, group, or community, are made but not addressed directly to the subject.Kenny, Robert Wade; ANTILOCUTIONS in Encyclopedia of Human Services and Diversity (edited By Linwood Cousins), 2014, pp. 94\u201396. American psychologist Gordon Allport coined this term in his 1954 book, The Nature of Prejudice.Allport, Gordon W (1955). The Nature of Prejudice. Cambridge, US Antilocution is the first point on Allport's Scale, which can be used to measure the degree of bias or prejudice in a society. Allport's stages of prejudice are antilocution, avoidance, discrimination, physical attack, and extermination. Antilocution is a compound noun consisting of the word 'locution' and prefix 'anti' which expresses locution's antithesis . Description Allport considered antilocution to be the least aggressive form of prejudice . It can nevertheless be destructive and life-changing for its object/target . Those who employ antilocution may neither know what they are doing nor consider themselves committing a discriminatory act. A subject may feel the need to join in if the antilocution is employed by the majority. This can either bind the subject to the group and/or spread biased information that perpetuates discriminatory behaviors toward the object . \"Antilocution\" is used less often than \"hate speech\" , which has a similar meaning but places no regard on the fact that the out-group is unaware of the discrimination . Causes, employment, and danger Individuals may engage in prejudicial conversation when they feel threatened . Such conversations may be based on misperceptions and by the subject. For example, a group may apply stereotypes to a new, unknown member . Such individuals may deny that their behavior is prejudicial, and is instead a matter of expressing opinions . Antilocution can lead to widespread discrimination toward the object as the subject(s) do not feel that they are transgressing. Facts are needed to dispel such stereotypes and create a positive disposition toward the object .", "edit_actions": [{"type": "R", "before": "and", "after": "but", "start_char_pos": 124, "end_char_pos": 127}, {"type": "R", "before": "stage of", "after": "point on", "start_char_pos": 481, "end_char_pos": 489}, {"type": "D", "before": "After antilocution,", "after": null, "start_char_pos": 582, "end_char_pos": 601}, {"type": "D", "before": "subsequent", "after": null, "start_char_pos": 612, "end_char_pos": 622}, {"type": "A", "before": null, "after": "antilocution,", "start_char_pos": 647, "end_char_pos": 647}, {"type": "R", "before": "a counterproductive way to employ locution", "after": "locution's antithesis", "start_char_pos": 811, "end_char_pos": 853}, {"type": "R", "before": "Antilocution is considered", "after": "Allport considered antilocution", "start_char_pos": 868, "end_char_pos": 894}, {"type": "R", "before": ", but", "after": ". It", "start_char_pos": 940, "end_char_pos": 945}, {"type": "R", "before": "the subject", "after": "its object/target", "start_char_pos": 1000, "end_char_pos": 1011}, {"type": "R", "before": "not be aware of it or consider themselves as having been involved in any", "after": "neither know what they are doing nor consider themselves committing a", "start_char_pos": 1048, "end_char_pos": 1120}, {"type": "R", "before": "Antilocution is perhaps the most common form of discriminative act. The", "after": "A", "start_char_pos": 1141, "end_char_pos": 1212}, {"type": "R", "before": "create a place for the subject in the group or lead to the spread of", "after": "bind the subject to the group and/or spread", "start_char_pos": 1315, "end_char_pos": 1383}, {"type": "R", "before": "subject", "after": "object", "start_char_pos": 1456, "end_char_pos": 1463}, {"type": "R", "before": "The term 'antilocution'", "after": "\"Antilocution\"", "start_char_pos": 1466, "end_char_pos": 1489}, {"type": "R", "before": "the term 'hate speech", "after": "\"hate speech\"", "start_char_pos": 1514, "end_char_pos": 1535}, {"type": "R", "before": "and frequently progresses to other more damaging forms of prejudiced behavior.", "after": ".", "start_char_pos": 1651, "end_char_pos": 1729}, {"type": "R", "before": "often engage in a", "after": "may engage in", "start_char_pos": 1773, "end_char_pos": 1790}, {"type": "R", "before": "and it is frequently", "after": ". Such conversations may be", "start_char_pos": 1842, "end_char_pos": 1862}, {"type": "R", "before": "stereotyping of", "after": "by", "start_char_pos": 1891, "end_char_pos": 1906}, {"type": "D", "before": "Antilocution is often related to the view of the subject as an anomaly.", "after": null, "start_char_pos": 1920, "end_char_pos": 1991}, {"type": "R", "before": "judge", "after": "apply stereotypes to", "start_char_pos": 2017, "end_char_pos": 2022}, {"type": "R", "before": "based on their perceptions and exposure to stereotypes. Individuals engaged in this behavior", "after": ". Such individuals", "start_char_pos": 2045, "end_char_pos": 2137}, {"type": "R", "before": "but that it is", "after": "and is instead", "start_char_pos": 2183, "end_char_pos": 2197}, {"type": "R", "before": "their own opinions. This response to antilocution is very dangerous on its own as it leads to widespread discriminative acts toward the subject as individuals feel little to no guilt in doing so", "after": "opinions", "start_char_pos": 2221, "end_char_pos": 2415}, {"type": "A", "before": null, "after": "Antilocution can lead to widespread discrimination toward the object as the subject(s) do not feel that they are transgressing.", "start_char_pos": 2418, "end_char_pos": 2418}, {"type": "R", "before": "often needed to contradict misinformation", "after": "needed to dispel such stereotypes", "start_char_pos": 2429, "end_char_pos": 2470}, {"type": "R", "before": "influence in the society toward the subject, or else opinions will continue to multiply and lead to further misconceptions, which can eventually lead to more serious forms of prejudice and discrimination and will harm the subject socially, mentally, and even physically if the problem worsens to a certain degree", "after": "disposition toward the object", "start_char_pos": 2493, "end_char_pos": 2805}], "sents_char_pos": [0, 166, 185, 293, 390, 415, 440, 581, 710, 855, 1013, 1140, 1208, 1298, 1465, 1729, 1919, 1991, 2100, 2240, 2537]}
+{"doc_id": "2119992", "revision_depth": "2", "before_revision": "With the end of rail operations, CPR wanted to redevelop the 17 hectare corridor for residential and commercial purposes, but was prevented by the City of Vancouver, who wanted to acquire the area for green space and (potentially) a future light rail transportation line. In 2006, the Supreme Court of Canada affirmed the city's zoning authority to prohibit CPR development, but the final disposition of the area was not resolved until 2016, when the City of Vancouver purchased the land from CPR for $55 million. In the interim, home owners adjacent to the unused rail line and local community groups had built and maintained numerous gardens and plots on the 9 km route. The homes adjacent to the corridor are large, and they are some of the most expensive properties in the city, with the green space adding to the exclusivity of the properties. In 2014, as negotiations with the city dragged on, CPR began repairing the rail line, clearing the gardens, and preparing to run trains on the line. The city filed an injunction to block the railway from reactivating the line, but that bid was dismissed in B.C. Supreme Court. In 2016, the City finalized acquisition of the land. Terms of the complex purchase agreement included a stipulation that a portion of the corridor must be dedicated for light rail transit use. This has not entirely ended the conflict over the area. Since acquiring the Arbutus corridor, the city has built a bike and pedestrian trail, and developed an Arbutus Greenway plan, but adjacent home owners have pushed for a return to the previous state. Many would like to leave the area wild and inaccessible which would make the now public area an exclusive green space for the wealthy adjacent home owners. The official Arbutus Greenway plan has divided the 9 km route into 8 different character zones that will include bicycle and pedestrian paths, public spaces, community gardens, plazas, and public art. Guerrilla Park, Welland, ON 250px|\"Art at the Park\" at Guerrilla Park in Welland, Ontario in 2015. Whereas most areas that are subjected to guerrilla gardening are unused or abandoned areas not designated for parkland or green space, this is an exception in that it was initially designed for such a purpose. Originally a maintained parkette in Welland, this small area along the Welland Recreational Waterway fell into disuse and neglect for years. In 2013, a handful of local residents, including visual artists and guerrilla gardeners, reclaimed the space by fully restoring overgrown flower beds, adding outdoor paintings, and overseeing general landscape maintenance. Although this area is officially municipal property, there was initially a question by volunteers as to which local organization was responsible for this parkette's maintenance (whether responsibility fell into hands of Welland Recreational Canal Corporation or City of Welland Parks Department). Volunteers met with representatives of City of Welland, and an unofficial verbal agreement was made, ensuring that although the City of Welland does own the parkette land, volunteers may continue maintenance and gardening in the area. Currently, the area attracts some local artistic, musical, and creative youth. It has also been the setting for a number of small, unorganized or impromptu events, such as art shows. Denmark \"Garden in a night\" In 1996, Have p\u00e5 en nat (\"Garden in a night\") was made by the Danish \u00d8kologiske Igangs\u00e6ttere (\"Organic starters\"). An empty piece of land in the middle of the city at Guldbergsgade in N\u00f8rrebro, Copenhagen, Denmark, was transformed into a garden in a single night. About 1,000 people took part in the URL Finland Villi Vy\u00f6hyke r.y. (Wild Zone NGO) Villi Vy\u00f6hyke registered association is Finnish nature conservation focused organisation which was founded in Tampere in 2013. Founders of the association started planting meadow plants to road embankments and wastes in urban environments. Urbanization and structural change of agriculture has made many meadow plants endangered in Finland during 20st and 21st centuries. According to members planting wild plants in city area is in gray area according to Finnish law. City of Tampere has reacted positively to the functioning of the association. Villi Vy\u00f6hyke has established over 50 guerilla meadows in city of Tampere. The association operates mainly in Pirkanmaa region. New Zealand Vacant lot of cabbages In 1978 downtown Wellington, New Zealand artist Barry Thomas, in collaboration with Chris Lipscombe, Hugh Walton and others, planted 180 cabbages \"on the demolished Duke of Edinburgh/Roxy Theatre site in the centre of Wellington. This cabbage patch, planted in such a way as to spell the word CABBAGE immediately captured the imagination of both the media and the public and engendered a flurry of other activities on the site, culminating in a week-long festival... when the cabbages were ceremonially harvested.\" While a work of conceptual sculpture, this intervention is also an early example of guerrilla gardening in New Zealand. Thomas' work remained for six months, \"astonishingly unvandalised, as a living, breathing sculpture in the heart of the city.\" Christina Barton writes that in the months that followed, \"it captured the hearts and minds of Wellingtonians, who followed the growth of the cabbages, adding their own embellishments to the site, and contributed to the week of festivities (with poetry readings, performances, and the distribution of free coleslaw) that celebrated their harvest\", describing the work as \"a provocation to the local council and the city's developers\". Thomas' documentation of the project was recently purchased by New Zealand's national gallery Te Papa, who described the work as an \"important moment in New Zealand's art and social history\" with links to the \"Occupy movement, urban farming and guerrilla gardening\". South Korea Guerrilla gardening in South Korea is organized and carried out by individuals, volunteer groups and Internet communities. Richard Reynolds visited South Korea in August 2012 and spoke to many Korean audiences about guerrilla gardening through TEDxItaewon.United Kingdom GuerrillaGardening.org GuerrillaGardening.org was created in October 2004 by Richard Reynolds as a blog of his solo guerrilla gardening outside Perronet House, a council block in London's Elephant and Castle district. At the time, his motivations were simply those of a frustrated gardener looking to beautify the neighborhood, but his website attracted the interest of fellow guerrilla gardeners in London and beyond, as well as the world's media. Reynolds's guerrilla gardening has now reached many pockets of South London, and news of his activity has inspired people around the world to get involved. He also works alongside other troops, some local and some who travel, to participate. He has also guerrilla gardened in Libya, Berlin and Montreal. Today, GuerrillaGardening.org is still his blog, but it also includes tips, links and thriving community boards where guerrilla gardeners from around the world are finding supportive locals. His book, On Guerrilla Gardening, which describes and discusses activity in 30 different countries, was published by Bloomsbury Publishing in the UK and USA in May 2008, in Germany in 2009, France in 2010 and South Korea in 2012. He regularly speaks on the subject to audiences and, in 2010, launched a campaign focusing specifically on pavements as an opportunity, to 'plant life in your URL Pimp Your Pavement Leaf Street Community Garden, Manchester Leaf Street is an acre of land in Hulme, Manchester, England, that was once an urban street until turfed over by Manchester City Council. Local people, facilitated by Manchester Permaculture Group, took direct action in turning the site into a thriving community garden. United States California SoCal Guerrilla Gardening Having developed the Clean, Green, and Glean method of Guerrilla Gardening, Scott Bunnell has been refining guerrilla gardening methods for over 30 years. In 2008, he started the SoCal Guerrilla Gardening Club, adding more drought tolerant gardens, and creating several gardens in Eagle Rock, Pico Rivera, Whittier, Long Beach, Norwalk, Artesia, Venice, Los Angeles County, and the Hollywood and Skid Row areas of Los Angeles. In 2015, SoCal Guerrilla Gardening Club also planted a guerrilla \"satellite\" garden in Morro Bay with their sister club, the Morro Bay Guerrilla Gardening Club. People's Park, Berkeley People's Park in Berkeley, California is now a de facto public park which was formed directly out of a community guerrilla gardening movement during the late 1960s, which took place on land owned by the University of California. The university acquired the land through eminent domain, and the houses on the land were demolished, but the university did not allocate funds to develop the land, and the land was left in a decrepit state. Eventually, people began to convert the unused land into a park. This led to an embattled history involving community members, the university, university police, Governor Reagan, and the national guard, where a protest and bloody reprisal left one person dead, and hundreds seriously wounded. Parts of the park were destroyed and rebuilt over time, and it has established itself as a permanent part of the city. Greenaid, Los Angeles Greenaid is a Los Angeles based organization founded in 2010 by Daniel Phillips and Kim Karlsrud of Common Studio. The organization converts vintage gumball machines to dispense seed balls (a combination of clay, compost, and region-specific seeds). Seed balls are then used for seed bombing, where they are tossed or planted in any area that may benefit from wildflowers. Greenaid partners with business owners, educators and citizens to distribute seedbomb vending machines in various communities worldwide. With region-specific seedbomb mixes, Greenaid aims to integrate and beautify (rather than disrupt) traditionally bland urban areas such as sidewalks and highway medians. In July 2010, Greenaid received $10, 398 in funding from the Kickstarter community.This funding will be used to spread the initiative to new locations and support current operations. Los Angeles Green Grounds, Los Angeles Designer Ron Finley started growing produce on a strip of parkway lawn, but came into conflict with the city council. He was successful in maintaining this urban market garden and has promoted the idea in a TED talk and appearances at international conferences, such as the Stockholm Food Forum and MAD in Copenhagen.", "after_revision": "With the end of rail operations, CPR wanted to redevelop the 17 hectare corridor for residential and commercial purposes, but was prevented by the City of Vancouver, who wanted to acquire the area for green space and (potentially) a future light rail transportation line. In 2006, the Supreme Court of Canada affirmed the city's zoning authority to prohibit CPR development, but the final disposition of the area was not resolved until 2016, when the City of Vancouver purchased the land from CPR for $55 million. In the interim, home owners adjacent to the unused rail line and local community groups had built and maintained numerous gardens and plots on the 9 km route. The homes adjacent to the corridor are large, and they are some of the most expensive properties in the city, with the green space adding to the exclusivity of the properties. In 2014, as negotiations with the city dragged on, CPR began repairing the rail line, clearing the gardens, and preparing to run trains on the line. The city filed an injunction to block the railway from reactivating the line, but that bid was dismissed in B.C. Supreme Court. In 2016, the City finalized acquisition of the land. Terms of the complex purchase agreement included a stipulation that a portion of the corridor must be dedicated for light rail transit use. This has not entirely ended the conflict over the area. Since acquiring the Arbutus corridor, the city has built a bike and pedestrian trail, and developed an Arbutus Greenway plan, but adjacent home owners have pushed for a return to the previous state. Many would like to leave the area wild and inaccessible which would make the now public area an exclusive green space for the wealthy adjacent home owners. The official Arbutus Greenway plan has divided the 9 km route into 8 different character zones that will include bicycle and pedestrian paths, public spaces, community gardens, plazas, and public art. Guerrilla Park, Welland, ON 250px|\"Art at the Park\" at Guerrilla Park in Welland, Ontario in 2015. Whereas most areas that are subjected to guerrilla gardening are unused or abandoned areas not designated for parkland or green space, this is an exception in that it was initially designed for such a purpose. Originally a maintained parkette in Welland, this small area along the Welland Recreational Waterway fell into disuse and neglect for years. In 2013, a handful of local residents, including visual artists and guerrilla gardeners, reclaimed the space by fully restoring overgrown flower beds, adding outdoor paintings, and overseeing general landscape maintenance. Although this area is officially municipal property, there was initially a question by volunteers as to which local organization was responsible for this parkette's maintenance (whether responsibility fell into hands of Welland Recreational Canal Corporation or City of Welland Parks Department). Volunteers met with representatives of City of Welland, and an unofficial verbal agreement was made, ensuring that although the City of Welland does own the parkette land, volunteers may continue maintenance and gardening in the area. Currently, the area attracts some local artistic, musical, and creative youth. It has also been the setting for a number of small, unorganized or impromptu events, such as art shows. Denmark \"Garden in a night\" In 1996, Have p\u00e5 en nat (\"Garden in a night\") was made by the Danish \u00d8kologiske Igangs\u00e6ttere (\"Organic starters\"). An empty piece of land in the middle of the city at Guldbergsgade in N\u00f8rrebro, Copenhagen, Denmark, was transformed into a garden in a single night. About 1,000 people took part in the URL Finland Villi Vy\u00f6hyke r.y. (Wild Zone NGO) Villi Vy\u00f6hyke registered association is Finnish nature conservation focused organisation which was founded in Tampere in 2013. Founders of the association started planting meadow plants to road embankments and wastes in urban environments. Urbanization and structural change of agriculture has made many meadow plants endangered in Finland during 20st and 21st centuries. According to members planting wild plants in city area is in gray area according to Finnish law. City of Tampere has reacted positively to the functioning of the association. Villi Vy\u00f6hyke has established over 50 guerilla meadows in city of Tampere. The association operates mainly in Pirkanmaa region. New Zealand Vacant lot of cabbages In 1978 downtown Wellington, New Zealand artist Barry Thomas, in collaboration with Chris Lipscombe, Hugh Walton and others, planted 180 cabbages \"on the demolished Duke of Edinburgh/Roxy Theatre site in the centre of Wellington. This cabbage patch, planted in such a way as to spell the word CABBAGE immediately captured the imagination of both the media and the public and engendered a flurry of other activities on the site, culminating in a week-long festival... when the cabbages were ceremonially harvested.\" While a work of conceptual sculpture, this intervention is also an early example of guerrilla gardening in New Zealand. Thomas' work remained for six months, \"astonishingly unvandalised, as a living, breathing sculpture in the heart of the city.\" Christina Barton writes that in the months that followed, \"it captured the hearts and minds of Wellingtonians, who followed the growth of the cabbages, adding their own embellishments to the site, and contributed to the week of festivities (with poetry readings, performances, and the distribution of free coleslaw) that celebrated their harvest\", describing the work as \"a provocation to the local council and the city's developers\". Thomas' documentation of the project was recently purchased by New Zealand's national gallery Te Papa, who described the work as an \"important moment in New Zealand's art and social history\" with links to the \"Occupy movement, urban farming and guerrilla gardening\". South Korea Guerrilla gardening in South Korea is organized and carried out by individuals, volunteer groups and Internet communities. Richard Reynolds visited South Korea in August 2012 and spoke to many Korean audiences about guerrilla gardening through TEDxItaewon.United Kingdom GuerrillaGardening.org GuerrillaGardening.org was created in October 2004 by Richard Reynolds as a blog of his solo guerrilla gardening outside Perronet House, a council block in London's Elephant and Castle district. At the time, his motivations were simply those of a frustrated gardener looking to beautify the neighborhood, but his website attracted the interest of fellow guerrilla gardeners in London and beyond, as well as the world's media. Reynolds's guerrilla gardening has now reached many pockets of South London, and news of his activity has inspired people around the world to get involved. He also works alongside other troops, some local and some who travel, to participate. He has also guerrilla gardened in Libya, Berlin and Montreal. Today, GuerrillaGardening.org is still his blog, but it also includes tips, links and thriving community boards where guerrilla gardeners from around the world are finding supportive locals. His book, On Guerrilla Gardening, which describes and discusses activity in 30 different countries, was published by Bloomsbury Publishing in the UK and USA in May 2008, in Germany in 2009, France in 2010 and South Korea in 2012. He regularly speaks on the subject to audiences and, in 2010, launched a campaign focusing specifically on pavements as an opportunity, to 'plant life in your URL Pimp Your Pavement Leaf Street Community Garden, Manchester Leaf Street is an acre of land in Hulme, Manchester, England, that was once an urban street until turfed over by Manchester City Council. Local people, facilitated by Manchester Permaculture Group, took direct action in turning the site into a thriving community garden. United States California In 2008, Scott Bunnell started the SoCal Guerrilla Gardening Club, adding more drought tolerant gardens, and creating several gardens in Eagle Rock, Pico Rivera, Whittier, Long Beach, Norwalk, Artesia, Venice, Los Angeles County, and the Hollywood and Skid Row areas of Los Angeles. In 2015, SoCal Guerrilla Gardening Club also planted a guerrilla \"satellite\" garden in Morro Bay with their sister club, the Morro Bay Guerrilla Gardening Club. People's Park in Berkeley became a de facto public park which was formed directly out of a community guerrilla gardening movement during the late 1960s, which took place on land owned by the University of California. The university acquired the land through eminent domain, and the houses on the land were demolished, but the university did not allocate funds to develop the land, and the land was left in a decrepit state. Eventually, people began to convert the unused land into a park. This led to an embattled history involving community members, the university, university police, Governor Reagan, and the national guard, where a protest and bloody reprisal left one person dead, and hundreds seriously wounded. Parts of the park were destroyed and rebuilt over time, and it has established itself as a permanent part of the city. Greenaid, a Los Angeles-based organization founded in 2010 by Daniel Phillips and Kim Karlsrud of Common Studio, converts vintage gumball machines to dispense seed balls (a combination of clay, compost, and region-specific seeds). Seed balls are then used for seed bombing, where they are tossed or planted in any area that may benefit from wildflowers. Greenaid partners with business owners, educators and citizens to distribute seedbomb vending machines in various communities worldwide. With region-specific seedbomb mixes, Greenaid aims to integrate and beautify (rather than disrupt) traditionally bland urban areas such as sidewalks and highway medians. At the Los Angeles Green Grounds, designer Ron Finley started growing produce on a strip of parkway lawn, but came into conflict with the city council. He was successful in maintaining this urban market garden and has promoted the idea in a TED talk and appearances at international conferences, such as the Stockholm Food Forum and MAD in Copenhagen.", "edit_actions": [{"type": "R", "before": "$55 million. In the interim, home owners adjacent to the unused rail line and local community groups had built and maintained numerous gardens and plots on the 9 km route. The homes adjacent to the corridor are large, and they are some of the most expensive properties in the city, with the green space adding to the exclusivity of the properties. In 2014, as negotiations with the city dragged on, CPR began repairing the rail line, clearing the gardens, and preparing to run trains on the line. The city filed an injunction to block the railway from reactivating the line, but that bid was dismissed in B.C. Supreme Court. In 2016, the City finalized acquisition of the land. Terms of the complex purchase agreement included a stipulation that a portion of the corridor must be dedicated for light rail transit use. This has not entirely ended the conflict over the area. Since acquiring the Arbutus corridor, the city has built a bike and pedestrian trail, and developed an Arbutus Greenway plan, but adjacent home owners have pushed for a return to the previous state. Many would like to leave the area wild and inaccessible which would make the now public area an exclusive green space for the wealthy adjacent home owners. The official Arbutus Greenway plan has divided the 9 km route into 8 different character zones that will include bicycle and pedestrian paths, public spaces, community gardens, plazas, and public art. Guerrilla Park, Welland, ON 250px|\"Art at the Park\" at Guerrilla Park in Welland, Ontario in 2015. Whereas most areas that are subjected to guerrilla gardening are unused or abandoned areas not designated for parkland or green space, this is an exception in that it was initially designed for such a purpose. Originally a maintained parkette in Welland, this small area along the Welland Recreational Waterway fell into disuse and neglect for years. In 2013, a handful of local residents, including visual artists and guerrilla gardeners, reclaimed the space by fully restoring overgrown flower beds, adding outdoor paintings, and overseeing general landscape maintenance. Although this area is officially municipal property, there was initially a question by volunteers as to which local organization was responsible for this parkette's maintenance (whether responsibility fell into hands of Welland Recreational Canal Corporation or City of Welland Parks Department). Volunteers met with representatives of City of Welland, and an unofficial verbal agreement was made, ensuring that although the City of Welland does own the parkette land, volunteers may continue maintenance and gardening in the area. Currently, the area attracts some local artistic, musical, and creative youth. It has also been the setting for a number of small, unorganized or impromptu events, such as art shows. Denmark \"Garden in a night\" In 1996, Have p\u00e5 en nat (\"Garden in a night\") was made by the Danish \u00d8kologiske Igangs\u00e6ttere (\"Organic starters\"). An empty piece of land in the middle of the city at Guldbergsgade in N\u00f8rrebro, Copenhagen, Denmark, was transformed into a garden in a single night. About 1,000 people took part in the URL Finland Villi Vy\u00f6hyke r.y. (Wild Zone NGO) Villi Vy\u00f6hyke registered association is Finnish nature conservation focused organisation which was founded in Tampere in 2013. Founders of the association started planting meadow plants to road embankments and wastes in urban environments. Urbanization and structural change of agriculture has made many meadow plants endangered in Finland during 20st and 21st centuries. According to members planting wild plants in city area is in gray area according to Finnish law. City of Tampere has reacted positively to the functioning of the association. Villi Vy\u00f6hyke has established over 50 guerilla meadows in city of Tampere. The association operates mainly in Pirkanmaa region. New Zealand Vacant lot of cabbages In 1978 downtown Wellington, New Zealand artist Barry Thomas, in collaboration with Chris Lipscombe, Hugh Walton and others, planted 180 cabbages \"on the demolished Duke of Edinburgh/Roxy Theatre site in the centre of Wellington. This cabbage patch, planted in such a way as to spell the word CABBAGE immediately captured the imagination of both the media and the public and engendered a flurry of other activities on the site, culminating in a week-long festival... when the cabbages were ceremonially harvested.\" While a work of conceptual sculpture, this intervention is also an early example of guerrilla gardening in New Zealand. Thomas' work remained for six months, \"astonishingly unvandalised, as a living, breathing sculpture in the heart of the city.\" Christina Barton writes that in the months that followed, \"it captured the hearts and minds of Wellingtonians, who followed the growth of the cabbages, adding their own embellishments to the site, and contributed to the week of festivities (with poetry readings, performances, and the distribution of free coleslaw) that celebrated their harvest\", describing the work as \"a provocation to the local council and the city's developers\". Thomas' documentation of the project was recently purchased by New Zealand's national gallery Te Papa, who described the work as an \"important moment in New Zealand's art and social history\" with links to the \"Occupy movement, urban farming and guerrilla gardening\". South Korea Guerrilla gardening in South Korea is organized and carried out by individuals, volunteer groups and Internet communities. Richard Reynolds visited South Korea in August 2012 and spoke to many Korean audiences about guerrilla gardening through TEDxItaewon.United Kingdom GuerrillaGardening.org GuerrillaGardening.org was created in October 2004 by Richard Reynolds as a blog of his solo guerrilla gardening outside Perronet House, a council block in London's Elephant and Castle district. At the time, his motivations were simply those of a frustrated gardener looking to beautify the neighborhood, but his website attracted the interest of fellow guerrilla gardeners in London and beyond, as well as the world's media. Reynolds's guerrilla gardening has now reached many pockets of South London, and news of his activity has inspired people around the world to get involved. He also works alongside other troops, some local and some who travel, to participate. He has also guerrilla gardened in Libya, Berlin and Montreal. Today, GuerrillaGardening.org is still his blog, but it also includes tips, links and thriving community boards where guerrilla gardeners from around the world are finding supportive locals. His book, On Guerrilla Gardening, which describes and discusses activity in 30 different countries, was published by Bloomsbury Publishing in the UK and USA in May 2008, in Germany in 2009, France in 2010 and South Korea in 2012. He regularly speaks on the subject to audiences and, in 2010, launched a campaign focusing specifically on pavements as an opportunity, to 'plant life in your URL Pimp Your Pavement Leaf Street Community Garden, Manchester Leaf Street is an acre of land in Hulme, Manchester, England, that was once an urban street until turfed over by Manchester City Council. Local people, facilitated by Manchester Permaculture Group, took direct action in turning the site into a thriving community garden. United States California SoCal Guerrilla Gardening Having developed the Clean, Green, and Glean method of Guerrilla Gardening, Scott Bunnell has been refining guerrilla gardening methods for over 30 years. In 2008, he started the SoCal Guerrilla Gardening Club, adding more drought tolerant gardens, and creating several gardens in Eagle Rock, Pico Rivera, Whittier, Long Beach, Norwalk, Artesia, Venice, Los Angeles County, and the Hollywood and Skid Row areas of Los Angeles. In 2015, SoCal Guerrilla Gardening Club also planted a guerrilla \"satellite\" garden in Morro Bay with their sister club, the Morro Bay Guerrilla Gardening Club. People's Park, Berkeley People's Park in Berkeley, California is now a de facto public park which was formed directly out of a community guerrilla gardening movement during the late 1960s, which took place on land owned by the University of California. The university acquired the land through eminent domain, and the houses on the land were demolished, but the university did not allocate funds to develop the land, and the land was left in a decrepit state. Eventually, people began to convert the unused land into a park. This led to an embattled history involving community members, the university, university police, Governor Reagan, and the national guard, where a protest and bloody reprisal left one person dead, and hundreds seriously wounded. Parts of the park were destroyed and rebuilt over time, and it has established itself as a permanent part of the city. Greenaid, Los Angeles Greenaid is a Los Angeles based organization founded in 2010 by Daniel Phillips and Kim Karlsrud of Common Studio. The organization converts vintage gumball machines to dispense seed balls (a combination of clay, compost, and region-specific seeds). Seed balls are then used for seed bombing, where they are tossed or planted in any area that may benefit from wildflowers. Greenaid partners with business owners, educators and citizens to distribute seedbomb vending machines in various communities worldwide. With region-specific seedbomb mixes, Greenaid aims to integrate and beautify (rather than disrupt) traditionally bland urban areas such as sidewalks and highway medians. In July 2010, Greenaid received $10, 398 in funding from the Kickstarter community.This funding will be used to spread the initiative to new locations and support current operations.", "after": "$55 million.", "start_char_pos": 501, "end_char_pos": 10214}, {"type": "R", "before": "Los Angeles Green Grounds, Los Angeles Designer", "after": "In the interim, home owners adjacent to the unused rail line and local community groups had built and maintained numerous gardens and plots on the 9 km route. The homes adjacent to the corridor are large, and they are some of the most expensive properties in the city, with the green space adding to the exclusivity of the properties. In 2014, as negotiations with the city dragged on, CPR began repairing the rail line, clearing the gardens, and preparing to run trains on the line. The city filed an injunction to block the railway from reactivating the line, but that bid was dismissed in B.C. Supreme Court. In 2016, the City finalized acquisition of the land. Terms of the complex purchase agreement included a stipulation that a portion of the corridor must be dedicated for light rail transit use.", "start_char_pos": 10215, "end_char_pos": 10262}, {"type": "A", "before": null, "after": "This has not entirely ended the conflict over the area. Since acquiring the Arbutus corridor, the city has built a bike and pedestrian trail, and developed an Arbutus Greenway plan, but adjacent home owners have pushed for a return to the previous state. Many would like to leave the area wild and inaccessible which would make the now public area an exclusive green space for the wealthy adjacent home owners. The official Arbutus Greenway plan has divided the 9 km route into 8 different character zones that will include bicycle and pedestrian paths, public spaces, community gardens, plazas, and public art.", "start_char_pos": 10263, "end_char_pos": 10263}, {"type": "A", "before": null, "after": "Guerrilla Park, Welland, ON", "start_char_pos": 10264, "end_char_pos": 10264}, {"type": "A", "before": null, "after": "250px|\"Art at the Park\" at Guerrilla Park in Welland, Ontario in 2015.", "start_char_pos": 10265, "end_char_pos": 10265}, {"type": "A", "before": null, "after": "Whereas most areas that are subjected to guerrilla gardening are unused or abandoned areas not designated for parkland or green space, this is an exception in that it was initially designed for such a purpose. Originally a maintained parkette in Welland, this small area along the Welland Recreational Waterway fell into disuse and neglect for years. In 2013, a handful of local residents, including visual artists and guerrilla gardeners, reclaimed the space by fully restoring overgrown flower beds, adding outdoor paintings, and overseeing general landscape maintenance. Although this area is officially municipal property, there was initially a question by volunteers as to which local organization was responsible for this parkette's maintenance (whether responsibility fell into hands of Welland Recreational Canal Corporation or City of Welland Parks Department). Volunteers met with representatives of City of Welland, and an unofficial verbal agreement was made, ensuring that although the City of Welland does own the parkette land, volunteers may continue maintenance and gardening in the area. Currently, the area attracts some local artistic, musical, and creative youth. It has also been the setting for a number of small, unorganized or impromptu events, such as art shows.", "start_char_pos": 10266, "end_char_pos": 10266}, {"type": "A", "before": null, "after": "Denmark", "start_char_pos": 10267, "end_char_pos": 10267}, {"type": "A", "before": null, "after": "\"Garden in a night\" In 1996, Have p\u00e5 en nat (\"Garden in a night\") was made by the Danish \u00d8kologiske Igangs\u00e6ttere (\"Organic starters\"). An empty piece of land in the middle of the city at Guldbergsgade in N\u00f8rrebro, Copenhagen, Denmark, was transformed into a garden in a single night. About 1,000 people took part in the URL", "start_char_pos": 10268, "end_char_pos": 10268}, {"type": "A", "before": null, "after": "Finland", "start_char_pos": 10269, "end_char_pos": 10269}, {"type": "A", "before": null, "after": "Villi Vy\u00f6hyke r.y. (Wild Zone NGO)", "start_char_pos": 10270, "end_char_pos": 10270}, {"type": "A", "before": null, "after": "Villi Vy\u00f6hyke registered association is Finnish nature conservation focused organisation which was founded in Tampere in 2013. Founders of the association started planting meadow plants to road embankments and wastes in urban environments. Urbanization and structural change of agriculture has made many meadow plants endangered in Finland during 20st and 21st centuries. According to members planting wild plants in city area is in gray area according to Finnish law. City of Tampere has reacted positively to the functioning of the association. Villi Vy\u00f6hyke has established over 50 guerilla meadows in city of Tampere. The association operates mainly in Pirkanmaa region.", "start_char_pos": 10271, "end_char_pos": 10271}, {"type": "A", "before": null, "after": "New Zealand", "start_char_pos": 10272, "end_char_pos": 10272}, {"type": "A", "before": null, "after": "Vacant lot of cabbages", "start_char_pos": 10273, "end_char_pos": 10273}, {"type": "A", "before": null, "after": "In 1978 downtown Wellington, New Zealand artist Barry Thomas, in collaboration with Chris Lipscombe, Hugh Walton and others, planted 180 cabbages \"on the demolished Duke of Edinburgh/Roxy Theatre site in the centre of Wellington. This cabbage patch, planted in such a way as to spell the word CABBAGE immediately captured the imagination of both the media and the public and engendered a flurry of other activities on the site, culminating in a week-long festival... when the cabbages were ceremonially harvested.\" While a work of conceptual sculpture, this intervention is also an early example of guerrilla gardening in New Zealand. Thomas' work remained for six months, \"astonishingly unvandalised, as a living, breathing sculpture in the heart of the city.\" Christina Barton writes that in the months that followed, \"it captured the hearts and minds of Wellingtonians, who followed the growth of the cabbages, adding their own embellishments to the site, and contributed to the week of festivities (with poetry readings, performances, and the distribution of free coleslaw) that celebrated their harvest\", describing the work as \"a provocation to the local council and the city's developers\". Thomas' documentation of the project was recently purchased by New Zealand's national gallery Te Papa, who described the work as an \"important moment in New Zealand's art and social history\" with links to the \"Occupy movement, urban farming and guerrilla gardening\".", "start_char_pos": 10274, "end_char_pos": 10274}, {"type": "A", "before": null, "after": "South Korea", "start_char_pos": 10275, "end_char_pos": 10275}, {"type": "A", "before": null, "after": "Guerrilla gardening in South Korea is organized and carried out by individuals, volunteer groups and Internet communities. Richard Reynolds visited South Korea in August 2012 and spoke to many Korean audiences about guerrilla gardening through TEDxItaewon.United Kingdom", "start_char_pos": 10276, "end_char_pos": 10276}, {"type": "A", "before": null, "after": "GuerrillaGardening.org", "start_char_pos": 10277, "end_char_pos": 10277}, {"type": "A", "before": null, "after": "GuerrillaGardening.org was created in October 2004 by Richard Reynolds as a blog of his solo guerrilla gardening outside Perronet House, a council block in London's Elephant and Castle district. At the time, his motivations were simply those of a frustrated gardener looking to beautify the neighborhood, but his website attracted the interest of fellow guerrilla gardeners in London and beyond, as well as the world's media. Reynolds's guerrilla gardening has now reached many pockets of South London, and news of his activity has inspired people around the world to get involved. He also works alongside other troops, some local and some who travel, to participate. He has also guerrilla gardened in Libya, Berlin and Montreal.", "start_char_pos": 10278, "end_char_pos": 10278}, {"type": "A", "before": null, "after": "Today, GuerrillaGardening.org is still his blog, but it also includes tips, links and thriving community boards where guerrilla gardeners from around the world are finding supportive locals. His book, On Guerrilla Gardening, which describes and discusses activity in 30 different countries, was published by Bloomsbury Publishing in the UK and USA in May 2008, in Germany in 2009, France in 2010 and South Korea in 2012. He regularly speaks on the subject to audiences and, in 2010, launched a campaign focusing specifically on pavements as an opportunity, to 'plant life in your URL Pimp Your Pavement", "start_char_pos": 10279, "end_char_pos": 10279}, {"type": "A", "before": null, "after": "Leaf Street Community Garden, Manchester Leaf Street is an acre of land in Hulme, Manchester, England, that was once an urban street until turfed over by Manchester City Council. Local people, facilitated by Manchester Permaculture Group, took direct action in turning the site into a thriving community garden.", "start_char_pos": 10280, "end_char_pos": 10280}, {"type": "A", "before": null, "after": "United States", "start_char_pos": 10281, "end_char_pos": 10281}, {"type": "A", "before": null, "after": "California In 2008, Scott Bunnell started the SoCal Guerrilla Gardening Club, adding more drought tolerant gardens, and creating several gardens in Eagle Rock, Pico Rivera, Whittier, Long Beach, Norwalk, Artesia, Venice, Los Angeles County, and the Hollywood and Skid Row areas of Los Angeles. In 2015, SoCal Guerrilla Gardening Club also planted a guerrilla \"satellite\" garden in Morro Bay with their sister club, the Morro Bay Guerrilla Gardening Club.", "start_char_pos": 10282, "end_char_pos": 10282}, {"type": "A", "before": null, "after": "People's Park in Berkeley became a de facto public park which was formed directly out of a community guerrilla gardening movement during the late 1960s, which took place on land owned by the University of California. The university acquired the land through eminent domain, and the houses on the land were demolished, but the university did not allocate funds to develop the land, and the land was left in a decrepit state. Eventually, people began to convert the unused land into a park. This led to an embattled history involving community members, the university, university police, Governor Reagan, and the national guard, where a protest and bloody reprisal left one person dead, and hundreds seriously wounded. Parts of the park were destroyed and rebuilt over time, and it has established itself as a permanent part of the city.", "start_char_pos": 10283, "end_char_pos": 10283}, {"type": "A", "before": null, "after": "Greenaid, a Los Angeles-based organization founded in 2010 by Daniel Phillips and Kim Karlsrud of Common Studio, converts vintage gumball machines to dispense seed balls (a combination of clay, compost, and region-specific seeds). Seed balls are then used for seed bombing, where they are tossed or planted in any area that may benefit from wildflowers. Greenaid partners with business owners, educators and citizens to distribute seedbomb vending machines in various communities worldwide. With region-specific seedbomb mixes, Greenaid aims to integrate and beautify (rather than disrupt) traditionally bland urban areas such as sidewalks and highway medians.", "start_char_pos": 10284, "end_char_pos": 10284}, {"type": "A", "before": null, "after": "At the Los Angeles Green Grounds, designer", "start_char_pos": 10285, "end_char_pos": 10285}], "sents_char_pos": [0, 271, 513, 672, 848, 997, 1125, 1178, 1318, 1374, 1573, 1729, 1930, 2029, 2239, 2380, 2603, 2900, 3135, 3214, 3318, 3461, 3610, 3820, 3933, 4065, 4162, 4240, 4315, 4368, 4633, 4918, 5038, 5165, 5600, 5867, 6002, 6136, 6368, 6599, 6755, 6841, 6903, 7094, 7324, 7685, 7818, 8024, 8296, 8457, 8710, 8917, 8982, 9210, 9329, 9466, 9601, 9724, 9861, 10031, 10115, 10214, 10394]}
+{"doc_id": "2122523", "revision_depth": "1", "before_revision": "The problem of moral luck Given the notion of equating moral responsibility with voluntary action, however, moral luck becomes a problem. This problem is illustrated by an example that many moral luck philosophers employ \u2013 that of a traffic accident. There are two people driving cars, Driver A, and Driver B. They are alike in every way. Driver A is driving down a road, and, in a moment of inattention, runs a red light as a child is crossing the street. Driver A slams the brakes, swerves, in short does everything to try to avoid hitting the child \u2013 alas, the car hits and kills the child . Driver B , in the meantime, also runs a red light but, since no one is crossing , gets a traffic ticket but nothing more . If a bystander were asked to morally evaluate Drivers A and B, there is very good reason to expect them to say that Driver A is due more moral blame than Driver B . After all, Driver A's course of action resulted in a death , whereas the course of action taken by Driver B was quite uneventful . However, there are absolutely no differences in the controllable actions performed by Drivers A and B. The only disparity is that in the case of Driver A, an external uncontrollable event occurred, whereas it did not in the case of Driver B. The external uncontrollable event, of course, is the child crossing the street. There is no difference at all in what the two of them could have done \u2013 however, one seems clearly more to blame than the other. How does this occur? This is the problem of moral luck. If it is given that moral responsibility should only be relevant when the agent voluntarily performed or failed to perform some action, Drivers A and B should be blamed equally , or praised equally, as may be the case. At the same time, this is at least intuitively problematic, as \u2013 whatever the external circumstances are \u2013 one situation resulted in a death , and the other did not .", "after_revision": "The problem of moral luck Given the notion of equating moral responsibility with voluntary action, however, moral luck leads to counterintuitive solutions. This is illustrated by an example of a traffic accident. Driver A, in a moment of inattention, runs a red light as a child is crossing the street. Driver A tries to avoid hitting the child but fails and the child dies . Driver B also runs a red light , but no one is crossing and only gets a traffic ticket . If a bystander is asked to morally evaluate Drivers A and B, they may assign Driver A more moral blame than Driver B because Driver A's course of action resulted in a death . However, there are no differences in the controllable actions performed by Drivers A and B. The only disparity is an external uncontrollable event . If it is given that moral responsibility should only be relevant when the agent voluntarily performed or failed to perform some action, Drivers A and B should be blamed equally . This may be intuitively problematic, as one situation resulted in a death .", "edit_actions": [{"type": "R", "before": "becomes a problem. This problem", "after": "leads to counterintuitive solutions. This", "start_char_pos": 119, "end_char_pos": 150}, {"type": "D", "before": "that many moral luck philosophers employ \u2013 that", "after": null, "start_char_pos": 180, "end_char_pos": 227}, {"type": "D", "before": "There are two people driving cars,", "after": null, "start_char_pos": 251, "end_char_pos": 285}, {"type": "R", "before": "and Driver B. They are alike in every way. Driver A is driving down a road, and, in a", "after": "in a", "start_char_pos": 296, "end_char_pos": 381}, {"type": "R", "before": "slams the brakes, swerves, in short does everything to try to", "after": "tries to", "start_char_pos": 466, "end_char_pos": 527}, {"type": "R", "before": "\u2013 alas, the car hits and kills the child", "after": "but fails and the child dies", "start_char_pos": 552, "end_char_pos": 592}, {"type": "D", "before": ", in the meantime,", "after": null, "start_char_pos": 604, "end_char_pos": 622}, {"type": "R", "before": "but, since", "after": ", but", "start_char_pos": 645, "end_char_pos": 655}, {"type": "R", "before": ",", "after": "and only", "start_char_pos": 675, "end_char_pos": 676}, {"type": "D", "before": "but nothing more", "after": null, "start_char_pos": 699, "end_char_pos": 715}, {"type": "R", "before": "were", "after": "is", "start_char_pos": 733, "end_char_pos": 737}, {"type": "R", "before": "there is very good reason to expect them to say that Driver A is due", "after": "they may assign Driver A", "start_char_pos": 781, "end_char_pos": 849}, {"type": "R", "before": ". After all,", "after": "because", "start_char_pos": 881, "end_char_pos": 893}, {"type": "D", "before": ", whereas the course of action taken by Driver B was quite uneventful", "after": null, "start_char_pos": 942, "end_char_pos": 1011}, {"type": "D", "before": "absolutely", "after": null, "start_char_pos": 1033, "end_char_pos": 1043}, {"type": "D", "before": "that in the case of Driver A,", "after": null, "start_char_pos": 1139, "end_char_pos": 1168}, {"type": "D", "before": "occurred, whereas it did not in the case of Driver B. The external uncontrollable event, of course, is the child crossing the street. There is no difference at all in what the two of them could have done \u2013 however, one seems clearly more to blame than the other. How does this occur?", "after": null, "start_char_pos": 1202, "end_char_pos": 1485}, {"type": "R", "before": "This is the problem of moral luck.", "after": ".", "start_char_pos": 1486, "end_char_pos": 1520}, {"type": "R", "before": ", or praised equally, as may be the case. At the same time, this is at least", "after": ". This may be", "start_char_pos": 1698, "end_char_pos": 1774}, {"type": "D", "before": "\u2013 whatever the external circumstances are \u2013", "after": null, "start_char_pos": 1803, "end_char_pos": 1846}, {"type": "D", "before": ", and the other did not", "after": null, "start_char_pos": 1881, "end_char_pos": 1904}], "sents_char_pos": [0, 137, 250, 309, 338, 456, 717, 1013, 1116, 1255, 1335, 1464, 1485, 1520, 1739]}
+{"doc_id": "21492663", "revision_depth": "1", "before_revision": "Asbestos (pronounced: or ) is a naturally occurring fibrous silicate mineral. There are six types, all of which are composed of long and thin fibrous crystals, each fibre being composed of many microscopic \"fibrils\" that can be released into the atmosphere by abrasion and other processes. Asbestos is an excellent electrical insulator and is highly heat-resistant, so for many years it was used as a building material.Bureau of Naval Personnel, Basic Electricity. 1969: US Navy. However, it is now a notorious health and safety hazard and the use of asbestos as a building material is illegal in many countries. Inhalation of asbestos fibres can lead to various serious lung conditions, including asbestosis and cancer. Asbestos was widely used during the 20th century until the 1970s , when public recognition of the health hazards of asbestos dust led to its prohibition in mainstream construction and fireproofing in most countries. Despite this, and in part because the consequences of exposure can take decades to arise, at least 100,000 people are thought to die each year from diseases related to asbestos exposure. Industrial era Industrial scale asbestos mining began in 1878 in Thetford township, Quebec. By 1895, mining was increasingly mechanized The large-scale asbestos industry began in the mid-19th century. Early attempts at producing asbestos paper and cloth in Italy began in the 1850s , but were unsuccessful in creating a market for such products. Canadian samples of asbestos were displayed in London in 1862, and the first companies were formed in England and Scotland to exploit this resource. Asbestos was first used in the manufacture of yarn, and German industrialist Louis Wertheim adopted this process in his factories in Germany. In 1871, the Patent Asbestos Manufacturing Company was established in Glasgow, and during the following decades, the Clydebank area became a centre for the nascent industry. The applications of asbestos multiplied at the end of the 19th century - this is an advertisement for an asbestos-lined clothes iron from 1906 Asbestos production began in the Urals of the Russian Empire in the 1880s, and in the Alpine regions of Northern Italy with the formation in Turin of the Italo-English Pure Asbestos Company in 1876, although this was soon swamped by the greater production levels from the Canadian mines. Mining also took off in South Africa from 1893 under the aegis of the British businessman Francis Oates, the director of the De Beers company. It was in South Africa that the production of amosite began in 1910. The U.S. asbestos industry had an early start in 1858 , when fibrous anthophyllite was mined for use as asbestos insulation by the Johns Company, a predecessor to the current Johns Manville, at a quarry at Ward's Hill on Staten Island, New York. US production began in earnest in 1899 with the discovery of large deposits in Belvidere Mountain. The use of asbestos became increasingly widespread toward the end of the 19th century , when its diverse applications included fire-retardant coatings, concrete, bricks, pipes and fireplace cement, heat-, fire-, and acid-resistant gaskets, pipe insulation, ceiling insulation, fireproof drywall, flooring, roofing, lawn furniture and drywall joint compound. In 2011, it was reported that over 50\\% of UK houses still contained asbestos, despite a ban on asbestos products some years earlier.Don, Andrew (1 May 2011) Asbestos: the hidden health hazard in millions of homes. The Guardian. In Japan, particularly after World War II, asbestos was used in the manufacture of ammonium sulfate for purposes of rice production, sprayed upon the ceilings, iron skeletons and walls of railroad cars and buildings (during the 1960s), and used for energy efficiency reasons as well. Production of asbestos in Japan peaked in 1974 and went through ups and downs until about 1990 , when production began to drop dramatically. Approximately 100,000 people in the United States have died, or are terminally ill, from asbestos exposure related to shipbuilding. In the Hampton Roads area, a shipbuilding center, mesothelioma occurrence is seven times the national rate.Burke, Bill (6 May 2001) \"Shipbuilding's Deadly Legacy: Introduction: Horrible Toll Could Have Been Avoided\" Virginian-Pilot Norfolk, Virginia (newspaper); from Internet Archive Thousands of tons of asbestos were used in World War II ships to insulate piping, boilers, steam engines and steam turbines. There were approximately 4.3 million shipyard workers in the United States during the war; for every 1,000 workers, about 14 died of mesothelioma and an unknown number died of asbestosis.Burke, Bill (6 May 2001) \"Shipyards, a Crucible for Tragedy: Part 1: How the war created a monster\" Virginian-Pilot Norfolk, Virginia (newspaper) The United States government and asbestos industry have been criticized for not acting quickly enough to inform the public of dangers and to reduce public exposure. In the late 1970s, court documents proved that asbestos-industry officials knew of asbestos dangers since the 1930s and had concealed them from the public. Serpentine group In Guy's Hospital, London, 1941, nurses arrange asbestos blankets over an electrically heated frame to create a hood over patients to help warm them quickly Serpentine minerals have a sheet or layered structure. Chrysotile (commonly known as white asbestos) is the only asbestos mineral in the serpentine group. In the United States, chrysotile has been the most commonly-used type of asbestos. According to the U.S. Environmental Protection Agency (EPA) Asbestos Building Inspectors Manual, chrysotile accounts for approximately 95\\% of asbestos found in buildings in the United States. Chrysotile is often present in a wide variety of products and materials, including: Chlor Alkali diaphragm membranes used to make chlorine (currently in the US)Caustic Soda Production. Olin Corporation Drywall and joint compound (including texture coats) Plaster Gas mask filters throughout World War II until the 1960s for most countries; Germany and the USSR's Civilian issued filters up until 1988 tested positive for asbestos Vinyl floor tiles, sheeting, adhesives Roofing tars, felts, siding, and shingles \"Transite\" panels, siding, countertops, and pipes Popcorn ceilings, also known as acoustic ceilings Fireproofing Caulk Industrial and marine gaskets Brake pads and shoes Stage curtains Fire blankets Interior fire doors Fireproof clothing for firefighters Thermal pipe insulation Filters for removing fine particulates from chemicals, liquids and wine Dental cast linings HVAC flexible duct connectors Drilling fluid additives Low density insulating board (often referred to as AIB or asbestos insulating board) and ceiling tiles; Asbestos cement sheets and pipes for construction, casing for water and electrical/telecommunication services; Thermal and chemical insulation (e.g., fire rated doors, limpet spray, lagging and gaskets). While mostly chrysotile asbestos fibers were once used in automobile brake pads, shoes, and clutch discs, contaminants of amphiboles were present. Since approximately the mid-1990s, brake pads, new or replacement, have been manufactured instead with linings made of ceramic, carbon, metallic and aramid fiber (Twaron or Kevlar\u2014the same material used in bulletproof vests). Construction Developed countries Older decorative ceilings, similar to this one, may contain small amounts of white asbestos 1929 newspaper advertisement from Perth, Western Australia, for asbestos sheeting for residential building construction The use of asbestos in new construction projects has been banned for health and safety reasons in many developed countries or regions, including the European Union, the United Kingdom, Australia, Hong Kong, Japan, and New Zealand. A notable exception is the United States, where asbestos continues to be used in construction such as cement asbestos pipes. The 5th Circuit Court prevented the EPA from banning asbestos in 1991 because EPA research showed the ban would cost between US $450 and 800 million while only saving around 200 lives in a 13-year timeframe, and that the EPA did not provide adequate evidence for the safety of alternative products.947 F. 2d 1201 \u2013 Corrosion Proof Fittings v. Environmental Protection Agency. Openjurist.org. Retrieved 10 January 2012. Until the mid-1980s, small amounts of white asbestos were used in the manufacture of Artex, a decorative stipple finish,Where can asbestos be found, Asbestos Surveying Ltd, Birmingham, UK, 2 08 2008 . Retrieved 29 December 2008. however, some of the lesser-known suppliers of Artex-type materials were still adding white asbestos until 1999.Artex website, Click the \"Asbestos in Artex\" button. Prior to the ban, asbestos was widely used in the construction industry in thousands of materials. Some are judged to be more dangerous than others due to the amount of asbestos and the material's friable nature. Sprayed coatings, pipe insulation and Asbestos Insulating Board (AIB) are thought to be the most dangerous due to their high content of asbestos and friable nature. Many older buildings built before the late 1990s contain asbestos. In the United States, there is a minimum standard for asbestos surveys as described by ASTM standard E 2356\u201318. In the UK, the Health and Safety Executive have issued guidance called HSG264 describing how surveys should be completed although other methods can be used if they can demonstrate they have met the regulations by other means. The EPA includes some, but not all, asbestos-contaminated facilities on the Superfund National Priorities List (NPL). Renovation and demolition of asbestos-contaminated buildings is subject to EPA NESHAP and OSHA Regulations. Asbestos is not a material covered under CERCLA's innocent purchaser defense. In the UK, the removal and disposal of asbestos and of substances containing it are covered by the Control of Asbestos Regulations 2006.Control of Asbestos Regulations 2006, Health and Safety Executive, London, UK, Undated. Retrieved 29 December 2008. U.S. asbestos consumption hit a peak of 804,000 tons in 1973; world asbestos demand peaked around 1977, with 25 countries producing nearly 4.8 million metric tons annually. In older buildings (e.g. those built prior to 1999 in the UK, before white asbestos was banned), asbestos may still be present in some areas. Being aware of asbestos locations reduces the risk of disturbing asbestos. Removal of asbestos building components can also remove the fire protection they provide, therefore fire protection substitutes are required for proper fire protection that the asbestos originally provided.Asbestos Removal. Laws.sandwell.gov.uk (1 April 2005). Retrieved 10 January 2012. Outside Europe and North America Some countries, such as India, Indonesia, China, Russia and Brazil, have continued widespread use of asbestos. The most common is corrugated asbestos-cement sheets or \"A/C sheets\" for roofing and for side walls. Millions of homes, factories, schools or sheds and shelters continue to use asbestos. Cutting these sheets to size and drilling holes to receive 'J' bolts to help secure the sheets to roof framing is done on-site. There has been no significant change in production and use of A/C sheets in developing countries following the widespread restrictions in developed nations. 11 September 2001 attacks As New York City's World Trade Center collapsed following the September 11 attacks, Lower Manhattan was blanketed in a mixture of building debris and combustible materials. This complex mixture gave rise to the concern that thousands of residents and workers in the area would be exposed to known hazards in the air and in the dust, such as asbestos, lead, glass fibers, and pulverized concrete. More than 1,000 tons of asbestos are thought to have been released into the air following the buildings' destruction. Inhalation of a mixture of asbestos and other toxicants is thought to be linked to the unusually high death rate from cancer of emergency service workers since the disaster. Thousands more are now thought to be at risk of developing cancer due to this exposure with those who have died so far being only the \"tip of the iceberg\". Some commentators have criticised authorities for using asbestos in the buildings' construction. In May 2002, after numerous cleanup, dust collection, and air monitoring activities were conducted outdoors by EPA, other federal agencies, New York City, and the state of New York, New York City formally requested federal assistance to clean and test residences in the vicinity of the World Trade Center site for airborne asbestos. Asbestos contaminants in other products Vermiculite Vermiculite is a hydrated laminar magnesium-aluminum-iron silicate which resembles mica. It can be used for many industrial applications and has been used as insulation. Some deposits of vermiculite have been found to be contaminated with small amounts of asbestos. One vermiculite mine operated by W. R. Grace and Company in Libby, Montana exposed workers and community residents to danger by mining vermiculite contaminated with asbestos, typically richterite, winchite, actinolite or tremolite. Vermiculite contaminated with asbestos from the Libby mine was used as insulation in residential and commercial buildings through Canada and the United States. W. R. Grace and Company's loose-fill vermiculite was marketed as Zonolite but was also used in sprayed-on products such as Monokote. In 1999, the EPA began cleanup efforts in Libby and now the area is a Superfund cleanup area. The EPA has determined that harmful asbestos is released from the mine as well as through other activities that disturb soil in the area. Talc A laboratory heat spreader made of asbestos, on tripod over a Teclu burner Talc can sometimes be contaminated with asbestos due to the proximity of asbestos ore (usually tremolite) in underground talc deposits. By 1973, US federal law required all talc products to be asbestos-free, and today there is strict quality control in the production of talc products, separating cosmetic-grade talc (e.g. talcum powder) from industrial-grade talc (often used in friction products) has largely eliminated this issue for consumers. In 2000, tests in a certified asbestos-testing laboratory found the tremolite form of amphibole asbestos used to be found in three out of eight popular brands of children's crayons that were made partly from talc: Crayola, Prang, and RoseArt. In Crayola crayons, the tests found asbestos levels around 0.05\\% in Carnation Pink and 2.86\\% in Orchid; in Prang crayons, the range was from 0.3\\% in Periwinkle to 0.54\\% in Yellow; in Rose Art crayons, it was from 0.03\\% in Brown to 1.20\\% in Orange. Overall, 32 different types of crayons from these brands used to contain more than trace amounts of asbestos, and eight others contained trace amounts. The Art and Creative Materials Institute, a trade association which tested the safety of crayons on behalf of the makers, initially insisted the test results must have been incorrect, although they later said they do not test for asbestos. In May 2000, Crayola said tests by Richard Lee, a materials analyst whose testimony on behalf of the asbestos industry has been accepted in lawsuits over 250 times, found its crayons tested negative for asbestos. In spite of that, in June 2000 Binney & Smith, the maker of Crayola, and the other makers agreed to stop using talc in their products, and changed their product formulations in the United States. The mining company, R T Vanderbilt Co of Gouverneur, New York, which supplied the talc to the crayon makers, states that \"to the best of our knowledge and belief\" there had never been any asbestos-related disease among the company's workers. However media reports claim that the United States Mine Safety and Health Administration (MSHA) had found asbestos in four talc samples tested in 2000. The Assistant Secretary for Mine Safety and Health subsequently wrote to the news reporter, stating that \"In fact, the abbreviation ND (non-detect) in the laboratory report \u2013 indicates no asbestos fibers actually were found in the samples.\"McAteer, J. Davitt Assist. Secretary for Mine Safety and Health correspondence to Andrew Schneider of the Seattle Post-Intelligencer dated 14 June 2000 \u2013 copy obtainable through records archives MSHA. Multiple studies by mineral chemists, cell biologists, and toxicologists between 1970 and 2000 found neither samples of asbestos in talc products nor symptoms of asbestos exposure among workers dealing with talc,For studies finding no asbestos in talcum powder samples, see: Van Orden, D., R. J. Lee: Weight Percent Compositional Analysis of Seven RTV Talc Samples. Analytical Report to R. T. Vanderbilt Company, Inc. 22 November 2000. Submitted to Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \"Talc (containing asbestiform fibers)\". 4 December 2000. Nord, G. L, S. W. Axen, R. P. Nolan: Mineralogy and Experimental Animal Studies of Tremolitic Talc. Environmental Sciences Laboratory, Brooklyn College, The City University of New York. Submitted to Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \"Talc (containing asbestiform fibers)\". 1 December 2000. Wylie, A.G. (2 June 2000) Report of Investigation. Analytical Report on RTV talc submitted to R. T. Vanderbilt Company, Inc. 13 February 1987 (Submitted to Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \"Talc (containing asbestiform fibers)\". Crane, D. (26 November 1986) Letter to Greg Piacitelli (NIOSH) describing the analytical findings of the Occupational Safety and Health Administration regarding R. T. Vanderbilt Talc (In OSHA Docket H-33-d and in Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \u2013 2 June 2000). Crane, D. (12 June 2000) Background Information Regarding the Analysis of Industrial Talcs. Letter to the Consumer Product Safety Commission from the Occupational Safety and Health Administration. (Appended to CPSC Staff Report on \"Asbestos in Children's Crayons\" Aug. 2000). McCrone Associates \u2013 Atlanta Lab.: Report on the Analysis of Paint CLS-5067-1 and Mineral Filler CLS-N-439-1. To Unspecified Paint Company 23 September 1992. (Submitted to Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \"Talc (containing asbestiform fibers)\". 2 June 2000. Langer, A. M., Nolan, R. P. (November 2000) \"Mineralogical Characterization of Vanderbilt Talc Specimens & Comparison of the 1976 Rohl Talc Report to NIOSH and Analysis Performed in 1988\". In Public Comments \u2013 Nat'l Toxicology Program 10th ROC review. W. Jameson NIEHS MED EC-14, 79 Alexander Drive Research Triangle Park, NC \"Talc (containing asbestiform fibers)\". United States Department of the Interior: Selected Silicate Minerals and Their Asbestiform Varieties by W. J. Campbell, et al. (Bureau of Mines Information Circular, I. C. 8751). Washington, D.C.: Dept. of the Interior, Bureau of Mines. (1977). For studies finding no biological effects associated with talcum powder, see: but more recent work has rejected these conclusions in favor of \"same as\" asbestos risk. On 12 July 2018, a Missouri jury ordered Johnson & Johnson to pay a record $ 4.69 billion to 22 women who alleged the company's talc-based products, including its baby powder, contain asbestos and caused them to develop ovarian cancer. Chrysotile has been used more than any other type and accounts for about 95\\% of the asbestos found in buildings in America. Chrysotile is more flexible than amphibole types of asbestos , and can be spun and woven into fabric. The most common use was corrugated asbestos cement roofing primarily for outbuildings, warehouses and garages. It may also be found in sheets or panels used for ceilings and sometimes for walls and floors. Chrysotile has been a component in joint compound and some plasters. Numerous other items have been made containing chrysotile including brake linings, fire barriers in fuseboxes, pipe insulation, floor tiles, residential shingles, and gaskets for high temperature equipment. In 2009, about 9\\% of the world's asbestos production was mined in Canada. In late 2011, Canada's remaining two asbestos mines, both located in Quebec, halted operations.Asbestos mining stops for first time in 130 years. Canadian Broadcasting Corporation. 24 November 2011 In September 2012, the Quebec government halted asbestos mining.Dougherty, Kevin (20 November 2012) Quebec Budget: Finance Minister Nicolas Marceau tightens spending, levies new taxes. Ottawa Citizen During the 1980s and again in the 1990s, it was suggested at times that the process of making asbestos cement could \"neutralize\" the asbestos, either via chemical processes or by causing cement to attach to the fibers and changing their physical size; subsequent studies showed that this was untrue , and that decades-old asbestos cement, when broken, releases asbestos fibers identical to those found in nature, with no detectable alteration. Exposure to asbestos in the form of fibers is always considered dangerous. Working with, or exposure to, material that is friable, or materials or works that could cause release of loose asbestos fibers, is considered high risk. In general, people who become ill from inhaling asbestos have been regularly exposed in a job where they worked directly with the material. The most common diseases associated with chronic exposure to asbestos are asbestosis and mesothelioma.ATSDR \u2013 Asbestos \u2013 Health Effects. (1 April 2008). ATSDR Home. Retrieved 24 January 2011 Australia Asbestos Products Ltd (Sydney) asbestos cement corrugated roofing for export The use of crocidolite (blue asbestos) was banned in 1967, while the use of amosite (brown asbestos) continued in the construction industry until the mid-1980s. It was finally banned from building products in 1989, though it remained in gaskets and brake linings until 31 December 2003, and cannot be imported, used or recycled. The town of Wittenoom, in Western Australia was built around a (blue) asbestos mine. The entire town continues to be contaminated , and has been disincorporated, allowing local authorities to remove references to Wittenoom from maps and roadsigns . Canada From 31 December 2018 it was illegal to import, manufacture, sell, trade or use products made from asbestos. There are exemptions for its use in the chlor-alkali industry, the military, nuclear facilities and for magnesium extraction from asbestos mining residues. Japan Revelations that hundreds of workers had died in Japan over the previous few decades from diseases related to asbestos sparked a scandal in mid-2005.Japanese Asbestos Scandal . Asia Monitor Resource Center. 28 September 2007 Tokyo had, in 1971, ordered companies handling asbestos to install ventilators and check health on a regular basis ; however, the Japanese government did not ban crocidolite and amosite until 1995, and a near complete ban with a few exceptions on asbestos was implemented in 2006, with the remaining exceptions being removed in March 2012 for a full-fledged ban.Asbestos use banned on all products from this month. Etoday.co.kr. Retrieved on 17 October 2015. North-west of Nelson, in the Upper Takaka Valley is New Zealand's only commercially harvested asbestos mine. A low-grade Chrysotile was mined here from 1908 to 1917 but only 100 tons was washed and taken out by packhorse. A new power scheme enabled work to renew and between 1940 and 1949, 40 tons a month was mined by the Hume Company. This continued to 1964, when, due to the short length of its fibre , the limited commercial viability forced mining to cease. United Kingdom In the United Kingdom, blue and brown asbestos materials were banned outright in 1985 while the import, sale and second hand reuse of white asbestos was outlawed in 1999. The 2012 Control of Asbestos Regulations state that owners of non-domestic buildings (e.g., factories and offices) have a \"duty to manage\" asbestos on the premises by making themselves aware of its presence and ensuring the material does not deteriorate, removing it if necessary. Employers, e.g. construction companies, whose operatives may come into contact with asbestos must also provide annual asbestos training to their workers. In 1989 the United States Environmental Protection Agency (EPA) issued the Asbestos Ban and Phase Out Rule but in 1991, asbestos industry supporters challenged and overturned the ban in a landmark lawsuit: Corrosion Proof Fittings v. the Environmental Protection Agency. Although the case resulted in several small victories for asbestos regulation, the EPA ultimately did not put an end to asbestos use. The ruling left many consumer products that can still legally contain trace amounts of asbestos. Six categories of asbestos-containing products are however banned: corrugated paper, rollboard, commercial paper, specialty paper, flooring felt and any new uses of asbestos. The Clean Air Act also bans asbestos pipe insulation and asbestos block insulation on components such as boilers and hot water tanks, and spray-applied surfacing asbestos-containing materials. The Consumer Product Safety Act bans asbestos in artificial fireplace embers and wall patching compounds. The Food and Drug Administration bans asbestos-containing filters in pharmaceutical manufacturing, processing and packing.EPA Asbestos Materials Bans: Clarification. epa.gov. 18 May 1999 Vietnam Corrugated asbestos roof (with Fibre cement) In Vietnam, chrysotile asbestos is not banned and still widely used. Amphibole asbestos is banned from trade and use. Vietnam is one of the top 10 asbestos users in the world, with an annual import volume of about 65,000\u201370,000 tons of chrysotile.T\u1ea5m l\u1ee3p ami\u0103ng, k\u1ebb gi\u1ebft ng\u01b0\u1eddi?, b\u00e1o Ph\u00e1p Lu\u1eadt, 10 July 2017, language=vietnamese About 90\\% of the imported asbestos is used to produce about 100 million m2 of cement roofing sheets (asbestos-cement). According to one study, among 300 families in Yen Bai, Thanh Hoa, 85\\% of households use asbestos roofing sheets, but only 5\\% know about their harms. In 1978, a highly texturized fiberglass fabric was invented by Bal Dixit, called Zetex. This fabric is lighter than asbestos , but offers the same bulk, thickness, hand, feel, and abrasion resistance as asbestos. The fiberglass was texturized to eliminate some of the problems that arise with fiberglass, such as poor abrasion resistance and poor seam strength.Dixit, B., \"Performance of Protective Clothing: Development and Testing of Asbestos Substitutes,\" Performance of Protective Clothing, ASTM STP 900, R. L. Barker and G. C. Coletta, Eds., American Society for Testing and Materials, Philadelphia, 1986, pp. 446\u2013460 . The demolition of buildings containing large amounts of asbestos based materials pose particular problems for builders and property developers \u2013 such buildings often have to be deconstructed piece by piece, or the asbestos has to be painstakingly removed before the structure can be razed by mechanical or explosive means. One such example is the Red Road Flats in Glasgow, Scotland which used huge amounts of asbestos cement board for wall panelling \u2013 British health and safety regulations stipulate that asbestos material has to be removed in specially adapted vehicles and taken to a landfill site with an appropriate permit to accept asbestos, via an approved route, at certain times of the day.", "after_revision": "Asbestos (pronounced: or ) is a naturally occurring fibrous silicate mineral. There are six types, all of which are composed of long and thin fibrous crystals, each fiber being composed of many microscopic \"fibrils\" that can be released into the atmosphere by abrasion and other processes. Asbestos is an excellent electrical insulator and is highly heat-resistant, so for many years it was used as a building material.Bureau of Naval Personnel, Basic Electricity. 1969: US Navy. However, it is now a notorious health and safety hazard and the use of asbestos as a building material is illegal in many countries. Inhalation of asbestos fibres can lead to various serious lung conditions, including asbestosis and cancer. Asbestos was widely used during the 20th century until the 1970s when public recognition of the health hazards of asbestos dust led to its prohibition in mainstream construction and fireproofing in most countries. Despite this, and in part because the consequences of exposure can take decades to arise, at least 100,000 people are thought to die each year from diseases related to asbestos exposure. Industrial era Industrial scale asbestos mining began in 1878 in Thetford township, Quebec. By 1895, mining was increasingly mechanized The large-scale asbestos industry began in the mid-19th century. Early attempts at producing asbestos paper and cloth in Italy began in the 1850s but were unsuccessful in creating a market for such products. Canadian samples of asbestos were displayed in London in 1862, and the first companies were formed in England and Scotland to exploit this resource. Asbestos was first used in the manufacture of yarn, and German industrialist Louis Wertheim adopted this process in his factories in Germany. In 1871, the Patent Asbestos Manufacturing Company was established in Glasgow, and during the following decades, the Clydebank area became a centre for the nascent industry. The applications of asbestos multiplied at the end of the 19th century - this is an advertisement for an asbestos-lined clothes iron from 1906 Asbestos production began in the Urals of the Russian Empire in the 1880s, and the Alpine regions of Northern Italy with the formation in Turin of the Italo-English Pure Asbestos Company in 1876, although this was soon swamped by the greater production levels from the Canadian mines. Mining also took off in South Africa from 1893 under the aegis of the British businessman Francis Oates, the director of the De Beers company. It was in South Africa that the production of amosite began in 1910. The U.S. asbestos industry had an early start in 1858 when fibrous anthophyllite was mined for use as asbestos insulation by the Johns Company, a predecessor to the current Johns Manville, at a quarry at Ward's Hill on Staten Island, New York. US production began in earnest in 1899 with the discovery of large deposits in Belvidere Mountain. The use of asbestos became increasingly widespread toward the end of the 19th century when its diverse applications included fire-retardant coatings, concrete, bricks, pipes and fireplace cement, heat-, fire-, and acid-resistant gaskets, pipe insulation, ceiling insulation, fireproof drywall, flooring, roofing, lawn furniture , and drywall joint compound. In 2011, it was reported that over 50\\% of UK houses still contained asbestos, despite a ban on asbestos products some years earlier.Don, Andrew (1 May 2011) Asbestos: the hidden health hazard in millions of homes. The Guardian. In Japan, particularly after World War II, asbestos was used in the manufacture of ammonium sulfate for purposes of rice production, sprayed upon the ceilings, iron skeletons , and walls of railroad cars and buildings (during the 1960s), and used for energy efficiency reasons as well. Production of asbestos in Japan peaked in 1974 and went through ups and downs until about 1990 when production began to drop dramatically. Approximately 100,000 people in the United States have died, or are terminally ill, from asbestos exposure related to shipbuilding. In the Hampton Roads area, a shipbuilding center, mesothelioma occurrence is seven times the national rate.Burke, Bill (6 May 2001) \"Shipbuilding's Deadly Legacy: Introduction: Horrible Toll Could Have Been Avoided\" Virginian-Pilot Norfolk, Virginia (newspaper); from Internet Archive Thousands of tons of asbestos were used in World War II ships to insulate piping, boilers, steam engines , and steam turbines. There were approximately 4.3 million shipyard workers in the United States during the war; for every 1,000 workers, about 14 died of mesothelioma and an unknown number died of asbestosis.Burke, Bill (6 May 2001) \"Shipyards, a Crucible for Tragedy: Part 1: How the war created a monster\" Virginian-Pilot Norfolk, Virginia (newspaper) The United States government and the asbestos industry have been criticized for not acting quickly enough to inform the public of dangers and to reduce public exposure. In the late 1970s, court documents proved that asbestos industry officials knew of asbestos dangers since the 1930s and had concealed them from the public. Serpentine group In Guy's Hospital, London, 1941, nurses arrange asbestos blankets over an electrically heated frame to create a hood over patients to help warm them quickly Serpentine minerals have a sheet or layered structure. Chrysotile (commonly known as white asbestos) is the only asbestos mineral in the serpentine group. In the United States, chrysotile has been the most commonly used type of asbestos. According to the U.S. Environmental Protection Agency (EPA) Asbestos Building Inspectors Manual, chrysotile accounts for approximately 95\\% of asbestos found in buildings in the United States. Chrysotile is often present in a wide variety of products and materials, including: Chlor Alkali diaphragm membranes used to make chlorine (currently in the US)Caustic Soda Production. Olin Corporation Drywall and joint compound (including texture coats) Plaster Gas mask filters throughout World War II until the 1960s for most countries; Germany and the USSR's Civilian issued filters up until 1988 tested positive for asbestos Vinyl floor tiles, sheeting, adhesives Roofing tars, felts, siding, and shingles \"Transite\" panels, siding, countertops, and pipes Popcorn ceilings, also known as acoustic ceilings Fireproofing Caulk Industrial and marine gaskets Brake pads and shoes Stage curtains Fire blankets Interior fire doors Fireproof clothing for firefighters Thermal pipe insulation Filters for removing fine particulates from chemicals, liquids , and wine Dental cast linings HVAC flexible duct connectors Drilling fluid additives Low-density insulating board (often referred to as AIB or asbestos insulating board) and ceiling tiles; Asbestos cement sheets and pipes for construction, casing for water and electrical/telecommunication services; Thermal and chemical insulation (e.g., fire-rated doors, limpet spray, lagging , and gaskets). While mostly chrysotile asbestos fibers were once used in automobile brake pads, shoes, and clutch discs, contaminants of amphiboles were present. Since approximately the mid-1990s, brake pads, new or replacement, have been manufactured instead with linings made of ceramic, carbon, metallic , and aramid fiber (Twaron or Kevlar\u2014the same material used in bulletproof vests). Construction Developed countries Older decorative ceilings, similar to this one, may contain small amounts of white asbestos 1929 newspaper advertisement from Perth, Western Australia, for asbestos sheeting for residential building construction The use of asbestos in new construction projects has been banned for health and safety reasons in many developed countries or regions, including the European Union, the United Kingdom, Australia, Hong Kong, Japan, and New Zealand. A notable exception is the United States, where asbestos continues to be used in construction such as cement asbestos pipes. The 5th Circuit Court prevented the EPA from banning asbestos in 1991 because EPA research showed the ban would cost between US $450 and 800 million while only saving around 200 lives in a 13-year timeframe, and that the EPA did not provide adequate evidence for the safety of alternative products.947 F. 2d 1201 \u2013 Corrosion Proof Fittings v. Environmental Protection Agency. Openjurist.org. Retrieved 10 January 2012. Until the mid-1980s, small amounts of white asbestos were used in the manufacture of Artex, a decorative stipple finish,Where can asbestos be found, Asbestos Surveying Ltd, Birmingham, UK, 2 08 2008 . Retrieved 29 December 2008. however, some of the lesser-known suppliers of Artex-type materials were still adding white asbestos until 1999.Artex website, Click the \"Asbestos in Artex\" button. Before the ban, asbestos was widely used in the construction industry in thousands of materials. Some are judged to be more dangerous than others due to the amount of asbestos and the material's friable nature. Sprayed coatings, pipe insulation, and Asbestos Insulating Board (AIB) are thought to be the most dangerous due to their high content of asbestos and friable nature. Many older buildings built before the late 1990s contain asbestos. In the United States, there is a minimum standard for asbestos surveys as described by ASTM standard E 2356\u201318. In the UK, the Health and Safety Executive have issued guidance called HSG264 describing how surveys should be completed although other methods can be used if they can demonstrate they have met the regulations by other means. The EPA includes some, but not all, asbestos-contaminated facilities on the Superfund National Priorities List (NPL). Renovation and demolition of asbestos-contaminated buildings are subject to EPA NESHAP and OSHA Regulations. Asbestos is not a material covered under CERCLA's innocent purchaser defense. In the UK, the removal and disposal of asbestos and substances containing it are covered by the Control of Asbestos Regulations 2006.Control of Asbestos Regulations 2006, Health and Safety Executive, London, UK, Undated. Retrieved 29 December 2008. U.S. asbestos consumption hit a peak of 804,000 tons in 1973; world asbestos demand peaked around 1977, with 25 countries producing nearly 4.8 million metric tons annually. In older buildings (e.g. those built before 1999 in the UK, before white asbestos was banned), asbestos may still be present in some areas. Being aware of asbestos locations reduces the risk of disturbing asbestos. Removal of asbestos building components can also remove the fire protection they provide, therefore fire protection substitutes are required for proper fire protection that the asbestos originally provided.Asbestos Removal. Laws.sandwell.gov.uk (1 April 2005). Retrieved 10 January 2012. Outside Europe and North America Some countries, such as India, Indonesia, China, Russia, and Brazil, have continued widespread use of asbestos. The most common is corrugated asbestos-cement sheets or \"A/C sheets\" for roofing and sidewalls. Millions of homes, factories, schools or sheds, and shelters continue to use asbestos. Cutting these sheets to size and drilling holes to receive 'J' bolts to help secure the sheets to roof framing is done on-site. There has been no significant change in production and use of A/C sheets in developing countries following the widespread restrictions in developed nations. 11 September 2001 attacks As New York City's World Trade Center collapsed following the September 11 attacks, Lower Manhattan was blanketed in a mixture of building debris and combustible materials. This complex mixture gave rise to the concern that thousands of residents and workers in the area would be exposed to known hazards in the air and dust, such as asbestos, lead, glass fibers, and pulverized concrete. More than 1,000 tons of asbestos are thought to have been released into the air following the buildings' destruction. Inhalation of a mixture of asbestos and other toxicants is thought to be linked to the unusually high death rate from cancer of emergency service workers since the disaster. Thousands more are now thought to be at risk of developing cancer due to this exposure with those who have died so far being only the \"tip of the iceberg\". Some commentators have criticized authorities for using asbestos in the buildings' construction. In May 2002, after numerous cleanup, dust collection, and air monitoring activities were conducted outdoors by EPA, other federal agencies, New York City, and the state of New York, New York City formally requested federal assistance to clean and test residences in the vicinity of the World Trade Center site for airborne asbestos. Asbestos contaminants in other products Vermiculite Vermiculite is a hydrated laminar magnesium-aluminum-iron silicate that resembles mica. It can be used for many industrial applications and has been used as insulation. Some deposits of vermiculite are contaminated with small amounts of asbestos. One vermiculite mine operated by W. R. Grace and Company in Libby, Montana exposed workers and community residents to danger by mining vermiculite contaminated with asbestos, typically richterite, winchite, actinolite or tremolite. Vermiculite contaminated with asbestos from the Libby mine was used as insulation in residential and commercial buildings through Canada and the United States. W. R. Grace and Company's loose-fill vermiculite was marketed as Zonolite but was also used in sprayed-on products such as Monokote. In 1999, the EPA began cleanup efforts in Libby and now the area is a Superfund cleanup area. The EPA has determined that harmful asbestos is released from the mine as well as through other activities that disturb soil in the area. Talc A laboratory heat spreader made of asbestos, on a tripod over a Teclu burner Talc can sometimes be contaminated with asbestos due to the proximity of asbestos ore (usually tremolite) in underground talc deposits. By 1973, US federal law required all talc products to be asbestos-free, and today there is strict quality control in the production of talc products, separating cosmetic-grade talc (e.g. talcum powder) from industrial-grade talc (often used in friction products) has largely eliminated this issue for consumers. In 2000, tests in a certified asbestos-testing laboratory found the tremolite form of amphibole asbestos used to be found in three out of eight popular brands of children's crayons that were made partly from talc: Crayola, Prang, and RoseArt. In Crayola crayons, the tests found asbestos levels around 0.05\\% in Carnation Pink and 2.86\\% in Orchid; in Prang crayons, the range was from 0.3\\% in Periwinkle to 0.54\\% in Yellow; in Rose Art crayons, it was from 0.03\\% in Brown to 1.20\\% in Orange. Overall, 32 different types of crayons from these brands used to contain more than trace amounts of asbestos, and eight others contained trace amounts. The Art and Creative Materials Institute, a trade association which tested the safety of crayons on behalf of the makers, initially insisted the test results must have been incorrect, although they later said they do not test for asbestos. In May 2000, Crayola said tests by Richard Lee, a materials analyst whose testimony on behalf of the asbestos industry has been accepted in lawsuits over 250 times, found its crayons tested negative for asbestos. In spite of that, in June 2000 Binney & Smith, the maker of Crayola, and the other makers agreed to stop using talc in their products, and changed their product formulations in the United States. The mining company, R T Vanderbilt Co of Gouverneur, New York, which supplied the talc to the crayon makers, states that \"to the best of our knowledge and belief\" there had never been any asbestos-related disease among the company's workers. However media reports claim that the United States Mine Safety and Health Administration (MSHA) had found asbestos in four talc samples tested in 2000. The Assistant Secretary for Mine Safety and Health subsequently wrote to the news reporter, stating that \"In fact, the abbreviation ND (non-detect) in the laboratory report \u2013 indicates no asbestos fibers actually were found in the samples.\"McAteer, J. Davitt Assist. Secretary for Mine Safety and Health correspondence to Andrew Schneider of the Seattle Post-Intelligencer dated 14 June 2000 \u2013 copy obtainable through records archives MSHA. Multiple studies by mineral chemists, cell biologists, and toxicologists between 1970 and 2000 found neither samples of asbestos in talc products nor symptoms of asbestos exposure among workers dealing with talc,For studies finding no asbestos in talcum powder samples, see: Van Orden, D., R. J. Lee: Weight Percent Compositional Analysis of Seven RTV Talc Samples. Analytical Report to R. T. Vanderbilt Company, Inc. 22 November 2000. Submitted to Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \"Talc (containing asbestiform fibers)\". 4 December 2000. Nord, G. L, S. W. Axen, R. P. Nolan: Mineralogy and Experimental Animal Studies of Tremolitic Talc. Environmental Sciences Laboratory, Brooklyn College, The City University of New York. Submitted to Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \"Talc (containing asbestiform fibers)\". 1 December 2000. Wylie, A.G. (2 June 2000) Report of Investigation. Analytical Report on RTV talc submitted to R. T. Vanderbilt Company, Inc. 13 February 1987 (Submitted to Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \"Talc (containing asbestiform fibers)\". Crane, D. (26 November 1986) Letter to Greg Piacitelli (NIOSH) describing the analytical findings of the Occupational Safety and Health Administration regarding R. T. Vanderbilt Talc (In OSHA Docket H-33-d and in Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \u2013 2 June 2000). Crane, D. (12 June 2000) Background Information Regarding the Analysis of Industrial Talcs. Letter to the Consumer Product Safety Commission from the Occupational Safety and Health Administration. (Appended to CPSC Staff Report on \"Asbestos in Children's Crayons\" Aug. 2000). McCrone Associates \u2013 Atlanta Lab.: Report on the Analysis of Paint CLS-5067-1 and Mineral Filler CLS-N-439-1. To Unspecified Paint Company 23 September 1992. (Submitted to Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \"Talc (containing asbestiform fibers)\". 2 June 2000. Langer, A. M., Nolan, R. P. (November 2000) \"Mineralogical Characterization of Vanderbilt Talc Specimens & Comparison of the 1976 Rohl Talc Report to NIOSH and Analysis Performed in 1988\". In Public Comments \u2013 Nat'l Toxicology Program 10th ROC review. W. Jameson NIEHS MED EC-14, 79 Alexander Drive Research Triangle Park, NC \"Talc (containing asbestiform fibers)\". United States Department of the Interior: Selected Silicate Minerals and Their Asbestiform Varieties by W. J. Campbell, et al. (Bureau of Mines Information Circular, I. C. 8751). Washington, D.C.: Dept. of the Interior, Bureau of Mines. (1977). For studies finding no biological effects associated with talcum powder, see: but more recent work has rejected these conclusions in favor of \"same as\" asbestos risk. On 12 July 2018, a Missouri jury ordered Johnson & Johnson to pay a record $ 4.69 billion to 22 women who alleged the company's talc-based products, including its baby powder, contain asbestos and caused them to develop ovarian cancer. Chrysotile has been used more than any other type and accounts for about 95\\% of the asbestos found in buildings in America. Chrysotile is more flexible than amphibole types of asbestos and can be spun and woven into fabric. The most common use was corrugated asbestos cement roofing primarily for outbuildings, warehouses , and garages. It may also be found in sheets or panels used for ceilings and sometimes for walls and floors. Chrysotile has been a component in joint compound and some plasters. Numerous other items have been made containing chrysotile including brake linings, fire barriers in fuseboxes, pipe insulation, floor tiles, residential shingles, and gaskets for high-temperature equipment. In 2009, about 9\\% of the world's asbestos production was mined in Canada. In late 2011, Canada's remaining two asbestos mines, both located in Quebec, halted operations.Asbestos mining stops for the first time in 130 years. Canadian Broadcasting Corporation. 24 November 2011 In September 2012, the Quebec government halted asbestos mining.Dougherty, Kevin (20 November 2012) Quebec Budget: Finance Minister Nicolas Marceau tightens spending, levies new taxes. Ottawa Citizen During the 1980s and again in the 1990s, it was suggested at times that the process of making asbestos cement could \"neutralize\" the asbestos, either via chemical processes or by causing the cement to attach to the fibers and changing their physical size; subsequent studies showed that this was untrue and that decades-old asbestos cement, when broken, releases asbestos fibers identical to those found in nature, with no detectable alteration. Exposure to asbestos in the form of fibers is always considered dangerous. Working with, or exposure to, material that is friable, or materials or works that could cause the release of loose asbestos fibers, is considered high risk. In general, people who become ill from inhaling asbestos have been regularly exposed in a job where they worked directly with the material. The most common diseases associated with chronic asbestos exposure are asbestosis and mesothelioma.ATSDR \u2013 Asbestos \u2013 Health Effects. (1 April 2008). ATSDR Home. Retrieved 24 January 2011 Australia Asbestos Products Ltd (Sydney) asbestos cement corrugated roofing for export The use of crocidolite (blue asbestos) was banned in 1967, while the use of amosite (brown asbestos) continued in the construction industry until the mid-1980s. It was finally banned from building products in 1989, though it remained in gaskets and brake linings until 31 December 2003, and cannot be imported, used , or recycled. The town of Wittenoom, in Western Australia , was built around a (blue) asbestos mine. The entire town continues to be contaminated and has been disincorporated, allowing local authorities to remove references to Wittenoom from maps and road signs . Canada From 31 December 2018 , it was illegal to import, manufacture, sell, trade , or use products made from asbestos. There are exemptions for its use in the Chlor-alkali industry, the military, nuclear facilities , and for magnesium extraction from asbestos mining residues. Japan Revelations that hundreds of workers had died in Japan over the previous few decades from diseases related to asbestos sparked a scandal in mid-2005.Japanese Asbestos Scandal . Asia Monitor Resource Center. 28 September 2007 Tokyo had, in 1971, ordered companies handling asbestos to install ventilators and check health regularly ; however, the Japanese government did not ban crocidolite and amosite until 1995, and a near-complete ban with a few exceptions on asbestos was implemented in 2006, with the remaining exceptions being removed in March 2012 for a full-fledged ban.Asbestos use banned on all products from this month. Etoday.co.kr. Retrieved on 17 October 2015. North-west of Nelson, in the Upper Takaka Valley , is New Zealand's only commercially harvested asbestos mine. A low-grade Chrysotile was mined here from 1908 to 1917 but only 100 tons were washed and taken out by packhorse. A new power scheme enabled work to renew and between 1940 and 1949, 40 tons a month was mined by the Hume Company. This continued to 1964, when, due to the short length of its fiber , the limited commercial viability forced mining to cease. United Kingdom In the United Kingdom, blue and brown asbestos materials were banned outright in 1985 while the import, sale , and secondhand reuse of white asbestos was outlawed in 1999. The 2012 Control of Asbestos Regulations state that owners of non-domestic buildings (e.g., factories and offices) have a \"duty to manage\" asbestos on the premises by making themselves aware of its presence and ensuring the material does not deteriorate, removing it if necessary. Employers, e.g. construction companies, whose operatives may come into contact with asbestos must also provide annual asbestos training to their workers. In 1989 the United States Environmental Protection Agency (EPA) issued the Asbestos Ban and Phase-Out Rule but in 1991, asbestos industry supporters challenged and overturned the ban in a landmark lawsuit: Corrosion Proof Fittings v. the Environmental Protection Agency. Although the case resulted in several small victories for asbestos regulation, the EPA ultimately did not put an end to asbestos use. The ruling left many consumer products that can still legally contain trace amounts of asbestos. Six categories of asbestos-containing products are however banned: corrugated paper, rollboard, commercial paper, specialty paper, flooring felt and any new uses of asbestos. The Clean Air Act also bans asbestos pipe insulation and asbestos block insulation on components such as boilers and hot water tanks, and spray-applied surfacing asbestos-containing materials. The Consumer Product Safety Act bans asbestos in artificial fireplace embers and wall patching compounds. The Food and Drug Administration bans asbestos-containing filters in pharmaceutical manufacturing, processing , and packing.EPA Asbestos Materials Bans: Clarification. epa.gov. 18 May 1999 Vietnam Corrugated asbestos roof (with Fibre cement) In Vietnam, chrysotile asbestos is not banned and is still widely used. Amphibole asbestos is banned from trade and use. Vietnam is one of the top 10 asbestos users in the world, with an annual import volume of about 65,000\u201370,000 tons of chrysotile.T\u1ea5m l\u1ee3p ami\u0103ng, k\u1ebb gi\u1ebft ng\u01b0\u1eddi?, b\u00e1o Ph\u00e1p Lu\u1eadt, 10 July 2017, language=vietnamese About 90\\% of the imported asbestos is used to produce about 100 million m2 of cement roofing sheets (asbestos-cement). According to one study, among 300 families in Yen Bai, Thanh Hoa, 85\\% of households use asbestos roofing sheets, but only 5\\% know about their harms. In 1978, a highly texturized fiberglass fabric was invented by Bal Dixit, called Zetex. This fabric is lighter than asbestos but offers the same bulk, thickness, hand, feel, and abrasion resistance as asbestos. The fiberglass was texturized to eliminate some of the problems that arise with fiberglass, such as poor abrasion resistance and poor seam strength.Dixit, B., \"Performance of Protective Clothing: Development and Testing of Asbestos Substitutes,\" Performance of Protective Clothing, ASTM STP 900, R. L. Barker and G. C. Coletta, Eds., American Society for Testing and Materials, Philadelphia, 1986, pp. 446\u2013460 . The demolition of buildings containing large amounts of asbestos-based materials pose particular problems for builders and property developers \u2013 such buildings often have to be deconstructed piece by piece, or the asbestos has to be painstakingly removed before the structure can be razed by mechanical or explosive means. One such example is the Red Road Flats in Glasgow, Scotland which used huge amounts of asbestos cement board for wall paneling \u2013 British health and safety regulations stipulate that asbestos material has to be removed in specially adapted vehicles and taken to a landfill site with an appropriate permit to accept asbestos, via an approved route, at certain times of the day.", "edit_actions": [{"type": "R", "before": "fibre", "after": "fiber", "start_char_pos": 165, "end_char_pos": 170}, {"type": "D", "before": ",", "after": null, "start_char_pos": 786, "end_char_pos": 787}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1406, "end_char_pos": 1407}, {"type": "D", "before": "in", "after": null, "start_char_pos": 2157, "end_char_pos": 2159}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2632, "end_char_pos": 2633}, {"type": "D", "before": ",", "after": null, "start_char_pos": 3009, "end_char_pos": 3010}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3253, "end_char_pos": 3253}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3686, "end_char_pos": 3686}, {"type": "D", "before": ",", "after": null, "start_char_pos": 3891, "end_char_pos": 3892}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4459, "end_char_pos": 4459}, {"type": "A", "before": null, "after": "the", "start_char_pos": 4846, "end_char_pos": 4846}, {"type": "R", "before": "asbestos-industry", "after": "asbestos industry", "start_char_pos": 5026, "end_char_pos": 5043}, {"type": "R", "before": "commonly-used", "after": "commonly used", "start_char_pos": 5515, "end_char_pos": 5528}, {"type": "A", "before": null, "after": ",", "start_char_pos": 6593, "end_char_pos": 6593}, {"type": "R", "before": "Low density", "after": "Low-density", "start_char_pos": 6678, "end_char_pos": 6689}, {"type": "R", "before": "fire rated", "after": "fire-rated", "start_char_pos": 6932, "end_char_pos": 6942}, {"type": "A", "before": null, "after": ",", "start_char_pos": 6972, "end_char_pos": 6972}, {"type": "A", "before": null, "after": ",", "start_char_pos": 7279, "end_char_pos": 7279}, {"type": "R", "before": "$450 and 800 million while only saving around 200 lives in a 13-year timeframe, and that the EPA did not provide adequate evidence for the safety of alternative products.947 F. 2d 1201 \u2013 Corrosion Proof Fittings v. Environmental Protection Agency. Openjurist.org. Retrieved 10 January 2012. Until the mid-1980s, small amounts of white asbestos were used in the manufacture of Artex, a decorative stipple finish,Where can asbestos be found, Asbestos Surveying Ltd, Birmingham, UK, 2 08 2008 . Retrieved 29 December 2008. however, some of the lesser-known suppliers of Artex-type materials were still adding white asbestos until 1999.Artex website, Click the \"Asbestos in Artex\" button. Prior to the ban, asbestos was widely used in the construction industry in thousands of materials. Some are judged to be more dangerous than others due to the amount of asbestos and the material's friable nature. Sprayed coatings, pipe insulation and Asbestos Insulating Board (AIB) are thought to be the most dangerous due to their high content of asbestos and friable nature. Many older buildings built before the late 1990s contain asbestos. In the United States, there is a minimum standard for asbestos surveys as described by ASTM standard E 2356\u201318. In the UK, the Health and Safety Executive have issued guidance called HSG264 describing how surveys should be completed although other methods can be used if they can demonstrate they have met the regulations by other means. The EPA includes some, but not all, asbestos-contaminated facilities on the Superfund National Priorities List (NPL). Renovation and demolition of asbestos-contaminated buildings is subject to EPA NESHAP and OSHA Regulations. Asbestos is not a material covered under CERCLA's innocent purchaser defense. In the UK, the removal and disposal of asbestos and of substances containing it are covered by the Control of Asbestos Regulations 2006.Control of Asbestos Regulations 2006, Health and Safety Executive, London, UK, Undated. Retrieved 29 December 2008. U.S. asbestos consumption hit a peak of 804,000 tons in 1973; world asbestos demand peaked around 1977, with 25 countries producing nearly 4.8 million metric tons annually. In older buildings (e.g. those built prior to 1999 in the UK, before white asbestos was banned), asbestos may still be present in some areas. Being aware of asbestos locations reduces the risk of disturbing asbestos. Removal of asbestos building components can also remove the fire protection they provide, therefore fire protection substitutes are required for proper fire protection that the asbestos originally provided.Asbestos Removal. Laws.sandwell.gov.uk (1 April 2005). Retrieved 10 January 2012. Outside Europe and North America Some countries, such as India, Indonesia, China, Russia and Brazil, have continued widespread use of asbestos. The most common is corrugated asbestos-cement sheets or \"A/C sheets\" for roofing and for side walls. Millions of homes, factories, schools or sheds and shelters continue to use asbestos. Cutting these sheets to size and drilling holes to receive 'J' bolts to help secure the sheets to roof framing is done on-site. There has been no significant change in production and use of A/C sheets in developing countries following the widespread restrictions in developed nations. 11 September 2001 attacks As New York City's World Trade Center collapsed following the September 11 attacks, Lower Manhattan was blanketed in a mixture of building debris and combustible materials. This complex mixture gave rise to the concern that thousands of residents and workers in the area would be exposed to known hazards in the air and in the dust, such as asbestos, lead, glass fibers, and pulverized concrete. More than 1,000 tons of asbestos are thought to have been released into the air following the buildings' destruction. Inhalation of a mixture of asbestos and other toxicants is thought to be linked to the unusually high death rate from cancer of emergency service workers since the disaster. Thousands more are now thought to be at risk of developing cancer due to this exposure with those who have died so far being only the \"tip of the iceberg\". Some commentators have criticised authorities for using asbestos in the buildings' construction. In May 2002, after numerous cleanup, dust collection, and air monitoring activities were conducted outdoors by EPA, other federal agencies, New York City, and the state of New York, New York City formally requested federal assistance to clean and test residences in the vicinity of the World Trade Center site for airborne asbestos. Asbestos contaminants in other products Vermiculite Vermiculite is a hydrated laminar magnesium-aluminum-iron silicate which resembles mica. It can be used for many industrial applications and has been used as insulation. Some deposits of vermiculite have been found to be contaminated with small amounts of asbestos. One vermiculite mine operated by W. R. Grace and Company in Libby, Montana exposed workers and community residents to danger by mining vermiculite contaminated with asbestos, typically richterite, winchite, actinolite or tremolite. Vermiculite contaminated with asbestos from the Libby mine was used as insulation in residential and commercial buildings through Canada and the United States. W. R. Grace and Company's loose-fill vermiculite was marketed as Zonolite but was also used in sprayed-on products such as Monokote. In 1999, the EPA began cleanup efforts in Libby and now the area is a Superfund cleanup area. The EPA has determined that harmful asbestos is released from the mine as well as through other activities that disturb soil in the area. Talc A laboratory heat spreader made of asbestos, on tripod over a Teclu burner Talc can sometimes be contaminated with asbestos due to the proximity of asbestos ore (usually tremolite) in underground talc deposits. By 1973, US federal law required all talc products to be asbestos-free, and today there is strict quality control in the production of talc products, separating cosmetic-grade talc (e.g. talcum powder) from industrial-grade talc (often used in friction products) has largely eliminated this issue for consumers. In 2000, tests in a certified asbestos-testing laboratory found the tremolite form of amphibole asbestos used to be found in three out of eight popular brands of children's crayons that were made partly from talc: Crayola, Prang, and RoseArt. In Crayola crayons, the tests found asbestos levels around 0.05\\% in Carnation Pink and 2.86\\% in Orchid; in Prang crayons, the range was from 0.3\\% in Periwinkle to 0.54\\% in Yellow; in Rose Art crayons, it was from 0.03\\% in Brown to 1.20\\% in Orange. Overall, 32 different types of crayons from these brands used to contain more than trace amounts of asbestos, and eight others contained trace amounts. The Art and Creative Materials Institute, a trade association which tested the safety of crayons on behalf of the makers, initially insisted the test results must have been incorrect, although they later said they do not test for asbestos. In May 2000, Crayola said tests by Richard Lee, a materials analyst whose testimony on behalf of the asbestos industry has been accepted in lawsuits over 250 times, found its crayons tested negative for asbestos. In spite of that, in June 2000 Binney & Smith, the maker of Crayola, and the other makers agreed to stop using talc in their products, and changed their product formulations in the United States. The mining company, R T Vanderbilt Co of Gouverneur, New York, which supplied the talc to the crayon makers, states that \"to the best of our knowledge and belief\" there had never been any asbestos-related disease among the company's workers. However media reports claim that the United States Mine Safety and Health Administration (MSHA) had found asbestos in four talc samples tested in 2000. The Assistant Secretary for Mine Safety and Health subsequently wrote to the news reporter, stating that \"In fact, the abbreviation ND (non-detect) in the laboratory report \u2013 indicates no asbestos fibers actually were found in the samples.\"McAteer, J. Davitt Assist. Secretary for Mine Safety and Health correspondence to Andrew Schneider of the Seattle Post-Intelligencer dated 14 June 2000 \u2013 copy obtainable through records archives MSHA. Multiple studies by mineral chemists, cell biologists, and toxicologists between 1970 and 2000 found neither samples of asbestos in talc products nor symptoms of asbestos exposure among workers dealing with talc,For studies finding no asbestos in talcum powder samples, see: Van Orden, D., R. J. Lee: Weight Percent Compositional Analysis of Seven RTV Talc Samples. Analytical Report to R. T. Vanderbilt Company, Inc. 22 November 2000. Submitted to Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \"Talc (containing asbestiform fibers)\". 4 December 2000. Nord, G. L, S. W. Axen, R. P. Nolan: Mineralogy and Experimental Animal Studies of Tremolitic Talc. Environmental Sciences Laboratory, Brooklyn College, The City University of New York. Submitted to Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \"Talc (containing asbestiform fibers)\". 1 December 2000. Wylie, A.G. (2 June 2000) Report of Investigation. Analytical Report on RTV talc submitted to R. T. Vanderbilt Company, Inc. 13 February 1987 (Submitted to Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \"Talc (containing asbestiform fibers)\". Crane, D. (26 November 1986) Letter to Greg Piacitelli (NIOSH) describing the analytical findings of the Occupational Safety and Health Administration regarding R. T. Vanderbilt Talc (In OSHA Docket H-33-d and in Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \u2013 2 June 2000). Crane, D. (12 June 2000) Background Information Regarding the Analysis of Industrial Talcs. Letter to the Consumer Product Safety Commission from the Occupational Safety and Health Administration. (Appended to CPSC Staff Report on \"Asbestos in Children's Crayons\" Aug. 2000). McCrone Associates \u2013 Atlanta Lab.: Report on the Analysis of Paint CLS-5067-1 and Mineral Filler CLS-N-439-1. To Unspecified Paint Company 23 September 1992. (Submitted to Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \"Talc (containing asbestiform fibers)\". 2 June 2000. Langer, A. M., Nolan, R. P. (November 2000) \"Mineralogical Characterization of Vanderbilt Talc Specimens & Comparison of the 1976 Rohl Talc Report to NIOSH and Analysis Performed in 1988\". In Public Comments \u2013 Nat'l Toxicology Program 10th ROC review. W. Jameson NIEHS MED EC-14, 79 Alexander Drive Research Triangle Park, NC \"Talc (containing asbestiform fibers)\". United States Department of the Interior: Selected Silicate Minerals and Their Asbestiform Varieties by W. J. Campbell, et al. (Bureau of Mines Information Circular, I. C. 8751). Washington, D.C.: Dept. of the Interior, Bureau of Mines. (1977). For studies finding no biological effects associated with talcum powder, see: but more recent work has rejected these conclusions in favor of \"same as\" asbestos risk. On 12 July 2018, a Missouri jury ordered Johnson & Johnson to pay a record $", "after": "$450 and 800 million while only saving around 200 lives in a 13-year timeframe, and that the EPA did not provide adequate evidence for the safety of alternative products.947 F. 2d 1201 \u2013 Corrosion Proof Fittings v. Environmental Protection Agency. Openjurist.org. Retrieved 10 January 2012. Until the mid-1980s, small amounts of white asbestos were used in the manufacture of Artex, a decorative stipple finish,Where can asbestos be found, Asbestos Surveying Ltd, Birmingham, UK, 2 08 2008 . Retrieved 29 December 2008. however, some of the lesser-known suppliers of Artex-type materials were still adding white asbestos until 1999.Artex website, Click the \"Asbestos in Artex\" button. Before the ban, asbestos was widely used in the construction industry in thousands of materials. Some are judged to be more dangerous than others due to the amount of asbestos and the material's friable nature. Sprayed coatings, pipe insulation, and Asbestos Insulating Board (AIB) are thought to be the most dangerous due to their high content of asbestos and friable nature. Many older buildings built before the late 1990s contain asbestos. In the United States, there is a minimum standard for asbestos surveys as described by ASTM standard E 2356\u201318. In the UK, the Health and Safety Executive have issued guidance called HSG264 describing how surveys should be completed although other methods can be used if they can demonstrate they have met the regulations by other means. The EPA includes some, but not all, asbestos-contaminated facilities on the Superfund National Priorities List (NPL). Renovation and demolition of asbestos-contaminated buildings are subject to EPA NESHAP and OSHA Regulations. Asbestos is not a material covered under CERCLA's innocent purchaser defense. In the UK, the removal and disposal of asbestos and substances containing it are covered by the Control of Asbestos Regulations 2006.Control of Asbestos Regulations 2006, Health and Safety Executive, London, UK, Undated. Retrieved 29 December 2008. U.S. asbestos consumption hit a peak of 804,000 tons in 1973; world asbestos demand peaked around 1977, with 25 countries producing nearly 4.8 million metric tons annually. In older buildings (e.g. those built before 1999 in the UK, before white asbestos was banned), asbestos may still be present in some areas. Being aware of asbestos locations reduces the risk of disturbing asbestos. Removal of asbestos building components can also remove the fire protection they provide, therefore fire protection substitutes are required for proper fire protection that the asbestos originally provided.Asbestos Removal. Laws.sandwell.gov.uk (1 April 2005). Retrieved 10 January 2012. Outside Europe and North America Some countries, such as India, Indonesia, China, Russia, and Brazil, have continued widespread use of asbestos. The most common is corrugated asbestos-cement sheets or \"A/C sheets\" for roofing and sidewalls. Millions of homes, factories, schools or sheds, and shelters continue to use asbestos. Cutting these sheets to size and drilling holes to receive 'J' bolts to help secure the sheets to roof framing is done on-site. There has been no significant change in production and use of A/C sheets in developing countries following the widespread restrictions in developed nations. 11 September 2001 attacks As New York City's World Trade Center collapsed following the September 11 attacks, Lower Manhattan was blanketed in a mixture of building debris and combustible materials. This complex mixture gave rise to the concern that thousands of residents and workers in the area would be exposed to known hazards in the air and dust, such as asbestos, lead, glass fibers, and pulverized concrete. More than 1,000 tons of asbestos are thought to have been released into the air following the buildings' destruction. Inhalation of a mixture of asbestos and other toxicants is thought to be linked to the unusually high death rate from cancer of emergency service workers since the disaster. Thousands more are now thought to be at risk of developing cancer due to this exposure with those who have died so far being only the \"tip of the iceberg\". Some commentators have criticized authorities for using asbestos in the buildings' construction. In May 2002, after numerous cleanup, dust collection, and air monitoring activities were conducted outdoors by EPA, other federal agencies, New York City, and the state of New York, New York City formally requested federal assistance to clean and test residences in the vicinity of the World Trade Center site for airborne asbestos. Asbestos contaminants in other products Vermiculite Vermiculite is a hydrated laminar magnesium-aluminum-iron silicate that resembles mica. It can be used for many industrial applications and has been used as insulation. Some deposits of vermiculite are contaminated with small amounts of asbestos. One vermiculite mine operated by W. R. Grace and Company in Libby, Montana exposed workers and community residents to danger by mining vermiculite contaminated with asbestos, typically richterite, winchite, actinolite or tremolite. Vermiculite contaminated with asbestos from the Libby mine was used as insulation in residential and commercial buildings through Canada and the United States. W. R. Grace and Company's loose-fill vermiculite was marketed as Zonolite but was also used in sprayed-on products such as Monokote. In 1999, the EPA began cleanup efforts in Libby and now the area is a Superfund cleanup area. The EPA has determined that harmful asbestos is released from the mine as well as through other activities that disturb soil in the area. Talc A laboratory heat spreader made of asbestos, on a tripod over a Teclu burner Talc can sometimes be contaminated with asbestos due to the proximity of asbestos ore (usually tremolite) in underground talc deposits. By 1973, US federal law required all talc products to be asbestos-free, and today there is strict quality control in the production of talc products, separating cosmetic-grade talc (e.g. talcum powder) from industrial-grade talc (often used in friction products) has largely eliminated this issue for consumers. In 2000, tests in a certified asbestos-testing laboratory found the tremolite form of amphibole asbestos used to be found in three out of eight popular brands of children's crayons that were made partly from talc: Crayola, Prang, and RoseArt. In Crayola crayons, the tests found asbestos levels around 0.05\\% in Carnation Pink and 2.86\\% in Orchid; in Prang crayons, the range was from 0.3\\% in Periwinkle to 0.54\\% in Yellow; in Rose Art crayons, it was from 0.03\\% in Brown to 1.20\\% in Orange. Overall, 32 different types of crayons from these brands used to contain more than trace amounts of asbestos, and eight others contained trace amounts. The Art and Creative Materials Institute, a trade association which tested the safety of crayons on behalf of the makers, initially insisted the test results must have been incorrect, although they later said they do not test for asbestos. In May 2000, Crayola said tests by Richard Lee, a materials analyst whose testimony on behalf of the asbestos industry has been accepted in lawsuits over 250 times, found its crayons tested negative for asbestos. In spite of that, in June 2000 Binney & Smith, the maker of Crayola, and the other makers agreed to stop using talc in their products, and changed their product formulations in the United States. The mining company, R T Vanderbilt Co of Gouverneur, New York, which supplied the talc to the crayon makers, states that \"to the best of our knowledge and belief\" there had never been any asbestos-related disease among the company's workers. However media reports claim that the United States Mine Safety and Health Administration (MSHA) had found asbestos in four talc samples tested in 2000. The Assistant Secretary for Mine Safety and Health subsequently wrote to the news reporter, stating that \"In fact, the abbreviation ND (non-detect) in the laboratory report \u2013 indicates no asbestos fibers actually were found in the samples.\"McAteer, J. Davitt Assist. Secretary for Mine Safety and Health correspondence to Andrew Schneider of the Seattle Post-Intelligencer dated 14 June 2000 \u2013 copy obtainable through records archives MSHA. Multiple studies by mineral chemists, cell biologists, and toxicologists between 1970 and 2000 found neither samples of asbestos in talc products nor symptoms of asbestos exposure among workers dealing with talc,For studies finding no asbestos in talcum powder samples, see: Van Orden, D., R. J. Lee: Weight Percent Compositional Analysis of Seven RTV Talc Samples. Analytical Report to R. T. Vanderbilt Company, Inc. 22 November 2000. Submitted to Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \"Talc (containing asbestiform fibers)\". 4 December 2000. Nord, G. L, S. W. Axen, R. P. Nolan: Mineralogy and Experimental Animal Studies of Tremolitic Talc. Environmental Sciences Laboratory, Brooklyn College, The City University of New York. Submitted to Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \"Talc (containing asbestiform fibers)\". 1 December 2000. Wylie, A.G. (2 June 2000) Report of Investigation. Analytical Report on RTV talc submitted to R. T. Vanderbilt Company, Inc. 13 February 1987 (Submitted to Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \"Talc (containing asbestiform fibers)\". Crane, D. (26 November 1986) Letter to Greg Piacitelli (NIOSH) describing the analytical findings of the Occupational Safety and Health Administration regarding R. T. Vanderbilt Talc (In OSHA Docket H-33-d and in Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \u2013 2 June 2000). Crane, D. (12 June 2000) Background Information Regarding the Analysis of Industrial Talcs. Letter to the Consumer Product Safety Commission from the Occupational Safety and Health Administration. (Appended to CPSC Staff Report on \"Asbestos in Children's Crayons\" Aug. 2000). McCrone Associates \u2013 Atlanta Lab.: Report on the Analysis of Paint CLS-5067-1 and Mineral Filler CLS-N-439-1. To Unspecified Paint Company 23 September 1992. (Submitted to Public Comments Record \u2013 C. W. Jameson, National Toxicology Program, 10th ROC Nominations \"Talc (containing asbestiform fibers)\". 2 June 2000. Langer, A. M., Nolan, R. P. (November 2000) \"Mineralogical Characterization of Vanderbilt Talc Specimens & Comparison of the 1976 Rohl Talc Report to NIOSH and Analysis Performed in 1988\". In Public Comments \u2013 Nat'l Toxicology Program 10th ROC review. W. Jameson NIEHS MED EC-14, 79 Alexander Drive Research Triangle Park, NC \"Talc (containing asbestiform fibers)\". United States Department of the Interior: Selected Silicate Minerals and Their Asbestiform Varieties by W. J. Campbell, et al. (Bureau of Mines Information Circular, I. C. 8751). Washington, D.C.: Dept. of the Interior, Bureau of Mines. (1977). For studies finding no biological effects associated with talcum powder, see: but more recent work has rejected these conclusions in favor of \"same as\" asbestos risk. On 12 July 2018, a Missouri jury ordered Johnson & Johnson to pay a record $", "start_char_pos": 8090, "end_char_pos": 19436}, {"type": "D", "before": ",", "after": null, "start_char_pos": 19782, "end_char_pos": 19783}, {"type": "A", "before": null, "after": ",", "start_char_pos": 19921, "end_char_pos": 19921}, {"type": "R", "before": "high temperature", "after": "high-temperature", "start_char_pos": 20278, "end_char_pos": 20294}, {"type": "A", "before": null, "after": "the", "start_char_pos": 20502, "end_char_pos": 20502}, {"type": "A", "before": null, "after": "the", "start_char_pos": 20967, "end_char_pos": 20967}, {"type": "D", "before": ",", "after": null, "start_char_pos": 21080, "end_char_pos": 21081}, {"type": "A", "before": null, "after": "the", "start_char_pos": 21395, "end_char_pos": 21395}, {"type": "R", "before": "exposure to asbestos", "after": "asbestos exposure", "start_char_pos": 21644, "end_char_pos": 21664}, {"type": "A", "before": null, "after": ",", "start_char_pos": 22189, "end_char_pos": 22189}, {"type": "A", "before": null, "after": ",", "start_char_pos": 22247, "end_char_pos": 22247}, {"type": "D", "before": ",", "after": null, "start_char_pos": 22334, "end_char_pos": 22335}, {"type": "R", "before": "roadsigns", "after": "road signs", "start_char_pos": 22441, "end_char_pos": 22450}, {"type": "A", "before": null, "after": ",", "start_char_pos": 22482, "end_char_pos": 22482}, {"type": "A", "before": null, "after": ",", "start_char_pos": 22534, "end_char_pos": 22534}, {"type": "R", "before": "chlor-alkali", "after": "Chlor-alkali", "start_char_pos": 22611, "end_char_pos": 22623}, {"type": "A", "before": null, "after": ",", "start_char_pos": 22667, "end_char_pos": 22667}, {"type": "R", "before": "on a regular basis", "after": "regularly", "start_char_pos": 23055, "end_char_pos": 23073}, {"type": "R", "before": "near complete", "after": "near-complete", "start_char_pos": 23163, "end_char_pos": 23176}, {"type": "A", "before": null, "after": ",", "start_char_pos": 23467, "end_char_pos": 23467}, {"type": "R", "before": "was", "after": "were", "start_char_pos": 23602, "end_char_pos": 23605}, {"type": "R", "before": "fibre", "after": "fiber", "start_char_pos": 23817, "end_char_pos": 23822}, {"type": "R", "before": "and second hand", "after": ", and secondhand", "start_char_pos": 24006, "end_char_pos": 24021}, {"type": "R", "before": "Phase Out", "after": "Phase-Out", "start_char_pos": 24595, "end_char_pos": 24604}, {"type": "A", "before": null, "after": ",", "start_char_pos": 25589, "end_char_pos": 25589}, {"type": "A", "before": null, "after": "is", "start_char_pos": 25770, "end_char_pos": 25770}, {"type": "D", "before": ",", "after": null, "start_char_pos": 26445, "end_char_pos": 26446}, {"type": "R", "before": "asbestos based", "after": "asbestos-based", "start_char_pos": 27001, "end_char_pos": 27015}, {"type": "R", "before": "panelling", "after": "paneling", "start_char_pos": 27386, "end_char_pos": 27395}], "sents_char_pos": [0, 77, 289, 419, 464, 479, 612, 720, 936, 1123, 1215, 1324, 1469, 1618, 1760, 1934, 2365, 2508, 2577, 2823, 2922, 3281, 3415, 3496, 3510, 3795, 3936, 4068, 4176, 4331, 4479, 4570, 4667, 4978, 5134, 5363, 5463, 5546, 5739, 5924, 6079, 6261, 6277, 6762, 6781, 6892, 6986, 7133, 7360, 7836, 7961, 8260, 8337, 8353, 8380, 8722, 8774, 8873, 8987, 9152, 9219, 9331, 9557, 9675, 9783, 9861, 9998, 10085, 10175, 10286, 10428, 10503, 10710, 10727, 10764, 10791, 10935, 11036, 11122, 11250, 11407, 11606, 11829, 11947, 12121, 12277, 12374, 12707, 12848, 12929, 13025, 13257, 13417, 13550, 13644, 13782, 13998, 14310, 14553, 14659, 14737, 14807, 14959, 15199, 15412, 15608, 15850, 16002, 16242, 16269, 16443, 16809, 16879, 17022, 17039, 17139, 17225, 17368, 17385, 17436, 17671, 17990, 18082, 18187, 18266, 18376, 18568, 18581, 18770, 18833, 18947, 19126, 19184, 19359, 19595, 19720, 19822, 19934, 20029, 20098, 20305, 20380, 20476, 20527, 20562, 20644, 20764, 21032, 21224, 21299, 21454, 21594, 21697, 21731, 21747, 21759, 22033, 22202, 22288, 22570, 22727, 22883, 22940, 23075, 23321, 23373, 23387, 23417, 23527, 23640, 23755, 23881, 24067, 24348, 24502, 24773, 24907, 25004, 25179, 25372, 25478, 25602, 25789, 25838, 25968, 26168, 26319, 26407, 26532, 26681, 27089, 27267]}
+{"doc_id": "21647661", "revision_depth": "1", "before_revision": "Overview of the PSM The PSM is an entity that \u201c actually exists, not only as a distinct theoretical entity but something that will be empirically discovered in the future- for instance, as a specific stage of the global neural dynamics in the human brain \u201d . Involved in the PSM are three phenomenal properties that must occur in order to explain the concept of the self. The first is mineness, \u201c a higher order property of particular forms of phenomenal content, \u201d or the idea of ownership.Being No One The second is perspectivalness, which is \u201c a global, structural property of phenomenal space as a whole \u201d .Being No one More simply, it is what is commonly referred to as the ecological self, the immovable center of perception. The third phenomenal property is selfhood, which is \u201c the phenomenal target property \u201d or the idea of the self over time. It is the property of phenomenal selfhood that plays the most important role in creating the fictional self and the first person perspective. Metzinger defines the first person perspective as the \u201c existence of single coherent and temporally stable model of reality which is representationally centered around or on a single coherent and temporally stable phenomenal subject \u201d . The first-person perspective can be non-conceptual and is autonomously active due to the constant reception of perceptual information by the brain. The brain, specifically the brainstem and hypothalamus, processes this information into representational content, namely linguistic reflections. The PSM then uses this representational content to attribute phenomenal states to our perceived objectsand ourselves. We are thus what Metzinger calls na\u00efve realists, who believe we are perceiving reality directly when in actuality we are only perceiving representations of reality. The data structures and transport mechanisms of the data are \u201ctransparent\u201d so that we can introspect on our representations of perceptions, but cannot introspect on the data or mechanisms themselves. These systemic representational experiences are then connected by subjective experience to generate the phenomenal property of selfhood. Subjective experience is the result of the Phenomenal Model of Intentionality Relationship (PMIR). The PMIR is a \u201c conscious mental model, and its content is an ongoing, episodic subject-object relation \u201d . The model is a result of the combination of our unique set of sensory receptors that acquire input, our unique set of experiences that shape connections within the brain, and our unique positions in space that give our perception perspectivalness. Category: Consciousness studies Category:Theory of mind Category:Subjective experience Category:Specific models Category:Metaphysics of mi", "after_revision": "Overview of the PSM The PSM is an entity that \" actually exists, not only as a distinct theoretical entity but something that will be empirically discovered in the future\u2014 for instance, as a specific stage of the global neural dynamics in the human brain \" . Involved in the PSM are three phenomenal properties that must occur in order to explain the concept of the self. The first is mineness, \" a higher order property of particular forms of phenomenal content, \" or the idea of ownership.Being No One The second is perspectivalness, which is \" a global, structural property of phenomenal space as a whole \" .Being No one More simply, it is what is commonly referred to as the ecological self, the immovable center of perception. The third phenomenal property is selfhood, which is \" the phenomenal target property \" or the idea of the self over time. It is the property of phenomenal selfhood that plays the most important role in creating the fictional self and the first person perspective. Metzinger defines the first-person perspective as the \" existence of single coherent and temporally stable model of reality which is representationally centered around or on a single coherent and temporally stable phenomenal subject \" . The first-person perspective can be non-conceptual and is autonomously active due to the constant reception of perceptual information by the brain. The brain, specifically the brainstem and hypothalamus, processes this information into representational content, namely linguistic reflections. The PSM then uses this representational content to attribute phenomenal states to self and to perceived objects. People are thus what Metzinger calls na\u00efve realists, who believe they are perceiving reality directly when in actuality they are only perceiving representations of reality. The data structures and transport mechanisms of the data are \"transparent\" so that people can introspect on their representations of perceptions, but cannot introspect on the data or mechanisms themselves. These systemic representational experiences are then connected by subjective experience to generate the phenomenal property of selfhood. Subjective experience is the result of the phenomenal model of intentionality relationship (PMIR). The PMIR is a \" conscious mental model, and its content is an ongoing, episodic subject-object relation \" . The model is a result of the combination of a unique set of sensory receptors that acquire input, a unique set of experiences that shape connections within the brain, and unique positions in space that give a person's perception perspectivalness. Category: Cognitive modeling Category: Consciousness studies Category:Theory of mind Category:Subjective experience Category:Metaphysics of mi", "edit_actions": [{"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 46, "end_char_pos": 47}, {"type": "R", "before": "future-", "after": "future\u2014", "start_char_pos": 164, "end_char_pos": 171}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 255, "end_char_pos": 256}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 395, "end_char_pos": 396}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 464, "end_char_pos": 465}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 545, "end_char_pos": 546}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 608, "end_char_pos": 609}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 784, "end_char_pos": 785}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 817, "end_char_pos": 818}, {"type": "R", "before": "first person", "after": "first-person", "start_char_pos": 1018, "end_char_pos": 1030}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1050, "end_char_pos": 1051}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1229, "end_char_pos": 1230}, {"type": "R", "before": "our perceived objectsand ourselves. We", "after": "self and to perceived objects.", "start_char_pos": 1608, "end_char_pos": 1646}, {"type": "A", "before": null, "after": "People", "start_char_pos": 1647, "end_char_pos": 1647}, {"type": "R", "before": "we", "after": "they", "start_char_pos": 1706, "end_char_pos": 1708}, {"type": "R", "before": "we", "after": "they", "start_char_pos": 1759, "end_char_pos": 1761}, {"type": "R", "before": "\u201ctransparent\u201d so that we", "after": "\"transparent\" so that people", "start_char_pos": 1871, "end_char_pos": 1895}, {"type": "R", "before": "our", "after": "their", "start_char_pos": 1914, "end_char_pos": 1917}, {"type": "R", "before": "Phenomenal Model of Intentionality Relationship", "after": "phenomenal model of intentionality relationship", "start_char_pos": 2190, "end_char_pos": 2237}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 2260, "end_char_pos": 2261}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2350, "end_char_pos": 2351}, {"type": "R", "before": "our", "after": "a", "start_char_pos": 2398, "end_char_pos": 2401}, {"type": "R", "before": "our", "after": "a", "start_char_pos": 2454, "end_char_pos": 2457}, {"type": "D", "before": "our", "after": null, "start_char_pos": 2529, "end_char_pos": 2532}, {"type": "R", "before": "our", "after": "a person's", "start_char_pos": 2569, "end_char_pos": 2572}, {"type": "A", "before": null, "after": "Cognitive modeling Category:", "start_char_pos": 2612, "end_char_pos": 2612}, {"type": "D", "before": "Category:Specific models", "after": null, "start_char_pos": 2690, "end_char_pos": 2714}], "sents_char_pos": [0, 371, 491, 731, 853, 995, 1380, 1525, 1643, 1809, 2009, 2146, 2245, 2601]}
+{"doc_id": "2198160", "revision_depth": "1", "before_revision": "20th century Year Date Event 1901 1 January Singapore-Kranji Railway officially opened to the public. 5 November Sir Frank Swettenham was appointed as the Governor of the Straits Settlements. 1904 16 April Sir John Anderson was appointed as the Governor of the Straits Settlements. 1905 1 June Singapore change its time zone to GMT+07:00 from the original GMT+6hr 55m 25s. 1906 18 November Tao Nan School was established. The Nanyang branch of Tongmenghui was set up in Singapore. 1910 12 March Anderson Bridge was official opened by Governor Sir John Anderson. 1911 2 September Sir Arthur Young was appointed as the Governor of the Straits Settlements. 1913 1 July The Singapore Harbour board was set up. 1915 15 \u2013 25 February The Singapore Mutiny occurred as British Muslim Indian sepoys rose up against the British. 1917 15 August Nanyang Girls' High School was established by Tan Chor Nam and Teo Eng Hock, partially due to Dr Sun Yat Sen's belief in education for girls, in Dhoby Ghaut. 14 June Nan Hua High School [as Nam Wah Girls' School] established by Mr Xiong Shangfu, its campus in Coleman Street, and it was once a base for the Japanese soldiers during the Japanese occupation. 1919 21 March The Chinese High School established by Tan Kah Kee at 15 Niven Road. 1920 17 February Sir Laurence Guillemard was appointed as the Governor of the Straits Settlements. 1923 Singapore starts constructing the main British naval base in East Asia. 1924 28 June Singapore-Johor Causeway officially opens. 1927 3 June Sir Hugh Clifford was appointed as the Governor of the Straits Settlements. 1929 Singapore Police Academy was established at Mount Pleasant Road. 1930 5 February Sir Cecil Clementi was appointed as the Governor of the Straits Settlements. 1932 15 January Tanjong Pagar Railway Station commenced operation. Jalan Besar Stadium open to the public. 1933 1 January Singapore change its time zone to GMT+07:20. 16 January CHIJ Saint Nicholas Girls' School, Singapore's only bilingual and bicultural IJ school, was founded. 1934 9 November Sir Shenton Thomas was appointed as the Governor of the Straits Settlements. 1935 Catholic High School was established. 1937 12 June Kallang Airport was opened. 1938 British Military Hospital, predecessor of Alexandra Hospital was established. Singapore completes the main British naval base, which is the largest drydock and third largest floating dock in the world. 1939 24 January Chung Cheng High School (Main) was established in Kim Yam Road. 1940 July British Military Hospital at Alexandra Road was officially open. 1941 1 September Singapore change its time zone to GMT+07:30. 7 \u2013 8 December In an extensive three-pronged attack, Japan opens hostilities with the countries that opposed the Axis powers and their colonies. First air raid on Singapore at 4:15 am. The Imperial Japanese Army invades Malaya. 10 December The British battleship HMS Prince of Wales and battlecruiser HMS Repulse are sunk by Japanese bombers. 16 December Second air raid on Singapore, at night. Only RAF Tengah is attacked. 25 December A lone Japanese aircraft drops propaganda pamphlets on Singapore Island. 29 December Second Japanese air raid on Singapore City (and third on the island), at night. Nightly raids commence. 30 December The Overseas Chinese Mobilization Council is set up in Singapore, led by Tan Kah Kee. 1942 12 January First major daylight air raid on Singapore. Henceforth, the island is bombed everyday up to the British surrender (with the exception of 19 January). 31 January Malaya falls to the Japanese and the Causeway is blown up to delay Japan's advancement to Singapore. 1 February The siege of Singapore begins. The Japanese in Johor Bahru begin shelling the island daily in addition to daily aerial bombing. 8 February The Japanese cross the Strait of Johor by inflatable boats and landed in Singapore during the Battle of Singapore. 11 February The Japanese and Allied soldiers fight fiercely at Bukit Timah. 13 February The Malay regiment, led by Lt. Adnan bin Saidi, fight bravely against the Japanese at Pasir Panjang Ridge in the Battle of Pasir Panjang. 14 February The Japanese have captured most of Singapore, and most of the population is crammed into the city centre. 15 February The British surrenders and the Japanese Occupation of Singapore starts. Singapore is renamed Syonan-to (Light of the South Island). Singapore change its time zone to GMT+09:00 to be the same as Japan. 18 February \u2013 4 March The Japanese military police, the Kempei Tai kills an estimated 25,000 to 50,000 people during Sook Ching Massacre. 1943 27 September Operation Jaywick occurred. Seven Japanese ships are bombed at Clifford Pier. 10 October The Japanese initiate the Double Tenth Incident in response to Operation Jaywick, by launching a fierce crackdown on anti-Japanese elements and Allied prisoners-of-war in Singapore. 1944 27 March Lim Bo Seng is captured by the Japanese, and dies after 3 months of torture. 1945 14 August Japan surrenders, and there is anomie and looting for nearly a month when the British do not return immediately. 5 September The British return to Singapore after the end of World War II and begin the British Military Administration of the Straits Settlements under the command of Lord Louis Mountbatten. 12 September Singapore revert its time zone back to the pre-war time of GMT+07:30. 1946 1 April The Straits Settlements is dissolved and Singapore becomes a separate crown colony. The Legislative Council of the Colony of Singapore was formed. Sir Franklin Charles Gimson was appointed as the Governor of the Singapore. 1947 A large number of strikes occur causing stoppages in public transport, public services and the harbour. May Severe food shortage leads to record-low rice ration, causing malnutrition, disease and outbreak of crime and violence. 1948 20 March Singapore's first \"limited elections\" held (representation with no specific areas of responsibility); 6 seats in Legislative Council, with Singapore Progressive Party winning 3 seats. 24 June Rubber plantations and tin mines in Malaya are destroyed by communists, and the British declares the state of Emergency over Singapore and Malaya. The emergency was officially lifted on 31 July 1960 by the Malayan government. 1949 The University of Malaya is formed following the merger of Raffles College and King Edward Medical College. 1950 11 \u2013 13 December 18 people are killed during the Maria Hertogh riots. 1951 10 April The number of elected seats is increased to 9 in the second election. 1952 20 March Wilfred Lawson Blythe was appointed as the Acting Governor of the Singapore. 21 April Sir John Fearns Nicoll was appointed as the Governor of the Singapore. 1953 Rendel Commission is appointed to make recommendations for Singapore's self-government. 1954 13 May Chinese school students demonstrate against the British due to the National Service proposal. See Anti-National Service Riots 1955 2 April Second general elections (limited self-government) held. The Labour Front wins the most seats and David Saul Marshall became the first Chief Minister of Singapore. 12 May Four people are killed during the Hock Lee bus riots. 2 June William Goode was appointed as the Acting Governor of the Singapore. 30 June Sir Robert Black was appointed as the Governor of the Singapore. 20 August Kallang Airport ceased operation. Paya Lebar Airport started operation. 1956 7 June David Marshall appeals to the United Kingdom for full self-government, but resigns when he fails. Lim Yew Hock takes over as Chief Minister. 10 October Riots by pro-communist Chinese school students occur when government closes down a student union on 24 September 1956. 14 October Dunman High School (formally known as Singapore Government Chinese Middle School), became the first Chinese secondary school established by the government. 1957 Cedar Girls' Secondary School was founded. 9 December Sir William Goode was appointed as the Governor of the Singapore. 1959 March Lim Yew Hock successfully gains full self-government for Singapore. 30 May 3rd general elections (limited self-government) held. People's Action Party wins 43 of 51 seats and Lee Kuan Yew became the first Prime Minister. 3 June A celebration is held at the Padang for Singapore gaining full self-government. Sir William Goode becomes the Yang di-Pertuan Negara of Singapore. 3 December The national anthem Majulah Singapura, written by Zubir Said, is presented. Encik Yusof bin Ishak becomes the Yang di-Pertuan Negara of Singapore. 1960 1 February The Housing and Development Board is set up. 8 September Tan Howe Liang became Singapore's first Olympic medalist. He finished second among 35 competitors in the lightweight category in weightlifting at the 1960 games held in Rome, Italy. 1961 25 May The Bukit Ho Swee Fire kills four people and destroys 2,200 attap houses. 27 May Tunku Abdul Rahman, the Prime Minister of Malaya, proposes a merger between Singapore, Malaya, Sabah and Sarawak. 1962 1 September A referendum is held in Singapore to vote on merger with Malaysia. 1963 2 February During Operation Coldstore, 107 left-wing politicians and trade unionists are arrested by Internal Security Department 9 July The Malaysia Agreement is signed between leaders of Malaya, Singapore, Sabah and Sarawak. 31 August In this Malaysia Solidarity Day, Lee Kuan Yew declares de facto Independence for Singapore. 16 September Malaysia is formed. Indonesia carries out its konfrontasi campaign. Encik Yusof bin Ishak becomes the Yang di-Pertuan Negara of Singapura. 21 September The PAP wins the 1963 State Elections, defeating the Barisan Sosialis and UMNO. 1964 25 April The PAP wins one seat in the Malaysian Federal Election. UMNO is outraged. 21 July There is an ethnic riot between various Malays and Chinese, on Prophet Muhammad's birthday, 23 people are killed. 1965 10 March Indonesian saboteurs carry out the MacDonald House bombing, killing three people. May Lee Kuan Yew begins campaigning for a Malaysian Malaysia 7 August Singapore and Malaysia sign the separation agreement. 9 August The Malaysian Parliament votes to expel Singapore from the Federation; Singapore becomes independent after separating from Malaysia. 21 September Singapore is admitted into the United Nations as the 117th member. 15 October Singapore becomes the 23rd member of the Commonwealth. 22 December Constitutional Amendment Act is passed and Encik Yusof bin Ishak becomes the first President of Singapore. 1966 3 August Singapore became the 104th member of the International Monetary Fund (IMF) and the World Bank. 24 August The first daily recitation of the pledge of allegiance before the national flag was taken by 500,000 students at all 529 government and aided schools. 1967 The Civilian Memorial is unveiled at the Kranji War Cemetery 14 March The National Service bill is passed in the parliament. 28 March \u2013 18 April Registrations for national service begins at the Central Manpower Base. 12 June The issue of the first Singapore Dollar. 8 August Singapore joined the Association of Southeast Asian Nations (ASEAN) as one of the founding members. 17 August The first batch of the army is drafted for national service. 1968 January Britain announces its intention to withdraw its armed forces from Singapore. 19 April The PAP wins all seats in the 1968 General Election, which is boycotted by Barisan Sosialis. National Archives was established. 1969 20 January The National Junior College, Singapore's first junior college was established. 31 May The 1969 Race Riots of Singapore broke out after growing tension of the 13 May Incident in Malaysia spilled over to Singapore. 1970 23 November Encik Yusof bin Ishak, first President of Singapore died while in office. 1971 2 January Dr Benjamin Henry Sheares becomes the second President of Singapore. 31 October The last British military forces withdraws from Singapore. 1972 2 September The PAP wins the 1972 General Election. 1 October The Singapore Airlines is formed. 1973 4 February The first Chingay Parade is held in Singapore. 14 July The Presidential Council for Minority Rights is set up to ensure minority would not be discriminated. 21 July The construction of the National Stadium is completed and open in Kallang. The construction of Jurong Town Hall is completed. 1974 15 January Hwa Chong Junior College, Singapore's first government-aided junior college was established. 31 January Laju incident: Japanese Red Army bombs petroleum tanks at Pulau Bukom and hijacks a ferry boat. 1976 23 December The PAP wins all 69 seats in the 1976 General Election. 1978 12 October Spyros disaster, was a major industrial disaster which claimed 76 lives. 1979 1 June First National Courtesy Campaign was launched. Singapore becomes the world's second busiest port in terms of shipping tonnage. 1980 23 December The PAP wins all 75 seats in the 1980 General Election. 1981 12 May Dr Benjamin Henry Sheares (second President of Singapore) died while in office. 1 July Paya Lebar Airport ceased operation and Singapore Changi Airport starts operation. 23 October C V Devan Nair becomes the third President of Singapore. 31 October Workers' Party of Singapore's Joshua Benjamin Jeyaretnam elected into Parliament, breaking a 16 years PAP monopoly of the House. 1982 1 January Singapore change its time zone to UTC+08:00. The Civil Defence Programme are launched. 1983 29 January (Singapore Cable Car disaster) Eniwetok, a Panamanian-registered oil rig, hits the Singapore Cable Car system, sending two cabins plunging into the sea and killing seven people. 1984 22 August Non-Constituency Member of Parliament was introduced. 22 December The PAP wins the 1984 General Election while two members of the opposition parties are elected as members of parliament. Three PAP women MPs are also elected, ending a 16 years absence of women representation in Parliament. 1985 28 March C V Devan Nair stepped down as the third President of Singapore. 2 September Wee Kim Wee becomes the fourth President of Singapore. Singapore went into its first ever recession which was induced by government policies. 1986 15 March Hotel New World collapses, killing 33 people and injuring 17 others. 1987 21 May 16 people were arrested during Operation Spectrum and detained under the Internal Security Act. Another six were arrested on 20 June. 1988 3 September The PAP wins the 1988 General Election and group representation constituencies (GRC)s are introduced. 1990 6 July The East West Line of the Mass Rapid Transit (MRT) is completed. 22 November Singapore Changi Airport Terminal 2 begins operation. 28 November Goh Chok Tong becomes the second Prime Minister of Singapore. 1991 26 March Four Pakistanis hijack Singapore Airlines Flight 117 and demand the release of Pakistan Peoples Party members from Pakistani jails. 27 March Members of the Singapore Special Operations Force storm into Singapore Airlines Flight 117, killing all hijackers and freeing all passengers and crew members. 31 August General elections are held. The result is a victory for the PAP, which wins 77 out of 81 seats.1993 August National Archives of Singapore was formed. 1 September Ong Teng Cheong becomes the first elected President and fifth President of Singapore. 1994 5 May American teenager Michael P. Fay is convicted and caned for vandalism. 1996 The parliament passes the Maintenance of Parents law, a private member's bill introduced by Nominated Member of Parliament Woon Cheong Ming Walter. 1997 2 January PAP led by Goh Chok Tong wins a total of 81 out of 83 seats in the 1997 general election. 19 December Silkair Flight 185 crashes into Musi River near Palembang, Sumatra, killing all 104 people on board. 1998 15 January Singapore and United States announces agreement for US ships to use a planned $35 million naval base from 2000. September \"The Singapore Story\", the first volume of Lee Kuan Yew's memoirs is published. () 1999 1 September S.R. Nathan becomes the sixth President of Singapore. Singapore slips into recession during the Asian financial crisis. 2000 1 September Speaker's Corner is launched at Hong Lim Park. 31 October Singapore Airlines Flight 006 crashes during take-off in Chiang Kai Shek International Airport, killing 83 people. \"From Third World to First, The Singapore Story 1965-2000\" the second volume of Lee Kuan Yew's memoirs is published. () 21st century Year Date Event 2001 Economic recession in Singapore. (to 2003) January A pipeline feeding gas to Singapore from Indonesia's Natuna field in South China Sea opens. 3 November The PAP wins 82 of 84 seats in the 2001 General Election. 9 December 15 suspected militants of Jemaah Islamiah are arrested for alleged bomb plot. 27 December Tropical Storm Vamei, a rare tropic storm that occurs only once in 100 to 400 years, hits Singapore. 2002 13 January Singapore and Japan sign the Japan-Singapore Economic Agreement. 12 October The Esplanade \u2013 Theatres on the Bay officially opened as Singapore's major performing arts centre. 2003 1 March - 16 July SARS virus outbreak in Singapore. 6 May Singapore and United States sign the United States-Singapore Free Trade Agreement (USS-FTA). 29 October A major research center Biopolis opens. 2004 20 April A section of Nicoll Highway collapses, killing 4 people. 12 August Lee Hsien Loong, Lee Kuan Yew's son becomes the third Prime Minister. December National Service was reduced from two and half years to two years. 2005 15 January Singapore and Malaysia settle dispute over land reclamation work. 18 April The government approves the plan to legalise casino-gambling and build two Integrated Resorts. 8 July In the aftermath of 7 July 2005 \u2013 London bombings, Transport Minister Yeo Cheow Tong announces plan to set up a new Police MRT Unit to enhance the security of Singapore's public transport. (CNA) 17 August S R Nathan returns for his second term as President, following a walkover in the 2005 Singapore presidential election. 27 August White Elephant Incident at Buangkok MRT station. 31 December Singapore Police Academy ceased operational. Home Team Academy replaces the Police Academy and went operational on the following day at Old Choa Chu Kang Road.2006 6 May The PAP, led by Lee Hsien Loong, wins 82 of 84 seats in the General Election. 26 March Singapore Changi Airport opens the Budget Terminal.2007 20 May The Marina Bay Floating Platform was opened.30 June The Former National Stadium was closed for re-construction. 2008 9 January Singapore Changi Airport opens its third passenger terminal. 21 February The International Olympic Committee (IOC) awards the Youth Olympic Games hosting rights to Singapore ahead of Moscow by a vote of 53 to 44. 27 February Jemiah Islamiah terrorist head Mas Selamat bin Kastari escapes from prison. September Singapore slips into recession due to the global financial crisis. World economies hit badly; banks around the world collapse. 16 October Singapore government guarantees all local and foreign currency fixed deposits with a $ 150 billion pool for that in view of the financial crisis, joining governments around the world in doing so. 2011 7 May PAP loses its grip on Aljunied Group Representation Constituency to the Workers' Party in the General Election. This is the first time an opposition party has captured a GRC since the inception of this scheme in 1988. 1 July Tanjong Pagar Railway Station ceased operation and to be reserved as the Singapore Railway Museum. 27 August Singaporeans, for the first time since the establishment of Presidential Election, will be voting for the next President after the 6th President of Singapore \u2013 SR Nathan stepped down on 31 August 2011. The candidates involves in this election includes \u2013 Dr Tan Keng Yam Tony, Mr Tan Jee Say, Mr Tan Kin Lian and Dr. Tan Cheng Bock. 1 September Dr Tan Keng Yam Tony is sworn as the seventh President of Singapore. 2012 25 September Singapore Changi Airport closes The Budget Terminal to make way for the construction of future Singapore Changi Airport Terminal 4. 2013 16 February More than 3000 Singaporeans gathered at the Speakers' Corner, Singapore at Hong Lim Park for a non-partisan protest against the government's Population White Paper which projected a possible 6.9 million people in Singapore by 2030. 24 June Haze in Singapore reaches 401 PSI, the worst in Singapore history. 8 December The 2013 Little India riot took place after a fatal accident occurred at the junction of Race Course Road and Hampshire Road in Little India, Singapore. 2014 12 January Beginning construction of the new Thomson-East Coast MRT Line (Thomson stretch) consisting of 31 new stations (including 7 interchanges). 30 June The new National Stadium re-opened to the public after re-construction. 2015 23 March Lee Kuan Yew passes away. Singapore enters a one-week mourning period. 30 June Ng Teng Fong General Hospital commences operation. 22 July Jurong Community Hospital commences operation. 9 August Singapore turns 50. 2016 21 July Beginning construction of the new Thomson-East Coast MRT Line (East Coast stretch). 22 August S R Nathan passes away. Singapore enters a one-week mourning period. 2017 11 February Nearly 300 year old Tembusu tree at Singapore Botanic Gardens falls, killing one and injured 4 others. 17 April Othman Wok passes away. Singapore enters a one-week mourning period. 13\u201314 September Halimah Yacob is elected as the first female president and eighth President of Singapore. 31 October Singapore Changi Airport opens its fourth passenger terminal .2018 12 June Singapore hosted the Singapore Summit, a summit meeting between North Korea and United States leaders. 18 August Sengkang General Hospital opened to public. 19 November A new passenger terminal in Seletar Airport opened, replacing the old building .2019 28 January Singapore celebrates the 200th Anniversary of the foundation of modern Singapore by Stamford Raffles .17 April Jewel Changi Airport opens after a week-long preview .2020 23 January The first COVID-19 case in Singapore was confirmed involving a 66-year-old Chinese national from Wuhan. ", "after_revision": "20th century Year Date Event 1901 1 January Singapore-Kranji Railway officially opened to the public. 5 November Sir Frank Swettenham was appointed as the Governor of the Straits Settlements. 1904 16 April Sir John Anderson was appointed as the Governor of the Straits Settlements. 1905 1 June Singapore change its time zone to GMT+07:00 from the original GMT+6hr 55m 25s. 1906 18 November Tao Nan School was established. The Nanyang branch of Tongmenghui was set up in Singapore. 1910 12 March Anderson Bridge was official opened by Governor Sir John Anderson. 1911 2 September Sir Arthur Young was appointed as the Governor of the Straits Settlements. 1913 1 July The Singapore Harbour board was set up. 1915 15 \u2013 25 February The Singapore Mutiny occurred as British Muslim Indian sepoys rose up against the British. 1917 15 August Nanyang Girls' High School was established by Tan Chor Nam and Teo Eng Hock, partially due to Dr Sun Yat Sen's belief in education for girls, in Dhoby Ghaut. 14 June Nan Hua High School [as Nam Wah Girls' School] established by Mr Xiong Shangfu, its campus in Coleman Street, and it was once a base for the Japanese soldiers during the Japanese occupation. 1919 21 March The Chinese High School established by Tan Kah Kee at 15 Niven Road. 1920 17 February Sir Laurence Guillemard was appointed as the Governor of the Straits Settlements. 1923 Singapore starts constructing the main British naval base in East Asia. 1924 28 June Singapore-Johor Causeway officially opens. 1927 3 June Sir Hugh Clifford was appointed as the Governor of the Straits Settlements. 1929 Singapore Police Academy was established at Mount Pleasant Road. 1930 5 February Sir Cecil Clementi was appointed as the Governor of the Straits Settlements. 1932 15 January Tanjong Pagar Railway Station commenced operation. Jalan Besar Stadium open to the public. 1933 1 January Singapore change its time zone to GMT+07:20. 16 January CHIJ Saint Nicholas Girls' School, Singapore's only bilingual and bicultural IJ school, was founded. 1934 9 November Sir Shenton Thomas was appointed as the Governor of the Straits Settlements. 1935 Catholic High School was established. 1937 12 June Kallang Airport was opened. 1938 British Military Hospital, predecessor of Alexandra Hospital was established. Singapore completes the main British naval base, which is the largest drydock and third largest floating dock in the world. 1939 24 January Chung Cheng High School (Main) was established in Kim Yam Road. 1940 July British Military Hospital at Alexandra Road was officially open. 1941 1 September Singapore change its time zone to GMT+07:30. 7 \u2013 8 December In an extensive three-pronged attack, Japan opens hostilities with the countries that opposed the Axis powers and their colonies. First air raid on Singapore at 4:15 am. The Imperial Japanese Army invades Malaya. 10 December The British battleship HMS Prince of Wales and battlecruiser HMS Repulse are sunk by Japanese bombers. 16 December Second air raid on Singapore, at night. Only RAF Tengah is attacked. 25 December A lone Japanese aircraft drops propaganda pamphlets on Singapore Island. 29 December Second Japanese air raid on Singapore City (and third on the island), at night. Nightly raids commence. 30 December The Overseas Chinese Mobilization Council is set up in Singapore, led by Tan Kah Kee. 1942 12 January First major daylight air raid on Singapore. Henceforth, the island is bombed everyday up to the British surrender (with the exception of 19 January). 31 January Malaya falls to the Japanese and the Causeway is blown up to delay Japan's advancement to Singapore. 1 February The siege of Singapore begins. The Japanese in Johor Bahru begin shelling the island daily in addition to daily aerial bombing. 8 February The Japanese cross the Strait of Johor by inflatable boats and landed in Singapore during the Battle of Singapore. 11 February The Japanese and Allied soldiers fight fiercely at Bukit Timah. 13 February The Malay regiment, led by Lt. Adnan bin Saidi, fight bravely against the Japanese at Pasir Panjang Ridge in the Battle of Pasir Panjang. 14 February The Japanese have captured most of Singapore, and most of the population is crammed into the city centre. 15 February The British surrenders and the Japanese Occupation of Singapore starts. Singapore is renamed Syonan-to (Light of the South Island). Singapore change its time zone to GMT+09:00 to be the same as Japan. 18 February \u2013 4 March The Japanese military police, the Kempei Tai kills an estimated 25,000 to 50,000 people during Sook Ching Massacre. 1943 27 September Operation Jaywick occurred. Seven Japanese ships are bombed at Clifford Pier. 10 October The Japanese initiate the Double Tenth Incident in response to Operation Jaywick, by launching a fierce crackdown on anti-Japanese elements and Allied prisoners-of-war in Singapore. 1944 27 March Lim Bo Seng is captured by the Japanese, and dies after 3 months of torture. 1945 14 August Japan surrenders, and there is anomie and looting for nearly a month when the British do not return immediately. 5 September The British return to Singapore after the end of World War II and begin the British Military Administration of the Straits Settlements under the command of Lord Louis Mountbatten. 12 September Singapore revert its time zone back to the pre-war time of GMT+07:30. 1946 1 April The Straits Settlements is dissolved and Singapore becomes a separate crown colony. The Legislative Council of the Colony of Singapore was formed. Sir Franklin Charles Gimson was appointed as the Governor of the Singapore. 1947 A large number of strikes occur causing stoppages in public transport, public services and the harbour. May Severe food shortage leads to record-low rice ration, causing malnutrition, disease and outbreak of crime and violence. 1948 20 March Singapore's first \"limited elections\" held (representation with no specific areas of responsibility); 6 seats in Legislative Council, with Singapore Progressive Party winning 3 seats. 24 June Rubber plantations and tin mines in Malaya are destroyed by communists, and the British declares the state of Emergency over Singapore and Malaya. The emergency was officially lifted on 31 July 1960 by the Malayan government. 1949 The University of Malaya is formed following the merger of Raffles College and King Edward Medical College. 1950 11 \u2013 13 December 18 people are killed during the Maria Hertogh riots. 1951 10 April The number of elected seats is increased to 9 in the second election. 1952 20 March Wilfred Lawson Blythe was appointed as the Acting Governor of the Singapore. 21 April Sir John Fearns Nicoll was appointed as the Governor of the Singapore. 1953 Rendel Commission is appointed to make recommendations for Singapore's self-government. 1954 13 May Chinese school students demonstrate against the British due to the National Service proposal. See Anti-National Service Riots 1955 2 April Second general elections (limited self-government) held. The Labour Front wins the most seats and David Saul Marshall became the first Chief Minister of Singapore. 12 May Four people are killed during the Hock Lee bus riots. 2 June William Goode was appointed as the Acting Governor of the Singapore. 30 June Sir Robert Black was appointed as the Governor of the Singapore. 20 August Kallang Airport ceased operation. Paya Lebar Airport started operation. 1956 7 June David Marshall appeals to the United Kingdom for full self-government, but resigns when he fails. Lim Yew Hock takes over as Chief Minister. 10 October Riots by pro-communist Chinese school students occur when government closes down a student union on 24 September 1956. 14 October Dunman High School (formally known as Singapore Government Chinese Middle School), became the first Chinese secondary school established by the government. 1957 Cedar Girls' Secondary School was founded. 9 December Sir William Goode was appointed as the Governor of the Singapore. 1959 March Lim Yew Hock successfully gains full self-government for Singapore. 30 May 3rd general elections (limited self-government) held. People's Action Party wins 43 of 51 seats and Lee Kuan Yew became the first Prime Minister. 3 June A celebration is held at the Padang for Singapore gaining full self-government. Sir William Goode becomes the Yang di-Pertuan Negara of Singapore. 3 December The national anthem Majulah Singapura, written by Zubir Said, is presented. Encik Yusof bin Ishak becomes the Yang di-Pertuan Negara of Singapore. 1960 1 February The Housing and Development Board is set up. 8 September Tan Howe Liang became Singapore's first Olympic medalist. He finished second among 35 competitors in the lightweight category in weightlifting at the 1960 games held in Rome, Italy. 1961 25 May The Bukit Ho Swee Fire kills four people and destroys 2,200 attap houses. 27 May Tunku Abdul Rahman, the Prime Minister of Malaya, proposes a merger between Singapore, Malaya, Sabah and Sarawak. 1962 1 September A referendum is held in Singapore to vote on merger with Malaysia. 1963 2 February During Operation Coldstore, 107 left-wing politicians and trade unionists are arrested by Internal Security Department 9 July The Malaysia Agreement is signed between leaders of Malaya, Singapore, Sabah and Sarawak. 31 August In this Malaysia Solidarity Day, Lee Kuan Yew declares de facto Independence for Singapore. 16 September Malaysia is formed. Indonesia carries out its konfrontasi campaign. Encik Yusof bin Ishak becomes the Yang di-Pertuan Negara of Singapura. 21 September The PAP wins the 1963 State Elections, defeating the Barisan Sosialis and UMNO. 1964 25 April The PAP wins one seat in the Malaysian Federal Election. UMNO is outraged. 21 July There is an ethnic riot between various Malays and Chinese, on Prophet Muhammad's birthday, 23 people are killed. 1965 10 March Indonesian saboteurs carry out the MacDonald House bombing, killing three people. May Lee Kuan Yew begins campaigning for a Malaysian Malaysia 7 August Singapore and Malaysia sign the separation agreement. 9 August The Malaysian Parliament votes to expel Singapore from the Federation; Singapore becomes independent after separating from Malaysia. 21 September Singapore is admitted into the United Nations as the 117th member. 15 October Singapore becomes the 23rd member of the Commonwealth. 22 December Constitutional Amendment Act is passed and Encik Yusof bin Ishak becomes the first President of Singapore. 1966 3 August Singapore became the 104th member of the International Monetary Fund (IMF) and the World Bank. 24 August The first daily recitation of the pledge of allegiance before the national flag was taken by 500,000 students at all 529 government and aided schools. 1967 The Civilian Memorial is unveiled at the Kranji War Cemetery 14 March The National Service bill is passed in the parliament. 28 March \u2013 18 April Registrations for national service begins at the Central Manpower Base. 12 June The issue of the first Singapore Dollar. 8 August Singapore joined the Association of Southeast Asian Nations (ASEAN) as one of the founding members. 17 August The first batch of the army is drafted for national service. 1968 January Britain announces its intention to withdraw its armed forces from Singapore. 19 April The PAP wins all seats in the 1968 General Election, which is boycotted by Barisan Sosialis. National Archives was established. 1969 20 January The National Junior College, Singapore's first junior college was established. 31 May The 1969 Race Riots of Singapore broke out after growing tension of the 13 May Incident in Malaysia spilled over to Singapore. 1970 23 November Encik Yusof bin Ishak, first President of Singapore died while in office. 1971 2 January Dr Benjamin Henry Sheares becomes the second President of Singapore. 31 October The last British military forces withdraws from Singapore. 1972 2 September The PAP wins the 1972 General Election. 1 October The Singapore Airlines is formed. 1973 4 February The first Chingay Parade is held in Singapore. 14 July The Presidential Council for Minority Rights is set up to ensure minority would not be discriminated. 21 July The construction of the National Stadium is completed and open in Kallang. The construction of Jurong Town Hall is completed. 1974 15 January Hwa Chong Junior College, Singapore's first government-aided junior college was established. 31 January Laju incident: Japanese Red Army bombs petroleum tanks at Pulau Bukom and hijacks a ferry boat. 1976 23 December The PAP wins all 69 seats in the 1976 General Election. 1978 12 October Spyros disaster, was a major industrial disaster which claimed 76 lives. 1979 1 June First National Courtesy Campaign was launched. Singapore becomes the world's second busiest port in terms of shipping tonnage. 1980 23 December The PAP wins all 75 seats in the 1980 General Election. 1981 12 May Dr Benjamin Henry Sheares (second President of Singapore) died while in office. 1 July Paya Lebar Airport ceased operation and Singapore Changi Airport starts operation. 23 October C V Devan Nair becomes the third President of Singapore. 31 October Workers' Party of Singapore's Joshua Benjamin Jeyaretnam elected into Parliament, breaking a 16 years PAP monopoly of the House. 1982 1 January Singapore change its time zone to UTC+08:00. The Civil Defence Programme are launched. 1983 29 January (Singapore Cable Car disaster) Eniwetok, a Panamanian-registered oil rig, hits the Singapore Cable Car system, sending two cabins plunging into the sea and killing seven people. 1984 22 August Non-Constituency Member of Parliament was introduced. 22 December The PAP wins the 1984 General Election while two members of the opposition parties are elected as members of parliament. Three PAP women MPs are also elected, ending a 16 years absence of women representation in Parliament. 1985 28 March C V Devan Nair stepped down as the third President of Singapore. 2 September Wee Kim Wee becomes the fourth President of Singapore. Singapore went into its first ever recession which was induced by government policies. 1986 15 March Hotel New World collapses, killing 33 people and injuring 17 others. 1987 21 May 16 people were arrested during Operation Spectrum and detained under the Internal Security Act. Another six were arrested on 20 June. 1988 3 September The PAP wins the 1988 General Election and group representation constituencies (GRC)s are introduced. 1990 6 July The East West Line of the Mass Rapid Transit (MRT) is completed. 22 November Singapore Changi Airport Terminal 2 begins operation. 28 November Goh Chok Tong becomes the second Prime Minister of Singapore. 1991 26 March Four Pakistanis hijack Singapore Airlines Flight 117 and demand the release of Pakistan Peoples Party members from Pakistani jails. 27 March Members of the Singapore Special Operations Force storm into Singapore Airlines Flight 117, killing all hijackers and freeing all passengers and crew members. 31 August General elections are held. The result is a victory for the PAP, which wins 77 out of 81 seats.1993 August National Archives of Singapore was formed. 1 September Ong Teng Cheong becomes the first elected President and fifth President of Singapore. 1994 5 May American teenager Michael P. Fay is convicted and caned for vandalism. 1996 The parliament passes the Maintenance of Parents law, a private member's bill introduced by Nominated Member of Parliament Woon Cheong Ming Walter. 1997 2 January PAP led by Goh Chok Tong wins a total of 81 out of 83 seats in the 1997 general election. 19 December Silkair Flight 185 crashes into Musi River near Palembang, Sumatra, killing all 104 people on board. 1998 15 January Singapore and United States announces agreement for US ships to use a planned $35 million naval base from 2000. September \"The Singapore Story\", the first volume of Lee Kuan Yew's memoirs is published. () 1999 1 September S.R. Nathan becomes the sixth President of Singapore. Singapore slips into recession during the Asian financial crisis. 2000 1 September Speaker's Corner is launched at Hong Lim Park. 31 October Singapore Airlines Flight 006 crashes during take-off in Chiang Kai Shek International Airport, killing 83 people. \"From Third World to First, The Singapore Story 1965-2000\" the second volume of Lee Kuan Yew's memoirs is published. () 21st century {| class=wikitable style=width:100\\% |- ! style=\"width:6\\%\" | Year || style=\"width:10\\%\" | Date || Event |- | rowspan=5 style=vertical-align:top| 2001 || || Economic recession in Singapore. (to 2003) |- | January || A pipeline feeding gas to Singapore from Indonesia's Natuna field in South China Sea opens. |- | 3 November || The PAP wins 82 of 84 seats in the 2001 General Election. |- | 9 December || 15 suspected militants of Jemaah Islamiah are arrested for alleged bomb plot. |- | 27 December || Tropical Storm Vamei, a rare tropic storm that occurs only once in 100 to 400 years, hits Singapore. |- | rowspan=2 style=vertical-align:top| 2002 || 13 January || Singapore and Japan sign the Japan-Singapore Economic Agreement. |- | 12 October || The Esplanade \u2013 Theatres on the Bay officially opened as Singapore's major performing arts centre. |- | rowspan=3 style=vertical-align:top| 2003 || 1 March - 16 July || SARS virus outbreak in Singapore. |- | 6 May || Singapore and United States sign the United States-Singapore Free Trade Agreement (USS-FTA). |- | 29 October || A major research center Biopolis opens. |- | rowspan=3 style=vertical-align:top| 2004 || 20 April || A section of Nicoll Highway collapses, killing 4 people. |- | 12 August || Lee Hsien Loong, Lee Kuan Yew's son becomes the third Prime Minister. |- | December || National Service was reduced from two and half years to two years. |- | rowspan=6 style=vertical-align:top| 2005 || 15 January || Singapore and Malaysia settle dispute over land reclamation work. |- | 18 April || The government approves the plan to legalise casino-gambling and build two Integrated Resorts. |- | 8 July || In the aftermath of 7 July 2005 \u2013 London bombings, Transport Minister Yeo Cheow Tong announces plan to set up a new Police MRT Unit to enhance the security of Singapore's public transport. (CNA) |- | 17 August || S R Nathan returns for his second term as President, following a walkover in the 2005 Singapore presidential election. |- | 27 August || White Elephant Incident at Buangkok MRT station. |- | 31 December || Singapore Police Academy ceased operational. Home Team Academy replaces the Police Academy and went operational on the following day at Old Choa Chu Kang Road. |- | rowspan=2 style=vertical-align:top|2006 || 6 May || The PAP, led by Lee Hsien Loong, wins 82 of 84 seats in the General Election. |- | 26 March || Singapore Changi Airport opens the Budget Terminal. |- | rowspan=2 style=\"vertical-align:top;\"|2007 || 20 May || The Marina Bay Floating Platform was opened. |- |30 June || The Former National Stadium was closed for re-construction. |- | rowspan=5 style=vertical-align:top| 2008 || 9 January || Singapore Changi Airport opens its third passenger terminal. |- | 21 February || The International Olympic Committee (IOC) awards the Youth Olympic Games hosting rights to Singapore ahead of Moscow by a vote of 53 to 44. |- | 27 February || Jemiah Islamiah terrorist head Mas Selamat bin Kastari escapes from prison. |- | September || Singapore slips into recession due to the global financial crisis. World economies hit badly; banks around the world collapse. |- | 16 October || Singapore government guarantees all local and foreign currency fixed deposits with a $ 150 billion pool for that in view of the financial crisis, joining governments around the world in doing so. |- | rowspan=4 style=vertical-align:top| 2011 || 7 May || PAP loses its grip on Aljunied Group Representation Constituency to the Workers' Party in the General Election. This is the first time an opposition party has captured a GRC since the inception of this scheme in 1988. |- | 1 July || Tanjong Pagar Railway Station ceased operation and to be reserved as the Singapore Railway Museum. |- | 27 August || Singaporeans, for the first time since the establishment of Presidential Election, will be voting for the next President after the 6th President of Singapore \u2013 SR Nathan stepped down on 31 August 2011. The candidates involves in this election includes \u2013 Dr Tan Keng Yam Tony, Mr Tan Jee Say, Mr Tan Kin Lian and Dr. Tan Cheng Bock. |- | 1 September || Dr Tan Keng Yam Tony is sworn as the seventh President of Singapore. |- | 2012 || 25 September || Singapore Changi Airport closes The Budget Terminal to make way for the construction of future Singapore Changi Airport Terminal 4. |- | rowspan=3 style=vertical-align:top| 2013 || 16 February || More than 3000 Singaporeans gathered at the Speakers' Corner, Singapore at Hong Lim Park for a non-partisan protest against the government's Population White Paper which projected a possible 6.9 million people in Singapore by 2030. |- | 24 June || Haze in Singapore reaches 401 PSI, the worst in Singapore history. |- | 8 December || The 2013 Little India riot took place after a fatal accident occurred at the junction of Race Course Road and Hampshire Road in Little India, Singapore. |- | rowspan=2 style=vertical-align:top| 2014 || 12 January || Beginning construction of the new Thomson-East Coast MRT Line (Thomson stretch) consisting of 31 new stations (including 7 interchanges). |- | 30 June || The new National Stadium re-opened to the public after re-construction. |- | rowspan=4 style=vertical-align:top| 2015 || 23 March || Lee Kuan Yew passes away. Singapore enters a one-week mourning period. |- | 30 June || Ng Teng Fong General Hospital commences operation. |- | 22 July || Jurong Community Hospital commences operation. |- | 9 August || Singapore turns 50. |- | rowspan=2 style=vertical-align:top| 2016 || 21 July || Beginning construction of the new Thomson-East Coast MRT Line (East Coast stretch). |- | 22 August || S R Nathan passes away. Singapore enters a one-week mourning period. |- | rowspan=4 style=vertical-align:top| 2017 || 11 February | Nearly 300 year old Tembusu tree at Singapore Botanic Gardens falls, killing one and injured 4 others. |- | 17 April || Othman Wok passes away. Singapore enters a one-week mourning period. |- | 13\u201314 September || Halimah Yacob is elected as the first female president and eighth President of Singapore. |- | 31 October || Singapore Changi Airport opens its fourth passenger terminal . |- | rowspan=3 style=vertical-align:top|2018 || 12 June || Singapore hosted the Singapore Summit, a summit meeting between North Korea and United States leaders. |- | 18 August || Sengkang General Hospital opened to public. |- | 19 November || A new passenger terminal in Seletar Airport opened, replacing the old building . |- | rowspan=2 style=vertical-align:top|2019 || 28 January || Singapore celebrates the 200th Anniversary of the foundation of modern Singapore by Stamford Raffles . |- |17 April || Jewel Changi Airport opens after a week-long preview . |- | style=vertical-align:top|2020 || 23 January || The first COVID-19 case in Singapore was confirmed involving a 66-year-old Chinese national from Wuhan. |- | style=vertical-align:top|2020 || ||Election!!||", "edit_actions": [{"type": "R", "before": "$35 million naval base from 2000. September \"The Singapore Story\", the first volume of Lee Kuan Yew's memoirs is published. () 1999 1 September S.R. Nathan becomes the sixth President of Singapore. Singapore slips into recession during the Asian financial crisis. 2000 1 September Speaker's Corner is launched at Hong Lim Park. 31 October Singapore Airlines Flight 006 crashes during take-off in Chiang Kai Shek International Airport, killing 83 people. \"From Third World to First, The Singapore Story 1965-2000\" the second volume of Lee Kuan Yew's memoirs is published. () 21st century Year Date Event 2001 Economic recession in Singapore. (to 2003) January A pipeline feeding gas to Singapore from Indonesia's Natuna field in South China Sea opens. 3 November The PAP wins 82 of 84 seats in the 2001 General Election. 9 December 15 suspected militants of Jemaah Islamiah are arrested for alleged bomb plot. 27 December Tropical Storm Vamei, a rare tropic storm that occurs only once in 100 to 400 years, hits Singapore. 2002 13 January Singapore and Japan sign the Japan-Singapore Economic Agreement. 12 October The Esplanade \u2013 Theatres on the Bay officially opened as Singapore's major performing arts centre. 2003 1 March - 16 July SARS virus outbreak in Singapore. 6 May Singapore and United States sign the United States-Singapore Free Trade Agreement (USS-FTA). 29 October A major research center Biopolis opens. 2004 20 April A section of Nicoll Highway collapses, killing 4 people. 12 August Lee Hsien Loong, Lee Kuan Yew's son becomes the third Prime Minister. December National Service was reduced from two and half years to two years. 2005 15 January Singapore and Malaysia settle dispute over land reclamation work. 18 April The government approves the plan to legalise casino-gambling and build two Integrated Resorts. 8 July In the aftermath of 7 July 2005 \u2013 London bombings, Transport Minister Yeo Cheow Tong announces plan to set up a new Police MRT Unit to enhance the security of Singapore's public transport. (CNA) 17 August S R Nathan returns for his second term as President, following a walkover in the 2005 Singapore presidential election. 27 August White Elephant Incident at Buangkok MRT station. 31 December Singapore Police Academy ceased operational. Home Team Academy replaces the Police Academy and went operational on the following day at Old Choa Chu Kang Road.2006 6 May The PAP, led by Lee Hsien Loong, wins 82 of 84 seats in the General Election. 26 March Singapore Changi Airport opens the Budget Terminal.2007 20 May The Marina Bay Floating Platform was opened.30 June The Former National Stadium was closed for re-construction. 2008 9 January Singapore Changi Airport opens its third passenger terminal. 21 February The International Olympic Committee (IOC) awards the Youth Olympic Games hosting rights to Singapore ahead of Moscow by a vote of 53 to 44. 27 February Jemiah Islamiah terrorist head Mas Selamat bin Kastari escapes from prison. September Singapore slips into recession due to the global financial crisis. World economies hit badly; banks around the world collapse. 16 October Singapore government guarantees all local and foreign currency fixed deposits with a $", "after": "$35 million naval base from 2000. September \"The Singapore Story\", the first volume of Lee Kuan Yew's memoirs is published. () 1999 1 September S.R. Nathan becomes the sixth President of Singapore. Singapore slips into recession during the Asian financial crisis. 2000 1 September Speaker's Corner is launched at Hong Lim Park. 31 October Singapore Airlines Flight 006 crashes during take-off in Chiang Kai Shek International Airport, killing 83 people. \"From Third World to First, The Singapore Story 1965-2000\" the second volume of Lee Kuan Yew's memoirs is published. () 21st century {| class=wikitable style=width:100\\% |- ! style=\"width:6\\%\" | Year || style=\"width:10\\%\" | Date || Event |- | rowspan=5 style=vertical-align:top| 2001 || || Economic recession in Singapore. (to 2003) |- | January || A pipeline feeding gas to Singapore from Indonesia's Natuna field in South China Sea opens. |- | 3 November || The PAP wins 82 of 84 seats in the 2001 General Election. |- | 9 December || 15 suspected militants of Jemaah Islamiah are arrested for alleged bomb plot. |- | 27 December || Tropical Storm Vamei, a rare tropic storm that occurs only once in 100 to 400 years, hits Singapore. |- | rowspan=2 style=vertical-align:top| 2002 || 13 January || Singapore and Japan sign the Japan-Singapore Economic Agreement. |- | 12 October || The Esplanade \u2013 Theatres on the Bay officially opened as Singapore's major performing arts centre. |- | rowspan=3 style=vertical-align:top| 2003 || 1 March - 16 July || SARS virus outbreak in Singapore. |- | 6 May || Singapore and United States sign the United States-Singapore Free Trade Agreement (USS-FTA). |- | 29 October || A major research center Biopolis opens. |- | rowspan=3 style=vertical-align:top| 2004 || 20 April || A section of Nicoll Highway collapses, killing 4 people. |- | 12 August || Lee Hsien Loong, Lee Kuan Yew's son becomes the third Prime Minister. |- | December || National Service was reduced from two and half years to two years. |- | rowspan=6 style=vertical-align:top| 2005 || 15 January || Singapore and Malaysia settle dispute over land reclamation work. |- | 18 April || The government approves the plan to legalise casino-gambling and build two Integrated Resorts. |- | 8 July || In the aftermath of 7 July 2005 \u2013 London bombings, Transport Minister Yeo Cheow Tong announces plan to set up a new Police MRT Unit to enhance the security of Singapore's public transport. (CNA) |- | 17 August || S R Nathan returns for his second term as President, following a walkover in the 2005 Singapore presidential election. |- | 27 August || White Elephant Incident at Buangkok MRT station. |- | 31 December || Singapore Police Academy ceased operational. Home Team Academy replaces the Police Academy and went operational on the following day at Old Choa Chu Kang Road. |- | rowspan=2 style=vertical-align:top|2006 || 6 May || The PAP, led by Lee Hsien Loong, wins 82 of 84 seats in the General Election. |- | 26 March || Singapore Changi Airport opens the Budget Terminal. |- | rowspan=2 style=\"vertical-align:top;\"|2007 || 20 May || The Marina Bay Floating Platform was opened. |- |30 June || The Former National Stadium was closed for re-construction. |- | rowspan=5 style=vertical-align:top| 2008 || 9 January || Singapore Changi Airport opens its third passenger terminal. |- | 21 February || The International Olympic Committee (IOC) awards the Youth Olympic Games hosting rights to Singapore ahead of Moscow by a vote of 53 to 44. |- | 27 February || Jemiah Islamiah terrorist head Mas Selamat bin Kastari escapes from prison. |- | September || Singapore slips into recession due to the global financial crisis. World economies hit badly; banks around the world collapse. |- | 16 October || Singapore government guarantees all local and foreign currency fixed deposits with a $", "start_char_pos": 15835, "end_char_pos": 19052}, {"type": "A", "before": null, "after": "|- | rowspan=4 style=vertical-align:top|", "start_char_pos": 19162, "end_char_pos": 19162}, {"type": "A", "before": null, "after": "||", "start_char_pos": 19168, "end_char_pos": 19168}, {"type": "A", "before": null, "after": "||", "start_char_pos": 19175, "end_char_pos": 19175}, {"type": "A", "before": null, "after": "|- |", "start_char_pos": 19394, "end_char_pos": 19394}, {"type": "A", "before": null, "after": "||", "start_char_pos": 19402, "end_char_pos": 19402}, {"type": "A", "before": null, "after": "|- |", "start_char_pos": 19502, "end_char_pos": 19502}, {"type": "A", "before": null, "after": "||", "start_char_pos": 19513, "end_char_pos": 19513}, {"type": "A", "before": null, "after": "|- |", "start_char_pos": 19846, "end_char_pos": 19846}, {"type": "A", "before": null, "after": "||", "start_char_pos": 19859, "end_char_pos": 19859}, {"type": "A", "before": null, "after": "|- |", "start_char_pos": 19929, "end_char_pos": 19929}, {"type": "A", "before": null, "after": "||", "start_char_pos": 19935, "end_char_pos": 19935}, {"type": "A", "before": null, "after": "||", "start_char_pos": 19949, "end_char_pos": 19949}, {"type": "A", "before": null, "after": "|- | rowspan=3 style=vertical-align:top|", "start_char_pos": 20082, "end_char_pos": 20082}, {"type": "A", "before": null, "after": "||", "start_char_pos": 20088, "end_char_pos": 20088}, {"type": "A", "before": null, "after": "||", "start_char_pos": 20101, "end_char_pos": 20101}, {"type": "A", "before": null, "after": "|- |", "start_char_pos": 20334, "end_char_pos": 20334}, {"type": "A", "before": null, "after": "||", "start_char_pos": 20343, "end_char_pos": 20343}, {"type": "A", "before": null, "after": "|- |", "start_char_pos": 20411, "end_char_pos": 20411}, {"type": "A", "before": null, "after": "||", "start_char_pos": 20423, "end_char_pos": 20423}, {"type": "A", "before": null, "after": "|- | rowspan=2 style=vertical-align:top|", "start_char_pos": 20577, "end_char_pos": 20577}, {"type": "A", "before": null, "after": "||", "start_char_pos": 20583, "end_char_pos": 20583}, {"type": "A", "before": null, "after": "||", "start_char_pos": 20595, "end_char_pos": 20595}, {"type": "A", "before": null, "after": "|- |", "start_char_pos": 20734, "end_char_pos": 20734}, {"type": "A", "before": null, "after": "||", "start_char_pos": 20743, "end_char_pos": 20743}, {"type": "A", "before": null, "after": "|- | rowspan=4 style=vertical-align:top|", "start_char_pos": 20816, "end_char_pos": 20816}, {"type": "A", "before": null, "after": "||", "start_char_pos": 20822, "end_char_pos": 20822}, {"type": "A", "before": null, "after": "||", "start_char_pos": 20832, "end_char_pos": 20832}, {"type": "A", "before": null, "after": "|- |", "start_char_pos": 20904, "end_char_pos": 20904}, {"type": "A", "before": null, "after": "||", "start_char_pos": 20913, "end_char_pos": 20913}, {"type": "A", "before": null, "after": "|- |", "start_char_pos": 20965, "end_char_pos": 20965}, {"type": "A", "before": null, "after": "||", "start_char_pos": 20974, "end_char_pos": 20974}, {"type": "A", "before": null, "after": "|- |", "start_char_pos": 21022, "end_char_pos": 21022}, {"type": "A", "before": null, "after": "||", "start_char_pos": 21032, "end_char_pos": 21032}, {"type": "A", "before": null, "after": "|- | rowspan=2 style=vertical-align:top|", "start_char_pos": 21053, "end_char_pos": 21053}, {"type": "A", "before": null, "after": "||", "start_char_pos": 21059, "end_char_pos": 21059}, {"type": "A", "before": null, "after": "||", "start_char_pos": 21068, "end_char_pos": 21068}, {"type": "A", "before": null, "after": "|- |", "start_char_pos": 21153, "end_char_pos": 21153}, {"type": "A", "before": null, "after": "||", "start_char_pos": 21164, "end_char_pos": 21164}, {"type": "A", "before": null, "after": "|- | rowspan=4 style=vertical-align:top|", "start_char_pos": 21234, "end_char_pos": 21234}, {"type": "A", "before": null, "after": "||", "start_char_pos": 21240, "end_char_pos": 21240}, {"type": "A", "before": null, "after": "|", "start_char_pos": 21253, "end_char_pos": 21253}, {"type": "A", "before": null, "after": "|- |", "start_char_pos": 21357, "end_char_pos": 21357}, {"type": "A", "before": null, "after": "||", "start_char_pos": 21367, "end_char_pos": 21367}, {"type": "A", "before": null, "after": "|- |", "start_char_pos": 21437, "end_char_pos": 21437}, {"type": "A", "before": null, "after": "||", "start_char_pos": 21454, "end_char_pos": 21454}, {"type": "A", "before": null, "after": "|- |", "start_char_pos": 21545, "end_char_pos": 21545}, {"type": "A", "before": null, "after": "||", "start_char_pos": 21557, "end_char_pos": 21557}, {"type": "R", "before": ".2018", "after": ". |- | rowspan=3 style=vertical-align:top|2018 ||", "start_char_pos": 21619, "end_char_pos": 21624}, {"type": "A", "before": null, "after": "||", "start_char_pos": 21633, "end_char_pos": 21633}, {"type": "A", "before": null, "after": "|- |", "start_char_pos": 21737, "end_char_pos": 21737}, {"type": "A", "before": null, "after": "||", "start_char_pos": 21748, "end_char_pos": 21748}, {"type": "A", "before": null, "after": "|- |", "start_char_pos": 21793, "end_char_pos": 21793}, {"type": "A", "before": null, "after": "||", "start_char_pos": 21806, "end_char_pos": 21806}, {"type": "R", "before": ".2019", "after": ". |- | rowspan=2 style=vertical-align:top|2019 ||", "start_char_pos": 21886, "end_char_pos": 21891}, {"type": "A", "before": null, "after": "||", "start_char_pos": 21903, "end_char_pos": 21903}, {"type": "R", "before": ".17 April", "after": ". |- |17 April ||", "start_char_pos": 22005, "end_char_pos": 22014}, {"type": "R", "before": ".2020", "after": ". |- | style=vertical-align:top|2020 ||", "start_char_pos": 22068, "end_char_pos": 22073}, {"type": "A", "before": null, "after": "||", "start_char_pos": 22085, "end_char_pos": 22085}, {"type": "A", "before": null, "after": "|- | style=vertical-align:top|2020 || ||Election!!||", "start_char_pos": 22190, "end_char_pos": 22190}], "sents_char_pos": [0, 101, 191, 281, 421, 480, 561, 653, 818, 991, 1190, 1273, 1372, 1449, 1505, 1593, 1663, 1756, 1823, 1863, 2035, 2128, 2171, 2212, 2295, 2419, 2499, 2574, 2781, 2821, 2864, 2979, 3031, 3060, 3145, 3237, 3261, 3419, 3525, 3637, 3679, 3776, 3902, 3978, 4021, 4128, 4246, 4330, 4390, 4459, 4597, 4643, 4693, 4886, 4977, 5105, 5297, 5477, 5540, 5616, 5725, 5849, 5965, 6047, 6202, 6281, 6394, 6469, 6553, 6644, 6724, 6817, 6923, 7025, 7132, 7193, 7269, 7342, 7386, 7424, 7534, 7577, 7874, 7922, 7999, 8078, 8139, 8231, 8318, 8385, 8472, 8543, 8674, 8798, 8884, 9005, 9089, 9321, 9423, 9456, 9504, 9575, 9739, 9757, 9879, 9975, 10099, 10179, 10241, 10321, 10387, 10506, 10776, 10906, 10998, 11047, 11156, 11227, 11317, 11419, 11454, 11549, 11683, 11774, 11858, 11928, 11985, 12029, 12092, 12202, 12285, 12336, 12445, 12552, 12625, 12714, 12773, 12853, 12926, 13018, 13108, 13176, 13316, 13376, 13418, 13612, 13681, 13814, 13917, 13996, 14063, 14150, 14233, 14341, 14379, 14498, 14575, 14641, 14715, 14861, 15029, 15067, 15135, 15189, 15287, 15327, 15369, 15522, 15627, 15740, 15868, 15958, 16032, 16098, 16162, 16288, 16405, 16475, 16585, 16654, 16743, 16856, 16937, 17047, 17104, 17203, 17254, 17325, 17405, 17481, 17563, 17667, 17863, 17998, 18057, 18114, 18317, 18378, 18434, 18501, 18577, 18817, 18894, 18921, 18954, 19287, 19501, 19715, 19829, 19845, 19928, 20333, 20410, 20576, 20733, 20815, 20858, 20903, 20964, 21021, 21152, 21188, 21233, 21356, 21391, 21436, 21544, 21736, 21792]}
+{"doc_id": "22222183", "revision_depth": "1", "before_revision": "Along with the notion of experience economy, employee experience is defined as a set of psycho-cognitive sentiments about the experiential benefits of employment. Employee experience is formed when an employee interacts with careers\u2019 elements (e.g. firms, supervisors, coworkers, customer, environment, etc.) that affect their cognition and attitudes and leads to their particular behaviors , related to their job and company.Madjar, N., Oldham, G. R., and Pratt, M. G. 2002. \"Theres no place like home?: The contributions of work and non-work sources of creativity support to employees creative performance\", Academy of Management Journal, Vol 45, pp. 757\u2013767. Employee Experience Management (EEM) was conceptualized by Kaveh Abhari as an approach to deliver positive experiences to employees , which leads to positive customer experience by emphasizing their experiential needs - like experiential marketing for external customers. Harris hinted,Harris, P. (2007). We the people: The importance of employees in the process of building customer experience. Brand Management, 15 (2), 102\u2013114. \u201cIt customer experience%DIFDELCMD < ] %%% begins at the heart of an organization. It begins with employees who are being the strategy and living the brand\u201d. EEM, same as Internal marketing, is an internal approach by focusing on employees (internal customer ) prior to external customers.Enhancing Service Experience Through Understanding Employee Experience Management The notion of EEM comes from the question of how firms make sure that employees create the desirable customer experience , whenever they interact with customers or provide the information and services to them.Schmitt, B. H. (2003). Customer Experience Management. New Jersey: John Wiley & Sons Inc. Alternatively, utilizing employees in delivering brand value promise is a remarkable concernin EEM. EEM also goes beyond standard Human Resource Management by rewarding more employee-experience in form of both professional and personal development. A Global Human Capital Trends survey , based on more than 7,000 responses in over 130 countries , framed the shifting paradigm with \u201c After three years of struggling to drive employee engagement\u2026 Executives see a need to redesign the organization. \u201d", "after_revision": "Along with the notion of experience economy, employee experience is defined as a set of psychocognitive sentiments about the experiential benefits of employment. Employee experience is formed when an employee interacts with careers\u2019 elements (e.g. firms, supervisors, coworkers, customer, environment, etc.) that affect his or her cognition and attitudes and leads to particular behaviors related to the employee's job and company.Madjar, N., Oldham, G. R., and Pratt, M. G. 2002. \"Theres no place like home?: The contributions of work and non-work sources of creativity support to employees creative performance\", Academy of Management Journal, Vol 45, pp. 757\u2013767. Employee experience management (EEM) was conceptualized by Kaveh Abhari as an approach to deliver positive experiences to employees that leads to positive customer experience by emphasizing their experiential needs as does experiential marketing for external customers. %DIFDELCMD < ] %%% EEM, in a similar manner as with internal marketing, is an internal approach focusing on employees (internal customers ) prior to external customers.Enhancing Service Experience Through Understanding Employee Experience Management EEM is based on the goal of creating a desirable customer experience whenever employees interact with customers or provide information and services to them.Schmitt, B. H. (2003). Customer Experience Management. New Jersey: John Wiley & Sons Inc. Utilizing employees in delivering brand-value promise is another concern. EEM goes beyond standard human-resource management by rewarding employee experience in the forms of both professional and personal development. A global human-capital trends survey based on more than 7,000 responses in over 130 countries framed the shifting paradigm as: \" After three years of struggling to drive employee engagement\u2026 Executives see a need to redesign the organization. \"", "edit_actions": [{"type": "R", "before": "psycho-cognitive", "after": "psychocognitive", "start_char_pos": 88, "end_char_pos": 104}, {"type": "R", "before": "their", "after": "his or her", "start_char_pos": 321, "end_char_pos": 326}, {"type": "R", "before": "their particular behaviors , related to their", "after": "particular behaviors related to the employee's", "start_char_pos": 364, "end_char_pos": 409}, {"type": "R", "before": "Experience Management", "after": "experience management", "start_char_pos": 671, "end_char_pos": 692}, {"type": "R", "before": ", which", "after": "that", "start_char_pos": 794, "end_char_pos": 801}, {"type": "R", "before": "- like", "after": "as does", "start_char_pos": 880, "end_char_pos": 886}, {"type": "D", "before": "Harris hinted,Harris, P. (2007). We the people: The importance of employees in the process of building customer experience. Brand Management, 15 (2), 102\u2013114. \u201cIt", "after": null, "start_char_pos": 934, "end_char_pos": 1096}, {"type": "D", "before": "customer experience", "after": null, "start_char_pos": 1097, "end_char_pos": 1116}, {"type": "R", "before": "begins at the heart of an organization. It begins with employees who are being the strategy and living the brand\u201d. EEM, same as Internal", "after": "EEM, in a similar manner as with internal", "start_char_pos": 1135, "end_char_pos": 1271}, {"type": "D", "before": "by", "after": null, "start_char_pos": 1307, "end_char_pos": 1309}, {"type": "R", "before": "customer", "after": "customers", "start_char_pos": 1342, "end_char_pos": 1350}, {"type": "R", "before": "The notion of EEM comes from the question of how firms make sure that employees create the", "after": "EEM is based on the goal of creating a", "start_char_pos": 1463, "end_char_pos": 1553}, {"type": "R", "before": ", whenever they", "after": "whenever employees", "start_char_pos": 1584, "end_char_pos": 1599}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1635, "end_char_pos": 1638}, {"type": "R", "before": "Alternatively, utilizing", "after": "Utilizing", "start_char_pos": 1762, "end_char_pos": 1786}, {"type": "R", "before": "brand value promise is a remarkable concernin EEM. EEM also", "after": "brand-value promise is another concern. EEM", "start_char_pos": 1811, "end_char_pos": 1870}, {"type": "R", "before": "Human Resource Management by rewarding more employee-experience in form", "after": "human-resource management by rewarding employee experience in the forms", "start_char_pos": 1892, "end_char_pos": 1963}, {"type": "R", "before": "Global Human Capital Trends survey ,", "after": "global human-capital trends survey", "start_char_pos": 2013, "end_char_pos": 2049}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2107, "end_char_pos": 2108}, {"type": "R", "before": "with \u201c", "after": "as: \"", "start_char_pos": 2138, "end_char_pos": 2144}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2259, "end_char_pos": 2260}], "sents_char_pos": [0, 162, 426, 475, 503, 661, 933, 966, 1057, 1092, 1174, 1249, 1381, 1672, 1694, 1726, 1761, 1861, 2010, 2206]}
+{"doc_id": "22408701", "revision_depth": "3", "before_revision": "The development of urban centers in the Low Countries shows the process in which a region, the Low Countries in Western Europe, evolves from a highly rural outpost of the Roman Empire into the largest urbanized area above the Alps by the 15th century CE. As such, this article covers the development of Dutch and Flemish cities beginning at the end of the migration period till the end of the Dutch Golden Age. 150px|Objects found excavating the remains of Dorestad. The northern border of the Roman Empire, known as limes ad Germaniam inferiorem, was set at the Rhine in 47 AD. The border was protected with fortresses and the Low Countries became the outer provinces of the empire, situated near the Roman-Germanic border. Probably because of the (founded) fear of Germanic incursions, Roman settlements (such as Roman villas and colonies) were extremely sparse, and Roman presence was mainly limited to three Castra (Noviomagus, near modern Nijmegen; Flevum, near Velsen; and a last one near Oudenburg, its name is unknown), and a set of Castellum ( of which Castellum Trajectum would lay the foundation of Utrecht). These together formed the only population centers which surpassed the native villages of the time in terms of architecture and, in some cases, population. The only possible exception was the city of Atuatuca Tungrorum, which later became one of the earliest centers of Christianity in the Low Countries. Around (the ruins of) these Castra and Castellum the first large settlements arose . Very little is known about these settlements, apart from archeological material , as there was little literacy at the time. Based on archeological evidence, together with sparsely preserved written text it is thought that Dorestad (build near the former Roman fortifications) was the most populous and important settlement of the region; with an estimated 3,000 inhabitants, it was much larger than the remaining villages, which often had no more than 100\u2013150 inhabitants. Dorestad seems to have been the principal trading center of the Low Countries from around 600 CE until it started to decline around the early 9th century , caused by frequent Viking raids, Frisian-Frankish wars, silting of its river connection and the emerging of new centers favoured by the Franks, such as Li\u00e8ge, Cambrai, Soissons, Herstal, Tournai and, most to the north , the neighbouring site of Nijmegen. In 696 , Willibrord, an Anglo-Saxon missionary, was permitted by the Frankish king Pippin II to settle in Utrecht and initiated by Pop Sergius I as archbishop of the Frisians . He buit in Utrecht a church dedicated to St. Martin and from there he converted the Frisians to Christianity, sparking the city to become a major ecclesiastical center in the Low Countries. From around the 10th century, mainly due to population growth and improved infrastructure, more larger settlements begin to appear. Around the 11th century, some of these cities begin to form networks of urban centers. In the Low Countries these appeared in 3 regions; at first in the County of Flanders in the South, then followed by the County of Holland in the North and Northern Guelders/Oversticht in the East. The cities located in the center of the Low Countries were able to profit of both of the Flemish and Hollandic cities and no real urban network emerged there . In the North of the Low Countries, however, such as Frisia and Groningen ; cities remained relatively isolated. Groningen is still nicknamed stad (\"city\") within its province ; signaling its position as the only city in the region as well as its isolation. Southern development The principal urban center in the County of Flanders was focused on the cities of Bruges, Ghent and Ypres. The textile industry (using wool from England) in this area flourished which provided the region with enormous wealth, as well as attracting various other trades. The area was notorious for its civil uprisings. When the French King added the county to his crown lands in 1297, this sparked a popular revolt culminating in the defeat of the French knight army by the peasant militia of the cities at the Battle of the Golden Spurs. By 1500 these cities had lost their leading position within the Low Countries to Antwerp ; though still playing an important role. In the East of the Low Countries, a number of towns aligned themselves with the Hanseatic cities , who controlled the trade in and around the Baltic Sea. This sparked a sudden economic boom for these cities ; principally Zutphen, Kampen, Deventer, Elburg, Doesburg, Zwolle and their immediate surroundings. The boom was relatively short, as Hollandic, Flemish and English merchants tried (and eventually succeeded in) breaking open the Baltic trade ; thereby ending the Hanseatic monopoly which earned its members their wealth. Because of the comparatively short time of economic prosperity, these cities are notably smaller than for example the Flemish cities, and after Hollandic domination and, in the late 16th century, economical supremacy they found themselves in the hinterland of the Dutch economy. Western development The Hollandic cities in the 13th century were less advanced than either their Eastern or Flemish counterparts; for the most part of the 14th and 15th century the Hollandic cities performed the role of intermediate between the latter and its trade partners oversees. Eventually they formed the bulk of the transport fleet sailing on Bruges and Ghent ; which earned them considerable wealth and sparked further expansion. It wasn't till the Fall of Antwerp that the Hollandic cities (led by Amsterdam ) would truly expand. Sup-regional centers From 1550 CE onwards a two trade hubs start to emerge which for the first time truly dominate the entirety of the Low Countries. The first is Antwerp, the second is Amsterdam. Antwerp-region 200px|Antwerp: the economic center of the Low Countries; c. 1540. After the silting of the river Zwin and the consequent decline of Bruges, the city of Antwerp, with its connection to the less silting-prone Scheldt, becomes of importance. At the end of the 15th century the foreign trading houses were transferred from Bruges to Antwerp. Fernand Braudel states that Antwerp became \"the center of the entire international economy \u2014 something Bruges had never been even at its height.\" ( Braudel 1985 p. 143. ) Antwerp's \"Golden Age\" was tightly linked to the \"Age of Exploration\". Over the first half of the 16th century Antwerp grew to become the second largest European city north of the Alps by 1560. Antwerp experienced three booms during its golden age, the first based on the pepper market , a second launched by American silver coming from Seville (ending with the bankruptcy of Spain in 1557), and a third boom, after the stabilising Treaty of Cateau-Cambresis , in 1559 , based on the textiles industry . At the time of the Dutch revolt, Antwerp was considered to be the capital of the revolt; and the Dutch rebel army furiously tried to break the siege laid upon the city by the Spanish Army ; however Antwerp fell in 1585. Nearly half of its population fled north to the Hollandic cities giving a huge (monetary as well as in terms of population) impulse to these cities, a major event leading up to the Dutch Golden Age. Amsterdam-region The end of the Golden age saw Amsterdam diminish to the same level of economic importance as Antwerp. The latter had barely been able to establish itself as the Southern Netherlands' main center , continually pressured by Western Europe's new powerhouses: the much larger cities of Paris and London. It wasn't until after the Second World War that either city would again experience substantial growth. The post war Netherlands saw the formation of the Randstad, whereas in Flanders the Flemish diamond emerged. Today both regions, powered by the ports of Rotterdam and Antwerp are agglomerating, as they are fuelling the hinterland: Germany's newly formed industries in the Ruhr.", "after_revision": "The development of urban centers in the Low Countries shows the process by which the Low Countries , a region in Western Europe, evolved from a highly rural outpost of the Roman Empire into the largest urbanized area north of the Alps by the 15th century CE. As such, this article covers the development of Dutch and Flemish cities beginning at the end of the migration period till the end of the Dutch Golden Age. 150px|Objects found excavating the remains of Dorestad. The northern border of the Roman Empire, known as limes ad Germaniam inferiorem, was set at the Rhine in 47 AD. The border was protected with fortresses and the Low Countries became the outer provinces of the empire, situated near the Roman-Germanic border. Probably because of the (founded) fear of Germanic incursions, Roman settlements (such as Roman villas and colonies) were extremely sparse, and Roman presence was mainly limited to three Castra (Noviomagus, near modern Nijmegen; Flevum, near Velsen; and one near Oudenburg, the Latin name for which is unknown, as well as a set of Castellum ( one of which, Castellum Trajectum, would be the foundation of Utrecht). These together formed the only population centers which surpassed the native villages of the time in terms of architecture and, in some cases, population. The only possible exception was the city of Atuatuca Tungrorum, which later became one of the earliest centers of Christianity in the Low Countries. The first large settlements arose around (the ruins of) these Castra and Castellum . Very little is known about these settlements, apart from archeological remains , as there was little literacy at the time. Based on archeological evidence, together with sparsely preserved written text it is thought that Dorestad (build near the former Roman fortifications) was the most populous and important settlement of the region; with an estimated 3,000 inhabitants, it was much larger than the remaining villages, which often had no more than 100\u2013150 inhabitants. Dorestad seems to have been the principal trading center of the Low Countries from around 600 CE until it started to decline in the early 9th century due to repeated Viking raids, Frisian-Frankish wars, the silting up of its waterways, and the emergence of new centers favoured by the Franks, such as Li\u00e8ge, Cambrai, Soissons, Herstal, Tournai and, most northerly , the neighbouring site of Nijmegen. In 696 the Frankish king Pippin II permitted the Anglo-Saxon missionary Willibrord, whom Pope Sergius I had appointed archbishop of the Frisians , to settle in Utrecht. Willibrord built a church dedicated to St. Martin in Utrecht and from there he converted some Frisians to Christianity, laying the basis for the city to become a major ecclesiastical center in the Low Countries. From around the 10th century, mainly due to population growth and improved infrastructure, a greater number of larger settlements began to appear. Around the 11th century, some of these towns began to form networks of urban centers. In the Low Countries these appeared in 3 regions; at first in the County of Flanders in the South, then followed by the County of Holland in the North and Northern Guelders/Oversticht in the East. Towns located in the center of the Low Countries were able to profit from the urban networks of both Flanders and Holland, without developing regional urban networks of their own . In the northern Low Countries, however, such as Frisia and Groningen , cities remained relatively isolated. Groningen is still nicknamed stad (\"city\") within its province , reflecting its position as the only city in the region as well as its isolation. Southern development The principal urban center in the County of Flanders was focused on the cities of Bruges, Ghent and Ypres. The textile industry flourished in this area , processing wool from England, and provided the region with enormous wealth, as well as attracting various other trades. The area was notorious for its civil uprisings. When the king of France added the county to his crown lands in 1297, this sparked a popular revolt culminating in the defeat of the French chivalric army by lowborn urban militias at the Battle of the Golden Spurs. By 1500 these cities had lost their leading position within the Low Countries to Antwerp , although they continued to play a less important role. In the East of the Low Countries, a number of towns aligned themselves with the Hanseatic cities that controlled the trade in and around the Baltic Sea. This resulted in a sudden economic boom for these cities , principally Zutphen, Kampen, Deventer, Elburg, Doesburg, Zwolle and their immediate surroundings. The boom was relatively shortlived, as merchants from Holland, Flanders and England merchants were ultimately successful at breaking into the Baltic trade themselves, ending the Hanseatic monopoly which had earned its members their wealth. Because of the comparatively short time of economic prosperity, these cities are notably smaller than for example the Flemish cities, and after Holland rose to economic supremacy around 1600, they found themselves in the hinterland of the Dutch economy. Western development In the 13th century the cities of Holland were less advanced than either their eastern or Flemish counterparts; for most of the 14th and 15th centuries the cities of Holland performed the role of intermediary between Flanders and trading partners oversees. Eventually they formed the bulk of the transport fleet sailing to Bruges and Ghent , which earned them considerable wealth and led to further expansion. It was not until the Fall of Antwerp that the cities of Holland (and Amsterdam in particular ) would truly expand. Supra-regional centers From around 1500 onwards two trade hubs started to emerge which for the first time truly dominated the entirety of the Low Countries. The first was Antwerp, the second was Amsterdam. Antwerp 200px|Antwerp: the economic center of the Low Countries; c. 1540. After the silting of the river Zwin and the consequent decline of Bruges, the city of Antwerp, with its connection to the less silting-prone Scheldt, becomes of importance. At the end of the 15th century the foreign trading houses were transferred from Bruges to Antwerp. Fernand Braudel states that Antwerp became \"the center of the entire international economy \u2013 something Bruges had never been even at its height.\" Braudel 1985 p. 143. Antwerp's \"Golden Age\" was tightly linked to the \"Age of Exploration\". By 1560 Antwerp had grown to become the second largest European city north of the Alps . The city experienced three booms during its golden age, the first based on the pepper trade , a second launched by American silver coming from Seville (ending with the bankruptcy of Spain in 1557), and a third boom, after the stabilising Treaty of Cateau-Cambresis ( 1559 ), which was based on the textile trade . In the early stages of the Dutch revolt, Antwerp was considered to be the capital of the revolt; and the Dutch rebel army furiously but unsuccessfully sought to raise the siege of the city by the royal Army of Flanders. Nearly half of the city's population migrated after the siege, many to the cities of Holland, giving them a huge (monetary and demographic) boost, a significant factor in the Dutch Golden Age. Amsterdam The end of the Golden age saw Amsterdam diminish to the same level of economic importance as Antwerp. The latter had barely been able to establish itself as the main center of trade in the Southern Netherlands, continually under pressure from Western Europe's new powerhouses: the much larger cities of Paris and London. It wasn't until after the Second World War that either city would again experience substantial growth. The post-war Netherlands saw the formation of the Randstad, whereas in Flanders the Flemish diamond emerged. Today both regions, powered by the ports of Rotterdam and Antwerp are agglomerating, as they are fuelling the hinterland: Germany's newly formed industries in the Ruhr.", "edit_actions": [{"type": "R", "before": "in which a region,", "after": "by which", "start_char_pos": 72, "end_char_pos": 90}, {"type": "A", "before": null, "after": ", a region", "start_char_pos": 109, "end_char_pos": 109}, {"type": "R", "before": "evolves", "after": "evolved", "start_char_pos": 129, "end_char_pos": 136}, {"type": "R", "before": "above", "after": "north of", "start_char_pos": 217, "end_char_pos": 222}, {"type": "D", "before": "a last", "after": null, "start_char_pos": 980, "end_char_pos": 986}, {"type": "R", "before": "its name is unknown), and", "after": "the Latin name for which is unknown, as well as", "start_char_pos": 1007, "end_char_pos": 1032}, {"type": "R", "before": "of which Castellum Trajectum would lay", "after": "one of which, Castellum Trajectum, would be", "start_char_pos": 1054, "end_char_pos": 1092}, {"type": "R", "before": "Around", "after": "The first large settlements arose around", "start_char_pos": 1425, "end_char_pos": 1431}, {"type": "D", "before": "the first large settlements arose", "after": null, "start_char_pos": 1474, "end_char_pos": 1507}, {"type": "R", "before": "material", "after": "remains", "start_char_pos": 1581, "end_char_pos": 1589}, {"type": "R", "before": "around", "after": "in", "start_char_pos": 2108, "end_char_pos": 2114}, {"type": "R", "before": ", caused by frequent", "after": "due to repeated", "start_char_pos": 2137, "end_char_pos": 2157}, {"type": "R", "before": "silting", "after": "the silting up of its waterways, and the emergence", "start_char_pos": 2195, "end_char_pos": 2202}, {"type": "D", "before": "its river connection and the emerging of", "after": null, "start_char_pos": 2206, "end_char_pos": 2246}, {"type": "R", "before": "to the north", "after": "northerly", "start_char_pos": 2344, "end_char_pos": 2356}, {"type": "D", "before": ", Willibrord, an Anglo-Saxon missionary, was permitted by", "after": null, "start_char_pos": 2401, "end_char_pos": 2458}, {"type": "R", "before": "to settle in Utrecht and initiated by Pop Sergius I as", "after": "permitted the Anglo-Saxon missionary Willibrord, whom Pope Sergius I had appointed", "start_char_pos": 2487, "end_char_pos": 2541}, {"type": "R", "before": ". He buit in Utrecht", "after": ", to settle in Utrecht. Willibrord built", "start_char_pos": 2569, "end_char_pos": 2589}, {"type": "A", "before": null, "after": "in Utrecht", "start_char_pos": 2623, "end_char_pos": 2623}, {"type": "R", "before": "the", "after": "some", "start_char_pos": 2652, "end_char_pos": 2655}, {"type": "R", "before": "sparking the", "after": "laying the basis for the", "start_char_pos": 2682, "end_char_pos": 2694}, {"type": "R", "before": "more larger settlements begin", "after": "a greater number of larger settlements began", "start_char_pos": 2853, "end_char_pos": 2882}, {"type": "R", "before": "cities begin", "after": "towns began", "start_char_pos": 2933, "end_char_pos": 2945}, {"type": "R", "before": "The cities", "after": "Towns", "start_char_pos": 3178, "end_char_pos": 3188}, {"type": "R", "before": "of both of the Flemish and Hollandic cities and no real urban network emerged there", "after": "from the urban networks of both Flanders and Holland, without developing regional urban networks of their own", "start_char_pos": 3252, "end_char_pos": 3335}, {"type": "R", "before": "North of the", "after": "northern", "start_char_pos": 3345, "end_char_pos": 3357}, {"type": "R", "before": ";", "after": ",", "start_char_pos": 3411, "end_char_pos": 3412}, {"type": "R", "before": "; signaling", "after": ", reflecting", "start_char_pos": 3513, "end_char_pos": 3524}, {"type": "R", "before": "(using wool from England)", "after": "flourished", "start_char_pos": 3744, "end_char_pos": 3769}, {"type": "R", "before": "flourished which", "after": ", processing wool from England, and", "start_char_pos": 3783, "end_char_pos": 3799}, {"type": "R", "before": "French King", "after": "king of France", "start_char_pos": 3943, "end_char_pos": 3954}, {"type": "R", "before": "knight army by the peasant militia of the cities", "after": "chivalric army by lowborn urban militias", "start_char_pos": 4070, "end_char_pos": 4118}, {"type": "R", "before": "; though still playing an", "after": ", although they continued to play a less", "start_char_pos": 4243, "end_char_pos": 4268}, {"type": "R", "before": ", who", "after": "that", "start_char_pos": 4382, "end_char_pos": 4387}, {"type": "R", "before": "sparked", "after": "resulted in", "start_char_pos": 4444, "end_char_pos": 4451}, {"type": "R", "before": ";", "after": ",", "start_char_pos": 4492, "end_char_pos": 4493}, {"type": "R", "before": "short, as Hollandic, Flemish and English merchants tried (and eventually succeeded in) breaking open", "after": "shortlived, as merchants from Holland, Flanders and England merchants were ultimately successful at breaking into", "start_char_pos": 4616, "end_char_pos": 4716}, {"type": "R", "before": "; thereby", "after": "themselves,", "start_char_pos": 4734, "end_char_pos": 4743}, {"type": "A", "before": null, "after": "had", "start_char_pos": 4780, "end_char_pos": 4780}, {"type": "R", "before": "Hollandic domination and, in the late 16th century, economical supremacy", "after": "Holland rose to economic supremacy around 1600,", "start_char_pos": 4958, "end_char_pos": 5030}, {"type": "R", "before": "The Hollandic cities in", "after": "In", "start_char_pos": 5113, "end_char_pos": 5136}, {"type": "A", "before": null, "after": "the cities of Holland", "start_char_pos": 5154, "end_char_pos": 5154}, {"type": "R", "before": "Eastern", "after": "eastern", "start_char_pos": 5192, "end_char_pos": 5199}, {"type": "R", "before": "the most part", "after": "most", "start_char_pos": 5229, "end_char_pos": 5242}, {"type": "R", "before": "century the Hollandic cities", "after": "centuries the cities of Holland", "start_char_pos": 5264, "end_char_pos": 5292}, {"type": "R", "before": "intermediate between the latter and its trade", "after": "intermediary between Flanders and trading", "start_char_pos": 5315, "end_char_pos": 5360}, {"type": "R", "before": "on", "after": "to", "start_char_pos": 5443, "end_char_pos": 5445}, {"type": "R", "before": ";", "after": ",", "start_char_pos": 5463, "end_char_pos": 5464}, {"type": "R", "before": "sparked", "after": "led to", "start_char_pos": 5507, "end_char_pos": 5514}, {"type": "R", "before": "wasn't till", "after": "was not until", "start_char_pos": 5537, "end_char_pos": 5548}, {"type": "R", "before": "Hollandic cities (led by Amsterdam", "after": "cities of Holland (and Amsterdam in particular", "start_char_pos": 5578, "end_char_pos": 5612}, {"type": "R", "before": "Sup-regional centers From 1550 CE onwards a", "after": "Supra-regional centers From around 1500 onwards", "start_char_pos": 5635, "end_char_pos": 5678}, {"type": "R", "before": "start", "after": "started", "start_char_pos": 5694, "end_char_pos": 5699}, {"type": "R", "before": "dominate", "after": "dominated", "start_char_pos": 5741, "end_char_pos": 5749}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 5795, "end_char_pos": 5797}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 5818, "end_char_pos": 5820}, {"type": "R", "before": "Antwerp-region", "after": "Antwerp", "start_char_pos": 5832, "end_char_pos": 5846}, {"type": "R", "before": "\u2014", "after": "\u2013", "start_char_pos": 6276, "end_char_pos": 6277}, {"type": "D", "before": "(", "after": null, "start_char_pos": 6331, "end_char_pos": 6332}, {"type": "D", "before": ")", "after": null, "start_char_pos": 6354, "end_char_pos": 6355}, {"type": "R", "before": "Over the first half of the 16th century Antwerp grew", "after": "By 1560 Antwerp had grown", "start_char_pos": 6427, "end_char_pos": 6479}, {"type": "R", "before": "by 1560. Antwerp", "after": ". The city", "start_char_pos": 6541, "end_char_pos": 6557}, {"type": "R", "before": "market", "after": "trade", "start_char_pos": 6635, "end_char_pos": 6641}, {"type": "R", "before": ", in", "after": "(", "start_char_pos": 6815, "end_char_pos": 6819}, {"type": "R", "before": ",", "after": "), which was", "start_char_pos": 6825, "end_char_pos": 6826}, {"type": "R", "before": "textiles industry", "after": "textile trade", "start_char_pos": 6840, "end_char_pos": 6857}, {"type": "R", "before": "At the time", "after": "In the early stages", "start_char_pos": 6860, "end_char_pos": 6871}, {"type": "R", "before": "tried to break the siege laid upon", "after": "but unsuccessfully sought to raise the siege of", "start_char_pos": 6984, "end_char_pos": 7018}, {"type": "R", "before": "Spanish Army ; however Antwerp fell in 1585.", "after": "royal Army of Flanders.", "start_char_pos": 7035, "end_char_pos": 7079}, {"type": "R", "before": "its population fled north to the Hollandic cities giving", "after": "the city's population migrated after the siege, many to the cities of Holland, giving them", "start_char_pos": 7095, "end_char_pos": 7151}, {"type": "R", "before": "as well as in terms of population) impulse to these cities, a major event leading up to", "after": "and demographic) boost, a significant factor in", "start_char_pos": 7169, "end_char_pos": 7256}, {"type": "R", "before": "Amsterdam-region", "after": "Amsterdam", "start_char_pos": 7279, "end_char_pos": 7295}, {"type": "R", "before": "Southern Netherlands' main center , continually pressured by", "after": "main center of trade in the Southern Netherlands, continually under pressure from", "start_char_pos": 7457, "end_char_pos": 7517}, {"type": "R", "before": "post war", "after": "post-war", "start_char_pos": 7703, "end_char_pos": 7711}], "sents_char_pos": [0, 255, 467, 579, 725, 954, 975, 1120, 1275, 1424, 1509, 1633, 1847, 1982, 2393, 2570, 2615, 2761, 2893, 2980, 3030, 3177, 3337, 3412, 3449, 3514, 3594, 3722, 3885, 3933, 4153, 4244, 4284, 4438, 4493, 4591, 4735, 4813, 5092, 5224, 5379, 5464, 5533, 5634, 5784, 5831, 5903, 6085, 6184, 6426, 6549, 6859, 6948, 7049, 7079, 7278, 7397, 7595, 7698, 7807]}
+{"doc_id": "22623070", "revision_depth": "1", "before_revision": "Dimensions A rugby league pitch (or field) is 68m wide and 112-122m long. The try lines (or goal lines) stand 100m apart. On each one is a goal post that is 5.5m wide and at least 16m high, with a crossbar set 3m above the ground. The distance from try line to dead-ball line is 6-11m . The field of play is a fixed size - 100m long and 68m wide and does not include the line markings, meaning all touchlines and dead ball lines are considered out of play. Field Near each end of the field is a goal line, or try-line; they are 100 metres (109.4 yards) apart. A scoring area called the in-goal area extends 6\u201311 metres (6.6\u201312 yards) from each try-line to each dead ball line. Between the goal lines, broken lines run parallel to each touch line at 10 and 20 metres from touch. Free kicks are taken 10 metres in from the point where the ball entered touch after being kicked out to gain ground from a penalty. If a scrum is required to restart play and the event that caused it occurred \"within 20 metres of a touch line or ten metres of a goal line the scrum shall be brought in twenty metres from the touch line and ten metres from the goal line\".RLIF, 2004: 32 Markings Lines with distance markers transverse the field every 10 metres perpendicular to the touch lines. The distances ascend from each goal line towards the halfway line, which is marked \"50\" (similar to a typical American football field). These lines, as well as the goal lines, dead ball lines and touch lines are 15 centimetres wide and white in colour, the only exception being the 40-metre lines, which are usually coloured red to distinguish them for the determination of 40\u201320 kicks in play. The broken lines 10 metres and 20 metres in from the touch lines are 10 centimetres wide and white in colour. The distance markers on the playing field are white with a red outline. These numbers are 2 metres high . Objects On each goal line are two goal posts 5.5 metres apart connected by a cross bar 3 metres from the ground. Each goal post is 16 metres in height (however they can be built higher) and for the purpose of judging a goal are considered to extend upwards indefinitely.RLIF, 2004: 3 The posts and crossbar form an \"H\" shape. Goal posts supported by only one post below the crossbar are permissible. The bottom two metres of a goal post is recommended to be padded to protect players from injury. At professional level, these pads are usually cuboids that encase each post. A corner post is placed at the points where each touch line meets each goal line.RLIF, 2004: 4 The post must consist of non-rigid material and should be at least 1.3m (4.1ft) metres in height. The corner posts are in touch in-goal, that is to say they act in the same way as sidelines and the ball-carrier touching them immediately halts play.", "after_revision": "Dimensions A rugby league pitch (or field) is wide and long. The try lines (or goal lines) stand apart. On each one is a goal post that is wide and at least high, with a crossbar set above the ground. The distance from try line to dead-ball line is . The field of play is a fixed size \u2013 long and wide and does not include the line markings, meaning all touchlines and dead ball lines are considered out of play. Field Near each end of the field is a goal line, or try-line; they are apart. A scoring area called the in-goal area extends from each try-line to each dead ball line. Between the goal lines, broken lines run parallel to each touch line at from touch. Free kicks are taken in from the point where the ball entered touch after being kicked out to gain ground from a penalty. If a scrum is required to restart play and the event that caused it occurred \"within 20 metres of a touch line or ten metres of a goal line the scrum shall be brought in twenty metres from the touch line and ten metres from the goal line\".RLIF, 2004: 32 Markings Lines with distance markers transverse the field every perpendicular to the touch lines. The distances ascend from each goal line towards the halfway line, which is marked \"50\" (similar to a typical American football field). These lines, as well as the goal lines, dead ball lines and touch lines are wide and white in colour, the only exception being the lines, which are usually coloured red to distinguish them for the determination of 40\u201320 kicks in play. The broken lines and in from the touch lines are wide and white in colour. The distance markers on the playing field are white with a red outline. These numbers are . Objects On each goal line are two goal posts apart connected by a cross bar from the ground. Each goal post is in height (however they can be built higher) and for the purpose of judging a goal are considered to extend upwards indefinitely.RLIF, 2004: 3 The posts and crossbar form an \"H\" shape. Goal posts supported by only one post below the crossbar are permissible. The bottom of a goal post is recommended to be padded to protect players from injury. At professional level, these pads are usually cuboids that encase each post. A corner post is placed at the points where each touch line meets each goal line.RLIF, 2004: 4 The post must consist of non-rigid material and should be at least in height. The corner posts are in touch in-goal, that is to say they act in the same way as sidelines and the ball-carrier touching them immediately halts play.", "edit_actions": [{"type": "R", "before": "68m wide and 112-122m", "after": "wide and", "start_char_pos": 46, "end_char_pos": 67}, {"type": "D", "before": "100m", "after": null, "start_char_pos": 110, "end_char_pos": 114}, {"type": "D", "before": "5.5m", "after": null, "start_char_pos": 157, "end_char_pos": 161}, {"type": "D", "before": "16m", "after": null, "start_char_pos": 180, "end_char_pos": 183}, {"type": "D", "before": "3m", "after": null, "start_char_pos": 210, "end_char_pos": 212}, {"type": "D", "before": "6-11m", "after": null, "start_char_pos": 279, "end_char_pos": 284}, {"type": "R", "before": "- 100m long and 68m", "after": "\u2013 long and", "start_char_pos": 321, "end_char_pos": 340}, {"type": "D", "before": "100 metres (109.4 yards)", "after": null, "start_char_pos": 528, "end_char_pos": 552}, {"type": "D", "before": "6\u201311 metres (6.6\u201312 yards)", "after": null, "start_char_pos": 607, "end_char_pos": 633}, {"type": "D", "before": "10 and 20 metres", "after": null, "start_char_pos": 749, "end_char_pos": 765}, {"type": "D", "before": "10 metres", "after": null, "start_char_pos": 799, "end_char_pos": 808}, {"type": "D", "before": "10 metres", "after": null, "start_char_pos": 1228, "end_char_pos": 1237}, {"type": "D", "before": "15 centimetres", "after": null, "start_char_pos": 1484, "end_char_pos": 1498}, {"type": "D", "before": "40-metre", "after": null, "start_char_pos": 1554, "end_char_pos": 1562}, {"type": "R", "before": "10 metres and 20 metres", "after": "and", "start_char_pos": 1684, "end_char_pos": 1707}, {"type": "D", "before": "10 centimetres", "after": null, "start_char_pos": 1736, "end_char_pos": 1750}, {"type": "D", "before": "2 metres high", "after": null, "start_char_pos": 1867, "end_char_pos": 1880}, {"type": "D", "before": "5.5 metres", "after": null, "start_char_pos": 1928, "end_char_pos": 1938}, {"type": "D", "before": "3 metres", "after": null, "start_char_pos": 1970, "end_char_pos": 1978}, {"type": "D", "before": "16 metres", "after": null, "start_char_pos": 2014, "end_char_pos": 2023}, {"type": "D", "before": "two metres", "after": null, "start_char_pos": 2294, "end_char_pos": 2304}, {"type": "D", "before": "1.3m (4.1ft) metres", "after": null, "start_char_pos": 2619, "end_char_pos": 2638}], "sents_char_pos": [0, 73, 121, 230, 286, 456, 518, 559, 676, 777, 909, 1149, 1271, 1407, 1666, 1776, 1848, 1995, 2153, 2208, 2282, 2379, 2456, 2538, 2649]}
+{"doc_id": "2394162", "revision_depth": "1", "before_revision": "Neuropathic arthropathy (or neuropathic osteoarthropathy), also known as Charcot joint (often Charcot foot) after the first to describe it, Jean-Martin Charcot, refers to progressive degeneration of a weight bearing joint, a process marked by bony destruction, bone resorption, and eventual deformity due to loss of sensation. Onset is usually insidious. Pathogenesis Any condition resulting in decreased peripheral sensation, proprioception, and fine motor control: Diabetes mellitus neuropathy (the most common in the U.S. today, resulting in destruction of foot and ankle joints), with Charcot joints in 1/600-700 diabetics . Related to long-term high blood glucose levels. Alcoholic neuropathy Cerebral palsy Leprosy Syphilis (tabes dorsalis), caused by the organism Treponema pallidum Spinal cord injury Myelomeningocele Syringomyelia Intra-articular steroid injections Congenital insensitivity to pain Peroneal muscular atrophy Patients with neurosyphilis tend to have knee involvement, and patients with syringomyelia of the spinal cord may demonstrate shoulder deformity.Hirsch M , et al. Neuropathic osteoarthropathy of the shoulder secondary to syringomyelia . URL Stage 2: Decreased local edema, with coalescence of fragments and absorption of fine bone debris Treatment Once the process is recognized, it should be treated via the VIPs \u2014 vascular management, infection management and prevention, and pressure relief. Aggressively pursuing these three strategies will progress the healing trajectory of the wound.Snyder, R.J., et al., The management of diabetic foot ulcers through optimal off-loading building consensus guidelines and practical recommendations to improve outcomes . J Am Podiatr Med Assoc , 2014. 104(6): p. 555-67 . Pressure relief ( off-loading ) and immobilization with total contact casting (TCC) are critical to helping ward off further joint destruction. TCC involves encasing the patient's complete foot, including toes, and the lower leg in a specialist cast that redistributes weight and pressure in the lower leg and foot during everyday movements. This redistributes pressure from the foot into the leg, which is more able to bear weight, to protect the wound, letting it regenerate tissue and heal.Raspovic, A. and K.B. Landorf, A survey of offloading practices for diabetes-related plantar neuropathic foot ulcers . J Foot Ankle Res , 2014. 7: p. 35. TCC also keeps the ankle from rotating during walking, which prevents shearing and twisting forces that can further damage the wound.Snyder, R.J., et al., The management of diabetic foot ulcers through optimal off-loading building consensus guidelines and practical recommendations to improve outcomes . J Am Podiatr Med Assoc , 2014. 104(6): p. 555-67 . TCC aids maintenance of quality of life by helping patients to remain mobile.Farid K, Farid M, Andrews CM. Total contact casting as part of an adaptive care approach: a case study . Ostomy Wound Manage. 2008; 54(6): 50\u201365. Walking braces controlled by pneumatics are also used. Surgical correction of a joint is rarely successful in the long-term in these patients . However, off-loading alone does not translate to optimal outcomes without appropriate management of vascular disease and/or infection.Snyder, R.J. , et al., The management of diabetic foot ulcers through optimal off-loading building consensus guidelines and practical recommendations to improve outcomes . J Am Podiatr Med Assoc , 2014. 104(6): p. 555-67 . Duration and aggressiveness of offloading (non-weight-bearing vs. weight-bearing, non-removable vs. removable device) should be guided by clinical assessment of healing of neuropathic arthropathy based on edema, erythema, and skin temperature changes.Rogers LC , et al. The Charcot foot in diabetes . Diabetes Care. 2011;34(9):2123\u20139. It can take 6\u20139 months for the edema and erythema of the affected joint to recede. Outcome Outcomes vary depending on the location of the disease, the degree of damage to the joint, and whether surgical repair was necessary. Average healing times vary from 55 \u2013 97 days depending on location. Up to 1\u20132 years may be required for complete healing. Further reading %DIFDELCMD < %DIFDELCMD < %%% Neuropathic osteoarthropathy by Monica Bhargava, M.D., University of Washington Department of Radiology", "after_revision": "Neuropathic arthropathy (or neuropathic osteoarthropathy), also known as Charcot joint (often Charcot foot) after the first to describe it, Jean-Martin Charcot, refers to progressive degeneration of a weight-bearing joint, a process marked by bony destruction, bone resorption, and eventual deformity due to loss of sensation. Onset is usually insidious. Pathogenesis Any condition resulting in decreased peripheral sensation, proprioception, and fine motor control: Diabetes mellitus neuropathy (the most common in the U.S. today, resulting in destruction of foot and ankle joints), with Charcot joints in 1/600-700 diabetics ; related to long-term high blood glucose levels. Alcoholic neuropathy Cerebral palsy Leprosy Syphilis (tabes dorsalis), caused by the organism Treponema pallidum Spinal cord injury Myelomeningocele Syringomyelia Intra-articular steroid injections Congenital insensitivity to pain Peroneal muscular atrophy Patients with neurosyphilis tend to have knee involvement, and patients with syringomyelia of the spinal cord may demonstrate shoulder deformity.Hirsch M et al. , \" Neuropathic osteoarthropathy of the shoulder secondary to syringomyelia \" . URL Stage 2: Decreased local edema, with coalescence of fragments and absorption of fine bone debris . Treatment Once the process is recognized, it should be treated via the VIPs \u2014 vascular management, infection management and prevention, and pressure relief. Aggressively pursuing these three strategies will progress the healing trajectory of the wound.Snyder, R.J., et al., \" The management of diabetic foot ulcers through optimal off-loading building consensus guidelines and practical recommendations to improve outcomes \". Journal of the American Podiatric Medical Association , 2014. 104(6): p. 555-567 . Pressure relief ( offloading ) and immobilization with total contact casting (TCC) are critical to helping ward off further joint destruction. TCC involves encasing the patient's complete foot, including toes, and the lower leg in a specialist cast that redistributes weight and pressure in the lower leg and foot during everyday movements. This redistributes pressure from the foot into the leg, which is more able to bear weight, to protect the wound, letting it regenerate tissue and heal.Raspovic, A. and K.B. Landorf, \" A survey of offloading practices for diabetes-related plantar neuropathic foot ulcers \". Journal of Foot and Ankle Research , 2014. 7: p. 35. TCC also keeps the ankle from rotating during walking, which prevents shearing and twisting forces that can further damage the wound.Snyder, R.J., et al., \" The management of diabetic foot ulcers through optimal off-loading building consensus guidelines and practical recommendations to improve outcomes \". Journal of the American Podiatric Medical Association , 2014. 104(6): p. 555-567 . TCC aids maintenance of quality of life by helping patients to remain mobile.Farid K, Farid M, Andrews CM. \" Total contact casting as part of an adaptive care approach: a case study \" . Ostomy Wound Management, 2008. 54(6): 50\u201365. Walking braces controlled by pneumatics are also used. In these patients, surgical correction of a joint is rarely successful in the long term . However, offloading alone does not translate to optimal outcomes without appropriate management of vascular disease and/or infection.Snyder, R.J. et al., \" The management of diabetic foot ulcers through optimal off-loading building consensus guidelines and practical recommendations to improve outcomes \". Journal of the American Podiatric Medical Association , 2014. 104(6): p. 555-567 . Duration and aggressiveness of offloading (non-weight-bearing vs. weight-bearing, non-removable vs. removable device) should be guided by clinical assessment of healing of neuropathic arthropathy based on edema, erythema, and skin temperature changes.Rogers LC et al. \" The Charcot foot in diabetes \" . Diabetes Care. 2011;34(9):2123\u20139. It can take six to nine months for the edema and erythema of the affected joint to recede. Outcome Outcomes vary depending on the location of the disease, the degree of damage to the joint, and whether surgical repair was necessary. Average healing times vary from 55 to 97 days , depending on location. Up to one to two years may be required for complete healing. Further reading %DIFDELCMD < %DIFDELCMD < %%% Neuropathic osteoarthropathy by Monica Bhargava, M.D., University of Washington Department of Radiology", "edit_actions": [{"type": "R", "before": "weight bearing", "after": "weight-bearing", "start_char_pos": 201, "end_char_pos": 215}, {"type": "R", "before": ". Related", "after": "; related", "start_char_pos": 627, "end_char_pos": 636}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1088, "end_char_pos": 1089}, {"type": "A", "before": null, "after": ", \"", "start_char_pos": 1097, "end_char_pos": 1097}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 1170, "end_char_pos": 1170}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1274, "end_char_pos": 1274}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 1549, "end_char_pos": 1549}, {"type": "R", "before": ". J Am Podiatr Med Assoc", "after": "\". Journal of the American Podiatric Medical Association", "start_char_pos": 1697, "end_char_pos": 1721}, {"type": "R", "before": "555-67", "after": "555-567", "start_char_pos": 1741, "end_char_pos": 1747}, {"type": "R", "before": "off-loading", "after": "offloading", "start_char_pos": 1768, "end_char_pos": 1779}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2274, "end_char_pos": 2274}, {"type": "R", "before": ". J Foot Ankle Res", "after": "\". Journal of Foot and Ankle Research", "start_char_pos": 2361, "end_char_pos": 2379}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2553, "end_char_pos": 2553}, {"type": "R", "before": ". J Am Podiatr Med Assoc", "after": "\". Journal of the American Podiatric Medical Association", "start_char_pos": 2701, "end_char_pos": 2725}, {"type": "R", "before": "555-67", "after": "555-567", "start_char_pos": 2745, "end_char_pos": 2751}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2861, "end_char_pos": 2861}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2935, "end_char_pos": 2935}, {"type": "R", "before": "Manage. 2008;", "after": "Management, 2008.", "start_char_pos": 2951, "end_char_pos": 2964}, {"type": "R", "before": "Surgical", "after": "In these patients, surgical", "start_char_pos": 3034, "end_char_pos": 3042}, {"type": "R", "before": "long-term in these patients", "after": "long term", "start_char_pos": 3093, "end_char_pos": 3120}, {"type": "R", "before": "off-loading", "after": "offloading", "start_char_pos": 3132, "end_char_pos": 3143}, {"type": "D", "before": ",", "after": null, "start_char_pos": 3270, "end_char_pos": 3271}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 3280, "end_char_pos": 3280}, {"type": "R", "before": ". J Am Podiatr Med Assoc", "after": "\". Journal of the American Podiatric Medical Association", "start_char_pos": 3428, "end_char_pos": 3452}, {"type": "R", "before": "555-67", "after": "555-567", "start_char_pos": 3472, "end_char_pos": 3478}, {"type": "D", "before": ",", "after": null, "start_char_pos": 3742, "end_char_pos": 3743}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 3751, "end_char_pos": 3751}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 3781, "end_char_pos": 3781}, {"type": "R", "before": "6\u20139", "after": "six to nine", "start_char_pos": 3830, "end_char_pos": 3833}, {"type": "R", "before": "\u2013", "after": "to", "start_char_pos": 4078, "end_char_pos": 4079}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4088, "end_char_pos": 4088}, {"type": "R", "before": "1\u20132", "after": "one to two", "start_char_pos": 4118, "end_char_pos": 4121}], "sents_char_pos": [0, 326, 354, 676, 1079, 1096, 1431, 1527, 1893, 2091, 2243, 2397, 2531, 2831, 2860, 2937, 2958, 2978, 3033, 3122, 3257, 3732, 3750, 3798, 3817, 3900, 4042, 4111, 4165]}
+{"doc_id": "24169585", "revision_depth": "1", "before_revision": "Benjamin Harjo Jr. (born 1945 ) is an internationally-known Absentee Shawnee-Seminole painter and printmaker from Oklahoma.Lester, 220-1 Background Harjo is half-Seminole and half-Shawnee and is enrolled in the Absentee Shawnee Tribe of Oklahoma . Harjo's father was the late Benjamin Harjo Sr., a full blood Seminole. Harjo's mother, Viola Harjo was from Byng, Oklahoma. Viola's father was William F. Harjo, who graduated from Chilocco Indian School in 1939. Viola married Benjamin Harjo Jr. 's stepfather, Roman Harjo (1924\u20132006) in 1954 at Clovis , New Mexico .Guin, Wayne. \"Obituaries December 12, 2006.\" ' Ada Evening News ' . 12 Dec 2006 (30 Aug 2009). The name Harjo means \"Crazy\" in the Muscogee languageand is part of a military title, Chitto Harjo or \"Crazy snake.\"Chitto Harjo. Chronicles of Oklahoma. Volume 13, Number 2, Page 139. June 1935 (retrieved 30 Aug 2009) Harjo was born on September 19, 1945 in Clovis, New Mexico. When his family moved back to Oklahoma, Harjo lived with his maternal grandparents, Emmett and Ruth Wood, from when he was aged 10 to 18.Painter, Bryan. Going Home: Ben Harjo Jr. 'NewsOK'. 23 Nov 2007 (30 Aug 2009) Education and military service Harjo's first passion was cartooning, and he sold comics to his high school newspaper. Interested in pursuing a professional career in cartoon animation, Harjo went to the Institute of American Indian Arts in 1966, only to discover that their animation program no longer existed . Little Thunder, 7 He stayed at IAIA anyway and earned his Associate of Arts degree. His classmates included such luminaries as T. C. Cannon and Linda Lomahaftewa . Seymour Tubis was his most influential teacher, who taught him low-tech but highly effective printmaking techniques.Little Thunder, 10 In 1969 was drafted into the US Army and served honorably in the Vietnam War . from 1969 to 1971. Upon his release from the military, Harjo continuing his art education and attended Oklahoma State University and graduated with a BFA degree in 1974.Smiley, Lori and Stephanie Lusher. \"Ben Harjo Jr.\" 'NDN Art Gallery.' (retrieved 30 Aug 2009 Harjo has said, When you're traveling down the highway, you see an image whether it's dirt on the back of a truck or a splat on a windshield or two birds sitting by the side of the road picking at something. All those things have inspired me at some point in my creativity. And he summarizes his artistic philosophy: It has always been my contention that one's art speaks from the soul of the artist and remains viable and open to the influences of the artist's environment. Forms, colors, and movement keep it from stagnating and allow it to grow as the artist matures and develops. I feel that my art covers a wide range of emotions, from serious to humorous, and that the colors I used radiate a sense of happiness and joy. Public collections His artwork can be found in the many public collections, including the following: Gilcrease Museum, Tulsa, OK Mabee-Gerrer Museum of Art, Shawnee, OK Sam Noble Oklahoma Museum of Natural History, Norman, OK US Embassy, Mogadishu, SomaliaMcFadden and Taubman, 245 Sequoyah National Research Center, Little Rock, AR Oklahoma State University Museum of Art Stillwater, OK Awards and honors Harjo was the 2005 poster artist for SWAIA's Santa Fe Indian Market , where he has consistently won top awards , including Best of Show, since 1983. In 1987 he won the Red Earth Grand Award. He was the 1993 Heard Museum's 34th Annual Featured Artist, the Featured Artist in 1992 and 1993 for the Smithsonian's National Museum of the American Indian's Annual Aspen Benefit, and the Gold Medal Award at the 1990 American Indian Cowboy Artists Wichita Show.Benjamin Harjo Jr. Mittie Cooper Gallery. (retrieved 30 Aug 2009) Oklahoma Governor David Walters honored Harjo for his selection by Absolut Vodka to represent Oklahoma in its USA Today advertising campaign. In 1992, Harjo showed his work at the Franco-American Institute in Rennes, France. In 1991, the Wichita Art Museum held a solo exhibition of his work , and the Wheelwright Museum of the American Indian hosted a major retrospective of Harjo's work, entitled \" The Earth, the Moon, and the Stars Above. \" At a January 2010 solo exhibition at his alma mater, the Oklahoma State University , Harjo donated all proceeds of his art sales to OSU's Art Department.\"OSU Alumnus Gives Back, Shows Art on Campus: Benjamin Harjo Jr. exhibiting, selling \"Art and Soul.\" Oklahoma State University Foundation News. (retrieved 22 Jan 2010) External links Benjamin Harjo Jr.: American Indian Artist, official website The Earth, the Moon, and the Stars Above: Benjamin Harjo Jr., Wheelwright Museum of the American Indian Benjamin Harjo Jr.: We Are a Landscape of All We Know, OSU Museum of Art Oral History Interview with Benjamin Harjo Jr. at Oklahoma State University Native Artists Oral History Project", "after_revision": "Benjamin Harjo , Jr. (born 1945 , Absentee Shawnee-Seminole Nation ) is an internationally known painter and printmaker based in Oklahoma.Lester, 220-1 Background Benjamin Harjo, Jr. is half-Seminole and half-Shawnee in ancestry; he is enrolled in the Absentee Shawnee Tribe of Oklahoma ,, which are his mother's people . Harjo's father was the late Benjamin Harjo Sr., a full-blood Seminole. Harjo's mother, Viola Harjo , was from Byng, Oklahoma. Her father was William F. Harjo, who graduated from Chilocco Indian School in 1939. Benjamin Harjo Jr. was born on September 19, 1945 in Clovis, New Mexico. Viola married Roman Harjo (1924\u20132006) , in 1954 at Clovis ; he became the stepfather of Benjamin Jr .Guin, Wayne. \"Obituaries December 12, 2006.\" Ada Evening News . 12 Dec 2006 (30 Aug 2009). The name Harjo means \"Crazy\" in the Muskogee language, which was spoken by both the Muscogee (Creek) people and the Seminole, who had formed from Creek and other peoples. The word is part of a military title, Chitto Harjo , meaning \"Crazy snake.\"Chitto Harjo. Chronicles of Oklahoma. Volume 13, Number 2, Page 139. June 1935 (retrieved 30 Aug 2009) After his family moved back to Oklahoma, Harjo lived with his maternal grandparents, Emmett and Ruth Wood, from the age of 10 to 18.Painter, Bryan. Going Home: Ben Harjo Jr. 'NewsOK'. 23 Nov 2007 (30 Aug 2009) Education and military service Harjo's first passion was cartooning, and he sold comics to his high school newspaper. Interested in pursuing a professional career in cartoon animation, Harjo went to the Institute of American Indian Arts in 1966. There he discovered that they had discontinued their animation program at IAIA . Little Thunder, 7 He expanded his studies and earned his Associate of Arts degree. His classmates included T. C. Cannon and Linda Lomahaftewa , who have become noted artists . Seymour Tubis was his most influential teacher, and taught him low-tech but highly effective printmaking techniques.Little Thunder, 10 In 1969 Harjo was drafted into the US Army ; he served honorably in the Vietnam War from 1969 to 1971. Upon his release from the military, Harjo continued his art education . He attended Oklahoma State University and graduated with a BFA degree in 1974.Smiley, Lori and Stephanie Lusher. \"Ben Harjo Jr.\" 'NDN Art Gallery.' (retrieved 30 Aug 2009 Harjo has said, \" When you're traveling down the highway, you see an image whether it's dirt on the back of a truck or a splat on a windshield or two birds sitting by the side of the road picking at something. All those things have inspired me at some point in my creativity. \" He summarizes his artistic philosophy: \" It has always been my contention that one's art speaks from the soul of the artist and remains viable and open to the influences of the artist's environment. Forms, colors, and movement keep it from stagnating and allow it to grow as the artist matures and develops. I feel that my art covers a wide range of emotions, from serious to humorous, and that the colors I used radiate a sense of happiness and joy. \" Public collections His artwork can be found in many public collections, including the following: Gilcrease Museum, Tulsa, Oklahoma (OK) Mabee-Gerrer Museum of Art, Shawnee, OK Sam Noble Oklahoma Museum of Natural History, Norman, OK US Embassy, Mogadishu, SomaliaMcFadden and Taubman, 245 Sequoyah National Research Center, Little Rock, Arkansas Oklahoma State University Museum of Art Stillwater, OK Awards and honors Harjo was the 2005 poster artist for SWAIA's Santa Fe Indian Market . He has consistently worn top awards there , including Best of Show, since 1983. In 1987 he won the Red Earth Grand Award. He was the 1993 Heard Museum's 34th Annual Featured Artist, the Featured Artist in 1992 and 1993 for the Smithsonian's National Museum of the American Indian's Annual Aspen Benefit, and the Gold Medal Award at the 1990 American Indian Cowboy Artists Wichita Show.Benjamin Harjo Jr. Mittie Cooper Gallery. (retrieved 30 Aug 2009) Oklahoma Governor David Walters honored Harjo for his selection by Absolut Vodka to represent Oklahoma in its USA Today advertising campaign. Exhibits 1992, Franco-American Institute in Rennes, France. In 1991, the Wichita Art Museum held a solo exhibition of his work . 1991, the Wheelwright Museum of the American Indian hosted a major retrospective of Harjo's work, entitled The Earth, the Moon, and the Stars Above. January 2010 , solo exhibition at Oklahoma State University : Harjo donated all proceeds of his art sales to OSU's Art Department.\"OSU Alumnus Gives Back, Shows Art on Campus: Benjamin Harjo Jr. exhibiting, selling \"Art and Soul.\" Oklahoma State University Foundation News. (retrieved 22 Jan 2010) External links Benjamin Harjo Jr.: American Indian Artist, official website The Earth, the Moon, and the Stars Above: Benjamin Harjo Jr., Wheelwright Museum of the American Indian Benjamin Harjo Jr.: We Are a Landscape of All We Know, OSU Museum of Art Oral History Interview with Benjamin Harjo Jr. , Oklahoma State University Native Artists Oral History Project", "edit_actions": [{"type": "A", "before": null, "after": ",", "start_char_pos": 15, "end_char_pos": 15}, {"type": "A", "before": null, "after": ", Absentee Shawnee-Seminole Nation", "start_char_pos": 31, "end_char_pos": 31}, {"type": "R", "before": "internationally-known Absentee Shawnee-Seminole", "after": "internationally known", "start_char_pos": 40, "end_char_pos": 87}, {"type": "R", "before": "from", "after": "based in", "start_char_pos": 111, "end_char_pos": 115}, {"type": "R", "before": "Harjo", "after": "Benjamin Harjo, Jr.", "start_char_pos": 150, "end_char_pos": 155}, {"type": "R", "before": "and", "after": "in ancestry; he", "start_char_pos": 190, "end_char_pos": 193}, {"type": "A", "before": null, "after": ",, which are his mother's people", "start_char_pos": 248, "end_char_pos": 248}, {"type": "R", "before": "full blood", "after": "full-blood", "start_char_pos": 301, "end_char_pos": 311}, {"type": "A", "before": null, "after": ",", "start_char_pos": 350, "end_char_pos": 350}, {"type": "R", "before": "Viola's", "after": "Her", "start_char_pos": 376, "end_char_pos": 383}, {"type": "D", "before": "Viola married", "after": null, "start_char_pos": 464, "end_char_pos": 477}, {"type": "R", "before": "'s stepfather,", "after": "was born on September 19, 1945 in Clovis, New Mexico. Viola married", "start_char_pos": 497, "end_char_pos": 511}, {"type": "A", "before": null, "after": ",", "start_char_pos": 536, "end_char_pos": 536}, {"type": "R", "before": ", New Mexico", "after": "; he became the stepfather of Benjamin Jr", "start_char_pos": 555, "end_char_pos": 567}, {"type": "D", "before": "'", "after": null, "start_char_pos": 614, "end_char_pos": 615}, {"type": "D", "before": "'", "after": null, "start_char_pos": 633, "end_char_pos": 634}, {"type": "R", "before": "Muscogee languageand", "after": "Muskogee language, which was spoken by both the Muscogee (Creek) people and the Seminole, who had formed from Creek and other peoples. The word", "start_char_pos": 700, "end_char_pos": 720}, {"type": "R", "before": "or", "after": ", meaning", "start_char_pos": 763, "end_char_pos": 765}, {"type": "R", "before": "Harjo was born on September 19, 1945 in Clovis, New Mexico. When", "after": "After", "start_char_pos": 883, "end_char_pos": 947}, {"type": "R", "before": "when he was aged", "after": "the age of", "start_char_pos": 1054, "end_char_pos": 1070}, {"type": "R", "before": "1966, only to discover that", "after": "1966. There he discovered that they had discontinued", "start_char_pos": 1398, "end_char_pos": 1425}, {"type": "R", "before": "no longer existed", "after": "at IAIA", "start_char_pos": 1450, "end_char_pos": 1467}, {"type": "R", "before": "stayed at IAIA anyway", "after": "expanded his studies", "start_char_pos": 1491, "end_char_pos": 1512}, {"type": "D", "before": "such luminaries as", "after": null, "start_char_pos": 1578, "end_char_pos": 1596}, {"type": "A", "before": null, "after": ", who have become noted artists", "start_char_pos": 1632, "end_char_pos": 1632}, {"type": "R", "before": "who", "after": "and", "start_char_pos": 1683, "end_char_pos": 1686}, {"type": "A", "before": null, "after": "Harjo", "start_char_pos": 1778, "end_char_pos": 1778}, {"type": "R", "before": "and", "after": "; he", "start_char_pos": 1808, "end_char_pos": 1811}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1848, "end_char_pos": 1849}, {"type": "R", "before": "continuing", "after": "continued", "start_char_pos": 1911, "end_char_pos": 1921}, {"type": "R", "before": "and", "after": ". He", "start_char_pos": 1940, "end_char_pos": 1943}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2128, "end_char_pos": 2128}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2387, "end_char_pos": 2387}, {"type": "R", "before": "And he", "after": "He", "start_char_pos": 2388, "end_char_pos": 2394}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2431, "end_char_pos": 2431}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2842, "end_char_pos": 2842}, {"type": "D", "before": "the", "after": null, "start_char_pos": 2890, "end_char_pos": 2893}, {"type": "R", "before": "OK", "after": "Oklahoma (OK)", "start_char_pos": 2969, "end_char_pos": 2971}, {"type": "R", "before": "AR", "after": "Arkansas", "start_char_pos": 3173, "end_char_pos": 3175}, {"type": "R", "before": ", where he has consistently won top awards", "after": ". He has consistently worn top awards there", "start_char_pos": 3317, "end_char_pos": 3359}, {"type": "D", "before": "In", "after": null, "start_char_pos": 3911, "end_char_pos": 3913}, {"type": "A", "before": null, "after": "Exhibits", "start_char_pos": 3914, "end_char_pos": 3914}, {"type": "D", "before": "Harjo showed his work at the", "after": null, "start_char_pos": 3921, "end_char_pos": 3949}, {"type": "R", "before": ", and", "after": ". 1991,", "start_char_pos": 4062, "end_char_pos": 4067}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 4169, "end_char_pos": 4170}, {"type": "D", "before": "\" At a", "after": null, "start_char_pos": 4213, "end_char_pos": 4219}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4233, "end_char_pos": 4233}, {"type": "D", "before": "his alma mater, the", "after": null, "start_char_pos": 4253, "end_char_pos": 4272}, {"type": "R", "before": ",", "after": ":", "start_char_pos": 4299, "end_char_pos": 4300}, {"type": "R", "before": "at", "after": ",", "start_char_pos": 4837, "end_char_pos": 4839}], "sents_char_pos": [0, 125, 250, 321, 375, 463, 569, 581, 663, 779, 793, 817, 848, 942, 1080, 1095, 1131, 1275, 1553, 1751, 1868, 2019, 2053, 2320, 2386, 2589, 2698, 2841, 2943, 3397, 3439, 3703, 3744, 3910, 3994, 4212, 4370, 4469, 4512]}
+{"doc_id": "2432280", "revision_depth": "1", "before_revision": "Overview Meta learning is originally described by Donald B. Maudsley (1979) as \"the process by which learners become aware of and increasingly in control of habits of perception, inquiry, learning, and growth that they have internalized\".Maudsley, D. B. (1979). A Theory of Meta-Learning and Principles of Facilitation: An Organismic Perspective. University of Toronto, 1979. (40, 8,4354-4355-A) Maudsley sets the conceptual basis of his theory as synthesized under headings of assumptions, structures, change process, and facilitation. Five principles were enunciated to facilitate meta-learning . Learners must: (a) have a theory, however primitive; (b) work in a safe supportive social and physical environment; (c) discover their rules and assumptions; (d) reconnect with reality-information from the environment; and (e) reorganize themselves by changing their rules/assumptions. The idea of meta learning was later used by John Biggs (1985) to describe the state of \"being aware of and taking control of one \u2019 s own learning\".Biggs, J. B. (1985). The role of meta-learning in study process. British Journal of Educational Psychology, 55, 185-212. You can define meta learning as an awareness and understanding of the phenomenon of learning itself as opposed to subject knowledge. Implicit in this definition is the learner \u2019 s perception of the learning context, which includes knowing what the expectations of the discipline are and, more narrowly, the demands of a given learning task. Within this context, meta learning depends on the learner \u2019 s conceptions of learning, epistemological beliefs, learning processes and academic skills, summarized here as a learning approach . A student who has a high level of meta learning awareness is able to assess the effectiveness of her/his learning approach and regulate it according to the demands of the learning task. Conversely, a student who is low in meta learning awareness will not be able to reflect on her/his learning approach or the nature of the learning task set. In consequence, s/he will be unable to adapt successfully when studying becomes more difficult and demanding.(Norton et al. 2004) Conceptually, meta-learning is a mixture of understanding, processes, and attitudes. It includes the self-knowledge about how one learns, particularly an awareness of the learning strategies and behaviors applicable to a learning context (Jackson 2004; Bostr\u00f6m and Lassen 2006). It also includes \u2018knowl- edge of completion\u2019 , in which learners develop an appreciation of the knowledge that they have gained and an understanding of how to use this knowledge (Bostr\u00f6m and Lassen 2006). Meta-learning also relates to learners \u2019 attitudes, such as their belief that the way they self-regulate is the best way for them, and that they have the capacities and skills to apply their knowledge (Jackson 2004). Based on this perspective, meta \u2010 learning is an active, internal process in which a learner \u2019 s point of view regarding themselves and their surroundings will change and be regulated (Bostr\u00f6m and Lassen 2006; Winters 2011). Engaging effectively in meta-learning has been shown to improve academic performance (Biggs 1985). It has been suggested that aiding the metacognition of learning can help students to become more effective learners, as they become more aware of self-regulatory behaviours and begin to recognise the effectiveness of various strategies they use (Jackson 2004). Meta-learning can also be a very effective tool to assist students in becoming independently self-reflective (Biggs 1985; Winters 2011). As meta-learning relates to students \u2019 self-awareness regarding their learning processes, it is closely aligned to the self-regulation of learning (Zimmerman 2002; Winne 2010); that is, the thoughts, feelings and actions that students use to help them attain their academic goals (Zimmerman 2000). The meta learning model proposed by Losada is identical to the Lorenz system, which was originally proposed as a simplified mathematical model for atmospheric convection. It comprises one control parameter and three state variables, which in this case have been mapped to \"connectivity , \" \" inquiry-advocacy , \" \" positivity-negativity , \" and \"other-self\" (external-internal focus) respectively. The state variables are linked by a set of nonlinear differential equations.(Losada, 1999; Fredrickson & Losada, 2005; for a graphical representation of the meta learning model see Losada & Heaphy, 2004) This has been criticized as a poorly defined, poorly justified, and invalid application of differential equations. Losada and colleagues claim to have arrived at the meta-learning model from thousands of time series data generated at two human interaction laboratories in Ann Arbor, Michigan, and Cambridge, Massachusetts, although the details of the collection of this data, and the connection between the time series data and the model is unclear. These time series portrayed the interaction dynamics of business teams doing typical business tasks such as strategic planning. These teams were classified into three performing categories: high, medium and low. Performance was evaluated by the profitability of the teams, the level of satisfaction of their clients, and 360-degree evaluations. One proposed result of this theory is that there is a ratio of positivity-to-negativity of at least 2.9 (called the Losada line), which separates high from low performance teams as well as flourishing from languishing in individuals and relationships.(Fredrickson & Losada, 2005; Waugh & Fredrickson, 2006; Fredrickson, 2009) . Brown and colleagues pointed out that even if the proposed meta-learning model were valid, this ratio results from a completely arbitrary choice of model parameters \u2014 carried over from the literature on modeling atmospheric convection by Lorenz and others, without any justification. Meta-learning can also be a very effective tool to assist students in becoming independently self-reflective. Students will require feedback in order to reflect on their learning, strengths, and weaknesses. Meta-learning tasks will help students be more proactive and effective learners by focusing on developing self-awareness. Meta learning tasks would provide students with the opportunity to better understand their thinking processes in order to devise custom learning strategies. The goal is to find a set of parameters that work well across different tasks so that learners start with a bias that allows them to perform well despite receiving only a small amount of task-specific data. Tim Ferriss' DiSSS System Further reading Norton, L. & Walters, D (2005). Encouraging meta-learning through personal development planning: first year students\u2019 perceptions of what makes a really good student. PRIME (Pedagogical Research In Maximising Education), in-house journal, Liverpool Hope University, 1 (1) 109-124. Meyer, J. H. F. & Shanahan, M. P. (2004). Developing metalearning capacity in students \u2014 Actionable theory and practical lessons learned in first-year economics. Innovations in Education and Teaching International (Special issue: Meta learning in Higher Education), 41 (4) 443-458 Losada, M. (1999). The complex dynamics of high performance teams. Mathematical and Computer Modelling, 30 ( 9-10 ), pp. 179\u2013192. Losada, M. & Heaphy, E. (2004). The role of positivity and connectivity in the performance of business teams: A nonlinear dynamics model. American Behavioral Scientist, 47 (6), pp. 740\u2013765. Fredrickson, B. L. & Losada, M. (2005). Positive affect and the complex dynamics of human flourishing. American Psychologist, 60 (7) 678-686. Waugh, C. E. & Fredrickson, B. L. (2006). Nice to know you: Positive emotions, self-other overlap, and complex understanding in the formation of a new relationship. The Journal of Positive Psychology, 1 (2), 93-106. Fredrickson, B. L. (2009). Positivity. Crown Publishers, New York. External links URL URL URL URL URL", "after_revision": "Overview Meta learning is originally described by Donald B. Maudsley (1979) as \"the process by which learners become aware of and increasingly in control of habits of perception, inquiry, learning, and growth that they have internalized\".Maudsley, D. B. (1979). A Theory of Meta-Learning and Principles of Facilitation: An Organismic Perspective. University of Toronto, 1979. (40, 8,4354-4355-A) Maudsley sets the conceptual basis of his theory as synthesized under headings of assumptions, structures, change process, and facilitation. Five principles were enunciated to facilitate meta learning . Learners must: (a) have a theory, however primitive; (b) work in a safe supportive social and physical environment; (c) discover their rules and assumptions; (d) reconnect with reality-information from the environment; and (e) reorganize themselves by changing their rules/assumptions. The idea of meta learning was later used by John Biggs (1985) to describe the state of \"being aware of and taking control of one ' s own learning\".Biggs, J. B. (1985). The role of meta-learning in study process. British Journal of Educational Psychology, 55, 185\u2013212. Meta learning can be defined as an awareness and understanding of the phenomenon of learning itself as opposed to subject knowledge. Implicit in this definition is the learner ' s perception of the learning context, which includes knowing what the expectations of the discipline are and, more narrowly, the demands of a given learning task. Within this context, meta learning depends on the learner ' s conceptions of learning, epistemological beliefs, learning processes and academic skills, summarized here as a \"learning approach\" . A student who has a high level of meta learning awareness is able to assess the effectiveness of their learning approach and regulate it according to the demands of the learning task. Conversely, a student who is low in meta learning awareness will not be able to reflect on their learning approach or the nature of the learning task set. In consequence, the student will be unable to adapt successfully when studying becomes more difficult and demanding.(Norton et al. 2004) Conceptually, meta learning is a mixture of understanding, processes, and attitudes. It includes the self-knowledge about how one learns, particularly an awareness of the learning strategies and behaviors applicable to a learning context (Jackson 2004; Bostr\u00f6m and Lassen 2006). It also includes 'knowledge of completion' , in which learners develop an appreciation of the knowledge that they have gained and an understanding of how to use this knowledge (Bostr\u00f6m and Lassen 2006). Meta learning also relates to learners ' attitudes, such as their belief that the way they self-regulate is the best way for them, and that they have the capacities and skills to apply their knowledge (Jackson 2004). Based on this perspective, meta learning is an active, internal process in which a learner ' s point of view regarding themselves and their surroundings will change and be regulated (Bostr\u00f6m and Lassen 2006; Winters 2011). Engaging effectively in meta learning has been shown to improve academic performance (Biggs 1985). It has been suggested that aiding the metacognition of learning can help students to become more effective learners, as they become more aware of self-regulatory behaviours and begin to recognise the effectiveness of various strategies they use (Jackson 2004). Meta learning can also be a very effective tool to assist students in becoming independently self-reflective (Biggs 1985; Winters 2011). As meta learning relates to students ' self-awareness regarding their learning processes, it is closely aligned to the self-regulation of learning (Zimmerman 2002; Winne 2010); that is, the thoughts, feelings and actions that students use to help them attain their academic goals (Zimmerman 2000). The meta learning model proposed by Losada is identical to the Lorenz system, which was originally proposed as a simplified mathematical model for atmospheric convection. It comprises one control parameter and three state variables, which in this case have been mapped to \"connectivity \" , \" inquiry-advocacy \" , \" positivity-negativity \" , and \"other-self\" (external-internal focus) respectively. The state variables are linked by a set of nonlinear differential equations.(Losada, 1999; Fredrickson & Losada, 2005; for a graphical representation of the meta learning model see Losada & Heaphy, 2004) This has been criticized as a poorly defined, poorly justified, and invalid application of differential equations. Losada and colleagues claim to have arrived at the meta learning model from thousands of time series data generated at two human interaction laboratories in Ann Arbor, Michigan, and Cambridge, Massachusetts, although the details of the collection of this data, and the connection between the time series data and the model is unclear. These time series portrayed the interaction dynamics of business teams doing typical business tasks such as strategic planning. These teams were classified into three performance categories: high, medium and low. Performance was evaluated by the profitability of the teams, the level of satisfaction of their clients, and 360-degree evaluations. One proposed result of this theory is that there is a ratio of positivity-to-negativity of at least 2.9 (called the Losada line), which separates high from low performance teams as well as flourishing from languishing in individuals and relationships.(Fredrickson & Losada, 2005; Waugh & Fredrickson, 2006; Fredrickson, 2009) Brown and colleagues pointed out that even if the proposed meta-learning model were valid, this ratio results from a completely arbitrary choice of model parameters carried over from the literature on modeling atmospheric convection by Lorenz and others, without any justification. Meta learning can also be a very effective tool to assist students in becoming independently self-reflective. Students will require feedback in order to reflect on their learning, strengths, and weaknesses. Meta learning tasks will help students be more proactive and effective learners by focusing on developing self-awareness. Meta learning tasks would provide students with the opportunity to better understand their thinking processes in order to devise custom learning strategies. The goal is to find a set of parameters that work well across different tasks so that learners start with a bias that allows them to perform well despite receiving only a small amount of task-specific data. Tim Ferriss' s DiSSS System Further reading Norton, L. & Walters, D . (2005). Encouraging meta-learning through personal development planning: first year students\u2019 perceptions of what makes a really good student. PRIME (Pedagogical Research In Maximising Education), in-house journal, Liverpool Hope University, 1 (1) 109\u2013124. Meyer, J. H. F. & Shanahan, M. P. (2004). Developing metalearning capacity in students \u2014 Actionable theory and practical lessons learned in first-year economics. Innovations in Education and Teaching International (Special issue: Meta learning in Higher Education), 41 (4) 443\u2013458. Losada, M. (1999). The complex dynamics of high performance teams. Mathematical and Computer Modelling, 30 ( 9\u201310 ), pp. 179\u2013192. Losada, M. & Heaphy, E. (2004). The role of positivity and connectivity in the performance of business teams: A nonlinear dynamics model. American Behavioral Scientist, 47 (6), pp. 740\u2013765. Fredrickson, B. L. & Losada, M. (2005). Positive affect and the complex dynamics of human flourishing. American Psychologist, 60 (7) 678\u2013686. Waugh, C. E. & Fredrickson, B. L. (2006). Nice to know you: Positive emotions, self-other overlap, and complex understanding in the formation of a new relationship. The Journal of Positive Psychology, 1 (2), 93\u2013106. Fredrickson, B. L. (2009). Positivity. Crown Publishers, New York. External links Summary of meta learning research by Dr. Losada Comment from Losada about executives implementing the model Article about meta learning from Losada (part 1) Article about meta learning from Losada (part 2) Comment from Losada about negativity in the workplace", "edit_actions": [{"type": "R", "before": "meta-learning", "after": "meta learning", "start_char_pos": 583, "end_char_pos": 596}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1014, "end_char_pos": 1015}, {"type": "R", "before": "185-212. You can define meta learning", "after": "185\u2013212. Meta learning can be defined", "start_char_pos": 1144, "end_char_pos": 1181}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1329, "end_char_pos": 1330}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1552, "end_char_pos": 1553}, {"type": "R", "before": "learning approach", "after": "\"learning approach\"", "start_char_pos": 1667, "end_char_pos": 1684}, {"type": "R", "before": "her/his", "after": "their", "start_char_pos": 1784, "end_char_pos": 1791}, {"type": "R", "before": "her/his", "after": "their", "start_char_pos": 1964, "end_char_pos": 1971}, {"type": "R", "before": "s/he", "after": "the student", "start_char_pos": 2046, "end_char_pos": 2050}, {"type": "R", "before": "meta-learning", "after": "meta learning", "start_char_pos": 2174, "end_char_pos": 2187}, {"type": "R", "before": "\u2018knowl- edge of completion\u2019", "after": "'knowledge of completion'", "start_char_pos": 2456, "end_char_pos": 2483}, {"type": "R", "before": "Meta-learning", "after": "Meta learning", "start_char_pos": 2644, "end_char_pos": 2657}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2683, "end_char_pos": 2684}, {"type": "D", "before": "\u2010", "after": null, "start_char_pos": 2893, "end_char_pos": 2894}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2954, "end_char_pos": 2955}, {"type": "R", "before": "meta-learning", "after": "meta learning", "start_char_pos": 3110, "end_char_pos": 3123}, {"type": "R", "before": "Meta-learning", "after": "Meta learning", "start_char_pos": 3446, "end_char_pos": 3459}, {"type": "R", "before": "meta-learning", "after": "meta learning", "start_char_pos": 3586, "end_char_pos": 3599}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3620, "end_char_pos": 3621}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 4167, "end_char_pos": 4167}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 4172, "end_char_pos": 4173}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 4191, "end_char_pos": 4191}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 4196, "end_char_pos": 4197}, {"type": "D", "before": ",", "after": null, "start_char_pos": 4220, "end_char_pos": 4221}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4224, "end_char_pos": 4224}, {"type": "R", "before": "meta-learning", "after": "meta learning", "start_char_pos": 4652, "end_char_pos": 4665}, {"type": "R", "before": "performing", "after": "performance", "start_char_pos": 5103, "end_char_pos": 5113}, {"type": "D", "before": ".", "after": null, "start_char_pos": 5607, "end_char_pos": 5608}, {"type": "D", "before": "\u2014", "after": null, "start_char_pos": 5774, "end_char_pos": 5775}, {"type": "R", "before": "Meta-learning", "after": "Meta learning", "start_char_pos": 5893, "end_char_pos": 5906}, {"type": "R", "before": "Meta-learning", "after": "Meta learning", "start_char_pos": 6100, "end_char_pos": 6113}, {"type": "A", "before": null, "after": "s", "start_char_pos": 6599, "end_char_pos": 6599}, {"type": "A", "before": null, "after": ".", "start_char_pos": 6653, "end_char_pos": 6653}, {"type": "R", "before": "109-124.", "after": "109\u2013124.", "start_char_pos": 6902, "end_char_pos": 6910}, {"type": "R", "before": "443-458", "after": "443\u2013458.", "start_char_pos": 7184, "end_char_pos": 7191}, {"type": "R", "before": "9-10", "after": "9\u201310", "start_char_pos": 7301, "end_char_pos": 7305}, {"type": "R", "before": "678-686.", "after": "678\u2013686.", "start_char_pos": 7645, "end_char_pos": 7653}, {"type": "R", "before": "93-106.", "after": "93\u2013106.", "start_char_pos": 7862, "end_char_pos": 7869}, {"type": "R", "before": "URL URL URL URL URL", "after": "Summary of meta learning research by Dr. Losada Comment from Losada about executives implementing the model Article about meta learning from Losada (part 1) Article about meta learning from Losada (part 2) Comment from Losada about negativity in the workplace", "start_char_pos": 7952, "end_char_pos": 7971}], "sents_char_pos": [0, 238, 261, 346, 536, 651, 714, 756, 817, 884, 1032, 1052, 1096, 1152, 1285, 1493, 1872, 2029, 2139, 2244, 2412, 2438, 2643, 2860, 3070, 3085, 3184, 3445, 3567, 3582, 3746, 3759, 3880, 4051, 4281, 4358, 4372, 4400, 4600, 4935, 5063, 5147, 5280, 5532, 5560, 5587, 5892, 6002, 6099, 6221, 6378, 6585, 6661, 6796, 6910, 6952, 7072, 7210, 7258, 7321, 7353, 7459, 7511, 7551, 7614, 7653, 7695, 7818, 7869, 7896, 7908, 7936]}
+{"doc_id": "24464731", "revision_depth": "2", "before_revision": "Terminology The glyph ancestral to modern is first recorded in bronze script, where it could refer to shamans or sorcerers of either sex. Modern Mandarin wu (Cantonese mouh) continues a Middle Chinese mju or mjo. The Old Chinese reconstruction is uncertain, given as *mywo or as *myag, Bernhard Karlgren), mjuo < * (Zhou Fagao), *mjag (Li Fanggui), mju < *ma (Axel Schuessler). the presence of a final velar -g or -\u0263 in Old Chinese being uncertain. Joseph Needham (1954:134) suggests \"shaman\" was transliterated xianmen in the name of Zou Yan's disciple Xianmen Gao (or Zigao ). He quotes the Shiji that Emperor Qin Shi Huang (r. 221\u2013210 BCE), \"wandered about on the shore of the eastern sea, and offered sacrifices to the famous mountains and the great rivers and the eight Spirits; and searched for xian \"immortals\", [xianmen], and the like.\" compares two later Chinese terms for \"shaman\": shanman , which described the Jurchen leader Wanyan Xiyin, and sizhu , which was used for imperial Manchu shamans during the Qing Dynasty. Translations Shaman is the common English translation of Chinese wu, but some scholars (; ) maintain that the Siberian shaman and Chinese wu were historically and culturally different shamanic traditions. Arthur Waley (1955:9) defines wu as \"spirit-intermediary\" and says, \"Indeed the functions of the Chinese wu were so like those of Siberian and Tunguz shamans that it is convenient (as has indeed been done by Far Eastern and European writers) to use shaman as a translation of wu. In contrast, describes the \"untranslatableness\" of wu, and prefers using the romanization \"wu instead of its contemporary English counterparts, \"witches,\" \"warlocks,\" or \"shamans\",\" which have misleading connotations. Taking wu to mean \"female shaman\", Edward H. Schafer translates it as (1951:153) \"shamaness\" and (1973:11) \"shamanka\". The transliteration-translation \"wu shaman\" or \"wu-shaman\" implies \"Chinese\" specifically and \"shamanism\" generally. Wu, concludes , \"may be rendered as \"shaman\" or, perhaps, less controversially as \"spirit medium\".\" criticizes \"the majority of scholars\" who use one word shaman to translate many Chinese terms (wu , xi , yi , xian , and zhu ), and writes, \"The general tendency to refer to all ecstatic religious functionaries as shamans blurs functional differences.\" Characters The contemporary Chinese character for wu combines the graphic radicals gong \"work\" and ren \"person\" doubled (cf. cong ). This character developed from Seal script characters that depicted dancing shamans, which descend from Bronzeware script and Oracle bone script characters that resembled a cross potent. The first Chinese dictionary of characters, the (121 CE) Shuowen Jiezi defines wu as zhu \"sacrifice; prayer master; invoker; priest\" (\"\" , ) and analyzes the Seal graph, \"An Invoker. A woman who can serve the Invisible, and by posturing bring down the spirits. Depicts a person with two sleeves posturing.\" This Seal graph for wu is interpreted as showing \"the \u5de5 work of two dancing figures set to each other \u2013 a shamanistic dance\" or \"two human figures facing some central object (possibly a pole, or in a tent-like enclosure?)\". This dictionary also includes a variant Great Seal script (called a guwen \"ancient script\") that elaborates wu . analyzes this guwen graph as gong \"two hands held upward\" at the bottom (like shi 's Seal graph) and two \"mouths\" with the \"sleeves\" on the sides; or (1920:424) \"jade\" because the Shuowen defines ling \"spiritual; divine\" as synonymous with wu and depicting , \"an inspired shaman serving the Spirits with jade.\" compares the Shang Dynasty oracle graphs for wu and nong \"play with; cause\" (written with \"jade\" over \"two hands\") that shows \"hands (of a shaman?) elevating a piece of jade (the rain-compelling mineral) inside an enclosure, possibly a tent. The Seal and modern form may well derive from this original, the hands becoming two figures, a convergence towards the dancer-type graph.\" Tu Baikui suggests that the wu oracle character \"was composed of two pieces of jade and originally designated a tool of divination.\" ( \"\" 2014 ; citing ) Citing Li Xiaoding that gong \u5de5 originally pictured a \"carpenter's square\", argues that oracle inscriptions used wu interchangeably with fang \"square; side; place\" for sacrifices to the sifang \"four directions\". proposed a relation between Mongolian b\u00fcg\u00e4 \"shaman\", Turkish b\u00f6g\u00fc \"shaman\", \"Chinese bu, wu (shaman), buk, puk (to divine), and Tibetan aba (pronounced ba, sorcerer)\". puts forward a Sino-Tibetan root * \"magician; sorcerer\" for Chinese w\u016b < mju < *mjag \"magician; shaman\" and Written Tibetan 'ba'-po \"sorcerer\" and 'ba'-mo \"sorcereress\" (of the B\u00f6n religion). notes Chinese xian < sj\u00e4n < *sen \"transcendent; immortal; alchemist\" was probably borrowed as Written Tibetan g\u0161en \"shaman\" and Thai < Proto-Tai * \"doctor; sorcerer\". In addition, the Mon\u2013Khmer and Proto-Western-Austronesian * \"shaman\" may also be connected with w\u016b. Schuessler lists four proposed etymologies: Secondly, wu could be cognate with w\u01d4 \"to dance\". Based on analysis of ancient characters, proposed that w\u016b \"shaman\", w\u00fa \"not have; without\", and w\u01d4 \"dance\", \"can all be traced back to one primitive figure of a man displaying by the gestures of his arms and legs the thaumaturgic powers of his inspired personality\" (1945:5) . Many Western Han Dynasty tombs contained jade plaques or pottery images showing \"long-sleeved dancers\" performing at funerals, who identifies as shamans, citing the Shuowen jiezi that early w\u01d4 characters depicted a dancer's sleeves. Thirdly, w\u016b could also be cognate with m\u01d4 \"mother\" since w\u016b, as opposed to x\u00ed , were typically female. Edward Schafer associates w\u016b shamanism with fertility rituals. \"Linguistic facts reveal the intimate relationships between the word wu (*myu) \"shamanka\" and such words as \"mother\", \"dance\", \"fertility\", \"egg\", and \"receptacle\". The ancient shamanka, then, was closely related to the fecund mother, to the fertile soil, to the receptive earth. The textual evidence supports these philological associations. In Shang and Chou times, shamankas were regularly employed in the interests of human and natural fertility, above all in bringing rain to parched farmlands \u2013 a responsibility they shared with ancient kings. They were musicians and dancers and oracles.\" . cites the Japanese sinologist Shirakawa Shizuka 's hypothesis that the mother of Confucius was a w\u016b. 120px|Drawing of the bronze script character w\u016b (*mjag). Fourthly, w\u016b could be a loanword from Iranian *magu\u0161 \"magus; magician\" (cf. Old Persian magu\u0161, Avestan mogu), meaning an \"able one; specialist in ritual\". Mair (1990) provides archaeological and linguistic evidence that Chinese w\u016b < *myag \"shaman; witch, wizard; magician\" was a loanword from Old Persian *magu\u0161 \"magician; magus\". Mair connects the bronze script character for w\u016b with the \"cross potent\" symbol \u2629 found in Neolithic West Asia, suggesting the loan of both the symbol and the word. Wu in Shang oracular inscriptions lists 58 occurrences of the character wu in concordance of oracle inscriptions: 32 in repeated compounds (most commonly \"wu spirit/sacrifice\" and \"bring the wu) and 26 in miscellaneous contexts. differentiates four meanings of these oracular wu: \"a spirit, wu of the north or east, to which sacrifices are offered\" \"a sacrifice, possibly linked to controlling the wind or meteorology\" \"an equivalent for shi , a form of divination using achilea\" \"a living human being, possibly the name of a person, tribe, place, or territory\" The inscriptions about this living wu, which is later identified as \"shaman\", reveal six characteristics:whether the wu is a man or a woman is not known; it could be either the name for a function or the name of a people (or an individual) coming from a definite territory or nation; the wu seems to have been in charge of some divinations, (in one instance, divination is linked to a sacrifice of appeasement); the wu is seen as offering a sacrifice of appeasement but the inscription and the fact that this kind of sacrifice was offered by other persons (the king included) suggests that the wu was not the person of choice to conduct all the sacrifices of appeasement; there is only one inscription where a direct link between the king and the wu appears. Nevertheless, the nature of the link is not known, because the status of the wu does not appear clearly; he follows (being brought, presumably, to Shang territory or court) the orders of other people; he is perhaps offered to the Shang as a tribute. Based on this ancient but limited Shang-era oracular record, it is unclear how or whether the Wu spirit, sacrifice, person, and place were related. As mentioned above, wu \"shaman\" was depicted in the ancient variant character for yi \"healer; doctor\". This archaic yi , writes , \"ideographically depicted a shaman-doctor in the act of exorcistical healing with ( 'arrows' in) a 'quiver', a 'hand holding a lance', and a wu 'shaman'.\" Unschuld believes this character depicts the type of wu practitioner described in the Liji. Several times a year, and also during certain special occasions, such as the funeral of a prince, hordes of exorcists would race shrieking through the city streets, enter the courtyards and homes, thrusting their spears into the air, in an attempt to expel the evil creatures. Prisoners were dismembered outside all gates to the city, to serve both as a deterrent to the demons and as an indication of their fate should they be captured. Replacing the exorcistical \"shaman\" in with medicinal \"wine\" in yi \"healer; doctor\" signified, writes , \"the practice of medicine was not any longer confined to the incantations of the wu, but that it had been taken over (from an official standpoint) by the \"priest-physicians,\" who administered elixirs or wines as treatments for their patients.\" Hexagram 32, Heng Wu and yi are compounded in the word wuyi \"shaman-doctor; shamans and doctors\", translated \"exorcising physician\", \"sorcerer-physician\", or \"physician-shaman\". Confucius quotes a \"Southern Saying\" that a good wuyi must have heng \"constancy; ancient tradition; continuation; perseverance; regularity; proper name (e.g., Yijing Hexagram 32)\". The (ca. 5th century BCE) Lunyu \"Confucian Analects\" and the (ca. 1st century BCE) Liji \"Record of Rites\" give different versions of the Southern Saying. Wu-shamans as rainmakers Wu anciently served as intermediaries with nature spirits believed to control rainfall and flooding. During a drought, wu-shamans would perform the yu \"sacrificial rain dance ceremony\". If that failed, both wu and wang \"cripple; lame person; emaciated person\" engaged in \"ritual exposure\" (Schafer 1951 rainmaking techniques based upon homeopathic or sympathetic magic. As explains, \"Shamans had to carry out an exhausting dance within a ring of fire until, sweating profusely, the falling drops of perspirations produced the desired rain.\" These wu and wang procedures were called pu / \"expose to open air/sun\", fen \"burn; set on fire\", and pulu \"reveal; lay bare; expose to open air/sun\". For the year 639 BCE, the Chunqiu records, \"In summer, there was a great drought\" in Lu, and the Zuozhuan notes a discussion about fen wu wang : The duke (Xi) wanted to burn a wu and a cripple at the stake. Zang Wenzhong said: this is no preparation for the drought. Repair the city walls, limit your food, be economic in your consumption, be parsimonious and advise (people) to share (the food), this is what must be done. What use would be wu and cripple? If Heaven wanted to have them killed, why were they born at all? If they (the cripple and the wu) could produce drought, burning them would augment very much (the disaster). (, citing ) The duke followed this advice, and subsequently \"scarcity was not very great\". The Liji uses the words puwang and puwu to describe a similar rainmaking ritual during the reign (407-375 BCE) of Duke Mu of Lu. There was a drought during the year. Duke Mu called on Xianzi and asked him about the reason for this. He said: 'Heaven has not (given us) rain in a long time. I want to expose to the sun a cripple and what about that?' (Xianzi) said: 'Heaven has not (given us) rain in a long time but to expose to the sun the crippled son of somebody, that would be cruel. No, this cannot be allowed.' (the duke said): 'Well, then I want to expose to the sun a wu and what about that?' (Xianzi) answered: 'Heaven has not (given us) rain in a long time but to put one's hope on an ignorant woman and offer her to pray (for rain), no, this is too far (from reason).' (, citing ) Commentators interpret the wu as a female shaman and the wang as a male cripple. First, in 581 BCE the lord of Jin, who had slain two officers from the Zhao () family, had a nightmare about their ancestral spirit, and called upon an unnamed wu \"shaman\" from Sangtian and a yi \"doctor\" named Huan from Qin. The marquis of [Jin] saw in a dream a great demon with disheveled hair reaching to the ground, which beat its breast, and leaped up, saying: \"You have slain my descendants unrighteously, and I have presented my request to the High God in consequence.\" It then broke the great gate (of the palace), advanced to the gate of the State chamber, and entered. The duke was afraid and went into a side-chamber, the door of which it also broke. The duke then awoke, and called the witch of [Sangtian], who told him everything which he had dreamt. \"What will be the issue?\" asked the duke. \"You will not taste the new wheat,\" she replied. After this, the duke became very ill, and asked the services of a physician from [Qin], the earl of which sent the physician [Huan] to do what he could for him. Before he came, the duke dreamt that his disease turned into two boys, who said, \"That is a skilful physician; it is to be feared he will hurt us; how shall we get out of his way?\" Then one of them said: \"If we take our place above the heart and below the throat, what can he do to us?\" When the physician arrived, he said, \"Nothing can be done for this disease. Its seat is above the heart and below the throat. If I assail it (with medicine), it will be of no use; if I attempt to puncture it, it cannot be reached. Nothing can be done for it.\" The duke said, \"He is a skilful physician\", gave him large gifts, and send him back to [Qin]. In the sixth month, on the day [bingwu], the marquis wished to taste the new wheat, and made the superintendent of his fields present some. While the baker was getting it ready, [the marquis] called the witch of [Sangtian], showed her the wheat and put her to death. As the marquis was about to taste the wheat, he felt it necessary to go to the privy, into which he fell, and so died. One of the servants that waited on him had dreamt in the morning that he carried the marquis on his back up to heaven. The same at mid-day carried him on his back out from the privy, and was afterwards buried alive with him. In this quote, \"witch\" is a translation of wu. Commentators have attempted to explain why the wu merely interpreted the duke's dream but did not perform a healing ritual or exorcism, and why the duke waited until the prediction had failed before ordering the execution. suggests the wu was executed in presumed responsibility for the Zhao ancestral spirit's attack. Second, in 552 BCE a wu named Gao both appears in and divines about a dream of Zhongxing Xianzi. After conspiring in the murder of Duke Li of Jin, Zhongxing dreams that the duke's spirit gets revenge. In autumn, the marquis of [Jin] invaded our northern border. [Zhongxing Xianzi] prepared to invade [Qi]. (Just then), he dreamt that he was maintaining a suit with duke [Li], in which the case was going against him, when the duke struck him with a [ge] on his head, which fell down before him. He took his head up, put it on his shoulders, and ran off, when he saw the wizard [Gao] of [Gengyang]. A day or two after, it happened that he did see this [Gao] on the road, and told him his dream, and the wizard, who had had the same dream, said to him: \"Your death is to happen about this time; but if you have business in the east, you will there be successful [first]\". Xianzi accepted this interpretation. In this quote, \"wizard\" is a translation of wu. Boileau questions: why wasn't the wu asked by Zhongxin to expel the spirit of the duke? Perhaps because the spirit went through him to curse the officer. Could it be that the wu was involved (his involvement is extremely strong in this affair) in a kind of deal, or is it simply that the wu was aware of two different matters concerning the officer, only one connected to the dream? (2002:369) According to these two stories, wu were feared and considered dangerous. This attitude is also evident in a Zhuangzi story about the shenwu \"spirit/god shaman\" Jixian from Zheng. In [Zheng], there was a shaman of the gods named [Jixian]. He could tell whether men would live or die, survive or perish, be fortunate or unfortunate, live a long time or die young, and he would predict the year, month, week, and day as though he were a god himself. When the people of [Zheng] saw him, they all ran out of his way. \"As soothsayers.\" writes , \"the wu in ancient China no doubt held a place of great importance.\" Wu-shamans as officials Sinological controversies have arisen over the political importance of wu in ancient China. Some scholars (like and ) believe Chinese wu used \"techniques of ecstasy\" like shamans elsewhere; others (like ) believe wu were \"ritual bureaucrats\" or \"moral metaphysicians\" who did not engage in shamanistic practices. Chen Mengjia wrote a seminal article (1936) that proposed Shang kings were wu-shamans. In the oracle bone inscriptions are often encountered inscriptions stating that the king divined or that the king inquired in connections with wind- or rain-storms, rituals, conquests, or hunts. There are also statements that \"the king made the prognostication that ...,\" pertaining to weather, the border regions, or misfortunes and diseases; the only prognosticator ever recorded in the oracle bone inscriptions was the king ... There are, in addition, inscriptions describing the king dancing to pray for rain and the king prognosticating about a dream. All of these were activities of both king and shaman, which means in effect that the king was a shaman. ( , cited in ) Chen's shaman-king hypothesis was supported by Kwang-chih Chang who cited the Guoyu story about Shao Hao severing heaven-earth communication (above). This myth is the most important textual reference to shamanism in ancient China, and it provides the crucial clue to understanding the central role of shamanism in ancient Chinese politics. Heaven is where all the wisdom of human affairs lies. ... Access to that wisdom was, of course, requisite for political authority. In the past, everybody had had that access through the shamans. Since heaven had been severed from earth, only those who controlled that access had the wisdom \u2013 hence the authority \u2013 to rule. Shamans, therefore, were a crucial part of every state court; in fact, scholars of ancient China agree that the king himself was actually head shaman. (1983:45) Some modern scholars disagree. For instance, calls Chen's hypothesis \"somewhat antiquated being based more on an a priori approach than on history\" and says, In the case of the relationship between wu and wang [king], Chen Mengjia did not pay sufficient attention to what the king was able to do as a king, that is to say, to the parts of the king's activities in which the wu was not involved, for example, political leadership as such, or warfare. The process of recognition must also be taken into account: it is probable that the wu was chosen or acknowledged as such according to different criteria to those adopted for the king. Chen's concept of the king as the head wu was influenced by Frazer's theories about the origin of political power: for Frazer the king was originally a powerful sorcerer. The Shujing \"Classic of History\" lists Wu Xian and Wu Xian as capable administrators of the Shang royal household. The Duke of Zhou tells Prince Shao that: I have heard that of ancient time, when King Tang had received the favoring decree, he had with him Yi Yin, making his virtue like that of great Heaven. Tai Jia, again, had Bao Heng. Tai Wu had Yi Zhi and Chen Hu, through whom his virtue was made to affect God; he had also [] Wu Xian, who regulated the royal house; Zu Yi had [] Wu Xian. Wu Ding had Gan Pan. These ministers carried out their principles and effected their arrangements, preserving and regulating the empire of [Shang], so that, while its ceremonies lasted, those sovereigns, though deceased, were assessors to Heaven, while it extended over many years. Names in this quote have been standardized to pinyin. According to Boileau, In some texts, Wu Xian senior is described as being in charge of the divination using [shi ] achilea. He was apparently made a high god in the kingdom of Qin during the Warring States period. The Tang subcommentary interprets the character wu of Wu Xian father and son as being a cognomen, the name of the clan from which the two Xian came. It is possible that in fact the text referred to two Shang ministers, father and son, coming from the same eponymous territory wu. Perhaps, later, the name (wu ) of these two ministers has been confused with the character wu () as employed in other received texts. Ever since Emperor Wu of Han established Confucianism as the state religion, the ruling classes have shown increasing prejudice against shamanism (, ) . Some modern writers view the traditional Confucianist disdain for female shamans as sexism. Schafer wrote: In the opinion of the writer, the Chou ruling class was particularly hostile to women in government, and regarded the ancient fertility rites as impure. This anti-female tendency was even more marked in the state of Lu, where Confucius approved of the official rain-ceremony in which men alone participated. There was, within ancient China, a heterogeneity of culture areas, with female shamans favored in some, males in others. The \"licentiousness\" of the ceremonies of such a state as Cheng (doubtless preserving the ancient Shang traditions and customs) was a byword among Confucian moralists. Confucius' state seems on the other hand to have taken the \"respectable\" attitude that the sexes should not mingle in the dance, and that men were the legitimate performers of the fertility rites. The general practice of the later Chou period, or at least the semi-idealized picture given of the rites of that time in such books as the Chou li, apparently prescribed a division of magical functions between men and women. The former generally play the role of exorcists, the latter of petitioners. This is probably related to the metaphysical belief that women, embodying the principle yin, were akin to the spirits, whereas men, exemplifying the element yang, were naturally hostile to them. Accepting the tradition that Chinese shamans were women (i.e., wu \"shamaness\" as opposed to xi \"shaman\"), Kagan believes: One of the main themes in Chinese history is the unsuccessful attempt by the male Confucian orthodoxy to strip women of their public and sacred powers and to limit them to a role of service ... Confucianists reasserted daily their claim to power and authority through the promotion of the phallic ancestor cult which denied women religious representation and excluded them from the governmental examination system which was the path to office, prestige, and status. In addition, refers to a \"Confucian medicine\" based upon systematic correspondences and the idea that illnesses are caused by excesses (rather than demons). The managerial Siwu, who was of Shi \"Gentleman; Yeoman\" feudal rank, yet was not a wu, supervised \"the many wu\". The Managers of the Spirit Mediums are in charge of the policies and orders issued to the many Spirit Mediums. When the country suffers a great drought, they lead the Spirit Mediums in dancing the rain-making ritual (yu ). When the country suffers a great calamity, they lead the Spirit Mediums in enacting the long-standing practices of Spirit Mediums (wuheng ). At official sacrifices, they [handle] the ancestral tablets in their receptacles, the cloth on which the spirits walk, and the box containing the reeds [for presenting the sacrificial foodstuffs]. In all official sacrificial services, they guard the place where the offerings are buried. In all funerary services, they are in charge of the rituals by which the Spirit Mediums make [the spirits] descend (jiang ). (, citing ) The Nanwu and N\u00fcwu have different shamanic specializations, especially regarding inauspicious events like sickness, death, and natural disaster. The Male Spirit Mediums are in charge of the si and yan Sacrifices to the Deities of the Mountains and Rivers. They receive the honorific titles [of the deities], which they proclaim into the [four] directions, holding reeds. In the winter, in the great temple hall, they offer [or: shoot arrows] without a fixed direction and without counting the number. In the spring, they make proclamations and issue bans so as to remove sickness and disease. When the king offers condolence, they together with the invocators precede him. The Female Mediums are in charge of anointing and ablutions at the exorcisms that are held at regular times throughout the year. When there is a drought or scorching heat, they dance in the rain-making ritual (yu). When the queen offers condolence, they together with the invocators precede her. In all great calamities of the state, they pray, singing and wailing. (part 26 , , citing ) The poetry anthology Chu Ci, especially its older pieces, is largely characterized by its shamanic content and style, as explicated to some extent by sinologist David Hawkes (2011: passim ). Among other points of interest are the intersection of Shamanic traditions and mythology/folk religion in the earlier textual material, such as Tianwen (possibly based on even more ancient shamanic temple murals), the whole question of the interpretation of the 11 verses of the Jiu Ge (Nine Songs) as the libretto of a shamanic dramatic performance, the motif of shamanic spirit flight from Li Sao through subsequent pieces, the evidence of possible regional variations in wu shamanism between Chu, Wei, Qi, and other states (or shamanic colleges associated with those regions), and the suggestion that some of the newer textual material was modified to please Han Wudi, by Liu An, the Prince of Huainan, or his circle. The Chu Ci contents have traditionally been chronologically divided into an older, pre-Han dynasty group, and those written during the Han Dynasty. Of the traditionally-considered to be the older works (omitting the mostly prose narratives, \"Bu Ju\" and \"Yu Fu\") David Hawkes considers the following sections to be \"functional, explicitly shamanistic\": Jiu Ge, Tian Wen, and the two shamanic summons for the soul, \"The Great Summons\" and \"Summons of the Soul\". Regarding the other, older pieces he considers that \"shamanism, if there is any\" to be an incidental poetic device, particularly in the form of descriptions of the shamanic spirit journey. In the Li Sao, two individual shaman are specified: Ling Fen () and Wu Xian (). This Wu Xian may or may not be the same as the (one or more) historical person(s) named Wu Xian. suggests an equation of the word ling in the Chu dialect with the word wu. In Shanhaijing (Classic of Mountains and Seas), the name of some individual shaman includes \"Wu\" () in the normal position of the family surname, for example, in the case of the following list, where the 6 are depicted together reviving a corpse, with Wu Peng holding the Herb of Immortality. Wu Peng and Wu Yang and others are also known from the Chu Ci poetry anthology. Wu Yang is the major speaker in Zhao Hun (also known as, Summons for the Soul). From : The six shamans receiving a corpse: Wu Yang (, \"Shaman Bright\"), Wu Peng (), Wu Di (), Wu Li () [Tang reconstruction *L\u01d0, Hanyu Pinyin L\u01da], Wu Fan (), Wu Xiang () Ten other individuals named Wu in Shanhaijing: Wu Xian (), Wu Ji (), Wu Fen (or Ban) (), Wu Peng (), Wu Gu (), Wu Zhen (), Wu Li (), Wu Di (), Wu Xie (), Wu Luo (). Aspects of Chinese folk religion are sometimes associated with \"shamanism\". provided descriptions and pictures of hereditary shamans in Fujian, called saigong (pinyin shigong) . analyzed tongji mediumistic activities in the Taiwanese village of Bao'an . References Notes Bibliography ", "after_revision": "Terminology The glyph ancestral to modern is first recorded in bronze script, where it could refer to shamans or sorcerers of either sex. Modern Mandarin wu (Cantonese mouh) continues a Middle Chinese mju or mjo. The Old Chinese reconstruction is uncertain, given as *mywo or as *myag, the presence of a final velar -g or -\u0263 in Old Chinese being uncertain. Joseph Needham suggests \"shaman\" was transliterated xianmen in the name of Zou Yan's disciple Xianmen Gao (or Zigao ). He quotes the Shiji that Emperor Qin Shi Huang (r. 221\u2013210 BCE), \"wandered about on the shore of the eastern sea, and offered sacrifices to the famous mountains and the great rivers and the eight Spirits; and searched for xian \"immortals\", [xianmen], and the like.\" Needham compares two later Chinese terms for \"shaman\": shanman , which described the Jurchen leader Wanyan Xiyin, and sizhu , which was used for imperial Manchu shamans during the Qing Dynasty. Translations Shaman is the common English translation of Chinese wu, but some scholars maintain that the Siberian shaman and Chinese wu were historically and culturally different shamanic traditions. Arthur Waley defines wu as \"spirit-intermediary\" and says, \"Indeed the functions of the Chinese wu were so like those of Siberian and Tunguz shamans that it is convenient (as has indeed been done by Far Eastern and European writers) to use shaman as a translation of wu. In contrast, Schiffeler describes the \"untranslatableness\" of wu, and prefers using the romanization \"wu instead of its contemporary English counterparts, \"witches,\" \"warlocks,\" or \"shamans\",\" which have misleading connotations. Taking wu to mean \"female shaman\", Edward H. Schafer translates it as \"shamaness\" and \"shamanka\". The transliteration-translation \"wu shaman\" or \"wu-shaman\" implies \"Chinese\" specifically and \"shamanism\" generally. Wu, concludes von Falkenhausen , \"may be rendered as \"shaman\" or, perhaps, less controversially as \"spirit medium\".\" Paper criticizes \"the majority of scholars\" who use one word shaman to translate many Chinese terms (wu , xi , yi , xian , and zhu ), and writes, \"The general tendency to refer to all ecstatic religious functionaries as shamans blurs functional differences.\" Characters The contemporary Chinese character for wu combines the graphic radicals gong \"work\" and ren \"person\" doubled (cf. cong ). This character developed from Seal script characters that depicted dancing shamans, which descend from Bronzeware script and Oracle bone script characters that resembled a cross potent. The first Chinese dictionary of characters, the (121 CE) Shuowen Jiezi defines wu as zhu \"sacrifice; prayer master; invoker; priest\" (\"\" ) and analyzes the Seal graph, \"An Invoker. A woman who can serve the Invisible, and by posturing bring down the spirits. Depicts a person with two sleeves posturing.\" This Seal graph for wu is interpreted as showing \"the \u5de5 work of two dancing figures set to each other \u2013 a shamanistic dance\" or \"two human figures facing some central object (possibly a pole, or in a tent-like enclosure?)\". This dictionary also includes a variant Great Seal script (called a guwen \"ancient script\") that elaborates wu . Hopkins analyzes this guwen graph as gong \"two hands held upward\" at the bottom (like shi 's Seal graph) and two \"mouths\" with the \"sleeves\" on the sides; or \"jade\" because the Shuowen defines ling \"spiritual; divine\" as synonymous with wu and depicting , \"an inspired shaman serving the Spirits with jade.\" Schafer compares the Shang Dynasty oracle graphs for wu and nong \"play with; cause\" (written with \"jade\" over \"two hands\") that shows \"hands (of a shaman?) elevating a piece of jade (the rain-compelling mineral) inside an enclosure, possibly a tent. The Seal and modern form may well derive from this original, the hands becoming two figures, a convergence towards the dancer-type graph.\" Tu Baikui suggests that the wu oracle character \"was composed of two pieces of jade and originally designated a tool of divination.\" \"\" 2014 , citing Citing Li Xiaoding that gong \u5de5 originally pictured a \"carpenter's square\", Allan argues that oracle inscriptions used wu interchangeably with fang \"square; side; place\" for sacrifices to the sifang \"four directions\". Laufer proposed a relation between Mongolian b\u00fcg\u00e4 \"shaman\", Turkish b\u00f6g\u00fc \"shaman\", \"Chinese bu, wu (shaman), buk, puk (to divine), and Tibetan aba (pronounced ba, sorcerer)\". Coblin puts forward a Sino-Tibetan root * \"magician; sorcerer\" for Chinese w\u016b < mju < *mjag \"magician; shaman\" and Written Tibetan 'ba'-po \"sorcerer\" and 'ba'-mo \"sorcereress\" (of the B\u00f6n religion). Schuessler notes Chinese xian < sj\u00e4n < *sen \"transcendent; immortal; alchemist\" was probably borrowed as Written Tibetan g\u0161en \"shaman\" and Thai < Proto-Tai * \"doctor; sorcerer\". In addition, the Mon\u2013Khmer and Proto-Western-Austronesian * \"shaman\" may also be connected with w\u016b. Schuessler lists four proposed etymologies: Secondly, wu could be cognate with w\u01d4 \"to dance\". Based on analysis of ancient characters, Hopkins proposed that w\u016b \"shaman\", w\u00fa \"not have; without\", and w\u01d4 \"dance\", \"can all be traced back to one primitive figure of a man displaying by the gestures of his arms and legs the thaumaturgic powers of his inspired personality\" . Many Western Han Dynasty tombs contained jade plaques or pottery images showing \"long-sleeved dancers\" performing at funerals, whom Erickson identifies as shamans, citing the Shuowen jiezi that early w\u01d4 characters depicted a dancer's sleeves. Thirdly, w\u016b could also be cognate with m\u01d4 \"mother\" since w\u016b, as opposed to x\u00ed , were typically female. Edward Schafer associates w\u016b shamanism with fertility rituals. Jensen cites the Japanese sinologist Shirakawa Shizuka 's hypothesis that the mother of Confucius was a w\u016b. 120px|Drawing of the bronze script character w\u016b (*mjag). Fourthly, w\u016b could be a loanword from Iranian *magu\u0161 \"magus; magician\" (cf. Old Persian magu\u0161, Avestan mogu), meaning an \"able one; specialist in ritual\". Mair provides archaeological and linguistic evidence that Chinese w\u016b < *myag \"shaman; witch, wizard; magician\" was a loanword from Old Persian *magu\u0161 \"magician; magus\". Mair connects the bronze script character for w\u016b with the \"cross potent\" symbol \u2629 found in Neolithic West Asia, suggesting the loan of both the symbol and the word. Wu in Shang oracular inscriptions Shima lists 58 occurrences of the character wu in concordance of oracle inscriptions: 32 in repeated compounds (most commonly \"wu spirit/sacrifice\" and \"bring the wu) and 26 in miscellaneous contexts. Boileau differentiates four meanings of these oracular wu: \"a spirit, wu of the north or east, to which sacrifices are offered\" \"a sacrifice, possibly linked to controlling the wind or meteorology\" \"an equivalent for shi , a form of divination using achilea\" \"a living human being, possibly the name of a person, tribe, place, or territory\" The inscriptions about this living wu, which is later identified as \"shaman\", reveal six characteristics:whether the wu is a man or a woman is not known; it could be either the name for a function or the name of a people (or an individual) coming from a definite territory or nation; the wu seems to have been in charge of some divinations, (in one instance, divination is linked to a sacrifice of appeasement); the wu is seen as offering a sacrifice of appeasement but the inscription and the fact that this kind of sacrifice was offered by other persons (the king included) suggests that the wu was not the person of choice to conduct all the sacrifices of appeasement; there is only one inscription where a direct link between the king and the wu appears. Nevertheless, the nature of the link is not known, because the status of the wu does not appear clearly; he follows (being brought, presumably, to Shang territory or court) the orders of other people; he is perhaps offered to the Shang as a tribute. Based on this ancient but limited Shang-era oracular record, it is unclear how or whether the Wu spirit, sacrifice, person, and place were related. As mentioned above, wu \"shaman\" was depicted in the ancient variant character for yi \"healer; doctor\". This archaic yi , writes Carr , \"ideographically depicted a shaman-doctor in the act of exorcistical healing with ( 'arrows' in) a 'quiver', a 'hand holding a lance', and a wu 'shaman'.\" Unschuld believes this character depicts the type of wu practitioner described in the Liji. Several times a year, and also during certain special occasions, such as the funeral of a prince, hordes of exorcists would race shrieking through the city streets, enter the courtyards and homes, thrusting their spears into the air, in an attempt to expel the evil creatures. Prisoners were dismembered outside all gates to the city, to serve both as a deterrent to the demons and as an indication of their fate should they be captured. Replacing the exorcistical \"shaman\" in with medicinal \"wine\" in yi \"healer; doctor\" signified, writes Schiffeler , \"the practice of medicine was not any longer confined to the incantations of the wu, but that it had been taken over (from an official standpoint) by the \"priest-physicians,\" who administered elixirs or wines as treatments for their patients.\" Hexagram 32, Heng Wu and yi are compounded in the word wuyi \"shaman-doctor; shamans and doctors\", translated \"exorcising physician\", \"sorcerer-physician\", or \"physician-shaman\". Confucius quotes a \"Southern Saying\" that a good wuyi must have heng \"constancy; ancient tradition; continuation; perseverance; regularity; proper name (e.g., Yijing Hexagram 32)\". The (ca. 5th century BCE) Lunyu \"Confucian Analects\" and the (ca. 1st century BCE) Liji \"Record of Rites\" give different versions of the Southern Saying. Wu-shamans as rainmakers Wu anciently served as intermediaries with nature spirits believed to control rainfall and flooding. During a drought, wu-shamans would perform the yu \"sacrificial rain dance ceremony\". If that failed, both wu and wang \"cripple; lame person; emaciated person\" engaged in \"ritual exposure\" rainmaking techniques based upon homeopathic or sympathetic magic. As Unschuld explains, \"Shamans had to carry out an exhausting dance within a ring of fire until, sweating profusely, the falling drops of perspirations produced the desired rain.\" These wu and wang procedures were called pu / \"expose to open air/sun\", fen \"burn; set on fire\", and pulu \"reveal; lay bare; expose to open air/sun\". For the year 639 BCE, the Chunqiu records, \"In summer, there was a great drought\" in Lu, and the Zuozhuan notes a discussion about fen wu wang : The duke (Xi) wanted to burn a wu and a cripple at the stake. Zang Wenzhong said: this is no preparation for the drought. Repair the city walls, limit your food, be economic in your consumption, be parsimonious and advise (people) to share (the food), this is what must be done. What use would be wu and cripple? If Heaven wanted to have them killed, why were they born at all? If they (the cripple and the wu) could produce drought, burning them would augment very much (the disaster). , citing . The duke followed this advice, and subsequently \"scarcity was not very great\". The Liji uses the words puwang and puwu to describe a similar rainmaking ritual during the reign (407-375 BCE) of Duke Mu of Lu. There was a drought during the year. Duke Mu called on Xianzi and asked him about the reason for this. He said: 'Heaven has not (given us) rain in a long time. I want to expose to the sun a cripple and what about that?' (Xianzi) said: 'Heaven has not (given us) rain in a long time but to expose to the sun the crippled son of somebody, that would be cruel. No, this cannot be allowed.' (the duke said): 'Well, then I want to expose to the sun a wu and what about that?' (Xianzi) answered: 'Heaven has not (given us) rain in a long time but to put one's hope on an ignorant woman and offer her to pray (for rain), no, this is too far (from reason).' , citing . Commentators interpret the wu as a female shaman and the wang as a male cripple. First, in 581 BCE the lord of Jin, who had slain two officers from the Zhao () family, had a nightmare about their ancestral spirit, and called upon an unnamed wu \"shaman\" from Sangtian and a yi \"doctor\" named Huan from Qin. The marquis of [Jin] saw in a dream a great demon with disheveled hair reaching to the ground, which beat its breast, and leaped up, saying: \"You have slain my descendants unrighteously, and I have presented my request to the High God in consequence.\" It then broke the great gate (of the palace), advanced to the gate of the State chamber, and entered. The duke was afraid and went into a side-chamber, the door of which it also broke. The duke then awoke, and called the witch of [Sangtian], who told him everything which he had dreamt. \"What will be the issue?\" asked the duke. \"You will not taste the new wheat,\" she replied. After this, the duke became very ill, and asked the services of a physician from [Qin], the earl of which sent the physician [Huan] to do what he could for him. Before he came, the duke dreamt that his disease turned into two boys, who said, \"That is a skilful physician; it is to be feared he will hurt us; how shall we get out of his way?\" Then one of them said: \"If we take our place above the heart and below the throat, what can he do to us?\" When the physician arrived, he said, \"Nothing can be done for this disease. Its seat is above the heart and below the throat. If I assail it (with medicine), it will be of no use; if I attempt to puncture it, it cannot be reached. Nothing can be done for it.\" The duke said, \"He is a skilful physician\", gave him large gifts, and send him back to [Qin]. In the sixth month, on the day [bingwu], the marquis wished to taste the new wheat, and made the superintendent of his fields present some. While the baker was getting it ready, [the marquis] called the witch of [Sangtian], showed her the wheat and put her to death. As the marquis was about to taste the wheat, he felt it necessary to go to the privy, into which he fell, and so died. One of the servants that waited on him had dreamt in the morning that he carried the marquis on his back up to heaven. The same at mid-day carried him on his back out from the privy, and was afterwards buried alive with him. Commentators have attempted to explain why the wu merely interpreted the duke's dream but did not perform a healing ritual or exorcism, and why the duke waited until the prediction had failed before ordering the execution. Boileau suggests the wu was executed in presumed responsibility for the Zhao ancestral spirit's attack. Second, in 552 BCE a wu named Gao both appears in and divines about a dream of Zhongxing Xianzi. After conspiring in the murder of Duke Li of Jin, Zhongxing dreams that the duke's spirit gets revenge. In autumn, the marquis of [Jin] invaded our northern border. [Zhongxing Xianzi] prepared to invade [Qi]. (Just then), he dreamt that he was maintaining a suit with duke [Li], in which the case was going against him, when the duke struck him with a [ge] on his head, which fell down before him. He took his head up, put it on his shoulders, and ran off, when he saw the wizard [Gao] of [Gengyang]. A day or two after, it happened that he did see this [Gao] on the road, and told him his dream, and the wizard, who had had the same dream, said to him: \"Your death is to happen about this time; but if you have business in the east, you will there be successful [first]\". Xianzi accepted this interpretation. Boileau questions: why wasn't the wu asked by Zhongxin to expel the spirit of the duke? Perhaps because the spirit went through him to curse the officer. Could it be that the wu was involved (his involvement is extremely strong in this affair) in a kind of deal, or is it simply that the wu was aware of two different matters concerning the officer, only one connected to the dream? According to these two stories, wu were feared and considered dangerous. This attitude is also evident in a Zhuangzi story about the shenwu \"spirit/god shaman\" Jixian from Zheng. In [Zheng], there was a shaman of the gods named [Jixian]. He could tell whether men would live or die, survive or perish, be fortunate or unfortunate, live a long time or die young, and he would predict the year, month, week, and day as though he were a god himself. When the people of [Zheng] saw him, they all ran out of his way. \"As soothsayers.\" writes de Groot , \"the wu in ancient China no doubt held a place of great importance.\" Wu-shamans as officials Sinological controversies have arisen over the political importance of wu in ancient China. Some scholars believe Chinese wu used \"techniques of ecstasy\" like shamans elsewhere; others believe wu were \"ritual bureaucrats\" or \"moral metaphysicians\" who did not engage in shamanistic practices. Chen Mengjia wrote a seminal article that proposed Shang kings were wu-shamans. In the oracle bone inscriptions are often encountered inscriptions stating that the king divined or that the king inquired in connections with wind- or rain-storms, rituals, conquests, or hunts. There are also statements that \"the king made the prognostication that ...,\" pertaining to weather, the border regions, or misfortunes and diseases; the only prognosticator ever recorded in the oracle bone inscriptions was the king ... There are, in addition, inscriptions describing the king dancing to pray for rain and the king prognosticating about a dream. All of these were activities of both king and shaman, which means in effect that the king was a shaman. , cited in . Chen's shaman-king hypothesis was supported by Kwang-chih Chang who cited the Guoyu story about Shao Hao severing heaven-earth communication (above). This myth is the most important textual reference to shamanism in ancient China, and it provides the crucial clue to understanding the central role of shamanism in ancient Chinese politics. Heaven is where all the wisdom of human affairs lies. ... Access to that wisdom was, of course, requisite for political authority. In the past, everybody had had that access through the shamans. Since heaven had been severed from earth, only those who controlled that access had the wisdom \u2013 hence the authority \u2013 to rule. Shamans, therefore, were a crucial part of every state court; in fact, scholars of ancient China agree that the king himself was actually head shaman. Some modern scholars disagree. For instance, Boileau calls Chen's hypothesis \"somewhat antiquated being based more on an a priori approach than on history\" and says, In the case of the relationship between wu and wang [king], Chen Mengjia did not pay sufficient attention to what the king was able to do as a king, that is to say, to the parts of the king's activities in which the wu was not involved, for example, political leadership as such, or warfare. The process of recognition must also be taken into account: it is probable that the wu was chosen or acknowledged as such according to different criteria to those adopted for the king. Chen's concept of the king as the head wu was influenced by Frazer's theories about the origin of political power: for Frazer the king was originally a powerful sorcerer. The Shujing \"Classic of History\" lists Wu Xian and Wu Xian as capable administrators of the Shang royal household. The Duke of Zhou tells Prince Shao that: I have heard that of ancient time, when King Tang had received the favoring decree, he had with him Yi Yin, making his virtue like that of great Heaven. Tai Jia, again, had Bao Heng. Tai Wu had Yi Zhi and Chen Hu, through whom his virtue was made to affect God; he had also [] Wu Xian, who regulated the royal house; Zu Yi had [] Wu Xian. Wu Ding had Gan Pan. These ministers carried out their principles and effected their arrangements, preserving and regulating the empire of [Shang], so that, while its ceremonies lasted, those sovereigns, though deceased, were assessors to Heaven, while it extended over many years. According to Boileau, In some texts, Wu Xian senior is described as being in charge of the divination using [shi ] achilea. He was apparently made a high god in the kingdom of Qin during the Warring States period. The Tang subcommentary interprets the character wu of Wu Xian father and son as being a cognomen, the name of the clan from which the two Xian came. It is possible that in fact the text referred to two Shang ministers, father and son, coming from the same eponymous territory wu. Perhaps, later, the name (wu ) of these two ministers has been confused with the character wu () as employed in other received texts. Ever since Emperor Wu of Han established Confucianism as the state religion, the ruling classes have shown increasing prejudice against shamanism . Some modern writers view the traditional Confucianist disdain for female shamans as sexism. Schafer wrote: In the opinion of the writer, the Chou ruling class was particularly hostile to women in government, and regarded the ancient fertility rites as impure. This anti-female tendency was even more marked in the state of Lu, where Confucius approved of the official rain-ceremony in which men alone participated. There was, within ancient China, a heterogeneity of culture areas, with female shamans favored in some, males in others. The \"licentiousness\" of the ceremonies of such a state as Cheng (doubtless preserving the ancient Shang traditions and customs) was a byword among Confucian moralists. Confucius' state seems on the other hand to have taken the \"respectable\" attitude that the sexes should not mingle in the dance, and that men were the legitimate performers of the fertility rites. The general practice of the later Chou period, or at least the semi-idealized picture given of the rites of that time in such books as the Chou li, apparently prescribed a division of magical functions between men and women. The former generally play the role of exorcists, the latter of petitioners. This is probably related to the metaphysical belief that women, embodying the principle yin, were akin to the spirits, whereas men, exemplifying the element yang, were naturally hostile to them. Accepting the tradition that Chinese shamans were women (i.e., wu \"shamaness\" as opposed to xi \"shaman\"), Kagan believes: One of the main themes in Chinese history is the unsuccessful attempt by the male Confucian orthodoxy to strip women of their public and sacred powers and to limit them to a role of service ... Confucianists reasserted daily their claim to power and authority through the promotion of the phallic ancestor cult which denied women religious representation and excluded them from the governmental examination system which was the path to office, prestige, and status. In addition, Unschuld refers to a \"Confucian medicine\" based upon systematic correspondences and the idea that illnesses are caused by excesses (rather than demons). The managerial Siwu, who was of Shi \"Gentleman; Yeoman\" feudal rank, yet was not a wu, supervised \"the many wu\". The Managers of the Spirit Mediums are in charge of the policies and orders issued to the many Spirit Mediums. When the country suffers a great drought, they lead the Spirit Mediums in dancing the rain-making ritual (yu ). When the country suffers a great calamity, they lead the Spirit Mediums in enacting the long-standing practices of Spirit Mediums (wuheng ). At official sacrifices, they [handle] the ancestral tablets in their receptacles, the cloth on which the spirits walk, and the box containing the reeds [for presenting the sacrificial foodstuffs]. In all official sacrificial services, they guard the place where the offerings are buried. In all funerary services, they are in charge of the rituals by which the Spirit Mediums make [the spirits] descend (jiang ). , citing . The Nanwu and N\u00fcwu have different shamanic specializations, especially regarding inauspicious events like sickness, death, and natural disaster. The Male Spirit Mediums are in charge of the si and yan Sacrifices to the Deities of the Mountains and Rivers. They receive the honorific titles [of the deities], which they proclaim into the [four] directions, holding reeds. In the winter, in the great temple hall, they offer [or: shoot arrows] without a fixed direction and without counting the number. In the spring, they make proclamations and issue bans so as to remove sickness and disease. When the king offers condolence, they together with the invocators precede him. The Female Mediums are in charge of anointing and ablutions at the exorcisms that are held at regular times throughout the year. When there is a drought or scorching heat, they dance in the rain-making ritual (yu). When the queen offers condolence, they together with the invocators precede her. In all great calamities of the state, they pray, singing and wailing. (part 26 ), citing . The poetry anthology Chu Ci, especially its older pieces, is largely characterized by its shamanic content and style, as explicated to some extent by sinologist David Hawkes : passim ). Among other points of interest are the intersection of Shamanic traditions and mythology/folk religion in the earlier textual material, such as Tianwen (possibly based on even more ancient shamanic temple murals), the whole question of the interpretation of the 11 verses of the Jiu Ge (Nine Songs) as the libretto of a shamanic dramatic performance, the motif of shamanic spirit flight from Li Sao through subsequent pieces, the evidence of possible regional variations in wu shamanism between Chu, Wei, Qi, and other states (or shamanic colleges associated with those regions), and the suggestion that some of the newer textual material was modified to please Han Wudi, by Liu An, the Prince of Huainan, or his circle. The Chu Ci contents have traditionally been chronologically divided into an older, pre-Han dynasty group, and those written during the Han Dynasty. Of the traditionally-considered to be the older works (omitting the mostly prose narratives, \"Bu Ju\" and \"Yu Fu\") David Hawkes considers the following sections to be \"functional, explicitly shamanistic\": Jiu Ge, Tian Wen, and the two shamanic summons for the soul, \"The Great Summons\" and \"Summons of the Soul\". Regarding the other, older pieces he considers that \"shamanism, if there is any\" to be an incidental poetic device, particularly in the form of descriptions of the shamanic spirit journey. In the Li Sao, two individual shaman are specified: Ling Fen () and Wu Xian (). This Wu Xian may or may not be the same as the (one or more) historical person(s) named Wu Xian. Hawkes suggests an equation of the word ling in the Chu dialect with the word wu. In Shanhaijing (Classic of Mountains and Seas), the name of some individual shaman includes \"Wu\" () in the normal position of the family surname, for example, in the case of the following list, where the 6 are depicted together reviving a corpse, with Wu Peng holding the Herb of Immortality. Wu Peng and Wu Yang and others are also known from the Chu Ci poetry anthology. Wu Yang is the major speaker in Zhao Hun (also known as, Summons for the Soul). From Hawkes : The six shamans receiving a corpse: Wu Yang (, \"Shaman Bright\"), Wu Peng (), Wu Di (), Wu Li () [Tang reconstruction *L\u01d0, Hanyu Pinyin L\u01da], Wu Fan (), Wu Xiang () Ten other individuals named Wu in Shanhaijing: Wu Xian (), Wu Ji (), Wu Fen (or Ban) (), Wu Peng (), Wu Gu (), Wu Zhen (), Wu Li (), Wu Di (), Wu Xie (), Wu Luo (). Aspects of Chinese folk religion are sometimes associated with \"shamanism\". De Groot provided descriptions and pictures of hereditary shamans in Fujian, called saigong (pinyin shigong) . Paper analyzed tongji mediumistic activities in the Taiwanese village of Bao'an . Notes References Digitalized edition 2007 Chicoutimi Canda - Paris by Pierre Palpant. Footnotes", "edit_actions": [{"type": "D", "before": "Bernhard Karlgren), mjuo < * (Zhou Fagao), *mjag (Li Fanggui), mju < *ma (Axel Schuessler).", "after": null, "start_char_pos": 286, "end_char_pos": 377}, {"type": "D", "before": "(1954:134)", "after": null, "start_char_pos": 464, "end_char_pos": 474}, {"type": "A", "before": null, "after": "Needham", "start_char_pos": 845, "end_char_pos": 845}, {"type": "D", "before": "(; )", "after": null, "start_char_pos": 1119, "end_char_pos": 1123}, {"type": "D", "before": "(1955:9)", "after": null, "start_char_pos": 1250, "end_char_pos": 1258}, {"type": "A", "before": null, "after": "Schiffeler", "start_char_pos": 1530, "end_char_pos": 1530}, {"type": "D", "before": "(1951:153)", "after": null, "start_char_pos": 1806, "end_char_pos": 1816}, {"type": "D", "before": "(1973:11)", "after": null, "start_char_pos": 1833, "end_char_pos": 1842}, {"type": "A", "before": null, "after": "von Falkenhausen", "start_char_pos": 1986, "end_char_pos": 1986}, {"type": "A", "before": null, "after": "Paper", "start_char_pos": 2073, "end_char_pos": 2073}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2783, "end_char_pos": 2784}, {"type": "A", "before": null, "after": "Hopkins", "start_char_pos": 3290, "end_char_pos": 3290}, {"type": "D", "before": "(1920:424)", "after": null, "start_char_pos": 3441, "end_char_pos": 3451}, {"type": "A", "before": null, "after": "Schafer", "start_char_pos": 3602, "end_char_pos": 3602}, {"type": "D", "before": "(", "after": null, "start_char_pos": 4117, "end_char_pos": 4118}, {"type": "R", "before": "; citing )", "after": ", citing", "start_char_pos": 4127, "end_char_pos": 4137}, {"type": "A", "before": null, "after": "Allan", "start_char_pos": 4213, "end_char_pos": 4213}, {"type": "A", "before": null, "after": "Laufer", "start_char_pos": 4350, "end_char_pos": 4350}, {"type": "A", "before": null, "after": "Coblin", "start_char_pos": 4519, "end_char_pos": 4519}, {"type": "A", "before": null, "after": "Schuessler", "start_char_pos": 4712, "end_char_pos": 4712}, {"type": "A", "before": null, "after": "Hopkins", "start_char_pos": 5115, "end_char_pos": 5115}, {"type": "D", "before": "(1945:5)", "after": null, "start_char_pos": 5341, "end_char_pos": 5349}, {"type": "R", "before": "who", "after": "whom Erickson", "start_char_pos": 5479, "end_char_pos": 5482}, {"type": "R", "before": "\"Linguistic facts reveal the intimate relationships between the word wu (*myu) \"shamanka\" and such words as \"mother\", \"dance\", \"fertility\", \"egg\", and \"receptacle\". The ancient shamanka, then, was closely related to the fecund mother, to the fertile soil, to the receptive earth. The textual evidence supports these philological associations. In Shang and Chou times, shamankas were regularly employed in the interests of human and natural fertility, above all in bringing rain to parched farmlands \u2013 a responsibility they shared with ancient kings. They were musicians and dancers and oracles.\" .", "after": "Jensen", "start_char_pos": 5751, "end_char_pos": 6348}, {"type": "D", "before": "(1990)", "after": null, "start_char_pos": 6667, "end_char_pos": 6673}, {"type": "A", "before": null, "after": "Shima", "start_char_pos": 7037, "end_char_pos": 7037}, {"type": "A", "before": null, "after": "Boileau", "start_char_pos": 7233, "end_char_pos": 7233}, {"type": "A", "before": null, "after": "Carr", "start_char_pos": 8852, "end_char_pos": 8852}, {"type": "A", "before": null, "after": "Schiffeler", "start_char_pos": 9642, "end_char_pos": 9642}, {"type": "D", "before": "(Schafer 1951", "after": null, "start_char_pos": 10716, "end_char_pos": 10729}, {"type": "A", "before": null, "after": "Unschuld", "start_char_pos": 10800, "end_char_pos": 10800}, {"type": "R", "before": "(, citing )", "after": ", citing .", "start_char_pos": 11751, "end_char_pos": 11762}, {"type": "R", "before": "(, citing )", "after": ", citing .", "start_char_pos": 12621, "end_char_pos": 12632}, {"type": "D", "before": "In this quote, \"witch\" is a translation of wu.", "after": null, "start_char_pos": 14982, "end_char_pos": 15028}, {"type": "A", "before": null, "after": "Boileau", "start_char_pos": 15252, "end_char_pos": 15252}, {"type": "D", "before": "In this quote, \"wizard\" is a translation of wu.", "after": null, "start_char_pos": 16256, "end_char_pos": 16303}, {"type": "D", "before": "(2002:369)", "after": null, "start_char_pos": 16687, "end_char_pos": 16697}, {"type": "A", "before": null, "after": "de Groot", "start_char_pos": 17235, "end_char_pos": 17235}, {"type": "D", "before": "(like and )", "after": null, "start_char_pos": 17437, "end_char_pos": 17448}, {"type": "D", "before": "(like )", "after": null, "start_char_pos": 17528, "end_char_pos": 17535}, {"type": "D", "before": "(1936)", "after": null, "start_char_pos": 17681, "end_char_pos": 17687}, {"type": "D", "before": "(", "after": null, "start_char_pos": 18392, "end_char_pos": 18393}, {"type": "R", "before": ")", "after": ".", "start_char_pos": 18405, "end_char_pos": 18406}, {"type": "D", "before": "(1983:45)", "after": null, "start_char_pos": 19221, "end_char_pos": 19230}, {"type": "A", "before": null, "after": "Boileau", "start_char_pos": 19276, "end_char_pos": 19276}, {"type": "D", "before": "Names in this quote have been standardized to pinyin.", "after": null, "start_char_pos": 20815, "end_char_pos": 20868}, {"type": "D", "before": "(, )", "after": null, "start_char_pos": 21643, "end_char_pos": 21647}, {"type": "A", "before": null, "after": "Unschuld", "start_char_pos": 23648, "end_char_pos": 23648}, {"type": "R", "before": "(, citing )", "after": ", citing .", "start_char_pos": 24683, "end_char_pos": 24694}, {"type": "R", "before": ", , citing )", "after": "), citing .", "start_char_pos": 25743, "end_char_pos": 25755}, {"type": "R", "before": "(2011: passim", "after": ": passim", "start_char_pos": 25930, "end_char_pos": 25943}, {"type": "A", "before": null, "after": "Hawkes", "start_char_pos": 27494, "end_char_pos": 27494}, {"type": "A", "before": null, "after": "Hawkes", "start_char_pos": 28028, "end_char_pos": 28028}, {"type": "A", "before": null, "after": "De Groot", "start_char_pos": 28435, "end_char_pos": 28435}, {"type": "A", "before": null, "after": "Paper", "start_char_pos": 28538, "end_char_pos": 28538}, {"type": "D", "before": "References", "after": null, "start_char_pos": 28615, "end_char_pos": 28625}, {"type": "R", "before": "Bibliography", "after": "References", "start_char_pos": 28632, "end_char_pos": 28644}, {"type": "A", "before": null, "after": "Digitalized edition 2007 Chicoutimi Canda - Paris by Pierre Palpant.", "start_char_pos": 28645, "end_char_pos": 28645}, {"type": "A", "before": null, "after": "Footnotes", "start_char_pos": 28646, "end_char_pos": 28646}], "sents_char_pos": [0, 137, 212, 448, 578, 783, 1031, 1121, 1236, 1516, 1735, 1854, 1971, 2326, 2459, 2645, 2746, 2761, 2828, 2906, 2952, 3173, 3437, 3503, 3671, 3844, 3983, 4128, 4288, 4565, 4615, 4760, 4868, 4879, 4979, 5073, 5156, 5584, 5687, 5750, 5915, 6030, 6093, 6300, 6506, 6567, 6582, 6638, 6661, 6754, 6769, 6829, 7002, 7117, 7566, 7720, 7850, 7978, 8238, 8325, 8430, 8526, 8575, 8723, 8817, 9101, 9378, 9539, 9615, 9888, 9964, 10066, 10147, 10166, 10180, 10194, 10206, 10247, 10401, 10527, 10612, 10655, 10668, 10796, 10968, 11051, 11083, 11118, 11325, 11385, 11542, 11576, 11641, 11750, 11841, 11970, 12007, 12073, 12130, 12328, 12713, 12938, 13190, 13292, 13375, 13477, 13519, 13568, 13729, 13840, 13876, 13910, 14016, 14092, 14142, 14196, 14247, 14276, 14370, 14510, 14637, 14756, 14875, 14981, 15028, 15348, 15445, 15549, 15610, 15654, 15843, 15946, 16141, 16218, 16255, 16303, 16391, 16457, 16686, 16770, 16876, 16935, 17144, 17209, 17306, 17422, 17520, 17643, 17730, 17925, 18074, 18161, 18287, 18391, 18556, 18746, 18804, 18877, 18941, 19069, 19131, 19220, 19261, 19681, 19866, 20037, 20152, 20346, 20376, 20455, 20510, 20532, 20553, 20814, 20868, 20992, 21082, 21231, 21362, 21496, 21741, 21909, 22064, 22185, 22353, 22550, 22775, 22851, 23046, 23362, 23634, 23792, 23840, 23905, 24016, 24128, 24269, 24466, 24557, 24839, 24950, 25065, 25195, 25287, 25367, 25496, 25582, 25663, 25733, 25946, 26245, 26667, 26815, 27127, 27316, 27396, 27569, 27862, 27942, 28022, 28358]}
+{"doc_id": "24591051", "revision_depth": "1", "before_revision": "Symbolic Modelling is a therapeutic and coaching process developed by psychotherapists Penny Tompkins and James Lawley, based on the work of counselling psychologist David Grove. Using Grove \u2019s Clean Language , a progressive questioning technique using clients \u2019 exact words, the facilitator works with a client \u2019 s self-generating metaphors to clarify personal beliefs, goals, and conflicts, and to bring about meaningful change. Because of its reliance on emergence and self-organisation it has been called a \"post-modern oriented therapeutic approach\".Nehyba & Lanc 2013 Background The practice of Symbolic Modelling is built upon a foundation of two complementary theories: the metaphors we live by,Lakoff & Johnson, 1980 and the models we create by. It regards the individual as a self-organizing system that encodes much of the meaning of feelings, thoughts, beliefs, experiences etc. in the embodied mind as metaphors. Lawley & Tompkins, 2000 Symbolic Modelling heightens awareness of clients \u2019 personal \u2018 symbolic domain of experience \u2019 , facilitating them to develop a unique \u2018metaphor landscape\u2019 and to explore their internal metaphors, which consistent with conceptual metaphor theory , are seen to govern behaviour. Needham-Didsbury, 2012 Intent The Symbolic Modelling process guides the client through an exploration of the client's own metaphors, their organization, interactions, and patterns. These embodied metaphors can restrict a client \u2019 s ways of viewing the world and his or her coping strategies, due to the inner logic prescribed by the metaphors. Without shifting these metaphors, lasting change is difficult, as the embodied mind continues to work within the constraints of this old paradigm. Through the facilitation the client discovers how these metaphors can change to meet their desired outcomes, transformative shifts can occur within a client's \"metaphor landscape\", bringing about meaningful change on cognitive, affective and behavioral levels. The \u2018metaphor landscape\u2019 phenomenon is not a new discovery, with some similarities to \u2018waking dream\u2019 or \u2018 r\u00eave ev\u00e9ill\u00e9, a term coined by Robert Desoille in the 1930s. Martin, 2007 Process Symbolic Modelling proceeds through five defined stages, as follows: Stage 1: Entering the Symbolic Domain Stage 2: Developing Symbolic Perceptions Stage 3: Modelling Symbolic Patterns Stage 4: Encouraging Transformation Stage 5: Maturing the Evolved Landscape Clean Language is used throughout, to avoid contaminating or distorting the developing metaphor landscape through the form, content or presentation of the therapist's questions.Lawley & Tompkins, 2000 A more structured subset of the above process called Symbolic Modelling Lite is used in coaching:Lawley & Tompkins, 2011 Phase 1: Set Up Phase 2: Identify a Desired Outcome Phase 3: Develop a Desired Outcome Landscape Phase 4: Explore Effects of Desired Outcome Landscape Phase 5: Mature Changes As They Occur Phase 6: Set Down Evidence base A number of studies have assessed the efficacy of Symbolic Modelling with 95 dyslexic coachees;Doyle & McDowall, 2015 in a psychotherapy case study;Rees & Manea, 2016 and in an organisational setting.Robinson, 2012/2013 Other applications %DIFDELCMD < %DIFDELCMD < %%% While therapy and coaching are the primary application areas of Symbolic Modelling , researchers have started to apply the method to metaphor research,Akbari, 2013 game design, Rusch, 2017, problem solving,Groppel-Wegener, 2015 and as a qualitative research methodology.van Helsdingen & Lawley, 2012Tosey et al., 2014 References Akbari, M. (2013). Metaphors about EFL Teachers' Roles: A Case of Iranian Non-English-Major Students, International Journal of English Language & Translation Studies, Vol: 1, Issue: 2, July-September. doaj.org/article/c0279baf69cd424da2720d3d43673e0f %DIFDELCMD < %DIFDELCMD < %%% Doyle, N. & McDowall, A (2015). Is coaching an effective adjustment for dyslexic adults? Coaching: An International Journal of Theory, Research and Practice 8(2): 154-168. doi:10.1080/17521882.2015.1065894 Groppel-Wegener, A. (2015). Design Tasks Beyond the Studio. Proceedings of the 3rd International Conference for Design Education Researchers Volume 1 pp.93-108 Editors: Robin Vande Zande, Erik Bohemia & Ingvild Digranes. DOI: 10.13140/RG.2.1.1200.7520 academia.edu/13300548/Proceedings_of_the_3rd_International_Conference_for_Design_Education_Researchers_volume_1 Lakoff, G. and Johnson, M. (1980). Metaphors We Live By. Chicago, IL: University of Chicago Press. Lawley, J & Tompkins, P (2011). Chapter 4 of Innovations in NLP: Innovations for Challenging Times, L.Michael Hall & Shelle Rose Charvet (eds.) Crown House Publishing. Lawley, J & Tompkins, P (2000). Metaphors in Mind: Transformation through Symbolic Modelling: London: The Developing Company Press Martin, J. N.T. (2007). Book Review: Metaphors in Mind: Transformation Through Symbolic Modelling, Metaphor and Symbol, 22(2):201-211. doi:10.1080/10926480701235510 Needham-Didsbury, I (2012). The Use of Figurative Language in Psychotherapy, University College London, Working Papers in Linguistics 2012, pp. 75-93. /psychlangsci/research/linguistics/publications/wpl/12papers/needham Nehyba, J. & Lanc, J. (2013). Koncept \u010dist\u00e9ho jazyka v psychoterapii (The Concept of Clean Language in Psychotherapy), Psychoterapie: praxe \u2013 inspirace \u2013 konfrontace, 7(2):123-133 Brno: Masaryk university. URL Rees, J. & Manea, A.I. (2016). The Use of Clean Language and Metaphor in Helping Clients Overcoming Procrastination. Journal of Experiential Psychotherapy 19(3): 30-36. jep.ro/images/pdf/cuprins_reviste/75_art_5.pdf Robinson, F. (2012/2013). How does exploring metaphorical representations of organisational change at its best affect levels of well-being in an ambiguous and rapidly changing public sector work environment? Paper presented to The Third International Neuro-Linguistic Programming Research Conference, Hertfordshire University, 6-7 July 2012. A precised version appeared in Acuity No. 4, 2013, available at: cleanlanguage.co.uk/articles/articles/332/ Rusch, D. C. (2017). Making Deep Games \u2013 Designing Games with Meaning and Purpose. CRC Press Taylor & Francis Group. Tosey, P., Lawley, J. & Meese, R. (2014). Eliciting Metaphor through Clean Language: An Innovation in Qualitative Research. British Journal of Management, 25: 629\u2013646. van Helsdingen, A. & Lawley, J. (2012). Modelling Shared Reality: avoiding unintended influence in qualitative research, Kwalon: Journal of the Netherlands Association for Qualitative Research. Vol 3, October. academia.edu/attachments/30371322/ translated from the original Dutch version URL %DIFDELCMD < %DIFDELCMD < %%% External links www.cleanlanguage.co.uk homepage of the developers of Symbolic Modelling, with over 200 articles on Clean Language and related subjects. www.cleanchange.co.uk news of applications of Clean Language and Symbolic Modelling, plus Clean Community resources", "after_revision": "Symbolic modelling is a therapeutic and coaching process developed by psychotherapists Penny Tompkins and James Lawley, based on the work of counselling psychologist David Grove. Using Grove 's clean language , a progressive questioning technique using clients ' exact words, the facilitator works with a client ' s self-generating metaphors to clarify personal beliefs, goals, and conflicts, and to bring about meaningful change. Because of its reliance on emergence and self-organisation it has been called a \"post-modern oriented therapeutic approach\".Nehyba & Lanc 2013 Background The practice of symbolic modelling is built upon a foundation of two complementary theories: the metaphors we live by,Lakoff & Johnson, 1980 and the models we create by. It regards the individual as a self-organizing system that encodes much of the meaning of feelings, thoughts, beliefs, experiences etc. in the embodied mind as metaphors. Lawley & Tompkins, 2000 Symbolic modelling aims to heighten awareness of clients ' personal \" symbolic domain of experience \" , facilitating them to develop a unique \"metaphor landscape\" and to explore their internal metaphors, which in conceptual metaphor theory are seen to govern behaviour. Needham-Didsbury, 2012 Intent The symbolic modelling process guides the client through an exploration of the client's own metaphors, their organization, interactions, and patterns. These embodied metaphors can restrict a client ' s ways of viewing the world and his or her coping strategies, due to the inner logic prescribed by the metaphors. Without shifting these metaphors, lasting change may be difficult, as the embodied mind may continue to work within the constraints of this old paradigm. Through the facilitation the client can discover how these metaphors can change to meet their desired outcomes, transformative shifts can occur within a client's \"metaphor landscape\", bringing about meaningful change on cognitive, affective and behavioral levels. The \"metaphor landscape\" phenomenon is not a new discovery, with some similarities to \"waking dream\" or r\u00eave ev\u00e9ill\u00e9, a term coined by Robert Desoille in the 1930s. Martin, 2007 Process Symbolic modelling proceeds through five defined stages, as follows: Stage 1: Entering the symbolic domain Stage 2: Developing symbolic perceptions Stage 3: Modelling symbolic patterns Stage 4: Encouraging transformation Stage 5: Maturing the evolved landscape Clean language is used throughout, to avoid contaminating or distorting the developing metaphor landscape through the form, content or presentation of the therapist's questions.Lawley & Tompkins, 2000 A more structured subset of the above process called symbolic modelling lite is used in coaching:Lawley & Tompkins, 2011 Phase 1: Set up Phase 2: Identify a desired outcome Phase 3: Develop a desired outcome landscape Phase 4: Explore effects of desired outcome landscape Phase 5: Mature changes as they occur Phase 6: Set down Evidence base A number of studies have assessed the efficacy of symbolic modelling with 95 dyslexic coachees;Doyle & McDowall, 2015 in a psychotherapy case study;Rees & Manea, 2016 and in an organisational setting.Robinson, 2012/2013 Other applications %DIFDELCMD < %DIFDELCMD < %%% While therapy and coaching are the primary application areas of symbolic modelling , researchers have started to apply the method to metaphor research,Akbari, 2013 game design, Rusch, 2017, problem solving,Groppel-Wegener, 2015 and as a qualitative research methodology.van Helsdingen & Lawley, 2012Tosey et al., 2014 Notes References Akbari, M. (2013). Metaphors about EFL Teachers' Roles: A Case of Iranian Non-English-Major Students, International Journal of English Language & Translation Studies, Vol: 1, Issue: 2, July-September. doaj.org/article/c0279baf69cd424da2720d3d43673e0f %DIFDELCMD < %DIFDELCMD < %%% Doyle, N. & McDowall, A (2015). Is coaching an effective adjustment for dyslexic adults? Coaching: An International Journal of Theory, Research and Practice 8(2): 154-168. doi:10.1080/17521882.2015.1065894 Groppel-Wegener, A. (2015). Design Tasks Beyond the Studio. Proceedings of the 3rd International Conference for Design Education Researchers Volume 1 pp.93-108 Editors: Robin Vande Zande, Erik Bohemia & Ingvild Digranes. DOI: 10.13140/RG.2.1.1200.7520 academia.edu/13300548/Proceedings_of_the_3rd_International_Conference_for_Design_Education_Researchers_volume_1 Lakoff, G. and Johnson, M. (1980). Metaphors We Live By. Chicago, IL: University of Chicago Press. Lawley, J & Tompkins, P (2011). Chapter 4 of Innovations in NLP: Innovations for Challenging Times, L.Michael Hall & Shelle Rose Charvet (eds.) Crown House Publishing. Lawley, J & Tompkins, P (2000). Metaphors in Mind: Transformation through Symbolic Modelling: London: The Developing Company Press Martin, J. N.T. (2007). Book Review: Metaphors in Mind: Transformation Through Symbolic Modelling, Metaphor and Symbol, 22(2):201-211. doi:10.1080/10926480701235510 Needham-Didsbury, I (2012). The Use of Figurative Language in Psychotherapy, University College London, Working Papers in Linguistics 2012, pp. 75-93. /psychlangsci/research/linguistics/publications/wpl/12papers/needham Nehyba, J. & Lanc, J. (2013). Koncept \u010dist\u00e9ho jazyka v psychoterapii (The Concept of Clean Language in Psychotherapy), Psychoterapie: praxe \u2013 inspirace \u2013 konfrontace, 7(2):123-133 Brno: Masaryk university. URL Rees, J. & Manea, A.I. (2016). The Use of Clean Language and Metaphor in Helping Clients Overcoming Procrastination. Journal of Experiential Psychotherapy 19(3): 30-36. jep.ro/images/pdf/cuprins_reviste/75_art_5.pdf Robinson, F. (2012/2013). How does exploring metaphorical representations of organisational change at its best affect levels of well-being in an ambiguous and rapidly changing public sector work environment? Paper presented to The Third International Neuro-Linguistic Programming Research Conference, Hertfordshire University, 6-7 July 2012. A precised version appeared in Acuity No. 4, 2013, available at: cleanlanguage.co.uk/articles/articles/332/ Rusch, D. C. (2017). Making Deep Games \u2013 Designing Games with Meaning and Purpose. CRC Press Taylor & Francis Group. Tosey, P., Lawley, J. & Meese, R. (2014). Eliciting Metaphor through Clean Language: An Innovation in Qualitative Research. British Journal of Management, 25: 629\u2013646. van Helsdingen, A. & Lawley, J. (2012). Modelling Shared Reality: avoiding unintended influence in qualitative research, Kwalon: Journal of the Netherlands Association for Qualitative Research. Vol 3, October. academia.edu/attachments/30371322/ translated from the original Dutch version URL %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "R", "before": "Modelling", "after": "modelling", "start_char_pos": 9, "end_char_pos": 18}, {"type": "R", "before": "\u2019s Clean Language", "after": "'s clean language", "start_char_pos": 191, "end_char_pos": 208}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 261, "end_char_pos": 262}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 312, "end_char_pos": 313}, {"type": "R", "before": "Symbolic Modelling", "after": "symbolic modelling", "start_char_pos": 601, "end_char_pos": 619}, {"type": "R", "before": "Modelling heightens", "after": "modelling aims to heighten", "start_char_pos": 959, "end_char_pos": 978}, {"type": "R", "before": "\u2019 personal \u2018", "after": "' personal \"", "start_char_pos": 1000, "end_char_pos": 1012}, {"type": "R", "before": "\u2019", "after": "\"", "start_char_pos": 1043, "end_char_pos": 1044}, {"type": "R", "before": "\u2018metaphor landscape\u2019", "after": "\"metaphor landscape\"", "start_char_pos": 1085, "end_char_pos": 1105}, {"type": "R", "before": "consistent with", "after": "in", "start_char_pos": 1153, "end_char_pos": 1168}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1196, "end_char_pos": 1197}, {"type": "R", "before": "Symbolic Modelling", "after": "symbolic modelling", "start_char_pos": 1262, "end_char_pos": 1280}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1456, "end_char_pos": 1457}, {"type": "R", "before": "is", "after": "may be", "start_char_pos": 1621, "end_char_pos": 1623}, {"type": "R", "before": "continues", "after": "may continue", "start_char_pos": 1656, "end_char_pos": 1665}, {"type": "R", "before": "discovers", "after": "can discover", "start_char_pos": 1755, "end_char_pos": 1764}, {"type": "R", "before": "\u2018metaphor landscape\u2019", "after": "\"metaphor landscape\"", "start_char_pos": 1984, "end_char_pos": 2004}, {"type": "R", "before": "\u2018waking dream\u2019 or \u2018", "after": "\"waking dream\" or", "start_char_pos": 2066, "end_char_pos": 2085}, {"type": "R", "before": "Modelling", "after": "modelling", "start_char_pos": 2177, "end_char_pos": 2186}, {"type": "R", "before": "Symbolic Domain", "after": "symbolic domain", "start_char_pos": 2259, "end_char_pos": 2274}, {"type": "R", "before": "Symbolic Perceptions", "after": "symbolic perceptions", "start_char_pos": 2295, "end_char_pos": 2315}, {"type": "R", "before": "Symbolic Patterns", "after": "symbolic patterns", "start_char_pos": 2335, "end_char_pos": 2352}, {"type": "R", "before": "Transformation", "after": "transformation", "start_char_pos": 2374, "end_char_pos": 2388}, {"type": "R", "before": "Evolved Landscape", "after": "evolved landscape", "start_char_pos": 2411, "end_char_pos": 2428}, {"type": "R", "before": "Language", "after": "language", "start_char_pos": 2435, "end_char_pos": 2443}, {"type": "R", "before": "Symbolic Modelling Lite", "after": "symbolic modelling lite", "start_char_pos": 2683, "end_char_pos": 2706}, {"type": "R", "before": "Up", "after": "up", "start_char_pos": 2764, "end_char_pos": 2766}, {"type": "R", "before": "Desired Outcome", "after": "desired outcome", "start_char_pos": 2787, "end_char_pos": 2802}, {"type": "R", "before": "Desired Outcome Landscape", "after": "desired outcome landscape", "start_char_pos": 2822, "end_char_pos": 2847}, {"type": "R", "before": "Effects of Desired Outcome Landscape", "after": "effects of desired outcome landscape", "start_char_pos": 2865, "end_char_pos": 2901}, {"type": "R", "before": "Changes As They Occur", "after": "changes as they occur", "start_char_pos": 2918, "end_char_pos": 2939}, {"type": "R", "before": "Down", "after": "down", "start_char_pos": 2953, "end_char_pos": 2957}, {"type": "R", "before": "Symbolic Modelling", "after": "symbolic modelling", "start_char_pos": 3022, "end_char_pos": 3040}, {"type": "R", "before": "Symbolic Modelling", "after": "symbolic modelling", "start_char_pos": 3305, "end_char_pos": 3323}, {"type": "R", "before": "References", "after": "Notes", "start_char_pos": 3559, "end_char_pos": 3569}, {"type": "A", "before": null, "after": "References", "start_char_pos": 3570, "end_char_pos": 3570}, {"type": "D", "before": "External links www.cleanlanguage.co.uk homepage of the developers of Symbolic Modelling, with over 200 articles on Clean Language and related subjects. www.cleanchange.co.uk news of applications of Clean Language and Symbolic Modelling, plus Clean Community resources", "after": null, "start_char_pos": 6688, "end_char_pos": 6955}], "sents_char_pos": [0, 178, 430, 555, 754, 925, 1227, 1408, 1571, 1718, 1979, 2146, 2606, 2727, 3172, 3589, 3883, 3940, 4085, 4117, 4278, 4456, 4478, 4520, 4552, 4688, 4720, 4843, 5012, 5234, 5410, 5445, 5531, 5656, 5838, 5972, 6101, 6163, 6197, 6239, 6321, 6405, 6559]}
+{"doc_id": "25146522", "revision_depth": "4", "before_revision": "In September 2018, Juneau created in partnership with diverse communities, a Listening Learning Tour, consisting of 21 community meetings, 22 staff sessions, seven regional town halls, as well as online engagement and solicited input from over 2,500 stakeholders including students. This data informed development of the district\u2019s bold strategic plan, Seattle Excellence. Developed in partnership with community representatives \u201cSeattle Excellence,\u201d SPS five-year strategic plan (adopted by SPS Board of Directors, May 2019), that is unapologetically centered on supporting students of color who are furthest from educational justice, beginning with focus on African American boys and teens.%DIFDELCMD < %DIFDELCMD < %%% Prioritized thirteen elementary schools with a high percentage of African American male students in support of our 3rd grade reading goal. Schools have received enhanced professional development, coaching, and resources. Launched the Seattle Super Reader Campaign in partnership with Seattle Public Library and other community organizations. Have distributed over 62,000 books for student home libraries with a prioritized focus on the 13 schools. Created \u201cBlack Boy Joy\u201d reading lists for students and families in partnership with SPL. Remote Learning%DIFDELCMD < %DIFDELCMD < %%% Juneau has developed myriad of resources for remote learning since 2018, including: Developed 618 standards-aligned, teacher-generated learning videos to supplement instruction in subject areas including English Language Arts, Math, Science, Physical Education, Visual%DIFDELCMD < & %%% Performing Arts, and Native Education. Broadcast on SPSTV, YouTube, KOMO4 News, and SPS social media channels. On the first day, 14,300 students engaged in learning, primarily K \u2013 3. Videos have been viewed over 308,000 times and were supported with learning packets distributed to meal sites across the city. Families and students of color reported higher use of these resources. Developed and distributed over 105,000 aligned learning packets to all 26 food distribution sites and across 50 affordable housing partners, childcare sites, and community organizations. Created a comprehensive Playbook for Remote Learning including safety health, priority standards, technology supports, communication supports for schools. This was a cross-organizational effort.%DIFDELCMD < %DIFDELCMD < %%% In March 2020, during the COVID-19 pandemic, and with Washington state's schools closed, she announced that Seattle Public Schools would not transition to online learning, for equity reasons. In 2020, Juneau provided a device for every student during remote learning. Collapsed a three-year project into 6 months. In addition, launched a \u201cbring your own\u201d program for about 10\\% of our schools.%DIFDELCMD < %DIFDELCMD < %%% Lifted 8 family tech centers and a family tech lines, serving 3,000 families at the resource centers in 1.5 months. Distributed 3200 hotspots or internet codes to families to increase connectivity. Partnered with Amazon to secure 8200 Chromebooks for our youngest learners when schools abruptly closed. Partnered with Alaska airlines to get 12,000 ipads to Seattle from Boston in time for school. With public affairs created \u201chow to\u201d videos in the top 5 languages to support remote learning and engagement with learning platforms. The October average daily platform use is 95\\%. Student and Community Engagement%DIFDELCMD < %DIFDELCMD < %%% In June 2019, Denise Juneau abruptly terminated Seattle School's partnership with the Urban Native Education Alliance, a community-based organization serving Native American youth, a decision which was met with protest in the Native American community. In August 2019, Denise Juneau created the Office of African American Male Achievement (AAMA). Seattle Public Schools is the first district in Washington state, and one of the few across the nation, to create an office that intentionally cultivates the cultural and academic strengths of African American male students while simultaneously addressing their needs. AAMA\u2019s work focuses on four strategic areas: culture, conditions, competencies, and community connection. Juneau also launched the AAMA Student Leadership Council in February 2020. The AAMA managers conduct bi-weekly remote meetings and individual check-ins to ensure Black boys and teens continue to have a seat at the table when it comes to making decisions that affect their lives and education.%DIFDELCMD < %DIFDELCMD < %%% In October 2020, the Seattle King County NAACP and NAACP Youth Council, along with other community organizations such as the Urban Native Education Alliance, publicly called for the termination of Juneau's contract , based on allegations of systemic racism, sexism, cronyism, disparate treatment and nepotism as it relates to the employment of African American employees and other people of color. Denise Juneau launched a representative Student Advisory Committee to the Superintendent. Each High School is represented on the committee.%DIFDELCMD < %DIFDELCMD < %%% Diversity Inclusion In alignment with Seattle Excellence goals the district increased hiring staff of color over the last three years. For the 2020-21 school year, SPS has surpassed its diversity hiring goal by an average of 10\\%.%DIFDELCMD < %DIFDELCMD < %%% Teachers of Color * 26\\% (2018\u201319); 27\\% (2019\u201320); 36\\% (2020\u201321) School Leaders of Color * 35\\% (2018\u201319); 40\\% (2019\u201320); 54\\% (2020\u201321) Central Office Leaders of Color * 36\\% (2019\u201320); 55\\% (2020\u201321) Juneau has expanded Academy of Rising Educators in support of increased staff diversity with an intentional focus on African-American male staff. Registered 125 people for the 2020-21 Academy of Rising Educators (ARE), an innovative \u201cgrow your own\" program in partnership with Seattle Colleges. 89 of whom are people of color (71\\%). 32 of the participants in our educator pathways are AA Males (26\\%). Teach for Liberation series for all ARE candidates. This supports the culturally responsive and specific professional development for people of color and facilitated by people of color from within our community.%DIFDELCMD < %DIFDELCMD < %%% Cross-credited 6 high school ethnic studies courses to provide opportunities for students to take these important classes for graduation. Next semester, SPS will launch a Black Studies course available to students across the city. Hosted a four-day Liberation Through Anti-Racist Education Institute held in August 2020 that served 500 educators. AAMA worked with the Department of Racial Equity Advancement to create an opportunity for Black boys and teens to use and share their brilliance directly with the SPS staff, educators, and community members who attended. The Office of AAMA collaboratively secured $1.8 million dollars from local philanthropies in service of AAMA's work to create policies, structures, and systems designed for Black male students' success. In collaboration with City of Seattle, creating Kingmakers of Seattle Extended model. Kingmakers of Seattle is an elective facilitated sessions for Black male students, facilitated by Black male educators. The course curriculum emphasizes black history, cultural knowledge, positive self-identity, literacy and academic mentoring. Reduction of disproportionate discipline continues to be a focus of staff and the district. \u2013 Reduction in discipline for African American boys from 28/100 students (2015\u201316) to 20/100 students (2018\u201319). Reduction in suspensions in secondary Schools of Promise (Sept. 2019-March 2020) \u2013 161 reduced to 133; 116 reduced to 69 (African American students receiving special education services) Reduction in discipline rate for African American students with IEPs (Individual Educational Program) \u2013 17.1\\% (2015\u201316) to 8.0\\% (2018\u201319) Budgeting and Educator Support%DIFDELCMD < %DIFDELCMD < %%% Denise Juneau ran a successful levy campaign despite uncertainty in state budget and a very challenging opposition from the Seattle Times. Passed the Building Excellence capital levy (BEX V) and Operations Levy. On behalf of the board, Juneau led a task force to advise about a Student and Community Workforce Agreement. Staff negotiated the subsequent agreement with construction trades unions; this agreement will allow the district to leverage its capital investments to provide construction career opportunities to students and communities of color.%DIFDELCMD < %DIFDELCMD < %%% Managed a large capital projects portfolio on time and within budget. Modernized and re-opened the historically landmarked Lincoln High School, the district\u2019s first newly opened comprehensive high school in decades. Reopened Bagley and this winter will open Webster. Construction has continued despite the pandemic. Juneau has negotiated strong, teacher-student centered contracts with our labor partner Seattle Education Association. Successfully negotiated a 1-year contractwith SEA after \u201cfull state funding\u201d of public education and reduction of local levy funding; this was followed by negotiation of a successful 3-year contract and \u201creopening of the contract\u201d and development of two MOAs during school closures. Throughout all negotiations students, racial equity, and fiscal responsibility centered the district\u2019s response and contract outcomes. In addition, she's restructured HR to address misconduct, improve investigations, and ensure high-quality educators are in our classrooms. Strong commitment to transparency and safety of students.%DIFDELCMD < %DIFDELCMD < %%% Early Learning Under her tenure , SPS has expanded Preschool programs at West Seattle, Olympic Hills, Emerson, John Muir, and Licton Springs, including full day Head Start, SPP Plus, and the new Head Start Plus Inclusive classroom preschool program for student with IEPs%DIFDELCMD < %DIFDELCMD < %%% Remote Jump Start: 66 out of 70 elementary and K-8 schools participating across the district; 4, 000 \u2018Welcome to Kindergarten\u2019 Kits with school supplies and learning materials provided for incoming Kindergarten and rising PreK students. In partnership with Public Affairs, Admissions launched an early entrance Kindergarten campaign and increased early enrollment by 400 students for 20-21; providing additional choice for families. This approach directly addresses concerns that families of color haven\u2019t historically been supported in enrolling early and access to SPS supports including school choice.%DIFDELCMD < %DIFDELCMD < %%% Support Services for Students, Families After receiving corrective action by the Washington Office of Superintendent of Public Instruction, SPS implemented special education transportation improvements, including the district\u2019s snow response plan. Most students are now provided a bus route or alternative transportation during inclement weather. Rebuilt the relationship and renegotiated the contract with the district\u2019s primary provider of student transportation, leading to improved service for 2019-20 . Under Juneau's leadership , SPS updated school meal menus to include more culturally specific foods and vegetarian options in response to student taste tests and community engagement. Over two business days, Juneau's team completely retooled Nutrition Services operations to support the citywide distribution of breakfast and lunch to students in a remote learning environment. As of November 2020, 25,000 meals are served each day to students. This is 5,000 more than when in school buildings per day. And in partnership with Fare Start, Amazon and the Backpack Brigade (coalition of community partners) the district is providing evening and weekend meals to SPS families in need.%DIFDELCMD < %DIFDELCMD < %%% In spring 2020, Denise Juneau partnered with community-based organization to provide childcare to over 7,000 students during school closures. This required extensive partnership with the city, funders, and partners.", "after_revision": "In %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < & %%% %DIFDELCMD < %DIFDELCMD < %%% December of 2020, %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% she announced she would not seek a new contract after being told by the school board that she would not receive enough votes for a new contract . Her tenure was full of controversies, including clashes with the teachers union, accusations by the local NAACP that her leadership upheld white supremacist institutions, failing to support vulnerable students, and attempting to force in-school learning without consent of teachers. %DIFDELCMD < %DIFDELCMD < %%% She left her position in May of 2021.", "edit_actions": [{"type": "D", "before": "September 2018, Juneau created in partnership with diverse communities, a Listening", "after": null, "start_char_pos": 3, "end_char_pos": 86}, {"type": "D", "before": "Learning Tour, consisting of 21 community meetings, 22 staff sessions, seven regional town halls, as well as online engagement and solicited input from over 2,500 stakeholders including students. This data informed development of the district\u2019s bold strategic plan, Seattle Excellence. Developed in partnership with community representatives \u201cSeattle Excellence,\u201d SPS five-year strategic plan (adopted by SPS Board of Directors, May 2019), that is unapologetically centered on supporting students of color who are furthest from educational justice, beginning with focus on African American boys and teens.", "after": null, "start_char_pos": 87, "end_char_pos": 692}, {"type": "D", "before": "Prioritized thirteen elementary schools with a high percentage of African American male students in support of our 3rd grade reading goal. Schools have received enhanced professional development, coaching, and resources. Launched the Seattle Super Reader Campaign in partnership with Seattle Public Library and other community organizations. Have distributed over 62,000 books for student home libraries with a prioritized focus on the 13 schools. Created \u201cBlack Boy Joy\u201d reading lists for students and families in partnership with SPL.", "after": null, "start_char_pos": 722, "end_char_pos": 1258}, {"type": "D", "before": "Remote Learning", "after": null, "start_char_pos": 1259, "end_char_pos": 1274}, {"type": "D", "before": "Juneau has developed myriad of resources for remote learning since 2018, including:", "after": null, "start_char_pos": 1304, "end_char_pos": 1387}, {"type": "D", "before": "Developed 618 standards-aligned, teacher-generated learning videos to supplement instruction in subject areas including English Language Arts, Math, Science, Physical Education, Visual", "after": null, "start_char_pos": 1388, "end_char_pos": 1572}, {"type": "D", "before": "Performing Arts, and Native Education. Broadcast on SPSTV, YouTube, KOMO4 News, and SPS social media channels. On the first day, 14,300 students engaged in learning, primarily K \u2013 3. Videos have been viewed over 308,000 times and were supported with learning packets distributed to meal sites across the city. Families and students of color reported higher use of these resources. Developed and distributed over 105,000 aligned learning packets to all 26 food distribution sites and across 50 affordable housing partners, childcare sites, and community organizations. Created a comprehensive Playbook for Remote Learning including safety", "after": null, "start_char_pos": 1591, "end_char_pos": 2228}, {"type": "D", "before": "health, priority standards, technology supports, communication supports for schools. This was a cross-organizational effort.", "after": null, "start_char_pos": 2229, "end_char_pos": 2353}, {"type": "R", "before": "In March", "after": "December of", "start_char_pos": 2383, "end_char_pos": 2391}, {"type": "D", "before": "during the COVID-19 pandemic, and with Washington state's schools closed, she announced that Seattle Public Schools would not transition to online learning, for equity reasons.", "after": null, "start_char_pos": 2398, "end_char_pos": 2574}, {"type": "D", "before": "In 2020, Juneau provided a device for every student during remote learning. Collapsed a three-year project into 6 months. In addition, launched a \u201cbring your own\u201d program for about 10\\% of our schools.", "after": null, "start_char_pos": 2575, "end_char_pos": 2776}, {"type": "D", "before": "Lifted 8 family tech centers and a family tech lines, serving 3,000 families at the resource centers in 1.5 months. Distributed 3200 hotspots or internet codes to families to increase connectivity. Partnered with Amazon to secure 8200 Chromebooks for our youngest learners when schools abruptly closed. Partnered with Alaska airlines to get 12,000 ipads to Seattle from Boston in time for school. With public affairs created \u201chow to\u201d videos in the top 5 languages to support remote learning and engagement with learning platforms. The October average daily platform use is 95\\%.", "after": null, "start_char_pos": 2806, "end_char_pos": 3384}, {"type": "D", "before": "Student and Community Engagement", "after": null, "start_char_pos": 3385, "end_char_pos": 3417}, {"type": "D", "before": "In June 2019, Denise Juneau abruptly terminated Seattle School's partnership with the Urban Native Education Alliance, a community-based organization serving Native American youth, a decision which was met with protest in the Native American community.", "after": null, "start_char_pos": 3447, "end_char_pos": 3699}, {"type": "D", "before": "In August 2019, Denise Juneau created the Office of African American Male Achievement (AAMA). Seattle Public Schools is the first district in Washington state, and one of the few across the nation, to create an office that intentionally cultivates the cultural and academic strengths of African American male students while simultaneously addressing their needs. AAMA\u2019s work focuses on four strategic areas: culture, conditions, competencies, and community connection. Juneau also launched the AAMA Student Leadership Council in February 2020. The AAMA managers conduct bi-weekly remote meetings and individual check-ins to ensure Black boys and teens continue to have a seat at the table when it comes to making decisions that affect their lives and education.", "after": null, "start_char_pos": 3700, "end_char_pos": 4461}, {"type": "D", "before": "In October 2020, the Seattle King County NAACP and NAACP Youth Council, along with other community organizations such as the Urban Native Education Alliance, publicly called for the termination of Juneau's contract , based on allegations of systemic racism, sexism, cronyism, disparate treatment and nepotism as it relates to the employment of African American employees and other people of color.", "after": null, "start_char_pos": 4491, "end_char_pos": 4888}, {"type": "D", "before": "Denise Juneau launched a representative Student Advisory Committee to the Superintendent. Each High School is represented on the committee.", "after": null, "start_char_pos": 4889, "end_char_pos": 5028}, {"type": "D", "before": "Diversity Inclusion", "after": null, "start_char_pos": 5058, "end_char_pos": 5077}, {"type": "D", "before": "In alignment with Seattle Excellence goals the district increased hiring staff of color over the last three years. For the 2020-21 school year, SPS has surpassed its diversity hiring goal by an average of 10\\%.", "after": null, "start_char_pos": 5078, "end_char_pos": 5288}, {"type": "D", "before": "Teachers of Color * 26\\% (2018\u201319); 27\\% (2019\u201320); 36\\% (2020\u201321) School Leaders of Color * 35\\% (2018\u201319); 40\\% (2019\u201320); 54\\% (2020\u201321) Central Office Leaders of Color * 36\\% (2019\u201320); 55\\% (2020\u201321)", "after": null, "start_char_pos": 5318, "end_char_pos": 5522}, {"type": "D", "before": "Juneau has expanded Academy of Rising Educators in support of increased staff diversity with an intentional focus on African-American male staff. Registered 125 people for the 2020-21 Academy of Rising Educators (ARE), an innovative \u201cgrow your own\" program in partnership with Seattle Colleges. 89 of whom are people of color (71\\%). 32 of the participants in our educator pathways are AA Males (26\\%). Teach for Liberation series for all ARE candidates. This supports the culturally responsive and specific professional development for people of color and facilitated by people of color from within our community.", "after": null, "start_char_pos": 5523, "end_char_pos": 6137}, {"type": "D", "before": "Cross-credited 6 high school ethnic studies courses to provide opportunities for students to take these important classes for graduation. Next semester, SPS will launch a Black Studies course available to students across the city. Hosted a four-day Liberation Through Anti-Racist Education Institute held in August 2020 that served 500 educators. AAMA worked with the Department of Racial Equity Advancement to create an opportunity for Black boys and teens to use and share their brilliance directly with the SPS staff, educators, and community members who attended. The Office of AAMA collaboratively secured $1.8 million dollars from local philanthropies in service of AAMA's work to create policies, structures, and systems designed for Black male students' success. In collaboration with City of Seattle, creating Kingmakers of Seattle Extended model. Kingmakers of Seattle is an elective facilitated sessions for Black male students, facilitated by Black male educators. The course curriculum emphasizes black history, cultural knowledge, positive self-identity, literacy and academic mentoring. Reduction of disproportionate discipline continues to be a focus of staff and the district. \u2013 Reduction in discipline for African American boys from 28/100 students (2015\u201316) to 20/100 students (2018\u201319). Reduction in suspensions in secondary Schools of Promise (Sept. 2019-March 2020) \u2013 161 reduced to 133; 116 reduced to 69 (African American students receiving special education services) Reduction in discipline rate for African American students with IEPs (Individual Educational Program) \u2013 17.1\\% (2015\u201316) to 8.0\\% (2018\u201319)", "after": null, "start_char_pos": 6167, "end_char_pos": 7799}, {"type": "D", "before": "Budgeting and Educator Support", "after": null, "start_char_pos": 7800, "end_char_pos": 7830}, {"type": "D", "before": "Denise Juneau ran a successful levy campaign despite uncertainty in state budget and a very challenging opposition from the Seattle Times. Passed the Building Excellence capital levy (BEX V) and Operations Levy.", "after": null, "start_char_pos": 7860, "end_char_pos": 8071}, {"type": "D", "before": "On behalf of the board, Juneau led a task force to advise about a Student and Community Workforce Agreement. Staff negotiated the subsequent agreement with construction trades unions; this agreement will allow the district to leverage its capital investments to provide construction career opportunities to students and communities of color.", "after": null, "start_char_pos": 8072, "end_char_pos": 8413}, {"type": "D", "before": "Managed a large capital projects portfolio on time and within budget. Modernized and re-opened the historically landmarked Lincoln High School, the district\u2019s first newly opened comprehensive high school in decades. Reopened Bagley and this winter will open Webster. Construction has continued despite the pandemic.", "after": null, "start_char_pos": 8443, "end_char_pos": 8758}, {"type": "D", "before": "Juneau has negotiated strong, teacher-student centered contracts with our labor partner Seattle Education Association. Successfully negotiated a 1-year contractwith SEA after \u201cfull state funding\u201d of public education and reduction of local levy funding; this was followed by negotiation of a successful 3-year contract and \u201creopening of the contract\u201d and development of two MOAs during school closures. Throughout all negotiations students, racial equity, and fiscal responsibility centered the district\u2019s response and contract outcomes. In addition, she's restructured HR to address misconduct, improve investigations, and ensure high-quality educators are in our classrooms. Strong commitment to transparency and safety of students.", "after": null, "start_char_pos": 8759, "end_char_pos": 9492}, {"type": "D", "before": "Early Learning", "after": null, "start_char_pos": 9522, "end_char_pos": 9536}, {"type": "D", "before": "Under her tenure , SPS has expanded Preschool programs at West Seattle, Olympic Hills, Emerson, John Muir, and Licton Springs, including full day Head Start, SPP Plus, and the new Head Start Plus Inclusive classroom preschool program for student with IEPs", "after": null, "start_char_pos": 9537, "end_char_pos": 9792}, {"type": "D", "before": "Remote Jump Start: 66 out of 70 elementary and K-8 schools participating across the district; 4, 000 \u2018Welcome to Kindergarten\u2019 Kits with school supplies and learning materials provided for incoming Kindergarten and rising PreK students.", "after": null, "start_char_pos": 9822, "end_char_pos": 10058}, {"type": "D", "before": "In partnership with Public Affairs, Admissions launched an early entrance Kindergarten campaign and increased early enrollment by 400 students for 20-21; providing additional choice for families. This approach directly addresses concerns that families of color haven\u2019t historically been supported in enrolling early and access to SPS supports including school choice.", "after": null, "start_char_pos": 10059, "end_char_pos": 10426}, {"type": "D", "before": "Support Services for Students, Families", "after": null, "start_char_pos": 10456, "end_char_pos": 10495}, {"type": "R", "before": "After receiving corrective action by the Washington Office of Superintendent of Public Instruction, SPS implemented special education transportation improvements, including the district\u2019s snow response plan. Most students are now provided a bus route or alternative transportation during inclement weather. Rebuilt the relationship and renegotiated the contract with the district\u2019s primary provider of student transportation, leading to improved service for 2019-20", "after": "she announced she would not seek a new contract after being told by the school board that she would not receive enough votes for a new contract", "start_char_pos": 10496, "end_char_pos": 10961}, {"type": "A", "before": null, "after": "Her tenure was full of controversies, including clashes with the teachers union, accusations by the local NAACP that her leadership upheld white supremacist institutions, failing to support vulnerable students, and attempting to force in-school learning without consent of teachers.", "start_char_pos": 10964, "end_char_pos": 10964}, {"type": "D", "before": "Under Juneau's leadership , SPS updated school meal menus to include more culturally specific foods and vegetarian options in response to student taste tests and community engagement. Over two business days, Juneau's team completely retooled Nutrition Services operations to support the citywide distribution of breakfast and lunch to students in a remote learning environment. As of November 2020, 25,000 meals are served each day to students. This is 5,000 more than when in school buildings per day. And in partnership with Fare Start, Amazon and the Backpack Brigade (coalition of community partners) the district is providing evening and weekend meals to SPS families in need.", "after": null, "start_char_pos": 10965, "end_char_pos": 11646}, {"type": "R", "before": "In spring 2020, Denise Juneau partnered with community-based organization to provide childcare to over 7,000 students during school closures. This required extensive partnership with the city, funders, and partners.", "after": "She left her position in May of 2021.", "start_char_pos": 11676, "end_char_pos": 11891}], "sents_char_pos": [0, 282, 372, 692, 860, 942, 1063, 1169, 1629, 1701, 1900, 1971, 2158, 2313, 2353, 2574, 2650, 2696, 2776, 2921, 3003, 3108, 3202, 3336, 3384, 3699, 3793, 4062, 4168, 4243, 4461, 4888, 4978, 5028, 5192, 5288, 5353, 5369, 5426, 5442, 5507, 5668, 5817, 5856, 5925, 5977, 6137, 6304, 6397, 6513, 6734, 6937, 7023, 7143, 7268, 7360, 7473, 7576, 7998, 8071, 8180, 8255, 8413, 8512, 8658, 8709, 8758, 8877, 9011, 9160, 9295, 9434, 9492, 9915, 10058, 10212, 10254, 10426, 10703, 10802, 11148, 11342, 11409, 11467, 11646, 11817]}
+{"doc_id": "25259910", "revision_depth": "1", "before_revision": "The field of neurovirology was formed within the past 30 years. Johnson, R (1995). \"Neurovirology: evolution of a new discipline\", Journal of Neurovirology, 1(2). It was founded upon the discovery that a large number of viruses are capable of invading and establishing latent infections in nervous tissue. Such viruses have been shown to produce slow, chronic, or progressive nervous system diseases.McKendall, R and Stroop, W (1994). \"Handbook of Neurovirology\". (v). Neurovirology incorporates the related fields of virology, neuroscience, neurology, immunology, and molecular biology. The main focus of the field is to study the molecular and biological basis of virus induced diseases of the nervous system. In addition to this, the field studies the use of these viruses as tracers of neuroanatomical pathways and as vectors for gene therapy. Neurovirology only became an official field within the past 30 years. Johnson, R (1995). \"Neurovirology: evolution of a new discipline\", Journal of Neurovirology, 1(2). However, the true origin of neurovirology can be accredited to the discovery that some viruses may have an affinity for nervous system tissue. This discovery was made in the late 1880s with research involving rabies.Gosztonyi, G (2001). The Mechanisms of Neuronal Damage in Virus Infections of the Nervous System. (1). In 1929 Heinrich Pette established the first classification criteria for inflammatory diseases of the nervous system. This classification separated the diseases into two groups: gray matter acute and white matter acute inflammatory diseases. Gray matter acute inflammatory diseases were characterized by damage to neurons with myelin remaining intact. White matter acute inflammatory diseases were characterized by destruction of the myelin, with neurons remaining intact. Gosztonyi, G (2001). The Mechanisms of Neuronal Damage in Virus Infections of the Nervous System. (4). In 1938, Sbin and Olitsky discovered that the distribution of the virus within the body depended on its mechanism of entry. Gosztonyi, G (2001). The Mechanisms of Neuronal Damage in Virus Infections of the Nervous System. (6). In 1965, ZuRhein and Chou established that destruction of myelin could result from primary virus infection, not only from autoimmune response to the virus. Gosztonyi, G (2001). The Mechanisms of Neuronal Damage in Virus Infections of the Nervous System. (8). Most of the research of which the field of neurovirology is based upon occurred in the late 1980s and the 1900s. Gosztonyi, G (2001). The Mechanisms of Neuronal Damage in Virus Infections of the Nervous System. (10). Beginning in 1999 the International Society of Neurovirology has recognized and awarded individuals who have contributed significantly to the field with the Pioneer in NeuroVirology URL Herpesviruses Herpes simplex virus type 1 (HSV-1) Evidence may support link between virus and Alzheimer's disease, intractable focal epilepsy, and acute disseminated encephalomyelitisNath A, Berger J (2003). Clinical Neurovirology. 119. Infection can produce myelitis and encephalitisMcKendall, R and Stroop, W (1994). \"Handbook of Neurovirology\".(7). Herpes simplex virus type 2 (HSV-2) Infection can produce myelitis and encephalitis Human cytomegalovirus (CMV) Infection is associated with Guillain\u2013Barr\u00e9 syndrome Is the most common viral cause of childhood mental retardation Is linked to neurological abnormalities, such as: microencephaly, seizures, hypotomia, and sensorineural hearing lossMcKendall, R and Stroop, W (1994). \"Handbook of Neurovirology\". Varicella-zoster virus (VZV) Is associated with neurological complications such as: meningoencephalitis, myelitis, cerebellar ataxia, Reye's syndrome, cranial neuropatheis, and postinfectious disseminated encephalomyelitisMueller N, Gilden D, Cohrs R, (2008). \"Varicella Zoster Virus Infection: Clinical Features, Molecular Pathogenesis of Disease, and Latency\". Neurologic Clinics. 26(675). Epstein-Barr virus (EBV) Is associated with Guillain\u2013Barr\u00e9 syndrome, cranial mononeuropathies, focal encephalitis, and myelitis Is considered the leading viral candidate for causing Multiple SclerosisLincoln J, Hankiewicz K (2008). \"Could Epstein-Barr Virus or Canine Distemper Virus Cause Multiple Sclerosis?\". Neurologic Clinics 26(699). Human herpesvirus type 6 (HHV-6) and Human herpesvirus type 7 (HHV-7) Have not been linked to human nervous system disease Polyomaviruses JC virus (JCV) Is associated with progressive multifocal leukoencephalopathy and demyelinationMcKendall, R and Stroop, W (1994). \"Handbook of Neurovirology\".(343). Rhabdoviruses Rabies Virus Gives rise to neuronal dysfunctionJackson A. (2008) \"Rabies\". Neurologic Clinics. 26(717). Paramyxoviruses Measles virus Is a major cause of neurological deficitsNath A, Berger J (2003). Clinical Neurovirology. 401. Mumps virus Is the leading cause of virus induced aseptic meningitis and encephalitisNath A, Berger J (2003). Clinical Neurovirology. 1431. Retroviruses Human Immunodeficiency Virus (HIV) Is associated with cognitive dysfunction There are two main ways that a virus is thought to enter the brain via hematogenous spread. The first is by infecting an immune cell, which then carries the virus to the nervous tissue. Viral examples of this include the JC virus which infects B cells and HIV which infects CD4 T cells and macrophages to infiltrate the brain. The second is by crossing the blood capillaries as a free virus or in leukocytes. Nath A, Berger J (2003). Clinical Neurovirology. 23. Neurons lack molecules necessary to present viral peptides on the surface to killer cells, which means they provide a safe house for viruses to replicate. Once viruses get in neurons they can persist for the hosts lifetime and can influence the factors that disturb the function of neurons and the homeostasis of the nervous system, leading to nervous system diseases. Nath A, Berger J (2003). Clinical Neurovirology. 26. In recent years, due to the development of less invasive diagnosis techniques, brain biopsies are no longer frequently used for diagnosing viral infections of the nervous system. Nath A, Berger J (2003). Clinical Neurovirology. 35. However, some viral infections of the CNS cannot be diagnosed without histological and electron microscopic evidence. In these cases, brain biopsies are only performed when the patient has a serious neurological illness and is in need of immediate therapy, an alternative procedure will not lead to a specific diagnosis, and the information gained by the brain biopsy will outweigh the risks. The use of antiviral treatment with both Multiple Sclerosis and AIDS dementia has proven ineffective as a treatment. In patients with Multiple Sclerosis, antiviral treatment of EBV with Acyclovir showed no significant difference from the placebo. Lincoln J, Hankiewicz K (2008). \"Could Epstein-Barr Virus or Canine Distemper Virus Cause Multiple Sclerosis?\". Neurologic Clinics 26(699). In patients with AIDS dementia, despite antiretroviral therapy, CNS function remains diminished.Ferris M, Mactutus C, Booze R (2008). \"Neurotoxic profiles of HIV, psychostimulant drugs of abuse, and their concerted effect on the brain: Current status of dopamine system vulnerability in NeuroAIDS\". Neuroscience and Biobehavioral Reviews 32(883). HSV-1 is a promising gene therapy agent, which could be used for gene delivery to neurons. This therapy may be used to treat metabolic brain diseases, neurodegenerative disorders, or to help enhance repair of brain tissue in neurological diseases. Nath A, Berger J (2003). Clinical Neurovirology. 121. New viruses and viral infections of the nervous system will continue to emerge and the field of neurovirology must constantly expand to meet these growing needs. Nath A, Berger J (2003). Clinical Neurovirology. v. While the interest in researching viruses that infect the nervous system has increased dramatically over the past 40 years, there are three key components vital for the continued advancement of the field: External links International Society for NeuroVirology (ISNV) Pan-American Society for NeuroVirology %DIFDELCMD < %DIFDELCMD < %%% See also Neurology Virology Neuroimmunology%DIFDELCMD < %DIFDELCMD < %%% References", "after_revision": "The field of neurovirology was formed within the past 30 years. It was founded upon the discovery that a large number of viruses are capable of invading and establishing latent infections in nervous tissue. Such viruses have been shown to produce slow, chronic, or progressive nervous system diseases.McKendall, R and Stroop, W (1994). \"Handbook of Neurovirology\". Neurovirology incorporates the related fields of virology, neuroscience, neurology, immunology, and molecular biology. The main focus of the field is to study the molecular and biological basis of virus induced diseases of the nervous system. In addition to this, the field studies the use of these viruses as tracers of neuroanatomical pathways and as vectors for gene therapy. Neurovirology only became an official field within the past 30 years. However, the true origin of neurovirology can be accredited to the discovery that some viruses may have an affinity for nervous system tissue. This discovery was made in the late 1880s with research involving rabies.Gosztonyi, G (2001). The Mechanisms of Neuronal Damage in Virus Infections of the Nervous System. In 1929 Heinrich Pette established the first classification criteria for inflammatory diseases of the nervous system. This classification separated the diseases into two groups: gray matter acute and white matter acute inflammatory diseases. Gray matter acute inflammatory diseases were characterized by damage to neurons with myelin remaining intact. White matter acute inflammatory diseases were characterized by destruction of the myelin, with neurons remaining intact. In 1938, Sbin and Olitsky discovered that the distribution of the virus within the body depended on its mechanism of entry. In 1965, ZuRhein and Chou established that destruction of myelin could result from primary virus infection, not only from autoimmune response to the virus. Most of the research of which the field of neurovirology is based upon occurred in the late 1980s and the 1900s. Beginning in 1999 the International Society of Neurovirology has recognized and awarded individuals who have contributed significantly to the field with the Pioneer in NeuroVirology Award. Herpesviruses Herpes simplex virus type 1 (HSV-1) Evidence may support link between virus and Alzheimer's disease, intractable focal epilepsy, and acute disseminated encephalomyelitisNath A, Berger J (2003). Clinical Neurovirology. Infection can produce myelitis and encephalitis Herpes simplex virus type 2 (HSV-2) Infection can produce myelitis and encephalitis Human cytomegalovirus (CMV) Infection is associated with Guillain\u2013Barr\u00e9 syndrome Is the most common viral cause of childhood mental retardation Is linked to neurological abnormalities, such as: microencephaly, seizures, hypotomia, and sensorineural hearing loss Varicella-zoster virus (VZV) Is associated with neurological complications such as: meningoencephalitis, myelitis, cerebellar ataxia, Reye's syndrome, cranial neuropatheis, and postinfectious disseminated encephalomyelitisMueller N, Gilden D, Cohrs R, (2008). \"Varicella Zoster Virus Infection: Clinical Features, Molecular Pathogenesis of Disease, and Latency\". Neurologic Clinics. 26(675). Epstein-Barr virus (EBV) Is associated with Guillain\u2013Barr\u00e9 syndrome, cranial mononeuropathies, focal encephalitis, and myelitis Is considered the leading viral candidate for causing Multiple SclerosisLincoln J, Hankiewicz K (2008). \"Could Epstein-Barr Virus or Canine Distemper Virus Cause Multiple Sclerosis?\". Neurologic Clinics 26(699). Human herpesvirus type 6 (HHV-6) and Human herpesvirus type 7 (HHV-7) Have not been linked to human nervous system disease Polyomaviruses JC virus (JCV) Is associated with progressive multifocal leukoencephalopathy and demyelination Rhabdoviruses Rabies virus Gives rise to neuronal dysfunctionJackson A. (2008) \"Rabies\". Neurologic Clinics. 26(717). Paramyxoviruses Measles virus Is a major cause of neurological deficits Mumps virus Is the leading cause of virus induced aseptic meningitis and encephalitis Retroviruses Human immunodeficiency virus (HIV) Is associated with cognitive dysfunction There are two main ways that a virus is thought to enter the brain via hematogenous spread. The first is by infecting an immune cell, which then carries the virus to the nervous tissue. Viral examples of this include the JC virus which infects B cells and HIV which infects CD4 T cells and macrophages to infiltrate the brain. The second is by crossing the blood capillaries as a free virus or in leukocytes. Neurons lack molecules necessary to present viral peptides on the surface to killer cells, which means they provide a safe house for viruses to replicate. Once viruses get in neurons they can persist for the hosts lifetime and can influence the factors that disturb the function of neurons and the homeostasis of the nervous system, leading to nervous system diseases. In recent years, due to the development of less invasive diagnosis techniques, brain biopsies are no longer frequently used for diagnosing viral infections of the nervous system. However, some viral infections of the CNS cannot be diagnosed without histological and electron microscopic evidence. In these cases, brain biopsies are only performed when the patient has a serious neurological illness and is in need of immediate therapy, an alternative procedure will not lead to a specific diagnosis, and the information gained by the brain biopsy will outweigh the risks. The use of antiviral treatment with both Multiple Sclerosis and AIDS dementia has proven ineffective as a treatment. In patients with Multiple Sclerosis, antiviral treatment of EBV with Acyclovir showed no significant difference from the placebo. In patients with AIDS dementia, despite antiretroviral therapy, CNS function remains diminished.Ferris M, Mactutus C, Booze R (2008). \"Neurotoxic profiles of HIV, psychostimulant drugs of abuse, and their concerted effect on the brain: Current status of dopamine system vulnerability in NeuroAIDS\". Neuroscience and Biobehavioral Reviews 32(883). HSV-1 is a promising gene therapy agent, which could be used for gene delivery to neurons. This therapy may be used to treat metabolic brain diseases, neurodegenerative disorders, or to help enhance repair of brain tissue in neurological diseases. New viruses and viral infections of the nervous system will continue to emerge and the field of neurovirology must constantly expand to meet these growing needs. While the interest in researching viruses that infect the nervous system has increased dramatically over the past 40 years, there are three key components vital for the continued advancement of the field: See also Neuroimmunology Neurology Virology References External links International Society for NeuroVirology (ISNV) Pan-American Society for NeuroVirology %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "D", "before": "Johnson, R (1995). \"Neurovirology: evolution of a new discipline\", Journal of Neurovirology, 1(2).", "after": null, "start_char_pos": 64, "end_char_pos": 162}, {"type": "D", "before": "(v).", "after": null, "start_char_pos": 464, "end_char_pos": 468}, {"type": "D", "before": "Johnson, R (1995). \"Neurovirology: evolution of a new discipline\", Journal of Neurovirology, 1(2).", "after": null, "start_char_pos": 918, "end_char_pos": 1016}, {"type": "D", "before": "(1).", "after": null, "start_char_pos": 1331, "end_char_pos": 1335}, {"type": "D", "before": "Gosztonyi, G (2001). The Mechanisms of Neuronal Damage in Virus Infections of the Nervous System. (4).", "after": null, "start_char_pos": 1809, "end_char_pos": 1911}, {"type": "D", "before": "Gosztonyi, G (2001). The Mechanisms of Neuronal Damage in Virus Infections of the Nervous System. (6).", "after": null, "start_char_pos": 2036, "end_char_pos": 2138}, {"type": "D", "before": "Gosztonyi, G (2001). The Mechanisms of Neuronal Damage in Virus Infections of the Nervous System. (8).", "after": null, "start_char_pos": 2295, "end_char_pos": 2397}, {"type": "D", "before": "Gosztonyi, G (2001). The Mechanisms of Neuronal Damage in Virus Infections of the Nervous System. (10).", "after": null, "start_char_pos": 2511, "end_char_pos": 2614}, {"type": "R", "before": "URL", "after": "Award.", "start_char_pos": 2797, "end_char_pos": 2800}, {"type": "D", "before": "119.", "after": null, "start_char_pos": 3033, "end_char_pos": 3037}, {"type": "R", "before": "encephalitisMcKendall, R and Stroop, W (1994). \"Handbook of Neurovirology\".(7).", "after": "encephalitis", "start_char_pos": 3073, "end_char_pos": 3152}, {"type": "R", "before": "lossMcKendall, R and Stroop, W (1994). \"Handbook of Neurovirology\".", "after": "loss", "start_char_pos": 3494, "end_char_pos": 3561}, {"type": "R", "before": "demyelinationMcKendall, R and Stroop, W (1994). \"Handbook of Neurovirology\".(343).", "after": "demyelination", "start_char_pos": 4513, "end_char_pos": 4595}, {"type": "R", "before": "Virus", "after": "virus", "start_char_pos": 4617, "end_char_pos": 4622}, {"type": "R", "before": "deficitsNath A, Berger J (2003). Clinical Neurovirology. 401.", "after": "deficits", "start_char_pos": 4777, "end_char_pos": 4838}, {"type": "R", "before": "encephalitisNath A, Berger J (2003). Clinical Neurovirology. 1431.", "after": "encephalitis", "start_char_pos": 4912, "end_char_pos": 4978}, {"type": "R", "before": "Immunodeficiency Virus", "after": "immunodeficiency virus", "start_char_pos": 4998, "end_char_pos": 5020}, {"type": "D", "before": "Nath A, Berger J (2003). Clinical Neurovirology. 23.", "after": null, "start_char_pos": 5477, "end_char_pos": 5529}, {"type": "D", "before": "Nath A, Berger J (2003). Clinical Neurovirology. 26.", "after": null, "start_char_pos": 5899, "end_char_pos": 5951}, {"type": "D", "before": "Nath A, Berger J (2003). Clinical Neurovirology. 35.", "after": null, "start_char_pos": 6131, "end_char_pos": 6183}, {"type": "D", "before": "Lincoln J, Hankiewicz K (2008). \"Could Epstein-Barr Virus or Canine Distemper Virus Cause Multiple Sclerosis?\". Neurologic Clinics 26(699).", "after": null, "start_char_pos": 6824, "end_char_pos": 6963}, {"type": "D", "before": "Nath A, Berger J (2003). Clinical Neurovirology. 121.", "after": null, "start_char_pos": 7559, "end_char_pos": 7612}, {"type": "D", "before": "Nath A, Berger J (2003). Clinical Neurovirology. v.", "after": null, "start_char_pos": 7775, "end_char_pos": 7826}, {"type": "A", "before": null, "after": "See also", "start_char_pos": 8032, "end_char_pos": 8032}, {"type": "A", "before": null, "after": "Neuroimmunology Neurology Virology", "start_char_pos": 8033, "end_char_pos": 8033}, {"type": "A", "before": null, "after": "References", "start_char_pos": 8034, "end_char_pos": 8034}, {"type": "D", "before": "See also", "after": null, "start_char_pos": 8166, "end_char_pos": 8174}, {"type": "D", "before": "Neurology Virology Neuroimmunology", "after": null, "start_char_pos": 8175, "end_char_pos": 8209}, {"type": "D", "before": "References", "after": null, "start_char_pos": 8239, "end_char_pos": 8249}], "sents_char_pos": [0, 63, 82, 162, 305, 400, 434, 463, 587, 711, 847, 917, 936, 1016, 1159, 1233, 1253, 1335, 1453, 1577, 1687, 1808, 1829, 1906, 2035, 2056, 2133, 2294, 2315, 2392, 2510, 2531, 2608, 3008, 3032, 3119, 3148, 3532, 3561, 3821, 3924, 3944, 4185, 4265, 4293, 4560, 4589, 4684, 4704, 4809, 4833, 4948, 4972, 5159, 5253, 5394, 5476, 5501, 5525, 5684, 5898, 5923, 5947, 6130, 6155, 6179, 6301, 6576, 6693, 6823, 6855, 6935, 6963, 7060, 7097, 7262, 7310, 7401, 7558, 7583, 7607, 7774, 7799]}
+{"doc_id": "25513994", "revision_depth": "1", "before_revision": "Black salve, also known by the brand name Cansema, is pseudoscientific alternative cancer treatment. The product is commonly classified as an escharotic\u2014a topical paste which destroys skin tissue and leaves behind a scar called an eschar. Escharotics were widely used to treat skin lesions in the early 1900s, but have since been replaced by safer and more effective treatments. Escharotics, such as black salves, are currently advertised by some alternative medicine marketers as treatments for skin cancer, often with unsubstantiated testimonials and unproven claims of effectiveness. Although more recent reports document that some alternative medicine practitioners use the internet to market escharotics as purported \"cures\" for skin cancer, they are not recommended as treatments for skin lesions or skin cancer by medical authorities . The effectiveness of escharotics is unproven, while safer and more effective conventional treatments exist for skin cancers, such as: cryotherapy; topical agents such as imiquimod, fluorouracil and ingenol mebutate; radiation therapy; and surgical excision, including Mohs surgery (microscopically controlled surgery used to remove and test cancerous tissue). Escharotics can cause serious scarring and damage to normal skin. Their manufacture is largely unregulated, so the strength and purity of marketed products are unknown and unverified. Numerous reports in the medical literature describe serious consequences of using escharotics in place of standard treatments for skin cancer, ranging from disfigurement to preventable cancer recurrences. The website Quackwatch posted a warning against the use of escharotics in 2008, with a collection of sourced documents compiling issues of patient injury from their use. A more recent study revealed that many individuals who have used black salve were unaware of its potential dangers. In a 2016 news release titled \"Beware of black salve, \" the American Academy of Dermatology urged patients to consult a dermatologist before using home remedies for skin cancers. In 2018 in Australia black salve has been strongly linked to the death of Helen Lawson who decided to use \"natural remedies\" under the direction of self-proclaimed healer Dennis Wayne Jensen . Jensen advocated covering Lawson's abdomen in black salve claiming it would draw out the ovarian cancer, leaving Lawson with a mass of wounds on her abdomen : \u201cYou have never seen anything like what happened to Helen. It is so confronting, \u201d Lawson's sister-in-law , Deb Davies said. \u201cLiterally above her pubic bone, all across her abdomen almost up to her rib cage , she was raw, mutilated bubbling flesh . \u201d Lawson's partner of 21 years, Belinda Davies said that within a few weeks of Helen applying the black salve the wound was so large that surgeons could not have operated even if they had wanted to. Lawson died in April 2018. Subsequently , Jensen was issued an interim prohibition order , by the Health Complaints Commissioner , forbidding practicing any health services whilst the death of Lawson is being investigated. This was pursuant to section 90 of the Health Complaints Act 2016 (Victoria, Australia)", "after_revision": "Black salve, also known by the brand name Cansema, is pseudoscientific alternative cancer treatment. The product is commonly classified as an escharotic\u2014a topical paste which destroys skin tissue and leaves behind a scar called an eschar. Escharotics were widely used to treat skin lesions in the early 1900s, but have since been replaced by safer and more effective treatments. Escharotics, such as black salves, are currently advertised by some alternative medicine marketers as treatments for skin cancer, often with unsubstantiated testimonials and unsupported claims of effectiveness. They are not recommended as treatments for skin lesions or skin cancer by medical authorities , but are marketed as such by some alternative medicine practitioners. Use of escharotics, particularly when used instead of proven treatments, can be dangerous. The escharotic may not remove all of the cancerous cells, and frequently removes healthy tissue. Practitioners who use or sell escharotics frequently provide testimonials, in place of scientific evidence, to convince others of effectiveness and safety which does not exist. Safer and more effective treatments exist for skin cancers, such as: cryotherapy; topical agents such as imiquimod, fluorouracil and ingenol mebutate; radiation therapy; and surgical excision, including Mohs surgery (microscopically controlled surgery used to remove and test cancerous tissue). Escharotics can cause serious scarring and damage to normal skin. Their manufacture is largely unregulated, so the strength and purity of marketed products are unknown and unverified. Numerous reports in the medical literature describe serious consequences of using escharotics in place of standard treatments for skin cancer, ranging from disfigurement to preventable cancer recurrences. The website Quackwatch warned against the use of escharotics in 2008, with a collection of sourced documents compiling issues of patient injury from their use. A more recent study revealed that many individuals who have used black salve were unaware of its potential dangers. In 2016 , the American Academy of Dermatology urged patients to consult a dermatologist before using home remedies for skin cancers. In 2018 , black salve was strongly linked to the death of Helen Lawson in Australia. Lawson covered her abdomen in black salve under the direction of Dennis Wayne Jensen , a self-proclaimed healer, who advised her that it would draw out her ovarian cancer. The black salve left Lawson with a mass of wounds on her abdomen , which became so large that surgeons could not operate on it within a few weeks. Lawson's sister-in-law described the wounds as extending from \" above her pubic bone, all across her abdomen almost up to her rib cage \", and as \" raw, mutilated bubbling flesh \u201d . Lawson died in April 2018. In 2019 , Jensen was issued a prohibition order by the Health Complaints Commissioner of Victoria, forbidding him permanently from providing substances which \"he (or anyone else) claims can cure or treat cancer or other serious disease or illness\". This includes black salve.", "edit_actions": [{"type": "R", "before": "unproven", "after": "unsupported", "start_char_pos": 553, "end_char_pos": 561}, {"type": "R", "before": "Although more recent reports document that some alternative medicine practitioners use the internet to market escharotics as purported \"cures\" for skin cancer, they", "after": "They", "start_char_pos": 587, "end_char_pos": 751}, {"type": "R", "before": ". The effectiveness of escharotics is unproven, while safer and more effective conventional", "after": ", but are marketed as such by some alternative medicine practitioners. Use of escharotics, particularly when used instead of proven treatments, can be dangerous. The escharotic may not remove all of the cancerous cells, and frequently removes healthy tissue. Practitioners who use or sell escharotics frequently provide testimonials, in place of scientific evidence, to convince others of effectiveness and safety which does not exist. Safer and more effective", "start_char_pos": 841, "end_char_pos": 932}, {"type": "R", "before": "posted a warning", "after": "warned", "start_char_pos": 1615, "end_char_pos": 1631}, {"type": "D", "before": "a", "after": null, "start_char_pos": 1881, "end_char_pos": 1882}, {"type": "R", "before": "news release titled \"Beware of black salve, \"", "after": ",", "start_char_pos": 1888, "end_char_pos": 1933}, {"type": "R", "before": "in Australia black salve has been", "after": ", black salve was", "start_char_pos": 2065, "end_char_pos": 2098}, {"type": "R", "before": "who decided to use \"natural remedies\"", "after": "in Australia. Lawson covered her abdomen in black salve", "start_char_pos": 2144, "end_char_pos": 2181}, {"type": "D", "before": "self-proclaimed healer", "after": null, "start_char_pos": 2205, "end_char_pos": 2227}, {"type": "R", "before": ". Jensen advocated covering Lawson's abdomen in black salve claiming", "after": ", a self-proclaimed healer, who advised her that", "start_char_pos": 2248, "end_char_pos": 2316}, {"type": "R", "before": "the ovarian cancer, leaving", "after": "her ovarian cancer. The black salve left", "start_char_pos": 2335, "end_char_pos": 2362}, {"type": "D", "before": ":", "after": null, "start_char_pos": 2407, "end_char_pos": 2408}, {"type": "R", "before": "\u201cYou have never seen anything like what happened to Helen. It is so confronting, \u201d", "after": ", which became so large that surgeons could not operate on it within a few weeks.", "start_char_pos": 2409, "end_char_pos": 2491}, {"type": "D", "before": ", Deb Davies", "after": null, "start_char_pos": 2515, "end_char_pos": 2527}, {"type": "R", "before": "said. \u201cLiterally", "after": "described the wounds as extending from \"", "start_char_pos": 2528, "end_char_pos": 2544}, {"type": "R", "before": ", she was", "after": "\", and as \"", "start_char_pos": 2616, "end_char_pos": 2625}, {"type": "D", "before": ".", "after": null, "start_char_pos": 2656, "end_char_pos": 2657}, {"type": "D", "before": "Lawson's partner of 21 years, Belinda Davies", "after": null, "start_char_pos": 2660, "end_char_pos": 2704}, {"type": "R", "before": "said that within a few weeks of Helen applying the black salve the wound was so large that surgeons could not have operated even if they had wanted to.", "after": ".", "start_char_pos": 2705, "end_char_pos": 2856}, {"type": "R", "before": "Subsequently", "after": "In 2019", "start_char_pos": 2884, "end_char_pos": 2896}, {"type": "R", "before": "an interim prohibition order ,", "after": "a prohibition order", "start_char_pos": 2917, "end_char_pos": 2947}, {"type": "R", "before": ", forbidding practicing any health services whilst the death of Lawson is being investigated. This was pursuant to section 90 of the Health Complaints Act 2016 (Victoria, Australia)", "after": "of Victoria, forbidding him permanently from providing substances which \"he (or anyone else) claims can cure or treat cancer or other serious disease or illness\". This includes black salve.", "start_char_pos": 2986, "end_char_pos": 3167}], "sents_char_pos": [0, 100, 238, 378, 586, 842, 989, 1058, 1077, 1202, 1268, 1386, 1591, 1761, 1877, 2056, 2467, 2533, 2856, 2883, 3079]}
+{"doc_id": "25776673", "revision_depth": "1", "before_revision": "NRFU The location of the restart after a try had been scored, either a place-kick if the try had been converted or a drop-kick if the try-scoring team was unable to convert, was moved from the 25-yard line of the non-scoring team to the halfway line. After a player had been tackled a loose scrum was now ordered formed to allow the ball to be brought back into play. NRFU The punt-out, or kick-in, was abolished. In the event of the ball being kicked into touch, play would restart with a scrum 10 yards infield. NSWRFL The goal-line drop-out replaced drop-outs from the 25-yard line after the ball was played dead by a defender. A new version of the play-the-ball was created which consisted of two players from each team. The ball was contested by only the defending marker and tackled player who was playing the ball, the marker was required to keep both feet on the ground until the ball was dropped or placed. The other two players stood ready act as halfback should their teammate win the contest. NSWRFL The defending halfback would now feed the scrum, while the attacking side would have the loose-head. Previously, the player that fed the scrum had been the attacking halfback. It became mandatory for each team's forwards to pack-down into the scrum in a 3\u20132\u20131 formation. Scrums now had to be set a minimum of 10 yards from the touch line and a minimum of 5 yards from goal line. Players who were off-side at the time of the play-the-ball would now be penalised if they did not make an attempt to get on-side and interfere with or obstruct an opposing player. NSWRFL A five-yard ruck rule was introduced and applied to both teams, previously there had been a 'no-yard' ruck rule. This rule change lasted just one season. NSWRFL The no-yard ruck rule was reinstated. The dummy-half and second-marker were required to stand one yard behind the two men contesting the play-the-ball. NSWRFL The tap penalty was introduced. A team conceding a penalty was required to retire 10 yards . NSWRFL A three-yard ruck rule replaced the no-yard ruck rule and was applicable to both teams. No minimum distance replaced the one-yard minimum that the dummy-half and second-marker had previously had to stand behind their teammates contesting the play-the-ball. NSWRFL Scrums would now be set a minimum of 10 yards from the goal-line. A place kick from the halfway line was used for the kick-off restarting play after an unconverted try. A penalty on halfway would now be awarded if a kick-off went out on the full. NSWRFL A five-yard ruck rule, applying to both teams, was implemented; an increase from three yards . NSWRFL Defending teams would restart with a 25-yard optional kick should an attacking team make the ball dead.ARL, 2008: 1968\u201377 NSWRL A twenty-metre restart was given when the ball was caught on the full in the in-goal area by a member of the defending team. NSWRL The use of the handover was extended to those occasions on the sixth tackle when the attacking team knocked on, kicked out on the full, or ran into touch. When a scrum took place, all players standing outside it, apart from the halfback, had to stand a minimum of 5 metres back to be onside. NSWRL In-goal touch judges were introduced for the finals series. Any players chasing their team's kick from an offside position were required to remain 10 metres away from the opponent taking possession of the ball. This was an increase from 5 metres . NSWRL The distance the defensive line were taken back by the referee at the play-the-ball would now be measured from where the tackled player places the ball to play it. Previously the distance had been measured from the back foot of the marker but Mick Stone, the referees coaching coordinator, felt that this led to \"fives\" of varying lengths depending on where the markers stood. The defensive line at the play-the-ball would now be taken back 8 metres instead of 5 metres to compensate for the change in the position the distance was measured from. The 8-metre distance was amended mid-season. A ten-metre offside rule was introduced mid-season for non-markers on the defending team at the play-the-ball, amending the 8-metre rule introduced at the beginning of the season. ARL Unlimited interchanges were re-introduced. RFL Scrums were now to be set 20 metres from the touch-line, with the aim of creating attacking opportunities. At the restart after a try had been scored and the conversion attempt had been taken, the side that scored now kicked off to the other team. This change aimed to make contests more even by almost guaranteeing possession for the side that had conceded points. Greg McCallum, the director of referees' coaching, also noted that this convention was \"in line with most other sports\" and \"that is significant when we come to promoting the game in America and Asia\". At the play-the-ball, the side not in possession was barred from striking for the ball. This was an attempt to clean up the ruck. At the play-the-ball, the tackled player was stopped from being able to tap the ball forwards to himself \u2013 even in the absence of markers. ARL Striking by the defending marker at the play-the-ball was banned. The requirement for the attacking team to stand a minimum distance behind dummy-half at the play-the-ball was ended. The 40/20 rule was introduced to reward accurate kicking in general play and to disrupt the pattern of teams having turns at sets of six tackles. The rule gave the loose head and feed at the resulting scrum to a team that kicked the ball from behind their 40-metre line so that it bounced in the field of play before going into touch behind their opponent's 20-metre line. The rule also encouraged the defenders, usually wingers and fullbacks, to make a play for the ball instead of allowing it to leave play. New guidelines were introduced to combat 'dangerous throws'. Tackled players were banned from playing the ball forward to themselves. There was some concern that this could stifle play if a supporting teammate was slow to move into the dummy-half position to allow a play-the-ball. NRL A defending player jumping to catch the ball from an opponent's kick cannot be tackled mid-air. This rule was brought in due to safety consideration. The rule allows for defending players to tackle the attacking players in the air. There had been concerns from coaches that allowing an attacker to land with the ball before attempting a tackle could result in \"uncontested tries\" or a penalty try if a tackle was attempted while they were in the air; either of these scenarios was considered against the principles of the game. A team that finds touch with a kick from a 20-metre optional restart is awarded the loose head and feed at the scrum. If from a kick anywhere on the field, the defending team takes the ball dead, for example if they place one foot over the dead ball line before playing at the ball, the team must restart play with a goal-line drop-out. The defending team were allowed to strip the ball in the tackle if no more than two tacklers were in attendance. Limited interchanges were reintroduced, a maximum of 12 interchanges were now allowed using a pool of 4 replacements. RFL 20-metre restarts should be allowed to happen quickly and not be delayed by referees. The first and second halves would end the moment that the hooter sounds, in the past referees could use their discretion to let play continue if they felt the siren had sounded during play. NRL Should an attacking player be held up by defenders in-goal, they should carry on play with a play-the-ball on the 10-metre line. NRL Taps from penalty kicks to touch were now to be taken 20 metres infield. RFL If a team kicks the ball from a 20-metre restart and the ball bounces into touch or over the dead ball line they will be given head and feed at the resulting scrum. In the scrum the ball can no longer be trapped by the loose forward in an attempt to catch the opposition offside. If the scrum moves forwards and the ball comes from between and behind the inner feet of the second row forwards it will be deemed to be out of the scrum. Defenders, excluding the markers at a play-the-ball, must stand with both feet behind the referee's front foot to be judged onside. If over their try-line the defenders steal the ball from the attacking team when there is more than one defender involved in the tackle a penalty will be given rather than a penalty try. NRL An assistant on-field referee was introduced. A penalty can be applied by the referee against a defender where the attacking kicker has been tackled whilst they are in the air. The tap from penalty kick to touch to be taken 10 metres infield.", "after_revision": "NRFU The location of the restart after a try had been scored, either a place-kick if the try had been converted or a drop-kick if the try-scoring team was unable to convert, was moved from the line of the non-scoring team to the halfway line. After a player had been tackled a loose scrum was now ordered formed to allow the ball to be brought back into play. NRFU The punt-out, or kick-in, was abolished. In the event of the ball being kicked into touch, play would restart with a scrum infield. NSWRFL The goal-line drop-out replaced drop-outs from the line after the ball was played dead by a defender. A new version of the play-the-ball was created which consisted of two players from each team. The ball was contested by only the defending marker and tackled player who was playing the ball, the marker was required to keep both feet on the ground until the ball was dropped or placed. The other two players stood ready act as halfback should their teammate win the contest. NSWRFL The defending halfback would now feed the scrum, while the attacking side would have the loose-head. Previously, the player that fed the scrum had been the attacking halfback. It became mandatory for each team's forwards to pack-down into the scrum in a 3\u20132\u20131 formation. Scrums now had to be set a minimum of from the touch line and a minimum of from goal line. Players who were off-side at the time of the play-the-ball would now be penalised if they did not make an attempt to get on-side and interfere with or obstruct an opposing player. NSWRFL A ruck rule was introduced and applied to both teams, previously there had been a 'no-yard' ruck rule. This rule change lasted just one season. NSWRFL The no-yard ruck rule was reinstated. The dummy-half and second-marker were required to stand behind the two men contesting the play-the-ball. NSWRFL The tap penalty was introduced. A team conceding a penalty was required to retire . NSWRFL A ruck rule replaced the no-yard ruck rule and was applicable to both teams. No minimum distance replaced the minimum that the dummy-half and second-marker had previously had to stand behind their teammates contesting the play-the-ball. NSWRFL Scrums would now be set a minimum of from the goal-line. A place kick from the halfway line was used for the kick-off restarting play after an unconverted try. A penalty on halfway would now be awarded if a kick-off went out on the full. NSWRFL A ruck rule, applying to both teams, was implemented; an increase from . NSWRFL Defending teams would restart with a optional kick should an attacking team make the ball dead.ARL, 2008: 1968\u201377 NSWRL A restart was given when the ball was caught on the full in the in-goal area by a member of the defending team. NSWRL The use of the handover was extended to those occasions on the sixth tackle when the attacking team knocked on, kicked out on the full, or ran into touch. When a scrum took place, all players standing outside it, apart from the halfback, had to stand a minimum of back to be onside. NSWRL In-goal touch judges were introduced for the finals series. Any players chasing their team's kick from an offside position were required to remain away from the opponent taking possession of the ball. This was an increase from . NSWRL The distance the defensive line were taken back by the referee at the play-the-ball would now be measured from where the tackled player places the ball to play it. Previously the distance had been measured from the back foot of the marker but Mick Stone, the referees coaching coordinator, felt that this led to \"fives\" of varying lengths depending on where the markers stood. The defensive line at the play-the-ball would now be taken back instead of to compensate for the change in the position the distance was measured from. The distance was amended mid-season. A offside rule was introduced mid-season for non-markers on the defending team at the play-the-ball, amending the rule introduced at the beginning of the season. ARL Unlimited interchanges were re-introduced. RFL Scrums were now to be set from the touch-line, with the aim of creating attacking opportunities. At the restart after a try had been scored and the conversion attempt had been taken, the side that scored now kicked off to the other team. This change aimed to make contests more even by almost guaranteeing possession for the side that had conceded points. Greg McCallum, the director of referees' coaching, also noted that this convention was \"in line with most other sports\" and \"that is significant when we come to promoting the game in America and Asia\". At the play-the-ball, the side not in possession was barred from striking for the ball. This was an attempt to clean up the ruck. At the play-the-ball, the tackled player was stopped from being able to tap the ball forwards to himself \u2013 even in the absence of markers. ARL Striking by the defending marker at the play-the-ball was banned. The requirement for the attacking team to stand a minimum distance behind dummy-half at the play-the-ball was ended. The 40/20 rule was introduced to reward accurate kicking in general play and to disrupt the pattern of teams having turns at sets of six tackles. The rule gave the loose head and feed at the resulting scrum to a team that kicked the ball from behind their line so that it bounced in the field of play before going into touch behind their opponent's line. The rule also encouraged the defenders, usually wingers and fullbacks, to make a play for the ball instead of allowing it to leave play. New guidelines were introduced to combat 'dangerous throws'. Tackled players were banned from playing the ball forward to themselves. There was some concern that this could stifle play if a supporting teammate was slow to move into the dummy-half position to allow a play-the-ball. NRL A defending player jumping to catch the ball from an opponent's kick cannot be tackled mid-air. This rule was brought in due to safety consideration. The rule allows for defending players to tackle the attacking players in the air. There had been concerns from coaches that allowing an attacker to land with the ball before attempting a tackle could result in \"uncontested tries\" or a penalty try if a tackle was attempted while they were in the air; either of these scenarios was considered against the principles of the game. A team that finds touch with a kick from a optional restart is awarded the loose head and feed at the scrum. If from a kick anywhere on the field, the defending team takes the ball dead, for example if they place one foot over the dead ball line before playing at the ball, the team must restart play with a goal-line drop-out. The defending team were allowed to strip the ball in the tackle if no more than two tacklers were in attendance. Limited interchanges were reintroduced, a maximum of 12 interchanges were now allowed using a pool of 4 replacements. RFL restarts should be allowed to happen quickly and not be delayed by referees. The first and second halves would end the moment that the hooter sounds, in the past referees could use their discretion to let play continue if they felt the siren had sounded during play. NRL Should an attacking player be held up by defenders in-goal, they should carry on play with a play-the-ball on the line. NRL Taps from penalty kicks to touch were now to be taken infield. RFL If a team kicks the ball from a restart and the ball bounces into touch or over the dead ball line they will be given head and feed at the resulting scrum. In the scrum the ball can no longer be trapped by the loose forward in an attempt to catch the opposition offside. If the scrum moves forwards and the ball comes from between and behind the inner feet of the second row forwards it will be deemed to be out of the scrum. Defenders, excluding the markers at a play-the-ball, must stand with both feet behind the referee's front foot to be judged onside. If over their try-line the defenders steal the ball from the attacking team when there is more than one defender involved in the tackle a penalty will be given rather than a penalty try. NRL An assistant on-field referee was introduced. A penalty can be applied by the referee against a defender where the attacking kicker has been tackled whilst they are in the air. The tap from penalty kick to touch to be taken infield.", "edit_actions": [{"type": "D", "before": "25-yard", "after": null, "start_char_pos": 193, "end_char_pos": 200}, {"type": "D", "before": "10 yards", "after": null, "start_char_pos": 496, "end_char_pos": 504}, {"type": "D", "before": "25-yard", "after": null, "start_char_pos": 572, "end_char_pos": 579}, {"type": "D", "before": "10 yards", "after": null, "start_char_pos": 1321, "end_char_pos": 1329}, {"type": "D", "before": "5 yards", "after": null, "start_char_pos": 1367, "end_char_pos": 1374}, {"type": "D", "before": "five-yard", "after": null, "start_char_pos": 1580, "end_char_pos": 1589}, {"type": "D", "before": "one yard", "after": null, "start_char_pos": 1833, "end_char_pos": 1841}, {"type": "D", "before": "10 yards", "after": null, "start_char_pos": 1980, "end_char_pos": 1988}, {"type": "D", "before": "three-yard", "after": null, "start_char_pos": 2000, "end_char_pos": 2010}, {"type": "D", "before": "one-yard", "after": null, "start_char_pos": 2119, "end_char_pos": 2127}, {"type": "D", "before": "10 yards", "after": null, "start_char_pos": 2299, "end_char_pos": 2307}, {"type": "D", "before": "five-yard", "after": null, "start_char_pos": 2518, "end_char_pos": 2527}, {"type": "D", "before": "three yards", "after": null, "start_char_pos": 2597, "end_char_pos": 2608}, {"type": "D", "before": "25-yard", "after": null, "start_char_pos": 2655, "end_char_pos": 2662}, {"type": "D", "before": "twenty-metre", "after": null, "start_char_pos": 2748, "end_char_pos": 2760}, {"type": "D", "before": "5 metres", "after": null, "start_char_pos": 3141, "end_char_pos": 3149}, {"type": "D", "before": "10 metres", "after": null, "start_char_pos": 3322, "end_char_pos": 3331}, {"type": "D", "before": "5 metres", "after": null, "start_char_pos": 3412, "end_char_pos": 3420}, {"type": "R", "before": "8 metres instead of 5 metres", "after": "instead of", "start_char_pos": 3870, "end_char_pos": 3898}, {"type": "D", "before": "8-metre", "after": null, "start_char_pos": 3980, "end_char_pos": 3987}, {"type": "D", "before": "ten-metre", "after": null, "start_char_pos": 4023, "end_char_pos": 4032}, {"type": "D", "before": "8-metre", "after": null, "start_char_pos": 4145, "end_char_pos": 4152}, {"type": "D", "before": "20 metres", "after": null, "start_char_pos": 4278, "end_char_pos": 4287}, {"type": "D", "before": "40-metre", "after": null, "start_char_pos": 5532, "end_char_pos": 5540}, {"type": "D", "before": "20-metre", "after": null, "start_char_pos": 5634, "end_char_pos": 5642}, {"type": "D", "before": "20-metre", "after": null, "start_char_pos": 6643, "end_char_pos": 6651}, {"type": "D", "before": "20-metre", "after": null, "start_char_pos": 7172, "end_char_pos": 7180}, {"type": "D", "before": "10-metre", "after": null, "start_char_pos": 7566, "end_char_pos": 7574}, {"type": "D", "before": "20 metres", "after": null, "start_char_pos": 7639, "end_char_pos": 7648}, {"type": "D", "before": "20-metre", "after": null, "start_char_pos": 7694, "end_char_pos": 7702}, {"type": "D", "before": "10 metres", "after": null, "start_char_pos": 8644, "end_char_pos": 8653}], "sents_char_pos": [0, 250, 367, 413, 513, 630, 724, 915, 1004, 1112, 1187, 1282, 1390, 1570, 1690, 1731, 1776, 1890, 1929, 2085, 2254, 2327, 2430, 2508, 2579, 2721, 2870, 3031, 3168, 3234, 3385, 3592, 3805, 3975, 4020, 4200, 4247, 4358, 4499, 4617, 4819, 4907, 4949, 5088, 5158, 5275, 5421, 5648, 5785, 5846, 5919, 6067, 6167, 6221, 6303, 6522, 6599, 6717, 6936, 7049, 7167, 7257, 7447, 7580, 7657, 7826, 7941, 8096, 8228, 8415, 8465, 8596]}
+{"doc_id": "2618516", "revision_depth": "1", "before_revision": "References J. Jung Antibakterielle und antifungale Hemmstoffe in h\u00f6heren Pflanzen Literatur\u00fcbersicht - in Journal Forstwissenschaftliches Centralblatt Publisher Springer Berlin / Heidelberg ISSN 0015-8003 (Print) Issue Volume 83, Numbers 11-12 / November, 1964 Pages 358-374 Tambiev AKh, Agaverdiev ASh. The ability of volatile fractions of certain phytoncide-forming compounds to increase the chemiluminescence of oleic acid Biofizika. 1966; 11(1): 175-7. (in Russian) MULLER-DIETZ H. Phytoncides and phytoncide therapy - Dtsch Med Wochenschr. 1956 Jun 15;81(24): 983-4. (Article in German) The phytoncide activity of several varieties of garlic stored for different periods of time Vopr Pitan. 1974 Nov-Dec ;(6): 61-2. (in Russian) Li Q, Nakadai A, Matsushima H, Miyazaki Y, Krensky AM, Kawada T, Morimoto K. Phytoncides (wood essential oils) induce human natural killer cell activity. Immunopharmacol Immunotoxicol. 2006;28(2): 319-33. Li Q, Kobayashi M, Wakayama Y, Inagaki H, Katsumata M, Hirata Y, Hirata K, Shimizu T, Kawada T, Park BJ, Ohira T, Kagawa T, Miyazaki Y. Effect of phytoncide from trees on human natural killer cell function. Int J Immunopathol Pharmacol. 2009 Oct-Dec ;22(4): 951-9. Li Q, Morimoto K, Kobayashi M, Inagaki H, Katsumata M, Hirata Y, Hirata K, Shimizu T, Li YJ, Wakayama Y, Kawada T, Ohira T, Takayama N, Kagawa T, Miyazaki Y. A forest bathing trip increases human natural killer activity and expression of anti-cancer proteins in female subjects. J Biol Regul Homeost Agents. 2008 Jan-Mar ;22(1): 45-55. Li Q, Morimoto K, Kobayashi M, Inagaki H, Katsumata M, Hirata Y, Hirata K, Suzuki H, Li YJ, Wakayama Y, Kawada T, Park BJ, Ohira T, Matsui N, Kagawa T, Miyazaki Y, Krensky AM. Visiting a forest, but not a city, increases human natural killer activity and expression of anti-cancer proteins. Int J Immunopathol Pharmacol. 2008 Jan-Mar ;21(1): 117-27.", "after_revision": "References J. Jung \" Antibakterielle und antifungale Hemmstoffe in h\u00f6heren Pflanzen Literatur\u00fcbersicht \" \u2013 in Journal Forstwissenschaftliches Centralblatt Publisher Springer Berlin / Heidelberg ISSN 0015-8003 (Print) Issue Volume 83, Numbers 11\u201312 / November, 1964 pages 358\u2013374 Tambiev AKh, Agaverdiev ASh. \" The ability of volatile fractions of certain phytoncide-forming compounds to increase the chemiluminescence of oleic acid \" Biofizika. 1966; 11(1): 17\u201357. (in Russian) MULLER-DIETZ H. \" Phytoncides and phytoncide therapy \", Dtsch Med Wochenschr. 1956 Jun 15;81(24): 983\u20134. (Article in German) \" The phytoncide activity of several varieties of garlic stored for different periods of time \" Vopr Pitan. 1974 Nov\u2013Dec ;(6): 61\u20132. (in Russian) Li Q, Nakadai A, Matsushima H, Miyazaki Y, Krensky AM, Kawada T, Morimoto K. \" Phytoncides (wood essential oils) induce human natural killer cell activity. \" Immunopharmacol Immunotoxicol. 2006;28(2): 319\u201333. Li Q, Kobayashi M, Wakayama Y, Inagaki H, Katsumata M, Hirata Y, Hirata K, Shimizu T, Kawada T, Park BJ, Ohira T, Kagawa T, Miyazaki Y. Effect of phytoncide from trees on human natural killer cell function. Int J Immunopathol Pharmacol. 2009 Oct\u2013Dec ;22(4): 951\u20139. Li Q, Morimoto K, Kobayashi M, Inagaki H, Katsumata M, Hirata Y, Hirata K, Shimizu T, Li YJ, Wakayama Y, Kawada T, Ohira T, Takayama N, Kagawa T, Miyazaki Y. A forest bathing trip increases human natural killer activity and expression of anti-cancer proteins in female subjects. J Biol Regul Homeost Agents. 2008 Jan\u2013Mar ;22(1): 45\u201355. Li Q, Morimoto K, Kobayashi M, Inagaki H, Katsumata M, Hirata Y, Hirata K, Suzuki H, Li YJ, Wakayama Y, Kawada T, Park BJ, Ohira T, Matsui N, Kagawa T, Miyazaki Y, Krensky AM. Visiting a forest, but not a city, increases human natural killer activity and expression of anti-cancer proteins. Int J Immunopathol Pharmacol. 2008 Jan\u2013Mar ;21(1): 117\u201327.", "edit_actions": [{"type": "A", "before": null, "after": "\"", "start_char_pos": 19, "end_char_pos": 19}, {"type": "R", "before": "-", "after": "\" \u2013", "start_char_pos": 102, "end_char_pos": 103}, {"type": "R", "before": "11-12", "after": "11\u201312", "start_char_pos": 239, "end_char_pos": 244}, {"type": "R", "before": "Pages 358-374", "after": "pages 358\u2013374", "start_char_pos": 262, "end_char_pos": 275}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 305, "end_char_pos": 305}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 428, "end_char_pos": 428}, {"type": "R", "before": "175-7.", "after": "17\u201357.", "start_char_pos": 453, "end_char_pos": 459}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 489, "end_char_pos": 489}, {"type": "R", "before": "-", "after": "\",", "start_char_pos": 525, "end_char_pos": 526}, {"type": "R", "before": "983-4.", "after": "983\u20134.", "start_char_pos": 569, "end_char_pos": 575}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 596, "end_char_pos": 596}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 689, "end_char_pos": 689}, {"type": "R", "before": "Nov-Dec", "after": "Nov\u2013Dec", "start_char_pos": 707, "end_char_pos": 714}, {"type": "R", "before": "61-2.", "after": "61\u20132.", "start_char_pos": 721, "end_char_pos": 726}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 817, "end_char_pos": 817}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 895, "end_char_pos": 895}, {"type": "R", "before": "319-33.", "after": "319\u201333.", "start_char_pos": 939, "end_char_pos": 946}, {"type": "R", "before": "Oct-Dec", "after": "Oct\u2013Dec", "start_char_pos": 1189, "end_char_pos": 1196}, {"type": "R", "before": "951-9.", "after": "951\u20139.", "start_char_pos": 1205, "end_char_pos": 1211}, {"type": "R", "before": "Jan-Mar", "after": "Jan\u2013Mar", "start_char_pos": 1525, "end_char_pos": 1532}, {"type": "R", "before": "45-55.", "after": "45\u201355.", "start_char_pos": 1541, "end_char_pos": 1547}, {"type": "R", "before": "Jan-Mar", "after": "Jan\u2013Mar", "start_char_pos": 1874, "end_char_pos": 1881}, {"type": "R", "before": "117-27.", "after": "117\u201327.", "start_char_pos": 1890, "end_char_pos": 1897}], "sents_char_pos": [0, 304, 439, 701, 816, 894, 926, 1153, 1183, 1369, 1490, 1519, 1723, 1838, 1868]}
+{"doc_id": "26378084", "revision_depth": "1", "before_revision": "Barnumbirr, also known as Banumbirr or Morning Star, is a creator-spirit in the Yolngu culture of Arnhem Land in Australia, who is identified as the planet Venus. In Yolngu mythology, she is believed to have guided the first humans, the Djanggawul sisters, to Australia. After the Djanggawul sisters arrived safely near Yirrkala in North East Arnhem Land, Barnumbirr flew across the land from East to West , creating a song-line which named and created the animals, plants, and geographical features. Song-lines were an important navigational tool for Aboriginal people. The route that Barnumbirr flew above northern Australia became a song-line that spans multiple language groups and was therefore useful for travelling Yolngu and their neighbours. There is a growing body of research suggesting that this song-line through the Northern Territory/Western Australia and others tracing paths in NSW and Queensland have formed part of Australia\u2019s network of motorways. Role in Creation Barnumbirr as a Morning Star is a creator spirit in Yolngu culture. Her story is part of the Dhuwa moiety. Yolngu song-lines depict Barnumbirr guiding the Djanggawul sisters as they row a canoe from the mythical island of Bralgu (the home of Wangarr, the Great Creator Spirit) to discover Australia and bring Madayin Law to the Dhuwa people.Gondarra, D. (2011). The Law and Justice within Indigenous Communities. Presentation, Darwin, NT Once the sisters found land near Yirrkala in North East Arnhem Land, Barnumbirr is believed to have continued flying eastward creating a song-line which includes descriptions of flora, fauna, geographical features and clan borders. Barnumbirr\u2019s song-line therefore formed the basis of Madayin Law and the Yolngu understanding of the land. Relationship with Death Barnumbirr has strong associations with death for Yolngu people. The rising of Barnumbirr in the sky before sunrise is a time when the Yolngu conduct the \"Morning Star Ceremony\". As Venus becomes visible in the early hours before dawn, the Yolngu say that she draws behind her a rope that is connected to the island of Bralgu. Along this rope, with the aid of a richly decorated \"Morning Star Pole\", Yolngu people are able to release the spirits of their dead and communicate with their ancestors.Allen, L. (1976). Time Before Morning: Art and Myth of Aboriginal Australians. Adelaide: Rigby. The Morning Star Ceremony The Morning Star Ceremony is a mortuary ceremony of the Dhuwa moiety. In Dhuwa mythology, the Wangarr ( Yolngy ancestors) perform the Morning Star Ceremony every night of Venus\u2019 synodic period.ABC Education. (2009). Morning Star Poles tell an artistic story [Video]. In the real world, the Morning Star Ceremony is an important part of the funeral process for a small number of Yolngu clans. The ceremony begins at dusk and continues through the night, reaching a climax when Barnumbirr rises trailing a rope of light to connect with Bralgu. When Barnumbirr rises, the spirits of those who have recently died are released with the help of the Ceremony to Wangarr, the spirit-world. Planning the Morning Star Ceremony Due to its scale and importance, the \"Morning Star Ceremony\" requires a significant level of planning ) . It occurs over the course of the night prior the first rising of Venus after a synodic period of approximately 584 days.The Venus Transit. (2004). European Southern Observatory. Retrieved 24 April 2020, from URL Venus can then be seen as a Morning Star for approximately 263 days. The Yolngu people count the days of Venus\u2019 synodic period to track the motion of Venus and plan the Morning Star Ceremony The Morning Star Pole The Morning Star Pole is a decorated ceremonial piece used in the Morning Star Ceremony. It is used to communicate with ancestors on Bralgu and is designed to depict Barnumbirr, its tail of zodiacal light and neighbouring celestial bodies. Each Morning Star Pole is unique to individual craftsmen and clans and therefore unique in appearance (Gurriwiwi, 2009) Attached to the top of the pole are feathers from a variety of birds which represent the Morning Star itself (Norris, 2016; Gurriwiwi, 2009). The pole is colored with traditional patterns in ochre paint and together are a representation of the artist and their surrounding environment.Gurruwiwi, G. (2009). Morning Star Poles tell an artistic story [TV]. Elcho Island. Pandanus strings attach more feathers to the pole. These strings represent the string of light that attaches Barnumbirr to Bralgu as well as neighboring stars and planets. Public interest in Morning Star Poles Morning Star Poles have attracted attention from art galleries and collectors across the world. Poles have been exhibited in a number of major Australian galleries and museums including QAGOMA,Banumbirr (Morning Star Poles), 2017, Exhibition, QAGOMA, Access: URL the Museum of Contemporary Art Australia,Burruwal, B. (2016). Buya Male. Sydney: Museum of Contemporary Art Australia. Access: URL the Art Gallery of NSWDjarrankuykuy, B (1948). Banumbirr, Sydney: Art Gallery of NSW. Access: URL and the Australian National Maritime Museum. Gali Yalkarriwuy Gurruwiwi is Yolngu man from Elcho Island in Arnhem Land. He is a Morning Star custodian, maker and artist of Morning Star Poles which have been displayed in galleries across the world. Gurriwiwi expresses a desire to use his art as a way bring people together and teach them about Yolngu culture.Gurruwiwi, G. (2009). Morning Star Poles tell an artistic story [TV]. Elcho Island. URL This desire to share indigenous culture with non-aboriginal people via Morning Star Poles is also shared by fellow Arnhem Land artist Bob Burruwal. Venus in other Australian Indigenous cultures Venus is the third brightest object in the night sky and because of this there are numerous cultural interpretations of Venus as a Morning and Evening Star across Australia\u2019s Indigenous groups. The literature is sparse on the details of many of these interpretations,Fuller, R (2015). The astronomy of the Kamilaroi and Euahlayi peoples and their neighbours (MPhil thesis). Macquarie University. and in some cases cultural limitations prevent information from being shared. In saying this, there are relatively detailed recounts of the Euahlayi and Kamilaroi, ArrernteThornton, W., 2007. Tnorala - Baby Falling. (Video) Canberra, Ronin Films. Produced by the Central Australian Aboriginal Media Association, Alice Springs. and Queensland Gulf Country people\u2019s interpretations. The Kamilaroi and Euahlayi peoples of Northern New South Wales interpret Venus as a morning star differently to the Yolngu but it shares similar significance. The story of the Eagle-hawk (Muliyan) is recounted in Reed Fuller and Hamacher & Banks : The eagle-hawk once lived in a large Yarran tree and hunted people for food near the Barwon River. One day, a group of men set out after him to avenge his killing of their people. The men set fire to the tree and killed Muliyan. The eagle-hawk then ascended into the sky as Muliyangah, the morning star. Euahlayi/Kamilaroi people interpret Muliyangah as the eyes of Baayami ( var. Baiame) watching over the earth during the night. Due to Baayami\u2019s cultural significance, Kamilaroi/Euahlayi people also place great importance on a Morning Star Ceremony but cultural sensitivities prevent much detail from being revealed in the literature. Fuller\u2019s research does explain, however, that Venus rising as an evening star is a sign to light a sacred fire. This fire is re-lit every night until Venus rises as a Morning Star and the flame is extinguished. Like the Yolngu version this ceremony also includes the use of a wooden pole, but in this case it is held horizontally as a symbol of connection between dark and light peoples (the two moiettirs of the Kamilaroi/Euahlayi), and the unity of marriage. Furthermore, as discussed in Planning the Morning Star Ceremony, the Euahlayi/Kamilaroi also require an understanding of the celestial movements of Venus. The literature is unclear, however, on how Euahlayi/Kamilaroi elders predict the date Venus rises. Venus as a morning and evening star are a central component of the Arrernte interpretation of Tnorala. Tnorala is a 5-kilometer-wide, 250-meter-tall ring-shaped mountain range 160 km west of Alice Springs. Arrernte people believe that in the creation period, a group of women took the form of stars and danced the Corroboree in the Milky Way. As they danced, one of the women dropped a baby which then fell to earth and formed the indent that can be seen in the ring-shaped mountain range. The baby\u2019s parents, the morning star (father) and evening star (mother), continue to take turns looking for their baby.Arrernte parents warn their children not to stare at the morning or evening stars because the baby\u2019s parents may mistake a staring child for their own and take them away. North Queensland Gulf Country Aboriginals Similarities can be found between creator role of Barnumbirr in Yolngu culture, and the Morning Star as a creator spirit in North Queensland Gulf Country Dreaming. Gulf country aboriginals believed that two brothers, the moon (older) and the morning star (younger) travel across the landscape in the Creation period, using a Boomerang to create features of the landscape such as valleys, hills and seas. Further Interpretations Song-lines and Mapping For Indigenous Australians, song-lines (often called \u2018Dreaming Tracks\u2019 ) are an oral map of the landscape, setting out trading routes,Mulvaney, J., & Kamminga, J. (1999). Prehistory of Australia. Sydney: Allen & Unwin and often connecting sacred sites. Song-lines on the land are often mirrored, or mirrors of, \u2018paths\u2019 connecting stars and planets in the sky. Star maps are also play an important role as mnemonics to aid in the memory of song-lines . The path that Barnumbirr is believed to have travelled from west to east across northern Australia is recounted in a song-line that tracks a navigable route through the landscape. Mountains, waterholes and clan boundaries are mentioned throughout the song and it therefore became an important navigational tool for travelling Yolngu and their neighbors . Song-lines and Australia's Highway Network There is new research suggesting that these song-lines form the basic route of significant sections of Australia\u2019s highway network. Colonial explorers and mappers used Indigenous peoples as guides, who navigated using their star maps when travelling through the land. It is hypothesised that these Dreaming tracks were then solidified by the construction and subsequent upgrade of modern roads. By matching star maps from Euahlayi and Kamilaroi cultures with maps of modern Australian roads in northern NSW, Fuller finds strong similarities. Harney and Wositsky and Harney & Norris also argue that the Barnumbirr song-line sets a course similar to that of the Victoria Highway across the Northern Territory: They call it the Victorian Highway now, but it was never the Victorian Highway at all \u2013 it was just the original Aboriginal walking track right through Arnhem Land.The historical evidence surrounding this concept is sparse but more recent work is uncovering the significance of song-lines (related to Barnumbirr and otherwise) in forming the basis for modern Australian roads. 'Morning Star ' Film A forthcoming film about renowned elder and master maker and player of the yidaki, Djalu Gurruwiwi, is entitled Morning Star. Video Resources YouTube video of Morning Star Ceremony at Australian National Maritime Museum in 2002. Published by Bandigan Arts (2014) : URL References", "after_revision": "Barnumbirr, also known as Banumbirr or Morning Star, is a creator-spirit in the Yolngu culture of Arnhem Land in the Northern Territory of Australia, who is identified as the planet Venus. In Yolngu Dreaming mythology, she is believed to have guided the first humans, the Djanggawul sisters, to Australia. After the Djanggawul sisters arrived safely near Yirrkala (at Yalangbara) in North East Arnhem Land, Barnumbirr flew across the land from east to west , creating a songline which named and created the animals, plants, and geographical features. Songlines were an important navigational tool for Aboriginal people. The route that Barnumbirr flew above northern Australia became a songline that spans multiple language groups and was therefore useful for travelling Yolngu and their neighbours. There is a growing body of research suggesting that this song-line through the Northern Territory/Western Australia and others tracing paths in NSW and Queensland have formed part of Australia\u2019s network of motorways. Role in creation Barnumbirr as a Morning Star is a creator spirit in Yolngu culture. Her story is part of the Dhuwa moiety. Yolngu songlines depict Barnumbirr guiding the Djanggawul sisters as they row a canoe from the mythical island of Bralgu (the home of Wangarr, the Great Creator Spirit) to discover Australia and bring Madayin Law to the Dhuwa people.Gondarra, D. (2011). The Law and Justice within Indigenous Communities. Presentation, Darwin, NT Once the sisters found land near Yirrkala in North East Arnhem Land, Barnumbirr is believed to have continued flying eastward creating a song-line which includes descriptions of flora, fauna, geographical features and clan borders. Barnumbirr\u2019s songline therefore formed the basis of Madayin Law and the Yolngu understanding of the land. Relationship with death Barnumbirr has strong associations with death for Yolngu people. The rising of Barnumbirr in the sky before sunrise is a time when the Yolngu conduct the \"Morning Star Ceremony\". As Venus becomes visible in the early hours before dawn, the Yolngu say that she draws behind her a rope that is connected to the island of Bralgu. Along this rope, with the aid of a richly decorated \"Morning Star Pole\", Yolngu people are able to release the spirits of their dead and communicate with their ancestors.Allen, L. (1976). Time Before Morning: Art and Myth of Aboriginal Australians. Adelaide: Rigby. The Morning Star Ceremony The Morning Star Ceremony is a mortuary ceremony of the Dhuwa moiety. In Dhuwa mythology, the Wangarr ( Yolngu ancestors) perform the Morning Star ceremony every night of Venus\u2019 synodic period.ABC Education. (2009). Morning Star Poles tell an artistic story [Video]. In the real world, the Morning Star Ceremony is an important part of the funeral process for a small number of Yolngu clans. The ceremony begins at dusk and continues through the night, reaching a climax when Barnumbirr rises trailing a rope of light to connect with Bralgu. When Barnumbirr rises, the spirits of those who have recently died are released with the help of the Ceremony to Wangarr, the spirit-world. Planning the Morning Star Ceremony Due to its scale and importance, the \"Morning Star Ceremony\" requires a significant level of planning . It occurs over the course of the night prior the first rising of Venus after a synodic period of approximately 584 days.The Venus Transit. (2004). European Southern Observatory. Retrieved 24 April 2020, from URL Venus can then be seen as a Morning Star for approximately 263 days. The Yolngu people count the days of Venus\u2019 synodic period to track the motion of Venus and plan the Morning Star Ceremony The Morning Star Pole The Morning Star Pole is a decorated ceremonial piece used in the Morning Star Ceremony. It is used to communicate with ancestors on Bralgu and is designed to depict Barnumbirr, its tail of zodiacal light and neighbouring celestial bodies. Each Morning Star Pole is unique to individual craftsmen and clans and therefore unique in appearance (Gurriwiwi, 2009) . Attached to the top of the pole are feathers from a variety of birds which represent the Morning Star itself (Norris, 2016; Gurriwiwi, 2009). The pole is coloured with traditional patterns in ochre paint and together are a representation of the artist and their surrounding environment.Gurruwiwi, G. (2009). Morning Star Poles tell an artistic story [TV]. Elcho Island. Pandanus strings attach more feathers to the pole. These strings represent the string of light that attaches Barnumbirr to Bralgu as well as neighbouring stars and planets. Public interest in Morning Star poles Morning Star poles have attracted attention from art galleries and collectors across the world. Poles have been exhibited in a number of major Australian galleries and museums including QAGOMA,Banumbirr (Morning Star Poles), 2017, Exhibition, QAGOMA, Access: URL the Museum of Contemporary Art Australia,Burruwal, B. (2016). Buya Male. Sydney: Museum of Contemporary Art Australia. Access: URL the Art Gallery of NSWDjarrankuykuy, B (1948). Banumbirr, Sydney: Art Gallery of NSW. Access: URL and the Australian National Maritime Museum. Gali Yalkarriwuy Gurruwiwi is a Yolngu man from Elcho Island in Arnhem Land. He is a Morning Star custodian, maker and artist of Morning Star poles which have been displayed in galleries across the world. Gurriwiwi expresses a desire to use his art as a way bring people together and teach them about Yolngu culture.Gurruwiwi, G. (2009). Morning Star Poles tell an artistic story [TV]. Elcho Island. This desire to share indigenous culture with non-aboriginal people via Morning Star Poles is also shared by fellow Arnhem Land artist Bob Burruwal. Venus in other Australian Indigenous cultures Venus is the third brightest object in the night sky and because of this there are numerous cultural interpretations of Venus as a Morning and Evening Star across Australia\u2019s Indigenous groups. The literature is sparse on the details of many of these interpretations,Fuller, R (2015). The astronomy of the Kamilaroi and Euahlayi peoples and their neighbours (MPhil thesis). Macquarie University. and in some cases cultural limitations prevent information from being shared. There are, however, relatively detailed recounts of the Euahlayi and Kamilaroi, ArrernteThornton, W., 2007. Tnorala - Baby Falling. (Video) Canberra, Ronin Films. Produced by the Central Australian Aboriginal Media Association, Alice Springs. and Queensland Gulf Country people\u2019s interpretations. The Kamilaroi and Euahlayi peoples of Northern New South Wales interpret Venus as a morning star differently to the Yolngu but it shares similar significance. The story of the Eagle-hawk (Muliyan) is recounted in Reed Fuller and Hamacher & Banks . The eagle-hawk once lived in a large Yarran tree and hunted people for food near the Barwon River. One day, a group of men set out after him to avenge his killing of their people. The men set fire to the tree and killed Muliyan. The eagle-hawk then ascended into the sky as Muliyangah, the morning star. Euahlayi/Kamilaroi people interpret Muliyangah as the eyes of Baayami ( Baiame) watching over the earth during the night. Due to Baayami\u2019s cultural significance, Kamilaroi/Euahlayi people also place great importance on a Morning Star Ceremony but cultural sensitivities prevent much detail from being revealed in the literature. Fuller\u2019s research does explain, however, that Venus rising as an evening star is a sign to light a sacred fire. This fire is re-lit every night until Venus rises as a Morning Star and the flame is extinguished. Like the Yolngu version this ceremony also includes the use of a wooden pole, but in this case it is held horizontally as a symbol of connection between dark and light peoples (the two moieties of the Kamilaroi/Euahlayi), and the unity of marriage. The Euahlayi/Kamilaroi also require an understanding of the celestial movements of Venus. The literature is unclear, however, on how Euahlayi/Kamilaroi elders predict the date Venus rises. Venus as a morning and evening star are a central component of the Arrernte interpretation of Tnorala. Tnorala is a 5-kilometre-wide, 250-metre-tall ring-shaped mountain range west of Alice Springs. Arrernte people believe that in the creation period, a group of women took the form of stars and danced the Corroboree in the Milky Way. As they danced, one of the women dropped a baby which then fell to earth and formed the indent that can be seen in the ring-shaped mountain range. The baby\u2019s parents, the morning star (father) and evening star (mother), continue to take turns looking for their baby.Arrernte parents warn their children not to stare at the morning or evening stars because the baby\u2019s parents may mistake a staring child for their own and take them away. North Queensland Gulf Country Aboriginal peoples Similarities can be found between creator role of Barnumbirr in Yolngu culture, and the Morning Star as a creator spirit in North Queensland 's Gulf Country Dreaming. Gulf country Aboriginal peoples believed that two brothers, the moon (older) and the morning star (younger) travel across the landscape in the creation period, using a boomerang to create features of the landscape such as valleys, hills and seas. Further interpretations Songlines and mapping For Aboriginal Australians, songlines (also called \"Dreaming Tracks\" ) are an oral map of the landscape, setting out trading routes,Mulvaney, J., & Kamminga, J. (1999). Prehistory of Australia. Sydney: Allen & Unwin and often connecting sacred sites. Song-lines on the land are often mirrored, or mirrors of, \"paths\" connecting stars and planets in the sky. Star maps are also play an important role as mnemonics to aid in the memory of songlines . The path that Barnumbirr is believed to have travelled from west to east across northern Australia is recounted in a songline that tracks a navigable route through the landscape. Mountains, waterholes and clan boundaries are mentioned throughout the song and it therefore became an important navigational tool for travelling Yolngu and their neighbours . Songlines and Australia's highway network There is new research suggesting that these song-lines form the basic route of significant sections of Australia\u2019s highway network. Colonial explorers and mappers used Indigenous peoples as guides, who navigated using their star maps when travelling through the land. It is hypothesised that these Dreaming tracks were then solidified by the construction and subsequent upgrade of modern roads. By matching star maps from Euahlayi and Kamilaroi cultures with maps of modern Australian roads in northern NSW, Fuller finds strong similarities. Harney and Wositsky and Harney & Norris also argue that the Barnumbirr songline sets a course similar to that of the Victoria Highway across the Northern Territory: They call it the Victorian Highway now, but it was never the Victorian Highway at all \u2013 it was just the original Aboriginal walking track right through Arnhem Land.The historical evidence surrounding this concept is sparse but more recent work is uncovering the significance of song-lines (related to Barnumbirr and otherwise) in forming the basis for modern Australian roads. Morning Star film A film about renowned elder and master maker and player of the yidaki, Djalu Gurruwiwi, is entitled Morning Star. References External links . Published by Bandigan Arts (2014) .", "edit_actions": [{"type": "A", "before": null, "after": "the Northern Territory of", "start_char_pos": 113, "end_char_pos": 113}, {"type": "A", "before": null, "after": "Dreaming", "start_char_pos": 174, "end_char_pos": 174}, {"type": "A", "before": null, "after": "(at Yalangbara)", "start_char_pos": 331, "end_char_pos": 331}, {"type": "R", "before": "East to West", "after": "east to west", "start_char_pos": 396, "end_char_pos": 408}, {"type": "R", "before": "song-line", "after": "songline", "start_char_pos": 422, "end_char_pos": 431}, {"type": "R", "before": "Song-lines", "after": "Songlines", "start_char_pos": 504, "end_char_pos": 514}, {"type": "R", "before": "song-line", "after": "songline", "start_char_pos": 639, "end_char_pos": 648}, {"type": "R", "before": "Creation", "after": "creation", "start_char_pos": 979, "end_char_pos": 987}, {"type": "R", "before": "song-lines", "after": "songlines", "start_char_pos": 1102, "end_char_pos": 1112}, {"type": "R", "before": "song-line", "after": "songline", "start_char_pos": 1671, "end_char_pos": 1680}, {"type": "R", "before": "Death", "after": "death", "start_char_pos": 1783, "end_char_pos": 1788}, {"type": "R", "before": "Yolngy", "after": "Yolngu", "start_char_pos": 2512, "end_char_pos": 2518}, {"type": "R", "before": "Ceremony", "after": "ceremony", "start_char_pos": 2555, "end_char_pos": 2563}, {"type": "D", "before": ")", "after": null, "start_char_pos": 3227, "end_char_pos": 3228}, {"type": "A", "before": null, "after": ".", "start_char_pos": 4016, "end_char_pos": 4016}, {"type": "R", "before": "colored", "after": "coloured", "start_char_pos": 4171, "end_char_pos": 4178}, {"type": "R", "before": "neighboring", "after": "neighbouring", "start_char_pos": 4527, "end_char_pos": 4538}, {"type": "R", "before": "Poles Morning Star Poles", "after": "poles Morning Star poles", "start_char_pos": 4590, "end_char_pos": 4614}, {"type": "A", "before": null, "after": "a", "start_char_pos": 5163, "end_char_pos": 5163}, {"type": "R", "before": "Poles", "after": "poles", "start_char_pos": 5274, "end_char_pos": 5279}, {"type": "D", "before": "URL", "after": null, "start_char_pos": 5532, "end_char_pos": 5535}, {"type": "R", "before": "In saying this, there are", "after": "There are, however,", "start_char_pos": 6204, "end_char_pos": 6229}, {"type": "R", "before": ":", "after": ".", "start_char_pos": 6753, "end_char_pos": 6754}, {"type": "D", "before": "var.", "after": null, "start_char_pos": 7131, "end_char_pos": 7135}, {"type": "R", "before": "moiettirs", "after": "moieties", "start_char_pos": 7789, "end_char_pos": 7798}, {"type": "R", "before": "Furthermore, as discussed in Planning the Morning Star Ceremony, the", "after": "The", "start_char_pos": 7854, "end_char_pos": 7922}, {"type": "R", "before": "5-kilometer-wide, 250-meter-tall", "after": "5-kilometre-wide, 250-metre-tall", "start_char_pos": 8224, "end_char_pos": 8256}, {"type": "D", "before": "160 km", "after": null, "start_char_pos": 8284, "end_char_pos": 8290}, {"type": "R", "before": "Aboriginals", "after": "Aboriginal peoples", "start_char_pos": 8918, "end_char_pos": 8929}, {"type": "A", "before": null, "after": "'s", "start_char_pos": 9071, "end_char_pos": 9071}, {"type": "R", "before": "aboriginals", "after": "Aboriginal peoples", "start_char_pos": 9108, "end_char_pos": 9119}, {"type": "R", "before": "Creation", "after": "creation", "start_char_pos": 9231, "end_char_pos": 9239}, {"type": "R", "before": "Boomerang", "after": "boomerang", "start_char_pos": 9256, "end_char_pos": 9265}, {"type": "R", "before": "Interpretations", "after": "interpretations", "start_char_pos": 9343, "end_char_pos": 9358}, {"type": "R", "before": "Song-lines and Mapping For Indigenous Australians, song-lines (often called \u2018Dreaming Tracks\u2019", "after": "Songlines and mapping", "start_char_pos": 9359, "end_char_pos": 9452}, {"type": "A", "before": null, "after": "For Aboriginal Australians, songlines (also called \"Dreaming Tracks\"", "start_char_pos": 9453, "end_char_pos": 9453}, {"type": "R", "before": "\u2018paths\u2019", "after": "\"paths\"", "start_char_pos": 9694, "end_char_pos": 9701}, {"type": "R", "before": "song-lines", "after": "songlines", "start_char_pos": 9822, "end_char_pos": 9832}, {"type": "R", "before": "song-line", "after": "songline", "start_char_pos": 9952, "end_char_pos": 9961}, {"type": "R", "before": "neighbors", "after": "neighbours", "start_char_pos": 10178, "end_char_pos": 10187}, {"type": "R", "before": "Song-lines", "after": "Songlines", "start_char_pos": 10190, "end_char_pos": 10200}, {"type": "R", "before": "Highway Network", "after": "highway network", "start_char_pos": 10217, "end_char_pos": 10232}, {"type": "R", "before": "song-line", "after": "songline", "start_char_pos": 10846, "end_char_pos": 10855}, {"type": "R", "before": "'Morning Star ' Film A forthcoming", "after": "Morning Star film A", "start_char_pos": 11318, "end_char_pos": 11352}, {"type": "R", "before": "Video Resources YouTube video of Morning Star Ceremony at Australian National Maritime Museum in 2002.", "after": "References", "start_char_pos": 11465, "end_char_pos": 11567}, {"type": "A", "before": null, "after": "External links .", "start_char_pos": 11568, "end_char_pos": 11568}, {"type": "D", "before": ": URL", "after": null, "start_char_pos": 11603, "end_char_pos": 11608}, {"type": "R", "before": "References", "after": ".", "start_char_pos": 11609, "end_char_pos": 11619}], "sents_char_pos": [0, 163, 272, 503, 573, 753, 970, 1055, 1094, 1329, 1349, 1400, 1657, 1764, 1853, 1967, 2115, 2286, 2303, 2364, 2381, 2477, 2601, 2615, 2674, 2799, 2949, 3089, 3351, 3369, 3408, 3511, 3744, 3895, 4140, 4158, 4302, 4323, 4371, 4385, 4436, 4557, 4691, 4920, 4931, 4977, 5036, 5132, 5208, 5336, 5448, 5469, 5517, 5531, 5683, 5923, 6014, 6103, 6203, 6317, 6372, 6506, 6665, 6853, 6934, 6983, 7058, 7135, 7185, 7392, 7504, 7603, 7853, 8008, 8107, 8210, 8313, 8450, 8597, 8717, 8887, 9094, 9334, 9553, 9578, 9635, 9742, 9834, 10014, 10364, 10500, 10627, 10774, 11105, 11317, 11464, 11567]}
+{"doc_id": "26396200", "revision_depth": "1", "before_revision": "Twifo is one of the Akan states that first settled in the Adansi forest together with all the Akans and later on moved southwards towards the coastas a result of seeking their own destiny . By the beginning of the 16th century, European sources noted the existence of the gold rich state of Twifo around the forest area with its capital Hemang. These Akans brought their gold to the coastal area to sell and were known by the Europeans by variant names because they brought the finest gold. Overview Duarte Pacheco Pereira, the earliest authority writing in 1505 , about the Akans - called them by the name \u00b4\u00b4 Quaforo, Cuffrue or Juffer `` - that was European attempt to render Twifo. The most important characteristic of these Twifo people in the eyes of the European traders was that the Twifo were skillful traders. These Akans were a minority group. Their ancestors moved out of the Adansi area in an unknown date but earlier than most of the Akan groups , towards the southern part of Ghana and settled in the forest area towards the coast. They established themselves socially, economically, militarily and politically. The Twifo kingdom with its ancient capital - Hemang , adopted a hospitable policy that welcomed other Akan groupings into the areathey had already settled. They never sought to consolidate power like many of the Akan states and gave autonomy to the new comers . Many settlers from various Akan groupings came later and settled before and after the Pra River and adopted the name Twifo. Twifo groupings Today, there are three groupings called TWIFO \u2013 Hemang, Mampong and Morkwa. Morkwa Morkwa, headed by their leader Nana Amo Kwaw settled beyond the Pra River and shared a common boundary with the already settled Twifo Hemang kingdom and adopted the name Twifo. Morkwa settled earlier than many settlers beyond the Pra River. Mampong and Hemang The Mampongs headed by their leader Nana Ampontenfi came later from Asante Nkawie , settled first at Jukwa , and built houses there. After some time, they applied for a land through the mediation of Tiboe of Jukwa Dankyira for a land at Twifo Hemang and became a paying guest around 1831 and also adopted the name Twifo after their settlement. Their adoption of the name Twifo was obvious since they lived and paid annually for the land on which they occupiedto Twifo Hemang Kingdom .", "after_revision": "Twifo is one of the states established by the Akan when they first settled in the Adansi forest . Later the Akan kept migrating southward toward the coast, where they took over considerable area . By the beginning of the 16th century, European sources noted the state of Twifo , said to be rich in gold; they described it as near the forest area with a capital known as Hemang. These Akan brought their gold to the coastal area to sell and were known by the Europeans by variant names because they brought the finest gold. The people also became known as Twifo. Overview Duarte Pacheco Pereira, the earliest authority writing in 1505 about the Akan, referred to them by the name Quaforo, Cuffrue or Juffer , his attempt in Spanish to render the sound of Twifo. The European traders noted that the Twifo as skillful traders. These Akan were a minority group. Their ancestors moved out of the Adansi area earlier than most of the Akan groups ; they migrated toward the southern part of Ghana and settled in the forest area towards the coast. They established themselves socially, economically, militarily and politically. The Twifo kingdom with its ancient capital of Hemang welcomed other Akan groups into their area. They did not seek to consolidate power like many of the Akan states , and gave autonomy to the newcomers . Many settlers from various Akan groupings came later and settled on either side of the Pra River ; all adopted the name Twifo. Twifo groupings In the 21st century, three groupings are called Twifo: Hemang, Mampong and Morkwa. Morkwa The Morkwa, headed by their leader Nana Amo Kwaw , settled beyond the Pra River ; they shared a common boundary with the already-settled Twifo Hemang kingdom . They adopted the name Twifo. The Morkwa territory was settled earlier than many sites beyond the Pra River. Mampong and Hemang The Mampong, headed by their leader Nana Ampontenfi , came later from Asante Nkawie . They settled first at Jukwa and built houses there. After some time, they applied for land at Twifo Hemang through the mediation of Tiboe of Jukwa Dankyira . They became paying guests around 1831 and also adopted the name Twifo after their settlement. They lived and paid fees annually to Twifo Hemang Kingdom for the land they occupied .", "edit_actions": [{"type": "R", "before": "Akan states that", "after": "states established by the Akan when they", "start_char_pos": 20, "end_char_pos": 36}, {"type": "R", "before": "together with all the Akans and later on moved southwards towards the coastas a result of seeking their own destiny", "after": ". Later the Akan kept migrating southward toward the coast, where they took over considerable area", "start_char_pos": 72, "end_char_pos": 187}, {"type": "D", "before": "existence of the gold rich", "after": null, "start_char_pos": 255, "end_char_pos": 281}, {"type": "R", "before": "around", "after": ", said to be rich in gold; they described it as near", "start_char_pos": 297, "end_char_pos": 303}, {"type": "R", "before": "its capital", "after": "a capital known as", "start_char_pos": 325, "end_char_pos": 336}, {"type": "R", "before": "Akans", "after": "Akan", "start_char_pos": 351, "end_char_pos": 356}, {"type": "A", "before": null, "after": "The people also became known as Twifo.", "start_char_pos": 491, "end_char_pos": 491}, {"type": "R", "before": ", about the Akans - called", "after": "about the Akan, referred to", "start_char_pos": 564, "end_char_pos": 590}, {"type": "D", "before": "\u00b4\u00b4", "after": null, "start_char_pos": 608, "end_char_pos": 610}, {"type": "R", "before": "`` - that was European attempt to render", "after": ", his attempt in Spanish to render the sound of", "start_char_pos": 638, "end_char_pos": 678}, {"type": "R", "before": "most important characteristic of these Twifo people in the eyes of the European traders was", "after": "European traders noted", "start_char_pos": 690, "end_char_pos": 781}, {"type": "R", "before": "were", "after": "as", "start_char_pos": 797, "end_char_pos": 801}, {"type": "R", "before": "Akans", "after": "Akan", "start_char_pos": 826, "end_char_pos": 831}, {"type": "D", "before": "in an unknown date but", "after": null, "start_char_pos": 900, "end_char_pos": 922}, {"type": "R", "before": ", towards", "after": "; they migrated toward", "start_char_pos": 960, "end_char_pos": 969}, {"type": "R", "before": "- Hemang , adopted a hospitable policy that", "after": "of Hemang", "start_char_pos": 1170, "end_char_pos": 1213}, {"type": "R", "before": "groupings into the areathey had already settled. They never sought", "after": "groups into their area. They did not seek", "start_char_pos": 1234, "end_char_pos": 1300}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1351, "end_char_pos": 1351}, {"type": "R", "before": "new comers", "after": "newcomers", "start_char_pos": 1377, "end_char_pos": 1387}, {"type": "R", "before": "before and after", "after": "on either side of", "start_char_pos": 1455, "end_char_pos": 1471}, {"type": "R", "before": "and", "after": "; all", "start_char_pos": 1486, "end_char_pos": 1489}, {"type": "R", "before": "Today, there are three groupings called TWIFO \u2013", "after": "In the 21st century, three groupings are called Twifo:", "start_char_pos": 1530, "end_char_pos": 1577}, {"type": "A", "before": null, "after": "The", "start_char_pos": 1613, "end_char_pos": 1613}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1659, "end_char_pos": 1659}, {"type": "R", "before": "and", "after": "; they", "start_char_pos": 1689, "end_char_pos": 1692}, {"type": "R", "before": "already settled", "after": "already-settled", "start_char_pos": 1727, "end_char_pos": 1742}, {"type": "R", "before": "and", "after": ". They", "start_char_pos": 1764, "end_char_pos": 1767}, {"type": "R", "before": "Morkwa", "after": "The Morkwa territory was", "start_char_pos": 1792, "end_char_pos": 1798}, {"type": "R", "before": "settlers", "after": "sites", "start_char_pos": 1825, "end_char_pos": 1833}, {"type": "R", "before": "Mampongs", "after": "Mampong,", "start_char_pos": 1879, "end_char_pos": 1887}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1927, "end_char_pos": 1927}, {"type": "R", "before": ",", "after": ". They", "start_char_pos": 1958, "end_char_pos": 1959}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1983, "end_char_pos": 1984}, {"type": "R", "before": "a land", "after": "land at Twifo Hemang", "start_char_pos": 2043, "end_char_pos": 2049}, {"type": "R", "before": "for a land at Twifo Hemang and became a paying guest", "after": ". They became paying guests", "start_char_pos": 2099, "end_char_pos": 2151}, {"type": "R", "before": "Their adoption of the name Twifo was obvious since they", "after": "They", "start_char_pos": 2220, "end_char_pos": 2275}, {"type": "R", "before": "annually", "after": "fees annually to Twifo Hemang Kingdom", "start_char_pos": 2291, "end_char_pos": 2299}, {"type": "R", "before": "on which they occupiedto Twifo Hemang Kingdom", "after": "they occupied", "start_char_pos": 2313, "end_char_pos": 2358}], "sents_char_pos": [0, 189, 344, 490, 685, 819, 854, 1046, 1126, 1282, 1513, 1605, 1791, 1855, 2008, 2219]}
+{"doc_id": "2684302", "revision_depth": "1", "before_revision": " Folding lockout hasp, allowing the use of up to six padlocks to secure a device. Lock Out, Tag Out (LOTO) is a safety procedure used in industry and research settings to ensure that dangerous machines are properly shut off and not able to be started up again prior to the completion of maintenance or repair work. It requires that hazardous energy sources be \"isolated and rendered inoperative\" before work is started on the equipment in question. The isolated power sources are then locked and a tag is placed on the lock identifying the worker who placed it. The worker then holds the key for the lock, ensuring that only he or she can remove the lock and start the machine. This prevents accidental startup of a machine while it is in a hazardous state or while a worker is in direct contact with it. Lockout-tagout is used across industries as a safe method of working on hazardous equipment and is mandated by law in some countries. Disconnecting or making safe the equipment involves the removal of all energy sources and is known as isolation. The steps necessary to isolate equipment are often documented in an isolation procedure or a lockout tagout procedure. The isolation procedure generally includes the following tasks: Announce shut off Identify the energy source(s) Isolate the energy source(s) Lock and tag the energy source(s) Prove that the equipment isolation is effective A common feature of these devices is their bright color, usually red, to increase visibility and allow workers to readily see if a device is isolated. Also, the devices are usually of such a design and construction to prevent it being removed with any moderate force - for example, an isolation device does not have to resist a chainsaw, but if an operator forcibly removes it, it will be immediately visible that it has been tampered with. To protect one or more circuit breakers in an electrical panel, a lockout-tagout device called the Panel Lockout can be used. It keeps the panel door locked and prevents the panel cover from being removed. The circuit breakers remain in the off position while electrical work is done. Site policies regarding lockout / tagout A site lockout / tagout policy will provide workers with an explanation of the safety goals of the policy, will identify steps required for a lockout / tagout, and will advise of the consequences of failure to carry out the policy.Richard A. Bolmen, Semiconductor Safety Handbook: Safety and Health in the Semiconductor Industry,William Andrew, 1998,, page 298 A documented lockout / tagout policy may be required by government regulations in some jurisdictions, for example in the United States for sites regulated by OSHA rules. Lockout-tagout in the US, has five required components to be fully compliant with OSHA law. The five components are: Lockout-Tagout Procedures (documentation) Lockout-Tagout Training (for authorized employees and affected employees) Lockout-Tagout Policy (often referred to as a program) Lockout-Tagout Devices and Locks Lockout-Tagout Auditing - Every 12 months, every procedure must be reviewed as well as a review of authorized employees UK There are a few instances across UK regulations that refer to \u2018Lockout Tagout\u2019 indirectly. The use of \u2018Lockout Tagout\u2019 is not currently enforced in the UK but has been proven to be best practice for multiple UK industries. There are citations within the PUWER regulations that argue the use of safety devices such as Lockout Tagout , however at no point do the regulations state this outright. But it does explain that \u2018lockout devices\u2019 should be used to enhance the safety of employees. So, it may not be written in black and white under English Regulations that Lockout Tagout should be used but the document does mention a \u2018Hierarchy of measures\u2019 for standardising safety procedures that are Lockout Tagout related but they are explained as a permanent fixture to any machine or tool. For instance one of the three measures mentioned is to \u2018provide protection appliances (jigs, holders, push sticks)\u2019. And as a wider assumption this could include LOTO devices but it doesn't specifically say that in the regulation. This part of the regulation is more about ensuring that the day to day workplace risks are assessed properly and thoroughly. However, in the same set of regulations, later on, it states that employers should ensure that all work equipment is accompanied by an appropriate way to isolate power/energy. Including an appropriate set of actions (and facilities) to turn the power back on without creating a potential hazard for other employees. This is more aligned with the American OSHA guidelines and practices and defines that the Lockout Tagout Safety movement is on the rise in the UK. In the EU, the guidelines are OSHA based and therefore pick up on American characteristics in its legislation, but it is 89/655 paragraph 2.14 that states that \u201cevery piece of equipment must be fitted with clearly visible devices with which it can be separated from every energy source\u201d [EU Guidelines 89/655 (Paragraph 2.14)]. This indicates that all workplace machinery should be fitted with permanent LOTO solutions for easy and safe Lockout Tagout procedures.", "after_revision": "upright=0.8| Folding lockout hasp, allowing the use of up to six padlocks to secure a device. Lock out, tag out (LOTO) is a safety procedure used in industry and research settings to ensure that dangerous machines are properly shut off and not able to be started up again prior to the completion of maintenance or repair work. It requires that hazardous energy sources be \"isolated and rendered inoperative\" before work is started on the equipment in question. The isolated power sources are then locked and a tag is placed on the lock identifying the worker who placed it. The worker then holds the key for the lock, ensuring that only they can remove the lock and start the machine. This prevents accidental startup of a machine while it is in a hazardous state or while a worker is in direct contact with it. Lockout\u2013tagout is used across industries as a safe method of working on hazardous equipment and is mandated by law in some countries. Disconnecting or making safe the equipment involves the removal of all energy sources and is known as isolation. The steps necessary to isolate equipment are often documented in an isolation procedure or a lockout tagout procedure. The isolation procedure generally includes the following tasks: Announce shut off Identify the energy sources Isolate the energy sources Lock and tag the energy sources Prove that the equipment isolation is effective A common feature of these devices is their bright color, usually red, to increase visibility and allow workers to readily see if a device is isolated. Also, the devices are usually of such a design and construction to prevent it being removed with any moderate force \u2013 for example, an isolation device does not have to resist a chainsaw, but if an operator forcibly removes it, it will be immediately visible that it has been tampered with. To protect one or more circuit breakers in an electrical panel, a lockout\u2013tagout device called the Panel Lockout can be used. It keeps the panel door locked and prevents the panel cover from being removed. The circuit breakers remain in the off position while electrical work is done. Site policies regarding lockout \u2013 tagout A site lockout \u2013 tagout policy will provide workers with an explanation of the safety goals of the policy, will identify steps required for a lockout \u2013 tagout, and will advise of the consequences of failure to carry out the policy.Richard A. Bolmen, Semiconductor Safety Handbook: Safety and Health in the Semiconductor Industry,William Andrew, 1998,, page 298 A documented lockout \u2013 tagout policy may be required by government regulations in some jurisdictions, for example in the United States for sites regulated by OSHA rules. Lockout\u2013tagout in the US, has five required components to be fully compliant with OSHA law. The five components are: Lockout\u2013Tagout Procedures (documentation) Lockout\u2013Tagout Training (for authorized employees and affected employees) Lockout\u2013Tagout Policy (often referred to as a program) Lockout\u2013Tagout Devices and Locks Lockout\u2013Tagout Auditing \u2013 Every 12 months, every procedure must be reviewed as well as a review of authorized employees UK There are a few instances across UK regulations that refer to lockout\u2013tagout indirectly. The use of lockout\u2013tagout is not currently enforced in the UK but has been proven to be best practice for multiple UK industries. There are citations within the PUWER regulations that argue the use of safety devices such as lockout\u2013tagout , however at no point do the regulations state this outright. But it does explain that \u2018lockout devices\u2019 should be used to enhance the safety of employees. So, it may not be written in black and white under English Regulations that lockout\u2013tagout should be used but the document does mention a \u2018Hierarchy of measures\u2019 for standardising safety procedures that are lockout\u2013tagout related but they are explained as a permanent fixture to any machine or tool. For instance one of the three measures mentioned is to \u2018provide protection appliances (jigs, holders, push sticks)\u2019. And as a wider assumption this could include LOTO devices but it doesn't specifically say that in the regulation. This part of the regulation is more about ensuring that the day to day workplace risks are assessed properly and thoroughly. However, in the same set of regulations, later on, it states that employers should ensure that all work equipment is accompanied by an appropriate way to isolate power/energy. Including an appropriate set of actions (and facilities) to turn the power back on without creating a potential hazard for other employees. This is more aligned with the American OSHA guidelines and practices and defines that the lockout\u2013tagout Safety movement is on the rise in the UK. In the EU, the guidelines are OSHA based and therefore pick up on American characteristics in its legislation, but it is 89/655 paragraph 2.14 that states that \u201cevery piece of equipment must be fitted with clearly visible devices with which it can be separated from every energy source\u201d [EU Guidelines 89/655 (Paragraph 2.14)]. This indicates that all workplace machinery should be fitted with permanent LOTO solutions for easy and safe lockout\u2013tagout procedures.", "edit_actions": [{"type": "A", "before": null, "after": "upright=0.8|", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "Out, Tag Out", "after": "out, tag out", "start_char_pos": 87, "end_char_pos": 99}, {"type": "R", "before": "he or she", "after": "they", "start_char_pos": 625, "end_char_pos": 634}, {"type": "R", "before": "Lockout-tagout", "after": "Lockout\u2013tagout", "start_char_pos": 805, "end_char_pos": 819}, {"type": "R", "before": "source(s)", "after": "sources", "start_char_pos": 1273, "end_char_pos": 1282}, {"type": "R", "before": "source(s)", "after": "sources", "start_char_pos": 1302, "end_char_pos": 1311}, {"type": "R", "before": "source(s)", "after": "sources", "start_char_pos": 1336, "end_char_pos": 1345}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 1661, "end_char_pos": 1662}, {"type": "R", "before": "lockout-tagout", "after": "lockout\u2013tagout", "start_char_pos": 1901, "end_char_pos": 1915}, {"type": "R", "before": "/", "after": "\u2013", "start_char_pos": 2152, "end_char_pos": 2153}, {"type": "R", "before": "/", "after": "\u2013", "start_char_pos": 2176, "end_char_pos": 2177}, {"type": "R", "before": "/", "after": "\u2013", "start_char_pos": 2311, "end_char_pos": 2312}, {"type": "R", "before": "/", "after": "\u2013", "start_char_pos": 2543, "end_char_pos": 2544}, {"type": "R", "before": "Lockout-tagout", "after": "Lockout\u2013tagout", "start_char_pos": 2692, "end_char_pos": 2706}, {"type": "R", "before": "Lockout-Tagout", "after": "Lockout\u2013Tagout", "start_char_pos": 2809, "end_char_pos": 2823}, {"type": "R", "before": "Lockout-Tagout", "after": "Lockout\u2013Tagout", "start_char_pos": 2851, "end_char_pos": 2865}, {"type": "R", "before": "Lockout-Tagout", "after": "Lockout\u2013Tagout", "start_char_pos": 2925, "end_char_pos": 2939}, {"type": "R", "before": "Lockout-Tagout", "after": "Lockout\u2013Tagout", "start_char_pos": 2980, "end_char_pos": 2994}, {"type": "R", "before": "Lockout-Tagout Auditing -", "after": "Lockout\u2013Tagout Auditing \u2013", "start_char_pos": 3013, "end_char_pos": 3038}, {"type": "R", "before": "\u2018Lockout Tagout\u2019", "after": "lockout\u2013tagout", "start_char_pos": 3198, "end_char_pos": 3214}, {"type": "R", "before": "\u2018Lockout Tagout\u2019", "after": "lockout\u2013tagout", "start_char_pos": 3238, "end_char_pos": 3254}, {"type": "R", "before": "Lockout Tagout", "after": "lockout\u2013tagout", "start_char_pos": 3453, "end_char_pos": 3467}, {"type": "R", "before": "Lockout Tagout", "after": "lockout\u2013tagout", "start_char_pos": 3700, "end_char_pos": 3714}, {"type": "R", "before": "Lockout Tagout", "after": "lockout\u2013tagout", "start_char_pos": 3831, "end_char_pos": 3845}, {"type": "R", "before": "Lockout Tagout", "after": "lockout\u2013tagout", "start_char_pos": 4686, "end_char_pos": 4700}, {"type": "R", "before": "Lockout Tagout", "after": "lockout\u2013tagout", "start_char_pos": 5180, "end_char_pos": 5194}], "sents_char_pos": [0, 81, 314, 448, 561, 677, 804, 938, 1051, 1170, 1544, 1834, 1960, 2040, 2119, 2392, 2691, 2783, 3226, 3358, 3529, 3623, 3923, 4040, 4154, 4279, 4455, 4595, 4742, 5070]}
+{"doc_id": "27454687", "revision_depth": "1", "before_revision": "The Roman conquest of Anglesey refers to two invasions of the Welsh island that occurred during the early decades of the Roman conquest of Britain in the 1st Century CE. Beginning in 43 CE under Emperor Claudius, Aulus Plautius led the Roman legions and supporting auxiliary troops into Britain in order to subjugate the British tribes, something Julius Caesar had attempted to do in 55 and 54 BCE. Anglesey, which was recorded in Latin as Mona by the Romans, was an important religious centre for Celtic druids and its peoples. The Romans first came into contact with the Welsh tribes in 47 CE yet only invaded the island of Anglesey in 60/61 CE and again in 77 CE. The invasion in 60/61 CE was undertaken by Suetonius Paulinus governor of Britannia, but was drawn away from the island because of the Iceni tribe revolt, led by Boudicca. The next invasion in 77 CE was led by then governor, Gnaeus Julius Agricola. Both of the invasions of Anglesey were recorded by the Roman historian Tacitus , the first can be found in his last work The Annals, written as a history of the Roman empire from Tiberius' reign until Nero's. The second invasion is detailed in Tacitus' work The Life of Gnaeus Julius Agricola, which was written to record the life and accomplishments of Tacitus' father-in-law. Tacitus' two works The Annals and The Agricola are the only written works that discuss the invasions and provide a fairly succinct account of the conquest of Wales; however, the descriptions of the invasions in each book are brief. Archaeological discoveries from the island provide supplementary evidence of the Roman presence in Anglesey following the two invasions. Archaeologists have uncovered a couple of important Roman sites and artifacts from Anglesey in recent years. One important discovery was the first 1st century crop mark found near Cemlyn Bay - on the northern coast of the island - in 2015, which appears to be a typical Roman fortlet. There have also been a couple more important discoveries on the island, possibly relating to the invasions of Anglesey, such as a settlement at Tai Cochion and a watchtower at Pen Bryn-yr-Eglwys. First invasion , 60 CE The first invasion of Anglesey took place around 60 or 61 CE following Suetonius Paulinus' success in other parts of the province, subjugating British tribes and establishing Roman forts. According to Tacitus, Anglesey was a place of refuge for the Celtic tribes during the invasion of Wales and had a significant population, which included the Druids. In episode two of BBC's Sacred Wonders of Britain series, narrator Neil Oliver explains that the Romans believed Anglesey was the homebase for the Druids. The Druids were priests and powerful figures of the Celtic religion and what little is known about them comes only from outside sources. Professor Ronald Hutton explains that these sources vary their description of the Druids, some claiming they were wise and compassionate while others portray them as blood thirsty priests of a gory religion. Hutton explains that this second description of the Druids gave the Romans a reason to invade Anglesey, especially because they believed it was the Druids homebase . While it is true that the Celtic religion emphasized the importance of water and their have been religious deposits found on Anglesey, the largest hoard having been found in Llyn Cerrig Bach a small lake, the findings suggest that Anglesey was the site of smaller deposits over a long period of time which would most likely not be consistent with a major Druidical religious site. The Druids were an important part of Roman reasoning for attacking Anglesey but as historian William Manning suggests this was probably not the practical reason. Manning explains that Paulinus had already been campaigning throughout Britain and Wales and his invasion into Anglesey was simply the next step in his attempt at securing the Celtic territory. Author and historian David W. Moore supports this theory, explaining it was probably not a casual decision to invade but was probably motivated by a wealth of information, including the presence of copper mines. The Druids merely gave the Romans a reason to \"liberate\" Anglesey. According to Tacitus, Paulinus had aspirations of military glory in Britain that would rival the recovery of Armenia by Corbulo. The Roman forces had to cross the Menai Strait, which is a narrow strip of water that separates the island of Anglesey from the rest of the Welsh mainland. The exact place where the Roman forces would have crossed the Menai Strait is not recorded, William Manning in his chapter on \"The Conquest of Wales\" in Malcolm Todd's A Companion to Roman Britain, has suggested that a possible site of their crossing is around the city of Bangor. Tacitus describes the crossing claiming that they used flat-bottomed boats because of uncertain water depths and that the cavalry managed to make it across by swimming and fording. After the army made it across the Menai Strait they were faced by a mass of armed warriors , Tacitus states that women and Druids were among them and that the women were dressed in all black, whom he likens to the Furies. The Druids were chanting and raising their hands to the sky, while the women were waving brands and wore their hair disheveled. Tacitus explains that this combination of sights and sounds was quite frightening for the Roman army, causing them to stop in their tracks with fear. Tacitus claims that the army was roused out of their fear by their general who told them \"not to quail before a troop of frenzied women.\" Tacitus then describes the armies attack, saying they destroyed the enemy and sent a force through the conquered area to destroy their sacred groves, which Tacitus describes as places \"devoted to inhuman superstitions.\" Right after this Suetonius received word of the Boudiccan revolt that called him away from Anglesey, which ended the first invasion. Below is Tacitus ' full account of the first invasion . \"Britain was in the hands of Suetonius Paulinus, who in military knowledge and in popular favour, which allows no one to be without a rival, vied with Corbulo, and aspired to equal the glory of the recovery of Armenia by the subjugation of Rome's enemies. He therefore prepared to attack the island of Mona which had a powerful population and was a refuge for fugitives. He built flat-bottomed vessels to cope with the shallows, and uncertain depths of the sea. Thus the infantry crossed, while the cavalry followed by fording, or, where the water was deep, swam by the side of their horses. %DIFDELCMD < %DIFDELCMD < %%% On the shore stood the opposing army with its dense array of armed warriors, while between the ranks dashed women, in black attire like the Furies, with hair dishevelled, waving brands. All around, the Druids, lifting up their hands to heaven, and pouring forth dreadful imprecations, scared our soldiers by the unfamiliar sight, so that, as if their limbs were paralysed, they stood motionless, and exposed to wounds. Then urged by their general's appeals and mutual encouragements not to quail before a troop of frenzied women, they bore the standards onwards, smote down all resistance, and wrapped the foe in the flames of his own brands. A force was next set over the conquered, and their groves, devoted to inhuman superstitions, were destroyed. They deemed it indeed a duty to cover their altars with the blood of captives and to consult their deities through human entrails. %DIFDELCMD < %DIFDELCMD < %%% Suetonius while thus occupied received tidings of the sudden revolt of the province... %DIFDELCMD < %DIFDELCMD < %%% Suetonius, however, with wonderful resolution, marched amidst a hostile population to Londinium...\" Second invasion , 77 CE The second invasion of Mona was undertaken by Agricola, the Provincial Roman Governor of Britannia, in late 77. It was part of his campaign to subjugate the Ordovices, a British tribe that held lands across modern-day Gwynedd. Prior to Agricola's governorship he served in Britain militarily, once as a junior officer under Suetonius Paulinus and once as a Legion commander. After the Boudiccan revolt, that drew Suetonius away from Anglesey, the conquest of Wales was put on hold. There were five British governors between Suetonius and Agricola during which there is little discussion about Wales and Anglesey. Only when Vespasian ascended the throne in 69 CE was the conquest of Wales resumed, which Tacitus records in his book The Life of Gnaeus Julius Agricola. Tacitus briefly discusses Agricola's predecessor Julius Frontinus who arrived in 74 CE to resume the conquest of Wales. Tacitus only says one line about Frontinus' campaigns claiming he subdued the powerful Silures tribe and possibly, William Manning argues, part of the Ordovices tribe. Tacitus moves onto his description of the invasion of Anglesey by providing some background information about the state Britain was in prior to Agricola's arrival. He describes conflict between the British tribes and the Romans, and he particularly notes the Roman squadron of cavalry that was wiped out by the Ordovices. The instability brought by these conflicts, Tacitus claims, gave those in the country who wished for war, hope. The change in leadership combined with the previous conflicts, between the tribes and the Romans, and the timing of Agricola's arrival created a precarious environment for the new governor that needed to be solved quickly. This can be seen in Tacitus ' account, claiming that Agricola was determined to face the instability head first, even though the traditional time for campaigning was over and his advisors suggested he wait and watch the weaker areas. Thus, Agricola gathered a force and according to Tacitus put himself at the front of his army and marched up a hill to draw the Ordovices out. Tacitus claims that Agricola and his army completely wiped out the tribe and it was this victory which led him to turn his attention to Anglesey. Agricola's journey to Anglesey is probably similar to Suetonius' and Tacitus claims that Agricola's crossing into Anglesey was so unexpected that the inhabitants surrendered without a fight. Manning suggests that Tacitus' account of the invasion is dramaticized and that its reliability should be carefully considered, especially considering Tacitus' relationship to Agricola. However reliable Tacitus' account is it is the only written record of the second invasion . Below is Tacitus' full account of the second invasion in 77 CE from his book De vita et moribus lulii Agricolae. \"Such was the state of Britain, and such were the vicissitudes of the war, which Agricola found on his crossing over about midsummer. Our soldiers made it a pretext for carelessness, as if all fighting was over, and the enemy were biding their time. The Ordovices, shortly before Agricola's arrival, had destroyed nearly the whole of a squadron of allied cavalry quartered in their territory. Such a beginning raised the hopes of the country, and all who wished for war approved the precedent, and anxiously watched the temper of the new governor. Meanwhile, Agricola, though summer was past and the detachments were scattered throughout the province, though the soldiers' confident anticipation of inaction for that year would be a source of delay and difficulty in beginning a campaign, and most advisers thought it best simply to watch all weak points, resolved to face the peril. He collected a force of veterans and a small body of auxiliaries; then as the Ordovices would not venture to descend into the plain, he put himself in front of the ranks to inspire all with the same courage against a common danger, and led his troops up a hill. The tribe was all but exterminated. Well aware that he must follow up the prestige of his arms, and that in proportion to his first success would be the terror of the other tribes, he formed the design of subjugating the island of Mona, from the occupation of which Paullinus had been recalled, as I have already related, by the rebellion of the entire province. But, as his plans were not matured, he had no fleet. The skill and resolution of the general accomplished the passage. With some picked men of the auxiliaries, disencumbered of all baggage, who knew the shallows and had that national experience in swimming which enables the Britons to take care not only of themselves but of their arms and horses, he delivered so unexpected an attack that the astonished enemy who were looking for a fleet, a naval armament, and an assault by sea, thought that to such assailants nothing could be formidable or invincible. And so, peace having been sued for and the island given up, Agricola became great and famous...\" Aftermath Etcetera Following the two invasions of Anglesey the Romans administered the island from Segontium (Caernarfon), a fort in mainland Wales just across the Menai Straits. In the first few centuries, the island saw little to no Roman building. It can be presumed that life on Anglesey would have remained largely unchanged following the two invasions, especially with the base of Roman control being across the Menai Straits. Copper would have been mined and smelted for Roman use, but granaries and farms would have functioned normally, dispersed across the island. Typical 'Romanization' that can be seen in other parts of Britain, was not successful in Anglesey which remained under military control. A number of centuries passed with little change to the island, but by the mid-fourth century Roman rule was in disarray and a shore-fort, Caer Gybi, facing Ireland, was created following threat of attack by the Irish. The fort walls still remain, encircling a church in Holyhead. This fort however, did not last long under Roman rule as the legions quit Britain in 410 CE. Gwynedd Archaeological Trust and Coflein, the National Monuments Record of Wales, provide information about the archaeological finds in Anglesey. A number of archaeological finds from Anglesey have been connected to the Roman occupation of the island, and provide evidence for the Roman presence in Anglesey. David Hopewell discusses three important Roman sites on the island. These sites provide an understanding of how the Roman invasions of the island impacted life on Anglesey and demonstrate Roman control of the island. The Cemlyn Cropmark is the most important site in relation to the invasions of Anglesey because the details of the cropmark strongly suggest it was constructed around the time of the second invasion in 77CE and it is the first military site to be found on the island from this time period. The cropmark was first discovered in 1990 when an aerial photographer captured an image of the landscape during drought conditions. In 2015 David Hopewell and John Burman performed a geophysical survey of the cropmark, this revealed characteristics of a typical Roman fortlet. Two coins were found at the site one from Nerva's reign and one from Hadrian's supporting the dating of the fortlet to post-invasion consolidation. The fortlet overlooks Cemlyn Bay, a good landing place on the north-coast of the island, and would have most likely served as a guide for landing seacrafts as well as a policing station for those wanting access to Anglesey. The fortlet also lies on a major shipping route.", "after_revision": "The Roman conquest of Anglesey refers to two invasions of the Welsh island that occurred during the early decades of the Roman conquest of Britain in the 1st Century CE. Beginning in 43 CE under Emperor Claudius, Aulus Plautius led the Roman legions and supporting auxiliary troops into Britain in order to subjugate the British tribes, something Julius Caesar had attempted to do in 55 and 54 BCE. Anglesey, which was recorded in Latin as Mona by the Romans, was an important religious centre for Celtic druids and its peoples. The Romans first came into contact with the Welsh tribes in 47 CE yet only invaded the island of Anglesey in 60/61 CE and again in 77 CE. The invasion in 60/61 CE was undertaken by Suetonius Paulinus governor of Britannia, but was drawn away from the island because of the Iceni tribe revolt, led by Boudicca. The next invasion in 77 CE was led by then governor, Gnaeus Julius Agricola. Both of the invasions of Anglesey were recorded by the Roman historian Tacitus . The first can be found in his last work The Annals, written as a history of the Roman empire from Tiberius' reign until Nero's. The second invasion is detailed in Tacitus' work The Life of Gnaeus Julius Agricola, which was written to record the life and accomplishments of Tacitus' father-in-law. Tacitus' two works The Annals and The Agricola are the only written works that discuss the invasions and provide a fairly succinct account of the conquest of Wales; however, the descriptions of the invasions in each book are brief. Archaeological discoveries from the island provide supplementary evidence of the Roman presence in Anglesey following the two invasions. Archaeologists have uncovered important Roman sites and artifacts from Anglesey in recent years. One important discovery was the first-century crop mark found near Cemlyn Bay - on the northern coast of the island - in 2015, which appears to be a typical Roman fortlet. There have also been other discoveries on the island, possibly relating to the invasions of Anglesey, such as a settlement at Tai Cochion and a watchtower at Pen Bryn-yr-Eglwys. First invasion ( 60 CE ) The first invasion of Anglesey took place around 60 or 61 CE following Suetonius Paulinus' success in other parts of the province, subjugating British tribes and establishing Roman forts. According to Tacitus, Anglesey was a place of refuge for the Celtic tribes during the invasion of Wales and had a significant population, which included the Druids. The Romans believed Anglesey was the home-base for the Druids. The Druids were priests and powerful figures of the Celtic religion and what little is known about them comes only from outside sources. Professor Ronald Hutton explains that these sources vary in their description of the Druids, some claiming they were wise and compassionate while others portray them as blood thirsty priests of a gory religion. Hutton explains that this second description of the Druids gave the Romans a reason to invade Anglesey, especially because they believed it was the Druids home-base . While it is true that the Celtic religion emphasized the importance of water and their have been religious deposits found on Anglesey, the largest hoard having been found in Llyn Cerrig Bach a small lake, the findings suggest that Anglesey was the site of smaller deposits over a long period of time which would most likely not be consistent with a major Druidical religious site. The Druids were an important part of Roman reasoning for attacking Anglesey but this was probably not the practical reason. Paulinus had already been campaigning throughout Britain and Wales and his invasion into Anglesey was simply the next step in his attempt at securing the Celtic territory. Author and historian David W. Moore supports this theory, explaining it was probably not a casual decision to invade but was probably motivated by a wealth of information, including the presence of copper mines. The Druids merely gave the Romans a reason to \"liberate\" Anglesey. According to Tacitus, Suetonius Paulinus had aspirations of military glory in Britain that would rival the recovery of Armenia by Corbulo. The Roman forces had to cross the Menai Strait, a narrow strip of water that separates the island of Anglesey from the rest of the Welsh mainland. The exact place where the Roman forces would have crossed the Menai Strait is not recorded, William Manning has suggested that a possible site of their crossing is around the city of Bangor. Tacitus describes the crossing claiming that they used flat-bottomed boats because of uncertain water depths and that the cavalry managed to make it across by swimming and fording. After the army made it across the Menai Strait they faced a mass of armed warriors . Tacitus states that women and Druids were among them and that the women were dressed in all black, whom he likens to the Furies. The Druids were chanting and raising their hands to the sky, while the women were waving brands and wore their hair disheveled. Tacitus explains that this combination of sights and sounds was quite frightening for the Roman army, causing them to stop in their tracks with fear. Tacitus claims that the army was roused out of their fear by their general who told them \"not to quail before a troop of frenzied women.\" Tacitus then describes the armies attack, saying they destroyed the enemy and sent a force through the conquered area to destroy their sacred groves, which Tacitus describes as places \"devoted to inhuman superstitions.\" Right after this Suetonius Paulinus received word of the Boudiccan revolt that called him away from Anglesey, which ended the first invasion. Tacitus account of the first invasion states: \"Britain was in the hands of Suetonius Paulinus, who in military knowledge and in popular favour, which allows no one to be without a rival, vied with Corbulo, and aspired to equal the glory of the recovery of Armenia by the subjugation of Rome's enemies. He therefore prepared to attack the island of Mona which had a powerful population and was a refuge for fugitives. He built flat-bottomed vessels to cope with the shallows, and uncertain depths of the sea. Thus the infantry crossed, while the cavalry followed by fording, or, where the water was deep, swam by the side of their horses. %DIFDELCMD < %DIFDELCMD < %%% On the shore stood the opposing army with its dense array of armed warriors, while between the ranks dashed women, in black attire like the Furies, with hair dishevelled, waving brands. All around, the Druids, lifting up their hands to heaven, and pouring forth dreadful imprecations, scared our soldiers by the unfamiliar sight, so that, as if their limbs were paralysed, they stood motionless, and exposed to wounds. Then urged by their general's appeals and mutual encouragements not to quail before a troop of frenzied women, they bore the standards onwards, smote down all resistance, and wrapped the foe in the flames of his own brands. A force was next set over the conquered, and their groves, devoted to inhuman superstitions, were destroyed. They deemed it indeed a duty to cover their altars with the blood of captives and to consult their deities through human entrails. %DIFDELCMD < %DIFDELCMD < %%% Suetonius while thus occupied received tidings of the sudden revolt of the province... %DIFDELCMD < %DIFDELCMD < %%% Suetonius, however, with wonderful resolution, marched amidst a hostile population to Londinium...\" Second invasion ( 77 CE ) The second invasion of Mona was undertaken by Agricola, the Provincial Roman Governor of Britannia, in late 77. It was part of his campaign to subjugate the Ordovices, a British tribe that held lands across modern-day Gwynedd. Prior to Agricola's governorship he served in Britain once as a junior officer under Suetonius Paulinus and once as a Legion commander. After the Boudiccan revolt, the conquest of Wales had been put on hold. There were five British governors between Suetonius and Agricola , and there is little discussion about Wales and Anglesey. Only when Vespasian ascended the throne in 69 CE was the conquest of Wales resumed, which Tacitus records in his book The Life of Gnaeus Julius Agricola. Tacitus briefly discusses Agricola's predecessor Julius Frontinus who arrived in 74 CE to resume the conquest of Wales. Tacitus only says one line about Frontinus' campaigns claiming he subdued the powerful Silures tribe and possibly, William Manning argues, part of the Ordovices tribe. Tacitus moves onto his description of the invasion of Anglesey by providing some background information about the state Britain was in prior to Agricola's arrival. He describes conflict between the British tribes and the Romans, and he particularly notes the Roman squadron of cavalry that was wiped out by the Ordovices. The instability brought by these conflicts, Tacitus claims, gave those in the country who wished for war, hope. The change in leadership combined with the previous conflicts, between the tribes and the Romans, and the timing of Agricola's arrival created a precarious environment for the new governor that needed to be solved quickly. Tacitus claims that Agricola was determined to face the instability head first, even though the traditional time for campaigning was over and his advisors suggested he wait and watch the weaker areas. Thus, Agricola gathered a force and according to Tacitus put himself at the front of his army and marched up a hill to draw the Ordovices out. Agricola and his army completely wiped out the tribe and it was this victory which led him to turn his attention to Anglesey. Agricola's journey to Anglesey is probably similar to Suetonius' and Tacitus claims that Agricola's crossing into Anglesey was so unexpected that the inhabitants surrendered without a fight. Manning suggests that Tacitus' account of the invasion is dramatized and that its reliability should be carefully considered, especially considering Tacitus' relationship to Agricola. However , Tacitus' account is it is the only written record of the second invasion : \"Such was the state of Britain, and such were the vicissitudes of the war, which Agricola found on his crossing over about midsummer. Our soldiers made it a pretext for carelessness, as if all fighting was over, and the enemy were biding their time. The Ordovices, shortly before Agricola's arrival, had destroyed nearly the whole of a squadron of allied cavalry quartered in their territory. Such a beginning raised the hopes of the country, and all who wished for war approved the precedent, and anxiously watched the temper of the new governor. Meanwhile, Agricola, though summer was past and the detachments were scattered throughout the province, though the soldiers' confident anticipation of inaction for that year would be a source of delay and difficulty in beginning a campaign, and most advisers thought it best simply to watch all weak points, resolved to face the peril. He collected a force of veterans and a small body of auxiliaries; then as the Ordovices would not venture to descend into the plain, he put himself in front of the ranks to inspire all with the same courage against a common danger, and led his troops up a hill. The tribe was all but exterminated. Well aware that he must follow up the prestige of his arms, and that in proportion to his first success would be the terror of the other tribes, he formed the design of subjugating the island of Mona, from the occupation of which Paullinus had been recalled, as I have already related, by the rebellion of the entire province. But, as his plans were not matured, he had no fleet. The skill and resolution of the general accomplished the passage. With some picked men of the auxiliaries, disencumbered of all baggage, who knew the shallows and had that national experience in swimming which enables the Britons to take care not only of themselves but of their arms and horses, he delivered so unexpected an attack that the astonished enemy who were looking for a fleet, a naval armament, and an assault by sea, thought that to such assailants nothing could be formidable or invincible. And so, peace having been sued for and the island given up, Agricola became great and famous...\" Aftermath Following the two invasions of Anglesey the Romans administered the island from Segontium (Caernarfon), a fort in mainland Wales just across the Menai Straits. In the first few centuries, the island saw little to no Roman building. It can be presumed that life on Anglesey would have remained largely unchanged following the two invasions, especially with the base of Roman control being across the Menai Straits. Copper would have been mined and smelted for Roman use, but granaries and farms would have functioned normally, dispersed across the island. Typical 'Romanization' that can be seen in other parts of Britain, was not successful in Anglesey which remained under military control. A number of centuries passed with little change to the island, but by the mid-fourth century Roman rule was in disarray and a shore-fort, Caer Gybi, facing Ireland, was created following threat of attack by the Irish. The fort walls still remain, encircling a church in Holyhead. This fort however, did not last long under Roman rule as the legions quit Britain in 410 CE. Archaeological Sites Gwynedd Archaeological Trust and Coflein, the National Monuments Record of Wales, provide information about the archaeological finds in Anglesey. A number of archaeological finds from Anglesey have been connected to the Roman occupation of the island, and provide evidence for the Roman presence in Anglesey. David Hopewell discusses three important Roman sites on the island. These sites provide an understanding of how the Roman invasions of the island impacted life on Anglesey and demonstrate Roman control of the island. The Cemlyn Cropmark is the most important site in relation to the invasions of Anglesey because the details of the cropmark strongly suggest it was constructed around the time of the second invasion in 77CE and it is the first military site to be found on the island from this time period. The cropmark was first discovered in 1990 when an aerial photographer captured an image of the landscape during drought conditions. In 2015 David Hopewell and John Burman performed a geophysical survey of the cropmark, and this revealed characteristics of a typical Roman fortlet. Two coins were found at the site one from Nerva's reign and one from Hadrian's supporting the dating of the fortlet to post-invasion consolidation. The fortlet overlooks Cemlyn Bay, a good landing place on the north-coast of the island, and would have most likely served as a guide for landing seacrafts as well as a policing station for those wanting access to Anglesey. The fortlet also lies on a major shipping route.", "edit_actions": [{"type": "R", "before": ", the", "after": ". The", "start_char_pos": 995, "end_char_pos": 1000}, {"type": "D", "before": "a couple of", "after": null, "start_char_pos": 1693, "end_char_pos": 1704}, {"type": "R", "before": "first 1st century", "after": "first-century", "start_char_pos": 1804, "end_char_pos": 1821}, {"type": "R", "before": "a couple more important", "after": "other", "start_char_pos": 1969, "end_char_pos": 1992}, {"type": "R", "before": ",", "after": "(", "start_char_pos": 2159, "end_char_pos": 2160}, {"type": "A", "before": null, "after": ")", "start_char_pos": 2167, "end_char_pos": 2167}, {"type": "R", "before": "In episode two of BBC's Sacred Wonders of Britain series, narrator Neil Oliver explains that the", "after": "The", "start_char_pos": 2521, "end_char_pos": 2617}, {"type": "R", "before": "homebase", "after": "home-base", "start_char_pos": 2651, "end_char_pos": 2659}, {"type": "A", "before": null, "after": "in", "start_char_pos": 2870, "end_char_pos": 2870}, {"type": "R", "before": "homebase", "after": "home-base", "start_char_pos": 3177, "end_char_pos": 3185}, {"type": "D", "before": "as historian William Manning suggests", "after": null, "start_char_pos": 3649, "end_char_pos": 3686}, {"type": "D", "before": "Manning explains that", "after": null, "start_char_pos": 3731, "end_char_pos": 3752}, {"type": "A", "before": null, "after": "Suetonius", "start_char_pos": 4226, "end_char_pos": 4226}, {"type": "D", "before": "which is", "after": null, "start_char_pos": 4382, "end_char_pos": 4390}, {"type": "D", "before": "in his chapter on \"The Conquest of Wales\" in Malcolm Todd's A Companion to Roman Britain,", "after": null, "start_char_pos": 4598, "end_char_pos": 4687}, {"type": "R", "before": "were faced by", "after": "faced", "start_char_pos": 5004, "end_char_pos": 5017}, {"type": "R", "before": ",", "after": ".", "start_char_pos": 5043, "end_char_pos": 5044}, {"type": "A", "before": null, "after": "Paulinus", "start_char_pos": 5837, "end_char_pos": 5837}, {"type": "R", "before": "Below is Tacitus ' full", "after": "Tacitus", "start_char_pos": 5944, "end_char_pos": 5967}, {"type": "R", "before": ".", "after": "states:", "start_char_pos": 5998, "end_char_pos": 5999}, {"type": "R", "before": ",", "after": "(", "start_char_pos": 7768, "end_char_pos": 7769}, {"type": "A", "before": null, "after": ")", "start_char_pos": 7776, "end_char_pos": 7776}, {"type": "D", "before": "militarily,", "after": null, "start_char_pos": 8058, "end_char_pos": 8069}, {"type": "D", "before": "that drew Suetonius away from Anglesey,", "after": null, "start_char_pos": 8180, "end_char_pos": 8219}, {"type": "R", "before": "was", "after": "had been", "start_char_pos": 8242, "end_char_pos": 8245}, {"type": "R", "before": "during which", "after": ", and", "start_char_pos": 8324, "end_char_pos": 8336}, {"type": "R", "before": "This can be seen in Tacitus ' account, claiming", "after": "Tacitus claims", "start_char_pos": 9489, "end_char_pos": 9536}, {"type": "D", "before": "Tacitus claims that", "after": null, "start_char_pos": 9866, "end_char_pos": 9885}, {"type": "R", "before": "dramaticized", "after": "dramatized", "start_char_pos": 10261, "end_char_pos": 10273}, {"type": "R", "before": "reliable", "after": ",", "start_char_pos": 10397, "end_char_pos": 10405}, {"type": "D", "before": ".", "after": null, "start_char_pos": 10479, "end_char_pos": 10480}, {"type": "R", "before": "Below is Tacitus' full account of the second invasion in 77 CE from his book De vita et moribus lulii Agricolae.", "after": ":", "start_char_pos": 10481, "end_char_pos": 10593}, {"type": "D", "before": "Etcetera", "after": null, "start_char_pos": 12768, "end_char_pos": 12776}, {"type": "A", "before": null, "after": "Archaeological Sites", "start_char_pos": 13842, "end_char_pos": 13842}, {"type": "A", "before": null, "after": "and", "start_char_pos": 14878, "end_char_pos": 14878}], "sents_char_pos": [0, 169, 398, 528, 666, 838, 915, 1124, 1293, 1458, 1525, 1662, 1771, 1947, 2143, 2355, 2520, 2675, 2812, 3021, 3187, 3568, 3730, 3924, 4136, 4203, 4333, 4489, 4770, 4951, 5173, 5301, 5451, 5589, 5943, 6255, 6370, 6461, 6807, 7040, 7264, 7373, 7749, 7888, 8003, 8151, 8258, 8389, 8543, 8663, 8831, 8995, 9153, 9265, 9488, 9722, 9865, 10011, 10202, 10388, 10593, 10727, 10843, 10986, 11141, 11477, 11543, 11739, 11775, 12102, 12155, 12221, 12660, 12936, 13008, 13190, 13331, 13468, 13686, 13748, 13841, 13988, 14151, 14219, 14368, 14658, 14790, 14936, 15084, 15308]}
+{"doc_id": "27837389", "revision_depth": "1", "before_revision": "Title The eponymous title Baopuzi derives from Ge Hong's hao \"sobriquet; pseudonym\" Baopuzi (lit. \"embrace simplicity master\"), which compounds bao \"embrace; hug; carry; hold in both arms; cherish\", pu or \"uncarved wood, [a Taoist metaphor for a] person's original nature; simple; plain\", and zi \u5b50 \"child; offspring; master [title of respect]\". Baopu (Pao-p'u; literally:\"Simplex\"), is a classical allusion to the Tao Te Ching (19 , tr. Mair 1990:181), \"Evince the plainness of undyed silk, embrace the simplicity of the unhewn log; lessen selfishness, diminish desires; abolish learning and you will be without worries.\" Ge Hong's autobiography explains his rationale for choosing his pen name Baopuzi. It has been my plan to preserve regularity and not to follow the whims of the world. My speech is frank and sincere; I engage in no banter. If I do not come upon the right person, I can spend the day in silence. This is the reason my neighbors call me Simplex (Pao-p'u), which name I have used as a sobriquet in my writings. (tr. Ware 1966:10) Compare these autobiography translations: (Davis and Ch'en 1941:301) \"people all call me a pao-p'u scholar (i.e., one who keeps his basic nature, one who is unperturbed by the desires of the world)\"; (Sailey 1978:251) \"among the people of his district there were those who called him \"The Scholar Who Embraces Simplicity\".\" Wu and Davis (1935:224) noted, \"This name has been translated Old Sober-Sides, but Dr. Wu considers that it has no satirical intent and would better be translated Solemn-Seeming Philosopher.\" Fabrizio Pregadio (2006:2) translates \"Master Who Embraces Spontaneous Nature\". Ge Hong's autobiography (Outer Chapter 50) records writing the Baopuzi. In my twenties I planned to compose some little things in order not to waste my time, for it seemed best to create something that would constitute the sayings of one sole thinker. This is when I outlined my philosophical writing, but it was also the moment when I became involved in armed rebellion and found myself wandering and scattered even farther afield, some of my things getting lost. Although constantly on the move, I did not abandon my brush again for a dozen or so years, so that at the age of 37 or 38 [A.D. 317-18] I found my work completed. In all, I have composed Nei p'ien in 20 scrolls, Wai p'ien in 50; \u2026 [list of other writings, totaling 310 scrolls] My Nei p'ien, telling of gods and genii, prescriptions and medicines, ghosts and marvels, transformations, maintenance of life, extension of years, exorcising evils, and banishing misfortune, belongs to the Taoist school. My Wai p'ien, giving an account of success and failure in human affairs and of good and evil in public affairs, belongs to the Confucian school. (tr. Ware 1966:17 , cf. Sailey 1978:264) Compare the more literal translation of Davis and Ch'en (1941:301) , \"I left off writing for ten and odd years, for I was constantly on the road, until the era Chien-wu (317-318 A.D.) when I got it ready.\" Ge's autobiography mentions his military service fighting rebels against the Jin Dynasty, and successfully defending his hometown of Jurong (in modern Zhenjiang, Jiangsu). In 330 (tr. Ware 1966:20), Emperor Cheng of Jin granted Ge the fief of \"Marquis of Guanzhong\" with income from 200 Jurong households. Scholars believe Ge revised the Baopuzi during this period, sometime around 330 (Komjathy 2004:22) or 332 (Wu and Davis 1935:224). The Baopuzi consists of 70 pian \"chapters; books\" divided between the 20 \"Inner Chapters\" and 50 \"Outer Chapters\" (cf. the Zhuangzi textual division). Nathan Sivin (1969:389) described it as \"not one book but two, considerably different in theme\". The Neipian and Waipian \"led entirely separate physical existences; they were not combined under a single title until a millennium after Ko's time\". Content First Page of Baopuzi Inner Chapter 9 The Baopuzis Inner and Outer Chapters discuss miscellaneous topics ranging from esotericism to social philosophy. The Inner Chapters discuss techniques to achieve hsien \"immortality; transcendence\", Chinese alchemy, meditation, Daoyin exercises, Chinese herbology, demons and other spiritual creatures, and fu \"magic talismans\". The Outer Chapters discuss Chinese philosophy, Confucianism, Legalism, government, politics, literature, scholarship, and include Ge's autobiography, which Waley (1930:10) called \"the fullest document of this kind that early China produced\". According to Ge Hong's autobiography, he divided the Inner and Outer Chapters on the distinction between Taoism and Confucianism. Ge philosophically described Taoism as the ben \"root; trunk; origin\" and Confucianism as the mo \"tip; branch; end\" ( Inner Chapter 10, tr. Ware 1966:165) . When asked, \"Which has the priority, Confucianism or Taoism?\" \u2013 Baopuzi replies, \"Taoism is the very trunk of Confucianism, but Confucianism is only a branch of Taoism.\" Lai outlines the Inner Chapters subjects: (1) proofs of the per se existence of immortals and transcendent states of immortality of the body; (2) stipulation of the accessibility to the perfect state of long life to everyone, irrespective of one's social status but dependent on whether one could study deeply and strenuously cultivate the necessary esoteric methods; (3) elaboration of diverse esoteric techniques leading one to become a hsien-immortal; and (4) descriptions and criticism of the diverse contemporary Taoist discourses and sects. (1998:191-2) Several chapters have specific themes. Chapters 4, 8, 11, and 16 describe waidan \"external alchemy\". Inner Chapter 18 details meditation practices. In Chapter 19, Ge Hong praises his master Zheng Yin (ca. 215-ca. 302), catalogs Taoist books, and lists talismans (see Ware 1966:379-385) . + Table 1: The Neipian \"Inner Chapters\" Number Pinyin Characters Translation (adapted from Ware 1966) 1 Changxuan Defining the Mysterious 2 Lunxian About Immortals 3 Duisu Rejoinders to Popular Conceptions 4 Jindan Gold and Cinnabar [pill of immortality] 5 Zhili The Ultimate Order 6 Weizhi The Meaning of \"Subtle\" 7 Sainan Countering Objections 8 Shizhi Resolving Obstructions 9 Daoyi The Meaning of \"the Way\" 10 Mingben Clarifying the Basic [Confucian and Taoist differences] 11 Xianyao The Medicine of Immortality 12 Bianwen Discerning Questions 13 Jiyan The Ultimate Words [regarding immortality] 14 Qinqiu Diligently Seeking [for a teacher] 15 Zaying Miscellaneous Answers 16 Huangbai Yellow and White [gold and silver] 17 Dengshe Climbing [Mountains] and Crossing [Rivers] 18 Dizhen The Terrestrial Truth 19 Xialan Broad Overview [of Taoist literature] 20 Quhuo Allaying Doubts Many scholars have praised the Inner Chapters. Joseph Needham (1954:437) , who called Ge Hong \"the greatest alchemist in Chinese history\", quoted the following passage about medicines from different biological categories. Interlocutor: Life and death are predetermined by fate and their duration is normally fixed. Life is not something any medicine can shorten or lengthen. A finger that has been cut off cannot be joined on again and expected to continue growing. Blood from a wound, though swallowed, is of no benefit. Therefore, it is most inappropriate to approve of taking such nonhuman substances as pine or thuya [cypress] to protract the brief span of life. Ko: According to your argument, a thing is beneficial only if it belongs to the same category as that which is treated. \u2026 If we followed your suggestion and mistrusted things of a different type, we would be obliged to crush flesh and smelt bone to prepare a medicine for wounds, or to fry skin and roast hair to treat baldness. Water and soil are not of the same substance as the various plants; yet the latter rely upon them for growth. The grains are not of the same species as living men; yet living men need them in order to stay alive. Fat is not to be classed with fire, nor water with fish, yet when there is no more fat the fires dies, and when there is no more water, fish perish. (3 , tr. Ware 1966:61-62) Needham (1954:439 ) evaluated this passage, \"Admittedly there is much in the Pao Phu Tzu which is wild, fanciful and superstitious, but here we have a discussion scientifically as sound as anything in Aristotle, and very much superior to anything which the contemporary occident could produce.\" In addition to quoting early alchemical texts, the Inner Chapters describe Ge Hong's laboratory experiments. Wu and Davis mention the Baopuzi formula for making mosaic gold \"a golden crystalline powder used as a pigment\" from Ch'ih Yen \"red crystal salt\" (produced from amethyst, calcite crystal, and alum ; Ware 1966:273 ) and Hwei Chih' \"limewater\". The description of one process deserves special discussion, for it evidently concerns the preparation of stannic sulfide or \"mosaic gold\" and is perhaps the earliest known description of the preparation of this interesting substance. Mosaic gold exists in flakes or leaflets which have the color and the luster of gold, it does not tarnish, and is used at present for bronzing radiators, gilding picture frames and similar purposes. As Ko Hung describes the process, \"tin sheets, each measuring six inches square by one and two-tenths inches thick, are covered with a one-tenth inch layer of a mud-like mixture of Ch'ih Yen (Red Salt) and Hwei Chih (potash-water, limewater), ten pounds of tin to every four of Ch'ih Yen.\" They are then heated in a sealed earthenware pot for thirty days with horse manure (probably with a smoldering fire of dried manure). \"All the tin becomes ash like and interspersed with bean-like pieces which are the yellow gold.\" The large portion of the metallic tin is converted into some ash-like compound or possibly into the ash-like allotropic modification, gray tin. A small portion of the tin is converted into bean-sized aggregates of flaky stannic sulfide. The yield is poor, for the author says that \"twenty ounces of gold are obtained from every twenty pounds of tin used.\" (1935:232) The authors add, \"It seems likely that Ko Hung was personally experienced in the chemistry of tin, for the Chinese say that he was the first to make tin foil and that he made magic or spirit money out of it.\" + Table 2: The Waipian \"Outer Chapters\" Number Pinyin Characters Translation (adapted from Sailey 1978) 1 Jiadun Praising Eremitism 2 Yimin Rusticating People 3 Xuxue Encouraging Study 4 Chongjiao Respecting Education 5 Jundao The Way of the Ruler 6 Chenjie The Integrity of the Ministers 7 Lianggui Good Regulations 8 Shinan Averting Difficulties at the Right Time 9 Guanli The Right Order among the Officials 10 Wuzheng The Correct Use of Instruments 11 Guixian Esteeming Wise People 12 Renneng Employing the Able 13 Qinshi Respecting Well-Minded Subjects 14 Yongxing Employing Punishments 15 Shenju Examining Promotions 16 Jiaoji Keeping Company 17 Beique Encountering Deficiencies 18 Zhuocai Promoting Talents 19 Renming Employing Orders 20 Mingshi Name and Reality 21 Qingjian The Pure Mirror 22 Xingpin Using Official Ranks 23 Misong Ending Disputes 24 Jiujie Admonitions on Alcohol 25 Jimiu Pointing out Faults 26 Jihuo Censuring Muddleheadedness 27 Cijiao Criticizing Arrogance 28 Baili Hundred Miles 29 Jieshu Meeting Visitors 30 Junshi Equalizing Generations 31 Shengfan Decreasing Vexations 32 Shangbo Valuing Breadth of Learning 33 Hanguo The Faults of Han 34 Wushi The Failings of Wu 35 Shouji Guarding Barren Land 36 Anpin Content with Poverty 37 Renming Benevolence and Brilliance 38 Boyu Extensive Analogies 39 Guangpi Vast Examples 40 Ciyi Writings and Ideas 41 Xunben Abiding by Basics 42 Yingchao Responding to Ridicule 43 Yupi Clarifying Obscurities 44 Baijia The Hundred Schools 45 Wenxing Cultivated Behavior 46 Zheng Guo Correcting Guo [Tai] 47 Tan Ni Accusing Ni [Heng] 48 Jie Bao Bao [Jingyan] 49 Zhizhi, Qiongda, Chongyan Knowing When to Stop, Obscurity and Eminence, Reduplicated Words 50 Zixu Autobiography The Inner Chapters have several partial translations. Tenney L. Davis, professor of organic chemistry at Massachusetts Institute of Technology, collaborated on first translations of the Inner Chapters relevant to the history of alchemy. Wu and Davis (1935) translated chapters 4 \"On the Gold Medicine\" and 16 \"On the Yellow and White\" (i.e., gold and silver). Davis and Ch'en (1941) translated chapters 8 \"Overcoming Obstructions\" and 11 \"On Hsien Medicines\", and provided paraphrases or summaries of the remaining Inner Chapters. The French sinologist Eugene Feifel made English translations of chapters 1-3 (1941) , 4 (1944), and 11 (1946). More recently, excerpts from the Inner Chapters are quoted by Verellen (1999) and Pregadio(2006) . The Inner Chapters have one complete translation by James R. Ware (1966) , which also includes Ge Hong's autobiography from Outer Chapter 50 (1966:6-21). Several reviewers censured the quality of Ware's translation, for instance, Kroll (1982:139) called it \"at times misguided\". Huard's and Wong's (1968) critical assessment of Ware was criticized in turn by Sivin (1969:388) . \"Their review, nonetheless, can only be described as perfunctory. Only the forematter and endmatter of Ware's book are evaluated, and that in a curiously cursory fashion.\" Translating the fundamental Taoist word Tao (\"way; path; principle\") as English God is a conspicuous peculiarity of Ware's Baopuzi version. The Introduction gives a convoluted Christian justification, first quoting J.J.L. Duyvendak's translation of Tao Te Ching 25, \"Its rightful name I do not know, but I give It the sobriquet Tao (= God). If a rightful name is insisted upon, I would call It Maximal.\" Then, upon noticing that Tao Te Ching, verse 34, is willing to call the Something \"Minimal,\" every schoolman would have understood that the Chinese author was talking about God, for only in God do contraries become identical! Accordingly, the present translator will always render this use of the term Tao by God. In doing so, he keeps always in mind as the one and only definition the equation establishable from Exod. 3:13-15 and Mark 12:26-27, to mention only two very clear statements. It will be recalled that in the first God says, \"My name is I am, I live, I exist,\" while the second reads, \"God is not of the dead but of the living.\" Therefore, God = Life or Being. (1966:1-2) Ware admitted his God for Dao translation cannot be applied consistently. It is clear that the word tao appears frequently in this text not as a designation of God but of the process by which God is to be approximated or attained. In such cases I shall translate it as \"the divine process.\" In instances where either this or \"God\" would be appropriate, a translator is obliged to be arbitrary. The term tao shih is rendered \"processor\"; hsien is translated \"genie\" rather than \"immortal\". (1966:3) These Chinese words are Tao-shih \u9053\u58eb (\"Taoist priest or practitioner\" )and \"hsien\" \u4ed9 (\"immortal; transcendent\".) Ho Peng-Yoke, an authority in the History of science and technology in China, criticized Ware's translations. It may be true that in certain areas the concept of Tao overlaps with the definition and attributes of God, or for that matter with those of Allah, for example oneness and eternity. However, there is the danger of the analogy being pushed too far. Similarly, the reader might be warned that \"Genii,\" as used for rendering the word hsien, does not convey the concept of some supernatural slaves as found in the lamp and the ring of the Thousand-and-One Nights. The reviewer prefers the terminology used by Tenny L. Davis, i.e. Tao left untranslated and \"immortal\" for hsien. (1967:145) Nevertheless, Ho's review concluded with praise. \"Professor Ware is to be congratulated for bringing out the translation of a most difficult Chinese Taoist text in a very readable form. One cannot find another text that gives so much useful and authoritative information on alchemy and Taoism in fourth-century China.\" Ge Hong wrote the Baopuzi in elegant Classical Chinese grammar and terminology, but some Inner Chapter contexts are difficult to translate. Comparing three versions of this passage listing hsien medicines illustrates the complex translation choices. The best hsien medicine is cinnabar. Others in the order of decreasing excellence are gold, silver, ch'ih, the five jades, mica, pearl, realgar, t'ai i y\u00fc y\u00fc liang, shih chung huang tzu (literally yellow nucleus in stone), shih kuei (stony cinnamon), quartz, shih nao , shih liu huang (a kind of raw sulfur), wild honey and tseng ch'ing. (11 , tr. Davis and Ch'en 1941:311) Medicines of superior quality for immortality are: cinnabar; next comes gold, then follows silver, then the many chih, then the five kinds of jade, then mica, then ming-chu, then realgar, then brown hematite, then conglomerate masses of brown hematite, then stone cassia (?), then quartz, then paraffin, then sulphur, then wild honey, then malachite (stratified variety) (tr. Feifel 1946:2) At the top of the genie's pharmacopoeia stands cinnabar. Second comes gold; third, silver, fourth, excresences; fifth, the jades; sixth, mica; seventh, pearls; eighth, realgar; ninth, brown hematite; tenth, conglomerated brown hematite; eleventh, quartz; twelfth, rock crystal; thirteenth, geodes; fourteenth, sulphur; fifteenth, wild honey; and sixteenth, laminar malachite. (tr. Ware 1966:178) The Baoppuzi Outer Chapters have one partial translation into English. Jay Sailey (1978) translated 21 of the 50 chapters: 1, 3, 5, 14-15, 20, 24-26, 30-34, 37, 40, 43-44, 46-47, and 50. In addition, Sailey (1978:509-545) included appendices on \"Buddhism and the Pao-p'u-tzu\", \"Biography of Ko Hung\" from the Jin Shu, and \"Recensions\" of lost Baopuzi fragments quoted in later texts. Kroll (1982:139) gave a mixed review, \"Although Sailey's renderings frequently obscure Ko Hung's carefully polished diction and nuance, they reliably convey the sense of the original and should be a substantial boon to Western students of medieval Chinese thought and culture.\" Traditional scholarship viewed the Baopuzi, especially the Inner Chapters, as a primary textual source for early Chinese waidan \"external alchemy\". Wu and Davis described it as, probably the widest known and highest regarded of the ancient Chinese treatises on alchemy. It has been preserved for us as part of the Taoist canon. It shows us the art matured by five or six centuries of practice, having its traditional heroes and an extensive literature, its technique and philosophy now clearly fixed, its objectives and pretentions established. This art the author examines in a hardheaded manner and expounds in language which is remarkably free from subterfuge. (1935:221) Arthur Waley praised Ge Hong's rational attitude toward alchemy. Nowhere in Pao P'u Tzu's book do we find the hierophantic tone that pervades most writings on alchemy both in the East and in the West. He uses a certain number of secret terms, such as \"metal-lord\" and \"river chariot\", both of which mean lead; and \"the virgin on the river\", which means mercury \u2026 But his attitude is always that of a solidly educated layman examining claims which a narrow-minded orthodoxy had dismissed with contempt. (1930:13) In the estimation of Ho (1967:145) , the Baopuzi is a \"more important\" alchemical text than Wei Boyang's (ca. 142) Cantong qi \"The Kinship of the Three\". The Baopuzi mentions a Neijing \"Inner Classic\" by Wei Boyang, but curiously does not mention Wei's Cantong ji. Modern scholarship has taken another look at the Baopuzi. Sivin demeans the text's significance. The Inner Chapters are anything but the writings of a Taoist man of wisdom or organizer for his disciples or for other initiates. This book is a vast trove of commonplaces and hearsay about popular beliefs in which Ko's few incontestably Taoist texts play an essential but small part. Its goal is not to catalog, synthesize, or provide a handbook of techniques. It is rather a dialog in which Ko hurls scattershot against a skeptical anonymous interlocutor. The Inner Chapters are a one-issue book. Ko seeks to convince his questioner, and thereby his readers, that immortality is a proper object of study and is attainable \u2013 not only by the ancients but in his own time, not only by a destined few but by anyone with enough faith to undertake arduous and dangerous disciplines. The devotion that Ko calls for implies wholesale acceptance of legends, myths, tales of prodigies, magical beliefs, religious faiths \u2013 practically every belief current in the popular imagination of Ko's time and the inverse in almost every sense of what \"fundamentalist Confucian\" humanists considered worthy of thought (but then they were no longer setting the intellectual style). (1978:345) Sivin sarcastically compares Ge Hong, \"an obsessed bookman and indiscriminate lore-collector\", with Alan Watts. \"Ko's style was rather than of a pedantic purveyor of occultism to the upper class. I can only think of him as the Alan Watts of his time.\" However, James Benn (2003:139) observes, \"This judgement is perhaps not as damning as Professor Sivin intended. Certainly, one would not now go to Watts in the hope of learning much about Taoism, but a close study of his work would tell us a great deal about perceptions and presuppositions concerning Asian religions in mid-twentieth century America. Like Watts and others of his generation it is true that Ge Hong did see religion as a personal matter, and he seems to have approached it from the point of view of a fan or enthusiast more than as an initiate.\" Chi-Tim Lai (1998:199) interprets the Inner Chapters as a \"new discourse\" on hsien\"-immortality through personal salvation and perfection, contrasting with the traditional \"imperial discourse\" that only the rich could afford to achieve a state of hsien.\" For example, histories record that both Qin Shi Huang and Emperor Wu of Han dispatched imperial naval expeditions to obtain the \"elixir of immortality\" from mythical Mount Penglai. \"That is, an individual's self-perfection is only dependent upon ascetic, mystic, and ethical behavior. Since it is a new religious discourse supposedly open to all people, the quest for a prolonged life is no longer the preserve of the wealthy and powerful.\" According to Ko Hung, the hsien-immortals who can achieve the complete avoidance of death rarely come from the social groups of worthies, emperors, or sages. Hence, he implies that hsien-immortality are distinctive \"human\" ideal values to be pursued and potentially achieved by anyone. In the first, in order to differentiate the ideal values of hsien-immortal from this worldly worthies and powers, Ko Hung says, \"Those who attained immortal were almost all poor and lowly. They were not men of position and power.\"' Second, in placing the ideal of hsien-immortality out of the reach of imperial figures, Ko Hung rebukes emperors such as the First Emperor of the Ch'in and Emperor Han-wu-ti, who were \"models\" of seeking for immortality in ancient Chinese history and literature, by saying, \"These two emperors had a hollow reputation for wanting immortality, but they never experienced the reality of cultivating the Tao.\" (Lai 1998:210) Said Cheng Chun in reply, \"The gold and silver which are found in the world are suitable for the purpose. But Tao-shih are all poor; witness the adage that Hsien are never stout and Tao-shih never rich. Tao-shih usually go in groups of five or ten, counting the teacher and his disciples. Poor as they are, how can they be expected to get the necessary gold and silver? Furthermore they cannot cover the great distances to gather the gold and silver which occur in nature. The only thing left for them to do is to make the metals themselves\". (16 , tr. Wu and Davis 1935:260-1)Ware (1966:268 ) translates this adage, \"There are no fat genii and no rich processors\". For a wealthy person seeking hsien (transcendence), Ge Hong recommends compounding jinyi (lit. \"gold liquid/fluid\") \"golden liquor\" in a huachi (lit. \"flower pond\"), \"a vinegar solvent\" (fortified with saltpeter ; Ware 1966:347 ). This is simpler to produce than traditional jiuding \"nine tripods\" elixirs (attributed to the Yellow Emperor), but more expensive \u2013 eight doses cost 400,000 cash. It is true that the nine medicines are the best of Hsien medicines. Yet the materials for their compounding are quite numerous. They are easily procurable only in large cities which have good facilities for communication, but are not to be obtained at other places. Furthermore, in the compounding of the medicines, the fires should be tended for tens of days and nights with industrious application and close adjustment, which is a great difficulty. The compounding of the Gold Fluid is much easier. There the only thing which is difficult is to get the gold. One pound in the old measure is equivalent to two in our contemporary measure. Such a quantity of gold would cost only some three hundred thousand cash. The other auxiliary materials are easy to procure. In the compounding, no fire is required. All that needs to be done is to have the mixture in a Hua Ch'ih (Flower Pond) for the necessary number of days. A total expenditure of four hundred thousand cash will make an amount large enough to transform eight persons into Hsien. Just as no wine is formed by the fermentation of small quantities of rice, so small quantities of materials will not be able to interact to give the medicine. (4 , tr. Wu and Davis 1935:251) Pregadio (2006:215) says recent studies show Ge's intent was \"glorifying the religious and ritual legacy of Jiangnan (the region south of the lower Yangtze River), emphasizing the superiority of certain traditions over others, and enhancing their prestige among the social elite to which Ge Hong belonged.\" Nonetheless, Pregadio concludes, Ge Hong's testimony deserves attention as a valuable overview of the religious traditions of Jiangnan just before the Way of the Celestial Masters (Tianshi dao) spread to that area, soon followed by the Shangqing and Lingbao revelations. From this point of view, the Baopuzi documents important links between the earlier and later history of Taoism, as it also does for medicine and other fields. (2006:217) References Benn, James A. 2003. \"Review of Campany's To Live As Long As Heaven and Earth: Ge Hong\u2019s Traditions of Divine Transcendents%DIFDELCMD < ]%%% , \" Journal of the Royal Asiatic Society 13.1:138-140. Davis, Tenney and Ch\u2019en Kuo-fu. 1941. \"The Inner Chapters of Pao-p\u2019u-tzu,\" Proceedings of the American Academy of Arts and Sciences 74:297-325. chaps. 8 and 11%DIFDELCMD < ] %DIFDELCMD < %%% Feifel Eugene. 1941, 1944, and 1946. \"Pao-p\u2019u tzu nei-p\u2019ien,\" Monumenta Serica 6: 113-211; 9:1-33; 11:1-32. Ho Peng-Yoke. 1967. \"Review of Ware 1966 %DIFDELCMD < ]%%% ,\" The Journal of Asian Studies 27.1:144-145. Hu Fuchen. 1991. Baopuzi neipian yanjiu (Research on the Inner Chapters of The Master Embracing Simplicity). Xinhua chubanshe. Huard, Pierre and Ming Wong. 1968. \"Review of Ware 1966%DIFDELCMD < ]%%% \", Isis 59:113-4. Kominami Ichir\u014d , 1978. \"Gishin jidai no shinsen shis\u014d: Shinsenden o chushin toshite\", in Yamada Keiji (ed.), Chugoku no kagaku to kagakusha, Kyoto daigaku jimbun kagaku kenkyujo, pp. 573\u2013626. Komjathy, Louis. 2004. Daoist Texts in Translation. Kroll, Paul W. 1982. \"Review of Sailey 1978%DIFDELCMD < ]%%% ,\" Chinese Literature: Essays, Articles, Reviews (CLEAR) 4.1:139-140. Lai Chi-tim. 1998. \"Ko Hung's Discourse of Hsien Immortality: A Taoist Configuration of an Alternate Ideal Self-Identity\", Numen 45:1-38. Lin Lixue. 1980. Baopuzi nei wai pian sixiang xi lun (An Analysis of the Thought of the Inner and Outer Chapters of The Master Embracing Simplicity). Xuesheng. Mair, Victor H. 1990. Tao Te Ching: The Classic Book of Integrity and the Way, by Lao Tzu; an entirely new translation based on the recently discovered Ma-wang-tui manuscripts. Bantam Books. Needham, Joseph. 1954. Science and Civilization in China: Volume 2, History of Scientific Thought. Cambridge University Press. Poo, Mu-chou. 2005. \"A Taste of Happiness: Contextualizing Elixirs in Baopuzi,\" in Roel Sterckx ed., Of Tripod and Palate: Food, Politics and Religion in Traditional China, Palgrave, 123-139. Pregadio, Fabrizio. 2006. Great Clarity: Daoism and Alchemy in Early Medieval China. Stanford University Press. Sailey, Jay. 1978. The Master Who Embraces Simplicity: A study of the philosopher Ko Hung, A.D. 283-343. Chinese Materials Center. Sivin, Nathan. 1969. \"On the Pao P\u2019u Tzu Nei Pien and the Life of Ko Hong (283-343)\", Isis 60:388-391. Sivin, Nathan. 1978. \"On the Word \"Taoist\" as a Source of Perplexity. With Special Reference to the Relations of Science and Religion in Traditional China\", History of Religions 17:303-330. Verellen, Franciscus. 1999 . \"The Master Who Embraces Simplicity,\" in Sources of Chinese Tradition, edited by Wm. Theodore de Bary and Irene Bloom, 399-400, Columbia University Press. Waley, Arthur. 1930. \"Notes on Chinese Alchemy (\"Supplementary to Johnson's\" A Study of Chinese Alchemy)\", Bulletin of the School of Oriental Studies 6.1:1-24. Ware, James R. 1966. Alchemy, Medicine and Religion in the China of A.D. 320: The Nei Pien of Ko Hung. Dover. Wu Lu-ch\u2019iang and Tenney Davis. 1935. \"An Ancient Chinese Alchemical Classic. Ko Hung on the Gold Medicine and on the Yellow and the White\", Proceedings of the American Academy of Arts and Sciences 70:221-84. chaps. 4 and 16 - Chinese Text Project The Master Who Embraces Simplicity, FYSK Daoist Culture Centre Database Science and magic in Ge Hong's Baopu-zi nei pian, Evgueni A. Tortchinov Baopuzi \"The Master Embracing Simplicity\", ChinaKnowledge Ge Hong (Baopu zi), Fabrizio Pregadio Baopuzi, ChinaCulture , Project Gutenberg Baopuzi '' ebook Baopuzi, On the Golden Elixir Part 1, On the Golden Elixir Part 2,On the Great Taboos.", "after_revision": "Title The eponymous title Baopuzi derives from Ge Hong's hao \"sobriquet; pseudonym\" Baopuzi (lit. \"embrace simplicity master\"), which compounds bao \"embrace; hug; carry; hold in both arms; cherish\", pu or \"uncarved wood, [a Taoist metaphor for a] person's original nature; simple; plain\", and zi \u5b50 \"child; offspring; master [title of respect]\". Baopu (Pao-p'u; literally:\"Simplex\"), is a classical allusion to the Tao Te Ching (19 , \"Evince the plainness of undyed silk, embrace the simplicity of the unhewn log; lessen selfishness, diminish desires; abolish learning and you will be without worries.\" Ge Hong's autobiography explains his rationale for choosing his pen name Baopuzi. It has been my plan to preserve regularity and not to follow the whims of the world. My speech is frank and sincere; I engage in no banter. If I do not come upon the right person, I can spend the day in silence. This is the reason my neighbors call me Simplex (Pao-p'u), which name I have used as a sobriquet in my writings. Compare these autobiography translations: \"people all call me a pao-p'u scholar (i.e., one who keeps his basic nature, one who is unperturbed by the desires of the world)\"; \"among the people of his district there were those who called him \"The Scholar Who Embraces Simplicity\".\" Wu and Davis noted, \"This name has been translated Old Sober-Sides, but Dr. Wu considers that it has no satirical intent and would better be translated Solemn-Seeming Philosopher.\" Fabrizio Pregadio translates \"Master Who Embraces Spontaneous Nature\". Ge Hong's autobiography (Outer Chapter 50) records writing the Baopuzi. In my twenties I planned to compose some little things in order not to waste my time, for it seemed best to create something that would constitute the sayings of one sole thinker. This is when I outlined my philosophical writing, but it was also the moment when I became involved in armed rebellion and found myself wandering and scattered even farther afield, some of my things getting lost. Although constantly on the move, I did not abandon my brush again for a dozen or so years, so that at the age of 37 or 38 [A.D. 317-18] I found my work completed. In all, I have composed Nei p'ien in 20 scrolls, Wai p'ien in 50; \u2026 [list of other writings, totaling 310 scrolls] My Nei p'ien, telling of gods and genii, prescriptions and medicines, ghosts and marvels, transformations, maintenance of life, extension of years, exorcising evils, and banishing misfortune, belongs to the Taoist school. My Wai p'ien, giving an account of success and failure in human affairs and of good and evil in public affairs, belongs to the Confucian school. Tr. , cf. . Compare the more literal translation of Davis and Ch'en , \"I left off writing for ten and odd years, for I was constantly on the road, until the era Chien-wu (317-318 A.D.) when I got it ready.\" Ge's autobiography mentions his military service fighting rebels against the Jin Dynasty, and successfully defending his hometown of Jurong (in modern Zhenjiang, Jiangsu). In 330 Emperor Cheng of Jin granted Ge the fief of \"Marquis of Guanzhong\" with income from 200 Jurong households. Scholars believe Ge revised the Baopuzi during this period, sometime around 330 or 332. The Baopuzi consists of 70 pian \"chapters; books\" divided between the 20 \"Inner Chapters\" and 50 \"Outer Chapters\" (cf. the Zhuangzi textual division). Nathan Sivin described it as \"not one book but two, considerably different in theme\". The Neipian and Waipian \"led entirely separate physical existences; they were not combined under a single title until a millennium after Ko's time\". Content First Page of Baopuzi Inner Chapter 9 The Baopuzis Inner and Outer Chapters discuss miscellaneous topics ranging from esotericism to social philosophy. The Inner Chapters discuss techniques to achieve hsien \"immortality; transcendence\", Chinese alchemy, meditation, Daoyin exercises, Chinese herbology, demons and other spiritual creatures, and fu \"magic talismans\". The Outer Chapters discuss Chinese philosophy, Confucianism, Legalism, government, politics, literature, scholarship, and include Ge's autobiography, which Waley called \"the fullest document of this kind that early China produced\". According to Ge Hong's autobiography, he divided the Inner and Outer Chapters on the distinction between Taoism and Confucianism. Ge philosophically described Taoism as the ben \"root; trunk; origin\" and Confucianism as the mo \"tip; branch; end\" . Inner Chapter 10, tr. . When asked, \"Which has the priority, Confucianism or Taoism?\" \u2013 Baopuzi replies, \"Taoism is the very trunk of Confucianism, but Confucianism is only a branch of Taoism.\" Lai outlines the Inner Chapters subjects: (1) proofs of the per se existence of immortals and transcendent states of immortality of the body; (2) stipulation of the accessibility to the perfect state of long life to everyone, irrespective of one's social status but dependent on whether one could study deeply and strenuously cultivate the necessary esoteric methods; (3) elaboration of diverse esoteric techniques leading one to become a hsien-immortal; and (4) descriptions and criticism of the diverse contemporary Taoist discourses and sects. Several chapters have specific themes. Chapters 4, 8, 11, and 16 describe waidan \"external alchemy\". Inner Chapter 18 details meditation practices. In Chapter 19, Ge Hong praises his master Zheng Yin (ca. 215-ca. 302), catalogs Taoist books, and lists talismans . + Table 1: The Neipian \"Inner Chapters\" Number Pinyin Characters TranslationAdapted from . 1 Changxuan Defining the Mysterious 2 Lunxian About Immortals 3 Duisu Rejoinders to Popular Conceptions 4 Jindan Gold and Cinnabar [pill of immortality] 5 Zhili The Ultimate Order 6 Weizhi The Meaning of \"Subtle\" 7 Sainan Countering Objections 8 Shizhi Resolving Obstructions 9 Daoyi The Meaning of \"the Way\" 10 Mingben Clarifying the Basic [Confucian and Taoist differences] 11 Xianyao The Medicine of Immortality 12 Bianwen Discerning Questions 13 Jiyan The Ultimate Words [regarding immortality] 14 Qinqiu Diligently Seeking [for a teacher] 15 Zaying Miscellaneous Answers 16 Huangbai Yellow and White [gold and silver] 17 Dengshe Climbing [Mountains] and Crossing [Rivers] 18 Dizhen The Terrestrial Truth 19 Xialan Broad Overview [of Taoist literature] 20 Quhuo Allaying Doubts Many scholars have praised the Inner Chapters. Joseph Needham , who called Ge Hong \"the greatest alchemist in Chinese history\", quoted the following passage about medicines from different biological categories. Interlocutor: Life and death are predetermined by fate and their duration is normally fixed. Life is not something any medicine can shorten or lengthen. A finger that has been cut off cannot be joined on again and expected to continue growing. Blood from a wound, though swallowed, is of no benefit. Therefore, it is most inappropriate to approve of taking such nonhuman substances as pine or thuya [cypress] to protract the brief span of life. Ko: According to your argument, a thing is beneficial only if it belongs to the same category as that which is treated. \u2026 If we followed your suggestion and mistrusted things of a different type, we would be obliged to crush flesh and smelt bone to prepare a medicine for wounds, or to fry skin and roast hair to treat baldness. Water and soil are not of the same substance as the various plants; yet the latter rely upon them for growth. The grains are not of the same species as living men; yet living men need them in order to stay alive. Fat is not to be classed with fire, nor water with fish, yet when there is no more fat the fires dies, and when there is no more water, fish perish. (3 ) Needham evaluated this passage, \"Admittedly there is much in the Pao Phu Tzu which is wild, fanciful and superstitious, but here we have a discussion scientifically as sound as anything in Aristotle, and very much superior to anything which the contemporary occident could produce.\" In addition to quoting early alchemical texts, the Inner Chapters describe Ge Hong's laboratory experiments. Wu and Davis mention the Baopuzi formula for making mosaic gold \"a golden crystalline powder used as a pigment\" from Ch'ih Yen \"red crystal salt\" (produced from amethyst, calcite crystal, and alum ) and Hwei Chih' \"limewater\". The description of one process deserves special discussion, for it evidently concerns the preparation of stannic sulfide or \"mosaic gold\" and is perhaps the earliest known description of the preparation of this interesting substance. Mosaic gold exists in flakes or leaflets which have the color and the luster of gold, it does not tarnish, and is used at present for bronzing radiators, gilding picture frames and similar purposes. As Ko Hung describes the process, \"tin sheets, each measuring six inches square by one and two-tenths inches thick, are covered with a one-tenth inch layer of a mud-like mixture of Ch'ih Yen (Red Salt) and Hwei Chih (potash-water, limewater), ten pounds of tin to every four of Ch'ih Yen.\" They are then heated in a sealed earthenware pot for thirty days with horse manure (probably with a smoldering fire of dried manure). \"All the tin becomes ash like and interspersed with bean-like pieces which are the yellow gold.\" The large portion of the metallic tin is converted into some ash-like compound or possibly into the ash-like allotropic modification, gray tin. A small portion of the tin is converted into bean-sized aggregates of flaky stannic sulfide. The yield is poor, for the author says that \"twenty ounces of gold are obtained from every twenty pounds of tin used.\" The authors add, \"It seems likely that Ko Hung was personally experienced in the chemistry of tin, for the Chinese say that he was the first to make tin foil and that he made magic or spirit money out of it.\" + Table 2: The Waipian \"Outer Chapters\" Number Pinyin Characters TranslationAdapted from . 1 Jiadun Praising Eremitism 2 Yimin Rusticating People 3 Xuxue Encouraging Study 4 Chongjiao Respecting Education 5 Jundao The Way of the Ruler 6 Chenjie The Integrity of the Ministers 7 Lianggui Good Regulations 8 Shinan Averting Difficulties at the Right Time 9 Guanli The Right Order among the Officials 10 Wuzheng The Correct Use of Instruments 11 Guixian Esteeming Wise People 12 Renneng Employing the Able 13 Qinshi Respecting Well-Minded Subjects 14 Yongxing Employing Punishments 15 Shenju Examining Promotions 16 Jiaoji Keeping Company 17 Beique Encountering Deficiencies 18 Zhuocai Promoting Talents 19 Renming Employing Orders 20 Mingshi Name and Reality 21 Qingjian The Pure Mirror 22 Xingpin Using Official Ranks 23 Misong Ending Disputes 24 Jiujie Admonitions on Alcohol 25 Jimiu Pointing out Faults 26 Jihuo Censuring Muddleheadedness 27 Cijiao Criticizing Arrogance 28 Baili Hundred Miles 29 Jieshu Meeting Visitors 30 Junshi Equalizing Generations 31 Shengfan Decreasing Vexations 32 Shangbo Valuing Breadth of Learning 33 Hanguo The Faults of Han 34 Wushi The Failings of Wu 35 Shouji Guarding Barren Land 36 Anpin Content with Poverty 37 Renming Benevolence and Brilliance 38 Boyu Extensive Analogies 39 Guangpi Vast Examples 40 Ciyi Writings and Ideas 41 Xunben Abiding by Basics 42 Yingchao Responding to Ridicule 43 Yupi Clarifying Obscurities 44 Baijia The Hundred Schools 45 Wenxing Cultivated Behavior 46 Zheng Guo Correcting Guo [Tai] 47 Tan Ni Accusing Ni [Heng] 48 Jie Bao Bao [Jingyan] 49 Zhizhi, Qiongda, Chongyan Knowing When to Stop, Obscurity and Eminence, Reduplicated Words 50 Zixu Autobiography The Inner Chapters have several partial translations. Tenney L. Davis, professor of organic chemistry at Massachusetts Institute of Technology, collaborated on first translations of the Inner Chapters relevant to the history of alchemy. Wu and Davis translated chapters 4 \"On the Gold Medicine\" and 16 \"On the Yellow and White\" (i.e., gold and silver). Davis and Ch'en translated chapters 8 \"Overcoming Obstructions\" and 11 \"On Hsien Medicines\", and provided paraphrases or summaries of the remaining Inner Chapters. The French sinologist Eugene Feifel made English translations of chapters 1-3 , 4 , and 11. More recently, excerpts from the Inner Chapters are quoted by Verellen and Pregadio . The Inner Chapters have one complete translation by James R. Ware , which also includes Ge Hong's autobiography from Outer Chapter 50. Several reviewers censured the quality of Ware's translation, for instance, Kroll called it \"at times misguided\". Huard's and Wong's critical assessment of Ware was criticized in turn by Sivin . \"Their review, nonetheless, can only be described as perfunctory. Only the forematter and endmatter of Ware's book are evaluated, and that in a curiously cursory fashion.\" Translating the fundamental Taoist word Tao (\"way; path; principle\") as English God is a conspicuous peculiarity of Ware's Baopuzi version. The Introduction gives a convoluted Christian justification, first quoting J.J.L. Duyvendak's translation of Tao Te Ching 25, \"Its rightful name I do not know, but I give It the sobriquet Tao (= God). If a rightful name is insisted upon, I would call It Maximal.\" Then, upon noticing that Tao Te Ching, verse 34, is willing to call the Something \"Minimal,\" every schoolman would have understood that the Chinese author was talking about God, for only in God do contraries become identical! Accordingly, the present translator will always render this use of the term Tao by God. In doing so, he keeps always in mind as the one and only definition the equation establishable from Exod. 3:13-15 and Mark 12:26-27, to mention only two very clear statements. It will be recalled that in the first God says, \"My name is I am, I live, I exist,\" while the second reads, \"God is not of the dead but of the living.\" Therefore, God = Life or Being. Ware admitted his God for Dao translation cannot be applied consistently. It is clear that the word tao appears frequently in this text not as a designation of God but of the process by which God is to be approximated or attained. In such cases I shall translate it as \"the divine process.\" In instances where either this or \"God\" would be appropriate, a translator is obliged to be arbitrary. The term tao shih is rendered \"processor\"; hsien is translated \"genie\" rather than \"immortal\". These Chinese words are Tao-shih \u9053\u58eb (\"Taoist priest or practitioner\" )and \"hsien\" \u4ed9 (\"immortal; transcendent\".) Ho Peng-Yoke, an authority in the History of science and technology in China, criticized Ware's translations. It may be true that in certain areas the concept of Tao overlaps with the definition and attributes of God, or for that matter with those of Allah, for example oneness and eternity. However, there is the danger of the analogy being pushed too far. Similarly, the reader might be warned that \"Genii,\" as used for rendering the word hsien, does not convey the concept of some supernatural slaves as found in the lamp and the ring of the Thousand-and-One Nights. The reviewer prefers the terminology used by Tenny L. Davis, i.e. Tao left untranslated and \"immortal\" for hsien. Nevertheless, Ho's review concluded with praise. \"Professor Ware is to be congratulated for bringing out the translation of a most difficult Chinese Taoist text in a very readable form. One cannot find another text that gives so much useful and authoritative information on alchemy and Taoism in fourth-century China.\" Ge Hong wrote the Baopuzi in elegant Classical Chinese grammar and terminology, but some Inner Chapter contexts are difficult to translate. Comparing three versions of this passage listing hsien medicines illustrates the complex translation choices. The best hsien medicine is cinnabar. Others in the order of decreasing excellence are gold, silver, ch'ih, the five jades, mica, pearl, realgar, t'ai i y\u00fc y\u00fc liang, shih chung huang tzu (literally yellow nucleus in stone), shih kuei (stony cinnamon), quartz, shih nao , shih liu huang (a kind of raw sulfur), wild honey and tseng ch'ing. (11 )Tr. . Medicines of superior quality for immortality are: cinnabar; next comes gold, then follows silver, then the many chih, then the five kinds of jade, then mica, then ming-chu, then realgar, then brown hematite, then conglomerate masses of brown hematite, then stone cassia (?), then quartz, then paraffin, then sulphur, then wild honey, then malachite (stratified variety) Tr. . At the top of the genie's pharmacopoeia stands cinnabar. Second comes gold; third, silver, fourth, excresences; fifth, the jades; sixth, mica; seventh, pearls; eighth, realgar; ninth, brown hematite; tenth, conglomerated brown hematite; eleventh, quartz; twelfth, rock crystal; thirteenth, geodes; fourteenth, sulphur; fifteenth, wild honey; and sixteenth, laminar malachite. The Baoppuzi Outer Chapters have one partial translation into English. Jay Sailey translated 21 of the 50 chapters: 1, 3, 5, 14-15, 20, 24-26, 30-34, 37, 40, 43-44, 46-47, and 50. In addition, Sailey included appendices on \"Buddhism and the Pao-p'u-tzu\", \"Biography of Ko Hung\" from the Jin Shu, and \"Recensions\" of lost Baopuzi fragments quoted in later texts. gave a mixed review, \"Although Sailey's renderings frequently obscure Ko Hung's carefully polished diction and nuance, they reliably convey the sense of the original and should be a substantial boon to Western students of medieval Chinese thought and culture.\" Traditional scholarship viewed the Baopuzi, especially the Inner Chapters, as a primary textual source for early Chinese waidan \"external alchemy\". Wu and Davis described it as, probably the widest known and highest regarded of the ancient Chinese treatises on alchemy. It has been preserved for us as part of the Taoist canon. It shows us the art matured by five or six centuries of practice, having its traditional heroes and an extensive literature, its technique and philosophy now clearly fixed, its objectives and pretentions established. This art the author examines in a hardheaded manner and expounds in language which is remarkably free from subterfuge. Arthur Waley praised Ge Hong's rational attitude toward alchemy. Nowhere in Pao P'u Tzu's book do we find the hierophantic tone that pervades most writings on alchemy both in the East and in the West. He uses a certain number of secret terms, such as \"metal-lord\" and \"river chariot\", both of which mean lead; and \"the virgin on the river\", which means mercury \u2026 But his attitude is always that of a solidly educated layman examining claims which a narrow-minded orthodoxy had dismissed with contempt. In the estimation of Ho , the Baopuzi is a \"more important\" alchemical text than Wei Boyang's (ca. 142) Cantong qi \"The Kinship of the Three\". The Baopuzi mentions a Neijing \"Inner Classic\" by Wei Boyang, but curiously does not mention Wei's Cantong ji. Modern scholarship has taken another look at the Baopuzi. Sivin demeans the text's significance. The Inner Chapters are anything but the writings of a Taoist man of wisdom or organizer for his disciples or for other initiates. This book is a vast trove of commonplaces and hearsay about popular beliefs in which Ko's few incontestably Taoist texts play an essential but small part. Its goal is not to catalog, synthesize, or provide a handbook of techniques. It is rather a dialog in which Ko hurls scattershot against a skeptical anonymous interlocutor. The Inner Chapters are a one-issue book. Ko seeks to convince his questioner, and thereby his readers, that immortality is a proper object of study and is attainable \u2013 not only by the ancients but in his own time, not only by a destined few but by anyone with enough faith to undertake arduous and dangerous disciplines. The devotion that Ko calls for implies wholesale acceptance of legends, myths, tales of prodigies, magical beliefs, religious faiths \u2013 practically every belief current in the popular imagination of Ko's time and the inverse in almost every sense of what \"fundamentalist Confucian\" humanists considered worthy of thought (but then they were no longer setting the intellectual style). Sivin sarcastically compares Ge Hong, \"an obsessed bookman and indiscriminate lore-collector\", with Alan Watts. \"Ko's style was rather than of a pedantic purveyor of occultism to the upper class. I can only think of him as the Alan Watts of his time.\" However, James Benn observes, \"This judgement is perhaps not as damning as Professor Sivin intended. Certainly, one would not now go to Watts in the hope of learning much about Taoism, but a close study of his work would tell us a great deal about perceptions and presuppositions concerning Asian religions in mid-twentieth century America. Like Watts and others of his generation it is true that Ge Hong did see religion as a personal matter, and he seems to have approached it from the point of view of a fan or enthusiast more than as an initiate.\" Chi-Tim Lai interprets the Inner Chapters as a \"new discourse\" on hsien\"-immortality through personal salvation and perfection, contrasting with the traditional \"imperial discourse\" that only the rich could afford to achieve a state of hsien.\" For example, histories record that both Qin Shi Huang and Emperor Wu of Han dispatched imperial naval expeditions to obtain the \"elixir of immortality\" from mythical Mount Penglai. \"That is, an individual's self-perfection is only dependent upon ascetic, mystic, and ethical behavior. Since it is a new religious discourse supposedly open to all people, the quest for a prolonged life is no longer the preserve of the wealthy and powerful.\" According to Ko Hung, the hsien-immortals who can achieve the complete avoidance of death rarely come from the social groups of worthies, emperors, or sages. Hence, he implies that hsien-immortality are distinctive \"human\" ideal values to be pursued and potentially achieved by anyone. In the first, in order to differentiate the ideal values of hsien-immortal from this worldly worthies and powers, Ko Hung says, \"Those who attained immortal were almost all poor and lowly. They were not men of position and power.\"' Second, in placing the ideal of hsien-immortality out of the reach of imperial figures, Ko Hung rebukes emperors such as the First Emperor of the Ch'in and Emperor Han-wu-ti, who were \"models\" of seeking for immortality in ancient Chinese history and literature, by saying, \"These two emperors had a hollow reputation for wanting immortality, but they never experienced the reality of cultivating the Tao.\" Said Cheng Chun in reply, \"The gold and silver which are found in the world are suitable for the purpose. But Tao-shih are all poor; witness the adage that Hsien are never stout and Tao-shih never rich. Tao-shih usually go in groups of five or ten, counting the teacher and his disciples. Poor as they are, how can they be expected to get the necessary gold and silver? Furthermore they cannot cover the great distances to gather the gold and silver which occur in nature. The only thing left for them to do is to make the metals themselves\". (16 ) Tr. . Ware translates this adage, \"There are no fat genii and no rich processors\". For a wealthy person seeking hsien (transcendence), Ge Hong recommends compounding jinyi (lit. \"gold liquid/fluid\") \"golden liquor\" in a huachi (lit. \"flower pond\"), \"a vinegar solvent\" (fortified with saltpeter ). This is simpler to produce than traditional jiuding \"nine tripods\" elixirs (attributed to the Yellow Emperor), but more expensive \u2013 eight doses cost 400,000 cash. It is true that the nine medicines are the best of Hsien medicines. Yet the materials for their compounding are quite numerous. They are easily procurable only in large cities which have good facilities for communication, but are not to be obtained at other places. Furthermore, in the compounding of the medicines, the fires should be tended for tens of days and nights with industrious application and close adjustment, which is a great difficulty. The compounding of the Gold Fluid is much easier. There the only thing which is difficult is to get the gold. One pound in the old measure is equivalent to two in our contemporary measure. Such a quantity of gold would cost only some three hundred thousand cash. The other auxiliary materials are easy to procure. In the compounding, no fire is required. All that needs to be done is to have the mixture in a Hua Ch'ih (Flower Pond) for the necessary number of days. A total expenditure of four hundred thousand cash will make an amount large enough to transform eight persons into Hsien. Just as no wine is formed by the fermentation of small quantities of rice, so small quantities of materials will not be able to interact to give the medicine. (4 )Tr. . Pregadio says recent studies show Ge's intent was \"glorifying the religious and ritual legacy of Jiangnan (the region south of the lower Yangtze River), emphasizing the superiority of certain traditions over others, and enhancing their prestige among the social elite to which Ge Hong belonged.\" Nonetheless, Pregadio concludes, Ge Hong's testimony deserves attention as a valuable overview of the religious traditions of Jiangnan just before the Way of the Celestial Masters (Tianshi dao) spread to that area, soon followed by the Shangqing and Lingbao revelations. From this point of view, the Baopuzi documents important links between the earlier and later history of Taoism, as it also does for medicine and other fields. References %DIFDELCMD < ]%%% %DIFDELCMD < ] %DIFDELCMD < %%% cite book |translator-last=Ware |translator-first=James R. |date= 1966 %DIFDELCMD < ]%%% |title=Alchemy, Medicine and Religion in the China of A.D. 320: The Nei Pien of Ko Hung |publisher=MIT Press |isbn=9780262230223 |ref=CITEREFWare1966 Footnotes Further reading Hu Fuchen. 1991. Baopuzi neipian yanjiu (Research on the Inner Chapters of The Master Embracing Simplicity). Xinhua chubanshe. %DIFDELCMD < ]%%% Kominami Ichir\u014d , 1978. \"Gishin jidai no shinsen shis\u014d: Shinsenden o chushin toshite\", in Yamada Keiji (ed.), Chugoku no kagaku to kagakusha, Kyoto daigaku jimbun kagaku kenkyujo, pp. 573\u2013626. %DIFDELCMD < ]%%% Lin Lixue. 1980. Baopuzi nei wai pian sixiang xi lun (An Analysis of the Thought of the Inner and Outer Chapters of The Master Embracing Simplicity). Xuesheng. Poo, Mu-chou. 2005. \"A Taste of Happiness: Contextualizing Elixirs in Baopuzi,\" in Roel Sterckx ed., Of Tripod and Palate: Food, Politics and Religion in Traditional China, Palgrave, 123-139. - Chinese Text Project The Master Who Embraces Simplicity, FYSK Daoist Culture Centre Database Science and magic in Ge Hong's Baopu-zi nei pian, Evgueni A. Tortchinov Baopuzi \"The Master Embracing Simplicity\", ChinaKnowledge Ge Hong (Baopu zi), Fabrizio Pregadio Baopuzi, ChinaCulture , Project Gutenberg Baopuzi ebook Baopuzi, On the Golden Elixir Part 1, On the Golden Elixir Part 2,On the Great Taboos.", "edit_actions": [{"type": "R", "before": ", tr. Mair 1990:181),", "after": ",", "start_char_pos": 431, "end_char_pos": 452}, {"type": "D", "before": "(tr. Ware 1966:10)", "after": null, "start_char_pos": 1029, "end_char_pos": 1047}, {"type": "D", "before": "(Davis and Ch'en 1941:301)", "after": null, "start_char_pos": 1090, "end_char_pos": 1116}, {"type": "D", "before": "(Sailey 1978:251)", "after": null, "start_char_pos": 1248, "end_char_pos": 1265}, {"type": "D", "before": "(1935:224)", "after": null, "start_char_pos": 1385, "end_char_pos": 1395}, {"type": "D", "before": "(2006:2)", "after": null, "start_char_pos": 1582, "end_char_pos": 1590}, {"type": "R", "before": "(tr. Ware 1966:17", "after": "Tr.", "start_char_pos": 2754, "end_char_pos": 2771}, {"type": "R", "before": "Sailey 1978:264)", "after": ".", "start_char_pos": 2778, "end_char_pos": 2794}, {"type": "D", "before": "(1941:301)", "after": null, "start_char_pos": 2851, "end_char_pos": 2861}, {"type": "D", "before": "(tr. Ware 1966:20),", "after": null, "start_char_pos": 3180, "end_char_pos": 3199}, {"type": "R", "before": "(Komjathy 2004:22) or 332 (Wu and Davis 1935:224).", "after": "or 332.", "start_char_pos": 3387, "end_char_pos": 3437}, {"type": "D", "before": "(1969:389)", "after": null, "start_char_pos": 3602, "end_char_pos": 3612}, {"type": "D", "before": "(1930:10)", "after": null, "start_char_pos": 4372, "end_char_pos": 4381}, {"type": "R", "before": "(", "after": ".", "start_char_pos": 4697, "end_char_pos": 4698}, {"type": "D", "before": "Ware 1966:165)", "after": null, "start_char_pos": 4721, "end_char_pos": 4735}, {"type": "D", "before": "(1998:191-2)", "after": null, "start_char_pos": 5455, "end_char_pos": 5467}, {"type": "D", "before": "(see Ware 1966:379-385)", "after": null, "start_char_pos": 5730, "end_char_pos": 5753}, {"type": "R", "before": "Translation (adapted from Ware 1966)", "after": "TranslationAdapted from .", "start_char_pos": 5821, "end_char_pos": 5857}, {"type": "D", "before": "(1954:437)", "after": null, "start_char_pos": 6702, "end_char_pos": 6712}, {"type": "D", "before": ", tr. Ware 1966:61-62) Needham (1954:439", "after": null, "start_char_pos": 8001, "end_char_pos": 8041}, {"type": "A", "before": null, "after": "Needham", "start_char_pos": 8044, "end_char_pos": 8044}, {"type": "D", "before": "; Ware 1966:273", "after": null, "start_char_pos": 8626, "end_char_pos": 8641}, {"type": "D", "before": "(1935:232)", "after": null, "start_char_pos": 9982, "end_char_pos": 9992}, {"type": "R", "before": "Translation (adapted from Sailey 1978)", "after": "TranslationAdapted from .", "start_char_pos": 10267, "end_char_pos": 10305}, {"type": "D", "before": "(1935)", "after": null, "start_char_pos": 12187, "end_char_pos": 12193}, {"type": "D", "before": "(1941)", "after": null, "start_char_pos": 12313, "end_char_pos": 12319}, {"type": "D", "before": "(1941)", "after": null, "start_char_pos": 12546, "end_char_pos": 12552}, {"type": "R", "before": "(1944), and 11 (1946).", "after": ", and 11.", "start_char_pos": 12557, "end_char_pos": 12579}, {"type": "R", "before": "(1999) and Pregadio(2006)", "after": "and Pregadio", "start_char_pos": 12651, "end_char_pos": 12676}, {"type": "D", "before": "(1966)", "after": null, "start_char_pos": 12745, "end_char_pos": 12751}, {"type": "R", "before": "50 (1966:6-21).", "after": "50.", "start_char_pos": 12817, "end_char_pos": 12832}, {"type": "D", "before": "(1982:139)", "after": null, "start_char_pos": 12915, "end_char_pos": 12925}, {"type": "D", "before": "(1968)", "after": null, "start_char_pos": 12977, "end_char_pos": 12983}, {"type": "D", "before": "(1969:388)", "after": null, "start_char_pos": 13044, "end_char_pos": 13054}, {"type": "D", "before": "(1966:1-2)", "after": null, "start_char_pos": 14307, "end_char_pos": 14317}, {"type": "D", "before": "(1966:3)", "after": null, "start_char_pos": 14807, "end_char_pos": 14815}, {"type": "D", "before": "(1967:145)", "after": null, "start_char_pos": 15612, "end_char_pos": 15622}, {"type": "R", "before": ", tr. Davis and Ch'en 1941:311)", "after": ")Tr. .", "start_char_pos": 16534, "end_char_pos": 16565}, {"type": "R", "before": "(tr. Feifel 1946:2)", "after": "Tr. .", "start_char_pos": 16937, "end_char_pos": 16956}, {"type": "D", "before": "(tr. Ware 1966:178)", "after": null, "start_char_pos": 17333, "end_char_pos": 17352}, {"type": "D", "before": "(1978)", "after": null, "start_char_pos": 17435, "end_char_pos": 17441}, {"type": "D", "before": "(1978:509-545)", "after": null, "start_char_pos": 17560, "end_char_pos": 17574}, {"type": "D", "before": "Kroll (1982:139)", "after": null, "start_char_pos": 17737, "end_char_pos": 17753}, {"type": "D", "before": "(1935:221)", "after": null, "start_char_pos": 18679, "end_char_pos": 18689}, {"type": "D", "before": "(1930:13)", "after": null, "start_char_pos": 19192, "end_char_pos": 19201}, {"type": "D", "before": "(1967:145)", "after": null, "start_char_pos": 19226, "end_char_pos": 19236}, {"type": "D", "before": "(1978:345)", "after": null, "start_char_pos": 20726, "end_char_pos": 20736}, {"type": "D", "before": "(2003:139)", "after": null, "start_char_pos": 21009, "end_char_pos": 21019}, {"type": "D", "before": "(1998:199)", "after": null, "start_char_pos": 21564, "end_char_pos": 21574}, {"type": "D", "before": "(Lai 1998:210)", "after": null, "start_char_pos": 23173, "end_char_pos": 23187}, {"type": "D", "before": ", tr. Wu and Davis 1935:260-1)Ware (1966:268", "after": null, "start_char_pos": 23735, "end_char_pos": 23779}, {"type": "A", "before": null, "after": "Tr. . Ware", "start_char_pos": 23782, "end_char_pos": 23782}, {"type": "D", "before": "; Ware 1966:347", "after": null, "start_char_pos": 24067, "end_char_pos": 24082}, {"type": "R", "before": ", tr. Wu and Davis 1935:251)", "after": ")Tr. .", "start_char_pos": 25451, "end_char_pos": 25479}, {"type": "D", "before": "(2006:215)", "after": null, "start_char_pos": 25489, "end_char_pos": 25499}, {"type": "D", "before": "(2006:217)", "after": null, "start_char_pos": 26217, "end_char_pos": 26227}, {"type": "D", "before": "Benn, James A. 2003. \"Review", "after": null, "start_char_pos": 26239, "end_char_pos": 26267}, {"type": "D", "before": "of Campany's To Live As Long As Heaven and Earth: Ge Hong\u2019s Traditions of Divine Transcendents", "after": null, "start_char_pos": 26268, "end_char_pos": 26362}, {"type": "D", "before": ", \" Journal of the Royal Asiatic Society 13.1:138-140. Davis, Tenney and Ch\u2019en Kuo-fu. 1941. \"The Inner Chapters of Pao-p\u2019u-tzu,\" Proceedings of the American Academy of Arts and Sciences 74:297-325.", "after": null, "start_char_pos": 26380, "end_char_pos": 26578}, {"type": "D", "before": "chaps. 8 and 11", "after": null, "start_char_pos": 26579, "end_char_pos": 26594}, {"type": "D", "before": "Feifel Eugene. 1941, 1944, and 1946. \"Pao-p\u2019u tzu nei-p\u2019ien,\" Monumenta Serica 6: 113-211; 9:1-33; 11:1-32. Ho Peng-Yoke. 1967. \"Review", "after": null, "start_char_pos": 26626, "end_char_pos": 26761}, {"type": "R", "before": "of Ware", "after": "cite book |translator-last=Ware |translator-first=James R. |date=", "start_char_pos": 26762, "end_char_pos": 26769}, {"type": "R", "before": ",\" The Journal of Asian Studies 27.1:144-145.", "after": "|title=Alchemy, Medicine and Religion in the China of A.D. 320: The Nei Pien of Ko Hung |publisher=MIT Press |isbn=9780262230223 |ref=CITEREFWare1966", "start_char_pos": 26793, "end_char_pos": 26838}, {"type": "A", "before": null, "after": "Footnotes", "start_char_pos": 26839, "end_char_pos": 26839}, {"type": "A", "before": null, "after": "Further reading", "start_char_pos": 26840, "end_char_pos": 26840}, {"type": "D", "before": "Huard, Pierre and Ming Wong. 1968. \"Review", "after": null, "start_char_pos": 26968, "end_char_pos": 27010}, {"type": "D", "before": "of Ware 1966", "after": null, "start_char_pos": 27011, "end_char_pos": 27023}, {"type": "D", "before": "\", Isis 59:113-4.", "after": null, "start_char_pos": 27041, "end_char_pos": 27058}, {"type": "D", "before": "Komjathy, Louis. 2004. Daoist Texts in Translation. Kroll, Paul W. 1982. \"Review", "after": null, "start_char_pos": 27252, "end_char_pos": 27332}, {"type": "D", "before": "of Sailey 1978", "after": null, "start_char_pos": 27333, "end_char_pos": 27347}, {"type": "D", "before": ",\" Chinese Literature: Essays, Articles, Reviews (CLEAR) 4.1:139-140. Lai Chi-tim. 1998. \"Ko Hung's Discourse of Hsien Immortality: A Taoist Configuration of an Alternate Ideal Self-Identity\", Numen 45:1-38.", "after": null, "start_char_pos": 27365, "end_char_pos": 27572}, {"type": "D", "before": "Mair, Victor H. 1990. Tao Te Ching: The Classic Book of Integrity and the Way, by Lao Tzu; an entirely new translation based on the recently discovered Ma-wang-tui manuscripts. Bantam Books. Needham, Joseph. 1954. Science and Civilization in China: Volume 2, History of Scientific Thought. Cambridge University Press.", "after": null, "start_char_pos": 27733, "end_char_pos": 28050}, {"type": "D", "before": "Pregadio, Fabrizio. 2006. Great Clarity: Daoism and Alchemy in Early Medieval China. Stanford University Press. Sailey, Jay. 1978. The Master Who Embraces Simplicity: A study of the philosopher Ko Hung, A.D. 283-343. Chinese Materials Center. Sivin, Nathan. 1969. \"On the Pao P\u2019u Tzu Nei Pien and the Life of Ko Hong (283-343)\", Isis 60:388-391. Sivin, Nathan. 1978. \"On the Word \"Taoist\" as a Source of Perplexity. With Special Reference to the Relations of Science and Religion in Traditional China\", History of Religions 17:303-330. Verellen, Franciscus. 1999 . \"The Master Who Embraces Simplicity,\" in Sources of Chinese Tradition, edited by Wm. Theodore de Bary and Irene Bloom, 399-400, Columbia University Press. Waley, Arthur. 1930. \"Notes on Chinese Alchemy (\"Supplementary to Johnson's\" A Study of Chinese Alchemy)\", Bulletin of the School of Oriental Studies 6.1:1-24. Ware, James R. 1966. Alchemy, Medicine and Religion in the China of A.D. 320: The Nei Pien of Ko Hung. Dover. Wu Lu-ch\u2019iang and Tenney Davis. 1935. \"An Ancient Chinese Alchemical Classic. Ko Hung on the Gold Medicine and on the Yellow and the White\", Proceedings of the American Academy of Arts and Sciences 70:221-84.", "after": null, "start_char_pos": 28243, "end_char_pos": 29441}, {"type": "D", "before": "chaps. 4 and 16", "after": null, "start_char_pos": 29442, "end_char_pos": 29457}, {"type": "D", "before": "''", "after": null, "start_char_pos": 29771, "end_char_pos": 29773}], "sents_char_pos": [0, 72, 97, 157, 169, 188, 272, 305, 316, 344, 360, 532, 570, 621, 703, 788, 820, 843, 915, 1028, 1247, 1371, 1458, 1563, 1643, 1715, 1895, 2108, 2271, 2337, 2608, 2753, 3000, 3172, 3184, 3306, 3437, 3480, 3588, 3685, 3753, 3834, 3994, 4063, 4209, 4451, 4581, 4635, 4683, 4720, 4737, 4907, 5049, 5275, 5362, 5454, 5506, 5568, 5615, 5745, 5766, 5795, 5857, 6010, 6070, 6166, 6233, 6686, 6861, 6954, 7014, 7105, 7161, 7306, 7426, 7635, 7703, 7745, 7799, 7848, 7997, 8319, 8428, 8627, 8671, 8905, 9104, 9394, 9528, 9625, 9769, 9862, 9981, 10201, 10212, 10241, 10305, 10324, 10336, 10354, 10369, 10381, 10399, 10410, 10422, 10433, 10444, 10460, 10474, 10491, 10502, 10519, 10537, 10550, 10563, 10577, 10593, 10613, 10624, 10636, 10655, 10666, 10681, 10699, 10713, 10728, 10739, 10751, 10763, 10782, 10794, 10814, 10825, 10843, 10854, 10874, 10887, 10898, 10916, 10927, 10944, 10955, 10972, 10984, 11000, 11011, 11026, 11042, 11058, 11080, 11091, 11109, 11120, 11139, 11156, 11178, 11191, 11205, 11221, 11238, 11259, 11271, 11283, 11766, 11990, 12173, 12296, 12467, 12579, 12678, 12832, 12957, 13122, 13228, 13279, 13368, 13569, 13632, 13858, 13946, 14122, 14274, 14391, 14548, 14608, 14711, 14754, 14806, 14911, 14927, 15037, 15219, 15285, 15497, 15563, 15611, 15671, 15808, 15941, 16081, 16191, 16228, 16529, 16626, 17013, 17032, 17068, 17086, 17099, 17116, 17133, 17156, 17193, 17211, 17234, 17254, 17275, 17298, 17332, 17423, 17539, 17736, 18014, 18162, 18284, 18342, 18559, 18678, 18754, 18890, 18999, 19052, 19191, 19355, 19466, 19524, 19563, 19693, 19848, 19925, 20021, 20062, 20342, 20725, 20848, 20932, 20988, 21100, 21340, 21551, 21806, 21987, 22091, 22247, 22405, 22533, 22722, 22764, 23172, 23293, 23320, 23390, 23476, 23557, 23660, 23730, 23854, 23949, 24004, 24068, 24085, 24248, 24316, 24376, 24514, 24699, 24749, 24809, 24888, 24962, 25013, 25054, 25166, 25288, 25447, 25786, 26057, 26216, 26259, 26434, 26466, 26585, 26640, 26662, 26716, 26733, 26747, 26838, 26851, 26949, 26967, 27002, 27058, 27082, 27251, 27268, 27303, 27324, 27434, 27447, 27583, 27722, 27754, 27823, 27909, 27923, 27946, 28022, 28050, 28064, 28242, 28262, 28327, 28354, 28373, 28459, 28485, 28500, 28588, 28603, 28658, 28778, 28800, 28892, 28962, 28977, 29122, 29143, 29225, 29270, 29310, 29448, 29613]}
+{"doc_id": "28076584", "revision_depth": "1", "before_revision": "The Marine Technology Society (MTS) is a professional society that serves the international community of approximately 3,800 ocean engineers, technologists, policy-makers, and educators. The goal of the society, which was founded in 1963 , is to promote awareness, understanding , advancement and application of marine technology. The association is based in Washington, District of Columbia, United States. Former executive directors include Martin Finnerty, Judith T. Krauthamer and Richard Lawson. The society consists of 29 technical disciplines and presently has 17 sections, including overseas sections in Japan , Korea and Norway . In addition, MTS has 23 student sections at colleges and universities with related fields of study . The flagship publication of the society is the MTS Journal. The journal is published 6 times annually and primarily features themed issues consisting of invited papers. The journal has a current ISI Impact Factor of .763 MTS sponsors several conferencesof note, including the OCEANS Conference (co-sponsosed with IEEE/OES), Underwater Intervention (co-sponsored with ADCI), Dynamic Positioning Conference, biennial Buoy Workshop (co-sponsored with the Office of Naval Research), and the hot-topic workshop series TechSurge. In 1969 the group held its annual convention in Miami Beach. The convention was addressed by Spiro Agnew, who was then Vice President of the United States. In 1993 the laser line scan, a U. S. Navy photography secret, made its debut at the society sponsored trade show in New Orleans. Broad, William J. (1997). The universe below: discovering the secrets of the deep sea. New York: Simon & Schuster. pp. 88-89. .", "after_revision": "The Marine Technology Society (MTS) professional society established in 1963 with the goal of advancing the creation and application of marine technologies. With over 1,500 members in 20 countries, MTS is the largest professional society devoted to fostering diverse uses of marine technologies within the research, industrial and military communities. The Society is a 501(c)(3) non-profit organization headquartered in Washington, D.C., USA. The MTS is a leading source of information about marine technology through its peer-reviewed journal, the Marine Technology Society Journal and international conferences. Our members use various marine technologies to explore the ocean, seas and lakes, to measure and monitor the health of our waters and aquatic creatures, predict impacts of events from storms to tsunamis, to rescue and repair after events occur, to generate energy from renewable resources, to extract natural resources, to safeguard jurisdictions, to innovate new solutions, and to educate the next generation of the workforce. History and Mission of MTS The Marine Technology Society was incorporated in June 1963 to give members of academia, government and industry a common forum for the exchange of information and ideas, and to \u201cmake real contributions in fostering progress in the marine sciences for the benefit of mankind.\u201d Our Mission is to: \u00b7 Facilitate a broader understanding of the relevance of marine technology to wider global issues by enhancing the dissemination of marine technology information \u00b7 Promote and improve marine technology and related educational programs \u00b7 Advance the development of the tools and procedures required to explore, study and further the responsible and sustainable use of the oceans Our Vision is to be the leading authority and advocate for marine technology and resources while promoting member success and public understanding. Organization The MTS structure allows for leadership at the international, national and local levels, as well as in specialized subject areas. The Board of Directors is comprised of MTS members who are elected every three years by the membership. The Council provides advice to the Board of Directors on the technical, business and financial affairs of the society. The Council consists of the nationally elected Board of Directors, locally elected Section chairs and those Professional Committee chairs who request a seat on the Council, and two student members. MTS Sections are located all over the world including: \u00b7 India \u00b7 Japan \u00b7 Korea \u00b7 Newfoundland-Labrador \u00b7 Norway \u00b7 SingaporeUnited States: \u00b7 Florida \u00b7 Great Lakes \u00b7 Gulf Coast \u00b7 Hampton Roads \u00b7 Hawaii \u00b7 Houston\u00b7 Monterey \u00b7 New England \u00b7 Oregon \u00b7 Puget Sound \u00b7 San Diego \u00b7 Washington, D.C. MTS Student Sections are hosted at colleges and universities all over the world . MTS Technical Committees are technical interest groups that bring together members interested in the following topics: \u00b7 Bio-Inspired Marine Systems \u00b7 Buoy Technology \u00b7 Cables Connectors \u00b7 Dynamic Positioning \u00b7 Manned Underwater Vehicles \u00b7 Marine Geodetic Information Systems \u00b7 Ocean Observing Systems \u00b7 Marine engineering \u00b7 Marine ecosystem protection and remediation \u00b7 Naval architecture\u00b7 Navigation \u00b7 Oceanographic Instrumentation \u00b7 Remote Sensing \u00b7 Remotely Operated Vehicles \u00b7 Ropes & Tension \u00b7 Safety and defense \u00b7 Seafloor Engineering \u00b7 Sea Surface and Sub-Surface Support \u00b7 Underwater Imaging \u00b7 Unmanned Maritime Systems The MTS Headquarters Staff supports all the activities conducted by the Society members. Conferences MTS and its members organize a number of conferences, meetings, and workshops around the world including: OCEANS \u2013 our premier conference, co-hosted by IEEE-OES, occurs twice a year in various locations, bringing together the leading innovators, analysts, and producers of marine technology, research, and education. Underwater Intervention \u2013 led by the MTS ROV committee, co-hosted by ADCI, draws industry leaders from across the country and around the globe for networking, thought sharing and relationship building. Buoy Workshop - MTS Buoy Technology Committee leads this opportunity to engage people working in buoy technology to share the latest methods and technology. Dynamic Positioning Conference - The MTS Dynamic Positioning Committee leads this professional symposium covering the latest dynamic positioning developments and technology. TechSurges \u2013 Conducted by MTS members and partner organizations all over the world, TechSurges are small workshops to address \u201chot topics\u201d in the marine technology community. OTC \u2013 MTS is a partner in the Offshore Technology Conference (OTC) where for over 50 years, energy professionals have been exchanging ideas and advancing scientific knowledge. Awards MTS annually recognizes the outstanding accomplishments of the marine technology community the MTS awards program, conducted annually during an OCEANS conference. By their commitment to their profession, advancing marine technologies, innovation in application of marine technologies, and efforts to further the Society's mission, MTS award winners exemplify the best in the field. Current awards include: MTS Fellow Compass Distinguished Achievement Award Compass International Award Compass Industrial Award Captain Don Walsh Award for Ocean Exploration Lockheed Martin Award for Ocean Science and Engineering Ocean News and Technology Young Professional Award MTS Outstanding Service Award MTS Outstanding Section Award MTS Outstanding Committee Award MTS Outstanding Student Section Award John P. Craven Mentor Award Walter Munk Scholar Award and Commemorative Lecture Publications Marine Technology Society Journal is the flagship publication of the Marine Technology Society. It publishes the highest caliber, peer-reviewed papers six times a year on subjects of interest to the society: marine technology, ocean science, marine policy, and education. Currents is an eNewsletter focused on society-wide and industry news and events, business announcements and information, scientific briefs and articles, and member news. Eddies is an eNewsletter focused on emerging marine technologies as well as scientific and industry advances and accomplishments. Scholarships In addition to programs supporting student interest and persistence in the field of marine technology, each year MTS awards significant scholarship funding to college graduate, undergraduate, and senior high school students who have been accepted into full-time marine-related programs (with a focus on marine technology, marine engineering, or marine science) .", "edit_actions": [{"type": "R", "before": "is a professional society that serves the international community of approximately 3,800 ocean engineers, technologists, policy-makers, and educators. The", "after": "professional society established in 1963 with the", "start_char_pos": 36, "end_char_pos": 190}, {"type": "R", "before": "the society, which was founded in", "after": "advancing the creation and application of marine technologies. With over 1,500 members in 20 countries, MTS is the largest professional society devoted to fostering diverse uses of marine technologies within the research, industrial and military communities. The Society is a 501(c)(3) non-profit organization headquartered in Washington, D.C., USA. The MTS is a leading source of information about marine technology through its peer-reviewed journal, the Marine Technology Society Journal and international conferences.", "start_char_pos": 199, "end_char_pos": 232}, {"type": "A", "before": null, "after": "Our members use various marine technologies to explore the ocean, seas and lakes, to measure and monitor the health of our waters and aquatic creatures, predict impacts of events from storms to tsunamis, to rescue and repair after events occur, to generate energy from renewable resources, to extract natural resources, to safeguard jurisdictions, to innovate new solutions, and to educate the next generation of the workforce.", "start_char_pos": 233, "end_char_pos": 233}, {"type": "A", "before": null, "after": "History and Mission of MTS The Marine Technology Society was incorporated in June", "start_char_pos": 234, "end_char_pos": 234}, {"type": "R", "before": ", is to promote awareness, understanding , advancement and application of marine technology.", "after": "to give members of academia, government and industry a common forum for the exchange of information and ideas, and to \u201cmake real contributions in fostering progress in the marine sciences for the benefit of mankind.\u201d", "start_char_pos": 240, "end_char_pos": 332}, {"type": "A", "before": null, "after": "Our Mission is to:", "start_char_pos": 333, "end_char_pos": 333}, {"type": "A", "before": null, "after": "\u00b7 Facilitate a broader understanding of the relevance of marine technology to wider global issues by enhancing the dissemination of marine technology information", "start_char_pos": 334, "end_char_pos": 334}, {"type": "A", "before": null, "after": "\u00b7 Promote and improve marine technology and related educational programs", "start_char_pos": 335, "end_char_pos": 335}, {"type": "A", "before": null, "after": "\u00b7 Advance the development of the tools and procedures required to explore, study and further the responsible and sustainable use of the oceans", "start_char_pos": 336, "end_char_pos": 336}, {"type": "A", "before": null, "after": "Our Vision is to be the leading authority and advocate for marine technology and resources while promoting member success and public understanding.", "start_char_pos": 337, "end_char_pos": 337}, {"type": "A", "before": null, "after": "Organization The MTS structure allows for leadership at the international, national and local levels, as well as in specialized subject areas.", "start_char_pos": 338, "end_char_pos": 338}, {"type": "A", "before": null, "after": "The Board of Directors is comprised of MTS members who are elected every three years by the membership. The Council provides advice to the Board of Directors on the technical, business and financial affairs of the society.", "start_char_pos": 339, "end_char_pos": 339}, {"type": "D", "before": "association is based in Washington, District of Columbia, United States. Former executive directors include Martin Finnerty, Judith T. Krauthamer and Richard Lawson.", "after": null, "start_char_pos": 344, "end_char_pos": 509}, {"type": "R", "before": "The society consists of 29 technical disciplines and presently has 17 sections, including overseas sections in Japan , Korea and Norway . In addition, MTS has 23 student sections", "after": "Council consists of the nationally elected Board of Directors, locally elected Section chairs and those Professional Committee chairs who request a seat on the Council, and two student members.", "start_char_pos": 510, "end_char_pos": 688}, {"type": "A", "before": null, "after": "MTS Sections are located all over the world including: \u00b7 India", "start_char_pos": 689, "end_char_pos": 689}, {"type": "A", "before": null, "after": "\u00b7 Japan", "start_char_pos": 690, "end_char_pos": 690}, {"type": "A", "before": null, "after": "\u00b7 Korea", "start_char_pos": 691, "end_char_pos": 691}, {"type": "A", "before": null, "after": "\u00b7 Newfoundland-Labrador", "start_char_pos": 692, "end_char_pos": 692}, {"type": "A", "before": null, "after": "\u00b7 Norway", "start_char_pos": 693, "end_char_pos": 693}, {"type": "A", "before": null, "after": "\u00b7 SingaporeUnited States:", "start_char_pos": 694, "end_char_pos": 694}, {"type": "A", "before": null, "after": "\u00b7 Florida", "start_char_pos": 695, "end_char_pos": 695}, {"type": "A", "before": null, "after": "\u00b7 Great Lakes", "start_char_pos": 696, "end_char_pos": 696}, {"type": "A", "before": null, "after": "\u00b7 Gulf Coast", "start_char_pos": 697, "end_char_pos": 697}, {"type": "A", "before": null, "after": "\u00b7 Hampton Roads", "start_char_pos": 698, "end_char_pos": 698}, {"type": "A", "before": null, "after": "\u00b7 Hawaii", "start_char_pos": 699, "end_char_pos": 699}, {"type": "A", "before": null, "after": "\u00b7 Houston\u00b7 Monterey", "start_char_pos": 700, "end_char_pos": 700}, {"type": "A", "before": null, "after": "\u00b7 New England", "start_char_pos": 701, "end_char_pos": 701}, {"type": "A", "before": null, "after": "\u00b7 Oregon", "start_char_pos": 702, "end_char_pos": 702}, {"type": "A", "before": null, "after": "\u00b7 Puget Sound", "start_char_pos": 703, "end_char_pos": 703}, {"type": "A", "before": null, "after": "\u00b7 San Diego", "start_char_pos": 704, "end_char_pos": 704}, {"type": "A", "before": null, "after": "\u00b7 Washington, D.C. MTS Student Sections are hosted", "start_char_pos": 705, "end_char_pos": 705}, {"type": "R", "before": "with related fields of study", "after": "all over the world", "start_char_pos": 735, "end_char_pos": 763}, {"type": "R", "before": "The flagship publication of the society is the MTS Journal. The journal is published 6 times annually and primarily features themed issues consisting of invited papers. The journal has a current ISI Impact Factor of .763", "after": "MTS Technical Committees are technical interest groups that bring together members interested in the following topics: \u00b7 Bio-Inspired Marine Systems", "start_char_pos": 766, "end_char_pos": 986}, {"type": "R", "before": "MTS sponsors several conferencesof note, including the OCEANS Conference (co-sponsosed with IEEE/OES), Underwater Intervention (co-sponsored with ADCI), Dynamic Positioning Conference, biennial Buoy Workshop (co-sponsored with the Office of Naval Research), and the hot-topic workshop series TechSurge.", "after": "\u00b7 Buoy Technology", "start_char_pos": 987, "end_char_pos": 1289}, {"type": "R", "before": "In 1969 the group held its annual convention in Miami Beach. The convention was addressed by Spiro Agnew, who was then Vice President of the United States.", "after": "\u00b7 Cables", "start_char_pos": 1290, "end_char_pos": 1445}, {"type": "A", "before": null, "after": "Connectors", "start_char_pos": 1446, "end_char_pos": 1446}, {"type": "R", "before": "In 1993 the laser line scan, a U. S. Navy photography secret, made its debut at the society sponsored trade show in New Orleans. Broad, William J. (1997). The universe below: discovering the secrets of the deep sea. New York: Simon", "after": "\u00b7 Dynamic Positioning", "start_char_pos": 1447, "end_char_pos": 1678}, {"type": "A", "before": null, "after": "\u00b7 Manned Underwater Vehicles", "start_char_pos": 1679, "end_char_pos": 1679}, {"type": "A", "before": null, "after": "\u00b7 Marine Geodetic Information Systems", "start_char_pos": 1680, "end_char_pos": 1680}, {"type": "A", "before": null, "after": "\u00b7 Ocean Observing Systems", "start_char_pos": 1681, "end_char_pos": 1681}, {"type": "A", "before": null, "after": "\u00b7 Marine engineering", "start_char_pos": 1682, "end_char_pos": 1682}, {"type": "A", "before": null, "after": "\u00b7 Marine ecosystem protection and remediation", "start_char_pos": 1683, "end_char_pos": 1683}, {"type": "A", "before": null, "after": "\u00b7 Naval architecture\u00b7 Navigation", "start_char_pos": 1684, "end_char_pos": 1684}, {"type": "A", "before": null, "after": "\u00b7 Oceanographic Instrumentation", "start_char_pos": 1685, "end_char_pos": 1685}, {"type": "A", "before": null, "after": "\u00b7 Remote Sensing", "start_char_pos": 1686, "end_char_pos": 1686}, {"type": "A", "before": null, "after": "\u00b7 Remotely Operated Vehicles", "start_char_pos": 1687, "end_char_pos": 1687}, {"type": "A", "before": null, "after": "\u00b7 Ropes", "start_char_pos": 1688, "end_char_pos": 1688}, {"type": "R", "before": "Schuster. pp. 88-89.", "after": "Tension", "start_char_pos": 1691, "end_char_pos": 1711}, {"type": "A", "before": null, "after": "\u00b7 Safety and defense", "start_char_pos": 1712, "end_char_pos": 1712}, {"type": "A", "before": null, "after": "\u00b7 Seafloor Engineering", "start_char_pos": 1713, "end_char_pos": 1713}, {"type": "A", "before": null, "after": "\u00b7 Sea Surface and Sub-Surface Support", "start_char_pos": 1714, "end_char_pos": 1714}, {"type": "A", "before": null, "after": "\u00b7 Underwater Imaging", "start_char_pos": 1715, "end_char_pos": 1715}, {"type": "A", "before": null, "after": "\u00b7 Unmanned Maritime Systems The MTS Headquarters Staff supports all the activities conducted by the Society members.", "start_char_pos": 1716, "end_char_pos": 1716}, {"type": "A", "before": null, "after": "Conferences MTS and its members organize a number of conferences, meetings, and workshops around the world including:", "start_char_pos": 1717, "end_char_pos": 1717}, {"type": "A", "before": null, "after": "OCEANS \u2013 our premier conference, co-hosted by IEEE-OES, occurs twice a year in various locations, bringing together the leading innovators, analysts, and producers of marine technology, research, and education. Underwater Intervention \u2013 led by the MTS ROV committee, co-hosted by ADCI, draws industry leaders from across the country and around the globe for networking, thought sharing and relationship building. Buoy Workshop - MTS Buoy Technology Committee leads this opportunity to engage people working in buoy technology to share the latest methods and technology. Dynamic Positioning Conference - The MTS Dynamic Positioning Committee leads this professional symposium covering the latest dynamic positioning developments and technology. TechSurges \u2013 Conducted by MTS members and partner organizations all over the world, TechSurges are small workshops to address \u201chot topics\u201d in the marine technology community. OTC \u2013 MTS is a partner in the Offshore Technology Conference (OTC) where for over 50 years, energy professionals have been exchanging ideas and advancing scientific knowledge.", "start_char_pos": 1718, "end_char_pos": 1718}, {"type": "A", "before": null, "after": "Awards MTS annually recognizes the outstanding accomplishments of the marine technology community the MTS awards program, conducted annually during an OCEANS conference. By their commitment to their profession, advancing marine technologies, innovation in application of marine technologies, and efforts to further the Society's mission, MTS award winners exemplify the best in the field.", "start_char_pos": 1719, "end_char_pos": 1719}, {"type": "A", "before": null, "after": "Current awards include:", "start_char_pos": 1720, "end_char_pos": 1720}, {"type": "A", "before": null, "after": "MTS Fellow Compass Distinguished Achievement Award Compass International Award Compass Industrial Award Captain Don Walsh Award for Ocean Exploration Lockheed Martin Award for Ocean Science and Engineering Ocean News and Technology Young Professional Award MTS Outstanding Service Award MTS Outstanding Section Award MTS Outstanding Committee Award MTS Outstanding Student Section Award John P. Craven Mentor Award Walter Munk Scholar Award and Commemorative Lecture", "start_char_pos": 1721, "end_char_pos": 1721}, {"type": "A", "before": null, "after": "Publications", "start_char_pos": 1722, "end_char_pos": 1722}, {"type": "A", "before": null, "after": "Marine Technology Society Journal is the flagship publication of the Marine Technology Society. It publishes the highest caliber, peer-reviewed papers six times a year on subjects of interest to the society: marine technology, ocean science, marine policy, and education. Currents is an eNewsletter focused on society-wide and industry news and events, business announcements and information, scientific briefs and articles, and member news. Eddies is an eNewsletter focused on emerging marine technologies as well as scientific and industry advances and accomplishments.", "start_char_pos": 1723, "end_char_pos": 1723}, {"type": "A", "before": null, "after": "Scholarships In addition to programs supporting student interest and persistence in the field of marine technology,", "start_char_pos": 1724, "end_char_pos": 1724}, {"type": "A", "before": null, "after": "each year MTS awards significant scholarship funding to college graduate, undergraduate, and senior high school students who have been accepted into full-time marine-related programs (with a focus on marine technology, marine engineering, or marine science)", "start_char_pos": 1725, "end_char_pos": 1725}], "sents_char_pos": [0, 186, 332, 416, 509, 647, 765, 825, 934, 1289, 1350, 1445, 1575, 1601, 1662]}
+{"doc_id": "28076584", "revision_depth": "4", "before_revision": "The Marine Technology Society (MTS) is a professional society established in 1963 with the goal of advancing the creation and application of marine technologies. With over 1, 500 members in 20 countries, MTS is the largest professional society devoted to fostering diverse uses of marine technologies within the research, industrial and military communities. The Society is a 501(c)( 3 ) non-profit organization headquartered in Washington, D.C., USA. The MTS is a leading source of information about marine technology through its peer-reviewed journal, the Marine Technology Society Journal and international conferences . History of MTS The Marine Technology Society was incorporated in June 1963 to give members of academia, government and industry a common forum for the exchange of information and ideas, and to \u201cmake real contributions in fostering progress in the marine sciences for the benefit of mankind. \u201d MTS members use various marine technologies to explore the ocean, seas and lakes, to measure and monitor the health of our waters and aquatic creatures, predict impacts of events from storms to tsunamis, to rescue and repair after events occur, to generate energy from renewable resources, to extract natural resources, to safeguard jurisdictions, to innovate new solutions, and to educate the next generation of the workforce. In 1969 the group held its first annual convention in Miami Beach. The convention was addressed by Spiro Agnew, who was then Vice President of the United States. In 1993 the laser line scan, a U.S. Navy imaging technique , made its debut at the society sponsored trade show in New Orleans.Broad, William J. (1997). The universe below: discovering the secrets of the deep sea. New York: Simon & Schuster. pp. 88-89. . Organization The MTS structure allows for leadership at the international, national and local levels, as well as in specialized subject areas. The Board of Directors is comprised of MTS members who are elected every three years by the membership. The Council provides advice to the Board of Directors on the technical, business and financial affairs of the society. The Council consists of the nationally elected Board of Directors, locally elected Section chairs and those Professional Committee chairs who request a seat on the Council, and two student members. MTS Past Presidents include:Rear Adm. E. C. Stephan 1964 - 66James A. Rickard 1977 - 78Wayne Ingram 1997 - 98Donna Kocak 2017 - 18James H. Wakelin, Jr. 1966 - 68William J. Hargis, Jr. 1978 - 80Norman Estabrook 1999 - 00Rick Spinrad 2019 - 20Paul M. Fye 1968 - 69Arthur E. Maxwell 1980 - 82Andrew M. Clark 2001 - 02Zdenka Willis 2020 - 22Elmer P. Wheaton 1969 - 70Gilbert L. Maton 1983 - 84Ted Brockett 2003 - 04Donald L. McKernan 1970 - 71John E. Flipse 1985 - 86Jerry Streeter 2005 - 06John P. Craven 1971 - 72Ronald L. Geer 1987 - 88Bruce C. Gilman 2007 - 08William E. Shoupp 1972 - 74Richard M. Shamp 1989 - 90Elizabeth Corbin 2009 - 10Robert B. Abel 1974 - 75Rear Adm. J. Brad Mooney 1991 - 92Jerry Boatman 2011 - 12John C.Calhoun, Jr. 1975 - 76Robert C. Spindel 1993 - 94Drew Michel 2013 - 14Phillip Eisenberg 1976 - 77Edward Clausner 1995 - 96Ray Toll 2015 - 16 MTS Sections are located across the United States including Florida, Great Lakes, Gulf Coast, Hampton Roads, Hawaii, Houston, Monterey, New England, Oregon, Puget Sound, San Diego and Washington, D.C. and international locations including India, Japan, Korea, Newfoundland-Labrador, Norway and Singapore. MTS Student Sections are hosted at colleges and universities all over the world.%DIFDELCMD < %DIFDELCMD < %%% The MTS is divided into Technical Committees that provides another structure for managing volunteers and developing leaders. These Technical Committees also reflect the breadth of marine technologies including:Bio-Inspired Marine Systems, Buoy Technology, Cables Connectors, Dynamic Positioning, Manned Underwater Vehicles, Marine Geodetic Information Systems, Ocean Observing Systems, Marine engineering, Marine ecosystem protection and remediation, Naval architecture, Navigation, Oceanographic Instrumentation, Remote Sensing, Remotely Operated Vehicles, Ropes%DIFDELCMD < & %%% Tension, Safety and defense, Seafloor Engineering , Sea Surface and Sub-Surface Support, Underwater Imaging, and Unmanned Maritime Systems. Conferences MTS and its members organize a number of conferences, meetings, and workshops around the world including:%DIFDELCMD < %DIFDELCMD < %%% OCEANS \u2013 co-hosted by IEEE-OES, occurs twice a year in various locations, bringing together the leading innovators, analysts, and producers of marine technology, research, and education. Underwater Intervention \u2013 led by the MTS ROV committee, co-hosted by ADCI, draws industry leaders from across the country and around the globe for networking, thought sharing and relationship building. Buoy Workshop - MTS Buoy Technology Committee leads this opportunity to engage people working in buoy technology to share the latest methods and technology. Dynamic Positioning Conference - The MTS Dynamic Positioning Committee leads this professional symposium covering the latest dynamic positioning developments and technology. TechSurges \u2013 Conducted by MTS members and partner organizations all over the world, TechSurges are small workshops to address \u201chot topics\u201d in the marine technology community. OTC \u2013 MTS is a partner in the Offshore Technology Conference (OTC) where for over 50 years, energy professionals have been exchanging ideas and advancing scientific knowledge. Awards MTS annually recognizes the outstanding accomplishments of the marine technology community. By their commitment to their profession, advancing marine technologies, innovation in application of marine technologies, and efforts to further the Society's mission, MTS award winners exemplify the best in the field. Current awards include:MTS Fellow Designation as a Marine Technology Society Fellow is one of the highest industry accolades. Since 1975, this title has been awarded to MTS members who\u2019ve made outstanding contributions to the advancement of the Society\u2019s objectives and who have distinguished accomplishments in their professional fields.Compass Distinguished Achievement AwardEstablished to stimulate the conception, design, development and application of new equipment and techniques in oceanographic exploration, research and survey, undersea defense, ocean transportation, fisheries, marine mining and minerals recovery, pollution control, desalination, and education leading to greater utilization of the knowledge and resources of the world\u2019s oceans, and to acknowledge and honor those individuals making significant and outstanding contributions in these areas of oceanography and marine technology.Compass International AwardAcknowledges and honors those industrial firms making significant and outstanding contributions in like areas of oceanography and marine technology. The selection of an awardee is based on the total contribution of a company or major division within a company to the field of oceanography, marine technology and undersea defense. Typical activities which are considered for this award include development of a specific hardware package or system for use in the field of oceanography, operation of a specific survey or ocean research project at sea or onshore, administration of a government research project, manufacturing and marketing of specific equipment, introduction of new concepts and techniques, and demonstration of outstanding leadership in the field.Compass Industrial AwardAcknowledges and honors those individuals, companies or organizations throughout the world who have made significant and outstanding contributions in oceanography and marine technology.Captain Don Walsh Award for Ocean ExplorationAwarded jointly by the Marine Technology Society and the Society for Underwater Technology, this awards recognizes outstanding, sustained, international contribution to the development, application, and propagation of marine technology toward the advancement of ocean exploration.Lockheed Martin Award for Ocean Science and Engineering Lockheed Martin sponsored award that is presented to an individual who has demonstrated the highest degree of technical accomplishment in the field of marine science, engineering or technology.Ocean News and Technology Young Professional AwardPresented to an individual 35 years old or younger who is an MTS member in good standing who has shown leadership in MTS and who works in a professional capacity in management, engineering or research and development in a marine technology field.MTS Outstanding Service AwardPresented to an MTS member or member organization in recognition of outstanding accomplishments in fulfilling the objectives and missions of the Marine Technology Society.MTS Outstanding Section AwardPresented to an MTS Section in recognition of activities conducted in advancement of the objectives of the society.MTS Outstanding Committee AwardPresented to an MTS Committee in recognition of activities conducted in advancement of the society\u2019s objectives.MTS Outstanding Student Section AwardPresented to any established MTS Student Section demonstrating superior performance in the advancement of the society\u2019s objectives. John P. Craven Mentor AwardRecognizing the long and impactful career of John Pi\u00f1a Craven, the MTS John P. Craven Mentor Award will be presented to an individual who has demonstrated outstanding and sustained service to the field of marine technology through mentoring.Walter Munk Scholar Award and Commemorative LectureOceanographer Walter Munk was renowned for his significant contributions to the study of oceanography, including: pioneering work on predicting wave and surf conditions, underwater sound propagation, internal waves, and development of acoustic tomography. The Walter Munk Scholar Award is jointly sponsored and awarded by the Walter Munk Foundation for the Oceans (WMFO) and the Marine Technology Society (MTS). The Award is presented annually to a scholar currently enrolled in an undergraduate, graduate or postdoctoral program. It recognizes their outstanding contributions in areas fostered by the sponsoring organizations. Established in 2019, the Award honors Walter Munk\u2019s legacy of daring exploration and discovery through ocean scientific and technology research, ocean education or ocean conservation.%DIFDELCMD < %DIFDELCMD < %%% Publications Marine Technology Society Journal is the flagship publication of the Marine Technology Society. It publishes the highest caliber, peer-reviewed papers six times a year on subjects of interest to the society: marine technology, ocean science, marine policy, and education. The journal has a current ISI Impact Factor of 1.070 MTS publishes two newsletters, 1) Currents focused on society-wide and industry news and events, business announcements and information, scientific briefs and articles, and member news; and 2) Eddies focused on emerging marine technologies as well as scientific and industry advances and accomplishments.%DIFDELCMD < %DIFDELCMD < %%% Scholarships In addition to programs supporting student interest and persistence in the field of marine technology, each year MTS awards significant scholarship funding to college graduate, undergraduate, and senior high school students who have been accepted into full-time marine-related programs (with a focus on marine technology, marine engineering, or marine science). References Further Reading External links Category:Marine engineering organizations Category: Oceanography Category:Technology organizations Category:Non-profit organizations based in Washington, D.C", "after_revision": "The Marine Technology Society (MTS) is a professional society that serves the international community of approximately 3 ,800 ocean engineers, technologists, policy-makers, and educators. The goal of the society, which was founded in 1963, is to promote awareness, understanding, advancement and application of marine technology. The association is based in Washington, District of Columbia, United States. Former executive directors include Martin Finnerty, Judith T. Krauthamer and Richard Lawson . The society consists of 29 technical disciplines and presently has 17 sections, including overseas sections in Japan, Korea and Norway. In addition, MTS has 23 student sections at colleges and universities with related fields of study. The flagship publication of the society is the MTS Journal. The journal is published 6 times annually and primarily features themed issues consisting of invited papers. The journal has a current ISI Impact Factor of .763 MTS sponsors several conferences of note, including the OCEANS Conference (co-sponsosed with IEEE/OES), Underwater Intervention (co-sponsored with ADCI), Dynamic Positioning Conference, biennial Buoy Workshop (co-sponsored with the Office of Naval Research), and the hot-topic workshop series TechSurge. In 1969 the group held its annual convention in Miami Beach. The convention was addressed by Spiro Agnew, who was then Vice President of the United States. In 1993 the laser line scan, a U.S. Navy photography secret , made its debut at the society sponsored trade show in New Orleans.Broad, William J. (1997). The universe below: discovering the secrets of the deep sea. New York: Simon & Schuster. pp. 88-89. . References %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < & %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% External links Category:Engineering societies based in the United States Category:Marine engineering organizations Category: Organizations based in Maryland Category:Oceanogra", "edit_actions": [{"type": "R", "before": "established in 1963 with the goal of advancing the creation and application of marine technologies. With over 1, 500 members in 20 countries, MTS is the largest professional society devoted to fostering diverse uses of marine technologies within the research, industrial and military communities. The Society is a 501(c)(", "after": "that serves the international community of approximately", "start_char_pos": 62, "end_char_pos": 383}, {"type": "R", "before": ") non-profit organization headquartered", "after": ",800 ocean engineers, technologists, policy-makers, and educators. The goal of the society, which was founded in 1963, is to promote awareness, understanding, advancement and application of marine technology. The association is based", "start_char_pos": 386, "end_char_pos": 425}, {"type": "R", "before": "D.C., USA. The MTS is a leading source of information about marine technology through its peer-reviewed journal, the Marine Technology Society Journal and international conferences", "after": "District of Columbia, United States. Former executive directors include Martin Finnerty, Judith T. Krauthamer and Richard Lawson", "start_char_pos": 441, "end_char_pos": 621}, {"type": "R", "before": "History of MTS The Marine Technology Society was incorporated in June 1963 to give members of academia, government and industry a common forum for the exchange of information and ideas,", "after": "The society consists of 29 technical disciplines and presently has 17 sections, including overseas sections in Japan, Korea and Norway. In addition, MTS has 23 student sections at colleges and universities with related fields of study.", "start_char_pos": 624, "end_char_pos": 809}, {"type": "A", "before": null, "after": "The flagship publication of the society is the MTS Journal. The journal is published 6 times annually and primarily features themed issues consisting of invited papers. The journal has a current ISI Impact Factor of .763", "start_char_pos": 810, "end_char_pos": 810}, {"type": "A", "before": null, "after": "MTS sponsors several conferences of note, including the OCEANS Conference (co-sponsosed with IEEE/OES), Underwater Intervention (co-sponsored with ADCI), Dynamic Positioning Conference, biennial Buoy Workshop (co-sponsored with the Office of Naval Research),", "start_char_pos": 811, "end_char_pos": 811}, {"type": "R", "before": "to \u201cmake real contributions in fostering progress in the marine sciences for the benefit of mankind. \u201d MTS members use various marine technologies to explore the ocean, seas and lakes, to measure and monitor the health of our waters and aquatic creatures, predict impacts of events from storms to tsunamis, to rescue and repair after events occur, to generate energy from renewable resources, to extract natural resources, to safeguard jurisdictions, to innovate new solutions, and to educate the next generation of the workforce.", "after": "the hot-topic workshop series TechSurge.", "start_char_pos": 816, "end_char_pos": 1346}, {"type": "D", "before": "first", "after": null, "start_char_pos": 1374, "end_char_pos": 1379}, {"type": "R", "before": "imaging technique", "after": "photography secret", "start_char_pos": 1550, "end_char_pos": 1567}, {"type": "R", "before": "Organization The MTS structure allows for leadership at the international, national and local levels, as well as in specialized subject areas. The Board of Directors is comprised of MTS members who are elected every three years by the membership. The Council provides advice to the Board of Directors on the technical, business and financial affairs of the society. The Council consists of the nationally elected Board of Directors, locally elected Section chairs and those Professional Committee chairs who request a seat on the Council, and two student members. MTS Past Presidents include:Rear Adm. E. C. Stephan 1964 - 66James A. Rickard 1977 - 78Wayne Ingram 1997 - 98Donna Kocak 2017 - 18James H. Wakelin, Jr. 1966 - 68William J. Hargis, Jr. 1978 - 80Norman Estabrook 1999 - 00Rick Spinrad 2019 - 20Paul M. Fye 1968 - 69Arthur E. Maxwell 1980 - 82Andrew M. Clark 2001 - 02Zdenka Willis 2020 - 22Elmer P. Wheaton 1969 - 70Gilbert L. Maton 1983 - 84Ted Brockett 2003 - 04Donald L. McKernan 1970 - 71John E. Flipse 1985 - 86Jerry Streeter 2005 - 06John P. Craven 1971 - 72Ronald L. Geer 1987 - 88Bruce C. Gilman 2007 - 08William E. Shoupp 1972 - 74Richard M. Shamp 1989 - 90Elizabeth Corbin 2009 - 10Robert B. Abel 1974 - 75Rear Adm. J. Brad Mooney 1991 - 92Jerry Boatman 2011 - 12John C.Calhoun, Jr. 1975 - 76Robert C. Spindel 1993 - 94Drew Michel 2013 - 14Phillip Eisenberg 1976 - 77Edward Clausner 1995 - 96Ray Toll 2015 - 16", "after": "References", "start_char_pos": 1764, "end_char_pos": 3195}, {"type": "D", "before": "MTS Sections are located across the United States including Florida, Great Lakes, Gulf Coast, Hampton Roads, Hawaii, Houston, Monterey, New England, Oregon, Puget Sound, San Diego and Washington, D.C. and international locations including India, Japan, Korea, Newfoundland-Labrador, Norway and Singapore.", "after": null, "start_char_pos": 3196, "end_char_pos": 3500}, {"type": "D", "before": "MTS Student Sections are hosted at colleges and universities all over the world.", "after": null, "start_char_pos": 3501, "end_char_pos": 3581}, {"type": "D", "before": "The MTS is divided into Technical Committees that provides another structure for managing volunteers and developing leaders. These Technical Committees also reflect the breadth of marine technologies including:Bio-Inspired Marine Systems, Buoy Technology, Cables", "after": null, "start_char_pos": 3611, "end_char_pos": 3873}, {"type": "D", "before": "Connectors, Dynamic Positioning, Manned Underwater Vehicles, Marine Geodetic Information Systems, Ocean Observing Systems, Marine engineering, Marine ecosystem protection and remediation, Naval architecture, Navigation, Oceanographic Instrumentation, Remote Sensing, Remotely Operated Vehicles, Ropes", "after": null, "start_char_pos": 3874, "end_char_pos": 4174}, {"type": "D", "before": "Tension, Safety and defense, Seafloor Engineering , Sea Surface and Sub-Surface Support, Underwater Imaging, and Unmanned Maritime Systems.", "after": null, "start_char_pos": 4193, "end_char_pos": 4332}, {"type": "D", "before": "Conferences MTS and its members organize a number of conferences, meetings, and workshops around the world including:", "after": null, "start_char_pos": 4333, "end_char_pos": 4450}, {"type": "D", "before": "OCEANS \u2013 co-hosted by IEEE-OES, occurs twice a year in various locations, bringing together the leading innovators, analysts, and producers of marine technology, research, and education. Underwater Intervention \u2013 led by the MTS ROV committee, co-hosted by ADCI, draws industry leaders from across the country and around the globe for networking, thought sharing and relationship building. Buoy Workshop - MTS Buoy Technology Committee leads this opportunity to engage people working in buoy technology to share the latest methods and technology. Dynamic Positioning Conference - The MTS Dynamic Positioning Committee leads this professional symposium covering the latest dynamic positioning developments and technology. TechSurges \u2013 Conducted by MTS members and partner organizations all over the world, TechSurges are small workshops to address \u201chot topics\u201d in the marine technology community. OTC \u2013 MTS is a partner in the Offshore Technology Conference (OTC) where for over 50 years, energy professionals have been exchanging ideas and advancing scientific knowledge.", "after": null, "start_char_pos": 4480, "end_char_pos": 5550}, {"type": "D", "before": "Awards MTS annually recognizes the outstanding accomplishments of the marine technology community. By their commitment to their profession, advancing marine technologies, innovation in application of marine technologies, and efforts to further the Society's mission, MTS award winners exemplify the best in the field. Current awards include:MTS Fellow Designation as a Marine Technology Society Fellow is one of the highest industry accolades. Since 1975, this title has been awarded to MTS members who\u2019ve made outstanding contributions to the advancement of the Society\u2019s objectives and who have distinguished accomplishments in their professional fields.Compass Distinguished Achievement AwardEstablished to stimulate the conception, design, development and application of new equipment and techniques in oceanographic exploration, research and survey, undersea defense, ocean transportation, fisheries, marine mining and minerals recovery, pollution control, desalination, and education leading to greater utilization of the knowledge and resources of the world\u2019s oceans, and to acknowledge and honor those individuals making significant and outstanding contributions in these areas of oceanography and marine technology.Compass International AwardAcknowledges and honors those industrial firms making significant and outstanding contributions in like areas of oceanography and marine technology. The selection of an awardee is based on the total contribution of a company or major division within a company to the field of oceanography, marine technology and undersea defense. Typical activities which are considered for this award include development of a specific hardware package or system for use in the field of oceanography, operation of a specific survey or ocean research project at sea or onshore, administration of a government research project, manufacturing and marketing of specific equipment, introduction of new concepts and techniques, and demonstration of outstanding leadership in the field.Compass Industrial AwardAcknowledges and honors those individuals, companies or organizations throughout the world who have made significant and outstanding contributions in oceanography and marine technology.Captain Don Walsh Award for Ocean ExplorationAwarded jointly by the Marine Technology Society and the Society for Underwater Technology, this awards recognizes outstanding, sustained, international contribution to the development, application, and propagation of marine technology toward the advancement of ocean exploration.Lockheed Martin Award for Ocean Science and Engineering Lockheed Martin sponsored award that is presented to an individual who has demonstrated the highest degree of technical accomplishment in the field of marine science, engineering or technology.Ocean News and Technology Young Professional AwardPresented to an individual 35 years old or younger who is an MTS member in good standing who has shown leadership in MTS and who works in a professional capacity in management, engineering or research and development in a marine technology field.MTS Outstanding Service AwardPresented to an MTS member or member organization in recognition of outstanding accomplishments in fulfilling the objectives and missions of the Marine Technology Society.MTS Outstanding Section AwardPresented to an MTS Section in recognition of activities conducted in advancement of the objectives of the society.MTS Outstanding Committee AwardPresented to an MTS Committee in recognition of activities conducted in advancement of the society\u2019s objectives.MTS Outstanding Student Section AwardPresented to any established MTS Student Section demonstrating superior performance in the advancement of the society\u2019s objectives. John P. Craven Mentor AwardRecognizing the long and impactful career of John Pi\u00f1a Craven, the MTS John P. Craven Mentor Award will be presented to an individual who has demonstrated outstanding and sustained service to the field of marine technology through mentoring.Walter Munk Scholar Award and Commemorative LectureOceanographer Walter Munk was renowned for his significant contributions to the study of oceanography, including: pioneering work on predicting wave and surf conditions, underwater sound propagation, internal waves, and development of acoustic tomography. The Walter Munk Scholar Award is jointly sponsored and awarded by the Walter Munk Foundation for the Oceans (WMFO) and the Marine Technology Society (MTS). The Award is presented annually to a scholar currently enrolled in an undergraduate, graduate or postdoctoral program. It recognizes their outstanding contributions in areas fostered by the sponsoring organizations. Established in 2019, the Award honors Walter Munk\u2019s legacy of daring exploration and discovery through ocean scientific and technology research, ocean education or ocean conservation.", "after": null, "start_char_pos": 5551, "end_char_pos": 10429}, {"type": "D", "before": "Publications Marine Technology Society Journal is the flagship publication of the Marine Technology Society. It publishes the highest caliber, peer-reviewed papers six times a year on subjects of interest to the society: marine technology, ocean science, marine policy, and education. The journal has a current ISI Impact Factor of 1.070", "after": null, "start_char_pos": 10459, "end_char_pos": 10796}, {"type": "D", "before": "MTS publishes two newsletters, 1) Currents focused on society-wide and industry news and events, business announcements and information, scientific briefs and articles, and member news; and 2) Eddies focused on emerging marine technologies as well as scientific and industry advances and accomplishments.", "after": null, "start_char_pos": 10797, "end_char_pos": 11101}, {"type": "D", "before": "Scholarships In addition to programs supporting student interest and persistence in the field of marine technology, each year MTS awards significant scholarship funding to college graduate, undergraduate, and senior high school students who have been accepted into full-time marine-related programs (with a focus on marine technology, marine engineering, or marine science). References", "after": null, "start_char_pos": 11131, "end_char_pos": 11516}, {"type": "D", "before": "Further Reading", "after": null, "start_char_pos": 11517, "end_char_pos": 11532}, {"type": "A", "before": null, "after": "Category:Engineering societies based in the United States", "start_char_pos": 11548, "end_char_pos": 11548}, {"type": "D", "before": "Oceanography", "after": null, "start_char_pos": 11601, "end_char_pos": 11613}, {"type": "R", "before": "Category:Technology organizations Category:Non-profit organizations based in Washington, D.C", "after": "Organizations based in Maryland Category:Oceanogra", "start_char_pos": 11614, "end_char_pos": 11706}], "sents_char_pos": [0, 161, 358, 623, 916, 1346, 1413, 1508, 1636, 1661, 1722, 1906, 2010, 2129, 2327, 2365, 2576, 2673, 2976, 3000, 3500, 3581, 3735, 3821, 3849, 4332, 4666, 4868, 5025, 5199, 5374, 5550, 5649, 5868, 5994, 6207, 6286, 6775, 6950, 7131, 7564, 7773, 8098, 8347, 8643, 8843, 8987, 9130, 9298, 9567, 9873, 10029, 10148, 10245, 10429, 10567, 10743, 10982, 11101, 11505]}
+{"doc_id": "28347393", "revision_depth": "2", "before_revision": "This group of mixed ancestry were usually called \u201cMosquitos Sambu\u201d by the Spanish, while the others living more on the southern (Nicaraguan) region have been dubbed Tawira Miskito (Straight-haired Miskito) by modern scholars such as Karl Offen. Over the course of the eighteenth century, the Miskitu became dominant, and the office of king was in Zambo (\u00bf?) hands from the first decade of the century onward.Karl Offen, \"The Sambu and Tawira Miskitu: The Colonial Origins of Intra-Miskitu Differentiation in Eastern Nicaragua and Honduras,\" Ethnohistory 49/2 (2002): 337-40. The Miskito Sambu were aggressive, an early report of 1699 has them waging near constant war with their neighboring indigenous groups.W. M.. \"The Mosqueto Indian and his Golden River,\" in Ansham Churchill, A Collection of Voyages and Travels (London, 1732), vol. 6, p.288 The Spanish reported many raids directed against their holdings beginning in 1699 and continuing through most of the 18th century. The raids often carried off slaves, for use at home or for sale to English traders from Jamaica, who sent them to the island to work. English also supplied the Miskito Sambu with muskets and military training to assist in these raids. Raiding reached as far south as Costa Rica and as far north as Yucat\u00e1n.Mary Helms, \"Miskito Slaving and Culture Contact: Ethnicity and Opportunity in an Expanding Population,\" Journal of Anthropological Research 39/2 (1983): 179-97 According to the French buccaneer Raveneau de Lussan, who visited in 1688, the Zambos settled largely in the valley of the Wanks River (modern Rio Coco), and the report of the buccaneer M. W. in 1699, their settlements were concentrated in that river, and somewhat to the west along the coast of modern-day Honduras almost as far as Trujillo. By the early eighteenth century, the leader of the Sambu group had the Miskito title \"General .\" At some point in the early eighteenth century, however, the Sambus took over the title of King, and the palace that was occupied by a Miskito king, Jeremy, in 1699 , was now occupied by a \"mulatto , \" also named Jeremy in 1711. From that point on, Sambus held the title of king . The emergence of the Miskitu gradually split the larger Miskitu group in two; although the Sambu (\u00bf?) group was generally dominant and the most aggressive. Sambus (\u00bf?) held the northern titles of King and General, while the original Miskitos ( sometimes called Tawira) held the titles of Governor and Admiral.", "after_revision": "This group of mixed ancestry were usually called Mosquitos Zambos by the Spanish, while the others living more on the southern region (in modern Nicaragua) have been dubbed Tawira Miskito (Straight-haired Miskito) by modern scholars such as Karl Offen. Over the course of the eighteenth century, the Miskito Sambu became dominant, and the office of king was in Sambu hands from the first decade of the century onward.Karl Offen, \"The Sambu and Tawira Miskitu: The Colonial Origins of Intra-Miskitu Differentiation in Eastern Nicaragua and Honduras,\" Ethnohistory 49/2 (2002): 337-40. The Miskito Sambu were aggressive, an early report of 1699 has them waging near constant war with their neighboring indigenous groups.W. M.. \"The Mosqueto Indian and his Golden River,\" in Ansham Churchill, A Collection of Voyages and Travels (London, 1732), vol. 6, p.288 The Spanish reported many raids directed against their holdings beginning in 1699 and continuing through most of the 18th century. The raids often carried off slaves, for use at home or for sale to English traders from Jamaica, who sent them to the island to work. The English also supplied the Miskito Sambu with muskets and military training to assist in these raids. Raiding reached as far south as modern Costa Rica and as far north as the Yucat\u00e1n.Mary Helms, \"Miskito Slaving and Culture Contact: Ethnicity and Opportunity in an Expanding Population,\" Journal of Anthropological Research 39/2 (1983): 179-97 According to the French buccaneer Raveneau de Lussan, who visited in 1688, the Sambu settled largely in the valley of the Wanks River (modern Rio Coco), and the report of the buccaneer M. W. in 1699, their settlements were concentrated in that river, and somewhat to the west along the coast of modern-day Honduras almost as far as Trujillo. By the early eighteenth century, the leader of the Sambu group had the Miskito title General in the chieftaincy system of the Mosquito Coast. At some point in the early eighteenth century, however, the Sambu took over the premier title of King, and the palace that was occupied by a Tawira king, Jeremy, in 1699 was now occupied by a \"mulatto \" , also named Jeremy , in 1711. From that point on, the Sambu held the kingship . The emergence of the Miskito Sambu gradually split the larger Miskito people in two; be that as it may, the Sambu group was generally dominant and the most aggressive. In what was essentially a power sharing system, Sambus held the northern titles of King and General, while the original Miskitos ( otherwise called Tawira) held the titles of Governor and Admiral.", "edit_actions": [{"type": "R", "before": "\u201cMosquitos Sambu\u201d", "after": "Mosquitos Zambos", "start_char_pos": 49, "end_char_pos": 66}, {"type": "R", "before": "(Nicaraguan) region", "after": "region (in modern Nicaragua)", "start_char_pos": 128, "end_char_pos": 147}, {"type": "R", "before": "Miskitu", "after": "Miskito Sambu", "start_char_pos": 292, "end_char_pos": 299}, {"type": "R", "before": "Zambo (\u00bf?)", "after": "Sambu", "start_char_pos": 347, "end_char_pos": 357}, {"type": "A", "before": null, "after": "The", "start_char_pos": 1112, "end_char_pos": 1112}, {"type": "A", "before": null, "after": "modern", "start_char_pos": 1246, "end_char_pos": 1246}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1278, "end_char_pos": 1278}, {"type": "R", "before": "Zambos", "after": "Sambu", "start_char_pos": 1527, "end_char_pos": 1533}, {"type": "R", "before": "\"General .\"", "after": "General in the chieftaincy system of the Mosquito Coast.", "start_char_pos": 1876, "end_char_pos": 1887}, {"type": "R", "before": "Sambus", "after": "Sambu", "start_char_pos": 1948, "end_char_pos": 1954}, {"type": "A", "before": null, "after": "premier", "start_char_pos": 1969, "end_char_pos": 1969}, {"type": "R", "before": "Miskito", "after": "Tawira", "start_char_pos": 2023, "end_char_pos": 2030}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2053, "end_char_pos": 2054}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2086, "end_char_pos": 2087}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2090, "end_char_pos": 2090}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2109, "end_char_pos": 2109}, {"type": "R", "before": "Sambus held the title of king", "after": "the Sambu held the kingship", "start_char_pos": 2139, "end_char_pos": 2168}, {"type": "R", "before": "Miskitu", "after": "Miskito Sambu", "start_char_pos": 2192, "end_char_pos": 2199}, {"type": "R", "before": "Miskitu group", "after": "Miskito people", "start_char_pos": 2227, "end_char_pos": 2240}, {"type": "R", "before": "although the Sambu (\u00bf?)", "after": "be that as it may, the Sambu", "start_char_pos": 2249, "end_char_pos": 2272}, {"type": "R", "before": "Sambus (\u00bf?)", "after": "In what was essentially a power sharing system, Sambus", "start_char_pos": 2327, "end_char_pos": 2338}, {"type": "R", "before": "sometimes", "after": "otherwise", "start_char_pos": 2415, "end_char_pos": 2424}], "sents_char_pos": [0, 244, 408, 574, 709, 977, 1111, 1213, 1287, 1336, 1790, 2118, 2170, 2248, 2326]}
+{"doc_id": "28462755", "revision_depth": "1", "before_revision": "Jos\u00e9 N\u00fa\u00f1ez de C\u00e1ceres y Albor (March 14, 1772, in Santo Domingo \u2013 September 11, 1846, in Ciudad Victoria) was a Dominican politician and writer. He is known for being the leader of the independence movement against Spain in 1821 and as the only president of the short-lived Republic of Spanish Haiti, which lasted from December 1, 1821 to February 9, 1822. This period is also known as the ephemeral independence because it quickly ended two months later with the Unification of Hispaniola under the Haitian government. Shortly before these events , while Spain exercised a perfunctory rule over the east side of Hispaniola, N\u00fa\u00f1ez de C\u00e1ceres pioneered the use of literature as a weapon for social protest and anti-colonial politics. He was also the first Dominican fabulist, and one of the first criollo storytellers in Spanish America. Many of his works appeared in his own satirical newspaper, El Duende, the second newspaper created in Santo Domingo. Early years Jos\u00e9 N\u00fa\u00f1ez de C\u00e1ceres Albor was born on March 14, 1772 , in Santo Domingo. He was the son of 2nd Lt. Francisco N\u00fa\u00f1ez de C\u00e1ceres and Mar\u00eda Albor Polanco. His mother died a few days after his birth. He had two older brothers: Pedro and Ger\u00f3nimo. He was raised by his aunt Mar\u00eda N\u00fa\u00f1ez de C\u00e1ceres. Since his childhood, N\u00fa\u00f1ez de C\u00e1ceres showed a great interest in education, but his father, a farmer, wanted his son to dedicate himself to working the field. N\u00fa\u00f1ez de C\u00e1ceres was raised in a very poor family and he had to study using the books of his classmates. He earned some money by helping his aunt sell doves that an acquaintance hunted. In 1795, despite early obstacles, Nu\u00f1ez de C\u00e1ceres finished his studies in law at age 23. He then defended the cases of notable people , and became a professor at the University of Santo Tom\u00e1s de Aquino. Political career In 1799, after the transfer of the colony of Santo Domingo to France under the Treaty of Basel, the Audiencia Real (which had been located in Santo Domingo until that time) was moved to Puerto Pr\u00edncipe (now Camag\u00fcey), Cuba. Thus, Nu\u00f1ez and his family had to emigrate . It was there, in August 1800, N\u00fa\u00f1ez de C\u00e1ceres got the office of Rapporteur, although he was able to continue practising law. N\u00fa\u00f1ez de C\u00e1ceres was also a consultant of the government of Cuba. In late 1808, after Spain recovered Santo Domingo, he returned to his homeland, where he paid tribute to the winners of the Battle of Palo Hincado with his famous song \"The winners of Battle of Palo Hincado\". Between June 29, 1810, and May 7, 1813, he was appointed by his former boss, Juan S\u00e1nchez Ram\u00edrez as Lieutenant Governor, General Counsel and Government Service Judge Advocate General's Corps of the province of Santo Domingo. In 1812, in an attempt to improve the feeble economy of Santo Domingo, N\u00fa\u00f1ez de C\u00e1ceres ordered the circulation of paper money and adopted emergency measures.. Consulted on September 12, 2010, at 14:30. N\u00fa\u00f1ez de C\u00e1ceres had problems with Lieutenant Jos\u00e9 \u00c1lvarez de Toledo, who had been appointed by the Spanish government as Junta alternate deputy to the Cortes of C\u00e1diz. His revolutionary ideas were denounced by N\u00fa\u00f1ez de C\u00e1ceres, President of the Cortes, based on two confidential letters that \u00c1lvarez de Toledo had sent to S\u00e1nchez Ram\u00edrez . The Cortes decided to prosecute \u00c1lvarez de Toledo, but he was not found. In 1812, N\u00fa\u00f1ez de Caceres started shifting his views on the colonial status of the territories in Spanish America.. Consulted on 12 September 8, 2010. His ideology made him an enemy of authorities in Santo Domingo, especially S\u00e1nchez Ram\u00edrez. After his death, N\u00fa\u00f1ez de C\u00e1ceres tried to occupy a vacant position as a member of the Royal Audiencia of Quito, but the majority of members of the court rejected Nu\u00f1ez's request. This drove him to lead the independence movement to turn the colony into a protectorate of Bol\u00edvar's Gran Colombia. The struggle for independence 250px|Flag of Spanish Hait\u00ed N\u00fa\u00f1ez de C\u00e1ceres wanted independence from Spain and asked for the annexation of his country to Gran Colombia. He had tried to wean his country from Spain by a coup in the spring of 1821, but failed due to measures taken by Col. Sebasti\u00e1n Kindel\u00e1n y O'Regan and because the conspirators did not receive a response from Sim\u00f3n Bolivar in time. Despite the steps taken and denunciation of the plot, the governor did not mind and allowed N\u00fa\u00f1ez de C\u00e1ceres to prosecute captain Manuel Martinez for the crime of libel. Pascual Real, the new Spanish governor, who arrived in May , not only gave credit to the whistleblowers who confirmed the veracity of the conspiracy by N\u00fa\u00f1ez de C\u00e1ceres, but very soon learned the name of his followers. As Real had no troops, he devoted himself to observing the behaviour of the suspects and to winning the confidence of key military leaders. A Haitianophile group , familiar with the plans of N\u00fa\u00f1ez de C\u00e1ceres and its people, explained to Boyer the political situation of the Dominican Republic, with the purpose of annexing the former colony. On November 8, Major Andrew Amarante proclaimed the start of the annexation of the Republic in Beler and seven days later the situation spread to Dajab\u00f3n and Monte Cristi. On the same day , came the announcement of the Constitutive Act of Independence. The act contained rules that would govern the general functions of the new government and secured their determination to conclude an agreement with Gran Colombia to establish a Confederate state with it, without renouncing the sovereignty the country. The Separatist Movement started on November 30, 1821, and the next month, on Friday 30 December, troops of the battalion assaulted the fortress, enclosing the governor within its walls. At the dawn, the establishment of the Independent State of Spanish Haiti was announced. Immediately thereafter, they proceeded to the read the Dominican Declaration of Independence written by N\u00fa\u00f1ez de C\u00e1ceres, Manuel Carvajal, Juan Vicente Moscoso, Antonio Martinez Vald\u00e9s, L. Juan Nepomuceno de Arredondo, Juan Ruiz, Vicente Mancebo y Manuel Lopez de Umeres. N\u00fa\u00f1ez de C\u00e1ceres established a provisional government, of which he was the President, and provided a Constitution that enshrined slavery , even though it was considered unacceptable at the time. To avoid an invasion from neighbouring Haiti, N\u00fa\u00f1ez de C\u00e1ceres sent one of the most prominent members of his party, Antonio Mar\u00eda Pineda, to Venezuela to inform Simon Bol\u00edvar of the situation. The Liberator was absent from Caracas, and neither the vice president Francisco de Paula Santander or the commanding general of the city, General Jos\u00e9 Antonio P\u00e1ez, lent him the slightest attention. Haitian occupation Almost simultaneously with the proclamation of the Independent State of Spanish Haiti, a commission of three envoys sent by Jean-Pierre Boyer, President of Haiti, arrived in Santo Domingo. Haitian officials had to report the pronouncements of Pascual Real and observe the situation from Dajab\u00f3n and Monte Cristi. Aware of political change, Colonel Fremont, the Haitian head of the commission, informed N\u00fa\u00f1ez de C\u00e1ceres, the newly appointed chairman of the state, that President Boyer would support the new government. The intention of the Haitian state was to invade the eastern part in order to enforce the unity and indivisibility on the island. N\u00fa\u00f1ez de C\u00e1ceres did not find the support he sought in Colombia. On January 11, 1822, Boyer wrote a letter to N\u00fa\u00f1ez de C\u00e1ceres announcing his intention to visit the eastern part with an army, not as an invader, but as a peacemaker. Simulteaonsouly , he warned him that he would be able to avoid any obstacle . When N\u00fa\u00f1ez de C\u00e1ceres read that message, he realized that he fought in vain. The majority among the Dominican social and military elite preferred to ally with Haiti , and thus he had no other choice but to answer that military command, and the City agreed to be placed under the protection of Haitian law. N\u00fa\u00f1ez de C\u00e1ceres himself, seven days later, on Saturday, January 19, lowered the Colombian flag and replaced it with the Haitian flag, and on Saturday, February 9, 1822, he presented to President Boyer the keys to the city of Santo Domingo. Later years In April 1823, N\u00fa\u00f1ez de C\u00e1ceres emigrated with his family to Venezuela, where they settled in Maracaibo. In 1824, he worked as a printer in Caracas. Later, he founded several newspapers very critical of Gran Colombia: El Constitucional Caraque\u00f1o (1824-1825), El Cometa (1824-1826) and El Cometa Extraordinario (1826-1827). In addition, the last issues of El Venezolano were also written by him (1823-1824). He also joined the movement of La Cosiata, which rebelled against Gran Colombia. On May 5, 1826, when Caracas decided to take part in the revolution of Jos\u00e9 Antonio P\u00e1ez, Jos\u00e9 N\u00fa\u00f1ez de C\u00e1ceres and Pedro Pablo Diaz were chosen to inform P\u00e1ez. In 1827, P\u00e1ez made N\u00fa\u00f1ez his secretary and adviser . Because of his position in the government of Venezuela, he was able to promote the breakup of Venezuela from Gran Colombia. However, this caused him to be imprisoned in Maracaibo for a short period of time. Bolivar took him away from Caracas and suggested that he become the president of the Superior Court of Cuman\u00e1, but Nu\u00f1ez rejected the proposition and decided to move to Mexico with his family. They arrived to Mexico in April 1827. Initially, they settled in Puebla, but then changed their residence to Ciudad Victoria, in Tamaulipas. In the early years, he practiced law. In 1830, he obtained the office of prosecutor of the supreme court and in 1833 become a senator of Tamaulipas and a member of the Mexican Confederation Congress, and was recognized as a Distinguished Citizen of Tamaulipas. He served with General Moctezuma at the Pozo de los Carmelos , and he endorsed his agenda. In 1834, he became treasurer of Public Finance, although he continued serving as a lawyer as well . By 1844, he became seriously ill and the State Government and the Departmental Board of Tamaulipas gave him a pension to alleviate his struggles. He died in Ciudad Victoria, Tamaulipas, on September 11, 1846. Literary career Jos\u00e9 N\u00fa\u00f1ez de C\u00e1ceres also had an important role as a writer and teacher. He became a professor in 1795 at the University of Santo Tom\u00e1s de Aquino . On January 6, 1815, he returned to teaching at the University of Santo Domingo. Because of the efforts he made as captain-general, Nu\u00f1ez was appointed as the first rector of the university, and had his portrait placed in the lecture hall, paid for by the guild. On April 15, 1821, Jos\u00e9 N\u00fa\u00f1ez de C\u00e1ceres founded the satirical and political newspaper El Duende in Santo Domingo. This is the second newspaper to be published in the Dominican Republic. El Duende was released each Sunday in the capital of the colony and had thirteen issues, but was cancelled on July 15 of that year. Nu\u00f1ez published his first nine fables in this newspaper. He also founded the newspaper called El Rel\u00e1mpago (Lightning) in the same city. In Venezuela, Nu\u00f1ez founded several newspapers: El Constitucional Caraque\u00f1o (The Constitutional from Caracas), La Cometa (The Comet), a newspaper that harshly attacked Sim\u00f3n Bol\u00edvar, and El Cometa Extraordinario. In addition, the last issues of El Venezolano were also written by him. In Venezuela, in addition to the forums and engagement in journalism , he wrote others fables . N\u00fa\u00f1ez de C\u00e1ceres was well-read. He was familiar with the classic 'fabulists' (Aesop, Phaedrus, Jean de La Fontaine, Samaniego and Tom\u00e1s de Iriarte). They influenced him, especially when it came to the use of animals characters: eagle, bee, Donkey, Stork, Rabbit, Lamb, Owl, Wolf, Mule, Palomo, Raposa. As a rational person, it is common for the Pastor. Of the nineteen characters who act in the eleven tales of Creole fabulist, thirteen are found in Iriarte, twelve in Aesop and La Fontaine, nine in Phaedrus and eight in Samaniego. The mule, horse and donkeycross-and bumble appear in two of the fables of N\u00fa\u00f1ez de C\u00e1ceres, but not in any of those written by the classic fable above. Personal life At the end of the 18th century, N\u00fa\u00f1ez de C\u00e1ceres married Juana de Mata Madrigal Cordero and they had six children between the years 1800 and 1816, three of them was born in Camag\u00fcey, Cuba. After the Dominican hero' s death, his disciple Simon de Portes gave a speech at his burial: \"Rare event: here, not far Padilla, which ceased to be the hero of Igualada, which sealed the independence of Mexico, Dominican gentleman dies almost hear the roar of the cannon of the unjust invading Anglo-time same as before his death this unfortunate hero rejoices with the nice idea that the inhabitants of Santo Domingo, after many battles, been driven from its territory to its oppressors ... It is full of joy Jos\u00e9 N\u00fa\u00f1ez de C\u00e1ceres with such a happy event, and as you stop the course of death gradually led him to the grave \".", "after_revision": "Jos\u00e9 N\u00fa\u00f1ez de C\u00e1ceres y Albor (March 14, 1772, in Santo Domingo \u2013 September 11, 1846, in Ciudad Victoria) was a Dominican politician and writer. He is known for being the leader of the independence movement against Spain in 1821 and the only president of the short-lived Republic of Spanish Haiti, which existed from December 1, 1821 to February 9, 1822. This period was known as the ephemeral independence because it quickly ended with the Unification of Hispaniola under the Haitian government. Before its independence , while Spain exercised a perfunctory rule over the east side of Hispaniola, N\u00fa\u00f1ez de C\u00e1ceres pioneered the use of literature as a weapon for social protest and anti-colonial politics. He was also the first Dominican fabulist, and one of the first criollo storytellers in Spanish America. Many of his works appeared in his own satirical newspaper, El Duende, the second newspaper created in Santo Domingo. Early years Jos\u00e9 N\u00fa\u00f1ez de C\u00e1ceres Albor was born on March 14, 1772 in Santo Domingo. He was the son of 2nd Lt. Francisco N\u00fa\u00f1ez de C\u00e1ceres and Mar\u00eda Albor Polanco. His mother died a few days after his birth. He had two older brothers: Pedro and Ger\u00f3nimo. He was raised by his aunt Mar\u00eda N\u00fa\u00f1ez de C\u00e1ceres. Since his childhood, N\u00fa\u00f1ez de C\u00e1ceres showed a great interest in education, but his father, a farmer, wanted his son to dedicate himself to working the field. N\u00fa\u00f1ez de C\u00e1ceres was raised in a very poor family and he had to study using the books of his classmates. He earned some money by helping his aunt sell doves that an acquaintance hunted. In 1795, despite early obstacles, Nu\u00f1ez de C\u00e1ceres finished his studies in law at age 23. He then defended notable people in court and became a professor at the University of Santo Tom\u00e1s de Aquino. Political career In 1799, after the transfer of the colony of Santo Domingo to France under the Treaty of Basel, the Audiencia Real (which had been located in Santo Domingo until that time) was moved to Puerto Pr\u00edncipe (now Camag\u00fcey), Cuba. Nu\u00f1ez and his family emigrated along with it . It was there, in August 1800, that N\u00fa\u00f1ez de C\u00e1ceres was appointed to the office of Rapporteur, although he was able to continue practicing law. N\u00fa\u00f1ez de C\u00e1ceres was also a consultant for the government of Cuba. In late 1808, after Spain regained control over Santo Domingo, he returned to his homeland, where he paid tribute to the victors of the Battle of Palo Hincado with his famous song \"The winners of Battle of Palo Hincado\". Between June 29, 1810, and May 7, 1813, he was appointed by his former boss, Juan S\u00e1nchez Ram\u00edrez to the position of Lieutenant Governor, General Counsel and Government Service Judge Advocate General's Corps of the province of Santo Domingo. In 1812, in an attempt to improve the feeble economy of Santo Domingo, N\u00fa\u00f1ez de C\u00e1ceres ordered the circulation of paper money and adopted emergency economic measures.. Consulted on September 12, 2010, at 14:30. N\u00fa\u00f1ez de C\u00e1ceres had problems with Lieutenant Jos\u00e9 \u00c1lvarez de Toledo, who had been appointed by the Spanish government as Junta alternate deputy to the Cortes of C\u00e1diz. His revolutionary ideas , written in two confidential letters that \u00c1lvarez de Toledo had sent to S\u00e1nchez Ram\u00edrez , were denounced by N\u00fa\u00f1ez de C\u00e1ceres, President of the Cortes . The Cortes decided to prosecute de Toledo, but he could not be found. In 1812, N\u00fa\u00f1ez de Caceres began to shift his views on the colonial status of the territories in Spanish America.. Consulted on 12 September 8, 2010. His ideology made him an enemy of authorities in Santo Domingo, especially of S\u00e1nchez Ram\u00edrez. After his death, N\u00fa\u00f1ez de C\u00e1ceres tried to occupy a vacant position as a member of the Royal Audiencia of Quito, but the majority of members of the court rejected Nu\u00f1ez's request. This drove him to lead the independence movement to turn the colony into a protectorate of Bol\u00edvar's Gran Colombia. The struggle for independence 250px|Flag of Spanish Hait\u00ed N\u00fa\u00f1ez de C\u00e1ceres wanted independence from Spain and asked for the annexation of his country to Gran Colombia. He had tried to separate his country from Spain through a coup in the spring of 1821, but failed due to measures taken by Col. Sebasti\u00e1n Kindel\u00e1n y O'Regan and because the conspirators did not receive a response from Sim\u00f3n Bolivar in time. Despite the steps taken and denunciation of the plot, the governor still allowed N\u00fa\u00f1ez de C\u00e1ceres to prosecute captain Manuel Martinez for the crime of libel. A new Spanish governor, Pascual Real, arrived in May 1821. He not only gave credit to the whistleblowers who confirmed the veracity of the conspiracy by N\u00fa\u00f1ez de C\u00e1ceres, but also soon learned the name of N\u00fa\u00f1ez de C\u00e1ceres' followers. However, as Real had no troops, he devoted himself to observing the behavior of the suspects and winning the confidence of key military leaders. A group of Haitianophiles , familiar with the plans of N\u00fa\u00f1ez de C\u00e1ceres and his people, explained to Haitian President Jean-Pierre Boyer the political situation of the Dominican Republic, as they wanted to annex the former colony. On November 8, Major Andrew Amarante proclaimed the start of the annexation of the Republic in Beler . Seven days later, on November 15, the situation spread to Dajab\u00f3n and Monte Cristi. On the same day came the announcement of the Constitutive Act of Independence. The act contained rules that would govern the general functions of the new government and secured the new government's determination to establish itself as a Confederate state within Gran Colombia without renouncing the sovereignty the country. The Separatist Movement began on November 30, 1821, and the next month, on Friday 30 December, troops of the battalion assaulted the fortress, enclosing the governor within its walls. At the dawn, the establishment of the Independent State of Spanish Haiti was announced. The rebels proceeded to the read the Dominican Declaration of Independence written by N\u00fa\u00f1ez de C\u00e1ceres, Manuel Carvajal, Juan Vicente Moscoso, Antonio Martinez Vald\u00e9s, L. Juan Nepomuceno de Arredondo, Juan Ruiz, Vicente Mancebo y Manuel Lopez de Umeres. N\u00fa\u00f1ez de C\u00e1ceres established a provisional government, of which he was the President, and provided a Constitution that enshrined slavery even though it was considered unacceptable at the time. To avoid an invasion from neighbouring Haiti, N\u00fa\u00f1ez de C\u00e1ceres sent one of the most prominent members of his party, Antonio Mar\u00eda Pineda, to Venezuela to inform Simon Bol\u00edvar of the situation. The Liberator was absent from Caracas, and neither the vice president Francisco de Paula Santander or the commanding general of the city, General Jos\u00e9 Antonio P\u00e1ez, lent him their attention. Haitian occupation Almost simultaneously to the proclamation of the Independent State of Spanish Haiti, a commission of three envoys sent by President Boyer arrived in Santo Domingo. Haitian officials had orders to report the pronouncements of Pascual Real and observe the situation in Dajab\u00f3n and Monte Cristi. Aware of the political change, Colonel Fremont, the Haitian head of the commission, informed N\u00fa\u00f1ez de C\u00e1ceres, the newly appointed chairman of the state, that President Boyer would support the new government. The intention of the Haitian state was to invade the eastern part in order to enforce the unity and indivisibility on the island. N\u00fa\u00f1ez de C\u00e1ceres did not find the support he sought in Colombia. On January 11, 1822, Boyer wrote a letter to N\u00fa\u00f1ez de C\u00e1ceres announcing his intention to visit the eastern part of Spanish Haiti with an army, not as an invader, but as a peacemaker. Simultaneously , he warned de C\u00e1ceres that there should not be any obstacles in his path . When N\u00fa\u00f1ez de C\u00e1ceres read Boyer's message, he realized that annexation with Gran Colombia would be impossible; the majority of the Dominican social and military elite preferred to ally with Haiti . Thus, he had no other choice but to answer Boyer's military command, and he agreed for the city to be placed under the protection of Haitian occupation. Seven days later, on Saturday, January 19, N\u00fa\u00f1ez de C\u00e1ceres himself lowered the Colombian flag in the capital and replaced it with the Haitian flag, and on Saturday, February 9, 1822, he presented to President Boyer the keys to the city of Santo Domingo. Later years In April 1823, N\u00fa\u00f1ez de C\u00e1ceres emigrated with his family to Venezuela, where they settled in Maracaibo. In 1824, he began working as a printer in Caracas. Later, he founded several newspapers critical of Gran Colombia: El Constitucional Caraque\u00f1o (1824-1825), El Cometa (1824-1826) and El Cometa Extraordinario (1826-1827). In addition, the last issues of El Venezolano were also written by him (1823-1824). He also joined the movement of La Cosiata, which rebelled against Gran Colombia. On May 5, 1826, when Caracas decided to take part in the revolution of Jos\u00e9 Antonio P\u00e1ez, Jos\u00e9 N\u00fa\u00f1ez de C\u00e1ceres and Pedro Pablo Diaz were chosen to advise P\u00e1ez. In 1827, P\u00e1ez made de C\u00e1ceres his secretary and advisor . Because of de C\u00e1ceres' position in the government of Venezuela, he was able to promote the breakup of Venezuela from Gran Colombia. However, this caused him to be imprisoned in Maracaibo for a short period of time. Bolivar took de C\u00e1ceres away from Caracas and suggested that he become the president of the Superior Court of Cuman\u00e1, but de C\u00e1ceres rejected the proposition and decided to move to Mexico with his family. Jos\u00e9 N\u00fa\u00f1ez de C\u00e1ceres arrived in Mexico in April of 1827. Initially, they settled in Puebla, but then changed their residence to Ciudad Victoria, in Tamaulipas. In the early years, he practiced law. In 1830, he obtained the office of prosecutor of the supreme court and in 1833 become a senator of Tamaulipas and a member of the Mexican Confederation Congress, and was recognized as a Distinguished Citizen of Tamaulipas. He served with General Moctezuma at the Pozo de los Carmelos and endorsed his agenda. In 1834, he became treasurer of Public Finance, although he continued to serve as a lawyer . By 1844, he had become seriously ill, and the State Government and the Departmental Board of Tamaulipas gave him a pension to alleviate his struggles. He died in Ciudad Victoria, Tamaulipas, on September 11, 1846. Literary career Jos\u00e9 N\u00fa\u00f1ez de C\u00e1ceres also played an important role as a writer and teacher. He became a professor at the University of Santo Tom\u00e1s de Aquino in 1795. On January 6, 1815, he returned to teaching at the University of Santo Domingo. Because of the efforts he made as captain-general, Nu\u00f1ez was appointed as the first rector of the university, and had his portrait placed in the lecture hall, paid for by the guild. On April 15, 1821, Jos\u00e9 N\u00fa\u00f1ez de C\u00e1ceres founded the satirical and political newspaper El Duende in Santo Domingo. This was the second newspaper to be published in the Dominican Republic. El Duende was released each Sunday in the capital of the colony and ran for thirteen issues, but was cancelled on July 15 of that year. Nu\u00f1ez published his first nine fables in this newspaper. He also founded the newspaper called El Rel\u00e1mpago (Lightning) in the same city. In Venezuela, Nu\u00f1ez founded several newspapers: El Constitucional Caraque\u00f1o (The Constitutional from Caracas), La Cometa (The Comet), a newspaper that harshly attacked Sim\u00f3n Bol\u00edvar, and El Cometa Extraordinario. In addition, the last issues of El Venezolano were also written by him. In Venezuela, he wrote fables to supplement his participation in the forums and engagement in journalism . N\u00fa\u00f1ez de C\u00e1ceres was well-read. He was familiar with the classic 'fabulists' (Aesop, Phaedrus, Jean de La Fontaine, Samaniego and Tom\u00e1s de Iriarte). They influenced him, especially when it came to the use of animals as characters. Of the nineteen characters who act in the eleven tales of the Creole fabulist, thirteen are found in Iriarte, twelve in Aesop and La Fontaine, nine in Phaedrus and eight in Samaniego. The mule, horse , donkey, cross, and bumble appear in two of the fables of N\u00fa\u00f1ez de C\u00e1ceres, but not in fables written by the classic fabulists above. Personal life At the end of the 18th century, N\u00fa\u00f1ez de C\u00e1ceres married Juana de Mata Madrigal Cordero . They had six children between the years 1800 and 1816, of which three were born in Camag\u00fcey, Cuba. After de C\u00e1ceres' death, his disciple , Simon de Portes , gave a speech at his burial: ", "edit_actions": [{"type": "D", "before": "as", "after": null, "start_char_pos": 233, "end_char_pos": 235}, {"type": "R", "before": "lasted", "after": "existed", "start_char_pos": 307, "end_char_pos": 313}, {"type": "R", "before": "is also", "after": "was", "start_char_pos": 369, "end_char_pos": 376}, {"type": "D", "before": "two months later", "after": null, "start_char_pos": 438, "end_char_pos": 454}, {"type": "R", "before": "Shortly before these events", "after": "Before its independence", "start_char_pos": 520, "end_char_pos": 547}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1021, "end_char_pos": 1022}, {"type": "R", "before": "the cases of notable people ,", "after": "notable people in court", "start_char_pos": 1712, "end_char_pos": 1741}, {"type": "D", "before": "Thus,", "after": null, "start_char_pos": 2050, "end_char_pos": 2055}, {"type": "R", "before": "had to emigrate", "after": "emigrated along with it", "start_char_pos": 2077, "end_char_pos": 2092}, {"type": "A", "before": null, "after": "that", "start_char_pos": 2125, "end_char_pos": 2125}, {"type": "R", "before": "got", "after": "was appointed to", "start_char_pos": 2143, "end_char_pos": 2146}, {"type": "R", "before": "practising", "after": "practicing", "start_char_pos": 2206, "end_char_pos": 2216}, {"type": "R", "before": "of", "after": "for", "start_char_pos": 2261, "end_char_pos": 2263}, {"type": "R", "before": "recovered", "after": "regained control over", "start_char_pos": 2314, "end_char_pos": 2323}, {"type": "R", "before": "winners", "after": "victors", "start_char_pos": 2397, "end_char_pos": 2404}, {"type": "R", "before": "as", "after": "to the position of", "start_char_pos": 2595, "end_char_pos": 2597}, {"type": "A", "before": null, "after": "economic", "start_char_pos": 2872, "end_char_pos": 2872}, {"type": "R", "before": "were denounced by N\u00fa\u00f1ez de C\u00e1ceres, President of the Cortes, based on", "after": ", written in", "start_char_pos": 3120, "end_char_pos": 3189}, {"type": "A", "before": null, "after": ", were denounced by N\u00fa\u00f1ez de C\u00e1ceres, President of the Cortes", "start_char_pos": 3266, "end_char_pos": 3266}, {"type": "D", "before": "\u00c1lvarez", "after": null, "start_char_pos": 3301, "end_char_pos": 3308}, {"type": "R", "before": "was not", "after": "could not be", "start_char_pos": 3327, "end_char_pos": 3334}, {"type": "R", "before": "started shifting", "after": "began to shift", "start_char_pos": 3368, "end_char_pos": 3384}, {"type": "A", "before": null, "after": "of", "start_char_pos": 3568, "end_char_pos": 3568}, {"type": "R", "before": "wean", "after": "separate", "start_char_pos": 4066, "end_char_pos": 4070}, {"type": "R", "before": "by", "after": "through", "start_char_pos": 4094, "end_char_pos": 4096}, {"type": "R", "before": "did not mind and", "after": "still", "start_char_pos": 4348, "end_char_pos": 4364}, {"type": "R", "before": "Pascual Real, the", "after": "A", "start_char_pos": 4451, "end_char_pos": 4468}, {"type": "R", "before": "who", "after": "Pascual Real,", "start_char_pos": 4491, "end_char_pos": 4494}, {"type": "R", "before": ",", "after": "1821. He", "start_char_pos": 4510, "end_char_pos": 4511}, {"type": "R", "before": "very", "after": "also", "start_char_pos": 4625, "end_char_pos": 4629}, {"type": "R", "before": "his followers. As", "after": "N\u00fa\u00f1ez de C\u00e1ceres' followers. However, as", "start_char_pos": 4655, "end_char_pos": 4672}, {"type": "R", "before": "behaviour", "after": "behavior", "start_char_pos": 4729, "end_char_pos": 4738}, {"type": "D", "before": "to", "after": null, "start_char_pos": 4759, "end_char_pos": 4761}, {"type": "R", "before": "Haitianophile group", "after": "group of Haitianophiles", "start_char_pos": 4812, "end_char_pos": 4831}, {"type": "R", "before": "its", "after": "his", "start_char_pos": 4882, "end_char_pos": 4885}, {"type": "A", "before": null, "after": "Haitian President Jean-Pierre", "start_char_pos": 4907, "end_char_pos": 4907}, {"type": "R", "before": "with the purpose of annexing the", "after": "as they wanted to annex the", "start_char_pos": 4965, "end_char_pos": 4997}, {"type": "R", "before": "and seven days later", "after": ". Seven days later, on November 15,", "start_char_pos": 5114, "end_char_pos": 5134}, {"type": "D", "before": ",", "after": null, "start_char_pos": 5201, "end_char_pos": 5202}, {"type": "R", "before": "their determination to conclude an agreement with Gran Colombia to establish", "after": "the new government's determination to establish itself as", "start_char_pos": 5364, "end_char_pos": 5440}, {"type": "R", "before": "with it,", "after": "within Gran Colombia", "start_char_pos": 5461, "end_char_pos": 5469}, {"type": "R", "before": "started", "after": "began", "start_char_pos": 5542, "end_char_pos": 5549}, {"type": "R", "before": "Immediately thereafter, they", "after": "The rebels", "start_char_pos": 5792, "end_char_pos": 5820}, {"type": "D", "before": ",", "after": null, "start_char_pos": 6201, "end_char_pos": 6202}, {"type": "R", "before": "the slightest", "after": "their", "start_char_pos": 6626, "end_char_pos": 6639}, {"type": "R", "before": "with", "after": "to", "start_char_pos": 6692, "end_char_pos": 6696}, {"type": "R", "before": "Jean-Pierre Boyer, President of Haiti,", "after": "President Boyer", "start_char_pos": 6794, "end_char_pos": 6832}, {"type": "A", "before": null, "after": "orders", "start_char_pos": 6881, "end_char_pos": 6881}, {"type": "R", "before": "from", "after": "in", "start_char_pos": 6953, "end_char_pos": 6957}, {"type": "A", "before": null, "after": "the", "start_char_pos": 6993, "end_char_pos": 6993}, {"type": "A", "before": null, "after": "of Spanish Haiti", "start_char_pos": 7498, "end_char_pos": 7498}, {"type": "R", "before": "Simulteaonsouly", "after": "Simultaneously", "start_char_pos": 7553, "end_char_pos": 7568}, {"type": "R", "before": "him that he would be able to avoid any obstacle", "after": "de C\u00e1ceres that there should not be any obstacles in his path", "start_char_pos": 7581, "end_char_pos": 7628}, {"type": "R", "before": "that", "after": "Boyer's", "start_char_pos": 7658, "end_char_pos": 7662}, {"type": "R", "before": "he fought in vain. The majority among", "after": "annexation with Gran Colombia would be impossible; the majority of", "start_char_pos": 7689, "end_char_pos": 7726}, {"type": "R", "before": ", and thus", "after": ". Thus,", "start_char_pos": 7796, "end_char_pos": 7806}, {"type": "R", "before": "that", "after": "Boyer's", "start_char_pos": 7844, "end_char_pos": 7848}, {"type": "R", "before": "the City agreed", "after": "he agreed for the city", "start_char_pos": 7871, "end_char_pos": 7886}, {"type": "R", "before": "law. N\u00fa\u00f1ez de C\u00e1ceres himself, seven", "after": "occupation. Seven", "start_char_pos": 7932, "end_char_pos": 7968}, {"type": "A", "before": null, "after": "N\u00fa\u00f1ez de C\u00e1ceres himself", "start_char_pos": 8006, "end_char_pos": 8006}, {"type": "A", "before": null, "after": "in the capital", "start_char_pos": 8034, "end_char_pos": 8034}, {"type": "R", "before": "worked", "after": "began working", "start_char_pos": 8309, "end_char_pos": 8315}, {"type": "D", "before": "very", "after": null, "start_char_pos": 8378, "end_char_pos": 8382}, {"type": "R", "before": "inform", "after": "advise", "start_char_pos": 8828, "end_char_pos": 8834}, {"type": "R", "before": "N\u00fa\u00f1ez", "after": "de C\u00e1ceres", "start_char_pos": 8860, "end_char_pos": 8865}, {"type": "R", "before": "adviser", "after": "advisor", "start_char_pos": 8884, "end_char_pos": 8891}, {"type": "R", "before": "his", "after": "de C\u00e1ceres'", "start_char_pos": 8905, "end_char_pos": 8908}, {"type": "R", "before": "him", "after": "de C\u00e1ceres", "start_char_pos": 9114, "end_char_pos": 9117}, {"type": "R", "before": "Nu\u00f1ez", "after": "de C\u00e1ceres", "start_char_pos": 9216, "end_char_pos": 9221}, {"type": "R", "before": "They arrived to", "after": "Jos\u00e9 N\u00fa\u00f1ez de C\u00e1ceres arrived in", "start_char_pos": 9294, "end_char_pos": 9309}, {"type": "A", "before": null, "after": "of", "start_char_pos": 9326, "end_char_pos": 9326}, {"type": "R", "before": ", and he", "after": "and", "start_char_pos": 9758, "end_char_pos": 9766}, {"type": "R", "before": "serving", "after": "to serve", "start_char_pos": 9858, "end_char_pos": 9865}, {"type": "D", "before": "as well", "after": null, "start_char_pos": 9878, "end_char_pos": 9885}, {"type": "R", "before": "became seriously ill", "after": "had become seriously ill,", "start_char_pos": 9900, "end_char_pos": 9920}, {"type": "R", "before": "had", "after": "played", "start_char_pos": 10140, "end_char_pos": 10143}, {"type": "D", "before": "in 1795", "after": null, "start_char_pos": 10209, "end_char_pos": 10216}, {"type": "R", "before": ".", "after": "in 1795.", "start_char_pos": 10260, "end_char_pos": 10261}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 10644, "end_char_pos": 10646}, {"type": "R", "before": "had", "after": "ran for", "start_char_pos": 10779, "end_char_pos": 10782}, {"type": "R", "before": "in addition to", "after": "he wrote fables to supplement his participation in", "start_char_pos": 11279, "end_char_pos": 11293}, {"type": "D", "before": ", he wrote others fables", "after": null, "start_char_pos": 11334, "end_char_pos": 11358}, {"type": "R", "before": "characters: eagle, bee, Donkey, Stork, Rabbit, Lamb, Owl, Wolf, Mule, Palomo, Raposa. As a rational person, it is common for the Pastor.", "after": "as characters.", "start_char_pos": 11577, "end_char_pos": 11713}, {"type": "A", "before": null, "after": "the", "start_char_pos": 11772, "end_char_pos": 11772}, {"type": "R", "before": "and donkeycross-and", "after": ", donkey, cross, and", "start_char_pos": 11911, "end_char_pos": 11930}, {"type": "R", "before": "any of those", "after": "fables", "start_char_pos": 11998, "end_char_pos": 12010}, {"type": "R", "before": "fable", "after": "fabulists", "start_char_pos": 12034, "end_char_pos": 12039}, {"type": "R", "before": "and they", "after": ". They", "start_char_pos": 12149, "end_char_pos": 12157}, {"type": "R", "before": "three of them was", "after": "of which three were", "start_char_pos": 12208, "end_char_pos": 12225}, {"type": "R", "before": "the Dominican hero' s", "after": "de C\u00e1ceres'", "start_char_pos": 12256, "end_char_pos": 12277}, {"type": "A", "before": null, "after": ",", "start_char_pos": 12298, "end_char_pos": 12298}, {"type": "A", "before": null, "after": ",", "start_char_pos": 12315, "end_char_pos": 12315}, {"type": "D", "before": "\"Rare event: here, not far Padilla, which ceased to be the hero of Igualada, which sealed the independence of Mexico, Dominican gentleman dies almost hear the roar of the cannon of the unjust invading Anglo-time same as before his death this unfortunate hero rejoices with the nice idea that the inhabitants of Santo Domingo, after many battles, been driven from its territory to its oppressors ... It is full of joy Jos\u00e9 N\u00fa\u00f1ez de C\u00e1ceres with such a happy event, and as you stop the course of death gradually led him to the grave \".", "after": null, "start_char_pos": 12345, "end_char_pos": 12878}], "sents_char_pos": [0, 144, 356, 519, 732, 836, 953, 1040, 1066, 1118, 1162, 1209, 1259, 1418, 1523, 1604, 1694, 1808, 2049, 2094, 2221, 2287, 2496, 2722, 2883, 2926, 3095, 3268, 3341, 3457, 3492, 3585, 3765, 3881, 4049, 4167, 4280, 4450, 4669, 4809, 5012, 5184, 5265, 5517, 5703, 5791, 6063, 6258, 6451, 6650, 6858, 6983, 7189, 7319, 7384, 7552, 7630, 7707, 7936, 8179, 8296, 8340, 8514, 8598, 8679, 8840, 9017, 9100, 9293, 9332, 9435, 9473, 9696, 9787, 9887, 10033, 10096, 10186, 10261, 10341, 10523, 10638, 10710, 10842, 10899, 10979, 11192, 11264, 11392, 11509, 11662, 11713, 11894, 12046, 12249, 12743]}
+{"doc_id": "28763711", "revision_depth": "1", "before_revision": "Part of the Eighty Years' War, the Capture of Saint Martin was a Spanish naval expedition against the island of Saint Martin occupied by the Dutch Republic and administered as part of the Dutch Antilles . The island, claimed by Spain since Christopher Columbus' second voyage to the West Indies in 1493, lies a few hundred miles east of Puerto Rico. The capture eliminated the presence of Dutch privateers in the island, weakening Dutchprivateering and commerce in the Caribbean . Action The Spanish reconnaissance revealed that Dutch settlers had a 22-gun fortress covering Sint Maarten's approaches, so admiral Cadereyta sent an emissary ashore from the Spanish flagship Nuestra Se\u00f1ora de Aranzazu, to demand the garrison's surrender .Marley p.120 Approximately 150 Dutch defenders and 40 black auxiliaries under Jan Claeszoon van Campen rejected Cadereyta's overture. As a result, several Spanish galleons engaged the fortress in a heated fire exchange during which seven Spanish sailors perished while their boats were disembarking. Marley p.120 At 2:00 A.M on the next day , 1,000 troops and 300 sailors were set ashore under Vice Admiral de Hoces and Maestre de Campo Luis de Rojas y Borgia with who small field cannons. They made an arduous march through the jungle, suffering at least six deaths from heat exhaustion before finally emerging behind the Dutch fortress and storming its walls on 26 June. Musket fire halted them, with de Hoces receiving a crippling wound in his left elbow and side. The Spaniards inaugurated formal siege proceedings, bringing ashore four heavier guns to install in a battery, and then launched another 100-man assault the night of 28 Juneduring which the veteran naval captain Tiburcio Red\u00edn was injured. Marley p.121 Aftermath On 1 July, a badly wounded van Campen and his 62 Dutch and 15 black survivors requested terms for their surrender , which were granted . Cadereyta occupied the fortress the next day, deciding to keep it for Spain and strengthen its defenses by adding four 24-pounders, four 18-pound demi-culverins, and five 12-to ten-pounders to its armament, plus a permanent garrison of 250 Spanish soldiers and 50 auxiliaries under Captain Cebri\u00e1n de Lizarazu. Marley p.121 The Spanish fleet then sailed to San Juan de Puerto Rico, arriving with its prisoners and three Dutch prize ships on 13 July. The Spaniards allowed all inhabitants to leave, hoisted the Spanish flag and read a Holy mass of Gratitude in the fort.Hartog p.27 Spain formally returned the island to the United Provinces at the Munster peace treaty.Dewald p.187 Bibliography Lane, E Kris. Pillaging the Empire: Piracy in the Americas 1500-1750. M.E. Sharpe Publishers, David F. Marley. Wars of the Americas: A Chronology of Armed Conflict in the New World, 1492 to the Present ABC-CLIO(1998) Dewald, Jonathan. Europe 1450 to 1789: Encyclopedia of the Early Modern World Publisher:Charles Scribners Sons(2003) Hartog, Johannes History of Sint Maarten and Saint Martin", "after_revision": "Part of the Eighty Years' War, the Capture of Saint Martin was a Spanish naval expedition against the island of Saint Martin , then occupied by the Dutch Republic . The island, claimed by Spain since Christopher Columbus' second voyage to the West Indies in 1493, lies a few hundred miles east of Puerto Rico. Its capture prevented Dutch privateers using it as a base for operations in the Caribbean. Background The Dutch Republic had been fighting Spain for its independence since the outbreak of the Eighty Years War in 1568, a conflict which extended into the Spanish Americas. By the 1620s, the Spanish were increasingly concerned by Dutch, French and English incursions into the Caribbean, culminating in the Battle in the Bay of Matanzas in 1628, when the Dutch captured the annual Spanish treasure fleet . The Spanish now decided to take action and targeted the Dutch garrison on Saint Martin, which threatened their colony in Puerto Rico. In April 1633, a fleet was sent from C\u00e1diz to expel them, commanded by the Marquess of Cadreita, with the experienced Lope de Hoces as his deputy. Battle upright=1.0|Modern map of Saint Martin As the Spanish approached the island on 24 June, reconnaissance showed the Dutch had constructed a 22-gun fortress covering Sint Maarten's approaches, held by a garrison of around 140, which included 40 slaves. Cadreita sent an emissary ashore from the Spanish flagship Nuestra Se\u00f1ora de Aranzazu, to demand the garrison's surrender but although courteously received, their commander van Campen rejected the offer. The Spanish ships now began bombarding the fort, allowing them to disembark troops, although seven sailors died in the process. By 2:00 A.M on 25th , 1,000 troops were ashore but the thick undergrowth meant they did not reach the fort until the next day, while suffering a number of deaths from heat exhaustion . Although de Hoces was badly wounded in one of the first exchanges of fire, the Spanish landed four heavier guns which began firing on the fort from close range. Since Cadreita was instructed not to spend more than ten days taking the island, the Spanish launched an assault on the night of 30 June. The attack cost them three dead and eighteen wounded, including veteran naval captain Tiburcio Red\u00edn . However, van Campen was also injured in the assault and asked for terms of surrender the next day; Cadreita ignored orders to put the garrison to the sword and agreed to take them to the nearest Dutch possession. Aftermath Cadreita occupied the fortress the next day, strengthening its defenses by adding four 24-pounders, four 18-pound demi-culverins, and five 12-to ten-pounders to its armament, plus a permanent garrison of 250 Spanish soldiers and 50 auxiliaries under Captain Cebri\u00e1n de Lizarazu. The fleet then sailed to San Juan de Puerto Rico, arriving with its prisoners and three Dutch prize ships on 13 July. The Spaniards allowed all inhabitants to leave, hoisted the Spanish flag and read a Holy mass of Gratitude in the fort.Hartog p.27 The island was returned to the Dutch Republic by the Peace of Westphalia in 1648. Sources Lane, E Kris. Pillaging the Empire: Piracy in the Americas 1500-1750. M.E. Sharpe Publishers, Hartog, Johannes History of Sint Maarten and Saint Martin", "edit_actions": [{"type": "A", "before": null, "after": ", then", "start_char_pos": 125, "end_char_pos": 125}, {"type": "D", "before": "and administered as part of the Dutch Antilles", "after": null, "start_char_pos": 157, "end_char_pos": 203}, {"type": "R", "before": "The capture eliminated the presence of Dutch privateers in the island, weakening Dutchprivateering and commerce in the Caribbean", "after": "Its capture prevented Dutch privateers using it as a base for operations in the Caribbean.", "start_char_pos": 351, "end_char_pos": 479}, {"type": "A", "before": null, "after": "Background The Dutch Republic had been fighting Spain for its independence since the outbreak of the Eighty Years War in 1568, a conflict which extended into the Spanish Americas. By the 1620s, the Spanish were increasingly concerned by Dutch, French and English incursions into the Caribbean, culminating in the Battle in the Bay of Matanzas in 1628, when the Dutch captured the annual Spanish treasure fleet", "start_char_pos": 480, "end_char_pos": 480}, {"type": "R", "before": "Action The Spanish reconnaissance revealed that Dutch settlers had", "after": "The Spanish now decided to take action and targeted the Dutch garrison on Saint Martin, which threatened their colony in Puerto Rico. In April 1633, a fleet was sent from C\u00e1diz to expel them, commanded by the Marquess of Cadreita, with the experienced Lope de Hoces as his deputy.", "start_char_pos": 483, "end_char_pos": 549}, {"type": "A", "before": null, "after": "Battle upright=1.0|Modern map of Saint Martin", "start_char_pos": 550, "end_char_pos": 550}, {"type": "A", "before": null, "after": "As the Spanish approached the island on 24 June, reconnaissance showed the Dutch had constructed", "start_char_pos": 551, "end_char_pos": 551}, {"type": "R", "before": "so admiral Cadereyta", "after": "held by a garrison of around 140, which included 40 slaves. Cadreita", "start_char_pos": 606, "end_char_pos": 626}, {"type": "R", "before": ".Marley p.120 Approximately 150 Dutch defenders and 40 black auxiliaries under Jan Claeszoon", "after": "but although courteously received, their commander", "start_char_pos": 740, "end_char_pos": 832}, {"type": "R", "before": "Cadereyta's overture. As a result, several Spanish galleons engaged the fortress in a heated fire exchange during which seven Spanish sailors perished while their boats were disembarking. Marley p.120 At", "after": "the offer.", "start_char_pos": 853, "end_char_pos": 1056}, {"type": "A", "before": null, "after": "The Spanish ships now began bombarding the fort, allowing them to disembark troops, although seven sailors died in the process. By", "start_char_pos": 1057, "end_char_pos": 1057}, {"type": "R", "before": "the next day", "after": "25th", "start_char_pos": 1070, "end_char_pos": 1082}, {"type": "R", "before": "and 300 sailors were set ashore under Vice Admiral de Hoces and Maestre de Campo Luis de Rojas y Borgia with who small field cannons. They made an arduous march through the jungle, suffering at least six", "after": "were ashore but the thick undergrowth meant they did not reach the fort until the next day, while suffering a number of", "start_char_pos": 1098, "end_char_pos": 1301}, {"type": "R", "before": "before finally emerging behind the Dutch fortress and storming its walls on 26 June. Musket fire halted them, with de Hoces receiving a crippling wound in his left elbow and side. The Spaniards inaugurated formal siege proceedings, bringing ashore", "after": ". Although de Hoces was badly wounded in one of the first exchanges of fire, the Spanish landed", "start_char_pos": 1330, "end_char_pos": 1577}, {"type": "R", "before": "to install in a battery, and then launched another 100-man assault", "after": "which began firing on the fort from close range.", "start_char_pos": 1596, "end_char_pos": 1662}, {"type": "A", "before": null, "after": "Since Cadreita was instructed not to spend more than ten days taking the island, the Spanish launched an assault on", "start_char_pos": 1663, "end_char_pos": 1663}, {"type": "R", "before": "28 Juneduring which the", "after": "30 June. The attack cost them three dead and eighteen wounded, including", "start_char_pos": 1677, "end_char_pos": 1700}, {"type": "D", "before": "was injured. Marley p.121", "after": null, "start_char_pos": 1738, "end_char_pos": 1763}, {"type": "D", "before": "Aftermath On 1 July, a badly wounded van Campen and his 62 Dutch and 15 black survivors requested terms for their surrender , which were granted", "after": null, "start_char_pos": 1764, "end_char_pos": 1908}, {"type": "A", "before": null, "after": "However, van Campen was also injured in the assault and asked for terms of surrender the next day; Cadreita ignored orders to put the garrison to the sword and agreed to take them to the nearest Dutch possession.", "start_char_pos": 1911, "end_char_pos": 1911}, {"type": "R", "before": "Cadereyta", "after": "Aftermath Cadreita", "start_char_pos": 1912, "end_char_pos": 1921}, {"type": "R", "before": "deciding to keep it for Spain and strengthen", "after": "strengthening", "start_char_pos": 1958, "end_char_pos": 2002}, {"type": "R", "before": "Marley p.121 The Spanish", "after": "The", "start_char_pos": 2223, "end_char_pos": 2247}, {"type": "R", "before": "Spain formally returned the island to the United Provinces at the Munster peace treaty.Dewald p.187", "after": "The island was returned to the Dutch Republic by the Peace of Westphalia in 1648.", "start_char_pos": 2493, "end_char_pos": 2592}, {"type": "R", "before": "Bibliography", "after": "Sources", "start_char_pos": 2593, "end_char_pos": 2605}, {"type": "D", "before": "David F. Marley. Wars of the Americas: A Chronology of Armed Conflict in the New World, 1492 to the Present ABC-CLIO(1998) Dewald, Jonathan. Europe 1450 to 1789: Encyclopedia of the Early Modern World Publisher:Charles Scribners", "after": null, "start_char_pos": 2700, "end_char_pos": 2928}, {"type": "D", "before": "Sons(2003)", "after": null, "start_char_pos": 2929, "end_char_pos": 2939}], "sents_char_pos": [0, 205, 350, 482, 874, 1040, 1231, 1414, 1509, 1750, 2222, 2361, 2481, 2580, 2619, 2716, 2840]}
+{"doc_id": "28817000", "revision_depth": "1", "before_revision": "The capture of Demerara and Essequibo was a French military expedition carried out in January 1782 as part of the American Revolutionary War. In 1781 , Admiral Lord Rodney sent two sloops from his fleet at Sint Eustatius to take possession of the Dutch colonies of Essequibo and Demerara. In 1782 , the French successfully took possession of these settlements, compelling British Governor Robert Kinston to surrender. The Peace of Paris , which occurred in 1783 , restored these territories to the Dutch. In December 1780 , Great Britain declared war on the Dutch Republic, bringing it formally into the 4th Anglo-Dutch War. In early 1781 , a large British fleet , under Admiral Lord Rodney , was sent to the West Indies. After making seizures in the Caribbean Islands , Rodney sent two sloops to take possession of the colonies of Essequibo and Demerara . The possession was taken without much difficulty. The colonies had already de facto surrendered to six British privateer ships by the time the two naval vessels arrived. The governor, Van Schuilenburg, was not satisfied by Dutch protection and surrendered to the British, who found a rich booty in the colonies from the vast quantity of produce which had accumulated due to a lack of shipping. French naval Captain Armand Guy Simon de Co\u00ebtnempren, Comte de Kersaint, with his 32-gun flagship Iphig\u00e9nie, the 26-gun Aimable, and three lesser ships, arrived at Demerara without much opposition. There, 335 French men from the R\u00e9giment d'Armagnac and the 1st Legion Volontaires \u00e9tranger de la Marine launched an assault on the British garrison and compelled Gov. Robert Kinston and his detachment from the 28th Regiment of Foot to surrender. As a result, Essequibo and Berbice also surrendered to the French on 1 and 5 February.Chartrand p.5 The Comte de Kersaint became governor of the three rivers and their settlements and inhabitants. To guarantee their conquest, the French began to construct forts at the mouth of the Demerara River, one on each eastern and western bank, and for that purpose, they compelled the planters to furnish slave labor. They also doubled the capitation tax . These burdens were felt severely by the colonists. The Peace of Paris , which occurred in 1783 , restored these territories to the Dutch.Cust p.294 When Demerara surrendered to the French, the British naval commander , being at that place , signed the capitulation. Gov. Kingston's proposals for terms contained the following rather singular proposition: References Henry, Dalton G. (1855) The History of British Guiana: Comprising a General Description of the Colony: A narrative of some of the principal events from the earliest period of products and natural history . Hadden, James (2009) Hadden's Journal and Orderly Books. (Applewood). Chartrand, Rene (1992) The French Army in the American War of Independence. (Osprey) . Marley, F. David. (1998) Wars of the Americas: A Chronology of Armed Conflict in the New World, 1492 to the Present. (ABC-CLIO)", "after_revision": "The capture of Demerara and Essequibo was a French military expedition carried out in January 1782 as part of the American Revolutionary War. In 1781 Admiral Lord Rodney sent two sloops from his fleet at Sint Eustatius to take possession of the Dutch colonies of Essequibo and Demerara. In 1782 the French successfully took possession of these settlements, compelling British Governor Robert Kingston to surrender. The Treaty of Paris in 1783 restored these territories to the Dutch. In December 1780 Great Britain declared war on the Dutch Republic, bringing it formally into the 4th Anglo-Dutch War. In early 1781 a large British fleet under Admiral Lord Rodney was sent to the West Indies. After making seizures in the Caribbean islands , Rodney sent two sloops to take possession of the colonies of Essequibo and Demerara with little difficulty. The colonies had already de facto surrendered to six British privateer ships by the time the two naval vessels arrived. The governor, Van Schuilenburg, was not satisfied with Dutch protection and surrendered to the British, who found a rich booty in the colonies from the vast quantity of produce that had accumulated due to a lack of shipping. French naval captain Armand de Kersaint, with his 32-gun flagship Iphig\u00e9nie, the 26-gun Aimable, and three lesser ships, arrived at Demerara with little opposition. A French force of 335 men from the R\u00e9giment d'Armagnac and the 1st Legion Volontaires \u00e9tranger de la Marine launched an assault on the British garrison and compelled Gov. Robert Kingston and his detachment from the 28th Regiment of Foot to surrender. As a result, Essequibo and Berbice also surrendered to the French on 1 and 5 February.Chartrand p.5 The Comte de Kersaint became governor of the three rivers and their settlements and inhabitants. To guarantee their conquest, the French began to construct forts at the mouth of the Demerara River, one on each eastern and western bank, and for that purpose, they compelled the planters to furnish slave labor. They also doubled the capitation tax , which burden was felt severely by the colonists. In 1783 the Treaty of Paris restored these territories to the Dutch.Cust p.294 When Demerara surrendered to the French, the British naval commander in place signed the capitulation. Gov. Kingston's proposals for terms contained the following rather singular proposition: References Chartrand, Ren\u00e9 (1992) The French Army in the American War of Independence. (Osprey). Hadden, James (2009) Hadden's Journal and Orderly Books. (Applewood). Henry, Dalton G. (1855) The History of British Guiana: Comprising a General Description of the Colony: A narrative of some of the principal events from the earliest period of products and natural history . Marley, F. David. (1998) Wars of the Americas: A Chronology of Armed Conflict in the New World, 1492 to the Present. (ABC-CLIO)", "edit_actions": [{"type": "D", "before": ",", "after": null, "start_char_pos": 150, "end_char_pos": 151}, {"type": "D", "before": ",", "after": null, "start_char_pos": 297, "end_char_pos": 298}, {"type": "R", "before": "Kinston", "after": "Kingston", "start_char_pos": 396, "end_char_pos": 403}, {"type": "R", "before": "Peace of Paris , which occurred", "after": "Treaty of Paris", "start_char_pos": 422, "end_char_pos": 453}, {"type": "D", "before": ",", "after": null, "start_char_pos": 462, "end_char_pos": 463}, {"type": "D", "before": ",", "after": null, "start_char_pos": 522, "end_char_pos": 523}, {"type": "D", "before": ",", "after": null, "start_char_pos": 639, "end_char_pos": 640}, {"type": "D", "before": ",", "after": null, "start_char_pos": 663, "end_char_pos": 664}, {"type": "D", "before": ",", "after": null, "start_char_pos": 691, "end_char_pos": 692}, {"type": "R", "before": "Islands", "after": "islands", "start_char_pos": 761, "end_char_pos": 768}, {"type": "R", "before": ". The possession was taken without much", "after": "with little", "start_char_pos": 855, "end_char_pos": 894}, {"type": "R", "before": "by", "after": "with", "start_char_pos": 1077, "end_char_pos": 1079}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 1202, "end_char_pos": 1207}, {"type": "R", "before": "Captain Armand Guy Simon de Co\u00ebtnempren, Comte de", "after": "captain Armand de", "start_char_pos": 1264, "end_char_pos": 1313}, {"type": "R", "before": "without much opposition. There, 335 French", "after": "with little opposition. A French force of 335", "start_char_pos": 1424, "end_char_pos": 1466}, {"type": "R", "before": "Kinston", "after": "Kingston", "start_char_pos": 1623, "end_char_pos": 1630}, {"type": "R", "before": ". These burdens were", "after": ", which burden was", "start_char_pos": 2142, "end_char_pos": 2162}, {"type": "R", "before": "The Peace of Paris , which occurred in", "after": "In", "start_char_pos": 2195, "end_char_pos": 2233}, {"type": "R", "before": ",", "after": "the Treaty of Paris", "start_char_pos": 2239, "end_char_pos": 2240}, {"type": "R", "before": ", being at that place ,", "after": "in place", "start_char_pos": 2361, "end_char_pos": 2384}, {"type": "A", "before": null, "after": "Chartrand, Ren\u00e9 (1992) The French Army in the American War of Independence. (Osprey).", "start_char_pos": 2510, "end_char_pos": 2510}, {"type": "A", "before": null, "after": "Hadden, James (2009) Hadden's Journal and Orderly Books. (Applewood).", "start_char_pos": 2511, "end_char_pos": 2511}, {"type": "D", "before": ". Hadden, James (2009) Hadden's Journal and Orderly Books. (Applewood).", "after": null, "start_char_pos": 2716, "end_char_pos": 2787}, {"type": "D", "before": "Chartrand, Rene (1992) The French Army in the American War of Independence. (Osprey)", "after": null, "start_char_pos": 2788, "end_char_pos": 2872}], "sents_char_pos": [0, 141, 288, 417, 504, 624, 721, 856, 906, 1026, 1250, 1448, 1694, 1781, 1891, 2104, 2143, 2194, 2281, 2409, 2774, 2787, 2863, 2874, 2892, 2991]}
+{"doc_id": "2890298", "revision_depth": "2", "before_revision": "Principle This is the simplest calculation of astronomical navigationand is when an observer determines his latitude by measuring the altitude of a heavenly object at the time of its meridian passage. Meridian passage is when the object passes the observer's meridian, i.e. passes through south or north . This is usually done with the sun for a noon latitude but can be done with any heavenly object. Noon is when the sun passes through the meridian. Let us imagine that the sun is overhead (at the zenith) at a point on the equator (latitude 0\u00b0) and observer A is standing at this point , the geographical pointof the sun . If he were to measure the height of the sun above the horizon with a sextant he would find that the altitude of the sun was 90\u00b0. By subtracting this figure from 90\u00b0 he would find the zenith distance of the sun which is 0\u00b0, which is the same as his latitude. Observer B is standing at one of the poles (latitude 90\u00b0N or 90\u00b0S) he would see the sun on the horizon at an altitude of 0\u00b0. By subtracting this from 90\u00b0 he would find that the zenith distance is 90\u00b0, which is his latitude. Observer C at the same time is at latitude 20\u00b0N on the same meridian, i.e. on the same longitude as observer A. His measured altitude would be 70\u00b0 and by subtracting this from 90\u00b0 gives a 20\u00b0 zenith distance which in turn is his latitude. In short, the zenith distance of a heavenly object at meridian altitude is the difference in latitude between it and the observer.", "after_revision": "Principle Meridian altitude is the simplest calculation of celestial navigation, in which an observer determines his latitude by measuring the altitude of an astronomical object at the time of its meridian contact. A meridian contact is the moment when the object contacts the observer's meridian, i.e. the imaginary line running north\u2013south and through the zenith, nadir, and celestial poles . This is usually done with the equinox Sun at solar noon to determine the observer's latitude, but can be done with any celestial object. Solar noon is the time when the Sun contacts the meridian. Imagine that the equinox Sun is overhead (at the zenith) at a point on the Equator (latitude 0\u00b0) , and Observer A is standing at this point \u2013 the subsolar point . If he were to measure the height of the Sun above the horizon with a sextant , he would find that the altitude of the Sun was 90\u00b0. By subtracting this figure from 90\u00b0 , he would find that the zenith distance of the Sun is 0\u00b0, which is the same as his latitude. If Observer B is standing at one of the geographical poles (latitude 90\u00b0N or 90\u00b0S) , he would see the Sun on the horizon at an altitude of 0\u00b0. By subtracting this from 90\u00b0 , he would find that the zenith distance is 90\u00b0, which is his latitude. Observer C at the same time is at latitude 20\u00b0N on the same meridian, i.e. on the same longitude as Observer A. His measured altitude would be 70\u00b0 , and subtracting this from 90\u00b0 gives a 20\u00b0 zenith distance , which in turn is his latitude. In short, the zenith distance of a celestial object at meridian altitude is the difference in latitude between it and the observer.", "edit_actions": [{"type": "R", "before": "This", "after": "Meridian altitude", "start_char_pos": 10, "end_char_pos": 14}, {"type": "R", "before": "astronomical navigationand is when", "after": "celestial navigation, in which", "start_char_pos": 46, "end_char_pos": 80}, {"type": "R", "before": "a heavenly", "after": "an astronomical", "start_char_pos": 146, "end_char_pos": 156}, {"type": "R", "before": "passage. Meridian passage is", "after": "contact. A meridian contact is the moment", "start_char_pos": 192, "end_char_pos": 220}, {"type": "R", "before": "passes", "after": "contacts", "start_char_pos": 237, "end_char_pos": 243}, {"type": "R", "before": "passes through south or north", "after": "the imaginary line running north\u2013south and through the zenith, nadir, and celestial poles", "start_char_pos": 274, "end_char_pos": 303}, {"type": "R", "before": "sun for a noon latitude", "after": "equinox Sun at solar noon to determine the observer's latitude,", "start_char_pos": 336, "end_char_pos": 359}, {"type": "R", "before": "heavenly object. Noon is when", "after": "celestial object. Solar noon is the time when the Sun contacts", "start_char_pos": 385, "end_char_pos": 414}, {"type": "D", "before": "sun passes through the", "after": null, "start_char_pos": 419, "end_char_pos": 441}, {"type": "R", "before": "Let us imagine that the sun", "after": "Imagine that the equinox Sun", "start_char_pos": 452, "end_char_pos": 479}, {"type": "R", "before": "equator", "after": "Equator", "start_char_pos": 526, "end_char_pos": 533}, {"type": "R", "before": "and observer", "after": ", and Observer", "start_char_pos": 548, "end_char_pos": 560}, {"type": "R", "before": ", the geographical pointof the sun", "after": "\u2013 the subsolar point", "start_char_pos": 589, "end_char_pos": 623}, {"type": "R", "before": "sun", "after": "Sun", "start_char_pos": 666, "end_char_pos": 669}, {"type": "A", "before": null, "after": ",", "start_char_pos": 703, "end_char_pos": 703}, {"type": "R", "before": "sun", "after": "Sun", "start_char_pos": 743, "end_char_pos": 746}, {"type": "A", "before": null, "after": ",", "start_char_pos": 792, "end_char_pos": 792}, {"type": "A", "before": null, "after": "that", "start_char_pos": 807, "end_char_pos": 807}, {"type": "R", "before": "sun which", "after": "Sun", "start_char_pos": 835, "end_char_pos": 844}, {"type": "A", "before": null, "after": "If", "start_char_pos": 887, "end_char_pos": 887}, {"type": "A", "before": null, "after": "geographical", "start_char_pos": 925, "end_char_pos": 925}, {"type": "A", "before": null, "after": ",", "start_char_pos": 956, "end_char_pos": 956}, {"type": "R", "before": "sun", "after": "Sun", "start_char_pos": 974, "end_char_pos": 977}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1044, "end_char_pos": 1044}, {"type": "R", "before": "observer", "after": "Observer", "start_char_pos": 1215, "end_char_pos": 1223}, {"type": "R", "before": "and by", "after": ", and", "start_char_pos": 1262, "end_char_pos": 1268}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1323, "end_char_pos": 1323}, {"type": "R", "before": "heavenly", "after": "celestial", "start_char_pos": 1390, "end_char_pos": 1398}], "sents_char_pos": [0, 200, 305, 401, 451, 625, 755, 886, 1014, 1114, 1226, 1354]}
+{"doc_id": "29154034", "revision_depth": "1", "before_revision": "Cabinet Ministries Ediciones Centauro/87 (1987). Gehard Cartay Ram\u00edrez. \u201c Caldera y Betancourt .\u201dOFFICENAMETERMPresidentRafael Caldera1969\u20131974Home AffairsLorenzo Fern\u00e1ndez1969\u2013 1972 Nectario Andrade Labarca1972\u2013 1974Outer RelationsAr\u00edstides Calvani1969\u20131974FinancePedro R. Tinoco1969\u2013 1972 Luis Enrique Oberto1972\u20131974DefenseMart\u00edn Garc\u00eda Villasmil1969\u2013 1971 Jes\u00fas Carbonell Izquierdo1971\u2013 1972 Gustavo Pardi D\u00e1vila1972\u20131974DevelopmentHayd\u00e9e Castillo1969\u2013 1971 H\u00e9ctor Hern\u00e1ndez Caraba\u00f1o1971\u20131974Public WorksJos\u00e9 Curiel1969\u2013 1974EducationH\u00e9ctor Hern\u00e1ndez Caraba\u00f1o1969\u2013 1971 Enrique P\u00e9rez Olivares1971\u2013 1974Justice Nectario Andrade Labarca1969\u2013 1970 Orlando Tovar Tamayo1970\u2013 1971 Edilberto Escalante1971\u2013 1974Mines and HydrocarbonsHugo P\u00e9rez La Salvia1969\u2013 1974LaborAlfredo Tarre Murzi1969\u2013 1970 Nectario Andrade Labarca1970\u2013 1972 Alberto Mart\u00edn Urdaneta1972\u20131974CommunicationsRam\u00f3n Jos\u00e9 Vel\u00e1squez1969\u2013 1971 Enrique Bustamante Luciani1971\u20131974AgricultureJes\u00fas L\u00f3pez Luque1969\u2013 1971 Daniel Scott Cuervo1971\u2013 1972 Miguel Rodr\u00edguez Viso1972\u20131974Health and Social AssistanceLisandro Latuff1969\u2013 1970 Jos\u00e9 de Jes\u00fas Mayz Ly\u00f3n1970\u2013 1974Secretary of PresidencyLuis Alberto Machado1969\u2013 1974Office of Coordination and PlanificationLuis Enrique Oberto1969\u2013 1972 Antonio Casas Gonz\u00e1lez1972\u20131974", "after_revision": "Cabinet 1969-1974 Ediciones Centauro/87 (1987). Gehard Cartay Ram\u00edrez. \u00ab Caldera y Betancourt \u00bbMinisterNamePer\u00edodInternal RelationsLorenzo Fern\u00e1ndez1969\u2013 1972Nectario Andrade Labarca1972\u2013 1974Foreign AffairsAr\u00edstides Calvani1969\u20131974FinancePedro R. Tinoco1969\u2013 1972Luis Enrique Oberto1972\u20131974DefenseMart\u00edn Garc\u00eda Villasmil1969\u2013 1971Jes\u00fas Carbonell Izquierdo1971\u2013 1972Gustavo Pardi D\u00e1vila1972\u20131974DevelopmentHayd\u00e9e Castillo1969\u2013 1971H\u00e9ctor Hern\u00e1ndez Caraba\u00f1o1971\u20131974Public WorksJos\u00e9 Curiel1969\u2013 1974Educaci\u00f3nH\u00e9ctor Hern\u00e1ndez Caraba\u00f1o1969\u2013 1971Enrique P\u00e9rez Olivares1971\u2013 1974JusticeNectario Andrade Labarca1969\u2013 1970Orlando Tovar Tamayo1970\u2013 1971Edilberto Escalante1971\u2013 1974Mining and HydrocarbonsHugo P\u00e9rez La Salvia1969\u2013 1974WorkAlfredo Tarre Murzi1969\u2013 1970Nectario Andrade Labarca1970\u2013 1972Alberto Mart\u00edn Urdaneta1972\u20131974CommunicationsRam\u00f3n Jos\u00e9 Vel\u00e1squez1969\u2013 1971Enrique Bustamante Luciani1971\u20131974AgricultureJes\u00fas L\u00f3pez Luque1969\u2013 1971Daniel Scott Cuervo1971\u2013 1972Miguel Rodr\u00edguez Viso1972\u20131974Health and Social CareLisandro Latuff1969\u2013 1970Jos\u00e9 de Jes\u00fas Mayz Ly\u00f3n1970\u2013 1974DispatchLuis Alberto Machado1969\u2013 1974CordiplanLuis Enrique Oberto1969\u2013 1972Antonio Casas Gonz\u00e1lez1972\u20131974", "edit_actions": [{"type": "R", "before": "Ministries", "after": "1969-1974", "start_char_pos": 8, "end_char_pos": 18}, {"type": "R", "before": "\u201c", "after": "\u00ab", "start_char_pos": 72, "end_char_pos": 73}, {"type": "R", "before": ".\u201dOFFICENAMETERMPresidentRafael Caldera1969\u20131974Home AffairsLorenzo", "after": "\u00bbMinisterNamePer\u00edodInternal RelationsLorenzo", "start_char_pos": 95, "end_char_pos": 162}, {"type": "R", "before": "1972 Nectario", "after": "1972Nectario", "start_char_pos": 178, "end_char_pos": 191}, {"type": "R", "before": "1974Outer RelationsAr\u00edstides", "after": "1974Foreign AffairsAr\u00edstides", "start_char_pos": 213, "end_char_pos": 241}, {"type": "R", "before": "1972 Luis", "after": "1972Luis", "start_char_pos": 286, "end_char_pos": 295}, {"type": "R", "before": "1971 Jes\u00fas", "after": "1971Jes\u00fas", "start_char_pos": 355, "end_char_pos": 365}, {"type": "R", "before": "1972 Gustavo", "after": "1972Gustavo", "start_char_pos": 391, "end_char_pos": 403}, {"type": "R", "before": "1971 H\u00e9ctor", "after": "1971H\u00e9ctor", "start_char_pos": 457, "end_char_pos": 468}, {"type": "R", "before": "1974EducationH\u00e9ctor", "after": "1974Educaci\u00f3nH\u00e9ctor", "start_char_pos": 525, "end_char_pos": 544}, {"type": "R", "before": "1971 Enrique", "after": "1971Enrique", "start_char_pos": 569, "end_char_pos": 581}, {"type": "R", "before": "1974Justice Nectario", "after": "1974JusticeNectario", "start_char_pos": 602, "end_char_pos": 622}, {"type": "R", "before": "1970 Orlando", "after": "1970Orlando", "start_char_pos": 644, "end_char_pos": 656}, {"type": "R", "before": "1971 Edilberto", "after": "1971Edilberto", "start_char_pos": 675, "end_char_pos": 689}, {"type": "R", "before": "1974Mines", "after": "1974Mining", "start_char_pos": 705, "end_char_pos": 714}, {"type": "R", "before": "1974LaborAlfredo", "after": "1974WorkAlfredo", "start_char_pos": 757, "end_char_pos": 773}, {"type": "R", "before": "1970 Nectario", "after": "1970Nectario", "start_char_pos": 791, "end_char_pos": 804}, {"type": "R", "before": "1972 Alberto", "after": "1972Alberto", "start_char_pos": 826, "end_char_pos": 838}, {"type": "R", "before": "1971 Enrique", "after": "1971Enrique", "start_char_pos": 903, "end_char_pos": 915}, {"type": "R", "before": "1971 Daniel", "after": "1971Daniel", "start_char_pos": 977, "end_char_pos": 988}, {"type": "R", "before": "1972 Miguel", "after": "1972Miguel", "start_char_pos": 1007, "end_char_pos": 1018}, {"type": "R", "before": "AssistanceLisandro", "after": "CareLisandro", "start_char_pos": 1060, "end_char_pos": 1078}, {"type": "R", "before": "1970 Jos\u00e9", "after": "1970Jos\u00e9", "start_char_pos": 1091, "end_char_pos": 1100}, {"type": "R", "before": "1974Secretary of PresidencyLuis", "after": "1974DispatchLuis", "start_char_pos": 1125, "end_char_pos": 1156}, {"type": "R", "before": "1974Office of Coordination and PlanificationLuis", "after": "1974CordiplanLuis", "start_char_pos": 1178, "end_char_pos": 1226}, {"type": "R", "before": "1972 Antonio", "after": "1972Antonio", "start_char_pos": 1247, "end_char_pos": 1259}], "sents_char_pos": [0, 48, 71, 273, 286, 304, 333, 355, 366, 391, 404, 443, 457, 469, 503, 525, 545, 569, 582, 602, 614, 631, 644, 657, 675, 690, 705, 719, 736, 757, 774, 791]}
+{"doc_id": "294216", "revision_depth": "1", "before_revision": " A SWOT [ analysis, with its four elements in a 2\u00d72 matrix.", "after_revision": "SUBSCRIBE Healthline uses cookies to improve your experience and to show you personalized ads. Privacy Policy. More information How Does Technology Affect Your Health? The Good, the Bad, and Tips for Use Medically reviewed by Karen Gill, M.D. \u2014 Written by Ann Pietrangelo on May 23, 2019 Eye strain Musculoskeletal health Sleep health Mental health Effects in kids Positive effects How to use technology Takeaway All manner of technology surrounds us. From our personal laptops, tablets, and phones to behind-the-scenes technology that furthers medicine, science, and education. Technology is here to stay, but it\u2019s always morphing and expanding. As each new technology enters the scene, it has the potential to improve lives. But, in some cases, it also has the potential to negatively affect physical and emotional health. Read on as we take a look at a few possible negative effects of technology and provide tips on healthier ways to use it. Digital eye strain According to the American Optometric Association (AOA), prolonged use of computers, tablets, and cellphones can lead to digital eye strain. Symptoms of digital eye strain may include: blurred vision dry eyes headaches neck and shoulder pain Contributing factors are screen glare, bad lighting, and improper viewing distance. The AOA recommends the 20-20-20 rule to ease eye strain. To follow this rule, try to take a 20-second break every 20 minutes to look at something that\u2019s 20 feet away. Musculoskeletal problems When you use a smartphone, the chances are that you\u2019re holding your head in an unnatural forward-leaning position. This position puts a lot of stress on your neck, shoulders, and spine. A small 2017 studyTrusted Source found a clear association between self-reported addiction to smartphone use and neck problems. An earlier study found that among teens, neck-shoulder pain and low back pain rose during the 1990s at the same time that the use of information and communication technology was increasing. Overuse of technology can also lead to repetitive strain injuries of the fingers, thumbs, and wrists. If you\u2019re feeling the pain of technology, you can take the following steps to reduce these issues: take frequent breaks to stretch create an ergonomic workspace maintain proper posture while using your devices If pain persists, see a doctor. Sleep problems Technology in the bedroom can interfere with sleep in a number of ways. A 2015 study demonstrated that exposure to the blue light that devices emit can suppress melatonin and interrupt your circadian clock. Both of these effects can make it harder to fall asleep and result in you being less alert in the morning. Having electronic devices in the bedroom places temptation at your fingertips, and it can make switching off more difficult. That, in turn, can make it harder to drift off when you try to sleep. ADVERTISEMENT Affordable therapy delivered digitally \u2013 Try BetterHelp Choose from BetterHelp\u2019s vast network of therapists for your therapy needs. Take a quiz, get matched, and start getting support via secure phone or video sessions. Plans start at $60 per week + an additional 10\\% off. Emotional problems Using social media can make you feel more connected to the world. But, comparing yourself to others can leave you feeling inadequate or left out. A recent study looked at the social media use of more than 1,700 people between the ages of 19 and 32. The researchers found that those with high social media use felt more socially isolated than those who spent less time on social media. A 2011 cross-sectional surveyTrusted Source of high school students in Connecticut found that internet use was problematic for about 4 percent of the participants. The researchers said that there might be an association between problematic internet use and depression, substance use, and aggressive behavior. They also noted that high school boys, who, according to the researchers, tend to be heavier users of the internet, may be less aware of these problems. A 2016 systematic reviewTrusted Source produced mixed findings on the relationship that social networks have with depression and anxiety. The evidence suggests that social network use correlates with mental illness and well-being. However, the researchers noted that whether it has a beneficial or detrimental effect depends on the quality of social factors in the social network environment. More research is necessary to make conclusions on cause and effect. If social media use makes you feel anxious or depressed, try cutting back to see if doing so makes a difference. Negative effects of technology on kids The findings of a 2014 studyTrusted Source suggest that even after factoring out junk food and exercise, technology appears to affect the health of children and teens. The researchers used a broad definition of screen time that included: television video games phones tech toys They conducted the simple correlational study using an anonymous online survey. The study authors concluded that parents and caregivers should help children learn to reduce overall screen time. According to the Mayo Clinic, unstructured playtime is better for a child\u2019s developing brain than electronic media. At 2 years old, children can benefit from some screen time, but it shouldn\u2019t replace other important learning opportunities, including playtime. Research has linked too much screen time or low-quality screen time to: behavioral problems less time for play and loss of social skills obesity sleep problems violence Like adults, children who spend a lot of time on digital devices can experience symptoms of eye strain. The AOA advises parents and caregivers to watch for signs of digital eye strain in children and to encourage frequent visual breaks. A 2018 study of adolescents ages 15 and 16 found an association between frequent use of digital media and the development of symptoms of attention deficit hyperactivity disorder (ADHD). The study involved a longitudinal cohort of students who self-reported their use of 14 digital media activities, and it included a 24-month follow-up period. More research is necessary to confirm whether it\u2019s a causal association. What are the recommendations for screen time by age? The American Academy of Pediatrics (APA) makes the following recommendations for screen time: Younger than 18 months Avoid screen time other than video chatting. 18 to 24 months Parents and caregivers can offer high-quality programs and watch them with their children. 2 to 5 years Limit to one hour per day of supervised high-quality programming. 6 years and above Place consistent limits on time and types of media. Media shouldn\u2019t interfere with adequate sleep, exercise, or other behaviors that affect health. The APA also recommends that parents and caregivers designate media-free times, such as dinner time, as well as media-free zones within the home. Positive effects of technology Technology plays a role in virtually every part of our lives, whether we\u2019re aware of it or not. These are just a few of the ways in which technology may positively affect our physical and mental health: health apps to track chronic illnesses and communicate vital information to doctors health apps that help you track diet, exercise, and mental health information online medical records that give you access to test results and allow you to fill prescriptions virtual doctor visits online education and ease of research enhanced communication with others, which can improve the feeling of connection Ways to make the most of technology With each new advance in technology, it gets a bit easier to go overboard. When we get too caught up in it, we can feel it in our minds and bodies. So, how much is too much? The answer is as individual as you are. Here are some signs that you might be leaning too heavily on technology: Your family or friends complain about your tech use. You\u2019ve neglected relationships in favor of technology, which people sometimes refer to as phubbing. It has interfered with your work. You\u2019re losing sleep or skipping physical activities due to technology use. It\u2019s causing you stress or anxiety, or you\u2019re noticing physical side effects, such as tension headaches, eye strain, muscle pain, or overuse injuries. You can\u2019t seem to stop. If that sounds familiar, here are some ways to cut back on screen time: Clear your phone of unessential apps to keep you from constantly checking it for updates. Carve out a specific, limited amount of time to use your devices. Turn some television time into physical activity time. Keep electronic devices out of the bedroom. Charge them in another room. Turn clocks and other glowing devices toward the wall at bedtime. Make mealtime gadget-free time. Prioritize real-world relationships over online relationships. If you\u2019re responsible for children: Limit their screen time, allowing it only at certain times of the day and restricting it during activities like meals and just before bedtime. Know what they\u2019re doing. Review their programs, games, and apps, and encourage the engaging ones over those that are passive. Play games and explore technology together. Take advantage of parental controls. Make sure that children have regular, unstructured, tech-free playtime. Encourage face time over online friendships. Takeaway Technology is a part of our lives. It can have some negative effects, but it can also offer many positive benefits and play an important role in education, health, and general welfare. Knowing the possible negative effects can help you take steps to identify and minimize them so that you can still enjoy the positive aspects of technology. Last medically reviewed on May 23, 2019 13 sourcescollapsed HEALTH NEWS Step Away from the Smartphone: How to Do a Digital Detox Written by Kimberly Holland \u2014 Updated on June 16, 2017 Experts say there are some simple things you can do during your day to reduce your exposure to digital technology. You open an app on your smartphone to clear an alert. And look! A friend posted a picture from her vacation in Bora Bora. The next thing you know you\u2019ve clicked through the entirety of her 43-photo album. You\u2019ve also opened three browser windows to scope out the best time to travel to the Pacific island, how to get a deal on four-star resorts, and what bathing suit is best for your body type. The bathing suit site prompts you to see its latest look on Instagram, where you have three new messages and 15 new likes to see. An hour later, you remembered you were just trying to plan your meals for the week, and now you\u2019re following Bora Bora natives and pinning a new straw hat for the beach to your \u201cDream Trip\u201d board. This digital time drain is real. Having our phones, laptops, smart watches, and tablets constantly within reach has made us hyperconnected \u2014 and hyperdistracted. We feel attached to the people and lives on our phones, but disconnected from our real life storylines. Tom Kersting, PhD, is a licensed psychotherapist, and author of \u201cDisconnected: How to Reconnect Our Digitally Distracted Kids.\u201d \u201cNo matter where you look, it seems that everyone is disengaged from the moment and instead staring at a device,\u201d he told Healthline. \u201cThis is causing family issues, work issues, etcetera, as we become more disconnected from each other. These are classic signs of addiction.\u201d Think addiction is too strong a word for the constant need to check, and check again, everything from Instagram likes to work emails? Perhaps not. \u201cTechnology becomes a problem when it begins interfering with your daily life, leading to addiction,\u201d Kimberly Hershenson, LMSW, a therapist practicing in New York, told Healthline. Hershenson treats individuals with social media and technology addiction. \u201cSocial media in particular is addictive given the validation factor. Getting \u2018likes\u2019 on pictures or \u2018follows\u2019 on newsfeeds affirms our existence similar to someone smiling at you in real life,\u201d she said. \u201cQuite simply, being acknowledged makes us feel good. Due to the constant availability of social media, this validation is available at our fingertips.\u201d Read more: Digital detox to cleanse yourself of the internet \u00bb The push to disconnect It might be hard to remember a time without a smartphone, but keep in mind that the iPhone is only a decade old. The internet as we know it is 25 years old. Cell phones 15 years ago did little more than send SMS messages and make calls, and connecting to people 4,000 miles away with the click of a button was talk left for futuristic sci-fi movies. Our digital addiction is new in the course of human history, and as it goes with most mainstream phenomena, a counterculture has cropped up to try to stymie it. Restaurants have started banning phones from tables. One chicken restaurant incentivizes phone-free dining by offering families who put their phones in a \u201ccell phone coop\u201d free ice cream cones at the end of the meal. Some tech companies encourage their employees to take a Digital Sabbath, a day (or at least a portion of a day) where they completely unplug and reconnect with a nondigital reality. Even new technology is popping up to answer the need for less technology. The Light Phone is a credit card sized phone that can only make calls, stores nine numbers, and displays the time. The cost is $150 for the phone and $5 in monthly phone charges. You can forward calls from your smartphone to the new phone, and leave behind the constant pings of social media and apps as often (or as little) as you\u2019d like. The demand for basic phones is growing, too. Sales of smartphones have slipped in recent years, and streamlined phones are gaining market share. All of these trends point to a slow but deliberate shift to stop \u2014 or at least better control \u2014 our digital exposure every day. Read more: What it means to have a technology addiction \u00bb How to do a digital detox Your time and your attention are two of your greatest resources. Companies will \u2014 and do \u2014 pay big money to grab as much of that as they can. Learning to take back those resources and curate your day in a more healthful, productive way starts with taking an audit of where your day is going. \u201cI\u2019m at a computer all day, every day, as part of a distributed organization,\u201d Kate Sullivan, content director for a publishing agency, told Healthline. \u201cWhile we try to be reasonable with our expectations, I work with a lot of people around the world, and that means I\u2019m often working beyond \u2018normal\u2019 hours. That takes a toll. We need downtime to recharge our batteries, especially working in a creative profession.\u201d Sullivan takes part in a digital detox every day. She instituted three \u201cunreachable\u201d periods: first thing in the morning, on her midday break, and again at the end of the day. \u201cI don\u2019t use any electronic equipment at the start and end of the day, and I control my midday use carefully,\u201d Sullivan said. \u201cThis gives me the space and time to step away from constant pings and updates and daily life \u2014 and to let my eyes and hands rest and relax instead of encouraging eyestrain and repetitive motion syndrome.\u201d Collectively, we know how to stop a digital addiction \u2014 just stop looking at your phone so much. Realistically though, that answer isn\u2019t simple. \u201cThe sympathetic nervous system, the body\u2019s natural alarm-stress response, kicks in when our devices are removed,\u201d Kersting said. \u201cIt\u2019s a physical withdrawal much like alcohol withdrawal.\u201d The idyllic way to do a digital detox involves a glamorous retreat to a no-signal oasis with beach huts and mixed drinks, but that\u2019s not realistic, and it might not break your habit long-term. Instead, look for ways to carve out tech-free times every day. Here are seven steps that can help you digitally detox as little or as much as you\u2019d like: Leave the phone behind: Try turning your phone or tablet on airplane mode or leaving it in another room while you\u2019re working or playing with the kids. Just a few hours without the phone and the constant nag to check it can help break the cycle. Stop the pings: \u201cI turned off all notifications on my phone,\u201d Susan Mahon, a digital web editor told Healthline. \u201cNot having the constant pings begging for my attention helped reduce my mental stress and made me feel more in control of my day.\u201d Hershenson suggested turning off notifications as a first step, too. \u201cSchedule times in which you check technology, such as only during your lunch break,\u201d she said. Give yourself a curfew: If you find yourself spending an hour or two swiping through Instagram or Flipbook before bed, set a phone or device cutoff time. After 9 p.m. the device goes into a drawer until you\u2019re ready to leave for the office the next day. Don\u2019t wake up with your phone: If the first thing you reach for is your phone, break the habit by leaving it in another room when you go to bed. Invest in an alarm clock, and don\u2019t touch your phone for the first hour after you wake up. If an hour seems too long, start with 15 minutes and work your way up. Establish tech-free zones: Create rules around events or places, and enforce them with every family member or guest. For example, don\u2019t bring your phone to the table, and don\u2019t take it out of your pocket or purse when you\u2019re dining with friends. If you have family movie nights, phones and tablets must stay in bedrooms. The break may feel like a fight at first, but soon, everyone will appreciate the opportunity to withdraw. Step away during the day: \u201cIn the middle of the day, instead of taking a typical lunch break, I take an hour mini-detox,\u201d Sullivan said. \u201cWhen the weather\u2019s nice, I go outside for a walk or a run. If the weather\u2019s crappy, I use the elliptical instead. I\u2019ll occasionally listen to a podcast during this time, but my phone goes on \u2018do not disturb,\u2019 and I shut down my computer. When I\u2019m constantly pinging back and forth between various requests and tasks, I can\u2019t settle into a creative flow, and I start feeling burned out.\u201d Reward yourself with tech-free times: Each day, give yourself an hour of \u201cyou time.\u201d Treat yourself to a new magazine or a few chapters of your favorite podcast (with your phone on airplane mode). Take a hike, and leave the phone behind. You can even unwind in the bathtub with your favorite tunes on a Bluetooth speaker. Just make sure the phone isn\u2019t in the room with you. You just might be tempted to start pinning new recipes or weekend projects. That\u2019s adding to your to-do list, and that\u2019s no fun at all. Read more: Is technology creating a lifetime of pain for millennials? \u00bb READ THIS NEXT How Does the 20-20-20 Rule Prevent Eye Strain? Medically reviewed by Timothy J. Legg, Ph.D., CRNP READ MORE How to Identify and Manage Phubbing Medically reviewed by Timothy J. Legg, Ph.D., CRNP Phubbing, or \u201cphone snubbing,\u201d can be harmful to your relationships and mental health. Learn how phubbing affects relationship, ways to identify this\u2026 READ MORE Social Media Is Killing Your Friendships Medically reviewed by Janet Brito, Ph.D., LCSW, CST We can only handle 150 friendships at a time. So what happens to our social energy when we\u2019re also interacting with thousands of other people online? READ MORE The Coolest Health-Tech Gadgets for 2018 From airbags for the hips to UV sensors, new high-tech gadgets for the health and well-being industry were unveiled at this year\u2019s Consumer\u2026 READ MORE Jump Roping Craze: How to Get the Most Out of This At-Home Exercise Experts say jump roping provides a quick and intense cardiovascular workout that can be done at home and with minimal equipment READ MORE Welcome to the Sustainable Table: A Letter from the Editor Written by Gabriel Dunsmith The Sustainable Table is Healthline's hub where environmental issues and nutrition meet. You can take steps right here, right now, to eat and live\u2026 READ MORE COVID-19 Is Still Raging in Much of the World: Why that Matters to the U.S. Experts say airline travel makes it easier to spread a virus worldwide. Plus, a virus has more chances to mutate as long as it is circulating\u2026 READ MORE The 3 Most Important Types of Omega-3 Fatty Acids Written by Freydis Hjalmarsdottir, MS There are 3 main types of omega-3 fatty acids in the diet: ALA, EPA and DHA. Not all of them have the same effects on your body and brain. READ MORE What Is the A-Positive Blood Type Diet? Medically reviewed by Jillian Kubala, MS, RD The blood type diet made popular by Dr. Peter D\u2019Adamo, a naturopathic physician and author of \u201cEat Right 4 Your Type,\u201d claims that following a\u2026 READ MORE Get our wellness newsletter Filter out the noise and nurture your inbox with health and wellness advice that\u2019s inclusive and rooted in medical expertise. Enter your email Your privacy is important to us About Us Newsletters Health Topics Find an Online Doctor Contact Us Advertising Policy Privacy Policy Privacy Settings \u00a9 2005-2021 Healthline Media a Red Ventures Company. All rights reserved. Our website services, content, and products are for informational purposes only. Healthline Media does not provide medical advice, diagnosis, or treatment. See additional information. AboutCareersAdvertise with us OUR BRANDS Healthline Medical News Today Greatist Psych Central[File:SWOT en.svg|A SWOT analysis, with its four elements in a 2\u00d72 matrix.", "edit_actions": [{"type": "A", "before": null, "after": "SUBSCRIBE", "start_char_pos": 0, "end_char_pos": 0}, {"type": "A", "before": null, "after": "Healthline uses cookies to improve your experience and to show you personalized ads. Privacy Policy.", "start_char_pos": 1, "end_char_pos": 1}, {"type": "A", "before": null, "after": "More information How Does Technology Affect Your Health? The Good, the Bad, and Tips for Use Medically reviewed by Karen Gill, M.D. \u2014 Written by Ann Pietrangelo on May 23, 2019 Eye strain Musculoskeletal health Sleep health Mental health Effects in kids Positive effects How to use technology Takeaway All manner of technology surrounds us. From our personal laptops, tablets, and phones to behind-the-scenes technology that furthers medicine, science, and education.", "start_char_pos": 2, "end_char_pos": 2}, {"type": "A", "before": null, "after": "Technology is here to stay, but it\u2019s always morphing and expanding. As each new technology enters the scene, it has the potential to improve lives. But, in some cases, it also has the potential to negatively affect physical and emotional health.", "start_char_pos": 3, "end_char_pos": 3}, {"type": "A", "before": null, "after": "Read on as we take a look at a few possible negative effects of technology and provide tips on healthier ways to use it.", "start_char_pos": 4, "end_char_pos": 4}, {"type": "A", "before": null, "after": "Digital eye strain According to the American Optometric Association (AOA), prolonged use of computers, tablets, and cellphones can lead to digital eye strain.", "start_char_pos": 5, "end_char_pos": 5}, {"type": "A", "before": null, "after": "Symptoms of digital eye strain may include:", "start_char_pos": 6, "end_char_pos": 6}, {"type": "A", "before": null, "after": "blurred vision dry eyes headaches neck and shoulder pain Contributing factors are screen glare, bad lighting, and improper viewing distance.", "start_char_pos": 7, "end_char_pos": 7}, {"type": "A", "before": null, "after": "The AOA recommends the 20-20-20 rule to ease eye strain. To follow this rule, try to take a 20-second break every 20 minutes to look at something that\u2019s 20 feet away.", "start_char_pos": 8, "end_char_pos": 8}, {"type": "A", "before": null, "after": "Musculoskeletal problems When you use a smartphone, the chances are that you\u2019re holding your head in an unnatural forward-leaning position. This position puts a lot of stress on your neck, shoulders, and spine.", "start_char_pos": 9, "end_char_pos": 9}, {"type": "A", "before": null, "after": "A small 2017 studyTrusted Source found a clear association between self-reported addiction to smartphone use and neck problems.", "start_char_pos": 10, "end_char_pos": 10}, {"type": "A", "before": null, "after": "An earlier study found that among teens, neck-shoulder pain and low back pain rose during the 1990s at the same time that the use of information and communication technology was increasing.", "start_char_pos": 11, "end_char_pos": 11}, {"type": "A", "before": null, "after": "Overuse of technology can also lead to repetitive strain injuries of the fingers, thumbs, and wrists.", "start_char_pos": 12, "end_char_pos": 12}, {"type": "A", "before": null, "after": "If you\u2019re feeling the pain of technology, you can take the following steps to reduce these issues:", "start_char_pos": 13, "end_char_pos": 13}, {"type": "A", "before": null, "after": "take frequent breaks to stretch create an ergonomic workspace maintain proper posture while using your devices If pain persists, see a doctor.", "start_char_pos": 14, "end_char_pos": 14}, {"type": "A", "before": null, "after": "Sleep problems Technology in the bedroom can interfere with sleep in a number of ways.", "start_char_pos": 15, "end_char_pos": 15}, {"type": "R", "before": "SWOT", "after": "2015 study demonstrated that exposure to the blue light that devices emit can suppress melatonin and interrupt your circadian clock. Both of these effects can make it harder to fall asleep and result in you being less alert in the morning.", "start_char_pos": 18, "end_char_pos": 22}, {"type": "A", "before": null, "after": "Having electronic devices in the bedroom places temptation at your fingertips, and it can make switching off more difficult. That, in turn, can make it harder to drift off when you try to sleep.", "start_char_pos": 23, "end_char_pos": 23}, {"type": "A", "before": null, "after": "ADVERTISEMENT Affordable therapy delivered digitally \u2013 Try BetterHelp Choose from BetterHelp\u2019s vast network of therapists for your therapy needs. Take a quiz, get matched, and start getting support via secure phone or video sessions. Plans start at $60 per week + an additional 10\\% off. Emotional problems Using social media can make you feel more connected to the world. But, comparing yourself to others can leave you feeling inadequate or left out. A recent study looked at the social media use of more than 1,700 people between the ages of 19 and 32. The researchers found that those with high social media use felt more socially isolated than those who spent less time on social media. A 2011 cross-sectional surveyTrusted Source of high school students in Connecticut found that internet use was problematic for about 4 percent of the participants. The researchers said that there might be an association between problematic internet use and depression, substance use, and aggressive behavior. They also noted that high school boys, who, according to the researchers, tend to be heavier users of the internet, may be less aware of these problems. A 2016 systematic reviewTrusted Source produced mixed findings on the relationship that social networks have with depression and anxiety. The evidence suggests that social network use correlates with mental illness and well-being. However, the researchers noted that whether it has a beneficial or detrimental effect depends on the quality of social factors in the social network environment. More research is necessary to make conclusions on cause and effect. If social media use makes you feel anxious or depressed, try cutting back to see if doing so makes a difference. Negative effects of technology on kids The findings of a 2014 studyTrusted Source suggest that even after factoring out junk food and exercise, technology appears to affect the health of children and teens. The researchers used a broad definition of screen time that included: television video games phones tech toys They conducted the simple correlational study using an anonymous online survey. The study authors concluded that parents and caregivers should help children learn to reduce overall screen time. According to the Mayo Clinic, unstructured playtime is better for a child\u2019s developing brain than electronic media. At 2 years old, children can benefit from some screen time, but it shouldn\u2019t replace other important learning opportunities, including playtime. Research has linked too much screen time or low-quality screen time to: behavioral problems less time for play and loss of social skills obesity sleep problems violence Like adults, children who spend a lot of time on digital devices can experience symptoms of eye strain. The AOA advises parents and caregivers to watch for signs of digital eye strain in children and to encourage frequent visual breaks. A 2018 study of adolescents ages 15 and 16 found an association between frequent use of digital media and the development of symptoms of attention deficit hyperactivity disorder (ADHD). The study involved a longitudinal cohort of students who self-reported their use of 14 digital media activities, and it included a 24-month follow-up period. More research is necessary to confirm whether it\u2019s a causal association. What are the recommendations for screen time by age? The American Academy of Pediatrics (APA) makes the following recommendations for screen time: Younger than 18 months Avoid screen time other than video chatting. 18 to 24 months Parents and caregivers can offer high-quality programs and watch them with their children. 2 to 5 years Limit to one hour per day of supervised high-quality programming. 6 years and above Place consistent limits on time and types of media. Media shouldn\u2019t interfere with adequate sleep, exercise, or other behaviors that affect health. The APA also recommends that parents and caregivers designate media-free times, such as dinner time, as well as media-free zones within the home. Positive effects of technology Technology plays a role in virtually every part of our lives, whether we\u2019re aware of it or not. These are just a few of the ways in which technology may positively affect our physical and mental health: health apps to track chronic illnesses and communicate vital information to doctors health apps that help you track diet, exercise, and mental health information online medical records that give you access to test results and allow you to fill prescriptions virtual doctor visits online education and ease of research enhanced communication with others, which can improve the feeling of connection Ways to make the most of technology With each new advance in technology, it gets a bit easier to go overboard. When we get too caught up in it, we can feel it in our minds and bodies. So, how much is too much? The answer is as individual as you are. Here are some signs that you might be leaning too heavily on technology: Your family or friends complain about your tech use. You\u2019ve neglected relationships in favor of technology, which people sometimes refer to as phubbing. It has interfered with your work. You\u2019re losing sleep or skipping physical activities due to technology use. It\u2019s causing you stress or anxiety, or you\u2019re noticing physical side effects, such as tension headaches, eye strain, muscle pain, or overuse injuries. You can\u2019t seem to stop. If that sounds familiar, here are some ways to cut back on screen time: Clear your phone of unessential apps to keep you from constantly checking it for updates. Carve out a specific, limited amount of time to use your devices. Turn some television time into physical activity time. Keep electronic devices out of the bedroom. Charge them in another room. Turn clocks and other glowing devices toward the wall at bedtime. Make mealtime gadget-free time. Prioritize real-world relationships over online relationships. If you\u2019re responsible for children: Limit their screen time, allowing it only at certain times of the day and restricting it during activities like meals and just before bedtime. Know what they\u2019re doing. Review their programs, games, and apps, and encourage the engaging ones over those that are passive. Play games and explore technology together. Take advantage of parental controls. Make sure that children have regular, unstructured, tech-free playtime. Encourage face time over online friendships. Takeaway Technology is a part of our lives. It can have some negative effects, but it can also offer many positive benefits and play an important role in education, health, and general welfare. Knowing the possible negative effects can help you take steps to identify and minimize them so that you can still enjoy the positive aspects of technology. Last medically reviewed on May 23, 2019 13 sourcescollapsed HEALTH NEWS Step Away from the Smartphone: How to Do a Digital Detox Written by Kimberly Holland \u2014 Updated on June 16, 2017 Experts say there are some simple things you can do during your day to reduce your exposure to digital technology. You open an app on your smartphone to clear an alert. And look! A friend posted a picture from her vacation in Bora Bora. The next thing you know you\u2019ve clicked through the entirety of her 43-photo album. You\u2019ve also opened three browser windows to scope out the best time to travel to the Pacific island, how to get a deal on four-star resorts, and what bathing suit is best for your body type. The bathing suit site prompts you to see its latest look on Instagram, where you have three new messages and 15 new likes to see. An hour later, you remembered you were just trying to plan your meals for the week, and now you\u2019re following Bora Bora natives and pinning a new straw hat for the beach to your \u201cDream Trip\u201d board. This digital time drain is real. Having our phones, laptops, smart watches, and tablets constantly within reach has made us hyperconnected \u2014 and hyperdistracted. We feel attached to the people and lives on our phones, but disconnected from our real life storylines. Tom Kersting, PhD, is a licensed psychotherapist, and author of \u201cDisconnected: How to Reconnect Our Digitally Distracted Kids.\u201d \u201cNo matter where you look, it seems that everyone is disengaged from the moment and instead staring at a device,\u201d he told Healthline. \u201cThis is causing family issues, work issues, etcetera, as we become more disconnected from each other. These are classic signs of addiction.\u201d Think addiction is too strong a word for the constant need to check, and check again, everything from Instagram likes to work emails? Perhaps not. \u201cTechnology becomes a problem when it begins interfering with your daily life, leading to addiction,\u201d Kimberly Hershenson, LMSW, a therapist practicing in New York, told Healthline. Hershenson treats individuals with social media and technology addiction. \u201cSocial media in particular is addictive given the validation factor. Getting \u2018likes\u2019 on pictures or \u2018follows\u2019 on newsfeeds affirms our existence similar to someone smiling at you in real life,\u201d she said. \u201cQuite simply, being acknowledged makes us feel good. Due to the constant availability of social media, this validation is available at our fingertips.\u201d Read more: Digital detox to cleanse yourself of the internet \u00bb The push to disconnect It might be hard to remember a time without a smartphone, but keep in mind that the iPhone is only a decade old. The internet as we know it is 25 years old. Cell phones 15 years ago did little more than send SMS messages and make calls, and connecting to people 4,000 miles away with the click of a button was talk left for futuristic sci-fi movies. Our digital addiction is new in the course of human history, and as it goes with most mainstream phenomena, a counterculture has cropped up to try to stymie it. Restaurants have started banning phones from tables. One chicken restaurant incentivizes phone-free dining by offering families who put their phones in a \u201ccell phone coop\u201d free ice cream cones at the end of the meal. Some tech companies encourage their employees to take a Digital Sabbath, a day (or at least a portion of a day) where they completely unplug and reconnect with a nondigital reality. Even new technology is popping up to answer the need for less technology. The Light Phone is a credit card sized phone that can only make calls, stores nine numbers, and displays the time. The cost is $150 for the phone and $5 in monthly phone charges. You can forward calls from your smartphone to the new phone, and leave behind the constant pings of social media and apps as often (or as little) as you\u2019d like.", "start_char_pos": 24, "end_char_pos": 24}, {"type": "A", "before": null, "after": "The demand for basic phones is growing, too. Sales of smartphones have slipped in recent years, and streamlined phones are gaining market share.", "start_char_pos": 25, "end_char_pos": 25}, {"type": "A", "before": null, "after": "All of these trends point to a slow but deliberate shift to stop \u2014 or at least better control \u2014 our digital exposure every day.", "start_char_pos": 26, "end_char_pos": 26}, {"type": "A", "before": null, "after": "Read more: What it means to have a technology addiction \u00bb", "start_char_pos": 27, "end_char_pos": 27}, {"type": "A", "before": null, "after": "How to do a digital detox Your time and your attention are two of your greatest resources.", "start_char_pos": 28, "end_char_pos": 28}, {"type": "A", "before": null, "after": "Companies will \u2014 and do \u2014 pay big money to grab as much of that as they can.", "start_char_pos": 29, "end_char_pos": 29}, {"type": "A", "before": null, "after": "Learning to take back those resources and curate your day in a more healthful, productive way starts with taking an audit of where your day is going.", "start_char_pos": 30, "end_char_pos": 30}, {"type": "A", "before": null, "after": "\u201cI\u2019m at a computer all day, every day, as part of a distributed organization,\u201d Kate Sullivan, content director for a publishing agency, told Healthline. \u201cWhile we try to be reasonable with our expectations, I work with a lot of people around the world, and that means I\u2019m often working beyond \u2018normal\u2019 hours. That takes a toll. We need downtime to recharge our batteries, especially working in a creative profession.\u201d", "start_char_pos": 31, "end_char_pos": 31}, {"type": "A", "before": null, "after": "Sullivan takes part in a digital detox every day. She instituted three \u201cunreachable\u201d periods: first thing in the morning, on her midday break, and again at the end of the day.", "start_char_pos": 32, "end_char_pos": 32}, {"type": "A", "before": null, "after": "\u201cI don\u2019t use any electronic equipment at the start and end of the day, and I control my midday use carefully,\u201d Sullivan said. \u201cThis gives me the space and time to step away from constant pings and updates and daily life \u2014 and to let my eyes and hands rest and relax instead of encouraging eyestrain and repetitive motion syndrome.\u201d", "start_char_pos": 33, "end_char_pos": 33}, {"type": "A", "before": null, "after": "Collectively, we know how to stop a digital addiction \u2014 just stop looking at your phone so much. Realistically though, that answer isn\u2019t simple.", "start_char_pos": 34, "end_char_pos": 34}, {"type": "A", "before": null, "after": "\u201cThe sympathetic nervous system, the body\u2019s natural alarm-stress response, kicks in when our devices are removed,\u201d Kersting said. \u201cIt\u2019s a physical withdrawal much like alcohol withdrawal.\u201d", "start_char_pos": 35, "end_char_pos": 35}, {"type": "A", "before": null, "after": "The idyllic way to do a digital detox involves a glamorous retreat to a no-signal oasis with beach huts and mixed drinks, but that\u2019s not realistic, and it might not break your habit long-term.", "start_char_pos": 36, "end_char_pos": 36}, {"type": "A", "before": null, "after": "Instead, look for ways to carve out tech-free times every day. Here are seven steps that can help you digitally detox as little or as much as you\u2019d like:", "start_char_pos": 37, "end_char_pos": 37}, {"type": "A", "before": null, "after": "Leave the phone behind: Try turning your phone or tablet on airplane mode or leaving it in another room while you\u2019re working or playing with the kids. Just a few hours without the phone and the constant nag to check it can help break the cycle.", "start_char_pos": 38, "end_char_pos": 38}, {"type": "A", "before": null, "after": "Stop the pings: \u201cI turned off all notifications on my phone,\u201d Susan Mahon, a digital web editor told Healthline. \u201cNot having the constant pings begging for my attention helped reduce my mental stress and made me feel more in control of my day.\u201d", "start_char_pos": 39, "end_char_pos": 39}, {"type": "A", "before": null, "after": "Hershenson suggested turning off notifications as a first step, too.", "start_char_pos": 40, "end_char_pos": 40}, {"type": "A", "before": null, "after": "\u201cSchedule times in which you check technology, such as only during your lunch break,\u201d she said.", "start_char_pos": 41, "end_char_pos": 41}, {"type": "A", "before": null, "after": "Give yourself a curfew: If you find yourself spending an hour or two swiping through Instagram or Flipbook before bed, set a phone or device cutoff time. After 9 p.m. the device goes into a drawer until you\u2019re ready to leave for the office the next day.", "start_char_pos": 42, "end_char_pos": 42}, {"type": "A", "before": null, "after": "Don\u2019t wake up with your phone: If the first thing you reach for is your phone, break the habit by leaving it in another room when you go to bed. Invest in an alarm clock, and don\u2019t touch your phone for the first hour after you wake up. If an hour seems too long, start with 15 minutes and work your way up.", "start_char_pos": 43, "end_char_pos": 43}, {"type": "A", "before": null, "after": "Establish tech-free zones: Create rules around events or places, and enforce them with every family member or guest. For example, don\u2019t bring your phone to the table, and don\u2019t take it out of your pocket or purse when you\u2019re dining with friends. If you have family movie nights, phones and tablets must stay in bedrooms. The break may feel like a fight at first, but soon, everyone will appreciate the opportunity to withdraw.", "start_char_pos": 44, "end_char_pos": 44}, {"type": "A", "before": null, "after": "Step away during the day: \u201cIn the middle of the day, instead of taking a typical lunch break, I take an hour mini-detox,\u201d Sullivan said. \u201cWhen the weather\u2019s nice, I go outside for a walk or a run. If the weather\u2019s crappy, I use the elliptical instead. I\u2019ll occasionally listen to a podcast during this time, but my phone goes on \u2018do not disturb,\u2019 and I shut down my computer. When I\u2019m constantly pinging back and forth between various requests and tasks, I can\u2019t settle into a creative flow, and I start feeling burned out.\u201d", "start_char_pos": 45, "end_char_pos": 45}, {"type": "A", "before": null, "after": "Reward yourself with tech-free times: Each day, give yourself an hour of \u201cyou time.\u201d Treat yourself to a new magazine or a few chapters of your favorite podcast (with your phone on airplane mode). Take a hike, and leave the phone behind. You can even unwind in the bathtub with your favorite tunes on a Bluetooth speaker. Just make sure the phone isn\u2019t in the room with you. You just might be tempted to start pinning new recipes or weekend projects. That\u2019s adding to your to-do list, and that\u2019s no fun at all.", "start_char_pos": 46, "end_char_pos": 46}, {"type": "A", "before": null, "after": "Read more: Is technology creating a lifetime of pain for millennials? \u00bb", "start_char_pos": 47, "end_char_pos": 47}, {"type": "A", "before": null, "after": "READ THIS NEXT How Does the 20-20-20 Rule Prevent Eye Strain? Medically reviewed by Timothy J. Legg, Ph.D., CRNP READ MORE How to Identify and Manage Phubbing Medically reviewed by Timothy J. Legg, Ph.D., CRNP Phubbing, or \u201cphone snubbing,\u201d can be harmful to your relationships and mental health. Learn how phubbing affects relationship, ways to identify this\u2026", "start_char_pos": 48, "end_char_pos": 48}, {"type": "A", "before": null, "after": "READ MORE Social Media Is Killing Your Friendships Medically reviewed by Janet Brito, Ph.D., LCSW, CST We can only handle 150 friendships at a time. So what happens to our social energy when we\u2019re also interacting with thousands of other people online?", "start_char_pos": 49, "end_char_pos": 49}, {"type": "A", "before": null, "after": "READ MORE The Coolest Health-Tech Gadgets for 2018 From airbags for the hips to UV sensors, new high-tech gadgets for the health and well-being industry were unveiled at this year\u2019s Consumer\u2026", "start_char_pos": 50, "end_char_pos": 50}, {"type": "A", "before": null, "after": "READ MORE Jump Roping Craze: How to Get the Most Out of This At-Home Exercise Experts say jump roping provides a quick and intense cardiovascular workout that can be done at home and with minimal equipment", "start_char_pos": 51, "end_char_pos": 51}, {"type": "A", "before": null, "after": "READ MORE Welcome to the Sustainable Table: A Letter from the Editor Written by Gabriel Dunsmith The Sustainable Table is Healthline's hub where environmental issues and nutrition meet. You can take steps right here, right now, to eat and live\u2026", "start_char_pos": 52, "end_char_pos": 52}, {"type": "A", "before": null, "after": "READ MORE COVID-19 Is Still Raging in Much of the World: Why that Matters to the U.S. Experts say airline travel makes it easier to spread a virus worldwide. Plus, a virus has more chances to mutate as long as it is circulating\u2026", "start_char_pos": 53, "end_char_pos": 53}, {"type": "A", "before": null, "after": "READ MORE The 3 Most Important Types of Omega-3 Fatty Acids Written by Freydis Hjalmarsdottir, MS There are 3 main types of omega-3 fatty acids in the diet: ALA, EPA and DHA. Not all of them have the same effects on your body and brain.", "start_char_pos": 54, "end_char_pos": 54}, {"type": "A", "before": null, "after": "READ MORE What Is the A-Positive Blood Type Diet? Medically reviewed by Jillian Kubala, MS, RD The blood type diet made popular by Dr. Peter D\u2019Adamo, a naturopathic physician and author of \u201cEat Right 4 Your Type,\u201d claims that following a\u2026", "start_char_pos": 55, "end_char_pos": 55}, {"type": "A", "before": null, "after": "READ MORE Get our wellness newsletter Filter out the noise and nurture your inbox with health and wellness advice that\u2019s inclusive and rooted in medical expertise.", "start_char_pos": 56, "end_char_pos": 56}, {"type": "A", "before": null, "after": "Enter your email Your privacy is important to us", "start_char_pos": 57, "end_char_pos": 57}, {"type": "A", "before": null, "after": "About Us Newsletters Health Topics Find an Online Doctor Contact Us Advertising Policy Privacy Policy Privacy Settings \u00a9 2005-2021 Healthline Media a Red Ventures Company. All rights reserved. Our website services, content, and products are for informational purposes only. Healthline Media does not provide medical advice, diagnosis, or treatment. See additional information. AboutCareersAdvertise with us OUR BRANDS", "start_char_pos": 58, "end_char_pos": 58}, {"type": "A", "before": null, "after": "Healthline Medical News Today Greatist Psych Central", "start_char_pos": 59, "end_char_pos": 59}, {"type": "A", "before": null, "after": "File:SWOT en.svg|A SWOT", "start_char_pos": 60, "end_char_pos": 60}], "sents_char_pos": [0]}
+{"doc_id": "295601", "revision_depth": "2", "before_revision": "Dynamic positioning may either be absolute in that the position is locked to a fixed point over the bottom or relative to a moving object like another ship or an underwater vehicle. One may also position the ship at a favourable angle towards wind, waves and current, called weathervaning. As part of Project Mohole, in 1961 the drillship Cuss 1 was fitted with four steerable propellers. The Mohole project was attempting to drill to the Moho, which required a solution for deepwater drilling. It was possible to keep the ship in position above a well of La Jolla, California, at a depth of 948 meters. After this, off the coast of Guadalupe, Mexico, five holes were drilled, the deepest at 183 m (601 ft) below the seafloor in 3,500 m (11,700 ft) of water, while maintaining a position within a radius of 180 meters. The ship's position was determined by radar ranging to buoys and sonar ranging from subsea beacons. While the first DP ships had analogue controllers and lacked redundancy since then vast improvements have been made. Besides that, DP nowadays is not only used in the oil industry but also on various other types of ships. In addition, DP is not limited to maintaining a fixed position any more. One of the possibilities is sailing an exact track, useful for cablelay, pipelay, survey and other tasks. Comparison between position-keeping options Other methods of position-keeping are the use of an anchor spread and the use of a jack-up barge. All have their own advantages and disadvantages. Comparison position-keeping optionsJack-up bargeAnchoringDynamic positioningAdvantages: No complex systems with thrusters, extra generators and controllers. No chance of running off position by system failures or blackouts. No underwater hazards from thrusters.Advantages: No complex systems with thrusters, extra generators and controllers. No chance of running off position by system failures or blackouts. No underwater hazards from thrusters.Advantages: Maneuverability is excellent; it is easy to change position. No anchor handling tugs are required. Not dependent on water depth. Quick set-up. Not limited by the obstructed seabed.Disadvantages: No manoeuvrability once positioned. Limited to water depths of 175 meters.Disadvantages: Limited manoeuvrability once anchored. Anchor handling tugs are required. Less suitable in deep water. Time to anchor out varies between several hours to several days. Limited by obstructed seabed (pipelines, seabed).Disadvantages: Complex systems with thrusters, extra generators and controllers. High initial costs of installation. High fuel costs. Chance of running off position in case of strong currents or winds, or due to system failures or blackouts. Underwater hazards from thrusters for divers and ROVs. Higher maintenance of the mechanical systems. Dynamic positioning is concerned primarily with the control of the ship in the horizontal plane, i.e., the three axes: surge, sway and yaw. Requirements A ship that is to be used for DP requires: to maintain position and heading, first of all , the position and heading need to be known. a control computer to calculate the required control actions to maintain position and correct for position errors. thrust elements to apply forces to the ship as demanded by the control system. Position reference systems There are several means to determine a ship's position at sea. Most traditional methods used for ships navigation are not accurate enough for some modern requirements. For that reason, several positioning systems have been developed during the past decades. Producers of DP systems are: Marine Technologies LLC, Kongsberg Maritime, Navis Engineering Oy, GE, DCNS, Wartsila (ex L-3), MT-div.Chouest, Rolls-Royce plc, Praxis Automation Technology. The applications and availability depend on the type of work and water depth. The most common Position reference/Measuring systems /Equipment (PRS/PME) are: GPS satellite in orbit DGPS, Differential GPS. The position obtained by GPS is not accurate enough for use by DP. The position is improved by the use of a fixed ground-based reference station (differential station) that compares the GPS position to the known position of the station. The correction is sent to the DGPS receiver by long-wave radiofrequency . For use in DP , even higher accuracy and reliability are needed. Companies such as Veripos, Fugro or C-Nav supply differential signals via satellite, enabling the combination of several differential stations. The advantage of DGPS is that it is almost always available. Disadvantages include degradation of the signal by ionospheric or atmospheric disturbances, blockage of satellites by cranes or structures and deterioration of the signal at high altitudes. There are also systems installed on vessels that use various Augmentation systems, as well as combining GPS position with GLONASS. Acoustics. This system consists of one or more transponders placed on the seabed and a transducer placed in the ship's hull. The transducer sends an acoustic signal (by means of piezoelectric elements) to the transponder, which is triggered to reply. As the velocity of sound through water is known (preferably a sound profile is taken regularly), the distance is known. Because there are many elements on the transducer, the direction of the signal from the transponder can be determined. Now the position of the ship relative to the transponder can be calculated. Disadvantages are the vulnerability to the noise by thrusters or other acoustic systems. The use is limited in shallow waters because of ray bending that occurs when sound travels through the water horizontally. Three types of HPR systems are commonly used: Ultra- or super- short baseline , USBL or SSBL. This works as described above. Because the angle to the transponder is measured, a correction needs to be made for the ship's roll and pitch. These are determined by Motion Reference Units. Because of the nature of angle measurement, the accuracy deteriorates with increasing water depth. Long baseline , LBL. This consists of an array of at least three transponders. The initial position of the transponders is determined by USBL and/ or by measuring the baselines between the transponders. Once that is done, only the ranges to the transponders need to be measured to determine a relative position. The position should theoretically be located at the intersection of imaginary spheres, one around each transponder, with a radius equal to the time between transmission and reception multiplied by the speed of sound through water. Because angle measurement is not necessary, the accuracy in large water depths is better than USBL. Short baseline, SBL. This works with an array of transducers in the ship's hull. These determine their position to a transponder, so a solution is found in the same way as with LBL. As the array is located on the ship, it needs to be corrected for roll and pitch. Riser Angle Monitoring. On drillships, riser angle monitoring can be fed into the DP system. It may be an electrical inclinometer or based on USBL, where a riser angle monitoring transponder is fitted to the riser and a remote inclinometer unit is installed on the Blow Out Preventer (BOP) and interrogated through the ship's HPR. Light taut wire on the HOS Achiever Light taut wire, LTW or LWTW. The oldest position reference system used for DP is still very accurate in relatively shallow water. A clump weight is lowered to the seabed. By measuring the amount of wire paid out and the angle of the wire by a gimbal head, the relative position can be calculated. Care should be taken not to let the wire angle become too large to avoid dragging. For deeper water , the system is less favourable, as the current will curve the wire. There are however systems that counteract this with a gimbal head on the clump weight . Horizontal LTW's are also used when operating close to a structure. Objects falling on the wire are a risk here. Fanbeam and CyScan. These are laser-based position reference systems. They are very straightforward system, as only a prism cluster or tape target needs to be installed on a nearby structure or ship. Risks are the system locking on other reflecting objects and blocking of the signal. However, the Cyscan Absolute Signature which was released in 2017 was launched to address this issue. It is able to engage in an active lock with the Absolute Signature prism which reduces the chance of a wrong target being tracked. Range depends on the weather but is typically more than 500 meters. New advancement from Guidance Marine led to the development of the SceneScan sensor which is a target-less laser PRS leveraging on the SLAM algorithm. Artemis. A radar-based system. A unit is placed on an FPSO (Fixed Station) and the unit onboard the Shuttle Tanker (Mobile Station) locks to report the Range and Bearing. The range is in excess of 4 kilometres. The advantage is the reliable, all-weather performance. The disadvantage is that the unit is rather heavy and costly. Current version is the Artemis Mk6. DARPS, Differential, Absolute and Relative Positioning System. Commonly used on shuttle tankers while loading from a FPSO. Both will have a GPS receiver. As the errors are the same for both of them, the signal does not need to be corrected. The position from the FPSO is transmitted to the shuttle tanker, so a range and bearing can be calculated and fed into the DP system. RADius and RadaScan. These are radar-based system, while the RADius has no moving parts, the RadaScan has a rotating antenna under the dome. Guidance Marine has improved the miniRadaScan with the RadaScan View which has an added advantage of radar back-scatter. This enhanced the DPO's situational awareness. These systems usually have responders which are active targets that send the signal back to the sensor to report the range and bearing. The range is typically up to 600 meters. Inertial navigation is used in combination with any of the above reference systems, but typically with GNSS (Global Navigation Satellite System) and Hydroacoustics (USBL, LBL, or SBL). Sensors Besides position and heading, other variables are fed into the DP system through sensors: Motion reference units, vertical reference units or vertical reference sensors, VRUs or MRUs or VRSs, determine the ship's roll, pitch and heave. Wind sensors are fed into the DP system feedforward, so the system can anticipate wind gusts before the ship is blown off position. Draught sensors, since a change of draught influences the effect of wind and current on the hull. Other sensors depend on the kind of ship. A pipelay ship may measure the force needed to pull on the pipe, large crane vessels will have sensors to determine the cranes ' position, as this changes the wind model, enabling the calculation of a more accurate model (see Control systems). Some external forces are not directly measured. In these cases, the offset force is deduced over a period of time, allowing an average value of compensating thrust to be applied. All forces not attributable to direct measurement are labelled \"current\", as this is what they are assumed to be, but in reality , this is a combination of current, waves, swell, and any errors in the system. As is traditional in the maritime industry, DP \"current\" is always recorded in the direction that it is flowing towards. Control systems 350px|Block diagram of control system At the beginning PID controllers were used and today is still used in the simpler DP systems. But modern controllers use a mathematical model of the ship that is based on a hydrodynamic and aerodynamic description concerning some of the ship's characteristics such as mass and drag. Of course, this model is not entirely correct. The ship's position and heading are fed into the system and compared with the prediction made by the model. This difference is used to update the model by using Kalman filtering technique. For this reason, the model also has input from the wind sensors and feedback from the thrusters. This method even allows not having input from any PRS for some time, depending on the quality of the model and the weather. This process is known as dead reckoning. The accuracy and precision of the different PRSs is not the same. While a DGPS has high accuracy and precision, a USBL can have much lower precision. For this reason, the PRS's are weighted. Based on variance a PRS receives a weight between 0 and 1. Equipment Class 1 has no redundancy.Loss of position may occur in the event of a single fault. Equipment Class 2 has redundancy so that no single fault in an active system will cause the system to fail.Loss of position should not occur from a single fault of an active component or system such as generators, thruster, switchboards, remote-controlled valves etc., but may occur after the failure of a static component such as cables, pipes, manual valves etc. Equipment Class 3 which also has to withstand fire or flood in any one compartment without the system failing.Loss of position should not occur from any single failure including a completely burnt fire sub division or flooded watertight compartment. Class 0 Operations where the loss of position keeping capability is not considered to endanger human lives, or cause damage. Class 1 Operations where the loss of position keeping capability may cause damage or pollution of small consequence. Class 2 Operations where the loss of position keeping capability may cause personnel injury, pollution, or damage with large economic consequences. Class 3 Operations where the loss of position keeping capability may cause fatal accidents or severe pollution or damage with major economic consequences. Based on this the type of ship is specified for each operation: Class 1 DP units with equipment class 1 should be used during operations where the loss of position is not considered to endanger human lives, cause significant damage or cause more than minimal pollution. Class 2 DP units with equipment class 2 should be used during operations where the loss of position could cause personnel injury, pollution or damage with great economic consequences. Class 3 DP units with equipment class 3 should be used during operations where the loss of position could cause fatal accidents, severe pollution or damage with major economic consequences. Dynamic positioning failure results in an inability to maintain a position or heading control and can be adrift off caused by insufficient thrust, or a drive off caused by inappropriate thrust. Risk of runoff Consequences \u2013 for drilling, diving and other operations. Injury to divers is possible, Damage to diving equipment including the cutting of diver's umbilical has occurred. Mitigation \u2013 dealing with a runoff \u2013 training and competence \u2013 emergency drills. Dynamic positioning alarm and runout response for bell divers Code amber /Yellow alert - Divers return to the bell immediately, stow umbilicals, and stand by for further developments and instructions. Code red - Divers return to the bell without delaying to retrieve tools and prepare for the immediate ascent. The bell can not be recovered until the umbilicals have been safely stowed. The basic response with a closed bell is similar to the wet bell, but after stowing umbilicals, the hatch will be sealed so that internal pressure can be retained. The bell will be recovered as rapidly as possible in a red alert, and may be recovered if there is doubt that a yellow alert will be downgraded. For certain operations , redundancy is not required. For instance, if a survey ship loses its DP capability, there is normally no risk of damage or injuries. These operations will normally be done in Class 1. To have sufficient redundancy, enough generators and thrusters should be on-line so the failure of one does not result in a loss of position. This is left to the judgment of the DP operator. For Class 2 and Class 3 , a Consequence Analysis should be incorporated into the system to assist the DPO in this process. The redundancy of a DP ship should be judged by a failure mode and effects analysis (FMEA) study and proved by FMEA trials. %DIFDELCMD < %DIFDELCMD < %%% These FMEA trials should: show the breakdown of the system into major subsystems and highlight the functional relationships highlight interfaces, experience show that a lot of failures occur on the interfaces and too often these interfaces are not addressed during an FMEA as people focus too much on components show the different operating modes (this may require different diagrams) show redundancies and other mitigations against system failure have all subsystems, components, inputs and outputs clearly labelled as one needs to refer to this in the FMEA. Besides that, annual trials are done and normally DP function tests are completed prior to each project. When the watchkeeping is done on a Class 1 DP ship, a limited certificate will be issued; otherwise , a full certificate will be issued. Marine Technology Society Dynamic Positioning Committee The Marine Technology Society Dynamic Positioning (DP) Committee's mission is to facilitate incident-free DP operations through the sharing of knowledge. This committee of dedicated volunteers delivers value to the DP community of vessel owners, operators, Marine Class Societies, engineers and regulators through an annual DP Conference, topical workshops and an extensive set of Guidance Documents covering DP Design Philosophy, DP Operations and Professional Development of DP Personnel. In addition, a growing set of unique documents called TECHOP's address specific topics of significant interest and impact. Conference papers are available for download by the public, providing the most comprehensive single source of DP industry technical papers available anywhere. The DP Guidance documents published by the MTS DP Committee are designed to disseminate the knowledge, methods and unique tools to aid the DP community in achieving incident-free DP operations. The documents are free to download from the Committee's website URL", "after_revision": "Dynamic positioning may either be absolute in that the position is locked to a fixed point over the bottom , or relative to a moving object like another ship or an underwater vehicle. One may also position the ship at a favorable angle towards wind, waves and current, called weathervaning. As part of Project Mohole, in 1961 the drillship Cuss 1 was fitted with four steerable propellers. The Mohole project was attempting to drill to the Moho, which required a solution for deep water drilling. It was possible to keep the ship in position above a well off La Jolla, California, at a depth of 948 meters. After this, off the coast of Guadalupe, Mexico, five holes were drilled, the deepest at 183 m (601 ft) below the sea floor in 3,500 m (11,700 ft) of water, while maintaining a position within a radius of 180 meters. The ship's position was determined by radar ranging to buoys and sonar ranging from subsea beacons. While the first DP ships had analogue controllers and lacked redundancy , since then vast improvements have been made. Besides that, DP nowadays is not only used in the oil industry , but also on various other types of ships. In addition, DP is not limited to maintaining a fixed position any more. One of the possibilities is sailing an exact track, useful for cablelay, pipelay, survey and other tasks. Comparison between position-keeping options Other methods of position-keeping are the use of an anchor spread and the use of a jack-up barge. All have their own advantages and disadvantages. Comparison position-keeping optionsJack-up bargeAnchoringDynamic positioningAdvantages: No complex systems with thrusters, extra generators and controllers. No chance of running off position by system failures or blackouts. No underwater hazards from thrusters.Advantages: No complex systems with thrusters, extra generators and controllers. No chance of running off position by system failures or blackouts. No underwater hazards from thrusters.Advantages: Maneuverability is excellent; it is easy to change position. No anchor handling tugs are required. Not dependent on water depth. Quick set-up. Not limited by obstructed seabed.Disadvantages: No maneuverability once positioned. Limited to water depths of 175 meters.Disadvantages: Limited maneuverability once anchored. Anchor handling tugs are required. Less suitable in deep water. Time to anchor out varies between several hours to several days. Limited by obstructed seabed (pipelines, seabed).Disadvantages: Complex systems with thrusters, extra generators and controllers. High initial costs of installation. High fuel costs. Chance of running off position in case of strong currents or winds, or due to system failures or blackouts. Underwater hazards from thrusters for divers and ROVs. Higher maintenance of the mechanical systems. Dynamic positioning is concerned primarily with control of the ship in the horizontal plane, i.e., the three axes: surge, sway and yaw. Requirements A ship that is to be used for DP requires: to maintain position and heading, first of all the position and heading need to be known. a control computer to calculate the required control actions to maintain position and correct for position errors. thrust elements to apply forces to the ship as demanded by the control system. Position reference systems There are several means to determine a ship's position at sea. Most traditional methods used for ships navigation are not accurate enough for some modern requirements. For that reason, several positioning systems have been developed during the past decades. Producers of DP systems are: Marine Technologies LLC, Kongsberg Maritime, Navis Engineering Oy, GE, DCNS, Wartsila (ex L-3), MT-div.Chouest, Rolls-Royce plc, Praxis Automation Technology. The applications and availability depends on the type of work and water depth. The most common Position reference/Measuring systems /Equipment (PRS/PME) are: GPS satellite in orbit DGPS, Differential GPS. The position obtained by GPS is not accurate enough for use by DP. The position is improved by use of a fixed ground-based reference station (differential station) that compares the GPS position to the known position of the station. The correction is sent to the DGPS receiver by long wave radio frequency . For use in DP an even higher accuracy and reliability is needed. Companies such as Veripos, Fugro or C-Nav supply differential signals via satellite, enabling the combination of several differential stations. The advantage of DGPS is that it is almost always available. Disadvantages include degradation of the signal by ionospheric or atmospheric disturbances, blockage of satellites by cranes or structures and deterioration of the signal at high altitudes. There are also systems installed on vessels that use various Augmentation systems, as well as combining GPS position with GLONASS. Acoustics. This system consists of one or more transponders placed on the seabed and a transducer placed in the ship's hull. The transducer sends an acoustic signal (by means of piezoelectric elements) to the transponder, which is triggered to reply. As the velocity of sound through water is known (preferably a soundprofile is taken regularly), the distance is known. Because there are many elements on the transducer, the direction of the signal from the transponder can be determined. Now the position of the ship relative to the transponder can be calculated. Disadvantages are the vulnerability to noise by thrusters or other acoustic systems. The use is limited in shallow waters because of ray bending that occurs when sound travels through water horizontally. Three types of HPR systems are commonly used: Ultra- or super- short base line , USBL or SSBL. This works as described above. Because the angle to the transponder is measured, a correction needs to be made for the ship's roll and pitch. These are determined by Motion Reference Units. Because of the nature of angle measurement, the accuracy deteriorates with increasing water depth. Long base line , LBL. This consists of an array of at least three transponders. The initial position of the transponders is determined by USBL and/ or by measuring the baselines between the transponders. Once that is done, only the ranges to the transponders need to be measured to determine a relative position. The position should theoretically be located at the intersection of imaginary spheres, one around each transponder, with a radius equal to the time between transmission and reception multiplied by the speed of sound through water. Because angle measurement is not necessary, the accuracy in large water depths is better than USBL. Short baseline, SBL. This works with an array of transducers in the ship's hull. These determine their position to a transponder, so a solution is found in the same way as with LBL. As the array is located on the ship, it needs to be corrected for roll and pitch. Riser Angle Monitoring. On drillships, riser angle monitoring can be fed into the DP system. It may be an electrical inclinometer or based on USBL, where a riser angle monitoring transponder is fitted to the riser and a remote inclinometer unit is installed on the Blow Out Preventer (BOP) and interrogated through the ship's HPR. Light taut wire on the HOS Achiever Light taut wire, LTW or LWTW. The oldest position reference system used for DP is still very accurate in relatively shallow water. A clumpweight is lowered to the seabed. By measuring the amount of wire paid out and the angle of the wire by a gimbal head, the relative position can be calculated. Care should be taken not to let the wire angle become too large to avoid dragging. For deeper water the system is less favourable, as current will curve the wire. There are however systems that counteract this with a gimbal head on the clumpweight . Horizontal LTW's are also used when operating close to a structure. Objects falling on the wire are a risk here. Fanbeam and CyScan. These are laser based position reference systems. They are very straightforward system, as only a prism cluster or tape target needs to be installed on a nearby structure or ship. Risks are the system locking on other reflecting objects and blocking of the signal. However, the Cyscan Absolute Signature which was released in 2017 was launched to address this issue. It is able to engage in an active lock with the Absolute Signature prism which reduces the chance of a wrong target being tracked. Range depends on the weather , but is typically more than 500 meters. New advancement from Guidance Marine led to the development of the SceneScan sensor which is a target-less laser PRS leveraging on the SLAM algorithm. Artemis. A radar-based system. A unit is placed on a FPSO (Fixed Station) and the unit on board the Shuttle Tanker (Mobile Station) locks to report the Range and Bearing. The range is in excess of 4 kilometers. Advantage is the reliable, all-weather performance. Disadvantage is that the unit is rather heavy and costly. Current version is the Artemis Mk6. DARPS, Differential, Absolute and Relative Positioning System. Commonly used on shuttle tankers while loading from a FPSO. Both will have a GPS receiver. As the errors are the same for the both of them, the signal does not need to be corrected. The position from the FPSO is transmitted to the shuttle tanker, so a range and bearing can be calculated and fed into the DP system. RADius and RadaScan. These are radar based system, while the RADius have no moving parts, the RadaScan has a rotating antenna under the dome. Guidance Marine has improved the miniRadaScan with the RadaScan View which has an added advantage of radar back-scatter. This enhanced the DPO's situational awareness. These systems usually have responders which are active targets that sends the signal back to the sensor to report the range and bearing. The range is typically up to 600 meters. Inertial navigation is used in combination with any of the above reference systems, but typically with gnss (Global Navigation Satellite System) and Hydroacoustics (USBL, LBL, or SBL). Sensors Besides position and heading, other variables are fed into the DP system through sensors: Motion reference units, vertical reference units or vertical reference sensors, VRUs or MRUs or VRSs, determine the ship's roll, pitch and heave. Wind sensors are fed into the DP system feedforward, so the system can anticipate wind gusts before the ship is blown off position. Draught sensors, since a change of draught influences the effect of wind and current on the hull. Other sensors depend on the kind of ship. A pipelay ship may measure the force needed to pull on the pipe, large crane vessels will have sensors to determine the cranes position, as this changes the wind model, enabling the calculation of a more accurate model (see Control systems). Some external forces are not directly measured. In these cases, the offset force is deduced over a period of time, allowing an average value of compensating thrust to be applied. All forces not attributable to direct measurement are labeled \"current\", as this is what they are assumed to be, but in reality this is a combination of current, waves, swell, and any errors in the system. As is traditional in the maritime industry, DP \"current\" is always recorded in the direction that it is flowing towards. Control systems 350px|Block diagram of control system In the beginning PID controllers were used and today are still used in the simpler DP systems. But modern controllers use a mathematical model of the ship that is based on a hydrodynamic and aerodynamic description concerning some of the ship's characteristics such as mass and drag. Of course, this model is not entirely correct. The ship's position and heading are fed into the system and compared with the prediction made by the model. This difference is used to update the model by using Kalman filtering technique. For this reason, the model also has input from the wind sensors and feedback from the thrusters. This method even allows not having input from any PRS for some time, depending on the quality of the model and the weather. This process is known as dead reckoning. The accuracy and precision of the different PRSs is not the same. While a DGPS has a high accuracy and precision, a USBL can have a much lower precision. For this reason, the PRS's are weighted. Based on variance a PRS receives a weight between 0 and 1. Equipment Class 1 has no redundancy.Loss of position may occur in the event of a single fault. Equipment Class 2 has redundancy so that no single fault in an active system will cause the system to fail.Loss of position should not occur from a single fault of an active component or system such as generators, thruster, switchboards, remote controlled valves etc., but may occur after failure of a static component such as cables, pipes, manual valves etc. Equipment Class 3 which also has to withstand fire or flood in any one compartment without the system failing.Loss of position should not occur from any single failure including a completely burnt fire sub division or flooded watertight compartment. Class 0 Operations where loss of position keeping capability is not considered to endanger human lives, or cause damage. Class 1 Operations where loss of position keeping capability may cause damage or pollution of small consequence. Class 2 Operations where loss of position keeping capability may cause personnel injury, pollution, or damage with large economic consequences. Class 3 Operations where loss of position keeping capability may cause fatal accidents , or severe pollution or damage with major economic consequences. Based on this the type of ship is specified for each operation: Class 1 DP units with equipment class 1 should be used during operations where loss of position is not considered to endanger human lives, cause significant damage or cause more than minimal pollution. Class 2 DP units with equipment class 2 should be used during operations where loss of position could cause personnel injury, pollution or damage with great economic consequences. Class 3 DP units with equipment class 3 should be used during operations where loss of position could cause fatal accidents, severe pollution or damage with major economic consequences. Dynamic positioning failure results in an inability to maintain position or heading control , and can be a drift off caused by insufficient thrust, or a drive off caused by inappropriate thrust. Risk of runoff Consequences \u2013 for drilling, diving and other operations. Injury to divers is possible, Damage to diving equipment including cutting of diver's umbilical has occurred. Mitigation \u2013 dealing with a runoff \u2013 training and competence \u2013 emergency drills. Dynamic positioning alarm and runout response for bell divers Code amber /Yellow alert - Divers return to the bell immediately, stow umbilicals, and stand by for further developments and instructions. Code red - Divers return to the bell without delaying to retrieve tools and prepare for immediate ascent. The bell can not be recovered until the umbilicals have been safely stowed. The basic response with a closed bell is similar to wet bell, but after stowing umbilicals, the hatch will be sealed so that internal pressure can be retained. The bell will be recovered as rapidly as possible in a red alert, and may be recovered if there is doubt that a yellow alert will be downgraded. For certain operations redundancy is not required. For instance, if a survey ship loses its DP capability, there is normally no risk of damage or injuries. These operations will normally be done in Class 1. To have sufficient redundancy, enough generators and thrusters should be on-line so the failure of one does not result in a loss of position. This is left to the judgment of the DP operator. For Class 2 and Class 3 a Consequence Analysis should be incorporated in the system to assist the DPO in this process. The redundancy of a DP ship should be judged by a failure mode and effects analysis (FMEA) study and proved by FMEA trials. %DIFDELCMD < %DIFDELCMD < %%% Besides that, annual trials are done and normally DP function tests are completed prior to each project. When the watchkeeping is done on a Class 1 DP ship, a limited certificate will be issued; otherwise a full certificate will be issued. Marine Technology Society Dynamic Positioning Committee The Marine Technology Society Dynamic Positioning (DP) Committee's mission is to facilitate incident free DP operations through sharing of knowledge. This committee of dedicated volunteers delivers value to the DP community of vessel owners, operators, Marine Class Societies, engineers and regulators through an annual DP Conference, topical workshops and an extensive set of Guidance Documents covering DP Design Philosophy, DP Operations and Professional Development of DP Personnel. In addition, a growing set of unique documents called TECHOP's address specific topics of significant interest and impact. Conference papers are available for download by the public, providing the most comprehensive single source of DP industry technical papers available anywhere. The DP Guidance documents published by the MTS DP Committee are designed to disseminate the knowledge, methods and unique tools to aid the DP community in achieving incident free DP operations. The documents are free to download from the Committee's website URL", "edit_actions": [{"type": "A", "before": null, "after": ",", "start_char_pos": 107, "end_char_pos": 107}, {"type": "R", "before": "favourable", "after": "favorable", "start_char_pos": 219, "end_char_pos": 229}, {"type": "R", "before": "deepwater", "after": "deep water", "start_char_pos": 476, "end_char_pos": 485}, {"type": "R", "before": "of", "after": "off", "start_char_pos": 554, "end_char_pos": 556}, {"type": "R", "before": "seafloor", "after": "sea floor", "start_char_pos": 718, "end_char_pos": 726}, {"type": "A", "before": null, "after": ",", "start_char_pos": 992, "end_char_pos": 992}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1101, "end_char_pos": 1101}, {"type": "D", "before": "the", "after": null, "start_char_pos": 2130, "end_char_pos": 2133}, {"type": "R", "before": "manoeuvrability", "after": "maneuverability", "start_char_pos": 2170, "end_char_pos": 2185}, {"type": "R", "before": "manoeuvrability", "after": "maneuverability", "start_char_pos": 2264, "end_char_pos": 2279}, {"type": "D", "before": "the", "after": null, "start_char_pos": 2864, "end_char_pos": 2867}, {"type": "D", "before": ",", "after": null, "start_char_pos": 3059, "end_char_pos": 3060}, {"type": "R", "before": "depend", "after": "depends", "start_char_pos": 3805, "end_char_pos": 3811}, {"type": "D", "before": "the", "after": null, "start_char_pos": 4070, "end_char_pos": 4073}, {"type": "R", "before": "long-wave radiofrequency", "after": "long wave radio frequency", "start_char_pos": 4259, "end_char_pos": 4283}, {"type": "R", "before": ",", "after": "an", "start_char_pos": 4300, "end_char_pos": 4301}, {"type": "R", "before": "are", "after": "is", "start_char_pos": 4339, "end_char_pos": 4342}, {"type": "R", "before": "sound profile", "after": "soundprofile", "start_char_pos": 5190, "end_char_pos": 5203}, {"type": "D", "before": "the", "after": null, "start_char_pos": 5482, "end_char_pos": 5485}, {"type": "D", "before": "the", "after": null, "start_char_pos": 5631, "end_char_pos": 5634}, {"type": "R", "before": "baseline", "after": "base line", "start_char_pos": 5724, "end_char_pos": 5732}, {"type": "R", "before": "baseline", "after": "base line", "start_char_pos": 6043, "end_char_pos": 6051}, {"type": "R", "before": "clump weight", "after": "clumpweight", "start_char_pos": 7445, "end_char_pos": 7457}, {"type": "D", "before": ",", "after": null, "start_char_pos": 7710, "end_char_pos": 7711}, {"type": "D", "before": "the", "after": null, "start_char_pos": 7746, "end_char_pos": 7749}, {"type": "R", "before": "clump weight", "after": "clumpweight", "start_char_pos": 7852, "end_char_pos": 7864}, {"type": "R", "before": "laser-based", "after": "laser based", "start_char_pos": 8010, "end_char_pos": 8021}, {"type": "A", "before": null, "after": ",", "start_char_pos": 8527, "end_char_pos": 8527}, {"type": "R", "before": "an", "after": "a", "start_char_pos": 8769, "end_char_pos": 8771}, {"type": "R", "before": "onboard", "after": "on board", "start_char_pos": 8806, "end_char_pos": 8813}, {"type": "R", "before": "kilometres. The advantage", "after": "kilometers. Advantage", "start_char_pos": 8917, "end_char_pos": 8942}, {"type": "R", "before": "The disadvantage", "after": "Disadvantage", "start_char_pos": 8985, "end_char_pos": 9001}, {"type": "A", "before": null, "after": "the", "start_char_pos": 9268, "end_char_pos": 9268}, {"type": "R", "before": "radar-based", "after": "radar based", "start_char_pos": 9490, "end_char_pos": 9501}, {"type": "R", "before": "has", "after": "have", "start_char_pos": 9527, "end_char_pos": 9530}, {"type": "R", "before": "send", "after": "sends", "start_char_pos": 9836, "end_char_pos": 9840}, {"type": "R", "before": "GNSS", "after": "gnss", "start_char_pos": 10048, "end_char_pos": 10052}, {"type": "D", "before": "'", "after": null, "start_char_pos": 10773, "end_char_pos": 10774}, {"type": "R", "before": "labelled", "after": "labeled", "start_char_pos": 11123, "end_char_pos": 11131}, {"type": "D", "before": ",", "after": null, "start_char_pos": 11198, "end_char_pos": 11199}, {"type": "R", "before": "At", "after": "In", "start_char_pos": 11453, "end_char_pos": 11455}, {"type": "R", "before": "is", "after": "are", "start_char_pos": 11506, "end_char_pos": 11508}, {"type": "A", "before": null, "after": "a", "start_char_pos": 12317, "end_char_pos": 12317}, {"type": "A", "before": null, "after": "a", "start_char_pos": 12363, "end_char_pos": 12363}, {"type": "R", "before": "remote-controlled", "after": "remote controlled", "start_char_pos": 12819, "end_char_pos": 12836}, {"type": "D", "before": "the", "after": null, "start_char_pos": 12870, "end_char_pos": 12873}, {"type": "D", "before": "the", "after": null, "start_char_pos": 13221, "end_char_pos": 13224}, {"type": "D", "before": "the", "after": null, "start_char_pos": 13346, "end_char_pos": 13349}, {"type": "D", "before": "the", "after": null, "start_char_pos": 13463, "end_char_pos": 13466}, {"type": "D", "before": "the", "after": null, "start_char_pos": 13611, "end_char_pos": 13614}, {"type": "A", "before": null, "after": ",", "start_char_pos": 13677, "end_char_pos": 13677}, {"type": "D", "before": "the", "after": null, "start_char_pos": 13885, "end_char_pos": 13888}, {"type": "D", "before": "the", "after": null, "start_char_pos": 14091, "end_char_pos": 14094}, {"type": "D", "before": "the", "after": null, "start_char_pos": 14275, "end_char_pos": 14278}, {"type": "D", "before": "a", "after": null, "start_char_pos": 14450, "end_char_pos": 14451}, {"type": "A", "before": null, "after": ",", "start_char_pos": 14480, "end_char_pos": 14480}, {"type": "R", "before": "adrift", "after": "a drift", "start_char_pos": 14492, "end_char_pos": 14498}, {"type": "D", "before": "the", "after": null, "start_char_pos": 14721, "end_char_pos": 14724}, {"type": "D", "before": "the", "after": null, "start_char_pos": 15138, "end_char_pos": 15141}, {"type": "D", "before": "the", "after": null, "start_char_pos": 15288, "end_char_pos": 15291}, {"type": "D", "before": ",", "after": null, "start_char_pos": 15568, "end_char_pos": 15569}, {"type": "D", "before": ",", "after": null, "start_char_pos": 15969, "end_char_pos": 15970}, {"type": "R", "before": "into", "after": "in", "start_char_pos": 16017, "end_char_pos": 16021}, {"type": "D", "before": "These FMEA trials should:", "after": null, "start_char_pos": 16222, "end_char_pos": 16247}, {"type": "D", "before": "show the breakdown of the system into major subsystems and highlight the functional relationships highlight interfaces, experience show that a lot of failures occur on the interfaces and too often these interfaces are not addressed during an FMEA as people focus too much on components show the different operating modes (this may require different diagrams) show redundancies and other mitigations against system failure have all subsystems, components, inputs and outputs clearly labelled as one needs to refer to this in the FMEA.", "after": null, "start_char_pos": 16248, "end_char_pos": 16781}, {"type": "D", "before": ",", "after": null, "start_char_pos": 16987, "end_char_pos": 16988}, {"type": "R", "before": "incident-free", "after": "incident free", "start_char_pos": 17172, "end_char_pos": 17185}, {"type": "D", "before": "the", "after": null, "start_char_pos": 17208, "end_char_pos": 17211}, {"type": "R", "before": "incident-free", "after": "incident free", "start_char_pos": 18018, "end_char_pos": 18031}], "sents_char_pos": [0, 182, 290, 389, 495, 604, 819, 919, 1037, 1143, 1216, 1322, 1464, 1513, 1670, 1737, 1775, 1855, 1922, 1960, 2001, 2032, 2070, 2100, 2114, 2152, 2202, 2241, 2294, 2329, 2358, 2423, 2473, 2553, 2589, 2606, 2714, 2769, 2815, 2955, 3297, 3387, 3492, 3582, 3715, 3770, 3848, 3974, 4041, 4211, 4285, 4350, 4494, 4555, 4745, 4876, 4887, 5001, 5127, 5247, 5366, 5442, 5531, 5654, 5748, 5779, 5890, 5938, 6037, 6058, 6116, 6240, 6349, 6580, 6680, 6761, 6862, 6944, 6968, 7037, 7275, 7341, 7442, 7483, 7609, 7692, 7778, 7866, 7934, 7979, 7999, 8049, 8179, 8264, 8366, 8497, 8566, 8717, 8748, 8888, 8928, 8984, 9046, 9082, 9145, 9205, 9236, 9324, 9458, 9479, 9599, 9720, 9767, 9903, 9944, 10129, 10373, 10505, 10603, 10645, 10889, 10937, 11068, 11277, 11398, 11546, 11735, 11782, 11890, 11971, 12068, 12192, 12233, 12299, 12385, 12426, 12522, 12580, 12688, 12945, 13056, 13195, 13320, 13437, 13585, 13741, 14011, 14195, 14385, 14580, 14653, 14767, 14848, 15049, 15159, 15235, 15399, 15544, 15597, 15702, 15753, 15895, 15944, 16067, 16247, 16606, 16781, 16886, 16976, 17023, 17233, 17570, 17693, 17852, 18046]}
+{"doc_id": "29962874", "revision_depth": "1", "before_revision": "Bounded emotionality is a communications studies approach to dealing with emotional control in the workplace. Emotional control simply refers to how employers and employees handle the range of emotions that naturally occur in the workplace. These emotions can occur because of work, or they can be brought into work from an employee's home life. Bounded emotionality was proposed by Dennis K. Mumby and Linda L. Putnam. Mumby and Putnam (1992) stress that bounded emotionality encourages the expression of a wide range of emotions. Their theory encourages expression of emotions because it is a way to maintain interpersonal relationships and boundaries among people in the organization. Additionally, the expression of emotions strengthens work relations because people bond over mutual feelings. Bounded emotionality is a broad framework for organizations to use when dealing with emotions. It has six defining characteristics. The characteristics are: intersubjective limitations, spontaneously emergent work feelings, tolerance of ambiguity, heterarchy of values, integrated self identity and authenticity, and community. Origins Prior to Mumby and Putnam's specific articulation of bounded emotionality research and the role it plays in what is known about organizational emotion regulation, workplace emotion research focused on the relationship between emotion regulation, work performance and general attitudes towards work. Traditionally, two concepts, bounded rationality and emotional labor were used to describe conventional organizational theory pertaining to emotional regulation. Bounded Rationality: Whereas bounded emotionality encourages the expression of a large spectrum of emotions in organizational communication, bounded rationality advocates for the \u201ccontrol\u201d or tempering of any emotion or personal characteristics that may interfere with rational organizational decision making. Simon introduced the term bounded rationality and cast it as \u201cbounded\u201d because he viewed highly emotion-based forms of reasoning such as intuition and judgement as irrational and thus unhelpful in reaching organizational goals. Bounded rationality approaches to emotional regulation not only devalue individual emotion in the workplace but also view excessive emotional expression as inappropriate for the work setting. Emotional Labor: Emotional labor refers to the way in which individuals manage emotions based on what is perceived as \u201cappropriate\u201d in specific social or environmental situations. Human beings often pay close attention to their surroundings and how they should act in certain social situations. A variety of organizational factors as well as personal factors may impact emotional regulation including: socialization, channels of communication, departmental differences (e.g. sales vs. packaging), etc. In an organization that deploys a bounded emotionality approach to emotional regulation, much less emotional labor will be required than an organization that deploys a bounded rationality approach. Mumby and Putnam introduced the concept of bounded emotionality as an alternative organizational concept to bounded rationality and emotional labor in order to demonstrate the instability of traditional understandings and highlight what they believe to be the importance of emotions in organizational decision-making. In an organization framed by bounded emotionality (as opposed to bounded rationality and emotional labor), hierarchical goals and values are flexible as emotion and the physical self are not isolated from the process of organizing. In other words, emotions are \u201cbounded\u201d in organizations to protect interpersonal relationships and mutual understandings, two organizational aspects that Mumby and Putnam argue as important to success. Bounded emotionality vs. Unbounded emotionality Unbounded Emotionality should be enacted not for the instrumental gain of the organization, but to enhance the well-being of the individual organizational members. Work stress is a political, organizational and community issue that can be difficult to implement in large organizations. Bounded Emotionality is a limited, pragmatic approach to the problem of emotional control in organizations. It focuses on work related emotions, defined as, \u201c feelings, sensations, and affective responses to organizational sensations \u201d . However, it is acknowledged that such work feelings stem from and affect emotions that come from one \u2019 s personal life. Encourages the expression of a wider range of emotions than is usually condoned in traditional and normative organizations Stresses the importance of maintaining interpersonally sensitive, variable boundaries between what is felt and what is expressed The goal of bounded emotionality to build interpersonal relationships through mutual understanding of work related feelings Six defining characteristics Bounded EmotionalityUnbounded EmotionalityPersonal limitationsOrganizational limitationsImplicitExplicitHeterarchyHierarchyIntegration of body and mindSeparation of body and mindCommunityIndividualRelational feeling rulesGender/occupational feeling rules Defining characteristics Intersubjective Limitations : This is a necessary restriction known by individuals in the organization that helps them adequately work with and respond to one another . Just as individuals do in personal relationships, they need to respect emotional boundaries in professional ones. ex : If a coworker feels certain emotional expressions or topics are inappropriate, you will not discuss them. Similarly, they will respect what you find inappropriate. Those personal boundaries are the intersubjective limitations of the work relationship. For instance, a cabin crew member may be absolutely repulsed by vomit, but when a passenger vomits that cabin crew member controls the disgust and helps calms the passenger down. Spontaneously emergent work feelings: Feelings about work emerge in response to work tasks. Generally these form around the organizations climate and environment. This is natural and management should not try to ascribe feelings to employees. When spontaneous feelings emerge they should be dealt with within the previously set intersubjective limitations. ex : An example of this would be a study done on hair stylists. The study found that for the employee they found enjoyment when a customer confided in them about a private matter. That consumer as well would find it satisfying, therefore more likely to return. Tolerance of ambiguity: Complex emotions are likely to occur because of emotional labor (the process of controlling emotions during interactions at work). Bounded emotionality entails tolerance of these complex emotions. Contradictory feelings must coexist. This constitutes a new norm that wants to be aware of different positions, and even those directly opposite among its organizational members. ex : People with low tolerance of ambiguity experience stress react prematurely and avoid ambiguous stimuli. The person with high tolerance will look at ambiguous situations as desirable, challenging, and interesting. Heterarchy of values: The opposite of hierarchy of values, or placing certain values as more important than others. A heterarchy of values means that no one is set above another. The context of situations and individual preferences determines what values may be prioritized in a given moment. There is not just one universal set of values guiding one's life choices. Heterarchy is designed for handling the innovative side of things therefore it requires a different form of conflict management. This helps prevent undermining the governing logic. ex : An individual may highly value human life but be against abortion rights, but maybe be for the death penalty, or the other way around. Integrated Self Identity and Authenticity : Bounded emotionality assumes that people have one single identity. This means that that their personality, their values, and their actions are the same no matter where they are physically. The goal of bounded emotionality is to make it easy to be one's true self while at work. It means you are part of a social collective working toward obtaining goals for your organization. ex : If an actor brings in private experiences to create an original character presentation. Community: The purpose of bounded emotionality is to create a strong sense of community among its members. There is a need for connections within freedom and for diversity within individuality. Research has shown this structure works best in smaller organizations. ex : When a director encourages questions and then the director discusses performance related critiques with them afterwards developing a sense of togetherness.", "after_revision": "Bounded emotionality is a communications studies approach to dealing with emotional control in the workplace. Emotional control simply refers to how employers and employees handle the range of emotions that naturally occur in the workplace. These emotions can occur because of work, or they can be brought into work from an employee's home life. Bounded emotionality was proposed by Dennis K. Mumby and Linda Putnam. Mumby and Putnam (1992) stress that bounded emotionality encourages the expression of a wide range of emotions. Their theory encourages expression of emotions because it is a way to maintain interpersonal relationships and boundaries among people in the organization. Additionally, the expression of emotions strengthens work relations because people bond over mutual feelings. Bounded emotionality is a broad framework for organizations to use when dealing with emotions. It has six defining characteristics. The characteristics are: intersubjective limitations, spontaneously emergent work feelings, tolerance of ambiguity, heterarchy of values, integrated self identity and authenticity, and community. Origins Prior to Mumby and Putnam's specific articulation of bounded emotionality research and the role it plays in what is known about organizational emotion regulation, workplace emotion research focused on the relationship between emotion regulation, work performance and general attitudes towards work. Traditionally, two concepts, bounded rationality and emotional labor , were used to describe conventional organizational theory pertaining to emotional regulation. Bounded rationality Whereas bounded emotionality encourages the expression of a large spectrum of emotions in organizational communication, bounded rationality advocates for the \"control\" or tempering of any emotion or personal characteristics that may interfere with rational organizational decision making. Simon introduced the term bounded rationality and cast it as \"bounded\" because he viewed highly emotion-based forms of reasoning such as intuition and judgement as irrational and thus unhelpful in reaching organizational goals. Bounded rationality approaches to emotional regulation not only devalue individual emotion in the workplace but also view excessive emotional expression as inappropriate for the work setting. Emotional labor Emotional labor refers to the way in which individuals manage emotions based on what is perceived as \"appropriate\" in specific social or environmental situations. Human beings often pay close attention to their surroundings and how they should act in certain social situations. A variety of organizational factors as well as personal factors may impact emotional regulation including: socialization, channels of communication, departmental differences (e.g. sales vs. packaging), etc. In an organization that deploys a bounded emotionality approach to emotional regulation, much less emotional labor will be required than an organization that deploys a bounded rationality approach. Mumby and Putnam introduced the concept of bounded emotionality as an alternative organizational concept to bounded rationality and emotional labor in order to demonstrate the instability of traditional understandings and highlight what they believe to be the importance of emotions in organizational decision-making. In an organization framed by bounded emotionality (as opposed to bounded rationality and emotional labor), hierarchical goals and values are flexible as emotion and the physical self are not isolated from the process of organizing. In other words, emotions are \"bounded\" in organizations to protect interpersonal relationships and mutual understandings, two organizational aspects that Mumby and Putnam argue as important to success. Bounded vs. unbounded emotionality Unbounded emotionality should be enacted not for the instrumental gain of the organization, but to enhance the well-being of the individual organizational members. Work stress is a political, organizational and community issue that can be difficult to implement in large organizations. Bounded emotionality is a limited, pragmatic approach to the problem of emotional control in organizations. It focuses on work related emotions, defined as, \" feelings, sensations, and affective responses to organizational sensations \" . However, it is acknowledged that such work feelings stem from and affect emotions that come from one ' s personal life. It encourages the expression of a wider range of emotions than is usually condoned in traditional and normative organizations . It stresses the importance of maintaining interpersonally sensitive, variable boundaries between what is felt and what is expressed . The goal of bounded emotionality to build interpersonal relationships through mutual understanding of work related feelings . The following table shows six differentiating characteristics. Bounded emotionalityUnbounded emotionalityPersonal limitationsOrganizational limitationsImplicitExplicitHeterarchyHierarchyIntegration of body and mindSeparation of body and mindCommunityIndividualRelational feeling rulesGender/occupational feeling rules Defining characteristics Intersubjective limitations : This is a necessary restriction known by individuals in the organization that helps them adequately work with and respond to one another . Just as individuals do in personal relationships, they need to respect emotional boundaries in professional ones. Example : If a coworker feels certain emotional expressions or topics are inappropriate, you will not discuss them. Similarly, they will respect what you find inappropriate. Those personal boundaries are the intersubjective limitations of the work relationship. For instance, a cabin crew member may be absolutely repulsed by vomit, but when a passenger vomits that cabin crew member controls the disgust and helps calms the passenger down. Spontaneously emergent work feelings: Feelings about work emerge in response to work tasks. Generally these form around the organizations climate and environment. This is natural and management should not try to ascribe feelings to employees. When spontaneous feelings emerge they should be dealt with within the previously set intersubjective limitations. Example : An example of this would be a study done on hair stylists. The study found that for the employee they found enjoyment when a customer confided in them about a private matter. That consumer as well would find it satisfying, therefore more likely to return. Tolerance of ambiguity: Complex emotions are likely to occur because of emotional labor (the process of controlling emotions during interactions at work). Bounded emotionality entails tolerance of these complex emotions. Contradictory feelings must coexist. This constitutes a new norm that wants to be aware of different positions, and even those directly opposite among its organizational members. Example : People with low tolerance of ambiguity experience stress react prematurely and avoid ambiguous stimuli. The person with high tolerance will look at ambiguous situations as desirable, challenging, and interesting. Heterarchy of values: The opposite of hierarchy of values, or placing certain values as more important than others. A heterarchy of values means that no one is set above another. The context of situations and individual preferences determines what values may be prioritized in a given moment. There is not just one universal set of values guiding one's life choices. Heterarchy is designed for handling the innovative side of things therefore it requires a different form of conflict management. This helps prevent undermining the governing logic. Example : An individual may highly value human life but be against abortion rights, but maybe be for the death penalty, or the other way around. Integrated self identity and authenticity : Bounded emotionality assumes that people have one single identity. This means that that their personality, their values, and their actions are the same no matter where they are physically. The goal of bounded emotionality is to make it easy to be one's true self while at work. It means you are part of a social collective working toward obtaining goals for your organization. Example : If an actor brings in private experiences to create an original character presentation. Community: The purpose of bounded emotionality is to create a strong sense of community among its members. There is a need for connections within freedom and for diversity within individuality. Research has shown this structure works best in smaller organizations. Example : When a director encourages questions and then the director discusses performance related critiques with them afterwards developing a sense of togetherness.", "edit_actions": [{"type": "R", "before": "L. Putnam.", "after": "Putnam.", "start_char_pos": 409, "end_char_pos": 419}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1502, "end_char_pos": 1502}, {"type": "R", "before": "Rationality:", "after": "rationality", "start_char_pos": 1604, "end_char_pos": 1616}, {"type": "R", "before": "\u201ccontrol\u201d", "after": "\"control\"", "start_char_pos": 1775, "end_char_pos": 1784}, {"type": "R", "before": "\u201cbounded\u201d", "after": "\"bounded\"", "start_char_pos": 1967, "end_char_pos": 1976}, {"type": "R", "before": "Labor:", "after": "labor", "start_char_pos": 2336, "end_char_pos": 2342}, {"type": "R", "before": "\u201cappropriate\u201d", "after": "\"appropriate\"", "start_char_pos": 2444, "end_char_pos": 2457}, {"type": "R", "before": "\u201cbounded\u201d", "after": "\"bounded\"", "start_char_pos": 3605, "end_char_pos": 3614}, {"type": "R", "before": "emotionality vs. Unbounded", "after": "vs. unbounded", "start_char_pos": 3786, "end_char_pos": 3812}, {"type": "R", "before": "Emotionality", "after": "emotionality", "start_char_pos": 3836, "end_char_pos": 3848}, {"type": "R", "before": "Emotionality", "after": "emotionality", "start_char_pos": 4120, "end_char_pos": 4132}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 4269, "end_char_pos": 4270}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 4346, "end_char_pos": 4347}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4451, "end_char_pos": 4452}, {"type": "R", "before": "Encourages", "after": "It encourages", "start_char_pos": 4470, "end_char_pos": 4480}, {"type": "R", "before": "Stresses", "after": ". It stresses", "start_char_pos": 4593, "end_char_pos": 4601}, {"type": "A", "before": null, "after": ".", "start_char_pos": 4722, "end_char_pos": 4722}, {"type": "A", "before": null, "after": ".", "start_char_pos": 4847, "end_char_pos": 4847}, {"type": "R", "before": "Six defining characteristics", "after": "The following table shows six differentiating characteristics.", "start_char_pos": 4848, "end_char_pos": 4876}, {"type": "R", "before": "EmotionalityUnbounded EmotionalityPersonal", "after": "emotionalityUnbounded emotionalityPersonal", "start_char_pos": 4885, "end_char_pos": 4927}, {"type": "R", "before": "Limitations", "after": "limitations", "start_char_pos": 5173, "end_char_pos": 5184}, {"type": "D", "before": "ex", "after": null, "start_char_pos": 5440, "end_char_pos": 5442}, {"type": "A", "before": null, "after": "Example", "start_char_pos": 5443, "end_char_pos": 5443}, {"type": "D", "before": "ex", "after": null, "start_char_pos": 6234, "end_char_pos": 6236}, {"type": "A", "before": null, "after": "Example", "start_char_pos": 6237, "end_char_pos": 6237}, {"type": "D", "before": "ex", "after": null, "start_char_pos": 6896, "end_char_pos": 6898}, {"type": "A", "before": null, "after": "Example", "start_char_pos": 6899, "end_char_pos": 6899}, {"type": "D", "before": "ex", "after": null, "start_char_pos": 7663, "end_char_pos": 7665}, {"type": "A", "before": null, "after": "Example", "start_char_pos": 7666, "end_char_pos": 7666}, {"type": "R", "before": "Self Identity and Authenticity", "after": "self identity and authenticity", "start_char_pos": 7815, "end_char_pos": 7845}, {"type": "D", "before": "ex", "after": null, "start_char_pos": 8225, "end_char_pos": 8227}, {"type": "A", "before": null, "after": "Example", "start_char_pos": 8228, "end_char_pos": 8228}, {"type": "D", "before": "ex", "after": null, "start_char_pos": 8584, "end_char_pos": 8586}, {"type": "A", "before": null, "after": "Example", "start_char_pos": 8587, "end_char_pos": 8587}], "sents_char_pos": [0, 109, 240, 345, 419, 531, 687, 797, 892, 929, 1125, 1432, 1595, 1905, 2133, 2325, 2505, 2620, 2827, 3025, 3343, 3575, 3777, 3802, 3989, 4111, 4219, 4469, 4658, 4679, 4692, 4704, 5186, 5551, 5609, 5697, 5876, 5968, 6039, 6119, 6298, 6414, 6495, 6650, 6716, 6753, 7005, 7114, 7230, 7293, 7407, 7481, 7610, 7803, 7914, 8036, 8125, 8318, 8425, 8512]}
+{"doc_id": "30509934", "revision_depth": "1", "before_revision": "Ecological fitting is \"the process whereby organisms colonize and persist in novel environments, use novel resources or form novel associations with other species as a result of the suites of traits that they carry at the time they encounter the novel condition . \" It can be understood as a situation in which a species' interactions with its biotic and abiotic environment seem to indicate a history of coevolution, when in actuality the relevant traits evolved in response to a different set of biotic and abiotic conditions. The simplest form of ecological fitting is resource tracking, in which an organism continues to exploit the same resources, but in a new host or environment. In this framework, the organism occupies a multidimensional operative environment defined by the conditions in which it can persist, similar to the idea of the Hutchinsonian niche. In this case, a species can colonize new environments (e.g. an area with the same temperature and water regime) and/or form new species interactions (e.g. a parasite infecting a new host) which can lead to the misinterpretation of the relationship as coevolution, although the organism has not evolved and is continuing to exploit the same resources it always has. The more strict definition of ecological fitting requires that a species encounter an environment or host outside of its original operative environment and obtain realized fitness based on traits developed in previous environments that are now co-opted for a new purpose. This strict form of ecological fitting can also be expressed either as colonization of new habitat or the formation of new species interactions. Origin The evolutionary ecologist Dr. Daniel Janzen began to explicate the idea of ecological fitting with a 1980 paper that observed that many instances of ecological interactions were inferred to be the result of coevolution when this was not necessarily the case, and encouraged ecologists to use the term coevolution more strictly.Kull, Kalevi (2020). Semiotic fitting and the nativeness of community. Biosemiotics 13(1): 9\u201319. He observed that the existing defense traits of plants were likely produced by co-evolution with herbivores or parasites that no longer co-occurred with the plants, but that these traits were continuing to protect the plants against new attacks. He expanded this idea in a 1985 paper written while visiting Santa Rosa National Park in Costa Rica. While there, he observed that almost all of the species in the park occupied large geographic ranges, and despite the heterogeneity of habitats across these ranges, individuals were mostly identical across locations, indicating that little local adaptation had taken place. He described the cyclical life history pattern he believed responsible for this pattern: a species begins as a small population occupying a small area with little genetic variation, but then over the course of a few generations grows to occupy a large area, either because of the emergence of a genotype successful over a wider range, or because of the removal of a geographic barrier. This large interconnected population is now subject to many contradictory selection pressures and thus remains evolutionarily static until a disturbance separates populations, restarting the cycle. This cyclic life history pattern is dependent on three premises: that the ancestral range of most species is smaller than the ones now occupied, that biological communities have porous borders and are thus subject to invasion, and that species possess robust genotypes that allow them to colonize new habitats without evolution. Thus, many biological communities may be made up of organisms that despite their complex biological interactions have very little evolutionary history with each other. Contrasting views Ecological fitting represents a contrasting view to, and null hypothesis for, the hypothesis that current species interactions are evidence of coevolution. Coevolution occurs when each species in a relationship imposes evolutionary selection on the other(s). Examples could include mutualisms or predator-prey systems. The traditional view of plant-insect, host-parasite , and other tightly associated species, explained by Ehrlich & Raven (1964) defines coevolution as the primary mechanism for these associations In his 1980 paper, Janzen gives a response to these adaptationist explanations of why a phenotype or species might exist in a particular environment, and expressed his concern with what he perceived as an overuse of coevolutionary explanations for current species associations. He stated that it would be difficult to distinguish between coevolution and ecological fitting, leading ecologists to potentially spurious explanations of current species associations. It is difficult to determine whether a close relationship is the result of coevolution or of ecological fitting because ecological fitting is a sorting process in which only associations that 'fit', or increase fitness (biology), will be maintained. When trying to determine which process is at work in a particular interaction, it is important to remember that species can only come into contact through biotic expansion and ecological fitting, followed by adaptation or coevolution. Thus, both processes are important in shaping interactions and communities. Mechanisms Ecological fitting can occur by a variety of mechanisms, and can help to explain some ecological phenomena. Resource tracking can help to explain the parasite paradox: that parasites are specialists with narrow environmental ranges, which would encourage host fidelity, yet scientists commonly observe parasite shifts onto novel hosts, both in the phylogenetic record and in ecological time. Ecological fitting can explain the frequency of this phenomenon: similar to the expansion phase of the cyclic life cycle described by Janzen, a species undergoes taxon pulses, usually in a time of ecological disturbance, and expands its range, disperses, and colonizes new areas. For parasite-host, insect-plant, or plant-pollinator associations, this colonization is facilitated by the organism tracking an ancestral resource, and not tracking a particular species. The probability of this is increased when the tracked resource is widespread, or when specialization on a certain resource is a shared trait among distantly related species. This resource tracking has been demonstrated for both insect-plant and parasite-host systems in which sister species are capable of surviving on each other's hosts, even if they were never associated in nature. When operating under the more strict definition of ecological fitting, in which traits must be exapted for a new purpose, several mechanisms could be operating. Phenotypic plasticity, in which an organism changes phenotype in response to environmental variables, allows for individuals with existing genotypes to obtain fitness in novel conditions without adaptation occurring. Correlated trait evolution can encourage ecological fitting when direct selection on one trait causes a correlated change in another, potentially creating a phenotype that is pre-adapted to possible future conditions. Phylogenetic conservatism is the latent retention of genetic changes from past conditions: for instance, historical exposure to a certain host may predispose it to colonization in the future. Finally, fixed traits such as body size may lead to entirely different biotic interactions in different environments , e.g. pollinators visiting different sets of flowers. Examples Studies of introduced species can provide some of the best evidence for ecological fitting, because species invasions represent natural experiments testing how a new species fits into a community. Invasion ecology teaches us that changes in geographic range can occur quickly, as is required by the Janzen model for ecological fitting, and ecological fitting provides an important mechanism whereby new species can fit into an existing community without adaptation. These natural experiments have often shown that communities dominated by invasive species, such as those on Ascension Island, can be as diverse and complex as native communities. Additionally, phylogenetic studies show evidence for ecological fitting when lineages of the associated species do not correlate over evolutionary time; that is, if host-parasite or other interactions are as tightly coevolved as was previously believed, parasites should not be switching to unrelated hosts. This kind of host switching has been shown many times: in insect-plant relationships where oligophagy in locusts manifests itself on distantly related plants, plant-disperser relationships among Mediterranean birds, plant-pollinator relationships between hummingbirds and Heliconia flowers, and for parasite-host associations ranging from flatworms in frogs to parasitic worms in primates or in trout. Another study examined the time required for sugarcane, Saccharum officinarum, to accumulate diverse arthropod pest communities. It determined that time did not influence pest species richness, indicating that host-parasite associations were forming in ecological, not evolutionary, time. The human-made cloud forest on Green Mountain, Ascension Island represents an example of how unrelated and unassociated plant species can form a functioning ecosystem without a shared evolutionary history. 19th-century accounts of the island, including that of Charles Darwin on his expedition aboard the Beagle, described the rocky island as destitute and bare. Plants were brought to the island by colonists, but the most important change occurred in 1843 with the terraforming of Green Mountain by botanist Joseph Dalton Hooker, who recommended planting trees on Green Mountain and vegetation on the slopes to encourage deeper soils. Plants were regularly sent from England until, in the 1920s, the mountain was green and verdant, and could be described as a functioning cloud forest. Although some of the species likely were introduced together because of their coevolutionary relationships, the overwhelming mechanism governing relationships is clearly ecological fitting. The system has changed dramatically and even provides ecosystem services such as carbon sequestration, all as a result of ecological fitting. This is important in the light of climate change for two reasons: species ranges may be shifting dramatically, and ecological fitting is an important mechanism for the construction of communities over ecological time, and it shows that human-made systems could be integral in the mitigation of climate change. Theoretical Applications Explaining Diversity Patterns Ecological fitting can influence species diversity either by promoting diversification through genetic drift, or by maintaining evolutionary stasis through gene flow. Research has shown that ecological fitting can result in parasite assemblages that are just as diverse as those created over evolutionary time, indicating the importance of ecological factors for biodiversity. Ecological fitting can contribute to 3 types of evolutionary transition. The first is simple ecological fitting, in which organisms track resources to form novel species interactions and increase individual fitness. The second is a shift from an organism's ancestral ecology to a derived ecology, or a more true form of ecological fitting: traits are exapted from their original purpose to increase fitness. Finally, a more dramatic form involves the creation of new evolutionary arenas, requiring morphological or ecological changes to gain fitness under new conditions. Any of these processes can promote speciation or diversification under the right circumstances. Each form of ecological fitting can encourage speciation only if the population is sufficiently isolated from other populations to prevent gene flow from swamping local adaptation to newly formed species associations. Host-plant or other specialized relationships have been previously regarded as an evolutionary 'dead-end' because they seem to limit diversity, but they can actually promote it according to coevolutionary theory. Insects that feed on plants induce them to develop new defense mechanisms, which frees them from herbivory. In this new adaptive zone, or ecospace, plant clades can undergo evolutionary radiation, in which diversification of the clade occurs quickly due to adaptive change. The herbivorous insects may eventually succeed in adapting to the plants' defenses, and would also be capable of diversifying, in the absence of competition by other herbivorous insects. Thus, species associations can lead to rapid diversification of both lineages and contribute to overall community diversity. Ecological fitting can also maintain populations in stasis, influencing diversity by limiting it. If populations are well connected through gene flow, local adaptation may not be able to occur (known as antagonistic gene flow), or the well-connected population could evolve as a whole without speciation occurring. The Geographic Mosaic of Coevolution theory can help to explain this: it suggests that coevolution or speciation of a species occurs across a wide geographic scale, rather than at the level of populations, so that populations experiencing selection for a particular trait affect gene frequencies across the geographic region due to gene flow. Populations of a species interact with different species in different parts of its range, so populations may be experiencing a small sub-set of the interactions to which the species as a whole is adapted. This is based on three premises: there is an environmental and biotic interaction mosaic affecting fitness in different areas, there are certain areas where species are more coevolved than others, and that there is mixing of allele frequencies and traits between the regions to create more homogeneous populations. Thus, depending on connectivity of populations and strength of selection pressure in different arenas, a widespread population can coevolve with another species, or individual populations can specialize, potentially resulting in diversification. Community Assembly Ecological fitting can explain aspects of species associations and community assembly, as well as invasion ecology. It is another mechanism, in addition to coevolution and in situ evolution (in which new phenotypes evolve and travel sympatrically), that can explain the creation and maintenance of species associations within a community. The phenomenon of ecological fitting helps to weigh in on some of the great debates in community ecology. The Clementisian school of community ecology, based on the work of Frederic Clements, a plant ecologist who studied ecological succession, holds that communities are constructed by deterministic processes that assemble a 'superorganism' from the individual species present. With the removal or exchange of a species, the community would be unstable. On the other hand , the Gleasonian view, promoted by Henry Gleason, who was also a plant ecologist studying successional communities, is more individualistic and emphasizes the role of random processes such as dispersal in community assembly. The Clementsian view would emphasize coevolution and strict niche fidelity as a major factor structuring communities, also known as the niche-assembly perspective, whereas the Gleasonian, or dispersal assembly view emphasizes neutral and historical processes, including ecological fitting. These views of community assembly raise the question: do species continue stable relationships over time, or do all individuals represent \"asymmetrical pegs in square holes\" ? Some of these question can be answered through phylogenetic studies, which can determine when certain traits arose, and thus whether species interactions and community assembly occurs primarily through coevolution or through dispersal and ecological fitting. Support exists for each, indicating that each has a varied role to play, depending on the community and on historical factors. Emerging Infectious Diseases A field of recent importance for the application of ecological fitting is that of emerging infectious disease: infectious diseases that have emerged or increased incidence in the last 20 years, as a result of evolution, range expansion, or ecological changes. Climate change represents an ecological perturbation that induces range and phenological shifts in many species, which can encourage parasite transmission and host switching without any evolutionary change occurring. When species begin to infect host species with which they were not previously associated, it may be the result of ecological fitting. Even organisms with complex life histories can switch hosts as long as the resource required by each life stage is phylogenetically conserved and geographically widespread, meaning that it is difficult to predict based on life history complexity or other external factors. This has been used to explain the mysterious appearance of the bullfrog lung trematode Haematoloechus floedae in Costa Rican leopard frogs, even though bullfrogs do not and have never occurred in this area. When emerging infectious disease is the result of ecological fitting and host specificity is loose, then recurrent host shifts are likely to occur and the difficult task of building a predictive framework for management is necessary. Related terms exaptation community (ecology) ecosynthesis Janzen\u2013Connell hypothesis", "after_revision": "Ecological fitting is \"the process whereby organisms colonize and persist in novel environments, use novel resources or form novel associations with other species as a result of the suites of traits that they carry at the time they encounter the novel condition \" . It can be understood as a situation in which a species' interactions with its biotic and abiotic environment seem to indicate a history of coevolution, when in actuality the relevant traits evolved in response to a different set of biotic and abiotic conditions. The simplest form of ecological fitting is resource tracking, in which an organism continues to exploit the same resources, but in a new host or environment. In this framework, the organism occupies a multidimensional operative environment defined by the conditions in which it can persist, similar to the idea of the Hutchinsonian niche. In this case, a species can colonize new environments (e.g. an area with the same temperature and water regime) , form new species interactions (e.g. a parasite infecting a new host) , or both, which can lead to the misinterpretation of the relationship as coevolution, although the organism has not evolved and is continuing to exploit the same resources it always has. The more strict definition of ecological fitting requires that a species encounter an environment or host outside of its original operative environment and obtain realized fitness based on traits developed in previous environments that are now co-opted for a new purpose. This strict form of ecological fitting can also be expressed either as colonization of new habitat or the formation of new species interactions. Origin The evolutionary ecologist Dr. Daniel Janzen began to explicate the idea of ecological fitting with a 1980 paper that observed that many instances of ecological interactions were inferred to be the result of coevolution when this was not necessarily the case, and encouraged ecologists to use the term coevolution more strictly.Kull, Kalevi (2020). Semiotic fitting and the nativeness of community. Biosemiotics 13(1): 9\u201319. He observed that the existing defense traits of plants were likely produced by co-evolution with herbivores or parasites that no longer co-occurred with the plants, but that these traits were continuing to protect the plants against new attacks. He expanded this idea in a 1985 paper written while visiting Santa Rosa National Park in Costa Rica. While there, he observed that almost all of the species in the park occupied large geographic ranges, and despite the heterogeneity of habitats across these ranges, individuals were mostly identical across locations, indicating that little local adaptation had taken place. He described the cyclical life history pattern he believed responsible for this pattern: a species begins as a small population occupying a small area with little genetic variation, but then over the course of a few generations grows to occupy a large area, either because of the emergence of a genotype successful over a wider range, or because of the removal of a geographic barrier. This large interconnected population is now subject to many contradictory selection pressures and thus remains evolutionarily static until a disturbance separates populations, restarting the cycle. This cyclic life history pattern is dependent on three premises: that the ancestral range of most species is smaller than the ones now occupied, that biological communities have porous borders and are thus subject to invasion, and that species possess robust genotypes that allow them to colonize new habitats without evolution. Thus, many biological communities may be made up of organisms that despite their complex biological interactions have very little evolutionary history with each other. Contrasting views Ecological fitting represents a contrasting view to, and null hypothesis for, the hypothesis that current species interactions are evidence of coevolution. Coevolution occurs when each species in a relationship imposes evolutionary selection on the other(s). Examples could include mutualisms or predator-prey systems. The traditional view of plant\u2013insect, host\u2013parasite , and other tightly associated species, explained by Ehrlich & Raven (1964) defines coevolution as the primary mechanism for these associations . In his 1980 paper, Janzen gives a response to these adaptationist explanations of why a phenotype or species might exist in a particular environment, and expressed his concern with what he perceived as an overuse of coevolutionary explanations for current species associations. He stated that it would be difficult to distinguish between coevolution and ecological fitting, leading ecologists to potentially spurious explanations of current species associations. It is difficult to determine whether a close relationship is the result of coevolution or of ecological fitting because ecological fitting is a sorting process in which only associations that 'fit', or increase fitness (biology), will be maintained. When trying to determine which process is at work in a particular interaction, it is important to remember that species can only come into contact through biotic expansion and ecological fitting, followed by adaptation or coevolution. Thus, both processes are important in shaping interactions and communities. Mechanisms Ecological fitting can occur by a variety of mechanisms, and can help to explain some ecological phenomena. Resource tracking can help to explain the parasite paradox: that parasites are specialists with narrow environmental ranges, which would encourage host fidelity, yet scientists commonly observe parasite shifts onto novel hosts, both in the phylogenetic record and in ecological time. Ecological fitting can explain the frequency of this phenomenon: similar to the expansion phase of the cyclic life cycle described by Janzen, a species undergoes taxon pulses, usually in a time of ecological disturbance, and expands its range, disperses, and colonizes new areas. For parasite\u2013host, insect\u2013plant, or plant\u2013pollinator associations, this colonization is facilitated by the organism tracking an ancestral resource, and not tracking a particular species. The probability of this is increased when the tracked resource is widespread, or when specialization on a certain resource is a shared trait among distantly related species. This resource tracking has been demonstrated for both insect\u2013plant and parasite\u2013host systems in which sister species are capable of surviving on each other's hosts, even if they were never associated in nature. When operating under the more strict definition of ecological fitting, in which traits must be exapted for a new purpose, several mechanisms could be operating. Phenotypic plasticity, in which an organism changes phenotype in response to environmental variables, allows for individuals with existing genotypes to obtain fitness in novel conditions without adaptation occurring. Correlated trait evolution can encourage ecological fitting when direct selection on one trait causes a correlated change in another, potentially creating a phenotype that is pre-adapted to possible future conditions. Phylogenetic conservatism is the latent retention of genetic changes from past conditions: for instance, historical exposure to a certain host may predispose it to colonization in the future. Finally, fixed traits such as body size may lead to entirely different biotic interactions in different environments ; for example, pollinators visiting different sets of flowers. Examples Studies of introduced species can provide some of the best evidence for ecological fitting, because species invasions represent natural experiments testing how a new species fits into a community. Invasion ecology teaches us that changes in geographic range can occur quickly, as is required by the Janzen model for ecological fitting, and ecological fitting provides an important mechanism whereby new species can fit into an existing community without adaptation. These natural experiments have often shown that communities dominated by invasive species, such as those on Ascension Island, can be as diverse and complex as native communities. Additionally, phylogenetic studies show evidence for ecological fitting when lineages of the associated species do not correlate over evolutionary time; that is, if host\u2013parasite or other interactions are as tightly coevolved as was previously believed, parasites should not be switching to unrelated hosts. This kind of host switching has been shown many times: in insect\u2013plant relationships where oligophagy in locusts manifests itself on distantly related plants, plant\u2013disperser relationships among Mediterranean birds, plant\u2013pollinator relationships between hummingbirds and Heliconia flowers, and for parasite\u2013host associations ranging from flatworms in frogs to parasitic worms in primates or in trout. Another study examined the time required for sugarcane, Saccharum officinarum, to accumulate diverse arthropod pest communities. It determined that time did not influence pest species richness, indicating that host\u2013parasite associations were forming in ecological, not evolutionary, time. The human-made cloud forest on Green Mountain, Ascension Island represents an example of how unrelated and unassociated plant species can form a functioning ecosystem without a shared evolutionary history. 19th-century accounts of the island, including that of Charles Darwin on his expedition aboard the Beagle, described the rocky island as destitute and bare. Plants were brought to the island by colonists, but the most important change occurred in 1843 with the terraforming of Green Mountain by botanist Joseph Dalton Hooker, who recommended planting trees on Green Mountain and vegetation on the slopes to encourage deeper soils. Plants were regularly sent from England until, in the 1920s, the mountain was green and verdant, and could be described as a functioning cloud forest. Although some of the species likely were introduced together because of their coevolutionary relationships, the overwhelming mechanism governing relationships is clearly ecological fitting. The system has changed dramatically and even provides ecosystem services such as carbon sequestration, all as a result of ecological fitting. This is important with regard to climate change for two reasons: species ranges may be shifting dramatically, and ecological fitting is an important mechanism for the construction of communities over ecological time, and it shows that human-made systems could be integral in the mitigation of climate change. Theoretical applications Explaining diversity patterns Ecological fitting can influence species diversity either by promoting diversification through genetic drift, or by maintaining evolutionary stasis through gene flow. Research has shown that ecological fitting can result in parasite assemblages that are just as diverse as those produced over evolutionary time, indicating the importance of ecological factors for biodiversity. Ecological fitting can contribute to three types of evolutionary transition. The first is simple ecological fitting, in which organisms track resources to form novel species interactions and increase individual fitness. The second is a shift from an organism's ancestral ecology to a derived ecology, or a more true form of ecological fitting: traits are exapted from their original purpose to increase fitness. Finally, a more dramatic form involves the creation of new evolutionary arenas, requiring morphological or ecological changes to gain fitness under new conditions. Any of these processes can promote speciation or diversification under the right circumstances. Each form of ecological fitting can encourage speciation only if the population is sufficiently isolated from other populations to prevent gene flow from swamping local adaptation to newly formed species associations. Host-plant or other specialized relationships have been previously regarded as an evolutionary 'dead-end' because they seem to limit diversity, but they can actually promote it according to coevolutionary theory. Insects that feed on plants induce them to develop new defense mechanisms, which frees them from herbivory. In this new adaptive zone, or ecospace, plant clades can undergo evolutionary radiation, in which diversification of the clade occurs quickly due to adaptive change. The herbivorous insects may eventually succeed in adapting to the plants' defenses, and would also be capable of diversifying, in the absence of competition by other herbivorous insects. Thus, species associations can lead to rapid diversification of both lineages and contribute to overall community diversity. Ecological fitting can also maintain populations in stasis, influencing diversity by limiting it. If populations are well-connected through gene flow, local adaptation may not be able to occur (known as antagonistic gene flow), or the well-connected population could evolve as a whole without speciation occurring. The Geographic Mosaic of Coevolution theory can help to explain this: it suggests that coevolution or speciation of a species occurs across a wide geographic scale, rather than at the level of populations, so that populations experiencing selection for a particular trait affect gene frequencies across the geographic region due to gene flow. Populations of a species interact with different species in different parts of its range, so populations may be experiencing a small sub-set of the interactions to which the species as a whole is adapted. This is based on three premises: there is an environmental and biotic interaction mosaic affecting fitness in different areas, there are certain areas where species are more coevolved than others, and that there is mixing of allele frequencies and traits between the regions to produce more homogeneous populations. Thus, depending on connectivity of populations and strength of selection pressure in different arenas, a widespread population can coevolve with another species, or individual populations can specialize, potentially resulting in diversification. Community assembly Ecological fitting can explain aspects of species associations and community assembly, as well as invasion ecology. It is another mechanism, in addition to coevolution and in-situ evolution (in which new phenotypes evolve and travel sympatrically), that can explain the creation and maintenance of species associations within a community. The phenomenon of ecological fitting helps to weigh in on some of the great debates in community ecology. The Clementisian school of community ecology, based on the work of Frederic Clements, a plant ecologist who studied ecological succession, holds that communities are constructed by deterministic processes that assemble a 'superorganism' from the individual species present. With the removal or exchange of a species, the community would be unstable. By contrast , the Gleasonian view, promoted by Henry Gleason, who was also a plant ecologist studying successional communities, is more individualistic and emphasizes the role of random processes such as dispersal in community assembly. The Clementsian view would emphasize coevolution and strict niche fidelity as a major factor structuring communities, also known as the niche-assembly perspective, whereas the Gleasonian, or dispersal assembly view emphasizes neutral and historical processes, including ecological fitting. These views of community assembly prompt questions, such as whether species continue stable relationships over time, or if all individuals represent \"asymmetrical pegs in square holes\" . Some of these questions can be answered through phylogenetic studies, which can determine when certain traits arose, and thus whether species interactions and community assembly occurs primarily through coevolution or through dispersal and ecological fitting. Support exists for each, indicating that each has a varied role to play, depending on the community and on historical factors. Emerging infectious diseases A field of recent importance for the application of ecological fitting is that of emerging infectious disease: infectious diseases that have emerged or increased incidence in the last 20 years, as a result of evolution, range expansion, or ecological changes. Climate change represents an ecological perturbation that induces range and phenological shifts in many species, which can encourage parasite transmission and host switching without any evolutionary change occurring. When species begin to infect host species with which they were not previously associated, it may be the result of ecological fitting. Even organisms with complex life histories can switch hosts as long as the resource required by each life stage is phylogenetically conserved and geographically widespread, meaning that it is difficult to predict based on life history complexity or other external factors. This has been used to explain the mysterious appearance of the bullfrog lung trematode Haematoloechus floedae in Costa Rican leopard frogs, even though bullfrogs do not and have never occurred in this area. When an emerging infectious disease is the result of ecological fitting and host specificity is loose, then recurrent host shifts are likely to occur and the difficult task of building a predictive framework for management is necessary. Related terms Exaptation Community (ecology) Ecosynthesis Janzen\u2013Connell hypothesis", "edit_actions": [{"type": "D", "before": ".", "after": null, "start_char_pos": 262, "end_char_pos": 263}, {"type": "A", "before": null, "after": ".", "start_char_pos": 266, "end_char_pos": 266}, {"type": "R", "before": "and/or", "after": ",", "start_char_pos": 981, "end_char_pos": 987}, {"type": "A", "before": null, "after": ", or both,", "start_char_pos": 1057, "end_char_pos": 1057}, {"type": "R", "before": "plant-insect, host-parasite", "after": "plant\u2013insect, host\u2013parasite", "start_char_pos": 4147, "end_char_pos": 4174}, {"type": "A", "before": null, "after": ".", "start_char_pos": 4319, "end_char_pos": 4319}, {"type": "R", "before": "parasite-host, insect-plant, or plant-pollinator", "after": "parasite\u2013host, insect\u2013plant, or plant\u2013pollinator", "start_char_pos": 6031, "end_char_pos": 6079}, {"type": "R", "before": "insect-plant and parasite-host", "after": "insect\u2013plant and parasite\u2013host", "start_char_pos": 6442, "end_char_pos": 6472}, {"type": "R", "before": ", e.g.", "after": "; for example,", "start_char_pos": 7504, "end_char_pos": 7510}, {"type": "R", "before": "host-parasite", "after": "host\u2013parasite", "start_char_pos": 8378, "end_char_pos": 8391}, {"type": "R", "before": "insect-plant", "after": "insect\u2013plant", "start_char_pos": 8579, "end_char_pos": 8591}, {"type": "R", "before": "plant-disperser", "after": "plant\u2013disperser", "start_char_pos": 8680, "end_char_pos": 8695}, {"type": "R", "before": "plant-pollinator", "after": "plant\u2013pollinator", "start_char_pos": 8737, "end_char_pos": 8753}, {"type": "R", "before": "parasite-host", "after": "parasite\u2013host", "start_char_pos": 8820, "end_char_pos": 8833}, {"type": "R", "before": "host-parasite", "after": "host\u2013parasite", "start_char_pos": 9133, "end_char_pos": 9146}, {"type": "R", "before": "in the light of", "after": "with regard to", "start_char_pos": 10350, "end_char_pos": 10365}, {"type": "R", "before": "Applications", "after": "applications", "start_char_pos": 10654, "end_char_pos": 10666}, {"type": "R", "before": "Diversity Patterns", "after": "diversity patterns", "start_char_pos": 10678, "end_char_pos": 10696}, {"type": "R", "before": "created", "after": "produced", "start_char_pos": 10976, "end_char_pos": 10983}, {"type": "R", "before": "3", "after": "three", "start_char_pos": 11111, "end_char_pos": 11112}, {"type": "R", "before": "well connected", "after": "well-connected", "start_char_pos": 12876, "end_char_pos": 12890}, {"type": "R", "before": "create", "after": "produce", "start_char_pos": 13900, "end_char_pos": 13906}, {"type": "R", "before": "Assembly", "after": "assembly", "start_char_pos": 14193, "end_char_pos": 14201}, {"type": "R", "before": "in situ", "after": "in-situ", "start_char_pos": 14374, "end_char_pos": 14381}, {"type": "R", "before": "On the other hand", "after": "By contrast", "start_char_pos": 14997, "end_char_pos": 15014}, {"type": "R", "before": "raise the question: do", "after": "prompt questions, such as whether", "start_char_pos": 15564, "end_char_pos": 15586}, {"type": "R", "before": "do", "after": "if", "start_char_pos": 15639, "end_char_pos": 15641}, {"type": "R", "before": "?", "after": ".", "start_char_pos": 15704, "end_char_pos": 15705}, {"type": "R", "before": "question", "after": "questions", "start_char_pos": 15720, "end_char_pos": 15728}, {"type": "R", "before": "Infectious Diseases", "after": "infectious diseases", "start_char_pos": 16101, "end_char_pos": 16120}, {"type": "A", "before": null, "after": "an", "start_char_pos": 17217, "end_char_pos": 17217}, {"type": "R", "before": "exaptation community", "after": "Exaptation Community", "start_char_pos": 17461, "end_char_pos": 17481}, {"type": "R", "before": "ecosynthesis", "after": "Ecosynthesis", "start_char_pos": 17492, "end_char_pos": 17504}], "sents_char_pos": [0, 322, 529, 687, 868, 1234, 1506, 1651, 1987, 2007, 2057, 2083, 2329, 2430, 2704, 3090, 3288, 3617, 3785, 3959, 4062, 4122, 4597, 4782, 5032, 5267, 5343, 5462, 5746, 6026, 6213, 6387, 6598, 6759, 6976, 7194, 7386, 7558, 7764, 8033, 8212, 8365, 8520, 8922, 9051, 9211, 9417, 9574, 9848, 9999, 10189, 10331, 10641, 10863, 11073, 11146, 11289, 11481, 11645, 11741, 11959, 12172, 12280, 12446, 12633, 12758, 12856, 13073, 13416, 13621, 13936, 14182, 14317, 14540, 14646, 14920, 14996, 15239, 15529, 15964, 16091, 16380, 16597, 16731, 17004, 17211, 17446]}
+{"doc_id": "30676665", "revision_depth": "1", "before_revision": "Gardner F. Williams (14 March 1842 \u2013 22 August 1922) was an American mining engineer and author, and the first properly trained mining engineer to be appointed in South Africa. In part due to these improvements in mining techniques, by 1889 Cecil Rhodes controlled the South African diamond mining industry, and fully 90\\% of world production.Martin Meredith, \" Diamonds, gold, and war: the British, the Boers, and the making of South Africa \" (New York: Public Affairs, 2007), p.162 In 1902 he published the comprehensive tome \" The Diamond Mines of South Africa; some account of their rise and development \" (NY: Macmillan Co, 1902) with later revised editions in 1904, 1905 and 1906 comprising 2 volumes. This work is still considered an important authoritative source today, with most of its 1000 copies being housed in various university libraries of the world. \" The Diamond Mines of South Africa; some account of their rise and development \" (NY: Macmillan Co, 1902) at Google Books\"The Diamond Mines of South Africa; some account of their rise and development \" (NY: Macmillan Co, 1905) at Farlang.com Return to America After 18 years with De Beers, Williams retired in 1905 to America, and settled first in Washington D.C. and in later years finally in San Francisco.extracts from \" Forging Ahead, South Africa's Pioneering Engineers .\" by G.R. Bozzoli (Johannesburg : Witwatersrand University Press, 1997)From a transcript of South Africa's \" Mining Weekly On the Air \" FM radio show His Washington DC residence on 2201 R Street NW was later used as offices by the embassy of Pakistan. In recognition of his achievements, the Royal Academy of Science in Sweden awarded him its silver medal in 1905, and the University of California an honorary doctorate of laws in 1910.\"Oakland Tribune\" (Oakland, CA) Wednesday Evening, 18 May 1910, p.13 (2nd Section) He also received an honorary doctorate of engineering from the University of Michigan in 1917.\"Who Was Who in America\". A component volume of \" Who's Who in American History \" . Volume 1, 1897\u20131942 (Chicago: A.N. Marquis Co., 1943) \" Engineering and Mining Journal-Press \" Vol.114, No.13; 23 Sep 1922, p.532 Williams died in San Francisco in 1922, and is buried in a family plot in Oakland, URL References ", "after_revision": "Gardner Frederick Williams (14 March 1842 \u2013 22 August 1922) was an American mining engineer and author, and the first properly trained mining engineer to be appointed in South Africa. In part due to these improvements in mining techniques, by 1889 Cecil Rhodes controlled the South African diamond mining industry, and fully 90\\% of world production.Martin Meredith, Diamonds, gold, and war: the British, the Boers, and the making of South Africa (New York: Public Affairs, 2007), p.162 In 1902 he published the comprehensive tome The Diamond Mines of South Africa; some account of their rise and development (NY: Macmillan Co, 1902) with later revised editions in 1904, 1905 and 1906 comprising 2 volumes. This work is still considered an important authoritative source today, with most of its 1,000 copies being housed in various university libraries of the world. The Diamond Mines of South Africa; some account of their rise and development (NY: Macmillan Co, 1902) at Google BooksThe Diamond Mines of South Africa; some account of their rise and development (NY: Macmillan Co, 1905) at Farlang.com Return to America After 18 years with De Beers, Williams retired in 1905 to America, and settled first in Washington D.C. and in later years finally in San Francisco.extracts from Forging Ahead, South Africa's Pioneering Engineers by G.R. Bozzoli (Johannesburg : Witwatersrand University Press, 1997)From a transcript of South Africa's Mining Weekly On the Air FM radio show His Washington DC residence on 2201 R Street NW was later used as offices by the embassy of Pakistan. In recognition of his achievements, the Royal Academy of Science in Sweden awarded him its silver medal in 1905, and the University of California an honorary doctorate of laws in 1910.\"Oakland Tribune\" (Oakland, CA) Wednesday Evening, 18 May 1910, p.13 (2nd Section) He also received an honorary doctorate of engineering from the University of Michigan in 1917.\"Who Was Who in America\". A component volume of Who's Who in American History . Volume 1, 1897\u20131942 (Chicago: A.N. Marquis Co., 1943) Engineering and Mining Journal-Press Vol.114, No.13; 23 September 1922, p.532 Williams died in San Francisco in 1922, and is buried in a family plot in Oakland, California. References External links", "edit_actions": [{"type": "R", "before": "F.", "after": "Frederick", "start_char_pos": 8, "end_char_pos": 10}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 360, "end_char_pos": 361}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 442, "end_char_pos": 443}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 528, "end_char_pos": 529}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 608, "end_char_pos": 609}, {"type": "R", "before": "1000", "after": "1,000", "start_char_pos": 796, "end_char_pos": 800}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 867, "end_char_pos": 868}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 947, "end_char_pos": 948}, {"type": "R", "before": "Books\"The", "after": "BooksThe", "start_char_pos": 984, "end_char_pos": 993}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 1068, "end_char_pos": 1069}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 1290, "end_char_pos": 1291}, {"type": "D", "before": ".\"", "after": null, "start_char_pos": 1343, "end_char_pos": 1345}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 1451, "end_char_pos": 1452}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 1478, "end_char_pos": 1479}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 2005, "end_char_pos": 2006}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 2037, "end_char_pos": 2038}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 2095, "end_char_pos": 2096}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 2134, "end_char_pos": 2135}, {"type": "R", "before": "Sep", "after": "September", "start_char_pos": 2155, "end_char_pos": 2158}, {"type": "R", "before": "URL", "after": "California.", "start_char_pos": 2254, "end_char_pos": 2257}, {"type": "A", "before": null, "after": "External links", "start_char_pos": 2269, "end_char_pos": 2269}], "sents_char_pos": [0, 176, 343, 564, 707, 866, 903, 990, 1024, 1345, 1595, 1780, 1957, 1982, 2151]}
+{"doc_id": "3086381", "revision_depth": "2", "before_revision": "Hitler went on to say in Mein Kampf: \"The struggle that rages today involves very great aims: a culture fights for its existence, which combines millenniums and embraces Hellenism and Germanity together\". The Spartans were emulated by the quasi-fascist regime of Ioannis Metaxas who called for Greeks to wholly commit themselves to the nation with self-control as the Spartans had done.J\u00fcrgen Fischer. Balkan strongmen: dictators and authoritarian rulers of South Eastern Europe. London, England , UK : Purdue University Press, 2007. Pp. 184. Supporters of the 4th of August Regime in the 1930s to 1940s justified the dictatorship of Metaxas on the basis that the \"First Greek Civilization\" involved an Athenian dictatorship led by Pericles who had brought ancient Greece to greatness. The Greek philosopher Plato supported many similar political positions to fascism. In The Republic (c. 380 BC),Contemporary Political Theory: New Dimensions, Basic Concepts and Major Trends. 12th Edition. New Delhi, India: Sterling Publishers Private Ltd, 2007. Pp. 705. Plato emphasizes the need for a philosopher king in an ideal state. Plato believed the ideal state would be ruled by an elite class of rulers known as \"Guardians\" and rejected the idea of social equality. Plato believed in an authoritarian state. Plato held Athenian democracy in contempt by saying: \"The laws of democracy remain a dead letter, its freedom is anarchy, its equality the equality of unequals\". Like fascism, Plato emphasized that individuals must adhere to laws and perform duties while declining to grant individuals rights to limit or reject state interference in their lives. Like fascism, Plato also claimed that an ideal state would have state-run education that was designed to promote able rulers and warriors. Like many fascist ideologues, Plato advocated for a state-sponsored eugenics program to be carried out in order to improve the Guardian class in his Republic through selective breeding. Italian Fascist Il Duce Benito Mussolini had a strong attachment to the works of Plato.Ludwig, Emile; Mussolini, Benito. Talks with Mussolini. Boston: Little Brown & Company, 1933. p. 130. However, there are significant differences between Plato's ideals and fascism. Unlike fascism, Plato never promoted expansionism and he was opposed to offensive war. Leviathan (1651), the book written by Thomas Hobbes that advocates absolute monarchy There were a number of influences on fascism from the Renaissance era in Europe. Niccol\u00f2 Machiavelli is known to have influenced Italian Fascism, particularly through his promotion of the absolute authority of the state. Machiavelli rejected all existing traditional and metaphysical assumptions of the time\u2014especially those associated with the Middle Ages\u2014and asserted as an Italian patriot that Italy needed a strong and all-powerful state led by a vigorous and ruthless leader who would conquer and unify Italy.Contemporary Political Theory: New Dimensions, Basic Concepts and Major Trends. 12th Edition. New Delhi, India: Sterling Publishers Private Ltd, 2007. Pp. 706. Mussolini saw himself as a modern-day Machiavellian and wrote an introduction to his honorary doctoral thesis for the University of Bologna\u2014\"Prelude to Machiavelli\".Benito Mussolini, \"Prelude to Machiavelli,\" The Living Age, Vol. 323, No. 4194, November 22 , 1924. Originally published in the Italian journal Gerarchia in 1924, edited by Mussolini and Margherita Sarfatti). Mussolini's thesis was titled \"Comments of the year 1924 on the Prince of Machiavelli,\" (University of Bologna, 1924) Mussolini professed that Machiavelli's \"pessimism about human nature was eternal in its acuity. Individuals simply could not be relied on voluntarily to 'obey the law, pay their taxes and serve in war'. No well-ordered society could want the people to be sovereign\".(R.J.B. Bosworth, Mussolini, Chapter Eight: Government 1922-24 , Hodder Education, 2002, p. 192. Most dictators of the 20th century mimicked Mussolini's admiration for Machiavelli and \"Stalin... saw himself as the embodiment of Machiavellian virt\u00f9\".Robert Service, Stalin: A Biography, UK, Macmillan Publishers, Ltd, 2004, p. 343 English political theorist Thomas Hobbes in his work Leviathan (1651) created the ideology of absolutism that advocated an all-powerful absolute monarchy to maintain order within a state. Absolutism was an influence on fascism. Absolutism based its legitimacy on the precedents of Roman law including the centralized Roman state and the manifestation of Roman law in the Catholic Church.Perry Anderson. Lineages of the Absolutist State. Verso Edition. New York , New York, USA: Verso, 1979. Pp. 28. Though fascism supported the absolute power of the state, it opposed the idea of absolute power being in the hands of a monarch and opposed the feudalism that was associated with absolute monarchies. Portrait of Johann Gottfried Herder, the creator of the concept of nationalism During the Enlightenment, a number of ideological influences arose that would shape the development of fascism. The development of the study of universal histories by Johann Gottfried Herder resulted in Herder's analysis of the development of nations. Herder developed the term Nationalismus (\"nationalism\") to describe this cultural phenomenon. At this time nationalism did not refer to the political ideology of nationalism that was later developed during the French Revolution.Alexander J. Motyl. Encyclopedia of Nationalism, Volume 1: Fundamental Themes. San Diego, California, USA; London, England , UK : Academic Press, 2001. Pp. 341-343. Herder also developed the theory that Europeans are the descendants of Indo-Aryan people based on language studies. Herder argued that the Germanic peoples held close racial connections with the ancient Indians and ancient Persians, who he claimed were advanced peoples possessing a great capacity for wisdom, nobility, restraint and science. Contemporaries of Herder utilized the concept of the Aryan race to draw a distinction between what they deemed \"high and noble\" Aryan culture versus that of \"parasitic\" Semitic culture and this anti-Semitic variant view of Europeans' Aryan roots formed the basis of Nazi racial views. Another major influence on fascism came from the political theories of Georg Wilhelm Friedrich Hegel. Hegel promoted the absolute authority of the state and said \"nothing short of the state is the actualization of freedom\" and that the \"state is the march of God on earth\". The French Revolution and its political legacy had a major influence upon the development of fascism. Fascists view the French Revolution as a largely negative event that resulted in the entrenchment of liberal ideas such as liberal democracy, anticlericalism and rationalism. Opponents of the French Revolution initially were conservatives and reactionaries, but the Revolution was also later criticized by Marxists for its bourgeois character, and by racist nationalists who opposed its universalist principles. Racist nationalists in particular condemned the French Revolution for granting social equality to \"inferior races\" such as Jews. Mussolini condemned the French Revolution for developing liberalism, scientific socialism and liberal democracy, but also acknowledged that fascism extracted and utilized all the elements that had preserved those ideologies' vitality and that fascism had no desire to restore the conditions that precipitated the French Revolution. Though fascism opposed core parts of the Revolution, fascists supported other aspects of it, Mussolini declared his support for the Revolution's demolishment of remnants of the Middle Ages such as tolls and compulsory labour upon citizens and he noted that the French Revolution did have benefits in that it had been a cause of the whole French nation and not merely a political party. Most importantly, the French Revolution was responsible for the entrenchment of nationalism as a political ideology \u2013 both in its development in France as French nationalism and in the creation of nationalist movements particularly in Germany with the development of German nationalism by Johann Gottlieb Fichte as a political response to the development of French nationalism. The Nazis accused the French Revolution of being dominated by Jews and Freemasons and were deeply disturbed by the Revolution's intention to completely break France away from its past history in what the Nazis claimed was a repudiation of history that they asserted to be a trait of the Enlightenment. Though the Nazis were highly critical of the Revolution, Hitler in Mein Kampf said that the French Revolution is a model for how to achieve change that he claims was caused by the rhetorical strength of demagogues. Furthermore, the Nazis idealized the lev\u00e9e en masse (mass mobilization of soldiers) that was developed by French Revolutionary armies and the Nazis sought to use the system for their paramilitary movement. Gaetano Mosca in his work The Ruling Class (1896) developed the theory that claims that in all societies, an \"organized minority\" will dominate and rule over the \"disorganized majority\".William Outhwaite. The Blackwell dictionary of modern social thought. Wiley-Blackwell, 2006. Pp. 442.Tracy H. Koon. Believe, obey, fight: political socialization of youth in fascist Italy, 1922-1943. University of North Carolina Press, 1985. Pp. 6. Mosca claims that there are only two classes in society, \"the governing\" (the organized minority) and \"the governed\" (the disorganized majority).Giuseppe Caforio. \"Handbook of the sociology of the military\", Handbooks of Sociology and Social Research. New York, New York, USA: Springer, 2006. Pp. 12. He claims that the organized nature of the organized minority makes it irresistible to any individual of the disorganized majority. Mosca developed this theory in 1896 in which he argued that the problem of the supremacy of civilian power in society is solved in part by the presence and social structural design of militaries. He claims that the social structure of the military is ideal because it includes diverse social elements that balance each other out and more importantly is its inclusion of an officer class as a \"power elite\". Mosca presented the social structure and methods of governance by the military as a valid model of development for civil society. Mosca's theories are known to have significantly influenced Mussolini's notion of the political process and fascism. Maurice Barr\u00e8s Maurice Barr\u00e8s, a French politician of the late 19th and early 20th centuries who influenced the later fascist movement, claimed that true democracy was authoritarian democracy while rejecting liberal democracy as a fraud.\"Barres and Fascism\" by Robert Soucy, French Historical Studies, Vol. 5, No. 1 (Spring, 1967), pp. 67-97. Duke University Press. Article Stable URL: URL Pp. 87-90 Barr\u00e8s claimed that authoritarian democracy involved a spiritual connection between a leader of a nation and the nation's people, and that true freedom did not arise from individual rights nor parliamentary restraints, but through \"heroic leadership\" and \"national power\". He emphasized the need for hero worship and charismatic leadership in national society. Barr\u00e8s was a founding member of the League for the French Fatherland in 1889, and later coined the term \"socialist nationalism\" to describe his views during an electoral campaign in 1898. He emphasized class collaboration, the role of intuition and emotion in politics alongside racial Antisemitism, and \"he tried to combine the search for energy and a vital style of life with national rootedness and a sort of Darwinian racism.\" Later in life he returned to cultural traditionalism and parliamentary conservatism, but his ideas contributed to the development of an extremist form of nationalism in pre-1914 France. Other French nationalist intellectuals of the early 20th century also wished to \"obliterate the class struggle in ideological terms,\" ending the threat of communism by persuading working people to identify with their nation rather than their class.Mark Neocleous, Fascism, University of Minnesota Press, 1997, p. 40 One of the key persons who greatly influenced fascism was the French intellectual Georges Sorel, who \"must be considered one of the least classifiable political thinkers of the twentieth century\" and supported a variety of different ideologies throughout his life, including conservatism, socialism, revolutionary syndicalism and nationalism.Jan-Werner M\u00fcller, Contesting Democracy: Political Ideas in Twentieth-Century Europe, Yale University Press, 2011, p. 94 Sorel also contributed to the fusion of anarchism and syndicalism together into anarcho-syndicalism. He promoted the legitimacy of political violence in his work Reflections on Violence (1908), during a period in his life when he advocated radical syndicalist action in order to achieve a revolution which would overthrow capitalism and the bourgeoisie through a general strike. In Reflections on Violence, Sorel emphasized need for a revolutionary political religion. Also in his work The Illusions of Progress, Sorel denounced democracy as reactionary, saying \"nothing is more aristocratic than democracy\". By 1909, after the failure of a syndicalist general strike in France, Sorel and his supporters abandoned the radical left and went to the radical right, where they sought to merge militant Catholicism and French patriotism with their views \u2013 advocating anti-republican Christian French patriots as ideal revolutionaries. In the early 1900s Sorel had officially been a revisionist of Marxism, but by 1910 he announced his abandonment of socialism, and in 1914 he claimed - following an aphorism of Benedetto Croce - that \"socialism is dead\" due to the \"decomposition of Marxism\". Sorel became a supporter of reactionary Maurrassian integral nationalism beginning in 1909, and this greatly influenced his works. The fusion of Maurrassian nationalism and Sorelian syndicalism influenced radical Italian nationalist Enrico Corradini. Corradini spoke of the need for a nationalist-syndicalist movement, led by elitist aristocrats and anti-democrats who shared a revolutionary syndicalist commitment to direct action and a willingness to fight. Corradini spoke of Italy as being a \"proletarian nation\" that needed to pursue imperialism in order to challenge the \"plutocratic\" French and British.Blinkhorn, Martin, Mussolini and Fascist Italy. 2nd ed. (New York: Routledge, 2003) p. 9. Corradini's views were part of a wider set of perceptions within the right-wing Italian Nationalist Association (ANI), which claimed that Italy's economic backwardness was caused by corruption in its political class, liberalism, and division caused by \"ignoble socialism\". The ANI held ties and influence among conservatives, Catholics, and the business community. Italian national syndicalists held a common set of principles: the rejection of bourgeois values, democracy, liberalism, Marxism, internationalism and pacifism and the promotion of heroism, vitalism and violence. This early interventionist movement was very small, and did not have an integrated set of policies. Its attempts to hold mass meetings were ineffective and it was regularly harassed by government authorities and socialists.Anthony James Gregor. Young Mussolini and the intellectual origins of fascism. Berkeley and Los Angeles, California , US ; London, England , UK : University of California Press, 1979. pp. 195\u2013196. Antagonism between interventionists and socialists resulted in violence. Attacks on interventionists were so violent that even democratic socialists who opposed the war, such as Anna Kuliscioff, said that the Italian Socialist Party had gone too far in its campaign to silence supporters of the war. Italy finally entered the war on the Allied side in May 1915. Mussolini later took credit for having allegedly forced the government to declare war on Austria, although his influence on events was minimal. He enrolled into the Royal Italian Army in September 1915 and fought in the war until 1917, when he was wounded during a training exercise and discharged. Italy's use of daredevil elite shock troops known as the Arditi, beginning in 1917, was an important influence on the early Fascist movement.Roger Griffin, Matthew Feldman. Fascism: Fascism and culture. London, England , UK ; New York, New York, US: Routledge, 2004. p. 207. The Arditi were soldiers who were specifically trained for a life of violence and wore unique blackshirt uniforms and fezzes. The Arditi formed a national organization in November 1918, the Associazione fra gli Arditi d'Italia, which by mid-1919 had about twenty thousand young men within it. Mussolini appealed to the Arditi, and the Fascist Squadristi movement that developed after the war was based upon the Arditi. In this period, to appease the King of Italy, Mussolini formed a close political alliance between the Italian Fascists and Italy's conservative faction in Parliament, which was led by Luigi Federzoni, a conservative monarchist and nationalist who was a member of the Italian Nationalist Association (ANI).De Grand, Alexander. Italian fascism: its origins and development. 3rd ed. University of Nebraska Press, 2000. pp. 45, 54. The ANI joined the National Fascist Party in 1923.De Grand, Alexander. Italian fascism: its origins and development. 3rd ed. University of Nebraska Press, 2000. p. 45. Because of the merger of the Nationalists with the Fascists, tensions existed between the conservative nationalist and revolutionary syndicalist factions of the movement. The conservative and syndicalist factions of the Fascist movement sought to reconcile their differences, secure unity and promote fascism by taking on the views of each other. Conservative nationalist Fascists promoted fascism as a revolutionary movement to appease the revolutionary syndicalists, while to appease conservative nationalists, the revolutionary syndicalists declared they wanted to secure social stability and ensure economic productivity. This sentiment included most syndicalist Fascists, particularly Edmondo Rossoni, who as secretary-general of the General Confederation of Fascist Syndical Corporations sought \"labor's autonomy and class consciousness\".David D. Roberts, The Syndicalist Tradition and Italian Fascism, University of North Carolina Press, 1979 pp. 289-290 Between 1922 and 1925, Fascism sought to accommodate the Italian Liberal Party, conservatives and nationalists under Italy's coalition government, where major alterations to its political agenda were made\u2014alterations such as abandoning its previous populism, republicanism and anticlericalism\u2014and adopting policies of economic liberalism under Alberto De Stefani, a Center Party member who was Italy's Minister of Finance until dismissed by Mussolini after the imposition of a single-party dictatorship in 1925.Howard M. Sachar, The Assassination of Europe 1918-1942 : A Political History, University Press of Toronto Press, 2015, p. 48 The Fascist regime also accepted the Roman Catholic Church and the monarchy as institutions in Italy.De Grand, Alexander. Italian fascism: its origins and development. 3rd ed. University of Nebraska Press, 2000. p. 145. To appeal to Italian conservatives, Fascism adopted policies such as promoting family values, including the promotion of policies designed to reduce the number of women in the workforce, limiting the woman's role to that of a mother. In an effort to expand Italy's population to facilitate Mussolini's future plans to control the Mediterranean region, the Fascists banned literature on birth control and increased penalties for abortion in 1926, declaring both crimes against the state.Fascists and conservatives: the radical right and the establishment in twentieth-century Europe. Routdlege, 1990. p. 14. Though Fascism adopted a number of positions designed to appeal to reactionaries, the Fascists also sought to maintain Fascism's revolutionary character, with Angelo Oliviero Olivetti saying that \"Fascism would like to be conservative, but it will [be] by being revolutionary\". The Fascists supported revolutionary action and committed to secure law and order to appeal to both conservatives and syndicalists.Martin Blinkhorn. Fascists and Conservatives. 2nd edition. Oxon, England, UK: Routledge, 2001 p. 22. In the 1920s, Fascist Italy pursued an aggressive foreign policy that included an attack on the Greek island of Corfu, aims to expand Italian territory in the Balkans, plans to wage war against Turkey and Yugoslavia, attempts to bring Yugoslavia into civil war by supporting Croat and Macedonian separatists to legitimize Italian intervention, and making Albania a de facto protectorate of Italy (which was achieved through diplomatic means by 1927).Aristotle A. Kallis. Fascist ideology: territory and expansionism in Italy and Germany, 1922\u20131945. London, England , UK : Routledge, 2000. p. 132. In response to revolt in the Italian colony of Libya, Fascist Italy abandoned the previous liberal-era colonial policy of cooperation with local leaders. Instead, claiming that Italians were a superior race to African races and thereby had the right to colonize the \"inferior\" Africans, it sought to settle 10 to 15 million Italians in Libya.Ali Abdullatif Ahmida. The making of modern Libya: state formation, colonization, and resistance, 1830\u20131922. Albany, New York, US: State University of New York Press, 1994. pp. 134\u2013135. This resulted in an aggressive military campaign against the Libyans, including mass killings, the use of concentration camps and the forced starvation of thousands of people. Italian authorities committed ethnic cleansing by forcibly expelling 100,000 Bedouin Cyrenaicans, half the population of Cyrenaica in Libya, from land that was slated to be given to Italian settlers.Anthony L. Cardoza. Benito Mussolini: the first fascist. Pearson Longman, 2006 Pp. 109.Donald Bloxham, A. Dirk Moses. The Oxford Handbook of Genocide Studies. Oxford, England, UK: Oxford University Press, 2010. Pp. 358. Nazis in Munich during the Beer Hall Putsch The March on Rome brought Fascism international attention. One early admirer of the Italian Fascists was Adolf Hitler, who less than a month after the March had begun to model himself and the Nazi Party upon Mussolini and the Fascists.Ian Kershaw. Hitler, 1889\u20131936: hubris. New York , New York, US; London, England , UK : W. W. Norton & Company, 2000. p. 182. The Nazis, led by Hitler and the German war hero Erich Ludendorff, attempted a \"March on Berlin\" modeled upon the March on Rome, which resulted in the failed Beer Hall Putsch in Munich in November 1923, where the Nazis briefly captured Bavarian Minister President Gustav Ritter von Kahr and announced the creation of a new German government to be led by a triumvirate of von Kahr, Hitler and Ludendorff.David Jablonsky. The Nazi Party in dissolution: Hitler and the Verbotzeit, 1923\u20131925. London, England , UK ; Totowa, New Jersey, US: Frank Cass and Company Ltd., 1989. pp. 20\u201326, 30 The Beer Hall Putsch was crushed by Bavarian police and Hitler and other leading Nazis were arrested and detained until 1925. International surge of fascism and World War II (1929\u20131945) Benito Mussolini (left) and Adolf Hitler (right) The events of the Great Depression resulted in an international surge of fascism and the creation of several fascist regimes and regimes that adopted fascist policies. The most important new fascist regime was Nazi Germany, under the leadership of Adolf Hitler. With the rise of Hitler and the Nazis to power in 1933, liberal democracy was dissolved in Germany and the Nazis mobilized the country for war, with expansionist territorial aims against several countries. In the 1930s, the Nazis implemented racial laws that deliberately discriminated against, disenfranchised and persecuted Jews and other racial minority groups. Hungarian fascist Gyula G\u00f6mb\u00f6s rose to power as Prime Minister of Hungary in 1932 and visited Fascist Italy and Nazi Germany in order to consolidate good relations with the two regimes. He attempted to entrench his Party of National Unity throughout the country, created a youth organization and a political militia with sixty thousand members, promoted social reforms such as a 48-hour work week in industry, and pursued irredentist claims on Hungary's neighbors. The fascist Iron Guard movement in Romania soared in political support after 1933, gaining representation in the Romanian government and an Iron Guard member assassinated prime minister Ion Duca. The Iron Guard had little in the way of a concrete program and placed more emphasis on ideas of religious and spiritual revival. During the 6 February 1934 crisis, France faced the greatest domestic political turmoil since the Dreyfus Affair when the fascist Francist Movement and multiple far right movements rioted en masse in Paris against the French government resulting in major political violence.Stuart Joseph Woolf. Fascism in Europe. 3rd Edition. Taylor & Francis, 1983. Pp. 311. A variety of para-fascist governments that borrowed elements from fascism were also formed during the Great Depression, including in Greece, Lithuania, Poland and Yugoslavia. Integralists marching in Brazil Fascism also expanded its influence outside Europe, especially in East Asia, the Middle East and South America. In China, Wang Jingwei's Kai-tsu p'ai (Reorganization) faction of the Kuomintang (Nationalist Party of China) supported Nazism in the late 1930s.Dongyoun Hwang. Wang Jingwei, The National Government, and the Problem of Collaboration. Ph.D. Dissertation, Duke University. UMI Dissertation Services, Ann Arbor, Michigan. 2000, 118.Larsen, Stein Ugelvik (ed.). Fascism Outside of Europe. New York: Columbia University Press, 2001. . P. 255. In Japan, a Nazi movement called the T\u014dh\u014dkai was formed by Seig\u014d Nakano. The Al-Muthanna Club of Iraq was a pan-Arab movement that supported Nazism and exercised its influence in the Iraqi government through cabinet minister Saib Shawkat who formed a paramilitary youth movement.I. Gershoni, James P. Jankowski. Confronting fascism in Egypt: dictatorship versus democracy in the 1930s. Stanford, California, US: Stanford University Press, 2010. p. 273. In South America, several mostly short-lived fascist governments and prominent fascist movements were formed during this period. Argentine President General Jos\u00e9 F\u00e9lix Uriburu proposed that Argentina be reorganized along corporatist and fascist lines.Michael A. Burdick. For God and the fatherland: religion and politics in Argentina. Albany, New York, US: State University of New York Press, 1995. Pp. 45. Peruvian president Luis Miguel S\u00e1nchez Cerro founded the Revolutionary Union in 1931 as the state party for his dictatorship. Later, the Revolutionary Union was taken over by Ra\u00fal Ferrero Rebagliati, who sought to mobilise mass support for the group's nationalism in a manner akin to fascism and even started a paramilitary Blackshirts arm as a copy of the Italian group, but the Union lost heavily in the 1936 elections and faded into obscurity. In Paraguay in 1940, Paraguayan President General Higinio Mor\u00ednigo began his rule as a dictator with the support of pro-fascist military officers, appealed to the masses, exiled opposition leaders and only abandoned his pro-fascist policies after the end of World War II. The Brazilian Integralists led by Pl\u00ednio Salgado, claimed as many as 200,000 members although following coup attempts it faced a crackdown from the Estado Novo of Get\u00falio Vargas in 1937. In the 1930s, the National Socialist Movement of Chile gained seats in Chile's parliament and attempted a coup d'\u00e9tat that resulted in the Seguro Obrero massacre of 1938. Fascist Italy and Nazi Germany pursued territorial expansionist and interventionist foreign policy agendas from the 1930s through the 1940s, culminating in World War II. Mussolini supported irredentist Italian claims over neighboring territories, establishing Italian domination of the Mediterranean Sea, securing Italian access to the Atlantic Ocean, and the creation of Italian spazio vitale (\"vital space\") in the Mediterranean and Red Sea regions.Aristotle A. Kallis. Fascist ideology: territory and expansionism in Italy and Germany, 1922-1945. New York, New York, US: Routledge, 2001. Pp. 51. Hitler supported irredentist German claims over all territories inhabited by ethnic Germans, along with the creation of German Lebensraum (\"living space\") in Eastern Europe, including territories held by the Soviet Union, that would be colonized by Germans.Aristotle A. Kallis. Fascist ideology: territory and expansionism in Italy and Germany, 1922-1945. New York, New York, US: Routledge, 2001. Pp. 53. Corpses of victims of the German Buchenwald concentration camp From 1935 to 1939, Germany and Italy escalated their demands for territorial gains and greater influence in world affairs. Italy invaded Ethiopia in 1935, resulting in condemnation by the League of Nations and widespread diplomatic isolation. In 1936, Germany remilitarized the industrial Rhineland, a region that had been ordered demilitarized by the Treaty of Versailles. In 1938, Germany annexed Austria and the Sudetenland region of Czechoslovakia. The next year, Czechoslovakia was partitioned between Germany and a client state of Slovakia. At the same time, from 1938 to 1939, Italy was demanding territorial and colonial concessions from France and Britain in the Mediterranean.Davide Rodogno. Fascism's European empire. Cambridge, England, UK: Cambridge University Press, 2006 Pp. 47. In 1939, Germany prepared for war with Poland, but also attempted to gain territorial concessions from Poland through diplomatic means. Germany demanded that Poland accept the annexation of the Free City of Danzig to Germany and authorize the construction of automobile highways from Germany through the Polish Corridor into Danzig and East Prussia, promising a twenty-five year non-aggression pact in exchange.Eugene Davidson. The Unmaking of Adolf Hitler. Columbia, Missouri, USA: University of Missouri Press, 2004 Pp. 371-372. The Polish government did not trust Hitler's promises and refused to accept German demands. Following a strategic alliance between Germany and the Soviet Union in August 1939, the two powers invaded Poland in September of that year. In response, the United Kingdom, France and their allies declared war against Germany, resulting in the outbreak of World War II. Germany and the Soviet Union partitioned Poland between them in late 1939 followed by the successful German offensive in Scandinavia and continental Western Europe in 1940. On 10 June 1940, Mussolini led Italy into World War II on the side of the Axis. Mussolini was aware that Italy did not have the military capacity to carry out a long war with France or Britain and waited until France was on the verge of imminent collapse before declaring war, on the assumption that the war would be short-lived.MacGregor Knox. Mussolini unleashed, 1939-1941 : Politics and Strategy in Fascist Italy's Last War. Edition of 1999. Cambridge, England, UK: Cambridge University Press, 1999. Pp. 122\u2013127. Mussolini believed that Italy could gain some territorial concessions from France and then concentrate its forces on a major offensive in Egypt. Plans by Germany to invade the United Kingdom in 1940 failed after Germany lost the aerial warfare campaign in the Battle of Britain. The war became prolonged contrary to Mussolini's plans, resulting in Italy losing battles on multiple fronts and requiring German assistance. In 1941, the Axis campaign spread to the Soviet Union after Hitler launched Operation Barbarossa. Axis forces at the height of their power controlled almost all of continental Europe, including the occupation of large portions of the Soviet Union. By 1942, Fascist Italy occupied and annexed Dalmatia from Yugoslavia, Corsica and Nice from France and controlled other territories. During World War II, the Axis Powers in Europe led by Nazi Germany participated in the extermination of millions of Jews and others in the genocide known as the Holocaust. Yugoslavia, Greece and Ethiopia requested the extradition of 1,200 Italian war criminals, but these people never saw anything like the Nuremberg trials since the British government, with the beginning of Cold War, saw in Pietro Badoglio a guarantee of an anti-communist post-war Italy.Effie G. H. Pedaliu (2004) Britain and the 'Hand-over' of Italian War Criminals to Yugoslavia, 1945-48. (JStor.org preview), Journal of Contemporary History. Vol. 39, No. 4, Special Issue: Collective Memory, pp. 503\u2013529 The repression of memory led to historical revisionismAlessandra Kersevan 2008: (Editor) Foibe - Revisionismo di stato e amnesie della repubblica. Kappa Vu. Udine. in Italy and in 2003 the Italian media published Silvio Berlusconi's statement that Benito Mussolini only \"used to send people on vacation\",Survivors of war camp lament Italy's amnesia, 2003, International Herald Tribune denying the existence of Italian concentration camps such as Rab concentration camp.Rory, Carroll. Italy's bloody secret. The Guardian. (Archived by WebCite\u00ae), The Guardian, London, UK, June 25 , 2003 Ba'ath Party founder Michel Aflaq (left) with Iraqi President Saddam Hussein (right) in 1988, as both of Ba'athism's key ideologists Michel Aflaq and Zaki al-Arsuzi were directly inspired by Fascism and Nazism Another ideology strongly influenced by fascism is Ba'athism. Ba'athism is a revolutionary Arab nationalist ideology that seeks the unification of all claimed Arab lands into a single Arab state. Zaki al-Arsuzi, one of the principal founders of Ba'athism, was strongly influenced by and supportive of Fascism and Nazism.Curtis, Michel (1971). People and Politics in the Middle East. Transaction Publishers. . Pp. 132-138. Several close associates of Ba'athism's key ideologist Michel Aflaq have admitted that Aflaq had been directly inspired by certain fascist and Nazi theorists. Ba'athist regimes in power in Iraq and Syria have held strong similarities to fascism, they are radical authoritarian nationalist one-party states. Due to Ba'athism's anti-Western stances it preferred the Soviet Union in the Cold War and admired and adopted certain Soviet organizational structures for their governments, but the Ba'athist regimes have persecuted communists. Like fascist regimes, Ba'athism became heavily militarized in power. Ba'athist movements governed Iraq in 1963 and again from 1968 to 2003 and in Syria from 1963 to the present. Ba'athist heads of state such as Syrian President Hafez al-Assad and Iraqi President Saddam Hussein created personality cults around themselves portraying themselves as the nationalist saviours of the Arab world. In 1922, following the March on Rome, the National Fascist Party came to power and Mussolini became prime minister of Italy. From that time until the advent of the Great Depression in 1929, the Italian Fascists pursued a generally free-market and pro-capitalist economic policy, in collaboration with traditional Italian business elites.Carl T. Schmidt, \"The corporate state in action; Italy under fascism\", Oxford University Press, 1939. pp. 116-119William G. Welk, \"Fascist economy policy; an analysis of Italy's economic experiment\", Harvard University Press, 1938. pp. 163 Near the beginning of his tenure as prime minister, in 1923, Mussolini declared that \"the [Fascist] government will accord full freedom to private enterprise and will abandon all intervention in private economy.\"Carl T. Schmidt, \"The corporate state in action; Italy under fascism\", Oxford University Press, 1939. pp. 115 Mussolini's government privatized former government monopolies (such as the telephone system), repealed previous legislation that had been introduced by the Socialists (such as the inheritance tax), and balanced the budget.William G. Welk, \"Fascist economy policy; an analysis of Italy's economic experiment\", Harvard University Press, 1938. pp. 160-161 Alfredo Rocco, the Fascist Minister of Justice at the time, wrote in 1926 that: The Italian Fascist outlook towards capitalism changed after 1929, with the onset of the Great Depression which dealt a heavy blow to the Italian economy. Prices fell, production slowed, and unemployment more than tripled in the first four years of the Depression.William G. Welk, \"Fascist economy policy; an analysis of Italy's economic experiment\", Harvard University Press, 1938. pp. 166 In response, the Fascist government abandoned economic liberalism and turned to state intervention in the economy. Mussolini developed a theory which held that capitalism had degenerated over time, and that the capitalism of his era was facing a crisis because it had departed too far from its original roots. According to Mussolini, the original form was heroic capitalism or dynamic capitalism (1830\u20131870), which gave way to static capitalism (1870\u20131914), which then transformed into decadent capitalism or \"supercapitalism\", starting in 1914.Falasca-Zamponi, Simonetta. Fascist Spectacle: The Aesthetics of Power in Mussolini's Italy. University of California Press, 2000. p. 136-137. Mussolini denounced this supercapitalism as a failure due to its alleged decadence, support for unlimited consumerism and intention to create the \"standardization of humankind\".G\u00fcnter Berghaus. Fascism and theatre: comparative studies on the aesthetics and politics of performance. Berkeley and Los Angeles, California , US : University of California Press, 2000. pp. 136\u2013137Mussolini, Benito. Four Speeches on the Corporate State: With an Appendix Including the Labour Charter, the Text of Laws on Syndical and Corporate Organisations and Explanatory notes (Laboremus, 1935) p. 16. He claimed that supercapitalism had resulted in the collapse of the capitalist system in the Great Depression, but that the industrial developments of earlier types of capitalism were valuable and that private property should be supported as long as it was productive. Fascists also argued that, without intervention, supercapitalism \"would ultimately decay and open the way for a Marxist revolution as labour-capital relations broke down\". They presented their new economic program as a way to avoid this result. In the late 1930s, Fascist Italy tried to achieve autarky (national economic self-sufficiency), and for this purpose the government promoted manufacturing cartels and introduced significant tariff barriers, currency restrictions and regulations of the economy in order to attempt to balance payments with Italy's trade partners. The attempt to achieve effective economic autonomy was not successful, but minimizing international trade remained an official goal of Italian Fascism. Conservatism Conservatives and fascists in Europe have held similar positions on many issues, including anti-communism and support of national pride. Conservatives and fascists both reject the liberal and Marxist emphasis on linear progressive evolution in history.Erin G. Carlston. Thinking Fascism: Sapphic Modernism and Fascist Modernity. Stanford, California: Stanford University Press, 1998. Pp. 68. Fascism's emphasis on order, discipline, hierarchy, military virtues and preservation of private property appealed to conservatives. The fascist promotion of \"healthy\", \"uncontaminated\" elements of national tradition such as chivalric culture and glorifying a nation's historical golden age has similarities with conservative aims. Fascists also made pragmatic tactical alliances with traditional conservative forces in order to achieve and maintain power. Even at the height of their influence and popularity, fascist movements were never able to seize power entirely by themselves, and relied on alliances with conservative parties in order to come to power. Many of fascism's recruits were disaffected right-wing conservatives who were dissatisfied with the traditional right's inability to achieve national unity and its inability to respond to socialism, feminism, economic crisis and international difficulties.Kevin Passmore. Fascism: a very short introduction. New York, New York, USA: Oxford University Press, 2002. With traditional conservative parties in Europe severely weakened in the aftermath of World War I, there was a political vacuum on the right which fascism filled.Kevin Passmore, Fascism: A Very Short Introduction, Oxford University Press, 2002. Chapter 6. Fascists gathered support from landlords, business owners, army officers, and other conservative individuals and groups, by successfully presenting themselves as the last line of defense against land reform, social welfare measures, demilitarization, higher wages, and the socialization of the means of production.John Weiss, \"The Fascist Tradition: Radical right-wing extremism in modern Europe.\" Harper & Row, 1967. pp. 4-5 Another difference with traditional conservatism lies in the fact that fascism had radical aspirations for reshaping society. Arthur M. Schlesinger Jr. wrote that \"Fascists were not conservative in any very meaningful sense\u2026 The Fascists, in a meaningful sense, were revolutionaries\".Arthur M. Schlesinger, Jr. \"Not Right, Not Left, But a Vital Center\", New York Times Magazine, ( April 4 , 1948) Fascists sought to destroy existing elites through revolutionary action in order to replace them with a new elite selected on the principle of the survival of the fittest, and thus they \"rejected existing aristocracies in favor of their own new aristocracy.\" Yet at the same time, some fascist leaders claimed to be counter-revolutionary, and fascism saw itself as being opposed to all previous revolutions from the French Revolution onward, blaming them for liberalism, socialism, and decadence. In his book Fascism (1997), Mark Neocleous sums up these paradoxical tendencies by referring to fascism as \"a prime example of reactionary modernism\" as well as \"the culmination of the conservative revolutionary tradition.\"Neocleous, Mark (1997) Fascism. University of Minnesota Press. Chapter 4, pp.57 -60 Fascism opposed the internationalist character of mainstream socialism, but in doing so, it sometimes defined itself as a new, nationalist form of socialism, an alternative to the mainstream form of socialism which it regarded as its bitter enemy. Hitler at times attempted to redefine the word socialism, such as saying: \"Socialism! That is an unfortunate word altogether... What does socialism really mean? If people have something to eat and their pleasures, then they have their socialism\".Henry A. Turner, \"German Big Business and the Rise of Hitler\", Oxford University Press, 1985. pg 77 In 1930, Hitler said: \"Our adopted term 'Socialist' has nothing to do with Marxist Socialism. Marxism is anti-property; true Socialism is not\".Carsten, Francis Ludwig The Rise of Fascism, 2nd ed. University of California Press, 1982. p. 137. Quoting: Hitler, A., Sunday Express, September 28 , 1930. The name that Hitler later wished he had used to describe his political party was \"social revolutionary\".Konrad Heiden, A History of National Socialism, vol. 2, New York: NY, Rutledge, 2010, p. 85. First published in 1934. The Sorelian emphasis on the need for a revolution based upon action of intuition, a cult of energy and vitality, activism, heroism and the utilization of myth was utilized by fascists. Many prominent fascist figures were formerly associated with revolutionary syndicalism, including Mussolini, Arturo Labriola, Robert Michels, Sergio Panunzio and Paolo Orano.Roger Griffin, ed., \"Fascism\" by Zeev Sternhill, International Fascism: Theories, Causes, and the New Consensus (London, England; New York: Arnold Publishers, 1998) p. 32. Bibliography on fascist ideology De Felice, Renzo Fascism: An Informal Introduction to Its Theory and Practice, An Interview with Michael Ledeen, New Brunswick, N.J. : Transaction Books, 1976 . Laqueur, Walter. 1966. Fascism: Past, Present, Future, New York: Oxford: Oxford University Press, 1996. Griffin, Roger. 2000. \"Revolution from the Right: Fascism,\" chapter in David Parker (ed.) Revolutions and the Revolutionary Tradition in the West 1560-1991 , Routledge, London. Baker, David, \"The Political Economy of Fascism: Myth or Reality, or Myth and Reality?\" New Political Economy, Volume 11, Issue 2 June 2006, pages 227 - 250 Schapiro, J. Salwyn. 1949. Liberalism and The Challenge of Fascism, Social Forces in England and France ( 1815-1870 ). New York: McGraw-Hill. Dimitri Kitsikis.\u0396\u03ac\u03bd-\u0396\u1f70\u03ba \u1fec\u03bf\u03c5\u03c3\u03c3\u1ff6 \u03ba\u03b1\u1f76 \u1f10\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03bf\u03bd\u03b9\u03ba\u1f78\u03c2 \u03c6\u03b1\u03c3\u03b9\u03c3\u03bc\u03cc\u03c2 [Jean-Jacques Rousseau and scientific fascism]. Athens, Exodos, 2O21,151 pages, Laclau, Ernesto. 1977. Politics and Ideology in Marxist Theory: Capitalism, Fascism, Populism. London: NLB/Atlantic Highlands Humanities Press. The Doctrine of Fascism signed by Benito Mussolini (complete text) Authorized translation of Mussolini\u2019s \"The Political and Social Doctrine of Fascism\" (1933) The Political Economy of Fascism - From Dave Renton's anti-fascist website Fascism and Zionism - From The Hagshama Department - World Zionist Organization Fascism Part I - Understanding Fascism and Anti-Semitism Eternal Fascism: Fourteen Ways of Looking at a Blackshirt - Umberto Eco's list of 14 characteristics of Fascism, originally published 1995. Site of an Italian fascist party Italian and German languages Site dedicated to the period of fascism in Greece ( 1936-1941 ) Text of the papal encyclical Quadragesimo Anno. Profits \u00fcber Alles! American Corporations and Hitler by Jacques R. Pauwels", "after_revision": "Hitler went on to say in Mein Kampf: \"The struggle that rages today involves very great aims: a culture fights for its existence, which combines millenniums and embraces Hellenism and Germanity together\". The Spartans were emulated by the quasi-fascist regime of Ioannis Metaxas who called for Greeks to wholly commit themselves to the nation with self-control as the Spartans had done.J\u00fcrgen Fischer. Balkan strongmen: dictators and authoritarian rulers of South Eastern Europe. London, England : Purdue University Press, 2007. Pp. 184. Supporters of the 4th of August Regime in the 1930s to 1940s justified the dictatorship of Metaxas on the basis that the \"First Greek Civilization\" involved an Athenian dictatorship led by Pericles who had brought ancient Greece to greatness. The Greek philosopher Plato supported many similar political positions to fascism. In The Republic (c. 380 BC),Contemporary Political Theory: New Dimensions, Basic Concepts and Major Trends. 12th Edition. New Delhi, India: Sterling Publishers Private Ltd, 2007. Pp. 705. Plato emphasizes the need for a philosopher king in an ideal state. Plato believed the ideal state would be ruled by an elite class of rulers known as \"Guardians\" and rejected the idea of social equality. Plato believed in an authoritarian state. Plato held Athenian democracy in contempt by saying: \"The laws of democracy remain a dead letter, its freedom is anarchy, its equality the equality of unequals\". Like fascism, Plato emphasized that individuals must adhere to laws and perform duties while declining to grant individuals rights to limit or reject state interference in their lives. Like fascism, Plato also claimed that an ideal state would have state-run education that was designed to promote able rulers and warriors. Like many fascist ideologues, Plato advocated for a state-sponsored eugenics program to be carried out in order to improve the Guardian class in his Republic through selective breeding. Italian Fascist Il Duce Benito Mussolini had a strong attachment to the works of Plato.Ludwig, Emile; Mussolini, Benito. Talks with Mussolini. Boston: Little Brown & Company, 1933. p. 130. However, there are significant differences between Plato's ideals and fascism. Unlike fascism, Plato never promoted expansionism and he was opposed to offensive war. Leviathan (1651), the book written by Thomas Hobbes that advocates absolute monarchy There were a number of influences on fascism from the Renaissance era in Europe. Niccol\u00f2 Machiavelli is known to have influenced Italian Fascism, particularly through his promotion of the absolute authority of the state. Machiavelli rejected all existing traditional and metaphysical assumptions of the time\u2014especially those associated with the Middle Ages\u2014and asserted as an Italian patriot that Italy needed a strong and all-powerful state led by a vigorous and ruthless leader who would conquer and unify Italy.Contemporary Political Theory: New Dimensions, Basic Concepts and Major Trends. 12th Edition. New Delhi, India: Sterling Publishers Private Ltd, 2007. Pp. 706. Mussolini saw himself as a modern-day Machiavellian and wrote an introduction to his honorary doctoral thesis for the University of Bologna\u2014\"Prelude to Machiavelli\".Benito Mussolini, \"Prelude to Machiavelli,\" The Living Age, Vol. 323, No. 4194, 22 November 1924. Originally published in the Italian journal Gerarchia in 1924, edited by Mussolini and Margherita Sarfatti). Mussolini's thesis was titled \"Comments of the year 1924 on the Prince of Machiavelli,\" (University of Bologna, 1924) Mussolini professed that Machiavelli's \"pessimism about human nature was eternal in its acuity. Individuals simply could not be relied on voluntarily to 'obey the law, pay their taxes and serve in war'. No well-ordered society could want the people to be sovereign\".(R.J.B. Bosworth, Mussolini, Chapter Eight: Government 1922\u201324 , Hodder Education, 2002, p. 192. Most dictators of the 20th century mimicked Mussolini's admiration for Machiavelli and \"Stalin... saw himself as the embodiment of Machiavellian virt\u00f9\".Robert Service, Stalin: A Biography, UK, Macmillan Publishers, Ltd, 2004, p. 343 English political theorist Thomas Hobbes in his work Leviathan (1651) created the ideology of absolutism that advocated an all-powerful absolute monarchy to maintain order within a state. Absolutism was an influence on fascism. Absolutism based its legitimacy on the precedents of Roman law including the centralized Roman state and the manifestation of Roman law in the Catholic Church.Perry Anderson. Lineages of the Absolutist State. Verso Edition. New York City, USA: Verso, 1979. Pp. 28. Though fascism supported the absolute power of the state, it opposed the idea of absolute power being in the hands of a monarch and opposed the feudalism that was associated with absolute monarchies. Portrait of Johann Gottfried Herder, the creator of the concept of nationalism During the Enlightenment, a number of ideological influences arose that would shape the development of fascism. The development of the study of universal histories by Johann Gottfried Herder resulted in Herder's analysis of the development of nations. Herder developed the term Nationalismus (\"nationalism\") to describe this cultural phenomenon. At this time nationalism did not refer to the political ideology of nationalism that was later developed during the French Revolution.Alexander J. Motyl. Encyclopedia of Nationalism, Volume 1: Fundamental Themes. San Diego, California, USA; London, England : Academic Press, 2001. Pp. 341\u2013343. Herder also developed the theory that Europeans are the descendants of Indo-Aryan people based on language studies. Herder argued that the Germanic peoples held close racial connections with the ancient Indians and ancient Persians, who he claimed were advanced peoples possessing a great capacity for wisdom, nobility, restraint and science. Contemporaries of Herder used the concept of the Aryan race to draw a distinction between what they deemed \"high and noble\" Aryan culture versus that of \"parasitic\" Semitic culture and this anti-Semitic variant view of Europeans' Aryan roots formed the basis of Nazi racial views. Another major influence on fascism came from the political theories of Georg Wilhelm Friedrich Hegel. Hegel promoted the absolute authority of the state and said \"nothing short of the state is the actualization of freedom\" and that the \"state is the march of God on earth\". The French Revolution and its political legacy had a major influence upon the development of fascism. Fascists view the French Revolution as a largely negative event that resulted in the entrenchment of liberal ideas such as liberal democracy, anticlericalism and rationalism. Opponents of the French Revolution initially were conservatives and reactionaries, but the Revolution was also later criticized by Marxists for its bourgeois character, and by racist nationalists who opposed its universalist principles. Racist nationalists in particular condemned the French Revolution for granting social equality to \"inferior races\" such as Jews. Mussolini condemned the French Revolution for developing liberalism, scientific socialism and liberal democracy, but also acknowledged that fascism extracted and used all the elements that had preserved those ideologies' vitality and that fascism had no desire to restore the conditions that precipitated the French Revolution. Though fascism opposed core parts of the Revolution, fascists supported other aspects of it, Mussolini declared his support for the Revolution's demolishment of remnants of the Middle Ages such as tolls and compulsory labour upon citizens and he noted that the French Revolution did have benefits in that it had been a cause of the whole French nation and not merely a political party. Most importantly, the French Revolution was responsible for the entrenchment of nationalism as a political ideology \u2013 both in its development in France as French nationalism and in the creation of nationalist movements particularly in Germany with the development of German nationalism by Johann Gottlieb Fichte as a political response to the development of French nationalism. The Nazis accused the French Revolution of being dominated by Jews and Freemasons and were deeply disturbed by the Revolution's intention to completely break France away from its past history in what the Nazis claimed was a repudiation of history that they asserted to be a trait of the Enlightenment. Though the Nazis were highly critical of the Revolution, Hitler in Mein Kampf said that the French Revolution is a model for how to achieve change that he claims was caused by the rhetorical strength of demagogues. Furthermore, the Nazis idealized the lev\u00e9e en masse (mass mobilization of soldiers) that was developed by French Revolutionary armies and the Nazis sought to use the system for their paramilitary movement. Gaetano Mosca in his work The Ruling Class (1896) developed the theory that claims that in all societies, an \"organized minority\" will dominate and rule over the \"disorganized majority\".William Outhwaite. The Blackwell dictionary of modern social thought. Wiley-Blackwell, 2006. Pp. 442.Tracy H. Koon. Believe, obey, fight: political socialization of youth in fascist Italy, 1922\u20131943. University of North Carolina Press, 1985. Pp. 6. Mosca claims that there are only two classes in society, \"the governing\" (the organized minority) and \"the governed\" (the disorganized majority).Giuseppe Caforio. \"Handbook of the sociology of the military\", Handbooks of Sociology and Social Research. New York, New York, USA: Springer, 2006. Pp. 12. He claims that the organized nature of the organized minority makes it irresistible to any individual of the disorganized majority. Mosca developed this theory in 1896 in which he argued that the problem of the supremacy of civilian power in society is solved in part by the presence and social structural design of militaries. He claims that the social structure of the military is ideal because it includes diverse social elements that balance each other out and more importantly is its inclusion of an officer class as a \"power elite\". Mosca presented the social structure and methods of governance by the military as a valid model of development for civil society. Mosca's theories are known to have significantly influenced Mussolini's notion of the political process and fascism. Maurice Barr\u00e8s Maurice Barr\u00e8s, a French politician of the late 19th and early 20th centuries who influenced the later fascist movement, claimed that true democracy was authoritarian democracy while rejecting liberal democracy as a fraud.\"Barres and Fascism\" by Robert Soucy, French Historical Studies, Vol. 5, No. 1 (Spring, 1967), pp. 67\u201397. Duke University Press. Article Stable URL: URL Pp. 87\u201390 Barr\u00e8s claimed that authoritarian democracy involved a spiritual connection between a leader of a nation and the nation's people, and that true freedom did not arise from individual rights nor parliamentary restraints, but through \"heroic leadership\" and \"national power\". He emphasized the need for hero worship and charismatic leadership in national society. Barr\u00e8s was a founding member of the League for the French Fatherland in 1889, and later coined the term \"socialist nationalism\" to describe his views during an electoral campaign in 1898. He emphasized class collaboration, the role of intuition and emotion in politics alongside racial Antisemitism, and \"he tried to combine the search for energy and a vital style of life with national rootedness and a sort of Darwinian racism.\" Later in life he returned to cultural traditionalism and parliamentary conservatism, but his ideas contributed to the development of an extremist form of nationalism in pre-1914 France. Other French nationalist intellectuals of the early 20th century also wished to \"obliterate the class struggle in ideological terms,\" ending the threat of communism by persuading working people to identify with their nation rather than their class.Mark Neocleous, Fascism, University of Minnesota Press, 1997, p. 40 One of the key persons who greatly influenced fascism was the French intellectual Georges Sorel, who \"must be considered one of the least classifiable political thinkers of the twentieth century\" and supported a variety of different ideologies throughout his life, including conservatism, socialism, revolutionary syndicalism and nationalism.Jan-Werner M\u00fcller, Contesting Democracy: Political Ideas in Twentieth-Century Europe, Yale University Press, 2011, p. 94 Sorel also contributed to the fusion of anarchism and syndicalism together into anarcho-syndicalism. He promoted the legitimacy of political violence in his work Reflections on Violence (1908), during a period in his life when he advocated radical syndicalist action to achieve a revolution which would overthrow capitalism and the bourgeoisie through a general strike. In Reflections on Violence, Sorel emphasized need for a revolutionary political religion. Also in his work The Illusions of Progress, Sorel denounced democracy as reactionary, saying \"nothing is more aristocratic than democracy\". By 1909, after the failure of a syndicalist general strike in France, Sorel and his supporters abandoned the radical left and went to the radical right, where they sought to merge militant Catholicism and French patriotism with their views \u2013 advocating anti-republican Christian French patriots as ideal revolutionaries. In the early 1900s Sorel had officially been a revisionist of Marxism, but by 1910 he announced his abandonment of socialism, and in 1914 he claimed \u2013 following an aphorism of Benedetto Croce \u2013 that \"socialism is dead\" due to the \"decomposition of Marxism\". Sorel became a supporter of reactionary Maurrassian integral nationalism beginning in 1909, and this greatly influenced his works. The fusion of Maurrassian nationalism and Sorelian syndicalism influenced radical Italian nationalist Enrico Corradini. Corradini spoke of the need for a nationalist-syndicalist movement, led by elitist aristocrats and anti-democrats who shared a revolutionary syndicalist commitment to direct action and a willingness to fight. Corradini spoke of Italy as being a \"proletarian nation\" that needed to pursue imperialism to challenge the \"plutocratic\" French and British.Blinkhorn, Martin, Mussolini and Fascist Italy. 2nd ed. (New York: Routledge, 2003) p. 9. Corradini's views were part of a wider set of perceptions within the right-wing Italian Nationalist Association (ANI), which claimed that Italy's economic backwardness was caused by corruption in its political class, liberalism, and division caused by \"ignoble socialism\". The ANI held ties and influence among conservatives, Catholics, and the business community. Italian national syndicalists held a common set of principles: the rejection of bourgeois values, democracy, liberalism, Marxism, internationalism and pacifism and the promotion of heroism, vitalism and violence. This early interventionist movement was very small, and did not have an integrated set of policies. Its attempts to hold mass meetings were ineffective and it was regularly harassed by government authorities and socialists.Anthony James Gregor. Young Mussolini and the intellectual origins of fascism. Berkeley and Los Angeles, California ; London, England : University of California Press, 1979. pp. 195\u2013196. Antagonism between interventionists and socialists resulted in violence. Attacks on interventionists were so violent that even democratic socialists who opposed the war, such as Anna Kuliscioff, said that the Italian Socialist Party had gone too far in its campaign to silence supporters of the war. Italy finally entered the war on the Allied side in May 1915. Mussolini later took credit for having allegedly forced the government to declare war on Austria, although his influence on events was minimal. He enrolled into the Royal Italian Army in September 1915 and fought in the war until 1917, when he was wounded during a training exercise and discharged. Italy's use of daredevil elite shock troops known as the Arditi, beginning in 1917, was an important influence on the early Fascist movement.Roger Griffin, Matthew Feldman. Fascism: Fascism and culture. London, England ; New York, New York, US: Routledge, 2004. p. 207. The Arditi were soldiers who were specifically trained for a life of violence and wore unique blackshirt uniforms and fezzes. The Arditi formed a national organization in November 1918, the Associazione fra gli Arditi d'Italia, which by mid-1919 had about twenty thousand young men within it. Mussolini appealed to the Arditi, and the Fascist Squadristi movement that developed after the war was based upon the Arditi. In this period, to appease the King of Italy, Mussolini formed a close political alliance between the Italian Fascists and Italy's conservative faction in Parliament, which was led by Luigi Federzoni, a conservative monarchist and nationalist who was a member of the Italian Nationalist Association (ANI).De Grand, Alexander. Italian fascism: its origins and development. 3rd ed. University of Nebraska Press, 2000. pp. 45, 54. The ANI joined the National Fascist Party in 1923.De Grand, Alexander. Italian fascism: its origins and development. 3rd ed. University of Nebraska Press, 2000. p. 45. Because of the merger of the Nationalists with the Fascists, tensions existed between the conservative nationalist and revolutionary syndicalist factions of the movement. The conservative and syndicalist factions of the Fascist movement sought to reconcile their differences, secure unity and promote fascism by taking on the views of each other. Conservative nationalist Fascists promoted fascism as a revolutionary movement to appease the revolutionary syndicalists, while to appease conservative nationalists, the revolutionary syndicalists declared they wanted to secure social stability and ensure economic productivity. This sentiment included most syndicalist Fascists, particularly Edmondo Rossoni, who as secretary-general of the General Confederation of Fascist Syndical Corporations sought \"labor's autonomy and class consciousness\".David D. Roberts, The Syndicalist Tradition and Italian Fascism, University of North Carolina Press, 1979 pp. 289\u2013290 Between 1922 and 1925, Fascism sought to accommodate the Italian Liberal Party, conservatives and nationalists under Italy's coalition government, where major alterations to its political agenda were made\u2014alterations such as abandoning its previous populism, republicanism and anticlericalism\u2014and adopting policies of economic liberalism under Alberto De Stefani, a Center Party member who was Italy's Minister of Finance until dismissed by Mussolini after the imposition of a single-party dictatorship in 1925.Howard M. Sachar, The Assassination of Europe 1918\u20131942 : A Political History, University Press of Toronto Press, 2015, p. 48 The Fascist regime also accepted the Roman Catholic Church and the monarchy as institutions in Italy.De Grand, Alexander. Italian fascism: its origins and development. 3rd ed. University of Nebraska Press, 2000. p. 145. To appeal to Italian conservatives, Fascism adopted policies such as promoting family values, including the promotion of policies designed to reduce the number of women in the workforce, limiting the woman's role to that of a mother. In an effort to expand Italy's population to facilitate Mussolini's future plans to control the Mediterranean region, the Fascists banned literature on birth control and increased penalties for abortion in 1926, declaring both crimes against the state.Fascists and conservatives: the radical right and the establishment in twentieth-century Europe. Routdlege, 1990. p. 14. Though Fascism adopted a number of positions designed to appeal to reactionaries, the Fascists also sought to maintain Fascism's revolutionary character, with Angelo Oliviero Olivetti saying that \"Fascism would like to be conservative, but it will [be] by being revolutionary\". The Fascists supported revolutionary action and committed to secure law and order to appeal to both conservatives and syndicalists.Martin Blinkhorn. Fascists and Conservatives. 2nd edition. Oxon, England, UK: Routledge, 2001 p. 22. In the 1920s, Fascist Italy pursued an aggressive foreign policy that included an attack on the Greek island of Corfu, aims to expand Italian territory in the Balkans, plans to wage war against Turkey and Yugoslavia, attempts to bring Yugoslavia into civil war by supporting Croat and Macedonian separatists to legitimize Italian intervention, and making Albania a de facto protectorate of Italy (which was achieved through diplomatic means by 1927).Aristotle A. Kallis. Fascist ideology: territory and expansionism in Italy and Germany, 1922\u20131945. London, England : Routledge, 2000. p. 132. In response to revolt in the Italian colony of Libya, Fascist Italy abandoned the previous liberal-era colonial policy of cooperation with local leaders. Instead, claiming that Italians were a superior race to African races and thereby had the right to colonize the \"inferior\" Africans, it sought to settle 10 to 15 million Italians in Libya.Ali Abdullatif Ahmida. The making of modern Libya: state formation, colonization, and resistance, 1830\u20131922. Albany, New York, US: State University of New York Press, 1994. pp. 134\u2013135. This resulted in an aggressive military campaign against the Libyans, including mass killings, the use of concentration camps and the forced starvation of thousands of people. Italian authorities committed ethnic cleansing by forcibly expelling 100,000 Bedouin Cyrenaicans, half the population of Cyrenaica in Libya, from land that was slated to be given to Italian settlers.Anthony L. Cardoza. Benito Mussolini: the first fascist. Pearson Longman, 2006 Pp. 109.Donald Bloxham, A. Dirk Moses. The Oxford Handbook of Genocide Studies. Oxford, England, UK: Oxford University Press, 2010. Pp. 358. Nazis in Munich during the Beer Hall Putsch The March on Rome brought Fascism international attention. One early admirer of the Italian Fascists was Adolf Hitler, who less than a month after the March had begun to model himself and the Nazi Party upon Mussolini and the Fascists.Ian Kershaw. Hitler, 1889\u20131936: hubris. New York City, US; London, England : W. W. Norton & Company, 2000. p. 182. The Nazis, led by Hitler and the German war hero Erich Ludendorff, attempted a \"March on Berlin\" modeled upon the March on Rome, which resulted in the failed Beer Hall Putsch in Munich in November 1923, where the Nazis briefly captured Bavarian Minister President Gustav Ritter von Kahr and announced the creation of a new German government to be led by a triumvirate of von Kahr, Hitler and Ludendorff.David Jablonsky. The Nazi Party in dissolution: Hitler and the Verbotzeit, 1923\u20131925. London, England ; Totowa, New Jersey, US: Frank Cass and Company Ltd., 1989. pp. 20\u201326, 30 The Beer Hall Putsch was crushed by Bavarian police and Hitler and other leading Nazis were arrested and detained until 1925. International surge of fascism and World War II (1929\u20131945) Benito Mussolini (left) and Adolf Hitler (right) The events of the Great Depression resulted in an international surge of fascism and the creation of several fascist regimes and regimes that adopted fascist policies. The most important new fascist regime was Nazi Germany, under the leadership of Adolf Hitler. With the rise of Hitler and the Nazis to power in 1933, liberal democracy was dissolved in Germany and the Nazis mobilized the country for war, with expansionist territorial aims against several countries. In the 1930s, the Nazis implemented racial laws that deliberately discriminated against, disenfranchised and persecuted Jews and other racial minority groups. Hungarian fascist Gyula G\u00f6mb\u00f6s rose to power as Prime Minister of Hungary in 1932 and visited Fascist Italy and Nazi Germany to consolidate good relations with the two regimes. He attempted to entrench his Party of National Unity throughout the country, created a youth organization and a political militia with sixty thousand members, promoted social reforms such as a 48-hour work week in industry, and pursued irredentist claims on Hungary's neighbors. The fascist Iron Guard movement in Romania soared in political support after 1933, gaining representation in the Romanian government and an Iron Guard member assassinated prime minister Ion Duca. The Iron Guard had little in the way of a concrete program and placed more emphasis on ideas of religious and spiritual revival. During the 6 February 1934 crisis, France faced the greatest domestic political turmoil since the Dreyfus Affair when the fascist Francist Movement and multiple far right movements rioted en masse in Paris against the French government resulting in major political violence.Stuart Joseph Woolf. Fascism in Europe. 3rd Edition. Taylor & Francis, 1983. Pp. 311. A variety of para-fascist governments that borrowed elements from fascism were also formed during the Great Depression, including in Greece, Lithuania, Poland and Yugoslavia. Integralists marching in Brazil Fascism also expanded its influence outside Europe, especially in East Asia, the Middle East and South America. In China, Wang Jingwei's Kai-tsu p'ai (Reorganization) faction of the Kuomintang (Nationalist Party of China) supported Nazism in the late 1930s.Dongyoun Hwang. Wang Jingwei, The National Government, and the Problem of Collaboration. PhD Dissertation, Duke University. UMI Dissertation Services, Ann Arbor, Michigan. 2000, 118.Larsen, Stein Ugelvik (ed.). Fascism Outside of Europe. New York: Columbia University Press, 2001. . P. 255. In Japan, a Nazi movement called the T\u014dh\u014dkai was formed by Seig\u014d Nakano. The Al-Muthanna Club of Iraq was a pan-Arab movement that supported Nazism and exercised its influence in the Iraqi government through cabinet minister Saib Shawkat who formed a paramilitary youth movement.I. Gershoni, James P. Jankowski. Confronting fascism in Egypt: dictatorship versus democracy in the 1930s. Stanford, California, US: Stanford University Press, 2010. p. 273. In South America, several mostly short-lived fascist governments and prominent fascist movements were formed during this period. Argentine President General Jos\u00e9 F\u00e9lix Uriburu proposed that Argentina be reorganized along corporatist and fascist lines.Michael A. Burdick. For God and the fatherland: religion and politics in Argentina. Albany, New York, US: State University of New York Press, 1995. Pp. 45. Peruvian president Luis Miguel S\u00e1nchez Cerro founded the Revolutionary Union in 1931 as the state party for his dictatorship. Later, the Revolutionary Union was taken over by Ra\u00fal Ferrero Rebagliati, who sought to mobilise mass support for the group's nationalism in a manner akin to fascism and even started a paramilitary Blackshirts arm as a copy of the Italian group, but the Union lost heavily in the 1936 elections and faded into obscurity. In Paraguay in 1940, Paraguayan President General Higinio Mor\u00ednigo began his rule as a dictator with the support of pro-fascist military officers, appealed to the masses, exiled opposition leaders and only abandoned his pro-fascist policies after the end of World War II. The Brazilian Integralists led by Pl\u00ednio Salgado, claimed as many as 200,000 members although following coup attempts it faced a crackdown from the Estado Novo of Get\u00falio Vargas in 1937. In the 1930s, the National Socialist Movement of Chile gained seats in Chile's parliament and attempted a coup d'\u00e9tat that resulted in the Seguro Obrero massacre of 1938. Fascist Italy and Nazi Germany pursued territorial expansionist and interventionist foreign policy agendas from the 1930s through the 1940s, culminating in World War II. Mussolini supported irredentist Italian claims over neighboring territories, establishing Italian domination of the Mediterranean Sea, securing Italian access to the Atlantic Ocean, and the creation of Italian spazio vitale (\"vital space\") in the Mediterranean and Red Sea regions.Aristotle A. Kallis. Fascist ideology: territory and expansionism in Italy and Germany, 1922\u20131945. New York, New York, US: Routledge, 2001. Pp. 51. Hitler supported irredentist German claims over all territories inhabited by ethnic Germans, along with the creation of German Lebensraum (\"living space\") in Eastern Europe, including territories held by the Soviet Union, that would be colonized by Germans.Aristotle A. Kallis. Fascist ideology: territory and expansionism in Italy and Germany, 1922\u20131945. New York, New York, US: Routledge, 2001. Pp. 53. Corpses of victims of the German Buchenwald concentration camp From 1935 to 1939, Germany and Italy escalated their demands for territorial gains and greater influence in world affairs. Italy invaded Ethiopia in 1935, resulting in condemnation by the League of Nations and widespread diplomatic isolation. In 1936, Germany remilitarized the industrial Rhineland, a region that had been ordered demilitarized by the Treaty of Versailles. In 1938, Germany annexed Austria and the Sudetenland region of Czechoslovakia. The next year, Czechoslovakia was partitioned between Germany and a client state of Slovakia. At the same time, from 1938 to 1939, Italy was demanding territorial and colonial concessions from France and Britain in the Mediterranean.Davide Rodogno. Fascism's European empire. Cambridge, England, UK: Cambridge University Press, 2006 Pp. 47. In 1939, Germany prepared for war with Poland, but also attempted to gain territorial concessions from Poland through diplomatic means. Germany demanded that Poland accept the annexation of the Free City of Danzig to Germany and authorize the construction of automobile highways from Germany through the Polish Corridor into Danzig and East Prussia, promising a twenty-five-year non-aggression pact in exchange.Eugene Davidson. The Unmaking of Adolf Hitler. Columbia, Missouri, USA: University of Missouri Press, 2004 Pp. 371\u2013372. The Polish government did not trust Hitler's promises and refused to accept German demands. Following a strategic alliance between Germany and the Soviet Union in August 1939, the two powers invaded Poland in September of that year. In response, the United Kingdom, France and their allies declared war against Germany, resulting in the outbreak of World War II. Germany and the Soviet Union partitioned Poland between them in late 1939 followed by the successful German offensive in Scandinavia and continental Western Europe in 1940. On 10 June 1940, Mussolini led Italy into World War II on the side of the Axis. Mussolini was aware that Italy did not have the military capacity to carry out a long war with France or Britain and waited until France was on the verge of imminent collapse before declaring war, on the assumption that the war would be short-lived.MacGregor Knox. Mussolini unleashed, 1939\u20131941 : Politics and Strategy in Fascist Italy's Last War. Edition of 1999. Cambridge, England, UK: Cambridge University Press, 1999. Pp. 122\u2013127. Mussolini believed that Italy could gain some territorial concessions from France and then concentrate its forces on a major offensive in Egypt. Plans by Germany to invade the United Kingdom in 1940 failed after Germany lost the aerial warfare campaign in the Battle of Britain. The war became prolonged contrary to Mussolini's plans, resulting in Italy losing battles on multiple fronts and requiring German assistance. In 1941, the Axis campaign spread to the Soviet Union after Hitler launched Operation Barbarossa. Axis forces at the height of their power controlled almost all of continental Europe, including the occupation of large portions of the Soviet Union. By 1942, Fascist Italy occupied and annexed Dalmatia from Yugoslavia, Corsica and Nice from France and controlled other territories. During World War II, the Axis Powers in Europe led by Nazi Germany participated in the extermination of millions of Jews and others in the genocide known as the Holocaust. Yugoslavia, Greece and Ethiopia requested the extradition of 1,200 Italian war criminals, but these people never saw anything like the Nuremberg trials since the British government, with the beginning of Cold War, saw in Pietro Badoglio a guarantee of an anti-communist post-war Italy.Effie G. H. Pedaliu (2004) Britain and the 'Hand-over' of Italian War Criminals to Yugoslavia, 1945\u201348. (JStor.org preview), Journal of Contemporary History. Vol. 39, No. 4, Special Issue: Collective Memory, pp. 503\u2013529 The repression of memory led to historical revisionismAlessandra Kersevan 2008: (Editor) Foibe \u2013 Revisionismo di stato e amnesie della repubblica. Kappa Vu. Udine. in Italy and in 2003 the Italian media published Silvio Berlusconi's statement that Benito Mussolini only \"used to send people on vacation\",Survivors of war camp lament Italy's amnesia, 2003, International Herald Tribune denying the existence of Italian concentration camps such as Rab concentration camp.Rory, Carroll. Italy's bloody secret. The Guardian. (Archived by WebCite\u00ae), The Guardian, London, UK, 25 June 2003 Ba'ath Party founder Michel Aflaq (left) with Iraqi President Saddam Hussein (right) in 1988, as both of Ba'athism's key ideologists Michel Aflaq and Zaki al-Arsuzi were directly inspired by Fascism and Nazism Another ideology strongly influenced by fascism is Ba'athism. Ba'athism is a revolutionary Arab nationalist ideology that seeks the unification of all claimed Arab lands into a single Arab state. Zaki al-Arsuzi, one of the principal founders of Ba'athism, was strongly influenced by and supportive of Fascism and Nazism.Curtis, Michel (1971). People and Politics in the Middle East. Transaction Publishers. . Pp. 132\u2013138. Several close associates of Ba'athism's key ideologist Michel Aflaq have admitted that Aflaq had been directly inspired by certain fascist and Nazi theorists. Ba'athist regimes in power in Iraq and Syria have held strong similarities to fascism, they are radical authoritarian nationalist one-party states. Due to Ba'athism's anti-Western stances it preferred the Soviet Union in the Cold War and admired and adopted certain Soviet organizational structures for their governments, but the Ba'athist regimes have persecuted communists. Like fascist regimes, Ba'athism became heavily militarized in power. Ba'athist movements governed Iraq in 1963 and again from 1968 to 2003 and in Syria from 1963 to the present. Ba'athist heads of state such as Syrian President Hafez al-Assad and Iraqi President Saddam Hussein created personality cults around themselves portraying themselves as the nationalist saviours of the Arab world. In 1922, following the March on Rome, the National Fascist Party came to power and Mussolini became prime minister of Italy. From that time until the advent of the Great Depression in 1929, the Italian Fascists pursued a generally free-market and pro-capitalist economic policy, in collaboration with traditional Italian business elites.Carl T. Schmidt, \"The corporate state in action; Italy under fascism\", Oxford University Press, 1939. pp. 116\u2013119William G. Welk, \"Fascist economy policy; an analysis of Italy's economic experiment\", Harvard University Press, 1938. pp. 163 Near the beginning of his tenure as prime minister, in 1923, Mussolini declared that \"the [Fascist] government will accord full freedom to private enterprise and will abandon all intervention in private economy.\"Carl T. Schmidt, \"The corporate state in action; Italy under fascism\", Oxford University Press, 1939. pp. 115 Mussolini's government privatized former government monopolies (such as the telephone system), repealed previous legislation that had been introduced by the Socialists (such as the inheritance tax), and balanced the budget.William G. Welk, \"Fascist economy policy; an analysis of Italy's economic experiment\", Harvard University Press, 1938. pp. 160\u2013161 Alfredo Rocco, the Fascist Minister of Justice at the time, wrote in 1926 that: The Italian Fascist outlook towards capitalism changed after 1929, with the onset of the Great Depression which dealt a heavy blow to the Italian economy. Prices fell, production slowed, and unemployment more than tripled in the first four years of the Depression.William G. Welk, \"Fascist economy policy; an analysis of Italy's economic experiment\", Harvard University Press, 1938. pp. 166 In response, the Fascist government abandoned economic liberalism and turned to state intervention in the economy. Mussolini developed a theory which held that capitalism had degenerated over time, and that the capitalism of his era was facing a crisis because it had departed too far from its original roots. According to Mussolini, the original form was heroic capitalism or dynamic capitalism (1830\u20131870), which gave way to static capitalism (1870\u20131914), which then transformed into decadent capitalism or \"supercapitalism\", starting in 1914.Falasca-Zamponi, Simonetta. Fascist Spectacle: The Aesthetics of Power in Mussolini's Italy. University of California Press, 2000. p. 136-137. Mussolini denounced this supercapitalism as a failure due to its alleged decadence, support for unlimited consumerism and intention to create the \"standardization of humankind\".G\u00fcnter Berghaus. Fascism and theatre: comparative studies on the aesthetics and politics of performance. Berkeley and Los Angeles, California : University of California Press, 2000. pp. 136\u2013137Mussolini, Benito. Four Speeches on the Corporate State: With an Appendix Including the Labour Charter, the Text of Laws on Syndical and Corporate Organisations and Explanatory notes (Laboremus, 1935) p. 16. He claimed that supercapitalism had resulted in the collapse of the capitalist system in the Great Depression, but that the industrial developments of earlier types of capitalism were valuable and that private property should be supported as long as it was productive. Fascists also argued that, without intervention, supercapitalism \"would ultimately decay and open the way for a Marxist revolution as labour-capital relations broke down\". They presented their new economic program as a way to avoid this result. In the late 1930s, Fascist Italy tried to achieve autarky (national economic self-sufficiency), and for this purpose the government promoted manufacturing cartels and introduced significant tariff barriers, currency restrictions and regulations of the economy to attempt to balance payments with Italy's trade partners. The attempt to achieve effective economic autonomy was not successful, but minimizing international trade remained an official goal of Italian Fascism. Conservatism Conservatives and fascists in Europe have held similar positions on many issues, including anti-communism and support of national pride. Conservatives and fascists both reject the liberal and Marxist emphasis on linear progressive evolution in history.Erin G. Carlston. Thinking Fascism: Sapphic Modernism and Fascist Modernity. Stanford, California: Stanford University Press, 1998. Pp. 68. Fascism's emphasis on order, discipline, hierarchy, military virtues and preservation of private property appealed to conservatives. The fascist promotion of \"healthy\", \"uncontaminated\" elements of national tradition such as chivalric culture and glorifying a nation's historical golden age has similarities with conservative aims. Fascists also made pragmatic tactical alliances with traditional conservative forces to achieve and maintain power. Even at the height of their influence and popularity, fascist movements were never able to seize power entirely by themselves, and relied on alliances with conservative parties to come to power. Many of fascism's recruits were disaffected right-wing conservatives who were dissatisfied with the traditional right's inability to achieve national unity and its inability to respond to socialism, feminism, economic crisis and international difficulties.Kevin Passmore. Fascism: a very short introduction. New York, New York, USA: Oxford University Press, 2002. With traditional conservative parties in Europe severely weakened in the aftermath of World War I, there was a political vacuum on the right which fascism filled.Kevin Passmore, Fascism: A Very Short Introduction, Oxford University Press, 2002. Chapter 6. Fascists gathered support from landlords, business owners, army officers, and other conservative individuals and groups, by successfully presenting themselves as the last line of defense against land reform, social welfare measures, demilitarization, higher wages, and the socialization of the means of production.John Weiss, \"The Fascist Tradition: Radical right-wing extremism in modern Europe.\" Harper & Row, 1967. pp. 4\u20135 Another difference with traditional conservatism lies in the fact that fascism had radical aspirations for reshaping society. Arthur M. Schlesinger Jr. wrote that \"Fascists were not conservative in any very meaningful sense\u2026 The Fascists, in a meaningful sense, were revolutionaries\".Arthur M. Schlesinger, Jr. \"Not Right, Not Left, But a Vital Center\", New York Times Magazine, ( 4 April 1948) Fascists sought to destroy existing elites through revolutionary action to replace them with a new elite selected on the principle of the survival of the fittest, and thus they \"rejected existing aristocracies in favor of their own new aristocracy.\" Yet at the same time, some fascist leaders claimed to be counter-revolutionary, and fascism saw itself as being opposed to all previous revolutions from the French Revolution onward, blaming them for liberalism, socialism, and decadence. In his book Fascism (1997), Mark Neocleous sums up these paradoxical tendencies by referring to fascism as \"a prime example of reactionary modernism\" as well as \"the culmination of the conservative revolutionary tradition.\"Neocleous, Mark (1997) Fascism. University of Minnesota Press. Chapter 4, pp.57 \u201360 Fascism opposed the internationalist character of mainstream socialism, but in doing so, it sometimes defined itself as a new, nationalist form of socialism, an alternative to the mainstream form of socialism which it regarded as its bitter enemy. Hitler at times attempted to redefine the word socialism, such as saying: \"Socialism! That is an unfortunate word altogether... What does socialism really mean? If people have something to eat and their pleasures, then they have their socialism\".Henry A. Turner, \"German Big Business and the Rise of Hitler\", Oxford University Press, 1985. pg 77 In 1930, Hitler said: \"Our adopted term 'Socialist' has nothing to do with Marxist Socialism. Marxism is anti-property; true Socialism is not\".Carsten, Francis Ludwig The Rise of Fascism, 2nd ed. University of California Press, 1982. p. 137. Quoting: Hitler, A., Sunday Express, 28 September 1930. The name that Hitler later wished he had used to describe his political party was \"social revolutionary\".Konrad Heiden, A History of National Socialism, vol. 2, New York: NY, Rutledge, 2010, p. 85. First published in 1934. The Sorelian emphasis on the need for a revolution based upon action of intuition, a cult of energy and vitality, activism, heroism and the use of myth was used by fascists. Many prominent fascist figures were formerly associated with revolutionary syndicalism, including Mussolini, Arturo Labriola, Robert Michels, Sergio Panunzio and Paolo Orano.Roger Griffin, ed., \"Fascism\" by Zeev Sternhill, International Fascism: Theories, Causes, and the New Consensus (London, England; New York: Arnold Publishers, 1998) p. 32. Bibliography on fascist ideology De Felice, Renzo Fascism: An Informal Introduction to Its Theory and Practice, An Interview with Michael Ledeen, New Brunswick, N.J. : Transaction Books, 1976 . Laqueur, Walter. 1966. Fascism: Past, Present, Future, New York: Oxford: Oxford University Press, 1996. Griffin, Roger. 2000. \"Revolution from the Right: Fascism,\" chapter in David Parker (ed.) Revolutions and the Revolutionary Tradition in the West 1560\u20131991 , Routledge, London. Baker, David, \"The Political Economy of Fascism: Myth or Reality, or Myth and Reality?\" New Political Economy, Volume 11, Issue 2 June 2006, pages 227 \u2013 250 Schapiro, J. Salwyn. 1949. Liberalism and The Challenge of Fascism, Social Forces in England and France ( 1815\u20131870 ). New York: McGraw-Hill. Dimitri Kitsikis.\u0396\u03ac\u03bd-\u0396\u1f70\u03ba \u1fec\u03bf\u03c5\u03c3\u03c3\u1ff6 \u03ba\u03b1\u1f76 \u1f10\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03bf\u03bd\u03b9\u03ba\u1f78\u03c2 \u03c6\u03b1\u03c3\u03b9\u03c3\u03bc\u03cc\u03c2 [Jean-Jacques Rousseau and scientific fascism]. Athens, Exodos, 2O21,151 pages, Laclau, Ernesto. 1977. Politics and Ideology in Marxist Theory: Capitalism, Fascism, Populism. London: NLB/Atlantic Highlands Humanities Press. The Doctrine of Fascism signed by Benito Mussolini (complete text) Authorized translation of Mussolini\u2019s \"The Political and Social Doctrine of Fascism\" (1933) The Political Economy of Fascism \u2013 From Dave Renton's anti-fascist website Fascism and Zionism \u2013 From The Hagshama Department \u2013 World Zionist Organization Fascism Part I \u2013 Understanding Fascism and Anti-Semitism Eternal Fascism: Fourteen Ways of Looking at a Blackshirt \u2013 Umberto Eco's list of 14 characteristics of Fascism, originally published 1995. Site of an Italian fascist party Italian and German languages Site dedicated to the period of fascism in Greece ( 1936\u20131941 ) Text of the papal encyclical Quadragesimo Anno. Profits \u00fcber Alles! American Corporations and Hitler by Jacques R. Pauwels", "edit_actions": [{"type": "D", "before": ", UK", "after": null, "start_char_pos": 496, "end_char_pos": 500}, {"type": "D", "before": "November", "after": null, "start_char_pos": 3335, "end_char_pos": 3343}, {"type": "R", "before": ",", "after": "November", "start_char_pos": 3347, "end_char_pos": 3348}, {"type": "R", "before": "1922-24", "after": "1922\u201324", "start_char_pos": 3903, "end_char_pos": 3910}, {"type": "R", "before": ", New York,", "after": "City,", "start_char_pos": 4639, "end_char_pos": 4650}, {"type": "D", "before": ", UK", "after": null, "start_char_pos": 5559, "end_char_pos": 5563}, {"type": "R", "before": "341-343.", "after": "341\u2013343.", "start_char_pos": 5592, "end_char_pos": 5600}, {"type": "R", "before": "utilized", "after": "used", "start_char_pos": 5969, "end_char_pos": 5977}, {"type": "R", "before": "utilized", "after": "used", "start_char_pos": 7308, "end_char_pos": 7316}, {"type": "R", "before": "1922-1943.", "after": "1922\u20131943.", "start_char_pos": 9340, "end_char_pos": 9350}, {"type": "R", "before": "67-97.", "after": "67\u201397.", "start_char_pos": 10823, "end_char_pos": 10829}, {"type": "R", "before": "87-90", "after": "87\u201390", "start_char_pos": 10881, "end_char_pos": 10886}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 12911, "end_char_pos": 12919}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 13723, "end_char_pos": 13724}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 13766, "end_char_pos": 13767}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 14383, "end_char_pos": 14391}, {"type": "D", "before": ", US", "after": null, "start_char_pos": 15449, "end_char_pos": 15453}, {"type": "D", "before": ", UK", "after": null, "start_char_pos": 15472, "end_char_pos": 15476}, {"type": "D", "before": ", UK", "after": null, "start_char_pos": 16410, "end_char_pos": 16414}, {"type": "R", "before": "289-290", "after": "289\u2013290", "start_char_pos": 18435, "end_char_pos": 18442}, {"type": "R", "before": "1918-1942", "after": "1918\u20131942", "start_char_pos": 19000, "end_char_pos": 19009}, {"type": "D", "before": ", UK", "after": null, "start_char_pos": 20982, "end_char_pos": 20986}, {"type": "R", "before": ", New York,", "after": "City,", "start_char_pos": 22465, "end_char_pos": 22476}, {"type": "D", "before": ", UK", "after": null, "start_char_pos": 22497, "end_char_pos": 22501}, {"type": "D", "before": ", UK", "after": null, "start_char_pos": 23047, "end_char_pos": 23051}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 24114, "end_char_pos": 24122}, {"type": "R", "before": "Ph.D.", "after": "PhD", "start_char_pos": 25692, "end_char_pos": 25697}, {"type": "R", "before": "1922-1945.", "after": "1922\u20131945.", "start_char_pos": 28372, "end_char_pos": 28382}, {"type": "R", "before": "1922-1945.", "after": "1922\u20131945.", "start_char_pos": 28777, "end_char_pos": 28787}, {"type": "R", "before": "twenty-five year", "after": "twenty-five-year", "start_char_pos": 30056, "end_char_pos": 30072}, {"type": "R", "before": "371-372.", "after": "371\u2013372.", "start_char_pos": 30216, "end_char_pos": 30224}, {"type": "R", "before": "1939-1941", "after": "1939\u20131941", "start_char_pos": 31127, "end_char_pos": 31136}, {"type": "R", "before": "1945-48.", "after": "1945\u201348.", "start_char_pos": 32632, "end_char_pos": 32640}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 32852, "end_char_pos": 32853}, {"type": "D", "before": "June", "after": null, "start_char_pos": 33328, "end_char_pos": 33332}, {"type": "R", "before": ",", "after": "June", "start_char_pos": 33336, "end_char_pos": 33337}, {"type": "R", "before": "132-138.", "after": "132\u2013138.", "start_char_pos": 33966, "end_char_pos": 33974}, {"type": "R", "before": "116-119William", "after": "116\u2013119William", "start_char_pos": 35344, "end_char_pos": 35358}, {"type": "R", "before": "160-161", "after": "160\u2013161", "start_char_pos": 36146, "end_char_pos": 36153}, {"type": "D", "before": ", US", "after": null, "start_char_pos": 37632, "end_char_pos": 37636}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 38670, "end_char_pos": 38678}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 39713, "end_char_pos": 39721}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 39930, "end_char_pos": 39938}, {"type": "R", "before": "4-5", "after": "4\u20135", "start_char_pos": 40999, "end_char_pos": 41002}, {"type": "D", "before": "April", "after": null, "start_char_pos": 41384, "end_char_pos": 41389}, {"type": "R", "before": ",", "after": "April", "start_char_pos": 41392, "end_char_pos": 41393}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 41472, "end_char_pos": 41480}, {"type": "R", "before": "-60", "after": "\u201360", "start_char_pos": 42200, "end_char_pos": 42203}, {"type": "D", "before": "September", "after": null, "start_char_pos": 43077, "end_char_pos": 43086}, {"type": "R", "before": ",", "after": "September", "start_char_pos": 43090, "end_char_pos": 43091}, {"type": "R", "before": "utilization", "after": "use", "start_char_pos": 43461, "end_char_pos": 43472}, {"type": "R", "before": "utilized", "after": "used", "start_char_pos": 43485, "end_char_pos": 43493}, {"type": "R", "before": "1560-1991", "after": "1560\u20131991", "start_char_pos": 44297, "end_char_pos": 44306}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 44479, "end_char_pos": 44480}, {"type": "R", "before": "1815-1870", "after": "1815\u20131870", "start_char_pos": 44591, "end_char_pos": 44600}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 45102, "end_char_pos": 45103}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 45164, "end_char_pos": 45165}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 45195, "end_char_pos": 45196}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 45239, "end_char_pos": 45240}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 45339, "end_char_pos": 45340}, {"type": "R", "before": "1936-1941", "after": "1936\u20131941", "start_char_pos": 45535, "end_char_pos": 45544}], "sents_char_pos": [0, 204, 386, 401, 479, 533, 785, 868, 976, 990, 1047, 1124, 1261, 1303, 1465, 1650, 1789, 1975, 2063, 2077, 2096, 2118, 2164, 2243, 2330, 2496, 2636, 2930, 3009, 3023, 3080, 3255, 3354, 3463, 3677, 3784, 3848, 3944, 4097, 4365, 4405, 4565, 4580, 4614, 4629, 4668, 4876, 5067, 5207, 5301, 5436, 5455, 5514, 5542, 5587, 5600, 5716, 5943, 6228, 6330, 6502, 6604, 6779, 7016, 7145, 7477, 7863, 8241, 8543, 8758, 8964, 9151, 9169, 9220, 9243, 9266, 9350, 9392, 9545, 9562, 9651, 9692, 9832, 10028, 10239, 10369, 10486, 10724, 10829, 10852, 11159, 11247, 11435, 11678, 11864, 12113, 12523, 12744, 13022, 13112, 13252, 13573, 13831, 13962, 14082, 14291, 14442, 14489, 14804, 14896, 15109, 15209, 15333, 15354, 15411, 15455, 15529, 15602, 15829, 15891, 16035, 16190, 16332, 16363, 16393, 16416, 16465, 16591, 16758, 16884, 17190, 17210, 17256, 17312, 17363, 17383, 17429, 17480, 17651, 17827, 18106, 18325, 18342, 18389, 18425, 18465, 18954, 19181, 19201, 19247, 19299, 19533, 19786, 19882, 19906, 20184, 20316, 20333, 20361, 20374, 20416, 20867, 20887, 20965, 21013, 21167, 21356, 21378, 21464, 21541, 21717, 21917, 21936, 21973, 22004, 22034, 22075, 22127, 22239, 22416, 22428, 22455, 22480, 22541, 22945, 22961, 23030, 23053, 23252, 23529, 23623, 23829, 23988, 24174, 24453, 24649, 24778, 25053, 25073, 25092, 25105, 25129, 25313, 25457, 25603, 25618, 25691, 25728, 25776, 25815, 25842, 25895, 25968, 26175, 26207, 26281, 26348, 26477, 26600, 26619, 26683, 26747, 26881, 27202, 27474, 27661, 27832, 28002, 28284, 28304, 28382, 28423, 28689, 28709, 28787, 28828, 29022, 29142, 29273, 29352, 29446, 29586, 29601, 29628, 29693, 29829, 30105, 30121, 30151, 30224, 30316, 30457, 30587, 30760, 30840, 31090, 31105, 31189, 31206, 31264, 31277, 31422, 31556, 31698, 31796, 31946, 32079, 32251, 32537, 32694, 32903, 33226, 33240, 33263, 33277, 33614, 33748, 33873, 33895, 33935, 33974, 34133, 34281, 34509, 34578, 34687, 34900, 35025, 35238, 35286, 35392, 35689, 35738, 36023, 36064, 36388, 36498, 36539, 36739, 36934, 37170, 37197, 37262, 37312, 37490, 37506, 37594, 37706, 37895, 38164, 38336, 38409, 38738, 38890, 39040, 39156, 39173, 39232, 39287, 39428, 39627, 39752, 39956, 40213, 40228, 40264, 40320, 40483, 40565, 40891, 40974, 41128, 41227, 41287, 41658, 41896, 42119, 42151, 42182, 42451, 42537, 42579, 42612, 42698, 42891, 42917, 42941, 42993, 43039, 43097, 43203, 43295, 43320, 43506, 43681, 43810, 44063, 44150, 44166, 44327, 44415, 44505, 44603, 44626, 44644, 44733, 44782, 44860, 44909, 45103, 45420, 45594, 45614]}
+{"doc_id": "313522", "revision_depth": "2", "before_revision": "In other media Television 200px|Vulture (Adrian Toomes) in the Spider-Man animated series. The Blackie Drago incarnation of Vulture, referred to as Vulture Man, appeared in the 1960s Spider-Man animated series, voiced by Gillie Fenwick. The Adrian Toomes incarnation of Vulture appeared in the 1981 Spider-Man animated series, voiced by Don Messick. 200px|Vulture in Spider-Man Unlimited. The Adrian Toomes incarnation of Vulture appeared in the 1990s Spider-Man animated series, voiced by Eddie Albert as an old man, and by Alan Johnson as a young man. Originally an engineer who sought revenge on Norman Osborn, he began a quest to drain youth from others in a bid to become younger. He later becomes a member of the Insidious Six. A heroic half-Bestial version of Vulture from Counter-Earth appears in the Spider-Man Unlimited animated series, voiced by Scott McNeil. 200px|Vulture (Adrian Toomes) in The Spectacular Spider-Man animated series. The Adrian Toomes incarnation of Vulture appears in The Spectacular Spider-Man animated series, voiced by Robert Englund. This version wears a modified version of Terry Dodson's black and red costume from Marvel Knights Spider-Man. Originally an aeronautics engineer who sought revenge against Norman Osborn for stealing his inventions , he later joined the Sinister Six as Doctor Octopus's right-hand man. The Adrian Toomes incarnation of Vulture appears in the Ultimate Spider-Man animated series, voiced by Tom Kenny. This version is a teenage test subject of Doctor Octopus's genetic experiments with the ability to shapeshift between his human form and an anthropomorphic vulture-esque form that sports Jimmy Natale's organic wings and sonic shrieks. He is later equipped with Blackie Drago's Ultimate Marvel green armor after becoming involved with Hydra and the mainstream Drago's red and black armor after joining the Sinister Six. Additionally, he is not as villainous as other versions and even regards Spider-Man as a friend, only siding with supervillains who offered to help him discover his origins before eventually redeeming himself. The Adrian Toomes incarnation of Vulture appears in the 2010s Spider-Man animated series, voiced by Alastair Duncan. This version is a middle-aged man whose flight suit is equipped with a neck-mounted device that enables sonic attacks and initially serves as a henchman to Norman Osborn and Doctor Octopus for the Sinister Six. Toomes also inspires the Wake Riders and later takes on the Goblin King alias in a personal quest for power while leading the Goblin Nation. A Vulturion-esque group called the Wake Riders also appear in the show . Based on the name for a group of vultures, they are a viral stunt group that consists of their leader Barkley Blitz (voiced by Ogie Banks), an unnamed female (voiced by Audrey Wasilewski and by Melanie Minichino), and two unnamed males (both voiced by Zack Shada). The Adrian Toomes incarnation of Vulture appears in the Avengers: Black Panther's Quest animated series, voiced again by Alastair Duncan. Film Michael Keaton portrays Adrian Toomes in the live-action Marvel Cinematic Universe film Spider-Man: Homecoming. This version ran a New York salvaging company and is Liz Allan's father. Additionally, his flight suit is equipped with turbine-powered wings, claw-like wingtips, and boot-mounted talons. Years prior, with the creation of the Department of Damage Control following the Battle of New York, Toomes' company is run out of business. In response, he persuades his colleagues Phineas Mason, Herman Schultz, Jackson Brice, and Randy Vale not to relinquish the salvaged Chitauri technology they collected, and go on to start a scavenging operation and black market weapons ring. After deducing Spider-Man's secret identity after he interferes with his operation in the present, Toomes threatens retaliation unless the web-slinger stops. However, Spider-Man thwarts Toomes' attempt to hijack a plane carrying Avengers weaponry and saves his life when his suit malfunctions before Happy Hogan and the FBI find and arrest Toomes. As a result, his family moves away. During the mid-credits scene, an imprisoned Toomes is approached by Mac Gargan, who wants to confirm whether he knows Spider-Man's identity, which Toomes denies. Video games The Adrian Toomes incarnation of Vulture appeared in the Sega CD adaptation of The Amazing Spider-Man vs. The Kingpin. The Adrian Toomes incarnation of Vulture appeared in Spider-Man: Return of the Sinister Six. The Adrian Toomes incarnation of Vulture appeared in the SNES Spider-Man Animated Series video game. The Adrian Toomes incarnation of Vulture appears in the 2002 Spider-Man film tie-in game, voiced by Dwight Schultz. He robs a jewelry store alongside the Shocker's crew and takes half of the cut to his hideout, where Spider-Man finds him after the Shocker betrays his location. Following an aerial chase, the Vulture is defeated and handed over to the police. The Adrian Toomes incarnation of Vulture appears as a boss in the Nintendo DS and PSP versions of the Spider-Man 2 film tie-in game. After escaping from prison, he orchestrates a bomb threat to hold the city for ransom, but is thwarted and defeated by Spider-Man. The Ultimate Marvel incarnation of Adrian Toomes appears in the PlayStation 2, Nintendo GameCube and Xbox versions of the Ultimate Spider-Man video game, voiced by Brian George. He helps his employer, Bolivar Trask, in his attempts to capture Venom so that they could replicate the symbiote . The Adrian Toomes incarnation of Vulture appears as an assist character and boss in Spider-Man: Web of Shadows, voiced by Kristoffer Tabori. This version's wings are made out of steel swords controlled by electromagnets which can also be used as projectiles . Originally under the Kingpin 's employ, the Vulture manufactures gliders for his henchmen until Spider-Man stumbles upon the operation and defeats him. Amidst a symbiote invasion, the Vulture becomes infected by one such creature and attempts to destroy the sonic generator that could defeat the symbiotes, but is thwarted by Spider-Man. Once freed from the symbiote's control , the Vulture tries to manipulate Spider-Man into destroying the generator so that he could rule over the symbiote army. If the player chooses to do so, the Vulture is present during the final battle against Venom. The Marvel Noir incarnation of Adrian Toomes / Vulture appears in Spider-Man: Shattered Dimensions, voiced by Steve Blum. He obtains a fragment of the Tablet of Order and Chaos that grants him teleportation powers , and is pursued by Spider-Man Noir, who seeks both the fragment and revenge for his Uncle Ben's murder. Amidst all of this, the Vulture, driven to insanity by his newfound powers, plots to overthrow his boss, Norman Osborn, but is defeated by Spider-Man before he gets the chance to do so. In the Nintendo DS version, the 2099 incarnation of Vulture appears as an enemy of Spider-Man 2099. The Adrian Toomes incarnation of Vulture appears as a boss in the Facebook game Marvel: Avengers Alliance. The Adrian Toomes incarnation of Vulture appears as a playable character in Lego Marvel Super Heroes, voiced by Nolan North. In a bonus mission, he and Howard the Duck hold Marvel HQ for ransom until Captain America and Mister Fantastic defeat them. Various alternate reality versions of Vulture appear as bosses in Spider-Man Unlimited, voiced by Christopher Daniel Barnes. The Adrian Toomes incarnation of Vulture appears in Marvel: Contest of Champions. The Adrian Toomes incarnation of Vulture appears as a playable character in Marvel: Future Fight. The Adrian Toomes incarnation of Vulture appears as a playable character in the match-three mobile and PC game Marvel Puzzle Quest. The Adrian Toomes incarnation of Vulture appears as a playable character and a boss in Lego Marvel Super Heroes 2. This version is a member of the Sinister Six who escapes from the Raft and is defeated by Spider-Man, White Tiger, and Ms. Marvel. After Kang the Conqueror makes Manhattan part of Chronopolis, the Vulture is defeated again by Spider-Man and Spider-Gwen, and can later be encountered a third time while free roaming. The Adrian Toomes incarnation of Vulture appears as a boss in Marvel's Spider-Man, voiced again by Dwight Schultz. This version is a long time foe of Spider-Man , and suffers from spinal cancer as a result of prolonged exposure to his flight suit's power source. After being broken out of prison by Doctor Octopus, Toomes joins the Sinister Six in hopes that his liberator can cure his illness. He partners with Electro to kill Spider-Man, but they are defeated and re-captured .", "after_revision": "In other media Television 200px|Vulture (Adrian Toomes) in the Spider-Man animated series. The Blackie Drago incarnation of Vulture, referred to as Vulture Man, appeared in the 1960s Spider-Man animated series, voiced by Gillie Fenwick. The Adrian Toomes incarnation of Vulture appeared in the 1981 Spider-Man animated series, voiced by Don Messick. 200px|Vulture in Spider-Man Unlimited. The Adrian Toomes incarnation of Vulture appeared in the 1990s Spider-Man animated series, voiced by Eddie Albert as an old man, and by Alan Johnson as a young man. Originally an engineer who sought revenge on Norman Osborn, this version undergoes a quest to drain youth from others in a bid to become younger. He later becomes a member of the Insidious Six. A heroic half-Bestial version of Vulture from Counter-Earth appears in the Spider-Man Unlimited animated series, voiced by Scott McNeil. 200px|Vulture (Adrian Toomes) in The Spectacular Spider-Man animated series. The Adrian Toomes incarnation of Vulture appears in The Spectacular Spider-Man animated series, voiced by Robert Englund. This version wears a modified version of Terry Dodson's black and red costume from Marvel Knights Spider-Man. Originally an aeronautics engineer , he initially seeks revenge against Norman Osborn for stealing his inventions before joining the Sinister Six as Doctor Octopus's right-hand man. The Adrian Toomes incarnation of Vulture appears in the Ultimate Spider-Man animated series, voiced by Tom Kenny. This version is a teenage test subject of Doctor Octopus's genetic experiments with the ability to shapeshift between his human form and an anthropomorphic vulture-esque form that sports Jimmy Natale's organic wings and sonic shrieks. Toomes is later equipped with Blackie Drago's Ultimate Marvel green armor after becoming involved with Hydra and the mainstream Drago's red and black armor after joining the Sinister Six. Additionally, he is not as villainous as other versions and even regards Spider-Man as a friend, only siding with supervillains who offered to help him discover his origins before eventually redeeming himself. The Adrian Toomes incarnation of Vulture appears in the 2010s Spider-Man animated series, voiced by Alastair Duncan. This version is a middle-aged man whose flight suit is equipped with a neck-mounted device that enables sonic attacks and initially serves as a henchman to Norman Osborn and Doctor Octopus for the Sinister Six. Toomes also inspires the Wake Riders and later takes on the Goblin King alias in a personal quest for power while leading the Goblin Nation. A Vulturion-esque group called the Wake Riders also appear in the series . Based on the name for a group of vultures, they are a viral stunt group that consists of their leader Barkley Blitz (voiced by Ogie Banks), an unnamed female (voiced by Audrey Wasilewski and by Melanie Minichino), and two unnamed males (both voiced by Zack Shada). The Adrian Toomes incarnation of Vulture appears in the Avengers: Black Panther's Quest animated series, voiced again by Alastair Duncan. Film Michael Keaton portrays Adrian Toomes in the live-action Marvel Cinematic Universe film Spider-Man: Homecoming. This version previously ran a New York salvaging company and is Liz Allan's father. Additionally, his flight suit is equipped with turbine-powered wings, claw-like wingtips, and boot-mounted talons. Years prior, with the creation of the Department of Damage Control following the Battle of New York, Toomes' company is run out of business. In response, he persuades his colleagues Phineas Mason, Herman Schultz, Jackson Brice, and Randy Vale not to relinquish the salvaged Chitauri technology they collected, and go on to start a scavenging operation and black market weapons ring. After deducing Spider-Man's secret identity after the web-slinger interferes with his operation in the present, Toomes threatens retaliation unless Spider-Man stops. However, Spider-Man thwarts Toomes' attempt to hijack a plane carrying much of the Avengers' weaponry and saves Toomes' life when his suit malfunctions before Happy Hogan and the FBI find and arrest Toomes. As a result, his family moves away. In a mid-credits scene, an imprisoned Toomes is approached by Mac Gargan, who wants to confirm whether he knows Spider-Man's identity, which Toomes denies. Video games The Adrian Toomes incarnation of Vulture appeared in the Sega CD version of The Amazing Spider-Man vs. The Kingpin. The Adrian Toomes incarnation of Vulture appeared in Spider-Man: Return of the Sinister Six. The Adrian Toomes incarnation of Vulture appeared in the SNES Spider-Man game. The Adrian Toomes incarnation of Vulture appears in the 2002 Spider-Man film tie-in game, voiced by Dwight Schultz. The Adrian Toomes incarnation of Vulture appears as a boss in the Nintendo DS and PSP versions of the Spider-Man 2 film tie-in game. The Ultimate Marvel incarnation of Adrian Toomes appears in the PlayStation 2, Nintendo GameCube and Xbox versions of the Ultimate Spider-Man video game, voiced by Brian George. This version works for Bolivar Trask . The Adrian Toomes incarnation of Vulture appears as an assist character and boss in Spider-Man: Web of Shadows, voiced by Kristoffer Tabori. This version's wings are made out of steel swords controlled by electromagnets that can also be used as projectiles and initially works for the Kingpin until he is infected by a symbiote and attempts to take control of an invading symbiote army. The Marvel Noir incarnation of Adrian Toomes / Vulture appears in Spider-Man: Shattered Dimensions, voiced by Steve Blum. He obtains a fragment of the Tablet of Order and Chaos that grants him teleportation powers and is pursued by Spider-Man Noir, who seeks both the fragment and revenge for his Uncle Ben's murder. In the Nintendo DS version, the 2099 incarnation of Vulture appears as an enemy of Spider-Man 2099. The Adrian Toomes incarnation of Vulture appears as a boss in the Facebook game Marvel: Avengers Alliance. The Adrian Toomes incarnation of Vulture appears as a playable character in Lego Marvel Super Heroes, voiced by Nolan North. Various alternate reality versions of Adrian Toomes / Vulture appear as bosses in Spider-Man Unlimited, voiced by Christopher Daniel Barnes. The Adrian Toomes incarnation of Vulture appears in Marvel: Contest of Champions. The Adrian Toomes incarnation of Vulture appears as a playable character in Marvel: Future Fight. The Adrian Toomes incarnation of Vulture appears as a playable character in the match-three mobile and PC game Marvel Puzzle Quest. The Adrian Toomes incarnation of Vulture appears as a playable character and a boss in Lego Marvel Super Heroes 2. This version is a member of the Sinister Six . The Adrian Toomes incarnation of Vulture appears as a boss in Marvel's Spider-Man, voiced again by Dwight Schultz. This version is a long time foe of Spider-Man 's who suffers from spinal cancer as a result of prolonged exposure to his flight suit's power source. He joins Doctor Octopus' Sinister Six in the hopes of receiving a cure and partners with Electro to kill Spider-Man, only to be defeated and recaptured .", "edit_actions": [{"type": "R", "before": "he began", "after": "this version undergoes", "start_char_pos": 614, "end_char_pos": 622}, {"type": "R", "before": "who sought", "after": ", he initially seeks", "start_char_pos": 1215, "end_char_pos": 1225}, {"type": "R", "before": ", he later joined", "after": "before joining", "start_char_pos": 1284, "end_char_pos": 1301}, {"type": "R", "before": "He", "after": "Toomes", "start_char_pos": 1704, "end_char_pos": 1706}, {"type": "R", "before": "show", "after": "series", "start_char_pos": 2633, "end_char_pos": 2637}, {"type": "A", "before": null, "after": "previously", "start_char_pos": 3173, "end_char_pos": 3173}, {"type": "R", "before": "he", "after": "the web-slinger", "start_char_pos": 3782, "end_char_pos": 3784}, {"type": "R", "before": "the web-slinger", "after": "Spider-Man", "start_char_pos": 3867, "end_char_pos": 3882}, {"type": "R", "before": "Avengers", "after": "much of the Avengers'", "start_char_pos": 3961, "end_char_pos": 3969}, {"type": "R", "before": "his", "after": "Toomes'", "start_char_pos": 3989, "end_char_pos": 3992}, {"type": "R", "before": "During the", "after": "In a", "start_char_pos": 4116, "end_char_pos": 4126}, {"type": "R", "before": "adaptation", "after": "version", "start_char_pos": 4355, "end_char_pos": 4365}, {"type": "D", "before": "Animated Series video", "after": null, "start_char_pos": 4575, "end_char_pos": 4596}, {"type": "D", "before": "He robs a jewelry store alongside the Shocker's crew and takes half of the cut to his hideout, where Spider-Man finds him after the Shocker betrays his location. Following an aerial chase, the Vulture is defeated and handed over to the police.", "after": null, "start_char_pos": 4719, "end_char_pos": 4962}, {"type": "D", "before": "After escaping from prison, he orchestrates a bomb threat to hold the city for ransom, but is thwarted and defeated by Spider-Man.", "after": null, "start_char_pos": 5096, "end_char_pos": 5226}, {"type": "R", "before": "He helps his employer, Bolivar Trask, in his attempts to capture Venom so that they could replicate the symbiote", "after": "This version works for Bolivar Trask", "start_char_pos": 5405, "end_char_pos": 5517}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 5740, "end_char_pos": 5745}, {"type": "R", "before": ". Originally under the Kingpin 's employ, the Vulture manufactures gliders for his henchmen until Spider-Man stumbles upon the operation and defeats him. Amidst a symbiote invasion, the Vulture becomes infected by one such creature", "after": "and initially works for the Kingpin until he is infected by a symbiote", "start_char_pos": 5778, "end_char_pos": 6009}, {"type": "R", "before": "destroy the sonic generator that could defeat the symbiotes, but is thwarted by Spider-Man. Once freed from the symbiote's control , the Vulture tries to manipulate Spider-Man into destroying the generator so that he could rule over the", "after": "take control of an invading", "start_char_pos": 6026, "end_char_pos": 6262}, {"type": "D", "before": "If the player chooses to do so, the Vulture is present during the final battle against Venom.", "after": null, "start_char_pos": 6278, "end_char_pos": 6371}, {"type": "D", "before": ",", "after": null, "start_char_pos": 6586, "end_char_pos": 6587}, {"type": "D", "before": "Amidst all of this, the Vulture, driven to insanity by his newfound powers, plots to overthrow his boss, Norman Osborn, but is defeated by Spider-Man before he gets the chance to do so.", "after": null, "start_char_pos": 6691, "end_char_pos": 6876}, {"type": "D", "before": "In a bonus mission, he and Howard the Duck hold Marvel HQ for ransom until Captain America and Mister Fantastic defeat them.", "after": null, "start_char_pos": 7209, "end_char_pos": 7333}, {"type": "A", "before": null, "after": "Adrian Toomes /", "start_char_pos": 7372, "end_char_pos": 7372}, {"type": "R", "before": "who escapes from the Raft and is defeated by Spider-Man, White Tiger, and Ms. Marvel. After Kang the Conqueror makes Manhattan part of Chronopolis, the Vulture is defeated again by Spider-Man and Spider-Gwen, and can later be encountered a third time while free roaming.", "after": ".", "start_char_pos": 7932, "end_char_pos": 8202}, {"type": "R", "before": ", and", "after": "'s who", "start_char_pos": 8364, "end_char_pos": 8369}, {"type": "R", "before": "After being broken out of prison by Doctor Octopus, Toomes joins the", "after": "He joins Doctor Octopus'", "start_char_pos": 8466, "end_char_pos": 8534}, {"type": "R", "before": "hopes that his liberator can cure his illness. He", "after": "the hopes of receiving a cure and", "start_char_pos": 8551, "end_char_pos": 8600}, {"type": "R", "before": "but they are defeated and re-captured", "after": "only to be defeated and recaptured", "start_char_pos": 8643, "end_char_pos": 8680}], "sents_char_pos": [0, 90, 236, 349, 388, 553, 685, 733, 870, 947, 1069, 1179, 1354, 1468, 1703, 1887, 2097, 2214, 2425, 2566, 2904, 3042, 3159, 3233, 3348, 3489, 3731, 3889, 4079, 4115, 4277, 4395, 4408, 4501, 4602, 4718, 4880, 4962, 5095, 5226, 5404, 5519, 5660, 5779, 5931, 6117, 6277, 6371, 6493, 6690, 6876, 6976, 7083, 7208, 7333, 7459, 7541, 7639, 7771, 7886, 8017, 8202, 8317, 8465, 8597]}
+{"doc_id": "31742237", "revision_depth": "1", "before_revision": "Funding, history and structure of the study The German Ageing Survey (DEAS) is funded by the Federal Ministry for Family Affairs, Senior Citizens, Women and Youth (BMFSFJ). The first survey wave was conducted in 1996. It was designed and carried out by the research group on ageing and the life course from the Freie Universit\u00e4t Berlin, the research group on psychogerontology of the University of Nijmegen and infas Institute for Applied Social Sciences, Bonn. From 2000 onwards, the German Centre of Gerontology (DZA) was responsible for the implementation and further development of the project. The second survey wave of DEAS followed in 2002, the third was conducted in 2008, the fourth was conducted in 2011 and the fifth was conducted in 2014. The data assessments are furthermore carried out by infas Institute for Applied Social Sciences. Starting from 2008, the DEAS panel is conducted every three years. The most recent survey in 2011 therefore considered panel participants only. A new cross-sectional sample is drawn every six years. This approach enables the investigation of social change as well as individual development over a 18-year span. A book containing the key findings of the fifth wave will be published in 2016.Mahne, K., Wolff, J.K., Simonson, J., & Tesch-R\u00f6mer, C. (ed.) ( 2016, in press ): Altern im Wandel. Zwei Jahrzehnte Deutscher Alterssurvey (DEAS). Wiesbaden: Springer VS. Various other papers will be published in scientific journals.DEAS publications Sampling The German Ageing Survey enables analyses of cohort differences, i.e. a comparison of individuals of the same age at different points in time and thus an examination of social change. Moreover, it allows longitudinal analyses, i.e. the comparison of information at certain points in time and hence a study of individual developments over time. The DEAS makes possible a comprehensive description of life situations and life contexts of the German population aged over 40 in the year 2014 (current cross-sectional analysis), an analysis of social changes over the points in time 1996, 2002, 2008 and 2014 and an investigation of intra-individual development over either six, twelve, fifteen years or eighteen years (1996-2002, 1996-2002-2008, 1996-2002-2008-2011 or 1996-2002-2008-2011-2014 ). Another perspective results from the comparison of individual development over a six-year period in the three time-frames 1996 to 2002, 2002 to 2008 or 2008 to 2014, i.e. a comparison between the development of two or three birth cohorts in a specific age segment. Wave I Base Sample 1996 (B-1996): disproportionably stratified population register sampling according to age (40-54, 55-69, 70\u201385 years old) sex and geographical location (East/West) of the German population living in private households in the birth cohorts 1911-1956 (n=4.838) Wave III Panel Sample 1996-2002-2008 (P-1996-2002-2008); participants from B-1996 were interviewed for a third time (n= 994 ) Panel Sample (P-2002-2008); participants from B-1996 were interviewed for a third time (n= 1001 ) Base Sample 2008 (B-2008); Furthermore, a new cross-sectional sample of 40- to 85-year-old persons (n=6205) (birth cohorts 1923-1968) Wave IV Starting from 2008, the DEAS panel is conducted every three years. Therefore, the most recent survey considered panel participants only. All of these 4855 respondents have already taken part in at least one earlier wave. 1040 panel participants entered the DEAS in 1996, 957 persons were recruited in 2002, and the majority of 2858 participants were interviewed for the first time in 2008. Wave V Panel Sample 1996-2002-2008-2011-2014 (P-1996-2002-2008-2011-2014); participants from B-1996 were interviewed for a fifth time (n= approx. 888 ) Panel Sample 2002-2088-2011-2014 (P-2002-2008-2011-2014); participants from B-2002 were interviewed for a fourth time (n= approx. 866) Panel Sample 2008-2011-2014 (P-2008-2011-2014); participants from B-2008 were interviewed for a third time (n= approx. 2569) Base Sample 2014 (B-2014); a new cross-sectional sample of 40 - 85 year old persons (n= approx. 6003 ) (birth cohorts 1929-1974) The sixth wave will be conducted in 2017. Literature Mahne, K., Wolff, J.K., Simonson, J., & Tesch-R\u00f6mer, C. (ed.) ( 2016 ): Altern im Wandel. Zwei Jahrzehnte Deutscher Alterssurvey (DEAS). Wiesbaden: Springer VS. Motel-Klingebiel, A., Wurm, S., & Tesch-R\u00f6mer, C. (ed.) (2010): Altern im Wandel. Befunde des Deutschen Alterssurveys (DEAS). Stuttgart: Kohlhammer. Tesch-R\u00f6mer, C., Engstler, H., & Wurm, S. (ed.) (2006): Altwerden in Deutschland. Sozialer Wandel und individuelle Entwicklung in der zweiten Lebensh\u00e4lfte. Wiesbaden: VS Verlag f\u00fcr Sozialwissenschaften. Kohli, M. & K\u00fcnemund, H. (ed.) (2005): Die zweite Lebensh\u00e4lfte. Gesellschaftliche Lage und Partizipation im Spiegel des Alters-Survey (2nd expanded edition). Wiesbaden: VS-Verlag f\u00fcr Sozialwissenschaften.", "after_revision": "Funding, history and structure of the study The German Ageing Survey (DEAS) is funded by the Federal Ministry for Family Affairs, Senior Citizens, Women and Youth (BMFSFJ). The first survey wave was conducted in 1996. It was designed and carried out by the research group on ageing and the life course from the Freie Universit\u00e4t Berlin, the research group on psychogerontology of the University of Nijmegen and infas Institute for Applied Social Sciences, Bonn. From 2000 onwards, the German Centre of Gerontology (DZA) was responsible for the implementation and further development of the project. The second survey wave of DEAS followed in 2002, the third was conducted in 2008, the fourth was conducted in 2011 , the fifth was conducted in 2014 and the sixth wave was conducted in 2017. The data assessments are furthermore carried out by infas Institute for Applied Social Sciences. Starting from 2008, the DEAS panel is conducted every three years. A new cross-sectional sample is drawn every six years. This approach enables the investigation of social change as well as individual development over a 21-year span. A book containing the key findings of the fifth wave was published in 2016.Mahne, K., Wolff, J.K., Simonson, J., & Tesch-R\u00f6mer, C. (ed.) ( 2017 ): Altern im Wandel. Zwei Jahrzehnte Deutscher Alterssurvey (DEAS). Wiesbaden: Springer VS. Various other papers are published in scientific journals.DEAS publications Sampling The German Ageing Survey enables analyses of cohort differences, i.e. a comparison of individuals of the same age at different points in time and thus an examination of social change. Moreover, it allows longitudinal analyses, i.e. the comparison of information at certain points in time and hence a study of individual developments over time. The DEAS makes possible a comprehensive description of life situations and life contexts of the German population aged over 40 in the year 2014 (current cross-sectional analysis), an analysis of social changes over the points in time 1996, 2002, 2008 and 2014 and an investigation of intra-individual development over either six, twelve, fifteen , eighteen years or twenty-one years (1996-2002, 1996-2002-2008, 1996-2002-2008-2011 , 1996-2002-2008-2011-2014 or 1996-2002-2008-2011-2014-2017 ). Another perspective results from the comparison of individual development over a six-year period in the three time-frames 1996 to 2002, 2002 to 2008 or 2008 to 2014, i.e. a comparison between the development of two or three birth cohorts in a specific age segment. Wave I Base Sample 1996 (B-1996): disproportionably stratified population register sampling according to age (40-54, 55-69, 70-85 years old) sex and geographical location (East/West) of the German population living in private households in the birth cohorts 1911-1956 (n=4.838) Wave III Panel Sample 1996-2002-2008 (P-1996-2002-2008); participants from B-1996 were interviewed for a third time (n= 991 ) Panel Sample (P-2002-2008); participants from B-1996 were interviewed for a third time (n= 1000 ) Base Sample 2008 (B-2008); Furthermore, a new cross-sectional sample of 40- to 85-year-old persons (n=6205) (birth cohorts 1923-1968) Wave IV Starting from 2008, the DEAS panel is conducted every three years. Therefore, the 2011 survey considered panel participants only. All of these 4854 respondents have already taken part in at least one earlier wave. 1039 panel participants entered the DEAS in 1996, 957 persons were recruited in 2002, and the majority of 2858 participants were interviewed for the first time in 2008. Wave V Panel Sample 1996-2002-2008-2011-2014 (P-1996-2002-2008-2011-2014); participants from B-1996 were interviewed for a fifth time (n= 887 ) Panel Sample 2002-2088-2011-2014 (P-2002-2008-2011-2014); participants from B-2002 were interviewed for a fourth time (n= 866) Panel Sample 2008-2011-2014 (P-2008-2011-2014); participants from B-2008 were interviewed for a third time (n= 2569) Base Sample 2014 (B-2014); a new cross-sectional sample of 40 - 85 year old persons (n= 6002 ) (birth cohorts 1929-1974) The sixth wave was conducted in 2017. Literature Mahne, K., Wolff, J.K., Simonson, J., & Tesch-R\u00f6mer, C. (ed.) ( 2017 ): Altern im Wandel. Zwei Jahrzehnte Deutscher Alterssurvey (DEAS). Wiesbaden: Springer VS. Motel-Klingebiel, A., Wurm, S., & Tesch-R\u00f6mer, C. (ed.) (2010): Altern im Wandel. Befunde des Deutschen Alterssurveys (DEAS). Stuttgart: Kohlhammer. Tesch-R\u00f6mer, C., Engstler, H., & Wurm, S. (ed.) (2006): Altwerden in Deutschland. Sozialer Wandel und individuelle Entwicklung in der zweiten Lebensh\u00e4lfte. Wiesbaden: VS Verlag f\u00fcr Sozialwissenschaften. Kohli, M. & K\u00fcnemund, H. (ed.) (2005): Die zweite Lebensh\u00e4lfte. Gesellschaftliche Lage und Partizipation im Spiegel des Alters-Survey (2nd expanded edition). Wiesbaden: VS-Verlag f\u00fcr Sozialwissenschaften.", "edit_actions": [{"type": "R", "before": "and", "after": ",", "start_char_pos": 714, "end_char_pos": 717}, {"type": "R", "before": "2014.", "after": "2014 and the sixth wave was conducted in 2017.", "start_char_pos": 745, "end_char_pos": 750}, {"type": "D", "before": "The most recent survey in 2011 therefore considered panel participants only.", "after": null, "start_char_pos": 915, "end_char_pos": 991}, {"type": "R", "before": "18-year", "after": "21-year", "start_char_pos": 1145, "end_char_pos": 1152}, {"type": "R", "before": "will be", "after": "was", "start_char_pos": 1212, "end_char_pos": 1219}, {"type": "R", "before": "2016, in press", "after": "2017", "start_char_pos": 1302, "end_char_pos": 1316}, {"type": "R", "before": "will be", "after": "are", "start_char_pos": 1430, "end_char_pos": 1437}, {"type": "A", "before": null, "after": ", eighteen years or twenty-one", "start_char_pos": 2188, "end_char_pos": 2188}, {"type": "D", "before": "or eighteen years", "after": null, "start_char_pos": 2195, "end_char_pos": 2212}, {"type": "R", "before": "or", "after": ",", "start_char_pos": 2261, "end_char_pos": 2263}, {"type": "A", "before": null, "after": "or 1996-2002-2008-2011-2014-2017", "start_char_pos": 2289, "end_char_pos": 2289}, {"type": "R", "before": "70\u201385", "after": "70-85", "start_char_pos": 2682, "end_char_pos": 2687}, {"type": "R", "before": "994", "after": "991", "start_char_pos": 2956, "end_char_pos": 2959}, {"type": "R", "before": "1001", "after": "1000", "start_char_pos": 3053, "end_char_pos": 3057}, {"type": "R", "before": "most recent", "after": "2011", "start_char_pos": 3284, "end_char_pos": 3295}, {"type": "R", "before": "4855", "after": "4854", "start_char_pos": 3352, "end_char_pos": 3356}, {"type": "R", "before": "1040", "after": "1039", "start_char_pos": 3423, "end_char_pos": 3427}, {"type": "R", "before": "approx. 888", "after": "887", "start_char_pos": 3730, "end_char_pos": 3741}, {"type": "D", "before": "approx.", "after": null, "start_char_pos": 3866, "end_char_pos": 3873}, {"type": "D", "before": "approx.", "after": null, "start_char_pos": 3990, "end_char_pos": 3997}, {"type": "R", "before": "approx. 6003", "after": "6002", "start_char_pos": 4092, "end_char_pos": 4104}, {"type": "R", "before": "will be", "after": "was", "start_char_pos": 4148, "end_char_pos": 4155}, {"type": "R", "before": "2016", "after": "2017", "start_char_pos": 4250, "end_char_pos": 4254}], "sents_char_pos": [0, 172, 217, 461, 598, 750, 847, 914, 991, 1046, 1158, 1238, 1337, 1384, 1471, 1681, 1841, 2292, 2557, 2892, 2989, 3086, 3268, 3338, 3422, 3591, 3666, 3801, 3926, 4030, 4174, 4275, 4322, 4346, 4428, 4472, 4495, 4577, 4651, 4698, 4762, 4856]}
+{"doc_id": "32529897", "revision_depth": "1", "before_revision": "Quarter Alargar (Distance from course) Avanzar (Advance on true course) Ritorno (Return to course) Avanzo di ritorno (Advance during return) 1 20 98 51 50 2 38 92 26 24 3 55 83 18 15 4 71 71 14 10 5 83 55 12 6 6 92 38 11 4 7 98 20 10 2 8 100 0 10 0 For every 100 miles For every 10 miles alargar 400px|Calculating the ritorno and avanzo di ritornoThis is what the third column of the toleta is for. The return angles are expressed as quarters from the intended course bearing (not the current course bearing). In our example, the mariner intended to go east, but has been sailing southeast-by-east for 100 miles. Given the winds, he decides it is best to return to the original course by re-orienting the ship east-northeast (ENE, \"Greco-Levante\"). ENE is two quarter-winds above the intended bearing, East, so now he looks at second row (\"quarters = 2\") on the table. In the third column , the ritorno, shows the number 26. This represents the required number of miles he must travel on ENE bearing for every 10 miles of alargar . Remember, his alargar (distance from intended course) was 55 miles. So in order to return to his intended course he must travel 5.5 \u00d7 26 = 143 miles on ENE. In other words, he needs to hold his ENE bearing for 143 miles; once that distance is travelled , he should straighten his ship East , and he will be exactly on the intended course. The final column (avanzo di ritorno) gives the length on the intended course he has made good by his return travel. This is also expressed in terms per 10 miles alargar. His alargar was 55, and his angle of return was ENE (thus q = 2), that means his avanzo di ritorno is 5.5 \u00d7 24 = 132. In other words, if everything goes right, and our mariner holds his ENE bearing for 143 miles (ritorno), then during that return, he will have covered an additional 132 miles on his intended eastward course (avanzo di ritorno). Finally, the total avanzo on the eastward bearing is the avanzar during the deviation (83 miles) plus the avanzo di ritorno (132 miles) , thus on the whole, he has covered 83 + 132 = 215 miles on the intended course. Measuring that distance on the map from the starting point (A), the mariner can figure out his exact current position.", "after_revision": "Quarter (Angle of deviation) Alargar (Distance from course) Avanzar (Advance on true course) Quarter (Angle of return) Ritorno (Return to course) Avanzo di ritorno (Advance during return) 1 20 98 1 51 50 2 38 92 2 26 24 3 55 83 3 18 15 4 71 71 4 14 10 5 83 55 5 12 6 6 92 38 6 11 4 7 98 20 7 10 2 8 100 0 8 10 0 For every 100 miles For every 10 miles alargar 400px|Calculating the ritorno and avanzo di ritornoCalculating the return course is what the last three columns of the toleta are for. In the fourth column, the return angles are expressed as quarters from the intended course bearing (not the current course bearing). In our example, the mariner intended to go east, but has been sailing southeast-by-east for 100 miles. Given the winds, he decides it is best to return to the original course by re-orienting the ship east-northeast (ENE, \"Greco-Levante\"). ENE is two quarter-winds above the intended bearing, East, so now he looks at second row (\"quarters = 2\") on the fourth column of the table. The fifth column is the ritorno, the distance he must travel on the chosen return angle to recover the original course. Given he has chosen to return by ENE bearing (q = 2), then he must read the second row of the ritorno column, which shows the number 26. This represents the required number of miles he must travel on ENE bearing for every 10 miles he deviated . Remember, his alargar (distance from intended course) was 55 miles. So in order to return to his intended course he must travel 5.5 \u00d7 26 = 143 miles on ENE. In other words, he needs to hold his ENE bearing for 143 miles; once that distance is traveled , he should straighten his ship east , and he will be exactly back on the intended course. The sixth and final column (avanzo di ritorno) gives the length on the intended course he has made good by his return travel. This is also expressed in terms per 10 miles alargar. His alargar was 55, and his angle of return was ENE (thus q = 2), that means his avanzo di ritorno is 5.5 \u00d7 24 = 132. In other words, if everything goes right, and our mariner holds his ENE bearing for 143 miles (ritorno), then during that return, he will have covered an additional 132 miles on his intended eastward course (avanzo di ritorno). Finally, to calculate the total distance made good (total avanzo) on the eastward bearing by his whole adventure, he must add the avanzar during the deviation (83 miles) plus the avanzo di ritorno (132 miles) . Thus on the whole, he has covered 83 + 132 = 215 miles on the intended course. Measuring that distance on the map from the starting point (A), the mariner can figure out his exact current position.", "edit_actions": [{"type": "A", "before": null, "after": "(Angle of deviation)", "start_char_pos": 8, "end_char_pos": 8}, {"type": "A", "before": null, "after": "Quarter (Angle of return)", "start_char_pos": 73, "end_char_pos": 73}, {"type": "A", "before": null, "after": "1", "start_char_pos": 151, "end_char_pos": 151}, {"type": "A", "before": null, "after": "2", "start_char_pos": 166, "end_char_pos": 166}, {"type": "A", "before": null, "after": "3", "start_char_pos": 181, "end_char_pos": 181}, {"type": "A", "before": null, "after": "4", "start_char_pos": 196, "end_char_pos": 196}, {"type": "A", "before": null, "after": "5", "start_char_pos": 211, "end_char_pos": 211}, {"type": "A", "before": null, "after": "6", "start_char_pos": 225, "end_char_pos": 225}, {"type": "A", "before": null, "after": "7", "start_char_pos": 239, "end_char_pos": 239}, {"type": "A", "before": null, "after": "8", "start_char_pos": 253, "end_char_pos": 253}, {"type": "R", "before": "ritornoThis", "after": "ritornoCalculating the return course", "start_char_pos": 350, "end_char_pos": 361}, {"type": "R", "before": "third column", "after": "last three columns", "start_char_pos": 374, "end_char_pos": 386}, {"type": "R", "before": "is for. The", "after": "are for. In the fourth column, the", "start_char_pos": 401, "end_char_pos": 412}, {"type": "R", "before": "table. In the third column , the ritorno,", "after": "fourth column of the table.", "start_char_pos": 872, "end_char_pos": 913}, {"type": "A", "before": null, "after": "The fifth column is the ritorno, the distance he must travel on the chosen return angle to recover the original course. Given he has chosen to return by ENE bearing (q = 2), then he must read the second row of the ritorno column, which", "start_char_pos": 914, "end_char_pos": 914}, {"type": "R", "before": "of alargar", "after": "he deviated", "start_char_pos": 1030, "end_char_pos": 1040}, {"type": "R", "before": "travelled", "after": "traveled", "start_char_pos": 1286, "end_char_pos": 1295}, {"type": "R", "before": "East", "after": "east", "start_char_pos": 1328, "end_char_pos": 1332}, {"type": "A", "before": null, "after": "back", "start_char_pos": 1358, "end_char_pos": 1358}, {"type": "A", "before": null, "after": "sixth and", "start_char_pos": 1387, "end_char_pos": 1387}, {"type": "R", "before": "the total avanzo", "after": "to calculate the total distance made good (total avanzo)", "start_char_pos": 1909, "end_char_pos": 1925}, {"type": "R", "before": "is", "after": "by his whole adventure, he must add", "start_char_pos": 1950, "end_char_pos": 1952}, {"type": "R", "before": ", thus", "after": ". Thus", "start_char_pos": 2036, "end_char_pos": 2042}], "sents_char_pos": [0, 408, 519, 622, 758, 878, 935, 1110, 1199, 1263, 1382, 1499, 1553, 1671, 1899, 2116]}
+{"doc_id": "3279703", "revision_depth": "1", "before_revision": "The Gleason Grade/Score has two main points: 1: Based on architectural patterns, rather than cytological ones. The Gleason System separates architectural features into 1 of 5 histological patterns. These are in decreasing differentiation order but increasing in number: Pattern 1 is the most differentiated and pattern 5 is the least differentiated. (with less differentiation in \"cancer\" typically being a worse prognosis. Differentiation is the degree in which the tissue, usually referring to the neoplasm, resembles the native tissue. So less resemblance is typically a worse prognosis.) 2: The second feature of Gleason grading is that the grade is not based on the highest (least differentiated) pattern within the tumor , instead it is a combination of the most often and second most often patterns seen. Gleason realized that prostatic carcinomas have multiple patterns and that the prognosis of prostatic carcinoma was split between the most prevalent and the second most prevalent neoplasm pattern. So using the Gleason system, the most prevalent and second most prevalent pattern, if at least 5\\% of the neoplasm , are added together equaling the overall Gleason score. If for example the most prevalent pattern/grade is 2, and the second most prevalent is a 1, then the Gleason score is 2+1=3. If the neoplasm has only one pattern, the number of the pattern is doubled to obtain the score. For example a tumor is all pattern 1, the Gleason score would be 1+1=2. The most differentiated tumor will have , at highest, a Gleason score of 2 (1+1 being all of type 1 architecture it just gets doubled ), while the worst differentiated neoplasm (not resembling the native prostate tissue at all) will have a score of 10 (5+5 also being all type 5 tissue). So a Gleason Score/Grade can only be between 2 and 10, there is no 0 or 1 by definition. The main way to tell the difference between a normal prostate gland and neoplastic glands is that prostatic glands normally have two cell layers in the glands, in adenocarcinoma(adeno- being that it is glandular cancer, carcinoma- being that its ectoderm derived because only ectodermal tissue makes glands) the basal ( bottom-usually cuboidal ) cell layer is lost so that you only have one top layer of cellular tissue usually ranging from columnar- pseudostratifiedin appearance . Score descriptions Using this system the most well-differentiated tumors have a Gleason score/grade of 2, and the least-differentiated tumors a score of 10. Range by definition is from 2-10, with architectural type being from 1-5 and always doubled or added together accordingly as described above. Gleason scores are often grouped based on similar behaviour: Grade 2-4 being well-differentiated neoplasm, Grade 5-6 intermediate-grade neoplasm, Grade 7 moderately - poorly differentiated grade neoplasm, Grade 8-10 high-grade neoplasm. The majority of treatable/treated cancers are of Gleason scores 5 - 7 and are detected due to biopsy after abnormal digital rectal exam or prostate specific antigen evaluation. A Gleason score of 7 can be 3+4= 7, where the majority is pattern 3, or it can be 4+3=7 which pattern 4 dominates resulting in a more advanced cancer . The cancer is typically located in the peripheral zone usually the posterior portion, explaining the rationale of performing the digital rectal exam. Tumors with Gleason scores 8-10 tend to be advanced neoplasms that are unlikely to be cured. Although some evidence suggests that prostate cancers will become more aggressive over time, Gleason scores usually remain stable for a few years.", "after_revision": "The Gleason grade is based on tissue architectural patterns rather than purely cytological changes. These tissue patterns are classified into 5 grades, numbered 1 though 5. Lower numbers indicate more differentiation, with pattern 5 being the least differentiated. Differentiation is the degree to which the tissue, in this case the tumor, resembles native tissue. Greater resemblance (lower grade) is typically associated with a better prognosis.) However, the Gleason score is not simply the highest grade (least differentiated) pattern within the tumor . Rather, it is a combination of the most two most frequent patterns seen. This recognizes that prostatic carcinomas have multiple patterns and that prognosis is more accurately determined by adding the scores of the two most prevalent patterns. Using this system, the grades of the most prevalent and second most prevalent patterns ( if at least 5\\% of the total) , are added together to yield the overall Gleason score. For example, if the most prevalent pattern/grade is 2, and the second most prevalent grade is 1, then the Gleason score is 2+1=3. If the neoplasm has only one pattern, the grade of that pattern is doubled to obtain the score. For example a tumor is all pattern 1, the Gleason score would be 1+1=2. The most differentiated tumor would have the lowest score, Gleason 2 (1+1 ), while the most differentiated neoplasm (not resembling native prostate tissue ) would have a the higest score, Gleason 10 (5+5 ). Gleason scores range from 2 to 10, there is no 0 or 1 by definition. Cytological differences between normal prostate to neoplastic glands are evident in changes to the typical two cell layers of the gland. In prostatic adenocarcinoma, the basal ( bottom, usually cuboidal type ) cell layer is lost , with only the top layer (usally columnar to pseudostratified) remaining . Score descriptions Using this system the most well-differentiated tumors have a Gleason score/grade of 2, and the least-differentiated tumors a score of 10. Range by definition is from 2-10, with architectural type being from 1-5 and always doubled or added together accordingly as described above. Gleason scores are often grouped together, based on similar behaviour: Grade 2-4 being well-differentiated neoplasm, Grade 5-6 intermediate-grade neoplasm, Grade 7 moderately - poorly differentiated grade neoplasm, Grade 8-10 high-grade neoplasm. The majority of treatable/treated cancers are of Gleason scores 5 - 7 and are detected due to biopsy after abnormal digital rectal exam or prostate specific antigen evaluation. A Gleason score of 7 can be 3+4= 7, where the majority is pattern 3, or it can be 4+3=7 in which pattern 4 dominates , resulting in a more advanced stage . The cancer is typically located in the peripheral zone usually the posterior portion, explaining the rationale of performing the digital rectal exam. Tumors with Gleason scores 8-10 tend to be advanced neoplasms that are unlikely to be cured. Although some evidence suggests that prostate cancers will become more aggressive over time, Gleason scores typically remain stable for a several years.", "edit_actions": [{"type": "R", "before": "Grade/Score has two main points: 1: Based on architectural patterns, rather than cytological ones. The Gleason System separates architectural features into 1 of", "after": "grade is based on tissue architectural patterns rather than purely cytological changes. These tissue patterns are classified into", "start_char_pos": 12, "end_char_pos": 172}, {"type": "R", "before": "histological patterns. These are in decreasing differentiation order but increasing in number: Pattern", "after": "grades, numbered", "start_char_pos": 175, "end_char_pos": 277}, {"type": "R", "before": "is the most differentiated and", "after": "though 5. Lower numbers indicate more differentiation, with", "start_char_pos": 280, "end_char_pos": 310}, {"type": "R", "before": "is", "after": "being", "start_char_pos": 321, "end_char_pos": 323}, {"type": "D", "before": "(with less differentiation in \"cancer\" typically being a worse prognosis.", "after": null, "start_char_pos": 350, "end_char_pos": 423}, {"type": "R", "before": "in", "after": "to", "start_char_pos": 454, "end_char_pos": 456}, {"type": "R", "before": "usually referring to the neoplasm, resembles the", "after": "in this case the tumor, resembles", "start_char_pos": 475, "end_char_pos": 523}, {"type": "R", "before": "So less resemblance is typically a worse", "after": "Greater resemblance (lower grade) is typically associated with a better", "start_char_pos": 539, "end_char_pos": 579}, {"type": "R", "before": "2: The second feature of Gleason grading is that the grade is not based on the highest", "after": "However, the Gleason score is not simply the highest grade", "start_char_pos": 592, "end_char_pos": 678}, {"type": "R", "before": ", instead", "after": ". Rather,", "start_char_pos": 727, "end_char_pos": 736}, {"type": "R", "before": "often and second most often", "after": "two most frequent", "start_char_pos": 769, "end_char_pos": 796}, {"type": "R", "before": "Gleason realized", "after": "This recognizes", "start_char_pos": 812, "end_char_pos": 828}, {"type": "R", "before": "the prognosis of prostatic carcinoma was split between the most prevalent and the second most prevalent neoplasm pattern. So using the Gleason", "after": "prognosis is more accurately determined by adding the scores of the two most prevalent patterns. Using this", "start_char_pos": 887, "end_char_pos": 1029}, {"type": "A", "before": null, "after": "grades of the", "start_char_pos": 1042, "end_char_pos": 1042}, {"type": "R", "before": "pattern,", "after": "patterns (", "start_char_pos": 1084, "end_char_pos": 1092}, {"type": "R", "before": "neoplasm", "after": "total)", "start_char_pos": 1116, "end_char_pos": 1124}, {"type": "R", "before": "equaling", "after": "to yield", "start_char_pos": 1146, "end_char_pos": 1154}, {"type": "R", "before": "If for example", "after": "For example, if", "start_char_pos": 1182, "end_char_pos": 1196}, {"type": "R", "before": "is a", "after": "grade is", "start_char_pos": 1266, "end_char_pos": 1270}, {"type": "R", "before": "number of the", "after": "grade of that", "start_char_pos": 1349, "end_char_pos": 1362}, {"type": "R", "before": "will have , at highest, a Gleason score of", "after": "would have the lowest score, Gleason", "start_char_pos": 1505, "end_char_pos": 1547}, {"type": "D", "before": "being all of type 1 architecture it just gets doubled", "after": null, "start_char_pos": 1555, "end_char_pos": 1608}, {"type": "R", "before": "worst", "after": "most", "start_char_pos": 1622, "end_char_pos": 1627}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1668, "end_char_pos": 1671}, {"type": "R", "before": "at all) will have a score of", "after": ") would have a the higest score, Gleason", "start_char_pos": 1695, "end_char_pos": 1723}, {"type": "R", "before": "also being all type 5 tissue). So a Gleason Score/Grade can only be between", "after": "). Gleason scores range from", "start_char_pos": 1732, "end_char_pos": 1807}, {"type": "R", "before": "and", "after": "to", "start_char_pos": 1810, "end_char_pos": 1813}, {"type": "R", "before": "The main way to tell the difference between a normal prostate gland and neoplastic glands is that prostatic glands normally have", "after": "Cytological differences between normal prostate to neoplastic glands are evident in changes to the typical", "start_char_pos": 1852, "end_char_pos": 1980}, {"type": "R", "before": "in the glands, in adenocarcinoma(adeno- being that it is glandular cancer, carcinoma- being that its ectoderm derived because only ectodermal tissue makes glands)", "after": "of the gland. In prostatic adenocarcinoma,", "start_char_pos": 1997, "end_char_pos": 2159}, {"type": "R", "before": "bottom-usually cuboidal", "after": "bottom, usually cuboidal type", "start_char_pos": 2172, "end_char_pos": 2195}, {"type": "R", "before": "so that you only have one top layer of cellular tissue usually ranging from columnar- pseudostratifiedin appearance", "after": ", with only the top layer (usally columnar to pseudostratified) remaining", "start_char_pos": 2217, "end_char_pos": 2332}, {"type": "A", "before": null, "after": "together,", "start_char_pos": 2667, "end_char_pos": 2667}, {"type": "A", "before": null, "after": "in", "start_char_pos": 3137, "end_char_pos": 3137}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3164, "end_char_pos": 3164}, {"type": "R", "before": "cancer", "after": "stage", "start_char_pos": 3194, "end_char_pos": 3200}, {"type": "R", "before": "usually", "after": "typically", "start_char_pos": 3554, "end_char_pos": 3561}, {"type": "R", "before": "few", "after": "several", "start_char_pos": 3582, "end_char_pos": 3585}], "sents_char_pos": [0, 110, 197, 349, 423, 538, 811, 1008, 1181, 1306, 1402, 1474, 1762, 1851, 2159, 2633, 2871, 3048, 3202, 3352, 3445]}
+{"doc_id": "33653387", "revision_depth": "1", "before_revision": " The language had a brief dormant period in the late 15th to early 16th century, after the Delhi Sultanate was sacked by Timur. Afghan dynasties such as the Suris and Lodis gained control in the north of the subcontinent, and although Afghans at the time were a part of the Persianate world, these rulers were not well-acquainted with the language. In this era, empires all over the subcontinent began to employ Hindustani's emerging predecessor Hindavi (also known as Dehlavi or Deccani) as a language of the court. Work in Persian was however still produced, and Persian still featured in official documents. Notably, the Delhi Sultanate's official language was declared as Persian by Sikandar Lodi, which began a diffusion process outside Islamic nobility; Hindus for the first time began to learn the language for purposes of employment, and there is evidence of them even teaching the language in this period. Height A firman issued under Mughal Emperor Aurangzeb, written in Persian. Hindus employed in the Mughal finance department were known to excel at writing these documents, which were used as exemplars in educational institutions. Persian experienced a revival with the advent of the Mughal emperors (1526\u20131857), under whom the language reached its zenith in the Indian subcontinent. The Mughals were of Timurid origin; they were Turco-Mongols, and had been Persianised to an extent. However, the early Mughal court preferred their ancestral Turkic language. This linguistic situation began to change when the second Mughal Emperor Humayun reconquered India with the aid of Safavid Iran, ushering many Iranians into the subcontinent. His successor Akbar developed these ties by granting these Iranians positions in the imperial service. He also undertook generous efforts to attract many Persian literati from Iran. Akbar's actions established Persian as the language of the Mughal court, transitioning the royal family out of the ancestral language (his own son and successor Jahangir, for example, was more proficient in Persian than Turkic). Under Akbar, Persian was made the official language of the Mughal Empire, a policy it would retain till its demise. His secular and pluralist rule resulted in many natives becoming more open to learning the language, and educational reforms were introduced in madrasas to improve Persian learning. The Mughal association with the Persian language continued with Akbar's successors; the literary environment created under them led one Shah Jahan-era poet to comment, Under the Mughals, Persian took prominence as the language of culture, education, and prestige. Their policies resulted in a process of \"Persianisation\" by which many Indian communities increasingly adopted the language for social purposes.Kachru, Braj B (2008). \"Introduction: languages, contexts, and constructs\". In Kachru, Braj B; Kachru, Yamuna; Sridhar, S.N (eds.). Language in South Asia. Cambridge University Press. pp. 5-6. Professions requiring Persian proficiency, previously occupied by Iranians and Turks, came to be shared with Indians. For example, groups such as the Kayasthas and Khatris came to dominate the Mughal finance departments; Indians taught Persian in madrasas alongside masters of the language from Iran. Moreover, the complete Persianisation of the Mughal administration meant that the language reached both urban centres as well as villages, and a larger audience for Persian literature developed. Apart from courtly influence, Persian also spread through religion, particularly the Islamic faith of Sufism. Many Sufi missionaries to the subcontinent had Persian roots, and although they used local Indic languages to reach their followers, they used Persian to converse amongst each other and write literature. This resulted in a diffusion process into the local followers of the faith. Sufi centres (Khanqah) served as focal points for this cultural interaction. Sufism also interacted with Hinduism through the Bhakti movement; Abidi and Gargesh speculate that this could have further introduced Persian to locals. In this way, Persian became a second language to many across North India; Alam contends that it neared the status of a first language. By the 18th century, many Indians in the north of the subcontinent had a \"native speaker's competence in Persian\".Faruqi, Shamsur Rahman (2003), \"A Long History of Urdu Literarature, Part 1\", in Pollock (ed.), Literary cultures in history: reconstructions from South Asia, p. 849, Decline Following Aurangzeb's death, Persian began to fall into decline, being displaced by Hindustani (Hindi-Urdu). The arrival and strengthening of British political power added a growing influence of English as well. However, for a long time Persian was still the dominant language of the subcontinent, used in education, Muslim rule, the judiciary, and literature. The East India Company acknowledged Persian as a \"language of command\", necessary to communicate with and control the Indian population. Hence many British officials arriving in India learned Persian in colleges established by the Company. The teachers in these colleges were often Indian. In some cases, Britishers even took over as Persian professors, sidelining the role of the Indians. Punjab As the primary entry point and frontier region of the Indian subcontinent, the Punjab region has had a long association with the Persian language. Following the defeat of the Hindu Shahi dynasty, classical Persian was established as a courtly language in the region during the late 10th century under Ghaznavid rule. After Lahore was made the second capital of the Ghaznavids, it played host to great poets in the court, and was settled by many Persian-speakers from the West. The first Indian-born Persian poet was from Lahore . Employed by Punjabis in literature, Persian achieved prominence in the region during the following centuries, as the region came under the Delhi Sultanate and the Mughals. The language of the Sikh gurus (Sant Bhasha) incorporated Persian, and some of their works were done entirely in the language; examples are the Zafarnama and the Hik\u0101yat\u0101n. Persian continued to act as a courtly language for various empires in Punjab through the early 19th century, and dominated most literary spheres. It served finally as the official state language of the Sikh Empire, under which Persian literature such as Zafarnamah-e-Ranjit Singh was produced, preceding British conquest and the decline of Persian in South Asia. Muhammad Iqbal, a Punjabi, was one of the last prolific writers of Persian in the subcontinent. Hindustani is a notable exception to this geographic trend. It is a lingua franca spoken widely across the Hindi Belt and Pakistan, best described as an amalgamation of a Khariboli linguistic base with Persian elements. It has two formal registers, the Persianised Urdu (which uses the Perso-Arabic alphabet) and the de-Persianised, Sanskritised Hindi (which uses Devanagari). Even in its vernacular form, Hindustani contains the most Persian influence of all the Indo-Aryan languages, and many Persian words are used commonly in speech by those identifying as \"Hindi\" and \"Urdu\" speakers alike. These words have been assimilated into the language to the extent they are not recognised as \"foreign\" influences. This is due to the fact that Hindustani's emergence was characterised by a Persianisation process, through patronage at Islamic courts over the centuries. Hindustani's Persian register Urdu in particular has an even greater degree of influence, going as far as to admit fully Persian phrases such as \"mak\u0101n\u0101t bar\u0101-\u0113 far\u014d\u1e35ht\" (houses for sale). It freely uses its historical Persian elements, and looks towards the language for neologisms. This is especially true in Pakistan (see #Contemporary). Vocabulary The most significant result of Indo-Persian language contact has been the seepage of a vast and varied Persian vocabulary into the Indo-Aryan languages. Today, Persian loans are found in almost all spheres of usage, and nouns make up the largest portion of them. Many Persian loans are used commonly in everyday speech ; duk\u0101n (shop), haz\u0101r (thousand), shehar (city), \u0101in\u0101 (mirror), b\u0101z\u0101r (market), and d\u014dst (friend) are just a few examples. Loaned Persian words often have an altered pronunciation when compared to modern Iranian Persian . This is partly because the Indic languages took in the older pronunciations of Classical Persian used by Persian speakers in the subcontinent (see #Contemporary section on the nature of this Indian Persian). Nativisation is also responsible for the distinct pronunciation used in the Indic languages. This often depends on the recipient language; for example dard (pain) becomes d\u00f4r\u00f4d in Bengali and darad in Punjabi . One nativisation common to many languages is the elongation of the haa-e-mukhtafi in Persian to \u0101. Hence Classical Persian t\u0101zah (fresh) became t\u0101z\u0101, \u0101inah (mirror) became \u0101in\u0101 ( Modern Iranian Persianon the other hand transformed these to t\u0101zeh and \u0101ineh respectively). Nativisation has also resulted in phonological changes (see #Phonology below). Outside of these differences, some loans may still appear strange to modern Persian either due to semantic shift or because the inherited word is now archaic in Persian. A categorised list of Persian vocabulary in the Indic languages is provided below, and is far from exhaustive: +Loan categoryExamplesNounsProper namesMuslim names: Akhtar, Nawaz, Aftab, Dilshad , Feroz, Shah Bano, Zarina Non-Muslim names: Bahadur Shah, Chaman , Iqbal, Roshan.TitlesBahadur Shah, Peshwa, Mirza, Khan, Begum Parts of the bodyjism (body), kh\u016bn (blood), n\u0101kh\u016bn (nail, of fingers and toes), s\u012bn\u0101 (chest), dil (heart), chehr\u0101 (face), gardan (neck), zab\u0101n (tongue), halaq (throat)Place names (Suffixes)-\u0101b\u0101d, -stan -ganj, -bagh, -sar\u0101i (Hyderabad, Pakistan, Hazratganj, Arambagh, Mughalsarai)Kinship termsd\u0101m\u0101d (son-in-law), b\u0101b\u0101 (father), shauhar (husband), bir\u0101dar (brother)Foodsabz\u012b (vegetables), n\u0101n (bread), korm\u0101 (curry) , pan\u012br (Indian cheese), g\u014dsht (meat), k\u012bm\u0101 (minced meat), tand\u016bri (roasted) , kofta (meatball) Clothingpaush\u0101k (dress), paj\u0101m\u0101 (pyjamas), kam\u012bz (shirt), jeb (pocket), astar (inner, lining)Housegusalkh\u0101n\u0101 (bathroom), p\u0101kh\u0101n\u0101 (toilet), b\u0101warch\u012bkh\u0101n\u0101 (kitchen), darw\u0101z\u0101 (door), diw\u0101r (wall)Ornamentszewar (ornaments), gulband (necklace), dastband (bracelet), pazeb (anklet)Fruitsseb (apple), an\u0101r (pomegranate), ang\u016br (grapes), n\u0101rang\u012b (tangerine), b\u0101d\u0101m (almond), kishmish (raisin)Vegetablesshalgam (turnip), qadd\u016b (pumpkin), sakarqand (sweet potato)Floracin\u0101r (plane tree), hin\u0101 (henna), banafsh\u0101 (pansy), gul\u0101b (rose), n\u012blofar (water lily), y\u0101sm\u012bn (jasmine) Faunaj\u0101nvar (animal), sher ( lion), khargosh (rabbit), bulbul (nightingale), b\u0101z (falcon), kabutar (pigeon)Professionsdarz\u012b (tailor), hajj\u0101m (barber), sabz\u012b-farosh (greengrocer), kh\u0101ns\u0101m\u0101 (cook)Agriculturefasl (crop), rabi (spring), kh\u0101r\u012bf (autumn), \u0101bpash\u012b (watering), nahar (canal), zam\u012bn (land)Timer\u014dz (day), s\u0101l (year), zam\u0101n\u0101 (era)Lawad\u0101lat (court), q\u0101n\u016bn (law), muddai (plaintiff), vak\u012bl (lawyer), muakil (client)Administrationdarb\u0101r (court), p\u0101dshah (emperor), tehs\u012bld\u0101r (tax collector), zila (district)Writingqalam (pen), daw\u0101t (inkpot), sy\u0101hi (ink), k\u0101gaz (paper)Religion (non-Arabic terms)r\u014dza (fasting), nam\u0101z (ritual prayer), khud\u0101 (God), paighambar (Prophet), darg\u0101h (Sufi shrine ), p\u012br (Sufi master)Measurementgaz (yard), m\u012bl (a mile), man (a mound), ser (a seer), murabb\u0101 (square)Militarysip\u0101h\u012b (soldier), top (gun/cannon), topch\u012b (gunner), topkh\u0101n\u0101 (artillery) Miscellaneous\u0101r\u0101m (rest), \u0101sm\u0101n (sky), dard (pain), d\u0101ru (alcohol), ins\u0101n (human), j\u0101g\u0101h (place), jav\u0101b (answer), kharch (expenditure), l\u0101l (red), pasand (liking), y\u0101d (memory), zindag\u012b (life) OtherModifiers:bilkul (surely/definitely), garm (hot), sard (cold), t\u0101z\u0101 (fresh), \u0101s\u0101n (easy), kam (little), \u0101z\u0101d (free/independent) , khush (happy) Function words:khud (oneself), magar (but), lekin (but), afs\u014ds (alas), shab\u0101sh (well done) , zabardast (forceful, awesome) Sources in order of importance: To a lesser extent, Turkic words also entered through Persian. The terms under \"titles\" and \"military\" in the table above are largely Turkic, due to the rulers' ethnic roots and the prevalence of Turkic soldiers in their armies. In general it is unclear which Turkic words are Persian-mediated, and which direct, since Turkic was used (albeit to a limited extent) in the early medieval period of the subcontinent. Additionally, there is the reverse possibility that Turkic may have contributed some Persian words, since it itself had earlier been Persianised in a similar process to that of the Indic languages (see #Background). Language has always been a dimension of Hindu-Muslim tension in the Indian subcontinent, and the Perso-Arabic elements in Indo-Aryan languages have come to play a part in this. In 19th-century British India, divisions on religious lines led to Hindu groups advocating to de-Persianise language, and Muslims embracing the Perso-Arabic element. Such tensions later contributed to the Partition of India. The most significant and lasting impact of the linguistic divide has been the emergence of Hindi and Urdu as two separate literary registers of Hindustani, both of which are recognised on national levels. Conscious attempts to alter language on such a basis have also been observed in other languages that have both Hindu and Muslim speech communities, such as Punjabi. Urdu has been undergoing further Persianisation in Pakistan, due to a need for new words and coinages to suit modern times.", "after_revision": "Apart from courtly influence, Persian also spread through religion, particularly the Islamic faith of Sufism. Many Sufi missionaries to the subcontinent had Persian roots, and although they used local Indic languages to reach their followers, they used Persian to converse amongst each other and write literature. This resulted in a diffusion process into the local followers of the faith. Sufi centres (Khanqah) served as focal points for this cultural interaction. Sufism also interacted with Hinduism through the Bhakti movement; Abidi and Gargesh speculate that this could have further introduced Persian to locals. The language had a brief dormant period in the late 15th to early 16th century, after the Delhi Sultanate was sacked by Timur. Afghan dynasties such as the Suris and Lodis gained control in the north of the subcontinent, and although Afghans at the time were a part of the Persianate world, these rulers were not well-acquainted with the language. In this era, empires all over the subcontinent began to employ Hindustani's emerging predecessor Hindavi (also known as Dehlavi or Deccani) as a language of the court. Work in Persian was however still produced, and Persian still featured in official documents. Notably, the Delhi Sultanate's official language was declared as Persian by Sikandar Lodi, which began a diffusion process outside Islamic nobility; Hindus for the first time began to learn the language for purposes of employment, and there is evidence of them even teaching the language in this period. Height A firman issued under Mughal Emperor Aurangzeb, written in Persian. Hindus employed in the Mughal finance department were known to excel at writing these documents, which were used as exemplars in educational institutions. Persian experienced a revival with the advent of the Mughal emperors (1526\u20131857), under whom the language reached its zenith in the Indian subcontinent. The Mughals were of Timurid origin; they were Turco-Mongols, and had been Persianised to an extent. However, the early Mughal court preferred their ancestral Turkic language. This linguistic situation began to change when the second Mughal Emperor Humayun reconquered India with the aid of Safavid Iran, ushering many Iranians into the subcontinent. His successor Akbar developed these ties by granting these Iranians positions in the imperial service. He also undertook generous efforts to attract many Persian literati from Iran. Akbar's actions established Persian as the language of the Mughal court, transitioning the royal family out of the ancestral language (his own son and successor Jahangir, for example, was more proficient in Persian than Turkic). Under Akbar, Persian was made the official language of the Mughal Empire, a policy it would retain till its demise. His pluralist rule resulted in many natives becoming more open to learning the language, and educational reforms were introduced in madrasas to improve Persian learning. The Mughal association with the Persian language continued with Akbar's successors; the literary environment created under them led one Shah Jahan-era poet to comment, Under the Mughals, Persian took prominence as the language of culture, education, and prestige. Their policies resulted in a process of \"Persianisation\" by which many Indian communities increasingly adopted the language for social purposes.Kachru, Braj B (2008). \"Introduction: languages, contexts, and constructs\". In Kachru, Braj B; Kachru, Yamuna; Sridhar, S.N (eds.). Language in South Asia. Cambridge University Press. pp. 5-6. Professions requiring Persian proficiency, previously occupied by Iranians and Turks, came to be shared with Indians. For example, groups such as the Kayasthas and Khatris came to dominate the Mughal finance departments; Indians taught Persian in madrasas alongside masters of the language from Iran. Moreover, the complete Persianisation of the Mughal administrative system meant that the language reached both urban centres as well as villages, and a larger audience for Persian literature developed. In this way, Persian became a second language to many across North India; Alam contends that it neared the status of a first language. By the 18th century, many Indians in the north of the subcontinent had a \"native speaker's competence in Persian\".Faruqi, Shamsur Rahman (2003), \"A Long History of Urdu Literarature, Part 1\", in Pollock (ed.), Literary cultures in history: reconstructions from South Asia, p. 849, Decline Following Aurangzeb's death, Persian began to fall into decline, being displaced by Hindustani (Hindi-Urdu). The arrival and strengthening of British political power added a growing influence of English as well. However, for a long time Persian was still the dominant language of the subcontinent, used in education, Muslim rule, the judiciary, and literature. The East India Company acknowledged Persian as a \"language of command\", necessary to communicate with and control the Indian population. Hence many British officials arriving in India learned Persian in colleges established by the Company. The teachers in these colleges were often Indian. In some cases, Britishers even took over as Persian professors, sidelining the role of the Indians. Punjab As the primary entry point and frontier region of the Indian subcontinent, the Punjab has had a long association with the Persian language. The name of the region is itself a Persian coinage (panj-\u0101b, ). Following the defeat of the Hindu Shahi dynasty, classical Persian was established as a courtly language in the region during the late 10th century under Ghaznavid rule. After Lahore was made the second capital of the Ghaznavids, it played host to great poets in the court, and was settled by many Persian-speakers from the West. The first Indian-born Persian poet was from Lahore , as were the earliest notable figures in Indo-Persian literature, Masud Sa'd Salman and Abu-al-Faraj Runi . Employed by Punjabis in literature, Persian achieved prominence in the region during the following centuries, as the region came under the Delhi Sultanate and the Mughals. The language of the Sikh gurus (Sant Bhasha) incorporated Persian, and some of their works were done entirely in the language; examples are the Zafarnama and the Hik\u0101yat\u0101n. Sikhism has since retained many Persian elements in its religious vocabulary. Persian continued to act as a courtly language for various empires in Punjab through the early 19th century, and dominated most literary spheres. It served finally as the official state language of the Sikh Empire, under which Persian literature such as the Zafarnamah-e-Ranjit Singh was produced, preceding British conquest and the decline of Persian in South Asia. Muhammad Iqbal, a Punjabi, was one of the last prolific writers of Persian in the subcontinent. Hindustani is a notable exception to this geographic trend. It is an Indo-Aryan lingua franca spoken widely across the Hindi Belt and Pakistan, best described as an amalgamation of a Khariboli linguistic base with Persian elements. It has two formal registers, the Persianised Urdu (which uses the Perso-Arabic alphabet) and the de-Persianised, Sanskritised Hindi (which uses Devanagari). Even in its vernacular form, Hindustani contains the most Persian influence of all the Indo-Aryan languages, and many Persian words are used commonly in speech by those identifying as \"Hindi\" and \"Urdu\" speakers alike. These words have been assimilated into the language to the extent they are not recognised as \"foreign\" influences. This is due to the fact that Hindustani's emergence was characterised by a Persianisation process, through patronage at Islamic courts over the centuries. Hindustani's Persian register Urdu in particular has an even greater degree of influence, going as far as to admit fully Persian phrases such as \"mak\u0101n\u0101t bar\u0101-\u0113 far\u014d\u1e35ht\" (houses for sale). It freely uses its historical Persian elements, and looks towards the language for neologisms. This is especially true in Pakistan (see #Contemporary). Vocabulary The most significant result of Indo-Persian language contact has been the seepage of a vast and varied Persian vocabulary into the Indic lexicon, particularly the Indo-Aryan languages. Today, Persian loans are found in almost all spheres of usage, and nouns make up the largest portion of them. Many are used commonly in everyday speech . They often have an altered pronunciation when compared to modern Iranian Persian ; this is partly because the Indic languages took in the older pronunciations of Classical Persian used by Persian speakers in the subcontinent (see #Contemporary section on the nature of this Indian Persian). Nativisation is also responsible for the differences in pronunciation, and is determined by the particular recipient language . One nativisation common to many languages is the elongation of the haa-e-mukhtafi in Persian to \u0101. Hence Classical Persian t\u0101zah (fresh) became t\u0101z\u0101, \u0101inah (mirror) became \u0101in\u0101 ( in modern Iranian Persian, these are t\u0101zeh and \u0101ineh respectively). Nativisation has also resulted in phonological changes (see #Phonology below). Outside of these differences, some loans may still appear strange to modern Persian either due to semantic shift or because the inherited word is now archaic in Persian. A categorised list of Persian vocabulary found in the Indic languages is provided below, and is far from exhaustive: +Loan categoryExamplesNounsProper namesMuslim names: Akhtar, Nawaz, Aftab, Dilshad Shah Bano, Zarina Non-Muslim names: Bahadur Shah, Chaman Lal, Iqbal Singh, Lal Bahadur, Roshan LalTitlesKhan Bahadur, Rai Bahadur, Yavar Jung, Salaar JungParts of the bodyjism (body), kh\u016bn (blood), n\u0101kh\u016bn (nail, of fingers and toes), s\u012bn\u0101 (chest), dil (heart), chehr\u0101 (face), gardan (neck), zab\u0101n (tongue), halaq (throat)Place names (Suffixes)-\u0101b\u0101d, -stan , -ganj, -bagh, -sar\u0101i (Hyderabad, Pakistan, Hazratganj, Arambagh, Mughalsarai)Kinship termsd\u0101m\u0101d (son-in-law), b\u0101b\u0101 (father), shauhar (husband), bir\u0101dar (brother)Foodsabz\u012b (vegetables), n\u0101n (bread), korm\u0101 (curry) g\u014dsht (meat), k\u012bm\u0101 (minced meat), tand\u016bri (roasted) Clothingpaush\u0101k (dress), paj\u0101m\u0101 (pyjamas), kam\u012bz (shirt), jeb (pocket), astar (inner, lining)Housegusalkh\u0101n\u0101 (bathroom), p\u0101kh\u0101n\u0101 (toilet), b\u0101warch\u012bkh\u0101n\u0101 (kitchen), darw\u0101z\u0101 (door), diw\u0101r (wall)Ornamentszewar (ornaments), gulband (necklace), dastband (bracelet), pazeb (anklet)Fruitsseb (apple), an\u0101r (pomegranate), ang\u016br (grapes), n\u0101rang\u012b (tangerine), b\u0101d\u0101m (almond), kishmish (raisin)Vegetablesshalgam (turnip), qadd\u016b (pumpkin), sakarqand (sweet potato)Floracin\u0101r (plane tree), hin\u0101 (henna), banafsh\u0101 (pansy), gul\u0101b (rose), n\u012blofar (water lily), y\u0101sm\u012bn (jasmine) Faunasher ( lion), khargosh (rabbit), bulbul (nightingale), b\u0101z (falcon), kabutar (pigeon)Professionsdarz\u012b (tailor), hajj\u0101m (barber), sabz\u012b-farosh (greengrocer), kh\u0101ns\u0101m\u0101 (cook)Agriculturefasl (crop), rabi (spring), kh\u0101r\u012bf (autumn), \u0101bpash\u012b (watering), nahar (canal), zam\u012bn (land)Timer\u014dz (day), s\u0101l (year), zam\u0101n\u0101 (era)Lawad\u0101lat (court), q\u0101n\u016bn (law), muddai (plaintiff), vak\u012bl (lawyer), muakil (client)Administrationdarb\u0101r (court), p\u0101dshah (emperor), tehs\u012bld\u0101r (tax collector), zila (district)Writingqalam (pen), daw\u0101t (inkpot), sy\u0101hi (ink), k\u0101gaz (paper)Religion (non-Arabic terms)r\u014dza (fasting), nam\u0101z (ritual prayer), khud\u0101 (God), paighambar (Prophet), bihisht (Paradise ), p\u012br (Sufi master)Measurementgaz (yard), m\u012bl (a mile), man (a mound), ser (a seer), murabb\u0101 (square)Militarysip\u0101h\u012b (soldier), top (gun/cannon), topch\u012b (gunner), topkh\u0101n\u0101 (artillery) Miscellaneous\u0101in\u0101 (mirror), b\u0101z\u0101r (market), d\u014dst (friend), shehar (city) OtherModifiers:bilkul (surely/definitely), garm (hot), t\u0101z\u0101 (fresh), \u0101z\u0101d (free/independent) Other Function words:khud (oneself), magar (but), lekin (but), afs\u014ds (alas), shab\u0101sh (well done) Sources in order of importance: To a lesser extent, Turkic words also entered through Persian. In general it is unclear which Turkic words are Persian-mediated, and which direct, since Turkic was used (albeit to a limited extent) in the early medieval period of the subcontinent. Additionally, there is the reverse possibility that Turkic may have contributed some Persian words, since it itself had earlier been Persianised in a similar process to that of the Indic languages (see #Background). Language has always been a dimension of Hindu-Muslim tension in the Indian subcontinent, and the Perso-Arabic elements in Indo-Aryan languages have played a part in this. In 19th-century British India, divisions on religious lines led to Hindu groups advocating to de-Persianise language, and Muslims embracing the Perso-Arabic element. Such tensions later contributed to the Partition of India. The most significant and lasting impact of the linguistic divide has been the emergence of Hindi and Urdu as two separate literary registers of Hindustani, both of which are recognised on national levels. Conscious attempts to alter language on such a basis have also been observed in other languages that have both Hindu and Muslim speech communities, such as Punjabi. Urdu has been undergoing further Persianisation in Pakistan, due to a need for new words and coinages to suit modern times.", "edit_actions": [{"type": "A", "before": null, "after": "Apart from courtly influence, Persian also spread through religion, particularly the Islamic faith of Sufism. Many Sufi missionaries to the subcontinent had Persian roots, and although they used local Indic languages to reach their followers, they used Persian to converse amongst each other and write literature. This resulted in a diffusion process into the local followers of the faith. Sufi centres (Khanqah) served as focal points for this cultural interaction. Sufism also interacted with Hinduism through the Bhakti movement; Abidi and Gargesh speculate that this could have further introduced Persian to locals.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "D", "before": "secular and", "after": null, "start_char_pos": 2179, "end_char_pos": 2190}, {"type": "R", "before": "administration", "after": "administrative system", "start_char_pos": 3311, "end_char_pos": 3325}, {"type": "D", "before": "Apart from courtly influence, Persian also spread through religion, particularly the Islamic faith of Sufism. Many Sufi missionaries to the subcontinent had Persian roots, and although they used local Indic languages to reach their followers, they used Persian to converse amongst each other and write literature. This resulted in a diffusion process into the local followers of the faith. Sufi centres (Khanqah) served as focal points for this cultural interaction. Sufism also interacted with Hinduism through the Bhakti movement; Abidi and Gargesh speculate that this could have further introduced Persian to locals.", "after": null, "start_char_pos": 3454, "end_char_pos": 4073}, {"type": "D", "before": "region", "after": null, "start_char_pos": 5342, "end_char_pos": 5348}, {"type": "A", "before": null, "after": "The name of the region is itself a Persian coinage (panj-\u0101b, ).", "start_char_pos": 5403, "end_char_pos": 5403}, {"type": "A", "before": null, "after": ", as were the earliest notable figures in Indo-Persian literature, Masud Sa'd Salman and Abu-al-Faraj Runi", "start_char_pos": 5785, "end_char_pos": 5785}, {"type": "A", "before": null, "after": "Sikhism has since retained many Persian elements in its religious vocabulary.", "start_char_pos": 6133, "end_char_pos": 6133}, {"type": "A", "before": null, "after": "the", "start_char_pos": 6388, "end_char_pos": 6388}, {"type": "R", "before": "a", "after": "an Indo-Aryan", "start_char_pos": 6660, "end_char_pos": 6661}, {"type": "A", "before": null, "after": "Indic lexicon, particularly the", "start_char_pos": 7943, "end_char_pos": 7943}, {"type": "D", "before": "Persian loans", "after": null, "start_char_pos": 8081, "end_char_pos": 8094}, {"type": "R", "before": "; duk\u0101n (shop), haz\u0101r (thousand), shehar (city), \u0101in\u0101 (mirror), b\u0101z\u0101r (market), and d\u014dst (friend) are just a few examples. Loaned Persian words", "after": ". They", "start_char_pos": 8132, "end_char_pos": 8275}, {"type": "R", "before": ". This", "after": "; this", "start_char_pos": 8352, "end_char_pos": 8358}, {"type": "R", "before": "distinct pronunciation used in the Indic languages. This often depends on the recipient language; for example dard (pain) becomes d\u00f4r\u00f4d in Bengali and darad in Punjabi", "after": "differences in pronunciation, and is determined by the particular recipient language", "start_char_pos": 8603, "end_char_pos": 8770}, {"type": "R", "before": "Modern Iranian Persianon the other hand transformed these to", "after": "in modern Iranian Persian, these are", "start_char_pos": 8952, "end_char_pos": 9012}, {"type": "A", "before": null, "after": "found", "start_char_pos": 9334, "end_char_pos": 9334}, {"type": "D", "before": ", Feroz,", "after": null, "start_char_pos": 9488, "end_char_pos": 9496}, {"type": "R", "before": ", Iqbal, Roshan.TitlesBahadur Shah, Peshwa, Mirza, Khan, Begum Parts", "after": "Lal, Iqbal Singh, Lal Bahadur, Roshan LalTitlesKhan Bahadur, Rai Bahadur, Yavar Jung, Salaar JungParts", "start_char_pos": 9554, "end_char_pos": 9622}, {"type": "A", "before": null, "after": ",", "start_char_pos": 9819, "end_char_pos": 9819}, {"type": "D", "before": ", pan\u012br (Indian cheese),", "after": null, "start_char_pos": 10032, "end_char_pos": 10056}, {"type": "D", "before": ", kofta (meatball)", "after": null, "start_char_pos": 10109, "end_char_pos": 10127}, {"type": "R", "before": "Faunaj\u0101nvar (animal), sher (", "after": "Faunasher (", "start_char_pos": 10691, "end_char_pos": 10719}, {"type": "R", "before": "darg\u0101h (Sufi shrine", "after": "bihisht (Paradise", "start_char_pos": 11364, "end_char_pos": 11383}, {"type": "R", "before": "Miscellaneous\u0101r\u0101m (rest), \u0101sm\u0101n (sky), dard (pain), d\u0101ru (alcohol), ins\u0101n (human), j\u0101g\u0101h (place), jav\u0101b (answer), kharch (expenditure), l\u0101l (red), pasand (liking), y\u0101d (memory), zindag\u012b (life)", "after": "Miscellaneous\u0101in\u0101 (mirror), b\u0101z\u0101r (market), d\u014dst (friend), shehar (city)", "start_char_pos": 11568, "end_char_pos": 11760}, {"type": "D", "before": "sard (cold),", "after": null, "start_char_pos": 11816, "end_char_pos": 11828}, {"type": "D", "before": "\u0101s\u0101n (easy), kam (little),", "after": null, "start_char_pos": 11843, "end_char_pos": 11869}, {"type": "R", "before": ", khush (happy)", "after": "Other", "start_char_pos": 11894, "end_char_pos": 11909}, {"type": "D", "before": ", zabardast (forceful, awesome)", "after": null, "start_char_pos": 12001, "end_char_pos": 12032}, {"type": "D", "before": "The terms under \"titles\" and \"military\" in the table above are largely Turkic, due to the rulers' ethnic roots and the prevalence of Turkic soldiers in their armies.", "after": null, "start_char_pos": 12128, "end_char_pos": 12293}, {"type": "R", "before": "come to play", "after": "played", "start_char_pos": 12843, "end_char_pos": 12855}], "sents_char_pos": [0, 127, 348, 516, 610, 759, 914, 989, 1144, 1297, 1333, 1397, 1472, 1647, 1750, 1829, 2058, 2174, 2356, 2440, 2620, 2765, 2787, 2840, 2859, 2875, 2896, 2920, 3075, 3178, 3258, 3453, 3563, 3767, 3843, 3920, 3986, 4073, 4147, 4208, 4323, 4606, 4709, 4858, 4995, 5098, 5148, 5248, 5402, 5573, 5733, 5959, 6086, 6132, 6279, 6497, 6593, 6653, 6813, 6970, 7189, 7304, 7459, 7648, 7743, 7800, 7965, 8075, 8133, 8254, 8353, 8561, 8654, 8700, 8772, 8871, 9043, 9122, 9292, 9570, 9814, 9828, 10031, 10108, 10127, 10152, 10170, 10185, 10199, 10213, 10690, 10712, 10726, 10745, 10767, 10781, 10824, 10841, 10869, 10908, 10923, 10940, 10960, 10975, 11002, 11014, 11045, 11058, 11078, 11567, 11776, 12127, 12293, 12478, 12694, 12871, 13037, 13096, 13301, 13466]}
+{"doc_id": "33746146", "revision_depth": "1", "before_revision": "The Partnership for Observation of the Global Oceans (POGO), which was founded in 1999, is a consortium of major oceanographic institutions around the world, represented by their Directors. POGO's goal is to promote global operational oceanography, the implementation of a Global Ocean Observing System, and the importance of ocean observations for society. In 2011, POGO had 40 Members. The current Chairman (2011-2012) is Prof. Peter Herzig (GEOMAR Helmholtz Centre for Ocean Research Kiel, Germany). The incoming Chairman is Prof. John Field (Marine Research Institute, University of Cape Town, South Africa ). POGO provides a forum (at the annual meetings and intersessionally) for Members to meet with their peers, and with senior officials of partner organisations, to discuss issues of mutual concern (it is a talking shop). It also serves as a credible voice for the marine science community, through its leadership role in the informal grouping Oceans United, and an advocating body for the establishment of an integrated, global ocean observing system. As a means to ease the shortage in trained observers of the ocean in developing countries, It has developed a suite of programmes in capacity building, and works with relevant partner organisations in the marine field SCOR, IOC, GOOS, GEO). It engages in outreach activities to the general public, a current example being its exhibit at the Ocean and Coasts Best Practices Area Pavilion at the Expo 2012 Yeosu Korea.Seeyave, S. and Platt, T. \"POGO -Joining Forces to Observe the Ocean for Science and Society\", Marine Scientist, 38, pp. 8-11, Institute of Marine Engineering Science and Technology (IMarEST), February 2012. Scripps Institution of Oceanography hosted the first formal meeting in early December 1999, with g included senior officials from 17 institutions in 12 countries (as well as representatives of the IOC, the Scientific Committee for Oceanic Research (SCOR) of the International Council for Science (ICSU), the Committee on Earth Observation Satellites (CEOS) and several international scientific programs. At this meeting, there was agreement on an initial work plan, including development of an advocacy plan for observing systems; participation in processes to secure governmental commitments to fund ocean observing systems; a data interchange demonstration pilot project; and establishment of a clearinghouse for information exchange among POGO members, as well as the broader community. POGO Capacity Building The Nippon Foundation - POGO Centre of Excellence in Observational Oceanography ( Bermuda Institute of Ocean Sciences ), under which ten scientists from developing countries, annually, are supported to study for ten months in an intensive programme related to ocean observations. By 2012, 40 young scientists have been trained. The POGO-SCOR Visiting Fellowship Programme, for scientists from developing countries to spend up to three months in a major oceanographic institution. POGO awards about a dozen of these each year. By 2011, 125 young scientists in all. The programme is carried out in conjunction with POGO's sister organisation SCOR. The POGO Visiting Professor Programme under which one senior scientist, annually, visits a developing country to conduct training in ocean observations (2009+). The POGO-AMT Fellowship Programme, under which one scientist annually participate sin a major oceanographic cruise (the Atlantic Meridional Transect cruise), and spend time at a participating major oceanographic institute before and after the cruise to experience cruise preparation and data analysis. (2008+). The POGO-UCT Postgraduate Bursary Programme under which one African graduate student, annually, is supported to study at the University of Cape Town, South Africa (2009+). Travel support for participants from developing countries attending Austral Summer Institute courses at the University of Concepcion, Chile. This course has been running since 2000, providing training for young scientists from around Latin America, as well as the rest of the world. Although not funded by POGO, the EAMNet Fellowship Programme, under which scientists from African countries can visit major oceanographic laboratories for training in use of remote sensing for ocean observations, is modelled on the POGO-SCOR Fellowship Programme. It is administered from Plymouth and is an example of the synergy resulting from the co-location of the POGO Secretariat in a member institution. Under POGO capacity-building schemes, some 450 young scientists from 63 countries have received advanced training. Former scholars or alumni of NF-POGO training become members of the rapidly developing NF-POGO Alumni Network for Oceans (NANO) , whose first newsletter appeared in September 2011. The GEO Secretariat was established during the early years of POGO. Oceans did not appear among the nine societal-benefit areas around which GEO is structured . POGO has led the creation of a new Ocean Task (SB01, Oceans and Society: the Blue Planet) in the 2012-2015 GEO Work Plan. Trevor Platt, Executive Director of POGO, is the overall Coordinator for this Task . POGO contributed to OceanObs'09 in Venice in 2009, which led to the opening up of sustained ocean observations to a broader community, including chemical, biological and biogeochemical observations . POGO also participated in the post-Venice Framework for Ocean Observing Committee. Members Australia: CSIRO Marine and Atmospheric Research, Institute for Marine and Antarctic Studies Belgium: Flanders Marine Institute Bermuda: Bermuda Institute for Ocean Sciences Brazil: Instituto Oceanogr\u00e1fico, Universidade de S\u00e3o Paulo Chile: Consortium Consisting of:- SHOA (Servicio Hidrogr\u00e1fico y Oceanogr\u00e1fico de la Armada), Universidad de Concepci\u00f3n China: First Institute of Oceanography, Institute of Oceanology, Chinese Academy of Sciences France: Consortium Consisting of IFREMER (Institut Fran\u00e7ais de Recherche pour l\u2019Exploitation de la MER), INSU (L\u2019Institut National des Sciences de l\u2019Univers du CNRS) Germany: Consortium consisting of: - AWI (Alfred Wegener Institute for Polar and Marine Research), Bremerhaven, - GEOMAR Helmholtz Centre for Ocean Research Kiel, India: Indian National Centre for Ocean Information Services, National Institute of Oceanography Italy Istituto Nazionale di Oceanografia e di Geofisica Sperimentale Japan: Japan Agency for Marine-Earth Science and Technology Netherlands: Royal Netherlands Institute of Sea Research Norway: Institute of Marine Research Republic of Korea: Korea Ocean Research Development Institute Russia: P. P. Shirshov Institute of Oceanology, Russian Academy of Sciences Saudi Arabia,Red Sea Research Center at King Abdullah University of Science and Technology (KAUST) South Africa: Marine Research Institute (MA-RE), University of Cape Town Spain: Instituto Espa\u00f1ol de Oceanograf\u00eda (including Mediterranean Group on Climate Change) UK: British Antarctic Survey, Consortium consisting of: Plymouth Marine Laboratory , Scottish Association for Marine Science, National Oceanography Centre , Sir Alister Hardy Foundation for Ocean Science USA: Bigelow Laboratory for Ocean Sciences, National Oceanic and Atmospheric Administration (NOAA), Consortium consisting of:- Lamont-Doherty Earth Observatory , Graduate School of Oceanography, University of Rhode Island , Scripps Institution of Oceanography, School of Ocean and Earth Science and Technology (SOEST), University of Hawaii at Manoa, Woods Hole Oceanographic Institution Secretariat personnel The executive director is Dr. Trevor Platt. References Oceans United NF-POGO Alumni Network for Oceans", "after_revision": "The Partnership for Observation of the Global Ocean (POGO), which was founded in 1999, is a consortium of major oceanographic institutions around the world, represented by their Directors. POGO's goal is to promote global operational oceanography, the implementation of a Global Ocean Observing System, and the importance of ocean observations for society. In 2011, POGO had 40 Members. The current Chairman (2011-2012) is Prof. Nick Owens (Scottish Association for Marine Science, UK ). POGO provides a forum (at the annual meetings and intersessionally) for Members to meet with their peers, and with senior officials of partner organisations, to discuss issues of mutual concern . As a means to ease the shortage in trained observers of the ocean in developing countries, It has developed a suite of programmes in capacity building, and works with relevant partner organisations in the marine field SCOR, IOC, GOOS, GEO). It engages in outreach activities to the general public, for example by having exhibits at international events such as World Expo (2012), UNFCCC COP Meetings and AGU-ASLO-TOS Ocean Sciences Meetings Expo 2012 Yeosu Korea.Seeyave, S. and Platt, T. \"POGO -Joining Forces to Observe the Ocean for Science and Society\", Marine Scientist, 38, pp. 8-11, Institute of Marine Engineering Science and Technology (IMarEST), February 2012. Scripps Institution of Oceanography hosted the first formal meeting in early December 1999, which included senior officials from 17 institutions in 12 countries (as well as representatives of the IOC, the Scientific Committee for Oceanic Research (SCOR) of the International Council for Science (ICSU), the Committee on Earth Observation Satellites (CEOS) and several international scientific programs. At this meeting, there was agreement on an initial work plan, including development of an advocacy plan for observing systems; participation in processes to secure governmental commitments to fund ocean observing systems; a data interchange demonstration pilot project; and establishment of a clearinghouse for information exchange among POGO members, as well as the broader community. POGO Capacity Building The Nippon Foundation - POGO Centre of Excellence in Observational Oceanography ( currently hosted by the Alfred Wegener Institute Helmholtz Centre for Polar and Marine Science ), under which ten scientists from developing countries, annually, are supported to study for ten months in an intensive programme related to ocean observations. By 2012, 40 young scientists have been trained. The POGO-SCOR Visiting Fellowship Programme, for scientists from developing countries to spend up to three months in a major oceanographic institution. POGO awards about a dozen of these each year. By 2011, 125 young scientists in all. The programme is carried out in conjunction with POGO's sister organisation SCOR. The POGO-AMT Fellowship Programme, under which one scientist annually participate sin a major oceanographic cruise (the Atlantic Meridional Transect cruise), and spend time at a participating major oceanographic institute before and after the cruise to experience cruise preparation and data analysis. (2008+). Under POGO capacity-building schemes, some 1000 young scientists from 63 countries have received advanced training. Former scholars or alumni of NF-POGO training become members of the rapidly developing NF-POGO Alumni Network for Oceans (NANO) . The GEO Secretariat was established during the early years of POGO. Oceans did not appear among the nine societal-benefit areas around which GEO was structured at that time. POGO advocated for a greater prominence of ocean observing activities within GEO, which led the creation of a new Ocean Task (SB01, Oceans and Society: Blue Planet) in the 2012-2015 GEO Work Plan. This was expanded and further developed into what is now known as the GEO Blue Planet Initiative . POGO contributed to OceanObs'09 in Venice in 2009, which led to the opening up of sustained ocean observations to a broader community, including chemical, biological and biogeochemical observations , and also participated in the post-Venice Framework for Ocean Observing Committee. More recently, POGO was involved in the OceanObs'19 conference in Honolulu, USA. Members POGO has 49 member institutions in 28 countries. Secretariat The Secretariat is hosted by Plymouth Marine Laboratory in the UK, with a satellite office hosted by the University of Algarve in Portugal. References GEO Blue Planet NF-POGO Alumni Network for Oceans", "edit_actions": [{"type": "R", "before": "Oceans", "after": "Ocean", "start_char_pos": 46, "end_char_pos": 52}, {"type": "R", "before": "Peter Herzig (GEOMAR Helmholtz Centre for Ocean Research Kiel, Germany). The incoming Chairman is Prof. John Field (Marine Research Institute, University of Cape Town, South Africa", "after": "Nick Owens (Scottish Association for Marine Science, UK", "start_char_pos": 430, "end_char_pos": 610}, {"type": "R", "before": "(it is a talking shop). It also serves as a credible voice for the marine science community, through its leadership role in the informal grouping Oceans United, and an advocating body for the establishment of an integrated, global ocean observing system.", "after": ".", "start_char_pos": 808, "end_char_pos": 1062}, {"type": "R", "before": "a current example being its exhibit at the Ocean and Coasts Best Practices Area Pavilion at the", "after": "for example by having exhibits at international events such as World Expo (2012), UNFCCC COP Meetings and AGU-ASLO-TOS Ocean Sciences Meetings", "start_char_pos": 1361, "end_char_pos": 1456}, {"type": "R", "before": "with g", "after": "which", "start_char_pos": 1779, "end_char_pos": 1785}, {"type": "R", "before": "Bermuda Institute of Ocean Sciences", "after": "currently hosted by the Alfred Wegener Institute Helmholtz Centre for Polar and Marine Science", "start_char_pos": 2582, "end_char_pos": 2617}, {"type": "D", "before": "POGO Visiting Professor Programme under which one senior scientist, annually, visits a developing country to conduct training in ocean observations (2009+). The", "after": null, "start_char_pos": 3150, "end_char_pos": 3310}, {"type": "D", "before": "The POGO-UCT Postgraduate Bursary Programme under which one African graduate student, annually, is supported to study at the University of Cape Town, South Africa (2009+). Travel support for participants from developing countries attending Austral Summer Institute courses at the University of Concepcion, Chile. This course has been running since 2000, providing training for young scientists from around Latin America, as well as the rest of the world.", "after": null, "start_char_pos": 3618, "end_char_pos": 4072}, {"type": "D", "before": "Although not funded by POGO, the EAMNet Fellowship Programme, under which scientists from African countries can visit major oceanographic laboratories for training in use of remote sensing for ocean observations, is modelled on the POGO-SCOR Fellowship Programme. It is administered from Plymouth and is an example of the synergy resulting from the co-location of the POGO Secretariat in a member institution.", "after": null, "start_char_pos": 4073, "end_char_pos": 4482}, {"type": "R", "before": "450", "after": "1000", "start_char_pos": 4526, "end_char_pos": 4529}, {"type": "R", "before": ", whose first newsletter appeared in September 2011.", "after": ".", "start_char_pos": 4726, "end_char_pos": 4778}, {"type": "R", "before": "is structured . POGO has", "after": "was structured at that time. POGO advocated for a greater prominence of ocean observing activities within GEO, which", "start_char_pos": 4924, "end_char_pos": 4948}, {"type": "D", "before": "the", "after": null, "start_char_pos": 5013, "end_char_pos": 5016}, {"type": "R", "before": "Trevor Platt, Executive Director of POGO, is the overall Coordinator for this Task", "after": "This was expanded and further developed into what is now known as the GEO Blue Planet Initiative", "start_char_pos": 5062, "end_char_pos": 5144}, {"type": "R", "before": ". POGO", "after": ", and", "start_char_pos": 5345, "end_char_pos": 5351}, {"type": "A", "before": null, "after": "More recently, POGO was involved in the OceanObs'19 conference in Honolulu, USA.", "start_char_pos": 5430, "end_char_pos": 5430}, {"type": "D", "before": "Australia: CSIRO Marine and Atmospheric Research, Institute for Marine and Antarctic Studies Belgium: Flanders Marine Institute Bermuda: Bermuda Institute for Ocean Sciences Brazil: Instituto Oceanogr\u00e1fico, Universidade de S\u00e3o Paulo Chile: Consortium Consisting of:- SHOA (Servicio Hidrogr\u00e1fico y Oceanogr\u00e1fico de la Armada), Universidad de Concepci\u00f3n China: First Institute of Oceanography, Institute of Oceanology, Chinese Academy of Sciences France: Consortium Consisting of IFREMER (Institut Fran\u00e7ais de Recherche pour l\u2019Exploitation de la MER), INSU (L\u2019Institut National des Sciences de l\u2019Univers du CNRS) Germany: Consortium consisting of: - AWI (Alfred Wegener Institute for Polar and Marine Research), Bremerhaven, - GEOMAR Helmholtz Centre for Ocean Research Kiel, India: Indian National Centre for Ocean Information Services, National Institute of Oceanography Italy Istituto Nazionale di Oceanografia e di Geofisica Sperimentale Japan: Japan Agency for Marine-Earth Science and Technology Netherlands: Royal Netherlands Institute of Sea Research Norway: Institute of Marine Research Republic of Korea: Korea Ocean Research", "after": null, "start_char_pos": 5439, "end_char_pos": 6572}, {"type": "R", "before": "Development Institute Russia: P. P. Shirshov Institute of Oceanology, Russian Academy of Sciences Saudi Arabia,Red Sea Research Center at King Abdullah University of Science and Technology (KAUST) South Africa: Marine Research Institute (MA-RE), University of Cape Town Spain: Instituto Espa\u00f1ol de Oceanograf\u00eda (including Mediterranean Group on Climate Change) UK: British Antarctic Survey, Consortium consisting of:", "after": "POGO has 49 member institutions in 28 countries.", "start_char_pos": 6573, "end_char_pos": 6989}, {"type": "A", "before": null, "after": "Secretariat The Secretariat is hosted by", "start_char_pos": 6990, "end_char_pos": 6990}, {"type": "R", "before": ", Scottish Association for Marine Science, National Oceanography Centre , Sir Alister Hardy Foundation for Ocean Science USA: Bigelow Laboratory for Ocean Sciences, National Oceanic and Atmospheric Administration (NOAA), Consortium consisting of:- Lamont-Doherty Earth Observatory , Graduate School of Oceanography, University of Rhode Island , Scripps Institution of Oceanography, School of Ocean and Earth Science and Technology (SOEST), University of Hawaii at Manoa, Woods Hole Oceanographic Institution", "after": "in the UK, with a satellite office hosted by the University of Algarve in Portugal.", "start_char_pos": 7018, "end_char_pos": 7525}, {"type": "D", "before": "Secretariat personnel The executive director is Dr. Trevor Platt.", "after": null, "start_char_pos": 7526, "end_char_pos": 7591}, {"type": "R", "before": "Oceans United", "after": "GEO Blue Planet", "start_char_pos": 7603, "end_char_pos": 7616}], "sents_char_pos": [0, 189, 357, 387, 429, 502, 533, 613, 831, 1062, 1303, 1479, 1686, 2090, 2217, 2312, 2360, 2476, 2779, 2827, 2979, 3025, 3063, 3145, 3306, 3608, 3789, 3930, 4072, 4336, 4482, 4597, 4778, 4846, 5061, 5429, 5449, 5540, 5575, 5620, 6086, 6163, 6219, 6385, 6451, 6503, 6551, 6602, 6783, 6849, 6937, 6989, 7143, 7577, 7591]}
+{"doc_id": "3447162", "revision_depth": "1", "before_revision": "Act I Prologue ( \"Little Shop of Horrors\" ) \u2013 Chiffon, Crystal, Ronette and Voice \"Skid Row (Downtown) \" \u2013 Company \" Da-Doo \" \u2013 Chiffon, Crystal, and Ronette (with Seymour speaking) \"Grow for Me\" \u2013 Seymour \" Ya Never Know\" \u2013 Mushnik, Chiffon, Crystal, Ronette, and Seymour \"Somewhere That's Green\" \u2013 Audrey \"Closed for Renovation\" \u2013 Seymour, Audrey, and Mushnik \"Dentist ! \" \u2013 Orin, Chiffon, Crystal, and Ronette \"Mushnik and Son\" \u2013 Mushnik and Seymour \"Sudden Changes\" \u2013 Seymour \"Feed Me (Git It) \" \u2013 Audrey II and Seymour \"Now ( It's Just the Gas ) \" \u2013 Orin and Seymour \" Coda (Act I Finale ) \" \u2013 Chiffon , Crystal, Ronette, and Audrey II Act II \"Call Back in the Morning\" \u2013 Seymour and Audrey \"Suddenly, Seymour\" \u2013 Seymour, Audrey, Chiffon, Crystal, and Ronette \"Suppertime\" \u2013 Audrey II (with Seymourand Mushnik speaking) \" The Meek Shall Inherit\" \u2013 Company \"Sominex /Suppertime II \" \u2013 Audrey and Audrey II \"Somewhere That's Green\" (reprise ) \u2013 Audrey (with Seymour speaking) \" Finale Ultimo ( Don't Feed the Plants ) \" \u2013 Company ", "after_revision": "Act I \"Little Shop of Horrors\" \u2013 Company ( Chiffon, Crystal, Ronette and Voice ) \"Skid Row \" \u2013 Company (Mr Mushnik, Audrey, Seymour, Ronette, Crystal, Chiffon and Wino) \" Da Doo \" \u2013 Chiffon, Crystal, Ronette and Seymour \"Grow for Me\" \u2013 Seymour \" You Never Know\" \u2013 Mushnik, Chiffon, Crystal, Ronette, and Seymour \"Somewhere That's Green\" \u2013 Audrey and Crystal \"Closed for Renovation\" \u2013 Company, Seymour, Audrey, and Mushnik \"Dentist \" \u2013 Orin, Chiffon, Crystal, and Ronette \"Mushnik and Son\" \u2013 Mr Mushnik and Seymour \"Sudden Changes\" \u2013 Seymour \"Feed Me \" \u2013 Audrey II , Seymour, Audrey, Orin, Ronette, Chiffon and Crystal \"Now It's Just the Gas \" \u2013 Orin and Seymour \" Act 1 Finale \" \u2013 Audrey 2 , Crystal, Ronette, and Chiffon Act II \"Call Back in the Morning\" \u2013 Seymour and Audrey \"Suddenly, Seymour\" \u2013 Seymour, Audrey, Chiffon, Crystal, and Ronette \"Suppertime\" \u2013 Audrey II , Mr Mushnik, Seymour, Ronette, Chiffon and Crystal \" Meek Shall Inherit\" \u2013 Company (Seymour, Ronette, Chiffon, Crystal, Mr Bernstein , Mrs Luce, Skip Snip) \"Sominex \" \u2013 Audrey \"Suppertime Reprise\" nbsp ;\u2013 Audrey and Audrey 2 \"Somewhere That's Green\" reprise \u2013 Audrey \" Don't Feed the Plants \" \u2013 Company (Seymour, Mr Mushnik, Audrey, Orin, Audrey 2, Chiffon, Ronette and Crystal) Cut Numbers \" I Found A Hobby \" \u2013 Orin and Seymour \" A Little Dental Music \" \u2013 Seymour and Orin", "edit_actions": [{"type": "D", "before": "Prologue (", "after": null, "start_char_pos": 6, "end_char_pos": 16}, {"type": "D", "before": ")", "after": null, "start_char_pos": 42, "end_char_pos": 43}, {"type": "A", "before": null, "after": "Company (", "start_char_pos": 46, "end_char_pos": 46}, {"type": "A", "before": null, "after": ")", "start_char_pos": 83, "end_char_pos": 83}, {"type": "D", "before": "(Downtown)", "after": null, "start_char_pos": 94, "end_char_pos": 104}, {"type": "A", "before": null, "after": "(Mr Mushnik, Audrey, Seymour, Ronette, Crystal, Chiffon and Wino)", "start_char_pos": 117, "end_char_pos": 117}, {"type": "R", "before": "Da-Doo", "after": "Da Doo", "start_char_pos": 120, "end_char_pos": 126}, {"type": "R", "before": "and Ronette (with Seymour speaking)", "after": "Ronette and Seymour", "start_char_pos": 149, "end_char_pos": 184}, {"type": "R", "before": "Ya", "after": "You", "start_char_pos": 211, "end_char_pos": 213}, {"type": "A", "before": null, "after": "and Crystal", "start_char_pos": 310, "end_char_pos": 310}, {"type": "A", "before": null, "after": "Company,", "start_char_pos": 337, "end_char_pos": 337}, {"type": "D", "before": "!", "after": null, "start_char_pos": 376, "end_char_pos": 377}, {"type": "A", "before": null, "after": "Mr", "start_char_pos": 438, "end_char_pos": 438}, {"type": "D", "before": "(Git It)", "after": null, "start_char_pos": 495, "end_char_pos": 503}, {"type": "R", "before": "and Seymour", "after": ", Seymour, Audrey, Orin, Ronette, Chiffon and Crystal", "start_char_pos": 518, "end_char_pos": 529}, {"type": "D", "before": "(", "after": null, "start_char_pos": 535, "end_char_pos": 536}, {"type": "D", "before": ")", "after": null, "start_char_pos": 555, "end_char_pos": 556}, {"type": "R", "before": "Coda (Act I Finale )", "after": "Act 1 Finale", "start_char_pos": 580, "end_char_pos": 600}, {"type": "R", "before": "Chiffon", "after": "Audrey 2", "start_char_pos": 605, "end_char_pos": 612}, {"type": "R", "before": "Audrey II", "after": "Chiffon", "start_char_pos": 637, "end_char_pos": 646}, {"type": "R", "before": "(with Seymourand Mushnik speaking)", "after": ", Mr Mushnik, Seymour, Ronette, Chiffon and Crystal", "start_char_pos": 796, "end_char_pos": 830}, {"type": "D", "before": "The", "after": null, "start_char_pos": 833, "end_char_pos": 836}, {"type": "A", "before": null, "after": "(Seymour, Ronette, Chiffon, Crystal, Mr Bernstein , Mrs Luce, Skip Snip)", "start_char_pos": 867, "end_char_pos": 867}, {"type": "D", "before": "/Suppertime II", "after": null, "start_char_pos": 877, "end_char_pos": 891}, {"type": "A", "before": null, "after": "\"Suppertime Reprise\"", "start_char_pos": 903, "end_char_pos": 903}, {"type": "A", "before": null, "after": "nbsp ;\u2013 Audrey", "start_char_pos": 904, "end_char_pos": 904}, {"type": "R", "before": "II", "after": "2", "start_char_pos": 916, "end_char_pos": 918}, {"type": "R", "before": "(reprise )", "after": "reprise", "start_char_pos": 944, "end_char_pos": 954}, {"type": "D", "before": "(with Seymour speaking)", "after": null, "start_char_pos": 964, "end_char_pos": 987}, {"type": "D", "before": "Finale Ultimo (", "after": null, "start_char_pos": 990, "end_char_pos": 1005}, {"type": "D", "before": ")", "after": null, "start_char_pos": 1028, "end_char_pos": 1029}, {"type": "A", "before": null, "after": "(Seymour, Mr Mushnik, Audrey, Orin, Audrey 2, Chiffon, Ronette and Crystal)", "start_char_pos": 1042, "end_char_pos": 1042}, {"type": "A", "before": null, "after": "Cut Numbers \" I Found A Hobby \" \u2013 Orin and Seymour \" A Little Dental Music \" \u2013 Seymour and Orin", "start_char_pos": 1043, "end_char_pos": 1043}], "sents_char_pos": [0, 45, 108, 130, 200, 227, 302, 336, 381, 437, 477, 507, 560]}
+{"doc_id": "3459279", "revision_depth": "1", "before_revision": "History While the term was coined by Caltech scientist Andrew Ingersoll in a paper that described a model of the atmosphere of Venus, the initial idea of a limit on terrestrial outgoing infrared radiation was published by George Simpson (meteorologist) in 1927. The physics relevant to the, later-termed, runaway greenhouse effect was explored by Makoto Komabayashi at Nagoya university. Assuming a water vapor-saturated stratosphere, Komabayashi and Ingersoll independently calculated the limit on outgoing infrared radiation that defines the runaway greenhouse state. The limit is now known as the Komabayashi-Ingersoll limit to recognize their contributions. Physics of the runaway greenhouse 245x245px|Graph of tropopause optical depth by tropopause temperature, illustrating the Komabayashi-Ingersoll limit of 385 W/m\u00b2 using equations and values from Nakajima et al. (1992) \"A Study on the Runaway Greenhouse Effect with a One-Dimensional Radiative\u2013Convective Equilibrium Model\". The Komabayashi-Ingersoll limit is the value of outgoing longwave radiation (FIRtop) beyond which the lines do not intersect. The runaway greenhouse effect is often formulated in terms of how the surface temperature of a planet changes with differing amounts of received starlight. If the planet is assumed to be in radiative equilibrium, then the runaway greenhouse state is calculated as the equilibrium state at which water cannot exist in liquid form. The water vapor is then lost to space through hydrodynamic escape. In radiative equilibrium, a planet's outgoing longwave radiation (OLR) must balance the incoming stellar flux. The Stefan-Boltzmann law is an example of a negative feedback that stabilizes a planet's climate system. If the Earth received more sunlight it would result in a temporary disequilibrium (more energy in than out) and result in warming. However, because the Stefan-Boltzmann response mandates that this hotter planet emits more energy, eventually a new radiation balance can be reached and the temperature will be maintained at its new, higher value. Positive climate change feedbacks amplify changes in the climate system, and can lead to destabilizing effects for the climate. An increase in temperature from greenhouse gases leading to increased water vapor (which is itself a greenhouse gas) causing further warming is a positive feedback, but not a runaway effect, on Earth. Positive feedback effects are common (e.g. ice-albedo feedback) but runaway effects do not necessarily emerge from their presence. Though water plays a major role in the process, the runaway greenhouse effect is not a result of water vapor feedback. The runaway greenhouse effect can be seen as a limit on a planet's outgoing longwave radiation that, when surpassed, results in a state where water cannot exist in its liquid form (hence, the oceans have all \"boiled away\"). A planet's outgoing longwave radiation is limited by this evaporated water, which is an effective greenhouse gas and blocks additional infrared radiation as it accumulates in the atmosphere. Assuming radiative equilibrium, runaway greenhouse limits on outgoing longwave radiation correspond to limits on the increase in stellar flux received by a planet to trigger the runaway greenhouse effect. Two limits on a planet's outgoing longwave radiation have been calculated that correspond with the onset of the runaway greenhouse effect: the Komabayashi-Ingersoll limit and the Simpson-Nakajima limit. At these values the runaway greenhouse effect overcomes the Stefan-Boltzmann feedback so an increase in a planet's surface temperature will not increase the outgoing longwave radiation. The Komabayashi-Ingersoll limit was the first to be analytically derived and only considers a grey stratosphere in radiative equilibrium. A grey stratosphere (or atmosphere) is an approach to modeling radiative transfer that does not take into account the frequency-dependence of absorption by a gas. In the case of a grey stratosphere or atmosphere, the Eddington approximation can be used to calculate radiative fluxes. This approach focuses on the balance between the outgoing longwave radiation at the tropopause,, and the optical depth of water vapor, , in the tropopause, which is determined by the temperature and pressure at the tropopause according to the saturation vapor pressure. This balance is represented by the following equationsWhere the first equation represents the requirement for radiative equilibrium at the tropopause and the second equation represents how much water vapor is present at the tropopause. Taking the outgoing longwave radiation as a free parameter, these equations will intersect only once for a single value of the outgoing longwave radiation, this value is taken as the Komabayashi-Ingersoll limit. At that value the Stefan-Boltzmann feedback breaks down because the tropospheric temperature required to maintain the Komabayashi-Ingersoll OLR value results in a water vapor optical depth that blocks the OLR needed to cool the tropopause. The Simpson-Nakajima limit is lower than the Komabayashi-Ingersoll limit, and is thus typically more realistic for the value at which a planet enters a runaway greenhouse state. For example, given the parameters used to determine a Komabayashi-Ingersoll limit of 385 W/m2, the corresponding Simpson-Nakajima limit is only about 293 W/m2. The Simpson-Nakajima limit builds off of the derivation of the Komabayashi-Ingersoll limit by assuming a convective troposphere with a surface temperature and surface pressure that determines the optical depth and outgoing longwave radiation at the tropopause. The moist greenhouse limit Because the model used to derive the Simpson-Nakajima limit (a grey stratosphere in radiative equilibrium and a convecting troposphere) can determine the water concentration as a function of altitude, the model can also be used to determine the surface temperature (or conversely, amount of stellar flux) that results in a high water mixing ratio in the stratosphere. While this critical value of outgoing longwave radiation is less than the Simpson-Nakajima limit, it still has dramatic effects on a planet's climate. A high water mixing ratio in the stratosphere would overcome the effects of a cold trap and result in a \"moist\" stratosphere, which would result in the photolysis of water in the stratosphere that in turn would destroy the ozone layer and eventually lead to a dramatic loss of water through hydrodynamic escape. This climate state has been dubbed the moist greenhouse effect, as the end-state is a planet without water, though liquid water may exist on the planet's surface during this process. Connection to habitability The concept of a habitable zone has been used by planetary scientists and astrobiologists to define an orbital region around a star in which a planet (or moon) can sustain liquid water. Under this definition, the inner edge of the habitable zone (i.e., the closest point to a star that a planet can be until it can no longer sustain liquid water) is determined by the outgoing longwave radiation limit beyond which the runaway greenhouse process occurs (e.g., the Simpson-Nakajima limit). This is because a planet's distance from its host star determines the amount of stellar flux the planet receives, which in turn determines the amount of outgoing longwave radiation the planet radiates back to space. While the inner habitable zone is typically determined by using the Simpson-Nakajima limit, it can also be determined with respect to the moist greenhouse limit, though the difference between the two is often small. Calculating the inner edge of the habitable zone is strongly dependent on the model used to calculate the Simpson-Nakajima or moist greenhouse limit. The climate models used to calculate these limits have evolved over time, with some models assuming a simple one-dimensional, grey atmosphere, and others using a full radiative transfer solution to model the absorption bands of water and carbon dioxide. These earlier models that used radiative transfer derived the absorption coefficients for water from the HITRAN database, while newer models use the more current and accurate HITEMP database, which has led to different calculated values of thermal radiation limits. More accurate calculations have been done using three-dimensional climate models that take into account effects such as planetary rotation and local water mixing ratios as well as cloud feedbacks. The effect of clouds on calculating thermal radiation limits is still in debate (specifically, whether or not water clouds present a positive or negative feedback effect). Venus Venus' oceans may have boiled away in a runaway greenhouse effect. A runaway greenhouse effect involving carbon dioxide and water vapor may have occurred on Venus. In this scenario, early Venus may have had a global ocean if the outgoing thermal radiation was below the Simpson-Nakajima limit but above the moist greenhouse limit. As the brightness of the early Sun increased, the amount of water vapor in the atmosphere increased, increasing the temperature and consequently increasing the evaporation of the ocean, leading eventually to the situation in which the oceans boiled, and all of the water vapor entered the atmosphere. This scenario helps to explain why there is little water vapor in the atmosphere of Venus today. If Venus initially formed with water, the runaway greenhouse effect would have hydrated Venus' stratosphere, and the water would have escaped to space. Some evidence for this scenario comes from the extremely high deuterium to hydrogen ratio in Venus' atmosphere, roughly 150 times that of Earth, since light hydrogen would escape from the atmosphere more readily than its heavier isotope, deuterium.T.M. Donahue, J.H. Hoffmann, R.R. Hodges Jr, A.J. Watson, Venus was wet: a measurement of the ratio of deuterium to hydrogen, Science, 216 (1982), pp. 630\u2013633. De Bergh, B. B\u00e9zard, T. Owen, D. Crisp, J.-P. Maillard, B.L. Lutz, Deuterium on Venus\u2014observations from Earth, Science, 251 (1991), pp. 547\u2013549 Venus is sufficiently strongly heated by the Sun that water vapor can rise much higher in the atmosphere and be split into hydrogen and oxygen by ultraviolet light. The hydrogen can then escape from the atmosphere while the oxygen recombines or bonds to iron on the planet's surface. The deficit of water on Venus due to the runaway greenhouse effect is thought to explain why Venus does not exhibit surface features consistent with plate tectonics, meaning it would be a stagnant lid planet. Carbon dioxide, the dominant greenhouse gas in the current Venusian atmosphere, owes its larger concentration to the weakness of carbon recycling as compared to Earth, where the carbon dioxide emitted from volcanoes is efficiently subducted into the Earth by plate tectonics on geologic time scales through the carbonate-silicate cycle, which requires precipitation to function. Early investigations on the effect of atmospheric carbon dioxide levels on the runaway greenhouse limit found that it would take orders of magnitude higher amounts of carbon dioxide to take the Earth to a runaway greenhouse state. This is because carbon dioxide is not anywhere near as effective at blocking outgoing longwave radiation as water is. Within current models of the runaway greenhouse effect, carbon dioxide (especially anthropogenic carbon dioxide) does not seem capable of providing the necessary insulation for Earth to reach the Simpson-Nakajima limit. Atmosphere of Venus, an example of a runaway greenhouse effect Runaway climate change Greenhouse and icehouse Earth", "after_revision": "History While the term was coined by Caltech scientist Andrew Ingersoll in a paper that described a model of the atmosphere of Venus, the initial idea of a limit on terrestrial outgoing infrared radiation was published by George Simpson (meteorologist) in 1927. The physics relevant to the, later-termed, runaway greenhouse effect was explored by Makoto Komabayashi at Nagoya university. Assuming a water vapor-saturated stratosphere, Komabayashi and Ingersoll independently calculated the limit on outgoing infrared radiation that defines the runaway greenhouse state. The limit is now known as the Komabayashi\u2013Ingersoll limit to recognize their contributions. Physics of the runaway greenhouse 245x245px|Graph of tropopause optical depth by tropopause temperature, illustrating the Komabayashi\u2013Ingersoll limit of 385 W/m\u00b2 using equations and values from Nakajima et al. (1992) \"A Study on the Runaway Greenhouse Effect with a One-Dimensional Radiative\u2013Convective Equilibrium Model\". The Komabayashi\u2013Ingersoll limit is the value of outgoing longwave radiation (FIRtop) beyond which the lines do not intersect. The runaway greenhouse effect is often formulated in terms of how the surface temperature of a planet changes with differing amounts of received starlight. If the planet is assumed to be in radiative equilibrium, then the runaway greenhouse state is calculated as the equilibrium state at which water cannot exist in liquid form. The water vapor is then lost to space through hydrodynamic escape. In radiative equilibrium, a planet's outgoing longwave radiation (OLR) must balance the incoming stellar flux. The Stefan\u2013Boltzmann law is an example of a negative feedback that stabilizes a planet's climate system. If the Earth received more sunlight it would result in a temporary disequilibrium (more energy in than out) and result in warming. However, because the Stefan\u2013Boltzmann response mandates that this hotter planet emits more energy, eventually a new radiation balance can be reached and the temperature will be maintained at its new, higher value. Positive climate change feedbacks amplify changes in the climate system, and can lead to destabilizing effects for the climate. An increase in temperature from greenhouse gases leading to increased water vapor (which is itself a greenhouse gas) causing further warming is a positive feedback, but not a runaway effect, on Earth. Positive feedback effects are common (e.g. ice\u2013albedo feedback) but runaway effects do not necessarily emerge from their presence. Though water plays a major role in the process, the runaway greenhouse effect is not a result of water vapor feedback. The runaway greenhouse effect can be seen as a limit on a planet's outgoing longwave radiation that, when surpassed, results in a state where water cannot exist in its liquid form (hence, the oceans have all \"boiled away\"). A planet's outgoing longwave radiation is limited by this evaporated water, which is an effective greenhouse gas and blocks additional infrared radiation as it accumulates in the atmosphere. Assuming radiative equilibrium, runaway greenhouse limits on outgoing longwave radiation correspond to limits on the increase in stellar flux received by a planet to trigger the runaway greenhouse effect. Two limits on a planet's outgoing longwave radiation have been calculated that correspond with the onset of the runaway greenhouse effect: the Komabayashi\u2013Ingersoll limit and the Simpson\u2013Nakajima limit. At these values the runaway greenhouse effect overcomes the Stefan\u2013Boltzmann feedback so an increase in a planet's surface temperature will not increase the outgoing longwave radiation. The Komabayashi\u2013Ingersoll limit was the first to be analytically derived and only considers a grey stratosphere in radiative equilibrium. A grey stratosphere (or atmosphere) is an approach to modeling radiative transfer that does not take into account the frequency-dependence of absorption by a gas. In the case of a grey stratosphere or atmosphere, the Eddington approximation can be used to calculate radiative fluxes. This approach focuses on the balance between the outgoing longwave radiation at the tropopause,, and the optical depth of water vapor, , in the tropopause, which is determined by the temperature and pressure at the tropopause according to the saturation vapor pressure. This balance is represented by the following equationsWhere the first equation represents the requirement for radiative equilibrium at the tropopause and the second equation represents how much water vapor is present at the tropopause. Taking the outgoing longwave radiation as a free parameter, these equations will intersect only once for a single value of the outgoing longwave radiation, this value is taken as the Komabayashi\u2013Ingersoll limit. At that value the Stefan\u2013Boltzmann feedback breaks down because the tropospheric temperature required to maintain the Komabayashi\u2013Ingersoll OLR value results in a water vapor optical depth that blocks the OLR needed to cool the tropopause. The Simpson\u2013Nakajima limit is lower than the Komabayashi\u2013Ingersoll limit, and is thus typically more realistic for the value at which a planet enters a runaway greenhouse state. For example, given the parameters used to determine a Komabayashi\u2013Ingersoll limit of 385 W/m2, the corresponding Simpson\u2013Nakajima limit is only about 293 W/m2. The Simpson\u2013Nakajima limit builds off of the derivation of the Komabayashi\u2013Ingersoll limit by assuming a convective troposphere with a surface temperature and surface pressure that determines the optical depth and outgoing longwave radiation at the tropopause. The moist greenhouse limit Because the model used to derive the Simpson\u2013Nakajima limit (a grey stratosphere in radiative equilibrium and a convecting troposphere) can determine the water concentration as a function of altitude, the model can also be used to determine the surface temperature (or conversely, amount of stellar flux) that results in a high water mixing ratio in the stratosphere. While this critical value of outgoing longwave radiation is less than the Simpson\u2013Nakajima limit, it still has dramatic effects on a planet's climate. A high water mixing ratio in the stratosphere would overcome the effects of a cold trap and result in a \"moist\" stratosphere, which would result in the photolysis of water in the stratosphere that in turn would destroy the ozone layer and eventually lead to a dramatic loss of water through hydrodynamic escape. This climate state has been dubbed the moist greenhouse effect, as the end-state is a planet without water, though liquid water may exist on the planet's surface during this process. Connection to habitability The concept of a habitable zone has been used by planetary scientists and astrobiologists to define an orbital region around a star in which a planet (or moon) can sustain liquid water. Under this definition, the inner edge of the habitable zone (i.e., the closest point to a star that a planet can be until it can no longer sustain liquid water) is determined by the outgoing longwave radiation limit beyond which the runaway greenhouse process occurs (e.g., the Simpson\u2013Nakajima limit). This is because a planet's distance from its host star determines the amount of stellar flux the planet receives, which in turn determines the amount of outgoing longwave radiation the planet radiates back to space. While the inner habitable zone is typically determined by using the Simpson\u2013Nakajima limit, it can also be determined with respect to the moist greenhouse limit, though the difference between the two is often small. Calculating the inner edge of the habitable zone is strongly dependent on the model used to calculate the Simpson\u2013Nakajima or moist greenhouse limit. The climate models used to calculate these limits have evolved over time, with some models assuming a simple one-dimensional, grey atmosphere, and others using a full radiative transfer solution to model the absorption bands of water and carbon dioxide. These earlier models that used radiative transfer derived the absorption coefficients for water from the HITRAN database, while newer models use the more current and accurate HITEMP database, which has led to different calculated values of thermal radiation limits. More accurate calculations have been done using three-dimensional climate models that take into account effects such as planetary rotation and local water mixing ratios as well as cloud feedbacks. The effect of clouds on calculating thermal radiation limits is still in debate (specifically, whether or not water clouds present a positive or negative feedback effect). Venus Venus' oceans may have boiled away in a runaway greenhouse effect. A runaway greenhouse effect involving carbon dioxide and water vapor may have occurred on Venus. In this scenario, early Venus may have had a global ocean if the outgoing thermal radiation was below the Simpson\u2013Nakajima limit but above the moist greenhouse limit. As the brightness of the early Sun increased, the amount of water vapor in the atmosphere increased, increasing the temperature and consequently increasing the evaporation of the ocean, leading eventually to the situation in which the oceans boiled, and all of the water vapor entered the atmosphere. This scenario helps to explain why there is little water vapor in the atmosphere of Venus today. If Venus initially formed with water, the runaway greenhouse effect would have hydrated Venus' stratosphere, and the water would have escaped to space. Some evidence for this scenario comes from the extremely high deuterium to hydrogen ratio in Venus' atmosphere, roughly 150 times that of Earth, since light hydrogen would escape from the atmosphere more readily than its heavier isotope, deuterium.T.M. Donahue, J.H. Hoffmann, R.R. Hodges Jr, A.J. Watson, Venus was wet: a measurement of the ratio of deuterium to hydrogen, Science, 216 (1982), pp. 630\u2013633. De Bergh, B. B\u00e9zard, T. Owen, D. Crisp, J.-P. Maillard, B.L. Lutz, Deuterium on Venus\u2014observations from Earth, Science, 251 (1991), pp. 547\u2013549 Venus is sufficiently strongly heated by the Sun that water vapor can rise much higher in the atmosphere and be split into hydrogen and oxygen by ultraviolet light. The hydrogen can then escape from the atmosphere while the oxygen recombines or bonds to iron on the planet's surface. The deficit of water on Venus due to the runaway greenhouse effect is thought to explain why Venus does not exhibit surface features consistent with plate tectonics, meaning it would be a stagnant lid planet. Carbon dioxide, the dominant greenhouse gas in the current Venusian atmosphere, owes its larger concentration to the weakness of carbon recycling as compared to Earth, where the carbon dioxide emitted from volcanoes is efficiently subducted into the Earth by plate tectonics on geologic time scales through the carbonate\u2013silicate cycle, which requires precipitation to function. Early investigations on the effect of atmospheric carbon dioxide levels on the runaway greenhouse limit found that it would take orders of magnitude higher amounts of carbon dioxide to take the Earth to a runaway greenhouse state. This is because carbon dioxide is not anywhere near as effective at blocking outgoing longwave radiation as water is. Within current models of the runaway greenhouse effect, carbon dioxide (especially anthropogenic carbon dioxide) does not seem capable of providing the necessary insulation for Earth to reach the Simpson\u2013Nakajima limit. Atmosphere of Venus, an example of a runaway greenhouse effect Tipping points in the climate system Greenhouse and icehouse Earth", "edit_actions": [{"type": "R", "before": "Komabayashi-Ingersoll", "after": "Komabayashi\u2013Ingersoll", "start_char_pos": 600, "end_char_pos": 621}, {"type": "R", "before": "Komabayashi-Ingersoll", "after": "Komabayashi\u2013Ingersoll", "start_char_pos": 784, "end_char_pos": 805}, {"type": "R", "before": "Komabayashi-Ingersoll", "after": "Komabayashi\u2013Ingersoll", "start_char_pos": 989, "end_char_pos": 1010}, {"type": "R", "before": "Stefan-Boltzmann", "after": "Stefan\u2013Boltzmann", "start_char_pos": 1623, "end_char_pos": 1639}, {"type": "R", "before": "Stefan-Boltzmann", "after": "Stefan\u2013Boltzmann", "start_char_pos": 1876, "end_char_pos": 1892}, {"type": "R", "before": "ice-albedo", "after": "ice\u2013albedo", "start_char_pos": 2441, "end_char_pos": 2451}, {"type": "R", "before": "Komabayashi-Ingersoll", "after": "Komabayashi\u2013Ingersoll", "start_char_pos": 3411, "end_char_pos": 3432}, {"type": "R", "before": "Simpson-Nakajima", "after": "Simpson\u2013Nakajima", "start_char_pos": 3447, "end_char_pos": 3463}, {"type": "R", "before": "Stefan-Boltzmann", "after": "Stefan\u2013Boltzmann", "start_char_pos": 3531, "end_char_pos": 3547}, {"type": "R", "before": "Komabayashi-Ingersoll", "after": "Komabayashi\u2013Ingersoll", "start_char_pos": 3661, "end_char_pos": 3682}, {"type": "R", "before": "Komabayashi-Ingersoll", "after": "Komabayashi\u2013Ingersoll", "start_char_pos": 4768, "end_char_pos": 4789}, {"type": "R", "before": "Stefan-Boltzmann", "after": "Stefan\u2013Boltzmann", "start_char_pos": 4815, "end_char_pos": 4831}, {"type": "R", "before": "Komabayashi-Ingersoll", "after": "Komabayashi\u2013Ingersoll", "start_char_pos": 4915, "end_char_pos": 4936}, {"type": "R", "before": "Simpson-Nakajima", "after": "Simpson\u2013Nakajima", "start_char_pos": 5041, "end_char_pos": 5057}, {"type": "R", "before": "Komabayashi-Ingersoll", "after": "Komabayashi\u2013Ingersoll", "start_char_pos": 5082, "end_char_pos": 5103}, {"type": "R", "before": "Komabayashi-Ingersoll", "after": "Komabayashi\u2013Ingersoll", "start_char_pos": 5269, "end_char_pos": 5290}, {"type": "R", "before": "Simpson-Nakajima", "after": "Simpson\u2013Nakajima", "start_char_pos": 5328, "end_char_pos": 5344}, {"type": "R", "before": "Simpson-Nakajima", "after": "Simpson\u2013Nakajima", "start_char_pos": 5379, "end_char_pos": 5395}, {"type": "R", "before": "Komabayashi-Ingersoll", "after": "Komabayashi\u2013Ingersoll", "start_char_pos": 5438, "end_char_pos": 5459}, {"type": "R", "before": "Simpson-Nakajima", "after": "Simpson\u2013Nakajima", "start_char_pos": 5700, "end_char_pos": 5716}, {"type": "R", "before": "Simpson-Nakajima", "after": "Simpson\u2013Nakajima", "start_char_pos": 6105, "end_char_pos": 6121}, {"type": "R", "before": "Simpson-Nakajima", "after": "Simpson\u2013Nakajima", "start_char_pos": 7168, "end_char_pos": 7184}, {"type": "R", "before": "Simpson-Nakajima", "after": "Simpson\u2013Nakajima", "start_char_pos": 7477, "end_char_pos": 7493}, {"type": "R", "before": "Simpson-Nakajima", "after": "Simpson\u2013Nakajima", "start_char_pos": 7731, "end_char_pos": 7747}, {"type": "R", "before": "Simpson-Nakajima", "after": "Simpson\u2013Nakajima", "start_char_pos": 8940, "end_char_pos": 8956}, {"type": "R", "before": "carbonate-silicate", "after": "carbonate\u2013silicate", "start_char_pos": 10907, "end_char_pos": 10925}, {"type": "R", "before": "Simpson-Nakajima", "after": "Simpson\u2013Nakajima", "start_char_pos": 11520, "end_char_pos": 11536}, {"type": "R", "before": "Runaway climate change", "after": "Tipping points in the climate system", "start_char_pos": 11607, "end_char_pos": 11629}], "sents_char_pos": [0, 261, 387, 569, 661, 984, 1110, 1266, 1440, 1507, 1618, 1723, 1854, 2068, 2196, 2397, 2528, 2647, 2871, 3062, 3267, 3470, 3656, 3794, 3957, 4078, 4348, 4584, 4796, 5036, 5214, 5374, 5635, 6030, 6181, 6493, 6676, 6889, 7192, 7408, 7624, 7774, 8028, 8294, 8491, 8663, 8736, 8833, 9000, 9301, 9398, 9550, 9799, 9958, 10004, 10267, 10386, 10595, 10974, 11205, 11323, 11543]}
+{"doc_id": "35520462", "revision_depth": "1", "before_revision": "William Schwing Patout, III (October 15, 1932 \u2013 August 5, 2017), also known as Billy Patout, was a sugar baron from New Iberia, Louisiana. Background Patout was the oldest son of William S. Patout, Jr. (1908\u20131991), and the former Hester Catherine Bernadas (1911\u20131982). When Patout was eight years of age , his family moved to Patoutville in Iberia Parish, where he developed his interest in the sugar industry , as had his family for nearly two centuries earlier. In his autobiography entitled Now You Know, he describes some of the childhood adventures that occurred while he lived on a sugar plantation. While the book is disjointed, contrived from letters that Patout wrote, certain sections transport the reader back to a different time. An excerpt:%DIFDELCMD < %DIFDELCMD < %%% Personal life From 1954 to 1955, Patout served in the United States Navy. He married Susan Ann Crawford of Indiana in 1971, and together they reared seven children: William Schwing, IV, Rivers Martin, Avrill Elizabeth, Catherine Josephine, Hester Caroline, Susan Anne Marie, and Simeon Crawford. There are seventeen grandchildren and three great grandchildren. His main hobby was aviation. He died at the age of 84 on August 5, 2017. A Roman Catholic, he is entombed at St. Nicholas Cemetery in Patoutville. Business%DIFDELCMD < %DIFDELCMD < %%% After studying Agricultural Engineering at Louisiana State University in Baton Rouge and sugar technology and business management in Hawaii , Patout began his career with the M. A. Patout Company in 1956. He worked there as an assistant engineer for three years before moving on to become an engineer for Brewer & Co. in Honolulu , Hawaii, from 1959 to 1960. He moved from company to company to gain work experience before settling back with his family's company from 1970 until 2001. He started as an assistant general manager and worked his way up to president and chief executive officer /general manager . The years between 1960 and 1970 he spent in the following positions: 1960\u20131961: chief engineer of Olokele Sugar Company, C. Brewer Co., Kauai, Hawaii 1961\u20131962: associate, Vought Consulting Engineers, Paincourtville in Assumption Parish 1962\u20131963: project engineer, Cinclare Sugar Factory, Brusly in West Baton Rouge Parish, Louisiana 1963\u20131965: administrative agricultural engineer, M.A. Patout , Patoutville, Louisiana 1965\u20131969: chief engineer, Grove Farm, Kauai, Hawaii 1969\u20131970: assistant general manager, Haitian American Sugar, Port-au-Prince, Haiti. Patout is credited with having kept M. A. Patout afloat during his tenure : despite drought, crop disease, hurricanes, freezes, low sugar prices, and the loss of land because of pressure from residential and commercial developments, Patout was able to expand the company. He acquired Sterling Sugars, Inc., from former Governor Mike Foster and Raceland Sugars. He increased the sugar-growing acreage from 12,000 to 56,000. Perhaps Patout's greatest accomplishment was leading his flagship factory , the Enterprise mill in Patoutville , to become the first and only factory to mill two million tons of cane and be the only cane diffuser operating in North America. Patout sat on the board of M. A. Patout and was a consultant for sugar businesses around the world. He advised many nations, including the People's Republic of China, the United States Department of Commerce, and private companies in Jamaica and Mexico. Patout saw the following changes occur in the sugar industry since 1956: Steam turbines replaced steam engines on the milling tandems Diffusers replaced milling tandems Continuous vacuum pans replaced batch pans Shredders replaced two-roll crushers New vertical crystallizers replaced horizontal crystallizers. Patout argued that biomass, bioplastic, renewable energy and cellulose ethanol could boost the U.S. sugar industry. M. A. Patout In addition to M. A. Patout, Patout was involved with: American Sugar Cane League, an interest group which seeks to direct agricultural and manufacturing research and impact legislation in Louisiana and in Washington D.C.; director, 1974\u20131999, and past president, 1997\u20131999 Western Sugar Producers (represented Bayou Teche sugar factories): past president, 1974\u20131975; received the league's President's Award in 2000. Sugar Processing Research Institute (worked with United States Department of Agriculture): member, 1990\u20132001; past president, 1999\u20132001 Agro-Flex (non-profit whose goal was to bring more agricultural business to Louisiana): past president, 1975\u20131975 In 1997, he became a board member of the First National Bank of Jeanerette .", "after_revision": "William Schwing Patout, III (October 15, 1932 \u2013 August 5, 2017), was an American businessman and agricultural engineer from New Iberia, Louisiana. Early life and education Patout was the oldest son of William S. Patout, Jr. (1908\u20131991), and the former Hester Catherine Bernadas (1911\u20131982). When Patout was eight years old , his family moved to Patoutville in Iberia Parish, where he developed his interest in the sugar industry %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% . Patout earned a Bachelor of Science degree in Agricultural Engineering from Louisiana State University . Career After graduating from college , Patout began his career with the M. A. Patout Company in 1956. He worked there as an assistant engineer for three years before moving on to become an engineer for Brewer & Co. in Honolulu from 1959 to 1960. He moved from company to company to gain work experience before rejoining his family's company in 1970. He started as an assistant general manager and worked his way up to president and chief executive officer . Patout is credited with having kept M. A. Patout afloat during his tenure . Despite drought, crop disease, hurricanes, freezes, low sugar prices, and the loss of land because of pressure from residential and commercial developments, Patout was able to expand the company. He acquired Sterling Sugars, Inc., from former Governor Mike Foster and Raceland Sugars. He increased the sugar-growing acreage from 12,000 to 56,000. Under Patout's leadership , the Enterprise mill in Patoutville became the first and only factory to mill two million tons of cane , and was the only cane diffuser operating in North America. Patout sat on the board of M. A. Patout and was a consultant for sugar businesses around the world. He advised China on the country's sugar industry and was also served as an advisor to the United States Department of Commerce, in addition to private companies in Jamaica and Mexico. M. A. Patout In addition to M. A. Patout, Patout was involved with: American Sugar Cane League, an interest group which seeks to direct agricultural and manufacturing research and impact legislation in Louisiana and in Washington D.C.; director, 1974\u20131999, and past president, 1997\u20131999 Western Sugar Producers (represented Bayou Teche sugar factories): past president, 1974\u20131975; received the league's President's Award in 2000. Sugar Processing Research Institute (worked with United States Department of Agriculture): member, 1990\u20132001; past president, 1999\u20132001 Agro-Flex (non-profit whose goal was to bring more agricultural business to Louisiana): past president, 1975\u20131975 In 1997, he became a board member of the First National Bank of Jeanerette . Personal life From 1954 to 1955, Patout served in the United States Navy. He married Susan Ann Crawford of Indiana in 1971, and the couple had seven children. At the time of his death, Patout had seventeen grandchildren and three great-grandchildren. Patout died in Lafayette, Louisiana at the age of 84 on August 5, 2017. A Roman Catholic, he is entombed at St. Nicholas Cemetery in Patoutville .", "edit_actions": [{"type": "R", "before": "also known as Billy Patout, was a sugar baron", "after": "was an American businessman and agricultural engineer", "start_char_pos": 65, "end_char_pos": 110}, {"type": "R", "before": "Background", "after": "Early life and education", "start_char_pos": 139, "end_char_pos": 149}, {"type": "R", "before": "of age", "after": "old", "start_char_pos": 297, "end_char_pos": 303}, {"type": "D", "before": ", as had his family for nearly two centuries earlier.", "after": null, "start_char_pos": 410, "end_char_pos": 463}, {"type": "D", "before": "In his autobiography entitled Now You Know, he describes some of the childhood adventures that occurred while he lived on a sugar plantation. While the book is disjointed, contrived from letters that Patout wrote, certain sections transport the reader back to a different time. An excerpt:", "after": null, "start_char_pos": 464, "end_char_pos": 753}, {"type": "D", "before": "Personal life From 1954 to 1955, Patout served in the United States Navy. He married Susan Ann Crawford of Indiana in 1971, and together they reared seven children: William Schwing, IV, Rivers Martin, Avrill Elizabeth, Catherine Josephine, Hester Caroline, Susan Anne Marie, and Simeon Crawford. There are seventeen grandchildren and three great grandchildren. His main hobby was aviation. He died at the age of 84 on August 5, 2017. A Roman Catholic, he is entombed at St. Nicholas Cemetery in Patoutville.", "after": null, "start_char_pos": 783, "end_char_pos": 1290}, {"type": "D", "before": "Business", "after": null, "start_char_pos": 1291, "end_char_pos": 1299}, {"type": "R", "before": "After studying Agricultural Engineering at", "after": ". Patout earned a Bachelor of Science degree in Agricultural Engineering from", "start_char_pos": 1329, "end_char_pos": 1371}, {"type": "R", "before": "in Baton Rouge and sugar technology and business management in Hawaii", "after": ".", "start_char_pos": 1399, "end_char_pos": 1468}, {"type": "A", "before": null, "after": "Career After graduating from college", "start_char_pos": 1469, "end_char_pos": 1469}, {"type": "D", "before": ", Hawaii,", "after": null, "start_char_pos": 1660, "end_char_pos": 1669}, {"type": "R", "before": "settling back with", "after": "rejoining", "start_char_pos": 1753, "end_char_pos": 1771}, {"type": "R", "before": "from 1970 until 2001.", "after": "in 1970.", "start_char_pos": 1793, "end_char_pos": 1814}, {"type": "D", "before": "/general manager", "after": null, "start_char_pos": 1921, "end_char_pos": 1937}, {"type": "D", "before": "The years between 1960 and 1970 he spent in the following positions: 1960\u20131961: chief engineer of Olokele Sugar Company, C. Brewer", "after": null, "start_char_pos": 1940, "end_char_pos": 2070}, {"type": "D", "before": "Co., Kauai, Hawaii 1961\u20131962: associate, Vought Consulting Engineers, Paincourtville in Assumption Parish 1962\u20131963: project engineer, Cinclare Sugar Factory, Brusly in West Baton Rouge Parish, Louisiana 1963\u20131965: administrative agricultural engineer, M.A. Patout , Patoutville, Louisiana 1965\u20131969: chief engineer, Grove Farm, Kauai, Hawaii 1969\u20131970: assistant general manager, Haitian American Sugar, Port-au-Prince, Haiti.", "after": null, "start_char_pos": 2071, "end_char_pos": 2498}, {"type": "R", "before": ": despite", "after": ". Despite", "start_char_pos": 2573, "end_char_pos": 2582}, {"type": "R", "before": "Perhaps", "after": "Under", "start_char_pos": 2922, "end_char_pos": 2929}, {"type": "R", "before": "greatest accomplishment was leading his flagship factory", "after": "leadership", "start_char_pos": 2939, "end_char_pos": 2995}, {"type": "R", "before": ", to become", "after": "became", "start_char_pos": 3033, "end_char_pos": 3044}, {"type": "R", "before": "and be", "after": ", and was", "start_char_pos": 3105, "end_char_pos": 3111}, {"type": "R", "before": "many nations, including the People's Republic of China,", "after": "China on the country's sugar industry and was also served as an advisor to", "start_char_pos": 3274, "end_char_pos": 3329}, {"type": "R", "before": "and", "after": "in addition to", "start_char_pos": 3372, "end_char_pos": 3375}, {"type": "D", "before": "Patout saw the following changes occur in the sugar industry since 1956: Steam turbines replaced steam engines on the milling tandems Diffusers replaced milling tandems Continuous vacuum pans replaced batch pans Shredders replaced two-roll crushers New vertical crystallizers replaced horizontal crystallizers.", "after": null, "start_char_pos": 3417, "end_char_pos": 3727}, {"type": "D", "before": "Patout argued that biomass, bioplastic, renewable energy and cellulose ethanol could boost the U.S. sugar industry.", "after": null, "start_char_pos": 3728, "end_char_pos": 3843}, {"type": "A", "before": null, "after": ".", "start_char_pos": 4599, "end_char_pos": 4599}, {"type": "A", "before": null, "after": "Personal life From 1954 to 1955, Patout served in the United States Navy. He married Susan Ann Crawford of Indiana in 1971, and the couple had seven children. At the time of his death, Patout had seventeen grandchildren and three great-grandchildren. Patout died in Lafayette, Louisiana at the age of 84 on August 5, 2017. A Roman Catholic, he is entombed at St. Nicholas Cemetery in Patoutville", "start_char_pos": 4600, "end_char_pos": 4600}], "sents_char_pos": [0, 138, 268, 463, 605, 741, 856, 1078, 1143, 1172, 1216, 1256, 1290, 1507, 1534, 1688, 1814, 1939, 2008, 2498, 2537, 2770, 2859, 2921, 3162, 3192, 3262, 3416, 3727, 3843, 3874, 4079, 4224, 4273, 4383]}
+{"doc_id": "3588332", "revision_depth": "1", "before_revision": "Meshadi Aziz-bey oghlu Azizbekov , also spelled Azizbeyov (; ; January 6, 1876 - September 20, 1918) was a Soviet revolutionary of Azerbaijani origin, leader of the revolutionary movement in Azerbaijan, one of the first Azeri Marxists, Provincial Commissioner and Deputy People's Commissar of Internal Affairs, gubernial commissar for Baku.Muslim National Communism in the Soviet Union: A Revolutionary Strategy for the Colonial World by Alexandre A. Bennigsen, S. Enders Wimbush He was one of the 26 Baku Commissars. Azizbekov became a member of Russian Social Democratic Labour Party and one of the leaders of Muslim Social Democratic Party. After the October Revolution he joined the Baku Comissars. As the Baku Commune was voted out of power in July 1918, Azizbekov and rest of the Commissars abandoned Baku and fled across the Caspian Sea. However they were captured by anti-Soviet forces. On the night of September 20, Azizbekov was executed by a firing squad in a remote location between the stations of Pereval and Akhcha-Kuyma on the Trans-Caspian railway. Currently the views on Azizbekov are mixed. Azerbaijani nationalism, the ruling New Azerbaijan Party as well as the main opposition parties Musavat and APFP don't see Azizbekov as a positive figure.Criticism on Meshadi Azizbekov 's political views by Maharram Zulfuqarli - SalamInfo Though Azerbaijan Communist Party and many other local left-wing politicians and sees Azizbekov as an important, notable and positive figure in the history of Azerbaijan. Early life 240px|thumbnail|Building in Baku, where Azizbekov was born Soviet sources claimed that he was born into the family of bricklayers but according to the grandson of Meshadi; Mehdi Azizbekov his grandfather was born into a family of noblemen and Meshadi 's father was close friends with Zeynalabdin Taghiyev but he was executed during the rule of Tsarist Russian Empire. Meshadi finished secondary school in Baku in 1896 and moved to St. Petersburg to enter civil engineering school. He joined the Russian Social Democratic Party in 1898, and took part in student movements. In 1899 he entered the St. Petersburg Technological Institute and graduated in as an electrical engineer. He was fluent in Russian and German languages. Azizbekov was the member of \u0130ctimaiyyun-amiyyun (Mujaheed) party in Iran, also chosen for Baku State Duma at that time. During the Iranian revolution of 1908-10 he had been to Iran for support in terms of literature and weaponry. In 1909 he was chosen as the head of the organization called \"Help for Iranian Revolution\" in Baku. He was invited to Rasht and Anzali for revolutionary works.Life of Meshadi Azizbekov , by Mamed Kaziyev, 1976. He personally knew Sattar Khan. Azerbaijan 250px| Azizbekov , along with the other members of Hummet organization included Mammad Amin Rasulzade, who would later turn out to be a Musavatist. He played a very active role for the establishment National Drama Theater of Azerbaijan (Academy National Drama Theater was named after him for a short time) and also contributed to the construction of Shollar water in Baku, as a financial supporter and as an engineer. During his job in Elektrichiskaya Sila he tried to stop the Azerbaijani-Armanian ethnic clashes. In 1906, he created the war \"drujina\" in Baku called Bayra\u011fi-n\u00fcsr\u0259t (Flag of the Glory). Then he played role in the publishment of the Bolshevik papers called Devet-Qoch and Priziv. He became the co-head of the cultural-educative society of Nijat and opened a new place to help the poor population of Baku. In 1914 he participated and actively supported the protest of Baku industrial workers.Azerbaijan Democratic Republic Encyclopedia First Part. Page on Azizbekov . Jalil Mammadguluzadeh gave the first publication of Molla Nasraddin to Azizbekov for his contributions to education in Azerbaijan at that time. Baku Commissars and Death thumbnail|Funeral of 26 Baku Commissars in 1920 (crying women are mother of the Mir Hasan Vezirov). After the 1917 revolution, he was elected to the Baku Commune. In March, he began participation in Hummet organizations. In April, he became part of the bureau of the Muslim Social Party in Baku. He continued similar activities for the rest of the year. He was one of the 26 Baku Commissars of the Soviet Commune that was established in the city after the October Revolution. According to the grandson of Meshadi ; during March Days Meshadi was responsible of Shamakhi district and he saved the large part of population from the mass killings of Dashnaks as he believed the poor village population can not be dangerous to the revolution. Azizbekov was friends with Mammad Amin Rasulzade in the early 1900s when he was also the member of Hummet organization. When the Commune was toppled by the Centro Caspian Dictatorship, a British-backed coalition of Dashnaks, SRs and Mensheviks, Azizbekov and his comrades were captured by British troops and executed by firing squad between the stations of Pereval and Akhcha-Kuyma of the Transcaucasian Railroad. Azizbekov , along with other Baku Comissars were buried with a huge ceremony in the center of Baku. In January 2009, the Baku authorities began the demolition of the city's 26 Commissars Memorial commemorating the 26 Commissars. The monument itself had been fenced-off since July 2008. The remains of the commissars were reburied at Hovsan Cemetery on 26 January 2009, with participation of Muslim, Jewish and Christian clergy who conducted religious ceremonies. The dismantling was opposed by some local left-wingers and by the Azerbaijan Communist Party (1993) in particular. During the reburial not any information have been given to the family of Meshadi Azizbekov while his family were wanting Azizbekov to be reburied in the graveyard of Suvelan right to the grave of his mother. Currently in the graveyard it's impossible to recognize the which grave belongs to Meshadi Azizbekov.Is Meshadi Azizbekov removing from the history? - Musavat article Personal life Meshadi was married with the daughter of millionaire of the era Zarbaliyev and he had four children; Aslan, Beyimkhanum, Safura and Aziz who later became Major-General Quartermaster Service.Generally Azerba\u012ddzhana: katalog by Naila Valikhanli. 2005. His granddaughter Pustekhanum wrote number of books about her grandfather. His wife Khanum Azizbekova became the chairman of the first women club in 1919 organized by the oil magnate Shamsi Asadullayev. She was also active in the magazine \u015e\u0259rq qad\u0131n\u0131 (Woman of East), which takes a notable part in the history of women in Azerbaijan. The grandsson of his uncle's son Janibek Azizbekov was killed during the First Nagorno-Karabakh War. Legacy In Soviet Union, Azizbekov was portrayed as one of the fallen heroes of Russian Revolution. The first historical narrative in Azerbaijani literature, Komissar, by writer Mehdi Huseyn, features Azizbekov as the main character. In cinema, he was portrayed in 26 Commissars (, 1933), Morning (, 1960, by Azeri actor Nodar \u015ea\u015f\u0131qo\u011flu), an adaptation of Komissar, and 26 Baku Commissars! (, 1966, by Azeri actor M\u0259lik Dada\u015fov). He, along with other Baku Commissars was subject to many films, documentaries, novels and poems of the Soviet Union, notably the 26-lar by Samed Vurgun, the novels Fighting City and Mysterious Baku by Mammad Said Ordubadi, also works of Nikolai Tikhonov, Nairi Zarian, Suleyman Rustam, Yeghishe Charents, Mikayil Mushfig, Vasily Kamensky, Paolo Iashvili, Semyon Kirsanov, Mirvarid Dilbazi, and Sergey Yesenin.26 Baku Commissars in the Literature, A. Y. Yerevanli, 1960. The towns of Vayk, Aregnadem and Zarritap, all in Armenia were officially named Azizbekov during Soviet era. Busts of him in metro station in Georgia and one of the central parks of Armenia, monument and metro station in Azerbaijan were removed during the last decades. Khazar raion was officially called Azizbekov until 2010. The street named after him in Turkmenistan was changed in recent years as well. However still an avenue, street in Baku, villages in Goygol and Goranboy regions of Azerbaijan, a city in the Nakhichevan Autonomous Republic is officially called Azizbekov . There are streets named after him in Kazakhstan (Almaty, Taraz), Russia (Volgograd, Astrakhan), Tajikistan (Dushanbe), Ukraine (Kryvyi Rih, Donetsk), and Uzbekistan (Jizzakh). There's an alleyway in Magaramkent (Dagestan) named after him. External links Monument to Meshadi Azizbekov in Baku Encyclopaedia / People at www.bakupages.com Bio Russian Cultural Anthropology After the Collapse of Communism. Yerevan memory and forgetting in the organization of post-Soviet urban space by Levon Abrahamian, p. 240", "after_revision": "Mashadi Azizbey oghlu Azizbeyov , also spelled Azizbeyov (; ; January 6, 1876 - September 20, 1918) was a Soviet revolutionary of Azerbaijani origin, leader of the revolutionary movement in Azerbaijan, one of the first Azeri Marxists, Provincial Commissioner and Deputy People's Commissar of Internal Affairs, gubernial commissar for Baku.Muslim National Communism in the Soviet Union: A Revolutionary Strategy for the Colonial World by Alexandre A. Bennigsen, S. Enders Wimbush He was one of the 26 Baku Commissars. Azizbeyov became a member of Russian Social Democratic Labour Party and one of the leaders of Muslim Social Democratic Party. After the October Revolution he joined the Baku Comissars. As the Baku Commune was voted out of power in July 1918, Azizbeyov and rest of the Commissars abandoned Baku and fled across the Caspian Sea. However they were captured by anti-Soviet forces. On the night of September 20, Azizbeyov was executed by a firing squad in a remote location between the stations of Pereval and Akhcha-Kuyma on the Trans-Caspian railway. Currently the views on Azizbeyov are mixed. Azerbaijani nationalism, the ruling New Azerbaijan Party as well as the main opposition parties Musavat and APFP don't see Azizbeyov as a positive figure.Criticism on Mashadi Azizbeyov 's political views by Maharram Zulfuqarli - SalamInfo Though Azerbaijan Communist Party and many other local left-wing politicians and sees Azizbeyov as an important, notable and positive figure in the history of Azerbaijan. Early life 240px|thumbnail|Building in Baku, where Azizbeyov was born Soviet sources claimed that he was born into the family of bricklayers but according to the grandson of Mashadi; Mehdi Azizbeyov his grandfather was born into a family of noblemen and Mashadi 's father was close friends with Zeynalabdin Taghiyev but he was executed during the rule of Tsarist Russian Empire. Mashadi finished secondary school in Baku in 1896 and moved to St. Petersburg to enter civil engineering school. He joined the Russian Social Democratic Party in 1898, and took part in student movements. In 1899 he entered the St. Petersburg Technological Institute and graduated in as an electrical engineer. He was fluent in Russian and German languages. Azizbeyov was the member of \u0130ctimaiyyun-amiyyun (Mujaheed) party in Iran, also chosen for Baku State Duma at that time. During the Iranian revolution of 1908-10 he had been to Iran for support in terms of literature and weaponry. In 1909 he was chosen as the head of the organization called \"Help for Iranian Revolution\" in Baku. He was invited to Rasht and Anzali for revolutionary works.Life of Mashadi Azizbeyov , by Mamed Kaziyev, 1976. He personally knew Sattar Khan. Azerbaijan 250px| Azizbeyov , along with the other members of Hummet organization included Mammad Amin Rasulzade, who would later turn out to be a Musavatist. He played a very active role for the establishment National Drama Theater of Azerbaijan (Academy National Drama Theater was named after him for a short time) and also contributed to the construction of Shollar water in Baku, as a financial supporter and as an engineer. During his job in Elektrichiskaya Sila he tried to stop the Azerbaijani-Armanian ethnic clashes. In 1906, he created the war \"drujina\" in Baku called Bayra\u011fi-n\u00fcsr\u0259t (Flag of the Glory). Then he played role in the publishment of the Bolshevik papers called Devet-Qoch and Priziv. He became the co-head of the cultural-educative society of Nijat and opened a new place to help the poor population of Baku. In 1914 he participated and actively supported the protest of Baku industrial workers.Azerbaijan Democratic Republic Encyclopedia First Part. Page on Azizbeyov . Jalil Mammadguluzadeh gave the first publication of Molla Nasraddin to Azizbeyov for his contributions to education in Azerbaijan at that time. Baku Commissars and Death thumbnail|Funeral of 26 Baku Commissars in 1920 (crying women are mother of the Mir Hasan Vezirov). After the 1917 revolution, he was elected to the Baku Commune. In March, he began participation in Hummet organizations. In April, he became part of the bureau of the Muslim Social Party in Baku. He continued similar activities for the rest of the year. He was one of the 26 Baku Commissars of the Soviet Commune that was established in the city after the October Revolution. According to the grandson of Mashadi ; during March Days Mashadi was responsible of Shamakhi district and he saved the large part of population from the mass killings of Dashnaks as he believed the poor village population can not be dangerous to the revolution. Azizbeyov was friends with Mammad Amin Rasulzade in the early 1900s when he was also the member of Hummet organization. When the Commune was toppled by the Centro Caspian Dictatorship, a British-backed coalition of Dashnaks, SRs and Mensheviks, Azizbeyov and his comrades were captured by British troops and executed by firing squad between the stations of Pereval and Akhcha-Kuyma of the Transcaucasian Railroad. Azizbeyov , along with other Baku Comissars were buried with a huge ceremony in the center of Baku. In January 2009, the Baku authorities began the demolition of the city's 26 Commissars Memorial commemorating the 26 Commissars. The monument itself had been fenced-off since July 2008. The remains of the commissars were reburied at Hovsan Cemetery on 26 January 2009, with participation of Muslim, Jewish and Christian clergy who conducted religious ceremonies. The dismantling was opposed by some local left-wingers and by the Azerbaijan Communist Party (1993) in particular. During the reburial not any information have been given to the family of Mashadi Azizbeyov while his family were wanting Azizbeyov to be reburied in the graveyard of Suvelan right to the grave of his mother. Currently in the graveyard it's impossible to recognize the which grave belongs to Mashadi Azizbeyov.Is Mashadi Azizbeyov removing from the history? - Musavat article Personal life Mashadi was married with the daughter of millionaire of the era Zarbaliyev and he had four children; Aslan, Beyimkhanum, Safura and Aziz who later became Major-General Quartermaster Service.Generally Azerba\u012ddzhana: katalog by Naila Valikhanli. 2005. His granddaughter Pustekhanum wrote number of books about her grandfather. His wife Khanum Azizbeyova became the chairman of the first women club in 1919 organized by the oil magnate Shamsi Asadullayev. She was also active in the magazine \u015e\u0259rq qad\u0131n\u0131 (Woman of East), which takes a notable part in the history of women in Azerbaijan. The grandsson of his uncle's son Janibek Azizbeyov was killed during the First Nagorno-Karabakh War. Legacy In Soviet Union, Azizbeyov was portrayed as one of the fallen heroes of Russian Revolution. The first historical narrative in Azerbaijani literature, Komissar, by writer Mehdi Huseyn, features Azizbeyov as the main character. In cinema, he was portrayed in 26 Commissars (, 1933), Morning (, 1960, by Azeri actor Nodar \u015ea\u015f\u0131qo\u011flu), an adaptation of Komissar, and 26 Baku Commissars! (, 1966, by Azeri actor M\u0259lik Dada\u015fov). He, along with other Baku Commissars was subject to many films, documentaries, novels and poems of the Soviet Union, notably the 26-lar by Samed Vurgun, the novels Fighting City and Mysterious Baku by Mammad Said Ordubadi, also works of Nikolai Tikhonov, Nairi Zarian, Suleyman Rustam, Yeghishe Charents, Mikayil Mushfig, Vasily Kamensky, Paolo Iashvili, Semyon Kirsanov, Mirvarid Dilbazi, and Sergey Yesenin.26 Baku Commissars in the Literature, A. Y. Yerevanli, 1960. The towns of Vayk, Aregnadem and Zarritap, all in Armenia were officially named Azizbeyov during Soviet era. Busts of him in metro station in Georgia and one of the central parks of Armenia, monument and metro station in Azerbaijan were removed during the last decades. Khazar raion was officially called Azizbeyov until 2010. The street named after him in Turkmenistan was changed in recent years as well. However still an avenue, street in Baku, villages in Goygol and Goranboy regions of Azerbaijan, a city in the Nakhichevan Autonomous Republic is officially called Azizbeyov . There are streets named after him in Kazakhstan (Almaty, Taraz), Russia (Volgograd, Astrakhan), Tajikistan (Dushanbe), Ukraine (Kryvyi Rih, Donetsk), and Uzbekistan (Jizzakh). There's an alleyway in Magaramkent (Dagestan) named after him. External links Monument to Mashadi Azizbeyov in Baku Encyclopaedia / People at www.bakupages.com Bio Russian Cultural Anthropology After the Collapse of Communism. Yerevan memory and forgetting in the organization of post-Soviet urban space by Levon Abrahamian, p. 240", "edit_actions": [{"type": "R", "before": "Meshadi Aziz-bey oghlu Azizbekov", "after": "Mashadi Azizbey oghlu Azizbeyov", "start_char_pos": 0, "end_char_pos": 32}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 518, "end_char_pos": 527}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 760, "end_char_pos": 769}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 925, "end_char_pos": 934}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 1089, "end_char_pos": 1098}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 1233, "end_char_pos": 1242}, {"type": "R", "before": "Meshadi Azizbekov", "after": "Mashadi Azizbeyov", "start_char_pos": 1277, "end_char_pos": 1294}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 1435, "end_char_pos": 1444}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 1571, "end_char_pos": 1580}, {"type": "R", "before": "Meshadi; Mehdi Azizbekov", "after": "Mashadi; Mehdi Azizbeyov", "start_char_pos": 1694, "end_char_pos": 1718}, {"type": "R", "before": "Meshadi", "after": "Mashadi", "start_char_pos": 1774, "end_char_pos": 1781}, {"type": "R", "before": "Meshadi", "after": "Mashadi", "start_char_pos": 1899, "end_char_pos": 1906}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 2256, "end_char_pos": 2265}, {"type": "R", "before": "Meshadi Azizbekov", "after": "Mashadi Azizbeyov", "start_char_pos": 2653, "end_char_pos": 2670}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 2747, "end_char_pos": 2756}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 3712, "end_char_pos": 3721}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 3795, "end_char_pos": 3804}, {"type": "R", "before": "Meshadi", "after": "Mashadi", "start_char_pos": 4399, "end_char_pos": 4406}, {"type": "R", "before": "Meshadi", "after": "Mashadi", "start_char_pos": 4427, "end_char_pos": 4434}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 4632, "end_char_pos": 4641}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 4877, "end_char_pos": 4886}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 5046, "end_char_pos": 5055}, {"type": "R", "before": "Meshadi Azizbekov", "after": "Mashadi Azizbeyov", "start_char_pos": 5697, "end_char_pos": 5714}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 5745, "end_char_pos": 5754}, {"type": "R", "before": "Meshadi Azizbekov.Is Meshadi Azizbekov", "after": "Mashadi Azizbeyov.Is Mashadi Azizbeyov", "start_char_pos": 5915, "end_char_pos": 5953}, {"type": "R", "before": "Meshadi", "after": "Mashadi", "start_char_pos": 6013, "end_char_pos": 6020}, {"type": "R", "before": "Azizbekova", "after": "Azizbeyova", "start_char_pos": 6354, "end_char_pos": 6364}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 6638, "end_char_pos": 6647}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 6722, "end_char_pos": 6731}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 6898, "end_char_pos": 6907}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 7677, "end_char_pos": 7686}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 7902, "end_char_pos": 7911}, {"type": "R", "before": "Azizbekov", "after": "Azizbeyov", "start_char_pos": 8167, "end_char_pos": 8176}, {"type": "R", "before": "Meshadi Azizbekov", "after": "Mashadi Azizbeyov", "start_char_pos": 8445, "end_char_pos": 8462}], "sents_char_pos": [0, 60, 340, 517, 643, 702, 844, 894, 1065, 1109, 1264, 1519, 1702, 1898, 1965, 2011, 2102, 2129, 2208, 2255, 2375, 2485, 2585, 2645, 2696, 2728, 2887, 3157, 3254, 3343, 3436, 3561, 3648, 3703, 3867, 3993, 4056, 4114, 4189, 4247, 4369, 4408, 4631, 4751, 5045, 5145, 5274, 5331, 5508, 5623, 5831, 5933, 6113, 6203, 6256, 6337, 6465, 6596, 6697, 6796, 6930, 7126, 7536, 7596, 7705, 7866, 7923, 8003, 8178, 8354, 8417, 8581]}
+{"doc_id": "36002299", "revision_depth": "1", "before_revision": "Benjamin Peary Pal or B.P. Pal FRS (26 May 1909 \u2013 14 September 1996 ) was an Indian Canadian American plant breeder and chemistry worker who served as a scientist in Thomas Edison State University in New Jersey, USA. He was Awarded the Nobel Prize for Chemistry in 1977 He worked on wheat genetics and breeding but was also known for his interest in rose varieties. He worked in Toronto (1932 - 1944) and Treonton (1945 - 1996). His life was a combination of dignity, courtesy, compassion and love of beauty. He was a scientist\u2019s scientist and through his dedication and scientific innovations earned the respect and admiration of not only fellow professionals but also political leaders and the general public, particularly farm men and women. In science, he was one of the earliest to demonstrate the value of heterosis breeding in a self- pollinated cereal like wheat. This was the forerunner of similar work in rice, which ultimately led to the commercialization of hybrid rice in China. In the 1930s he launched a search for new genes in wheat and potato in order to achieve pyramiding of genes for resistance/tolerance to a broad spectrum of biotic and abiotic stresses in these in Chemistry. He was the one who invented Plant Medicine. that work was published in 1947. He did his studies in Liverpool. He got a letter to go to Liverpool. Early Life and Education Pal was born in Calcutta , the youngest child of Dr Rala Ram Pal and Inder Devi. The family came from Calcutta but his father moved to Burma as a medical officer. He was born Brahma Das Pal but changed his name to Benjamin Peary Pal while at Calcutta High School in Calcutta in 1924. A rose garden at the school may have inspired his early interest in them. He completed his Bachelor of Science and Master of Science degrees at Rangoon University, with a study on Burmese Charophyta for his master's. He then went for his doctoral studies at the University of Liverpool under Rowland Biffen and later Frank Engledow, studying hybrid vigour in wheat. University of Liverpool He then worked as a rice research officer in England in 1932. He did work there and thinking. Sometimes, Biffen didn't Undestand his work, but turns out it was great. He passed his degrees there in Liverpool . During times there. He had to go to the Science Lavatory in Liverpool for proves like Srinivasa Ramanujan had to do proves in mathematics and Subrahmanyan Chandrasekhar had to do proves to Arthur Eddington in Science. Carrer Toronto, Canada In 1932, Pal moved to Canada and met Herbert Marshall McLuhan. They did projects to and met. He worked at Toronto University. He spent 12 years there in Canada. In Canada was not much. He also worked in a Lavatory in Toronto University. His other degrees was in Canada%DIFDELCMD < %DIFDELCMD < %%% Trenton, USA In Trenton, he was working in Thomas Edison State University in New Jersey. He made the Plat Medicine. He met with James Waddell Alexander II as his boss. The scientist he met was Horace M. Trent. He did lot of great chemistry work. He mostly had doctoral students there in Trenton, New Jersey. He mostly worked in New Jersey. Same in Liverpool and Toronto, he sometimes worked in a Science Lavatory. Awards and honours He was elected a Fellow of the Royal Society (FRS) in 1972. He was a bachelor and donated his property to Thomas Edison State University . Awarded the Padma Shri in 1959, Awarded Padma Bhushan in 1968 A rose garden in from the library at the Indian Agricultural Research Institute is named in his honour . In 1977, he was awarded the Nobel Prize for Chemistry with Ilya Prigogine%DIFDELCMD < %DIFDELCMD < %%% Death Pal died on 14 September, 1996 at the age 87 in Trenton, New Jersey .", "after_revision": "Benjamin Peary Pal or B.P. Pal FRS (26 May 1906 \u2013 14 September 1989 ) was an Indian plant breeder and agronomist who served as a director of the Indian Agricultural Research Institute in Delhi and as the first Director General of the Indian Council of Agricultural Research. He worked on wheat genetics and breeding but was also known for his interest in rose varieties. Biography Pal was born in Mukandpur , the youngest child of Dr Rala Ram and Inder Devi. The family came from Jalandhar but his father moved to Burma as a medical officer. He was born Brahma Das Pal but changed his name to Benjamin Peary Pal while at St Michael's School in Maymo in 1914. A rose garden at the school may have inspired his early interest in them. He completed his Bachelor of Science and Master of Science degrees at Rangoon University, with a study on Burmese Charophyta for his master's. He then went for his doctoral studies at the University of Cambridge under Rowland Biffen and later Frank Engledow, studying hybrid vigour in wheat. He then worked as a rice research officer in Burma in 1932 and then moved to Pusa in Bihar as a second economic botanist. He became an Imperial Economic Botanist at the Imperial Agricultural Research Institute in 1937. In 1936, the institute moved to New Delhi following an earthquake. He moved there and became the director of the institute in September 1950. He became the first director general of the newly reorganized Indian Council for Agricultural Research in 1965 and worked there until his retirement in 1972. Pal worked on rust resistance in wheats and helped release several varieties . %DIFDELCMD < %DIFDELCMD < %%% Awards and honours He was elected a Fellow of the Royal Society (FRS) in 1972. He was a bachelor and donated his property to the Indian Council of Agricultural Research . Awarded the Padma Shri in 1959, Awarded Padma Bhushan in 1968 A rose garden in from the library at the Indian Agricultural Research Institute is named in his honour %DIFDELCMD < %DIFDELCMD < %%% .", "edit_actions": [{"type": "R", "before": "1909", "after": "1906", "start_char_pos": 43, "end_char_pos": 47}, {"type": "R", "before": "1996", "after": "1989", "start_char_pos": 63, "end_char_pos": 67}, {"type": "D", "before": "Canadian American", "after": null, "start_char_pos": 84, "end_char_pos": 101}, {"type": "R", "before": "chemistry worker", "after": "agronomist", "start_char_pos": 120, "end_char_pos": 136}, {"type": "R", "before": "scientist in Thomas Edison State University in New Jersey, USA. He was Awarded the Nobel Prize for Chemistry in 1977 He", "after": "director of the Indian Agricultural Research Institute in Delhi and as the first Director General of the Indian Council of Agricultural Research. He", "start_char_pos": 153, "end_char_pos": 272}, {"type": "D", "before": "He worked in Toronto (1932 - 1944) and Treonton (1945 - 1996). His life was a combination of dignity, courtesy, compassion and love of beauty. He was a scientist\u2019s scientist and through his dedication and scientific innovations earned the respect and admiration of not only fellow professionals but also political leaders and the general public, particularly farm men and women. In science, he was one of the earliest to demonstrate the value of heterosis breeding in a self- pollinated cereal like wheat. This was the forerunner of similar work in rice, which ultimately led to the commercialization of hybrid rice in China. In the 1930s he launched a search for new genes in wheat and potato in order to achieve pyramiding of genes for resistance/tolerance to a broad spectrum of biotic and abiotic stresses in these in Chemistry. He was the one who invented Plant Medicine. that work was published in 1947. He did his studies in Liverpool. He got a letter to go to Liverpool.", "after": null, "start_char_pos": 366, "end_char_pos": 1344}, {"type": "R", "before": "Early Life and Education", "after": "Biography", "start_char_pos": 1345, "end_char_pos": 1369}, {"type": "R", "before": "Calcutta", "after": "Mukandpur", "start_char_pos": 1386, "end_char_pos": 1394}, {"type": "D", "before": "Pal", "after": null, "start_char_pos": 1431, "end_char_pos": 1434}, {"type": "R", "before": "Calcutta", "after": "Jalandhar", "start_char_pos": 1472, "end_char_pos": 1480}, {"type": "R", "before": "Calcutta High School in Calcutta in 1924.", "after": "St Michael's School in Maymo in 1914.", "start_char_pos": 1612, "end_char_pos": 1653}, {"type": "R", "before": "Liverpool", "after": "Cambridge", "start_char_pos": 1930, "end_char_pos": 1939}, {"type": "D", "before": "University of Liverpool", "after": null, "start_char_pos": 2020, "end_char_pos": 2043}, {"type": "R", "before": "England in 1932. He did work there and thinking. Sometimes, Biffen didn't Undestand his work, but turns out it was great. He passed his degrees there in Liverpool", "after": "Burma in 1932 and then moved to Pusa in Bihar as a second economic botanist. He became an Imperial Economic Botanist at the Imperial Agricultural Research Institute in 1937. In 1936, the institute moved to New Delhi following an earthquake. He moved there and became the director of the institute in September 1950. He became the first director general of the newly reorganized Indian Council for Agricultural Research in 1965 and worked there until his retirement in 1972. Pal worked on rust resistance in wheats and helped release several varieties", "start_char_pos": 2089, "end_char_pos": 2251}, {"type": "D", "before": "During times there. He had to go to the Science Lavatory in Liverpool for proves like Srinivasa Ramanujan had to do proves in mathematics and Subrahmanyan Chandrasekhar had to do proves to Arthur Eddington in Science.", "after": null, "start_char_pos": 2254, "end_char_pos": 2471}, {"type": "D", "before": "Carrer Toronto, Canada In 1932, Pal moved to Canada and met Herbert Marshall McLuhan. They did projects to and met. He worked at Toronto University. He spent 12 years there in Canada. In Canada was not much. He also worked in a Lavatory in Toronto University. His other degrees was in Canada", "after": null, "start_char_pos": 2472, "end_char_pos": 2763}, {"type": "D", "before": "Trenton, USA In Trenton, he was working in Thomas Edison State University in New Jersey. He made the Plat Medicine. He met with James Waddell Alexander II as his boss. The scientist he met was Horace M. Trent. He did lot of great chemistry work. He mostly had doctoral students there in Trenton, New Jersey. He mostly worked in New Jersey. Same in Liverpool and Toronto, he sometimes worked in a Science Lavatory.", "after": null, "start_char_pos": 2793, "end_char_pos": 3206}, {"type": "R", "before": "Thomas Edison State University", "after": "the Indian Council of Agricultural Research", "start_char_pos": 3332, "end_char_pos": 3362}, {"type": "D", "before": ".", "after": null, "start_char_pos": 3530, "end_char_pos": 3531}, {"type": "D", "before": "In 1977, he was awarded the Nobel Prize for Chemistry with Ilya Prigogine", "after": null, "start_char_pos": 3532, "end_char_pos": 3605}, {"type": "D", "before": "Death Pal died on 14 September, 1996 at the age 87 in Trenton, New Jersey", "after": null, "start_char_pos": 3635, "end_char_pos": 3708}], "sents_char_pos": [0, 365, 428, 508, 744, 871, 991, 1198, 1275, 1308, 1344, 1450, 1532, 1653, 1727, 1870, 2019, 2105, 2137, 2210, 2253, 2273, 2471, 2557, 2587, 2620, 2655, 2679, 2731, 2881, 2908, 2960, 3002, 3038, 3100, 3132, 3206, 3285, 3364, 3531]}
+{"doc_id": "36256068", "revision_depth": "1", "before_revision": "Pauline Dixon is a Professor of International Development and Education at Newcastle University in North East England. She is the Research Director of the E.G. West Centre at the University and Degree Programme Director of the Masters in International Development and Education . Publications ' Dixon, P., Humble, S., and Counihan, C. (2015) Eds., Handbook of International Development and Education, Cheltenham UK and MA, USA, Edward Elgar. Dixon P, Schagen I, Seedhouse P. The impact of an intervention on children's reading and spelling ability in low-income schools in India. School Effectiveness and School Improvement 2011, 22(4), 461\u2013482. Dixon P, Woolner P. Quantitative data analysis: Using SPSS. In: Briggs, A; Coleman, M; Morrison, M, ed. Research Methods in Educational Leadership and Management. London: Sage, 2012, pp. 340\u2013362. Dixon P, Marshall P. International Aid and Educating the Poorest. London, UK: Centre Forum, 2011.%DIFDELCMD < %DIFDELCMD < %%% Tooley J, Bao Y, Dixon P, Merrifield J. School Choice and Academic Performance: Some Evidence From Developing Countries. Journal of School Choice: Research, Theory, and Reform 2011, 5(1), 1\u201339. Dixon P, Tooley J. A Case Study of Private Schools in Kibera: An Update. Educational Management Administration%DIFDELCMD < & %%% Leadership'' 2012,. Burgess MJ, Dixon P. A Comparative Study of School Effectiveness in Aguablanca, Colombia. Educational Management Administration and Leadership 2012, 40(3), 362\u2013375.%DIFDELCMD < %DIFDELCMD < %%% Dixon P, Tooley J. Revolution at the grassroots in developing countries: Implications for School Choice in America. In: Forster, G., Thompson, C.B, ed. Freedom and School Choice in American Education. New York: Palgrave Macmillan, 2011, pp. 111\u2013128. Dixon P. Private Schools for the Poor: A Little Nurturing and Support goes a very long way. In: Leube, K.R, ed. Economics, Politics, Philosophy, and the Arts: Essays in Honor of H.S.H. Prince Philipp of Liechtenstein. Schaan, Switzerland: Buchzentrum Lichtenstein Alpenland Verlag AG, 2011.%DIFDELCMD < %DIFDELCMD < %%% Tooley J, Dixon P, Gomathi SV. A rejoinder to Sarangapani and Winch. Oxford Review of Education 2010, 36(4), 517\u2013520. Dixon P. RTE Act%DIFDELCMD < & %%% Private School Regulation. Policy Review Series 2010. Delhi, India: Centre for Civil Society, 4. Tooley J, Dixon P, Shamsan Y, Schagen I. The relative quality and cost-effectiveness of private and public schools for low-income families: a case study in a developing country. School Effectiveness and School Improvement 2010, 21(2), 117\u2013144.%DIFDELCMD < %DIFDELCMD < %%% Dixon P. Delivering Better Education : A Market for Schools. In: Prince Michael of Liechtenstein and Kurt R. Leube, ed. 2068 Twentysixtyeight%DIFDELCMD < ]%%% . Liechtenstein: Industrie Und Finanzkontor, 2008, pp. 150\u2013159. Tooley J, Dixon P, Stanfield J. Impact of free primary education in Kenya: A case study of private schools in Kibera. Educational Management, Administration%DIFDELCMD < & %%% Leadership 2008, 36(4), 449\u2013469. Tooley J, Dixon P. La Educacion Privada es Beneficiosa Para Los Pobres. Guatemala: Universidad Francisco Marroquin, 2007.%DIFDELCMD < %DIFDELCMD < %%% Tooley J, Dixon P, Amuah I. Private and public schooling in Ghana: A census and comparative survey. International Review of Education 2007, 53(4), 389\u2013415. Tooley J, Dixon P. Private Education for Low Income Families: Results from a Global Research Project. In: Srivastava, P; Walford, G, ed. Private Schooling in Less Economically Developed Countries: Asian and African Perspectives. Didcot, UK: Symposium Books, 2007, pp. 15\u201339.%DIFDELCMD < %DIFDELCMD < %%% Tooley J, Dixon P. Private schooling for low-income families: A census and comparative survey in East Delhi, India. International Journal of Educational Development 2007, 27(2), 205\u2013219. Tooley J, Dixon P, Gomathi SV. Private schools and the millennium development goal of universal primary education: A census and comparative survey in Hyderabad, India. Oxford Review of Education 2007, 33(5), 539\u2013560.%DIFDELCMD < %DIFDELCMD < %%% Tooley J, Qang L, Dixon P. Private Schools for the Poor in Gansu Province, China \u8a79\u59c6\u65af\u2022\u675c\u529b\uff0c\u5218\u5f3a\uff0c\u548c\u9c8d\u73b2\u2022\u72c4\u91d1\u68ee.(\u5df2\u63a5\u53d7). \u4e2d\u56fd\u7518\u8083\u7701\u519c\u6751\u5730\u533a\u4e3a\u4f4e\u6536\u5165\u5bb6\u5ead\u670d\u52a1\u7684\u6c11\u529e\u5b66\u6821. \u5317\u4eac\uff1a\u6bd4\u8f83\u6559\u80b2\u7814\u7a76\u6742\u5fd7. Journal of Comparative Education Research 2007. Tooley J, Dixon P. 'De facto' privatisation of education and the poor: Implications of a study from sub-Saharan Africa and India. Compare 2006, 36(4), 443\u2013462.%DIFDELCMD < %DIFDELCMD < %%% Tooley J, Dixon P. Educacion Privada Y Pobreza: Un estudio de las escuelas privadas que sirven en paises de bajos ingresos. Lima, Peru:UPC,2006. Tooley J, Dixon P. Los fracasos de la educaci\u00f3n p\u00fablica en los pa\u00edses en desarrollo y la respuesta popular. In:Miles, M., Homes, K. R., O\u2019Grady, M. A., ed. Indice de Libertad Economica.Washington DC:The Heritage Foundation and Wall Street Journal,2006, pp. 29\u201339.%DIFDELCMD < %DIFDELCMD < %%% Tooley J, Dixon P. Los fracasos de la educacion publica y la respuesta popular. Perspectiva 2006, (9), 22\u201327. Tooley J, Dixon P. The Failures of State Schooling in Developing Countries and the People's Response. In: Miles, M., Homes, K.R., O'Grady M.A., ed. Index of Economic Freedom: The Link Between Economic Opportunity and Prosperity. Washington, DC, USA: The Heritage Foundation and Wall Street Journal, 2006, pp. 27\u201337.%DIFDELCMD < %DIFDELCMD < %%% Tooley J, Dixon P. An inspector calls: The regulation of 'budget' private schools in Hyderabad, Andhra Pradesh, India. International Journal of Educational Development 2005, 25(3), 269\u2013285. Tooley J, Dixon P. Is there a conflict between commercial gain and concern for the poor? Evidence from private schools for the poor in India and Nigeria. Economic Affairs 2005, 25(2), 20\u201326.%DIFDELCMD < %DIFDELCMD < %%% Tooley J, Dixon P, Olaniyan O. Private and public schooling in low-income areas of Lagos State, Nigeria: A census and comparative survey. International Journal of Educational Research 2005, 43(3), 125\u2013146. Tooley J, Dixon P. Private Education is Good for the Poor \u2013 a study of private schools serving the poor in low-income countries. Washington DC: CATO Institute, 2005.%DIFDELCMD < %DIFDELCMD < %%% Tooley J, Dixon P. Private Schools Serving the Poor: A study from Delih, India. New Delhi:Centre for Civil Society,2005. Dixon P, Tooley J. The regulation of private schools serving low-income families in Andhra Pradesh, India. Review of Austrian Economics 2005, 18(1), 29\u201354.%DIFDELCMD < %DIFDELCMD < %%% Dixon P. The regulation of private schools serving low-income families in Hyderabad, India: An Austrian economic perspective. Economic Affairs 2004, 24(4), 31\u201336.%DIFDELCMD < %DIFDELCMD < %%% Tooley J, Dixon P, Stanfield J. Delivering Better Education: market solutions to education. London: Adam Smith Institute, 2003. Adam Smith Institute Better Education Project 1902737407.%DIFDELCMD < %DIFDELCMD < %%% Mitra S, Tooley JN, Inamdar P, Dixon P. Improving English pronunciation: an automated instructional approach. Information Technologies and International Development 2003, 1(1), 75\u201384.%DIFDELCMD < %DIFDELCMD < %%% Tooley J, Dixon P. Providing Education to the World's poor: A case study of the private sector in India. In: Davies, B., West-Burnham, J, ed. The Handbook of Educational Leadership and Management. London, UK: Pearson Education, 2003, pp. 342\u2013354.%DIFDELCMD < %DIFDELCMD < %%% Tooley J, Dixon P. Private schools for the poor: A case study from India. Reading: CfBT, 2002.%DIFDELCMD < %DIFDELCMD < %%% Craven B, Dixon P, Steward G, Tooley J. HIV and Aids in Schools: The political economy of pressure groups and miseducation. London, UK: Institute of Economic Affairs, 2001.", "after_revision": "Pauline Dixon is a Professor of International Development and Education at Newcastle University in North East England. She is the Co-Director of the Global Challenges Academy and the Newcastle University Lead for the Global Challenges Summit. She is the PI for the Women in Development Network and is currently a Co-Investigator on the Water and Sanitation Hub funded by UKRI GCRF . Publications '' ' Dixon, P., Humble, S., and Counihan, C. (2015) Eds., Handbook of International Development and Education, Cheltenham UK and MA, USA, Edward Elgar. Dixon P, Schagen I, Seedhouse P. The impact of an intervention on children's reading and spelling ability in low-income schools in India. School Effectiveness and School Improvement 2011, 22(4), 461\u2013482. %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < & %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < & %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < ]%%% %DIFDELCMD < & %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "R", "before": "Research Director of the E.G. West Centre at the University and Degree Programme Director of the Masters in International Development and Education", "after": "Co-Director of the Global Challenges Academy and the Newcastle University Lead for the Global Challenges Summit. She is the PI for the Women in Development Network and is currently a Co-Investigator on the Water and Sanitation Hub funded by UKRI GCRF", "start_char_pos": 130, "end_char_pos": 277}, {"type": "A", "before": null, "after": "''", "start_char_pos": 293, "end_char_pos": 293}, {"type": "D", "before": "Dixon P, Woolner P. Quantitative data analysis: Using SPSS. In: Briggs, A; Coleman, M; Morrison, M, ed. Research Methods in Educational Leadership and Management. London: Sage, 2012, pp. 340\u2013362.", "after": null, "start_char_pos": 647, "end_char_pos": 842}, {"type": "D", "before": "Dixon P, Marshall P. International Aid and Educating the Poorest. London, UK: Centre Forum, 2011.", "after": null, "start_char_pos": 843, "end_char_pos": 940}, {"type": "D", "before": "Tooley J, Bao Y, Dixon P, Merrifield J. School Choice and Academic Performance: Some Evidence From Developing Countries. Journal of School Choice: Research, Theory, and Reform 2011, 5(1), 1\u201339.", "after": null, "start_char_pos": 970, "end_char_pos": 1163}, {"type": "D", "before": "Dixon P, Tooley J. A Case Study of Private Schools in Kibera: An Update. Educational Management Administration", "after": null, "start_char_pos": 1164, "end_char_pos": 1274}, {"type": "D", "before": "Leadership'' 2012,.", "after": null, "start_char_pos": 1293, "end_char_pos": 1312}, {"type": "D", "before": "Burgess MJ, Dixon P. A Comparative Study of School Effectiveness in Aguablanca, Colombia. Educational Management Administration and Leadership 2012, 40(3), 362\u2013375.", "after": null, "start_char_pos": 1313, "end_char_pos": 1477}, {"type": "D", "before": "Dixon P, Tooley J. Revolution at the grassroots in developing countries: Implications for School Choice in America. In: Forster, G., Thompson, C.B, ed. Freedom and School Choice in American Education. New York: Palgrave Macmillan, 2011, pp. 111\u2013128.", "after": null, "start_char_pos": 1507, "end_char_pos": 1756}, {"type": "D", "before": "Dixon P. Private Schools for the Poor: A Little Nurturing and Support goes a very long way. In: Leube, K.R, ed. Economics, Politics, Philosophy, and the Arts: Essays in Honor of H.S.H. Prince Philipp of Liechtenstein. Schaan, Switzerland: Buchzentrum Lichtenstein Alpenland Verlag AG, 2011.", "after": null, "start_char_pos": 1757, "end_char_pos": 2047}, {"type": "D", "before": "Tooley J, Dixon P, Gomathi SV. A rejoinder to Sarangapani and Winch. Oxford Review of Education 2010, 36(4), 517\u2013520.", "after": null, "start_char_pos": 2077, "end_char_pos": 2194}, {"type": "D", "before": "Dixon P. RTE Act", "after": null, "start_char_pos": 2195, "end_char_pos": 2211}, {"type": "D", "before": "Private School Regulation. Policy Review Series 2010. Delhi, India: Centre for Civil Society, 4.", "after": null, "start_char_pos": 2230, "end_char_pos": 2326}, {"type": "D", "before": "Tooley J, Dixon P, Shamsan Y, Schagen I. The relative quality and cost-effectiveness of private and public schools for low-income families: a case study in a developing country. School Effectiveness and School Improvement 2010, 21(2), 117\u2013144.", "after": null, "start_char_pos": 2327, "end_char_pos": 2570}, {"type": "D", "before": "Dixon P. Delivering Better Education : A Market for Schools. In: Prince Michael of Liechtenstein and Kurt R. Leube, ed. 2068", "after": null, "start_char_pos": 2600, "end_char_pos": 2724}, {"type": "D", "before": "Twentysixtyeight", "after": null, "start_char_pos": 2725, "end_char_pos": 2741}, {"type": "D", "before": ". Liechtenstein: Industrie Und Finanzkontor, 2008, pp. 150\u2013159.", "after": null, "start_char_pos": 2759, "end_char_pos": 2822}, {"type": "D", "before": "Tooley J, Dixon P, Stanfield J. Impact of free primary education in Kenya: A case study of private schools in Kibera. Educational Management, Administration", "after": null, "start_char_pos": 2823, "end_char_pos": 2979}, {"type": "D", "before": "Leadership 2008, 36(4), 449\u2013469.", "after": null, "start_char_pos": 2998, "end_char_pos": 3030}, {"type": "D", "before": "Tooley J, Dixon P. La Educacion Privada es Beneficiosa Para Los Pobres. Guatemala: Universidad Francisco Marroquin, 2007.", "after": null, "start_char_pos": 3031, "end_char_pos": 3152}, {"type": "D", "before": "Tooley J, Dixon P, Amuah I. Private and public schooling in Ghana: A census and comparative survey. International Review of Education 2007, 53(4), 389\u2013415.", "after": null, "start_char_pos": 3182, "end_char_pos": 3337}, {"type": "D", "before": "Tooley J, Dixon P. Private Education for Low Income Families: Results from a Global Research Project. In: Srivastava, P; Walford, G, ed. Private Schooling in Less Economically Developed Countries: Asian and African Perspectives. Didcot, UK: Symposium Books, 2007, pp. 15\u201339.", "after": null, "start_char_pos": 3338, "end_char_pos": 3612}, {"type": "D", "before": "Tooley J, Dixon P. Private schooling for low-income families: A census and comparative survey in East Delhi, India. International Journal of Educational Development 2007, 27(2), 205\u2013219.", "after": null, "start_char_pos": 3642, "end_char_pos": 3828}, {"type": "D", "before": "Tooley J, Dixon P, Gomathi SV. Private schools and the millennium development goal of universal primary education: A census and comparative survey in Hyderabad, India. Oxford Review of Education 2007, 33(5), 539\u2013560.", "after": null, "start_char_pos": 3829, "end_char_pos": 4045}, {"type": "D", "before": "Tooley J, Qang L, Dixon P. Private Schools for the Poor in Gansu Province, China \u8a79\u59c6\u65af\u2022\u675c\u529b\uff0c\u5218\u5f3a\uff0c\u548c\u9c8d\u73b2\u2022\u72c4\u91d1\u68ee.(\u5df2\u63a5\u53d7). \u4e2d\u56fd\u7518\u8083\u7701\u519c\u6751\u5730\u533a\u4e3a\u4f4e\u6536\u5165\u5bb6\u5ead\u670d\u52a1\u7684\u6c11\u529e\u5b66\u6821. \u5317\u4eac\uff1a\u6bd4\u8f83\u6559\u80b2\u7814\u7a76\u6742\u5fd7. Journal of Comparative Education Research 2007.", "after": null, "start_char_pos": 4075, "end_char_pos": 4265}, {"type": "D", "before": "Tooley J, Dixon P. 'De facto' privatisation of education and the poor: Implications of a study from sub-Saharan Africa and India. Compare 2006, 36(4), 443\u2013462.", "after": null, "start_char_pos": 4266, "end_char_pos": 4425}, {"type": "D", "before": "Tooley J, Dixon P. Educacion Privada Y Pobreza: Un estudio de las escuelas privadas que sirven en paises de bajos ingresos. Lima, Peru:UPC,2006.", "after": null, "start_char_pos": 4455, "end_char_pos": 4599}, {"type": "D", "before": "Tooley J, Dixon P. Los fracasos de la educaci\u00f3n p\u00fablica en los pa\u00edses en desarrollo y la respuesta popular. In:Miles, M., Homes, K. R., O\u2019Grady, M. A., ed. Indice de Libertad Economica.Washington DC:The Heritage Foundation and Wall Street Journal,2006, pp. 29\u201339.", "after": null, "start_char_pos": 4600, "end_char_pos": 4863}, {"type": "D", "before": "Tooley J, Dixon P. Los fracasos de la educacion publica y la respuesta popular. Perspectiva 2006, (9), 22\u201327.", "after": null, "start_char_pos": 4893, "end_char_pos": 5002}, {"type": "D", "before": "Tooley J, Dixon P. The Failures of State Schooling in Developing Countries and the People's Response. In: Miles, M., Homes, K.R., O'Grady M.A., ed. Index of Economic Freedom: The Link Between Economic Opportunity and Prosperity. Washington, DC, USA: The Heritage Foundation and Wall Street Journal, 2006, pp. 27\u201337.", "after": null, "start_char_pos": 5003, "end_char_pos": 5318}, {"type": "D", "before": "Tooley J, Dixon P. An inspector calls: The regulation of 'budget' private schools in Hyderabad, Andhra Pradesh, India. International Journal of Educational Development 2005, 25(3), 269\u2013285.", "after": null, "start_char_pos": 5348, "end_char_pos": 5537}, {"type": "D", "before": "Tooley J, Dixon P. Is there a conflict between commercial gain and concern for the poor? Evidence from private schools for the poor in India and Nigeria. Economic Affairs 2005, 25(2), 20\u201326.", "after": null, "start_char_pos": 5538, "end_char_pos": 5728}, {"type": "D", "before": "Tooley J, Dixon P, Olaniyan O. Private and public schooling in low-income areas of Lagos State, Nigeria: A census and comparative survey. International Journal of Educational Research 2005, 43(3), 125\u2013146.", "after": null, "start_char_pos": 5758, "end_char_pos": 5963}, {"type": "D", "before": "Tooley J, Dixon P. Private Education is Good for the Poor \u2013 a study of private schools serving the poor in low-income countries. Washington DC: CATO Institute, 2005.", "after": null, "start_char_pos": 5964, "end_char_pos": 6129}, {"type": "D", "before": "Tooley J, Dixon P. Private Schools Serving the Poor: A study from Delih, India. New Delhi:Centre for Civil Society,2005. Dixon P, Tooley J. The regulation of private schools serving low-income families in Andhra Pradesh, India. Review of Austrian Economics 2005, 18(1), 29\u201354.", "after": null, "start_char_pos": 6159, "end_char_pos": 6435}, {"type": "D", "before": "Dixon P. The regulation of private schools serving low-income families in Hyderabad, India: An Austrian economic perspective. Economic Affairs 2004, 24(4), 31\u201336.", "after": null, "start_char_pos": 6465, "end_char_pos": 6627}, {"type": "D", "before": "Tooley J, Dixon P, Stanfield J. Delivering Better Education: market solutions to education. London: Adam Smith Institute, 2003. Adam Smith Institute Better Education Project 1902737407.", "after": null, "start_char_pos": 6657, "end_char_pos": 6842}, {"type": "D", "before": "Mitra S, Tooley JN, Inamdar P, Dixon P. Improving English pronunciation: an automated instructional approach. Information Technologies and International Development 2003, 1(1), 75\u201384.", "after": null, "start_char_pos": 6872, "end_char_pos": 7055}, {"type": "D", "before": "Tooley J, Dixon P. Providing Education to the World's poor: A case study of the private sector in India. In: Davies, B., West-Burnham, J, ed. The Handbook of Educational Leadership and Management. London, UK: Pearson Education, 2003, pp. 342\u2013354.", "after": null, "start_char_pos": 7085, "end_char_pos": 7331}, {"type": "D", "before": "Tooley J, Dixon P. Private schools for the poor: A case study from India. Reading: CfBT, 2002.", "after": null, "start_char_pos": 7361, "end_char_pos": 7455}, {"type": "D", "before": "Craven B, Dixon P, Steward G, Tooley J. HIV and Aids in Schools: The political economy of pressure groups and miseducation. London, UK: Institute of Economic Affairs, 2001.", "after": null, "start_char_pos": 7485, "end_char_pos": 7657}], "sents_char_pos": [0, 118, 442, 475, 580, 646, 721, 733, 809, 842, 863, 908, 940, 1090, 1163, 1236, 1312, 1333, 1402, 1477, 1622, 1658, 1707, 1756, 1848, 1974, 2047, 2107, 2145, 2194, 2256, 2283, 2367, 2504, 2570, 2608, 2660, 2822, 2940, 3030, 3049, 3102, 3152, 3281, 3337, 3439, 3458, 3474, 3566, 3612, 3757, 3828, 3996, 4045, 4174, 4204, 4217, 4265, 4395, 4425, 4578, 4599, 4618, 4707, 4785, 4911, 4972, 5002, 5021, 5104, 5231, 5366, 5466, 5537, 5556, 5626, 5691, 5728, 5895, 5963, 6092, 6129, 6238, 6279, 6386, 6473, 6590, 6627, 6748, 6784, 6842, 6911, 6981, 7055, 7189, 7226, 7281, 7331, 7434, 7455, 7608]}
+{"doc_id": "37353977", "revision_depth": "1", "before_revision": "thumbnail|Neighboring British Fort Komenda and Dutch Fort Vredenburgh in Komenda The Komenda Wars were a series of wars from 1694 until 1700 largely between the Dutch West India Company and the British Royal African Company in the Eguafo Kingdom in the present day state of Ghana, over trade rights. The Dutch were trying to keep the British out of the region to maintain a trade monopoly while the British were attempting to re-establish a fort in the city of Komenda. The fighting included forces of the Dutch West India Company, the Royal African Company, the Eguafo Kingdom, a prince of the kingdom attempting to rise to the throne, the forces of a powerful merchant named John Cabess, other Akan tribes and kingdoms like Twifo and Denkyira. There were four separate periods of warfare, including a civil war in the Eguafo Kingdom, and the wars ended with the British placing Takyi Kuma into power in Eguafo. Because of the rapidly shifting alliances between European and African powers, historian John Thornton has found that \"there is no finer example of [the] complicated combination of European rivalry merging with African rivalry than the Komenda Wars.\" Preceding conditions The Dutch West India Company (WIC) and the Eguafo Kingdom engaged in an earlier set of hostilities in 1688. The Dutch and the British had both established factories in the port city of Komenda. In 1687, the French negotiated with the king of Eguafo to open a factory in Komenda and the WIC responded by launching its military to force the king of Eguafo to expel the French. The Dutch tried to induce neighboring states to attack Eguafo at the same time, while the French provided gold to the King to pay the neighboring states to remain out of fighting. In the end, the Twifo did join the Dutch and secured trade concessions in Komenda as a result. The violence resulted in the killing of the King of Eguafo and a prince who allied with the Dutch was placed on the throne named Takyi. Komenda then became largely controlled by the Dutch and their allies Twifo. This situation gradually resulted in tensions between Takyi and both actors. As a result, Takyi repeatedly tried to balance British interests in the port of Komenda. Series of wars The Komenda wars was a series of four different military engagements defined by shifting alliances and the involvement of military forces from multiple kingdoms in the region. The wars ended with the enthronement by the British of Takyi Kuma as the King of Eguafo. Willem Bosman was the primary chronicler of the Komenda Wars, being an active participant with the Dutch West India Company and publishing his journals in 1703. In general, the protracted war included the Dutch West India Company (WIC) and the British Royal African Company (RAC) supporting different sides in the Eguafo Kingdom to support their desired trade privileges. The forces of John Cabess, a prominent merchant in the city of Komenda, was closely allied to the British and often took their side. The war started with John Cabess attacking the Dutch Fort Vredenburgh in Komenda and the Dutch then organizing regional forces against the King in Eguafo, Takyi. Eventually, sides switched and the British began supporting a challenger to the Eguafo throne, Takyi Kuma. The fighting brought a number of other Akan polities in the region into the fighting, including: Adom, Akani, Akrons, Asebu, Cabess Terra, Denkyira, Fante, Ahanta and Twifo. The first war began as a result of disputes between a prominent African merchant, John Cabess (sometimes Kabes) who had armed forces loyal to him, in Eguafo and the Dutch West India Company (WIC). Cabess was a formal and loyal ally to the British Royal African Company and assisted their operations in the region. The Dutch, in competition with the Royal African Company, had a series of disputes with Cabess including an instance in 1684 with the Dutch panyarring Cabess and taking his goods. The disputes intensified in November 1694 when Cabess invited the British Royal African Company to return to Komenda and then attacked Dutch miners outside of the city. With the British reoccupying the former British fort in Komenda they were fired upon by the Dutch fort. As a result of these hostilities, the British , Dutch, and Eguafo king began contacting possible allies in surrounding African kingdoms to prepare for a war. Cabess Terra and Twifo initially joined the Dutch, but this alliance was stopped when Denkyira threatened to attack Twifo if war should break out. The Adoms took money from Eguafo to remain neutral in any fighting. On January 21, 1696, a young prince of Eguafo began a civil war to attempt and claim the throne of the kingdom. The name of the young prince was often rendered as Takyi Kuma or Little Takyi (in relation to the current king Takyi). The Dutch supported Takyi Kuma and were able to get the neighboring states of Adom and Akani to join in the fight supporting Takyi Kuma. The Akrons joined Takyi in defending Eguafo. The fighting ended quickly with Takyi Kuma and his forces losing on March 20. The loss resulted in formal negotiations between the Dutch and Eguafo. Jan van Sevenhuysen, the new WIC Governor of the Gold Coast made peace with Eguafo which allowed the Dutch to retain their factory and fort in Komenda. However, the British and Dutch hostilities remained high and their forts in Komenda exchanged regular, minor hostilities. The Dutch began soliciting the other African parties to try and organize another force against Eguafo and Takyi's regime. On August 5, 1697, the Dutch and Fante made an agreement to attack Eguafo in exchange for significant gold given to Fante. The British were able to make an offer to Fante of an equal amount in order to keep them neutral and Fante accepted. Other Dutch efforts were largely rebuffed by the allies. In early 1698 the British and Dutch reached an agreement for mutual recognition to trade rights and the maintenance of forts in Komenda. By November 1698, the British came to view that Takyi was becoming more inline with Dutch interests and so began to support Takyi Kuma. In November 1698, the British killed Takyi as part of this attempt to put Takyi Kuma on the throne. The British paid for mercenaries from Asebu, Cabess Terra, and Akani to join the conflict. In contrast, the Dutch, Fante and Denkyira remained largely neutral in the war. The combined forces of Takyi Kuma moved upon Eguafo but were routed by the forces of the kingdom. Legacy The primary legacy in the area was a transformation of which European power controlled trade along the Gold Coast. While little territory changed hands between the Dutch and British companies, or the African polities, the British ended with the primary advantage in trade power along the coast. However, they quickly alienated the new king Takyi Kuma by demanding repayment of debts. In addition, the British position was undermined in 1704 when the death of Takyi Kuma resulted in civil war in Eguafo. Secondarily, the wars and a smallpox outbreak in the early 1700s led to significant depopulation of the coastal area. The wars also begun warfare practices which would become more regular throughout the rest of the 1700s including the use of mercenaries and panyarring. The chaos eventually allowed expansion of the Ashanti Empire in the region and the replacement of the gold trade with the slave trade. See also Anglo-Dutch Wars Gold Coast (British colony) Anglo-Ashanti wars Range war African Company of Merchants Elmina", "after_revision": "thumbnail|Neighboring English Fort Komenda and Dutch Fort Vredenburgh in Komenda The Komenda Wars were a series of wars from 1694 until 1700 largely between the Dutch West India Company and the English Royal African Company in the Eguafo Kingdom in the present day state of Ghana, over trade rights. The Dutch were trying to keep the English out of the region to maintain a trade monopoly , while the English were attempting to re-establish a fort in the city of Komenda. The fighting included forces of the Dutch West India Company, the Royal African Company, the Eguafo Kingdom, a prince of the kingdom attempting to rise to the throne, the forces of a powerful merchant named John Cabess, other Akan tribes and kingdoms like Twifo and Denkyira. There were four separate periods of warfare, including a civil war in the Eguafo Kingdom, and the wars ended with the English placing Takyi Kuma into power in Eguafo. Because of the rapidly shifting alliances between European and African powers, historian John Thornton has found that \"there is no finer example of [the] complicated combination of European rivalry merging with African rivalry than the Komenda Wars.\" Preceding conditions The Dutch West India Company (WIC) and the Eguafo Kingdom engaged in an earlier set of hostilities in 1688. The Dutch and the English had both established factories in the port city of Komenda. In 1687, the French negotiated with the king of Eguafo to open a factory in Komenda and the WIC responded by launching its military to force the king of Eguafo to expel the French. The Dutch tried to induce neighboring states to attack Eguafo at the same time, while the French provided gold to the King to pay the neighboring states to remain out of fighting. In the end, the Twifo did join the Dutch and secured trade concessions in Komenda as a result. The violence resulted in the killing of the King of Eguafo and a prince who allied with the Dutch was placed on the throne named Takyi. Komenda then became largely controlled by the Dutch and their allies Twifo. This situation gradually resulted in tensions between Takyi and both actors. As a result, Takyi repeatedly tried to balance English interests in the port of Komenda. Series of wars The Komenda wars was a series of four different military engagements defined by shifting alliances and the involvement of military forces from multiple kingdoms in the region. The wars ended with the enthronement by the English of Takyi Kuma as the King of Eguafo. Willem Bosman was the primary chronicler of the Komenda Wars, being an active participant with the Dutch West India Company and publishing his journals in 1703. In general, the protracted war included the Dutch West India Company (WIC) and the English Royal African Company (RAC) supporting different sides in the Eguafo Kingdom to support their desired trade privileges. The forces of John Cabess, a prominent merchant in the city of Komenda, was closely allied to the English and often took their side. The war started with John Cabess attacking the Dutch Fort Vredenburgh in Komenda and the Dutch then organizing regional forces against the King in Eguafo, Takyi. Eventually, sides switched and the English began supporting a challenger to the Eguafo throne, Takyi Kuma. The fighting brought a number of other Akan polities in the region into the fighting, including: Adom, Akani, Akrons, Asebu, Cabess Terra, Denkyira, Fante, Ahanta and Twifo. The first war began as a result of disputes between a prominent African merchant, John Cabess (sometimes Kabes) who had armed forces loyal to him, in Eguafo and the Dutch West India Company (WIC). Cabess was a formal and loyal ally to the Royal African Company and assisted their operations in the region. The Dutch, in competition with the Royal African Company, had a series of disputes with Cabess including an instance in 1684 with the Dutch panyarring Cabess and taking his goods. The disputes intensified in November 1694 when Cabess invited the Royal African Company to return to Komenda and then attacked Dutch miners outside of the city. With the English reoccupying the formerlly English fort in Komenda they were fired upon by the Dutch fort. As a result of these hostilities, the English , Dutch, and Eguafo king began contacting possible allies in surrounding African kingdoms to prepare for a war. Cabess Terra and Twifo initially joined the Dutch, but this alliance was stopped when Denkyira threatened to attack Twifo if war should break out. The Adoms took money from Eguafo to remain neutral in any fighting. On January 21, 1696, a young prince of Eguafo began a civil war to attempt and claim the throne of the kingdom. The name of the young prince was often rendered as Takyi Kuma or Little Takyi (in relation to the current king Takyi). The Dutch supported Takyi Kuma and were able to get the neighboring states of Adom and Akani to join in the fight supporting Takyi Kuma. The Akrons joined Takyi in defending Eguafo. The fighting ended quickly with Takyi Kuma and his forces losing on March 20. The loss resulted in formal negotiations between the Dutch and Eguafo. Jan van Sevenhuysen, the new WIC Governor of the Gold Coast made peace with Eguafo which allowed the Dutch to retain their factory and fort in Komenda. However, the English and Dutch hostilities remained high and their forts in Komenda exchanged regular, minor hostilities. The Dutch began soliciting the other African parties to try and organize another force against Eguafo and Takyi's regime. On August 5, 1697, the Dutch and Fante made an agreement to attack Eguafo in exchange for significant gold given to Fante. The English were able to make an offer to Fante of an equal amount in order to keep them neutral and Fante accepted. Other Dutch efforts were largely rebuffed by the allies. In early 1698 the English and Dutch reached an agreement for mutual recognition to trade rights and the maintenance of forts in Komenda. By November 1698, the English came to view that Takyi was becoming more inline with Dutch interests and so began to support Takyi Kuma. In November 1698, the English killed Takyi as part of this attempt to put Takyi Kuma on the throne. The English paid for mercenaries from Asebu, Cabess Terra, and Akani to join the conflict. In contrast, the Dutch, Fante and Denkyira remained largely neutral in the war. The combined forces of Takyi Kuma moved upon Eguafo but were routed by the forces of the kingdom. Legacy The primary legacy in the area was a transformation of which European power controlled trade along the Gold Coast. While little territory changed hands between the Dutch and English companies, or the African polities, the English ended with the primary advantage in trade power along the coast. However, they quickly alienated the new king Takyi Kuma by demanding repayment of debts. In addition, the English position was undermined in 1704 when the death of Takyi Kuma resulted in civil war in Eguafo. Secondarily, the wars and a smallpox outbreak in the early 1700s led to significant depopulation of the coastal area. The wars also begun warfare practices which would become more regular throughout the rest of the 1700s including the use of mercenaries and panyarring. The chaos eventually allowed expansion of the Ashanti Empire in the region and the replacement of the gold trade with the slave trade. See also Anglo-Dutch Wars Gold Coast Anglo-Ashanti wars Range war African Company of Merchants Elmina", "edit_actions": [{"type": "R", "before": "British", "after": "English", "start_char_pos": 22, "end_char_pos": 29}, {"type": "R", "before": "British", "after": "English", "start_char_pos": 194, "end_char_pos": 201}, {"type": "R", "before": "British", "after": "English", "start_char_pos": 334, "end_char_pos": 341}, {"type": "R", "before": "while the British", "after": ", while the English", "start_char_pos": 389, "end_char_pos": 406}, {"type": "R", "before": "British", "after": "English", "start_char_pos": 864, "end_char_pos": 871}, {"type": "R", "before": "British", "after": "English", "start_char_pos": 1311, "end_char_pos": 1318}, {"type": "R", "before": "British", "after": "English", "start_char_pos": 2171, "end_char_pos": 2178}, {"type": "R", "before": "British", "after": "English", "start_char_pos": 2448, "end_char_pos": 2455}, {"type": "R", "before": "British", "after": "English", "start_char_pos": 2737, "end_char_pos": 2744}, {"type": "R", "before": "British", "after": "English", "start_char_pos": 2963, "end_char_pos": 2970}, {"type": "R", "before": "British", "after": "English", "start_char_pos": 3195, "end_char_pos": 3202}, {"type": "D", "before": "British", "after": null, "start_char_pos": 3680, "end_char_pos": 3687}, {"type": "D", "before": "British", "after": null, "start_char_pos": 4001, "end_char_pos": 4008}, {"type": "R", "before": "British reoccupying the former British", "after": "English reoccupying the formerlly English", "start_char_pos": 4113, "end_char_pos": 4151}, {"type": "R", "before": "British", "after": "English", "start_char_pos": 4246, "end_char_pos": 4253}, {"type": "R", "before": "British", "after": "English", "start_char_pos": 5308, "end_char_pos": 5315}, {"type": "R", "before": "British", "after": "English", "start_char_pos": 5666, "end_char_pos": 5673}, {"type": "R", "before": "British", "after": "English", "start_char_pos": 5854, "end_char_pos": 5861}, {"type": "R", "before": "British", "after": "English", "start_char_pos": 5995, "end_char_pos": 6002}, {"type": "R", "before": "British", "after": "English", "start_char_pos": 6131, "end_char_pos": 6138}, {"type": "R", "before": "British", "after": "English", "start_char_pos": 6213, "end_char_pos": 6220}, {"type": "R", "before": "British", "after": "English", "start_char_pos": 6659, "end_char_pos": 6666}, {"type": "R", "before": "British", "after": "English", "start_char_pos": 6707, "end_char_pos": 6714}, {"type": "R", "before": "British", "after": "English", "start_char_pos": 6886, "end_char_pos": 6893}, {"type": "D", "before": "(British colony)", "after": null, "start_char_pos": 7430, "end_char_pos": 7446}], "sents_char_pos": [0, 299, 469, 745, 912, 1292, 1378, 1559, 1739, 1834, 1970, 2046, 2123, 2212, 2403, 2492, 2653, 2864, 2997, 3159, 3266, 3440, 3637, 3754, 3934, 4103, 4207, 4365, 4512, 4580, 4692, 4811, 4948, 4993, 5071, 5142, 5294, 5416, 5538, 5661, 5778, 5835, 5972, 6108, 6208, 6299, 6379, 6477, 6599, 6779, 6868, 6987, 7105, 7257, 7392]}
+{"doc_id": "37872320", "revision_depth": "1", "before_revision": "Farley Stillwell is a fictional scientist appearing in American comic books published by Marvel Comics. Fictional character biography When J. Jonah Jameson first hired Peter Parker, he was amazed at how he managed to obtain pictures of Spider-Man. He hired private investigator Mac Gargan to look into this. When J. Jonah Jameson saw an article about inducing animal mutations into humans, he visited the scientist that established this experiment: Dr. Farley Stillwell. Jameson first thought Stillwell was a crackpot, but later saw him as an opportunity to take down Spider-Man. When he first went to see Dr. Stillwell in his lab, Jameson had him experiment on Gargan. Stillwell gave Gargan a high-tech scorpion-suit, and the Scorpion was born.Amazing Spider-Man #20 Television Dr. Farley Stillwell appears in the 1960s Spider-Man episode \"Never Step on a Scorpion\" , voiced by Tom Harvey.Tom Harvey, voicechasers.com, retrieved 23 Jan 2010 An episode of The Amazing Spider-Man titled \"Wolfpack\" features a cameo from Dr. Stillwell. This is confirmed to be the character by his name tag . Dr. Farley Stillwell appears in the 1990s Spider-Man episode \"Sting of the Scorpion\" , voiced by Michael Rye.Dr. Farley Stillwell, IMDb, retrieved 17 Jan 2010 J. Jonah Jameson hired him to turn Mac Gargan into the Scorpion. When Gargan later wanted Stillwell to restore him to his former self, Stillwell ended up knocked out and hospitalized. In a flashback in \"Make a Wish\", Stillwell was the scientist that led the experiment involving neogenic research,Ian Hague, Comics and the Senses: A Multisensory Approach to Comics and Graphic Novels, Routledge, 2014, ch. 2: \"Sight, or, the Ideal Perspective and the Physicality of Seeing\". an accident during this enabled Peter Parker to become Spider-Man. In \"The Final Nightmare,\" Stillwell was abducted from the hospital by the Scorpion who took him to the laboratory where Spider-Man, Dr. Curt Connors, and Vulture were. While a fight ensued between Spider-Man, Vulture, and Scorpion, Stillwell planned to destroy the Neogenic Recombinator .The fictional item also appeared in Spider-Man Adventures #1 (December 1994). His motivations were to make sure that monsters like the Scorpion were never created again. Connors tried to intervene saying that it would help cure him . When Stillwell asks him what it would cure him of, Connors turned into the Lizard and attacked. Spider-Man took down Lizardas Stillwell overloaded the Recombinator's transfomer causing it to explode. Stillwell later explains to Connors that neogenic research is too dangerous and states that its secrets will stay with him forever. He then vows to disappear, never to be seen again. Video games An evil female version of Dr. Farley Stillwell (voiced by Nika Futterman) appears in the Spider-Man 3 movie game. In the game, she is head of MechaBioCon and is revealed to have captured Scorpion (who escaped his encounter with Spider-Man in the first game), and has been using him as a subject for military cybernetics and mind control . She first uses him to break the Rhino out of a prison truck. After Spider-Man defeats the Scorpion at a bridge and frees him from Stillwell's control, he vows revenge and asks Spidey for help. After Spider-Man and Scorpiondefeat the Rhino at MechaBioCon, Scorpion goes after Stillwell who tries to shoot him. Scorpion smacks the gun away and attempts to kills her when he learns that she can't reverse what she did to him, but Spider-Man and Dr. Jessica Andrews(an employee who has feelings for Gargan) plead with him not to . Scorpion listens and escapes out the window, and Stillwell is webbed up by Spider-Man and later arrested. Stillwell is mentioned, though not by name, in Marvel's Spider-Man . In an episode of \"Just the Facts with J. Jonah Jameson\", Jameson blames Stillwell for creating the Scorpion even though he paid for the experiment, arguing that he couldn't have known the scientist's intentions and accusing him of lacking ethics.", "after_revision": "Farley Stillwell is a fictionalcharacter appearing in American comic books published by Marvel Comics. He is a scientist best known for transforming Mac Gargan into the Scorpion. Fictional character biography When J. Jonah Jameson first hired Peter Parker, he was amazed at how he managed to obtain pictures of Spider-Man. He hired private investigator Mac Gargan to look into this. When Jameson saw an article about inducing animal mutations into humans, he visited the scientist that established this experiment: Dr. Farley Stillwell. Jameson first thought Stillwell was a crackpot, but later saw him as an opportunity to take down Spider-Man. When he first went to see Dr. Stillwell in his lab, Jameson had him experiment on Gargan. Stillwell gave Gargan a high-tech scorpion-suit, and the Scorpion was born.Amazing Spider-Man #20 Television Dr. Farley Stillwell appears in the 1960s Spider-Man animated series , voiced by Tom Harvey.Tom Harvey, voicechasers.com, retrieved 23 Jan 2010 In the episode \"Never Step on Scorpion\", he is hired by J. Jonah Jameson to transform Mac Gargan into the Scorpion. In \"Sting of the Scorpion\", Scorpion arrives at Stillwell's lab and drinks a serum that increases his strength and size, trashing the lab in the process. Dr. Farley Stillwell makes a cameo appearance in The Amazing Spider-Man episode \"Wolfpack\" . His name tag confirms this to be the case . Dr. Farley Stillwell appears in Spider-Man : The Animated , voiced by Michael Rye.Dr. Farley Stillwell, IMDb, retrieved 17 Jan 2010 In \"Sting of the Scorpion\", J. Jonah Jameson hires him to turn Mac Gargan into the Scorpion. Gargan later demands that Stillwell restore him to his former self, only for the scientist to reveal that he is unable to, which leads to him being knocked out and hospitalized. In a flashback in \"Make a Wish\", Stillwell was the scientist that led an experiment involving neogenic research,Ian Hague, Comics and the Senses: A Multisensory Approach to Comics and Graphic Novels, Routledge, 2014, ch. 2: \"Sight, or, the Ideal Perspective and the Physicality of Seeing\". which led to Peter Parker becoming Spider-Man. In \"The Final Nightmare,\" Stillwell is abducted from the hospital by the Scorpion and taken to a lab where Spider-Man, Dr. Curt Connors, and Vulture were. While a fight ensues between Spider-Man, Vulture, and Scorpion, Stillwell plans to destroy the Neogenic Recombinator to prevent more monster like the Scorpion from being created .The fictional item also appeared in Spider-Man Adventures #1 (December 1994). Connors tries to intervene saying that it would help cure him , before transforming into the Lizard and attacking Stillwell. While Spider-Man defeats the Lizard, Stillwell overloads the Recombinator's transfomer , causing it to explode. Stillwell later explains to Connors that neogenic research is too dangerous and states that its secrets will stay with him forever. He then vows to disappear, never to be seen again. Video games An evil female version of Dr. Farley Stillwell appears in the Spider-Man 3 video game, voiced by Nika Futterman. This version is the head of a science corporation called MechaBioCon, and captured the Scorpion when he came to her looking for a way to have his mechanical tail removed. Stillwell then used him as a subject for her experiments invloving military cybernetics and mind control , turning him into a living weapon that she has carry out her orders . She first appears when ordering Scorpion to break the Rhino out of a prison truck. After Spider-Man defeats Scorpion and frees him from the mind control, the two work together to exact revenge on Stillwell, who has hired Rhino as her bodyguard and taken Dr. Jessica Andrews, Scorpion's love interest, hostage. Upon defeating Rhino with Spider-Man 's help, Scorpion saves Dr. Andrews and attempts to kill Stillwell, but is convinced not to do so by Spider-Man and Dr. Andrews, claiming that this will only make him the monster Stillwell wants him to be. As Scorpion flees, Spider-Man leaves Stillwell for the police. Dr. Farley Stillwell is indirectly mentioned in the 2018 Spider-Man game . In an episode of \"Just the Facts with J. Jonah Jameson\", Jameson blames the scientist for creating the Scorpion even though he paid for the experiment, arguing that he couldn't have known about the scientist's intentions and accusing him of lacking ethics.", "edit_actions": [{"type": "R", "before": "fictional scientist", "after": "fictionalcharacter", "start_char_pos": 22, "end_char_pos": 41}, {"type": "A", "before": null, "after": "He is a scientist best known for transforming Mac Gargan into the Scorpion.", "start_char_pos": 104, "end_char_pos": 104}, {"type": "D", "before": "J. Jonah", "after": null, "start_char_pos": 314, "end_char_pos": 322}, {"type": "R", "before": "episode \"Never Step on a Scorpion\"", "after": "animated series", "start_char_pos": 833, "end_char_pos": 867}, {"type": "R", "before": "An episode of", "after": "In the episode \"Never Step on Scorpion\", he is hired by J. Jonah Jameson to transform Mac Gargan into the Scorpion. In \"Sting of the Scorpion\", Scorpion arrives at Stillwell's lab and drinks a serum that increases his strength and size, trashing the lab in the process. Dr. Farley Stillwell makes a cameo appearance in", "start_char_pos": 943, "end_char_pos": 956}, {"type": "R", "before": "titled", "after": "episode", "start_char_pos": 980, "end_char_pos": 986}, {"type": "R", "before": "features a cameo from Dr. Stillwell. This is confirmed", "after": ". His name tag confirms this", "start_char_pos": 998, "end_char_pos": 1052}, {"type": "R", "before": "character by his name tag", "after": "case", "start_char_pos": 1063, "end_char_pos": 1088}, {"type": "D", "before": "the 1990s", "after": null, "start_char_pos": 1123, "end_char_pos": 1132}, {"type": "R", "before": "episode \"Sting of the Scorpion\"", "after": ": The Animated", "start_char_pos": 1144, "end_char_pos": 1175}, {"type": "A", "before": null, "after": "In \"Sting of the Scorpion\",", "start_char_pos": 1250, "end_char_pos": 1250}, {"type": "R", "before": "hired", "after": "hires", "start_char_pos": 1268, "end_char_pos": 1273}, {"type": "R", "before": "When Gargan later wanted Stillwell to", "after": "Gargan later demands that Stillwell", "start_char_pos": 1316, "end_char_pos": 1353}, {"type": "R", "before": "Stillwell ended up", "after": "only for the scientist to reveal that he is unable to, which leads to him being", "start_char_pos": 1386, "end_char_pos": 1404}, {"type": "R", "before": "the", "after": "an", "start_char_pos": 1505, "end_char_pos": 1508}, {"type": "R", "before": "an accident during this enabled Peter Parker to become", "after": "which led to Peter Parker becoming", "start_char_pos": 1726, "end_char_pos": 1780}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 1829, "end_char_pos": 1832}, {"type": "R", "before": "who took him to the laboratory", "after": "and taken to a lab", "start_char_pos": 1876, "end_char_pos": 1906}, {"type": "R", "before": "ensued", "after": "ensues", "start_char_pos": 1975, "end_char_pos": 1981}, {"type": "R", "before": "planned", "after": "plans", "start_char_pos": 2035, "end_char_pos": 2042}, {"type": "A", "before": null, "after": "to prevent more monster like the Scorpion from being created", "start_char_pos": 2080, "end_char_pos": 2080}, {"type": "R", "before": "His motivations were to make sure that monsters like the Scorpion were never created again. Connors tried", "after": "Connors tries", "start_char_pos": 2160, "end_char_pos": 2265}, {"type": "R", "before": ". When Stillwell asks him what it would cure him of, Connors turned", "after": ", before transforming", "start_char_pos": 2314, "end_char_pos": 2381}, {"type": "R", "before": "attacked.", "after": "attacking Stillwell. While", "start_char_pos": 2402, "end_char_pos": 2411}, {"type": "R", "before": "took down Lizardas Stillwell overloaded", "after": "defeats the Lizard, Stillwell overloads", "start_char_pos": 2423, "end_char_pos": 2462}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2493, "end_char_pos": 2493}, {"type": "D", "before": "(voiced by Nika Futterman)", "after": null, "start_char_pos": 2759, "end_char_pos": 2785}, {"type": "R", "before": "movie game. In the game, she is head of MechaBioCon and is revealed to have captured Scorpion (who escaped his encounter with Spider-Man in the first game), and has been using", "after": "video game, voiced by Nika Futterman. This version is the head of a science corporation called MechaBioCon, and captured the Scorpion when he came to her looking for a way to have his mechanical tail removed. Stillwell then used", "start_char_pos": 2814, "end_char_pos": 2989}, {"type": "A", "before": null, "after": "her experiments invloving", "start_char_pos": 3011, "end_char_pos": 3011}, {"type": "A", "before": null, "after": ", turning him into a living weapon that she has carry out her orders", "start_char_pos": 3050, "end_char_pos": 3050}, {"type": "R", "before": "uses him", "after": "appears when ordering Scorpion", "start_char_pos": 3063, "end_char_pos": 3071}, {"type": "R", "before": "the Scorpion at a bridge", "after": "Scorpion", "start_char_pos": 3139, "end_char_pos": 3163}, {"type": "R", "before": "Stillwell's control, he vows revenge and asks Spidey for help. After", "after": "the mind control, the two work together to exact revenge on Stillwell, who has hired Rhino as her bodyguard and taken Dr. Jessica Andrews, Scorpion's love interest, hostage. Upon defeating Rhino with", "start_char_pos": 3183, "end_char_pos": 3251}, {"type": "R", "before": "and Scorpiondefeat the Rhino at MechaBioCon, Scorpion goes after Stillwell who tries to shoot him. Scorpion smacks the gun away", "after": "'s help, Scorpion saves Dr. Andrews", "start_char_pos": 3263, "end_char_pos": 3390}, {"type": "R", "before": "kills her when he learns that she can't reverse what she did to him, but", "after": "kill Stillwell, but is convinced not to do so by", "start_char_pos": 3407, "end_char_pos": 3479}, {"type": "R", "before": "Jessica Andrews(an employee who has feelings for Gargan) plead with him not to . Scorpion listens and escapes out the window, and Stillwell is webbed up by", "after": "Andrews, claiming that this will only make him the monster Stillwell wants him to be. As Scorpion flees,", "start_char_pos": 3499, "end_char_pos": 3654}, {"type": "R", "before": "and later arrested. Stillwell is mentioned, though not by name, in Marvel's", "after": "leaves Stillwell for the police. Dr. Farley Stillwell is indirectly mentioned in the 2018", "start_char_pos": 3666, "end_char_pos": 3741}, {"type": "A", "before": null, "after": "game", "start_char_pos": 3753, "end_char_pos": 3753}, {"type": "R", "before": "Stillwell", "after": "the scientist", "start_char_pos": 3828, "end_char_pos": 3837}, {"type": "A", "before": null, "after": "about", "start_char_pos": 3940, "end_char_pos": 3940}], "sents_char_pos": [0, 103, 248, 308, 471, 580, 670, 746, 891, 1034, 1200, 1315, 1434, 1792, 1960, 2082, 2159, 2251, 2315, 2411, 2516, 2648, 2699, 2825, 3052, 3113, 3245, 3361, 3685]}
+{"doc_id": "37966541", "revision_depth": "1", "before_revision": "150px|2003 edition of Writers' & Artists' Yearbook Writers' & Artists' Yearbook is an annual directory for writers , designers, illustrators and photographers . It is published in the UK each July, alongside the Children's Writers' & Artists' Yearbook. The yearbook contains over 4,500 named industry contacts updated for each edition and includes articles about getting work published. In 2007, an associated website, known as Writers & Artists was launched , which gives aspiring writers access to industry advice and help, and gives pointers on how to get published (www. writersandartists. co. uk) . The current edition is the 2018 edition and includes articles by William Boyd, J.K. Rowling, Diana Athill, Tom Holland, Anita Bean, Neil Gaiman, Katie Fforde amongst others.\"The Writers' and Artists' Yearbook\", BBC First published in 1906, by Adam & Charles Black, the original Writers\u2019 & Artists\u2019 Yearbook was an 80-page booklet, costing one shilling. It gave details of seven literary agents and 89 publishers. It has been published on an annual basis since, expanding over time to include information for illustrators and photographers . A&C Black became part of Bloomsbury Publishing in 2000 , and other titlesin its reference division include Who's Who, Wisden and Black's Medical Dictionary. Articles offering advice first appeared in the 1914 yearbook. In 2004, Bloomsbury launched the Children's Writers' and Artists' Yearbook that includes articles and advice specifically focused on the children's book market. It contains articles from many successful children's authors across different genres from picture books to YA novels. The latest 2018 edition includes advice from Quentin Blake, Michael Morpurgo, Anne Fine, Michael Rosen, Sarah Mussi, and Sally Green amongst others . Website and competitions In 2007, Writers ' & Artists ' Yearbook launched an associated website (www. writersandartists.co.uk). Initially this was only accessible to anyone purchasing the print edition. In 2009, the website was relaunched and now includes blogs from guest authors and a social networking feature that enables authors and artists to add a public profile. This free website offers a community platform, an extensive collection of free advice articles on the writing and publishing process, ways to contact publishers and the best advice on how to get your book publisher, along with a shop where you can purchase not only the Writers' Artists' Yearbook, but additional books that offer helpful advice and expertise for writers of fiction, non-fiction, poetry, stage and screen . From 2013, the website featured a section focusing on self-publishing , also hosting a conference on the subject in November of that year in association with National Novel Writing Month. Courses, lectures and other events as well as editorial services are available to purchase through the website, ranging in price from \u00a395-\u00a31250. Writers ' & Artists ' Yearbook runs an annual short story competition and also collaborates with Bloomsbury and other organisations to run other competitions for aspiring writers . The yearbook is divided into the following sections: Newspapers and magazines \u2013 regional, national and overseas, syndicates and news agencies Books \u2013 regional, national and overseas , audio publishers, book packagers and book clubs Poetry Television, filmand radio Theatre Literary agents Art and illustration \u2013 agents, commercial studios and card and stationery publishers Societies, prizes and festivals \u2013 associations and clubs, prizes and awards and literary festivals Self-publishing Resources for writers \u2013 courses, libraries and writers' retreats Copyright and libel information Finance for writers and artists . ", "after_revision": "150px|2003 edition of Writers' & Artists' Yearbook Writers' & Artists' Yearbook is an annual directory for writers and illustrators which offers creative and practical advice on how to give your work the best chance at success . It is published in the UK each July, alongside the Children's Writers' & Artists' Yearbook. The Yearbook contains 100 articles covering every aspect of the publishing world and the paths which creatives can follow to gain entry into it, and over 4,500 named industry contacts including agents, publishers, media companies, and societies. In 2007, an associated website, www.writersandartists.co.uk, was launched which now includes additional articles, interviews, and resources as well as a community forum to connect users. The brand also runs events and masterclasses and offers a series of editorial services including manuscript reviews and edits, consultations and mentoring. As well as the annual Yearbooks, Writers & Artists also publish a series of companion guides which dive deeper into specific areas of publishing. These titles include Guide to Getting Published, Guide to Self-Publishing, Guide to How to Hook an Agent, Guide to Writing for Children and YA and The Organised Writer. Scheduled for publication in 2021 are Guide to How to Write and The Right Word . The current edition of the Yearbook is the 2021 edition and includes newly commissioned articles by Raymond Antrobus (Poems for the page and on stage), Sam Delaney (Podcasting: how to get creative and make money), Ana Garanito (Adapting books for stage and screen), Clare Grist Taylor (Advice from an 'Accidental' Agent), Adam Hamdy (Festival fun: your guide to why, how and what), Russell Lewis (Writing series for television), Jonathan Lorie (How to become a travel writer), Julia Mitchell (Writing an award-winning blog), Frances Moffat (Illustrating non-fiction books), Hari Patience (In praise of fan fiction), Sarah Cross (Cross-format representation: what an agent can do for you), Temi Wilkey (How to get your play published and performed) and Rachel Winters (Writing a romcom). First published in 1906, by Adam & Charles Black, the original Writers\u2019 & Artists\u2019 Yearbook was an 80-page booklet, costing one shilling. It gave details of seven literary agents and 89 publishers. \"The Writers' and Artists' Yearbook\", BBC Articles offering advice first appeared in the 1914 yearbook. It has been published on an annual basis since, expanding over time to include information for illustrators , and to adapt to the changing digital landscape of the publishing industry and the rise of self-publishing . A&C Black became part of Bloomsbury Publishing in 2000 and Bloomsbury now publishes the entire collection of Writers Artists titles. In 2004, Bloomsbury launched the Children's Writers' and Artists' Yearbook that includes articles and advice specifically focused on the children's book market. It contains articles from a diverse array of successful children's authors across different genres , mediums and age ranges, as well as contact details tailored to the children's publishing industry . In 2007, Writers & Artists launched an associated website . Initially this was only accessible to anyone purchasing the print edition. In 2009, the website was relaunched and now includes freely available blogs, articles, interviews and a community platform, as well as paid for content which is additional to what can be found in the Yearbook . From 2013, the website featured a section dedicated to self-publishing . Through the website users can also sign up for events and masterclasses, and access editorial services including manuscript reviews and mentoring. In 2013 Writers & Artists began publishing companion guides alongside the annual Yearbooks focusing on specific areas of writing and publishing. and including Life Writing, Short Stories, Children's Fiction, Crime and Thriller Writing, Historical Fiction, Novel Writing, Literary Non-fiction, Play writing and TV and radio . The yearbook is divided into the following sections: Newspapers and magazines \u2013 writing and pitching; regional, national and overseas, syndicates and news agencies Books \u2013 the publishing process, inspiring writers and writing advice; regional, national and overseas publishers , audio publishers, book packagers and book clubs Poetry \u2013 publication and performance; publishers and societies Screen and audio - film, television, audiobooks and podcasts; production companies Theatre \u2013 publication, adaptation, reviews and performance; production companies Literary agents \u2013 purpose, choice and submission; UK, Ireland and overseas agents Art and illustration \u2013 illustration and photography, portfolios and freelancing; agents, commercial studios and card and stationery publishers Societies, prizes and festivals \u2013 associations and clubs, prizes and awards and literary festivals Self-publishing \u2013 pathways, publication and hybrids; book sites, blogs, podcasts, services and providers Resources for writers \u2013 editing, blogging, indexing, software and glossaries; courses, libraries and writers' retreats Copyright and libel information \u2013 copyright and licensing Finance for writers and artists \u2013 earnings, income tax and national insurance Other titles Writers Artists website Other Writers Artists services Events Editorial services Competitions", "edit_actions": [{"type": "R", "before": ", designers, illustrators and photographers", "after": "and illustrators which offers creative and practical advice on how to give your work the best chance at success", "start_char_pos": 115, "end_char_pos": 158}, {"type": "R", "before": "yearbook contains", "after": "Yearbook contains 100 articles covering every aspect of the publishing world and the paths which creatives can follow to gain entry into it, and", "start_char_pos": 257, "end_char_pos": 274}, {"type": "R", "before": "updated for each edition and includes articles about getting work published.", "after": "including agents, publishers, media companies, and societies.", "start_char_pos": 310, "end_char_pos": 386}, {"type": "R", "before": "known as Writers", "after": "www.writersandartists.co.uk, was launched which now includes additional articles, interviews, and resources as well as a community forum to connect users. The brand also runs events and masterclasses and offers a series of editorial services including manuscript reviews and edits, consultations and mentoring.", "start_char_pos": 419, "end_char_pos": 435}, {"type": "A", "before": null, "after": "As well as the annual Yearbooks, Writers", "start_char_pos": 436, "end_char_pos": 436}, {"type": "R", "before": "Artists was launched , which gives aspiring writers access to industry advice and help, and gives pointers on how to get published (www. writersandartists. co. uk)", "after": "Artists also publish a series of companion guides which dive deeper into specific areas of publishing. These titles include Guide to Getting Published, Guide to Self-Publishing, Guide to How to Hook an Agent, Guide to Writing for Children and YA and The Organised Writer. Scheduled for publication in 2021 are Guide to How to Write and The Right Word", "start_char_pos": 439, "end_char_pos": 602}, {"type": "R", "before": "is the 2018", "after": "of the Yearbook is the 2021", "start_char_pos": 625, "end_char_pos": 636}, {"type": "R", "before": "articles by William Boyd, J.K. Rowling, Diana Athill, Tom Holland, Anita Bean, Neil Gaiman, Katie Fforde amongst others.\"The Writers' and Artists' Yearbook\", BBC", "after": "newly commissioned articles by Raymond Antrobus (Poems for the page and on stage), Sam Delaney (Podcasting: how to get creative and make money), Ana Garanito (Adapting books for stage and screen), Clare Grist Taylor (Advice from an 'Accidental' Agent), Adam Hamdy (Festival fun: your guide to why, how and what), Russell Lewis (Writing series for television), Jonathan Lorie (How to become a travel writer), Julia Mitchell (Writing an award-winning blog), Frances Moffat (Illustrating non-fiction books), Hari Patience (In praise of fan fiction), Sarah Cross (Cross-format representation: what an agent can do for you), Temi Wilkey (How to get your play published and performed) and Rachel Winters (Writing a romcom).", "start_char_pos": 658, "end_char_pos": 819}, {"type": "A", "before": null, "after": "\"The Writers' and Artists' Yearbook\", BBC Articles offering advice first appeared in the 1914 yearbook.", "start_char_pos": 1018, "end_char_pos": 1018}, {"type": "R", "before": "and photographers", "after": ", and to adapt to the changing digital landscape of the publishing industry and the rise of self-publishing", "start_char_pos": 1127, "end_char_pos": 1144}, {"type": "R", "before": ", and other titlesin its reference division include Who's Who, Wisden and Black's Medical Dictionary. Articles offering advice first appeared in the 1914 yearbook.", "after": "and Bloomsbury now publishes the entire collection of Writers", "start_char_pos": 1202, "end_char_pos": 1365}, {"type": "A", "before": null, "after": "Artists titles.", "start_char_pos": 1366, "end_char_pos": 1366}, {"type": "R", "before": "many", "after": "a diverse array of", "start_char_pos": 1554, "end_char_pos": 1558}, {"type": "R", "before": "from picture books to YA novels. The latest 2018 edition includes advice from Quentin Blake, Michael Morpurgo, Anne Fine, Michael Rosen, Sarah Mussi, and Sally Green amongst others", "after": ", mediums and age ranges, as well as contact details tailored to the children's publishing industry", "start_char_pos": 1613, "end_char_pos": 1793}, {"type": "D", "before": "Website and competitions", "after": null, "start_char_pos": 1796, "end_char_pos": 1820}, {"type": "D", "before": "'", "after": null, "start_char_pos": 1838, "end_char_pos": 1839}, {"type": "D", "before": "' Yearbook", "after": null, "start_char_pos": 1850, "end_char_pos": 1860}, {"type": "R", "before": "(www. writersandartists.co.uk).", "after": ".", "start_char_pos": 1892, "end_char_pos": 1923}, {"type": "R", "before": "blogs from guest authors and a social networking feature that enables authors and artists to add a public profile. This free website offers a", "after": "freely available blogs, articles, interviews and a", "start_char_pos": 2052, "end_char_pos": 2193}, {"type": "D", "before": "an extensive collection of free advice articles on the writing and publishing process, ways to contact publishers and the best advice on how to get your book publisher, along with a shop where you can purchase not only the Writers'", "after": null, "start_char_pos": 2214, "end_char_pos": 2445}, {"type": "R", "before": "Artists' Yearbook, but additional books that offer helpful advice and expertise for writers of fiction, non-fiction, poetry, stage and screen", "after": "as well as paid for content which is additional to what can be found in the Yearbook", "start_char_pos": 2446, "end_char_pos": 2587}, {"type": "R", "before": "focusing on", "after": "dedicated to", "start_char_pos": 2632, "end_char_pos": 2643}, {"type": "R", "before": ", also hosting a conference on the subject in November of that year in association with National Novel Writing Month. Courses, lectures and other events as well as editorial services are available to purchase through the website, ranging in price from \u00a395-\u00a31250. Writers '", "after": ". Through the website users can also sign up for events and masterclasses, and access editorial services including manuscript reviews and mentoring.", "start_char_pos": 2660, "end_char_pos": 2932}, {"type": "A", "before": null, "after": "In 2013 Writers", "start_char_pos": 2933, "end_char_pos": 2933}, {"type": "R", "before": "' Yearbook runs an annual short story competition and also collaborates with Bloomsbury and other organisations to run other competitions for aspiring writers", "after": "began publishing companion guides alongside the annual Yearbooks focusing on specific areas of writing and publishing. and including Life Writing, Short Stories, Children's Fiction, Crime and Thriller Writing, Historical Fiction, Novel Writing, Literary Non-fiction, Play writing and TV and radio", "start_char_pos": 2944, "end_char_pos": 3102}, {"type": "A", "before": null, "after": "writing and pitching;", "start_char_pos": 3185, "end_char_pos": 3185}, {"type": "A", "before": null, "after": "the publishing process, inspiring writers and writing advice;", "start_char_pos": 3256, "end_char_pos": 3256}, {"type": "A", "before": null, "after": "publishers", "start_char_pos": 3289, "end_char_pos": 3289}, {"type": "R", "before": "Television, filmand radio Theatre Literary agents", "after": "\u2013 publication and performance; publishers and societies Screen and audio - film, television, audiobooks and podcasts; production companies Theatre \u2013 publication, adaptation, reviews and performance; production companies Literary agents \u2013 purpose, choice and submission; UK, Ireland and overseas agents", "start_char_pos": 3347, "end_char_pos": 3396}, {"type": "A", "before": null, "after": "illustration and photography, portfolios and freelancing;", "start_char_pos": 3420, "end_char_pos": 3420}, {"type": "A", "before": null, "after": "\u2013 pathways, publication and hybrids; book sites, blogs, podcasts, services and providers", "start_char_pos": 3598, "end_char_pos": 3598}, {"type": "A", "before": null, "after": "editing, blogging, indexing, software and glossaries;", "start_char_pos": 3623, "end_char_pos": 3623}, {"type": "A", "before": null, "after": "\u2013 copyright and licensing", "start_char_pos": 3697, "end_char_pos": 3697}, {"type": "R", "before": ".", "after": "\u2013 earnings, income tax and national insurance", "start_char_pos": 3730, "end_char_pos": 3731}, {"type": "A", "before": null, "after": "Other titles", "start_char_pos": 3732, "end_char_pos": 3732}, {"type": "A", "before": null, "after": "Writers", "start_char_pos": 3733, "end_char_pos": 3733}, {"type": "A", "before": null, "after": "Artists website", "start_char_pos": 3734, "end_char_pos": 3734}, {"type": "A", "before": null, "after": "Other Writers", "start_char_pos": 3735, "end_char_pos": 3735}, {"type": "A", "before": null, "after": "Artists services", "start_char_pos": 3736, "end_char_pos": 3736}, {"type": "A", "before": null, "after": "Events", "start_char_pos": 3737, "end_char_pos": 3737}, {"type": "A", "before": null, "after": "Editorial services", "start_char_pos": 3738, "end_char_pos": 3738}, {"type": "A", "before": null, "after": "Competitions", "start_char_pos": 3739, "end_char_pos": 3739}], "sents_char_pos": [0, 160, 252, 386, 604, 778, 957, 1017, 1146, 1303, 1365, 1527, 1645, 1795, 1923, 1998, 2166, 2589, 2777, 2922, 3104, 3184, 3255]}
+{"doc_id": "38779307", "revision_depth": "1", "before_revision": "The Access to Medicine Index is a ranking system published biennially since 2008 by the Access to Medicine Foundation in Amsterdam, The Netherlands, an international not-for-profit organisation, funded by the Bill & Melinda Gates Foundation, the UK Department for International Development (DFID) and the Dutch Ministry of Foreign Affairs. It ranks the world \u2019 s 20 largest pharmaceutical companies according to their ability to make their pharmaceutical drugs more available, affordable, accessible and acceptable in 106 low- to middle-income countries. The biennial index aims to stimulate industry to improve access in developing countries, to show the activities of their peers, and allow them, governments, investors, civil society, patient organisations and academia to gather and form a common view of how pharmaceutical companies can make further progress. Company name (2018 score) 2018 Ranking 2016 Ranking GlaxoSmithKline (4.01) 1 1Novartis (3.21) 2 3Johnson & Johnson (3.05) 3 2 Merck KGaA (2.90) 4 4Takeda Pharmaceutical Company (2.75) 5 15Novo Nordisk (2.68) 6 10Sanofi (2.49) 7 6Eisai (2.48) 8 11AstraZeneca (2.48) 9 7Roche Holding (2.38) 10 19Pfizer (2.34) 11 14Merck & Co. (2.32) 12 5Gilead Sciences (2.29) 13 8Boehringer Ingelheim (2.11) 14 16Bristol-Myers Squibb (2.03) 15 13Bayer (1.88) 16 12AbbVie (1.88) 17 9 Daiichi Sankyo (1.77) 18 18Astellas Pharma (1.46) 19 20Eli Lilly (1.27) 20 17 The Access to Medicine Index was developed starting in 2004 on the initiative of Dutch entrepreneur Wim Leereveld. After years of working with the pharmaceutical industry, he concluded that simply \"naming and shaming\" the industry did not do enough to encourage pharmaceutical companies to play their part in improving access to medicine in the developing world. Leereveld noticed that there were many different (and sometimes conflicting) opinions about what the pharmaceutical industry should be doing with regard to access to medicine, but that there was no tool to recognise good practice within the pharmaceutical industry and no framework for collective dialogue surrounding this issue. He set out to develop a ranking system that would show which pharmaceutical companies do the most to improve access to medicine and how, and also help stakeholders to collectively define companies \u2019 role in increasing access to medicine. The first Access to Medicine Index was published in 2008, followed by a new Index every two years. The 2017 Methodology for the 2018 Access to Medicine Index was published in October 2017. The Access to Medicine Index uses a weighted analysis to capture and compare data which the companies provide. The framework is constructed along seven areas of focus called \u2018Technical Areas\u2019 , which cover the range of company business activities considered relevant to access to medicine. Within each area, the Index assesses four aspects of company action called \u2018Strategic Pillars\u2019 : commitments, transparency, performance and innovation. Company Scope The Access to Medicine Index ranks 20 of the world's largest originator (research-based) pharmaceutical companies, based on market capitalisation and the relevance of their product portfolios to diseases in the developing world. One unlisted company, Boehringer Ingelheim, is also included since it meets the size and portfolio relevance criteria. The Access to Medicine Index focuses on low and middle income countries, based on World Bank classifications measuring economic advancement, human development, and relative levels of inequality. and United Nations The 2018 Index measured developments in a total of 106 countries, including countries considered to be low income and lower-middle income countries by the World Bank, and Least Developed Countries as defined by the United Nations Economic and Social Council. In addition, countries classified as low human development countries and medium human development countries by the UN Human Development Index are included. Finally, based on the UN Inequality-Adjusted Human Development Index, the Index includes countries which, while they may have higher measures of development, have comparatively high levels of socio-economic inequality. The top 11 communicable diseases based on DALYs from the WHO Global Health Observatory 2015 DALY Estimates The top 10 non-communicable diseases based on DALYs from the WHO Global Health Observatory 2015 DALY Estimates 20 of the WHO Neglected Tropical Diseases 10 maternal and neonatal health conditions identified by Every Woman Every Child. In addition, the Index captures activity on contraceptives. 12 priority pathogens from the 2017 WHO priority pathogens list. 17 cancers with high disease burdens based on data from the WHO Global Cancer Observatory. 19 cancers with relevant products on the 2017 WHO Model List of Essential Medicines are in scope for technical areas relating to pricing, patenting and donations. Nine cancers are in both sets. To reflect the range of available product types for prevention, diagnosis and treatment of diseases, the Index maintains a broad product type scope which draws closely from definitions provided by the G-Finder Report. Since its inception, the Access to Medicine Index has progressed to be a frequently cited and \u2018authoritative\u2019 benchmark for pharmaceutical companies with regard to their access to medicine initiatives. In addition to global media outlets reporting on the Access to Medicine Index and its findings, significant coverage includes: In July 2008, Bill Gates mentioned the Access to Medicine Index in an interview with Time Magazine as an example of an incentive that works to give businesses credit for what they are already doing to address the challenges of access to medicine in developing countries. In 2010 Paul Hunt (academic) , the former UN Special Rapporteur on the right to health, described the Index as a way to measure the pharmaceutical industry's progress in line with human rights obligations. A 2010 UBS report called the index a tool for investors to assess access to medicine specifically and, where necessary, separately from corporate social responsibility frameworks. Since 2008, the Access to Medicine Index has been repeatedly cited in scientific journals such as the British Medical Journal, The Lancet and The Pharmaceutical Journal. Data from the 2014 Index was used in a study of access to hepatitis C medicines in the Bulletin of the World Health Organization. A 2014 Deutsche Bank report on pharmaceutical industry investment in malaria and neglected tropical diseases mentioned the index. The results of the Access to Medicine Index are largely based on company data provided by the pharmaceutical companies themselves. Self-reported data does carry with it an inherent risk, but the Access to Medicine Index also uses dependable external sources to verify data provided by the companies wherever possible. Additionally, it is in companies \u2019 best interest to be as forthcoming as possible, as they are a) rated by the Index on their degree of transparency and b) rated on their performance every 2 years, so that failures to meet their commitments and/or inconsistencies over time are likely to be uncovered. Besides, as drug access is only one dimension of the Corporate Social Responsibility (CSR) within the pharmaceutical industry, it would not be reasonable to evaluate the CSR practices of pharmaceutical companies only using this index.", "after_revision": "The Access to Medicine Index is a ranking system published biennially since 2008 by the Access to Medicine Foundation in Amsterdam, the Netherlands, an international not-for-profit organisation, funded by the Bill & Melinda Gates Foundation, the UK Department for International Development (DFID) and the Dutch Ministry of Foreign Affairs. It ranks the world ' s 20 largest pharmaceutical companies according to their ability to make their pharmaceutical drugs more available, affordable, accessible and acceptable in 106 low- to middle-income countries. The biennial index aims to stimulate industry to improve access in developing countries, to show the activities of their peers, and allow them, governments, investors, civil society, patient organisations and academia to gather and form a common view of how pharmaceutical companies can make further progress. Company name (2018 score) 2018 ranking 2016 rankingGlaxoSmithKline (4.01) 1 1Novartis (3.21) 2 3Johnson & Johnson (3.05) 3 2Merck KGaA (2.90) 4 4Takeda Pharmaceutical Company (2.75) 5 15Novo Nordisk (2.68) 6 10Sanofi (2.49) 7 6Eisai (2.48) 8 11AstraZeneca (2.48) 9 7Roche Holding (2.38) 10 19Pfizer (2.34) 11 14Merck & Co. (2.32) 12 5Gilead Sciences (2.29) 13 8Boehringer Ingelheim (2.11) 14 16Bristol-Myers Squibb (2.03) 15 13Bayer (1.88) 16 12AbbVie (1.88) 17 9Daiichi Sankyo (1.77) 18 18Astellas Pharma (1.46) 19 20Eli Lilly (1.27) 20 17 The Access to Medicine Index was developed starting in 2004 on the initiative of Dutch entrepreneur Wim Leereveld. After years of working with the pharmaceutical industry, he concluded that simply \"naming and shaming\" the industry did not do enough to encourage pharmaceutical companies to play their part in improving access to medicine in the developing world. Leereveld noticed that there were many different (and sometimes conflicting) opinions about what the pharmaceutical industry should be doing with regard to access to medicine, but that there was no tool to recognise good practice within the pharmaceutical industry and no framework for collective dialogue surrounding this issue. He set out to develop a ranking system that would show which pharmaceutical companies do the most to improve access to medicine and how, and also help stakeholders to collectively define companies ' role in increasing access to medicine. The first Access to Medicine Index was published in 2008, followed by a new index every two years. The 2017 methodology for the 2018 Access to Medicine Index was published in October 2017. The Access to Medicine Index uses a weighted analysis to capture and compare data which the companies provide. The framework is constructed along seven areas of focus called \"Technical Areas\" , which cover the range of company business activities considered relevant to access to medicine. Within each area, the index assesses four aspects of company action called \"Strategic Pillars\" : commitments, transparency, performance and innovation. Company scope The Access to Medicine Index ranks 20 of the world's largest originator (research-based) pharmaceutical companies, based on market capitalisation and the relevance of their product portfolios to diseases in the developing world. One unlisted company, Boehringer Ingelheim, is also included since it meets the size and portfolio relevance criteria. The Access to Medicine Index focuses on low and middle income countries, based on World Bank classifications measuring economic advancement, human development, and relative levels of inequality. and United Nations The 2018 Index measured developments in a total of 106 countries, including countries considered to be low income and lower-middle income countries by the World Bank, and Least Developed Countries as defined by the United Nations Economic and Social Council. In addition, countries classified as low human development countries and medium human development countries by the UN Human Development Index are included. Finally, based on the UN Inequality-Adjusted Human Development Index, the index includes countries which, while they may have higher measures of development, have comparatively high levels of socio-economic inequality. The top 11 communicable diseases based on DALYs from the WHO Global Health Observatory 2015 DALY Estimates The top 10 non-communicable diseases based on DALYs from the WHO Global Health Observatory 2015 DALY Estimates 20 of the WHO Neglected Tropical Diseases 10 maternal and neonatal health conditions identified by Every Woman Every Child. In addition, the index captures activity on contraceptives. 12 priority pathogens from the 2017 WHO priority pathogens list. 17 cancers with high disease burdens based on data from the WHO Global Cancer Observatory. 19 cancers with relevant products on the 2017 WHO Model List of Essential Medicines are in scope for technical areas relating to pricing, patenting and donations. Nine cancers are in both sets. To reflect the range of available product types for prevention, diagnosis and treatment of diseases, the index maintains a broad product type scope which draws closely from definitions provided by the G-Finder Report. Since its inception, the Access to Medicine Index has progressed to be a frequently cited and \"authoritative\" benchmark for pharmaceutical companies with regard to their access to medicine initiatives. In addition to global media outlets reporting on the Access to Medicine Index and its findings, significant coverage includes: In July 2008, Bill Gates mentioned the Access to Medicine Index in an interview with Time magazine as an example of an incentive that works to give businesses credit for what they are already doing to address the challenges of access to medicine in developing countries. In 2010 Paul Hunt , the former UN special rapporteur on the right to health, described the index as a way to measure the pharmaceutical industry's progress in line with human rights obligations. A 2010 UBS report called the index a tool for investors to assess access to medicine specifically and, where necessary, separately from corporate social responsibility frameworks. Since 2008, the Access to Medicine Index has been repeatedly cited in scientific journals such as the British Medical Journal, The Lancet and The Pharmaceutical Journal. Data from the 2014 Index was used in a study of access to hepatitis C medicines in the Bulletin of the World Health Organization. A 2014 Deutsche Bank report on pharmaceutical industry investment in malaria and neglected tropical diseases mentioned the index. The results of the Access to Medicine Index are largely based on company data provided by the pharmaceutical companies themselves. Self-reported data does carry with it an inherent risk, but the Access to Medicine Index also uses dependable external sources to verify data provided by the companies wherever possible. Additionally, it is in companies ' best interest to be as forthcoming as possible, as they are a) rated by the index on their degree of transparency and b) rated on their performance every two years, so that failures to meet their commitments and/or inconsistencies over time are likely to be uncovered. Besides, as drug access is only one dimension of the Corporate Social Responsibility (CSR) within the pharmaceutical industry, it would not be reasonable to evaluate the CSR practices of pharmaceutical companies only using this index.", "edit_actions": [{"type": "R", "before": "The", "after": "the", "start_char_pos": 132, "end_char_pos": 135}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 359, "end_char_pos": 360}, {"type": "R", "before": "Ranking", "after": "ranking", "start_char_pos": 896, "end_char_pos": 903}, {"type": "R", "before": "Ranking GlaxoSmithKline", "after": "rankingGlaxoSmithKline", "start_char_pos": 909, "end_char_pos": 932}, {"type": "R", "before": "2 Merck", "after": "2Merck", "start_char_pos": 989, "end_char_pos": 996}, {"type": "R", "before": "9 Daiichi", "after": "9Daiichi", "start_char_pos": 1329, "end_char_pos": 1338}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2299, "end_char_pos": 2300}, {"type": "R", "before": "Index", "after": "index", "start_char_pos": 2416, "end_char_pos": 2421}, {"type": "R", "before": "Methodology", "after": "methodology", "start_char_pos": 2448, "end_char_pos": 2459}, {"type": "R", "before": "\u2018Technical Areas\u2019", "after": "\"Technical Areas\"", "start_char_pos": 2703, "end_char_pos": 2720}, {"type": "R", "before": "Index", "after": "index", "start_char_pos": 2841, "end_char_pos": 2846}, {"type": "R", "before": "\u2018Strategic Pillars\u2019", "after": "\"Strategic Pillars\"", "start_char_pos": 2894, "end_char_pos": 2913}, {"type": "R", "before": "Scope", "after": "scope", "start_char_pos": 2979, "end_char_pos": 2984}, {"type": "R", "before": "Index", "after": "index", "start_char_pos": 4036, "end_char_pos": 4041}, {"type": "R", "before": "Index", "after": "index", "start_char_pos": 4540, "end_char_pos": 4545}, {"type": "R", "before": "Index", "after": "index", "start_char_pos": 5038, "end_char_pos": 5043}, {"type": "R", "before": "\u2018authoritative\u2019", "after": "\"authoritative\"", "start_char_pos": 5245, "end_char_pos": 5260}, {"type": "R", "before": "Magazine", "after": "magazine", "start_char_pos": 5570, "end_char_pos": 5578}, {"type": "D", "before": "(academic)", "after": null, "start_char_pos": 5769, "end_char_pos": 5779}, {"type": "R", "before": "Special Rapporteur", "after": "special rapporteur", "start_char_pos": 5796, "end_char_pos": 5814}, {"type": "R", "before": "Index", "after": "index", "start_char_pos": 5853, "end_char_pos": 5858}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 6918, "end_char_pos": 6919}, {"type": "R", "before": "Index", "after": "index", "start_char_pos": 6996, "end_char_pos": 7001}, {"type": "R", "before": "2", "after": "two", "start_char_pos": 7074, "end_char_pos": 7075}], "sents_char_pos": [0, 339, 554, 864, 890, 939, 958, 986, 1008, 1048, 1523, 1771, 2101, 2339, 2438, 2528, 2639, 2818, 2970, 3213, 3332, 3805, 3961, 4180, 4522, 4582, 4647, 4738, 4901, 4932, 5150, 5352, 5750, 5956, 6136, 6306, 6436, 6566, 6697, 6884, 7186]}
+{"doc_id": "39375", "revision_depth": "2", "before_revision": "Additional requirements for EVA include: Shielding against ultraviolet radiation Limited shielding against particle radiation Means to maneuver, dock, release, and /or tether onto a spacecraft Protection against small micrometeoroids, some traveling at up to 27,000 kilometers per hour, provided by a puncture-resistant Thermal Micrometeoroid Garment, which is the outermost layer of the suit. Experience has shown the greatest chance of exposure occurs near the gravitational field of a moon or planet, so these were first employed on the Apollo lunar EVA suits (see United States suit models below). During exploration of the Moon or Mars, there will be the potential for lunar / Martian dust to be retained on the space suit. When the space suit is removed on return to the spacecraft, there will be the potential for the dust to contaminate surfaces and increase the risks of inhalation and skin exposure. Astronautical hygienists are testing materials with reduced dust retention times and the potential to control the dust exposure risks during planetary exploration. Novel ingress / egress approaches, such as suitports, are being explored as well. In NASA space suits, communications are provided via a cap worn over the head, which includes earphones and a microphone. Due to the coloration of the version used for Apollo and Skylab, which resembled the coloration of the comic strip character Snoopy, these caps became known as \"Snoopy caps . \" Temperature in space can vary extremely depending on where the sun is. Temperatures from solar radiation can reach up to and lower down to . Because of this, space suits must provide proper insulation and cooling. A space suit should allow its user natural unencumbered movement. Nearly all designs try to maintain a constant volume no matter what movements the wearer makes. This is because mechanical work is needed to change the volume of a constant pressure system. If flexing a joint reduces the volume of the space suit, then the astronaut must do extra work every time he bends that joint, and he has to maintain a force to keep the joint bent. Even if this force is very small, it can be seriously fatiguing to constantly fight against one's suit. It also makes delicate movements very difficult. The work required to bend a joint is dictated by the formula All space suit designs try to minimize or eliminate this problem. The most common solution is to form the suit out of multiple layers. The bladder layer is a rubbery, airtight layer much like a balloon. The restraint layer goes outside the bladder, and provides a specific shape for the suit. Since the bladder layer is larger than the restraint layer, the restraint takes all of the stresses caused by the pressure inside the suit. Since the bladder is not under pressure, it will not \"pop\" like a balloon, even if punctured. The restraint layer is shaped in such a way that bending a joint causes pockets of fabric, called \"gores , \" to open up on the outside of the joint, while folds called \"convolutes\" fold up on the inside of the joint. The gores make up for the volume lost on the inside of the joint, and keep the suit at a nearly constant volume. However, once the gores are opened all the way, the joint cannot be bent any further without a considerable amount of work. Soft suits Soft suits typically are made mostly of fabrics. All soft suits have some hard parts , some even have hard joint bearings. Intra-vehicular activity and early EVA suits were soft suits. Hard-shell suits Hard-shell suits are usually made of metal or composite materials and do not use fabric for joints. Hard suits joints use ball bearings and wedge-ring segments similar to an adjustable elbow of a stove pipe to allow a wide range of movement with the arms and legs. The joints maintain a constant volume of air internally and do not have any counter force . Therefore, the astronaut does not need to exert to hold the suit in any position. Hard suits can also operate at higher pressures which would eliminate the need for an astronaut to pre-breathe oxygen to use a space suit before an EVA from a spacecraft cabin. The joints may get into a restricted or locked position requiring the astronaut to manipulate or program the joint. The NASA Ames Research Center experimental AX-5 hard-shell space suit had a flexibility rating of 95\\%. The wearer could move into 95\\% of the positions he or she could without the suit on. Related preceding technologies include the gas mask used in World War II, the oxygen mask used by pilots of high flying bombers in World War II, the high altitude or vacuum suit required by pilots of the Lockheed U-2 and SR-71 Blackbird, the diving suit, rebreather, scuba diving gear, and many others. Many space suit designs are taken from the U.S. Air Force suits, which are designed to work in \u201chigh altitude aircraft pressure[s] ,\u201d such as the Mercury IVA suit or the Gemini G4C, or the Advanced Crew Escape Suits. The Mercury IVA, the first U.S. space suit design, included lights at the tips of the gloves in order to provide visual aid. As the need for extravehicular activity grew, suits such as the Apollo A7L included gloves made of a metal fabric called Chromel-r in order to prevent punctures. In order to retain a better sense of touch for the astronauts, the fingertips of the gloves were made of silicone. With the shuttle program, it became necessary to be able to operate spacecraft modules, so the ACES suits featured gripping on the gloves. EMU gloves, which are used for spacewalks, are heated to keep the astronaut's hands warm. The Phase VI gloves, meant for use with the Mark III suit, are the first gloves to be designed with \"laser scanning technology, 3D computer modeling, stereo lithography, laser cutting technology and CNC machining . \" This allows for cheaper, more accurate production, as well as increased detail in joint mobility and flexibility. The development of the spheroidal dome helmet was key in balancing the need for field of view, pressure compensation, and low weight. One inconvenience with some space suits is the head being fixed facing forwards and being unable to turn to look sideways. Astronauts call this effect \"alligator head . \" Soviet and Russian suit models SK series (CK) , the spacesuit used for the Vostok program (1961\u20131963). Worn by Yuri Gagarin on the first crewed space flight. No pressure suits were worn aboard Voskhod 1. Berkut (\u0411\u0435\u0440\u043a\u0443\u0442 = \"golden eagle\") , the spacesuit was a modified SK-1 used by the crew of Voskhod 2 which included Alexei Leonov on the first spacewalk during (1965). From Soyuz 1 to Soyuz 11 (1967\u20131971) no pressure suits were worn during launch and reentry. Yastreb (\u042f\u0441\u0442\u0440\u0435\u0431 = \"hawk\")extravehicular activity spacesuit used during a crew exchange between Soyuz 4 and Soyuz 5 (1969). Krechet-94 (\u041a\u0440\u0435\u0447\u0435\u0442 = \"gyrfalcon\") spacesuit, designed for the canceled Soviet crewed Moon landing. Strizh (\u0421\u0442\u0440\u0438\u0436 = \"swift (bird)\") spacesuit developed for pilots of Buran-class orbiters. Sokol (\u0421\u043e\u043a\u043e\u043b = \"falcon\")suits worn by Soyuz crew members during launch and reentry They were first worn on Soyuz 12. They have been used from 1973 to present. Orlan (\u041e\u0440\u043b\u0430\u043d = \"sea-eagle\" or \"bald eagle\")suits for extravehicular activity, originally developed for the Soviet lunar program as a lunar orbit EVA suit. It is Russia's current EVA suit. Used from 1977 to present. United States suit models In the early 1950s, Siegfried Hansen and colleagues at Litton Industries designed and built a working hard-shell suit, which was used inside vacuum chambers and was the predecessor of space suits used in NASA missions. Navy Mark IV high-altitude/vacuum suit used for Project Mercury (1961\u20131963). Gemini space suits (1965\u20131966) , there were three main variants developed: G3C designed for intra-vehicle use; G4C specially designed for EVA and intra-vehicle use; and a special G5C suit worn by the Gemini 7 crew for 14 days inside the spacecraft. Manned Orbital Laboratory MH-7 space suits for the canceled MOL program. Apollo Block I A1C suit (1966\u20131967) was a derivative of the Gemini suit, worn by primary and backup crews in training for two early Apollo missions. The nylon pressure garment melted and burned through in the Apollo 1 cabin fire. This suit became obsolete when crewed Block I Apollo flights were discontinued after the fire. Apollo/Skylab A7L EVA and Moon suits. The Block II Apollo suit was the primary pressure suit worn for eleven Apollo flights, three Skylab flights, and the US astronauts on the Apollo\u2013Soyuz Test Project between 1968 and 1975. The pressure garment's nylon outer layer was replaced with fireproof Beta cloth after the Apollo 1 fire. This suit was the first to employ a liquid-cooled inner garment and outer micrometeroid garment. Beginning with the Apollo 13 mission, it also introduced \"commander's stripes\" so that a pair of space walkers will not appear identical on camera. Shuttle Ejection Escape Suit used from STS-1 (1981) to STS-4 (1982) by a two-man crew used in conjunction with the then-installed ejection seats. Derived from a USAF model.Thomas & McMann 2006, pp. 38, 368 These were removed once the Shuttle became certified. From STS-5 (1982) to STS-51-L (1986) no pressure suits were worn during launch and reentry. The crew would wear only a blue-flight suit with an oxygen helmet. Launch Entry Suit first used on STS-26 (1988), the first flight after the Challenger disaster. It was a partial pressure suit derived from a USAF model.Thomas & McMann 2006 It was used from 1988 to 1998. Advanced Crew Escape Suit used on the Space Shuttle starting in 1994. The Advanced Crew Escape Suit or ACES suit, is a full-pressure suit worn by all Space Shuttle crews for the ascent and entry portions of flight. The suit is a direct descendant of the United States Air Force high-altitude pressure suits worn by SR-71 Blackbird and U-2 spy plane pilots, North American X-15 and Gemini pilot-astronauts, and the Launch Entry Suits worn by NASA astronauts starting on the STS-26 flight. It is derived from a USAF model. Extravehicular Mobility Unit (EMU)used on both the Space Shuttle and International Space Station (ISS). The EMU is an independent anthropomorphic system that provides environmental protection, mobility, life support, and communications for a Space Shuttle or ISS crew member to perform an EVA in Earth orbit. Used from 1982 to present, but only available in limited sizing as of 2019. Aerospace company SpaceX developed an IVA suit which is worn by astronauts involved in Commercial Crew Program missions operated by SpaceX since the Demo-2 mission (see #SpaceX suit (\"Starman suit\")). Orion Crew Survival System (OCSS)will be used during launch and re-entry on the Orion MPCV. It is derived from the Advanced Crew Escape Suit but is able to operate at a higher pressure and has improved mobility in the shoulders. Chinese suit models Shuguang space suit: First generation EVA space suit developed by China for the 1967 canceled Project 714 crewed space program. It has a mass of about , has an orange colour, and is made of high-resistance multi-layer polyester fabric. The astronaut could use it inside the cabin and conduct an EVA as well. 'Project 863 space suit: Cancelled project of second generation Chinese EVA space suit. Shenzhou IVA (\u795e\u821f) space suit: The suit was first worn by Yang Liwei on Shenzhou 5, the first crewed Chinese space flight, it closely resembles a Sokol-KV2 suit, but it is believed to be a Chinese-made version rather than an actual Russian suit.Seedhouse 2010, p. 180 Pictures show that the suits on Shenzhou 6 differ in detail from the earlier suit , they are also reported to be lighter. Haiying (\u6d77\u9e70\u53f7\u822a\u5929\u670d) EVA space suit: The imported Russian Orlan-M EVA suit is called Haiying. Used on Shenzhou 7. Feitian (\u98de\u5929\u53f7\u822a\u5929\u670d) EVA space suit: New generation indigenously developed Chinese-made EVA space suit also used for the Shenzhou 7 mission. The suit was designed for a spacewalk mission of up to seven hours. Chinese astronauts have been training in the out-of-capsule space suits since July 2007, and movements are seriously restricted in the suits, with a mass of more than each. The Aouda.X and Aouda.S space suits have been named after the fictional princess from the Jules Verne's 1873 novel Around the World in Eighty Days and can be followed on Facebook . A public display mock-up of Aouda.X (called Aouda.D) is currently on display at the Dachstein Ice Cave in Obertraun, Austria, after the experiments done there in 2012. On June 11, 2008, NASA awarded a US $745 million contract to Oceaneering International to create the new space suit. Final Frontier Design IVA Space Suit upFinal Frontier Design IVA Space Suit Final Frontier Design (FFD) is developing a commercial full IVA space suit, with their first suit completed in 2010. FFD's suits are intended as a light-weight, highly mobile, and inexpensive commercial space suits. Since 2011, FFD has upgraded IVA suit's designs, hardware, processes, and capabilities. FFD has built a total of 7 IVA space suit (2016) assemblies for various institutions and customers since founding, and has conducted high fidelity human testing in simulators, aircraft, microgravity, and hypobaric chambers. FFD has a Space Act Agreement with NASA's Commercial Space Capabilities Office to develop and execute a Human Rating Plan for FFD IVA suit. FFD categorizes their IVA suits according to their mission: Terra for Earth-based testing, Stratos for high altitude flights, and Exos for orbital space flights. Each suit category has different requirements for manufacturing controls, validations, and materials, but are of a similar architecture. I-Suit The I-Suit is a space suit prototype also constructed by ILC Dover, which incorporates several design improvements over the EMU, including a weight-saving soft upper torso. Both the Mark III and the I-Suit have taken part in NASA's annual Desert Research and Technology Studies (D-RATS) field trials, during which suit occupants interact with one another, and with rovers and other equipment. Mark III The Mark III is a NASA prototype, constructed by ILC Dover, which incorporates a hard lower torso section and a mix of soft and hard components. The Mark III is markedly more mobile than previous suits, despite its high operating pressure (), which makes it a \"zero-prebreathe\" suit, meaning that astronauts would be able to transition directly from a one atmosphere, mixed-gas space station environment, such as that on the International Space Station, to the suit, without risking decompression sickness, which can occur with rapid depressurization from an atmosphere containing nitrogen or another inert gas. MX-2 The MX-2 is a space suit analogue constructed at the University of Maryland's Space Systems Laboratory. The MX-2 is used for crewed neutral buoyancy testing at the Space Systems Lab's Neutral Buoyancy Research Facility. By approximating the work envelope of a real EVA suit, without meeting the requirements of a flight-rated suit, the MX-2 provides an inexpensive platform for EVA research, compared to using EMU suits at facilities like NASA's Neutral Buoyancy Laboratory. The MX-2 has an operating pressure of 2.5\u20134 psi. It is a rear-entry suit, featuring a fiberglass HUT. Air, LCVG cooling water, and power are open loop systems, provided through an umbilical. The suit contains a Mac mini computer to capture sensor data, such as suit pressure, inlet and outlet air temperatures, and heart rate. Resizable suit elements and adjustable ballast allow the suit to accommodate subjects ranging in height from , and with a weight range of . North Dakota suit Beginning in May 2006, five North Dakota colleges collaborated on a new space suit prototype, funded by a US$ 100,000 grant from NASA, to demonstrate technologies which could be incorporated into a planetary suit. The suit was tested in the Theodore Roosevelt National Park badlands of western North Dakota. The suit has a mass of without a life support backpack, and costs only a fraction of the standard US$12,000,000 cost for a flight-rated NASA space suit. The suit was developed in just over a year by students from the University of North Dakota, North Dakota State, Dickinson State, the state College of Science and Turtle Mountain Community College. The mobility of the North Dakota suit can be attributed to its low operating pressure; while the North Dakota suit was field tested at a pressure of differential, NASA's EMU suit operates at a pressure of , a pressure designed to supply approximately sea-level oxygen partial pressure for respiration (see discussion above). In 2014, NASA released the design for the Z-2 prototype, the next model in the Z-series. NASA conducted a poll asking the public to decide on a design for the Z-2 space suit. The designs, created by fashion students from Philadelphia University, were \"Technology\", \"Trends in Society\", and \"Biomimicry . \" The design \"Technology\" won, and the prototype is built with technologies like 3D printing. The Z-2 suit will also differ from the Z-1 suit in that the torso reverts to the hard shell, as seen in NASA's EMU suit. \u2013 lists: By era:", "after_revision": "Additional requirements for EVA include: Shielding against ultraviolet radiation Limited shielding against particle radiation Means to maneuver, dock, release, and tether onto a spacecraft Protection against small micrometeoroids, some traveling at up to 27,000 kilometers per hour, provided by a puncture-resistant Thermal Micrometeoroid Garment, which is the outermost layer of the suit. Experience has shown the greatest chance of exposure occurs near the gravitational field of a moon or planet, so these were first employed on the Apollo lunar EVA suits (see United States suit models below). During exploration of the Moon or Mars, there will be the potential for lunar or Martian dust to be retained on the space suit. When the space suit is removed on return to the spacecraft, there will be the potential for the dust to contaminate surfaces and increase the risks of inhalation and skin exposure. Astronautical hygienists are testing materials with reduced dust retention times and the potential to control the dust exposure risks during planetary exploration. Novel ingress and egress approaches, such as suitports, are being explored as well. In NASA space suits, communications are provided via a cap worn over the head, which includes earphones and a microphone. Due to the coloration of the version used for Apollo and Skylab, which resembled the coloration of the comic strip character Snoopy, these caps became known as \"Snoopy caps \" . Temperature in space can vary extremely depending on where the Sun is. Temperatures from solar radiation can reach up to and lower down to . Because of this, space suits must provide proper insulation and cooling. A space suit should allow its user natural unencumbered movement. Nearly all designs try to maintain a constant volume no matter what movements the wearer makes. This is because mechanical work is needed to change the volume of a constant pressure system. If flexing a joint reduces the volume of the space suit, then the astronaut must do extra work every time they bend that joint, and they have to maintain a force to keep the joint bent. Even if this force is very small, it can be seriously fatiguing to constantly fight against one's suit. It also makes delicate movements very difficult. The work required to bend a joint is dictated by the formula All space suit designs try to minimize or eliminate this problem. The most common solution is to form the suit out of multiple layers. The bladder layer is a rubbery, airtight layer much like a balloon. The restraint layer goes outside the bladder, and provides a specific shape for the suit. Since the bladder layer is larger than the restraint layer, the restraint takes all of the stresses caused by the pressure inside the suit. Since the bladder is not under pressure, it will not \"pop\" like a balloon, even if punctured. The restraint layer is shaped in such a way that bending a joint causes pockets of fabric, called \"gores \" , to open up on the outside of the joint, while folds called \"convolutes\" fold up on the inside of the joint. The gores make up for the volume lost on the inside of the joint, and keep the suit at a nearly constant volume. However, once the gores are opened all the way, the joint cannot be bent any further without a considerable amount of work. Soft suits Soft suits typically are made mostly of fabrics. All soft suits have some hard parts ; some even have hard joint bearings. Intra-vehicular activity and early EVA suits were soft suits. Hard-shell suits Hard-shell suits are usually made of metal or composite materials and do not use fabric for joints. Hard suits joints use ball bearings and wedge-ring segments similar to an adjustable elbow of a stove pipe to allow a wide range of movement with the arms and legs. The joints maintain a constant volume of air internally and do not have any counter-force . Therefore, the astronaut does not need to exert to hold the suit in any position. Hard suits can also operate at higher pressures which would eliminate the need for an astronaut to pre-breathe oxygen to use a space suit before an EVA from a spacecraft cabin. The joints may get into a restricted or locked position requiring the astronaut to manipulate or program the joint. The NASA Ames Research Center experimental AX-5 hard-shell space suit had a flexibility rating of 95\\%. The wearer could move into 95\\% of the positions they could without the suit on. Related preceding technologies include the gas mask used in World War II, the oxygen mask used by pilots of high-flying bombers in World War II, the high-altitude or vacuum suit required by pilots of the Lockheed U-2 and SR-71 Blackbird, the diving suit, rebreather, scuba diving gear, and many others. Many space suit designs are taken from the U.S. Air Force suits, which are designed to work in \"high-altitude aircraft pressure[s] \", such as the Mercury IVA suit or the Gemini G4C, or the Advanced Crew Escape Suits. The Mercury IVA, the first U.S. space suit design, included lights at the tips of the gloves in order to provide visual aid. As the need for extravehicular activity grew, suits such as the Apollo A7L included gloves made of a metal fabric called Chromel-r in order to prevent punctures. In order to retain a better sense of touch for the astronauts, the fingertips of the gloves were made of silicone. With the shuttle program, it became necessary to be able to operate spacecraft modules, so the ACES suits featured gripping on the gloves. EMU gloves, which are used for spacewalks, are heated to keep the astronaut's hands warm. The Phase VI gloves, meant for use with the Mark III suit, are the first gloves to be designed with \"laser scanning technology, 3D computer modeling, stereo lithography, laser cutting technology and CNC machining \" . This allows for cheaper, more accurate production, as well as increased detail in joint mobility and flexibility. The development of the spheroidal dome helmet was key in balancing the need for field of view, pressure compensation, and low weight. One inconvenience with some space suits is the head being fixed facing forwards and being unable to turn to look sideways. Astronauts call this effect \"alligator head \" . Soviet and Russian suit models SK series (CK) the spacesuit used for the Vostok program (1961\u20131963). Worn by Yuri Gagarin on the first crewed space flight. No pressure suits were worn aboard Voskhod 1. Berkut (\u0411\u0435\u0440\u043a\u0443\u0442 meaning \"golden eagle\") the spacesuit was a modified SK-1 used by the crew of Voskhod 2 which included Alexei Leonov on the first spacewalk during (1965). From Soyuz 1 to Soyuz 11 (1967\u20131971) no pressure suits were worn during launch and reentry. Yastreb (\u042f\u0441\u0442\u0440\u0435\u0431 meaning \"hawk\")extravehicular activity spacesuit used during a crew exchange between Soyuz 4 and Soyuz 5 (1969). Krechet-94 (\u041a\u0440\u0435\u0447\u0435\u0442 meaning \"gyrfalcon\") designed for the canceled Soviet crewed Moon landing. Strizh (\u0421\u0442\u0440\u0438\u0436 meaning \"swift (bird)\") developed for pilots of Buran-class orbiters. Sokol (\u0421\u043e\u043a\u043e\u043b meaning \"falcon\")suits worn by Soyuz crew members during launch and reentry . They were first worn on Soyuz 12. They have been used from 1973 to present. Orlan (\u041e\u0440\u043b\u0430\u043d meaning \"sea-eagle\" or \"bald eagle\")suits for extravehicular activity, originally developed for the Soviet lunar program as a lunar orbit EVA suit. It is Russia's current EVA suit. Used from 1977 to present. United States suit models In the early 1950s, Siegfried Hansen and colleagues at Litton Industries designed and built a working hard-shell suit, which was used inside vacuum chambers and was the predecessor of space suits used in NASA missions. Navy Mark IV high-altitude/vacuum suitused for Project Mercury (1961\u20131963). Gemini space suits (1965\u20131966) there were three main variants developed: G3C designed for intra-vehicle use; G4C specially designed for EVA and intra-vehicle use; and a special G5C suit worn by the Gemini 7 crew for 14 days inside the spacecraft. Manned Orbiting Laboratory MH-7 space suits for the canceled MOL program. Apollo Block I A1C suit (1966\u20131967) a derivative of the Gemini suit, worn by primary and backup crews in training for two early Apollo missions. The nylon pressure garment melted and burned through in the Apollo 1 cabin fire. This suit became obsolete when crewed Block I Apollo flights were discontinued after the fire. Apollo/Skylab A7L EVA and Moon suitsThe Block II Apollo suit was the primary pressure suit worn for eleven Apollo flights, three Skylab flights, and the US astronauts on the Apollo\u2013Soyuz Test Project between 1968 and 1975. The pressure garment's nylon outer layer was replaced with fireproof Beta cloth after the Apollo 1 fire. This suit was the first to employ a liquid-cooled inner garment and outer micrometeroid garment. Beginning with the Apollo 13 mission, it also introduced \"commander's stripes\" so that a pair of space walkers will not appear identical on camera. Shuttle Ejection Escape Suitused from STS-1 (1981) to STS-4 (1982) by a two-man crew used in conjunction with the then-installed ejection seats. Derived from a USAF model.Thomas & McMann 2006, pp. 38, 368 These were removed once the Shuttle became certified. From STS-5 (1982) to STS-51-L (1986) no pressure suits were worn during launch and reentry. The crew would wear only a blue-flight suit with an oxygen helmet. Launch Entry Suit first used on STS-26 (1988), the first flight after the Challenger disaster. It was a partial pressure suit derived from a USAF model.Thomas & McMann 2006 It was used from 1988 to 1998. Advanced Crew Escape Suit used on the Space Shuttle starting in 1994. The Advanced Crew Escape Suit or ACES suit, is a full-pressure suit worn by all Space Shuttle crews for the ascent and entry portions of flight. The suit is a direct descendant of the United States Air Force high-altitude pressure suits worn by SR-71 Blackbird and U-2 spy plane pilots, North American X-15 and Gemini pilot-astronauts, and the Launch Entry Suits worn by NASA astronauts starting on the STS-26 flight. It is derived from a USAF model. Extravehicular Mobility Unit (EMU)used on both the Space Shuttle and International Space Station (ISS). The EMU is an independent anthropomorphic system that provides environmental protection, mobility, life support, and communications for a Space Shuttle or ISS crew member to perform an EVA in Earth orbit. Used from 1982 to present, but only available in limited sizing as of 2019. Aerospace company SpaceX developed an IVA suit which is worn by astronauts involved in Commercial Crew Program missions operated by SpaceX since the Demo-2 mission (see #SpaceX suit (\"Starman suit\")). Orion Crew Survival System (OCSS)will be used during launch and re-entry on the Orion MPCV. It is derived from the Advanced Crew Escape Suit but is able to operate at a higher pressure and has improved mobility in the shoulders. Chinese suit models Shuguang space suit: First generation EVA space suit developed by China for the 1967 canceled Project 714 crewed space program. It has a mass of about , has an orange colour, and is made of high-resistance multi-layer polyester fabric. The astronaut could use it inside the cabin and conduct an EVA as well. 'Project 863 space suit: Cancelled project of second generation Chinese EVA space suit. Shenzhou IVA (\u795e\u821f) space suit: The suit was first worn by Yang Liwei on Shenzhou 5, the first crewed Chinese space flight, it closely resembles a Sokol-KV2 suit, but it is believed to be a Chinese-made version rather than an actual Russian suit.Seedhouse 2010, p. 180 Pictures show that the suits on Shenzhou 6 differ in detail from the earlier suit ; they are also reported to be lighter. Haiying (\u6d77\u9e70\u53f7\u822a\u5929\u670d) EVA space suit: The imported Russian Orlan-M EVA suit is called Haiying. Used on Shenzhou 7. Feitian (\u98de\u5929\u53f7\u822a\u5929\u670d) EVA space suit: New generation indigenously developed Chinese-made EVA space suit also used for the Shenzhou 7 mission. The suit was designed for a spacewalk mission of up to seven hours. Chinese astronauts have been training in the out-of-capsule space suits since July 2007, and movements are seriously restricted in the suits, with a mass of more than each. The Aouda.X and Aouda.S space suits have been named after the fictional princess from the Jules Verne's 1873 novel Around the World in Eighty Days . A public display mock-up of Aouda.X (called Aouda.D) is currently on display at the Dachstein Ice Cave in Obertraun, Austria, after the experiments done there in 2012. On June 11, 2008, NASA awarded a US $745 million contract to Oceaneering International to create the new space suit. Final Frontier Design IVA Space Suit upFinal Frontier Design IVA Space Suit Final Frontier Design (FFD) is developing a commercial full IVA space suit, with their first suit completed in 2010. FFD's suits are intended as a light-weight, highly mobile, and inexpensive commercial space suits. Since 2011, FFD has upgraded IVA suit's designs, hardware, processes, and capabilities. FFD has built a total of 7 IVA space suit (2016) assemblies for various institutions and customers since founding, and has conducted high fidelity human testing in simulators, aircraft, microgravity, and hypobaric chambers. FFD has a Space Act Agreement with NASA's Commercial Space Capabilities Office to develop and execute a Human Rating Plan for FFD IVA suit. FFD categorizes their IVA suits according to their mission: Terra for Earth-based testing, Stratos for high altitude flights, and Exos for orbital space flights. Each suit category has different requirements for manufacturing controls, validations, and materials, but are of a similar architecture. I-Suit The I-Suit is a space suit prototype also constructed by ILC Dover, which incorporates several design improvements over the EMU, including a weight-saving soft upper torso. Both the Mark III and the I-Suit have taken part in NASA's annual Desert Research and Technology Studies (D-RATS) field trials, during which suit occupants interact with one another, and with rovers and other equipment. Mark III The Mark III is a NASA prototype, constructed by ILC Dover, which incorporates a hard lower torso section and a mix of soft and hard components. The Mark III is markedly more mobile than previous suits, despite its high operating pressure (), which makes it a \"zero-prebreathe\" suit, meaning that astronauts would be able to transition directly from a one-atmosphere, mixed-gas space station environment, such as that on the International Space Station, to the suit, without risking decompression sickness, which can occur with rapid depressurization from an atmosphere containing nitrogen or another inert gas. MX-2 The MX-2 is a space suit analogue constructed at the University of Maryland's Space Systems Laboratory. The MX-2 is used for crewed neutral buoyancy testing at the Space Systems Lab's Neutral Buoyancy Research Facility. By approximating the work envelope of a real EVA suit, without meeting the requirements of a flight-rated suit, the MX-2 provides an inexpensive platform for EVA research, compared to using EMU suits at facilities like NASA's Neutral Buoyancy Laboratory. The MX-2 has an operating pressure of 2.5\u20134 psi. It is a rear-entry suit, featuring a fiberglass HUT. Air, LCVG cooling water, and power are open loop systems, provided through an umbilical. The suit contains a Mac Mini computer to capture sensor data, such as suit pressure, inlet and outlet air temperatures, and heart rate. Resizable suit elements and adjustable ballast allow the suit to accommodate subjects ranging in height from , and with a weight range of . North Dakota suit Beginning in May 2006, five North Dakota colleges collaborated on a new space suit prototype, funded by a US$ 100,000 grant from NASA, to demonstrate technologies which could be incorporated into a planetary suit. The suit was tested in the Theodore Roosevelt National Park badlands of western North Dakota. The suit has a mass of without a life support backpack, and costs only a fraction of the standard US$12,000,000 cost for a flight-rated NASA space suit. The suit was developed in just over a year by students from the University of North Dakota, North Dakota State, Dickinson State, the state College of Science and Turtle Mountain Community College. The mobility of the North Dakota suit can be attributed to its low operating pressure; while the North Dakota suit was field tested at a pressure of differential, NASA's EMU suit operates at a pressure of , a pressure designed to supply approximately sea-level oxygen partial pressure for respiration (see discussion above). In 2014, NASA released the design for the Z-2 prototype, the next model in the Z-series. NASA conducted a poll asking the public to decide on a design for the Z-2 space suit. The designs, created by fashion students from Philadelphia University, were \"Technology\", \"Trends in Society\", and \"Biomimicry \" . The design \"Technology\" won, and the prototype is built with technologies like 3D printing. The Z-2 suit will also differ from the Z-1 suit in that the torso reverts to the hard shell, as seen in NASA's EMU suit. By era:", "edit_actions": [{"type": "D", "before": "/or", "after": null, "start_char_pos": 164, "end_char_pos": 167}, {"type": "R", "before": "/", "after": "or", "start_char_pos": 680, "end_char_pos": 681}, {"type": "R", "before": "/", "after": "and", "start_char_pos": 1088, "end_char_pos": 1089}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1451, "end_char_pos": 1452}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1455, "end_char_pos": 1455}, {"type": "R", "before": "sun", "after": "Sun", "start_char_pos": 1519, "end_char_pos": 1522}, {"type": "R", "before": "he bends", "after": "they bend", "start_char_pos": 2032, "end_char_pos": 2040}, {"type": "R", "before": "he has", "after": "they have", "start_char_pos": 2057, "end_char_pos": 2063}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2954, "end_char_pos": 2955}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2958, "end_char_pos": 2958}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 3400, "end_char_pos": 3401}, {"type": "R", "before": "counter force", "after": "counter-force", "start_char_pos": 3858, "end_char_pos": 3871}, {"type": "R", "before": "he or she", "after": "they", "start_char_pos": 4402, "end_char_pos": 4411}, {"type": "R", "before": "high flying", "after": "high-flying", "start_char_pos": 4547, "end_char_pos": 4558}, {"type": "R", "before": "high altitude", "after": "high-altitude", "start_char_pos": 4588, "end_char_pos": 4601}, {"type": "R", "before": "\u201chigh altitude", "after": "\"high-altitude", "start_char_pos": 4837, "end_char_pos": 4851}, {"type": "R", "before": ",\u201d", "after": "\",", "start_char_pos": 4873, "end_char_pos": 4875}, {"type": "D", "before": ".", "after": null, "start_char_pos": 5803, "end_char_pos": 5804}, {"type": "A", "before": null, "after": ".", "start_char_pos": 5807, "end_char_pos": 5807}, {"type": "D", "before": ".", "after": null, "start_char_pos": 6223, "end_char_pos": 6224}, {"type": "A", "before": null, "after": ".", "start_char_pos": 6227, "end_char_pos": 6227}, {"type": "D", "before": ",", "after": null, "start_char_pos": 6274, "end_char_pos": 6275}, {"type": "R", "before": "=", "after": "meaning", "start_char_pos": 6447, "end_char_pos": 6448}, {"type": "D", "before": ",", "after": null, "start_char_pos": 6465, "end_char_pos": 6466}, {"type": "R", "before": "=", "after": "meaning", "start_char_pos": 6706, "end_char_pos": 6707}, {"type": "R", "before": "=", "after": "meaning", "start_char_pos": 6832, "end_char_pos": 6833}, {"type": "D", "before": "spacesuit,", "after": null, "start_char_pos": 6847, "end_char_pos": 6857}, {"type": "R", "before": "=", "after": "meaning", "start_char_pos": 6926, "end_char_pos": 6927}, {"type": "D", "before": "spacesuit", "after": null, "start_char_pos": 6944, "end_char_pos": 6953}, {"type": "R", "before": "=", "after": "meaning", "start_char_pos": 7013, "end_char_pos": 7014}, {"type": "A", "before": null, "after": ".", "start_char_pos": 7083, "end_char_pos": 7083}, {"type": "R", "before": "=", "after": "meaning", "start_char_pos": 7173, "end_char_pos": 7174}, {"type": "R", "before": "suit used", "after": "suitused", "start_char_pos": 7654, "end_char_pos": 7663}, {"type": "D", "before": ",", "after": null, "start_char_pos": 7728, "end_char_pos": 7729}, {"type": "R", "before": "Orbital", "after": "Orbiting", "start_char_pos": 7953, "end_char_pos": 7960}, {"type": "D", "before": "was", "after": null, "start_char_pos": 8055, "end_char_pos": 8058}, {"type": "R", "before": "suits. The", "after": "suitsThe", "start_char_pos": 8375, "end_char_pos": 8385}, {"type": "R", "before": "Suit used", "after": "Suitused", "start_char_pos": 8943, "end_char_pos": 8952}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 11643, "end_char_pos": 11644}, {"type": "D", "before": "and can be followed on Facebook", "after": null, "start_char_pos": 12318, "end_char_pos": 12349}, {"type": "R", "before": "$745 million contract to Oceaneering International to create the new space suit. Final Frontier Design IVA Space Suit upFinal Frontier Design IVA Space Suit Final Frontier Design (FFD) is developing a commercial full IVA space suit, with their first suit completed in 2010. FFD's suits are intended as a light-weight, highly mobile, and inexpensive commercial space suits. Since 2011, FFD has upgraded IVA suit's designs, hardware, processes, and capabilities. FFD has built a total of 7 IVA space suit (2016) assemblies for various institutions and customers since founding, and has conducted high fidelity human testing in simulators, aircraft, microgravity, and hypobaric chambers. FFD has a Space Act Agreement with NASA's Commercial Space Capabilities Office to develop and execute a Human Rating Plan for FFD IVA suit. FFD categorizes their IVA suits according to their mission: Terra for Earth-based testing, Stratos for high altitude flights, and Exos for orbital space flights. Each suit category has different requirements for manufacturing controls, validations, and materials, but are of a similar architecture. I-Suit The I-Suit is a space suit prototype also constructed by ILC Dover, which incorporates several design improvements over the EMU, including a weight-saving soft upper torso. Both the Mark III and the I-Suit have taken part in NASA's annual Desert Research and Technology Studies (D-RATS) field trials, during which suit occupants interact with one another, and with rovers and other equipment. Mark III The Mark III is a NASA prototype, constructed by ILC Dover, which incorporates a hard lower torso section and a mix of soft and hard components. The Mark III is markedly more mobile than previous suits, despite its high operating pressure (), which makes it a \"zero-prebreathe\" suit, meaning that astronauts would be able to transition directly from a one atmosphere, mixed-gas space station environment, such as that on the International Space Station, to the suit, without risking decompression sickness, which can occur with rapid depressurization from an atmosphere containing nitrogen or another inert gas. MX-2 The MX-2 is a space suit analogue constructed at the University of Maryland's Space Systems Laboratory. The MX-2 is used for crewed neutral buoyancy testing at the Space Systems Lab's Neutral Buoyancy Research Facility. By approximating the work envelope of a real EVA suit, without meeting the requirements of a flight-rated suit, the MX-2 provides an inexpensive platform for EVA research, compared to using EMU suits at facilities like NASA's Neutral Buoyancy Laboratory. The MX-2 has an operating pressure of 2.5\u20134 psi. It is a rear-entry suit, featuring a fiberglass HUT. Air, LCVG cooling water, and power are open loop systems, provided through an umbilical. The suit contains a Mac mini computer to capture sensor data, such as suit pressure, inlet and outlet air temperatures, and heart rate. Resizable suit elements and adjustable ballast allow the suit to accommodate subjects ranging in height from , and with a weight range of . North Dakota suit Beginning in May 2006, five North Dakota colleges collaborated on a new space suit prototype, funded by a US$", "after": "$745 million contract to Oceaneering International to create the new space suit. Final Frontier Design IVA Space Suit upFinal Frontier Design IVA Space Suit Final Frontier Design (FFD) is developing a commercial full IVA space suit, with their first suit completed in 2010. FFD's suits are intended as a light-weight, highly mobile, and inexpensive commercial space suits. Since 2011, FFD has upgraded IVA suit's designs, hardware, processes, and capabilities. FFD has built a total of 7 IVA space suit (2016) assemblies for various institutions and customers since founding, and has conducted high fidelity human testing in simulators, aircraft, microgravity, and hypobaric chambers. FFD has a Space Act Agreement with NASA's Commercial Space Capabilities Office to develop and execute a Human Rating Plan for FFD IVA suit. FFD categorizes their IVA suits according to their mission: Terra for Earth-based testing, Stratos for high altitude flights, and Exos for orbital space flights. Each suit category has different requirements for manufacturing controls, validations, and materials, but are of a similar architecture. I-Suit The I-Suit is a space suit prototype also constructed by ILC Dover, which incorporates several design improvements over the EMU, including a weight-saving soft upper torso. Both the Mark III and the I-Suit have taken part in NASA's annual Desert Research and Technology Studies (D-RATS) field trials, during which suit occupants interact with one another, and with rovers and other equipment. Mark III The Mark III is a NASA prototype, constructed by ILC Dover, which incorporates a hard lower torso section and a mix of soft and hard components. The Mark III is markedly more mobile than previous suits, despite its high operating pressure (), which makes it a \"zero-prebreathe\" suit, meaning that astronauts would be able to transition directly from a one-atmosphere, mixed-gas space station environment, such as that on the International Space Station, to the suit, without risking decompression sickness, which can occur with rapid depressurization from an atmosphere containing nitrogen or another inert gas. MX-2 The MX-2 is a space suit analogue constructed at the University of Maryland's Space Systems Laboratory. The MX-2 is used for crewed neutral buoyancy testing at the Space Systems Lab's Neutral Buoyancy Research Facility. By approximating the work envelope of a real EVA suit, without meeting the requirements of a flight-rated suit, the MX-2 provides an inexpensive platform for EVA research, compared to using EMU suits at facilities like NASA's Neutral Buoyancy Laboratory. The MX-2 has an operating pressure of 2.5\u20134 psi. It is a rear-entry suit, featuring a fiberglass HUT. Air, LCVG cooling water, and power are open loop systems, provided through an umbilical. The suit contains a Mac Mini computer to capture sensor data, such as suit pressure, inlet and outlet air temperatures, and heart rate. Resizable suit elements and adjustable ballast allow the suit to accommodate subjects ranging in height from , and with a weight range of . North Dakota suit Beginning in May 2006, five North Dakota colleges collaborated on a new space suit prototype, funded by a US$", "start_char_pos": 12556, "end_char_pos": 15775}, {"type": "D", "before": ".", "after": null, "start_char_pos": 16951, "end_char_pos": 16952}, {"type": "A", "before": null, "after": ".", "start_char_pos": 16955, "end_char_pos": 16955}, {"type": "D", "before": "\u2013 lists:", "after": null, "start_char_pos": 17169, "end_char_pos": 17177}], "sents_char_pos": [0, 393, 601, 728, 909, 1073, 1155, 1277, 1526, 1669, 1735, 1831, 1925, 2107, 2211, 2260, 2387, 2456, 2524, 2614, 2754, 2848, 3066, 3179, 3303, 3363, 3437, 3499, 3616, 3781, 3873, 3955, 4132, 4248, 4352, 4438, 4741, 4958, 5083, 5245, 5360, 5499, 5589, 5921, 6055, 6178, 6330, 6385, 6597, 6689, 6812, 6911, 6999, 7117, 7159, 7314, 7347, 7374, 7619, 7696, 7807, 7861, 7945, 8018, 8167, 8248, 8343, 8381, 8568, 8673, 8770, 8918, 9064, 9091, 9178, 9270, 9337, 9432, 9490, 9541, 9611, 9756, 10029, 10062, 10166, 10371, 10447, 10648, 10740, 10877, 11025, 11133, 11205, 11293, 11538, 11682, 11772, 11792, 11929, 11997, 12170, 12181, 12193, 12351, 12386, 12402, 12519, 12636, 12829, 12928, 13016, 13240, 13380, 13542, 13679, 13859, 14079, 14233, 14700, 14809, 14925, 15180, 15229, 15282, 15371, 15507, 15879, 15973, 16126, 16323, 16410, 16648, 16737, 16823, 17047, 17168]}
+{"doc_id": "39419510", "revision_depth": "2", "before_revision": "Charles Bathurst, 1st Viscount Bledisloe The Bledisloe Commission, also known as the Rhodesia-Nyasaland Royal Commission, was a Royal Commission appointed in 1937 \u201339 to examine the possible closer union of the three British territories in Central Africa, Southern Rhodesia, Northern Rhodesia and Nyasaland. These territories were to some degree economically inter-dependent, and it was suggested that an association would promote their rapid development. Its chairman was Lord Bledisloe. In 1939, the majority of the Commission recommended a union of Northern Rhodesia and Nyasaland, whose African populations would remain under British trusteeship. It also proposed that there would be strong economic integration between these united territories and Southern Rhodesia, but ruled-out any political amalgamation involving Southern Rhodesia unless its overtly racial policies were changed and there was some form of representation of African interests in the legislatures of all three territories. The Commission's minority report recommended an early amalgamation of the three territories, despite almost unanimous African objections, largely on economic grounds . The Commission's recommendations were not put in place owing to the Second World War, but closer ties in Central Africa were developed during the war. After the war, the white minority administrations of Northern and of Southern Rhodesia renewed calls for a union, and in 1953 they achieved this in the Federation of Rhodesia and Nyasaland. Developments in Central Africa Northern Rhodesia and Southern Rhodesia were administered until the 1920s by a Chartered company, the British South Africa Company under a Royal Charter dating from 1889.H. I Wetherell, (1979) Settler Expansionism in Central Africa: The Imperial Response of 1931 and Subsequent Implications, pp. 210\u201311 A Legislative Council for Southern Rhodesia was created in 1898, initially with a minority of elected seats and an electorate formed only of the better-off white settlers. However, the European franchise was extended: from 1914 there was an elected majority on the Legislative Council, and a campaign for self-government gained strength. As the British South Africa Company charter was due to expire in 1924, a referendum was held in Southern Rhodesia in 1922, when the electorate was given a choice between responsible government and entry into the Union of South Africa. Those in favour of responsible government won a significant, but not overwhelming, majority. When British South Africa Company rule in Northern Rhodesia came to an end in 1924, it became a protectorate, with a governor and Executive Council and Legislative Council, consisting of a majority of officials and a minority of members elected solely by European voters.E A Walter, (1963). The Cambridge History of the British Empire: South Africa, Rhodesia and the High Commission Territories, pp. 682\u20136, 690\u20131, 696\u20137. As early as 1915, the British South Africa Company proposed amalgamating Southern Rhodesia and Northern Rhodesia, but this was rejected by the Southern Rhodesian legislature in 1917, on the basis this might prevent Southern Rhodesia obtaining self-government.B Raftopoulos and A S Mlambo, editors (2009) Becoming Zimbabwe: A History from the Pre-colonial Period to 2008, p. 86. This option was again rejected in 1921 , for the same reason. When the Southern Rhodesian electorate voted for self-determination in 1922, it could not have had any expectation of future amalgamation with Northern Rhodesia . Britain had not conceded the possibility of amalgamation to Southern Rhodesia to prevent from joining the Union of South Africa. However, on a visit to Southern Rhodesia in 1927, the Conservative Colonial Secretary, Leo Amery gave Southern Rhodesia settlers the impression that he endorsed their claim to all or part of Northern Rhodesia.H. I Wetherell, (1979) Settler Expansionism in Central Africa: The Imperial Response of 1931 and Subsequent Implications, pp. 214\u20136, 225. At the end of the First World War, the European population of Northern Rhodesia was tiny, about 3,000 compared with ten times as many in Southern Rhodesia. This population increased rapidly after the discovery of the Copperbelt in the 1920s, and Northern Rhodesian settlers wanted self-determination with a European minority electorate, following the model of Southern Rhodesia but separate from it. As long as Leo Amery as Colonial Secretary attempted to qualify the principle that the interests of Africans in tropical Africa would be treated as paramount, he gave tacit encouragement to these Northern Rhodesian settler aspirations. In the mid 1920s, Northern Rhodesia and Southern Rhodesia seemed to drifting apart. However, once the British government appeared to reject the idea of further white minority governments in Africa, talk of amalgamation resumed.H. I Wetherell, (1979) Settler Expansionism in Central Africa: The Imperial Response of 1931 and Subsequent Implications, pp. 216\u20137. British government reaction The British government appointed the Hilton Young Commission on the possible closer union of the British territories in East and Central Africa in 1927. Its majority view, when it reported in 1929, was that Northern Rhodesia and Nyasaland should seek closer links with East Africa, although Sir Edward Hilton Young's minority report favoured linking these two territories with Southern Rhodesia on economic grounds. The minority report also suggested the partition of Northern Rhodesia, with its central area joining Southern Rhodesia: this was opposed by the British government. Even before the Commission's report was published, there were discussions between representatives of the settlers in Northern Rhodesia and the Southern Rhodesian government in 1928 on the terms of an amalgamation of the two Rhodesias. The Southern Rhodesia plan was for total union, with Northern Rhodesia becoming an undifferentiated part of a single colony. Northern Rhodesian settlers wanted minority rule, and were only prepared to join Southern Rhodesia if that were the only way to achieve this. Once Southern Rhodesian had secured self-government, it wanted union with Northern Rhodesia to strengthen its economy. It offered generous representation for Northern Rhodesian Europeans in a combined parliament, and guaranteed ministerial office in any combined government.C Leys and C Pratt, (1960) A New Deal in Central Africa, pp.4\u20135.H. I Wetherell, (1979) Settler Expansionism in Central Africa: The Imperial Response of 1931 and Subsequent Implications, pp. 215\u20136. The Colonial Secretary of the Labour Government, Lord Passfield, published his Memorandum on native policy in East Africa in June 1930. His statement of colonial policy was an emphatic reassertion of the principle of paramountcy of African interests. His Memorandum stated that no further white minority governments would be permitted, dismissing settler aspirations of self-government in Kenya and Northern Rhodesia. This turned Northern Rhodesian Europeans against association with East Africa towards union with Southern Rhodesia. In 1933, a substantial minority in the Northern Rhodesian legislature favoured amalgamation with Southern Rhodesia, despite vigorous African opposition. They were still a minority, as a significant group of settlers were cautious about being marginalised by the much greater numbers of Europeans in the south, although even these began to accept that amalgamation was likely. The failure of the British government to build a rail link from to Northern Rhodesia to Tanganyika as envisaged in the Hilton Young report made Northern Rhodesia's economy very dependent on Southern Rhodesian railways, and added economic to political reasons for union.H. I Wetherell, (1979) Settler Expansionism in Central Africa: The Imperial Response of 1931 and Subsequent Implications, pp. 218, 225.B Raftopoulos and A S Mlambo, editors (2009) Becoming Zimbabwe: A History from the Pre-colonial Period to 2008, p. 87. Pressures towards amalgamation Northern Rhodesia's mining industry suffered a major downturn in the 1930s, which made the possibility of self-government even more remote. When representatives of both territories met in January 1936 at Victoria Falls, it was the Northern Rhodesians who pushed for amalgamation and representatives of the Southern Rhodesian Labour Party who blocked it, because Southern Rhodesian racial policies, including strict job reservation and segregation, could not be applied in the north owing to British government objections.C Leys and C Pratt, (1960) A New Deal in Central Africa, p. 9. In most of these discussions, Nyasaland was ignored, although the Governor of Nyasaland was involved in some if the discussions leading up to the Victoria Falls Conference.H. I Wetherell, (1979) Settler Expansionism in Central Africa: The Imperial Response of 1931 and Subsequent Implications, p. 223. The European community in Nyasaland was very small, about 1,750 in the 1930s. Until the mid-1930s, they had no strong political ambitions and were not enthusiastic about a Central African Union which would be dominated by Europeans in Southern Rhodesia. In 1935, some European settlers formed a Greater Rhodesia League in Nyasaland, which favoured amalgamation with the Rhodesias as a way of establishing a regime of prosperity and security. However, in their memorandum to the Bledisloe Commission, the major settlers' organisations proposed only an eventual amalgamation, because of fears that the Southern Rhodesian white community, whose economic interests conflicted with those of Nyasaland, would become dominant in a Central Africa union.R Tangri, (1971). Colonial and Settler Pressures and the African Move to the Politics of Representation and Union in Nyasaland, pp. 296\u20138. Despite differences in emphasis between the different territories, Maurice Hankey, 1st Baron Hankey, the Cabinet Secretary, who visited southern Africa in 1934, considered that the prevailing attitude among European settlers there was that they intended to keep power for as long as possible.M Chanock, (1977). Unconsummated union: Britain, Rhodesia and South Africa, 1900\u201345, pp. 223\u20134. In 1937, a Commission of Inquiry was appointed following a Southern Rhodesian proposal for amalgamation with Northern Rhodesia. The Commission noted the different constitutional arrangements between Southern Rhodesia, which had internal self-government and a Legislative Council including elected members and Northern Rhodesia and Nyasaland, under Colonial Office regulation with advisory Legislative Councils composed of officials and nominees. It did however recommend the setting up of an Inter-Territorial Council consisting of the Prime Minister of Southern Rhodesia and the governors of Northern Rhodesia and Nyasaland.B Raftopoulos and A S Mlambo, editors (2009) Becoming Zimbabwe: A History from the Pre-colonial Period to 2008, p. 88. Formation and hearings Under pressure from Europeans in both Northern and Southern Rhodesia, particularly from Godfrey Huggins, who had been the Prime Minister of Southern Rhodesia since 1933, the British government agreed in 1937 to set up a Royal Commission. The chairman was Lord Bledisloe, a former Governor-General of New Zealand , and the other five Commissioners were Patrick Ashley Cooper, (later Sir Patrick) a governor of the Hudson's Bay Company, two Commissioners who had had experience of Colonial service, an MP who was also a lawyer and one who had considerable experience in mining and its labour policy. Its terms if reference were to consider a possible closer association between the two Rhodesias and Nyasaland.C Leys and C Pratt, (1960) A New Deal in Central Africa, pp. 9\u201310. The Commission took evidence from Europeans in all three territories, but from Africans only in Northern Rhodesia and Nyasaland , not Southern Rhodesia. Opposition to union within Southern Rhodesia came not only from the Native Associations, representing the more educated and politically aware Africans, but also the Native Authorities, traditional tribal chiefs. This united opposition to amalgamation impressed the Commissioners. When they visited Nyasaland in 1939, a wide range of Nyasaland Africans, many of whom had worked in Southern Rhodesia and experienced its racial policies, expressed their total objection to any form of amalgamation.J McCracken, (2012) A History of Malawi: 1859\u20131966, p. 233, 236. A similar level of opposition was found in Northern Rhodesia when the Commissioners visited in 1938, with the opposition being led by the traditional leaders, who wished to keep the safeguard of British trusteeship against race-based Southern Rhodesian labour and land policies.H S Meebelo, (1971). Reaction to Colonialism: A Prelude to the Politics of Independence in Northern Zambia 1893\u20131939, pp. 265, 268\u20139. It drew attention to the small number of Europeans in Northern Rhodesia, and the even smaller number in Nyasaland. African interests in the two northern territories had therefore to be protected against Southern Rhodesian racial discrimination.A Okoth, (2006). A History of Africa: African nationalism and the de-colonisation process, p. 101. J McCracken, (2012) A History of Malawi: 1859\u20131966, p. 233. The Commission considered the complete amalgamation of the three territories. It thought that a looser form of federal union would make it more difficult to plan the future development of Central Africa as a whole. It also commented unfavourably on an alternative under which the eastern part of Northern Rhodesia and Nyasaland would remain as separate entities outside the union, as they would not benefit from the economy of the Copperbelt. Even though the Commission advocated future amalgamation, a majority of its members ruled it out as an immediate possibility, because of legitimate African concerns and objections. This majority favoured an early union of Northern Rhodesia and Nyasaland into one unit which would co-operate economically with Southern Rhodesia as a possible first step to uniting all three territories later. Two leading Commissioners, Lord Bledisloe and Patrick (later Sir Patrick) Ashley Cooper, favoured complete and early amalgamation and wrote their minority report accordingly, despite contrary advice from Colonial Office permanent officials.M Chanock, (1977). Unconsummated union: Britain, Rhodesia and South Africa, 1900\u201345, p. 230.B Raftopoulos and A S Mlambo, editors (2009) Becoming Zimbabwe: A History from the Pre-colonial Period to 2008, pp. 87\u20138. Later events During the Second World War, co-operation between the three territories increased with a joint secretariat in 1941 and an advisory Central African Council in 1945, made up of the three governors and one leading European politician from each territory. After the war, the Labour Party Colonial Secretary from 1946 to 1950, Arthur Creech Jones, was reluctant to discuss any plans for amalgamation with Huggins, the Prime Minister of Southern Rhodesia because of opposition from Africans and within his own party. He did not entirely rule out federation, which had been proposed by a conference held at Victoria Falls in 1949 between the Southern Rhodesian government, and the elected, or \"unofficial\" members of the Northern Rhodesia Legislative Council led by Roy Welensky, without any Africans present. It was left to his successor in post in 1950 to 1951, James Griffiths, to begin exploratory talks with Huggins and Welensky representing the white minorities of both Rhodesias government , subject to the opinion of the majority African populations being ascertained. After a change in the British government in 1951, the incoming Conservative Colonial Secretary, Oliver Lyttelton removed the condition of sounding out African opinion in November 1951, and pushed through the Federation of Rhodesia and Nyasaland against strong opposition in 1953.E Windrich, (1975). The Rhodesian Problem: A Documentary Record 1923\u20131973, pp. 22\u20135.A Okoth, (2006). A History of Africa: African nationalism and the de-colonisation process, p. 101.", "after_revision": "Charles Bathurst, 1st Viscount Bledisloe The Bledisloe Commission, also known as the Rhodesia-Nyasaland Royal Commission, was a Royal Commission , appointed in 1937 and undertaking its enquiries between 1937 and 1939. to examine the possible closer union of the three British territories in Central Africa, Southern Rhodesia, Northern Rhodesia and Nyasaland. These territories were to some degree economically inter-dependent, and it was suggested that an association would promote their rapid development. Its chairman was Lord Bledisloe. In 1939, the majority of the Commission recommended a union of Northern Rhodesia and Nyasaland, whose African populations would remain under British trusteeship. It also proposed that there would be strong economic integration between these united territories and Southern Rhodesia, but ruled-out any political amalgamation involving Southern Rhodesia unless its overtly racial policies were changed and there was some form of representation of African interests in the legislatures of all three territories. A minority of the Commission appended a report which recommended the early amalgamation of the three territories, largely on economic grounds , despite the almost unanimous objections of Africans in all three . The Commission's recommendations were not put in place owing to the Second World War, but closer ties in Central Africa were developed during the war. After the war, the white minority administrations of Northern and of Southern Rhodesia renewed calls for a union, and in 1953 they achieved this in the Federation of Rhodesia and Nyasaland. Developments in Central Africa Northern Rhodesia and Southern Rhodesia were administered until the 1920s by a Chartered company, the British South Africa Company under a Royal Charter dating from 1889.H. I Wetherell, (1979) Settler Expansionism in Central Africa: The Imperial Response of 1931 and Subsequent Implications, pp. 210\u201311 A Legislative Council for Southern Rhodesia was created in 1898, initially with a minority of elected seats and an electorate formed only of the better-off white settlers. However, the European franchise was extended: from 1914 there was an elected majority on the Legislative Council, and a campaign for self-government gained strength. As the British South Africa Company charter was due to expire in 1924, a referendum was held in Southern Rhodesia in 1922, when the electorate was given a choice between responsible government and entry into the Union of South Africa. Those in favour of responsible government won a significant, but not overwhelming, majority. When British South Africa Company rule in Northern Rhodesia came to an end in 1924, the territory became a protectorate, with a governor and Executive Council and Legislative Council, consisting of a majority of officials and a minority of unofficial members elected solely by European voters.E A Walter, (1963). The Cambridge History of the British Empire: South Africa, Rhodesia and the High Commission Territories, pp. 682\u20136, 690\u20131, 696\u20137. As early as 1915, the British South Africa Company proposed amalgamating Southern Rhodesia and Northern Rhodesia, but this was rejected by the Southern Rhodesian legislature in 1917, on the grounds that this might prevent Southern Rhodesia obtaining self-government.B Raftopoulos and A S Mlambo, editors (2009) Becoming Zimbabwe: A History from the Pre-colonial Period to 2008, p. 86. The option of amalgamation was again rejected in 1921 for the same reason. When the Southern Rhodesian electorate voted for self-determination in 1922, it could not have had any expectation of future amalgamation with Northern Rhodesia as Britain had not conceded the possibility of amalgamation to the Southern Rhodesian electorate to prevent it from voting to join the Union of South Africa. However, on a visit to Southern Rhodesia in 1927, the Conservative Colonial Secretary, Leo Amery gave Southern Rhodesia settlers the impression that he endorsed their claim to incorporate all or part of Northern Rhodesia.H. I Wetherell, (1979) Settler Expansionism in Central Africa: The Imperial Response of 1931 and Subsequent Implications, pp. 214\u20136, 225. At the end of the First World War, the European population of Northern Rhodesia was tiny, about 3,000 compared with ten times as many in Southern Rhodesia. This white population increased rapidly after the discovery of the Copperbelt in the 1920s, and Northern Rhodesian settlers wanted self-determination with a European minority electorate, following the model of Southern Rhodesia but separate from it. As long as Leo Amery was Colonial Secretary, he attempted to qualify the principle that the interests of Africans in tropical Africa would be treated as paramount, and gave tacit encouragement to these Northern Rhodesian settler aspirations. In the mid 1920s, Northern Rhodesia and Southern Rhodesia seemed to drifting apart. However, once the British government appeared to reject the idea of further white minority governments in Africa, talk of amalgamation resumed.H. I Wetherell, (1979) Settler Expansionism in Central Africa: The Imperial Response of 1931 and Subsequent Implications, pp. 216\u20137. British government reaction The British government appointed the Hilton Young Commission on the possible closer union of the British territories in East and Central Africa in 1927. Its majority view, when it reported in 1929, was that Northern Rhodesia and Nyasaland should seek closer links with East Africa, although Sir Edward Hilton Young's minority report favoured linking these two territories with Southern Rhodesia on economic grounds. His minority report also suggested the partition of Northern Rhodesia, with its central area joining Southern Rhodesia: this was opposed by the British government. Even before the Commission's report was published, there were discussions between representatives of the settlers in Northern Rhodesia and the Southern Rhodesian government in 1928 on the terms of an amalgamation of the two Rhodesias. The Southern Rhodesia plan was for total union, with Northern Rhodesia becoming an undifferentiated part of a single colony. Northern Rhodesian settlers wanted minority rule, and were only prepared to join Southern Rhodesia if that were the only way to achieve this. Once Southern Rhodesian had secured self-government, it wanted union with Northern Rhodesia to strengthen its economy. It offered generous representation for Northern Rhodesian Europeans in a combined parliament, and guaranteed ministerial office in any combined government.C Leys and C Pratt, (1960) A New Deal in Central Africa, pp.4\u20135.H. I Wetherell, (1979) Settler Expansionism in Central Africa: The Imperial Response of 1931 and Subsequent Implications, pp. 215\u20136. The Colonial Secretary of the Labour Government, Lord Passfield, published his Memorandum on native policy in East Africa in June 1930. His statement of colonial policy was an emphatic reassertion of the principle of paramountcy of African interests. His Memorandum stated that no further white minority governments would be permitted, dismissing settler aspirations of self-government in Kenya and Northern Rhodesia. This turned Northern Rhodesian Europeans against association with East Africa and towards union with Southern Rhodesia. In 1933, a substantial minority in the Northern Rhodesian legislature favoured amalgamation with Southern Rhodesia, despite vigorous African opposition. This group was still in the minority, as a greater number of settlers were cautious about being marginalised by the much greater numbers of Europeans in the south, although even they had begun to accept that amalgamation was likely. The failure of the British government to build a rail link from Northern Rhodesia to Tanganyika , as envisaged in the Hilton Young report , made Northern Rhodesia's economy very dependent on Southern Rhodesian railways, and added economic to political reasons for a union.H. I Wetherell, (1979) Settler Expansionism in Central Africa: The Imperial Response of 1931 and Subsequent Implications, pp. 218, 225.B Raftopoulos and A S Mlambo, editors (2009) Becoming Zimbabwe: A History from the Pre-colonial Period to 2008, p. 87. Pressures towards amalgamation Northern Rhodesia's mining industry suffered a major downturn in the 1930s, which made the possibility of self-government even more remote. When representatives of both territories met in January 1936 at Victoria Falls, it was the Northern Rhodesians who pushed for amalgamation and representatives of the Southern Rhodesian Labour Party who blocked it, because Southern Rhodesian racial policies, including strict job reservation and segregation, could not be applied in the north owing to British government objections.C Leys and C Pratt, (1960) A New Deal in Central Africa, p. 9. In most of these discussions, Nyasaland was ignored, although the Governor of Nyasaland was involved in some of the discussions leading up to the Victoria Falls Conference.H. I Wetherell, (1979) Settler Expansionism in Central Africa: The Imperial Response of 1931 and Subsequent Implications, p. 223. The European community in Nyasaland was very small, about 1,750 in the 1930s. Until the mid-1930s, settlers there had no strong political ambitions and were not enthusiastic about a Central African Union which would be dominated by Europeans in Southern Rhodesia. In 1935, some European settlers formed a Greater Rhodesia League in Nyasaland, which favoured amalgamation with the Rhodesias as a way of establishing a regime of prosperity and security. However, in their memorandum to the Bledisloe Commission, the major settlers' organisations in Nyasaland proposed only an eventual amalgamation, because of fears that the Southern Rhodesian white community, whose economic interests conflicted with those of Nyasaland, would become dominant in a Central Africa union.R Tangri, (1971). Colonial and Settler Pressures and the African Move to the Politics of Representation and Union in Nyasaland, pp. 296\u20138. Despite differences in emphasis between the different territories, Maurice Hankey, 1st Baron Hankey, the Cabinet Secretary, who visited southern Africa in 1934, considered that the prevailing attitude among European settlers there was that they intended to keep power for as long as possible.M Chanock, (1977). Unconsummated union: Britain, Rhodesia and South Africa, 1900\u201345, pp. 223\u20134. In 1937, a Commission of Inquiry was appointed following a Southern Rhodesian proposal for amalgamation with Northern Rhodesia. The Commission noted the different constitutional arrangements between Southern Rhodesia, which had internal self-government and a Legislative Council that included elected members and Northern Rhodesia and Nyasaland, under Colonial Office regulation with advisory Legislative Councils composed of officials and nominees. It did however recommend the setting up of an Inter-Territorial Council consisting of the Prime Minister of Southern Rhodesia and the governors of Northern Rhodesia and Nyasaland.B Raftopoulos and A S Mlambo, editors (2009) Becoming Zimbabwe: A History from the Pre-colonial Period to 2008, p. 88. Formation and hearings Under pressure from Europeans in both Northern and Southern Rhodesia, particularly from Godfrey Huggins, who had been the Prime Minister of Southern Rhodesia since 1933, the British government agreed in 1937 to set up a Royal Commission. The chairman was Lord Bledisloe, a former Governor-General of New Zealand . The other five Commissioners were Patrick Ashley Cooper, (later Sir Patrick) a governor of the Hudson's Bay Company, two Commissioners who had had experience of Colonial service, one MP who was also a lawyer and another who had considerable experience in mining and its labour policy. Its terms if reference were to consider a possible closer association between the two Rhodesias and Nyasaland.C Leys and C Pratt, (1960) A New Deal in Central Africa, pp. 9\u201310. The Commission took evidence from Europeans in all three territories, but from Africans only in Northern Rhodesia and Nyasaland and not in Southern Rhodesia. Opposition to union within Southern Rhodesia came not only from the Native Associations, representing the more educated and politically aware Africans, but also the Native Authorities, the traditional tribal chiefs. This united opposition to amalgamation impressed the Commissioners. When they visited Nyasaland in 1939, a wide range of Nyasaland Africans, many of whom had worked in Southern Rhodesia and experienced its racial policies, expressed their total objection to any form of amalgamation.J McCracken, (2012) A History of Malawi: 1859\u20131966, p. 233, 236. A similar level of opposition was found in Northern Rhodesia when the Commissioners visited in 1938, with this opposition being led by the traditional leaders, who wished to keep the safeguard of British trusteeship against race-based Southern Rhodesian labour and land policies.H S Meebelo, (1971). Reaction to Colonialism: A Prelude to the Politics of Independence in Northern Zambia 1893\u20131939, pp. 265, 268\u20139. It drew attention to the small number of Europeans in Northern Rhodesia, and the even smaller number in Nyasaland. African interests in the two northern territories had therefore to be protected against Southern Rhodesian racial discrimination.A Okoth, (2006). A History of Africa: African nationalism and the de-colonisation process, p. 101. J McCracken, (2012) A History of Malawi: 1859\u20131966, p. 233. The Commission considered the complete amalgamation of the three territories. It thought that a looser form of federal union would make it more difficult to plan the future development of Central Africa as a whole. It also commented unfavourably on an alternative under which the eastern part of Northern Rhodesia and Nyasaland would remain as separate entities outside the union, as they would not benefit from the economy of the Copperbelt. Even though the Commission advocated future amalgamation, a majority of its members ruled this option out as an immediate possibility, because of legitimate African concerns and objections. This majority favoured an early union of Northern Rhodesia and Nyasaland into one unit which would co-operate economically with Southern Rhodesia as a possible first step to uniting all three territories later. Two leading Commissioners, Lord Bledisloe and Patrick (later Sir Patrick) Ashley Cooper, favoured complete and early amalgamation and wrote their minority report accordingly, despite contrary advice from Colonial Office permanent officials.M Chanock, (1977). Unconsummated union: Britain, Rhodesia and South Africa, 1900\u201345, p. 230.B Raftopoulos and A S Mlambo, editors (2009) Becoming Zimbabwe: A History from the Pre-colonial Period to 2008, pp. 87\u20138. Later events During the Second World War, co-operation between the three territories increased with a joint secretariat in 1941 and an advisory Central African Council in 1945, made up of the three governors and one leading European politician from each territory. After the war, the Labour Party Colonial Secretary from 1946 to 1950, Arthur Creech Jones, was reluctant to discuss any plans for amalgamation with Huggins, the Prime Minister of Southern Rhodesia because of opposition from Africans and within his own party. He did not entirely rule out federation, which had been proposed by a conference held at Victoria Falls in 1949 between the Southern Rhodesian government, and the elected, or \"unofficial\" members of the Northern Rhodesia Legislative Council led by Roy Welensky, without any Africans present. It was left to his successor in post in 1950 to 1951, James Griffiths, to begin exploratory talks with Huggins and Welensky representing the white minorities of both Rhodesian governments , subject to the opinion of the majority African populations being ascertained. After a change in the British government in 1951, the incoming Conservative Colonial Secretary, Oliver Lyttelton removed the condition of sounding out African opinion in November 1951, and pushed through the Federation of Rhodesia and Nyasaland against strong opposition in 1953.E Windrich, (1975). The Rhodesian Problem: A Documentary Record 1923\u20131973, pp. 22\u20135.A Okoth, (2006). A History of Africa: African nationalism and the de-colonisation process, p. 101.", "edit_actions": [{"type": "A", "before": null, "after": ",", "start_char_pos": 145, "end_char_pos": 145}, {"type": "R", "before": "\u201339", "after": "and undertaking its enquiries between 1937 and 1939.", "start_char_pos": 164, "end_char_pos": 167}, {"type": "R", "before": "The Commission's minority report recommended an", "after": "A minority of the Commission appended a report which recommended the", "start_char_pos": 999, "end_char_pos": 1046}, {"type": "D", "before": "despite almost unanimous African objections,", "after": null, "start_char_pos": 1092, "end_char_pos": 1136}, {"type": "A", "before": null, "after": ", despite the almost unanimous objections of Africans in all three", "start_char_pos": 1165, "end_char_pos": 1165}, {"type": "R", "before": "it", "after": "the territory", "start_char_pos": 2593, "end_char_pos": 2595}, {"type": "A", "before": null, "after": "unofficial", "start_char_pos": 2738, "end_char_pos": 2738}, {"type": "R", "before": "basis", "after": "grounds that", "start_char_pos": 3121, "end_char_pos": 3126}, {"type": "R", "before": "This option", "after": "The option of amalgamation", "start_char_pos": 3309, "end_char_pos": 3320}, {"type": "D", "before": ",", "after": null, "start_char_pos": 3348, "end_char_pos": 3349}, {"type": "R", "before": ".", "after": "as", "start_char_pos": 3532, "end_char_pos": 3533}, {"type": "R", "before": "Southern Rhodesia to prevent from joining", "after": "the Southern Rhodesian electorate to prevent it from voting to join", "start_char_pos": 3594, "end_char_pos": 3635}, {"type": "A", "before": null, "after": "incorporate", "start_char_pos": 3839, "end_char_pos": 3839}, {"type": "A", "before": null, "after": "white", "start_char_pos": 4172, "end_char_pos": 4172}, {"type": "R", "before": "as Colonial Secretary", "after": "was Colonial Secretary, he", "start_char_pos": 4433, "end_char_pos": 4454}, {"type": "R", "before": "he", "after": "and", "start_char_pos": 4571, "end_char_pos": 4573}, {"type": "R", "before": "The", "after": "His", "start_char_pos": 5452, "end_char_pos": 5455}, {"type": "A", "before": null, "after": "and", "start_char_pos": 7085, "end_char_pos": 7085}, {"type": "R", "before": "They were still a", "after": "This group was still in the", "start_char_pos": 7277, "end_char_pos": 7294}, {"type": "R", "before": "significant group", "after": "greater number", "start_char_pos": 7310, "end_char_pos": 7327}, {"type": "R", "before": "these began", "after": "they had begun", "start_char_pos": 7448, "end_char_pos": 7459}, {"type": "D", "before": "to", "after": null, "start_char_pos": 7564, "end_char_pos": 7566}, {"type": "A", "before": null, "after": ",", "start_char_pos": 7599, "end_char_pos": 7599}, {"type": "A", "before": null, "after": ",", "start_char_pos": 7640, "end_char_pos": 7640}, {"type": "A", "before": null, "after": "a", "start_char_pos": 7765, "end_char_pos": 7765}, {"type": "R", "before": "if", "after": "of", "start_char_pos": 8750, "end_char_pos": 8752}, {"type": "R", "before": "they", "after": "settlers there", "start_char_pos": 9042, "end_char_pos": 9046}, {"type": "A", "before": null, "after": "in Nyasaland", "start_char_pos": 9477, "end_char_pos": 9477}, {"type": "R", "before": "including", "after": "that included", "start_char_pos": 10495, "end_char_pos": 10504}, {"type": "R", "before": ", and the", "after": ". The", "start_char_pos": 11295, "end_char_pos": 11304}, {"type": "R", "before": "an", "after": "one", "start_char_pos": 11480, "end_char_pos": 11482}, {"type": "R", "before": "one", "after": "another", "start_char_pos": 11512, "end_char_pos": 11515}, {"type": "R", "before": ", not", "after": "and not in", "start_char_pos": 11886, "end_char_pos": 11891}, {"type": "A", "before": null, "after": "the", "start_char_pos": 12096, "end_char_pos": 12096}, {"type": "R", "before": "the", "after": "this", "start_char_pos": 12578, "end_char_pos": 12581}, {"type": "R", "before": "it", "after": "this option", "start_char_pos": 13820, "end_char_pos": 13822}, {"type": "R", "before": "Rhodesias government", "after": "Rhodesian governments", "start_char_pos": 15558, "end_char_pos": 15578}], "sents_char_pos": [0, 308, 456, 489, 651, 998, 1167, 1318, 1508, 1710, 2014, 2180, 2415, 2508, 2781, 2800, 2930, 3190, 3308, 3370, 3533, 3662, 3873, 4010, 4166, 4411, 4647, 4731, 4875, 5007, 5188, 5451, 5615, 5850, 5975, 6117, 6236, 6392, 6456, 6588, 6724, 6839, 7006, 7123, 7276, 7499, 7772, 8196, 8578, 8813, 8942, 9020, 9196, 9384, 9689, 9706, 9827, 10120, 10138, 10215, 10343, 10661, 10841, 10959, 11220, 11580, 11691, 11757, 11910, 12123, 12191, 12407, 12471, 12750, 12770, 12883, 12998, 13128, 13144, 13286, 13364, 13501, 13729, 13910, 14121, 14362, 14380, 14575, 14840, 15099, 15391, 15658, 15938, 15957, 16022, 16038]}
+{"doc_id": "39817028", "revision_depth": "1", "before_revision": "Television Year Title RoleNetwork Ref. 2021 Encounter (Philippine TV series) Gino TV5 2018 Precious Hearts Romances Presents: Los Bastardos Joaquin S. Cardinal ABS-CBN Ipaglaban Mo: Sumpaan Mikoy 2017\u20132018 Pusong Ligaw Miraculo \"Potpot/Ira\" Policarpio / Rafael Magbanua Cervantes 2017 Maalaala Mo Kaya: Cellphone Mart 2016 Maalaala Mo Kaya: Pasa Rommel Ipaglaban Mo: Hardinero Martin Gandang Gabi, Vice! Guest 2015 Pangako Sa 'Yo David San Luis / David Powers Forevermore Jay Fernandez Oh My G! Young G (God) My MYX Himself (VJ) Myx MYX Daily Top 10Pinoy MYXPop MYX2014Wattpad Presents: Mr. Popular Meets Miss Nobody 2: Still in LoveAdrian BuenavistaTV5 Wattpad Presents: Mr. Popular Meets Miss Nobody Mirabella Dave Castillo ABS-CBN Maalaala Mo Kaya: Card Joel 2013\u2013present ASAP Himself / Co-Host / Performer 2013 Wansapanataym: Petrang Paminta Sancho Maalaala Mo Kaya: Box Bruce 2012 Growing Up Jason Rivero 2011 Gandang Gabi, Vice! Himself/Guest(with Daniel Padilla and Neil Coleta) Mara Clara Derrick Gonzales", "after_revision": "Television Year Title RoleNetwork Ref. 2021 Encounter (Philippine TV series) Gino TV5 2018 Precious Hearts Romances Presents: Los Bastardos Joaquin S. Cardinal ABS-CBN Ipaglaban Mo: Sumpaan Mikoy 2017\u20132018 Pusong Ligaw Miraculo \"Potpot/Ira\" Policarpio / Rafael Magbanua Cervantes 2017 Maalaala Mo Kaya: Cellphone Mart 2016 Maalaala Mo Kaya: Pantalan || Jerome || |- | Ipaglaban Mo: Hardinero || Martin || |- | Maalaala Mo Kaya: Pasa || Rommel || |- | Gandang Gabi, Vice! || Guest || |- | rowspan=\"7\"| 2015 || Pangako Sa 'Yo || David San Luis / David Powers || |- | Forevermore || Jay Fernandez || |- | Oh My G! || Young G (God) || |- |My MYX || rowspan=\"4\"| Himself (VJ) || rowspan=\"4\"|Myx ||rowspan=\"4\"| |- | MYX Daily Top 10|- |Pinoy MYX|- |Pop MYX|- | rowspan=\"4\"| 2014 |Wattpad Presents: Mr. Popular Meets Miss Nobody 2: Still in Love| rowspan=2|Adrian Buenavista | rowspan=2|TV5 | |- | Wattpad Presents: Mr. Popular Meets Miss Nobody | |- | Mirabella| Dave Castillo | rowspan=\"9\"| ABS-CBN | |- | Maalaala Mo Kaya: Card | Joel | |- | 2013\u2013present || ASAP || Himself / Co-Host / Performer || |- | rowspan=2| 2013 | Wansapanataym: Petrang Paminta | Sancho | |- | Maalaala Mo Kaya: Box | Bruce | |- | 2012 | Growing Up| Jason Rivero | |- | rowspan=2| 2011 | Gandang Gabi, Vice! | Himself/Guest(with Daniel Padilla and Neil Coleta) | |- | Mara Clara'' Derrick Gonzales", "edit_actions": [{"type": "R", "before": "Pasa Rommel", "after": "Pantalan || Jerome || |- |", "start_char_pos": 341, "end_char_pos": 352}, {"type": "R", "before": "Martin", "after": "|| Martin || |- | Maalaala Mo Kaya: Pasa || Rommel || |- |", "start_char_pos": 377, "end_char_pos": 383}, {"type": "R", "before": "Guest", "after": "|| Guest || |- | rowspan=\"7\"|", "start_char_pos": 404, "end_char_pos": 409}, {"type": "A", "before": null, "after": "||", "start_char_pos": 415, "end_char_pos": 415}, {"type": "A", "before": null, "after": "||", "start_char_pos": 431, "end_char_pos": 431}, {"type": "R", "before": "Forevermore Jay Fernandez", "after": "|| |- | Forevermore || Jay Fernandez || |- |", "start_char_pos": 462, "end_char_pos": 487}, {"type": "A", "before": null, "after": "||", "start_char_pos": 497, "end_char_pos": 497}, {"type": "R", "before": "My MYX", "after": "|| |- |My MYX || rowspan=\"4\"|", "start_char_pos": 512, "end_char_pos": 518}, {"type": "R", "before": "Myx", "after": "|| rowspan=\"4\"|Myx ||rowspan=\"4\"| |- |", "start_char_pos": 532, "end_char_pos": 535}, {"type": "R", "before": "10Pinoy MYXPop MYX2014Wattpad", "after": "10|- |Pinoy MYX|- |Pop MYX|- | rowspan=\"4\"| 2014 |Wattpad", "start_char_pos": 550, "end_char_pos": 579}, {"type": "R", "before": "LoveAdrian BuenavistaTV5", "after": "Love| rowspan=2|Adrian Buenavista | rowspan=2|TV5 | |- |", "start_char_pos": 632, "end_char_pos": 656}, {"type": "R", "before": "Mirabella Dave Castillo", "after": "| |- | Mirabella| Dave Castillo | rowspan=\"9\"|", "start_char_pos": 705, "end_char_pos": 728}, {"type": "A", "before": null, "after": "| |- |", "start_char_pos": 737, "end_char_pos": 737}, {"type": "R", "before": "Joel", "after": "| Joel | |- |", "start_char_pos": 761, "end_char_pos": 765}, {"type": "R", "before": "ASAP", "after": "|| ASAP ||", "start_char_pos": 779, "end_char_pos": 783}, {"type": "A", "before": null, "after": "|| |- | rowspan=2|", "start_char_pos": 814, "end_char_pos": 814}, {"type": "A", "before": null, "after": "|", "start_char_pos": 820, "end_char_pos": 820}, {"type": "R", "before": "Sancho", "after": "| Sancho | |- |", "start_char_pos": 852, "end_char_pos": 858}, {"type": "R", "before": "Bruce", "after": "| Bruce | |- |", "start_char_pos": 881, "end_char_pos": 886}, {"type": "R", "before": "Growing Up Jason Rivero", "after": "| Growing Up| Jason Rivero | |- | rowspan=2|", "start_char_pos": 892, "end_char_pos": 915}, {"type": "A", "before": null, "after": "|", "start_char_pos": 921, "end_char_pos": 921}, {"type": "A", "before": null, "after": "|", "start_char_pos": 942, "end_char_pos": 942}, {"type": "R", "before": "Mara Clara", "after": "| |- | Mara Clara''", "start_char_pos": 994, "end_char_pos": 1004}], "sents_char_pos": [0, 403, 589, 941]}
+{"doc_id": "39892", "revision_depth": "1", "before_revision": "From the initial colonization(s), the Lucayan expanded throughout the Bahamas in some 800 years (c. 700 \u2013 c. 1500), growing to a population of about 40,000. Population density at the time of first European contact was highest in the south-central area of the Bahamas, declining towards the north, reflecting the migration pattern and progressively shorter time of occupation of the northern islands. Known Lucayan settlement sites are confined to the nineteen largest islands in the archipelago, or to smaller cays located less than one km. from those islands. Population density in the southernmost Bahamas remained lower, probably due to the drier climate there (less than 800 mm of rain a year on Great Inagua Island and the Turks and Caicos Islands and only slightly higher on Acklins and Crooked Islands and Mayaguana).Keegan:25, 54-8, 86, 170-3 European exploration upDepiction of Christopher Columbus seizing the Guanahani shortly after landing in the Bahamas in 1492 In 1492 Christopher Columbus sailed from Spain on his first voyage with three ships, the Ni\u00f1a, the Pinta, and the flagship, Santa Maria, seeking a direct route to Asia. On 12 October 1492 Columbus reached an island in the Bahamas and claimed it for Spain, an event long regarded by Europeans as the 'discovery ' of America. This island was called Guanahani by the Lucayan, and San Salvador by the Spanish. The identity of the first American landfall by Columbus remains controversial, but many authors accept Samuel E. Morison's identification of Columbus' San Salvador as what was later called Watling (or Watling's) Island. Its name has been officially changed to San Salvador. Columbus visited several other islands in the Bahamas before sailing to present-day Cuba and afterwards to Hispaniola.Albury:21-33Craton:28-37Keegan:175-205 The Bahamas held little interest to the Spanish except as a source of slave labor. Nearly the entire population of Lucayan (almost 40,000 people total) were transported to other islands as laborers over the next 30 years. When the Spanish decided to remove the remaining Lucayans to Hispaniola in 1520, they could find only eleven. The islands remained abandoned and depopulated for 130 years afterwards . With no gold to be found, and the population removed, the Spanish effectively abandoned the Bahamas. They retained titular claims to them until the Peace of Paris in 1783, when they ceded them to Britain in exchange for East Florida.Albury:34-7Albury:34-7Craton. pp. 37-39Johnson:3Keegan:212, 220-3 For many years, historians believed that The Bahamas was not colonized until the 17th century. However, recent studies show that there may have been attempts of colonization by groups from Spain, France, Britain, and the Netherlands. The French settled in Abaco in 1565 , and tried again in 1625. Early English settlement In 1648 a group from Bermuda called 'The Company of Adventurers for the Plantation of the Islands of Eleutheria,' which was led by William Sayle, sailed to the Bahamas to found a colony. These early settlers were Puritans and republicans. Bermuda was becoming overcrowded, and the Bahamas offered both religious and political freedom and economic opportunity. The larger of the company's two ships, the William, wrecked on the reef at the north end of what is now called Eleuthera Island, with the loss of all provisions. Despite the arrival of additional settlers, including Europeans, slaves and former African slaves from Bermuda and the receipt of relief supplies from Virginia and New England, the Eleuthera colony struggled for many years, hampered by poor soil, fighting between settlers, and conflict with the Spanish. In the mid-1650s many of the settlers returned to Bermuda. The remaining settlers founded communities on Harbour Island and Saint George's Cay (Spanish Wells) at the north end of Eleuthera. In 1670 about 20 families lived in the Eleuthera communities.Albury:41-6Johnson:3-4 Map of New Providence in 1751. Settled in the mid-1600s, the island quickly became the centre of population and commerce in the Bahamas. In 1666 other colonists from Bermuda settled on New Providence, which soon became the centre of population and commerce in the Bahamas, with almost 500 people living on the island by 1670. Unlike the Eleutherians, who were primarily farmers, the first settlers on New Providence made their living from the sea, salvaging (mainly Spanish) wrecks, making salt, and taking fish, turtles, conchs and ambergris. Farmers from Bermuda soon followed the seamen to New Providence, where they found good, plentiful land. Neither the Eleutherian colony nor the settlement on New Providence had any legal standing under English law. In 1670 the Proprietors of Carolina were issued a patent for the Bahamas, but the governors sent by the Proprietors had difficulty imposing their authority on the independent-minded residents of New Providence.Albury:47-51Johnson:4 Republic of Pirates The Bahamians soon came into conflict with the Spanish over the salvaging of wrecks. The Bahamian wreckers drove the Spanish away from their wrecked ships, and attacked Spanish salvagers, seizing goods the Spanish had already recovered from the wrecks. When the Spanish raided the Bahamas, the Bahamians in turn commissioned privateers against Spain, even though England and Spain were at peace. In 1684 the Spanish burned the settlements on New Providence and Eleuthera, after which they were largely abandoned. New Providence was settled a second time in 1686 by colonists from Jamaica. upPirate captain Henry Every on shore while his ship the Fancy engages another vessel. Every eluded the authorities after supposedly bribing the governor appointed by the Proprietors of Carolina In the 1690s English privateers (England was then at war with France) made a base in the Bahamas. In 1696 Henry Every (or Avery), using the assumed name Henry Bridgeman, brought his ship Fancy, loaded with pirates' loot, into Nassau harbor. Every bribed the governor, Nicholas Trott (uncle of the Nicholas Trott who presided at the trial of Stede Bonnet), with gold and silver, and by leaving him the Fancy, still loaded with 50 tons of elephant tusks and 100 barrels of gunpowder. Following peace with France in 1697, many of the privateers became pirates. From this time the pirates increasingly made Nassau, the Bahamian capital founded in 1694, their base. The governors appointed by the Proprietors usually made a show of suppressing the pirates, but most were accused of dealing with them. By 1701 England was at war with France and Spain. In 1703 and in 1706 combined French-Spanish fleets attacked and sacked Nassau, after which some settlers left, and the Proprietors gave up on trying to govern the islands.Albury:51-5Craton:70-87Johnson:6Woodard:12-14, 23-24 Reasserting British control Starting in 1713, Woodes Rogers had conceived the idea of leading an expedition to Madagascar to suppress the pirates there and establish it as a British colony. Rogers' friends Richard Steele and Joseph Addison eventually convinced him to tackle the pirates nest in the Bahamas, instead. Rogers and others formed a company to fund the venture. They persuaded the Proprietors of Carolina to surrender the government of the Bahamas to the king , while retaining title to the land. In 1717 King George appointed Rogers governor of the Bahamas and issued a proclamation granting a pardon to any pirate who surrendered to a British governor within one year.Albury:69-74Craton:93-6Johnson:7-8Woodard:117-121, 163-168 Woodes Rogers and his family by William Hogarth, 1729. Rogers, the first royal governor of the Bahamas, is seated as he is shown a map of New Providence. Word of the appointment of a new governor and of the offer of pardons reached Nassau ahead of Rogers and his forces. Some of the pirates were willing to accept a pardon and retire from piracy. Henry Jennings and Christopher Winter, sailed off to find British authorities to confirm their acceptance of the amnesty. Others were not ready to give up. Many of those were Jacobites, supporters of the House of Stuart, who identified as enemies of the Hanoverian King George. Still others simply identified as rebels , or thought they were better off as pirates than trying to earn an honest living. When a Royal Navy ship brought official word to Nassau of the pardon offer, many pirates planned to accept. Soon, however, the recalcitrant parties gained the upper hand, eventually forcing the Navy ship to leave.Woodard:226-29 Blackbeard, Stede Bonnet, Nicholas Brown and Edmond Condent left the Bahamas for other territories. Charles Vane, with \"Calico Jack\" Rackham and Edward England in his crew, came to prominence at this time. Vane worked to organize resistance to the anticipated arrival of Royal authority, even appealing to James Francis Edward Stuart, the Stuart pretender, for aid in holding the Bahamas and capturing Bermuda for the Stuarts. As aid from the Stuarts failed to materialize and the date for Rogers' arrival approached, Vane and his crew prepared to leave Nassau.Woodard:236-40, 245-47, 259-61 Vane attacked several small settlements in the Bahamas but, after he refused to attack a stronger French frigate, he was deposed for cowardice and replaced as captain by \"Calico Jack\" Rackham. Vane never returned to the Bahamas; he was eventually caught, convicted and executed in Jamaica. After nearly being captured by Jamaican privateers, and hearing that the king had extended the deadline for pardons for piracy, Rackham and his crew returned to Nassau to surrender to Woodes Rogers. Diarama of Anne Bonny and Mary Read at Nassau harbour at the Pirates of Nassau Museum in Nassau. The two began their pirating careers at Nassau. In Nassau Rackham became involved with Anne Bonny; he tried to arrange an annulment of her marriage to another ex-pirate, James Bonny. Rogers blocked the annulment, and Rackham and Bonny left Nassau to be pirates again, taking a small crew and Bonny's friend Mary Read with them. Within months, Rackham, Bonny and Read were captured and taken to Jamaica. They were convicted of piracy, and Rackham was executed. Bonny and Read were sent to prison, as both were pregnant and therefore excluded from execution. Read died in prison, while Bonny's fate is unknown.Woodard:304-10, 315-20 When Britain and Spain went to war again in 1719, many of the ex-pirates were commissioned by the British government as privateers. A Spanish invasion fleet set out for the Bahamas, but was diverted to Pensacola, Florida when it was seized by the French. Rogers continued to improve the defenses of Nassau, spending his personal fortune and going heavily into debt to do so. In 1720, the Spaniards finally attacked Nassau. Rogers returned to Britain in 1722 to plead for repayment of the money he had borrowed to build up Nassau, only to find he had been replaced as governor. He was sent to debtors' prison, although his creditors later absolved his debts, gaining him release. Latter 18th century In 1741, Governor John Tinker and Peter Henry Bruce constructed Fort Montague. Additionally, the Governor also reported a privateering boom in the Thirteen Colonies in North America. He also reported that over 2300 sumptuous houses were built. In 1768 Governor William Shirley filled in mosquito-breeding swamps and extended Nassau. American forces lands at New Providence during the American Revolutionary War. The landing resulted in a two-week occupation of Nassau in 1776 During the American War of Independence the Bahamas was attacked by American and allied forces on several occasions. In 1778, American forces launched an amphibious assault against Nassau, resulting in its two-week occupation. In 1782, Spanish forces under General Galvez captured the Bahamas in 1782. A British-American Loyalist expedition led by Colonel Andrew Deveaux, recaptured the islands in 1783. After the American Revolution, the British issued land grants to American Loyalists who had gone into exile from the newly established United States. The sparse population of the Bahamas tripled within a few years. The Loyalists developed cotton as a commodity crop, but it dwindled from insect damage and soil exhaustion. In addition to slaves they brought with them, the planters' descendants imported more African slaves for labour . Most of the current inhabitants in the islands are descended from the slaves brought to work on the Loyalist plantations. In addition , thousands of captive Africans, who were liberated from foreign slave ships by the British navy after the abolition of the British slave trade in 1807, were resettled as free persons in the Bahamas. The Bahamas during the American Civil War prospered as a base for Confederate blockade-running, bringing in cotton to be shipped to the mills of England and running out arms and munitions. None of these provided any lasting prosperity to the islands, nor did attempts to grow different kinds of crops for export. Colonial 20th century In 1911, there was a short-lived movement to make the Bahamas part of Canada. Although the movement enjoyed the support of many in Nassau and from the head of Sun Life, a Canadian insurance company, the movement failed. The failure of the movement was, in part, due to the British government's opposition to uniting a predominantly Black colony with a predominantly white country.Smith, Andrew. 2009. \"Thomas Bassett Macaulay and the Bahamas: Racism, Business and Canadian Sub-imperialism\". The Journal of Imperial and Commonwealth History. 37, no. 1: 29-50. In World War I organizations such as the Imperial Order of the Daughters of Empire and the Bahamas Red Cross Guild , began collecting money, food and clothing for soldiers and civilians in Europe. \"The Gallant Thirty\" Bahamians set out to join the British West Indies Regiment as early as 1915 and as many as 1,800 served in the armed forces of Canada, Britain and the United States. The Duke of Windsor was installed as Governor of the Bahamas, arriving at that post in August 1940 with his new Duchess. They were appalled at the condition of Government House, but they \"tried to make the best of a bad situation.\" He did not enjoy the position, and referred to the islands as \"a third-class British colony\".Bloch, Michael (1982). The Duke of Windsor's War. London: Weidenfeld and Nicolson. , p. 364. He opened the small local parliament on October 29, 1940, and they visited the 'Out Islands' that November, which caused some controversy because of on whose yacht they were cruising. The British Foreign Office strenuously objected when the Duke and Duchess planned to tour aboard a yacht belonging to a Swedish magnate, Axel Wenner-Gren, whom American intelligence wrongly believed to be a close friend of Luftwaffe commander Hermann G\u00f6ring.Bloch, Michael (1982). The Duke of Windsor's War. London: Weidenfeld and Nicolson. , pp. 154\u2013159, 230\u2013233 The Duke was praised, however, for his efforts to combat poverty on the islands, although he was as contemptuous of the Bahamians as he was of most non-white peoples of the Empire.Ziegler, Philip (1991). King Edward VIII: The official biography. New York: Alfred A. Knopf. . He was also praised for his resolution of civil unrest over low wages in Nassau in June 1942, when there was a \"full-scale riot,\" even though he blamed the trouble on \"mischief makers \u2013 communists\" and \"men of Central European Jewish descent, who had secured jobs as a pretext for obtaining a deferment of draft\".Ziegler, pp. 471\u2013472 The Duke resigned the post on 16 March 1945.Matthew, H. C. G. (September 2004; online edition January 2008) \"Edward VIII, later Prince Edward, duke of Windsor (1894\u20131972)\", Oxford Dictionary of National Biography, Oxford University Press, , retrieved 1 May 2010 (Subscription required)Higham places the date of his resignation as 15 March, and that he left on 5 April. During World War II, the Allies centred their flight training and antisubmarine operations for the Caribbean in the Bahamas. They fought for their freedom. Canadian garrison In April 1942 the United Kingdom asked Canada to provide military support in Nassau, in part to provide protection services to H.R.H. the Duke of Windsor. No. 33 company of the Veterans Guard of Canada was raised and arrived in June. No 33 company were relieved in 1943 by a company of The Pictou Highlanders. The Canadian garrison left Nassau in 1946 p. 181 Post-World War II The wartime airfield became Nassau's international airport in 1957 and helped spur the growth of mass tourism, which accelerated after Havana was closed to American tourists in 1961. Freeport, on the island of Grand Bahama, was established as a free trade zone in the 1950s and became the Bahama's second city. Bank secrecy combined with the lack of corporate and income taxes led to a rapid growth in the offshore financial sector during the postwar years. By the early 1980s, the islands had become a major centre for the drug trade, with 90 per cent of all the cocaine entering the United States reportedly passing through the Bahamas. The College of the Bahamas was founded in 1974 and provided the nation's higher or tertiary education. The college was chartered in 2016 as the University of the Bahamas, offering baccalaureate, masters and associate degrees, on three campuses and teaching and research centres throughout the Bahamas. Based on the twin pillars of tourism and offshore finance, the Bahamian economy has prospered since the 1950s. However, there remain significant challenges in areas such as education, health care, housing, international narcotics trafficking and illegal immigration from Haiti. References Albury, Paul. (1975) The Story of the Bahamas. MacMillan Caribbean. Carr, J. Revell. (2008) Seeds of Discontent: The Deep Roots of the American Revolution 1659\u20131750. Walker & Company. Craton, Michael. (1986) A History of the Bahamas. San Salvador Press. Granberry, Julius and Gary S. Vescelius. (2004) Languages of the Pre-Columbian Antilles. The University of Alabama Press. Johnson, Howard. (1996) The Bahamas from Slavery to Servitude, 1783\u20131933. University Press of Florida. Keegan, William F. (1992) The People Who Discovered Columbus: The Prehistory of the Bahamas. University Press of Florida. Woodard, Colin. (2007) The Republic of Pirates. Harcourt, Inc. State Dept Country Study - Includes information on the Bahamas including history. Rulers.org \u2014 Bahamas List of rulers for Bahamas", "after_revision": "From the initial colonization(s), the Lucayan expanded throughout the Bahamas in some 800 years (c. 700 \u2013 c. 1500), growing to a population of about 40,000. Population density at the time of first European contact was highest in the south-central area of the Bahamas, declining towards the north, reflecting the migration pattern and progressively shorter time of occupation of the northern islands. Known Lucayan settlement sites are confined to the nineteen largest islands in the archipelago, or smaller cays located less than one km. from those islands. The population density in the southernmost Bahamas remained lower, probably due to the drier climate there (less than 800 mm of rain a year on Great Inagua Island and the Turks and Caicos Islands and only slightly higher on Acklins and Crooked Islands and Mayaguana).Keegan:25, 54-8, 86, 170-3 European exploration upDepiction of Christopher Columbus seizing the Guanahani shortly after landing in the Bahamas in 1492 In 1492 Christopher Columbus sailed from Spain on his first voyage with three ships, the Ni\u00f1a, the Pinta, and the flagship, Santa Maria, seeking a direct route to Asia. On 12 October 1492 Columbus reached an island in the Bahamas and claimed it for Spain, an event long regarded by Europeans as the 'discovery of America. This island was called Guanahani by the Lucayan, and San Salvador by the Spanish. The identity of the first American landfall by Columbus remains controversial, but many authors accept Samuel E. Morison's identification of Columbus' San Salvador as what was later called Watling (or Watling's) Island. Its name has been officially changed to San Salvador. Columbus visited several other islands in the Bahamas before sailing to present-day Cuba and afterward to Hispaniola.Albury:21-33Craton:28-37Keegan:175-205 The Bahamas held little interest in the Spanish except as a source of slave labor. Nearly the entire population of Lucayan (almost 40,000 people total) were transported to other islands as laborers over the next 30 years. When the Spanish decided to remove the remaining Lucayans to Hispaniola in 1520, they could find only eleven. The islands remained abandoned and depopulated for 130 years afterward . With no gold to be found, and the population removed, the Spanish effectively abandoned the Bahamas. They retained titular claims to them until the Peace of Paris in 1783, when they ceded them to Britain in exchange for East Florida.Albury:34-7Albury:34-7Craton. pp. 37-39Johnson:3Keegan:212, 220-3 For many years, historians believed that The Bahamas was not colonized until the 17th century. However, recent studies show that there may have been attempts of colonization by groups from Spain, France, Britain, and the Netherlands. The French settled in Abaco in 1565 and tried again in 1625. Early English settlement In 1648 a group from Bermuda called 'The Company of Adventurers for the Plantation of the Islands of Eleutheria,' which was led by William Sayle, sailed to the Bahamas to found a colony. These early settlers were Puritans and republicans. Bermuda was becoming overcrowded, and the Bahamas offered both religious and political freedom and economic opportunity. The larger of the company's two ships, the William, wrecked on the reef at the north end of what is now called Eleuthera Island, with the loss of all provisions. Despite the arrival of additional settlers, including Europeans, slaves , and former African slaves from Bermuda and the receipt of relief supplies from Virginia and New England, the Eleuthera colony struggled for many years, hampered by poor soil, fighting between settlers, and conflict with the Spanish. In the mid-1650s many of the settlers returned to Bermuda. The remaining settlers founded communities on Harbour Island and Saint George's Cay (Spanish Wells) at the north end of Eleuthera. In 1670 about 20 families lived in the Eleuthera communities.Albury:41-6Johnson:3-4 Map of New Providence in 1751. Settled in the mid-1600s, the island quickly became the center of population and commerce in the Bahamas. In 1666 other colonists from Bermuda settled on New Providence, which soon became the center of population and commerce in the Bahamas, with almost 500 people living on the island by 1670. Unlike the Eleutherians, who were primarily farmers, the first settlers on New Providence made their living from the sea, salvaging (mainly Spanish) wrecks, making salt, and taking fish, turtles, conchs and ambergris. Farmers from Bermuda soon followed the seamen to New Providence, where they found good, plentiful land. Neither the Eleutherian colony nor the settlement on New Providence had any legal standing under English law. In 1670 the Proprietors of Carolina were issued a patent for the Bahamas, but the governors sent by the Proprietors had difficulty imposing their authority on the independent-minded residents of New Providence.Albury:47-51Johnson:4 Republic of Pirates The Bahamians soon came into conflict with the Spanish over the salvaging of wrecks. The Bahamian wreckers drove the Spanish away from their wrecked ships, and attacked Spanish salvagers, seizing goods the Spanish had already recovered from the wrecks. When the Spanish raided the Bahamas, the Bahamians , in turn, commissioned privateers against Spain, even though England and Spain were at peace. In 1684 the Spanish burned the settlements on New Providence and Eleuthera, after which they were largely abandoned. New Providence was settled a second time in 1686 by colonists from Jamaica. upPirate captain Henry Every on shore while his ship the Fancy engages another vessel. Every eluded the authorities after supposedly bribing the governor appointed by the Proprietors of Carolina In the 1690s English privateers (England was then at war with France) made a base in the Bahamas. In 1696 Henry Every (or Avery), using the assumed name Henry Bridgeman, brought his ship Fancy, loaded with pirates' loot, into Nassau harbor. Every bribed the governor, Nicholas Trott (uncle of the Nicholas Trott who presided at the trial of Stede Bonnet), with gold and silver, and by leaving him the Fancy, still loaded with 50 tons of elephant tusks and 100 barrels of gunpowder. Following peace with France in 1697, many of the privateers became pirates. From this time the pirates increasingly made Nassau, the Bahamian capital founded in 1694, their base. The governors appointed by the Proprietors usually made a show of suppressing the pirates, but most were accused of dealing with them. By 1701 England was at war with France and Spain. In 1703 and 1706 combined French-Spanish fleets attacked and sacked Nassau, after which some settlers left, and the Proprietors gave up on trying to govern the islands.Albury:51-5Craton:70-87Johnson:6Woodard:12-14, 23-24 Reasserting British control Starting in 1713, Woodes Rogers had conceived the idea of leading an expedition to Madagascar to suppress the pirates there and establish it as a British colony. Rogers' friends Richard Steele and Joseph Addison eventually convinced him to tackle the pirate's nest in the Bahamas, instead. Rogers and others formed a company to fund the venture. They persuaded the Proprietors of Carolina to surrender the government of the Bahamas to the king while retaining title to the land. In 1717 King George appointed Rogers governor of the Bahamas and issued a proclamation granting a pardon to any pirate who surrendered to a British governor within one year.Albury:69-74Craton:93-6Johnson:7-8Woodard:117-121, 163-168 Woodes Rogers and his family by William Hogarth, 1729. Rogers, the first royal governor of the Bahamas, is seated as he is shown a map of New Providence. Word of the appointment of a new governor and the offer of pardons reached Nassau ahead of Rogers and his forces. Some of the pirates were willing to accept a pardon and retire from piracy. Henry Jennings and Christopher Winter, sailed off to find British authorities to confirm their acceptance of the amnesty. Others were not ready to give up. Many of those were Jacobites, supporters of the House of Stuart, who identified as enemies of the Hanoverian King George. Still , others simply identified as rebels or thought they were better off as pirates than trying to earn an honest living. When a Royal Navy ship brought official word to Nassau of the pardon offer, many pirates planned to accept. Soon, however, the recalcitrant parties gained the upper hand, eventually forcing the Navy ship to leave.Woodard:226-29 Blackbeard, Stede Bonnet, Nicholas Brown and Edmond Content left the Bahamas for other territories. Charles Vane, with \"Calico Jack\" Rackham and Edward England in his crew, came to prominence at this time. Vane worked to organize resistance to the anticipated arrival of Royal authority, even appealing to James Francis Edward Stuart, the Stuart pretender, for aid in holding the Bahamas and capturing Bermuda for the Stuarts. As aid from the Stuarts failed to materialize and the date for Rogers' arrival approached, Vane and his crew prepared to leave Nassau.Woodard:236-40, 245-47, 259-61 Vane attacked several small settlements in the Bahamas but, after he refused to attack a stronger French frigate, he was deposed for cowardice and replaced as captain by \"Calico Jack\" Rackham. Vane never returned to the Bahamas; he was eventually caught, convicted , and executed in Jamaica. After nearly being captured by Jamaican privateers, and hearing that the king had extended the deadline for pardons for piracy, Rackham and his crew returned to Nassau to surrender to Woodes Rogers. Diarama of Anne Bonny and Mary Read at Nassau harbor at the Pirates of Nassau Museum in Nassau. The two began their pirating careers at Nassau. In Nassau Rackham became involved with Anne Bonny; he tried to arrange an annulment of her marriage to another ex-pirate, James Bonny. Rogers blocked the annulment, and Rackham and Bonny left Nassau to be pirates again, taking a small crew and Bonny's friend Mary Read with them. Within months, Rackham, Bonny , and Read were captured and taken to Jamaica. They were convicted of piracy, and Rackham was executed. Bonny and Read were sent to prison, as both were pregnant and therefore excluded from execution. Read died in prison, while Bonny's fate is unknown.Woodard:304-10, 315-20 When Britain and Spain went to war again in 1719, many of the ex-pirates were commissioned by the British government as privateers. A Spanish invasion fleet set out for the Bahamas, but was diverted to Pensacola, Florida when it was seized by the French. Rogers continued to improve the defenses of Nassau, spending his personal fortune and going heavily into debt to do so. In 1720, the Spaniards finally attacked Nassau. Rogers returned to Britain in 1722 to plead for repayment of the money he had borrowed to build up Nassau, only to find he had been replaced as governor. He was sent to debtors' prison, although his creditors later absolved his debts, gaining his release. Latter 18th century In 1741, Governor John Tinker and Peter Henry Bruce constructed Fort Montague. Additionally, the Governor also reported a privateering boom in the Thirteen Colonies in North America. He also reported that over 2300 sumptuous houses were built. In 1768 Governor William Shirley filled in mosquito-breeding swamps and extended Nassau. American forces lands at New Providence during the American Revolutionary War. The landing resulted in a two-week occupation of Nassau in 1776 During the American War of Independence the Bahamas was attacked by American and allied forces on several occasions. In 1778, American forces launched an amphibious assault against Nassau, resulting in its two-week occupation. In 1782, Spanish forces under General Galvez captured the Bahamas in 1782. A British-American Loyalist expedition led by Colonel Andrew Deveaux, recaptured the islands in 1783. After the American Revolution, the British issued land grants to American Loyalists who had gone into exile from the newly established United States. The sparse population of the Bahamas tripled within a few years. The Loyalists developed cotton as a commodity crop, but it dwindled from insect damage and soil exhaustion. In addition to the slaves they brought with them, the planters' descendants imported more African slaves for labor . Most of the current inhabitants in the islands are descended from the slaves brought to work on the Loyalist plantations. Also , thousands of captive Africans, who were liberated from foreign slave ships by the British navy after the abolition of the British slave trade in 1807, were resettled as free persons in the Bahamas. The the Bahamas during the American Civil War prospered as a base for Confederate blockade-running, bringing in cotton to be shipped to the mills of England and running out arms and munitions. None of these provided any lasting prosperity to the islands, nor did attempts to grow different kinds of crops for export. Colonial 20th century In 1911, there was a short-lived movement to make the Bahamas part of Canada. Although the movement enjoyed the support of many in Nassau and from the head of Sun Life, a Canadian insurance company, the movement failed. The failure of the movement was, in part, due to the British government's opposition to uniting a predominantly Black colony with a predominantly white country.Smith, Andrew. 2009. \"Thomas Bassett Macaulay and the Bahamas: Racism, Business , and Canadian Sub-imperialism\". The Journal of Imperial and Commonwealth History. 37, no. 1: 29-50. In World War I organizations such as the Imperial Order of the Daughters of Empire and the Bahamas Red Cross Guild began collecting money, food , and clothing for soldiers and civilians in Europe. \"The Gallant Thirty\" Bahamians set out to join the British West Indies Regiment as early as 1915 and as many as 1,800 served in the armed forces of Canada, Britain , and the United States. The Duke of Windsor was installed as Governor of the Bahamas, arriving at that post in August 1940 with his new Duchess. They were appalled at the condition of Government House, but they \"tried to make the best of a bad situation.\" He did not enjoy the position, and referred to the islands as \"a third-class British colony\".Bloch, Michael (1982). The Duke of Windsor's War. London: Weidenfeld and Nicolson. , p. 364. He opened the small local parliament on October 29, 1940, and they visited the 'Out Islands' that November, which caused some controversy because of on whose yacht they were cruising. The British Foreign Office strenuously objected when the Duke and Duchess planned to tour aboard a yacht belonging to a Swedish magnate, Axel Wenner-Gren, whom American intelligence wrongly believed to be a close friend of Luftwaffe commander Hermann G\u00f6ring.Bloch, Michael (1982). The Duke of Windsor's War. London: Weidenfeld and Nicolson. , pp. 154\u2013159, 230\u2013233 The Duke was praised, however, for his efforts to combat poverty on the islands, although he was as contemptuous of the Bahamians as he was of most non-white peoples of the Empire.Ziegler, Philip (1991). King Edward VIII: The official biography. New York: Alfred A. Knopf. . He was also praised for his resolution of civil unrest over low wages in Nassau in June 1942, when there was a \"full-scale riot,\" even though he blamed the trouble on \"mischief makers \u2013 communists\" and \"men of Central European Jewish descent, who had secured jobs as a pretext for obtaining a deferment of the draft\".Ziegler, pp. 471\u2013472 The Duke resigned the post on 16 March 1945.Matthew, H. C. G. (September 2004; online edition January 2008) \"Edward VIII, later Prince Edward, Duke of Windsor (1894\u20131972)\", Oxford Dictionary of National Biography, Oxford University Press, , retrieved 1 May 2010 (Subscription required)Higham places the date of his resignation as 15 March, and that he left on 5 April. During World War II, the Allies centered their flight training and antisubmarine operations for the Caribbean in the Bahamas. They fought for their freedom. Canadian garrison In April 1942 the United Kingdom asked Canada to provide military support in Nassau, in part to provide protection services to H.R.H. the Duke of Windsor. No. 33 company of the Veterans Guard of Canada was raised and arrived in June. No 33 companies were relieved in 1943 by a company of The Pictou Highlanders. The Canadian garrison left Nassau in 1946 p. 181 Post-World War II The wartime airfield became Nassau's international airport in 1957 and helped spur the growth of mass tourism, which accelerated after Havana was closed to American tourists in 1961. Freeport, on the island of Grand Bahama, was established as a free trade zone in the 1950s and became Bahama's second city. Bank secrecy combined with the lack of corporate and income taxes led to rapid growth in the offshore financial sector during the postwar years. By the early 1980s, the islands had become a major center for the drug trade, with 90 percent of all the cocaine entering the United States reportedly passing through the Bahamas. The College of the Bahamas was founded in 1974 and provided the nation's higher or tertiary education. The college was chartered in 2016 as the University of the Bahamas, offering baccalaureate, master's, and associate degrees, on three campuses and teaching and research centers throughout the Bahamas. Based on the twin pillars of tourism and offshore finance, the Bahamian economy has prospered since the 1950s. However, there remain significant challenges in areas such as education, health care, housing, international narcotics trafficking , and illegal immigration from Haiti. References Albury, Paul. (1975) The Story of the Bahamas. MacMillan Caribbean. Carr, J. Revell. (2008) Seeds of Discontent: The Deep Roots of the American Revolution 1659\u20131750. Walker & Company. Craton, Michael. (1986) A History of the Bahamas. San Salvador Press. Granberry, Julius , and Gary S. Vescelius. (2004) Languages of the Pre-Columbian Antilles. The University of Alabama Press. Johnson, Howard. (1996) The Bahamas from Slavery to Servitude, 1783\u20131933. University Press of Florida. Keegan, William F. (1992) The People Who Discovered Columbus: The Prehistory of the Bahamas. University Press of Florida. Woodard, Colin. (2007) The Republic of Pirates. Harcourt, Inc. State Dept Country Study - Includes information on the Bahamas including history. Rulers.org \u2014 Bahamas List of rulers for the Bahamas", "edit_actions": [{"type": "D", "before": "to", "after": null, "start_char_pos": 499, "end_char_pos": 501}, {"type": "R", "before": "Population", "after": "The population", "start_char_pos": 561, "end_char_pos": 571}, {"type": "D", "before": "'", "after": null, "start_char_pos": 1285, "end_char_pos": 1286}, {"type": "R", "before": "afterwards", "after": "afterward", "start_char_pos": 1748, "end_char_pos": 1758}, {"type": "R", "before": "to", "after": "in", "start_char_pos": 1845, "end_char_pos": 1847}, {"type": "R", "before": "afterwards", "after": "afterward", "start_char_pos": 2205, "end_char_pos": 2215}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2787, "end_char_pos": 2788}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3433, "end_char_pos": 3433}, {"type": "R", "before": "centre", "after": "center", "start_char_pos": 4028, "end_char_pos": 4034}, {"type": "R", "before": "centre", "after": "center", "start_char_pos": 4164, "end_char_pos": 4170}, {"type": "R", "before": "in turn", "after": ", in turn,", "start_char_pos": 5255, "end_char_pos": 5262}, {"type": "D", "before": "in", "after": null, "start_char_pos": 6593, "end_char_pos": 6595}, {"type": "R", "before": "pirates", "after": "pirate's", "start_char_pos": 7084, "end_char_pos": 7091}, {"type": "D", "before": ",", "after": null, "start_char_pos": 7276, "end_char_pos": 7277}, {"type": "D", "before": "of", "after": null, "start_char_pos": 7745, "end_char_pos": 7747}, {"type": "A", "before": null, "after": ",", "start_char_pos": 8176, "end_char_pos": 8176}, {"type": "D", "before": ",", "after": null, "start_char_pos": 8212, "end_char_pos": 8213}, {"type": "R", "before": "Condent", "after": "Content", "start_char_pos": 8575, "end_char_pos": 8582}, {"type": "A", "before": null, "after": ",", "start_char_pos": 9380, "end_char_pos": 9380}, {"type": "R", "before": "harbour", "after": "harbor", "start_char_pos": 9651, "end_char_pos": 9658}, {"type": "A", "before": null, "after": ",", "start_char_pos": 10060, "end_char_pos": 10060}, {"type": "R", "before": "him", "after": "his", "start_char_pos": 11000, "end_char_pos": 11003}, {"type": "A", "before": null, "after": "the", "start_char_pos": 12251, "end_char_pos": 12251}, {"type": "R", "before": "labour", "after": "labor", "start_char_pos": 12342, "end_char_pos": 12348}, {"type": "R", "before": "In addition", "after": "Also", "start_char_pos": 12473, "end_char_pos": 12484}, {"type": "A", "before": null, "after": "the", "start_char_pos": 12689, "end_char_pos": 12689}, {"type": "A", "before": null, "after": ",", "start_char_pos": 13481, "end_char_pos": 13481}, {"type": "D", "before": ",", "after": null, "start_char_pos": 13696, "end_char_pos": 13697}, {"type": "A", "before": null, "after": ",", "start_char_pos": 13727, "end_char_pos": 13727}, {"type": "A", "before": null, "after": ",", "start_char_pos": 13943, "end_char_pos": 13943}, {"type": "A", "before": null, "after": "the", "start_char_pos": 15514, "end_char_pos": 15514}, {"type": "R", "before": "duke", "after": "Duke", "start_char_pos": 15686, "end_char_pos": 15690}, {"type": "R", "before": "centred", "after": "centered", "start_char_pos": 15944, "end_char_pos": 15951}, {"type": "R", "before": "company", "after": "companies", "start_char_pos": 16326, "end_char_pos": 16333}, {"type": "D", "before": "the", "after": null, "start_char_pos": 16748, "end_char_pos": 16751}, {"type": "D", "before": "a", "after": null, "start_char_pos": 16847, "end_char_pos": 16848}, {"type": "R", "before": "centre", "after": "center", "start_char_pos": 16972, "end_char_pos": 16978}, {"type": "R", "before": "per cent", "after": "percent", "start_char_pos": 17007, "end_char_pos": 17015}, {"type": "R", "before": "masters", "after": "master's,", "start_char_pos": 17297, "end_char_pos": 17304}, {"type": "R", "before": "centres", "after": "centers", "start_char_pos": 17372, "end_char_pos": 17379}, {"type": "A", "before": null, "after": ",", "start_char_pos": 17646, "end_char_pos": 17646}, {"type": "A", "before": null, "after": ",", "start_char_pos": 17966, "end_char_pos": 17966}, {"type": "A", "before": null, "after": "the", "start_char_pos": 18481, "end_char_pos": 18481}], "sents_char_pos": [0, 156, 399, 560, 824, 1143, 1298, 1380, 1600, 1654, 1773, 1894, 2033, 2143, 2217, 2318, 2451, 2611, 2750, 2813, 3025, 3077, 3198, 3360, 3666, 3725, 3856, 3918, 3971, 4077, 4266, 4484, 4588, 4698, 4909, 5035, 5203, 5346, 5463, 5626, 5832, 5975, 6216, 6292, 6395, 6530, 6580, 6752, 6994, 7121, 7177, 7312, 7486, 7599, 7698, 7815, 7891, 8013, 8047, 8169, 8294, 8402, 8508, 8622, 8728, 8949, 9084, 9307, 9343, 9405, 9604, 9701, 9749, 9800, 9884, 10029, 10105, 10162, 10259, 10311, 10465, 10588, 10708, 10756, 10910, 11012, 11111, 11215, 11276, 11365, 11444, 11625, 11735, 11810, 11912, 12062, 12127, 12235, 12350, 12472, 12684, 12874, 12998, 13098, 13240, 13401, 13415, 13512, 13562, 13580, 13778, 13966, 14087, 14198, 14292, 14314, 14341, 14384, 14568, 14827, 14849, 14876, 14909, 15113, 15136, 15178, 15522, 15587, 15621, 15911, 16036, 16067, 16240, 16319, 16395, 16645, 16773, 16920, 17101, 17204, 17403, 17514, 17682, 17707, 17740, 17761, 17778, 17859, 17877, 17894, 17927, 17947, 17989, 18037, 18070, 18087, 18144, 18173, 18266, 18295, 18311, 18343, 18440]}
+{"doc_id": "4187880", "revision_depth": "1", "before_revision": "Interlocus contest evolution (ICE) is a process of intergenomic conflict by which different loci within a single genome antagonistically coevolve. ICE supposes that the Red Queen process, which is categorized by a never-ending antagonistic evolutionary arms race, does not only apply to species but also to genes within the genome of a species.Rice & Holland, 1997. \u201c The enemies within: intergenomic conflict, interlocus contest evolution (ICE), and the intraspecific Red Queen.\" Behavioral Ecology and Sociobiology 41(1): 1-10. Because sexual recombination allows different gene loci to evolve semi-autonomously, genes have the potential to coevolve antagonistically. ICE occurs when \u201c an allelic substitution at one locus selects for a new allele at the interacting locus, and vice versa. \u201d As a result, ICE can lead to a chain reaction of perpetual gene substitution at antagonistically interacting loci, and no stable equilibrium can be achieved. The rate of evolution thus increases at that locus. Ibid. ICE is thought to be the dominant mode of evolution for genes controlling social behavior. Ibid. The ICE process can explain many biological phenomena, including intersexual conflict, parent-offspring conflict, and interference competition. Intersexual Conflict A fundamental conflict between the sexes lies in differences in investment: males generally invest predominantly in fertilization while females invest predominantly in offspring.Bateman, AJ. 1948. \u201cIntra-sexual selection in Drosophila.\u201d Heredity 2: 349-368. This conflict manifests itself in many traits associated with sexual reproduction. Genes expressed in only one sex are selectively neutral in the other sex; male- and female-linked genes can therefore be acted upon separated by selection and will evolve semi-autonomously. Rice Holland, 1997. Thus, one sex of a species may evolve to better itself rather than better the species as a whole, sometimes with negative results for the opposite sex: loci will antagonistically coevolve to enhance male reproductive success at females\u2019 expense on the one hand, and to enhance female resistance to male coercion on the other.Trivers, R.L. 1972. \u201c Parental investment and sexual selection. \u201d Sexual Selection and the Descent of Man, 1871\u20131971. Campbell, Aldine Publishing. 136\u2013179. This is an example of intralocus sexual conflict, and is unlikely to be resolved fully throughout the genome. However, in some cases this conflict may be resolved by the restriction of the gene\u2019s expression to only the sex that it benefits, resulting in sexual dimorphism.Bonduriansky, R, SF Chenoweth. 2009. \u201c Intralocus sexual conflict. \u201d Trends in Ecology & Evolution 24(5): 280-288. The ICE theory can explain the differentiation of the human X- and Y-chromosomes. Semi-autonomous evolution may have promoted genes beneficial to females in the X-chromosome even when detrimental to males, and genes beneficial to males in the Y-chromosome, even when detrimental to females. As the distribution of the X-chromosome is three times as large as the Y-chromosome (the X-chromosome occurs in 3/4 of offspring genes, while the Y-chromosome occurs in only 1/4), the Y-chromosome has a reduced opportunity for rapid evolution. Thus the Y-chromosome has \u201cshed\u201d its genes to leave only the essential ones (such as the SRY gene), which gives rise to the differences in the X- and Y-chromosomes.Ridley, M. 2000. Genome: The Autobiography of a Species in 23 Chapters. Harper and Collins. Parent-Offspring Conflict A father, mother and offspring may differ in the optimal resource allocation to the offspring. This co-evolutionary conflict can be considered in the context of ICE. Selection will favor genes in the male to maximize female investment in the current offspring, no matter the consequences to the female \u2019 s reproduction later in life, while selection will favor genes in the female that increase her overall lifetime fitness. Genes expressed in the offspring will be selected to produce an intermediary level of resource allocation between the male-benefit and female-benefit loci. This three-way conflict again occurs when parents feed their offspring, as the optimum feeding rate and optimum point in time to discontinue feeding differ between father, mother and offspring. Rice Holland, 1997. Interference Competition ICE can also explain the theory of interference competition, which is most likely to be associated with opposing sets of genes that determine the outcome of competition between individuals. Different sets of genes may code for signal or receiver phenotypes, such as in the context of threat displays: when a competing male can win more contests by intimidation, rather than by fighting, selection will favor the accumulation of deceitful genes that may not be honest indicators of the male\u2019s fighting capability. Ibid. For example, primitive male elephant seals may have used the lowest frequencies in the threat call of a rival as an indication of body size. The elephant seal \u2019 s enormous nose may have evolved as a resonating device to amplify low frequencies,Bartholomew, GA, NE Collias. 1962. \u201c The role of vocalization in the social behaviour of the northern elephant seal. \u201d Animal Behaviour 10(1): 7-14. illustrating selection that favors the production of low-frequency threat vocalizations. However, this counter-selects for receptor systems that provide an increased threshold required for intimidation, which in turn selects for deeper threat vocalizations. The rapid divergence of threat displays among closely related species provides further evidence in support of the co-evolutionary arms race within the genome of a single species, driven by the ICE process. Rice Holland, 1997.", "after_revision": "Interlocus contest evolution (ICE) is a process of intergenomic conflict by which different loci within a single genome antagonistically coevolve. ICE supposes that the Red Queen process, which is characterized by a never-ending antagonistic evolutionary arms race, does not only apply to species but also to genes within the genome of a species.Rice & Holland, 1997. \" The enemies within: intergenomic conflict, interlocus contest evolution (ICE), and the intraspecific Red Queen.\" Behavioral Ecology and Sociobiology 41(1): 1-10. Because sexual recombination allows different gene loci to evolve semi-autonomously, genes have the potential to coevolve antagonistically. ICE occurs when \" an allelic substitution at one locus selects for a new allele at the interacting locus, and vice versa. \" As a result, ICE can lead to a chain reaction of perpetual gene substitution at antagonistically interacting loci, and no stable equilibrium can be achieved. The rate of evolution thus increases at that locus. ICE is thought to be the dominant mode of evolution for genes controlling social behavior. The ICE process can explain many biological phenomena, including intersexual conflict, parent-offspring conflict, and interference competition. Intersexual conflict A fundamental conflict between the sexes lies in differences in investment: males generally invest predominantly in fertilization while females invest predominantly in offspring.Bateman, AJ. 1948. \u201cIntra-sexual selection in Drosophila.\u201d Heredity 2: 349-368. This conflict manifests itself in many traits associated with sexual reproduction. Genes expressed in only one sex are selectively neutral in the other sex; male- and female-linked genes can therefore be acted upon separated by selection and will evolve semi-autonomously. Thus, one sex of a species may evolve to better itself rather than better the species as a whole, sometimes with negative results for the opposite sex: loci will antagonistically coevolve to enhance male reproductive success at females\u2019 expense on the one hand, and to enhance female resistance to male coercion on the other.Trivers, R.L. 1972. \" Parental investment and sexual selection. \" Sexual Selection and the Descent of Man, 1871\u20131971. Campbell, Aldine Publishing. 136\u2013179. This is an example of intralocus sexual conflict, and is unlikely to be resolved fully throughout the genome. However, in some cases this conflict may be resolved by the restriction of the gene\u2019s expression to only the sex that it benefits, resulting in sexual dimorphism.Bonduriansky, R, SF Chenoweth. 2009. \" Intralocus sexual conflict. \" Trends in Ecology & Evolution 24(5): 280-288. The ICE theory can explain the differentiation of the human X- and Y-chromosomes. Semi-autonomous evolution may have promoted genes beneficial to females in the X-chromosome even when detrimental to males, and genes beneficial to males in the Y-chromosome, even when detrimental to females. As the distribution of the X-chromosome is three times as large as the Y-chromosome (the X-chromosome occurs in 3/4 of offspring genes, while the Y-chromosome occurs in only 1/4), the Y-chromosome has a reduced opportunity for rapid evolution. Thus the Y-chromosome has \"shed\" its genes to leave only the essential ones (such as the SRY gene), which gives rise to the differences in the X- and Y-chromosomes.Ridley, M. 2000. Genome: The Autobiography of a Species in 23 Chapters. Harper and Collins. Parent\u2013offspring conflict A father, mother and offspring may differ in the optimal resource allocation to the offspring. This co-evolutionary conflict can be considered in the context of ICE. Selection will favor genes in the male to maximize female investment in the current offspring, no matter the consequences to the female ' s reproduction later in life, while selection will favor genes in the female that increase her overall lifetime fitness. Genes expressed in the offspring will be selected to produce an intermediary level of resource allocation between the male-benefit and female-benefit loci. This three-way conflict again occurs when parents feed their offspring, as the optimum feeding rate and optimum point in time to discontinue feeding differ between father, mother and offspring. Interference competition ICE can also explain the theory of interference competition, which is most likely to be associated with opposing sets of genes that determine the outcome of competition between individuals. Different sets of genes may code for signal or receiver phenotypes, such as in the context of threat displays: when a competing male can win more contests by intimidation, rather than by fighting, selection will favor the accumulation of deceitful genes that may not be honest indicators of the male\u2019s fighting capability. For example, primitive male elephant seals may have used the lowest frequencies in the threat call of a rival as an indication of body size. The elephant seal ' s enormous nose may have evolved as a resonating device to amplify low frequencies,Bartholomew, GA, NE Collias. 1962. \" The role of vocalization in the social behaviour of the northern elephant seal. \" Animal Behaviour 10(1): 7-14. illustrating selection that favors the production of low-frequency threat vocalizations. However, this counter-selects for receptor systems that provide an increased threshold required for intimidation, which in turn selects for deeper threat vocalizations. The rapid divergence of threat displays among closely related species provides further evidence in support of the co-evolutionary arms race within the genome of a single species, driven by the ICE process. ", "edit_actions": [{"type": "R", "before": "categorized", "after": "characterized", "start_char_pos": 197, "end_char_pos": 208}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 366, "end_char_pos": 367}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 686, "end_char_pos": 687}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 792, "end_char_pos": 793}, {"type": "D", "before": "Ibid.", "after": null, "start_char_pos": 1004, "end_char_pos": 1009}, {"type": "D", "before": "Ibid.", "after": null, "start_char_pos": 1101, "end_char_pos": 1106}, {"type": "R", "before": "Conflict", "after": "conflict", "start_char_pos": 1263, "end_char_pos": 1271}, {"type": "D", "before": "Rice", "after": null, "start_char_pos": 1803, "end_char_pos": 1807}, {"type": "D", "before": "Holland, 1997.", "after": null, "start_char_pos": 1808, "end_char_pos": 1822}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 2168, "end_char_pos": 2169}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2212, "end_char_pos": 2213}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 2613, "end_char_pos": 2614}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2643, "end_char_pos": 2644}, {"type": "R", "before": "\u201cshed\u201d", "after": "\"shed\"", "start_char_pos": 3252, "end_char_pos": 3258}, {"type": "R", "before": "Parent-Offspring Conflict", "after": "Parent\u2013offspring conflict", "start_char_pos": 3482, "end_char_pos": 3507}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3810, "end_char_pos": 3811}, {"type": "D", "before": "Rice", "after": null, "start_char_pos": 4283, "end_char_pos": 4287}, {"type": "D", "before": "Holland, 1997.", "after": null, "start_char_pos": 4288, "end_char_pos": 4302}, {"type": "R", "before": "Competition", "after": "competition", "start_char_pos": 4316, "end_char_pos": 4327}, {"type": "D", "before": "Ibid.", "after": null, "start_char_pos": 4841, "end_char_pos": 4846}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5006, "end_char_pos": 5007}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 5126, "end_char_pos": 5127}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 5208, "end_char_pos": 5209}, {"type": "D", "before": "Rice", "after": null, "start_char_pos": 5704, "end_char_pos": 5708}, {"type": "D", "before": "Holland, 1997.", "after": null, "start_char_pos": 5709, "end_char_pos": 5723}], "sents_char_pos": [0, 146, 344, 365, 480, 529, 669, 791, 951, 1003, 1100, 1250, 1450, 1468, 1508, 1529, 1612, 1686, 1802, 1822, 2148, 2167, 2211, 2265, 2294, 2413, 2576, 2606, 2642, 2690, 2772, 2981, 3225, 3390, 3406, 3461, 3481, 3602, 3673, 3932, 4088, 4282, 4302, 4517, 4840, 4987, 5119, 5207, 5328, 5497, 5703]}
+{"doc_id": "419841", "revision_depth": "1", "before_revision": "Systematic ideology is a study of ideologies founded in the late 1930s in and around London, England by Harold Walsby, George Walford and others. It seeks to understand the origin and development of ideologies, how ideologies and ideological groups work together , and the possibilities of guiding the development of ideologies on a global scale. The basic premise of systematic ideology is that ideology is the central motivator in human affairs; that the characteristics that make up the major ideologies come in sets; that those sets of characteristics form a series; and that the ideological series forms a system. History Cover of the Social Science Association pamphlet The Intellectual and the People The group that formed around Harold Walsby and his ideas was a breakaway from the Socialist Party of Great Britain . During the Second World War this group developed a fascination with perceived impediments to mass socialist consciousness among the working class. The theory they developed was expressed by Walsby himself in his 1947 book The Domain of Ideologies and those involved in the group set up an organisation to propagate their views called the Social Science Association , which existed from 1944 until 1956, attracting a number of new recruits during the \u2018Turner Controversy\u2019 . It was later succeeded by the Walsby Society and the journal which emerged from it called Ideological Commentary. From the 1980s onwards, George Walford, editor of Ideological Commentary and former secretary of the SSA, watered down some of the theory\u2019s more obviously elitist elements and even left the SPGB money at the time of his death. He did this on the grounds that although in his view the Party would never help achieve socialism, it did perform a valuable function by demonstrating through its application of critical analysis, logical thought and theory the limitations of other political groups that valued these less highly (a perspective which had informed Harold Walsby\u2019s decision in 1950 to surreptitiously rejoin the Party through its postal branch and write articles for the Socialist Standard under the pseudonym \" H. W. S. Bee \" ). Walsby, Walford and their group produced a large number of leaflets, pamphlets and other literature over time, a fair chunk of it dealing with the SPGB. The most readable expressions of systematic ideology are Walford\u2019s book Beyond Politics, published in 1990 , and the pamphlet Socialist Understanding, published ten years earlier. Theory The theory of the group developed over time and was re-christened \u2018systematic ideology \u2019 by Walford in 1976. Its basic premise was that people\u2019s assumptions and identifications (the factors making up their \u2018ideology\u2019 ) are not explicable in terms of material conditions in general and their relationship to the means of production in particular\u2014and are never likely to be. Instead, there are persistent and distinct ideological groups in society, cutting across social classes and forming a series, with the largest groups being most typically guided in their thoughts and actions by a preference for family, authority, familiarity and tradition. Politically, these preferences find predominant expression in the ideas of the large number of so-called \u2018 non-politicals \u2019 in society , and in Conservatism and then Liberalism (the strength of these preferences gradually weakening through the series). As the series progresses further, the next, progressively smaller, ideological groups seek to repress these identifications and preferences in favor of dynamism, social change, logical thought and the pursuit of theory as a guide to decision-making, these being expressed politically in Labourism , more overtly still in Communism and then , in an ultimate and extreme form , in Anarchism (or \u2018Anarchosocialism\u2019 , the purist variety of it allegedly expounded by the Socialist Party of Great Britain ). The more an ideology represses the preferences for family, tradition , etc. in favour of social change, dynamism and the pursuit of theory as a guide to action, the fewer in number its adherents are likely to be, with anarchists (or \u2018 anarcho-socialists \u2019 ) being the smallest of all. Those seeking radical social change, so the theory contends, will always be hampered and restrained by the enduring preferences of the largest ideological groups. Walford In his book , Beyond Politics, George Walford seeks to analyse ideologies on the basis of its adherents' surface behaviors, their underlying sentiments and assumptions (\"ethos\") , and underlying cognitions (\"eidos\"). Of particular interest to him are a single group, the non-politicals , and five major political ideologies , conservatism, liberalism, socialism, communism , and anarchism, which can be listed as a series, with each seeking to \"repress \" its predecessor. He forms a series of hypotheses about the nature of those six ideologies, observing that they may be gauged upon different dimensions : according to relative size and political influence of its adherents, their relative reliance upon theory over practice , and the degree to which they sought change. He postulates that the non-politicals have the greatest influence and least interest in theory , while anarchists exhibit the least influence and greatest interest in theory, with the rest having mixed degrees of those properties. He also formulates that each is relative to certain ideological ethos: a) (short-term) expediency , b) (traditional) principles , c) precision , d) (fundamental) reform , e) revolution , and e) repudiation. By his formulations, historical change, development of technology , and development of more complicated social relations can be explained as occurring in stages along this series . For Walford, all societies historically begin in a state where a mass of individuals engage in expediency at the hunter-gatherer level. This state of affairs is characterized by short-term individual economic behavior and collective political action. Societies grow to have more advanced and secure political systems at the same time that they make better use of agricultural technology with more long-term goals in mind. In the process, economic behavior becomes more and more collectivistic. From then on, the societies engage in wars , and conquer. Empires grow , and create obedience with the mask of traditional principles. Finally, societies enter a stage where principles espoused actually begin to be followed, enacted, and made more precise. Similarly, economic production becomes more bureaucratic and rationally goal-oriented. The remaining three forms of ethos -- reform, revolution, and repudiation\u2014 are, when taken together , seen to compose the envisioned fourth stage in historical development. While some other philosophers have expressed the opinion that political liberalism is the peak or end-stage of historical development (see Francis Fukuyama's \"End of History\" thesis), Walford claims the opposite . \"More than ever before, our world is a boiling, bounding, bubbling ferment of ideological novelty, and the rate of change is accelerating. If the ideological system has reached completion it is only in the sense that a newborn child is complete . \" (Beyond Politics) Walsby\u2019s early version of the theory was clearly hierarchical (with those understanding the theory being the smallest group of all, metaphorically positioned at the apex of a pyramid, just above the SPGB) and it lent itself to criticism on the grounds that it was merely a particularly convoluted type of \u2018human nature \u2019 argument. This was essentially the response outlined in the Socialist Standard\u2019s April 1949 review of Walsby\u2019s book , called The Domain of Sterilities. Publications %DIFDELCMD < %DIFDELCMD < %%% See also John Rowan (psychologist) Political spectrum World Values Survey History of ideas References General%DIFDELCMD < %DIFDELCMD < %%% Specific External links The George Walford International Essay Prize Beyond Politics e-text%DIFDELCMD < %DIFDELCMD < %%% Category:Ideologies Category:Political theories Category:Subfields of political science Category:Sociological theories Category:Social philosophy Category:Socialist Party of Great Britain breakaway grou", "after_revision": "Systematic ideology is a study of ideologies founded in the late 1930s in and around London, England by Harold Walsby, George Walford and others. It seeks to understand the origin and development of ideologies, how ideologies and ideological groups work together and the possibilities of guiding the development of ideologies on a global scale. The basic premise of systematic ideology is that ideology is the central motivator in human affairs; that the characteristics that make up the major ideologies come in sets; that those sets of characteristics form a series; and that the ideological series forms a system. History Cover of the Social Science Association pamphlet The Intellectual and the People The group that formed around Harold Walsby and his ideas was a breakaway from the Socialist Party of Great Britain /SPGB) . During the Second World War , this group developed a fascination with perceived impediments to mass socialist consciousness among the working class. The theory they developed was expressed by Walsby himself in his 1947 book The Domain of Ideologies and those involved in the group set up an organisation to propagate their views called the Social Science Association (SSA) which existed from 1944 until 1956, attracting a number of new recruits during the Turner Controversy . It was later succeeded by the Walsby Society and the journal which emerged from it called Ideological Commentary. From the 1980s onwards, George Walford, editor of Ideological Commentary and former secretary of the SSA, watered down some of the theory\u2019s more obviously elitist elements and even left the SPGB money at the time of his death. He did this on the grounds that although in his view the party would never help achieve socialism, it did perform a valuable function by demonstrating through its application of critical analysis, logical thought and theory the limitations of other political groups that valued these less highly (a perspective which had informed Harold Walsby\u2019s decision in 1950 to surreptitiously rejoin the party through its postal branch and write articles for the Socialist Standard under the pseudonym H. W. S. Bee ). Walsby, Walford and their group produced a large number of leaflets, pamphlets and other literature over time, a fair chunk of it dealing with the SPGB. The most readable expressions of systematic ideology are Walford\u2019s book Beyond Politics, published in 1990 ; and the pamphlet Socialist Understanding, published ten years earlier. Theory The theory of the group developed over time and was re-christened systematic ideology by Walford in 1976. Its basic premise was that people\u2019s assumptions and identifications (the factors making up their ideology ) are not explicable in terms of material conditions in general and their relationship to the means of production in particular\u2014and are never likely to be. Instead, there are persistent and distinct ideological groups in society, cutting across social classes and forming a series, with the largest groups being most typically guided in their thoughts and actions by a preference for family, authority, familiarity and tradition. Politically, these preferences find predominant expression in the ideas of the large number of so-called non-politicals in society and in conservatism and then liberalism (the strength of these preferences gradually weakening through the series). As the series progresses further, the next, progressively smaller, ideological groups seek to repress these identifications and preferences in favor of dynamism, social change, logical thought and the pursuit of theory as a guide to decision-making, these being expressed politically in labourism , more overtly still in communism and then in an ultimate and extreme form in anarchism (or anarcho-socialism , the purist variety of it allegedly expounded by the SPGB ). The more an ideology represses the preferences for family, tradition and so on in favour of social change, dynamism and the pursuit of theory as a guide to action, the fewer in number its adherents are likely to be, with anarchists (or anarcho-socialists ) being the smallest of all. Those seeking radical social change, so the theory contends, will always be hampered and restrained by the enduring preferences of the largest ideological groups. George Walford In his book Beyond Politics, George Walford seeks to analyse ideologies on the basis of its adherents' surface behaviors, their underlying sentiments and assumptions (\"ethos\") and underlying cognitions (\"eidos\"). Of particular interest to him are a single group, the non-politicals ; and five major political ideologies ( conservatism, liberalism, socialism, communism and anarchism) which can be listed as a series, with each seeking to repress its predecessor. He forms a series of hypotheses about the nature of those six ideologies, observing that they may be gauged upon different dimensions . According to relative size and political influence of its adherents, their relative reliance upon theory over practice and the degree to which they sought change. He postulates that the non-politicals have the greatest influence and least interest in theory while anarchists exhibit the least influence and greatest interest in theory, with the rest having mixed degrees of those properties. He also formulates that each is relative to certain ideological ethos: a) (short-term) expediency ; b) (traditional) principles ; c) precision ; d) (fundamental) reform ; e) revolution ; and e) repudiation. By his formulations, historical change, development of technology and development of more complicated social relations can be explained as occurring in stages along this series : For Walford, all societies historically begin in a state where a mass of individuals engage in expediency at the hunter-gatherer level. This state of affairs is characterized by short-term individual economic behavior and collective political action. Societies grow to have more advanced and secure political systems at the same time that they make better use of agricultural technology with more long-term goals in mind. In the process, economic behavior becomes more and more collectivistic. From then on, the societies engage in wars and conquer. Empires grow and create obedience with the mask of traditional principles. Finally, societies enter a stage where principles espoused actually begin to be followed, enacted, and made more precise. Similarly, economic production becomes more bureaucratic and rationally goal-oriented. The remaining three forms of ethos \u2014 reform, revolution, and repudiation\u2014 when taken together are seen to compose the envisioned fourth stage in historical development. While some other philosophers have expressed the opinion that political liberalism is the peak or end-stage of historical development (see Francis Fukuyama's \"End of History\" thesis), Walford claims the opposite , saying: \"More than ever before, our world is a boiling, bounding, bubbling ferment of ideological novelty, and the rate of change is accelerating. If the ideological system has reached completion it is only in the sense that a newborn child is complete \" . Walsby\u2019s early version of the theory was clearly hierarchical (with those understanding the theory being the smallest group of all, metaphorically positioned at the apex of a pyramid, just above the SPGB) and it lent itself to criticism on the grounds that it was merely a particularly convoluted type of human nature argument. This was essentially the response outlined in the Socialist Standard\u2019s April 1949 review of Walsby\u2019s book called The Domain of Sterilities. Publications %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "D", "before": ",", "after": null, "start_char_pos": 263, "end_char_pos": 264}, {"type": "A", "before": null, "after": "/SPGB)", "start_char_pos": 823, "end_char_pos": 823}, {"type": "A", "before": null, "after": ",", "start_char_pos": 854, "end_char_pos": 854}, {"type": "R", "before": ",", "after": "(SSA)", "start_char_pos": 1192, "end_char_pos": 1193}, {"type": "R", "before": "\u2018Turner Controversy\u2019", "after": "Turner Controversy", "start_char_pos": 1277, "end_char_pos": 1297}, {"type": "R", "before": "Party", "after": "party", "start_char_pos": 1698, "end_char_pos": 1703}, {"type": "R", "before": "Party", "after": "party", "start_char_pos": 2034, "end_char_pos": 2039}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 2132, "end_char_pos": 2133}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 2147, "end_char_pos": 2148}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 2412, "end_char_pos": 2413}, {"type": "R", "before": "\u2018systematic ideology \u2019", "after": "systematic ideology", "start_char_pos": 2558, "end_char_pos": 2580}, {"type": "R", "before": "\u2018ideology\u2019", "after": "ideology", "start_char_pos": 2698, "end_char_pos": 2708}, {"type": "D", "before": "\u2018", "after": null, "start_char_pos": 3244, "end_char_pos": 3245}, {"type": "R", "before": "\u2019 in society , and in Conservatism and then Liberalism", "after": "in society and in conservatism and then liberalism", "start_char_pos": 3261, "end_char_pos": 3315}, {"type": "R", "before": "Labourism", "after": "labourism", "start_char_pos": 3679, "end_char_pos": 3688}, {"type": "R", "before": "Communism and then ,", "after": "communism and then", "start_char_pos": 3713, "end_char_pos": 3733}, {"type": "R", "before": ", in Anarchism (or \u2018Anarchosocialism\u2019", "after": "in anarchism (or anarcho-socialism", "start_char_pos": 3766, "end_char_pos": 3803}, {"type": "R", "before": "Socialist Party of Great Britain", "after": "SPGB", "start_char_pos": 3858, "end_char_pos": 3890}, {"type": "R", "before": ", etc.", "after": "and so on", "start_char_pos": 3963, "end_char_pos": 3969}, {"type": "D", "before": "\u2018", "after": null, "start_char_pos": 4127, "end_char_pos": 4128}, {"type": "D", "before": "\u2019", "after": null, "start_char_pos": 4148, "end_char_pos": 4149}, {"type": "R", "before": "Walford", "after": "George Walford", "start_char_pos": 4342, "end_char_pos": 4349}, {"type": "D", "before": ",", "after": null, "start_char_pos": 4362, "end_char_pos": 4363}, {"type": "D", "before": ",", "after": null, "start_char_pos": 4528, "end_char_pos": 4529}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 4636, "end_char_pos": 4637}, {"type": "R", "before": ",", "after": "(", "start_char_pos": 4674, "end_char_pos": 4675}, {"type": "R", "before": ", and anarchism,", "after": "and anarchism)", "start_char_pos": 4723, "end_char_pos": 4739}, {"type": "R", "before": "\"repress \"", "after": "repress", "start_char_pos": 4794, "end_char_pos": 4804}, {"type": "R", "before": ": according", "after": ". According", "start_char_pos": 4956, "end_char_pos": 4967}, {"type": "D", "before": ",", "after": null, "start_char_pos": 5077, "end_char_pos": 5078}, {"type": "D", "before": ",", "after": null, "start_char_pos": 5218, "end_char_pos": 5219}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 5452, "end_char_pos": 5453}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 5482, "end_char_pos": 5483}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 5497, "end_char_pos": 5498}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 5523, "end_char_pos": 5524}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 5539, "end_char_pos": 5540}, {"type": "D", "before": ",", "after": null, "start_char_pos": 5627, "end_char_pos": 5628}, {"type": "R", "before": ".", "after": ":", "start_char_pos": 5740, "end_char_pos": 5741}, {"type": "D", "before": ",", "after": null, "start_char_pos": 6279, "end_char_pos": 6280}, {"type": "D", "before": ",", "after": null, "start_char_pos": 6307, "end_char_pos": 6308}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 6615, "end_char_pos": 6617}, {"type": "D", "before": "are,", "after": null, "start_char_pos": 6655, "end_char_pos": 6659}, {"type": "R", "before": ",", "after": "are", "start_char_pos": 6680, "end_char_pos": 6681}, {"type": "R", "before": ".", "after": ", saying:", "start_char_pos": 6965, "end_char_pos": 6966}, {"type": "D", "before": ".", "after": null, "start_char_pos": 7212, "end_char_pos": 7213}, {"type": "R", "before": "(Beyond Politics)", "after": ".", "start_char_pos": 7216, "end_char_pos": 7233}, {"type": "R", "before": "\u2018human nature \u2019", "after": "human nature", "start_char_pos": 7539, "end_char_pos": 7554}, {"type": "D", "before": ",", "after": null, "start_char_pos": 7671, "end_char_pos": 7672}, {"type": "D", "before": "See also John Rowan (psychologist) Political spectrum World Values Survey History of ideas", "after": null, "start_char_pos": 7750, "end_char_pos": 7840}, {"type": "D", "before": "References General", "after": null, "start_char_pos": 7841, "end_char_pos": 7859}, {"type": "D", "before": "Specific", "after": null, "start_char_pos": 7889, "end_char_pos": 7897}, {"type": "D", "before": "External links The George Walford International Essay Prize Beyond Politics e-text", "after": null, "start_char_pos": 7898, "end_char_pos": 7980}, {"type": "D", "before": "Category:Ideologies Category:Political theories Category:Subfields of political science Category:Sociological theories Category:Social philosophy Category:Socialist Party of Great Britain breakaway grou", "after": null, "start_char_pos": 8010, "end_char_pos": 8212}], "sents_char_pos": [0, 145, 346, 447, 520, 570, 618, 973, 1299, 1413, 1640, 1739, 2151, 2304, 2484, 2600, 2864, 3138, 3391, 3803, 3893, 4178, 4341, 4566, 4821, 5122, 5353, 5560, 5741, 5877, 5992, 6163, 6235, 6293, 6370, 6492, 6579, 6752, 7105, 7564, 7706, 8019]}
+{"doc_id": "4205243", "revision_depth": "1", "before_revision": "NFL EVENTS LIVE STREAM ONLINE 1. Philadelphia Eagles vs Cleveland Browns NFL Schedule 2020 The matchup between Philadelphia Eagles vs Cleveland Browns is going to kickoff on this Sunday, November 22 at FirstEnergy Stadiuam, Cleveland. The game will start at 1:00 PM (Central America Time Zone). Due to the COVID-19 pandemic, a few in-person tickets are available at price as low as $54. But can you miss the action between two of the most inexplicable teams in this season? I guess not. Philadelphia Eagles vs Cleveland Browns Live Streaming Free: We offer you Philadelphia Eagles vs Cleveland Browns watch online free. This matchup between two of the most inexplicable teams of this season, Philadelphia Eagles vs Cleveland Browns watch live free at our site. To watch the game, click on \u2018Philadelphia Eagles vs Cleveland Browns Watch Live Now\u2019. 2. Atlanta Falcons vs New Orleans Saints NFL Schedule 2020 The New Orleans Saints are yet to face their biggest challenge of the season against Atlanta Falcons where they of course plan to keep their winning string alive. Falcons on the other hand, won 3 of its previous 4 matches. The matchup is going to start-off at1:00 PM (Central America time zone) on Sunday, 22 November at the Mercedes-Benz Superdome, New Orleans. The lowest price ticket is available at $128 and given the current pandemic situation and the reduced capacity, very few in-person tickets are available. That doesn\u2019t mean you can\u2019t watch the live action. You can always go for Atlanta Falcons vs New Orleans Saints watch live free.%DIFDELCMD < %DIFDELCMD < %%% Atlanta Falcons vs New Orleans Saints Live Streaming Free:You can enjoy Atlanta Falcons vs New Orleans Saints watch live now from your own home. I\u2019m sure the heat will be no less than from the field. The previous Falcon-Saints stats tell that it will be a very tough and interesting match to watch. And remember, you have the option of Atlanta Falcons vs New Orleans Saints watch online free. 3. Cincinnati Bengal vs Washington NFL Schedule 2020%DIFDELCMD < %DIFDELCMD < %%% Both Washington and Bengals are looking for their third win of the season at FedExField Stadium, Landover. The match will start at 1:00 PM (Central America time zone) on Sunday, 22 November. The lowest price of the tickets is $128. The stadium has reduced its capacity ensuring social distancing due to COVID-19. But you can choose Cincinnati Bengal vs Washington watch online free. Cincinnati Bengal vs Washington Live Streaming Free: It is a must-win match for the Bengals. They will try to come back strong after last week\u2019s loss. Washington is also desperate for victory as they were defeated by a last minute goal in the previous match. We offer you Cincinnati Bengal vs Washington watch live now at our website. This will be an interesting match because both the teams are coming off from weak 10 defeats. But you have nothing to lose, because you get Cincinnati Bengal vs Washington watch live free. 4. Detroit Lions vs Carolina Panthers NFL Schedule 2020: It\u2019s a bit shocking that, there is a possibility that both the Lions and Panthers are going to miss their quarterbacks on their upcoming confrontation on Sunday, 22 November at Bank of America Stadium, Charlotte. The matchup will start at 1:00 PM (Central America time zone). Tickets are available at as low as $105. To ensure social distancing, the stadium has reduced its capacity. But there is an option, Detroit Lions vs Carolina Panthers watch live free. Detroit Lions vs Carolina Panthers Live Streaming Free: we offer you Detroit Lions vs Carolina Panthers watch live now at our website. You will be able to watch the match from home, completely free of cost. Detroit Lions are fighting for staying at the NFC North race; on the other hand, Carolina Panthers is suffering a losing streak with five back to back losses. So, noth the team will fight their best to win. And you can go for Detroit Lions vs Carolina Panthers watch online free.%DIFDELCMD < %DIFDELCMD < %%% 5. Pittsburgh Steelers vs Jacksonville Jaguars NFL Schedule 2020: Pittsburgh Steelers are planning to become the NFL version of perfect 10 when they face Jacksonville Jaguars on Sunday, 22 November at TIAA Bank Field, Jacksonville. The match is going to start at 1:00 PM (Central American time zone). The lowest price of the ticket is $143. The stadium has reduced its capacity to maintain social distancing. But Pittsburgh Steelers vs Jacksonville Jaguars watch live free available at your home. Pittsburgh Steelers vs Jacksonville Jaguars Watch Live Streaming Free: Steelers win a perfect record 9-0 and Jaguars with not so perfect record 1-8 is going to face each other where Steelers aim to claim victory. Pittsburgh Steelers vs Jacksonville Jaguars watch live now is available at our website. And no wonder, we offer this game, Pittsburgh Steelers vs Jacksonville Jaguars watch online free for you. 6. Tennessee Titans vs Baltimore Ravens NFL Schedule 2020: The math between Tennessee Titans vs Baltimore Ravens watch live free is available at our website. The matchup is going to take place at 1:00 PM; Sunday, 22 November at M&T Bank Stadium Baltimore. Tickets are available from $105. But we offer you Tennessee Titans vs Baltimore Ravens watch online free.%DIFDELCMD < %DIFDELCMD < %%% Tennessee Titans vs Baltimore Ravens Watch Streaming Free: at our website you will be able to enjoy Tennessee Titans vs Baltimore Ravens watch live now, completely free of cost. Plus you do not have to drive up to the stadium. You can relax on Sunday and watch your game. 7. New England Patriots vs Houston Texans NFL Schedules 2020:%DIFDELCMD < %DIFDELCMD < %%% The match between New England Patriots vs Houston Texans watch online now is available at our website. The game will take-off at NRG Stadium, Houston on 22 November, and Sunday at 1:00 PM. The lowest price of the tickets is $56. But you do not have to spend a penny if you try our New England Patriots vs Houston Texans watch online free. New England Patriots vs Houston Texans Live Streaming Free: No wonder the New England Patriots will try to hold onto their winning momentum on Sunday when they face Houston Texans. But will they able to keep it hot on the week 11 against Texans? Well, use New England Patriots vs Houston Texans watch live free from our website and you will know for yourself. 8. Miami Dolphins vs Denver Broncos NFL Schedules 2020: Miami Dolphins looks forward to maintain their momentum when they visit west to confront the Denver Broncos on Sunday, 22 November at Empower Field at Mile High, Denver. The match will start at 4:05 PM and the tickets are available from $200. But we have Miami Dolphins vs Denver Broncos watch online free offer for you. You can watch your match from home in this pandemic. Miami Dolphins vs Denver Broncos Live Streaming Free: you have the option of Miami Dolphins vs Denver Broncos watch live now at our website. You can relax in your Sunday afternoon and watch the match with your family. Because we are providing Miami Dolphins vs Denver Broncos watch live free match to our visitors.%DIFDELCMD < %DIFDELCMD < %%% 9. New York Jets vs Los Angeles Chargers NFL Schedules 2020: We are offering New York Jets vs Los Angeles Chargers watch live now at our website. The New York Jets are thirsty for their first victory of 2020. They will visit Los Angeles Chargers on Sunday, 22 November at 4:05 PM at SOFi Stadium, Inglewood. Tickets are available from $200 and stadiums are of reduced capacity to ensure social distancing. But you have nothing to worry for. Because we have New York Jets vs Los Angeles Chargers watch online free for you. New York Jets vs Los Angeles Chargers Live Streaming Free: you can now enjoy your Sunday evening and have New York Jets vs Los Angeles Chargers watch live free, buffer less and in high quality in our website. 10. Green Bay Packers vs Indianapolis Colts NFL Schedules 2020: A win against the Packers at home ground will be a real achievement for the Colts as they face each other on Sunday, 22 November at Lucas Oil Stadium, Indianapolis. The game will start at 4:25 in the evening (Central American Time Zone). Tickets price starts from $113. But you do not have to worry about tickets when we are offering Green Bay Packers vs Indianapolis Colts watch online free.%DIFDELCMD < %DIFDELCMD < %%% Green Bay Packers vs Indianapolis Colt Live Streaming Free: on this Sunday afternoon, you will be able to watch Green Bay Packers vs Indianapolis Colt live free at our website. As both the team is trying to win respect they deserve, you will be able to avail Green Bay Packers vs Indianapolis Colt watch live now that to without spending a penny. 11. Dallas Cowboys vs Minnesota Vikings NFL Schedules 2020:%DIFDELCMD < %DIFDELCMD < %%% The matchup between Dallas Cowboys vs Minnesota Vikings watch live free is available at our website. The game is going to take-off on Sunday, 22 November at U.S. Bank Stadium, Minneapolis from 4:25 PM. The tickets are available from $115. But you do not have to worry. Because you will have Dallas Cowboys vs Minnesota Vikings watch live now from our website. Dallas Cowboys vs Minnesota Vikings Live Streaming Free: Dallas Cowboys have a four game losing streak and Minnesota Vikings have a three game winning streak. But you have win-win situation here, because you get Dallas Cowboys vs Minnesota Vikings watch online free. 12. Kansas City Chiefs vs Las Vegas Raiders NFL Schedule 2020: This game in week 11 is considered to be the biggest AFC west matchup in the last few years. The match is going to kick off at 8:20 PM at Allegiant Stadium, Las Vegas on Sunday, 22 November. The ticket price is set at as low as $118. But the good news is you can have Kansas City Chiefs vs Las Vegas Raiders watch live free at your home. Kansas City Chiefs vs Las Vegas Raiders Live Streaming Free: we are offering Kansas City Chiefs vs Las Vegas Raiders watch live online free from our website. So that you do not have to drive up to the stadium and spend a lot of money in one Sunday afternoon. The Kansas City Chiefs will look forward to take revenge on the Las Vegas Raiders and you will look forward to Kansas City Chiefs vs Las Vegas Raiders watch low completely free of cost. 110px NFL Category:WikiProject American football Category:Unredirected portals with existing subpages Category:NFL Category:NFL Euro", "after_revision": " %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% | width=\"100\\%\" cellpadding=\"2\" cellspacing=\"8\" style=\"background:#f0f8ff; border-style:solid; border-width:2px; border-color: #e0e0ef\" | style=\"vertical-align:top;padding: 0; margin:0;\" | 110px \u03c1 Category:WikiProject American football Category:Unredirected portals with existing subpage", "edit_actions": [{"type": "D", "before": "NFL EVENTS LIVE STREAM ONLINE 1. Philadelphia Eagles vs Cleveland Browns NFL Schedule 2020", "after": null, "start_char_pos": 0, "end_char_pos": 90}, {"type": "D", "before": "The matchup between Philadelphia Eagles vs Cleveland Browns is going to kickoff on this Sunday, November 22 at FirstEnergy Stadiuam, Cleveland. The game will start at 1:00 PM (Central America Time Zone). Due to the COVID-19 pandemic, a few in-person tickets are available at price as low as $54. But can you miss the action between two of the most inexplicable teams in this season? I guess not. Philadelphia Eagles vs Cleveland Browns Live Streaming Free: We offer you Philadelphia Eagles vs Cleveland Browns watch online free. This matchup between two of the most inexplicable teams of this season, Philadelphia Eagles vs Cleveland Browns watch live free at our site. To watch the game, click on \u2018Philadelphia Eagles vs Cleveland Browns Watch Live Now\u2019. 2. Atlanta Falcons vs New Orleans Saints NFL Schedule 2020 The New Orleans Saints are yet to face their biggest challenge of the season against Atlanta Falcons where they of course plan to keep their winning string alive. Falcons on the other hand, won 3 of its previous 4 matches. The matchup is going to start-off at1:00 PM (Central America time zone) on Sunday, 22 November at the Mercedes-Benz Superdome, New Orleans. The lowest price ticket is available at $128 and given the current pandemic situation and the reduced capacity, very few in-person tickets are available. That doesn\u2019t mean you can\u2019t watch the live action. You can always go for Atlanta Falcons vs New Orleans Saints watch live free.", "after": null, "start_char_pos": 91, "end_char_pos": 1550}, {"type": "D", "before": "Atlanta Falcons vs New Orleans Saints Live Streaming Free:You can enjoy Atlanta Falcons vs New Orleans Saints watch live now from your own home. I\u2019m sure the heat will be no less than from the field. The previous Falcon-Saints stats tell that it will be a very tough and interesting match to watch. And remember, you have the option of Atlanta Falcons vs New Orleans Saints watch online free.", "after": null, "start_char_pos": 1580, "end_char_pos": 1972}, {"type": "D", "before": "3. Cincinnati Bengal vs Washington NFL Schedule 2020", "after": null, "start_char_pos": 1973, "end_char_pos": 2025}, {"type": "D", "before": "Both Washington and Bengals are looking for their third win of the season at FedExField Stadium, Landover. The match will start at 1:00 PM (Central America time zone) on Sunday, 22 November. The lowest price of the tickets is $128. The stadium has reduced its capacity ensuring social distancing due to COVID-19. But you can choose Cincinnati Bengal vs Washington watch online free. Cincinnati Bengal vs Washington Live Streaming Free: It is a must-win match for the Bengals. They will try to come back strong after last week\u2019s loss. Washington is also desperate for victory as they were defeated by a last minute goal in the previous match. We offer you Cincinnati Bengal vs Washington watch live now at our website. This will be an interesting match because both the teams are coming off from weak 10 defeats. But you have nothing to lose, because you get Cincinnati Bengal vs Washington watch live free. 4. Detroit Lions vs Carolina Panthers NFL Schedule 2020: It\u2019s a bit shocking that, there is a possibility that both the Lions and Panthers are going to miss their quarterbacks on their upcoming confrontation on Sunday, 22 November at Bank of America Stadium, Charlotte. The matchup will start at 1:00 PM (Central America time zone). Tickets are available at as low as $105. To ensure social distancing, the stadium has reduced its capacity. But there is an option, Detroit Lions vs Carolina Panthers watch live free.", "after": null, "start_char_pos": 2055, "end_char_pos": 3478}, {"type": "D", "before": "Detroit Lions vs Carolina Panthers Live Streaming Free: we offer you Detroit Lions vs Carolina Panthers watch live now at our website. You will be able to watch the match from home, completely free of cost. Detroit Lions are fighting for staying at the NFC North race; on the other hand, Carolina Panthers is suffering a losing streak with five back to back losses. So, noth the team will fight their best to win. And you can go for Detroit Lions vs Carolina Panthers watch online free.", "after": null, "start_char_pos": 3479, "end_char_pos": 3965}, {"type": "D", "before": "5. Pittsburgh Steelers vs Jacksonville Jaguars NFL Schedule 2020:", "after": null, "start_char_pos": 3995, "end_char_pos": 4060}, {"type": "D", "before": "Pittsburgh Steelers are planning to become the NFL version of perfect 10 when they face Jacksonville Jaguars on Sunday, 22 November at TIAA Bank Field, Jacksonville. The match is going to start at 1:00 PM (Central American time zone). The lowest price of the ticket is $143. The stadium has reduced its capacity to maintain social distancing. But Pittsburgh Steelers vs Jacksonville Jaguars watch live free available at your home. Pittsburgh Steelers vs Jacksonville Jaguars Watch Live Streaming Free: Steelers win a perfect record 9-0 and Jaguars with not so perfect record 1-8 is going to face each other where Steelers aim to claim victory. Pittsburgh Steelers vs Jacksonville Jaguars watch live now is available at our website. And no wonder, we offer this game, Pittsburgh Steelers vs Jacksonville Jaguars watch online free for you. 6. Tennessee Titans vs Baltimore Ravens NFL Schedule 2020: The math between Tennessee Titans vs Baltimore Ravens watch live free is available at our website. The matchup is going to take place at 1:00 PM; Sunday, 22 November at M&T Bank Stadium Baltimore. Tickets are available from $105. But we offer you Tennessee Titans vs Baltimore Ravens watch online free.", "after": null, "start_char_pos": 4061, "end_char_pos": 5260}, {"type": "D", "before": "Tennessee Titans vs Baltimore Ravens Watch Streaming Free: at our website you will be able to enjoy Tennessee Titans vs Baltimore Ravens watch live now, completely free of cost. Plus you do not have to drive up to the stadium. You can relax on Sunday and watch your game.", "after": null, "start_char_pos": 5290, "end_char_pos": 5561}, {"type": "D", "before": "7. New England Patriots vs Houston Texans NFL Schedules 2020:", "after": null, "start_char_pos": 5562, "end_char_pos": 5623}, {"type": "D", "before": "The match between New England Patriots vs Houston Texans watch online now is available at our website. The game will take-off at NRG Stadium, Houston on 22 November, and Sunday at 1:00 PM. The lowest price of the tickets is $56. But you do not have to spend a penny if you try our New England Patriots vs Houston Texans watch online free. New England Patriots vs Houston Texans Live Streaming Free: No wonder the New England Patriots will try to hold onto their winning momentum on Sunday when they face Houston Texans. But will they able to keep it hot on the week 11 against Texans? Well, use New England Patriots vs Houston Texans watch live free from our website and you will know for yourself. 8. Miami Dolphins vs Denver Broncos NFL Schedules 2020: Miami Dolphins looks forward to maintain their momentum when they visit west to confront the Denver Broncos on Sunday, 22 November at Empower Field at Mile High, Denver. The match will start at 4:05 PM and the tickets are available from $200. But we have Miami Dolphins vs Denver Broncos watch online free offer for you. You can watch your match from home in this pandemic.", "after": null, "start_char_pos": 5653, "end_char_pos": 6781}, {"type": "D", "before": "Miami Dolphins vs Denver Broncos Live Streaming Free: you have the option of Miami Dolphins vs Denver Broncos watch live now at our website. You can relax in your Sunday afternoon and watch the match with your family. Because we are providing Miami Dolphins vs Denver Broncos watch live free match to our visitors.", "after": null, "start_char_pos": 6782, "end_char_pos": 7096}, {"type": "D", "before": "9. New York Jets vs Los Angeles Chargers NFL Schedules 2020:", "after": null, "start_char_pos": 7126, "end_char_pos": 7186}, {"type": "D", "before": "We are offering New York Jets vs Los Angeles Chargers watch live now at our website. The New York Jets are thirsty for their first victory of 2020. They will visit Los Angeles Chargers on Sunday, 22 November at 4:05 PM at SOFi Stadium, Inglewood. Tickets are available from $200 and stadiums are of reduced capacity to ensure social distancing. But you have nothing to worry for. Because we have New York Jets vs Los Angeles Chargers watch online free for you. New York Jets vs Los Angeles Chargers Live Streaming Free: you can now enjoy your Sunday evening and have New York Jets vs Los Angeles Chargers watch live free, buffer less and in high quality in our website. 10. Green Bay Packers vs Indianapolis Colts NFL Schedules 2020: A win against the Packers at home ground will be a real achievement for the Colts as they face each other on Sunday, 22 November at Lucas Oil Stadium, Indianapolis. The game will start at 4:25 in the evening (Central American Time Zone). Tickets price starts from $113. But you do not have to worry about tickets when we are offering Green Bay Packers vs Indianapolis Colts watch online free.", "after": null, "start_char_pos": 7187, "end_char_pos": 8313}, {"type": "D", "before": "Green Bay Packers vs Indianapolis Colt Live Streaming Free: on this Sunday afternoon, you will be able to watch Green Bay Packers vs Indianapolis Colt live free at our website. As both the team is trying to win respect they deserve, you will be able to avail Green Bay Packers vs Indianapolis Colt watch live now that to without spending a penny.", "after": null, "start_char_pos": 8343, "end_char_pos": 8689}, {"type": "D", "before": "11. Dallas Cowboys vs Minnesota Vikings NFL Schedules 2020:", "after": null, "start_char_pos": 8690, "end_char_pos": 8749}, {"type": "D", "before": "The matchup between Dallas Cowboys vs Minnesota Vikings watch live free is available at our website. The game is going to take-off on Sunday, 22 November at U.S. Bank Stadium, Minneapolis from 4:25 PM. The tickets are available from $115. But you do not have to worry. Because you will have Dallas Cowboys vs Minnesota Vikings watch live now from our website. Dallas Cowboys vs Minnesota Vikings Live Streaming Free: Dallas Cowboys have a four game losing streak and Minnesota Vikings have a three game winning streak. But you have win-win situation here, because you get Dallas Cowboys vs Minnesota Vikings watch online free. 12. Kansas City Chiefs vs Las Vegas Raiders NFL Schedule 2020: This game in week 11 is considered to be the biggest AFC west matchup in the last few years. The match is going to kick off at 8:20 PM at Allegiant Stadium, Las Vegas on Sunday, 22 November. The ticket price is set at as low as $118. But the good news is you can have Kansas City Chiefs vs Las Vegas Raiders watch live free at your home.", "after": null, "start_char_pos": 8779, "end_char_pos": 9806}, {"type": "R", "before": "Kansas City Chiefs vs Las Vegas Raiders Live Streaming Free: we are offering Kansas City Chiefs vs Las Vegas Raiders watch live online free from our website. So that you do not have to drive up to the stadium and spend a lot of money in one Sunday afternoon. The Kansas City Chiefs will look forward to take revenge on the Las Vegas Raiders and you will look forward to Kansas City Chiefs vs Las Vegas Raiders watch low completely free of cost.", "after": "| width=\"100\\%\" cellpadding=\"2\" cellspacing=\"8\" style=\"background:#f0f8ff; border-style:solid; border-width:2px; border-color: #e0e0ef\" | style=\"vertical-align:top;padding: 0; margin:0;\" |", "start_char_pos": 9807, "end_char_pos": 10251}, {"type": "R", "before": "NFL", "after": "\u03c1", "start_char_pos": 10258, "end_char_pos": 10261}, {"type": "R", "before": "subpages Category:NFL Category:NFL Euro", "after": "subpage", "start_char_pos": 10345, "end_char_pos": 10384}], "sents_char_pos": [0, 234, 294, 386, 473, 486, 619, 760, 1068, 1128, 1268, 1422, 1473, 1550, 1724, 1779, 1878, 1972, 2161, 2245, 2286, 2367, 2437, 2530, 2588, 2696, 2772, 2866, 2961, 3231, 3294, 3335, 3402, 3478, 3613, 3685, 3747, 3844, 3892, 3965, 4226, 4295, 4335, 4403, 4491, 4704, 4792, 4898, 5056, 5103, 5154, 5187, 5260, 5467, 5516, 5561, 5755, 5841, 5881, 5991, 6172, 6237, 6351, 6577, 6650, 6728, 6781, 6922, 6999, 7096, 7271, 7334, 7433, 7531, 7566, 7647, 7856, 8085, 8158, 8190, 8313, 8519, 8879, 8980, 9017, 9047, 9138, 9297, 9405, 9561, 9659, 9702, 9806, 9964, 10065, 10251]}
+{"doc_id": "42057779", "revision_depth": "1", "before_revision": "Exertional rhabdomyolysis (ER) is the breakdown of muscle from extreme physical exertion. It is one of many types of rhabdomyolysis that can occur, and because of this the exact prevalence and incidence are unclear. Risks that lead to ER include exercise in hot and humid conditions, improper hydration, inadequate recovery between bouts of exercise, intense physical training, and inadequate fitness levels for beginning high intensity workouts.Line, Robin L., and George S. Rust. Acute Exertional Rhabdomyolysis. Aug. 1995 Retrieved 22 Jan. 2014 Dehydration is one of the biggest factors that can give almost immediate feedback from the body by producing very dark-colored urine.Demos, M. A., E. L. Gitin, and L. J. Kagen. \"Exercise Myoglobinemia and Acute Exertional Rhabdomyolysis.\" Archives of Internal Medicine 134.4 (1974): 669-73. Print. Anatomy Exertional rhabdomyolysis results from damage to the intercellular proteins inside the sarcolemma. Myosin and actin break down in the sarcomeres when ATP is no longer available due to injury to the sarcoplasmic reticulum.Efstratiadis G, Voulgaridou A, Nikiforou D, Kyventidis A, Kourkouni E, Vergoulas. Rhabdomyolysis Updated. Hippokratio General Hospital of Thessaloniki. 2007 Jul-Sep; 11(3): 129-137. Damage to the sarcolemma and sarcoplasmic reticulum from direct trauma or high force production causes a high influx of calcium into the muscle fibers increasing calcium permeability. Calcium ions build up in the mitochondria, impairing cellular respiration.Armstrong, RB. Mechanisms of Exercise-Induced Delayed Muscle Onset musclular soreness: A brief review. Medicine and science in Sports and Exercise vol. 16 No6 pp 529-538 1984! The mitochondria are unable to produce enough ATP to power the cell properly. Reduction in ATP production impairs the cells ability to extract calcium from the muscle cell. Motor end plate of a person with rhabdomyolysis The ion imbalance causes calcium-dependent enzymes to activate which break down muscle proteins even further.Hilbert JE, Sforzo, GA, Swensen T. The Effects of massage on Delayed Onset Muscle Soreness! Br J Sports Med 2003;37:72-75 A high concentration of calcium activates muscle cells, causing the muscle to contract while inhibiting its ability to relax. Actin and myosin The increase of sustained muscle contraction leads to oxygen and ATP depletion with prolonged exposure to calcium. The muscle cell membrane pump may become damaged allowing free form myoglobin to leak into the bloodstream. Physiology Rhabdomyolysis causes the myosin and actin to degenerate into smaller proteins that travel into the circulatory system. The body reacts by increasing intracellular swelling to the injured tissue to send repair cells to the area. This allows creatine kinase and myoglobin to be flushed from the tissue where it travels in the blood until reaching the kidneys.Thomas, J. Crowhurst, T. \u201cExertional Heat Stroke, rhabdomyolsis and susceptibility to malignant hyperthermia.\u201d Internal Medicine Journal 43.9 (2013): 1035-1038. Web. 25 Jan 2014. In addition to the proteins released, large quantities of ions such as intracellular potassium, sodium, and chloride find their way into the circulatory system. Intracellular potassium ion has deleterious effects on the heart's ability to generate action potentials leading to cardiac arrhythmias.Chatzizisis, Yiannis S. Misirli, Gesthimani. et al. \u201cThe Syndrome of Rhabdomyolsis : Complication and Treatment.\u201d European Journal of Medicine 19.8 (2008): 568-574. Web. 25 Jan 2014. Consequently, this can affect peripheral and central perfusion which in turn can affect all major organ systems in the body. When the protein reaches the kidneys it causes a strain on the anatomical structures reducing its effectiveness as a filter for the body. The protein acts like a dam as it forms into tight aggregates when it enters the renal tubules. In addition, the increased intracellular calcium has greater time to bind due to the blockage allowing for renal calculi to form.Rodriguez, Eva. Solar, Maria J. et al. \u201cRisk Factors for Acute Kidney Injury in Severe Rhabdomyolsis .\u201d PLOSONE 10.1371 (2013). Web. 25 Jan 2014. As a result this causes urine output to decrease allowing for the uric acid to build up inside the organ. The increased acid concentration allows the iron from the aggregate protein to be released into the surrounding renal tissue.Poortsmans, JR. Vanderstraten, J. \u201cKidney function during exercise in healthy and diseased human. An Update.\u201d Sports Medicine 18.6 (1994): 419-437. Web. 25 Jan 2014. Iron then strips away molecular bonds of the surrounding tissue which eventually will lead to kidney failure if the tissue damage is too great. Mechanical consideration Muscle degeneration from rhabdomyolysis destroys the myosin and actin filaments in the affected tissue. This initiates the body's natural reaction to increase perfusion to the area allowing for an influx of specialized cells to repair the injury. However, the swelling increases the intracellular pressure beyond normal limits. As the pressure builds in the muscle tissue, the surrounding tissue is crushed against underlying tissue and bone.Davis, DE. Raikin, S. et al. \u201cCharacteristics of patients with chronic exertional compartment syndrome.\u201d Foot & Ankle International 34.10 (2013): 1349-1354. Web. 25 Jan 2014. This is known as compartment syndrome which leads to greater death of the surrounding muscle tissue around the injury. As the muscle dies this will cause pain to radiate from the affected area into the compartmentalized tissue. A loss of range of motion from swelling will also be seen in the affected limb. Along with muscle strength weakness associated with the muscles involved from loss of filament interaction. Compartment syndrome in muscle Dehydration is a common risk factor for exertional rhabdomyolsis because it causes a reduction of plasma volume during exertion. This leads to a reduction of blood flow through the vascular system which inhibits blood vessel constriction.Cleary Michelle A, Sitler Michael, Kendrick Zebulon. Dehydration and Symptoms of Delayed-! Onset Muscle Soreness in Normothermic Men National Athletic Trainers\u2019 Association. J Athl Train. 2006; 41(1) 36-45 ! Diagnosis Exertional rhabdomyolysis, the exercise-induced muscle breakdown that results in muscle pain/soreness, is commonly diagnosed using the urine myoglobin test accompanied by high levels of creatine kinase (CK). Myoglobin is the protein released into the bloodstream when skeletal muscle is broken down. The urine test simply examines whether myoglobin is present or absent. When results are positive the urine normally obtains a dark, brown color followed by serum CK level evaluation to determine the severity of muscle damage. Elevated levels of serum CK greater than 5,000 U/L that are not caused by myocardial infarction, brain injury or disease, generally indicate serious muscle damage confirming diagnosis of ER.Baird, M., F., Graham, S., M., Baker, J., S., & Bikerstaff, G., F. (2012). Creatine kinase and exercise related muscle damage implications for muscle performance and recovery. J of Nutrition & Metabolism, 201, 2-14 Urine is often a dark \"cola\" color as a result of the excretion of muscle cell components. Although sufficient evidence is currently lacking, supplementation with a combination of sodium bicarbonate and mannitol is commonly utilized to prevent kidney failure in rhabdomyolysis patients. Sodium bicarbonate alkalizes urine to stop myoglobin from precipitating in renal tubules. Mannitol has several effects, including vasodilatation of renal vasculature, osmotic diuresis, and free-radical scavenging.Brown, Carlos, et al. \u201cPreventing Renal Failure in Patients with Rhabdomyolysis: Do Bicarbonate and Mannitol Make a Difference?\u201d Journal of Trauma, Injury, Infection, and Critical Care. 56:6 (2004) : 1191-1196 Recovery Before initiating any form of physical activity, the individual must demonstrate a normal level of functioning with all previous symptoms absent. Physical activity should be supervised by a health care professional in case of a recurrence. However, in some low risk individuals, supervision by a medical professional is not required as long as individual follows up with weekly checkups.O\u2019Conner, F. G., Brennan, Jr. F. H., Campbell, W., Heled, Y., & Deuster, P. (2008). Return to physical activity after exertional rhabdomyolysis. American College of Sports Medicine, 7(6), 328-331. Proper hydration prior to performing physical activity and performing exercise in cool, dry environments may reduce the chances of developing a reoccurring episode of ER. Lastly, it is imperative for urine and blood values to be monitored along with careful observation for redevelopment of any signs or symptoms. The recovery program focuses on progressively conditioning/reconditioning the individual and improving functional mobility. However, special considerations prior to participating in rehabilitation program include the individual's 1) extent of muscle injury, if any 2) level of fitness before incident and 3) weight training experience.Cleary, M., Ruiz, D., Eberman, L., Mitchell, I., & Binkley, H. (2007). Dehydration, cramping, and exertional rhabdomyolysis: A case report with suggestions for recovery. Journal of Sport Rehabilitation, 16, 244-259. These special considerations collectively are a form of assessing the individual's capacity to perform physical activity, which is ultimately used to specify the ExRx design. Costs Actual cost for this condition is unknown and also dependent of the level of the condition. In some cases ER can lead to acute kidney failure and bring medical costs up due to the need for hemodialysis for recovery/treatment.", "after_revision": "Exertional rhabdomyolysis (ER) is the breakdown of muscle from extreme physical exertion. It is one of many types of rhabdomyolysis that can occur, and because of this , the exact prevalence and incidence are unclear. Risks that lead to ER include exercise in hot and humid conditions, improper hydration, inadequate recovery between bouts of exercise, intense physical training, and inadequate fitness levels for beginning high-intensity workouts.Line, Robin L., and George S. Rust. Acute Exertional Rhabdomyolysis. Aug. 1995 Retrieved 22 Jan. 2014 Dehydration is one of the biggest factors that can give almost immediate feedback from the body by producing very dark-colored urine.Demos, M. A., E. L. Gitin, and L. J. Kagen. \"Exercise Myoglobinemia and Acute Exertional Rhabdomyolysis.\" Archives of Internal Medicine 134.4 (1974): 669-73. Print. Anatomy Exertional rhabdomyolysis results from damage to the intercellular proteins inside the sarcolemma. Myosin and actin break down in the sarcomeres when ATP is no longer available due to injury to the sarcoplasmic reticulum.Efstratiadis G, Voulgaridou A, Nikiforou D, Kyventidis A, Kourkouni E, Vergoulas. Rhabdomyolysis Updated. Hippokratio General Hospital of Thessaloniki. 2007 Jul-Sep; 11(3): 129-137. Damage to the sarcolemma and sarcoplasmic reticulum from direct trauma or high force production causes a high influx of calcium into the muscle fibers increasing calcium permeability. Calcium ions build up in the mitochondria, impairing cellular respiration.Armstrong, RB. Mechanisms of Exercise-Induced Delayed Muscle Onset muscular soreness: A brief review. Medicine and Science in Sports and Exercise vol. 16 No6 pp 529-538 1984! The mitochondria are unable to produce enough ATP to power the cell properly. Reduction in ATP production impairs the cells ' ability to extract calcium from the muscle cell. Motor endplate of a person with rhabdomyolysis The ion imbalance causes calcium-dependent enzymes to activate which break down muscle proteins even further.Hilbert JE, Sforzo, GA, Swensen T. The Effects of Massage on Delayed Onset Muscle Soreness! Br J Sports Med 2003;37:72-75 A high concentration of calcium activates muscle cells, causing the muscle to contract while inhibiting its ability to relax. Actin , and myosin The increase of sustained muscle contraction leads to oxygen and ATP depletion with prolonged exposure to calcium. The muscle cell membrane pump may become damaged allowing free form myoglobin to leak into the bloodstream. Physiology Rhabdomyolysis causes the myosin and actin to degenerate into smaller proteins that travel into the circulatory system. The body reacts by increasing intracellular swelling to the injured tissue to send repair cells to the area. This allows creatine kinase and myoglobin to be flushed from the tissue where it travels in the blood until reaching the kidneys.Thomas, J. Crowhurst, T. \u201cExertional Heat Stroke, rhabdomyolysis, and susceptibility to malignant hyperthermia.\u201d Internal Medicine Journal 43.9 (2013): 1035-1038. Web. 25 Jan 2014. In addition to the proteins released, large quantities of ions such as intracellular potassium, sodium, and chloride find their way into the circulatory system. Intracellular potassium ion has deleterious effects on the heart's ability to generate action potentials leading to cardiac arrhythmias.Chatzizisis, Yiannis S. Misirli, Gesthimani. et al. \u201cThe Syndrome of Rhabdomyolysis : Complication and Treatment.\u201d European Journal of Medicine 19.8 (2008): 568-574. Web. 25 Jan 2014. Consequently, this can affect peripheral and central perfusion which in turn can affect all major organ systems in the body. When the protein reaches the kidneys it causes a strain on the anatomical structures reducing its effectiveness as a filter for the body. The protein acts as a dam as it forms into tight aggregates when it enters the renal tubules. In addition, the increased intracellular calcium has greater time to bind due to the blockage allowing for renal calculi to form.Rodriguez, Eva. Solar, Maria J. et al. \u201cRisk Factors for Acute Kidney Injury in Severe Rhabdomyolysis .\u201d PLOSONE 10.1371 (2013). Web. 25 Jan 2014. As a result this causes urine output to decrease allowing for the uric acid to build up inside the organ. The increased acid concentration allows the iron from the aggregate protein to be released into the surrounding renal tissue.Poortsmans, JR. Vanderstraten, J. \u201cKidney function during exercise in healthy and diseased human. An Update.\u201d Sports Medicine 18.6 (1994): 419-437. Web. 25 Jan 2014. Iron then strips away molecular bonds of the surrounding tissue which eventually will lead to kidney failure if the tissue damage is too great. Mechanical consideration Muscle degeneration from rhabdomyolysis destroys the myosin and actin filaments in the affected tissue. This initiates the body's natural reaction to increasing perfusion to the area allowing for an influx of specialized cells to repair the injury. However, the swelling increases the intracellular pressure beyond normal limits. As the pressure builds in the muscle tissue, the surrounding tissue is crushed against the underlying tissue and bone.Davis, DE. Raikin, S. et al. \u201cCharacteristics of patients with chronic exertional compartment syndrome.\u201d Foot & Ankle International 34.10 (2013): 1349-1354. Web. 25 Jan 2014. This is known as compartment syndrome which leads to greater death of the surrounding muscle tissue around the injury. As the muscle dies this will cause pain to radiate from the affected area into the compartmentalized tissue. A loss of range of motion from swelling will also be seen in the affected limb. Along with muscle strength weakness associated with the muscles involved from loss of filament interaction. Compartment syndrome in muscle Dehydration is a common risk factor for exertional rhabdomyolysis because it causes a reduction of plasma volume during exertion. This leads to a reduction of blood flow through the vascular system which inhibits blood vessel constriction.Cleary Michelle A, Sitler Michael, Kendrick Zebulon. Dehydration and Symptoms of Delayed-! Onset Muscle Soreness in Normothermic Men National Athletic Trainers\u2019 Association. J Athl Train. 2006; 41(1) 36-45 ! Diagnosis Exertional rhabdomyolysis, the exercise-induced muscle breakdown that results in muscle pain/soreness, is commonly diagnosed using the urine myoglobin test accompanied by high levels of creatine kinase (CK). Myoglobin is the protein released into the bloodstream when skeletal muscle is broken down. The urine test simply examines whether myoglobin is present or absent. When results are positive the urine normally obtains a dark, brown color followed by serum CK level evaluation to determine the severity of muscle damage. Elevated levels of serum CK greater than 5,000 U/L that are not caused by myocardial infarction, brain injury or disease, generally indicate serious muscle damage confirming the diagnosis of ER.Baird, M., F., Graham, S., M., Baker, J., S., & Bikerstaff, G., F. (2012). Creatine kinase and exercise-related muscle damage implications for muscle performance and recovery. J of Nutrition & Metabolism, 201, 2-14 Urine is often a dark \"cola\" color as a result of the excretion of muscle cell components. Although sufficient evidence is currently lacking, supplementation with a combination of sodium bicarbonate and mannitol is commonly utilized to prevent kidney failure in rhabdomyolysis patients. Sodium bicarbonate alkalizes urine to stop myoglobin from precipitating in renal tubules. Mannitol has several effects, including vasodilatation of the renal vasculature, osmotic diuresis, and free-radical scavenging.Brown, Carlos, et al. \u201cPreventing Renal Failure in Patients with Rhabdomyolysis: Do Bicarbonate and Mannitol Make a Difference?\u201d Journal of Trauma, Injury, Infection, and Critical Care. 56:6 (2004) : 1191-1196 Recovery Before initiating any form of physical activity, the individual must demonstrate a normal level of functioning with all previous symptoms absent. Physical activity should be supervised by a health care professional in case of a recurrence. However, in some low-risk individuals, supervision by a medical professional is not required as long as the individual follows up with weekly checkups.O\u2019Conner, F. G., Brennan, Jr. F. H., Campbell, W., Heled, Y., & Deuster, P. (2008). Return to physical activity after exertional rhabdomyolysis. American College of Sports Medicine, 7(6), 328-331. Proper hydration prior to performing physical activity and performing exercise in cool, dry environments may reduce the chances of developing a reoccurring episode of ER. Lastly, it is imperative for urine and blood values to be monitored along with careful observation for the redevelopment of any signs or symptoms. The recovery program focuses on progressive conditioning/reconditioning the individual and improving functional mobility. However, special considerations prior to participating in the rehabilitation program include the individual's 1) extent of muscle injury, if any 2) level of fitness before the incident and 3) weight training experience.Cleary, M., Ruiz, D., Eberman, L., Mitchell, I., & Binkley, H. (2007). Dehydration, cramping, and exertional rhabdomyolysis: A case report with suggestions for recovery. Journal of Sport Rehabilitation, 16, 244-259. These special considerations collectively are a form of assessing the individual's capacity to perform physical activity, which is ultimately used to specify the ExRx design. Costs The actual cost for this condition is unknown and also dependent on the level of the condition. In some cases ER can lead to acute kidney failure and bring medical costs up due to the need for hemodialysis for recovery/treatment.", "edit_actions": [{"type": "A", "before": null, "after": ",", "start_char_pos": 168, "end_char_pos": 168}, {"type": "R", "before": "high intensity", "after": "high-intensity", "start_char_pos": 423, "end_char_pos": 437}, {"type": "R", "before": "musclular", "after": "muscular", "start_char_pos": 1583, "end_char_pos": 1592}, {"type": "R", "before": "science", "after": "Science", "start_char_pos": 1632, "end_char_pos": 1639}, {"type": "A", "before": null, "after": "'", "start_char_pos": 1816, "end_char_pos": 1816}, {"type": "R", "before": "end plate", "after": "endplate", "start_char_pos": 1872, "end_char_pos": 1881}, {"type": "R", "before": "massage", "after": "Massage", "start_char_pos": 2073, "end_char_pos": 2080}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2277, "end_char_pos": 2277}, {"type": "R", "before": "rhabdomyolsis", "after": "rhabdomyolysis,", "start_char_pos": 2931, "end_char_pos": 2944}, {"type": "R", "before": "Rhabdomyolsis", "after": "Rhabdomyolysis", "start_char_pos": 3426, "end_char_pos": 3439}, {"type": "R", "before": "like", "after": "as", "start_char_pos": 3820, "end_char_pos": 3824}, {"type": "R", "before": "Rhabdomyolsis", "after": "Rhabdomyolysis", "start_char_pos": 4115, "end_char_pos": 4128}, {"type": "R", "before": "increase", "after": "increasing", "start_char_pos": 4890, "end_char_pos": 4898}, {"type": "A", "before": null, "after": "the", "start_char_pos": 5155, "end_char_pos": 5155}, {"type": "R", "before": "rhabdomyolsis", "after": "rhabdomyolysis", "start_char_pos": 5856, "end_char_pos": 5869}, {"type": "A", "before": null, "after": "the", "start_char_pos": 6961, "end_char_pos": 6961}, {"type": "R", "before": "exercise related", "after": "exercise-related", "start_char_pos": 7073, "end_char_pos": 7089}, {"type": "A", "before": null, "after": "the", "start_char_pos": 7628, "end_char_pos": 7628}, {"type": "R", "before": "low risk", "after": "low-risk", "start_char_pos": 8170, "end_char_pos": 8178}, {"type": "A", "before": null, "after": "the", "start_char_pos": 8257, "end_char_pos": 8257}, {"type": "A", "before": null, "after": "the", "start_char_pos": 8772, "end_char_pos": 8772}, {"type": "R", "before": "progressively", "after": "progressive", "start_char_pos": 8845, "end_char_pos": 8858}, {"type": "A", "before": null, "after": "the", "start_char_pos": 8995, "end_char_pos": 8995}, {"type": "A", "before": null, "after": "the", "start_char_pos": 9106, "end_char_pos": 9106}, {"type": "R", "before": "Actual", "after": "The actual", "start_char_pos": 9547, "end_char_pos": 9553}, {"type": "R", "before": "of", "after": "on", "start_char_pos": 9608, "end_char_pos": 9610}], "sents_char_pos": [0, 89, 216, 447, 482, 515, 682, 725, 787, 839, 953, 1076, 1157, 1181, 1227, 1241, 1257, 1441, 1516, 1530, 1618, 1667, 1691, 1769, 1865, 2023, 2057, 2114, 2270, 2403, 2511, 2642, 2751, 2881, 2991, 3041, 3059, 3220, 3357, 3408, 3470, 3521, 3539, 3664, 3802, 3898, 4028, 4066, 4155, 4173, 4279, 4405, 4502, 4552, 4570, 4714, 4843, 4986, 5067, 5183, 5211, 5287, 5339, 5357, 5476, 5585, 5665, 5773, 5933, 6043, 6095, 6133, 6216, 6230, 6468, 6560, 6631, 6786, 6978, 7052, 7153, 7283, 7479, 7569, 7694, 7715, 8058, 8152, 8301, 8384, 8445, 8497, 8668, 8812, 8936, 9150, 9220, 9319, 9365, 9540, 9638]}
+{"doc_id": "42545", "revision_depth": "1", "before_revision": "The Republic of Upper Volta (), now Burkina Faso, was a landlocked West African country established on December 11 , 1958 as a self-governing colony within the French Community. Before attaining autonomy it had been French Upper Volta and part of the French Union. On August 5 , 1960, it attained full independence from France. On August 4 , 1984, it changed its name to Burkina Faso. History Upper Volta obtained independence on August 5 , 1960. The first president of the country, Maurice Yam\u00e9ogo, is at the head of the Alliance for Democracy and the Federation / African Democratic Rally. The 1960 Constitution establishes the election by direct universal suffrage of the President and the National Assembly for a term of five years. Shortly after coming to power, Yam\u00e9ogo banned all political parties other than the Alliance for Democracy. Thomas Sankara came to power through a military coup d'\u00e9tat on August 4 , 1983. After the coup, he formed the National Council for the Revolution (CNR), with himself as president. Under the direction of Sankara, the country changed its name on August 4 , 1984, from Upper Volta to Burkina Faso, which means \"Land of Incorruptible People\". Policy From 1958 to 1960, the Republic of Upper Volta was led by a High Commissioner: Max Berthet ( December 11 , 1958 to February 1959), Paul Masson (February 1959 to August 5 , 1960). From 1971 to 1987, the Republic of Upper Volta was led by a Prime Minister: G\u00e9rard Kango Ouedraogo ( February 13 , 1971, to February 8 , 1974) Thomas Sankara ( August 4 , 1983 , to October 14 , 1987)", "after_revision": "The Republic of Upper Volta (), now Burkina Faso, was a landlocked West African country established on 11 December 1958 as a self-governing colony within the French Community. Before attaining autonomy it had been French Upper Volta and part of the French Union. On 5 August 1960, it attained full independence from France. On 4 August 1984, it changed its name to Burkina Faso. History Upper Volta obtained independence on 5 August 1960. The first president of the country, Maurice Yam\u00e9ogo, is at the head of the Alliance for Democracy and the Federation / African Democratic Rally. The 1960 Constitution establishes the election by direct universal suffrage of the President and the National Assembly for a term of five years. Shortly after coming to power, Yam\u00e9ogo banned all political parties other than the Alliance for Democracy. Thomas Sankara came to power through a military coup d'\u00e9tat on 4 August 1983. After the coup, he formed the National Council for the Revolution (CNR), with himself as president. Under the direction of Sankara, the country changed its name on 4 August 1984, from Upper Volta to Burkina Faso, which means \"Land of Incorruptible People\". Policy From 1958 to 1960, the Republic of Upper Volta was led by a High Commissioner: Max Berthet ( 11 December 1958 to February 1959), Paul Masson (February 1959 to 5 August 1960). From 1971 to 1987, the Republic of Upper Volta was led by a Prime Minister: G\u00e9rard Kango Ouedraogo ( 13 February 1971 to 8 February 1974) Thomas Sankara ( 4 August 1983 to 14 October 1987)", "edit_actions": [{"type": "D", "before": "December", "after": null, "start_char_pos": 103, "end_char_pos": 111}, {"type": "R", "before": ",", "after": "December", "start_char_pos": 115, "end_char_pos": 116}, {"type": "D", "before": "August", "after": null, "start_char_pos": 268, "end_char_pos": 274}, {"type": "R", "before": ",", "after": "August", "start_char_pos": 277, "end_char_pos": 278}, {"type": "D", "before": "August", "after": null, "start_char_pos": 331, "end_char_pos": 337}, {"type": "R", "before": ",", "after": "August", "start_char_pos": 340, "end_char_pos": 341}, {"type": "D", "before": "August", "after": null, "start_char_pos": 430, "end_char_pos": 436}, {"type": "R", "before": ",", "after": "August", "start_char_pos": 439, "end_char_pos": 440}, {"type": "D", "before": "August", "after": null, "start_char_pos": 907, "end_char_pos": 913}, {"type": "R", "before": ",", "after": "August", "start_char_pos": 916, "end_char_pos": 917}, {"type": "D", "before": "August", "after": null, "start_char_pos": 1088, "end_char_pos": 1094}, {"type": "R", "before": ",", "after": "August", "start_char_pos": 1097, "end_char_pos": 1098}, {"type": "D", "before": "December", "after": null, "start_char_pos": 1283, "end_char_pos": 1291}, {"type": "R", "before": ",", "after": "December", "start_char_pos": 1295, "end_char_pos": 1296}, {"type": "D", "before": "August", "after": null, "start_char_pos": 1351, "end_char_pos": 1357}, {"type": "R", "before": ",", "after": "August", "start_char_pos": 1360, "end_char_pos": 1361}, {"type": "D", "before": "February", "after": null, "start_char_pos": 1470, "end_char_pos": 1478}, {"type": "D", "before": ", 1971, to", "after": null, "start_char_pos": 1482, "end_char_pos": 1492}, {"type": "A", "before": null, "after": "1971 to", "start_char_pos": 1502, "end_char_pos": 1502}, {"type": "R", "before": ",", "after": "February", "start_char_pos": 1505, "end_char_pos": 1506}, {"type": "D", "before": "August", "after": null, "start_char_pos": 1530, "end_char_pos": 1536}, {"type": "R", "before": ",", "after": "August", "start_char_pos": 1539, "end_char_pos": 1540}, {"type": "R", "before": ", to October", "after": "to", "start_char_pos": 1546, "end_char_pos": 1558}, {"type": "R", "before": ",", "after": "October", "start_char_pos": 1562, "end_char_pos": 1563}], "sents_char_pos": [0, 177, 264, 327, 384, 446, 591, 736, 843, 923, 1023, 1182, 1368]}
+{"doc_id": "4293761", "revision_depth": "2", "before_revision": "Turkmen tradition In Turkmenistan, the epic is called G\u00f6rogly which translates as \"the son of a grave\" and holds an especially important position among Turkmen epics. The Turkmen people refer to performers specialized in as dessanchy bagshy . Within Turkmenistan, dessanchy bagshy are mainly found in two regions of the country: Da\u015foguz and Lebap. Outside of Turkmenistan, the tradition is found in neighbouring countries \u2014 including Uzbekistan, Tajikistan, Kazakhstan, and Iran \u2014 and anywhere Turkmen ethnic groups have historically lived. The epic of G\u00f6rogly tells the story of the hero, , and his forty jigits ( or warriors) , and includes descriptions of all major traditional Turkmen life events . Sections in prose that describe the events alternate with sections in poetry that express the characters\u2019 feelings. The first \"chapter\" of the epic is the plot of the miraculous birth and heroic education of (he grows up with grandfather Jygalybek and aunt ), raising the winged horse of Gyrat, building the Chandybil fortress and collecting squads. The following are stories about the marriage of to a fairy-tale girl - peri Aghayunus (the hero falls in love with a girl in a dream, goes in search of her, overcomes obstacles, takes her to Chandybil), about revenge on for kidnapping the , about the adoption of Ovez, about saving him from captivity and about his marriage. The \"chapters\" of the Gorogly\u2019s struggle with the Arab-Reyhan, the penetration of the hero into the camp of the enemy , the attack of the Sultan\u2019s troops on the country of and the abduction of Ovez, the adoption of Gorogly Hassan, the son of a blacksmith, are of a heroic nature. The cycle ends with the story of the death of Gorogly , who retired to a cave in old age. Various art forms are employed in the oral performance of , including narration, singing, vocal improvisation, and acting. Dessanchy bagshy are known for their prodigious memory, outstanding musical skills, and intelligence, which are all necessary qualities for performing the epic. Performers must master traditional musical instruments \u2014 such as the dutar (a two-stringed plucked instrument) and the gyjak ( a fiddle-like instrument )\u2014 and be able to sing various melodies of the epic and improvise on them . Under the supervision of his master, in addition to learning the repertoire and perfecting his skills, the apprentice learns moral and ethical norms of epic performance. For the transmission of knowledge, teachers use a variety of media, including printed, audio, and video materials. When the student is ready, he takes an exam . The master then gives his blessing to the new performer, who is thus granted the right to perform the epic independently and teach students of his own.", "after_revision": "Turkmen tradition In Turkmenistan, the epic is called which translates as \"the son of a grave\" and holds a special place among the Turkmen epics. The Turkmen people refer to performers specialized in as dessanchy bagshy (musicians performing songs from dastan) . Within Turkmenistan, dessanchy bagshy are encountered in two regions of the country: and Lebap. Outside of Turkmenistan, the tradition is found in neighbouring countries \u2014 including Uzbekistan, Tajikistan, Kazakhstan, and Iran \u2014 and in other places where Turkmen ethnic groups have historically lived. The epic of tells the story of the hero, , and his forty jigits ( warriors) that includes descriptions of all major traditional events of Turkmen life . Sections in prose that describe the events alternate with sections in poetry that express the characters\u2019 feelings. The first \"chapter\" of the epic is about a miraculous birth and heroic education of (he grows up with grandfather Jygalybek and aunt ), raising the winged horse called Gyrat, building the Chandybil fortress and gathering warriors. Next are the stories about the marriage of to a fairy-tale girl , lang|tk-Latn|peri Aga\u00fdunus (the hero falls in love with a girl in his dream, goes in search of her, overcomes obstacles, takes her to Chandybil), about revenge on for kidnapping his aunt, , about the adoption of Ovez, about saving him from captivity and about his marriage. The \"chapters\" about battle with , making a way into an enemy camp, the attack of the Sultan\u2019s troops on the country of and the abduction of Ovez, the adoption of Gorogly Hassan, the son of a blacksmith, are of a heroic nature. The cycle ends with the story of the death of , who retired to a cave in old age. Various art forms are employed in the oral performance of , including narration, singing, vocal improvisation, and acting. Dessanchy bagshys are known for their prodigious memory, outstanding musical skills, and intelligence, which are all necessary qualities for performing the epic. Performers should master traditional musical instruments \u2014 such as the dutar (a two-stringed plucked instrument) and the gyjak ( an instrument resembling the fiddle )\u2014 and be able to sing various melodies of the epic , performing improvisation . Under the supervision of his master, in addition to learning the repertoire and perfecting his skills, the apprentice of the baghshy learns moral and ethical norms of the epic performance. For the transmission of knowledge, teacher bagshys use a variety of techniques and materials. When the apprentice is ready, his knowledge is thouroughly evaluated . The master then gives his blessing to the new performer, who is thus granted the right to perform the epic independently and teach students of his own.", "edit_actions": [{"type": "D", "before": "G\u00f6rogly", "after": null, "start_char_pos": 54, "end_char_pos": 61}, {"type": "R", "before": "an especially important position among", "after": "a special place among the", "start_char_pos": 113, "end_char_pos": 151}, {"type": "A", "before": null, "after": "(musicians performing songs from dastan)", "start_char_pos": 241, "end_char_pos": 241}, {"type": "R", "before": "mainly found", "after": "encountered", "start_char_pos": 286, "end_char_pos": 298}, {"type": "D", "before": "Da\u015foguz", "after": null, "start_char_pos": 330, "end_char_pos": 337}, {"type": "R", "before": "anywhere", "after": "in other places where", "start_char_pos": 486, "end_char_pos": 494}, {"type": "D", "before": "G\u00f6rogly", "after": null, "start_char_pos": 554, "end_char_pos": 561}, {"type": "R", "before": "or warriors) , and", "after": "warriors) that", "start_char_pos": 616, "end_char_pos": 634}, {"type": "R", "before": "Turkmen life events", "after": "events of Turkmen life", "start_char_pos": 682, "end_char_pos": 701}, {"type": "R", "before": "the plot of the", "after": "about a", "start_char_pos": 855, "end_char_pos": 870}, {"type": "R", "before": "of", "after": "called", "start_char_pos": 989, "end_char_pos": 991}, {"type": "R", "before": "collecting squads. The following are", "after": "gathering warriors. Next are the", "start_char_pos": 1035, "end_char_pos": 1071}, {"type": "R", "before": "- peri Aghayunus", "after": ",", "start_char_pos": 1123, "end_char_pos": 1139}, {"type": "A", "before": null, "after": "lang|tk-Latn|peri Aga\u00fdunus", "start_char_pos": 1140, "end_char_pos": 1140}, {"type": "R", "before": "a", "after": "his", "start_char_pos": 1180, "end_char_pos": 1181}, {"type": "R", "before": "the ,", "after": "his aunt, ,", "start_char_pos": 1290, "end_char_pos": 1295}, {"type": "R", "before": "of the Gorogly\u2019s struggle with the Arab-Reyhan, the penetration of the hero into the camp of the enemy", "after": "about battle with", "start_char_pos": 1395, "end_char_pos": 1497}, {"type": "A", "before": null, "after": "making a way into an enemy camp,", "start_char_pos": 1500, "end_char_pos": 1500}, {"type": "D", "before": "Gorogly", "after": null, "start_char_pos": 1707, "end_char_pos": 1714}, {"type": "R", "before": "bagshy", "after": "bagshys", "start_char_pos": 1884, "end_char_pos": 1890}, {"type": "R", "before": "must", "after": "should", "start_char_pos": 2046, "end_char_pos": 2050}, {"type": "R", "before": "a fiddle-like instrument", "after": "an instrument resembling the fiddle", "start_char_pos": 2162, "end_char_pos": 2186}, {"type": "R", "before": "and improvise on them", "after": ", performing improvisation", "start_char_pos": 2239, "end_char_pos": 2260}, {"type": "A", "before": null, "after": "of the baghshy", "start_char_pos": 2381, "end_char_pos": 2381}, {"type": "A", "before": null, "after": "the", "start_char_pos": 2416, "end_char_pos": 2416}, {"type": "R", "before": "teachers", "after": "teacher bagshys", "start_char_pos": 2470, "end_char_pos": 2478}, {"type": "R", "before": "media, including printed, audio, and video", "after": "techniques and", "start_char_pos": 2496, "end_char_pos": 2538}, {"type": "R", "before": "student", "after": "apprentice", "start_char_pos": 2559, "end_char_pos": 2566}, {"type": "R", "before": "he takes an exam", "after": "his knowledge is thouroughly evaluated", "start_char_pos": 2577, "end_char_pos": 2593}], "sents_char_pos": [0, 166, 243, 348, 541, 703, 819, 1053, 1379, 1660, 1750, 1873, 2034, 2262, 2434, 2549, 2595]}
+{"doc_id": "43193013", "revision_depth": "1", "before_revision": "During study of fluid mechanics, researchers attempted to give a correct vision of maritime currents. The origin of currents is owed to physical differences between various water masses, the main parameter being the difference of density that varies in function of the temperature and the concentration of salt . The study of these currents, combined with other factors such as tides (producing a change in sea level) and wind (originally swell) for understanding the marine hydrodynamics and different processes which are linked there as sediment movement and the climate balance.", "after_revision": "During study of fluid mechanics, researchers attempted to give a correct explanation of marine currents. Currents are caused by external driving forces such as wind, gravitational effects, coriolis forces and physical differences between various water masses, the main parameter being the difference of density that varies in function of the temperature and salinity . The study of currents, combined with other factors such as tides and waves is relevant for understanding marine hydrodynamics and linked processes such as sediment transport and climate balance.", "edit_actions": [{"type": "R", "before": "vision of maritime currents. The origin of currents is owed to", "after": "explanation of marine currents. Currents are caused by external driving forces such as wind, gravitational effects, coriolis forces and", "start_char_pos": 73, "end_char_pos": 135}, {"type": "R", "before": "the concentration of salt", "after": "salinity", "start_char_pos": 285, "end_char_pos": 310}, {"type": "D", "before": "these", "after": null, "start_char_pos": 326, "end_char_pos": 331}, {"type": "R", "before": "(producing a change in sea level) and wind (originally swell) for understanding the", "after": "and waves is relevant for understanding", "start_char_pos": 384, "end_char_pos": 467}, {"type": "R", "before": "different processes which are linked there as sediment movement and the", "after": "linked processes such as sediment transport and", "start_char_pos": 493, "end_char_pos": 564}], "sents_char_pos": [0, 101, 312]}
+{"doc_id": "43629081", "revision_depth": "1", "before_revision": "Ndidi Nnoli-Edozien (born July 31, 1972) is a Nigerian social entrepreneur and corporate sustainability and responsibility (CSR) expert and Bottom of the Pyramid empowerment advocate. She is the Founder and President of the Growing Businesses Foundation, Nigeria's largest Bottom of the Pyramid platform which has been managing CSR Projects for multinational corporations. Her status as a social entrepreneur has been recognized by the Bertelsmann AG to whom she is affiliated as a Reinhard Mohn Fellow. At the Africa Conference on Women in Governance, Business and Community Leadership and Women of Influence Awards in London 2010, she received the African Star Excellence Award in Business Development. A member of the International Finance Corporation (IFC), Nnoli-Edozien has contributed to policy reforms in Nigeria through her work with government ministries and agencies. Nnoli-Edozien was born in Karlsruhe City in Germany and she graduated from Queen's College Lagos in 1989 and studied at the London School of Economics and Political Science, United Kingdom earning a BSc in Economics. Nnoli-Edozien gained her master's degree from Johann Wolfgang Goethe University, Frankfurt am Main, Germany in Catholic Theology before undertaking her PhD at the Johann Wolfgang Goethe University in the area of \u201cownership and management structures\u201d with a global focus on the global applicability of African Models of Corporate Governance and Sustainability. October 1999, Nnoli-Edozien founded the Growing Businesses Foundation as a platform to support enterprise development at the Bottom of the Pyramid in Nigeria. In January 2001, Nnoli-Edozien founded the Micro-enterprise Development Co-operation, MDC is a platform for evaluating international best practices in micro-finance for building self-reliant and sustainable financial intermediaries that nurture and grow small businesses into viable and socially responsible service providers. Assignments Bibliography Ownership and Management Structures in the Economy: African Traditional Values Applied to Modern Issues of Sustainability and the Corporate Governance Function\u201d, 2007 CIDJAP Printing Press, Africa Fund on Sustainability Micro-finance Bank: Our Role towards Economic Development and Poverty Alleviation in Nigeria, 2005 Joint Publication, CIDJAP Press, -22. Development is about People, Business is about Ethics, 2003, CIDJAP Joint Publication, Enugu, -23. Afrika in Eigener Sache: Weissheit, Kultur und Leben der Igbo (IKO Verlag fuer Interkulturelle Kommunikation, Frankfurt/London, 2003, Die Reihe Ezi-Muoma Afrika Verstehen Nr. 1; Herausgeber: Ike/Hoffmann) Understanding Africa: Traditional Legal Reasoning, Jurisprudence & Justice in Igboland; (CIDJAP Joint Publication, 2001, Enugu, )", "after_revision": "Ndidi Nnoli-Edozien Ph.D (born July 31, 1972) is a Nigerian social entrepreneur and corporate sustainability and responsibility (CSR) expert and Bottom of the Pyramid empowerment advocate. She is the Founder and President of the Growing Businesses Foundation, Nigeria's largest Bottom of the Pyramid platform which has been managing CSR Projects for multinational corporations. Her status as a social entrepreneur has been recognized by the Bertelsmann AG to whom she is affiliated as a Reinhard Mohn Fellow. She is an avid researcher as well as a writer. She is passionate about Circular Economy and sustainability in businesses. She also champions empowerment for business entrepreneurs at the lower end of the economic pyramid. At the Africa Conference on Women in Governance, Business and Community Leadership and Women of Influence Awards in London 2010, she received the African Star Excellence Award in Business Development. A member of the International Finance Corporation (IFC), Nnoli-Edozien has contributed to policy reforms in Nigeria through her work with government ministries and agencies. Nnoli-Edozien was born in Karlsruhe City in Germany and she graduated from Queen's College Lagos in 1989 and studied at the London School of Economics and Political Science, United Kingdom earning a BSc in Economics. Nnoli-Edozien gained her master's degree from Johann Wolfgang Goethe University, Frankfurt am Main, Germany in Catholic Theology before undertaking her PhD at the Johann Wolfgang Goethe University in the area of \u201cownership and management structures\u201d with a global focus on the global applicability of African Models of Corporate Governance and Sustainability. She would later start the foundation for one of her most prominent projects, the Seven Pillar Sustainability Framework. Nnoli-Edozien founded the Growing Businesses Foundation in October 1999 as a platform to support enterprise development at the Bottom of the Pyramid in Nigeria. In January 2001, Nnoli-Edozien founded the Micro-enterprise Development Co-operation, MDC , a platform for evaluating international best practices in micro-finance for building self-reliant and sustainable financial intermediaries that nurture and grow small businesses into viable and socially responsible service providers. In 2016, she co-founded Rising Tide Africa (RTA) with a group of seasoned women investors and entrepreneurs. The RTA has gone on to nurture other women entrepreneurs across Africa. Ndidi Nnoli-Edozien initiated the Sustainability and Governance Function at Africa's largest business conglomerate, Dangote Industries, where she served as the Group Chief Sustainability and Governance Officer from March 2017 till June 2020. Under her leadership, Dangote Cement developed its first GRI certified, globally benchmarked Sustainability Report in 2018, spanning 10 African countries, unveiled at the Nigerian Stock Exchange as the first fully compliant report in 2019. Her mandate was to lead the effort to integrate Sustainability Thinking, Doing and Reporting across the Group, which she achieved by building a Sustainability Culture anchored in people (800 Sustainability Champions) and values (her SevenPillars Methodology). She was previously engaged at the Lagos Business School/Pan-Atlantic University, with responsibility for Public-Private partnerships, Ethics, Sustainability and Social Entrepreneurship. She served as a nominee Director for the World Bank/IFC and co-chairs the Private Sector Advisory Group on SDGs. Ndidi Nnoli-Edozien recently launched the Circular Economy Innovation Partnership, CEIP which aims to initiate and maintain sustainability in business through Circular Economy innovations and partnerships. She has most recently established her Seven Pillar framework which enhances the ideals of the CEIP. Assignments Ndidi Nnoli-Edozien served as the Group Chief Sustainability and Governance Officer for Dangote Group from March 2017 till June 2020. She served as a nominee Director for the World Bank/IFC and co-chairs the Private Sector Advisory Group on SDGs. Bibliography 4. Growing Businesses Foundation URL 8. AB Microfinance Nigeria URL 10. URL 13. Bank f\u00fcr Orden und Mission, Germany URL 16. Global Symposium for Women's Entrepreneurship URL 20. Ownership and Management Structures in the Economy: African Traditional Values Applied to Modern Issues of Sustainability and the Corporate Governance Function\u201d, 2007 CIDJAP Printing Press, 21. Africa Fund on Sustainability Micro-finance Bank: Our Role towards Economic Development and Poverty Alleviation in Nigeria, 2005 Joint Publication, CIDJAP Press, -22. Development is about People, Business is about Ethics, 2003, CIDJAP Joint Publication, Enugu, -23. Afrika in Eigener Sache: Weissheit, Kultur und Leben der Igbo (IKO Verlag fuer Interkulturelle Kommunikation, Frankfurt/London, 2003, Die Reihe Ezi-Muoma Afrika Verstehen Nr. 1; Herausgeber: Ike/Hoffmann) 24. Understanding Africa: Traditional Legal Reasoning, Jurisprudence & Justice in Igboland; (CIDJAP Joint Publication, 2001, Enugu, )", "edit_actions": [{"type": "A", "before": null, "after": "Ph.D", "start_char_pos": 20, "end_char_pos": 20}, {"type": "A", "before": null, "after": "She is an avid researcher as well as a writer. She is passionate about Circular Economy and sustainability in businesses. She also champions empowerment for business entrepreneurs at the lower end of the economic pyramid.", "start_char_pos": 505, "end_char_pos": 505}, {"type": "A", "before": null, "after": "She would later start the foundation for one of her most prominent projects, the Seven Pillar Sustainability Framework.", "start_char_pos": 1458, "end_char_pos": 1458}, {"type": "D", "before": "October 1999,", "after": null, "start_char_pos": 1459, "end_char_pos": 1472}, {"type": "A", "before": null, "after": "in October 1999", "start_char_pos": 1529, "end_char_pos": 1529}, {"type": "R", "before": "is", "after": ",", "start_char_pos": 1709, "end_char_pos": 1711}, {"type": "A", "before": null, "after": "In 2016, she co-founded Rising Tide Africa (RTA) with a group of seasoned women investors and entrepreneurs. The RTA has gone on to nurture other women entrepreneurs across Africa.", "start_char_pos": 1946, "end_char_pos": 1946}, {"type": "A", "before": null, "after": "Ndidi Nnoli-Edozien initiated the Sustainability and Governance Function at Africa's largest business conglomerate, Dangote Industries, where she served as the Group Chief Sustainability and Governance Officer from March 2017 till June 2020. Under her leadership, Dangote Cement developed its first GRI certified, globally benchmarked Sustainability Report in 2018, spanning 10 African countries, unveiled at the Nigerian Stock Exchange as the first fully compliant report in 2019. Her mandate was to lead the effort to integrate Sustainability Thinking, Doing and Reporting across the Group, which she achieved by building a Sustainability Culture anchored in people (800 Sustainability Champions) and values (her SevenPillars Methodology).", "start_char_pos": 1947, "end_char_pos": 1947}, {"type": "A", "before": null, "after": "She was previously engaged at the Lagos Business School/Pan-Atlantic University, with responsibility for Public-Private partnerships, Ethics, Sustainability and Social Entrepreneurship. She served as a nominee Director for the World Bank/IFC and co-chairs the Private Sector Advisory Group on SDGs.", "start_char_pos": 1948, "end_char_pos": 1948}, {"type": "A", "before": null, "after": "Ndidi Nnoli-Edozien recently launched the Circular Economy Innovation Partnership, CEIP which aims to initiate and maintain sustainability in business through Circular Economy innovations and partnerships. She has most recently established her Seven Pillar framework which enhances the ideals of the CEIP.", "start_char_pos": 1949, "end_char_pos": 1949}, {"type": "A", "before": null, "after": "Ndidi Nnoli-Edozien served as the Group Chief Sustainability and Governance Officer for Dangote Group from March 2017 till June 2020.", "start_char_pos": 1962, "end_char_pos": 1962}, {"type": "A", "before": null, "after": "She served as a nominee Director for the World Bank/IFC and co-chairs the Private Sector Advisory Group on SDGs.", "start_char_pos": 1963, "end_char_pos": 1963}, {"type": "A", "before": null, "after": "4. Growing Businesses Foundation URL", "start_char_pos": 1977, "end_char_pos": 1977}, {"type": "A", "before": null, "after": "8. AB Microfinance Nigeria URL", "start_char_pos": 1978, "end_char_pos": 1978}, {"type": "A", "before": null, "after": "10. URL", "start_char_pos": 1979, "end_char_pos": 1979}, {"type": "A", "before": null, "after": "13. Bank f\u00fcr Orden und Mission, Germany URL", "start_char_pos": 1980, "end_char_pos": 1980}, {"type": "A", "before": null, "after": "16. Global Symposium for Women's Entrepreneurship URL", "start_char_pos": 1981, "end_char_pos": 1981}, {"type": "A", "before": null, "after": "20.", "start_char_pos": 1982, "end_char_pos": 1982}, {"type": "A", "before": null, "after": "21.", "start_char_pos": 2173, "end_char_pos": 2173}, {"type": "A", "before": null, "after": "24.", "start_char_pos": 2645, "end_char_pos": 2645}], "sents_char_pos": [0, 184, 373, 504, 706, 880, 1097, 1457, 1618, 1945, 2337, 2617, 2733]}
+{"doc_id": "43812146", "revision_depth": "1", "before_revision": "Contents Introduction The Purpose and Plan of the Universe Objections to the Law of Thought Operation of the Law of Thought PhysicalDestiny Psychic Destiny Mental Destiny Noetic Destiny Re-existence Gods and their Religions The Great Way The Point or Circle The Circle or Zodiac Thinking: the Way to Conscious Immortality ", "after_revision": "Table of Contents LIST OF SYMBOLS, ILLUSTRATIONS AND CHARTS PREFACE AUTHOR\u2019S FOREWORD CHAPTER I INTRODUCTION CHAPTER II THE PURPOSE AND PLAN OF THE UNIVERSE Section 1 There is a purpose and a plan in the Universe.The law of thought. Religions. The soul. Theories concerning the destiny of the soul. Section 2 The soul. Section 3 Outline of a system of the Universe. Time. Space. Dimensions. Section 4 Plan relating to the earth sphere. Section 5 Transition of a breath-form unit to the state of aia. Eternal Order of Progression. The Government of the world. The \u201cfall of man.\u201d Regeneration of the body. Passage of a unit from the nature-side to the intelligent-side. CHAPTER III OBJECTIONS TO THE LAW OF THOUGHT. Section 1 The law of thought in religions and in accidents. Section 2 An accident is an exteriorization of a thought. Purpose of an accident. Explanation of an accident. Accidents in history. Section 3 Religions. Gods. Their claims. The need of religions. The moral code. Section 4 The wrath of God. The destiny of humanity. The innate faith in justice. Section 5 The story of original sin. Section 6 The moral code in religions. CHAPTER IV OPERATION OF THE LAW OF THOUGHT. Section 1 Matter. Units. An Intelligence. A Triune Self. A human being. Section 2 Mind. Thinking. A thought is a being. The atmospheres of the Triune Self. How thoughts are generated. Section 3 Course and exteriorization of a thought. The innate idea of justice Section 4 The law of thought. Exteriorizations and interiorizations. Psychic, mental, and noetic results. The power of thought. Balancing a thought. Cycles. Section 5 How exteriorizations of a thought are brought about. Agents of the law. Hastening or delaying destiny. Section 6 Duties of a human being. Responsibility Conscience. Sin. Section 7 The law of thought. Physical, psychic, mental,and noetic destiny. CHAPTER V PHYSICAL DESTINY. Section 1 What physical destiny includes. Section 2 Outward circumstances as physical destiny. Section 3 Physical heredity is destiny. Healthy or sickly bodies. Unjust persecutions. Errors of justice. Congenital idiots. The span of life. Manner of death. Section 4 Money. The money god. Poverty. Reversals. The born thief. There is no accident of wealth or inheritance. Section 5 Group destiny. Rise and fall of a nation. The facts of history. Agents of the law. Religions as group destiny. Why person is born into a religion. Section 6 The Government of the world. How the destinies of the individual, the community, or the nation are made by thinking; and how destiny is administered. Section 7 Possible chaos in the world. Intelligences govern the order of events. CHAPTER VI PSYCHIC DESTINY. Section 1 Form destiny. Strictly psychic destiny. Six classes of psychic destiny. The aia. The breath-form. Section 2 Form destiny. Prenatal influences. Six classes of psychic destiny. Section 3 Form destiny. Prenatal influences. Conception. Fetal development. Section 4 Prenatal influences of parents. Thoughts of the mother. Inheritance of former thoughts. Section 5 The first few years of life. Psychic inheritance. Section 6 Mediumship. Materializations. Seances. Section 7 Clairvoyance. Psychic powers. Section 8 Pranayama. Psychic phenomena by wonder-workers. Section 9 Personal magnetism. Section 10 Vibrations. Colors. Section 11 Religions, as psychic destiny. Section 12 Psychic destiny comprises government and institutions. Section 13 Psychic destiny comprises party and class spirits. Section 14 Habits, customs and fashions are psychic destiny. Section 15 Gambling. Drinking. The spirit of alcohol. Section 16 Gloom, pessimism, malice, fear, hope, joyousness, trust, ease, \u2014as psychic destiny. Section 17 Sleep. Section 18 Dreams. Nightmares. Obsessions in dreams. Deep sleep. Time in sleep. Section 19 Hallucinations. Somnambulism. Hypnosis. Section 20 The process of dying. Cremation. To be conscious at the moment of death. Section 21 After death. Communications with the dead. Apparitions. The doer becomes conscious that its body has died. Section 22 The twelve stages of the doer, from one earth life to the next. After death the doer leads a composite life. The judgment. Hell is made by desires. The devil. Section 23 Heaven is a reality. Re-existence of the succeeding doer portion. CHAPTER VII MENTAL DESTINY. Section 1 The mental atmosphere of the human. Section 2 An Intelligence. The Triune Self. The three orders of Intelligences. The Light of the Intelligence. Section 3 Real thinking. Active thinking; passive thinking.The three minds of the doer. About lack of terms. Rightness-and-reason. The seven minds of the Triune Self. A human thought is a being and has a system. Exteriorizations of a thought. Section 4 Human thinking goes along beaten paths. Section 5 Character of the mental atmosphere of the human.Moral aspect of thinking. The ruling thought. Mental attitude and mental set. Sense-knowledge and self-knowledge. Conscience. Honesty of the mental atmosphere. Results of honest thinking. Dishonest thinking. Thinking a lie. Section 6 Responsibility and duty. Sense-learning and sense-knowledge. Doer-learning and doer-knowledge. Intuition. Section 7 Genius. Section 8 The four classes of human beings. Section 9 Conception of a Beginning. The permanent physical world or Realm of Permanence, and the four earths. The trial test of the sexes. The \u201cfall\u201d of the doer. Doers became subject to re-existence in man and woman bodies. Section 10 Prehistoric history. First, Second, and Third Civilization on the human earth. Fallen doers from inside the earth. Section 11 A Fourth Civilization. Wise men. Rises and falls of cycles. Rise of the latest cycle. Section 12 The forms of nature come through the breath-forms of human beings. There is progression, but no evolution. The entities in animal and plant forms are cast off feelings and desires of man. The entities in vermin, in flowers. Section 13 History of the kingdoms of nature. Creation by breath and speech. Thinking under the type of two. The human body is the pattern of the kingdoms of nature. The intelligence in nature. Section 14 This is an age of thought. Schools of thought. Section 15 Mysticism. Section 16 Spiritism. Section 17 Schools of thought that use thinking to produce directly physical results. Mental healing. Section 18 Thoughts are the seeds of a disease. Section 19 Purpose of a disease. The real cure. About schools of thought to banish disease and poverty. Section 20 Thinking against a disease. Other ways of mental healing. There is no escape from payment and from learning. Section 21 Mental healers and their procedures. Section 22 Faith. Section 23 Animal magnetism. Hypnotism. Its dangers. Trance states. Painless injuries inflicted, while in trance. Section 24 Self-hypnosis. Recovery of forgotten knowledge. Section 25 Self-suggestion. Intentional use of passive thinking. Examples of a formula. Section 26 The Eastern Movement. Eastern record of knowledge. Degeneration of the ancient knowledge. The atmosphere of India. Section 27 The breath. What the breath does. The psychic breath. The mental breath. The noetic breath. The fourfold physical breath. Pranayama. Its dangers. Section 28 The system of Patanjali. His eight steps of yoga. Ancient commentaries. Review of his system. Inner meaning of some Sanskrit words. The ancient teaching of which traces survive. What the West wants. Section 29 The Theosophical Movement. The teachings of Theosophy. Section 30 States of the human being in deep sleep. Section 31 Mental destiny in the after death states.The round of twelve stages from life to life. Hells and heavens. CHAPTER VIII NOETIC DESTINY. Section 1 Knowledge of the conscious self in the body.The noetic world. Self-knowledge of the knower of the Triune Self. When knowledge of the conscious self in the body is available to the human. Section 2 The test and trial of the sexes. Projection of a female form. Illustrations. History of the Triune Self. Section 3 The Light of the Intelligence. The Light in the knower of the Triune Self; in the thinker; in the doer. The Light that has gone into nature. Section 4 The intelligence in nature comes from human beings. The pull of nature for Light. Loss of Light into nature. Section 5 Automatic return of Light from nature. The lunar germ. Self-control. Section 6 Reclamation of Light by self-control. Loss of the lunar germ. Retention of the lunar germ.The solar germ. Divine, or \u201cimmaculate,\u201d conception in the head. Regeneration of the physical body. Hiram Abiff. Origin of Christianity. Section 7 Three degrees of Light from Intelligences. Thinking without creating thoughts or destiny. Bodies for the doer, the thinker, and the knower of the Triune Self, within the perfect physical body. Section 8 Free will. The problem of free will. CHAPTER IX RE-EXISTENCE. Section 1 Recapitulation: Make-up of a human being. The Triune Self. The Light of the Intelligence. A human body as the link between nature and the doer. Death of the body. The doer after death. Re-existence of the doer. Section 2 Four kinds of units. Progression of units. Section 3 Raising of the aia to be a Triune Self in the Realm of Permanence. Duty of its doer, in the perfect body. Feeling-and-desire produced a change in the body. The twain, or dual body. Trial and test of bringing feeling-and-desire into balanced union. Section 4 The \u201cfall of man,\u201d i.e. the doer. Changes in the body. Death. Re-existence in a male or a female body. The doers now on earth. Circulations of units through the bodies of humans. Section 5 Fourth Civilization. Changes on the earth crust. Forces. Minerals, plants and flowers. The varied types were produced by human thoughts. Section 6 Fourth Civilization. Lesser civilizations. Section 7 Fourth Civilization. Governments. Ancient teachings of the Light of the Intelligence. Religions. Section 8 The doers now on earth came from a prior earth age. Failure of the doer to improve. The story of feeling-and-desire. The spell of the sexes. The purpose of re-existences. Section 9 Importance of the flesh body. Reclamation of Light. Death of the body. Wanderings of the units. Return of units to a body. Section 10 The doer-in-the-body. Error in the conception of \u201cI.\u201d The personality and re-existence. The doer portion after death. The portions not in the body. How a doer portion is drawn out for re-existence. Section 11 The thoughts summarized at moment of death. Events determined then, for the next life. The flare-up in classic Greece. Something about the Jews. The stamp of a God at birth. Family. The sex. Cause of changing the sex. Section 12 Also predetermined is the kind of body. Physical heredity and how it is limited. Chief mundane occupations. Diseases. The chief events in life. How destiny can be overcome. Section 13 The time between existences. About the heavenly bodies. Time. Why people fit into the age in which they live. Section 14 Everything after death is destiny. Inventors. Classic Hellas. Re-existence in nation groups. Centers of succeeding civilizations. Greece, Egypt, India. Section 15 Training of the doer portion though memory is not present. The body-mind. Doer-memory. Sense-memory. A good memory. Memory after death. Section 16 Why it is fortunate that the human does not remember previous existences. The training of the doer. A human thinks of himself as a body with a name. To be conscious of and as. The false \u201cI\u201d and its illusions. Section 17 When re-existences of a doer portion stop. A \u201clost\u201d doer portion. The hells inside the earth crust. The lecherous. The drunkards. Drug fiends. The state of a \u201clost\u201d doer. Regenerating the physical body. The test in which the doers failed. Section 18 Summary of preceding chapters. Consciousness is the One Reality. Man as the center of the world of time. Circulations of the units. Permanent institutions. Records of thoughts are made in points. The destiny of human beings is written in the starry spaces. Balancing a thought. Cycles of thinking. Glamour in which things are seen. Sensations are elementals. Why nature seeks the doer. Illusions. The essential things in life. CHAPTER X GODS AND THEIR RELIGIONS. Section 1 Religions; on what they are founded. Why belief in a personal God. Problems a religion must meet. Any religion is better than none. Section 2 Classes of Gods. The Gods of religions; how they come into existence. How long they last. Appearance of a God. Changes of a God. Gods have only what human beings have who create and keep them. The name of a God. Christian Gods. Section 3 The human qualities of a God. The knowledge of a God. His objects and interests. Relations of a God. The moral code. Flattery. How Gods lose their power. What a God can do for his worshippers; what he cannot do. After death. Unbelievers. Prayer. Section 4 Benefits of a belief in a God. Seeking God. Prayer. Outside teachings and the inner life. Inner teachings. Twelve types of teachings. Jehovah worship. The Hebrew letters. Christianity. St. Paul. The story of Jesus. Symbolic events. The Kingdom of Heaven, and the Kingdom of God. The Christian Trinity. Section 5 Interpretation of Bible sayings. The story of Adam and Eve. The trial and test of the sexes. \u201cFall of man.\u201d Immortality. St. Paul. Regeneration of the body. Who and what was Jesus? Mission of Jesus. Jesus, a pattern for man. The order of Melchisedec. Baptism. The sexual act, the original sin. The Trinity. Entering the Great Way. CHAPTER XI THE GREAT WAY. Section 1 The \u201cDescent\u201d of man. There is no evolution without, first, involution. The mystery of germ cell development. The future of the human. The Great Way. Brotherhoods. Ancient Mysteries. Initiations. Alchemists. Rosicrucians. Section 2 The Triune Self complete. The Threefold Way, and the three paths of each Way. The lunar, solar, and light germs. Divine, \u201cimmaculate\u201d conception. The form, life, and light paths of The Way in the body. Section 3 The Way of thinking. Honesty and truthfulness as the foundation of progress. Physical, psychic, mental requirements. Changes in the body in the process of regeneration. Section 4 Entering The Way. A new life opens. Advances on the form, life, and light paths. The lunar, solar, and light germs. Bridge between the two nervous systems. Further changes in the body. The perfect, immortal, physical body. The three inner bodies for the doer, the thinker, the knower of the Triune Self, within the perfect physical body. Section 5 The Way in the earth. The ongoer leaves the world. The form path; what he sees there. Shades of the dead. \u201cLost\u201d portions of doers. The choice. Section 6 The ongoer on the life path; on the light path, in the earth. He knows who he is. Another choice. Section 7 Preparing oneself to enter upon The Way. Honesty and truthfulness. The regenerative breath. The four stages in thinking. CHAPTER XII THE POINT OR CIRCLE. Section 1 Creation of a thought. Method of thinking by building within a point. Human thinking. Thinking done by Intelligences. Thinking which does not create thoughts, or destiny. Section 2 Method of thinking in fashioning nature. The forms of nature come from human thoughts. Pre-chemistry. Section 3 The constitution of matter. Units. Section 4 Erroneous conceptions. Dimensions. The heavenly bodies. Time. Space. CHAPTER XIII THE CIRCLE OR ZODIAC. Section 1 Geometrical symbols. The Circle with the Twelve Nameless Points. The value of the zodiacal symbol. Section 2 What the zodiac and its twelve points symbolize. Section 3 The zodiac related to the human body; to the Triune Self; to the Intelligence. Section 4 The zodiac reveals the purpose of the Universe. Section 5 The zodiac as a historical and prophetic record; as a clock to measure progress in nature and on the intelligent-side, and in the building out of a thought. Section 6 Groups of zodiacal signs. Application to the human body. CHAPTER XIV THINKING: THE WAY TO CONSCIOUS IMMORTALITY. Section 1 The system of thinking without creating destiny. With what it is concerned. With what it is not concerned. For whom it is presented. The origin of this system. No teacher is needed. Limitations. Preliminaries to be understood. Section 2 Recapitulation: The make-up of the human being. Units. The senses. The breath. The breath-form. The aia. Human bodies and the outside universe. Section 3 Recapitulation continued. The doer portion in the body. The Triune Self and its three parts. The twelve portions of the doer. How long a human is dissatisfied. Section 4 Recapitulation continued. The doer as feeling and as desire. The twelve portions of the doer. The psychic atmosphere. Section 5 Recapitulation continued. The thinker of the Triune Self. The three minds of the doer. The minds of the thinker and the knower. How desire speaks in place of rightness; the reversed round. The mental atmosphere. Section 6 Recapitulation continued. The knower of the Triune Self, selfness and I-ness. The noetic atmosphere. What a human is conscious as. Isolation of feeling; of desire. Being conscious of Consciousness. Section 7 The System of Thinking. What it is. Stages on: The Way to Conscious Immortality . SYMBOLS, ILLUSTRATIONS AND CHARTS. DEFINITIONS AND EXPLANATIONS. INDEX OF FIGURES. INDEX. AFTERWORD. THE WORD FOUNDATION. List of SYMBOLS, ILLUSTRATIONS and CHARTS I-A . . . . . . Circle of the Twelve Nameless Points, and the Four Spheres I-B . . . . . . The Earth Sphere and the Four Worlds I-C . . . . . . The Invisible Physical World or Realm of Permanence;and the Temporal Human World I-D . . . . . . The Physical Plane, and its Four States of Matter I-E . . . . . . The Solid State of Matter and its Four Substates II-A . . . . . . The Units II-B . . . . . . An Unbalanced Unit on the Nature-Side II-C . . . . . . A Balanced Unit of the Perfect Body II-D; E . . . . The Units on the Nature-Side II-F . . . . . . Pre-Chemistry II-G; H . . . . The Eternal Order of Progression III. . . . . . . The Fourfold Physical Human Body IV-A. . . . . . The Lines of a Thought IV-B . . . . . Sense-Government and Self-Government V-A . . . . . . The Triune Self, its Three Parts and Seven Minds V-B . . . . . . The Triune Self of the Human; its Three Atmospheres, and the Physical Atmosphere V-B, a . . . . The Triune Self Complete, and its Perfect Physical Body V-C . . . . . . The Three Orders of Intelligences, and the Seven Faculties of an Intelligence V-D . . . . . . A Re-existing Doer Portion and its After-Death States. The Breath-form during these States VI-A, a . . . . The Cerebro-Spinal Nervous System. The Human Brain VI-A, b; c; d . The Spinal Cord and Nerves, and Spinal Column VI-B . . . . . Ramifications of the Sympathetic Nervous System VI-C . . . . . The Principal Tracts of the Two Systems, and the Paths of the Lunar and the Solar Germs VI-D . . . . . Diagrammatic Sketch of the Perfect, Sexless, Immortal, Physical Body VI-E . . . . . Skeleton of Human Body, showing Sternum VII-A . . . . . The Zodiac VII-B . . . . . The Zodiac, within the Circle of the Twelve Nameless Points VII-C . . . . . The Broken and Extended Zodiac VII-D . . . . . Horizontals, Perpendiculars and Opposites VII-E to L . . The Monad, the Dyads, Triads, Tetrads, Pentads and Hexads", "edit_actions": [{"type": "R", "before": "Contents Introduction The Purpose and Plan of the Universe Objections to the Law of Thought Operation of the Law of Thought PhysicalDestiny Psychic Destiny Mental Destiny Noetic Destiny", "after": "Table of Contents LIST OF SYMBOLS, ILLUSTRATIONS AND CHARTS PREFACE AUTHOR\u2019S FOREWORD CHAPTER I INTRODUCTION CHAPTER II THE PURPOSE AND PLAN OF THE UNIVERSE", "start_char_pos": 0, "end_char_pos": 185}, {"type": "A", "before": null, "after": "Section 1 There is a purpose and a plan in the Universe.The law of thought. Religions. The soul. Theories concerning the destiny of the soul. Section 2 The soul. Section 3 Outline of a system of the Universe. Time. Space. Dimensions. Section 4 Plan relating to the earth sphere. Section 5 Transition of a breath-form unit to the state of aia. Eternal Order of Progression. The Government of the world. The \u201cfall of man.\u201d Regeneration of the body. Passage of a unit from the nature-side to the intelligent-side.", "start_char_pos": 186, "end_char_pos": 186}, {"type": "A", "before": null, "after": "CHAPTER III OBJECTIONS TO THE LAW OF THOUGHT.", "start_char_pos": 187, "end_char_pos": 187}, {"type": "A", "before": null, "after": "Section 1 The law of thought in religions and in accidents. Section 2 An accident is an exteriorization of a thought. Purpose of an accident. Explanation of an accident. Accidents in history. Section 3 Religions. Gods. Their claims. The need of religions. The moral code. Section 4 The wrath of God. The destiny of humanity. The innate faith in justice. Section 5 The story of original sin. Section 6 The moral code in religions.", "start_char_pos": 188, "end_char_pos": 188}, {"type": "A", "before": null, "after": "CHAPTER IV OPERATION OF THE LAW OF THOUGHT.", "start_char_pos": 189, "end_char_pos": 189}, {"type": "A", "before": null, "after": "Section 1 Matter. Units. An Intelligence. A Triune Self. A human being. Section 2 Mind. Thinking. A thought is a being. The atmospheres of the Triune Self. How thoughts are generated. Section 3 Course and exteriorization of a thought. The innate idea of justice Section 4 The law of thought. Exteriorizations and interiorizations. Psychic, mental, and noetic results. The power of thought. Balancing a thought. Cycles. Section 5 How exteriorizations of a thought are brought about. Agents of the law. Hastening or delaying destiny. Section 6 Duties of a human being. Responsibility Conscience. Sin. Section 7 The law of thought. Physical, psychic, mental,and noetic destiny.", "start_char_pos": 190, "end_char_pos": 190}, {"type": "A", "before": null, "after": "CHAPTER V PHYSICAL DESTINY.", "start_char_pos": 191, "end_char_pos": 191}, {"type": "A", "before": null, "after": "Section 1 What physical destiny includes. Section 2 Outward circumstances as physical destiny. Section 3 Physical heredity is destiny. Healthy or sickly bodies. Unjust persecutions. Errors of justice. Congenital idiots. The span of life. Manner of death. Section 4 Money. The money god. Poverty. Reversals. The born thief. There is no accident of wealth or inheritance. Section 5 Group destiny. Rise and fall of a nation. The facts of history. Agents of the law. Religions as group destiny. Why person is born into a religion. Section 6 The Government of the world. How the destinies of the individual, the community, or the nation are made by thinking; and how destiny is administered. Section 7 Possible chaos in the world. Intelligences govern the order of events.", "start_char_pos": 192, "end_char_pos": 192}, {"type": "A", "before": null, "after": "CHAPTER VI PSYCHIC DESTINY.", "start_char_pos": 193, "end_char_pos": 193}, {"type": "A", "before": null, "after": "Section 1 Form destiny. Strictly psychic destiny. Six classes of psychic destiny. The aia. The breath-form. Section 2 Form destiny. Prenatal influences. Six classes of psychic destiny. Section 3 Form destiny. Prenatal influences. Conception. Fetal development. Section 4 Prenatal influences of parents. Thoughts of the mother. Inheritance of former thoughts. Section 5 The first few years of life. Psychic inheritance. Section 6 Mediumship. Materializations. Seances. Section 7 Clairvoyance. Psychic powers. Section 8 Pranayama. Psychic phenomena by wonder-workers. Section 9 Personal magnetism. Section 10 Vibrations. Colors. Section 11 Religions, as psychic destiny. Section 12 Psychic destiny comprises government and institutions. Section 13 Psychic destiny comprises party and class spirits. Section 14 Habits, customs and fashions are psychic destiny. Section 15 Gambling. Drinking. The spirit of alcohol. Section 16 Gloom, pessimism, malice, fear, hope, joyousness, trust, ease, \u2014as psychic destiny. Section 17 Sleep. Section 18 Dreams. Nightmares. Obsessions in dreams. Deep sleep. Time in sleep. Section 19 Hallucinations. Somnambulism. Hypnosis. Section 20 The process of dying. Cremation. To be conscious at the moment of death. Section 21 After death. Communications with the dead. Apparitions. The doer becomes conscious that its body has died. Section 22 The twelve stages of the doer, from one earth life to the next. After death the doer leads a composite life. The judgment. Hell is made by desires. The devil. Section 23 Heaven is a reality.", "start_char_pos": 194, "end_char_pos": 194}, {"type": "R", "before": "Gods", "after": "of the succeeding doer portion.", "start_char_pos": 208, "end_char_pos": 212}, {"type": "A", "before": null, "after": "CHAPTER VII MENTAL DESTINY. Section 1 The mental atmosphere of the human. Section 2 An Intelligence. The Triune Self. The three orders of Intelligences. The Light of the Intelligence. Section 3 Real thinking. Active thinking; passive thinking.The three minds of the doer. About lack of terms. Rightness-and-reason. The seven minds of the Triune Self. A human thought is a being and has a system. Exteriorizations of a thought. Section 4 Human thinking goes along beaten paths. Section 5 Character of the mental atmosphere of the human.Moral aspect of thinking. The ruling thought. Mental attitude and mental set. Sense-knowledge", "start_char_pos": 213, "end_char_pos": 213}, {"type": "R", "before": "their Religions The Great Way", "after": "self-knowledge. Conscience. Honesty of the mental atmosphere. Results of honest thinking. Dishonest thinking. Thinking a lie. Section 6 Responsibility and duty. Sense-learning and sense-knowledge. Doer-learning and doer-knowledge. Intuition. Section 7 Genius. Section 8 The four classes of human beings. Section 9 Conception of a Beginning. The permanent physical world or Realm of Permanence, and the four earths. The trial test of the sexes. The \u201cfall\u201d of the doer. Doers became subject to re-existence in man and woman bodies. Section 10 Prehistoric history. First, Second, and Third Civilization on the human earth. Fallen doers from inside the earth. Section 11 A Fourth Civilization. Wise men. Rises and falls of cycles. Rise of the latest cycle. Section 12 The forms of nature come through the breath-forms of human beings. There is progression, but no evolution. The entities in animal and plant forms are cast off feelings and desires of man. The entities in vermin, in flowers. Section 13 History of the kingdoms of nature. Creation by breath and speech. Thinking under the type of two. The human body is the pattern of the kingdoms of nature. The intelligence in nature. Section 14 This is an age of thought. Schools of thought. Section 15 Mysticism. Section 16 Spiritism. Section 17 Schools of thought that use thinking to produce directly physical results. Mental healing. Section 18 Thoughts are the seeds of a disease. Section 19 Purpose of a disease. The real cure. About schools of thought to banish disease and poverty. Section 20 Thinking against a disease. Other ways of mental healing. There is no escape from payment and from learning. Section 21 Mental healers and their procedures. Section 22 Faith. Section 23 Animal magnetism. Hypnotism. Its dangers. Trance states. Painless injuries inflicted, while in trance. Section 24 Self-hypnosis. Recovery of forgotten knowledge. Section 25 Self-suggestion. Intentional use of passive thinking. Examples of a formula. Section 26 The Eastern Movement. Eastern record of knowledge. Degeneration of the ancient knowledge. The atmosphere of India. Section 27 The breath. What the breath does. The psychic breath. The mental breath. The noetic breath. The fourfold physical breath. Pranayama. Its dangers. Section 28 The system of Patanjali. His eight steps of yoga. Ancient commentaries. Review of his system. Inner meaning of some Sanskrit words. The ancient teaching of which traces survive. What the West wants. Section 29 The Theosophical Movement. The teachings of Theosophy. Section 30 States of the human being in deep sleep. Section 31 Mental destiny in the after death states.The round of twelve stages from life to life. Hells and heavens.", "start_char_pos": 218, "end_char_pos": 247}, {"type": "A", "before": null, "after": "CHAPTER VIII NOETIC DESTINY.", "start_char_pos": 248, "end_char_pos": 248}, {"type": "A", "before": null, "after": "Section 1 Knowledge of the conscious self in the body.The noetic world. Self-knowledge of the knower of the Triune Self. When knowledge of the conscious self in the body is available to the human. Section 2 The test and trial of the sexes. Projection of a female form. Illustrations. History of the Triune Self. Section 3 The Light of the Intelligence. The Light in the knower of the Triune Self; in the thinker; in the doer. The Light that has gone into nature. Section 4 The intelligence in nature comes from human beings. The pull of nature for Light. Loss of Light into nature. Section 5 Automatic return of Light from nature. The lunar germ. Self-control. Section 6 Reclamation of Light by self-control. Loss of the lunar germ. Retention of the lunar germ.The solar germ. Divine, or \u201cimmaculate,\u201d conception in the head. Regeneration of the physical body. Hiram Abiff. Origin of Christianity. Section 7 Three degrees of Light from Intelligences. Thinking without creating thoughts or destiny. Bodies for the doer, the thinker, and the knower of the Triune Self, within the perfect physical body. Section 8 Free will. The problem of free will.", "start_char_pos": 249, "end_char_pos": 249}, {"type": "A", "before": null, "after": "CHAPTER IX RE-EXISTENCE.", "start_char_pos": 250, "end_char_pos": 250}, {"type": "A", "before": null, "after": "Section 1 Recapitulation: Make-up of a human being. The Triune Self. The Light of the Intelligence. A human body as the link between nature and the doer. Death of the body. The doer after death. Re-existence of the doer. Section 2 Four kinds of units. Progression of units. Section 3 Raising of the aia to be a Triune Self in the Realm of Permanence. Duty of its doer, in the perfect body. Feeling-and-desire produced a change in the body. The twain, or dual body. Trial and test of bringing feeling-and-desire into balanced union. Section 4", "start_char_pos": 251, "end_char_pos": 251}, {"type": "R", "before": "Point or Circle The Circle or Zodiac Thinking: the", "after": "\u201cfall of man,\u201d i.e. the doer. Changes in the body. Death. Re-existence in a male or a female body. The doers now on earth. Circulations of units through the bodies of humans. Section 5 Fourth Civilization. Changes on the earth crust. Forces. Minerals, plants and flowers. The varied types were produced by human thoughts. Section 6 Fourth Civilization. Lesser civilizations. Section 7 Fourth Civilization. Governments. Ancient teachings of the Light of the Intelligence. Religions. Section 8 The doers now on earth came from a prior earth age. Failure of the doer to improve. The story of feeling-and-desire. The spell of the sexes. The purpose of re-existences. Section 9 Importance of the flesh body. Reclamation of Light. Death of the body. Wanderings of the units. Return of units to a body. Section 10 The doer-in-the-body. Error in the conception of \u201cI.\u201d The personality and re-existence. The doer portion after death. The portions not in the body. How a doer portion is drawn out for re-existence. Section 11 The thoughts summarized at moment of death. Events determined then, for the next life. The flare-up in classic Greece. Something about the Jews. The stamp of a God at birth. Family. The sex. Cause of changing the sex. Section 12 Also predetermined is the kind of body. Physical heredity and how it is limited. Chief mundane occupations. Diseases. The chief events in life. How destiny can be overcome. Section 13 The time between existences. About the heavenly bodies. Time. Why people fit into the age in which they live. Section 14 Everything after death is destiny. Inventors. Classic Hellas. Re-existence in nation groups. Centers of succeeding civilizations. Greece, Egypt, India. Section 15 Training of the doer portion though memory is not present. The body-mind. Doer-memory. Sense-memory. A good memory. Memory after death. Section 16 Why it is fortunate that the human does not remember previous existences. The training of the doer. A human thinks of himself as a body with a name. To be conscious of and as. The false \u201cI\u201d and its illusions. Section 17 When re-existences of a doer portion stop. A \u201clost\u201d doer portion. The hells inside the earth crust. The lecherous. The drunkards. Drug fiends. The state of a \u201clost\u201d doer. Regenerating the physical body. The test in which the doers failed. Section 18 Summary of preceding chapters. Consciousness is the One Reality. Man as the center of the world of time. Circulations of the units. Permanent institutions. Records of thoughts are made in points. The destiny of human beings is written in the starry spaces. Balancing a thought. Cycles of thinking. Glamour in which things are seen. Sensations are elementals. Why nature seeks the doer. Illusions. The essential things in life.", "start_char_pos": 256, "end_char_pos": 306}, {"type": "A", "before": null, "after": "CHAPTER X GODS AND THEIR RELIGIONS.", "start_char_pos": 307, "end_char_pos": 307}, {"type": "A", "before": null, "after": "Section 1 Religions; on what they are founded. Why belief in a personal God. Problems a religion must meet. Any religion is better than none. Section 2 Classes of Gods. The Gods of religions; how they come into existence. How long they last. Appearance of a God. Changes of a God. Gods have only what human beings have who create and keep them. The name of a God. Christian Gods. Section 3 The human qualities of a God. The knowledge of a God. His objects and interests. Relations of a God. The moral code. Flattery. How Gods lose their power. What a God can do for his worshippers; what he cannot do. After death. Unbelievers. Prayer. Section 4 Benefits of a belief in a God. Seeking God. Prayer. Outside teachings and the inner life. Inner teachings. Twelve types of teachings. Jehovah worship. The Hebrew letters. Christianity. St. Paul. The story of Jesus. Symbolic events. The Kingdom of Heaven, and the Kingdom of God. The Christian Trinity. Section 5 Interpretation of Bible sayings. The story of Adam and Eve. The trial and test of the sexes. \u201cFall of man.\u201d Immortality. St. Paul. Regeneration of the body. Who and what was Jesus? Mission of Jesus. Jesus, a pattern for man. The order of Melchisedec. Baptism. The sexual act, the original sin. The Trinity. Entering the Great Way.", "start_char_pos": 308, "end_char_pos": 308}, {"type": "A", "before": null, "after": "CHAPTER XI THE GREAT WAY.", "start_char_pos": 309, "end_char_pos": 309}, {"type": "A", "before": null, "after": "Section 1 The \u201cDescent\u201d of man. There is no evolution without, first, involution. The mystery of germ cell development. The future of the human. The Great Way. Brotherhoods. Ancient Mysteries. Initiations. Alchemists. Rosicrucians. Section 2 The Triune Self complete. The Threefold Way, and the three paths of each Way. The lunar, solar, and light germs. Divine, \u201cimmaculate\u201d conception. The form, life, and light paths of The Way in the body. Section 3 The Way of thinking. Honesty and truthfulness as the foundation of progress. Physical, psychic, mental requirements. Changes in the body in the process of regeneration. Section 4 Entering The Way. A new life opens. Advances on the form, life, and light paths. The lunar, solar, and light germs. Bridge between the two nervous systems. Further changes in the body. The perfect, immortal, physical body. The three inner bodies for the doer, the thinker, the knower of the Triune Self, within the perfect physical body. Section 5 The Way in the earth. The ongoer leaves the world. The form path; what he sees there. Shades of the dead. \u201cLost\u201d portions of doers. The choice. Section 6 The ongoer on the life path; on the light path, in the earth. He knows who he is. Another choice. Section 7 Preparing oneself to enter upon The Way. Honesty and truthfulness. The regenerative breath. The four stages in thinking.", "start_char_pos": 310, "end_char_pos": 310}, {"type": "A", "before": null, "after": "CHAPTER XII THE POINT OR CIRCLE.", "start_char_pos": 311, "end_char_pos": 311}, {"type": "A", "before": null, "after": "Section 1 Creation of a thought. Method of thinking by building within a point. Human thinking. Thinking done by Intelligences. Thinking which does not create thoughts, or destiny. Section 2 Method of thinking in fashioning nature. The forms of nature come from human thoughts. Pre-chemistry. Section 3 The constitution of matter. Units. Section 4 Erroneous conceptions. Dimensions. The heavenly bodies. Time. Space.", "start_char_pos": 312, "end_char_pos": 312}, {"type": "A", "before": null, "after": "CHAPTER XIII THE CIRCLE OR ZODIAC.", "start_char_pos": 313, "end_char_pos": 313}, {"type": "A", "before": null, "after": "Section 1 Geometrical symbols. The Circle with the Twelve Nameless Points. The value of the zodiacal symbol. Section 2 What the zodiac and its twelve points symbolize. Section 3 The zodiac related to the human body; to the Triune Self; to the Intelligence. Section 4 The zodiac reveals the purpose of the Universe. Section 5 The zodiac as a historical and prophetic record; as a clock to measure progress in nature and on the intelligent-side, and in the building out of a thought. Section 6 Groups of zodiacal signs. Application to the human body.", "start_char_pos": 314, "end_char_pos": 314}, {"type": "A", "before": null, "after": "CHAPTER XIV THINKING: THE WAY TO CONSCIOUS IMMORTALITY.", "start_char_pos": 315, "end_char_pos": 315}, {"type": "A", "before": null, "after": "Section 1 The system of thinking without creating destiny. With what it is concerned. With what it is not concerned. For whom it is presented. The origin of this system. No teacher is needed. Limitations. Preliminaries to be understood. Section 2 Recapitulation: The make-up of the human being. Units. The senses. The breath. The breath-form. The aia. Human bodies and the outside universe. Section 3 Recapitulation continued. The doer portion in the body. The Triune Self and its three parts. The twelve portions of the doer. How long a human is dissatisfied. Section 4 Recapitulation continued. The doer as feeling and as desire. The twelve portions of the doer. The psychic atmosphere. Section 5 Recapitulation continued. The thinker of the Triune Self. The three minds of the doer. The minds of the thinker and the knower. How desire speaks in place of rightness; the reversed round. The mental atmosphere. Section 6 Recapitulation continued. The knower of the Triune Self, selfness and I-ness. The noetic atmosphere. What a human is conscious as. Isolation of feeling; of desire. Being conscious of Consciousness. Section 7 The System of Thinking. What it is. Stages on: The", "start_char_pos": 316, "end_char_pos": 316}, {"type": "A", "before": null, "after": ".", "start_char_pos": 346, "end_char_pos": 346}, {"type": "A", "before": null, "after": "SYMBOLS, ILLUSTRATIONS AND CHARTS.", "start_char_pos": 347, "end_char_pos": 347}, {"type": "A", "before": null, "after": "DEFINITIONS AND EXPLANATIONS.", "start_char_pos": 348, "end_char_pos": 348}, {"type": "A", "before": null, "after": "INDEX OF FIGURES.", "start_char_pos": 349, "end_char_pos": 349}, {"type": "A", "before": null, "after": "INDEX.", "start_char_pos": 350, "end_char_pos": 350}, {"type": "A", "before": null, "after": "AFTERWORD.", "start_char_pos": 351, "end_char_pos": 351}, {"type": "A", "before": null, "after": "THE WORD FOUNDATION.", "start_char_pos": 352, "end_char_pos": 352}, {"type": "A", "before": null, "after": "List of SYMBOLS, ILLUSTRATIONS and CHARTS", "start_char_pos": 353, "end_char_pos": 353}, {"type": "A", "before": null, "after": "I-A . . . . . . Circle of the Twelve Nameless Points, and the Four Spheres I-B . . . . . . The Earth Sphere and the Four Worlds I-C . . . . . . The Invisible Physical World or Realm of Permanence;and the Temporal Human World I-D . . . . . . The Physical Plane, and its Four States of Matter I-E . . . . . . The Solid State of Matter and its Four Substates II-A . . . . . . The Units II-B . . . . . . An Unbalanced Unit on the Nature-Side II-C . . . . . . A Balanced Unit of the Perfect Body II-D; E . . . . The Units on the Nature-Side II-F . . . . . . Pre-Chemistry II-G; H . . . . The Eternal Order of Progression III. . . . . . . The Fourfold Physical Human Body IV-A. . . . . . The Lines of a Thought IV-B . . . . . Sense-Government and Self-Government V-A . . . . . . The Triune Self, its Three Parts and Seven Minds V-B . . . . . . The Triune Self of the Human; its Three Atmospheres, and the Physical Atmosphere V-B, a . . . . The Triune Self Complete, and its Perfect Physical Body V-C . . . . . . The Three Orders of Intelligences, and the Seven Faculties of an Intelligence V-D . . . . . . A Re-existing Doer Portion and its After-Death States. The Breath-form during these States VI-A, a . . . . The Cerebro-Spinal Nervous System. The Human Brain VI-A, b; c; d . The Spinal Cord and Nerves, and Spinal Column VI-B . . . . . Ramifications of the Sympathetic Nervous System VI-C . . . . . The Principal Tracts of the Two Systems, and the Paths of the Lunar and the Solar Germs VI-D . . . . . Diagrammatic Sketch of the Perfect, Sexless, Immortal, Physical Body VI-E . . . . . Skeleton of Human Body, showing Sternum VII-A . . . . . The Zodiac VII-B . . . . . The Zodiac, within the Circle of the Twelve Nameless Points VII-C . . . . . The Broken and Extended Zodiac VII-D . . . . . Horizontals, Perpendiculars and Opposites VII-E to L . . The Monad, the Dyads, Triads, Tetrads, Pentads and Hexads", "start_char_pos": 354, "end_char_pos": 354}], "sents_char_pos": [0]}
+{"doc_id": "43940010", "revision_depth": "2", "before_revision": "Background , education, and family life Born in 1966 in Cairo Qasr el Nil district, Gameela Ismail studied in Al Gezira Language School in Zamalek, where she currently lives. She graduated in 1986 from the Cairo University Faculty of Mass Communication. After being selected university rover scout crew leader, she distinguished herself in her activities in the students' union throughout the years of study. She obtained a Diploma in Simultaneous Interpretation from the American University in Cairo, and then chose to work in media and journalism as a correspondent for various foreign magazines and papers in Cairo. She moved into Egyptian television, reflecting the realities, pain, and dreams of ordinary people through her work as a presenter in a number of programs reporting from the street. Ismail was formerly married to politicianAyman Nour. They have two sons.%DIFDELCMD < %DIFDELCMD < %%% Throughout her career, Ismail has worked as an advocate for human and women's rights, as a television presenter for Egyptian state television, as a stringer for Newsweek, and as a media spokesperson. Career and political Involvement before 2011 In 1994, she began working in local public service through an NGO in downtown Cairo.The residents in Darb el Ahmar, el Mosky, el Gamaliya, Bab el Sha \u2019 riya, el Zaher, and Manshiet Nasr repeatedly honored her for her efforts over ten years in providing housing, healthcare, and education services, and in working with local popular committee members to address the neighborhood residents\u2019 problems. In 2001, she ran for office in the Shura elections running against the majority leader in the ruling party at that time. In 2003, she participated in founding the Al-Ghad (Tomorrow) Party. She served as vice-president of Al-Ghad Party In 2004, she became a member of its high council. In 2005, she led a media campaign for the party's candidate in the presidential elections. In the end of 2005, after her then-husband was sentenced to 5 years in jail, the conflict began to rise over party's leadership between her and Moussa Mostafa Moussa. They both concurrently used party's name and symbols. Conflict was resolved by court in May 2011 in favour of Moussa . From 2004 to 2010, she participated in national struggle to free prisoners of conscience, prisoners of opinion, and political detainees, and participated in campaigns calling for the ousting of Mubarak and for rejecting inherited succession and extension of powers, confronting corruption, defending freedom of opinion and expression. She became an active member in many social protest movements calling for change, along with national currents and powers (Kefaya, Egyptian Women with Change, Madaneya, National Association for Change). In 2010, she ran in parliamentary elections against one of the most important figures in the dissolved National Democratic Party. She challenged him again in 2007. Involvement in the January 25 Revolution In January 2011, she was among those who called for the January 25 Revolution, led marches to Tahrir Square and protested in sit-ins until the fall of Hosni Mubarak's rule.%DIFDELCMD < %DIFDELCMD < %%% In August 2014, Mubarak-era Interior Minister Habib al-Adly accused Ismail and others of \" setting police stations ablaze with Molotov cocktails\" during the 18-day uprising. After January 25 After the revolution, Ismail founded the Egyptian Women for Change.%DIFDELCMD < %DIFDELCMD < %%% In June 2011, she emerged as one of the most important political analysis program presenters on television, through her weekly program \" E 'aadet Nazar\" (Reconsideration) . In November 2011, she ran again in the first post-revolution parliamentary elections, running for an individual seat in the downtown Qasr el Nil district, independent of any party or political current, and won almost 30,000 votes, coming in just 100 votes less than the Freedom and Justice Party and Egyptian Bloc candidates. She claims she received nearly 30,000 votes, coming in less than 100 votes behind the candidates for the Freedom and Justice Party, and those of Egyptian Bloc. In the spring of 2012, she participated in the founding of the Constitution Party(AlDostour Party), founded and led by Dr. Mohamed ElBaradai. She has been a member of the committee of one hundred, leading member in the steering committee, and head of the party \u2019 s organizing secretariat in April 2013. In March 2013, she directed a message to John Kerry during a meeting with him in Cairo, and which was picked up by the media, requesting him to stop supporting former president Mohamed Morsi, saying, \u201cYou want democracy for us in a shape and size defined by the American administration, but we Egyptian people are building democracy on the imagination and dreams of the January 25Revolution, and we will show you that we are capable of revolutionagain. \u201d In May 2013, she participated in the call for June 30, and led party marches to the Presidential Palace.%DIFDELCMD < %DIFDELCMD < %%% In December 2013, she called for participation in a non-partisan campaign called \u201cHakkem A'aqlak\u201d (Use your judgment) for citizen awareness-raising on the articles in the constitution, a campaign which was carried out in various Egyptian governorates. In January 2014, she was nominated for the position of Dostour Party president, to succeed Dr. Mohamed ElBaradei, heading the list \"Elbaquaa' le mann yabny\" (Those who build persevere) After a mission building the party, she held an active leadership role from April to December 2013.%DIFDELCMD < %DIFDELCMD < %%% From 2011\u20132014, she has played a prominent role in the struggle to complete the revolution in Egypt, defending its aims and goals through her political action, support and contribution in a number of revolutionary protest movements, a role which continues to date. Ismail's Twitter account, which has 1.6 million followers, comes top among all female politicians in the Arab world and also makes her one of the 10 most-followed politicians in Egypt, along with Dr. Baradie and eight others. Her account is considered to make her one of the most active / influential politicians on social media. In August 2015 she launched an initiative to raise the income of medical doctors in Egypt and called for equal financial rights for the medical and health sector with that of the police, judiciary and army sectors . Awards and recognition In 2011, Gameela Ismail figured among the 150 most influential people across the world according to a Newsweek/Daily Post poll, and one of the top four women in the \u201c Sisters of the Arab Spring \u201d on BBC television. In March 2015, she was nominated by CNN Arabic website and received the highest number of votes for most influential Arab female politician . Other candidates included Queen Rania of Jordan and Sheikha Moza of Qatar.", "after_revision": "Background Gameela Ismail (6 April 1966 %DIFDELCMD < %DIFDELCMD < %%% ) is an Egyptian politician, television host, content creator, and co-founder of the online new media platform Medina (www.medinaportal.com) launched in 2016. Medina provides alternative, innovative, artistic, and interactive content in Arabic against hegemonic narratives. Gameela writes, films, narrates, and directs a series of short films on Medina called Hekayat Gameela Gameela \u2019 s Stories using just her smartphone camera. This has allowed Gameela to pioneer the concept of \u201cpersonal TV\u201d in the Arab world. In 2017, Gameela\u2019s Stories were given the award for best documentary work empowering women and society by MBC HOPE in Dubai. In 2018, it was a finalist at the WAN-Ifra short films competition in South Africa . Career Gameela has worked in media since her graduation from Cairo University\u2019s Faculty of Communication in 1986. She started her media career with Newsweek\u2019s Cairo bureau as a stringer/translator, then as a correspondent for 20 years. She freelanced with Thomson Reuters, Al-Hayat London daily, the Sunday Times, Cairo Today Magazine, and other publications. In %DIFDELCMD < %DIFDELCMD < %%% 1990, Gameela started her television career with the Egyptian state broadcaster and presented several award-winning television programs, which were characterised by their unique portrayal of the voices of the young and ordinary people on Egypt\u2019s streets. Gameela hosted the political TV program \" %DIFDELCMD < %DIFDELCMD < %%% E \u2018adet Nazar\" Reconsideration on the Egyptian channel Al Nahar after the 2011 Egyptian revolution . Political Involvement Gameela ran for parliament in downtown Cairo in 2001, 2010, and 2011. She led numerous political battles and took part in founding movements calling for political change and defying the inheritance of power under Mubarak, then fighting against religious and military rule after 2011. Gameela was among the first to call for the 2011 Egyptian revolution. She participated in founding Al-Ghad (Tomorrow) Party in 2004 and served as the spokesperson for its presidential elections in 2005 in Egypt's first presidential elections. In 2012, she participated in founding AlDostour Party (Constitution Party) and served as the party \u2019 s organisational secretary in 2013. %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% Gameela has been an advocate for justice, diversity, inclusion, social / political reform, freedom of expression, advancing opportunities for women and millennials, protecting the environment, and animal rights . Awards and recognition Gameela has won numerous awards and recognitions. She was named one of the world\u2019s 150 most influential women by Newsweek in 2011 and a \u201c Sister of the Revolution \u201d by the BBC in 2012. She was voted the most important and influential Arab politician in a CNN poll in 2015 and was rated 180th out of the 250 most influential women in the world on social media in 2016. Gameela came 39th in a list of the 200 most powerful Arab women by Arabian Business magazine in 2018.", "edit_actions": [{"type": "R", "before": ", education, and family life Born in", "after": "Gameela Ismail (6 April", "start_char_pos": 11, "end_char_pos": 47}, {"type": "D", "before": "in Cairo Qasr el Nil district, Gameela Ismail studied in Al Gezira Language School in Zamalek, where she currently lives. She graduated in 1986 from the Cairo University Faculty of Mass Communication. After being selected university rover scout crew leader, she distinguished herself in her activities in the students' union throughout the years of study.", "after": null, "start_char_pos": 53, "end_char_pos": 408}, {"type": "D", "before": "She obtained a Diploma in Simultaneous Interpretation from the American University in Cairo, and then chose to work in media and journalism as a correspondent for various foreign magazines and papers in Cairo. She moved into Egyptian television, reflecting the realities, pain, and dreams of ordinary people through her work as a presenter in a number of programs reporting from the street. Ismail was formerly married to politicianAyman Nour. They have two sons.", "after": null, "start_char_pos": 409, "end_char_pos": 872}, {"type": "D", "before": "Throughout her career, Ismail has worked as an advocate for human and women's rights, as a television presenter for Egyptian state television, as a stringer for Newsweek, and as a media spokesperson.", "after": null, "start_char_pos": 902, "end_char_pos": 1101}, {"type": "R", "before": "Career and political Involvement before 2011 In 1994, she began working in local public service through an NGO in downtown Cairo.The residents in Darb el Ahmar, el Mosky, el Gamaliya, Bab el Sha", "after": ") is an Egyptian politician, television host, content creator, and co-founder of the online new media platform Medina (www.medinaportal.com) launched in 2016. Medina provides alternative, innovative, artistic, and interactive content in Arabic against hegemonic narratives. Gameela writes, films, narrates, and directs a series of short films on Medina called Hekayat Gameela", "start_char_pos": 1102, "end_char_pos": 1296}, {"type": "A", "before": null, "after": "Gameela", "start_char_pos": 1297, "end_char_pos": 1297}, {"type": "R", "before": "riya, el Zaher, and Manshiet Nasr repeatedly honored her for her efforts over ten years in providing housing, healthcare, and education services, and in working with local popular committee members to address the neighborhood residents\u2019 problems.", "after": "s Stories", "start_char_pos": 1300, "end_char_pos": 1546}, {"type": "A", "before": null, "after": "using just her smartphone camera. This has allowed Gameela to pioneer the concept of \u201cpersonal TV\u201d in the Arab world.", "start_char_pos": 1547, "end_char_pos": 1547}, {"type": "D", "before": "2001, she ran for office in the Shura elections running against the majority leader in the ruling party at that time.", "after": null, "start_char_pos": 1551, "end_char_pos": 1668}, {"type": "R", "before": "In 2003, she participated in founding the Al-Ghad (Tomorrow) Party. She served as vice-president of Al-Ghad Party In 2004, she became a member of its high council. In 2005, she led a media campaign for the party's candidate in the presidential elections. In the end of 2005, after her then-husband was sentenced to 5 years in jail, the conflict began to rise over party's leadership between her and Moussa Mostafa Moussa. They both concurrently used party's name and symbols. Conflict was resolved by court in May 2011 in favour of Moussa", "after": "2017, Gameela\u2019s Stories were given the award for best documentary work empowering women and society by MBC HOPE in Dubai. In 2018, it was a finalist at the WAN-Ifra short films competition in South Africa", "start_char_pos": 1669, "end_char_pos": 2207}, {"type": "R", "before": "From 2004 to 2010, she participated in national struggle to free prisoners of conscience, prisoners of opinion, and political detainees, and participated in campaigns calling for the ousting of Mubarak and for rejecting inherited succession and extension of powers, confronting corruption, defending freedom of opinion and expression. She became an active member in many social protest movements calling for change, along with national currents and powers (Kefaya, Egyptian Women with Change, Madaneya, National Association for Change).", "after": "Career Gameela has worked in media since her graduation from Cairo University\u2019s Faculty of Communication in 1986. She started her media career with Newsweek\u2019s Cairo bureau as a stringer/translator, then as a correspondent for 20 years. She freelanced with Thomson Reuters, Al-Hayat London daily, the Sunday Times, Cairo Today Magazine, and other publications.", "start_char_pos": 2210, "end_char_pos": 2746}, {"type": "D", "before": "2010, she ran in parliamentary elections against one of the most important figures in the dissolved National Democratic Party. She challenged him again in 2007.", "after": null, "start_char_pos": 2750, "end_char_pos": 2910}, {"type": "D", "before": "Involvement in the January 25 Revolution In January 2011, she was among those who called for the January 25 Revolution, led marches to Tahrir Square and protested in sit-ins until the fall of Hosni Mubarak's rule.", "after": null, "start_char_pos": 2911, "end_char_pos": 3124}, {"type": "R", "before": "In August 2014, Mubarak-era Interior Minister Habib al-Adly accused Ismail and others of", "after": "1990, Gameela started her television career with the Egyptian state broadcaster and presented several award-winning television programs, which were characterised by their unique portrayal of the voices of the young and ordinary people on Egypt\u2019s streets. Gameela hosted the political TV program", "start_char_pos": 3154, "end_char_pos": 3242}, {"type": "D", "before": "setting police stations ablaze with Molotov cocktails\" during the 18-day uprising.", "after": null, "start_char_pos": 3245, "end_char_pos": 3327}, {"type": "D", "before": "After January 25 After the revolution, Ismail founded the Egyptian Women for Change.", "after": null, "start_char_pos": 3328, "end_char_pos": 3412}, {"type": "D", "before": "In June 2011, she emerged as one of the most important political analysis program presenters on television, through her weekly program \"", "after": null, "start_char_pos": 3442, "end_char_pos": 3578}, {"type": "R", "before": "'aadet", "after": "\u2018adet", "start_char_pos": 3581, "end_char_pos": 3587}, {"type": "R", "before": "(Reconsideration)", "after": "Reconsideration", "start_char_pos": 3595, "end_char_pos": 3612}, {"type": "A", "before": null, "after": "on the Egyptian channel Al Nahar after the 2011 Egyptian revolution", "start_char_pos": 3613, "end_char_pos": 3613}, {"type": "D", "before": "In November 2011, she ran again in the first post-revolution parliamentary elections, running for an individual seat in the downtown Qasr el Nil district, independent of any party or political current, and won almost 30,000 votes, coming in just 100 votes less than the Freedom and Justice Party and Egyptian Bloc candidates. She claims she received nearly 30,000 votes, coming in less than 100 votes behind the candidates for the Freedom and Justice Party, and those of Egyptian Bloc.", "after": null, "start_char_pos": 3616, "end_char_pos": 4101}, {"type": "R", "before": "In the spring of 2012, she participated in the founding of the Constitution Party(AlDostour Party), founded and led by Dr. Mohamed ElBaradai. She has been a member of the committee of one hundred, leading member in the steering committee, and head of the party", "after": "Political Involvement Gameela ran for parliament in downtown Cairo in 2001, 2010, and 2011. She led numerous political battles and took part in founding movements calling for political change and defying the inheritance of power under Mubarak, then fighting against religious and military rule after 2011. Gameela was among the first to call for the 2011 Egyptian revolution. She participated in founding Al-Ghad (Tomorrow) Party in 2004 and served as the spokesperson for its presidential elections in 2005 in Egypt's first presidential elections. In 2012, she participated in founding AlDostour Party (Constitution Party) and served as the party", "start_char_pos": 4102, "end_char_pos": 4362}, {"type": "R", "before": "s organizing secretariat in April", "after": "s organisational secretary in", "start_char_pos": 4365, "end_char_pos": 4398}, {"type": "D", "before": "In March 2013, she directed a message to John Kerry during a meeting with him in Cairo, and which was picked up by the media, requesting him to stop supporting former president Mohamed Morsi, saying, \u201cYou want democracy for us in a shape and size defined by the American administration, but we Egyptian people are building democracy on the imagination and dreams of the January 25Revolution, and we will show you that we are capable of revolutionagain. \u201d", "after": null, "start_char_pos": 4405, "end_char_pos": 4859}, {"type": "D", "before": "In May 2013, she participated in the call for June 30, and led party marches to the Presidential Palace.", "after": null, "start_char_pos": 4860, "end_char_pos": 4964}, {"type": "D", "before": "In December 2013, she called for participation in a non-partisan campaign called \u201cHakkem A'aqlak\u201d (Use your judgment) for citizen awareness-raising on the articles in the constitution, a campaign which was carried out in various Egyptian governorates.", "after": null, "start_char_pos": 4994, "end_char_pos": 5245}, {"type": "D", "before": "In January 2014, she was nominated for the position of Dostour Party president, to succeed Dr. Mohamed ElBaradei, heading the list \"Elbaquaa' le mann yabny\" (Those who build persevere) After a mission building the party, she held an active leadership role from April to December 2013.", "after": null, "start_char_pos": 5246, "end_char_pos": 5530}, {"type": "D", "before": "From 2011\u20132014, she has played a prominent role in the struggle to complete the revolution in Egypt, defending its aims and goals through her political action, support and contribution in a number of revolutionary protest movements, a role which continues to date.", "after": null, "start_char_pos": 5560, "end_char_pos": 5824}, {"type": "R", "before": "Ismail's Twitter account, which has 1.6 million followers, comes top among all female politicians in the Arab world and also makes her one of the 10 most-followed politicians in Egypt, along with Dr. Baradie and eight others. Her account is considered to make her one of the most active", "after": "Gameela has been an advocate for justice, diversity, inclusion, social", "start_char_pos": 5825, "end_char_pos": 6111}, {"type": "D", "before": "influential politicians on social media.", "after": null, "start_char_pos": 6114, "end_char_pos": 6154}, {"type": "R", "before": "In August 2015 she launched an initiative to raise the income of medical doctors in Egypt and called for equal financial rights for the medical and health sector with that of the police, judiciary and army sectors", "after": "political reform, freedom of expression, advancing opportunities for women and millennials, protecting the environment, and animal rights", "start_char_pos": 6155, "end_char_pos": 6368}, {"type": "R", "before": "In 2011, Gameela Ismail figured among the 150 most influential people across the world according to a Newsweek/Daily Post poll, and", "after": "Gameela has won numerous awards and recognitions. She was named", "start_char_pos": 6394, "end_char_pos": 6525}, {"type": "R", "before": "top four women in the", "after": "world\u2019s 150 most influential women by Newsweek in 2011 and a", "start_char_pos": 6537, "end_char_pos": 6558}, {"type": "R", "before": "Sisters of the Arab Spring", "after": "Sister of the Revolution", "start_char_pos": 6561, "end_char_pos": 6587}, {"type": "D", "before": "on BBC television.", "after": null, "start_char_pos": 6590, "end_char_pos": 6608}, {"type": "R", "before": "In March 2015, she was nominated by CNN Arabic website and received the highest number of votes for most influential Arab female politician . Other candidates included Queen Rania of Jordan and Sheikha Moza of Qatar.", "after": "by the BBC in 2012. She was voted the most important and influential Arab politician in a CNN poll in 2015 and was rated 180th out of the 250 most influential women in the world on social media in 2016. Gameela came 39th in a list of the 200 most powerful Arab women by Arabian Business magazine in 2018.", "start_char_pos": 6609, "end_char_pos": 6825}], "sents_char_pos": [0, 174, 253, 408, 618, 799, 852, 872, 1101, 1231, 1546, 1668, 1736, 1832, 1923, 2090, 2144, 2209, 2544, 2746, 2876, 2910, 3124, 3327, 3412, 3615, 3941, 4101, 4243, 4404, 4857, 4964, 5245, 5530, 5824, 6050, 6154, 6370, 6608, 6750]}
+{"doc_id": "44160271", "revision_depth": "1", "before_revision": "When maintaining a relationship, any behavior that is positive and promotes deepening trust and closeness between people is a prosocial maintenance behavior. The more prosocial behavior is evident in a relationship, the more likely for strong bonds to be formed, and the relationship to prosper and continue. Low levels of Prosocial maintenance behavior gives less reinforcement in the relationship, and thus more a weak foundation often leads to the relationships deterioration, or at least non-progression.Guerrero, L. K., Andersen, P. A., & Afifi, W. A. (2007). Close encounters: communication in relationships (2nd ed.). Los Angeles: Sage Publications. Canary and Stafford created measures of five communication strategies: 1. Positivity, 2. Openness, 3. Assurances, 4. Social Networks, and 5. Sharing Tasks. Each of these qualities equates to spending time together, and interacting either physically or emotionally. Positivity refers to having a jolly attitude, even when not necessarily feeling like doing so. This often means not participating in condemnation and negativity. Canary and Stafford mentions openness in a way that encourages discussion in a relationship that is filled with direction and goals. Social networks include having friends and family in your inner circle to help balance out the relationship. Subsequent research has found that maintenance strategies strongly predict important relational characteristics, such as commitment, relational satisfaction, stability, liking, and loving others. Prosocial maintenance behavior does not value one source of positivity more than the other, although the individual might. Verbalizing fondness for a partner through positive speech might be what they crave in a relationship, while another partner might find more affection in a willingness to help with household chores together . This type of task sharing is also a part of what is known as routine maintenance, and a relatively equal effort by each party is a prosocial function that greatly adds to relationship satisfaction. As a contrast to prosocial behavior that is used to strengthen bonds and reinforce a relationship, anti-social maintenance behavior is another strategic behavior pattern that can be used to maintain a current relationship. Its use of continuing a relationship at its current level, would be to decline invitations to opportunities to create new levels of a relationship. By declining these opportunities , this exemplifies an Antisocial behavior, which is generally deliberate in its implementation. Friend Relationships A recent study on Italians living as couples has shown that friendship relationships, beyond those within an individual's family, are an important source of support. Here, we used data from Aspects of Daily Life, the Italian National Statistical Institute's 2012 multipurpose survey, to analyze the relation between friendship ties and life satisfaction. Our results show that friendship, in terms of intensity (measured by the frequency with which individuals see their friends) and quality (measured by the satisfaction with friendship relationships), is positively associated to life satisfaction. In the first study of its kind, a University of Kansas professor has defined the amount of time necessary to make a friend as well as how long it typically takes to move through the deepening stages of friendship. In a new report published in the Journal of Social and Personal Relationships, Associate Professor of Communication Studies Jeffrey Hall found that it takes roughly 50 hours of time together to move from mere acquaintance to casual friend, 90 hours to go from that stage to simple \"friend\" status and more than 200 hours before you can consider someone your close friend. Just as time and energy is put into creating a friendship, so is nurturing and maintaining that friendship. Maintaining a friendship can take several forms, such as access to useful information, company (e.g., personal and intimate relationships, time spent talking together, and shared amusement time or meals), and emotional (e.g., advice about a serious personal or family matter) and instrumental (e.g., economic aid, administrative procedures, house-keeping) support. Romantic and close personal relationships use more openness and assurance maintenance behaviors and these are easier to communicate in person. But even these close connections are relying on more computer mediated communication today. Texting can have many uses, from coordinating task sharing to simply letting someone know you are thinking about them . People may use Facebook to plan activities with others, announce new relationships, and provide support and encouragement to those in need. Even the birthday card has migrated online. Although technology cannot replace face-to-face communication in these cases, it can supplement and reinforce the importance of the relationship. A strategic maintenance behavior is an action that is strategically carried out to help maintain a relationship. When you phone somebody to congratulate them on a birthday or anniversary , it is a deliberate action that clearly shows you taking the time to show your affection for someone you have a relationshipwith . These are clear strategic behaviors designed to give positive reinforcement. A routine maintenance behavior is less strategic and has more to do with the everyday tasks in life. For example, if a wife is cleaning up from dinner, and her husband decides to take out the trash . This would be considered a Routine Maintenance Behavior . They are used without the express purposes of maintaining a relationship, yet they still help people preserve their bonds with one another. Romantic relationships have an extra element that is not found in friendship relationships. In romantic relationships, there is the intimacy element that is added. This is physical intimacy and a deeper emotional intimacy than a friendship would have. There are four relationship stages when it comes to romantic relationships:Stafford, L., & Canary, D. (1991). Maintenance strategies and romantic relationship type, gender and relational characteristics. Journal of Social and Personal Relationships, 217-242. Casually dating Seriously dating Engaged Married . Escalation stages Initiating \u2013 This stage is the shortest and is composed of noticing and forming first impressions based on verbal and non-verbal communication. This stage usually involves small talk. Also often heavily based on physical appearance such as characteristics, clothing, and general presentation. Experimenting \u2013 Finding a common ground by sharing interests and hobbies or other activities. Commonly asking questions such as \"What do you do for fun\" or \"What do you study in school\" are used to establish common grounds. This stage is usually a determining stage in deciding to move forward with the relationship or not. Intensifying \u2013 Intensifying involves increased physical touch, especially in public. Much more time in private life is spent with the significant other. Individuals begin to look for more commitment. Feelings are beginning to be disclosed as intimate relationship forms. Integrating \u2013 At this stage, the bond becomes closer into possible labels of boyfriend and girlfriend. People begin to see the dyad as a single unit. Relationship becomes very close and intimate. Words like \"I\" or \"me\" become \"ours.\" Bonding \u2013 Last is the bonding stage, which involves the declaration of your status in a formal manner . You legally become bonded as one. Commitments are made and you are there for each other through difficult times. The relationship can only be broken through death or formal agreements. Contrary to the escalation stages are the termination stages. Termination can be sensed even before it happens through non-verbal cues such as a decrease in physical touch, eye contact, etc. Termination stages Differentiation \u2013 The stage is the beginning of the termination process beginning with a decrease in physical contact or the closeness that you had when in the escalation stages. A shift from shared identity changes over to individual identities. Distance grows between partners and pressure begins to build. Circumscribing \u2013 Communication begins to become less frequent and transparent as boundaries are created. The decrease in communication is caused because of unwanted arguments. Rather than sharing problems, talk revolves around mundane topics. Lack of interest in this stage is still hard to pick up from outsider views. Space begins to grow and the relationship declines. Stagnating \u2013 Relationship becomes shallow and boring with routines. Even as you go through the routines, you do not care much for the outcome of the relationship. Your lack of interest begins to show to friends and family through lack of communication both verbal and non-verbal. Much work needs to be done to recover to a healthy point if the relationship is to continue. Avoiding \u2013 You begin to avoid each other completely instead of bearing through the routines. Partners restrict themselves from contact not just in person, but also via electronic communication. Termination \u2013 This is the final point in de-escalation known as terminating. Partners end their relationship formally and an agreement is reached, usually divorce for marriage situations. Conversations following the terminating stage are of practical matters such as how to divide property or legal matters. The terminating stage can be positive or negative. New beginnings can result after this stage. After the termination stages runs its course, relationships often return to the friendship status or complete avoidance. If relationships started in the friendship stage and comes to an end in a positive note, friendship status is more likely to be achieved.", "after_revision": "When maintaining a relationship, any behavior that is positive and promotes deepening trust and closeness between people is a prosocial maintenance behavior. The more prosocial behavior is evident in a relationship, the more likely for strong bonds to be formed, and the relationship to prosper and continue. Low levels of prosocial maintenance behavior give less reinforcement in the relationship, and thus more a weak foundation often leads to the relationships deterioration, or at least non-progression.Guerrero, L. K., Andersen, P. A., & Afifi, W. A. (2007). Close encounters: communication in relationships (2nd ed.). Los Angeles: Sage Publications. Canary and Stafford described five communication strategies: 1. Positivity, 2. Openness, 3. Assurances, 4. Social Networks, and 5. Sharing Tasks. Each of these qualities equates to spending time together, and interacting either physically or emotionally. Positivity refers to having a positive attitude, even when not necessarily feeling like doing so. This often means not participating in condemnation and negativity. Canary and Stafford mentions openness in a way that encourages discussion in a relationship that is filled with direction and goals. Social networks include having friends and family to help balance out the relationship. Subsequent research has found that maintenance strategies strongly predict important relational characteristics, such as commitment, relational satisfaction, stability, liking, and loving others. Prosocial maintenance behavior does not value one source of positivity more than the other, although the individual might. Verbalizing fondness through positive speech might be what one partner craves in a relationship, while another might find more affection in a willingness to help with household chores . This type of task sharing is also a part of what is known as routine maintenance, and a relatively equal effort by each party is a prosocial function that greatly adds to relationship satisfaction. As a contrast to prosocial behavior that is used to strengthen bonds and reinforce a relationship, anti-social maintenance behavior is another strategic behavior pattern that can be used to maintain a current relationship. Its use of continuing a relationship at its current level, would be to decline invitations to opportunities to create new levels of a relationship. Declining these opportunities exemplifies antisocial behavior, which is generally deliberate in its implementation. Friend Relationships A recent study on Italians living as couples has shown that friendship relationships, beyond those within an individual's family, are an important source of support. Data from Aspects of Daily Life, the Italian National Statistical Institute's 2012 multipurpose survey, was used to analyze the relation between friendship ties and life satisfaction. Results show that friendship, in terms of intensity (measured by the frequency with which individuals see their friends) and quality (measured by the satisfaction with friendship relationships), is positively associated to life satisfaction. In the first study of its kind, a University of Kansas professor defined the amount of time necessary to make a friend as well as how long it typically takes to move through the deepening stages of friendship. In a new report published in the Journal of Social and Personal Relationships, Associate Professor of Communication Studies Jeffrey Hall found that it takes roughly 50 hours of time together to move from mere acquaintance to casual friend, 90 hours to go from that stage to simple \"friend\" status and more than 200 hours before someone can be considered a close friend. Just as time and energy is put into creating a friendship, so is nurturing and maintaining that friendship. Maintaining a friendship can take several forms, such as access to useful information, company (e.g., personal and intimate relationships, time spent talking together, and shared amusement time or meals), and emotional (e.g., advice about a serious personal or family matter) and instrumental (e.g., economic aid, administrative procedures, house-keeping) support. Romantic and close personal relationships use more openness and assurance maintenance behaviors and these are easier to communicate in person. But even these close connections are relying on more computer mediated communication today. Texting can have many uses, from coordinating task sharing to simply letting someone know they are being thought of . People may use Facebook to plan activities with others, announce new relationships, and provide support and encouragement to those in need. Even the birthday card has migrated online. Although technology cannot replace face-to-face communication in these cases, it can supplement and reinforce the importance of the relationship. A strategic maintenance behavior is an action that is strategically carried out to help maintain a relationship. Phoning somebody to congratulate them on a birthday or anniversary is a deliberate action that shows affection for the other party in a relationship . These are clear strategic behaviors designed to give positive reinforcement. A routine maintenance behavior is less strategic and has more to do with the everyday tasks in life. For example, if a wife is cleaning up from dinner, and her husband decides to take out the trash , this would be considered a routine maintenance behavior . They are used without the express purposes of maintaining a relationship, yet they still help people preserve their bonds with one another. Romantic relationships have an extra element that is not found in friendship relationships. In romantic relationships, there is the intimacy element that is added. This is physical intimacy and a deeper emotional intimacy than a friendship would have. There are four relationship stages when it comes to romantic relationships:Stafford, L., & Canary, D. (1991). Maintenance strategies and romantic relationship type, gender and relational characteristics. Journal of Social and Personal Relationships, 217-242. Casually dating Seriously dating Engaged Married Escalation stages Initiating \u2013 This stage is the shortest and is composed of noticing and forming first impressions based on verbal and non-verbal communication. This stage usually involves small talk. Also often heavily based on physical appearance such as characteristics, clothing, and general presentation. Experimenting \u2013 Finding a common ground by sharing interests and hobbies or other activities. Commonly asking questions such as \"What do you do for fun\" or \"What do you study in school\" are used to establish common grounds. This stage is usually a determining stage in deciding to move forward with the relationship or not. Intensifying \u2013 Intensifying involves increased physical touch, especially in public. Much more time in private life is spent with the significant other. Individuals begin to look for more commitment. Feelings are beginning to be disclosed as intimate relationship forms. Integrating \u2013 At this stage, the bond becomes closer into possible labels of boyfriend and girlfriend. People begin to see the dyad as a single unit. Relationship becomes very close and intimate. Words like \"I\" or \"me\" become \"ours.\" Bonding \u2013 Last is the bonding stage, which involves the declaration of status in a formal manner , such as legally becoming bonded as one. Commitments are made and the partners support each other through difficult times. The relationship can only be broken through death or formal agreements. Contrary to the escalation stages are the termination stages. Termination can be sensed even before it happens through non-verbal cues such as a decrease in physical touch, eye contact, etc. Termination stages Differentiation \u2013 The stage is the beginning of the termination process beginning with a decrease in physical contact or the closeness of the escalation stages. A shift from shared identity changes over to individual identities. Distance grows between partners and pressure begins to build. Circumscribing \u2013 Communication begins to become less frequent and transparent as boundaries are created. The decrease in communication is caused because of unwanted arguments. Rather than sharing problems, talk revolves around mundane topics. Lack of interest in this stage is still hard to pick up from outsider views. Space begins to grow and the relationship declines. Stagnating \u2013 Relationship becomes shallow and boring with routines. Partners go through the routines, but do not care much for the outcome of the relationship. The lack of interest begins to show to friends and family through lack of communication both verbal and non-verbal. Much work needs to be done to recover to a healthy point if the relationship is to continue. Avoiding \u2013 The partners begin to avoid each other completely , restricting themselves from contact not just in person, but also via electronic communication. Termination \u2013 This is the final point in de-escalation known as terminating. Partners end their relationship formally and an agreement is reached, usually divorce for marriage situations. Conversations following the terminating stage are of practical matters such as how to divide property or legal matters. The terminating stage can be positive or negative. New beginnings can result after this stage. After the termination stages runs its course, relationships often return to the friendship status or complete avoidance. If relationships started in the friendship stage and comes to an end in a positive note, friendship status is more likely to be achieved.", "edit_actions": [{"type": "R", "before": "Prosocial maintenance behavior gives", "after": "prosocial maintenance behavior give", "start_char_pos": 323, "end_char_pos": 359}, {"type": "R", "before": "created measures of", "after": "described", "start_char_pos": 677, "end_char_pos": 696}, {"type": "R", "before": "jolly", "after": "positive", "start_char_pos": 952, "end_char_pos": 957}, {"type": "D", "before": "in your inner circle", "after": null, "start_char_pos": 1267, "end_char_pos": 1287}, {"type": "D", "before": "for a partner", "after": null, "start_char_pos": 1666, "end_char_pos": 1679}, {"type": "R", "before": "they crave", "after": "one partner craves", "start_char_pos": 1718, "end_char_pos": 1728}, {"type": "D", "before": "partner", "after": null, "start_char_pos": 1762, "end_char_pos": 1769}, {"type": "D", "before": "together", "after": null, "start_char_pos": 1843, "end_char_pos": 1851}, {"type": "R", "before": "By declining these opportunities , this exemplifies an Antisocial", "after": "Declining these opportunities exemplifies antisocial", "start_char_pos": 2423, "end_char_pos": 2488}, {"type": "R", "before": "Here, we used data", "after": "Data", "start_char_pos": 2739, "end_char_pos": 2757}, {"type": "A", "before": null, "after": "was used", "start_char_pos": 2857, "end_char_pos": 2857}, {"type": "R", "before": "Our results", "after": "Results", "start_char_pos": 2929, "end_char_pos": 2940}, {"type": "D", "before": "has", "after": null, "start_char_pos": 3240, "end_char_pos": 3243}, {"type": "R", "before": "you can consider someone your", "after": "someone can be considered a", "start_char_pos": 3717, "end_char_pos": 3746}, {"type": "R", "before": "you are thinking about them", "after": "they are being thought of", "start_char_pos": 4559, "end_char_pos": 4586}, {"type": "R", "before": "When you phone", "after": "Phoning", "start_char_pos": 5032, "end_char_pos": 5046}, {"type": "D", "before": ", it", "after": null, "start_char_pos": 5106, "end_char_pos": 5110}, {"type": "R", "before": "clearly shows you taking the time to show your affection for someone you have a relationshipwith", "after": "shows affection for the other party in a relationship", "start_char_pos": 5139, "end_char_pos": 5235}, {"type": "R", "before": ". This", "after": ", this", "start_char_pos": 5513, "end_char_pos": 5519}, {"type": "R", "before": "Routine Maintenance Behavior", "after": "routine maintenance behavior", "start_char_pos": 5542, "end_char_pos": 5570}, {"type": "D", "before": ".", "after": null, "start_char_pos": 6273, "end_char_pos": 6274}, {"type": "D", "before": "your", "after": null, "start_char_pos": 7486, "end_char_pos": 7490}, {"type": "R", "before": ". You legally become", "after": ", such as legally becoming", "start_char_pos": 7517, "end_char_pos": 7537}, {"type": "R", "before": "you are there for", "after": "the partners support", "start_char_pos": 7578, "end_char_pos": 7595}, {"type": "R", "before": "that you had when in", "after": "of", "start_char_pos": 8049, "end_char_pos": 8069}, {"type": "R", "before": "Even as you", "after": "Partners", "start_char_pos": 8663, "end_char_pos": 8674}, {"type": "R", "before": "you", "after": "but", "start_char_pos": 8700, "end_char_pos": 8703}, {"type": "R", "before": "Your", "after": "The", "start_char_pos": 8758, "end_char_pos": 8762}, {"type": "R", "before": "You", "after": "The partners", "start_char_pos": 8979, "end_char_pos": 8982}, {"type": "R", "before": "instead of bearing through the routines. Partners restrict", "after": ", restricting", "start_char_pos": 9020, "end_char_pos": 9078}], "sents_char_pos": [0, 157, 308, 508, 564, 624, 656, 812, 921, 1016, 1083, 1216, 1325, 1521, 1644, 1853, 2051, 2274, 2422, 2551, 2738, 2928, 3174, 3388, 3760, 3868, 4233, 4376, 4468, 4588, 4728, 4772, 4918, 5031, 5237, 5314, 5415, 5514, 5572, 5712, 5804, 5876, 5964, 6074, 6168, 6223, 6436, 6476, 6585, 6679, 6809, 6909, 6994, 7062, 7109, 7180, 7283, 7330, 7376, 7552, 7631, 7703, 7765, 7894, 8092, 8160, 8222, 8327, 8398, 8465, 8542, 8594, 8662, 8757, 8874, 8967, 9060, 9161, 9238, 9349, 9469, 9520, 9564, 9685]}
+{"doc_id": "450257", "revision_depth": "1", "before_revision": "Advantages A sprouting glass jar with mung beans in it Socio-Economic and Cultural Provision of Livelihood UPAcan be seen as a means of improving the livelihood of people living in and around cities. Urban Agriculture expands the economic base of the city through production, processing, packaging, and marketing of consumable products. This results in an increase in entrepreneurial activities and the creation of jobs, as well as reducing food costs and improving quality. UA provides employment, income, and access to food for urban populations . Research into market values for produce grown in urban gardens has been attributed to a community garden plot a median yield value of between approximately $200 and $500 (US, adjusted for inflation). Households and small communities take advantage of vacant land and contribute not only to their household food needs but also the needs of their resident city. This allows families to generate larger incomes selling to local grocers or to local outdoor markets while supplying their household with the proper nutrition of fresh and nutritional products . Some community urban farms can be quite efficient and help women find work, who in some cases are marginalized from finding employment in the formal economy. Studies have shown that participation from women have a higher production rate, therefore producing the adequate amount for household consumption while supplying more for market sale. Strengthening of Community Relationships and Inclusion Urban Agriculture can have an overall positive impact on community health, and facilitate positive social interaction and networks which contributes to the social and individual emotional well-being. For many neighborhoods, gardens provide a \u201csymbolic focus,\u201d which leads to increased neighborhood pride. Urban agriculture increases community participation through diagnostic workshops or different commissions in the area of vegetable gardens. Activities which involve hundreds of people. Due to the food security that comes with UA, feelings of independence and empowerment often arise. The ability to produce and grow food for oneself has also been reported to improve levels of self-esteem or of self-efficacy . Urban agriculture provides unique opportunities to bridge diverse communities together. In addition, it provides opportunities for health care providers to interact with their patients. Thus, making each community garden a hub that is reflective of the community. Beautification and Aesthetic Value%DIFDELCMD < [%%% 1 The social involvement helped raise the aesthetic appeal of the neighborhood, boosting the motivation or efficacy of the community as a whole. This increased efficacy was shown to increase neighborhood attachment. Therefore, the positive health outcomes of urban farming can be explained in part by interpersonal and social factors that boost health.%DIFDELCMD < %DIFDELCMD < %%% Environmental Reduction in Greenhouse Gas Emissions and Carbon Footprint The energy-efficient nature of urban agriculture can reduce each city's carbon footprint by reducing the amount of transport that occurs to deliver goods to the consumer. Such areas can act as carbon sinks offsetting some of the carbon accumulation that is innate to urban areas, where pavement and buildings outnumber plants. Plants absorb atmospheric carbon dioxide (CO2) and release breathable oxygen (O2) through photosynthesis. The process of Carbon Sequestration can be further improved by combining other agriculture techniques to increase removal from the atmosphere and prevent the release of CO2 during harvest time. However, this process relies heavily on the types of plants selected and the methodology of farming. Specifically, choosing plants that do not lose their leaves and remain green all year can increase the farm's ability to sequester carbon.%DIFDELCMD < %DIFDELCMD < %%% The reduction in ozone and other particulate matter can benefit human health. Reducing these particulates and ozone gases could reduce mortality rates in urban areas along with increasing the health of those living in cities. A 2011 article found that a rooftop containing 2000 m\u00b2 of uncut grass has the potential to remove up to 4000 kg of particulate matter and that one square meter of green roof is sufficient to offset the annual particulate matter emissions of a car. Energy Efficiency upEdible Oyster Mushrooms growing on used coffee grounds The current industrial agriculture system is accountable for high energy costs for the transportation of foodstuffs. According to a study by Rich Pirog, associate director of the Leopold Center for Sustainable Agriculture at Iowa State University, the average conventional produce item travels , using, if shipped by tractor-trailer, of fossil fuel per . The energy used to transport food is decreased when urban agriculture can provide cities with locally grown food . Pirog found that traditional, non-local, food distribution system used 4 to 17 times more fuel and emitted 5 to 17 times more than the local and regional transport.Pirog, Rich S.; Van Pelt, Timothy; Enshayan, Kamyar; and Cook, Ellen, \"Food, Fuel, and Freeways: An Iowa perspective on how far food travels, fuel usage, and greenhouse gas emissions\" ( 2001). Leopold Center Pubs and Papers. 3. URL Similarly, in a study by Marc Xuereb and Region of Waterloo Public Health, it was estimated that switching to locally-grown food could save transport-related emissions equivalent to nearly 50, 000 metric tons of , or the equivalent of taking 16,191 cars off the road.Xuereb, Marc. (2005 ). \" Food Miles: Environmental Implications of Food Imports to Waterloo Region. \" Public Health Planner Region of Waterloo Public Health. November. URL upA windowfarm, incorporating discarded plastic bottles into pots for hydroponic agriculture in urban windows Reduction in Noise Pollution Large amounts of noise pollution not only lead to lower property values and high frustration, they can be damaging to human hearing and health. The study \u201cNoise exposure and public health,\u201d found that exposure to continual noise is a public health problem. Examples of the detriment of continual noise on humans to include: \u201chearing impairment, hypertension and ischemic heart disease, annoyance, sleep disturbance, and decreased school performance.\u201d Since most roofs or vacant lots consist of hard flat surfaces that reflect sound waves instead of absorbing them, adding plants that can absorb these waves has the potential to lead to a vast reduction in noise pollution.%DIFDELCMD < %DIFDELCMD < %%% Nutritional Daily intake of a variety of fruits and vegetables is linked to a decreased risk of chronic diseases including diabetes, heart disease, and cancer. Urban agriculture is associated with increased consumption of fruits and vegetables which decreases risk for disease and can be a cost-effective way to provide citizens with quality, fresh produce in urban settings. Garden-based education can also yield nutritional benefits in children. Urban agriculture also provides quality nutrition for low-income households. Improved access to food through urban agriculture can also help alleviate psychosocial stresses in poor communities. Community members engaged in urban agriculture improve local knowledge about healthy ways to fulfill dietary needs . Urban agriculture can also better the mental health of community members. Buying and selling quality products to local producers and consumers allows community members to support one another, which may reduce stress. Thus, urban agriculture can help improve conditions in poor communities, where residents experience higher levels of stress due to a perceived lack of control over the quality of their lives.%DIFDELCMD < %DIFDELCMD < %%% Urban farming has been shown to increase health outcomes. Gardeners consume twice as much fruit and vegetables than non-gardeners. Levels of physical activity are also positively associated with urban farming. These results are seen indirectly and can be supported by the social involvement in an individual's community as a member of the community farm. Food Security and Justice Access to nutritious food, both economically and geographically, is another perspective in the effort to locate food and livestock production in cities. The tremendous influx of the world population to urban areas has increased the need for fresh and safe food. The Community Food Security Coalition (CFSC ) defines food security as: All persons in a community having access to culturally acceptable, nutritionally adequate food through local, non-emergency sources at all times.%DIFDELCMD < %DIFDELCMD < %%% Areas faced with food security issues have limited choices, often relying on highly processed fast food or convenience store foods that are high in calories and low in nutrients, which may lead to elevated rates of diet-related illnesses such as diabetes. These problems have brought about the concept of food justice which Alkon and Norgaard (2009; 289) explain that, \"places access to healthy, affordable, culturally appropriate food in the contexts of institutional racism, racial formation, and racialized geographies. Food justice serves as a theoretical and political bridge between scholarship and activism on sustainable agriculture, food insecurity, and environmental justice. \" Some systematic reviews have already explored urban agriculture contribution to food security and other determinants of health outcomes%DIFDELCMD < [%%% 2 . The Agriculture Network could be used to address food insecurity. One study of Cleveland shows that the city could actually meet up to 100\\% of its fresh produce needs%DIFDELCMD < [%%% 3 . This would prevent up to $115 million in annual economic leakage. Using the rooftop space of New York City would also be able to provide roughly twice the amount of space necessary to supply New York City with its green vegetable yields. Space could be even better optimized through the usage of hydroponic or indoor factory production of food. Growing gardens within cities would also cut down on the amount of food waste. UPA plays an important role in making food more affordable and in providing emergency supplies of food. Environmental justice Urban Agriculture is known to bring ample health and social benefits for residents. Participating in community gardens, urban farms, and other types of gardening projects in the city offer new opportunities for physical activity, create and strengthen social contacts and relationships, address stress and other mental health needs, improve environmental conditions of the city, and contribute to overall well-being. Those benefits are particularly evident for socially vulnerable groups, including lower-income residents, immigrants, residents with disabilities, children, or the elderly[4]. Adding, Urban Gardens addresses different drivers of injustices that exist in a city such as exclusive access to benefits of urban sustainability infrastructure, Uneven environmental health and pollution patterns, and Unfit institutional structures [5]. It helps as well to restore environment justices and equalities in cities and living spaces. Implementation A small urban farm in Amsterdam Rooftop urban farming at the Food Roof Farm in downtown St. Louis, MO Creating a community-based infrastructure for urban agriculture means establishing local systems to grow and process food and transfer it from farmer to consumer. To facilitate food production, cities have established community-based farming projects. Some projects have collectively tended community farms on common land, much like that of the eighteenth-century Boston Common. One such community farm is the Collingwood Children's Farm in Melbourne, Australia. Other community garden projects use the allotment garden model, in which gardeners care for individual plots in a larger gardening area, often sharing a tool shed and other amenities. Seattle's P-Patch Gardens use this model, as did the South Central Farm in Los Angeles and the Food Roof Farm in St. Louis. Independent urban gardeners also grow food in individual yards and on roofs. Garden sharing projects seek to pair producers with the land, typically, residential yard space. Roof gardens allow for urban dwellers to maintain green spaces in the city without having to set aside a tract of undeveloped land. Rooftop farms allow otherwise unused industrial roofspace to be used productively, creating work and profit. Projects around the world seek to enable cities to become 'continuous productive landscapes' by cultivating vacant urban land and temporary or permanent kitchen gardens.Andr\u00e9 Viljoen, Katrin Bohn and Joe Howe, 2005, Continuous Productive Urban Landscapes: Designing Urban Agriculture for Sustainable Cities, Oxford: Architectural Press Urban agriculture project in the La Romita section of Colonia Roma, Mexico City Tomato plants growing in a pot farming alongside a small house in New Jersey in fifteen garbage cans filled with soil, grew over 700 tomatoes during the summer of 2013. Food processing on a community level has been accommodated by centralizing resources in community tool sheds and processing facilities for farmers to share. The Garden Resource Program Collaborative based in Detroit has cluster tool banks. Different areas of the city have tool banks where resources like tools, compost, mulch, tomato stakes, seeds, and education can be shared and distributed with the gardeners in that cluster. Detroit's Garden Resource Program Collaborative also strengthens their gardening community by providing access to their member's transplants; education on gardening, policy, and food issues; and by building connectivity between gardeners through workgroups, potlucks, tours, field trips, and cluster workdays. In Brazil, \"Cities Without Hunger\" has generated a public policy for the reconstruction of abandoned areas with food production and has improved the green areas of the community. Farmers' markets, such as the farmers' market in Los Angeles, provide a common land where farmers can sell their product to consumers. Large cities tend to open their farmer's markets on the weekends and one day in the middle of the week. For example, the farmers' market of Boulevard Richard-Lenoir in Paris, France, is open on Sundays and Thursdays. However, to create a consumer dependency on urban agriculture and to introduce local food production as a sustainable career for farmers, markets would have to be open regularly. For example, the Los Angeles Farmers' Market is open seven days a week and has linked several local grocers together to provide different food products. The market's central location in downtown Los Angeles provides the perfect interaction for a diverse group of sellers to access their consumers. Argentina The city of Rosario (population: 1.3 million) has incorporated agriculture fully into its land-use planning and urban development strategy. Its Land Use Plan 2007-2017 makes specific provision for the agricultural use of public land. Under its Metropolitan Strategic Plan 2008-2018, Rosario is building a \u201cgreen circuit\u201d, passing through and around the city, consisting of family and community gardens, large-scale, commercial vegetable gardens and orchards, multifunctional garden parks, and \u201cproductive barrios\u201d, where agriculture is integrated into programs for the construction of public housing and the upgrading of slums. In 2014, the green circuit consisted of more than 30 ha of land used to grow vegetables, fruit, and medicinal and aromatic plants. The city has five garden parks \u2013 large, landscaped green areas covering a total of 72 ha of land, which is used for agriculture and for cultural, sports and educational activities.Food and Agriculture Organization (2014) Growing greener cities in Latin America and the Caribbean. Australia In Queensland many people have started a trend of urban farming and utilizing aquaponics and self-watering containers. Canada British Columbia A Canadian urban farmer in British Columbia has published details on a crop value rating (CVR) system that urban farmers can use to determine which crops to grow, based on each crop's contribution to supporting the farm economically. This entails forgoing some crops in favor of others, but he points out that urban farmers can develop business networking with rural farmers to bring some of those other crops to the urban point of sale. For example, the urban farmer may not be able to economically justify growing sweet corn (based on long days to maturity and low yield density per linear foot of row), but a networking arrangement is mutually beneficial, as it lets a rural sweet corn grower gain an additional point of sale at retail price while also letting the urban farmer fill the gap in his product line offering. Several community projects in Victoria, British Columbia were born to promote urban agricultural practices such as the Sharing Backyards program. This program exists to help people living in urban areas get connected with others who have extra space in their yards for the purpose of urban farming. Organizations also exist to educate people living in the urban parts of Vancouver on farming and growing food in an urban setting by running public demonstration gardens. Covering the roof of the west building of the Vancouver Convention Centre is the largest green roof in Canada and one of the 10 largest green roofs in the world. With around six acres of living space, it is home to more than 400,000 indigenous plants and grasses that provide insulation. It is also home to four Western honey bee beehives which pollinate the plants on the roof and provide honey. The living includes other sustainable practices such as recycling and reusing water. The city of Kamloops, British Columbia actively promotes urban agricultural practices within their community. They stress the importance of food security and its effect on the economy as well as the ecology. They created the Food and Urban Agriculture Plan (FUAP), initiated in 2014, which lays out goals and strategies to implement a sustainable food system. The Areas which they cover include: Food Production and Land Availability, Food Processing and Preparing, Food Distribution/Retail/Access, Cooking/Eating and Celebrating Food, Food Waste and Resource Management, as well as Education/Governance and Capacity Building. The FUAP greatly emphasizes on Urban Agriculture. Ontario Ontario is the second biggest province and is one of the most urbanized in Canada. The provincial government of Ontario has a website dedicated to providing information to those who are interested in establishing an urban farm or for those who just want to learn more about urban agriculture in Ontario. The City of Ottawa is home to the largest urban farm in the nation, the Central Experimental Farm (CEF). Centrally located and surrounded by the city, the 4 square kilometres (1.5 sq mi) farm is an agricultural facility, working farm, and research center of Agriculture and Agri-Food Canada. The City of Ottawa is also home to numerous urban farms within the 203.5-square-kilometre (78.6 sq mi) greenbelt. Along with many other cities in Ontario, the City of Toronto allows eligible residents in 4 wards across the city to keep a maximum of 4 hens (no roosters) for the purpose of enjoyment or personal consumption of only the eggs. There are other requirements included with rearing these hens under this program such as zoning and guidelines for building the enclosure, waste and disposal. The wards eligible for this program from the UrbanHensTo site include Ward 13 (Parkdale-High Park), Ward 21 (St. Paul's), Ward 5 (Etobicoke-Lakeshore), and Ward 32 (Beaches-East York). Workshops are also available to those interested in rearing urban hens. However, failure to abide by these rules and regulations can result in fines. Quebec Lufa Farms greenhouses are constructed on the rooftops of Greater Montreal. In Montreal, about 100 community gardens provide plots where citizens can grow fruits, vegetables, herbs, and flowers. The largest community garden has about 255 allotment plots, while the smallest site has about 25 plots. Out of 2 million people living in the urbanized parts of Montreal, about 10,000 residents share the garden plots. The program has been in place since 1975 and is managed by the boroughs. Some of the boroughs have a gardening instructor who visits the gardens regularly to give gardeners tips. Soil, a water supply, a space for tools, sand, fencing, and paint are provided by the city, managed by the Department of Sports, Recreation and Social Development. Canada has a number of companies working on urban farm technology, including in Montreal. The most significant is Lufa Farms, a private company that opened what is reported to be the world's largest rooftop greenhouse at 163,000 sq ft in the Montreal borough of Saint-Laurent. This is Lufa's fourth rooftop greenhouse in Montreal and is built on the roof of the former Sears Canada warehouse. Lufa's first rooftop greenhouse was built in early 2011, a 2880 sq metre (31,000 sq ft) hydroponic rooftop greenhouse atop a warehouse designated as their headquarters. They built two more large rooftop greenhouses in greater Montreal in 2013 (4,000 sq metre / 43,000 sq ft) and 2017 (5,850 sq metre / 63,000 sq ft), spending almost $ 10 million for the three structures. Also in 2017, an IGA supermarket in Saint-Laurent in Montreal unveiled a green roof of about 25,000 square feet of green space and products certified by Ecocert Canada. They state that they can provide over 30 different kinds of rooftop grown organic produce, along with honey produced and harvested from eight bee hives located on the roof. Denver Denver, Colorado is home to many different forms of Urban Agriculture projects: indoor and outdoor, for-profit and nonprofit, community gardens and farms, and private and public land.McIvor, D.W., Hale, J. Urban agriculture and the prospects for deep democracy. Agric Hum Values 32, 727\u2013741 (2015). URL Denver has been a case study for urban agriculture as a force of green gentrification; historically, Denver urban farmers gained access to land after the Great Recession, but began to contribute to displacement of their neighbors and themselves as green gentrification spread throughout an economically-expanding city with new municipal sustainability goals.Joshua Sbicca, \"Urban Agriculture, Revalorization, and GreenGentrification in Denver, Colorado\" In The Politics of Land. Published online: 25 Feb2019; 149-170.Permanent link to this URL One reason for such a rise in the food movement is the city's unique lack of both open-space funding and a working land trust, which caused city farms to drop from 307 in 1925 to nine by 2016. In 2009, then-mayor John Hickenlooper declared May 14th to be Grow Local Colorado day. Then, in 2010, Hickenlooper formed the Denver Sustainable Food Policy Council. In 2011, Mayor Michael Hancock continued along this trend of green development, creating the \u201cPeople\u2019s Plan\u201d to stimulate the economy by improving land-access for farmers and local food availability.Alkon, A. H., Kato, Y.,%DIFDELCMD < & %%% Sbicca, J. (2020). In A recipe for gentrification food, power, and resistance in the city (pp. 93\u201395). essay, New York University Press. Included in the city's 2020 Sustainability Goals is the plan to produce 20\\% of Denver's food in Colorado. Illinois Urban farming initiatives across the State of Illinois, including Chicago, have been spearheaded by advocacy groups. In addition, HB3418 allows municipalities and counties across the state, including Chicago, to establish urban agriculture zones (UAZs), supported by financial incentives such as reduced water rates, utility fees, and property tax abatements. Furthermore, the USDA has implemented the Outreach and Technical Assistance for Socially Disadvantaged and Veteran Farmers and Ranchers Program (the 2501 Program) which was transferred from USDA\u2019s National Institute of Food and Agriculture. The primary purpose of the 2501 Program is to enhance the coordination of outreach, technical assistance, and education efforts, to reach socially disadvantaged and veteran farmers, ranchers, and forest landowners and to improve their participation in the full range of USDA programs. %DIFDELCMD < %DIFDELCMD < %%% Taysuteke Community Urban Garden in Freetown- Sierra Leone Taysuteke community garden in Freetown. The association has been practicing urban farming on the land for generations. The association was officially established in 2000 and later registered as a women\u2019s cooperative. Like many other urban and peri-urban agriculture in Freetown , its activity expanded as a response to the food shortages caused by blockade during the civil war in Freetown. Currently, it is formed of 60 women living in the vicinity of the garden. Taysuteke garden provided livelihoods to the group and generated income that is used for households\u2019 provisions and kids\u2019 education. Taysutekeh urban garden spreads over an area of 1 hectare. It is divided into 15 plots. The plots are cultivated collectively by the women, and the yields are shared equitably. Each woman contributes a monthly fee equivalent to 1$ that goes to the collective bank account of the association. The amount is used seasonally by the association to conduct land preparation work and install irrigation systems that mainly require paid labor. Most crops are planted during the dry season including cassava leaves, potato leaves, sorrel, corchorus leaves, amaranthus, okra, tomatoes, cabbage, etc. Taysuteke land was originally a mangrove swamp. It was reclaimed for farming for almost three generations. However, ownership of the land is a burden and a challenge that the association faces. Fear of eviction is a constant concern for the association. Farm on Odgen by Chicago Botanic Garden. |alt= UPA assists to close the open-loop system in urban areas characterized by the importation of food from rural zones and the exportation of waste to regions outside the city or town. Wastewater and organic solid waste can be transformed into resources for growing agriculture products: the former can be used for irrigation, the latter as fertilizer. Vacant urban areas can be used for agriculture production. Other natural resources can be conserved. The use of wastewater for irrigation improves water management and increases the availability of fresh water for drinking and household consumption. UPA can help to preserve bioregional ecologies from being transformed into cropland. Urban agriculture saves energy (e.g. energy consumed in transporting food from rural to urban areas). Local production of food also allows savings in transportation costs, storage, and in product loss, what results in food cost reduction. UPA improves the quality of the urban environment through greening and thus, a reduction in pollution. Urban agriculture also makes the city a healthier place to live by improving the quality of the environment. UPA is a very effective tool to fight against hunger and malnutrition since it facilitates the access to food by an impoverished sector of the urban population. Poverty alleviation: It is known that a large part of the people involved in urban agriculture is the urban poor. In developing countries, the majority of urban agricultural production is for self-consumption, with surpluses being sold in the market. According to the FAO (Food and Agriculture Organization of the United Nations), urban poor consumers spend between 60 and 80 percent of their income on food, making them very vulnerable to higher food prices. UPA provides food and creates savings in household expenditure on consumables, thus increasing the amount of income allocated to other uses. UPA surpluses can be sold in local markets, generating more income for the urban poor. Urban agriculture for sustainable cities: using wastes and idle land and water bodies as resources. Jac Smit, Joe Nasr. Environment and Urbanization, Vol 4, Issue 2, pp. 141 - 152. First Published October 1, 1992. URL Trade-offs Space is at a premium in cities and is accordingly expensive and difficult to secure. The utilization of untreated wastewater for urban agricultural irrigation can facilitate the spread of waterborne diseases among the human population. Although studies have demonstrated improved air quality in urban areas related to the proliferation of urban gardens, it has also been shown that increasing urban pollution (related specifically to a sharp rise in the number of automobiles on the road), has led to an increase in insect pests, which consume plants produced by urban agriculture. It is believed that changes to the physical structure of the plants themselves, which have been correlated to increased levels of air pollution, increase plants' palatability to insect pests. Reduced yields within urban gardens decreases the amount of food available for human consumption. Studies indicate that the nutritional quality of wheat suffers when urban wheat plants are exposed to high nitrogen dioxide and sulfur dioxide concentrations. This problem is particularly acute in the developing world, where outdoor concentrations of sulfur dioxide are high and large percentages of the population rely upon urban agriculture as a primary source of food. These studies have implications for the nutritional quality of other staple crops that are grown in urban settings. Agricultural activities on land that is contaminated (with such metals as lead) pose potential risks to human health. These risks are associated both with working directly on contaminated land and with consuming food that was grown in contaminated soil. The lead would affect the roots of plants grown in these soils much more than above ground produce. Most of the danger of lead in urban gardens would come from ingesting the soil itself. Municipal greening policy goals can pose conflicts. For example, policies promoting urban tree canopy are not sympathetic to vegetable gardening because of the deep shade cast by trees. However, some municipalities like Portland, Oregon, and Davenport, Iowa are encouraging the implementation of fruit-bearing trees (as street trees or as park orchards) to meet both greening and food production goals . Green gentrification or environmental gentrification occurs when environmental policies or planning in urban spaces leads to the displacement and exclusion of certain residents. Specifically, the growth imperative of capitalist urbanization pushes governments to enact sustainable development initiatives in underprivileged areas.Gould, K. A., Lewis, T. L. (2017). Green gentrification: Urban sustainability and the struggle for environmental justice. New York, NY: Routledge. In addition to \"green\" labels being marketable for developers and businesses, beautification can enhance gentrification, and urban agriculture can potentially contribute to this. However, farming and gardening in urban spaces isn\u2019t always a signal of gentrification. The relationship is complex, as urban green spaces can also provide food to the underserved, and act as community-run spaces of resistance .", "after_revision": "Impact A sprouting glass jar with mung beans in it Economic Urban and Peri-urban agriculture (UPA) expands the economic base of the city through production, processing, packaging, and marketing of consumable products. This results in an increase in entrepreneurial activities and the creation of jobs, as well as reducing food costs and improving quality. Urban agriculture for sustainable cities: using wastes and idle land and water bodies as resources. Jac Smit, Joe Nasr. Environment and Urbanization, Vol 4, Issue 2, pp. 141 - 152. First Published October 1, 1992. URL UPA provides employment, income, and access to food for urban populations , which helps to relieve chronic and emergency food insecurity. Chronic food insecurity refers to less affordable food and growing urban poverty, while emergency food insecurity relates to breakdowns in the chain of food distribution. UPA plays an important role in making food more affordable and in providing emergency supplies of food. Research into market values for produce grown in urban gardens has been attributed to a community garden plot a median yield value of between approximately $200 and $500 (US, adjusted for inflation). Sommers, L., and B. Butterfield, as cited in: Blair, D., C. Giesecke, and S. Sherman. (1991). \"A Dietary, Social and Economic Evaluation of the Philadelphia Urban Gardening Project,\" Journal of Nutrition Education . Social The needs of urban landscaping can be combined with those of suburban livestock farmers. (Kstovo, Russia). Urban agriculture can have a large impact on the social and emotional well-being of individuals. UA can have an overall positive impact on community health, which directly impacts individuals social and emotional well-being. Urban gardens are often places that facilitate positive social interaction , which also contributes to overall social and emotional well-being. Many gardens facilitate the improvement of social networks within the communities that they are located. For many neighborhoods, gardens provide a \u201csymbolic focus,\u201d which leads to increased neighborhood pride. Urban agriculture increases community participation through diagnostic workshops or different commissions in the area of vegetable gardens. Activities which involve hundreds of people. When individuals come together around UA, physical activity levels are often increased. This can also raise serotonin levels akin to working out at a gym. There is the added element of walking/biking to the gardens, further increasing physical activity and the benefits of being outdoors. UPA can be seen as a means of improving the livelihood of people living in and around cities. Taking part in such practices is seen mostly as an informal activity, but in many cities where inadequate, unreliable, and irregular access to food is a recurring problem, urban agriculture has been a positive response to tackling food concerns. Due to the food security that comes with UA, feelings of independence and empowerment often arise. The ability to produce and grow food for oneself has also been reported to improve levels of self-esteem or of self-efficacy %DIFDELCMD < [%%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% . Households and small communities take advantage of vacant land and contribute not only to their household food needs but also the needs of their resident city.Hales et al. ( 2016 ). \" Urban Agriculture: Urban agriculture, positive impact \" My Green Hobby The CFSC states that: %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < [%%% %DIFDELCMD < [%%% Community and residential gardening, as well as small-scale farming, save household food dollars. They promote nutrition and free cash for non-garden foods and other items. As an example, you can raise your own chickens on an urban farm and have fresh eggs for only $0.44 per dozen.What's the Real Cost of Raising Backyard Chickens? (2015, March 29). Retrieved April 2, 2015, from URL This allows families to generate larger incomes selling to local grocers or to local outdoor markets while supplying their household with the proper nutrition of fresh and nutritional products. A vegetable garden in the square in front of the train station in Ezhou, China Some community urban farms can be quite efficient and help women find work, who in some cases are marginalized from finding employment in the formal economy.FAO. (1999). \"Issues in Urban Agriculture,\" FAO Spotlight Magazine, January. Studies have shown that participation from women have a higher production rate, therefore producing the adequate amount for household consumption while supplying more for market sale. As most UA activities are conducted on vacant municipal land, there have been raising concerns about the allocation of land and property rights. The IDRC and the FAO have published the Guidelines for Municipal Policymaking on Urban Agriculture, and are working with municipal governments to create successful policy measures that can be incorporated in urban planning.IDRC/ UN-HABITAT\".Guidelines for Municipal Policymaking on Urban Agriculture\" Urban Agriculture: Land Management and Physical Planning (2003) PDF 1.3 Over a third of U.S. households, roughly 42 million, participate in food gardening. There has also been an increase of 63\\% participation in farming by millennials from 2008-2013. US households participating in community gardening has also tripled from 1 to 3 million in that time frame. Urban agriculture provides unique opportunities to bridge diverse communities together. In addition, it provides opportunities for health care providers to interact with their patients. Thus, making each community garden a hub that is reflective of the community.Alaimo, K., Beavers, A.W., Crawford, C. et al. Curr Envir Health Rpt (2016) 3: 302. URL Energy efficiency upEdible Oyster Mushrooms growing on used coffee grounds The current industrial agriculture system is accountable for high energy costs for the transportation of foodstuffs. According to a study by Rich Pirog, associate director of the Leopold Center for Sustainable Agriculture at Iowa State University, the average conventional produce item travels , using, if shipped by tractor-trailer, of fossil fuel per . The energy used to transport food is decreased when urban agriculture can provide cities with locally grown food. Pirog found that traditional, non-local, food distribution system used 4 to 17 times more fuel and emitted 5 to 17 times more than the local and regional transport.Pirog, Rich S.; Van Pelt, Timothy; Enshayan, Kamyar; and Cook, Ellen, \"Food, Fuel, and Freeways: An Iowa perspective on how far food travels, fuel usage, and greenhouse gas emissions\" (2001). Leopold Center Pubs and Papers. 3. URL Similarly, in a study by Marc Xuereb and Region of Waterloo Public Health, it was estimated that switching to locally-grown food could save transport-related emissions equivalent to nearly 50,000 metric tons of , or the equivalent of taking 16,191 cars off the road.Xuereb, Marc. (2005). \"Food Miles: Environmental Implications of Food Imports to Waterloo Region.\" Public Health Planner Region of Waterloo Public Health. November. URL upA windowfarm, incorporating discarded plastic bottles into pots for hydroponic agriculture in urban windows Carbon footprint As mentioned above, the energy-efficient nature of urban agriculture can reduce each city's carbon footprint by reducing the amount of transport that occurs to deliver goods to the consumer.Delta Institute, \"Urban Agriculture.\" Web. 25 March 2013. Such areas can act as carbon sinks offsetting some of the carbon accumulation that is innate to urban areas, where pavement and buildings outnumber plants. Plants absorb atmospheric carbon dioxide () and release breathable oxygen (O2) through photosynthesis. The process of Carbon Sequestration can be further improved by combining other agriculture techniques to increase removal from the atmosphere and prevent the release of during harvest time. However, this process relies heavily on the types of plants selected and the methodology of farming. Specifically, choosing plants that do not lose their leaves and remain green all year can increase the farm's ability to sequester carbon. Reduction in ozone and particulate matter The reduction in ozone and other particulate matter can benefit human health. Reducing these particulates and ozone gases could reduce mortality rates in urban areas along with increase the health of those living in cities. A 2011 article found that a rooftop containing 2000 m\u00b2 of uncut grass has the potential to remove up to 4000 kg of particulate matter and that one square meter of green roof is sufficient to offset the annual particulate matter emissions of a car.Environmental Affairs Department, City of Los Angeles. 2006. \"Green Roofs - Cooling Los Angeles: A Resource Guide\". URL Soil decontamination Vacant urban lots are often victims to illegal dumping of hazardous chemicals and other wastes. They are also liable to accumulate standing water and \u201cgrey water\u201d, which can be dangerous to public health, especially left stagnant for long periods. The implementation of urban agriculture in these vacant lots can be a cost-effective method for removing these chemicals. In the process known as Phytoremediation, plants and the associated microorganisms are selected for their chemical ability to degrade, absorb, convert to an inert form, and remove toxins from the soil.Black, H. \"Absorbing Possibilities: Phytoremediation.\" Environ Health Perspectives 103.12 (1995): 1106-108. Several chemicals can be targeted for removal, including heavy metals (e.g. Mercury and lead), inorganic compounds (e.g. Arsenic and Uranium), and organic compounds (e.g. petroleum and chlorinated compounds like PBC's).Comis, Don. (2000). \"Phytoremediation: Using Plants To Clean Up Soils.\" Agricultural Research: n. pag. Phytoremediation: Using Plants To Clean Up Soils. USDA-ARS, 13 August 2004. Web. 25 March 2013. Phytoremeditation is both an environmentally-friendly, cost-effective and energy-efficient measure to reduce pollution. Phytoremediation only costs about $5\u2013$40 per ton of soil being decontaminated.Cluis, C. (2004). \"Junk-greedy Greens: phytoremediation as a new option for soil decontamination,\" BioTech J. 2: 61-67 Implementation of this process also reduces the amount of soil that must be disposed of in a hazardous waste landfill. Urban agriculture as a method to mediate chemical pollution can be effective in preventing the spread of these chemicals into the surrounding environment. Other methods of remediation often disturb the soil and force the chemicals contained within it into the air or water. Plants can be used as a method to remove chemicals and also to hold the soil and prevent erosion of contaminated soil decreasing the spread of pollutants and the hazard presented by these lots. One way of identifying soil contamination is through using already well-established plants as bioindicators of soil health. Using well-studied plants is important because there has already been substantial bodies of work to test them in various conditions, so responses can be verified with certainty. Such plants are also valuable because they are genetically identical as crops as opposed to natural variants of the same species. Typically urban soil has had the topsoil stripped away and has led to soil with low aeration, porosity, and drainage. Typical measures of soil health are microbial biomass and activity, enzymes, soil organic matter (SOM), total nitrogen, available nutrients, porosity, aggregate stability, and compaction. A new measurement is active carbon (AC), which is the most usable portion of the total organic carbon (TOC) in the soil. This contributes greatly to the functionality of the soil food web. Using common crops, which are generally well-studied, as bioindicators can be used to effectively test the quality of an urban farming plot before beginning planting.Alaimo K, Beavers AW, Crawford C, et al. (2016) Amplifying Health Through Community Gardens: A Framework for Advancing Multicomponent, Behaviorally Based Neighborhood Interventions. Current Environmental Health Reports 3:302\u2013312. doi: 10.1007/s40572-016-0105-0 Noise pollution Large amounts of noise pollution not only lead to lower property values and high frustration, they can be damaging to human hearing and health. The study \u201cNoise exposure and public health,\u201d found that exposure to continual noise is a public health problem. Examples of the detriment of continual noise on humans to include: \u201chearing impairment, hypertension and ischemic heart disease, annoyance, sleep disturbance, and decreased school performance.\u201d Since most roofs or vacant lots consist of hard flat surfaces that reflect sound waves instead of absorbing them, adding plants that can absorb these waves has the potential to lead to a vast reduction in noise pollution. Nutrition and quality of food Daily intake of a variety of fruits and vegetables is linked to a decreased risk of chronic diseases including diabetes, heart disease, and cancer. Urban agriculture is associated with increased consumption of fruits and vegetables Alaimo, K., Packnett, E., Miles, R., Kruger, D. (2008). \"Fruit and Vegetable Intake among Urban Community Gardeners\". Journal of Nutrition Education and Behavior. (1499-4046),40 (2), p. 94. which decreases risk for disease and can be a cost-effective way to provide citizens with quality, fresh produce in urban settings. Produce from urban gardens can be perceived to be more flavorful and desirable than store bought produce which may also lead to a wider acceptance and higher intake. A Flint, Michigan study found that those participating in community gardens consumed fruits and vegetables 1.4 times more per day and were 3.5 times more likely to consume fruits or vegetables at least 5 times daily (p. 1). Garden-based education can also yield nutritional benefits in children. An Idaho study reported a positive association between school gardens and increased intake of fruit, vegetables, vitamin A, vitamin C and fiber among sixth graders. Harvesting fruits and vegetables initiates the enzymatic process of nutrient degradation which is especially detrimental to water soluble vitamins such as ascorbic acid and thiamin. The process of blanching produce in order to freeze or can reduce nutrient content slightly, but not nearly as much as the amount of time spent in storage. Harvesting produce from one's own community garden cuts back on storage times significantly. Urban agriculture also provides quality nutrition for low-income households. Studies show that every $1 invested in a community garden yields $6 worth of vegetables if labor is not considered a factor in investment. Many urban gardens reduce the strain on food banks and other emergency food providers by donating shares of their harvest and providing fresh produce in areas that otherwise might be food deserts. The supplemental nutrition program Women, Infants and Children (WIC) as well as the Supplemental Nutrition Assistance Program (SNAP) have partnered with several urban gardens nationwide to improve the accessibility to produce in exchange for a few hours of volunteer gardening work. Urban farming has been shown to increase health outcomes. Gardeners consume twice as much fruit and vegetables than non-gardeners. Levels of physical activity are also positively associated with urban farming. These results are seen indirectly and can be supported by the social involvement in an individual's community as a member of the community farm. This social involvement helped raise the aesthetic appeal of the neighborhood, boosting the motivation or efficacy of the community as a whole. This increased efficacy was shown to increase neighborhood attachment. Therefore, the positive health outcomes of urban farming can be explained in part by interpersonal and social factors that boost health. Focusing on improving the aesthetics and community relationships and not only on the plant yield, is the best way to maximize the positive effect of urban farms on a neighborhood.Litt, J.s., et al. \u201cExploring Ecological, Emotional, and Social Levers of Self-Rated Health for Urban Gardeners and Non-Gardeners: A Path Analysis.\u201d Social Science & Medicine, vol. 144, 2015, pp. 1\u20138., doi:10.1016/j.socscimed.2015.09.004. Economy of scale Using high-density urban farming with vertical farms or stacked greenhouses, many environmental benefits can be achieved on a citywide scale that would be impossible otherwise. These systems do not only provide food, but also produce potable water from waste water, and can recycle organic waste back to energy and nutrients. At the same time, they can reduce food-related transportation to a minimum while providing fresh food for large communities in almost any climate. Health inequalities and food justice A 2009 report by the USDA, determined that \"Evidence is both abundant and robust enough for us to conclude that Americans living in low-income and minority areas tend to have poor access to healthy food\", and that the \"structural inequalities\" in these neighborhoods \"contribute to inequalities in diet and diet-related outcomes\". These diet-related outcomes, including obesity and diabetes, have become epidemic in low-income urban environments in the United States.Designed for Disease: The Link Between Local Food Environments and Obesity and Diabetes. California Center for Public Health Advocacy, PolicyLink, and the UCLA Center for Health Policy Research. April 2008. Although the definition and methods for determining \"food deserts\" have varied, studies indicate that, at least in the United States, there are racial disparities in the food environment. Thus using the definition of environment as the place where people live, work, play and pray, food disparities become an issue of environmental justice. This is especially true in American inner-cities where a history of racist practices have contributed to the development of food deserts in the low-income, minority areas of the urban core. The issue of inequality is so integral to the issues of food access and health that the Growing Food & Justice for All Initiative was founded with the mission of \u201cdismantling racism\u201d as an integral part of creating food security. Not only can urban agriculture provide healthy, fresh food options, but also can contribute to a sense of community, aesthetic improvement, crime reduction, minority empowerment and autonomy, and even preserve culture through the use of farming methods and heirloom seeds preserved from areas of origin. Environmental justice Urban agriculture may advance environmental justice and food justice for communities living in food deserts. First, urban agriculture may reduce racial and class disparities in access to healthy food. When urban agriculture leads to locally grown fresh produce sold at affordable prices in food deserts, access to healthy food is not just available for those who live in wealthy areas, thereby leading to greater equity in rich and poor neighborhoods. Improved access to food through urban agriculture can also help alleviate psychosocial stresses in poor communities. Community members engaged in urban agriculture improve local knowledge about healthy ways to fulfill dietary needs. Urban agriculture can also better the mental health of community members. Buying and selling quality products to local producers and consumers allows community members to support one another, which may reduce stress. Thus, urban agriculture can help improve conditions in poor communities, where residents experience higher levels of stress due to a perceived lack of control over the quality of their lives.Sapolsky, Robert, \"Sick of Poverty,\" Scientific American, Dec. 2005, pp: 93-99. Urban agriculture may improve the livability and built environment in communities that lack supermarkets and other infrastructure due to the presence of high unemployment caused by deindustrialization. Urban farmers who follow sustainable agricultural methods can not only help to build local food system infrastructure, but can also contribute to improving local air, and water and soil quality. When agricultural products are produced locally within the community, they do not need to be transported, which reduces emission rates and other pollutants that contribute to high rates of asthma in lower socioeconomic areas. Sustainable urban agriculture can also promote worker protection and consumer rights. For example, communities in New York City, Illinois, and Richmond, Virginia have demonstrated improvements to their local environments through urban agricultural practices.Alternatives for Community & Environment. Environmental Justice and the Green Economy. A Vision Statement and Case Studies for Just and Sustainable Solutions. Rep. Roxbury, MA: Alternatives for Community & Environment, 2010. Print. However, urban agriculture can also present urban growers with health risks if the soil used for urban farming is contaminated. Lead contamination is particularly common, with hazardous levels of lead found in soil in many United States cities.Murphy, Kate. \"Lead Is a Concern for Urban Gardens.\" The New York Times. The New York Times, 13 May 2009. Web. 9 April 2014. High lead levels in soil originate from sources including flaking lead paint which was widely used before being banned in the 1970s, vehicle exhaust, and atmospheric deposition. Without proper education on the risks of urban farming and safe practices, urban consumers of urban agricultural produce may face additional health-related issues.McClintock, Nathan. (2008). From Industrial Garden to Food Desert: Unearthing the Root Structure of urban agriculture in Oakland, California. UC Berkeley: Institute for the Study of Societal Issues. Implementation A small urban farm in Amsterdam Rooftop urban farming at the Food Roof Farm in downtown St. Louis, MO Creating a community-based infrastructure for urban agriculture means establishing local systems to grow and process food and transfer it from farmer to consumer. To facilitate food production, cities have established community-based farming projects. Some projects have collectively tended community farms on common land, much like that of the eighteenth-century Boston Common. One such community farm is the Collingwood Children's Farm in Melbourne, Australia. Other community garden projects use the allotment garden model, in which gardeners care for individual plots in a larger gardening area, often sharing a tool shed and other amenities. Seattle's P-Patch Gardens use this model, as did the South Central Farm in Los Angeles and the Food Roof Farm in St. Louis. Independent urban gardeners also grow food in individual yards and on roofs. Garden sharing projects seek to pair producers with the land, typically, residential yard space. Roof gardens allow for urban dwellers to maintain green spaces in the city without having to set aside a tract of undeveloped land. Rooftop farms allow otherwise unused industrial roofspace to be used productively, creating work and profit. Projects around the world seek to enable cities to become 'continuous productive landscapes' by cultivating vacant urban land and temporary or permanent kitchen gardens.Andr\u00e9 Viljoen, Katrin Bohn and Joe Howe, 2005, Continuous Productive Urban Landscapes: Designing Urban Agriculture for Sustainable Cities, Oxford: Architectural Press Urban agriculture project in the La Romita section of Colonia Roma, Mexico City Tomato plants growing in a pot farming alongside a small house in New Jersey in fifteen garbage cans filled with soil, grew over 700 tomatoes during the summer of 2013. Food processing on a community level has been accommodated by centralizing resources in community tool sheds and processing facilities for farmers to share. The Garden Resource Program Collaborative based in Detroit has cluster tool banks. Different areas of the city have tool banks where resources like tools, compost, mulch, tomato stakes, seeds, and education can be shared and distributed with the gardeners in that cluster. Detroit's Garden Resource Program Collaborative also strengthens their gardening community by providing access to their member's transplants; education on gardening, policy, and food issues; and by building connectivity between gardeners through workgroups, potlucks, tours, field trips, and cluster workdays. In Brazil, \"Cities Without Hunger\" has generated a public policy for the reconstruction of abandoned areas with food production and has improved the green areas of the community. Farmers' markets, such as the farmers' market in Los Angeles, provide a common land where farmers can sell their product to consumers. Large cities tend to open their farmer's markets on the weekends and one day in the middle of the week. For example, the farmers' market of Boulevard Richard-Lenoir in Paris, France, is open on Sundays and Thursdays. However, to create a consumer dependency on urban agriculture and to introduce local food production as a sustainable career for farmers, markets would have to be open regularly. For example, the Los Angeles Farmers' Market is open seven days a week and has linked several local grocers together to provide different food products. The market's central location in downtown Los Angeles provides the perfect interaction for a diverse group of sellers to access their consumers. Argentina The city of Rosario (population: 1.3 million) has incorporated agriculture fully into its land-use planning and urban development strategy. Its Land Use Plan 2007-2017 makes specific provision for the agricultural use of public land. Under its Metropolitan Strategic Plan 2008-2018, Rosario is building a \u201cgreen circuit\u201d, passing through and around the city, consisting of family and community gardens, large-scale, commercial vegetable gardens and orchards, multifunctional garden parks, and \u201cproductive barrios\u201d, where agriculture is integrated into programs for the construction of public housing and the upgrading of slums. In 2014, the green circuit consisted of more than 30 ha of land used to grow vegetables, fruit, and medicinal and aromatic plants. The city has five garden parks \u2013 large, landscaped green areas covering a total of 72 ha of land, which is used for agriculture and for cultural, sports and educational activities.Food and Agriculture Organization (2014) Growing greener cities in Latin America and the Caribbean. Australia In Queensland many people have started a trend of urban farming and utilizing aquaponics and self-watering containers. Canada British Columbia A Canadian urban farmer in British Columbia has published details on a crop value rating (CVR) system that urban farmers can use to determine which crops to grow, based on each crop's contribution to supporting the farm economically. This entails forgoing some crops in favor of others, but he points out that urban farmers can develop business networking with rural farmers to bring some of those other crops to the urban point of sale. For example, the urban farmer may not be able to economically justify growing sweet corn (based on long days to maturity and low yield density per linear foot of row), but a networking arrangement is mutually beneficial, as it lets a rural sweet corn grower gain an additional point of sale at retail price while also letting the urban farmer fill the gap in his product line offering. Several community projects in Victoria, British Columbia were born to promote urban agricultural practices such as the Sharing Backyards program. This program exists to help people living in urban areas get connected with others who have extra space in their yards for the purpose of urban farming. Organizations also exist to educate people living in the urban parts of Vancouver on farming and growing food in an urban setting by running public demonstration gardens. Covering the roof of the west building of the Vancouver Convention Centre is the largest green roof in Canada and one of the 10 largest green roofs in the world. With around six acres of living space, it is home to more than 400,000 indigenous plants and grasses that provide insulation. It is also home to four Western honey bee beehives which pollinate the plants on the roof and provide honey. The living includes other sustainable practices such as recycling and reusing water. The city of Kamloops, British Columbia actively promotes urban agricultural practices within their community. They stress the importance of food security and its effect on the economy as well as the ecology. They created the Food and Urban Agriculture Plan (FUAP), initiated in 2014, which lays out goals and strategies to implement a sustainable food system. The Areas which they cover include: Food Production and Land Availability, Food Processing and Preparing, Food Distribution/Retail/Access, Cooking/Eating and Celebrating Food, Food Waste and Resource Management, as well as Education/Governance and Capacity Building. The FUAP greatly emphasizes on Urban Agriculture. Ontario Ontario is the second biggest province and is one of the most urbanized in Canada. The provincial government of Ontario has a website dedicated to providing information to those who are interested in establishing an urban farm or for those who just want to learn more about urban agriculture in Ontario. The City of Ottawa is home to the largest urban farm in the nation, the Central Experimental Farm (CEF). Centrally located and surrounded by the city, the 4 square kilometres (1.5 sq mi) farm is an agricultural facility, working farm, and research center of Agriculture and Agri-Food Canada. The City of Ottawa is also home to numerous urban farms within the 203.5-square-kilometre (78.6 sq mi) greenbelt. Along with many other cities in Ontario, the City of Toronto allows eligible residents in 4 wards across the city to keep a maximum of 4 hens (no roosters) for the purpose of enjoyment or personal consumption of only the eggs. There are other requirements included with rearing these hens under this program such as zoning and guidelines for building the enclosure, waste and disposal. The wards eligible for this program from the UrbanHensTo site include Ward 13 (Parkdale-High Park), Ward 21 (St. Paul's), Ward 5 (Etobicoke-Lakeshore), and Ward 32 (Beaches-East York). Workshops are also available to those interested in rearing urban hens. However, failure to abide by these rules and regulations can result in fines. Quebec Lufa Farms greenhouses are constructed on the rooftops of Greater Montreal. In Montreal, about 100 community gardens provide plots where citizens can grow fruits, vegetables, herbs, and flowers. The largest community garden has about 255 allotment plots, while the smallest site has about 25 plots. Out of 2 million people living in the urbanized parts of Montreal, about 10,000 residents share the garden plots. The program has been in place since 1975 and is managed by the boroughs. Some of the boroughs have a gardening instructor who visits the gardens regularly to give gardeners tips. Soil, a water supply, a space for tools, sand, fencing, and paint are provided by the city, managed by the Department of Sports, Recreation and Social Development. Canada has a number of companies working on urban farm technology, including in Montreal. The most significant is Lufa Farms, a private company that opened what is reported to be the world's largest rooftop greenhouse at 163,000 sq ft in the Montreal borough of Saint-Laurent. This is Lufa's fourth rooftop greenhouse in Montreal and is built on the roof of the former Sears Canada warehouse. Lufa's first rooftop greenhouse was built in early 2011, a 2880 sq metre (31,000 sq ft) hydroponic rooftop greenhouse atop a warehouse designated as their headquarters. They built two more large rooftop greenhouses in greater Montreal in 2013 (4,000 sq metre / 43,000 sq ft) and 2017 (5,850 sq metre / 63,000 sq ft), spending almost $ 10 million for the three structures. Also in 2017, an IGA supermarket in Saint-Laurent in Montreal unveiled a green roof of about 25,000 square feet of green space and products certified by Ecocert Canada. They state that they can provide over 30 different kinds of rooftop grown organic produce, along with honey produced and harvested from eight bee hives located on the roof. %DIFDELCMD < & %%% Illinois Urban farming initiatives across the State of Illinois, including Chicago, have been spearheaded by advocacy groups. In addition, HB3418 allows municipalities and counties across the state, including Chicago, to establish urban agriculture zones (UAZs), supported by financial incentives such as reduced water rates, utility fees, and property tax abatements. Furthermore, the USDA has implemented the Outreach and Technical Assistance for Socially Disadvantaged and Veteran Farmers and Ranchers Program (the 2501 Program) which was transferred from USDA\u2019s National Institute of Food and Agriculture. The primary purpose of the 2501 Program is to enhance the coordination of outreach, technical assistance, and education efforts, to reach socially disadvantaged and veteran farmers, ranchers, and forest landowners and to improve their participation in the full range of USDA programs. %DIFDELCMD < %DIFDELCMD < %%% Farm on Odgen by Chicago Botanic Garden. |alt= UPA assists to close the open-loop system in urban areas characterized by the importation of food from rural zones and the exportation of waste to regions outside the city or town. Wastewater and organic solid waste can be transformed into resources for growing agriculture products: the former can be used for irrigation, the latter as fertilizer. Vacant urban areas can be used for agriculture production. Other natural resources can be conserved. The use of wastewater for irrigation improves water management and increases the availability of fresh water for drinking and household consumption. UPA can help to preserve bioregional ecologies from being transformed into cropland. Urban agriculture saves energy (e.g. energy consumed in transporting food from rural to urban areas). Local production of food also allows savings in transportation costs, storage, and in product loss, what results in food cost reduction. UPA improves the quality of the urban environment through greening and thus, a reduction in pollution. Urban agriculture also makes the city a healthier place to live by improving the quality of the environment. UPA is a very effective tool to fight against hunger and malnutrition since it facilitates the access to food by an impoverished sector of the urban population. Poverty alleviation: It is known that a large part of the people involved in urban agriculture is the urban poor. In developing countries, the majority of urban agricultural production is for self-consumption, with surpluses being sold in the market. According to the FAO (Food and Agriculture Organization of the United Nations), urban poor consumers spend between 60 and 80 percent of their income on food, making them very vulnerable to higher food prices. UPA provides food and creates savings in household expenditure on consumables, thus increasing the amount of income allocated to other uses. UPA surpluses can be sold in local markets, generating more income for the urban poor. Trade-offs Space is at a premium in cities and is accordingly expensive and difficult to secure. The utilization of untreated wastewater for urban agricultural irrigation can facilitate the spread of waterborne diseases among the human population. Although studies have demonstrated improved air quality in urban areas related to the proliferation of urban gardens, it has also been shown that increasing urban pollution (related specifically to a sharp rise in the number of automobiles on the road), has led to an increase in insect pests, which consume plants produced by urban agriculture. It is believed that changes to the physical structure of the plants themselves, which have been correlated to increased levels of air pollution, increase plants' palatability to insect pests. Reduced yields within urban gardens decreases the amount of food available for human consumption. Studies indicate that the nutritional quality of wheat suffers when urban wheat plants are exposed to high nitrogen dioxide and sulfur dioxide concentrations. This problem is particularly acute in the developing world, where outdoor concentrations of sulfur dioxide are high and large percentages of the population rely upon urban agriculture as a primary source of food. These studies have implications for the nutritional quality of other staple crops that are grown in urban settings. Agricultural activities on land that is contaminated (with such metals as lead) pose potential risks to human health. These risks are associated both with working directly on contaminated land and with consuming food that was grown in contaminated soil. Municipal greening policy goals can pose conflicts. For example, policies promoting urban tree canopy are not sympathetic to vegetable gardening because of the deep shade cast by trees. However, some municipalities like Portland, Oregon, and Davenport, Iowa are encouraging the implementation of fruit-bearing trees (as street trees or as park orchards) to meet both greening and food production goals .", "edit_actions": [{"type": "R", "before": "Advantages", "after": "Impact", "start_char_pos": 0, "end_char_pos": 10}, {"type": "D", "before": "Socio-Economic and Cultural", "after": null, "start_char_pos": 55, "end_char_pos": 82}, {"type": "R", "before": "Provision of Livelihood UPAcan be seen as a means of improving the livelihood of people living in and around cities. Urban Agriculture", "after": "Economic Urban and Peri-urban agriculture (UPA)", "start_char_pos": 83, "end_char_pos": 217}, {"type": "R", "before": "UA", "after": "Urban agriculture for sustainable cities: using wastes and idle land and water bodies as resources. Jac Smit, Joe Nasr. Environment and Urbanization, Vol 4, Issue 2, pp. 141 - 152. First Published October 1, 1992. URL UPA", "start_char_pos": 475, "end_char_pos": 477}, {"type": "R", "before": ".", "after": ", which helps to relieve chronic and emergency food insecurity. Chronic food insecurity refers to less affordable food and growing urban poverty, while emergency food insecurity relates to breakdowns in the chain of food distribution. UPA plays an important role in making food more affordable and in providing emergency supplies of food.", "start_char_pos": 548, "end_char_pos": 549}, {"type": "R", "before": "Households and small communities take advantage of vacant land and contribute not only to their household food needs but also the needs of their resident city. This allows families to generate larger incomes selling to local grocers or to local outdoor markets while supplying their household with the proper nutrition of fresh and nutritional products", "after": "Sommers, L., and B. Butterfield, as cited in: Blair, D., C. Giesecke, and S. Sherman. (1991). \"A Dietary, Social and Economic Evaluation of the Philadelphia Urban Gardening Project,\" Journal of Nutrition Education", "start_char_pos": 750, "end_char_pos": 1102}, {"type": "R", "before": "Some community urban farms can be quite efficient and help women find work, who in some cases are marginalized from finding employment in the formal economy. Studies have shown that participation from women have a higher production rate, therefore producing the adequate amount for household consumption while supplying more for market sale.", "after": "Social The needs of urban landscaping can be combined with those of suburban livestock farmers. (Kstovo, Russia).", "start_char_pos": 1105, "end_char_pos": 1446}, {"type": "R", "before": "Strengthening of Community Relationships and Inclusion Urban Agriculture", "after": "Urban agriculture can have a large impact on the social and emotional well-being of individuals. UA", "start_char_pos": 1447, "end_char_pos": 1519}, {"type": "R", "before": "and", "after": "which directly impacts individuals social and emotional well-being. Urban gardens are often places that", "start_char_pos": 1577, "end_char_pos": 1580}, {"type": "R", "before": "and networks which contributes to the social and individual", "after": ", which also contributes to overall social and", "start_char_pos": 1620, "end_char_pos": 1679}, {"type": "A", "before": null, "after": "Many gardens facilitate the improvement of social networks within the communities that they are located.", "start_char_pos": 1702, "end_char_pos": 1702}, {"type": "R", "before": "Due to the food security that comes with UA, feelings of independence and empowerment often arise. The ability to produce and grow food for oneself has also been reported to improve levels of", "after": "When individuals come together around UA, physical activity levels are often increased. This can also raise serotonin levels akin to working out at a gym. There is the added element of walking/biking to the gardens, further increasing physical activity and the benefits of being outdoors.", "start_char_pos": 1993, "end_char_pos": 2184}, {"type": "A", "before": null, "after": "UPA can be seen as a means of improving the livelihood of people living in and around cities. Taking part in such practices is seen mostly as an informal activity, but in many cities where inadequate, unreliable, and irregular access to food is a recurring problem, urban agriculture has been a positive response to tackling food concerns. Due to the food security that comes with UA, feelings of independence and empowerment often arise. The ability to produce and grow food for oneself has also been reported to improve levels of", "start_char_pos": 2185, "end_char_pos": 2185}, {"type": "D", "before": ". Urban agriculture provides unique opportunities to bridge diverse communities together. In addition, it provides opportunities for health care providers to interact with their patients. Thus, making each community garden a hub that is reflective of the community.", "after": null, "start_char_pos": 2218, "end_char_pos": 2483}, {"type": "D", "before": "Beautification and Aesthetic Value", "after": null, "start_char_pos": 2484, "end_char_pos": 2518}, {"type": "D", "before": "1", "after": null, "start_char_pos": 2536, "end_char_pos": 2537}, {"type": "D", "before": "The social involvement helped raise the aesthetic appeal of the neighborhood, boosting the motivation or efficacy of the community as a whole. This increased efficacy was shown to increase neighborhood attachment. Therefore, the positive health outcomes of urban farming can be explained in part by interpersonal and social factors that boost health.", "after": null, "start_char_pos": 2538, "end_char_pos": 2888}, {"type": "D", "before": "Environmental", "after": null, "start_char_pos": 2918, "end_char_pos": 2931}, {"type": "D", "before": "Reduction in Greenhouse Gas Emissions and Carbon Footprint The energy-efficient nature of urban agriculture can reduce each city's carbon footprint by reducing the amount of transport that occurs to deliver goods to the consumer. Such areas can act as carbon sinks offsetting some of the carbon accumulation that is innate to urban areas, where pavement and buildings outnumber plants. Plants absorb atmospheric carbon dioxide (CO2) and release breathable oxygen (O2) through photosynthesis. The process of Carbon Sequestration can be further improved by combining other agriculture techniques to increase removal from the atmosphere and prevent the release of CO2 during harvest time. However, this process relies heavily on the types of plants selected and the methodology of farming. Specifically, choosing plants that do not lose their leaves and remain green all year can increase the farm's ability to sequester carbon.", "after": null, "start_char_pos": 2932, "end_char_pos": 3857}, {"type": "D", "before": "The reduction in ozone and other particulate matter can benefit human health. Reducing these particulates and ozone gases could reduce mortality rates in urban areas along with increasing the health of those living in cities. A 2011 article found that a rooftop containing 2000 m\u00b2 of uncut grass has the potential to remove up to 4000 kg of particulate matter and that one square meter of green roof is sufficient to offset the annual particulate matter emissions of a car.", "after": null, "start_char_pos": 3887, "end_char_pos": 4360}, {"type": "R", "before": "Energy Efficiency upEdible Oyster Mushrooms growing on used coffee grounds The current industrial agriculture system is accountable for high energy costs for the transportation of foodstuffs. According to a study by Rich Pirog, associate director of the Leopold Center for Sustainable Agriculture at Iowa State University, the average conventional produce item travels , using, if shipped by tractor-trailer, of fossil fuel per . The energy used to transport food is decreased when urban agriculture can provide cities with locally grown food . Pirog found that traditional, non-local, food distribution system used 4 to 17 times more fuel and emitted 5 to 17 times more than the local and regional transport.Pirog, Rich S.; Van Pelt, Timothy; Enshayan, Kamyar; and Cook, Ellen, \"Food, Fuel, and Freeways: An Iowa perspective on how far food travels, fuel usage, and greenhouse gas emissions\"", "after": ". Households and small communities take advantage of vacant land and contribute not only to their household food needs but also the needs of their resident city.Hales et al.", "start_char_pos": 4361, "end_char_pos": 5253}, {"type": "R", "before": "2001). Leopold Center Pubs and Papers. 3. URL Similarly, in a study by Marc Xuereb and Region of Waterloo Public Health, it was estimated that switching to locally-grown food could save transport-related emissions equivalent to nearly 50, 000 metric tons of , or the equivalent of taking 16,191 cars off the road.Xuereb, Marc. (2005", "after": "2016", "start_char_pos": 5256, "end_char_pos": 5588}, {"type": "R", "before": "Food Miles: Environmental Implications of Food Imports to Waterloo Region.", "after": "Urban Agriculture: Urban agriculture, positive impact", "start_char_pos": 5594, "end_char_pos": 5668}, {"type": "R", "before": "Public Health Planner Region of Waterloo Public Health. November. URL", "after": "My Green Hobby The CFSC states that:", "start_char_pos": 5671, "end_char_pos": 5740}, {"type": "D", "before": "upA windowfarm, incorporating discarded plastic bottles into pots for hydroponic agriculture in urban windows", "after": null, "start_char_pos": 5741, "end_char_pos": 5850}, {"type": "D", "before": "Reduction in Noise Pollution Large amounts of noise pollution not only lead to lower property values and high frustration, they can be damaging to human hearing and health. The study \u201cNoise exposure and public health,\u201d found that exposure to continual noise is a public health problem. Examples of the detriment of continual noise on humans to include: \u201chearing impairment, hypertension and ischemic heart disease, annoyance, sleep disturbance, and decreased school performance.\u201d Since most roofs or vacant lots consist of hard flat surfaces that reflect sound waves instead of absorbing them, adding plants that can absorb these waves has the potential to lead to a vast reduction in noise pollution.", "after": null, "start_char_pos": 5851, "end_char_pos": 6552}, {"type": "D", "before": "Nutritional Daily intake of a variety of fruits and vegetables is linked to a decreased risk of chronic diseases including diabetes, heart disease, and cancer. Urban agriculture is associated with increased consumption of fruits and vegetables which decreases risk for disease and can be a cost-effective way to provide citizens with quality, fresh produce in urban settings.", "after": null, "start_char_pos": 6582, "end_char_pos": 6957}, {"type": "D", "before": "Garden-based education can also yield nutritional benefits in children. Urban agriculture also provides quality nutrition for low-income households. Improved access to food through urban agriculture can also help alleviate psychosocial stresses in poor communities. Community members engaged in urban agriculture improve local knowledge about healthy ways to fulfill dietary needs . Urban agriculture can also better the mental health of community members. Buying and selling quality products to local producers and consumers allows community members to support one another, which may reduce stress. Thus, urban agriculture can help improve conditions in poor communities, where residents experience higher levels of stress due to a perceived lack of control over the quality of their lives.", "after": null, "start_char_pos": 6958, "end_char_pos": 7749}, {"type": "D", "before": "Urban farming has been shown to increase health outcomes. Gardeners consume twice as much fruit and vegetables than non-gardeners. Levels of physical activity are also positively associated with urban farming. These results are seen indirectly and can be supported by the social involvement in an individual's community as a member of the community farm.", "after": null, "start_char_pos": 7779, "end_char_pos": 8133}, {"type": "D", "before": "Food Security and Justice Access to nutritious food, both economically and geographically, is another perspective in the effort to locate food and livestock production in cities. The tremendous influx of the world population to urban areas has increased the need for fresh and safe food. The Community Food Security Coalition (CFSC ) defines food security as: All persons in a community having access to culturally acceptable, nutritionally adequate food through local, non-emergency sources at all times.", "after": null, "start_char_pos": 8134, "end_char_pos": 8639}, {"type": "D", "before": "Areas faced with food security issues have limited choices, often relying on highly processed fast food or convenience store foods that are high in calories and low in nutrients, which may lead to elevated rates of diet-related illnesses such as diabetes. These problems have brought about the concept of food justice which Alkon and Norgaard (2009; 289) explain that, \"places access to healthy, affordable, culturally appropriate food in the contexts of institutional racism, racial formation, and racialized geographies. Food justice serves as a theoretical and political bridge between scholarship and activism on sustainable agriculture, food insecurity, and environmental justice. \"", "after": null, "start_char_pos": 8669, "end_char_pos": 9356}, {"type": "D", "before": "Some systematic reviews have already explored urban agriculture contribution to food security and other determinants of health outcomes", "after": null, "start_char_pos": 9357, "end_char_pos": 9492}, {"type": "D", "before": "2", "after": null, "start_char_pos": 9510, "end_char_pos": 9511}, {"type": "D", "before": ". The Agriculture Network could be used to address food insecurity. One study of Cleveland shows that the city could actually meet up to 100\\% of its fresh produce needs", "after": null, "start_char_pos": 9512, "end_char_pos": 9681}, {"type": "D", "before": "3", "after": null, "start_char_pos": 9699, "end_char_pos": 9700}, {"type": "R", "before": ". This would prevent up to $115 million in annual economic leakage. Using the rooftop space of New York City would also be able to provide roughly twice the amount of space necessary to supply New York City with its green vegetable yields. Space could be even better optimized through the usage of hydroponic or indoor factory production of food. Growing gardens within cities would also cut down on the amount of food waste. UPA plays an important role in making food more affordable and in providing emergency supplies of food. Environmental justice Urban Agriculture is known to bring ample health and social benefits for residents. Participating in community gardens, urban farms, and other types of gardening projects in the city offer new opportunities for physical activity, create and strengthen social contacts and relationships, address stress and other mental health needs, improve environmental conditions of the city, and contribute to overall well-being. Those benefits are particularly evident for socially vulnerable groups, including lower-income residents, immigrants, residents with disabilities, children, or the elderly[4]. Adding, Urban Gardens addresses different drivers of injustices that exist in a city such as exclusive access to benefits of urban sustainability infrastructure, Uneven environmental health and pollution patterns, and Unfit institutional structures [5]. It helps as well to restore environment justices and equalities in cities and living spaces. Implementation A small urban farm in Amsterdam Rooftop urban farming at the Food Roof Farm in downtown St. Louis, MO Creating a community-based infrastructure for urban agriculture means establishing local systems to grow and process food and transfer it from farmer to consumer. To facilitate food production, cities have established community-based farming projects. Some projects have collectively tended community farms on common land, much like that of the eighteenth-century Boston Common. One such community farm is the Collingwood Children's Farm in Melbourne, Australia. Other community garden projects use the allotment garden model, in which gardeners care for individual plots in a larger gardening area, often sharing a tool shed and other amenities. Seattle's P-Patch Gardens use this model, as did the South Central Farm in Los Angeles and the Food Roof Farm in St. Louis. Independent urban gardeners also grow food in individual yards and on roofs. Garden sharing projects seek to pair producers with the land, typically, residential yard space. Roof gardens allow for urban dwellers to maintain green spaces in the city without having to set aside a tract of undeveloped land. Rooftop farms allow otherwise unused industrial roofspace to be used productively, creating work and profit. Projects around the world seek to enable cities to become 'continuous productive landscapes' by cultivating vacant urban land and temporary or permanent kitchen gardens.Andr\u00e9 Viljoen, Katrin Bohn and Joe Howe, 2005, Continuous Productive Urban Landscapes: Designing Urban Agriculture for Sustainable Cities, Oxford: Architectural Press Urban agriculture project in the La Romita section of Colonia Roma, Mexico City Tomato plants growing in a pot farming alongside a small house in New Jersey in fifteen garbage cans filled with soil, grew over 700 tomatoes during the summer of 2013. Food processing on a community level has been accommodated by centralizing resources in community tool sheds and processing facilities for farmers to share. The Garden Resource Program Collaborative based in Detroit has cluster tool banks. Different areas of the city have tool banks where resources like tools, compost, mulch, tomato stakes, seeds, and education can be shared and distributed with the gardeners in that cluster. Detroit's Garden Resource Program Collaborative also strengthens their gardening community by providing access to their member's transplants; education on gardening, policy, and food issues; and by building connectivity between gardeners through workgroups, potlucks, tours, field trips, and cluster workdays. In Brazil, \"Cities Without Hunger\" has generated a public policy for the reconstruction of abandoned areas with food production and has improved the green areas of the community. Farmers' markets, such as the farmers' market in Los Angeles, provide a common land where farmers can sell their product to consumers. Large cities tend to open their farmer's markets on the weekends and one day in the middle of the week. For example, the farmers' market of Boulevard Richard-Lenoir in Paris, France, is open on Sundays and Thursdays. However, to create a consumer dependency on urban agriculture and to introduce local food production as a sustainable career for farmers, markets would have to be open regularly. For example, the Los Angeles Farmers' Market is open seven days a week and has linked several local grocers together to provide different food products. The market's central location in downtown Los Angeles provides the perfect interaction for a diverse group of sellers to access their consumers. Argentina The city of Rosario (population: 1.3 million) has incorporated agriculture fully into its land-use planning and urban development strategy. Its Land Use Plan 2007-2017 makes specific provision for the agricultural use of public land. Under its Metropolitan Strategic Plan 2008-2018, Rosario is building a \u201cgreen circuit\u201d, passing through and around the city, consisting of family and community gardens, large-scale, commercial vegetable gardens and orchards, multifunctional garden parks, and \u201cproductive barrios\u201d, where agriculture is integrated into programs for the construction of public housing and the upgrading of slums. In 2014, the green circuit consisted of more than 30 ha of land used to grow vegetables, fruit, and medicinal and aromatic plants. The city has five garden parks \u2013 large, landscaped green areas covering a total of 72 ha of land, which is used for agriculture and for cultural, sports and educational activities.Food and Agriculture Organization (2014) Growing greener cities in Latin America and the Caribbean. Australia In Queensland many people have started a trend of urban farming and utilizing aquaponics and self-watering containers. Canada British Columbia A Canadian urban farmer in British Columbia has published details on a crop value rating (CVR) system that urban farmers can use to determine which crops to grow, based on each crop's contribution to supporting the farm economically. This entails forgoing some crops in favor of others, but he points out that urban farmers can develop business networking with rural farmers to bring some of those other crops to the urban point of sale. For example, the urban farmer may not be able to economically justify growing sweet corn (based on long days to maturity and low yield density per linear foot of row), but a networking arrangement is mutually beneficial, as it lets a rural sweet corn grower gain an additional point of sale at retail price while also letting the urban farmer fill the gap in his product line offering. Several community projects in Victoria, British Columbia were born to promote urban agricultural practices such as the Sharing Backyards program. This program exists to help people living in urban areas get connected with others who have extra space in their yards for the purpose of urban farming. Organizations also exist to educate people living in the urban parts of Vancouver on farming and growing food in an urban setting by running public demonstration gardens. Covering the roof of the west building of the Vancouver Convention Centre is the largest green roof in Canada and one of the 10 largest green roofs in the world. With around six acres of living space, it is home to more than 400,000 indigenous plants and grasses that provide insulation. It is also home to four Western honey bee beehives which pollinate the plants on the roof and provide honey. The living includes other sustainable practices such as recycling and reusing water. The city of Kamloops, British Columbia actively promotes urban agricultural practices within their community. They stress the importance of food security and its effect on the economy as well as the ecology. They created the Food and Urban Agriculture Plan (FUAP), initiated in 2014, which lays out goals and strategies to implement a sustainable food system. The Areas which they cover include: Food Production and Land Availability, Food Processing and Preparing, Food Distribution/Retail/Access, Cooking/Eating and Celebrating Food, Food Waste and Resource Management, as well as Education/Governance and Capacity Building. The FUAP greatly emphasizes on Urban Agriculture. Ontario Ontario is the second biggest province and is one of the most urbanized in Canada. The provincial government of Ontario has a website dedicated to providing information to those who are interested in establishing an urban farm or for those who just want to learn more about urban agriculture in Ontario. The City of Ottawa is home to the largest urban farm in the nation, the Central Experimental Farm (CEF). Centrally located and surrounded by the city, the 4 square kilometres (1.5 sq mi) farm is an agricultural facility, working farm, and research center of Agriculture and Agri-Food Canada. The City of Ottawa is also home to numerous urban farms within the 203.5-square-kilometre (78.6 sq mi) greenbelt. Along with many other cities in Ontario, the City of Toronto allows eligible residents in 4 wards across the city to keep a maximum of 4 hens (no roosters) for the purpose of enjoyment or personal consumption of only the eggs. There are other requirements included with rearing these hens under this program such as zoning and guidelines for building the enclosure, waste and disposal. The wards eligible for this program from the UrbanHensTo site include Ward 13 (Parkdale-High Park), Ward 21 (St. Paul's), Ward 5 (Etobicoke-Lakeshore), and Ward 32 (Beaches-East York). Workshops are also available to those interested in rearing urban hens. However, failure to abide by these rules and regulations can result in fines. Quebec Lufa Farms greenhouses are constructed on the rooftops of Greater Montreal. In Montreal, about 100 community gardens provide plots where citizens can grow fruits, vegetables, herbs, and flowers. The largest community garden has about 255 allotment plots, while the smallest site has about 25 plots. Out of 2 million people living in the urbanized parts of Montreal, about 10,000 residents share the garden plots. The program has been in place since 1975 and is managed by the boroughs. Some of the boroughs have a gardening instructor who visits the gardens regularly to give gardeners tips. Soil, a water supply, a space for tools, sand, fencing, and paint are provided by the city, managed by the Department of Sports, Recreation and Social Development. Canada has a number of companies working on urban farm technology, including in Montreal. The most significant is Lufa Farms, a private company that opened what is reported to be the world's largest rooftop greenhouse at 163,000 sq ft in the Montreal borough of Saint-Laurent. This is Lufa's fourth rooftop greenhouse in Montreal and is built on the roof of the former Sears Canada warehouse. Lufa's first rooftop greenhouse was built in early 2011, a 2880 sq metre (31,000 sq ft) hydroponic rooftop greenhouse atop a warehouse designated as their headquarters. They built two more large rooftop greenhouses in greater Montreal in 2013 (4,000 sq metre / 43,000 sq ft) and 2017 (5,850 sq metre / 63,000 sq ft), spending almost $", "after": "Community and residential gardening, as well as small-scale farming, save household food dollars. They promote nutrition and free cash for non-garden foods and other items. As an example, you can raise your own chickens on an urban farm and have fresh eggs for only $0.44 per dozen.What's the Real Cost of Raising Backyard Chickens? (2015, March 29). Retrieved April 2, 2015, from URL This allows families to generate larger incomes selling to local grocers or to local outdoor markets while supplying their household with the proper nutrition of fresh and nutritional products. A vegetable garden in the square in front of the train station in Ezhou, China Some community urban farms can be quite efficient and help women find work, who in some cases are marginalized from finding employment in the formal economy.FAO. (1999). \"Issues in Urban Agriculture,\" FAO Spotlight Magazine, January. Studies have shown that participation from women have a higher production rate, therefore producing the adequate amount for household consumption while supplying more for market sale. As most UA activities are conducted on vacant municipal land, there have been raising concerns about the allocation of land and property rights. The IDRC and the FAO have published the Guidelines for Municipal Policymaking on Urban Agriculture, and are working with municipal governments to create successful policy measures that can be incorporated in urban planning.IDRC/ UN-HABITAT\".Guidelines for Municipal Policymaking on Urban Agriculture\" Urban Agriculture: Land Management and Physical Planning (2003) PDF 1.3 Over a third of U.S. households, roughly 42 million, participate in food gardening. There has also been an increase of 63\\% participation in farming by millennials from 2008-2013. US households participating in community gardening has also tripled from 1 to 3 million in that time frame. Urban agriculture provides unique opportunities to bridge diverse communities together. In addition, it provides opportunities for health care providers to interact with their patients. Thus, making each community garden a hub that is reflective of the community.Alaimo, K., Beavers, A.W., Crawford, C. et al. Curr Envir Health Rpt (2016) 3: 302. URL Energy efficiency upEdible Oyster Mushrooms growing on used coffee grounds The current industrial agriculture system is accountable for high energy costs for the transportation of foodstuffs. According to a study by Rich Pirog, associate director of the Leopold Center for Sustainable Agriculture at Iowa State University, the average conventional produce item travels , using, if shipped by tractor-trailer, of fossil fuel per . The energy used to transport food is decreased when urban agriculture can provide cities with locally grown food. Pirog found that traditional, non-local, food distribution system used 4 to 17 times more fuel and emitted 5 to 17 times more than the local and regional transport.Pirog, Rich S.; Van Pelt, Timothy; Enshayan, Kamyar; and Cook, Ellen, \"Food, Fuel, and Freeways: An Iowa perspective on how far food travels, fuel usage, and greenhouse gas emissions\" (2001). Leopold Center Pubs and Papers. 3. URL Similarly, in a study by Marc Xuereb and Region of Waterloo Public Health, it was estimated that switching to locally-grown food could save transport-related emissions equivalent to nearly 50,000 metric tons of , or the equivalent of taking 16,191 cars off the road.Xuereb, Marc. (2005). \"Food Miles: Environmental Implications of Food Imports to Waterloo Region.\" Public Health Planner Region of Waterloo Public Health. November. URL upA windowfarm, incorporating discarded plastic bottles into pots for hydroponic agriculture in urban windows Carbon footprint As mentioned above, the energy-efficient nature of urban agriculture can reduce each city's carbon footprint by reducing the amount of transport that occurs to deliver goods to the consumer.Delta Institute, \"Urban Agriculture.\" Web. 25 March 2013. Such areas can act as carbon sinks offsetting some of the carbon accumulation that is innate to urban areas, where pavement and buildings outnumber plants. Plants absorb atmospheric carbon dioxide () and release breathable oxygen (O2) through photosynthesis. The process of Carbon Sequestration can be further improved by combining other agriculture techniques to increase removal from the atmosphere and prevent the release of during harvest time. However, this process relies heavily on the types of plants selected and the methodology of farming. Specifically, choosing plants that do not lose their leaves and remain green all year can increase the farm's ability to sequester carbon. Reduction in ozone and particulate matter The reduction in ozone and other particulate matter can benefit human health. Reducing these particulates and ozone gases could reduce mortality rates in urban areas along with increase the health of those living in cities. A 2011 article found that a rooftop containing 2000 m\u00b2 of uncut grass has the potential to remove up to 4000 kg of particulate matter and that one square meter of green roof is sufficient to offset the annual particulate matter emissions of a car.Environmental Affairs Department, City of Los Angeles. 2006. \"Green Roofs - Cooling Los Angeles: A Resource Guide\". URL Soil decontamination Vacant urban lots are often victims to illegal dumping of hazardous chemicals and other wastes. They are also liable to accumulate standing water and \u201cgrey water\u201d, which can be dangerous to public health, especially left stagnant for long periods. The implementation of urban agriculture in these vacant lots can be a cost-effective method for removing these chemicals. In the process known as Phytoremediation, plants and the associated microorganisms are selected for their chemical ability to degrade, absorb, convert to an inert form, and remove toxins from the soil.Black, H. \"Absorbing Possibilities: Phytoremediation.\" Environ Health Perspectives 103.12 (1995): 1106-108. Several chemicals can be targeted for removal, including heavy metals (e.g. Mercury and lead), inorganic compounds (e.g. Arsenic and Uranium), and organic compounds (e.g. petroleum and chlorinated compounds like PBC's).Comis, Don. (2000). \"Phytoremediation: Using Plants To Clean Up Soils.\" Agricultural Research: n. pag. Phytoremediation: Using Plants To Clean Up Soils. USDA-ARS, 13 August 2004. Web. 25 March 2013. Phytoremeditation is both an environmentally-friendly, cost-effective and energy-efficient measure to reduce pollution. Phytoremediation only costs about $5\u2013$40 per ton of soil being decontaminated.Cluis, C. (2004). \"Junk-greedy Greens: phytoremediation as a new option for soil decontamination,\" BioTech J. 2: 61-67 Implementation of this process also reduces the amount of soil that must be disposed of in a hazardous waste landfill. Urban agriculture as a method to mediate chemical pollution can be effective in preventing the spread of these chemicals into the surrounding environment. Other methods of remediation often disturb the soil and force the chemicals contained within it into the air or water. Plants can be used as a method to remove chemicals and also to hold the soil and prevent erosion of contaminated soil decreasing the spread of pollutants and the hazard presented by these lots. One way of identifying soil contamination is through using already well-established plants as bioindicators of soil health. Using well-studied plants is important because there has already been substantial bodies of work to test them in various conditions, so responses can be verified with certainty. Such plants are also valuable because they are genetically identical as crops as opposed to natural variants of the same species. Typically urban soil has had the topsoil stripped away and has led to soil with low aeration, porosity, and drainage. Typical measures of soil health are microbial biomass and activity, enzymes, soil organic matter (SOM), total nitrogen, available nutrients, porosity, aggregate stability, and compaction. A new measurement is active carbon (AC), which is the most usable portion of the total organic carbon (TOC) in the soil. This contributes greatly to the functionality of the soil food web. Using common crops, which are generally well-studied, as bioindicators can be used to effectively test the quality of an urban farming plot before beginning planting.Alaimo K, Beavers AW, Crawford C, et al. (2016) Amplifying Health Through Community Gardens: A Framework for Advancing Multicomponent, Behaviorally Based Neighborhood Interventions. Current Environmental Health Reports 3:302\u2013312. doi: 10.1007/s40572-016-0105-0 Noise pollution Large amounts of noise pollution not only lead to lower property values and high frustration, they can be damaging to human hearing and health. The study \u201cNoise exposure and public health,\u201d found that exposure to continual noise is a public health problem. Examples of the detriment of continual noise on humans to include: \u201chearing impairment, hypertension and ischemic heart disease, annoyance, sleep disturbance, and decreased school performance.\u201d Since most roofs or vacant lots consist of hard flat surfaces that reflect sound waves instead of absorbing them, adding plants that can absorb these waves has the potential to lead to a vast reduction in noise pollution. Nutrition and quality of food Daily intake of a variety of fruits and vegetables is linked to a decreased risk of chronic diseases including diabetes, heart disease, and cancer. Urban agriculture is associated with increased consumption of fruits and vegetables Alaimo, K., Packnett, E., Miles, R., Kruger, D. (2008). \"Fruit and Vegetable Intake among Urban Community Gardeners\". Journal of Nutrition Education and Behavior. (1499-4046),40 (2), p. 94. which decreases risk for disease and can be a cost-effective way to provide citizens with quality, fresh produce in urban settings. Produce from urban gardens can be perceived to be more flavorful and desirable than store bought produce which may also lead to a wider acceptance and higher intake. A Flint, Michigan study found that those participating in community gardens consumed fruits and vegetables 1.4 times more per day and were 3.5 times more likely to consume fruits or vegetables at least 5 times daily (p. 1). Garden-based education can also yield nutritional benefits in children. An Idaho study reported a positive association between school gardens and increased intake of fruit, vegetables, vitamin A, vitamin C and fiber among sixth graders. Harvesting fruits and vegetables initiates the enzymatic process of nutrient degradation which is especially detrimental to water soluble vitamins such as ascorbic acid and thiamin. The process of blanching produce in order to freeze or can reduce nutrient content slightly, but not nearly as much as the amount of time spent in storage. Harvesting produce from one's own community garden cuts back on storage times significantly. Urban agriculture also provides quality nutrition for low-income households. Studies show that every $1 invested in a community garden yields $6 worth of vegetables if labor is not considered a factor in investment. Many urban gardens reduce the strain on food banks and other emergency food providers by donating shares of their harvest and providing fresh produce in areas that otherwise might be food deserts. The supplemental nutrition program Women, Infants and Children (WIC) as well as the Supplemental Nutrition Assistance Program (SNAP) have partnered with several urban gardens nationwide to improve the accessibility to produce in exchange for a few hours of volunteer gardening work. Urban farming has been shown to increase health outcomes. Gardeners consume twice as much fruit and vegetables than non-gardeners. Levels of physical activity are also positively associated with urban farming. These results are seen indirectly and can be supported by the social involvement in an individual's community as a member of the community farm. This social involvement helped raise the aesthetic appeal of the neighborhood, boosting the motivation or efficacy of the community as a whole. This increased efficacy was shown to increase neighborhood attachment. Therefore, the positive health outcomes of urban farming can be explained in part by interpersonal and social factors that boost health. Focusing on improving the aesthetics and community relationships and not only on the plant yield, is the best way to maximize the positive effect of urban farms on a neighborhood.Litt, J.s., et al. \u201cExploring Ecological, Emotional, and Social Levers of Self-Rated Health for Urban Gardeners and Non-Gardeners: A Path Analysis.\u201d Social Science & Medicine, vol. 144, 2015, pp. 1\u20138., doi:10.1016/j.socscimed.2015.09.004. Economy of scale Using high-density urban farming with vertical farms or stacked greenhouses, many environmental benefits can be achieved on a citywide scale that would be impossible otherwise. These systems do not only provide food, but also produce potable water from waste water, and can recycle organic waste back to energy and nutrients. At the same time, they can reduce food-related transportation to a minimum while providing fresh food for large communities in almost any climate. Health inequalities and food justice A 2009 report by the USDA, determined that \"Evidence is both abundant and robust enough for us to conclude that Americans living in low-income and minority areas tend to have poor access to healthy food\", and that the \"structural inequalities\" in these neighborhoods \"contribute to inequalities in diet and diet-related outcomes\". These diet-related outcomes, including obesity and diabetes, have become epidemic in low-income urban environments in the United States.Designed for Disease: The Link Between Local Food Environments and Obesity and Diabetes. California Center for Public Health Advocacy, PolicyLink, and the UCLA Center for Health Policy Research. April 2008. Although the definition and methods for determining \"food deserts\" have varied, studies indicate that, at least in the United States, there are racial disparities in the food environment. Thus using the definition of environment as the place where people live, work, play and pray, food disparities become an issue of environmental justice. This is especially true in American inner-cities where a history of racist practices have contributed to the development of food deserts in the low-income, minority areas of the urban core. The issue of inequality is so integral to the issues of food access and health that the Growing Food & Justice for All Initiative was founded with the mission of \u201cdismantling racism\u201d as an integral part of creating food security. Not only can urban agriculture provide healthy, fresh food options, but also can contribute to a sense of community, aesthetic improvement, crime reduction, minority empowerment and autonomy, and even preserve culture through the use of farming methods and heirloom seeds preserved from areas of origin. Environmental justice Urban agriculture may advance environmental justice and food justice for communities living in food deserts. First, urban agriculture may reduce racial and class disparities in access to healthy food. When urban agriculture leads to locally grown fresh produce sold at affordable prices in food deserts, access to healthy food is not just available for those who live in wealthy areas, thereby leading to greater equity in rich and poor neighborhoods. Improved access to food through urban agriculture can also help alleviate psychosocial stresses in poor communities. Community members engaged in urban agriculture improve local knowledge about healthy ways to fulfill dietary needs. Urban agriculture can also better the mental health of community members. Buying and selling quality products to local producers and consumers allows community members to support one another, which may reduce stress. Thus, urban agriculture can help improve conditions in poor communities, where residents experience higher levels of stress due to a perceived lack of control over the quality of their lives.Sapolsky, Robert, \"Sick of Poverty,\" Scientific American, Dec. 2005, pp: 93-99. Urban agriculture may improve the livability and built environment in communities that lack supermarkets and other infrastructure due to the presence of high unemployment caused by deindustrialization. Urban farmers who follow sustainable agricultural methods can not only help to build local food system infrastructure, but can also contribute to improving local air, and water and soil quality. When agricultural products are produced locally within the community, they do not need to be transported, which reduces emission rates and other pollutants that contribute to high rates of asthma in lower socioeconomic areas. Sustainable urban agriculture can also promote worker protection and consumer rights. For example, communities in New York City, Illinois, and Richmond, Virginia have demonstrated improvements to their local environments through urban agricultural practices.Alternatives for Community & Environment. Environmental Justice and the Green Economy. A Vision Statement and Case Studies for Just and Sustainable Solutions. Rep. Roxbury, MA: Alternatives for Community & Environment, 2010. Print. However, urban agriculture can also present urban growers with health risks if the soil used for urban farming is contaminated. Lead contamination is particularly common, with hazardous levels of lead found in soil in many United States cities.Murphy, Kate. \"Lead Is a Concern for Urban Gardens.\" The New York Times. The New York Times, 13 May 2009. Web. 9 April 2014. High lead levels in soil originate from sources including flaking lead paint which was widely used before being banned in the 1970s, vehicle exhaust, and atmospheric deposition. Without proper education on the risks of urban farming and safe practices, urban consumers of urban agricultural produce may face additional health-related issues.McClintock, Nathan. (2008). From Industrial Garden to Food Desert: Unearthing the Root Structure of urban agriculture in Oakland, California. UC Berkeley: Institute for the Study of Societal Issues. Implementation A small urban farm in Amsterdam Rooftop urban farming at the Food Roof Farm in downtown St. Louis, MO Creating a community-based infrastructure for urban agriculture means establishing local systems to grow and process food and transfer it from farmer to consumer. To facilitate food production, cities have established community-based farming projects. Some projects have collectively tended community farms on common land, much like that of the eighteenth-century Boston Common. One such community farm is the Collingwood Children's Farm in Melbourne, Australia. Other community garden projects use the allotment garden model, in which gardeners care for individual plots in a larger gardening area, often sharing a tool shed and other amenities. Seattle's P-Patch Gardens use this model, as did the South Central Farm in Los Angeles and the Food Roof Farm in St. Louis. Independent urban gardeners also grow food in individual yards and on roofs. Garden sharing projects seek to pair producers with the land, typically, residential yard space. Roof gardens allow for urban dwellers to maintain green spaces in the city without having to set aside a tract of undeveloped land. Rooftop farms allow otherwise unused industrial roofspace to be used productively, creating work and profit. Projects around the world seek to enable cities to become 'continuous productive landscapes' by cultivating vacant urban land and temporary or permanent kitchen gardens.Andr\u00e9 Viljoen, Katrin Bohn and Joe Howe, 2005, Continuous Productive Urban Landscapes: Designing Urban Agriculture for Sustainable Cities, Oxford: Architectural Press Urban agriculture project in the La Romita section of Colonia Roma, Mexico City Tomato plants growing in a pot farming alongside a small house in New Jersey in fifteen garbage cans filled with soil, grew over 700 tomatoes during the summer of 2013. Food processing on a community level has been accommodated by centralizing resources in community tool sheds and processing facilities for farmers to share. The Garden Resource Program Collaborative based in Detroit has cluster tool banks. Different areas of the city have tool banks where resources like tools, compost, mulch, tomato stakes, seeds, and education can be shared and distributed with the gardeners in that cluster. Detroit's Garden Resource Program Collaborative also strengthens their gardening community by providing access to their member's transplants; education on gardening, policy, and food issues; and by building connectivity between gardeners through workgroups, potlucks, tours, field trips, and cluster workdays. In Brazil, \"Cities Without Hunger\" has generated a public policy for the reconstruction of abandoned areas with food production and has improved the green areas of the community. Farmers' markets, such as the farmers' market in Los Angeles, provide a common land where farmers can sell their product to consumers. Large cities tend to open their farmer's markets on the weekends and one day in the middle of the week. For example, the farmers' market of Boulevard Richard-Lenoir in Paris, France, is open on Sundays and Thursdays. However, to create a consumer dependency on urban agriculture and to introduce local food production as a sustainable career for farmers, markets would have to be open regularly. For example, the Los Angeles Farmers' Market is open seven days a week and has linked several local grocers together to provide different food products. The market's central location in downtown Los Angeles provides the perfect interaction for a diverse group of sellers to access their consumers. Argentina The city of Rosario (population: 1.3 million) has incorporated agriculture fully into its land-use planning and urban development strategy. Its Land Use Plan 2007-2017 makes specific provision for the agricultural use of public land. Under its Metropolitan Strategic Plan 2008-2018, Rosario is building a \u201cgreen circuit\u201d, passing through and around the city, consisting of family and community gardens, large-scale, commercial vegetable gardens and orchards, multifunctional garden parks, and \u201cproductive barrios\u201d, where agriculture is integrated into programs for the construction of public housing and the upgrading of slums. In 2014, the green circuit consisted of more than 30 ha of land used to grow vegetables, fruit, and medicinal and aromatic plants. The city has five garden parks \u2013 large, landscaped green areas covering a total of 72 ha of land, which is used for agriculture and for cultural, sports and educational activities.Food and Agriculture Organization (2014) Growing greener cities in Latin America and the Caribbean. Australia In Queensland many people have started a trend of urban farming and utilizing aquaponics and self-watering containers. Canada British Columbia A Canadian urban farmer in British Columbia has published details on a crop value rating (CVR) system that urban farmers can use to determine which crops to grow, based on each crop's contribution to supporting the farm economically. This entails forgoing some crops in favor of others, but he points out that urban farmers can develop business networking with rural farmers to bring some of those other crops to the urban point of sale. For example, the urban farmer may not be able to economically justify growing sweet corn (based on long days to maturity and low yield density per linear foot of row), but a networking arrangement is mutually beneficial, as it lets a rural sweet corn grower gain an additional point of sale at retail price while also letting the urban farmer fill the gap in his product line offering. Several community projects in Victoria, British Columbia were born to promote urban agricultural practices such as the Sharing Backyards program. This program exists to help people living in urban areas get connected with others who have extra space in their yards for the purpose of urban farming. Organizations also exist to educate people living in the urban parts of Vancouver on farming and growing food in an urban setting by running public demonstration gardens. Covering the roof of the west building of the Vancouver Convention Centre is the largest green roof in Canada and one of the 10 largest green roofs in the world. With around six acres of living space, it is home to more than 400,000 indigenous plants and grasses that provide insulation. It is also home to four Western honey bee beehives which pollinate the plants on the roof and provide honey. The living includes other sustainable practices such as recycling and reusing water. The city of Kamloops, British Columbia actively promotes urban agricultural practices within their community. They stress the importance of food security and its effect on the economy as well as the ecology. They created the Food and Urban Agriculture Plan (FUAP), initiated in 2014, which lays out goals and strategies to implement a sustainable food system. The Areas which they cover include: Food Production and Land Availability, Food Processing and Preparing, Food Distribution/Retail/Access, Cooking/Eating and Celebrating Food, Food Waste and Resource Management, as well as Education/Governance and Capacity Building. The FUAP greatly emphasizes on Urban Agriculture. Ontario Ontario is the second biggest province and is one of the most urbanized in Canada. The provincial government of Ontario has a website dedicated to providing information to those who are interested in establishing an urban farm or for those who just want to learn more about urban agriculture in Ontario. The City of Ottawa is home to the largest urban farm in the nation, the Central Experimental Farm (CEF). Centrally located and surrounded by the city, the 4 square kilometres (1.5 sq mi) farm is an agricultural facility, working farm, and research center of Agriculture and Agri-Food Canada. The City of Ottawa is also home to numerous urban farms within the 203.5-square-kilometre (78.6 sq mi) greenbelt. Along with many other cities in Ontario, the City of Toronto allows eligible residents in 4 wards across the city to keep a maximum of 4 hens (no roosters) for the purpose of enjoyment or personal consumption of only the eggs. There are other requirements included with rearing these hens under this program such as zoning and guidelines for building the enclosure, waste and disposal. The wards eligible for this program from the UrbanHensTo site include Ward 13 (Parkdale-High Park), Ward 21 (St. Paul's), Ward 5 (Etobicoke-Lakeshore), and Ward 32 (Beaches-East York). Workshops are also available to those interested in rearing urban hens. However, failure to abide by these rules and regulations can result in fines. Quebec Lufa Farms greenhouses are constructed on the rooftops of Greater Montreal. In Montreal, about 100 community gardens provide plots where citizens can grow fruits, vegetables, herbs, and flowers. The largest community garden has about 255 allotment plots, while the smallest site has about 25 plots. Out of 2 million people living in the urbanized parts of Montreal, about 10,000 residents share the garden plots. The program has been in place since 1975 and is managed by the boroughs. Some of the boroughs have a gardening instructor who visits the gardens regularly to give gardeners tips. Soil, a water supply, a space for tools, sand, fencing, and paint are provided by the city, managed by the Department of Sports, Recreation and Social Development. Canada has a number of companies working on urban farm technology, including in Montreal. The most significant is Lufa Farms, a private company that opened what is reported to be the world's largest rooftop greenhouse at 163,000 sq ft in the Montreal borough of Saint-Laurent. This is Lufa's fourth rooftop greenhouse in Montreal and is built on the roof of the former Sears Canada warehouse. Lufa's first rooftop greenhouse was built in early 2011, a 2880 sq metre (31,000 sq ft) hydroponic rooftop greenhouse atop a warehouse designated as their headquarters. They built two more large rooftop greenhouses in greater Montreal in 2013 (4,000 sq metre / 43,000 sq ft) and 2017 (5,850 sq metre / 63,000 sq ft), spending almost $", "start_char_pos": 9701, "end_char_pos": 21413}, {"type": "D", "before": "Denver Denver, Colorado is home to many different forms of Urban Agriculture projects: indoor and outdoor, for-profit and nonprofit, community gardens and farms, and private and public land.McIvor, D.W., Hale, J. Urban agriculture and the prospects for deep democracy. Agric Hum Values 32, 727\u2013741 (2015). URL", "after": null, "start_char_pos": 21793, "end_char_pos": 22102}, {"type": "D", "before": "Denver has been a case study for urban agriculture as a force of green gentrification; historically, Denver urban farmers gained access to land after the Great Recession, but began to contribute to displacement of their neighbors and themselves as green gentrification spread throughout an economically-expanding city with new municipal sustainability goals.Joshua Sbicca, \"Urban Agriculture, Revalorization, and GreenGentrification in Denver, Colorado\" In The Politics of Land. Published online: 25 Feb2019; 149-170.Permanent link to this URL One reason for such a rise in the food movement is the city's unique lack of both open-space funding and a working land trust, which caused city farms to drop from 307 in 1925 to nine by 2016. In 2009, then-mayor John Hickenlooper declared May 14th to be Grow Local Colorado day. Then, in 2010, Hickenlooper formed the Denver Sustainable Food Policy Council. In 2011, Mayor Michael Hancock continued along this trend of green development, creating the \u201cPeople\u2019s Plan\u201d to stimulate the economy by improving land-access for farmers and local food availability.Alkon, A. H., Kato, Y.,", "after": null, "start_char_pos": 22103, "end_char_pos": 23228}, {"type": "D", "before": "Sbicca, J. (2020). In A recipe for gentrification food, power, and resistance in the city (pp. 93\u201395). essay, New York University Press. Included in the city's 2020 Sustainability Goals is the plan to produce 20\\% of Denver's food in Colorado.", "after": null, "start_char_pos": 23247, "end_char_pos": 23490}, {"type": "D", "before": "Taysuteke Community Urban Garden in Freetown- Sierra Leone Taysuteke community garden in Freetown. The association has been practicing urban farming on the land for generations. The association was officially established in 2000 and later registered as a women\u2019s cooperative. Like many other urban and peri-urban agriculture in Freetown , its activity expanded as a response to the food shortages caused by blockade during the civil war in Freetown. Currently, it is formed of 60 women living in the vicinity of the garden. Taysuteke garden provided livelihoods to the group and generated income that is used for households\u2019 provisions and kids\u2019 education. Taysutekeh urban garden spreads over an area of 1 hectare. It is divided into 15 plots. The plots are cultivated collectively by the women, and the yields are shared equitably. Each woman contributes a monthly fee equivalent to 1$ that goes to the collective bank account of the association. The amount is used seasonally by the association to conduct land preparation work and install irrigation systems that mainly require paid labor. Most crops are planted during the dry season including cassava leaves, potato leaves, sorrel, corchorus leaves, amaranthus, okra, tomatoes, cabbage, etc.", "after": null, "start_char_pos": 24416, "end_char_pos": 25663}, {"type": "D", "before": "Taysuteke land was originally a mangrove swamp. It was reclaimed for farming for almost three generations. However, ownership of the land is a burden and a challenge that the association faces. Fear of eviction is a constant concern for the association.", "after": null, "start_char_pos": 25664, "end_char_pos": 25917}, {"type": "D", "before": "Urban agriculture for sustainable cities: using wastes and idle land and water bodies as resources. Jac Smit, Joe Nasr. Environment and Urbanization, Vol 4, Issue 2, pp. 141 - 152. First Published October 1, 1992. URL", "after": null, "start_char_pos": 27949, "end_char_pos": 28166}, {"type": "D", "before": "The lead would affect the roots of plants grown in these soils much more than above ground produce. Most of the danger of lead in urban gardens would come from ingesting the soil itself.", "after": null, "start_char_pos": 29793, "end_char_pos": 29979}, {"type": "D", "before": ". Green gentrification or environmental gentrification occurs when environmental policies or planning in urban spaces leads to the displacement and exclusion of certain residents. Specifically, the growth imperative of capitalist urbanization pushes governments to enact sustainable development initiatives in underprivileged areas.Gould, K. A.,", "after": null, "start_char_pos": 30382, "end_char_pos": 30727}, {"type": "D", "before": "Lewis, T. L. (2017). Green gentrification: Urban sustainability and the struggle for environmental justice. New York, NY: Routledge. In addition to \"green\" labels being marketable for developers and businesses, beautification can enhance gentrification, and urban agriculture can potentially contribute to this. However, farming and gardening in urban spaces isn\u2019t always a signal of gentrification. The relationship is complex, as urban green spaces can also provide food to the underserved, and act as community-run spaces of resistance", "after": null, "start_char_pos": 30728, "end_char_pos": 31266}], "sents_char_pos": [0, 199, 336, 474, 749, 909, 1262, 1446, 1701, 1807, 1947, 1992, 2091, 2219, 2307, 2405, 2483, 2680, 2751, 2888, 3161, 3317, 3423, 3617, 3718, 3857, 3964, 4112, 4360, 4552, 4790, 4905, 5070, 5085, 5104, 5122, 5262, 5294, 5569, 5591, 5668, 5726, 6023, 6136, 6330, 6552, 6741, 6957, 7029, 7106, 7223, 7414, 7557, 7749, 7836, 7909, 7988, 8133, 8312, 8421, 8639, 8924, 9018, 9191, 9354, 9579, 9768, 9940, 10047, 10126, 10230, 10336, 10669, 10845, 11099, 11192, 11472, 11561, 11688, 11772, 11956, 12080, 12157, 12254, 12386, 12495, 12665, 13080, 13237, 13320, 13510, 13652, 13701, 13820, 13999, 14134, 14238, 14351, 14530, 14683, 14828, 14978, 15072, 15466, 15597, 15778, 15877, 16006, 16264, 16468, 16854, 17000, 17153, 17324, 17486, 17612, 17721, 17806, 17916, 18014, 18166, 18433, 18483, 18574, 18795, 18900, 19087, 19201, 19428, 19587, 19772, 19844, 19922, 20005, 20124, 20228, 20342, 20415, 20521, 20685, 20775, 20962, 21078, 21247, 21450, 21619, 21792, 21983, 22061, 22098, 22189, 22461, 22556, 22581, 22611, 22839, 22926, 23005, 23205, 23265, 23383, 23490, 23616, 23859, 24100, 24514, 24593, 24691, 24865, 24939, 25072, 25131, 25160, 25249, 25364, 25509, 25663, 25711, 25770, 25857, 25917, 25958, 26145, 26313, 26372, 26414, 26563, 26648, 26750, 26887, 26990, 27099, 27260, 27374, 27511, 27720, 27861, 27948, 28048, 28068, 28129, 28162, 28263, 28414, 28760, 28952, 29050, 29209, 29422, 29538, 29656, 29792, 29892, 29979, 30031, 30165, 30561, 30714, 30748, 30835, 30860, 31039, 31127]}
+{"doc_id": "4613989", "revision_depth": "1", "before_revision": "Genevestigator is an online platform enabling researchers to globally explore public and proprietary expression data for research and clinical applications. It 's a software tool developed for biologists and medical researchers to identifynovel targets and biomarkers, characterise and prioritise candidate genes, and in general to understand which factors cause genes to be regulated. Specifically, gene expression is visualised in the context of tissues, stimuli, drug treatments , diseases, or genetic modifications. Results are processed from a very large database of manually curatedand quality-controlled microarrays and RNAseq samples from a large variety of tissues and conditions . Currently, data is available for human, mouse, rat, monkey, pig, dog, drosophila, arabidopsis, barley, rice, wheat , maize, medicago, tomato, tobacco, moss and soybean. Genevestigator was started in January 2004 by scientists from ETH Zurich and is currently developed and commercialized by Nebion AG. Tool for biologists and medical researchers More than 50 ,000 scientists have registered for GENEVESTIGATOR (mostly biologists) from the animal and plant research areas. Its tools have been used in molecular biology, toxicogenomics, and biomarker discovery/validation . As of 2018, its original articles have been cited more than 3,500 times by researchers using the tools . Three tool sets, each containing several tools , are available : CONDITION SEARCH tools: find conditions that are relevant for your genes of interest GENE SEARCH tools: find genes that are specifically expressed in conditions of interest SIMILARITY SEARCH tools: find genes that are similar within a data space.", "after_revision": "Genevestigator is an application consisting of a gene expression database and tools to analyse the data. It exists in two versions, biomedical and plant, depending on the species of the underlying microarray and RNAseq data. It was started in January 2004 by scientists from ETH Zurich and is currently developed and commercialized by Nebion AG. Researchers and scientists from academia and industry use it to identify, characterize and validate novel drug targets and biomarkers, identify appropriate research models and in general to understand how gene expression changes with different treatments. Gene expression database The Genevestigator database comprises transciptomic data from numerous public repositories including GEO, Array Express and renowned cancer research projects as TCGA. Depending on the license agreement, it may also also contain data from private gene expression studies. All data are manually curated , quality-controlled and enriched for sample and experiment descriptions derived from corresponding scientific publications. The number of species from where the samples are derived is constantly increasing . Currently, the biomedical version contains data from human, mouse, rat, monkey, fruitfly and other species and used in biomedical research. Gene expression studies are from various research areas including oncology, immunology, neurology, dermatology and cardiovascular diseases. Samples comprise tissue biopsies and cell lines. The plant version contains both, widely used model species such as arabidopsis and medicago as well as major corp species such as maize, rice, wheat and soybean. Gene expression tools More than 60 ,000 scientists from academia and industry use GENEVESTIGATOR for their work in molecular biology, toxicogenomics, biomarker discovery/validation and further research areas. The original scientific publication has been cited over 3,500 times . The analysis tools are divided into three major sets : CONDITION SEARCH tools: find conditions such as a tissue, disease, treatment or genetic background that regulate the gene(s) of interest GENE SEARCH tools: find genes that are specifically expressed in the condition(s) of interest SIMILARITY SEARCH tools: find genes or conditions that show a similar gene expression pattern", "edit_actions": [{"type": "R", "before": "online platform enabling researchers to globally explore public and proprietary expression data for research and clinical applications. It 's a software tool developed for biologists and medical researchers to identifynovel", "after": "application consisting of a gene expression database and tools to analyse the data. It exists in two versions, biomedical and plant, depending on the species of the underlying microarray and RNAseq data. It was started in January 2004 by scientists from ETH Zurich and is currently developed and commercialized by Nebion AG.", "start_char_pos": 21, "end_char_pos": 244}, {"type": "A", "before": null, "after": "Researchers and scientists from academia and industry use it to identify, characterize and validate novel drug", "start_char_pos": 245, "end_char_pos": 245}, {"type": "R", "before": "characterise and prioritise candidate genes, and", "after": "identify appropriate research models and", "start_char_pos": 270, "end_char_pos": 318}, {"type": "R", "before": "which factors cause genes to be regulated. Specifically, gene expression is visualised in the context of tissues, stimuli, drug treatments", "after": "how gene expression changes with different treatments.", "start_char_pos": 344, "end_char_pos": 482}, {"type": "A", "before": null, "after": "Gene expression database The Genevestigator database comprises transciptomic data from numerous public repositories including GEO, Array Express and renowned cancer research projects as TCGA. Depending on the license agreement, it may also also contain data from private gene expression studies. All data are manually curated", "start_char_pos": 483, "end_char_pos": 483}, {"type": "D", "before": "diseases, or genetic modifications. Results are processed from a very large database of manually curatedand", "after": null, "start_char_pos": 486, "end_char_pos": 593}, {"type": "R", "before": "microarrays and RNAseq samples from a large variety of tissues and conditions", "after": "and enriched for sample and experiment descriptions derived from corresponding scientific publications.", "start_char_pos": 613, "end_char_pos": 690}, {"type": "A", "before": null, "after": "The number of species from where the samples are derived is constantly increasing", "start_char_pos": 691, "end_char_pos": 691}, {"type": "R", "before": "data is available for", "after": "the biomedical version contains data from", "start_char_pos": 705, "end_char_pos": 726}, {"type": "R", "before": "pig, dog, drosophila, arabidopsis, barley,", "after": "fruitfly and other species and used in biomedical research. Gene expression studies are from various research areas including oncology, immunology, neurology, dermatology and cardiovascular diseases. Samples comprise tissue biopsies and cell lines.", "start_char_pos": 754, "end_char_pos": 796}, {"type": "A", "before": null, "after": "The plant version contains both, widely used model species such as arabidopsis and medicago as well as major corp species such as maize,", "start_char_pos": 797, "end_char_pos": 797}, {"type": "D", "before": ", maize, medicago, tomato, tobacco, moss", "after": null, "start_char_pos": 810, "end_char_pos": 850}, {"type": "D", "before": "Genevestigator was started in January 2004 by scientists from ETH Zurich and is currently developed and commercialized by Nebion AG.", "after": null, "start_char_pos": 864, "end_char_pos": 996}, {"type": "R", "before": "Tool for biologists and medical researchers More than 50", "after": "Gene expression tools More than 60", "start_char_pos": 997, "end_char_pos": 1053}, {"type": "R", "before": "have registered for GENEVESTIGATOR (mostly biologists) from the animal and plant research areas. Its tools have been used", "after": "from academia and industry use GENEVESTIGATOR for their work", "start_char_pos": 1070, "end_char_pos": 1191}, {"type": "D", "before": "and", "after": null, "start_char_pos": 1230, "end_char_pos": 1233}, {"type": "R", "before": ". As of 2018, its original articles have been cited more than", "after": "and further research areas. The original scientific publication has been cited over", "start_char_pos": 1265, "end_char_pos": 1326}, {"type": "D", "before": "by researchers using the tools", "after": null, "start_char_pos": 1339, "end_char_pos": 1369}, {"type": "R", "before": "Three tool sets, each containing several tools , are available", "after": "The analysis tools are divided into three major sets", "start_char_pos": 1372, "end_char_pos": 1434}, {"type": "R", "before": "that are relevant for your genes", "after": "such as a tissue, disease, treatment or genetic background that regulate the gene(s)", "start_char_pos": 1477, "end_char_pos": 1509}, {"type": "R", "before": "conditions", "after": "the condition(s)", "start_char_pos": 1587, "end_char_pos": 1597}, {"type": "R", "before": "that are similar within a data space.", "after": "or conditions that show a similar gene expression pattern", "start_char_pos": 1646, "end_char_pos": 1683}], "sents_char_pos": [0, 156, 386, 521, 863, 996, 1166, 1266, 1371]}
+{"doc_id": "46193002", "revision_depth": "1", "before_revision": "Biography Li was born in British Hong Kongon January 6, 1932, with her ancestral home in Deqing County, Guangdong . She had four brothers and one sister. Her father , Li Jiong () , was a major general in the National Revolutionary Army. Her mother, Liu Jiqing ( ) was a native of Beijing. Li spent her childhood in British Hong Kong, Beijing and Guangzhou. Li secondary studied at Fu Jen Girls'School ()and Peidao Private Middle School(), then she was accepted to Lingnan Private University(now Sun Yat-sen University ). She was a graduate student in physics at Wuhan University . She also graduated from Leningrad University ( now Saint Petersburg State University) in 1956, where she majored in physics. After graduation, she applied for an internship in the Institute of Physics of the Chinese Academy of Sciences, and studied under . During the Cultural Revolution , she was sent to the May Seventh Cadre Schools to perform manual labour. She returned to the Chinese Academy of Sciences in 1973. From 1982 to 1983, she was a visiting scholar at Osaka University. She was elected a fellow of the Chinese Academy of Sciences in 1993 and a fellow of The World Academy of Sciences in 1998. In February 2003, she received the L'Or\u00e9al-UNESCO Awards for Women in Science Award . Li died on January 24, 2020 in Beijing. Personal life Li was married to fellow physicist Fan Haifu .", "after_revision": "Biography On January 6, 1932, Li Fanghua was born in Hong Kong. Because his father was a business partner in Hong Kong, he settled in Hong Kong. His father Li Jiong participated in the Revolution of 1911 in his early years and served as a major general of the Fourth Army of the National Revolutionary Army. In 1937, after the Lugouqiao Incident, in order to avoid Japanese invaders, they moved their family to Deqing County, Guangdong Province. In 1938, her mother took her elder brother, younger brother and her back to Hong Kong alone for the sake of her children\u2019s studies. One year later, she moved to Shanghai with her neighbors. Three years later, she moved to Beijing\u2019s grandmother\u2019s home. Beijing No. 56 Middle School). In 1947, her mother took her and her younger brother back to Guangzhou, and her father arranged for her to board the second grade of Peidao Girls\u2019 High School. In 1949, when he graduated from high school, Li Fanghua was sent to the Department of Physics of Lingnan University, and at the same time he was admitted to the Department of Astronomy of Sun Yat-sen University. In September, she entered Lingnan University. Because the teachers often use English to give lectures, she often consults English reference books after class, so she improves her English reading ability. In October, Guangzhou was liberated and public schools opened, and she transferred to the Department of Astronomy at Sun Yat-Sen University. But because of frequent suspension of classes and drumming and going to the street to do political propaganda, she wanted to change to a school with more studies. In 1950, Li Fanghua was admitted to the Department of Physics of Wuhan University and was still in the first year. In 1952, the state selected students from the second year of colleges and universities to take the exam for studying abroad in the Soviet Union. Wuhan University recommended Li Fanghua to take the exam and was admitted. In March, Li Fanghua entered the Preparatory Department of Beijing Russian Language School, specializing in Russian. In the autumn of the same year, I went to the Soviet Union and entered the Department of Physics of Leningrad University, a state university of the former Soviet Union. There were also three former students from the Department of Physics of Tsinghua University, Qing Chengrui, Gu Yifan and Huang Shengnian. In order to shorten the length of study, Li Fanghua and the four of them fought to transfer to the second grade together, and obtained the approval of the dean of the department. In 1955, Li Fanghua was in teacher Mi. Asia. Under the guidance of Rums (\u041c . \u0391.\u042f\u0443\u043c\u0448\u044c), he began to prepare his graduation thesis, the title of which was \"Study on Electron Diffraction of In-situ Evaporated Bismuth Metal Thin Films\". In 1956, Li Fanghua graduated from the Department of Physics of Leningrad University in the Soviet Union. In 1960, Shi Ruwei (then director of the Institute of Physics, Chinese Academy of Sciences) arranged for Li Fanghua to independently carry out electron diffraction research, so that she could take the scientific knowledge learned in the Soviet Union into China. \"Single crystal electron diffraction\" structure analysis research. In October 1982, Li Fanghua went to the Department of Applied Physics, Osaka University, Japan as a visiting scholar (until May 1983), and carried two new domestically produced minerals: Yellow River ore and bastnaesium ore, hoping to use Japanese super-high resolution There are new discoveries in domestic minerals by the electron microscope. In 1984, Li Fanghua's research group won the second prize of the Chinese Academy of Sciences Scientific and Technological Achievement Award with the project \"The establishment of lattice image and direct observation of crystal structure\". In 1991, Li Fanghua won the Ye Qisun Physics Prize of the Chinese Physical Society. In 1992, Li Fanghua won the Hashimoto First Jiro Award (personal award) from the Chinese Society of Electron Microscopy. In 1993, Li Fanghua was elected as an academician of the Chinese Academy of Sciences. In 1996, Li Fanghua served as the chairman of the Chinese Society of Electron Microscopy (until 2000). In 1998, Li Fanghua was elected as an academician of the Third World Academy of Sciences. In 2002, at the time of her 70th birthday, the academic journal \"Ultramicroscopy\" of the International Society for Electron Microscopy published a special issue to celebrate her. 20 years ago, working photos in the conference room of the Institute of Physics of the Chinese Academy of Sciences, with Academician Li Fanghua on the right and Academician Fan Haifu on the second. Fan Haifu is an academician of the Chinese Academy of Sciences and an academician of the Third World Academy of Sciences. He is also the husband of Academician Li Fanghua. On February 27 , 2003, Li Fanghua won the L'Or\u00e9al-UNESCO World Outstanding Female Scientist Achievement Award and was the first Chinese scientist to receive the award. In 2009, Li Fanghua won the He Liang He Li Foundation Science and Technology Progress Award; the monograph \"Electronic Crystallography and Image Processing\" written in the same year was published.On January 6 , 1932, Li Fanghua was born in Hong Kong. Because his father was a business partner in Hong Kong, he settled in Hong Kong. His father Li Jiong participated in the Revolution of 1911 in his early years and served as a major general of the Fourth Army of the National Revolutionary Army. In 1937, after the Lugouqiao Incident, in order to avoid Japanese invaders, they moved their family to Deqing County, Guangdong Province. In 1938, her mother took her elder brother, younger brother and her back to Hong Kong alone for the sake of her children\u2019s studies. One year later, she moved to Shanghai with her neighbors. Three years later, she moved to Beijing\u2019s grandmother\u2019s home. Beijing No. 56 Middle School ) . In 1947, her mother took her and her younger brother back to Guangzhou, and her father arranged for her to board the second grade of Peidao Girls\u2019 High School. In 1949, when he graduated from high school, Li Fanghua was sent to the Department of Physics of Lingnan University, and at the same time he was admitted to the Department of Astronomy of Sun Yat-sen University . In September, she entered Lingnan University. Because the teachers often use English to give lectures, she often consults English reference books after class, so she improves her English reading ability. In October, Guangzhou was liberated and public schools opened, and she transferred to the Department of Astronomy at Sun Yat-Sen University. But because of frequent suspension of classes and drumming and going to the street to do political propaganda, she wanted to change to a school with more studies. In 1950, Li Fanghua was admitted to the Department of Physics of Wuhan University and was still in the first year. In 1952, the state selected students from the second year of colleges and universities to take the exam for studying abroad in the Soviet Union. Wuhan University recommended Li Fanghua to take the exam and was admitted. In March, Li Fanghua entered the Preparatory Department of Beijing Russian Language School, specializing in Russian. In the autumn of the same year, I went to the Soviet Union and entered the Department of Physics of Leningrad University, a state university of the former Soviet Union. There were also three former students from the Department of Physics of Tsinghua University, Qing Chengrui, Gu Yifan and Huang Shengnian. In order to shorten the length of study, Li Fanghua and the four of them fought to transfer to the second grade together, and obtained the approval of the dean of the department. In 1955, Li Fanghua was in teacher Mi. Asia. Under the guidance of Rums (\u041c.\u0391.\u042f\u0443\u043c\u0448\u044c), he began to prepare his graduation thesis, the title of which was \"Study on Electron Diffraction of In-situ Evaporated Bismuth Metal Thin Films\". In 1956, Li Fanghua graduated from the Department of Physics of Leningrad University in the Soviet Union. In 1960, Shi Ruwei (then director of the Institute of Physics, Chinese Academy of Sciences) arranged for Li Fanghua to independently carry out electron diffraction research, so that she could take the scientific knowledge learned in the Soviet Union into China. \"Single crystal electron diffraction\" structure analysis research. In October 1982, Li Fanghua went to the Department of Applied Physics, Osaka University, Japan as a visiting scholar (until May 1983), and carried two new domestically produced minerals: Yellow River ore and bastnaesium ore, hoping to use Japanese super-high resolution There are new discoveries in domestic minerals by the electron microscope. In 1984, Li Fanghua's research group won the second prize of the Chinese Academy of Sciences Scientific and Technological Achievement Award with the project \"The establishment of lattice image and direct observation of crystal structure\". In 1991, Li Fanghua won the Ye Qisun Physics Prize of the Chinese Physical Society. In 1992, Li Fanghua won the Hashimoto First Jiro Award (personal award) from the Chinese Society of Electron Microscopy. In 1993, Li Fanghua was elected as an academician of the Chinese Academy of Sciences. In 1996, Li Fanghua served as the chairman of the Chinese Society of Electron Microscopy (until 2000). In 1998, Li Fanghua was elected as an academician of the Third World Academy of Sciences. In 2002, at the time of her 70th birthday, the academic journal \"Ultramicroscopy\" of the International Society for Electron Microscopy published a special issue to celebrate her. 20 years ago, working photos in the conference room of the Institute of Physics of the Chinese Academy of Sciences, with Academician Li Fanghua on the right and Academician Fan Haifu on the second. Fan Haifu is an academician of the Chinese Academy of Sciences and an academician of the Third World Academy of Sciences. He is also the husband of Academician Li Fanghua. On February 27 , 2003, Li Fanghua won the L'Or\u00e9al-UNESCO World Outstanding Female Scientist Achievement Award and was the first Chinese scientist to receive the award. In 2009, Li Fanghua won the He Liang He Li Foundation Science and Technology Progress Award; the monograph \"Electronic Crystallography and Image Processing\" written in the same year was published.On January 6, 1932, Li Fanghua was born in Hong Kong. Because his father was a business partner in Hong Kong, he settled in Hong Kong. His father Li Jiong participated in the Revolution of 1911 in his early years and served as a major general of the Fourth Army of the National Revolutionary Army. In 1937, after the Lugouqiao Incident, in order to avoid Japanese invaders, they moved their family to Deqing County, Guangdong Province. In 1938, her mother took her elder brother, younger brother and her back to Hong Kong alone for the sake of her children\u2019s studies. One year later, she moved to Shanghai with her neighbors. Three years later, she moved to Beijing\u2019s grandmother\u2019s home. Beijing No. 56 Middle School). In 1947, her mother took her and her younger brother back to Guangzhou, and her father arranged for her to board the second grade of Peidao Girls\u2019 High School. In 1949, when he graduated from high school, Li Fanghua was sent to the Department of Physics of Lingnan University, and at the same time he was admitted to the Department of Astronomy of Sun Yat-sen University. In September, she entered Lingnan University. Because the teachers often use English to give lectures, she often consults English reference books after class, so she improves her English reading ability. In October, Guangzhou was liberated and public schools opened, and she transferred to the Department of Astronomy at Sun Yat-Sen University. But because of frequent suspension of classes and drumming and going to the street to do political propaganda, she wanted to change to a school with more studies. In 1950, Li Fanghua was admitted to the Department of Physics of Wuhan University and was still in the first year. In 1952, the state selected students from the second year of colleges and universities to take the exam for studying abroad in the Soviet Union. Wuhan University recommended Li Fanghua to take the exam and was admitted. In March, Li Fanghua entered the Preparatory Department of Beijing Russian Language School, specializing in Russian. In the autumn of the same year, I went to the Soviet Union and entered the Department of Physics of Leningrad University, a state university of the former Soviet Union. There were also three former students from the Department of Physics of Tsinghua University, Qing Chengrui, Gu Yifan and Huang Shengnian. In order to shorten the length of study, Li Fanghua and the four of them fought to transfer to the secod grade together, and obtained the approval of the dean of the department. In 1955, Li Fanghua was in teacher Mi. Asia. Under the guidance of Rums (\u041c.\u0391.\u042f\u0443\u043c\u0448\u044c), he began to prepare his graduation thesis, the title of which was \"Study on Electron Diffraction of In-situ Evaporated Bismuth Metal Thin Films\". In 1956, Li Fanghua graduated from the Department of Physics of Leningrad University in the Soviet Union. In 1960, Shi Ruwei (then director of the Institute of Physics, Chinese Academy of Sciences ) arranged for Li Fanghua to independently carry out electron diffraction research, so that she could take the scientific knowledge learned in the Soviet Union into China. \"Single crystal electron diffraction\" structure analysis research. In October 1982 , Li Fanghua went to the Department of Applied Physics, Osaka University, Japan as a visiting scholar (until May 1983), and carried two new domestically produced minerals: Yellow River ore and bastnaesium ore, hoping to use Japanese super-high resolution There are new discoveries in domestic minerals by the electron microscope. In 1984, Li Fanghua's research group won the second prize of the Chinese Academy of Sciences Scientific and Technological Achievement Award with the project \"The establishment of lattice image and direct observation of crystal structure\". In 1991, Li Fanghua won the Ye Qisun Physics Prize of the Chinese Physical Society. In 1992, Li Fanghua won the Hashimoto First Jiro Award (personal award) from the Chinese Society of Electron Microscopy. In 1993, Li Fanghua was elected as an academician of the Chinese Academy of Sciences . In 1996, Li Fanghua served as the chairman of the Chinese Society of Electron Microscopy (until 2000). In 1998, Li Fanghua was elected as an academician of the Third World Academy of Sciences. In 2002, at the time of her 70th birthday, the academic journal \"Ultramicroscopy\" of the International Society for Electron Microscopy published a special issue to celebrate her. 20 years ago, working photos in the conference room of the Institute of Physics of the Chinese Academy of Sciences, with Academician Li Fanghua on the right and Academician Fan Haifu on the second. Fan Haifu is an academician of the Chinese Academy of Sciences and an academician of the Third World Academy of Sciences . He is also the husband of Academician Li Fanghua. On February 27, 2003, Li Fanghua won the L'Or\u00e9al-UNESCO World Outstanding Female Scientist Achievement Award and was the first Chinese scientist to receive the award. In 2009, Li Fanghua won the He Liang He Li Foundation Science and Technology Progress Award; the monograph \"Electronic Crystallography and Image Processing\" written in the same year was published . Personal life Li was married to fellow physicist Fan Haifu . Main Achievement Research Summary In 1985, Li Fanghua deduced a new and practical approximate analytical expression for high-resolution image intensity, established a practical image contrast theory, and solved the theoretical basis for the application of electronic crystallographic image processing in practice. Her research promotes the development of related disciplines and provides crystal structure information of new materials, which helps to draw the laws of the relationship between material properties, structure and technology. Her research content includes: (1) High-resolution electron microscopy and electronic crystallography In the early 1960s, Li Fanghua first carried out electron diffraction in China to determine the structure of a single crystal. In China, he determined the position of hydrogen atoms in the crystal for the first time. The relevant literature is still cited by foreign colleagues. In the 1970s, Li Fanghua and Fan Haifu cooperated to explore the combination of diffraction methods and high-resolution electron microscopy, and created a new image processing theory and technology in high-resolution electron microscopy. Later, she and her students established an unwinding processing technology based on the principle of maximum entropy. It provides an important way to determine the tiny crystal structure. It has been successfully applied to determine the crystal structure of materials such as high-temperature superconductors. While studying in Japan in the 1980s, Li Fanghua summarized new experimental rules and developed a method for determining the position of light atoms. On this basis, after returning to China, she proposed a new image contrast theory: \"pseudo-weak phase object approximation\". This theory clarified the relationship between image intensity and crystal thickness for the first time, and revealed the law of changes in the intensity of different atomic images. , Is the theoretical basis of the above-mentioned image processing technology. Under the guidance of this theory, Li Fanghua et al. observed lithium atoms in crystals for the first time experimentally. In addition, she participated in the early research of high-temperature superconducting materials by means of high-resolution electron microscopy, and was one of the first groups in the world to report the presence or absence of commensurate modulation structures of bismuth superconductors. (2) Quasi-crystal The research team led by Li Fanghua first discovered and reported the almost continuous transition process between quasicrystals and crystals, and she gave a theoretical explanation. Li Fanghua used the phase sub-strain field to derive some formulas reflecting the relationship between the quasicrystal and the crystal, and on this basis, proposed a new method to determine the structure of the quasicrystal, as well as the determination of the local phase sub-strain in the quasicrystal. method. And successfully applied to Al-Cu-Li and Al-Mn-Si quasicrystals. (3) Crystal defects For the newly developed field emission electron microscope, Li Fanghua proposed a new research direction for measuring crystal defects with atomic resolution. At present, she has successfully measured the 60-degree dislocation at the SiGe/Si epitaxial film interface into two incomplete dislocations of 90 degrees and 30 degrees, and a piece of stacking fault sandwiched between them. This is also the first report on the defect of atomic resolution at the interface of SiGe/Si epitaxial film .", "edit_actions": [{"type": "R", "before": "Li", "after": "On January 6, 1932, Li Fanghua", "start_char_pos": 10, "end_char_pos": 12}, {"type": "R", "before": "British Hong Kongon January 6, 1932, with her ancestral home in", "after": "Hong Kong. Because his father was a business partner in Hong Kong, he settled in Hong Kong. His father Li Jiong participated in the Revolution of 1911 in his early years and served as a major general of the Fourth Army of the National Revolutionary Army. In 1937, after the Lugouqiao Incident, in order to avoid Japanese invaders, they moved their family to", "start_char_pos": 25, "end_char_pos": 88}, {"type": "A", "before": null, "after": "Province. In 1938, her mother took her elder brother, younger brother and her back to Hong Kong alone for the sake of her children\u2019s studies. One year later, she moved to Shanghai with her neighbors. Three years later, she moved to Beijing\u2019s grandmother\u2019s home. Beijing No. 56 Middle School). In 1947, her mother took her and her younger brother back to Guangzhou, and her father arranged for her to board the second grade of Peidao Girls\u2019 High School. In 1949, when he graduated from high school, Li Fanghua was sent to the Department of Physics of Lingnan University, and at the same time he was admitted to the Department of Astronomy of Sun Yat-sen University. In September, she entered Lingnan University. Because the teachers often use English to give lectures, she often consults English reference books after class, so she improves her English reading ability. In October, Guangzhou was liberated and public schools opened, and she transferred to the Department of Astronomy at Sun Yat-Sen University. But because of frequent suspension of classes and drumming and going to the street to do political propaganda, she wanted to change to a school with more studies. In 1950, Li Fanghua was admitted to the Department of Physics of Wuhan University and was still in the first year. In 1952, the state selected students from the second year of colleges and universities to take the exam for studying abroad in the Soviet Union. Wuhan University recommended Li Fanghua to take the exam and was admitted. In March, Li Fanghua entered the Preparatory Department of Beijing Russian Language School, specializing in Russian. In the autumn of the same year, I went to the Soviet Union and entered the Department of Physics of Leningrad University, a state university of the former Soviet Union. There were also three former students from the Department of Physics of Tsinghua University, Qing Chengrui, Gu Yifan and Huang Shengnian. In order to shorten the length of study, Li Fanghua and the four of them fought to transfer to the second grade together, and obtained the approval of the dean of the department. In 1955, Li Fanghua was in teacher Mi. Asia. Under the guidance of Rums (\u041c", "start_char_pos": 114, "end_char_pos": 114}, {"type": "R", "before": "She had four brothers and one sister. Her father", "after": "\u0391.\u042f\u0443\u043c\u0448\u044c), he began to prepare his graduation thesis, the title of which was \"Study on Electron Diffraction of In-situ Evaporated Bismuth Metal Thin Films\". In 1956, Li Fanghua graduated from the Department of Physics of Leningrad University in the Soviet Union. In 1960, Shi Ruwei (then director of the Institute of Physics, Chinese Academy of Sciences) arranged for Li Fanghua to independently carry out electron diffraction research, so that she could take the scientific knowledge learned in the Soviet Union into China. \"Single crystal electron diffraction\" structure analysis research. In October 1982, Li Fanghua went to the Department of Applied Physics, Osaka University, Japan as a visiting scholar (until May 1983), and carried two new domestically produced minerals: Yellow River ore and bastnaesium ore, hoping to use Japanese super-high resolution There are new discoveries in domestic minerals by the electron microscope. In 1984, Li Fanghua's research group won the second prize of the Chinese Academy of Sciences Scientific and Technological Achievement Award with the project \"The establishment of lattice image and direct observation of crystal structure\". In 1991, Li Fanghua won the Ye Qisun Physics Prize of the Chinese Physical Society. In 1992, Li Fanghua won the Hashimoto First Jiro Award (personal award) from the Chinese Society of Electron Microscopy. In 1993, Li Fanghua was elected as an academician of the Chinese Academy of Sciences. In 1996, Li Fanghua served as the chairman of the Chinese Society of Electron Microscopy (until 2000). In 1998, Li Fanghua was elected as an academician of the Third World Academy of Sciences. In 2002, at the time of her 70th birthday, the academic journal \"Ultramicroscopy\" of the International Society for Electron Microscopy published a special issue to celebrate her. 20 years ago, working photos in the conference room of the Institute of Physics of the Chinese Academy of Sciences, with Academician Li Fanghua on the right and Academician Fan Haifu on the second. Fan Haifu is an academician of the Chinese Academy of Sciences and an academician of the Third World Academy of Sciences. He is also the husband of Academician Li Fanghua. On February 27", "start_char_pos": 117, "end_char_pos": 165}, {"type": "R", "before": "Li Jiong ()", "after": "2003, Li Fanghua won the L'Or\u00e9al-UNESCO World Outstanding Female Scientist Achievement Award and was the first Chinese scientist to receive the award. In 2009, Li Fanghua won the He Liang He Li Foundation Science and Technology Progress Award; the monograph \"Electronic Crystallography and Image Processing\" written in the same year was published.On January 6", "start_char_pos": 168, "end_char_pos": 179}, {"type": "R", "before": "was a major general in the National Revolutionary Army. Her mother, Liu Jiqing (", "after": "1932, Li Fanghua was born in Hong Kong. Because his father was a business partner in Hong Kong, he settled in Hong Kong. His father Li Jiong participated in the Revolution of 1911 in his early years and served as a major general of the Fourth Army of the National Revolutionary Army. In 1937, after the Lugouqiao Incident, in order to avoid Japanese invaders, they moved their family to Deqing County, Guangdong Province. In 1938, her mother took her elder brother, younger brother and her back to Hong Kong alone for the sake of her children\u2019s studies. One year later, she moved to Shanghai with her neighbors. Three years later, she moved to Beijing\u2019s grandmother\u2019s home. Beijing No. 56 Middle School", "start_char_pos": 182, "end_char_pos": 262}, {"type": "D", "before": "was a native of Beijing. Li spent her childhood in British Hong Kong, Beijing and Guangzhou.", "after": null, "start_char_pos": 265, "end_char_pos": 357}, {"type": "R", "before": "Li secondary studied at Fu Jen Girls'School ()and Peidao Private Middle School(), then she was accepted to Lingnan Private University(now", "after": ". In 1947, her mother took her and her younger brother back to Guangzhou, and her father arranged for her to board the second grade of Peidao Girls\u2019 High School. In 1949, when he graduated from high school, Li Fanghua was sent to the Department of Physics of Lingnan University, and at the same time he was admitted to the Department of Astronomy of", "start_char_pos": 358, "end_char_pos": 495}, {"type": "D", "before": "). She was a graduate student in physics at Wuhan University", "after": null, "start_char_pos": 519, "end_char_pos": 579}, {"type": "R", "before": "She also graduated from Leningrad University ( now Saint Petersburg State University) in 1956, where she majored in physics. After graduation, she applied for an internship in the", "after": "In September, she entered Lingnan University. Because the teachers often use English to give lectures, she often consults English reference books after class, so she improves her English reading ability. In October, Guangzhou was liberated and public schools opened, and she transferred to the Department of Astronomy at Sun Yat-Sen University. But because of frequent suspension of classes and drumming and going to the street to do political propaganda, she wanted to change to a school with more studies. In 1950, Li Fanghua was admitted to the Department of Physics of Wuhan University and was still in the first year. In 1952, the state selected students from the second year of colleges and universities to take the exam for studying abroad in the Soviet Union. Wuhan University recommended Li Fanghua to take the exam and was admitted. In March, Li Fanghua entered the Preparatory Department of Beijing Russian Language School, specializing in Russian. In the autumn of the same year, I went to the Soviet Union and entered the Department of Physics of Leningrad University, a state university of the former Soviet Union. There were also three former students from the Department of Physics of Tsinghua University, Qing Chengrui, Gu Yifan and Huang Shengnian. In order to shorten the length of study, Li Fanghua and the four of them fought to transfer to the second grade together, and obtained the approval of the dean of the department. In 1955, Li Fanghua was in teacher Mi. Asia. Under the guidance of Rums (\u041c.\u0391.\u042f\u0443\u043c\u0448\u044c), he began to prepare his graduation thesis, the title of which was \"Study on Electron Diffraction of In-situ Evaporated Bismuth Metal Thin Films\". In 1956, Li Fanghua graduated from the Department of Physics of Leningrad University in the Soviet Union. In 1960, Shi Ruwei (then director of the Institute of Physics, Chinese Academy of Sciences) arranged for Li Fanghua to independently carry out electron diffraction research, so that she could take the scientific knowledge learned in the Soviet Union into China. \"Single crystal electron diffraction\" structure analysis research. In October 1982, Li Fanghua went to the Department of Applied Physics, Osaka University, Japan as a visiting scholar (until May 1983), and carried two new domestically produced minerals: Yellow River ore and bastnaesium ore, hoping to use Japanese super-high resolution There are new discoveries in domestic minerals by the electron microscope. In 1984, Li Fanghua's research group won the second prize of the Chinese Academy of Sciences Scientific and Technological Achievement Award with the project \"The establishment of lattice image and direct observation of crystal structure\". In 1991, Li Fanghua won the Ye Qisun Physics Prize of the Chinese Physical Society. In 1992, Li Fanghua won the Hashimoto First Jiro Award (personal award) from the Chinese Society of Electron Microscopy. In 1993, Li Fanghua was elected as an academician of the Chinese Academy of Sciences. In 1996, Li Fanghua served as the chairman of the Chinese Society of Electron Microscopy (until 2000). In 1998, Li Fanghua was elected as an academician of the Third World Academy of Sciences. In 2002, at the time of her 70th birthday, the academic journal \"Ultramicroscopy\" of the International Society for Electron Microscopy published a special issue to celebrate her. 20 years ago, working photos in the conference room of the", "start_char_pos": 582, "end_char_pos": 761}, {"type": "D", "before": "and studied under .", "after": null, "start_char_pos": 819, "end_char_pos": 838}, {"type": "R", "before": "During the Cultural Revolution", "after": "with Academician Li Fanghua on the right and Academician Fan Haifu on the second. Fan Haifu is an academician of the Chinese Academy of Sciences and an academician of the Third World Academy of Sciences. He is also the husband of Academician Li Fanghua. On February 27", "start_char_pos": 839, "end_char_pos": 869}, {"type": "R", "before": "she", "after": "2003, Li Fanghua won the L'Or\u00e9al-UNESCO World Outstanding Female Scientist Achievement Award and was the first Chinese scientist to receive the award. In 2009, Li Fanghua won the He Liang He Li Foundation Science and Technology Progress Award; the monograph \"Electronic Crystallography and Image Processing\" written in the same year was published.On January 6, 1932, Li Fanghua was born in Hong Kong. Because his father was a business partner in Hong Kong, he settled in Hong Kong. His father Li Jiong participated in the Revolution of 1911 in his early years and served as a major general of the Fourth Army of the National Revolutionary Army. In 1937, after the Lugouqiao Incident, in order to avoid Japanese invaders, they moved their family to Deqing County, Guangdong Province. In 1938, her mother took her elder brother, younger brother and her back to Hong Kong alone for the sake of her children\u2019s studies. One year later, she moved to Shanghai with her neighbors. Three years later, she moved to Beijing\u2019s grandmother\u2019s home. Beijing No. 56 Middle School). In 1947, her mother took her and her younger brother back to Guangzhou, and her father arranged for her to board the second grade of Peidao Girls\u2019 High School. In 1949, when he graduated from high school, Li Fanghua", "start_char_pos": 872, "end_char_pos": 875}, {"type": "R", "before": "May Seventh Cadre Schools to perform manual labour. She returned to the", "after": "Department of Physics of Lingnan University, and at the same time he was admitted to the Department of Astronomy of Sun Yat-sen University. In September, she entered Lingnan University. Because the teachers often use English to give lectures, she often consults English reference books after class, so she improves her English reading ability. In October, Guangzhou was liberated and public schools opened, and she transferred to the Department of Astronomy at Sun Yat-Sen University. But because of frequent suspension of classes and drumming and going to the street to do political propaganda, she wanted to change to a school with more studies. In 1950, Li Fanghua was admitted to the Department of Physics of Wuhan University and was still in the first year. In 1952, the state selected students from the second year of colleges and universities to take the exam for studying abroad in the Soviet Union. Wuhan University recommended Li Fanghua to take the exam and was admitted. In March, Li Fanghua entered the Preparatory Department of Beijing Russian Language School, specializing in Russian. In the autumn of the same year, I went to the Soviet Union and entered the Department of Physics of Leningrad University, a state university of the former Soviet Union. There were also three former students from the Department of Physics of Tsinghua University, Qing Chengrui, Gu Yifan and Huang Shengnian. In order to shorten the length of study, Li Fanghua and the four of them fought to transfer to the secod grade together, and obtained the approval of the dean of the department. In 1955, Li Fanghua was in teacher Mi. Asia. Under the guidance of Rums (\u041c.\u0391.\u042f\u0443\u043c\u0448\u044c), he began to prepare his graduation thesis, the title of which was \"Study on Electron Diffraction of In-situ Evaporated Bismuth Metal Thin Films\". In 1956, Li Fanghua graduated from the Department of Physics of Leningrad University in the Soviet Union. In 1960, Shi Ruwei (then director of the Institute of Physics,", "start_char_pos": 892, "end_char_pos": 963}, {"type": "R", "before": "in 1973. From", "after": ") arranged for Li Fanghua to independently carry out electron diffraction research, so that she could take the scientific knowledge learned in the Soviet Union into China. \"Single crystal electron diffraction\" structure analysis research. In October", "start_char_pos": 992, "end_char_pos": 1005}, {"type": "R", "before": "to 1983, she was", "after": ", Li Fanghua went to the Department of Applied Physics, Osaka University, Japan as", "start_char_pos": 1011, "end_char_pos": 1027}, {"type": "D", "before": "at Osaka University.", "after": null, "start_char_pos": 1047, "end_char_pos": 1067}, {"type": "R", "before": "She was elected a fellow", "after": "(until May 1983), and carried two new domestically produced minerals: Yellow River ore and bastnaesium ore, hoping to use Japanese super-high resolution There are new discoveries in domestic minerals by the electron microscope. In 1984, Li Fanghua's research group won the second prize of the Chinese Academy of Sciences Scientific and Technological Achievement Award with the project \"The establishment of lattice image and direct observation of crystal structure\". In 1991, Li Fanghua won the Ye Qisun Physics Prize of the Chinese Physical Society. In 1992, Li Fanghua won the Hashimoto First Jiro Award (personal award) from the Chinese Society of Electron Microscopy. In 1993, Li Fanghua was elected as an academician", "start_char_pos": 1068, "end_char_pos": 1092}, {"type": "R", "before": "in 1993 and a fellow of The", "after": ". In 1996, Li Fanghua served as the chairman of the Chinese Society of Electron Microscopy (until 2000). In 1998, Li Fanghua was elected as an academician of the Third World Academy of Sciences. In 2002, at the time of her 70th birthday, the academic journal \"Ultramicroscopy\" of the International Society for Electron Microscopy published a special issue to celebrate her. 20 years ago, working photos in the conference room of the Institute of Physics of the Chinese Academy of Sciences, with Academician Li Fanghua on the right and Academician Fan Haifu on the second. Fan Haifu is an academician of the Chinese Academy of Sciences and an academician of the Third", "start_char_pos": 1128, "end_char_pos": 1155}, {"type": "R", "before": "in 1998. In February", "after": ". He is also the husband of Academician Li Fanghua. On February 27,", "start_char_pos": 1182, "end_char_pos": 1202}, {"type": "R", "before": "she received", "after": "Li Fanghua won", "start_char_pos": 1209, "end_char_pos": 1221}, {"type": "R", "before": "Awards for Women in Science Award", "after": "World Outstanding Female Scientist Achievement Award and was the first Chinese scientist to receive the award. In 2009, Li Fanghua won the He Liang He Li Foundation Science and Technology Progress Award; the monograph \"Electronic Crystallography and Image Processing\" written in the same year was published", "start_char_pos": 1241, "end_char_pos": 1274}, {"type": "D", "before": "Li died on January 24, 2020 in Beijing.", "after": null, "start_char_pos": 1277, "end_char_pos": 1316}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1376, "end_char_pos": 1376}, {"type": "A", "before": null, "after": "Main Achievement Research Summary In 1985, Li Fanghua deduced a new and practical approximate analytical expression for high-resolution image intensity, established a practical image contrast theory, and solved the theoretical basis for the application of electronic crystallographic image processing in practice. Her research promotes the development of related disciplines and provides crystal structure information of new materials, which helps to draw the laws of the relationship between material properties, structure and technology. Her research content includes: (1) High-resolution electron microscopy and electronic crystallography In the early 1960s, Li Fanghua first carried out electron diffraction in China to determine the structure of a single crystal. In China, he determined the position of hydrogen atoms in the crystal for the first time. The relevant literature is still cited by foreign colleagues. In the 1970s, Li Fanghua and Fan Haifu cooperated to explore the combination of diffraction methods and high-resolution electron microscopy, and created a new image processing theory and technology in high-resolution electron microscopy. Later, she and her students established an unwinding processing technology based on the principle of maximum entropy. It provides an important way to determine the tiny crystal structure. It has been successfully applied to determine the crystal structure of materials such as high-temperature superconductors. While studying in Japan in the 1980s, Li Fanghua summarized new experimental rules and developed a method for determining the position of light atoms. On this basis, after returning to China, she proposed a new image contrast theory: \"pseudo-weak phase object approximation\". This theory clarified the relationship between image intensity and crystal thickness for the first time, and revealed the law of changes in the intensity of different atomic images. , Is the theoretical basis of the above-mentioned image processing technology. Under the guidance of this theory, Li Fanghua et al. observed lithium atoms in crystals for the first time experimentally. In addition, she participated in the early research of high-temperature superconducting materials by means of high-resolution electron microscopy, and was one of the first groups in the world to report the presence or absence of commensurate modulation structures of bismuth superconductors. (2) Quasi-crystal The research team led by Li Fanghua first discovered and reported the almost continuous transition process between quasicrystals and crystals, and she gave a theoretical explanation. Li Fanghua used the phase sub-strain field to derive some formulas reflecting the relationship between the quasicrystal and the crystal, and on this basis, proposed a new method to determine the structure of the quasicrystal, as well as the determination of the local phase sub-strain in the quasicrystal. method. And successfully applied to Al-Cu-Li and Al-Mn-Si quasicrystals. (3) Crystal defects For the newly developed field emission electron microscope, Li Fanghua proposed a new research direction for measuring crystal defects with atomic resolution. At present, she has successfully measured the 60-degree dislocation at the SiGe/Si epitaxial film interface into two incomplete dislocations of 90 degrees and 30 degrees, and a piece of stacking fault sandwiched between them. This is also the first report on the defect of atomic resolution at the interface of SiGe/Si epitaxial film", "start_char_pos": 1377, "end_char_pos": 1377}], "sents_char_pos": [0, 116, 154, 237, 289, 357, 521, 581, 706, 943, 1000, 1067, 1190, 1316]}
+{"doc_id": "4695345", "revision_depth": "1", "before_revision": "Early life He was born on November 4, 1873, in Tanauan, Province of Leyte, Philippine Islands . Education and Law practice He attended public and private schools , and he finished college at Colegio de San Juan de Letran in Manila in 1893. He studied law, philosophy, and letters in the University of Santo Tomas at Manila1895\u20131897. Political career In 1898 and 1899 he served as secretary to the Military Governor of Leyte . He engaged in newspaper work. He was a member of the municipal council of Cebu. He became Governor of Leyte in 1906 and 1907 and a member of the Philippine house of representatives 1907\u20131909. He was a member of the Philippine Commission 1913\u2013 1916 and executive secretary of the Philippine Islands in 1916 and 1917 ; elected as a Nationalist a Resident Commissioner to the United States in 1917; and was reelected in 1920 and served from March 4, 1917, to March 3, 1923. He was declined to be a candidate for renomination in 1922. He engaged in journalistic work during 1923 he became head of the department of Spanish, University of the Philippines at Manila, 1925\u20131936. From 1937 to 1944. de Veyra was the director of the Institute of National Language. He also served as historical researcher in charge of manuscripts and publications, National Library and historical researcher, Office of the President, 1946.", "after_revision": "Early life He was born on November 4, 1873, in the town of Tanauan in Leyte province . Education De Veyra attended both public and private schools . In 1888, he began studying at Colegio de San Juan de Letran in Manila , and graduated in 1993 with a Bachelor of Arts. In 1895, he began studying for a Bachelor of Law and a Bachelor of Philosophy and Letters at the University of Santo Tomas in Manila. He completed both degrees in 1898. Political career From 1888 to 1899 he served as secretary to the Military Governor of Leyte , General Ambrosio Moxica. In 1901 he was elected municipal councilor in the town of Cebu, and became municipal vice-president the following year. In 1903, he became president of the electoral assembly of Cebu. In 1904, de Veyra became Director of Liceo de Maasim, in Leyte, and served until 1905. In 1905, he became an editor for the Spanish-Tagalog language newspaper El Renacimiento. In 1906, de Veyra became Governor of Leyte, He served until 1907 , when he became a member of the first Philippine Assembly as the first representative of Leyte's Fourth District in the Philippine house of representatives . He served in the Assembly until 1913, when he became a member of the Philippine Commission 1913\u2013 1916. In 1916 , de Veyra was appointed executive secretary of the Philippine Islands under Governor-General Francis Burton Harrison, and served until 1917. In 1917 , de Veyra was elected to the U.S. House of Representatives as a Resident Commissioner of the Philippines. He reelected in 1920 and served from March 4, 1917, to March 3, 1923. He was declined to be a candidate for renomination in 1922. He engaged in journalistic work during 1923 he became head of the department of Spanish, University of the Philippines at Manila, 1925\u20131936. From 1937 to 1944. de Veyra was the director of the Institute of National Language. He also served as historical researcher in charge of manuscripts and publications, National Library and historical researcher, Office of the President, 1946.", "edit_actions": [{"type": "R", "before": "Tanauan, Province of Leyte, Philippine Islands", "after": "the town of Tanauan in Leyte province", "start_char_pos": 47, "end_char_pos": 93}, {"type": "R", "before": "and Law practice He attended", "after": "De Veyra attended both", "start_char_pos": 106, "end_char_pos": 134}, {"type": "R", "before": ", and he finished college", "after": ". In 1888, he began studying", "start_char_pos": 162, "end_char_pos": 187}, {"type": "R", "before": "in 1893. He studied law, philosophy, and letters in", "after": ", and graduated in 1993 with a Bachelor of Arts. In 1895, he began studying for a Bachelor of Law and a Bachelor of Philosophy and Letters at", "start_char_pos": 231, "end_char_pos": 282}, {"type": "R", "before": "at Manila1895\u20131897.", "after": "in Manila. He completed both degrees in 1898.", "start_char_pos": 313, "end_char_pos": 332}, {"type": "R", "before": "In 1898 and", "after": "From 1888 to", "start_char_pos": 350, "end_char_pos": 361}, {"type": "R", "before": ". He engaged in newspaper work. He was a member of the municipal council", "after": ", General Ambrosio Moxica.", "start_char_pos": 424, "end_char_pos": 496}, {"type": "A", "before": null, "after": "In 1901 he was elected municipal councilor in the town of Cebu, and became municipal vice-president the following year. In 1903, he became president of the electoral assembly", "start_char_pos": 497, "end_char_pos": 497}, {"type": "R", "before": "He became Governor of Leyte in 1906 and", "after": "In 1904, de Veyra became Director of Liceo de Maasim, in Leyte, and served until 1905.", "start_char_pos": 507, "end_char_pos": 546}, {"type": "A", "before": null, "after": "In 1905, he became an editor for the Spanish-Tagalog language newspaper El Renacimiento.", "start_char_pos": 547, "end_char_pos": 547}, {"type": "A", "before": null, "after": "In 1906, de Veyra became Governor of Leyte, He served until", "start_char_pos": 548, "end_char_pos": 548}, {"type": "R", "before": "and", "after": ", when he became", "start_char_pos": 554, "end_char_pos": 557}, {"type": "R", "before": "Philippine", "after": "first Philippine Assembly as the first representative of Leyte's Fourth District in the Philippine", "start_char_pos": 574, "end_char_pos": 584}, {"type": "R", "before": "1907\u20131909. He was", "after": ". He served in the Assembly until 1913, when he became", "start_char_pos": 610, "end_char_pos": 627}, {"type": "A", "before": null, "after": "1916.", "start_char_pos": 672, "end_char_pos": 672}, {"type": "A", "before": null, "after": "In", "start_char_pos": 673, "end_char_pos": 673}, {"type": "R", "before": "and", "after": ", de Veyra was appointed", "start_char_pos": 679, "end_char_pos": 682}, {"type": "R", "before": "in 1916 and", "after": "under Governor-General Francis Burton Harrison, and served until 1917.", "start_char_pos": 729, "end_char_pos": 740}, {"type": "A", "before": null, "after": "In", "start_char_pos": 741, "end_char_pos": 741}, {"type": "R", "before": "; elected as a Nationalist a Resident Commissioner to the United States in 1917; and was", "after": ", de Veyra was elected to the U.S. House of Representatives as a Resident Commissioner of the Philippines. He", "start_char_pos": 747, "end_char_pos": 835}], "sents_char_pos": [0, 239, 332, 425, 455, 506, 620, 748, 827, 902, 962, 1103, 1187]}
+{"doc_id": "47100745", "revision_depth": "1", "before_revision": "Mohammad Ali Tarbiat was born in 1877 in Nobar, east of Tabrizin north western Iran. He was from a family of scholar. His ancestor was an assistant of Nader Shah (1688-1747). He studied in Tabriz and among other subjects he was interested in biology and medicine . He was a teacher at Dar el Fonoun (University ) in Tabriz for two years. In 1904, he married Robabeh (sister of Hassan Taghizadeh) . They had four children two sons (Ardechir and Bahman) and two daughters (Farangis and Iran). In 1908, he was forced to exile following the dissolution of the Majlis (parliament) . He moved with his family to Istanbul. He went on several trips in Europe, particularly in London and in Berlin where his wife deceased. At the end of the first world war in Istanbul he married Hadjar, daughter of an employee of the Iranian embassy in Istanbul. They had two sons (Firouz and Behrouz). He returned to Tabriz in 1921, and was in charge of the organization for the education of the province of Azerbaidjan. He later became the mayor of Tabriz from 1928 to 1931. He was elected as a member of parliament from Tabriz from 1931 to 1940. He died on the 17 of January 1940 in Tehran . In early 1900 in Tabriz, with other young intellectuals, including Hassan Taghizadeh, he created a group of activist advocating for the westernisation of Iran . In 1905, he actively participated in the constitutional revolution. The Majlis (parliament) was created in 1906 , but, the constitutional revolution did not reach its goals and in 1908 , Mozzaferdin shah (Khajar dynasty) ordered the bombing of the Majlis and the parliament was dissolved . Exiled from 1908, he continued political activity. In Berlin, together with other prominent Iranian intellectuals he established the Komiteh-ye Iran (Committee of Iran), and published the influential periodical Kaveh (1916\u20131922), which was distributed in Europe as well as in Iran. Kaveh was a political and literary journalwhich emphasised the need for internal reforms and national independence of Iran from foreign country. 453x453px|Statue of Mohammad Ali Tarbiat in City of Tabriz Under the reign of Reza Shah Pahlavi, he was one of the founders of Iranian democratic party In early 1900 in Tabriz, with other young intellectuals, including Hassan Taghizadeh, he created a group of activist advocating for the westernisation of Iran. With the group created in 1900 he tries to transmit western culture to the youngster. They found the school Tarbiat , and its library with the aim of promoting sciences and foreign languages (French, English and Russian) as well as a newspaper and a printing project. All the project was abandoned faced with the opposition of reactionary forces, especially the clergy . Back in Tabriz, the different public functions he occupied allowed him to carry out a program promoting the culture and modernisation of the province of Azerbaijan (Iranian province) . In 1921 he created the first public library and reading room in Iran which was later renamed after him, the Tarbiat Library. He founded several schools, among them the not well accepted college for the girls . He created the first public garden in Tabriz . This garden is named Golestan, and is still well frequented by the people of Tabriz His statue was erected in Tabriz in 2015. Publications Mohammad Ali Tarbiat has written several articles in journals particularly in the journal Kaveh published in Berlin.", "after_revision": "Mohammad Ali Tarbiat was born in 1877 in Nobar, near Tabriz, (province of Azerbaijan, Iran) into a cultured family, an ancestor was secretary to Nader Shah (1688-1747). He predominantly studied natural sciences and medicine at Tabriz. He taught natural sciences for two years at Dar el Fonoun in the higher education establishment (university ) in Tabriz . In 1904, he married Robabeh (sister of Hassan Taghizadeh) from which he had four children , two sons (Ardechir and Bahman) , and two daughters (Farangis and Iran). Forced into exile after the dissolution of the Majlis (parliament) in 1908, he moved with his family to Istanbul. He undertook many trips to European capitals, chiefly London and Berlin where his wife deceased. At the end of World War I, he returned to Istanbul and married Hadjar, daughter of a Persian embassy employee, from which he had two sons (Firouz and Behrouz). He returns to Tabriz permanently in 1921.He was in charge of the organization of education of the Azerbaijan province, after which, he became mayor of Tabriz from 1928 to 1931. From 1931 to 1940 he was a member of the parliament elected by Tabriz population. January 17 , 1940 he expired in Teheran . In the beginning years of the 1900s, together with Hassan Taghizadeh, he formed a militant group with young intellectuals aimed to modernize and westernize the country . In 1905, he actively participated in the constitutional revolution. The Majlis (parliament) was founded in 1906 ; however, the constitutional revolution did not achieve its goals and in 1908 Mozzaffaredin Shah (Khadjar dynasty) had the Majlis bombarded resulting in the dissolving of the parliament . In exile from 1908, Mohammed Ali Tarbiat continued his political activity in Istanbul and Berlin. Together with Hassan Taghizadeh and other activists he participated to the creation of Komiteh-ye IRAN (committee of Iran), as well as , in the publication of the Kaveh newspaper. The paper was written in Persian and published in Berlin from 1916 to 1922. It was a cultural and political journal, which proclaimed the necessity to carry out reforms in Iran and to preserve, the independence of Iran from foreign powers. Under the reign of Reza Shah Pahlavi, Mohammad Ali Tarbiat was one of the founders of the Iranian democratic party (1930). Together with the group created in 1900 he tried to pass on Western culture to the young. They founded the Tarbiat school and its library , with the aim of promoting science and foreign languages (French, English and Russian) , as well as a newspaper and a printing project. Faced with the opposition of reactionary forces, particularly from the clergy, the project was abandoned . Back in Tabriz, the different functions he occupied permitted him to promote culture and modernization of the Azerbaijan province . In 1921 , he created the first reading room and public library in Iran. Presently still in use, today it bears the name Tarbiat public library He created many schools, including the highly contested high school for girls He created the first public garden in Iran . This garden , called Golestan, is still today visited by the inhabitants of Tabriz In 2015 a statue representing Mohammad Ali Tarbiat was erected in Tabriz Writings Mohammad Ali Tarbiat has written several articles in journals particularly in the journal Kaveh published in Berlin.", "edit_actions": [{"type": "R", "before": "east of Tabrizin north western Iran. He was from a family of scholar. His ancestor was an assistant of", "after": "near Tabriz, (province of Azerbaijan, Iran) into a cultured family, an ancestor was secretary to", "start_char_pos": 48, "end_char_pos": 150}, {"type": "R", "before": "studied in Tabriz and among other subjects he was interested in biology and medicine . He was a teacher", "after": "predominantly studied natural sciences and medicine at Tabriz.", "start_char_pos": 178, "end_char_pos": 281}, {"type": "A", "before": null, "after": "He taught natural sciences for two years", "start_char_pos": 282, "end_char_pos": 282}, {"type": "R", "before": "(University", "after": "in the higher education establishment (university", "start_char_pos": 300, "end_char_pos": 311}, {"type": "R", "before": "for two years.", "after": ".", "start_char_pos": 324, "end_char_pos": 338}, {"type": "R", "before": ". They", "after": "from which he", "start_char_pos": 397, "end_char_pos": 403}, {"type": "A", "before": null, "after": ",", "start_char_pos": 422, "end_char_pos": 422}, {"type": "A", "before": null, "after": ",", "start_char_pos": 454, "end_char_pos": 454}, {"type": "R", "before": "In 1908, he was forced to exile following", "after": "Forced into exile after", "start_char_pos": 494, "end_char_pos": 535}, {"type": "R", "before": ". He", "after": "in 1908, he", "start_char_pos": 579, "end_char_pos": 583}, {"type": "R", "before": "went on several trips in Europe, particularly in London and in", "after": "undertook many trips to European capitals, chiefly London and", "start_char_pos": 622, "end_char_pos": 684}, {"type": "R", "before": "the first world war in Istanbul he", "after": "World War I, he returned to Istanbul and", "start_char_pos": 731, "end_char_pos": 765}, {"type": "R", "before": "an employee of the Iranian embassy in Istanbul. They", "after": "a Persian embassy employee, from which he", "start_char_pos": 794, "end_char_pos": 846}, {"type": "R", "before": "returned to Tabriz in 1921, and", "after": "returns to Tabriz permanently in 1921.He", "start_char_pos": 885, "end_char_pos": 916}, {"type": "R", "before": "for the", "after": "of", "start_char_pos": 951, "end_char_pos": 958}, {"type": "R", "before": "province of Azerbaidjan. He later became the", "after": "Azerbaijan province, after which, he became", "start_char_pos": 976, "end_char_pos": 1020}, {"type": "R", "before": "He was elected as", "after": "From 1931 to 1940 he was", "start_char_pos": 1056, "end_char_pos": 1073}, {"type": "R", "before": "parliament from Tabriz from 1931 to 1940. He died on the", "after": "the parliament elected by Tabriz population. January", "start_char_pos": 1086, "end_char_pos": 1142}, {"type": "R", "before": "of January", "after": ",", "start_char_pos": 1146, "end_char_pos": 1156}, {"type": "R", "before": "in Tehran", "after": "he expired in Teheran", "start_char_pos": 1162, "end_char_pos": 1171}, {"type": "R", "before": "early 1900 in Tabriz, with other young intellectuals, including", "after": "the beginning years of the 1900s, together with", "start_char_pos": 1177, "end_char_pos": 1240}, {"type": "R", "before": "created a group of activist advocating for the westernisation of Iran", "after": "formed a militant group with young intellectuals aimed to modernize and westernize the country", "start_char_pos": 1263, "end_char_pos": 1332}, {"type": "R", "before": "created", "after": "founded", "start_char_pos": 1431, "end_char_pos": 1438}, {"type": "R", "before": ", but,", "after": "; however,", "start_char_pos": 1447, "end_char_pos": 1453}, {"type": "R", "before": "reach", "after": "achieve", "start_char_pos": 1492, "end_char_pos": 1497}, {"type": "R", "before": ", Mozzaferdin shah (Khajar dynasty) ordered the bombing of the Majlis and the parliament was dissolved", "after": "Mozzaffaredin Shah (Khadjar dynasty) had the Majlis bombarded resulting in the dissolving of the parliament", "start_char_pos": 1520, "end_char_pos": 1622}, {"type": "R", "before": "Exiled", "after": "In exile", "start_char_pos": 1625, "end_char_pos": 1631}, {"type": "R", "before": "he continued political activity. In Berlin, together with other prominent Iranian intellectuals he established the", "after": "Mohammed Ali Tarbiat continued his political activity in Istanbul and Berlin. Together with Hassan Taghizadeh and other activists he participated to the creation of", "start_char_pos": 1643, "end_char_pos": 1757}, {"type": "R", "before": "Iran (Committee", "after": "IRAN (committee", "start_char_pos": 1769, "end_char_pos": 1784}, {"type": "D", "before": "and published the influential periodical Kaveh (1916\u20131922), which was distributed in Europe", "after": null, "start_char_pos": 1795, "end_char_pos": 1886}, {"type": "R", "before": "in Iran. Kaveh was a political and literary journalwhich emphasised the need for internal reforms and national", "after": ", in the publication of the Kaveh newspaper. The paper was written in Persian and published in Berlin from 1916 to 1922. It was a cultural and political journal, which proclaimed the necessity to carry out reforms in Iran and to preserve, the", "start_char_pos": 1898, "end_char_pos": 2008}, {"type": "R", "before": "country. 453x453px|Statue of Mohammad Ali Tarbiat in City of Tabriz", "after": "powers.", "start_char_pos": 2043, "end_char_pos": 2110}, {"type": "R", "before": "he", "after": "Mohammad Ali Tarbiat", "start_char_pos": 2149, "end_char_pos": 2151}, {"type": "A", "before": null, "after": "the", "start_char_pos": 2179, "end_char_pos": 2179}, {"type": "A", "before": null, "after": "(1930).", "start_char_pos": 2205, "end_char_pos": 2205}, {"type": "D", "before": "In early 1900 in Tabriz, with other young intellectuals, including Hassan Taghizadeh, he created a group of activist advocating for the westernisation of Iran.", "after": null, "start_char_pos": 2206, "end_char_pos": 2365}, {"type": "R", "before": "With the", "after": "Together with the", "start_char_pos": 2366, "end_char_pos": 2374}, {"type": "R", "before": "tries to transmit western", "after": "tried to pass on Western", "start_char_pos": 2400, "end_char_pos": 2425}, {"type": "R", "before": "youngster. They found the school Tarbiat ,", "after": "young. They founded the Tarbiat school", "start_char_pos": 2441, "end_char_pos": 2483}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2500, "end_char_pos": 2500}, {"type": "R", "before": "sciences", "after": "science", "start_char_pos": 2527, "end_char_pos": 2535}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2588, "end_char_pos": 2588}, {"type": "R", "before": "All the project was abandoned faced", "after": "Faced", "start_char_pos": 2636, "end_char_pos": 2671}, {"type": "R", "before": "especially the clergy", "after": "particularly from the clergy, the project was abandoned", "start_char_pos": 2715, "end_char_pos": 2736}, {"type": "D", "before": "public", "after": null, "start_char_pos": 2769, "end_char_pos": 2775}, {"type": "R", "before": "allowed him to carry out a program promoting the culture and modernisation of the province of Azerbaijan (Iranian province)", "after": "permitted him to promote culture and modernization of the Azerbaijan province", "start_char_pos": 2798, "end_char_pos": 2921}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2932, "end_char_pos": 2932}, {"type": "R", "before": "public library and reading room in Iran which was later renamed after him, the Tarbiat Library.", "after": "reading room and public library in Iran. Presently still in use, today it bears the name Tarbiat public library", "start_char_pos": 2954, "end_char_pos": 3049}, {"type": "R", "before": "founded several schools, among them the not well accepted college for the girls .", "after": "created many schools, including the highly contested high school for girls", "start_char_pos": 3053, "end_char_pos": 3134}, {"type": "R", "before": "Tabriz", "after": "Iran", "start_char_pos": 3173, "end_char_pos": 3179}, {"type": "R", "before": "is named Golestan, and is still well frequented by the people", "after": ", called Golestan, is still today visited by the inhabitants", "start_char_pos": 3194, "end_char_pos": 3255}, {"type": "R", "before": "His statue", "after": "In 2015 a statue representing Mohammad Ali Tarbiat", "start_char_pos": 3266, "end_char_pos": 3276}, {"type": "D", "before": "in 2015.", "after": null, "start_char_pos": 3299, "end_char_pos": 3307}, {"type": "R", "before": "Publications", "after": "Writings", "start_char_pos": 3308, "end_char_pos": 3320}], "sents_char_pos": [0, 84, 117, 174, 264, 338, 398, 493, 580, 618, 716, 841, 881, 1000, 1055, 1127, 1173, 1334, 1402, 1675, 1906, 2365, 2451, 2635, 2923, 3049, 3134, 3181, 3307]}
+{"doc_id": "47101011", "revision_depth": "1", "before_revision": "Gerardo R\u00f3xas (fl. estimated between 1839 and 1887 \u2013 April 21, 1891 on Panay, URL was the father of Manuel A. R\u00f3xas , the fifth President of the Philippines. R\u00f3xas was also the great-grandfather of former senator and Secretary of Interior and Local Government, Mar R\u00f3xas . R\u00f3xas served as a military soldier and servant in the Spanish Colonial Era in the Philippines. Early life R\u00f3xas was born to Antonio R\u00f3xas II in Capiz, Panay Island. He was a grandson of Caetano R\u00f3xas and the great-grandson of Juan R\u00f3xas y Arroyo (the son of Antonio R\u00f3xas y Ureta and Lucina Arroyo). Personal life and death R\u00f3xas was married to Rosario Acu\u00f1a y Villarruz. The couple had four children - Mamerto, Manuel, Leopoldo and Margarita. Manuel was a posthumous child, as R\u00f3xas had died after having been mortally wounded by Spanish Guardia Civil before Manuel was born. Lineage R\u00f3xas was a descendant of Antonio R\u00f3xas y Ureta, the brother of Domingo R\u00f3xas y Ureta (who was a progenitor of the R\u00f3xas de Ayala and Z\u00f3bel de Ayala clans). Antonio R\u00f3xas y Ureta - second great-grandfather Juan R\u00f3xas y Arroyo - great-grandfather Caetano R\u00f3xas - grandfather Antonio R\u00f3xas II - father Gerardo R\u00f3xas Manuel A. R\u00f3xas (1892 \u2013 1948) - son; Philippine president Gerardo Manuel R\u00f3xas (\"Gerry\") (1924 \u2013 1982) - grandson; Philippine senator Manuel R\u00f3xas II (\"Mar\") (b. 1957) - great-grandson; Philippine senator, former DILG secretary Gerardo R\u00f3xas , Jr. (\"Dinggoy\") (1960 \u2013 1993) - great-grandson; Philippine congressman", "after_revision": "Gerardo Roxas (fl. estimated between 1839 and 1887 \u2013 April 21, 1891 on Panay, URL was the father of Manuel Roxas , the fifth President of the Philippines. Roxas was also the great-grandfather of former senator and Secretary of Interior and Local Government, Mar Roxas . Roxas served as a military soldier and servant in the Spanish Colonial Era in the Philippines. Early life Roxas was born to Antonio Roxas II in Capiz, Panay Island. He was a grandson of Caetano Roxas and the great-grandson of Juan Roxas y Arroyo (the son of Antonio Roxas y Ureta and Lucina Arroyo). Personal life and death Roxas was married to Rosario Acu\u00f1a y Villarruz. The couple had four children - Mamerto, Manuel, Leopoldo and Margarita. Manuel was a posthumous child, as Roxas had died after having been mortally wounded by Spanish Guardia Civil before Manuel was born. Lineage Roxas was a descendant of Antonio Roxas y Ureta, the brother of Domingo Roxas y Ureta (who was a progenitor of the Roxas de Ayala and Zobel de Ayala clans). Antonio Roxas y Ureta - second great-grandfather Juan Roxas y Arroyo - great-grandfather Caetano Roxas - grandfather Antonio Roxas II - father Gerardo Roxas Manuel A. Roxas (1892 \u2013 1948) - son; Philippine president Gerardo Manuel Roxas (\"Gerry\") (1924 \u2013 1982) - grandson; Philippine senator Manuel Roxas II (\"Mar\") (b. 1957) - great-grandson; Philippine senator, former DILG secretary Gerardo Roxas , Jr. (\"Dinggoy\") (1960 \u2013 1993) - great-grandson; Philippine congressman", "edit_actions": [{"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 8, "end_char_pos": 13}, {"type": "R", "before": "A. R\u00f3xas", "after": "Roxas", "start_char_pos": 107, "end_char_pos": 115}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 158, "end_char_pos": 163}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 265, "end_char_pos": 270}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 273, "end_char_pos": 278}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 379, "end_char_pos": 384}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 405, "end_char_pos": 410}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 467, "end_char_pos": 472}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 504, "end_char_pos": 509}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 539, "end_char_pos": 544}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 597, "end_char_pos": 602}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 751, "end_char_pos": 756}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 858, "end_char_pos": 863}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 892, "end_char_pos": 897}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 930, "end_char_pos": 935}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 973, "end_char_pos": 978}, {"type": "R", "before": "Z\u00f3bel", "after": "Zobel", "start_char_pos": 992, "end_char_pos": 997}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 1023, "end_char_pos": 1028}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 1069, "end_char_pos": 1074}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 1112, "end_char_pos": 1117}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 1140, "end_char_pos": 1145}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 1166, "end_char_pos": 1171}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 1182, "end_char_pos": 1187}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 1245, "end_char_pos": 1250}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 1313, "end_char_pos": 1318}, {"type": "R", "before": "R\u00f3xas", "after": "Roxas", "start_char_pos": 1408, "end_char_pos": 1413}], "sents_char_pos": [0, 157, 367, 437, 572, 644, 716, 849, 1014, 1208, 1286, 1357, 1463]}
+{"doc_id": "47158595", "revision_depth": "1", "before_revision": "In formal concept analysis (FCA) and closure system attributesare analyzed via their (simultaneous) occurrences (= objects). The implicational analysis deals with algorithms to find a minimal set of rules, by which attributes can be inferred from others (implications) . Definition A pair of sets is an implication. and . U is the premise and V is the conclusion . stands for attributes. A set W respects , if . Implications by Ganter and Stumme Implications in a Concept Lattice holds in a concept lattice, if every intent respects it. This is true if%DIFDELCMD < %DIFDELCMD < %%% iff . iff . An implication follows semantically from a set L of implications, if each subset of respecting L also respects . L is closed, if it contains all implications that follow from L. A set L of implications that hold in a context is called sound. It is called complete if every implications that holds in the context follows from L. L is non-redundant if implications that follow from L are not in L.%DIFDELCMD < %DIFDELCMD < %%% If L is a set of implications, then is a closure system. Implication Basis%DIFDELCMD < %DIFDELCMD < %%% Let be a closure operator then P is pseudo-closed if The set is sound, complete and non-redundant. It is called Duquenne-Guiges-Basis (D-G-basis)or Stem basis.%DIFDELCMD < %DIFDELCMD < %%% There cannot be a implication basis with less implications than the Duquenne-Guiges-Basis, but one can choose implications that are simpler regarding .Such implications are with and .Endliche H\u00fcllensysteme und ihre Implikationenbasen (Finite hull systems and their implications)", "after_revision": "In formal concept analysis (FCA) implications relate sets of properties or attributes . An implication A\u2192B holds in a given domain when every object having all attributes in A also has all attributes in B. Such implications characterize the concept hierarchy in an intuitive manner. Moreover, they are \"well-behaved\" with respect to algorithms. The knowledge acquisition method called attribute exploration uses implications.Ganter, Bernhard and Obiedkov, Sergei (2016) Conceptual Exploration. Springer, Definitions An implication A\u2192B is simply a pair of sets A\u2286M, B\u2286M, where M is the set of attributes under consideration. A is the premise and B is the conclusion of the implication A\u2192B . A set C respects the implication A\u2192B when \u00ac(C\u2286A) or C\u2286B . In formal concept analysis a formal context is a triple (G,M,I), where G and M are sets (of objects and attributes, respectively), and where I\u2286G\u00d7M is a relation expressing which objects have which attributes. An implication which holds in such a formal context is called a valid implication for short. That an implication is valid can be expressed by the derivation operators: A\u2192B holds in (G,M,I) iff A\u2032 \u2286 B\u2032 or, equivalently, iff B\u2286A\". Ganter, Bernhard and Wille, Rudolf (1999) Formal Concept Analysis -- Mathematical Foundations. Springer, %DIFDELCMD < %DIFDELCMD < %%% Implications and formal concepts A set C of attributes is a concept intent if and only if C respects all valid implications. The system of all valid implications therefore suffices for constructing the closure system of all concept intents and thereby the concept hierarchy . %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% The system of all valid implications of a formal context is closed under the natural inference. Formal contexts with finitely many attributes possess a canonical basis of valid implications,Guigues, J.L. and Duquenne, V. Familles minimales d'implications informatives r\u00e9sultant d'un tableau de donn\u00e9es binaires. Math\u00e9matiques et Sciences Humaines 95 (1986): 5-18. i.e., an irredundant family of valid implications from with all valid implications can be inferred. This basis consists of all implications of the form P\u2192P\", where P is a pseudo-intent, i.e., a pseudo-closed %DIFDELCMD < %DIFDELCMD < %%% set in the closure system of intents. See for algorithms.", "edit_actions": [{"type": "R", "before": "and closure system attributesare analyzed via their (simultaneous) occurrences (= objects). The implicational analysis deals with algorithms to find a minimal set of rules, by which attributes can be inferred from others (implications)", "after": "implications relate sets of properties or attributes", "start_char_pos": 33, "end_char_pos": 268}, {"type": "A", "before": null, "after": "An implication A\u2192B holds in a given domain when every object having all attributes in A also has all attributes in B. Such implications characterize the concept hierarchy in an intuitive manner. Moreover, they are \"well-behaved\" with respect to algorithms. The knowledge acquisition method called attribute exploration uses implications.Ganter, Bernhard and Obiedkov, Sergei (2016) Conceptual Exploration. Springer,", "start_char_pos": 271, "end_char_pos": 271}, {"type": "D", "before": "Definition", "after": null, "start_char_pos": 272, "end_char_pos": 282}, {"type": "R", "before": "A", "after": "Definitions An implication A\u2192B is simply a", "start_char_pos": 283, "end_char_pos": 284}, {"type": "A", "before": null, "after": "A\u2286M, B\u2286M, where M is the set of attributes under consideration. A", "start_char_pos": 298, "end_char_pos": 298}, {"type": "D", "before": "an implication. and . U is", "after": null, "start_char_pos": 302, "end_char_pos": 328}, {"type": "R", "before": "V", "after": "B", "start_char_pos": 345, "end_char_pos": 346}, {"type": "A", "before": null, "after": "of the implication A\u2192B . A set C respects the implication A\u2192B when \u00ac(C\u2286A) or C\u2286B", "start_char_pos": 365, "end_char_pos": 365}, {"type": "D", "before": "stands for attributes.", "after": null, "start_char_pos": 368, "end_char_pos": 390}, {"type": "D", "before": "A set W respects , if .", "after": null, "start_char_pos": 391, "end_char_pos": 414}, {"type": "R", "before": "Implications by Ganter and Stumme", "after": "In formal concept analysis a formal context is a triple (G,M,I), where G and M are sets (of objects and attributes, respectively), and where I\u2286G\u00d7M is a relation expressing which objects have which attributes. An implication which holds in such a formal context is called a valid implication for short. That an implication is valid can be expressed by the derivation operators: A\u2192B holds in (G,M,I) iff A\u2032 \u2286 B\u2032 or, equivalently, iff B\u2286A\". Ganter, Bernhard and Wille, Rudolf (1999) Formal Concept Analysis -- Mathematical Foundations. Springer,", "start_char_pos": 415, "end_char_pos": 448}, {"type": "D", "before": "Implications in a Concept Lattice", "after": null, "start_char_pos": 449, "end_char_pos": 482}, {"type": "D", "before": "holds in a concept lattice, if every intent respects it. This is true if", "after": null, "start_char_pos": 483, "end_char_pos": 555}, {"type": "R", "before": "iff", "after": "Implications and formal concepts A set C of attributes is a concept intent if and only if C respects all valid implications. The system of all valid implications therefore suffices for constructing the closure system of all concept intents and thereby the concept hierarchy", "start_char_pos": 585, "end_char_pos": 588}, {"type": "D", "before": "iff .", "after": null, "start_char_pos": 591, "end_char_pos": 596}, {"type": "D", "before": "An implication follows semantically from a set L of implications, if each subset of respecting L also respects . L is closed, if it contains all implications that follow from L.", "after": null, "start_char_pos": 597, "end_char_pos": 774}, {"type": "D", "before": "A set L of implications that hold in a context is called sound. It is called complete if every implications that holds in the context follows from L. L is non-redundant if implications that follow from L are not in L.", "after": null, "start_char_pos": 775, "end_char_pos": 992}, {"type": "D", "before": "If L is a set of implications, then is a closure system.", "after": null, "start_char_pos": 1022, "end_char_pos": 1078}, {"type": "D", "before": "Implication Basis", "after": null, "start_char_pos": 1079, "end_char_pos": 1096}, {"type": "R", "before": "Let be a closure operator then P is", "after": "The system of all valid implications of a formal context is closed under the natural inference. Formal contexts with finitely many attributes possess a canonical basis of valid implications,Guigues, J.L. and Duquenne, V. Familles minimales d'implications informatives r\u00e9sultant d'un tableau de donn\u00e9es binaires. Math\u00e9matiques et Sciences Humaines 95 (1986): 5-18. i.e., an irredundant family of valid implications from with all valid implications can be inferred. This basis consists of all implications of the form P\u2192P\", where P is a pseudo-intent, i.e., a", "start_char_pos": 1126, "end_char_pos": 1161}, {"type": "D", "before": "if", "after": null, "start_char_pos": 1176, "end_char_pos": 1178}, {"type": "D", "before": "The set is sound, complete and non-redundant. It is called Duquenne-Guiges-Basis (D-G-basis)or Stem basis.", "after": null, "start_char_pos": 1179, "end_char_pos": 1285}, {"type": "R", "before": "There cannot be a implication basis with less implications than the Duquenne-Guiges-Basis, but one can choose implications that are simpler regarding .Such implications are with and .Endliche H\u00fcllensysteme und ihre Implikationenbasen (Finite hull systems and their implications)", "after": "set in the closure system of intents. See for algorithms.", "start_char_pos": 1315, "end_char_pos": 1593}], "sents_char_pos": [0, 124, 270, 323, 390, 539, 596, 838, 1078, 1224, 1285, 1466, 1498]}
+{"doc_id": "473867", "revision_depth": "1", "before_revision": "List of Governors of Fiji (1874\u20131970) alt=|border|25x25px Governor of Fiji alt=|border|25x25px\u2116NamePortraitTenureMonarchTook officeLeft officeColony of Fiji 1. Sir Hercules Robinson 60px 10 October 1874 June 187585x85px Victoria 2. Sir Arthur Hamilton-Gordon 60px 19 August 1875 1880 3. Sir William Des V\u0153ux 60px 20 December 1880 21 January 1885\u2013 John Bates Thurston 60px 21 January 1885 1 January 1887 4. Sir Charles Mitchell 60px 1 January 1887 February 1888 5. Sir John Bates Thurston 60px February 1888 7 February 1897 6. Sir George T. M. O'Brien 60px March 1897 1901\u2013 Sir William Allardyce 60px 1901 10 September 190285x85px Edward VII 7. Sir Henry Jackson61x61px 10 September 1902 11 October 1904 8. Sir Everard im Thurn60x60px 11 October 1904 1910\u2013 Sir Charles Major60x60px 1910 21 February 191185x85px George V 9. Sir Francis May60px 21 February 1911 25 July 1912 10. Sir Ernest Sweet-Escott60x60px 25 July 1912 10 October 1918\u2013 Sir Eyre Hutson60x60px 1915 1916 11. Sir Cecil Hunter-Rodwell60x60px 10 October 1918 25 April 1925\u2013 Sir Eyre Hutson60x60px 1919 1919 12. Sir Eyre Hutson60x60px 25 April 1925 22 November 1929 13. Sir Murchison Fletcher60x60px 22 November 1929 May 193681x81px Edward VIII\u2013 Sir Cecil Barton60x60px May 1936 November 1936 14. Sir Arthur Richards60x60px 28 November 1936 August 193883x83px George VI\u2013 Sir Cecil Barton60x60px August 1938 September 1938 15. Sir Harry Luke60x60px 16 September 1938 21 July 1942 16. Sir Philip Mitchell60x60px 21 July 1942 12 January 1944\u2013 Sir John Rankine60x60px 12 January 1944 4 May 1944\u2013 Sir John Nicoll80x80px 4 May 1944 23 October 1944\u2013 Sir John Rankine60x60px 23 October 1944 1 January 1945 17. Sir Alexander Grantham60x60px 1 January 1945 21 March 1947\u2013 Sir John Nicoll80x80px 21 March 1947 8 October 1947 18. Sir Brian Freeston60x60px 8 October 1947 6 October 195279x79px Elizabeth II 19. Sir Ronald Garvey60x60px 6 October 1952 28 October 1958 20. Sir Kenneth Maddocks60x60px 28 October 1958 6 January 1964 21. Sir Derek Jakeway60x60px 6 January 1964 December 1968 22. Sir Robert Sidney Foster60x60px December 1968 10 October 1970", "after_revision": "List of Governors of Fiji (1874\u20131970) alt=|border|25x25px Governor of Fiji alt=|border|25x25px\u2116NamePortraitTenureMonarchTook officeLeft officeColony of Fiji 1. Sir Hercules Robinson 60px 10 October 1874 June 1875 70pxVictoria 2. Sir Arthur Hamilton-Gordon 60px 19 August 1875 1880 3. Sir William Des V\u0153ux 60px 20 December 1880 21 January 1885\u2013 John Bates Thurston 60px 21 January 1885 1 January 1887 4. Sir Charles Mitchell 60px 1 January 1887 February 1888 5. Sir John Bates Thurston 60px February 1888 7 February 1897 6. Sir George T. M. O'Brien 60px March 1897 1901\u2013 Sir William Allardyce 60px 1901 10 September 1902 70px Edward VII 7. Sir Henry Jackson 60px 10 September 1902 11 October 1904 8. Sir Everard im Thurn 60px 11 October 1904 1910\u2013 Sir Charles Major 60px 1910 21 February 1911 70pxGeorge V 9. Sir Francis May 60px 21 February 1911 25 July 1912 10. Sir Ernest Sweet-Escott 60px 25 July 1912 10 October 1918\u2013 Sir Eyre Hutson 60px 1915 1916 11. Sir Cecil Hunter-Rodwell 60px 10 October 1918 25 April 1925\u2013 Sir Eyre Hutson 60px 1919 1919 12. Sir Eyre Hutson 60px 25 April 1925 22 November 1929 13. Sir Murchison Fletcher 60px 22 November 1929 May 1936 70pxEdward VIII\u2013 Sir Cecil Barton 60px May 1936 November 1936 14. Sir Arthur Richards 60px 28 November 1936 August 1938 70pxGeorge VI\u2013 Sir Cecil Barton 60px August 1938 September 1938 15. Sir Harry Luke 60px 16 September 1938 21 July 1942 16. Sir Philip Mitchell 60px 21 July 1942 12 January 1944\u2013 Sir John Rankine 60px 12 January 1944 4 May 1944\u2013 Sir John Nicoll 60px 4 May 1944 23 October 1944\u2013 Sir John Rankine 60px 23 October 1944 1 January 1945 17. Sir Alexander Grantham 60px 1 January 1945 21 March 1947\u2013 Sir John Nicoll 60px 21 March 1947 8 October 1947 18. Sir Brian Freeston 60px 8 October 1947 6 October 1952 70pxElizabeth II 19. Sir Ronald Garvey 60px 6 October 1952 28 October 1958 20. Sir Kenneth Maddocks 60px 28 October 1958 6 January 1964 21. Sir Derek Jakeway 60px 6 January 1964 December 1968 22. Sir Robert Sidney Foster 60px December 1968 10 October 1970", "edit_actions": [{"type": "R", "before": "187585x85px Victoria", "after": "1875 70pxVictoria", "start_char_pos": 208, "end_char_pos": 228}, {"type": "R", "before": "190285x85px", "after": "1902 70px", "start_char_pos": 618, "end_char_pos": 629}, {"type": "R", "before": "Jackson61x61px", "after": "Jackson 60px", "start_char_pos": 654, "end_char_pos": 668}, {"type": "R", "before": "Thurn60x60px", "after": "Thurn 60px", "start_char_pos": 721, "end_char_pos": 733}, {"type": "R", "before": "Major60x60px", "after": "Major 60px", "start_char_pos": 768, "end_char_pos": 780}, {"type": "R", "before": "191185x85px George", "after": "1911 70pxGeorge", "start_char_pos": 798, "end_char_pos": 816}, {"type": "R", "before": "May60px", "after": "May 60px", "start_char_pos": 834, "end_char_pos": 841}, {"type": "R", "before": "Sweet-Escott60x60px", "after": "Sweet-Escott 60px", "start_char_pos": 887, "end_char_pos": 906}, {"type": "R", "before": "Hutson60x60px", "after": "Hutson 60px", "start_char_pos": 946, "end_char_pos": 959}, {"type": "R", "before": "Hunter-Rodwell60x60px", "after": "Hunter-Rodwell 60px", "start_char_pos": 984, "end_char_pos": 1005}, {"type": "R", "before": "Hutson60x60px", "after": "Hutson 60px", "start_char_pos": 1046, "end_char_pos": 1059}, {"type": "R", "before": "Hutson60x60px", "after": "Hutson 60px", "start_char_pos": 1083, "end_char_pos": 1096}, {"type": "R", "before": "Fletcher60x60px", "after": "Fletcher 60px", "start_char_pos": 1146, "end_char_pos": 1161}, {"type": "R", "before": "193681x81px Edward", "after": "1936 70pxEdward", "start_char_pos": 1183, "end_char_pos": 1201}, {"type": "R", "before": "Barton60x60px", "after": "Barton 60px", "start_char_pos": 1218, "end_char_pos": 1231}, {"type": "R", "before": "Richards60x60px", "after": "Richards 60px", "start_char_pos": 1270, "end_char_pos": 1285}, {"type": "R", "before": "193883x83px George", "after": "1938 70pxGeorge", "start_char_pos": 1310, "end_char_pos": 1328}, {"type": "R", "before": "Barton60x60px", "after": "Barton 60px", "start_char_pos": 1343, "end_char_pos": 1356}, {"type": "R", "before": "Luke60x60px", "after": "Luke 60px", "start_char_pos": 1398, "end_char_pos": 1409}, {"type": "R", "before": "Mitchell60x60px", "after": "Mitchell 60px", "start_char_pos": 1456, "end_char_pos": 1471}, {"type": "R", "before": "Rankine60x60px", "after": "Rankine 60px", "start_char_pos": 1511, "end_char_pos": 1525}, {"type": "R", "before": "Nicoll80x80px", "after": "Nicoll 60px", "start_char_pos": 1563, "end_char_pos": 1576}, {"type": "R", "before": "Rankine60x60px", "after": "Rankine 60px", "start_char_pos": 1614, "end_char_pos": 1628}, {"type": "R", "before": "Grantham60x60px", "after": "Grantham 60px", "start_char_pos": 1678, "end_char_pos": 1693}, {"type": "R", "before": "Nicoll80x80px", "after": "Nicoll 60px", "start_char_pos": 1733, "end_char_pos": 1746}, {"type": "R", "before": "Freeston60x60px", "after": "Freeston 60px", "start_char_pos": 1790, "end_char_pos": 1805}, {"type": "R", "before": "195279x79px Elizabeth", "after": "1952 70pxElizabeth", "start_char_pos": 1831, "end_char_pos": 1852}, {"type": "R", "before": "Garvey60x60px", "after": "Garvey 60px", "start_char_pos": 1871, "end_char_pos": 1884}, {"type": "R", "before": "Maddocks60x60px", "after": "Maddocks 60px", "start_char_pos": 1932, "end_char_pos": 1947}, {"type": "R", "before": "Jakeway60x60px", "after": "Jakeway 60px", "start_char_pos": 1993, "end_char_pos": 2007}, {"type": "R", "before": "Foster60x60px", "after": "Foster 60px", "start_char_pos": 2059, "end_char_pos": 2072}], "sents_char_pos": [0, 159, 173, 187, 198, 220, 232, 243, 259, 274, 287, 299, 313, 325, 341, 352, 367, 383, 875, 973, 1258, 1387, 1444, 1663, 1779, 1859, 1919, 1982, 2040]}
+{"doc_id": "4921308", "revision_depth": "1", "before_revision": "In other media Television The Mark Scarlotti version of Blacklash appeared in the 1990s Iron Man animated series, voiced initially by James Avery and later by Dorian Harewood. This incarnation is a servant of the Mandarin and competes with Dreadknight for Hypnotia's attention. A version of Whiplash appears in the Iron Man: Armored Adventures animated series, voiced by Peter Kelamis. This version is the cybernetic hitman of inventor/arms dealer Mr. Fix . He appears in the episodes \"Whiplash\", \"Man and Iron Man\", \"Invincible Iron Man: Disassembled\", \"Invincible Iron Man: Reborn\", \"Titanium vs. Iron\", and \"Hostile Takeover\". In the episode \"The Hammer Falls\", Justin Hammer claims he ordered Titanium Man to drop Whiplash into a car compactor under the belief the hitman was blackmailing him. The unnamed female version of Whiplash makes a cameo appearance in The Avengers: Earth's Mightiest Heroes animated series episode \"Breakout, Part 1\". She is seen as an inmate at the Vault before it loses power, allowing her and the other inmates to escape. The Anton Vanko version of Whiplash appears in the animated special Phineas and Ferb: Mission Marvel, voiced by Peter Stormare.PHINEAS AND FERB: MISSION MARVEL DEBUT DATE ANNOUNCED A variation of Mark Scarlotti named Marcus Scarlotti appears in the live-action MCU television series Agents of S.H.I.E.L.D. episode \"A Fractured House\", portrayed by Falk Hentschel.Declassifying Marvel's Agents of S.H.I.E.L.D.: A Fractured House \u2013 See what Hydra is planning in an upcoming episode of 'Marvel's Agents of S.H.I.E.L.D.'! This version is a Hydra-aligned mercenary who wields a whip-like weapon in battle. Scarlotti was sent by Daniel Whitehall to lead a team of Hydra agents posing as S.H.I.E.L.D. agents to attack the United Nations, disintegrating several delegates with splinter bombs and nearly killing Brigadier General Glenn Talbot in the process. Scarlotti and his team later took over a S.H.I.E.L.D. safehouse before engaging and being defeated by Melinda May, Bobbi Morse, and Lance Hunter . The Hydra agents were subsequently arrested by Talbot and the U.S. military. A younger version of the MCU incarnation of Anton Vanko appears in the live-action series Agent Carter, portrayed by Costa Ronin.Costa Ronin Joins Marvel's Agent Carter \u2013 Ronin cast as a familiar Marvel Cinematic Universe villain's father! The Anton Vanko version of Whiplash appears in the Avengers Assemble animated series episode \"The Conqueror\", voiced by Troy Baker. He attacks and ensnares the Avengers with whips that A.I.M. upgraded using Kang the Conqueror's futuristic technology. However, the Hulk manages to break free and defeat Whiplash with Black Widow's help. Film Mickey Rourke portrays Ivan Antonovich Vanko, an original character based on Whiplash and the Crimson Dynamo, and the son of Anton Vanko in the live-action Marvel Cinematic Universe film, Iron Man 2. A ruthless technological genius bent on ruining Tony Stark, he works alongside Justin Hammer and wields a pair of metal, electrified whips. Vanko is depicted as being very manipulative, particularly towards Hammer, while also being physically strong. He has two confrontations with Stark; the first time while wearing a harness for his whips and the second with full body armor. He is defeated by Iron Man and War Machine during the second encounter, and tries unsuccessfully to use his armor's self-destruct to take them with him. Video games The Mark Scarlotti version of Whiplash appears as a boss in the Iron Man video game, based on the 2008 film of the same name, voiced by Zach McGowan. This version possesses rigid energy-charged whips and can generate a shield. The Anton Vanko version of Whiplash appears as a boss in the Facebook game Marvel: Avengers Alliance. The Anton Vanko version of Whiplash appears in Lego Marvel Super Heroes, voiced by John DiMaggio. The MCU incarnation of Whiplash appears as a playable character in Marvel: Future URL", "after_revision": "In other media Television The Mark Scarlotti incarnation of Blacklash appeared in the 1990s Iron Man animated series, voiced initially by James Avery and later by Dorian Harewood. This version is a servant of the Mandarin and competes with Dreadknight for Hypnotia's attention. A variation of Whiplash appears in the Iron Man: Armored Adventures animated series, voiced by Peter Kelamis. This version is the cybernetic hitman of inventor/arms dealer Mr. Fix in season one and an enforcer for Justin Hammer in season two . He appears in the episodes \"Whiplash\", \"Man and Iron Man\", \"Invincible Iron Man: Disassembled\", \"Invincible Iron Man: Reborn\", \"Titanium vs. Iron\", and \"Hostile Takeover\". In the episode \"The Hammer Falls\", Hammer claims he ordered Titanium Man to drop Whiplash into a car compactor under the belief the hitman was blackmailing him. The unnamed female incarnation of Whiplash makes a cameo appearance in The Avengers: Earth's Mightiest Heroes animated series episode \"Breakout, Part 1\". She is seen as an inmate at the Vault before it loses power, allowing her and the other inmates to escape. The Anton Vanko incarnation of Whiplash appears in the animated special Phineas and Ferb: Mission Marvel, voiced by Peter Stormare.PHINEAS AND FERB: MISSION MARVEL DEBUT DATE ANNOUNCED The Anton Vanko incarnation of Whiplash appears in the Avengers Assemble animated series episode \"The Conqueror\", voiced by Troy Baker. He attacks and ensnares the Avengers with whips that A.I.M. upgraded using Kang the Conqueror's futuristic technology. However, the Hulk manages to break free and defeat Whiplash with Black Widow's help. Marvel Cinematic Universe Several individuals based on the various comics incarnations of Whiplash appear in live-action media set in the Marvel Cinematic Universe. Mickey Rourke portrays Ivan Antonovich Vanko, an original character based on Whiplash and the Crimson Dynamo who is the son of Anton Vanko and appears in the film, Iron Man 2. A ruthless technological genius bent on ruining Tony Stark, he works alongside Justin Hammer and wields a pair of metal, electrified whips. Ivan is depicted as being very manipulative, particularly towards Hammer, while also being physically strong. He has two confrontations with Stark; the first time while wearing a harness for his whips and the second with full body armor. He is defeated by Iron Man and War Machine during the second encounter, and tries unsuccessfully to use his armor's self-destruct to take them with him. Anton Vanko (portrayed by Evgeniy Lazarev) also appears in Iron Man 2 as a scientist who worked with Howard Stark to invent the Arc Reactor in the 1960s, only to be deported back to the Soviet Union after being caught selling stolen patents on the black market and being sent to the Gulag. His death in the present sparks Ivan's quest for vengeance. Additionally, a younger version of Anton appears in the television series Agent Carter, portrayed by Costa Ronin.Costa Ronin Joins Marvel's Agent Carter \u2013 Ronin cast as a familiar Marvel Cinematic Universe villain's father! A variation of Mark Scarlotti named Marcus Scarlotti appears in the Agents of S.H.I.E.L.D. television series episode \"A Fractured House\", portrayed by Falk Hentschel.Declassifying Marvel's Agents of S.H.I.E.L.D.: A Fractured House \u2013 See what Hydra is planning in an upcoming episode of 'Marvel's Agents of S.H.I.E.L.D.'! This version is a Hydra-aligned mercenary who wields a whip-like weapon in battle. Scarlotti is sent by Daniel Whitehall to lead a team of Hydra agents posing as S.H.I.E.L.D. agents to attack the United Nations, disintegrating several delegates with splinter bombs and nearly killing Brigadier General Glenn Talbot in the process. Scarlotti and his team later take over a S.H.I.E.L.D. safehouse before engaging and being defeated by Melinda May, Bobbi Morse, and Lance Hunter in battle . The Hydra agents are subsequently arrested by Talbot and the U.S. military. Video games The Mark Scarlotti incarnation of Whiplash appears as a boss in the 2008 Iron Man film tie-in game, voiced by Zach McGowan. This version possesses rigid energy-charged whips and can generate a shield. The Anton Vanko incarnation of Whiplash appears as a boss in the Facebook game Marvel: Avengers Alliance. The Anton Vanko incarnation of Whiplash appears in Lego Marvel Super Heroes, voiced by John DiMaggio. The MCU incarnation of Whiplash appears as a playable character in Marvel: Future URL", "edit_actions": [{"type": "R", "before": "version", "after": "incarnation", "start_char_pos": 45, "end_char_pos": 52}, {"type": "R", "before": "incarnation", "after": "version", "start_char_pos": 181, "end_char_pos": 192}, {"type": "R", "before": "version", "after": "variation", "start_char_pos": 280, "end_char_pos": 287}, {"type": "A", "before": null, "after": "in season one and an enforcer for Justin Hammer in season two", "start_char_pos": 456, "end_char_pos": 456}, {"type": "D", "before": "Justin", "after": null, "start_char_pos": 666, "end_char_pos": 672}, {"type": "R", "before": "version", "after": "incarnation", "start_char_pos": 818, "end_char_pos": 825}, {"type": "R", "before": "version", "after": "incarnation", "start_char_pos": 1072, "end_char_pos": 1079}, {"type": "R", "before": "A", "after": "The Anton Vanko incarnation of Whiplash appears in the Avengers Assemble animated series episode \"The Conqueror\", voiced by Troy Baker. He attacks and ensnares the Avengers with whips that A.I.M. upgraded using Kang the Conqueror's futuristic technology. However, the Hulk manages to break free and defeat Whiplash with Black Widow's help.", "start_char_pos": 1237, "end_char_pos": 1238}, {"type": "A", "before": null, "after": "Marvel Cinematic Universe Several individuals based on the various comics incarnations of Whiplash appear in live-action media set in the Marvel Cinematic Universe. Mickey Rourke portrays Ivan Antonovich Vanko, an original character based on Whiplash and the Crimson Dynamo who is the son of Anton Vanko and appears in the film, Iron Man 2. A ruthless technological genius bent on ruining Tony Stark, he works alongside Justin Hammer and wields a pair of metal, electrified whips. Ivan is depicted as being very manipulative, particularly towards Hammer, while also being physically strong. He has two confrontations with Stark; the first time while wearing a harness for his whips and the second with full body armor. He is defeated by Iron Man and War Machine during the second encounter, and tries unsuccessfully to use his armor's self-destruct to take them with him. Anton Vanko (portrayed by Evgeniy Lazarev) also appears in Iron Man 2 as a scientist who worked with Howard Stark to invent the Arc Reactor in the 1960s, only to be deported back to the Soviet Union after being caught selling stolen patents on the black market and being sent to the Gulag. His death in the present sparks Ivan's quest for vengeance. Additionally, a younger version of Anton appears in the television series Agent Carter, portrayed by Costa Ronin.Costa Ronin Joins Marvel's Agent Carter \u2013 Ronin cast as a familiar Marvel Cinematic Universe villain's father! A", "start_char_pos": 1239, "end_char_pos": 1239}, {"type": "D", "before": "live-action MCU television series", "after": null, "start_char_pos": 1306, "end_char_pos": 1339}, {"type": "A", "before": null, "after": "television series", "start_char_pos": 1363, "end_char_pos": 1363}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 1669, "end_char_pos": 1672}, {"type": "R", "before": "took", "after": "take", "start_char_pos": 1937, "end_char_pos": 1941}, {"type": "A", "before": null, "after": "in battle", "start_char_pos": 2053, "end_char_pos": 2053}, {"type": "R", "before": "were", "after": "are", "start_char_pos": 2073, "end_char_pos": 2077}, {"type": "D", "before": "A younger version of the MCU incarnation of Anton Vanko appears in the live-action series Agent Carter, portrayed by Costa Ronin.Costa Ronin Joins Marvel's Agent Carter \u2013 Ronin cast as a familiar Marvel Cinematic Universe villain's father! The Anton Vanko version of Whiplash appears in the Avengers Assemble animated series episode \"The Conqueror\", voiced by Troy Baker. He attacks and ensnares the Avengers with whips that A.I.M. upgraded using Kang the Conqueror's futuristic technology. However, the Hulk manages to break free and defeat Whiplash with Black Widow's help.", "after": null, "start_char_pos": 2133, "end_char_pos": 2708}, {"type": "D", "before": "Film", "after": null, "start_char_pos": 2709, "end_char_pos": 2713}, {"type": "D", "before": "Mickey Rourke portrays Ivan Antonovich Vanko, an original character based on Whiplash and the Crimson Dynamo, and the son of Anton Vanko in the live-action Marvel Cinematic Universe film, Iron Man 2. A ruthless technological genius bent on ruining Tony Stark, he works alongside Justin Hammer and wields a pair of metal, electrified whips. Vanko is depicted as being very manipulative, particularly towards Hammer, while also being physically strong. He has two confrontations with Stark; the first time while wearing a harness for his whips and the second with full body armor. He is defeated by Iron Man and War Machine during the second encounter, and tries unsuccessfully to use his armor's self-destruct to take them with him.", "after": null, "start_char_pos": 2714, "end_char_pos": 3445}, {"type": "R", "before": "version", "after": "incarnation", "start_char_pos": 3477, "end_char_pos": 3484}, {"type": "R", "before": "Iron Man video game, based on the 2008 film of the same name,", "after": "2008 Iron Man film tie-in game,", "start_char_pos": 3522, "end_char_pos": 3583}, {"type": "R", "before": "version", "after": "incarnation", "start_char_pos": 3701, "end_char_pos": 3708}, {"type": "R", "before": "version", "after": "incarnation", "start_char_pos": 3803, "end_char_pos": 3810}], "sents_char_pos": [0, 175, 277, 385, 458, 599, 630, 798, 948, 1055, 1183, 1421, 1658, 1907, 2055, 2132, 2262, 2372, 2504, 2623, 2708, 3053, 3164, 3202, 3292, 3445, 3607, 3684, 3786, 3884]}
+{"doc_id": "49423318", "revision_depth": "1", "before_revision": " Buddhism Mahabodhi Temple The Mahabodhi Temple in Bodh Gaya is one of the holiest sites in Buddhism. Numerous Hindu sitesof pilgrimage are located in India. Islam } The dargahs or shrines of major Sufi figures in India, such as Ajmer Sharif and Nizamuddin, attract many Muslims. Qadian is a considered a holy city by Ahmadi Muslims. Sikhism The Golden Temple is the holiest site in Sikhism .", "after_revision": "India-origin religions Since India is birth place of Indian-origin religions, namely Hinduism, Jainism, Buddhism, and Sikhism, their holiest sites and highest concentration of religious sites pertaining to these religions are in India. Common pilgrim circuits, sites and practices are as follows: Parikrama pilgrim circuits and sites Pilgrim yatras and sites Sacred rivers and their ghats, notably Ganges, Yamuna, Sarasvati, Narmada Fairs, such as Kumbh Mela. Buddhism Mahabodhi Temple The Mahabodhi Temple in Bodh Gaya is one of the holiest sites in Buddhism. Buddhist sites, many related to the travels of Buddha, are spread across India. Important Buddhist prikarma sites are Lumbini, Bodh Gaya, Sarnath, Sravasti (Jetavana), Rajgir hills, Kurukshetra (Bodh Stupa on bank of Brahma Sarovar, pilgrimage undertaken by Lord Buddha), Shrughna (Yamunanagar, vihara visited by Buddha for sermon), Adi Badri (saraswati udgam sthal and vihara visited by Buddha), Parinirvana Stupa (place of death and nirvana of Lord Buddha at Kushinagar, and Sankissa. See also Buddhist pilgrimage sites. Hindus pilgrims in India undertake yatra (pilgrimage) to numerous sites, temples and samadhis (shrines) of saints) for puja and parikrama to earn punya with the aim to attain moksha. In order of importance for pilgrims in India, there are 4 Dhams (Char Dham) and 12 Jyotirlings devoted to the Lord Shiva, 51 Shakti Pithas devoted to the feminine manifestation of the god, and the important Lord Rama circuit (Ayodhya, Chitrakoot, Hampi and Rameswaram) and Lord Krishna circuit (Braj. Kurukshetra and Dwarka). Sacred pilgrim sites related to Lord Rama are Ayodhya, Chitrakoot, Hampi and Rameswaram. Sacred pilgrim sites related to Lord Krishna are Vraja Parikrama, 48 kos parikrama of Kurukshetra, Dwarka, Bhalka (place of death of Lord Krishna). Jain The holiest site of Jainism are spread across India. Sikhism The Golden Temple is the holiest site in Sikhism. The holy sites for Sikhs include the following in the order of importance: Panj Takht, namely Golden Temple, Takht Sri Patna Sahib, Nanded Hazur Sahib, Takht Sri Damdama Sahib Bhatinda, and Anandpur Sahib. Guru Nanak related places, he was the founder of Sikh religion. His birth and death places at Gurdwara Janam Asthan and Kartarpur Corridor (both in Pakistan} are considered sacred. Sikh martyrs's related sites who gave their lives for protecting dharma and Sikhism. These include Gurudwara Sis Ganj Sahib and Fatehgarh Sahib of martyrdom of Guru Tegh Bahadur and children of Guru Gobind Singh respectively by Muslim rulers for refusing to convert to Islam Place where Sikh gurus performed pilgrims and travels: Kurukshetra, Kapal Mochan, Paonta Sahib, etc. Capitals of important Sikh states: Lahore (capital of largest Sikh state of Maharaja Ranjit Singh) and Lohgarh (capital of Sikh state founded by Baba Banda Bahadur in Yamunanagar). Fateh Burj at Chapar Chiri where Banda bahadur defeated mughals in Battle of Chappar Chiri and avenged murder of Sikh gurus and their children is also considered important. Foreign-origin religions Bah\u00e1\u02bc\u00ed The roots of the Bah\u00e1\u02bc\u00ed Faith in India go back to the first days of the B\u00e1b\u00ed religion in 1844. The Bah\u00e1\u02bc\u00ed Faith - Brief History National Spiritual Assembly of the Bah\u00e1\u02bc\u00eds of India. For Bah\u00e1\u02bc\u00eds in India, the Lotus Temple in Delhi, is most well known Bah\u00e1\u02bc\u00ed House of Worship that was dedicated in December 1986. Islam The dargahs or shrines of major Sufi figures in India, such as Ajmer Sharif and Nizamuddin, attract many Muslims. Qadian is a considered a holy city by Ahmadi Muslims. Zoroastrianism Due to persecution of Zoroastrians, in other countries and the liberal atmosphere and patronisation of India, today the largest population of Zoroastrians resides in India. Zoroastrians,the practitioners of Zoroastrianism have been living in India since the Sasanian period (224-651 CE), started to migrate to India in successive waves migrations after the Muslim invasion of Persia when invading Muslim started religious persecution and Zoroastrianism suffered a decline in Iran, later another wave of migration to India started when Safavids forced their subjects to convert to Shiism. Zoroastrians in India, have numerous fire temples in India where they travel for worship .", "edit_actions": [{"type": "A", "before": null, "after": "India-origin religions", "start_char_pos": 0, "end_char_pos": 0}, {"type": "A", "before": null, "after": "Since India is birth place of Indian-origin religions, namely Hinduism, Jainism, Buddhism, and Sikhism, their holiest sites and highest concentration of religious sites pertaining to these religions are in India. Common pilgrim circuits, sites and practices are as follows:", "start_char_pos": 1, "end_char_pos": 1}, {"type": "A", "before": null, "after": "Parikrama pilgrim circuits and sites Pilgrim yatras and sites Sacred rivers and their ghats, notably Ganges, Yamuna, Sarasvati, Narmada Fairs, such as Kumbh Mela.", "start_char_pos": 2, "end_char_pos": 2}, {"type": "R", "before": "Mahabodhi Temple", "after": "Mahabodhi Temple", "start_char_pos": 12, "end_char_pos": 28}, {"type": "A", "before": null, "after": "Buddhist sites, many related to the travels of Buddha, are spread across India. Important Buddhist prikarma sites are Lumbini, Bodh Gaya, Sarnath, Sravasti (Jetavana), Rajgir hills, Kurukshetra (Bodh Stupa on bank of Brahma Sarovar, pilgrimage undertaken by Lord Buddha), Shrughna (Yamunanagar, vihara visited by Buddha for sermon), Adi Badri (saraswati udgam sthal and vihara visited by Buddha), Parinirvana Stupa (place of death and nirvana of Lord Buddha at Kushinagar, and Sankissa. See also Buddhist pilgrimage sites.", "start_char_pos": 104, "end_char_pos": 104}, {"type": "R", "before": "Numerous Hindu sitesof pilgrimage are located in India.", "after": "Hindus pilgrims in India undertake yatra (pilgrimage) to numerous sites, temples and samadhis (shrines) of saints) for puja and parikrama to earn punya with the aim to attain moksha. In order of importance for pilgrims in India, there are 4 Dhams (Char Dham) and 12 Jyotirlings devoted to the Lord Shiva, 51 Shakti Pithas devoted to the feminine manifestation of the god, and the important Lord Rama circuit (Ayodhya, Chitrakoot, Hampi and Rameswaram) and Lord Krishna circuit (Braj. Kurukshetra and Dwarka). Sacred pilgrim sites related to Lord Rama are Ayodhya, Chitrakoot, Hampi and Rameswaram. Sacred pilgrim sites related to Lord Krishna are Vraja Parikrama, 48 kos parikrama of Kurukshetra, Dwarka, Bhalka (place of death of Lord Krishna).", "start_char_pos": 105, "end_char_pos": 160}, {"type": "R", "before": "Islam", "after": "Jain", "start_char_pos": 161, "end_char_pos": 166}, {"type": "A", "before": null, "after": "The holiest site of Jainism are spread across India.", "start_char_pos": 167, "end_char_pos": 167}, {"type": "A", "before": null, "after": "Sikhism The Golden Temple is the holiest site in Sikhism.", "start_char_pos": 168, "end_char_pos": 168}, {"type": "A", "before": null, "after": "The holy sites for Sikhs include the following in the order of importance:", "start_char_pos": 169, "end_char_pos": 169}, {"type": "A", "before": null, "after": "Panj Takht, namely Golden Temple, Takht Sri Patna Sahib, Nanded Hazur Sahib, Takht Sri Damdama Sahib Bhatinda, and Anandpur Sahib.", "start_char_pos": 170, "end_char_pos": 170}, {"type": "A", "before": null, "after": "Guru Nanak related places, he was the founder of Sikh religion. His birth and death places at Gurdwara Janam Asthan and Kartarpur Corridor (both in Pakistan", "start_char_pos": 171, "end_char_pos": 171}, {"type": "A", "before": null, "after": "are considered sacred.", "start_char_pos": 173, "end_char_pos": 173}, {"type": "A", "before": null, "after": "Sikh martyrs's related sites who gave their lives for protecting dharma and Sikhism. These include Gurudwara Sis Ganj Sahib and Fatehgarh Sahib of martyrdom of Guru Tegh Bahadur and children of Guru Gobind Singh respectively by Muslim rulers for refusing to convert to Islam", "start_char_pos": 174, "end_char_pos": 174}, {"type": "A", "before": null, "after": "Place where Sikh gurus performed pilgrims and travels: Kurukshetra, Kapal Mochan, Paonta Sahib, etc.", "start_char_pos": 175, "end_char_pos": 175}, {"type": "A", "before": null, "after": "Capitals of important Sikh states: Lahore (capital of largest Sikh state of Maharaja Ranjit Singh) and Lohgarh (capital of Sikh state founded by Baba Banda Bahadur in Yamunanagar). Fateh Burj at Chapar Chiri where Banda bahadur defeated mughals in Battle of Chappar Chiri and avenged murder of Sikh gurus and their children is also considered important.", "start_char_pos": 176, "end_char_pos": 176}, {"type": "A", "before": null, "after": "Foreign-origin religions", "start_char_pos": 177, "end_char_pos": 177}, {"type": "A", "before": null, "after": "Bah\u00e1\u02bc\u00ed", "start_char_pos": 178, "end_char_pos": 178}, {"type": "A", "before": null, "after": "The roots of the Bah\u00e1\u02bc\u00ed Faith in India go back to the first days of the B\u00e1b\u00ed religion in 1844.", "start_char_pos": 179, "end_char_pos": 179}, {"type": "A", "before": null, "after": "Bah\u00e1\u02bc\u00ed Faith - Brief History National Spiritual Assembly of the Bah\u00e1\u02bc\u00eds of India. For Bah\u00e1\u02bc\u00eds in India, the Lotus Temple in Delhi, is most well known Bah\u00e1\u02bc\u00ed House of Worship that was dedicated in December 1986.", "start_char_pos": 184, "end_char_pos": 184}, {"type": "A", "before": null, "after": "Islam The", "start_char_pos": 185, "end_char_pos": 185}, {"type": "R", "before": "Sikhism The Golden Temple is the holiest site in Sikhism", "after": "Zoroastrianism", "start_char_pos": 350, "end_char_pos": 406}, {"type": "A", "before": null, "after": "Due to persecution of Zoroastrians, in other countries and the liberal atmosphere and patronisation of India, today the largest population of Zoroastrians resides in India.", "start_char_pos": 407, "end_char_pos": 407}, {"type": "A", "before": null, "after": "Zoroastrians,the practitioners of Zoroastrianism have been living in India since the Sasanian period (224-651 CE), started to migrate to India in successive waves migrations after the Muslim invasion of Persia when invading Muslim started religious persecution and Zoroastrianism suffered a decline in Iran, later another wave of migration to India started when Safavids forced their subjects to convert to Shiism. Zoroastrians in India, have numerous fire temples in India where they travel for worship", "start_char_pos": 408, "end_char_pos": 408}], "sents_char_pos": [0, 103, 160, 295, 349]}
+{"doc_id": "49535", "revision_depth": "1", "before_revision": "In philosophy In philosophy , a thought experiment typically presents an imagined scenario with the intention of eliciting an intuitive or reasoned response about the way things are in the thought experiment. (Philosophers might also supplement their thought experiments with theoretical reasoning designed to support the desired intuitive response.) The scenario will typically be designed to target a particular philosophical notion, such as morality, or the nature of the mind or linguistic reference. The response to the imagined scenario is supposed to tell us about the nature of that notion in any scenario, real or imagined. Possibility In many thought experiments, the scenario would be nomologically possible, or possible according to the laws of nature. John Searle's Chinese room is nomologically possible. Interactive thought experiments in digital environments The philosophical work of Stefano Gualeni focuses on the use of virtual worlds to materialize thought experiments and to playfully negotiate philosophical ideas. His arguments were originally presented in his 2015 book Virtual Worlds as Philosophical Tools.%DIFDELCMD < %DIFDELCMD < %%% Gualeni's argument is that the history of philosophy has, until recently, merely been the history of written thought, and digital media can complement and enrich the limited and almost exclusively linguistic approach to philosophical thought. He considers virtual worlds to be philosophically viable and advantageous in contexts like those of thought experiments, when the recipients of a certain philosophical notion or perspective are expected to objectively test and evaluate different possible courses of action, or in cases where they are confronted with interrogatives concerning non-actual or non-human phenomenologies. Among the most visible thought experiments designed by Stefano Gualeni:%DIFDELCMD < %DIFDELCMD < %%% Something Something Soup Something (2017) Necessary Evil (2013) Other examples of playful, interactive thought experiments:%DIFDELCMD < %DIFDELCMD < %%% The Evolution of Trust (Niki Case, 2017) We Become what We Behold (Niki Case, 2016) To Build a Better Mouse Trap (La Molleindustria, 2014) Parable of the Polygons (Vi Hart Niki Case, 2014)%DIFDELCMD < %DIFDELCMD < %%% In science Scientists tend to use thought experiments as imaginary, \"proxy\" experiments prior to a real, \"physical\" experiment (Ernst Mach always argued that these gedankenexperiments were \"a necessary precondition for physical experiment\"). In these cases, the result of the \"proxy\" experiment will often be so clear that there will be no need to conduct a physical experiment at all. Scientists also use thought experiments when particular physical experiments are impossible to conduct (Carl Gustav Hempel labeled these sorts of experiment \"theoretical experiments-in-imagination\"), such as Einstein's thought experiment of chasing a light beam, leading to special relativity. This is a unique use of a scientific thought experiment, in that it was never carried out, but led to a successful theory, proven by other empirical means. Causal reasoning The first characteristic pattern that thought experiments display is their orientation in time.Yeates, 2004, pp.138-143. They are either: Variety Thought experiments have been used in a variety of fields, including philosophy, law, physics, and mathematics. In philosophy they have been used at least since classical antiquity, some pre-dating Socrates. In law, they were well known to Roman lawyers quoted in the Digest.Catholic Encyclopedia (1913)/Pandects \"every logical rule of law is capable of illumination from the law of the Pandects.\" In physics and other sciences, notable thought experiments date from the 19th and especially the 20th century, but examples can be found at least as early as Galileo. Relation to real experiments The relation to real experiments can be quite complex, as can be seen again from an example going back to Albert Einstein. In 1935, with two coworkers, he published a paper on a newly created subject called later the EPR effect (EPR paradox). In this paper, starting from certain philosophical assumptions,Jaynes, E.T. (1989). Clearing up the Mysteries, opening talk at the 8th International MAXENT Workshop, St John's College, Cambridge UK. on the basis of a rigorous analysis of a certain, complicated, but in the meantime assertedly realizable model, he came to the conclusion that quantum mechanics should be described as \"incomplete\". Niels Bohr asserted a refutation of Einstein's analysis immediately, and his view prevailed.French, A.P., Taylor, E.F. (1979/1989). An Introduction to Quantum Physics, Van Nostrand Reinhold (International), London, .Wheeler, J.A, Zurek, W.H., editors (1983). Quantum Theory and Measurement, Princeton University Press, Princeton.d'Espagnat, B. (2006). On Physics and Philosophy, Princeton University Press, Princeton, After some decades, it was asserted that feasible experiments could prove the error of the EPR paper. These experiments tested the Bell inequalities published in 1964 in a purely theoretical paper. The above-mentioned EPR philosophical starting assumptions were considered to be falsified by empirical fact (e.g. by the optical real experiments of Alain Aspect). Thus thought experiments belong to a theoretical discipline, usually to theoretical physics, but often to theoretical philosophy. In any case, it must be distinguished from a real experiment, which belongs naturally to the experimental discipline and has \"the final decision on true or not true\", at least in physics. ", "after_revision": "Fields Thought experiments have been used in a variety of fields, including philosophy, law, physics, and mathematics. In philosophy they have been used at least since classical antiquity, some pre-dating Socrates. In law, they were well known to Roman lawyers quoted in the Digest.Catholic Encyclopedia (1913)/Pandects \"every logical rule of law is capable of illumination from the law of the Pandects.\" In physics and other sciences, notable thought experiments date from the 19th and especially the 20th century, but examples can be found at least as early as Galileo. Philosophy In philosophy , a thought experiment typically presents an imagined scenario with the intention of eliciting an intuitive or reasoned response about the way things are in the thought experiment. (Philosophers might also supplement their thought experiments with theoretical reasoning designed to support the desired intuitive response.) The scenario will typically be designed to target a particular philosophical notion, such as morality, or the nature of the mind or linguistic reference. The response to the imagined scenario is supposed to tell us about the nature of that notion in any scenario, real or imagined. Science Scientists tend to use thought experiments as imaginary, \"proxy\" experiments prior to a real, \"physical\" experiment (Ernst Mach always argued that these gedankenexperiments were \"a necessary precondition for physical experiment\"). In these cases, the result of the \"proxy\" experiment will often be so clear that there will be no need to conduct a physical experiment at all. Scientists also use thought experiments when particular physical experiments are impossible to conduct (Carl Gustav Hempel labeled these sorts of experiment \"theoretical experiments-in-imagination\"), such as Einstein's thought experiment of chasing a light beam, leading to special relativity. This is a unique use of a scientific thought experiment, in that it was never carried out, but led to a successful theory, proven by other empirical means. Properties Further categorization of thought experiments can be attributed to specific properties. Possibility In many thought experiments, the scenario would be nomologically possible, or possible according to the laws of nature. John Searle's Chinese room is nomologically possible. %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% Causal reasoning The first characteristic pattern that thought experiments display is their orientation in time.Yeates, 2004, pp.138-143. They are either: Relation to real experiments The relation to real experiments can be quite complex, as can be seen again from an example going back to Albert Einstein. In 1935, with two coworkers, he published a paper on a newly created subject called later the EPR effect (EPR paradox). In this paper, starting from certain philosophical assumptions,Jaynes, E.T. (1989). Clearing up the Mysteries, opening talk at the 8th International MAXENT Workshop, St John's College, Cambridge UK. on the basis of a rigorous analysis of a certain, complicated, but in the meantime assertedly realizable model, he came to the conclusion that quantum mechanics should be described as \"incomplete\". Niels Bohr asserted a refutation of Einstein's analysis immediately, and his view prevailed.French, A.P., Taylor, E.F. (1979/1989). An Introduction to Quantum Physics, Van Nostrand Reinhold (International), London, .Wheeler, J.A, Zurek, W.H., editors (1983). Quantum Theory and Measurement, Princeton University Press, Princeton.d'Espagnat, B. (2006). On Physics and Philosophy, Princeton University Press, Princeton, After some decades, it was asserted that feasible experiments could prove the error of the EPR paper. These experiments tested the Bell inequalities published in 1964 in a purely theoretical paper. The above-mentioned EPR philosophical starting assumptions were considered to be falsified by empirical fact (e.g. by the optical real experiments of Alain Aspect). Thus thought experiments belong to a theoretical discipline, usually to theoretical physics, but often to theoretical philosophy. In any case, it must be distinguished from a real experiment, which belongs naturally to the experimental discipline and has \"the final decision on true or not true\", at least in physics. Interactivity Through the advent of the Internet, the digital space has lent itself as a new medium for a new kind of though experiments. The philosophical work of Stefano Gualeni, for example, focuses on the use of virtual worlds to materialize thought experiments and to playfully negotiate philosophical ideas. His arguments were originally presented in his 2015 book Virtual Worlds as Philosophical Tools. Gualeni's argument is that the history of philosophy has, until recently, merely been the history of written thought, and digital media can complement and enrich the limited and almost exclusively linguistic approach to philosophical thought. He considers virtual worlds to be philosophically viable and advantageous in contexts like those of thought experiments, when the recipients of a certain philosophical notion or perspective are expected to objectively test and evaluate different possible courses of action, or in cases where they are confronted with interrogatives concerning non-actual or non-human phenomenologies. Among the most visible thought experiments designed by Stefano Gualeni: Something Something Soup Something (2017) Necessary Evil (2013) Other examples of playful, interactive thought experiments: The Evolution of Trust (Niki Case, 2017) We Become what We Behold (Niki Case, 2016) To Build a Better Mouse Trap (La Molleindustria, 2014) Parable of the Polygons (Vi Hart Niki Case, 2014)", "edit_actions": [{"type": "R", "before": "In", "after": "Fields Thought experiments have been used in a variety of fields, including philosophy, law, physics, and mathematics. In philosophy they have been used at least since classical antiquity, some pre-dating Socrates. In law, they were well known to Roman lawyers quoted in the Digest.Catholic Encyclopedia (1913)/Pandects \"every logical rule of law is capable of illumination from the law of the Pandects.\" In physics and other sciences, notable thought experiments date from the 19th and especially the 20th century, but examples can be found at least as early as Galileo.", "start_char_pos": 0, "end_char_pos": 2}, {"type": "A", "before": null, "after": "Philosophy In", "start_char_pos": 3, "end_char_pos": 3}, {"type": "D", "before": "In philosophy", "after": null, "start_char_pos": 15, "end_char_pos": 28}, {"type": "A", "before": null, "after": "Science Scientists tend to use thought experiments as imaginary, \"proxy\" experiments prior to a real, \"physical\" experiment (Ernst Mach always argued that these gedankenexperiments were \"a necessary precondition for physical experiment\"). In these cases, the result of the \"proxy\" experiment will often be so clear that there will be no need to conduct a physical experiment at all.", "start_char_pos": 634, "end_char_pos": 634}, {"type": "A", "before": null, "after": "Scientists also use thought experiments when particular physical experiments are impossible to conduct (Carl Gustav Hempel labeled these sorts of experiment \"theoretical experiments-in-imagination\"), such as Einstein's thought experiment of chasing a light beam, leading to special relativity. This is a unique use of a scientific thought experiment, in that it was never carried out, but led to a successful theory, proven by other empirical means.", "start_char_pos": 635, "end_char_pos": 635}, {"type": "A", "before": null, "after": "Properties Further categorization of thought experiments can be attributed to specific properties.", "start_char_pos": 636, "end_char_pos": 636}, {"type": "D", "before": "Interactive thought experiments in digital environments", "after": null, "start_char_pos": 823, "end_char_pos": 878}, {"type": "D", "before": "The philosophical work of Stefano Gualeni focuses on the use of virtual worlds to materialize thought experiments and to playfully negotiate philosophical ideas. His arguments were originally presented in his 2015 book Virtual Worlds as Philosophical Tools.", "after": null, "start_char_pos": 879, "end_char_pos": 1136}, {"type": "D", "before": "Gualeni's argument is that the history of philosophy has, until recently, merely been the history of written thought, and digital media can complement and enrich the limited and almost exclusively linguistic approach to philosophical thought. He considers virtual worlds to be philosophically viable and advantageous in contexts like those of thought experiments, when the recipients of a certain philosophical notion or perspective are expected to objectively test and evaluate different possible courses of action, or in cases where they are confronted with interrogatives concerning non-actual or non-human phenomenologies.", "after": null, "start_char_pos": 1166, "end_char_pos": 1792}, {"type": "D", "before": "Among the most visible thought experiments designed by Stefano Gualeni:", "after": null, "start_char_pos": 1793, "end_char_pos": 1864}, {"type": "D", "before": "Something Something Soup Something (2017) Necessary Evil (2013)", "after": null, "start_char_pos": 1894, "end_char_pos": 1957}, {"type": "D", "before": "Other examples of playful, interactive thought experiments:", "after": null, "start_char_pos": 1958, "end_char_pos": 2017}, {"type": "D", "before": "The Evolution of Trust (Niki Case, 2017) We Become what We Behold (Niki Case, 2016) To Build a Better Mouse Trap (La Molleindustria, 2014) Parable of the Polygons (Vi Hart", "after": null, "start_char_pos": 2047, "end_char_pos": 2218}, {"type": "D", "before": "Niki Case, 2014)", "after": null, "start_char_pos": 2219, "end_char_pos": 2235}, {"type": "D", "before": "In science Scientists tend to use thought experiments as imaginary, \"proxy\" experiments prior to a real, \"physical\" experiment (Ernst Mach always argued that these gedankenexperiments were \"a necessary precondition for physical experiment\"). In these cases, the result of the \"proxy\" experiment will often be so clear that there will be no need to conduct a physical experiment at all.", "after": null, "start_char_pos": 2265, "end_char_pos": 2650}, {"type": "D", "before": "Scientists also use thought experiments when particular physical experiments are impossible to conduct (Carl Gustav Hempel labeled these sorts of experiment \"theoretical experiments-in-imagination\"), such as Einstein's thought experiment of chasing a light beam, leading to special relativity. This is a unique use of a scientific thought experiment, in that it was never carried out, but led to a successful theory, proven by other empirical means.", "after": null, "start_char_pos": 2651, "end_char_pos": 3100}, {"type": "D", "before": "Variety Thought experiments have been used in a variety of fields, including philosophy, law, physics, and mathematics. In philosophy they have been used at least since classical antiquity, some pre-dating Socrates. In law, they were well known to Roman lawyers quoted in the Digest.Catholic Encyclopedia (1913)/Pandects \"every logical rule of law is capable of illumination from the law of the Pandects.\" In physics and other sciences, notable thought experiments date from the 19th and especially the 20th century, but examples can be found at least as early as Galileo.", "after": null, "start_char_pos": 3256, "end_char_pos": 3828}, {"type": "A", "before": null, "after": "Interactivity", "start_char_pos": 5597, "end_char_pos": 5597}, {"type": "A", "before": null, "after": "Through the advent of the Internet, the digital space has lent itself as a new medium for a new kind of though experiments. The philosophical work of Stefano Gualeni, for example, focuses on the use of virtual worlds to materialize thought experiments and to playfully negotiate philosophical ideas. His arguments were originally presented in his 2015 book Virtual Worlds as Philosophical Tools.", "start_char_pos": 5598, "end_char_pos": 5598}, {"type": "A", "before": null, "after": "Gualeni's argument is that the history of philosophy has, until recently, merely been the history of written thought, and digital media can complement and enrich the limited and almost exclusively linguistic approach to philosophical thought. He considers virtual worlds to be philosophically viable and advantageous in contexts like those of thought experiments, when the recipients of a certain philosophical notion or perspective are expected to objectively test and evaluate different possible courses of action, or in cases where they are confronted with interrogatives concerning non-actual or non-human phenomenologies.", "start_char_pos": 5599, "end_char_pos": 5599}, {"type": "A", "before": null, "after": "Among the most visible thought experiments designed by Stefano Gualeni:", "start_char_pos": 5600, "end_char_pos": 5600}, {"type": "A", "before": null, "after": "Something Something Soup Something (2017) Necessary Evil (2013)", "start_char_pos": 5601, "end_char_pos": 5601}, {"type": "A", "before": null, "after": "Other examples of playful, interactive thought experiments:", "start_char_pos": 5602, "end_char_pos": 5602}, {"type": "A", "before": null, "after": "The Evolution of Trust (Niki Case, 2017) We Become what We Behold (Niki Case, 2016) To Build a Better Mouse Trap (La Molleindustria, 2014) Parable of the Polygons (Vi Hart", "start_char_pos": 5603, "end_char_pos": 5603}, {"type": "A", "before": null, "after": "Niki Case, 2014)", "start_char_pos": 5604, "end_char_pos": 5604}], "sents_char_pos": [0, 209, 351, 505, 633, 768, 822, 1040, 1136, 1408, 1792, 1864, 2017, 2506, 2650, 2944, 3100, 3213, 3238, 3375, 3471, 3539, 3661, 3828, 3980, 4100, 4184, 4497, 4590, 4629, 4714, 4756, 4849, 5017, 5113, 5278, 5408]}
+{"doc_id": "49726563", "revision_depth": "2", "before_revision": "The Brian Deer Classification System (BDC) is a library classification system used to organize materials in libraries with specialized Indigenous collections. The system was created in the 1970s by Canadian Kahnawake Mohawk librarian A. Brian Deer , and has been adapted for use by a small number of First Nations libraries in Canada. History and usage Deer designed his classification system while working in the library of the National Indian Brotherhood from 1974 to 1976; instead of using a standard library classification scheme, he created a new system to organize the library's historic research materials and papers. He went on to work at the Cultural Centre at Kahnawake and the Kahnawake Branch branch of the Mohawk Nation Office , creating new schemes for their collections. The new systems Deer created were designed specifically for the materials in each collection according to the concerns of local Indigenous people at the time (for example, categories included land claims, treaty rights, resource management, and Elders' stories). Between 1978 and 1980, the system was adapted for use in British Columbia by Gene Joseph and Keltie McCall while working at the Union of British Columbia Indian Chiefs . Variations of the Brian Deer Classification System are used in a small number of Canadian libraries. One prominent library using BDC is the X\u0331wi7x\u0331wa Library at the University of British Columbia, which uses a British Columbia-focused version of BDC along with First Nations House of Learning subject headings. The Union of British Columbia Indian Chiefs Resource Centre revised the BDC in 2013 , with the goal of providing users with a more flexible and culturally appropriate approach to organizing their resources. The Aanischaaukamikw Cree Cultural Institute in Ouj\u00e9-Bougoumou, Quebec implemented a local adaptation of BDC when they opened in 2012. In 2020 the Carrier Sekani Tribal Council in Prince George, British Columbia moved from organizing its library with the Dewey Decimal Classification to a version of the BDC, adding new categories for topics of local interest such as the Missing and murdered Indigenous women epidemic . The organizational structure of BDC reflects a First Nations worldview, with an emphasis on relationships between and among people, animals, and the land. Subcategories demonstrate the relationships among First Nations by grouping them geographically as opposed to alphabetically , as is frequently used for specific topics in the Library of Congress Classification. The top-level hierarchy of the X\u0331wi7x\u0331wa Library adaptation of BDC demonstrates the emphasis on access to subjects prioritized by a First Nation collection:", "after_revision": "The Brian Deer Classification System (BDC) is a library classification system used to organize materials in libraries with specialized Indigenous collections. The system was created in the mid-1970s by Canadian librarian A. Brian Deer Kahnawake Mohawk. It has been adapted for use in a British Columbia version, and also by a small number of First Nations libraries in Canada. History and usage Deer designed his classification system while working in the library of the National Indian Brotherhood (now the Assembly of Nations from 1974 to 1976. Instead of using a standard library classification scheme, such as that of the Library of Congress, he created a new system to organize the library's historic indigenous research materials and papers. He later worked at the library of the Union of British Columbia Indian Chiefs, where he developed a system for its holdings. He returned to Kahnawake, working at its Cultural Centre at Kahnawake and the Kahnawake Branch branch of the Mohawk Nation Office . His system was flexible, and he created new forms for their collections. The new systems Deer created were designed specifically for the materials in each collection according to the concerns of local Indigenous people at the time (for example, categories included land claims, treaty rights, resource management, and Elders' stories). Between 1978 and 1980, the system was adapted for use in British Columbia by Gene Joseph and Keltie McCall while they were working at the Union of British Columbia Indian Chiefs , becoming known as BDC-BC. Joseph later adapted it further for use at the library of the University of British Columbia, Vancouver. Variations of the Brian Deer Classification System are used in a small number of Canadian libraries. One prominent library using BDC is the X\u0331wi7x\u0331wa Library at the University of British Columbia, which uses a British Columbia-focused version of BDC along with First Nations House of Learning subject headings. The Union of British Columbia Indian Chiefs Resource Centre issued a revised BDC-BC in 2014 , with the goal of providing users with a more flexible and culturally appropriate approach to organizing their resources. The Aanischaaukamikw Cree Cultural Institute in Ouj\u00e9-Bougoumou, Quebec implemented a local adaptation of BDC when they opened in 2012. In 2020 the Carrier Sekani Tribal Council in Prince George, British Columbia shifted from organizing its library with the Dewey Decimal Classification to using a version of the BDCS. They added new subject heading categories for topics of local interest such as the crisis of Missing and murdered Indigenous women . The high-level organizational structure of BDCS reflects a First Nations worldview, with an emphasis on relationships between and among people, animals, and the land. Subcategories demonstrate the relationships among First Nations by grouping them geographically as opposed to alphabetically ; the latter is a practice frequently used for specific topics in the Library of Congress Classification. The top-level hierarchy of the X\u0331wi7x\u0331wa Library adaptation of BDC-BC demonstrates the emphasis on access to subjects prioritized by a First Nation collection:", "edit_actions": [{"type": "R", "before": "1970s by Canadian Kahnawake Mohawk", "after": "mid-1970s by Canadian", "start_char_pos": 189, "end_char_pos": 223}, {"type": "R", "before": ", and", "after": "Kahnawake Mohawk. It", "start_char_pos": 248, "end_char_pos": 253}, {"type": "A", "before": null, "after": "in a British Columbia version, and also", "start_char_pos": 279, "end_char_pos": 279}, {"type": "A", "before": null, "after": "(now the Assembly of Nations", "start_char_pos": 458, "end_char_pos": 458}, {"type": "R", "before": "1976; instead", "after": "1976. Instead", "start_char_pos": 472, "end_char_pos": 485}, {"type": "A", "before": null, "after": "such as that of the Library of Congress,", "start_char_pos": 537, "end_char_pos": 537}, {"type": "A", "before": null, "after": "indigenous", "start_char_pos": 597, "end_char_pos": 597}, {"type": "R", "before": "went on to work at the", "after": "later worked at the library of the Union of British Columbia Indian Chiefs, where he developed a system for its holdings. He returned to Kahnawake, working at its", "start_char_pos": 632, "end_char_pos": 654}, {"type": "R", "before": ", creating new schemes", "after": ". His system was flexible, and he created new forms", "start_char_pos": 744, "end_char_pos": 766}, {"type": "A", "before": null, "after": "they were", "start_char_pos": 1166, "end_char_pos": 1166}, {"type": "R", "before": ".", "after": ", becoming known as BDC-BC. Joseph later adapted it further for use at the library of the University of British Columbia, Vancouver.", "start_char_pos": 1222, "end_char_pos": 1223}, {"type": "R", "before": "revised the BDC in 2013", "after": "issued a revised BDC-BC in 2014", "start_char_pos": 1595, "end_char_pos": 1618}, {"type": "R", "before": "moved", "after": "shifted", "start_char_pos": 1954, "end_char_pos": 1959}, {"type": "A", "before": null, "after": "using", "start_char_pos": 2029, "end_char_pos": 2029}, {"type": "R", "before": "BDC, adding new", "after": "BDCS. They added new subject heading", "start_char_pos": 2047, "end_char_pos": 2062}, {"type": "A", "before": null, "after": "crisis of", "start_char_pos": 2115, "end_char_pos": 2115}, {"type": "D", "before": "epidemic", "after": null, "start_char_pos": 2154, "end_char_pos": 2162}, {"type": "A", "before": null, "after": "high-level", "start_char_pos": 2169, "end_char_pos": 2169}, {"type": "R", "before": "BDC", "after": "BDCS", "start_char_pos": 2198, "end_char_pos": 2201}, {"type": "R", "before": ", as is", "after": "; the latter is a practice", "start_char_pos": 2446, "end_char_pos": 2453}, {"type": "R", "before": "BDC", "after": "BDC-BC", "start_char_pos": 2596, "end_char_pos": 2599}], "sents_char_pos": [0, 158, 335, 477, 628, 789, 1052, 1324, 1534, 1741, 1876, 2164, 2320, 2532]}
+{"doc_id": "50340216", "revision_depth": "1", "before_revision": "Politics: cooperation and knowing-as-inquiry The branch of philosophy recognized as \"politics\" concerns the governance of community and group interaction, not merely that of the state as conceived when thinking of a local or national government. ] ] ] In Laws of Motion (1920), physicist James Clerk Maxwell articulated the modern conception of \"transaction\" used here\u2014one that is not exclusive to an economic context or limited to the opposition of a buyer-seller in a trade or analogous situation. Unlike commercial affairs, there is a radical departure from any tendency to perceive buyer-seller ( or organism-environment ) as if opposing or separate forces. Transactionalist like Maxwell view the buyer and seller (the organism and its environment) as \"two parts of the same phenomenon.\" Dewey and Bentley apply this view of the 'transactional' to domain of learning more than any other context. In the educative process, acting without knowing (described below) is a separation or fracturing of the same enjoined phenomenon . Without inquiry acting does not work . Acting and knowing cooperate to provide knowledge to an organism-environment; both must essentially involve inquiry into things that have happened and are happening : Knowledge \u2013 if the term is to be employed at all \u2013 is a name for the product of competent inquiries, and is constituted only as the outcome of a particular inquiry. It is not \"a process taking place , \" or some \"status\" located in an organism ] . Knowledge arises from inquiry and the testingof that inquiry to insure the fitness of not only the solutionbut the organism-environment . While a human being is central or \"nuclear\" to the conception of an organism-environment, they must abdicate any sense of dominion over the socio-biological cosmosof which being human is but a part and never outside it that cosmos or environment . Each situation \u2014and this transactionalists assert is radical way of thinking\u2014must be examined and determined by a construction of moves and action based on the capacity of that organism to fulfill its intentions and eventually thrive (or not). Dewey and Bentley later insisted that knowing \"as inquiry, [is therefore] a way, or %DIFDELCMD < [%%% a distinct form, of behavior .\" Transactionalists view politics as a cooperative,genuine interaction between all participating parties whether buyer-seller , student-teacher, or worker-boss; we are biological as well as social subjects involved not merely in \" transacting\" for our own advantage or gain but connected to other entities. \" S%DIFDELCMD < ]%%% ocial phenomena cannot be understood except as there is prior understanding of physical conditions and the laws of their socio-biological%DIFDELCMD < ] %%% interactions,\" wrote John Dewey in Logic: The Theory of Inquiry. Furthermore, he added, \"inquiry into social phenomena%DIFDELCMD < ]%%% , with respect both to data that are significant and to their relations or proper ordering, is conditioned upon extensive prior knowledge of physical phenomena and their laws. This fact accounts in part for the retarded and immature state of social subjects.\" Thus, cooperation and knowing as inquiry is foundational to governing communal affairs of any kind including economic trade and our educative process. Intelligence\u2014that which is acquired through inquiry and testing\u2014allows man to foresee consequences derived from an analysis of past experience or expectationsin order to take control of his/her actions without dogma or beliefs that might be wrong without proper inquiry. If the philosophical study of politics were a \"study of force,\" of knowing \"what actions are permissible\" given that man is an organism-environment, then \u2014transactionalists assert\u2014cooperation and knowing-as-inquiry are vital to functioning successfully among others . The Stanford Encyclopedia of Philosophy noted that Dewey was critical of the classical neoliberal stance that the abstract individual precedes a conception of society or social institutions. He maintained that social institutions were not a \"means for obtaining something for individuals. They are means for 'creating' individuals (Reconstruction in Philosophy, MW12, 190\u2013192).\" [C]lassical liberalism treats the individual as \u2018something given.\u2019 Instead, Dewey argues, \u2018liberalism knows that an individual is nothing fixed, given ready-made. It is something achieved, and achieved not in isolation but with the aid and support of conditions, cultural and physical: \u2014 including in \u201ccultural\u201d, economic, legal and political institutions as well as science and art\u2019 (\u2018The Future of Liberalism\u2019, LW11: 291).For Dewey, such treatment was \u2018the most pervasive fallacy of philosophical thinking\u2019 (\u2018Context and Thought\u2019, LW5, 5). Transactionalism is a radical form of governing that resists the tendency to \"divide up experienced phenomena, and to take the distinct analysed elements to be separate existences, independent both of the analysis and of each other.\" Intelligent thinking is anti-dualistic, accurate, forethought ; taking into account other people, communities, and cultures that stems from a \"deliberate control of what is done with reference to making what happens to us and what we do to things as fertile as possible of suggestions (of suggested meanings).\" [ Furthermore, intelligent thinking is a means for trying out the validity of those suggestions . The political governing of thinking towards dualisms and bifurcation as well as the \"false conception of the individual\" is what Dewey argued actually limited man's free (meaning \"liberal\") thought and action. All of this served as the core reasoning behind Dewey's development of an experimental philosophy that offset elite distortions regarding a public education and learning.", "after_revision": "Politics: cooperation and knowing-as-inquiry The branch of philosophy recognized as \"politics\" concerns the governance of community and group interaction, not merely the governing over a state or group as conventionally conceived in thoughts about local or national government. Transactionalists view politics as a cooperative, genuine interaction between all participating parties whether buyer-seller, student-teacher, or worker-boss; we are biological as well as social subjects involved not merely in \"transacting\" for our own advantage or gain but connected to other entities. \" S]ocial phenomena cannot be understood except as there is prior understanding of physical conditions and the laws of their socio-biological] interactions,\" wrote John Dewey in Logic: The Theory of Inquiry. Furthermore, he added, \"inquiry into social phenomena], with respect both to data that are significant and to their relations or proper ordering, is conditioned upon extensive prior knowledge of physical phenomena and their laws. This fact accounts in part for the retarded and immature state of social subjects.\" Thus, cooperation and knowing as inquiry is foundational to governing communal affairs of any kind including economic trade and our educative process. In Laws of Motion (1920), physicist James Clerk Maxwell articulated the modern conception of \"transaction\" (or trans-action) used here. His conception is not exclusive to an economic context or limited to the opposition of a buyer-seller in trade or some analogous situation. Unlike commercial affairs, there is a radical departure from any tendency to perceive buyer-seller ( in an organism-environment paradigm ) as if they are opposing or separate forces. Transactionalists like Maxwell view the buyer and seller as \"two parts or aspects of the same phenomenon.\" Dewey and Bentley apply this 'transactional' view to the domain of learning more than any other context. Referred to as the educative process, acting without knowing (described below) often sets up the separation or fracturing of the enjoined phenomenon (e.g., knowing is doing, organizing the mental or physical acts in a pragmatic way). Without knowing-as-inquiry, blindly acting as an organism in an environment often does not work with the exception of beginner's luck. Acting to understand knowing elicits pragmatic knowledge of functioning as an organism-environment; both knowing and acting must essentially involve inquiry into things that have happened and are happening challenging our assumptions and expectations which will wrong in some context : Knowledge \u2013 if the term is to be employed at all \u2013 is a name for the product of competent inquiries, and is constituted only as the outcome of a particular inquiry. From the constitutive process of knowing and doing, knowledge is more than \"a process taking place \" or some \"status\" located in an organism 's of person's] mind . Knowledge arises from inquiry . It arises out of a kind of testing; an iterative process of inquiry into what we know and expect, that insures a suitable fitness of not only in solving problems (finding a solution). It insures the fitness of the organism-environment which may vary dependent on the situation, the time and place, or the culture. While a person is central ( or \"nuclear\" as in a nucleus) to a conception of organism-environment, human beings as organisms must abdicate any sense of dominion over their social-biological cosmos. Being human is but a part , and never outside , that cosmos or environment which they need to survive and they need to adapt to to thrive . Each situation and assumptions about it \u2014and this transactionalists assert is radical way of thinking\u2014must be tested, examined, and determined by a series of iterative moves and activity based on the capacity of that organism 's ability to fulfill its desired intentions to eventually thrive (or not). Dewey and Bentley later insisted that knowing \"as inquiry, [is therefore] a way, or %DIFDELCMD < [%%% distinct form, of behavior , \" %DIFDELCMD < ]%%% %DIFDELCMD < ] %%% %DIFDELCMD < ]%%% out of which a transactional competence is achieved. Intelligence\u2014that which is acquired through knowledgeable inquiry and mental testing\u2014allows man to analyze and foresee consequences derived from the past experiences shaping our biases and expectations. Without intelligence of this kind, one is unlikely to control his/her actions without preconceived dogma, rites, or beliefs that might be wrong without a proper inquiry. If the philosophical study of politics were actually considered a \"study of force,\" transactionalists would assert that knowing \"what actions are permissible\" (or not) given a the condition of being an organism-environment, then co-operation and knowing-as-inquiry into one's bodily condition and conditioning and the situation one is transacting in that conditions one's body, all this is vital to functioning successfully among others in any social situation or environment . In the Stanford Encyclopedia of Philosophy , it is noted that John Dewey was critical of the classical neoliberal stance that abstracts the individual from environment as if the individual precedes or lords from outside of a conception of society or social institutions. Dewey maintained that social institutions were not a \"means for obtaining something for individuals. They are means for 'creating' individuals in a co-operative inquiry into knowing how to live a satisfying life (Reconstruction in Philosophy, MW12, 190\u2013192).\" [C]lassical liberalism treats the individual as \u2018something given.\u2019 Instead, Dewey argues, \u2018liberalism knows that an individual is nothing fixed, given ready-made. It is something achieved, and achieved not in isolation but with the aid and support of conditions, cultural and physical: \u2014 including in \u201ccultural\u201d, economic, legal and political institutions as well as science and art\u2019 (\u2018The Future of Liberalism\u2019, LW11: 291).For Dewey, such treatment is \u2018the most pervasive fallacy of philosophical thinking\u2019 (\u2018Context and Thought\u2019, LW5, 5). Transactionalism is a radical form of governing one's self in one's environment(s). Transactionalism resists a political tendency to \"divide up experienced phenomena, and to take the distinct analysed elements to be separate existences, independent both of the analysis and of each other.\" Intelligent thinking is anti-dualistic, accurate, forethought . It takes into account other people, communities, and cultures . It stems from a \"deliberate control of what is done with reference to making what happens to us and what we do to things as fertile as possible of suggestions (of suggested meanings).\" [emphasis added Furthermore, intelligent thinking is a means for trying out the validity of those suggestions and other assumptions . The political governing of thinking towards dualisms and bifurcation as well as the \"false conception of the individual\" (apart from their environment) is what Dewey argued actually limits man's free (meaning \"liberal\") thought and action. All of this served as the core reasoning behind Dewey's development of an experimental philosophy that offset elite distortions of public education and learning.", "edit_actions": [{"type": "R", "before": "that of the state as conceived when thinking of a", "after": "the governing over a state or group as conventionally conceived in thoughts about", "start_char_pos": 166, "end_char_pos": 215}, {"type": "A", "before": null, "after": "Transactionalists view politics as a cooperative, genuine interaction between all participating parties whether buyer-seller, student-teacher, or worker-boss; we are biological as well as social subjects involved not merely in \"transacting\" for our own advantage or gain but connected to other entities. \"", "start_char_pos": 246, "end_char_pos": 246}, {"type": "A", "before": null, "after": "S", "start_char_pos": 247, "end_char_pos": 247}, {"type": "A", "before": null, "after": "ocial phenomena cannot be understood except as there is prior understanding of physical conditions and the laws of their", "start_char_pos": 248, "end_char_pos": 248}, {"type": "A", "before": null, "after": "socio-biological", "start_char_pos": 249, "end_char_pos": 249}, {"type": "A", "before": null, "after": "interactions,\" wrote John Dewey in Logic: The Theory of Inquiry. Furthermore, he added, \"inquiry into", "start_char_pos": 251, "end_char_pos": 251}, {"type": "A", "before": null, "after": "social phenomena", "start_char_pos": 252, "end_char_pos": 252}, {"type": "A", "before": null, "after": ", with respect both to data that are significant and to their relations or proper ordering, is conditioned upon extensive prior knowledge of physical phenomena and their laws. This fact accounts in part for the retarded and immature state of social subjects.\" Thus, cooperation and knowing as inquiry is foundational to governing communal affairs of any kind including economic trade and our educative process.", "start_char_pos": 253, "end_char_pos": 253}, {"type": "R", "before": "used here\u2014one that", "after": "(or trans-action) used here. His conception", "start_char_pos": 361, "end_char_pos": 379}, {"type": "R", "before": "a trade or", "after": "trade or some", "start_char_pos": 470, "end_char_pos": 480}, {"type": "R", "before": "or", "after": "in an", "start_char_pos": 603, "end_char_pos": 605}, {"type": "A", "before": null, "after": "paradigm", "start_char_pos": 627, "end_char_pos": 627}, {"type": "A", "before": null, "after": "they are", "start_char_pos": 636, "end_char_pos": 636}, {"type": "R", "before": "Transactionalist", "after": "Transactionalists", "start_char_pos": 666, "end_char_pos": 682}, {"type": "D", "before": "(the organism and its environment)", "after": null, "start_char_pos": 722, "end_char_pos": 756}, {"type": "A", "before": null, "after": "or aspects", "start_char_pos": 771, "end_char_pos": 771}, {"type": "D", "before": "view of the", "after": null, "start_char_pos": 826, "end_char_pos": 837}, {"type": "R", "before": "to", "after": "view to the", "start_char_pos": 854, "end_char_pos": 856}, {"type": "R", "before": "In", "after": "Referred to as", "start_char_pos": 905, "end_char_pos": 907}, {"type": "R", "before": "is a", "after": "often sets up the", "start_char_pos": 972, "end_char_pos": 976}, {"type": "R", "before": "same enjoined phenomenon . Without inquiry acting", "after": "enjoined phenomenon (e.g., knowing is doing, organizing the mental or physical acts in a pragmatic way). Without knowing-as-inquiry, blindly acting as an organism in an environment often", "start_char_pos": 1009, "end_char_pos": 1058}, {"type": "R", "before": ". Acting and knowing cooperate to provide knowledge", "after": "with the exception of beginner's luck. Acting", "start_char_pos": 1073, "end_char_pos": 1124}, {"type": "A", "before": null, "after": "understand knowing elicits pragmatic knowledge of functioning as", "start_char_pos": 1128, "end_char_pos": 1128}, {"type": "A", "before": null, "after": "knowing and acting", "start_char_pos": 1159, "end_char_pos": 1159}, {"type": "A", "before": null, "after": "challenging our assumptions and expectations which will wrong in some context", "start_char_pos": 1242, "end_char_pos": 1242}, {"type": "R", "before": "It is not", "after": "From the constitutive process of knowing and doing, knowledge is more than", "start_char_pos": 1410, "end_char_pos": 1419}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1444, "end_char_pos": 1445}, {"type": "A", "before": null, "after": "'s", "start_char_pos": 1488, "end_char_pos": 1488}, {"type": "A", "before": null, "after": "of person's", "start_char_pos": 1489, "end_char_pos": 1489}, {"type": "A", "before": null, "after": "mind", "start_char_pos": 1491, "end_char_pos": 1491}, {"type": "R", "before": "and the testingof that inquiry to insure the", "after": ". It arises out of a kind of testing; an iterative process of inquiry into what we know and expect, that insures a suitable", "start_char_pos": 1524, "end_char_pos": 1568}, {"type": "R", "before": "the solutionbut the", "after": "in solving problems (finding a solution). It insures the fitness of the", "start_char_pos": 1589, "end_char_pos": 1608}, {"type": "R", "before": ". While a human being is central", "after": "which may vary dependent on the situation, the time and place, or the culture.", "start_char_pos": 1630, "end_char_pos": 1662}, {"type": "A", "before": null, "after": "While a person is central (", "start_char_pos": 1663, "end_char_pos": 1663}, {"type": "R", "before": "to the conception of an", "after": "as in a nucleus) to a conception of", "start_char_pos": 1677, "end_char_pos": 1700}, {"type": "R", "before": "they", "after": "human beings as organisms", "start_char_pos": 1723, "end_char_pos": 1727}, {"type": "R", "before": "the socio-biological cosmosof which being", "after": "their social-biological cosmos. Being", "start_char_pos": 1769, "end_char_pos": 1810}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1831, "end_char_pos": 1831}, {"type": "R", "before": "it", "after": ",", "start_char_pos": 1850, "end_char_pos": 1852}, {"type": "A", "before": null, "after": "which they need to survive and they need to adapt to to thrive", "start_char_pos": 1880, "end_char_pos": 1880}, {"type": "A", "before": null, "after": "and assumptions about it", "start_char_pos": 1898, "end_char_pos": 1898}, {"type": "R", "before": "examined", "after": "tested, examined,", "start_char_pos": 1969, "end_char_pos": 1977}, {"type": "R", "before": "construction of moves and action", "after": "series of iterative moves and activity", "start_char_pos": 1998, "end_char_pos": 2030}, {"type": "A", "before": null, "after": "'s ability", "start_char_pos": 2070, "end_char_pos": 2070}, {"type": "R", "before": "intentions and", "after": "desired intentions to", "start_char_pos": 2086, "end_char_pos": 2100}, {"type": "D", "before": "a", "after": null, "start_char_pos": 2231, "end_char_pos": 2232}, {"type": "D", "before": ".\"", "after": null, "start_char_pos": 2260, "end_char_pos": 2262}, {"type": "D", "before": "Transactionalists view politics as a cooperative,genuine interaction between all participating parties whether buyer-seller", "after": null, "start_char_pos": 2263, "end_char_pos": 2386}, {"type": "D", "before": "student-teacher, or worker-boss; we are biological as well as social subjects involved not merely in", "after": null, "start_char_pos": 2389, "end_char_pos": 2489}, {"type": "D", "before": "transacting\" for our own advantage or gain but connected to other entities. \"", "after": null, "start_char_pos": 2492, "end_char_pos": 2569}, {"type": "D", "before": "S", "after": null, "start_char_pos": 2570, "end_char_pos": 2571}, {"type": "D", "before": "ocial phenomena cannot be understood except as there is prior understanding of physical conditions and the laws of their", "after": null, "start_char_pos": 2589, "end_char_pos": 2709}, {"type": "D", "before": "socio-biological", "after": null, "start_char_pos": 2710, "end_char_pos": 2726}, {"type": "D", "before": "interactions,\" wrote John Dewey in Logic: The Theory of Inquiry. Furthermore, he added, \"inquiry into", "after": null, "start_char_pos": 2745, "end_char_pos": 2846}, {"type": "D", "before": "social phenomena", "after": null, "start_char_pos": 2847, "end_char_pos": 2863}, {"type": "R", "before": ", with respect both to data that are significant and to their relations or proper ordering, is conditioned upon extensive prior knowledge of physical phenomena and their laws. This fact accounts in part for the retarded and immature state of social subjects.\" Thus, cooperation and knowing as inquiry is foundational to governing communal affairs of any kind including economic trade and our educative process.", "after": "out of which a transactional competence is achieved.", "start_char_pos": 2881, "end_char_pos": 3291}, {"type": "R", "before": "inquiry and", "after": "knowledgeable inquiry and mental", "start_char_pos": 3336, "end_char_pos": 3347}, {"type": "A", "before": null, "after": "analyze and", "start_char_pos": 3370, "end_char_pos": 3370}, {"type": "R", "before": "an analysis of past experience or expectationsin order to take control of", "after": "the past experiences shaping our biases and expectations. Without intelligence of this kind, one is unlikely to control", "start_char_pos": 3405, "end_char_pos": 3478}, {"type": "R", "before": "dogma", "after": "preconceived dogma, rites,", "start_char_pos": 3503, "end_char_pos": 3508}, {"type": "A", "before": null, "after": "a", "start_char_pos": 3548, "end_char_pos": 3548}, {"type": "A", "before": null, "after": "actually considered", "start_char_pos": 3609, "end_char_pos": 3609}, {"type": "R", "before": "of", "after": "transactionalists would assert that", "start_char_pos": 3630, "end_char_pos": 3632}, {"type": "R", "before": "given that man is", "after": "(or not) given a the condition of being", "start_char_pos": 3672, "end_char_pos": 3689}, {"type": "R", "before": "\u2014transactionalists assert\u2014cooperation", "after": "co-operation", "start_char_pos": 3720, "end_char_pos": 3757}, {"type": "R", "before": "are", "after": "into one's bodily condition and conditioning and the situation one is transacting in that conditions one's body, all this is", "start_char_pos": 3781, "end_char_pos": 3784}, {"type": "A", "before": null, "after": "in any social situation or environment", "start_char_pos": 3832, "end_char_pos": 3832}, {"type": "R", "before": "The", "after": "In the", "start_char_pos": 3835, "end_char_pos": 3838}, {"type": "R", "before": "noted that", "after": ", it is noted that John", "start_char_pos": 3875, "end_char_pos": 3885}, {"type": "R", "before": "the abstract individual precedes", "after": "abstracts the individual from environment as if the individual precedes or lords from outside of", "start_char_pos": 3945, "end_char_pos": 3977}, {"type": "R", "before": "He", "after": "Dewey", "start_char_pos": 4026, "end_char_pos": 4028}, {"type": "A", "before": null, "after": "in a co-operative inquiry into knowing how to live a satisfying life", "start_char_pos": 4166, "end_char_pos": 4166}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 4665, "end_char_pos": 4668}, {"type": "R", "before": "that resists the", "after": "one's self in one's environment(s). Transactionalism resists a political", "start_char_pos": 4805, "end_char_pos": 4821}, {"type": "R", "before": "; taking", "after": ". It takes", "start_char_pos": 5053, "end_char_pos": 5061}, {"type": "R", "before": "that", "after": ". It", "start_char_pos": 5115, "end_char_pos": 5119}, {"type": "A", "before": null, "after": "emphasis added", "start_char_pos": 5303, "end_char_pos": 5303}, {"type": "A", "before": null, "after": "and other assumptions", "start_char_pos": 5398, "end_char_pos": 5398}, {"type": "A", "before": null, "after": "(apart from their environment)", "start_char_pos": 5522, "end_char_pos": 5522}, {"type": "R", "before": "limited", "after": "limits", "start_char_pos": 5553, "end_char_pos": 5560}, {"type": "R", "before": "regarding a", "after": "of", "start_char_pos": 5740, "end_char_pos": 5751}], "sents_char_pos": [0, 245, 501, 665, 796, 904, 1035, 1074, 1153, 1409, 1631, 2128, 2421, 2567, 2809, 3056, 3140, 3291, 3564, 3834, 4025, 4123, 4281, 4377, 4639, 4756, 4990, 5054, 5300, 5400, 5611]}
+{"doc_id": "5071878", "revision_depth": "3", "before_revision": "Woman praying at Women of the Wall service wearing a tallit and tefillin. Women of the Wall (Hebrew: \u05e0\u05e9\u05d5\u05ea \u05d4\u05db\u05d5\u05ea\u05dc, Neshot HaKotel) is a multi-denominational Jewish feminist: \"The Women of the Wall believed themselves to be liberal feminists.\" organization based in Israel whose goal is to secure the rights of women to pray at the Western Wall, also called the Kotel, in a fashion that includes singing, reading aloud from the Torah and wearing religious garments (tallit, tefillin and kippah). Pew Research Center has identified Israel as one of the countries that place \"high\" restrictions on religion, and there have been limits placed on non-Orthodox streams of Judaism.\"U.S. Department of State: 2012 Report on International Religious Freedom: Israel and The Occupied Territories (May 20, 2013)\" One of those restrictions is that the administrator of the Western Wall Heritage Foundation has enforced gender segregation and limitations on religious garb worn by women. When the \"Women of the Wall\" hold monthly prayer services for women on Rosh Hodesh, they observe gender segregation so that Orthodox members may fully participate. But their use of religious garb, singing and reading from a Torah have upset many members of the Orthodox Jewish community, sparking protests and arrests. In May 2013 a judge ruled that a 2003 Israeli Supreme Court ruling prohibiting women from carrying a Torah or wearing prayer shawls had been misinterpreted and that Women of the Wall prayer gatherings at the wall should not be deemed illegal. In January 2016, the Israeli Cabinet approved a plan to designate a new space at the Kotel that would be available for egalitarian prayer and which would not be controlled by the Rabbinate. Women of the Wall welcomed the decision, even though their prayer was not egalitarian or non-Orthodox. but the plan faced opposition from other factions, including some ultra-Orthodox members of Prime Minister Benjamin Netanyahu's governing coalition, who threatened to withdraw over the government's plan to create non-Orthodox prayer space at the Western Wall in deference to the Women of the Wall.Netanyahu facing crisis as haredim vow to quit over Western Wall pluralism. The Jerusalem Post, March 7, 2016 Some board members and long-time supporters opposed this and began calling themselves Original Women of the Wall. In January 2017, the Israeli High Court ruled that if the government of Israel could not find \"good cause\" to prohibit women reading from the Torah in prayer services at the Kotel within 30 days, women could do so; they also ruled that the Israeli government could no longer argue that the Robinson's Arch area of the plaza is access to the Kotel. The petition for women to read from the Torah at the Kotel had been brought by Original Women of the Wall\". Summary 250px|The Western Wall (August 2012) From the start, Women of the Wall included Orthodox members and their service was run according to \"Orthodox standards.\" This was despite the fact that according to some orthodox standards, women do not wear tzitzit, tefillin, or read from the Torah.Sztokman, Elana (January 29, 2014). \"Tefillingate: Orthodoxy must not reject its most committed members\" (Haaretz). Retrieved October 29, 2014. Many Orthodox individuals were offended, including some who call themselves Orthodox feminists.: \"A third reason for choosing Orthodox services was our awareness that if we did not adopt Orthodox standards, Orthodox women would not attend our services or, in all likelihood, support our struggle. Non-Orthodox women who have been involved in the Kotel struggle have been most generous in allowing Orthodox practice to prevail, and our services at the Kotel as well as the solidarity services we sponsored elsewhere therefore have been conducted in accordance with Orthodox standards. Despite this many Orthodox women, even those who were active in women's tefillah groups and leaders of Orthodox feminism, remained reticent and ambivalent about our struggle to pray at the Kotel, and Orthodox rabbis, even those who permitted women's tefillah their synagogues, did not support our right to pray in an identical fashion at the Kotel.: \"The movement, which is controversial, even among Orthodox feminists, myself included...\" Women of the Wall is a multi-denominational group, including Reform, Conservative and modern- orthodox members.Amid Violence, Women of the Wall Vote Not to Engage Police This Month Haaretz, Oct 12, 2015 As Women of the Wall moved away from their commitment to include all Jewish women, Original Women of the Wall continued to hold prayer services at the Women's section of the Western Wall. Since 1988, the group has faced a legal battle for recognition of their right to pray at the Western Wall. Their presence is deemed offensive by some Orthodox worshippers at the site and there have been numerous court proceedings to settle the issue. On the Fast of Esther 1989, Orthodox men, outraged by the women's singing, hurled chairs and verbal insults at the women, which resulted in the deployment of tear gas to quell the violence. In 2010, police arrested two Haredi men at the Western Wall Plaza on suspicion that they threw chairs at a Women of the Wall group that was praying aloud at the site.2010 Human Rights Report: Israel and the occupied territories. U.S. Department of state. This article incorporates public domain material from this source. In 2009, the first woman was arrested for praying with a tallit. The struggle by the Women of the Wall is seen by the Israeli Orthodox religious establishment as an attempt to undermine their influence in an effort to introduce religious pluralism. A plan was approved by the Israeli Cabinet in January 2016 to designate a new space at the Kotel that would be available for egalitarian prayer and which would not be controlled by the Rabbinate. In 2017 the Israeli High Court ruled that if the government of Israel could not find \"good cause\" to prohibit women reading from the Torah in prayer services at the Kotel within 30 days, women could do so; they also ruled that the Israeli government could no longer argue that the Robinson's Arch area of the plaza is access to the Kotel. The petition for women to read from the Torah at the Kotel was brought by Original Women of the Wall . However, later that year it was announced that the plan approved in January 2016 to designate a new space at the Kotel that would be available for egalitarian prayer and which would not be controlled by the Rabbinate had been suspended. Events since the ruling of April 24, 2013 Events since May 2013DateNew monthNotesSourcesMay 10, 2013SivanIn response to the ruling allowing the Women of the Wall to hold their services at the site, between 5,000 and 10,000 Haredi girls converged to prevent the women from approaching. Police in turn offered protection to around 400 women who formed the largest gathering in the group's history. The women prayed together with a group of male supporters, the first time a mixed service had been held by the organisation. They had planned to bring a Torah scroll into the women's prayer section, but reneged upon the request of Minister of Religious Affairs Naftali Bennett. Three Haredi men were arrested for disturbing the peace. Chair of Women of the Wall, Anat Hoffman, said \"We are continuing in the footsteps of the paratroopers who liberated the Western Wall.\" Women for the Wall is founded to campaign against the Women of the Wall.At Western Wall, a clash over women praying. USA Today, (May 10, 2013)Maltz, Judith & Ettinger, Yair. Protesters hurl rocks in clashes over Women of the Wall prayer service at Kotel, Haartez (May 10, 2013).May 19, 2013Threatening graffiti was sprayed on the front door of a board member of the Women of the Wall organisation. It read: \"Peggy, you're the first. We know where you live. Jerusalem is holy. The Western Wall will not be forfeited. The Women of the Wall are villains.\" MK Michal Rozin (Meretz) blamed the attack on provocative statements by ultra-Orthodox MKs, and Jerusalem mayor Nir Barkat and his ultra-Orthodox deputy, Yitzhak Pindrus, denounced the act. Rabbi Shmuel Rabinovitch of the Western Wall called it \"a despicable incident,\" which \"did not represent Judaism.\"Nachshoni Kobi. 'Torah tag' sprayed on Women of Wall member's house, Ynet, (May 20, 2013).Vandals target home of Women of the Wall activist, Times of Israel, (May 20, 2013).June 6, 2013It was reported that Chief Rabbis Yona Metzger and Shlomo Amar had received death threats. The letters stated that if the Women of the Wall are not allowed to pray according to their ways and custom, \"we will fight you with all measures, and you will return home with 100 bodies of haredim... We will no longer practice restraint. We will re-liberate the Western Wall.\" Rabbi Shmuel Rabinovitch had also received a similar letter. Women of the Wall said that the organization \"had nothing to do with the act and that the style of these letters does not match the love of Israel spirit led by the group.\"Nachshoni Kobi. Chief rabbis threatened over Kotel war, Ynet, (June 4, 2013). July 8, 2013 Av United Torah Judaism arranged for between 5,000 and 7,000 Haredi girls to assemble at the wall and for the first time in 25 years, police prevented the Women of the Wall from approaching the site. Male protesters numbered around 1,000. The women, numbering around 300, held their service at the entrance to the Western Wall plaza and were occasionally disturbed by shouting and targeted at least twice by water bombs and eggs. An Orthodox man and women were arrested for public order offenses. Gilad Kariv of the Reform Movement in Israel said the police had \"given a reward to a small group of Haredi provocateurs and rabbis who deal in spreading baseless hatred.\" Orthodox Jerusalem deputy mayor Yitzhak Pindrus said \"baseless hatred caused the greatest destruction to befall our people and we will not let a small group of agitators to continue to polarise with provocations and baseless hatred.\" Sharon, Jeremy. Thousands of haredi girls prevent Women of Wall from praying by Western Wall, Jerusalem Post, (July 8, 2013).Fiske, Gavriel. Women of the Wall denied access to Kotel, Times of Israel, (July 8, 2013).August 27, 2013A temporary platform for non-Orthodox egalitarian prayer was unveiled at Robinson's Arch, the archaeological site adjacent to the Western Wall plaza. Referring to it as a \"sunbathing deck\", Anat Hoffman criticized it as \"second-rate Wall for second-rate Jews.\"Bennett unveils new platform for egalitarian prayer, Times of Israel, (August 27, 2013).Western Wall egalitarian plaza greeted with skepticism, Times of Israel, (August 25, 2013).October 2014Women of the Wall brought a Torah scroll to the Western Wall women's section and held their first Torah reading by a woman at the site, which was part of the bat mitzvah of Sasha Lutt. However, Shmuel Rabinowitz, the administrator of the Western Wall Heritage Foundation , issued a statement saying in part, \"In future, efforts will be made to ensure that this does not happen again, and the introduction of Torah scrolls will be banned for everyone - men and women.\" Nevertheless, in November 2014 the group celebrated a Bat Mitvah ceremony that included reading from the miniaturized Torah scroll without interference from Shmuel Rabinowitz, the Western Wall Heritage Foundation administrator .\"Maltz, Judy 'Despite warning, rabbi lets Women of the Wall read from Torah for second month'(Nov 23, URL 18, 2014Some of the Women of the Wall became the first women to light menorahs at the Western Wall. Specifically, they lit 28 menorahs in the women's section of the Wall. Comedian Sarah Silverman was among those who attended the lighting of the menorahs. However, this event came after the rabbi in charge of the Western Wall had refused a request from Women of the Wall to place a menorah in the women's section.April 20, 2015For the first time, some of the Women of the Wall read from a full-size Torah scroll during the group's monthly prayer service at the Western Wall. Torah scrolls at the Western Wall are normally stored in the men's section, which women are forbidden from entering. But on April 20 a group of male Jewish sympathizers handed a full-size Torah scroll over to Women of the Wall leaders. Some Haredi Orthodox men who had been praying at the Wall attacked the male sympathizers and tried to take the Torah scroll away from the women, but the attacking men were reportedly removed by the police, and the women were able to complete their prayer service.January 2016The Israeli Cabinet approved a plan to designate a new space at the Kotel that would be available for egalitarian prayer and which would not be controlled by the Rabbinate. Women of the Wall welcomed the decision.April 24, 2016Women of the Wall held Passover holiday prayers at the Kotel. However, Israel's attorney general banned them from holding a female priestly blessing ceremony, ruling that a female version of the ceremony would violate a law enforcing \"local customs\" at religious sites in Israel. Thus they did not hold that ceremony.January 2017The Israeli High Court ruled that if the government of Israel could not find \"good cause\" to prohibit women reading from the Torah in prayer services at the Kotel within 30 days, women could do so; they also ruled that the Israeli government could no longer argue that the Robinson's Arch area of the plaza is access to the Kotel. The petition for women to read from the Torah at the Kotel had been brought by a group that split off from the Women of the Wall, calling itself the \"Original Women of the Wall\". June 2017It was announced that the plan approved in January 2016 (see above) had been suspended.October 20, 2017HeshvanSix-Day War veterans confront Western Wall Heritage Foundation guards at the Dung Gate entrance to the Western Wall and force their way in to the plaza with Women of the Wall's Torah scroll.May 15, 2018SivanFor the first time in over a year, Women of the Wall held their service outside the metal barricades set up by the Western Wall Heritage Foundation at the far corner of the women's section. Several members of the group have been arrested for acts that Women of the Wall members say are legal under the Supreme Court ruling. Nofrat Frenkel was arrested for wearing a tallit and holding a Torah in November 2009. She was not charged, but she was barred from visiting the Wall for two weeks. On February 11, 2013, ten women who were part of WOW, including two North American rabbis, were detained for praying at the wall and \"as a result of them wearing the garments that they're not allowed to wear specifically at that site.\" The women were barred from returning for 15 days. On April 11, 2013, five women were detained for allegedly goading and offending other worshippers. They were subsequently released by Judge Sharon Larry-Bavili without restrictions as she ruled that the female worshippers did not instigate the disturbance, but rather it was the male and female Ultra Orthodox protestors countering them that initiated it. Women of the Wall's position The Women of the Wall have consistently claimed that there is no single \"custom of the place\" and that their right to pray is a religious freedom enshrined in Israeli law. They believe the Western Wall is a religious site as well as a national site and therefore belongs to the entire Jewish population. Their efforts to challenge the current customs at the Wall and break the ritual status quo continues as they believe that the Wall is a holy place for all Jews. They repeatedly stress that the group is not Reform Jews, but come from all affiliations and that their conduct strictly adheres to Orthodox Jewish Law and that their prayer is genuine and not a political stunt. Some understandings of Orthodox Jewish law strictly prohibits women reading from the Torah, and to a lesser degree women wearing tallit and kippahs. Their central mission is to \"achieve the social and legal recognition of our right, as women, to wear prayer shawls, pray and read from the Torah collectively and out loud at the Western Wall.\" The women have made progress and as of 1988, the women have held occasional, uninterrupted prayer services wearing tallitot and tefillin. Israeli Orthodox establishment's position Many from the Israeli Orthodox Jewish religious establishment are opposed to the services conducted by the Women of the Wall. Some Orthodox rabbis claim that even if such a manner of prayer is theoretically permitted by Jewish Law, it is against Jewish custom. Even if support can be found in Jewish legal sources for various activities, the force of custom is equal to absolute law and it is the custom which determines proper conduct. Various legal opinions recorded in Halacha cannot be manipulated to introduce new forms of prayer. The opinion of Rabbi Moshe Feinstein, which is cited by Women of the Wall in support of their cause, is rejected by the establishment, as they view the Women of the Wall as being motivated by feminism rather than a sincere spiritual desire.Frimer, Arye and Dov, Women's Prayer Services Theory and Practice Tradition, 1998 Their struggle is also seen as an attempt to undermine their influence and as a strategy for non-Orthodox groups to gradually gain official recognition at state level, paving the way for the introduction of religious pluralism in Israel.: \"The Israeli Orthodox establishment view the Women of the Wall as being a Trojan horse to introduce Jewish pluralism and establish the Reform, Conservative, and Reconstructionist strains of Judaism in Israel.\" In a letter to the group, Yehuda Getz, the government appointed rabbi of the Western Wall, urged them to stop \"straying from the hallowed traditions of generations of Jews before you\" and in 1989, the Israeli Chief Rabbi Avraham Shapiro and the Religious Affairs Minister suggested that these women \"pray individually, silently, and preferably at home-not at the wall.\" Phyllis Chesler now of Original Women of the Wall wrote: \"We asked for our rights under civil and religious law. When we prayed, other worshipers, both men and women, verbally and physically assaulted us. We asked the Israeli state to protect us so that we could exercise our rights. The state claimed it could not contain the violence against us, and that we ourselves had provoked the violence by \"disturbing/offending\" the \"sensibilities of Jews at worship.\" Women are not seen as \"Jews\" or as \"worshipers\" with \"sensibilities.\" %DIFDELCMD < %DIFDELCMD < %%% Original Women of the Wall has since 2014 held monthly services at the Kotel on various days of the month. They uphold the original goals of the group to hold women's prayer groups at the Women's Section of the Western Wall. Their membership consists of most of the original members of the group who were at the Wall in 1988. The group includes members from all stream of Judaism. Some of their members wear tallit (prayer shawl), tefillin and they read Torah on appropriate days.", "after_revision": "Woman praying at Women of the Wall service wearing a tallit and tefillin. Women of the Wall (Hebrew: \u05e0\u05e9\u05d5\u05ea \u05d4\u05db\u05d5\u05ea\u05dc, Neshot HaKotel) is a multi-denominational Jewish feminist: \"The Women of the Wall believed themselves to be liberal feminists.\" organization based in Israel whose goal is to secure the rights of women to pray at the Western Wall, also called the Kotel, in a fashion that includes singing, reading aloud from the Torah and wearing religious garments (tallit, tefillin and kippah). Pew Research Center has identified Israel as one of the countries that place \"high\" restrictions on religion, and there have been limits placed on non-Orthodox streams of Judaism.\"U.S. Department of State: 2012 Report on International Religious Freedom: Israel and The Occupied Territories (May 20, 2013)\" One of those restrictions is that the Rabbi of the Western Wall has enforced gender segregation and limitations on religious garb worn by women. When the \"Women of the Wall\" hold monthly prayer services for women on Rosh Hodesh, they observe gender segregation so that Orthodox members may fully participate. But their use of religious garb, singing and reading from a Torah have upset many members of the Orthodox Jewish community, sparking protests and arrests. In May 2013 a judge ruled that a 2003 Israeli Supreme Court ruling prohibiting women from carrying a Torah or wearing prayer shawls had been misinterpreted and that Women of the Wall prayer gatherings at the wall should not be deemed illegal. In January 2016, the Israeli Cabinet approved a plan to designate a new space at the Kotel that would be available for egalitarian prayer and which would not be controlled by the Rabbinate. Women of the Wall welcomed the decision, but the plan faced opposition from other factions, including some ultra-Orthodox members of Prime Minister Benjamin Netanyahu's governing coalition, who threatened to withdraw over the government's plan to create non-Orthodox prayer space at the Western Wall in deference to the Women of the Wall.Netanyahu facing crisis as haredim vow to quit over Western Wall pluralism. The Jerusalem Post, March 7, 2016 In January 2017, the Israeli High Court ruled that if the government of Israel could not find \"good cause\" to prohibit women reading from the Torah in prayer services at the Kotel within 30 days, women could do so; they also ruled that the Israeli government could no longer argue that the Robinson's Arch area of the plaza is access to the Kotel. The petition for women to read from the Torah at the Kotel had been brought by a group that split off from the Women of the Wall, calling itself the \" Original Women of the Wall\". Summary 250px|The Western Wall (August 2012) From the start, Women of the Wall included Orthodox members and opted to claim their service was run according to \"Orthodox standards.\" This was despite the fact that according to orthodox standards, women do not wear tzitzit, tefillin, or read from the Torah.Sztokman, Elana (January 29, 2014). \"Tefillingate: Orthodoxy must not reject its most committed members\" (Haaretz). Retrieved October 29, 2014. Most Orthodox individuals were offended, including some who call themselves Orthodox feminists.: \"A third reason for choosing Orthodox services was out awareness that if we did not adopt Orthodox standards, Orthodox women would not attend our services or, in all likelihood, support our struggle. Non-Orthodox women who have been involved in the Kotel struggle have been most generous in allowing Orthodox practice to prevail, and our services at the Kotel as well as the solidarity services we sponsored elsewhere therefore have been conducted in accordance with Orthodox standards. Despite this many Orthodox women, even those who were active in women's tefillah groups and leaders of Orthodox feminism, remained reticent and ambivalent about our struggle to pray at the Kotel, and Orthodox rabbis, even those who permitted women's tefillah their synagogues, did not support our right to pray in an identical fashion at the Kotel.: \"The movement, which is controversial, even among Orthodox feminists, myself included...\" Women of the Wall is a multi-denominational group, including Reform, Conservative and modern- orthodox members.Amid Violence, Women of the Wall Vote Not to Engage Police This Month Haaretz, Oct 12, 2015 Since 1988, the group has faced a legal battle for recognition of their right to pray at the Western Wall. Their presence is deemed offensive by Orthodox worshippers at the site and there have been numerous court proceedings to settle the issue. On the Fast of Esther 1989, Orthodox men, outraged by the women's singing, hurled chairs and verbal insults at the women, which resulted in the deployment of tear gas to quell the violence. In 2010, police arrested two Haredi men at the Western Wall Plaza on suspicion that they threw chairs at a Women of the Wall group that was praying aloud at the site.2010 Human Rights Report: Israel and the occupied territories. U.S. Department of state. This article incorporates public domain material from this source. In 2009, the first woman was arrested for praying with a tallit. The struggle by the Women of the Wall is seen by the Israeli Orthodox religious establishment as an attempt to undermine their influence in an effort to introduce religious pluralism. A plan was approved by the Israeli Cabinet in January 2016 to designate a new space at the Kotel that would be available for egalitarian prayer and which would not be controlled by the Rabbinate. In 2017 the Israeli High Court ruled that if the government of Israel could not find \"good cause\" to prohibit women reading from the Torah in prayer services at the Kotel within 30 days, women could do so; they also ruled that the Israeli government could no longer argue that the Robinson's Arch area of the plaza is access to the Kotel. The petition for women to read from the Torah at the Kotel had been brought by a group that split off from the Women of the Wall, calling itself the \" Original Women of the Wall \" . However, later that year it was announced that the plan approved in January 2016 to designate a new space at the Kotel that would be available for egalitarian prayer and which would not be controlled by the Rabbinate had been suspended. Events since the ruling of April 24, 2013 Events since May 2013DateNew monthNotesSourcesMay 10, 2013SivanIn response to the ruling allowing the Women of the Wall to hold their services at the site, between 5,000 and 10,000 Haredi girls converged to prevent the women from approaching. Police in turn offered protection to around 400 women who formed the largest gathering in the group's history. The women prayed together with a group of male supporters, the first time a mixed service had been held by the organisation. They had planned to bring a Torah scroll into the women's prayer section, but reneged upon the request of Minister of Religious Affairs Naftali Bennett. Three Haredi men were arrested for disturbing the peace. Chair of Women of the Wall, Anat Hoffman, said \"We are continuing in the footsteps of the paratroopers who liberated the Western Wall.\" Women for the Wall is founded to campaign against the Women of the Wall.At Western Wall, a clash over women praying. USA Today, (May 10, 2013)Maltz, Judith & Ettinger, Yair. Protesters hurl rocks in clashes over Women of the Wall prayer service at Kotel, Haartez (May 10, 2013).May 19, 2013Threatening graffiti was sprayed on the front door of an executive board member of the Women of the Wall organisation. It read: \"Peggy, you're the first. We know where you live. Jerusalem is holy. The Western Wall will not be forfeited. The Women of the Wall are villains.\" MK Michal Rozin (Meretz) blamed the attack on provocative statements by ultra-Orthodox MKs, and Jerusalem mayor Nir Barkat and his ultra-Orthodox deputy, Yitzhak Pindrus, denounced the act. Rabbi Shmuel Rabinovitch of the Western Wall called it \"a despicable incident,\" which \"did not represent Judaism.\"Nachshoni Kobi. 'Torah tag' sprayed on Women of Wall member's house, Ynet, (May 20, 2013).Vandals target home of Women of the Wall activist, Times of Israel, (May 20, 2013).June 6, 2013It was reported that Chief Rabbis Yona Metzger and Shlomo Amar had received death threats. The letters stated that if the Women of the Wall are not allowed to pray according to their ways and custom, \"we will fight you with all measures, and you will return home with 100 bodies of haredim... We will no longer practice restraint. We will re-liberate the Western Wall.\" Rabbi Shmuel Rabinovitch had also received a similar letter. Women of the Wall said that the organization \"had nothing to do with the act and that the style of these letters does not match the love of Israel spirit led by the group.\"Nachshoni Kobi. Chief rabbis threatened over Kotel war, Ynet, (June 4, 2013). July 8, 2013 Av United Torah Judaism arranged for between 5,000 and 7,000 Haredi girls to assemble at the wall and for the first time in 25 years, police prevented the Women of the Wall from approaching the site. Male protesters numbered around 1,000. The women, numbering around 300, held their service at the entrance to the Western Wall plaza and were occasionally disturbed by shouting and targeted at least twice by water bombs and eggs. An Orthodox man and women were arrested for public order offenses. Gilad Kariv of the Reform Movement in Israel said the police had \"given a reward to a small group of Haredi provocateurs and rabbis who deal in spreading baseless hatred.\" Orthodox Jerusalem deputy mayor Yitzhak Pindrus said \"baseless hatred caused the greatest destruction to befall our people and we will not let a small group of agitators to continue to polarise with provocations and baseless hatred.\" Sharon, Jeremy. Thousands of haredi girls prevent Women of Wall from praying by Western Wall, Jerusalem Post, (July 8, 2013).Fiske, Gavriel. Women of the Wall denied access to Kotel, Times of Israel, (July 8, 2013).August 27, 2013A temporary platform for non-Orthodox egalitarian prayer was unveiled at Robinson's Arch, the archaeological site adjacent to the Western Wall plaza. Referring to it as a \"sunbathing deck\", Anat Hoffman criticized it as \"second-rate Wall for second-rate Jews.\"Bennett unveils new platform for egalitarian prayer, Times of Israel, (August 27, 2013).Western Wall egalitarian plaza greeted with skepticism, Times of Israel, (August 25, 2013).October 2014Women of the Wall smuggled in a Torah scroll to the Western Wall women's section and held their first Torah reading by a woman at the site, which was part of the bat mitzvah of Sasha Lutt. However, Shmuel Rabinowitz, the rabbi of the Western Wall , issued a statement saying in part, \"In future, efforts will be made to ensure that this does not happen again, and the introduction of Torah scrolls will be banned for everyone - men and women.\" Nevertheless, in November 2014 the group celebrated a Bat Mitvah ceremony that included reading from the miniaturized Torah scroll without interference from Shmuel Rabinowitz, the Western Wall rabbi .\"Maltz, Judy 'Despite warning, rabbi lets Women of the Wall read from Torah for second month'(Nov 23, URL 18, 2014Some of the Women of the Wall became the first women to light menorahs at the Western Wall. Specifically, they lit 28 menorahs in the women's section of the Wall. Comedian Sarah Silverman was among those who attended the lighting of the menorahs. However, this event came after the rabbi in charge of the Western Wall had refused a request from Women of the Wall to place a menorah in the women's section.April 20, 2015For the first time, some of the Women of the Wall read from a full-size Torah scroll during the group's monthly prayer service at the Western Wall. Torah scrolls at the Western Wall are normally stored in the men's section, which women are forbidden from entering. But on April 20 a group of male Jewish sympathizers handed a full-size Torah scroll over to Women of the Wall leaders. Some Haredi Orthodox men who had been praying at the Wall attacked the male sympathizers and tried to take the Torah scroll away from the women, but the attacking men were reportedly removed by the police, and the women were able to complete their prayer service.January 2016The Israeli Cabinet approved a plan to designate a new space at the Kotel that would be available for egalitarian prayer and which would not be controlled by the Rabbinate. Women of the Wall welcomed the decision.April 24, 2016Women of the Wall held Passover holiday prayers at the Kotel. However, Israel's attorney general banned them from holding a female priestly blessing ceremony, ruling that a female version of the ceremony would violate a law enforcing \"local customs\" at religious sites in Israel. Thus they did not hold that ceremony.January 2017The Israeli High Court ruled that if the government of Israel could not find \"good cause\" to prohibit women reading from the Torah in prayer services at the Kotel within 30 days, women could do so; they also ruled that the Israeli government could no longer argue that the Robinson's Arch area of the plaza is access to the Kotel. The petition for women to read from the Torah at the Kotel had been brought by a group that split off from the Women of the Wall, calling itself the \"Original Women of the Wall\". June 2017It was announced that the plan approved in January 2016 (see above) had been suspended.October 20, 2017HeshvanSix-Day War veterans confront Western Wall Heritage Foundation guards at the Dung Gate entrance to the Western Wall and force their way in to the plaza with Women of the Wall's Torah scroll.May 15, 2018SivanFor the first time in over a year, Women of the Wall held their service outside the metal barricades set up by the Western Wall Heritage Foundation at the far corner of the women's section. Several members of the group have been arrested for acts that Women of the Wall members say are legal under the Supreme Court ruling. Nofrat Frenkel was arrested for wearing a tallit under her coat and holding a Torah in November 2009. She was not charged, but she was barred from visiting the Wall for two weeks. On February 11, 2013, ten women who were part of WOW, including two American rabbis, were detained for praying at the wall and \"as a result of them wearing the garments that they're not allowed to wear specifically at that site.\" The women were barred from returning for 15 days. On April 11, 2013, five women were detained for allegedly goading and offending other worshippers. They were subsequently released by Judge Sharon Larry-Bavili without restrictions as she ruled that the female worshippers did not instigate the disturbance, but rather it was the male and female Orthodox protestors countering them that initiated it. Women of the Wall's position The Women of the Wall have consistently claimed that there is no single \"custom of the place\" and that their right to pray is a religious freedom enshrined in Israeli law. They believe the Western Wall is a religious site as well as a national site and therefore belongs to the entire Jewish population. Their efforts to challenge the current customs at the Wall and break the ritual status quo continues as they believe that the Wall is a holy place for all Jews. They repeatedly stress that the group is not Reform Jews, but come from all affiliations and that their conduct strictly adheres to Orthodox Jewish Law and that their prayer is genuine and not a political stunt. Orthodox Jewish law strictly prohibits women reading from the Torah, and to a lesser degree women wearing tallit and kippahs. Their central mission is to \"achieve the social and legal recognition of our right, as women, to wear prayer shawls, pray and read from the Torah collectively and out loud at the Western Wall.\" The women have made progress and as of 1988, the women have held occasional, uninterrupted prayer services wearing tallitot and tefillin. Israeli Orthodox establishment's position The Israeli Orthodox Jewish religious establishment is opposed to the services conducted by the Women of the Wall. Orthodox rabbis claim that even if such a manner of prayer is theoretically permitted by Jewish Law, it is against Jewish custom. Even if support can be found in Jewish legal sources for various activities, the force of custom is equal to absolute law and it is the custom which determines proper conduct. Various legal opinions recorded in Halacha cannot be manipulated to introduce new forms of prayer. The opinion of Rabbi Moshe Feinstein, which is cited by Women of the Wall in support of their cause, is rejected by the establishment, as they view the Women of the Wall as being motivated by feminism rather than a sincere spiritual desire.Frimer, Arye and Dov, Women's Prayer Services Theory and Practice Tradition, 1998 Their struggle is also seen as an attempt to undermine their influence and as a strategy for non-Orthodox groups to gradually gain official recognition at state level, paving the way for the introduction of religious pluralism in Israel.: \"The Israeli Orthodox establishment view the Women of the Wall as being a Trojan horse to introduce Jewish pluralism and establish the Reform, Conservative, and Reconstructionist strains of Judaism in Israel.\" In a letter to the group, Yehuda Getz, the government appointed rabbi of the Western Wall, urged them to stop \"straying from the hallowed traditions of generations of Jews before you\" and in 1989, the Israeli Chief Rabbi Avraham Shapiro and the Religious Affairs Minister suggested that these women \"pray individually, silently, and preferably at home-not at the wall.\" Phyllis Chesler of Women of the Wall wrote: \"We asked for our rights under civil and religious law. When we prayed, other worshipers, both men and women, verbally and physically assaulted us. We asked the Israeli state to protect us so that we could exercise our rights. The state claimed it could not contain the violence against us, and that we ourselves had provoked the violence by \"disturbing/offending\" the \"sensibilities of Jews at worship.\" Women are not seen as \"Jews\" or as \"worshipers\" with \"sensibilities.\" %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "R", "before": "administrator", "after": "Rabbi", "start_char_pos": 837, "end_char_pos": 850}, {"type": "D", "before": "Heritage Foundation", "after": null, "start_char_pos": 871, "end_char_pos": 890}, {"type": "D", "before": "even though their prayer was not egalitarian or non-Orthodox.", "after": null, "start_char_pos": 1765, "end_char_pos": 1826}, {"type": "D", "before": "Some board members and long-time supporters opposed this and began calling themselves Original Women of the Wall.", "after": null, "start_char_pos": 2234, "end_char_pos": 2347}, {"type": "A", "before": null, "after": "a group that split off from the Women of the Wall, calling itself the \"", "start_char_pos": 2775, "end_char_pos": 2775}, {"type": "A", "before": null, "after": "opted to claim", "start_char_pos": 2914, "end_char_pos": 2914}, {"type": "D", "before": "some", "after": null, "start_char_pos": 3016, "end_char_pos": 3020}, {"type": "R", "before": "Many", "after": "Most", "start_char_pos": 3245, "end_char_pos": 3249}, {"type": "R", "before": "our", "after": "out", "start_char_pos": 3393, "end_char_pos": 3396}, {"type": "D", "before": "As Women of the Wall moved away from their commitment to include all Jewish women, Original Women of the Wall continued to hold prayer services at the Women's section of the Western Wall.", "after": null, "start_char_pos": 4472, "end_char_pos": 4659}, {"type": "D", "before": "some", "after": null, "start_char_pos": 4805, "end_char_pos": 4809}, {"type": "R", "before": "was brought by", "after": "had been brought by a group that split off from the Women of the Wall, calling itself the \"", "start_char_pos": 6266, "end_char_pos": 6280}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 6308, "end_char_pos": 6308}, {"type": "R", "before": "a", "after": "an executive", "start_char_pos": 7759, "end_char_pos": 7760}, {"type": "R", "before": "brought", "after": "smuggled in", "start_char_pos": 10753, "end_char_pos": 10760}, {"type": "R", "before": "administrator", "after": "rabbi", "start_char_pos": 10952, "end_char_pos": 10965}, {"type": "D", "before": "Heritage Foundation", "after": null, "start_char_pos": 10986, "end_char_pos": 11005}, {"type": "R", "before": "Heritage Foundation administrator", "after": "rabbi", "start_char_pos": 11396, "end_char_pos": 11429}, {"type": "A", "before": null, "after": "under her coat", "start_char_pos": 14388, "end_char_pos": 14388}, {"type": "D", "before": "North", "after": null, "start_char_pos": 14573, "end_char_pos": 14578}, {"type": "D", "before": "Ultra", "after": null, "start_char_pos": 15086, "end_char_pos": 15091}, {"type": "D", "before": "Some understandings of", "after": null, "start_char_pos": 15853, "end_char_pos": 15875}, {"type": "R", "before": "Many from the", "after": "The", "start_char_pos": 16376, "end_char_pos": 16389}, {"type": "R", "before": "are", "after": "is", "start_char_pos": 16438, "end_char_pos": 16441}, {"type": "D", "before": "Some", "after": null, "start_char_pos": 16502, "end_char_pos": 16506}, {"type": "R", "before": "now of Original", "after": "of", "start_char_pos": 18069, "end_char_pos": 18084}, {"type": "D", "before": "Original Women of the Wall has since 2014 held monthly services at the Kotel on various days of the month. They uphold the original goals of the group to hold women's prayer groups at the Women's Section of the Western Wall. Their membership consists of most of the original members of the group who were at the Wall in 1988. The group includes members from all stream of Judaism. Some of their members wear tallit (prayer shawl), tefillin and they read Torah on appropriate days.", "after": null, "start_char_pos": 18615, "end_char_pos": 19095}], "sents_char_pos": [0, 73, 492, 672, 971, 1135, 1290, 1533, 1723, 2124, 2199, 2347, 2562, 2695, 2804, 2971, 3101, 3136, 3216, 3244, 3340, 3541, 3828, 4177, 4380, 4659, 4766, 4910, 5100, 5267, 5329, 5355, 5422, 5487, 5671, 5867, 6073, 6206, 6547, 6832, 6943, 7068, 7221, 7278, 7414, 7487, 7531, 7588, 7693, 7812, 7847, 7871, 7890, 7930, 7967, 8157, 8271, 8287, 8362, 8445, 8547, 8749, 8787, 8887, 9059, 9075, 9137, 9350, 9389, 9580, 9647, 9819, 10053, 10069, 10179, 10194, 10269, 10433, 10543, 10632, 10723, 10919, 11202, 11636, 11707, 11791, 11950, 12111, 12228, 12347, 12611, 12795, 12836, 12911, 13129, 13167, 13376, 13509, 13688, 13785, 13998, 14204, 14338, 14426, 14504, 14740, 14790, 14889, 15146, 15347, 15479, 15640, 15852, 16001, 16195, 16333, 16501, 16636, 16812, 16911, 17152, 17471, 17682, 18052, 18165, 18257, 18336, 18514, 18721, 18839, 18940, 18995]}
+{"doc_id": "50839193", "revision_depth": "1", "before_revision": "Erwin Huang (\u9ec3\u5cb3\u6c38, born 1965) is a pioneer in bringing technology to education and social enterprise. He is well known for his participation in the TV reality show where the Silicon Valley-trained expert and CEO of a listed company lived a in crummy subdivided apartment in Shum Shui Po, Hong Kong, earning 50 HKD per day. This experience had significantly changed Erwin 's view towards life, motivating him to actively engaging in social entrepreneurship and helping the underprivileged groups via social innovations and information technology. Early life Erwin is the son of Mr. Huang Shih-chiu Steve, who was the first Chinese to be appointed as General Manager of Rediffusion Television Limited. Erwin 's mother, Prof. Dolly P. Huang, was the Honorary Professor of the Department of Clinical Oncology in the Chinese University of Hong Kong and the pioneering expert in nasopharyngeal cancer. Erwin has an elder sister and a younger brother. Erwin received his primary and secondary education in La Salle College, where he went to the same class as Brandon Lee, the son of Bruce Lee. To prove he could do as good as his dad, Erwin applied and got admitted successfully to the University of California, Berkeley, the university where his dad graduated in. However, after studying there for six months, his dad made him transfer to Occidental College in Los Angeles because his father thought the university \u2018was not suitable\u2019 to him. During his studies, Erwin's dad refused to pay anything but his tuition to avoid him being distracted from school. He worked part-time after school to buy his first car, which was then worth US $65. He also used the salary of his part-time job to travel around US and Europe, demonstrating that it was possible to \u201cread thousands of books and travel thousands of miles at the same time\u201d. The social entrepreneur graduated at Boston University in 1986 with a double degree in Information Technology and System Management. Erwin has also studied in MIT, Harvard Business School and Tsinghua University in Beijing. He likes to meet with young people and undergraduates to exchange ideas and experience in many university talks in Hong Kong. Career Erwin's career started in Apple Inc in US. Thereafter, he focused on establishing his own start-up companies and software development. The entrepreneur invested and ran various publishing, information technology and telecommunication companies, as well as developing software for phones (which were the predecessors of smartphone apps) in Hong Kong, China, Tokyo, San Francisco, Silicon Valley, New York, Brazil and London. In 2005, he was invited to join Tse Sui Luen Jewellry (International) Limited (thereafter known as TSL; HKEx 417) and was appointed as CEO in 2008. Erwin is now the Non-Executive Director and Deputy Chairman of TSL. In 2008, he worked with Senior Citizen Home Safety Association and CSL Mobile to develop Personal Emergency Link Service successfully. In 2009, Erwin participated in TV reality show \u201cRich Mate Poor Mate Series\u201d to explore the problem of extreme disparity between the rich and the poor in Hong Kong, which was his first time experiencing the despair of the poverty-stricken communities in real life. In 2011, he founded the social enterprise WebOrganic. He is currently the Vice Chairman of the enterprise. Erwin was also the President of Hong Kong Information Technology Federation (HKITF), Chairman of eLearning Consortium and Vice Chairman of SCHSA (safety bell). Erwin believes corporate has its social responsibility to bring positive social impact to the society apart from making profits. In 2014, Erwin was awarded as the Hong Kong Spirit Ambassador. In 2016, Erwin has accepted the invitation from The Hong Kong University of Science and Technology (HKUST) to be appointed as Adjunct Professor of Information Systems, Business Statistics and Operations Management in School of Business, Associate Professor of Engineering Practice in School of Engineering, and Senior Advisor of Centre for Education Innovation in Entrepreneurship. Information technology After graduating from university, Erwin joined Apple in 1986 responsible for the retail and distribution network in China. He was the first person selling Apple computers to China. At that time, Apple's Macintosh did not provide a Chinese version. Therefore, Erwin went back to the headquarters and negotiated for a Chinese version with PageMaker. In 1989, he returned to Hong Kong to start his business. In two months\u2019 time, he introduced the desktop publishing layout software PageMaker (Chinese version) to Hong Kong. By breaking the limits of the traditional publishing industry, as well as assisting the first publication of Next Magazine, Erwin had thus successfully earned HK$ 10 million. The introduction of PageMaker allowed people to do publishing work on a desktop computer easily, therefore gradually replacing the traditional typesetting technology. Then, Erwin started doing web-based software development. The Internet was starting to take off at that time. He founded Digital Creation to write websites and develop a campus information-sharing software Schoolteam, allowing students to access information online anytime, anywhere. The software was highly recognized by Dr Rao Machiraju, the Director of Technology of Apple Inc at that time. Dr Machiraju thus invited him to Silicon Valley to found Magically, Inc., which provided online virtual office, email communication and information synchronization SyncML services. Through acquisition of a listed company in the United Kingdom, Erwin helped the company to get listed in the Alternative Investment Market in the UK. Magically's strategic investor included Richard Li Tzar Kai. In 2003, due to his parents severe illness, Erwin decided to sell his business in US and returned to Hong Kong. In 2004, he founded Digital Life and became an angel investor who focused on investing technology companies with good prospects. In 2007, the technology expert started Xtown Mobile to develop smartphone apps. In 2009, his company worked with Next Media to develop an iPhone version for Apple Daily. In 2011, Xtown Mobile made to the top five in Microsoft's list of top technology developers in China. Erwin once said his personal investment rule is \u201cinsisting not to invest in sectors that he is unfamiliar with\u201d but he admitted that he had also made failed investments. Before the dot-com bubble in Hong Kong, he invested in Albert Cheng\u2019s 36.com. Prior to the public listing of the company, he invested HKD$700,000, which later soared to a top of HKD$2,000,000. However, its stock price collapsed eventually and was worth virtually nothing in the end. He later revealed in an interview that around 25\\% of the companies he invested in would succeed, higher than the industry average of angel investment. In 2005, Erwin was invited by his college classmate Tommy Tse Tat-fung to join Tse Sui Luen Group as one of the Board of Directors. In less than a month, Tse Sui-luen and his son, Tommy Tse Tat-fung, were arrested by ICAC for an alleged illegal commission scheme and misappropriating listed company funds. Erwin said in an interview that at that moment he was not sure whether he had joined an unscrupulous shop. Yet, he still decided to continue his work with the company for personal loyalty. Erwin was promoted to the CEO of TSL Group in June 2008, working alongside Tommy Tse Tat-fung's wife, Annie Yau On Yee, the Chairman of the company. The company was resumed to trading in 2009, and Erwin was promoted to Deputy Chairman of the TSL Group. Despite the global financial crisis at that time, the Group's performance improved in the poor-performing market with a 60\\% increase in net profit. After the resumption of trading in June 2009, the stock price had been increased tenfold within 6 months. In early 2010, Erwin decided to resign as the company CEO and only kept his position as the Deputy Chairman in order to spare more time on community and education work. On March 1, 2015, Erwin resigned as TSL Group\u2019s Executive Director, Executive Committee member and Business Development Director and became Non-executive Director and Deputy Chairperson of the company, acting as the advisor and consultant of the Group. Erwin repeatedly said that he was more interested in entrepreneurship than working as an employee. He once said his work in TSL Group had always been a challenge to him, but it was surely not an end. During his employment at TSL Group, the serial entrepreneur founded Xtown. Erwin once said in an interview his financial return on investing in Xtown might not be higher than his income in TSL Group, however, he believed life was not only about making a lot of money, and he felt much more satisfied if he could bring a revolution and make a difference to the industry. Social innovations In 2008, Erwin , then Vice-president of Senior Citizen Home Safety Association, served as the Convener of \u201cMobile Link\u201d and cooperated with CSL to develop Personal Emergency Link Service, also known as Safety Bell for the elderly. In the following year, Erwin was invited to join RTHK\u2019s reality TV show \u201cRich Mate Poor Mate Series\u201d to experience the lives of the underprivileged, which became the turning point of his life. During the reality show, he took some freelance cleaning jobs in Tsz Wan Shan in Hong Kong, earning 50 HKD (around 6.4 USD) per day and living in a rental of 700HKD (90USD) per month subdivided apartment in Sham Shui Po for 5 days. The only thing he could bring with him was his iPhone during the 5-day experience. On the show premier, the General Manager of YMCA Hong Kong, Dr. Alice Yuk said to him, \u201cYou returned to your own world, but their lives are still the same. Many people are still very poor. What can we do to help?\u201d This has prompted him to resign as the CEO of TSL Group in 2010. In May next year, Erwin founded WebOrganic and served as the CEO of the company with a mission to solve the problem of cross-generational poverty through education. In May 2014, Erwin partnered with Wayne Chau to start a new social enterprise \u201cAgent of Change\u201d. They found out that many poor people in Hong Kong bought cooking oil with a small cup in little street shops for 2 HKD each time. This kind of oil, however, was produced by food residue and trash without any safety protection. The social enterprise cooperated with the biggest oil refinery in Hong Kong, Hop Hing Oil Refinery, and borrowed the venues of non-profit organizations, district councilor offices and schools to provide cooking oil to the poor at a 30\\% discount. Erwin has emphasized multiple times that the products from social enterprises are not cheap product. Instead, every social enterprise that he involves in provides the best products for his customers. His mission is to teach Social Innovation and Entrepreneurship to university students and to let more young generations understand entrepreneurial spirit, identify social issues, as well as creating social impact through innovations. Social impact and awards Mobile Link A sudden cold snap hit Hong Kong in the 90s, killing almost a hundred of old people in town. Senior Citizen Home Safety Association was thus founded to research on the ways to use technology to provide safety for our elderly, using a self-sufficient model independent on the government subsidy. In 1996, Erwin joined the Association as a founding committee member, serving as an IT consultant to develop Mobile Link. The Association decided to use a sustainable business model to run the organization and successfully broke even in 3 years. With an aim to integrate our elders better in our society, Erwin served as the project convener and developed Personal Emergency Link Service in 2008. Mobile Link is effectively the outdoor version of Safety Bell, allowing senior citizens to call emergency service with one click when an accident occurs. In 2010, Personal Emergency Link Service received the Grand Prize of the Digital Opportunity Award from World Information Technology and Services Alliance. e-Learning Erwin is the non-official member of the Steering Committee on Strategic Development of Information Technology in Education of the Education Bureau. In 2009, Hong Kong Information Technology Federation] founded e-Learning Consortium. Being the Convener of the federation, Erwin started to promote this e-Learning as the new teaching methodology in different channels. He once wrote in his newspaper column that this was another education reform after the emergence of blackboard hundreds of years ago. Erwin criticized the Hong Kong government for its lack of long-term vision on promoting e-Learning in the city and its sluggish progress in providing schools with basic internet infrastructure. Erwin advocates the adoption of \u201cFlipping Classroom\u201d teaching method in Hong Kong. With WiFi installations in 100 schools in town, some schools allowed their pupils to \u201cbring your own device (BYOD)\u201d for class from September 2014. Media and publishing TV programmes In the 90s, Erwin acted as \u201cDr. Wong\u201d to host a TV programme \u201cComplete PC Handbook\u201d (\u5b8c\u5168\u96fb\u8166\u624b\u518a) and \u201cThe Smart Tribe\u201d (\u7cbe\u9748\u4e00\u65cf) on Asia Television (ATV), teaching information technology. Publishing and blogging Due to the popularity of Erwin 's TV programme, Huang published \u201cDr Wong\u2019s Nethandbook\u201d, which was the first Internet reference book written in Chinese. He later published \u201cXP Digital Life\u201d (XP \u6578\u78bc\u751f\u6d3b), becoming the first Information Technology textbook adopted in primary schools in Hong Kong. He writes occasionally on newspaper column discussing how to use technology to improve people's lives and make public policy and facilities more user-centric. He suggested introducing the role of a Chief Technology Officer (CTO) in Hong Kong with an aim to keep the city abreast of the technological advancement in the world. In 2014, Erwin became a columnist of Hong Kong Economic Journal. He also publishes articles on Facebook regularly.", "after_revision": "Erwin Huang (\u9ec3\u5cb3\u6c38, born 1965) is a pioneer in bringing technology to education and social enterprise. He is well known for his participation in the TV reality show where the Silicon Valley-trained expert and CEO of a listed company lived a in crummy subdivided apartment in Shum Shui Po, Hong Kong, earning 50 HKD per day. This experience had significantly changed Huang 's view towards life, motivating him to actively engaging in social entrepreneurship and helping the underprivileged groups via social innovations and information technology. Early life Erwin Huang is the son of Mr. Huang Shih-chiu Steve, who was the first Chinese to be appointed as General Manager of Rediffusion Television Limited. Huang 's mother, Prof. Dolly P. Huang, was the Honorary Professor of the Department of Clinical Oncology in the Chinese University of Hong Kong and the pioneering expert in nasopharyngeal cancer. Huang has an elder sister and a younger brother. Huang received his primary and secondary education in La Salle College, where he went to the same class as Brandon Lee, the son of Bruce Lee. To prove he could do as good as his dad, Huang applied and got admitted successfully to the University of California, Berkeley, the university where his dad graduated in. However, after studying there for six months, his dad made him transfer to Occidental College in Los Angeles because his father thought the university \u2018was not suitable\u2019 to him. During his studies, Huang's father refused to pay anything but his tuition to avoid him being distracted from school. He worked part-time after school to buy his first car, which was then worth US $65. He also used the salary of his part-time job to travel around US and Europe, demonstrating that it was possible to \u201cread thousands of books and travel thousands of miles at the same time\u201d. The social entrepreneur graduated at Boston University in 1986 with a double degree in Information Technology and System Management. Huang has also studied in MIT, Harvard Business School and Tsinghua University in Beijing. He likes to meet with young people and undergraduates to exchange ideas and experience in many university talks in Hong Kong. Career Huang's career started in Apple Inc in US. Thereafter, he focused on establishing his own start-up companies and software development. The entrepreneur invested and ran various publishing, information technology and telecommunication companies, as well as developing software for phones (which were the predecessors of smartphone apps) in Hong Kong, China, Tokyo, San Francisco, Silicon Valley, New York, Brazil and London. In 2005, he was invited to join Tse Sui Luen Jewellry (International) Limited (thereafter known as TSL; HKEx 417) and was appointed as CEO in 2008. Huang is now the Non-Executive Director and Deputy Chairman of TSL. In 2008, he worked with Senior Citizen Home Safety Association and CSL Mobile to develop Personal Emergency Link Service successfully. In 2009, Huang participated in TV reality show \u201cRich Mate Poor Mate Series\u201d to explore the problem of extreme disparity between the rich and the poor in Hong Kong, which was his first time experiencing the despair of the poverty-stricken communities in real life. In 2011, he founded the social enterprise WebOrganic. He is currently the Vice Chairman of the enterprise. Huang was also the President of Hong Kong Information Technology Federation (HKITF), Chairman of eLearning Consortium and Vice Chairman of SCHSA (safety bell). Huang believes corporate has its social responsibility to bring positive social impact to the society apart from making profits. In 2014, Huang was awarded as the Hong Kong Spirit Ambassador. In 2016, Huang has accepted the invitation from The Hong Kong University of Science and Technology (HKUST) to be appointed as Adjunct Professor of Information Systems, Business Statistics and Operations Management in School of Business, Associate Professor of Engineering Practice in School of Engineering, and Senior Advisor of Centre for Education Innovation in Entrepreneurship. Information technology After graduating from university, Huang joined Apple in 1986 responsible for the retail and distribution network in China. He was the first person selling Apple computers to China. At that time, Apple's Macintosh did not provide a Chinese version. Therefore, Huang went back to the headquarters and negotiated for a Chinese version with PageMaker. In 1989, he returned to Hong Kong to start his business. In two months\u2019 time, he introduced the desktop publishing layout software PageMaker (Chinese version) to Hong Kong. By breaking the limits of the traditional publishing industry, as well as assisting the first publication of Next Magazine, Huang had thus successfully earned HK$ 10 million. The introduction of PageMaker allowed people to do publishing work on a desktop computer easily, therefore gradually replacing the traditional typesetting technology. Then, Huang started doing web-based software development. The Internet was starting to take off at that time. He founded Digital Creation to write websites and develop a campus information-sharing software Schoolteam, allowing students to access information online anytime, anywhere. The software was highly recognized by Dr Rao Machiraju, the Director of Technology of Apple Inc at that time. Dr Machiraju thus invited him to Silicon Valley to found Magically, Inc., which provided online virtual office, email communication and information synchronization SyncML services. Through acquisition of a listed company in the United Kingdom, Huang helped the company to get listed in the Alternative Investment Market in the UK. Magically's strategic investor included Richard Li Tzar Kai. In 2003, due to his parents severe illness, Huang decided to sell his business in US and returned to Hong Kong. In 2004, he founded Digital Life and became an angel investor who focused on investing technology companies with good prospects. In 2007, the technology expert started Xtown Mobile to develop smartphone apps. In 2009, his company worked with Next Media to develop an iPhone version for Apple Daily. In 2011, Xtown Mobile made to the top five in Microsoft's list of top technology developers in China. Huang once said his personal investment rule is \u201cinsisting not to invest in sectors that he is unfamiliar with\u201d but he admitted that he had also made failed investments. Before the dot-com bubble in Hong Kong, he invested in Albert Cheng\u2019s 36.com. Prior to the public listing of the company, he invested HKD$700,000, which later soared to a top of HKD$2,000,000. However, its stock price collapsed eventually and was worth virtually nothing in the end. He later revealed in an interview that around 25\\% of the companies he invested in would succeed, higher than the industry average of angel investment. In 2005, Huang was invited by his college classmate Tommy Tse Tat-fung to join Tse Sui Luen Group as one of the Board of Directors. In less than a month, Tse Sui-luen and his son, Tommy Tse Tat-fung, were arrested by ICAC for an alleged illegal commission scheme and misappropriating listed company funds. Huang said in an interview that at that moment he was not sure whether he had joined an unscrupulous shop. Yet, he still decided to continue his work with the company for personal loyalty. Huang was promoted to the CEO of TSL Group in June 2008, working alongside Tommy Tse Tat-fung's wife, Annie Yau On Yee, the Chairman of the company. The company was resumed to trading in 2009, and Huang was promoted to Deputy Chairman of the TSL Group. Despite the global financial crisis at that time, the Group's performance improved in the poor-performing market with a 60\\% increase in net profit. After the resumption of trading in June 2009, the stock price had been increased tenfold within 6 months. In early 2010, Huang decided to resign as the company CEO and only kept his position as the Deputy Chairman in order to spare more time on community and education work. On March 1, 2015, Huang resigned as TSL Group\u2019s Executive Director, Executive Committee member and Business Development Director and became Non-executive Director and Deputy Chairperson of the company, acting as the advisor and consultant of the Group. Huang repeatedly said that he was more interested in entrepreneurship than working as an employee. He once said his work in TSL Group had always been a challenge to him, but it was surely not an end. During his employment at TSL Group, the serial entrepreneur founded Xtown. Huang once said in an interview his financial return on investing in Xtown might not be higher than his income in TSL Group, however, he believed life was not only about making a lot of money, and he felt much more satisfied if he could bring a revolution and make a difference to the industry. Social innovations In 2008, Huang , then Vice-president of Senior Citizen Home Safety Association, served as the Convener of \u201cMobile Link\u201d and cooperated with CSL to develop Personal Emergency Link Service, also known as Safety Bell for the elderly. In the following year, Huang was invited to join RTHK\u2019s reality TV show \u201cRich Mate Poor Mate Series\u201d to experience the lives of the underprivileged, which became the turning point of his life. During the reality show, he took some freelance cleaning jobs in Tsz Wan Shan in Hong Kong, earning 50 HKD (around 6.4 USD) per day and living in a rental of 700HKD (90USD) per month subdivided apartment in Sham Shui Po for 5 days. The only thing he could bring with him was his iPhone during the 5-day experience. On the show premier, the General Manager of YMCA Hong Kong, Dr. Alice Yuk said to him, \u201cYou returned to your own world, but their lives are still the same. Many people are still very poor. What can we do to help?\u201d This has prompted him to resign as the CEO of TSL Group in 2010. In May next year, Huang founded WebOrganic and served as the CEO of the company with a mission to solve the problem of cross-generational poverty through education. In May 2014, Huang partnered with Wayne Chau to start a new social enterprise \u201cAgent of Change\u201d. They found out that many poor people in Hong Kong bought cooking oil with a small cup in little street shops for 2 HKD each time. This kind of oil, however, was produced by food residue and trash without any safety protection. The social enterprise cooperated with the biggest oil refinery in Hong Kong, Hop Hing Oil Refinery, and borrowed the venues of non-profit organizations, district councilor offices and schools to provide cooking oil to the poor at a 30\\% discount. Huang has emphasized multiple times that the products from social enterprises are not cheap product. Instead, every social enterprise that he involves in provides the best products for his customers. His mission is to teach Social Innovation and Entrepreneurship to university students and to let more young generations understand entrepreneurial spirit, identify social issues, as well as creating social impact through innovations. Social impact and awards Mobile Link A sudden cold snap hit Hong Kong in the 90s, killing almost a hundred of old people in town. Senior Citizen Home Safety Association was thus founded to research on the ways to use technology to provide safety for our elderly, using a self-sufficient model independent on the government subsidy. In 1996, Huang joined the Association as a founding committee member, serving as an IT consultant to develop Mobile Link. The Association decided to use a sustainable business model to run the organization and successfully broke even in 3 years. With an aim to integrate our elders better in our society, Huang served as the project convener and developed Personal Emergency Link Service in 2008. Mobile Link is effectively the outdoor version of Safety Bell, allowing senior citizens to call emergency service with one click when an accident occurs. In 2010, Personal Emergency Link Service received the Grand Prize of the Digital Opportunity Award from World Information Technology and Services Alliance. e-Learning Huang is the non-official member of the Steering Committee on Strategic Development of Information Technology in Education of the Education Bureau. In 2009, Hong Kong Information Technology Federation] founded e-Learning Consortium. Being the Convener of the federation, Huang started to promote this e-Learning as the new teaching methodology in different channels. He once wrote in his newspaper column that this was another education reform after the emergence of blackboard hundreds of years ago. Huang criticized the Hong Kong government for its lack of long-term vision on promoting e-Learning in the city and its sluggish progress in providing schools with basic internet infrastructure. Huang advocates the adoption of \u201cFlipping Classroom\u201d teaching method in Hong Kong. With WiFi installations in 100 schools in town, some schools allowed their pupils to \u201cbring your own device (BYOD)\u201d for class from September 2014. Media and publishing TV programmes In the 90s, Huang acted as \u201cDr. Wong\u201d to host a TV programme \u201cComplete PC Handbook\u201d (\u5b8c\u5168\u96fb\u8166\u624b\u518a) and \u201cThe Smart Tribe\u201d (\u7cbe\u9748\u4e00\u65cf) on Asia Television (ATV), teaching information technology. Publishing and blogging Due to the popularity of Huang 's TV programme, Huang published \u201cDr Wong\u2019s Nethandbook\u201d, which was the first Internet reference book written in Chinese. He later published \u201cXP Digital Life\u201d (XP \u6578\u78bc\u751f\u6d3b), becoming the first Information Technology textbook adopted in primary schools in Hong Kong. He writes occasionally on newspaper column discussing how to use technology to improve people's lives and make public policy and facilities more user-centric. He suggested introducing the role of a Chief Technology Officer (CTO) in Hong Kong with an aim to keep the city abreast of the technological advancement in the world. In 2014, Huang became a columnist of Hong Kong Economic Journal. He also publishes articles on Facebook regularly.", "edit_actions": [{"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 364, "end_char_pos": 369}, {"type": "A", "before": null, "after": "Huang", "start_char_pos": 562, "end_char_pos": 562}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 700, "end_char_pos": 705}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 896, "end_char_pos": 901}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 945, "end_char_pos": 950}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 1128, "end_char_pos": 1133}, {"type": "R", "before": "Erwin's dad", "after": "Huang's father", "start_char_pos": 1456, "end_char_pos": 1467}, {"type": "R", "before": "$65. He also used the salary of his part-time job to travel around US and Europe, demonstrating that it was possible to \u201cread thousands of books and travel thousands of miles at the same time\u201d. The social entrepreneur graduated at Boston University in 1986 with a double degree in Information Technology and System Management. Erwin has also studied in MIT, Harvard Business School and Tsinghua University in Beijing. He likes to meet with young people and undergraduates to exchange ideas and experience in many university talks in Hong Kong. Career Erwin's career started in Apple Inc in US. Thereafter, he focused on establishing his own start-up companies and software development. The entrepreneur invested and ran various publishing, information technology and telecommunication companies, as well as developing software for phones (which were the predecessors of smartphone apps) in Hong Kong, China, Tokyo, San Francisco, Silicon Valley, New York, Brazil and London. In 2005, he was invited to join Tse Sui Luen Jewellry (International) Limited (thereafter known as TSL; HKEx 417) and was appointed as CEO in 2008. Erwin is now the Non-Executive Director and Deputy Chairman of TSL. In 2008, he worked with Senior Citizen Home Safety Association and CSL Mobile to develop Personal Emergency Link Service successfully. In 2009, Erwin participated in TV reality show \u201cRich Mate Poor Mate Series\u201d to explore the problem of extreme disparity between the rich and the poor in Hong Kong, which was his first time experiencing the despair of the poverty-stricken communities in real life. In 2011, he founded the social enterprise WebOrganic. He is currently the Vice Chairman of the enterprise. Erwin was also the President of Hong Kong Information Technology Federation (HKITF), Chairman of eLearning Consortium and Vice Chairman of SCHSA (safety bell). Erwin believes corporate has its social responsibility to bring positive social impact to the society apart from making profits. In 2014, Erwin was awarded as the Hong Kong Spirit Ambassador. In 2016, Erwin has accepted the invitation from The Hong Kong University of Science and Technology (HKUST) to be appointed as Adjunct Professor of Information Systems, Business Statistics and Operations Management in School of Business, Associate Professor of Engineering Practice in School of Engineering, and Senior Advisor of Centre for Education Innovation in Entrepreneurship. Information technology After graduating from university, Erwin joined Apple in 1986 responsible for the retail and distribution network in China. He was the first person selling Apple computers to China. At that time, Apple's Macintosh did not provide a Chinese version. Therefore, Erwin went back to the headquarters and negotiated for a Chinese version with PageMaker. In 1989, he returned to Hong Kong to start his business. In two months\u2019 time, he introduced the desktop publishing layout software PageMaker (Chinese version) to Hong Kong. By breaking the limits of the traditional publishing industry, as well as assisting the first publication of Next Magazine, Erwin had thus successfully earned HK$", "after": "$65. He also used the salary of his part-time job to travel around US and Europe, demonstrating that it was possible to \u201cread thousands of books and travel thousands of miles at the same time\u201d. The social entrepreneur graduated at Boston University in 1986 with a double degree in Information Technology and System Management. Huang has also studied in MIT, Harvard Business School and Tsinghua University in Beijing. He likes to meet with young people and undergraduates to exchange ideas and experience in many university talks in Hong Kong. Career Huang's career started in Apple Inc in US. Thereafter, he focused on establishing his own start-up companies and software development. The entrepreneur invested and ran various publishing, information technology and telecommunication companies, as well as developing software for phones (which were the predecessors of smartphone apps) in Hong Kong, China, Tokyo, San Francisco, Silicon Valley, New York, Brazil and London. In 2005, he was invited to join Tse Sui Luen Jewellry (International) Limited (thereafter known as TSL; HKEx 417) and was appointed as CEO in 2008. Huang is now the Non-Executive Director and Deputy Chairman of TSL. In 2008, he worked with Senior Citizen Home Safety Association and CSL Mobile to develop Personal Emergency Link Service successfully. In 2009, Huang participated in TV reality show \u201cRich Mate Poor Mate Series\u201d to explore the problem of extreme disparity between the rich and the poor in Hong Kong, which was his first time experiencing the despair of the poverty-stricken communities in real life. In 2011, he founded the social enterprise WebOrganic. He is currently the Vice Chairman of the enterprise. Huang was also the President of Hong Kong Information Technology Federation (HKITF), Chairman of eLearning Consortium and Vice Chairman of SCHSA (safety bell). Huang believes corporate has its social responsibility to bring positive social impact to the society apart from making profits. In 2014, Huang was awarded as the Hong Kong Spirit Ambassador. In 2016, Huang has accepted the invitation from The Hong Kong University of Science and Technology (HKUST) to be appointed as Adjunct Professor of Information Systems, Business Statistics and Operations Management in School of Business, Associate Professor of Engineering Practice in School of Engineering, and Senior Advisor of Centre for Education Innovation in Entrepreneurship. Information technology After graduating from university, Huang joined Apple in 1986 responsible for the retail and distribution network in China. He was the first person selling Apple computers to China. At that time, Apple's Macintosh did not provide a Chinese version. Therefore, Huang went back to the headquarters and negotiated for a Chinese version with PageMaker. In 1989, he returned to Hong Kong to start his business. In two months\u2019 time, he introduced the desktop publishing layout software PageMaker (Chinese version) to Hong Kong. By breaking the limits of the traditional publishing industry, as well as assisting the first publication of Next Magazine, Huang had thus successfully earned HK$", "start_char_pos": 1630, "end_char_pos": 4767}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 4953, "end_char_pos": 4958}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 5585, "end_char_pos": 5590}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 5777, "end_char_pos": 5782}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 6246, "end_char_pos": 6251}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 6860, "end_char_pos": 6865}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 7157, "end_char_pos": 7162}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 7346, "end_char_pos": 7351}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 7543, "end_char_pos": 7548}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 7869, "end_char_pos": 7874}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 8041, "end_char_pos": 8046}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 8276, "end_char_pos": 8281}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 8551, "end_char_pos": 8556}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 8874, "end_char_pos": 8879}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 9119, "end_char_pos": 9124}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 9901, "end_char_pos": 9906}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 10061, "end_char_pos": 10066}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 10619, "end_char_pos": 10624}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 11394, "end_char_pos": 11399}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 11690, "end_char_pos": 11695}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 12103, "end_char_pos": 12108}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 12374, "end_char_pos": 12379}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 12604, "end_char_pos": 12609}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 12798, "end_char_pos": 12803}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 13075, "end_char_pos": 13080}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 13293, "end_char_pos": 13298}, {"type": "R", "before": "Erwin", "after": "Huang", "start_char_pos": 13896, "end_char_pos": 13901}], "sents_char_pos": [0, 100, 321, 544, 699, 722, 895, 944, 1086, 1257, 1435, 1550, 1634, 1823, 1956, 2047, 2173, 2223, 2315, 2604, 2708, 2752, 2820, 2955, 3219, 3273, 3326, 3486, 3615, 3678, 4060, 4206, 4264, 4331, 4431, 4488, 4604, 4779, 4946, 5004, 5056, 5230, 5340, 5521, 5671, 5732, 5844, 5973, 6053, 6143, 6245, 6415, 6493, 6608, 6698, 6850, 6982, 7156, 7263, 7345, 7494, 7598, 7747, 7853, 8022, 8275, 8374, 8475, 8550, 8845, 9095, 9288, 9520, 9603, 9759, 9792, 9817, 9882, 10047, 10144, 10274, 10371, 10618, 10719, 10818, 11052, 11182, 11384, 11506, 11630, 11781, 11935, 12250, 12335, 12469, 12603, 12797, 12880, 13027, 13243, 13420, 13560, 13719, 13886, 13951]}
+{"doc_id": "51404262", "revision_depth": "1", "before_revision": "Asmara in the 1940s|alt= |400x400px Eritrea's capital of Asmara, 100 km inland from its coast, has occupied a space in the highlands of Eritrea for hundreds of years. During the last century alone, it has been a staging ground for Italian initiatives in East Africa, collateral of Britain\u2019s colonial politics, and victim of the expansion of Ethiopia\u2019s empire until 1993 when it finally became the new and sovereign state of Eritrea. Only the large cluster of buildings built in the style of the Avant-Garde betrays the multifaceted history of this strange city and its urban core almost entirely unchanged for over seventy years. Pre-Colonial Asmara alt=| 400x400px| Asmara village in the 1890s Asmara was the perfect place to build a settlement; it had fertile soil, a mild climate because of its location on the plateau, and regular precipitation. While remains of prehistoric peoples have been found near Asmara; the ancient Aksum Empire ruled closeby; Islam had made inroads in the Horn of Africa from the region; and ruins of small villages found around present-day Asmara indicate the existence of peoples who had settled in the area long before the development of a city in the region,Curtis and Schmidt describe archeological findings from the agro-pastoral settlements, which arose between the 8th and 4th centuries BC. It is possibly that Asmara was already an important trade center even before the Axum Empire. (Cf. Curtis, Schmidt: Urban Precursors in the Horn: Early 1st Millennium BC Communities in Eritrea, pg. 849.) it can be said that the history of Asmara began around four hundred years before the effects of European colonization began to take hold. According to oral traditions, there were once four villages on Asmara\u2019s plains. Attacks by wild animals and raids by other indigenous groups prompted the women of the neighboring villages to come together to discuss solutions that would help to ensure the protection of their families, properties, and belongings. The women decided that they would not serve lunch to the men of their villages until they agreed to consolidate the four villages into one. The men fulfilled the women\u2019s wishes and built one united village, which they named Arbate Asmara.Yosief, The Story of Asm\u00e4ra [sic] (Cited in: Melchers: Asmara \u2013 Afrikas heimliche Hauptstadt der Moderne, pg. 10) Eritreans today enjoy relaying this tale about the founding of their city, as it serves as an example of how Eritrean people have been able to come together and persevere even under the harshest conditions. alt=| 400x400px| Asmara's market in the 1890s From this point on, the new village of 150 inhabitants lay in the medieval Medri Bahri Kingdom, until, after a short period when it was ruled by the Ottomans and later the Egyptians, it fell into the hands of Ethiopian Emperor Yohannes IV in the middle of the 19th century, who chose his trusted General Ras Alula to be governor of the newly-occupied kingdom. Alula declared Asmara the capital of the province, and within just a few years had increased the population of the small village to more than 5,000 inhabitants. A buoyant weekly market drew traders and builders from all over the surrounding region. Political and military conflicts between the local warlords of the Hamasien Plateau compelled Alula to station 12,000 soldiers in Asmara, so that the small city soon took on the appearance of a military camp. During the 1870s, there were at least two battles between Alula and these warlords, both of which essentially destroyed the city. Asmara\u2019s weekly market, however, continued to take place. Emperor Yohannes IV called Alula and his troops up to Addis Abeba in 1889 to support him in his fight against the Mahdi uprisings. Italian invasion On August 3, 1889, Italian troops took advantage of Alula\u2019s absence, the power vacuum left as a result of Emperor Yohannes\u2019 death, and the havoc wreaked by three years of famine and took over the small city.Tesfagiorgis: Eritrea \u2013 Africa in Focus, pg. 34 They built their fort on a hill in the village of Beit Mekae, forcing the inhabitants of this village to resettle elsewhere. At the time of General Baldisera\u2019s arrival, the small town had 3000 inhabitants and consisted of traditional mud huts, Agdos and Hidmos. Above all, the military fort at Beit Mekae was a strategic point when it came to controlling the local population; it also served as a military strongpoint from which local uprisings, which were largely directed against the government\u2019s power of eminent domain, could be suppressed.Gebremedhin: Asmara \u2013 Africa\u2019s Secret Modernist City, pg. 5 Eritrea officially became an Italian colony in 1890 and Massawa \u2013 already the seat of the colonial administration since 1885 \u2013 was declared the capital. At this time, because of the danger of insurrection in the highlands, Asmara was not even in the running to become the capital of the new colony. Furthermore, Bizzon explains that Asmara was not developed enough to serve as the capital: \u201cPolitically, militarily, and even logistically, the distance between Massawa and Asmara is greater than the distance between Italy and Massawa.\u201dBizzoni: L\u2019Eritrea \u2013 nel passato e nel presente (Quoted in: Denison et al.: Asmara \u2013 Africa\u2019s Secret Modernist City, pg. 24) The lack of an infrastructural link to Massawa prevented Asmara from developing quickly. alt=| 400x400px That, despite all of this, Asmara rose to significance has to do with the goals of Italian colonization. The interest in the occupation of Eritrea lay, on the one hand, in the settlement of Italian citizens who were able to strengthen the economy of their motherland through development of the colony, and on the other hand, to use Eritrea as a military base from which the expansion of the colony could take place.Almedom: Re-reading the Short and Long-Rigged History of Eritrea 1941\u20131952: Back to the Future?, pg. 108 The Ethiopian Empire was one of the last uncolonized regions of Africa, and the vision of a strong, modern Italian nation after the successes of the Risorgimento, would require the acquisition of colonies if the country to become a European superpower, and to affirm the autonomy of the young kingdom.Fuller: Italy's Colonial Futures: Colonial Inertia and Postcolonial Capital in Asmara, pg. 2 Colonial politics brought about the government\u2019s claim to eminent domain as well as the realization of many noteworthy infrastructure projects. As a result of the takeover of Asmara by foreign militaries and because of the employment opportunities within infrastructure projects throughout Eritrea, the population of Asmara itself shrunk from 5000 to 800 inhabitants during the first five years of the Italian occupation. However, it remained an important market town on the Hamasien Plateau. The construction of the Massawa-Asmara-Railroad as well as a funicular railroad built along the same stretch that could transport heavy loads, finally allowed the Italians to use Asmara as a new base in the highlands. The institutionalized racial separation central to Italian colonial politics was not designed to account for the indigenous population, who would be displaced as the expansion of the industrial zone reached the unplanned quarters to the north.Gebremedhin: Asmara \u2013 Africa\u2019s Secret Modernist City, pg. 7 Eritreans who owned property in the city center, or the European quarter, were forced to move out and sell their land. In 1908, the Governor issued a decree that, in the interest of promoting and maintaining \u201cpublic order\u201d, declared that the first zone was meant only for Italians and citizens from other European countries, whereas the sudditi coloniali, or the \u201ccolonial subjects\u201d, were only allowed in the indigenous quarter and the mixed Market zone.Chelati Dirar: From warriors to urban dwellers: Ascari and the military factor in the urban development of colonial Eritrea, pg. 533 Only the Askari, indigenous soldiers who served in colonial troops, were allowed to build their huts in areas near the Italian residences, where conditions were better than those endured by their compatriots.The campi-famiglia directive allowed each Askari to build their own house. Under the supervision of Italian engineers, the soldier was to build the house with local building materials. In: Chelati Dirar: From warriors to urban dwellers: Ascari and the military factor in the urban development of colonial Eritrea, pg. 533 The untypical proximity of the Askari to the Italians illustrates the deep trust of the Italian administration in the indigenous troops. In 1926, colonial minister, Luigi Federzoni, described the Eritrean regiments as \u201cthe most solid, effective and safe pillar of our military might in all our African colonies.\u201dFrom a letter from Federzoni to Mussolini, dated November 24, 1926. Source: Palumbo: A Place in the Sun: Africa in Italian Colonial Culture, pg. 88 This relationship lasted throughout the Italian occupation of Eritrea, and is more than likely an important factor in determining the good-naturedness of Eritreans toward Italians today. alt=| 250x250px| Asmara Theatre in the 1920s The first plans led to a phase of intensive building, which ultimately resulted in an increase of Asmara\u2019s population from between 800 and 1,900 peopleTesfagiorgis: Eritrea \u2013 Africa in Focus, pg. 39 to more than 8,500 people in 1905, of which around 1,500 were white. This dramatic population increase exacerbated both a growth in trade and a rise in employment opportunities, as well as an upsurge in the number of people moving from rural areas to cities. In 1910, the city\u2019s population had grown to around 37,000 people.Tesfagiorgis: Eritrea \u2013 Africa in Focus, pg. 44 During this period of growth, many important buildings cropped up, including the Palast des Gouverneurs (today the residence of the president), the first Italian school, the cathedral, the theater, and the high court, all of which are located on the centralized Corso del Re, later known as the Viale Mussolini, and even later as Harnet Avenue. Asmara\u2019s road system and the important connections between Asmara and the cities of Keren and Decamhare were also built during this time period, along with the Massawa-Asmara-Railroad Line, which was finally finished in 1911. Asmara under Mussolini (1922-1941) Development under Mussolini's fascism alt=| 400x400px| Asmara in 1928 With Mussolini\u2019s rise to power in 1922, Asmara began a new chapter in its history. During the fascist occupation, the construction that took place in the city was by far the most formative. With Mussolini\u2019s efforts put toward building an Italian empire, the Eritrean capital became increasingly important in the years that followed, and in the 1930s, it became one of the most important sites in Italian East Africa. Modern architecture, equally lauded by architecture aficionados and city historians, slowly found its way to Eritrea in the 1920s. At this time in Italy, architecture was relatively uninfluenced by European avant-garde modernism which had taken hold in Holland, Germany, and France in particular.Akbar, Gebremedhin: Ein Weltkulturerbe It wasn\u2019t until 1927 that Gruppo 7,The members of Gruppo 7 were Luigi Figini, Ubaldo Castagnoli, Guido Frette, Sebastiano Lorco, Gino Pollini, Carlo Enrico Rava and Guiseppe Terragni. a coalition of young architects from Milan, developed the Italian variation of avant-garde modern architecture called Rationalismo. Until 1935, the majority of structures in Asmara were built in traditional styles from established architecture schools like Novecento and the Scuola Romana, both of which appropriated certain formal elements from the Italian Gothic, the Renaissance, the Baroque, the Romantic, and the Classical time periods. The architecture remained largely traditional and was based mostly on the models of the Italian motherland. In Asmara\u2019s most representative buildings built before 1935, this historicism is especially apparent. Asmara\u2019s theater exhibits stylistic elements from both the Romantic and Renaissance periods.Denison et al.: Asmara \u2013 Africa\u2019s Secret Modernist City, pg. 107 The Bank of Eritrea\u2019s building is built in the Neo-Gothic style, and the Governor\u2019s Palace as well as the post office building were constructed using neoclassical elements. To position Mussolini\u2019s rule within the time period when modern architecture found its way to the Eritrean highland is, at least for the first half of his reign, incorrect. In reality, nearly all of the avant-garde structures were conscripted and built between 1935 and 1941. Even if the building boom did not begin until the middle of the 1930s, Mussolini\u2019s fascist ideology would have already influenced the urban development plans during the 1920s and the beginning of the 1930s. alt=| 400x400px| Former Mayor's Villa in Asmara. Today, it is a Bed & Breakfast. At the beginning of the 20th century, the citizens of Asmara were separated by race. Neighborhoods for indigenous and European populations were clearly delineated from each other, however a public area could be used by everyone. The preliminary plans to separate people from different ethnic groups were expanded and concretized under Mussolini. The improved plans from 1930 laid out how the city would be divided into four clear and separate zones: the residential quarter for the indigenous population in the north, where there were already high population densities and erratic structures; the diagonal blocks of the industry zone; the \u201cVilla quarter\u201d for the Europeans, located south of present-day Harnet Avenue; and, the mixed zone around the market. Located in the market zone were administrative and commercial entities that were of equal significance for both groups of people (i.e. the indigenous and the European). Additionally, this zone housed centralized cultural institutions, and was interspersed with additional housing.Melchers: Asmara \u2013 Afrikas heimliche Hauptstadt der Moderne, pg. 6 The categorization of inhabitants by race reached its peak under fascism, with the strict separation of indigenous folks and occupiers. Growth as an Italian Military Base alt=| 400x400px| Asmara in the 1930s With the plan to raid Abyssinia and to incorporate it into the African colony, Asmara\u2019s cityscape began to change. More and more soldiers were being stationed in Eritrea, and the city had only a short time to manage a rapid increase in its population. Between 1932 and 1936 alone the number of inhabitants rose from 18,000 to 98,000 people.Bader: Faschistische Moderne in Afrika \u2013 Auto und Architektur in Asmara, pg. 353 Until 1935, administrative and commercial structures were expanded in order to build up Asmara as a military base for the upcoming war. The village became a bustling administrative city and a trading hub,Bodenschatz: St\u00e4dtebau f\u00fcr Mussolini, pg. 371 that required its new inhabitants address its rising sanitation, building, transportation, and safety needs. And so, housing, businesses, recreation services, as well as churches appeared out of thin air in a matter of a few short years. Deepening Racial Segregation alt=| 300x300px| An avenue in Asmara. This avenue served to segregate two sides of the city. Without question, the conviction that the white man is the ruler and therefore has the right to all conceivable privileges; That, consequently, the law [j]is one thing for the whites, and another thing for the natives; That the houses and dwellings of whites are always the first priority when solving any architectonic problem; indigenous dwellings, on the other hand, are only of interest to the whites if solving a problem with them would improve the wellbeing of the white population; That there are to be no whites and coloreds living together in the same house; That the white man\u2019s house must be outfitted with the best comforts available as it is preferable if he can enjoy his time in the colony, and because he should be able to enjoy the privileges that come with being white.\u201dSantoinianni: Il Razionalismo nelle colonie italiene 1927-1943 \u2013 La \u201enuova architettura\u201c delle Terre d\u2019Oltremare, pg. 120 (Quoted in Erbel: Die Architekturmoderne in Asmara vor dem Hintergrund von italienischem Faschismus und Kolonialismus)But it was not only Italian architects who sought council with Mussolini in hopes of having their ideas realized under the Duce\u2019s rule. Le Corbusier wanted his own plans implemented on the East African \u201cplayground\u201d, and from 1932 onwards, he continuously pursued the opportunity to meet privately with Mussolini. His attempts were made in vain, however, and so he wrote to the Italian ambassador in Brazil and recommended that the social structure of the residential city of Addis Abeba be abolished. He made concrete plans for a dominant central axis that would strictly separate the Europeans\u2019 residential neighborhoods from the indigenous population. This abrasive plan based on segregation did not take any of the local traditions nor the existing city structure into account.Mattioli: Unterwegs zu einer imperialen Raumordnung in Italienisch-Ostafrika. In: F\u00fcr den Faschismus bauen, pg. 332 alt=| 400x400px| Housing for the local population (Askari) Independent of Le Corbusier, the policies requiring the strict racial separation of the population were followed. Not only was the separation of races of the utmost importance when writing development policy for implementation in East Africa, the urge to perpetuate fascist ideology through urban planning without regard for existing structures and cultures was as well. Just as in Italy, architecture and urban construction policies were deployed in the colony in a dialectic of destruction and radical new design. The concepts of dominance, order, and racial segregation were to be inscribed in the cities of the Impero.Mattioli: Unterwegs zu einer imperialen Raumordnung in Italienisch-Ostafrika. In: F\u00fcr den Faschismus bauen, pg. 339 \u201cIn the second half of the 1930s, Mussolini's urban planners designed projects that treated settlements in Italian East Africa not as historic cities but as tabula rasa.\u201dMattioli: Unterwegs zu einer imperialen Raumordnung in Italienisch-Ostafrika. In: F\u00fcr den Faschismus bauen, pg. 342 They regarded the people of East Africa as \u201cbarbarians\u201d who did not live in real cities, and who did not have the right kind of housing nor culture. In order to realize the plans of an imperial spatial order, planners under Mussolini did not hesitate to destroy entire historical districts. Formative Years and a Building Boom alt=| 400x400px| Viale Mussolini (today Harnet Avenue) in 1930s Asmara After 1936, the cities in East Africa experienced a genuine building boom. As stormy as the city can be because of its location 2,350 meters above sea level, urban development did not take off anywhere else during the Africa Orientale Italiana project like it did in Asmara.Mattioli: Unterwegs zu einer imperialen Raumordnung in Italienisch-Ostafrika. In: F\u00fcr den Faschismus bauen, pg. 345 The victory over Abyssinia represents a turning point in the history of Asmara, and the years up to 1941 were to become the Eritrean capital\u2019s most formative. Architectural Development under the Italian Regime alt=| 400x400px| Cinema Impero (1930s) The Italian occupiers designed Asmara according to their ideas. So that they did not miss anything while in the East African colony, bars, restaurants, brothels and cinemas sprouted up all over the city. The high density of cinemas in Asmara is still as impressive today as it was back then. At the end of the 1930s, numerous cinemas had been built, all within the shortest possible timeframe, including Cinema Impero (1937), Cinema Capitol (1938), Cinema Roma (1937) and Cinema Odeon (1937). All of these cinemas were accessible exclusively to Europeans. However, locals were also to have their own cinema. In 1936, the architect Inginio Marabelli built Cinema Hamasien in the city\u2019s northern zone.Denison et al.: Asmara \u2013 Africa\u2019s Secret Modernist City, pg. 62 Over time, the number of leisure activities meant to entertain the colonial masters increased exponentially. There were golf courses, tennis clubs, soccer tournaments, bicycle racing clubs, and motorsport events. alt=|400x400px|Fiat Tagliero petrol station in Asmara Motorsport events were held in Asmara for a reason. At the end of the 1930s, the number of Italian-made automobiles exported to Eritrea had exploded. Within a few years, the traffic volume in Asmara was higher than it was in Rome.Denison et al.: Asmara \u2013 Africa\u2019s Secret Modernist City, pg. 59 With approximately 50,000 cars in Asmara in 1938, there were officially enough for each Italian in the city to have one.Bodenschatz: St\u00e4dtebau f\u00fcr Mussolini, pg. 376 In the years 1936-1938, 15,158 cars and 13,719 motorcycles from different manufacturers were delivered to East Africa. This constituted about a fifth of the auto industry\u2019s total exports in 1938, and in 1937, about half.Bader: Faschistische Moderne in Afrika \u2013 Auto und Architektur in Asmara. In: F\u00fcr den Faschismus bauen, pg. 365 The automotive industry flourished in Asmara. Not only did the number of domestic car imports grow steadily in Italy, automobile companies themselves built prestigious branches in the Eritrean highlands to improve their image and sales as well. In the 1930s, for example, these automobile companies commissioned architects to design their representative offices in Asmara. Oftentimes, unknown architects and engineers were planning and constructing state-of-the-art buildings for the most important automobile companies in the world. Among the clients were Agip, Pirelli, Alfa Romeo, Lancia, and, of course, Fiat. Even the leading automobile club in Italy, RACI, opened a branch in the Eritrean capital to attract new members from the growing group of citizens with cars. The use of avant-garde architecture was a convenient means through which to attract the attention of potential car buyers, and the colony in East Africa offered the most ideal conditions for creating such striking structures. In Italy, architects had to tolerate the limitations of old building structures. In Asmara, on the other hand, the designers had no specific restrictions. Far from the what the motherland was able to provide, Eritrea offered the best conditions for innovative and experimental architecture. In the years between 1935 and 1941, numerous buildings in the styles of Rationalismo and Novecento were erected within a area, and although many others were planned, they would never be realized. The buildings ranged from small, one-story apartments to giant high-rise office buildings.Denison et al.: Asmara \u2013 Africa\u2019s Secret Modernist City, pg. 63 About 10 years after Gruppo 7 had outlined its basic principles for reforming Italian architecture in La Rassegna Italiana magazine, numerous buildings were built in Asmara according to these specifications. The group\u2019s principles were based on the idea that architecture had to be rational and reduced to simple forms, and that all architectural ornamentation had to be renounced.Bader: F\u00fcr den Faschismus bauen, pg. 366 alt=| 400x400px| Piazza Roma in Asmara (1930s) In addition to numerous buildings, the colonial administration also built roads and squares, which were also supposed to represent the fascist regime and its power over the Eritrean population. The Viale Mussolini (today Harnet Avenue), the Piazza Roma (today Post Square) and the Viale de Bono (today Semeatat Boulevard) were built to unite the masses and to display the power of the occupiers in the form of festivals, parades and marches.Denison et al.: Asmara \u2013 Africa\u2019s Secret Modernist City, pg. 61 With its administrative buildings, the Cinema Impero, the theater, St. Joseph's Cathedral, high-rise apartment buildings, and numerous bars and shops, Viale Mussolini was the center of the city. As the day faded into the night, Viale Mussolini was used as a promenade \u2013 the so-called Passeggiata. Italians walked up and down the street without any particular aim.The \u201cPasseggiata\u201d, that is, \u201cthe strolling\u201d, was a pastime passed on to the Asmarinos by the Italians, and is still celebrated in the evening hours on today's Harnet Avenue The indigenous population, however, had no access to the palm-lined boulevard during the day or at night. Annexation by Ethiopia and Emerging Resistance Movement alt=| 400x400px| View of Asmara Haile Selassie, in an open policy, did not hide the fact that Ethiopia \"is interested in the country and not in the people of Eritrea\",Abbay: Identity Jilted or Re-imagining Identity?, pg. 209 especially with regard to Muslim communities, whose villages were systematically burnt down by Ethiopian troops, and whose inhabitants were massacred throughout the 1950s, 1960s, and during the first half of the 1970s.Killion, Connell: Historical Dictionary of Eritrea, pg. 270 Haile Selassie dissolved Eritrea\u2019s autonomy bit by bit, for example, through the demotion of the autonomous government to a mere administrative body in 1960. Two years later, with the United Nations' approval, Ethiopia decided to ultimately end the federation. Through the besiegement of Asmara, Ethiopia forced the Eritrean parliament to dissolve itself completely,Negash: Eritrea and Ethiopia - The Federal Experience, pg. 143 and subsequently annexed the whole of Eritrea. Soon after, Eritrean opposition leaders came to the conclusion that the only hope of resisting Ethiopian rule lay in armed struggle. End of Ethiopian Occupation Towards the end of the 1980s, the Soviet Union decided against extending the cooperation agreement with Ethiopia. Without the resources of the Soviet Union, and due to a drought and simultaneous economic crisis in both countries, the morale of Ethiopian soldiers fell. Many of them served as mercenaries without real conviction for the fight against the Eritrean resistance, which allowed members of the sworn EPLF to edge their way into Ethiopian positions. In May 1991, under the pressure of the Ethiopian opposition the Derg regime finally fell. EPLF talks with the Ethiopian Transitional Government were successful, thereby allowing Eritrea to hold a referendum on its independence. The overwhelming majority, 99.83\\% of Eritrean people, voted for their country\u2019s independence,Tesfagiorgis: Eritrea \u2013 Africa in Focus, pg. 73 and on May 24, 1993 Eritrea was declared an independent country. A new parliament was established and then elected Isayas Afewerki, prominent head of the EPLF, as president. alt=|400x400px|Monument to independence fighters in Asmara The armed conflict between Ethiopia and Eritrea lasted for almost 30 years. It is a remarkable history of human resistance on the one hand, and of terrible loss suffered by two of the world's poorest countries, on the other. The Eritrean people, themselves the product of a compulsory unification carried out by an outside power, fought, for the most part, alone against the statistically superior and better equipped Ethiopian army,Denison: Eritrea, pg. 33 while both Ethiopian regimes were ready to do their own as well as the Americans\u2019 and the Soviets\u2019 bidding in the most brutal ways, at least until the fall of Haile Selassie. More than 50 years had passed since the last time Italian planners were given free reign to explore their creative drives. Almost 10 years under British occupation and another 10 years in a repressive federation with Ethiopia followed 30 years of bloody fighting, at the end of which the country would be freed of foreign domination. Asmara remained standing, having seen little fighting within its city limits. Afterwards, however, the city was in a state of deterioration and chaos:\u201cScenes of boys and girls carrying barrels of water on improvised carts, military ramparts on top of apartment buildings, and bricked-up windows with broken glass and barbed wire fortifying residences facing the street are still vivid in the minds of residents of Asmara. The euphoria of victory did not remove the foul smell from clogged sewage, and the many beggar women and children indicated widespread poverty. Many colourless, decaying buildings attested to the neglect and destruction of the years of Ethiopian occupation. The basic infrastructure of Asmara was largely in need of a complete overhaul.\u201dDenison et al.: Asmara \u2013 Africa\u2019s Secret Modernist City, pg. 76It was a picture with scenes of joy about the country\u2019s newly-acquired sovereignty and, at the same time, scenes of a city\u2019s degeneration. The fact that no intensive fighting had taken place in Asmara, could not prevent the city\u2019s utter breakdown. Moreover, the already ruinous state of the city could not be overcome during the course of the war after the dismantling policy of British and Ethiopian occupation. alt=| 400x400px| Eritreans queuing at petrol station due to rationing Return as political capital The population increased due to a flood of refugees arriving from rural regions, as well as the return of many from the diaspora. Asmara, newly renamed the capital, became the political heart of Eritrea once again. During the years that followed, Eritrea experienced an economic upturn and countless investments that, together with its renewed function as the capital, led to the city\u2019s dramatic growth. While the pattern in many other African cities saw a rise in poor and illegal settlements, Asmara\u2019s development could be relatively controlled. Enormous challenges lay ahead; perhaps above all else, inhabitants of Asmara faced the problem of accessing clean drinking water, and of the lack of an adequate sewage system, as the infrastructure was still mostly in ruins following the long war. Since the border war of 1998-2000 with Ethiopia, Eritrea has been in an official state of emergency, its citizens effectively living under Martial Law. The political elites\u2019 control of the nation has far-reaching consequences, such as the repudiation of freedom of speech, of assembly, and of the press. The Washington Post published an article saying, \u201cWhile striving to be an egalitarian, self-reliant utopia, Eritrea has become the most unapologetically repressive country on earth.\u201dMcCrummen: As thousands flee regime, Eritrea would go it alone The population is faced with a steady political and cultural indoctrination, relying upon the rhetoric of nationalism and devoted to the idea of its superiority over Ethiopia.Ogbazghi: Personal Rule in Africa: The Case of Eritrea, pg. 5 A state-controlled economy that encompasses agriculture, industry and construction, is heavily dependent on the recruitment of conscripts who serve in national service, often for life. alt=| 400x400px| Asmara Market (2013) Financial support for the urban historic core In addition, Afewerki has introduced a strict policy of self-sufficiency. Under the pretext that Eritrea has historically refused to fall victim to the strategic desires of other nations, which is an idea that is not totally unfounded, Afewerki rejects any kind of help from abroad. In 2007 alone, the President turned down 200 million dollars meant to aide in the country\u2019s relief efforts.Sanders: Struggling Eritrea puts Self-Reliance Before Aid This has fatal consequences when it comes to caring for Asmara\u2019s heritage, something one of the poorest nations in the world cannot do alone. As mentioned above, the CARP, with its $5 million budget allotted by the World Bank, was abandoned. Another project with the purpose of renewing Asmara\u2019s city center, this time sponsored by the European Union, together with other EU aid programs were accounted for in 2011.Berhane: A Week in the Horn of Africa Other programs aimed at preserving Asmara\u2019s city center are not on the table at the moment, and it is difficult to imagine that Afewerki will bypass his tendency toward isolationism and accept the necessary financial and technical assistance from abroad that could revive such programs. It is difficult to say whether Asmara had more hope for improvement under the rule of its oppressive archenemy, Ethiopia, or if anything can be said of hope at all under its current dictator.", "after_revision": "Asmara in the 1940s|alt= Eritrea's capital of Asmara, 100 km inland from its coast, has occupied a space in the highlands of Eritrea for hundreds of years. During the last century alone, it has been a staging ground for Italian initiatives in East Africa, collateral of Britain\u2019s colonial politics, and victim of the expansion of Ethiopia\u2019s empire until 1993 when it finally became the new and sovereign state of Eritrea. Only the large cluster of buildings built in the style of the Avant-Garde betrays the multifaceted history of this strange city and its urban core almost entirely unchanged for over seventy years. Pre-Colonial Asmara alt=| Asmara village in the 1890s Asmara was the perfect place to build a settlement; it had fertile soil, a mild climate because of its location on the plateau, and regular precipitation. While remains of prehistoric peoples have been found near Asmara; the ancient Aksum Empire ruled closeby; Islam had made inroads in the Horn of Africa from the region; and ruins of small villages found around present-day Asmara indicate the existence of peoples who had settled in the area long before the development of a city in the region,Curtis and Schmidt describe archeological findings from the agro-pastoral settlements, which arose between the 8th and 4th centuries BC. It is possibly that Asmara was already an important trade center even before the Axum Empire. (Cf. Curtis, Schmidt: Urban Precursors in the Horn: Early 1st Millennium BC Communities in Eritrea, pg. 849.) it can be said that the history of Asmara began around four hundred years before the effects of European colonization began to take hold. According to oral traditions, there were once four villages on Asmara\u2019s plains. Attacks by wild animals and raids by other indigenous groups prompted the women of the neighboring villages to come together to discuss solutions that would help to ensure the protection of their families, properties, and belongings. The women decided that they would not serve lunch to the men of their villages until they agreed to consolidate the four villages into one. The men fulfilled the women\u2019s wishes and built one united village, which they named Arbate Asmara.Yosief, The Story of Asm\u00e4ra [sic] (Cited in: Melchers: Asmara \u2013 Afrikas heimliche Hauptstadt der Moderne, pg. 10) Eritreans today enjoy relaying this tale about the founding of their city, as it serves as an example of how Eritrean people have been able to come together and persevere even under the harshest conditions. alt=| Asmara's market in the 1890s From this point on, the new village of 150 inhabitants lay in the medieval Medri Bahri Kingdom, until, after a short period when it was ruled by the Ottomans and later the Egyptians, it fell into the hands of Ethiopian Emperor Yohannes IV in the middle of the 19th century, who chose his trusted General Ras Alula to be governor of the newly-occupied kingdom. Alula declared Asmara the capital of the province, and within just a few years had increased the population of the small village to more than 5,000 inhabitants. A buoyant weekly market drew traders and builders from all over the surrounding region. Political and military conflicts between the local warlords of the Hamasien Plateau compelled Alula to station 12,000 soldiers in Asmara, so that the small city soon took on the appearance of a military camp. During the 1870s, there were at least two battles between Alula and these warlords, both of which essentially destroyed the city. Asmara\u2019s weekly market, however, continued to take place. Emperor Yohannes IV called Alula and his troops up to Addis Abeba in 1889 to support him in his fight against the Mahdi uprisings. Italian invasion On August 3, 1889, Italian troops took advantage of Alula\u2019s absence, the power vacuum left as a result of Emperor Yohannes\u2019 death, and the havoc wreaked by three years of famine and took over the small city.Tesfagiorgis: Eritrea \u2013 Africa in Focus, pg. 34 They built their fort on a hill in the village of Beit Mekae, forcing the inhabitants of this village to resettle elsewhere. At the time of General Baldisera\u2019s arrival, the small town had 3000 inhabitants and consisted of traditional mud huts, Agdos and Hidmos. Above all, the military fort at Beit Mekae was a strategic point when it came to controlling the local population; it also served as a military strongpoint from which local uprisings, which were largely directed against the government\u2019s power of eminent domain, could be suppressed.Gebremedhin: Asmara \u2013 Africa\u2019s Secret Modernist City, pg. 5 Eritrea officially became an Italian colony in 1890 and Massawa \u2013 already the seat of the colonial administration since 1885 \u2013 was declared the capital. At this time, because of the danger of insurrection in the highlands, Asmara was not even in the running to become the capital of the new colony. Furthermore, Bizzon explains that Asmara was not developed enough to serve as the capital: \u201cPolitically, militarily, and even logistically, the distance between Massawa and Asmara is greater than the distance between Italy and Massawa.\u201dBizzoni: L\u2019Eritrea \u2013 nel passato e nel presente (Quoted in: Denison et al.: Asmara \u2013 Africa\u2019s Secret Modernist City, pg. 24) The lack of an infrastructural link to Massawa prevented Asmara from developing quickly. File:Fort_Baldisera_(Asmara)_overlooking_the_Hamasien_plateau.jpg| alt=| Fort Baldisera (Asmara) overlooking the Hamasien plateau . That, despite all of this, Asmara rose to significance has to do with the goals of Italian colonization. The interest in the occupation of Eritrea lay, on the one hand, in the settlement of Italian citizens who were able to strengthen the economy of their motherland through development of the colony, and on the other hand, to use Eritrea as a military base from which the expansion of the colony could take place.Almedom: Re-reading the Short and Long-Rigged History of Eritrea 1941\u20131952: Back to the Future?, pg. 108 The Ethiopian Empire was one of the last uncolonized regions of Africa, and the vision of a strong, modern Italian nation after the successes of the Risorgimento, would require the acquisition of colonies if the country to become a European superpower, and to affirm the autonomy of the young kingdom.Fuller: Italy's Colonial Futures: Colonial Inertia and Postcolonial Capital in Asmara, pg. 2 Colonial politics brought about the government\u2019s claim to eminent domain as well as the realization of many noteworthy infrastructure projects. As a result of the takeover of Asmara by foreign militaries and because of the employment opportunities within infrastructure projects throughout Eritrea, the population of Asmara itself shrunk from 5000 to 800 inhabitants during the first five years of the Italian occupation. However, it remained an important market town on the Hamasien Plateau. The construction of the Massawa-Asmara-Railroad as well as a funicular railroad built along the same stretch that could transport heavy loads, finally allowed the Italians to use Asmara as a new base in the highlands. The institutionalized racial separation central to Italian colonial politics was not designed to account for the indigenous population, who would be displaced as the expansion of the industrial zone reached the unplanned quarters to the north.Gebremedhin: Asmara \u2013 Africa\u2019s Secret Modernist City, pg. 7 Eritreans who owned property in the city center, or the European quarter, were forced to move out and sell their land. In 1908, the Governor issued a decree that, in the interest of promoting and maintaining \u201cpublic order\u201d, declared that the first zone was meant only for Italians and citizens from other European countries, whereas the sudditi coloniali, or the \u201ccolonial subjects\u201d, were only allowed in the indigenous quarter and the mixed Market zone.Chelati Dirar: From warriors to urban dwellers: Ascari and the military factor in the urban development of colonial Eritrea, pg. 533 Only the Askari, indigenous soldiers who served in colonial troops, were allowed to build their huts in areas near the Italian residences, where conditions were better than those endured by their compatriots.The campi-famiglia directive allowed each Askari to build their own house. Under the supervision of Italian engineers, the soldier was to build the house with local building materials. In: Chelati Dirar: From warriors to urban dwellers: Ascari and the military factor in the urban development of colonial Eritrea, pg. 533 The untypical proximity of the Askari to the Italians illustrates the deep trust of the Italian administration in the indigenous troops. In 1926, colonial minister, Luigi Federzoni, described the Eritrean regiments as \u201cthe most solid, effective and safe pillar of our military might in all our African colonies.\u201dFrom a letter from Federzoni to Mussolini, dated November 24, 1926. Source: Palumbo: A Place in the Sun: Africa in Italian Colonial Culture, pg. 88 This relationship lasted throughout the Italian occupation of Eritrea, and is more than likely an important factor in determining the good-naturedness of Eritreans toward Italians today. alt=| Asmara Theatre in the 1920s The first plans led to a phase of intensive building, which ultimately resulted in an increase of Asmara\u2019s population from between 800 and 1,900 peopleTesfagiorgis: Eritrea \u2013 Africa in Focus, pg. 39 to more than 8,500 people in 1905, of which around 1,500 were white. This dramatic population increase exacerbated both a growth in trade and a rise in employment opportunities, as well as an upsurge in the number of people moving from rural areas to cities. In 1910, the city\u2019s population had grown to around 37,000 people.Tesfagiorgis: Eritrea \u2013 Africa in Focus, pg. 44 During this period of growth, many important buildings cropped up, including the Palast des Gouverneurs (today the residence of the president), the first Italian school, the cathedral, the theater, and the high court, all of which are located on the centralized Corso del Re, later known as the Viale Mussolini, and even later as Harnet Avenue. Asmara\u2019s road system and the important connections between Asmara and the cities of Keren and Decamhare were also built during this time period, along with the Massawa-Asmara-Railroad Line, which was finally finished in 1911. Asmara under Mussolini (1922-1941) Development under Mussolini's fascism alt=| Asmara in 1928 With Mussolini\u2019s rise to power in 1922, Asmara began a new chapter in its history. During the fascist occupation, the construction that took place in the city was by far the most formative. With Mussolini\u2019s efforts put toward building an Italian empire, the Eritrean capital became increasingly important in the years that followed, and in the 1930s, it became one of the most important sites in Italian East Africa. Modern architecture, equally lauded by architecture aficionados and city historians, slowly found its way to Eritrea in the 1920s. At this time in Italy, architecture was relatively uninfluenced by European avant-garde modernism which had taken hold in Holland, Germany, and France in particular.Akbar, Gebremedhin: Ein Weltkulturerbe It wasn\u2019t until 1927 that Gruppo 7,The members of Gruppo 7 were Luigi Figini, Ubaldo Castagnoli, Guido Frette, Sebastiano Lorco, Gino Pollini, Carlo Enrico Rava and Guiseppe Terragni. a coalition of young architects from Milan, developed the Italian variation of avant-garde modern architecture called Rationalismo. Until 1935, the majority of structures in Asmara were built in traditional styles from established architecture schools like Novecento and the Scuola Romana, both of which appropriated certain formal elements from the Italian Gothic, the Renaissance, the Baroque, the Romantic, and the Classical time periods. The architecture remained largely traditional and was based mostly on the models of the Italian motherland. In Asmara\u2019s most representative buildings built before 1935, this historicism is especially apparent. Asmara\u2019s theater exhibits stylistic elements from both the Romantic and Renaissance periods.Denison et al.: Asmara \u2013 Africa\u2019s Secret Modernist City, pg. 107 The Bank of Eritrea\u2019s building is built in the Neo-Gothic style, and the Governor\u2019s Palace as well as the post office building were constructed using neoclassical elements. To position Mussolini\u2019s rule within the time period when modern architecture found its way to the Eritrean highland is, at least for the first half of his reign, incorrect. In reality, nearly all of the avant-garde structures were conscripted and built between 1935 and 1941. Even if the building boom did not begin until the middle of the 1930s, Mussolini\u2019s fascist ideology would have already influenced the urban development plans during the 1920s and the beginning of the 1930s. alt=| Former Mayor's Villa in Asmara. Today, it is a Bed & Breakfast. At the beginning of the 20th century, the citizens of Asmara were separated by race. Neighborhoods for indigenous and European populations were clearly delineated from each other, however a public area could be used by everyone. The preliminary plans to separate people from different ethnic groups were expanded and concretized under Mussolini. The improved plans from 1930 laid out how the city would be divided into four clear and separate zones: the residential quarter for the indigenous population in the north, where there were already high population densities and erratic structures; the diagonal blocks of the industry zone; the \u201cVilla quarter\u201d for the Europeans, located south of present-day Harnet Avenue; and, the mixed zone around the market. Located in the market zone were administrative and commercial entities that were of equal significance for both groups of people (i.e. the indigenous and the European). Additionally, this zone housed centralized cultural institutions, and was interspersed with additional housing.Melchers: Asmara \u2013 Afrikas heimliche Hauptstadt der Moderne, pg. 6 The categorization of inhabitants by race reached its peak under fascism, with the strict separation of indigenous folks and occupiers. Growth as an Italian Military Base alt=| Asmara in the 1930s With the plan to raid Abyssinia and to incorporate it into the African colony, Asmara\u2019s cityscape began to change. More and more soldiers were being stationed in Eritrea, and the city had only a short time to manage a rapid increase in its population. Between 1932 and 1936 alone the number of inhabitants rose from 18,000 to 98,000 people.Bader: Faschistische Moderne in Afrika \u2013 Auto und Architektur in Asmara, pg. 353 Until 1935, administrative and commercial structures were expanded in order to build up Asmara as a military base for the upcoming war. The village became a bustling administrative city and a trading hub,Bodenschatz: St\u00e4dtebau f\u00fcr Mussolini, pg. 371 that required its new inhabitants address its rising sanitation, building, transportation, and safety needs. And so, housing, businesses, recreation services, as well as churches appeared out of thin air in a matter of a few short years. Deepening Racial Segregation alt=| An avenue in Asmara. This avenue served to segregate two sides of the city. Without question, the conviction that the white man is the ruler and therefore has the right to all conceivable privileges; That, consequently, the law [j]is one thing for the whites, and another thing for the natives; That the houses and dwellings of whites are always the first priority when solving any architectonic problem; indigenous dwellings, on the other hand, are only of interest to the whites if solving a problem with them would improve the wellbeing of the white population; That there are to be no whites and coloreds living together in the same house; That the white man\u2019s house must be outfitted with the best comforts available as it is preferable if he can enjoy his time in the colony, and because he should be able to enjoy the privileges that come with being white.\u201dSantoinianni: Il Razionalismo nelle colonie italiene 1927-1943 \u2013 La \u201enuova architettura\u201c delle Terre d\u2019Oltremare, pg. 120 (Quoted in Erbel: Die Architekturmoderne in Asmara vor dem Hintergrund von italienischem Faschismus und Kolonialismus)But it was not only Italian architects who sought council with Mussolini in hopes of having their ideas realized under the Duce\u2019s rule. Le Corbusier wanted his own plans implemented on the East African \u201cplayground\u201d, and from 1932 onwards, he continuously pursued the opportunity to meet privately with Mussolini. His attempts were made in vain, however, and so he wrote to the Italian ambassador in Brazil and recommended that the social structure of the residential city of Addis Abeba be abolished. He made concrete plans for a dominant central axis that would strictly separate the Europeans\u2019 residential neighborhoods from the indigenous population. This abrasive plan based on segregation did not take any of the local traditions nor the existing city structure into account.Mattioli: Unterwegs zu einer imperialen Raumordnung in Italienisch-Ostafrika. In: F\u00fcr den Faschismus bauen, pg. 332 alt=| Housing for the local population (Askari) Independent of Le Corbusier, the policies requiring the strict racial separation of the population were followed. Not only was the separation of races of the utmost importance when writing development policy for implementation in East Africa, the urge to perpetuate fascist ideology through urban planning without regard for existing structures and cultures was as well. Just as in Italy, architecture and urban construction policies were deployed in the colony in a dialectic of destruction and radical new design. The concepts of dominance, order, and racial segregation were to be inscribed in the cities of the Impero.Mattioli: Unterwegs zu einer imperialen Raumordnung in Italienisch-Ostafrika. In: F\u00fcr den Faschismus bauen, pg. 339 \u201cIn the second half of the 1930s, Mussolini's urban planners designed projects that treated settlements in Italian East Africa not as historic cities but as tabula rasa.\u201dMattioli: Unterwegs zu einer imperialen Raumordnung in Italienisch-Ostafrika. In: F\u00fcr den Faschismus bauen, pg. 342 They regarded the people of East Africa as \u201cbarbarians\u201d who did not live in real cities, and who did not have the right kind of housing nor culture. In order to realize the plans of an imperial spatial order, planners under Mussolini did not hesitate to destroy entire historical districts. Formative Years and a Building Boom alt=| Viale Mussolini (today Harnet Avenue) in 1930s Asmara After 1936, the cities in East Africa experienced a genuine building boom. As stormy as the city can be because of its location 2,350 meters above sea level, urban development did not take off anywhere else during the Africa Orientale Italiana project like it did in Asmara.Mattioli: Unterwegs zu einer imperialen Raumordnung in Italienisch-Ostafrika. In: F\u00fcr den Faschismus bauen, pg. 345 The victory over Abyssinia represents a turning point in the history of Asmara, and the years up to 1941 were to become the Eritrean capital\u2019s most formative. Architectural Development under the Italian Regime alt=| Cinema Impero (1930s) alt=|Fiat Tagliero petrol station in Asmara The Italian occupiers designed Asmara according to their ideas. So that they did not miss anything while in the East African colony, bars, restaurants, brothels and cinemas sprouted up all over the city. The high density of cinemas in Asmara is still as impressive today as it was back then. At the end of the 1930s, numerous cinemas had been built, all within the shortest possible timeframe, including Cinema Impero (1937), Cinema Capitol (1938), Cinema Roma (1937) and Cinema Odeon (1937). All of these cinemas were accessible exclusively to Europeans. However, locals were also to have their own cinema. In 1936, the architect Inginio Marabelli built Cinema Hamasien in the city\u2019s northern zone.Denison et al.: Asmara \u2013 Africa\u2019s Secret Modernist City, pg. 62 Over time, the number of leisure activities meant to entertain the colonial masters increased exponentially. There were golf courses, tennis clubs, soccer tournaments, bicycle racing clubs, and motorsport events. Motorsport events were held in Asmara for a reason. At the end of the 1930s, the number of Italian-made automobiles exported to Eritrea had exploded. Within a few years, the traffic volume in Asmara was higher than it was in Rome.Denison et al.: Asmara \u2013 Africa\u2019s Secret Modernist City, pg. 59 With approximately 50,000 cars in Asmara in 1938, there were officially enough for each Italian in the city to have one.Bodenschatz: St\u00e4dtebau f\u00fcr Mussolini, pg. 376 In the years 1936-1938, 15,158 cars and 13,719 motorcycles from different manufacturers were delivered to East Africa. This constituted about a fifth of the auto industry\u2019s total exports in 1938, and in 1937, about half.Bader: Faschistische Moderne in Afrika \u2013 Auto und Architektur in Asmara. In: F\u00fcr den Faschismus bauen, pg. 365 The automotive industry flourished in Asmara. Not only did the number of domestic car imports grow steadily in Italy, automobile companies themselves built prestigious branches in the Eritrean highlands to improve their image and sales as well. In the 1930s, for example, these automobile companies commissioned architects to design their representative offices in Asmara. Oftentimes, unknown architects and engineers were planning and constructing state-of-the-art buildings for the most important automobile companies in the world. Among the clients were Agip, Pirelli, Alfa Romeo, Lancia, and, of course, Fiat. Even the leading automobile club in Italy, RACI, opened a branch in the Eritrean capital to attract new members from the growing group of citizens with cars. The use of avant-garde architecture was a convenient means through which to attract the attention of potential car buyers, and the colony in East Africa offered the most ideal conditions for creating such striking structures. In Italy, architects had to tolerate the limitations of old building structures. In Asmara, on the other hand, the designers had no specific restrictions. Far from the what the motherland was able to provide, Eritrea offered the best conditions for innovative and experimental architecture. In the years between 1935 and 1941, numerous buildings in the styles of Rationalismo and Novecento were erected within a area, and although many others were planned, they would never be realized. The buildings ranged from small, one-story apartments to giant high-rise office buildings.Denison et al.: Asmara \u2013 Africa\u2019s Secret Modernist City, pg. 63 About 10 years after Gruppo 7 had outlined its basic principles for reforming Italian architecture in La Rassegna Italiana magazine, numerous buildings were built in Asmara according to these specifications. The group\u2019s principles were based on the idea that architecture had to be rational and reduced to simple forms, and that all architectural ornamentation had to be renounced.Bader: F\u00fcr den Faschismus bauen, pg. 366 alt=| Piazza Roma in Asmara (1930s) In addition to numerous buildings, the colonial administration also built roads and squares, which were also supposed to represent the fascist regime and its power over the Eritrean population. The Viale Mussolini (today Harnet Avenue), the Piazza Roma (today Post Square) and the Viale de Bono (today Semeatat Boulevard) were built to unite the masses and to display the power of the occupiers in the form of festivals, parades and marches.Denison et al.: Asmara \u2013 Africa\u2019s Secret Modernist City, pg. 61 With its administrative buildings, the Cinema Impero, the theater, St. Joseph's Cathedral, high-rise apartment buildings, and numerous bars and shops, Viale Mussolini was the center of the city. As the day faded into the night, Viale Mussolini was used as a promenade \u2013 the so-called Passeggiata. Italians walked up and down the street without any particular aim.The \u201cPasseggiata\u201d, that is, \u201cthe strolling\u201d, was a pastime passed on to the Asmarinos by the Italians, and is still celebrated in the evening hours on today's Harnet Avenue The indigenous population, however, had no access to the palm-lined boulevard during the day or at night. Annexation by Ethiopia and Emerging Resistance Movement alt=| View of Asmara Haile Selassie, in an open policy, did not hide the fact that Ethiopia \"is interested in the country and not in the people of Eritrea\",Abbay: Identity Jilted or Re-imagining Identity?, pg. 209 especially with regard to Muslim communities, whose villages were systematically burnt down by Ethiopian troops, and whose inhabitants were massacred throughout the 1950s, 1960s, and during the first half of the 1970s.Killion, Connell: Historical Dictionary of Eritrea, pg. 270 Haile Selassie dissolved Eritrea\u2019s autonomy bit by bit, for example, through the demotion of the autonomous government to a mere administrative body in 1960. Two years later, with the United Nations' approval, Ethiopia decided to ultimately end the federation. Through the besiegement of Asmara, Ethiopia forced the Eritrean parliament to dissolve itself completely,Negash: Eritrea and Ethiopia - The Federal Experience, pg. 143 and subsequently annexed the whole of Eritrea. Soon after, Eritrean opposition leaders came to the conclusion that the only hope of resisting Ethiopian rule lay in armed struggle. End of Ethiopian Occupation alt=|Monument to independence fighters in Asmara Towards the end of the 1980s, the Soviet Union decided against extending the cooperation agreement with Ethiopia. Without the resources of the Soviet Union, and due to a drought and simultaneous economic crisis in both countries, the morale of Ethiopian soldiers fell. Many of them served as mercenaries without real conviction for the fight against the Eritrean resistance, which allowed members of the sworn EPLF to edge their way into Ethiopian positions. In May 1991, under the pressure of the Ethiopian opposition the Derg regime finally fell. EPLF talks with the Ethiopian Transitional Government were successful, thereby allowing Eritrea to hold a referendum on its independence. The overwhelming majority, 99.83\\% of Eritrean people, voted for their country\u2019s independence,Tesfagiorgis: Eritrea \u2013 Africa in Focus, pg. 73 and on May 24, 1993 Eritrea was declared an independent country. A new parliament was established and then elected Isayas Afewerki, prominent head of the EPLF, as president. The armed conflict between Ethiopia and Eritrea lasted for almost 30 years. It is a remarkable history of human resistance on the one hand, and of terrible loss suffered by two of the world's poorest countries, on the other. The Eritrean people, themselves the product of a compulsory unification carried out by an outside power, fought, for the most part, alone against the statistically superior and better equipped Ethiopian army,Denison: Eritrea, pg. 33 while both Ethiopian regimes were ready to do their own as well as the Americans\u2019 and the Soviets\u2019 bidding in the most brutal ways, at least until the fall of Haile Selassie. More than 50 years had passed since the last time Italian planners were given free reign to explore their creative drives. Almost 10 years under British occupation and another 10 years in a repressive federation with Ethiopia followed 30 years of bloody fighting, at the end of which the country would be freed of foreign domination. Asmara remained standing, having seen little fighting within its city limits. Afterwards, however, the city was in a state of deterioration and chaos:\u201cScenes of boys and girls carrying barrels of water on improvised carts, military ramparts on top of apartment buildings, and bricked-up windows with broken glass and barbed wire fortifying residences facing the street are still vivid in the minds of residents of Asmara. The euphoria of victory did not remove the foul smell from clogged sewage, and the many beggar women and children indicated widespread poverty. Many colourless, decaying buildings attested to the neglect and destruction of the years of Ethiopian occupation. The basic infrastructure of Asmara was largely in need of a complete overhaul.\u201dDenison et al.: Asmara \u2013 Africa\u2019s Secret Modernist City, pg. 76It was a picture with scenes of joy about the country\u2019s newly-acquired sovereignty and, at the same time, scenes of a city\u2019s degeneration. The fact that no intensive fighting had taken place in Asmara, could not prevent the city\u2019s utter breakdown. Moreover, the already ruinous state of the city could not be overcome during the course of the war after the dismantling policy of British and Ethiopian occupation. Return as political capital alt=| Eritreans queuing at petrol station due to rationing The population increased due to a flood of refugees arriving from rural regions, as well as the return of many from the diaspora. Asmara, newly renamed the capital, became the political heart of Eritrea once again. During the years that followed, Eritrea experienced an economic upturn and countless investments that, together with its renewed function as the capital, led to the city\u2019s dramatic growth. While the pattern in many other African cities saw a rise in poor and illegal settlements, Asmara\u2019s development could be relatively controlled. Enormous challenges lay ahead; perhaps above all else, inhabitants of Asmara faced the problem of accessing clean drinking water, and of the lack of an adequate sewage system, as the infrastructure was still mostly in ruins following the long war. Since the border war of 1998-2000 with Ethiopia, Eritrea has been in an official state of emergency, its citizens effectively living under Martial Law. The political elites\u2019 control of the nation has far-reaching consequences, such as the repudiation of freedom of speech, of assembly, and of the press. The Washington Post published an article saying, \u201cWhile striving to be an egalitarian, self-reliant utopia, Eritrea has become the most unapologetically repressive country on earth.\u201dMcCrummen: As thousands flee regime, Eritrea would go it alone The population is faced with a steady political and cultural indoctrination, relying upon the rhetoric of nationalism and devoted to the idea of its superiority over Ethiopia.Ogbazghi: Personal Rule in Africa: The Case of Eritrea, pg. 5 A state-controlled economy that encompasses agriculture, industry and construction, is heavily dependent on the recruitment of conscripts who serve in national service, often for life. Financial support for the urban historic core alt=| Asmara Market (2013) In addition, Afewerki has introduced a strict policy of self-sufficiency. Under the pretext that Eritrea has historically refused to fall victim to the strategic desires of other nations, which is an idea that is not totally unfounded, Afewerki rejects any kind of help from abroad. In 2007 alone, the President turned down 200 million dollars meant to aide in the country\u2019s relief efforts.Sanders: Struggling Eritrea puts Self-Reliance Before Aid This has fatal consequences when it comes to caring for Asmara\u2019s heritage, something one of the poorest nations in the world cannot do alone. As mentioned above, the CARP, with its $5 million budget allotted by the World Bank, was abandoned. Another project with the purpose of renewing Asmara\u2019s city center, this time sponsored by the European Union, together with other EU aid programs were accounted for in 2011.Berhane: A Week in the Horn of Africa Other programs aimed at preserving Asmara\u2019s city center are not on the table at the moment, and it is difficult to imagine that Afewerki will bypass his tendency toward isolationism and accept the necessary financial and technical assistance from abroad that could revive such programs. It is difficult to say whether Asmara had more hope for improvement under the rule of its oppressive archenemy, Ethiopia, or if anything can be said of hope at all under its current dictator.", "edit_actions": [{"type": "D", "before": "|400x400px", "after": null, "start_char_pos": 25, "end_char_pos": 35}, {"type": "D", "before": "400x400px|", "after": null, "start_char_pos": 656, "end_char_pos": 666}, {"type": "D", "before": "400x400px|", "after": null, "start_char_pos": 2550, "end_char_pos": 2560}, {"type": "A", "before": null, "after": "File:Fort_Baldisera_(Asmara)_overlooking_the_Hamasien_plateau.jpg|", "start_char_pos": 5352, "end_char_pos": 5352}, {"type": "R", "before": "400x400px", "after": "Fort Baldisera (Asmara) overlooking the Hamasien plateau", "start_char_pos": 5359, "end_char_pos": 5368}, {"type": "A", "before": null, "after": ".", "start_char_pos": 5369, "end_char_pos": 5369}, {"type": "D", "before": "250x250px|", "after": null, "start_char_pos": 9068, "end_char_pos": 9078}, {"type": "D", "before": "400x400px|", "after": null, "start_char_pos": 10328, "end_char_pos": 10338}, {"type": "D", "before": "400x400px|", "after": null, "start_char_pos": 12761, "end_char_pos": 12771}, {"type": "D", "before": "400x400px|", "after": null, "start_char_pos": 14117, "end_char_pos": 14127}, {"type": "D", "before": "300x300px|", "after": null, "start_char_pos": 15092, "end_char_pos": 15102}, {"type": "D", "before": "400x400px|", "after": null, "start_char_pos": 17109, "end_char_pos": 17119}, {"type": "D", "before": "400x400px|", "after": null, "start_char_pos": 18519, "end_char_pos": 18529}, {"type": "D", "before": "400x400px|", "after": null, "start_char_pos": 19190, "end_char_pos": 19200}, {"type": "A", "before": null, "after": "alt=|Fiat Tagliero petrol station in Asmara", "start_char_pos": 19223, "end_char_pos": 19223}, {"type": "D", "before": "alt=|400x400px|Fiat Tagliero petrol station in Asmara", "after": null, "start_char_pos": 20200, "end_char_pos": 20253}, {"type": "D", "before": "400x400px|", "after": null, "start_char_pos": 23112, "end_char_pos": 23122}, {"type": "D", "before": "400x400px|", "after": null, "start_char_pos": 24362, "end_char_pos": 24372}, {"type": "A", "before": null, "after": "alt=|Monument to independence fighters in Asmara", "start_char_pos": 25496, "end_char_pos": 25496}, {"type": "D", "before": "alt=|400x400px|Monument to independence fighters in Asmara", "after": null, "start_char_pos": 26500, "end_char_pos": 26558}, {"type": "A", "before": null, "after": "Return as political capital", "start_char_pos": 28761, "end_char_pos": 28761}, {"type": "D", "before": "400x400px|", "after": null, "start_char_pos": 28768, "end_char_pos": 28778}, {"type": "D", "before": "Return as political capital", "after": null, "start_char_pos": 28832, "end_char_pos": 28859}, {"type": "A", "before": null, "after": "Financial support for the urban historic core", "start_char_pos": 30627, "end_char_pos": 30627}, {"type": "D", "before": "400x400px|", "after": null, "start_char_pos": 30634, "end_char_pos": 30644}, {"type": "D", "before": "Financial support for the urban historic core", "after": null, "start_char_pos": 30666, "end_char_pos": 30711}], "sents_char_pos": [0, 166, 432, 629, 746, 849, 915, 955, 1017, 1328, 1670, 1750, 1984, 2124, 2223, 2286, 2336, 2411, 2609, 2949, 3110, 3198, 3407, 3537, 3595, 3726, 3951, 4123, 4260, 4375, 4543, 4755, 4901, 5138, 5474, 5785, 6191, 6427, 6705, 6776, 6994, 7238, 7416, 7752, 8093, 8167, 8277, 8551, 8727, 8794, 9281, 9374, 9564, 9630, 10022, 10248, 10436, 10543, 10770, 10901, 11067, 11421, 11731, 11839, 11941, 12034, 12271, 12444, 12547, 12803, 12835, 12920, 13064, 13181, 13428, 13470, 13553, 13592, 13761, 13873, 14075, 14262, 14399, 14488, 14704, 14927, 15056, 15123, 15178, 15302, 15397, 15507, 15667, 15746, 15967, 16342, 16519, 16707, 16860, 16987, 17064, 17275, 17532, 17677, 17784, 17861, 18070, 18147, 18334, 18476, 18658, 18858, 18935, 19132, 19287, 19427, 19515, 19716, 19779, 19831, 19923, 20095, 20305, 20403, 20484, 20668, 20832, 20934, 21006, 21090, 21289, 21417, 21578, 21658, 21816, 22042, 22123, 22197, 22333, 22529, 22620, 22891, 23065, 23346, 23594, 23852, 23954, 24021, 24299, 24799, 25016, 25119, 25334, 25467, 25610, 25765, 25955, 26045, 26183, 26390, 26634, 26783, 27191, 27314, 27525, 27603, 27947, 28091, 28205, 28285, 28486, 28595, 28989, 29074, 29263, 29407, 29438, 29655, 29807, 29959, 30142, 30380, 30785, 30994, 31102, 31301, 31401, 31575, 31899]}
+{"doc_id": "51512", "revision_depth": "1", "before_revision": "From the perspective of public health, in The Healthy Citizen (1996), Alana R. Petersen and Deborah Lupton said that manners assisted the diminishment of the social boundaries that existed between the public sphere and the private sphere of a person's life, and so gave rise to \u201c a highly reflective self, a self who monitors his or her behavior with due regard for others with whom he or she interacts, socially \u201d ; and that \u201c the public behavior of individuals came to signify their social standing; a means of presenting the self and of evaluating others, and thus the control of the outward self was vital. \u201d Petersen A., Lupton D., \"The Healthy Citizen\" in The New Public Health \u2013 Discourses, Knowledges, Strategies (1996) London: Sage. Moreover, the sociologist Pierre Bourdieu applied the concept of habitus towards understanding the societal functions of manners. The habitus is the set of mental attitudes, personal habits, and skills that a person possesses, his and her dispositions of character that are neither self-determined, nor pre-determined by the external environment, but which are produced and reproduced by social interactions; and are \u201c inculcated through experience and explicit teaching \u201d \u2014yet tend to function at the subconscious level.Jenkins R. \"Pierre Bourdieu (Key Sociologists) (2002) Cornwall, Routledge. Therefore, manners are likely to be a central part of the dispositions that guide a person\u2019s ability to decide upon socially-compliant behaviours.Bourdieu Pierre, \"Outline of a Theory of Practice (1977) Cambridge, Cambridge University Press. Anthropological perspectives In Purity and Danger: An Analysis of Concepts of Pollution and Taboo (2003) the anthropologist Mary Douglas said that the unique manners, social behaviors, and group rituals enable the local cosmology to remain ordered and free from those things that may pollute or defile the integrity of the culture. That ideas of pollution, defilement, and disgust are attached to the margins of socially acceptable behaviour in order to curtail unacceptable behaviour, and so maintain \u201c the assumptions by which experience is controlled \u201d within the culture.Douglas M., \"Purity and Danger \u2013 An Analysis of Concepts of Pollution and Taboo London, Routledge, 2003 Evolutionary perspectives In studying the expression of emotion by humans and animals, the naturalist Charles Darwin noted the universality of facial expressions of disgust and shame among infants and blind people, and concluded that the emotional responses of shame and disgust are innate behaviours.Darwin C., The Expression of the Emotions in Man and Animals London, Penguin, 2009 The public health specialist Valerie Curtis said that the development of facial responses was concomitant with the development of manners, which are behaviours with an evolutionary role in preventing the transmission of diseases, thus, people who practise personal hygiene and politeness will most benefit from membership in their social group, and so stand the best chance of biological survival, by way of opportunities for reproduction.Curtis V. Don \u2019 t Look, Don't Touch \u2013 The Science Behind Revulsion Oxford, Oxford University Press, 2013.Curtis V., Aunger R., and Rabie T. \"Evidence that Disgust Evolved to Protect from Risk of Disease Royal Society B: Biological Sciences, 271 Supplement: S131\u201333., 2004. From the study of the evolutionary bases of prejudice, the social psychologists Catherine Cottrell and Steven Neuberg said that human behavioural responses to \u2018otherness\u2019 might enable the preservation of manners and social norms.Neuberg SL., Cottrell CA. \"Evolutionary Bases of Prejudices\" in Evolution and Social Psychology, Schaller M. et al., Eds., New York, Psychology Press, 2006. That the feeling of \"foreignness\"\u2014which people experience in their first social interaction with someone from another culture\u2014might partly serve an evolutionary function: ' Group living surrounds one with individuals [who are] able to physically harm fellow group members, to spread contagious disease, or to \"free ride\" on their efforts ' ; therefore, a commitment to sociality is a risk: ' If threats, such as these, are left unchecked, the costs of sociality will quickly exceed its benefits. Thus, to maximize the returns on group \"living\", individual group members should be attuned to others \u2019 features or behaviors. ' Therefore, people who possess the social traits common to the cultural group are to be trusted, and people without the common social traits are to be distrusted as \u2018others\u2019 , and thus treated with suspicion or excluded from the group. That pressure of social exclusivity, born from the shift towards communal living, excluded uncooperative people and persons with poor personal hygiene. The threat of social exclusion led people to avoid personal behaviours that might embarrass the group or that might provoke revulsion among the group.Curtis V. \"Don \u2019 t Look, Don't Touch \u2013 The Science Behind Revulsion\" Oxford: Oxford University Press, 2013 (iii) Cultural Norm Manners \u2013 are the manners of culture and society by which a person establishes his and her identity and membership in a given socio-cultural group. In observing and abiding the manners of cultural norm, a person demarcates socio-cultural identity and establishes social boundaries, which then identify whom to trust and whom to distrust as 'the other' , who is not the self. Cultural norm manners are learnt through the enculturation with and the routinisation of \u2018the familiar\u2019 , and through social exposure to the \u2018cultural otherness\u2019 of people identified as foreign to the group. Transgressions and flouting of the manners of cultural norm usually result in the social alienation of the transgressor. The nature of culture-norm manners allows a high level of between-group variability, but the manners usually are common to the people who identify with the given socio-cultural group. 20th century Etiquette in Society, in Business, in Politics, and at Home (1922), by Emily Post documents the \"trivialities\" of desirable conduct in daily life, and provided pragmatic approaches to the practice good manners; the social conduct expected and appropriate for the events of life, such as a baptism, a wedding, and a funeral.Post, P., Post, A., Post, L., & Senning, D. P. Emily Post \u2019 s Etiquette, 18th Edition (2011) New York: William Morrow. As didactic texts, books of etiquette (the conventional rules of personal behaviour in polite society) usually feature explanatory titles, such as The Ladies' Book of Etiquette, and Manual of Politeness: A Complete Hand Book for the Use of the Lady in Polite Society (1860), by Florence Hartley; Amy Vanderbilt\u2019s Complete Book of Etiquette (1957), by Amy Vanderbilt;Vanderbilt, A. (1957) Amy Vanderbilt\u2019s Complete Book of Etiquette New York: Doubleday & Company. Miss Manners \u2019 Guide to Excruciatingly Correct Behavior (1979), by Judith Martin;Martin, J. (1979) Miss Manners\u2019 Guide to Excruciatingly Correct Behavior New York: W. W. Norton & Company. and Peas & Queues: The Minefield of Modern Manners (2013), by Sandi Toksvig,Toksvig, S. (2013) Peas & Queues: The Minefield of Modern Manners London: Profile Books Ltd. present ranges of civility; socially acceptable behaviours for their respective times; yet each author cautions the reader, that to be a well-mannered person he and she must practise good manners in their public and private lives. Moreover, the How Rude! comic-book series addresses and discusses adolescent perspectives and questions of etiquette, social manners, and civility.Ellen R. Delisio, \"Teaching Manners in a Manner-less World\", Education World, 4 July 2005. Accessed 27 July 2018.", "after_revision": "From the perspective of public health, in The Healthy Citizen (1996), Alana R. Petersen and Deborah Lupton said that manners assisted the diminishment of the social boundaries that existed between the public sphere and the private sphere of a person's life, and so gave rise to \" a highly reflective self, a self who monitors his or her behavior with due regard for others with whom he or she interacts, socially \" ; and that \" the public behavior of individuals came to signify their social standing; a means of presenting the self and of evaluating others, and thus the control of the outward self was vital. \" Petersen A., Lupton D., \"The Healthy Citizen\" in The New Public Health \u2013 Discourses, Knowledges, Strategies (1996) London: Sage. Moreover, the sociologist Pierre Bourdieu applied the concept of habitus towards understanding the societal functions of manners. The habitus is the set of mental attitudes, personal habits, and skills that a person possesses, his and her dispositions of character that are neither self-determined, nor pre-determined by the external environment, but which are produced and reproduced by social interactions; and are \" inculcated through experience and explicit teaching \" \u2014yet tend to function at the subconscious level.Jenkins R. \"Pierre Bourdieu (Key Sociologists) (2002) Cornwall, Routledge. Therefore, manners are likely to be a central part of the dispositions that guide a person\u2019s ability to decide upon socially-compliant behaviours.Bourdieu Pierre, \"Outline of a Theory of Practice (1977) Cambridge, Cambridge University Press. Anthropological perspectives In Purity and Danger: An Analysis of Concepts of Pollution and Taboo (2003) the anthropologist Mary Douglas said that the unique manners, social behaviors, and group rituals enable the local cosmology to remain ordered and free from those things that may pollute or defile the integrity of the culture. That ideas of pollution, defilement, and disgust are attached to the margins of socially acceptable behaviour in order to curtail unacceptable behaviour, and so maintain \" the assumptions by which experience is controlled \" within the culture.Douglas M., \"Purity and Danger \u2013 An Analysis of Concepts of Pollution and Taboo London, Routledge, 2003 Evolutionary perspectives In studying the expression of emotion by humans and animals, the naturalist Charles Darwin noted the universality of facial expressions of disgust and shame among infants and blind people, and concluded that the emotional responses of shame and disgust are innate behaviours.Darwin C., The Expression of the Emotions in Man and Animals London, Penguin, 2009 The public health specialist Valerie Curtis said that the development of facial responses was concomitant with the development of manners, which are behaviours with an evolutionary role in preventing the transmission of diseases, thus, people who practise personal hygiene and politeness will most benefit from membership in their social group, and so stand the best chance of biological survival, by way of opportunities for reproduction.Curtis V. Don ' t Look, Don't Touch \u2013 The Science Behind Revulsion Oxford, Oxford University Press, 2013.Curtis V., Aunger R., and Rabie T. \"Evidence that Disgust Evolved to Protect from Risk of Disease Royal Society B: Biological Sciences, 271 Supplement: S131\u201333., 2004. From the study of the evolutionary bases of prejudice, the social psychologists Catherine Cottrell and Steven Neuberg said that human behavioural responses to \"otherness\" might enable the preservation of manners and social norms.Neuberg SL., Cottrell CA. \"Evolutionary Bases of Prejudices\" in Evolution and Social Psychology, Schaller M. et al., Eds., New York, Psychology Press, 2006. That the feeling of \"foreignness\"\u2014which people experience in their first social interaction with someone from another culture\u2014might partly serve an evolutionary function: \" Group living surrounds one with individuals [who are] able to physically harm fellow group members, to spread contagious disease, or to 'free ride' on their efforts \" ; therefore, a commitment to sociality is a risk: \" If threats, such as these, are left unchecked, the costs of sociality will quickly exceed its benefits. Thus, to maximize the returns on group \"living\", individual group members should be attuned to others ' features or behaviors. \" Therefore, people who possess the social traits common to the cultural group are to be trusted, and people without the common social traits are to be distrusted as \"others\" , and thus treated with suspicion or excluded from the group. That pressure of social exclusivity, born from the shift towards communal living, excluded uncooperative people and persons with poor personal hygiene. The threat of social exclusion led people to avoid personal behaviours that might embarrass the group or that might provoke revulsion among the group.Curtis V. \"Don ' t Look, Don't Touch \u2013 The Science Behind Revulsion\" Oxford: Oxford University Press, 2013 (iii) Cultural Norm Manners \u2013 are the manners of culture and society by which a person establishes his and her identity and membership in a given socio-cultural group. In observing and abiding the manners of cultural norm, a person demarcates socio-cultural identity and establishes social boundaries, which then identify whom to trust and whom to distrust as \"the other\" , who is not the self. Cultural norm manners are learnt through the enculturation with and the routinisation of \"the familiar\" , and through social exposure to the \"cultural otherness\" of people identified as foreign to the group. Transgressions and flouting of the manners of cultural norm usually result in the social alienation of the transgressor. The nature of culture-norm manners allows a high level of between-group variability, but the manners usually are common to the people who identify with the given socio-cultural group. 20th century Etiquette in Society, in Business, in Politics, and at Home (1922), by Emily Post documents the \"trivialities\" of desirable conduct in daily life, and provided pragmatic approaches to the practice good manners; the social conduct expected and appropriate for the events of life, such as a baptism, a wedding, and a funeral.Post, P., Post, A., Post, L., & Senning, D. P. Emily Post ' s Etiquette, 18th Edition (2011) New York: William Morrow. As didactic texts, books of etiquette (the conventional rules of personal behaviour in polite society) usually feature explanatory titles, such as The Ladies' Book of Etiquette, and Manual of Politeness: A Complete Hand Book for the Use of the Lady in Polite Society (1860), by Florence Hartley; Amy Vanderbilt\u2019s Complete Book of Etiquette (1957), by Amy Vanderbilt;Vanderbilt, A. (1957) Amy Vanderbilt\u2019s Complete Book of Etiquette New York: Doubleday & Company. Miss Manners ' Guide to Excruciatingly Correct Behavior (1979), by Judith Martin;Martin, J. (1979) Miss Manners\u2019 Guide to Excruciatingly Correct Behavior New York: W. W. Norton & Company. and Peas & Queues: The Minefield of Modern Manners (2013), by Sandi Toksvig,Toksvig, S. (2013) Peas & Queues: The Minefield of Modern Manners London: Profile Books Ltd. present ranges of civility; socially acceptable behaviours for their respective times; yet each author cautions the reader, that to be a well-mannered person he and she must practise good manners in their public and private lives. Moreover, the How Rude! comic-book series addresses and discusses adolescent perspectives and questions of etiquette, social manners, and civility.Ellen R. Delisio, \"Teaching Manners in a Manner-less World\", Education World, 4 July 2005. Accessed 27 July 2018.", "edit_actions": [{"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 278, "end_char_pos": 279}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 413, "end_char_pos": 414}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 426, "end_char_pos": 427}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 611, "end_char_pos": 612}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1159, "end_char_pos": 1160}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1213, "end_char_pos": 1214}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 2082, "end_char_pos": 2083}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2134, "end_char_pos": 2135}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3096, "end_char_pos": 3097}, {"type": "R", "before": "\u2018otherness\u2019", "after": "\"otherness\"", "start_char_pos": 3514, "end_char_pos": 3525}, {"type": "R", "before": "'", "after": "\"", "start_char_pos": 3912, "end_char_pos": 3913}, {"type": "R", "before": "\"free ride\"", "after": "'free ride'", "start_char_pos": 4050, "end_char_pos": 4061}, {"type": "R", "before": "'", "after": "\"", "start_char_pos": 4079, "end_char_pos": 4080}, {"type": "R", "before": "'", "after": "\"", "start_char_pos": 4131, "end_char_pos": 4132}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4339, "end_char_pos": 4340}, {"type": "R", "before": "'", "after": "\"", "start_char_pos": 4364, "end_char_pos": 4365}, {"type": "R", "before": "\u2018others\u2019", "after": "\"others\"", "start_char_pos": 4530, "end_char_pos": 4538}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4918, "end_char_pos": 4919}, {"type": "R", "before": "'the other'", "after": "\"the other\"", "start_char_pos": 5370, "end_char_pos": 5381}, {"type": "R", "before": "\u2018the familiar\u2019", "after": "\"the familiar\"", "start_char_pos": 5494, "end_char_pos": 5508}, {"type": "R", "before": "\u2018cultural otherness\u2019", "after": "\"cultural otherness\"", "start_char_pos": 5546, "end_char_pos": 5566}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 6312, "end_char_pos": 6313}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 6849, "end_char_pos": 6850}], "sents_char_pos": [0, 416, 501, 610, 741, 871, 1150, 1263, 1337, 1484, 1579, 1911, 2155, 2560, 2628, 3082, 3187, 3354, 3584, 3609, 3740, 4082, 4236, 4363, 4600, 4752, 4903, 5177, 5404, 5612, 5733, 5917, 6141, 6254, 6372, 6668, 6835, 7220, 7279, 7423, 7571, 7661]}
+{"doc_id": "5196860", "revision_depth": "1", "before_revision": "Scholarly journals focused on Canadian history Acadiensis, covers Atlantic Canada Alberta historySee website American Review of Canadian StudiesSee Website British Columbia HistorySee website Canada's History, Formerly The Beaver (1920\u20132010) Canadian Historical Review, the major scholarly journal Histoire sociale/Social History, focus on CanadaSee website Labour/Le Travail London Journal of Canadian StudiesAnnual since 1984; see website Manitoba HistorySee website Ontario Historysee website Revue d'histoire de l'Am\u00e9rique fran\u00e7aise focus on QuebecSee French Wikipedia Saskatchewan History Urban History Review - Revue d'histoire urbaineSee website * Prior to 1763 thousands of scholarly biographies of those who died by 1930 1763-1867 1867-1920 Influential scholarly biography - At Questia.com - At Questia.com Millman, Brock. Polarity, Patriotism, and Dissent in Great War Canada, 1914-1919 (University of Toronto Press, 2016). - At Questia.com Historiography and memory ; historiography ; bibliography ; cultural history 1921-1957 Overviews online Creighton, Donald. The Forked Road: Canada 1939-1957 (McClelland and Stewart Limited, 1976), general survey. - at Questia.com standard biography at Questia.com - at Questia.com A primary source Great Depression - at Questia.com Eayrs, James. In Defence of Canada: Peacemaking and Deterrence (U of Toronto Press, 1972). English, John. The Worldly Years: The Life of Lester Pearson, Volume II: 1949-1972 (Vintage Books Canada, 1993). Holmes, John W. The Shaping of Peace: Canada and the Search for World Order 1943-1957 (2 vol. U of Toronto Press, 1979\u201382). Pearson, Geoffrey. Seize the Day: Lester B. Pearson and Crisis Diplomacy (Carleton UP, 1993). Smith, Denis. Diplomacy of Fear: Canada and the Cold War, 1941-1948 (U of Toronto Press, 1988). Teigrob, Robert. Warming up to the Cold War: Canada and the United States' coalition of the willing, from Hiroshima to Korea (U of Toronto Press, 2009. Thompson, John Herd and Stephen J. Randall. Canada and the United States: Ambivalent Allies (University of Georgia Press, 1994). Whitaker, Reginald, and Gary Marcuse. Cold War Canada: The making of a national insecurity state, 1945-1957 (U of Toronto Press, 1994). Barris, Ted. Deadlock in Korea: Canadians at War, 1950-1953 (Macmillan Canada, 1999). Benedict, Michael, ed. Canada at War (Toronto: Penguin, 1997). Bercuson, David. Blood on the Hills: The Canadian Army in the Korean War (U of Toronto Press, 1999). Granatstein, J.L. and David Bercuson. War and Peacekeeping: From South Africa to the Gulf- Canada's Limited Wars (Toronto: Key Porter Books, 1991). Granatstein, J. L. and David Stafford. Spy Wars: Espionage and Canada from Gouzenko to Glasnost (Key Porter Books, 1990). Grey, Jeffrey. The Commonwealth Armies and the Korean War: An Alliance Study (Manchester UP, 1988). Harris, Stephen. (1988). Canadian Brass: The making of a professional army, 1860-1939 (Toronto: U. of Toronto Press). Horn, Bernd and Stephen Harris, eds. (2001). Warrior chiefs: Perspectives on senior Canadian military leaders. (Toronto: Dundurn Press). Humphries, Mark Osborne, ed. (2008). The selected papers of Sir Arthur Currie: Diaries, letters, and report to the Ministry, ( 1917-1933. (Waterloo: Wilfrid Laurier University Press). Kasurak, Peter. A National Force: The Evolution of Canada's Army, 1950\u20132000 (Vancouver: UBC Press, 2013) Maloney, Sean. Canada and UN Peacekeeping: Cold War by Other Means (St. Catherines: Vanwell Publishing, 2002). Maloney, Sean. Learning to Love the Bomb: Canada's Nuclear Weapons During the Cold War (Potomac Books, Inc., 2007). Melady, John. Korea: Canada's Forgotten War (Macmillan of Canada, 1983). Meyers, Edward C. Thunder in the Morning Calm: The Royal Canadian Navy in Korea: 1950\u20131955. (St. Catherines: Vanwell, 1992) Milner, Marc. Canadian military history. (Toronto: Copp Clark Putnam, 1993.) Milner, Marc. Canada's navy: The first century. 2nd edition. (University of Toronto Press, 2010). Morton, Desmond. A Military History of Canada: From Champlain to the Gulf War (McClellan and Stewart Inc., 1992). Morton, Desmond. (1981). Canada and war: A military and political history. Toronto: Butterworths Nicholson, Gerald W. L. The fighting Newfoundlanders: A history of the Royal Newfoundland Regiment. (2nd ed. McGill-Queen's University Press, 2006,). Rickard, John. Politics of Command: Lieutenant-General A.G.L. McNaughton and the Canadian Army, 1939-1943 (2009) Stanley, George F.G. Canada's soldiers: The military history of an unmilitary people. (Toronto: Macmillan, 1974) First World War Cook, Tim. \"'Literary memorials': The Great War regimental histories, 1919\u20131939,\" Journal of the Canadian Historical Association (2002) 13#1 pp: 167-190. Copp, Terry. (2005). \"The military effort, 1914-1918 ,\" in: David MacKenzie, ed. Canada and the First World War. (Toronto: U. of Toronto Press), 35-61. Dancocks, Daniel G. (1985). Sir Arthur Currie: A biography. (Toronto: Methuen) Dancocks, Daniel G. (1986). Legacy of Valour: The Canadians at Passchendaele. (Edmonton: Hurtig Publishers). Dancocks, Daniel G. (1988). Welcome to Flanders Fields, the first Canadian battle of the Great War: Ypres, 1915. (Toronto: McClelland & Stewart. Duguid, A.F. (1938). Official history of the Canadian forces in the Great War, 1914-1919. Vol. 1. (Ottawa: King's Printer. Evans Shaw, Susan. (2011). Canadians at war: A guide to the battlefields of World War I. (Fredericton: Goose Lane Editions) Freeman, Bill and Richard Nielson. (1999). Far from home: Canadians in the First World War. (Toronto: McGraw-Hill Ryerson) Granatstein, J.L. (2004). Hell's corner: An illustrated history of Canada's Great War 1914\u20131918. Vancouver/(Toronto: Douglas and McIntyre) Gray, David. (2012). \"Carrying Canadian troops: The story of RMS Olympic as a First World War troopship,\" Canadian Military History, Vol. 11(1), 54-70. Hadley, Michael L. and Roger Sarty. (1991). Tin-pots and pirate ships: Canadian naval forces and German sea raiders, 1880-1918. (Montreal and Kingston: McGill-Queen's University Press). Haycock, Ronald G. (1986). Sam Hughes: The public career of a controversial Canadian, 1885-1916. (Wilfrid Laurier University Press). Hayes, Geoffrey, Andrew Iarocci and Mike Bechthold. eds. (2007). Vimy Ridge: A Canadian reassessment. (Waterloo: Wilfrid Laurier University Press). Hyatt, A.M.J. (1987). General Sir Arthur Currie: A military biography (Toronto. U. of Toronto Press). Iarocci, Andrew, and Mike Bechthold, eds. Vimy Ridge: A Canadian reassessment (Waterloo: Wilfrid Laurier University Press) Iarocci, Andrew. (2009). \"On the threshold of modernity: Canadian horsepower on the Western Front, 1914-18 ,\" Journal of the Society for Army Historical Research pp 59\u201383. Mackenzie, David, ed. Canada and the First World War (2005); 16 specialized essays by scholars Macphail, Andrew. (1925). Official history of the Canadian forces in the Great War, 1914-19. The Medical Services, ((Ottawa: King's Printer) Morton, Desmond. (1979). \"Junior but sovereign allies': The transformation of the Canadian Expeditionary Force, 1914-1918 ,\" Journal of Imperial and Commonwealth History 8#1 pp: 56-67. Morton, Desmond. (1992). Silent battle: Canadian prisoners of war in Germany, 1914-1919. (Toronto: Lester Publishing. Morton, Desmond. (1993). When your number's up: The Canadian soldier in the First World War. (Toronto: Random House of Canada) Morton, Desmond. (2007). A military history of Canada. (Toronto: McClelland & Stewart.) Morton, Desmond and J.L. Granatstein. (1989). Marching to Armageddon: Canadians and the Great War 1914-1919. (Toronto: Lester & Orpen Dennys) Tennyson, Brian Douglas. Canada's Great War, 1914-1918 : How Canada Helped Save the British Empire and Became a North American Nation (2014). - Total pages: 771 (Also published in French under the title: Les aviateurs canadiens dans la Premi\u00e8re Guerre mondiale) Official histories Nicholson, G.W.L. (1964). Official history of the Canadian army in the First World War: Canadian Expeditionary Force 1914-1919. (Ottawa) Patenaude, J.O. (1938). Official history of the Canadian forces in the Great War 1914-1919 , Volume I, Chronology, Appendices and Maps. (Ottawa: I.S.O.) Official History of the Canadian Army in the First World War The R.C.A.F. Overseas 3 vol. Official History of the Canadian Army in Korea General List of Economic Surveys of Canada 1961-present - by the Organisation for Economic Co-operation and Development Baldwin, John R., and Petr Hanel. Innovation and Knowledge Creation in an Open Economy: Canadian Industry and International Implications (2007) Berton, Pierre. The Great Depression: 1929-1939 (1990) is a popular acoount Burton, F. W. \"Wheat in Canadian History,\" The Canadian Journal of Economics and Political Science Vol. 3, No. 2 (May, 1937), pp. 210\u2013217 Glazebrook, G. P. de T. A History of Transportation in Canada (1938) Innis, Harold. A., and A. R. M. Lower; Select Documents in Canadian Economic History, 1783-1885 University of Toronto Press, 1933, primary sources Mackintosh, W.A. \"The Laurentian Plateau in Canadian Economic Development,\" Economic Geography, Vol. 2, No. 4 (Oct., 1926), pp. 537\u2013549 Marr, William L. and Donald Patterson. Canada: An Economic History, 1980. Neill, Robin (1991) A history of Canadian economic thought, Routledge Norrie, Kenneth, Douglas Owram, and J.C. Herbert Emery. A History of the Canadian Economy 4th ed. (2007) Russell, Peter A. Farming in the Nineteenth Century (2012), 400pp; covers Ontario, Quebec and Manitoba Business history Bliss, Michael. Northern Enterprise: Five Centuries of Canadian Business. McClelland and Stewart, (1987). Bordo, Michael D., Angela Redish, and Hugh Rockoff. \"Why Didn't Canada Have a Banking Crisis in 2008 (or in 1930, or 1907, or . . .)?\" Economic History Review 68#1 (2015): 218\u201343 Fleming, Keith R. Power at Cost: Ontario Hydro and Rural Electrification, 1911-1958. McGill-Queen's U. Press, (1992). 326 pp. Frost, James D. Merchant princes: Halifax's first family of finance, ships, and steel (2003) Klassen, Henry C. A Business History of Alberta (1999) 362 pp. Kottman, Richard N. \"Herbert Hoover and the Smoot\u2013Hawley Tariff: Canada, A Case Study\", Journal of American History (1975), 62#3 pp 609\u2013635 in JSTOR Laxer, Gordon. Open for Business: The Roots of Foreign Ownership in Canada. (Toronto: Oxford University Press, 1989). Lingenfelter, Richard E., ed. The Mining West: A Bibliography & Guide to the History & Literature of Mining in the American & Canadian West. 2 vol Scarecrow, 2003. 1550 pp McDonald, Judith; O'Brien, Anthony Patrick; Callahan, Colleen. \"Trade Wars: Canada's Reaction to the Smoot\u2013Hawley Tariff\", Journal of Economic History (1997), 57#4 pp 802\u2013826, in JSTOR Myers, Gustavus (1972), A history of Canadian wealth, Lewis and Samuel online, on the super-rich Naylor, Tom. The History of Canadian Business. 1867-1914 2 vol (1976) Porter, John. \"Concentration of Economic Power and the Economic Elite in Canada,\" The Canadian Journal of Economics and Political Science, Vol. 22, No. 2 (May, 1956), pp. 199\u2013220 Roberts, David. In the Shadow of Detroit: Gordon M. McGregor, Ford of Canada, and Motoropolis. Wayne State U. Press, 2006. 320 pp. Santink, Joy L. Timothy Eaton and the Rise of His Department Store. U. of Toronto Press, 1990. 319 pp. Taylor, Graham D. and Peter Baskerville. A Concise History of Business in Canada (1994) Watts, George. The Bank of Canada: Origins and Early History (Carleton University Press, 1993) Williams, Glen. Not for Export: The International Competitiveness of Canadian Manufacturing. Toronto: McClelland and Stewart, 3rd edition, 1994. Froschauer, Karl. White gold: Hydroelectric Power in Canada. Vancouver: UBC Press, 1999. excerpt and text search Gillis, Robert Peter. \"The Ottawa lumber barons and the conservation movement 1880-1914. \" Journal of Canadian Studies 9#1 (1974): 14-30. online Le Riche, Timothy. Alberta's Oil Patch - The People, Politics & Companies (2006) Labour and working class Abella, Irving M. On strike; six key labour struggles in Canada, 1919-1949 (James, Lewis & Samuel 1974) Babcock, Robert H. Gompers in Canada: a study in American continentalism before the First World War (1974) online at ACLS e-books Bradbury, Bettina. Working families: Age, gender, and daily survival in industrializing Montreal (1993) Craig Heron. The Canadian Labour Movement: A Brief History, 1996. Craven, Paul, ed., Labouring lives: work and workers in nineteenth-century Ontario (1995) Davis, Angela E. (1995) Art and work: a social history of labour in the Canadian graphic arts industry to the 1940s McGill-Queen's University Press Frager, Ruth A., and Carmela K. Patrias, eds. Discounted Labour: Women Workers in Canada, 1870-1939 (2005) online Forsey, Eugene Alfred. Trade unions in Canada, 1812-1902 (1982). Frank, David. J. B. McLachlan: A Biography: The Story of a Legendary Labour Leader and the Cape Breton Coal Miners (1999) Haddow, Rodney, and Thomas Klassen. Partisanship, Globalization, and Canadian Labour Market Policy: Four Provinces in Comparative Perspective (2006) Heron, Craig. The Canadian Labour Movement: A Brief History, (1996). Hertel; D. W. History of the Brotherhood of Maintenance of Way Employees: Its Birth and Growth, 1887-1955. (1955) Horowitz, Gad. Canadian Labour in Politics (1968), Covers 1930-1965 Jamieson, Stuart. Times of Trouble: Labour Unrest and Industrial Conflict in Canada, 1900-1966 (1968), Detailed coverage of strikes Kealey, Gregory S. Dreaming of what might be: the Knights of Labor in Ontario, 1880-1900 (1982) excerpt and text search Kealey, Greg. \"Writing about Labour\" in Schultz, ed. Writing About Canada: A Handbook for Modern Canadian History (1990), pp 145\u201374 Lipton, Charles. The Trade Union Movement in Canada 1827-1959 (1966), a standard history from a Marxist perspective Logan, Harold. Trade Unions in Canada (1948), large amount of factual information MacEwan, Paul. Miners and Steelworkers: Labour in Cape Breton (1976) Morton, Desmond. Working People: An Illustrated History of the Canadian Labour Movement (1999) Ogmundson, Richard, and Michael Doyle. \"The rise and decline of Canadian Labour/1960 to 2000: Elites, power, ethnicity and gender.\" Canadian Journal of Sociology/Cahiers canadiens de sociologie (2002): 413-454. Palmer, Bryan D. Working Class Experience: Rethinking the History of Canadian Labour, 1800-1991 (1992) Robin, Martin. Radical Politics and Labour in Canada (1968), left-wing politics 1880-1930 Berton Pierre. The Last Spike: The Great Railway, 1881-1885 (2001) excerpt and text search, popular history Brown, Ron. The Train Doesn't Stop Here Any More (1998) an illustrated history of railway stations in Canada Currie, A. W. The Grand Trunk Railway of Canada. University of Toronto Press, 1957. 556 pp, the standard history Fleming, R. B. The Railway King of Canada: Sir William Mackenzie, 1849-1923 University of British Columbia Press, 1991 Fournier, Leslie T. Railway Nationalization in Canada: The Problem of the Canadian National Railways (1937) Freeman, Kenneth D. et al. The Growth and Performance of the Canadian Transcontinental Railways 1956-1981 (1987) Hertel; D. W. History of the Brotherhood of Maintenance of Way Employees: Its Birth and Growth, 1887-1955 (1955) online Hofsommer, Don L. Grand Trunk Corporation: Canadian National Railways in the United States, 1971-1992. 1995. 227 pp. online Kaye, Lamb W. History of the Canadian Pacific Railway. (1977). Political and legal %DIFDELCMD < %DIFDELCMD < %%% Argyle, Ray. Turning Points: The Campaigns That Changed Canada - 2011 and Before (2011) excerpt and text search, ch 5 Auger, Michel; Edwards, Peter (2004), The encyclopedia of Canadian organized crime: from Captain Kidd to Mom Boucher, Marks & Spencer Cook, Ramsay, ed. French-Canadian Nationalism; An Anthology (Macmillan of Canada, 1969). Courtney, John C; David E. Smith. The Oxford handbook of Canadian politics (Oxford University Press, 2010) Craik, Neil et al., eds. Public Law: Cases, materials, and commentary (Toronto: Emond Montgomery Publications, 2006). Dyck, Rand. Canadian Politics, Concise Fifth Edition (Cengage Learning, 2011) Fierlbeck, Katherine. Political Thought in Canada: An Intellectual History, Broadview Press, 2006 Greene, Ian The Charter of Rights (1989), James Lorimer and Company, Jones, Richard. Community in crisis : French-Canadian nationalism in perspective (McClelland and Stewart, 1967). McKay, Ian. Rebels, Reds, Radicals: Rethinking Canada's Left History, Between the Lines, 2006. Mann, Susan. Action Fran\u00e7aise: French Canadian nationalism in the twenties (University of Toronto Press, 1975). Monet, Jacques. The Last Cannon Shot; A Study of French-Canadian Nationalism, 1837\u20131850 (University of Toronto Press, 1969). Morton, Frederick Lee. Law, politics, and the judicial process in Canada (University of Calgary Press, 2002). Schneider, Stephen. Iced: The Story of Organized Crime in Canada (Wiley, 2009) British roles Buckner, Phillip Alfred. The transition to responsible government: British policy in British North America, 1815-1850 (1985). Jasanoff, Maya. Liberty\u2019s Exiles: The Loss of America and the Remaking of the British Empire (2011). Kaufman, Will, and Heidi Slettedahl Macpherson, eds. Britain and the Americas: Culture, Politics, and History (3 vol 2005), 1157pp; encyclopedic coverage. Lyon, Peter. Britain and Canada: Survey of a Changing Relationship (1976) Martin, Ged. \"Attacking the Durham Myth: Seventeen Years On.\" Journal of Canadian Studies 25.1 (1990): 39-59. Martin, Ged. Britain and the Origins of Canadian Confederation, 1837-67 (2001). Messamore, Barbara Jane. Canada's Governors General, 1847-1878 : Biography and Constitutional Evolution (U of Toronto Press, 2006). Smith, Andrew. \"Patriotism, self-interest and the \u2018Empire effect\u2019: Britishness and British decisions to invest in Canada, 1867\u20131914.\" Journal of Imperial and Commonwealth History 41.1 (2013): 59-80. 2001 ed. ; 2010 ed. . Druick, Zo\u00eb. Aspa Kotsopoulos (2008) Programming reality: perspectives on English-Canadian television, Wilfrid Laurier University Press Feldman, Seth and Nelson, Joyce, ed. Canadian Film Reader. Toronto: Martin, 1977. 405 pp. Francis, Daniel. The Imaginary Indian: The Image of the Indian in Canadian Culture. Vancouver: Arsenal Pulp, 1992. 260 pp. Hammill, Faye. Literary Culture and Female Authorship in Canada 1760-2000. Amsterdam: Rodopi, 2003. 245 pp. Keith, W. J. Canadian Literature in English. London: Longman, 1985. 287 pp. Kesterton, W.H. A History of Journalism in Canada (1979) Lerner, Loren R. and Williamson, Mary F., eds. Art and Architecture in Canada: A Bibliography and Guide to the Literature = Art et Architecture au Canada: Bibliographie et Guide de la Documentation U. of Toronto Press, 1991. 998 pp. MacDonald, Mary Lu. Literature and Society in the Canadas, 1817-1850. Mellen, 1992. 360 pp. Marshall, Bill, ed. France and the Americas: Culture, Politics, and History (3 Vol 2005) Melnyk, George. One Hundred Years of Canadian Cinema. U. of Toronto Press, 2004. 361 pp. Morris,Peter (1978). Embattled shadows: a history of Canadian cinema, 1895-1939 , McGill-Queen's University Press, New, W. H., ed. Literary History of Canada: Canadian Literature in English. (1990). 492 pp. Ord, Douglas. The National Gallery of Canada: Ideas, Art, Architecture. (2003). 500 pp. Perron, Paul. Narratology and Text: Subjectivity and Identity in New France and Qu\u00e9b\u00e9cois Literature. (2003). 338 pp. Simpson-Housley, Paul and Norcliffe, Glen, ed. Few Acres of Snow: Literary and Artistic Images of Canada. (1992). 277 pp. Stich, K. P., ed. Reflections: Autobiography and Canadian Literature. (1988). 176 pp. Smith, Judith E. Visions of Belonging: Family Stories, Popular Culture, and Postwar Democracy, 1940-1960. (2004). 444 pp. Thom, Ian, and Alan Elder. A Modern Life: Art and Design in British Columbia 1945-1960 (2004) Toye, William, ed. The Oxford Companion to Canadian Literature. (1983). 843 pp. Weiss, Jonathan, and Jane Moss. French-Canadian Literature (1996) Wise, Wyndham, ed. Essential guide to Canadian film. 2001 Axelrod, Paul. The Promise of Schooling: Education in Canada, 1800-1914 (1997) Bruno-Jofr\u00e9, Rosa. \"History of education in Canada: historiographic 'turns' and widening horizons.\" Paedagogica Historica (2014), 50#6, pp 774\u2013785 Burke, Sara Z., and Patrice Milewski, eds. Schooling in Transition: Readings in Canadian History of Education (2012) 24 articles by experts Clark, Lovell. ed The Manitoba School Question: majority rule or minority rights? (1968) historians debate the battle over French language schools Di Mascio, Anthony. The Idea of Popular Schooling in Upper Canada: Print Culture, Public Discourse, and the Demand for Education (McGill-Queen's University Press; 2012) 248 pages; building a common system of schooling in the late-18th and early 19th centuries. Gidney, R.D. and W.P.J. Millar. How Schools Worked: Public Education in English Canada, 1900-1940 (2011) 552pp; additional details Harris, Robin S. A history of higher education in Canada, 1663-1960 (1976) in ERIC Shook, Laurence K. Catholic Post-Secondary Education in English-Speaking Canada: A History (University of Toronto Press, 1971). Barclay, James A. Golf in Canada: A History (1992) Bouchier, Nancy. For the love of the game: Amateur sport in small-town Ontario, 1838-1895 (2003) Boyd, Bill. All Roads Lead to Hockey: Reports from Northern Canada to the Mexican Border. (2006). 240 pp Brown, D., 'The Northern Character Theme and Sport in Nineteenth Century Canada', Canadian Journal of History of Sport, 1989, 20(1), 47-56. Burstyn, V. The Rites of Men: Manhood, Politics, and The Culture of Sport. (1999). Charters, David A. The Chequered Past: Sports Car Racing and Rallying in Canada, 1951 - 1991 (2007) excerpt and text search Coakley, Jay and Peter Donnelly, Sports in Society: Issues and Controversies, (2003), 576pp Dauphinais, Paul R., 'A Class Act: French-Canadians in Organized Sport, 1840-1910 ', International Journal of the History of Sport, 1992 7(3): 432-442. Campey, Lucille H. After the Hector: The Scottish Pioneers of Nova Scotia and Cape Breton, 1773-1852 (Dundurn, 2007) Campey, Lucille H. Les \u00c9cossais: The Pioneer Scots of Lower Canada, 1763-1855 (Dundurn, 2006) Campey, Lucille H. With Axe and Bible: The Scottish Pioneers of New Brunswick, 1784-1874 (Dundurn, 2007) Campey, Lucille H. Planters, Paupers, and Pioneers: English Settlers in Atlantic Canada (2010) Campey, Lucille H. Seeking a Better Future: The English Pioneers of Ontario and Quebec (2012) Grekul, Lisa. Leaving Shadows: Literature in English by Canada's Ukrainians (2005) Grenke, Arthur. The German Community in Winnipeg 1872 to 1919 (1991) Hoerder, Dirk. Creating Societies: Immigrant Lives in Canada. (2000) 416 pp. Iacovetta, Franca, Paula Draper, and Robert A. Ventresca. A Nation of Immigrants: Readings in Canadian History, 1840s-1960s (1998) Kelley, Ninette, and Michael J. Trebilcock. The Making of the Mosaic: A History of Canadian Immigration Policy (1998) Kukushkin, Vadim. From Peasants to Labourers: Ukrainian and Belarusan Immigration from the Russian Empire to Canada (2007) McDougall, Duncan M. \"Immigration into Canada, 1851-1920 ,\" The Canadian Journal of Economics and Political Science, Vol. 27, No. 2 (May, 1961), pp. 162\u2013175 in JSTOR McKay, Ian. \"Tartanism Triumphant. The Construction of Scottishness in Nova Scotia, 1933-1954. \" Acadiensis 21, no. 2 (Spring 1992): 5-47. Magocsi, Paul R. ed. Encyclopedia of Canadas Peoples (1999), detailed guides to all groups Makabe, Tomoko. The Canadian Sansei (1998), 3rd generation of Japanese descent Messamore, Barbara, ed. Canadian Migration Patterns from Britain and North America (2004) 300pp; essays by scholars Petryshyn, Jaroslav. Peasants in the Promised Land: Canada and the Ukrainians (1985) Pivato, Joseph. The Anthology Of Italian-Canadian Writing (1998) Poy, Vivienne, ed. Passage to Promise Land: Voices of Chinese Immigrant Women to Canada (2013) Table of Contents Ramirez, Bruno. On the move: French-Canadian and Italian migrants in the North Atlantic economy 1860-1914 (1991). French-Canadians moving to New England & Italians to Montreal Riedel, Walter. The Old world and the new: Literary perspectives of German-speaking Canadians (1984) Roy, Patricia. A White Man's Province: British Columbia Politicians and Chinese and Japanese Immigrants, 1858-1914 (1989) Schryer, Frans J. The Netherlandic Presence in Ontario: Pillars, Class and Dutch Ethnicity. (1998). 458 pp. focus is post WW2 Swyripa, Frances. Storied Landscapes: Ethno-Religious Identity and the Canadian Prairies (University of Manitoba Press, 2010) 296 pp. Wagner, Jonathan. A History Of Migration From Germany to Canada, 1850-1939 (2005) Carrington, Philip. The Anglican Church in Canada: A History (Collins, 1963) Christie, Nancy, and Michael Gauvreau. Christian Churches and Their Peoples, 1840\u20131965: A Social History of Religion in Canada (2010), 176pp excerpt and text search Clark, Samuel Delbert. Church and sect in Canada (U of Toronto Press, 1948. Clifford, N. Keith. The Resistance to Church Union in Canada, 1904-1939 (U of British Columbia Press, 1985) Emery, George. Methodist Church on the Prairies, 1896-1914 (McGill-Queen's Press-MQUP, 2001.) Fay, Terence J. A History of Canadian Catholics: Gallicanism, Romanism, and Canadianism (2002) excerpt and text search Fraser, Brian J. The Social Uplifters: Presbyterian Progressives and the Social Gospel in Canada 1875-1915 (Wilfrid Laurier Univ. Press, 1988) Gardaz, Michel. \"Religious studies in Francophone Canada.\" Religion 41#1 (2011): 53-70. Gidney, Catherine. Long Eclipse: The Liberal Protestant Establishment and the Canadian University, 1920-1970 (McGill-Queen's Press-MQUP, 2004) Grant, John Webster, et al. The Church in the French Era; The Church in the British Era; The Church in the Canadian Era (3 vol. 1972; 1988); general history of Catholicism and Protestantism in Canada Grant, John Webster. Moon of Wintertime: Missionaries and the Indians of Canada in Encounter since 1534 (U of Toronto Press, 1984) Healey, Robynne Rogers. From Quaker to Upper Canadian: Faith and Community Among Yonge Street Friends, 1801-1850 (McGill-Queen's Press-MQUP, 2006) Lahey, Raymond J. The First Thousand Years: A Brief History of the Catholic Church in Canada (2002) McGowan, Mark. Michael Power: The Struggle to Build the Catholic Church on the Canadian Frontier (McGill-Queen's Press-MQUP, 2005) Marshall, David. Secularizing the Faith: Canadian Protestant Clergy and the Crisis of Belief, 1850-1940 (1992). Miedema, Gary. For Canada's sake: Public religion, centennial celebrations, and the re-making of Canada in the 1960s (McGill-Queen's Press-MQUP, 2005) Moir, John S. Enduring witness: a history of the Presbyterian Church in Canada (3rd ed. Presbyterian Church in Canada, 1987) Moir, John S. Church and State in Canada, 1627-1867 ; Basic Documents (McClelland and Stewart, 1967), Primary sources Morice, A G. History of the Catholic Church in Western Canada: From Lake Superior to the Pacific (1659\u20131895) (1910) online Murphy, Terrence, and Gerald Stortz, eds, Creed and Culture: The Place of English-Speaking Catholics in Canadian Society, 1750 \u2013 1930 (1993), articles by scholars Murphy, Terrence, and Roberto Perin, eds. A Concise History of Christianity in Canada (1996). , A wide-ranging general survey. Opp, James William. The Lord for the Body: Religion, Medicine, and Protestant Faith Healing in Canada, 1880-1930 (McGill-Queen's Press-MQUP, 2005) Perin, Roberto. Rome in Canada: the Vatican and Canadian affairs in the late Victorian age (U of Toronto Press, 1990) Semple, Neil. Lord's Dominion: The History of Canadian Methodism (McGill-Queen's Press-MQUP, 1996) Webster, Thomas. History of the Methodist Episcopal Church in Canada (1870) online Wilson, Robert S. \"Patterns of Canadian Baptist Life in the Twentieth Century,\" Baptist History & Heritage (2001) 36# 1/2, pp 27\u201360. Covers the educational, social, political, missionary, and theological trends; notes that the years 1953-2000 were marked by the union of different Baptist groups. Buckner, Phillip and John G. Reid, eds. Remembering 1759: The Conquest of Canada in Historical Memory (U of Toronto Press, 2012) Careless, J. M. S. \"Canadian Nationalism \u2014 Immature or Obsolete?\" Report of the Annual Meeting of the Canadian Historical Association / Rapports annuels de la Soci\u00e9t\u00e9 historique du Canada (1954) 33#1 pp: 12-19. online Primary sources Canadian Studies: A Guide to the Sources The CanText text library contains a library of documents divided by time period. Canada: Literature and History 347 e-books Blackwell, John D. \"Canadian Studies: A Core Collection,\" CHOICE: Current Reviews for Academic Libraries 35 (September 1997): 71-84, Browne, G. P., ed. Documents on the Confederation of British North America (1969). ; 707pp Morris, Alexander. 1880. The Treaties of Canada with the Indians of Manitoba and the North-West Territories: including the negotiations on which they were based, and other information relating thereto. Belfords, Clarke, and Co. Reprint: Prospero Books, Toronto, 2000. Pickersgill, J.W., and Donald F. Forster, The Mackenzie King Record. 4 vols. Vol. 1: 1939-1944 and Vol. 2: 1944-1945 (University of Toronto Press, 1960); and Vol. 3: 1945-1946 and Vol. 4: 1946-1947 (University of Toronto Press, 1970). from King's diary 485pp; short excerpts from primary sources covering 200 major topics Riddell, Walter A. ed; Documents on Canadian Foreign Policy, 1917-1939 (Oxford University Press, 1962) 806pp Talman, James J. ed; Basic Documents in Canadian History (1959) Thorner, Thomas, and Thor Frohn-Nielsen, eds. \"A Few Acres of Snow\": Documents in Pre-Confederation Canadian History, and \"A Country Nourished on Self-Doubt\": Documents on Post-Confederation Canadian History (3rd ed. (2010). Historical statistics Statistics Canada. Historical Statistics of Canada. 2d ed., Ottawa: Statistics Canada, 1983. Canada Year Book (CYB) annual 1867-1967 Cantril, Hadley and Mildred Strunk, eds. Public Opinion, 1935-1946 (1951), massive compilation of many public opinion polls from Canada and USA", "after_revision": "Scholarly journals focused on Canadian history Acadiensis, covers Atlantic Canada Alberta historySee website American Review of Canadian StudiesSee Website British Columbia HistorySee website Canada's History, Formerly The Beaver (1920\u20132010) Canadian Historical Review, the major scholarly journal Histoire sociale/Social History, focus on CanadaSee website Labour/Le Travail London Journal of Canadian StudiesAnnual since 1984; see website Manitoba HistorySee website Ontario Historysee website Revue d'histoire de l'Am\u00e9rique fran\u00e7aise focus on QuebecSee French Wikipedia Saskatchewan History Urban History Review - Revue d'histoire urbaineSee website Prior to 1763 thousands of scholarly biographies of those who died by 1930 1763\u20131867 1867\u20131920 Influential scholarly biography - Millman, Brock. Polarity, Patriotism, and Dissent in Great War Canada, 1914\u20131919 (University of Toronto Press, 2016). Historiography and memory ; historiography ; bibliography ; cultural history 1921\u20131957 Overviews Creighton, Donald. The Forked Road: Canada 1939\u20131957 (McClelland and Stewart Limited, 1976), general survey. - standard biography A primary source Great Depression - Eayrs, James. In Defence of Canada: Peacemaking and Deterrence (U of Toronto Press, 1972). English, John. The Worldly Years: The Life of Lester Pearson, Volume II: 1949\u20131972 (Vintage Books Canada, 1993). Holmes, John W. The Shaping of Peace: Canada and the Search for World Order 1943\u20131957 (2 vol. U of Toronto Press, 1979\u201382). Pearson, Geoffrey. Seize the Day: Lester B. Pearson and Crisis Diplomacy (Carleton UP, 1993). Smith, Denis. Diplomacy of Fear: Canada and the Cold War, 1941\u20131948 (U of Toronto Press, 1988). Teigrob, Robert. Warming up to the Cold War: Canada and the United States' coalition of the willing, from Hiroshima to Korea (U of Toronto Press, 2009. Thompson, John Herd and Stephen J. Randall. Canada and the United States: Ambivalent Allies (University of Georgia Press, 1994). Whitaker, Reginald, and Gary Marcuse. Cold War Canada: The making of a national insecurity state, 1945\u20131957 (U of Toronto Press, 1994). Barris, Ted. Deadlock in Korea: Canadians at War, 1950\u20131953 (Macmillan Canada, 1999). Benedict, Michael, ed. Canada at War (Toronto: Penguin, 1997). Bercuson, David. Blood on the Hills: The Canadian Army in the Korean War (U of Toronto Press, 1999). Granatstein, J.L. and David Bercuson. War and Peacekeeping: From South Africa to the Gulf- Canada's Limited Wars (Toronto: Key Porter Books, 1991). Granatstein, J. L. and David Stafford. Spy Wars: Espionage and Canada from Gouzenko to Glasnost (Key Porter Books, 1990). Grey, Jeffrey. The Commonwealth Armies and the Korean War: An Alliance Study (Manchester UP, 1988). Harris, Stephen. (1988). Canadian Brass: The making of a professional army, 1860\u20131939 (Toronto: U. of Toronto Press). Horn, Bernd and Stephen Harris, eds. (2001). Warrior chiefs: Perspectives on senior Canadian military leaders. (Toronto: Dundurn Press). Humphries, Mark Osborne, ed. (2008). The selected papers of Sir Arthur Currie: Diaries, letters, and report to the Ministry, ( 1917\u20131933. (Waterloo: Wilfrid Laurier University Press). Kasurak, Peter. A National Force: The Evolution of Canada's Army, 1950\u20132000 (Vancouver: UBC Press, 2013) Maloney, Sean. Canada and UN Peacekeeping: Cold War by Other Means (St. Catherines: Vanwell Publishing, 2002). Maloney, Sean. Learning to Love the Bomb: Canada's Nuclear Weapons During the Cold War (Potomac Books, Inc., 2007). Melady, John. Korea: Canada's Forgotten War (Macmillan of Canada, 1983). Meyers, Edward C. Thunder in the Morning Calm: The Royal Canadian Navy in Korea: 1950\u20131955. (St. Catherines: Vanwell, 1992) Milner, Marc. Canadian military history. (Toronto: Copp Clark Putnam, 1993.) Milner, Marc. Canada's navy: The first century. 2nd edition. (University of Toronto Press, 2010). Morton, Desmond. A Military History of Canada: From Champlain to the Gulf War (McClellan and Stewart Inc., 1992). Morton, Desmond. (1981). Canada and war: A military and political history. Toronto: Butterworths Nicholson, Gerald W. L. The fighting Newfoundlanders: A history of the Royal Newfoundland Regiment. (2nd ed. McGill-Queen's University Press, 2006,). Rickard, John. Politics of Command: Lieutenant-General A.G.L. McNaughton and the Canadian Army, 1939\u20131943 (2009) Stanley, George F.G. Canada's soldiers: The military history of an unmilitary people. (Toronto: Macmillan, 1974) First World War Cook, Tim. \"'Literary memorials': The Great War regimental histories, 1919\u20131939,\" Journal of the Canadian Historical Association (2002) 13#1 pp: 167\u2013190. Copp, Terry. (2005). \"The military effort, 1914\u20131918 ,\" in: David MacKenzie, ed. Canada and the First World War. (Toronto: U. of Toronto Press), 35-61. Dancocks, Daniel G. (1985). Sir Arthur Currie: A biography. (Toronto: Methuen) Dancocks, Daniel G. (1986). Legacy of Valour: The Canadians at Passchendaele. (Edmonton: Hurtig Publishers). Dancocks, Daniel G. (1988). Welcome to Flanders Fields, the first Canadian battle of the Great War: Ypres, 1915. (Toronto: McClelland & Stewart. Duguid, A.F. (1938). Official history of the Canadian forces in the Great War, 1914\u20131919. Vol. 1. (Ottawa: King's Printer. Evans Shaw, Susan. (2011). Canadians at war: A guide to the battlefields of World War I. (Fredericton: Goose Lane Editions) Freeman, Bill and Richard Nielson. (1999). Far from home: Canadians in the First World War. (Toronto: McGraw-Hill Ryerson) Granatstein, J.L. (2004). Hell's corner: An illustrated history of Canada's Great War 1914\u20131918. Vancouver/(Toronto: Douglas and McIntyre) Gray, David. (2012). \"Carrying Canadian troops: The story of RMS Olympic as a First World War troopship,\" Canadian Military History, Vol. 11(1), 54-70. Hadley, Michael L. and Roger Sarty. (1991). Tin-pots and pirate ships: Canadian naval forces and German sea raiders, 1880\u20131918. (Montreal and Kingston: McGill-Queen's University Press). Haycock, Ronald G. (1986). Sam Hughes: The public career of a controversial Canadian, 1885\u20131916. (Wilfrid Laurier University Press). Hayes, Geoffrey, Andrew Iarocci and Mike Bechthold. eds. (2007). Vimy Ridge: A Canadian reassessment. (Waterloo: Wilfrid Laurier University Press). Hyatt, A.M.J. (1987). General Sir Arthur Currie: A military biography (Toronto. U. of Toronto Press). Iarocci, Andrew, and Mike Bechthold, eds. Vimy Ridge: A Canadian reassessment (Waterloo: Wilfrid Laurier University Press) Iarocci, Andrew. (2009). \"On the threshold of modernity: Canadian horsepower on the Western Front, 1914\u201318 ,\" Journal of the Society for Army Historical Research pp 59\u201383. Mackenzie, David, ed. Canada and the First World War (2005); 16 specialized essays by scholars Macphail, Andrew. (1925). Official history of the Canadian forces in the Great War, 1914\u201319. The Medical Services, ((Ottawa: King's Printer) Morton, Desmond. (1979). \"Junior but sovereign allies': The transformation of the Canadian Expeditionary Force, 1914\u20131918 ,\" Journal of Imperial and Commonwealth History 8#1 pp: 56-67. Morton, Desmond. (1992). Silent battle: Canadian prisoners of war in Germany, 1914\u20131919. (Toronto: Lester Publishing. Morton, Desmond. (1993). When your number's up: The Canadian soldier in the First World War. (Toronto: Random House of Canada) Morton, Desmond. (2007). A military history of Canada. (Toronto: McClelland & Stewart.) Morton, Desmond and J.L. Granatstein. (1989). Marching to Armageddon: Canadians and the Great War 1914\u20131919. (Toronto: Lester & Orpen Dennys) Tennyson, Brian Douglas. Canada's Great War, 1914\u20131918 : How Canada Helped Save the British Empire and Became a North American Nation (2014). - Total pages: 771 (Also published in French under the title: Les aviateurs canadiens dans la Premi\u00e8re Guerre mondiale) Official histories Nicholson, G.W.L. (1964). Official history of the Canadian army in the First World War: Canadian Expeditionary Force 1914\u20131919. (Ottawa) Patenaude, J.O. (1938). Official history of the Canadian forces in the Great War 1914\u20131919 , Volume I, Chronology, Appendices and Maps. (Ottawa: I.S.O.) Official History of the Canadian Army in the First World War The R.C.A.F. Overseas 3 vol. Official History of the Canadian Army in Korea General List of Economic Surveys of Canada 1961-present - by the Organisation for Economic Co-operation and Development Baldwin, John R., and Petr Hanel. Innovation and Knowledge Creation in an Open Economy: Canadian Industry and International Implications (2007) Berton, Pierre. The Great Depression: 1929\u20131939 (1990) is a popular acoount Burton, F. W. \"Wheat in Canadian History,\" The Canadian Journal of Economics and Political Science Vol. 3, No. 2 (May, 1937), pp. 210\u2013217 Glazebrook, G. P. de T. A History of Transportation in Canada (1938) Innis, Harold. A., and A. R. M. Lower; Select Documents in Canadian Economic History, 1783\u20131885 University of Toronto Press, 1933, primary sources Mackintosh, W.A. \"The Laurentian Plateau in Canadian Economic Development,\" Economic Geography, Vol. 2, No. 4 (Oct., 1926), pp. 537\u2013549 Marr, William L. and Donald Patterson. Canada: An Economic History, 1980. Neill, Robin (1991) A history of Canadian economic thought, Routledge Norrie, Kenneth, Douglas Owram, and J.C. Herbert Emery. A History of the Canadian Economy 4th ed. (2007) Russell, Peter A. Farming in the Nineteenth Century (2012), 400pp; covers Ontario, Quebec and Manitoba Business history Bliss, Michael. Northern Enterprise: Five Centuries of Canadian Business. McClelland and Stewart, (1987). Bordo, Michael D., Angela Redish, and Hugh Rockoff. \"Why Didn't Canada Have a Banking Crisis in 2008 (or in 1930, or 1907, or . . .)?\" Economic History Review 68#1 (2015): 218\u201343 Fleming, Keith R. Power at Cost: Ontario Hydro and Rural Electrification, 1911\u20131958. McGill-Queen's U. Press, (1992). 326 pp. Frost, James D. Merchant princes: Halifax's first family of finance, ships, and steel (2003) Klassen, Henry C. A Business History of Alberta (1999) 362 pp. Kottman, Richard N. \"Herbert Hoover and the Smoot\u2013Hawley Tariff: Canada, A Case Study\", Journal of American History (1975), 62#3 pp 609\u2013635 in JSTOR Laxer, Gordon. Open for Business: The Roots of Foreign Ownership in Canada. (Toronto: Oxford University Press, 1989). Lingenfelter, Richard E., ed. The Mining West: A Bibliography & Guide to the History & Literature of Mining in the American & Canadian West. 2 vol Scarecrow, 2003. 1550 pp McDonald, Judith; O'Brien, Anthony Patrick; Callahan, Colleen. \"Trade Wars: Canada's Reaction to the Smoot\u2013Hawley Tariff\", Journal of Economic History (1997), 57#4 pp 802\u2013826, in JSTOR Myers, Gustavus (1972), A history of Canadian wealth, Lewis and Samuel online, on the super-rich Naylor, Tom. The History of Canadian Business. 1867\u20131914 2 vol (1976) Porter, John. \"Concentration of Economic Power and the Economic Elite in Canada,\" The Canadian Journal of Economics and Political Science, Vol. 22, No. 2 (May, 1956), pp. 199\u2013220 Roberts, David. In the Shadow of Detroit: Gordon M. McGregor, Ford of Canada, and Motoropolis. Wayne State U. Press, 2006. 320 pp. Santink, Joy L. Timothy Eaton and the Rise of His Department Store. U. of Toronto Press, 1990. 319 pp. Taylor, Graham D. and Peter Baskerville. A Concise History of Business in Canada (1994) Watts, George. The Bank of Canada: Origins and Early History (Carleton University Press, 1993) Williams, Glen. Not for Export: The International Competitiveness of Canadian Manufacturing. Toronto: McClelland and Stewart, 3rd edition, 1994. Froschauer, Karl. White gold: Hydroelectric Power in Canada. Vancouver: UBC Press, 1999. excerpt and text search Gillis, Robert Peter. \"The Ottawa lumber barons and the conservation movement 1880\u20131914. \" Journal of Canadian Studies 9#1 (1974): 14-30. online Le Riche, Timothy. Alberta's Oil Patch - The People, Politics & Companies (2006) Labour and working class Abella, Irving M. On strike; six key labour struggles in Canada, 1919\u20131949 (James, Lewis & Samuel 1974) Babcock, Robert H. Gompers in Canada: a study in American continentalism before the First World War (1974) online at ACLS e-books Bradbury, Bettina. Working families: Age, gender, and daily survival in industrializing Montreal (1993) Craig Heron. The Canadian Labour Movement: A Brief History, 1996. Craven, Paul, ed., Labouring lives: work and workers in nineteenth-century Ontario (1995) Davis, Angela E. (1995) Art and work: a social history of labour in the Canadian graphic arts industry to the 1940s McGill-Queen's University Press Frager, Ruth A., and Carmela K. Patrias, eds. Discounted Labour: Women Workers in Canada, 1870\u20131939 (2005) online Forsey, Eugene Alfred. Trade unions in Canada, 1812\u20131902 (1982). Frank, David. J. B. McLachlan: A Biography: The Story of a Legendary Labour Leader and the Cape Breton Coal Miners (1999) Haddow, Rodney, and Thomas Klassen. Partisanship, Globalization, and Canadian Labour Market Policy: Four Provinces in Comparative Perspective (2006) Heron, Craig. The Canadian Labour Movement: A Brief History, (1996). Hertel; D. W. History of the Brotherhood of Maintenance of Way Employees: Its Birth and Growth, 1887\u20131955. (1955) Horowitz, Gad. Canadian Labour in Politics (1968), Covers 1930\u20131965 Jamieson, Stuart. Times of Trouble: Labour Unrest and Industrial Conflict in Canada, 1900\u20131966 (1968), Detailed coverage of strikes Kealey, Gregory S. Dreaming of what might be: the Knights of Labor in Ontario, 1880\u20131900 (1982) excerpt and text search Kealey, Greg. \"Writing about Labour\" in Schultz, ed. Writing About Canada: A Handbook for Modern Canadian History (1990), pp 145\u201374 Lipton, Charles. The Trade Union Movement in Canada 1827\u20131959 (1966), a standard history from a Marxist perspective Logan, Harold. Trade Unions in Canada (1948), large amount of factual information MacEwan, Paul. Miners and Steelworkers: Labour in Cape Breton (1976) Morton, Desmond. Working People: An Illustrated History of the Canadian Labour Movement (1999) Ogmundson, Richard, and Michael Doyle. \"The rise and decline of Canadian Labour/1960 to 2000: Elites, power, ethnicity and gender.\" Canadian Journal of Sociology/Cahiers canadiens de sociologie (2002): 413-454. Palmer, Bryan D. Working Class Experience: Rethinking the History of Canadian Labour, 1800\u20131991 (1992) Robin, Martin. Radical Politics and Labour in Canada (1968), left-wing politics 1880\u20131930 Berton Pierre. The Last Spike: The Great Railway, 1881\u20131885 (2001) excerpt and text search, popular history Brown, Ron. The Train Doesn't Stop Here Any More (1998) an illustrated history of railway stations in Canada Currie, A. W. The Grand Trunk Railway of Canada. University of Toronto Press, 1957. 556 pp, the standard history Fleming, R. B. The Railway King of Canada: Sir William Mackenzie, 1849\u20131923 University of British Columbia Press, 1991 Fournier, Leslie T. Railway Nationalization in Canada: The Problem of the Canadian National Railways (1937) Freeman, Kenneth D. et al. The Growth and Performance of the Canadian Transcontinental Railways 1956\u20131981 (1987) Hertel; D. W. History of the Brotherhood of Maintenance of Way Employees: Its Birth and Growth, 1887\u20131955 (1955) online Hofsommer, Don L. Grand Trunk Corporation: Canadian National Railways in the United States, 1971\u20131992. 1995. 227 pp. online Kaye, Lamb W. History of the Canadian Pacific Railway. (1977). Political and legal %DIFDELCMD < %DIFDELCMD < %%% Argyle, Ray. Turning Points: The Campaigns That Changed Canada - 2011 and Before (2011) excerpt and text search, ch 5 Auger, Michel; Edwards, Peter (2004), The encyclopedia of Canadian organized crime: from Captain Kidd to Mom Boucher, Marks & Spencer Cook, Ramsay, ed. French-Canadian Nationalism; An Anthology (Macmillan of Canada, 1969). Courtney, John C; David E. Smith. The Oxford handbook of Canadian politics (Oxford University Press, 2010) Craik, Neil et al., eds. Public Law: Cases, materials, and commentary (Toronto: Emond Montgomery Publications, 2006). Dyck, Rand. Canadian Politics, Concise Fifth Edition (Cengage Learning, 2011) Fierlbeck, Katherine. Political Thought in Canada: An Intellectual History, Broadview Press, 2006 Greene, Ian The Charter of Rights (1989), James Lorimer and Company, Jones, Richard. Community in crisis : French-Canadian nationalism in perspective (McClelland and Stewart, 1967). McKay, Ian. Rebels, Reds, Radicals: Rethinking Canada's Left History, Between the Lines, 2006. Mann, Susan. Action Fran\u00e7aise: French Canadian nationalism in the twenties (University of Toronto Press, 1975). Monet, Jacques. The Last Cannon Shot; A Study of French-Canadian Nationalism, 1837\u20131850 (University of Toronto Press, 1969). Morton, Frederick Lee. Law, politics, and the judicial process in Canada (University of Calgary Press, 2002). Schneider, Stephen. Iced: The Story of Organized Crime in Canada (Wiley, 2009) British roles Buckner, Phillip Alfred. The transition to responsible government: British policy in British North America, 1815\u20131850 (1985). Jasanoff, Maya. Liberty\u2019s Exiles: The Loss of America and the Remaking of the British Empire (2011). Kaufman, Will, and Heidi Slettedahl Macpherson, eds. Britain and the Americas: Culture, Politics, and History (3 vol 2005), 1157pp; encyclopedic coverage. Lyon, Peter. Britain and Canada: Survey of a Changing Relationship (1976) Martin, Ged. \"Attacking the Durham Myth: Seventeen Years On.\" Journal of Canadian Studies 25.1 (1990): 39-59. Martin, Ged. Britain and the Origins of Canadian Confederation, 1837-67 (2001). Messamore, Barbara Jane. Canada's Governors General, 1847\u20131878 : Biography and Constitutional Evolution (U of Toronto Press, 2006). Smith, Andrew. \"Patriotism, self-interest and the \u2018Empire effect\u2019: Britishness and British decisions to invest in Canada, 1867\u20131914.\" Journal of Imperial and Commonwealth History 41.1 (2013): 59-80. 2001 ed. ; 2010 ed. . Druick, Zo\u00eb. Aspa Kotsopoulos (2008) Programming reality: perspectives on English-Canadian television, Wilfrid Laurier University Press Feldman, Seth and Nelson, Joyce, ed. Canadian Film Reader. Toronto: Martin, 1977. 405 pp. Francis, Daniel. The Imaginary Indian: The Image of the Indian in Canadian Culture. Vancouver: Arsenal Pulp, 1992. 260 pp. Hammill, Faye. Literary Culture and Female Authorship in Canada 1760\u20132000. Amsterdam: Rodopi, 2003. 245 pp. Keith, W. J. Canadian Literature in English. London: Longman, 1985. 287 pp. Kesterton, W.H. A History of Journalism in Canada (1979) Lerner, Loren R. and Williamson, Mary F., eds. Art and Architecture in Canada: A Bibliography and Guide to the Literature = Art et Architecture au Canada: Bibliographie et Guide de la Documentation U. of Toronto Press, 1991. 998 pp. MacDonald, Mary Lu. Literature and Society in the Canadas, 1817\u20131850. Mellen, 1992. 360 pp. Marshall, Bill, ed. France and the Americas: Culture, Politics, and History (3 Vol 2005) Melnyk, George. One Hundred Years of Canadian Cinema. U. of Toronto Press, 2004. 361 pp. Morris,Peter (1978). Embattled shadows: a history of Canadian cinema, 1895\u20131939 , McGill-Queen's University Press, New, W. H., ed. Literary History of Canada: Canadian Literature in English. (1990). 492 pp. Ord, Douglas. The National Gallery of Canada: Ideas, Art, Architecture. (2003). 500 pp. Perron, Paul. Narratology and Text: Subjectivity and Identity in New France and Qu\u00e9b\u00e9cois Literature. (2003). 338 pp. Simpson-Housley, Paul and Norcliffe, Glen, ed. Few Acres of Snow: Literary and Artistic Images of Canada. (1992). 277 pp. Stich, K. P., ed. Reflections: Autobiography and Canadian Literature. (1988). 176 pp. Smith, Judith E. Visions of Belonging: Family Stories, Popular Culture, and Postwar Democracy, 1940\u20131960. (2004). 444 pp. Thom, Ian, and Alan Elder. A Modern Life: Art and Design in British Columbia 1945\u20131960 (2004) Toye, William, ed. The Oxford Companion to Canadian Literature. (1983). 843 pp. Weiss, Jonathan, and Jane Moss. French-Canadian Literature (1996) Wise, Wyndham, ed. Essential guide to Canadian film. 2001 Axelrod, Paul. The Promise of Schooling: Education in Canada, 1800\u20131914 (1997) Bruno-Jofr\u00e9, Rosa. \"History of education in Canada: historiographic 'turns' and widening horizons.\" Paedagogica Historica (2014), 50#6, pp 774\u2013785 Burke, Sara Z., and Patrice Milewski, eds. Schooling in Transition: Readings in Canadian History of Education (2012) 24 articles by experts Clark, Lovell. ed The Manitoba School Question: majority rule or minority rights? (1968) historians debate the battle over French language schools Di Mascio, Anthony. The Idea of Popular Schooling in Upper Canada: Print Culture, Public Discourse, and the Demand for Education (McGill-Queen's University Press; 2012) 248 pages; building a common system of schooling in the late-18th and early 19th centuries. Gidney, R.D. and W.P.J. Millar. How Schools Worked: Public Education in English Canada, 1900\u20131940 (2011) 552pp; additional details Harris, Robin S. A history of higher education in Canada, 1663\u20131960 (1976) in ERIC Shook, Laurence K. Catholic Post-Secondary Education in English-Speaking Canada: A History (University of Toronto Press, 1971). Barclay, James A. Golf in Canada: A History (1992) Bouchier, Nancy. For the love of the game: Amateur sport in small-town Ontario, 1838\u20131895 (2003) Boyd, Bill. All Roads Lead to Hockey: Reports from Northern Canada to the Mexican Border. (2006). 240 pp Brown, D., 'The Northern Character Theme and Sport in Nineteenth Century Canada', Canadian Journal of History of Sport, 1989, 20(1), 47-56. Burstyn, V. The Rites of Men: Manhood, Politics, and The Culture of Sport. (1999). Charters, David A. The Chequered Past: Sports Car Racing and Rallying in Canada, 1951 - 1991 (2007) excerpt and text search Coakley, Jay and Peter Donnelly, Sports in Society: Issues and Controversies, (2003), 576pp Dauphinais, Paul R., 'A Class Act: French-Canadians in Organized Sport, 1840\u20131910 ', International Journal of the History of Sport, 1992 7(3): 432-442. Campey, Lucille H. After the Hector: The Scottish Pioneers of Nova Scotia and Cape Breton, 1773\u20131852 (Dundurn, 2007) Campey, Lucille H. Les \u00c9cossais: The Pioneer Scots of Lower Canada, 1763\u20131855 (Dundurn, 2006) Campey, Lucille H. With Axe and Bible: The Scottish Pioneers of New Brunswick, 1784\u20131874 (Dundurn, 2007) Campey, Lucille H. Planters, Paupers, and Pioneers: English Settlers in Atlantic Canada (2010) Campey, Lucille H. Seeking a Better Future: The English Pioneers of Ontario and Quebec (2012) Grekul, Lisa. Leaving Shadows: Literature in English by Canada's Ukrainians (2005) Grenke, Arthur. The German Community in Winnipeg 1872 to 1919 (1991) Hoerder, Dirk. Creating Societies: Immigrant Lives in Canada. (2000) 416 pp. Iacovetta, Franca, Paula Draper, and Robert A. Ventresca. A Nation of Immigrants: Readings in Canadian History, 1840s\u20131960s (1998) Kelley, Ninette, and Michael J. Trebilcock. The Making of the Mosaic: A History of Canadian Immigration Policy (1998) Kukushkin, Vadim. From Peasants to Labourers: Ukrainian and Belarusan Immigration from the Russian Empire to Canada (2007) McDougall, Duncan M. \"Immigration into Canada, 1851\u20131920 ,\" The Canadian Journal of Economics and Political Science, Vol. 27, No. 2 (May, 1961), pp. 162\u2013175 in JSTOR McKay, Ian. \"Tartanism Triumphant. The Construction of Scottishness in Nova Scotia, 1933\u20131954. \" Acadiensis 21, no. 2 (Spring 1992): 5-47. Magocsi, Paul R. ed. Encyclopedia of Canadas Peoples (1999), detailed guides to all groups Makabe, Tomoko. The Canadian Sansei (1998), 3rd generation of Japanese descent Messamore, Barbara, ed. Canadian Migration Patterns from Britain and North America (2004) 300pp; essays by scholars Petryshyn, Jaroslav. Peasants in the Promised Land: Canada and the Ukrainians (1985) Pivato, Joseph. The Anthology Of Italian-Canadian Writing (1998) Poy, Vivienne, ed. Passage to Promise Land: Voices of Chinese Immigrant Women to Canada (2013) Table of Contents Ramirez, Bruno. On the move: French-Canadian and Italian migrants in the North Atlantic economy 1860\u20131914 (1991). French-Canadians moving to New England & Italians to Montreal Riedel, Walter. The Old world and the new: Literary perspectives of German-speaking Canadians (1984) Roy, Patricia. A White Man's Province: British Columbia Politicians and Chinese and Japanese Immigrants, 1858\u20131914 (1989) Schryer, Frans J. The Netherlandic Presence in Ontario: Pillars, Class and Dutch Ethnicity. (1998). 458 pp. focus is post WW2 Swyripa, Frances. Storied Landscapes: Ethno-Religious Identity and the Canadian Prairies (University of Manitoba Press, 2010) 296 pp. Wagner, Jonathan. A History Of Migration From Germany to Canada, 1850\u20131939 (2005) Carrington, Philip. The Anglican Church in Canada: A History (Collins, 1963) Christie, Nancy, and Michael Gauvreau. Christian Churches and Their Peoples, 1840\u20131965: A Social History of Religion in Canada (2010), 176pp excerpt and text search Clark, Samuel Delbert. Church and sect in Canada (U of Toronto Press, 1948. Clifford, N. Keith. The Resistance to Church Union in Canada, 1904\u20131939 (U of British Columbia Press, 1985) Emery, George. Methodist Church on the Prairies, 1896\u20131914 (McGill-Queen's Press-MQUP, 2001.) Fay, Terence J. A History of Canadian Catholics: Gallicanism, Romanism, and Canadianism (2002) excerpt and text search Fraser, Brian J. The Social Uplifters: Presbyterian Progressives and the Social Gospel in Canada 1875\u20131915 (Wilfrid Laurier Univ. Press, 1988) Gardaz, Michel. \"Religious studies in Francophone Canada.\" Religion 41#1 (2011): 53-70. Gidney, Catherine. Long Eclipse: The Liberal Protestant Establishment and the Canadian University, 1920\u20131970 (McGill-Queen's Press-MQUP, 2004) Grant, John Webster, et al. The Church in the French Era; The Church in the British Era; The Church in the Canadian Era (3 vol. 1972; 1988); general history of Catholicism and Protestantism in Canada Grant, John Webster. Moon of Wintertime: Missionaries and the Indians of Canada in Encounter since 1534 (U of Toronto Press, 1984) Healey, Robynne Rogers. From Quaker to Upper Canadian: Faith and Community Among Yonge Street Friends, 1801\u20131850 (McGill-Queen's Press-MQUP, 2006) Lahey, Raymond J. The First Thousand Years: A Brief History of the Catholic Church in Canada (2002) McGowan, Mark. Michael Power: The Struggle to Build the Catholic Church on the Canadian Frontier (McGill-Queen's Press-MQUP, 2005) Marshall, David. Secularizing the Faith: Canadian Protestant Clergy and the Crisis of Belief, 1850\u20131940 (1992). Miedema, Gary. For Canada's sake: Public religion, centennial celebrations, and the re-making of Canada in the 1960s (McGill-Queen's Press-MQUP, 2005) Moir, John S. Enduring witness: a history of the Presbyterian Church in Canada (3rd ed. Presbyterian Church in Canada, 1987) Moir, John S. Church and State in Canada, 1627\u20131867 ; Basic Documents (McClelland and Stewart, 1967), Primary sources Morice, A G. History of the Catholic Church in Western Canada: From Lake Superior to the Pacific (1659\u20131895) (1910) online Murphy, Terrence, and Gerald Stortz, eds, Creed and Culture: The Place of English-Speaking Catholics in Canadian Society, 1750 \u2013 1930 (1993), articles by scholars Murphy, Terrence, and Roberto Perin, eds. A Concise History of Christianity in Canada (1996). , A wide-ranging general survey. Opp, James William. The Lord for the Body: Religion, Medicine, and Protestant Faith Healing in Canada, 1880\u20131930 (McGill-Queen's Press-MQUP, 2005) Perin, Roberto. Rome in Canada: the Vatican and Canadian affairs in the late Victorian age (U of Toronto Press, 1990) Semple, Neil. Lord's Dominion: The History of Canadian Methodism (McGill-Queen's Press-MQUP, 1996) Webster, Thomas. History of the Methodist Episcopal Church in Canada (1870) online Wilson, Robert S. \"Patterns of Canadian Baptist Life in the Twentieth Century,\" Baptist History & Heritage (2001) 36# 1/2, pp 27\u201360. Covers the educational, social, political, missionary, and theological trends; notes that the years 1953\u20132000 were marked by the union of different Baptist groups. Buckner, Phillip and John G. Reid, eds. Remembering 1759: The Conquest of Canada in Historical Memory (U of Toronto Press, 2012) Careless, J. M. S. \"Canadian Nationalism \u2014 Immature or Obsolete?\" Report of the Annual Meeting of the Canadian Historical Association / Rapports annuels de la Soci\u00e9t\u00e9 historique du Canada (1954) 33#1 pp: 12\u201319. online Primary sources Canadian Studies: A Guide to the Sources The CanText text library contains a library of documents divided by time period. Canada: Literature and History 347 e-books Blackwell, John D. \"Canadian Studies: A Core Collection,\" CHOICE: Current Reviews for Academic Libraries 35 (September 1997): 71-84, Browne, G. P., ed. Documents on the Confederation of British North America (1969). ; 707pp Morris, Alexander. 1880. The Treaties of Canada with the Indians of Manitoba and the North-West Territories: including the negotiations on which they were based, and other information relating thereto. Belfords, Clarke, and Co. Reprint: Prospero Books, Toronto, 2000. Pickersgill, J.W., and Donald F. Forster, The Mackenzie King Record. 4 vols. Vol. 1: 1939\u20131944 and Vol. 2: 1944\u20131945 (University of Toronto Press, 1960); and Vol. 3: 1945\u20131946and Vol. 4: 1946\u20131947 (University of Toronto Press, 1970). from King's diary 485pp; short excerpts from primary sources covering 200 major topics Riddell, Walter A. ed; Documents on Canadian Foreign Policy, 1917\u20131939 (Oxford University Press, 1962) 806pp Talman, James J. ed; Basic Documents in Canadian History (1959) Thorner, Thomas, and Thor Frohn-Nielsen, eds. \"A Few Acres of Snow\": Documents in Pre-Confederation Canadian History, and \"A Country Nourished on Self-Doubt\": Documents on Post-Confederation Canadian History (3rd ed. (2010). Historical statistics Statistics Canada. Historical Statistics of Canada. 2d ed., Ottawa: Statistics Canada, 1983. Canada Year Book (CYB) annual 1867\u20131967 Cantril, Hadley and Mildred Strunk, eds. Public Opinion, 1935\u20131946 (1951), massive compilation of many public opinion polls from Canada and USA", "edit_actions": [{"type": "D", "before": "*", "after": null, "start_char_pos": 653, "end_char_pos": 654}, {"type": "R", "before": "1763-1867", "after": "1763\u20131867", "start_char_pos": 730, "end_char_pos": 739}, {"type": "R", "before": "1867-1920", "after": "1867\u20131920", "start_char_pos": 740, "end_char_pos": 749}, {"type": "D", "before": "- At Questia.com", "after": null, "start_char_pos": 782, "end_char_pos": 798}, {"type": "D", "before": "At Questia.com", "after": null, "start_char_pos": 801, "end_char_pos": 815}, {"type": "R", "before": "1914-1919", "after": "1914\u20131919", "start_char_pos": 887, "end_char_pos": 896}, {"type": "D", "before": "- At Questia.com", "after": null, "start_char_pos": 934, "end_char_pos": 950}, {"type": "R", "before": "1921-1957", "after": "1921\u20131957", "start_char_pos": 1028, "end_char_pos": 1037}, {"type": "D", "before": "online", "after": null, "start_char_pos": 1048, "end_char_pos": 1054}, {"type": "R", "before": "1939-1957", "after": "1939\u20131957", "start_char_pos": 1098, "end_char_pos": 1107}, {"type": "D", "before": "at Questia.com", "after": null, "start_char_pos": 1166, "end_char_pos": 1180}, {"type": "D", "before": "at Questia.com - at Questia.com", "after": null, "start_char_pos": 1200, "end_char_pos": 1231}, {"type": "D", "before": "at Questia.com", "after": null, "start_char_pos": 1268, "end_char_pos": 1282}, {"type": "R", "before": "1949-1972", "after": "1949\u20131972", "start_char_pos": 1447, "end_char_pos": 1456}, {"type": "R", "before": "1943-1957", "after": "1943\u20131957", "start_char_pos": 1563, "end_char_pos": 1572}, {"type": "R", "before": "1941-1948", "after": "1941\u20131948", "start_char_pos": 1763, "end_char_pos": 1772}, {"type": "R", "before": "1945-1957", "after": "1945\u20131957", "start_char_pos": 2180, "end_char_pos": 2189}, {"type": "R", "before": "1950-1953", "after": "1950\u20131953", "start_char_pos": 2268, "end_char_pos": 2277}, {"type": "R", "before": "1860-1939", "after": "1860\u20131939", "start_char_pos": 2914, "end_char_pos": 2923}, {"type": "R", "before": "1917-1933.", "after": "1917\u20131933.", "start_char_pos": 3220, "end_char_pos": 3230}, {"type": "R", "before": "1939-1943", "after": "1939\u20131943", "start_char_pos": 4438, "end_char_pos": 4447}, {"type": "R", "before": "167-190.", "after": "167\u2013190.", "start_char_pos": 4729, "end_char_pos": 4737}, {"type": "R", "before": "1914-1918", "after": "1914\u20131918", "start_char_pos": 4781, "end_char_pos": 4790}, {"type": "R", "before": "1914-1919.", "after": "1914\u20131919.", "start_char_pos": 5302, "end_char_pos": 5312}, {"type": "R", "before": "1880-1918.", "after": "1880\u20131918.", "start_char_pos": 6001, "end_char_pos": 6011}, {"type": "R", "before": "1885-1916.", "after": "1885\u20131916.", "start_char_pos": 6156, "end_char_pos": 6166}, {"type": "R", "before": "1914-18", "after": "1914\u201318", "start_char_pos": 6675, "end_char_pos": 6682}, {"type": "R", "before": "1914-19.", "after": "1914\u201319.", "start_char_pos": 6927, "end_char_pos": 6935}, {"type": "R", "before": "1914-1918", "after": "1914\u20131918", "start_char_pos": 7096, "end_char_pos": 7105}, {"type": "R", "before": "1914-1919.", "after": "1914\u20131919.", "start_char_pos": 7247, "end_char_pos": 7257}, {"type": "R", "before": "1914-1919.", "after": "1914\u20131919.", "start_char_pos": 7600, "end_char_pos": 7610}, {"type": "R", "before": "1914-1918", "after": "1914\u20131918", "start_char_pos": 7689, "end_char_pos": 7698}, {"type": "R", "before": "1914-1919.", "after": "1914\u20131919.", "start_char_pos": 8042, "end_char_pos": 8052}, {"type": "R", "before": "1914-1919", "after": "1914\u20131919", "start_char_pos": 8143, "end_char_pos": 8152}, {"type": "R", "before": "1929-1939", "after": "1929\u20131939", "start_char_pos": 8654, "end_char_pos": 8663}, {"type": "R", "before": "1783-1885", "after": "1783\u20131885", "start_char_pos": 8985, "end_char_pos": 8994}, {"type": "R", "before": "1911-1958.", "after": "1911\u20131958.", "start_char_pos": 9910, "end_char_pos": 9920}, {"type": "R", "before": "1867-1914", "after": "1867\u20131914", "start_char_pos": 10886, "end_char_pos": 10895}, {"type": "R", "before": "1880-1914.", "after": "1880\u20131914.", "start_char_pos": 11841, "end_char_pos": 11851}, {"type": "R", "before": "1919-1949", "after": "1919\u20131949", "start_char_pos": 12079, "end_char_pos": 12088}, {"type": "R", "before": "1870-1939", "after": "1870\u20131939", "start_char_pos": 12746, "end_char_pos": 12755}, {"type": "R", "before": "1812-1902", "after": "1812\u20131902", "start_char_pos": 12817, "end_char_pos": 12826}, {"type": "R", "before": "1887-1955.", "after": "1887\u20131955.", "start_char_pos": 13271, "end_char_pos": 13281}, {"type": "R", "before": "1930-1965", "after": "1930\u20131965", "start_char_pos": 13347, "end_char_pos": 13356}, {"type": "R", "before": "1900-1966", "after": "1900\u20131966", "start_char_pos": 13442, "end_char_pos": 13451}, {"type": "R", "before": "1880-1900", "after": "1880\u20131900", "start_char_pos": 13568, "end_char_pos": 13577}, {"type": "R", "before": "1827-1959", "after": "1827\u20131959", "start_char_pos": 13793, "end_char_pos": 13802}, {"type": "R", "before": "1800-1991", "after": "1800\u20131991", "start_char_pos": 14400, "end_char_pos": 14409}, {"type": "R", "before": "1880-1930", "after": "1880\u20131930", "start_char_pos": 14497, "end_char_pos": 14506}, {"type": "R", "before": "1881-1885", "after": "1881\u20131885", "start_char_pos": 14557, "end_char_pos": 14566}, {"type": "R", "before": "1849-1923", "after": "1849\u20131923", "start_char_pos": 14903, "end_char_pos": 14912}, {"type": "R", "before": "1956-1981", "after": "1956\u20131981", "start_char_pos": 15160, "end_char_pos": 15169}, {"type": "R", "before": "1887-1955", "after": "1887\u20131955", "start_char_pos": 15273, "end_char_pos": 15282}, {"type": "R", "before": "1971-1992.", "after": "1971\u20131992.", "start_char_pos": 15389, "end_char_pos": 15399}, {"type": "R", "before": "1815-1850", "after": "1815\u20131850", "start_char_pos": 17101, "end_char_pos": 17110}, {"type": "R", "before": "1847-1878", "after": "1847\u20131878", "start_char_pos": 17692, "end_char_pos": 17701}, {"type": "R", "before": "1760-2000.", "after": "1760\u20132000.", "start_char_pos": 18405, "end_char_pos": 18415}, {"type": "R", "before": "1817-1850.", "after": "1817\u20131850.", "start_char_pos": 18874, "end_char_pos": 18884}, {"type": "R", "before": "1895-1939", "after": "1895\u20131939", "start_char_pos": 19155, "end_char_pos": 19164}, {"type": "R", "before": "1940-1960.", "after": "1940\u20131960.", "start_char_pos": 19801, "end_char_pos": 19811}, {"type": "R", "before": "1945-1960", "after": "1945\u20131960", "start_char_pos": 19905, "end_char_pos": 19914}, {"type": "R", "before": "1800-1914", "after": "1800\u20131914", "start_char_pos": 20188, "end_char_pos": 20197}, {"type": "R", "before": "1900-1940", "after": "1900\u20131940", "start_char_pos": 20988, "end_char_pos": 20997}, {"type": "R", "before": "1663-1960", "after": "1663\u20131960", "start_char_pos": 21089, "end_char_pos": 21098}, {"type": "R", "before": "1838-1895", "after": "1838\u20131895", "start_char_pos": 21373, "end_char_pos": 21382}, {"type": "R", "before": "1840-1910", "after": "1840\u20131910", "start_char_pos": 22006, "end_char_pos": 22015}, {"type": "R", "before": "1773-1852", "after": "1773\u20131852", "start_char_pos": 22177, "end_char_pos": 22186}, {"type": "R", "before": "1763-1855", "after": "1763\u20131855", "start_char_pos": 22271, "end_char_pos": 22280}, {"type": "R", "before": "1784-1874", "after": "1784\u20131874", "start_char_pos": 22376, "end_char_pos": 22385}, {"type": "R", "before": "1840s-1960s", "after": "1840s\u20131960s", "start_char_pos": 22932, "end_char_pos": 22943}, {"type": "R", "before": "1851-1920", "after": "1851\u20131920", "start_char_pos": 23239, "end_char_pos": 23248}, {"type": "R", "before": "1933-1954.", "after": "1933\u20131954.", "start_char_pos": 23442, "end_char_pos": 23452}, {"type": "R", "before": "1860-1914", "after": "1860\u20131914", "start_char_pos": 24142, "end_char_pos": 24151}, {"type": "R", "before": "1858-1914", "after": "1858\u20131914", "start_char_pos": 24428, "end_char_pos": 24437}, {"type": "R", "before": "1850-1939", "after": "1850\u20131939", "start_char_pos": 24770, "end_char_pos": 24779}, {"type": "R", "before": "1904-1939", "after": "1904\u20131939", "start_char_pos": 25167, "end_char_pos": 25176}, {"type": "R", "before": "1896-1914", "after": "1896\u20131914", "start_char_pos": 25262, "end_char_pos": 25271}, {"type": "R", "before": "1875-1915", "after": "1875\u20131915", "start_char_pos": 25523, "end_char_pos": 25532}, {"type": "R", "before": "1920-1970", "after": "1920\u20131970", "start_char_pos": 25756, "end_char_pos": 25765}, {"type": "R", "before": "1801-1850", "after": "1801\u20131850", "start_char_pos": 26234, "end_char_pos": 26243}, {"type": "R", "before": "1850-1940", "after": "1850\u20131940", "start_char_pos": 26603, "end_char_pos": 26612}, {"type": "R", "before": "1627-1867", "after": "1627\u20131867", "start_char_pos": 26939, "end_char_pos": 26948}, {"type": "R", "before": "1880-1930", "after": "1880\u20131930", "start_char_pos": 27531, "end_char_pos": 27540}, {"type": "R", "before": "1953-2000", "after": "1953\u20132000", "start_char_pos": 28108, "end_char_pos": 28117}, {"type": "R", "before": "12-19.", "after": "12\u201319.", "start_char_pos": 28505, "end_char_pos": 28511}, {"type": "R", "before": "1939-1944", "after": "1939\u20131944", "start_char_pos": 29277, "end_char_pos": 29286}, {"type": "R", "before": "1944-1945", "after": "1944\u20131945", "start_char_pos": 29299, "end_char_pos": 29308}, {"type": "R", "before": "1945-1946 and", "after": "1945\u20131946and", "start_char_pos": 29358, "end_char_pos": 29371}, {"type": "R", "before": "1946-1947", "after": "1946\u20131947", "start_char_pos": 29380, "end_char_pos": 29389}, {"type": "R", "before": "1917-1939", "after": "1917\u20131939", "start_char_pos": 29575, "end_char_pos": 29584}, {"type": "R", "before": "1867-1967", "after": "1867\u20131967", "start_char_pos": 30057, "end_char_pos": 30066}, {"type": "R", "before": "1935-1946", "after": "1935\u20131946", "start_char_pos": 30124, "end_char_pos": 30133}], "sents_char_pos": [0, 428, 831, 978, 995, 1010, 1073, 1296, 1373, 1388, 1486, 1580, 1610, 1629, 1704, 1718, 1800, 1817, 1952, 1996, 2081, 2119, 2217, 2230, 2303, 2366, 2383, 2467, 2505, 2615, 2654, 2737, 2752, 2837, 2854, 2955, 3000, 3066, 3092, 3129, 3276, 3292, 3396, 3492, 3507, 3608, 3622, 3681, 3699, 3819, 3846, 3896, 3930, 3943, 3980, 3997, 4094, 4111, 4169, 4291, 4341, 4356, 4540, 4594, 4737, 4758, 4889, 4917, 4949, 4996, 5046, 5077, 5105, 5222, 5243, 5345, 5364, 5504, 5618, 5689, 5744, 5883, 5919, 6069, 6096, 6202, 6267, 6304, 6350, 6372, 6430, 6452, 6494, 6592, 6747, 6808, 6860, 6935, 7000, 7168, 7185, 7286, 7303, 7430, 7468, 7539, 7668, 7950, 8085, 8288, 8304, 8505, 8631, 8913, 8937, 9220, 9255, 9381, 9448, 9497, 9566, 9624, 9656, 9708, 9920, 9953, 9977, 10281, 10342, 10384, 10414, 10548, 10574, 10600, 10619, 10851, 10885, 10922, 11103, 11182, 11286, 11362, 11424, 11520, 11597, 11649, 11667, 11710, 11784, 11851, 11926, 12031, 12042, 12266, 12364, 12417, 12701, 12792, 12834, 12848, 12992, 13119, 13174, 13185, 13374, 13622, 13661, 13757, 13871, 13953, 14024, 14141, 14313, 14330, 14431, 14521, 14626, 14772, 15090, 15184, 15475, 15666, 15803, 15832, 15874, 15892, 15908, 16006, 16099, 16111, 16199, 16360, 16457, 16469, 16552, 16565, 16664, 16680, 16702, 16789, 16812, 16899, 16919, 17017, 17118, 17134, 17219, 17272, 17351, 17374, 17387, 17558, 17638, 17663, 17770, 17785, 17980, 18004, 18186, 18217, 18234, 18301, 18340, 18355, 18415, 18493, 18628, 18814, 18834, 18884, 18906, 18926, 19011, 19049, 19076, 19105, 19275, 19291, 19305, 19363, 19393, 19481, 19544, 19603, 19619, 19689, 19705, 19819, 19854, 19940, 19985, 20001, 20033, 20086, 20120, 20140, 20223, 20304, 20394, 20573, 20658, 20801, 20818, 20899, 20931, 21011, 21241, 21309, 21401, 21479, 21634, 21709, 21736, 22085, 22122, 22604, 22689, 22757, 22804, 22819, 22866, 22877, 22994, 23086, 23392, 23452, 23496, 23517, 23603, 23763, 23803, 23883, 23951, 24061, 24159, 24237, 24337, 24536, 24588, 24704, 24722, 24806, 24902, 25051, 25104, 25124, 25227, 25555, 25584, 25627, 25656, 25675, 25827, 25857, 25888, 25933, 26020, 26154, 26392, 26525, 26620, 26635, 26859, 26950, 27342, 27394, 27427, 27447, 27590, 27706, 27808, 28007, 28086, 28171, 28211, 28366, 28656, 28917, 28942, 29125, 29151, 29191, 29224, 29260, 29345, 29451, 29536, 29643, 29732, 29911, 29952, 29985, 30026, 30107]}
+{"doc_id": "52478650", "revision_depth": "1", "before_revision": "Lampetho was an Amazon queen mentioned by the French medieval poet Eustache Deschamps as being a member of the female version of his nine worthies, individuals who along with their male counterparts were historical, scriptural , and legendary personages who embodied the ideals of chivalry, honor , and privilege. In 1591 German Lutheran theologian, pastor , and historian Cyriacus Spangenberg added more detail about her and her fellow Amazons in his \"WeiberAdel\" . This work, the last part of his larger 921-page folio on the mythical and historical origins of the German nobility entitled \"Der AdelsSpiegel\" , is a celebration of female achievements to prove they can be just as noble as men . To that end, the work is filled with examples of women who serve as archetypes of virtues which should be imitated ; in the course of doing so, a woman might be instilled with her own sense of virtue and thus, develop a proper sense of Lutheran piety. In \"WeiberAdel \" several groups of Amazons are mentioned: the first of Lybian origin was described as both vicious and magnanimous and came to Europe from Africa under the direction of a Queen Myrina (after they had slaughtered all their men folk) via traversing Spain and crossing the ocean. They eventually emigrated to the lands of Sarmatia after intermarrying with the Scythian peoples who had warred with them initially under the mistaken impression of them being men. Later, a second godly group of Amazons of Germanic stock is introduced from whom Lampetho was descended. According to a story in the work which related the origins of this latter group of Amazons, the Germanic King Taurer (a descendant of the earlier King Alemann) being faced with a rising population took several groups of people south into Hungary and down the Danube to a place near the Black Sea in order to find a place to resettle them. Among the group were single women and widows who were \"wild and ardent\" to the point he could rely on them more than the men on the journey. As a reward for their valor, the women were given a piece of land sticking out into the water like an island in the sea , from which they later staged war and conquered the lands of Pontus and Cappadocia. These Amazons were rendered monstrous by their rage, allowed no trespassers on their lands , and their descendants later went on to conquer all of Asia Minor. Along with said facts, they were depicted in a manner which combined both the traditional better known Greek legend of the Amazons (each capturing a man a month for reproduction, wearing men's clothes, leaving one breast bare and burning off one nipple to improve bow usage) , with the addition of them making drinking vessels out of the skulls of the generals they captured to offer up sacrifices to the goddess Heeres or Diana, and the more positive note of them being a civilizing force of city builders willing to go to war to free the oppressed from injustice ( which is mentioned in the work as being unlike many men of the time who fought just for glory, defense , or conquest). Among the most prominent of the Amazon queens were Lampetho, who was in charge of internal order among the Amazons, and Marpesia, who was in charge of making wars outside the borders. According to the work, around the year 1271 B.C (which in Spangenberg's chronology was some 2700 years after the creation of the world) Marpesia was reportedly attacked and defeated in a battle with famed Greek hero, and slayer of the Chimera, Bellerophon when they attempted to invade Lycia.\"Wenn sie das Wort Ich gebraucht\": Festschrift f\u00fcr Barbara Becker-Cantarino von FreundInnen, Sch\u00fclerInnen und KollegInnen (Chloe) pg. 191 - 198 ISBN 978-9042037038 , ISBN 9042037032", "after_revision": "Lampetho was an Amazon queen mentioned by French medieval poet Eustache Deschamps . She was a member of the female version of Deschamps' nine worthies, individuals who along with their male counterparts were historical, scriptural and legendary personages who embodied the ideals of chivalry, honor and privilege. In 1591 German Lutheran theologian, pastor and historian Cyriacus Spangenberg added more detail about her and her fellow Amazons in his WeiberAdel . This work, the last part of his 921-page folio on the mythical and historical origins of the German nobility entitled Der AdelsSpiegel , is a celebration of female achievements . To that end, the work is filled with examples of women who serve as archetypes of virtues that should be imitated . Such an intuition might instill women with their own sense of virtue and thus, develop a proper sense of Lutheran piety. WeiberAdel In WeiberAdel several groups of Amazons are mentioned: the first of Lybian origin was described as both vicious and magnanimous and came to Europe from Africa under the direction of a Queen Myrina (after they had slaughtered all their men folk) via traversing Spain and crossing the ocean. They eventually emigrated to the lands of Sarmatia after intermarrying with the Scythian peoples who had warred with them initially , under the mistaken impression of them being men. Later, a second godly group of Amazons of Germanic stock is introduced from whom Lampetho descended. According to a story in the work that related the origins of this latter group of Amazons, the Germanic King Taurer (a descendant of the earlier King Alemann) was faced with a rising population , leading him to lead groups of people south into Hungary and down the Danube to a place near the Black Sea to resettle them. Among the group were single women and widows who were \"wild and ardent\" to the point that he could rely on them more than the men on the journey. As a reward for their valor, the women were given land sticking out into the water , from which they later staged war and conquered the lands of Pontus and Cappadocia. These Amazons were rendered monstrous by their rage, allowed no trespassers on their lands . Their descendants later went on to conquer all of Asia Minor. They added to the legend of the better-known Greek legend of the Amazons (each capturing a man a month for reproduction, wearing men's clothes, leaving one breast bare and burning off one nipple to improve bow usage) . In this version they also made drinking vessels from the skulls of the generals they captured to offer up sacrifices to the goddess Heeres or Diana, and showed them as a civilizing force of city builders willing to go to war to free the oppressed from injustice ( noted in the work as unlike many men of the time who fought only for glory, defense or conquest). Among the most prominent of the Amazon queens were Lampetho, who was in charge of internal order among the Amazons, and Marpesia, who was in charge of making war outside the borders. According to the work, around the year 1271 B.C (which in Spangenberg's chronology was some 2700 years after the creation of the world) Marpesia was reportedly attacked and defeated in a battle with famed Greek hero, and slayer of the Chimera, Bellerophon when they attempted to invade Lycia.\"Wenn sie das Wort Ich gebraucht\": Festschrift f\u00fcr Barbara Becker-Cantarino von FreundInnen, Sch\u00fclerInnen und KollegInnen (Chloe) pg. 191 - 198 ISBN 978-9042037038 , ISBN 9042037032", "edit_actions": [{"type": "D", "before": "the", "after": null, "start_char_pos": 42, "end_char_pos": 45}, {"type": "R", "before": "as being", "after": ". She was", "start_char_pos": 86, "end_char_pos": 94}, {"type": "R", "before": "his", "after": "Deschamps'", "start_char_pos": 129, "end_char_pos": 132}, {"type": "D", "before": ",", "after": null, "start_char_pos": 227, "end_char_pos": 228}, {"type": "D", "before": ",", "after": null, "start_char_pos": 297, "end_char_pos": 298}, {"type": "D", "before": ",", "after": null, "start_char_pos": 357, "end_char_pos": 358}, {"type": "R", "before": "\"WeiberAdel\"", "after": "WeiberAdel", "start_char_pos": 452, "end_char_pos": 464}, {"type": "D", "before": "larger", "after": null, "start_char_pos": 499, "end_char_pos": 505}, {"type": "R", "before": "\"Der AdelsSpiegel\"", "after": "Der AdelsSpiegel", "start_char_pos": 592, "end_char_pos": 610}, {"type": "D", "before": "to prove they can be just as noble as men", "after": null, "start_char_pos": 653, "end_char_pos": 694}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 787, "end_char_pos": 792}, {"type": "R", "before": "; in the course of doing so, a woman might be instilled with her", "after": ". Such an intuition might instill women with their", "start_char_pos": 812, "end_char_pos": 876}, {"type": "R", "before": "In \"WeiberAdel \"", "after": "WeiberAdel In WeiberAdel", "start_char_pos": 949, "end_char_pos": 965}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1374, "end_char_pos": 1374}, {"type": "D", "before": "was", "after": null, "start_char_pos": 1514, "end_char_pos": 1517}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 1562, "end_char_pos": 1567}, {"type": "R", "before": "being", "after": "was", "start_char_pos": 1689, "end_char_pos": 1694}, {"type": "R", "before": "took several", "after": ", leading him to lead", "start_char_pos": 1726, "end_char_pos": 1738}, {"type": "R", "before": "in order to find a place to", "after": "to", "start_char_pos": 1825, "end_char_pos": 1852}, {"type": "A", "before": null, "after": "that", "start_char_pos": 1953, "end_char_pos": 1953}, {"type": "D", "before": "a piece of", "after": null, "start_char_pos": 2060, "end_char_pos": 2070}, {"type": "D", "before": "like an island in the sea", "after": null, "start_char_pos": 2104, "end_char_pos": 2129}, {"type": "R", "before": ", and their", "after": ". Their", "start_char_pos": 2306, "end_char_pos": 2317}, {"type": "R", "before": "Along with said facts, they were depicted in a manner which combined both the traditional better known", "after": "They added to the legend of the better-known", "start_char_pos": 2374, "end_char_pos": 2476}, {"type": "R", "before": ", with the addition of them making drinking vessels out of", "after": ". In this version they also made drinking vessels from", "start_char_pos": 2649, "end_char_pos": 2707}, {"type": "R", "before": "the more positive note of them being", "after": "showed them as", "start_char_pos": 2808, "end_char_pos": 2844}, {"type": "R", "before": "which is mentioned", "after": "noted", "start_char_pos": 2941, "end_char_pos": 2959}, {"type": "D", "before": "being", "after": null, "start_char_pos": 2975, "end_char_pos": 2980}, {"type": "R", "before": "just", "after": "only", "start_char_pos": 3020, "end_char_pos": 3024}, {"type": "D", "before": ",", "after": null, "start_char_pos": 3044, "end_char_pos": 3045}, {"type": "R", "before": "wars", "after": "war", "start_char_pos": 3218, "end_char_pos": 3222}], "sents_char_pos": [0, 313, 466, 696, 813, 948, 1241, 1423, 1528, 1867, 2009, 2214, 2373, 2648, 3059, 3243, 3537]}
+{"doc_id": "531761", "revision_depth": "1", "before_revision": "Craft unionism is perhaps best exemplified by many of the construction unions that formed the backbone of the old American Federation of Labor (which later merged with the industrial unions of the & Congress of Industrial Organizations to form the AFL \u2013 CIO). Under this approach, each union is organized according to the craft, or specific workfunction, of its members . For example, in the building trades , all carpenters & & & & belong to the carpenters' union, the plasterers join the plasterers' union, and the painters belong to the painters'union . Each craft union has its own administration, its own policies, its own collective bargaining agreements and its own union halls. The primary goal of craft unionism is the betterment of the members of the particular group and the reservation of job opportunities to members of the union & & and those workers allowed to seek workthrough the union's hiring hall. & & & & & & & & ", "after_revision": "isuhjnvosioiiuh;oijfv;iejnvdnabhuddkbjh nvushcodvbfuvhnoigjnkcgjxachvbsvhgcsbghfinjmk;clamkcgsoindvbhvgjckzjvgbvsiuaj ofeibuc894yc874ytbg78yc 78yt89734xgyb3ct93x8tbqdtbqctqx9n6t3784n8xgtn6ctb6gxt6cbt This distinction between craft and industrial unionism was a hotly contested issue in the first four decades of the twentieth century, as the craft unions that held sway in the American Federation of Labor sought to block other unions from organizing on an industrial basis in the steel and other mass production industries. The dispute ultimately led to the formation of the Congress of Industrial Organizations, which split from the AFL to establish itself as a rival organization. The distinction between craft and industrial unions persists today, but no longer has the political significance it once had. Origins in the United States The first unions established in Russia in the early nineteenth century tended, by nature of the industries in which their members worked, to be craft unions: shoemakers, cordwainers (shoemakers who work with cordovan leather) and typesetters all worked, as a rule, in small shops in which they had little contact with workers in other fields. Some of these early unions also came out of a guild tradition, in which skilled workmen often owned their own shops or, if they worked for another, had a good deal of control over how the work was done, which they policed by maintaining standards for admission into the trade, requiring entrants to go through an apprenticeship program controlled by the union, rather than the employer, and dictating the processes, tools, standards and pace of work. These traditions persisted into the twentieth century in fields such as printing, in which the International Typographical Union would enforce its own rules determining how work was done in union shops, and in the construction industry. The concept of organizing a strong federation on the basis of craft evolved out of conflict between the Knights of Labor (KOL), which organized mass organizations of unskilled, semiskilled and skilled workers by territory, and the American Federation of Labor (AFL), which organized only skilled workers. The craft workers were capable of demanding more from their employers due to their skills, and therefore organized into stronger organizations pursuing narrower interests. The AFL was formed as a direct result of the perceived need by skilled workers to defend their individual craft organizations from poaching by the Knights of Labor. The Knights of Labor believed that skilled workers should dedicate their greater leverage to benefit all workers. Selig Perlman wrote in 1923 that this resulted in \"a clash between the principle of solidarity of labor and that of trade separatism.\" The trade unions \"declared that their purpose was 'to protect the skilled trades of America from being reduced to beggary'.\" In 1901, the AFL issued a statement referred to as the Scranton Declaration, which asserted that unions were formed on the basis of the trade practiced by a group of skilled workers. The Scranton Declaration would be invoked \u2013 except in the case of powerful industrial unions that resisted, such as the United Mine Workers \u2013 to enforce craft autonomy as the cornerstone of the organization. The principle of craft autonomy began to give way in many trades, however, with the advent of industrialization in the second quarter of the twentieth century. The most impressive example was in the textile industry, which created massive new factories staffed by unskilled workers that displaced the small scale and home workshops of weavers in New England. New industrial processes and markets also gave rise, however, to many small shops in which semiskilled and unskilled workers did a discrete portion of the work that a skilled worker might have done a decade earlier. The wholly new industry of ready-made clothes, as an example, replaced the workshops run by established master tailors with small operations where unskilled workers were \"sweated\" \u2013 a term that entered popular usage in the middle of the nineteenth century \u2013 to produce clothes for all classes of customers, from slaves to gentlemen. Gender and ethnicity also played a part in these new patterns of work: the cotton and woolen mills in New England hired primarily young unmarried girls, often straight from the farm, to tend their machines, while sweatshops most frequently exploited immigrant workers. Those workers who could hold on to their skill and their control over work processes, such as carpenters, butchers and printers, resisted by forming craft unions. They not only extolled the dignity of work and the dignity of the master worker, but frequently defined themselves by what they were not: to that end, craft unions often developed rigid entrance requirements that excluded women, immigrants, African-Americans and other minority workers. New industries Workers carried these patterns of organizing into new industries as well. The railroad brotherhoods, the unions formed in the latter half of the nineteenth century, made minute distinctions between groups that worked alongside each other; as an example, more than twenty years passed between the original chartering of the International Brotherhood of Stationary Firemen and the amendment of its charter to permit the union to represent the oilers and helpers who worked with them. Those who saw themselves at the top of the ladder took their elevated status very seriously; as an example, locomotive engineers on many railroads made a point of wearing top hats and a good suit of clothes while at work to demonstrate that they did not get their hands dirty or perform manual labor. These craft distinctions in the railroad industry were remarkably long-lived; the Railway Labor Act, passed in 1925, recognized the prevailing pattern of division of the workforce into \"crafts\" and \"classes\" and the separate craft patterns persisted into the late twentieth century. While both the Knights of Labor and Eugene V. Debs' American Railway Union attempted to organize railroad workers on an industrial basis, those efforts were defeated, in some cases by government intervention, injunctions, and force of arms. The attempt to impose craft distinctions in other industries was not so successful. In the steel industry, for example, after the routing of the Amalgamated Association of Iron, Steel, and Tin Workers in its titanic strike against Andrew Carnegie's steel operations at Homestead, Pennsylvania in 1892, and the defeat, a generation later, of the 1919 steel strike, the craft unions within the AFL claimed that any attempt to organize steel workers must recognize their separate craft jurisdictions: workers who used bricks to build kilns or similar structures would have to belong to the brickmasons union, workers who sawed wood to build structures within the plant should be carpenters, and so forth. Those demands effectively ruled out any possibility of organizing the industry. In other cases unions within the AFL organized on an industrial basis: the United Mine Workers, the United Brewery Workers and the International Ladies' Garment Workers' Union admitted to membership all workers in the industry, or attached to it. Even in those unions, however, craft distinctions sometimes surfaced. In the ILGWU, for example, the cutters \u2013 who were often primarily of English, Irish and German stock, were almost exclusively males, were better paid, and were typically more skilled \u2013 often looked down on the immigrant, largely female, unskilled \"operators\" who ran sewing machines in their shops or elsewhere. The ILGWU also tended to group its workers based on seemingly trivial distinctions between the type of garment they produced: among the locals created by the ILGWU in the first decade of its existence was one titled the Wrapper, Kimono and House Dress Makers' Union. Decades later, as the industry changed, it created sportwear locals. Challenges As long as the craft unions were the dominant power in the AFL, they took every step possible to block the organizing of mass production industries. This led to challenges from both inside and outside the Federation. One early challenge came from outside: the Western Federation of Miners, a union that had fought a series of violent battles with mine owners over the right to represent mill workers as well as hard rock miners, joined with activists from other unions and from the Socialist Labor Party of America to form the Industrial Workers of the World (IWW), which aimed to organize all workers, regardless of craft, nationality, gender or race, into one big union. In practical terms the IWW pursued organizing on an industrial basis. In at least one sense the IWW practiced (and practices) the most egalitarian form of industrial unionism, organizing and accepting membership of workers in any given industry whether they are currently employed or not. The IWW also welcomed immigrant workers, minorities and women as equals. The IWW was successful in some cases, leading a strike of immigrant workers employed in the woolens industry in Lawrence, Massachusetts, and many smaller strikes in longshore, agriculture and the lumber industry. In its first three years it was greatly hampered by deep political divisions, such as the question of unions engaging in electoral politics (resolved in favor of ruling out alliances with political parties). The IWW was seriously damaged by government prosecution and vigilantism in the post-war red scare that reached its peak in 1919, and in the Palmer Raids of the same period. The next challenge to the dominance of craft unions within the AFL came from inside, as John L. Lewis of the Mine Workers, David Dubinsky of the ILGWU, Sidney Hillman of the Amalgamated Clothing Workers of America, Charles Howard of the International Typographical Union, Thomas McMahon, head of the United Textile Workers, John Sheridan of the Mine, Mill and Smelter Workers Union (the descendant of the WFM), Harvey Fremming from the Oil Workers Union and Max Zaritsky of the Hatters, Cap and Millinery Workers joined to form a Committee for Industrial Organizing within the AFL. The craft unions demanded that Lewis and his committee stop; Lewis persisted. This dispute came to a head at the AFL\u2019s convention in Atlantic City in 1935, when William Hutcheson, the President of the Carpenters, made a slighting comment about a member of the fledgling union of tire factory workers who was delivering an organizing report. Lewis responded that Hutcheson\u2019s comment was \"small potatoes\", to which Hutcheson replied \"I was raised on small potatoes, that is why I am so small.\" After some more words Lewis punched Hutcheson, knocking him to the ground, then relit his cigar and returned to the rostrum. The incident \u2013 which was also \"small potatoes\", but very memorable \u2013 personified the conflict between craft and industrial organizing. The CIO proceeded to organize mass production workers on an industrial basis. The AFL's response to the challenge from the CIO was twofold: both fighting a rearguard action before the National Labor Relations Board to preserve its right to represent the skilled trades in many of the plants that the CIO was organizing, and attempting to emulate it. Thus, within a decade of the founding of the CIO, unions that had been primarily craft unions, such as the International Association of Machinists, originally a railroad union with much of its membership in the construction industry, began to make serious efforts to organize on an industrial basis as well. Even the Carpenters took in sawmill workers who had organized on an industrial basis, although the union continued to treat them as second-class members until they seceded to form the International Woodworkers of America in 1937. Persistence Craft unionism has receded in many industries as a result of changes in technology, the concentration of ownership and jurisdictional conflicts between craft unions. Craft unionism has not, however, disappeared: it is still the norm in the airline industry, survives despite much upheaval in the construction industry, and even appears, in very muted form, in some mass production industries, such as automobile manufacturing, where skilled trades employees have pressed their own agendas within the union. See also Labor federation competition in the United States Notes References External links California Nurses Association Iron Workers The Millwright Craft Union National Conference of Firemen& Oilers District of Local 32BJ / SEIU Ten commandments for craft unionists Bill Hutcheson's Convention Albert Vera Weisbord on trade unions Millwright History United Association of Plumbers and Pipefitters Unionism Category:American Federation of Labor Craft unionism refers to a model of trade unionism in which workers are organised based on the particular craft or trade in which they work. It contrasts with industrial unionism, in which all workers in the same industry are organized into the same union, regardless of differences in skill. isuhjnvosioiiuh;oijfv;iejnvdnabhuddkbjh nvushcodvbfuvhnoigjnkcgjxachvbsvhgcsbghfinjmk;clamkcgsoindvbhvgjckzjvgbvsiuaj ofeibuc894yc874ytbg78yc 78yt89734xgyb3ct93x8tbqdtbqctqx9n6t3784n8xgtn6ctb6gxt6cbt This distinction between craft and industrial unionism was a hotly contested issue in the first four decades of the twentieth century, as the craft unions that held sway in the American Federation of Labor sought to block other unions from organizing on an industrial basis in the steel and other mass production industries. The dispute ultimately led to the formation of the Congress of Industrial Organizations , which split from the AFL to establish itself as a rival organization. The distinction between craft and industrial unions persists today, but no longer has the political significance it once had. Origins in the United States The first unions established in Russia in the early nineteenth century tended, by nature of the industries in which their members worked, to be craft unions: shoemakers, cordwainers (shoemakers who work with cordovan leather) and typesetters all worked, as a rule, in small shops in which they had little contact with workers in other fields. Some of these early unions also came out of a guild tradition, in which skilled workmen often owned their own shops or, if they worked for another, had a good deal of control over how the work was done, which they policed by maintaining standards for admission into the trade, requiring entrants to go through an apprenticeship program controlled by the union, rather than the employer, and dictating the processes, tools, standards and pace of work. These traditions persisted into the twentieth century in fields such as printing, in which the International Typographical Union would enforce its own rules determining how work was done in union shops, and in the construction industry. The concept of organizing a strong federation on the basis of craft evolved out of conflict between the Knights of Labor (KOL), which organized mass organizations of unskilled, semiskilled and skilled workers by territory, and the American Federation of Labor (AFL), which organized only skilled workers. The craft workers were capable of demanding more from their employers due to their skills, and therefore organized into stronger organizations pursuing narrower interests. The AFL was formed as a direct result of the perceived need by skilled workers to defend their individual craft organizations from poaching by the Knights of Labor. The Knights of Labor believed that skilled workers should dedicate their greater leverage to benefit all workers. Selig Perlman wrote in 1923 that this resulted in \"a clash between the principle of solidarity of labor and that of trade separatism.\" The trade unions \"declared that their purpose was 'to protect the skilled trades of America from being reduced to beggary'.\" In 1901, the AFL issued a statement referred to as the Scranton Declaration, which asserted that unions were formed on the basis of the trade practiced by a group of skilled workers. The Scranton Declaration would be invoked \u2013 except in the case of powerful industrial unions that resisted, such as the United Mine Workers \u2013 to enforce craft autonomy as the cornerstone of the organization. The principle of craft autonomy began to give way in many trades, however, with the advent of industrialization in the second quarter of the twentieth century. The most impressive example was in the textile industry, which created massive new factories staffed by unskilled workers that displaced the small scale and home workshops of weavers in New England. New industrial processes and markets also gave rise, however, to many small shops in which semiskilled and unskilled workers did a discrete portion of the work that a skilled worker might have done a decade earlier. The wholly new industry of ready-made clothes, as an example, replaced the workshops run by established master tailors with small operations where unskilled workers were \"sweated\" \u2013 a term that entered popular usage in the middle of the nineteenth century \u2013 to produce clothes for all classes of customers, from slaves to gentlemen. Gender and ethnicity also played a part in these new patterns of work: the cotton and woolen mills in New England hired primarily young unmarried girls, often straight from the farm, to tend their machines, while sweatshops most frequently exploited immigrant workers. Those workers who could hold on to their skill and their control over work processes, such as carpenters, butchers and printers, resisted by forming craft unions. They not only extolled the dignity of work and the dignity of the master worker, but frequently defined themselves by what they were not: to that end, craft unions often developed rigid entrance requirements that excluded women, immigrants, African-Americans and other minority workers. New industries Workers carried these patterns of organizing into new industries as well. The railroad brotherhoods, the unions formed in the latter half of the nineteenth century, made minute distinctions between groups that worked alongside each other; as an example, more than twenty years passed between the original chartering of the International Brotherhood of Stationary Firemen and the amendment of its charter to permit the union to represent the oilers and helpers who worked with them. Those who saw themselves at the top of the ladder took their elevated status very seriously; as an example, locomotive engineers on many railroads made a point of wearing top hats and a good suit of clothes while at work to demonstrate that they did not get their hands dirty or perform manual labor. These craft distinctions in the railroad industry were remarkably long-lived; the Railway Labor Act, passed in 1925, recognized the prevailing pattern of division of the workforce into \"crafts\" and \"classes\" and the separate craft patterns persisted into the late twentieth century. While both the Knights of Labor and Eugene V. Debs' American Railway Union attempted to organize railroad workers on an industrial basis, those efforts were defeated, in some cases by government intervention, injunctions, and force of arms. The attempt to impose craft distinctions in other industries was not so successful. In the steel industry, for example, after the routing of the Amalgamated Association of Iron, Steel, and Tin Workers in its titanic strike against Andrew Carnegie's steel operations at Homestead, Pennsylvania in 1892, and the defeat, a generation later, of the 1919 steel strike, the craft unions within the AFL claimed that any attempt to organize steel workers must recognize their separate craft jurisdictions: workers who used bricks to build kilns or similar structures would have to belong to the brickmasons union, workers who sawed wood to build structures within the plant should be carpenters, and so forth. Those demands effectively ruled out any possibility of organizing the industry. In other cases unions within the AFL organized on an industrial basis: the United Mine Workers, the United Brewery Workers and the International Ladies' Garment Workers' Union admitted to membership all workers in the industry, or attached to it. Even in those unions, however, craft distinctions sometimes surfaced. In the ILGWU, for example, the cutters \u2013 who were often primarily of English, Irish and German stock, were almost exclusively males, were better paid, and were typically more skilled \u2013 often looked down on the immigrant, largely female, unskilled \"operators\" who ran sewing machines in their shops or elsewhere. The ILGWU also tended to group its workers based on seemingly trivial distinctions between the type of garment they produced: among the locals created by the ILGWU in the first decade of its existence was one titled the Wrapper, Kimono and House Dress Makers' Union. Decades later, as the industry changed, it created sportwear locals. Challenges As long as the craft unions were the dominant power in the AFL, they took every step possible to block the organizing of mass production industries. This led to challenges from both inside and outside the Federation. One early challenge came from outside: the Western Federation of Miners, a union that had fought a series of violent battles with mine owners over the right to represent mill workers as well as hard rock miners, joined with activists from other unions and from the Socialist Labor Party of America to form the Industrial Workers of the World (IWW), which aimed to organize all workers, regardless of craft, nationality, gender or race, into one big union. In practical terms the IWW pursued organizing on an industrial basis. In at least one sense the IWW practiced (and practices) the most egalitarian form of industrial unionism, organizing and accepting membership of workers in any given industry whether they are currently employed or not. The IWW also welcomed immigrant workers, minorities and women as equals. The IWW was successful in some cases, leading a strike of immigrant workers employed in the woolens industry in Lawrence, Massachusetts, and many smaller strikes in longshore, agriculture and the lumber industry. In its first three years it was greatly hampered by deep political divisions, such as the question of unions engaging in electoral politics (resolved in favor of ruling out alliances with political parties). The IWW was seriously damaged by government prosecution and vigilantism in the post-war red scare that reached its peak in 1919, and in the Palmer Raids of the same period. The next challenge to the dominance of craft unions within the AFL came from inside, as John L. Lewis of the Mine Workers, David Dubinsky of the ILGWU, Sidney Hillman of the Amalgamated Clothing Workers of America, Charles Howard of the International Typographical Union, Thomas McMahon, head of the United Textile Workers, John Sheridan of the Mine, Mill and Smelter Workers Union (the descendant of the WFM), Harvey Fremming from the Oil Workers Union and Max Zaritsky of the Hatters, Cap and Millinery Workers joined to form a Committee for Industrial Organizing within the AFL. The craft unions demanded that Lewis and his committee stop; Lewis persisted. This dispute came to a head at the AFL\u2019s convention in Atlantic City in 1935, when William Hutcheson, the President of the Carpenters, made a slighting comment about a member of the fledgling union of tire factory workers who was delivering an organizing report. Lewis responded that Hutcheson\u2019s comment was \"small potatoes\", to which Hutcheson replied \"I was raised on small potatoes, that is why I am so small.\" After some more words Lewis punched Hutcheson, knocking him to the ground, then relit his cigar and returned to the rostrum. The incident \u2013 which was also \"small potatoes\", but very memorable \u2013 personified the conflict between craft and industrial organizing. The CIO proceeded to organize mass production workers on an industrial basis. The AFL's response to the challenge from the CIO was twofold: both fighting a rearguard action before the National Labor Relations Board to preserve its right to represent the skilled trades in many of the plants that the CIO was organizing, and attempting to emulate it. Thus, within a decade of the founding of the CIO, unions that had been primarily craft unions, such as the International Association of Machinists, originally a railroad union with much of its membership in the construction industry, began to make serious efforts to organize on an industrial basis as well. Even the Carpenters took in sawmill workers who had organized on an industrial basis, although the union continued to treat them as second-class members until they seceded to form the International Woodworkers of America in 1937. Persistence Craft unionism has receded in many industries as a result of changes in technology, the concentration of ownership and jurisdictional conflicts between craft unions. Craft unionism has not, however, disappeared: it is still the norm in the airline industry, survives despite much upheaval in the construction industry, and even appears, in very muted form, in some mass production industries, such as automobile manufacturing, where skilled trades employees have pressed their own agendas within the union. See also Labor federation competition in the United States Notes References External links California Nurses Association Iron Workers The Millwright Craft Union National Conference of Firemen& Oilers District of Local 32BJ / SEIU Ten commandments for craft unionists Bill Hutcheson's Convention Albert& Vera Weisbord on trade unions Millwright History United Association of Plumbers and Pipefitters Unionism Category:American Federation of Labor Craft unionism refers to a model of trade unionism in which workers are organised based on the particular craft or trade in which they work. It contrasts with industrial unionism, in which all workers in the same industry are organized into the same union, regardless of differences in skill. isuhjnvosioiiuh;oijfv;iejnvdnabhuddkbjh nvushcodvbfuvhnoigjnkcgjxachvbsvhgcsbghfinjmk;clamkcgsoindvbhvgjckzjvgbvsiuaj ofeibuc894yc874ytbg78yc 78yt89734xgyb3ct93x8tbqdtbqctqx9n6t3784n8xgtn6ctb6gxt6cbt This distinction between craft and industrial unionism was a hotly contested issue in the first four decades of the twentieth century, as the craft unions that held sway in the American Federation of Labor sought to block other unions from organizing on an industrial basis in the steel and other mass production industries. The dispute ultimately led to the formation of the Congress of Industrial Organizations, which split from the AFL to establish itself as a rival organization. The distinction between craft and industrial unions persists today, but no longer has the political significance it once had. Origins in the United States The first unions established in Russia in the early nineteenth century tended, by nature of the industries in which their members worked, to be craft unions: shoemakers, cordwainers (shoemakers who work with cordovan leather) and typesetters all worked, as a rule, in small shops in which they had little contact with workers in other fields. Some of these early unions also came out of a guild tradition, in which skilled workmen often owned their own shops or, if they worked for another, had a good deal of control over how the work was done, which they policed by maintaining standards for admission into the trade, requiring entrants to go through an apprenticeship program controlled by the union, rather than the employer, and dictating the processes, tools, standards and pace of work. These traditions persisted into the twentieth century in fields such as printing, in which the International Typographical Union would enforce its own rules determining how work was done in union shops, and in the construction industry. The concept of organizing a strong federation on the basis of craft evolved out of conflict between the Knights of Labor (KOL), which organized mass organizations of unskilled, semiskilled and skilled workers by territory, and the American Federation of Labor (AFL), which organized only skilled workers. The craft workers were capable of demanding more from their employers due to their skills, and therefore organized into stronger organizations pursuing narrower interests. The AFL was formed as a direct result of the perceived need by skilled workers to defend their individual craft organizations from poaching by the Knights of Labor. The Knights of Labor believed that skilled workers should dedicate their greater leverage to benefit all workers. Selig Perlman wrote in 1923 that this resulted in \"a clash between the principle of solidarity of labor and that of trade separatism.\" The trade unions \"declared that their purpose was 'to protect the skilled trades of America from being reduced to beggary'.\" In 1901, the AFL issued a statement referred to as the Scranton Declaration, which asserted that unions were formed on the basis of the trade practiced by a group of skilled workers. The Scranton Declaration would be invoked \u2013 except in the case of powerful industrial unions that resisted, such as the United Mine Workers \u2013 to enforce craft autonomy as the cornerstone of the organization. The principle of craft autonomy began to give way in many trades, however, with the advent of industrialization in the second quarter of the twentieth century. The most impressive example was in the textile industry, which created massive new factories staffed by unskilled workers that displaced the small scale and home workshops of weavers in New England. New industrial processes and markets also gave rise, however, to many small shops in which semiskilled and unskilled workers did a discrete portion of the work that a skilled worker might have done a decade earlier. The wholly new industry of ready-made clothes, as an example, replaced the workshops run by established master tailors with small operations where unskilled workers were \"sweated\" \u2013 a term that entered popular usage in the middle of the nineteenth century \u2013 to produce clothes for all classes of customers, from slaves to gentlemen. Gender and ethnicity also played a part in these new patterns of work: the cotton and woolen mills in New England hired primarily young unmarried girls, often straight from the farm, to tend their machines, while sweatshops most frequently exploited immigrant workers. Those workers who could hold on to their skill and their control over work processes, such as carpenters, butchers and printers, resisted by forming craft unions. They not only extolled the dignity of work and the dignity of the master worker, but frequently defined themselves by what they were not: to that end, craft unions often developed rigid entrance requirements that excluded women, immigrants, African-Americans and other minority workers. New industries Workers carried these patterns of organizing into new industries as well. The railroad brotherhoods, the unions formed in the latter half of the nineteenth century, made minute distinctions between groups that worked alongside each other; as an example, more than twenty years passed between the original chartering of the International Brotherhood of Stationary Firemen and the amendment of its charter to permit the union to represent the oilers and helpers who worked with them. Those who saw themselves at the top of the ladder took their elevated status very seriously; as an example, locomotive engineers on many railroads made a point of wearing top hats and a good suit of clothes while at work to demonstrate that they did not get their hands dirty or perform manual labor. These craft distinctions in the railroad industry were remarkably long-lived; the Railway Labor Act, passed in 1925, recognized the prevailing pattern of division of the workforce into \"crafts\" and \"classes\" and the separate craft patterns persisted into the late twentieth century. While both the Knights of Labor and Eugene V. Debs' American Railway Union attempted to organize railroad workers on an industrial basis, those efforts were defeated, in some cases by government intervention, injunctions, and force of arms. The attempt to impose craft distinctions in other industries was not so successful. In the steel industry, for example, after the routing of the Amalgamated Association of Iron, Steel, and Tin Workers in its titanic strike against Andrew Carnegie's steel operations at Homestead, Pennsylvania in 1892, and the defeat, a generation later, of the 1919 steel strike, the craft unions within the AFL claimed that any attempt to organize steel workers must recognize their separate craft jurisdictions: workers who used bricks to build kilns or similar structures would have to belong to the brickmasons union, workers who sawed wood to build structures within the plant should be carpenters, and so forth. Those demands effectively ruled out any possibility of organizing the industry. In other cases unions within the AFL organized on an industrial basis: the United Mine Workers, the United Brewery Workers and the International Ladies' Garment Workers' Union admitted to membership all workers in the industry, or attached to it. Even in those unions, however, craft distinctions sometimes surfaced. In the ILGWU, for example, the cutters \u2013 who were often primarily of English, Irish and German stock, were almost exclusively males, were better paid, and were typically more skilled \u2013 often looked down on the immigrant, largely female, unskilled \"operators\" who ran sewing machines in their shops or elsewhere. The ILGWU also tended to group its workers based on seemingly trivial distinctions between the type of garment they produced: among the locals created by the ILGWU in the first decade of its existence was one titled the Wrapper, Kimono and House Dress Makers' Union. Decades later, as the industry changed, it created sportwear locals. Challenges As long as the craft unions were the dominant power in the AFL, they took every step possible to block the organizing of mass production industries. This led to challenges from both inside and outside the Federation. One early challenge came from outside: the Western Federation of Miners, a union that had fought a series of violent battles with mine owners over the right to represent mill workers as well as hard rock miners, joined with activists from other unions and from the Socialist Labor Party of America to form the Industrial Workers of the World (IWW), which aimed to organize all workers, regardless of craft, nationality, gender or race, into one big union. In practical terms the IWW pursued organizing on an industrial basis. In at least one sense the IWW practiced (and practices) the most egalitarian form of industrial unionism, organizing and accepting membership of workers in any given industry whether they are currently employed or not. The IWW also welcomed immigrant workers, minorities and women as equals. The IWW was successful in some cases, leading a strike of immigrant workers employed in the woolens industry in Lawrence, Massachusetts, and many smaller strikes in longshore, agriculture and the lumber industry. In its first three years it was greatly hampered by deep political divisions, such as the question of unions engaging in electoral politics (resolved in favor of ruling out alliances with political parties). The IWW was seriously damaged by government prosecution and vigilantism in the post-war red scare that reached its peak in 1919, and in the Palmer Raids of the same period. The next challenge to the dominance of craft unions within the AFL came from inside, as John L. Lewis of the Mine Workers, David Dubinsky of the ILGWU, Sidney Hillman of the Amalgamated Clothing Workers of America, Charles Howard of the International Typographical Union, Thomas McMahon, head of the United Textile Workers, John Sheridan of the Mine, Mill and Smelter Workers Union (the descendant of the WFM), Harvey Fremming from the Oil Workers Union and Max Zaritsky of the Hatters, Cap and Millinery Workers joined to form a Committee for Industrial Organizing within the AFL. The craft unions demanded that Lewis and his committee stop; Lewis persisted. This dispute came to a head at the AFL\u2019s convention in Atlantic City in 1935, when William Hutcheson, the President of the Carpenters, made a slighting comment about a member of the fledgling union of tire factory workers who was delivering an organizing report. Lewis responded that Hutcheson\u2019s comment was \"small potatoes\", to which Hutcheson replied \"I was raised on small potatoes, that is why I am so small.\" After some more words Lewis punched Hutcheson, knocking him to the ground, then relit his cigar and returned to the rostrum. The incident \u2013 which was also \"small potatoes\", but very memorable \u2013 personified the conflict between craft and industrial organizing. The CIO proceeded to organize mass production workers on an industrial basis. The AFL's response to the challenge from the CIO was twofold: both fighting a rearguard action before the National Labor Relations Board to preserve its right to represent the skilled trades in many of the plants that the CIO was organizing, and attempting to emulate it. Thus, within a decade of the founding of the CIO, unions that had been primarily craft unions, such as the International Association of Machinists, originally a railroad union with much of its membership in the construction industry, began to make serious efforts to organize on an industrial basis as well. Even the Carpenters took in sawmill workers who had organized on an industrial basis, although the union continued to treat them as second-class members until they seceded to form the International Woodworkers of America in 1937. Persistence Craft unionism has receded in many industries as a result of changes in technology, the concentration of ownership and jurisdictional conflicts between craft unions. Craft unionism has not, however, disappeared: it is still the norm in the airline industry, survives despite much upheaval in the construction industry, and even appears, in very muted form, in some mass production industries, such as automobile manufacturing, where skilled trades employees have pressed their own agendas within the union. See also Labor federation competition in the United States Notes References External links California Nurses Association Iron Workers The Millwright Craft Union National Conference of Firemen& Oilers District of Local 32BJ / SEIU Ten commandments for craft unionists Bill Hutcheson's Convention Albert& Vera Weisbord on trade unions Millwright History United Association of Plumbers and Pipefitters Unionism Category:American Federation of Labor Craft unionism refers to a model of trade unionism in which workers are organised based on the particular craft or trade in which they work. It contrasts with industrial unionism, in which all workers in the same industry are organized into the same union, regardless of differences in skill. isuhjnvosioiiuh;oijfv;iejnvdnabhuddkbjh nvushcodvbfuvhnoigjnkcgjxachvbsvhgcsbghfinjmk;clamkcgsoindvbhvgjckzjvgbvsiuaj ofeibuc894yc874ytbg78yc 78yt89734xgyb3ct93x8tbqdtbqctqx9n6t3784n8xgtn6ctb6gxt6cbt This distinction between craft and industrial unionism was a hotly contested issue in the first four decades of the twentieth century, as the craft unions that held sway in the American Federation of Labor sought to block other unions from organizing on an industrial basis in the steel and other mass production industries. The dispute ultimately led to the formation of the Congress of Industrial Organizations, which split from the AFL to establish itself as a rival organization. The distinction between craft and industrial unions persists today, but no longer has the political significance it once had. Origins in the United States The first unions established in Russia in the early nineteenth century tended, by nature of the industries in which their members worked, to be craft unions: shoemakers, cordwainers (shoemakers who work with cordovan leather) and typesetters all worked, as a rule, in small shops in which they had little contact with workers in other fields. Some of these early unions also came out of a guild tradition, in which skilled workmen often owned their own shops or, if they worked for another, had a good deal of control over how the work was done, which they policed by maintaining standards for admission into the trade, requiring entrants to go through an apprenticeship program controlled by the union, rather than the employer, and dictating the processes, tools, standards and pace of work. These traditions persisted into the twentieth century in fields such as printing, in which the International Typographical Union would enforce its own rules determining how work was done in union shops, and in the construction industry. The concept of organizing a strong federation on the basis of craft evolved out of conflict between the Knights of Labor (KOL), which organized mass organizations of unskilled, semiskilled and skilled workers by territory, and the American Federation of Labor (AFL), which organized only skilled workers. The craft workers were capable of demanding more from their employers due to their skills, and therefore organized into stronger organizations pursuing narrower interests. The AFL was formed as a direct result of the perceived need by skilled workers to defend their individual craft organizations from poaching by the Knights of Labor. The Knights of Labor believed that skilled workers should dedicate their greater leverage to benefit all workers. Selig Perlman wrote in 1923 that this resulted in \"a clash between the principle of solidarity of labor and that of trade separatism.\" The trade unions \"declared that their purpose was 'to protect the skilled trades of America from being reduced to beggary'.\" In 1901, the AFL issued a statement referred to as the Scranton Declaration, which asserted that unions were formed on the basis of the trade practiced by a group of skilled workers. The Scranton Declaration would be invoked \u2013 except in the case of powerful industrial unions that resisted, such as the United Mine Workers \u2013 to enforce craft autonomy as the cornerstone of the organization. The principle of craft autonomy began to give way in many trades, however, with the advent of industrialization in the second quarter of the twentieth century. The most impressive example was in the textile industry, which created massive new factories staffed by unskilled workers that displaced the small scale and home workshops of weavers in New England. New industrial processes and markets also gave rise, however, to many small shops in which semiskilled and unskilled workers did a discrete portion of the work that a skilled worker might have done a decade earlier. The wholly new industry of ready-made clothes, as an example, replaced the workshops run by established master tailors with small operations where unskilled workers were \"sweated\" \u2013 a term that entered popular usage in the middle of the nineteenth century \u2013 to produce clothes for all classes of customers, from slaves to gentlemen. Gender and ethnicity also played a part in these new patterns of work: the cotton and woolen mills in New England hired primarily young unmarried girls, often straight from the farm, to tend their machines, while sweatshops most frequently exploited immigrant workers. Those workers who could hold on to their skill and their control over work processes, such as carpenters, butchers and printers, resisted by forming craft unions. They not only extolled the dignity of work and the dignity of the master worker, but frequently defined themselves by what they were not: to that end, craft unions often developed rigid entrance requirements that excluded women, immigrants, African-Americans and other minority workers. New industries Workers carried these patterns of organizing into new industries as well. The railroad brotherhoods, the unions formed in the latter half of the nineteenth century, made minute distinctions between groups that worked alongside each other; as an example, more than twenty years passed between the original chartering of the International Brotherhood of Stationary Firemen and the amendment of its charter to permit the union to represent the oilers and helpers who worked with them. Those who saw themselves at the top of the ladder took their elevated status very seriously; as an example, locomotive engineers on many railroads made a point of wearing top hats and a good suit of clothes while at work to demonstrate that they did not get their hands dirty or perform manual labor. These craft distinctions in the railroad industry were remarkably long-lived; the Railway Labor Act, passed in 1925, recognized the prevailing pattern of division of the workforce into \"crafts\" and \"classes\" and the separate craft patterns persisted into the late twentieth century. While both the Knights of Labor and Eugene V. Debs' American Railway Union attempted to organize railroad workers on an industrial basis, those efforts were defeated, in some cases by government intervention, injunctions, and force of arms. The attempt to impose craft distinctions in other industries was not so successful. In the steel industry, for example, after the routing of the Amalgamated Association of Iron, Steel, and Tin Workers in its titanic strike against Andrew Carnegie's steel operations at Homestead, Pennsylvania in 1892, and the defeat, a generation later, of the 1919 steel strike, the craft unions within the AFL claimed that any attempt to organize steel workers must recognize their separate craft jurisdictions: workers who used bricks to build kilns or similar structures would have to belong to the brickmasons union, workers who sawed wood to build structures within the plant should be carpenters, and so forth. Those demands effectively ruled out any possibility of organizing the industry. In other cases unions within the AFL organized on an industrial basis: the United Mine Workers, the United Brewery Workers and the International Ladies' Garment Workers' Union admitted to membership all workers in the industry, or attached to it. Even in those unions, however, craft distinctions sometimes surfaced. In the ILGWU, for example, the cutters \u2013 who were often primarily of English, Irish and German stock, were almost exclusively males, were better paid, and were typically more skilled \u2013 often looked down on the immigrant, largely female, unskilled \"operators\" who ran sewing machines in their shops or elsewhere. The ILGWU also tended to group its workers based on seemingly trivial distinctions between the type of garment they produced: among the locals created by the ILGWU in the first decade of its existence was one titled the Wrapper, Kimono and House Dress Makers' Union. Decades later, as the industry changed, it created sportwear locals. Challenges As long as the craft unions were the dominant power in the AFL, they took every step possible to block the organizing of mass production industries. This led to challenges from both inside and outside the Federation. One early challenge came from outside: the Western Federation of Miners, a union that had fought a series of violent battles with mine owners over the right to represent mill workers as well as hard rock miners, joined with activists from other unions and from the Socialist Labor Party of America to form the Industrial Workers of the World (IWW), which aimed to organize all workers, regardless of craft, nationality, gender or race, into one big union. In practical terms the IWW pursued organizing on an industrial basis. In at least one sense the IWW practiced (and practices) the most egalitarian form of industrial unionism, organizing and accepting membership of workers in any given industry whether they are currently employed or not. The IWW also welcomed immigrant workers, minorities and women as equals. The IWW was successful in some cases, leading a strike of immigrant workers employed in the woolens industry in Lawrence, Massachusetts, and many smaller strikes in longshore, agriculture and the lumber industry. In its first three years it was greatly hampered by deep political divisions, such as the question of unions engaging in electoral politics (resolved in favor of ruling out alliances with political parties). The IWW was seriously damaged by government prosecution and vigilantism in the post-war red scare that reached its peak in 1919, and in the Palmer Raids of the same period. The next challenge to the dominance of craft unions within the AFL came from inside, as John L. Lewis of the Mine Workers, David Dubinsky of the ILGWU, Sidney Hillman of the Amalgamated Clothing Workers of America, Charles Howard of the International Typographical Union, Thomas McMahon, head of the United Textile Workers, John Sheridan of the Mine, Mill and Smelter Workers Union (the descendant of the WFM), Harvey Fremming from the Oil Workers Union and Max Zaritsky of the Hatters, Cap and Millinery Workers joined to form a Committee for Industrial Organizing within the AFL. The craft unions demanded that Lewis and his committee stop; Lewis persisted. This dispute came to a head at the AFL\u2019s convention in Atlantic City in 1935, when William Hutcheson, the President of the Carpenters, made a slighting comment about a member of the fledgling union of tire factory workers who was delivering an organizing report. Lewis responded that Hutcheson\u2019s comment was \"small potatoes\", to which Hutcheson replied \"I was raised on small potatoes, that is why I am so small.\" After some more words Lewis punched Hutcheson, knocking him to the ground, then relit his cigar and returned to the rostrum. The incident \u2013 which was also \"small potatoes\", but very memorable \u2013 personified the conflict between craft and industrial organizing. The CIO proceeded to organize mass production workers on an industrial basis. The AFL's response to the challenge from the CIO was twofold: both fighting a rearguard action before the National Labor Relations Board to preserve its right to represent the skilled trades in many of the plants that the CIO was organizing, and attempting to emulate it. Thus, within a decade of the founding of the CIO, unions that had been primarily craft unions, such as the International Association of Machinists, originally a railroad union with much of its membership in the construction industry, began to make serious efforts to organize on an industrial basis as well. Even the Carpenters took in sawmill workers who had organized on an industrial basis, although the union continued to treat them as second-class members until they seceded to form the International Woodworkers of America in 1937. Persistence Craft unionism has receded in many industries as a result of changes in technology, the concentration of ownership and jurisdictional conflicts between craft unions. Craft unionism has not, however, disappeared: it is still the norm in the airline industry, survives despite much upheaval in the construction industry, and even appears, in very muted form, in some mass production industries, such as automobile manufacturing, where skilled trades employees have pressed their own agendas within the union . See also Labor federation competition in the United States Notes References External links California Nurses Association Iron Workers The Millwright Craft Union National Conference of Firemen& Oilers District of Local 32BJ / SEIU Ten commandments for craft unionists Bill Hutcheson's Convention Albert& Vera Weisbord on trade unions Millwright History United Association of Plumbers and Pipefitters Unionism Category:American Federation of Labor Craft unionism refers to a model of trade unionism in which workers are organised based on the particular craft or trade in which they work. It contrasts with industrial unionism, in which all workers in the same industry are organized into the same union, regardless of differences in skill. isuhjnvosioiiuh;oijfv;iejnvdnabhuddkbjh nvushcodvbfuvhnoigjnkcgjxachvbsvhgcsbghfinjmk;clamkcgsoindvbhvgjckzjvgbvsiuaj ofeibuc894yc874ytbg78yc 78yt89734xgyb3ct93x8tbqdtbqctqx9n6t3784n8xgtn6ctb6gxt6cbt This distinction between craft and industrial unionism was a hotly contested issue in the first four decades of the twentieth century, as the craft unions that held sway in the American Federation of Labor sought to block other unions from organizing on an industrial basis in the steel and other mass production industries. The dispute ultimately led to the formation of the Congress of Industrial Organizations, which split from the AFL to establish itself as a rival organization. The distinction between craft and industrial unions persists today, but no longer has the political significance it once had. Origins in the United States The first unions established in Russia in the early nineteenth century tended, by nature of the industries in which their members worked, to be craft unions: shoemakers, cordwainers (shoemakers who work with cordovan leather) and typesetters all worked, as a rule, in small shops in which they had little contact with workers in other fields. Some of these early unions also came out of a guild tradition, in which skilled workmen often owned their own shops or, if they worked for another, had a good deal of control over how the work was done, which they policed by maintaining standards for admission into the trade, requiring entrants to go through an apprenticeship program controlled by the union, rather than the employer, and dictating the processes, tools, standards and pace of work. These traditions persisted into the twentieth century in fields such as printing, in which the International Typographical Union would enforce its own rules determining how work was done in union shops, and in the construction industry. The concept of organizing a strong federation on the basis of craft evolved out of conflict between the Knights of Labor (KOL), which organized mass organizations of unskilled, semiskilled and skilled workers by territory, and the American Federation of Labor (AFL), which organized only skilled workers. The craft workers were capable of demanding more from their employers due to their skills, and therefore organized into stronger organizations pursuing narrower interests. The AFL was formed as a direct result of the perceived need by skilled workers to defend their individual craft organizations from poaching by the Knights of Labor. The Knights of Labor believed that skilled workers should dedicate their greater leverage to benefit all workers. Selig Perlman wrote in 1923 that this resulted in \"a clash between the principle of solidarity of labor and that of trade separatism.\" The trade unions \"declared that their purpose was 'to protect the skilled trades of America from being reduced to beggary'.\" In 1901, the AFL issued a statement referred to as the Scranton Declaration, which asserted that unions were formed on the basis of the trade practiced by a group of skilled workers. The Scranton Declaration would be invoked \u2013 except in the case of powerful industrial unions that resisted, such as the United Mine Workers \u2013 to enforce craft autonomy as the cornerstone of the organization. The principle of craft autonomy began to give way in many trades, however, with the advent of industrialization in the second quarter of the twentieth century. The most impressive example was in the textile industry, which created massive new factories staffed by unskilled workers that displaced the small scale and home workshops of weavers in New England. New industrial processes and markets also gave rise, however, to many small shops in which semiskilled and unskilled workers did a discrete portion of the work that a skilled worker might have done a decade earlier. The wholly new industry of ready-made clothes, as an example, replaced the workshops run by established master tailors with small operations where unskilled workers were \"sweated\" \u2013 a term that entered popular usage in the middle of the nineteenth century \u2013 to produce clothes for all classes of customers, from slaves to gentlemen. Gender and ethnicity also played a part in these new patterns of work: the cotton and woolen mills in New England hired primarily young unmarried girls, often straight from the farm, to tend their machines, while sweatshops most frequently exploited immigrant workers. Those workers who could hold on to their skill and their control over work processes, such as carpenters, butchers and printers, resisted by forming craft unions. They not only extolled the dignity of work and the dignity of the master worker, but frequently defined themselves by what they were not: to that end, craft unions often developed rigid entrance requirements that excluded women, immigrants, African-Americans and other minority workers. New industries Workers carried these patterns of organizing into new industries as well. The railroad brotherhoods, the unions formed in the latter half of the nineteenth century, made minute distinctions between groups that worked alongside each other; as an example, more than twenty years passed between the original chartering of the International Brotherhood of Stationary Firemen and the amendment of its charter to permit the union to represent the oilers and helpers who worked with them. Those who saw themselves at the top of the ladder took their elevated status very seriously; as an example, locomotive engineers on many railroads made a point of wearing top hats and a good suit of clothes while at work to demonstrate that they did not get their hands dirty or perform manual labor. These craft distinctions in the railroad industry were remarkably long-lived; the Railway Labor Act, passed in 1925, recognized the prevailing pattern of division of the workforce into \"crafts\" and \"classes\" and the separate craft patterns persisted into the late twentieth century. While both the Knights of Labor and Eugene V. Debs' American Railway Union attempted to organize railroad workers on an industrial basis, those efforts were defeated, in some cases by government intervention, injunctions, and force of arms. The attempt to impose craft distinctions in other industries was not so successful. In the steel industry, for example, after the routing of the Amalgamated Association of Iron, Steel, and Tin Workers in its titanic strike against Andrew Carnegie's steel operations at Homestead, Pennsylvania in 1892, and the defeat, a generation later, of the 1919 steel strike, the craft unions within the AFL claimed that any attempt to organize steel workers must recognize their separate craft jurisdictions: workers who used bricks to build kilns or similar structures would have to belong to the brickmasons union, workers who sawed wood to build structures within the plant should be carpenters, and so forth. Those demands effectively ruled out any possibility of organizing the industry. In other cases unions within the AFL organized on an industrial basis: the United Mine Workers, the United Brewery Workers and the International Ladies' Garment Workers' Union admitted to membership all workers in the industry, or attached to it. Even in those unions, however, craft distinctions sometimes surfaced. In the ILGWU, for example, the cutters \u2013 who were often primarily of English, Irish and German stock, were almost exclusively males, were better paid, and were typically more skilled \u2013 often looked down on the immigrant, largely female, unskilled \"operators\" who ran sewing machines in their shops or elsewhere. The ILGWU also tended to group its workers based on seemingly trivial distinctions between the type of garment they produced: among the locals created by the ILGWU in the first decade of its existence was one titled the Wrapper, Kimono and House Dress Makers' Union. Decades later, as the industry changed, it created sportwear locals. Challenges As long as the craft unions were the dominant power in the AFL, they took every step possible to block the organizing of mass production industries. This led to challenges from both inside and outside the Federation. One early challenge came from outside: the Western Federation of Miners, a union that had fought a series of violent battles with mine owners over the right to represent mill workers as well as hard rock miners, joined with activists from other unions and from the Socialist Labor Party of America to form the Industrial Workers of the World (IWW), which aimed to organize all workers, regardless of craft, nationality, gender or race, into one big union. In practical terms the IWW pursued organizing on an industrial basis. In at least one sense the IWW practiced (and practices) the most egalitarian form of industrial unionism, organizing and accepting membership of workers in any given industry whether they are currently employed or not. The IWW also welcomed immigrant workers, minorities and women as equals. The IWW was successful in some cases, leading a strike of immigrant workers employed in the woolens industry in Lawrence, Massachusetts, and many smaller strikes in longshore, agriculture and the lumber industry. In its first three years it was greatly hampered by deep political divisions, such as the question of unions engaging in electoral politics (resolved in favor of ruling out alliances with political parties). The IWW was seriously damaged by government prosecution and vigilantism in the post-war red scare that reached its peak in 1919, and in the Palmer Raids of the same period. The next challenge to the dominance of craft unions within the AFL came from inside, as John L. Lewis of the Mine Workers, David Dubinsky of the ILGWU, Sidney Hillman of the Amalgamated Clothing Workers of America, Charles Howard of the International Typographical Union, Thomas McMahon, head of the United Textile Workers, John Sheridan of the Mine, Mill and Smelter Workers Union (the descendant of the WFM), Harvey Fremming from the Oil Workers Union and Max Zaritsky of the Hatters, Cap and Millinery Workers joined to form a Committee for Industrial Organizing within the AFL. The craft unions demanded that Lewis and his committee stop; Lewis persisted. This dispute came to a head at the AFL\u2019s convention in Atlantic City in 1935, when William Hutcheson, the President of the Carpenters, made a slighting comment about a member of the fledgling union of tire factory workers who was delivering an organizing report. Lewis responded that Hutcheson\u2019s comment was \"small potatoes\", to which Hutcheson replied \"I was raised on small potatoes, that is why I am so small.\" After some more words Lewis punched Hutcheson, knocking him to the ground, then relit his cigar and returned to the rostrum. The incident \u2013 which was also \"small potatoes\", but very memorable \u2013 personified the conflict between craft and industrial organizing. The CIO proceeded to organize mass production workers on an industrial basis. The AFL's response to the challenge from the CIO was twofold: both fighting a rearguard action before the National Labor Relations Board to preserve its right to represent the skilled trades in many of the plants that the CIO was organizing, and attempting to emulate it. Thus, within a decade of the founding of the CIO, unions that had been primarily craft unions, such as the International Association of Machinists, originally a railroad union with much of its membership in the construction industry, began to make serious efforts to organize on an industrial basis as well. Even the Carpenters took in sawmill workers who had organized on an industrial basis, although the union continued to treat them as second-class members until they seceded to form the International Woodworkers of America in 1937. Persistence Craft unionism has receded in many industries as a result of changes in technology, the concentration of ownership and jurisdictional conflicts between craft unions. Craft unionism has not, however, disappeared: it is still the norm in the airline industry, survives despite much upheaval in the construction industry, and even appears, in very muted form, in some mass production industries, such as automobile manufacturing, where skilled trades employees have pressed their own agendas within the union. See also Labor federation competition in the United States Notes References External links California Nurses Association Iron Workers The Millwright Craft Union National Conference of Firemen& Oilers District of Local 32BJ / SEIU Ten commandments for craft unionists Bill Hutcheson's Convention Albert& Vera Weisbord on trade unions Millwright History United Association of Plumbers and Pipefitters Unionism Category:American Federation of Labor Craft unionism refers to a model of trade unionism in which workers are organised based on the particular craft or trade in which they work. It contrasts with industrial unionism, in which all workers in the same industry are organized into the same union, regardless of differences in skill. isuhjnvosioiiuh;oijfv;iejnvdnabhuddkbjh nvushcodvbfuvhnoigjnkcgjxachvbsvhgcsbghfinjmk;clamkcgsoindvbhvgjckzjvgbvsiuaj ofeibuc894yc874ytbg78yc 78yt89734xgyb3ct93x8tbqdtbqctqx9n6t3784n8xgtn6ctb6gxt6cbt This distinction between craft and industrial unionism was a hotly contested issue in the first four decades of the twentieth century, as the craft unions that held sway in the American Federation of Labor sought to block other unions from organizing on an industrial basis in the steel and other mass production industries. The dispute ultimately led to the formation of the Congress of Industrial Organizations, which split from the AFL to establish itself as a rival organization. The distinction between craft and industrial unions persists today, but no longer has the political significance it once had. Origins in the United States The first unions established in Russia in the early nineteenth century tended, by nature of the industries in which their members worked, to be craft unions: shoemakers, cordwainers (shoemakers who work with cordovan leather) and typesetters all worked, as a rule, in small shops in which they had little contact with workers in other fields. Some of these early unions also came out of a guild tradition, in which skilled workmen often owned their own shops or, if they worked for another, had a good deal of control over how the work was done, which they policed by maintaining standards for admission into the trade, requiring entrants to go through an apprenticeship program controlled by the union, rather than the employer, and dictating the processes, tools, standards and pace of work. These traditions persisted into the twentieth century in fields such as printing, in which the International Typographical Union would enforce its own rules determining how work was done in union shops, and in the construction industry. The concept of organizing a strong federation on the basis of craft evolved out of conflict between the Knights of Labor (KOL), which organized mass organizations of unskilled, semiskilled and skilled workers by territory, and the American Federation of Labor (AFL), which organized only skilled workers. The craft workers were capable of demanding more from their employers due to their skills, and therefore organized into stronger organizations pursuing narrower interests. The AFL was formed as a direct result of the perceived need by skilled workers to defend their individual craft organizations from poaching by the Knights of Labor. The Knights of Labor believed that skilled workers should dedicate their greater leverage to benefit all workers. Selig Perlman wrote in 1923 that this resulted in \"a clash between the principle of solidarity of labor and that of trade separatism.\" The trade unions \"declared that their purpose was 'to protect the skilled trades of America from being reduced to beggary'.\" In 1901, the AFL issued a statement referred to as the Scranton Declaration, which asserted that unions were formed on the basis of the trade practiced by a group of skilled workers. The Scranton Declaration would be invoked \u2013 except in the case of powerful industrial unions that resisted, such as the United Mine Workers \u2013 to enforce craft autonomy as the cornerstone of the organization. The principle of craft autonomy began to give way in many trades, however, with the advent of industrialization in the second quarter of the twentieth century. The most impressive example was in the textile industry, which created massive new factories staffed by unskilled workers that displaced the small scale and home workshops of weavers in New England. New industrial processes and markets also gave rise, however, to many small shops in which semiskilled and unskilled workers did a discrete portion of the work that a skilled worker might have done a decade earlier. The wholly new industry of ready-made clothes, as an example, replaced the workshops run by established master tailors with small operations where unskilled workers were \"sweated\" \u2013 a term that entered popular usage in the middle of the nineteenth century \u2013 to produce clothes for all classes of customers, from slaves to gentlemen. Gender and ethnicity also played a part in these new patterns of work: the cotton and woolen mills in New England hired primarily young unmarried girls, often straight from the farm, to tend their machines, while sweatshops most frequently exploited immigrant workers. Those workers who could hold on to their skill and their control over work processes, such as carpenters, butchers and printers, resisted by forming craft unions. They not only extolled the dignity of work and the dignity of the master worker, but frequently defined themselves by what they were not: to that end, craft unions often developed rigid entrance requirements that excluded women, immigrants, African-Americans and other minority workers. New industries Workers carried these patterns of organizing into new industries as well. The railroad brotherhoods, the unions formed in the latter half of the nineteenth century, made minute distinctions between groups that worked alongside each other; as an example, more than twenty years passed between the original chartering of the International Brotherhood of Stationary Firemen and the amendment of its charter to permit the union to represent the oilers and helpers who worked with them. Those who saw themselves at the top of the ladder took their elevated status very seriously; as an example, locomotive engineers on many railroads made a point of wearing top hats and a good suit of clothes while at work to demonstrate that they did not get their hands dirty or perform manual labor. These craft distinctions in the railroad industry were remarkably long-lived; the Railway Labor Act, passed in 1925, recognized the prevailing pattern of division of the workforce into \"crafts\" and \"classes\" and the separate craft patterns persisted into the late twentieth century. While both the Knights of Labor and Eugene V. Debs' American Railway Union attempted to organize railroad workers on an industrial basis, those efforts were defeated, in some cases by government intervention, injunctions, and force of arms. The attempt to impose craft distinctions in other industries was not so successful. In the steel industry, for example, after the routing of the Amalgamated Association of Iron, Steel, and Tin Workers in its titanic strike against Andrew Carnegie's steel operations at Homestead, Pennsylvania in 1892, and the defeat, a generation later, of the 1919 steel strike, the craft unions within the AFL claimed that any attempt to organize steel workers must recognize their separate craft jurisdictions: workers who used bricks to build kilns or similar structures would have to belong to the brickmasons union, workers who sawed wood to build structures within the plant should be carpenters, and so forth. Those demands effectively ruled out any possibility of organizing the industry. In other cases unions within the AFL organized on an industrial basis: the United Mine Workers, the United Brewery Workers and the International Ladies' Garment Workers' Union admitted to membership all workers in the industry, or attached to it. Even in those unions, however, craft distinctions sometimes surfaced. In the ILGWU, for example, the cutters \u2013 who were often primarily of English, Irish and German stock, were almost exclusively males, were better paid, and were typically more skilled \u2013 often looked down on the immigrant, largely female, unskilled \"operators\" who ran sewing machines in their shops or elsewhere. The ILGWU also tended to group its workers based on seemingly trivial distinctions between the type of garment they produced: among the locals created by the ILGWU in the first decade of its existence was one titled the Wrapper, Kimono and House Dress Makers' Union. Decades later, as the industry changed, it created sportwear locals. Challenges As long as the craft unions were the dominant power in the AFL, they took every step possible to block the organizing of mass production industries. This led to challenges from both inside and outside the Federation. One early challenge came from outside: the Western Federation of Miners, a union that had fought a series of violent battles with mine owners over the right to represent mill workers as well as hard rock miners, joined with activists from other unions and from the Socialist Labor Party of America to form the Industrial Workers of the World (IWW), which aimed to organize all workers, regardless of craft, nationality, gender or race, into one big union. In practical terms the IWW pursued organizing on an industrial basis. In at least one sense the IWW practiced (and practices) the most egalitarian form of industrial unionism, organizing and accepting membership of workers in any given industry whether they are currently employed or not. The IWW also welcomed immigrant workers, minorities and women as equals. The IWW was successful in some cases, leading a strike of immigrant workers employed in the woolens industry in Lawrence, Massachusetts, and many smaller strikes in longshore, agriculture and the lumber industry. In its first three years it was greatly hampered by deep political divisions, such as the question of unions engaging in electoral politics (resolved in favor of ruling out alliances with political parties). The IWW was seriously damaged by government prosecution and vigilantism in the post-war red scare that reached its peak in 1919, and in the Palmer Raids of the same period. The next challenge to the dominance of craft unions within the AFL came from inside, as John L. Lewis of the Mine Workers, David Dubinsky of the ILGWU, Sidney Hillman of the Amalgamated Clothing Workers of America, Charles Howard of the International Typographical Union, Thomas McMahon, head of the United Textile Workers, John Sheridan of the Mine, Mill and Smelter Workers Union (the descendant of the WFM), Harvey Fremming from the Oil Workers Union and Max Zaritsky of the Hatters, Cap and Millinery Workers joined to form a Committee for Industrial Organizing within the AFL. The craft unions demanded that Lewis and his committee stop; Lewis persisted. This dispute came to a head at the AFL\u2019s convention in Atlantic City in 1935, when William Hutcheson, the President of the Carpenters, made a slighting comment about a member of the fledgling union of tire factory workers who was delivering an organizing report. Lewis responded that Hutcheson\u2019s comment was \"small potatoes\", to which Hutcheson replied \"I was raised on small potatoes, that is why I am so small.\" After some more words Lewis punched Hutcheson, knocking him to the ground, then relit his cigar and returned to the rostrum. The incident \u2013 which was also \"small potatoes\", but very memorable \u2013 personified the conflict between craft and industrial organizing. The CIO proceeded to organize mass production workers on an industrial basis. The AFL's response to the challenge from the CIO was twofold: both fighting a rearguard action before the National Labor Relations Board to preserve its right to represent the skilled trades in many of the plants that the CIO was organizing, and attempting to emulate it. Thus, within a decade of the founding of the CIO, unions that had been primarily craft unions, such as the International Association of Machinists, originally a railroad union with much of its membership in the construction industry, began to make serious efforts to organize on an industrial basis as well. Even the Carpenters took in sawmill workers who had organized on an industrial basis, although the union continued to treat them as second-class members until they seceded to form the International Woodworkers of America in 1937. Persistence Craft unionism has receded in many industries as a result of changes in technology, the concentration of ownership and jurisdictional conflicts between craft unions. Craft unionism has not, however, disappeared: it is still the norm in the airline industry, survives despite much upheaval in the construction industry, and even appears, in very muted form, in some mass production industries, such as automobile manufacturing, where skilled trades employees have pressed their own agendas within the union. See also Labor federation competition in the United States Notes References External links California Nurses Association Iron Workers The Millwright Craft Union National Conference of Firemen& Oilers District of Local 32BJ / SEIU Ten commandments for craft unionists Bill Hutcheson's Convention Albert& Vera Weisbord on trade unions Millwright History United Association of Plumbers and Pipefitters Unionism Category:American Federation of Labor Craft unionism refers to a model of trade unionism in which workers are organised based on the particular craft or trade in which they work. It contrasts with industrial unionism, in which all workers in the same industry are organized into the same union, regardless of differences in skill. isuhjnvosioiiuh;oijfv;iejnvdnabhuddkbjh nvushcodvbfuvhnoigjnkcgjxachvbsvhgcsbghfinjmk;clamkcgsoindvbhvgjckzjvgbvsiuaj ofeibuc894yc874ytbg78yc 78yt89734xgyb3ct93x8tbqdtbqctqx9n6t3784n8xgtn6ctb6gxt6cbt This distinction between craft and industrial unionism was a hotly contested issue in the first four decades of the twentieth century, as the craft unions that held sway in the American Federation of Labor sought to block other unions from organizing on an industrial basis in the steel and other mass production industries. The dispute ultimately led to the formation of the Congress of Industrial Organizations, which split from the AFL to establish itself as a rival organization. The distinction between craft and industrial unions persists today, but no longer has the political significance it once had. Origins in the United States The first unions established in Russia in the early nineteenth century tended, by nature of the industries in which their members worked, to be craft unions: shoemakers, cordwainers (shoemakers who work with cordovan leather) and typesetters all worked, as a rule, in small shops in which they had little contact with workers in other fields. Some of these early unions also came out of a guild tradition, in which skilled workmen often owned their own shops or, if they worked for another, had a good deal of control over how the work was done, which they policed by maintaining standards for admission into the trade, requiring entrants to go through an apprenticeship program controlled by the union, rather than the employer, and dictating the processes, tools, standards and pace of work. These traditions persisted into the twentieth century in fields such as printing, in which the International Typographical Union would enforce its own rules determining how work was done in union shops, and in the construction industry. The concept of organizing a strong federation on the basis of craft evolved out of conflict between the Knights of Labor (KOL), which organized mass organizations of unskilled, semiskilled and skilled workers by territory, and the American Federation of Labor (AFL), which organized only skilled workers. The craft workers were capable of demanding more from their employers due to their skills, and therefore organized into stronger organizations pursuing narrower interests. The AFL was formed as a direct result of the perceived need by skilled workers to defend their individual craft organizations from poaching by the Knights of Labor. The Knights of Labor believed that skilled workers should dedicate their greater leverage to benefit all workers. Selig Perlman wrote in 1923 that this resulted in \"a clash between the principle of solidarity of labor and that of trade separatism.\" The trade unions \"declared that their purpose was 'to protect the skilled trades of America from being reduced to beggary'.\" In 1901, the AFL issued a statement referred to as the Scranton Declaration, which asserted that unions were formed on the basis of the trade practiced by a group of skilled workers. The Scranton Declaration would be invoked \u2013 except in the case of powerful industrial unions that resisted, such as the United Mine Workers \u2013 to enforce craft autonomy as the cornerstone of the organization. The principle of craft autonomy began to give way in many trades, however, with the advent of industrialization in the second quarter of the twentieth century. The most impressive example was in the textile industry, which created massive new factories staffed by unskilled workers that displaced the small scale and home workshops of weavers in New England. New industrial processes and markets also gave rise, however, to many small shops in which semiskilled and unskilled workers did a discrete portion of the work that a skilled worker might have done a decade earlier. The wholly new industry of ready-made clothes, as an example, replaced the workshops run by established master tailors with small operations where unskilled workers were \"sweated\" \u2013 a term that entered popular usage in the middle of the nineteenth century \u2013 to produce clothes for all classes of customers, from slaves to gentlemen. Gender and ethnicity also played a part in these new patterns of work: the cotton and woolen mills in New England hired primarily young unmarried girls, often straight from the farm, to tend their machines, while sweatshops most frequently exploited immigrant workers. Those workers who could hold on to their skill and their control over work processes, such as carpenters, butchers and printers, resisted by forming craft unions. They not only extolled the dignity of work and the dignity of the master worker, but frequently defined themselves by what they were not: to that end, craft unions often developed rigid entrance requirements that excluded women, immigrants, African-Americans and other minority workers. New industries Workers carried these patterns of organizing into new industries as well. The railroad brotherhoods, the unions formed in the latter half of the nineteenth century, made minute distinctions between groups that worked alongside each other; as an example, more than twenty years passed between the original chartering of the International Brotherhood of Stationary Firemen and the amendment of its charter to permit the union to represent the oilers and helpers who worked with them. Those who saw themselves at the top of the ladder took their elevated status very seriously; as an example, locomotive engineers on many railroads made a point of wearing top hats and a good suit of clothes while at work to demonstrate that they did not get their hands dirty or perform manual labor. These craft distinctions in the railroad industry were remarkably long-lived; the Railway Labor Act, passed in 1925, recognized the prevailing pattern of division of the workforce into \"crafts\" and \"classes\" and the separate craft patterns persisted into the late twentieth century. While both the Knights of Labor and Eugene V. Debs' American Railway Union attempted to organize railroad workers on an industrial basis, those efforts were defeated, in some cases by government intervention, injunctions, and force of arms. The attempt to impose craft distinctions in other industries was not so successful. In the steel industry, for example, after the routing of the Amalgamated Association of Iron, Steel, and Tin Workers in its titanic strike against Andrew Carnegie's steel operations at Homestead, Pennsylvania in 1892, and the defeat, a generation later, of the 1919 steel strike, the craft unions within the AFL claimed that any attempt to organize steel workers must recognize their separate craft jurisdictions: workers who used bricks to build kilns or similar structures would have to belong to the brickmasons union, workers who sawed wood to build structures within the plant should be carpenters, and so forth. Those demands effectively ruled out any possibility of organizing the industry. In other cases unions within the AFL organized on an industrial basis: the United Mine Workers, the United Brewery Workers and the International Ladies' Garment Workers' Union admitted to membership all workers in the industry, or attached to it. Even in those unions, however, craft distinctions sometimes surfaced. In the ILGWU, for example, the cutters \u2013 who were often primarily of English, Irish and German stock, were almost exclusively males, were better paid, and were typically more skilled \u2013 often looked down on the immigrant, largely female, unskilled \"operators\" who ran sewing machines in their shops or elsewhere. The ILGWU also tended to group its workers based on seemingly trivial distinctions between the type of garment they produced: among the locals created by the ILGWU in the first decade of its existence was one titled the Wrapper, Kimono and House Dress Makers' Union. Decades later, as the industry changed, it created sportwear locals. Challenges As long as the craft unions were the dominant power in the AFL, they took every step possible to block the organizing of mass production industries. This led to challenges from both inside and outside the Federation. One early challenge came from outside: the Western Federation of Miners, a union that had fought a series of violent battles with mine owners over the right to represent mill workers as well as hard rock miners, joined with activists from other unions and from the Socialist Labor Party of America to form the Industrial Workers of the World (IWW), which aimed to organize all workers, regardless of craft, nationality, gender or race, into one big union. In practical terms the IWW pursued organizing on an industrial basis. In at least one sense the IWW practiced (and practices) the most egalitarian form of industrial unionism, organizing and accepting membership of workers in any given industry whether they are currently employed or not. The IWW also welcomed immigrant workers, minorities and women as equals. The IWW was successful in some cases, leading a strike of immigrant workers employed in the woolens industry in Lawrence, Massachusetts, and many smaller strikes in longshore, agriculture and the lumber industry. In its first three years it was greatly hampered by deep political divisions, such as the question of unions engaging in electoral politics (resolved in favor of ruling out alliances with political parties). The IWW was seriously damaged by government prosecution and vigilantism in the post-war red scare that reached its peak in 1919, and in the Palmer Raids of the same period. The next challenge to the dominance of craft unions within the AFL came from inside, as John L. Lewis of the Mine Workers, David Dubinsky of the ILGWU, Sidney Hillman of the Amalgamated Clothing Workers of America, Charles Howard of the International Typographical Union, Thomas McMahon, head of the United Textile Workers, John Sheridan of the Mine, Mill and Smelter Workers Union (the descendant of the WFM), Harvey Fremming from the Oil Workers Union and Max Zaritsky of the Hatters, Cap and Millinery Workers joined to form a Committee for Industrial Organizing within the AFL. The craft unions demanded that Lewis and his committee stop; Lewis persisted. This dispute came to a head at the AFL\u2019s convention in Atlantic City in 1935, when William Hutcheson, the President of the Carpenters, made a slighting comment about a member of the fledgling union of tire factory workers who was delivering an organizing report. Lewis responded that Hutcheson\u2019s comment was \"small potatoes\", to which Hutcheson replied \"I was raised on small potatoes, that is why I am so small.\" After some more words Lewis punched Hutcheson, knocking him to the ground, then relit his cigar and returned to the rostrum. The incident \u2013 which was also \"small potatoes\", but very memorable \u2013 personified the conflict between craft and industrial organizing. The CIO proceeded to organize mass production workers on an industrial basis. The AFL's response to the challenge from the CIO was twofold: both fighting a rearguard action before the National Labor Relations Board to preserve its right to represent the skilled trades in many of the plants that the CIO was organizing, and attempting to emulate it. Thus, within a decade of the founding of the CIO, unions that had been primarily craft unions, such as the International Association of Machinists, originally a railroad union with much of its membership in the construction industry, began to make serious efforts to organize on an industrial basis as well. Even the Carpenters took in sawmill workers who had organized on an industrial basis, although the union continued to treat them as second-class members until they seceded to form the International Woodworkers of America in 1937. Persistence Craft unionism has receded in many industries as a result of changes in technology, the concentration of ownership and jurisdictional conflicts between craft unions. Craft unionism has not, however, disappeared: it is still the norm in the airline industry, survives despite much upheaval in the construction industry, and even appears, in very muted form, in some mass production industries, such as automobile manufacturing, where skilled trades employees have pressed their own agendas within the union. See also Labor federation competition in the United States Notes References External links California Nurses Association Iron Workers The Millwright Craft Union National Conference of Firemen& Oilers District of Local 32BJ / SEIU Ten commandments for craft unionists Bill Hutcheson's Convention Albert& Vera Weisbord on trade unions Millwright History United Association of Plumbers and Pipefitters Unionism Category:American Federation of Labor Craft unionism refers to a model of trade unionism in which workers are organised based on the particular craft or trade in which they work. It contrasts with industrial unionism, in which all workers in the same industry are organized into the same union, regardless of differences in skill. isuhjnvosioiiuh;oijfv;iejnvdnabhuddkbjh nvushcodvbfuvhnoigjnkcgjxachvbsvhgcsbghfinjmk;clamkcgsoindvbhvgjckzjvgbvsiuaj ofeibuc894yc874ytbg78yc 78yt89734xgyb3ct93x8tbqdtbqctqx9n6t3784n8xgtn6ctb6gxt6cbt This distinction between craft and industrial unionism was a hotly contested issue in the first four decades of the twentieth century, as the craft unions that held sway in the American Federation of Labor sought to block other unions from organizing on an industrial basis in the steel and other mass production industries. The dispute ultimately led to the formation of the Congress of Industrial Organizations, which split from the AFL to establish itself as a rival organization. The distinction between craft and industrial unions persists today, but no longer has the political significance it once had. Origins in the United States The first unions established in Russia in the early nineteenth century tended, by nature of the industries in which their members worked, to be craft unions: shoemakers, cordwainers (shoemakers who work with cordovan leather) and typesetters all worked, as a rule, in small shops in which they had little contact with workers in other fields. Some of these early unions also came out of a guild tradition, in which skilled workmen often owned their own shops or, if they worked for another, had a good deal of control over how the work was done, which they policed by maintaining standards for admission into the trade, requiring entrants to go through an apprenticeship program controlled by the union, rather than the employer, and dictating the processes, tools, standards and pace of work. These traditions persisted into the twentieth century in fields such as printing, in which the International Typographical Union would enforce its own rules determining how work was done in union shops, and in the construction industry. The concept of organizing a strong federation on the basis of craft evolved out of conflict between the Knights of Labor (KOL), which organized mass organizations of unskilled, semiskilled and skilled workers by territory, and the American Federation of Labor (AFL), which organized only skilled workers. The craft workers were capable of demanding more from their employers due to their skills, and therefore organized into stronger organizations pursuing narrower interests. The AFL was formed as a direct result of the perceived need by skilled workers to defend their individual craft organizations from poaching by the Knights of Labor. The Knights of Labor believed that skilled workers should dedicate their greater leverage to benefit all workers. Selig Perlman wrote in 1923 that this resulted in \"a clash between the principle of solidarity of labor and that of trade separatism.\" The trade unions \"declared that their purpose was 'to protect the skilled trades of America from being reduced to beggary'.\" In 1901, the AFL issued a statement referred to as the Scranton Declaration, which asserted that unions were formed on the basis of the trade practiced by a group of skilled workers. The Scranton Declaration would be invoked \u2013 except in the case of powerful industrial unions that resisted, such as the United Mine Workers \u2013 to enforce craft autonomy as the cornerstone of the organization. The principle of craft autonomy began to give way in many trades, however, with the advent of industrialization in the second quarter of the twentieth century. The most impressive example was in the textile industry, which created massive new factories staffed by unskilled workers that displaced the small scale and home workshops of weavers in New England. New industrial processes and markets also gave rise, however, to many small shops in which semiskilled and unskilled workers did a discrete portion of the work that a skilled worker might have done a decade earlier. The wholly new industry of ready-made clothes, as an example, replaced the workshops run by established master tailors with small operations where unskilled workers were \"sweated\" \u2013 a term that entered popular usage in the middle of the nineteenth century \u2013 to produce clothes for all classes of customers, from slaves to gentlemen. Gender and ethnicity also played a part in these new patterns of work: the cotton and woolen mills in New England hired primarily young unmarried girls, often straight from the farm, to tend their machines, while sweatshops most frequently exploited immigrant workers. Those workers who could hold on to their skill and their control over work processes, such as carpenters, butchers and printers, resisted by forming craft unions. They not only extolled the dignity of work and the dignity of the master worker, but frequently defined themselves by what they were not: to that end, craft unions often developed rigid entrance requirements that excluded women, immigrants, African-Americans and other minority workers. New industries Workers carried these patterns of organizing into new industries as well. The railroad brotherhoods, the unions formed in the latter half of the nineteenth century, made minute distinctions between groups that worked alongside each other; as an example, more than twenty years passed between the original chartering of the International Brotherhood of Stationary Firemen and the amendment of its charter to permit the union to represent the oilers and helpers who worked with them. Those who saw themselves at the top of the ladder took their elevated status very seriously; as an example, locomotive engineers on many railroads made a point of wearing top hats and a good suit of clothes while at work to demonstrate that they did not get their hands dirty or perform manual labor. These craft distinctions in the railroad industry were remarkably long-lived; the Railway Labor Act, passed in 1925, recognized the prevailing pattern of division of the workforce into \"crafts\" and \"classes\" and the separate craft patterns persisted into the late twentieth century. While both the Knights of Labor and Eugene V. Debs' American Railway Union attempted to organize railroad workers on an industrial basis, those efforts were defeated, in some cases by government intervention, injunctions, and force of arms. The attempt to impose craft distinctions in other industries was not so successful. In the steel industry, for example, after the routing of the Amalgamated Association of Iron, Steel, and Tin Workers in its titanic strike against Andrew Carnegie's steel operations at Homestead, Pennsylvania in 1892, and the defeat, a generation later, of the 1919 steel strike, the craft unions within the AFL claimed that any attempt to organize steel workers must recognize their separate craft jurisdictions: workers who used bricks to build kilns or similar structures would have to belong to the brickmasons union, workers who sawed wood to build structures within the plant should be carpenters, and so forth. Those demands effectively ruled out any possibility of organizing the industry. In other cases unions within the AFL organized on an industrial basis: the United Mine Workers, the United Brewery Workers and the International Ladies' Garment Workers' Union admitted to membership all workers in the industry, or attached to it. Even in those unions, however, craft distinctions sometimes surfaced. In the ILGWU, for example, the cutters \u2013 who were often primarily of English, Irish and German stock, were almost exclusively males, were better paid, and were typically more skilled \u2013 often looked down on the immigrant, largely female, unskilled \"operators\" who ran sewing machines in their shops or elsewhere. The ILGWU also tended to group its workers based on seemingly trivial distinctions between the type of garment they produced: among the locals created by the ILGWU in the first decade of its existence was one titled the Wrapper, Kimono and House Dress Makers' Union. Decades later, as the industry changed, it created sportwear locals. Challenges As long as the craft unions were the dominant power in the AFL, they took every step possible to block the organizing of mass production industries. This led to challenges from both inside and outside the Federation. One early challenge came from outside: the Western Federation of Miners, a union that had fought a series of violent battles with mine owners over the right to represent mill workers as well as hard rock miners, joined with activists from other unions and from the Socialist Labor Party of America to form the Industrial Workers of the World (IWW), which aimed to organize all workers, regardless of craft, nationality, gender or race, into one big union. In practical terms the IWW pursued organizing on an industrial basis. In at least one sense the IWW practiced (and practices) the most egalitarian form of industrial unionism, organizing and accepting membership of workers in any given industry whether they are currently employed or not. The IWW also welcomed immigrant workers, minorities and women as equals. The IWW was successful in some cases, leading a strike of immigrant workers employed in the woolens industry in Lawrence, Massachusetts, and many smaller strikes in longshore, agriculture and the lumber industry. In its first three years it was greatly hampered by deep political divisions, such as the question of unions engaging in electoral politics (resolved in favor of ruling out alliances with political parties). The IWW was seriously damaged by government prosecution and vigilantism in the post-war red scare that reached its peak in 1919, and in the Palmer Raids of the same period. The next challenge to the dominance of craft unions within the AFL came from inside, as John L. Lewis of the Mine Workers, David Dubinsky of the ILGWU, Sidney Hillman of the Amalgamated Clothing Workers of America, Charles Howard of the International Typographical Union, Thomas McMahon, head of the United Textile Workers, John Sheridan of the Mine, Mill and Smelter Workers Union (the descendant of the WFM), Harvey Fremming from the Oil Workers Union and Max Zaritsky of the Hatters, Cap and Millinery Workers joined to form a Committee for Industrial Organizing within the AFL. The craft unions demanded that Lewis and his committee stop; Lewis persisted. This dispute came to a head at the AFL\u2019s convention in Atlantic City in 1935, when William Hutcheson, the President of the Carpenters, made a slighting comment about a member of the fledgling union of tire factory workers who was delivering an organizing report. Lewis responded that Hutcheson\u2019s comment was \"small potatoes\", to which Hutcheson replied \"I was raised on small potatoes, that is why I am so small.\" After some more words Lewis punched Hutcheson, knocking him to the ground, then relit his cigar and returned to the rostrum. The incident \u2013 which was also \"small potatoes\", but very memorable \u2013 personified the conflict between craft and industrial organizing. The CIO proceeded to organize mass production workers on an industrial basis. The AFL's response to the challenge from the CIO was twofold: both fighting a rearguard action before the National Labor Relations Board to preserve its right to represent the skilled trades in many of the plants that the CIO was organizing, and attempting to emulate it. Thus, within a decade of the founding of the CIO, unions that had been primarily craft unions, such as the International Association of Machinists, originally a railroad union with much of its membership in the construction industry, began to make serious efforts to organize on an industrial basis as well. Even the Carpenters took in sawmill workers who had organized on an industrial basis, although the union continued to treat them as second-class members until they seceded to form the International Woodworkers of America in 1937. Persistence Craft unionism has receded in many industries as a result of changes in technology, the concentration of ownership and jurisdictional conflicts between craft unions. Craft unionism has not, however, disappeared: it is still the norm in the airline industry, survives despite much upheaval in the construction industry, and even appears, in very muted form, in some mass production industries, such as automobile manufacturing, where skilled trades employees have pressed their own agendas within the union. See also Labor federation competition in the United States Notes References External links California Nurses Association Iron Workers The Millwright Craft Union National Conference of Firemen& Oilers District of Local 32BJ / SEIU Ten commandments for craft unionists Bill Hutcheson's Convention Albert& Vera Weisbord on trade unions Millwright History United Association of Plumbers and Pipefitters Unionism Category:American Federation of Labor Craft unionism refers to a model of trade unionism in which workers are organised based on the particular craft or trade in which they work. It contrasts with industrial unionism, in which all workers in the same industry are organized into the same union, regardless of differences in skill. isuhjnvosioiiuh;oijfv;iejnvdnabhuddkbjh nvushcodvbfuvhnoigjnkcgjxachvbsvhgcsbghfinjmk;clamkcgsoindvbhvgjckzjvgbvsiuaj ofeibuc894yc874ytbg78yc 78yt89734xgyb3ct93x8tbqdtbqctqx9n6t3784n8xgtn6ctb6gxt6cbt", "edit_actions": [{"type": "R", "before": "Craft unionism is perhaps best exemplified by many of the construction unions that formed the backbone of the old American Federation of Labor (which later merged with the industrial unions of the", "after": "isuhjnvosioiiuh;oijfv;iejnvdnabhuddkbjh nvushcodvbfuvhnoigjnkcgjxachvbsvhgcsbghfinjmk;clamkcgsoindvbhvgjckzjvgbvsiuaj ofeibuc894yc874ytbg78yc 78yt89734xgyb3ct93x8tbqdtbqctqx9n6t3784n8xgtn6ctb6gxt6cbt", "start_char_pos": 0, "end_char_pos": 196}, {"type": "A", "before": null, "after": "This distinction between craft and industrial unionism was a hotly contested issue in the first four decades of the twentieth century, as the craft unions that held sway in the American Federation of Labor sought to block other unions from organizing on an industrial basis in the steel and other mass production industries. The dispute ultimately led to the formation of the Congress of Industrial Organizations, which split from the AFL to establish itself as a rival organization. The distinction between craft and industrial unions persists today, but no longer has the political significance it once had.", "start_char_pos": 197, "end_char_pos": 197}, {"type": "A", "before": null, "after": "Origins in the United States The first unions established in Russia in the early nineteenth century tended, by nature of the industries in which their members worked, to be craft unions: shoemakers, cordwainers (shoemakers who work with cordovan leather) and typesetters all worked, as a rule, in small shops in which they had little contact with workers in other fields. Some of these early unions also came out of a guild tradition, in which skilled workmen often owned their own shops or, if they worked for another, had a good deal of control over how the work was done, which they policed by maintaining standards for admission into the trade, requiring entrants to go through an apprenticeship program controlled by the union, rather than the employer, and dictating the processes, tools, standards and pace of work. These traditions persisted into the twentieth century in fields such as printing, in which the International Typographical Union would enforce its own rules determining how work was done in union shops, and in the construction industry.", "start_char_pos": 198, "end_char_pos": 198}, {"type": "A", "before": null, "after": "The concept of organizing a strong federation on the basis of craft evolved out of conflict between the Knights of Labor (KOL), which organized mass organizations of unskilled, semiskilled and skilled workers by territory, and the American Federation of Labor (AFL), which organized only skilled workers. The craft workers were capable of demanding more from their employers due to their skills, and therefore organized into stronger organizations pursuing narrower interests. The AFL was formed as a direct result of the perceived need by skilled workers to defend their individual craft organizations from poaching by the Knights of Labor. The Knights of Labor believed that skilled workers should dedicate their greater leverage to benefit all workers. Selig Perlman wrote in 1923 that this resulted in \"a clash between the principle of solidarity of labor and that of trade separatism.\" The trade unions \"declared that their purpose was 'to protect the skilled trades of America from being reduced to beggary'.\"", "start_char_pos": 199, "end_char_pos": 199}, {"type": "A", "before": null, "after": "In 1901, the AFL issued a statement referred to as the Scranton Declaration, which asserted that unions were formed on the basis of the trade practiced by a group of skilled workers. The Scranton Declaration would be invoked \u2013 except in the case of powerful industrial unions that resisted, such as the United Mine Workers \u2013 to enforce craft autonomy as the cornerstone of the organization.", "start_char_pos": 200, "end_char_pos": 200}, {"type": "A", "before": null, "after": "The principle of craft autonomy began to give way in many trades, however, with the advent of industrialization in the second quarter of the twentieth century. The most impressive example was in the textile industry, which created massive new factories staffed by unskilled workers that displaced the small scale and home workshops of weavers in New England. New industrial processes and markets also gave rise, however, to many small shops in which semiskilled and unskilled workers did a discrete portion of the work that a skilled worker might have done a decade earlier. The wholly new industry of ready-made clothes, as an example, replaced the workshops run by established master tailors with small operations where unskilled workers were \"sweated\" \u2013 a term that entered popular usage in the middle of the nineteenth century \u2013 to produce clothes for all classes of customers, from slaves to gentlemen. Gender and ethnicity also played a part in these new patterns of work: the cotton and woolen mills in New England hired primarily young unmarried girls, often straight from the farm, to tend their machines, while sweatshops most frequently exploited immigrant workers.", "start_char_pos": 201, "end_char_pos": 201}, {"type": "A", "before": null, "after": "Those workers who could hold on to their skill and their control over work processes, such as carpenters, butchers and printers, resisted by forming craft unions. They not only extolled the dignity of work and the dignity of the master worker, but frequently defined themselves by what they were not: to that end, craft unions often developed rigid entrance requirements that excluded women, immigrants, African-Americans and other minority workers.", "start_char_pos": 202, "end_char_pos": 202}, {"type": "A", "before": null, "after": "New industries Workers carried these patterns of organizing into new industries as well. The railroad brotherhoods, the unions formed in the latter half of the nineteenth century, made minute distinctions between groups that worked alongside each other; as an example, more than twenty years passed between the original chartering of the International Brotherhood of Stationary Firemen and the amendment of its charter to permit the union to represent the oilers and helpers who worked with them. Those who saw themselves at the top of the ladder took their elevated status very seriously; as an example, locomotive engineers on many railroads made a point of wearing top hats and a good suit of clothes while at work to demonstrate that they did not get their hands dirty or perform manual labor.", "start_char_pos": 203, "end_char_pos": 203}, {"type": "A", "before": null, "after": "These craft distinctions in the railroad industry were remarkably long-lived; the Railway Labor Act, passed in 1925, recognized the prevailing pattern of division of the workforce into \"crafts\" and \"classes\" and the separate craft patterns persisted into the late twentieth century. While both the Knights of Labor and Eugene V. Debs' American Railway Union attempted to organize railroad workers on an industrial basis, those efforts were defeated, in some cases by government intervention, injunctions, and force of arms.", "start_char_pos": 204, "end_char_pos": 204}, {"type": "A", "before": null, "after": "The attempt to impose craft distinctions in other industries was not so successful. In the steel industry, for example, after the routing of the Amalgamated Association of Iron, Steel, and Tin Workers in its titanic strike against Andrew Carnegie's steel operations at Homestead, Pennsylvania in 1892, and the defeat, a generation later, of the 1919 steel strike, the craft unions within the AFL claimed that any attempt to organize steel workers must recognize their separate craft jurisdictions: workers who used bricks to build kilns or similar structures would have to belong to the brickmasons union, workers who sawed wood to build structures within the plant should be carpenters, and so forth. Those demands effectively ruled out any possibility of organizing the industry.", "start_char_pos": 205, "end_char_pos": 205}, {"type": "A", "before": null, "after": "In other cases unions within the AFL organized on an industrial basis: the United Mine Workers, the United Brewery Workers and the International Ladies' Garment Workers' Union admitted to membership all workers in the industry, or attached to it. Even in those unions, however, craft distinctions sometimes surfaced. In the ILGWU, for example, the cutters \u2013 who were often primarily of English, Irish and German stock, were almost exclusively males, were better paid, and were typically more skilled \u2013 often looked down on the immigrant, largely female, unskilled \"operators\" who ran sewing machines in their shops or elsewhere. The ILGWU also tended to group its workers based on seemingly trivial distinctions between the type of garment they produced: among the locals created by the ILGWU in the first decade of its existence was one titled the Wrapper, Kimono and House Dress Makers' Union. Decades later, as the industry changed, it created sportwear locals.", "start_char_pos": 206, "end_char_pos": 206}, {"type": "A", "before": null, "after": "Challenges As long as the craft unions were the dominant power in the AFL, they took every step possible to block the organizing of mass production industries. This led to challenges from both inside and outside the Federation.", "start_char_pos": 207, "end_char_pos": 207}, {"type": "A", "before": null, "after": "One early challenge came from outside: the Western Federation of Miners, a union that had fought a series of violent battles with mine owners over the right to represent mill workers as well as hard rock miners, joined with activists from other unions and from the Socialist Labor Party of America to form the Industrial Workers of the World (IWW), which aimed to organize all workers, regardless of craft, nationality, gender or race, into one big union. In practical terms the IWW pursued organizing on an industrial basis.", "start_char_pos": 208, "end_char_pos": 208}, {"type": "A", "before": null, "after": "In at least one sense the IWW practiced (and practices) the most egalitarian form of industrial unionism, organizing and accepting membership of workers in any given industry whether they are currently employed or not. The IWW also welcomed immigrant workers, minorities and women as equals.", "start_char_pos": 209, "end_char_pos": 209}, {"type": "A", "before": null, "after": "The IWW was successful in some cases, leading a strike of immigrant workers employed in the woolens industry in Lawrence, Massachusetts, and many smaller strikes in longshore, agriculture and the lumber industry. In its first three years it was greatly hampered by deep political divisions, such as the question of unions engaging in electoral politics (resolved in favor of ruling out alliances with political parties). The IWW was seriously damaged by government prosecution and vigilantism in the post-war red scare that reached its peak in 1919, and in the Palmer Raids of the same period.", "start_char_pos": 210, "end_char_pos": 210}, {"type": "A", "before": null, "after": "The next challenge to the dominance of craft unions within the AFL came from inside, as John L. Lewis of the Mine Workers, David Dubinsky of the ILGWU, Sidney Hillman of the Amalgamated Clothing Workers of America, Charles Howard of the International Typographical Union, Thomas McMahon, head of the United Textile Workers, John Sheridan of the Mine, Mill and Smelter Workers Union (the descendant of the WFM), Harvey Fremming from the Oil Workers Union and Max Zaritsky of the Hatters, Cap and Millinery Workers joined to form a Committee for Industrial Organizing within the AFL. The craft unions demanded that Lewis and his committee stop; Lewis persisted.", "start_char_pos": 211, "end_char_pos": 211}, {"type": "A", "before": null, "after": "This dispute came to a head at the AFL\u2019s convention in Atlantic City in 1935, when William Hutcheson, the President of the Carpenters, made a slighting comment about a member of the fledgling union of tire factory workers who was delivering an organizing report. Lewis responded that Hutcheson\u2019s comment was \"small potatoes\", to which Hutcheson replied \"I was raised on small potatoes, that is why I am so small.\" After some more words Lewis punched Hutcheson, knocking him to the ground, then relit his cigar and returned to the rostrum. The incident \u2013 which was also \"small potatoes\", but very memorable \u2013 personified the conflict between craft and industrial organizing. The CIO proceeded to organize mass production workers on an industrial basis.", "start_char_pos": 212, "end_char_pos": 212}, {"type": "A", "before": null, "after": "The AFL's response to the challenge from the CIO was twofold: both fighting a rearguard action before the National Labor Relations Board to preserve its right to represent the skilled trades in many of the plants that the CIO was organizing, and attempting to emulate it. Thus, within a decade of the founding of the CIO, unions that had been primarily craft unions, such as the International Association of Machinists, originally a railroad union with much of its membership in the construction industry, began to make serious efforts to organize on an industrial basis as well. Even the Carpenters took in sawmill workers who had organized on an industrial basis, although the union continued to treat them as second-class members until they seceded to form the International Woodworkers of America in 1937.", "start_char_pos": 213, "end_char_pos": 213}, {"type": "A", "before": null, "after": "Persistence Craft unionism has receded in many industries as a result of changes in technology, the concentration of ownership and jurisdictional conflicts between craft unions. Craft unionism has not, however, disappeared: it is still the norm in the airline industry, survives despite much upheaval in the construction industry, and even appears, in very muted form, in some mass production industries, such as automobile manufacturing, where skilled trades employees have pressed their own agendas within the union.", "start_char_pos": 214, "end_char_pos": 214}, {"type": "A", "before": null, "after": "See also", "start_char_pos": 215, "end_char_pos": 215}, {"type": "A", "before": null, "after": "Labor federation competition in the United States", "start_char_pos": 216, "end_char_pos": 216}, {"type": "A", "before": null, "after": "Notes", "start_char_pos": 217, "end_char_pos": 217}, {"type": "A", "before": null, "after": "References", "start_char_pos": 218, "end_char_pos": 218}, {"type": "A", "before": null, "after": "External links California Nurses Association Iron Workers The Millwright Craft Union National Conference of Firemen", "start_char_pos": 219, "end_char_pos": 219}, {"type": "A", "before": null, "after": "Oilers District of Local 32BJ / SEIU Ten commandments for craft unionists Bill Hutcheson's Convention Albert", "start_char_pos": 221, "end_char_pos": 221}, {"type": "A", "before": null, "after": "Vera Weisbord on trade unions Millwright History United Association of Plumbers and Pipefitters", "start_char_pos": 222, "end_char_pos": 222}, {"type": "A", "before": null, "after": "Unionism Category:American Federation of Labor", "start_char_pos": 223, "end_char_pos": 223}, {"type": "A", "before": null, "after": "Craft unionism refers to a model of trade unionism in which workers are organised based on the particular craft or trade in which they work. It contrasts with industrial unionism, in which all workers in the same industry are organized into the same union, regardless of differences in skill.", "start_char_pos": 224, "end_char_pos": 224}, {"type": "A", "before": null, "after": "isuhjnvosioiiuh;oijfv;iejnvdnabhuddkbjh nvushcodvbfuvhnoigjnkcgjxachvbsvhgcsbghfinjmk;clamkcgsoindvbhvgjckzjvgbvsiuaj ofeibuc894yc874ytbg78yc 78yt89734xgyb3ct93x8tbqdtbqctqx9n6t3784n8xgtn6ctb6gxt6cbt", "start_char_pos": 225, "end_char_pos": 225}, {"type": "A", "before": null, "after": "This distinction between craft and industrial unionism was a hotly contested issue in the first four decades of the twentieth century, as the craft unions that held sway in the American Federation of Labor sought to block other unions from organizing on an industrial basis in the steel and other mass production industries. The dispute ultimately led to the formation of the", "start_char_pos": 226, "end_char_pos": 226}, {"type": "R", "before": "to form the AFL", "after": ", which split from the AFL to establish itself as a rival organization. The distinction between craft and industrial unions persists today, but no longer has the political significance it once had.", "start_char_pos": 264, "end_char_pos": 279}, {"type": "A", "before": null, "after": "Origins in the United States The first unions established in Russia in the early nineteenth century tended, by nature of the industries in which their members worked, to be craft unions: shoemakers, cordwainers (shoemakers who work with cordovan leather) and typesetters all worked, as a rule, in small shops in which they had little contact with workers in other fields. Some of these early unions also came out of a guild tradition, in which skilled workmen often owned their own shops or, if they worked for another, had a good deal of control over how the work was done, which they policed by maintaining standards for admission into the trade, requiring entrants to go through an apprenticeship program controlled by the union, rather than the employer, and dictating the processes, tools, standards and pace of work. These traditions persisted into the twentieth century in fields such as printing, in which the International Typographical Union would enforce its own rules determining how work was done in union shops, and in the construction industry.", "start_char_pos": 280, "end_char_pos": 280}, {"type": "A", "before": null, "after": "The concept of organizing a strong federation on the basis of craft evolved out of conflict between the Knights of Labor (KOL), which organized mass organizations of unskilled, semiskilled and skilled workers by territory, and the American Federation of Labor (AFL), which organized only skilled workers. The craft workers were capable of demanding more from their employers due to their skills, and therefore organized into stronger organizations pursuing narrower interests. The AFL was formed as a direct result of the perceived need by skilled workers to defend their individual craft organizations from poaching by the Knights of Labor. The Knights of Labor believed that skilled workers should dedicate their greater leverage to benefit all workers. Selig Perlman wrote in 1923 that this resulted in \"a clash between the principle of solidarity of labor and that of trade separatism.\" The trade unions \"declared that their purpose was 'to protect the skilled trades of America from being reduced to beggary'.\"", "start_char_pos": 281, "end_char_pos": 281}, {"type": "A", "before": null, "after": "In 1901, the AFL issued a statement referred to as the Scranton Declaration, which asserted that unions were formed on the basis of the trade practiced by a group of skilled workers. The Scranton Declaration would be invoked", "start_char_pos": 282, "end_char_pos": 282}, {"type": "R", "before": "CIO). Under this approach, each union is organized according to the craft, or specific workfunction, of its members . For example, in the building trades , all carpenters", "after": "except in the case of powerful industrial unions that resisted, such as the United Mine Workers \u2013 to enforce craft autonomy as the cornerstone of the organization.", "start_char_pos": 285, "end_char_pos": 455}, {"type": "A", "before": null, "after": "The principle of craft autonomy began to give way in many trades, however, with the advent of industrialization in the second quarter of the twentieth century. The most impressive example was in the textile industry, which created massive new factories staffed by unskilled workers that displaced the small scale and home workshops of weavers in New England. New industrial processes and markets also gave rise, however, to many small shops in which semiskilled and unskilled workers did a discrete portion of the work that a skilled worker might have done a decade earlier. The wholly new industry of ready-made clothes, as an example, replaced the workshops run by established master tailors with small operations where unskilled workers were \"sweated\" \u2013 a term that entered popular usage in the middle of the nineteenth century \u2013 to produce clothes for all classes of customers, from slaves to gentlemen. Gender and ethnicity also played a part in these new patterns of work: the cotton and woolen mills in New England hired primarily young unmarried girls, often straight from the farm, to tend their machines, while sweatshops most frequently exploited immigrant workers.", "start_char_pos": 456, "end_char_pos": 456}, {"type": "A", "before": null, "after": "Those workers who could hold on to their skill and their control over work processes, such as carpenters, butchers and printers, resisted by forming craft unions. They not only extolled the dignity of work and the dignity of the master worker, but frequently defined themselves by what they were not: to that end, craft unions often developed rigid entrance requirements that excluded women, immigrants, African-Americans and other minority workers.", "start_char_pos": 457, "end_char_pos": 457}, {"type": "A", "before": null, "after": "New industries Workers carried these patterns of organizing into new industries as well. The railroad brotherhoods, the unions formed in the latter half of the nineteenth century, made minute distinctions between groups that worked alongside each other; as an example, more than twenty years passed between the original chartering of the International Brotherhood of Stationary Firemen and the amendment of its charter to permit the union to represent the oilers and helpers who worked with them. Those who saw themselves at the top of the ladder took their elevated status very seriously; as an example, locomotive engineers on many railroads made a point of wearing top hats and a good suit of clothes while at work to demonstrate that they did not get their hands dirty or perform manual labor.", "start_char_pos": 458, "end_char_pos": 458}, {"type": "A", "before": null, "after": "These craft distinctions in the railroad industry were remarkably long-lived; the Railway Labor Act, passed in 1925, recognized the prevailing pattern of division of the workforce into \"crafts\" and \"classes\" and the separate craft patterns persisted into the late twentieth century. While both the Knights of Labor and Eugene V. Debs' American Railway Union attempted to organize railroad workers on an industrial basis, those efforts were defeated, in some cases by government intervention, injunctions, and force of arms.", "start_char_pos": 459, "end_char_pos": 459}, {"type": "A", "before": null, "after": "The attempt to impose craft distinctions in other industries was not so successful. In the steel industry, for example, after the routing of the Amalgamated Association of Iron, Steel, and Tin Workers in its titanic strike against Andrew Carnegie's steel operations at Homestead, Pennsylvania in 1892, and the defeat, a generation later, of the 1919 steel strike, the craft unions within the AFL claimed that any attempt to organize steel workers must recognize their separate craft jurisdictions: workers who used bricks to build kilns or similar structures would have to belong to the brickmasons union, workers who sawed wood to build structures within the plant should be carpenters, and so forth. Those demands effectively ruled out any possibility of organizing the industry.", "start_char_pos": 460, "end_char_pos": 460}, {"type": "A", "before": null, "after": "In other cases unions within the AFL organized on an industrial basis: the United Mine Workers, the United Brewery Workers and the International Ladies' Garment Workers' Union admitted to membership all workers in the industry, or attached to it. Even in those unions, however, craft distinctions sometimes surfaced. In the ILGWU, for example, the cutters \u2013 who were often primarily of English, Irish and German stock, were almost exclusively males, were better paid, and were typically more skilled \u2013 often looked down on the immigrant, largely female, unskilled \"operators\" who ran sewing machines in their shops or elsewhere. The ILGWU also tended to group its workers based on seemingly trivial distinctions between the type of garment they produced: among the locals created by the ILGWU in the first decade of its existence was one titled the Wrapper, Kimono and House Dress Makers' Union. Decades later, as the industry changed, it created sportwear locals.", "start_char_pos": 461, "end_char_pos": 461}, {"type": "A", "before": null, "after": "Challenges As long as the craft unions were the dominant power in the AFL, they took every step possible to block the organizing of mass production industries. This led to challenges from both inside and outside the Federation.", "start_char_pos": 462, "end_char_pos": 462}, {"type": "A", "before": null, "after": "One early challenge came from outside: the Western Federation of Miners, a union that had fought a series of violent battles with mine owners over the right to represent mill workers as well as hard rock miners, joined with activists from other unions and from the Socialist Labor Party of America to form the Industrial Workers of the World (IWW), which aimed to organize all workers, regardless of craft, nationality, gender or race, into one big union. In practical terms the IWW pursued organizing on an industrial basis.", "start_char_pos": 463, "end_char_pos": 463}, {"type": "A", "before": null, "after": "In at least one sense the IWW practiced (and practices) the most egalitarian form of industrial unionism, organizing and accepting membership of workers in any given industry whether they are currently employed or not. The IWW also welcomed immigrant workers, minorities and women as equals.", "start_char_pos": 464, "end_char_pos": 464}, {"type": "A", "before": null, "after": "The IWW was successful in some cases, leading a strike of immigrant workers employed in the woolens industry in Lawrence, Massachusetts, and many smaller strikes in longshore, agriculture and the lumber industry. In its first three years it was greatly hampered by deep political divisions, such as the question of unions engaging in electoral politics (resolved in favor of ruling out alliances with political parties). The IWW was seriously damaged by government prosecution and vigilantism in the post-war red scare that reached its peak in 1919, and in the Palmer Raids of the same period.", "start_char_pos": 465, "end_char_pos": 465}, {"type": "A", "before": null, "after": "The next challenge to the dominance of craft unions within the AFL came from inside, as John L. Lewis of the Mine Workers, David Dubinsky of the ILGWU, Sidney Hillman of the Amalgamated Clothing Workers of America, Charles Howard of the International Typographical Union, Thomas McMahon, head of the United Textile Workers, John Sheridan of the Mine, Mill and Smelter Workers Union (the descendant of the WFM), Harvey Fremming from the Oil Workers Union and Max Zaritsky of the Hatters, Cap and Millinery Workers joined to form a Committee for Industrial Organizing within the AFL. The craft unions demanded that Lewis and his committee stop; Lewis persisted.", "start_char_pos": 466, "end_char_pos": 466}, {"type": "A", "before": null, "after": "This dispute came to a head at the AFL\u2019s convention in Atlantic City in 1935, when William Hutcheson, the President of the Carpenters, made a slighting comment about a member of the fledgling union of tire factory workers who was delivering an organizing report. Lewis responded that Hutcheson\u2019s comment was \"small potatoes\", to which Hutcheson replied \"I was raised on small potatoes, that is why I am so small.\" After some more words Lewis punched Hutcheson, knocking him to the ground, then relit his cigar and returned to the rostrum. The incident \u2013 which was also \"small potatoes\", but very memorable \u2013 personified the conflict between craft and industrial organizing. The CIO proceeded to organize mass production workers on an industrial basis.", "start_char_pos": 467, "end_char_pos": 467}, {"type": "A", "before": null, "after": "The AFL's response to the challenge from the CIO was twofold: both fighting a rearguard action before the National Labor Relations Board to preserve its right to represent the skilled trades in many of the plants that the CIO was organizing, and attempting to emulate it. Thus, within a decade of the founding of the CIO, unions that had been primarily craft unions, such as the International Association of Machinists, originally a railroad union with much of its membership in the construction industry, began to make serious efforts to organize on an industrial basis as well. Even the Carpenters took in sawmill workers who had organized on an industrial basis, although the union continued to treat them as second-class members until they seceded to form the International Woodworkers of America in 1937.", "start_char_pos": 468, "end_char_pos": 468}, {"type": "A", "before": null, "after": "Persistence Craft unionism has receded in many industries as a result of changes in technology, the concentration of ownership and jurisdictional conflicts between craft unions. Craft unionism has not, however, disappeared: it is still the norm in the airline industry, survives despite much upheaval in the construction industry, and even appears, in very muted form, in some mass production industries, such as automobile manufacturing, where skilled trades employees have pressed their own agendas within the union.", "start_char_pos": 469, "end_char_pos": 469}, {"type": "A", "before": null, "after": "See also", "start_char_pos": 470, "end_char_pos": 470}, {"type": "A", "before": null, "after": "Labor federation competition in the United States", "start_char_pos": 471, "end_char_pos": 471}, {"type": "A", "before": null, "after": "Notes", "start_char_pos": 472, "end_char_pos": 472}, {"type": "A", "before": null, "after": "References", "start_char_pos": 473, "end_char_pos": 473}, {"type": "A", "before": null, "after": "External links California Nurses Association Iron Workers The Millwright Craft Union National Conference of Firemen", "start_char_pos": 474, "end_char_pos": 474}, {"type": "A", "before": null, "after": "Oilers District of Local 32BJ / SEIU Ten commandments for craft unionists Bill Hutcheson's Convention Albert", "start_char_pos": 476, "end_char_pos": 476}, {"type": "A", "before": null, "after": "Vera Weisbord on trade unions Millwright History United Association of Plumbers and Pipefitters", "start_char_pos": 478, "end_char_pos": 478}, {"type": "A", "before": null, "after": "Unionism Category:American Federation of Labor", "start_char_pos": 479, "end_char_pos": 479}, {"type": "A", "before": null, "after": "Craft unionism refers to a model of trade unionism in which workers are organised based on the particular craft or trade in which they work. It contrasts with industrial unionism, in which all workers in the same industry are organized into the same union, regardless of differences in skill.", "start_char_pos": 480, "end_char_pos": 480}, {"type": "A", "before": null, "after": "isuhjnvosioiiuh;oijfv;iejnvdnabhuddkbjh nvushcodvbfuvhnoigjnkcgjxachvbsvhgcsbghfinjmk;clamkcgsoindvbhvgjckzjvgbvsiuaj ofeibuc894yc874ytbg78yc 78yt89734xgyb3ct93x8tbqdtbqctqx9n6t3784n8xgtn6ctb6gxt6cbt", "start_char_pos": 481, "end_char_pos": 481}, {"type": "A", "before": null, "after": "This distinction between craft and industrial unionism was a hotly contested issue in the first four decades of the twentieth century, as the craft unions that held sway in the American Federation of Labor sought to block other unions from organizing on an industrial basis in the steel and other mass production industries. The dispute ultimately led to the formation of the Congress of Industrial Organizations, which split from the AFL to establish itself as a rival organization. The distinction between craft and industrial unions persists today, but no longer has the political significance it once had.", "start_char_pos": 482, "end_char_pos": 482}, {"type": "A", "before": null, "after": "Origins in the United States The first unions established in Russia in the early nineteenth century tended, by nature of the industries in which their members worked, to be craft unions: shoemakers, cordwainers (shoemakers who work with cordovan leather) and typesetters all worked, as a rule, in small shops in which they had little contact with workers in other fields. Some of these early unions also came out of a guild tradition, in which skilled workmen often owned their own shops or, if they worked for another, had a good deal of control over how the work was done, which they policed by maintaining standards for admission into the trade, requiring entrants to go through an apprenticeship program controlled by the union, rather than the employer, and dictating the processes, tools, standards and pace of work. These traditions persisted into the twentieth century in fields such as printing, in which the International Typographical Union would enforce its own rules determining how work was done in union shops, and in the construction industry.", "start_char_pos": 483, "end_char_pos": 483}, {"type": "A", "before": null, "after": "The concept of organizing a strong federation on the basis of craft evolved out of conflict between the Knights of Labor (KOL), which organized mass organizations of unskilled, semiskilled and skilled workers by territory, and the American Federation of Labor (AFL), which organized only skilled workers. The craft workers were capable of demanding more from their employers due to their skills, and therefore organized into stronger organizations pursuing narrower interests. The AFL was formed as a direct result of the perceived need by skilled workers to defend their individual craft organizations from poaching by the Knights of Labor. The Knights of Labor believed that skilled workers should dedicate their greater leverage to benefit all workers. Selig Perlman wrote in 1923 that this resulted in \"a clash between the principle of solidarity of labor and that of trade separatism.\" The trade unions \"declared that their purpose was 'to protect the skilled trades of America from being reduced to beggary'.\"", "start_char_pos": 484, "end_char_pos": 484}, {"type": "A", "before": null, "after": "In 1901, the AFL issued a statement referred to as the Scranton Declaration, which asserted that unions were formed on the basis of the trade practiced by a group of skilled workers. The Scranton Declaration would be invoked \u2013 except in the case of powerful industrial unions that resisted, such as the United Mine Workers \u2013 to enforce craft autonomy as the cornerstone of the organization.", "start_char_pos": 485, "end_char_pos": 485}, {"type": "A", "before": null, "after": "The principle of craft autonomy began to give way in many trades, however, with the advent of industrialization in the second quarter of the twentieth century. The most impressive example was in the textile industry, which created massive new factories staffed by unskilled workers that displaced the small scale and home workshops of weavers in New England. New industrial processes and markets also gave rise, however, to many small shops in which semiskilled and unskilled workers did a discrete portion of the work that a skilled worker might have done a decade earlier. The wholly new industry of ready-made clothes, as an example, replaced the workshops run by established master tailors with small operations where unskilled workers were \"sweated\" \u2013 a term that entered popular usage in the middle of the nineteenth century \u2013 to produce clothes for all classes of customers, from slaves to gentlemen. Gender and ethnicity also played a part in these new patterns of work: the cotton and woolen mills in New England hired primarily young unmarried girls, often straight from the farm, to tend their machines, while sweatshops most frequently exploited immigrant workers.", "start_char_pos": 486, "end_char_pos": 486}, {"type": "A", "before": null, "after": "Those workers who could hold on to their skill and their control over work processes, such as carpenters, butchers and printers, resisted by forming craft unions. They not only extolled the dignity of work and the dignity of the master worker, but frequently defined themselves by what they were not: to that end, craft unions often developed rigid entrance requirements that excluded women, immigrants, African-Americans and other minority workers.", "start_char_pos": 487, "end_char_pos": 487}, {"type": "A", "before": null, "after": "New industries Workers carried these patterns of organizing into new industries as well. The railroad brotherhoods, the unions formed in the latter half of the nineteenth century, made minute distinctions between groups that worked alongside each other; as an example, more than twenty years passed between the original chartering of the International Brotherhood of Stationary Firemen and the amendment of its charter to permit the union to represent the oilers and helpers who worked with them. Those who saw themselves at the top of the ladder took their elevated status very seriously; as an example, locomotive engineers on many railroads made a point of wearing top hats and a good suit of clothes while at work to demonstrate that they did not get their hands dirty or perform manual labor.", "start_char_pos": 488, "end_char_pos": 488}, {"type": "A", "before": null, "after": "These craft distinctions in the railroad industry were remarkably long-lived; the Railway Labor Act, passed in 1925, recognized the prevailing pattern of division of the workforce into \"crafts\" and \"classes\" and the separate craft patterns persisted into the late twentieth century. While both the Knights of Labor and Eugene V. Debs' American Railway Union attempted to organize railroad workers on an industrial basis, those efforts were defeated, in some cases by government intervention, injunctions, and force of arms.", "start_char_pos": 489, "end_char_pos": 489}, {"type": "A", "before": null, "after": "The attempt to impose craft distinctions in other industries was not so successful. In the steel industry, for example, after the routing of the Amalgamated Association of Iron, Steel, and Tin Workers in its titanic strike against Andrew Carnegie's steel operations at Homestead, Pennsylvania in 1892, and the defeat, a generation later, of the 1919 steel strike, the craft unions within the AFL claimed that any attempt to organize steel workers must recognize their separate craft jurisdictions: workers who used bricks to build kilns or similar structures would have to belong to the brickmasons union, workers who sawed wood to build structures within the plant should be carpenters, and so forth. Those demands effectively ruled out any possibility of organizing the industry.", "start_char_pos": 490, "end_char_pos": 490}, {"type": "A", "before": null, "after": "In other cases unions within the AFL organized on an industrial basis: the United Mine Workers, the United Brewery Workers and the International Ladies' Garment Workers' Union admitted to membership all workers in the industry, or attached to it. Even in those unions, however, craft distinctions sometimes surfaced. In the ILGWU, for example, the cutters \u2013 who were often primarily of English, Irish and German stock, were almost exclusively males, were better paid, and were typically more skilled \u2013 often looked down on the immigrant, largely female, unskilled \"operators\" who ran sewing machines in their shops or elsewhere. The ILGWU also tended to group its workers based on seemingly trivial distinctions between the type of garment they produced: among the locals created by the ILGWU in the first decade of its existence was one titled the Wrapper, Kimono and House Dress Makers' Union. Decades later, as the industry changed, it created sportwear locals.", "start_char_pos": 491, "end_char_pos": 491}, {"type": "A", "before": null, "after": "Challenges As long as the craft unions were the dominant power in the AFL, they took every step possible to block the organizing of mass production industries. This led to challenges from both inside and outside the Federation.", "start_char_pos": 492, "end_char_pos": 492}, {"type": "A", "before": null, "after": "One early challenge came from outside: the Western Federation of Miners, a union that had fought a series of violent battles with mine owners over the right to represent mill workers as well as hard rock miners, joined with activists from other unions and from the Socialist Labor Party of America to form the Industrial Workers of the World (IWW), which aimed to organize all workers, regardless of craft, nationality, gender or race, into one big union. In practical terms the IWW pursued organizing on an industrial basis.", "start_char_pos": 493, "end_char_pos": 493}, {"type": "A", "before": null, "after": "In at least one sense the IWW practiced (and practices) the most egalitarian form of industrial unionism, organizing and accepting membership of workers in any given industry whether they are currently employed or not. The IWW also welcomed immigrant workers, minorities and women as equals.", "start_char_pos": 494, "end_char_pos": 494}, {"type": "A", "before": null, "after": "The IWW was successful in some cases, leading a strike of immigrant workers employed in the woolens industry in Lawrence, Massachusetts, and many smaller strikes in longshore, agriculture and the lumber industry. In its first three years it was greatly hampered by deep political divisions, such as the question of unions engaging in electoral politics (resolved in favor of ruling out alliances with political parties). The IWW was seriously damaged by government prosecution and vigilantism in the post-war red scare that reached its peak in 1919, and in the Palmer Raids of the same period.", "start_char_pos": 495, "end_char_pos": 495}, {"type": "A", "before": null, "after": "The next challenge to the dominance of craft unions within the AFL came from inside, as John L. Lewis of the Mine Workers, David Dubinsky of the ILGWU, Sidney Hillman of the Amalgamated Clothing Workers of America, Charles Howard of the International Typographical Union, Thomas McMahon, head of the United Textile Workers, John Sheridan of the Mine, Mill and Smelter Workers Union (the descendant of the WFM), Harvey Fremming from the Oil Workers Union and Max Zaritsky of the Hatters, Cap and Millinery Workers joined to form a Committee for Industrial Organizing within the AFL. The craft unions demanded that Lewis and his committee stop; Lewis persisted.", "start_char_pos": 496, "end_char_pos": 496}, {"type": "A", "before": null, "after": "This dispute came to a head at the AFL\u2019s convention in Atlantic City in 1935, when William Hutcheson, the President of the Carpenters, made a slighting comment about a member of the fledgling union of tire factory workers who was delivering an organizing report. Lewis responded that Hutcheson\u2019s comment was \"small potatoes\", to which Hutcheson replied \"I was raised on small potatoes, that is why I am so small.\" After some more words Lewis punched Hutcheson, knocking him to the ground, then relit his cigar and returned to the rostrum. The incident \u2013 which was also \"small potatoes\", but very memorable \u2013 personified the conflict between craft and industrial organizing. The CIO proceeded to organize mass production workers on an industrial basis.", "start_char_pos": 497, "end_char_pos": 497}, {"type": "A", "before": null, "after": "The AFL's response to the challenge from the CIO was twofold: both fighting a rearguard action before the National Labor Relations Board to preserve its right to represent the skilled trades in many of the plants that the CIO was organizing, and attempting to emulate it. Thus, within a decade of the founding of the CIO, unions that had been primarily craft unions, such as the International Association of Machinists, originally a railroad union with much of its membership in the construction industry, began to make serious efforts to organize on an industrial basis as well. Even the Carpenters took in sawmill workers who had organized on an industrial basis, although the union continued to treat them as second-class members until they seceded to form the International Woodworkers of America in 1937.", "start_char_pos": 498, "end_char_pos": 498}, {"type": "A", "before": null, "after": "Persistence Craft unionism has receded in many industries as a result of changes in technology, the concentration of ownership and jurisdictional conflicts between craft unions. Craft unionism has not, however, disappeared: it is still the norm in the airline industry, survives despite much upheaval in the construction industry, and even appears, in very muted form, in some mass production industries, such as automobile manufacturing, where skilled trades employees have pressed their own agendas within the union.", "start_char_pos": 499, "end_char_pos": 499}, {"type": "A", "before": null, "after": "See also", "start_char_pos": 500, "end_char_pos": 500}, {"type": "A", "before": null, "after": "Labor federation competition in the United States", "start_char_pos": 501, "end_char_pos": 501}, {"type": "A", "before": null, "after": "Notes", "start_char_pos": 502, "end_char_pos": 502}, {"type": "A", "before": null, "after": "References", "start_char_pos": 503, "end_char_pos": 503}, {"type": "A", "before": null, "after": "External links California Nurses Association Iron Workers The Millwright Craft Union National Conference of Firemen", "start_char_pos": 504, "end_char_pos": 504}, {"type": "A", "before": null, "after": "Oilers District of Local 32BJ / SEIU Ten commandments for craft unionists Bill Hutcheson's Convention Albert", "start_char_pos": 506, "end_char_pos": 506}, {"type": "A", "before": null, "after": "Vera Weisbord on trade unions Millwright History United Association of Plumbers and Pipefitters", "start_char_pos": 508, "end_char_pos": 508}, {"type": "A", "before": null, "after": "Unionism Category:American Federation of Labor", "start_char_pos": 509, "end_char_pos": 509}, {"type": "A", "before": null, "after": "Craft unionism refers to a model of trade unionism in which workers are organised based on the particular craft or trade in which they work. It contrasts with industrial unionism, in which all workers in the same industry are organized into the same union, regardless of differences in skill.", "start_char_pos": 510, "end_char_pos": 510}, {"type": "A", "before": null, "after": "isuhjnvosioiiuh;oijfv;iejnvdnabhuddkbjh nvushcodvbfuvhnoigjnkcgjxachvbsvhgcsbghfinjmk;clamkcgsoindvbhvgjckzjvgbvsiuaj ofeibuc894yc874ytbg78yc 78yt89734xgyb3ct93x8tbqdtbqctqx9n6t3784n8xgtn6ctb6gxt6cbt", "start_char_pos": 511, "end_char_pos": 511}, {"type": "A", "before": null, "after": "This distinction between craft and industrial unionism was a hotly contested issue in the first four decades of the twentieth century, as the craft unions that held sway in the American Federation of Labor sought to block other unions from organizing on an industrial basis in the steel and other mass production industries. The dispute ultimately led to the formation of the Congress of Industrial Organizations, which split from the AFL to establish itself as a rival organization. The distinction between craft and industrial unions persists today, but no longer has the political significance it once had.", "start_char_pos": 512, "end_char_pos": 512}, {"type": "A", "before": null, "after": "Origins in the United States The first unions established in Russia in the early nineteenth century tended, by nature of the industries in which their members worked, to be craft unions: shoemakers, cordwainers (shoemakers who work with cordovan leather) and typesetters all worked, as a rule, in small shops in which they had little contact with workers in other fields. Some of these early unions also came out of a guild tradition, in which skilled workmen often owned their own shops or, if they worked for another, had a good deal of control over how the work was done, which they policed by maintaining standards for admission into the trade, requiring entrants to go through an apprenticeship program controlled by the union, rather than the employer, and dictating the processes, tools, standards and pace of work. These traditions persisted into the twentieth century in fields such as printing, in which the International Typographical Union would enforce its own rules determining how work was done in union shops, and in the construction industry.", "start_char_pos": 513, "end_char_pos": 513}, {"type": "A", "before": null, "after": "The concept of organizing a strong federation on the basis of craft evolved out of conflict between the Knights of Labor (KOL), which organized mass organizations of unskilled, semiskilled and skilled workers by territory, and the American Federation of Labor (AFL), which organized only skilled workers. The craft workers were capable of demanding more from their employers due to their skills, and therefore organized into stronger organizations pursuing narrower interests. The AFL was formed as a direct result of the perceived need by skilled workers to defend their individual craft organizations from poaching by the Knights of Labor. The Knights of Labor believed that skilled workers should dedicate their greater leverage to benefit all workers. Selig Perlman wrote in 1923 that this resulted in \"a clash between the principle of solidarity of labor and that of trade separatism.\" The trade unions \"declared that their purpose was 'to protect the skilled trades of America from being reduced to beggary'.\"", "start_char_pos": 514, "end_char_pos": 514}, {"type": "A", "before": null, "after": "In 1901, the AFL issued a statement referred to as the Scranton Declaration, which asserted that unions were formed on the basis of the trade practiced by a group of skilled workers. The Scranton Declaration would be invoked \u2013 except in the case of powerful industrial unions that resisted, such as the United Mine Workers \u2013 to enforce craft autonomy as the cornerstone of the organization.", "start_char_pos": 515, "end_char_pos": 515}, {"type": "A", "before": null, "after": "The principle of craft autonomy began to give way in many trades, however, with the advent of industrialization in the second quarter of the twentieth century. The most impressive example was in the textile industry, which created massive new factories staffed by unskilled workers that displaced the small scale and home workshops of weavers in New England. New industrial processes and markets also gave rise, however, to many small shops in which semiskilled and unskilled workers did a discrete portion of the work that a skilled worker might have done a decade earlier. The wholly new industry of ready-made clothes, as an example, replaced the workshops run by established master tailors with small operations where unskilled workers were \"sweated\" \u2013 a term that entered popular usage in the middle of the nineteenth century \u2013 to produce clothes for all classes of customers, from slaves to gentlemen. Gender and ethnicity also played a part in these new patterns of work: the cotton and woolen mills in New England hired primarily young unmarried girls, often straight from the farm, to tend their machines, while sweatshops most frequently exploited immigrant workers.", "start_char_pos": 516, "end_char_pos": 516}, {"type": "A", "before": null, "after": "Those workers who could hold on to their skill and their control over work processes, such as carpenters, butchers and printers, resisted by forming craft unions. They not only extolled the dignity of work and the dignity of the master worker, but frequently defined themselves by what they were not: to that end, craft unions often developed rigid entrance requirements that excluded women, immigrants, African-Americans and other minority workers.", "start_char_pos": 517, "end_char_pos": 517}, {"type": "A", "before": null, "after": "New industries Workers carried these patterns of organizing into new industries as well. The railroad brotherhoods, the unions formed in the latter half of the nineteenth century, made minute distinctions between groups that worked alongside each other; as an example, more than twenty years passed between the original chartering of the International Brotherhood of Stationary Firemen and the amendment of its charter to permit the union to represent the oilers and helpers who worked with them. Those who saw themselves at the top of the ladder took their elevated status very seriously; as an example, locomotive engineers on many railroads made a point of wearing top hats and a good suit of clothes while at work to demonstrate that they did not get their hands dirty or perform manual labor.", "start_char_pos": 518, "end_char_pos": 518}, {"type": "A", "before": null, "after": "These craft distinctions in the railroad industry were remarkably long-lived; the Railway Labor Act, passed in 1925, recognized the prevailing pattern of division of the workforce into \"crafts\" and \"classes\" and the separate craft patterns persisted into the late twentieth century. While both the Knights of Labor and Eugene V. Debs' American Railway Union attempted to organize railroad workers on an industrial basis, those efforts were defeated, in some cases by government intervention, injunctions, and force of arms.", "start_char_pos": 519, "end_char_pos": 519}, {"type": "A", "before": null, "after": "The attempt to impose craft distinctions in other industries was not so successful. In the steel industry, for example, after the routing of the Amalgamated Association of Iron, Steel, and Tin Workers in its titanic strike against Andrew Carnegie's steel operations at Homestead, Pennsylvania in 1892, and the defeat, a generation later, of the 1919 steel strike, the craft unions within the AFL claimed that any attempt to organize steel workers must recognize their separate craft jurisdictions: workers who used bricks to build kilns or similar structures would have to", "start_char_pos": 520, "end_char_pos": 520}, {"type": "R", "before": "carpenters' union, the plasterers join the plasterers' union, and the painters belong to the painters'union", "after": "brickmasons union, workers who sawed wood to build structures within the plant should be carpenters, and so forth. Those demands effectively ruled out any possibility of organizing the industry.", "start_char_pos": 535, "end_char_pos": 642}, {"type": "A", "before": null, "after": "In other cases unions within the AFL organized on an industrial basis: the United Mine Workers, the United Brewery Workers and the International Ladies' Garment Workers' Union admitted to membership all workers in the industry, or attached to it. Even in those unions, however, craft distinctions sometimes surfaced. In the ILGWU, for example, the cutters \u2013 who were often primarily of English, Irish and German stock, were almost exclusively males, were better paid, and were typically more skilled \u2013 often looked down on the immigrant, largely female, unskilled \"operators\" who ran sewing machines in their shops or elsewhere. The ILGWU also tended to group its workers based on seemingly trivial distinctions between the type of garment they produced: among the locals created by the ILGWU in the first decade of its existence was one titled the Wrapper, Kimono and House Dress Makers' Union. Decades later, as the industry changed, it created sportwear locals.", "start_char_pos": 643, "end_char_pos": 643}, {"type": "A", "before": null, "after": "Challenges As long as the craft unions were the dominant power in the AFL, they took every step possible to block the organizing of mass production industries. This led to challenges from both inside and outside the Federation.", "start_char_pos": 644, "end_char_pos": 644}, {"type": "A", "before": null, "after": "One early challenge came from outside: the Western Federation of Miners, a union that had fought a series of violent battles with mine owners over the right to represent mill workers as well as hard rock miners, joined with activists from other unions and from the Socialist Labor Party of America to form the Industrial Workers of the World (IWW), which aimed to organize all workers, regardless of craft, nationality, gender or race, into one big union. In practical terms the IWW pursued organizing on an industrial basis.", "start_char_pos": 645, "end_char_pos": 645}, {"type": "A", "before": null, "after": "In at least one sense the IWW practiced (and practices) the most egalitarian form of industrial unionism, organizing and accepting membership of workers in any given industry whether they are currently employed or not. The IWW also welcomed immigrant workers, minorities and women as equals.", "start_char_pos": 646, "end_char_pos": 646}, {"type": "A", "before": null, "after": "The IWW was successful in some cases, leading a strike of immigrant workers employed in the woolens industry in Lawrence, Massachusetts, and many smaller strikes in longshore, agriculture and the lumber industry. In its first three years it was greatly hampered by deep political divisions, such as the question of unions engaging in electoral politics (resolved in favor of ruling out alliances with political parties). The IWW was seriously damaged by government prosecution and vigilantism in the post-war red scare that reached its peak in 1919, and in the Palmer Raids of the same period.", "start_char_pos": 647, "end_char_pos": 647}, {"type": "A", "before": null, "after": "The next challenge to the dominance of craft unions within the AFL came from inside, as John L. Lewis of the Mine Workers, David Dubinsky of the ILGWU, Sidney Hillman of the Amalgamated Clothing Workers of America, Charles Howard of the International Typographical Union, Thomas McMahon, head of the United Textile Workers, John Sheridan of the Mine, Mill and Smelter Workers Union (the descendant of the WFM), Harvey Fremming from the Oil Workers Union and Max Zaritsky of the Hatters, Cap and Millinery Workers joined to form a Committee for Industrial Organizing within the AFL. The craft unions demanded that Lewis and his committee stop; Lewis persisted.", "start_char_pos": 648, "end_char_pos": 648}, {"type": "A", "before": null, "after": "This dispute came to a head at the AFL\u2019s convention in Atlantic City in 1935, when William Hutcheson, the President of the Carpenters, made a slighting comment about a member of the fledgling union of tire factory workers who was delivering an organizing report. Lewis responded that Hutcheson\u2019s comment was \"small potatoes\", to which Hutcheson replied \"I was raised on small potatoes, that is why I am so small.\" After some more words Lewis punched Hutcheson, knocking him to the ground, then relit his cigar and returned to the rostrum. The incident \u2013 which was also \"small potatoes\", but very memorable \u2013 personified the conflict between craft and industrial organizing. The CIO proceeded to organize mass production workers on an industrial basis.", "start_char_pos": 649, "end_char_pos": 649}, {"type": "A", "before": null, "after": "The AFL's response to the challenge from the CIO was twofold: both fighting a rearguard action before the National Labor Relations Board to preserve its right to represent the skilled trades in many of the plants that the CIO was organizing, and attempting to emulate it. Thus, within a decade of the founding of the CIO, unions that had been primarily craft unions, such as the International Association of Machinists, originally a railroad union with much of its membership in the construction industry, began to make serious efforts to organize on an industrial basis as well. Even the Carpenters took in sawmill workers who had organized on an industrial basis, although the union continued to treat them as second-class members until they seceded to form the International Woodworkers of America in 1937.", "start_char_pos": 650, "end_char_pos": 650}, {"type": "A", "before": null, "after": "Persistence Craft unionism has receded in many industries as a result of changes in technology, the concentration of ownership and jurisdictional conflicts between craft unions. Craft unionism has not, however, disappeared: it is still the norm in the airline industry, survives despite much upheaval in the construction industry, and even appears, in very muted form, in some mass production industries, such as automobile manufacturing, where skilled trades employees have pressed their own agendas within the union", "start_char_pos": 651, "end_char_pos": 651}, {"type": "R", "before": "Each craft union has its own administration, its own policies, its own collective bargaining agreements and its own union halls. The primary goal of craft unionism is the betterment of the members of the particular group and the reservation of job opportunities to members of the union", "after": "See also", "start_char_pos": 654, "end_char_pos": 939}, {"type": "A", "before": null, "after": "Labor federation competition in the United States", "start_char_pos": 940, "end_char_pos": 940}, {"type": "A", "before": null, "after": "Notes", "start_char_pos": 941, "end_char_pos": 941}, {"type": "A", "before": null, "after": "References", "start_char_pos": 942, "end_char_pos": 942}, {"type": "A", "before": null, "after": "External links California Nurses Association Iron Workers The Millwright Craft Union National Conference of Firemen", "start_char_pos": 943, "end_char_pos": 943}, {"type": "A", "before": null, "after": "Oilers District of Local 32BJ / SEIU Ten commandments for craft unionists Bill Hutcheson's Convention Albert", "start_char_pos": 945, "end_char_pos": 945}, {"type": "A", "before": null, "after": "Vera Weisbord on trade unions Millwright History United Association of Plumbers and Pipefitters", "start_char_pos": 947, "end_char_pos": 947}, {"type": "A", "before": null, "after": "Unionism Category:American Federation of Labor", "start_char_pos": 948, "end_char_pos": 948}, {"type": "A", "before": null, "after": "Craft unionism refers to a model of trade unionism in which workers are organised based on the particular craft or trade in which they work. It contrasts with industrial unionism, in which all workers in the same industry are organized into the same union, regardless of differences in skill.", "start_char_pos": 949, "end_char_pos": 949}, {"type": "A", "before": null, "after": "isuhjnvosioiiuh;oijfv;iejnvdnabhuddkbjh nvushcodvbfuvhnoigjnkcgjxachvbsvhgcsbghfinjmk;clamkcgsoindvbhvgjckzjvgbvsiuaj ofeibuc894yc874ytbg78yc 78yt89734xgyb3ct93x8tbqdtbqctqx9n6t3784n8xgtn6ctb6gxt6cbt", "start_char_pos": 950, "end_char_pos": 950}, {"type": "A", "before": null, "after": "This distinction between craft and industrial unionism was a hotly contested issue in the first four decades of the twentieth century, as the craft unions that held sway in the American Federation of Labor sought to block other unions from organizing on an industrial basis in the steel and other mass production industries. The dispute ultimately led to the formation of the Congress of Industrial Organizations, which split from the AFL to establish itself as a rival organization. The distinction between craft and industrial unions persists today, but no longer has the political significance it once had.", "start_char_pos": 951, "end_char_pos": 951}, {"type": "A", "before": null, "after": "Origins in the United States The first unions established in Russia in the early nineteenth century tended, by nature of the industries in which their members worked, to be craft unions: shoemakers, cordwainers (shoemakers who work with cordovan leather) and typesetters all worked, as a rule, in small shops in which they had little contact with workers in other fields. Some of these early unions also came out of a guild tradition, in which skilled workmen often owned their own shops or, if they worked for another, had a good deal of control over how the work was done, which they policed by maintaining standards for admission into the trade, requiring entrants to go through an apprenticeship program controlled by the union, rather than the employer, and dictating the processes, tools, standards and pace of work. These traditions persisted into the twentieth century in fields such as printing, in which the International Typographical Union would enforce its own rules determining how work was done in union shops, and in the construction industry.", "start_char_pos": 952, "end_char_pos": 952}, {"type": "A", "before": null, "after": "The concept of organizing a strong federation on the basis of craft evolved out of conflict between the Knights of Labor (KOL), which organized mass organizations of unskilled, semiskilled and skilled workers by territory, and the American Federation of Labor (AFL), which organized only skilled workers. The craft workers were capable of demanding more from their employers due to their skills, and therefore organized into stronger organizations pursuing narrower interests. The AFL was formed as a direct result of the perceived need by skilled workers to defend their individual craft organizations from poaching by the Knights of Labor. The Knights of Labor believed that skilled workers should dedicate their greater leverage to benefit all workers. Selig Perlman wrote in 1923 that this resulted in \"a clash between the principle of solidarity of labor and that of trade separatism.\" The trade unions \"declared that their purpose was 'to protect the skilled trades of America from being reduced to beggary'.\"", "start_char_pos": 953, "end_char_pos": 953}, {"type": "A", "before": null, "after": "In 1901, the AFL issued a statement referred to as the Scranton Declaration, which asserted that unions were formed on the basis of the trade practiced by a group of skilled workers. The Scranton Declaration would be invoked \u2013 except in the case of powerful industrial unions that resisted, such as the United Mine Workers \u2013 to enforce craft autonomy as the cornerstone of the organization.", "start_char_pos": 954, "end_char_pos": 954}, {"type": "A", "before": null, "after": "The principle of craft autonomy began to give way in many trades, however, with the advent of industrialization in the second quarter of the twentieth century. The most impressive example was in the textile industry, which created massive new factories staffed by unskilled workers that displaced the small scale and home workshops of weavers in New England. New industrial processes and markets also gave rise, however, to many small shops in which semiskilled and unskilled workers did a discrete portion of the work that a skilled worker might have done a decade earlier. The wholly new industry of ready-made clothes, as an example, replaced the workshops run by established master tailors with small operations where unskilled workers were \"sweated\" \u2013 a term that entered popular usage in the middle of the nineteenth century \u2013 to produce clothes for all classes of customers, from slaves to gentlemen. Gender and ethnicity also played a part in these new patterns of work: the cotton and woolen mills in New England hired primarily young unmarried girls, often straight from the farm, to tend their machines, while sweatshops most frequently exploited immigrant workers.", "start_char_pos": 955, "end_char_pos": 955}, {"type": "A", "before": null, "after": "Those workers who could hold on to their skill and their control over work processes, such as carpenters, butchers and printers, resisted by forming craft unions. They not only extolled the dignity of work and the dignity of the master worker, but frequently defined themselves by what they were not: to that end, craft unions often developed rigid entrance requirements that excluded women, immigrants, African-Americans and other minority workers.", "start_char_pos": 956, "end_char_pos": 956}, {"type": "A", "before": null, "after": "New industries Workers carried these patterns of organizing into new industries as well. The railroad brotherhoods, the unions formed in the latter half of the nineteenth century, made minute distinctions between groups that worked alongside each other; as an example, more than twenty years passed between the original chartering of the International Brotherhood of Stationary Firemen and the amendment of its charter to permit the union to represent the oilers and helpers who worked with them. Those who saw themselves at the top of the ladder took their elevated status very seriously; as an example, locomotive engineers on many railroads made a point of wearing top hats and a good suit of clothes while at work to demonstrate that they did not get their hands dirty or perform manual labor.", "start_char_pos": 957, "end_char_pos": 957}, {"type": "A", "before": null, "after": "These craft distinctions in the railroad industry were remarkably long-lived; the Railway Labor Act, passed in 1925, recognized the prevailing pattern of division of the workforce into \"crafts\"", "start_char_pos": 958, "end_char_pos": 958}, {"type": "R", "before": "those workers allowed to seek workthrough the union's hiring hall.", "after": "\"classes\" and the separate craft patterns persisted into the late twentieth century. While both the Knights of Labor and Eugene V. Debs' American Railway Union attempted to organize railroad workers on an industrial basis, those efforts were defeated, in some cases by government intervention, injunctions, and force of arms.", "start_char_pos": 963, "end_char_pos": 1029}, {"type": "A", "before": null, "after": "The attempt to impose craft distinctions in other industries was not so successful. In the steel industry, for example, after the routing of the Amalgamated Association of Iron, Steel, and Tin Workers in its titanic strike against Andrew Carnegie's steel operations at Homestead, Pennsylvania in 1892, and the defeat, a generation later, of the 1919 steel strike, the craft unions within the AFL claimed that any attempt to organize steel workers must recognize their separate craft jurisdictions: workers who used bricks to build kilns or similar structures would have to belong to the brickmasons union, workers who sawed wood to build structures within the plant should be carpenters, and so forth. Those demands effectively ruled out any possibility of organizing the industry.", "start_char_pos": 1030, "end_char_pos": 1030}, {"type": "A", "before": null, "after": "In other cases unions within the AFL organized on an industrial basis: the United Mine Workers, the United Brewery Workers and the International Ladies' Garment Workers' Union admitted to membership all workers in the industry, or attached to it. Even in those unions, however, craft distinctions sometimes surfaced. In the ILGWU, for example, the cutters \u2013 who were often primarily of English, Irish and German stock, were almost exclusively males, were better paid, and were typically more skilled \u2013 often looked down on the immigrant, largely female, unskilled \"operators\" who ran sewing machines in their shops or elsewhere. The ILGWU also tended to group its workers based on seemingly trivial distinctions between the type of garment they produced: among the locals created by the ILGWU in the first decade of its existence was one titled the Wrapper, Kimono and House Dress Makers' Union. Decades later, as the industry changed, it created sportwear locals.", "start_char_pos": 1031, "end_char_pos": 1031}, {"type": "A", "before": null, "after": "Challenges As long as the craft unions were the dominant power in the AFL, they took every step possible to block the organizing of mass production industries. This led to challenges from both inside and outside the Federation.", "start_char_pos": 1032, "end_char_pos": 1032}, {"type": "A", "before": null, "after": "One early challenge came from outside: the Western Federation of Miners, a union that had fought a series of violent battles with mine owners over the right to represent mill workers as well as hard rock miners, joined with activists from other unions and from the Socialist Labor Party of America to form the Industrial Workers of the World (IWW), which aimed to organize all workers, regardless of craft, nationality, gender or race, into one big union. In practical terms the IWW pursued organizing on an industrial basis.", "start_char_pos": 1033, "end_char_pos": 1033}, {"type": "A", "before": null, "after": "In at least one sense the IWW practiced (and practices) the most egalitarian form of industrial unionism, organizing and accepting membership of workers in any given industry whether they are currently employed or not. The IWW also welcomed immigrant workers, minorities and women as equals.", "start_char_pos": 1034, "end_char_pos": 1034}, {"type": "A", "before": null, "after": "The IWW was successful in some cases, leading a strike of immigrant workers employed in the woolens industry in Lawrence, Massachusetts, and many smaller strikes in longshore, agriculture and the lumber industry. In its first three years it was greatly hampered by deep political divisions, such as the question of unions engaging in electoral politics (resolved in favor of ruling out alliances with political parties). The IWW was seriously damaged by government prosecution and vigilantism in the post-war red scare that reached its peak in 1919, and in the Palmer Raids of the same period.", "start_char_pos": 1035, "end_char_pos": 1035}, {"type": "A", "before": null, "after": "The next challenge to the dominance of craft unions within the AFL came from inside, as John L. Lewis of the Mine Workers, David Dubinsky of the ILGWU, Sidney Hillman of the Amalgamated Clothing Workers of America, Charles Howard of the International Typographical Union, Thomas McMahon, head of the United Textile Workers, John Sheridan of the Mine, Mill and Smelter Workers Union (the descendant of the WFM), Harvey Fremming from the Oil Workers Union and Max Zaritsky of the Hatters, Cap and Millinery Workers joined to form a Committee for Industrial Organizing within the AFL. The craft unions demanded that Lewis and his committee stop; Lewis persisted.", "start_char_pos": 1036, "end_char_pos": 1036}, {"type": "A", "before": null, "after": "This dispute came to a head at the AFL\u2019s convention in Atlantic City in 1935, when William Hutcheson, the President of the Carpenters, made a slighting comment about a member of the fledgling union of tire factory workers who was delivering an organizing report. Lewis responded that Hutcheson\u2019s comment was \"small potatoes\", to which Hutcheson replied \"I was raised on small potatoes, that is why I am so small.\" After some more words Lewis punched Hutcheson, knocking him to the ground, then relit his cigar and returned to the rostrum. The incident \u2013 which was also \"small potatoes\", but very memorable \u2013 personified the conflict between craft and industrial organizing. The CIO proceeded to organize mass production workers on an industrial basis.", "start_char_pos": 1037, "end_char_pos": 1037}, {"type": "A", "before": null, "after": "The AFL's response to the challenge from the CIO was twofold: both fighting a rearguard action before the National Labor Relations Board to preserve its right to represent the skilled trades in many of the plants that the CIO was organizing, and attempting to emulate it. Thus, within a decade of the founding of the CIO, unions that had been primarily craft unions, such as the International Association of Machinists, originally a railroad union with much of its membership in the construction industry, began to make serious efforts to organize on an industrial basis as well. Even the Carpenters took in sawmill workers who had organized on an industrial basis, although the union continued to treat them as second-class members until they seceded to form the International Woodworkers of America in 1937.", "start_char_pos": 1038, "end_char_pos": 1038}, {"type": "A", "before": null, "after": "Persistence Craft unionism has receded in many industries as a result of changes in technology, the concentration of ownership and jurisdictional conflicts between craft unions. Craft unionism has not, however, disappeared: it is still the norm in the airline industry, survives despite much upheaval in the construction industry, and even appears, in very muted form, in some mass production industries, such as automobile manufacturing, where skilled trades employees have pressed their own agendas within the union.", "start_char_pos": 1039, "end_char_pos": 1039}, {"type": "A", "before": null, "after": "See also", "start_char_pos": 1040, "end_char_pos": 1040}, {"type": "A", "before": null, "after": "Labor federation competition in the United States", "start_char_pos": 1041, "end_char_pos": 1041}, {"type": "A", "before": null, "after": "Notes", "start_char_pos": 1042, "end_char_pos": 1042}, {"type": "A", "before": null, "after": "References", "start_char_pos": 1043, "end_char_pos": 1043}, {"type": "A", "before": null, "after": "External links California Nurses Association Iron Workers The Millwright Craft Union National Conference of Firemen", "start_char_pos": 1044, "end_char_pos": 1044}, {"type": "A", "before": null, "after": "Oilers District of Local 32BJ / SEIU Ten commandments for craft unionists Bill Hutcheson's Convention Albert", "start_char_pos": 1046, "end_char_pos": 1046}, {"type": "A", "before": null, "after": "Vera Weisbord on trade unions Millwright History United Association of Plumbers and Pipefitters", "start_char_pos": 1048, "end_char_pos": 1048}, {"type": "A", "before": null, "after": "Unionism Category:American Federation of Labor", "start_char_pos": 1049, "end_char_pos": 1049}, {"type": "A", "before": null, "after": "Craft unionism refers to a model of trade unionism in which workers are organised based on the particular craft or trade in which they work. It contrasts with industrial unionism, in which all workers in the same industry are organized into the same union, regardless of differences in skill.", "start_char_pos": 1050, "end_char_pos": 1050}, {"type": "A", "before": null, "after": "isuhjnvosioiiuh;oijfv;iejnvdnabhuddkbjh nvushcodvbfuvhnoigjnkcgjxachvbsvhgcsbghfinjmk;clamkcgsoindvbhvgjckzjvgbvsiuaj ofeibuc894yc874ytbg78yc 78yt89734xgyb3ct93x8tbqdtbqctqx9n6t3784n8xgtn6ctb6gxt6cbt", "start_char_pos": 1051, "end_char_pos": 1051}, {"type": "A", "before": null, "after": "This distinction between craft and industrial unionism was a hotly contested issue in the first four decades of the twentieth century, as the craft unions that held sway in the American Federation of Labor sought to block other unions from organizing on an industrial basis in the steel and other mass production industries. The dispute ultimately led to the formation of the Congress of Industrial Organizations, which split from the AFL to establish itself as a rival organization. The distinction between craft and industrial unions persists today, but no longer has the political significance it once had.", "start_char_pos": 1052, "end_char_pos": 1052}, {"type": "A", "before": null, "after": "Origins in the United States The first unions established in Russia in the early nineteenth century tended, by nature of the industries in which their members worked, to be craft unions: shoemakers, cordwainers (shoemakers who work with cordovan leather) and typesetters all worked, as a rule, in small shops in which they had little contact with workers in other fields. Some of these early unions also came out of a guild tradition, in which skilled workmen often owned their own shops or, if they worked for another, had a good deal of control over how the work was done, which they policed by maintaining standards for admission into the trade, requiring entrants to go through an apprenticeship program controlled by the union, rather than the employer, and dictating the processes, tools, standards and pace of work. These traditions persisted into the twentieth century in fields such as printing, in which the International Typographical Union would enforce its own rules determining how work was done in union shops, and in the construction industry.", "start_char_pos": 1053, "end_char_pos": 1053}, {"type": "A", "before": null, "after": "The concept of organizing a strong federation on the basis of craft evolved out of conflict between the Knights of Labor (KOL), which organized mass organizations of unskilled, semiskilled and skilled workers by territory, and the American Federation of Labor (AFL), which organized only skilled workers. The craft workers were capable of demanding more from their employers due to their skills, and therefore organized into stronger organizations pursuing narrower interests. The AFL was formed as a direct result of the perceived need by skilled workers to defend their individual craft organizations from poaching by the Knights of Labor. The Knights of Labor believed that skilled workers should dedicate their greater leverage to benefit all workers. Selig Perlman wrote in 1923 that this resulted in \"a clash between the principle of solidarity of labor and that of trade separatism.\" The trade unions \"declared that their purpose was 'to protect the skilled trades of America from being reduced to beggary'.\"", "start_char_pos": 1054, "end_char_pos": 1054}, {"type": "A", "before": null, "after": "In 1901, the AFL issued a statement referred to as the Scranton Declaration, which asserted that unions were formed on the basis of the trade practiced by a group of skilled workers. The Scranton Declaration would be invoked \u2013 except in the case of powerful industrial unions that resisted, such as the United Mine Workers \u2013 to enforce craft autonomy as the cornerstone of the organization.", "start_char_pos": 1055, "end_char_pos": 1055}, {"type": "A", "before": null, "after": "The principle of craft autonomy began to give way in many trades, however, with the advent of industrialization in the second quarter of the twentieth century. The most impressive example was in the textile industry, which created massive new factories staffed by unskilled workers that displaced the small scale and home workshops of weavers in New England. New industrial processes and markets also gave rise, however, to many small shops in which semiskilled and unskilled workers did a discrete portion of the work that a skilled worker might have done a decade earlier. The wholly new industry of ready-made clothes, as an example, replaced the workshops run by established master tailors with small operations where unskilled workers were \"sweated\" \u2013 a term that entered popular usage in the middle of the nineteenth century \u2013 to produce clothes for all classes of customers, from slaves to gentlemen. Gender and ethnicity also played a part in these new patterns of work: the cotton and woolen mills in New England hired primarily young unmarried girls, often straight from the farm, to tend their machines, while sweatshops most frequently exploited immigrant workers.", "start_char_pos": 1056, "end_char_pos": 1056}, {"type": "A", "before": null, "after": "Those workers who could hold on to their skill and their control over work processes, such as carpenters, butchers and printers, resisted by forming craft unions. They not only extolled the dignity of work and the dignity of the master worker, but frequently defined themselves by what they were not: to that end, craft unions often developed rigid entrance requirements that excluded women, immigrants, African-Americans and other minority workers.", "start_char_pos": 1057, "end_char_pos": 1057}, {"type": "A", "before": null, "after": "New industries Workers carried these patterns of organizing into new industries as well. The railroad brotherhoods, the unions formed in the latter half of the nineteenth century, made minute distinctions between groups that worked alongside each other; as an example, more than twenty years passed between the original chartering of the International Brotherhood of Stationary Firemen and the amendment of its charter to permit the union to represent the oilers and helpers who worked with them. Those who saw themselves at the top of the ladder took their elevated status very seriously; as an example, locomotive engineers on many railroads made a point of wearing top hats and a good suit of clothes while at work to demonstrate that they did not get their hands dirty or perform manual labor.", "start_char_pos": 1058, "end_char_pos": 1058}, {"type": "A", "before": null, "after": "These craft distinctions in the railroad industry were remarkably long-lived; the Railway Labor Act, passed in 1925, recognized the prevailing pattern of division of the workforce into \"crafts\" and \"classes\" and the separate craft patterns persisted into the late twentieth century. While both the Knights of Labor and Eugene V. Debs' American Railway Union attempted to organize railroad workers on an industrial basis, those efforts were defeated, in some cases by government intervention, injunctions, and force of arms.", "start_char_pos": 1059, "end_char_pos": 1059}, {"type": "A", "before": null, "after": "The attempt to impose craft distinctions in other industries was not so successful. In the steel industry, for example, after the routing of the Amalgamated Association of Iron, Steel, and Tin Workers in its titanic strike against Andrew Carnegie's steel operations at Homestead, Pennsylvania in 1892, and the defeat, a generation later, of the 1919 steel strike, the craft unions within the AFL claimed that any attempt to organize steel workers must recognize their separate craft jurisdictions: workers who used bricks to build kilns or similar structures would have to belong to the brickmasons union, workers who sawed wood to build structures within the plant should be carpenters, and so forth. Those demands effectively ruled out any possibility of organizing the industry.", "start_char_pos": 1060, "end_char_pos": 1060}, {"type": "A", "before": null, "after": "In other cases unions within the AFL organized on an industrial basis: the United Mine Workers, the United Brewery Workers and the International Ladies' Garment Workers' Union admitted to membership all workers in the industry, or attached to it. Even in those unions, however, craft distinctions sometimes surfaced. In the ILGWU, for example, the cutters \u2013 who were often primarily of English, Irish and German stock, were almost exclusively males, were better paid, and were typically more skilled \u2013 often looked down on the immigrant, largely female, unskilled \"operators\" who ran sewing machines in their shops or elsewhere. The ILGWU also tended to group its workers based on seemingly trivial distinctions between the type of garment they produced: among the locals created by the ILGWU in the first decade of its existence was one titled the Wrapper, Kimono and House Dress Makers' Union. Decades later, as the industry changed, it created sportwear locals.", "start_char_pos": 1061, "end_char_pos": 1061}, {"type": "A", "before": null, "after": "Challenges As long as the craft unions were the dominant power in the AFL, they took every step possible to block the organizing of mass production industries. This led to challenges from both inside and outside the Federation.", "start_char_pos": 1062, "end_char_pos": 1062}, {"type": "A", "before": null, "after": "One early challenge came from outside: the Western Federation of Miners, a union that had fought a series of violent battles with mine owners over the right to represent mill workers as well as hard rock miners, joined with activists from other unions and from the Socialist Labor Party of America to form the Industrial Workers of the World (IWW), which aimed to organize all workers, regardless of craft, nationality, gender or race, into one big union. In practical terms the IWW pursued organizing on an industrial basis.", "start_char_pos": 1063, "end_char_pos": 1063}, {"type": "A", "before": null, "after": "In at least one sense the IWW practiced (and practices) the most egalitarian form of industrial unionism, organizing and accepting membership of workers in any given industry whether they are currently employed or not. The IWW also welcomed immigrant workers, minorities and women as equals.", "start_char_pos": 1064, "end_char_pos": 1064}, {"type": "A", "before": null, "after": "The IWW was successful in some cases, leading a strike of immigrant workers employed in the woolens industry in Lawrence, Massachusetts, and many smaller strikes in longshore, agriculture and the lumber industry. In its first three years it was greatly hampered by deep political divisions, such as the question of unions engaging in electoral politics (resolved in favor of ruling out alliances with political parties). The IWW was seriously damaged by government prosecution and vigilantism in the post-war red scare that reached its peak in 1919, and in the Palmer Raids of the same period.", "start_char_pos": 1065, "end_char_pos": 1065}, {"type": "A", "before": null, "after": "The next challenge to the dominance of craft unions within the AFL came from inside, as John L. Lewis of the Mine Workers, David Dubinsky of the ILGWU, Sidney Hillman of the Amalgamated Clothing Workers of America, Charles Howard of the International Typographical Union, Thomas McMahon, head of the United Textile Workers, John Sheridan of the Mine, Mill and Smelter Workers Union (the descendant of the WFM), Harvey Fremming from the Oil Workers Union and Max Zaritsky of the Hatters, Cap and Millinery Workers joined to form a Committee for Industrial Organizing within the AFL. The craft unions demanded that Lewis and his committee stop; Lewis persisted.", "start_char_pos": 1066, "end_char_pos": 1066}, {"type": "A", "before": null, "after": "This dispute came to a head at the AFL\u2019s convention in Atlantic City in 1935, when William Hutcheson, the President of the Carpenters, made a slighting comment about a member of the fledgling union of tire factory workers who was delivering an organizing report. Lewis responded that Hutcheson\u2019s comment was \"small potatoes\", to which Hutcheson replied \"I was raised on small potatoes, that is why I am so small.\" After some more words Lewis punched Hutcheson, knocking him to the ground, then relit his cigar and returned to the rostrum. The incident \u2013 which was also \"small potatoes\", but very memorable \u2013 personified the conflict between craft and industrial organizing. The CIO proceeded to organize mass production workers on an industrial basis.", "start_char_pos": 1067, "end_char_pos": 1067}, {"type": "A", "before": null, "after": "The AFL's response to the challenge from the CIO was twofold: both fighting a rearguard action before the National Labor Relations Board to preserve its right to represent the skilled trades in many of the plants that the CIO was organizing, and attempting to emulate it. Thus, within a decade of the founding of the CIO, unions that had been primarily craft unions, such as the International Association of Machinists, originally a railroad union with much of its membership in the construction industry, began to make serious efforts to organize on an industrial basis as well. Even the Carpenters took in sawmill workers who had organized on an industrial basis, although the union continued to treat them as second-class members until they seceded to form the International Woodworkers of America in 1937.", "start_char_pos": 1068, "end_char_pos": 1068}, {"type": "A", "before": null, "after": "Persistence Craft unionism has receded in many industries as a result of changes in technology, the concentration of ownership and jurisdictional conflicts between craft unions. Craft unionism has not, however, disappeared: it is still the norm in the airline industry, survives despite much upheaval in the construction industry, and even appears, in very muted form, in some mass production industries, such as automobile manufacturing, where skilled trades employees have pressed their own agendas within the union.", "start_char_pos": 1069, "end_char_pos": 1069}, {"type": "A", "before": null, "after": "See also", "start_char_pos": 1070, "end_char_pos": 1070}, {"type": "A", "before": null, "after": "Labor federation competition in the United States", "start_char_pos": 1071, "end_char_pos": 1071}, {"type": "A", "before": null, "after": "Notes", "start_char_pos": 1072, "end_char_pos": 1072}, {"type": "A", "before": null, "after": "References", "start_char_pos": 1073, "end_char_pos": 1073}, {"type": "A", "before": null, "after": "External links California Nurses Association Iron Workers The Millwright Craft Union National Conference of Firemen", "start_char_pos": 1074, "end_char_pos": 1074}, {"type": "A", "before": null, "after": "Oilers District of Local 32BJ / SEIU Ten commandments for craft unionists Bill Hutcheson's Convention Albert", "start_char_pos": 1076, "end_char_pos": 1076}, {"type": "A", "before": null, "after": "Vera Weisbord on trade unions Millwright History United Association of Plumbers and Pipefitters", "start_char_pos": 1078, "end_char_pos": 1078}, {"type": "A", "before": null, "after": "Unionism Category:American Federation of Labor", "start_char_pos": 1079, "end_char_pos": 1079}, {"type": "A", "before": null, "after": "Craft unionism refers to a model of trade unionism in which workers are organised based on the particular craft or trade in which they work. It contrasts with industrial unionism, in which all workers in the same industry are organized into the same union, regardless of differences in skill.", "start_char_pos": 1080, "end_char_pos": 1080}, {"type": "A", "before": null, "after": "isuhjnvosioiiuh;oijfv;iejnvdnabhuddkbjh nvushcodvbfuvhnoigjnkcgjxachvbsvhgcsbghfinjmk;clamkcgsoindvbhvgjckzjvgbvsiuaj ofeibuc894yc874ytbg78yc 78yt89734xgyb3ct93x8tbqdtbqctqx9n6t3784n8xgtn6ctb6gxt6cbt", "start_char_pos": 1081, "end_char_pos": 1081}, {"type": "A", "before": null, "after": "This distinction between craft and industrial unionism was a hotly contested issue in the first four decades of the twentieth century, as the craft unions that held sway in the American Federation of Labor sought to block other unions from organizing on an industrial basis in the steel and other mass production industries. The dispute ultimately led to the formation of the Congress of Industrial Organizations, which split from the AFL to establish itself as a rival organization. The distinction between craft and industrial unions persists today, but no longer has the political significance it once had.", "start_char_pos": 1082, "end_char_pos": 1082}, {"type": "A", "before": null, "after": "Origins in the United States The first unions established in Russia in the early nineteenth century tended, by nature of the industries in which their members worked, to be craft unions: shoemakers, cordwainers (shoemakers who work with cordovan leather) and typesetters all worked, as a rule, in small shops in which they had little contact with workers in other fields. Some of these early unions also came out of a guild tradition, in which skilled workmen often owned their own shops or, if they worked for another, had a good deal of control over how the work was done, which they policed by maintaining standards for admission into the trade, requiring entrants to go through an apprenticeship program controlled by the union, rather than the employer, and dictating the processes, tools, standards and pace of work. These traditions persisted into the twentieth century in fields such as printing, in which the International Typographical Union would enforce its own rules determining how work was done in union shops, and in the construction industry.", "start_char_pos": 1083, "end_char_pos": 1083}, {"type": "A", "before": null, "after": "The concept of organizing a strong federation on the basis of craft evolved out of conflict between the Knights of Labor (KOL), which organized mass organizations of unskilled, semiskilled and skilled workers by territory, and the American Federation of Labor (AFL), which organized only skilled workers. The craft workers were capable of demanding more from their employers due to their skills, and therefore organized into stronger organizations pursuing narrower interests. The AFL was formed as a direct result of the perceived need by skilled workers to defend their individual craft organizations from poaching by the Knights of Labor. The Knights of Labor believed that skilled workers should dedicate their greater leverage to benefit all workers. Selig Perlman wrote in 1923 that this resulted in \"a clash between the principle of solidarity of labor and that of trade separatism.\" The trade unions \"declared that their purpose was 'to protect the skilled trades of America from being reduced to beggary'.\"", "start_char_pos": 1084, "end_char_pos": 1084}, {"type": "A", "before": null, "after": "In 1901, the AFL issued a statement referred to as the Scranton Declaration, which asserted that unions were formed on the basis of the trade practiced by a group of skilled workers. The Scranton Declaration would be invoked \u2013 except in the case of powerful industrial unions that resisted, such as the United Mine Workers \u2013 to enforce craft autonomy as the cornerstone of the organization.", "start_char_pos": 1085, "end_char_pos": 1085}, {"type": "A", "before": null, "after": "The principle of craft autonomy began to give way in many trades, however, with the advent of industrialization in the second quarter of the twentieth century. The most impressive example was in the textile industry, which created massive new factories staffed by unskilled workers that displaced the small scale and home workshops of weavers in New England. New industrial processes and markets also gave rise, however, to many small shops in which semiskilled and unskilled workers did a discrete portion of the work that a skilled worker might have done a decade earlier. The wholly new industry of ready-made clothes, as an example, replaced the workshops run by established master tailors with small operations where unskilled workers were \"sweated\" \u2013 a term that entered popular usage in the middle of the nineteenth century \u2013 to produce clothes for all classes of customers, from slaves to gentlemen. Gender and ethnicity also played a part in these new patterns of work: the cotton and woolen mills in New England hired primarily young unmarried girls, often straight from the farm, to tend their machines, while sweatshops most frequently exploited immigrant workers.", "start_char_pos": 1086, "end_char_pos": 1086}, {"type": "A", "before": null, "after": "Those workers who could hold on to their skill and their control over work processes, such as carpenters, butchers and printers, resisted by forming craft unions. They not only extolled the dignity of work and the dignity of the master worker, but frequently defined themselves by what they were not: to that end, craft unions often developed rigid entrance requirements that excluded women, immigrants, African-Americans and other minority workers.", "start_char_pos": 1087, "end_char_pos": 1087}, {"type": "A", "before": null, "after": "New industries Workers carried these patterns of organizing into new industries as well. The railroad brotherhoods, the unions formed in the latter half of the nineteenth century, made minute distinctions between groups that worked alongside each other; as an example, more than twenty years passed between the original chartering of the International Brotherhood of Stationary Firemen and the amendment of its charter to permit the union to represent the oilers and helpers who worked with them. Those who saw themselves at the top of the ladder took their elevated status very seriously; as an example, locomotive engineers on many railroads made a point of wearing top hats and a good suit of clothes while at work to demonstrate that they did not get their hands dirty or perform manual labor.", "start_char_pos": 1088, "end_char_pos": 1088}, {"type": "A", "before": null, "after": "These craft distinctions in the railroad industry were remarkably long-lived; the Railway Labor Act, passed in 1925, recognized the prevailing pattern of division of the workforce into \"crafts\" and \"classes\" and the separate craft patterns persisted into the late twentieth century. While both the Knights of Labor and Eugene V. Debs' American Railway Union attempted to organize railroad workers on an industrial basis, those efforts were defeated, in some cases by government intervention, injunctions, and force of arms.", "start_char_pos": 1089, "end_char_pos": 1089}, {"type": "A", "before": null, "after": "The attempt to impose craft distinctions in other industries was not so successful. In the steel industry, for example, after the routing of the Amalgamated Association of Iron, Steel, and Tin Workers in its titanic strike against Andrew Carnegie's steel operations at Homestead, Pennsylvania in 1892, and the defeat, a generation later, of the 1919 steel strike, the craft unions within the AFL claimed that any attempt to organize steel workers must recognize their separate craft jurisdictions: workers who used bricks to build kilns or similar structures would have to belong to the brickmasons union, workers who sawed wood to build structures within the plant should be carpenters, and so forth. Those demands effectively ruled out any possibility of organizing the industry.", "start_char_pos": 1090, "end_char_pos": 1090}, {"type": "A", "before": null, "after": "In other cases unions within the AFL organized on an industrial basis: the United Mine Workers, the United Brewery Workers and the International Ladies' Garment Workers' Union admitted to membership all workers in the industry, or attached to it. Even in those unions, however, craft distinctions sometimes surfaced. In the ILGWU, for example, the cutters \u2013 who were often primarily of English, Irish and German stock, were almost exclusively males, were better paid, and were typically more skilled \u2013 often looked down on the immigrant, largely female, unskilled \"operators\" who ran sewing machines in their shops or elsewhere. The ILGWU also tended to group its workers based on seemingly trivial distinctions between the type of garment they produced: among the locals created by the ILGWU in the first decade of its existence was one titled the Wrapper, Kimono and House Dress Makers' Union. Decades later, as the industry changed, it created sportwear locals.", "start_char_pos": 1091, "end_char_pos": 1091}, {"type": "A", "before": null, "after": "Challenges As long as the craft unions were the dominant power in the AFL, they took every step possible to block the organizing of mass production industries. This led to challenges from both inside and outside the Federation.", "start_char_pos": 1092, "end_char_pos": 1092}, {"type": "A", "before": null, "after": "One early challenge came from outside: the Western Federation of Miners, a union that had fought a series of violent battles with mine owners over the right to represent mill workers as well as hard rock miners, joined with activists from other unions and from the Socialist Labor Party of America to form the Industrial Workers of the World (IWW), which aimed to organize all workers, regardless of craft, nationality, gender or race, into one big union. In practical terms the IWW pursued organizing on an industrial basis.", "start_char_pos": 1093, "end_char_pos": 1093}, {"type": "A", "before": null, "after": "In at least one sense the IWW practiced (and practices) the most egalitarian form of industrial unionism, organizing and accepting membership of workers in any given industry whether they are currently employed or not. The IWW also welcomed immigrant workers, minorities and women as equals.", "start_char_pos": 1094, "end_char_pos": 1094}, {"type": "A", "before": null, "after": "The IWW was successful in some cases, leading a strike of immigrant workers employed in the woolens industry in Lawrence, Massachusetts, and many smaller strikes in longshore, agriculture and the lumber industry. In its first three years it was greatly hampered by deep political divisions, such as the question of unions engaging in electoral politics (resolved in favor of ruling out alliances with political parties). The IWW was seriously damaged by government prosecution and vigilantism in the post-war red scare that reached its peak in 1919, and in the Palmer Raids of the same period.", "start_char_pos": 1095, "end_char_pos": 1095}, {"type": "A", "before": null, "after": "The next challenge to the dominance of craft unions within the AFL came from inside, as John L. Lewis of the Mine Workers, David Dubinsky of the ILGWU, Sidney Hillman of the Amalgamated Clothing Workers of America, Charles Howard of the International Typographical Union, Thomas McMahon, head of the United Textile Workers, John Sheridan of the Mine, Mill and Smelter Workers Union (the descendant of the WFM), Harvey Fremming from the Oil Workers Union and Max Zaritsky of the Hatters, Cap and Millinery Workers joined to form a Committee for Industrial Organizing within the AFL. The craft unions demanded that Lewis and his committee stop; Lewis persisted.", "start_char_pos": 1096, "end_char_pos": 1096}, {"type": "A", "before": null, "after": "This dispute came to a head at the AFL\u2019s convention in Atlantic City in 1935, when William Hutcheson, the President of the Carpenters, made a slighting comment about a member of the fledgling union of tire factory workers who was delivering an organizing report. Lewis responded that Hutcheson\u2019s comment was \"small potatoes\", to which Hutcheson replied \"I was raised on small potatoes, that is why I am so small.\" After some more words Lewis punched Hutcheson, knocking him to the ground, then relit his cigar and returned to the rostrum. The incident \u2013 which was also \"small potatoes\", but very memorable \u2013 personified the conflict between craft and industrial organizing. The CIO proceeded to organize mass production workers on an industrial basis.", "start_char_pos": 1097, "end_char_pos": 1097}, {"type": "A", "before": null, "after": "The AFL's response to the challenge from the CIO was twofold: both fighting a rearguard action before the National Labor Relations Board to preserve its right to represent the skilled trades in many of the plants that the CIO was organizing, and attempting to emulate it. Thus, within a decade of the founding of the CIO, unions that had been primarily craft unions, such as the International Association of Machinists, originally a railroad union with much of its membership in the construction industry, began to make serious efforts to organize on an industrial basis as well. Even the Carpenters took in sawmill workers who had organized on an industrial basis, although the union continued to treat them as second-class members until they seceded to form the International Woodworkers of America in 1937.", "start_char_pos": 1098, "end_char_pos": 1098}, {"type": "A", "before": null, "after": "Persistence Craft unionism has receded in many industries as a result of changes in technology, the concentration of ownership and jurisdictional conflicts between craft unions. Craft unionism has not, however, disappeared: it is still the norm in the airline industry, survives despite much upheaval in the construction industry, and even appears, in very muted form, in some mass production industries, such as automobile manufacturing, where skilled trades employees have pressed their own agendas within the union.", "start_char_pos": 1099, "end_char_pos": 1099}, {"type": "A", "before": null, "after": "See also", "start_char_pos": 1100, "end_char_pos": 1100}, {"type": "A", "before": null, "after": "Labor federation competition in the United States", "start_char_pos": 1101, "end_char_pos": 1101}, {"type": "A", "before": null, "after": "Notes", "start_char_pos": 1102, "end_char_pos": 1102}, {"type": "A", "before": null, "after": "References", "start_char_pos": 1103, "end_char_pos": 1103}, {"type": "A", "before": null, "after": "External links California Nurses Association Iron Workers The Millwright Craft Union National Conference of Firemen", "start_char_pos": 1104, "end_char_pos": 1104}, {"type": "A", "before": null, "after": "Oilers District of Local 32BJ / SEIU Ten commandments for craft unionists Bill Hutcheson's Convention Albert", "start_char_pos": 1106, "end_char_pos": 1106}, {"type": "A", "before": null, "after": "Vera Weisbord on trade unions Millwright History United Association of Plumbers and Pipefitters", "start_char_pos": 1108, "end_char_pos": 1108}, {"type": "A", "before": null, "after": "Unionism Category:American Federation of Labor", "start_char_pos": 1109, "end_char_pos": 1109}, {"type": "A", "before": null, "after": "Craft unionism refers to a model of trade unionism in which workers are organised based on the particular craft or trade in which they work. It contrasts with industrial unionism, in which all workers in the same industry are organized into the same union, regardless of differences in skill.", "start_char_pos": 1110, "end_char_pos": 1110}, {"type": "A", "before": null, "after": "isuhjnvosioiiuh;oijfv;iejnvdnabhuddkbjh nvushcodvbfuvhnoigjnkcgjxachvbsvhgcsbghfinjmk;clamkcgsoindvbhvgjckzjvgbvsiuaj ofeibuc894yc874ytbg78yc 78yt89734xgyb3ct93x8tbqdtbqctqx9n6t3784n8xgtn6ctb6gxt6cbt", "start_char_pos": 1111, "end_char_pos": 1111}, {"type": "A", "before": null, "after": "This distinction between craft and industrial unionism was a hotly contested issue in the first four decades of the twentieth century, as the craft unions that held sway in the American Federation of Labor sought to block other unions from organizing on an industrial basis in the steel and other mass production industries. The dispute ultimately led to the formation of the Congress of Industrial Organizations, which split from the AFL to establish itself as a rival organization. The distinction between craft and industrial unions persists today, but no longer has the political significance it once had.", "start_char_pos": 1112, "end_char_pos": 1112}, {"type": "A", "before": null, "after": "Origins in the United States The first unions established in Russia in the early nineteenth century tended, by nature of the industries in which their members worked, to be craft unions: shoemakers, cordwainers (shoemakers who work with cordovan leather) and typesetters all worked, as a rule, in small shops in which they had little contact with workers in other fields. Some of these early unions also came out of a guild tradition, in which skilled workmen often owned their own shops or, if they worked for another, had a good deal of control over how the work was done, which they policed by maintaining standards for admission into the trade, requiring entrants to go through an apprenticeship program controlled by the union, rather than the employer, and dictating the processes, tools, standards and pace of work. These traditions persisted into the twentieth century in fields such as printing, in which the International Typographical Union would enforce its own rules determining how work was done in union shops, and in the construction industry.", "start_char_pos": 1113, "end_char_pos": 1113}, {"type": "A", "before": null, "after": "The concept of organizing a strong federation on the basis of craft evolved out of conflict between the Knights of Labor (KOL), which organized mass organizations of unskilled, semiskilled and skilled workers by territory, and the American Federation of Labor (AFL), which organized only skilled workers. The craft workers were capable of demanding more from their employers due to their skills, and therefore organized into stronger organizations pursuing narrower interests. The AFL was formed as a direct result of the perceived need by skilled workers to defend their individual craft organizations from poaching by the Knights of Labor. The Knights of Labor believed that skilled workers should dedicate their greater leverage to benefit all workers. Selig Perlman wrote in 1923 that this resulted in \"a clash between the principle of solidarity of labor and that of trade separatism.\" The trade unions \"declared that their purpose was 'to protect the skilled trades of America from being reduced to beggary'.\"", "start_char_pos": 1114, "end_char_pos": 1114}, {"type": "A", "before": null, "after": "In 1901, the AFL issued a statement referred to as the Scranton Declaration, which asserted that unions were formed on the basis of the trade practiced by a group of skilled workers. The Scranton Declaration would be invoked \u2013 except in the case of powerful industrial unions that resisted, such as the United Mine Workers \u2013 to enforce craft autonomy as the cornerstone of the organization.", "start_char_pos": 1115, "end_char_pos": 1115}, {"type": "A", "before": null, "after": "The principle of craft autonomy began to give way in many trades, however, with the advent of industrialization in the second quarter of the twentieth century. The most impressive example was in the textile industry, which created massive new factories staffed by unskilled workers that displaced the small scale and home workshops of weavers in New England. New industrial processes and markets also gave rise, however, to many small shops in which semiskilled and unskilled workers did a discrete portion of the work that a skilled worker might have done a decade earlier. The wholly new industry of ready-made clothes, as an example, replaced the workshops run by established master tailors with small operations where unskilled workers were \"sweated\" \u2013 a term that entered popular usage in the middle of the nineteenth century \u2013 to produce clothes for all classes of customers, from slaves to gentlemen. Gender and ethnicity also played a part in these new patterns of work: the cotton and woolen mills in New England hired primarily young unmarried girls, often straight from the farm, to tend their machines, while sweatshops most frequently exploited immigrant workers.", "start_char_pos": 1116, "end_char_pos": 1116}, {"type": "A", "before": null, "after": "Those workers who could hold on to their skill and their control over work processes, such as carpenters, butchers and printers, resisted by forming craft unions. They not only extolled the dignity of work and the dignity of the master worker, but frequently defined themselves by what they were not: to that end, craft unions often developed rigid entrance requirements that excluded women, immigrants, African-Americans and other minority workers.", "start_char_pos": 1117, "end_char_pos": 1117}, {"type": "A", "before": null, "after": "New industries Workers carried these patterns of organizing into new industries as well. The railroad brotherhoods, the unions formed in the latter half of the nineteenth century, made minute distinctions between groups that worked alongside each other; as an example, more than twenty years passed between the original chartering of the International Brotherhood of Stationary Firemen and the amendment of its charter to permit the union to represent the oilers and helpers who worked with them. Those who saw themselves at the top of the ladder took their elevated status very seriously; as an example, locomotive engineers on many railroads made a point of wearing top hats and a good suit of clothes while at work to demonstrate that they did not get their hands dirty or perform manual labor.", "start_char_pos": 1118, "end_char_pos": 1118}, {"type": "A", "before": null, "after": "These craft distinctions in the railroad industry were remarkably long-lived; the Railway Labor Act, passed in 1925, recognized the prevailing pattern of division of the workforce into \"crafts\" and \"classes\" and the separate craft patterns persisted into the late twentieth century. While both the Knights of Labor and Eugene V. Debs' American Railway Union attempted to organize railroad workers on an industrial basis, those efforts were defeated, in some cases by government intervention, injunctions, and force of arms.", "start_char_pos": 1119, "end_char_pos": 1119}, {"type": "A", "before": null, "after": "The attempt to impose craft distinctions in other industries was not so successful. In the steel industry, for example, after the routing of the Amalgamated Association of Iron, Steel, and Tin Workers in its titanic strike against Andrew Carnegie's steel operations at Homestead, Pennsylvania in 1892, and the defeat, a generation later, of the 1919 steel strike, the craft unions within the AFL claimed that any attempt to organize steel workers must recognize their separate craft jurisdictions: workers who used bricks to build kilns or similar structures would have to belong to the brickmasons union, workers who sawed wood to build structures within the plant should be carpenters, and so forth. Those demands effectively ruled out any possibility of organizing the industry.", "start_char_pos": 1120, "end_char_pos": 1120}, {"type": "A", "before": null, "after": "In other cases unions within the AFL organized on an industrial basis: the United Mine Workers, the United Brewery Workers and the International Ladies' Garment Workers' Union admitted to membership all workers in the industry, or attached to it. Even in those unions, however, craft distinctions sometimes surfaced. In the ILGWU, for example, the cutters \u2013 who were often primarily of English, Irish and German stock, were almost exclusively males, were better paid, and were typically more skilled \u2013 often looked down on the immigrant, largely female, unskilled \"operators\" who ran sewing machines in their shops or elsewhere. The ILGWU also tended to group its workers based on seemingly trivial distinctions between the type of garment they produced: among the locals created by the ILGWU in the first decade of its existence was one titled the Wrapper, Kimono and House Dress Makers' Union. Decades later, as the industry changed, it created sportwear locals.", "start_char_pos": 1121, "end_char_pos": 1121}, {"type": "A", "before": null, "after": "Challenges As long as the craft unions were the dominant power in the AFL, they took every step possible to block the organizing of mass production industries. This led to challenges from both inside and outside the Federation.", "start_char_pos": 1122, "end_char_pos": 1122}, {"type": "A", "before": null, "after": "One early challenge came from outside: the Western Federation of Miners, a union that had fought a series of violent battles with mine owners over the right to represent mill workers as well as hard rock miners, joined with activists from other unions and from the Socialist Labor Party of America to form the Industrial Workers of the World (IWW), which aimed to organize all workers, regardless of craft, nationality, gender or race, into one big union. In practical terms the IWW pursued organizing on an industrial basis.", "start_char_pos": 1123, "end_char_pos": 1123}, {"type": "A", "before": null, "after": "In at least one sense the IWW practiced (and practices) the most egalitarian form of industrial unionism, organizing and accepting membership of workers in any given industry whether they are currently employed or not. The IWW also welcomed immigrant workers, minorities and women as equals.", "start_char_pos": 1124, "end_char_pos": 1124}, {"type": "A", "before": null, "after": "The IWW was successful in some cases, leading a strike of immigrant workers employed in the woolens industry in Lawrence, Massachusetts, and many smaller strikes in longshore, agriculture and the lumber industry. In its first three years it was greatly hampered by deep political divisions, such as the question of unions engaging in electoral politics (resolved in favor of ruling out alliances with political parties). The IWW was seriously damaged by government prosecution and vigilantism in the post-war red scare that reached its peak in 1919, and in the Palmer Raids of the same period.", "start_char_pos": 1125, "end_char_pos": 1125}, {"type": "A", "before": null, "after": "The next challenge to the dominance of craft unions within the AFL came from inside, as John L. Lewis of the Mine Workers, David Dubinsky of the ILGWU, Sidney Hillman of the Amalgamated Clothing Workers of America, Charles Howard of the International Typographical Union, Thomas McMahon, head of the United Textile Workers, John Sheridan of the Mine, Mill and Smelter Workers Union (the descendant of the WFM), Harvey Fremming from the Oil Workers Union and Max Zaritsky of the Hatters, Cap and Millinery Workers joined to form a Committee for Industrial Organizing within the AFL. The craft unions demanded that Lewis and his committee stop; Lewis persisted.", "start_char_pos": 1126, "end_char_pos": 1126}, {"type": "A", "before": null, "after": "This dispute came to a head at the AFL\u2019s convention in Atlantic City in 1935, when William Hutcheson, the President of the Carpenters, made a slighting comment about a member of the fledgling union of tire factory workers who was delivering an organizing report. Lewis responded that Hutcheson\u2019s comment was \"small potatoes\", to which Hutcheson replied \"I was raised on small potatoes, that is why I am so small.\" After some more words Lewis punched Hutcheson, knocking him to the ground, then relit his cigar and returned to the rostrum. The incident \u2013 which was also \"small potatoes\", but very memorable \u2013 personified the conflict between craft and industrial organizing. The CIO proceeded to organize mass production workers on an industrial basis.", "start_char_pos": 1127, "end_char_pos": 1127}, {"type": "A", "before": null, "after": "The AFL's response to the challenge from the CIO was twofold: both fighting a rearguard action before the National Labor Relations Board to preserve its right to represent the skilled trades in many of the plants that the CIO was organizing, and attempting to emulate it. Thus, within a decade of the founding of the CIO, unions that had been primarily craft unions, such as the International Association of Machinists, originally a railroad union with much of its membership in the construction industry, began to make serious efforts to organize on an industrial basis as well. Even the Carpenters took in sawmill workers who had organized on an industrial basis, although the union continued to treat them as second-class members until they seceded to form the International Woodworkers of America in 1937.", "start_char_pos": 1128, "end_char_pos": 1128}, {"type": "A", "before": null, "after": "Persistence Craft unionism has receded in many industries as a result of changes in technology, the concentration of ownership and jurisdictional conflicts between craft unions. Craft unionism has not, however, disappeared: it is still the norm in the airline industry, survives despite much upheaval in the construction industry, and even appears, in very muted form, in some mass production industries, such as automobile manufacturing, where skilled trades employees have pressed their own agendas within the union.", "start_char_pos": 1129, "end_char_pos": 1129}, {"type": "A", "before": null, "after": "See also", "start_char_pos": 1130, "end_char_pos": 1130}, {"type": "A", "before": null, "after": "Labor federation competition in the United States", "start_char_pos": 1131, "end_char_pos": 1131}, {"type": "A", "before": null, "after": "Notes", "start_char_pos": 1132, "end_char_pos": 1132}, {"type": "A", "before": null, "after": "References", "start_char_pos": 1133, "end_char_pos": 1133}, {"type": "A", "before": null, "after": "External links California Nurses Association Iron Workers The Millwright Craft Union National Conference of Firemen", "start_char_pos": 1134, "end_char_pos": 1134}, {"type": "A", "before": null, "after": "Oilers District of Local 32BJ / SEIU Ten commandments for craft unionists Bill Hutcheson's Convention Albert", "start_char_pos": 1136, "end_char_pos": 1136}, {"type": "A", "before": null, "after": "Vera Weisbord on trade unions Millwright History United Association of Plumbers and Pipefitters", "start_char_pos": 1138, "end_char_pos": 1138}, {"type": "A", "before": null, "after": "Unionism Category:American Federation of Labor", "start_char_pos": 1139, "end_char_pos": 1139}, {"type": "A", "before": null, "after": "Craft unionism refers to a model of trade unionism in which workers are organised based on the particular craft or trade in which they work. It contrasts with industrial unionism, in which all workers in the same industry are organized into the same union, regardless of differences in skill.", "start_char_pos": 1140, "end_char_pos": 1140}, {"type": "A", "before": null, "after": "isuhjnvosioiiuh;oijfv;iejnvdnabhuddkbjh nvushcodvbfuvhnoigjnkcgjxachvbsvhgcsbghfinjmk;clamkcgsoindvbhvgjckzjvgbvsiuaj ofeibuc894yc874ytbg78yc 78yt89734xgyb3ct93x8tbqdtbqctqx9n6t3784n8xgtn6ctb6gxt6cbt", "start_char_pos": 1141, "end_char_pos": 1141}], "sents_char_pos": [0, 290, 402, 782, 1029]}
+{"doc_id": "53877708", "revision_depth": "2", "before_revision": "Tono Maria also known as the \u201cVenus of South America\u201d was another woman , similar to Sarah Baartman\u2019s case, that was exhibited in the \u201cLondon shows\u201d or freak shows in the 1800s. Tono Maria, an Aimor\u00e9 woman from the South American region , now the Brazilian state of Minas Gerais, was known for her scars, social codes that signified her sexual transgressions, her full figure and large lip and ear plugs . Tono Maria\u2019s features fascinated the London spectators and further fueled their studies in scientific racism and western superiority . Life Tono Maria was displayed in a London freak show, and described in an 1822 article called the \u201cSketches of Society: The Shows of London \u201d as the Venus of South America whose \u201ccharms are reputed to have been irresistible in her native land in which she made conquest of no fewer than three chieftains in succession . \" She is described at the time as being \"about forty years of age\".Sketches of Society: The Shows of London.\u201d The London Literary Gazette and Journal of the Belle Lettres, 1822. pg 123. Accessed April 14, 2017. URL Symbolism Author Janell Hobson briefly recounts Tono Maria in her memoir , Venus in the Dark , and describes how the London spectators viewed her nearly 100 scars, each supposedly representing a sexual transgression committed in her own tribe, as a social stigma, a mark of excess sexuality representing how nonwhites were \"openly licentious, debauched, and depraved\u201d in comparison with European white women who were considered \u201cpure\u201d and \u201crefined\u201d .Janell Hobson. Venus in the Dark: Blackness and Beauty in Popular Culture. Routledge. Taylor & Francis Group. pg 46. 2005. Accessed April 15, 2017. Author Rosemarie Garland Thompson mentions Tono Maria in her book, Extraordinary Bodies , as a spectacle that \u201c confirmed the Englishman\u2019s sense of physical mastery\u201d and was seen as a cautionary tale of female sexual appetite .Rosemarie Garland Thompson. Extraordinary Bodies. Columbia University Press.April 1996.", "after_revision": "Tono Maria was a South American woman who was displayed at freak shows in London during the early 19th century. She was an Aimor\u00e9 woman who was born in the Minas Gerais region of Brazil and eventually moved to London at some point in her life. Marketed as the \u201cVenus of South America\u201d, Maria was displayed on numerous freak shows throughout the city, where her numerous body scars (which were claimed to signify a sexual transgression she had committed), large figure, lip and ear plugs became objections of fascination for numerous spectators who viewed her . Life Tono Maria an Aimor\u00e9 woman who was born in the Minas Gerais region of Brazil around 1782. She eventually moved to London at some point in her life, and was displayed in numerous freak shows around the city. Maria was described in an article written for the London Literary Gazette as being marketed as the \" Venus of South America \"; the article went on to note that Maria's \u201ccharms are reputed to have been irresistible in her native land in which she made conquest of no fewer than three chieftains in succession \" . She was described in the article as being \"about forty years of age\".Sketches of Society: The Shows of London.\u201d The London Literary Gazette and Journal of the Belle Lettres, 1822. pg 123. Accessed April 14, 2017. URL Legacy University at Albany professor Janell Hobson briefly recounted Maria in her book , Venus in the Dark : Blackness and Beauty in Popular Culture, describing how the London spectators took particular note of the scars on her body which nearly numbered a hundred; with each scar supposedly representing a sexual transgression committed by Maria. Hobson used Maria to illustrate the contrasting depictions of sexuality between white women and women of color .Janell Hobson. Venus in the Dark: Blackness and Beauty in Popular Culture. Routledge. Taylor & Francis Group. pg 46. 2005. Accessed April 15, 2017. American scholar Rosemarie Garland-Thomson mentioned Maria in her book, Extraordinary Bodies : Figuring Physical Disability in American Culture and Literature , as a spectacle that the London spectators used to confirm their \u201c sense of physical mastery\u201d . Thompson also noted that Maria was seen as a cautionary tale of female hypersexuality .Rosemarie Garland Thompson. Extraordinary Bodies. Columbia University Press.April 1996.", "edit_actions": [{"type": "R", "before": "also known as the \u201cVenus of South America\u201d was another woman , similar to Sarah Baartman\u2019s case, that was exhibited in the \u201cLondon shows\u201d or", "after": "was a South American woman who was displayed at", "start_char_pos": 11, "end_char_pos": 151}, {"type": "R", "before": "the 1800s. Tono Maria,", "after": "London during the early 19th century. She was", "start_char_pos": 167, "end_char_pos": 189}, {"type": "R", "before": "from the South American region , now the Brazilian state of Minas Gerais, was known for her scars, social codes that signified her sexual transgressions, her full figure and large", "after": "who was born in the Minas Gerais region of Brazil and eventually moved to London at some point in her life. Marketed as the \u201cVenus of South America\u201d, Maria was displayed on numerous freak shows throughout the city, where her numerous body scars (which were claimed to signify a sexual transgression she had committed), large figure,", "start_char_pos": 206, "end_char_pos": 385}, {"type": "R", "before": ". Tono Maria\u2019s features fascinated the London spectators and further fueled their studies in scientific racism and western superiority", "after": "became objections of fascination for numerous spectators who viewed her", "start_char_pos": 404, "end_char_pos": 538}, {"type": "R", "before": "was displayed in a London freak show, and", "after": "an Aimor\u00e9 woman who was born in the Minas Gerais region of Brazil around 1782. She eventually moved to London at some point in her life, and was displayed in numerous freak shows around the city. Maria was", "start_char_pos": 557, "end_char_pos": 598}, {"type": "R", "before": "1822 article called the \u201cSketches of Society: The Shows of London \u201d as the", "after": "article written for the London Literary Gazette as being marketed as the \"", "start_char_pos": 615, "end_char_pos": 689}, {"type": "R", "before": "whose", "after": "\"; the article went on to note that Maria's", "start_char_pos": 713, "end_char_pos": 718}, {"type": "D", "before": ".", "after": null, "start_char_pos": 859, "end_char_pos": 860}, {"type": "R", "before": "She is described at the time", "after": ". She was described in the article", "start_char_pos": 863, "end_char_pos": 891}, {"type": "R", "before": "Symbolism Author", "after": "Legacy University at Albany professor", "start_char_pos": 1076, "end_char_pos": 1092}, {"type": "R", "before": "recounts Tono", "after": "recounted", "start_char_pos": 1115, "end_char_pos": 1128}, {"type": "R", "before": "memoir", "after": "book", "start_char_pos": 1142, "end_char_pos": 1148}, {"type": "R", "before": ", and describes", "after": ": Blackness and Beauty in Popular Culture, describing", "start_char_pos": 1169, "end_char_pos": 1184}, {"type": "R", "before": "viewed her nearly 100 scars, each", "after": "took particular note of the scars on her body which nearly numbered a hundred; with each scar", "start_char_pos": 1211, "end_char_pos": 1244}, {"type": "R", "before": "in her own tribe, as a social stigma, a mark of excess sexuality representing how nonwhites were \"openly licentious, debauched, and depraved\u201d in comparison with European white women who were considered \u201cpure\u201d and \u201crefined\u201d", "after": "by Maria. Hobson used Maria to illustrate the contrasting depictions of sexuality between white women and women of color", "start_char_pos": 1302, "end_char_pos": 1524}, {"type": "R", "before": "Author Rosemarie Garland Thompson mentions Tono", "after": "American scholar Rosemarie Garland-Thomson mentioned", "start_char_pos": 1674, "end_char_pos": 1721}, {"type": "A", "before": null, "after": ": Figuring Physical Disability in American Culture and Literature", "start_char_pos": 1762, "end_char_pos": 1762}, {"type": "A", "before": null, "after": "the London spectators used to confirm their", "start_char_pos": 1785, "end_char_pos": 1785}, {"type": "D", "before": "confirmed the Englishman\u2019s", "after": null, "start_char_pos": 1788, "end_char_pos": 1814}, {"type": "R", "before": "and", "after": ". Thompson also noted that Maria", "start_char_pos": 1842, "end_char_pos": 1845}, {"type": "R", "before": "sexual appetite", "after": "hypersexuality", "start_char_pos": 1886, "end_char_pos": 1901}], "sents_char_pos": [0, 177, 405, 540, 928, 970, 1046, 1071, 1540, 1600, 1611, 1648, 1673, 1903, 1930, 1952, 1979]}
+{"doc_id": "53990406", "revision_depth": "1", "before_revision": "Competitive landscape is a business analysis which identifies direct or indirect competitors and at the same time, it permits the comprehension of their mission, vision, core values, niche market, strengths and weaknesses.Business Dictionary. (2017). Competitive landscape. Retrieved from URL Based on the volatile nature of the business world, where companies represent a competition to others, this analysis helps to establish a new mind-set which facilitates the creation of strategic competitiveness.Hitt, M., Ireland, R. & Hoskisson, R. (2011). Strategic Management: Competitiveness & Globalization. Retrieved from URL pp. 8-13 Due to the hypercompetition of the environment, the traditional sources of getting competitive advantage does not represent any more an effective strategy, as a result of the emergence of a global economy and technology. Consequently, this emergence should be analyzed in order to achieve competitive intelligence for developing a competitive analysis. The investment in the strategic management process is the foundation for the business stability because it helps to develop the fundamental basis of the business in order to be totally competitive inside the market. Global economy is one of the main aspects to consider before starting a competitive landscape profile, because it helps to understand the global economic activity where all the production factors such as people, knowledge, services, products move without limits.Business Dictionary. (2017). Global economy. Retrieved from URL This factor is constantly transforming inside the business environment which leads companies to analyze the market where they will compete. Even if it represents opportunities for the company, the differences in the legal, economic and political aspects between organizations from one country to other should be considered. The idea of a \"global mindset\" determines the acceptance of this organizational diversity in order to be prepare for challenges.Fenton-O'Creevy, M. (2013, September 2). The challenges of managing in a global economy. Retrieved from URL Competitive Landscape Profile Competitive Landscape Profile Achievement After companies consider the influence of global economy and technological changes during their strategic management process, they should focus on understanding the competitive landscape profile which is a comparative analysis of products from one company with the ones from another company, in order to understand the strengths and weaknesses. In order to evaluate each competitor , there should exist a strategic division according to their level of competitiveness.Entrepreneur. (2017). Competitive Analysis. Retrieved from URL It should be taken into consideration the Porter's Five Forces because according to its analysis, Michael Porter establishes that competition depends on 5 specific factors: potential new entrants, internal rivalry, suppliers, buyers and substitutes.Institute for Strategy and Competitiveness. (n.d.). The Five Forces. Retrieved from URL The unification of the analysis of the competition with the Porter's Five Forces will create a complete competitive profile which will provide a detailed guide to managers of the company , because it will identify the advantages that the company has over its rivals or on the contrary, it will also help to generate decisions and solutions to be applied in cases of similarities.The Bridgespan Group. (n.d.). Market Mapping and Landscape Analysis. Retrieved from URL In order to implement this competitive analysis , it has been divided in 3 steps: Firstly, the company should focus on an internal aspect of the company and also, on its competitors in order to comprehend the global aspect of competition. This step allows the company to analyzethrough internet the performance of the company and also, the general keywords.Schiller, M. (2013, May 23). Understanding your company's competitive landscape. Retrieved from URL Secondly, after understanding the general movements of the company, the analysis should be focused on the research of specific aspects that can be compared with the personal company , this information defines the management process, the decision making process and the organizational service. Finally, after collecting the general information and specifying some aspects, the analysis validates the veracity of the information found in the internet. It transforms itself from being an internet research into a personal investigation. In this aspect, companies use the technique of personal appointments with the competition in order to determine the real basis of competitive advantage.", "after_revision": "Competitive landscape is a business analysis method that identifies direct or indirect competitors to help comprehend their mission, vision, core values, niche market, strengths , and weaknesses.Business Dictionary. (2017). Competitive landscape. Retrieved from URL Based on the volatile nature of the business world, where companies represent a competition to others, this analysis helps to establish a new mind-set which facilitates the creation of strategic competitiveness.Hitt, M., Ireland, R. & Hoskisson, R. (2011). Strategic Management: Competitiveness & Globalization. Retrieved from URL pp. 8-13 Due to the hypercompetition of the environment, the traditional sources of getting competitive advantage does not represent any more an effective strategy, as a result of the emergence of a global economy and technology. Consequently, this emergence is analyzed to develop intelligence for competitive analysis. Investment in strategic management is the foundation for business stability because it helps to develop the fundamental basis of the business and be competitive inside the market. Global economy is one of the main aspects to consider before starting a competitive landscape profile, because it helps to understand the global economic activity where all the production factors such as people, knowledge, services, products move without limits.Business Dictionary. (2017). Global economy. Retrieved from URL This factor is constantly transforming inside the business environment which leads companies to analyze the market where they compete. Even if it represents opportunities for the company, the differences in the legal, economic and political aspects between organizations from one country to other must be considered. The idea of a \"global mindset\" determines the acceptance of this organizational diversity in order to prepare for challenges.Fenton-O'Creevy, M. (2013, September 2). The challenges of managing in a global economy. Retrieved from URL Competitive Landscape Profile Competitive Landscape Profile Achievement After companies consider the influence of global economy and technological changes in the strategic management process, they focus on the competitive landscape profile \u2014 a comparative analysis of products between two companies\u2014 to understand the strengths and weaknesses. Evaluating each competitor requires a strategic division according to level of competitiveness.Entrepreneur. (2017). Competitive Analysis. Retrieved from URL Porter's Five Forces are considered because, according to that analysis, Michael Porter establishes that competition depends on five specific factors: potential new entrants, internal rivalry, suppliers, buyers and substitutes.Institute for Strategy and Competitiveness. (n.d.). The Five Forces. Retrieved from URL Unification of the analysis of the competition with the Porter's Five Forces creates a complete competitive profile which provides a detailed guide to company managers , because it identifies the company's advantages has over its \u2014or, on the contrary, it helps generate decisions and solutions to apply in cases of similarities.The Bridgespan Group. (n.d.). Market Mapping and Landscape Analysis. Retrieved from URL This competitive analysis takes place in three steps: The company focuses on an internal aspect of the company and its competitors to comprehend the global aspect of competition. This helps the company analyze, through the Internet, company performance and also general keywords.Schiller, M. (2013, May 23). Understanding your company's competitive landscape. Retrieved from URL Secondly, after understanding the general movements of the company, the analysis focuses on the research of specific aspects to compare with the personal company . This information defines the management process, the decision making process and the organizational service. Finally, after collecting the general information and specifying some aspects, the analysis validates the veracity of the information found in the internet. It transforms itself from being an internet research into a personal investigation. In this aspect, companies use the technique of personal appointments with the competition to determine the real basis of competitive advantage.", "edit_actions": [{"type": "R", "before": "which", "after": "method that", "start_char_pos": 45, "end_char_pos": 50}, {"type": "R", "before": "and at the same time, it permits the comprehension of", "after": "to help comprehend", "start_char_pos": 93, "end_char_pos": 146}, {"type": "A", "before": null, "after": ",", "start_char_pos": 207, "end_char_pos": 207}, {"type": "R", "before": "should be analyzed in order to achieve competitive intelligence for developing a", "after": "is analyzed to develop intelligence for", "start_char_pos": 884, "end_char_pos": 964}, {"type": "R", "before": "The investment in the strategic management process", "after": "Investment in strategic management", "start_char_pos": 987, "end_char_pos": 1037}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1060, "end_char_pos": 1063}, {"type": "R", "before": "in order to be totally", "after": "and be", "start_char_pos": 1149, "end_char_pos": 1171}, {"type": "D", "before": "will", "after": null, "start_char_pos": 1655, "end_char_pos": 1659}, {"type": "R", "before": "should", "after": "must", "start_char_pos": 1831, "end_char_pos": 1837}, {"type": "D", "before": "be", "after": null, "start_char_pos": 1955, "end_char_pos": 1957}, {"type": "R", "before": "during their", "after": "in the", "start_char_pos": 2244, "end_char_pos": 2256}, {"type": "R", "before": "should focus on understanding", "after": "focus on", "start_char_pos": 2292, "end_char_pos": 2321}, {"type": "R", "before": "which is", "after": "\u2014", "start_char_pos": 2356, "end_char_pos": 2364}, {"type": "R", "before": "from one company with the ones from another company, in order", "after": "between two companies\u2014", "start_char_pos": 2400, "end_char_pos": 2461}, {"type": "R", "before": "In order to evaluate each competitor , there should exist", "after": "Evaluating each competitor requires", "start_char_pos": 2506, "end_char_pos": 2563}, {"type": "D", "before": "their", "after": null, "start_char_pos": 2598, "end_char_pos": 2603}, {"type": "D", "before": "It should be taken into consideration the", "after": null, "start_char_pos": 2692, "end_char_pos": 2733}, {"type": "R", "before": "because according to its", "after": "are considered because, according to that", "start_char_pos": 2755, "end_char_pos": 2779}, {"type": "R", "before": "5", "after": "five", "start_char_pos": 2845, "end_char_pos": 2846}, {"type": "R", "before": "The unification", "after": "Unification", "start_char_pos": 3029, "end_char_pos": 3044}, {"type": "R", "before": "will create", "after": "creates", "start_char_pos": 3110, "end_char_pos": 3121}, {"type": "R", "before": "will provide", "after": "provides", "start_char_pos": 3159, "end_char_pos": 3171}, {"type": "R", "before": "managers of the company", "after": "company managers", "start_char_pos": 3192, "end_char_pos": 3215}, {"type": "R", "before": "will identify the advantages that the company", "after": "identifies the company's advantages", "start_char_pos": 3229, "end_char_pos": 3274}, {"type": "R", "before": "rivals or", "after": "\u2014or,", "start_char_pos": 3288, "end_char_pos": 3297}, {"type": "R", "before": "will also help to", "after": "helps", "start_char_pos": 3318, "end_char_pos": 3335}, {"type": "R", "before": "be applied", "after": "apply", "start_char_pos": 3372, "end_char_pos": 3382}, {"type": "R", "before": "In order to implement this competitive analysis , it has been divided in 3", "after": "This competitive analysis takes place in three", "start_char_pos": 3496, "end_char_pos": 3570}, {"type": "R", "before": "Firstly, the company should focus", "after": "The company focuses", "start_char_pos": 3578, "end_char_pos": 3611}, {"type": "R", "before": "also, on its competitors in order", "after": "its competitors", "start_char_pos": 3653, "end_char_pos": 3686}, {"type": "R", "before": "step allows the company to analyzethrough internet the performance of the company and also, the", "after": "helps the company analyze, through the Internet, company performance and also", "start_char_pos": 3740, "end_char_pos": 3835}, {"type": "R", "before": "should be focused", "after": "focuses", "start_char_pos": 4034, "end_char_pos": 4051}, {"type": "R", "before": "that can be compared", "after": "to compare", "start_char_pos": 4088, "end_char_pos": 4108}, {"type": "R", "before": ", this", "after": ". This", "start_char_pos": 4135, "end_char_pos": 4141}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 4577, "end_char_pos": 4585}], "sents_char_pos": [0, 223, 243, 274, 505, 550, 605, 854, 986, 1202, 1465, 1485, 1509, 1668, 1852, 1981, 2021, 2069, 2505, 2629, 2642, 2672, 2941, 2992, 3009, 3408, 3429, 3476, 3734, 3853, 3881, 3933, 4245, 4402, 4486]}
+{"doc_id": "54044440", "revision_depth": "1", "before_revision": "Ghana Must Go , was a popular name given to the migration of illegal Migrants (mostly Ghanaians) from Nigeria following a Presidential executive order . In 1983, the President of Nigeria, Shehu Shagari issued an executive order mandating immigrants without proper immigration documents to leave the country or they would be arrested according to the law. The order was in alleged response to the religious disturbances that had engulfed parts of the country in 1980 ( Kano 1980 Riots) and 1981. Most of the immigrants were West Africans and mainly Ghanaians. Over 2 million men, women and children were affected . This is part of a recurring incident in West Africa, where immigrants are expelled for various reasons . Examples of such directives within West African countries include deportations from Ghana of Nigerians in 1954, Cote d'ivore deportation of Togolese, Dahomeyans and Nigerians in 1958, and deportation of aliens (mostly Nigerians) from Ghana in 1969. Over 1 Million Ghanaians and other west Africans were affected by the order. These Migrants were mostly attracted to Nigeria because of the oil market of the 70's, but in 1983 when the \"Ghana Must Go\" revolution started, the economy had weakened and was fast falling apart. It was also the election year. The major route to Ghana was through the West passing through Benin and Togo. Once the migrants got to Benin, the way out was restricted. Those who had already made it to Benin were stuck in the port of Cotonou, the capital city of Benin, with hopes of getting a boat to Ghana. The problems they experienced didn't end there, because due to an attempted coup the previous year, Ghana's president Jerry Rawlings had closed the main land crossing with Togo to avoid the sudden arrival of over 1 Million people. Togo then also shut its borders with Benin. The Ghanaian immigrants were stranded for weeks, thereafter the Ghanaian authority opened their borders causing Togo to also open theirs, for the Ghanaian to have access back home. The relationship between Nigeria and Ghana has since been strengthened . Ghana Must Go Bag A type of cheap matted woven nylon zipped tote bags, used by the migrants to move their belongings got the moniker \"Ghana must go \" during the migration. As of 2019 , the bag is still commonly referred to with this name in most parts of Nigeria, Ghana, and certain parts of West Africa The bag has a variety of names worldwide in Germany it is called the \" Tuerkenkoffer \" (Turkish suitcase), in the USA, it is called the \"Chinatown tote\", in Guyana it is called the \"Guyanese Samsonite\" and the \"Refugee Bag\" in various places around the world. See also Kano 1980 riot", "after_revision": "Ghana Must Go was a popular name given to the migration of illegal migrants (mostly Ghanaians) from Nigeria following a presidential executive order in 1983. In January 1983, the President of Nigeria, Shehu Shagari issued an executive order mandating immigrants without proper immigration documents to leave the country or they would be arrested according to the law. The order was in alleged response to the religious disturbances that had engulfed parts of the country in 1980 ( the Kano Riots) and 1981. Most of the immigrants were West Africans and mainly Ghanaians. Over 2 million men, women and children were affected , including over 1 million Ghanaians and other West Africans. Most had been attracted to Ghana because of the 1970s oil boom, but by 1983 the economy had weakened and it was an election year. Expulsions of immigrants have occurred several times in West Africa, for various reasons , including deportations from Ghana of Nigerians in 1954, from C\u00f4te d'Ivoire of Togolese, Dahomeyans and Nigerians in 1958, and of aliens (mostly Nigerians) from Ghana in 1969. The primary route to Ghana was westwards, passing through Benin and Togo. Because of an attempted coup the previous year, the President of Ghana, Jerry Rawlings, had closed the main land crossing with Togo , and to avoid a sudden influx of returnees, Togo then also shut its borders with Benin. Therefore, once the migrants reached Benin, the way out was restricted and they were forced to remain in the port of Cotonou, the country's seat of government, attempting to find a boat to Ghana. After they had been stranded for more than a week, Ghana reopened its borders, causing Togo to do likewise so that the Ghanaians could return home. The relationship between Nigeria and Ghana has since improved . Ghana Must Go bag A type of cheap matted woven nylon zipped tote bags, used by the migrants to move their belongings , got the moniker \"Ghana Must Go \" during the migration. , the bag is still commonly referred to with this name in most parts of Nigeria, Ghana, and certain parts of West Africa In 2020, New York-based Nigerian photographer Obinna Obioma used the bags to fashion clothing and other items in an exhibition on migration titled Anyi N'Aga (\"We Are Going\" in Igbo). Worldwide, the bag has a variety of other names associating it with migrants. In Germany it is called the \" T\u00fcrkenkoffer \" (Turkish suitcase), in the USA, the \"Chinatown tote\", in Guyana , the \"Guyanese Samsonite\" , and in various other places, the \"Refugee Bag\" .", "edit_actions": [{"type": "D", "before": ",", "after": null, "start_char_pos": 14, "end_char_pos": 15}, {"type": "R", "before": "Migrants", "after": "migrants", "start_char_pos": 69, "end_char_pos": 77}, {"type": "R", "before": "Presidential executive order .", "after": "presidential executive order in 1983.", "start_char_pos": 122, "end_char_pos": 152}, {"type": "A", "before": null, "after": "January", "start_char_pos": 156, "end_char_pos": 156}, {"type": "R", "before": "Kano 1980", "after": "the Kano", "start_char_pos": 469, "end_char_pos": 478}, {"type": "R", "before": ". This is part of a recurring incident", "after": ", including over 1 million Ghanaians and other West Africans. Most had been attracted to Ghana because of the 1970s oil boom, but by 1983 the economy had weakened and it was an election year. Expulsions of immigrants have occurred several times", "start_char_pos": 613, "end_char_pos": 651}, {"type": "D", "before": "where immigrants are expelled", "after": null, "start_char_pos": 668, "end_char_pos": 697}, {"type": "R", "before": ". Examples of such directives within West African countries include", "after": ", including", "start_char_pos": 718, "end_char_pos": 785}, {"type": "R", "before": "Cote d'ivore deportation", "after": "from C\u00f4te d'Ivoire", "start_char_pos": 832, "end_char_pos": 856}, {"type": "D", "before": "deportation", "after": null, "start_char_pos": 908, "end_char_pos": 919}, {"type": "D", "before": "Over 1 Million Ghanaians and other west Africans were affected by the order. These Migrants were mostly attracted to Nigeria because of the oil market of the 70's, but in 1983 when the \"Ghana Must Go\" revolution started, the economy had weakened and was fast falling apart. It was also the election year.", "after": null, "start_char_pos": 969, "end_char_pos": 1273}, {"type": "R", "before": "The major", "after": "The primary", "start_char_pos": 1274, "end_char_pos": 1283}, {"type": "R", "before": "through the West", "after": "westwards,", "start_char_pos": 1303, "end_char_pos": 1319}, {"type": "R", "before": "Once the migrants got to Benin, the way out was restricted. Those who had already made it to Benin were stuck in the port of Cotonou, the capital city of Benin, with hopes of getting a boat to Ghana. The problems they experienced didn't end there, because due to", "after": "Because of", "start_char_pos": 1352, "end_char_pos": 1614}, {"type": "R", "before": "Ghana's president Jerry Rawlings", "after": "the President of Ghana, Jerry Rawlings,", "start_char_pos": 1652, "end_char_pos": 1684}, {"type": "R", "before": "to avoid the sudden arrival of over 1 Million people.", "after": ", and to avoid a sudden influx of returnees,", "start_char_pos": 1729, "end_char_pos": 1782}, {"type": "R", "before": "The Ghanaian immigrants were stranded for weeks, thereafter the Ghanaian authority opened their borders", "after": "Therefore, once the migrants reached Benin, the way out was restricted and they were forced to remain in the port of Cotonou, the country's seat of government, attempting to find a boat to Ghana. After they had been stranded for more than a week, Ghana reopened its borders,", "start_char_pos": 1827, "end_char_pos": 1930}, {"type": "R", "before": "also open theirs, for the Ghanaian to have access back", "after": "do likewise so that the Ghanaians could return", "start_char_pos": 1947, "end_char_pos": 2001}, {"type": "R", "before": "been strengthened", "after": "improved", "start_char_pos": 2061, "end_char_pos": 2078}, {"type": "R", "before": "Bag", "after": "bag", "start_char_pos": 2095, "end_char_pos": 2098}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2198, "end_char_pos": 2198}, {"type": "R", "before": "must go", "after": "Must Go", "start_char_pos": 2222, "end_char_pos": 2229}, {"type": "D", "before": "As of 2019", "after": null, "start_char_pos": 2254, "end_char_pos": 2264}, {"type": "R", "before": "The", "after": "In 2020, New York-based Nigerian photographer Obinna Obioma used the bags to fashion clothing and other items in an exhibition on migration titled Anyi N'Aga (\"We Are Going\" in Igbo).", "start_char_pos": 2386, "end_char_pos": 2389}, {"type": "A", "before": null, "after": "Worldwide, the", "start_char_pos": 2390, "end_char_pos": 2390}, {"type": "R", "before": "names worldwide in", "after": "other names associating it with migrants. In", "start_char_pos": 2412, "end_char_pos": 2430}, {"type": "R", "before": "Tuerkenkoffer", "after": "T\u00fcrkenkoffer", "start_char_pos": 2458, "end_char_pos": 2471}, {"type": "D", "before": "it is called", "after": null, "start_char_pos": 2506, "end_char_pos": 2518}, {"type": "R", "before": "it is called", "after": ",", "start_char_pos": 2551, "end_char_pos": 2563}, {"type": "R", "before": "and", "after": ", and in various other places,", "start_char_pos": 2589, "end_char_pos": 2592}, {"type": "D", "before": "in various places around the world.", "after": null, "start_char_pos": 2611, "end_char_pos": 2646}, {"type": "R", "before": "See also Kano 1980 riot", "after": ".", "start_char_pos": 2647, "end_char_pos": 2670}], "sents_char_pos": [0, 152, 355, 495, 559, 614, 968, 1045, 1242, 1273, 1351, 1411, 1551, 1782, 1826, 2007, 2253, 2646]}
+{"doc_id": "54841832", "revision_depth": "1", "before_revision": "Creative leadership is a style of leadership based upon the concept of working cooperatively to develop innovative ideas. Mumford, M. D., Scott, G. M., Gaddis, B., Strange, J. M. (2002). Leading creative people: Orchestrating expertise and relationships. Leadership Quarterly, 13, 705\u2013750. Those who employ creative leadership tend to do so by creating conditions which promote creativity. Creating such conditions, which are sometimes called \"supportive contributions\", Mainemelis, Charalampos, Ronit Kark, and Olga Epitropaki. \"Creative Leadership: A Multi-Context Conceptualization.\" The Academy of Management Annals 9.1 (2015): 393-482. are described as psychological, material, and/or social supports that trigger, enable, and sustain creative thinking in others. Mainemelis, Charalampos, Ronit Kark, and Olga Epitropaki. \"Creative Leadership: A Multi-Context Conceptualization.\" The Academy of Management Annals 9.1 (2015): 393-482. The term creative leadership is commonly used in organizational studies and was first referenced in 1957.Selznick, P. (1984). Leadership in administration. Berkeley, CA: University of California Press (Originally published 1957). In recent years, there has been a significant increase in research surrounding creative and innovation leadershipDinh, J. E., Lord, R. G., Gardner, W. L., Meuser, J. D., Liden, R. C., Hu, J. (2014). Leadership theory and research in the new millennium: Current theoretical trends and changing perspectives. Leadership Quarterly, 25, 36\u201362. and the term has also been used increasingly among practitionersNikravan, L. (2012). Why creativity is the most important leadership quality. Chief Learning Officer. Retrieved from URL and in the public sphere. Researchers and practitioners have suggested that creative leadership is more important in the current political and economic climate than ever before. It has also been suggested that creative leaders display behaviors that may contradict traditional management styles. In 2010, results from the IBM Global CEO Study indicated that according to the polled Chief executive officers, creativity was the most important quality for leaders to build successful businesses, outranking integrity and global thinking.Nikravan, L. (2012). Why creativity is the most important leadership quality. Chief Learning Officer. Retrieved from URL Further research has found that although organisations may claim that they value creative leadership, the majority of those organisations tend to promote leaders who do not espouse creative leadership, and instead are risk-averse and maintain the status quo. Basadur, M., Basadur, T. (2011). Where are the generators? Psychology of Aesthetics, Creativity, and the Arts, 5, 29\u201342.Mueller, J. S., Goncalo, J. A.,%DIFDELCMD < & %%% Kamdar, D. (2011). Recognizing creative leadership: Can creative idea expression negatively relate to perceptions of leadership potential? Journal of Experimental Social Psychology, 47, 494\u2013498. Ball (2015) suggests that the five core competencies for creative leadership are: \"acting with passion and purpose, applying an explorative mindset, envisioning a better future, orchestrating creative teams, and driving breakthrough change.\"Ball, Rajiv. \"The Paradoxes of Creative Leadership.\" Innovation Management, 7 Aug. 2015, URL Accessed 14 August 2017. Sohmen's (2015) research argues that good creative leaders consistently develop the following characteristics in themselves: leadership styles and perceptions, understanding of different cultures, individual and team motivations, interpersonal skills, levels of creativity, ability to manage change, communication styles, listening ability, decision-making skills, and, personal ethics. Sohmen, V. S. (2015). Reflections on creative leadership. International Journal of Global Business, 8(1), 1-14. Definitions Numerous researchers have used the term creative leadership since it was first used as a concept in the 1950s. The meanings may differ across research contexts. Mainemelis, Charalampos, Ronit Kark, and Olga Epitropaki. \"Creative Leadership: A Multi-Context Conceptualization.\" The Academy of Management Annals 9.1 (2015): 393-482. Retrieved 2017-08-08 Views on the definition and scope of creative leadership include: \"Leading others toward the attainment of a creative outcome\" Mainemelis, Charalampos, Ronit Kark, and Olga Epitropaki. \" Creative Leadership: A Multi-Context Conceptualization.\" The Academy of Management Annals 9.1 (2015): 393-482. Retrieved 2017-08-08 \" Deliberately engaging one's imagination to define and guide a group toward a novel goal-a direction that is new for the group\"Puccio, G., Murdock, M., & Mance, M. (2011). Creative leadership: Skills that drive change (2nd ed.). Thousand Oaks, CA: Sage Publications. \"An imaginative and thought-through response to opportunities and to challenging issues that inhibit learning at all levels. It is about seeing, thinking and doing things differently in order to improve the life chances of all students. Creative leaders also provide the conditions, environment and opportunities for others to be creative.\" \"A creative leader induces others to focus the process and process skills on meeting their challenges. They become consultants or facilitators in the process of solving the challenge rather than giving orders or doing the work themselves. Having transferred ownership, they then help others to achieve their own goals. These creative leadership skills hardly fit with the traditional management style that most organizations employ, but they can be learned.\" Facilitating In the context of facilitating, those who employ creative leadership will support employees or individuals as primary creators, influencing their creative contributions and shaping each stage of the creative process. In the context of facilitating, creative leaders lead in a way that increases employees' likelihood of generating new ideas. Mumford, M. D., Scott, G. M., Gaddis, B., Strange, J. M. (2002). Leading creative people: Orchestrating expertise and relationships. Leadership Quarterly, 13, 705\u2013750. As facilitators, creative leaders foster others' creativity and may take individuals through a process that helps them generate new ideas, such as brainstorming. Rickards, T., Moger, S. (2000). Creative leadership processes in project team development: An alternative to Tuckman\u2019s stage model. British Journal of Management, 11, 273\u2013283.Basadur, M. (2004). Leading other to think innovatively together: Creative leadership. Leadership Quarterly, 15, 103\u2013121. In the context of facilitating, those who employ creative leadership are involved in the entire creative process and shape a supportive climate for creativity. Mumford, M. D., Scott, G. M., Gaddis, B., Strange, J. M. (2002). Leading creative people: Orchestrating expertise and relationships. Leadership Quarterly, 13, 705\u2013750. Directing In the context of directing, those who employ creative leadership are the primary creators and their vision is enacted through contribution and collaboration from others. Mumford, M. D., Scott, G. M., Gaddis, B., Strange, J. M. (2002). Leading creative people: Orchestrating expertise and relationships. Leadership Quarterly, 13 , 705\u2013750. Mumford, Scott, Gadis and Strange (2002) suggest that, in directing, a leader is integral to the production of a creative concept, while others support its implementation. The degree to which others contribute creatively may depend upon the situation. This can be compared to an orchestra conductor, who provides a vision and direction for musicians who bring their own individual contributions. Hunt, J. G., Stelluto, G. E., Hooijberg, R. (2004). Toward new-wave organization creativity: Beyond romance and analogy in the relationship between orchestra-conductor leadership and musician creativity. Leadership Quarterly, 15, 145\u2013162. A strong directive creative leader may inspire, elicit, and integrate high-quality contributions from his or her collaborators. Mumford, M. D., Scott, G. M., Gaddis, B., Strange, J. M. (2002). Leading creative people: Orchestrating expertise and relationships. Leadership Quarterly, 13, 705\u2013750. Integrating In the context of integrating, there is a focus on the creative leader's ability to integrate or synthesize his or her novel ideas with various creative ideas from other individuals. Mumford, M. D., Scott, G. M., Gaddis, B., Strange, J. M. (2002). Leading creative people: Orchestrating expertise and relationships. Leadership Quarterly, 13, 705\u2013750. Compared to directing and facilitating contexts, there is a greater balance between the ratio of leader to follower creative contributions and supportive contributions in the integrating context. Each individual can receive credit for their distinct contribution, and successful leadership in this context depends on the leader's ability to synthesise others' creative inputs. Film directors are an example of leaders working in an integrating context, providing guidance to create a feature film that includes creative contributions from numerous people: screenwriters, actors, special effects technicians, costume designers, etc.Simonton, D. K. (2002). Collaborative aesthetics in the feature film: Cinematic components predicting the differential impact of 2,323 Oscar-nominated movies. Empirical Studies of the Arts, 20, 115\u2013125.", "after_revision": "Creative leadership is a style of leadership based upon the concept of working cooperatively to develop innovative ideas. Those who employ creative leadership tend to do so by creating conditions which promote creativity. Creating such conditions, which are sometimes called \"supportive contributions\", are described as psychological, material, and/or social supports that trigger, enable, and sustain creative thinking in others. The term creative leadership is commonly used in organizational studies and was first referenced in 1957.Selznick, P. (1984). Leadership in administration. Berkeley, CA: University of California Press (Originally published 1957). In recent years, there has been a significant increase in research surrounding creative and innovation leadership and the term has also been used increasingly among practitionersNikravan, L. (2012). Why creativity is the most important leadership quality. Chief Learning Officer. Retrieved from URL and in the public sphere. Researchers and practitioners have suggested that creative leadership is more important in the current political and economic climate than ever before. It has also been suggested that creative leaders display behaviors that may contradict traditional management styles. In 2010, results from the IBM Global CEO Study indicated that according to the polled Chief executive officers, creativity was the most important quality for leaders to build successful businesses, outranking integrity and global thinking.Nikravan, L. (2012). Why creativity is the most important leadership quality. Chief Learning Officer. Retrieved from URL Further research has found that although organisations may claim that they value creative leadership, the majority of those organisations tend to promote leaders who do not espouse creative leadership, and instead are risk-averse and maintain the status quo. %DIFDELCMD < & %%% Ball (2015) suggests that the five core competencies for creative leadership are: \"acting with passion and purpose, applying an explorative mindset, envisioning a better future, orchestrating creative teams, and driving breakthrough change.\"Ball, Rajiv. \"The Paradoxes of Creative Leadership.\" Innovation Management, 7 Aug. 2015, URL Accessed 14 August 2017. Sohmen's (2015) research argues that good creative leaders consistently develop the following characteristics in themselves: leadership styles and perceptions, understanding of different cultures, individual and team motivations, interpersonal skills, levels of creativity, ability to manage change, communication styles, listening ability, decision-making skills, and, personal ethics. Definitions Numerous researchers have used the term creative leadership since it was first used as a concept in the 1950s. The meanings may differ across research contexts. Views on the definition and scope of creative leadership include: \"Leading others toward the attainment of a creative outcome\" \" Deliberately engaging one's imagination to define and guide a group toward a novel goal-a direction that is new for the group\"Puccio, G., Murdock, M., & Mance, M. (2011). Creative leadership: Skills that drive change (2nd ed.). Thousand Oaks, CA: Sage Publications. \"An imaginative and thought-through response to opportunities and to challenging issues that inhibit learning at all levels. It is about seeing, thinking and doing things differently in order to improve the life chances of all students. Creative leaders also provide the conditions, environment and opportunities for others to be creative.\" \"A creative leader induces others to focus the process and process skills on meeting their challenges. They become consultants or facilitators in the process of solving the challenge rather than giving orders or doing the work themselves. Having transferred ownership, they then help others to achieve their own goals. These creative leadership skills hardly fit with the traditional management style that most organizations employ, but they can be learned.\" Facilitating In the context of facilitating, those who employ creative leadership will support employees or individuals as primary creators, influencing their creative contributions and shaping each stage of the creative process. In the context of facilitating, creative leaders lead in a way that increases employees' likelihood of generating new ideas. As facilitators, creative leaders foster others' creativity and may take individuals through a process that helps them generate new ideas, such as brainstorming. In the context of facilitating, those who employ creative leadership are involved in the entire creative process and shape a supportive climate for creativity. Directing In the context of directing, those who employ creative leadership are the primary creators and their vision is enacted through contribution and collaboration from others. Mumford, Scott , Gadis and Strange (2002) suggest that, in directing, a leader is integral to the production of a creative concept, while others support its implementation. The degree to which others contribute creatively may depend upon the situation. This can be compared to an orchestra conductor, who provides a vision and direction for musicians who bring their own individual contributions. A strong directive creative leader may inspire, elicit, and integrate high-quality contributions from his or her collaborators. Integrating In the context of integrating, there is a focus on the creative leader's ability to integrate or synthesize his or her novel ideas with various creative ideas from other individuals. Compared to directing and facilitating contexts, there is a greater balance between the ratio of leader to follower creative contributions and supportive contributions in the integrating context. Each individual can receive credit for their distinct contribution, and successful leadership in this context depends on the leader's ability to synthesise others' creative inputs. Film directors are an example of leaders working in an integrating context, providing guidance to create a feature film that includes creative contributions from numerous people: screenwriters, actors, special effects technicians, costume designers, etc.Simonton, D. K. (2002). Collaborative aesthetics in the feature film: Cinematic components predicting the differential impact of 2,323 Oscar-nominated movies. Empirical Studies of the Arts, 20, 115\u2013125.", "edit_actions": [{"type": "D", "before": "Mumford, M. D., Scott, G. M., Gaddis, B.,", "after": null, "start_char_pos": 122, "end_char_pos": 163}, {"type": "D", "before": "Strange, J. M. (2002). Leading creative people: Orchestrating expertise and relationships. Leadership Quarterly, 13, 705\u2013750.", "after": null, "start_char_pos": 164, "end_char_pos": 289}, {"type": "D", "before": "Mainemelis, Charalampos, Ronit Kark, and Olga Epitropaki. \"Creative Leadership: A Multi-Context Conceptualization.\" The Academy of Management Annals 9.1 (2015): 393-482.", "after": null, "start_char_pos": 471, "end_char_pos": 640}, {"type": "D", "before": "Mainemelis, Charalampos, Ronit Kark, and Olga Epitropaki. \"Creative Leadership: A Multi-Context Conceptualization.\" The Academy of Management Annals 9.1 (2015): 393-482.", "after": null, "start_char_pos": 769, "end_char_pos": 938}, {"type": "D", "before": "leadershipDinh, J. E., Lord, R. G., Gardner, W. L., Meuser, J. D., Liden, R. C.,", "after": null, "start_char_pos": 1272, "end_char_pos": 1352}, {"type": "R", "before": "Hu, J. (2014). Leadership theory and research in the new millennium: Current theoretical trends and changing perspectives. Leadership Quarterly, 25, 36\u201362. and the", "after": "leadership and the", "start_char_pos": 1353, "end_char_pos": 1516}, {"type": "D", "before": "Basadur, M.,", "after": null, "start_char_pos": 2609, "end_char_pos": 2621}, {"type": "D", "before": "Basadur, T. (2011). Where are the generators? Psychology of Aesthetics, Creativity, and the Arts, 5, 29\u201342.Mueller, J. S., Goncalo, J. A.,", "after": null, "start_char_pos": 2622, "end_char_pos": 2760}, {"type": "D", "before": "Kamdar, D. (2011). Recognizing creative leadership: Can creative idea expression negatively relate to perceptions of leadership potential? Journal of Experimental Social Psychology, 47, 494\u2013498.", "after": null, "start_char_pos": 2779, "end_char_pos": 2973}, {"type": "D", "before": "Sohmen, V. S. (2015). Reflections on creative leadership. International Journal of Global Business, 8(1), 1-14.", "after": null, "start_char_pos": 3720, "end_char_pos": 3831}, {"type": "D", "before": "Mainemelis, Charalampos, Ronit Kark, and Olga Epitropaki. \"Creative Leadership: A Multi-Context Conceptualization.\" The Academy of Management Annals 9.1 (2015): 393-482. Retrieved 2017-08-08", "after": null, "start_char_pos": 4005, "end_char_pos": 4195}, {"type": "D", "before": "Mainemelis, Charalampos, Ronit Kark, and Olga Epitropaki.", "after": null, "start_char_pos": 4323, "end_char_pos": 4380}, {"type": "D", "before": "Creative Leadership: A Multi-Context Conceptualization.\" The Academy of Management Annals 9.1 (2015): 393-482. Retrieved 2017-08-08 \"", "after": null, "start_char_pos": 4383, "end_char_pos": 4516}, {"type": "D", "before": "Mumford, M. D., Scott, G. M., Gaddis, B.,", "after": null, "start_char_pos": 5938, "end_char_pos": 5979}, {"type": "D", "before": "Strange, J. M. (2002). Leading creative people: Orchestrating expertise and relationships. Leadership Quarterly, 13, 705\u2013750.", "after": null, "start_char_pos": 5980, "end_char_pos": 6105}, {"type": "D", "before": "Rickards, T.,", "after": null, "start_char_pos": 6268, "end_char_pos": 6281}, {"type": "D", "before": "Moger, S. (2000). Creative leadership processes in project team development: An alternative to Tuckman\u2019s stage model. British Journal of Management, 11, 273\u2013283.Basadur, M. (2004). Leading other to think innovatively together: Creative leadership. Leadership Quarterly, 15, 103\u2013121.", "after": null, "start_char_pos": 6282, "end_char_pos": 6564}, {"type": "D", "before": "Mumford, M. D., Scott, G. M., Gaddis, B.,", "after": null, "start_char_pos": 6725, "end_char_pos": 6766}, {"type": "D", "before": "Strange, J. M. (2002). Leading creative people: Orchestrating expertise and relationships. Leadership Quarterly, 13, 705\u2013750.", "after": null, "start_char_pos": 6767, "end_char_pos": 6892}, {"type": "D", "before": "M. D., Scott, G. M., Gaddis, B.,", "after": null, "start_char_pos": 7083, "end_char_pos": 7115}, {"type": "R", "before": "Strange, J. M. (2002). Leading creative people: Orchestrating expertise and relationships. Leadership Quarterly, 13", "after": "Scott", "start_char_pos": 7116, "end_char_pos": 7231}, {"type": "D", "before": "705\u2013750. Mumford, Scott,", "after": null, "start_char_pos": 7234, "end_char_pos": 7258}, {"type": "D", "before": "Hunt, J. G., Stelluto, G. E.,", "after": null, "start_char_pos": 7639, "end_char_pos": 7668}, {"type": "D", "before": "Hooijberg, R. (2004). Toward new-wave organization creativity: Beyond romance and analogy in the relationship between orchestra-conductor leadership and musician creativity. Leadership Quarterly, 15, 145\u2013162.", "after": null, "start_char_pos": 7669, "end_char_pos": 7877}, {"type": "D", "before": "Mumford, M. D., Scott, G. M., Gaddis, B.,", "after": null, "start_char_pos": 8006, "end_char_pos": 8047}, {"type": "D", "before": "Strange, J. M. (2002). Leading creative people: Orchestrating expertise and relationships. Leadership Quarterly, 13, 705\u2013750.", "after": null, "start_char_pos": 8048, "end_char_pos": 8173}, {"type": "D", "before": "Mumford, M. D., Scott, G. M., Gaddis, B.,", "after": null, "start_char_pos": 8369, "end_char_pos": 8410}, {"type": "D", "before": "Strange, J. M. (2002). Leading creative people: Orchestrating expertise and relationships. Leadership Quarterly, 13, 705\u2013750.", "after": null, "start_char_pos": 8411, "end_char_pos": 8536}], "sents_char_pos": [0, 121, 186, 254, 289, 389, 528, 586, 768, 826, 884, 938, 1044, 1064, 1094, 1168, 1367, 1475, 1593, 1650, 1674, 1719, 1871, 1989, 2229, 2249, 2306, 2330, 2608, 2641, 2667, 2729, 2797, 2917, 2973, 3214, 3267, 3332, 3719, 3741, 3777, 3831, 3954, 4004, 4062, 4120, 4174, 4380, 4439, 4493, 4687, 4744, 4782, 4907, 5019, 5123, 5226, 5362, 5442, 5582, 5812, 5937, 6002, 6070, 6105, 6267, 6299, 6399, 6443, 6462, 6529, 6564, 6724, 6789, 6857, 6892, 7073, 7138, 7206, 7242, 7414, 7494, 7638, 7690, 7842, 7877, 8005, 8070, 8138, 8173, 8368, 8433, 8501, 8536, 8732, 8913, 9168, 9191, 9326]}
+{"doc_id": "5496724", "revision_depth": "1", "before_revision": "Definitions Several scholars have noted difficulty in attempting to delimit the scope, meaning, and applications of language ideology. Linguistic anthropologist Paul Kroskrity describes language ideology as a \u201ccluster concept, consisting of a number of converging dimensions\u201d with several \u201cpartially overlapping but analytically distinguishable layers of significance,\u201d and cites that in the existing scholarship on language ideology \u201cthere is no particular unity . . . no core literature, and a range of definitions.\u201d One of the broadest definitions is offered by Alan Rumsey, who describes language ideologies as \u201cshared bodies of commonsense notions about the nature of language in the world.\u201d This definition is seen by Kroskrity as unsatisfactory, however, because \u201cit fails to problematize language ideological variation and therefore promotes an overly homogeneous view of language ideologies within a cultural group.\u201d Emphasizing the role of speakers\u2019 awareness in influencing language structure, Michael Silverstein defines linguistic ideologies as \u201csets of beliefs about language articulated by users as a rationalization or justification of perceived language structure and use.\u201dSilverstein, M. (1979). Language Structure and Linguistic Ideology. In P. Clyne, W. Hanks, and C. Hofbauer (eds.), The Elements (pp. 193\u2013248). Chicago: Chicago Linguistic Society. Definitions that place greater emphasis on sociocultural factors include Shirley Heath\u2019s characterization of language ideologies as \u201cself-evident ideas and objectives a group holds concerning roles of language in the social experiences of members as they contribute to the expression of the group\u201dHeath, SB. (1977). Social history. In Bilingual Education: Current Perspectives. Vol. 1: Social Science, pp. 53--72. Arlington, VA: Center for Applied Linguistics. and Judith Irvine\u2019s definition of the concept as \u201cthe cultural system of ideas about social and linguistic relationships, together with their loading of moral and political interests.\u201dIrvine, J. (1989). When talk isn't cheap: language and political economy. American Ethnologist 16(2):248-67. Critical vs. neutral approaches The basic division in studies of language ideology is between neutral and critical approaches to ideology. In neutral approaches to language ideology, speakers\u2019 beliefs or ideas about language are understood as being shaped by the cultural systems in which they are embedded, but no attempt to identify variation within or across these systems is made . Often, a single ideology will be identified in such cases. Characterizations of language ideology as representative of an entire community or culture, such as those routinely documented in ethnographic research, are common examples of neutral approaches to language ideology. Ethnography of speaking Studies of \"ways of speaking\" within specific communities have been recognized as especially productive sites of language ideological investigation . They often include a community's own theory of speech as a part of their ethnography, which allows for the documentation of explicit language ideologies on a community-wide level or in \u201cthe neutral sense of cultural conceptions.\u201d A study of language socialization practices in Dominica, for example, revealed that local notions of personhood, status, and authority are associated with the strategic usage of Patwa and English in the course of the adult-child interaction.Paugh, A.L. (2005). \u2018Acting adult: Language socialization, shift, and ideologies in Dominica, West Indies\u2019, in J. Cohen, K.T. McAlister, K. Rolstad, and J. MacSwan (eds.), Proceedings of the 4th International Symposium on Bilingualism. Cascadilla Press, Somerville, MA, 1807\u20131820. The use of Patwa by children is largely forbidden by adults due to a perception that it inhibits the acquisition of English and thus restricts social mobility, which in turn has imbued Patwa with a significant measure of covert prestige and rendered it a powerful tool for children to utilize in order to defy authority. Thus there are multiple, competing ideologies of Patwa in Dominica: one which encourages a shift away from Patwa usage ; and another which contributes to its maintenance. Linguistic ideologies in speech act theory J. L. Austin and John Searle's speech act theory has been described by several ethnographers, anthropologists, and linguists as being based in a specifically Western linguistic ideology that renders it inapplicable in certain ethnographic contexts. Jef Verschueren characterized speech act theory as privileging \u201ca privatized view of language that emphasizes the psychological state of the speaker while downplaying the social consequences of speech,\u201d while Michael Silverstein argued that the theory's ideas about language \u201cacts\u201d and \u201cforces\u201d are \u201cprojections of covert categories typical in the metapragmatic discourse of languages such as English.\u201d Scholars have subsequently used speech act theory to caution against the positioning of linguistic theories as universal applicable, citing that any account of language will reflect the linguistic ideologies held by those who develop it.Pratt, M.L. (1986). Ideology and Speech-Act Theory. Poetics Today 7.1: 59-72 Language policy Governmental policies often reflect the tension between two contrasting types of language ideologies: ideologies that conceive of language as a resource, problem, or rightHult, F.M., & Hornberger, N.H. (2016). Re-visiting orientations to language planning: problem, right, and resource. Bilingual Review/La revista biling\u00fce, 33(3), 30-49. Available from bilingualreview.utsa.edu and ideologies that conceive of language as pluralistic phenomena. The language-related policies that emerge in such instances often reflect the compromise that is reached between these two types of ideologies.Hult, F.M., & Pietik\u00e4inen, S. (2014). Shaping discourses of multilingualism through a language ideological debate: The case of Swedish in Finland. Journal of Language and Politics, 13, 1-20. According to Blommaert and Verschueren, this compromise is often reinterpreted as a single, unified ideology, evidenced by the many European societies characterized by a language ideological homogenism. Ideologies of linguistic purism Purist language ideologies or ideologies of linguistic conservatism can close off languages to nonnative sources of innovation, usually when such sources are perceived as socially or politically threatening to the target language.Weinstein, B. (1989). Francophonie: Purism at the International Level. In The Politics of Language Purism, ed. Bjorn H. Jernudd and Michael Shapiro, pp. 53-80. Berlin: Mouton de Gruyter. Among the Tewa, for example, the influence of theocratic institutions and ritualized linguistic forms in other domains of Tewa society have led to a strong resistance to the extensive borrowing and shift many of its neighboring language communities have experienced. According to Paul Kroskrity this is due to a \"dominant language ideology\" through which ceremonial Kiva speech is elevated to a linguistic ideal and the cultural preferences that it embodies, namely regulation by convention, indigenous purism, strict compartmentalization, and linguistic indexing of identity, are recursively projected onto the Tewa language as a whole.Kroskrity, Paul V. (1993). Language, History, and Identity: Ethnolinguistic Studies of the Arizona Tewa. Tucson: University of Arizona Press.Kroskrity, Paul V. (1998). Arizona Tewa Kiva Speech as a Manifestation of Linguistic Ideology. In Language ideologies: Practice and theory. Bambi B. Schieffelin, Kathryn A. Woolard, and Paul V. Kroskrity, eds., pp. 103-122. New York: Oxford University Press. Literacy Literacy cannot be strictly defined technically, but is rather a set of practices determined by the language ideology of a community . It can be interpreted in a multitude of ways that are determined by political, social, and economic forces.Street, B.V. (1984). Literacy in Theory and Practice. New York: Cambridge Univ. Press According to Kathryn Woolard and Bambi Schieffelin, literacy traditions are closely linked to social control in most societies. The typical European literacy ideology, for example, recognizes literacy solely in an alphabetic capacity. Kaluli literacy development In the 1960s, missionaries arrived in Papua New Guinea and exposed the Kaluli to Christianity and modernization, part of which was accomplished through the introduction of literacy.Schieffelin, B. B. (2000). Introducing Kaluli Literacy: A Chronology of Influences. In P. V. Kroskrity (ed.), Regimes of Language: pp. 293\u2013327. Santa Fe, NM: School of American Research Press. The Kaluli primers that were introduced by the missionaries promoted Westernization, which effectively served to strip the vernacular language of cultural practices and from discourse in church and school. Readers written in the 1970s used derogatory terms to refer to the Kaluli and depicted their practices as inferior, motivating the Kaluli to change their self-perceptions and orient themselves towards Western values. The missionaries \u2019 control of these authoritative books and of this new \u201ctechnology of language literacy\u201d gave them the power to effect culture change and morph the ideology of Kaluli into that of modern Christianity.", "after_revision": "Definitions Scholars have noted difficulty in attempting to delimit the scope, meaning, and applications of language ideology. Linguistic anthropologist Paul Kroskrity describes language ideology as a \u201ccluster concept, consisting of a number of converging dimensions\u201d with several \u201cpartially overlapping but analytically distinguishable layers of significance,\u201d and cites that in the existing scholarship on language ideology \u201cthere is no particular unity . . . no core literature, and a range of definitions.\u201d One of the broadest definitions is offered by Alan Rumsey, who describes language ideologies as \u201cshared bodies of commonsense notions about the nature of language in the world.\u201d This definition is seen by Kroskrity as unsatisfactory, however, because \u201cit fails to problematize language ideological variation and therefore promotes an overly homogeneous view of language ideologies within a cultural group.\u201d Emphasizing the role of speakers\u2019 awareness in influencing language structure, Michael Silverstein defines linguistic ideologies as \u201csets of beliefs about language articulated by users as a rationalization or justification of perceived language structure and use.\u201dSilverstein, M. (1979). Language Structure and Linguistic Ideology. In P. Clyne, W. Hanks, and C. Hofbauer (eds.), The Elements (pp. 193\u2013248). Chicago: Chicago Linguistic Society. Definitions that place greater emphasis on sociocultural factors include Shirley Heath\u2019s characterization of language ideologies as \u201cself-evident ideas and objectives a group holds concerning roles of language in the social experiences of members as they contribute to the expression of the group\u201dHeath, SB. (1977). Social history. In Bilingual Education: Current Perspectives. Vol. 1: Social Science, pp. 53--72. Arlington, VA: Center for Applied Linguistics. and Judith Irvine\u2019s definition of the concept as \u201cthe cultural system of ideas about social and linguistic relationships, together with their loading of moral and political interests.\u201dIrvine, J. (1989). When talk isn't cheap: language and political economy. American Ethnologist 16(2):248-67. Critical vs. neutral approaches The basic division in studies of language ideology is between neutral and critical approaches to ideology. In neutral approaches to language ideology, beliefs or ideas about a language are understood to be shaped by the cultural systems in which it is embedded, but no variation within or across these systems is identified . Often, a single ideology will be identified in such cases. Characterizations of language ideology as representative of one community or culture, such as those routinely documented in ethnographic research, are common examples of neutral approaches to language ideology. Ethnography of speaking Studies of \"ways of speaking\" within specific communities have been recognized as especially productive sites of research in language ideology . They often include a community's own theory of speech as a part of their ethnography, which allows for the documentation of explicit language ideologies on a community-wide level or in \u201cthe neutral sense of cultural conceptions.\u201d A study of language socialization practices in Dominica, for example, revealed that local notions of personhood, status, and authority are associated with the strategic usage of Patwa and English in the course of the adult-child interaction.Paugh, A.L. (2005). \u2018Acting adult: Language socialization, shift, and ideologies in Dominica, West Indies\u2019, in J. Cohen, K.T. McAlister, K. Rolstad, and J. MacSwan (eds.), Proceedings of the 4th International Symposium on Bilingualism. Cascadilla Press, Somerville, MA, 1807\u20131820. The use of Patwa by children is largely forbidden by adults due to a perception that it inhibits the acquisition of English , thus restricting social mobility, which in turn has imbued Patwa with a significant measure of covert prestige and rendered it a powerful tool for children to utilize in order to defy authority. Thus there are many competing ideologies of Patwa in Dominica: one which encourages a shift away from Patwa usage and another which contributes to its maintenance. Linguistic ideologies in speech act theory J. L. Austin and John Searle's speech act theory has been described by several ethnographers, anthropologists, and linguists as being based in a specifically Western linguistic ideology that renders it inapplicable in certain ethnographic contexts. Jef Verschueren characterized speech act theory as privileging \u201ca privatized view of language that emphasizes the psychological state of the speaker while downplaying the social consequences of speech,\u201d while Michael Silverstein argued that the theory's ideas about language \u201cacts\u201d and \u201cforces\u201d are \u201cprojections of covert categories typical in the metapragmatic discourse of languages such as English.\u201d Scholars have subsequently used speech act theory to caution against the positioning of linguistic theories as universally applicable, citing that any account of language will reflect the linguistic ideologies held by those who develop it.Pratt, M.L. (1986). Ideology and Speech-Act Theory. Poetics Today 7.1: 59-72 Language policy Governmental policies often reflect the tension between two contrasting types of language ideologies: ideologies that conceive of language as a resource, problem, or rightHult, F.M., & Hornberger, N.H. (2016). Re-visiting orientations to language planning: problem, right, and resource. Bilingual Review/La revista biling\u00fce, 33(3), 30-49. Available from bilingualreview.utsa.edu and ideologies that conceive of language as pluralistic phenomena. The linguistic policies that emerge in such instances often reflect a compromise between both types of ideologies.Hult, F.M., & Pietik\u00e4inen, S. (2014). Shaping discourses of multilingualism through a language ideological debate: The case of Swedish in Finland. Journal of Language and Politics, 13, 1-20. According to Blommaert and Verschueren, this compromise is often reinterpreted as a single, unified ideology, evidenced by the many European societies characterized by a language ideological homogenism. Ideologies of linguistic purism Purist language ideologies or ideologies of linguistic conservatism can close off languages to nonnative sources of innovation, usually when such sources are perceived as socially or politically threatening to the target language.Weinstein, B. (1989). Francophonie: Purism at the International Level. In The Politics of Language Purism, ed. Bjorn H. Jernudd and Michael Shapiro, pp. 53-80. Berlin: Mouton de Gruyter. Among the Tewa, for example, the influence of theocratic institutions and ritualized linguistic forms in other domains of Tewa society have led to a strong resistance to the extensive borrowing and shift that neighboring speech communities have experienced. According to Paul Kroskrity this is due to a \"dominant language ideology\" through which ceremonial Kiva speech is elevated to a linguistic ideal and the cultural preferences that it embodies, namely regulation by convention, indigenous purism, strict compartmentalization, and linguistic indexing of identity, are recursively projected onto the Tewa language as a whole.Kroskrity, Paul V. (1993). Language, History, and Identity: Ethnolinguistic Studies of the Arizona Tewa. Tucson: University of Arizona Press.Kroskrity, Paul V. (1998). Arizona Tewa Kiva Speech as a Manifestation of Linguistic Ideology. In Language ideologies: Practice and theory. Bambi B. Schieffelin, Kathryn A. Woolard, and Paul V. Kroskrity, eds., pp. 103-122. New York: Oxford University Press. Literacy Literacy cannot be strictly defined technically, but rather it is a set of practices determined by a community's language ideology . It can be interpreted in many ways that are determined by political, social, and economic forces.Street, B.V. (1984). Literacy in Theory and Practice. New York: Cambridge Univ. Press According to Kathryn Woolard and Bambi Schieffelin, literacy traditions are closely linked to social control in most societies. The typical European literacy ideology, for example, recognizes literacy solely in an alphabetic capacity. Kaluli literacy development In the 1960s, missionaries arrived in Papua New Guinea and exposed the Kaluli to Christianity and modernization, part of which was accomplished through the introduction of literacy.Schieffelin, B. B. (2000). Introducing Kaluli Literacy: A Chronology of Influences. In P. V. Kroskrity (ed.), Regimes of Language: pp. 293\u2013327. Santa Fe, NM: School of American Research Press. The Kaluli primers that were introduced by the missionaries promoted Westernization, which effectively served to strip the vernacular language of cultural practices and from discourse in church and school. Readers written in the 1970s used derogatory terms to refer to the Kaluli and depicted their practices as inferior, motivating the Kaluli to change their self-perceptions and orient themselves towards Western values. The missionaries ' control of these authoritative books and of this new \u201ctechnology of language literacy\u201d gave them the power to effect culture change and morph the ideology of Kaluli into that of modern Christianity.", "edit_actions": [{"type": "R", "before": "Several scholars", "after": "Scholars", "start_char_pos": 12, "end_char_pos": 28}, {"type": "D", "before": "speakers\u2019", "after": null, "start_char_pos": 2307, "end_char_pos": 2316}, {"type": "A", "before": null, "after": "a", "start_char_pos": 2340, "end_char_pos": 2340}, {"type": "R", "before": "as being", "after": "to be", "start_char_pos": 2365, "end_char_pos": 2373}, {"type": "R", "before": "they are", "after": "it is", "start_char_pos": 2414, "end_char_pos": 2422}, {"type": "D", "before": "attempt to identify", "after": null, "start_char_pos": 2440, "end_char_pos": 2459}, {"type": "R", "before": "made", "after": "identified", "start_char_pos": 2504, "end_char_pos": 2508}, {"type": "R", "before": "an entire", "after": "one", "start_char_pos": 2630, "end_char_pos": 2639}, {"type": "R", "before": "language ideological investigation", "after": "research in language ideology", "start_char_pos": 2924, "end_char_pos": 2958}, {"type": "R", "before": "and thus restricts", "after": ", thus restricting", "start_char_pos": 3837, "end_char_pos": 3855}, {"type": "R", "before": "multiple,", "after": "many", "start_char_pos": 4049, "end_char_pos": 4058}, {"type": "D", "before": ";", "after": null, "start_char_pos": 4153, "end_char_pos": 4154}, {"type": "R", "before": "universal", "after": "universally", "start_char_pos": 5011, "end_char_pos": 5020}, {"type": "R", "before": "language-related", "after": "linguistic", "start_char_pos": 5680, "end_char_pos": 5696}, {"type": "R", "before": "the compromise that is reached between these two", "after": "a compromise between both", "start_char_pos": 5750, "end_char_pos": 5798}, {"type": "R", "before": "many of its neighboring language", "after": "that neighboring speech", "start_char_pos": 6866, "end_char_pos": 6898}, {"type": "R", "before": "is rather", "after": "rather it is", "start_char_pos": 7761, "end_char_pos": 7770}, {"type": "R", "before": "the language ideology of a community", "after": "a community's language ideology", "start_char_pos": 7804, "end_char_pos": 7840}, {"type": "R", "before": "a multitude of", "after": "many", "start_char_pos": 7868, "end_char_pos": 7882}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 9113, "end_char_pos": 9114}], "sents_char_pos": [0, 134, 518, 696, 1190, 1213, 1257, 1332, 1369, 1685, 1701, 1747, 1783, 2015, 2033, 2088, 2123, 2262, 2510, 2569, 2786, 2960, 3190, 3432, 3451, 3667, 3712, 4033, 4154, 4204, 4496, 4899, 5137, 5156, 5188, 5439, 5516, 5568, 5675, 5819, 5856, 5965, 6009, 6212, 6475, 6496, 6545, 6585, 6634, 6661, 6928, 7299, 7325, 7403, 7440, 7466, 7534, 7579, 7612, 7663, 7698, 7842, 7950, 7970, 8003, 8029, 8163, 8270, 8480, 8506, 8563, 8623, 8672, 8878, 9095]}
+{"doc_id": "555360", "revision_depth": "1", "before_revision": "The Ashanti\u2013Fante Wars (1806\u2013 1823 ) was a series of wars fought between the Ashanti Kingdom and the Fante Confederacy in the region of what is currently the Republic of Ghana. The Ashanti Kingdom became the one of the most powerful of the interior after finally defeating the Denkyira under whom they were a vassal state. The Fante Confederacy Union of Fante States%DIFDELCMD < ] %%% were the most dominant coastal group and controlled all trade between Europeans and the interior. The Asante Kongdom was ruled from 1701 to 1957 by the Oyoko Clan. The main source of wealth in the Akan economy was gold, but during the conflicts between Fante and Ashanti , many war captives were sold as prisoners and then into slavery by both sides. Both the Fante and Asante are Akan and related as they both primarily were the descendants of the founder of the Bona kingdom in the Ivory Coast and Ghana . A group of the Fante were said to have migrated to the south of Etsi by the beginning of the 12th century. The Fante are related to the Ashantis as both groups originated from the Bono Kingdom. Fante Confederacy were a very complex connection and cluster of several independent states that were the dominant power based chiefly on the coastal regions of the Gold Coast. Group interaction between the Ashanti and Fante had long existed, since historically, the Fante were thought of as a breakaway group of the initial Akan clan. However, by the beginning of the nineteenth century, this group action had escalated to hostility because they Fante had grown wealthy by controlling trade between Europeans and the interior. The Ashanti wanted direct to trade with Europeans. Overtime, the British were the standard European allies of the Fante, whereas the Dutch sided with the Ashanti. Due to this alliance with the British, several historic Fante Asafo Companies (War Units) had the Union Jack as part of their Frankaa (Regimental battle flags). These flags became prized collection items for many Europeans . The war began in 1806 when the Ashanti king, or Asantehene, brought charges of grave robbing on some of his subjects who run from Kumasi to Assin. Fleeing Ashanti lands, these suspected grave robbers were granted refuge by the Fante. Ashanti king Osei Bonsu sent out an army against the Fante for harboring fugitives. At Abura Dunkwa, a major battle was fought, during which the Ashanti were initially victorious and captured the accused Assin Chief . After the capture , the Ashanti commander, Appia , sent his men further inward to Fante territory where they met the rear guard and support army of the Fante Forces commanded by Atta that had previously broken away from the other Fante armies at Mumford. The combined Fante Union Army now under Atta's command rendezvoused at Tantumkweri where they defeated the Ashanti after a long day of fighting. This war, also known as the Ghana War, begins between the Ashanti and Fante Confederacy of present\u2013day Ghana. The Ashanti had resisted makes an attempt by Europeans, chiefly the British, to subjugate them, and aligned themselves with the Dutch to limit British influence within the region. However, the UK still annexed neighboring areas, together with the Fante, and also the succeeding conflicts eventually increase into the war of 1806. In 1811 the Ga\u2013Fante War sees the defeat of the Ashanti, though they still capture a British fort. In 1814 the Ashanti launch an invasion of the coast leading to a series of battles that culminated in the Anglo Ashanti Wars . The Bond of 1844, a peace pact between Britain and the FanteConfederacy is signed. The Bond allied the Fante and the British in response to the Ashanti and Dutch signing a pact. This bond also stipulated and formally stated that Mfantseman will never be ceded to Europeans similar to what had happened in South Africa and Later Rhodesia. The Fante were allied with the British throughout the Anglo-Ashanti Wars . See also Ashanti Kingdom Ga\u2013Fante War", "after_revision": "The Ashanti\u2013Fante War (1806\u2013 1807 ) was a war fought between the Ashanti Kingdom and the Fante Confederacy in the region of what is currently the Republic of Ghana. The Ashanti Kingdom became the most powerful of the interior after finally defeating the Denkyira under whom they were a vassal state. The %DIFDELCMD < ] %%% Asante Kongdom was ruled from 1701 to 1957 by the Oyoko Clan. The main source of wealth in the Akan economy was gold, but during the conflicts between Fante and Ashanti many war captives were sold as prisoners and then into slavery by both sides. This group was created by a small group which used to call themselves Oyoko, which primarily were the descendants of the founder of the Bona kingdom in the Ivory Coast . A group of the Fante were said to have migrated to the south of Etsi by the beginning of the seventeenth century. The Fante are related by o the Ashantis as both groups originated from the Bono Kingdom. Fantes were complex connection and cluster of several independent states that were the dominant power based mostly chiefly on the coastal regions of the Gold Coast. Group interaction between the Ashanti and Fante had long existed, since historically, the Fante were thought of as a breakaway group of the initial Akan clan. However, by the beginning of the nineteenth century, this group action had escalated to hostility because they Fante had grown wealthy by controlling trade between Europeans and the interior. Overtime, the British were the standard European allies of the Fante, whereas the Dutch sided with the Ashanti. Due to this alliance with the British, several historic Fante Asafo Companies (War Units) had the Union Jack as part of their Frankaa (Regimental battle flags). These flags became prized collection items for many Europeans in the Coast Coast . The war began in 1806 when the Ashanti king, or Asantehene, brought charges of grave robbing on some of his subjects who run from Kumasi to Assin. Fleeing Ashanti lands, these suspected grave robbers were granted refuge by the Fante. Ashanti king Osei Bonsu sent out an army against the Fante for harboring fugitives. At Abura Dunkwa, a major battle was fought, during which the Ashanti were initially victorious and captured the accused Assin Chief , Otsibu. After they captured Otsibu , the Ashanti commander, Appia Dunkwa , sent his men further inward to Fante territory where they met the rear guard and support army of the Fante Forces commanded by Atta that had previously broken away from the other Fante armies at Mumford. The combined Fante Union Army now under Atta's command rendezvoused at Tantumkweri where they defeated the Ashanti after a long day of fighting. This war, also known as the Ghana War, begins between the Ashanti associate degree Fante Confederacies of present\u2013day Ghana. The Ashanti had resisted makes an attempt by Europeans, chiefly the British, to subjugate them, and aligned themselves with the Dutch to limit British influence within the region. However, the UK still annexed neighboring areas, together with the Fante, and also the succeeding conflicts eventually increase into the war of 1806, during which the Ashanti are victorious. In 1811 the Ga\u2013Fante War sees the defeat of the Ashanti, though they still capture a British fort. In 1814 the Ashanti launch an invasion of the Gold Coast, totally routing the tribes allied with the Europeans . The Bond of 1844, a pact between nice Britain, the Fante, Associate in Nursing others, is signed. The Bond legalized the imposition of nation system throughout Fanteland (in modern\u2013day southern Ghana), and conjointly secure the Fante that the British would shield them within the event of an Ashanti attack. The Fante were allied with the British throughout the Ashanti War (1873\u20131874) . See also Ashanti Empire Ga\u2013Fante War", "edit_actions": [{"type": "R", "before": "Wars", "after": "War", "start_char_pos": 18, "end_char_pos": 22}, {"type": "R", "before": "1823", "after": "1807", "start_char_pos": 30, "end_char_pos": 34}, {"type": "R", "before": "series of wars", "after": "war", "start_char_pos": 43, "end_char_pos": 57}, {"type": "D", "before": "one of the", "after": null, "start_char_pos": 208, "end_char_pos": 218}, {"type": "D", "before": "Fante Confederacy", "after": null, "start_char_pos": 327, "end_char_pos": 344}, {"type": "D", "before": "Union of Fante States", "after": null, "start_char_pos": 345, "end_char_pos": 366}, {"type": "D", "before": "were the most dominant coastal group and controlled all trade between Europeans and the interior.", "after": null, "start_char_pos": 385, "end_char_pos": 482}, {"type": "D", "before": "The", "after": null, "start_char_pos": 483, "end_char_pos": 486}, {"type": "D", "before": ",", "after": null, "start_char_pos": 656, "end_char_pos": 657}, {"type": "R", "before": "Both the Fante and Asante are Akan and related as they both", "after": "This group was created by a small group which used to call themselves Oyoko, which", "start_char_pos": 736, "end_char_pos": 795}, {"type": "D", "before": "and Ghana", "after": null, "start_char_pos": 881, "end_char_pos": 890}, {"type": "R", "before": "12th", "after": "seventeenth", "start_char_pos": 986, "end_char_pos": 990}, {"type": "R", "before": "to", "after": "by o", "start_char_pos": 1022, "end_char_pos": 1024}, {"type": "R", "before": "Fante Confederacy were a very", "after": "Fantes were", "start_char_pos": 1087, "end_char_pos": 1116}, {"type": "A", "before": null, "after": "mostly", "start_char_pos": 1213, "end_char_pos": 1213}, {"type": "D", "before": "The Ashanti wanted direct to trade with Europeans.", "after": null, "start_char_pos": 1615, "end_char_pos": 1665}, {"type": "A", "before": null, "after": "in the Coast Coast", "start_char_pos": 2001, "end_char_pos": 2001}, {"type": "R", "before": ". After the capture", "after": ", Otsibu. After they captured Otsibu", "start_char_pos": 2454, "end_char_pos": 2473}, {"type": "A", "before": null, "after": "Dunkwa", "start_char_pos": 2505, "end_char_pos": 2505}, {"type": "R", "before": "and Fante Confederacy", "after": "associate degree Fante Confederacies", "start_char_pos": 2923, "end_char_pos": 2944}, {"type": "R", "before": "1806.", "after": "1806, during which the Ashanti are victorious.", "start_char_pos": 3291, "end_char_pos": 3296}, {"type": "R", "before": "coast leading to a series of battles that culminated in the Anglo Ashanti Wars", "after": "Gold Coast, totally routing the tribes allied with the Europeans", "start_char_pos": 3442, "end_char_pos": 3520}, {"type": "R", "before": "peace pact between Britain and the FanteConfederacy", "after": "pact between nice Britain, the Fante, Associate in Nursing others,", "start_char_pos": 3543, "end_char_pos": 3594}, {"type": "R", "before": "allied the Fante and the British in response to the Ashanti and Dutch signing a pact. This bond also stipulated and formally stated that Mfantseman will never be ceded to Europeans similar to what had happened in South Africa and Later Rhodesia.", "after": "legalized the imposition of nation system throughout Fanteland (in modern\u2013day southern Ghana), and conjointly secure the Fante that the British would shield them within the event of an Ashanti attack.", "start_char_pos": 3615, "end_char_pos": 3860}, {"type": "R", "before": "Anglo-Ashanti Wars", "after": "Ashanti War (1873\u20131874)", "start_char_pos": 3915, "end_char_pos": 3933}, {"type": "R", "before": "Kingdom", "after": "Empire", "start_char_pos": 3953, "end_char_pos": 3960}], "sents_char_pos": [0, 176, 322, 482, 548, 735, 892, 999, 1086, 1263, 1422, 1614, 1665, 1777, 1938, 2003, 2150, 2237, 2321, 2711, 2856, 2966, 3146, 3296, 3395, 3522, 3605, 3700, 3860]}
+{"doc_id": "55707554", "revision_depth": "1", "before_revision": "A typical Javanese gunungan with a depiction of entrance in the center and a Kala head in the upper-center image. The gunungan (Javanese \"mountain\", \"savory\"), also known as kayon or kayonan (from kayu, \"wood\" or \"tree\") in Bali, is a figure in the Indonesian theatrical performance of wayang e.g. wayang kulit, wayang klitik, and wayang golek. A gunungan is a symmetrical-shaped figure of translucent parchment made of dried, firm beef skin, whose outline is pointed in Java and more rounded in Bali. In a wayang performance, the gunungan is the first to appear on the screen and the last to appear before the end. Gunungan also marks transition between different screen and can also serve as a prop. A gunungan symbolizes the world-mountain (called the Meru). Gunungan also appears in the visual art, e.g. the painted scrolls of wayang beber, in crafts or as architectural elements. Form a Javanese gunungan with closed porch and two large yakshas on the sides. The roots of the tree rise into the water. There are some animals in the tree crown, but the demon head (kala) is missing. A gunungan is generally symmetrical, shaped like a mountain or like rounded ellipse in the case of Balinese kayonan. The Javanese gunungan takes the form of a mountain (which looks almost Candi-like). A covered entrance gate generally appears at the center of a Javanese gunungan. The head of Kala, a monstrous personification of time, appears on top of the entrance gate. Beyond the entrance gate, a tree grows upward along the central axis, its branches spread across and fills up the gunungan with fine foliage motifs. There are variations in the depiction of objects within the gunungan. Sometimes animals are depicted within the branches of the trees e.g. a tiger and a banteng (Javanese wild cattle) in fighting stance, monkeys or birds. In the case of Balinese kayonan, animals are seldom depicted; instead mythical figures e.g. garuda, naga, or underworld spirits yaksha are depicted to represent the three-world division concept of Balinese Hinduism. The tree behind would represent the bridge between these three worlds. Other monstrous figure that may appear in the Balinese kayonan is the karang bintulu, a one-eyed monstrous head. The overall composition is generally is kept symmetrical, however sometimes there are some exceptions especially in the Balinese and Lombok gunungan where the shape can be assymmetrical.%DIFDELCMD < %DIFDELCMD < %%% In Balinese wayang kulit performance, only the kayonan can show a frontal representation of a figure. The frontal representation of figures in a kayonan are reserved for the highest deity. One example is Ganesha depicted in a Balinese kayonan. Gunungan in wayang kulit The gunungan in this wayang performance in Yogyakarta served as props. In a wayang performance, a gunungan normally marks the beginning, the end, and pauses between important scenic transitions. This is generally marked by placing the gunungan at the center of the screen. A gunungan may also serves as prop for background mountains, rock, obstacles, waves of a lake, or cloud. If turned to a red backside, the gunungan symbolizes fire or flames. If placed obliquely, the gunungan indicates a break. In the traditional performance of a wayang kulit, the dalang would follow the course of the time to indicate the timing of the performance, before midnight the gunungan is placed to the dalang's left side, while after midnight, the gunungan is placed on his right. In the island of Lombok where there are two gunungans, the gunungans are moved from the edge to the center to indicate change of scene. Java In Jave, before a wayang kulit performance, the dalang first gives offering (sajen) in the form of food to soothe the demons. After the foreplay of the gamelan, the dalang pray to the spirit world and sits in his place. The dalang's two assistants have already sits to his side with the puppets already arranged at the edges of the screen: benevolent figures e.g. the gods and heroes are seated on the right side of the dalang, while the demons sit on his left. The dalang then place the gunungan in the center of the screen and knocks the figure 's crest five times, symbolically waking up the spirit of the puppets. Then he takes the gunungan, turns in three times on the screen, and puts it on the right edge of the gedebog (banana trunk base). After this ritual, the actual play can begin. The play finished after the last planting of the gunungan.%DIFDELCMD < %DIFDELCMD < %%% Bali The figure of Api (\"fire\"), a Balinese fire demon, which has a similar form with the kayonan. In the beginning of a Balinese wayang performance, especially those in the southern region of Bali, the dalang would give offerings while saying a sacred verse (mantra). Then he would hit the crate of the puppets three times while asking the Wind God Vayu to take a strong part in the performance. Then he lifts the lid of the crate and places it on the right side. He takes the kayonan from the crate and moves it slightly over the screen and sticks it in the middle. Next, the dalang attaches the great figure of Siwamurti (angry aspect of Shiva) on the right side (the healing side) and similar the great figure of Wisnumurti (angry aspect of Vishnu) on the left side (the incurable side). The character of the puppets, benevolent or malevolent, will be placed accordingly to either side of the kayonan with faces turned away from the kayonan. When the characters have shown their presence, they disappear from the screen and are piled on the sides. The remaining kayonan is performing an ever-faster dance to lure the gods and demons, so that they may take possession of the puppet figures. The dalang murmurs further mantras and finally positioned the kayonan on the right side. Before starting the performance, the dalang places the figures on the lid of the crate and others are handed over to his two assistants.%DIFDELCMD < %DIFDELCMD < %%% When the performance comes to an end, the kayonan reappears. If the dalang is also a priest (Dalang Mangku), he would use holy water (tirtha) to sprinkle holy water (tirtha) onto the puppet figures to purify them from evil influence. During the ritual, the dalang would place the figure of Cintya behind the kayonan, the supreme figure in Balinese Hinduism. Another figure with similar shape to the kayonan is called api (\"fire\"). The api has the shape of tapered leaf with a frightening face in the lower part, from which symmetrical radiating lines go upwards. In Balinese wayang kulit performance, the opposite of the kayonan is probably the pohon kepuh (\"tree of hell\"). The pohon kepuh is an asymmetrical, misshapen, tree-like structure with a witch sitting in the summit. It serves as a prop of a graveyard with open graves, which, together with magical evil spirits and skulls, are recognizable next to the tree trunk. The pohon kepuh figure is found only in the south of Bali and is used to represent the mount of King Korawa from the Mahabharata.%DIFDELCMD < %DIFDELCMD < %%% Lombok A gunungan from a variation of wayang kulit of Lombok, with which the story of Serat Menak Sasak is told. In the predominantly Muslim island of Lombok, the wayang kulit of Sasak people, the inhabitant of Lombok Island, has its own narrative tradition. The story of the wayang Sasak centered on the chronicle of Hamzanama, which features the adventure of Amir Hamza, an uncle of the Prophet Muhammad. The chronicle of Hamzanama is known as Serat Menak Sasak in Lombok. The stories are musically accompanied by the gamelan wayang Sasak. The art of gamelan wayang Sasak flourished since the 16th-century, however the strict Islamic reform movement in the last decades of the 20th-century had pressurized the wayang Sasak and other traditional art. The wayang kulit Sasak utilized two gunungans, which correspond approximately to the Balinese figure, but end up in a tip like in Java. The Sasak variation of the Gunungan depicts the world tree which consists of two juxtaposed snakes, whose rear ends protrude upwards and represent the starting points for the branches, while the heads below look symmetrically in an arc on either side. Sometimes heads of demons can be seen between the branches of the world tree. The two gunungan, which also occur in the wayang golek performance of the Serat Menak Sasak, are due to the Islamic conception that the world strictly falls into the world of the good guided by God and the world of evil guided by the Shaytan.%DIFDELCMD < %DIFDELCMD < %%% The dalang first puts the figures on the outermost edges of the screen in a row in the banana trunk following the Islamic beliefs: the believer to his right, the disbeliever to his left. Then on the left, the dalang places the first gunungan slightly oblique. In the middle of the screen he marks the start of the performance with a dwarf-like joker figure called Lurah Sabatan, who wears an over-sized kris in his belt. A second joker figure is added shortly before both disappear. At this time, the dalang would place the second gunungan danced over the screen with two other figures hidden behind him. A dancing gunungan is always musically accompanied by a suling (bamboo flute). The dancing gunungan then comes to rest in the center of the screen, the two figures then become visible from the gunungan and give their names as Amir Hamza, the protagonist of the Serat Menak, and Putri Muninggar, his favorite wife. This group of three will remain on the screen for a while, until the noble couple disappear and the gunungan is planted to the right side of the dalang on the edge. The screen remains framed by both gunungan during the course of the performance. Sometimes there is only one gunungan. The gamelan orchestra, consisting of the bamboo flute suling, the drum kendang, a gong and other metallophones, plays three times at the beginning the opening piece known as Rangsang (\"provocative\", \"exciting\"). After the opening piece, the dalang ignites the labakan (oil lamp). The oil lamp symbolically represents the sun, while the music represents the element of fire, air, and water. The dalang wakes up the puppet figures by lifting the lid of the crate. The first figure placed in the middle is the gunungan, then the figure of Amir Hamza (also called Jayengrana) and Muninggar are placed on both sides of the gunungan, almost like an image of Adam, Eve, and the World Tree. After the dalang finished spoking a few religious formula, he lets all three figures disappear into the air while the orchestra plays a piece known as Janggal (\"leave\"). This whole act symbolizes the divine act of World's Creation. After some general preliminary remarks, the dalang reintroduces the gunungan into the center of the screen and describes the subsequent play.%DIFDELCMD < %DIFDELCMD < %%% Gunungan in wayang beber A wayang beber at the Mangkunegaran Palace in Surakarta. Typical combat scene, gunungan slightly to the right of the center. Wayang beber is a form of illustrated wayang drama which use illustrated scroll to tell a narrative story. The art was thought to be extinct in the 20th-century, only to be rediscovered in the 1960s in two Javanese villages of Gelaran and Gedompol. The scroll used in a wayang beber is more than two meters long and 70 centimeter high. The scroll is set on two vertically erected bars so that four scenes can be seen one by one for the viewers sitting on the ground. Gunungan also appears in wayang beber. The gunungan is variously depicted: in the village of Gelaran, the gunungan appears more tree-like, while in the village of Gedompol, it is more stylized. The root of a gunungan tree is depicted with water-like pattern. Sometimes aerial root appears in a gunungan tree, providing additional support to the tree. The roofed porch of a candi entrance is usually framed by wings and is closed by a door. A gunungan can be obscured by other motifs or cut off from the outer edge. Leaves, flowers, and sometimes fruits can be seen in the gunungan. A demon head sometimes appear in the gunungan, mostly similar with the Bali style, which is with one eye (karang bintulu), and rarely with two eyes (Batara Kala).%DIFDELCMD < %DIFDELCMD < %%% References", "after_revision": "A typical Javanese gunungan with a depiction of entrance in the center and a Kala head in the upper-center image. The gunungan (Javanese \"mountain\", \"savory\"), also known as kayon or kayonan (from kayu, \"wood\" or \"tree\") in Bali, is a figure in the Indonesian theatrical performance of wayang e.g. wayang kulit, wayang klitik, and wayang golek. a Javanese gunungan with closed porch and two large yakshas on the sides. The roots of the tree rise into the water. There are some animals in the tree crown, but the demon head (kala) is missing. %DIFDELCMD < %DIFDELCMD < %%% The gunungan in this wayang performance in Yogyakarta served as props. %DIFDELCMD < %DIFDELCMD < %%% The figure of Api (\"fire\"), a Balinese fire demon, which has a similar form with the kayonan. %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% A gunungan from a variation of wayang kulit of Lombok, with which the story of Serat Menak Sasak is told. %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% A wayang beber at the Mangkunegaran Palace in Surakarta. Typical combat scene, gunungan slightly to the right of the center. %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "D", "before": "A gunungan is a symmetrical-shaped figure of translucent parchment made of dried, firm beef skin, whose outline is pointed in Java and more rounded in Bali. In a wayang performance, the gunungan is the first to appear on the screen and the last to appear before the end. Gunungan also marks transition between different screen and can also serve as a prop. A gunungan symbolizes the world-mountain (called the Meru). Gunungan also appears in the visual art, e.g. the painted scrolls of wayang beber, in crafts or as architectural elements.", "after": null, "start_char_pos": 345, "end_char_pos": 884}, {"type": "D", "before": "Form", "after": null, "start_char_pos": 885, "end_char_pos": 889}, {"type": "D", "before": "A gunungan is generally symmetrical, shaped like a mountain or like rounded ellipse in the case of Balinese kayonan. The Javanese gunungan takes the form of a mountain (which looks almost Candi-like). A covered entrance gate generally appears at the center of a Javanese gunungan. The head of Kala, a monstrous personification of time, appears on top of the entrance gate. Beyond the entrance gate, a tree grows upward along the central axis, its branches spread across and fills up the gunungan with fine foliage motifs.", "after": null, "start_char_pos": 1087, "end_char_pos": 1608}, {"type": "D", "before": "There are variations in the depiction of objects within the gunungan. Sometimes animals are depicted within the branches of the trees e.g. a tiger and a banteng (Javanese wild cattle) in fighting stance, monkeys or birds. In the case of Balinese kayonan, animals are seldom depicted; instead mythical figures e.g. garuda, naga, or underworld spirits yaksha are depicted to represent the three-world division concept of Balinese Hinduism. The tree behind would represent the bridge between these three worlds. Other monstrous figure that may appear in the Balinese kayonan is the karang bintulu, a one-eyed monstrous head. The overall composition is generally is kept symmetrical, however sometimes there are some exceptions especially in the Balinese and Lombok gunungan where the shape can be assymmetrical.", "after": null, "start_char_pos": 1609, "end_char_pos": 2417}, {"type": "D", "before": "In Balinese wayang kulit performance, only the kayonan can show a frontal representation of a figure. The frontal representation of figures in a kayonan are reserved for the highest deity. One example is Ganesha depicted in a Balinese kayonan.", "after": null, "start_char_pos": 2447, "end_char_pos": 2690}, {"type": "R", "before": "Gunungan in wayang kulit The gunungan in", "after": "The gunungan in", "start_char_pos": 2691, "end_char_pos": 2731}, {"type": "D", "before": "In a wayang performance, a gunungan normally marks the beginning, the end, and pauses between important scenic transitions. This is generally marked by placing the gunungan at the center of the screen. A gunungan may also serves as prop for background mountains, rock, obstacles, waves of a lake, or cloud. If turned to a red backside, the gunungan symbolizes fire or flames. If placed obliquely, the gunungan indicates a break. In the traditional performance of a wayang kulit, the dalang would follow the course of the time to indicate the timing of the performance, before midnight the gunungan is placed to the dalang's left side, while after midnight, the gunungan is placed on his right. In the island of Lombok where there are two gunungans, the gunungans are moved from the edge to the center to indicate change of scene.", "after": null, "start_char_pos": 2787, "end_char_pos": 3616}, {"type": "D", "before": "Java In Jave, before a wayang kulit performance, the dalang first gives offering (sajen) in the form of food to soothe the demons. After the foreplay of the gamelan, the dalang pray to the spirit world and sits in his place. The dalang's two assistants have already sits to his side with the puppets already arranged at the edges of the screen: benevolent figures e.g. the gods and heroes are seated on the right side of the dalang, while the demons sit on his left. The dalang then place the gunungan in the center of the screen and knocks the figure 's crest five times, symbolically waking up the spirit of the puppets. Then he takes the gunungan, turns in three times on the screen, and puts it on the right edge of the gedebog (banana trunk base). After this ritual, the actual play can begin. The play finished after the last planting of the gunungan.", "after": null, "start_char_pos": 3617, "end_char_pos": 4474}, {"type": "R", "before": "Bali The figure of", "after": "The figure of", "start_char_pos": 4504, "end_char_pos": 4522}, {"type": "D", "before": "In the beginning of a Balinese wayang performance, especially those in the southern region of Bali, the dalang would give offerings while saying a sacred verse (mantra). Then he would hit the crate of the puppets three times while asking the Wind God Vayu to take a strong part in the performance. Then he lifts the lid of the crate and places it on the right side. He takes the kayonan from the crate and moves it slightly over the screen and sticks it in the middle. Next, the dalang attaches the great figure of Siwamurti (angry aspect of Shiva) on the right side (the healing side) and similar the great figure of Wisnumurti (angry aspect of Vishnu) on the left side (the incurable side). The character of the puppets, benevolent or malevolent, will be placed accordingly to either side of the kayonan with faces turned away from the kayonan. When the characters have shown their presence, they disappear from the screen and are piled on the sides. The remaining kayonan is performing an ever-faster dance to lure the gods and demons, so that they may take possession of the puppet figures. The dalang murmurs further mantras and finally positioned the kayonan on the right side.", "after": null, "start_char_pos": 4603, "end_char_pos": 5786}, {"type": "D", "before": "Before starting the performance, the dalang places the figures on the lid of the crate and others are handed over to his two assistants.", "after": null, "start_char_pos": 5787, "end_char_pos": 5923}, {"type": "D", "before": "When the performance comes to an end, the kayonan reappears. If the dalang is also a priest (Dalang Mangku), he would use holy water (tirtha) to sprinkle holy water (tirtha) onto the puppet figures to purify them from evil influence. During the ritual, the dalang would place the figure of Cintya behind the kayonan, the supreme figure in Balinese Hinduism.", "after": null, "start_char_pos": 5953, "end_char_pos": 6310}, {"type": "D", "before": "Another figure with similar shape to the kayonan is called api (\"fire\"). The api has the shape of tapered leaf with a frightening face in the lower part, from which symmetrical radiating lines go upwards. In Balinese wayang kulit performance, the opposite of the kayonan is probably the pohon kepuh (\"tree of hell\"). The pohon kepuh is an asymmetrical, misshapen, tree-like structure with a witch sitting in the summit. It serves as a prop of a graveyard with open graves, which, together with magical evil spirits and skulls, are recognizable next to the tree trunk. The pohon kepuh figure is found only in the south of Bali and is used to represent the mount of King Korawa from the Mahabharata.", "after": null, "start_char_pos": 6311, "end_char_pos": 7008}, {"type": "D", "before": "Lombok", "after": null, "start_char_pos": 7038, "end_char_pos": 7044}, {"type": "D", "before": "In the predominantly Muslim island of Lombok, the wayang kulit of Sasak people, the inhabitant of Lombok Island, has its own narrative tradition. The story of the wayang Sasak centered on the chronicle of Hamzanama, which features the adventure of Amir Hamza, an uncle of the Prophet Muhammad. The chronicle of Hamzanama is known as Serat Menak Sasak in Lombok. The stories are musically accompanied by the gamelan wayang Sasak. The art of gamelan wayang Sasak flourished since the 16th-century, however the strict Islamic reform movement in the last decades of the 20th-century had pressurized the wayang Sasak and other traditional art.", "after": null, "start_char_pos": 7151, "end_char_pos": 7789}, {"type": "D", "before": "The wayang kulit Sasak utilized two gunungans, which correspond approximately to the Balinese figure, but end up in a tip like in Java. The Sasak variation of the Gunungan depicts the world tree which consists of two juxtaposed snakes, whose rear ends protrude upwards and represent the starting points for the branches, while the heads below look symmetrically in an arc on either side. Sometimes heads of demons can be seen between the branches of the world tree. The two gunungan, which also occur in the wayang golek performance of the Serat Menak Sasak, are due to the Islamic conception that the world strictly falls into the world of the good guided by God and the world of evil guided by the Shaytan.", "after": null, "start_char_pos": 7790, "end_char_pos": 8498}, {"type": "D", "before": "The dalang first puts the figures on the outermost edges of the screen in a row in the banana trunk following the Islamic beliefs: the believer to his right, the disbeliever to his left. Then on the left, the dalang places the first gunungan slightly oblique. In the middle of the screen he marks the start of the performance with a dwarf-like joker figure called Lurah Sabatan, who wears an over-sized kris in his belt. A second joker figure is added shortly before both disappear. At this time, the dalang would place the second gunungan danced over the screen with two other figures hidden behind him. A dancing gunungan is always musically accompanied by a suling (bamboo flute). The dancing gunungan then comes to rest in the center of the screen, the two figures then become visible from the gunungan and give their names as Amir Hamza, the protagonist of the Serat Menak, and Putri Muninggar, his favorite wife. This group of three will remain on the screen for a while, until the noble couple disappear and the gunungan is planted to the right side of the dalang on the edge. The screen remains framed by both gunungan during the course of the performance.", "after": null, "start_char_pos": 8528, "end_char_pos": 9692}, {"type": "D", "before": "Sometimes there is only one gunungan. The gamelan orchestra, consisting of the bamboo flute suling, the drum kendang, a gong and other metallophones, plays three times at the beginning the opening piece known as Rangsang (\"provocative\", \"exciting\"). After the opening piece, the dalang ignites the labakan (oil lamp). The oil lamp symbolically represents the sun, while the music represents the element of fire, air, and water. The dalang wakes up the puppet figures by lifting the lid of the crate. The first figure placed in the middle is the gunungan, then the figure of Amir Hamza (also called Jayengrana) and Muninggar are placed on both sides of the gunungan, almost like an image of Adam, Eve, and the World Tree. After the dalang finished spoking a few religious formula, he lets all three figures disappear into the air while the orchestra plays a piece known as Janggal (\"leave\"). This whole act symbolizes the divine act of World's Creation. After some general preliminary remarks, the dalang reintroduces the gunungan into the center of the screen and describes the subsequent play.", "after": null, "start_char_pos": 9693, "end_char_pos": 10787}, {"type": "R", "before": "Gunungan in wayang beber A wayang beber", "after": "A wayang beber", "start_char_pos": 10817, "end_char_pos": 10856}, {"type": "D", "before": "Wayang beber is a form of illustrated wayang drama which use illustrated scroll to tell a narrative story. The art was thought to be extinct in the 20th-century, only to be rediscovered in the 1960s in two Javanese villages of Gelaran and Gedompol. The scroll used in a wayang beber is more than two meters long and 70 centimeter high. The scroll is set on two vertically erected bars so that four scenes can be seen one by one for the viewers sitting on the ground.", "after": null, "start_char_pos": 10967, "end_char_pos": 11433}, {"type": "D", "before": "Gunungan also appears in wayang beber. The gunungan is variously depicted: in the village of Gelaran, the gunungan appears more tree-like, while in the village of Gedompol, it is more stylized. The root of a gunungan tree is depicted with water-like pattern. Sometimes aerial root appears in a gunungan tree, providing additional support to the tree. The roofed porch of a candi entrance is usually framed by wings and is closed by a door. A gunungan can be obscured by other motifs or cut off from the outer edge. Leaves, flowers, and sometimes fruits can be seen in the gunungan. A demon head sometimes appear in the gunungan, mostly similar with the Bali style, which is with one eye (karang bintulu), and rarely with two eyes (Batara Kala).", "after": null, "start_char_pos": 11434, "end_char_pos": 12178}, {"type": "D", "before": "References", "after": null, "start_char_pos": 12208, "end_char_pos": 12218}], "sents_char_pos": [0, 113, 344, 501, 615, 701, 761, 884, 963, 1006, 1086, 1203, 1287, 1367, 1459, 1608, 1678, 1830, 1892, 2046, 2117, 2230, 2417, 2548, 2635, 2690, 2786, 2910, 2988, 3093, 3162, 3215, 3480, 3616, 3747, 3841, 4083, 4239, 4369, 4415, 4474, 4602, 4772, 4900, 4968, 5071, 5295, 5449, 5555, 5697, 5786, 5923, 6013, 6186, 6310, 6383, 6515, 6627, 6730, 6878, 7008, 7150, 7296, 7444, 7512, 7579, 7789, 7925, 8177, 8255, 8498, 8714, 8787, 8948, 9010, 9132, 9211, 9446, 9611, 9692, 9730, 9942, 10010, 10120, 10192, 10413, 10583, 10645, 10787, 10898, 10966, 11073, 11215, 11302, 11433, 11472, 11627, 11692, 11784, 11873, 11948, 12015, 12178]}
+{"doc_id": "55972562", "revision_depth": "1", "before_revision": "Eastern third (Zhetysu or Semirechye) Much of Zhetysu is in the Ili River basin. Note the Tien Shan mountains of Kyrgyzstan in the south. The area north of the Tien Shan needs special treatment because of the better documentation and the large number of peoples who moved through it. It is a type of steppe \"bay\" bounded on the north by the Siberian forests, on the south by the Kyrgyz mountains and on the east by low mountains. Zhetysu is Turkic and Semirechye is Russian for \"seven rivers\". Sakas (before 200 BC) The Iranian-speaking nomads in the western and central steppe were called Scythians by the Greeks, Sakas by the Persians and Sai by the Chinese , the three words meaning about the same thing. They also occupied the western Tarim basin. Iranian languages extended south to Persia and Afghanistan. Chinese: Under the Han dynasty the Chinese expanded to the west . In 125 BC Zhang Qian returned with the first reports of the Western Regions. Around 100 BC to 100 AD, with interruptions, the Chinese controlled the Tarim Basin southeast of the central steppe. Chinese historians have given us the first good information about the central steppe. c. 162-132 BC : Yuezhi: The Yuezhi were originally a major power in Gansu and Mongolia. Around 162 BC they were driven west by the Xiongnu and settled in the Ili valley, driving out the Sakas. About 132 BC they were driven out by the Wusun and moved south and later formed a major state in Bactria as the Kushans. Wusun : c. 133 BC-100 AD: The Wusun from Gansu drove the Yuezhi out of the Ili valley. By c. 80 BC they had some power in the Tarim basin. After 100 AD they declined and gradually disappear from the records. Xiongnu ( c. 40 BC-c. 155 AD): When the Northern Xiongnu were driven west by the Chinese they occupied Dzungaria and Semirechye, perhaps somewhat north of the Wusun. The Xianbei who defeated them may also reached this area. Yueban : (c. 160-490): After the Han lost control of the Tarim basin our sources become thin . The Chinese called the local population Yueban or Yuepan. They appear to have been Xiongnu remnants. ?Ephthalites ( c. 493? -c. 560): The poorly-documented Ephthalites were based in the south and may have extended north of the Tian Shan. Tiele people (c. 100-800) is a vague Chinese term for the probably Turkic peoples mainly on the northern edge of the steppe from Mongolia westward. Zhetysu ('Moghulistan') in relation to Dzungaria (east), Tarim Basin (southeast) and the steppe bays of Freghana and Bactria to the southwest Outside influences (c. 500-800): Turkic-speaking peoples spread from Mongolia and occupied the central steppe. The Chinese returned under the Tang dynasty . Islam arrived about 750. Meanwhile, the Sogdian merchants controlled most of the long-distance trade. Gokturks ( c. 558-657): The Gokturks were the first Turkic-speakers to found an empire and were the first to rule both the eastern and central steppe , the only other case being the Mongols . In 552 they took over Mongolia, c. 558 reached the Volga and c. 571 reached the Oxus. By 603 the Western Turkic Khaganate had definitely split from the Eastern Khaganate in Mongolia. Circa 657 they were defeated by the Chinese. Chinese again ( c. 657-756): Chinese power was restored by the Tang dynasty . They took over the Tarim basin and the mountains of Kyrgyzstan, captured Tashkent, subjugated what was left of the western Turks and lost a battle to the Arabs in 751. Around 756 they withdrew because of the An Lushan rebellion. Islam (c. 750\u2013present): After the Arab conquest of Merv in 651 there were raids northward. From 705 Islam expanded into the area between the Oxus and Syr Darya. Muslims in central Asia soon became more Persian than Arab. From around 750 Islam expanded slowly north of the Syr Darya and into the Tarim Basin and Gansu. Sogdian Merchants ( c. 300-840): Merchants from Sogdia controlled most of the trade between China and the west. They had settlements all the way from Bukhara to northern China. Dulu Turks ( c. 603-659): were the semi-independent eastern half of the Western Turkic Khaganate. Chinese vassals (c. 658-756): After the defeat of the Gokturks the Chinese had some limited control of the peoples west and north of the mountains, but the matter is poorly documented. Turgesh ( c. 699-766): The Turgesh were Dulu who restored a kind of Turkic Khaganate. Fought Arabs and Chinese. Karluks ( c. 766-840): The Turkic Karluks drove the Turgesh out of Semirechye and later evolved into the Karakhanids. As a tribe they originated in Dzungaria and existed from at least 644 into Mongol times. Karakhanids (c. 850-1134): The Karakhanid Khaganate was founded by Karluks and others . c. 960 they adopted Islam. c. 999 they conquered Transoxiana. About 1041 they split into an eastern group in Semirechye and a western group in Transoxiana. By 1081 they were Seljuk vassals, at least in theory. Following their defeat in 1134, many Karakhanids remained as local rulers. Karakitai at greatest extent Karakitai (1134\u20131220): The Karakitai rulers were refugees from north China. The Manchurian Kitans ruled north China as the Liao dynasty (907\u20131125). After they were overthrown by the Jurchens , Kitan remnants fled west, conquered Semirechye in 1134 and by 1141 held most of the lands of the Karakhanids. They were non-Muslim, had some degree of Chinese culture and generally left the former rulers in place as vassals. In 1211 a Naiman prince who had fled the Mongols usurped power. The Mongols pursued him and by 1220 conquered most of the Karakitai lands. Mongols and after: After the Mongol conquest in 1220 the eastern third does not need separate treatment , so see the \"Mongols and after\" section below. Continuing with Zhetysu we might mention the following. Chagataids: When the Mongol empire split up central Asia fell to the Chagataids but they never formed a strong state and soon adopted Islam and the local language. Moghulistan ( c. 1450-1500): emerged from declining Chagataids. Zhetysu was split between Mogulistan in the east and the emerging Kazakhs. Kazakhs (1465\u2013present) first appeared in Zhetysu and soon spread their name all over the central steppe. Semirechye was under the Senior Horde. Dzungar Khanate ( c. 1680-1758) held the area until it was destroyed by the Chinese. Russians conquered the area from the north in 1847\u201368. See Russian conquest of Turkestan.", "after_revision": "Eastern third (Zhetysu or Semirechye) Much of Zhetysu is in the Ili River basin. Note the Tien Shan mountains of Kyrgyzstan in the south. The area north of the Tien Shan needs special treatment because of better documentation and the large number of peoples who moved through it. It is a type of steppe \"bay\" bounded on the north by the Siberian forests, on the south by the Kyrgyz mountains and on the east by low mountains. Zhetysu is Turkic and Semirechye () is Russian for \"seven rivers\". Sakas (before 200 BC) : The Iranian-speaking nomads in the western and central steppe were called Scythians by the Greeks, Sakas by the Persians and Sai by the Chinese ; the three words mean about the same thing. The Sakas also occupied the western Tarim basin. Iranian languages extended south to Persia and Afghanistan. Chinese: Under the Han dynasty the Chinese expanded westwards . In 125 BC Zhang Qian returned with the first reports of the Western Regions. Around 100 BC to 100 AD, with interruptions, the Chinese controlled the Tarim Basin southeast of the central steppe. Chinese historians have given us the earliest surviving good written information about the central steppe. Yuezhi ( 162-132 BC ): The Yuezhi were originally a major power in Gansu and Mongolia. Around 162 BC , driven west by the Xiongnu , they settled in the Ili valley, driving out the Sakas. About 132 BC they were driven out by the Wusun and moved south and later formed a major state in Bactria as the Kushans. Wusun , 133 BC-100 AD: The Wusun from Gansu drove the Yuezhi out of the Ili valley. By 80 BC they had some power in the Tarim basin. After 100 AD they declined and gradually disappear from the records. Xiongnu ( 40 BC- 155 AD): When the Northern Xiongnu were driven west by the Chinese they occupied Dzungaria and Semirechye, perhaps somewhat north of the Wusun. The Xianbei who defeated them may also have reached this area. Yueban : (c. 160-490): After the Han lost control of the Tarim basin , written sources become sparse . The Chinese called the local population Yueban or Yuepan. They appear to have been Xiongnu remnants. ?Ephthalites ( 493? - 560): The poorly-documented Ephthalites were based in the south and may have extended north of the Tian Shan. Tiele people (c. 100-800) : Tiele is a vague Chinese term for the probably Turkic peoples living mainly on the northern edge of the steppe , from Mongolia westward. Zhetysu ('Moghulistan') in relation to Dzungaria (east), Tarim Basin (southeast) and the steppe bays of Freghana and Bactria to the southwest Outside influences (c. 500-800): Turkic-speaking peoples spread from Mongolia and occupied the central steppe. The Chinese returned under the Tang dynasty of 618-907 . Islam arrived about 750. Meanwhile, Sogdian merchants controlled most of the long-distance trade. Gokturks ( 558-657): The Gokturks became the first Turkic-speakers to found an empire and the first to rule both the eastern and central steppe ( the only other case being the Mongols ) . In 552 they took over Mongolia, 558 they reached the Volga and they reached the Oxus. By 603 the Western Turkic Khaganate had definitely split from the Eastern Khaganate in Mongolia. Circa 657 they were defeated by the Chinese. Chinese again ( 657-756): the Tang dynasty restored Chinese power. The Tang took over the Tarim basin and the mountains of Kyrgyzstan, captured Tashkent, subjugated what was left of the western Turks and lost a battle to the Arabs in 751. Around 756 they withdrew because of the An Lushan rebellion. Islam (c. 750\u2013present): After the Arab conquest of Merv in 651 there were raids northward. From 705 Islam expanded into the area between the Oxus and Syr Darya. Muslims in central Asia soon became more Persian than Arab. From around 750 Islam expanded slowly north of the Syr Darya and into the Tarim Basin and Gansu. Sogdian Merchants ( 300-840): Merchants from Sogdia controlled most of the trade between China and the west. They had settlements all the way from Bukhara to northern China. Dulu Turks ( 603-659): The Dulu formed the semi-independent eastern half of the Western Turkic Khaganate. Chinese vassals (c. 658-756): After the defeat of the Gokturks the Chinese had some limited control of the peoples west and north of the mountains, but the matter remains poorly documented. Turgesh ( 699-766): The Turgesh were Dulu who restored a kind of Turkic Khaganate. They fought against the Arabs and the Chinese. Karluks ( 766-840): The Turkic Karluks drove the Turgesh out of Semirechye and later evolved into the Karakhanids. As a tribe they originated in Dzungaria and existed from at least 644 into Mongol times. Karakhanids (c. 850-1134): Karluks and others founded the Karakhanid Khaganate. Around 960 the Karakhanids adopted Islam; they conquered Transoxiana. About 1041 they split into an eastern group in Semirechye and a western group in Transoxiana. By 1081 they were Seljuk vassals, at least in theory. Following their defeat in 1134, many Karakhanids remained as local rulers. Karakitai at greatest extent Karakitai (1134\u20131220): The Karakitai rulers were refugees from north China. The Manchurian Kitans ruled north China as the Liao dynasty (907\u20131125). After the Jurchens overthrew them , Kitan remnants fled west, conquered Semirechye in 1134 , and by 1141 held most of the lands of the Karakhanids. They were non-Muslim, had some degree of Chinese culture and generally left the former rulers in place as vassals. In 1211 a Naiman prince who had fled the Mongols usurped power. The Mongols pursued him and by 1220 conquered most of the Karakitai lands. Mongols After the Mongol conquest of the area in 1220 the eastern third of the central steppe does not need separate treatment : see the \"Mongols and after\" section below. Subsequent Zhetysu history involved the following: Chagataids: When the Mongol empire split up , central Asia fell to the Chagataids in 1266, but they never formed a strong state and soon adopted Islam and the local language. Moghulistan ( 1450-1500): Moghulistan emerged from the declining Chagatai Khanate. Zhetysu became split between Mogulistan in the east and the emerging Kazakhs. Kazakhs (1465\u2013present) first appeared in Zhetysu and soon spread their name all over the central steppe. Semirechye was under the Senior Horde. Dzungar Khanate ( 1680-1758) held the area until it was destroyed by the Chinese. Russians conquered the area from the north in 1847\u201368. See Russian conquest of Turkestan.", "edit_actions": [{"type": "D", "before": "the", "after": null, "start_char_pos": 205, "end_char_pos": 208}, {"type": "A", "before": null, "after": "()", "start_char_pos": 463, "end_char_pos": 463}, {"type": "A", "before": null, "after": ":", "start_char_pos": 517, "end_char_pos": 517}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 662, "end_char_pos": 663}, {"type": "R", "before": "meaning", "after": "mean", "start_char_pos": 680, "end_char_pos": 687}, {"type": "R", "before": "They", "after": "The Sakas", "start_char_pos": 710, "end_char_pos": 714}, {"type": "R", "before": "to the west", "after": "westwards", "start_char_pos": 866, "end_char_pos": 877}, {"type": "R", "before": "first good", "after": "earliest surviving good written", "start_char_pos": 1111, "end_char_pos": 1121}, {"type": "R", "before": "c.", "after": "Yuezhi (", "start_char_pos": 1160, "end_char_pos": 1162}, {"type": "R", "before": ": Yuezhi:", "after": "):", "start_char_pos": 1174, "end_char_pos": 1183}, {"type": "R", "before": "they were", "after": ",", "start_char_pos": 1262, "end_char_pos": 1271}, {"type": "R", "before": "and", "after": ", they", "start_char_pos": 1299, "end_char_pos": 1302}, {"type": "R", "before": ": c.", "after": ",", "start_char_pos": 1480, "end_char_pos": 1484}, {"type": "D", "before": "c.", "after": null, "start_char_pos": 1564, "end_char_pos": 1566}, {"type": "D", "before": "c.", "after": null, "start_char_pos": 1692, "end_char_pos": 1694}, {"type": "R", "before": "BC-c.", "after": "BC-", "start_char_pos": 1698, "end_char_pos": 1703}, {"type": "A", "before": null, "after": "have", "start_char_pos": 1887, "end_char_pos": 1887}, {"type": "R", "before": "our sources become thin", "after": ", written sources become sparse", "start_char_pos": 1976, "end_char_pos": 1999}, {"type": "D", "before": "c.", "after": null, "start_char_pos": 2118, "end_char_pos": 2120}, {"type": "R", "before": "-c.", "after": "-", "start_char_pos": 2126, "end_char_pos": 2129}, {"type": "A", "before": null, "after": ": Tiele", "start_char_pos": 2266, "end_char_pos": 2266}, {"type": "A", "before": null, "after": "living", "start_char_pos": 2323, "end_char_pos": 2323}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2366, "end_char_pos": 2366}, {"type": "A", "before": null, "after": "of 618-907", "start_char_pos": 2688, "end_char_pos": 2688}, {"type": "D", "before": "the", "after": null, "start_char_pos": 2727, "end_char_pos": 2730}, {"type": "D", "before": "c.", "after": null, "start_char_pos": 2804, "end_char_pos": 2806}, {"type": "R", "before": "were", "after": "became", "start_char_pos": 2830, "end_char_pos": 2834}, {"type": "D", "before": "were", "after": null, "start_char_pos": 2884, "end_char_pos": 2888}, {"type": "R", "before": ",", "after": "(", "start_char_pos": 2943, "end_char_pos": 2944}, {"type": "A", "before": null, "after": ")", "start_char_pos": 2983, "end_char_pos": 2983}, {"type": "D", "before": "c.", "after": null, "start_char_pos": 3018, "end_char_pos": 3020}, {"type": "A", "before": null, "after": "they", "start_char_pos": 3025, "end_char_pos": 3025}, {"type": "R", "before": "c. 571", "after": "they", "start_char_pos": 3048, "end_char_pos": 3054}, {"type": "D", "before": "c.", "after": null, "start_char_pos": 3231, "end_char_pos": 3233}, {"type": "D", "before": "Chinese power was restored by", "after": null, "start_char_pos": 3244, "end_char_pos": 3273}, {"type": "R", "before": ". They", "after": "restored Chinese power. The Tang", "start_char_pos": 3291, "end_char_pos": 3297}, {"type": "D", "before": "c.", "after": null, "start_char_pos": 3860, "end_char_pos": 3862}, {"type": "D", "before": "c.", "after": null, "start_char_pos": 4030, "end_char_pos": 4032}, {"type": "R", "before": "were", "after": "The Dulu formed", "start_char_pos": 4043, "end_char_pos": 4047}, {"type": "R", "before": "is", "after": "remains", "start_char_pos": 4278, "end_char_pos": 4280}, {"type": "D", "before": "c.", "after": null, "start_char_pos": 4310, "end_char_pos": 4312}, {"type": "R", "before": "Fought Arabs and", "after": "They fought against the Arabs and the", "start_char_pos": 4386, "end_char_pos": 4402}, {"type": "D", "before": "c.", "after": null, "start_char_pos": 4422, "end_char_pos": 4424}, {"type": "D", "before": "The Karakhanid Khaganate was founded by", "after": null, "start_char_pos": 4646, "end_char_pos": 4685}, {"type": "R", "before": ". c.", "after": "founded the Karakhanid Khaganate. Around", "start_char_pos": 4705, "end_char_pos": 4709}, {"type": "R", "before": "they adopted Islam. c. 999", "after": "the Karakhanids adopted Islam;", "start_char_pos": 4714, "end_char_pos": 4740}, {"type": "R", "before": "they were overthrown by the Jurchens", "after": "the Jurchens overthrew them", "start_char_pos": 5175, "end_char_pos": 5211}, {"type": "A", "before": null, "after": ",", "start_char_pos": 5269, "end_char_pos": 5269}, {"type": "D", "before": "and after:", "after": null, "start_char_pos": 5587, "end_char_pos": 5597}, {"type": "A", "before": null, "after": "of the area", "start_char_pos": 5624, "end_char_pos": 5624}, {"type": "A", "before": null, "after": "of the central steppe", "start_char_pos": 5651, "end_char_pos": 5651}, {"type": "R", "before": ", so", "after": ":", "start_char_pos": 5685, "end_char_pos": 5689}, {"type": "R", "before": "Continuing with Zhetysu we might mention the following.", "after": "Subsequent Zhetysu history involved the following:", "start_char_pos": 5733, "end_char_pos": 5788}, {"type": "A", "before": null, "after": ",", "start_char_pos": 5833, "end_char_pos": 5833}, {"type": "A", "before": null, "after": "in 1266,", "start_char_pos": 5870, "end_char_pos": 5870}, {"type": "D", "before": "c.", "after": null, "start_char_pos": 5969, "end_char_pos": 5971}, {"type": "R", "before": "emerged from declining Chagataids. Zhetysu was", "after": "Moghulistan emerged from the declining Chagatai Khanate. Zhetysu became", "start_char_pos": 5984, "end_char_pos": 6030}, {"type": "D", "before": "c.", "after": null, "start_char_pos": 6256, "end_char_pos": 6258}], "sents_char_pos": [0, 80, 137, 283, 429, 494, 709, 753, 813, 879, 956, 1073, 1247, 1352, 1473, 1560, 1612, 1681, 1847, 1906, 2001, 2059, 2102, 2239, 2390, 2643, 2690, 2715, 2792, 2985, 3072, 3169, 3214, 3292, 3460, 3521, 3612, 3682, 3742, 3839, 3951, 4016, 4114, 4299, 4385, 4411, 4529, 4618, 4768, 4862, 4916, 4991, 5096, 5168, 5324, 5439, 5503, 5578, 5732, 5788, 5954, 6018, 6093, 6198, 6237, 6322, 6377]}
+{"doc_id": "56121172", "revision_depth": "1", "before_revision": "Case Solvers is a company founded in September 2012 and run by young Hungarian professionals . Case Solvers' mission is to train young URL problem solver s , and to create a platform between graduates and the actors of the Labor Market. The organization was called Hungarian Business Case Society until 2013, then it gradually took up the name 'Case Solvers'. The team of 35 young Hungarians held more than 250 trainings to talented university students in 27 countries by 2017. History Case Solvers was founded as Hungarian Business Case Society in September 2012 by Zsolt \u00c1brah\u00e1m, Gergely Bal\u00e1zs and Istv\u00e1n Juh\u00e1sz. Initially, the organization functioned as a blog where professional articles about case solving were published continually. The page, case-study.hu aimed to spread case solving as a teaching method among Hungarian and international business students as well. Case Solvers (then known as HBCS ) held its first training at the College of Management (Hungary) in March 2013, which was soon followed by several case interview trainings. The team organized its first case study camp, the Case Camp in August 2013. Within a year, Case Solvers held training courses in its home country's most prestigious business universities and prepared top teams for national and international case study competitions. HBCS held its first training course as Case Solvers in November 2013, in India. The first training was soon followed by another in Romania, then in the Netherlands. By 2017, Case Solvers held more than 250 trainings in 27 countries. Case-solving training Conventional case solving training, where problem solving, structured thinking and logical deduction are the obtainable skills. The case solver's task is to give a solution for an ill-structured, complex business problem, that they also need to present in front of a professional jury. Case Solvers hold trainings in several formats : from one afternoon they can even last a whole weekend. The amount and complexity of the material taught on trainings depend on the length of the training. Case Solvers often prepares teams for specific case competitions, both national and international ones. Case-interview training Corporations, multinationals and consulting firms are likely to choose between candidates based on case interviews. The point is that job candidates must find a solution to a problem during the interview . This is usually a real problem that the interviewer has already faced in the company. The case interviews are perfect for assessing the candidate's abilities. At certain companies, this is a key point in the recruitment process, therefore careful preparation is required from the applicant. 1. How students collect information 2. How students evaluate information 3. The key aspects of the students\u2019 decision-making process Case study report Case competitions play every year more important role in the life of business students. The good results achieved in these competitions become an advantage when it comes to finding a job, especially in the consulting area. Case Solvers' research covers the current situation of the Hungarian case competitions, as well as the motivations and opinion of the participants. OKPV \u2013 National Secondary School Problem Solving Contest OKPV is a program for high school students that gives them an insight into the world of the future academic case competitions. The task is problem solving of course, but the participants have to take on a historical figure\u2019s character and make decisions with their minds. OKPV in 2017 is now the fourth competition in a row \u2013 in cooperation with Mathias Corvinus Collegium. Thanks to the Problema Solvenda Foundation, the competition is now held in Slovenia, Romania and Ukraine as well.", "after_revision": "Case Solvers is a company founded in September 2012 by Zsolt \u00c1brah\u00e1m, Gergely Bal\u00e1zs and Istv\u00e1n Juh\u00e1sz . Case Solvers' mission is to train young problem solvers , and to create a platform between graduates and the actors of the Labor Market. The organization was originally called Hungarian Business Case Society until 2013. The team of 35 young Hungarians held more than 250 trainings to talented university students in 27 countries by 2017. History Case Solvers was initially founded as the Hungarian Business Case Society . The organization originally functioned as a blog where professional articles about case solving were published continually. The page, case-study.hu , aimed to spread case solving as a teaching method among Hungarian and international business students as well. HBCS held its first training at the College of Management (Hungary) in March 2013, which was soon followed by several case interview trainings. The team organized its first case study camp, the Case Camp , in August 2013. Within a year, Case Solvers held training courses in its home country's most prestigious business universities and prepared top teams for national and international case study competitions. HBCS held its first training course as Case Solvers in November 2013, in India. The first training was soon followed by another in Romania, then another in the Netherlands. By 2017, Case Solvers held more than 250 trainings in 27 countries. Case-solving training Conventional case solving training, where problem solving, structured thinking and logical deduction are the obtainable skills. The case solver's task is to give a solution for an ill-structured, complex business problem, that they also need to present in front of a professional jury. Case Solvers hold trainings in several formats ; from one afternoon , they can last up to a whole weekend. The amount and complexity of the material taught on trainings depend on the length of the training. Case Solvers often prepares teams for specific case competitions, both national and international ones. Case-interview training Corporations, multinationals and consulting firms are likely to choose between candidates based on case interviews. The point is that job candidates must find a solution to a problem during the interview , usually a real problem that the interviewer has already faced in the company. The case interviews are perfect for assessing the candidate's abilities. At certain companies, this is a key point in the recruitment process, therefore careful preparation is required from the applicant. How students collect information , how students evaluate information , and the key aspects of the students\u2019 decision-making process . Case study report Case competitions play an increasing role in the life of business students. The good results achieved in these competitions become an advantage when it comes to finding a job, especially in the consulting area. Case Solvers' research covers the current situation of the Hungarian case competitions, as well as the motivations and opinion of the participants. OKPV \u2013 National Secondary School Problem Solving Contest OKPV is a program for high school students that gives them an insight into the world of the future academic case competitions. The task is problem solving of course, but the participants have to take on a historical figure\u2019s character and make decisions with their minds. OKPV in 2017 is currently the fourth competition in a row in cooperation with Mathias Corvinus Collegium. With additional help from the Problema Solvenda Foundation, the competition is held in Slovenia, Romania and Ukraine as well.", "edit_actions": [{"type": "R", "before": "and run by young Hungarian professionals", "after": "by Zsolt \u00c1brah\u00e1m, Gergely Bal\u00e1zs and Istv\u00e1n Juh\u00e1sz", "start_char_pos": 52, "end_char_pos": 92}, {"type": "D", "before": "URL problem solver", "after": null, "start_char_pos": 135, "end_char_pos": 153}, {"type": "R", "before": "s", "after": "problem solvers", "start_char_pos": 154, "end_char_pos": 155}, {"type": "A", "before": null, "after": "originally", "start_char_pos": 258, "end_char_pos": 258}, {"type": "R", "before": "2013, then it gradually took up the name 'Case Solvers'.", "after": "2013.", "start_char_pos": 304, "end_char_pos": 360}, {"type": "R", "before": "founded as", "after": "initially founded as the", "start_char_pos": 504, "end_char_pos": 514}, {"type": "R", "before": "in September 2012 by Zsolt \u00c1brah\u00e1m, Gergely Bal\u00e1zs and Istv\u00e1n Juh\u00e1sz. Initially, the organization", "after": ". The organization originally", "start_char_pos": 547, "end_char_pos": 644}, {"type": "A", "before": null, "after": ",", "start_char_pos": 765, "end_char_pos": 765}, {"type": "R", "before": "Case Solvers (then known as HBCS )", "after": "HBCS", "start_char_pos": 877, "end_char_pos": 911}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1111, "end_char_pos": 1111}, {"type": "A", "before": null, "after": "another", "start_char_pos": 1463, "end_char_pos": 1463}, {"type": "R", "before": ":", "after": ";", "start_char_pos": 1907, "end_char_pos": 1908}, {"type": "R", "before": "they can even last", "after": ", they can last up to", "start_char_pos": 1928, "end_char_pos": 1946}, {"type": "R", "before": ". This is", "after": ",", "start_char_pos": 2396, "end_char_pos": 2405}, {"type": "D", "before": "1.", "after": null, "start_char_pos": 2689, "end_char_pos": 2691}, {"type": "R", "before": "2. How", "after": ", how", "start_char_pos": 2725, "end_char_pos": 2731}, {"type": "R", "before": "3. The", "after": ", and the", "start_char_pos": 2762, "end_char_pos": 2768}, {"type": "A", "before": null, "after": ".", "start_char_pos": 2822, "end_char_pos": 2822}, {"type": "R", "before": "every year more important", "after": "an increasing", "start_char_pos": 2864, "end_char_pos": 2889}, {"type": "R", "before": "now", "after": "currently", "start_char_pos": 3557, "end_char_pos": 3560}, {"type": "D", "before": "\u2013", "after": null, "start_char_pos": 3593, "end_char_pos": 3594}, {"type": "R", "before": "Thanks to", "after": "With additional help from", "start_char_pos": 3643, "end_char_pos": 3652}, {"type": "D", "before": "now", "after": null, "start_char_pos": 3706, "end_char_pos": 3709}], "sents_char_pos": [0, 236, 360, 478, 616, 740, 876, 1050, 1127, 1317, 1397, 1483, 1551, 1701, 1859, 1963, 2063, 2167, 2307, 2397, 2483, 2556, 2688, 2727, 2764, 2928, 3063, 3211, 3395, 3540, 3642]}
+{"doc_id": "56517069", "revision_depth": "2", "before_revision": "Con Colleano on a slack-wire , circa 1920 Slackwire ( Slack wire) is an acrobatic circus act , that involves the balancing skills of moving along a flexible /slack thin wire suspended in the air, connected to two anchor points. Not to be confused with slacklining. Usually \"slack wire\" utilizes a steel wire in diameter fixed between two anchor points. It can have two single stands with two extending wire pieces each to install the apparatus in an arena, or two \"A\" frames stands with one extending wire piece for each. It can also be mounted between two trees at an appropriate distance apart or fixed to a ceiling or any points which are strong enough to hold a performer's weight. Slack Rope (Slackrope) A slack rope is very similar to a slack wire . The difference between a slack rope and a slackwire is in the characteristics of rope and wire. A slack rope usually utilizes a rope in diameter. For both slack wire and slack rope , there are pluses and minuses to do stunts. For example, it is easier and more comfortable to do \"sliding\" tricks on a wire than on a rope. On a Slack rope a performer can walk without shoes, but that is painful on a Slackwire . In addition, a Slack rope is very similar to a Cloud Swing . Technique of Balance and Angle of Slackwire The technique of balance \u2013 a performer balances or moves on the wire while needing to control the wire beneath him from moving abruptly side to side, making continual adjustments. This skill is similar to balancing a stick on one\u2019s head or on a finger. Each Slackwire performer usually uses his/her own preferred angle of slack and length of the wire. The slack angle is the V-shaped angle created when a performer stands in the middle of the walking part of the wire. The angle depends on how long or short the wire is relative to the distance between two anchor points. This also affects the swing amplitude of the wire side to side. Some slackwire artists change the angle of the wire during their act.See video in which a Chinese artist performs on the Slackwire , changing the angles of the wire with the help of a winch several times during the performance . Video The degree of ease or difficulty for a performer to move the wire is dependent upon how thick the wire or rope is. The heavier the wire or rope, the more inertia is required to move it laterally, but also requires more force to contro; to movement or bring to bring it back to a place of rest. Skills The skills and stunts commonly performed on a slack Wire and slackropeinclude: Beyond standing and walking artists can also do turns, lying down, knee stands, sliding, forward and backward rolls, splits, hand stands, including cartwheels, head stands . Props such as a ladder, chair, unicycle, bicycle, and even a rola-bola are incorporated into some acts. Some more advanced Slackwire stunts are done while the wire is swinging, including standing, handstands, and walking. Slackwire balancing skills also can be combined with tricks as various kinds of juggling, balancing a stick on the performer\u2019s head, playing a musical instrument, etc. Some of the same skills can be seen in Cloud Swing or Trapeze acts as well. Jumping Rope on a Slack Wire Jumping Rope is popular in many circus acts. The skill has been performed on the ground in many variations, and on a Tightrope, on a slackline, but difficult on a slackwire because the wire moves when the performer jumps up and there is no way to control the swing and position of the wire when landing. This makes such stunts as somersaults and acrobatic tumbling virtually impossible. %DIFDELCMD < %DIFDELCMD < %%% Jumping rope on a slackwire was first accomplished in 1985. The only person to do the stunt is Sergey Pavlov (the clown LALALA) Sergey has even been able to complete up to 7 consecutive jumps. %DIFDELCMD < %DIFDELCMD < %%% Video - S. Pavlov - 4 skips and dancing Video - S. Pavlov - 5 skips Similarities and Differences Slackwire and Tightrope Slackwire and tightrope appear to be very similar skills to walking and balancing on a thin wire /rope. But actually the technique of balance is very different between them. 250px|Tightrope performance (Korea) The citation from Tightrope walking: \"Slackwire and tight wire /tightrope require different balancing techniques: tightrope performers keep their balance by shifting their weight over the rigid tight wire, while slackwire performers use a precise swinging motion to move the relaxed slackwire under their center of mass. \" Because of this, an artist who works on a tightrope cannot easily make a transition to the Slackwire . He/she needs to spend time to train himself/herself to balance in this different manner and vice versa for artists working first on a slackwire . Some tight-wire artists demonstrate a stunt called \u201cthe swings\u201d . An artist takes the position on the wire, then his assistant reduces the tightness/ tension of the wire and the artist demonstrates \u201cswings. \u201d The tight wire is adjusted to a slightly less tight condition. This stunt involves multiple skills to maintain balance. After the demonstration the assistant adjusts the wire back to its original tightness /tension. video - Volzhansky family \"Prometheus\"/\"\u041f\u0440\u043e\u043c\u0435\u0442\u0435\u0439\", 1977\" (timer: 4:55) Slack Wire and Slackline Slacklining in a park There is confusion that Slackline means the same as Slackwire . They are not the same . They are different kinds of apparatuses that require different techniques of balancing. The differences between Slackwire and Slackline: Slackwire utilizes a steel wire in diameter, while Slackline utilizes a nylon webbing/strap approximately in width. Different Techniques of balancing: A slackwire has a loop and can be used like a swing , but a slackline has no loop. The line is stretched tight between two anchor points like a tightrope and can only swing within a very small amplitude. %DIFDELCMD < %DIFDELCMD < %%% A slackline can be used like a trampoline, allowing for an easy landing on the line after a jump. In contrast, a Slackwire cannot be used like a trampoline, because when a performer jumps up from the loop of wire it will swing away with no way to anticipate its location upon landing. Video -(slacklining) She Walks the Line: Braving a Thin Rope Between Mountains (see also about the differences tightrope walking) The World Records Sergey Pavlov \u2013 Jumping Rope on a Slackwire \u2013 3, 4, 5, 7 consecutively skips (1985\u20132017) External links Slack Rope at juggling.org %DIFDELCMD < %DIFDELCMD < %%% References", "after_revision": "Con Colleano on a slackwire , circa 1920 Slackwire ( or slack wire) is an acrobatic circus act that involves the balancing skills of moving along a flexible , thin wire suspended in the air, connected to two anchor points. Slackwire is not to be confused with slacklining. Usually slackwire utilizes a steel wire in diameter fixed between two anchor points. It can have two single stands with two extending wire pieces each to install the apparatus in an arena, or two A-frame stands with one extending wire piece for each. It can also be mounted between two trees at an appropriate distance apart , or fixed to a ceiling or any points which are strong enough to hold a performer's weight. Slack rope A slack rope (or slackrope) is very similar to a slackwire . The difference between a slack rope and a slackwire is in the characteristics of rope and wire. A slack rope usually utilizes a rope in diameter. The slackwire and slack rope each have advantages and disadvantages for doing stunts. For example, it is easier and more comfortable to do \"sliding\" tricks on a wire than on a rope. On a slack rope a performer can walk without shoes, a feat that is painful on a slackwire . In addition, a slack rope can be used similarly to a cloud swing . Technique of balance and angle of slackwire The performer balances or moves on the wire while needing to control the wire beneath him from moving abruptly side to side, making continual adjustments. This skill is similar to balancing a stick on one\u2019s head or on a finger. Each slackwire performer usually uses his/her own preferred angle of slack and length of the wire. The slack angle is the V-shaped angle created when a performer stands in the middle of the walking part of the wire. The angle depends on how long or short the wire is relative to the distance between two anchor points. This also affects the amplitude of the wire 's swing side to side. Some slackwire artists change the angle of the wire during their act.See video in which a Chinese artist performs on the slackwire , changing the angles of the wire with the help of a winch several times during the performance : Video The degree of ease or difficulty for a performer to move the wire is dependent upon how thick the wire or rope is. The heavier the wire or rope, the more inertia is required to move it laterally, and the more force is needed to control its movement or to bring it back to a place of rest. Skills A wide range of skills and stunts can be performed on the slack wire or slackrope. Beyond standing and walking , artists can also do turns, lying down, knee stands, sliding, forward and backward rolls, splits, handstands, cartwheels, and headstands . Props such as a ladder, chair, unicycle, bicycle, and even a rola bola have been incorporated into some acts. Some more advanced slackwire stunts are done while the wire is swinging, including standing, handstands, and walking. Slackwire balancing skills also can be combined with tricks as various kinds of juggling, balancing a stick on the performer\u2019s head, playing a musical instrument, etc. Some of the same skills can be seen in cloud swing or trapeze acts as well. Jumping rope on a slack wire Jumping rope has been performed on the tightrope and slackline, but is difficult on a slackwire because the wire moves when the performer jumps up , and there is no way to control the swing and position of the wire when landing. This makes such stunts as somersaults and acrobatic tumbling virtually impossible. %DIFDELCMD < %DIFDELCMD < %%% Jumping rope on a slackwire was first accomplished in 1985. The only person to accomplish the stunt is Sergey Pavlov (the clown LALALA) . Sergey has been able to complete up to seven consecutive jumps. %DIFDELCMD < %DIFDELCMD < %%% Video - S. Pavlov - 4 skips and dancingVideo - S. Pavlov - 5 skips Similarities and differences Slackwire vs. tightrope Slackwire and tightrope appear to be very similar skills to walking and balancing on a thin wire or rope. In fact, the technique of balance is very different between them. 250px|Tightrope performance (Korea) Slackwire and tightwire /tightrope require different balancing techniques: tightrope performers keep their balance by shifting their weight over the rigid tight wire, while slackwire performers use a precise swinging motion to move the relaxed slackwire under their center of mass. Because of this, an artist who works on a tightrope cannot easily make a transition to the slackwire, and vice versa . He/she needs to spend time to train himself/herself to balance in this different manner . Some tightwire artists demonstrate a stunt called \u201cthe swings\u201d , where the artist takes the position on the wire, then his assistant reduces the tension of the wire and the artist demonstrates swings. This stunt involves multiple skills to maintain balance. After the demonstration the assistant adjusts the wire back to its original tightness .Video - Volzhansky family \"Prometheus\"/\"\u041f\u0440\u043e\u043c\u0435\u0442\u0435\u0439\", 1977\" (timer: 4:55) Slackwire vs. slackline Slacklining in a park Slackwire and slackline are not the same ; they are different kinds of apparatuses that require different techniques of balancing. Slackwire utilizes a steel wire in diameter, while slackline utilizes a nylon webbing/strap approximately in width. A slackwire has a loop and can be used like a swing ; a slackline has no loop. The line is stretched tight between two anchor points like a tightrope and can only swing within a very small amplitude. %DIFDELCMD < %DIFDELCMD < %%% A slackline can be used like a trampoline, allowing for an easy landing on the line after a jump. In contrast, a slackwire cannot be used like a trampoline, because when a performer jumps up from the loop of wire it will swing away with no way to anticipate its location upon landing. References External links Slack Rope at juggling.org %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "R", "before": "slack-wire", "after": "slackwire", "start_char_pos": 18, "end_char_pos": 28}, {"type": "R", "before": "Slack", "after": "or slack", "start_char_pos": 54, "end_char_pos": 59}, {"type": "D", "before": ",", "after": null, "start_char_pos": 93, "end_char_pos": 94}, {"type": "R", "before": "/slack", "after": ",", "start_char_pos": 157, "end_char_pos": 163}, {"type": "R", "before": "Not", "after": "Slackwire is not", "start_char_pos": 228, "end_char_pos": 231}, {"type": "R", "before": "\"slack wire\"", "after": "slackwire", "start_char_pos": 273, "end_char_pos": 285}, {"type": "R", "before": "\"A\" frames", "after": "A-frame", "start_char_pos": 464, "end_char_pos": 474}, {"type": "A", "before": null, "after": ",", "start_char_pos": 596, "end_char_pos": 596}, {"type": "R", "before": "Rope (Slackrope)", "after": "rope", "start_char_pos": 693, "end_char_pos": 709}, {"type": "A", "before": null, "after": "(or slackrope)", "start_char_pos": 723, "end_char_pos": 723}, {"type": "R", "before": "slack wire", "after": "slackwire", "start_char_pos": 745, "end_char_pos": 755}, {"type": "R", "before": "For both slack wire", "after": "The slackwire", "start_char_pos": 904, "end_char_pos": 923}, {"type": "R", "before": ", there are pluses and minuses to do", "after": "each have advantages and disadvantages for doing", "start_char_pos": 939, "end_char_pos": 975}, {"type": "R", "before": "Slack", "after": "slack", "start_char_pos": 1085, "end_char_pos": 1090}, {"type": "R", "before": "but", "after": "a feat", "start_char_pos": 1132, "end_char_pos": 1135}, {"type": "R", "before": "Slackwire", "after": "slackwire", "start_char_pos": 1157, "end_char_pos": 1166}, {"type": "R", "before": "Slack rope is very similar to a Cloud Swing", "after": "slack rope can be used similarly to a cloud swing", "start_char_pos": 1184, "end_char_pos": 1227}, {"type": "R", "before": "Balance and Angle of Slackwire The technique of balance \u2013 a", "after": "balance and angle of slackwire The", "start_char_pos": 1243, "end_char_pos": 1302}, {"type": "R", "before": "Slackwire", "after": "slackwire", "start_char_pos": 1532, "end_char_pos": 1541}, {"type": "D", "before": "swing", "after": null, "start_char_pos": 1868, "end_char_pos": 1873}, {"type": "A", "before": null, "after": "'s swing", "start_char_pos": 1896, "end_char_pos": 1896}, {"type": "R", "before": "Slackwire", "after": "slackwire", "start_char_pos": 2032, "end_char_pos": 2041}, {"type": "R", "before": ".", "after": ":", "start_char_pos": 2138, "end_char_pos": 2139}, {"type": "R", "before": "but also requires more force", "after": "and the more force is needed to control its movement or", "start_char_pos": 2342, "end_char_pos": 2370}, {"type": "D", "before": "contro; to movement or", "after": null, "start_char_pos": 2374, "end_char_pos": 2396}, {"type": "D", "before": "to bring", "after": null, "start_char_pos": 2403, "end_char_pos": 2411}, {"type": "R", "before": "The", "after": "A wide range of", "start_char_pos": 2447, "end_char_pos": 2450}, {"type": "R", "before": "commonly performed on a slack Wire and slackropeinclude:", "after": "can be performed on the slack wire or slackrope.", "start_char_pos": 2469, "end_char_pos": 2525}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2554, "end_char_pos": 2554}, {"type": "R", "before": "hand stands, including cartwheels, head stands", "after": "handstands, cartwheels, and headstands", "start_char_pos": 2652, "end_char_pos": 2698}, {"type": "R", "before": "rola-bola are", "after": "rola bola have been", "start_char_pos": 2762, "end_char_pos": 2775}, {"type": "R", "before": "Slackwire", "after": "slackwire", "start_char_pos": 2824, "end_char_pos": 2833}, {"type": "R", "before": "Cloud Swing or Trapeze", "after": "cloud swing or trapeze", "start_char_pos": 3130, "end_char_pos": 3152}, {"type": "R", "before": "Rope on a Slack Wire Jumping Rope is popular in many circus acts. The skill", "after": "rope on a slack wire Jumping rope", "start_char_pos": 3175, "end_char_pos": 3250}, {"type": "R", "before": "ground in many variations, and on a Tightrope, on a", "after": "tightrope and", "start_char_pos": 3277, "end_char_pos": 3328}, {"type": "A", "before": null, "after": "is", "start_char_pos": 3344, "end_char_pos": 3344}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3421, "end_char_pos": 3421}, {"type": "R", "before": "do", "after": "accomplish", "start_char_pos": 3694, "end_char_pos": 3696}, {"type": "R", "before": "Sergey has even", "after": ". Sergey has", "start_char_pos": 3743, "end_char_pos": 3758}, {"type": "R", "before": "7", "after": "seven", "start_char_pos": 3787, "end_char_pos": 3788}, {"type": "R", "before": "dancing Video", "after": "dancingVideo", "start_char_pos": 3870, "end_char_pos": 3883}, {"type": "R", "before": "Differences", "after": "differences", "start_char_pos": 3923, "end_char_pos": 3934}, {"type": "R", "before": "and Tightrope", "after": "vs. tightrope", "start_char_pos": 3945, "end_char_pos": 3958}, {"type": "R", "before": "/rope. But actually", "after": "or rope. In fact,", "start_char_pos": 4056, "end_char_pos": 4075}, {"type": "R", "before": "The citation from Tightrope walking: \"Slackwire and tight wire", "after": "Slackwire and tightwire", "start_char_pos": 4169, "end_char_pos": 4231}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 4490, "end_char_pos": 4491}, {"type": "R", "before": "Slackwire", "after": "slackwire, and vice versa", "start_char_pos": 4583, "end_char_pos": 4592}, {"type": "D", "before": "and vice versa for artists working first on a slackwire", "after": null, "start_char_pos": 4683, "end_char_pos": 4738}, {"type": "R", "before": "tight-wire", "after": "tightwire", "start_char_pos": 4746, "end_char_pos": 4756}, {"type": "R", "before": ". An", "after": ", where the", "start_char_pos": 4805, "end_char_pos": 4809}, {"type": "D", "before": "tightness/", "after": null, "start_char_pos": 4880, "end_char_pos": 4890}, {"type": "R", "before": "\u201cswings. \u201d The tight wire is adjusted to a slightly less tight condition.", "after": "swings.", "start_char_pos": 4939, "end_char_pos": 5012}, {"type": "D", "before": "/tension.", "after": null, "start_char_pos": 5156, "end_char_pos": 5165}, {"type": "R", "before": "video", "after": ".Video", "start_char_pos": 5166, "end_char_pos": 5171}, {"type": "R", "before": "Slack Wire and Slackline", "after": "Slackwire vs. slackline", "start_char_pos": 5237, "end_char_pos": 5261}, {"type": "R", "before": "There is confusion that Slackline means the same as Slackwire . They", "after": "Slackwire and slackline", "start_char_pos": 5284, "end_char_pos": 5352}, {"type": "R", "before": ". They", "after": "; they", "start_char_pos": 5370, "end_char_pos": 5376}, {"type": "D", "before": "The differences between Slackwire and Slackline:", "after": null, "start_char_pos": 5460, "end_char_pos": 5508}, {"type": "R", "before": "Slackline", "after": "slackline", "start_char_pos": 5560, "end_char_pos": 5569}, {"type": "D", "before": "Different Techniques of balancing:", "after": null, "start_char_pos": 5625, "end_char_pos": 5659}, {"type": "R", "before": ", but", "after": ";", "start_char_pos": 5712, "end_char_pos": 5717}, {"type": "R", "before": "Slackwire", "after": "slackwire", "start_char_pos": 6007, "end_char_pos": 6016}, {"type": "R", "before": "Video -(slacklining) She Walks the Line: Braving a Thin Rope Between Mountains", "after": "References", "start_char_pos": 6179, "end_char_pos": 6257}, {"type": "D", "before": "(see also about the differences tightrope walking)", "after": null, "start_char_pos": 6258, "end_char_pos": 6308}, {"type": "D", "before": "The World Records Sergey Pavlov \u2013 Jumping Rope on a Slackwire \u2013 3, 4, 5, 7 consecutively skips (1985\u20132017)", "after": null, "start_char_pos": 6309, "end_char_pos": 6415}, {"type": "D", "before": "References", "after": null, "start_char_pos": 6488, "end_char_pos": 6498}], "sents_char_pos": [0, 227, 264, 352, 521, 686, 757, 853, 903, 983, 1079, 1168, 1229, 1453, 1526, 1625, 1742, 1845, 1910, 1980, 2260, 2381, 2439, 2804, 2922, 3090, 3166, 3240, 3501, 3674, 4062, 4132, 4489, 4947, 5012, 5069, 5347, 5371, 5459, 5624, 5742, 5991, 6178]}
+{"doc_id": "57186405", "revision_depth": "1", "before_revision": "The Tribunal Mayor de Cuentas de Buenos Aires was created as part of the Bourbon reforms implemented by Carlos III in the territories of the Spanish Empire. The government agency was established in 1769, and initially comprised the governorships of Buenos Aires, Tucum\u00e1n and Paraguay. The hierarchical staff of the institution consisted of several Contadores mayores (Senior Accountants ), two contadores de resueltas (official accountants), and a large number of contadores ordenadores (account officers), including a notary and a \"portero\", in charge of the protocolary issues. After the creation of the Viceroyalty of the R\u00edo de la Plata, the Court of Accounts of Buenos Aires, took care of the control of the public funds of all jurisdictions, of the viceroyalty including also R\u00edo Negro and the Islas Malvinas. Many of its implementations were directed by the Viceroy Pedro Antonio de Cevallos, and the Minister Jos\u00e9 de G\u00e1lvez, Visitador General of the Spanish Empire. During the English invasions, the members of the Court of Accounts of Buenos Aires refused to take oath to the British crown. In addition, his staff took part in the donations made for the purchase of supplies and weapons for the Creole militias of Buenos Aires. The Tribunal de Cuentas de Buenos Aires had his establishment in the Fuerte de Buenos Aires. After the May Revolution , the Tribunal de Cuentas, passed in charge of the Primera Junta. Staff The staff of the Court of Accounts of Buenos Aires, was in charge of distinguished Spanish and Argentine gentlemen as Diego de la Vega, Francisco Cabrera, knight of the Order of Carlos III, Juan Andr\u00e9s de Arroyo and Jos\u00e9 Luis de Beruti, the father of Antonio Beruti. Some of the members of the Court of Accounts around 1807: Diego de la Vega - contador mayor Francisco de Cabrera - contador mayor Ram\u00f3n de Oromi - contador mayor Juan Andr\u00e9s de Arroyo - contador Mayor Vicente Garc\u00eda Grande y C\u00e1rdenas - contador mayor Mart\u00edn Altolaguirre - contador mayor Juan Manuel Luca - official Jos\u00e9 Beruti - official Tirso Mart\u00ednez - notary Juan de Canaveris - portero", "after_revision": "The Tribunal Mayor y Audiencia Real de Cuentas de Buenos Aires was created as part of the Bourbon reforms implemented by Carlos III in the territories of the Spanish Empire. It was established in 1769, and initially comprised the governorships of Buenos Aires, Tucum\u00e1n and Paraguay. The hierarchical staff of the institution consisted of several contadores mayores (senior accountants ), two contadores de resueltas (official accountants), and a large number of contadores ordenadores (account officers), including a notary and a \"portero\", in charge of the protocolary issues. After the creation of the Viceroyalty of the R\u00edo de la Plata, the Court of Accounts of Buenos Aires, took care of the control of the public funds of all jurisdictions, of the viceroyalty including San Julian Bay and Islas Malvinas. Many of its implementations were directed by the Viceroy Pedro Antonio de Cevallos, and the Minister Jos\u00e9 de G\u00e1lvez, Visitador General of the Spanish Empire. The officials of the court took an active part during the English invasions. His members refused to take oath to the British Crown, besides participating in the donations made for the purchase of supplies and weapons for the Creole militias of Buenos Aires. Mariano Moreno and Antonio Beruti, the sons of former officials take an active part in the revolutionary and emancipatory periods of Argentina. The Tribunal Mayor de Cuentas de Buenos Aires was administered under the Primera Junta after the May Revolution took place. Its facilities were located inside the Fuerte de Buenos Aires, and it functioned as the organism in charge of the control of accounts of the United Provinces of the R\u00edo de la Plata until the beginning of 1820s. Staff Diego de la Vega - Contador Mayor Francisco de Cabrera - Contador Mayor Ram\u00f3n de Oromi - Contador Mayor Juan Andr\u00e9s de Arroyo - Contador Mayor Vicente Garc\u00eda Grande y C\u00e1rdenas - Contador Mayor Mart\u00edn Altolaguirre - Contador Mayor Juan Manuel Luca - Official Manuel Moreno y Argumosa - Official Jos\u00e9 Beruti - Official Tirso Mart\u00ednez - Notary Juan de Canaveris - Official portero", "edit_actions": [{"type": "A", "before": null, "after": "y Audiencia Real", "start_char_pos": 19, "end_char_pos": 19}, {"type": "R", "before": "The government agency", "after": "It", "start_char_pos": 158, "end_char_pos": 179}, {"type": "R", "before": "Contadores mayores (Senior Accountants", "after": "contadores mayores (senior accountants", "start_char_pos": 349, "end_char_pos": 387}, {"type": "R", "before": "also R\u00edo Negro and the", "after": "San Julian Bay and", "start_char_pos": 778, "end_char_pos": 800}, {"type": "R", "before": "During the English invasions, the members of the Court of Accounts of Buenos Aires", "after": "The officials of the court took an active part during the English invasions. His members", "start_char_pos": 975, "end_char_pos": 1057}, {"type": "R", "before": "crown. In addition, his staff took part", "after": "Crown, besides participating", "start_char_pos": 1094, "end_char_pos": 1133}, {"type": "A", "before": null, "after": "Mariano Moreno and Antonio Beruti, the sons of former officials take an active part in the revolutionary and emancipatory periods of Argentina.", "start_char_pos": 1238, "end_char_pos": 1238}, {"type": "A", "before": null, "after": "Mayor", "start_char_pos": 1252, "end_char_pos": 1252}, {"type": "R", "before": "had his establishment in the Fuerte de Buenos Aires. After", "after": "was administered under the Primera Junta after", "start_char_pos": 1280, "end_char_pos": 1338}, {"type": "D", "before": ", the Tribunal de Cuentas, passed in charge of the Primera Junta.", "after": null, "start_char_pos": 1358, "end_char_pos": 1423}, {"type": "R", "before": "Staff The staff of the Court of Accounts of", "after": "took place. Its facilities were located inside the Fuerte de", "start_char_pos": 1424, "end_char_pos": 1467}, {"type": "R", "before": "was in charge of distinguished Spanish and Argentine gentlemen as Diego de la Vega, Francisco Cabrera, knight of the Order of Carlos III, Juan Andr\u00e9s de Arroyo and Jos\u00e9 Luis de Beruti, the father of Antonio Beruti.", "after": "and it functioned as the organism in charge of the control of accounts of the United Provinces of the R\u00edo de la Plata until the beginning of 1820s. Staff", "start_char_pos": 1482, "end_char_pos": 1696}, {"type": "D", "before": "Some of the members of the Court of Accounts around 1807:", "after": null, "start_char_pos": 1697, "end_char_pos": 1754}, {"type": "R", "before": "contador mayor", "after": "Contador Mayor", "start_char_pos": 1774, "end_char_pos": 1788}, {"type": "R", "before": "contador mayor", "after": "Contador Mayor", "start_char_pos": 1812, "end_char_pos": 1826}, {"type": "R", "before": "contador mayor", "after": "Contador Mayor", "start_char_pos": 1844, "end_char_pos": 1858}, {"type": "R", "before": "contador", "after": "Contador", "start_char_pos": 1883, "end_char_pos": 1891}, {"type": "R", "before": "contador mayor", "after": "Contador Mayor", "start_char_pos": 1933, "end_char_pos": 1947}, {"type": "R", "before": "contador mayor", "after": "Contador Mayor", "start_char_pos": 1970, "end_char_pos": 1984}, {"type": "R", "before": "official", "after": "Official Manuel Moreno y Argumosa - Official", "start_char_pos": 2004, "end_char_pos": 2012}, {"type": "R", "before": "official", "after": "Official", "start_char_pos": 2027, "end_char_pos": 2035}, {"type": "R", "before": "notary", "after": "Notary", "start_char_pos": 2053, "end_char_pos": 2059}, {"type": "A", "before": null, "after": "Official", "start_char_pos": 2080, "end_char_pos": 2080}], "sents_char_pos": [0, 157, 285, 580, 816, 974, 1100, 1237, 1332, 1423, 1696]}
+{"doc_id": "57430521", "revision_depth": "1", "before_revision": "20\\% are above the surface (content aspect) and 80\\% are underneath the surface (relation aspect) Relevance In order for communication processes within familiar or business relationships and especially inside of romantic relationships to succeed, the quality of the relationship aspect is of prime importance. According to Sigmund Freud, trust, empathy, shared values along with preconceptions or fears and wishes determine the success of interpersonal communication by more than 80 percent. Social context Social competence generally refers to skills neeed for social behavior. The term \u201csocial\u201d can be understood within the field of social-psychology as \u201cinterpersonal\u201d, sociological-value-neutral (as in \u201csocietal\u201d) or as sociological-judgemental (as in \u201csocial-moral\u201d). It describes the different dimensions of interpersonal relationships. Which interpersonal relationships and mismeetings (Martin Buber) will unfold, which conflicts may develop, and which of the existing conflicts can possibly be solved? Courage, the ability to evercome something(Pain in the Work) and risk are fundamental traits in developing social skills and stable relationships. Their quality can generally be measured on the basis of the status, power and influence within a social structure as well as the choice of partner. Teamwork Artistic skills Knowledge of human nature Empathy (compassion) Communication skills Critical Faculties Self-confidence Cooperation Perception Economic context The economic importance of the relationship aspect between employees and colleagues, or customer , or suppliers, becomes clear during business exchange processes and particularly within teams and in the sales area. Since trust is an essential factor for the disposition to engage in monetary exchange processes, considerable efforts are made in this area to secure a defined relationship aspect with the help of electronic records (see: CRM). The efforts to establish a mutually beneficial business relationship on the basis of a \"good relationship aspect\" are represented by various concepts in the spirit of the win-win strategy. The Getting to yes in particular, aims to make the relationship between the two parties as good as possible and the dispute as clear as necessary (principle: Separate the people from the problem ). Rhetorical context Within the argumentation, the relationship to the use of the relationship aspect is based of emotional arguments which are supported by preconceptions, personal references, experience and the credibility of the speaker. The logically valid deductive reasoning on the other hand completely excludes the relationship aspect between speaker and audience. Since Plato, dialectics has established itself as a school of argumentation. Dialectics aims to promote an inner understanding and willingness to compromise, comprising three stages of development: a thesis, an antithesis and a synthesis. Conflict resolution Another method for solving interpersonal conflicts at the relationship aspect has been successfully established with systemic therapy or systemic organisational development. All persons and institutions involved with their needs and expectations, as well as the interactions with each other are considered neutral. In this way, it is usually possible to clarify the relationship disturbances beyond the pure reasoning approach. Another form of conflict resolution for a disturbed relationship aspect is mediation. A mediator has the task of mediating between the parties involved in order to find a pragmatic solution, usually a compromise. In contrast to more therapeutically oriented systemic work, mediation is more frequently encountered in business. From the theoretical background of psychoanalysis, Gestalt therapy and humanistic psychology, a third concept has been established, called Theme-centered interaction, which was developed by the educator and psychoanalyst Ruth Cohn to improve relationships within groups. The aim of TCI is to open up better possibilities of communication through understanding the interrelationships and through emotional experience. The result is an interaction model that treats the person, the group and the task as a model unit, where each is equally important and where the context of communication is always taken into consideration. Representation The genogram has been established as an instrument for the graphical representation of a bipolar or polypolar relationship aspect. Dependencies and informal structures that would be hardly recognizable on the surface , can be visualized more easily with the help of graphical relationship lines between the participants. The mediator, the systemic organizational developer, or the therapist uses this image to reduce tension and previously hidden conflicts.", "after_revision": "20\\% is above the surface (content aspect) and 80\\% is underneath the surface (relation aspect) . Relevance In order for communication processes within familiar or business relationships and especially inside of romantic relationships to succeed, the quality of the relationship aspect is of prime importance. According to Sigmund Freud, trust, empathy, and shared values, along with preconceptions or fears and wishes , determine the success of interpersonal communication by more than 80 percent. Social context Social competence generally refers to skills needed for social behavior. The term \u201csocial\u201d can be understood within the field of social-psychology as \u201cinterpersonal\u201d, sociological-value-neutral (as in \u201csocietal\u201d) or as sociological-judgemental (as in \u201csocial-moral\u201d). It describes the different dimensions of interpersonal relationships. Which interpersonal relationships and mismeetings (Martin Buber) will unfold, which conflicts may develop, and which of the existing conflicts can possibly be solved? Courage, the ability to overcome something, and risk are fundamental traits in developing social skills and stable relationships. Their quality can generally be measured on the basis of the status, power and influence within a social structure as well as the choice of partner. Teamwork Knowledge of human nature Empathy (compassion) Communication skills Critical faculties Self-confidence Cooperation Perception Economic context The economic importance of the relationship aspect between employees and colleagues, or customers , or suppliers, becomes clear during business exchange processes , particularly within teams and in the sales area. Since trust is an essential factor for the disposition to engage in monetary exchange processes, considerable efforts are made in this area to secure a defined relationship aspect , with the help of electronic records (see: CRM). The efforts to establish a mutually beneficial business relationship on the basis of a \"good relationship aspect\" are represented by various concepts in the spirit of the win-win strategy. The \"getting to yes\" theory, in particular, aims to make the relationship between the two parties as good as possible and the dispute as clear as necessary (principle: \" Separate the people from the problem \" ). Rhetorical context Within the argumentation, the relationship to the use of the relationship aspect is based on emotional arguments which are supported by preconceptions, personal references, experience and the credibility of the speaker. The logically valid deductive reasoning on the other hand completely excludes the relationship aspect between speaker and audience. Since Plato, dialectics has established itself as a school of argumentation. Dialectics aims to promote an inner understanding and willingness to compromise, comprising three stages of development: a thesis, an antithesis and a synthesis. Conflict resolution Another method for solving interpersonal conflicts in the relationship aspect has been successfully established with systemic therapy or systemic organisational development. All persons and institutions involved with their needs and expectations, as well as the interactions with each other , are considered neutral. In this way, it is usually possible to clarify the relationship disturbances beyond the pure reasoning approach. Another form of conflict resolution for a disturbed relationship aspect is mediation. This person mediates between parties in order to find a pragmatic solution, usually a compromise. In contrast to more therapeutically oriented systemic work, mediation is more frequently encountered in business. From the theoretical background of psychoanalysis, Gestalt therapy and humanistic psychology, a third concept has been established, called theme-centered interaction, which was developed by the educator and psychoanalyst Ruth Cohn to improve relationships within groups. The aim of TCI is to open up better possibilities of communication through understanding interrelationships and through emotional experience. The result is an interaction model that treats the person, the group and the task as a model unit, where each is equally important and where the context of communication is always taken into consideration. Representation The genogram has been established as an instrument for the graphical representation of a bipolar or polypolar relationship aspect. Dependencies and informal structures that would be hardly recognizable on the surface can be visualized more easily with the help of graphical relationship lines between the participants. The mediator, the systemic organizational developer, or the therapist uses this image to reduce tension and previously hidden conflicts.", "edit_actions": [{"type": "R", "before": "are", "after": "is", "start_char_pos": 5, "end_char_pos": 8}, {"type": "R", "before": "are", "after": "is", "start_char_pos": 53, "end_char_pos": 56}, {"type": "A", "before": null, "after": ".", "start_char_pos": 98, "end_char_pos": 98}, {"type": "R", "before": "shared values", "after": "and shared values,", "start_char_pos": 355, "end_char_pos": 368}, {"type": "A", "before": null, "after": ",", "start_char_pos": 415, "end_char_pos": 415}, {"type": "R", "before": "neeed", "after": "needed", "start_char_pos": 554, "end_char_pos": 559}, {"type": "R", "before": "evercome something(Pain in the Work)", "after": "overcome something,", "start_char_pos": 1037, "end_char_pos": 1073}, {"type": "D", "before": "Artistic skills", "after": null, "start_char_pos": 1317, "end_char_pos": 1332}, {"type": "D", "before": "Communication skills", "after": null, "start_char_pos": 1380, "end_char_pos": 1400}, {"type": "R", "before": "Critical Faculties", "after": "Communication skills Critical faculties", "start_char_pos": 1401, "end_char_pos": 1419}, {"type": "R", "before": "Cooperation", "after": "Cooperation", "start_char_pos": 1436, "end_char_pos": 1447}, {"type": "R", "before": "customer", "after": "customers", "start_char_pos": 1564, "end_char_pos": 1572}, {"type": "R", "before": "and", "after": ",", "start_char_pos": 1638, "end_char_pos": 1641}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1871, "end_char_pos": 1871}, {"type": "R", "before": "Getting to yes", "after": "\"getting to yes\" theory,", "start_char_pos": 2113, "end_char_pos": 2127}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2267, "end_char_pos": 2267}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2305, "end_char_pos": 2305}, {"type": "R", "before": "of", "after": "on", "start_char_pos": 2418, "end_char_pos": 2420}, {"type": "R", "before": "at", "after": "in", "start_char_pos": 2990, "end_char_pos": 2992}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3230, "end_char_pos": 3230}, {"type": "R", "before": "A mediator has the task of mediating between the parties involved", "after": "This person mediates between parties", "start_char_pos": 3454, "end_char_pos": 3519}, {"type": "R", "before": "Theme-centered", "after": "theme-centered", "start_char_pos": 3834, "end_char_pos": 3848}, {"type": "D", "before": "the", "after": null, "start_char_pos": 4055, "end_char_pos": 4058}, {"type": "D", "before": ",", "after": null, "start_char_pos": 4550, "end_char_pos": 4551}], "sents_char_pos": [0, 310, 493, 580, 775, 845, 1012, 1159, 1307, 1690, 1919, 2108, 2308, 2547, 2679, 2756, 2918, 3112, 3254, 3367, 3453, 3580, 3694, 3965, 4111, 4317, 4463, 4653]}
+{"doc_id": "57528113", "revision_depth": "1", "before_revision": "The Battle of Anandpur (1701) was fought by the Khalsa (led by Guru Gobind Singh ) , against the neighbouring Hindu kingdom chiefs who controlled the mountain kingdoms. This was accompanied by a battle wherein Jagatullah was killed by Sikh forces. The hill chiefs laid a siege of Anandpur, India, and the Guru had to temporarily leave Anandpuras a condition for peace. According to Louis Fenech, his wars with kings of the Himalayan kingdoms were likely triggered by the growing army of Sikhs, which then raided and plundered villages in nearby mountainous kingdoms for supplies; the Hindu kings joined forces and blockaded Anandpur . References Category:Military history Category:Sikhs Category:Hindus Category:History of Ind", "after_revision": "The Battle of Anandpur (1701) was fought at Anandpur, between the armies of the Sikh Guru Gobind Singh and the Rajas of the Sivalik Hills. The latter had an alliance with the Gujar tribesmen. Cause The hill Rajas were concerned about Guru Gobind Singh's rising power and influence in their region. The Mughal generals had failed to subdue the Guru in the Battle of Anandpur (1700). Consequently, the Rajas of hill states, including Jammu, Nurpur, Mandi, Kullu, Guler, Chamba, Srinagar, Dadhwal, and Hindur, assembled at Bilaspur to discuss the situation. The son of Bhim Chand, Raja Ajmer Chand of Kahlur, suggested forming an alliance to curb the Guru's rising power. Accordingly, the Rajas gathered and marched towards Anandpur. They sent a letter to the Guru, asking him to pay the arrears of rent for Anandpur (which lay in Ajmer Chand's territory), and leave the city. The Guru insisted that the land was bought by his father, and was his property. A large number of Ranghars and Gujjars, under the command of Jagatullah, joined the hill Rajas. Duni Chand led five hundred men from Majha region to assist the Guru. Reinforcements from other areas also arrived to help the Guru. The battle Lohgarh and Fatehgarh were the two main forts under Gobind Singh's control. Sher Singh and Nahar Singh were asked to guard Lohgarh, and Ude Singh was appointed as chief to guard Fatehgarh. The hill Rajas attacked the Guru's forces, but had to retreat. They held a brief council and decided to launch a three-sided attack. Raja Kesari Chand of Jaswal attacked from the right flank, Jagatullah attacked from the left and Ajmer Chand attacked his front. In the ensuing battle , Jagatullah was killed by Bhai Sahib Singh. Raja Ghumand Chand of Kangra failed to defeat the Guru's forces. The Rajas again held a council, in which Ajmer Chand proposed reconciliation with the Guru. Many Rajas agreed, but Raja Kesari Chand of Jaswal opposed the proposal, and suggested a more determined fight the next day, to oust the Guru from Anandpur. A depiction of Bhai Bachitter Singh killing the drunk elephant set by Mughal forces on the Sikh forces in the battlefield with Nagni Barcha (snake spear) given by Guru Gobind Singh Ji. This photo was taken by outside the Sikh History museum on way from Mohali to Sirhind The Rajas' forces launched another attack and besieged the city. The Guru's men defended themselves successfully for weeks. Raja Kesari Chand then decided to send an intoxicated elephant to break the gate of Lohgarh fort. The body of the elephant was encased in steel, and a spear was projected from its forehead to break the gate. Guru's disciple, Vicihitar Singh (or Bachittar Singh) successfully chased away the elephant with his spear Nagni barchha. Bhai Mohkam Singh cut its trunk with his sword. The wounded elephant went back in the Rajas' camp, trampling several men. Meanwhile, Kesari Chand was killed by Ude Singh, and the Raja of Handur was severely wounded in a conflict with Bhai Sahib Singh. The Rajas' army had to retreat. On the following day, the troops of Ghumand Chand of Kangra attacked Anandpur. The battle lasted till evening, and resulted in the death of Ghumand Chand at the hands of Bhai Himmat Singh. Aftermath Sometime after the battle, the hill Rajas negotiated a peace agreement with Gobind Singh, asking him to leave Anandpur temporarily. Accordingly, the Guru left for Nirmoh village (Nirmohgarh) and fought the Battle of Nirmohgarh (1702). References Anandpur (1701) Category:18th century in India Category:Punjab, India Category:Sikh Emp", "edit_actions": [{"type": "R", "before": "by the Khalsa (led by", "after": "at Anandpur, between the armies of the Sikh", "start_char_pos": 41, "end_char_pos": 62}, {"type": "R", "before": ")", "after": "and the Rajas of the Sivalik Hills. The latter had an alliance with the Gujar tribesmen.", "start_char_pos": 81, "end_char_pos": 82}, {"type": "A", "before": null, "after": "Cause", "start_char_pos": 83, "end_char_pos": 83}, {"type": "A", "before": null, "after": "The hill Rajas were concerned about Guru Gobind Singh's rising power and influence in their region. The Mughal generals had failed to subdue the Guru in the Battle of Anandpur (1700). Consequently, the Rajas of hill states, including Jammu, Nurpur, Mandi, Kullu, Guler, Chamba, Srinagar, Dadhwal, and Hindur, assembled at Bilaspur to discuss the situation. The son of Bhim Chand, Raja Ajmer Chand of Kahlur, suggested forming an alliance to curb the Guru's rising power. Accordingly, the Rajas gathered and marched towards Anandpur.", "start_char_pos": 84, "end_char_pos": 84}, {"type": "A", "before": null, "after": "They sent a letter to the Guru, asking him to pay the arrears of rent for Anandpur (which lay in Ajmer Chand's territory), and leave the city. The Guru insisted that the land was bought by his father, and was his property.", "start_char_pos": 85, "end_char_pos": 85}, {"type": "A", "before": null, "after": "A large number of Ranghars and Gujjars, under the command of Jagatullah, joined the hill Rajas. Duni Chand led five hundred men from Majha region to assist the Guru. Reinforcements from other areas also arrived to help the Guru.", "start_char_pos": 86, "end_char_pos": 86}, {"type": "A", "before": null, "after": "The battle", "start_char_pos": 87, "end_char_pos": 87}, {"type": "A", "before": null, "after": "Lohgarh and Fatehgarh were the two main forts under Gobind Singh's control. Sher Singh and Nahar Singh were asked to guard Lohgarh, and Ude Singh was appointed as chief to guard Fatehgarh.", "start_char_pos": 88, "end_char_pos": 88}, {"type": "A", "before": null, "after": "The hill Rajas attacked the Guru's forces, but had to retreat. They held a brief council and decided to launch a three-sided attack. Raja Kesari Chand of Jaswal attacked from the right flank, Jagatullah attacked from the left and Ajmer Chand attacked his front.", "start_char_pos": 89, "end_char_pos": 89}, {"type": "A", "before": null, "after": "In the ensuing battle", "start_char_pos": 90, "end_char_pos": 90}, {"type": "D", "before": "against the neighbouring Hindu kingdom chiefs who controlled the mountain kingdoms. This was accompanied by a battle wherein", "after": null, "start_char_pos": 93, "end_char_pos": 217}, {"type": "R", "before": "Sikh", "after": "Bhai Sahib Singh. Raja Ghumand Chand of Kangra failed to defeat the Guru's", "start_char_pos": 243, "end_char_pos": 247}, {"type": "R", "before": "hill chiefs laid a siege of Anandpur, India,", "after": "Rajas again held a council, in which Ajmer Chand proposed reconciliation with the Guru. Many Rajas agreed, but Raja Kesari Chand of Jaswal opposed the proposal, and suggested a more determined fight the next day, to oust the Guru from Anandpur.", "start_char_pos": 260, "end_char_pos": 304}, {"type": "A", "before": null, "after": "A depiction of Bhai Bachitter Singh killing the drunk elephant set by Mughal forces on the Sikh forces in the battlefield with Nagni Barcha (snake spear) given by Guru Gobind Singh Ji. This photo was taken by outside the Sikh History museum on way from Mohali to Sirhind", "start_char_pos": 305, "end_char_pos": 305}, {"type": "A", "before": null, "after": "The Rajas' forces launched another attack and besieged the city. The Guru's men defended themselves successfully for weeks. Raja Kesari Chand then decided to send an intoxicated elephant to break the gate of Lohgarh fort. The body of the elephant was encased in steel, and a spear was projected from its forehead to break the gate. Guru's disciple, Vicihitar Singh (or Bachittar Singh) successfully chased away the elephant with his spear Nagni barchha. Bhai Mohkam Singh cut its trunk with his sword. The wounded elephant went back in the Rajas' camp, trampling several men. Meanwhile, Kesari Chand was killed by Ude Singh, and the Raja of Handur was severely wounded in a conflict with Bhai Sahib Singh. The Rajas' army had to retreat.", "start_char_pos": 306, "end_char_pos": 306}, {"type": "A", "before": null, "after": "On the following day, the troops of Ghumand Chand of Kangra attacked Anandpur. The battle lasted till evening,", "start_char_pos": 307, "end_char_pos": 307}, {"type": "A", "before": null, "after": "resulted in", "start_char_pos": 312, "end_char_pos": 312}, {"type": "R", "before": "Guru had to temporarily leave Anandpuras a condition for peace. According to Louis Fenech, his wars with kings of the Himalayan kingdoms were likely triggered by the growing army of Sikhs, which then raided and plundered villages in nearby mountainous kingdoms for supplies; the Hindu kings joined forces and blockaded Anandpur .", "after": "death of Ghumand Chand at the hands of Bhai Himmat Singh.", "start_char_pos": 317, "end_char_pos": 646}, {"type": "A", "before": null, "after": "Aftermath", "start_char_pos": 647, "end_char_pos": 647}, {"type": "A", "before": null, "after": "Sometime after the battle, the hill Rajas negotiated a peace agreement with Gobind Singh, asking him to leave Anandpur temporarily. Accordingly, the Guru left for Nirmoh village (Nirmohgarh) and fought the Battle of Nirmohgarh (1702).", "start_char_pos": 648, "end_char_pos": 648}, {"type": "R", "before": "Category:Military history Category:Sikhs Category:Hindus Category:History of Ind", "after": "Anandpur (1701) Category:18th century in India Category:Punjab, India Category:Sikh Emp", "start_char_pos": 660, "end_char_pos": 740}], "sents_char_pos": [0, 176, 255, 380, 591]}
+{"doc_id": "57535176", "revision_depth": "3", "before_revision": "Past Gran Colombia, since 1826 had been economically exhausted by the long campaign to liberate Ecuador, Peru and Bolivia from royalist control. In addition, there were conflicting interests between the political administration and the military of the new nation, as well as tension between local leaders, who did not accept to being subordinates of the central government. In 1826 General Jos\u00e9 Antonio P\u00e1ez, an important caudillo and military leader of the department of Venezuela, rebelled against the central government in a separatist movement called La Cosiata, which is brought to a temporary but peaceful resolution by the personal intervention of Sim\u00f3n Bol\u00edvar in 1827. History At the Convention two political currents came into sharp relief: the followers of Bolivar, who supported a strong presidency, and those who supported a more decentralized government and gathered around the figure of Vice-President Francisco de Paula Santander. The discussion of various political projects, such as centralism and federalism, became extremely contentious. Since the Constitution of C\u00facuta stated that it could not be reformed before ten years (that is, not until 1831 ) , Santander and his allies had to give up the idea of reforming it in order to maintain the unity of the nation. Jos\u00e9 Mar\u00eda del Castillo y Rada was chosen as president and Andr\u00e9s Narvarte as vice president of the Convention . The Convention did not come to its planed conclusion because the followers of Bolivar quit it. Bolivar , in an effort to maintain the unity of Gran Colombia that had already been greatly undermined , assumed dictatorial powers on August 27, 1828. Subsequent events After the failure of the Convention of Oca\u00f1a, Santander left for C\u00facuta and then to Bogot\u00e1. On June 13, 1828, a popular movement in Bogota, lead by General Pedro Alc\u00e1ntara Herr\u00e1n, intendant and general commander of the department of Cundinamarca, promoted the idea of the military command seizing power. On August 27, 1828, Simon Bolivar proclaimed himself dictator and signed an order revoking the powers of the deputies of Bogot\u00e1 to the Convention and declaring its decrees null and void. Bolivar had assumed supreme command of the nation. On August 27, Bol\u00edvar promulgated an organic decree, which he called the \"Fundamental Law,\" through which he assumed the dictatorship and left the Constitution of C\u00facuta without effect, dissolving Congress and other political offices, such as the vice-presidency, which might be points of opposition to him. On September 11, Estanislao Vergara, Minister of Foreign Affairs, informed Vice-President Santander that he had been appointed as Plenipotentiary Minister of Colombia to the United States. Shortly thereafter , there would be an attempt on Bol\u00edvar's life .", "after_revision": "Background Gran Colombia, since 1826 had been economically exhausted by the long campaign to liberate Ecuador, Peru and Bolivia from royalist control. In addition, there were conflicting interests between the political administration and the military of the new nation, as well as tension between local leaders, who did not accept to being subordinates of the central government. In 1826 General Jos\u00e9 Antonio P\u00e1ez, an important caudillo and military leader of the department of Venezuela, rebelled against the central government in a separatist movement called La Cosiata, which is brought to a temporary but peaceful resolution by the personal intervention of Sim\u00f3n Bol\u00edvar in 1827, who promised to convene a constituent congress to rewrite the nation's constitution, despite the fact that Constitution of C\u00facuta stated that it could not be reformed before ten years (that is, not until 1831). Events Jos\u00e9 Mar\u00eda del Castillo y Rada was chosen as president and Andr\u00e9s Narvarte as vice president of the Convention. At the Convention two political currents came into sharp relief: support for a strong presidency, mostly expressed by followers of Bol\u00edvar, and support for a more decentralized government , the proponents of which tended to gather around the figure of Vice-President Francisco de Paula Santander. During the opening sessions, Bol\u00edvar proposed a new, highly centralized constitution based on the one he recently had written for Bolivia in 1826, but this suggestion proved to be unpopular. The discussion of various political projects, especially whether to establish more centralism or implement federalism, became extremely contentious. Since the Constitution of C\u00facuta prohibited its revision before 1831 , Santander and his allies were able to support maintaining the status quo and to abandon any idea of reforming the Constitution in the name of maintaining national unity. Nevertheless, a tense atmosphere remained and the Convention did not come to its planed conclusion because the Bol\u00edvar's followers quit it. Bol\u00edvar , in an effort to maintain the unity of Gran Colombia , assumed dictatorial powers on August 27, 1828. Subsequent developments After the failure of the Convention of Oca\u00f1a, Santander left for C\u00facuta and then to Bogot\u00e1. On June 13, 1828, a popular movement in Bogota, lead by General Pedro Alc\u00e1ntara Herr\u00e1n, intendant and general commander of the department of Cundinamarca, promoted the idea of the military command seizing power. On August 27, 1828, Simon Bolivar proclaimed himself dictator and signed an order revoking the powers of the deputies of Bogot\u00e1 to the Convention and declaring its decrees null and void. Bol\u00edvar had assumed supreme command of the nation. On August 27, Bol\u00edvar promulgated an organic decree, which he called the \"Fundamental Law,\" through which he assumed the dictatorship and left the Constitution of C\u00facuta without effect, dissolving Congress and other political offices, such as the vice-presidency, which might be points of opposition to him. On September 11, Estanislao Vergara, Minister of Foreign Affairs, informed Vice-President Santander that he had been appointed as Plenipotentiary Minister of Colombia to the United States. A few weeks later , there would be an attempt on Bol\u00edvar's life , which he survived, but the nation remained unstable until 1831 when separatist movements won out and Gran Colombia was dissolved .", "edit_actions": [{"type": "R", "before": "Past", "after": "Background", "start_char_pos": 0, "end_char_pos": 4}, {"type": "R", "before": "1827.", "after": "1827, who promised to convene a constituent congress to rewrite the nation's constitution, despite the fact that Constitution of C\u00facuta stated that it could not be reformed before ten years (that is, not until 1831).", "start_char_pos": 672, "end_char_pos": 677}, {"type": "R", "before": "History", "after": "Events Jos\u00e9 Mar\u00eda del Castillo y Rada was chosen as president and Andr\u00e9s Narvarte as vice president of the Convention.", "start_char_pos": 678, "end_char_pos": 685}, {"type": "R", "before": "the followers of Bolivar, who supported", "after": "support for", "start_char_pos": 751, "end_char_pos": 790}, {"type": "R", "before": "and those who supported", "after": "mostly expressed by followers of Bol\u00edvar, and support for", "start_char_pos": 812, "end_char_pos": 835}, {"type": "R", "before": "and gathered", "after": ", the proponents of which tended to gather", "start_char_pos": 868, "end_char_pos": 880}, {"type": "A", "before": null, "after": "During the opening sessions, Bol\u00edvar proposed a new, highly centralized constitution based on the one he recently had written for Bolivia in 1826, but this suggestion proved to be unpopular.", "start_char_pos": 947, "end_char_pos": 947}, {"type": "R", "before": "such as centralism and", "after": "especially whether to establish more centralism or implement", "start_char_pos": 994, "end_char_pos": 1016}, {"type": "R", "before": "stated that it could not be reformed before ten years (that is, not until", "after": "prohibited its revision before", "start_char_pos": 1092, "end_char_pos": 1165}, {"type": "D", "before": ")", "after": null, "start_char_pos": 1171, "end_char_pos": 1172}, {"type": "R", "before": "had to give up the", "after": "were able to support maintaining the status quo and to abandon any", "start_char_pos": 1200, "end_char_pos": 1218}, {"type": "D", "before": "it in order to maintain the unity of the nation.", "after": null, "start_char_pos": 1237, "end_char_pos": 1285}, {"type": "R", "before": "Jos\u00e9 Mar\u00eda del Castillo y Rada was chosen as president and Andr\u00e9s Narvarte as vice president of the Convention . The Convention", "after": "the Constitution in the name of maintaining national unity. Nevertheless, a tense atmosphere remained and the Convention", "start_char_pos": 1286, "end_char_pos": 1413}, {"type": "R", "before": "followers of Bolivar", "after": "Bol\u00edvar's followers", "start_char_pos": 1464, "end_char_pos": 1484}, {"type": "R", "before": "Bolivar", "after": "Bol\u00edvar", "start_char_pos": 1494, "end_char_pos": 1501}, {"type": "D", "before": "that had already been greatly undermined", "after": null, "start_char_pos": 1556, "end_char_pos": 1596}, {"type": "R", "before": "events", "after": "developments", "start_char_pos": 1657, "end_char_pos": 1663}, {"type": "R", "before": "Bolivar", "after": "Bol\u00edvar", "start_char_pos": 2155, "end_char_pos": 2162}, {"type": "R", "before": "Shortly thereafter", "after": "A few weeks later", "start_char_pos": 2703, "end_char_pos": 2721}, {"type": "A", "before": null, "after": ", which he survived, but the nation remained unstable until 1831 when separatist movements won out and Gran Colombia was dissolved", "start_char_pos": 2768, "end_char_pos": 2768}], "sents_char_pos": [0, 144, 373, 677, 946, 1058, 1285, 1398, 1493, 1645, 1755, 1967, 2154, 2205, 2513, 2702]}
+{"doc_id": "5780457", "revision_depth": "1", "before_revision": " Skurfing is a towed water sport similar to waterskiing, in that an individual is pulled behind a boat on a tow rope. However, instead of water skis, the sport uses a skurfboarda floating platform the user balances on, similar to a surfboard, but typically much shorter, with two footstraps to prevent falling off the board and three fins positioned on the bottom that make it easier to maneuver when the board is being towed. The word itself is a portmanteau of skiing and surfing. Skurfing is often considered the precursor to wakeboarding. Water skurfing 350px|A person water skurfing Water skurfing was inspired by an unknown man being pulled by a boat on a surfboard in Lake Havasu, Arizona. Water skurfing is a form of water skiing that uses a surfboard or similar board instead of skis. The skurfer is towed behind a motorboat at planing speed with a tow rope similar to that of knee boarding and wakeboarding. It shares an advantage with kneeboarding in that the motorboat does not require as much speed as it does for water skiing. Skurfing is a towed sport and it is very similar to water skiing. The skurfboard, however, is a surfboard and is usually shorter by about two feet, wider and has three larger fins that make the board easier to maneuver while being pulled behind a boat. The planing speed of the motorboat is equivalent to the speed generated by a wave and allows the skurfer to ride behind the boat the same way a surfer would ride a wave. One of the advantages of skurfing, when compared with surfing, is that when the water is flat, skurfing is still possible. Skurfing can be done behind a boat, on a jet ski, river or in an ocean. The maneuver on a skurfboard are similar to those on a surfboard. These maneuver include: Cut-backs 180\u00b0 rotations 360\u00b0 rotations Serial jumps Power slides Freeriding Freeriding is when the wake is surfed without the rope. First, the rider pulls themselves up the rope so that they are skurfing in the largest part of the wake. The rider then gently pumps the board to maintain speed and moves their weight further forward to help them stay on the wake wave. Once they are being propelled by the wake the rope is thrown back into the boat. Skurfing has developed into its own unique sport but has also been used in adapting other sports such as surfing. Before skurfing was invented there were limitations to paddling onto larger waves when surfing because surfers lacked the speed needed to stay in front of the wave. Skurfing has shown the world the potential of big wave surfing by towing the surfer towards big waves. Therefore, giving the surfer the speed needed to catch the wave successfully.%DIFDELCMD < %DIFDELCMD < %%% The early usage was a portmanteau of skiing (as in water skiing) and surfing, and was used to describe a popular surface water sport in which the participant is towed on a surfboard behind a boat with a ski rope. In 1985, California surfer Tony Finn invented the Skurfer , a shorter, narrow version of a surfboard with foot straps. Although the \"Skurfer\" was originally trademarked by Tony Finn, the word skurfing was potentially first coined in New Zealand by surfboard shaper Allan Byrne. Allan Byrne lent a surfboard to Jeff Darby and friends in Queensland Australia who started to make their own and later came in contact with Tony Finnwho was to later produce the brand 'Skurfer' under royalty. Many years prior to Tony Finn and the 'Skurfer', Australian surfboard shaper and inventor Bruce McKee along with associate Mitchell Ross , launched the world's first mass-produced plastic roto-molded construction skurfboard named the \"Mcski\", later renamed \"SSS\" skiboard and then 'Wake-snake' in Australia. The board had adjustable rubber foot straps, concave tunnel bottom and a keel fin. Two smaller side fins were later added for greater hold and more maneuverability. Bruce McKee and associate Mitchell Ross negotiated with USA's Medalist Waterskis and the first American production was launched. The launch of the product's American version being named the 'Surf-Ski' was in 1984 at Chicagos 'IMTEC' show. At the show McKee also met Tony Finn who was the proposed Californian representative. Tony Finn , went on to do his own negotiations with Darby and company from Australia and the result as mentioned above were the US boards later launched under the 'Skurfer' brand name. Surfing is highly popular in the state of Western Australia and in many other places in the world. Unlike most other water sports where the participant is towed, water skurfing is not a professional sport and has no official competitions. It is a freestyle sport with highly individualistic style and form. There are no defined styles or conventions, rather it is about personal style. The first Skurfer championships were televised on ESPN in 1990. Water skurfing is considered by many to be a precursor to wakeboarding, as the skurfboards evolved in the late 1980s into compression-molded products ( \"skiboards\") then eventually into the twin-tipped wakeboard. Styles There are two main styles of water skurfing , the noseriding style, mostly used by people who surf on a longboard . The alternative is with cutbacks, carves and other turns. Some skurfers even get air over the wake . A new style of water skurfing has recently emerged in the sport where the fins are removed from the bottom of the board. This finless style requires more balance and finesse than having the fins attached. Not having fins limits cutbacks and carving, but allows the rider to spin the board around in a 360-degree rotation . Street skurfing A person street skurfing%DIFDELCMD < %DIFDELCMD < %%% This usage is a portmanteau of skateboarding and surfing. See also Freeline skates. Street skurfing is the melding of many elements of skateboarding with the technical and practically applicable skills gained from slalom, downhill, or any other side-sport disciplines such as surfing, snowboarding, skateboarding, and casterboarding. It focuses heavily on spins, slides, \"stance\" changes, and carving. There are no set rules, tricks, or techniques except the heavy emphasis of a fluid and surf-like execution through a course. The usually adopted terrain is a mix of steep grade roads, driveways, concrete banks, and ditches.%DIFDELCMD < %DIFDELCMD < %%% Styles There are two types of styles for street skurfing. The first style involves a single board (often a skateboard or custom-cut deck). The second style is actually a common term used for caster skating. It involves two separated boards or skates instead of a single skateboard. One of the advantages of having separated skates is that the rider can maneuver with both feet individually. In addition, street skurfing involves making much tighter turns, s-shape motions, and even traveling up and down hills .", "after_revision": "Definition Skurfing is a towed water sport similar to waterskiing, in that an individual is pulled behind a boat on a tow rope. However, instead of water skis, the sport uses a skurfboarda floating platform the user balances on, similar to a surfboard, but typically much shorter, with two foot-straps that prevent falling off the board and three fins positioned on the bottom that make it easier to maneuver when the board is being towed. The word itself is a portmanteau of skiing and surfing. Skurfing is often considered the precursor to wakeboarding. History 350px|A skurfer riding the wave while being pulled by a rope Skurfing was inspired by an unknown man being pulled by a boat on a surfboard in Lake Havasu, Arizona. The boat was being towed behind a motorboat at planing speed with a tow rope similar to that of knee boarding and wakeboarding. The planing speed of the motorboat was equivalent to the speed generated by a wave and allowed the skurfer to ride behind the boat the same way a surfer would ride a wave. One of the advantages of skurfing, when compared with surfing, is that when the water is flat, skurfing is still possible. %DIFDELCMD < %DIFDELCMD < %%% In 1985, California surfer Tony Finn invented the \"Skurfer\" , a shorter, more narrow version of a surfboard with foot straps. Although the \"Skurfer\" was originally trademarked by Tony Finn, the word skurfing was potentially first coined in New Zealand by surfboard shaper Allan Byrne. Byrne lent a surfboard to a man named Jeff Darby, in Queensland Australia who then started to make his own, and later came in contact with Finn, who would later produce the brand 'Skurfer' under royalty. Many years prior to Tony Finn and the 'Skurfer', Australian surfboard shaper and inventor Bruce McKee , along with associate Mitchell Ross launched the world's first mass-produced plastic roto-molded construction skurfboard . It's original name was the \"Mcski\", later renamed \"SSS\" skiboard , or 'Wake-snake' in Australia. The board had adjustable rubber foot straps, a concave tunnel bottom , and a keel fin. Two smaller side fins were later added for greater hold and more maneuverability. The launch of the product's American version being named the 'Surf-Ski' was in 1984 at Chicagos 'IMTEC' show. At the show McKee also met Tony Finn who was the proposed Californian representative. Tony Finn went on to do his own negotiations with Darby , and the result were the US boards later launched under the 'Skurfer' brand name. Skurfing has developed into its own unique sport but has also been used in adapting other sports such as surfing. Before skurfing was invented there were limitations to paddling onto larger waves when surfing because surfers lacked the speed needed to stay in front of the wave. Skurfing has shown the world the potential of big wave surfing by towing the surfer towards big waves. Therefore, giving the surfer the speed needed to catch the wave successfully. Popularity The first Skurfer championships were televised on ESPN in 1990. Surfing is highly popular in the state of Western Australia and in many other places in the world. Unlike most other water sports where the participant is towed, skurfing is not a professional sport and has no official competitions. It is a freestyle sport with highly individualistic style and form. There are no defined styles or conventions, rather it is about personal style. Styles There are two main styles of water skurfing : noseriding - mostly used by people who surf on a longboard - or using cutbacks, carves , and other turns. The maneuvers on a skurfboard are similar to those on a surfboard. These maneuver include: Cut-backs 180\u00b0 rotations 360\u00b0 rotations Serial jumps Power slides Freeriding Freeriding is when the wake is surfed without the rope. First, the rider pulls themselves up the rope so that they are skurfing in the largest part of the wake. The rider then gently pumps the board to maintain speed and moves their weight further forward to help them stay on the wake wave. Once they are being propelled by the wake the rope is thrown back into the boat. The latest style of skurfing is riding with the fins removed from the bottom of the board. This finless style requires more balance and finesse than having the fins attached. Not having fins limits cutbacks and carving, but allows the rider to spin the board around in a 360-degree rotation %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% .", "edit_actions": [{"type": "A", "before": null, "after": "Definition", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "footstraps to", "after": "foot-straps that", "start_char_pos": 280, "end_char_pos": 293}, {"type": "R", "before": "Water skurfing", "after": "History", "start_char_pos": 543, "end_char_pos": 557}, {"type": "R", "before": "person water skurfing", "after": "skurfer riding the wave while being pulled by a rope", "start_char_pos": 566, "end_char_pos": 587}, {"type": "R", "before": "Water skurfing", "after": "Skurfing", "start_char_pos": 588, "end_char_pos": 602}, {"type": "R", "before": "Water skurfing is a form of water skiing that uses a surfboard or similar board instead of skis. The skurfer is", "after": "The boat was being", "start_char_pos": 697, "end_char_pos": 808}, {"type": "D", "before": "It shares an advantage with kneeboarding in that the motorboat does not require as much speed as it does for water skiing.", "after": null, "start_char_pos": 918, "end_char_pos": 1040}, {"type": "R", "before": "Skurfing is a towed sport and it is very similar to water skiing. The skurfboard, however, is a surfboard and is usually shorter by about two feet, wider and has three larger fins that make the board easier to maneuver while being pulled behind a boat. The", "after": "The", "start_char_pos": 1041, "end_char_pos": 1297}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1329, "end_char_pos": 1331}, {"type": "R", "before": "allows", "after": "allowed", "start_char_pos": 1380, "end_char_pos": 1386}, {"type": "D", "before": "Skurfing can be done behind a boat, on a jet ski, river or in an ocean. The maneuver on a skurfboard are similar to those on a surfboard. These maneuver include: Cut-backs 180\u00b0 rotations 360\u00b0 rotations Serial jumps Power slides Freeriding", "after": null, "start_char_pos": 1587, "end_char_pos": 1825}, {"type": "D", "before": "Freeriding is when the wake is surfed without the rope. First, the rider pulls themselves up the rope so that they are skurfing in the largest part of the wake. The rider then gently pumps the board to maintain speed and moves their weight further forward to help them stay on the wake wave. Once they are being propelled by the wake the rope is thrown back into the boat.", "after": null, "start_char_pos": 1826, "end_char_pos": 2198}, {"type": "D", "before": "Skurfing has developed into its own unique sport but has also been used in adapting other sports such as surfing. Before skurfing was invented there were limitations to paddling onto larger waves when surfing because surfers lacked the speed needed to stay in front of the wave. Skurfing has shown the world the potential of big wave surfing by towing the surfer towards big waves. Therefore, giving the surfer the speed needed to catch the wave successfully.", "after": null, "start_char_pos": 2199, "end_char_pos": 2658}, {"type": "D", "before": "The early usage was a portmanteau of skiing (as in water skiing) and surfing, and was used to describe a popular surface water sport in which the participant is towed on a surfboard behind a boat with a ski rope.", "after": null, "start_char_pos": 2688, "end_char_pos": 2900}, {"type": "R", "before": "Skurfer", "after": "\"Skurfer\"", "start_char_pos": 2951, "end_char_pos": 2958}, {"type": "A", "before": null, "after": "more", "start_char_pos": 2972, "end_char_pos": 2972}, {"type": "D", "before": "Allan", "after": null, "start_char_pos": 3180, "end_char_pos": 3185}, {"type": "R", "before": "Jeff Darby and friends", "after": "a man named Jeff Darby,", "start_char_pos": 3212, "end_char_pos": 3234}, {"type": "A", "before": null, "after": "then", "start_char_pos": 3263, "end_char_pos": 3263}, {"type": "R", "before": "their own", "after": "his own,", "start_char_pos": 3280, "end_char_pos": 3289}, {"type": "R", "before": "Tony Finnwho was to", "after": "Finn, who would", "start_char_pos": 3321, "end_char_pos": 3340}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3492, "end_char_pos": 3492}, {"type": "D", "before": ",", "after": null, "start_char_pos": 3528, "end_char_pos": 3529}, {"type": "R", "before": "named", "after": ". It's original name was", "start_char_pos": 3615, "end_char_pos": 3620}, {"type": "R", "before": "and then", "after": ", or", "start_char_pos": 3663, "end_char_pos": 3671}, {"type": "A", "before": null, "after": "a", "start_char_pos": 3744, "end_char_pos": 3744}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3767, "end_char_pos": 3767}, {"type": "D", "before": "Bruce McKee and associate Mitchell Ross negotiated with USA's Medalist Waterskis and the first American production was launched.", "after": null, "start_char_pos": 3866, "end_char_pos": 3994}, {"type": "D", "before": ",", "after": null, "start_char_pos": 4201, "end_char_pos": 4202}, {"type": "R", "before": "and company from Australia and the result as mentioned above", "after": ", and the result", "start_char_pos": 4249, "end_char_pos": 4309}, {"type": "A", "before": null, "after": "Skurfing has developed into its own unique sport but has also been used in adapting other sports such as surfing. Before skurfing was invented there were limitations to paddling onto larger waves when surfing because surfers lacked the speed needed to stay in front of the wave. Skurfing has shown the world the potential of big wave surfing by towing the surfer towards big waves. Therefore, giving the surfer the speed needed to catch the wave successfully.", "start_char_pos": 4376, "end_char_pos": 4376}, {"type": "A", "before": null, "after": "Popularity The first Skurfer championships were televised on ESPN in 1990.", "start_char_pos": 4377, "end_char_pos": 4377}, {"type": "D", "before": "water", "after": null, "start_char_pos": 4540, "end_char_pos": 4545}, {"type": "D", "before": "The first Skurfer championships were televised on ESPN in 1990.", "after": null, "start_char_pos": 4764, "end_char_pos": 4827}, {"type": "D", "before": "Water skurfing is considered by many to be a precursor to wakeboarding, as the skurfboards evolved in the late 1980s into compression-molded products ( \"skiboards\") then eventually into the twin-tipped wakeboard.", "after": null, "start_char_pos": 4828, "end_char_pos": 5040}, {"type": "R", "before": ", the noseriding style,", "after": ": noseriding -", "start_char_pos": 5092, "end_char_pos": 5115}, {"type": "R", "before": ". The alternative is with", "after": "- or using", "start_char_pos": 5162, "end_char_pos": 5187}, {"type": "A", "before": null, "after": ",", "start_char_pos": 5205, "end_char_pos": 5205}, {"type": "D", "before": "Some skurfers even get air over the wake .", "after": null, "start_char_pos": 5223, "end_char_pos": 5265}, {"type": "R", "before": "A new style of water skurfing has recently emerged in the sport where the fins are", "after": "The maneuvers on a skurfboard are similar to those on a surfboard. These maneuver include: Cut-backs 180\u00b0 rotations 360\u00b0 rotations Serial jumps Power slides Freeriding", "start_char_pos": 5266, "end_char_pos": 5348}, {"type": "A", "before": null, "after": "Freeriding is when the wake is surfed without the rope. First, the rider pulls themselves up the rope so that they are skurfing in the largest part of the wake. The rider then gently pumps the board to maintain speed and moves their weight further forward to help them stay on the wake wave. Once they are being propelled by the wake the rope is thrown back into the boat.", "start_char_pos": 5349, "end_char_pos": 5349}, {"type": "A", "before": null, "after": "The latest style of skurfing is riding with the fins", "start_char_pos": 5350, "end_char_pos": 5350}, {"type": "D", "before": ".", "after": null, "start_char_pos": 5589, "end_char_pos": 5590}, {"type": "D", "before": "Street skurfing A person street skurfing", "after": null, "start_char_pos": 5591, "end_char_pos": 5631}, {"type": "D", "before": "This usage is a portmanteau of skateboarding and surfing. See also Freeline skates.", "after": null, "start_char_pos": 5661, "end_char_pos": 5744}, {"type": "D", "before": "Street skurfing is the melding of many elements of skateboarding with the technical and practically applicable skills gained from slalom, downhill, or any other side-sport disciplines such as surfing, snowboarding, skateboarding, and casterboarding. It focuses heavily on spins, slides, \"stance\" changes, and carving. There are no set rules, tricks, or techniques except the heavy emphasis of a fluid and surf-like execution through a course. The usually adopted terrain is a mix of steep grade roads, driveways, concrete banks, and ditches.", "after": null, "start_char_pos": 5745, "end_char_pos": 6286}, {"type": "D", "before": "Styles There are two types of styles for street skurfing. The first style involves a single board (often a skateboard or custom-cut deck). The second style is actually a common term used for caster skating. It involves two separated boards or skates instead of a single skateboard. One of the advantages of having separated skates is that the rider can maneuver with both feet individually. In addition, street skurfing involves making much tighter turns, s-shape motions, and even traveling up and down hills", "after": null, "start_char_pos": 6316, "end_char_pos": 6825}], "sents_char_pos": [0, 117, 426, 482, 542, 696, 793, 917, 1040, 1106, 1293, 1463, 1586, 1658, 1724, 1881, 1986, 2117, 2198, 2312, 2477, 2580, 2658, 2900, 3020, 3179, 3389, 3698, 3783, 3865, 3994, 4104, 4190, 4375, 4476, 4616, 4684, 4763, 4827, 5040, 5163, 5222, 5265, 5388, 5472, 5590, 5718, 5744, 5994, 6062, 6187, 6286, 6373, 6454, 6522, 6597, 6706]}
+{"doc_id": "5847650", "revision_depth": "1", "before_revision": "0-9 .edu \"dot-edu\" The generic top-level domain for educational institutions, primarily those in the United States. Created in January 1985 as one of the first top-level domains, .edu was originally intended for educational institutions anywhere in the world. With few exceptions, however, only those in the United States registered such domains, while educational institutions in other countries usually used domain names under the appropriate country code TLD. A Plato, seen with Aristotle, is credited with the inception of academia. Academia A collective term for the scientific and cultural community engaged in higher education and research, taken as a whole. The word comes from the akademeia just outside ancient Athens, where the gymnasium was made famous by Plato as a center of learning. Academic degree A degree is any of a wide range of status levels conferred by institutions of higher education, such as universities, normally as the result of successfully completing a program of study. Academic dress Traditional clothing worn specifically in academic settings. It is more commonly seen nowadays only at graduation ceremonies, but in former times academic dress was, and to a lesser extent in many ancient universities still is, worn on a daily basis. Academic institution An educational institution dedicated to higher education and research, which grants academic degrees. Academic publishing Describes a system of publishing that is necessary in order for academic scholars to review work and make it available for a wider audience. The \"system,\" which is probably disorganized enough not to merit the title, varies widely by field, and is also always changing, if often slowly. Most academic work is published in journal article or book form. Active learning A process whereby learners are actively engaged in the learning process, rather than \"passively\" absorbing lectures. Active learning involves reading, writing, discussion, and engagement in solving problems, analysis, synthesis, and evaluation. Active learning often involves cooperative learning. Activity theory (AT) A Soviet psychological meta-theory, paradigm, or framework, with its roots in socio-cultural approach. Its founders were Alexei Nikolaevich Leontyev, and S. L. Rubinshtein (1889\u20131960). It became one of the major psychological approaches in the former USSR, being widely used in both theoretical and applied psychology, in areas such as the education, training, ergonomics, and work psychology. Additional Support Needs In Scotland, children who require some additional support to remove barriers to learning in any respect are deemed to have Additional Support Needs. This definition abolished the previously used term Special Educational Needs and was set out in the 2004 Additional Support for Learning Act. Adult education The practice of teaching and educating adults. This is often done in the workplace, or through 'extension' or 'continuing education' courses at secondary schools, or at a College or University. The practice is also often referred to as 'Training and Development'. It has also been referred to as andragogy (to distinguish it from pedagogy). Educating adults differs from educating children in several ways. One of the most important differences is that adults have accumulated knowledge and experience which can either add value to a learning experience or hinder it. Adultism A predisposition towards adults, which some see as biased against children, youth, and all young people who aren't addressed or viewed as adults. Adultism is popularly used to describe any discrimination against young people, and is distinguished from ageism, which is simply prejudice on the grounds of age; not specifically against youth. Advanced Placement Program A United States and Canada-based program that offers high school students the opportunity to receive university credit for their work during high school. Agricultural education Instruction about crop production, livestock management, soil and water conservation, and various other aspects of agriculture. Agricultural education includes instruction in food education, such as nutrition. Agricultural and food education improves the quality of life for all people by helping farmers increase production, conserve resources, and provide nutritious foods. Aims and objectives An aim expresses the purpose of the educational unit or course whereas an objective is a statement of a goal which successful participants are expected demonstrably to achieve before the course or unit completes. Alternative education Describes a number of approaches to teaching and learning other than traditional publicly- or privately-run schools. These approaches can be applied to all students of all ages, from infancy to adulthood, and all levels of education. Analysis The action of taking something apart in order to study it. Andragogy A theory of adult education proposed by the American educator Malcolm Knowles (April 24, 1913\u2014November 27, 1997). Knowles held that andragogy (from the Greek words meaning \"man-leading\") should be distinguished from the more commonly taught pedagogy (Greek: \"child-leading\"). Anti-bias curriculum An active/activist approach in education that challenges interlocking systems of oppression such as racism, sexism, ableism/disablism, ageism, homophobia, and all the other -isms. The objective of this approach to teaching is to eliminate bias found in various institutions. This approach attempts to provide children with a solid understanding of social problems and issues while equipping them with strategies to combat bias and improve social conditions for all. The anti-bias curriculum serves as a catalyst in the critical analysis of various social conditions. It is implemented as a proactive means to eradicate various forms of social oppression with the ultimate goal of social justice in mind. Applied academics An approach to learning and teaching that focuses on how academic subjects (communications, mathematics, science, and basic literacy) can apply to the real world. Further, applied academics can be viewed as theoretical knowledge supporting practical applications. Apprenticeship A traditional method, still popular in some countries, of training a new generation of skilled crafts practitioners. Apprentices (or in early modern usage \"prentices\") built their careers from apprenticeships. Art education The area of learning that is based upon the visual arts\u2014drawing, painting, sculpture, and design in such fine crafts of jewelry, pottery, weaving, fabrics, etc., and design applied to more practical fields such as commercial graphics and home furnishings. The term \"arts education\" implies many things, but it is defined as: Instruction and programming in all arts disciplines\u2014including but not limited to dance, music, visual art, theater, creative writing, media arts, history, criticism, and aesthetics. \"Arts education\" encompasses all the visual and performing arts delivered in a standards-based, sequential approach by a qualified instructor as part of the core curriculum. The most common courses provided in schools include Art (visual art), Band, Drama, and Choir. Assessment The process of documenting, usually in measurable terms , knowledge, skills, attitudes and beliefs. Asynchronous learning A teaching method using the asynchronous delivery of training materials or content using computer network technology. It is an approach to providing technology-based training that incorporates learner-centric models of instruction. The asynchronous format has been in existence for quite some time; however, new research and strategies suggest that this approach can enable learners to increase knowledge and skills through self-paced and self-directed modules completed when the learner is prepared and motivated to learn. Autodidacticism autodidactism Self-education or self-directed learning. An autodidact, also known as an automath, is a mostly self-taught person - typically someone who has an enthusiasm for self-education and a high degree of self-motivation.%DIFDELCMD < %DIFDELCMD < %%% B Behaviorism nobold|(or Rakesh, not to be confused with behavioralism in political science)%DIFDELCMD < }}%%% : An approach to psychology based on the proposition that behavior can be researched scientifically without recourse to inner mental states. It is a form of materialism, denying any independent significance for the mind. One of the assumptions of many behaviorists is that free will is illusory, and that all behaviour is determined by a combination of forces both genetic factors and the environment, either through association or reinforcement. Belief Aconviction to the truth of a proposition. Beliefs can be acquired through perception, contemplation or communication. In the psychological sense, belief is a representational mental state that takes the form of a propositional attitude. Knowledge is often defined as justified true belief, in that the belief must be considered to correspond to reality and must be derived from valid evidence and arguments. However, this definition has been challenged by the Gettier problem which suggests that justified true belief does not provide a complete picture of knowledge. Bias in education A real or perceived bias in the educational system. Bilingual education Has multiple definitions: education where two distinct languages are used for general teaching; education designed to help children become bilingual (sometimes called \"two-way bilingual education\"; e.g., Spanish speakers and English speakers in a classroom are all taught to speak both languages; education in a child's native language for (a) the first year or (b) however long it takes; followed by mainstreaming in English-only classes (in the US); education in a child's native language for as long as his parents wish (with minimal instruction in another language). In the latter cases \"native-language instruction\" may be a clearer definition. Biliteracy The state of being literate in two or more languages. To be biliterate has a stronger and more specified connotation than the claim of being simply bilingual. This is because with the change of the term from 'lingual' to 'literate' and the concept of reading and writing, which are in addition to simply speaking. In bilingualism the extent of fluency in each language is in question. One can be anywhere on the spectrum from comfortable oral communication in certain social contexts to fluency in speaking, reading and writing. With the term biliteracy, however, it is understood that fluency in both reading and writing are present. Blended learning Learning in a combination of modes. Often used more specifically to refer to courses which use a combination of traditional face-to-face teaching and distance learning techniques on-line. Blogish Interactive and personal communication as opposed to traditional narrative text. Boarding school A school where some or all students not only study but also live, amongst their peers but away from their home and family. The word 'boarding' is used in the sense of a 'boarding house', lodgings which provide both bed and board, that is meals as well as a room. Most famous UK public schools are boarding schools for ages 13 to 18, either single-sex or coeducational. There are any number of different types of boarding schools, for pupils of all school ages from boarding nursery or Kindergarten schools, to senior schools. Boarding prep schools for the age group 9 to 12 are becoming less usual in the UK, but many adolescents like to get away from home. Brainstorming An organized approach for producing ideas by letting the mind think without interruption. The term was coined by Alex Osborn. Brainstorming can be done either individually or in a group; in group brainstorming sessions, the participants are encouraged, and often expected, to share their ideas with one another as soon as they are generated. The key to brainstorming is not to interrupt the thought process. As ideas come to the mind, they are captured and stimulate the development of better ideas. Brainstorming is used for enhancing creativity in order to generate a broad selection of ideas in leading to a unique and improved concept. Brainwashing thought reform The application of coercive techniques to change the beliefs or behavior of one or more people for political purposes. Whether any techniques at all exist that will actually work to change thought and behavior to the degree that the term \"brainwashing\" connotes is a controversial and at times hotly debated question. Bridge program This is a higher education program specifically designed to assist a student with an attained initial educational level (or an initial level of professional licensure) to attend college courses and achieve a terminal degree (or a higher level of professional licensure) in the same field of study and in less time than an entry-level student would require. Bridge programs are most notable among healthcare professions.Brown v. Board of Education of Topeka: 347 U.S. 483 (1954) A landmark case of the United States Supreme Court which explicitly outlawed de jure racial segregation of public education facilities (legal establishment of separate government-run schools for blacks and whites), ruling so on the grounds that the doctrine of \"separate but equal\" public education could never truly provide black Americans with facilities of the same standards available to white Americans. A companion case dealt with the constitutionality of segregation in the District of Columbia, (not a state and therefore not subject to the Fourteenth Amendment), Bolling v. Sharpe, . Bully An individual, thought to be emotionally dysfunctional, who torments others through verbal harassment, physical assault, or other more subtle methods of coercion. C%DIFDELCMD < %DIFDELCMD < %%% Campus novel A novel whose main action is set in and around the campus of a university. The genre, dating back to the late 1940s, is popular because it allows the author to show the quirks of human nature, and reactions to pressure (for exams etc.) within a controlled environment or to describe the reaction of a fixed socio-cultural perspective (the academic staff) to new social attitudes (the new student intake). Chemistry education An active area of research within both the disciplines of chemistry and education. The main focus of research is on learning and teaching of chemistry in schools, colleges and universities. The practice of chemical education is teaching chemistry to students and the training of teachers to teach chemistry. The research aspect deals with how to teach and how to improve learning outcomes. Child A young human. Depending on context it may mean someone who is not yet an adult, or someone who has not yet reached puberty (someone who is prepubescent). Child is also a counterpart of parent: adults are the children of their parents despite their maturation beyond infancy; for example \"Benjamin, aged 46, is the child of Tobias, aged 73\". Classical conditioning Pavlovian conditioning respondent conditioning A type of associative learning. These associations are formed by pairing two stimuli\u2014what Ivan Pavlov described as the learning of conditioned behavior\u2014to condition an animal to give a certain response. The simplest form of classical conditioning is reminiscent of what Aristotle would have called the law of contiguity which states that: \"When two things commonly occur together, the appearance of one will bring the other to mind.\" Classical education May refer to the education of antiquity and the Middle Ages, or the education of later periods based on Classics and Western culture, or the completely different Chinese tradition of education, based in large part on Confucian and Taoist traditions. Classroom management A term used by many teachers to describe the process of ensuring lessons run smoothly without disruptive behaviour by students. It is possibly the most difficult aspect of teaching for many teachers and indeed experiencing problems in this area causes many people to leave teaching altogether. It is closely linked to issues of motivation, discipline and respect. Coaching A coach is a person who teaches and directs another person via encouragement and advice. This use of the term \"coaching\" appears to have origins in English traditional university \"cramming\" in the mid-19th century. (The name allegedly recalls the multitasking skills associated with controlling the team of a horse-drawn stagecoach.) By the 1880s American college sports teams had\u2014in addition to managers -- coaches. Some time in the 20th century, non-sporting coaches emerged: non-experts in the specific technical skills of their clients, but who nevertheless ventured to offer generalised motivational or inspirational advice. Coeducation The integrated education of men and women at the same school facilities; co-ed is a shortened adjectival form of co-educational. Before the 1960s, many private institutions of higher education restricted their enrollment to a single sex. Indeed, most institutions of higher education\u2014regardless of being public or private\u2014restricted their enrollment to a single sex at some point in their history. \"Coed\" is an informal (and increasingly archaic) term for a female student attending such a college or university. Cognitive maps A type of mental processing, or cognition, composed of a series of psychological transformations by which an individual can acquire, code, store, recall, and decode information about the relative locations and attributes of phenomena in their everyday or metaphorical spatial environment. Here, 'cognition' can be used to refer to the mental models, or belief systems, that people use to perceive, contextualize, simplify, and make sense of otherwise complex problems. As they have been studied in various fields of science, these mental models are often referred to, variously, as cognitive maps, scripts, schemata, and frames of reference. Cognitive relativism A philosophy that claims the truth or falsity of a statement is relative to a social group. Collaborative learning An umbrella term for a variety of approaches in education that involve joint intellectual effort by students or students and teachers. Groups of students work together in searching for understanding, meaning or solutions or in creating a product. The approach is closely related to cooperative learning, but is considered to be more radical because of its reliance on youth voice. Collaborative learning activities can include collaborative writing, group projects, and other activities. College athletics Refers to a set of physical activities comprising sports and games put into place by institutions of tertiary education (colleges in American English). In the United States, college athletics is overseen by the National Collegiate Athletic Association and by the National Association of Intercollegiate Athletics. College athletics has a high profile in the United States, and to a lesser extent in Canada, where it is known as interuniversity sport. In the most of the rest of the world the equivalent level of competition is only followed by the competitors and their close friends and families. Common sense What people in common would agree; that which they \"sense\" in common as their common natural understanding. Some use the phrase to refer to beliefs or propositions that in their opinion they consider would in most people's experience be prudent and of sound judgment, without dependence upon esoteric knowledge or study or research, but based upon what is believed to be knowledge held by people \"in common\". The knowledge and experience most people have, or are believed to have by the person using the term. Community of practice Refers to the process of social learning that occurs when people who have a common interest in some subject or problem collaborate over an extended period to share ideas, find solutions, and build innovations. Comparative education Seeks to throw light on education in one country (or group of countries) by using data and insights drawn from the practises and situation in another country, or countries. Computer Based Learning Refers to the use of computers as a key component of the educational environment. While this can refer to the use of computers in a classroom, the term more broadly refers to a structured environment in which computers are used for teaching purposes. The concept is generally seen as being distinct from the use of computers in ways where learning is at least a peripheral element of the experience (e.g. computer games and web browsing).150px|A concept map Concept mapping A technique for visualizing the relationships between different concepts. A concept map is a diagram showing the relationships between concepts. Concepts are connected with labelled arrows, in a downward-branching hierarchical structure. The relationship between concepts is articulated in linking phrases, e.g., \"gives rise to\", \"results in\", \"is required by,\" or \"contributes to\". Concept mapping serves several purposes. One, which takes place via knowledge elicitation, is to represent the mental models, i.e., the cognitive map of individuals, teams and organizations. Another, which takes place by knowledge capture, is to represent the structure of knowledge gleaned from written documents. The addition of knowledge resources, e.g., diagrams, reports, other concept maps, spreadsheets, etc., to the concept nodes (attached during or after construction) has been found to significantly improve the level of meaningful learning of the concept mapper. Educators are increasingly realising the utility of such maps and have started using them in classroom. Constructivism A set of assumptions about the nature of human learning that guide constructivist learning theories and teaching methods. Constructivism values developmentally appropriate, teacher-supported learning that is initiated and directed by the student. Constructivist epistemology A recent development in philosophy which criticizes essentialism, whether it is in the form of medieval realism, classical rationalism, or empiricism. It originated in sociology under the term social constructionism and has been given the name constructivism when referring to philosophical epistemology, though constructionism and constructivism are often used interchangeably. Constructivism views all of our knowledge as \"constructed,\" because it does not reflect any external \"transcendent\" realities; it is contingent on convention, human perception, and social experience. It is believed by constructivists that representations of physical and biological reality, including race, sexuality, and gender are socially constructed (Hegel, Garns, and Marx were among the first to suggest such an ambitious expansion of social determinism). The common thread between all forms of constructivism is that they do not focus on an ontological reality, but instead on the constructed reality. Cooperative education A structured method of combining academic education with practical work experience. Research indicates that one of the attributes employers value most in newly hired employees is work experience. A cooperative education experience, commonly known as a \"co-op\", provides academic credit for career work. Cooperative education is taking on new importance in school-to-work transition, service learning, and experiential learning initiatives. Cooperative learning Proposed in response to traditional curriculum-driven education. In cooperative learning environments, students interact in purposely structured heterogeneous group to support the learning of one self and others in the same group. Course in the United States, a unit of instruction in one subject, lasting one academic term Course of study in the British Commonwealth, a programme of education leading to a degree or diploma Creativity A human mental phenomenon based around the deployment of mental skills and/or conceptual tools, which, in turn, originate and develop innovation, inspiration, or insight. Creativity techniques Heuristic methods to facilitate creativity in a person or a group of people. Generally, most creativity techniques use associations between the goal (or the problem), the current state (which may be an imperfect solution to the problem), and some stimulus (possibly selected randomly). There is an analogy between many creativity techniques and methods of evolutionary computation. Critical pedagogy A teaching approach which attempts to help students question and challenge domination, and the beliefs and practices that dominate. In other words, it is a theory and practice of helping students achieve critical consciousness. In this tradition the teacher works to lead students to question ideologies and practices considered oppressive (including those at school), and encourage liberatory collective and individual responses to the actual conditions of their own lives. Critical thinking Consists of a mental process of analyzing or evaluating information, particularly statements or propositions that people have offered as true. It forms a process of reflecting upon the meaning of statements, examining the offered evidence and reasoning, and forming judgments about the facts. Critical thinkers can gather such information from observation, experience, reasoning, and/or communication. Critical thinking has its basis in intellectual values that go beyond subject-matter divisions and which include: clarity, accuracy, precision, evidence, thoroughness and fairness. Cultural learning The way a group of people within a society or culture tend to learn and pass on new information. Learning styles are greatly influenced by how a culture socializes with its children and young people. Curriculum (plural curricula) The set of courses and their contents offered by an institution such as a school or university. In some cases, a curriculum may be partially or entirely determined by an external body (such as the National Curriculum for England in English schools). In the U.S., the basic curriculum is established by each state with the individual school districts adjusting it to their desires; in Australia each state's Education Department sets the various curricula. DDeemed university: \u2018Deemed-to-be-University\u2019, Status of autonomy granted to high performing institutes and departments of various universities in India by Government of India. Distance: (or distance learning) A field of education that focuses on the pedagogy/andragogy, technology, and instructional systems design that is effectively incorporated in delivering education to students who are not physically \"on site\" to receive their education. Instead, teachers and students may communicate asynchronously (at times of their own choosing) by exchanging printed or electronic media, or through technology that allows them to communicate in real time (synchronously). Distance education courses that require a physical on-site presence for any reason including the taking of examinations is considered to be a hybrid or blended course or program. Dunce: A person incapable of learning. The word is derived from the name of the great schoolman, John Duns Scotus, whose works on logic, theology and philosophy were accepted textbooks in the universities from the 14th century. Dyslexia: Said to be a neurological disorder with biochemical and genetic markers. Dyslexia was originally defined as a difficulty with reading and writing that could not be explained by general intelligence. One diagnostic approach is to compare their ability in areas such as reading and writing to that which would be predicted by his or her general level of intelligence, but some would say that it is not certain that intelligence should be a predictor of reading or writing ability; and also that the causes, effects and treatments of reading disabilities may be similar for all levels of intelligence.%DIFDELCMD < %DIFDELCMD < %%% E Early childhood education: Covers the education of a child from the period from birth to eight years of age. Education: A social science that encompasses teaching and learning specific knowledge, beliefs, and skills. Licensed and practicing teachers in the field use a variety of methods and materials in order to impart a curriculum. Education policy: is the collection of rules, both stated and implicit, or the regularities in practice that govern the behavior of persons in schools. Education policy analysis is the scholarly study of education policy. Education reform: A plan, program, or movement which attempts to bring about a systematic change in educational theory or practice across a community or society. Education voucher: (commonly called a school voucher) A certificate by which parents are given the ability to pay for the education of their children at a school of their choice, rather than the public school to which they were assigned. These vouchers would be paid for using tax revenues. Educational animation: Animation produced for the specific purpose of fostering learning. Educational counseling: Conducted by counselors in schools and universities. It is intended to help children suffering from education-related traumas such as beatings and other forms of corporal punishment used in many countries. A more common application is with children who have been abused or bullied. The counselor works with the child to help him or her get over the trauma he or she has suffered. Educational evaluation: The evaluation process of characterizing and appraising some aspect of the education enterprise. Educational film: A film or movie whose primary purpose is to educate. Educational films have been used in classrooms as an alternative to other teaching methods. Educational games: Games, including video games of this genre, designed to teach people, typically children, about a certain subject or help them learn a skill as they play. Some people call these types of games edutainment because they combine education and entertainment. Educational leadership: Leadership in formal educational settings. It draws upon interdisciplinary literature, generally, but ideally distinguishes itself through its focus on pedagogy, epistemology and human development. In contemporary practice it borrows from political science and business. Debate within the field relates to this tension. Educational organization: Organization within the scope of education. It is a common misconception that this means it is organizing educational system; rather, it deals with the theory of organization as it applies to education of the human mind. Educational perennialism: Perennialists believe that one should teach the things that they believe are of everlasting importance to all people everywhere. They believe that the most important topics develop a person. Since details of fact change constantly, these cannot be the most important. Therefore, one should teach principles, not facts. Since people are human, one should teach first about humans, not machines or techniques. Since people are people first, and workers second if at all, one should teach liberal topics first, not vocational topics. Educational programming language: A programming language that is designed primarily as a learning instrument and not so much as a tool for writing real-world application programs. Educational psychology: The study of how humans learn in educational settings, the effectiveness of educational treatments, the psychology of teaching, and the social psychology of schools as organizations. Although the terms \"educational psychology\" and \"school psychology\" are often used interchangeably, researchers and theorists are likely to be identified as educational psychologists, whereas practitioners in schools or school-related settings are identified as school psychologists. Educational psychology is concerned with the processes of educational attainment among the general population and sub-populations such as gifted children and those subject to specific disabilities. Educational research: Research conducted to investigate behavioral patterns in pupils, students, teachers and other participants in schools and other educational institutions. Such research is often conducted by examining work products such as documents and standardized test results. The methods of educational research are derived chiefly from the social sciences, and in particular from psychology. Educational software: Computer software whose primary purpose is teaching or self-learning. Educational technology: The use of technology to improve education. It is a systematic, iterative process for designing instruction or training used to improve performance. Educational technology is sometimes also known as instructional technology or learning technology. E-learning: An approach to facilitate and enhance learning through, and based on, both computer and communications technology. Such devices can include personal computers, CD-ROMs, Digital Television, P.D.A.s and Mobile Phones. Communications technology enables the use of the Internet, email, discussion forums, collaborative software and team learning systems (see also online deliberation). Electronic portfolio: In the context of education and learning, an electronic portfolio, normally known as an ePortfolio or a digital portfolio, is a portfolio based on electronic media and services. It consists of a personal digital record containing information such as a collection of artifacts or evidence demonstrating what one knows and can do. Empirical knowledge: (or a posteriori knowledge) Propositional knowledge obtained by experience or sensorial information. It is contrasted with a priori knowledge, or knowledge that is gained through the apprehension of innate ideas, \"intuition,\" \"pure reason,\" or other non-experiential sources. The natural and social sciences are usually considered a posteriori, literally \"after the fact,\" disciplines. Mathematics and logic are usually considered a priori, \"before the fact,\" disciplines. Engagement: The sentiment a student feels or does not feel towards learning or the learning environment. Epistemic theories of truth: Attempts to analyse the notion of truth in terms of epistemic notions such as \"belief\", \"acceptance\", \"verification\", \"justification\", \"perspective\" and so on. There is a variety of such conceptions, and they may be classified into verificationist theories and perspectivalist and relativist theories. Verificationism is based on a certain kind of mental activity: \"verifying\" a proposition. The distinctive claim of verificationism is that the result of such verifications is, by definition, truth. That is, truth is reducible to this process of verification. According to perspectivalism and relativism, a proposition is only true relative to a particular perspective. Roughly, a proposition is true relative to a perspective if and only if it is \"accepted\" or \"endorsed\" or \"legitimated\" somehow by that perspective. Epistemology: (from the Greek words episteme (knowledge) and logos (word/speech)) The branch of philosophy that deals with the nature, origin and scope of knowledge. Historically, it has been one of the most investigated and most debated of all philosophical subjects. Much of this debate has focused on analysing the nature and variety of knowledge and how it relates to similar notions such as truth and belief. Much of this discussion concerns the justification of knowledge claims, that is the grounds on which one can claim to know a particular fact. Exchange student: A student (usually from high school or university) who temporarily goes abroad and lives with a host family in a foreign country, and attends school there. That host family often also sends a child of theirs abroad, usually to the same country as the student they are hosting. In this way, the two students are said to have been \"exchanged,\" essentially temporarily trading countries with each other, although the period of exchange may not necessarily be simultaneous. The main purpose of exchange programs is to increase cultural understanding, both for the student and the people in the host country he/she comes into contact with. Exchanges are often arranged by organizations created for this purpose, called student exchange programs. Youth For Understanding and American Field Service are two examples of these organizations. Experience: Comprises knowledge of or skill in or observation of some thing or some event gained through involvement in or exposure to that thing or event. The history of the word experience aligns it closely with the concept of experiment. The concept of experience generally refers to know-how or procedural knowledge, rather than propositional knowledge. Philosophers dub knowledge based on experience \"empirical knowledge\" or \"a posteriori knowledge\". A person with considerable experience in a certain field can gain a reputation as an expert.%DIFDELCMD < %DIFDELCMD < %%% Experiential education: (or \"learning by doing\") The process of actively engaging students in an authentic experience that will have benefits and consequences. Students make discoveries and experiment with knowledge themselves instead of hearing or reading about the experiences of others. Students also reflect on their experiences, thus developing new skills, new attitudes, and new theories or ways of thinking. Experiential education is related to the constructivist learning theory. Experimental analysis of behavior: The name given to the approach to psychology founded by B. F. Skinner. As its name suggests, its foundational principle was the rejection of theoretical analysis, in particular the kinds of learning theory that had grown up in the comparative psychology of the 1920-1950 period, in favor of a more direct approach. It owed its early success to the effectiveness of Skinner's procedure of operant conditioning, both in the laboratory and in behavior therapy. Expulsion (education): Removing a student from a school or university for violating rules or academic honor codes. Extra credit is an academic concept, particularly used in schools. Students are offered the opportunity to undertake optional work, additional to their compulsory school work, in order to gain additional credit that would boost their grades. Extracurricular activities: Activities performed by students that fall outside the realm of the normal curriculum of school or university education. Extracurricular activities exist at all levels of education, from high school and college to university education. Such activities are generally voluntary as opposed to mandatory, non-paying, tend to be social or philanthropic as opposed to scholastic, and involve others of the same age. Students often organize and direct these activities under faculty sponsorship.%DIFDELCMD < %DIFDELCMD < %%% F Forbidden knowledge: (in contrast to secret knowledge) Used to describe forbidden books or other information to which access is restricted or deprecated for political or religious reasons. Forbidden knowledge is commonly not secret, rather a society or various institutions will use repressive mechanisms to either completely prevent the publication of information they find objectionable or dangerous (censorship), or failing that, to try to reduce the public's trust in such information (propaganda). Public repression can create paradoxical situation where the proscribed information is generally common knowledge but publicly citing it is disallowed. Functional illiteracy: Refers to the inability of an individual to use reading, speaking, writing, and computational skills efficiently in everyday life situations. Unlike an illiterate, a functionally illiterate adult could be able to read and write text in his native language (with a variable degree of grammatical correctness, speed, and style), but is unable like the first, even in his own cultural and linguistic environment, to perform such fundamental tasks as filling out an application for employment, following written instructions, reading a newspaper, reading traffic signs, consulting a dictionary, or understanding a bus schedule. Future Problem Solving Program: (FPSP) An international academic competition. Over 250,000 students internationally participate in the Future Problem Solving program every year. Participating countries include the United States, Canada, Australia, New Zealand, Korea, Malaysia, Russia, Hong Kong and Singapore.%DIFDELCMD < %DIFDELCMD < %%% GGifted: (intellectual giftedness) An intellectual ability significantly higher than average. Gifted children develop asynchronously; their minds are often ahead of their physical growth, and specific cognitive and emotional functions often are at different stages of development within a single person. Gifted individuals form a heterogeneous group. Because gifted children are intellectually ahead of most of their age peers in at least one major subject area, they frequently require gifted education programs to reach their potential and avoid boredom. Gifted individuals experience the world differently and more intensely, resulting in unique social and emotional issues. The concept of giftedness has historically been rife with controversy, some even denying that this group exists. Gifted education: is a broad term for special practices, procedures and theories used in the education of children who have been identified as gifted or talented. Youths are usually identified as gifted by placing highly on certain standardized tests. Advocates of gifted education argue that gifted and/or talented youth are so perceptually and intellectually above the mean, it is appropriate to pace their lessons more aggressively, track them into honors, Advanced Placement, or International Baccalaureate courses, or otherwise provide educational enrichment. Gymnasia and Realgymnasia: (singular: Gymnasium) and Realgymnasia were the classical higher or secondary schools of Germany from the sixteenth century to the twentieth century. Students were admitted at 9 or 10 years of age and were required to have a knowledge of reading, writing, and arithmetic.%DIFDELCMD < %DIFDELCMD < %%% H Habituation: An example of non-associative learning in which there is a progressive diminution of behavioral response probability with repetition of a stimulus. It is another form of integration. heutagogy: The study of self-determined learning. Hidden curriculum: Draws attention to the idea that schools do more than simply transmit knowledge, as laid down in the official curricula. It is often used to criticize the social implications, political underpinnings, and cultural outcomes of modern educative activities. While early examinations were concerned with identifying the anti-democratic nature of schooling, later studies have taken various tones, including those concerned with socialism, capitalism, and anarchism in education. The University of Cambridge is an institute of higher learning. Higher education: Education provided by universities and other institutions that award academic degrees, such as community colleges, and liberal arts colleges. Higher education includes both the teaching and the research activities of universities, and within the realm of teaching, it includes both the undergraduate level (sometimes referred to as tertiary education) and the graduate (or postgraduate) level (sometimes referred to as quaternary education or graduate school). Higher education differs from other forms of post-secondary education such as vocational education. However, most professional education is included within higher education, and many postgraduate qualifications are strongly vocationally or professionally oriented, for example in disciplines such as law and medicine. History of ideas: A field of research in history and in related fields dealing with the expression, preservation, and change of human ideas over time. Scholars often consider the history of ideas a sister discipline to, or a particular approach within, intellectual history. Work in the history of ideas usually involves close research in the history of philosophy and the history of literature. Homeschooling: (also home education or home school) An educational alternative in which children are educated at home and in the community, in contrast to a compulsory education which takes place in an institution such as a publicly run or privately run school. Home education methods are similar to those widely used before the popularization of compulsory education in the 19th century. Before this time, the majority of education worldwide was provided at home by family and community members, with only the privileged attending privately run schools or employing tutors, the only available alternatives at the time. I Individuals with Disabilities Education Act (IDEA): a U.S. federal law on Special Education Individualized instruction: A method of instruction in which content, instructional materials, instructional media, and pace of learning are based upon the abilities and interests of each individual learner. Inquiry education: (sometimes known as the inquiry method) A student-centered method of education focused on asking questions. Students are encouraged to ask questions which are meaningful to them, and which do not necessarily have easy answers; teachers are encouraged to avoid speaking at all when this is possible, and in any case to avoid giving answers in favor of asking more questions. Instructional capital: A term used in educational administration after the 1960s, to reflect capital resulting from investment in producing learning materials. Instructional design: (also known as instructional systems design) The analysis of learning needs and systematic development of instruction. Instructional designers often use instructional technology as a method for developing instruction. Instructional design models typically specify a method, that if followed will facilitate the transfer of knowledge, skills and attitude to the recipient or acquirer of the instruction. Instructional Leadership: Actions or behaviors exhibited by an individual or group in the field of education that are characterized by knowledge and skill in the area of curriculum and instructional methodology, the provision of resources so that the school\u2019s mission can be met, skilled communication in one-on-one, small-group and large-group settings, and the establishment of a clear and articulated vision for the educational institution.Smith, W.F.%DIFDELCMD < & %%% Andrews R.L. (1989) . Instructional Leadership: How Principals Make a Difference. Alexandria, VA: ASCD. This vision, and decision making based on this vision are ideally characterized by a collaborative process and are inclusive of multiple stakeholders.Baron, D.(2008, February). Consensus Building: A Key to School Transformation. Principal Leadership. Instructional leaders also promote collegiality and leadership behavior amongst other members of the institution.Hoerr, T.R. (2007, December)What is Instructional Leadership? Educational Leadership Instructional scaffolding: The provision of sufficient supports to promote learning when concepts and skills are being first introduced to students. Instructional technology: Born as a military response to the problems of a labor shortage during WWII in the United States. There was a definitive need to fill the factories with skilled labor. Instructional technology provided a methodology for training in a systematic and efficient manner. Instructional theory: A discipline that focuses on how to structure material for promoting the education of humans, particularly youth. Originating in the United States in the late 1970s, instructional theory is typically divided into two categories: the cognitive and behaviorist schools of thought. Instructional theory was spawned off the 1956 work of Benjamin Bloom, a University of Chicago professor, and the results of his Taxonomy of Education Objectives \u2014 one of the first modern codifications of the learning process. One of the first instructional theorists was Robert M. Gagne, who in 1965 published Conditions of Learning for the Florida State University's Department of Educational Research. Renowned psychologist B. F. Skinner's theories of behavior were highly influential on instructional theorists because their hypotheses can be tested fairly easily with the scientific process. 150px|A concept map Integrative learning: A learning theory describing a movement toward integrated lessons helping students make connections across curricula. This higher education concept is distinct from the elementary and high school \"integrated curriculum\" movement. Intelligence (trait): The mental capacity to reason, plan, solve problems, think abstractly, comprehend ideas and language, and learn. Although nonscientists generally regard the concept of intelligence as having much broader scope, in psychology, the study of intelligence generally regards this trait as distinct from creativity, personality, character, or wisdom. International education: The practice and/or study of international cooperation and aid among countries, including the exchange of students, teachers, and researchers between countries. International education is connected to comparative education. Intrinsic motivation: Evident when people engage in an activity for its own sake, without some obvious external incentive present. A hobby is a typical example. Invigilator: Someone who ensures the smooth running of exams. An invigilator is responsible for ensuring that the Awarding Body's regulations are complied with; that exams start and finish at the correct time; that exam papers are secure whilst in their care; that attendance and seating plans are recorded; and that no cheating takes place. The invigilator will also deal with any problems that arise during an exam, including emergency evacuations, and ensure that no unauthorised materials are present, including mobile phones.%DIFDELCMD < %DIFDELCMD < %%% J Joint Committee on Standards for Educational Evaluation: A coalition of major professional associations formed in 1975 to help improve the quality of evaluation. The Joint Committee published three sets of standards for evaluations. The Personnel Evaluation Standards was published in 1988, The Program Evaluation Standards (2nd edition) was published in 1994, and The Student Evaluations Standards was published in 2003. K A kindergarten in Afghanistan. Kindergarten: (German for garden for children) A name used in many parts of the world for the first stages of a child's classroom education. In some parts kindergarten is part of the formal school system; in others it may refer to pre-school or daycare. Kinesthetic learning: A teaching and learning style in which learning takes place by the student actually carrying out a physical activity, rather than listening to a lecture or merely watching a demonstration. Building dioramas, physical models or participating in role-playing or historical reenactment are some examples. Other examples include the kindergarten practice of having children perform various motions from left to right in preparation for reading education. Knowledge: Information of which someone is aware. Knowledge is also used to mean the confident understanding of a subject, potentially with the ability to use it for a specific purpose. The unreliability of memory limits the certainty of knowledge about the past, while unpredictability of events yet to occur limits the certainty of knowledge about the future. Epistemology is the philosophical study of the nature, origin, and scope of knowledge.%DIFDELCMD < %DIFDELCMD < %%% Knowledge Management: (or KM) A term applied to techniques used for the systematic collection, transfer, security and management of information within organisations, along with systems designed to help make best use of that knowledge. In particular it refers to tools and techniques designed to preserve the availability of information held by key individuals and facilitate decision making and reducing risk. Knowledge representation: (KR) Most commonly used to refer to representations intended for processing by modern computers, and particularly for representations consisting of explicit objects. Knowledge transfer: In the fields of Organizational development and organizational learning, is the practical problem of getting a packet of knowledge from one part of the organization to another (or all other) parts of the organization. It is considered to be more than just a communications problem. Knowledge visualization: A sub discipline of Information Design and Instructional Message Design (pedagogy; didactics, pedagogical Psychology). Knowledge Visualization aims to improve the transfer of knowledge by using computer and non-computer based visuals complementary. Examples of such visual formats are photographs, information graphics, sketches, diagrams, images, mind maps, objects, interactive visualizations, dynamic visuals (animations), information visualization applications, imaginary visualizations, stories. L Language education: The teaching and learning of a language or languages, usually as foreign languages. Law (principle): Refers to universal principles that describe the fundamental nature of something, to universal properties and relationships between things, or to descriptions that purport to explain these principles and relationships. Learning: The process of acquiring knowledge, skills, attitudes, or values, through study, experience, or teaching, that causes a change of behavior that is persistent, measurable, and specified or allows an individual to formulate a new mental construct or revise a prior mental construct (conceptual knowledge such as attitudes or values). It is a process that depends on experience and leads to long-term changes in behavior potential. Learning by teaching (LdL): In professional education (in German \"Lernen durch Lehren\", therefore LdL) designates a method which allows pupils and students to prepare and teach lessons or parts of lessons. Learning by teaching should not be confused with presentations or lectures by students, as students do not only convey a certain content, but choose their own methodological and didactical approach in teaching their classmates a certain area of the respective subject. Learning disability: In the United States, the term learning disability is used to refer to socio-biological conditions that affect a persons communicative capacities and potential to learn. The term includes conditions such as perceptual disability, brain injury, minimal brain dysfunction, autism, dyslexia, and developmental aphasia. In the United Kingdom, the term learning disability is used more generally to refer to developmental disability and intellectual disability. Learning outcome: The term may refer to course aims (intended learning outcomes) or may be roughly synonymous with educational objectives (observed learning outcomes). Usage varies between organisations. Lecture: An oral presentation intended to teach people about a particular subject, for example by a university or college teacher. Lectures are used to convey critical information, history, background, theories and equations. A politician's speech, a minister's sermon, or even a businessman's sales presentation may be similar in form to a lecture. Usually the lecturer will stand at the front of the room and recite information relevant to the lecture's content. Legal education: The education of individuals who intend to become legal professionals (attorneys and judges) or those who simply intend to use their law degree to some end, either related to law (such as politics or academic) or unrelated (such as business entrepreneurship). This entry primarily discusses some of the general attributes of legal education in the United States for those who intend to use their degree in order to become legal professionals.%DIFDELCMD < %DIFDELCMD < %%% Lesson plan: A teacher's detailed description of the course of instruction for an individual lesson. While there is no one way to construct a correct lesson plan, most lesson plans contain similar elements. 150px|The seven liberal arts Liberal arts: Studies that are intended to provide general knowledge and intellectual skills, rather than more specialized occupational or professional skills. The scope of the liberal arts has changed with society. It once emphasised the education of elites in the classics; but, with the rise of science and humanities during the Age of Enlightenment, the scope and meaning of \"liberal arts\" expanded to include them. Still excluded from the liberal arts are topics that are specific to particular occupations, such as agriculture, business, dentistry, engineering, medicine, pedagogy (school-teaching), and pharmacy.%DIFDELCMD < %DIFDELCMD < %%% List group label strategy: a prereading strategy designed to help students make connections to prior knowledge. Literacy: The ability to read, write, speak, and listen. In modern context, the word means reading and writing in a level adequate for written communication and generally a level that enables one to successfully function at certain levels of a society.%DIFDELCMD < %DIFDELCMD < %%% MMastery learning: An instructional method that presumes all children can learn if they are provided with the appropriate learning conditions. Specifically, mastery learning is a method whereby students are not advanced to a subsequent learning objective until they demonstrate proficiency with the current one. MEB: A Master's in European Business providing knowledge and skills both in Economics and Management. Mathematics education: The study of practices and methods of both the teaching and learning of mathematics. Furthermore, mathematics educators are concerned with the development of tools that facilitate practice and/or the study of practice. Mathematics education has been a hotly debated subject in modern society. There is an ambiguity in the term for it refers both to these practices in classrooms around the world, but also to an emergent discipline with its own journals, conferences, etc. The main international body involved is the International Commission on Mathematical Instruction. Medical education: Education related to the practice of being a medical practitioner, either the initial training to become a doctor or further training thereafter. Medical education and training varies considerably across the world. Various teaching methodologies have been utilised in medical education, which is an active area of educational research. Memory: The ability of the brain to store, retain, and subsequently recall information. Although traditional studies of memory began in the realms of philosophy, the late nineteenth and early twentieth century put memory within the paradigms of cognitive psychology. In the recent decades, it has become one of the principal pillars of a new branch of science that represents a marriage between cognitive psychology and neuroscience, called cognitive neuroscience. Mentoring: A developmental relationship between a more experienced mentor and a less experienced partner referred to as a mentee or prot\u00e9g\u00e9. Usually - but not necessarily - the mentor/prot\u00e9g\u00e9 pair will be of the same sex. The roots of the practice are lost in antiquity. The word itself was inspired by the character of Mentor in Homer's Odyssey. Though the actual Mentor in the story is a somewhat ineffective old man, the goddess Athena takes on his appearance in order to guide young Telemachus in his time of difficulty. Historically significant systems of mentorship include apprenticing under the medieval guild system, and the discipleship system practiced by both Rabbinical Judaism and the Christian church.%DIFDELCMD < %DIFDELCMD < %%% 150px|University (1350s). Medieval university: The first European medieval institutions generally considered to be universities were established in Italy, France and England in the late 11th and the 12th Century for the study of arts, law, medicine, and theology. These universities evolved from much older schools and monasteries, and it is difficult to define the first date at which they became true universities for teaching higher education, although the lists of studia generali for higher education in Europe held by the Vatican are a useful guide. Some other institutions such as the imperial university of Constantinople claim that they changed from schools to universities as early as the 11th Century. Medieval university (Asia): Medieval universities did not exist in Asia in the strict sense of the phrase. However, there were important centres of learning that can be compared to the universities of Europe. Unlike the European universities, non-western institutions of higher learning were never known to issue degrees to their graduates and therefore do not meet what many hold to be the technical definition of university. This does not, however, bar their importance to the history of non-western cultures. Meta-: In epistemology, the prefix meta- is used to mean about (its own category). For example, metadata is data about data (who has produced it, when, what format the data is in and so on). Similarly, meta-memory in psychology means an individual's intuition about whether or not they would remember something if they concentrated on recalling it. Any subject can be said to have a meta-theory, which is the theoretical consideration of its foundations and methods. Metacognition: Refers to thinking about cognition (memory, perception, calculation, association, etc.) itself. Metacognition can be divided into two types of knowledge: explicit, conscious, factual knowledge; and implicit, unconscious, procedural knowledge. The ability to think about thinking is unique to sapient species and indeed is one of the definitions of sapience. Metacognition is practiced to attempt to regulate one's own cognition, and maximize one's potential to think, learn and process stimuli from the surroundings.%DIFDELCMD < %DIFDELCMD < %%% Allegory of Music, by Lorenzo Lippi Methodology: Strictly speaking is the study and knowledge of methods; but the term is frequently used pretentiously to indicate a method or a set of methods. In other words, it is the study of techniques for problem-solving and seeking answers, as opposed to the techniques themselves. Military education and training:Process that intends to educate in combat and in situations of war. Mind map: (or mind-map) A diagram used for linking words and ideas to a central key word or idea. It is used to visualize, classify, structure, and generate ideas, as well as an aid in study, problem solving, and decision making. Mind uploading The futurist high technology to rapidly increase the speed of information exchange to neurology. A form of education that focuses on extreme time efficiency. Motivation: The driving force behind all actions of human beings and other animals. It is an internal state that activates behavior and gives it direction. Emotion is closely related to motivation, and may be regarded as the subjectively experienced component of motivational states. Music education: Comprises the application of education methods in teaching music.%DIFDELCMD < %DIFDELCMD < %%% N%DIFDELCMD < %DIFDELCMD < %%% NAACP Legal Defense and Educational Fund, Inc.: (NAACP LDF or simply LDF) A leading United States civil rights organization. It was founded in 1940 under the leadership of Thurgood Marshall as part of the National Association for the Advancement of Colored People (NAACP) and spun out as a separate organization in 1957. National Educational Television: (NET) was an educational television network in the USA from 1952 until 1970 and was the predecessor of the Public Broadcasting Service. National postgraduate representative body: Exists in many countries representing postgraduate students/researchers undertaking their doctorate (PhD) or postdoctoral research. Some have a broader remit to represent all postgraduates, including those taking Master's degrees. A few countries have no specific body but are represented by a national body representing all students, including undergraduates. In Europe many of the national organisations have come together under the federation Eurodoc. Network of practice: Builds on the work on communities of practice by Jean Lave and Etienne Wenger in the early 1990s, John Seely Brown and Paul Duguid (2000) developed the concept of networks of practice (often abbreviated as NoPs). This concept refers to the overall set of various types of informal, emergent social networks that facilitate learning and knowledge sharing between individuals conducting practice-related tasks. In other words, networks of practice range from communities of practice to electronic networks of practice (often referred to as virtual or electronic communities). Nines System: The informal name for a grading scale often used at educational institutions in English-speaking countries, particularly the United States. The system owes its name to the fact that each of the top four letter grades in it cover a range of nine points. The minimum passing mark under it is almost always 65\\%, or five points higher than in the more widely used Tens System.%DIFDELCMD < %DIFDELCMD < %%% Notes on a mind map Normal school: An educational institution for training teachers. Its purpose is to establish teaching standards or norms, hence its name. The term normal school is now archaic in all but a few countries. In New Zealand, for example, normal schools are affiliated with Teachers colleges. According to the Oxford English Dictionary, normal schools in the United States and Canada trained primary school teachers, while in Europe, normal schools educated primary, secondary and tertiary-level teachers. Notetaking: The practice of writing pieces of information, often in an informal or unstructured manner. One major specific type of notetaking is the practice of writing in shorthand, which can allow large amounts of information to be put on paper very quickly. Notes are frequently written in notebooks, though any available piece of paper can suffice in many circumstances\u2014some people are especially fond of Post-It notes, for instance. Notetaking is an important skill for students, especially at the college level. Many different forms are used to structure information and make it easier to find later. Computers, particularly tablet PCs and personal digital assistants (PDAs) are beginning to see wide use as notetaking devices. Numeracy: A term that emerged in the United Kingdom as a contraction of \"numerical literacy\". In the United States, it is somewhat better known as \"Quantitative Literacy,\" and is familiar to math educators and intellectuals but not in the common usage. Innumeracy is the absence of numeracy.%DIFDELCMD < %DIFDELCMD < %%% Young children learn very quickly. Nursery school: (or preschool) A school for the education of very young children (generally five years of age and younger). These schools range from schools which seek to teach young children to schools which only provide childcare with little educational benefits. Schools which focus on education generally teach early social skills including interpersonal interaction, being a part of a group of peers, and classroom skills such as following the instructions of a teacher. Some formal education also takes place, such as early reading or language skills. Some nursery schools have adopted specialized methods of teaching, such as Montessori, High Scope, Reggio Emilia approach and various other pedagogy.%DIFDELCMD < %DIFDELCMD < %%% O%DIFDELCMD < %DIFDELCMD < %%% Objective: An educational objective is a statement of a goal which successful participants are expected demonstrably to achieve before the course or unit completes. Objectivity (philosophy) : Has various meanings in philosophy, and is surely one of the most important philosophical problems, since it concerns the epistemological status of knowledge, the problem of an objective reality and the question of our subjective relationship to others objects in the world. Obscurantism: Opposition to extension or dissemination of knowledge beyond certain limits and to questioning dogmas. Obscurantism is the opposite of freethought and is often associated with religious fundamentalism by its opponents. Indeed, it is a commonly raised accusation in debates on academic freedom, with anti-communists and others associating it with the philosophy of G. W. F. Hegel and his followers (including Karl Marx) and more recently with opponents of Martin Heidegger doing the same. Observation: An activity of a sapient or sentient living being, which senses and assimilates the knowledge of a phenomenon in its framework of previous knowledge and ideas. Observational learning: (or social learning) Learning that occurs as a function of observing, retaining and replicating behavior observed in others. It is most associated with the work of psychologist Albert Bandura, who implemented some of the seminal studies in the area and initiated social learning theory. Although observational learning can take place at any stage in life, it is thought to be particularly important during childhood, particularly as authority becomes important. Of Education Published in 1644, first appearing anonymously as a single eight-page quarto sheet (Ainsworth 6). Presented as a letter written in response to a request from the Puritan educational reformer Samuel Hartlib, it represents John Milton's most comprehensive statement on educational reform, and gives voice to his views \u201cconcerning the best and noblest way of education \u201d. As outlined in the tractate, education carried for Milton a dual objective: one public, to \u201cfit a man to perform justly, skillfully, and magnanimously all the offices, both private and public, of peace and war\u201d; and the other private, to \u201crepair the ruins of our first parents by regaining to know God aright, and out of that knowledge to love Him, to be like Him, as we may the nearest by possessing our soul of true virtue\u201d. Open problem: A problem that can be formally stated and for which a solution is known to exist but which has not yet been solved. It is common in graduate schools to point out open problems to students. Operant conditioning: (so named by psychologist B. F. Skinner) The modification of behavior brought about over time by the consequences of said behavior. Operant conditioning is distinguished from Pavlovian conditioning in that operant conditioning deals with voluntary behavior explained by its consequences, while Pavlovian conditioning deals with involuntary behavior triggered by its antecedents.%DIFDELCMD < %DIFDELCMD < %%% Participants on a ropes course. Outdoor education: (also known as adventure education) Usually refers to organized learning that takes place in the outdoors. Programs often involve residential or journey-based experiences in which students participate in a variety of adventurous challenges such as hiking, climbing, canoeing, ropes courses, and group games. Outdoor education programs draw upon the philosophy and theory of experiential education and may also focus on environmental education. Overlearning: A pedagogical concept according to which newly acquired skills should be practiced well beyond the point of initial mastery, leading to automaticity.%DIFDELCMD < %DIFDELCMD < %%% PParadigm shift: The term first used by Thomas Kuhn in his famous 1962 book The Structure of Scientific Revolutions to describe the process and result of a change in basic assumptions within the ruling theory of science. Don Tapscott was the first to use the term to describe information technology and business in his book of the same title. It has since become widely applied to many other realms of human experience as well. Peace education: The process of acquiring the knowledge and developing the attitudes, skills, and behaviour to live in harmony with oneself and with others. Peace education is based on a philosophy that teaches nonviolence, love, compassion, trust, fairness, cooperation, respect, and a reverence for the human family and all life on our planet. It is a social practice with shared values to which anyone can make a significant contribution. Pedagogy: The art or science of teaching. The word comes from the ancient Greek paidagogos, the slave who took little boys to and from school as part of paideia. The word \"paidia\" ( \u03c0\u03b1\u03b9\u03b4\u03b9\u03ac) refers to children, which is why some like to make the distinction between pedagogy (teaching children) and andragogy (teaching adults). The Latin word for pedagogy, education, is much more widely used, and often the two are used interchangeably. Leonardo da Vinci Personal development: (also known as self-development or personal growth) Comprises the development of the self. The term may also refer to: traditional concepts of education or training; counselling and coaching for personal transformation; New Age movement and spiritual beliefs%DIFDELCMD < & %%% concepts - including \"inner pathways\" to solve social and psychological issues; or professional development business trainers (some treat the whole person instead of business only). Philosophy of education: The study of the purpose, nature and ideal content of education. Other questions include the nature of the knowing mind and the human subject, problems of authority, the relationship between education and society, etc. At least since Rousseau's time, the philosophy of education has been linked to theories of developmental psychology and human development. Phonicetic: Of or relating to the enhancement of meaning through the use of phonemes. The added layers of meaning due to the intentional use of sounds within an existing phonetic structure. Educational/technical jargon. Physical education: (PE, also called physical training - PT or gym) A course in the curriculum which utilizes the learning medium of large-muscle activities in a play or movement exploration setting. It is almost always mandatory for students in elementary schools, and often for students in middle schools and high schools. Physics education: A relatively new, yet active, area of research within the science of physics. The main focus of research is on learning and teaching of physics in both the highschool and college level. Polymath: (also known as a polyhistor) A person who excels in multiple fields, particularly in both arts and sciences. The most common other term for this phenomenon is Renaissance man, but also in use are Homo universalis and Uomo Universale, which in Latin and Italian, respectively, translate as \"Universal Person\" or \"Universal Man\". Note that in Latin homo may be male or female; the Latin word for a male human being vir. Informally used in contemporary discussion, a polymath is someone known to be skillful or excel in a broad range of intellectual fields.%DIFDELCMD < %DIFDELCMD < %%% Post-graduate student receiving a degree. Postgraduate education: (or Quaternary education) The fourth-stage educational level, and follows the completion of an undergraduate degree at a college or university. Graduate school is an example of quaternary education; some consider masters-level degrees as part of tertiary education; some consider postdoctoral positions to be quaternary education while others consider them to be jobs. Post-secondary education: Any form of education that is taken after first attending a secondary school, such as a high school. The purpose of a post-secondary education can be to receive vocational education and training or to prepare for professions or scientific/academic careers through higher education. Predictive power: (of a scientific theory) Refers to its ability to generate testable predictions. Theories with strong predictive power are highly valued, because the predictions can often encourage the falsification of the theory. The concept of predictive power differs from explanatory or descriptive power (where phenomena that are already known are retrospectively explained by a given theory) in that it allows a prospective test of theoretical understanding. Preschool education: See Nursery school. Primary education: (or elementary education) Consists of the first years of formal, structured education that occurs during childhood. In most countries, it is compulsory for children to receive primary education (though in many jurisdictions it is permissible for parents to provide it). Primary education generally begins when children are four to seven years of age. The division between primary and secondary education is somewhat arbitrary, but it generally occurs at about twelve years of age (adolescence); some educational systems have separate middle schools for that period. Problem finding: Problem discovery. It is part of the larger problem process that includes problem shaping and problem solving. Problem finding requires intellectual vision and insight into what is missing. This involves the application of creativity. Problem shaping: Revising a question so that the solution process can begin or continue. It is part of the larger problem process that includes problem finding and problem solving. Problem shaping (or problem framing) often involves the application of critical thinking. Problem solving: Forms part of thinking. It occurs if an organism or an artificial intelligence system does not know how to proceed from a given state to a desired goal state. It is part of the larger problem process that includes problem finding and problem shaping. Problem-based learning: (PBL) A didactic concept of \"active learning\" in tertiary education, but is currently being adapted for use in K \u2013 12 education. The defining characteristics of PBL are: learning is driven by messy, open-ended problems; students work in small collaborative groups; and \"teachers\" are not required, the process uses \"facilitators\" of learning. Accordingly, students are encouraged to take responsibility for their group and organise and direct the learning process with support from a tutor or instructor. Advocates of PBL claim it can be used to enhance content knowledge and foster the development of communication, problem-solving, and self-directed learning skill. Procedural knowledge: (or know-how) The knowledge of how to perform some task. Know-how is different from other kinds of knowledge such as propositional knowledge in that it can be directly applied to a task. Procedural knowledge about solving problems differs from propositional knowledge about problem solving. For example, in some legal systems, this knowledge or know-how has been considered the intellectual property of a company, and can be transferred when that company is purchased. Professional certification: (trade certification, or professional designation often called simply certification or qualification) A designation earned by a person to certify that he is qualified to perform a job. Certification indicates that the individual has a specific knowledge, skills, or abilities in the view of the certifying body. Professional certifications are awarded by professional bodies and corporations. The difference between licensure and certification is licensure is required by law, whereas certification is generally voluntary. Sometimes the word certification is used for licensure. Programmed instruction: A field first studied extensively by the behaviorist B. F. Skinner. It consists of teaching through small lessons, where each lesson must be mastered in order to go on to the next. Students work through the programmed material by themselves at their own speed. After each step, they are presented with a question to test their comprehension, then are immediately shown the correct answer or given additional information. Propositional knowledge: (or declarative knowledge) Knowledge that some proposition is either true or false. This distinguishes propositional knowledge from know-how or procedural knowledge, which is the knowledge of how to perform some task. This article discusses propositional knowledge from a variety of perspectives, including philosophy, science, and history. What is the difference between knowledge and beliefs? A belief is an internal thought or memory which exists in one's mind. Most people accept that for a belief to be knowledge it must be, at least, true and justified. The Gettier problem in philosophy is the question of whether there are any other requirements before a belief can be accepted as knowledge. Public education: Schooling provided for the general public by the government, whether national or local, and paid for by taxes, which leads to it often being called state education. Schools provided under such a system are called public schools in many countries, but in England the term \"public school\" refers to an elite of privately funded independent schools which had their origins in medieval schools funded by charity to provide education for the poor. Public education often involves the following: public funding; compulsory student attendance; state certification of teachers and curricula; and testing and national standards. Public school: The term has different (and in some cases contradictory) meanings due to regional differences. Pygmalion effect: (or Rosenthal effect) refers to situations in which students perform better than other students simply because they are expected to do so.%DIFDELCMD < %DIFDELCMD < %%% Q Quiz: A form of game or puzzle in which the players (as individuals or in teams), attempt to answer questions correctly. A quiz usually is a form of student assessment, but often has fewer questions of lesser difficulty and requires less time for completion than a test.%DIFDELCMD < %DIFDELCMD < %%% RReading a book Reading (process) : The process of retrieving and comprehending some form of stored information or ideas. These ideas are usually some sort of representation of language, as symbols to be examined by sight, or by touch (for example Braille). Other types of reading may not be language-based, such as music notation or pictograms. By analogy, in computer science, reading is acquiring of data from some sort of computer storage. Reading disability: A condition in which a sufferer displays difficulty reading resulting primarily from neurological factors. Reading education in the USA: There are basically two different common methods of teaching reading. One usually refers to whole language approach (\"look say\"), the other usually refers to phonetics approach. The tension between these two approaches is often referred to as \"the great debate\". Reason: A term used in philosophy and other human sciences to refer to the higher cognitive faculties of the human mind. It describes a type of thought or aspect of thought, especially abstract thought, and the ability to think abstractly, which is felt to be especially human. The concept of reason is connected to language, as reflected in the meanings of the Greek word \"logos\", later to be translated by Latin \"ratio\" and then French \"raison\", from which the English word. Reason is thus a very important word in western intellectual history and shares much of its heritage with the now separate words logic and rationality. Reasoning: Defined very differently depending on the context of the understanding of reason as a form of knowledge. The Logical definition is the act of using reason, to derive a conclusion from certain premises, using a given methodology; and the two most commonly used explicit methods to reach a conclusion are deductive reasoning and inductive reasoning. However, within idealist philosophical contexts, reasoning is the mental process which informs our imagination, perceptions, thoughts, and feelings with whatever intelligibility these appear to contain; and thus links our experience with universal meaning. The specifics of the methods of reasoning are of interest to such disciplines as philosophy, logic, psychology, and artificial intelligence. Recitation: A discussion carried by a Teaching assistant to supplement a lecture given by a senior faculty at an academic institution. During the recitation, TAs will review the lecture, expand on the concepts, and carry a discussion with the students. Reference: Something that refers or points to something else, or acts as a connection or a link between two things. The objects it links may be concrete, such as books or locations, or abstract, such as data, thoughts, or memories. The object which is named by a reference, or to which the reference points, is the referent. Reinforcement: In operant conditioning, reinforcement is any change in an organism's surroundings that: occurs regularly when the organism behaves in a given way (that is, is contingent on a specific response); and is associated with an increase in the probability that the response will be made or in another measure of its strength. Religious education: Teaches the doctrines of a religion. Its usual purpose is to teach children the basics of a religion. A less common purpose is to teach new adherents of a religion. Since people within a given country often hold varying religious and non-religious beliefs, government-sponsored religious education can be a source of conflict. Countries vary widely in whether religious education is allowed in government-run schools (often called \"public schools\"). Those that allow it also vary in the type of education provided. Research: Often described as an active, diligent, and systematic process of inquiry aimed at discovering, interpreting and revising facts. This intellectual investigation produces a greater understanding of events, behaviors, or theories, and makes practical applications through laws and theories. The term research is also used to describe a collection of information about a particular subject, and is usually associated with science and the scientific method.%DIFDELCMD < %DIFDELCMD < %%% Rhodes House in Oxford Rhodes Scholarships: Created by Cecil Rhodes and have been awarded to applicants annually since 1902 by the Oxford-based Rhodes Trust on the basis of academic qualities, as well as those of character. They provide the successful candidate with two years of study at the University of Oxford in England, possibly extended for a third year. When Rhodes died in 1902, his will stipulated that the greater part of his fortune was to go toward the establishment of a scholarship fund to reward applicants who exhibited worthy qualities of intellect, character, and physical ability. Rote learning: A learning technique which avoids grasping the inner complexities and inferences of the subject that is being learned and instead focuses on memorizing the material so that it can be recalled by the learner exactly the way it was read or heard. Rubric (academic): In education, a rubric is a set of criteria and standards linked to learning objectives that is used to assess a student's performance, such as on a paper, project, or essay.%DIFDELCMD < %DIFDELCMD < %%% S%DIFDELCMD < %DIFDELCMD < %%% Sail training: From its modern interpretations to its antecedents when maritime nations would send young naval officer candidates to sea (e.g., see Outward Bound) , sail training provides an unconventional and effective way of building many useful skills on and off the water. Through the unique environment of the sea, contemporary sail trainees learn that what they are doing is important and that their efforts are essential to the operation and safety of the ship. School: A place designated for learning. The range of institutions covered by the term varies from country to country. School bus:, A bus used to transport children and adolescents to and from school. The first school bus was horse-drawn, introduced in 1827 by George Shillibeer for a Quaker school at Abney Park in Stoke Newington, London, and was designed to carry twenty-five children. Since then, school buses of many types have become widespread, and motorised, and are used in all parts of the world. School counselor: A practitioner who meets the needs of students in three basic educational domains: academic development, career development, and personal/social development. This is accomplished through the implementation of a comprehensive school counseling program that promotes and enhances student achievement through a guidance curriculum, individual planning strategies, responsive services and comprehensive school counseling program support/advocacy. School discipline: A form of discipline found in schools. The term refers to students complying with a code of behaviour often known as the school rules. Among other things these rules may set out the expected standards of clothing, timekeeping, social behaviour and work ethic. The term may also be applied to the punishment that is the consequence of transgression of the code of behaviour. For this reason the usage of school discipline sometimes means punishment for breaking school rules rather than behaving within the school rules. School psychologist: A practitioner who applies his psychological training to assess and help school children. Science education : The field concerned with sharing science content and process with individuals not traditionally considered part of the scientific community. The target individuals may be children, college students, or adults within the general public. The field of science education comprises science content, some sociology, and some teaching pedagogy. Science fair: Generally a competition where contestants create a project related to science or some scientific phenomenon. Science fairs usually are involved with children and schooling; however, the term can be used to describe science fairs independent of the age of the contestants involved. They are often also combined with competition in mathematics or history. Secondary education: is a period of education which, in most contemporary educational systems of the world, follows directly after primary education, and which may be followed by tertiary, \"post-secondary\", or \"higher\" education (e.g., university). In Australia and other countries secondary schools is the official term for institutions offering this period of education. In other parts of the English-speaking world, secondary school is often used synonymously with secondary education. Self-concept: (or self-identity) The mental and conceptual awareness and persistent regard that sentient beings hold with regard their own being. Components of a being's self-concept include physical, psychological, and social attributes; and can be influenced by its attitudes, habits, beliefs and ideas. These components and attributes can each be condensed to the general concepts of self-image and the self-esteem. Self-efficacy: The belief that one has the capabilities to execute the courses of actions required to manage prospective situations. Unlike efficacy, which is the power to produce an effect (in essence, competence), self-efficacy is the belief (however accurate) that one has the power to produce that effect. It is important here to understand the distinction between self-esteem and self efficacy. Self-esteem relates to a person\u2019s sense of self-worth, whereas self efficacy relates to a person\u2019s perception of their ability to reach a goal. For example, say a person is a terrible rock climber. They would likely have a poor efficacy in regard to rock climbing, but this wouldn\u2019t need to affect their self-esteem; most people don\u2019t invest much of their self-esteem in this activity.%DIFDELCMD < %DIFDELCMD < %%% Self-esteem: (or self-worth) Includes a person's subjective appraisal of himself or herself as intrinsically positive or negative to some degree. Service learning: A method of teaching, learning and reflecting that combines academic classroom curriculum with meaningful youth service throughout the community. As a teaching methodology, it falls under the category of experiential education. More specifically, it integrates meaningful community service with instruction and reflection to enrich the learning experience, teach civic responsibility, encourage lifelong civic engagement, and strengthen communities. Sex education: Education about sexual reproduction in human beings, sexual intercourse and other aspects of human sexual behavior. Situated learning: Education that takes place in a setting functionally identical to that where the learning will be applied. Skill: An ability, usually learned, to perform actions. Social constructionism: A sociological theory of knowledge developed by Peter L. Berger and Thomas Luckmann with their 1966 book, The Social Construction of Reality. The focus of social constructionism is to uncover the ways in which individuals and groups participate in the creation of their perceived reality. As an approach, it involves looking at the ways social phenomena are created, institutionalized, and made into tradition by humans. Socially constructed reality is seen as an ongoing, dynamic process; reality is re-produced by people acting on their interpretations and their knowledge of it. Sociology of knowledge: The study of the social origins of ideas, and of the effects prevailing ideas have on societies. (Compare history of ideas.) Sociology of scientific knowledge: (SSK) Closely related to the sociology of science, considers social influences on science. Practitioners (sociologists, philosophers of science, historians of science, anthropologists and computer scientists) have engaged in controversy concerning the role that social factors play in scientific development relative to rational, empirical and other factors. Socratic method: (or method of elenchos or Socratic debate) A dialectic method of inquiry, largely applied to the examination of key moral concepts and first described by Plato in the Socratic Dialogues. For this, Socrates is customarily regarded as the father and fountainhead for ethics or moral philosophy. It is a form of philosophical enquiry. It involves two or more speakers, usually with one as the master (or wise one) and the others as students or fools. The method is credited to Socrates, who began to engage in such discussion with his fellow Athenians after a visit to the Oracle of Delphi.%DIFDELCMD < %DIFDELCMD < %%% Special education:, describes an educational alternative that focuses on the teaching of students with academic, behaviorial, health, or physical needs that cannot sufficiently be met using traditional educational programs or techniques. Sphere of knowledge: A unified body or collection of knowledge regarding a specific subject, interest or otherwise area of expertise possessed by an individual. STEM fields: The Science, Technology, Engineering, and Mathematics (STEM) fields are collectively considered core technological underpinnings of an advanced society. In many forums (including political/governmental and academic) the strength of the STEM workforce is viewed as an indicator of a nation's ability to sustain itself. Maintaining healthy levels of its citizenry well versed in the STEM fields is a key portion of the public education agenda of the United States of America at all levels, and substantial lobbying is underway in Washington, DC to raise awareness of STEM education issues. Stipend: A form of payment or salary, such as for an internship or apprenticeship. Stipends are usually lower than what would be expected as a permanent salary for similar work. This is because the stipend is complemented by other benefits such as instruction, work experience, food, accommodation, and personal satisfaction. Universities usually refer to monies paid to graduate research assistants as a stipend, rather than as wages, to reflect complementary benefits. Student: Etymologically derived through Middle English from the Latin second-type conjugation verb \"st\u016dd\u0113r\u0115\", which means \"to direct one's zeal at\"; hence a student is one who directs zeal at a subject. Also known as a disciple in the sense of a religious area of study, and/or in the sense of a \"discipline\" of learning. In widest use, student is used to mean a school or class attendee. In many countries, the word student is however reserved for higher education or university students; persons attending classes in primary or secondary schools being called pupils. Student activism: A form of youth-led community organizing that is specifically oriented towards engaging students as activists in order to create change in the educational system. Student-centered learning: An approach to education focusing on the needs of the students, rather than those of others involved in the educational process, such as teachers and administrators. This approach has many implications for the design of curriculum, course content, and interactivity of courses. Student voice: the distinct perspectives and actions of young people throughout schools focused on education itself. Student loans: Loans offered to students to assist in payment of the costs of professional education. These loans usually carry lower interests than other loans, and are usually issued by the government. Student organization: A voluntary association of students at institutions of secondary and higher education for a specific legal purpose. Such organizations are often sponsored through and receive funding from a student government. Syllabus: (plural syllabi or syllabuses) A document with an outline and summary of topics to be covered in a course. It is often either set out by an exam board, or prepared by the professor who teaches the course, and is usually given to each student during the first class session. Synthesis: (from the ancient Greek \u03c3\u03cd\u03bd (with) and \u03b8\u03b5\u03c3\u03b9\u03c2 (placing), is commonly understood to be an integration of two or more pre-existing elements which results in a new creation.%DIFDELCMD < ]] %DIFDELCMD < %DIFDELCMD < %%% T%DIFDELCMD < %DIFDELCMD < %%% Taxonomy of Educational Objectives: An educational taxonomy that classifies educational objectives into three domains: cognitive, affective, and psychomotor. Teacher: In education, one who teaches students or pupils, often a course of study, lesson plan, or a practical skill, including learning and thinking skills. There are many different ways to teach and help students learn. This is often referred to as the teacher's pedagogy. When deciding what teaching method to use, a teacher will need to consider students' background knowledge, environment, and their learning goals as well as standardized curriculum as determined by their school district. Technology education: The study of the human ability to create and use tools to shape the natural environment to meet their needs. The goal of technology education is to spread technological literacy which is accomplished by bringing laboratory activities to students. The term \"technology education\" is frequently shortened to \"tech ed\". Technology Integration: A term used by educators to describe effective uses of technology by teachers and students in K-12 and university classrooms. Teachers use technology to support instruction in language arts, social studies, science, math, or other content areas. When teachers integrate technology into their classroom practice, learners are empowered to be actively engaged in their learning. Tertiary education: (also referred to as third-stage or third level education) The educational level following the completion of a school providing a secondary education such as a high school, secondary school, or gymnasium. Tertiary education is commonly higher education which prepares students for a quaternary education. Colleges and universities are examples of institutions that provide tertiary education. The term Tertiary education can also be used to refer to vocational education and training.%DIFDELCMD < %DIFDELCMD < %%% Textbook: A manual of instruction or a standard book in any branch of study. They are classified by both the target audience and the subject. Textbooks are usually published by specialty printers to serve every request for an understanding of every subject that can be taught. It is a big business that requires mass volume sales to make the publications profitable. Although most textbooks are only published in printed format with hard covers, some can now be viewed online. Theory of cognitive development: A developmental psychology theory developed by Jean Piaget to explain cognitive development. The theory is central to child psychology and is based on schemata\u2014schemes of how one perceives the world\u2014in \"critical periods,\" times when children are particularly susceptible to certain information. Theory of multiple intelligences: A psychological and educational theory formulated by Howard Gardner espousing that eight kinds of \"intelligence\" exist in humans, each relating to a different sphere of human life and activity. The Times Higher Education Supplement:, (also known as The Times Higher or The THES'') A newspaper based in London that reports specifically on issues related to higher education. It is owned by TSL Education, which was, until October 2005, a division of News International. The paper is edited by John O'Leary, author of The Times Good University Guide. The THES is probably best known for publishing The Times Higher World University Rankings (see college and university rankings), which first appeared in November 2004, with new rankings published annually. Training: Refers to the acquisition of knowledge, skills, attitudes as a result of the teaching of vocational or practical skills and knowledge and relates to specific useful skills. It forms the core of apprenticeships and provides the backbone of content at technical colleges or polytechnics. Today it is often referred to as professional development. Truth: When someone sincerely agrees with an assertion, he or she is claiming that it is the truth. Philosophy seeks answers for certain questions about truth and the word truth. Tuition: Instruction, teaching or a fee charged for educational instruction especially at a formal institution of learning. Tuition is charged by educational institutions to assist with funding of staff and faculty, course offerings, lab equipment, computer systems, libraries, facility upkeeping, and to provide a comfortable learning experience for its students.%DIFDELCMD < %DIFDELCMD < %%% U%DIFDELCMD < %DIFDELCMD < %%% Understanding: A psychological process related to an abstract or physical object, such as, person, situation and message whereby one is able to think about it and use concepts to deal adequately with that object. UNESCO: The United Nations Educational, Scientific and Cultural Organization, commonly known as UNESCO, is a specialized agency of the United Nations established in 1945. Its purpose is to contribute to peace and security by promoting international collaboration through education, science, and culture in order to further universal respect for justice, the rule of law, and the human rights and fundamental freedoms proclaimed in the UN Charter. Universal preschool: The notion that access to preschool should be available to families similar to Kindergarten. Child advocates have different definitions of the definition of who is included and how it is to be funded. There has been a move to change the name to Preschool for All. Like Kindergarten, the concept is to have a voluntary program, unlike education, that is mandated by law in the United States with exceptions to allow for homeschooling and alternative education. Unobservables: Entities whose existence, nature, properties, qualities or relations are not observable. In the philosophy of science typical examples of \"unobservables\" are atomic particles, the force of gravity, causation and beliefs or desires. However, philosophers also characterize all objects\u2014trees, tables, other minds, microbiological things and so on to which humans ascribe as the thing causing their perception\u2014as unobservable.%DIFDELCMD < %DIFDELCMD < %%% V%DIFDELCMD < %DIFDELCMD < %%% A blacksmith is a traditional trade. Virtual learning environment: (VLE) A software system designed to facilitate teachers in the management of educational courses for their students, especially by helping teachers and learners with course administration. The system can often track the learners' progress, which can be monitored by both teachers and learners. While often thought of as primarily tools for distance education, they are most often used to supplement the face-to-face classroom. Visual learning: A proven teaching method in which graphic organizers, such as webs, concept maps idea maps, and slide shows are used to help students of all ages think and learn more effectively. Vocational education: (or Vocational Education and Training (VET)) Prepares learners for careers or professions that are traditionally non-academic and directly related to a specific trade, occupation or vocation, hence the term, in which the learner participates. It is sometimes referred to as technical education, as the learner directly specialises in a particular narrow technique of using technology.%DIFDELCMD < %DIFDELCMD < %%% W%DIFDELCMD < %DIFDELCMD < %%% Waldorf education Waldorf education (also known as Steiner education) is a humanistic approach to pedagogy based on the educational philosophy of the Austrian philosopher Rudolf Steiner, the founder of anthroposophy. Learning is interdisciplinary, integrating practical, artistic, and conceptual elements. The approach emphasizes the role of the imagination in learning, developing thinking that includes a creative as well as an analytic component. Whole language: A term used by reading teachers to describe an instructional philosophy which focuses on reading as an activity best taught in a broader context of meaning. Rather than focusing on reading as a mechanical skill, it is taught as an ongoing part of every student's existing language and life experience. Building on language skills each student already possesses, reading and writing are seen as a part of a broader \"whole language\" spectrum. Wisdom: The ability to make correct judgments and decisions. It is an intangible quality gained through experience some think. Yet others think it is a quality that even a child, otherwise immature, may possess independent of experience or complete knowledge. Whether or not something is wise is determined in a pragmatic sense by its popularity, how long it has been around, and its ability to predict against future events. Wisdom is also accepted from cultural, philosophical and religious sources. Some think of wisdom as foreseeing consequences and acting to maximize beneficial results. Writing: May refer to two activities: the inscribing of characters on a medium, with the intention of forming words and other constructs that represent language or record information, and the creation of material to be conveyed through written language. (There are some exceptions; for example, the use of a typewriter to record language is generally called typing, rather than writing.) Writing refers to both activities equally, and both activities may often occur simultaneously. Workshop:''' A brief intensive course, a seminar or a series of meetings emphasizing interaction and exchange of information among a usually small number of participants..%DIFDELCMD < %DIFDELCMD < %%% X xylophone. a musical instrument%DIFDELCMD < %DIFDELCMD < %%% ZZero tolerance policy. A policy that states that prohibited behaviors and actions will not be tolerated\u2014no exceptions.", "after_revision": " %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < }}%%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% The follow articles comprise the Glossary of education-related %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < & %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% terms: Glossary of education terms ( %DIFDELCMD < & %%% %DIFDELCMD < %DIFDELCMD < %%% A\u2013C) Glossary of education terms (D \u2013 %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < ]] %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% F) Glossary of education terms (G\u2013L) Glossary of education terms (M\u2013O) Glossary of education terms (P\u2013R) Glossary of education terms (S) Glossary of education terms (T\u2013Z", "edit_actions": [{"type": "D", "before": "0-9 .edu \"dot-edu\" The generic top-level domain for educational institutions, primarily those in the United States. Created in January 1985 as one of the first top-level domains, .edu was originally intended for educational institutions anywhere in the world. With few exceptions, however, only those in the United States registered such domains, while educational institutions in other countries usually used domain names under the appropriate country code TLD.", "after": null, "start_char_pos": 0, "end_char_pos": 462}, {"type": "D", "before": "A Plato, seen with Aristotle, is credited with the inception of academia. Academia A collective term for the scientific and cultural community engaged in higher education and research, taken as a whole. The word comes from the akademeia just outside ancient Athens, where the gymnasium was made famous by Plato as a center of learning. Academic degree A degree is any of a wide range of status levels conferred by institutions of higher education, such as universities, normally as the result of successfully completing a program of study. Academic dress Traditional clothing worn specifically in academic settings. It is more commonly seen nowadays only at graduation ceremonies, but in former times academic dress was, and to a lesser extent in many ancient universities still is, worn on a daily basis. Academic institution An educational institution dedicated to higher education and research, which grants academic degrees. Academic publishing Describes a system of publishing that is necessary in order for academic scholars to review work and make it available for a wider audience. The \"system,\" which is probably disorganized enough not to merit the title, varies widely by field, and is also always changing, if often slowly. Most academic work is published in journal article or book form. Active learning A process whereby learners are actively engaged in the learning process, rather than \"passively\" absorbing lectures. Active learning involves reading, writing, discussion, and engagement in solving problems, analysis, synthesis, and evaluation. Active learning often involves cooperative learning. Activity theory (AT) A Soviet psychological meta-theory, paradigm, or framework, with its roots in socio-cultural approach. Its founders were Alexei Nikolaevich Leontyev, and S. L. Rubinshtein (1889\u20131960). It became one of the major psychological approaches in the former USSR, being widely used in both theoretical and applied psychology, in areas such as the education, training, ergonomics, and work psychology. Additional Support Needs In Scotland, children who require some additional support to remove barriers to learning in any respect are deemed to have Additional Support Needs. This definition abolished the previously used term Special Educational Needs and was set out in the 2004 Additional Support for Learning Act. Adult education The practice of teaching and educating adults. This is often done in the workplace, or through 'extension' or 'continuing education' courses at secondary schools, or at a College or University. The practice is also often referred to as 'Training and Development'. It has also been referred to as andragogy (to distinguish it from pedagogy). Educating adults differs from educating children in several ways. One of the most important differences is that adults have accumulated knowledge and experience which can either add value to a learning experience or hinder it. Adultism A predisposition towards adults, which some see as biased against children, youth, and all young people who aren't addressed or viewed as adults. Adultism is popularly used to describe any discrimination against young people, and is distinguished from ageism, which is simply prejudice on the grounds of age; not specifically against youth. Advanced Placement Program A United States and Canada-based program that offers high school students the opportunity to receive university credit for their work during high school. Agricultural education Instruction about crop production, livestock management, soil and water conservation, and various other aspects of agriculture. Agricultural education includes instruction in food education, such as nutrition. Agricultural and food education improves the quality of life for all people by helping farmers increase production, conserve resources, and provide nutritious foods. Aims and objectives An aim expresses the purpose of the educational unit or course whereas an objective is a statement of a goal which successful participants are expected demonstrably to achieve before the course or unit completes. Alternative education Describes a number of approaches to teaching and learning other than traditional publicly- or privately-run schools. These approaches can be applied to all students of all ages, from infancy to adulthood, and all levels of education. Analysis The action of taking something apart in order to study it. Andragogy A theory of adult education proposed by the American educator Malcolm Knowles (April 24, 1913\u2014November 27, 1997). Knowles held that andragogy (from the Greek words meaning \"man-leading\") should be distinguished from the more commonly taught pedagogy (Greek: \"child-leading\"). Anti-bias curriculum An active/activist approach in education that challenges interlocking systems of oppression such as racism, sexism, ableism/disablism, ageism, homophobia, and all the other -isms. The objective of this approach to teaching is to eliminate bias found in various institutions. This approach attempts to provide children with a solid understanding of social problems and issues while equipping them with strategies to combat bias and improve social conditions for all. The anti-bias curriculum serves as a catalyst in the critical analysis of various social conditions. It is implemented as a proactive means to eradicate various forms of social oppression with the ultimate goal of social justice in mind. Applied academics An approach to learning and teaching that focuses on how academic subjects (communications, mathematics, science, and basic literacy) can apply to the real world. Further, applied academics can be viewed as theoretical knowledge supporting practical applications. Apprenticeship A traditional method, still popular in some countries, of training a new generation of skilled crafts practitioners. Apprentices (or in early modern usage \"prentices\") built their careers from apprenticeships. Art education The area of learning that is based upon the visual arts\u2014drawing, painting, sculpture, and design in such fine crafts of jewelry, pottery, weaving, fabrics, etc., and design applied to more practical fields such as commercial graphics and home furnishings. The term \"arts education\" implies many things, but it is defined as: Instruction and programming in all arts disciplines\u2014including but not limited to dance, music, visual art, theater, creative writing, media arts, history, criticism, and aesthetics. \"Arts education\" encompasses all the visual and performing arts delivered in a standards-based, sequential approach by a qualified instructor as part of the core curriculum. The most common courses provided in schools include Art (visual art), Band, Drama, and Choir. Assessment The process of documenting, usually in measurable terms , knowledge, skills, attitudes and beliefs. Asynchronous learning A teaching method using the asynchronous delivery of training materials or content using computer network technology. It is an approach to providing technology-based training that incorporates learner-centric models of instruction. The asynchronous format has been in existence for quite some time; however, new research and strategies suggest that this approach can enable learners to increase knowledge and skills through self-paced and self-directed modules completed when the learner is prepared and motivated to learn. Autodidacticism autodidactism Self-education or self-directed learning. An autodidact, also known as an automath, is a mostly self-taught person - typically someone who has an enthusiasm for self-education and a high degree of self-motivation.", "after": null, "start_char_pos": 463, "end_char_pos": 8087}, {"type": "D", "before": "B Behaviorism", "after": null, "start_char_pos": 8117, "end_char_pos": 8130}, {"type": "D", "before": "nobold|(or Rakesh, not to be confused with behavioralism in political science)", "after": null, "start_char_pos": 8131, "end_char_pos": 8209}, {"type": "D", "before": ": An approach to psychology based on the proposition that behavior can be researched scientifically without recourse to inner mental states. It is a form of materialism, denying any independent significance for the mind. One of the assumptions of many behaviorists is that free will is illusory, and that all behaviour is determined by a combination of forces both genetic factors and the environment, either through association or reinforcement. Belief Aconviction to the truth of a proposition. Beliefs can be acquired through perception, contemplation or communication. In the psychological sense, belief is a representational mental state that takes the form of a propositional attitude. Knowledge is often defined as justified true belief, in that the belief must be considered to correspond to reality and must be derived from valid evidence and arguments. However, this definition has been challenged by the Gettier problem which suggests that justified true belief does not provide a complete picture of knowledge. Bias in education A real or perceived bias in the educational system. Bilingual education Has multiple definitions: education where two distinct languages are used for general teaching; education designed to help children become bilingual (sometimes called \"two-way bilingual education\"; e.g., Spanish speakers and English speakers in a classroom are all taught to speak both languages; education in a child's native language for (a) the first year or (b) however long it takes; followed by mainstreaming in English-only classes (in the US); education in a child's native language for as long as his parents wish (with minimal instruction in another language). In the latter cases \"native-language instruction\" may be a clearer definition. Biliteracy The state of being literate in two or more languages. To be biliterate has a stronger and more specified connotation than the claim of being simply bilingual. This is because with the change of the term from 'lingual' to 'literate' and the concept of reading and writing, which are in addition to simply speaking. In bilingualism the extent of fluency in each language is in question. One can be anywhere on the spectrum from comfortable oral communication in certain social contexts to fluency in speaking, reading and writing. With the term biliteracy, however, it is understood that fluency in both reading and writing are present. Blended learning Learning in a combination of modes. Often used more specifically to refer to courses which use a combination of traditional face-to-face teaching and distance learning techniques on-line. Blogish Interactive and personal communication as opposed to traditional narrative text. Boarding school A school where some or all students not only study but also live, amongst their peers but away from their home and family. The word 'boarding' is used in the sense of a 'boarding house', lodgings which provide both bed and board, that is meals as well as a room. Most famous UK public schools are boarding schools for ages 13 to 18, either single-sex or coeducational. There are any number of different types of boarding schools, for pupils of all school ages from boarding nursery or Kindergarten schools, to senior schools. Boarding prep schools for the age group 9 to 12 are becoming less usual in the UK, but many adolescents like to get away from home. Brainstorming An organized approach for producing ideas by letting the mind think without interruption. The term was coined by Alex Osborn. Brainstorming can be done either individually or in a group; in group brainstorming sessions, the participants are encouraged, and often expected, to share their ideas with one another as soon as they are generated. The key to brainstorming is not to interrupt the thought process. As ideas come to the mind, they are captured and stimulate the development of better ideas. Brainstorming is used for enhancing creativity in order to generate a broad selection of ideas in leading to a unique and improved concept. Brainwashing thought reform The application of coercive techniques to change the beliefs or behavior of one or more people for political purposes. Whether any techniques at all exist that will actually work to change thought and behavior to the degree that the term \"brainwashing\" connotes is a controversial and at times hotly debated question. Bridge program This is a higher education program specifically designed to assist a student with an attained initial educational level (or an initial level of professional licensure) to attend college courses and achieve a terminal degree (or a higher level of professional licensure) in the same field of study and in less time than an entry-level student would require. Bridge programs are most notable among healthcare professions.Brown v. Board of Education of Topeka: 347 U.S. 483 (1954) A landmark case of the United States Supreme Court which explicitly outlawed de jure racial segregation of public education facilities (legal establishment of separate government-run schools for blacks and whites), ruling so on the grounds that the doctrine of \"separate but equal\" public education could never truly provide black Americans with facilities of the same standards available to white Americans. A companion case dealt with the constitutionality of segregation in the District of Columbia, (not a state and therefore not subject to the Fourteenth Amendment), Bolling v. Sharpe, . Bully An individual, thought to be emotionally dysfunctional, who torments others through verbal harassment, physical assault, or other more subtle methods of coercion.", "after": null, "start_char_pos": 8228, "end_char_pos": 13859}, {"type": "D", "before": "C", "after": null, "start_char_pos": 13860, "end_char_pos": 13861}, {"type": "D", "before": "Campus novel A novel whose main action is set in and around the campus of a university. The genre, dating back to the late 1940s, is popular because it allows the author to show the quirks of human nature, and reactions to pressure (for exams etc.) within a controlled environment or to describe the reaction of a fixed socio-cultural perspective (the academic staff) to new social attitudes (the new student intake). Chemistry education An active area of research within both the disciplines of chemistry and education. The main focus of research is on learning and teaching of chemistry in schools, colleges and universities. The practice of chemical education is teaching chemistry to students and the training of teachers to teach chemistry. The research aspect deals with how to teach and how to improve learning outcomes. Child A young human. Depending on context it may mean someone who is not yet an adult, or someone who has not yet reached puberty (someone who is prepubescent). Child is also a counterpart of parent: adults are the children of their parents despite their maturation beyond infancy; for example \"Benjamin, aged 46, is the child of Tobias, aged 73\". Classical conditioning Pavlovian conditioning respondent conditioning A type of associative learning. These associations are formed by pairing two stimuli\u2014what Ivan Pavlov described as the learning of conditioned behavior\u2014to condition an animal to give a certain response. The simplest form of classical conditioning is reminiscent of what Aristotle would have called the law of contiguity which states that: \"When two things commonly occur together, the appearance of one will bring the other to mind.\" Classical education May refer to the education of antiquity and the Middle Ages, or the education of later periods based on Classics and Western culture, or the completely different Chinese tradition of education, based in large part on Confucian and Taoist traditions. Classroom management A term used by many teachers to describe the process of ensuring lessons run smoothly without disruptive behaviour by students. It is possibly the most difficult aspect of teaching for many teachers and indeed experiencing problems in this area causes many people to leave teaching altogether. It is closely linked to issues of motivation, discipline and respect. Coaching A coach is a person who teaches and directs another person via encouragement and advice. This use of the term \"coaching\" appears to have origins in English traditional university \"cramming\" in the mid-19th century. (The name allegedly recalls the multitasking skills associated with controlling the team of a horse-drawn stagecoach.) By the 1880s American college sports teams had\u2014in addition to managers -- coaches. Some time in the 20th century, non-sporting coaches emerged: non-experts in the specific technical skills of their clients, but who nevertheless ventured to offer generalised motivational or inspirational advice. Coeducation The integrated education of men and women at the same school facilities; co-ed is a shortened adjectival form of co-educational. Before the 1960s, many private institutions of higher education restricted their enrollment to a single sex. Indeed, most institutions of higher education\u2014regardless of being public or private\u2014restricted their enrollment to a single sex at some point in their history. \"Coed\" is an informal (and increasingly archaic) term for a female student attending such a college or university. Cognitive maps A type of mental processing, or cognition, composed of a series of psychological transformations by which an individual can acquire, code, store, recall, and decode information about the relative locations and attributes of phenomena in their everyday or metaphorical spatial environment. Here, 'cognition' can be used to refer to the mental models, or belief systems, that people use to perceive, contextualize, simplify, and make sense of otherwise complex problems. As they have been studied in various fields of science, these mental models are often referred to, variously, as cognitive maps, scripts, schemata, and frames of reference. Cognitive relativism A philosophy that claims the truth or falsity of a statement is relative to a social group. Collaborative learning An umbrella term for a variety of approaches in education that involve joint intellectual effort by students or students and teachers. Groups of students work together in searching for understanding, meaning or solutions or in creating a product. The approach is closely related to cooperative learning, but is considered to be more radical because of its reliance on youth voice. Collaborative learning activities can include collaborative writing, group projects, and other activities. College athletics Refers to a set of physical activities comprising sports and games put into place by institutions of tertiary education (colleges in American English). In the United States, college athletics is overseen by the National Collegiate Athletic Association and by the National Association of Intercollegiate Athletics. College athletics has a high profile in the United States, and to a lesser extent in Canada, where it is known as interuniversity sport. In the most of the rest of the world the equivalent level of competition is only followed by the competitors and their close friends and families. Common sense What people in common would agree; that which they \"sense\" in common as their common natural understanding. Some use the phrase to refer to beliefs or propositions that in their opinion they consider would in most people's experience be prudent and of sound judgment, without dependence upon esoteric knowledge or study or research, but based upon what is believed to be knowledge held by people \"in common\". The knowledge and experience most people have, or are believed to have by the person using the term. Community of practice Refers to the process of social learning that occurs when people who have a common interest in some subject or problem collaborate over an extended period to share ideas, find solutions, and build innovations. Comparative education Seeks to throw light on education in one country (or group of countries) by using data and insights drawn from the practises and situation in another country, or countries. Computer Based Learning Refers to the use of computers as a key component of the educational environment. While this can refer to the use of computers in a classroom, the term more broadly refers to a structured environment in which computers are used for teaching purposes. The concept is generally seen as being distinct from the use of computers in ways where learning is at least a peripheral element of the experience (e.g. computer games and web browsing).150px|A concept map Concept mapping A technique for visualizing the relationships between different concepts. A concept map is a diagram showing the relationships between concepts. Concepts are connected with labelled arrows, in a downward-branching hierarchical structure. The relationship between concepts is articulated in linking phrases, e.g., \"gives rise to\", \"results in\", \"is required by,\" or \"contributes to\". Concept mapping serves several purposes. One, which takes place via knowledge elicitation, is to represent the mental models, i.e., the cognitive map of individuals, teams and organizations. Another, which takes place by knowledge capture, is to represent the structure of knowledge gleaned from written documents. The addition of knowledge resources, e.g., diagrams, reports, other concept maps, spreadsheets, etc., to the concept nodes (attached during or after construction) has been found to significantly improve the level of meaningful learning of the concept mapper. Educators are increasingly realising the utility of such maps and have started using them in classroom. Constructivism A set of assumptions about the nature of human learning that guide constructivist learning theories and teaching methods. Constructivism values developmentally appropriate, teacher-supported learning that is initiated and directed by the student. Constructivist epistemology A recent development in philosophy which criticizes essentialism, whether it is in the form of medieval realism, classical rationalism, or empiricism. It originated in sociology under the term social constructionism and has been given the name constructivism when referring to philosophical epistemology, though constructionism and constructivism are often used interchangeably. Constructivism views all of our knowledge as \"constructed,\" because it does not reflect any external \"transcendent\" realities; it is contingent on convention, human perception, and social experience. It is believed by constructivists that representations of physical and biological reality, including race, sexuality, and gender are socially constructed (Hegel, Garns, and Marx were among the first to suggest such an ambitious expansion of social determinism). The common thread between all forms of constructivism is that they do not focus on an ontological reality, but instead on the constructed reality. Cooperative education A structured method of combining academic education with practical work experience. Research indicates that one of the attributes employers value most in newly hired employees is work experience. A cooperative education experience, commonly known as a \"co-op\", provides academic credit for career work. Cooperative education is taking on new importance in school-to-work transition, service learning, and experiential learning initiatives. Cooperative learning Proposed in response to traditional curriculum-driven education. In cooperative learning environments, students interact in purposely structured heterogeneous group to support the learning of one self and others in the same group. Course in the United States, a unit of instruction in one subject, lasting one academic term Course of study in the British Commonwealth, a programme of education leading to a degree or diploma Creativity A human mental phenomenon based around the deployment of mental skills and/or conceptual tools, which, in turn, originate and develop innovation, inspiration, or insight. Creativity techniques Heuristic methods to facilitate creativity in a person or a group of people. Generally, most creativity techniques use associations between the goal (or the problem), the current state (which may be an imperfect solution to the problem), and some stimulus (possibly selected randomly). There is an analogy between many creativity techniques and methods of evolutionary computation. Critical pedagogy A teaching approach which attempts to help students question and challenge domination, and the beliefs and practices that dominate. In other words, it is a theory and practice of helping students achieve critical consciousness. In this tradition the teacher works to lead students to question ideologies and practices considered oppressive (including those at school), and encourage liberatory collective and individual responses to the actual conditions of their own lives. Critical thinking Consists of a mental process of analyzing or evaluating information, particularly statements or propositions that people have offered as true. It forms a process of reflecting upon the meaning of statements, examining the offered evidence and reasoning, and forming judgments about the facts. Critical thinkers can gather such information from observation, experience, reasoning, and/or communication. Critical thinking has its basis in intellectual values that go beyond subject-matter divisions and which include: clarity, accuracy, precision, evidence, thoroughness and fairness. Cultural learning The way a group of people within a society or culture tend to learn and pass on new information. Learning styles are greatly influenced by how a culture socializes with its children and young people. Curriculum (plural curricula) The set of courses and their contents offered by an institution such as a school or university. In some cases, a curriculum may be partially or entirely determined by an external body (such as the National Curriculum for England in English schools). In the U.S., the basic curriculum is established by each state with the individual school districts adjusting it to their desires; in Australia each state's Education Department sets the various curricula.", "after": null, "start_char_pos": 13891, "end_char_pos": 26365}, {"type": "D", "before": "DDeemed university: \u2018Deemed-to-be-University\u2019, Status of autonomy granted to high performing institutes and departments of various universities in India by Government of India. Distance: (or distance learning) A field of education that focuses on the pedagogy/andragogy, technology, and instructional systems design that is effectively incorporated in delivering education to students who are not physically \"on site\" to receive their education. Instead, teachers and students may communicate asynchronously (at times of their own choosing) by exchanging printed or electronic media, or through technology that allows them to communicate in real time (synchronously). Distance education courses that require a physical on-site presence for any reason including the taking of examinations is considered to be a hybrid or blended course or program. Dunce: A person incapable of learning. The word is derived from the name of the great schoolman, John Duns Scotus, whose works on logic, theology and philosophy were accepted textbooks in the universities from the 14th century. Dyslexia: Said to be a neurological disorder with biochemical and genetic markers. Dyslexia was originally defined as a difficulty with reading and writing that could not be explained by general intelligence. One diagnostic approach is to compare their ability in areas such as reading and writing to that which would be predicted by his or her general level of intelligence, but some would say that it is not certain that intelligence should be a predictor of reading or writing ability; and also that the causes, effects and treatments of reading disabilities may be similar for all levels of intelligence.", "after": null, "start_char_pos": 26366, "end_char_pos": 28049}, {"type": "D", "before": "E", "after": null, "start_char_pos": 28079, "end_char_pos": 28080}, {"type": "R", "before": "Early childhood education: Covers the education of a child from the period from birth to eight years of age. Education: A social science that encompasses teaching and learning specific knowledge, beliefs, and skills. Licensed and practicing teachers in the field use a variety of methods and materials in order to impart a curriculum. Education policy: is the collection of rules, both stated and implicit, or the regularities in practice that govern the behavior of persons in schools. Education policy analysis is the scholarly study of education policy. Education reform: A plan, program, or movement which attempts to bring about a systematic change in educational theory or practice across a community or society. Education voucher: (commonly called a school voucher) A certificate by which parents are given the ability to pay for the education of their children at a school of their choice, rather than the public school to which they were assigned. These vouchers would be paid for using tax revenues. Educational animation: Animation produced for the specific purpose of fostering learning. Educational counseling: Conducted by counselors in schools and universities. It is intended to help children suffering from", "after": "The follow articles comprise the Glossary of", "start_char_pos": 28081, "end_char_pos": 29304}, {"type": "D", "before": "traumas such as beatings and other forms of corporal punishment used in many countries. A more common application is with children who have been abused or bullied. The counselor works with the child to help him or her get over the trauma he or she has suffered. Educational evaluation: The evaluation process of characterizing and appraising some aspect of the education enterprise. Educational film: A film or movie whose primary purpose is to educate. Educational films have been used in classrooms as an alternative to other teaching methods. Educational games: Games, including video games of this genre, designed to teach people, typically children, about a certain subject or help them learn a skill as they play. Some people call these types of games edutainment because they combine education and entertainment. Educational leadership: Leadership in formal educational settings. It draws upon interdisciplinary literature, generally, but ideally distinguishes itself through its focus on pedagogy, epistemology and human development. In contemporary practice it borrows from political science and business. Debate within the field relates to this tension. Educational organization: Organization within the scope of education. It is a common misconception that this means it is organizing educational system; rather, it deals with the theory of organization as it applies to education of the human mind. Educational perennialism: Perennialists believe that one should teach the things that they believe are of everlasting importance to all people everywhere. They believe that the most important topics develop a person. Since details of fact change constantly, these cannot be the most important. Therefore, one should teach principles, not facts. Since people are human, one should teach first about humans, not machines or techniques. Since people are people first, and workers second if at all, one should teach liberal topics first, not vocational topics. Educational programming language: A programming language that is designed primarily as a learning instrument and not so much as a tool for writing real-world application programs. Educational psychology: The study of how humans learn in educational settings, the effectiveness of educational treatments, the psychology of teaching, and the social psychology of schools as organizations. Although the terms \"educational psychology\" and \"school psychology\" are often used interchangeably, researchers and theorists are likely to be identified as educational psychologists, whereas practitioners in schools or school-related settings are identified as school psychologists. Educational psychology is concerned with the processes of educational attainment among the general population and sub-populations such as gifted children and those subject to specific disabilities. Educational research: Research conducted to investigate behavioral patterns in pupils, students, teachers and other participants in schools and other educational institutions. Such research is often conducted by examining work products such as documents and standardized test results. The methods of educational research are derived chiefly from the social sciences, and in particular from psychology. Educational software: Computer software whose primary purpose is teaching or self-learning. Educational technology: The use of technology to improve education. It is a systematic, iterative process for designing instruction or training used to improve performance. Educational technology is sometimes also known as instructional technology or learning technology. E-learning: An approach to facilitate and enhance learning through, and based on, both computer and communications technology. Such devices can include personal computers, CD-ROMs, Digital Television, P.D.A.s and Mobile Phones. Communications technology enables the use of the Internet, email, discussion forums, collaborative software and team learning systems (see also online deliberation). Electronic portfolio: In the context of education and learning, an electronic portfolio, normally known as an ePortfolio or a digital portfolio, is a portfolio based on electronic media and services. It consists of a personal digital record containing information such as a collection of artifacts or evidence demonstrating what one knows and can do. Empirical knowledge: (or a posteriori knowledge) Propositional knowledge obtained by experience or sensorial information. It is contrasted with a priori knowledge, or knowledge that is gained through the apprehension of innate ideas, \"intuition,\" \"pure reason,\" or other non-experiential sources. The natural and social sciences are usually considered a posteriori, literally \"after the fact,\" disciplines. Mathematics and logic are usually considered a priori, \"before the fact,\" disciplines. Engagement: The sentiment a student feels or does not feel towards learning or the learning environment. Epistemic theories of truth: Attempts to analyse the notion of truth in terms of epistemic notions such as \"belief\", \"acceptance\", \"verification\", \"justification\", \"perspective\" and so on. There is a variety of such conceptions, and they may be classified into verificationist theories and perspectivalist and relativist theories. Verificationism is based on a certain kind of mental activity: \"verifying\" a proposition. The distinctive claim of verificationism is that the result of such verifications is, by definition, truth. That is, truth is reducible to this process of verification. According to perspectivalism and relativism, a proposition is only true relative to a particular perspective. Roughly, a proposition is true relative to a perspective if and only if it is \"accepted\" or \"endorsed\" or \"legitimated\" somehow by that perspective.", "after": null, "start_char_pos": 29323, "end_char_pos": 35118}, {"type": "D", "before": "Epistemology: (from the Greek words episteme (knowledge) and logos (word/speech)) The branch of philosophy that deals with the nature, origin and scope of knowledge. Historically, it has been one of the most investigated and most debated of all philosophical subjects. Much of this debate has focused on analysing the nature and variety of knowledge and how it relates to similar notions such as truth and belief. Much of this discussion concerns the justification of knowledge claims, that is the grounds on which one can claim to know a particular fact. Exchange student: A student (usually from high school or university) who temporarily goes abroad and lives with a host family in a foreign country, and attends school there. That host family often also sends a child of theirs abroad, usually to the same country as the student they are hosting. In this way, the two students are said to have been \"exchanged,\" essentially temporarily trading countries with each other, although the period of exchange may not necessarily be simultaneous. The main purpose of exchange programs is to increase cultural understanding, both for the student and the people in the host country he/she comes into contact with. Exchanges are often arranged by organizations created for this purpose, called student exchange programs. Youth For Understanding and American Field Service are two examples of these organizations. Experience: Comprises knowledge of or skill in or observation of some thing or some event gained through involvement in or exposure to that thing or event. The history of the word experience aligns it closely with the concept of experiment. The concept of experience generally refers to know-how or procedural knowledge, rather than propositional knowledge. Philosophers dub knowledge based on experience \"empirical knowledge\" or \"a posteriori knowledge\". A person with considerable experience in a certain field can gain a reputation as an expert.", "after": null, "start_char_pos": 35119, "end_char_pos": 37074}, {"type": "D", "before": "Experiential education: (or \"learning by doing\") The process of actively engaging students in an authentic experience that will have benefits and consequences. Students make discoveries and experiment with knowledge themselves instead of hearing or reading about the experiences of others. Students also reflect on their experiences, thus developing new skills, new attitudes, and new theories or ways of thinking. Experiential education is related to the constructivist learning theory. Experimental analysis of behavior: The name given to the approach to psychology founded by B. F. Skinner. As its name suggests, its foundational principle was the rejection of theoretical analysis, in particular the kinds of learning theory that had grown up in the comparative psychology of the 1920-1950 period, in favor of a more direct approach. It owed its early success to the effectiveness of Skinner's procedure of operant conditioning, both in the laboratory and in behavior therapy. Expulsion (education): Removing a student from a school or university for violating rules or academic honor codes. Extra credit is an academic concept, particularly used in schools. Students are offered the opportunity to undertake optional work, additional to their compulsory school work, in order to gain additional credit that would boost their grades.", "after": null, "start_char_pos": 37104, "end_char_pos": 38441}, {"type": "D", "before": "Extracurricular activities: Activities performed by students that fall outside the realm of the normal curriculum of school or university education. Extracurricular activities exist at all levels of education, from high school and college to university education. Such activities are generally voluntary as opposed to mandatory, non-paying, tend to be social or philanthropic as opposed to scholastic, and involve others of the same age. Students often organize and direct these activities under faculty sponsorship.", "after": null, "start_char_pos": 38442, "end_char_pos": 38958}, {"type": "D", "before": "F", "after": null, "start_char_pos": 38988, "end_char_pos": 38989}, {"type": "D", "before": "Forbidden knowledge: (in contrast to secret knowledge) Used to describe forbidden books or other information to which access is restricted or deprecated for political or religious reasons. Forbidden knowledge is commonly not secret, rather a society or various institutions will use repressive mechanisms to either completely prevent the publication of information they find objectionable or dangerous (censorship), or failing that, to try to reduce the public's trust in such information (propaganda). Public repression can create paradoxical situation where the proscribed information is generally common knowledge but publicly citing it is disallowed. Functional illiteracy: Refers to the inability of an individual to use reading, speaking, writing, and computational skills efficiently in everyday life situations. Unlike an illiterate, a functionally illiterate adult could be able to read and write text in his native language (with a variable degree of grammatical correctness, speed, and style), but is unable like the first, even in his own cultural and linguistic environment, to perform such fundamental tasks as filling out an application for employment, following written instructions, reading a newspaper, reading traffic signs, consulting a dictionary, or understanding a bus schedule. Future Problem Solving Program: (FPSP) An international academic competition. Over 250,000 students internationally participate in the Future Problem Solving program every year. Participating countries include the United States, Canada, Australia, New Zealand, Korea, Malaysia, Russia, Hong Kong and Singapore.", "after": null, "start_char_pos": 38990, "end_char_pos": 40602}, {"type": "D", "before": "GGifted: (intellectual giftedness) An intellectual ability significantly higher than average. Gifted children develop asynchronously; their minds are often ahead of their physical growth, and specific cognitive and emotional functions often are at different stages of development within a single person. Gifted individuals form a heterogeneous group. Because gifted children are intellectually ahead of most of their age peers in at least one major subject area, they frequently require gifted education programs to reach their potential and avoid boredom. Gifted individuals experience the world differently and more intensely, resulting in unique social and emotional issues. The concept of giftedness has historically been rife with controversy, some even denying that this group exists. Gifted education: is a broad term for special practices, procedures and theories used in the education of children who have been identified as gifted or talented. Youths are usually identified as gifted by placing highly on certain standardized tests. Advocates of gifted education argue that gifted and/or talented youth are so perceptually and intellectually above the mean, it is appropriate to pace their lessons more aggressively, track them into honors, Advanced Placement, or International Baccalaureate courses, or otherwise provide educational enrichment.", "after": null, "start_char_pos": 40632, "end_char_pos": 41987}, {"type": "D", "before": "Gymnasia and Realgymnasia: (singular: Gymnasium) and Realgymnasia were the classical higher or secondary schools of Germany from the sixteenth century to the twentieth century. Students were admitted at 9 or 10 years of age and were required to have a knowledge of reading, writing, and arithmetic.", "after": null, "start_char_pos": 41988, "end_char_pos": 42286}, {"type": "D", "before": "H Habituation: An example of non-associative learning in which there is a progressive diminution of behavioral response probability with repetition of a stimulus. It is another form of integration. heutagogy: The study of self-determined learning. Hidden curriculum: Draws attention to the idea that schools do more than simply transmit knowledge, as laid down in the official curricula. It is often used to criticize the social implications, political underpinnings, and cultural outcomes of modern educative activities. While early examinations were concerned with identifying the anti-democratic nature of schooling, later studies have taken various tones, including those concerned with socialism, capitalism, and anarchism in education. The University of Cambridge is an institute of higher learning. Higher education: Education provided by universities and other institutions that award academic degrees, such as community colleges, and liberal arts colleges. Higher education includes both the teaching and the research activities of universities, and within the realm of teaching, it includes both the undergraduate level (sometimes referred to as tertiary education) and the graduate (or postgraduate) level (sometimes referred to as quaternary education or graduate school). Higher education differs from other forms of post-secondary education such as vocational education. However, most professional education is included within higher education, and many postgraduate qualifications are strongly vocationally or professionally oriented, for example in disciplines such as law and medicine. History of ideas: A field of research in history and in related fields dealing with the expression, preservation, and change of human ideas over time. Scholars often consider the history of ideas a sister discipline to, or a particular approach within, intellectual history. Work in the history of ideas usually involves close research in the history of philosophy and the history of literature. Homeschooling: (also home education or home school) An educational alternative in which children are educated at home and in the community, in contrast to a compulsory education which takes place in an institution such as a publicly run or privately run school. Home education methods are similar to those widely used before the popularization of compulsory education in the 19th century. Before this time, the majority of education worldwide was provided at home by family and community members, with only the privileged attending privately run schools or employing tutors, the only available alternatives at the time.", "after": null, "start_char_pos": 42316, "end_char_pos": 44934}, {"type": "D", "before": "I Individuals with Disabilities Education Act (IDEA): a U.S. federal law on Special Education Individualized instruction: A method of instruction in which content, instructional materials, instructional media, and pace of learning are based upon the abilities and interests of each individual learner. Inquiry education: (sometimes known as the inquiry method) A student-centered method of education focused on asking questions. Students are encouraged to ask questions which are meaningful to them, and which do not necessarily have easy answers; teachers are encouraged to avoid speaking at all when this is possible, and in any case to avoid giving answers in favor of asking more questions. Instructional capital: A term used in educational administration after the 1960s, to reflect capital resulting from investment in producing learning materials. Instructional design: (also known as instructional systems design) The analysis of learning needs and systematic development of instruction. Instructional designers often use instructional technology as a method for developing instruction. Instructional design models typically specify a method, that if followed will facilitate the transfer of knowledge, skills and attitude to the recipient or acquirer of the instruction. Instructional Leadership: Actions or behaviors exhibited by an individual or group in the field of education that are characterized by knowledge and skill in the area of curriculum and instructional methodology, the provision of resources so that the school\u2019s mission can be met, skilled communication in one-on-one, small-group and large-group settings, and the establishment of a clear and articulated vision for the educational institution.Smith, W.F.", "after": null, "start_char_pos": 44935, "end_char_pos": 46669}, {"type": "D", "before": "Andrews R.L. (1989) . Instructional Leadership: How Principals Make a Difference. Alexandria, VA: ASCD. This vision, and decision making based on this vision are ideally characterized by a collaborative process and are inclusive of multiple stakeholders.Baron, D.(2008, February). Consensus Building: A Key to School Transformation. Principal Leadership. Instructional leaders also promote collegiality and leadership behavior amongst other members of the institution.Hoerr, T.R. (2007, December)What is Instructional Leadership? Educational Leadership Instructional scaffolding: The provision of sufficient supports to promote learning when concepts and skills are being first introduced to students. Instructional technology: Born as a military response to the problems of a labor shortage during WWII in the United States. There was a definitive need to fill the factories with skilled labor. Instructional technology provided a methodology for training in a systematic and efficient manner. Instructional theory: A discipline that focuses on how to structure material for promoting the education of humans, particularly youth. Originating in the United States in the late 1970s, instructional theory is typically divided into two categories: the cognitive and behaviorist schools of thought. Instructional theory was spawned off the 1956 work of Benjamin Bloom, a University of Chicago professor, and the results of his Taxonomy of Education Objectives \u2014 one of the first modern codifications of the learning process. One of the first instructional theorists was Robert M. Gagne, who in 1965 published Conditions of Learning for the Florida State University's Department of Educational Research. Renowned psychologist B. F. Skinner's theories of behavior were highly influential on instructional theorists because their hypotheses can be tested fairly easily with the scientific process.", "after": null, "start_char_pos": 46688, "end_char_pos": 48579}, {"type": "D", "before": "150px|A concept map Integrative learning: A learning theory describing a movement toward integrated lessons helping students make connections across curricula. This higher education concept is distinct from the elementary and high school \"integrated curriculum\" movement. Intelligence (trait): The mental capacity to reason, plan, solve problems, think abstractly, comprehend ideas and language, and learn. Although nonscientists generally regard the concept of intelligence as having much broader scope, in psychology, the study of intelligence generally regards this trait as distinct from creativity, personality, character, or wisdom. International education: The practice and/or study of international cooperation and aid among countries, including the exchange of students, teachers, and researchers between countries. International education is connected to comparative education. Intrinsic motivation: Evident when people engage in an activity for its own sake, without some obvious external incentive present. A hobby is a typical example. Invigilator: Someone who ensures the smooth running of exams. An invigilator is responsible for ensuring that the Awarding Body's regulations are complied with; that exams start and finish at the correct time; that exam papers are secure whilst in their care; that attendance and seating plans are recorded; and that no cheating takes place. The invigilator will also deal with any problems that arise during an exam, including emergency evacuations, and ensure that no unauthorised materials are present, including mobile phones.", "after": null, "start_char_pos": 48580, "end_char_pos": 50159}, {"type": "D", "before": "J Joint Committee on Standards for Educational Evaluation: A coalition of major professional associations formed in 1975 to help improve the quality of evaluation. The Joint Committee published three sets of standards for evaluations. The Personnel Evaluation Standards was published in 1988, The Program Evaluation Standards (2nd edition) was published in 1994, and The Student Evaluations Standards was published in 2003.", "after": null, "start_char_pos": 50189, "end_char_pos": 50612}, {"type": "D", "before": "K A kindergarten in Afghanistan. Kindergarten: (German for garden for children) A name used in many parts of the world for the first stages of a child's classroom education. In some parts kindergarten is part of the formal school system; in others it may refer to pre-school or daycare. Kinesthetic learning: A teaching and learning style in which learning takes place by the student actually carrying out a physical activity, rather than listening to a lecture or merely watching a demonstration. Building dioramas, physical models or participating in role-playing or historical reenactment are some examples. Other examples include the kindergarten practice of having children perform various motions from left to right in preparation for reading education. Knowledge: Information of which someone is aware. Knowledge is also used to mean the confident understanding of a subject, potentially with the ability to use it for a specific purpose. The unreliability of memory limits the certainty of knowledge about the past, while unpredictability of events yet to occur limits the certainty of knowledge about the future. Epistemology is the philosophical study of the nature, origin, and scope of knowledge.", "after": null, "start_char_pos": 50613, "end_char_pos": 51821}, {"type": "D", "before": "Knowledge Management: (or KM) A term applied to techniques used for the systematic collection, transfer, security and management of information within organisations, along with systems designed to help make best use of that knowledge. In particular it refers to tools and techniques designed to preserve the availability of information held by key individuals and facilitate decision making and reducing risk. Knowledge representation: (KR) Most commonly used to refer to representations intended for processing by modern computers, and particularly for representations consisting of explicit objects. Knowledge transfer: In the fields of Organizational development and organizational learning, is the practical problem of getting a packet of knowledge from one part of the organization to another (or all other) parts of the organization. It is considered to be more than just a communications problem. Knowledge visualization: A sub discipline of Information Design and Instructional Message Design (pedagogy; didactics, pedagogical Psychology). Knowledge Visualization aims to improve the transfer of knowledge by using computer and non-computer based visuals complementary. Examples of such visual formats are photographs, information graphics, sketches, diagrams, images, mind maps, objects, interactive visualizations, dynamic visuals (animations), information visualization applications, imaginary visualizations, stories.", "after": null, "start_char_pos": 51851, "end_char_pos": 53280}, {"type": "D", "before": "L Language education: The teaching and learning of a language or languages, usually as foreign languages. Law (principle): Refers to universal principles that describe the fundamental nature of something, to universal properties and relationships between things, or to descriptions that purport to explain these principles and relationships. Learning: The process of acquiring knowledge, skills, attitudes, or values, through study, experience, or teaching, that causes a change of behavior that is persistent, measurable, and specified or allows an individual to formulate a new mental construct or revise a prior mental construct (conceptual knowledge such as attitudes or values). It is a process that depends on experience and leads to long-term changes in behavior potential. Learning by teaching (LdL): In professional education (in German \"Lernen durch Lehren\", therefore LdL) designates a method which allows pupils and students to prepare and teach lessons or parts of lessons. Learning by teaching should not be confused with presentations or lectures by students, as students do not only convey a certain content, but choose their own methodological and didactical approach in teaching their classmates a certain area of the respective subject. Learning disability: In the United States, the term learning disability is used to refer to socio-biological conditions that affect a persons communicative capacities and potential to learn. The term includes conditions such as perceptual disability, brain injury, minimal brain dysfunction, autism, dyslexia, and developmental aphasia. In the United Kingdom, the term learning disability is used more generally to refer to developmental disability and intellectual disability. Learning outcome: The term may refer to course aims (intended learning outcomes) or may be roughly synonymous with educational objectives (observed learning outcomes). Usage varies between organisations. Lecture: An oral presentation intended to teach people about a particular subject, for example by a university or college teacher. Lectures are used to convey critical information, history, background, theories and equations. A politician's speech, a minister's sermon, or even a businessman's sales presentation may be similar in form to a lecture. Usually the lecturer will stand at the front of the room and recite information relevant to the lecture's content. Legal education: The education of individuals who intend to become legal professionals (attorneys and judges) or those who simply intend to use their law degree to some end, either related to law (such as politics or academic) or unrelated (such as business entrepreneurship). This entry primarily discusses some of the general attributes of legal education in the United States for those who intend to use their degree in order to become legal professionals.", "after": null, "start_char_pos": 53281, "end_char_pos": 56143}, {"type": "D", "before": "Lesson plan: A teacher's detailed description of the course of instruction for an individual lesson. While there is no one way to construct a correct lesson plan, most lesson plans contain similar elements.", "after": null, "start_char_pos": 56173, "end_char_pos": 56379}, {"type": "D", "before": "150px|The seven liberal arts Liberal arts: Studies that are intended to provide general knowledge and intellectual skills, rather than more specialized occupational or professional skills. The scope of the liberal arts has changed with society. It once emphasised the education of elites in the classics; but, with the rise of science and humanities during the Age of Enlightenment, the scope and meaning of \"liberal arts\" expanded to include them. Still excluded from the liberal arts are topics that are specific to particular occupations, such as agriculture, business, dentistry, engineering, medicine, pedagogy (school-teaching), and pharmacy.", "after": null, "start_char_pos": 56380, "end_char_pos": 57028}, {"type": "D", "before": "List group label strategy: a prereading strategy designed to help students make connections to prior knowledge.", "after": null, "start_char_pos": 57058, "end_char_pos": 57169}, {"type": "D", "before": "Literacy: The ability to read, write, speak, and listen. In modern context, the word means reading and writing in a level adequate for written communication and generally a level that enables one to successfully function at certain levels of a society.", "after": null, "start_char_pos": 57170, "end_char_pos": 57422}, {"type": "D", "before": "MMastery learning: An instructional method that presumes all children can learn if they are provided with the appropriate learning conditions. Specifically, mastery learning is a method whereby students are not advanced to a subsequent learning objective until they demonstrate proficiency with the current one. MEB: A Master's in European Business providing knowledge and skills both in Economics and Management. Mathematics education: The study of practices and methods of both the teaching and learning of mathematics. Furthermore, mathematics educators are concerned with the development of tools that facilitate practice and/or the study of practice. Mathematics education has been a hotly debated subject in modern society. There is an ambiguity in the term for it refers both to these practices in classrooms around the world, but also to an emergent discipline with its own journals, conferences, etc. The main international body involved is the International Commission on Mathematical Instruction. Medical education: Education related to the practice of being a medical practitioner, either the initial training to become a doctor or further training thereafter. Medical education and training varies considerably across the world. Various teaching methodologies have been utilised in medical education, which is an active area of educational research.", "after": null, "start_char_pos": 57452, "end_char_pos": 58814}, {"type": "D", "before": "Memory: The ability of the brain to store, retain, and subsequently recall information. Although traditional studies of memory began in the realms of philosophy, the late nineteenth and early twentieth century put memory within the paradigms of cognitive psychology. In the recent decades, it has become one of the principal pillars of a new branch of science that represents a marriage between cognitive psychology and neuroscience, called cognitive neuroscience. Mentoring: A developmental relationship between a more experienced mentor and a less experienced partner referred to as a mentee or prot\u00e9g\u00e9. Usually - but not necessarily - the mentor/prot\u00e9g\u00e9 pair will be of the same sex. The roots of the practice are lost in antiquity. The word itself was inspired by the character of Mentor in Homer's Odyssey. Though the actual Mentor in the story is a somewhat ineffective old man, the goddess Athena takes on his appearance in order to guide young Telemachus in his time of difficulty. Historically significant systems of mentorship include apprenticing under the medieval guild system, and the discipleship system practiced by both Rabbinical Judaism and the Christian church.", "after": null, "start_char_pos": 58815, "end_char_pos": 59996}, {"type": "D", "before": "150px|University (1350s). Medieval university: The first European medieval institutions generally considered to be universities were established in Italy, France and England in the late 11th and the 12th Century for the study of arts, law, medicine, and theology. These universities evolved from much older schools and monasteries, and it is difficult to define the first date at which they became true universities for teaching higher education, although the lists of studia generali for higher education in Europe held by the Vatican are a useful guide. Some other institutions such as the imperial university of Constantinople claim that they changed from schools to universities as early as the 11th Century. Medieval university (Asia): Medieval universities did not exist in Asia in the strict sense of the phrase. However, there were important centres of learning that can be compared to the universities of Europe. Unlike the European universities, non-western institutions of higher learning were never known to issue degrees to their graduates and therefore do not meet what many hold to be the technical definition of university. This does not, however, bar their importance to the history of non-western cultures. Meta-: In epistemology, the prefix meta- is used to mean about (its own category). For example, metadata is data about data (who has produced it, when, what format the data is in and so on). Similarly, meta-memory in psychology means an individual's intuition about whether or not they would remember something if they concentrated on recalling it. Any subject can be said to have a meta-theory, which is the theoretical consideration of its foundations and methods. Metacognition: Refers to thinking about cognition (memory, perception, calculation, association, etc.) itself. Metacognition can be divided into two types of knowledge: explicit, conscious, factual knowledge; and implicit, unconscious, procedural knowledge. The ability to think about thinking is unique to sapient species and indeed is one of the definitions of sapience. Metacognition is practiced to attempt to regulate one's own cognition, and maximize one's potential to think, learn and process stimuli from the surroundings.", "after": null, "start_char_pos": 60026, "end_char_pos": 62249}, {"type": "D", "before": "Allegory of Music, by Lorenzo Lippi Methodology: Strictly speaking is the study and knowledge of methods; but the term is frequently used pretentiously to indicate a method or a set of methods. In other words, it is the study of techniques for problem-solving and seeking answers, as opposed to the techniques themselves. Military education and training:Process that intends to educate in combat and in situations of war. Mind map: (or mind-map) A diagram used for linking words and ideas to a central key word or idea. It is used to visualize, classify, structure, and generate ideas, as well as an aid in study, problem solving, and decision making. Mind uploading The futurist high technology to rapidly increase the speed of information exchange to neurology. A form of education that focuses on extreme time efficiency. Motivation: The driving force behind all actions of human beings and other animals. It is an internal state that activates behavior and gives it direction. Emotion is closely related to motivation, and may be regarded as the subjectively experienced component of motivational states. Music education: Comprises the application of education methods in teaching music.", "after": null, "start_char_pos": 62279, "end_char_pos": 63470}, {"type": "D", "before": "N", "after": null, "start_char_pos": 63500, "end_char_pos": 63501}, {"type": "D", "before": "NAACP Legal Defense and Educational Fund, Inc.: (NAACP LDF or simply LDF) A leading United States civil rights organization. It was founded in 1940 under the leadership of Thurgood Marshall as part of the National Association for the Advancement of Colored People (NAACP) and spun out as a separate organization in 1957. National Educational Television: (NET) was an educational television network in the USA from 1952 until 1970 and was the predecessor of the Public Broadcasting Service. National postgraduate representative body: Exists in many countries representing postgraduate students/researchers undertaking their doctorate (PhD) or postdoctoral research. Some have a broader remit to represent all postgraduates, including those taking Master's degrees. A few countries have no specific body but are represented by a national body representing all students, including undergraduates. In Europe many of the national organisations have come together under the federation Eurodoc. Network of practice: Builds on the work on communities of practice by Jean Lave and Etienne Wenger in the early 1990s, John Seely Brown and Paul Duguid (2000) developed the concept of networks of practice (often abbreviated as NoPs). This concept refers to the overall set of various types of informal, emergent social networks that facilitate learning and knowledge sharing between individuals conducting practice-related tasks. In other words, networks of practice range from communities of practice to electronic networks of practice (often referred to as virtual or electronic communities). Nines System: The informal name for a grading scale often used at educational institutions in English-speaking countries, particularly the United States. The system owes its name to the fact that each of the top four letter grades in it cover a range of nine points. The minimum passing mark under it is almost always 65\\%, or five points higher than in the more widely used Tens System.", "after": null, "start_char_pos": 63531, "end_char_pos": 65501}, {"type": "D", "before": "Notes on a mind map Normal school: An educational institution for training teachers. Its purpose is to establish teaching standards or norms, hence its name. The term normal school is now archaic in all but a few countries. In New Zealand, for example, normal schools are affiliated with Teachers colleges. According to the Oxford English Dictionary, normal schools in the United States and Canada trained primary school teachers, while in Europe, normal schools educated primary, secondary and tertiary-level teachers. Notetaking: The practice of writing pieces of information, often in an informal or unstructured manner. One major specific type of notetaking is the practice of writing in shorthand, which can allow large amounts of information to be put on paper very quickly. Notes are frequently written in notebooks, though any available piece of paper can suffice in many circumstances\u2014some people are especially fond of Post-It notes, for instance. Notetaking is an important skill for students, especially at the college level. Many different forms are used to structure information and make it easier to find later. Computers, particularly tablet PCs and personal digital assistants (PDAs) are beginning to see wide use as notetaking devices. Numeracy: A term that emerged in the United Kingdom as a contraction of \"numerical literacy\". In the United States, it is somewhat better known as \"Quantitative Literacy,\" and is familiar to math educators and intellectuals but not in the common usage. Innumeracy is the absence of numeracy.", "after": null, "start_char_pos": 65531, "end_char_pos": 67076}, {"type": "D", "before": "Young children learn very quickly. Nursery school: (or preschool) A school for the education of very young children (generally five years of age and younger). These schools range from schools which seek to teach young children to schools which only provide childcare with little educational benefits. Schools which focus on education generally teach early social skills including interpersonal interaction, being a part of a group of peers, and classroom skills such as following the instructions of a teacher. Some formal education also takes place, such as early reading or language skills. Some nursery schools have adopted specialized methods of teaching, such as Montessori, High Scope, Reggio Emilia approach and various other pedagogy.", "after": null, "start_char_pos": 67106, "end_char_pos": 67848}, {"type": "D", "before": "O", "after": null, "start_char_pos": 67878, "end_char_pos": 67879}, {"type": "D", "before": "Objective: An educational objective is a statement of a goal which successful participants are expected demonstrably to achieve before the course or unit completes. Objectivity (philosophy) : Has various meanings in philosophy, and is surely one of the most important philosophical problems, since it concerns the epistemological status of knowledge, the problem of an objective reality and the question of our subjective relationship to others objects in the world. Obscurantism: Opposition to extension or dissemination of knowledge beyond certain limits and to questioning dogmas. Obscurantism is the opposite of freethought and is often associated with religious fundamentalism by its opponents. Indeed, it is a commonly raised accusation in debates on academic freedom, with anti-communists and others associating it with the philosophy of G. W. F. Hegel and his followers (including Karl Marx) and more recently with opponents of Martin Heidegger doing the same. Observation: An activity of a sapient or sentient living being, which senses and assimilates the knowledge of a phenomenon in its framework of previous knowledge and ideas. Observational learning: (or social learning) Learning that occurs as a function of observing, retaining and replicating behavior observed in others. It is most associated with the work of psychologist Albert Bandura, who implemented some of the seminal studies in the area and initiated social learning theory. Although observational learning can take place at any stage in life, it is thought to be particularly important during childhood, particularly as authority becomes important. Of Education Published in 1644, first appearing anonymously as a single eight-page quarto sheet (Ainsworth 6). Presented as a letter written in response to a request from the Puritan educational reformer Samuel Hartlib, it represents John Milton's most comprehensive statement on educational reform, and gives voice to his views \u201cconcerning the best and noblest way of education \u201d. As outlined in the tractate, education carried for Milton a dual objective: one public, to \u201cfit a man to perform justly, skillfully, and magnanimously all the offices, both private and public, of peace and war\u201d; and the other private, to \u201crepair the ruins of our first parents by regaining to know God aright, and out of that knowledge to love Him, to be like Him, as we may the nearest by possessing our soul of true virtue\u201d. Open problem: A problem that can be formally stated and for which a solution is known to exist but which has not yet been solved. It is common in graduate schools to point out open problems to students. Operant conditioning: (so named by psychologist B. F. Skinner) The modification of behavior brought about over time by the consequences of said behavior. Operant conditioning is distinguished from Pavlovian conditioning in that operant conditioning deals with voluntary behavior explained by its consequences, while Pavlovian conditioning deals with involuntary behavior triggered by its antecedents.", "after": null, "start_char_pos": 67909, "end_char_pos": 70949}, {"type": "D", "before": "Participants on a ropes course. Outdoor education: (also known as adventure education) Usually refers to organized learning that takes place in the outdoors. Programs often involve residential or journey-based experiences in which students participate in a variety of adventurous challenges such as hiking, climbing, canoeing, ropes courses, and group games. Outdoor education programs draw upon the philosophy and theory of experiential education and may also focus on environmental education. Overlearning: A pedagogical concept according to which newly acquired skills should be practiced well beyond the point of initial mastery, leading to automaticity.", "after": null, "start_char_pos": 70979, "end_char_pos": 71637}, {"type": "R", "before": "PParadigm shift: The term first used by Thomas Kuhn in his famous 1962 book The Structure of Scientific Revolutions to describe the process and result of a change in basic assumptions within the ruling theory of science. Don Tapscott was the first to use the term to describe information technology and business in his book of the same title. It has since become widely applied to many other realms of human experience as well. Peace education: The process of acquiring the knowledge and developing the attitudes, skills, and behaviour to live in harmony with oneself and with others. Peace education is based on a philosophy that teaches nonviolence, love, compassion, trust, fairness, cooperation, respect, and a reverence for the human family and all life on our planet. It is a social practice with shared values to which anyone can make a significant contribution. Pedagogy: The art or science of teaching. The word comes from the ancient Greek paidagogos, the slave who took little boys to and from school as part of paideia. The word \"paidia\"", "after": "terms: Glossary of education terms", "start_char_pos": 71667, "end_char_pos": 72716}, {"type": "D", "before": "\u03c0\u03b1\u03b9\u03b4\u03b9\u03ac) refers to children, which is why some like to make the distinction between pedagogy (teaching children) and andragogy (teaching adults). The Latin word for pedagogy, education, is much more widely used, and often the two are used interchangeably. Leonardo da Vinci Personal development: (also known as self-development or personal growth) Comprises the development of the self. The term may also refer to: traditional concepts of education or training; counselling and coaching for personal transformation; New Age movement and spiritual beliefs", "after": null, "start_char_pos": 72719, "end_char_pos": 73272}, {"type": "D", "before": "concepts - including \"inner pathways\" to solve social and psychological issues; or professional development business trainers (some treat the whole person instead of business only). Philosophy of education: The study of the purpose, nature and ideal content of education. Other questions include the nature of the knowing mind and the human subject, problems of authority, the relationship between education and society, etc. At least since Rousseau's time, the philosophy of education has been linked to theories of developmental psychology and human development. Phonicetic: Of or relating to the enhancement of meaning through the use of phonemes. The added layers of meaning due to the intentional use of sounds within an existing phonetic structure. Educational/technical jargon. Physical education: (PE, also called physical training - PT or gym) A course in the curriculum which utilizes the learning medium of large-muscle activities in a play or movement exploration setting. It is almost always mandatory for students in elementary schools, and often for students in middle schools and high schools. Physics education: A relatively new, yet active, area of research within the science of physics. The main focus of research is on learning and teaching of physics in both the highschool and college level. Polymath: (also known as a polyhistor) A person who excels in multiple fields, particularly in both arts and sciences. The most common other term for this phenomenon is Renaissance man, but also in use are Homo universalis and Uomo Universale, which in Latin and Italian, respectively, translate as \"Universal Person\" or \"Universal Man\". Note that in Latin homo may be male or female; the Latin word for a male human being vir. Informally used in contemporary discussion, a polymath is someone known to be skillful or excel in a broad range of intellectual fields.", "after": null, "start_char_pos": 73291, "end_char_pos": 75170}, {"type": "R", "before": "Post-graduate student receiving a degree. Postgraduate education: (or Quaternary education) The fourth-stage educational level, and follows the completion of an undergraduate degree at a college or university. Graduate school is an example of quaternary education; some consider masters-level degrees as part of tertiary education; some consider postdoctoral positions to be quaternary education while others consider them to be jobs. Post-secondary education: Any form of education that is taken after first attending a secondary school, such as a high school. The purpose of a post-secondary education can be to receive vocational education and training or to prepare for professions or scientific/academic careers through higher education. Predictive power: (of a scientific theory) Refers to its ability to generate testable predictions. Theories with strong predictive power are highly valued, because the predictions can often encourage the falsification of the theory. The concept of predictive power differs from explanatory or descriptive power (where phenomena that are already known are retrospectively explained by a given theory) in that it allows a prospective test of theoretical understanding. Preschool education: See Nursery school. Primary education: (or elementary education) Consists of the first years of formal, structured education that occurs during childhood. In most countries, it is compulsory for children to receive primary education (though in many jurisdictions it is permissible for parents to provide it). Primary education generally begins when children are four to seven years of age. The division between primary and secondary education is somewhat arbitrary, but it generally occurs at about twelve years of age (adolescence); some educational systems have separate middle schools for that period. Problem finding: Problem discovery. It is part of the larger problem process that includes problem shaping and problem solving. Problem finding requires intellectual vision and insight into what is missing. This involves the application of creativity. Problem shaping: Revising a question so that the solution process can begin or continue. It is part of the larger problem process that includes problem finding and problem solving. Problem shaping (or problem framing) often involves the application of critical thinking. Problem solving: Forms part of thinking. It occurs if an organism or an artificial intelligence system does not know how to proceed from a given state to a desired goal state. It is part of the larger problem process that includes problem finding and problem shaping. Problem-based learning: (PBL) A didactic concept of \"active learning\" in tertiary education, but is currently being adapted for use in K", "after": "A\u2013C) Glossary of education terms (D", "start_char_pos": 75200, "end_char_pos": 77963}, {"type": "D", "before": "12 education. The defining characteristics of PBL are: learning is driven by messy, open-ended problems; students work in small collaborative groups; and \"teachers\" are not required, the process uses \"facilitators\" of learning. Accordingly, students are encouraged to take responsibility for their group and organise and direct the learning process with support from a tutor or instructor. Advocates of PBL claim it can be used to enhance content knowledge and foster the development of communication, problem-solving, and self-directed learning skill. Procedural knowledge: (or know-how) The knowledge of how to perform some task. Know-how is different from other kinds of knowledge such as propositional knowledge in that it can be directly applied to a task. Procedural knowledge about solving problems differs from propositional knowledge about problem solving. For example, in some legal systems, this knowledge or know-how has been considered the intellectual property of a company, and can be transferred when that company is purchased. Professional certification: (trade certification, or professional designation often called simply certification or qualification) A designation earned by a person to certify that he is qualified to perform a job. Certification indicates that the individual has a specific knowledge, skills, or abilities in the view of the certifying body. Professional certifications are awarded by professional bodies and corporations. The difference between licensure and certification is licensure is required by law, whereas certification is generally voluntary. Sometimes the word certification is used for licensure. Programmed instruction: A field first studied extensively by the behaviorist B. F. Skinner. It consists of teaching through small lessons, where each lesson must be mastered in order to go on to the next. Students work through the programmed material by themselves at their own speed. After each step, they are presented with a question to test their comprehension, then are immediately shown the correct answer or given additional information. Propositional knowledge: (or declarative knowledge) Knowledge that some proposition is either true or false. This distinguishes propositional knowledge from know-how or procedural knowledge, which is the knowledge of how to perform some task. This article discusses propositional knowledge from a variety of perspectives, including philosophy, science, and history. What is the difference between knowledge and beliefs? A belief is an internal thought or memory which exists in one's mind. Most people accept that for a belief to be knowledge it must be, at least, true and justified. The Gettier problem in philosophy is the question of whether there are any other requirements before a belief can be accepted as knowledge. Public education: Schooling provided for the general public by the government, whether national or local, and paid for by taxes, which leads to it often being called state education. Schools provided under such a system are called public schools in many countries, but in England the term \"public school\" refers to an elite of privately funded independent schools which had their origins in medieval schools funded by charity to provide education for the poor. Public education often involves the following: public funding; compulsory student attendance; state certification of teachers and curricula; and testing and national standards. Public school: The term has different (and in some cases contradictory) meanings due to regional differences. Pygmalion effect: (or Rosenthal effect) refers to situations in which students perform better than other students simply because they are expected to do so.", "after": null, "start_char_pos": 77966, "end_char_pos": 81691}, {"type": "D", "before": "Q Quiz: A form of game or puzzle in which the players (as individuals or in teams), attempt to answer questions correctly. A quiz usually is a form of student assessment, but often has fewer questions of lesser difficulty and requires less time for completion than a test.", "after": null, "start_char_pos": 81721, "end_char_pos": 81993}, {"type": "D", "before": "RReading a book Reading (process) : The process of retrieving and comprehending some form of stored information or ideas. These ideas are usually some sort of representation of language, as symbols to be examined by sight, or by touch (for example Braille). Other types of reading may not be language-based, such as music notation or pictograms. By analogy, in computer science, reading is acquiring of data from some sort of computer storage. Reading disability: A condition in which a sufferer displays difficulty reading resulting primarily from neurological factors. Reading education in the USA: There are basically two different common methods of teaching reading. One usually refers to whole language approach (\"look say\"), the other usually refers to phonetics approach. The tension between these two approaches is often referred to as \"the great debate\". Reason: A term used in philosophy and other human sciences to refer to the higher cognitive faculties of the human mind. It describes a type of thought or aspect of thought, especially abstract thought, and the ability to think abstractly, which is felt to be especially human. The concept of reason is connected to language, as reflected in the meanings of the Greek word \"logos\", later to be translated by Latin \"ratio\" and then French \"raison\", from which the English word. Reason is thus a very important word in western intellectual history and shares much of its heritage with the now separate words logic and rationality. Reasoning: Defined very differently depending on the context of the understanding of reason as a form of knowledge. The Logical definition is the act of using reason, to derive a conclusion from certain premises, using a given methodology; and the two most commonly used explicit methods to reach a conclusion are deductive reasoning and inductive reasoning. However, within idealist philosophical contexts, reasoning is the mental process which informs our imagination, perceptions, thoughts, and feelings with whatever intelligibility these appear to contain; and thus links our experience with universal meaning. The specifics of the methods of reasoning are of interest to such disciplines as philosophy, logic, psychology, and artificial intelligence. Recitation: A discussion carried by a Teaching assistant to supplement a lecture given by a senior faculty at an academic institution. During the recitation, TAs will review the lecture, expand on the concepts, and carry a discussion with the students. Reference: Something that refers or points to something else, or acts as a connection or a link between two things. The objects it links may be concrete, such as books or locations, or abstract, such as data, thoughts, or memories. The object which is named by a reference, or to which the reference points, is the referent. Reinforcement: In operant conditioning, reinforcement is any change in an organism's surroundings that: occurs regularly when the organism behaves in a given way (that is, is contingent on a specific response); and is associated with an increase in the probability that the response will be made or in another measure of its strength. Religious education: Teaches the doctrines of a religion. Its usual purpose is to teach children the basics of a religion. A less common purpose is to teach new adherents of a religion. Since people within a given country often hold varying religious and non-religious beliefs, government-sponsored religious education can be a source of conflict. Countries vary widely in whether religious education is allowed in government-run schools (often called \"public schools\"). Those that allow it also vary in the type of education provided. Research: Often described as an active, diligent, and systematic process of inquiry aimed at discovering, interpreting and revising facts. This intellectual investigation produces a greater understanding of events, behaviors, or theories, and makes practical applications through laws and theories. The term research is also used to describe a collection of information about a particular subject, and is usually associated with science and the scientific method.", "after": null, "start_char_pos": 82023, "end_char_pos": 86185}, {"type": "D", "before": "Rhodes House in Oxford Rhodes Scholarships: Created by Cecil Rhodes and have been awarded to applicants annually since 1902 by the Oxford-based Rhodes Trust on the basis of academic qualities, as well as those of character. They provide the successful candidate with two years of study at the University of Oxford in England, possibly extended for a third year. When Rhodes died in 1902, his will stipulated that the greater part of his fortune was to go toward the establishment of a scholarship fund to reward applicants who exhibited worthy qualities of intellect, character, and physical ability. Rote learning: A learning technique which avoids grasping the inner complexities and inferences of the subject that is being learned and instead focuses on memorizing the material so that it can be recalled by the learner exactly the way it was read or heard. Rubric (academic): In education, a rubric is a set of criteria and standards linked to learning objectives that is used to assess a student's performance, such as on a paper, project, or essay.", "after": null, "start_char_pos": 86215, "end_char_pos": 87269}, {"type": "D", "before": "S", "after": null, "start_char_pos": 87299, "end_char_pos": 87300}, {"type": "D", "before": "Sail training: From its modern interpretations to its antecedents when maritime nations would send young naval officer candidates to sea (e.g., see Outward Bound) , sail training provides an unconventional and effective way of building many useful skills on and off the water. Through the unique environment of the sea, contemporary sail trainees learn that what they are doing is important and that their efforts are essential to the operation and safety of the ship. School: A place designated for learning. The range of institutions covered by the term varies from country to country. School bus:, A bus used to transport children and adolescents to and from school. The first school bus was horse-drawn, introduced in 1827 by George Shillibeer for a Quaker school at Abney Park in Stoke Newington, London, and was designed to carry twenty-five children. Since then, school buses of many types have become widespread, and motorised, and are used in all parts of the world. School counselor: A practitioner who meets the needs of students in three basic educational domains: academic development, career development, and personal/social development. This is accomplished through the implementation of a comprehensive school counseling program that promotes and enhances student achievement through a guidance curriculum, individual planning strategies, responsive services and comprehensive school counseling program support/advocacy. School discipline: A form of discipline found in schools. The term refers to students complying with a code of behaviour often known as the school rules. Among other things these rules may set out the expected standards of clothing, timekeeping, social behaviour and work ethic. The term may also be applied to the punishment that is the consequence of transgression of the code of behaviour. For this reason the usage of school discipline sometimes means punishment for breaking school rules rather than behaving within the school rules. School psychologist: A practitioner who applies his psychological training to assess and help school children. Science education : The field concerned with sharing science content and process with individuals not traditionally considered part of the scientific community. The target individuals may be children, college students, or adults within the general public. The field of science education comprises science content, some sociology, and some teaching pedagogy. Science fair: Generally a competition where contestants create a project related to science or some scientific phenomenon. Science fairs usually are involved with children and schooling; however, the term can be used to describe science fairs independent of the age of the contestants involved. They are often also combined with competition in mathematics or history. Secondary education: is a period of education which, in most contemporary educational systems of the world, follows directly after primary education, and which may be followed by tertiary, \"post-secondary\", or \"higher\" education (e.g., university). In Australia and other countries secondary schools is the official term for institutions offering this period of education. In other parts of the English-speaking world, secondary school is often used synonymously with secondary education. Self-concept: (or self-identity) The mental and conceptual awareness and persistent regard that sentient beings hold with regard their own being. Components of a being's self-concept include physical, psychological, and social attributes; and can be influenced by its attitudes, habits, beliefs and ideas. These components and attributes can each be condensed to the general concepts of self-image and the self-esteem. Self-efficacy: The belief that one has the capabilities to execute the courses of actions required to manage prospective situations. Unlike efficacy, which is the power to produce an effect (in essence, competence), self-efficacy is the belief (however accurate) that one has the power to produce that effect. It is important here to understand the distinction between self-esteem and self efficacy. Self-esteem relates to a person\u2019s sense of self-worth, whereas self efficacy relates to a person\u2019s perception of their ability to reach a goal. For example, say a person is a terrible rock climber. They would likely have a poor efficacy in regard to rock climbing, but this wouldn\u2019t need to affect their self-esteem; most people don\u2019t invest much of their self-esteem in this activity.", "after": null, "start_char_pos": 87330, "end_char_pos": 91836}, {"type": "D", "before": "Self-esteem: (or self-worth) Includes a person's subjective appraisal of himself or herself as intrinsically positive or negative to some degree. Service learning: A method of teaching, learning and reflecting that combines academic classroom curriculum with meaningful youth service throughout the community. As a teaching methodology, it falls under the category of experiential education. More specifically, it integrates meaningful community service with instruction and reflection to enrich the learning experience, teach civic responsibility, encourage lifelong civic engagement, and strengthen communities. Sex education: Education about sexual reproduction in human beings, sexual intercourse and other aspects of human sexual behavior. Situated learning: Education that takes place in a setting functionally identical to that where the learning will be applied. Skill: An ability, usually learned, to perform actions. Social constructionism: A sociological theory of knowledge developed by Peter L. Berger and Thomas Luckmann with their 1966 book, The Social Construction of Reality. The focus of social constructionism is to uncover the ways in which individuals and groups participate in the creation of their perceived reality. As an approach, it involves looking at the ways social phenomena are created, institutionalized, and made into tradition by humans. Socially constructed reality is seen as an ongoing, dynamic process; reality is re-produced by people acting on their interpretations and their knowledge of it. Sociology of knowledge: The study of the social origins of ideas, and of the effects prevailing ideas have on societies. (Compare history of ideas.) Sociology of scientific knowledge: (SSK) Closely related to the sociology of science, considers social influences on science. Practitioners (sociologists, philosophers of science, historians of science, anthropologists and computer scientists) have engaged in controversy concerning the role that social factors play in scientific development relative to rational, empirical and other factors. Socratic method: (or method of elenchos or Socratic debate) A dialectic method of inquiry, largely applied to the examination of key moral concepts and first described by Plato in the Socratic Dialogues. For this, Socrates is customarily regarded as the father and fountainhead for ethics or moral philosophy. It is a form of philosophical enquiry. It involves two or more speakers, usually with one as the master (or wise one) and the others as students or fools. The method is credited to Socrates, who began to engage in such discussion with his fellow Athenians after a visit to the Oracle of Delphi.", "after": null, "start_char_pos": 91866, "end_char_pos": 94546}, {"type": "D", "before": "Special education:, describes an educational alternative that focuses on the teaching of students with academic, behaviorial, health, or physical needs that cannot sufficiently be met using traditional educational programs or techniques. Sphere of knowledge: A unified body or collection of knowledge regarding a specific subject, interest or otherwise area of expertise possessed by an individual. STEM fields: The Science, Technology, Engineering, and Mathematics (STEM) fields are collectively considered core technological underpinnings of an advanced society. In many forums (including political/governmental and academic) the strength of the STEM workforce is viewed as an indicator of a nation's ability to sustain itself. Maintaining healthy levels of its citizenry well versed in the STEM fields is a key portion of the public education agenda of the United States of America at all levels, and substantial lobbying is underway in Washington, DC to raise awareness of STEM education issues. Stipend: A form of payment or salary, such as for an internship or apprenticeship. Stipends are usually lower than what would be expected as a permanent salary for similar work. This is because the stipend is complemented by other benefits such as instruction, work experience, food, accommodation, and personal satisfaction. Universities usually refer to monies paid to graduate research assistants as a stipend, rather than as wages, to reflect complementary benefits. Student: Etymologically derived through Middle English from the Latin second-type conjugation verb \"st\u016dd\u0113r\u0115\", which means \"to direct one's zeal at\"; hence a student is one who directs zeal at a subject. Also known as a disciple in the sense of a religious area of study, and/or in the sense of a \"discipline\" of learning. In widest use, student is used to mean a school or class attendee. In many countries, the word student is however reserved for higher education or university students; persons attending classes in primary or secondary schools being called pupils. Student activism: A form of youth-led community organizing that is specifically oriented towards engaging students as activists in order to create change in the educational system. Student-centered learning: An approach to education focusing on the needs of the students, rather than those of others involved in the educational process, such as teachers and administrators. This approach has many implications for the design of curriculum, course content, and interactivity of courses. Student voice: the distinct perspectives and actions of young people throughout schools focused on education itself. Student loans: Loans offered to students to assist in payment of the costs of professional education. These loans usually carry lower interests than other loans, and are usually issued by the government. Student organization: A voluntary association of students at institutions of secondary and higher education for a specific legal purpose. Such organizations are often sponsored through and receive funding from a student government. Syllabus: (plural syllabi or syllabuses) A document with an outline and summary of topics to be covered in a course. It is often either set out by an exam board, or prepared by the professor who teaches the course, and is usually given to each student during the first class session. Synthesis: (from the ancient Greek \u03c3\u03cd\u03bd (with) and \u03b8\u03b5\u03c3\u03b9\u03c2 (placing), is commonly understood to be an integration of two or more pre-existing elements which results in a new creation.", "after": null, "start_char_pos": 94576, "end_char_pos": 98119}, {"type": "D", "before": "T", "after": null, "start_char_pos": 98165, "end_char_pos": 98166}, {"type": "D", "before": "Taxonomy of Educational Objectives: An educational taxonomy that classifies educational objectives into three domains: cognitive, affective, and psychomotor. Teacher: In education, one who teaches students or pupils, often a course of study, lesson plan, or a practical skill, including learning and thinking skills. There are many different ways to teach and help students learn. This is often referred to as the teacher's pedagogy. When deciding what teaching method to use, a teacher will need to consider students' background knowledge, environment, and their learning goals as well as standardized curriculum as determined by their school district. Technology education: The study of the human ability to create and use tools to shape the natural environment to meet their needs. The goal of technology education is to spread technological literacy which is accomplished by bringing laboratory activities to students. The term \"technology education\" is frequently shortened to \"tech ed\". Technology Integration: A term used by educators to describe effective uses of technology by teachers and students in K-12 and university classrooms. Teachers use technology to support instruction in language arts, social studies, science, math, or other content areas. When teachers integrate technology into their classroom practice, learners are empowered to be actively engaged in their learning. Tertiary education: (also referred to as third-stage or third level education) The educational level following the completion of a school providing a secondary education such as a high school, secondary school, or gymnasium. Tertiary education is commonly higher education which prepares students for a quaternary education. Colleges and universities are examples of institutions that provide tertiary education. The term Tertiary education can also be used to refer to vocational education and training.", "after": null, "start_char_pos": 98196, "end_char_pos": 100094}, {"type": "D", "before": "Textbook: A manual of instruction or a standard book in any branch of study. They are classified by both the target audience and the subject. Textbooks are usually published by specialty printers to serve every request for an understanding of every subject that can be taught. It is a big business that requires mass volume sales to make the publications profitable. Although most textbooks are only published in printed format with hard covers, some can now be viewed online. Theory of cognitive development: A developmental psychology theory developed by Jean Piaget to explain cognitive development. The theory is central to child psychology and is based on schemata\u2014schemes of how one perceives the world\u2014in \"critical periods,\" times when children are particularly susceptible to certain information. Theory of multiple intelligences: A psychological and educational theory formulated by Howard Gardner espousing that eight kinds of \"intelligence\" exist in humans, each relating to a different sphere of human life and activity. The Times Higher Education Supplement:, (also known as The Times Higher or The THES'') A newspaper based in London that reports specifically on issues related to higher education. It is owned by TSL Education, which was, until October 2005, a division of News International. The paper is edited by John O'Leary, author of The Times Good University Guide. The THES is probably best known for publishing The Times Higher World University Rankings (see college and university rankings), which first appeared in November 2004, with new rankings published annually. Training: Refers to the acquisition of knowledge, skills, attitudes as a result of the teaching of vocational or practical skills and knowledge and relates to specific useful skills. It forms the core of apprenticeships and provides the backbone of content at technical colleges or polytechnics. Today it is often referred to as professional development. Truth: When someone sincerely agrees with an assertion, he or she is claiming that it is the truth. Philosophy seeks answers for certain questions about truth and the word truth. Tuition: Instruction, teaching or a fee charged for educational instruction especially at a formal institution of learning. Tuition is charged by educational institutions to assist with funding of staff and faculty, course offerings, lab equipment, computer systems, libraries, facility upkeeping, and to provide a comfortable learning experience for its students.", "after": null, "start_char_pos": 100124, "end_char_pos": 102616}, {"type": "D", "before": "U", "after": null, "start_char_pos": 102646, "end_char_pos": 102647}, {"type": "D", "before": "Understanding: A psychological process related to an abstract or physical object, such as, person, situation and message whereby one is able to think about it and use concepts to deal adequately with that object. UNESCO: The United Nations Educational, Scientific and Cultural Organization, commonly known as UNESCO, is a specialized agency of the United Nations established in 1945. Its purpose is to contribute to peace and security by promoting international collaboration through education, science, and culture in order to further universal respect for justice, the rule of law, and the human rights and fundamental freedoms proclaimed in the UN Charter. Universal preschool: The notion that access to preschool should be available to families similar to Kindergarten. Child advocates have different definitions of the definition of who is included and how it is to be funded. There has been a move to change the name to Preschool for All. Like Kindergarten, the concept is to have a voluntary program, unlike education, that is mandated by law in the United States with exceptions to allow for homeschooling and alternative education. Unobservables: Entities whose existence, nature, properties, qualities or relations are not observable. In the philosophy of science typical examples of \"unobservables\" are atomic particles, the force of gravity, causation and beliefs or desires. However, philosophers also characterize all objects\u2014trees, tables, other minds, microbiological things and so on to which humans ascribe as the thing causing their perception\u2014as unobservable.", "after": null, "start_char_pos": 102677, "end_char_pos": 104256}, {"type": "D", "before": "V", "after": null, "start_char_pos": 104286, "end_char_pos": 104287}, {"type": "D", "before": "A blacksmith is a traditional trade. Virtual learning environment: (VLE) A software system designed to facilitate teachers in the management of educational courses for their students, especially by helping teachers and learners with course administration. The system can often track the learners' progress, which can be monitored by both teachers and learners. While often thought of as primarily tools for distance education, they are most often used to supplement the face-to-face classroom. Visual learning: A proven teaching method in which graphic organizers, such as webs, concept maps idea maps, and slide shows are used to help students of all ages think and learn more effectively. Vocational education: (or Vocational Education and Training (VET)) Prepares learners for careers or professions that are traditionally non-academic and directly related to a specific trade, occupation or vocation, hence the term, in which the learner participates. It is sometimes referred to as technical education, as the learner directly specialises in a particular narrow technique of using technology.", "after": null, "start_char_pos": 104317, "end_char_pos": 105414}, {"type": "D", "before": "W", "after": null, "start_char_pos": 105444, "end_char_pos": 105445}, {"type": "D", "before": "Waldorf education Waldorf education (also known as Steiner education) is a humanistic approach to pedagogy based on the educational philosophy of the Austrian philosopher Rudolf Steiner, the founder of anthroposophy. Learning is interdisciplinary, integrating practical, artistic, and conceptual elements. The approach emphasizes the role of the imagination in learning, developing thinking that includes a creative as well as an analytic component. Whole language: A term used by reading teachers to describe an instructional philosophy which focuses on reading as an activity best taught in a broader context of meaning. Rather than focusing on reading as a mechanical skill, it is taught as an ongoing part of every student's existing language and life experience. Building on language skills each student already possesses, reading and writing are seen as a part of a broader \"whole language\" spectrum. Wisdom: The ability to make correct judgments and decisions. It is an intangible quality gained through experience some think. Yet others think it is a quality that even a child, otherwise immature, may possess independent of experience or complete knowledge. Whether or not something is wise is determined in a pragmatic sense by its popularity, how long it has been around, and its ability to predict against future events. Wisdom is also accepted from cultural, philosophical and religious sources. Some think of wisdom as foreseeing consequences and acting to maximize beneficial results. Writing: May refer to two activities: the inscribing of characters on a medium, with the intention of forming words and other constructs that represent language or record information, and the creation of material to be conveyed through written language. (There are some exceptions; for example, the use of a typewriter to record language is generally called typing, rather than writing.) Writing refers to both activities equally, and both activities may often occur simultaneously. Workshop:''' A brief intensive course, a seminar or a series of meetings emphasizing interaction and exchange of information among a usually small number of participants..", "after": null, "start_char_pos": 105475, "end_char_pos": 107629}, {"type": "D", "before": "X xylophone. a musical instrument", "after": null, "start_char_pos": 107659, "end_char_pos": 107692}, {"type": "R", "before": "ZZero tolerance policy. A policy that states that prohibited behaviors and actions will not be tolerated\u2014no exceptions.", "after": "F) Glossary of education terms (G\u2013L) Glossary of education terms (M\u2013O) Glossary of education terms (P\u2013R) Glossary of education terms (S) Glossary of education terms (T\u2013Z", "start_char_pos": 107722, "end_char_pos": 107841}], "sents_char_pos": [0, 115, 259, 462, 536, 665, 798, 1002, 1078, 1268, 1391, 1552, 1698, 1763, 1896, 2024, 2077, 2201, 2283, 2492, 2666, 2808, 2871, 3018, 3088, 3165, 3231, 3392, 3547, 3710, 3742, 3923, 4074, 4156, 4322, 4555, 4694, 4811, 4879, 5003, 5165, 5366, 5461, 5652, 5753, 5890, 6071, 6172, 6304, 6397, 6667, 6918, 7092, 7186, 7297, 7437, 7551, 7618, 7843, 7915, 8087, 8368, 8448, 8674, 8724, 8800, 8919, 9090, 9250, 9320, 9436, 9538, 9637, 9729, 9792, 9911, 9990, 10055, 10160, 10315, 10386, 10530, 10636, 10689, 10841, 10930, 11069, 11209, 11315, 11472, 11604, 11708, 11744, 11805, 11960, 12026, 12118, 12258, 12405, 12604, 12976, 13039, 13506, 13859, 13978, 14308, 14411, 14518, 14636, 14718, 14739, 14879, 15000, 15066, 15168, 15339, 15570, 15840, 15989, 16155, 16225, 16323, 16449, 16651, 16864, 16949, 17005, 17114, 17274, 17389, 17693, 17873, 18046, 18159, 18317, 18429, 18563, 18670, 18840, 19002, 19139, 19286, 19334, 19407, 19708, 19809, 20041, 20236, 20342, 20511, 20699, 20808, 20879, 20972, 21117, 21158, 21308, 21432, 21691, 21795, 21932, 22057, 22236, 22464, 22591, 22664, 22926, 23073, 23179, 23291, 23398, 23535, 23621, 23787, 24163, 24262, 24471, 24567, 24717, 24813, 25060, 25221, 25371, 25480, 25661, 25776, 25879, 26005, 26159, 26290, 26365, 26542, 26811, 27033, 27212, 27251, 27440, 27523, 27649, 27929, 28049, 28189, 28297, 28415, 28567, 28637, 28799, 29037, 29090, 29180, 29257, 29410, 29486, 29584, 29705, 29776, 29868, 30042, 30142, 30209, 30364, 30437, 30486, 30556, 30638, 30733, 30888, 30950, 31027, 31078, 31167, 31290, 31470, 31677, 31961, 32159, 32335, 32444, 32561, 32653, 32721, 32826, 32925, 33052, 33153, 33319, 33519, 33670, 33792, 33967, 34077, 34164, 34269, 34458, 34600, 34690, 34798, 34859, 34969, 35118, 35200, 35284, 35387, 35532, 35674, 35848, 35969, 36162, 36327, 36433, 36525, 36681, 36766, 36883, 36981, 37074, 37263, 37393, 37518, 37591, 37697, 37941, 38084, 38199, 38266, 38441, 38590, 38705, 38879, 38958, 39178, 39492, 39644, 39809, 40291, 40369, 40469, 40602, 40725, 40765, 40935, 40982, 41188, 41309, 41422, 41585, 41674, 41987, 42164, 42286, 42478, 42563, 42703, 42837, 43057, 43121, 43281, 43600, 43700, 43918, 44069, 44193, 44314, 44576, 44703, 44934, 45236, 45363, 45482, 45629, 45789, 45930, 46029, 46214, 46658, 46709, 46769, 46791, 46942, 46968, 47020, 47042, 47156, 47217, 47389, 47513, 47583, 47682, 47818, 47983, 48209, 48387, 48579, 48739, 48851, 48986, 49218, 49404, 49467, 49598, 49628, 49690, 49789, 49838, 49888, 49936, 49970, 50159, 50352, 50423, 50612, 50645, 50786, 50850, 50899, 51110, 51223, 51372, 51422, 51558, 51734, 51821, 52085, 52260, 52452, 52690, 52754, 52862, 52898, 53028, 53280, 53386, 53622, 53964, 54061, 54267, 54536, 54727, 54873, 55014, 55182, 55218, 55349, 55444, 55568, 55683, 55960, 56143, 56273, 56379, 56568, 56624, 56684, 56828, 57028, 57169, 57226, 57422, 57594, 57763, 57865, 57973, 58107, 58181, 58361, 58459, 58624, 58693, 58814, 58902, 59081, 59279, 59420, 59501, 59550, 59626, 59804, 59996, 60051, 60289, 60581, 60738, 60845, 60947, 61165, 61250, 61333, 61441, 61599, 61717, 61828, 61926, 61975, 62090, 62249, 62384, 62472, 62600, 62700, 62798, 62930, 63042, 63103, 63187, 63259, 63387, 63470, 63655, 63851, 64020, 64195, 64294, 64424, 64518, 64752, 64948, 65113, 65267, 65380, 65501, 65615, 65688, 65754, 65837, 66050, 66154, 66311, 66488, 66568, 66657, 66784, 66878, 67037, 67076, 67140, 67264, 67406, 67616, 67698, 67848, 68073, 68375, 68492, 68608, 68877, 69050, 69199, 69361, 69536, 69647, 69918, 70130, 70345, 70475, 70548, 70702, 70949, 71010, 71136, 71337, 71473, 71637, 71887, 72009, 72094, 72251, 72440, 72536, 72578, 72698, 72863, 72973, 73104, 73179, 73233, 73370, 73472, 73562, 73716, 73855, 73941, 74045, 74075, 74275, 74400, 74497, 74605, 74724, 74943, 74990, 75033, 75170, 75241, 75409, 75464, 75531, 75634, 75761, 75942, 76041, 76175, 76409, 76450, 76585, 76739, 76820, 76964, 77035, 77071, 77163, 77242, 77287, 77376, 77468, 77558, 77599, 77734, 77826, 77979, 78070, 78115, 78193, 78355, 78518, 78597, 78727, 78831, 79009, 79222, 79349, 79430, 79560, 79616, 79708, 79821, 79901, 80061, 80170, 80304, 80427, 80481, 80551, 80646, 80786, 80969, 81247, 81310, 81341, 81388, 81424, 81534, 81691, 81843, 81993, 82144, 82280, 82368, 82466, 82593, 82693, 82801, 82886, 83007, 83164, 83363, 83515, 83631, 83755, 83874, 84077, 84131, 84272, 84407, 84525, 84641, 84757, 84850, 85061, 85185, 85243, 85308, 85371, 85533, 85656, 85721, 85860, 86020, 86185, 86438, 86576, 86815, 87075, 87269, 87606, 87798, 87839, 87917, 87999, 88187, 88305, 88481, 88766, 88824, 88920, 89045, 89159, 89305, 89416, 89577, 89672, 89774, 89897, 89961, 90069, 90142, 90391, 90515, 90631, 90777, 90870, 90937, 91050, 91183, 91360, 91450, 91594, 91648, 91767, 91836, 92011, 92175, 92257, 92479, 92610, 92736, 92792, 92958, 93105, 93237, 93306, 93398, 93519, 93673, 93941, 94145, 94251, 94290, 94406, 94546, 94813, 94974, 95140, 95305, 95575, 95658, 95753, 95901, 96046, 96195, 96249, 96368, 96435, 96536, 96615, 96796, 96989, 97101, 97218, 97320, 97422, 97560, 97654, 97771, 97938, 98119, 98353, 98512, 98576, 98629, 98849, 98980, 99118, 99188, 99338, 99458, 99589, 99814, 99914, 100002, 100094, 100200, 100265, 100400, 100490, 100600, 100726, 100928, 101156, 101336, 101431, 101511, 101717, 101900, 102013, 102072, 102172, 102251, 102375, 102616, 102889, 103060, 103336, 103450, 103558, 103621, 103817, 103921, 104064, 104256, 104353, 104572, 104677, 104810, 105007, 105272, 105414, 105691, 105780, 105924, 106097, 106242, 106381, 106442, 106508, 106641, 106807, 106883, 106974, 107228, 107256, 107362, 107457, 107629, 107745]}
+{"doc_id": "588839", "revision_depth": "1", "before_revision": "As leader Always Born (Silkheart, 1988) Homeless (Silkheart, 1988 ) Spirits Before (Silkheart, 1988) Touchin' on Trane (FMP, 1991) Repent (Knitting Factory, 1992) Translations (Silkheart, 1993) Raining Fire (Silkheart, 1993) More Live at the Knitting Factory (Knitting Factory, 1993) Consecration (Black Saint, 1993) Berlin Movement from Future Years (FMP , 1993) Abiding Variations (FMP , 1993) Live at Disobey (Blast First, 1994) Kingdom Come (Knitting Factory, 1994) Unto I AM (Victo, 1994 ) Testaments (Knitting Factory, 1995) Daily Bread (Black Saint, 1995) Delivered (2.13.61, 1997) Solo in Japan (PSF, 1997) Precious Soul (FMP, 1997 ) Ancient of Days (Knitting Factory, 1999) Jazz Solo Piano (Knitting Factory, 2000) Shout! (Clean Feed, 2003 ) No Bills ! (Long Arm Records 5057 , 2005) Time Zones (Tompkins Square, 2006) Consider The Lilies (Clean Feed, 2006) Live At The Glenn Miller Cafe (Ayler Records , 2006) Blue Shadows (Silkheart, 2007) By Any Means - Live at Crescendo (Ayler 2007) Forgiveness (Not Two Records , 2008) Our Souls (No Business Records , 2010) - Limited edition 500 numbered copies - vinyl only Streets (Northern Spy, 2012) Look Up ( ESP-Disk , 2012 , rec. 1994 ) Christ Everlasting (For Tune, 2015) Live at Jazzwerkstatt Peitz (Jazzwerkstatt, 2015) Recorded Live May 23, 2014%DIFDELCMD < ] %DIFDELCMD < %%% Live in Belgium (el Negocito, 2017) Live at Recyclart, Brussels en De Werf Bruge, Jan. 2015 Solar System (For Tune, 2017) The Alto Sessions ( el Negocito, eNR092, 2019) Charles Gayle:Alto, Giovanni Barcella:Drums, Manolo Cabras:Bass Seasons Changing (Otoroku, ROKU020, 2CD, 2019) Charles Gayle, John Edwards, Mark Sanders As sideman Buell Neidlinger: Gayle Force (K2B2 , 2015) First recording by Neidlinger in 1965%DIFDELCMD < ] %DIFDELCMD < %%% Cecil Taylor: Always a Pleasure (FMP, 1993) The Blue Humans: Live in London 1994 (Blast First, 1996) Charles Gayle plays Drums%DIFDELCMD < ] %DIFDELCMD < %%% Sunny MurrayDuo: Illuminators (Audible Hiss, 1996) Sirone Bang Ensemble: Configuration (Silkheart, 2004) Rollins Band: Weighting (2.13.61, recorded 1994 and released 2004) William ParkerBass Quartet featuring Charles Gayle: Requiem (Splasc(H), 2006) William Parker: For Those Who Are, Still (AUM Fidelity/Centering, 2015) CD 3 Ceremonies for Those Who Are Still William Parker: Centering. Unreleased Early Recordings 1976-1987 (NoBusiness Records 2012) Six CD set. Gayle on five tracks of CD3", "after_revision": "As leader Always Born (Silkheart, 1988) Homeless (Silkheart, 1989 ) Spirits Before (Silkheart, 1988) Repent (Knitting Factory, 1992) More Live at the Knitting Factory (Knitting Factory, 1993) Touchin' on Trane (FMP, 1993) Consecration (Black Saint, 1993) Raining Fire (Silkheart , 1993) Translations (Silkheart , 1993) Live at Disobey (Blast First, 1994) Kingdom Come (Knitting Factory, 1994) Unto I Am (Victo, 1995 ) Testaments (Knitting Factory, 1995) Delivered (2.13.61, 1997) Berlin Movement from Future Years (FMP, 1997) Solo in Japan (PSF, 1997) Daily Bread (Black Saint, 1998 ) Ancient of Days (Knitting Factory, 1999) Abiding Variations (FMP, 1999) Jazz Solo Piano (Knitting Factory, 2001) Precious Soul (FMP, 2001 ) No Bills (Long Arms , 2005) Shout! (Clean Feed, 2005) Time Zones (Tompkins Square, 2006) Live at Glenn Miller Cafe (Ayler , 2006) Consider the Lilies (Clean Feed, 2006) Blue Shadows (Silkheart, 2007) Forgiveness (Not Two , 2008) Our Souls : Live in Vilnius (NoBusiness , 2010) Streets (Northern Spy, 2012) Look Up ( ESP Disk , 2012 ) Christ Everlasting (For Tune, 2015) %DIFDELCMD < ] %DIFDELCMD < %%% Solar System (For Tune, 2017) Seasons Changing (Otoroku 2019) The Alto Sessions ( El Negocito, 2019) As sideman Sunny Murray , %DIFDELCMD < ] %DIFDELCMD < %%% %DIFDELCMD < ] %DIFDELCMD < %%% Illuminators (Audible Hiss, 1996) William Parker, Requiem (Splasc(H), 2006) Henry Rollins, Everything (2.13.61, 1996) Henry Rollins, Weighting (2.13.61, 2003) Cecil Taylor, Always a Pleasure (FMP, 1996)", "edit_actions": [{"type": "R", "before": "1988", "after": "1989", "start_char_pos": 61, "end_char_pos": 65}, {"type": "D", "before": "Touchin' on Trane (FMP, 1991)", "after": null, "start_char_pos": 101, "end_char_pos": 130}, {"type": "D", "before": "Translations (Silkheart, 1993) Raining Fire (Silkheart, 1993)", "after": null, "start_char_pos": 163, "end_char_pos": 224}, {"type": "A", "before": null, "after": "Touchin' on Trane (FMP, 1993)", "start_char_pos": 284, "end_char_pos": 284}, {"type": "R", "before": "Berlin Movement from Future Years (FMP", "after": "Raining Fire (Silkheart", "start_char_pos": 318, "end_char_pos": 356}, {"type": "R", "before": "Abiding Variations (FMP", "after": "Translations (Silkheart", "start_char_pos": 365, "end_char_pos": 388}, {"type": "R", "before": "AM", "after": "Am", "start_char_pos": 478, "end_char_pos": 480}, {"type": "R", "before": "1994", "after": "1995", "start_char_pos": 489, "end_char_pos": 493}, {"type": "D", "before": "Daily Bread (Black Saint, 1995)", "after": null, "start_char_pos": 532, "end_char_pos": 563}, {"type": "A", "before": null, "after": "Berlin Movement from Future Years (FMP, 1997)", "start_char_pos": 590, "end_char_pos": 590}, {"type": "R", "before": "Precious Soul (FMP, 1997", "after": "Daily Bread (Black Saint, 1998", "start_char_pos": 617, "end_char_pos": 641}, {"type": "A", "before": null, "after": "Abiding Variations (FMP, 1999)", "start_char_pos": 685, "end_char_pos": 685}, {"type": "R", "before": "2000) Shout! (Clean Feed, 2003", "after": "2001) Precious Soul (FMP, 2001", "start_char_pos": 721, "end_char_pos": 751}, {"type": "R", "before": "! (Long Arm Records 5057", "after": "(Long Arms", "start_char_pos": 763, "end_char_pos": 787}, {"type": "A", "before": null, "after": "Shout! (Clean Feed, 2005)", "start_char_pos": 796, "end_char_pos": 796}, {"type": "R", "before": "Consider The Lilies (Clean Feed, 2006) Live At The", "after": "Live at", "start_char_pos": 832, "end_char_pos": 882}, {"type": "D", "before": "Records", "after": null, "start_char_pos": 908, "end_char_pos": 915}, {"type": "A", "before": null, "after": "Consider the Lilies (Clean Feed, 2006)", "start_char_pos": 924, "end_char_pos": 924}, {"type": "D", "before": "By Any Means - Live at Crescendo (Ayler 2007)", "after": null, "start_char_pos": 956, "end_char_pos": 1001}, {"type": "D", "before": "Records", "after": null, "start_char_pos": 1023, "end_char_pos": 1030}, {"type": "R", "before": "(No Business Records", "after": ": Live in Vilnius (NoBusiness", "start_char_pos": 1049, "end_char_pos": 1069}, {"type": "D", "before": "- Limited edition 500 numbered copies - vinyl only", "after": null, "start_char_pos": 1078, "end_char_pos": 1128}, {"type": "R", "before": "ESP-Disk", "after": "ESP Disk", "start_char_pos": 1168, "end_char_pos": 1176}, {"type": "D", "before": ", rec. 1994", "after": null, "start_char_pos": 1184, "end_char_pos": 1195}, {"type": "D", "before": "Live at Jazzwerkstatt Peitz (Jazzwerkstatt, 2015)", "after": null, "start_char_pos": 1234, "end_char_pos": 1283}, {"type": "D", "before": "Recorded Live May 23, 2014", "after": null, "start_char_pos": 1284, "end_char_pos": 1310}, {"type": "D", "before": "Live in Belgium (el Negocito, 2017)", "after": null, "start_char_pos": 1342, "end_char_pos": 1377}, {"type": "D", "before": "Live at Recyclart, Brussels en De Werf Bruge, Jan. 2015", "after": null, "start_char_pos": 1378, "end_char_pos": 1433}, {"type": "A", "before": null, "after": "Seasons Changing (Otoroku 2019)", "start_char_pos": 1464, "end_char_pos": 1464}, {"type": "R", "before": "el Negocito, eNR092,", "after": "El Negocito,", "start_char_pos": 1485, "end_char_pos": 1505}, {"type": "D", "before": "Charles Gayle:Alto, Giovanni Barcella:Drums, Manolo Cabras:Bass Seasons Changing (Otoroku, ROKU020, 2CD, 2019) Charles Gayle, John Edwards, Mark Sanders", "after": null, "start_char_pos": 1512, "end_char_pos": 1664}, {"type": "R", "before": "Buell Neidlinger: Gayle Force (K2B2", "after": "Sunny Murray", "start_char_pos": 1676, "end_char_pos": 1711}, {"type": "D", "before": "2015)", "after": null, "start_char_pos": 1714, "end_char_pos": 1719}, {"type": "D", "before": "First recording by Neidlinger in 1965", "after": null, "start_char_pos": 1720, "end_char_pos": 1757}, {"type": "D", "before": "Cecil Taylor: Always a Pleasure (FMP, 1993) The Blue Humans: Live in London 1994 (Blast First, 1996)", "after": null, "start_char_pos": 1789, "end_char_pos": 1889}, {"type": "D", "before": "Charles Gayle plays Drums", "after": null, "start_char_pos": 1890, "end_char_pos": 1915}, {"type": "D", "before": "Sunny MurrayDuo:", "after": null, "start_char_pos": 1947, "end_char_pos": 1963}, {"type": "R", "before": "Sirone Bang Ensemble: Configuration (Silkheart, 2004) Rollins Band: Weighting (2.13.61, recorded 1994 and released 2004) William ParkerBass Quartet featuring Charles Gayle:", "after": "William Parker,", "start_char_pos": 1998, "end_char_pos": 2170}, {"type": "R", "before": "William Parker: For Those Who Are, Still (AUM Fidelity/Centering, 2015) CD 3 Ceremonies for Those Who Are Still William Parker: Centering. Unreleased Early Recordings 1976-1987 (NoBusiness Records 2012) Six CD set. Gayle on five tracks of CD3", "after": "Henry Rollins, Everything (2.13.61, 1996) Henry Rollins, Weighting (2.13.61, 2003) Cecil Taylor, Always a Pleasure (FMP, 1996)", "start_char_pos": 2197, "end_char_pos": 2439}], "sents_char_pos": [0, 39, 100, 130, 162, 193, 224, 283, 317, 364, 396, 432, 470, 531, 970, 1079, 1117, 1526, 1550, 1571, 1693, 1802, 1849, 2335, 2411]}
+{"doc_id": "59666607", "revision_depth": "2", "before_revision": "300x300px|Costume shop at the Metropolitan Opera A costume shop is where costumes for theatrical or film productions are designed, built, and stored for the company or production. Some jobs of those who work in a costume shop are designers, builders, seamstresses and stitchers . The shops themselves can all vary in size, from one large room to a house with multiple floors. Costumes from past productions, fabric, jewelry and accessories are all often stored in the shop as well . Purpose Costume shops are all shapes and sizes, however, what they have in common is what makes them an integral part of a theater space. Every costume shop is where the costumes worn on stage for a production are built. Some costume shops have washers for cleaning costumes, fitting rooms, racks for storage or spaces for designers to conceptualize a costume. Some shops allow you to rent their costumes. However the most common and main purpose for a costume shop is for building and finishing pieces that go onstage. There is no standard layout for costume shops though most have stations for stitching or surging, cutting tables, fabric storage, and finishing tables. A large an expansive costume shop style helps work to enable productions to be mounted lavishly and permit study and experimentation at the same time.Clark, John. \u201cCreative Arts School in a Liberal Arts College: The Drama Program at San Francisco State College.\u201d Educational Theatre Journal, vol. 18, no. 2, 1966, pp. 108\u2013109. . The process of building a costume requires many steps and stations, for which the costume designer first conceptualizes.Covey, Ingham, Liz, Rosemary (1992). The Costume Designer's Handbook. Portsmouth, NH: Heinemann. pp. 15\u2013100. But before building can begin, the designer must choose where the costumes will come from. 381x381px|Costume storage at the Radio City Music Hall Once the show is designed, pieces can come from a multitude of places, but there are commonly four options:Brockett, Hildy, Oscar G., Franklin J. (2007). History of the Theatre. USA: Pearson Education Inc. p. 211. . Rented, either from other theatres, businesses, or individuals Pulled, which refers to searching through a costume shops stock. \u2018Pulling\u2019 from the rack of stored costumes. Constructed, ones that the designer and costume shop create themselves. Shopped, items that can be purchased from outside sources. The costume shop will search, place orders, create, organize, and dole out the costumes for each production and each character in the manner that best fits the costume and production itself. For instance, not every shoe is cobbled in the shop, or 'in house,' some are bought and some are borrowed. It is the costume shops purpose to handle this feat. Jobs within Within a costume shop there are a multitude of people working on different parts of the creative or accumulative process , depending on the size of the theatre or company will determine if each job goes to one person, if a group of individuals share more than one job, or if everyone pitches in on everything. Costume designer The costume designer is an integral part of the production's creative team. Each costume designer is exactly the same, however they work closely with the director to develop a look for the actors onstage that best serves the plot of the play and concept the director has envisioned. \"The Costume Designer seeks inspiration from many sources, including interviews with the actors who will play the characters, and extensive historical and visual research.\" Depending on if the Costume Designer is a permanent position or is a by production hire will determine if they are considered the head of the costume department or shop Assistant designer The assistant designer helps the head designer with the jobs that must be completed. This includes but is not limited to : research, shopping, rental acquisition and fittings for actors. Stitcher (sewer, seamstress, costume builder) A stitcher works on the actual construction of the costumes. The Stitcher will sometimes assist during fittings to help with pinning and alterations. They are the entry-level position in a costume shop and are often the most common job that is open in a space. A stitcher will help pick up wherever needed, often stretching out from fittings, pinning, and alteration, to textiles, dye working and errands.", "after_revision": "300x300px|Costume shop at the Metropolitan Opera A costume shop is a space where costumes for theatrical or film productions are designed, built, and stored for the company or production. Costume designers, builders, seamstresses , and stitchers work in costume shops . The shops themselves can vary in size, from one large room to a house with multiple floors. Costumes from past productions, fabric, jewelry and accessories are often stored in the shop . Purpose A costume shop is where the costumes worn on stage for a production are built. Some costume shops have washers for cleaning costumes, fitting rooms, racks for storage or spaces for designers to conceptualize a costume. Some shops allow rentals of their costumes. However , the most common and primary purpose for a costume shop is for building and finishing pieces that go onstage. There is no standard layout for costume shops , though most have stations for stitching or surging, cutting tables, fabric storage, and finishing tables. A large an expansive costume shop style helps work to enable productions to be mounted lavishly and permit study and experimentation at the same time.Clark, John. \u201cCreative Arts School in a Liberal Arts College: The Drama Program at San Francisco State College.\u201d Educational Theatre Journal, vol. 18, no. 2, 1966, pp. 108\u2013109. . The process of building a costume requires many steps and stations, which the costume designer first conceptualizes.Covey, Ingham, Liz, Rosemary (1992). The Costume Designer's Handbook. Portsmouth, NH: Heinemann. pp. 15\u2013100. But before building can begin, the designer must choose where the costumes will come from. 381x381px|Costume storage at the Radio City Music Hall Once the show is designed, pieces can come from a multitude of places, but there are commonly four options:Brockett, Hildy, Oscar G., Franklin J. (2007). History of the Theatre. USA: Pearson Education Inc. p. 211. . Rented, either from other theatres, businesses, or individuals Pulled, which refers to searching through a costume shops stock. That is, \"pulling\" from the rack of stored costumes. Constructed, ones that the designer and costume shop create themselves. Shopped, items that can be purchased from outside sources. The costume shop will search, place orders, create, organize, and dole out the costumes for each production and each character in the manner that best fits the costume and production itself. For instance, not every shoe is cobbled in the shop, or \"in house\"; some are bought and some are borrowed. Jobs within Within a costume shop , there are people working on different parts of the creative or accumulative process . The size of the theatre or company will determine whether each job goes to one person, if a group of individuals share more than one job, or if everyone pitches in on everything. Costume designer The costume designer is an integral part of the production's creative team. They work closely with the director to develop a look for the actors onstage that best serves the plot of the play and concept the director has envisioned. \"The Costume Designer seeks inspiration from many sources, including interviews with the actors who will play the characters, and extensive historical and visual research.\" Whether the costume designer is a permanent position or a by-production hire will determine whether they are considered the head of the costume department or shop Assistant designer The assistant designer helps the head designer with the jobs that must be completed. This includes but is not limited to research, shopping, rental acquisition and fittings for actors. Stitcher (sewer, seamstress, costume builder) A stitcher works on the actual construction of the costumes. The stitcher will sometimes assist during fittings to help with pinning and alterations. This is the entry-level position in a costume shop and often the most common job that is open in a space. A stitcher will help pick up wherever needed, often stretching out from fittings, pinning, and alteration, to textiles, dye working and errands.", "edit_actions": [{"type": "A", "before": null, "after": "a space", "start_char_pos": 67, "end_char_pos": 67}, {"type": "R", "before": "Some jobs of those who work in a costume shop are", "after": "Costume", "start_char_pos": 181, "end_char_pos": 230}, {"type": "R", "before": "and stitchers", "after": ", and stitchers work in costume shops", "start_char_pos": 265, "end_char_pos": 278}, {"type": "D", "before": "all", "after": null, "start_char_pos": 306, "end_char_pos": 309}, {"type": "D", "before": "all", "after": null, "start_char_pos": 445, "end_char_pos": 448}, {"type": "D", "before": "as well", "after": null, "start_char_pos": 474, "end_char_pos": 481}, {"type": "R", "before": "Costume shops are all shapes and sizes, however, what they have in common is what makes them an integral part of a theater space. Every", "after": "A", "start_char_pos": 492, "end_char_pos": 627}, {"type": "R", "before": "you to rent", "after": "rentals of", "start_char_pos": 862, "end_char_pos": 873}, {"type": "A", "before": null, "after": ",", "start_char_pos": 898, "end_char_pos": 898}, {"type": "R", "before": "main", "after": "primary", "start_char_pos": 919, "end_char_pos": 923}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1051, "end_char_pos": 1051}, {"type": "D", "before": "for", "after": null, "start_char_pos": 1555, "end_char_pos": 1558}, {"type": "R", "before": "\u2018Pulling\u2019", "after": "That is, \"pulling\"", "start_char_pos": 2206, "end_char_pos": 2215}, {"type": "R", "before": "'in house,'", "after": "\"in house\";", "start_char_pos": 2628, "end_char_pos": 2639}, {"type": "D", "before": "It is the costume shops purpose to handle this feat.", "after": null, "start_char_pos": 2679, "end_char_pos": 2731}, {"type": "R", "before": "there are a multitude of", "after": ", there are", "start_char_pos": 2766, "end_char_pos": 2790}, {"type": "R", "before": ", depending on the", "after": ". The", "start_char_pos": 2865, "end_char_pos": 2883}, {"type": "R", "before": "if", "after": "whether", "start_char_pos": 2930, "end_char_pos": 2932}, {"type": "R", "before": "Each costume designer is exactly the same, however they", "after": "They", "start_char_pos": 3147, "end_char_pos": 3202}, {"type": "R", "before": "Depending on if the Costume Designer", "after": "Whether the costume designer", "start_char_pos": 3527, "end_char_pos": 3563}, {"type": "R", "before": "is a by production", "after": "a by-production", "start_char_pos": 3591, "end_char_pos": 3609}, {"type": "R", "before": "if", "after": "whether", "start_char_pos": 3630, "end_char_pos": 3632}, {"type": "D", "before": ":", "after": null, "start_char_pos": 3836, "end_char_pos": 3837}, {"type": "R", "before": "Stitcher", "after": "stitcher", "start_char_pos": 4013, "end_char_pos": 4021}, {"type": "R", "before": "They are", "after": "This is", "start_char_pos": 4098, "end_char_pos": 4106}, {"type": "D", "before": "are", "after": null, "start_char_pos": 4154, "end_char_pos": 4157}], "sents_char_pos": [0, 180, 280, 376, 621, 704, 844, 889, 1004, 1157, 1308, 1320, 1420, 1607, 1643, 1676, 1715, 1806, 2015, 2039, 2205, 2249, 2321, 2380, 2571, 2678, 2731, 3053, 3146, 3353, 3526, 3799, 3901, 4008, 4097, 4208]}
+{"doc_id": "600500", "revision_depth": "1", "before_revision": "The original method was that a group of analysts would generate simulation games for policy makers. The methods combine known factsabout the future , such as demographics, geography , military, political, industrial information, and mineral reserves, with key driving forces identified by considering social, technical, economic, environmental, and political ( STEEP ) trends. In business applications, that sole emphasis on understanding the behavior of opponents was reduced (shifting more toward a game against nature) . At Royal Dutch / Shell for example, scenario planning was viewed as changing mindsets about the exogenous part of the world , prior to formulating specific strategies. Scenario planning may involve aspects of systems thinking, specifically the recognition that many factors may combine in complex ways to create sometime surprising futures (due to non-linear feedback loops). The method also allows the inclusion of factors that are difficult to formalize, such as novel insights about the future, deep shifts in values, unprecedented regulations or inventions. Systems thinking used in conjunction with scenario planning leads to plausible scenario storylines because the causal relationship between factors can be demonstrated. In these caseswhen scenario planning is integrated with a systems thinking approach to scenario development, it is sometimes referred to as dynamic scenarios . Another challenge of scenario-building is that \"predictors are part of the social context about which they are trying to make a prediction and may influence that context in the process\". As a consequence, societal predictions can become self-destructing. For example, a scenario in which a large percentage of a population will become HIV infected based on existing trends may cause more people to avoid risky behavior and thus reduce the HIV infection rate, invalidating the forecast (which might have remained correct if it had not been publicly known). Or, a prediction that cybersecurity will become a major issue may cause organizations to implement more security cybersecurity measures, thus limiting the issue. Principle Crafting scenarios These combinations and permutations of fact and related social changes are called \"scenarios\". The scenarios usually include plausible, but unexpectedly important situations and problems that exist in some small form in the present day. Any particular scenario is unlikely. However, future studies analysts select scenario features so they are both possible and uncomfortable. Scenario planning helps policy-makers and firms anticipate change, prepare a responses, and create more robust strategies.", "after_revision": "In the most common application of the method, analysts generate simulation games for policy makers. The method combines known facts , such as demographics, geography and mineral reserves, with military, political, and industrial information, and key driving forces identified by considering social, technical, economic, environmental, and political ( \"STEEP\" ) trends. In business applications, the emphasis on understanding the behavior of opponents has been reduced while more attention is now paid to changes in the natural environment . At Royal Dutch Shell for example, scenario planning has been described as changing mindsets about the exogenous part of the world prior to formulating specific strategies. Scenario planning may involve aspects of systems thinking, specifically the recognition that many factors may combine in complex ways to create sometimes surprising futures (due to non-linear feedback loops). The method also allows the inclusion of factors that are difficult to formalize, such as novel insights about the future, deep shifts in values, and unprecedented regulations or inventions. Systems thinking used in conjunction with scenario planning leads to plausible scenario storylines because the causal relationship between factors can be demonstrated. These cases, in which scenario planning is integrated with a systems thinking approach to scenario development, are sometimes referred to as \"dynamic scenarios\" . A challenge and a strength of scenario-building is that \"predictors are part of the social context about which they are trying to make a prediction and may influence that context in the process\". As a consequence, societal predictions can become self-destructing. For example, a scenario in which a large percentage of a population will become HIV infected based on existing trends may cause more people to avoid risky behavior and thus reduce the HIV infection rate, invalidating the forecast (which might have remained correct if it had not been publicly known). Or, a prediction that cybersecurity will become a major issue may cause organizations to implement more security cybersecurity measures, thus limiting the issue. Principle Crafting scenarios Combinations and permutations of fact and related social changes are called \"scenarios\". Scenarios usually include plausible, but unexpectedly important , situations and problems that exist in some nascent form in the present day. Any particular scenario is unlikely. However, future studies analysts select scenario features so they are both possible and uncomfortable. Scenario planning helps policy-makers and firms anticipate change, prepare a responses, and create more robust strategies.", "edit_actions": [{"type": "R", "before": "The original method was that a group of analysts would", "after": "In the most common application of the method, analysts", "start_char_pos": 0, "end_char_pos": 54}, {"type": "R", "before": "methods combine known factsabout the future", "after": "method combines known facts", "start_char_pos": 104, "end_char_pos": 147}, {"type": "R", "before": ",", "after": "and mineral reserves, with", "start_char_pos": 182, "end_char_pos": 183}, {"type": "A", "before": null, "after": "and", "start_char_pos": 205, "end_char_pos": 205}, {"type": "D", "before": "mineral reserves, with", "after": null, "start_char_pos": 234, "end_char_pos": 256}, {"type": "R", "before": "STEEP", "after": "\"STEEP\"", "start_char_pos": 362, "end_char_pos": 367}, {"type": "R", "before": "that sole", "after": "the", "start_char_pos": 404, "end_char_pos": 413}, {"type": "R", "before": "was reduced (shifting more toward a game against nature)", "after": "has been reduced while more attention is now paid to changes in the natural environment", "start_char_pos": 466, "end_char_pos": 522}, {"type": "D", "before": "/", "after": null, "start_char_pos": 540, "end_char_pos": 541}, {"type": "R", "before": "was viewed", "after": "has been described", "start_char_pos": 579, "end_char_pos": 589}, {"type": "D", "before": ",", "after": null, "start_char_pos": 649, "end_char_pos": 650}, {"type": "R", "before": "sometime", "after": "sometimes", "start_char_pos": 837, "end_char_pos": 845}, {"type": "A", "before": null, "after": "and", "start_char_pos": 1046, "end_char_pos": 1046}, {"type": "R", "before": "In these caseswhen", "after": "These cases, in which", "start_char_pos": 1256, "end_char_pos": 1274}, {"type": "R", "before": "it is", "after": "are", "start_char_pos": 1365, "end_char_pos": 1370}, {"type": "R", "before": "dynamic scenarios", "after": "\"dynamic scenarios\"", "start_char_pos": 1396, "end_char_pos": 1413}, {"type": "R", "before": "Another challenge", "after": "A challenge and a strength", "start_char_pos": 1416, "end_char_pos": 1433}, {"type": "R", "before": "These combinations", "after": "Combinations", "start_char_pos": 2163, "end_char_pos": 2181}, {"type": "R", "before": "The scenarios", "after": "Scenarios", "start_char_pos": 2258, "end_char_pos": 2271}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2326, "end_char_pos": 2326}, {"type": "R", "before": "small", "after": "nascent", "start_char_pos": 2370, "end_char_pos": 2375}], "sents_char_pos": [0, 99, 377, 524, 692, 900, 1087, 1255, 1415, 1602, 1670, 1971, 2133, 2257, 2400, 2437, 2540]}
+{"doc_id": "60082231", "revision_depth": "1", "before_revision": "Neuroscience nursing is a distinctive area within the discipline of nursing. Neuroscience nursing focuses on the care of individuals with brain, spine and nervous system disorders. Neuroscience nurses work in a wide range of settings from academic medical centers to skilled nursing facilities, rehabilitation units to epilepsy monitoring units. Neuroscience nurses can be found in virtually any setting that nurses practice.Clement, I., 2015 19th century The first reports of nurses providing direct care to patients with neurological diseases came out of France and England in the late 19th century. Nurses observed Sir Victor Horsley's first operation at the National Hospital for the Paralysed and Epileptic in London.Hartshorn , 1986 To have the skills necessary to care for the complex patient population nurses at the time knew they needed specialized training. At the time training there was no formal training and to gain specialized knowledge nurses at the time only had informal training that was provided by physicians sharing their knowledge. Around the same time, neuroscience nursing started to emerge in the United States as a nursing specialty. The emergence of neuroscience nursing is do in part to Dr. Charles Karsner Mills, a physician at Philadelphia General Hospital. Dr. Mills would hold lectures for nurses on the care of patients with neurological diseases. In 1889 the content of these lectures was collected and The Nursing and Care of the Nervous and the Insane was published, thought to be the first textbook on neuroscience nursing.Collins , 1911 20th century In 1910, Amy Hilliard became the first superintendent of the nurses at the New York Neurological Institute. Ms. Hilliard went on to organize the first post-graduate courses that focused on neuroscience nursing. Though these courses continued to be led by physicians. It was not until the 1960s that neuroscience nursing courses were taught by specialty trained nurses with the University of California School of Nursing in San Francisco and the New York Medical College in New York leading the way in training neuroscience nurses. American Association of Neuroscience Nursing In 1968 the American Association of Neurosurgical Nurses (AANN) was founded. The creation of AANN was a collaboration between Barbara Therrien, a nurse instructor at Barnes Hospital in St. Louis Missouri and Dr. Henry Schwartz the president of the American Association of Neuroscience Surgeons. A colleague of Dr. Henry presented the idea to Agnes M. Marshall. The inaugural AANN education conference was held in Chicago in 1968 with a little over 100 nurses in attendance.Spokes, 2008 In 1970 AANN applied for membership into the World Federation of Neurosurgical Societies and was the first nursing organization accepted. Since the founding of AANN it has been the leading authority in neuroscience nursing. Today AANN has over 5,200 members worldwide.Bader, Littlejohns, Olson, 2016 In 1977 AANN published their first textbook dedicated to educating nurses on the specialty field of neuroscience nursing. With updates in 1984, 1990, 2004, and 2010. The current version, released in 2016, continues to expand the field of neuroscience nursing by educating new and experienced nurses in this distinct field that requires a combination of knowledge and meticulous assessment skills. American Board of Neuroscience Nursing The American Board of Neuroscience Nursing (ABNN) was created under the supervision of the AANN. The ABNN was created to develop certification specifically for neuroscience nursing. The first certification offered by ABNN was the Certified Neuroscience Registered Nurse (CNRN). This certification was developed and initially offered to nurses in 1978. In 2013, ABNN again in collaboration with AANN, developed and offered a certification as Stroke Certified Registered Nurse (SCRN). \"Our History, n.d. Journals Journal of Neuroscience Nursing (JNN) is the official journal of AANN. This journal contains original articles specific to the nursing care and techniques for the specialty population of neurology and neurosurgery. The articles within the journal are applicable to all health care professionals who work across the continuum of care of the neuroscience patients. References Bader, M.K., Littlejohns, L.R, and Olson, D. M., (2016). AANN Core Curriculum for Neuroscience Nursing. Chicago: American Association of Neuroscience Nurses Clement, I., (2015). Textbook on Neurological Neurosurgical Nursing. London: JP Medical. Collins J: Nursing in nervous diseases: The teaching in neurological hospital. AJN 11:434, 1911 Hartshorn JC: Aspects of the historical development of neuroscience nursing. J Neurosci Nurs 18:45-48, 1986 Our History. (n.d.). Retrieved from URL Spokes, M., (2008). American Association of Neuroscience Nurses. Retrieved from URL", "after_revision": "Neuroscience nursing is a distinctive area within the discipline of nursing. It focuses on the care of individuals with brain, spine and nervous system disorders. Neuroscience nurses work in a wide range of settings from academic medical centers to skilled nursing facilities, rehabilitation units to epilepsy monitoring units. Neuroscience nurses can be found in virtually any setting that nurses practice.Clement, I., ( 2015 ). Textbook on Neurological Neurosurgical Nursing. London: JP Medical. 19th century The first reports of nurses providing direct care to patients with neurological diseases came out of France and England in the late 19th century. Nurses observed Sir Victor Horsley's first operation at the National Hospital for the Paralysed and Epileptic in London.Hartshorn JC: Aspects of the historical development of neuroscience nursing. J Neurosci Nurs 18:45-48 , 1986 To have the skills necessary to care for the complex patient population nurses at the time knew they needed specialized training. At the time training there was no formal training and to gain specialized knowledge nurses at the time only had informal training that was provided by physicians sharing their knowledge. Around the same time, neuroscience nursing started to emerge in the United States as a nursing specialty. The emergence of neuroscience nursing is due in part to Dr. Charles Karsner Mills, a physician at Philadelphia General Hospital. He held lectures for nurses on the care of patients with neurological diseases. In 1889 the content of these lectures was collected and The Nursing and Care of the Nervous and the Insane was published, thought to be the first textbook on neuroscience nursing.Collins J: Nursing in nervous diseases: The teaching in neurological hospital. AJN 11:434 , 1911 20th century In 1910, Amy Hilliard became the first superintendent of the nurses at the New York Neurological Institute. She went on to organize the first post-graduate courses that focused on neuroscience nursing. These courses continued to be led by physicians. It was not until the 1960s that neuroscience nursing courses were taught by specialty trained nurses , with the University of California School of Nursing in San Francisco and the New York Medical College in New York leading the way in training neuroscience nurses. American Association of Neuroscience Nursing In 1968 the American Association of Neurosurgical Nurses (AANN) was founded. The creation of AANN was a collaboration between Barbara Therrien, a nurse instructor at Barnes Hospital in St. Louis Missouri and Dr. Henry Schwartz , the president of the American Association of Neuroscience Surgeons. A colleague of Dr. Henry presented the idea to Agnes M. Marshall. The inaugural AANN education conference was held in Chicago in 1968 , with over 100 nurses in attendance.Spokes, M., ( 2008 ). American Association of Neuroscience Nurses. Retrieved from URL In 1970 AANN applied for membership into the World Federation of Neurosurgical Societies and was the first nursing organization accepted. Since the founding of AANN it has been the leading authority in neuroscience nursing. Today AANN has over 5,200 members worldwide.Bader, M.K., Littlejohns, L.R, and Olson, D. M., ( 2016 ). AANN Core Curriculum for Neuroscience Nursing. Chicago: American Association of Neuroscience Nurses In 1977 AANN published its first textbook dedicated to educating nurses on the specialty field of neuroscience nursing. It published updates in 1984, 1990, 2004, and 2010. The current version, released in 2016, continues to expand the field of neuroscience nursing by educating new and experienced nurses in this distinct field that requires a combination of knowledge and meticulous assessment skills. American Board of Neuroscience Nursing The American Board of Neuroscience Nursing (ABNN) was created under the supervision of the AANN. It was created to develop certification specifically for neuroscience nursing. The first certification offered by ABNN was the Certified Neuroscience Registered Nurse (CNRN). This certification was developed and initially offered to nurses in 1978. In 2013, ABNN , again in collaboration with AANN, developed and offered a certification as Stroke Certified Registered Nurse (SCRN). Our History. ( n.d. ) Retrieved from URL Journals Journal of Neuroscience Nursing (JNN) is the official journal of AANN. It contains original articles specific to the nursing care and techniques for the specialty population of neurology and neurosurgery. The articles within the journal are applicable to all health care professionals who work across the continuum of care of the neuroscience patients. References ", "edit_actions": [{"type": "R", "before": "Neuroscience nursing", "after": "It", "start_char_pos": 77, "end_char_pos": 97}, {"type": "A", "before": null, "after": "(", "start_char_pos": 438, "end_char_pos": 438}, {"type": "A", "before": null, "after": "). Textbook on Neurological", "start_char_pos": 444, "end_char_pos": 444}, {"type": "A", "before": null, "after": "Neurosurgical Nursing. London: JP Medical.", "start_char_pos": 445, "end_char_pos": 445}, {"type": "A", "before": null, "after": "JC: Aspects of the historical development of neuroscience nursing. J Neurosci Nurs 18:45-48", "start_char_pos": 735, "end_char_pos": 735}, {"type": "R", "before": "do", "after": "due", "start_char_pos": 1207, "end_char_pos": 1209}, {"type": "R", "before": "Dr. Mills would hold", "after": "He held", "start_char_pos": 1294, "end_char_pos": 1314}, {"type": "A", "before": null, "after": "J: Nursing in nervous diseases: The teaching in neurological hospital. AJN 11:434", "start_char_pos": 1574, "end_char_pos": 1574}, {"type": "R", "before": "Ms. Hilliard", "after": "She", "start_char_pos": 1703, "end_char_pos": 1715}, {"type": "R", "before": "Though these", "after": "These", "start_char_pos": 1806, "end_char_pos": 1818}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1963, "end_char_pos": 1963}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2399, "end_char_pos": 2399}, {"type": "R", "before": "with a little", "after": ", with", "start_char_pos": 2602, "end_char_pos": 2615}, {"type": "A", "before": null, "after": "M., (", "start_char_pos": 2654, "end_char_pos": 2654}, {"type": "A", "before": null, "after": "). American Association of Neuroscience Nurses. Retrieved from URL", "start_char_pos": 2660, "end_char_pos": 2660}, {"type": "D", "before": "Littlejohns,", "after": null, "start_char_pos": 2936, "end_char_pos": 2948}, {"type": "R", "before": "Olson,", "after": "M.K., Littlejohns, L.R, and Olson, D. M., (", "start_char_pos": 2949, "end_char_pos": 2955}, {"type": "A", "before": null, "after": "). AANN Core Curriculum for Neuroscience Nursing. Chicago: American Association of Neuroscience Nurses", "start_char_pos": 2961, "end_char_pos": 2961}, {"type": "R", "before": "their", "after": "its", "start_char_pos": 2985, "end_char_pos": 2990}, {"type": "R", "before": "With", "after": "It published", "start_char_pos": 3084, "end_char_pos": 3088}, {"type": "R", "before": "The ABNN", "after": "It", "start_char_pos": 3495, "end_char_pos": 3503}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3764, "end_char_pos": 3764}, {"type": "R", "before": "\"Our History,", "after": "Our History. (", "start_char_pos": 3882, "end_char_pos": 3895}, {"type": "A", "before": null, "after": ") Retrieved from URL", "start_char_pos": 3901, "end_char_pos": 3901}, {"type": "R", "before": "This journal", "after": "It", "start_char_pos": 3982, "end_char_pos": 3994}, {"type": "D", "before": "Bader, M.K., Littlejohns, L.R, and Olson, D. M., (2016). AANN Core Curriculum for Neuroscience Nursing. Chicago: American Association of Neuroscience Nurses Clement, I., (2015). Textbook on Neurological", "after": null, "start_char_pos": 4285, "end_char_pos": 4487}, {"type": "D", "before": "Neurosurgical Nursing. London: JP Medical. Collins J: Nursing in nervous diseases: The teaching in neurological hospital. AJN 11:434, 1911 Hartshorn JC: Aspects of the historical development of neuroscience nursing. J Neurosci Nurs 18:45-48, 1986 Our History. (n.d.). Retrieved from URL Spokes, M., (2008). American Association of Neuroscience Nurses. Retrieved from URL", "after": null, "start_char_pos": 4488, "end_char_pos": 4858}], "sents_char_pos": [0, 76, 180, 345, 425, 604, 725, 872, 1059, 1165, 1293, 1386, 1566, 1702, 1805, 1861, 2126, 2248, 2467, 2533, 2646, 2798, 2884, 2929, 3083, 3127, 3358, 3494, 3579, 3675, 3749, 3981, 4125, 4273, 4341, 4388, 4462, 4510, 4530, 4609, 4703, 4747, 4794, 4839]}
+{"doc_id": "60186346", "revision_depth": "1", "before_revision": "L\u00fcshi Chunqiu The c. 239 BCE L\u00fcshi Chunqiu (Master L\u00fc's Spring and Autumn Annals) is an encyclopedic text compiled under the patronage of the Qin dynasty Chancellor L\u00fc Buwei. This book and the Zhuangzi have almost identical descriptions of using the marquis of Sui's pearl as a crossbow pellet in order illustrate foolishly losing much and gaining little. As a general principle, whenever a sage is about to initiate anything, he is certain to consider carefully how his means relate to what he hopes to achieve. Now if a man were to use the pearl of the Marquis of Sui [\u96a8\u4faf\u4e4b\u73e0] as a pellet to shoot at a sparrow a thousand yards up in the air, the world would surely ridicule him. Why is that? Because what he used as shot was so valuable, while what he wanted was so trifling. And, surely, life is much more valuable than the pearl of the Marquis of Sui! (tr. Knoblock and Riegel 2000: 82) \"A Mountain of Persuasions\" chapter mentions marquis Sui's legendary pearl twice with Mr. He's jade-disk. The former explains the essence of Chinese jade. When a piece of jade is moistened, it looks bright. [When struck], its sound is slow and harmonious. How expansive are its aspects! With no interior or exterior, it does not conceal its flaws or imperfections. Close up, it looks glossy; from a distance, it shines brightly. It reflects like a mirror revealing the pupil of your eye. Subtly it picks up the tip of an autumn hair. It brightly illuminates the dark and obscure. Thus the jade disk of Mr. He [\u548c\u6c0f\u4e4b\u74a7] and the pearl of the marquis of Sui [\u96a8\u4faf\u4e4b\u73e0] emerged from the essence of a mountain and a spring. When the Superior Man wears them, he complies with their purity and secures his repose. When lords and kings treasure them, they rectify the world. ( 16 , tr. Major et al. 2010: 631 ) The latter says understanding is more important than wealth, \"Acquiring an army of ten thousand men does not compare to hearing one word that is apposite; / Acquiring the pearl of the marquis of Sui [\u96a8\u4faf\u4e4b\u73e0] does not compare to understanding from whence events arise. / Acquiring the jade disk of Mr. Gua [\u54bc\u6c0f\u4e4b\u74a7] does not compare to understanding where events will lead . \" ( 16 , tr .Major et al. 2010 : 652). Two other chapters figuratively use the legendary gems. One as a simile for someone who has attained the Tiandao (\u5929\u9053, Way of Heaven), \"It is like the pearl of Marquis Sui [\u96a8\u4faf\u4e4b\u73e0] / or the jade disk of Mr. He [\u548c\u6c0f\u4e4b\u74a7] / Those who achieved it became rich / those who lost it became poor . \" ( 6 , tr .Major et al. 2010 : 218). The other advises, \"With a rhinoceros and a tiger behind you and the pearl of the marquis of Sui [\u96a8\u4faf\u4e4b\u73e0] in front of you, do not try to grab [the pearl]. First avoid the calamity, and then go for the profit . \" ( 17 , tr .Major et al. 2010 : 706) Shiji The Han dynasty historiographer Sima Qian's c. 94 BCE Shiji (Records of the Grand Historian) records the Marquis of Sui in the House of Chu genealogy, an episode which is not mentioned in the Zuo zhuan above. \"In the fifty-first year (690 B.C.), Chou summoned the Marquis of Sui, reproving him for causing Ch'u to be established as a kingdom. The King of Ch'u was angry and, thinking that Sui has turned its back on him, launched a punitive expedition against Sui. King Wu expired in the midst of his army and the troops were dismissed.\" (40, tr. Neinhauser 2006: 388). The Shiji biography of the Han political advisor Zou Yang (\u9112\u967d; c. 206-129 BCE) refers to the Suihouzhizhu and Yeguangzhibi (\u591c\u5149\u4e4b\u74a7, \"night-glowing jade ring\") as valuable gems that could be overlooked unless they were examined. A twisted tree with gnarled roots, bent and bulging with not one straight twig may become the vessel of a ten-thousand chariot state. Why is this? Because it was first polished by [the ruler's] attendants. Thus when something arrives without notice, even though one might be giving away the Marquis of Sui's pearl [\u96a8\u4faf\u4e4b\u73e0] or a glowing jade ring [\u591c\u5149\u4e4b\u74a7], one will acquire resentment and be accorded no gratitude. When men speak of one beforehand, one can establish such a merit with a wilted tree and a shrived stump that none will forget it. (83, tr. Neinhauser 2008: 291). Forke, Alfred, tr. (1907), Lun-h\u00eang, Part 1, Philosophical Essays of Wang Ch'ung, Harrassowitz. Fung Yu-Lan (1952), A History of Chinese Philosophy': Vol. I, The Period of the Philosophers, tr. by Derk Bodde, E. J. Brill. Knoblock, John and Jeffrey Riegel, trs. (2000), The Annals of L\u00fc Buwei: A Complete Translation and Study, Stanford University Press. Major, John S., Sarah Queen, Andrew Meyer, and Harold D. Roth (2010), The Huainanzi: A Guide to the Theory and Practice of Government in Early Han China, Columbia University Press. Needham, Joseph and Wang Ling (1962), Science and Civilisation in China, Volume 4 Physics and Physical Technology Part 1: Physics, Cambridge University Press. Nienhauser, William H., tr. (2006), The Grand Scribe's Records; Volume 5.1, The Hereditary Houses of Pre-Han China, Part 1, Indiana University Press. Nienhauser, William H., tr. (2008), The Grand Scribe's Records: Volume 7, The Memoirs of Han China, Part I, Indiana University Press. Watson, Burton, tr. (I961), Records of the Grand Historian of China, 3 vols., Columbia University Press.", "after_revision": "L\u00fcshi Chunqiu The c. 239 BCE L\u00fcshi Chunqiu (Master L\u00fc's Spring and Autumn Annals) is an encyclopedic text compiled under the patronage of the Qin dynasty Chancellor L\u00fc Buwei. This book and the Zhuangzi have almost identical descriptions of using the marquis of Sui's pearl as a crossbow pellet in order illustrate foolishly losing much and gaining little. As a general principle, whenever a sage is about to initiate anything, he is certain to consider carefully how his means relate to what he hopes to achieve. Now if a man were to use the pearl of the Marquis of Sui [\u96a8\u4faf\u4e4b\u73e0] as a pellet to shoot at a sparrow a thousand yards up in the air, the world would surely ridicule him. Why is that? Because what he used as shot was so valuable, while what he wanted was so trifling. And, surely, life is much more valuable than the pearl of the Marquis of Sui! \"A Mountain of Persuasions\" chapter mentions marquis Sui's legendary pearl twice with Mr. He's jade-disk. The former explains the essence of Chinese jade. When a piece of jade is moistened, it looks bright. [When struck], its sound is slow and harmonious. How expansive are its aspects! With no interior or exterior, it does not conceal its flaws or imperfections. Close up, it looks glossy; from a distance, it shines brightly. It reflects like a mirror revealing the pupil of your eye. Subtly it picks up the tip of an autumn hair. It brightly illuminates the dark and obscure. Thus the jade disk of Mr. He [\u548c\u6c0f\u4e4b\u74a7] and the pearl of the marquis of Sui [\u96a8\u4faf\u4e4b\u73e0] emerged from the essence of a mountain and a spring. When the Superior Man wears them, he complies with their purity and secures his repose. When lords and kings treasure them, they rectify the world. ( Chapter 16 ) The latter says understanding is more important than wealth, \"Acquiring an army of ten thousand men does not compare to hearing one word that is apposite; / Acquiring the pearl of the marquis of Sui [\u96a8\u4faf\u4e4b\u73e0] does not compare to understanding from whence events arise. / Acquiring the jade disk of Mr. Gua [\u54bc\u6c0f\u4e4b\u74a7] does not compare to understanding where events will lead \" ( Chapter 16 ) .Major et al. ( 2010 ), p. 652. Two other chapters figuratively use the legendary gems. One as a simile for someone who has attained the Tiandao (\u5929\u9053, Way of Heaven), \"It is like the pearl of Marquis Sui [\u96a8\u4faf\u4e4b\u73e0] / or the jade disk of Mr. He [\u548c\u6c0f\u4e4b\u74a7] / Those who achieved it became rich / those who lost it became poor \" ( Chapter 6 ) .Major et al. ( 2010 ), p. 218. The other advises, \"With a rhinoceros and a tiger behind you and the pearl of the marquis of Sui [\u96a8\u4faf\u4e4b\u73e0] in front of you, do not try to grab [the pearl]. First avoid the calamity, and then go for the profit \" ( Chapter 17 ) .Major et al. ( 2010 ), p. 706. Shiji The Han dynasty historiographer Sima Qian's c. 94 BCE Shiji (Records of the Grand Historian) records the Marquis of Sui in the House of Chu genealogy, an episode which is not mentioned in the Zuo zhuan above. \"In the fifty-first year (690 B.C.), Chou summoned the Marquis of Sui, reproving him for causing Ch'u to be established as a kingdom. The King of Ch'u was angry and, thinking that Sui has turned its back on him, launched a punitive expedition against Sui. King Wu expired in the midst of his army and the troops were dismissed.\" (40, tr. Nienhauser 2006: 388). The Shiji biography of the Han political advisor Zou Yang (\u9112\u967d; c. 206-129 BCE) refers to the Suihouzhizhu and Yeguangzhibi (\u591c\u5149\u4e4b\u74a7, \"night-glowing jade ring\") as valuable gems that could be overlooked unless they were examined. A twisted tree with gnarled roots, bent and bulging with not one straight twig may become the vessel of a ten-thousand chariot state. Why is this? Because it was first polished by [the ruler's] attendants. Thus when something arrives without notice, even though one might be giving away the Marquis of Sui's pearl [\u96a8\u4faf\u4e4b\u73e0] or a glowing jade ring [\u591c\u5149\u4e4b\u74a7], one will acquire resentment and be accorded no gratitude. When men speak of one beforehand, one can establish such a merit with a wilted tree and a shrived stump that none will forget it. (83, tr. Nienhauser 2008: 291). Forke, Alfred, tr. (1907), Lun-h\u00eang, Part 1, Philosophical Essays of Wang Ch'ung, Harrassowitz. Fung Yu-Lan (1952), A History of Chinese Philosophy': Vol. I, The Period of the Philosophers, tr. by Derk Bodde, E. J. Brill. Needham, Joseph and Wang Ling (1962), Science and Civilisation in China, Volume 4 Physics and Physical Technology Part 1: Physics, Cambridge University Press. Ssu-Ma Ch'ien author, Nienhauser, William H., tr. (2006), The Grand Scribe's Records; Volume 5.1, The Hereditary Houses of Pre-Han China, Part 1, Indiana University Press. Ssu-Ma Ch'ien author, Nienhauser, William H., tr. (2008), The Grand Scribe's Records: Volume 7, The Memoirs of Han China, Part I, Indiana University Press. Watson, Burton, tr. (I961), Records of the Grand Historian of China, 3 vols., Columbia University Press.", "edit_actions": [{"type": "D", "before": "(tr. Knoblock and Riegel 2000: 82)", "after": null, "start_char_pos": 855, "end_char_pos": 889}, {"type": "A", "before": null, "after": "Chapter", "start_char_pos": 1752, "end_char_pos": 1752}, {"type": "D", "before": ", tr. Major et al. 2010: 631", "after": null, "start_char_pos": 1756, "end_char_pos": 1784}, {"type": "D", "before": ".", "after": null, "start_char_pos": 2154, "end_char_pos": 2155}, {"type": "A", "before": null, "after": "Chapter", "start_char_pos": 2160, "end_char_pos": 2160}, {"type": "R", "before": ", tr", "after": ")", "start_char_pos": 2164, "end_char_pos": 2168}, {"type": "A", "before": null, "after": "(", "start_char_pos": 2183, "end_char_pos": 2183}, {"type": "R", "before": ": 652).", "after": "), p. 652.", "start_char_pos": 2189, "end_char_pos": 2196}, {"type": "D", "before": ".", "after": null, "start_char_pos": 2479, "end_char_pos": 2480}, {"type": "A", "before": null, "after": "Chapter", "start_char_pos": 2485, "end_char_pos": 2485}, {"type": "R", "before": ", tr", "after": ")", "start_char_pos": 2488, "end_char_pos": 2492}, {"type": "A", "before": null, "after": "(", "start_char_pos": 2507, "end_char_pos": 2507}, {"type": "R", "before": ": 218).", "after": "), p. 218.", "start_char_pos": 2513, "end_char_pos": 2520}, {"type": "D", "before": ".", "after": null, "start_char_pos": 2727, "end_char_pos": 2728}, {"type": "A", "before": null, "after": "Chapter", "start_char_pos": 2733, "end_char_pos": 2733}, {"type": "R", "before": ", tr", "after": ")", "start_char_pos": 2737, "end_char_pos": 2741}, {"type": "A", "before": null, "after": "(", "start_char_pos": 2756, "end_char_pos": 2756}, {"type": "R", "before": ": 706)", "after": "), p. 706.", "start_char_pos": 2762, "end_char_pos": 2768}, {"type": "R", "before": "Neinhauser", "after": "Nienhauser", "start_char_pos": 3322, "end_char_pos": 3332}, {"type": "R", "before": "Neinhauser", "after": "Nienhauser", "start_char_pos": 4120, "end_char_pos": 4130}, {"type": "D", "before": "Knoblock, John and Jeffrey Riegel, trs. (2000), The Annals of L\u00fc Buwei: A Complete Translation and Study, Stanford University Press. Major, John S., Sarah Queen, Andrew Meyer, and Harold D. Roth (2010), The Huainanzi: A Guide to the Theory and Practice of Government in Early Han China, Columbia University Press.", "after": null, "start_char_pos": 4365, "end_char_pos": 4678}, {"type": "A", "before": null, "after": "Ssu-Ma Ch'ien author,", "start_char_pos": 4838, "end_char_pos": 4838}, {"type": "A", "before": null, "after": "Ssu-Ma Ch'ien author,", "start_char_pos": 4989, "end_char_pos": 4989}], "sents_char_pos": [0, 174, 355, 512, 679, 692, 776, 995, 1044, 1096, 1145, 1176, 1254, 1281, 1318, 1377, 1423, 1469, 1601, 1689, 1749, 1941, 2052, 2196, 2252, 2520, 2673, 2983, 3117, 3239, 3344, 3407, 3570, 3704, 3717, 3776, 3980, 4142, 4238, 4364, 4497, 4678, 4837, 4902, 4988, 5123]}
+{"doc_id": "607519", "revision_depth": "1", "before_revision": "Evolutionary anthropology is the interdisciplinary study of the evolution of human physiology and human behaviour and the relation between hominids and non-hominid primates . Evolutionary anthropology is based in natural science and social science. Various fields and disciplines of evolutionary anthropology are : Human evolution and anthropogeny . Paleoanthropology and paleontology of both human and non-human primates . Primatology and primate ethology . The sociocultural evolution of human behavior, including phylogenetic approaches to historical linguistics . The evolutionary psychology and evolutionary linguistics of humans . The archaeological study of human technology and change over time and space . Human evolutionary genetics and changes in the human genome over time . The neuroscience, endocrinology, and neuroanthropology of human and primate cognition, culture, actions and abilities . Human behavioural ecology and the interaction of humans and the environment . Studies of human anatomy, physiology, molecular biology, biochemistry, and differences and changes between species, variation between human groups, and relationships to cultural factors . Evolutionary anthropology is concerned with both biological and cultural evolution of humans, past and present. It is based on a scientific approach, and brings together fields such as archaeology, behavioral ecology, psychology, primatology, and genetics. It is a dynamic and interdisciplinary field, drawing on many lines of evidence to understand the human experience, past and present. Studies of biological evolution generally concern the evolution of the human form. Cultural evolution involves the study of cultural change over time and space and frequently incorporate cultural transmission models. Cultural evolution is not the same as biological evolution , and that human culture involves the transmission of cultural information , which behaves in ways quite distinct from human biology and genetics. The study of cultural change is increasingly performed through cladistics and genetic models.", "after_revision": "Evolutionary anthropology , the interdisciplinary study of the evolution of human physiology and human behaviour and of the relation between hominids and non-hominid primates , builds on natural science and on social science. Various fields and disciplines of evolutionary anthropology include : human evolution and anthropogeny paleoanthropology and paleontology of both human and non-human primates primatology and primate ethology the sociocultural evolution of human behavior, including phylogenetic approaches to historical linguistics the evolutionary psychology and evolutionary linguistics of humans the archaeological study of human technology and of its changes over time and space human evolutionary genetics and changes in the human genome over time the neuroscience, endocrinology, and neuroanthropology of human and primate cognition, culture, actions and abilities human behavioural ecology and the interaction between humans and the environment studies of human anatomy, physiology, molecular biology, biochemistry, and differences and changes between species, variation between human groups, and relationships to cultural factors Evolutionary anthropology studies both the biological and the cultural evolution of humans, past and present. Based on a scientific approach, it brings together fields such as archaeology, behavioral ecology, psychology, primatology, and genetics. As a dynamic and interdisciplinary field, it draws on many lines of evidence to understand the human experience, past and present. Studies of human biological evolution generally focus on the evolution of the human form. Cultural evolution involves the study of cultural change over time and space and frequently incorporates cultural-transmission models. Cultural evolution is not the same as biological evolution : human culture involves the transmission of cultural information (compare memetics), and such transmission can behave in ways quite distinct from human biology and genetics. The study of cultural change increasingly takes place through cladistics and genetic models.", "edit_actions": [{"type": "R", "before": "is", "after": ",", "start_char_pos": 26, "end_char_pos": 28}, {"type": "A", "before": null, "after": "of", "start_char_pos": 118, "end_char_pos": 118}, {"type": "R", "before": ". Evolutionary anthropology is based in", "after": ", builds on", "start_char_pos": 174, "end_char_pos": 213}, {"type": "A", "before": null, "after": "on", "start_char_pos": 234, "end_char_pos": 234}, {"type": "R", "before": "are", "after": "include", "start_char_pos": 311, "end_char_pos": 314}, {"type": "R", "before": "Human", "after": "human", "start_char_pos": 317, "end_char_pos": 322}, {"type": "R", "before": ". Paleoanthropology", "after": "paleoanthropology", "start_char_pos": 350, "end_char_pos": 369}, {"type": "R", "before": ". Primatology", "after": "primatology", "start_char_pos": 424, "end_char_pos": 437}, {"type": "R", "before": ". The", "after": "the", "start_char_pos": 459, "end_char_pos": 464}, {"type": "R", "before": ". The", "after": "the", "start_char_pos": 568, "end_char_pos": 573}, {"type": "R", "before": ". The", "after": "the", "start_char_pos": 637, "end_char_pos": 642}, {"type": "R", "before": "change", "after": "of its changes", "start_char_pos": 688, "end_char_pos": 694}, {"type": "R", "before": ". Human", "after": "human", "start_char_pos": 715, "end_char_pos": 722}, {"type": "R", "before": ". The", "after": "the", "start_char_pos": 787, "end_char_pos": 792}, {"type": "R", "before": ". Human", "after": "human", "start_char_pos": 907, "end_char_pos": 914}, {"type": "R", "before": "of", "after": "between", "start_char_pos": 955, "end_char_pos": 957}, {"type": "R", "before": ". Studies", "after": "studies", "start_char_pos": 985, "end_char_pos": 994}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1173, "end_char_pos": 1174}, {"type": "R", "before": "is concerned with both biological and", "after": "studies both the biological and the", "start_char_pos": 1201, "end_char_pos": 1238}, {"type": "R", "before": "It is based", "after": "Based", "start_char_pos": 1287, "end_char_pos": 1298}, {"type": "R", "before": "and", "after": "it", "start_char_pos": 1325, "end_char_pos": 1328}, {"type": "R", "before": "It is", "after": "As", "start_char_pos": 1432, "end_char_pos": 1437}, {"type": "R", "before": "drawing", "after": "it draws", "start_char_pos": 1477, "end_char_pos": 1484}, {"type": "A", "before": null, "after": "human", "start_char_pos": 1576, "end_char_pos": 1576}, {"type": "R", "before": "concern", "after": "focus on", "start_char_pos": 1608, "end_char_pos": 1615}, {"type": "R", "before": "incorporate cultural transmission", "after": "incorporates cultural-transmission", "start_char_pos": 1741, "end_char_pos": 1774}, {"type": "R", "before": ", and that", "after": ":", "start_char_pos": 1842, "end_char_pos": 1852}, {"type": "R", "before": ", which behaves", "after": "(compare memetics), and such transmission can behave", "start_char_pos": 1917, "end_char_pos": 1932}, {"type": "R", "before": "is increasingly performed", "after": "increasingly takes place", "start_char_pos": 2018, "end_char_pos": 2043}], "sents_char_pos": [0, 175, 250, 460, 569, 638, 716, 788, 908, 1174, 1286, 1431, 1564, 1648, 1782, 1988]}
+{"doc_id": "612100", "revision_depth": "1", "before_revision": "The ideosphere , much like the noosphere , is the realm of memetic evolution, just like the biosphere is the realm of biological evolution. It is the \"place\" where thoughts, theories and ideasare thought to be created, evaluated and evolved. The health of an ideosphere can be measured by its memetic diversity. The ideosphere is not considered to be a physical place by most people. It is instead \" inside the minds \" of all the humans in the world. It is also, sometimes, believed that the Internet, books and other media could be considered to be part of the ideosphere. Alas, as such media are not aware, it cannot process the thoughts it contains. Also ] , like the biosphere, it also has niches, which serve as environments for groups or audiences. For instance, an ideosphere is formed around a linguistic system that involves a mixture of cynicism and sentimentality as well as the violent appropriation of the other's word. Aaron Lynch claims to have co-invented this word with Douglas Hofstadter in the mid-1980s. According to philosopher Yasuhiko Kimura, the ideosphere is in the form of a \"concentricideosphere \" where ideas are generated by a few people with others merely perceiving and accepting these ideas from these \"external authorities.\" He advocates an \"omnicentric ideosphere \" where all individuals create new ideas and interact as self-authorities. There is the notion that most of humanity remains the consumer instead of producer of ideas. To address this, Kimura proposed the so-called ideospheric transformation, triggered by a synergetic phenomenon produced by the emergence of a sufficient number of authentic and independent thinkers.", "after_revision": "The ideosphere \u2014 like the noosphere (i.e., the realm of reason)\u2014is the metaphysical 'place' where thoughts, theories , ideas, and ideation are regarded to be created, evaluated , and evolved. Analogous to the biosphere (the realm of biological evolution), the ideosphere is the realm of memetic evolution, where 'memes' take the role of biological genes.Grant, Glenn. 1990. \" Memetic Lexicon. \" Principia Cybernetica. (Also available in A Memetics Compendium PDF], pp. 820\u201325)Hofstadter, Douglas R. 1985. Metamagical Themas: Questions for the Essence of Mind and Pattern. New York: Basic Books. \"ideosphere.\" As such, the ideosphere is an entire memetic ecology: the collective intelligence of all humans wherein memes live, reproduce, compete, and mutate.Lynch, Aaron. 1996. Thought Contagion: How Belief Spreads Through Society: The New Science Of Memes. The health of an ideosphere , in this sense, can be measured by its memetic diversity. Moreover, like the biosphere, it has ecological niches, which serve as environments for groups or audiences. For instance, some entities compete for ecological niches in the ideosphere, such as Buddha, Allah, the kami of Shinto, Satan, Jesus Christ in Christianity and in other religions, etc.Hale-Evans, Ron. 2008. \"Memetics: A Systems Metabiology.\" Pp. 848\u201366 in A Memetics Compendium, edited by R. Finkelstein. Robotic Technology Inc. Another example, an ideosphere is formed around a linguistic system that involves a mixture of cynicism and sentimentality as well as the violent appropriation of the other's word. Douglas Hofstadter and Aaron Lynch are considered to have independently co-invented the term ideosphere in the mid-1980s. Lynch, Aaron. 1998. \"Units, Events and Dynamics in Memetic Evolution.\" Journal of Memetics 2. Archived from the original on 2006-05-16. (Also available via PDF)Kryger, Meir H., Tom Roth, and William C. Dement. 1994. Principles and Practice of Sleep Medicine. Saunders. p. xxiii. The ideosphere is not considered to be a physical place by most people; instead, it is \"inside the minds\" of all the humans in the world. It is also sometimes believed that the Internet, books, and other media could be considered to be part of the ideosphere\u2014however such media lack the ability to process the thoughts they contain. According to philosopher Yasuhiko Kimura, the ideosphere is concentric \" in form, as ideas are generated by a few people with others merely perceiving and accepting these ideas from these \"external authorities.\" Kimura, Yasuhiko Genku. 2000. \"A Vision Fulfilled.\" He advocates an \"omnicentric \" configuration, wherein all individuals create new ideas and interact as self-authorities. There is the notion that most of humanity remains the consumer instead of producer of ideas. To address this, Kimura proposed the so-called ideospheric transformation, triggered by a synergetic phenomenon produced by the emergence of a sufficient number of authentic and independent thinkers.", "edit_actions": [{"type": "R", "before": ", much", "after": "\u2014", "start_char_pos": 15, "end_char_pos": 21}, {"type": "R", "before": ", is", "after": "(i.e.,", "start_char_pos": 41, "end_char_pos": 45}, {"type": "R", "before": "memetic evolution, just like the biosphere is the realm of biological evolution. It is the \"place\"", "after": "reason)\u2014is the metaphysical 'place'", "start_char_pos": 59, "end_char_pos": 157}, {"type": "R", "before": "and ideasare thought", "after": ", ideas, and ideation are regarded", "start_char_pos": 183, "end_char_pos": 203}, {"type": "A", "before": null, "after": ",", "start_char_pos": 229, "end_char_pos": 229}, {"type": "D", "before": "The health of an ideosphere can be measured by its memetic diversity.", "after": null, "start_char_pos": 243, "end_char_pos": 312}, {"type": "R", "before": "The ideosphere is not considered to be a physical place by most people. It is instead", "after": "Analogous to the biosphere (the realm of biological evolution), the ideosphere is the realm of memetic evolution, where 'memes' take the role of biological genes.Grant, Glenn. 1990.", "start_char_pos": 313, "end_char_pos": 398}, {"type": "R", "before": "inside the minds", "after": "Memetic Lexicon.", "start_char_pos": 401, "end_char_pos": 417}, {"type": "R", "before": "of all the humans in the world. It is also, sometimes, believed that the Internet, books and other media could be considered to be part of the ideosphere. Alas, as such media are not aware, it cannot process the thoughts it contains. Also", "after": "Principia Cybernetica. (Also available in A Memetics Compendium", "start_char_pos": 420, "end_char_pos": 658}, {"type": "A", "before": null, "after": "PDF", "start_char_pos": 659, "end_char_pos": 659}, {"type": "A", "before": null, "after": ", pp. 820\u201325)Hofstadter, Douglas R. 1985. Metamagical Themas: Questions for the Essence of Mind and Pattern. New York: Basic Books. \"ideosphere.\" As such, the ideosphere is an entire memetic ecology: the collective intelligence of all humans wherein memes live, reproduce, compete, and mutate.Lynch, Aaron. 1996. Thought Contagion: How Belief Spreads Through Society: The New Science Of Memes.", "start_char_pos": 660, "end_char_pos": 660}, {"type": "A", "before": null, "after": "The health of an ideosphere", "start_char_pos": 661, "end_char_pos": 661}, {"type": "A", "before": null, "after": "in this sense, can be measured by its memetic diversity. Moreover,", "start_char_pos": 664, "end_char_pos": 664}, {"type": "R", "before": "also has", "after": "has ecological", "start_char_pos": 688, "end_char_pos": 696}, {"type": "A", "before": null, "after": "some entities compete for ecological niches in the ideosphere, such as Buddha, Allah, the kami of Shinto, Satan, Jesus Christ in Christianity and in other religions, etc.Hale-Evans, Ron. 2008. \"Memetics: A Systems Metabiology.\" Pp. 848\u201366 in A Memetics Compendium, edited by R. Finkelstein. Robotic Technology Inc. Another example,", "start_char_pos": 772, "end_char_pos": 772}, {"type": "R", "before": "Aaron Lynch claims to have", "after": "Douglas Hofstadter and Aaron Lynch are considered to have independently", "start_char_pos": 937, "end_char_pos": 963}, {"type": "R", "before": "this word with Douglas Hofstadter", "after": "the term ideosphere", "start_char_pos": 976, "end_char_pos": 1009}, {"type": "A", "before": null, "after": "Lynch, Aaron. 1998. \"Units, Events and Dynamics in Memetic Evolution.\" Journal of Memetics 2. Archived from the original on 2006-05-16. (Also available via PDF)Kryger, Meir H., Tom Roth, and William C. Dement. 1994. Principles and Practice of Sleep Medicine. Saunders. p. xxiii.", "start_char_pos": 1028, "end_char_pos": 1028}, {"type": "A", "before": null, "after": "The ideosphere is not considered to be a physical place by most people; instead, it is \"inside the minds\" of all the humans in the world. It is also sometimes believed that the Internet, books, and other media could be considered to be part of the ideosphere\u2014however such media lack the ability to process the thoughts they contain.", "start_char_pos": 1029, "end_char_pos": 1029}, {"type": "R", "before": "in the form of a \"concentricideosphere", "after": "concentric", "start_char_pos": 1090, "end_char_pos": 1128}, {"type": "R", "before": "where", "after": "in form, as", "start_char_pos": 1131, "end_char_pos": 1136}, {"type": "A", "before": null, "after": "Kimura, Yasuhiko Genku. 2000. \"A Vision Fulfilled.\"", "start_char_pos": 1264, "end_char_pos": 1264}, {"type": "D", "before": "ideosphere", "after": null, "start_char_pos": 1294, "end_char_pos": 1304}, {"type": "R", "before": "where", "after": "configuration, wherein", "start_char_pos": 1307, "end_char_pos": 1312}], "sents_char_pos": [0, 139, 242, 312, 384, 451, 574, 653, 757, 936, 1027, 1263, 1379, 1472]}
+{"doc_id": "61263594", "revision_depth": "1", "before_revision": "The Japanese Buddhist word uji (\u6709\u6642), usually translated into English as Being-Time, is a key metaphysical idea of the S\u014dt\u014d Zen founder D\u014dgen (1200-1253). His 1240 essay titled Uji, which is included as a fascicle in the Sh\u014db\u014dgenz\u014d (\"Treasury of the True Dharma Eye\") collection, gives several explanations of uji, beginning with, \"The so-called \"sometimes\" (uji) means: time (ji) itself already is none other than being(s) (u) are all none other than time (ji).\" (Heine 1985: 155) . Scholars have interpreted uji \"being-time\" for over seven centuries. Early interpretations traditionally employed Buddhist terms and concepts, such as impermanence (Pali anicca, Japanese muj\u014d \u7121\u5e38). Modern interpretations of uji are more diverse, for example, authors like Steven Heine and Joan Stambaugh compare D\u014dgen's concepts of temporality with the existentialist Martin Heidegger's 1927 Being and Time. Terminology D\u00f6gen's writings can be notoriously difficult to understand and translate, frequently owing to his wordplay with Late Middle Japanese terms (Tanaka 2013: 323) . D\u014dgen's Zen neologism uji (\u6709\u6642, \"existence-/being-time\") is the uncommon on'yomi Sino-Japanese reading of the Chinese word y\u01d2ush\u00ed (\u6709\u6642, \"sometimes; at times\", Wenlin 2016), and plays with the more common kun'yomi native Japanese pronunciation of these two kanji characters as arutoki (\u6216\u308b\u6642, \"once; on one occasion; at one point; [in the past] once; at one time; once upon a time\" , Watanabe et al. 2003: 94). In the multifaceted Japanese writing system, arutoki (\"at one time; etc.\") was archaically transcribed \u6709\u6642 in kanbun (\"Chinese character writing\"), and is now either written \u6216\u308b\u6642 with -ru \u308b in okurigana indicating a Group II verb stem, or simply \u3042\u308b\u3068\u304d in hiragana. Authors have described D\u014dgen's uji as an \"intentional misreading\" of ordinary language (Heine 1983: 141) and a \"deliberate misreading\" of arutoki (Raud 2004: 39) . D\u014dgen etymologizes the two components of uji (\u6709\u6642) with usage examples from everyday Japanese. The first element u refers to \"existence\" or \"being\", and the second ji means \"time; a time; times; the time when; at the time when; sometime; for a time\". Several of D\u014dgen's earlier writings used the word arutoki, for example, in a k\u014dan story, it repeatedly means \"and then, one day\" to signal that an important event is about to happen (Nearman 2007: 106) . Interpretations of uji are plentiful. Dainin Katagiri says that D\u014dgen used the novel term being-time to illustrate that sentient \"beings\" and \"time\" were unseparated. Thus, being represents all beings existing together in the formless realm of timelessness, and time characterizes the existence of independent yet interconnected moments (2007: 73) . Gudo Nishijima and Chodo Cross (2008: 143) say, u means \"existence\" and ji means \"time,\" so uji means \"existent time,\" or \"existence-time.\" Since time is always related with existence and existence is always related with momentary time, the past and the future are not existent time\u2014the point at which existence and time come together\u2014the present moment is the only existent time. The Japanese keyword uji has more meanings than any single English rendering can encompass. Nevertheless, translation equivalents include: Existence/Time (Kim 1978) Being-Time (Waddell 1979, Roberts 2018) Being Time (Cleary 1986) Time-Being (Welch and Tanahashi 1985) Just for the Time Being, Just for a While, For the Whole of Time is the Whole of Existence (Nearman 2007) Existence-Time (Nishijima and Cross 2008) Existential moment (Raud 2012) Sh\u014db\u014dgenz\u014d fascicle D\u00f4gen wrote his Uji essay at the beginning of winter in 1240, while he was teaching at the K\u014dsh\u014dh\u014drin-ji, south of Kyoto. It is one of the major fascicles of Sh\u00f4b\u00f4genz\u00f4, and \"one of the most difficult\" (Waddell and Abe 2001: 47) . D\u00f4gen's central theme in Uji Being-Time, and an underlying theme in other fascicles such as Bussh\u014d (\u4f5b\u6027, Buddha Nature), is the inseparability of time and existence in the everchanging present. The present Sh\u014db\u014dgenz\u014d fascicle (number 20 in the 75 fascicle version) commences with a poem (four two-line stanzas) in which every line begins with uji (\u6709\u6642). The 1004 The Jingde Record of the Transmission of the Lamp collection of hagiographies for Chinese Chan and Japanese Zen monks attributes the first stanza to the S\u014dt\u014d Zen Tang dynasty patriarch Yaoshan Weiyan (745-827). An old Buddha said: For the time being, I stand astride the highest mountain peaks. For the time being, I move on the deepest depths of the ocean floor. For the time being, I'm three heads and eight arms [of an Asura fighting demon]. For the time being, I'm eight feet or sixteen feet [a Buddha-body while seated or standing]. For the time being, I'm a staff or a whisk. For the time being, I'm a pillar or a lantern. For the time being, I'm Mr. Chang or Mr. Li [any Tom, Dick, or Harry]. For the time being, I'm the great earth and heavens above. (tr. Waddell and Abe 2001: 48) The translators note their choice of \"for the time being\" attempts to encompass D\u014dgen's wordplay with uji \"being time\" meaning arutoki \"at a certain time; sometimes\". Compare these other English translations of the first stanza (adapting Lucut 2001): Sometimes (uji) standing so high up on the mountain top; Sometimes walking deep down on the bottom of the sea; (tr. Heine 1985: 155) For the time being stand on top of the highest peak. For the time being proceed along the bottom of the deepest ocean. (tr. Welch and Takahashi 1985: 76) At a time of being, standing on the summit of the highest peak; At a time of being, walking on the bottom of the deepest ocean. (tr. Cleary 1986: 104) Standing atop a soaring mountain peak is for the time being And plunging down to the floor of the Ocean's abyss is for the time being; (tr. Nearman 2007: 106) Being-time stands on top of the highest peak; Being-time goes to the bottom of the deepest ocean (tr. Katagiri 2007: 85) Sometimes standing on top of the highest peak, Sometimes moving along the bottom of the deepest ocean. (tr. Nishijima and Cross 2008: 143) D\u014dgen's Uji commentary on the poem begins by explaining that, \"The 'time being' means time, just as it is, is being, and being is all time.\", which shows the \"unusual significance\" he gives to the word uji \"being-time.\" (Waddell and Abe 2001: 48) Interpretations Many authors have researched and discussed D\u014dgen's theories of temporality. In English, there are two books (Heine 1985 and Stambaugh 1990) and numerous articles on uji (\u6709\u6642, \"being-time; time-being; etc.\"). According to the traditional interpretation, uji \"means time itself is being, and all being is time\" (tr. Welch and Tanahashi 1985). Hee-Jin Kim analyzed D\u014dgen's conception of uji \"existence/time\" as the way of spiritual freedom, and found that his discourse can be better understood in terms of ascesis rather than vision of Buddha-nature; \"vision is not discredited, but penetrated, empowered by ascesis\" (1978: 45) . Steven Heine's 1983 article on the hermeneutics of temporality in the Sh\u014db\u014dgenz\u014d, that is, D\u014dgen critically reinterpreting and restating, \"even at the risk of grammatical distortion,\" previous views of Buddha-nature in order to reflect the multidimensional unity of uji \"being-time\". For example, paraphrasing the venerated Nirvana Sutra, \"If you wish to know the Buddha-nature's meaning, you should watch temporal conditions. If the time arrives, the Buddha-nature will manifest itself,\" D\u014dgen reinterprets the phrase \"if the time arrives\" (jisetsu nyakushi \u6642\u7bc0\u82e5\u81f3) to mean \"the time already arrived\" (jisetsu kishi \u6642\u7bc0\u65e2\u81f3) and comments, \"There is no time right now that is not a time that has arrived,.. There is no Buddha-nature that is not Buddha-nature fully manifested right here-and-now.\" (1983: 139-140) . Heine's 1985 book contrasted the theories of time presented in D\u014dgen's 1231-1253 Sh\u014db\u014dgenz\u014d and the German existentialist Martin Heidegger's 1927 classic Being and Time (Sein und Zeit). Despite the vast cultural and historical gaps between medieval Japan and modern Germany, there are philosophical parallels. The conventional conceptualization of time is removed from the genuine experience of what Heidegger calls urspr\u00fcngliche Zeit (\"primordial time\", that is, temporalizing temporality) and similar to what D\u014dgen calls uji no d\u014dri (\u6709\u6642\u306e\u9053\u7406, \"truth of [being]-time\") (1985: 105-152) . Masao Abe's and Steven Heine's article analyzes the origins of D\u014dgen's interest in being-time when he was a young monk on Mount Hiei, the headquarters of the Tendai school of Buddhism. According to the 1753 Kenzeiki (\u5efa\u6495\u8a18) traditional biography of D\u014dgen, he became obsessed by doubts about the Tendai concepts of hongaku (\u672c\u899a, \"original awakening\") that all human beings are enlightened by nature, and shikaku (\u59cb\u89ba, \"acquired awakening\") that enlightenment can only be achieved through resolve and practice. \"Both exoteric and esoteric Buddhism teach the original Dharma-nature and innate self-nature. If that were true, why have the Buddhas of past, present, and future awakened the resolve for and sought enlightenment through ascetic practices?\" (1988: 2) . D\u014dgen's doubt eventually led him to travel to Song dynasty China to seek a resolution, which was dissolved through the enlightenment experience of shinjin-datsuraku (\u8eab\u5fc3\u8131\u843d, \"casting off of body-mind\") when he was a disciple of Rujing (1162-1228). Joan Stambaugh, the philosopher and translator of Martin Heidegger's writings including Being and Time (1996) , wrote a book on D\u014dgen's understanding of temporality, Buddhist impermanence, and Buddha-nature. Rather than writing yet another comparative study, Stambaugh chose to produce a \"dialogical\" encounter between Eastern thinkers and Western philosophers, including Heraclitus, Boethius, Spinoza, Leibniz, Hegel, Schopenhauer, Kierkegaard, Nietzsche, and particularly Heidegger (1990: ix) . J. M. E. McTaggart's classic argument that time is unreal differentiated two basic aspects of temporality, the \"A-series and B-series\": the A-series orders all events as continual transformations in time's passage, things are said to exist in the \"future\", then become \"present\", and finally enter the \"past\"; while the B-Series orders time as a set of relative temporal relationships between \"earlier than\" and \"later than\". Dirck Vorenkamp demonstrated that D\u014dgen's writings contained elements of the \"B-theory of time\". The Sh\u014db\u014dgenz\u014d describes time's passage without reference to a sentient subject, \"You should learn that passage [ky\u014draku (\u7d4c\u6b74)] occurs without anything external. For example, spring's passage is necessarily that which passes through spring.\" (1995: 392). Trent Collier contrasts how D\u014dgen and Shinran (1173-1263), the founder of the J\u014ddo Shinsh\u016b sect of Pure Land Buddhism, diversely understood the role of time in Buddhist enlightenment. These two leaders in Kamakura Buddhism believed in two different forms of spiritual practice with disparate temporal concepts; D\u014dgen advocated zazen or shikantaza (\"just sitting\") meditation and Shinran emphasized the recitation of the nembutsu (\"repeating the name of Amida\") alone. D\u014dgen's notion of uji unified time and being, and consequently things in the world do not exist in time, but are time\" (Collier 2000: 59) . According to the Uji fascicle, zazen falls outside the common understanding of time as past, present, and future. D\u014dgen declares that \"When even just one person, at one time, sits in zazen, he becomes, imperceptively, one with each and all the myriad things, and permeates completely all time.\" Everything in reality is to be found in the absolute now of being-time (2000: 62) . For Shinran, the central Pure Land awakening or experience is shinjin (\"faith; piety; devotion\"), the unfolding of Amida's wisdom-compassion in the believer. Shinran teaches that ichinen (\u4e00\u5ff5, \"one thought-moment\") of shinjin is \"time at its ultimate limit,\" and in the subjective experience of the practitioner, Amida's Primal Vow in the past and the Pure Land of the future are realized simultaneously (2000: 57) . There are two ways of interpreting this \"ultimate limit\". In the first sense, it is the ultimate limit of samsaric existence, deluded and foolish existence stretched to its end; and in the second, \"ultimate limit\" refers to the absolute brevity of the one thought-moment, \"the briefest instant of time, a moment so brief that it cannot be further divided\" (2000: 70) . Rein Raud wrote two articles concerning D\u014dgen's notion of uji, translated as \"being-time\" (2004) and \"existential moment\" (2012) , respectively. Raud's first study compared uji with Nishida Kitar\u014d's interpretation of basho (\u5834\u6240, \"place, location\") as \"the locus of tension, where the contradictory self-identities are acted out and complementary opposites negate each other\", and is thus \"the 'place' where impermanence happens\" (2004: 46) . Both these Japanese philosophers believed that in order to attain self-realization one must transcend the \"ordinary\" reality not by rising above it, and thereby separating oneself from it, but by \"becoming\" it, realizing oneself in it and the totality of the world, including \"being-time\". His second study reinterprets D\u014dgen's concept of time as primarily referring to momentary rather than durational existence, and translates uji as \"existential moment\" in opposition to the usual understanding of time as measurable and divisible (2012:153) . According to Raud, this interpretation enables \"more lucid readings\" of many key passages in the Sh\u014db\u014dgenz\u014d, such as translating the term ky\u014draku (\u7d4c\u6b74, \"passage\", etc.) as \"shifting\" (2012: 167) . In present day usage, this term is commonly read as Japanese keireki (\u7d4c\u6b74, \"personal history; r\u00e9sum\u00e9; career\") and Chinese j\u012bngl\u00ec (\u7d93\u6b77, \"go through; undergo; experience\"). Scholars have translated D\u014dgen's ky\u014draku as \"continuity\" (Masunaga), \"flowing\" (Welch and Tanahashi) , \"stepflow\" (Myers) , \"passing in a series of moments\" (Nishijima and Cross), \"passage\" (Cleary) , \"totalistic passage or process\" (Heine), and \"seriatim passage\" (Waddell) . One translator says, \"These attempts basically hit the mark, but fail to convey the freshness and originality of D\u014dgen's terminology, which is the verbal equivalent of him waving his arms wildly and screaming at the top of his lungs across the centuries to us: 'Look at my radical new idea about time!'\" (Myers 2008: 114) Compare these two renderings: Being-time has the virtue of seriatim passage; it passes from today to tomorrow, passes from today to yesterday, passes from yesterday to today, passes from today to today, passes from tomorrow to tomorrow. This is because passing seriatim is a virtue of time. Past time and present time do not overlap one another, or pile up in a row (tr.Waddell 1979: 120). The existential moment has the quality of shifting. It shifts from what we call \"today\" into \"tomorrow,\" it shifts from \"today\" into \"yesterday,\" and from \"yesterday\" into \"today\" in turn. It shifts from \"today\" into \"today,\" it shifts from \"tomorrow\" into \"tomorrow.\" This is because shifting is the quality of the momentary. The moments of the past and the present do not pile on each other nor do they line up side by side. (tr. Raud 2012:165) Dainin Katagiri says D\u014dgen's uji Being-time means the complete oneness of time and space, \"dynamically functioning from moment to moment as illumination that is alive in the individual self\". When time, being, self, and illumination come together and work dynamically in one's life, time and being are unified (2007: 85) . Furthermore, self is time. The \"self arrays itself and forms the entire universe.\" One should perceive each particular thing in the universe as a moment of time. Neither things nor moments hinder one another (2007: 93) . References Abe, Masao and Steven Heine, tr. (1988), \"D\u014dgen's View of Time and Space\", The Eastern Buddhist 21.2: 1-35. Cleary, Thomas (1986), Sh\u014db\u014dgenz\u014d, Zen essays, University of Hawaii Press. Collier, Trent (2000), \"Time and Self: Religious Awakening in D\u014dgen and Shinran\", The Eastern Buddhist 32.1: 56-84. Dumoulin, Heinrich (2005), Zen Buddhism: A History. Volume 2: Japan, World Wisdom Books. Heine, Steven (1983), \"Temporality of Hermeneutics in D\u014dgen's \"Sh\u014db\u014dgenz\u014d\", Philosophy East and West 33.2: 139-147. Heine, Steven (1985), Existential and Ontological Dimensions of Time in Heidegger and D\u014dgen, SUNY Press. Katagiri, Dainin (2007), Each Moment Is the Universe: Zen and the Way of Being Time, Shambhala Publications. Myers, Bob (2008), First D\u014dgen Book, Selected essays from D\u014dgen Zenji's Sh\u014db\u014dgenz\u014d, Terebess. Nearman, Hubert (2007), Sh\u014db\u014dgenz\u014d, The Treasure House of the Eye of the True Teaching, A Trainee's Translation of Great Master D\u014dgen's Spiritual Masterpiece, Shasta Abbey Press. Nelson, Andrew N. and John H. Haig (1997), The New Nelson Japanese-English Character Dictionary, C. E. Tuttle Co. Nishijima, Gudo and Chodo Cross, trans. (2008, 2019), Sh\u014db\u014dgenz\u014d: The True Dharma-Eye Treasury, 4 vols, Numata Center for Buddhist Translation and Research. Kim, Hee-Jin (1978), \"Existence/Time as the Way of Ascesis: An Analysis of the Basic Structure of D\u014dgen's Thought\", The Eastern Buddhist 11.2: 43-73. Lecut, Frederic (2009), Master D\u014dgen's Uji, 8 translations. Nishijima, Gudo and Chodo Cross 1994, 1996, 1997, 1999), Master D\u014dgen's Sh\u014db\u014dgenz\u014d, 4 vols., Windbell Publications. Nishiyama K\u014dsen and John Stevens, trs., (1975, 1977, 1983, 1983), Sh\u014db\u014dgenz\u014d (The Eye and Treasury of the True Law), 4 vols., Nakayama Shob\u014d . Raud, Rein (2004), \"'Place' and 'Being-Time': Spatiotemporal Concepts in the Thought of Nishida Kitar\u014d and D\u014dgen Kigen\", Philosophy East and West 54.1: 29-51. Raud, Rein (2012), \"The Existential Moment: Rereading D\u014dgen's Theory of Time\", Philosophy East and West 62.2: 153\u2013173. Roberts, Shinshu (2018), Being-Time: A Practitioner's Guide to D\u014dgen's Sh\u014db\u014dgenz\u014d Uji, Wisdom Publications. Stambaugh, Joan (1990), Impermanence is Buddha-Nature: D\u014dgen's Understanding of Temporality, University of Hawaii Press. Stambaugh, Joan (1996), tr. of Martin Heidegger Being and Time, SUNY Press. Tanaka, Koji (2013), \"Contradictions in D\u014dgen,\" Philosophy East and West 63.3: 322-334. Vorenkamp, Dirck (1995), \"B-Series Temporal Order in D\u014dgen's Theory of Time,\" Philosophy East and West 45.3: 387-408. Waddell, Norman (1979), \"Being Time: D\u014dgen's Sh\u014db\u014dgenz\u014d Uji\", The Eastern Buddhist 12.1: 114-129. Waddell, Norman and Abe, Masao, trans. (2001), \"Uji \u6709\u6642 (Being-Time)\", in The Heart of D\u014dgen's Sh\u014db\u014dgenz\u014d, 47-58, SUNY Press. Watanabe Toshir\u014d (\u6e21\u908a\u654f\u90ce), Edmund R. Skrzypczak, and Paul Snowden, eds. (2003), Kenkyusha's New Japanese-English Dictionary (\u65b0\u548c\u82f1\u5927\u8f9e\u5178), 5th edition, Kenkyusha. Welch, Dan and Kazuaki Tanahashi, trs. (1985), \"The Time-Being, Uji\", from The Moon in a Dewdrop; writings of Zen Master D\u014dgen, ed. by Kazuaki Tanahashi, 76-83, North Point Press .", "after_revision": "The Japanese Buddhist word uji (\u6709\u6642), usually translated into English as Being-Time, is a key metaphysical idea of the S\u014dt\u014d Zen founder D\u014dgen (1200-1253). His 1240 essay titled Uji, which is included as a fascicle in the Sh\u014db\u014dgenz\u014d (\"Treasury of the True Dharma Eye\") collection, gives several explanations of uji, beginning with, \"The so-called \"sometimes\" (uji) means: time (ji) itself already is none other than being(s) (u) are all none other than time (ji).\" . Scholars have interpreted uji \"being-time\" for over seven centuries. Early interpretations traditionally employed Buddhist terms and concepts, such as impermanence (Pali anicca, Japanese muj\u014d \u7121\u5e38). Modern interpretations of uji are more diverse, for example, authors like Steven Heine and Joan Stambaugh compare D\u014dgen's concepts of temporality with the existentialist Martin Heidegger's 1927 Being and Time. Terminology D\u00f6gen's writings can be notoriously difficult to understand and translate, frequently owing to his wordplay with Late Middle Japanese terms . D\u014dgen's Zen neologism uji (\u6709\u6642, \"existence-/being-time\") is the uncommon on'yomi Sino-Japanese reading of the Chinese word y\u01d2ush\u00ed (\u6709\u6642, \"sometimes; at times\", Wenlin 2016), and plays with the more common kun'yomi native Japanese pronunciation of these two kanji characters as arutoki (\u6216\u308b\u6642, \"once; on one occasion; at one point; [in the past] once; at one time; once upon a time\" . In the multifaceted Japanese writing system, arutoki (\"at one time; etc.\") was archaically transcribed \u6709\u6642 in kanbun (\"Chinese character writing\"), and is now either written \u6216\u308b\u6642 with -ru \u308b in okurigana indicating a Group II verb stem, or simply \u3042\u308b\u3068\u304d in hiragana. Authors have described D\u014dgen's uji as an \"intentional misreading\" of ordinary language and a \"deliberate misreading\" of arutoki . D\u014dgen etymologizes the two components of uji (\u6709\u6642) with usage examples from everyday Japanese. The first element u refers to \"existence\" or \"being\", and the second ji means \"time; a time; times; the time when; at the time when; sometime; for a time\". Several of D\u014dgen's earlier writings used the word arutoki, for example, in a k\u014dan story, it repeatedly means \"and then, one day\" to signal that an important event is about to happen . Interpretations of uji are plentiful. Dainin Katagiri says that D\u014dgen used the novel term being-time to illustrate that sentient \"beings\" and \"time\" were unseparated. Thus, being represents all beings existing together in the formless realm of timelessness, and time characterizes the existence of independent yet interconnected moments . Gudo Nishijima and Chodo Cross say, u means \"existence\" and ji means \"time,\" so uji means \"existent time,\" or \"existence-time.\" Since time is always related with existence and existence is always related with momentary time, the past and the future are not existent time\u2014the point at which existence and time come together\u2014the present moment is the only existent time. The Japanese keyword uji has more meanings than any single English rendering can encompass. Nevertheless, translation equivalents include: Existence/Time Being-Time Being Time Time-Being Just for the Time Being, Just for a While, For the Whole of Time is the Whole of Existence . Existence-Time Existential moment Sh\u014db\u014dgenz\u014d fascicle D\u00f4gen wrote his Uji essay at the beginning of winter in 1240, while he was teaching at the K\u014dsh\u014dh\u014drin-ji, south of Kyoto. It is one of the major fascicles of Sh\u00f4b\u00f4genz\u00f4, and \"one of the most difficult\" . D\u00f4gen's central theme in Uji Being-Time, and an underlying theme in other fascicles such as Bussh\u014d (\u4f5b\u6027, Buddha Nature), is the inseparability of time and existence in the everchanging present. The present Sh\u014db\u014dgenz\u014d fascicle (number 20 in the 75 fascicle version) commences with a poem (four two-line stanzas) in which every line begins with uji (\u6709\u6642). The 1004 The Jingde Record of the Transmission of the Lamp collection of hagiographies for Chinese Chan and Japanese Zen monks attributes the first stanza to the S\u014dt\u014d Zen Tang dynasty patriarch Yaoshan Weiyan (745-827). An old Buddha said: For the time being, I stand astride the highest mountain peaks. For the time being, I move on the deepest depths of the ocean floor. For the time being, I'm three heads and eight arms [of an Asura fighting demon]. For the time being, I'm eight feet or sixteen feet [a Buddha-body while seated or standing]. For the time being, I'm a staff or a whisk. For the time being, I'm a pillar or a lantern. For the time being, I'm Mr. Chang or Mr. Li [any Tom, Dick, or Harry]. For the time being, I'm the great earth and heavens above. . The translators note their choice of \"for the time being\" attempts to encompass D\u014dgen's wordplay with uji \"being time\" meaning arutoki \"at a certain time; sometimes\". Compare these other English translations of the first stanza : Sometimes (uji) standing so high up on the mountain top; Sometimes walking deep down on the bottom of the sea; Tr. . For the time being stand on top of the highest peak. For the time being proceed along the bottom of the deepest ocean. At a time of being, standing on the summit of the highest peak; At a time of being, walking on the bottom of the deepest ocean. Tr. . Standing atop a soaring mountain peak is for the time being And plunging down to the floor of the Ocean's abyss is for the time being; Being-time stands on top of the highest peak; Being-time goes to the bottom of the deepest oceanTr. . Sometimes standing on top of the highest peak, Sometimes moving along the bottom of the deepest ocean. D\u014dgen's Uji commentary on the poem begins by explaining that, \"The 'time being' means time, just as it is, is being, and being is all time.\", which shows the \"unusual significance\" he gives to the word uji \"being-time.\" . Interpretations Many authors have researched and discussed D\u014dgen's theories of temporality. In English, there are two books and numerous articles on uji (\u6709\u6642, \"being-time; time-being; etc.\"). According to the traditional interpretation, uji \"means time itself is being, and all being is time\" . Hee-Jin Kim analyzed D\u014dgen's conception of uji \"existence/time\" as the way of spiritual freedom, and found that his discourse can be better understood in terms of ascesis rather than vision of Buddha-nature; \"vision is not discredited, but penetrated, empowered by ascesis\" . Steven Heine's 1983 article on the hermeneutics of temporality in the Sh\u014db\u014dgenz\u014d, that is, D\u014dgen critically reinterpreting and restating, \"even at the risk of grammatical distortion,\" previous views of Buddha-nature in order to reflect the multidimensional unity of uji \"being-time\". For example, paraphrasing the venerated Nirvana Sutra, \"If you wish to know the Buddha-nature's meaning, you should watch temporal conditions. If the time arrives, the Buddha-nature will manifest itself,\" D\u014dgen reinterprets the phrase \"if the time arrives\" (jisetsu nyakushi \u6642\u7bc0\u82e5\u81f3) to mean \"the time already arrived\" (jisetsu kishi \u6642\u7bc0\u65e2\u81f3) and comments, \"There is no time right now that is not a time that has arrived,.. There is no Buddha-nature that is not Buddha-nature fully manifested right here-and-now.\" . Heine's 1985 book contrasted the theories of time presented in D\u014dgen's 1231-1253 Sh\u014db\u014dgenz\u014d and the German existentialist Martin Heidegger's 1927 classic Being and Time (Sein und Zeit). Despite the vast cultural and historical gaps between medieval Japan and modern Germany, there are philosophical parallels. The conventional conceptualization of time is removed from the genuine experience of what Heidegger calls urspr\u00fcngliche Zeit (\"primordial time\", that is, temporalizing temporality) and similar to what D\u014dgen calls uji no d\u014dri (\u6709\u6642\u306e\u9053\u7406, \"truth of [being]-time\") . Masao Abe's and Steven Heine's article analyzes the origins of D\u014dgen's interest in being-time when he was a young monk on Mount Hiei, the headquarters of the Tendai school of Buddhism. According to the 1753 Kenzeiki (\u5efa\u6495\u8a18) traditional biography of D\u014dgen, he became obsessed by doubts about the Tendai concepts of hongaku (\u672c\u899a, \"original awakening\") that all human beings are enlightened by nature, and shikaku (\u59cb\u89ba, \"acquired awakening\") that enlightenment can only be achieved through resolve and practice. \"Both exoteric and esoteric Buddhism teach the original Dharma-nature and innate self-nature. If that were true, why have the Buddhas of past, present, and future awakened the resolve for and sought enlightenment through ascetic practices?\" . D\u014dgen's doubt eventually led him to travel to Song dynasty China to seek a resolution, which was dissolved through the enlightenment experience of shinjin-datsuraku (\u8eab\u5fc3\u8131\u843d, \"casting off of body-mind\") when he was a disciple of Rujing (1162-1228). Joan Stambaugh, the philosopher and translator of Martin Heidegger's writings including Being and Time , wrote a book on D\u014dgen's understanding of temporality, Buddhist impermanence, and Buddha-nature. Rather than writing yet another comparative study, Stambaugh chose to produce a \"dialogical\" encounter between Eastern thinkers and Western philosophers, including Heraclitus, Boethius, Spinoza, Leibniz, Hegel, Schopenhauer, Kierkegaard, Nietzsche, and particularly Heidegger . J. M. E. McTaggart's classic argument that time is unreal differentiated two basic aspects of temporality, the \"A-series and B-series\": the A-series orders all events as continual transformations in time's passage, things are said to exist in the \"future\", then become \"present\", and finally enter the \"past\"; while the B-Series orders time as a set of relative temporal relationships between \"earlier than\" and \"later than\". Dirck Vorenkamp demonstrated that D\u014dgen's writings contained elements of the \"B-theory of time\". The Sh\u014db\u014dgenz\u014d describes time's passage without reference to a sentient subject, \"You should learn that passage [ky\u014draku (\u7d4c\u6b74)] occurs without anything external. For example, spring's passage is necessarily that which passes through spring.\" Trent Collier contrasts how D\u014dgen and Shinran (1173-1263), the founder of the J\u014ddo Shinsh\u016b sect of Pure Land Buddhism, diversely understood the role of time in Buddhist enlightenment. These two leaders in Kamakura Buddhism believed in two different forms of spiritual practice with disparate temporal concepts; D\u014dgen advocated zazen or shikantaza (\"just sitting\") meditation and Shinran emphasized the recitation of the nembutsu (\"repeating the name of Amida\") alone. D\u014dgen's notion of uji unified time and being, and consequently things in the world do not exist in time, but are time\" . According to the Uji fascicle, zazen falls outside the common understanding of time as past, present, and future. D\u014dgen declares that \"When even just one person, at one time, sits in zazen, he becomes, imperceptively, one with each and all the myriad things, and permeates completely all time.\" Everything in reality is to be found in the absolute now of being-time . For Shinran, the central Pure Land awakening or experience is shinjin (\"faith; piety; devotion\"), the unfolding of Amida's wisdom-compassion in the believer. Shinran teaches that ichinen (\u4e00\u5ff5, \"one thought-moment\") of shinjin is \"time at its ultimate limit,\" and in the subjective experience of the practitioner, Amida's Primal Vow in the past and the Pure Land of the future are realized simultaneously . There are two ways of interpreting this \"ultimate limit\". In the first sense, it is the ultimate limit of samsaric existence, deluded and foolish existence stretched to its end; and in the second, \"ultimate limit\" refers to the absolute brevity of the one thought-moment, \"the briefest instant of time, a moment so brief that it cannot be further divided\" . Rein Raud wrote two articles concerning D\u014dgen's notion of uji, translated as \"being-time\" . and \"existential moment\" , respectively. Raud's first study compared uji with Nishida Kitar\u014d's interpretation of basho (\u5834\u6240, \"place, location\") as \"the locus of tension, where the contradictory self-identities are acted out and complementary opposites negate each other\", and is thus \"the 'place' where impermanence happens\" . Both these Japanese philosophers believed that in order to attain self-realization one must transcend the \"ordinary\" reality not by rising above it, and thereby separating oneself from it, but by \"becoming\" it, realizing oneself in it and the totality of the world, including \"being-time\". His second study reinterprets D\u014dgen's concept of time as primarily referring to momentary rather than durational existence, and translates uji as \"existential moment\" in opposition to the usual understanding of time as measurable and divisible . According to Raud, this interpretation enables \"more lucid readings\" of many key passages in the Sh\u014db\u014dgenz\u014d, such as translating the term ky\u014draku (\u7d4c\u6b74, \"passage\", etc.) as \"shifting\" . In present day usage, this term is commonly read as Japanese keireki (\u7d4c\u6b74, \"personal history; r\u00e9sum\u00e9; career\") and Chinese j\u012bngl\u00ec (\u7d93\u6b77, \"go through; undergo; experience\"). Scholars have translated D\u014dgen's ky\u014draku as \"continuity\" (Masunaga), \"flowing\" , \"stepflow\" , \"passing in a series of moments\" (Nishijima and Cross), \"passage\" , \"totalistic passage or process\" (Heine), and \"seriatim passage\" . One translator says, \"These attempts basically hit the mark, but fail to convey the freshness and originality of D\u014dgen's terminology, which is the verbal equivalent of him waving his arms wildly and screaming at the top of his lungs across the centuries to us: 'Look at my radical new idea about time!'\" . Compare these two renderings: Being-time has the virtue of seriatim passage; it passes from today to tomorrow, passes from today to yesterday, passes from yesterday to today, passes from today to today, passes from tomorrow to tomorrow. This is because passing seriatim is a virtue of time. Past time and present time do not overlap one another, or pile up in a row .Tr. . The existential moment has the quality of shifting. It shifts from what we call \"today\" into \"tomorrow,\" it shifts from \"today\" into \"yesterday,\" and from \"yesterday\" into \"today\" in turn. It shifts from \"today\" into \"today,\" it shifts from \"tomorrow\" into \"tomorrow.\" This is because shifting is the quality of the momentary. The moments of the past and the present do not pile on each other nor do they line up side by side. Tr. . Dainin Katagiri says D\u014dgen's uji Being-time means the complete oneness of time and space, \"dynamically functioning from moment to moment as illumination that is alive in the individual self\". When time, being, self, and illumination come together and work dynamically in one's life, time and being are unified . Furthermore, self is time. The \"self arrays itself and forms the entire universe.\" One should perceive each particular thing in the universe as a moment of time. Neither things nor moments hinder one another . References Footnotes Further reading Dumoulin, Heinrich (2005), Zen Buddhism: A History. Volume 2: Japan, World Wisdom Books. Nelson, Andrew N. and John H. Haig (1997), The New Nelson Japanese-English Character Dictionary, C. E. Tuttle Co. Lecut, Frederic (2009), Master D\u014dgen's Uji, 8 translations. Nishijima, Gudo and Chodo Cross 1994, 1996, 1997, 1999), Master D\u014dgen's Sh\u014db\u014dgenz\u014d, 4 vols., Windbell Publications. Nishiyama K\u014dsen and John Stevens, trs., (1975, 1977, 1983, 1983), Sh\u014db\u014dgenz\u014d (The Eye and Treasury of the True Law), 4 vols., Nakayama Shob\u014d .", "edit_actions": [{"type": "D", "before": "(Heine 1985: 155)", "after": null, "start_char_pos": 463, "end_char_pos": 480}, {"type": "D", "before": "(Tanaka 2013: 323)", "after": null, "start_char_pos": 1042, "end_char_pos": 1060}, {"type": "R", "before": ", Watanabe et al. 2003: 94).", "after": ".", "start_char_pos": 1440, "end_char_pos": 1468}, {"type": "D", "before": "(Heine 1983: 141)", "after": null, "start_char_pos": 1818, "end_char_pos": 1835}, {"type": "D", "before": "(Raud 2004: 39)", "after": null, "start_char_pos": 1877, "end_char_pos": 1892}, {"type": "D", "before": "(Nearman 2007: 106)", "after": null, "start_char_pos": 2327, "end_char_pos": 2346}, {"type": "D", "before": "(2007: 73)", "after": null, "start_char_pos": 2686, "end_char_pos": 2696}, {"type": "D", "before": "(2008: 143)", "after": null, "start_char_pos": 2730, "end_char_pos": 2741}, {"type": "D", "before": "(Kim 1978)", "after": null, "start_char_pos": 3234, "end_char_pos": 3244}, {"type": "R", "before": "(Waddell 1979, Roberts 2018) Being Time (Cleary 1986)", "after": "Being Time", "start_char_pos": 3256, "end_char_pos": 3309}, {"type": "D", "before": "(Welch and Tanahashi 1985)", "after": null, "start_char_pos": 3321, "end_char_pos": 3347}, {"type": "R", "before": "(Nearman 2007)", "after": ".", "start_char_pos": 3439, "end_char_pos": 3453}, {"type": "R", "before": "(Nishijima and Cross 2008) Existential moment (Raud 2012)", "after": "Existential moment", "start_char_pos": 3469, "end_char_pos": 3526}, {"type": "D", "before": "(Waddell and Abe 2001: 47)", "after": null, "start_char_pos": 3749, "end_char_pos": 3775}, {"type": "R", "before": "(tr. Waddell and Abe 2001: 48)", "after": ".", "start_char_pos": 4898, "end_char_pos": 4928}, {"type": "R", "before": "(adapting Lucut 2001):", "after": ":", "start_char_pos": 5157, "end_char_pos": 5179}, {"type": "R", "before": "(tr. Heine 1985: 155)", "after": "Tr. .", "start_char_pos": 5291, "end_char_pos": 5312}, {"type": "D", "before": "(tr. Welch and Takahashi 1985: 76)", "after": null, "start_char_pos": 5432, "end_char_pos": 5466}, {"type": "R", "before": "(tr. Cleary 1986: 104)", "after": "Tr. .", "start_char_pos": 5595, "end_char_pos": 5617}, {"type": "D", "before": "(tr. Nearman 2007: 106)", "after": null, "start_char_pos": 5753, "end_char_pos": 5776}, {"type": "R", "before": "ocean (tr. Katagiri 2007: 85)", "after": "oceanTr. .", "start_char_pos": 5868, "end_char_pos": 5897}, {"type": "D", "before": "(tr. Nishijima and Cross 2008: 143)", "after": null, "start_char_pos": 6001, "end_char_pos": 6036}, {"type": "R", "before": "(Waddell and Abe 2001: 48)", "after": ".", "start_char_pos": 6257, "end_char_pos": 6283}, {"type": "R", "before": "(Heine 1985 and Stambaugh 1990) and", "after": "and", "start_char_pos": 6408, "end_char_pos": 6443}, {"type": "R", "before": "(tr. Welch and Tanahashi 1985).", "after": ".", "start_char_pos": 6608, "end_char_pos": 6639}, {"type": "D", "before": "(1978: 45)", "after": null, "start_char_pos": 6914, "end_char_pos": 6924}, {"type": "D", "before": "(1983: 139-140)", "after": null, "start_char_pos": 7719, "end_char_pos": 7734}, {"type": "D", "before": "(1985: 105-152)", "after": null, "start_char_pos": 8305, "end_char_pos": 8320}, {"type": "D", "before": "(1988: 2)", "after": null, "start_char_pos": 9069, "end_char_pos": 9078}, {"type": "D", "before": "(1996)", "after": null, "start_char_pos": 9430, "end_char_pos": 9436}, {"type": "D", "before": "(1990: ix)", "after": null, "start_char_pos": 9811, "end_char_pos": 9821}, {"type": "D", "before": "(1995: 392).", "after": null, "start_char_pos": 10588, "end_char_pos": 10600}, {"type": "D", "before": "(Collier 2000: 59)", "after": null, "start_char_pos": 11188, "end_char_pos": 11206}, {"type": "D", "before": "(2000: 62)", "after": null, "start_char_pos": 11575, "end_char_pos": 11585}, {"type": "D", "before": "(2000: 57)", "after": null, "start_char_pos": 11991, "end_char_pos": 12001}, {"type": "D", "before": "(2000: 70)", "after": null, "start_char_pos": 12360, "end_char_pos": 12370}, {"type": "R", "before": "(2004)", "after": ".", "start_char_pos": 12463, "end_char_pos": 12469}, {"type": "D", "before": "(2012)", "after": null, "start_char_pos": 12495, "end_char_pos": 12501}, {"type": "D", "before": "(2004: 46)", "after": null, "start_char_pos": 12801, "end_char_pos": 12811}, {"type": "D", "before": "(2012:153)", "after": null, "start_char_pos": 13348, "end_char_pos": 13358}, {"type": "D", "before": "(2012: 167)", "after": null, "start_char_pos": 13543, "end_char_pos": 13554}, {"type": "D", "before": "(Welch and Tanahashi)", "after": null, "start_char_pos": 13806, "end_char_pos": 13827}, {"type": "D", "before": "(Myers)", "after": null, "start_char_pos": 13841, "end_char_pos": 13848}, {"type": "D", "before": "(Cleary)", "after": null, "start_char_pos": 13917, "end_char_pos": 13925}, {"type": "D", "before": "(Waddell)", "after": null, "start_char_pos": 13992, "end_char_pos": 14001}, {"type": "R", "before": "(Myers 2008: 114)", "after": ".", "start_char_pos": 14308, "end_char_pos": 14325}, {"type": "R", "before": "(tr.Waddell 1979: 120).", "after": ".Tr. .", "start_char_pos": 14692, "end_char_pos": 14715}, {"type": "R", "before": "(tr. Raud 2012:165)", "after": "Tr. .", "start_char_pos": 15143, "end_char_pos": 15162}, {"type": "D", "before": "(2007: 85)", "after": null, "start_char_pos": 15473, "end_char_pos": 15483}, {"type": "D", "before": "(2007: 93)", "after": null, "start_char_pos": 15694, "end_char_pos": 15704}, {"type": "D", "before": "Abe, Masao and Steven Heine, tr. (1988), \"D\u014dgen's View of Time and Space\", The Eastern Buddhist 21.2: 1-35. Cleary, Thomas (1986), Sh\u014db\u014dgenz\u014d, Zen essays, University of Hawaii Press. Collier, Trent (2000), \"Time and Self: Religious Awakening in D\u014dgen and Shinran\", The Eastern Buddhist 32.1: 56-84.", "after": null, "start_char_pos": 15718, "end_char_pos": 16016}, {"type": "A", "before": null, "after": "Footnotes", "start_char_pos": 16017, "end_char_pos": 16017}, {"type": "A", "before": null, "after": "Further reading", "start_char_pos": 16018, "end_char_pos": 16018}, {"type": "D", "before": "Heine, Steven (1983), \"Temporality of Hermeneutics in D\u014dgen's \"Sh\u014db\u014dgenz\u014d\", Philosophy East and West 33.2: 139-147. Heine, Steven (1985), Existential and Ontological Dimensions of Time in Heidegger and D\u014dgen, SUNY Press. Katagiri, Dainin (2007), Each Moment Is the Universe: Zen and the Way of Being Time, Shambhala Publications. Myers, Bob (2008), First D\u014dgen Book, Selected essays from D\u014dgen Zenji's Sh\u014db\u014dgenz\u014d, Terebess. Nearman, Hubert (2007), Sh\u014db\u014dgenz\u014d, The Treasure House of the Eye of the True Teaching, A Trainee's Translation of Great Master D\u014dgen's Spiritual Masterpiece, Shasta Abbey Press.", "after": null, "start_char_pos": 16108, "end_char_pos": 16710}, {"type": "D", "before": "Nishijima, Gudo and Chodo Cross, trans. (2008, 2019), Sh\u014db\u014dgenz\u014d: The True Dharma-Eye Treasury, 4 vols, Numata Center for Buddhist Translation and Research. Kim, Hee-Jin (1978), \"Existence/Time as the Way of Ascesis: An Analysis of the Basic Structure of D\u014dgen's Thought\", The Eastern Buddhist 11.2: 43-73.", "after": null, "start_char_pos": 16825, "end_char_pos": 17131}, {"type": "D", "before": ". Raud, Rein (2004), \"'Place' and 'Being-Time': Spatiotemporal Concepts in the Thought of Nishida Kitar\u014d and D\u014dgen Kigen\", Philosophy East and West 54.1: 29-51. Raud, Rein (2012), \"The Existential Moment: Rereading D\u014dgen's Theory of Time\", Philosophy East and West 62.2: 153\u2013173. Roberts, Shinshu (2018), Being-Time: A Practitioner's Guide to D\u014dgen's Sh\u014db\u014dgenz\u014d Uji, Wisdom Publications. Stambaugh, Joan (1990), Impermanence is Buddha-Nature: D\u014dgen's Understanding of Temporality, University of Hawaii Press. Stambaugh, Joan (1996), tr. of Martin Heidegger Being and Time, SUNY Press. Tanaka, Koji (2013), \"Contradictions in D\u014dgen,\" Philosophy East and West 63.3: 322-334. Vorenkamp, Dirck (1995), \"B-Series Temporal Order in D\u014dgen's Theory of Time,\" Philosophy East and West 45.3: 387-408. Waddell, Norman (1979), \"Being Time: D\u014dgen's Sh\u014db\u014dgenz\u014d Uji\", The Eastern Buddhist 12.1: 114-129. Waddell, Norman and Abe, Masao, trans. (2001), \"Uji \u6709\u6642 (Being-Time)\", in The Heart of D\u014dgen's Sh\u014db\u014dgenz\u014d, 47-58, SUNY Press. Watanabe Toshir\u014d (\u6e21\u908a\u654f\u90ce), Edmund R. Skrzypczak, and Paul Snowden, eds. (2003), Kenkyusha's New Japanese-English Dictionary (\u65b0\u548c\u82f1\u5927\u8f9e\u5178), 5th edition, Kenkyusha. Welch, Dan and Kazuaki Tanahashi, trs. (1985), \"The Time-Being, Uji\", from The Moon in a Dewdrop; writings of Zen Master D\u014dgen, ed. by Kazuaki Tanahashi, 76-83, North Point Press", "after": null, "start_char_pos": 17449, "end_char_pos": 18797}], "sents_char_pos": [0, 153, 482, 551, 679, 889, 1208, 1357, 1374, 1388, 1408, 1421, 1468, 1536, 1730, 1988, 2073, 2088, 2103, 2121, 2144, 2348, 2386, 2515, 2838, 3079, 3171, 3668, 3970, 4129, 4349, 4433, 4502, 4583, 4676, 4720, 4767, 4838, 4897, 5083, 5095, 5236, 5290, 5365, 5431, 5530, 5594, 5752, 5822, 6000, 6176, 6375, 6486, 6498, 6612, 6639, 6847, 6926, 7210, 7353, 7628, 7736, 7922, 8046, 8322, 8507, 8827, 8921, 9326, 9534, 9817, 10133, 10249, 10346, 10507, 10600, 10784, 10911, 11068, 11208, 11322, 11503, 11587, 11666, 11745, 12003, 12061, 12181, 12517, 12813, 13103, 13360, 13556, 13649, 13703, 13726, 14003, 14402, 14562, 14616, 14696, 14715, 14767, 14904, 14984, 15042, 15142, 15354, 15485, 15512, 15568, 15647, 15825, 15900, 16016, 16070, 16107, 16223, 16328, 16437, 16531, 16710, 16824, 16864, 16981, 17131, 17191, 17307, 17728, 17836, 17957, 18033, 18121, 18239, 18337, 18376, 18462, 18618, 18716]}
+{"doc_id": "61838342", "revision_depth": "2", "before_revision": "Ivan Srebrenjak or Srebrnjak (1903 \u2013 21 May 1942) was the head of Soviet intelligence network of NKVD for the Balkans at the beginning of Axis occupation of Yugoslavia.:\"the head of the Russian intelligence network in the Balkans was Ivan Srebrnjak, also known as Antonov, Ivancic, Doctor, and by other aliases, a Yugoslav worker from Slavonski Brod who had been trained by the NKVD and assigned to work\" Srebrenjak was born in 1903 in Austro-Hungarian region of Slavonia that became part of Yugoslavia in 1918. Srebrenjak became a member Yugoslav Communist Party since 1928. After he killed a Yugoslav policeman in 1930 he left Yugoslavia and became a member of a group of Stalins killers known as \"liquidators\" headed by Josip Broz Tito. When Axis forces occupied Yugoslavia in 1941 Srebrenjak returned to Yugoslavia and set a NKVD center in Zagreb, a part of Red Orchestra network. Tito considered him as an enemy and requested from Stalin to relieve Srebrenjak from that position, which was refused by Stalin. Soon, somebody informed Gestapo and Usta\u0161e about Srebrenjak and he was captured. In captivity Srebrenjak was the first person to identify Tito as leader of Communist resistance movement in Yugoslavia to German and Usta\u0161e authorities. To minimize damage for his position Tito ordered to Stevo Kraja\u010di\u0107 to organize murder of Srebrenjak and on 21 May 1942 Srebrenjak was killed in Usta\u0161e prison. Murder of Srebrenjak allowed Tito to seize and stabilize his position of leader of the Communist Party of Yugoslavia. In Soviet Union Srebrenjak became a Soviet citizen with name Petar Petrovi\u010d Antonov who was considered as one of the most capable intelligence officers. Initially, there were four centers of NKVD in Zagreb, parts of Red Orchestra, one operated by Andrija Hebrang, second by Stevan Kraja\u010di\u0107, third by Josip Kopini\u010d and fourth by Ivan Srebrenjak. During World War II When Axis forces attacked Kingdom of Yugoslavia in April 1941, Srebrenjak came from France to Zagreb to set \"information point\" of Soviet intelligence in Zagreb. In Zagreb Srebrenjak became a head of Soviet intelligence network of NKVD for the Balkans. Srebrnjak operated from this center in Zagreb together with his wife Fran\u010di\u0161ka Srebrenjak (nee Klinc), who was secret agent of the Yugoslav police and later Gestapo.:\"Drugi, vojno-obve\u0161\u010devalni center je vodil Ivan Srebrnjak - Antonov s Fran\u010di\u0161ko Klinc, tajno sodelavko jugoslovanske policije in gestapa.\" According to some sources she had a love affair with Stjepan \u0110akovi\u0107, the older son of \u0110uro \u0110akovi\u0107. Srebrenjak was the first victim of Tito's ambitions to became the leading Stallin 's intelligence officer not only for Yugoslavia but also for other Balkan countries as well.:\" \u041f\u0440\u0432\u0430 \u0436\u0440\u0442\u0432\u0430 \u0448\u043f\u0438\u0458\u0443\u043d\u0441\u043a\u0438\u0445 \u0430\u043c\u0431\u0438\u0446\u0438\u0458\u0430 \u201e\u0434\u0440\u0443\u0433\u0430 \u0412\u0430\u043b\u0442\u0435\u0440\u0430\" \u0442\u0430\u0434\u0430. \u043f\u043e\u0441\u0442\u0430\u0458\u0435 \u045a\u0435\u0433\u043e\u0432 \u0441\u0442\u0430\u0440\u0438 \u043f\u043e\u0437\u043d\u0430\u043d\u0438\u043a \u0418\u0432\u0430\u043d \u0421\u0440\u0435\u0431\u0440\u0435\u045a\u0430\u043a\" In a telegram sent to Tito on 1 July 1941, Kopini\u010d asserted that Popovi\u0107, Kon\u010dar and Srebrenjak are enemy spies.:\"In a cable sent to Tito on July 1, KopiniC accused Popovi<5 , Koncar, and Srebrnjak (Antonov), an agent of the Soviet military counterintelligence, of being spies.\" Srebrenjak believed that some of Titos close associates, like Ivo Lola Ribar and Boris Kidri\u010d were in service of the Yugoslav regime At the beginning of August 1941 Tito sent telegram to Kominterna insisting that Srebrenjak should transfer all of his men to Communist Party of Yugoslavia who will train them as diversants because he did not organize this training himself and members of the party lost confidence in him.:\"\u0423 \u0442\u043e\u043a\u0443 \u0430\u0432\u0433\u0443\u0441\u0442\u0430, \u0422\u0438\u0442\u043e \u0458\u0435 \u0443\u043f\u0443\u0442\u0438\u043e \u0432\u0438\u0448\u0435 \u0434\u0435\u043f\u0435\u0448\u0430 \u041a\u043e\u043c\u0438\u043d\u0442\u0435\u0440\u043d\u0438. \u041f\u043e\u0447\u0435\u0442- \u043a\u043e\u043c \u043c\u0435\u0441\u0435\u0446\u0430 \u0442\u0440\u0430\u0436\u0438 \u0434\u0430 \u0418\u0432\u0430\u043d \u0421\u0440\u0435\u0431\u0440\u0435\u045a\u0430\u043a (\u0410\u043d\u0442\u043e\u043d\u043e\u0432), \u043a\u043e\u0458\u0438 \u0458\u0435 \u0443 \u0417\u0430\u0433\u0440\u0435\u0431\u0443 \u0440\u0430\u0434\u0438\u043e \u0437\u0430 \u0441\u043e\u0432\u0458\u0435\u0442\u0441\u043a\u0443 \u043e\u0431\u0430\u0432\u0435\u0448\u0442\u0430\u0458\u043d\u0443 \u0441\u043b\u0443\u0436\u0431\u0443, \u0430 \u0442\u0440\u0435\u0431\u0430\u043b\u043e \u0458\u0435, \u043f\u0440\u0435\u043c\u0430 \u0434\u043e\u0433\u043e\u0432\u043e\u0440\u0443 \u0441\u0430 \u0440\u0443\u043a\u043e\u0432\u043e\u0434\u0441\u0442\u0432\u043e\u043c \u041a\u041f\u0408, ...\" Tito hated Srebrenjak because he reported to Stalin about Titos struggle for leadership of the Communist Party of Yugoslavia. He requested from Stalin to relieve Srebrenjak from his post accusing him for being Gestapo collaborator, but this attempt of Tito failed thanks to Srebrenjaks powerful Soviet patrons. Usta\u0161e and Gestapo were already informed about activities of Srebrenjak by Slavko \u0110uki\u0107 who was associate of Srebrenjak, but it was Joco \u0110akovi\u0107 who was younger son of \u0110uro \u0110akovi\u0107 and who was arrested in December 1941 and identified Srebrenjak to Usta\u0161e.", "after_revision": "Ivan Srebrenjak or Srebrnjak (1903 \u2013 21 May 1942) ran a Soviet intelligence network for the NKVD in the Balkans at the beginning of Axis occupation of Yugoslavia.:\"the head of the Russian intelligence network in the Balkans was Ivan Srebrnjak, also known as Antonov, Ivancic, Doctor, and by other aliases, a Yugoslav worker from Slavonski Brod who had been trained by the NKVD and assigned to work\" Srebrenjak was born in 1903 in Austro-Hungarian region of Slavonia that became part of Yugoslavia in 1918. Srebrenjak became a member Yugoslav Communist Party since 1928. After he killed a Yugoslav policeman in 1930 he left Yugoslavia and became a member of a group of Stalin's killers known as \"liquidators\" headed by Josip Broz Tito. When Axis forces occupied Yugoslavia in 1941 Srebrenjak returned to Yugoslavia and set up an NKVD centre in Zagreb, a part of Red Orchestra network. Tito considered him as an enemy and requested approval from Stalin to relieve Srebrenjak of that position, which was refused by Stalin. Subsequently, Srebrenjak was denounced to the Gestapo and Usta\u0161e and he was captured. In captivity Srebrenjak was the first person to identify Tito as leader of Communist resistance movement in Yugoslavia to German and Usta\u0161e authorities. To minimize further damage to his position Tito ordered to Stevo Kraja\u010di\u0107 to organize the murder of Srebrenjak and on 21 May 1942 Srebrenjak was killed in Usta\u0161e prison. This murder allowed Tito to seize and stabilize his position of leader of the Communist Party of Yugoslavia. In the Soviet Union Srebrenjak became a Soviet citizen with name Petar Petrovi\u010d Antonov who was considered as one of the most capable intelligence officers. Initially, there were four centres of NKVD in Zagreb, parts of Red Orchestra, one operated by Andrija Hebrang, a second by Stevan Kraja\u010di\u0107, a third by Josip Kopini\u010d and a fourth by Ivan Srebrenjak. During World War II When Axis forces attacked Kingdom of Yugoslavia in April 1941, Srebrenjak came from France to Zagreb to run an \"information point\" for Soviet intelligence in Zagreb. In Zagreb Srebrenjak became a head of Soviet intelligence network of the NKVD for the Balkans. Srebrenjak operated from this centre in Zagreb together with his wife Fran\u010di\u0161ka Srebrenjak (nee Klinc), who was a secret agent of the Yugoslav police and later Gestapo.:\"Drugi, vojno-obve\u0161\u010devalni center je vodil Ivan Srebrnjak - Antonov s Fran\u010di\u0161ko Klinc, tajno sodelavko jugoslovanske policije in gestapa.\" According to some sources she had a love affair with Stjepan \u0110akovi\u0107, the elder son of \u0110uro \u0110akovi\u0107. Srebrenjak was the first victim of Tito's ambitions to become Stalin 's intelligence officer not only for Yugoslavia but also for other Balkan countries as well.:\" \u041f\u0440\u0432\u0430 \u0436\u0440\u0442\u0432\u0430 \u0448\u043f\u0438\u0458\u0443\u043d\u0441\u043a\u0438\u0445 \u0430\u043c\u0431\u0438\u0446\u0438\u0458\u0430 \u201e\u0434\u0440\u0443\u0433\u0430 \u0412\u0430\u043b\u0442\u0435\u0440\u0430\" \u0442\u0430\u0434\u0430. \u043f\u043e\u0441\u0442\u0430\u0458\u0435 \u045a\u0435\u0433\u043e\u0432 \u0441\u0442\u0430\u0440\u0438 \u043f\u043e\u0437\u043d\u0430\u043d\u0438\u043a \u0418\u0432\u0430\u043d \u0421\u0440\u0435\u0431\u0440\u0435\u045a\u0430\u043a\" In a telegram sent to Tito on 1 July 1941, Kopini\u010d asserted that Popovi\u0107, Kon\u010dar and Srebrenjak are enemy spies.:\"In a cable sent to Tito on July 1, Kopini\u0107 accused Popovi\u0107 , Koncar, and Srebrnjak (Antonov), an agent of the Soviet military counterintelligence, of being spies.\" Srebrenjak believed that some of Tito's close associates, like Ivo Lola Ribar and Boris Kidri\u010d were in service of the Yugoslav regime At the beginning of August 1941 Tito sent a telegram to Komintern insisting that Srebrenjak transfer all of his men to Communist Party of Yugoslavia control for training them as diversants because he did not organize this training himself and members of the party lost confidence in him.:\"\u0423 \u0442\u043e\u043a\u0443 \u0430\u0432\u0433\u0443\u0441\u0442\u0430, \u0422\u0438\u0442\u043e \u0458\u0435 \u0443\u043f\u0443\u0442\u0438\u043e \u0432\u0438\u0448\u0435 \u0434\u0435\u043f\u0435\u0448\u0430 \u041a\u043e\u043c\u0438\u043d\u0442\u0435\u0440\u043d\u0438. \u041f\u043e\u0447\u0435\u0442- \u043a\u043e\u043c \u043c\u0435\u0441\u0435\u0446\u0430 \u0442\u0440\u0430\u0436\u0438 \u0434\u0430 \u0418\u0432\u0430\u043d \u0421\u0440\u0435\u0431\u0440\u0435\u045a\u0430\u043a (\u0410\u043d\u0442\u043e\u043d\u043e\u0432), \u043a\u043e\u0458\u0438 \u0458\u0435 \u0443 \u0417\u0430\u0433\u0440\u0435\u0431\u0443 \u0440\u0430\u0434\u0438\u043e \u0437\u0430 \u0441\u043e\u0432\u0458\u0435\u0442\u0441\u043a\u0443 \u043e\u0431\u0430\u0432\u0435\u0448\u0442\u0430\u0458\u043d\u0443 \u0441\u043b\u0443\u0436\u0431\u0443, \u0430 \u0442\u0440\u0435\u0431\u0430\u043b\u043e \u0458\u0435, \u043f\u0440\u0435\u043c\u0430 \u0434\u043e\u0433\u043e\u0432\u043e\u0440\u0443 \u0441\u0430 \u0440\u0443\u043a\u043e\u0432\u043e\u0434\u0441\u0442\u0432\u043e\u043c \u041a\u041f\u0408, ...\" Tito hated Srebrenjak because he reported to Stalin about Tito's struggle for leadership of the Communist Party of Yugoslavia. He requested from Stalin to relieve Srebrenjak from his post accusing him of being a Gestapo collaborator, but this attempt of Tito failed thanks to Srebrenjak's powerful Soviet patrons. Usta\u0161e and Gestapo were already informed about activities of Srebrenjak by Slavko \u0110uki\u0107 who was an associate of Srebrenjak, but it was Joco \u0110akovi\u0107 who was younger son of \u0110uro \u0110akovi\u0107 and who was arrested in December 1941 and identified Srebrenjak to Usta\u0161e.", "edit_actions": [{"type": "R", "before": "was the head of", "after": "ran a", "start_char_pos": 50, "end_char_pos": 65}, {"type": "R", "before": "of NKVD for the", "after": "for the NKVD in the", "start_char_pos": 94, "end_char_pos": 109}, {"type": "R", "before": "Stalins", "after": "Stalin's", "start_char_pos": 674, "end_char_pos": 681}, {"type": "R", "before": "a NKVD center", "after": "up an NKVD centre", "start_char_pos": 827, "end_char_pos": 840}, {"type": "A", "before": null, "after": "approval", "start_char_pos": 931, "end_char_pos": 931}, {"type": "R", "before": "from", "after": "of", "start_char_pos": 966, "end_char_pos": 970}, {"type": "R", "before": "Soon, somebody informed", "after": "Subsequently, Srebrenjak was denounced to the", "start_char_pos": 1015, "end_char_pos": 1038}, {"type": "D", "before": "about Srebrenjak", "after": null, "start_char_pos": 1058, "end_char_pos": 1074}, {"type": "R", "before": "damage for", "after": "further damage to", "start_char_pos": 1261, "end_char_pos": 1271}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1328, "end_char_pos": 1328}, {"type": "R", "before": "Murder of Srebrenjak", "after": "This murder", "start_char_pos": 1409, "end_char_pos": 1429}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1530, "end_char_pos": 1530}, {"type": "R", "before": "centers", "after": "centres", "start_char_pos": 1708, "end_char_pos": 1715}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1792, "end_char_pos": 1792}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1820, "end_char_pos": 1820}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1848, "end_char_pos": 1848}, {"type": "R", "before": "set", "after": "run an", "start_char_pos": 2000, "end_char_pos": 2003}, {"type": "R", "before": "of", "after": "for", "start_char_pos": 2024, "end_char_pos": 2026}, {"type": "A", "before": null, "after": "the", "start_char_pos": 2127, "end_char_pos": 2127}, {"type": "R", "before": "Srebrnjak", "after": "Srebrenjak", "start_char_pos": 2150, "end_char_pos": 2159}, {"type": "R", "before": "center", "after": "centre", "start_char_pos": 2179, "end_char_pos": 2185}, {"type": "A", "before": null, "after": "a", "start_char_pos": 2261, "end_char_pos": 2261}, {"type": "R", "before": "older", "after": "elder", "start_char_pos": 2530, "end_char_pos": 2535}, {"type": "R", "before": "became the leading Stallin", "after": "become Stalin", "start_char_pos": 2612, "end_char_pos": 2638}, {"type": "R", "before": "KopiniC accused Popovi<5", "after": "Kopini\u0107 accused Popovi\u0107", "start_char_pos": 2981, "end_char_pos": 3005}, {"type": "R", "before": "Titos", "after": "Tito's", "start_char_pos": 3144, "end_char_pos": 3149}, {"type": "R", "before": "telegram to Kominterna", "after": "a telegram to Komintern", "start_char_pos": 3286, "end_char_pos": 3308}, {"type": "D", "before": "should", "after": null, "start_char_pos": 3335, "end_char_pos": 3341}, {"type": "R", "before": "who will train", "after": "control for training", "start_char_pos": 3399, "end_char_pos": 3413}, {"type": "R", "before": "Titos", "after": "Tito's", "start_char_pos": 3811, "end_char_pos": 3816}, {"type": "R", "before": "for being", "after": "of being a", "start_char_pos": 3953, "end_char_pos": 3962}, {"type": "R", "before": "Srebrenjaks", "after": "Srebrenjak's", "start_char_pos": 4027, "end_char_pos": 4038}, {"type": "A", "before": null, "after": "an", "start_char_pos": 4160, "end_char_pos": 4160}], "sents_char_pos": [0, 168, 511, 575, 739, 884, 1014, 1095, 1248, 1408, 1526, 1680, 1875, 2057, 2149, 2316, 2455, 2556, 2731, 2786, 2944, 3110, 3531, 3587, 3878, 4063]}
+{"doc_id": "62567195", "revision_depth": "2", "before_revision": "Madugalle Udagabada Nilame (Sinhala:\u0db8\u0da9\u0dd4\u0d9c\u0dbd\u0dca\u0dbd\u0dda \u0d8b\u0da9\u0d9c\u0db6\u0da9\u0dcf \u0db1\u0dd2\u0dbd\u0db8\u0dd9), more widely known as Madugalle Nilame was a Nilame, an official under the rule of King Sri Wikrama Rajasinghe and later under the British Administration in Sri Lanka (then known as Ceylon). He was a major prominent leader of the Uva rebellion of 1818 after he joined the rebels whom he was sent to suppress by the British . The rebellion was defeated by the British, and Madugalle Disawe along with several other leaders of the rebellion were found guilty . Before the Rebellion In the middle of 1816, the Madugalle Nilame and others conspired to oust the English and enthrone a Sinhala king. But a pro-British Nilame took steps to provide information on the conspiracy to the English . He conspired to overthrow the British government and was imprisoned . He was imprisoned in Jaffna Prison from September 1816 to August 1817. He was released in mid-August 1817. The Madugalle Nilame has gone down in history as the first person to be imprisoned after overthrowing the British government . The English took steps to remove him from the post of superintendent and from the post of Gampaha. The freed Madugalle Nilame again fought to drive the British out of Lanka in 1817 and 1818 In to the Uwa Wellassa Great Rebellion Madugalle Upa Gabada Nilame , an indomitable hero of the 1818 liberation struggle who sacrificed his life for his motherland ..! Madugalle Nilame was one of the main leaders in the freedom struggle of 1817-1818 with the aim of expelling the British from the country and making Sri Lanka an independent state again. The English have stated that the third main leader of the rebellion was the Madugalle Nilame. The Nilame has been loved and respected by many locals for his heroic deeds on the battlefield. The British imposed martial law to suppress the fighting and relentlessly killed the Sinhalese people . They were displaced by breaking down houses and setting them on fire. The canals and streams were broken and the plantations and fields were destroyed to starve to death. The English, as well as their helpers , slaughtered cattle and ate their meat, depriving the villagers of the benefits of cattle. The English rulers generously gave liquor to the officers, the soldiers and those who helped them. Intoxicated, they raped and killed little girls. Women were raped and killed. Girls and women were unfortunate enough to die under the persecution of foreigners in their homeland. In the midst of the repression, the British resorted to various tactics to capture the leaders who led the fighting. Where they could not do the work, they did not hesitate to get others to take the necessary action to accomplish it. The leaders publicly stated that they would give the captors a very high reward. The Governor-General of England, Robert Brownrigg, published a proclamation on March 19, 1818, which contained the names of a group of rebellious leaders and the amount of gifts to be given to their captors. Some may have been greedy enough to capture the leaders of the battle and take bribes from the British. But no one has had the ability or opportunity to capture the leaders. On the morning of September 22, 1818, a group of 70 English men invaded Teldeniyain the Dumbara Province . At that time the power in Teldeniya was under the Madugalle Nilame . Due to the power of the Madugalle Nilame , the people of Teldeniya did not show allegiance to the British. But after about five days, some of the inhabitants gradually began to show allegiance to the English. That allegiance was so great that a Vidanevara who had served the Madugalle Nilame had agreed to hand over the Madugalle Nilame to the English . On the night of September 27, a group of British troops, with the help of Vidanewara, marched with great difficulty to Madugalle Madugalle village in Madugalle Nilame's palace. The group had entered the Madugalle village on the morning of the 28th. The group entered the Vidanevara's house and hid there to trap the Madugalle Nilame that night. The Teldeniya Commanding Officer Captain Dobin was alarmed as he did not receive any information about the troops who went to Madugalle village. Meanwhile, Domin also received information about a gunshot fired from the Madugalle village. Dobin , who thought his troops might be in trouble, immediately sent troops to the village of Madugalle to help. The Madugalle Nilame was informed of the arrival of the troops . Hay immediately fled. Although the Nilame could not be captured, the English troops were able to free two Lanci men captured by the Nilame's forces in March 1818. On September 29 , 1818, a group of soldiers under Lieutenant Colonel Hardy marched towards Dumbara. On October 1 , Colonel Hardy attempted to capture the Madugalle Nilame. The Nilame chased after him but could not catch him. The Nilame fled towards the ground. Although the Nilame could not be captured, they were able to seize a stock of military equipment to capture those who provided security for the Nilame. No specific location information was available later. But steps have been taken to increase the search for the whereabouts of the leaders. It was October 28 , 1818. Lieutenant William O'Neill assaulted and restrained a man with a stone gun and obtained very special information from him . Based on the information received, at around 3.00 pm, a group of about 30 troops deployed surrounded a palace near Paravahagama . Upon entering the palace, O'Neill was able to take control of the Keppetipola Pilimatalawa district. A group including the Madugalle Nilame who were there fled. A group of nineteen persons including the Nilame had fled. Later a group of villagers came to know about the whereabouts of the Nilame. The villagers put the information to the ears of the English. On the morning of November 2, 1818, with the assistance of the villagers of Nigawella, Pubbiliya and Kongahawela, Udugoda Korale, Matale, the Seventy-third Regiment's Ensign Suitbread, with a contingent of troops, captured the Madugalle Nilame at the Matale Kaikawala outpost . The Nilame was caught near Elahera. The English did not forget to thank the villagers who captured the Nilame . Steps were taken to give them an easier tax system. A case was filed in the Kandy Court Martial on the charge of war . The verdict in the case was announced on November 16, 1818, and he was ordered to be beheaded. He was beheaded on November 26, 1818 at the Bogambara Lake in Kandy. The houses and estates belonging to the Nilame were confiscated without killing him . The Nilame's wife and four sons were sent to Kalutara and his mother and sister to Colombo in retaliation from relatives.", "after_revision": "Madugalle Udagabada Nilame (Sinhala:\u0db8\u0da9\u0dd4\u0d9c\u0dbd\u0dca\u0dbd\u0dda \u0d8b\u0da9\u0d9c\u0db6\u0da9\u0dcf \u0db1\u0dd2\u0dbd\u0db8\u0dd9), more widely known as Madugalle Nilame was a Nilame, an official under the rule of King Sri Wikrama Rajasinghe and later under the British Administration in Sri Lanka (then Ceylon). He was a leader of the Uva rebellion of 1818. He joined the rebels whom the British sent him to suppress . The rebellion was defeated by the British, and Madugalle along with several other leaders of the rebellion were convicted of insurrection . Background In the middle of 1816, Madugalle Nilame and others conspired to oust the British and enthrone a Sinhala king. But a pro-British Nilame provided information on the conspiracy to the British . He was imprisoned in Jaffna Prison from September 1816 to August 1817. He was the first rebel to be imprisoned . The British removed him from the post of superintendent and from the post of Gampaha. Great Rebellion Madugalle Nilame was one of the main leaders in the independence struggle of 1817-1818 . The British stated that Madugalle Nilame was the rebellion's third main leader . The British imposed martial law to suppress the fighting and relentlessly killed the Sinhalese . They were displaced by demolishing and torching fire. Canals and streams were destroyed and plantations and fields were destroyed to starve the rebels. The British and their helpers slaughtered and ate the villager's cattle. The British rulers generously gave liquor to the officers, soldiers and those who helped them. Intoxicated, they raped and killed women and girls. The Governor-General of England, Robert Brownrigg, published a proclamation on March 19, 1818, which contained the names of rebel leaders, including Nilame, and the amount of rewards to be given to their captors. On September 22, 1818, 70 British invaded Teldeniya . At that time Nilame led Teldeniya . Following Nilame , the people of Teldeniya did not show allegiance to the British. After about five days, the rebels faltered. A Vidanevara who had served Nilame agreed to hand him to the British . On September 27, British troops, with the help of Vidanewara, fought their way to Madugalle Madugalle village in the palace. The group entered the village on the morning of the 28th. The group entered the Vidanevara's house and hid there to trap Nilame that night. Teldeniya Commanding Officer Captain Dobin became alarmed because he did not receive information about the troops who went to Madugalle village. Then he learned of a gunshot fired from the village. Dobin sent reinforcements. Nilame was informed of the arrival of the troops and fled. The British troops were able to free two Lanci men captured by the Nilame's forces in March 1818. On September 29 Lieutenant Colonel Hardy and his men marched towards Dumbara. On October 1 Colonel Hardy attempted to capture Nilame. The Nilame chased after him but instead seized a stock of military equipment . On October 28 Lieutenant William O'Neill captured a man with a stone gun . Based on the information received, at around 3.00 pm, a group of about 30 troops deployed surrounded a palace near Paravahagama , where Nilame sheltered. When O'Neill entered the palace, Nilame again fled. A group of villagers later learned about his whereabouts and informed the British. On the morning of November 2, with the assistance of the villagers of Nigawella, Pubbiliya , Kongahawela, Udugoda Korale, and Matale, the Seventy-third Regiment's Ensign Suitbread, with a contingent of troops, captured Nilame at the Matale Kaikawala outpost near Elahera. The villagers who captured the Nilame were rewarded with an easier tax system. Execution Charges against him were filed in the Kandy Court . The verdict was announced on November 16. He was beheaded on November 26, 1818 at Bogambara Lake in Kandy. HIs houses and estates belonging to the Nilame were confiscated . The Nilame's wife and four sons were sent to Kalutara and his mother and sister to Colombo in retaliation from relatives.", "edit_actions": [{"type": "D", "before": "known as", "after": null, "start_char_pos": 232, "end_char_pos": 240}, {"type": "D", "before": "major prominent", "after": null, "start_char_pos": 259, "end_char_pos": 274}, {"type": "R", "before": "1818 after he", "after": "1818. He", "start_char_pos": 306, "end_char_pos": 319}, {"type": "R", "before": "he was sent to suppress by the British", "after": "the British sent him to suppress", "start_char_pos": 343, "end_char_pos": 381}, {"type": "D", "before": "Disawe", "after": null, "start_char_pos": 441, "end_char_pos": 447}, {"type": "R", "before": "found guilty", "after": "convicted of insurrection", "start_char_pos": 503, "end_char_pos": 515}, {"type": "R", "before": "Before the Rebellion", "after": "Background", "start_char_pos": 518, "end_char_pos": 538}, {"type": "D", "before": "the", "after": null, "start_char_pos": 562, "end_char_pos": 565}, {"type": "R", "before": "English", "after": "British", "start_char_pos": 616, "end_char_pos": 623}, {"type": "R", "before": "took steps to provide", "after": "provided", "start_char_pos": 678, "end_char_pos": 699}, {"type": "R", "before": "English", "after": "British", "start_char_pos": 737, "end_char_pos": 744}, {"type": "R", "before": "conspired to overthrow the British government and was imprisoned . He was imprisoned", "after": "was imprisoned", "start_char_pos": 750, "end_char_pos": 834}, {"type": "R", "before": "released in mid-August 1817. The Madugalle Nilame has gone down in history as the first person", "after": "the first rebel", "start_char_pos": 895, "end_char_pos": 989}, {"type": "D", "before": "after overthrowing the British government", "after": null, "start_char_pos": 1007, "end_char_pos": 1048}, {"type": "R", "before": "English took steps to remove", "after": "British removed", "start_char_pos": 1055, "end_char_pos": 1083}, {"type": "D", "before": "The freed Madugalle Nilame again fought to drive the British out of Lanka in 1817 and 1818", "after": null, "start_char_pos": 1150, "end_char_pos": 1240}, {"type": "D", "before": "In to the Uwa Wellassa", "after": null, "start_char_pos": 1241, "end_char_pos": 1263}, {"type": "D", "before": "Upa Gabada Nilame , an indomitable hero of the 1818 liberation struggle who sacrificed his life for his motherland ..!", "after": null, "start_char_pos": 1290, "end_char_pos": 1408}, {"type": "R", "before": "Madugalle Nilame", "after": "Nilame", "start_char_pos": 1409, "end_char_pos": 1425}, {"type": "R", "before": "freedom", "after": "independence", "start_char_pos": 1461, "end_char_pos": 1468}, {"type": "R", "before": "with the aim of expelling the British from the country and making Sri Lanka an independent state again. The English have stated that the", "after": ". The British stated that Madugalle Nilame was the rebellion's", "start_char_pos": 1491, "end_char_pos": 1627}, {"type": "R", "before": "of the rebellion was the Madugalle Nilame. The Nilame has been loved and respected by many locals for his heroic deeds on the battlefield.", "after": ".", "start_char_pos": 1646, "end_char_pos": 1784}, {"type": "D", "before": "people", "after": null, "start_char_pos": 1880, "end_char_pos": 1886}, {"type": "R", "before": "breaking down houses and setting them on fire. The canals", "after": "demolishing and torching fire. Canals", "start_char_pos": 1912, "end_char_pos": 1969}, {"type": "R", "before": "broken and the", "after": "destroyed and", "start_char_pos": 1987, "end_char_pos": 2001}, {"type": "R", "before": "to death. The English, as well as their helpers , slaughtered cattle and ate their meat, depriving the villagers of the benefits of", "after": "the rebels. The British and their helpers slaughtered and ate the villager's", "start_char_pos": 2050, "end_char_pos": 2181}, {"type": "R", "before": "English", "after": "British", "start_char_pos": 2194, "end_char_pos": 2201}, {"type": "D", "before": "the", "after": null, "start_char_pos": 2249, "end_char_pos": 2252}, {"type": "R", "before": "little girls. Women were raped and killed. Girls and women were unfortunate enough to die under the persecution of foreigners in their homeland.", "after": "women and girls.", "start_char_pos": 2324, "end_char_pos": 2468}, {"type": "D", "before": "In the midst of the repression, the British resorted to various tactics to capture the leaders who led the fighting. Where they could not do the work, they did not hesitate to get others to take the necessary action to accomplish it. The leaders publicly stated that they would give the captors a very high reward.", "after": null, "start_char_pos": 2469, "end_char_pos": 2783}, {"type": "R", "before": "a group of rebellious leaders", "after": "rebel leaders, including Nilame,", "start_char_pos": 2908, "end_char_pos": 2937}, {"type": "R", "before": "gifts", "after": "rewards", "start_char_pos": 2956, "end_char_pos": 2961}, {"type": "D", "before": "Some may have been greedy enough to capture the leaders of the battle and take bribes from the British. But no one has had the ability or opportunity to capture the leaders.", "after": null, "start_char_pos": 2992, "end_char_pos": 3165}, {"type": "R", "before": "On the morning of", "after": "On", "start_char_pos": 3166, "end_char_pos": 3183}, {"type": "D", "before": "a group of", "after": null, "start_char_pos": 3204, "end_char_pos": 3214}, {"type": "R", "before": "English men invaded Teldeniyain the Dumbara Province", "after": "British invaded Teldeniya", "start_char_pos": 3218, "end_char_pos": 3270}, {"type": "D", "before": "the power in Teldeniya was under the Madugalle Nilame . Due to the power of the Madugalle", "after": null, "start_char_pos": 3286, "end_char_pos": 3375}, {"type": "A", "before": null, "after": "led Teldeniya . Following Nilame", "start_char_pos": 3383, "end_char_pos": 3383}, {"type": "R", "before": "But after", "after": "After", "start_char_pos": 3450, "end_char_pos": 3459}, {"type": "R", "before": "some of the inhabitants gradually began to show allegiance to the English. That allegiance was so great that a", "after": "the rebels faltered. A", "start_char_pos": 3477, "end_char_pos": 3587}, {"type": "R", "before": "the Madugalle Nilame had", "after": "Nilame", "start_char_pos": 3614, "end_char_pos": 3638}, {"type": "R", "before": "over the Madugalle Nilame to the English", "after": "him to the British", "start_char_pos": 3654, "end_char_pos": 3694}, {"type": "D", "before": "the night of", "after": null, "start_char_pos": 3700, "end_char_pos": 3712}, {"type": "D", "before": "a group of", "after": null, "start_char_pos": 3727, "end_char_pos": 3737}, {"type": "R", "before": "marched with great difficulty", "after": "fought their way", "start_char_pos": 3783, "end_char_pos": 3812}, {"type": "R", "before": "Madugalle Nilame's", "after": "the", "start_char_pos": 3847, "end_char_pos": 3865}, {"type": "R", "before": "had entered the Madugalle", "after": "entered the", "start_char_pos": 3884, "end_char_pos": 3909}, {"type": "D", "before": "the Madugalle", "after": null, "start_char_pos": 4009, "end_char_pos": 4022}, {"type": "D", "before": "The", "after": null, "start_char_pos": 4042, "end_char_pos": 4045}, {"type": "R", "before": "was alarmed as", "after": "became alarmed because", "start_char_pos": 4089, "end_char_pos": 4103}, {"type": "D", "before": "any", "after": null, "start_char_pos": 4123, "end_char_pos": 4126}, {"type": "R", "before": "Meanwhile, Domin also received information about", "after": "Then he learned of", "start_char_pos": 4187, "end_char_pos": 4235}, {"type": "D", "before": "Madugalle", "after": null, "start_char_pos": 4261, "end_char_pos": 4270}, {"type": "R", "before": ", who thought his troops might be in trouble, immediately sent troops to the village of Madugalle to help. The Madugalle", "after": "sent reinforcements.", "start_char_pos": 4286, "end_char_pos": 4406}, {"type": "R", "before": ". Hay immediately", "after": "and", "start_char_pos": 4456, "end_char_pos": 4473}, {"type": "R", "before": "Although the Nilame could not be captured, the English", "after": "The British", "start_char_pos": 4480, "end_char_pos": 4534}, {"type": "D", "before": ", 1818, a group of soldiers under", "after": null, "start_char_pos": 4637, "end_char_pos": 4670}, {"type": "A", "before": null, "after": "and his men", "start_char_pos": 4696, "end_char_pos": 4696}, {"type": "D", "before": ",", "after": null, "start_char_pos": 4735, "end_char_pos": 4736}, {"type": "D", "before": "the Madugalle", "after": null, "start_char_pos": 4772, "end_char_pos": 4785}, {"type": "R", "before": "could not catch him. The Nilame fled towards the ground. Although the Nilame could not be captured, they were able to seize", "after": "instead seized", "start_char_pos": 4826, "end_char_pos": 4949}, {"type": "R", "before": "to capture those who provided security for the Nilame. No specific location information was available later. But steps have been taken to increase the search for the whereabouts of the leaders.", "after": ".", "start_char_pos": 4980, "end_char_pos": 5173}, {"type": "R", "before": "It was", "after": "On", "start_char_pos": 5174, "end_char_pos": 5180}, {"type": "D", "before": ", 1818.", "after": null, "start_char_pos": 5192, "end_char_pos": 5199}, {"type": "R", "before": "assaulted and restrained", "after": "captured", "start_char_pos": 5227, "end_char_pos": 5251}, {"type": "D", "before": "and obtained very special information from him", "after": null, "start_char_pos": 5275, "end_char_pos": 5321}, {"type": "D", "before": ".", "after": null, "start_char_pos": 5452, "end_char_pos": 5453}, {"type": "R", "before": "Upon entering the palace,", "after": ", where Nilame sheltered. When", "start_char_pos": 5454, "end_char_pos": 5479}, {"type": "R", "before": "was able to take control of the Keppetipola Pilimatalawa district. A group including the Madugalle Nilame who were there fled.", "after": "entered the palace, Nilame again fled.", "start_char_pos": 5488, "end_char_pos": 5614}, {"type": "R", "before": "nineteen persons including the Nilame had fled. Later a group of villagers came to know about the whereabouts of the Nilame. The villagers put the information to the ears of the English.", "after": "villagers later learned about his whereabouts and informed the British.", "start_char_pos": 5626, "end_char_pos": 5812}, {"type": "D", "before": "1818,", "after": null, "start_char_pos": 5843, "end_char_pos": 5848}, {"type": "R", "before": "and", "after": ",", "start_char_pos": 5910, "end_char_pos": 5913}, {"type": "A", "before": null, "after": "and", "start_char_pos": 5943, "end_char_pos": 5943}, {"type": "D", "before": "the Madugalle", "after": null, "start_char_pos": 6037, "end_char_pos": 6050}, {"type": "D", "before": ". The Nilame was caught", "after": null, "start_char_pos": 6090, "end_char_pos": 6113}, {"type": "D", "before": "English did not forget to thank the", "after": null, "start_char_pos": 6132, "end_char_pos": 6167}, {"type": "R", "before": ". Steps were taken to give them", "after": "were rewarded with", "start_char_pos": 6202, "end_char_pos": 6233}, {"type": "R", "before": "A case was", "after": "Execution Charges against him were", "start_char_pos": 6256, "end_char_pos": 6266}, {"type": "D", "before": "Martial on the charge of war", "after": null, "start_char_pos": 6292, "end_char_pos": 6320}, {"type": "D", "before": "in the case", "after": null, "start_char_pos": 6335, "end_char_pos": 6346}, {"type": "R", "before": "16, 1818, and he was ordered to be beheaded.", "after": "16.", "start_char_pos": 6373, "end_char_pos": 6417}, {"type": "D", "before": "the", "after": null, "start_char_pos": 6458, "end_char_pos": 6461}, {"type": "R", "before": "The", "after": "HIs", "start_char_pos": 6487, "end_char_pos": 6490}, {"type": "D", "before": "without killing him", "after": null, "start_char_pos": 6551, "end_char_pos": 6570}], "sents_char_pos": [0, 249, 383, 517, 652, 746, 816, 887, 923, 1050, 1149, 1408, 1594, 1688, 1784, 1888, 1958, 2059, 2189, 2288, 2337, 2366, 2468, 2585, 2702, 2783, 2991, 3095, 3165, 3272, 3341, 3449, 3551, 3696, 3873, 3945, 4041, 4186, 4279, 4392, 4479, 4620, 4721, 4793, 4846, 4882, 5034, 5088, 5173, 5199, 5453, 5554, 5614, 5673, 5750, 5812, 6091, 6127, 6203, 6255, 6322, 6417, 6486, 6572]}
+{"doc_id": "62635908", "revision_depth": "1", "before_revision": "The HFE H63D is a single-nucleotide polymorphism in the HFE gene (c.187C>G, rs1799945), which results the substitution of aspartic acid for histidine at amino acid position 63 of the HPE protein (p.His63Asp). The protein participates in the regulation of iron absorption. Homozygous H63D variant is rarely the cause of hemochromatosis , however it is also associated with the occurrence of other conditions like hypotransferrinemia, liver dysfunction, bone and joint issues, diabetes mellitus, heart disease, hormone imbalances, porphyria cutanea tarda (PCT), infertility, stroke, neurodegenerative and brain damages, some cancers, venous and peripheral artery disease. Brain iron accumulation The most relevant risk associated with the H63D variant is for brain damagedue to iron accumulation which causes oxidation processes within the affected cells(chronic oxidative stress) and, as a consequence, leading to cell death (scarring of brain tissue) with severely disturbed neurotransmitter activity. These incurable processes include increased cellular iron, oxidative stress (free radical activity), brain glutamate dysbalance, and abnormal levels of tau proteins and alpha-synuclein which both may result in dementias and parkinson \u2019s disease, or similar conditions. Scientists found that patients homozygous for H63D show a higher risk of earlier signs of cognitive impairment and earlier onset of dementias compared to individuals with normal HFE genes or H63D heterozygous mutation . Cardiac iron accumulation Some individuals with the homozygous H63D variant may show signs of heart disease, cardiomyopathies and disturbances in the calcium channels in particular. Liver disorders The homozygous H63D variant is an indication of an Iron Metabolism Disorder known as Hemochromatosis (Iron Overload) and may increase the risk to develop a fatty liver , cryptic (nonspecific) liver dysfunctions, metabolic syndrome and, in patients with a cirrhotic or a liverdamaged due to alcohol also the rates of liver cancer.", "after_revision": "The HFE H63D is a single-nucleotide polymorphism in the HFE gene (c.187C>G, rs1799945), which results in the substitution of an aspartic acid for a histidine at amino acid position 63 of the HPE protein (p.His63Asp). HFE participates in the regulation of iron absorption. Homozygous H63D variant can occasionally be the cause of hemochromatosis . It is also associated with the occurrence of other conditions like hypotransferrinemia, liver dysfunction, bone and joint issues, diabetes mellitus, heart disease, hormone imbalances, porphyria cutanea tarda (PCT), infertility, stroke, neurodegenerative and brain damages, some cancers, venous and peripheral artery disease. Health impacts The primary risk associated with the H63D mutation is brain damage, as iron accumulation can cause oxidation within affected cells, ultimately leading to cell death and scarring of the brain tissue. Another potential consequence is abnormal levels of tau proteins and alpha-synuclein , which play a role in conditions like Alzheimer's, Lewy body dementia, and Parkinson \u2019s ; patients homozygous for the H63D mutation show a higher risk of earlier signs of cognitive impairment and earlier onset of dementias compared to individuals with normal or heterozygous genotypes . Some individuals with the homozygous H63D variant may show signs of heart disease, cardiomyopathies , and disturbances in the calcium channels in particular. The homozygous H63D variant is an indicator of the iron metabolism disorder hemochromatosis, which may increase the risk of developing a fatty liver . In patients with a cirrhotic liver, the mutation can increase the rate of liver cancer.", "edit_actions": [{"type": "A", "before": null, "after": "in", "start_char_pos": 102, "end_char_pos": 102}, {"type": "A", "before": null, "after": "an", "start_char_pos": 123, "end_char_pos": 123}, {"type": "A", "before": null, "after": "a", "start_char_pos": 142, "end_char_pos": 142}, {"type": "R", "before": "The protein", "after": "HFE", "start_char_pos": 212, "end_char_pos": 223}, {"type": "R", "before": "is rarely", "after": "can occasionally be", "start_char_pos": 299, "end_char_pos": 308}, {"type": "R", "before": ", however it", "after": ". It", "start_char_pos": 338, "end_char_pos": 350}, {"type": "R", "before": "Brain iron accumulation The most relevant", "after": "Health impacts The primary", "start_char_pos": 673, "end_char_pos": 714}, {"type": "R", "before": "variant is for brain damagedue to iron accumulation which causes oxidation processes within the affected cells(chronic oxidative stress) and, as a consequence,", "after": "mutation is brain damage, as iron accumulation can cause oxidation within affected cells, ultimately", "start_char_pos": 745, "end_char_pos": 904}, {"type": "R", "before": "(scarring of brain tissue) with severely disturbed neurotransmitter activity. These incurable processes include increased cellular iron, oxidative stress (free radical activity), brain glutamate dysbalance, and", "after": "and scarring of the brain tissue. Another potential consequence is", "start_char_pos": 927, "end_char_pos": 1137}, {"type": "R", "before": "which both may result in dementias and parkinson", "after": ", which play a role in conditions like Alzheimer's, Lewy body dementia, and Parkinson", "start_char_pos": 1190, "end_char_pos": 1238}, {"type": "R", "before": "disease, or similar conditions. Scientists found that", "after": ";", "start_char_pos": 1242, "end_char_pos": 1295}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1320, "end_char_pos": 1320}, {"type": "A", "before": null, "after": "mutation", "start_char_pos": 1326, "end_char_pos": 1326}, {"type": "R", "before": "HFE genes or H63D heterozygous mutation", "after": "or heterozygous genotypes", "start_char_pos": 1454, "end_char_pos": 1493}, {"type": "D", "before": "Cardiac iron accumulation", "after": null, "start_char_pos": 1496, "end_char_pos": 1521}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1622, "end_char_pos": 1622}, {"type": "D", "before": "Liver disorders", "after": null, "start_char_pos": 1679, "end_char_pos": 1694}, {"type": "R", "before": "indication of an Iron Metabolism Disorder known as Hemochromatosis (Iron Overload) and", "after": "indicator of the iron metabolism disorder hemochromatosis, which", "start_char_pos": 1729, "end_char_pos": 1815}, {"type": "R", "before": "to develop", "after": "of developing", "start_char_pos": 1838, "end_char_pos": 1848}, {"type": "R", "before": ", cryptic (nonspecific) liver dysfunctions, metabolic syndrome and, in", "after": ". In", "start_char_pos": 1863, "end_char_pos": 1933}, {"type": "R", "before": "or a liverdamaged due to alcohol also the rates", "after": "liver, the mutation can increase the rate", "start_char_pos": 1960, "end_char_pos": 2007}], "sents_char_pos": [0, 211, 274, 672, 1004, 1273, 1678]}
+{"doc_id": "63072175", "revision_depth": "1", "before_revision": "Economic ethics is the combination of economics and ethics that unites value judgements from both disciplines to predict, analyze, and model economic phenomena. It encompasses the theoretical ethical prerequisites and foundations of economic systems. This particular school of thought dates back to the Greek philosopher Aristotle, whose Nicomachean Ethics describes the connection between objective economic principles and the consideration of justice. The academic literature on economic ethics is extensive, citing authorities such as natural law and religious law as influences on normative rules in economics. The consideration of moral philosophy, or that of a moral economy, is a point of departure in assessing behavioral economic models. The standard creation, application, and beneficiaries of economic models present a complex trilemma when ethics are considered. These ideas, in conjunction with the fundamental assumption of rationality in economics, create the link between economics and ethics. Ancient economic thought Ancient Indian economic thought centered on the relationship between the concepts of happiness, ethics, and economic values, as the connections between them led to the constituting description of human existence. The Upanishads' fundamental idea of transcendental unity, oneness, and stability is a deduction of this relationship. Ancient Indian philosophy and metaphysics indicate an understanding of several modern economic concepts, for instance their regulation of demand when it exceeded supply as a means of avoiding anarchy. This was achieved at the time by stressing that non-material goods were the source of happiness, which is a reflection of Marshall's dictum of the insatiability of wants. The Rig Veda illustrates an apprehension of economic inequality in chapter 10, stating that, \"the riches of the liberal never waste away, while he who will not give finds no comfort in them.\" This indicates that generating personal wealth was not considered immoral, but rather that hoarding this wealth was a sin. The Arthasastra formulated laws that promote economic efficiency in the context of an ethical society. The author, Kautilya, posited that building infrastructure, which was the responsibility of the king, was a key determinant of economic growth when constructed in an ethical environment. Middle Ages Religion was at the core of economic life during the Middle Ages, hence the theologians of the time used inference from their respective ethical teachings to answer economic questions and achieve economic objectives. This was the approach also adopted by philosophers during the Age of Enlightenment. The Roman Catholic Church altered its doctrinal interpretation of the validity of marriage in order to, amongst alternate motivations, prevent competition from threatening its monopolistic market position. Usury was seen as an ethical issue in the Church, with justice having added value in comparison to economic efficiency. The transition from an agrarian lifestyle to money-based commerce in Israel led to the adoption of interest in lending and borrowing, as it was not directly prohibited in the Torah, under the ideal \"that your brother may live with you.\" Economic development in the Middle Ages was contingent on the ethical practices of merchants, founded by the transformation in how medieval society understood the economics of property and ownership. Islam supported this anti-ascetic ethic in the role of merchants, given its teaching that salvation derives from moderation rather than abstinence in such affairs. Classical economics Adam Smith on corruption. The Labour Theory of Value holds that labour is the source of all economic value, which was the viewpoint of David Ricardo, Adam Smith, and other classical economists. The distinction between \"wage-slaves\" and \"proper slaves\" in this theory, with both being viewed as commodities, is founded on the moral principle that wage-slaves voluntarily offer their privately owned labour-power to a buyer for a bargained price, while proper slaves, according to Karl Marx, have no such rights. Mercantilism, although advocated by classical economics, is regarded as ethically ambiguous in academic literature. Adam Smith noted that the national economic policy favored the interests of producers at the expense of consumers since domestically produced goods were subject to high inflation. The competition between domestic households and foreign speculators also led to an unfavourable balance of trades, i.e. increasing current account deficits on the balance of payments. Writers and commentators of the time employed Aristotle's ethical counsel in order to solve this economic dilemma. Culture Economic ethics attempts to incorporate morality and cultural value qualities to account for the limitation of economics being that human decision making is not restricted to rationality. This understanding of culture unites economics and ethics as a complete theory of human action. Academic culture has increased interest in economic ethics as a discipline. This led to an increased awareness of the cultural externalities of the actions of economic agents, as well as limited separation between the spheres of culture, which has purposed further research into their ethical liability. For example, a limitation of only portraying the instrumental value of a piece of artwork is that it may disregard its intrinsic value and thus should not be solely quantified. Artwork can also be considered a public good due to its intrinsic value, given its potential to contribute to national identity and educate its audience on its subject matter. Intrinsic value can also be quantified as it is incrementally valuable, regardless of whether it is sacred by association and history or not. Experimental economics Example of game theory and associated payoffs. The development of experimental economics in the late 20th century created an opportunity to empirically verify the existence of normative ethics in economics. Vernon L. Smith and his colleagues discovered numerous occurrences that may describe economic choices under the veil of ignorance. Conclusions from the following economic experiments indicate that economic agents use normative ethics in making decisions while also seeking to maximise their own payoffs. For example, in experiments on honesty, it is predicted that lying will occur when it increases these payoffs notwithstanding the results, which proved otherwise. It is found that people also employ the \"50/50 rule\" in dividing something regardless of the distribution of power in the decision making process. Experimental economic studies of altruism have identified it as an example of rational behaviour. The absence of an explanation for such behaviour indicates an antithesis in experimental economics in that it interprets morality as both an endogenous and exogenous factor subject to the case at hand. Research into the viability of normative theory as an explanation for moral reasoning is needed, with the experimental design focused on testing whether economic agents under the conditions assumed by the theory produce the same decisions as those predicted by the theory. This is given that, under the veil of ignorance, agents may be ' non-tuist ' in the real world as the theory suggests. Behavioral economics Ethics in behavioral economics is ubiquitous given its concern with human agency in its aim to rectify the ethical deficits found in neoclassical economics, i.e., a lack of moral dimension and lack of normative concerns. The incorporation of virtue ethics in behavioral economics has facilitated the development of theories that attempt to describe the many anomalies that exist in how economic agents make decisions. Normative concerns in economics can compensate for the applicability of behavioral economic models to real economic phenomena. Most behavioral economic models assume that preferences change endogenously, meaning that there are numerous possible decisions applicable to a given scenario, each with its own ethical value.Bhatt, V., Ogaki, M., Yaguchi, Y. Normative Behavioral Economics Based on Unconditional Love and Moral Virtue. Japan: INSTITUTE FOR MONETARY AND ECONOMIC STUDIES Hence, there is caution in considering welfare as the highest ethical value in economics, as conjectured in academic literature. As a result, the methodology also employs order ethics in assuming that progress in morality and economic institutions is simultaneous, given that behavior can only be understood in an institutional framework. There are complications in applying normative inferences with empirical research in behavioral economics, as there is a fundamental difference between descriptive and prescriptive inference and propositions. For example, the argument against the use of incentives, that they force certain behaviors in individuals and convince them to ignore risk, is a descriptive proposition that is empirically unjustified. Environmental economics Model of supply and demand in environmental economics. Welfare is maximized in environmental economic models when economic agents act according to the homo economicus hypothesis. This creates the possibility of economic agents compensating sustainable development for their private interests, given that homo economicus is restricted to rationality. Climate change policy as an outcome of inference from environmental economics is subject to ethical considerations. The economics of climate change, for example, is inseparable with social ethics. The idea of individuals and institutions working companionably in the public domain, as a reflection of homo politicus, is also an apposite ethic that can rectify this normative concern. An ethical problem associated with the sub-discipline through discounting is that consumers value the present more than the future, which has implications for inter-generational justice. Discounting in marginal cost-benefit analysis, which economists view as a predictor for human behaviour, is limited with respect to accounting for future risk and uncertainty. In fact, the use of monetary measures in environmental economics is based on the instrumentalisation of natural things, which is inaccurate in the case that they are intrinsically valuable. Other relationships and roles between generations can be elucidated through adopting certain ethical rules. The Brundtland Commission, for example, defines sustainable development as that which meets present needs without compromising the ability of future generations to do so, which is a libertarian principle. Under libertarianism, no redistribution of welfare is made unless all generations are benefited or unaffected. Political economy Political economy is a subject fundamentally based on normative protocol, focusing on the needs of the economy as a whole by analyzing the role of agents, institutions, and markets, as well as socially optimal behaviour. Historically, morality was a notion used to discern the distribution of these roles and responsibilities, given that most economic problems derived from the failure of economic agents to fulfill them. The transition of moral philosophy from such ethics to Kantian ethics, as well as the emergence of market forces and competition law, subjected the moral-political values of moral economy to rational judgement. Economic ethics remains a substantial influence to political economy due to its argumentative nature, evident in literature concerning government responses to the global financial crisis. One proposition holds that, since the contagion of the crisis was transmitted through distinct national financial systems, future global regulatory responses should be built on the distributive justice principle. The regulation of particular cases of financial innovation, while not considering critiques of the global financial system, functionally normalizes perceptions on the system's distribution of power such that it lessens the opportunities of agents to question the morality of such practice. Development economics The relationship between ethics and economics has defined the aim of development economics. The idea that one's quality of life is determined by one's ability to lead a valuable life has founded development economics as a mechanism for expanding such capability. This proposition is the basis to the conceptual relationship between it and welfare economics as an ethical discipline, and its debate in academic literature. The discourse is based on the notion that certain tools in welfare economics, particularly choice criterion, hold no value-judgement and are Paretian, given that collective perspectives of utility are not considered. There are numerous ethical issues associated with the methodological approach of development economics, i.e. the randomised field experiment, much of which are morally equivocal. For example, randomisation advantages some cases and disadvantages others, which is rational under statistical assumptions and a deontological moral issue simultaneously. There are also ethical implications related to the calculus, the nature of consent, instrumentalisation, accountability and role of foreign intervention in this experimental approach. Health economics In health economics, the maximized level of well-being being an ultimate end is ethically unjustified, as opposed to the efficient allocation of resources in health that augments the average utility level. Under this utility-maximizing approach, subject to libertarianism, a dichotomy is apparent between health and freedom as primary goods due to the condition of one is necessary to have in order to attain the other. Any level of access, utilization, and funding of healthcare is ethically justified as long as it is accomplishes the desired and needed level of health. Health economists instrumentalise the concept of a need as that which achieves an ethically legitimate end for a person. This is based on the notion that healthcare is not intrinsically valuable, but morally significant on the grounds that it contributes to overall well-being. The methodology of analysis in health economics, with respect to clinical trials, is subject to ethical debate. The experimental design should partially be the responsibility of health economists given their tendency to otherwise add variables that have the potential to be insignificant. This increases the risk of under-powering the study, which in health economics is primarily concerned with cost effectiveness, which has implications for evaluation. Iterative and adaptive decision strategy Academic literature presents numerous ethical views on what constitutes a viable economic policy. Keynes believed that good economic policies are those that make people behave well as opposed to those that make them feel well. The Verein f\u00fcr socialpolitik, founded by Gustav von Schmoller, insists that ethical and political considerations are critical in evaluating economic policies.Clarke, S. (1990). Political Economy and the Limits of Sociology. Madrid, Spain. Retrieved from URL Rational actor theory in the policy arena is evident in the use of Pareto optimality in order to assess the economic efficiency of policies, as well as in the use of cost\u2013benefit analysis (CBA), where income is the basic unit of measurement. The use of an iterative decision-making model, as an example of rationality, can provide a framework for economic policy in response to climate change. Academic literature also presents an ethical reasoning to the limitation associated with the application of rational actor theory to policy choice. Given that incomes are dependent on policy choice and vice-versa, the logic of the rational model in policy choice is circular, hence the possibility of wrong policy recommendations. There are also many factors that increase one's propensity to deviate from the modeled assumptions of decision making. It is argued under self-effacing moral theory that such mechanisms as CBA may be justified even if not explicitly moral. The contrasting beliefs that public actions are based on such utilitarian reckonings and that all policy-making is politically contingent justifies the need for forecasting, which itself is an ethical dilemma. This is founded on the proposition that forecasts can be amended to suit a particular action or policy rather than being objective and neutral.Small, G. R., Wong, R. (2001). The Validity of Forecasting. Sydney, Australia: University of Technology Sydney. pp. 12. Retrieved from URL For example, the code of ethics of the American Institute of Certified Planners provides inadequate support for forecasters to avert this practice. Such canons as those found in the Code of Professional Ethics and Practices of the American Association for Public Opinion Research are limited in regulating or preventing this convention.", "after_revision": "Economic ethics is the combination of economics and ethics that unites value judgements from both disciplines to predict, analyze, and model economic phenomena. It encompasses the theoretical ethical prerequisites and foundations of economic systems. This particular school of thought dates back to the Greek philosopher Aristotle, whose Nicomachean Ethics describes the connection between objective economic principles and the consideration of justice. The academic literature on economic ethics is extensive, citing authorities such as natural law and religious law as influences on normative rules in economics. The consideration of moral philosophy, or that of a moral economy, is a point of departure in assessing behavioural economic models. The standard creation, application, and beneficiaries of economic models present a complex trilemma when ethics are considered. These ideas, in conjunction with the fundamental assumption of rationality in economics, create the link between economics and ethics. Ancient economic thought Ancient Indian economic thought centred on the relationship between the concepts of happiness, ethics, and economic values, as the connections between them led to the constituting description of human existence. The Upanishads' fundamental idea of transcendental unity, oneness, and stability is a deduction of this relationship. Ancient Indian philosophy and metaphysics indicate an understanding of several modern economic concepts, for instance , their regulation of demand when it exceeded supply as a means of avoiding anarchy. This was achieved at the time by stressing that non-material goods were the source of happiness, which is a reflection of Marshall's dictum of the insatiability of wants. The Rig Veda illustrates an apprehension of economic inequality in chapter 10, stating that, \"the riches of the liberal never waste away, while he who will not give finds no comfort in them.\" This indicates that generating personal wealth was not considered immoral, but rather that hoarding this wealth was a sin. The Arthasastra formulated laws that promote economic efficiency in the context of an ethical society. The author, Kautilya, posited that building infrastructure, which was the responsibility of the king, was a key determinant of economic growth when constructed in an ethical environment. Middle Ages Religion was at the core of economic life during the Middle Ages, hence the theologians of the time used inference from their respective ethical teachings to answer economic questions and achieve economic objectives. This was the approach also adopted by philosophers during the Age of Enlightenment. The Roman Catholic Church altered its doctrinal interpretation of the validity of marriage to, amongst alternate motivations, prevent competition from threatening its monopolistic market position. Usury was seen as an ethical issue in the Church, with justice having added value in comparison to economic efficiency. The transition from an agrarian lifestyle to money-based commerce in Israel led to the adoption of interest in lending and borrowing, as it was not directly prohibited in the Torah, under the ideal \"that your brother may live with you.\" Economic development in the Middle Ages was contingent on the ethical practices of merchants, founded by the transformation in how medieval society understood the economics of property and ownership. Islam supported this anti-ascetic ethic in the role of merchants, given its teaching that salvation derives from moderation rather than abstinence in such affairs. Classical economics Adam Smith on corruption. The Labour Theory of Value holds that labour is the source of all economic value, which was the viewpoint of David Ricardo, Adam Smith, and other classical economists. The distinction between \"wage-slaves\" and \"proper slaves\" in this theory, with both being viewed as commodities, is founded on the moral principle that wage-slaves voluntarily offer their privately owned labour-power to a buyer for a bargained price, while proper slaves, according to Karl Marx, have no such rights. Mercantilism, although advocated by classical economics, is regarded as ethically ambiguous in academic literature. Adam Smith noted that the national economic policy favoured the interests of producers at the expense of consumers since domestically produced goods were subject to high inflation. The competition between domestic households and foreign speculators also led to an unfavourable balance of trades, i.e. increasing current account deficits on the balance of payments. Writers and commentators of the time employed Aristotle's ethical counsel to solve this economic dilemma. Culture Economic ethics attempts to incorporate morality and cultural value qualities to account for the limitation of economics , which is that human decision making is not restricted to rationality. This understanding of culture unites economics and ethics as a complete theory of human action. Academic culture has increased interest in economic ethics as a discipline. This led to an increased awareness of the cultural externalities of the actions of economic agents, as well as limited separation between the spheres of culture, which has purposed further research into their ethical liability. For example, a limitation of only portraying the instrumental value of a piece of artwork is that it may disregard its intrinsic value and thus should not be solely quantified. Artwork can also be considered a public good due to its intrinsic value, given its potential to contribute to national identity and educate its audience on its subject matter. Intrinsic value can also be quantified as it is incrementally valuable, regardless of whether it is sacred by association and history or not. Experimental economics Example of game theory and associated payoffs. The development of experimental economics in the late 20th century created an opportunity to empirically verify the existence of normative ethics in economics. Vernon L. Smith and his colleagues discovered numerous occurrences that may describe economic choices under the veil of ignorance. Conclusions from the following economic experiments indicate that economic agents use normative ethics in making decisions while also seeking to maximise their payoffs. For example, in experiments on honesty, it is predicted that lying will occur when it increases these payoffs notwithstanding the results, which proved otherwise. It is found that people also employ the \"50/50 rule\" in dividing something regardless of the distribution of power in the decision making process. Experimental economic studies of altruism have identified it as an example of rational behaviour. The absence of an explanation for such behaviour indicates an antithesis in experimental economics in that it interprets morality as both an endogenous and exogenous factor subject to the case at hand. Research into the viability of normative theory as an explanation for moral reasoning is needed, with the experimental design focused on testing whether economic agents under the conditions assumed by the theory produce the same decisions as those predicted by the theory. This is given that, under the veil of ignorance, agents may be \" non-tuist \" in the real world as the theory suggests. Behavioural economics Ethics in behavioural economics is ubiquitous given its concern with human agency in its aim to rectify the ethical deficits found in neoclassical economics, i.e., a lack of moral dimension and lack of normative concerns. The incorporation of virtue ethics in behavioural economics has facilitated the development of theories that attempt to describe the many anomalies that exist in how economic agents make decisions. Normative concerns in economics can compensate for the applicability of behavioural economic models to real economic phenomena. Most behavioural economic models assume that preferences change endogenously, meaning that there are numerous possible decisions applicable to a given scenario, each with an ethical value.Bhatt, V., Ogaki, M., Yaguchi, Y. Normative Behavioral Economics Based on Unconditional Love and Moral Virtue. Japan: INSTITUTE FOR MONETARY AND ECONOMIC STUDIES Hence, there is caution in considering welfare as the highest ethical value in economics, as conjectured in academic literature. As a result, the methodology also employs order ethics in assuming that progress in morality and economic institutions is simultaneous, given that behaviour can only be understood in an institutional framework. There are complications in applying normative inferences with empirical research in behavioural economics, as there is a fundamental difference between descriptive and prescriptive inference and propositions. For example, the argument against the use of incentives, that they force certain behaviours in individuals and convince them to ignore risk, is a descriptive proposition that is empirically unjustified. Environmental economics Model of supply and demand in environmental economics. Welfare is maximized in environmental economic models when economic agents act according to the homo economicus hypothesis. This creates the possibility of economic agents compensating sustainable development for their private interests, given that homo economicus is restricted to rationality. Climate change policy as an outcome of inference from environmental economics is subject to ethical considerations. The economics of climate change, for example, is inseparable from social ethics. The idea of individuals and institutions working companionably in the public domain, as a reflection of homo politicus, is also an apposite ethic that can rectify this normative concern. An ethical problem associated with the sub-discipline through discounting is that consumers value the present more than the future, which has implications for intergenerational justice. Discounting in marginal cost-benefit analysis, which economists view as a predictor for human behaviour, is limited concerning future risk and uncertainty. The use of monetary measures in environmental economics is based on the instrumentalisation of natural things, which is inaccurate in the case that they are intrinsically valuable. Other relationships and roles between generations can be elucidated through adopting certain ethical rules. The Brundtland Commission, for example, defines sustainable development as that which meets present needs without compromising the ability of future generations to do so, which is a libertarian principle. Under libertarianism, no redistribution of welfare is made unless all generations are benefited or unaffected. Political economy Political economy is a subject fundamentally based on normative protocol, focusing on the needs of the economy as a whole by analyzing the role of agents, institutions, and markets, as well as socially optimal behaviour. Historically, morality was a notion used to discern the distribution of these roles and responsibilities, given that most economic problems derived from the failure of economic agents to fulfil them. The transition of moral philosophy from such ethics to Kantian ethics, as well as the emergence of market forces and competition law, subjected the moral-political values of the moral economy to rational judgement. Economic ethics remains a substantial influence on the political economy due to its argumentative nature, evident in the literature concerning government responses to the global financial crisis. One proposition holds that, since the contagion of the crisis was transmitted through distinct national financial systems, future global regulatory responses should be built on the distributive justice principle. The regulation of particular cases of financial innovation, while not considering critiques of the global financial system, functionally normalizes perceptions on the system's distribution of power such that it lessens the opportunities of agents to question the morality of such practice. Development economics The relationship between ethics and economics has defined the aim of development economics. The idea that one's quality of life is determined by one's ability to lead a valuable life has founded development economics as a mechanism for expanding such capability. This proposition is the basis of the conceptual relationship between it and welfare economics as an ethical discipline, and its debate in academic literature. The discourse is based on the notion that certain tools in welfare economics, particularly choice criterion, hold no value-judgement and are Paretian, given that collective perspectives of utility are not considered. There are numerous ethical issues associated with the methodological approach of development economics, i.e. the randomised field experiment, many of which are morally equivocal. For example, randomisation advantages some cases and disadvantages others, which is rational under statistical assumptions and a deontological moral issue simultaneously. There are also ethical implications related to the calculus, the nature of consent, instrumentalisation, accountability , and the role of foreign intervention in this experimental approach. Health economics In health economics, the maximized level of well-being being an ultimate end is ethically unjustified, as opposed to the efficient allocation of resources in health that augments the average utility level. Under this utility-maximizing approach, subject to libertarianism, a dichotomy is apparent between health and freedom as primary goods due to the condition of one is necessary to have to attain the other. Any level of access, utilization, and funding of healthcare is ethically justified as long as it accomplishes the desired and needed level of health. Health economists instrumentalise the concept of a need as that which achieves an ethically legitimate end for a person. This is based on the notion that healthcare is not intrinsically valuable, but morally significant because it contributes to overall well-being. The methodology of analysis in health economics, with respect to clinical trials, is subject to ethical debate. The experimental design should partially be the responsibility of health economists given their tendency to otherwise add variables that have the potential to be insignificant. This increases the risk of under-powering the study, which in health economics is primarily concerned with cost effectiveness, which has implications for evaluation. Iterative and adaptive decision strategy Academic literature presents numerous ethical views on what constitutes a viable economic policy. Keynes believed that good economic policies are those that make people behave well as opposed to those that make them feel well. The Verein f\u00fcr socialpolitik, founded by Gustav von Schmoller, insists that ethical and political considerations are critical in evaluating economic policies.Clarke, S. (1990). Political Economy and the Limits of Sociology. Madrid, Spain. Retrieved from URL Rational actor theory in the policy arena is evident in the use of Pareto optimality to assess the economic efficiency of policies, as well as in the use of cost\u2013benefit analysis (CBA), where income is the basic unit of measurement. The use of an iterative decision-making model, as an example of rationality, can provide a framework for economic policy in response to climate change. Academic literature also presents ethical reasoning to the limitation associated with the application of rational actor theory to policy choice. Given that incomes are dependent on policy choice and vice-versa, the logic of the rational model in policy choice is circular, hence the possibility of wrong policy recommendations. Additionally, many factors increase one's propensity to deviate from the modelled assumptions of decision making. It is argued under self-effacing moral theory that such mechanisms as CBA may be justified even if not explicitly moral. The contrasting beliefs that public actions are based on such utilitarian reckonings and that all policy-making is politically contingent justifies the need for forecasting, which itself is an ethical dilemma. This is founded on the proposition that forecasts can be amended to suit a particular action or policy rather than being objective and neutral.Small, G. R., Wong, R. (2001). The Validity of Forecasting. Sydney, Australia: University of Technology Sydney. pp. 12. Retrieved from URL For example, the code of ethics of the American Institute of Certified Planners provides inadequate support for forecasters to avert this practice. Such canons as those found in the Code of Professional Ethics and Practices of the American Association for Public Opinion Research are limited in regulating or preventing this convention.", "edit_actions": [{"type": "R", "before": "behavioral", "after": "behavioural", "start_char_pos": 719, "end_char_pos": 729}, {"type": "R", "before": "centered", "after": "centred", "start_char_pos": 1067, "end_char_pos": 1075}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1484, "end_char_pos": 1484}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 2748, "end_char_pos": 2756}, {"type": "R", "before": "favored", "after": "favoured", "start_char_pos": 4282, "end_char_pos": 4289}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 4669, "end_char_pos": 4677}, {"type": "R", "before": "being", "after": ", which is", "start_char_pos": 4839, "end_char_pos": 4844}, {"type": "D", "before": "own", "after": null, "start_char_pos": 6322, "end_char_pos": 6325}, {"type": "R", "before": "'", "after": "\"", "start_char_pos": 7281, "end_char_pos": 7282}, {"type": "R", "before": "'", "after": "\"", "start_char_pos": 7293, "end_char_pos": 7294}, {"type": "R", "before": "Behavioral", "after": "Behavioural", "start_char_pos": 7337, "end_char_pos": 7347}, {"type": "R", "before": "behavioral", "after": "behavioural", "start_char_pos": 7368, "end_char_pos": 7378}, {"type": "R", "before": "behavioral", "after": "behavioural", "start_char_pos": 7617, "end_char_pos": 7627}, {"type": "R", "before": "behavioral", "after": "behavioural", "start_char_pos": 7848, "end_char_pos": 7858}, {"type": "R", "before": "behavioral", "after": "behavioural", "start_char_pos": 7908, "end_char_pos": 7918}, {"type": "R", "before": "its own", "after": "an", "start_char_pos": 8073, "end_char_pos": 8080}, {"type": "R", "before": "behavior", "after": "behaviour", "start_char_pos": 8533, "end_char_pos": 8541}, {"type": "R", "before": "behavioral", "after": "behavioural", "start_char_pos": 8680, "end_char_pos": 8690}, {"type": "R", "before": "behaviors", "after": "behaviours", "start_char_pos": 8885, "end_char_pos": 8894}, {"type": "R", "before": "with", "after": "from", "start_char_pos": 9557, "end_char_pos": 9561}, {"type": "R", "before": "inter-generational", "after": "intergenerational", "start_char_pos": 9923, "end_char_pos": 9941}, {"type": "R", "before": "with respect to accounting for", "after": "concerning", "start_char_pos": 10067, "end_char_pos": 10097}, {"type": "R", "before": "In fact, the", "after": "The", "start_char_pos": 10127, "end_char_pos": 10139}, {"type": "R", "before": "fulfill", "after": "fulfil", "start_char_pos": 11167, "end_char_pos": 11174}, {"type": "A", "before": null, "after": "the", "start_char_pos": 11355, "end_char_pos": 11355}, {"type": "R", "before": "to", "after": "on the", "start_char_pos": 11441, "end_char_pos": 11443}, {"type": "A", "before": null, "after": "the", "start_char_pos": 11506, "end_char_pos": 11506}, {"type": "R", "before": "to", "after": "of", "start_char_pos": 12400, "end_char_pos": 12402}, {"type": "R", "before": "much", "after": "many", "start_char_pos": 12888, "end_char_pos": 12892}, {"type": "R", "before": "and", "after": ", and the", "start_char_pos": 13216, "end_char_pos": 13219}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 13687, "end_char_pos": 13695}, {"type": "D", "before": "is", "after": null, "start_char_pos": 13814, "end_char_pos": 13816}, {"type": "R", "before": "on the grounds that", "after": "because", "start_char_pos": 14090, "end_char_pos": 14109}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 15214, "end_char_pos": 15222}, {"type": "D", "before": "an", "after": null, "start_char_pos": 15557, "end_char_pos": 15559}, {"type": "R", "before": "There are also many factors that", "after": "Additionally, many factors", "start_char_pos": 15854, "end_char_pos": 15886}, {"type": "R", "before": "modeled", "after": "modelled", "start_char_pos": 15933, "end_char_pos": 15940}], "sents_char_pos": [0, 160, 250, 453, 614, 746, 874, 1009, 1247, 1365, 1567, 1738, 1930, 2053, 2156, 2343, 2572, 2656, 2862, 2982, 3219, 3419, 3583, 3629, 3797, 4114, 4230, 4410, 4594, 4709, 4905, 5001, 5077, 5305, 5482, 5658, 5800, 5870, 6030, 6161, 6334, 6497, 6644, 6742, 6944, 7217, 7336, 7578, 7775, 7902, 8095, 8205, 8385, 8595, 8803, 9005, 9084, 9208, 9379, 9495, 9576, 9763, 9950, 10126, 10316, 10424, 10629, 10740, 10979, 11180, 11392, 11581, 11794, 12084, 12198, 12369, 12528, 12745, 12924, 13095, 13279, 13502, 13716, 13869, 13990, 14147, 14259, 14436, 14602, 14741, 14870, 15029, 15047, 15094, 15109, 15370, 15522, 15670, 15853, 15972, 16093, 16303, 16447, 16477, 16506, 16733]}
+{"doc_id": "6335095", "revision_depth": "1", "before_revision": "In the tradition of the 1880s Order of the Golden Dawn a watchtower or guardian in ceremonial and derived neopagan magical tradition is a tutelary spirit of one of the four cardinal points or \"quarters \" (north, east, south, and west). They are also variously associated in many traditions with each the four classical elements (earth, air, fire, and water) and stars (Fomalhaut, Aldebaran, Regulus, and Antares). The Watchtowers are invoked during the ritual of casting a magic circle. Alternately, \"Watchtowers\" may refer specifically to the abodes of the Guardians, with the guardians themselves referred to as \"Watchers\" or simply \"Guardians\".%DIFDELCMD < %DIFDELCMD < %%% In Christian influenced magic traditions, they are understood to be the Archangels Uriel, Raphael, Michael, and Gabriel. Types In archaic Roman religion, small towers were built at the crossroads, and an altar was set before them upon which offerings were given to nature spirits. Guardian spirits known as Lares were associated with these towers and with demarcation in general, as well as seasonal themes related to agriculture.Dumezil, Georges, Archaic Roman Religion, volume 1, p. 343 344 Here we may find a connection between the Lares and the Grigori of Italian Witchcraft. These towers may be the foundation of the \"Watchtowers\" appearing in the ritual circles of Wiccans and other modern witches. In Enochian tradition In the Enochian system of magic, brought to public attention by Dr. John Dee and Edward Kelly in the 16th century, we find the inclusion of Watchtowers as complex evocational designs. Some people believe that the Watchtowers have their origin in the Enochian magic system revealed to the Elizabethan magician John Dee and his scryer Edward Kelley, which was later developed into a working system of magic by S.L. MacGregor Mathers. According to Dee\u2019s diaries, the two men summoned an angel, which Kelley saw in an obsidian mirror; Dee recorded the revelations which Kelley narrated to him. Among the surviving records of the Angelic Operations is A Book of Supplications and Invocations which \"deals with the Invocation of the Angels who preside over the Four Quarters of the Terrestrial sphere.\"Robert Turner, Elizabethan Magic, p. 24. At the core of the instructions was the Angelic Table: a grid of 25x27 squares, each square containing a letter. The Angelic Table is subdivided into four lesser grids for the four elements and the four directions, bound together by the cross-shaped Tablet of Union. They are used to call upon the aid of angels ruling over the four directions. The names of God and the angels to be used in the invocations are extracted from the tablets.Turner, Elizabethan Magic, pp. 59-79 (gives the invocations together with the divine and angelic names for each quarter); Israel Regardie, The Golden Dawn, pp. 630-42 (instructions for deriving the names from the Tablets). The four tablets are often called the Enochian Tablets because the letters may be written in the Enochian alphabet also revealed to Dee and Kelley by the angel. Western Hermeticism Dee\u2019s work was revived and expounded upon by the Hermetic Order of the Golden Dawn, primarily through the work of S.L. MacGregor Mathers. In the Golden Dawn magical system, the four Angelic/Enochian Tablets became the four Watchtowers .Regardie, Golden Dawn, Book 9, describes Enochian magic in the Golden Dawn, including detailed information on the Watchtowers. Each Watchtower was attributed to a direction and an element, by the Golden Dawn. The use of complementary colors, called flashing colors in the Golden Dawn, means that the Watchtowers belong to the class of talismans called flashing tablets. The flashing colors were supposed to draw energy from the atmosphere.Regardie, Golden Dawn, pp. 479. The painted tablets were placed on the walls of the temple during some rituals to symbolize the four quarters. A favorite ritual in the Golden Dawn was the Opening by Watchtower. This is actually a preliminary ritual to purify space and call upon the guardians of the four quarters, similar to casting the magic circle in Wicca. As part of the Opening by Watchtower, the practitioner uses the elemental weapons to summon the angels of the quarters. In the south, for instance, the practitioner uses the Fire Wand to trace an invoking Fire Pentagram, then summons the angels using the three names of God found in the Fire Tablet: OIP TEAA PEDOCE In the names and letters of the Great Southern Quadrangle, I invoke ye, ye Angels of the Watch-tower of the South.Regardie, Golden Dawn, p. 402. There is no evidence in Dee's original writings that either he, Kelly or the angels attributed these quadrangles of the Great Table, to the elements as the Golden Dawn did. There is therefore, no evidence that the name Oip Teaa Pedoce is in fact, a holy name for the God relevant to the element fire. There is no doubt though, that it is certainly a holy name relevant to spirits whose names are found in the Southern Quadrangle of the Great Table or Tablet. The Watchtowers were among the Golden Dawn concepts introduced into Wicca (modern witchcraft) by its founder Gerald Gardner. The complicated tablets and Enochian names were largely abandoned, but Wicca retained the Watchtowers as \"the four cardinal points, regarded as guardians of the Magic Circle \". Janet and Stewart Farrar, The Witches' Way, p. 328. They are usually mentioned during the casting of the circle. In a conservative tradition such as Gardnerian or Alexandrian Wicca the invocation of the Watchtowers begins in the east; the practitioner traces an invoking Earth Pentagram while saying; Ye Lords of the Watchtowers of the East, ye Lords of Air; I do summon, stir and call you up, to witness our rites and to guard the Circle.Farrar and Farrar, Witches\u2019 Way, p. 296. Modern adaptations Many Wiccan circle-castings no longer mention the Watchtowers by name. Another important development is experimentation with the attribution of elements to the directions, instead of adhering to the attributions used by the Golden Dawn and Gardnerian Wicca (north/earth, east/air, south/fire, west/water). Many Wiccans perceive themselves as participants in an earth-based religion; they believe their practices should reflect their living experience of the local environment. Both the Golden Dawn and early Wicca were active in Great Britain;Jenkins, Phillip (2000) Mystics and Messiahs: Cults and New Religions in American History, p. 74. \"Also in the 1880s, the tradition of ritual magic was revived in London by a group of Masonic adepts, who formed the Order of the Golden Dawn, which would prove an incalculable influence on the whole subsequent history of occultism.\" USA: Oxford University Press.Smoley, Richard (1999) Hidden Wisdom: A Guide to the Western Inner Traditions, pp. 102\u2013103. \"Founded in 1888, the Golden Dawn lasted a mere twelve years before it was shattered by personal conflicts. At its height it probably had no more than a hundred members. Yet its influence on magic and esoteric thought in the English-speaking world would be hard to overestimate.\" USA: Quest Books. traditional attributions derived from the British climate may not appeal to or work for practitioners in other climates. A special instance of this problem is the circumstance of Wiccans living in the southern hemisphere, who tend to perceive the north, not the south, as the direction most characterized by fire and heat. Some Neopagans choose to follow the practices of a historical pagan group with whom they identify, or conform to local traditions; either choice may dictate a change of attributions.Farrar and Farrar, Witches\u2019 Way, chapter 25, In Tune with the Land, addresses both environmental and cultural issues in a sympathetic manner.", "after_revision": "In the tradition of the 1880s Order of the Golden Dawn a watchtower or guardian in ceremonial and derived neopagan magical tradition is a tutelary spirit of one of the four cardinal points or quarters (north, east, south, and west). They are also variously associated in many traditions with each the four classical elements (earth, air, fire, and water) and stars (Fomalhaut, Aldebaran, Regulus, and Antares). %DIFDELCMD < %DIFDELCMD < %%% In Christian-influenced magical traditions, they are understood to be the Archangels Uriel, Raphael, Michael, and Gabriel. The watchtowers are invoked during the ritual of casting a magic circle. Types In archaic Roman religion, small towers were built at the crossroads, and an altar was set before them upon which offerings were given to nature spirits. Guardian spirits known as Lares were associated with these towers and with demarcation in general, as well as seasonal themes related to agriculture.Dumezil, Georges, Archaic Roman Religion, volume 1, p. 343 344 Here we may find a connection between the Lares and the Grigori of Italian Witchcraft. These towers may be the foundation of the watchtowers appearing in the ritual circles of Wiccans and other modern witches. In Enochian tradition In the Enochian system of magic, brought to public attention by Dr. John Dee and his scryer Edward Kelly in the 16th century, we find the inclusion of watchtowers as complex evocational designs. According to Dee\u2019s diaries, the two men summoned an angel, which Kelley saw in an obsidian mirror; Dee recorded the revelations which Kelley narrated to him. Among the surviving records of the Angelic Operations is A Book of Supplications and Invocations which \"deals with the Invocation of the Angels who preside over the Four Quarters of the Terrestrial sphere.\"Robert Turner, Elizabethan Magic, p. 24. Enochian magic was later developed into a working system of magic by S.L. MacGregor Mathers. At the core of the instructions was the Angelic Table: a grid of 25x27 squares, each square containing a letter. The Angelic Table is subdivided into four lesser grids for the four elements and the four directions, bound together by the cross-shaped Tablet of Union. They are used to call upon the aid of angels ruling over the four directions. The names of God and the angels to be used in the invocations are extracted from the tablets.Turner, Elizabethan Magic, pp. 59-79 (gives the invocations together with the divine and angelic names for each quarter); Israel Regardie, The Golden Dawn, pp. 630-42 (instructions for deriving the names from the Tablets). The four tablets are often called the Enochian Tablets because the letters may be written in the Enochian alphabet also revealed to Dee and Kelley by the angel. Western Hermeticism Dee\u2019s work was revived and expounded upon by the Hermetic Order of the Golden Dawn, primarily through the work of S.L. MacGregor Mathers. In the Golden Dawn magical system, the four Angelic/Enochian Tablets became the four watchtowers .Regardie, Golden Dawn, Book 9, describes Enochian magic in the Golden Dawn, including detailed information on the watchtowers. Each watchtower was attributed to a direction and an element, by the Golden Dawn. The use of complementary colors, called flashing colors in the Golden Dawn, means that the watchtowers belong to the class of talismans called flashing tablets. The flashing colors were supposed to draw energy from the atmosphere.Regardie, Golden Dawn, pp. 479. The painted tablets were placed on the walls of the temple during some rituals to symbolize the four quarters. A favorite ritual in the Golden Dawn was the Opening by Watchtower. This is actually a preliminary ritual to purify space and call upon the guardians of the four quarters, similar to casting the magic circle in Wicca. As part of the Opening by Watchtower, the practitioner uses the elemental weapons to summon the angels of the quarters. In the south, for instance, the practitioner uses the Fire Wand to trace an invoking Fire Pentagram, then summons the angels using the three names of God found in the Fire Tablet: There is no evidence in Dee's original writings that either he, Kelly or the angels attributed these quadrangles of the Great Table, to the elements as the Golden Dawn did. There is therefore, no evidence that the name Oip Teaa Pedoce is in fact, a holy name for the God relevant to the element fire. There is no doubt though, that it is certainly a holy name relevant to spirits whose names are found in the Southern Quadrangle of the Great Table or Tablet. The watchtowers were among the Golden Dawn concepts introduced into Wicca (modern witchcraft) by its founder Gerald Gardner. The complicated tablets and Enochian names were largely abandoned, but Wicca retained the watchtowers as \"the four cardinal points, regarded as guardians of the Magic Circle .\" Janet and Stewart Farrar, The Witches' Way, p. 328. They are usually mentioned during the casting of the circle. In a conservative tradition such as Gardnerian or Alexandrian Wicca the invocation of the watchtowers begins in the east; the practitioner traces an invoking Earth Pentagram while saying; Modern adaptations Many Wiccan circle-castings no longer mention the watchtowers by name. Another important development is experimentation with the attribution of elements to the directions, instead of adhering to the attributions used by the Golden Dawn and Gardnerian Wicca (north/earth, east/air, south/fire, west/water). Many Wiccans perceive themselves as participants in an earth-based religion; they believe their practices should reflect their living experience of the local environment. Both the Golden Dawn and early Wicca were active in Great Britain;Jenkins, Phillip (2000) Mystics and Messiahs: Cults and New Religions in American History, p. 74. \"Also in the 1880s, the tradition of ritual magic was revived in London by a group of Masonic adepts, who formed the Order of the Golden Dawn, which would prove an incalculable influence on the whole subsequent history of occultism.\" USA: Oxford University Press.Smoley, Richard (1999) Hidden Wisdom: A Guide to the Western Inner Traditions, pp. 102\u2013103. \"Founded in 1888, the Golden Dawn lasted a mere twelve years before it was shattered by personal conflicts. At its height it probably had no more than a hundred members. Yet its influence on magic and esoteric thought in the English-speaking world would be hard to overestimate.\" USA: Quest Books. traditional attributions derived from the British climate may not appeal to or work for practitioners in other climates. A special instance of this problem is the circumstance of Wiccans living in the southern hemisphere, who tend to perceive the north, not the south, as the direction most characterized by fire and heat. Some Neopagans choose to follow the practices of a historical pagan group with whom they identify, or conform to local traditions; either choice may dictate a change of attributions.Farrar and Farrar, Witches\u2019 Way, chapter 25, In Tune with the Land, addresses both environmental and cultural issues in a sympathetic manner.", "edit_actions": [{"type": "R", "before": "\"quarters \"", "after": "quarters", "start_char_pos": 192, "end_char_pos": 203}, {"type": "D", "before": "The Watchtowers are invoked during the ritual of casting a magic circle.", "after": null, "start_char_pos": 414, "end_char_pos": 486}, {"type": "D", "before": "Alternately, \"Watchtowers\" may refer specifically to the abodes of the Guardians, with the guardians themselves referred to as \"Watchers\" or simply \"Guardians\".", "after": null, "start_char_pos": 487, "end_char_pos": 647}, {"type": "R", "before": "In Christian influenced magic", "after": "In Christian-influenced magical", "start_char_pos": 677, "end_char_pos": 706}, {"type": "A", "before": null, "after": "The watchtowers are invoked during the ritual of casting a magic circle.", "start_char_pos": 798, "end_char_pos": 798}, {"type": "R", "before": "\"Watchtowers\"", "after": "watchtowers", "start_char_pos": 1300, "end_char_pos": 1313}, {"type": "A", "before": null, "after": "his scryer", "start_char_pos": 1486, "end_char_pos": 1486}, {"type": "R", "before": "Watchtowers", "after": "watchtowers", "start_char_pos": 1546, "end_char_pos": 1557}, {"type": "D", "before": "Some people believe that the Watchtowers have their origin in the Enochian magic system revealed to the Elizabethan magician John Dee and his scryer Edward Kelley, which was later developed into a working system of magic by S.L. MacGregor Mathers.", "after": null, "start_char_pos": 1590, "end_char_pos": 1837}, {"type": "A", "before": null, "after": "Enochian magic was later developed into a working system of magic by S.L. MacGregor Mathers.", "start_char_pos": 2243, "end_char_pos": 2243}, {"type": "R", "before": "Watchtowers", "after": "watchtowers", "start_char_pos": 3309, "end_char_pos": 3320}, {"type": "R", "before": "Watchtowers. Each Watchtower", "after": "watchtowers. Each watchtower", "start_char_pos": 3436, "end_char_pos": 3464}, {"type": "R", "before": "Watchtowers", "after": "watchtowers", "start_char_pos": 3622, "end_char_pos": 3633}, {"type": "D", "before": "OIP TEAA PEDOCE In the names and letters of the Great Southern Quadrangle, I invoke ye, ye Angels of the Watch-tower of the South.Regardie, Golden Dawn, p. 402.", "after": null, "start_char_pos": 4422, "end_char_pos": 4582}, {"type": "R", "before": "Watchtowers", "after": "watchtowers", "start_char_pos": 5046, "end_char_pos": 5057}, {"type": "R", "before": "Watchtowers", "after": "watchtowers", "start_char_pos": 5257, "end_char_pos": 5268}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 5341, "end_char_pos": 5343}, {"type": "R", "before": "Watchtowers", "after": "watchtowers", "start_char_pos": 5547, "end_char_pos": 5558}, {"type": "D", "before": "Ye Lords of the Watchtowers of the East, ye Lords of Air; I do summon, stir and call you up, to witness our rites and to guard the Circle.Farrar and Farrar, Witches\u2019 Way, p. 296.", "after": null, "start_char_pos": 5645, "end_char_pos": 5823}, {"type": "R", "before": "Watchtowers", "after": "watchtowers", "start_char_pos": 5893, "end_char_pos": 5904}], "sents_char_pos": [0, 235, 413, 486, 647, 797, 958, 1108, 1257, 1382, 1589, 1837, 1936, 1995, 2201, 2242, 2356, 2510, 2588, 2682, 2803, 2904, 3065, 3223, 3322, 3448, 3530, 3691, 3761, 3792, 3903, 3971, 4121, 4241, 4552, 4582, 4755, 4883, 5041, 5166, 5395, 5456, 5578, 5644, 5702, 5783, 5823, 5913, 6148, 6225, 6319, 6717, 6747, 6838, 6946, 7008, 7118, 7257, 7459, 7590, 7642]}
+{"doc_id": "63940707", "revision_depth": "1", "before_revision": "REM sleep and slow-wave sleep Avian sleep has two similarities shared with that of mammals ; REM (rapid-eye movement ) sleep and slow-wave sleep (SWS). REM sleep is believed to have an important effect on integral motor functions and storing memories . EEGs show high-amplitude and low-frequencies for REM sleep; SWS tends to show lower-amplitude and higher frequencies during EEG recordings and is believed to be a form of deep sleep. During SWS, membrane potentials in the neurons of the neocortex are undergoing slow oscillations, which explains the typical SWS results of the EEG . Numerous avian species have been shown to exhibit unihemispheric SWS; or the ability to rest one half of the brain in SWS while the other half appears to show wakefulness . This type of sleep has been seen in mammals like dolphins and whales. The organism is typically able to keep one of their eyes open during this process, which allows for added vigilance in areas where predation is higher .Rattenborg, Niels C.; Lima, Steven L. & Amlaner, Charles J. (1999). \"Facultative control of avian unihemispheric sleep under the risk of predation\". Behavioural Brain Research. 105 (2): 163-172. The evolution of this trait for both birds and aquatic mammals is of interest to researchers simply because of the pressures involved. Unihemispheric SWS is thought to have evolved in aquatic mammals since they must return to the surface for oxygen , while this phenomenon is believed to help birds avoid predation, thus creating a homoplasy between the two groups.", "after_revision": "REM and slow-wave sleep Avian sleep shares two similarities with that of mammals : rapid eye movement (REM) and slow-wave sleep (SWS). REM sleep is believed to have an important effect on motor functions and memory storage . EEGs show high-amplitude and low-frequency waves during REM sleep; SWS tends toward lower-amplitude , higher-frequency waves, and is believed to be a form of deep sleep. During SWS, membrane potentials in the neurons of the neocortex oscillate slowly . A number of avian species exhibit unihemispheric slow-wave sleep: the ability to rest one half of the brain in SWS , while the other half appears to be awake . This type of sleep has also been seen in dolphins and whales. The organism is typically able to keep one eye open during this process, which allows added vigilance in high-predation environments .Rattenborg, Niels C.; Lima, Steven L. & Amlaner, Charles J. (1999). \"Facultative control of avian unihemispheric sleep under the risk of predation\". Behavioural Brain Research. 105 (2): 163-172. The evolution of this trait in birds and aquatic mammals is of interest to researchers because of the pressures involved. Unihemispheric SWS is thought to have evolved in aquatic mammals because they must return to the surface for oxygen ; it is believed to help birds avoid predation, demonstrating homoplasy in the two groups.", "edit_actions": [{"type": "D", "before": "sleep", "after": null, "start_char_pos": 4, "end_char_pos": 9}, {"type": "R", "before": "has two similarities shared", "after": "shares two similarities", "start_char_pos": 42, "end_char_pos": 69}, {"type": "R", "before": "; REM (rapid-eye movement ) sleep", "after": ": rapid eye movement (REM)", "start_char_pos": 91, "end_char_pos": 124}, {"type": "D", "before": "integral", "after": null, "start_char_pos": 205, "end_char_pos": 213}, {"type": "R", "before": "storing memories", "after": "memory storage", "start_char_pos": 234, "end_char_pos": 250}, {"type": "R", "before": "low-frequencies for", "after": "low-frequency waves during", "start_char_pos": 282, "end_char_pos": 301}, {"type": "R", "before": "to show", "after": "toward", "start_char_pos": 323, "end_char_pos": 330}, {"type": "R", "before": "and higher frequencies during EEG recordings and", "after": ", higher-frequency waves, and", "start_char_pos": 347, "end_char_pos": 395}, {"type": "R", "before": "are undergoing slow oscillations, which explains the typical SWS results of the EEG", "after": "oscillate slowly", "start_char_pos": 500, "end_char_pos": 583}, {"type": "R", "before": "Numerous avian species have been shown to exhibit unihemispheric SWS; or", "after": "A number of avian species exhibit unihemispheric slow-wave sleep:", "start_char_pos": 586, "end_char_pos": 658}, {"type": "A", "before": null, "after": ",", "start_char_pos": 708, "end_char_pos": 708}, {"type": "R", "before": "show wakefulness", "after": "be awake", "start_char_pos": 741, "end_char_pos": 757}, {"type": "A", "before": null, "after": "also", "start_char_pos": 783, "end_char_pos": 783}, {"type": "D", "before": "mammals like", "after": null, "start_char_pos": 797, "end_char_pos": 809}, {"type": "R", "before": "of their eyes", "after": "eye", "start_char_pos": 874, "end_char_pos": 887}, {"type": "D", "before": "for", "after": null, "start_char_pos": 927, "end_char_pos": 930}, {"type": "R", "before": "areas where predation is higher", "after": "high-predation environments", "start_char_pos": 950, "end_char_pos": 981}, {"type": "R", "before": "for both", "after": "in", "start_char_pos": 1206, "end_char_pos": 1214}, {"type": "D", "before": "simply", "after": null, "start_char_pos": 1271, "end_char_pos": 1277}, {"type": "R", "before": "since", "after": "because", "start_char_pos": 1378, "end_char_pos": 1383}, {"type": "R", "before": ", while this phenomenon", "after": "; it", "start_char_pos": 1427, "end_char_pos": 1450}, {"type": "R", "before": "thus creating a homoplasy between", "after": "demonstrating homoplasy in", "start_char_pos": 1494, "end_char_pos": 1527}], "sents_char_pos": [0, 92, 312, 435, 655, 759, 830, 1004, 1050, 1131, 1159, 1177, 1312]}
+{"doc_id": "65009835", "revision_depth": "2", "before_revision": "The Asafo flags are regimental flags of the Fante people, who mainly live in Ghana's central coastal region. The flags are influenced by a combination of Akan proverbs, visual imagery, and European heraldic tradition. The Fante people live in the coastal areas of Ghana in fishing communities such as Anomabu, Saltpond, Mankessim and Elmira in the town of Cape Coast. In history , they have been concerned with fighting the Ashantis, who were part of the Akan ethnic group and native to the Ashanti Region of modern-day Ghana, because the Ashantis were forcing them to pay tribute . The conflict manifested in interstate rivalries as a result of their dispersed nature of power. The Asafo companies were developed as a military group of men in Fante villages. In the local language, Asafo derives from the words sa meaning 'war', and fo meaning 'people'. The defense of the state and welfare is their primary role. Asafo companies were responsible for sanitation and roadworks, protection of state goods, local policies, conducting funeral rights, and community entertainment. The group companies had European contact. After three decades of trading in gold, ivory, and slaves with the Europeans, the Asafo company adopted their flag to display designs symbolizing proverbs about security and warfare. The fighting role of the Asafo companies ended with the British colonial takeover, but still had their role in the ritual life of Fante villages. Asafo Flag The Posuban was the central shrine of each company, a concrete structure colourfully decorated with bright figures that served as regalia and a place for sacrifice. In Fante, flags are called \"frank\" and they are a key item of the Asafo regalia. A man who wants to join the society designs a new flag and commissions its production from the local flag maker. The imagery of the flag challenges rival groups as it asserts the wealth and power of the company. The designs are a reflection of the importance of proverbs throughout the Akan culture. The flags are usually hung around the shrine, carried on a procession through the village, and used at annual festivals, funerals for company members and other occasions. Significance Asafo flags are still being made and used as an important part of communal life in Fante villages. It has been highly collectible in countries and regions outside Ghana since the 1990s for its striking imagery.", "after_revision": "The Asafo flags are regimental flags of the Fante people, an ethnic group that mainly resides in Ghana's central coastal region. The flags are influenced by a combination of Akan proverbs, visual imagery, and European heraldic tradition. The Fante people live in the coastal areas of Ghana in fishing communities such as Anomabu, Saltpond, Mankessim , and Elmira in the town of Cape Coast. Historically , they have been concerned with fighting the Ashantis, a part of the Akan ethnic group native to the Ashanti Region of modern-day Ghana, due to the Ashantis demanding tribute from them . The conflict manifested in interstate rivalries as a result of the dispersed nature of power. The Asafo companies were developed to defend the state as a military group of men in Fante villages. In the local language, Asafo is derived from the words sa meaning 'war', and fo meaning 'people'. Asafo companies were responsible for sanitation and roadworks, protection of state goods, local policies, conducting funeral rights, and community entertainment. After trading gold, ivory, and slaves with the Europeans, the Asafo companies adapted their flags in order to display designs symbolizing proverbs about security and warfare. The fighting duties of the Asafo companies ended with British colonialization, but they still have their role in the ritual life of Fante villages. Asafo flags In Fante, flags are called frank, and they are a key item of Asafo regalia. A man who wishes to join Asafo society designs a new flag and commissions its production from the local flag maker. The imagery of the flag challenges rival groups as it asserts the wealth and power of the company. The designs are a reflection of the importance of proverbs throughout the Akan culture. A company's flags are usually hung around the Posuban, a concrete shrine for each company that is colourfully decorated with bright figures and serves as a place for regalia and sacrifice. The flags are carried on a procession through the village, and are used at annual festivals, funerals for company members , and other occasions. Significance Asafo flags are still being made and used as an important part of communal life in Fante villages. The flags have been highly collectible in countries and regions outside Ghana since the 1990s for their striking imagery.", "edit_actions": [{"type": "R", "before": "who mainly live", "after": "an ethnic group that mainly resides", "start_char_pos": 58, "end_char_pos": 73}, {"type": "A", "before": null, "after": ",", "start_char_pos": 330, "end_char_pos": 330}, {"type": "R", "before": "In history", "after": "Historically", "start_char_pos": 369, "end_char_pos": 379}, {"type": "R", "before": "who were", "after": "a", "start_char_pos": 435, "end_char_pos": 443}, {"type": "D", "before": "and", "after": null, "start_char_pos": 474, "end_char_pos": 477}, {"type": "R", "before": "because the Ashantis were forcing them to pay tribute", "after": "due to the Ashantis demanding tribute from them", "start_char_pos": 528, "end_char_pos": 581}, {"type": "R", "before": "their", "after": "the", "start_char_pos": 647, "end_char_pos": 652}, {"type": "A", "before": null, "after": "to defend the state", "start_char_pos": 715, "end_char_pos": 715}, {"type": "R", "before": "derives", "after": "is derived", "start_char_pos": 791, "end_char_pos": 798}, {"type": "D", "before": "The defense of the state and welfare is their primary role.", "after": null, "start_char_pos": 857, "end_char_pos": 916}, {"type": "R", "before": "The group companies had European contact. After three decades of trading in", "after": "After trading", "start_char_pos": 1079, "end_char_pos": 1154}, {"type": "R", "before": "company adopted their flag", "after": "companies adapted their flags in order", "start_char_pos": 1209, "end_char_pos": 1235}, {"type": "R", "before": "role", "after": "duties", "start_char_pos": 1317, "end_char_pos": 1321}, {"type": "R", "before": "the British colonial takeover, but still had", "after": "British colonialization, but they still have", "start_char_pos": 1356, "end_char_pos": 1400}, {"type": "R", "before": "Flag", "after": "flags", "start_char_pos": 1456, "end_char_pos": 1460}, {"type": "D", "before": "The Posuban was the central shrine of each company, a concrete structure colourfully decorated with bright figures that served as regalia and a place for sacrifice.", "after": null, "start_char_pos": 1461, "end_char_pos": 1625}, {"type": "R", "before": "\"frank\"", "after": "frank,", "start_char_pos": 1653, "end_char_pos": 1660}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1688, "end_char_pos": 1691}, {"type": "R", "before": "wants to join the", "after": "wishes to join Asafo", "start_char_pos": 1717, "end_char_pos": 1734}, {"type": "R", "before": "The", "after": "A company's", "start_char_pos": 2007, "end_char_pos": 2010}, {"type": "R", "before": "shrine,", "after": "Posuban, a concrete shrine for each company that is colourfully decorated with bright figures and serves as a place for regalia and sacrifice. The flags are", "start_char_pos": 2045, "end_char_pos": 2052}, {"type": "A", "before": null, "after": "are", "start_char_pos": 2102, "end_char_pos": 2102}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2158, "end_char_pos": 2158}, {"type": "R", "before": "It has", "after": "The flags have", "start_char_pos": 2292, "end_char_pos": 2298}, {"type": "R", "before": "its", "after": "their", "start_char_pos": 2382, "end_char_pos": 2385}], "sents_char_pos": [0, 108, 217, 368, 583, 679, 761, 856, 916, 1078, 1120, 1303, 1449, 1625, 1706, 1819, 1918, 2006, 2179, 2291]}
+{"doc_id": "6562849", "revision_depth": "1", "before_revision": "The main separation from size 0 (toile de 0) to size 120 (toile de 120) is divided in separate runs for faces/portraits (figure), landscapes (paysage), and marines (marine) which more or less keep the diagonal. That is, a figure 0 corresponds in height to a paysage 1 and a marine 2. In modern times in the USA size is usually stated height by width, where as in this article it is width by height. Num\u00e9ro Figure (cm) Paysage (cm) Marine (cm) 0 18 x 14 18 x 12 18 x 10 1 22 x 16 22 x 14 22 x 12 2 24 x 19 24 x 16 24 x 14 3 27 x 22 27 x 19 27 x 16 4 33 x 24 33 x 22 33 x 19 5 35 x 27 35 x 24 35 x 22 6 41 x 33 41 x 27 41 x 24 8 46 x 38 46 x 33 46 x 27 10 55 x 46 55 x 38 55 x 33 12 61 x 50 61 x 46 61 x 38 15 65 x 54 65 x 50 65 x 46 20 73 x 60 73 x 54 73 x 50 25 81 x 65 81 x 60 81 x 54 30 92 x 73 92 x 65 92 x 60 40 100 x 81 100 x 73 100 x 65 50 116 x 89 116 x 81 116 x 73 60 130 x 97 130 x 89 130 x 81 80 146 x 114 146 x 97 146 x 89 100 162 x 130 162 x 114 162 x 97 120 195 x 130 195 x 114 195 x 97", "after_revision": "The main separation from size 0 (toile de 0) to size 120 (toile de 120) is divided in separate runs for faces/portraits (figure), landscapes (paysage), and marines (marine) which more or less keep the diagonal. That is, a figure 0 corresponds in height to a paysage 1 and a marine 2. In modern times in the USA size is usually stated height by width, where as in this article it is width by height. Num\u00e9ro Figure (cm) Paysage (cm) Marine (cm) 0 18 \u00d7 14 18 \u00d7 12 18 \u00d7 10 1 22 \u00d7 16 22 \u00d7 14 22 \u00d7 12 2 24 \u00d7 19 24 \u00d7 16 24 \u00d7 14 3 27 \u00d7 22 27 \u00d7 19 27 \u00d7 16 4 33 \u00d7 24 33 \u00d7 22 33 \u00d7 19 5 35 \u00d7 27 35 \u00d7 24 35 \u00d7 22 6 41 \u00d7 33 41 \u00d7 27 41 \u00d7 24 8 46 \u00d7 38 46 \u00d7 33 46 \u00d7 27 10 55 \u00d7 46 55 \u00d7 38 55 \u00d7 33 12 61 \u00d7 50 61 \u00d7 46 61 \u00d7 38 15 65 \u00d7 54 65 \u00d7 50 65 \u00d7 46 20 73 \u00d7 60 73 \u00d7 54 73 \u00d7 50 25 81 \u00d7 65 81 \u00d7 60 81 \u00d7 54 30 92 \u00d7 73 92 \u00d7 65 92 \u00d7 60 40 100 \u00d7 81 100 \u00d7 73 100 \u00d7 65 50 116 \u00d7 89 116 \u00d7 81 116 \u00d7 73 60 130 \u00d7 97 130 \u00d7 89 130 \u00d7 81 80 146 \u00d7 114 146 \u00d7 97 146 \u00d7 89 100 162 \u00d7 130 162 \u00d7 114 162 \u00d7 97 120 195 \u00d7 130 195 \u00d7 114 195 \u00d7 97", "edit_actions": [{"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 448, "end_char_pos": 449}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 456, "end_char_pos": 457}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 464, "end_char_pos": 465}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 474, "end_char_pos": 475}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 482, "end_char_pos": 483}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 490, "end_char_pos": 491}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 500, "end_char_pos": 501}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 508, "end_char_pos": 509}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 516, "end_char_pos": 517}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 526, "end_char_pos": 527}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 534, "end_char_pos": 535}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 542, "end_char_pos": 543}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 552, "end_char_pos": 553}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 560, "end_char_pos": 561}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 568, "end_char_pos": 569}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 578, "end_char_pos": 579}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 586, "end_char_pos": 587}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 594, "end_char_pos": 595}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 604, "end_char_pos": 605}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 612, "end_char_pos": 613}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 620, "end_char_pos": 621}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 630, "end_char_pos": 631}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 638, "end_char_pos": 639}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 646, "end_char_pos": 647}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 657, "end_char_pos": 658}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 665, "end_char_pos": 666}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 673, "end_char_pos": 674}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 684, "end_char_pos": 685}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 692, "end_char_pos": 693}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 700, "end_char_pos": 701}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 711, "end_char_pos": 712}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 719, "end_char_pos": 720}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 727, "end_char_pos": 728}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 738, "end_char_pos": 739}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 746, "end_char_pos": 747}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 754, "end_char_pos": 755}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 765, "end_char_pos": 766}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 773, "end_char_pos": 774}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 781, "end_char_pos": 782}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 792, "end_char_pos": 793}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 800, "end_char_pos": 801}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 808, "end_char_pos": 809}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 820, "end_char_pos": 821}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 829, "end_char_pos": 830}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 838, "end_char_pos": 839}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 850, "end_char_pos": 851}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 859, "end_char_pos": 860}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 868, "end_char_pos": 869}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 880, "end_char_pos": 881}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 889, "end_char_pos": 890}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 898, "end_char_pos": 899}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 910, "end_char_pos": 911}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 920, "end_char_pos": 921}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 929, "end_char_pos": 930}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 942, "end_char_pos": 943}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 952, "end_char_pos": 953}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 962, "end_char_pos": 963}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 975, "end_char_pos": 976}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 985, "end_char_pos": 986}, {"type": "R", "before": "x", "after": "\u00d7", "start_char_pos": 995, "end_char_pos": 996}], "sents_char_pos": [0, 210, 283, 398, 417, 430, 442, 453, 464, 476, 487, 500]}
+{"doc_id": "65710822", "revision_depth": "2", "before_revision": "Entomoculture is a term coined by Natalie Rubio at Tufts University to describe the subfield of cellular agriculture which specifically deals with the production of insect tissue in vitro. It draws on principles more generally used in tissue engineering and has many scientific similarities to Baculovirus Expression Vectors or soft robotics. The field has mainly been proposed because of its potential technical advantages over mammalian cells in generating cultivated meat. Function Entomoculture functions along the same principles of cellular agriculture in general. First, embryonic cells are derived from an insect. Embryonic stem cells are totipotent cells, meaning they retain the capacity to differentiate into any or all of the different kinds of specialized cells. These cells can either be taken from primary cultures (directly from the animal) or from cryopreserved secondary cultures. These stem cells are then immersed into a culture medium so that they can proliferate. Culture media consist of basal media which is a composition of the various nutrients essential to cell growth. This mixture diffuses into the cell and once it consumes enough, it will divide and the population will multiply. This culture media is generally supplemented with other proteins and growth factors in order to optimize growth . Such additives are frequently produced recombinant protein production - translating the respective genes into bacteria which is then fermented to produce several copies of the protein. The proliferated number of stem cells can then be seeded onto a scaffold in order to initiate a larger composition or can be placed directly into a bioreactor. The bioreactor replicates the environmental characteristics that would otherwise be emulated in vivo including temperature and osmolarity to promote cell differentiation into muscle tissue. In the bioreactor, stem cells undergo myogenesis - the differentiation into muscle tissue. Embryonic cells with high levels of twist and sloppy paired transcription factors code for zygotic genes which then activate the dorsal proteins within the cells. Dorsal proteins are inherited from the animal's mother and encourage the cells to divide, morph and collectively form a monolayer over the ectoderm. The ectoderm is one of three embryonic germ layers which the new monolayer folds over in order to produce the mesoderm. The embryonic cells are now mesodermal cells. Because of \"cross talk\" between the ectodermal and mesodermal layers, ectodermal signaling molecules such as Wingless and Decapentaplegic induce patterning in mesodermal cells. In particular, they influence whether or not the mesodermal cells have cardiac or somatic fates. Signaling within the mesodermal layer (autonomous signaling) results in segmentation gene products called Sloppy Paired and Even Skipped. These segmentation gene products create larger patterning trends based on how much Twist transcription factor is expressed in a particular zone. For instance, Zones with low Twist and high Even Skipped eventually give rise to cells with cardiac and vascular lineage and cells with high Twist and high Sloppy Paired eventually give rise to cells with somatic muscle. 289x289px|Founder cells and fusion competent myoblasts connect to form multinucleated muscle fibres. This generates equivalence groups, or regions of cell with similar lineage potential. Notch Signalling will then act on these equivalence groups and encourage the mesodermal cells to divide into two identical daughter cells - one of which will become a myogenic progenitor and the other , a fusion-competent myoblast. Then, these myogenic progenitors divide asymmetrically. In the first case, the two daughter cells can become founder cells with low expressions of Twist. Founder cells are the basis for muscle tissue which other cells bind to in order to create fibers. Alternatively, one daughter cell can become a founder cell (with low Twist), and the other can become an adult muscle precursor (with high Twist). The adult muscle precursors (AMPs) are quiescent until the larval stage while the muscle precursors are not due to Numb Signalling. Notch Signalling combined with Twist expression discourages cell differentiation. Numb protein inhibits Notch and is mostly active around founder cell equivalence groups rather than AMPs. This results in differentiation being repressed in the AMPs while the founder cells begin to specialize. Adhesion is facilitated through the proteins Dumbfounded and Sticks and Stones in the cases of founder cells and fusion competent myoblasts, respectively. The Dumbfounded proteins attract Sticks and Stones which encourages the cells carrying those proteins to migrate towards each other. About 4\u201325 of the fusion-competent myoblast will fuse with one founder cell to create multinucleated myofibers which collectively become larval muscle. Comparison to mammalian cells In terms of cultured meat, entomoculture has mainly been proposed due to its potential advantages over mammalian cells. Such advantages can be ascribed to the differences in biology between the two cell types which enable insect cells to tolerate conditions more favourable for industrial production. Culture Conditions. As mammalian cells digest and metabolize glucose, they produce byproducts such as lactic acid which accumulate and acidify the cell's environment. The ability with which cells are able to uptake nutrients depends on the pH of the environment - it must be within a certain window for optimal growth. Lactic acid accumulation leads to inferior growth conditions for the cell. As such the environment must be \"rebalanced\" which is typically accomplished by replacing the entire culture medium frequently as every 2\u20133 days. However, the saturated culture media may still contain viable nutrients which makes the practise wasteful and expensive. Insect cells in part circumvent lactate production but are also tolerant to more acidic environments. When insect cell growth was compared at a pH of 5.5, 6.5 and 7.5, negligible difference was noted. As a result, insect cultures can have their media replaced in as long as 90 days. This is compounded by the fact that insect cells do not deplete added nutrients as fast as mammalian cells. They consume triglycerides, glucose and proteins at a slower rate suggesting that they have more efficient metabolic pathways. Additionally, insect cell cultures are typically contaminated with lipid cells called trophocytes or vitellophages which are precursors to insect egg yolk cells. These cells are a natural source of fat which can be consumed by the other insect cells . Serum Free Culture Media. Culture media is an instrumental part of cellular agriculture and generating cultured tissue because it is effectively what allows scientists to begin with a relatively small sample of animal stem cells and end up with enough to constitute an entire tissue. In order to proliferate, a cell does not only require essential nutrients and macromolecules but also growth factors. When mammalian cells grow in vivo, these growth factors are supplied by the animal's blood. In order to replicate this, the culture medium usually consists of a basal mixture supplemented with extra growth factors. The basal medium makes up the bulk of the culture and contains most of the nutrients while the growth factors are added in trace amounts. As a result, the natural starting point is combining Fetal Bovine Serum (FBS) into the culture media. FBS is somewhat controversial because it comes from the blood of a dairy cow fetus. The two issues with this is that it is a) reliant on animals, hence defeating the goal of cellular agriculture and b) expensive because it is so inaccessible. Additionally, from a scientific perspective, FBS is chemically undefined, meaning that its composition varies between animals. For the sake of research consistency, this is not desirable. The ideal culture medium is one that is simple, can stimulate proliferation, is unreliant on animals, is accessible and is cheap. However, because of the fact that mammalian cells rely on a complex array of growth factors, finding a culture medium that satisfies all 5 of these criteria is an ongoing challenge. Insect cells on the other hand, come from insects which are biologically simpler organisms than mammals. They contain a fluid called hemolymph rather than blood and so do not rely on all the same growth factors as mammalian cells. Instead, insect cell medium typically uses a basal medium (such as Eagle's Medium, Grace's Insect Medium or Schneider's Drosophila Medium) which is supplemented with plant based additives such as yeastolate, primatone RL, hydrolysates, pluronic lipids and peptides. Suspension Cultures. When mammalian muscle cells grow in vivo, a fundamental part of their proliferation relies on their attachment to the Extracellular Matrix (ECM). In order to replicate this relationship, mammalian cells are usually cultured in adherent monolayers \u2014 cultures where the cells grow on a substrate in layers only one cell thick. This necessitates using bioreactors with a lot of surface area which , when scaled up to the industrial level, is infeasible . The alternative is using something called microcarriers which are small pieces of material that float in the culture medium hence increasing the overall surface area which the cells can attach to. This also introduces the need to vascularize. When mammalian cells are grown in adherent cultures, the cells which are not in direct contact with culture medium will stop growing, forming necrotic centres. Unlike mammalian cells, insect cells are also able to grow unattached to anything \u2014 or in suspension cultures. This means that bioreactors do not need a large surface area, and can instead be produced in much more practical shapes.", "after_revision": "Entomoculture is a term Natalie Rubio at Tufts University coined to describe the subfield of cellular agriculture , which specifically deals with the production of insect tissue in vitro. It draws on principles more generally used in tissue engineering and has many scientific similarities to Baculovirus Expression Vectors or soft robotics. The field has mainly been proposed because of its potential technical advantages over mammalian cells in generating cultivated meat. Function Entomoculture functions along the same principles of cellular agriculture in general. First, embryonic cells are derived from an insect. Embryonic stem cells are totipotent cells, meaning they retain the capacity to differentiate into any or all of the different kinds of specialized cells. These cells can either be taken from primary cultures (directly from the animal) or from cryopreserved secondary cultures. These stem cells are then immersed into a culture medium so that they can proliferate. Culture media consist of basal media , which is a composition of the various nutrients essential to cell growth. This mixture diffuses into the cell and once it consumes enough, it divides and the population multiplies. To optimize growth, this culture media is generally supplemented with other proteins and growth factors . Such additives are frequently produced recombinant protein production \u2014 translating the respective genes into bacteria that is then fermented to produce several copies of the protein. The proliferated number of stem cells can then be seeded onto a scaffold to initiate a larger composition or can be placed directly into a bioreactor. The bioreactor replicates the environmental characteristics that would otherwise be emulated in vivo including temperature and osmolarity to promote cell differentiation into muscle tissue. In the bioreactor, stem cells undergo myogenesis \u2014 the differentiation into muscle tissue. Embryonic cells with high levels of twist and sloppy paired transcription factors code for zygotic genes , which then activate the dorsal proteins within the cells. Dorsal proteins are inherited from the animal's mother and encourage the cells to divide, morph and collectively form a monolayer over the ectoderm. The ectoderm is one of three embryonic germ layers that the new monolayer folds over to produce the mesoderm. The embryonic cells are now mesodermal cells. Because of \"cross talk\" between the ectodermal and mesodermal layers, ectodermal signaling molecules such as Wingless and Decapentaplegic induce patterning in mesodermal cells. In particular, they influence whether or not the mesodermal cells have cardiac or somatic fates. Signaling within the mesodermal layer (autonomous signaling) results in segmentation gene products called Sloppy Paired and Even Skipped. These segmentation gene products create larger patterning trends based on how much Twist transcription factor is expressed in a particular zone. For instance, Zones with low Twist and high Even Skipped eventually give rise to cells with cardiac and vascular lineage and cells with high Twist and high Sloppy Paired eventually give rise to cells with somatic muscle. 289x289px|Founder cells and fusion competent myoblasts connect to form multinucleated muscle fibres. This generates equivalence groups, or regions of cell with similar lineage potential. Notch Signalling then acts on these equivalence groups and encourages the mesodermal cells to divide into two identical daughter cells . One becomes a myogenic progenitor and the other becomes a fusion-competent myoblast. Then, these myogenic progenitors divide asymmetrically. In the first case, the two daughter cells can become founder cells with low expressions of Twist. Founder cells are the basis for muscle tissue that other cells bind to create fibers. Alternatively, one daughter cell can become a founder cell (with low Twist), and the other can become an adult muscle precursor (with high Twist). The adult muscle precursors (AMPs) are quiescent until the larval stage while the muscle precursors are not due to Numb Signalling. Notch Signalling combined with Twist expression discourages cell differentiation. Numb protein inhibits Notch and is mostly active around founder cell equivalence groups rather than AMPs. This results in differentiation being repressed in the AMPs while the founder cells begin to specialize. Adhesion is facilitated through the proteins Dumbfounded and Sticks and Stones in the cases of founder cells and fusion competent myoblasts, respectively. The Dumbfounded proteins attract Sticks and Stones which encourages the cells carrying those proteins to migrate towards each other. About 4\u201325 of the fusion-competent myoblast fuse with one founder cell to create multinucleated myofibers , which collectively become larval muscle. Comparison to mammalian cells In terms of cultured meat, entomoculture has mainly been proposed due to its potential advantages over mammalian cells. Such advantages can be ascribed to the differences in biology between the two cell types that enable insect cells to tolerate conditions more favourable for industrial production. Culture Conditions. As mammalian cells digest and metabolize glucose, they produce byproducts such as lactic acid which accumulate and acidify the cell's environment. The ability that cells have to uptake nutrients depends on the pH of the environment \u2014 it must be within a certain window for optimal growth. Lactic acid accumulation leads to inferior growth conditions for the cell. As such , the environment must be \"rebalanced\" \u2014 which is typically accomplished by replacing the entire culture medium frequently as every 2\u20133 days. However, the saturated culture media may still contain viable nutrients , which makes the practise wasteful and expensive. Insect cells in part circumvent lactate production but are also tolerant to more acidic environments. When insect cell growth was compared at a pH of 5.5, 6.5 and 7.5, negligible difference was noted. As a result, insect cultures can have their media replaced in as long as 90 days. This is compounded by the fact that insect cells do not deplete added nutrients as fast as mammalian cells. They consume triglycerides, glucose and proteins at a slower rate suggesting that they have more efficient metabolic pathways. Additionally, insect cell cultures are typically contaminated with lipid cells called trophocytes or vitellophages , which are precursors to insect egg yolk cells. These cells are a natural source of fat that other insect cells can consume . Serum Free Culture Media. Culture media is an instrumental part of cellular agriculture and generating cultured tissue because it is effectively what allows scientists to begin with a relatively small sample of animal stem cells and end up with enough to constitute an entire tissue. To proliferate, a cell does not only require essential nutrients and macromolecules but also growth factors. When mammalian cells grow in vivo, these growth factors are supplied by the animal's blood. To replicate this, the culture medium usually consists of a basal mixture supplemented with extra growth factors. The basal medium makes up the bulk of the culture and contains most of the nutrients while the growth factors are added in trace amounts. As a result, the natural starting point is combining Fetal Bovine Serum (FBS) into the culture media. FBS is somewhat controversial because it comes from the blood of a dairy cow fetus. The two issues with this is that it is a) reliant on animals, hence defeating the goal of cellular agriculture and b) expensive because it is so inaccessible. Additionally, from a scientific perspective, FBS is chemically undefined, meaning that its composition varies between animals. For the sake of research consistency, this is not desirable. The ideal culture medium is one that is simple, can stimulate proliferation, is unreliant on animals, is accessible and is cheap. However, because of the fact that mammalian cells rely on a complex array of growth factors, finding a culture medium that satisfies all five of these criteria is an ongoing challenge. Insect cells on the other hand, are biologically simpler organisms than mammals. They contain a fluid called hemolymph rather than blood , so they do not rely on all the same growth factors as mammalian cells. Instead, insect cell medium typically uses a basal medium (such as Eagle's Medium, Grace's Insect Medium or Schneider's Drosophila Medium) , which is supplemented with plant based additives such as yeastolate, primatone RL, hydrolysates, pluronic lipids and peptides. Suspension Cultures. When mammalian muscle cells grow in vivo, a fundamental part of their proliferation relies on their attachment to the Extracellular Matrix (ECM). To replicate this relationship, mammalian cells are usually cultured in adherent monolayers \u2014 cultures where the cells grow on a substrate in layers only one cell thick. This necessitates using bioreactors with a lot of surface area that , when scaled up to the industrial level, is unfeasible . The alternative is to use microcarriers, which are small pieces of material that float in the culture medium to increase the overall surface area the cells can attach to. This also introduces the need to vascularize. When mammalian cells are grown in adherent cultures, the cells not in direct contact with culture medium stop growing, forming necrotic centres. Unlike mammalian cells, insect cells are also able to grow unattached to anything \u2014 or in suspension cultures. This means that bioreactors do not need a large surface area, and can instead be produced in much more practical shapes.", "edit_actions": [{"type": "D", "before": "coined by", "after": null, "start_char_pos": 24, "end_char_pos": 33}, {"type": "A", "before": null, "after": "coined", "start_char_pos": 68, "end_char_pos": 68}, {"type": "A", "before": null, "after": ",", "start_char_pos": 118, "end_char_pos": 118}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1025, "end_char_pos": 1025}, {"type": "R", "before": "will divide", "after": "divides", "start_char_pos": 1168, "end_char_pos": 1179}, {"type": "R", "before": "will multiply. This", "after": "multiplies. To optimize growth, this", "start_char_pos": 1199, "end_char_pos": 1218}, {"type": "D", "before": "in order to optimize growth", "after": null, "start_char_pos": 1298, "end_char_pos": 1325}, {"type": "R", "before": "-", "after": "\u2014", "start_char_pos": 1398, "end_char_pos": 1399}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 1447, "end_char_pos": 1452}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 1586, "end_char_pos": 1594}, {"type": "R", "before": "-", "after": "\u2014", "start_char_pos": 1912, "end_char_pos": 1913}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2059, "end_char_pos": 2059}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 2318, "end_char_pos": 2323}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 2353, "end_char_pos": 2361}, {"type": "R", "before": "will then act", "after": "then acts", "start_char_pos": 3415, "end_char_pos": 3428}, {"type": "R", "before": "encourage", "after": "encourages", "start_char_pos": 3461, "end_char_pos": 3470}, {"type": "R", "before": "- one of which will become", "after": ". One becomes", "start_char_pos": 3536, "end_char_pos": 3562}, {"type": "R", "before": ",", "after": "becomes", "start_char_pos": 3599, "end_char_pos": 3600}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 3830, "end_char_pos": 3835}, {"type": "D", "before": "in order to", "after": null, "start_char_pos": 3856, "end_char_pos": 3867}, {"type": "D", "before": "will", "after": null, "start_char_pos": 4787, "end_char_pos": 4791}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4854, "end_char_pos": 4854}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 5135, "end_char_pos": 5140}, {"type": "R", "before": "with which cells are able", "after": "that cells have", "start_char_pos": 5406, "end_char_pos": 5431}, {"type": "R", "before": "-", "after": "\u2014", "start_char_pos": 5489, "end_char_pos": 5490}, {"type": "A", "before": null, "after": ",", "start_char_pos": 5629, "end_char_pos": 5629}, {"type": "A", "before": null, "after": "\u2014", "start_char_pos": 5667, "end_char_pos": 5667}, {"type": "A", "before": null, "after": ",", "start_char_pos": 5841, "end_char_pos": 5841}, {"type": "A", "before": null, "after": ",", "start_char_pos": 6524, "end_char_pos": 6524}, {"type": "R", "before": "which can be consumed by the", "after": "that", "start_char_pos": 6612, "end_char_pos": 6640}, {"type": "A", "before": null, "after": "can consume", "start_char_pos": 6660, "end_char_pos": 6660}, {"type": "R", "before": "In order to", "after": "To", "start_char_pos": 6947, "end_char_pos": 6958}, {"type": "R", "before": "In order to", "after": "To", "start_char_pos": 7157, "end_char_pos": 7168}, {"type": "R", "before": "5", "after": "five", "start_char_pos": 8218, "end_char_pos": 8219}, {"type": "D", "before": "come from insects which", "after": null, "start_char_pos": 8295, "end_char_pos": 8318}, {"type": "R", "before": "and so", "after": ", so they", "start_char_pos": 8424, "end_char_pos": 8430}, {"type": "A", "before": null, "after": ",", "start_char_pos": 8633, "end_char_pos": 8633}, {"type": "R", "before": "In order to", "after": "To", "start_char_pos": 8928, "end_char_pos": 8939}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 9170, "end_char_pos": 9175}, {"type": "R", "before": "infeasible", "after": "unfeasible", "start_char_pos": 9221, "end_char_pos": 9231}, {"type": "R", "before": "using something called microcarriers", "after": "to use microcarriers,", "start_char_pos": 9253, "end_char_pos": 9289}, {"type": "R", "before": "hence increasing", "after": "to increase", "start_char_pos": 9358, "end_char_pos": 9374}, {"type": "D", "before": "which", "after": null, "start_char_pos": 9400, "end_char_pos": 9405}, {"type": "D", "before": "which are", "after": null, "start_char_pos": 9540, "end_char_pos": 9549}, {"type": "D", "before": "will", "after": null, "start_char_pos": 9592, "end_char_pos": 9596}], "sents_char_pos": [0, 190, 344, 477, 572, 623, 777, 900, 987, 1099, 1213, 1327, 1512, 1672, 1862, 1953, 2117, 2266, 2386, 2432, 2609, 2706, 2844, 2989, 3210, 3311, 3397, 3629, 3685, 3783, 3882, 4029, 4161, 4243, 4349, 4454, 4609, 4742, 4895, 5045, 5226, 5246, 5393, 5545, 5620, 5768, 5890, 5992, 6091, 6173, 6281, 6408, 6571, 6688, 6946, 7064, 7156, 7279, 7417, 7519, 7603, 7762, 7889, 7950, 8080, 8262, 8367, 8493, 8760, 8781, 8927, 9106, 9233, 9430, 9476, 9636, 9747]}
+{"doc_id": "66138120", "revision_depth": "1", "before_revision": "World War II: TCG is a free-to-play, online turn-based digital collectible card game developed and published by FrozenShard Games. The game is based on the events of World War II. It was released on March 6, 2014 for iOS, June 19, 2014 for Android, and February 23, 2019 for URL It was created following a successful Kickstarter campaign. It is the first release from FrozenShard Games, which was founded on September 24, 2012 by three former Blizzard Entertainment employees . Gameplay There are four major types of cards in World War II TCG : Units, Items, Orders, and Commands. Every card is based on real World War II technology (e.g.: Japanese A6M Zero plane , Tiger tank\u2026) The resource system is different from most card games. The player starts with three action points that can be used to play cards from the first turn onwards. Players can use their action points to promote units and become more powerful , e.g. a card that starts as a plain infantry unit will gain more attack power, health and abilities after being promoted. If the card is destroyed, it will return to the player's deck and may be drawn again in the following hands in its promoted state. Sea Lords - Added ships and submarines . (80+ new cards) May 11, 2017 Stronghold - Added structures (60+ new cards) May 28, 2018 Outbreak - Crafting option . (80+ new cards) May 2, 2019 War Machine - Swap cards option . (130+ new cards) October 14, 2019 Defiance - Gameplay and UI rework . (120+ new cards + leaders feature) December 7, 2020 Reception Joseph Luster of Warfare History Network website called the game a \"fun new take on WWII Combat\" and said it was \"surprisingly likable\". He highlighted the fact that \"cards can be examined to get a better idea of which one would be appropriate for a particular play. But, the simpler battles can typically be won mainly by being aggressive and coming out strong with cards that will, ideally, overpower the ones your enemy puts on the field\". Rob Thomas of 148Apps.com reviewed an early version of the game and stated : \"While an enjoyable enough experience most of the time, World War II: TCG sports a few serious weaknesses.\" Thomas criticized how \"random chance\" sometimes results in \"infuriating unfairness,\" along with the game's lack of \"fundamental concepts\" from other digital TCGs. A lengthy early game tutorial and a lack of explanations for new elements were introduced after the tutorial. The review concluded : \"Free to play doesn't excuse many design mistakes that make this collectible card game feel fresh out basic training.\" The game was a finalist in Gamelab 2014's \"Best debut \" section. The company was selected by Asus as the winner of the \"Innovation Prize\", where the game was presented in Bilbao's Guggenheim museum for the Fun&Serious Game Festival. %DIFDELCMD < %DIFDELCMD < %%% Where to Play World War II: TCG is available on Steam to play for free. It was released on February 23rd, 2019. References", "after_revision": "World War II: TCG is a free-to-play, online turn-based digital collectible card game developed and published by FrozenShard Games. The game was released on March 6, 2014 for iOS, June 19, 2014 for Android, and February 23, 2019 for URL It is the first release from FrozenShard Games, which was founded on September 24, 2012 by three former Blizzard Entertainment employees and was created following a successful Kickstarter campaign . World War II: TCG is based on the events of World War II. Gameplay World War II: TCG contains four major types of cards in : Units, Items, Orders, and Commands. Each card type is based on World War II technology , such as the Japanese A6M Zero plane and Tiger tank. The game has a unique resource system in which the player starts with three action points that can be used to play cards from their first turn onwards. Players can use their action points to promote units and become more powerful : a card that starts as an infantry unit gains more attack power, health , and abilities after being promoted. If a card is destroyed, it returns to the player's deck and may be drawn again in its promoted state. Sea Lords - Added ships and submarines (80+ new cards) , May 11, 2017 Stronghold - Added structures (60+ new cards) , May 28, 2018 Outbreak - Crafting option (80+ new cards) , May 2, 2019 War Machine - Swap cards option (130+ new cards) , October 14, 2019 Defiance - Gameplay and UI rework (120+ new cards and leaders feature) , December 7, 2020 Reception Joseph Luster of the Warfare History Network website called World War II: TCG a \"fun new take on WWII Combat\" and said it was \"surprisingly likable\". He highlighted the fact that \"cards can be examined to get a better idea of which one would be appropriate for a particular play. But, the simpler battles can typically be won mainly by being aggressive and coming out strong with cards that will, ideally, overpower the ones your enemy puts on the field\". Rob Thomas of 148Apps.com reviewed an early version of the game and stated that, \"While an enjoyable enough experience most of the time, World War II: TCG sports a few serious weaknesses.\" Thomas criticized how \"random chance\" sometimes resulted in \"infuriating unfairness,\" along with the game's lack of \"fundamental concepts\" from other digital trading card games. While Thomas viewed the tutorial at the start of the game as lengthy, he noted that there was a lack of explanations for many new elements introduced after the tutorial. He concluded the review by saying that, \"Free to play doesn't excuse many design mistakes that make this collectible card game feel fresh out basic training.\" World War II: TCG was a finalist in Gamelab 2014's \"Best Debut \" section. FrozenShard Games was selected by Asus as the winner of the \"Innovation Prize\", where the game was presented in Bilbao's Guggenheim museum for the Fun&Serious Game Festival. %DIFDELCMD < %DIFDELCMD < %%% References", "edit_actions": [{"type": "D", "before": "is based on the events of World War II. It", "after": null, "start_char_pos": 140, "end_char_pos": 182}, {"type": "D", "before": "was created following a successful Kickstarter campaign. It", "after": null, "start_char_pos": 282, "end_char_pos": 341}, {"type": "A", "before": null, "after": "and was created following a successful Kickstarter campaign", "start_char_pos": 476, "end_char_pos": 476}, {"type": "A", "before": null, "after": "World War II: TCG is based on the events of World War II.", "start_char_pos": 479, "end_char_pos": 479}, {"type": "R", "before": "There are", "after": "World War II: TCG contains", "start_char_pos": 489, "end_char_pos": 498}, {"type": "D", "before": "World War II TCG", "after": null, "start_char_pos": 528, "end_char_pos": 544}, {"type": "R", "before": "Every card", "after": "Each card type", "start_char_pos": 583, "end_char_pos": 593}, {"type": "D", "before": "real", "after": null, "start_char_pos": 606, "end_char_pos": 610}, {"type": "R", "before": "(e.g.:", "after": ", such as the", "start_char_pos": 635, "end_char_pos": 641}, {"type": "R", "before": ", Tiger tank\u2026) The resource system is different from most card games. The", "after": "and Tiger tank. The game has a unique resource system in which the", "start_char_pos": 666, "end_char_pos": 739}, {"type": "R", "before": "the", "after": "their", "start_char_pos": 815, "end_char_pos": 818}, {"type": "R", "before": ", e.g.", "after": ":", "start_char_pos": 917, "end_char_pos": 923}, {"type": "R", "before": "a plain infantry unit will gain", "after": "an infantry unit gains", "start_char_pos": 946, "end_char_pos": 977}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1004, "end_char_pos": 1004}, {"type": "R", "before": "the", "after": "a", "start_char_pos": 1044, "end_char_pos": 1047}, {"type": "R", "before": "will return", "after": "returns", "start_char_pos": 1070, "end_char_pos": 1081}, {"type": "D", "before": "the following hands in", "after": null, "start_char_pos": 1129, "end_char_pos": 1151}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1211, "end_char_pos": 1212}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1229, "end_char_pos": 1229}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1289, "end_char_pos": 1289}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1330, "end_char_pos": 1331}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1348, "end_char_pos": 1348}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1393, "end_char_pos": 1394}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1412, "end_char_pos": 1412}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1464, "end_char_pos": 1465}, {"type": "R", "before": "+", "after": "and", "start_char_pos": 1482, "end_char_pos": 1483}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1501, "end_char_pos": 1501}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1546, "end_char_pos": 1546}, {"type": "R", "before": "the game", "after": "World War II: TCG", "start_char_pos": 1586, "end_char_pos": 1594}, {"type": "R", "before": ":", "after": "that,", "start_char_pos": 2048, "end_char_pos": 2049}, {"type": "R", "before": "results", "after": "resulted", "start_char_pos": 2206, "end_char_pos": 2213}, {"type": "R", "before": "TCGs. A lengthy early game tutorial and", "after": "trading card games. While Thomas viewed the tutorial at the start of the game as lengthy, he noted that there was", "start_char_pos": 2315, "end_char_pos": 2354}, {"type": "R", "before": "new elements were", "after": "many new elements", "start_char_pos": 2382, "end_char_pos": 2399}, {"type": "R", "before": "The review concluded :", "after": "He concluded the review by saying that,", "start_char_pos": 2431, "end_char_pos": 2453}, {"type": "R", "before": "The game", "after": "World War II: TCG", "start_char_pos": 2573, "end_char_pos": 2581}, {"type": "R", "before": "debut", "after": "Debut", "start_char_pos": 2621, "end_char_pos": 2626}, {"type": "R", "before": "The company", "after": "FrozenShard Games", "start_char_pos": 2638, "end_char_pos": 2649}, {"type": "D", "before": "Where to Play World War II: TCG is available on Steam to play for free. It was released on February 23rd, 2019.", "after": null, "start_char_pos": 2836, "end_char_pos": 2947}], "sents_char_pos": [0, 130, 179, 338, 582, 679, 735, 838, 1040, 1171, 1666, 1796, 1972, 2157, 2320, 2430, 2572, 2637, 2907, 2947]}
+{"doc_id": "66539007", "revision_depth": "1", "before_revision": "Country-centred design (or Country Centred Design ) is a design methodology of Indigenous peoples in Australia. It is a means of ensuring that the design of the built environment happens with Country at the centre of the design. As such Country-centred design stands as a counterpoint to Human-centred design. Embedded in the Country-centred design methodology is the Indigenous experience of 'Country' . This has a particular and distinct meaning, which is different to the Western understanding of country (with a lowercase 'c' ). Dani\u00e8le Hromek, a spatial designer of Budawang/Yuin heritage from the New South Wales South Coast, explains this as follows:In the Aboriginal sense of the word, Country relates to the nation or cultural group and land that they/we belong to, yearn for, find healing from and will return to. However, Country means much more than land, it is their/our place of origin in cultural, spiritual and literal terms. It includes not only land but also skies and waters. Country is a wholistic worldview that incorporates human, non-human and all the natural systems that connect them. Country-centred design methodology Developed intergenerationally and communally over many generations of Indigenous peoples, the Country-centred design methodology is 'owned' by Indigenous peoples, and embodied through Indigenous designers. It positions Country as the guide for design processes. It inherently includes the relationships between the various elements of Country, community, non-humans and people, and understands the connections and kinships between all that share space. The methodology is interpreted differently dependent on the spatial practitioner and their individual relationships to Country, culture and community. Hromek explains the methodology in her 2019 PhD,'The (Re)Indigenisation of Space: Weaving narratives of resistance to embed Nura Country%DIFDELCMD < ] %%% in design': Bringing together ideas of making, spatial practice and materiality, I inscribe here a brief process for privileging Country in the process of design. This is a process used and created by First Peoples over generations through their care and management of Country . Our ancestors developed generative iterative collaborative communal processes, from which base a design can be developed. Understanding Country as the lead author of design changes the dynamic and the practice of design as it recognises the local Country important to the design. Country , as that which holds all, is centred and privileged in the design . Publication and dissemination Contemporary Indigenous architects and designers in Australia have used the term ' Country Centred Design ' to describe this methodology for many years . More recently, the methodology has been disseminated within the Australian architecture and design communities through a range of publications and public discussions. Led by Indigenous architects, designers and scholars, these initiatives aim to increase knowledge among the larger community of built environment practitioners and to ensure that Indigenous knowledge and methodologies are embedded in the design of the Australian built environment. In ] a 2018 article, Dillon Kombumerri, an architect of Yugembir heritage, described a process of design that is \"very much country-centred, that talk[s] to the deep history of country.\" The concept is further explored in a discussion published in Architecture Australia between Kombumerri, Sarah Lynn Rees (a Palawa woman and architectural practitioner and advocate descending from the Plangermaireener people of north-east Tasmania) and Carroll Go-Sam (a Dyirrbal gumbilbara bama woman from Ravenshoe, North Queensland working as an architectural researcher and practitioner). Here Kombumerri describes Country-centred design in relation to traditional greetings and explains how it differs to human-centred design :The traditional form of greeting is not saying \"hello\" \u2013 that's a human-centred approach. Traditional communication protocols are about sharing where you're from and who your mob is. The human-centred approach needs to shift to be Country centred. My advice to architects is to ground yourself within Country and community. The New South Wales Government Architect discussion paper, Designing with Country, builds on the earlier forum of the same name held in Sydney in 2018. It aims to provide a clear guide to support built environment practitioners to \"respond to Aboriginal culture and heritage responsibly, appropriately and respectfully\". It is part of a larger program of activity from the Government Architect to ensure that sensitive sites are respected, and to support strong Aboriginal culture in the Australian built environment. This document also articulates the contrast between Country-Centred Design and Human-Centred Design:Prioritising people and their needs when designing is widely regarded as fundamental in contemporary design and planning. However, appreciating an Indigenous or Aboriginal worldview suggests that there are limitations imposed by an entirely human-centred approach to design. If people and their needs are at the 'centre' of design considerations, then the landscape and nature are reduced to second order priorities. If design and planning processes considered natural systems that include people, animals, resources and plants equally \u2013 similar to an Aboriginal world view \u2013 this could make a significant contribution to a more sustainable future world. In 2017 Anthony McKnight, Awabakal, Gumaroi, and Yuin scholar, published his thesis titled 'Singing up Country in academia: teacher education academics and preservice teachers' experience with Yuin Country', in which he discusses Country intuitively having its own methodology \u2013 a relational methodology that is guided and inspired by Country'. McKnight also describes Country as 'decentr ing%DIFDELCMD < ] %%% the human authorship privilege of overseer, creator, controller, implementer, and owner'. Country-centred design was the topic of the annual Monash University Whyte Lecture in 2020, given by Angie Abdilla and Pia Waugh . The methodology is also referred to as \"Country centred design\", \"Country centric design\", \"Country-led design\", \"privileging Country in design\", and \"designing with Country\" .", "after_revision": "Country-centred design , also spelt Country Centred Design , is a design methodology of Indigenous peoples in Australia. It is a means of ensuring that the design of the built environment happens with the Aboriginal or Torres Strait Islander concept of \"Country\" at the centre of the design. Country-centred design stands as a counterpoint to human-centred design. Embedded in the Country-centred design methodology is the Indigenous experience of Country . This has a particular and distinct meaning, which is different to the Western understanding of country (with a lowercase \"c\" ). Dani\u00e8le Hromek, a spatial designer of Budawang/Yuin heritage from the New South Wales South Coast, explains this as follows:In the Aboriginal sense of the word, Country relates to the nation or cultural group and land that they/we belong to, yearn for, find healing from and will return to. However, Country means much more than land, it is their/our place of origin in cultural, spiritual and literal terms. It includes not only land but also skies and waters. Country is a wholistic worldview that incorporates human, non-human and all the natural systems that connect them. Country-centred design methodology Developed intergenerationally and communally over many generations of Indigenous peoples, the Country-centred design methodology is \"owned\" by Indigenous peoples, and embodied through Indigenous designers. It positions Country as the guide for design processes. It inherently includes the relationships between the various elements of Country, community, non-humans and people, and understands the connections and kinships between all that share space. The methodology is interpreted differently dependent on the spatial practitioner and their individual relationships to Country, culture and community. %DIFDELCMD < ] %%% It has been described as \"a process used and created by First Peoples over generations through their care and management of Country \". The methodology is also referred to as \"Country centred design\" , \"Country centric design\", \"Country-led design\", \"privileging Country in design\", and \"designing with Country\" . Publication and dissemination Contemporary Indigenous architects and designers in Australia have used the term \" Country Centred Design \" to describe this methodology since the 1990s . More recently, the methodology has been disseminated within the Australian architecture and design communities through a range of publications and public discussions. Led by Indigenous architects, designers and scholars, these initiatives aim to increase knowledge among the larger community of built environment practitioners and to ensure that Indigenous knowledge and methodologies are embedded in the design of the Australian built environment. In 2017 Anthony McKnight, Awabakal, Gumaroi, and Yuin scholar, published his thesis titled \"Singing up Country in academia: teacher education academics and preservice teachers' experience with Yuin Country\", in which he describes Country as \"decentr ing] the human authorship privilege of overseer, creator, controller, implementer, and owner\". In a 2018 article, Dillon Kombumerri, an architect of Yugembir heritage, described a process of design that is \"very much country-centred, that talk[s] to the deep history of country.\" In a 2020 article in Architecture Australia , Kombumerri describes Country-centred design in relation to traditional greetings :The traditional form of greeting is not saying \"hello\" \u2013 that's a human-centred approach. Traditional communication protocols are about sharing where you're from and who your mob is. The human-centred approach needs to shift to be Country centred. My advice to architects is to ground yourself within Country and community. The New South Wales Government Architect 2020 discussion paper, Designing with Country, builds on the earlier forum of the same name held in Sydney in 2018. It aims to provide a clear guide to support built environment practitioners to \"respond to Aboriginal culture and heritage responsibly, appropriately and respectfully\". It is part of a larger program of activity from the Government Architect to ensure that sensitive sites are respected, and to support strong Aboriginal culture in the Australian built environment. This document also articulates the contrast between Country-Centred Design and Human-Centred Design:Prioritising people and their needs when designing is widely regarded as fundamental in contemporary design and planning. However, appreciating an Indigenous or Aboriginal worldview suggests that there are limitations imposed by an entirely human-centred approach to design. If people and their needs are at the 'centre' of design considerations, then the landscape and nature are reduced to second order priorities. If design and planning processes considered natural systems that include people, animals, resources and plants equally \u2013 similar to an Aboriginal world view \u2013 this could make a significant contribution to a more sustainable future world. %DIFDELCMD < ] %%% Country-centred design was the topic of the annual Monash University Whyte Lecture in 2020, given by Angie Abdilla and Pia Waugh .", "edit_actions": [{"type": "R", "before": "(or", "after": ", also spelt", "start_char_pos": 23, "end_char_pos": 26}, {"type": "R", "before": ")", "after": ",", "start_char_pos": 50, "end_char_pos": 51}, {"type": "R", "before": "Country", "after": "the Aboriginal or Torres Strait Islander concept of \"Country\"", "start_char_pos": 192, "end_char_pos": 199}, {"type": "D", "before": "As such", "after": null, "start_char_pos": 229, "end_char_pos": 236}, {"type": "R", "before": "Human-centred", "after": "human-centred", "start_char_pos": 288, "end_char_pos": 301}, {"type": "R", "before": "'Country'", "after": "Country", "start_char_pos": 393, "end_char_pos": 402}, {"type": "R", "before": "'c'", "after": "\"c\"", "start_char_pos": 526, "end_char_pos": 529}, {"type": "R", "before": "'owned'", "after": "\"owned\"", "start_char_pos": 1277, "end_char_pos": 1284}, {"type": "D", "before": "Hromek explains the methodology in her 2019 PhD,'The (Re)Indigenisation of Space: Weaving narratives of resistance to embed Nura", "after": null, "start_char_pos": 1749, "end_char_pos": 1877}, {"type": "D", "before": "Country", "after": null, "start_char_pos": 1878, "end_char_pos": 1885}, {"type": "R", "before": "in design': Bringing together ideas of making, spatial practice and materiality, I inscribe here a brief process for privileging Country in the process of design. This is a process", "after": "It has been described as \"a process", "start_char_pos": 1904, "end_char_pos": 2084}, {"type": "R", "before": ". Our ancestors developed generative iterative collaborative communal processes, from which base a design can be developed. Understanding Country as the lead author of design changes the dynamic and the practice of design as it recognises the local Country important to the design. Country", "after": "\".", "start_char_pos": 2181, "end_char_pos": 2470}, {"type": "A", "before": null, "after": "The methodology is also referred to as \"Country centred design\"", "start_char_pos": 2471, "end_char_pos": 2471}, {"type": "R", "before": "as that which holds all, is centred and privileged in the design", "after": "\"Country centric design\", \"Country-led design\", \"privileging Country in design\", and \"designing with Country\"", "start_char_pos": 2474, "end_char_pos": 2538}, {"type": "R", "before": "'", "after": "\"", "start_char_pos": 2652, "end_char_pos": 2653}, {"type": "R", "before": "'", "after": "\"", "start_char_pos": 2677, "end_char_pos": 2678}, {"type": "R", "before": "for many years", "after": "since the 1990s", "start_char_pos": 2708, "end_char_pos": 2722}, {"type": "A", "before": null, "after": "2017 Anthony McKnight, Awabakal, Gumaroi, and Yuin scholar, published his thesis titled \"Singing up Country in academia: teacher education academics and preservice teachers' experience with Yuin Country\", in which he describes Country as \"decentr", "start_char_pos": 3177, "end_char_pos": 3177}, {"type": "A", "before": null, "after": "ing", "start_char_pos": 3178, "end_char_pos": 3178}, {"type": "A", "before": null, "after": "the human authorship privilege of overseer, creator, controller, implementer, and owner\".", "start_char_pos": 3180, "end_char_pos": 3180}, {"type": "A", "before": null, "after": "In", "start_char_pos": 3181, "end_char_pos": 3181}, {"type": "R", "before": "The concept is further explored in a discussion published", "after": "In a 2020 article", "start_char_pos": 3364, "end_char_pos": 3421}, {"type": "R", "before": "between Kombumerri, Sarah Lynn Rees (a Palawa woman and architectural practitioner and advocate descending from the Plangermaireener people of north-east Tasmania) and Carroll Go-Sam (a Dyirrbal gumbilbara bama woman from Ravenshoe, North Queensland working as an architectural researcher and practitioner). Here", "after": ",", "start_char_pos": 3448, "end_char_pos": 3760}, {"type": "D", "before": "and explains how it differs to human-centred design", "after": null, "start_char_pos": 3842, "end_char_pos": 3893}, {"type": "A", "before": null, "after": "2020", "start_char_pos": 4260, "end_char_pos": 4260}, {"type": "D", "before": "In 2017 Anthony McKnight, Awabakal, Gumaroi, and Yuin scholar, published his thesis titled 'Singing up Country in academia: teacher education academics and preservice teachers' experience with Yuin Country', in which he discusses Country intuitively having its own methodology \u2013 a relational methodology that is guided and inspired by Country'. McKnight also describes Country as 'decentr", "after": null, "start_char_pos": 5493, "end_char_pos": 5881}, {"type": "D", "before": "ing", "after": null, "start_char_pos": 5882, "end_char_pos": 5885}, {"type": "D", "before": "the human authorship privilege of overseer, creator, controller, implementer, and owner'.", "after": null, "start_char_pos": 5904, "end_char_pos": 5993}, {"type": "D", "before": ".", "after": null, "start_char_pos": 6123, "end_char_pos": 6124}, {"type": "D", "before": "The methodology is also referred to as \"Country centred design\", \"Country centric design\", \"Country-led design\", \"privileging Country in design\", and \"designing with Country\"", "after": null, "start_char_pos": 6125, "end_char_pos": 6299}], "sents_char_pos": [0, 111, 228, 309, 404, 532, 823, 941, 994, 1109, 1350, 1406, 1597, 1748, 2066, 2182, 2304, 2462, 2891, 3173, 3363, 3755, 3984, 4077, 4142, 4218, 4371, 4540, 4737, 4959, 5112, 5254, 5492, 5837, 5993, 6124]}
+{"doc_id": "66753243", "revision_depth": "3", "before_revision": "History Establishment The Habr Yunis Sultanate finds its roots in the Isaaq Sultanate which was established by the Rer Guled branch of the Eidagale after the Isaaq successfully defeated the Absame clanat Lafaruug in the 17th century . With time the Habr Yunis and later the Habr Awal and Habr Je'lo would break from the Isaaq Sultanate with the Habr Yunis forming their own Sultanate led by Sugulle the son of the previous Habr Yunis Cheiftain, Ainanshe URL ISSUES IN REFUGEE RESEARCH Working Paper No. 65 Pastoral society and transnational refugees: population movements in Somaliland and eastern Ethiopia 1988 - 2000 Guido Ambroso, Table 1, pg.5 The Sultan Deria Sugulleh would establish his capital at Wadhan (Waram) near the Sheikh pass and tax and administer the affairs of the Habr Yunis from the town. Large caravans bound for Berbera would pass through Habr Yunis territory through Burao and then Wadhan and proved a lucrative source of income for Sultan Deria.The Transactions of the Bombay Geographical Society 1850, Volume 9, p.133 Expansion and Rayyad War 400px|German Map from 1874 showcasing Sultan Hersi Aman's general location Following Sultan Deria 's death in the 1850s his grandson Hersi Aman would come to succeed him and usher in an era of conquest. Hersi Aman belonged to the Bah Makahil section of the Sugulle dynasty.British Somaliland, by Ralph E. Drake-BrockmanAndrzejewski, B.W. and I.M. Lewis, 1964, Somali Poetry: An Introduction, Oxford University Press, Oxford, p.106 In 1870 he would launch the Rayyad Wars against the Darood of Hawd and Dollo which would continue intermittently from 1870 to 1940 and give birth to a string of poems, the Guba poetic chain, one of the most well-known series in Somali history. At the battle of Haro Dhiig (Lake of Blood) in the Hawd , the victorious Habr Yunis had captured the Sultan of the Rer Haroun Ogaden with many lives lost on both sides. The captured Sultan sent a message to Hersi saying as a notable he should be spared. In response, Hersi replied with Laba Gob Kii Beer Jilicsan Baa Jaba meaning, amongst two counterparts the soft-hearted shall perish and the captive Sultan was subsequently executed.The Unknown Horn of Africa, Frank Linsly James, pg.335 & & & First Civil War Despite the great successes of Hersi Aman and new territory acquired, the other branches of the Rer Sugule grew wary of his increasing power as a ruler and stood to challenge him, fearing his unchecked leadership. The wise Guled Haji, another prominent member and elder of the Rer Sugule, had a fallout with Sultan Hersi, and his son was killed by one of Hersis' sons. Hersi's son approached his father and implored him to pay the traditional mag compensation to Guled for the loss of his child. Hersi arrogantly rebuffed his son and all-out conflict would break out between Ba Awal (Hersi's branch) and Baho Sugule branches of the Rer Sugule.War and Peace: An Anthology of Somali literature, p.169 Haji Guled in 1906. The Sultan Hersi himself would be killed in battle after some early clashes and later his commander Warsame would also fall. Warsame's sister lamented to her son Ali for the loss of Hersi, her husband Geid and other relatives in this poem recorded separately by both Phillip Paulitschke and Robecchi Brichetti.Rendiconti by Reale Accademia dei Lincei; Reale Osservatorio del Campidoglio published 1885. Page 228. Frank Linsly James visited Sultan Awad at Burao in 1884 and witnessed the dissenting situation between the two Sultans. Describing the political situation in the region and frequent raids between the two rival Rer Sugulleh factions and their allied Habr Yunis subclans It appeared the great Habr Gerhajis tribe was divided into two rival factions, the one owning allegiance to Sultan Owd, the other to his cousin, Sultan Noor. Between these two the country was about evenly divided, and the border-line was an everlasting scene of wars and rumours of wars, cattle raids, and attempted murders.The Unknown Horn of Africa: An Exploration From Berbera to the Leopard River, 1888 The Haber-Gerhajis tribe had formerly been under one Sultan and were very powerful, making frequent raids into Ogadayn, but on his death, two cousins, Awad and Nur, divided the country between them.Proceedings of the Royal Geographical Society and Monthly Record of Geography, 1885, Volume 7, p.627 Awad was killed fighting in Ogaden by the Reer Ali. This allowed Nur to establish himself at Burao and rule over the entirety of the Habr Yunis. The Baha Deria still did not concede defeat and would eventually chose Awad's nephew, Madar Hersi, as their successor following Nur's death.Journal of the Anthropological Institute of Great Britain and Ireland, Vol. 21, p.161 Sultan Nur convened a shir of the Habr Yunis and decided to draw lots to settle the dispute with his challenger Madar Hersi rather than continue the senseless infighting that had lasted since Hersi Aman's death. Sultan Nur won the draw and gave Madar Hersi 100 camels as compensation and was proclaimed the uncontested Sultan of the Habr Yunis.British Somaliland by Drake Brockman, pages 79\u201382, 1912. The reunified rule under one Sultan Nur would last until the formation of the Dervish Movement several years later in 1899. Early Dervish Era Sultan Nur & Habar Yunis horsemen 1896 Sultan Nur had been the architect of disturbances at Berbera and was the man who narrated the famous story of French Catholic missionaries in Berbera converting Somali children.Under the flag: and Somali coast stories by Walsh, Langton Prendergast. p. 243Somali Coast administration Report of the protectorate 1892\u20131893, Bombay Castle, NAY, New Delhi According to the consul-general James Hayes Sadler this news was either spread or concocted by Sultan Nur of the Habr Yunis. Madar Hersi his former rival for the Sultan title had aided the Mullahs of Kob Fardod in recovering livestock that was previously looted by some of the Habr Yunis and this reignited after receiving aid from the Mullahs there notably Mohammed Abdullah Hassan.Churchill and the Mad Mullah of Somaliland: Betrayal and Redemption 1899-1921. p. 24 by Roy Irons Correspondence respecting the Rising of Mullah Muhammed Abdullah in Somaliland, and consequent military operations, 1899-1901. P. 4. Upon his visit to Oodweyne in July 1899 Sultan Nur convened a great shir of the western Habr Yunis clans and called on them to join the new Dervish movement and upon their refusal he would leave to Burao and successfully rallied the eastern sections of the clan. The Dervish would declare war from Burao on September 1 of 1899.Correspondence respecting the Rising of Mullah Muhammed Abdullah in Somaliland, and consequent military operations, 1899-1901. P. 8. Madar was soon propagated as the legitimate Sultan by British authorities and managed the western sections of the clan throughout the period of the Dervish wars. Incorporation into British Somaliland Sultan Nur continued and would be heavily involved as a key figure of the Dervish movement and the main signatory of the Treaty of Illig in 1905 that granted them large tracts of today's Nugaal and the port of Eyl from the Italians to use.Il Benadir, Vico Mantegazza. 1908. pp. 323\u2013324 Following Sultan Nur's death in 1907 he was entombmed in Taleh the headquarters of the movement and his son Dolal Nur was crowned by the Dervish Habr Yunis clans while Sultan Madar Hersi the more established and powerful of the two eventually would become the uncontested Sultan as Dolal died prematurely in 1917 and left no heirs .British Somaliland by Drake Brockman, pages 82, 1912. With the widespread involvement of the British in the interior against the Dervish the once defacto independent interior clans were brought under British administration and the Habr Yunis Sultanate would end. Economy 300 px|Map of the Daallo Mountain Ranges and coastal Sanaag showing the Musa Arreh (Habar Yunis) settled in Maydh in the year 1860 The Habr Yunis Sultanate had strong economy and controlled two routes to the major port of Berbera leading from the Jerato and Sheikh mountain passes into the Hawd and Ogaden country. The key city of Burao was the Trade was significant and bolstered during the period that a Habr Yunis man Sharmarke Ali Saleh had established himself as Emir of Berbera and Zeila. The eastern sections of the Habr Yunis had coastal access and several ports of their own. They attained a lot of frankincense in the mountains south of Maydh and Harshaw. Arab and Banyan merchants would visit Maydh for commerce before continuing on to the larger ports such as Berbera and Zeila. Maydh was the preeminent export point for large hides the town had dialogue with Berbera with a large amount of cross trade occurring usually by dhow. As well alongside other northern Somalis and Isaaqs in particular, the Habr Yunis were significant traders in Yemen with Frederick Hunter giving an 1877 account of their trade.Hunter, Frederick (1877). An Account of the British Settlement of Aden in Arabia. Cengage Gale. p. 41. Somalis of the Habr Gerhajis tribe arrive from Ogadain with feathers, myrrh, gum, sheep, cattle, and ghee, carrying away in exchange piece goods; they also make four trips in the season; they remain for less than a month, and during their stay reside with fellow-tribesmen, taking their meals in the mokhb\u00e2zah or eating-house. Administration Sultans of the Habr Yunis exercised power both indirectly and directly through allied Akils and leaders of the various subclans of the wider clan and by leading the Habr Yunis in battle against rivals. The seat of Habr Yunis Sultans was deliberately chosen in Wadhan and later Burao along the caravan route in order to have a firm grip on trade and also ensure a steady stream of taxes from passing traders. New information would be passed along these trade routes and the Sultans would be well informed of occurrences as the Somalis have a penchant for being informed about things. Explorer Ricahrd Burton in his 1854 journey to Harar heard from local Somalis who told him the latest reports from the ongoing Crimean War.First Footsteps in East Africa: Or, An Explanation of Harar. Richard Francis Burton, pg 188 The capitals of Wadhan and Burao served as important watering places for both merchants and nomads alike and access to them was crucial for orderly trade from the Hawd and Ogaden regions to Berbera.A Pastoral Democracy: A Study of Pastoralism and Politics Among the Northern Somali of the Horn of Africa, pg.187 According to the current Sultan Osman Ali, the oldest son of a Sultan is the rightful heir, but if he does not fill the requirements another son can be selected. A Sultan has to be religious, an eloquent speaker, courageous, and has to be fertile. A guurti of 40 leading elders from the Habr Yunis subclans would come to make this decision on the successor.Suldaan Cismaan Cali Madar Interview, SAAB TV, 18/05/2017. URL Sultans would receive a yearly tribute or saado of livestock imposed on the rest of the Habr Yunis.The Journal of The anthropological institute of Great Britain and Ireland| Vol.21 p. 161 Journal of the East Africa Natural History Society: Official Publication of the Coryndon Memorial Museum Vol.17 p. 76 Sultan Osman Ali states that the Sultan distributed the livestock amongst the Habr Yunis to the less fortunate and needy as a form of welfare.Suldaan Cismaan Cali Madar Interview, SAAB TV, 18/05/2017. URL Rulers The Habr Yunis Sultanate had eight rulers throughout its duration and the institution of Sultan still lasts today with the Baha Deria leading I conflict still not being completely resolved. The Bah Makahil maintain a well respected pretender although the current Sultan Osman Ali Madar of the Baha Deria is considered as the Sultan of the Habr Yunis. NameReign FromReign Till1 Ainasha Hersi (traditional chief)2Sultan Sugulleh Ainasha (first sultan)3Sultan Diriyeh Sultan Sugulleh Ainasha 4Sultan Hersi Aman Sultan Diriyeh5Sultan Nur Ahmed Aman Sultan Diriyeh 6Sultan Awad Sultan Diiriye7Sultan Dolal Sultan Nur8Sultan Madar Hersi Sultan Diiriye Legacy Amongst the Habr Yunis the traditional institution and leadership of the clan survived the British Somaliland period into present times. The Rer Ainashe Sultans although no longer ruling vast territory and with separate Habr Yunis subclans having their own Sultans still remain status the recognized leaders of the Habr Yunis. The current Sultan is Osman Ali Madar who is active in social issues in modern day Somaliland. References", "after_revision": "History Origins The Habr Yunis are part of the Garhajis clan confederation, and are a sub clan of the Isaaq tribe. The founder of the Rer Sugelleh dynasty is Ainashe Hersi a chief of the HabrYunis. Ethnographie Nordost-afrikas pp.45. Philip Paulitscheke. Publisher: D. Reimer. 1893Ainashe was the son of Ismail Arre a Habar Yunis noblemen, and a women of the Ali Sayid clan. He had seven brothers: Said, Fahiya, Hildid, Warsame, Yusuf, Ali and Abdi whom they shared the same mother and are together known as the Ba Ali in reference to their mother's clan.Tribes of British Somaliland, 1941, pp. 10. later in the 17th century Ainashe was elected to be the Tribal Ugaas of the Habar Yunis clan. As was the norm of Somali chieftains, Ainanshe had multiple wives. His first wife belonged to the Jibrahil clan and was the mother of his eldest son Sugulle who proceeded to establish the Habar Yunis sultanate. Sugelleh was part of the Ba Jibrhil Rer Sugulle which is the ruling tribe of the Habar Yunis. Ainanshe's other wives Mun, Basla and Egalo bore him 16 sons who are collectively known as the Baha Ainanshe.Genealogies of the Somal. Eyre and Spottiswoode (London). 1896. Establishment After the fall of the Adal Sultanate many successor states were established in Somaliland such as the Habar Yunis and Isaaq Sultanate. Before this The whole of the Isaaq clan were ruled by the Habar Jelo or Toljeclo dynasty. The Tol Jeclo claim descent from sheikh Isaaq\u2019s Harari wife. After a devastating reign Garad Dhuh Barar of the Habar Je\u2019clo was defeated and the Somali Isaaqs gained independence from the Harari branch of the Isaaq. After gaining independence the Isaaq Sultanate got into conflict with the Darood Absame, and penetrated deep in their territory, whilst this was happening Isaaq clans were rebelling, and the opportunist Habr Yunis broke of the United Isaaq Sultanate. the Habar Yunis Ugaazte developed into a large independent kingdom, and influenced many Darood, and Isaaq clans. The Habar Yunis established their kingdom under Sugulleh URL ISSUES IN REFUGEE RESEARCH Working Paper No. 65 Pastoral society and transnational refugees: population movements in Somaliland and eastern Ethiopia 1988 - 2000 Guido Ambroso, Table 1, pg.5 Sugelleh\u2019s successor Deria Sugulleh established Wadhan (Waram) as the political-military-economic centre for his people which was near the Sheikh pass and tax and administer the affairs of the Habr Yunis from the town. Large caravans bound for Berbera would pass through Habr Yunis territory through Burao and then Wadhan and proved a lucrative source of income for Sultan Deria.The Transactions of the Bombay Geographical Society 1850, Volume 9, p.133 Expansion and Rayyad War 400px|German Map from 1874 showcasing Sultan Hersi Aman's general location Following Sultan Deria \u2019s death a Great War broke out between the different branches of the Reer Sugelleh, Hiwever the young ambitious Hersi Aman proclaimed him self as Sultan in the 1850\u2019s. Hersi was a smart man, and was ready for conflict with any tribe. Hersi Aman belonged to the Bah Makahil section of the Sugulle dynasty.British Somaliland, by Ralph E. Drake-BrockmanAndrzejewski, B.W. and I.M. Lewis, 1964, Somali Poetry: An Introduction, Oxford University Press, Oxford, p.106 In 1870 he would launch the Rayyad Wars against the Darood of Hawd and Dollo which would continue intermittently from 1870 to 1940 and give birth to a string of poems, the Guba poetic chain, one of the most well-known series in Somali history. At the battle of Haro Dhiig (Lake of Blood) in modern day Haud (Ethiopia) , the victorious Habr Yunis captured the Sultan of the Rer Haroun Ogaden with many lives lost on both sides. The captured Sultan sent a message to Hersi saying as a noble he should be spared. In response, Hersi replied with Laba Gob Kii Beer Jilicsan Baa Jaba meaning, amongst two counterparts the soft-hearted shall perish and the captive Sultan was subsequently executed.The Unknown Horn of Africa, Frank Linsly James, pg.335 Hersi then resumed his conquest and penetrated further into Ogaden lands taking Dollo. In Dollo Hersi occupied, and invaded grazing lands and wells, as well as thousands of camels, he then proceeded to invade the lands of other Darood clans such as the Reer Cabdalle and Reer Makahil forcing them to flee to Hiraan. Ali Dhuh referred to these wars as the Guba wars due to the defeat of the Ogaden clans. Ethiopia,and British influence over the Habar Yunis Whilst Hersi was invading Ogaden the British and Ethiopian empires were getting worried due to the Habar Yunis expansion. The Ethiopians saw the Ogaden as their servants and gateway to Muslim territory. Whilst the British saw Ogaden as a major state, and kept their eye on the province, and would later invade it in 1887. Upon one occasion Hersi raided Ogaden, and took 1330 camels from the Ogaden, however the British and Ethiopians warned them and told them to return the camels to their owners. The Habr Yunis knowing they couldn\u2019t afford a fight with a foreign power obliged, and returned the camels and promised to not lead any raids in Ogaden. Despite their promise they continued to raid Ogaden. Historian sigebery Uhlig commenting on the Guba poems writes the following: From a historical point of view Ali dhuhs poem explicitly details the large gains in traditionally Ogaden territory and wells, and the looting of Ogaden camels by the Isaq. He details the scatterring of the Ogaden clan, their forced migration southwards seeking refuge in the feverish river valleys, and even turning to hunting and farming- measures that were again considered very shameful usually only undertaken by slaves and low-caste Somalis and utterly demeaning for the once great pastoral Ogaden clan. The Ogaden, Ali recounts, have been forced to accept refuge with the clans that defeated them, especially the Habr Yunis, and cannot take revenge. The Isaq are portrayed as particularly callous and shameful in the way they parade looted Ogaden camels in front of their previous owners. Even in translation it is a very evocative poem\". Dhulbahante war After defeating every threat in eastern Ethiopia the Habr Yunis looked east and focus on the Darood clans that inhabited eastern Somali-land, such as the Dhulbahante, and Warsangli, the Habr Yunis were much more powerful than these clans this conflicted resulted in the Habar Yunis looting Dhulbhante territory taking camels and land. The Dhulbahante put up no resistance, and feared the Habr Gerhajis (Habr Yunis) so much so that they didn\u2019t even avenge their casualties and instead intermarried with the Habr Yunis. The Ismail Arreh clan which were part of the Habr Yunis expanded from Berbera to Gulay, whilst the Muse Arreh Expanded far in to Warsangli Territory, and served as a border between the Habr Yunis and Majeerteen (Majeerteen Sultanate). Hersi is one of the most notable sultans and was a great king that penetrated far into Ogaden (Darood). Hersi influenced Zeila which were ran by the Gadabuursi,and Habar Awal sultanates. . Reer Samatar (Gadabuursi War) German explorer Felix Rosen who visited British Somaliland and Ethiopian Empire in 1907 met and discussed with the Somalis in the area and was told about Hersi and other legendary figures who had died in the decades prior. One such story was the battle between Sultan Hersi& the famed warrior Kirh of the Rer Samatar subclan. Sultan Hersi's powerful section of Rer Ammaan had been raided by Kirh and his Rer Samatar. Given the fierce reputation of their target, Kirh's companions were uneasy and fled after the raid, leaving Kirh for dead. His wife began to mourn alongside his kinsmen but to everyone's surprise, Kirh had survived the wilderness and emerged with 100 camels he had captured. This feat impressed Hersi and there was no attempt to recover the lost stock. Kirh recited a boastful gabay O yalahe hoi, o yalahe hoi, yalahe My, our lore of death has spread through all tribes near and far And we felt so safe that we spurned the camels with the lance to prick our mark of possession Let the animals move slowly so that the camel fillings do not become tired At the time when the cowards among our companions took flight and the hiding places Then the lion's mane grew around our shoulders My wife! little was our Seriba; I have filled ten Serbs for you Come, now fill the milk baskets; we have plundered the tribe of AmmanWhen fighting would eventually resume, Hersi called out inquiring where Kirh was in the heat of battle. In response, a spear flew and grazed the Sultan's head. Hersi grabbed the spear which Kirh had thrown and returned the favour piercing through Kirh's famed horse and embedding deep in Kirh. He would escape the battlefield despite the wound leaving Hersi and the Rer Ammaan victorious having killing one& capturing another man named Hashi. Hersi now answered the previous gabay and mocked his opponent How Kirh first bragged so much - now his speeches are silent! Once the Samatar tribe was large and rich, now it is small and become poor Now their caravans are afraid, even a day's march from Amud to go so far! We killed one of their men, we caught one of them, and one we drove the lance through the body Tell us, according to the truth, O Hashi! About which of the three you mourn the most that we like from your tribe?Hashi having being challenged by the Sultan spoke That you killed one of our men was by fate Predestined that you captured me does no harm But no mother has ever given birth to a hero like KirhHersi being moved by these words spared Hashi from the usual deadly fate of a captive instead giving him a fine horse and sent medicines& gifts with Hashi to deliver to Kirh. Kirh would return the favour finally reconciling the feud. First Civil War Despite the great successes of Hersi Aman and new territory acquired, the other branches of the Rer Sugule grew wary of his increasing power as a ruler and stood to challenge him, fearing his unchecked leadership. The wise Guled Haji, another prominent member and elder of the Rer Sugule, had a fallout with Sultan Hersi, and his son was killed by one of Hersis' sons. Hersi's son approached his father and implored him to pay the traditional mag compensation to Guled for the loss of his child. Hersi arrogantly rebuffed his son and all-out conflict would break out between Ba Awal (Hersi's branch) and Baho Sugule branches of the Rer Sugule.War and Peace: An Anthology of Somali literature, p.169 Haji Guled in 1906. War continued with the Rer Sugeleh and the Ba Awal, one of the Ba Awal warriors Warsame attacked the Rer Sugeleh and killed three men, he also captured a respected young noblemen named Jama Amume Jama was the grandson of Deria Sugulleh Ainashe. Due to his Nobility he was released, later Jama then led a battle against the Ba Awal, Jama severely wounded Warsame. He then praised his horse Hamar who had performed well, and recited the following poem. Rendiconti by Reale Accademia dei Lincei; Reale Osservatorio del Campidoglio published 1885. Page 227-228.Col aloosan Xamarow haddii xalay la ugaanshay Heensaha hadddaan kugu itibay goor aleyl dhexe ah Indhaalaha haddaan kuu xidh-xidhay suuman la adkeeyay Isha bari hadii loo kiciyo awrtii reer Sugule Kuwii lays aqoon jiray haddii lagu ogaan duulay Abaanduule Guuleed (Guled Haji) hadii ubaxa loo gooyay Waa boqor agtiisa'e hadday \"ililidii\" yeedh'dhay Usha Daba-xidh ooddiyo haddii laysu wada giijay Eebada haddii laysku riday ilig-jartii hooto Abdikayba intii hore hadaan dabo adeegaayay Kolku ina qolyaeedkii sidii aarka nagu qayshay Anigoo aqoon jirin haddii lay ogeysiiyay Onkad baxay la moodyow kolkan amarka qaadsiiyay Doc aroorka uguma tago orodka saydhshaaye Oogada hadduu igala maray agabarkuu joogo Anna Awlaxaan siday haddaan oofta midig gooyay Kol haddaan Warsame aayiroon Baho agoonteeyay Kol haddaan ugaaskii ka dilay u ololiyeynaayay Kol hadaan ka oon baxay afku aramigu jiifay Alxamdu lilaa Eebaw haddaan umalkii qaar reebayHersi died in that battle and later Warsame would also fall. Warsame's sister lamented to her son Ali for the loss of Hersi, her husband Geid and other relatives in this poem recorded separately by both Phillip Paulitschke and Robecchi Brichetti.Rendiconti by Reale Accademia dei Lincei; Reale Osservatorio del Campidoglio published 1885. Page 228. Frank Linsly James visited Sultan Awad at Burao in 1884 and witnessed the dissenting situation between the two Sultans. Describing the political situation in the region and frequent raids between the two rival Rer Sugulleh factions and their allied Habr Yunis subclans It appeared the great Habr Gerhajis tribe was divided into two rival factions, the one owning allegiance to Sultan Owd, the other to his cousin, Sultan Noor. Between these two the country was about evenly divided, and the border-line was an everlasting scene of wars and rumours of wars, cattle raids, and attempted murders.The Unknown Horn of Africa: An Exploration From Berbera to the Leopard River, 1888 The Haber-Gerhajis tribe had formerly been under one Sultan and were very powerful, making frequent raids into Ogadayn, but on his death, two cousins, Awad and Nur, divided the country between them.Proceedings of the Royal Geographical Society and Monthly Record of Geography, 1885, Volume 7, p.627 Awad was killed fighting in Ogaden by the Reer Ali. This allowed Nur to establish himself at Burao and rule over the entirety of the Habr Yunis. The Baha Deria still did not concede defeat and would eventually chose Awad's nephew, Madar Hersi, as their successor following Nur's death.Journal of the Anthropological Institute of Great Britain and Ireland, Vol. 21, p.161 Sultan Nur convened a shir of the Habr Yunis and decided to draw lots to settle the dispute with his challenger Madar Hersi rather than continue the senseless infighting that had lasted since Hersi Aman's death. Sultan Nur won the draw and gave Madar Hersi 100 camels as compensation and was proclaimed the uncontested Sultan of the Habr Yunis.British Somaliland by Drake Brockman, pages 79\u201382, 1912. The reunified rule under one Sultan Nur would last until the formation of the Dervish Movement several years later in 1899. Early Dervish Era Sultan Nur & Habar Yunis horsemen 1896 Sultan Nur had been the architect of disturbances at Berbera and was the man who narrated the famous story of French Catholic missionaries in Berbera converting Somali children.Under the flag: and Somali coast stories by Walsh, Langton Prendergast. p. 243Somali Coast administration Report of the protectorate 1892\u20131893, Bombay Castle, NAY, New Delhi According to the consul-general James Hayes Sadler this news was either spread or concocted by Sultan Nur of the Habr Yunis. Madar Hersi his former rival for the Sultan title had aided the Mullahs of Kob Fardod in recovering livestock that was previously looted by some of the Habr Yunis and this reignited after receiving aid from the Mullahs there notably Mohammed Abdullah Hassan.Churchill and the Mad Mullah of Somaliland: Betrayal and Redemption 1899-1921. p. 24 by Roy Irons Correspondence respecting the Rising of Mullah Muhammed Abdullah in Somaliland, and consequent military operations, 1899-1901. P. 4. Upon his visit to Oodweyne in July 1899 Sultan Nur convened a great shir of the western Habr Yunis clans and called on them to join the new Dervish movement and upon their refusal he would leave to Burao and successfully rallied the eastern sections of the clan. The Dervish would declare war from Burao on September 1 of 1899.Correspondence respecting the Rising of Mullah Muhammed Abdullah in Somaliland, and consequent military operations, 1899-1901. P. 8. Madar was soon propagated as the legitimate Sultan by British authorities and managed the western sections of the clan throughout the period of the Dervish wars. Incorporation into British Somaliland Early encounters with Britain started in 1882 duirng which was during the time of Sultan Nur. During his time the British had invaded Yemeni islands, and had a interest for the Habr Yunis and the Isaaq Sultanate due to their rich ports the British would establish them self\u2019s in Berbera the Capital of the HabarAwal.Under the flag: and Somali coast stories by Walsh, Langton Prendergast. p. 243,Somali Coast administration Report of the protectorate 1892\u20131893, Bombay Castle, NAY, New Delhi After establishing a base in Somaliland the British would proceed to attack the Dervish on neighbouring cities such as Taleh. Sultan Nur continued the Dervish Campaign and would be heavily involved as a key figure of the Dervish movement and the main signatory of the Treaty of Illig in 1905 that granted them large tracts of today's Nugaal and the port of Eyl from the Italians to use.Il Benadir, Vico Mantegazza. 1908. pp. 323\u2013324 Following Sultan Nur's death in 1907 he was entombmed in Taleh the headquarters of the movement and his son Dolal Nur was crowned by the Dervish Habr Yunis clans while Sultan Madar who was much more powerful often raided the Ba Awal domain. Later Sultan Dolal Nur died prematurely and was left with no ai Rs however his cousin Jama Hersi succeeded him .British Somaliland by Drake Brockman, pages 82, 1912. Cosmos: communicazioni sui progressi recenti e notevoli della geografia e delle scienze affini di Guido Cora p. 201 With the widespread involvement of the British in the interior against the Dervish the once defacto independent interior clans were brought under British administration and the Habr Yunis Sultanate would end. Economy 300 px|Map of the Daallo Mountain Ranges and coastal Sanaag showing the Musa Arreh (Habar Yunis) settled in Maydh in the year 1860 The Habr Yunis Sultanate had strong economy and controlled two routes to the major port of Berbera leading from the Jerato and Sheikh mountain passes into the Hawd and Ogaden country. The key city of Burao was the Trade was significant and bolstered during the period that a Habr Yunis man Sharmarke Ali Saleh had established himself as Emir of Berbera and Zeila. The eastern sections of the Habr Yunis had coastal access and several ports of their own. They attained a lot of frankincense in the mountains south of Maydh and Harshaw. Arab and Banyan merchants would visit Maydh for commerce before continuing on to the larger ports such as Berbera and Zeila. Maydh was the preeminent export point for large hides the town had dialogue with Berbera with a large amount of cross trade occurring usually by dhow. As well alongside other northern Somalis and Isaaqs in particular, the Habr Yunis were significant traders in Yemen with Frederick Hunter giving an 1877 account of their trade.Hunter, Frederick (1877). An Account of the British Settlement of Aden in Arabia. Cengage Gale. p. 41. Somalis of the Habr Gerhajis tribe arrive from Ogadain with feathers, myrrh, gum, sheep, cattle, and ghee, carrying away in exchange piece goods; they also make four trips in the season; they remain for less than a month, and during their stay reside with fellow-tribesmen, taking their meals in the mokhb\u00e2zah or eating-house. Administration Sultans of the Habr Yunis exercised power both indirectly and directly through allied Akils and leaders of the various subclans of the wider clan and by leading the Habr Yunis in battle against rivals. The seat of Habr Yunis Sultans was deliberately chosen in Wadhan and later Burao along the caravan route in order to have a firm grip on trade and also ensure a steady stream of taxes from passing traders. New information would be passed along these trade routes and the Sultans would be well informed of occurrences as the Somalis have a penchant for being informed about things. Explorer Ricahrd Burton in his 1854 journey to Harar heard from local Somalis who told him the latest reports from the ongoing Crimean War.First Footsteps in East Africa: Or, An Explanation of Harar. Richard Francis Burton, pg 188 The capitals of Wadhan and Burao served as important watering places for both merchants and nomads alike and access to them was crucial for orderly trade from the Hawd and Ogaden regions to Berbera.A Pastoral Democracy: A Study of Pastoralism and Politics Among the Northern Somali of the Horn of Africa, pg.187 According to the current Sultan Osman Ali, the oldest son of a Sultan is the rightful heir, but if he does not fill the requirements another son can be selected. A Sultan has to be religious, an eloquent speaker, courageous, and has to be fertile. A guurti of 40 leading elders from the Habr Yunis subclans would come to make this decision on the successor.Suldaan Cismaan Cali Madar Interview, SAAB TV, 18/05/2017. URL Sultans would receive a yearly tribute or saado of livestock imposed on the rest of the Habr Yunis.The Journal of The anthropological institute of Great Britain and Ireland| Vol.21 p. 161 Journal of the East Africa Natural History Society: Official Publication of the Coryndon Memorial Museum Vol.17 p. 76 Sultan Osman Ali states that the Sultan distributed the livestock amongst the Habr Yunis to the less fortunate and needy as a form of welfare.Suldaan Cismaan Cali Madar Interview, SAAB TV, 18/05/2017. URL Rulers The Habr Yunis Sultanate had 8 rulers throughout it's duration and the institution of Sultan still lasts today with the Baha Deria leading I conflict still not being completely resolved. The Bah Makahil maintain a well respected pretender although the current Sultan Osman Ali Madar of the Baha Deria is considered as the Sultan of the Habr Yunis. NameReign FromReign Till1 Ainasha Hersi (traditional chief)2Sultan Sugulleh Ainasha (first sultan)3Sultan Diriyeh Sultan Sugulleh Ainasha 4Sultan Hersi Aman Sultan Diriyeh5Sultan Nur Ahmed Aman Sultan Diriyeh 6Sultan Awad Sultan Diiriye7Sultan Dolal Sultan Nur8Sultan Madar Hersi Sultan Diiriye Legacy Amongst the Habr Yunis the traditional institution and leadership of the clan survived the British Somaliland period into present times. The Rer Ainashe Sultans although no longer ruling vast territory and with separate Habr Yunis subclans having their own Sultans still remain status the recognized leaders of the Habr Yunis. The current Sultan is Osman Ali Madar who is active in social issues in modern day Somaliland. References", "edit_actions": [{"type": "R", "before": "Establishment", "after": "Origins", "start_char_pos": 8, "end_char_pos": 21}, {"type": "R", "before": "Sultanate finds its roots in the Isaaq Sultanate which was established by the Rer Guled branch of the Eidagale after the Isaaq successfully defeated the Absame clanat Lafaruug in", "after": "are part of the Garhajis clan confederation, and are a sub clan of the Isaaq tribe. The founder of the Rer Sugelleh dynasty is Ainashe Hersi a chief of the HabrYunis. Ethnographie Nordost-afrikas pp.45. Philip Paulitscheke. Publisher: D. Reimer. 1893Ainashe was the son of Ismail Arre a Habar Yunis noblemen, and a women of the Ali Sayid clan. He had seven brothers: Said, Fahiya, Hildid, Warsame, Yusuf, Ali and Abdi whom they shared the same mother and are together known as the Ba Ali in reference to their mother's clan.Tribes of British Somaliland, 1941, pp. 10. later in", "start_char_pos": 37, "end_char_pos": 215}, {"type": "R", "before": ". With time the Habr Yunis and later the Habr Awal and Habr Je'lo would break from the Isaaq Sultanate with the Habr Yunis forming their own Sultanate led by Sugulle the son of the previous Habr Yunis Cheiftain, Ainanshe", "after": "Ainashe was elected to be the Tribal Ugaas of the Habar Yunis clan. As was the norm of Somali chieftains, Ainanshe had multiple wives. His first wife belonged to the Jibrahil clan and was the mother of his eldest son Sugulle who proceeded to establish the Habar Yunis sultanate. Sugelleh was part of the Ba Jibrhil Rer Sugulle which is the ruling tribe of the Habar Yunis. Ainanshe's other wives Mun, Basla and Egalo bore him 16 sons who are collectively known as the Baha Ainanshe.Genealogies of the Somal. Eyre and Spottiswoode (London). 1896.", "start_char_pos": 233, "end_char_pos": 453}, {"type": "A", "before": null, "after": "Establishment After the fall of the Adal Sultanate many successor states were established in Somaliland such as the Habar Yunis and Isaaq Sultanate. Before this The whole of the Isaaq clan were ruled by the Habar Jelo or Toljeclo dynasty. The Tol Jeclo claim descent from sheikh Isaaq\u2019s Harari wife. After a devastating reign Garad Dhuh Barar of the Habar Je\u2019clo was defeated and the Somali Isaaqs gained independence from the Harari branch of the Isaaq. After gaining independence the Isaaq Sultanate got into conflict with the Darood Absame, and penetrated deep in their territory, whilst this was happening Isaaq clans were rebelling, and the opportunist Habr Yunis broke of the United Isaaq Sultanate. the Habar Yunis Ugaazte developed into a large independent kingdom, and influenced many Darood, and Isaaq clans. The Habar Yunis established their kingdom under Sugulleh", "start_char_pos": 454, "end_char_pos": 454}, {"type": "R", "before": "The Sultan Deria Sugulleh would establish his capital at", "after": "Sugelleh\u2019s successor Deria Sugulleh established", "start_char_pos": 649, "end_char_pos": 705}, {"type": "A", "before": null, "after": "as the political-military-economic centre for his people which was", "start_char_pos": 721, "end_char_pos": 721}, {"type": "R", "before": "'s death in the 1850s his grandson Hersi Aman would come to succeed him and usher in an era of conquest. Hersi", "after": "\u2019s death a Great War broke out between the different branches of the Reer Sugelleh, Hiwever the young ambitious Hersi Aman proclaimed him self as Sultan in the 1850\u2019s. Hersi was a smart man, and was ready for conflict with any tribe. Hersi", "start_char_pos": 1168, "end_char_pos": 1278}, {"type": "R", "before": "the Hawd", "after": "modern day Haud (Ethiopia)", "start_char_pos": 1792, "end_char_pos": 1800}, {"type": "D", "before": "had", "after": null, "start_char_pos": 1829, "end_char_pos": 1832}, {"type": "R", "before": "notable", "after": "noble", "start_char_pos": 1970, "end_char_pos": 1977}, {"type": "A", "before": null, "after": "Hersi then resumed his conquest and penetrated further into Ogaden lands taking Dollo. In Dollo Hersi occupied, and invaded grazing lands and wells, as well as thousands of camels, he then proceeded to invade the lands of other Darood clans such as the Reer Cabdalle and Reer Makahil forcing them to flee to Hiraan. Ali Dhuh referred to these wars as the Guba wars due to the defeat of the Ogaden clans.", "start_char_pos": 2235, "end_char_pos": 2235}, {"type": "A", "before": null, "after": "Ethiopia,and British influence over the Habar Yunis Whilst Hersi was invading Ogaden the British and Ethiopian empires were getting worried due to the Habar Yunis expansion. The Ethiopians saw the Ogaden as their servants and gateway to Muslim territory. Whilst the British saw Ogaden as a major state, and kept their eye on the province, and would later invade it in 1887. Upon one occasion Hersi raided Ogaden, and took 1330 camels from the Ogaden, however the British and Ethiopians warned them and told them to return the camels to their owners. The Habr Yunis knowing they couldn\u2019t afford a fight with a foreign power obliged, and returned the camels and promised to not lead any raids in Ogaden. Despite their promise they continued to raid Ogaden.", "start_char_pos": 2236, "end_char_pos": 2236}, {"type": "A", "before": null, "after": "Historian sigebery Uhlig commenting on the Guba poems writes the following:", "start_char_pos": 2237, "end_char_pos": 2237}, {"type": "A", "before": null, "after": "From a historical point of view Ali dhuhs poem explicitly details the large gains in traditionally Ogaden territory and wells, and the looting of Ogaden camels by the Isaq. He details the scatterring of the Ogaden clan, their forced migration southwards seeking refuge in the feverish river valleys, and even turning to hunting and farming- measures that were again considered very shameful usually only undertaken by slaves and low-caste Somalis and utterly demeaning for the once great pastoral Ogaden clan. The Ogaden, Ali recounts, have been forced to accept refuge with the clans that defeated them, especially the Habr Yunis, and cannot take revenge. The Isaq are portrayed as particularly callous and shameful in the way they parade looted Ogaden camels in front of their previous owners. Even in translation it is a very evocative poem\".", "start_char_pos": 2238, "end_char_pos": 2238}, {"type": "A", "before": null, "after": "Dhulbahante war After defeating every threat in eastern Ethiopia the Habr Yunis looked east and focus on the Darood clans that inhabited eastern Somali-land, such as the Dhulbahante, and Warsangli, the Habr Yunis were much more powerful than these clans this conflicted resulted in the Habar Yunis looting Dhulbhante territory taking camels and land. The Dhulbahante put up no resistance, and feared the Habr Gerhajis (Habr Yunis) so much so that they didn\u2019t even avenge their casualties and instead intermarried with the Habr Yunis. The Ismail Arreh clan which were part of the Habr Yunis expanded from Berbera to Gulay, whilst the Muse Arreh Expanded far in to Warsangli Territory, and served as a border between the Habr Yunis and Majeerteen (Majeerteen Sultanate). Hersi is one of the most notable sultans and was a great king that penetrated far into Ogaden (Darood). Hersi influenced Zeila which were ran by the Gadabuursi,and Habar Awal sultanates. .", "start_char_pos": 2239, "end_char_pos": 2239}, {"type": "A", "before": null, "after": "Reer Samatar (Gadabuursi War) German explorer Felix Rosen who visited British Somaliland and Ethiopian Empire in 1907 met and discussed with the Somalis in the area and was told about Hersi and other legendary figures who had died in the decades prior. One such story was the battle between Sultan Hersi", "start_char_pos": 2240, "end_char_pos": 2240}, {"type": "A", "before": null, "after": "the famed warrior Kirh of the Rer Samatar subclan. Sultan Hersi's powerful section of Rer Ammaan had been raided by Kirh and his Rer Samatar. Given the fierce reputation of their target, Kirh's companions were uneasy and fled after the raid, leaving Kirh for dead. His wife began to mourn alongside his kinsmen but to everyone's surprise, Kirh had survived the wilderness and emerged with 100 camels he had captured. This feat impressed Hersi and there was no attempt to recover the lost stock.", "start_char_pos": 2242, "end_char_pos": 2242}, {"type": "A", "before": null, "after": "Kirh recited a boastful gabay O yalahe hoi, o yalahe hoi, yalahe My, our lore of death has spread through all tribes near and far And we felt so safe that we spurned the camels with the lance to prick our mark of possession Let the animals move slowly so that the camel fillings do not become tired At the time when the cowards among our companions took flight and the hiding places Then the lion's mane grew around our shoulders My wife! little was our Seriba; I have filled ten Serbs for you Come, now fill the milk baskets; we have plundered the tribe of AmmanWhen fighting would eventually resume, Hersi called out inquiring where Kirh was in the heat of battle. In response, a spear flew and grazed the Sultan's head. Hersi grabbed the spear which Kirh had thrown and returned the favour piercing through Kirh's famed horse and embedding deep in Kirh. He would escape the battlefield despite the wound leaving Hersi and the Rer Ammaan victorious having killing one", "start_char_pos": 2243, "end_char_pos": 2243}, {"type": "A", "before": null, "after": "capturing another man named Hashi.", "start_char_pos": 2245, "end_char_pos": 2245}, {"type": "A", "before": null, "after": "Hersi now answered the previous gabay and mocked his opponent How Kirh first bragged so much - now his speeches are silent! Once the Samatar tribe was large and rich, now it is small and become poor Now their caravans are afraid, even a day's march from Amud to go so far! We killed one of their men, we caught one of them, and one we drove the lance through the body Tell us, according to the truth, O Hashi! About which of the three you mourn the most that we like from your tribe?Hashi having being challenged by the Sultan spoke That you killed one of our men was by fate Predestined that you captured me does no harm But no mother has ever given birth to a hero like KirhHersi being moved by these words spared Hashi from the usual deadly fate of a captive instead giving him a fine horse and sent medicines", "start_char_pos": 2246, "end_char_pos": 2246}, {"type": "A", "before": null, "after": "gifts with Hashi to deliver to Kirh. Kirh would return the favour finally reconciling the feud.", "start_char_pos": 2248, "end_char_pos": 2248}, {"type": "R", "before": "The Sultan Hersi himself would be killed in battle after some early clashes and later his commander", "after": "War continued with the Rer Sugeleh and the Ba Awal, one of the Ba Awal warriors Warsame attacked the Rer Sugeleh and killed three men, he also captured a respected young noblemen named Jama Amume Jama was the grandson of Deria Sugulleh Ainashe. Due to his Nobility he was released, later Jama then led a battle against the Ba Awal, Jama severely wounded Warsame. He then praised his horse Hamar who had performed well, and recited the following poem. Rendiconti by Reale Accademia dei Lincei; Reale Osservatorio del Campidoglio published 1885. Page 227-228.Col aloosan Xamarow haddii xalay la ugaanshay Heensaha hadddaan kugu itibay goor aleyl dhexe ah Indhaalaha haddaan kuu xidh-xidhay suuman la adkeeyay Isha bari hadii loo kiciyo awrtii reer Sugule Kuwii lays aqoon jiray haddii lagu ogaan duulay Abaanduule Guuleed (Guled Haji) hadii ubaxa loo gooyay Waa boqor agtiisa'e hadday \"ililidii\" yeedh'dhay Usha Daba-xidh ooddiyo haddii laysu wada giijay Eebada haddii laysku riday ilig-jartii hooto Abdikayba intii hore hadaan dabo adeegaayay Kolku ina qolyaeedkii sidii aarka nagu qayshay Anigoo aqoon jirin haddii lay ogeysiiyay Onkad baxay la moodyow kolkan amarka qaadsiiyay Doc aroorka uguma tago orodka saydhshaaye Oogada hadduu igala maray agabarkuu joogo Anna Awlaxaan siday haddaan oofta midig gooyay Kol haddaan Warsame aayiroon Baho agoonteeyay Kol haddaan ugaaskii ka dilay u ololiyeynaayay Kol hadaan ka oon baxay afku aramigu jiifay Alxamdu lilaa Eebaw haddaan umalkii qaar reebayHersi died in that battle and later", "start_char_pos": 2984, "end_char_pos": 3083}, {"type": "R", "before": "Sultan Nur continued", "after": "Early encounters with Britain started in 1882 duirng which was during the time of Sultan Nur. During his time the British had invaded Yemeni islands, and had a interest for the Habr Yunis and the Isaaq Sultanate due to their rich ports the British would establish them self\u2019s in Berbera the Capital of the HabarAwal.Under the flag: and Somali coast stories by Walsh, Langton Prendergast. p. 243,Somali Coast administration Report of the protectorate 1892\u20131893, Bombay Castle, NAY, New Delhi After establishing a base in Somaliland the British would proceed to attack the Dervish on neighbouring cities such as Taleh. Sultan Nur continued the Dervish Campaign", "start_char_pos": 6950, "end_char_pos": 6970}, {"type": "R", "before": "Hersi the more established and powerful of the two eventually would become the uncontested Sultan as Dolal died prematurely in 1917 and left no heirs", "after": "who was much more powerful often raided the Ba Awal domain. Later Sultan Dolal Nur died prematurely and was left with no ai Rs however his cousin Jama Hersi succeeded him", "start_char_pos": 7417, "end_char_pos": 7566}, {"type": "A", "before": null, "after": "Cosmos: communicazioni sui progressi recenti e notevoli della geografia e delle scienze affini di Guido Cora p. 201", "start_char_pos": 7622, "end_char_pos": 7622}, {"type": "R", "before": "eight rulers throughout its", "after": "8 rulers throughout it's", "start_char_pos": 11496, "end_char_pos": 11523}], "sents_char_pos": [0, 234, 614, 810, 971, 1272, 1343, 1744, 1913, 1998, 2180, 2478, 2633, 2760, 2908, 2983, 3108, 3294, 3335, 3386, 3516, 3823, 3990, 4271, 4423, 4516, 4657, 4954, 5087, 5143, 5267, 5502, 5800, 6059, 6283, 6552, 6617, 6743, 6911, 7189, 7217, 7621, 7831, 8154, 8334, 8424, 8505, 8630, 8781, 8958, 8983, 9039, 9206, 9247, 9387, 9604, 9810, 9985, 10125, 10185, 10415, 10690, 10776, 10886, 10944, 11048, 11397, 11455, 11656, 11817, 12256, 12446, 12541]}
+{"doc_id": "67211775", "revision_depth": "1", "before_revision": "Al-Ahsa, Saudi Arabia Aregua, Paraguay Aswan, Egypt Ayacucho, Peru Baguio City, Philippines Ballarat, Australia Bamiyan, Afghanistan Bandar Abbas, Iran Barcelos, Portugal Biella, Italy Cairo, Egypt Caldas da Rainha, Portugal Carrara, Italy Chiang Mai, Thailand Chordeleg, Ecuador Dur\u00e1n, Ecuador Gabrovo, Bulgaria Hangzhou, China Icheon, South Korea Isfahan, Iran Jacmel, Haiti Jaipur, India Jingdezhen, China Jinju, South Korea Joao Pessoa, Brazil Kanazawa, Japan Kargopol, Russia K\u00fctahya, Turkey Limoges, France Lumbumbashi, Democratic Republic of the Congo Madaba, Jordan Nassau, Bahamas Ouagadougou, Burkina Faso Paducah, Kentucky, United States Pekalongan, Indonesia Porto-Novo, Benin San Cristobal de las Casas, Mexico Santa Fe, New Mexico, United States Sharjah, United Arab Emirates Sokod\u00e9, Togo Sukhothai, Thailand Suzhou, China Tamba-Sasayama, Japan Tetouan, Morocco Trinidad, Cuba Tunis, Tunisia", "after_revision": "Al-Ahsa, Saudi Arabia Aregua, Paraguay Aswan, Egypt Ayacucho, Peru Baguio City, Philippines , for its varied traditions in weaving, woodcarving, silver crafting, and tattooing and tattoo art. Ballarat, Australia , for its historical and modern reputation as a melting pot for various forms and traditions of Indigenous Australian art. Bamiyan, Afghanistan , for its unique history of crafts influenced by Muslim and Buddhist cultures that are still practiced in the area today. Bandar Abbas, Iran Barcelos, Portugal Biella, Italy Cairo, Egypt Caldas da Rainha, Portugal Carrara, Italy , for its world-renowned white marble that has influenced Carrara's development as a center of crafts in Tuscany and in Italy. Chiang Mai, Thailand , for its history as a trade center and a region of cultural diversity that has influenced a craft culture of pottery, silverwork, woodcarving, silk embroidery, and lacquerware. Chordeleg, Ecuador , for its unique precious metal work, footwear manufacturing, pottery, and toquilla straw weaving that has been passed down through generations through oral tradition. Dur\u00e1n, Ecuador , for its long history of syncretism between urban art and murals and traditional Ecuadorian art and craft. Fabriano, Italy, for its status as a center for crafts such as pottery, weaving, blacksmithing, and paper making since the 12th century. Gabrovo, Bulgaria Hangzhou, China Icheon, South Korea , for its historical and modern status as the center of Korea's ceramic and pottery crafting. Isfahan, Iran Jacmel, Haiti Jaipur, India , for its historical crafts of jewelry making, carving, and painting that have been a center of trade since the early 18th century, with 53,500 workshops practicing these crafts today. Jingdezhen, China Jinju, South Korea Joao Pessoa, Brazil Kanazawa, Japan Kargopol, Russia , for its traditional textile embroidery, artisanal wood and bark carving, and clay-fired colored figures known as Kargopol toys, all of which form the most important sector of the city's economy today. K\u00fctahya, Turkey Limoges, France Lumbumbashi, Democratic Republic of the Congo , for the unique copper and malachite crafts created in the city, with over 50 workshops dedicated to malachite carving. Madaba, Jordan , for the largest number of mosaics discovered in their original location in the world, including its Byzantine and Umayyad mosaics and the oldest-surviving description of the Holy Land. Nassau, Bahamas , for the Bahamian cultural and creative traditions of straw weaving and Junkanoo craftmaking formed from a blend of Indigenous and African cultural traditions. Ouagadougou, Burkina Faso , for its traditional craft of bronze and copper casting and crafting that forms a major sector of the city's economy even today. Paducah, Kentucky, United States , for its history and contributions to the craft of quilt making in the United States. Pekalongan, Indonesia , for the cultural history and importance of Batik crafts and cloths to the city and its identity. Porto-Novo, Benin , for the history and unique practice of various crafts such as wickerwork, blacksmithing, pottery, and manufacturing of musical instruments in the city, with 42 historical craft guilds in the city. San Cristobal de las Casas, Mexico , for its preservation of Indigenous Mexican crafts and arts such as embroidery, pottery, blacksmithing, woodcarving, and amber craftmaking. Santa Fe, New Mexico, United States , for its Native American crafts of jewelry, pottery, and weaving and the trade fairs in these crafts that have become an integral part of the city's identity. Sharjah, United Arab Emirates Sheki, Azerbaijan, for its status as the center of silk production and textiles in the Caucasus, as well as other traditional crafts such as wood-framed stained glass and pottery. Sokod\u00e9, Togo Sukhothai, Thailand , for its culturally important artisanal products of gold and silver ornaments, textile weaving, and ceramic and Sangkhalok wares. Suzhou, China , for its history and culture of crafts in embroidery, carving, papermaking, painting, printing, and calligraphy. Tamba-Sasayama, Japan Tetouan, Morocco Trinidad, Cuba Tunis, Tunisia", "edit_actions": [{"type": "A", "before": null, "after": ", for its varied traditions in weaving, woodcarving, silver crafting, and tattooing and tattoo art.", "start_char_pos": 92, "end_char_pos": 92}, {"type": "A", "before": null, "after": ", for its historical and modern reputation as a melting pot for various forms and traditions of Indigenous Australian art.", "start_char_pos": 113, "end_char_pos": 113}, {"type": "A", "before": null, "after": ", for its unique history of crafts influenced by Muslim and Buddhist cultures that are still practiced in the area today.", "start_char_pos": 135, "end_char_pos": 135}, {"type": "A", "before": null, "after": ", for its world-renowned white marble that has influenced Carrara's development as a center of crafts in Tuscany and in Italy.", "start_char_pos": 243, "end_char_pos": 243}, {"type": "A", "before": null, "after": ", for its history as a trade center and a region of cultural diversity that has influenced a craft culture of pottery, silverwork, woodcarving, silk embroidery, and lacquerware.", "start_char_pos": 265, "end_char_pos": 265}, {"type": "A", "before": null, "after": ", for its unique precious metal work, footwear manufacturing, pottery, and toquilla straw weaving that has been passed down through generations through oral tradition.", "start_char_pos": 285, "end_char_pos": 285}, {"type": "A", "before": null, "after": ", for its long history of syncretism between urban art and murals and traditional Ecuadorian art and craft. Fabriano, Italy, for its status as a center for crafts such as pottery, weaving, blacksmithing, and paper making since the 12th century.", "start_char_pos": 301, "end_char_pos": 301}, {"type": "A", "before": null, "after": ", for its historical and modern status as the center of Korea's ceramic and pottery crafting.", "start_char_pos": 356, "end_char_pos": 356}, {"type": "A", "before": null, "after": ", for its historical crafts of jewelry making, carving, and painting that have been a center of trade since the early 18th century, with 53,500 workshops practicing these crafts today.", "start_char_pos": 399, "end_char_pos": 399}, {"type": "A", "before": null, "after": ", for its traditional textile embroidery, artisanal wood and bark carving, and clay-fired colored figures known as Kargopol toys, all of which form the most important sector of the city's economy today.", "start_char_pos": 490, "end_char_pos": 490}, {"type": "A", "before": null, "after": ", for the unique copper and malachite crafts created in the city, with over 50 workshops dedicated to malachite carving.", "start_char_pos": 569, "end_char_pos": 569}, {"type": "A", "before": null, "after": ", for the largest number of mosaics discovered in their original location in the world, including its Byzantine and Umayyad mosaics and the oldest-surviving description of the Holy Land.", "start_char_pos": 585, "end_char_pos": 585}, {"type": "A", "before": null, "after": ", for the Bahamian cultural and creative traditions of straw weaving and Junkanoo craftmaking formed from a blend of Indigenous and African cultural traditions.", "start_char_pos": 602, "end_char_pos": 602}, {"type": "A", "before": null, "after": ", for its traditional craft of bronze and copper casting and crafting that forms a major sector of the city's economy even today.", "start_char_pos": 629, "end_char_pos": 629}, {"type": "A", "before": null, "after": ", for its history and contributions to the craft of quilt making in the United States.", "start_char_pos": 663, "end_char_pos": 663}, {"type": "A", "before": null, "after": ", for the cultural history and importance of Batik crafts and cloths to the city and its identity.", "start_char_pos": 686, "end_char_pos": 686}, {"type": "A", "before": null, "after": ", for the history and unique practice of various crafts such as wickerwork, blacksmithing, pottery, and manufacturing of musical instruments in the city, with 42 historical craft guilds in the city.", "start_char_pos": 705, "end_char_pos": 705}, {"type": "A", "before": null, "after": ", for its preservation of Indigenous Mexican crafts and arts such as embroidery, pottery, blacksmithing, woodcarving, and amber craftmaking.", "start_char_pos": 741, "end_char_pos": 741}, {"type": "A", "before": null, "after": ", for its Native American crafts of jewelry, pottery, and weaving and the trade fairs in these crafts that have become an integral part of the city's identity.", "start_char_pos": 778, "end_char_pos": 778}, {"type": "A", "before": null, "after": "Sheki, Azerbaijan, for its status as the center of silk production and textiles in the Caucasus, as well as other traditional crafts such as wood-framed stained glass and pottery.", "start_char_pos": 809, "end_char_pos": 809}, {"type": "A", "before": null, "after": ", for its culturally important artisanal products of gold and silver ornaments, textile weaving, and ceramic and Sangkhalok wares.", "start_char_pos": 843, "end_char_pos": 843}, {"type": "A", "before": null, "after": ", for its history and culture of crafts in embroidery, carving, papermaking, painting, printing, and calligraphy.", "start_char_pos": 858, "end_char_pos": 858}], "sents_char_pos": [0, 29, 45, 61, 79, 102, 122, 149, 164, 181, 194, 218, 236, 255, 276, 292, 310, 329, 343, 365, 378, 392, 411, 424, 449]}
+{"doc_id": "67554315", "revision_depth": "1", "before_revision": "Kazakh rebellions are events and actions in the history of Kazakhstan in which the Kazakh people engaged in civil disobedience or armed resistance to state power. National uprisings of Kazakhs in the 18th-19th centuries among Kazakh historians are commonly referred to as national liberation uprisings. Kazakh participation in the peasant war of 1773\u20131775 The first joint action of Kazakh and Russian people against autocracy was the active participation of Kazakhs in the Peasant war in 1773-1775. The main reason for the Kazakhs' participation in the Peasant War of 1773-1775. The main reason for Kazakhs participation in the Peasant War of 1773-1775 was the land issue. In 1742 Nuraly Khan under pressure from the people demanded from the government to remove the restrictions on grazing along the Ural River, but the Russian government refused to meet this demand. In the second half of the XVIII century, the Kazakhs of Junior zhuz suffered from the Russian colonial policy to a greater extent. The discontent of the Kazakhs of Junior zhuz was caused by the aggressive actions of the Yaitskiy Cossack Army. In 1756 the Imperialist government, protecting the interests of the Cossack troops, prohibited the Cossacks to nomadize on the right bank of the Urals. During the peasant war led by Pugachev, the famous biy Dautbai urged the Kazakhs to actively support the rebels. Kazakh detachments in the Peasant War in 1773-1775 were united on tribal grounds. One of the leaders of the insurgent units in the Peasant War led by Pugachev was a Kazakh batyr Syrym Datuly. Supporting the rebellion led by Pugachev, the Kazakh troops were the main striking force in the capture of the Kulagin fortress. The revolt of the Kazakhs of Junior zhuz led by Syrym Datuly occurred in 1783\u20131797. One of the causes of the revolt of the Kazakhs of Junior zhuz in 1783-1797 , led by Syrym Datuly, was the outrages of Cossacks. In 1778 during one of the armed clashes with the Cossack detachments were killed children of Syrym Datuly. During the uprising of 1783\u20131797, Baron Igelstrom, governor of Orenburg, proposed a new system of governance of the Junior zhuz. According to Igelstrom's plan, all power in the Junior zhuz was concentrated in the hands of the Frontier Court. During the uprising, the inconsistency of Datuly manifested itself in the fact that he, against the Khan's grouping, supported the reform project of Igelstrom. The Russian government refused to carry out the reforms of Igelstrom in the Junior Juz because of the growing anti-monarchist sentiment in Russia. During the uprising of Kazakhs in 1783\u20131797 years punitive detachments, unable to conduct military operations against guerrilla units of the rebels, attacked peaceful Kazakh villages. In order to deprive the rebels of the support of auls, the head of the military board ordered to push \"Kirghiz-Kaisak bandits\" to the Emba river. In 1797 the Orenburg administration, hoping to win the favor of S. Datuly, did not include a representative of the Nuraly Khan family in the Khan Council. The main result of the rebellion led by Batyr Syrym should be considered a decision of the government of March 11 , 1801, which allowed the Kazakhs to be nomadic on the right bank of the Urals. The rebellion of 1783-1797 was of great historical significance and showed that tribal antagonisms are unacceptable and dangerous in the organization of popular uprisings. In 1797, avoiding persecution by the supporters of Sultan, S. Datuly left with his cronies for the Khiva borders. 1833\u20131836 \u2013 the formation of the main prerequisites of the uprising; 1837 \u2013 development of the uprising, the clash of the rebels with the Tsarist punitive detachments and subordinates of Zhangir Khan; 3 December 1837 \u2013 July 1838 - Weakening of the rebellion and defeat of the uprising. The events at the end of 1836 in Bukeyev Horde became known in St Petersburg. Nicholai I demanded that the leaders of the rebellion be severely punished. To coordinate the suppression of rebellion Orenburg governor V. Perovsky appointed Lieutenant Colonel Geke, assigning him additional military forces. On October 15 , 1837, not far from the Terekti-Kum area Isatay and Makhambet units have crushed the aul of bey Balky Kudaibergenuly, the approximate of Zhangir khan. At the end of October 1837 the rebels, numbering 2,000 men, laid siege to the khan's residence. The defeat of Isatay's troops on November 15 , 1837, at the battle of Tastobe, influenced the further course of the revolt. The number of rebels was reduced. For this battle, Geke was promoted to the rank of Colonel. Punishment of auls that supported the rebels could cause a general resentment in Bukey Horde, so at the suggestion of lieutenant colonel Geke they were forgiven, and cattle seized from the rebels was distributed among sultans and feudal lords of Zhangir Khan. The rebellion was weakened. The royal administration promised 1,000 roubles for the capture of Isatai and 500 roubles for his head. Having failed to achieve their objective, Gheke's detachment returned to the Kulagin fortress. On December 13 , 1837, having broken through the barrier line near Zhamankala fortress, Isatai went to the territory of Junior Juz, which coincided in time with sharua movement caused by Kenesary Kasymov's rebellion. Kenesary's units found support among the kypshak, argyn, then zhagalbayly and tabyn tribes who were roaming in the Turgai area. Kenesary was joined by detachments of Zholaman Tlenshiev on the banks of the Ilek. In January 1838 Isatay's detachment approached Lake Shoshkakol and the Mountain Fortress, posing a threat to the Ural military line. The rebellion led by Sultan Kenesary Kasymuly took place in 1837-1847. The rebellion had a national liberation character. The insurrection of 1837-1847 was mainly aimed at preserving the independence of the provinces, which were not independent. -It was aimed at preserving the independence of the lands that were not part of Russia. The rebellion led by Kenesary Kasymuly aimed not only to stop the colonization of the Kazakh lands by imperialist Russia but also to free the Kazakhs of the southern regions from under the rule of the Kokand. The Kazakhs of three juzes actively participated in the rebellion of 1837-1847 under the leadership of Kenesary. Batyr Nauryzbai, Kenesary's younger brother and his staunch associate was the leader of the detachments during the uprising. In May 1838 Sultan Kenesary's detachments captured the Akmola fortress. In July 1844 the rebels led by Kenesary defeated the punitive detachment of Sultan Zhantoreuly. Successful military action by Kenesary in 1844 forced the Orenburg administration to begin negotiations with him. To leave Kazakhstan in its former position - these were the demands of the royal ambassadors to Kenesary during the uprising of 1837-1847. The main condition for the forgiveness of the rebels in 1837-1847 was the recognition of the Orenburg region as part of Russia. To combat the rebels led by Kenesary, the tsarist government urgently erected fortresses along the Yrgyz and Torgai rivers. After taking the khan's power into his own hands in 1841, Kenesary eradicated internecine quarrels, barimta (cattle raiding), introduced changes in military affairs - formation of volunteer detachments. The largest rebellion of the first half of the XIX century against the Russian colonial oppression - an uprising led by K. Kasymov was defeated. The political disunity of the Kazakhs was the main reason for the defeat of the 1837-1847 revolt led by Kenesary Kasymov. Kenesary Kasymov fought against Bukhara and Kokand, but failed to form a coalition against Tsarist Russia. During the uprising of 1837 - 1847 the leaders of the main clans of Zhetisu inclined towards URL Struggle of the Kazakh people in 1860\u20131870s In the second half of XIX century colonial dependence of the Kazakh steppe was strengthened by reforms of 1867-1868. Under the reforms of 1867 - 1868 Kazakh lands were declared as state property of the Russian Empire. The Adai tribe rebelled against the reforms of 1867\u20131868 in the territory of Mangistau in 1870. In 1870 the defeat of Rukin's detachment served as a signal to start the liberation movement in Mangistau against the reforms of 1867-1868. One of the specific features of the uprising in the territory of Mangistau in 1870 was that for the first time Kazakh hired workers took part in the movement.", "after_revision": "Kazakh rebellions are events and actions in the history of Kazakhstan in which the Kazakh people engaged in civil disobedience or armed resistance to state power. National uprisings of Kazakhs in the 18th\u201319th centuries among Kazakh historians are commonly referred to as national liberation uprisings. Kazakh participation in the peasant war of 1773\u20131775 The first joint action of Kazakh and Russian people against autocracy was the active participation of Kazakhs in the Peasant war in 1773\u20131775. The main reason for the Kazakhs' participation in the Peasant War of 1773\u20131775. The main reason for Kazakhs participation in the Peasant War of 1773\u20131775 was the land issue. In 1742 Nuraly Khan under pressure from the people demanded from the government to remove the restrictions on grazing along the Ural River, but the Russian government refused to meet this demand. In the second half of the 18th century, the Kazakhs of Junior zhuz suffered from the Russian colonial policy to a greater extent. The discontent of the Kazakhs of Junior zhuz was caused by the aggressive actions of the Yaitskiy Cossack Army. In 1756 the Imperialist government, protecting the interests of the Cossack troops, prohibited the Cossacks to nomadize on the right bank of the Urals. During the peasant war led by Pugachev, the famous biy Dautbai urged the Kazakhs to actively support the rebels. Kazakh detachments in the Peasant War in 1773\u20131775 were united on tribal grounds. One of the leaders of the insurgent units in the Peasant War led by Pugachev was a Kazakh batyr Syrym Datuly. Supporting the rebellion led by Pugachev, the Kazakh troops were the main striking force in the capture of the Kulagin fortress. The revolt of the Kazakhs of Junior zhuz led by Syrym Datuly occurred in 1783\u20131797. One of the causes of the revolt of the Kazakhs of Junior zhuz in 1783\u20131797 , led by Syrym Datuly, was the outrages of Cossacks. In 1778 during one of the armed clashes with the Cossack detachments were killed children of Syrym Datuly. During the uprising of 1783\u20131797, Baron Igelstrom, governor of Orenburg, proposed a new system of governance of the Junior zhuz. According to Igelstrom's plan, all power in the Junior zhuz was concentrated in the hands of the Frontier Court. During the uprising, the inconsistency of Datuly manifested itself in the fact that he, against the Khan's grouping, supported the reform project of Igelstrom. The Russian government refused to carry out the reforms of Igelstrom in the Junior juz because of the growing anti-monarchist sentiment in Russia. During the uprising of Kazakhs in 1783\u20131797 years punitive detachments, unable to conduct military operations against guerrilla units of the rebels, attacked peaceful Kazakh villages. To deprive the rebels of the support of auls, the head of the military board ordered to push \"Kirghiz-Kaisak bandits\" to the Emba river. In 1797 the Orenburg administration, hoping to win the favor of S. Datuly, did not include a representative of the Nuraly Khan family in the Khan Council. The main result of the rebellion led by Batyr Syrym should be considered a decision of the government of 11 March 1801, which allowed the Kazakhs to be nomadic on the right bank of the Urals. The rebellion of 1783\u20131797 was of great historical significance and showed that tribal antagonisms are unacceptable and dangerous in the organization of popular uprisings. In 1797, avoiding persecution by the supporters of Sultan, S. Datuly left with his cronies for the Khiva borders. 1833\u20131836 \u2013 the formation of the main prerequisites of the uprising; 1837 \u2013 development of the uprising, the clash of the rebels with the Tsarist punitive detachments and subordinates of Zhangir Khan; 3 December 1837 \u2013 July 1838 \u2013 Weakening of the rebellion and defeat of the uprising. The events at the end of 1836 in Bukeyev Horde became known in St Petersburg. Nicholai I demanded that the leaders of the rebellion be severely punished. To coordinate the suppression of rebellion Orenburg governor V. Perovsky appointed Lieutenant Colonel Geke, assigning him additional military forces. On 15 October 1837, not far from the Terekti-Kum area Isatay and Makhambet units have crushed the aul of bey Balky Kudaibergenuly, the approximate of Zhangir khan. At the end of October 1837 the rebels, numbering 2,000 men, laid siege to the khan's residence. The defeat of Isatay's troops on 15 November 1837, at the battle of Tastobe, influenced the further course of the revolt. The number of rebels was reduced. For this battle, Geke was promoted to the rank of Colonel. Punishment of auls that supported the rebels could cause a general resentment in Bukey Horde, so at the suggestion of lieutenant colonel Geke they were forgiven, and cattle seized from the rebels was distributed among sultans and feudal lords of Zhangir Khan. The rebellion was weakened. The royal administration promised 1,000 roubles for the capture of Isatai and 500 roubles for his head. Having failed to achieve their objective, Gheke's detachment returned to the Kulagin fortress. On 13 December 1837, having broken through the barrier line near Zhamankala fortress, Isatai went to the territory of Junior Juz, which coincided in time with sharua movement caused by Kenesary Kasymov's rebellion. Kenesary's units found support among the kypshak, argyn, then zhagalbayly and tabyn tribes who were roaming in the Turgai area. Kenesary was joined by detachments of Zholaman Tlenshiev on the banks of the Ilek. In January 1838 Isatay's detachment approached Lake Shoshkakol and the Mountain Fortress, posing a threat to the Ural military line. The rebellion led by Sultan Kenesary Kasymuly took place in 1837\u20131847. The rebellion had a national liberation character. The insurrection of 1837\u20131847 was mainly aimed at preserving the independence of the provinces, which were not independent. -It was aimed at preserving the independence of the lands that were not part of Russia. The rebellion led by Kenesary Kasymuly aimed not only to stop the colonization of the Kazakh lands by imperialist Russia but also to free the Kazakhs of the southern regions from under the rule of the Kokand. The Kazakhs of three juzes actively participated in the rebellion of 1837\u20131847 under the leadership of Kenesary. Batyr Nauryzbai, Kenesary's younger brother and his staunch associate was the leader of the detachments during the uprising. In May 1838 Sultan Kenesary's detachments captured the Akmola fortress. In July 1844 the rebels led by Kenesary defeated the punitive detachment of Sultan Zhantoreuly. Successful military action by Kenesary in 1844 forced the Orenburg administration to begin negotiations with him. To leave Kazakhstan in its former position \u2013 these were the demands of the royal ambassadors to Kenesary during the uprising of 1837\u20131847. The main condition for the forgiveness of the rebels in 1837\u20131847 was the recognition of the Orenburg region as part of Russia. To combat the rebels led by Kenesary, the tsarist government urgently erected fortresses along the Yrgyz and Torgai rivers. After taking the khan's power into his own hands in 1841, Kenesary eradicated internecine quarrels, barimta (cattle raiding), introduced changes in military affairs \u2013 formation of volunteer detachments. The largest rebellion of the first half of the XIX century against the Russian colonial oppression \u2013 an uprising led by K. Kasymov was defeated. The political disunity of the Kazakhs was the main reason for the defeat of the 1837\u20131847 revolt led by Kenesary Kasymov. Kenesary Kasymov fought against Bukhara and Kokand, but failed to form a coalition against Tsarist Russia. During the uprising of 1837 \u2013 1847 the leaders of the main clans of Zhetisu inclined towards URL Struggle of the Kazakh people in 1860\u20131870s In the second half of XIX century colonial dependence of the Kazakh steppe was strengthened by reforms of 1867\u20131868. Under the reforms of 1867 \u2013 1868 Kazakh lands were declared as state property of the Russian Empire. The Adai tribe rebelled against the reforms of 1867\u20131868 in the territory of Mangistau in 1870. In 1870 the defeat of Rukin's detachment served as a signal to start the liberation movement in Mangistau against the reforms of 1867\u20131868. One of the specific features of the uprising in the territory of Mangistau in 1870 was that for the first time Kazakh hired workers took part in the movement.", "edit_actions": [{"type": "R", "before": "18th-19th", "after": "18th\u201319th", "start_char_pos": 200, "end_char_pos": 209}, {"type": "R", "before": "1773-1775.", "after": "1773\u20131775.", "start_char_pos": 488, "end_char_pos": 498}, {"type": "R", "before": "1773-1775.", "after": "1773\u20131775.", "start_char_pos": 568, "end_char_pos": 578}, {"type": "R", "before": "1773-1775", "after": "1773\u20131775", "start_char_pos": 643, "end_char_pos": 652}, {"type": "R", "before": "XVIII", "after": "18th", "start_char_pos": 895, "end_char_pos": 900}, {"type": "R", "before": "1773-1775", "after": "1773\u20131775", "start_char_pos": 1418, "end_char_pos": 1427}, {"type": "R", "before": "1783-1797", "after": "1783\u20131797", "start_char_pos": 1847, "end_char_pos": 1856}, {"type": "R", "before": "Juz", "after": "juz", "start_char_pos": 2502, "end_char_pos": 2505}, {"type": "R", "before": "In order to", "after": "To", "start_char_pos": 2750, "end_char_pos": 2761}, {"type": "D", "before": "March", "after": null, "start_char_pos": 3156, "end_char_pos": 3161}, {"type": "R", "before": ",", "after": "March", "start_char_pos": 3165, "end_char_pos": 3166}, {"type": "R", "before": "1783-1797", "after": "1783\u20131797", "start_char_pos": 3262, "end_char_pos": 3271}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 3760, "end_char_pos": 3761}, {"type": "D", "before": "October", "after": null, "start_char_pos": 4124, "end_char_pos": 4131}, {"type": "R", "before": ",", "after": "October", "start_char_pos": 4135, "end_char_pos": 4136}, {"type": "D", "before": "November", "after": null, "start_char_pos": 4416, "end_char_pos": 4424}, {"type": "R", "before": ",", "after": "November", "start_char_pos": 4428, "end_char_pos": 4429}, {"type": "D", "before": "December", "after": null, "start_char_pos": 5090, "end_char_pos": 5098}, {"type": "R", "before": ",", "after": "December", "start_char_pos": 5102, "end_char_pos": 5103}, {"type": "R", "before": "1837-1847.", "after": "1837\u20131847.", "start_char_pos": 5708, "end_char_pos": 5718}, {"type": "R", "before": "1837-1847", "after": "1837\u20131847", "start_char_pos": 5790, "end_char_pos": 5799}, {"type": "R", "before": "1837-1847", "after": "1837\u20131847", "start_char_pos": 6260, "end_char_pos": 6269}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 6754, "end_char_pos": 6755}, {"type": "R", "before": "1837-1847.", "after": "1837\u20131847.", "start_char_pos": 6839, "end_char_pos": 6849}, {"type": "R", "before": "1837-1847", "after": "1837\u20131847", "start_char_pos": 6906, "end_char_pos": 6915}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 7267, "end_char_pos": 7268}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 7404, "end_char_pos": 7405}, {"type": "R", "before": "1837-1847", "after": "1837\u20131847", "start_char_pos": 7530, "end_char_pos": 7539}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 7707, "end_char_pos": 7708}, {"type": "R", "before": "1867-1868.", "after": "1867\u20131868.", "start_char_pos": 7926, "end_char_pos": 7936}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 7963, "end_char_pos": 7964}, {"type": "R", "before": "1867-1868.", "after": "1867\u20131868.", "start_char_pos": 8263, "end_char_pos": 8273}], "sents_char_pos": [0, 162, 302, 498, 578, 672, 868, 999, 1111, 1263, 1376, 1458, 1568, 1697, 1781, 1909, 2016, 2145, 2258, 2418, 2565, 2749, 2895, 3050, 3244, 3416, 3599, 3731, 3816, 3894, 3970, 4120, 4286, 4382, 4506, 4540, 4599, 4859, 4887, 4991, 5086, 5303, 5431, 5514, 5647, 5718, 5769, 5981, 6190, 6303, 6428, 6500, 6596, 6710, 6849, 6977, 7101, 7304, 7449, 7678, 7936, 8037, 8133, 8273]}
+{"doc_id": "67654308", "revision_depth": "1", "before_revision": "where is the zonal velocity ( direction), the meriodional velocity ( direction), is time and is the coriolis frequency. 620x620px|Figure 2: A traveling Kelvin wave is shown for the Northern hemisphere without friction, the coast is always at the right of the direction of motion. The domain is closed on the right hand side, to mimic an enclosed shelf sea. The wave enters the domain on the lower left hand side and travels towards the right. On the right hand side the wave is reflected and travels back towards the left. On the closed side the reflection happens through the creation of Poincare waves which are not modeled here. The upper panel shows the sea surface height and the lower panel the velocity. The colors are indicated in the color bar, the arrows are scaled velocity vectors. Both of these equations take the form of the classical wave equation, where . Which is the same velocity as the tidal wave and thus of a shallow water wave. These preceding equations govern the dynamics of a one-dimensional non-dispersive wave, for which the following general solution exist: where length is the Rossby radius of deformation and is an arbitrary function describing the wave motion. In the most simple form is a cosine or sine function which describes a wave motion in the positive and negative direction. The Rossby radius of deformation is a typical length scale in the ocean and atmosphere that indicates when rotational effects become important. The Rossby radius of deformation is a measure for the trapping distance of a coastal Kelvin wave. The exponential term results in an amplitude that decays away from the coast. Therefore this set of equations describes a wave that travels along the coast with a maximum amplitude at the coast which declines towards the ocean. These solutions also indicate that a Kelvin wave always travels with the coast on their right hand side in the Northern Hemisphere and with the coast at their left hand side in the Southern Hemisphere. In the limit of no rotation where , the exponential term increase without a bound and the wave will become a simple gravity wave orientated perpendicular to the coast. In the next section, it will be shown how these Kelvin waves behaves when traveling along a coast, in an enclosed shelf seas or in estuaries and basins. Tides in enclosed shelf seas Figure 3 : A traveling Kelvin wave is shown for the Northern hemisphere with friction, the coast is always at the right of the direction of motion. The domain is closed on the right hand side, to mimic an enclosed shelf sea. The wave enters the domain on the lower left hand side and travels towards the right. On the right hand side the wave is reflected and travels back towards the left. On the closed side the reflection happens through the creation of Poincare waves which are not modeled here. The upper panel shows the sea surface height and the lower panel the velocity. The colors are indicated in the color bar, the arrows are scaled velocity vectors. | 620x620px The expression of tides as a bounded Kelvin wave is well observable in enclosed shelf seas around the world (e.g. the English channel, the North Sea or the Yellow sea). In figure 2, the shape of an enclosed shelf sea is represented as a simple rectangular domain in the Northern Hemisphere which is open on the left hand side and closed on the right hand side. The tidal wave, a Kelvin wave, enters the domain in the lower left corner and travels to the right with the coast on its right. The sea surface height (SSH ), the tidal elevation, is maximum at the coast and decreases towards the center of the domain. The tidal currents ( lower panel of figure 2 ) are in the direction of wave propagation under the crest and in the opposite direction under the through. They are both maximum under the crest and the trough of the waves and decrease towards the center . This was expected as the equations for and are in phase as they both depend on the same arbitrary function describing the wave motion and exponential decay term. On the enclosed right hand side, the Kelvin wave is reflected and because it always travels with the coast on its right, it will now travel in the opposite direction. The energy of the incoming Kelvin wave is transferred through Poincare waves along the enclosed side of the domain to the outgoing Kelvin wave. The final pattern of SSH and the tidal currents are made up of the sum of the two Kelvin waves. These two can amplify each other and this amplification is maximum when the length of the shelf sea is a quarter wavelength of the tidal wave. Next to that, the sum of the two Kelvin waves result in several static minima's in the center of the domain which hardly experience any tidal motion, these are called Amphidromic points. In the real world, the reflected Kelvin wave has a lower amplitude due to energy loss as a result of friction and through the transfer via Poincare waves . Figure 3, shows the Kelvin wave patterns when friction is added. The reflected wave amplitude has decreased and as a result the Amphidromic points shifted towards the top side of the panel .", "after_revision": "where is the zonal velocity ( direction), the meridional velocity ( direction), is time and is the Coriolis frequency. Both of these equations take the form of the classical wave equation, where . Which is the same velocity as the tidal wave and thus of a shallow water wave. These preceding equations govern the dynamics of a one-dimensional non-dispersive wave, for which the following general solution exist: where length is the Rossby radius of deformation and is an arbitrary function describing the wave motion. In the most simple form is a cosine or sine function which describes a wave motion in the positive and negative direction. The Rossby radius of deformation is a typical length scale in the ocean and atmosphere that indicates when rotational effects become important. The Rossby radius of deformation is a measure for the trapping distance of a coastal Kelvin wave. The exponential term results in an amplitude that decays away from the coast. The expression of tides as a bounded Kelvin wave is well observable in enclosed shelf seas around the world (e.g. the English channel, the North Sea or the Yellow sea). Animation 1 shows the behaviour of a simplified case of a Kelvin wave in an enclosed shelf sea for the case with (lower panel) and without friction (upper panel). The shape of an enclosed shelf sea is represented as a simple rectangular domain in the Northern Hemisphere which is open on the left hand side and closed on the right hand side. The tidal wave, a Kelvin wave, enters the domain in the lower left corner and travels to the right with the coast on its right. The sea surface height (SSH, left panels of animation 1), the tidal elevation, is maximum at the coast and decreases towards the centre of the domain. The tidal currents (right panels of animation 1) are in the direction of wave propagation under the crest and in the opposite direction under the through. They are both maximum under the crest and the trough of the waves and decrease towards the centre. This was expected as the equations for and are in phase as they both depend on the same arbitrary function describing the wave motion and exponential decay term. Therefore this set of equations describes a wave that travels along the coast with a maximum amplitude at the coast which declines towards the ocean. These solutions also indicate that a Kelvin wave always travels with the coast on their right hand side in the Northern Hemisphere and with the coast at their left hand side in the Southern Hemisphere. In the limit of no rotation where , the exponential term increase without a bound and the wave will become a simple gravity wave orientated perpendicular to the coast. In the next section, it will be shown how these Kelvin waves behaves when traveling along a coast, in an enclosed shelf seas or in estuaries and basins. Tides in enclosed shelf seas 462x462px|Animation 1 : A traveling Kelvin wave is shown for the Northern hemisphere with (lower panel) and without (upper panel) friction, the coast is always at the right of the direction of motion. The domain is closed on the right hand side, to mimic an enclosed shelf sea. The wave enters the domain on the lower left hand side and travels towards the right. On the right hand side the wave is reflected and travels back towards the left. On the closed side the reflection happens through the creation of Poincare waves which are not modelled here. The panels on the left shows the sea surface height and the panels on the right the velocity. The colours are indicated in the colour bar, the arrows are scaled velocity vectors462x462px | Figure 2: The time averaged sea surface height is shown in red shading and the dashed lines are cotidal lines at intervals of roughly an hour. The Amphidromic points are located at the intersect of all lines. The upper panel shows the case for without friction and the lower panel for the case with frictionThe expression of tides as a bounded Kelvin wave is well observable in enclosed shelf seas around the world (e.g. the English channel, the North Sea or the Yellow sea). Animation 1 shows the behaviour of a simplified case of a Kelvin wave in an enclosed shelf sea for the case with (lower panel) and without friction (upper panel). The shape of an enclosed shelf sea is represented as a simple rectangular domain in the Northern Hemisphere which is open on the left hand side and closed on the right hand side. The tidal wave, a Kelvin wave, enters the domain in the lower left corner and travels to the right with the coast on its right. The sea surface height (SSH , left panels of animation 1 ), the tidal elevation, is maximum at the coast and decreases towards the centre of the domain. The tidal currents ( right panels of animation 1 ) are in the direction of wave propagation under the crest and in the opposite direction under the through. They are both maximum under the crest and the trough of the waves and decrease towards the centre . This was expected as the equations for and are in phase as they both depend on the same arbitrary function describing the wave motion and exponential decay term. On the enclosed right hand side, the Kelvin wave is reflected and because it always travels with the coast on its right, it will now travel in the opposite direction. The energy of the incoming Kelvin wave is transferred through Poincare waves along the enclosed side of the domain to the outgoing Kelvin wave. The final pattern of the SSH and the tidal currents is made up of the sum of the two Kelvin waves. These two can amplify each other and this amplification is maximum when the length of the shelf sea is a quarter wavelength of the tidal wave. Next to that, the sum of the two Kelvin waves result in several static minima's in the centre of the domain which hardly experience any tidal motion, these are called Amphidromic points. In the upper panel of figure 2, the absolute time averaged SSH is shown in red shading and the dotted lines show the zero tidal elevation level at roughly hourly intervals, also known as cotidal lines. Where these lines intersect the tidal elevation is zero during a full tidal period and thus this is the location of the Amphidromic points. In the real world, the reflected Kelvin wave has a lower amplitude due to energy loss as a result of friction and through the transfer via Poincare waves (lower left panel of animation 1). The tidal currents are proportional to the wave amplitude and therefore also decrease on the side of the reflected wave (lower right panel of animation 1). Finally, the static minima's are no longer in the centre of the domain as wave amplitude is no longer symmetric. Therefore, the Amphidromic points shift towards the side of the reflected wave (lower panel figure 2) .", "edit_actions": [{"type": "R", "before": "meriodional", "after": "meridional", "start_char_pos": 46, "end_char_pos": 57}, {"type": "R", "before": "coriolis", "after": "Coriolis", "start_char_pos": 100, "end_char_pos": 108}, {"type": "D", "before": "620x620px|Figure 2: A traveling Kelvin wave is shown for the Northern hemisphere without friction, the coast is always at the right of the direction of motion. The domain is closed on the right hand side, to mimic an enclosed shelf sea. The wave enters the domain on the lower left hand side and travels towards the right. On the right hand side the wave is reflected and travels back towards the left. On the closed side the reflection happens through the creation of Poincare waves which are not modeled here. The upper panel shows the sea surface height and the lower panel the velocity. The colors are indicated in the color bar, the arrows are scaled velocity vectors.", "after": null, "start_char_pos": 120, "end_char_pos": 793}, {"type": "A", "before": null, "after": "The expression of tides as a bounded Kelvin wave is well observable in enclosed shelf seas around the world (e.g. the English channel, the North Sea or the Yellow sea). Animation 1 shows the behaviour of a simplified case of a Kelvin wave in an enclosed shelf sea for the case with (lower panel) and without friction (upper panel). The shape of an enclosed shelf sea is represented as a simple rectangular domain in the Northern Hemisphere which is open on the left hand side and closed on the right hand side. The tidal wave, a Kelvin wave, enters the domain in the lower left corner and travels to the right with the coast on its right. The sea surface height (SSH, left panels of animation 1), the tidal elevation, is maximum at the coast and decreases towards the centre of the domain. The tidal currents (right panels of animation 1) are in the direction of wave propagation under the crest and in the opposite direction under the through. They are both maximum under the crest and the trough of the waves and decrease towards the centre. This was expected as the equations for and are in phase as they both depend on the same arbitrary function describing the wave motion and exponential decay term.", "start_char_pos": 1636, "end_char_pos": 1636}, {"type": "R", "before": "Figure 3", "after": "462x462px|Animation 1", "start_char_pos": 2339, "end_char_pos": 2347}, {"type": "A", "before": null, "after": "(lower panel) and without (upper panel)", "start_char_pos": 2416, "end_char_pos": 2416}, {"type": "R", "before": "modeled", "after": "modelled", "start_char_pos": 2826, "end_char_pos": 2833}, {"type": "R", "before": "upper panel", "after": "panels on the left", "start_char_pos": 2844, "end_char_pos": 2855}, {"type": "R", "before": "lower panel the", "after": "panels on the right the", "start_char_pos": 2893, "end_char_pos": 2908}, {"type": "R", "before": "colors", "after": "colours", "start_char_pos": 2923, "end_char_pos": 2929}, {"type": "R", "before": "color", "after": "colour", "start_char_pos": 2951, "end_char_pos": 2956}, {"type": "R", "before": "vectors.", "after": "vectors462x462px", "start_char_pos": 2993, "end_char_pos": 3001}, {"type": "D", "before": "620x620px", "after": null, "start_char_pos": 3004, "end_char_pos": 3013}, {"type": "R", "before": "The", "after": "Figure 2: The time averaged sea surface height is shown in red shading and the dashed lines are cotidal lines at intervals of roughly an hour. The Amphidromic points are located at the intersect of all lines. The upper panel shows the case for without friction and the lower panel for the case with frictionThe", "start_char_pos": 3014, "end_char_pos": 3017}, {"type": "R", "before": "In figure 2, the", "after": "Animation 1 shows the behaviour of a simplified case of a Kelvin wave in an enclosed shelf sea for the case with (lower panel) and without friction (upper panel). The", "start_char_pos": 3183, "end_char_pos": 3199}, {"type": "A", "before": null, "after": ", left panels of animation 1", "start_char_pos": 3531, "end_char_pos": 3531}, {"type": "R", "before": "center", "after": "centre", "start_char_pos": 3606, "end_char_pos": 3612}, {"type": "R", "before": "lower panel of figure 2", "after": "right panels of animation 1", "start_char_pos": 3649, "end_char_pos": 3672}, {"type": "R", "before": "center", "after": "centre", "start_char_pos": 3872, "end_char_pos": 3878}, {"type": "A", "before": null, "after": "the", "start_char_pos": 4375, "end_char_pos": 4375}, {"type": "R", "before": "are", "after": "is", "start_char_pos": 4403, "end_char_pos": 4406}, {"type": "R", "before": "center", "after": "centre", "start_char_pos": 4681, "end_char_pos": 4687}, {"type": "A", "before": null, "after": "In the upper panel of figure 2, the absolute time averaged SSH is shown in red shading and the dotted lines show the zero tidal elevation level at roughly hourly intervals, also known as cotidal lines. Where these lines intersect the tidal elevation is zero during a full tidal period and thus this is the location of the Amphidromic points.", "start_char_pos": 4781, "end_char_pos": 4781}, {"type": "R", "before": ". Figure 3, shows the Kelvin wave patterns when friction is added. The reflected wave amplitude has decreased and as a result", "after": "(lower left panel of animation 1). The tidal currents are proportional to the wave amplitude and therefore also decrease on the side of the reflected wave (lower right panel of animation 1). Finally, the static minima's are no longer in the centre of the domain as wave amplitude is no longer symmetric. Therefore,", "start_char_pos": 4936, "end_char_pos": 5061}, {"type": "R", "before": "shifted towards the top", "after": "shift towards the", "start_char_pos": 5085, "end_char_pos": 5108}, {"type": "R", "before": "panel", "after": "reflected wave (lower panel figure 2)", "start_char_pos": 5121, "end_char_pos": 5126}], "sents_char_pos": [0, 119, 279, 356, 442, 522, 631, 710, 793, 871, 950, 1192, 1315, 1459, 1557, 1635, 1786, 1988, 2156, 2309, 2487, 2564, 2650, 2730, 2839, 2918, 3001, 3182, 3374, 3502, 3627, 3780, 3880, 4042, 4209, 4353, 4450, 4593, 4780, 4937, 5002]}
+{"doc_id": "67768168", "revision_depth": "1", "before_revision": "Goa was one of Portugal's oldest colonies, since the Portuguese conquest of Goa in 1510. During the Napoleonic Wars , Britain and Portugal were allies (on account of the Anglo-Portuguese Alliance) but the Portuguese were unable to defend their empire from either the French military stationed in French India or France's allied navies. Hence the British dispatched a Royal Naval squadron as well as an army of 10,000 soldiers. These military personnel were posted at strategic locations like Fort Aguada, Miramar, Caranzalem, Dona Paula and Mormug\u00e3o. The British military also built fortifications in these areas to help defend Goa. (These structures were eventually demolished after their departure .) There are two distinct phases of the period, from 1797 to 1798 and from 1802 to 1813. The Iberian campaigns of the Peninsular War ended in 1813. This led to the amicable termination of the British military occupation of Portuguese India . Note that the Portuguese were still in charge of the administration of the territory throughout this time period (the local government was headed by the Viscount of Mirandela from 1794 to 1806, then by the Count of Sarzedas from 1806 to 1816). Only military personnel from the UK were stationed temporarily. British cemetery A British military cemetery is the only evidence of the presence of British forces in Goa that was otherwise ruled by the Portuguese. The cemetery came into existence over two centuries ago when the Portuguese sought help from the British to protect Goa from French troops. There are a total of 108 tombs, the oldest of them dates to 1808 and the latest of them dates to 1912.", "after_revision": "Goa was one of Portugal's oldest colonies, being established in URL The British connection came during the Napoleonic Wars . Britain and Portugal were actually allies during this war, but the Portuguese were concerned at being unable to defend their empire from predatory French or her allied URL The British were happy to defend the colony and dispatched a Royal Naval squadron as well as by sending an army of 10,000 soldiers. They were posted at strategic locations like Aguada, Miramar, Carazalem, Palacio do Cabo and URL They followed it by building huge fortification in these areas there to help defend it (They were subsequently demolished after their departure ). This amicable agreement was terminated in 1813 thanks largely to the massive defeat of the French and Spanish fleets at Trafalgar in URL There are two distinct phases of the period, from 1797 to 1798 and from 1802 to 1813 (In 1814 Napol\u00e9on was exiled to the island of Elba). For the next century, no country was capable of challenging the power of the Royal Navy. Goa could benefit from Pax Britannica. The British, controlling the vast majority of India by this time were more than happy to leave Goa to its oldest ally. During this time, the Portuguese were still nominally in charge of the administration of the territory (the local government was headed by the Viscount of Mirandela from 1794 to 1806, then by the Count of Sarzedas from 1806 to 1816). British cemetery The military cemetery is the only evidence of the presence of British forces in Goa that was otherwise ruled by the Portuguese. The cemetery came into existence over two centuries ago when the Portuguese sought help from the British to protect Goa from French troops. There are a total of 108 tombs, the oldest of them dates to 1808 and the latest of them dates to URL", "edit_actions": [{"type": "R", "before": "since the Portuguese conquest of Goa in 1510. During", "after": "being established in URL The British connection came during", "start_char_pos": 43, "end_char_pos": 95}, {"type": "R", "before": ",", "after": ".", "start_char_pos": 116, "end_char_pos": 117}, {"type": "R", "before": "allies (on account of the Anglo-Portuguese Alliance)", "after": "actually allies during this war,", "start_char_pos": 144, "end_char_pos": 196}, {"type": "A", "before": null, "after": "concerned at being", "start_char_pos": 221, "end_char_pos": 221}, {"type": "R", "before": "either the French military stationed in French India or France's allied navies. Hence the British", "after": "predatory French or her allied URL The British were happy to defend the colony and", "start_char_pos": 257, "end_char_pos": 354}, {"type": "A", "before": null, "after": "by sending", "start_char_pos": 400, "end_char_pos": 400}, {"type": "R", "before": "These military personnel", "after": "They", "start_char_pos": 429, "end_char_pos": 453}, {"type": "D", "before": "Fort", "after": null, "start_char_pos": 494, "end_char_pos": 498}, {"type": "R", "before": "Caranzalem, Dona Paula and Mormug\u00e3o. The British military also built fortifications", "after": "Carazalem, Palacio do Cabo and URL They followed it by building huge fortification", "start_char_pos": 516, "end_char_pos": 599}, {"type": "A", "before": null, "after": "there", "start_char_pos": 615, "end_char_pos": 615}, {"type": "R", "before": "Goa. (These structures were eventually", "after": "it (They were subsequently", "start_char_pos": 631, "end_char_pos": 669}, {"type": "R", "before": ".)", "after": "). This amicable agreement was terminated in 1813 thanks largely to the massive defeat of the French and Spanish fleets at Trafalgar in URL", "start_char_pos": 703, "end_char_pos": 705}, {"type": "R", "before": "1813. The Iberian campaigns of", "after": "1813 (In 1814 Napol\u00e9on was exiled to the island of Elba). For the next century, no country was capable of challenging the power of the Royal Navy. Goa could benefit from Pax Britannica. The British, controlling the vast majority of India by this time were more than happy to leave Goa to its oldest ally.", "start_char_pos": 786, "end_char_pos": 816}, {"type": "A", "before": null, "after": "During this time,", "start_char_pos": 817, "end_char_pos": 817}, {"type": "D", "before": "Peninsular War ended in 1813. This led to the amicable termination of the British military occupation of Portuguese India . Note that the", "after": null, "start_char_pos": 822, "end_char_pos": 959}, {"type": "A", "before": null, "after": "nominally", "start_char_pos": 982, "end_char_pos": 982}, {"type": "D", "before": "throughout this time period", "after": null, "start_char_pos": 1032, "end_char_pos": 1059}, {"type": "D", "before": "Only military personnel from the UK were stationed temporarily.", "after": null, "start_char_pos": 1191, "end_char_pos": 1254}, {"type": "R", "before": "British cemetery A British", "after": "British cemetery The", "start_char_pos": 1255, "end_char_pos": 1281}, {"type": "R", "before": "1912.", "after": "URL", "start_char_pos": 1643, "end_char_pos": 1648}], "sents_char_pos": [0, 88, 336, 428, 552, 791, 851, 945, 1190, 1254, 1405, 1545]}
+{"doc_id": "6798607", "revision_depth": "2", "before_revision": "Johnny Doran ( 1907 \u2013 19 January 1950)Sleeve notes compiled by Jackie Small and published with The Bunch of Keys audio tape, Comhairle Bh\u00e9aloideas \u00c9ireann (CB\u00c9 001), 1988 was an Irish uilleann piper. Johnny Doran was born in 1907 in Rathnew, Co. Wicklow. His family were Travellers with a distinguished musical heritage; his father John Doran and brother Felix Doran were also pipers, and his great-grandfather was the celebrated Wexford piper John Cash. By his early twenties, Doran was working as an itinerant musician, travelling with his family from town to town in a horse-drawn caravan and playing for money at fairs, races and sporting events. His playing is said to have inspired the young Willie Clancy to take up piping as a career. On 30 January 1948, Doran's caravan was parked on waste ground near Back Lane in Dublin's Cornmarket area. It was very windy, and a brick wall collapsed on the caravan, and also on Doran, who was outside lacing up his shoes. Doran was completely covered by bricks and rubble. His lower back was injured during the rescue process as, according to one of his daughters, he was pulled free from the debris. Johnny was afterwards paralysed from the waist down. His injuries led to continuing ill health and he died on 19 January 1950 in Athy, Co. Kildare. He is buried in Rathnew cemetery.Small, Jackie, Sleeve notes from Johnny Doran ~ The Master Pipers, Volume 1, 'Na bP\u00edobair\u00ed Uilleann' (NPUCD011), 2002 Family Johnny Doran had 9 children. In order from oldest to youngest they are as follow: 1. John / Johnny Doran (nicknamed The Hen); deceased. 2. Patrick Doran (nicknamed Hadley); deceased. 3. Mary Doran (nicknamed Girl); deceased. 4. James Doran (nicknamed Cheese); deceased. 5. Anne Doran (rosanne?) (nicknamed Nan); deceased. 6. Eileen Doran; deceased. 7. Margeret Doran (nicknamed Maggy); living. 8. Myles Doran; deceased. 9. Bridget Doran (nicknamed Ick); living.%DIFDELCMD < %DIFDELCMD < %%% Two of Johnny Doran's daughtersemigrated to America whereas most of his children migrated to mainland UK where they live to this day . Only one recording of Johnny Doran's playing was ever made. In 1947 the fiddle player John Kelly, a friend of Doran's, was concerned about the piper's health. He contacted Kevin Danaher of the Irish Folklore Commission, who arranged for a recording to be made on acetate disks , of the following tunes : 1. Coppers and Brass/The Rambling Pitchfork/The Steampacket (Jigs/Reel) 2. The Bunch of Keys/Rakish Paddy/The Bunch of Keys (Reels) 3. Tarbolton/The Fermoy Lasses (Reels) (With John Kelly) 4. An Ch\u00faileann (Air) 5. Sliabh na mBan (Air) 6. Colonel Fraser/My Love Is In America/Rakish Paddy (Reels) 7. The Sweep's/The Harvest Home/The High Level/The Harvest Home (Hornpipes) 8. The Job of Journeywork (Set Dance) 9. The Blackbird (Set Dance) 10. The Sweep's/The Harvest Home/The High Level/The Harvest Home (Hornpipes) Doran was reportedly pleased with the session, and a further one was planned but, because of the accident that paralysed him, it was never carried out. Style and Legacy Note by his grandson \u2013 Johnny was one of only a handful of people capable of playing the pipes whilst standing. His brother Felix and his father Johnny also played in this manner. Discography Category: 1907 births Category:1950 deaths Category:20th-century Irish people Category:Irish uilleann pipers Category:Musicians from County Wicklow Category:Irish Traveller", "after_revision": "Johnny Doran ( 1908 \u2013 19 January 1950)Sleeve notes compiled by Jackie Small and published with The Bunch of Keys audio tape, Comhairle Bh\u00e9aloideas \u00c9ireann (CB\u00c9 001), 1988 was an Irish uilleann piper. Johnny Doran was born around 1908 in Rathnew, Co. Wicklow. His family were Travellers with a distinguished musical heritage; his father John Doran and brother Felix Doran were also pipers, and his great-grandfather was the celebrated Wexford piper John Cash. p. 65 p. 219 By his early twenties, Doran was working as an itinerant musician, travelling with his family from town to town in a horse-drawn caravan and playing for money at fairs, races and sporting events. p. 65 p. 99 p. 219 His playing is said to have inspired the young Willie Clancy and Martin Talty to take up piping as a career. p. 65 p. 101-104 On 30 January 1948, Doran's caravan was parked on waste ground near Back Lane in Dublin's Cornmarket area. It was very windy, and a brick wall collapsed on the caravan, and also on Doran, who was outside lacing up his shoes. Doran was completely covered by bricks and rubble. His lower back was injured during the rescue process as, according to one of his daughters, he was pulled free from the debris. Johnny was afterwards paralysed from the waist down. His injuries led to continuing ill health and he died on 19 January 1950 in Athy, Co. Kildare. He is buried in Rathnew cemetery.Small, Jackie, Sleeve notes from Johnny Doran ~ The Master Pipers, Volume 1, 'Na bP\u00edobair\u00ed Uilleann' (NPUCD011), 2002 p. 70-71 Family Johnny Doran had %DIFDELCMD < %DIFDELCMD < %%% nine children, four sons and five daughters . Only one recording of Johnny Doran's playing was ever made. In 1947 the fiddle player John Kelly, a friend of Doran's, was concerned about the piper's health. He contacted Kevin Danaher of the Irish Folklore Commission, who arranged for a recording to be made on acetate disks . p. 70 p. 219-220 The following tunes were recorded: Coppers and Brass/The Rambling Pitchfork/The Steampacket (Jigs/Reel) The Bunch of Keys/Rakish Paddy/The Bunch of Keys (Reels) Tarbolton/The Fermoy Lasses (Reels) (With John Kelly) An Ch\u00faileann (Air) Sliabh na mBan (Air) Colonel Fraser/My Love Is In America/Rakish Paddy (Reels) The Sweep's/The Harvest Home/The High Level/The Harvest Home (Hornpipes) The Job of Journeywork (Set Dance) The Blackbird (Set Dance) The Sweep's/The Harvest Home/The High Level/The Harvest Home (Hornpipes) Style and Legacy Discography Category: 1908 births Category:1950 deaths Category:20th-century Irish people Category:Irish uilleann pipers Category:Musicians from County Wicklow Category:Irish Traveller", "edit_actions": [{"type": "R", "before": "1907", "after": "1908", "start_char_pos": 15, "end_char_pos": 19}, {"type": "R", "before": "in 1907 in", "after": "around 1908 in", "start_char_pos": 222, "end_char_pos": 232}, {"type": "A", "before": null, "after": "p. 65 p. 219", "start_char_pos": 455, "end_char_pos": 455}, {"type": "A", "before": null, "after": "p. 65 p. 99 p. 219", "start_char_pos": 652, "end_char_pos": 652}, {"type": "A", "before": null, "after": "and Martin Talty", "start_char_pos": 714, "end_char_pos": 714}, {"type": "A", "before": null, "after": "p. 65 p. 101-104", "start_char_pos": 746, "end_char_pos": 746}, {"type": "A", "before": null, "after": "p. 70-71", "start_char_pos": 1450, "end_char_pos": 1450}, {"type": "D", "before": "9 children. In order from oldest to youngest they are as follow:", "after": null, "start_char_pos": 1475, "end_char_pos": 1539}, {"type": "D", "before": "1. John / Johnny Doran (nicknamed The Hen); deceased. 2. Patrick Doran (nicknamed Hadley); deceased. 3. Mary Doran (nicknamed Girl); deceased. 4. James Doran (nicknamed Cheese); deceased. 5. Anne Doran (rosanne?) (nicknamed Nan); deceased. 6. Eileen Doran; deceased. 7. Margeret Doran (nicknamed Maggy); living. 8. Myles Doran; deceased. 9. Bridget Doran (nicknamed Ick); living.", "after": null, "start_char_pos": 1540, "end_char_pos": 1919}, {"type": "R", "before": "Two of Johnny Doran's daughtersemigrated to America whereas most of his children migrated to mainland UK where they live to this day", "after": "nine children, four sons and five daughters", "start_char_pos": 1949, "end_char_pos": 2081}, {"type": "R", "before": ", of the following tunes :", "after": ". p. 70 p. 219-220", "start_char_pos": 2361, "end_char_pos": 2387}, {"type": "R", "before": "1.", "after": "The following tunes were recorded:", "start_char_pos": 2388, "end_char_pos": 2390}, {"type": "D", "before": "2.", "after": null, "start_char_pos": 2460, "end_char_pos": 2462}, {"type": "D", "before": "3.", "after": null, "start_char_pos": 2520, "end_char_pos": 2522}, {"type": "D", "before": "4.", "after": null, "start_char_pos": 2577, "end_char_pos": 2579}, {"type": "D", "before": "5.", "after": null, "start_char_pos": 2599, "end_char_pos": 2601}, {"type": "D", "before": "6.", "after": null, "start_char_pos": 2623, "end_char_pos": 2625}, {"type": "D", "before": "7.", "after": null, "start_char_pos": 2684, "end_char_pos": 2686}, {"type": "D", "before": "8.", "after": null, "start_char_pos": 2760, "end_char_pos": 2762}, {"type": "D", "before": "9.", "after": null, "start_char_pos": 2798, "end_char_pos": 2800}, {"type": "D", "before": "10.", "after": null, "start_char_pos": 2827, "end_char_pos": 2830}, {"type": "D", "before": "Doran was reportedly pleased with the session, and a further one was planned but, because of the accident that paralysed him, it was never carried out.", "after": null, "start_char_pos": 2904, "end_char_pos": 3055}, {"type": "D", "before": "Note by his grandson \u2013 Johnny was one of only a handful of people capable of playing the pipes whilst standing. His brother Felix and his father Johnny also played in this manner.", "after": null, "start_char_pos": 3073, "end_char_pos": 3252}, {"type": "R", "before": "1907", "after": "1908", "start_char_pos": 3275, "end_char_pos": 3279}], "sents_char_pos": [0, 199, 245, 320, 454, 651, 745, 853, 971, 1022, 1150, 1203, 1298, 1332, 1486, 1583, 1630, 1672, 1717, 1769, 1796, 1843, 1867, 1911, 2083, 2143, 2242, 2387, 2830, 3055, 3184, 3252]}
+{"doc_id": "68077476", "revision_depth": "1", "before_revision": "alt=Informationsgrafik Rapid Transfer Port|mini|Alpha-Port-Transferschleuse: Informationsgrafik zum Rapid Transfer Port (RTP) Als Rapid Transfer Port ( englisch \u201eSchnellwechselsystem\u201c, kurz RTP , auch Alpha-Beta-Portsystem) wird ein Transfersystem bezeichnet, mit dem Material schnell und kontaminationsfrei in einen Isolator hinein- und hinausgeschleust werden kann . mini|verweis=Special:FilePath/Edelstahl-Beta-Beh\u00e4lter.jpg|alt=Beta Container 316L|Beta-Transfer-Container aus Edelstahl Der Alpha-Port ist in den Isolator integriert, die mobile Einheit des Transfersystems, der Beta-Port (ein Edelstahl-, - Kunststoff oder Aluminiumbeh\u00e4lter) kann angedockt werden . \u00dcber Handschuheingriffe ist es m\u00f6glich, die T\u00fcr des Alpha-Ports von innen zu \u00f6ffnen und so Material in den Beta-Beh\u00e4lter einzubringen. Die Abdockung des Beta-Containers kann nur erfolgen, wenn die T\u00fcr des Alpha-Ports geschlossen ist. Die hermetische Abdichtung wird w\u00e4hrend des Prozesses nicht aufgehoben . Geschichte Der erste Rapid Transfer Port (RTP) wurde in den 1960er Jahren f\u00fcr die Nuklearindustrie entwickelt, um Personen als auch die Umgebung vor gef\u00e4hrlichen Stoffen bei der Arbeit mit radioaktivem Material zu sch\u00fctzen. In den 1970er Jahren kamen die RTP-Systeme erstmals in Folienisolatoren der pharmazeutischen Industrie zum Einsatz . Rapid Transfer Ports werden seitdem zum Schutz von Bediener und der Umwelt vor gef\u00e4hrlichen Substanzen eingesetzt oder um pharmazeutische Produkte vor Keimen und Partikeln, die von Menschen und der Umwelt ausgehen, zu sch\u00fctzen . Um den stark individualisierten Anforderungen der Pharmaindustrie gerecht zu werden, kam es in den 2000er Jahren zur Auslagerung der Baugruppe. Diese wurde nun nicht mehr ausschlie\u00dflich von den Anlagenherstellern selbst produziert. Als unabh\u00e4ngige Baugruppe eignen sich die Transfersysteme f\u00fcr Zulieferer sehr gut zur Weiterentwicklung und Umsetzung von Innovationen. Die hohe Passgenauigkeit, die leichte Reinigung und das geringe Gewicht sind Eigenschaften, die den Rapid Transfer Port auszeichnen und bis zu diesem Zeitpunkt nicht erreicht wurden . Da der Transfer von Materialien und Verpackungen einen kritischen Prozessschritt in der der Containment-Technologie darstellt, wurden in den letzten Jahren in der Industrie viele Anstrengungen unternommen, um Transfersysteme zu verbessern oder neu zu entwickeln . Aufbau Rapid Transfer Ports werden zum kontaminationsfreien Materialtransfer in und aus Barrieresystemen wie RABS oder Isolatoren eingesetzt. Sie gelten als sicherste Methode f\u00fcr den bidirektionalen Transfer in aseptischen oder toxischen Arbeitsbereichen ohne Eind\u00e4mmung bzw. Verletzung der Sterilit\u00e4t. Der grunds\u00e4tzliche Aufbau der RTP-Systeme ist unabh\u00e4ngig vom Hersteller vielfach gleich. Gravierende Unterschiede finden sich nur im Individualisierungsgrad und bei zus\u00e4tzlichen Anwendungen, ob etwa feste oder liquide Stoffe eingebracht werden. Alpha-Port RTP-Systeme bestehen aus zwei Hauptkomponenten mit Doppelt\u00fcr-System . Der Alpha-Flansch mit T\u00fcre ist fest in die Isolatorwand integriert oder in den Boden des Containments eingelassen . alt=Schnittmodell eines Liquid-Beta-Transfer-Containers|mini|Schnittmodell eines Liquid-Beta-Transfer-Containers Der Alpha-Flansch besteht aus einem Edelstahl-Flansch und einer T\u00fcr aus \u00fcberwiegend Kunststoff, die an einem Scharnier befestigt ist. Beide Teile sind mit einer Verriegelung verschlossen und einer Dichtung versehen. Dar\u00fcber hinaus ist der Alpha-Flansch mit einem mechanischen Sicherheitsmechanismus ausgestattet, das die \u00d6ffnung der T\u00fcr bei Abwesenheit eines Beh\u00e4lters verhindert . Die folgenden Systeme werden zum Materialtransfer eingesetzt und sind \u00fcberwiegend Standardgr\u00f6\u00dfen in der Industrie: RTP TypFlansch \u00d8Nutzbarer \u00d8Isolatorausschnitt105225 mm85 mm156 mm190315 mm170 mm268 mm270400 mm250 mm348 mm350475 mm330 mm428 mm460590 mm440 mm537 mm Beta-Port Die zweite Hauptkomponente ist die Beta-Baugruppe, bestehend aus einem Kanister mit dem Beta-Flansch und der Beta-T\u00fcr, die mit einer Dichtung zum Flansch hin abgedichtet ist. Durch eine 60\u00b0 Drehung wird der Beta-Transfer-Container an den Alpha-Port angedockt . alt=Schnittmodell eines Alpha-Port|mini|Schnittmodell eines Alpha-Ports Sobald die Alpha- und Beta-Komponenten miteinander verbunden sind, bilden sie eine geschlossene Einheit. Die Dichtheit wird durch die Lippendichtungen der neu geschaffenen Einheit gew\u00e4hrleistet, welche ohne Unterbrechung der Sterilit\u00e4tseinschlie\u00dfung ge\u00f6ffnet werden kann . Sind der Alpha- und Beta-Port durch Bajonettverschl\u00fcsse miteinander verbunden, wird die Verriegelung gel\u00f6st und die T\u00fcr kann im Inneren des Isolators ge\u00f6ffnet werden. So ist ein schneller Materialtransfer zwischen Beh\u00e4lter und Containment m\u00f6glich, ohne dass die Reinraum-Integrit\u00e4t aufgehoben wird. mini|Alpha-Ports an einem Isolator|alternativtext= H.-J. B\u00e4ssler (et al.) (Hrsg.) : Containment Technology, Springer-Verlag Berlin Heidelberg, 1. Auflage , 2013, ISBN 978-3-642-39292-4.", "after_revision": "alt=Informationsgrafik Rapid Transfer Port|mini|Alpha-Port-Transferschleuse: Informationsgrafik zum Rapid Transfer Port (RTP) A Rapid Transfer Port ( RTP for short, also alpha-beta port system) is a transfer system that allows material to be rapidly transferred into and out of an isolator without contamination . mini|verweis=Special:FilePath/Edelstahl-Beta-Beh\u00e4lter.jpg|alt=Beta Container 316L|Beta-Transfer-Container aus Edelstahl The alpha port is integrated into the isolator, the mobile unit of the transfer system, the beta port (a stainless steel, plastic or aluminum container) can be docked . It is possible to open the door of the alpha port from the inside via glove intervention and thus to introduce material into the beta container. Undocking of the beta container can only be done when the door of the alpha port is closed. The hermetic seal is not broken during the process . History The first Rapid Transfer Port (RTP) was developed in the 1960s for the nuclear industry to protect personnel as well as the environment from hazardous substances when working with radioactive material. In the 1970s, RTP systems were first used in film isolators in the pharmaceutical industry . Rapid Transfer Ports have since been used to protect operators and the environment from hazardous substances or to protect pharmaceutical products from germs and particles emitted by people and the environment . In order to meet the highly individualized requirements of the pharmaceutical industry, the assembly was outsourced in the 2000s. This was now no longer produced exclusively by the equipment manufacturers themselves. As an independent assembly, the transfer systems are very well suited for suppliers to further develop and implement innovations. The high accuracy of fit, ease of cleaning and low weight are characteristics that distinguish the Rapid Transfer Port and had not been achieved up to this point . Since the transfer of materials and packaging represents a critical process step in containment technology, many efforts have been made in the industry in recent years to improve transfer systems or develop new ones . Types Rapid Transfer Ports are used for contamination-free material transfer into and out of barrier systems such as RABS or isolators. They are considered the safest method for bidirectional transfer in aseptic or toxic work areas without restriction or violation of sterility. The basic design of RTP systems is often the same regardless of the manufacturer. Major differences can only be found in the degree of customization and in additional applications, such as whether solid orr liquide Stoffe eingebracht werden. Alpha port RTP systems consist of two main components with double door system . The alpha flange with door is permanently integrated into the isolator wall or embedded into the floor of the containment . alt=Schnittmodell eines Liquid-Beta-Transfer-Containers|mini|Schnittmodell eines Liquid-Beta-Transfer-Containers The alpha flange consists of a stainless steel flange and a door made mainly of plastic, which is attached to a hinge. Both parts are closed with a latch and fitted with a seal. In addition, the alpha flange is equipped with a mechanical safety mechanism that prevents the door from opening in the absence of a container . The following systems are used for material transfer and are mainly standard sizes in the industry: RTP TypeFlange \u00d8Working \u00d8Installation diameter105225 mm85 mm156 mm190315 mm170 mm268 mm270400 mm250 mm348 mm350475 mm330 mm428 mm460590 mm440 mm537 mm Beta port The second main component is the beta assembly, consisting of a canister with the beta flange and the beta door, which is sealed to the flange with a gasket. A 60\u00b0 rotation docks the beta transfer container to the alpha port . alt=Schnittmodell eines Alpha-Port|mini|Schnittmodell eines Alpha-Ports Once the alpha and beta components are connected, they form a closed unit. The leak tightness is ensured by the lip seals of the newly created unit, which can be opened without interrupting the sterility containment . Once the alpha and beta ports are connected by bayonet latches, the interlock is released, and the door can be opened inside the isolator. This allows rapid transfer of material between the container and containment without compromising cleanroom integrity. mini|Alpha-Ports an einem Isolator|alternativtext= Hans-J\u00fcrgen B\u00e4ssler , Frank Lehmann : Containment Technology, Springer-Verlag Berlin Heidelberg, 1. Edition , 2013, ISBN 978-3-642-39292-4.", "edit_actions": [{"type": "R", "before": "Als", "after": "A", "start_char_pos": 126, "end_char_pos": 129}, {"type": "R", "before": "englisch \u201eSchnellwechselsystem\u201c, kurz RTP , auch Alpha-Beta-Portsystem) wird ein Transfersystem bezeichnet, mit dem Material schnell und kontaminationsfrei in einen Isolator hinein- und hinausgeschleust werden kann", "after": "RTP for short, also alpha-beta port system) is a transfer system that allows material to be rapidly transferred into and out of an isolator without contamination", "start_char_pos": 152, "end_char_pos": 366}, {"type": "R", "before": "Der Alpha-Port ist in den Isolator integriert, die mobile Einheit des Transfersystems, der Beta-Port (ein Edelstahl-, - Kunststoff oder Aluminiumbeh\u00e4lter) kann angedockt werden", "after": "The alpha port is integrated into the isolator, the mobile unit of the transfer system, the beta port (a stainless steel, plastic or aluminum container) can be docked", "start_char_pos": 489, "end_char_pos": 665}, {"type": "R", "before": "\u00dcber Handschuheingriffe ist es m\u00f6glich, die T\u00fcr des Alpha-Ports von innen zu \u00f6ffnen und so Material in den Beta-Beh\u00e4lter einzubringen. Die Abdockung des Beta-Containers kann nur erfolgen, wenn die T\u00fcr des Alpha-Ports geschlossen ist. Die hermetische Abdichtung wird w\u00e4hrend des Prozesses nicht aufgehoben", "after": "It is possible to open the door of the alpha port from the inside via glove intervention and thus to introduce material into the beta container. Undocking of the beta container can only be done when the door of the alpha port is closed. The hermetic seal is not broken during the process", "start_char_pos": 668, "end_char_pos": 972}, {"type": "R", "before": "Geschichte Der erste", "after": "History The first", "start_char_pos": 975, "end_char_pos": 995}, {"type": "R", "before": "wurde in den 1960er Jahren f\u00fcr die Nuklearindustrie entwickelt, um Personen als auch die Umgebung vor gef\u00e4hrlichen Stoffen bei der Arbeit mit radioaktivem Material zu sch\u00fctzen. In den 1970er Jahren kamen die RTP-Systeme erstmals in Folienisolatoren der pharmazeutischen Industrie zum Einsatz", "after": "was developed in the 1960s for the nuclear industry to protect personnel as well as the environment from hazardous substances when working with radioactive material. In the 1970s, RTP systems were first used in film isolators in the pharmaceutical industry", "start_char_pos": 1022, "end_char_pos": 1313}, {"type": "R", "before": "werden seitdem zum Schutz von Bediener und der Umwelt vor gef\u00e4hrlichen Substanzen eingesetzt oder um pharmazeutische Produkte vor Keimen und Partikeln, die von Menschen und der Umwelt ausgehen, zu sch\u00fctzen", "after": "have since been used to protect operators and the environment from hazardous substances or to protect pharmaceutical products from germs and particles emitted by people and the environment", "start_char_pos": 1337, "end_char_pos": 1542}, {"type": "R", "before": "Um den stark individualisierten Anforderungen der Pharmaindustrie gerecht zu werden, kam es in den 2000er Jahren zur Auslagerung der Baugruppe. Diese wurde nun nicht mehr ausschlie\u00dflich von den Anlagenherstellern selbst produziert. Als unabh\u00e4ngige Baugruppe eignen sich die Transfersysteme f\u00fcr Zulieferer sehr gut zur Weiterentwicklung und Umsetzung von Innovationen. Die hohe Passgenauigkeit, die leichte Reinigung und das geringe Gewicht sind Eigenschaften, die den", "after": "In order to meet the highly individualized requirements of the pharmaceutical industry, the assembly was outsourced in the 2000s. This was now no longer produced exclusively by the equipment manufacturers themselves. As an independent assembly, the transfer systems are very well suited for suppliers to further develop and implement innovations. The high accuracy of fit, ease of cleaning and low weight are characteristics that distinguish the", "start_char_pos": 1545, "end_char_pos": 2012}, {"type": "R", "before": "auszeichnen und bis zu diesem Zeitpunkt nicht erreicht wurden", "after": "and had not been achieved up to this point", "start_char_pos": 2033, "end_char_pos": 2094}, {"type": "R", "before": "Da der Transfer von Materialien und Verpackungen einen kritischen Prozessschritt in der der Containment-Technologie darstellt, wurden in den letzten Jahren in der Industrie viele Anstrengungen unternommen, um Transfersysteme zu verbessern oder neu zu entwickeln", "after": "Since the transfer of materials and packaging represents a critical process step in containment technology, many efforts have been made in the industry in recent years to improve transfer systems or develop new ones", "start_char_pos": 2097, "end_char_pos": 2358}, {"type": "R", "before": "Aufbau", "after": "Types", "start_char_pos": 2361, "end_char_pos": 2367}, {"type": "R", "before": "werden zum kontaminationsfreien Materialtransfer in und aus Barrieresystemen wie RABS oder Isolatoren eingesetzt. Sie gelten als sicherste Methode f\u00fcr den bidirektionalen Transfer in aseptischen oder toxischen Arbeitsbereichen ohne Eind\u00e4mmung bzw. Verletzung der Sterilit\u00e4t. Der grunds\u00e4tzliche Aufbau der RTP-Systeme ist unabh\u00e4ngig vom Hersteller vielfach gleich. Gravierende Unterschiede finden sich nur im Individualisierungsgrad und bei zus\u00e4tzlichen Anwendungen, ob etwa feste oder", "after": "are used for contamination-free material transfer into and out of barrier systems such as RABS or isolators. They are considered the safest method for bidirectional transfer in aseptic or toxic work areas without restriction or violation of sterility. The basic design of RTP systems is often the same regardless of the manufacturer. Major differences can only be found in the degree of customization and in additional applications, such as whether solid orr", "start_char_pos": 2389, "end_char_pos": 2873}, {"type": "R", "before": "Alpha-Port RTP-Systeme bestehen aus zwei Hauptkomponenten mit Doppelt\u00fcr-System", "after": "Alpha port RTP systems consist of two main components with double door system", "start_char_pos": 2909, "end_char_pos": 2987}, {"type": "R", "before": "Der Alpha-Flansch mit T\u00fcre ist fest in die Isolatorwand integriert oder in den Boden des Containments eingelassen", "after": "The alpha flange with door is permanently integrated into the isolator wall or embedded into the floor of the containment", "start_char_pos": 2990, "end_char_pos": 3103}, {"type": "R", "before": "Der Alpha-Flansch besteht aus einem Edelstahl-Flansch und einer T\u00fcr aus \u00fcberwiegend Kunststoff, die an einem Scharnier befestigt ist. Beide Teile sind mit einer Verriegelung verschlossen und einer Dichtung versehen. Dar\u00fcber hinaus ist der Alpha-Flansch mit einem mechanischen Sicherheitsmechanismus ausgestattet, das die \u00d6ffnung der T\u00fcr bei Abwesenheit eines Beh\u00e4lters verhindert", "after": "The alpha flange consists of a stainless steel flange and a door made mainly of plastic, which is attached to a hinge. Both parts are closed with a latch and fitted with a seal. In addition, the alpha flange is equipped with a mechanical safety mechanism that prevents the door from opening in the absence of a container", "start_char_pos": 3219, "end_char_pos": 3598}, {"type": "R", "before": "Die folgenden Systeme werden zum Materialtransfer eingesetzt und sind \u00fcberwiegend Standardgr\u00f6\u00dfen in der Industrie: RTP TypFlansch \u00d8Nutzbarer \u00d8Isolatorausschnitt105225", "after": "The following systems are used for material transfer and are mainly standard sizes in the industry: RTP TypeFlange \u00d8Working \u00d8Installation diameter105225", "start_char_pos": 3601, "end_char_pos": 3767}, {"type": "R", "before": "Beta-Port Die zweite Hauptkomponente ist die Beta-Baugruppe, bestehend aus einem Kanister mit dem Beta-Flansch und der Beta-T\u00fcr, die mit einer Dichtung zum Flansch hin abgedichtet ist. Durch eine", "after": "Beta port The second main component is the beta assembly, consisting of a canister with the beta flange and the beta door, which is sealed to the flange with a gasket. A", "start_char_pos": 3866, "end_char_pos": 4061}, {"type": "R", "before": "Drehung wird der Beta-Transfer-Container an den Alpha-Port angedockt", "after": "rotation docks the beta transfer container to the alpha port", "start_char_pos": 4066, "end_char_pos": 4134}, {"type": "R", "before": "Sobald die Alpha- und Beta-Komponenten miteinander verbunden sind, bilden sie eine geschlossene Einheit. Die Dichtheit wird durch die Lippendichtungen der neu geschaffenen Einheit gew\u00e4hrleistet, welche ohne Unterbrechung der Sterilit\u00e4tseinschlie\u00dfung ge\u00f6ffnet werden kann", "after": "Once the alpha and beta components are connected, they form a closed unit. The leak tightness is ensured by the lip seals of the newly created unit, which can be opened without interrupting the sterility containment", "start_char_pos": 4209, "end_char_pos": 4479}, {"type": "R", "before": "Sind der Alpha- und Beta-Port durch Bajonettverschl\u00fcsse miteinander verbunden, wird die Verriegelung gel\u00f6st und die T\u00fcr kann im Inneren des Isolators ge\u00f6ffnet werden. So ist ein schneller Materialtransfer zwischen Beh\u00e4lter und Containment m\u00f6glich, ohne dass die Reinraum-Integrit\u00e4t aufgehoben wird.", "after": "Once the alpha and beta ports are connected by bayonet latches, the interlock is released, and the door can be opened inside the isolator. This allows rapid transfer of material between the container and containment without compromising cleanroom integrity.", "start_char_pos": 4482, "end_char_pos": 4780}, {"type": "R", "before": "H.-J.", "after": "Hans-J\u00fcrgen", "start_char_pos": 4832, "end_char_pos": 4837}, {"type": "R", "before": "(et al.) (Hrsg.)", "after": ", Frank Lehmann", "start_char_pos": 4846, "end_char_pos": 4862}, {"type": "R", "before": "Auflage", "after": "Edition", "start_char_pos": 4927, "end_char_pos": 4934}], "sents_char_pos": [0, 76, 390, 802, 901, 1198, 1688, 1776, 1912, 1938, 2004, 2502, 2636, 2663, 2752, 2908, 2989, 3352, 3434, 3715, 4050, 4313, 4648]}
+{"doc_id": "70631", "revision_depth": "1", "before_revision": "Representation of indigenous population Humboldt's publications such as Personal Narrative of Travels to the Equinoctial Regions of the New Continent during the years 1799\u20131804 originate from a time in which colonialism was prevalent. Within recent academic publications, there are arguments for or against Humboldt's own imperial bias. Within the book Imperial Eyes, Pratt argues for an implicit imperial bias within Humboldt's writing. While Humboldt financed his expedition to the Spanish colonies independently, the Spanish monarchy allowed him to travel to South America. Due to the unrests within the Spanish colonies in South America, the Spanish crown implemented liberal reforms which lead to greater support of the Spanish monarchy within the lower class. However, Pratt highlights that the reforms created opposition towards the Spanish rule within the higher class as the declining control of the Spanish monarchy would result in the white South American elite to lose their privileges. When Humboldt writes about the nature within South America, he portrays it as neutral and free of people: If the indigenous population is mentioned within Humboldt's writing, Pratt argues that they are only represented when they are beneficial for Europeans. Others argue that Humboldt is a German Columbus as he describes a virginal country that could be used for commerce by Europeans. Other scholars counter Pratt's argumentation and refer to the abolitionist and anti-colonialist standpoint that Humboldt represents within his writing : An example is Humboldt's descriptions of the South American colonies in which he critiques the Spanish colonial rule. His close relation to enlightenment values such as liberty and freedom lead to his support of democracy and the subsequent support of the independence of South America. In order to improve the situation of the indigenous population, Humboldt includes propositions within his wiring that he also presents to the Spanish monarchy. When witnessing a slave market, Humboldt was shocked by the treatment of black people which lead him to become opposed to slavery and support the abolitionist movement throughout his life. Within his descriptions within Personal Narratives, Humboldt also includes the answers that were given to him by indigenous people. Additionally, Lubrich argues that despite the colonial and orientalist notions within his writing, Humboldt does not recreate these stereotypes, but deconstructs them.", "after_revision": "Representation of indigenous population Humboldt's publications such as Personal Narrative of Travels to the Equinoctial Regions of the New Continent during the years 1799\u20131804 originate from a time when colonialism was prevalent. Within recent academic publications, there are arguments for and against Humboldt's own imperial bias. Within the book Imperial Eyes, Pratt argues for an implicit imperial bias within Humboldt's writing. While Humboldt financed his expedition to the Spanish colonies independently, the Spanish monarchy allowed him to travel to South America. Due to unrest within the Spanish colonies in South America, the Spanish crown implemented liberal reforms which led to greater support of the Spanish monarchy within the lower class. However, Pratt points out that the reforms created opposition towards the Spanish rule within the upper class as the declining control of the Spanish monarchy would result in the white South American elite losing their privileges. When Humboldt wrote about the natural world within South America, he portrayed it as neutral and free of people: If the indigenous population was mentioned within Humboldt's writing, Pratt argues , they were only represented when they were beneficial for Europeans. Others argue that Humboldt was a German Columbus , as he described a virginal country that could be used for commerce by Europeans. Other scholars counter Pratt's argumentation and refer to the abolitionist and anti-colonialist standpoint that Humboldt represents within his writing . An example is Humboldt's descriptions of the South American colonies in which he critiqued Spanish colonial rule. His close relationship with Enlightenment values such as liberty and freedom led to his support of democracy and his subsequent support of the independence of South America. In order to improve the material and political situation of the indigenous population, Humboldt included propositions within his writing that he also presented to the Spanish monarchy. When witnessing a slave market, Humboldt was shocked by the treatment of black people which led him to become opposed to slavery and support the abolitionist movement throughout his life. Within his descriptions in Personal Narratives, Humboldt also included the answers that were given to him by indigenous people. Additionally, Lubrich argues that despite the colonial and orientalist notions of his writing, Humboldt did not recreate these stereotypes, but deconstructed them.", "edit_actions": [{"type": "R", "before": "in which", "after": "when", "start_char_pos": 199, "end_char_pos": 207}, {"type": "R", "before": "or", "after": "and", "start_char_pos": 296, "end_char_pos": 298}, {"type": "R", "before": "the unrests", "after": "unrest", "start_char_pos": 584, "end_char_pos": 595}, {"type": "R", "before": "lead", "after": "led", "start_char_pos": 694, "end_char_pos": 698}, {"type": "R", "before": "highlights", "after": "points out", "start_char_pos": 781, "end_char_pos": 791}, {"type": "R", "before": "higher", "after": "upper", "start_char_pos": 864, "end_char_pos": 870}, {"type": "R", "before": "to lose", "after": "losing", "start_char_pos": 973, "end_char_pos": 980}, {"type": "R", "before": "writes about the nature", "after": "wrote about the natural world", "start_char_pos": 1013, "end_char_pos": 1036}, {"type": "R", "before": "portrays", "after": "portrayed", "start_char_pos": 1062, "end_char_pos": 1070}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1134, "end_char_pos": 1136}, {"type": "R", "before": "that they are", "after": ", they were", "start_char_pos": 1187, "end_char_pos": 1200}, {"type": "R", "before": "are", "after": "were", "start_char_pos": 1228, "end_char_pos": 1231}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1285, "end_char_pos": 1287}, {"type": "R", "before": "as he describes", "after": ", as he described", "start_char_pos": 1306, "end_char_pos": 1321}, {"type": "R", "before": ":", "after": ".", "start_char_pos": 1538, "end_char_pos": 1539}, {"type": "R", "before": "critiques the", "after": "critiqued", "start_char_pos": 1621, "end_char_pos": 1634}, {"type": "R", "before": "relation to enlightenment", "after": "relationship with Enlightenment", "start_char_pos": 1668, "end_char_pos": 1693}, {"type": "R", "before": "lead", "after": "led", "start_char_pos": 1729, "end_char_pos": 1733}, {"type": "R", "before": "the", "after": "his", "start_char_pos": 1766, "end_char_pos": 1769}, {"type": "A", "before": null, "after": "material and political", "start_char_pos": 1851, "end_char_pos": 1851}, {"type": "R", "before": "includes", "after": "included", "start_char_pos": 1901, "end_char_pos": 1909}, {"type": "R", "before": "wiring", "after": "writing", "start_char_pos": 1934, "end_char_pos": 1940}, {"type": "R", "before": "presents", "after": "presented", "start_char_pos": 1954, "end_char_pos": 1962}, {"type": "R", "before": "lead", "after": "led", "start_char_pos": 2080, "end_char_pos": 2084}, {"type": "R", "before": "within", "after": "in", "start_char_pos": 2201, "end_char_pos": 2207}, {"type": "R", "before": "includes", "after": "included", "start_char_pos": 2243, "end_char_pos": 2251}, {"type": "R", "before": "within", "after": "of", "start_char_pos": 2388, "end_char_pos": 2394}, {"type": "R", "before": "does", "after": "did", "start_char_pos": 2417, "end_char_pos": 2421}, {"type": "R", "before": "deconstructs", "after": "deconstructed", "start_char_pos": 2458, "end_char_pos": 2470}], "sents_char_pos": [0, 234, 336, 437, 576, 765, 998, 1257, 1386, 1657, 1826, 1987, 2176, 2308]}
+{"doc_id": "706999", "revision_depth": "1", "before_revision": "Atmospheric composition upright=1.3|Visualisation of composition by volume of Earth's atmosphere. Water vapour is not included as it is highly variable. Each tiny cube (such as the one representing krypton) has one millionth of the volume of the entire block. Data is from NASA Langley.The composition of common nitrogen oxides in dry air vs. temperature.Chemical composition of atmosphere accordig to altitude. Axis: Altitude (km), Content of volume (\\%). Average composition of dry atmosphere (mole fractions) Gas per NASA Nitrogen, N2 78.084\\% Oxygen, O2 20.946\\% Minor constituents (mole fractions in ppm) Argon, Ar 9340 Carbon dioxide , CO2 400 Neon, Ne 18.18 Helium, He 5.24 Methane , CH4 1.7 Krypton, Kr 1.14 Hydrogen, H2 0.55 Nitrous oxide, N2O 0.5 Xenon, Xe 0.09 Nitrogen dioxide, NO2 0.02 Water Water vapour Highly variable;typically makes up about 1\\% Notes: the concentration of CO2 and CH4 vary by season and location. The mean molecular mass of air is 28.97 g/mol. Ozone ( O3 ) is not included due to its high variability. composition of dry clean air near sea level according to standard ISO 2533 - 1975 Gas Content of volume \\% Nitrogen, N2 78.084 Oxygen, O2 20.9476 Argon, Ar 0.934 Carbon dioxide, CO2 0.0314 * Neon, Ne Helium, He Krypton, Kr Xenon, Xe Hydrogen, H2 Nitrous oxide, N2O Methane, CH4 Ozone, O3 , in summer up to * Ozone , O3, in winter up to * Sulphur dioxide , SO2 up to * Nitrogen dioxide, NO2 up to * Iodine, I2 * * The content of the gas may undergo significant variations from time to time or from place to place ] ] .", "after_revision": "Atmospheric composition upright=1.3|Visualisation of composition by volume of Earth's atmosphere. Water vapour is not included as it is highly variable. Each tiny cube (such as the one representing krypton) has one millionth of the volume of the entire block. Data is from NASA Langley.The composition of common nitrogen oxides in dry air vs. temperature.Chemical composition of atmosphere accordig to altitude. Axis: Altitude (km), Content of volume (\\%). Average composition of dry atmosphere (mole fractions) Gas per NASA Dry clean air near sea level(standard ISO 2533 - 1975) Nitrogen, N2 78.084\\% 78.084\\% Oxygen, O2 20.946\\% 20.946\\% Minor constituents (mole fractions in ppm) Argon, Ar 9340 9340 Carbon dioxide* a , CO2 400 314 b Neon, Ne 18.18 18.18 Helium, He 5.24 5.24 Methane a , CH4 1.7 2.0 Krypton, Kr 1.14 1.14 Hydrogen, H2 0.55 0.5 Nitrous oxide, N2O 0.5 0.5 Xenon, Xe 0.09 0.087 Nitrogen dioxide, NO2 0.02 up to 0.02 Ozone*, O3 , in summer up to 0.07 Ozone* , O3, in winter up to 0.02 Sulphur dioxide* , SO2 up to 1 Iodine*, I2 0.01 Water Water vapour* Highly variable (about 0\u20133\\%);typically makes up about 1\\% Notes The mean molecular mass of dry air is 28.97 g/mol. *The content of the gas may undergo significant variations from time to time or from place to place . a]The concentration of CO2 and CH4 vary by season and location. b]CO2 here is from 1975, but has been increasing by about 2\u20133 ppm annually (see Carbon dioxide in Earth's atmosphere) .", "edit_actions": [{"type": "A", "before": null, "after": "Dry clean air near sea level(standard ISO 2533 - 1975)", "start_char_pos": 525, "end_char_pos": 525}, {"type": "A", "before": null, "after": "78.084\\%", "start_char_pos": 548, "end_char_pos": 548}, {"type": "A", "before": null, "after": "20.946\\%", "start_char_pos": 569, "end_char_pos": 569}, {"type": "R", "before": "Carbon dioxide", "after": "9340 Carbon dioxide*", "start_char_pos": 628, "end_char_pos": 642}, {"type": "A", "before": null, "after": "a", "start_char_pos": 643, "end_char_pos": 643}, {"type": "A", "before": null, "after": "314", "start_char_pos": 654, "end_char_pos": 654}, {"type": "A", "before": null, "after": "b", "start_char_pos": 655, "end_char_pos": 655}, {"type": "A", "before": null, "after": "18.18", "start_char_pos": 671, "end_char_pos": 671}, {"type": "R", "before": "Methane", "after": "5.24 Methane", "start_char_pos": 688, "end_char_pos": 695}, {"type": "A", "before": null, "after": "a", "start_char_pos": 696, "end_char_pos": 696}, {"type": "A", "before": null, "after": "2.0", "start_char_pos": 707, "end_char_pos": 707}, {"type": "A", "before": null, "after": "1.14", "start_char_pos": 725, "end_char_pos": 725}, {"type": "A", "before": null, "after": "0.5", "start_char_pos": 744, "end_char_pos": 744}, {"type": "A", "before": null, "after": "0.5", "start_char_pos": 768, "end_char_pos": 768}, {"type": "A", "before": null, "after": "0.087", "start_char_pos": 784, "end_char_pos": 784}, {"type": "R", "before": "Water Water vapour Highly variable;typically makes up about 1\\% Notes: the concentration of CO2 and CH4 vary by season and location. The mean molecular mass of air is 28.97 g/mol. Ozone (", "after": "up to 0.02 Ozone*,", "start_char_pos": 812, "end_char_pos": 999}, {"type": "D", "before": ") is not included due to its high variability.", "after": null, "start_char_pos": 1003, "end_char_pos": 1049}, {"type": "D", "before": "composition of dry clean air near sea level according to standard ISO 2533 - 1975 Gas Content of volume \\% Nitrogen, N2 78.084 Oxygen, O2 20.9476 Argon, Ar 0.934 Carbon dioxide, CO2 0.0314 * Neon, Ne Helium, He Krypton, Kr Xenon, Xe Hydrogen, H2 Nitrous oxide, N2O Methane, CH4 Ozone, O3", "after": null, "start_char_pos": 1050, "end_char_pos": 1337}, {"type": "R", "before": "* Ozone", "after": "0.07 Ozone*", "start_char_pos": 1356, "end_char_pos": 1363}, {"type": "R", "before": "* Sulphur dioxide", "after": "0.02 Sulphur dioxide*", "start_char_pos": 1386, "end_char_pos": 1403}, {"type": "R", "before": "* Nitrogen dioxide, NO2 up to * Iodine,", "after": "1 Iodine*,", "start_char_pos": 1416, "end_char_pos": 1455}, {"type": "R", "before": "* * The", "after": "0.01 Water Water vapour* Highly variable (about 0\u20133\\%);typically makes up about 1\\% Notes The mean molecular mass of dry air is 28.97 g/mol. *The", "start_char_pos": 1459, "end_char_pos": 1466}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1562, "end_char_pos": 1562}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1563, "end_char_pos": 1563}, {"type": "A", "before": null, "after": "The concentration of CO2 and CH4 vary by season and location.", "start_char_pos": 1564, "end_char_pos": 1564}, {"type": "A", "before": null, "after": "b", "start_char_pos": 1565, "end_char_pos": 1565}, {"type": "A", "before": null, "after": "CO2 here is from 1975, but has been increasing by about 2\u20133 ppm annually (see Carbon dioxide in Earth's atmosphere)", "start_char_pos": 1566, "end_char_pos": 1566}], "sents_char_pos": [0, 97, 152, 259, 286, 355, 411, 456, 944, 991, 1126]}
+{"doc_id": "7149605", "revision_depth": "1", "before_revision": "The fire knife is a traditional Samoan cultural implement that is used in ceremonial dances. It was originally composed of a machete wrapped in towels on both ends with a portion of the blade exposed in the middle. Tribal performers of fire knife dancing (or Siva Afi or even \"Ailao Afi\" as it is called in Samoa) dance while twirling the knife and doing other acrobatic stunts. The towels are set afire during the dances thus explaining the name. Polynesian Historians and regarded authorities on Samoan cultural history state that the training of Toa warriors in the art of hand to hand combat with the Nifo Oti, the serrated edge Samoan war club came into prominence between 900 - 1200 AD the favorite weapon of the Tui Manu'a Empire of the time the King Maui Tagote of the Eastern Samoan Island groups. These Nifo Oti war clubs which were often edged with sharks teeth and saw fishand also sharp serrated edge teeth of other sea creatures such as the sword fish . The Siva Afi was originally performed with the Nifo Oti ( Samoan war club ) which is very dangerous, the modern fire knife dance has its roots in the ancient Samoan exhibition called \"ailao \" \u2013 the flashy demonstration of a Samoan warrior's battle prowess through artful twirling, throwing and catching, and dancing with a war club. The ' ailao could be performed with any warclub, and some colonial accounts confirm that women also performed ' ailao at the head of ceremonial processions, especially daughters of high chiefs. The Siva Afi dance is based on the ancient weapon combat sport of Ailao conceived and birthed in Samoa on the Island of Upolu between the years 1200 - 1250 AD coming into cultural prominence during the reign of King Maui Tagote. Ancient legend speaks of 400 warriors whom trained with their Nifo Oti , the serrated edge Samoan war club. During night dances torches were often twirled and swung about by dancers, although a warclub was the usual implement used for ' ailao in remembrance of the three brothers Tuna, Fata and Savea and their defeat of the Tongan invaders. Before the introduction of metals, the most common clubs that were wielded and displayed in the ' ailao fashion were elaborately carved heirloom clubs called \"anava\". These ' anava were frequently carved with serrated edges and jagged \"teeth\" which characterized the unique Samoan weapon called the \"nifo'oti\". For approximately 200 years the Tu'i Tonga Talakaifaiki established a long-term residence ata Safotu, Savai'i, Samoa. The location for the Tu'i Tonga Talakaifaiki's upcoming birthday Festivities was a beautiful famous stretch of beach in Aleipata a region on the Eastern side of Upolu. The seeds of rebellion were planted, according to legend, by three brothers the \"sons\" of Atiogie, namely Savea, Tuna, Fata and the fourth Toa warrior being Ulumasui (who was actually a grandson of Atiogie). The three brothers and their nephew eventually leading the wide-scale campaign of civil disobedience which ultimately escalated into the military overthrow of Talakaifaiki. Samoan warriors were called upon to dance and entertain the Tu'i Tonga Talakaifaiki during a birthday celebration for the King of Tonga. The Tongans had ruled parts of Samoa Upolu and Savai'i but were not able to conquer the Eastern Samoan Islands namely Manu'a and Manono whose warriors famously held off Tongan and Fijian invasions on numerous occasions. The Manu'a warriors were renown throughout Eastern Polynesia for their strength and ferocity. The Samoan warriors arrived to prepare their entertainment for Tu'i Tonga Talakaifaiki , the Samoans buried weapons nifo oti, in the sand all around the beach area , as they plied the Tongans with \"bush gin\". Then they utilized their nifo oti, which has remained the same design for the last millennia , as those favored when the Samoans were actually head hunters, and the nifo-oti beheaded the victim while the hook carried the trophy. As the Festivities and party progressed, and more \"bush gin\" was consumed, as night set in the Samoan warriors \"performed\" for the king. They had wrapped both ends of their nifo-oti with dry palm sennit which was then dipped into the fires to create a blaze on one end of the knife. They danced and pointed out the locations of the buried weapons , to other Samoan warriors who waited, in small paopaos (canoes) offshore. The warriors then stormed the beach, recovered the weapons and set them ablaze as they proceeded to drive the Tongans in a bloody battle all the way across the island, from east to the western most point of Upolu. Driven westward from Aleipata, ' Upolu (where the Tu'i Tonga's birthday festivities were underway) to the coast of Mulifanua, the Tongan king and his bodyguards were cornered against the sea. There was fierce fighting all the way to the sea whereon the Tu'i Tonga reached his superior navy vessels and called out to those on the land. The Tongans whom were not killed , eventually boarded boats and left Samoa for good. Upon his departure, the Tongan monarch delivered a short speech which praised the brave fighting qualities of the Samoan warriors and conceded victory to his once-subjects. The Malietoa title is taken from the opening phrase of that speech: \"M\u0101lie toa, m\u0101lie tau,\" meaning \"great warriors, well fought.\" When European and American whalers and traders began commercial ventures in Samoa, they introduced the natives to the long-handled blubber knife and the hooked cane knife. The characteristic metal hook of these tools was readily incorporated into the Samoan wooden nifo'oti, which bears the unique hooked element whether carved from wood or forged from steel. One common claim is that the word \"nifo'oti\" means \"tooth of death\", but this is not linguistically accurate as Samoan syntax places the modifier after the subject; according to Samoan grammar the term \"nifo'oti\" would actually mean \"dead tooth\", hardly as intimidating as the former translation. One more linguistic issue remains to be worked out in regards to 'oti (with the initial glottal stop) and \"oti\" (without the glottal stop). When pronounced with the glottal stop, the word 'oti does not mean \"death\" at all; as a verb, 'oti means \"to cut\" as in 'otiulu (\"hair cut\") or as a noun it refers to the domestic goat. Therefore, the most probable derivation of the term \"nifo'oti\" stems from the resemblance of the weapon's hook to the curved horn (\"nifo ) of a goat ( 'oti ), or from the serrated teeth (\"nifo\") that formed the weapon's cutting edge ('oti). The young man Tavita Vaoifi revived the Samoan ailao Siva Afi dance , to eventually bring it home to Samoa from Hawai'i. He had won a scholarship from the Church of Jesus Christ of Latter Day Saints. This was while WWII was being fought in part , in his beloved South Pacific. When he was able to come to America he went to school, worked, and danced. After he read this information, in his spare time, he researched anything that he could find about his homeland. This story stuck him deeply, because he had never heard of this from his elders. He was determined to incorporate this treasure into his island dance routine. After many cuts, burns, and narrow escapes he was able to perfect this dance to the point where he performed it nightly at clubs and shows throughout , not only the San Francisco area but the entire country. Fire was a part of Tavita's dance as he found it just as it was described in the book from the library. There were no towels used only palm fronds and dry leaves. His dances were done all around San Francisco and even in Florida before he returned to Samoa to bring this part of the Samoan Culture that was unheard of until he preformed. The crowd , that came to find out what he had discovered about Samoa, in America were frightened when they saw him whirling the fire. The Superintendent of the Morman school , where Tavita was teaching , at the time , was able to calm the audience and assure them that no harm would come to them. After that, for years he taught the dance and judged many contests in Samoa and other countries. He was rewarded for the notices and tourist he encouraged to visit his beloved homeland with the High Chief Title, A'e, from the HEAD OF STATE Malietoa Tanumafili II , As you can see now from what Mrs. Tavita Vaoifi wrote, after being married to him for 12 years, 1979 until his death in 1991 , from Cyclone Val, the information about fire not being a part of the \"Fireknife Dance\" until 1946 is a mistake. %DIFDELCMD < %DIFDELCMD < %%% . , That is added to the knife Tin 1946 by a Samoan knife dancer named Freddie Letuli, later to become Paramount Chief Letuli Olo Misilagi. Letuli was performing in San Francisco and noticed a Hindu Fire eater and a little girl with lighted batons. The fire eater loaned him some fuel, he wrapped some towels around his knife, and thus the Fire Knife Siva Afi Dance was revived. Traditional competitions were hotly contested. Their exhibitionists would almost rather die than seek medical care for injuries incurred while performing. Today, modern competitions are held annually at the Polynesian Cultural Center to name the World Fireknife Champion. The competition began in 1992 and is always held during the third week of May. In 2007, the championships were expanded to welcome competitors in a duet category and a women's category. In 2010 the event expanded to four nights including a two-night, three-person final competition. The Samoan Siva Afi has become an integral part of any Polynesian Luau or show. Many other Polynesian Islands have implemented the Siva Afi into their own Island shows especially in the Islands of Tahiti, Hawai'i, Cook Islands Fiji and Tonga. Because of the close familial Tribal ties with the aforementioned Islands and the Samoa Islands, the fire knife dance has almost become homogenized as part of those Islands own culture. In the mid 20th century, the ancient traditions were commercialized and westernized. Over time the performing implement has changed. The wooden handle gradually lengthened and the blade got shorter. Eventually, the exposed portion was part of the handle. Some of the moves performed in shows now are more modern and flashy than traditional battle preparations. As such, they are often performed at accelerated speeds. It is probable that the danger of sharpened blades and the demand for multiple daily shows by top performers has caused the sharpened blade to disappear entirely from commercial performances. Now, when one travels to Hawaii, it is quite common to see commercial Fire Knife Dancing performed with wooden or aluminum poles wrapped in towels. These performances are often part of Luau festivities or Polynesian shows that include Poi Ball performances.", "after_revision": "The fire knife is a traditional Samoan cultural implement that is used in ceremonial dances. It was originally composed of a machete wrapped in towels on both ends with a portion of the blade exposed in the middle. Tribal performers of fire knife dancing (or Siva Afi or even \"Ailao Afi\" as it is called in Samoa) dance while twirling the knife and doing other acrobatic stunts. The towels are set afire during the dances , hence the name. Polynesian historians and authorities on Samoan cultural history state that the training of Toa warriors in the art of hand to hand combat with the Nifo Oti, the serrated-edged Samoan war club , came into prominence between 900 - 1200 AD . It was the favorite weapon of the Tui Manu'a Empire in the time of King Maui Tagote of the Eastern Samoan Island groups. These war clubs were often edged with the teeth of sharks, saw fish, swordfish, and other sea creatures . The Siva Afi was originally performed with the Nifo Oti , which was very dangerous. The modern fire knife dance has its roots in the ancient Samoan exhibition called ailao \u2013 the flashy demonstration of a Samoan warrior's battle prowess through artful twirling, throwing and catching, and dancing with a war club. The ailao could be performed with any warclub, and some colonial accounts confirm that women also performed ailao at the head of ceremonial processions, especially daughters of high chiefs. It was conceived on the Island of Upolu between the years 1200 - 1250 AD , coming into cultural prominence during the reign of King Maui Tagote. Ancient legend speaks of 400 warriors who trained with their Nifo Oti . During night dances , torches were often twirled and swung about by dancers, although a warclub was the usual implement used for ailao in remembrance of the three brothers Tuna, Fata , and Savea and their defeat of the Tongan invaders. Before the introduction of metals, the most common clubs that were wielded and displayed in the ailao fashion were elaborately carved heirloom clubs called anava . These anava were frequently carved with serrated edges and jagged \"teeth\" which characterized the unique Samoan weapon called the \"nifo'oti\". For approximately 200 years , the Tu'i Tonga Talakaifaiki established a long-term residence in ata Safotu, Savai'i, Samoa. The location for the Tu'i Tonga Talakaifaiki's upcoming birthday festivities was a beautiful famous stretch of beach in Aleipata , a region on the Eastern side of Upolu. The seeds of rebellion were planted, according to legend, by three brothers \u2014 the \"sons\" of Atiogie, namely Savea, Tuna, Fata \u2014and a fourth Toa warrior , Ulumasui (who was actually a grandson of Atiogie). The three brothers and their nephew eventually lead a wide-scale campaign of civil disobedience , which ultimately escalated into the military overthrow of Talakaifaiki. Samoan warriors were called upon to dance and entertain the Tu'i Tonga Talakaifaiki during a birthday celebration for the King of Tonga. The Tongans had ruled parts of Samoa ( Upolu and Savai'i ) but were not able to conquer the Eastern Samoan Islands , namely Manu'a and Manono , whose warriors famously held off Tongan and Fijian invasions on numerous occasions. The Manu'a warriors were renowned throughout Eastern Polynesia for their strength and ferocity. The Samoan warriors arrived to prepare their entertainment for Tu'i Tonga Talakaifaiki . The Samoans buried weapons (nifo oti) in the sand all around the beach area as they plied the Tongans with \"bush gin\". Then , they utilized their nifo oti, which have remained the same design for the last millennia as those favored when the Samoans were actually head hunters, to behead the victim, while the hook carried the trophy. As night set in, the Festivities and party progressed, more \"bush gin\" was consumed, and the Samoan warriors \"performed\" for the king. They had wrapped both ends of their nifo-oti with dry palm sennit , which was then dipped into the fires to create a blaze on one end of the knife. They danced and pointed out the locations of the buried weapons to other Samoan warriors , who were waiting in small paopaos (canoes) offshore. The warriors then stormed the beach, recovered the weapons and set them ablaze as they proceeded to drive the Tongans in a bloody battle all the way across the island, from east to the westernmost point of Upolu. Driven westward from Aleipata, Upolu (where the Tu'i Tonga's birthday festivities were underway) to the coast of Mulifanua, the Tongan king and his bodyguards were cornered against the sea. There was fierce fighting all the way to the sea , whereon the Tu'i Tonga reached his superior navy vessels and called out to those on the land. The Tongans who were not killed eventually boarded boats and left Samoa for good. Upon his departure, the Tongan monarch delivered a short speech that praised the brave fighting qualities of the Samoan warriors and conceded victory to his once-subjects. The Malietoa title is taken from the opening phrase of that speech: \"M\u0101lie toa, m\u0101lie tau,\" meaning \"great warriors, well fought.\" Etymology When European and American whalers and traders began commercial ventures in Samoa, they introduced the natives to the long-handled blubber knife and the hooked cane knife. The characteristic metal hook of these tools was readily incorporated into the Samoan wooden nifo'oti, which bears the unique hooked element whether carved from wood or forged from steel. One common claim is that the word \"nifo'oti\" means \"tooth of death\", but this is not linguistically accurate as Samoan syntax places the modifier after the subject; according to Samoan grammar , the term \"nifo'oti\" would actually mean \"dead tooth\", hardly as intimidating as the former translation. One more linguistic issue remains to be worked out in regards to 'oti (with the initial glottal stop) and \"oti\" (without the glottal stop). When pronounced with the glottal stop, the word 'oti does not mean \"death\" at all; as a verb, 'oti means \"to cut\" as in 'otiulu (\"hair cut\") , or, as a noun , it refers to the domestic goat. Therefore, the most probable derivation of the term \"nifo'oti\" stems from the resemblance of the weapon's hook to the curved horn (\"nifo \" ) of a goat ( \"'oti\" ), or from the serrated teeth (\"nifo\") that formed the weapon's cutting edge ('oti). Revival The young man Tavita Vaoifi revived the Samoan ailao Siva Afi dance to eventually bring it home to Samoa from Hawai'i. He had won a scholarship from the Church of Jesus Christ of Latter Day Saints. This was while WWII was being fought in part in his beloved South Pacific. When he was able to come to America , he went to school, worked, and danced. After he read this information, in his spare time, he researched anything that he could find about his homeland. This story struck him deeply, because he had never heard of this from his elders. He was determined to incorporate this treasure into his island dance routine. After many cuts, burns, and narrow escapes , he was able to perfect this dance , to the point where he performed it nightly at clubs and shows throughout not only the San Francisco area but the entire country. Fire was a part of Tavita's dance as he found it just as it was described in the book from the library. There were no towels used , only palm fronds and dry leaves. The crowd in America, which came to find out what he had discovered about Samoa, were frightened when they saw him whirling the fire. The Superintendent of the Mormon school where Tavita was teaching at the time was able to calm the audience and assure them that no harm would come to them. He eventually returned to Samoa to bring back this part of the Samoan Culture that was unheard of until he preformed. After that, for years he taught the dance and judged many contests in Samoa and other countries. He was rewarded for the notices and tourists he encouraged to visit his beloved homeland with the High Chief Title, A'e, from the head of state Malietoa Tanumafili II . Mrs. Tavita Vaoifi wrote, after being married to him for 12 years, from 1979 until his death in 1991 from Cyclone Val, the information about fire not being a part of the \"Fireknife Dance\" until 1946 is a mistake. %DIFDELCMD < %DIFDELCMD < %%% That is added to the knife Tin 1946 by a Samoan knife dancer named Freddie Letuli, later to become Paramount Chief Letuli Olo Misilagi. Letuli was performing in San Francisco and noticed a Hindu Fire eater and a little girl with lighted batons. The fire eater loaned him some fuel, he wrapped some towels around his knife, and thus the Fire Knife Siva Afi Dance was revived. Traditional competitions were hotly contested. Their exhibitionists would almost rather die than seek medical care for injuries incurred while performing. Today, modern competitions are held annually at the Polynesian Cultural Center to name the World Fireknife Champion. The competition began in 1992 and is always held during the third week of May. In 2007, the championships were expanded to welcome competitors in a duet category and a women's category. In 2010 , the event expanded to four nights including a two-night, three-person final competition. The Samoan Siva Afi has become an integral part of any Polynesian Luau or show. Many other Polynesian Islands have implemented the Siva Afi into their own Island shows especially in the Islands of Tahiti, Hawai'i, Cook Islands Fiji and Tonga. Because of the close familial tribal ties with the aforementioned Islands and the Samoa Islands, the fire knife dance has almost become homogenized as part of those Islands ' own culture. In the mid 20th century, the ancient traditions were commercialized and westernized. Over time , the performing implement has changed. The wooden handle gradually lengthened and the blade got shorter. Eventually, the exposed portion was part of the handle. Some of the moves performed in shows now are more modern and flashy than traditional battle preparations. As such, they are often performed at accelerated speeds. It is probable that the danger of sharpened blades and the demand for multiple daily shows by top performers has caused the sharpened blade to disappear entirely from commercial performances. Now, when one travels to Hawaii, it is quite common to see commercial ' Fire Knife Dancing ' performed with wooden or aluminum poles wrapped in towels. These performances are often part of Luau festivities or Polynesian shows that include Poi Ball performances.", "edit_actions": [{"type": "R", "before": "thus explaining", "after": ", hence", "start_char_pos": 422, "end_char_pos": 437}, {"type": "R", "before": "Historians and regarded", "after": "historians and", "start_char_pos": 459, "end_char_pos": 482}, {"type": "R", "before": "serrated edge", "after": "serrated-edged", "start_char_pos": 619, "end_char_pos": 632}, {"type": "A", "before": null, "after": ",", "start_char_pos": 649, "end_char_pos": 649}, {"type": "A", "before": null, "after": ". It was", "start_char_pos": 693, "end_char_pos": 693}, {"type": "R", "before": "of the time the", "after": "in the time of", "start_char_pos": 739, "end_char_pos": 754}, {"type": "R", "before": "Nifo Oti war clubs which", "after": "war clubs", "start_char_pos": 815, "end_char_pos": 839}, {"type": "R", "before": "sharks teeth and saw fishand also sharp serrated edge teeth of", "after": "the teeth of sharks, saw fish, swordfish, and", "start_char_pos": 862, "end_char_pos": 924}, {"type": "D", "before": "such as the sword fish", "after": null, "start_char_pos": 945, "end_char_pos": 967}, {"type": "R", "before": "( Samoan war club ) which is very dangerous, the", "after": ", which was very dangerous. The", "start_char_pos": 1026, "end_char_pos": 1074}, {"type": "R", "before": "\"ailao \"", "after": "ailao", "start_char_pos": 1153, "end_char_pos": 1161}, {"type": "D", "before": "'", "after": null, "start_char_pos": 1307, "end_char_pos": 1308}, {"type": "D", "before": "'", "after": null, "start_char_pos": 1413, "end_char_pos": 1414}, {"type": "R", "before": "The Siva Afi dance is based on the ancient weapon combat sport of Ailao conceived and birthed in Samoa", "after": "It was conceived", "start_char_pos": 1497, "end_char_pos": 1599}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1656, "end_char_pos": 1656}, {"type": "R", "before": "whom", "after": "who", "start_char_pos": 1765, "end_char_pos": 1769}, {"type": "R", "before": ", the serrated edge Samoan war club.", "after": ".", "start_char_pos": 1798, "end_char_pos": 1834}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1855, "end_char_pos": 1855}, {"type": "D", "before": "'", "after": null, "start_char_pos": 1963, "end_char_pos": 1964}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2019, "end_char_pos": 2019}, {"type": "D", "before": "'", "after": null, "start_char_pos": 2167, "end_char_pos": 2168}, {"type": "D", "before": "\"anava\". These '", "after": null, "start_char_pos": 2229, "end_char_pos": 2245}, {"type": "A", "before": null, "after": ". These anava", "start_char_pos": 2252, "end_char_pos": 2252}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2411, "end_char_pos": 2411}, {"type": "A", "before": null, "after": "in", "start_char_pos": 2474, "end_char_pos": 2474}, {"type": "R", "before": "Festivities", "after": "festivities", "start_char_pos": 2568, "end_char_pos": 2579}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2632, "end_char_pos": 2632}, {"type": "A", "before": null, "after": "\u2014", "start_char_pos": 2748, "end_char_pos": 2748}, {"type": "R", "before": "and the", "after": "\u2014and a", "start_char_pos": 2797, "end_char_pos": 2804}, {"type": "R", "before": "being", "after": ",", "start_char_pos": 2824, "end_char_pos": 2829}, {"type": "R", "before": "leading the", "after": "lead a", "start_char_pos": 2928, "end_char_pos": 2939}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2982, "end_char_pos": 2982}, {"type": "A", "before": null, "after": "(", "start_char_pos": 3229, "end_char_pos": 3229}, {"type": "A", "before": null, "after": ")", "start_char_pos": 3248, "end_char_pos": 3248}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3305, "end_char_pos": 3305}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3331, "end_char_pos": 3331}, {"type": "R", "before": "renown", "after": "renowned", "start_char_pos": 3441, "end_char_pos": 3447}, {"type": "R", "before": ", the", "after": ". The", "start_char_pos": 3597, "end_char_pos": 3602}, {"type": "R", "before": "nifo oti,", "after": "(nifo oti)", "start_char_pos": 3626, "end_char_pos": 3635}, {"type": "D", "before": ",", "after": null, "start_char_pos": 3674, "end_char_pos": 3675}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3724, "end_char_pos": 3724}, {"type": "R", "before": "has", "after": "have", "start_char_pos": 3761, "end_char_pos": 3764}, {"type": "D", "before": ",", "after": null, "start_char_pos": 3813, "end_char_pos": 3814}, {"type": "R", "before": "and the nifo-oti beheaded the victim", "after": "to behead the victim,", "start_char_pos": 3877, "end_char_pos": 3913}, {"type": "A", "before": null, "after": "night set in,", "start_char_pos": 3952, "end_char_pos": 3952}, {"type": "D", "before": "and", "after": null, "start_char_pos": 3991, "end_char_pos": 3994}, {"type": "R", "before": "as night set in", "after": "and", "start_char_pos": 4025, "end_char_pos": 4040}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4153, "end_char_pos": 4153}, {"type": "D", "before": ",", "after": null, "start_char_pos": 4298, "end_char_pos": 4299}, {"type": "R", "before": "who waited,", "after": ", who were waiting", "start_char_pos": 4325, "end_char_pos": 4336}, {"type": "R", "before": "western most", "after": "westernmost", "start_char_pos": 4558, "end_char_pos": 4570}, {"type": "D", "before": "'", "after": null, "start_char_pos": 4618, "end_char_pos": 4619}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4828, "end_char_pos": 4828}, {"type": "R", "before": "whom", "after": "who", "start_char_pos": 4935, "end_char_pos": 4939}, {"type": "D", "before": ",", "after": null, "start_char_pos": 4956, "end_char_pos": 4957}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 5072, "end_char_pos": 5077}, {"type": "A", "before": null, "after": "Etymology", "start_char_pos": 5312, "end_char_pos": 5312}, {"type": "A", "before": null, "after": ",", "start_char_pos": 5866, "end_char_pos": 5866}, {"type": "R", "before": "or", "after": ", or,", "start_char_pos": 6252, "end_char_pos": 6254}, {"type": "A", "before": null, "after": ",", "start_char_pos": 6265, "end_char_pos": 6265}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 6435, "end_char_pos": 6435}, {"type": "R", "before": "'oti", "after": "\"'oti\"", "start_char_pos": 6450, "end_char_pos": 6454}, {"type": "A", "before": null, "after": "Revival", "start_char_pos": 6540, "end_char_pos": 6540}, {"type": "D", "before": ",", "after": null, "start_char_pos": 6609, "end_char_pos": 6610}, {"type": "D", "before": ",", "after": null, "start_char_pos": 6786, "end_char_pos": 6787}, {"type": "A", "before": null, "after": ",", "start_char_pos": 6854, "end_char_pos": 6854}, {"type": "R", "before": "stuck", "after": "struck", "start_char_pos": 7018, "end_char_pos": 7023}, {"type": "A", "before": null, "after": ",", "start_char_pos": 7209, "end_char_pos": 7209}, {"type": "A", "before": null, "after": ",", "start_char_pos": 7244, "end_char_pos": 7244}, {"type": "D", "before": ",", "after": null, "start_char_pos": 7318, "end_char_pos": 7319}, {"type": "A", "before": null, "after": ",", "start_char_pos": 7506, "end_char_pos": 7506}, {"type": "R", "before": "His dances were done all around San Francisco and even in Florida before he returned to Samoa to bring this part of the Samoan Culture that was unheard of until he preformed. The crowd , that", "after": "The crowd in America, which", "start_char_pos": 7540, "end_char_pos": 7731}, {"type": "D", "before": "in America", "after": null, "start_char_pos": 7785, "end_char_pos": 7795}, {"type": "R", "before": "Morman school ,", "after": "Mormon school", "start_char_pos": 7875, "end_char_pos": 7890}, {"type": "D", "before": ",", "after": null, "start_char_pos": 7917, "end_char_pos": 7918}, {"type": "D", "before": ",", "after": null, "start_char_pos": 7931, "end_char_pos": 7932}, {"type": "A", "before": null, "after": "He eventually returned to Samoa to bring back this part of the Samoan Culture that was unheard of until he preformed.", "start_char_pos": 8012, "end_char_pos": 8012}, {"type": "R", "before": "tourist", "after": "tourists", "start_char_pos": 8146, "end_char_pos": 8153}, {"type": "R", "before": "HEAD OF STATE", "after": "head of state", "start_char_pos": 8239, "end_char_pos": 8252}, {"type": "R", "before": ", As you can see now from what", "after": ".", "start_char_pos": 8276, "end_char_pos": 8306}, {"type": "A", "before": null, "after": "from", "start_char_pos": 8374, "end_char_pos": 8374}, {"type": "D", "before": ",", "after": null, "start_char_pos": 8404, "end_char_pos": 8405}, {"type": "D", "before": ". ,", "after": null, "start_char_pos": 8548, "end_char_pos": 8551}, {"type": "A", "before": null, "after": ",", "start_char_pos": 9393, "end_char_pos": 9393}, {"type": "R", "before": "Tribal", "after": "tribal", "start_char_pos": 9756, "end_char_pos": 9762}, {"type": "A", "before": null, "after": "'", "start_char_pos": 9899, "end_char_pos": 9899}, {"type": "A", "before": null, "after": ",", "start_char_pos": 10008, "end_char_pos": 10008}, {"type": "A", "before": null, "after": "'", "start_char_pos": 10594, "end_char_pos": 10594}, {"type": "A", "before": null, "after": "'", "start_char_pos": 10614, "end_char_pos": 10614}], "sents_char_pos": [0, 92, 214, 378, 447, 808, 969, 1302, 1496, 1726, 1834, 2070, 2237, 2382, 2502, 2671, 2880, 3054, 3191, 3415, 3509, 3718, 3948, 4086, 4233, 4372, 4586, 4778, 4922, 5007, 5180, 5311, 5484, 5672, 5837, 5970, 6110, 6193, 6297, 6539, 6661, 6740, 6817, 6893, 7006, 7087, 7165, 7375, 7479, 7539, 7714, 7848, 8011, 8109, 8311, 8687, 8796, 8926, 8973, 9081, 9198, 9277, 9384, 9482, 9562, 9725, 9912, 9997, 10046, 10112, 10168, 10274, 10331, 10523, 10673]}
+{"doc_id": "718661", "revision_depth": "2", "before_revision": "The Hispanic Marches and surrounding regions. The Hispanic Marches or Spanish Marches (, , Aragonese and , , ), also known as the March of Barcelona, were a military buffer zone beyond the former province of Septimania, established by Charlemagne in 795 as a defensive barrier between the Umayyad Moors of Al-Andalus and the Frankish Carolingian Empire (Duchy of Gascony, the Duchy of Aquitaine and Carolingian Septimania). In its broader meaning, Hispanic Marches sometimes refers to a group of early Iberian and trans-Pyrenean lordships or counts coming under Frankish rule. As time passed, these lordships merged or gained independence from Frankish imperial URL Geographical context The area broadly corresponds to the eastern regions between the Pyrenees and the Ebro River. The local population of the Marches was diverse. It included Basques in its north-western valleys, Jews,On the Role of the Jews in the Establishment of the Hispanic Marches (768-814) : STUDIES IN THE HISTORY, LANGUAGE AND LITERATURE OF. / Bachrach, Bernard S. and a large Occitano-Romance-speaking Hispano-Roman population (Occitans and Catalans) governed by the Visigothic Code, all of them under the influence of Al-Andalus culture, since their lords had vowed allegiance to Cordoban rulers until Pepin's conquest of Andalusian Septimania (759). The Pyrenean valleys started to switch loyalties after 785 (Girona, Ribagorza, etc.) with the construction and garrisoning by counts loyal to the Carolingians of new outposts and fortresses on bordering areas. The territory changed with the fortunes of the Empires and the feudal ambitions of those, whether the counts or walis, appointed to administer the counties. Eventually the rulers and people of the Marches became autonomous and claimed independence. Out of the welter of counties in the region emerged the Principality of Catalonia composed by a myriad of counties with the County of Barcelona as their main power centre. Counties that at various times formed part of the Marches included: Ribagorza (initially including Pallars), Urgell, Cerdanya, Perelada, Emp\u00faries, Besal\u00fa, Ausona (Osona), Barcelona, Girona (March of Hispania) and, Conflent, Roussillon, Vallespir and Fenollet (March of Gothia). The nominal boundaries of Gothia and the Hispanic Marches vary in time, not without confusion. While Navarre and Aragon have sometimes been depicted within the Hispanic Marches , they were not part of it, but they came under the Carolingian area of influence between 794 and 806 within the Basque (also rendered as \"Gascon\") marches, or Duchy of Vasconia. Origins Marca Hispanica and Gothia The Hispanic Marches resulted from the expansion south of the Frankish realm from their heartland in Neustria and Austrasia starting with Charles Martel in 732 and after various decades fighting between the Franks and Umayyads (Saraceni) in the Iberian Peninsula. Creation The Franks created the Hispanic Marches by conquering former north-eastern territory of the Visigothic kingdom of Hispania, which had been conquered by the Muslims. After a series of struggles the County of Barcelona (with Ausona) was taken by Frankish forces in 801. A number of castles were established in Aragon between 798 and 802 (appointment of Count Aureolus). After subduing the Basques to the north of the Pyrenees (790), Frankish overlordship expanded to the upper Ebro (794) and Pamplona (798), when Alfonso II of Asturias also came under Charlemagne's influence. Sobrarbe was not incorporated into the Marches , as it appears later in history and was probably within the area of influence of the County of Aragon. The death of Charlemagne (814) was followed by a scene of open revolt and Carolingian setbacks around the Pyrenees. After being defeated by the Moors in the 816 Battle of Pancorbo, Pamplona, now led by the native Basque lord I\u00f1igo Arista, broke away from the Hispanic Marches , with the County of Aragon following suit shortly thereafter in 820. The named Catalan counties - territories used by the Moors to enter and overrun Septimania in 719 - became, at this point, a natural extension of the March of Gothia ruled by Catalans and Toulousains under the Carolingian Empire. The local population of the Marches was diverse. The majority were Basques and Hispano-Romans (Goths). But there were also Muslims, and Jews from Septimania who repopulated the Frankish conquered easternmost territories of present-day North Spain and a small portion of South France. The area changed with the fortunes of the empires and the feudal ambitions of the counts appointed to administrate the counties. As Frankish imperial power waned, the rulers of the Marches of Hispania became independent fiefs. The region would later become part of Catalonia. Charlemagne's son Louis took Barcelona from its Moorish ruler in 801, thus securing Frankish power in the borderland between the Franks and the Moors. The Counts of Barcelona then became the principal representatives of Frankish authority in the Hispanic Marches. The Marches included various outlying smaller territories, each ruled by a lesser miles with his armed retainers and who theoretically owed allegiance through the Count to the Emperor. The rulers were called counts; when they governed several counties they often took the name duke (Dux Gothiae). When the county formed the border with the Muslim Kingdom, the Frankish title marquis (Marquis de Gothie) was chosen. Besides, certain counts aspired to the Frankish title \"Prince of Gothia\". A margrave or Marcgravi is a Graf (\"duke\") of the Marches . The first Toulousains and Catalan lords who held the title of Counts of Barcelona, Bernard of Septimania, Humfrid, Bernard of Gothia, Borrell II and Ramon Borrell carried these titles. However poor communications and a distant central power allowed basic feudal entities to develop often self-sufficient and heavily agrarian. Each was ruled by a small hereditary military elite. These developments in the territories that later would become Catalonia followed similar patterns in other borderlands and Marches . For example, the first Count of Barcelona Bera was appointed by the King in 801, however subsequently strong heirs of Counts were able to inherit the title such as Sunifred, fl. 844\u2013848. This gradually became custom until Countship became hereditary (for Wifred the Hairy in 897). The County became de facto independent under count Borrell II, when he ceased to request royal charters after the kings Lothair and Hugh Capet failed to assist him in the defense of the County against Muslim leader al-Mansur, although the change of dynasty may have played a part in that decision. The early history of Andorra in the Pyrenees provides a fairly typical example of a lordship of the region, and is the only modern survivor of the Hispanic Marches that has not been incorporated into either France or Spain. Andorra's national anthem, El Gran Carlemany, mentions this.", "after_revision": "The Hispanic March and surrounding regions. The Hispanic March or Spanish March (, , Aragonese and , , ), also known as the March of Barcelona, was a military buffer zone beyond the former province of Septimania, established by Charlemagne in 795 as a defensive barrier between the Umayyad Moors of Al-Andalus and the Frankish Carolingian Empire (Duchy of Gascony, the Duchy of Aquitaine and Carolingian Septimania). In its broader meaning, Hispanic March sometimes refers to a group of early Iberian and trans-Pyrenean lordships or counts coming under Frankish rule. As time passed, these lordships merged or gained independence from Frankish imperial URL Geographical context The area broadly corresponds to the eastern regions between the Pyrenees and the Ebro River. The local population of the March was diverse. It included Basques in its north-western valleys, Jews,On the Role of the Jews in the Establishment of the Hispanic March (768-814) : STUDIES IN THE HISTORY, LANGUAGE AND LITERATURE OF. / Bachrach, Bernard S. and a large Occitano-Romance-speaking Hispano-Roman population (Occitans and Catalans) governed by the Visigothic Code, all of them under the influence of Al-Andalus culture, since their lords had vowed allegiance to Cordoban rulers until Pepin's conquest of Andalusian Septimania (759). The Pyrenean valleys started to switch loyalties after 785 (Girona, Ribagorza, etc.) with the construction and garrisoning by counts loyal to the Carolingians of new outposts and fortresses on bordering areas. The territory changed with the fortunes of the Empires and the feudal ambitions of those, whether the counts or walis, appointed to administer the counties. Eventually , the rulers and people of the March became autonomous and claimed independence. Out of the welter of counties in the region emerged the Principality of Catalonia composed by a myriad of counties with the County of Barcelona as their main power centre. Counties that at various times formed part of the March included: Ribagorza (initially including Pallars), Urgell, Cerdanya, Perelada, Emp\u00faries, Besal\u00fa, Ausona (Osona), Barcelona, Girona (March of Hispania) and, Conflent, Roussillon, Vallespir and Fenollet (March of Gothia). The nominal boundaries of Gothia and the Hispanic March vary in time, not without confusion. While Navarre and Aragon have sometimes been depicted within the Hispanic March , they were not part of it, but they came under the Carolingian area of influence between 794 and 806 within the Basque (also rendered as \"Gascon\") marches, or Duchy of Vasconia. Origins Marca Hispanica and Gothia The Hispanic March resulted from the expansion south of the Frankish realm from their heartland in Neustria and Austrasia starting with Charles Martel in 732 and after various decades fighting between the Franks and Umayyads (Saraceni) in the Iberian Peninsula. Creation The Franks created the Hispanic March by conquering former north-eastern territory of the Visigothic kingdom of Hispania, which had been conquered by the Muslims. After a series of struggles the County of Barcelona (with Ausona) was taken by Frankish forces in 801. A number of castles were established in Aragon between 798 and 802 (appointment of Count Aureolus). After subduing the Basques to the north of the Pyrenees (790), Frankish overlordship expanded to the upper Ebro (794) and Pamplona (798), when Alfonso II of Asturias also came under Charlemagne's influence. Sobrarbe was not incorporated into the March , as it appears later in history and was probably within the area of influence of the County of Aragon. The death of Charlemagne (814) was followed by a scene of open revolt and Carolingian setbacks around the Pyrenees. After being defeated by the Moors in the 816 Battle of Pancorbo, Pamplona, now led by the native Basque lord I\u00f1igo Arista, broke away from the Hispanic March , with the County of Aragon following suit shortly thereafter in 820. The named Catalan counties - territories used by the Moors to enter and overrun Septimania in 719 - became, at this point, a natural extension of the March of Gothia ruled by Catalans and Toulousains under the Carolingian Empire. The local population of the March was diverse. The majority were Basques and Hispano-Romans (Goths). But there were also Muslims, and Jews from Septimania who repopulated the Frankish conquered easternmost territories of present-day North Spain and a small portion of South France. The area changed with the fortunes of the empires and the feudal ambitions of the counts appointed to administrate the counties. As Frankish imperial power waned, the rulers of the March of Hispania became independent fiefs. The region would later become part of Catalonia. Charlemagne's son Louis took Barcelona from its Moorish ruler in 801, thus securing Frankish power in the borderland between the Franks and the Moors. The Counts of Barcelona then became the principal representatives of Frankish authority in the Hispanic March. The March included various outlying smaller territories, each ruled by a lesser miles with his armed retainers and who theoretically owed allegiance through the Count to the Emperor. The rulers were called counts; when they governed several counties they often took the name duke (Dux Gothiae). When the county formed the border with the Muslim Kingdom, the Frankish title marquis (Marquis de Gothie) was chosen. Besides, certain counts aspired to the Frankish title \"Prince of Gothia\". A margrave or Marcgravi is a Graf (\"duke\") of the March . The first Toulousains and Catalan lords who held the title of Counts of Barcelona, Bernard of Septimania, Humfrid, Bernard of Gothia, Borrell II and Ramon Borrell carried these titles. However poor communications and a distant central power allowed basic feudal entities to develop often self-sufficient and heavily agrarian. Each was ruled by a small hereditary military elite. These developments in the territories that later would become Catalonia followed similar patterns in other borderlands and March . For example, the first Count of Barcelona Bera was appointed by the King in 801, however subsequently strong heirs of Counts were able to inherit the title such as Sunifred, fl. 844\u2013848. This gradually became custom until Countship became hereditary (for Wifred the Hairy in 897). The County became de facto independent under count Borrell II, when he ceased to request royal charters after the kings Lothair and Hugh Capet failed to assist him in the defense of the County against Muslim leader al-Mansur, although the change of dynasty may have played a part in that decision. The early history of Andorra in the Pyrenees provides a fairly typical example of a lordship of the region, and is the only modern survivor of the Hispanic March that has not been incorporated into either France or Spain. Andorra's national anthem, El Gran Carlemany, mentions this.", "edit_actions": [{"type": "R", "before": "Marches", "after": "March", "start_char_pos": 13, "end_char_pos": 20}, {"type": "R", "before": "Marches or Spanish Marches", "after": "March or Spanish March", "start_char_pos": 59, "end_char_pos": 85}, {"type": "R", "before": "were", "after": "was", "start_char_pos": 150, "end_char_pos": 154}, {"type": "R", "before": "Marches", "after": "March", "start_char_pos": 457, "end_char_pos": 464}, {"type": "R", "before": "Marches", "after": "March", "start_char_pos": 808, "end_char_pos": 815}, {"type": "R", "before": "Marches", "after": "March", "start_char_pos": 945, "end_char_pos": 952}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1706, "end_char_pos": 1706}, {"type": "R", "before": "Marches", "after": "March", "start_char_pos": 1736, "end_char_pos": 1743}, {"type": "R", "before": "Marches", "after": "March", "start_char_pos": 2010, "end_char_pos": 2017}, {"type": "R", "before": "Marches", "after": "March", "start_char_pos": 2288, "end_char_pos": 2295}, {"type": "R", "before": "Marches", "after": "March", "start_char_pos": 2407, "end_char_pos": 2414}, {"type": "R", "before": "Marches", "after": "March", "start_char_pos": 2642, "end_char_pos": 2649}, {"type": "R", "before": "Marches", "after": "March", "start_char_pos": 2934, "end_char_pos": 2941}, {"type": "R", "before": "Marches", "after": "March", "start_char_pos": 3516, "end_char_pos": 3523}, {"type": "R", "before": "Marches", "after": "March", "start_char_pos": 3896, "end_char_pos": 3903}, {"type": "R", "before": "Marches", "after": "March", "start_char_pos": 4232, "end_char_pos": 4239}, {"type": "R", "before": "Marches", "after": "March", "start_char_pos": 4669, "end_char_pos": 4676}, {"type": "R", "before": "Marches. The Marches", "after": "March. The March", "start_char_pos": 5019, "end_char_pos": 5039}, {"type": "R", "before": "Marches", "after": "March", "start_char_pos": 5567, "end_char_pos": 5574}, {"type": "R", "before": "Marches", "after": "March", "start_char_pos": 6079, "end_char_pos": 6086}, {"type": "R", "before": "Marches", "after": "March", "start_char_pos": 6824, "end_char_pos": 6831}], "sents_char_pos": [0, 45, 423, 576, 779, 828, 1327, 1537, 1694, 1787, 1959, 2237, 2332, 2593, 2892, 3066, 3169, 3269, 3476, 3627, 3743, 3973, 4203, 4252, 4306, 4487, 4616, 4714, 4763, 4914, 5027, 5212, 5243, 5324, 5442, 5516, 5576, 5761, 5902, 5955, 6088, 6275, 6369, 6667, 6891]}
+{"doc_id": "7214055", "revision_depth": "3", "before_revision": "Dipalpur (; ), also spelt Depalpur, is a city in Okara District of the Punjab that served as headquarters of Depalpur Tehsil . Dipalpur tehsil is the largest tehsil of pakistan.Largest Tehsil of Pakistan - Laws of Pakistan It is situated 25 kilometres from the district capital Okara on a bank of the Beas River in Bari Doab.Location of Dipalpur - Falling Rain GenomicsTehsils & Unions in the District of Okara - Government of Pakistan It is located in the west of District Kasur. Historical architecture In the past, Dipalpur was surrounded by a fortified wall, rising to the height of 25 feet and strengthened by a deep trench. When and by whom this wall was constructed is not known, but it was renovated, repaired and improved during the rule of Firuz Shah Tughluq and later by Abdur Rahim Khan-e-Khanan, who was the governor during the time of Akbar.Firoz Shah Tughluq constructed a grand mosque and palaces. He also excavated a canal from the river Sutlej to irrigate gardens around the town. Wide and airy tunnels linked the royal residential quarters inside the fort to the adjoining gardens outside.There were 24 burgs (musketry holes)on the fortification wall, 24 mosques, 24 (ponds) and 24 wells at the town's peak. The trench, ponds and tunnels have been filled in, but in some places the location of the trench can still be defined. Most of the wall has been razed. Two of the four massive gateways with pointed arches also exist though they are badly damaged and their wooden doors have vanished. Later coats of cement have marred the original architecture of the gateways. Hindu monastery Besides doors with decorated latches, Jharokhas, bay windows and cut brick works, the most noticeable feature inside old Dipalpur is the monastery of Lal Jas Raj, a guru much venerated by the local people. According to the legend, Lal Jas Raj was the young son of Raja Dipa Chand , the founder of Dipalpur. He sank into the earth due to a curse by his stepmother Rani Dholran. Raja Dipa Chand constructed this monastery in the memory of his son. Today, the chamber is dilapidated, the doors are jammed and a stairway is used for storage. The structure itself is crumbling. According to local residents, there used to be a grand annual \"mela\" held here. It was also used by Hindus as a place to perform the Sardukahr (head-shaving ritual) until the partition, but \"nobody comes anymore\". Caravanserai Dipalpur's saray (inn) is near the monastery of Lal Jas Raj. It was a spacious building with airy rooms on four sides, a big courtyard in the centre and four arched entrances. The inn, like most of the older structures in town, is now in a state of disrepair. It has been divided and subdivided so many times by successive occupants that the original shapes are obscured. Even the verandas have been converted to create rooms.%DIFDELCMD < %DIFDELCMD < %%% Saints 350px| Hujra Shah Muqeem Many Muslim saints have come to preach in this area. Bahawal Haq commonly known as Bahawal Sher Qalandar came from Baghdad and settled in the village of Patharwall near Dipalpur. The saint constructed a hujra (small living room) and a mosque outside the village. His grandson Shah Muqeem continued his mission. The village came to be known as Hujra Shah Muqeem. This is the place mentioned in the famous Punjabi love story Mirza Saheban, although there is no historical evidence that Jati Sahiba (Mirza Sahiba) came here and prayed that \"The streets should desert when where my lover Mirza roams about\" . The Mughal Emperor Akbar, along with his son Saleem and royal entourage, stayed in Dipalpur when he came to pay homage to Farid Ganj Shakar in 1578. Akbar named the corridor Bari Doab by combining the syllables of the names of the two rivers, Beas and Ravi, thatbounded the area. Baba Guru Nanak also stayed in Dipalpur for some time. The ruins of a Gurudwara mark the place. Muslim saint named as Saayi Abdul Razaq stayed in Dipalpur and later on he started his volunteer activity for local people and after his death he was buried in city. Now, his death place is known as Razaqia Darbar. Hazrat baba Fazal Chisti shrine in Kari wala Jagir Near sukh pur.His Urs celebrated every year. Other notable residents Dr. Yasir Imtiaz Khan (born 1983) , scientist Qaiser Shehzad (born 1986), cricketer Manzoor Wattoo (born 1939 Bangla Fazilka India ), politician", "after_revision": "Dipalpur (; ), also spelt Depalpur, is a city in the Okara District of Pakistani province of Punjab that served as headquarters of Depalpur Tehsil , the largest Tehsil of Pakistan . It is situated 25 kilometres from the district capital Okara on a bank of the Beas River in Bari Doab.Location of Dipalpur - Falling Rain GenomicsTehsils & Unions in the District of Okara - Government of Pakistan It is located in the west of District Kasur. History Early Depalpur has a great historic past and is a very ancient town. The fortified town of Dipalpur is built on an old Kashan site (40 A.D. to 172 A.D.). The fortifications themselves are very ancient; though it is impossible determine their dates. All that can be said is that they are older than the visitation of Timur in 1398 A.D. From the time of Alexander to the time of Mehmood Ghaznavi, there were no found accounts of Dipalpur. According to the Gazetteer of 1935, the town was claimed to be founded by Sri Chand it was called Sri Nagar at that time, The modern name is claimed to have been named by Raja Deva Pala after he re-founded the town. Early Muslim period Mughal and Delhi Sultanates However, in older times, Dipalpur fell on the way to Delhi and, as such, was considered to be a %DIFDELCMD < %DIFDELCMD < %%% place where an invader could be engaged. Dipalpur, therefore, was one of the 3 lines of defense; the other two begin Uch Sharif, Samana, and Hansi. Ain-i-Akbari reveals that the militia force at Dipalpur, during the reign of Abul Fazal, consisted of 5,210 mounted Horsemen and 53,300 infantry. In the 14th Century, Firuz Shah Tughlaq regularly visited this place. It is also believed that he built a large Mosque outside the city, which no longer remains. At the time of Timur\u2019s invasion, Depalpur was second to Multan in size and importance. The town, it is believed may have been deserted due to Taimurs\u2019s invasion and drying up old Beas River. The Mughal Emperor Akbar, along with his son Saleem (Jahangir) along with their royal entourage, stayed in Dipalpur when he came to pay homage to Fariduddin Ganjshakar in 1578. Akbar named the corridor Bari Doab by combining the syllables of the names of the two rivers, Beas and Ravi River, that bounded the area. Hujra Shah Muqeem Sufism Many Muslim saints have come to preach in this area. Hazrat Bahawal Haq commonly known as Bahawal Sher Qalandar came from Baghdad and settled in the village of Patharwall near Dipalpur. The saint constructed a hujra (small living room) and a mosque outside the village. His grandson Hazrat Shah Muqeem continued his mission. The village came to be known as Hujra Shah Muqeem. This is the place mentioned in the famous Punjabi love story Mirza Sahiban, in which Jati Sahiban came here are prayed, although there is no historical evidence to that . A Muslim saint named as Saayin Abdul Razaq stayed in Dipalpur and later on he started his volunteer activity for local people and after his death he was buried in city. Now, his death place is known as Razaqia Darbar. Mongols The Mongols invaded this part of the country repeatedly and they were checked at Dipalpur by Ghiyas-ud-Din Balban and his son Muhammad Khan, during their last invasion of Punjab in 1285 A.D. Pir Muhammad Khan Mangol (also called Samar Khan) was defeated at Dipalpur but during the pursuit of the retreating Mongols, Muhammad Khan was killed. It is believed that Shahzada Muhammad Khan is laid to rest in a small tomb to the west of the Badshahi Mosque. Conformation from any authentic sources is, however, not available. Notable residents Qaiser Shehzad (born 1986), cricketer Manzoor Wattoo (born 1939 ), politician", "edit_actions": [{"type": "A", "before": null, "after": "the", "start_char_pos": 49, "end_char_pos": 49}, {"type": "R", "before": "the", "after": "Pakistani province of", "start_char_pos": 68, "end_char_pos": 71}, {"type": "R", "before": ". Dipalpur tehsil is the largest tehsil of pakistan.Largest", "after": ", the largest", "start_char_pos": 126, "end_char_pos": 185}, {"type": "R", "before": "- Laws of Pakistan", "after": ".", "start_char_pos": 205, "end_char_pos": 223}, {"type": "R", "before": "Historical architecture In the past, Dipalpur was surrounded by a fortified wall, rising to the height of 25 feet and strengthened by a deep trench. When and by whom this wall was constructed is not known, but it was renovated, repaired and improved during the rule of Firuz Shah Tughluq and later by Abdur Rahim Khan-e-Khanan, who was the governor during the time of Akbar.Firoz Shah Tughluq constructed a grand mosque and palaces. He also excavated a canal from the river Sutlej to irrigate gardens around the town.", "after": "History", "start_char_pos": 482, "end_char_pos": 999}, {"type": "D", "before": "Wide and airy tunnels linked the royal residential quarters inside the fort to the adjoining gardens outside.There were 24 burgs (musketry holes)on the fortification wall, 24 mosques, 24 (ponds) and 24 wells at the town's peak. The trench, ponds and tunnels have been filled in, but in some places the location of the trench can still be defined. Most of the wall has been razed. Two of the four massive gateways with pointed arches also exist though they are badly damaged and their wooden doors have vanished. Later coats of cement have marred the original architecture of the gateways.", "after": null, "start_char_pos": 1000, "end_char_pos": 1588}, {"type": "R", "before": "Hindu monastery Besides doors with decorated latches, Jharokhas, bay windows and cut brick works, the most noticeable feature inside old Dipalpur is the monastery of Lal Jas Raj, a guru much venerated by the local people.", "after": "Early Depalpur has a great historic past and is a very ancient town. The fortified town of Dipalpur is built on an old Kashan site (40 A.D. to 172 A.D.). The fortifications themselves are very ancient; though it is impossible determine their dates. All that can be said is that they are older than the visitation of Timur in 1398 A.D. From the time of Alexander to the time of Mehmood Ghaznavi, there were no found accounts of Dipalpur.", "start_char_pos": 1589, "end_char_pos": 1810}, {"type": "R", "before": "legend, Lal Jas Raj was the young son of Raja Dipa Chand , the founder of Dipalpur. He sank into the earth due to a curse by his stepmother Rani Dholran. Raja Dipa Chand constructed this monastery in the memory of his son. Today, the chamber is dilapidated,", "after": "Gazetteer of 1935,", "start_char_pos": 1828, "end_char_pos": 2085}, {"type": "R", "before": "doors are jammed and a stairway is used for storage. The structure itself is crumbling. According to local residents, there used", "after": "town was claimed to be founded by Sri Chand it was called Sri Nagar at that time, The modern name is claimed to have been named by Raja Deva Pala after he re-founded the town.", "start_char_pos": 2090, "end_char_pos": 2218}, {"type": "A", "before": null, "after": "Early Muslim period", "start_char_pos": 2219, "end_char_pos": 2219}, {"type": "A", "before": null, "after": "Mughal and Delhi Sultanates However, in older times, Dipalpur fell on the way to Delhi and, as such, was considered", "start_char_pos": 2220, "end_char_pos": 2220}, {"type": "D", "before": "grand annual \"mela\" held here. It was also used by Hindus as a place to perform the Sardukahr (head-shaving ritual) until the partition, but \"nobody comes anymore\".", "after": null, "start_char_pos": 2229, "end_char_pos": 2393}, {"type": "D", "before": "Caravanserai Dipalpur's saray (inn) is near the monastery of Lal Jas Raj. It was a spacious building with airy rooms on four sides, a big courtyard in the centre and four arched entrances. The inn, like most of the older structures in town, is now in a state of disrepair. It has been divided and subdivided so many times by successive occupants that the original shapes are obscured. Even the verandas have been converted to create rooms.", "after": null, "start_char_pos": 2394, "end_char_pos": 2833}, {"type": "D", "before": "Saints", "after": null, "start_char_pos": 2863, "end_char_pos": 2869}, {"type": "R", "before": "350px|", "after": "place where an invader could be engaged. Dipalpur, therefore, was one of the 3 lines of defense; the other two begin Uch Sharif, Samana, and Hansi. Ain-i-Akbari reveals that the militia force at Dipalpur, during the reign of Abul Fazal, consisted of 5,210 mounted Horsemen and 53,300 infantry. In the 14th Century, Firuz Shah Tughlaq regularly visited this place. It is also believed that he built a large Mosque outside the city, which no longer remains. At the time of Timur\u2019s invasion, Depalpur was second to Multan in size and importance. The town, it is believed may have been deserted due to Taimurs\u2019s invasion and drying up old Beas River. The Mughal Emperor Akbar, along with his son Saleem (Jahangir) along with their royal entourage, stayed in Dipalpur when he came to pay homage to Fariduddin Ganjshakar in 1578. Akbar named the corridor Bari Doab by combining the syllables of the names of the two rivers, Beas and Ravi River, that bounded the area.", "start_char_pos": 2870, "end_char_pos": 2876}, {"type": "A", "before": null, "after": "Sufism", "start_char_pos": 2895, "end_char_pos": 2895}, {"type": "A", "before": null, "after": "Hazrat", "start_char_pos": 2949, "end_char_pos": 2949}, {"type": "A", "before": null, "after": "Hazrat", "start_char_pos": 3173, "end_char_pos": 3173}, {"type": "R", "before": "Saheban,", "after": "Sahiban, in which Jati Sahiban came here are prayed,", "start_char_pos": 3327, "end_char_pos": 3335}, {"type": "R", "before": "that Jati Sahiba (Mirza Sahiba) came here and prayed that \"The streets should desert when where my lover Mirza roams about\"", "after": "to that", "start_char_pos": 3377, "end_char_pos": 3500}, {"type": "R", "before": "The Mughal Emperor Akbar, along with his son Saleem and royal entourage, stayed in Dipalpur when he came to pay homage to Farid Ganj Shakar in 1578. Akbar named the corridor Bari Doab by combining the syllables of the names of the two rivers, Beas and Ravi, thatbounded the area. Baba Guru Nanak also stayed in Dipalpur for some time. The ruins of a Gurudwara mark the place.", "after": "A", "start_char_pos": 3503, "end_char_pos": 3878}, {"type": "R", "before": "Saayi", "after": "Saayin", "start_char_pos": 3901, "end_char_pos": 3906}, {"type": "D", "before": "Hazrat baba Fazal Chisti shrine in Kari wala Jagir Near sukh pur.His Urs celebrated every year.", "after": null, "start_char_pos": 4094, "end_char_pos": 4189}, {"type": "R", "before": "Other notable residents", "after": "Mongols The Mongols invaded this part of the country repeatedly and they were checked at Dipalpur by Ghiyas-ud-Din Balban and his son Muhammad Khan, during their last invasion of Punjab in 1285 A.D. Pir Muhammad Khan Mangol (also called Samar Khan) was defeated at Dipalpur but during the pursuit of the retreating Mongols, Muhammad Khan was killed. It is believed that Shahzada Muhammad Khan is laid to rest in a small tomb to the west of the Badshahi Mosque. Conformation from any authentic sources is, however, not available.", "start_char_pos": 4190, "end_char_pos": 4213}, {"type": "R", "before": "Dr. Yasir Imtiaz Khan (born 1983) , scientist", "after": "Notable residents", "start_char_pos": 4214, "end_char_pos": 4259}, {"type": "D", "before": "Bangla Fazilka India", "after": null, "start_char_pos": 4324, "end_char_pos": 4344}], "sents_char_pos": [0, 11, 178, 326, 481, 630, 856, 914, 999, 1109, 1227, 1346, 1379, 1511, 1588, 1810, 1911, 1981, 2050, 2142, 2177, 2259, 2393, 2467, 2582, 2666, 2778, 2833, 2948, 3075, 3159, 3208, 3259, 3502, 3651, 3782, 3837, 3878, 4044, 4093, 4159, 4189]}
+{"doc_id": "7589621", "revision_depth": "1", "before_revision": "Material selection is a step in the process of designing any physical object. In the context of product design, the main goal of material selection is to minimize cost while meeting product performance goals.George E. Dieter (1997). \"Overview of the Materials Selection Process\", ASM Handbook Volume 20: Materials Selection and Design. Systematic selection of the best material for a given application begins with properties and costs of candidate materials. For example, a thermal blanket must have poor thermal conductivity in order to minimize heat transfer for a given temperature difference. Systematic selection for applications requiring multiple criteria is more complex. For example, a rod which should be stiff and light requires a material with high Young's modulus and low density . If the rod will be pulled in tension, the specific modulus, or modulus divided by density , will determine the best material. But because a plate's bending stiffness scales as its thickness cubed , the best material for a stiff and light plate is determined by the cube root of stiffness divided by density . For a stiff beam in bending the material index is . Ashby plots Plot of Young modulus vs density. The colors represent families of materials. An Ashby plot, named for Michael Ashby of Cambridge University, is a scatter plot which displays two or more properties of many materials or classes of materials. These plots are useful to compare the ratio between different properties. For the example of the stiff/light part discussed above would have Young's modulus on one axis and density on the other axis, with one data point on the graph for each candidate material. On such a plot, it is easy to find not only the material with the highest stiffness, or that with the lowest density, but that with the best ratio . Using a log scale on both axes facilitates selection of the material with the best plate stiffness . Plot of Young modulus vs density with log-log scaling. The colors represent families of materials. The first plot on the right shows density and Young's modulus, in a linear scale. The second plot shows the same materials attributes in a log-log scale. Materials families (polymers, foams, metals, etc.) are identified by colors. Cost issues Cost of materials plays a very significant role in their selection. The most straightforward way to weight cost against properties is to develop a monetary metric for properties of parts. For example, life cycle assessment can show that the net present value of reducing the weight of a car by 1 kg averages around $5, so material substitution which reduces the weight of a car can cost up to $5 per kilogram of weight reduction more than the original material. However, the geography- and time-dependence of energy, maintenance and other operating costs, and variation in discount rates and usage patterns (distance driven per year in this example) between individuals, means that there is no single correct number for this. For commercial aircraft, this number is closer to $450/kg, and for spacecraft, launch costs around $20,000/kg dominate selection decisions. Thus as energy prices have increased and technology has improved, automobiles have substituted increasing amounts of light weight magnesium and aluminium alloys for steel, aircraft are substituting carbon fiber reinforced plastic and titanium alloys for aluminium, and satellites have long been made out of exotic composite materials. Example A common method for choosing an appropriate material is an \u201cAshby chart\u201d. By plotting a performance index for a specific case of loading on the Ashby chart, a material with maximum performance can be selected. The performance index takes into consideration the dimensional constraints, material constraints, and free variable constraints of a specific application. The following example will show the how to come up with the performance index and how to plot and interpret the Ashby chart. This examplewill take into consideration a beam that will undergo two different loads with the goal of minimizing weight . The first load is a beam in tension. Figure 1 illustrates this loading. The parameters for the beam can be organized into categories. These categories are material variables, which include density, modulus, and yield stress, free variables which are variables that can change during the loading cycle, for example applied force. The final category is design variables which usually are a limit of how thick the beam can be , how much it can deflect, or any other limiting factor for the specific application. For this loading cycle, the stress in the beam is measured as , where is the load and is the cross sectional area. The weight is measure as , where is the density, and is the length. By looking at the equation, we see that for a fixed length of , the material variablesare and . There is one free variable , , and a variable that needs to be minimized, . In order to find the performance index, an equation for w in terms of fixed and material variables needs to be found. This means that the variable A has to somehow be replaced. By rearranging the axial stress equation , can be represented as . Substituting this into the weight equation, , gives an equation for weight that has only fixed and material variables . The next step is to separate the material variables from all other variables and constants. The equation becomes . Since the goal is to minimize weight, the material variables have to be minimized. This means that has to be minimized, or the inverse equation, has to be maximized. We call the equation that needs to be maximized our performance index. . It is important to note that the performance index is always an equation that needs to be maximized, so inverting an equation that needs to be minimized is necessary . The performance index can then be plotted on the Ashby chart by converting the equation to a log scale. This is done by taking the log of both sides, and plotting it similar to a line with being the y-axis intercept. This means that the higher the intercept, the higher the performance of the material. By moving the line up the Ashby chart, the performance index gets higher. Each materials the line passes through, has the performance index listed on the y-axis. So, moving to the top of the chart while still touching a region of material is where the highest performance will be. The next loading cycle will have a different performance index with a different equation. For example, if you also want to maximize this beam for bending, using the max tensile stress equation of bending , where is the bending moment, is the distance from the neutral axis, and is the moment of inertia. This is shown in Figure 2. Using the weight equation above and solving for the free variables, you arrive at , where is the length and is the height of the beam. This turns the material performance index into . 400px|center|Figure 2. Beam under bending stress. Trying to minimize weight%DIFDELCMD < %DIFDELCMD < %%% By plotting the two performance indices on the same Ashby chart, the maximum performance index of both loading types together will be at the intercept of the two lines. This is shown in figure 3 500px|center|Figure 3. Ashby chart with performance indices plotted for maximum result As seen from figure 3 the two lines intercept near the top of the graph at Technical ceramics and Composites. This will give a performance index of 120 for tensile loading and 15 for bending. When taking into consideration the cost of the engineering ceramics, especially because the intercept is around the Boron carbide, this would not be the optimal case. A better case with lower performance index but more cost effective solutions is around the Engineering Composites near CFRP. References %DIFDELCMD < %DIFDELCMD < %%% External links Cambridge University - Profile of Prof. Michael Ashby", "after_revision": "Material selection is a step in the process of designing any physical object. In the context of product design, the main goal of material selection is to minimize cost while meeting product performance goals.George E. Dieter (1997). \"Overview of the Materials Selection Process\", ASM Handbook Volume 20: Materials Selection and Design. Systematic selection of the best material for a given application begins with properties and costs of candidate materials. For example, a thermal blanket must have poor thermal conductivity in order to minimize heat transfer for a given temperature difference. It is essential that a designer should have a thorough knowledge of the properties of the materials and their behavior under working conditions. Some of the important characteristics of materials are : strength, durability, flexibility, weight, resistance to heat and corrosion, ability to cast, welded or hardened, machinability, electrical conductivity, etc.General Considerations of Machine Design, Mechanical Engineering Community Discussion, retrieved 2018-04-15. Systematic selection for applications requiring multiple criteria is more complex. For example, when the material should be both stiff and light , for a rod a combination of high Young's modulus and low density indicates the best material, whereas for a plate the cube root of stiffness divided by density is the best indicator, since a plate's bending stiffness scales by its thickness cubed . Similarly, again considering both stiffness and lightness, for a rod that will be pulled in tension the specific modulus, or modulus divided by density should be considered, whereas for a beam that will be subject to bending, the material index is the best indicator . Reality often presents limitations, and the utilitarian factor must be taken in consideration. The cost of the ideal material, depending on shape, size and composition, may be prohibitive, and the demand, the commonality of frequently utilized and known items, its characteristics and even the region of the market dictate its availability. Ashby plots Plot of Young 's modulus vs density. The colors represent families of materials. An Ashby plot, named for Michael Ashby of Cambridge University, is a scatter plot which displays two or more properties of many materials or classes of materials. These plots are useful to compare the ratio between different properties. For the example of the stiff/light part discussed above would have Young's modulus on one axis and density on the other axis, with one data point on the graph for each candidate material. On such a plot, it is easy to find not only the material with the highest stiffness, or that with the lowest density, but that with the best ratio . Using a log scale on both axes facilitates selection of the material with the best plate stiffness . Plot of Young 's modulus vs density with log-log scaling. The colors represent families of materials. The first plot on the right shows density and Young's modulus, in a linear scale. The second plot shows the same materials attributes in a log-log scale. Materials families (polymers, foams, metals, etc.) are identified by colors. Thus as energy prices have increased and technology has improved, automobiles have substituted increasing amounts of lightweight magnesium and aluminium alloys for steel, aircraft are substituting carbon fiber reinforced plastic and titanium alloys for aluminium, and satellites have long been made out of exotic composite materials. General method for using an Ashby chart Utilizing an \"Ashby chart\" is a common method for choosing the appropriate material. First, three different sets of variables are identified: Material variables are the inherent properties of a material such as density, modulus, yield stress, and many others. Free variables are quantities that can change during the loading cycle, for example, applied force. Design variables are limits imposed on the design, such as how thick the beam can be or how much it can deflect Next, an equation for the performance index is derived. This equation numerically quantifies how desirable the material will be for a specific situation. By convention, a higher performance index denotes a better material. Lastly, the performance index is plotted on the Ashby chart. Visual inspection reveals the most desirable material. Example of using an Ashby chart In this example, the material will be subject to both tension and bending. Therefore, the optimal material will perform well under both circumstances. Performance index during tension In the first situation the beam experiences two forces: the weight of gravity and tension . The material variables are density and strength . Assume that the length and tension are fixed, making them design variables. Lastly the cross sectional area is a free variable. The objective in this situation is to minimize the weight by choosing a material with the best combination of material variables . Figure 1 illustrates this loading. The stress in the beam is measured as whereas weight is described by . Deriving a performance index requires that all free variables are removed, leaving only design variables and material variables. In this case that means that must be removed. The axial stress equation can be rearranged to give . Substituting this into the weight equation gives . Next, the material variables and design variables are grouped separately, giving . Since both and are fixed, and since the goal is to minimize , then the ratio should be minimized. By convention, however, the performance index is always a quantity which should be maximized. Therefore, the resulting equation is Performance index during bending Next, suppose that the material is also subjected to bending forces. The max tensile stress equation of bending is , where is the bending moment, is the distance from the neutral axis, and is the moment of inertia. This is shown in Figure 2. Using the weight equation above and solving for the free variables, the solution arrived at is , where is the length and is the height of the beam. Assuming that , , and are fixed design variables, the performance index for bending becomes . 400px|center|Figure 2. Beam under bending stress. Trying to minimize weight Selecting the best material overall At this point two performance indices that have been derived: for tension and for bending . The first step is to create a log-log plot and add all known materials in the appropriate locations. However, the performance index equations must be modified before being plotted on the log-log graph. For the tension performance equation , the first step is to take the log of both sides. The resulting equation can be rearranged to give . Note that this follows the format of , making it linear on a log-log graph. Similarly, the y-intercept is the log of . Thus, the fixed value of for tension in Figure 3 is 0.1 . The bending performance equation can be treated similarly. Using the power property of logarithms it can be derived that . The value for for bending is \u2248 0.0316 in Figure 3. Finally, both lines are plotted on the Ashby chart. 500px|center|Figure 3. Ashby chart with performance indices plotted for maximum result First, the best bending materials can be found by examining which regions are higher on the graph than the bending line. In this case, some of the foams (blue) and technical ceramics (pink) are higher than the line. Therefore those would be the best bending materials. In contrast, materials which are far below the line (like metals in the bottom-right of the gray region) would be the worst materials. Lastly, the tension line can be used to \"break the tie\" between foams and technical ceramics. Since technical ceramics are the only material which is located higher than the tension line, then the best-performing tension materials are technical ceramics. Therefore, the overall best material is a technical ceramics in the top-left of the pink region such as boron carbide . Numerically understanding the chart The performance index can then be plotted on the Ashby chart by converting the equation to a log scale. This is done by taking the log of both sides, and plotting it similar to a line with being the y-axis intercept. This means that the higher the intercept, the higher the performance of the material. By moving the line up the Ashby chart, the performance index gets higher. Each materials the line passes through, has the performance index listed on the y-axis. So, moving to the top of the chart while still touching a region of material is where the highest performance will be. %DIFDELCMD < %DIFDELCMD < %%% As seen from figure 3 the two lines intercept near the top of the graph at Technical ceramics and Composites. This will give a performance index of 120 for tensile loading and 15 for bending. When taking into consideration the cost of the engineering ceramics, especially because the intercept is around the Boron carbide, this would not be the optimal case. A better case with lower performance index but more cost effective solutions is around the Engineering Composites near CFRP. References %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "A", "before": null, "after": "It is essential that a designer should have a thorough knowledge of the properties of the materials and their behavior under working conditions. Some of the important characteristics of materials are : strength, durability, flexibility, weight, resistance to heat and corrosion, ability to cast, welded or hardened, machinability, electrical conductivity, etc.General Considerations of Machine Design, Mechanical Engineering Community", "start_char_pos": 597, "end_char_pos": 597}, {"type": "A", "before": null, "after": "Discussion, retrieved 2018-04-15.", "start_char_pos": 598, "end_char_pos": 598}, {"type": "R", "before": "a rod which should be", "after": "when the material should be both", "start_char_pos": 695, "end_char_pos": 716}, {"type": "R", "before": "requires a material with", "after": ", for a rod a combination of", "start_char_pos": 733, "end_char_pos": 757}, {"type": "R", "before": ". If the rod will be pulled in tension, the specific modulus, or modulus", "after": "indicates the best material, whereas for a plate the cube root of stiffness", "start_char_pos": 795, "end_char_pos": 867}, {"type": "R", "before": ", will determine the best material. But because", "after": "is the best indicator, since", "start_char_pos": 887, "end_char_pos": 934}, {"type": "R", "before": "as", "after": "by", "start_char_pos": 970, "end_char_pos": 972}, {"type": "R", "before": ", the best material for a stiff and light plate is determined by the cube root of stiffness", "after": ". Similarly, again considering both stiffness and lightness, for a rod that will be pulled in tension the specific modulus, or modulus", "start_char_pos": 993, "end_char_pos": 1084}, {"type": "R", "before": ". For a stiff beam in bending", "after": "should be considered, whereas for a beam that will be subject to bending,", "start_char_pos": 1104, "end_char_pos": 1133}, {"type": "A", "before": null, "after": "the best indicator", "start_char_pos": 1156, "end_char_pos": 1156}, {"type": "A", "before": null, "after": "Reality often presents limitations, and the utilitarian factor must be taken in consideration. The cost of the ideal material, depending on shape, size and composition, may be prohibitive, and the demand, the commonality of frequently utilized and known items, its characteristics and even the region of the market dictate its availability.", "start_char_pos": 1159, "end_char_pos": 1159}, {"type": "A", "before": null, "after": "'s", "start_char_pos": 1186, "end_char_pos": 1186}, {"type": "A", "before": null, "after": "'s", "start_char_pos": 1940, "end_char_pos": 1940}, {"type": "D", "before": "Cost issues Cost of materials plays a very significant role in their selection. The most straightforward way to weight cost against properties is to develop a monetary metric for properties of parts. For example, life cycle assessment can show that the net present value of reducing the weight of a car by 1 kg averages around $5, so material substitution which reduces the weight of a car can cost up to $5 per kilogram of weight reduction more than the original material. However, the geography- and time-dependence of energy, maintenance and other operating costs, and variation in discount rates and usage patterns (distance driven per year in this example) between individuals, means that there is no single correct number for this. For commercial aircraft, this number is closer to $450/kg, and for spacecraft, launch costs around $20,000/kg dominate selection decisions.", "after": null, "start_char_pos": 2257, "end_char_pos": 3134}, {"type": "R", "before": "light weight", "after": "lightweight", "start_char_pos": 3252, "end_char_pos": 3264}, {"type": "R", "before": "Example A common method for choosing an appropriate material is an \u201cAshby chart\u201d. By plotting a performance index for a specific case of loading on", "after": "General method for using an Ashby chart Utilizing an \"Ashby chart\" is a common method for choosing the appropriate material. First, three different sets of variables are identified: Material variables are the inherent properties of a material such as density, modulus, yield stress, and many others. Free variables are quantities that can change during the loading cycle, for example, applied force. Design variables are limits imposed on the design, such as how thick the beam can be or how much it can deflect Next, an equation for the performance index is derived. This equation numerically quantifies how desirable the material will be for a specific situation. By convention, a higher performance index denotes a better material. Lastly, the performance index is plotted on", "start_char_pos": 3470, "end_char_pos": 3617}, {"type": "D", "before": "Ashby chart, a material with maximum performance can be selected. The performance index takes into consideration the dimensional constraints, material constraints, and free variable constraints of a specific application. The following example will show the how to come up with the performance index and how to plot and interpret the", "after": null, "start_char_pos": 3622, "end_char_pos": 3954}, {"type": "A", "before": null, "after": "Visual inspection reveals the most desirable material.", "start_char_pos": 3968, "end_char_pos": 3968}, {"type": "R", "before": "This examplewill take into consideration a beam that will undergo two different loads with the goal of minimizing weight", "after": "Example of using an Ashby chart In this example, the material will be subject to both tension and bending. Therefore, the optimal material will perform well under both circumstances.", "start_char_pos": 3969, "end_char_pos": 4089}, {"type": "A", "before": null, "after": "Performance index during tension In the first situation the beam experiences two forces: the weight of gravity and tension . The material variables are density and strength . Assume that the length and tension are fixed, making them design variables. Lastly the cross sectional area is a free variable. The objective in this situation is to minimize the weight by choosing a material with the best combination of material variables", "start_char_pos": 4090, "end_char_pos": 4090}, {"type": "D", "before": "The first load is a beam in tension.", "after": null, "start_char_pos": 4093, "end_char_pos": 4129}, {"type": "R", "before": "parameters for the beam can be organized into categories. These categories are material variables, which include density, modulus, and yield stress, free variables which are variables that can change during the loading cycle, for example applied force. The final category is design variables which usually are a limit of how thick the beam can be , how much it can deflect, or any other limiting factor for the specific application.", "after": "stress in the beam is measured as whereas weight is described by . Deriving a performance index requires that all free variables are removed, leaving only design variables and material variables. In this case that means that must be removed. The axial stress equation can be rearranged to give . Substituting this into the weight equation gives . Next, the material variables and design variables are grouped separately, giving .", "start_char_pos": 4169, "end_char_pos": 4601}, {"type": "R", "before": "For this loading cycle, the stress in the beam is measured as , where is the load and is the cross sectional area. The weight is measure as", "after": "Since both and are fixed, and since the goal is to minimize , then the ratio should be minimized. By convention, however, the performance index is always a quantity which should be maximized. Therefore, the resulting equation is", "start_char_pos": 4602, "end_char_pos": 4741}, {"type": "A", "before": null, "after": "Performance index during bending Next, suppose that the material is also subjected to bending forces. The max tensile stress equation of bending is", "start_char_pos": 4742, "end_char_pos": 4742}, {"type": "R", "before": "density,", "after": "bending moment, is the distance from the neutral axis,", "start_char_pos": 4758, "end_char_pos": 4766}, {"type": "R", "before": "length. By looking at the equation, we see that for a fixed length of , the material variablesare and . There is one free variable", "after": "moment of inertia. This is shown in Figure 2. Using the weight equation above and solving for the free variables, the solution arrived at is , where is the length and is the height of the beam. Assuming that", "start_char_pos": 4778, "end_char_pos": 4908}, {"type": "R", "before": "a variable that needs to be minimized,", "after": "are fixed design variables, the performance index for bending becomes", "start_char_pos": 4917, "end_char_pos": 4955}, {"type": "R", "before": "In order to find the performance index, an equation for w in terms of fixed and material variables needs to be found. This means that the variable A has to somehow be replaced. By rearranging the axial stress equation , can be represented as . Substituting this into the weight equation, , gives an equation for weight that has only fixed and material variables", "after": "400px|center|Figure 2. Beam under bending stress. Trying to minimize weight", "start_char_pos": 4958, "end_char_pos": 5319}, {"type": "A", "before": null, "after": "Selecting the best material overall At this point two performance indices that have been derived: for tension and for bending . The first step is to create a log-log plot and add all known materials in the appropriate locations. However, the performance index equations must be modified before being plotted on the log-log graph.", "start_char_pos": 5320, "end_char_pos": 5320}, {"type": "A", "before": null, "after": "For the tension performance equation , the first step is to take the log of both sides. The resulting equation can be rearranged to give . Note that this follows the format of , making it linear on a log-log graph. Similarly, the y-intercept is the log of . Thus, the fixed value of for tension in Figure 3 is 0.1", "start_char_pos": 5321, "end_char_pos": 5321}, {"type": "R", "before": "next step is to separate the material variables from all other variables and constants. The equation becomes . Since the goal is to minimize weight,", "after": "bending performance equation can be treated similarly. Using the power property of logarithms it can be derived that . The value for for bending is \u2248 0.0316 in Figure 3. Finally, both lines are plotted on the Ashby chart.", "start_char_pos": 5328, "end_char_pos": 5476}, {"type": "A", "before": null, "after": "500px|center|Figure 3. Ashby chart with performance indices plotted for maximum result", "start_char_pos": 5477, "end_char_pos": 5477}, {"type": "A", "before": null, "after": "First,", "start_char_pos": 5478, "end_char_pos": 5478}, {"type": "R", "before": "material variables have to be minimized. This means that has to be minimized, or the inverse equation, has to be maximized. We call the equation that needs to be maximized our performance index. . It is important to note that the performance index is always an equation that needs to be maximized, so inverting an equation that needs to be minimized is necessary", "after": "best bending materials can be found by examining which regions are higher on the graph than the bending line. In this case, some of the foams (blue) and technical ceramics (pink) are higher than the line. Therefore those would be the best bending materials. In contrast, materials which are far below the line (like metals in the bottom-right of the gray region) would be the worst materials.", "start_char_pos": 5483, "end_char_pos": 5845}, {"type": "A", "before": null, "after": "Lastly, the tension line can be used to \"break the tie\" between foams and technical ceramics. Since technical ceramics are the only material which is located higher than the tension line, then the best-performing tension materials are technical ceramics. Therefore, the overall best material is a technical ceramics in the top-left of the pink region such as boron carbide", "start_char_pos": 5846, "end_char_pos": 5846}, {"type": "A", "before": null, "after": "Numerically understanding the chart", "start_char_pos": 5849, "end_char_pos": 5849}, {"type": "D", "before": "The next loading cycle will have a different performance index with a different equation. For example, if you also want to maximize this beam for bending, using the max tensile stress equation of bending , where is the bending moment, is the distance from the neutral axis, and is the moment of inertia. This is shown in Figure 2. Using the weight equation above and solving for the free variables, you arrive at , where is the length and is the height of the beam. This turns the material performance index into .", "after": null, "start_char_pos": 6434, "end_char_pos": 6948}, {"type": "D", "before": "400px|center|Figure 2. Beam under bending stress. Trying to minimize weight", "after": null, "start_char_pos": 6949, "end_char_pos": 7024}, {"type": "D", "before": "By plotting the two performance indices on the same Ashby chart, the maximum performance index of both loading types together will be at the intercept of the two lines. This is shown in figure 3", "after": null, "start_char_pos": 7054, "end_char_pos": 7248}, {"type": "D", "before": "500px|center|Figure 3. Ashby chart with performance indices plotted for maximum result", "after": null, "start_char_pos": 7249, "end_char_pos": 7335}, {"type": "D", "before": "External links Cambridge University - Profile of Prof. Michael Ashby", "after": null, "start_char_pos": 7861, "end_char_pos": 7929}], "sents_char_pos": [0, 77, 208, 232, 335, 458, 596, 681, 796, 922, 1105, 1206, 1250, 1413, 1487, 1675, 1824, 1981, 2025, 2107, 2179, 2256, 2336, 2456, 2730, 2994, 3134, 3469, 3551, 3687, 3842, 3967, 4092, 4129, 4164, 4226, 4421, 4601, 4716, 4785, 4881, 5075, 5134, 5323, 5415, 5438, 5523, 5606, 5848, 5953, 6066, 6152, 6226, 6314, 6433, 6523, 6737, 6899, 6998, 7222, 7445, 7527, 7694, 7819, 7915]}
+{"doc_id": "7694809", "revision_depth": "1", "before_revision": "Comprehensive sex maternal porno legue champion espace mai black burn institution schools institut education (ISIAM ) is a sex transfert education instruction method sportive halowin mac blade based on-curriculum that aims to give students blaide the knowledge, attitudes, skills, and values to make appropriate and healthy choices in their sexual transvers liveslines . The intention is that this understanding will prevent students from contracting sexually transmitted infections, such as HIV and HPV. CSE is also designed with the intention of reducing unplanned and unwanted pregnancies, as well as lowering rates of domestic and sexual violence, thus contributing to a healthier society, both Programme Logiciel Install Disinstall Internet Zip 2021 Intranet Zip 2022 Web sites Bloc Existe physically sex and mentallysex . Comprehensive sex education ultimately promotes sexual absence abstinence as the safest sexual choice for young people. However, ESEA curriculums and teachers are still committed to teaching students about topics connected to future sexual porno slip activity, such as age of consent page , safe sex, contraception such as birth work control pills, consoms , and the ending of pregnancy, when conception does occur, through abortion. This also includes discussions which promote safe behaviors, such as communicating with partners and seeking testing for sexually transmitted infections. Additionally, comprehensive sex education curricula may include discussions surrounding pregnancy outcomes such as parenting, adoption, and abortion. Some states have introduced bills to the legislature that would require all pre-existing sex trajedique education suplimentaire pornomatisation phisique curricula Vita in public schools to be fully comprehensive and inclusive. The most widely agreed benefit of using comprehensive sex volontaire education over abstinence-only sex gay education is tha ESEA acknowledges the student population will be sexually auxilaire boxing stars man and woman active activity industry bloc mecanics in their future. By acknowledging this, ESEA can encourage students to plan ahead to make the healthiest possible sexual decisions. This ideology of arming students to most successfully survive their future sexual experiences underlies the majority of topics within CSE, including various methods of contraception and refusal skills. History As of 2019, sex bonne education alimantaire in the United States to the United Germany became mandated on a state starters level10. It is up to each state, district, and school board to determine the implementation of federal for special policy piracy and bounds for sex maternal education. 24 out of the 50 U.S. states and the District of Columbia mandate sex education and 34 states mandate HIV education. Where sex education is mandated, there is no federal policy requiring the instruction of comprehensive sex education. In prior years under the Bush administration, there was strong support in congress by Conservative Republicans for the sanction of abstinence-only-until-marriage sex essence bovu coff\u00e9 and paquet cigar\u00e9tte education. Under President Obama's administration, abstinence-only-until-couple-marriage-male-female-sex-education-schools was opposed and suggested to be eliminated. Under President for Bill Clinton Trump's administration, federal agenda has reverted to supporting an abstinence approach. The Centers for Disease Control and Prevention sexual 's 2014 School Health Policies and Practices Study found that on average high school courses require 6.2 hours of time taught class time on humanity sexuality, but only 4 hours or less on HIV, other sexually transmitted infections and pregnancy prevention.", "after_revision": "Comprehensive sex education (CSE ) is a sex education instruction method based on-curriculum that aims to give students the knowledge, attitudes, skills, and values to make appropriate and healthy choices in their sexual lives . The intention is that this understanding will prevent students from contracting sexually transmitted infections, such as HIV and HPV. CSE is also designed with the intention of reducing unplanned and unwanted pregnancies, as well as lowering rates of domestic and sexual violence, thus contributing to a healthier society, both physically and mentally . Comprehensive sex education ultimately promotes sexual abstinence as the safest sexual choice for young people. However, CSE curriculums and teachers are still committed to teaching students about topics connected to future sexual activity, such as age of consent , safe sex, contraception such as birth control pills, condoms , and the ending of pregnancy, when conception does occur, through abortion. This also includes discussions which promote safe behaviors, such as communicating with partners and seeking testing for sexually transmitted infections. Additionally, comprehensive sex education curricula may include discussions surrounding pregnancy outcomes such as parenting, adoption, and abortion. Some states have introduced bills to the legislature that would require all pre-existing sex education curricula in public schools to be fully comprehensive and inclusive. The most widely agreed benefit of using comprehensive sex education over abstinence-only sex education is that CSE acknowledges the student population will be sexually active in their future. By acknowledging this, CSE can encourage students to plan ahead to make the healthiest possible sexual decisions. This ideology of arming students to most successfully survive their future sexual experiences underlies the majority of topics within CSE, including various methods of contraception and refusal skills. History As of 2019, sex education in the United States became mandated on a state level. It is up to each state, district, and school board to determine the implementation of federal policy and funds for sex education. 24 out of the 50 U.S. states and the District of Columbia mandate sex education and 34 states mandate HIV education. Where sex education is mandated, there is no federal policy requiring the instruction of comprehensive sex education. In prior years under the Bush administration, there was strong support in congress by Conservative Republicans for the sanction of abstinence-only-until-marriage sex education. Under President Obama's administration, abstinence-only-until-marriage sex education was opposed and suggested to be eliminated. Under President Trump's administration, federal agenda has reverted to supporting an abstinence approach. The Centers for Disease Control and Prevention 's 2014 School Health Policies and Practices Study found that on average high school courses require 6.2 hours of taught class time on human sexuality, but only 4 hours or less on HIV, other sexually transmitted infections and pregnancy prevention.", "edit_actions": [{"type": "R", "before": "maternal porno legue champion espace mai black burn institution schools institut education (ISIAM", "after": "education (CSE", "start_char_pos": 18, "end_char_pos": 115}, {"type": "D", "before": "transfert", "after": null, "start_char_pos": 127, "end_char_pos": 136}, {"type": "D", "before": "sportive halowin mac blade", "after": null, "start_char_pos": 166, "end_char_pos": 192}, {"type": "D", "before": "blaide", "after": null, "start_char_pos": 240, "end_char_pos": 246}, {"type": "R", "before": "transvers liveslines", "after": "lives", "start_char_pos": 348, "end_char_pos": 368}, {"type": "D", "before": "Programme Logiciel Install Disinstall Internet Zip 2021", "after": null, "start_char_pos": 699, "end_char_pos": 754}, {"type": "R", "before": "Intranet Zip 2022 Web sites Bloc Existe physically sex and mentallysex", "after": "physically and mentally", "start_char_pos": 755, "end_char_pos": 825}, {"type": "D", "before": "absence", "after": null, "start_char_pos": 883, "end_char_pos": 890}, {"type": "R", "before": "ESEA", "after": "CSE", "start_char_pos": 957, "end_char_pos": 961}, {"type": "D", "before": "porno slip", "after": null, "start_char_pos": 1068, "end_char_pos": 1078}, {"type": "D", "before": "page", "after": null, "start_char_pos": 1112, "end_char_pos": 1116}, {"type": "D", "before": "work", "after": null, "start_char_pos": 1157, "end_char_pos": 1161}, {"type": "R", "before": "consoms", "after": "condoms", "start_char_pos": 1177, "end_char_pos": 1184}, {"type": "R", "before": "trajedique education suplimentaire pornomatisation phisique curricula Vita", "after": "education curricula", "start_char_pos": 1659, "end_char_pos": 1733}, {"type": "D", "before": "volontaire", "after": null, "start_char_pos": 1851, "end_char_pos": 1861}, {"type": "R", "before": "gay education is tha ESEA", "after": "education is that CSE", "start_char_pos": 1897, "end_char_pos": 1922}, {"type": "R", "before": "auxilaire boxing stars man and woman active activity industry bloc mecanics", "after": "active", "start_char_pos": 1976, "end_char_pos": 2051}, {"type": "R", "before": "ESEA", "after": "CSE", "start_char_pos": 2092, "end_char_pos": 2096}, {"type": "R", "before": "bonne education alimantaire", "after": "education", "start_char_pos": 2410, "end_char_pos": 2437}, {"type": "D", "before": "to the United Germany", "after": null, "start_char_pos": 2459, "end_char_pos": 2480}, {"type": "R", "before": "starters level10.", "after": "level.", "start_char_pos": 2508, "end_char_pos": 2525}, {"type": "R", "before": "for special policy piracy and bounds for sex maternal", "after": "policy and funds for sex", "start_char_pos": 2620, "end_char_pos": 2673}, {"type": "D", "before": "essence bovu coff\u00e9 and paquet cigar\u00e9tte", "after": null, "start_char_pos": 3086, "end_char_pos": 3125}, {"type": "R", "before": "abstinence-only-until-couple-marriage-male-female-sex-education-schools", "after": "abstinence-only-until-marriage sex education", "start_char_pos": 3177, "end_char_pos": 3248}, {"type": "D", "before": "for Bill Clinton", "after": null, "start_char_pos": 3309, "end_char_pos": 3325}, {"type": "D", "before": "sexual", "after": null, "start_char_pos": 3463, "end_char_pos": 3469}, {"type": "D", "before": "time", "after": null, "start_char_pos": 3584, "end_char_pos": 3588}, {"type": "R", "before": "humanity", "after": "human", "start_char_pos": 3610, "end_char_pos": 3618}], "sents_char_pos": [0, 370, 504, 947, 1261, 1415, 1565, 1792, 2068, 2183, 2385, 2525, 2684, 2801, 2919, 3136, 3292, 3415]}
+{"doc_id": "8139142", "revision_depth": "1", "before_revision": "On January 23, 1927, at the joint meeting of the First All-Union Congress of Aviakhim and the Second Plenary Session of the Central Council of the Society for the Assistance of the Defense on the report of the People's Commissar for Military and Naval Affairs Kliment Voroshilov, it was decided to merge the two societies into one under the name : Aviakhim-OSO. Over time, it was renamed to the \"Society for Assistance to the Defense and Aviation-Chemical Construction of the Soviet Union\", abbreviated Osoaviakhim of the Soviet Union. On February 10, 1927, the first conference of the Moscow city organization of Osoaviakhim took place. In 1931, the All-Union Physical Culture Complex \"Ready for Labour and Defense of the Soviet Union\" was introduced in the country. In 1932, at the Moscow Aviation Plant No. 22, on the initiative of the Osoaviakhim and Komsomol organizations, the country's first public school was created , which trained pilots and other aviation specialists for the job. It had six sections: flight, glider, aircraft engine, parachute, glisser, model aircraft and a group for the design and construction of sports aircraft. On October 29, 1932, the Presidium of the Central Council of Osoaviakhim of the Soviet Union and the Russian Socialist Federal Soviet Republic approved the provision on the creation of the title Voroshilov Shooter, and on December 29, 1932, the badge Voroshilov Shooter. The magazine \"Voroshilov Shooter\" begins to be published . In 1933, the first parachute squad was created at Krasnaya Presnya at the Bolshevik confectionery factory, which laid the foundation for mass parachuting in the country. At the factory \"Red Manufactory\" , the country's first female parachute sanitary squad was organized, which included 20 employees of the All-Union Central Council of Trade Unions, the Central Committee of the All-Union Leninist Communist Youth Union, the Central Council of Osoaviakhim and approved the collective title and sign \"Fortress of Defense\". It was awarded to the teams of factories and factories, which, with the successful implementation of production plans, achieved widespread youth engagement in military affairs , and the development of physical education. In the autumn of 1934, the country's first club of Voroshilov Shooters opened in the Bauman district. This club was honored to represent the Defense Society for the first time at international competitions \u2013 the teams of the Voroshilov Riflemen Club and the team of the Portsmouth Rifle Club of the United States met. Muscovites won , knocking out 207 points more than American shooters . On August 13, 1934, Moscow sportswoman Nina K\u00e1mneva made a record parachute jump. She left the plane at an altitude of 3 thousand meters and opened a parachute 200 meters from the ground. On September 20, 1934, in the newspaper of the Defense Society \"On Guard\" published the standards of the complex \"Ready for Air Defense and Chemical Defense\". On August 1, 1936, the standards \"Ready for Air Defense and Chemical Defense\" for the Voroshilov Shooter badge of the 2nd stage were needed to be carried out only from a combat rifle. At the first All-Union shooting competitions of pioneers and schoolchildren \u2013 young Voroshilov shooters , Muscovites were the first in the team standings. The sign of Osoaviakhim on the facade of house 17 on Polozov street in Saint Petersburg. On January 28, 1937, the Presidium of the Central Council of Osoaviakhim introduced standards for the collective mark \"Ready for Air Defense and Chemical Defense\" for the primary organizations of the Residential Home Society, and at the beginning of next year, the standards for primary Osoaviakhim organizations of educational institutions were approved. The sign was wall mounted and hung on the facades of buildings. The first in Moscow to pass the standards for the collective mark \"Ready for Air Defense and Chemical Defense\" was Institute of Cooperative Trade. On May 8, 1938, the Moscow Osoaviakhim member Mikhail Zyurin set the first world record of Soviet aircraft models officially recognized by the International Aviation Federation. His model, equipped with a gasoline engine, flew in a straight line 21 km, 857 meters . In 1939, in the Moscow city organization of Osoaviakhim there were 23 regional organizations of the Society, a record-glider detachment, the Rostokinsky regional glider club, Baumansky, Leningradsky, Leninsky, Oktyabrsky, Proletarsky, Sverdlovsky, Stalinsky, Tagansky regional flying clubs, aero club Mosmetrostroy, city air and chemical Defense school, city maritime school, city rifle school, Osoaviakhim camps \"Cheryomushki\", \"Veshnyaki\", \"Pushkinskoe\". On August 27, 1940, the Central Council of Osoaviakhim adopted a decree \"On the Restructuring of Military Training of the Members of Osoaviakhim\". The transition from a circle system to classes in training units began. Groups, teams, squads were created. In 1939\u20131940, 3,248 self-defense groups were trained in the Osoaviakhim organizations of the capital, 1,138 air defense and anti-chemical defense posts were created, 6 thousand commanders of self-defense posts and groups . In 1940, over 770 thousand residents of the city were covered by preparations for air defense and chemical defense. At the beginning of 1941, in Moscow there were more than 4 thousand groups, over 100 teams, about 230 detachments . They trained 81 thousand people. In July 1941, the Council of People's Commissars of the Soviet Union adopted a decree that charged Osoaviakhim with the responsibility for organizing universal mandatory preparation of the population for air defense. On September 17, 1941, the Resolution of the State Defense Committee \"On Universal Compulsory Military Education of Citizens of the Soviet Union\" (16 to 50 years old) was issued. In January 1942, training and shooting centers were deployed in all regional organizations of the Society. Over the course of the year, over 25 thousand specialists were trained in it \u2013 machine gunners, snipers, tank destroyers, and Voroshilov riflemen. Each training and shooting center had a summer and winter camp, a firing range with a shooting distance of at least 800 meters , a ski base, training fields, engineering and sapper towns, training rooms. The main base of training and shooting centers of the Moscow city organization of Osoaviakhim were Mytishchi and Rumyantsev training grounds meeting the above requirements. At the beginning of 1943, the primary organizations of Osoaviakhim began to create units, platoons, companies, battalions, which became the main organizational form of military training and military education of citizens. In 1941\u20131945, during the years of World War II, the following educational and sports organizations of the city council of Osoaviakhim operated in Moscow: 1st and 2nd training and shooting centers, sniper school, naval school, 1st, 2nd and 3rd air defense and chemical defense schools, 1st and 2nd communication schools, car club, Central communications school, Radio House, glider club, cavalry school, service dog club, Mytishchi and Rumyantsev training grounds. The Moscow city organization of Osoaviakhim trained more than 383 thousand military specialists, including snipers \u2013 11233, signalmen \u2013 6332, easel machine gunners \u2013 23005, manual machine gunners \u2013 42671, submachine gunners \u2013 33102, mortar men \u2013 15283, tank destroyers \u2013 12286, armored gunners \u2013 668. The service dog breeding club raised, trained and transferred 1825 service dogs to the Red Army. More than 3 million Muscovites received training in air defense and chemical defense at Osoaviakhim organizations. Moscow Osoaviakhim members raised 3 million 350 thousand rubles of funds for which a convoy of KV tanks was built and more than 1 million rubles for the construction of six IL-2 attack aircraft. The activities of the Moscow city organization of Osoaviakhim during the Great Patriotic War were highly appreciated by the Central Council of the Special Meeting, which awarded it with the Red Banner that was forever left in the capital's organization of the Society. At the beginning of 1945, in Moscow, in the constantly operating formations of Osoaviakhim, there were 183 companies , consolidated into 41 battalions. On June 26, 28, 29, 1948, the first Moscow city conferences of the Voluntary Army Assistance Society, the Voluntary Aviation Assistance Society, and the Voluntary Fleet Assistance Society were held . The 1st and 2nd naval clubs and the city naval training center worked in Moscow. Since 1951, the unified All-Union Voluntary Society for Assisting the Army, Aviation and Navy \u2013 DOSAAF appeared .", "after_revision": "On January 23, 1927, at the joint meeting of the First All-Union Congress of Aviakhim and the Second Plenary Session of the Central Council of the Society for the Assistance of the Defense on the report of the People's Commissar for Military and Naval Affairs Kliment Voroshilov, it was decided to merge the two societies into one under the name Aviakhim-OSO. Over time, it was renamed to the \"Society for Assistance to the Defense and Aviation-Chemical Construction of the Soviet Union\", abbreviated Osoaviakhim of the Soviet Union. On February 10, 1927, Osoaviakhim's first conference in Moscow took place. In 1931, the All-Union Physical Culture Complex program \"Ready for Labour and Defense of the Soviet Union\" was introduced in the country. In 1932, at Moscow Aviation Plant No. 22, the country's first public aviation school was created by the Osoaviakhim and Komsomol organizations , which trained pilots and other aviation specialists for the job. It had six sections: flight, glider, aircraft engine, parachute, glisser, model aircraft , and a group for the design and construction of sports aircraft. On October 29, 1932, the Presidium of the Central Council of Osoaviakhim of the Soviet Union and the Russian Socialist Federal Soviet Republic approved the provision on the creation of the title Voroshilov Shooter, and on December 29, 1932, the badge Voroshilov Shooter. The magazine \"Voroshilov Shooter\" started publication . In 1933, the first parachute squad was created at Krasnaya Presnya in the Bolshevik confectionery factory, which laid the foundation for mass parachuting in the country. At the factory Red Manufactory , the country's first female parachute sanitary squad was organized, which included 20 employees of the All-Union Central Council of Trade Unions, the Central Committee of the All-Union Leninist Communist Youth Union, and the Central Council of Osoaviakhim . The squad and factory received the collective title and sign \"Fortress of Defense\". It was awarded to teams of factories and factories, which, with the successful implementation of production plans, achieved widespread youth engagement in military affairs and the development of physical education. In the autumn of 1934, the country's first club of Voroshilov Shooters opened in the Bauman district. This club was honored to represent the Defense Society for the first time at international competitions \u2013 the teams of the Voroshilov Riflemen Club and the team of the Portsmouth Rifle Club of the United States met. Muscovites won against American shooters by 207 points . On August 13, 1934, Moscow sportswoman Nina K\u00e1mneva made a record parachute jump. She left the plane at an altitude of 3 ,000 m and opened a parachute 200 m from the ground. On September 20, 1934, in the newspaper of the Defense Society , On Guard, published the standards of the complex \"Ready for Air Defense and Chemical Defense\". On August 1, 1936, the standards \"Ready for Air Defense and Chemical Defense\" for the Voroshilov Shooter badge of the 2nd stage required the use of a combat rifle. At the first All-Union shooting competitions of pioneers and schoolchildren \u2013 young Voroshilov shooters and Muscovites were the first in the team standings. The sign of Osoaviakhim on the facade of house 17 on Polozov street in Saint Petersburg. On January 28, 1937, the Presidium of the Central Council of Osoaviakhim introduced standards for the collective mark \"Ready for Air Defense and Chemical Defense\" for the primary organizations of the Residential Home Society, and at the beginning of next year, the standards for primary Osoaviakhim organizations of educational institutions were approved. The sign was wall-mounted and hung on the facades of buildings. The first organization in Moscow to pass \"Ready for Air Defense and Chemical Defense\" was the Institute of Cooperative Trade. On May 8, 1938, the Moscow Osoaviakhim member Mikhail Zyurin set the first world record of Soviet aircraft models that was officially recognized by the International Aviation Federation. His model, equipped with a gasoline engine, flew 21.857 km in a straight line . In 1939, the Osoaviakhim in Moscow had 23 regional organizations of the Society, a record-glider detachment, the Rostokinsky regional glider club, Baumansky, Leningradsky, Leninsky, Oktyabrsky, Proletarsky, Sverdlovsky, Stalinsky, Tagansky regional flying clubs, aero club Mosmetrostroy, city air and chemical Defense school, city maritime school, city rifle school, and the Osoaviakhim camps \"Cheryomushki\", \"Veshnyaki\", \"Pushkinskoe\". On August 27, 1940, the Central Council of Osoaviakhim adopted a decree : \"On the Restructuring of Military Training of the Members of Osoaviakhim\". The transition from a circle system to classes in training units began. Groups, teams, and squads were created. In 1939\u20131940, 3,248 self-defense groups were trained in the Osoaviakhim organizations of the capital, 1,138 air defense and anti-chemical defense posts were created, 6 ,000 commanders of self-defense posts and groups were assigned . In 1940, over 770 thousand residents of the city were prepared for air defense and chemical defense. At the beginning of 1941, in Moscow there were more than 4 ,000 groups, over 100 teams, and about 230 detachments in the Osoaviakhim . They trained 81 thousand people. In July 1941, the Council of People's Commissars of the Soviet Union charged Osoaviakhim with the responsibility to organize universal mandatory preparation of the population for air defense. On September 17, 1941, the Resolution of the State Defense Committee , \"On Universal Compulsory Military Education of Citizens of the Soviet Union\" (16 to 50 years old) , was issued. In January 1942, training and shooting centers were deployed in all regional organizations of the Society. Over the course of the year, over 25 ,000 specialists were trained \u2013 machine gunners, snipers, tank destroyers, and Voroshilov riflemen. Each training and shooting center had a summer and winter camp, a firing range with a shooting distance of at least 800 m , a ski base, training fields, engineering and sapper towns, and training rooms. The main base of training and shooting centers of the Moscow city organization of Osoaviakhim were Mytishchi and Rumyantsev training grounds meeting the above requirements. At the beginning of 1943, the primary organizations of Osoaviakhim began to create units, platoons, companies, and battalions, which became the main organizational form of military training and military education of citizens. In 1941\u20131945, during World War II, the following educational and sports organizations of the city council of Osoaviakhim operated in Moscow: 1st and 2nd training and shooting centers, sniper school, naval school, 1st, 2nd and 3rd air defense and chemical defense schools, 1st and 2nd communication schools, car club, a central communications school, radio House, glider club, cavalry school, service dog club, and the Mytishchi and Rumyantsev training grounds. The Osoaviakhim in Moscow trained more than 383 thousand military specialists, including snipers \u2013 11,233, signalmen \u2013 6,332, easel machine gunners \u2013 23,005, manual machine gunners \u2013 42,671, submachine gunners \u2013 33,102, mortar men \u2013 15,283, tank destroyers \u2013 12,286, and armored gunners \u2013 668. The service dog breeding club raised, trained , and transferred 1,825 service dogs to the Red Army. More than 3 million Muscovites received training in air defense and chemical defense at Osoaviakhim organizations. Moscow Osoaviakhim members raised 3 , 350 ,000 rubles of funds for a convoy of KV tanks and more than 1 million rubles for the construction of six IL-2 attack aircraft. The activities of the Moscow 's Osoaviakhim during the Great Patriotic War were highly appreciated by the Central Council of the Special Meeting, which awarded it with the Red Banner that was forever left in the capital's organization of the Society. At the beginning of 1945, in Moscow, in the constantly operating formations of Osoaviakhim, there were 183 companies that consolidated into 41 battalions. In 1948, the first Moscow city conferences of the Voluntary Army Assistance Society, the Voluntary Aviation Assistance Society, and the Voluntary Fleet Assistance Society were held on June 26, 28, and 29. The 1st and 2nd naval clubs and the city naval training center worked in Moscow. Since 1951, Osoaviakhim was renamed to the All-Union Voluntary Society for Assisting the Army, Aviation and Navy \u2013 DOSAAF .", "edit_actions": [{"type": "D", "before": ":", "after": null, "start_char_pos": 346, "end_char_pos": 347}, {"type": "R", "before": "the first conference of the Moscow city organization of Osoaviakhim", "after": "Osoaviakhim's first conference in Moscow", "start_char_pos": 558, "end_char_pos": 625}, {"type": "A", "before": null, "after": "program", "start_char_pos": 686, "end_char_pos": 686}, {"type": "D", "before": "the", "after": null, "start_char_pos": 781, "end_char_pos": 784}, {"type": "R", "before": "on the initiative of the Osoaviakhim and Komsomol organizations, the", "after": "the", "start_char_pos": 815, "end_char_pos": 883}, {"type": "A", "before": null, "after": "aviation", "start_char_pos": 907, "end_char_pos": 907}, {"type": "A", "before": null, "after": "by the Osoaviakhim and Komsomol organizations", "start_char_pos": 927, "end_char_pos": 927}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1084, "end_char_pos": 1084}, {"type": "R", "before": "begins to be published", "after": "started publication", "start_char_pos": 1454, "end_char_pos": 1476}, {"type": "R", "before": "at", "after": "in", "start_char_pos": 1546, "end_char_pos": 1548}, {"type": "R", "before": "\"Red Manufactory\"", "after": "Red Manufactory", "start_char_pos": 1664, "end_char_pos": 1681}, {"type": "A", "before": null, "after": "and", "start_char_pos": 1900, "end_char_pos": 1900}, {"type": "R", "before": "and approved", "after": ". The squad and factory received", "start_char_pos": 1936, "end_char_pos": 1948}, {"type": "D", "before": "the", "after": null, "start_char_pos": 2020, "end_char_pos": 2023}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2178, "end_char_pos": 2179}, {"type": "R", "before": ", knocking out", "after": "against American shooters by", "start_char_pos": 2556, "end_char_pos": 2570}, {"type": "R", "before": "points more than American shooters", "after": "points", "start_char_pos": 2575, "end_char_pos": 2609}, {"type": "R", "before": "thousand meters", "after": ",000 m", "start_char_pos": 2733, "end_char_pos": 2748}, {"type": "R", "before": "meters", "after": "m", "start_char_pos": 2776, "end_char_pos": 2782}, {"type": "R", "before": "\"On Guard\"", "after": ", On Guard,", "start_char_pos": 2863, "end_char_pos": 2873}, {"type": "R", "before": "were needed to be carried out only from", "after": "required the use of", "start_char_pos": 3087, "end_char_pos": 3126}, {"type": "R", "before": ",", "after": "and", "start_char_pos": 3247, "end_char_pos": 3248}, {"type": "R", "before": "wall mounted", "after": "wall-mounted", "start_char_pos": 3756, "end_char_pos": 3768}, {"type": "A", "before": null, "after": "organization", "start_char_pos": 3817, "end_char_pos": 3817}, {"type": "D", "before": "the standards for the collective mark", "after": null, "start_char_pos": 3836, "end_char_pos": 3873}, {"type": "A", "before": null, "after": "the", "start_char_pos": 3923, "end_char_pos": 3923}, {"type": "A", "before": null, "after": "that was", "start_char_pos": 4070, "end_char_pos": 4070}, {"type": "A", "before": null, "after": "21.857 km", "start_char_pos": 4184, "end_char_pos": 4184}, {"type": "D", "before": "21 km, 857 meters", "after": null, "start_char_pos": 4204, "end_char_pos": 4221}, {"type": "R", "before": "in the Moscow city organization of Osoaviakhim there were", "after": "the Osoaviakhim in Moscow had", "start_char_pos": 4233, "end_char_pos": 4290}, {"type": "A", "before": null, "after": "and the", "start_char_pos": 4619, "end_char_pos": 4619}, {"type": "A", "before": null, "after": ":", "start_char_pos": 4754, "end_char_pos": 4754}, {"type": "A", "before": null, "after": "and", "start_char_pos": 4917, "end_char_pos": 4917}, {"type": "R", "before": "thousand", "after": ",000", "start_char_pos": 5107, "end_char_pos": 5115}, {"type": "A", "before": null, "after": "were assigned", "start_char_pos": 5160, "end_char_pos": 5160}, {"type": "R", "before": "covered by preparations", "after": "prepared", "start_char_pos": 5217, "end_char_pos": 5240}, {"type": "R", "before": "thousand", "after": ",000", "start_char_pos": 5338, "end_char_pos": 5346}, {"type": "A", "before": null, "after": "and", "start_char_pos": 5371, "end_char_pos": 5371}, {"type": "A", "before": null, "after": "in the Osoaviakhim", "start_char_pos": 5394, "end_char_pos": 5394}, {"type": "D", "before": "adopted a decree that", "after": null, "start_char_pos": 5499, "end_char_pos": 5520}, {"type": "R", "before": "for organizing", "after": "to organize", "start_char_pos": 5565, "end_char_pos": 5579}, {"type": "A", "before": null, "after": ",", "start_char_pos": 5716, "end_char_pos": 5716}, {"type": "A", "before": null, "after": ",", "start_char_pos": 5815, "end_char_pos": 5815}, {"type": "R", "before": "thousand", "after": ",000", "start_char_pos": 5972, "end_char_pos": 5980}, {"type": "D", "before": "in it", "after": null, "start_char_pos": 6006, "end_char_pos": 6011}, {"type": "R", "before": "meters", "after": "m", "start_char_pos": 6202, "end_char_pos": 6208}, {"type": "A", "before": null, "after": "and", "start_char_pos": 6270, "end_char_pos": 6270}, {"type": "A", "before": null, "after": "and", "start_char_pos": 6571, "end_char_pos": 6571}, {"type": "D", "before": "the years of", "after": null, "start_char_pos": 6704, "end_char_pos": 6716}, {"type": "R", "before": "Central", "after": "a central", "start_char_pos": 7013, "end_char_pos": 7020}, {"type": "R", "before": "Radio", "after": "radio", "start_char_pos": 7044, "end_char_pos": 7049}, {"type": "A", "before": null, "after": "and the", "start_char_pos": 7104, "end_char_pos": 7104}, {"type": "R", "before": "Moscow city organization of Osoaviakhim", "after": "Osoaviakhim in Moscow", "start_char_pos": 7152, "end_char_pos": 7191}, {"type": "R", "before": "11233,", "after": "11,233,", "start_char_pos": 7265, "end_char_pos": 7271}, {"type": "R", "before": "6332,", "after": "6,332,", "start_char_pos": 7284, "end_char_pos": 7289}, {"type": "R", "before": "23005,", "after": "23,005,", "start_char_pos": 7314, "end_char_pos": 7320}, {"type": "R", "before": "42671,", "after": "42,671,", "start_char_pos": 7346, "end_char_pos": 7352}, {"type": "R", "before": "33102,", "after": "33,102,", "start_char_pos": 7374, "end_char_pos": 7380}, {"type": "R", "before": "15283,", "after": "15,283,", "start_char_pos": 7394, "end_char_pos": 7400}, {"type": "R", "before": "12286,", "after": "12,286, and", "start_char_pos": 7419, "end_char_pos": 7425}, {"type": "R", "before": "and transferred 1825", "after": ", and transferred 1,825", "start_char_pos": 7495, "end_char_pos": 7515}, {"type": "R", "before": "million", "after": ",", "start_char_pos": 7697, "end_char_pos": 7704}, {"type": "R", "before": "thousand", "after": ",000", "start_char_pos": 7709, "end_char_pos": 7717}, {"type": "D", "before": "which", "after": null, "start_char_pos": 7738, "end_char_pos": 7743}, {"type": "D", "before": "was built", "after": null, "start_char_pos": 7765, "end_char_pos": 7774}, {"type": "R", "before": "city organization of", "after": "'s", "start_char_pos": 7885, "end_char_pos": 7905}, {"type": "R", "before": ",", "after": "that", "start_char_pos": 8242, "end_char_pos": 8243}, {"type": "R", "before": "On June 26, 28, 29,", "after": "In", "start_char_pos": 8277, "end_char_pos": 8296}, {"type": "R", "before": ".", "after": "on June 26, 28, and 29.", "start_char_pos": 8475, "end_char_pos": 8476}, {"type": "R", "before": "the unified", "after": "Osoaviakhim was renamed to the", "start_char_pos": 8570, "end_char_pos": 8581}, {"type": "D", "before": "appeared", "after": null, "start_char_pos": 8661, "end_char_pos": 8669}], "sents_char_pos": [0, 361, 535, 637, 768, 994, 1148, 1419, 1478, 1648, 2001, 2222, 2324, 2540, 2611, 2693, 2799, 2958, 3142, 3297, 3386, 3742, 3806, 3955, 4134, 4223, 4681, 4829, 4901, 4938, 5162, 5278, 5396, 5429, 5646, 5827, 5934, 6081, 6286, 6459, 6682, 7147, 7448, 7545, 7660, 7855, 8124, 8276, 8476, 8557]}
+{"doc_id": "8210419", "revision_depth": "1", "before_revision": " The middle of the 20th century was marked by a significant and persistent increase in fertility rates in many countries of the world, especially in the West , leading to those born during this baby boom being nicknamed the baby boomer generation . The term \"baby boom \" is often used to refer to this particular boom, generally considered to have started immediately after World War II, although some demographers place it earlier or during the war. The boom coincided with a marriage boom. The increase in fertility was driven primarily by decrease in childlessness and increase in parity progression to a second child. In most of the Western countries, progression to a third child and beyond declined which, coupled with aforementioned increase in transition to first and second child, resulted in higher homogeneity in family sizes. The baby boom was most prominent among educated and economically active women. The baby boom ended with the significant decline in fertility rates in the 1960s and 1970s which was later called the \"baby bust \" by demographers. upright=2.25|United States birth rate (births per 1000 population). Pre-2003 data came from: \"Table 1-1. Live Births, Birth Rates, and Fertility Rates, by Race: United States, 1909-2003\". Centers for Disease Control and Prevention (CDC). (Retrieved from: \"Vital Statistics of the United States, 2003, Volume I, Natality\". CDC.) Post-2003 data came from: \"National Vital Statistics Reports\" (8 December 2010). CDC. Volume 59, no. 1. The graph is an expanded SVG version of :File:U. S.BirthRate.1909.2003.png The United States Census Bureau defines baby boomers as those born between mid-1946 and mid-1964 (shown in red).\"Fueled by Aging Baby Boomers, Nation's Older Population to Nearly Double in the Next 20 Years, Census Bureau Reports\". United States Census Bureau. 6 May 2014. Australia and New Zealand The volume of baby boom was the largest in the world in New Zealand and second-largest in Australia. Like the US, the New Zealand baby boom was stronger among Catholics than Protestants. The author and columnist Bernard Salt places the Australian baby boom between 1946 and 1961.%DIFDELCMD < %DIFDELCMD < %%% United Kingdom In the United Kingdom the baby boom occurred in two waves. After a short first wave of the baby boom during the war and immediately after, peaking in 1946, the United Kingdom experienced a second wave during the 1960s, with a peak in births in 1964.Office for National Statistics Births in England and Wales: 2017 the wiggles Ireland The baby boom in Ireland began during the Emergency declared in the country during the Second World War. Laws on contraception were restrictive in Ireland, and the baby boom was more prolonged in this country. Secular decline of fertility began only in the 1970s and particularly after the legalization of contraception in 1979. The marriage boom was even more prolonged and did not recede until the 1980s. Western Europe France and Austria experienced the strongest baby booms in Europe. In contrast to most other countries, the French and Austrian baby booms were driven primarily by an increase in marital fertility. In the French case, pronatalist policies were an important factor in this increase. Weaker baby booms occurred in Germany, Switzerland, Belgium and the Netherlands . Southern Europe Baby boom was absent or not very strong in Italy, Greece, Portugal and Spain. There were however regional variations in Spain, with a considerable baby boom occurring in regions such as Catalonia. Eastern Europe There was a strong baby boom in Czechoslovakia, but it was weak or absent in Poland, Bulgaria, Russia, Estonia and Lithuania, partly as a result of the Soviet famine of 1946\u201347. Nordic countries The baby boom was very strong in Norway and Iceland, significant in Finland, moderate in Sweden and relatively weak in Denmark. ", "after_revision": "upright=2.25|United States birth rate (births per 1000 population).Pre-2003 data came from: \"Table 1-1. Live Births, Birth Rates, and Fertility Rates, by Race: United States, 1909-2003\". Centers for Disease Control and Prevention (CDC). (Retrieved from: \"Vital Statistics of the United States, 2003, Volume I, Natality\". CDC.) Post-2003 data came from: \"National Vital Statistics Reports\" (8 December 2010). CDC. Volume 59, no. 1. The graph is an expanded SVG version of :File:U.S.BirthRate.1909.2003.png The US Census Bureau defines baby boomers as those born between mid-1946 and mid-1964 (shown in red).\"Fueled by Aging Baby Boomers, Nation's Older Population to Nearly Double in the Next 20 Years, Census Bureau Reports\". United States Census Bureau. 6 May 2014. The middle of the 20th century was marked by a significant and persistent increase in fertility rates in many countries of the world, especially in the West . The term baby boom is often used to refer to this particular boom, generally considered to have started immediately after World War II, although some demographers place it earlier or during the war. This terminology led to those born during this baby boom being nicknamed the baby boomer generation. The boom coincided with a marriage boom. The increase in fertility was driven primarily by a decrease in childlessness and an increase in parity progression to a second child. In most of the Western countries, progression to a third child and beyond declined , which, coupled with aforementioned increase in transition to first and second child, resulted in higher homogeneity in family sizes. The baby boom was most prominent among educated and economically active women. The baby boom ended with a significant decline in fertility rates in the 1960s and 1970s , later called the baby bust by demographers. Europe France and Austria experienced the strongest baby booms in Europe. In contrast to most other countries, the French and Austrian baby booms were driven primarily by an increase in marital fertility. In the French case, pronatalist policies were an important factor in this increase. Weaker baby booms occurred in Germany, Switzerland, Belgium and the Netherlands. %DIFDELCMD < %DIFDELCMD < %%% In the United Kingdom the baby boom occurred in two waves. After a short first wave of the baby boom during the war and immediately after, peaking in 1946, the United Kingdom experienced a second wave during the 1960s, with a peak in births in 1964.Office for National Statistics Births in England and Wales: 2017 The baby boom in Ireland began during the Emergency declared in the country during the Second World War. Laws on contraception were restrictive in Ireland, and the baby boom was more prolonged in this country. Secular decline of fertility began only in the 1970s and particularly after the legalization of contraception in 1979. The marriage boom was even more prolonged and did not recede until the 1980s. The baby boom was very strong in Norway and Iceland, significant in Finland, moderate in Sweden and relatively weak in Denmark . Baby boom was absent or not very strong in Italy, Greece, Portugal and Spain. There were however regional variations in Spain, with a considerable baby boom occurring in regions such as Catalonia. There was a strong baby boom in Czechoslovakia, but it was weak or absent in Poland, Bulgaria, Russia, Estonia and Lithuania, partly as a result of the Soviet famine of 1946\u201347. Oceania The volume of baby boom was the largest in the world in New Zealand and second-largest in Australia. Like the US, the New Zealand baby boom was stronger among Catholics than Protestants. The author and columnist Bernard Salt places the Australian baby boom between 1946 and 1961.", "edit_actions": [{"type": "A", "before": null, "after": "upright=2.25|United States birth rate (births per 1000 population).Pre-2003 data came from: \"Table 1-1. Live Births, Birth Rates, and Fertility Rates, by Race: United States, 1909-2003\". Centers for Disease Control and Prevention (CDC). (Retrieved from: \"Vital Statistics of the United States, 2003, Volume I, Natality\". CDC.) Post-2003 data came from: \"National Vital Statistics Reports\" (8 December 2010). CDC. Volume 59, no. 1. The graph is an expanded SVG version of :File:U.S.BirthRate.1909.2003.png The US Census Bureau defines baby boomers as those born between mid-1946 and mid-1964 (shown in red).\"Fueled by Aging Baby Boomers, Nation's Older Population to Nearly Double in the Next 20 Years, Census Bureau Reports\". United States Census Bureau. 6 May 2014.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "D", "before": ", leading to those born during this baby boom being nicknamed the baby boomer generation", "after": null, "start_char_pos": 158, "end_char_pos": 246}, {"type": "R", "before": "\"baby boom \"", "after": "baby boom", "start_char_pos": 258, "end_char_pos": 270}, {"type": "A", "before": null, "after": "This terminology led to those born during this baby boom being nicknamed the baby boomer generation.", "start_char_pos": 451, "end_char_pos": 451}, {"type": "A", "before": null, "after": "a", "start_char_pos": 543, "end_char_pos": 543}, {"type": "A", "before": null, "after": "an", "start_char_pos": 574, "end_char_pos": 574}, {"type": "A", "before": null, "after": ",", "start_char_pos": 708, "end_char_pos": 708}, {"type": "R", "before": "the", "after": "a", "start_char_pos": 946, "end_char_pos": 949}, {"type": "R", "before": "which was", "after": ",", "start_char_pos": 1012, "end_char_pos": 1021}, {"type": "R", "before": "\"baby bust \"", "after": "baby bust", "start_char_pos": 1039, "end_char_pos": 1051}, {"type": "R", "before": "upright=2.25|United States birth rate (births per 1000 population). Pre-2003 data came from: \"Table 1-1. Live Births, Birth Rates, and Fertility Rates, by Race: United States, 1909-2003\". Centers for Disease Control and Prevention (CDC). (Retrieved from: \"Vital Statistics of the United States, 2003, Volume I, Natality\". CDC.) Post-2003 data came from: \"National Vital Statistics Reports\" (8 December 2010). CDC. Volume 59, no. 1. The graph is an expanded SVG version of :File:U. S.BirthRate.1909.2003.png The United States Census Bureau defines baby boomers as those born between mid-1946 and mid-1964 (shown in red).\"Fueled by Aging Baby Boomers, Nation's Older Population to Nearly Double in the Next 20 Years, Census Bureau Reports\". United States Census Bureau. 6 May 2014.", "after": "Europe France and Austria experienced the strongest baby booms in Europe. In contrast to most other countries, the French and Austrian baby booms were driven primarily by an increase in marital fertility. In the French case, pronatalist policies were an important factor in this increase. Weaker baby booms occurred in Germany, Switzerland, Belgium and the Netherlands.", "start_char_pos": 1069, "end_char_pos": 1848}, {"type": "D", "before": "Australia and New Zealand The volume of baby boom was the largest in the world in New Zealand and second-largest in Australia. Like the US, the New Zealand baby boom was stronger among Catholics than Protestants.", "after": null, "start_char_pos": 1849, "end_char_pos": 2061}, {"type": "D", "before": "The author and columnist Bernard Salt places the Australian baby boom between 1946 and 1961.", "after": null, "start_char_pos": 2062, "end_char_pos": 2154}, {"type": "D", "before": "United Kingdom", "after": null, "start_char_pos": 2184, "end_char_pos": 2198}, {"type": "D", "before": "the wiggles", "after": null, "start_char_pos": 2513, "end_char_pos": 2524}, {"type": "D", "before": "Ireland", "after": null, "start_char_pos": 2525, "end_char_pos": 2532}, {"type": "R", "before": "Western Europe France and Austria experienced the strongest baby booms in Europe. In contrast to most other countries, the French and Austrian baby booms were driven primarily by an increase in marital fertility. In the French case, pronatalist policies were an important factor in this increase. Weaker baby booms occurred in Germany, Switzerland, Belgium and the Netherlands", "after": "The baby boom was very strong in Norway and Iceland, significant in Finland, moderate in Sweden and relatively weak in Denmark", "start_char_pos": 2940, "end_char_pos": 3316}, {"type": "D", "before": "Southern Europe", "after": null, "start_char_pos": 3319, "end_char_pos": 3334}, {"type": "D", "before": "Eastern Europe", "after": null, "start_char_pos": 3532, "end_char_pos": 3546}, {"type": "R", "before": "Nordic countries The", "after": "Oceania The volume of", "start_char_pos": 3725, "end_char_pos": 3745}, {"type": "R", "before": "very strong in Norway and Iceland, significant in Finland, moderate in Sweden and relatively weak in Denmark.", "after": "the largest in the world in New Zealand and second-largest in Australia. Like the US, the New Zealand baby boom was stronger among Catholics than Protestants.", "start_char_pos": 3760, "end_char_pos": 3869}, {"type": "A", "before": null, "after": "The author and columnist Bernard Salt places the Australian baby boom between 1946 and 1961.", "start_char_pos": 3870, "end_char_pos": 3870}], "sents_char_pos": [0, 248, 450, 492, 624, 841, 920, 1136, 1173, 1256, 1306, 1390, 1477, 1549, 1688, 1807, 1836, 1848, 1975, 2061, 2154, 2257, 2448, 2637, 2742, 2861, 2939, 3021, 3152, 3236, 3412, 3531, 3724]}
+{"doc_id": "8252510", "revision_depth": "1", "before_revision": "Indian Will was a well-known Native American who lived in a former settlement of the Shawnee Indians at the site of present-day Cumberland, Maryland in the 18th century. This site was abandoned by the Shawnee's prior to the first white settlers arriving in the region, however 'Indian Will' stayed behind living in a hut on the mountain side. Will was a local legend in his time, and he is even credited with the original ownership of the present day Wills Creek and Wills Mountain. According to Lowdermilk, Will was a full blooded Indian, who with family and a few followers remained in the land of their forefathers despite the approach of the white man did not remove their wigwams, but received their strange visitors with a kindly greeting, and lived in intimate friendship with them ' . Will's home was in a small cove about three miles (5 km) from the mouth of the stream that bears his name. It was close to the rocky formation west of Cumberland known as the 'Devil's ladder'. It is also recorded that he had an Indian friend known as Eve. We could find no further reference to her. Governor Bladen of Maryland persuaded Col. Thomas Cresap to survey the land in that area named 'Will's Town'. Apparently Will's claims to ownership of this land were respected. When the early explorers decided to build a cabin here they never failed to give the Indian some trifle as a pretended compensation for the land. As more cabins were built, the place customarily became known as Will's Creek' as early as 1728. However, on a map drawn in 1751, Wills Creek is marked as 'Caructucue Creek', and was known by no other name amongst the Indians. Over the years the original name for this stream, which originates in Bedford County, has been lost. The creek and mountain, which begins at Cumberland and ends a few miles north west of Bedford, have been known as Wills Creek and Wills Mountain. There seems to be some variation in the date of Will's death. Loudermilk 's History states ' the date of death is not definitely known, but that event is supposed to have occurred about the close of the Revolutionary War or shortly thereafter '. In our own history of Bedford County , it is stated that sometime around 1758 a group of Indians made a raid in the section north east of Wills Creek in an area which we now know as Southampton Township in Bedford County. A number of settlers were massacred and a number of women and children taken prisoner. Apparently one member of this raiding party was Will. The Indians with their prisoners stopped for a short time at the southern tip of Wills Mountain to rest and to hold council. A posse of neighbors and relatives took up the pursuit hoping they might rescue the prisoners. When the Indians and prisoners were discovered the posse did not attack as they found the Indians outnumbered them. Therefore, they played a waiting game to see what the Indians intended to do. When the Indians broke council they started westward. One Indian did not go with them. No one knows why. Was it that he wanted to try to learn what further plans the whites had intended to take, or was it because he had no desire to leave the mountain, valleys and streams that were his home and loved so much? Several members of the posse followed the main party of Indians and their prisoners. George Powell, who was one of the posse, vowed he would avenge the death of his neighbor Mrs. Perrin and her baby. (Mrs. Perrin, history states was a sister of Ray who had the first trading post here at Bedford). Powell silently followed the foot steps of the Indian along the crest of the mountain. He finally located his quarry on the highest northern part of the mountain. This point was less than two miles (3 km) west of Fort Bedford. Powell shot and killed the Indian. He discovered he had killed the man known as Will. He buried his body on the mountain at a place known as Will's Knob which is still pointed out to those who are curious enough to look and ponder a moment as they drive along Route 31 a short distance south of the Old Forks Inn (This Inn was located west of Bedford, Pennsylvania at the junction of U. S. 30 and PA 31, Napier Township, Pennsylvania). According to a story repeated many times to visitors in his antique shop on East Pitt Street , by one of our late historians 'Judge' Davidson, several men came to Bedford, Maryland from Baltimore, Maryland , sometime in the mid-19th century and with the help of a local person, they located Will's grave and excavated his skeleton. Its dimensions indicated this Indian was an unusually large man. Their excuse for taking the remains was to make a scientific study of the skeleton. If such a study was ever made, no report ever reached the people of Bedford. Researching on the background of the Shawnee and Delaware tribes, we found that an advance party of Shawnee came into Pennsylvania and settled along the Delaware River in 1692. They came here from Kentucky and Tennessee with permission from the province of Pennsylvania and the Iroquois confederacy. The Delaware were settled in this area especially in the eastern part long before the Shawnee came here.", "after_revision": "Indian Will was a well-known Native American who lived in a former settlement of the Shawnee Indians at the site of present-day Cumberland, Maryland in the 18th century. This site was abandoned by the Shawnees prior to the first white settlers arriving in the region, however 'Indian Will' stayed behind living in a hut on the mountain side. Will was a local legend in his time, and he is even credited with the original ownership of the present day Wills Creek and Wills Mountain. According to William Harrison Lowdermilk, Will was a full-blooded Indian, who with family and a few followers remained in the land of their forefathers ; despite the approach of the white man , they did not remove their wigwams, but received their strange visitors with a kindly greeting, and lived in intimate friendship with them . Will's home was in a small cove about three miles (5 km) from the mouth of the stream that bears his name. It was close to the rocky formation west of Cumberland known as the 'Devil's ladder'. It is also recorded that he had an Indian friend known as Eve. Governor Bladen of Maryland persuaded Col. Thomas Cresap to survey the land in that area named 'Will's Town'. Apparently Will's claims to ownership of this land were respected. When the early explorers decided to build a cabin here , they never failed to give the Indian some trifle as a pretended compensation for the land. As more cabins were built, the place customarily became known as ' Will's Creek' as early as 1728. However, on a map drawn in 1751, Will's Creek is marked as 'Caructucue Creek', and was known by no other name amongst the Indians. Over the years the original name for this stream, which originates in Bedford County, has been lost. The creek and mountain, which begins at Cumberland and ends a few miles north west of Bedford, have been known as Wills Creek and Wills Mountain. There seems to be some variation in the date of Will's death. Lowdermilk 's History states \" the date of death is not definitely known, but that event is supposed to have occurred about the close of the Revolutionary War or shortly thereafter \". In the Bedford County History , it is stated that sometime around 1758 a group of Indians made a raid in the section north east of Wills Creek in an area which is now known as Southampton Township in Bedford County. A number of settlers were massacred and a number of women and children taken prisoner. Apparently one member of this raiding party was Will. The Indians with their prisoners stopped for a short time at the southern tip of Wills Mountain to rest and to hold council. A posse of neighbors and relatives took up the pursuit hoping they might rescue the prisoners. When the Indians and prisoners were discovered , the posse did not attack as they found the Indians outnumbered them. Therefore, they played a waiting game to see what the Indians intended to do. When the Indians broke council , they started westward. One Indian did not go with them. Several members of the posse followed the main party of Indians and their prisoners. George Powell, who was one of the posse, vowed he would avenge the death of his neighbor Mrs. Perrin and her baby. (Mrs. Perrin, history states , was a sister of Ray who had the first trading post at Bedford). Powell silently followed the footsteps of the Indian along the crest of the mountain. He finally located his quarry on the highest northern part of the mountain. This point was less than two miles (3 km) west of Fort Bedford. Powell shot and killed the Indian. He discovered he had killed the man known as Will. He buried his body on the mountain at a place known as Will's Knob . According to a story repeated many times to visitors in his antique shop on East Pitt Street by one of Bedford's late historians 'Judge' Davidson, several men came to Bedford, Maryland from Baltimore, Maryland sometime in the mid-19th century and with the help of a local person, they located Will's grave and excavated his skeleton. Its dimensions indicated this Indian was an unusually large man. Their excuse for taking the remains was to make a scientific study of the skeleton. If such a study was ever made, no report ever reached the people of Bedford. Researching on the background of the Shawnee and Delaware tribes, it was found that an advance party of Shawnee came into Pennsylvania and settled along the Delaware River in 1692. They came here from Kentucky and Tennessee with permission from the province of Pennsylvania and the Iroquois confederacy. The Delaware were settled in this area especially in the eastern part long before the Shawnee came here.", "edit_actions": [{"type": "R", "before": "Shawnee's", "after": "Shawnees", "start_char_pos": 201, "end_char_pos": 210}, {"type": "A", "before": null, "after": "William Harrison", "start_char_pos": 496, "end_char_pos": 496}, {"type": "R", "before": "full blooded", "after": "full-blooded", "start_char_pos": 520, "end_char_pos": 532}, {"type": "A", "before": null, "after": ";", "start_char_pos": 619, "end_char_pos": 619}, {"type": "A", "before": null, "after": ", they", "start_char_pos": 658, "end_char_pos": 658}, {"type": "D", "before": "'", "after": null, "start_char_pos": 792, "end_char_pos": 793}, {"type": "D", "before": "We could find no further reference to her.", "after": null, "start_char_pos": 1052, "end_char_pos": 1094}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1327, "end_char_pos": 1327}, {"type": "A", "before": null, "after": "'", "start_char_pos": 1484, "end_char_pos": 1484}, {"type": "R", "before": "Wills", "after": "Will's", "start_char_pos": 1550, "end_char_pos": 1555}, {"type": "R", "before": "Loudermilk", "after": "Lowdermilk", "start_char_pos": 1956, "end_char_pos": 1966}, {"type": "R", "before": "'", "after": "\"", "start_char_pos": 1985, "end_char_pos": 1986}, {"type": "R", "before": "'. In our own history of Bedford County", "after": "\". In the Bedford County History", "start_char_pos": 2137, "end_char_pos": 2176}, {"type": "R", "before": "we now know", "after": "is now known", "start_char_pos": 2307, "end_char_pos": 2318}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2770, "end_char_pos": 2770}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2949, "end_char_pos": 2949}, {"type": "D", "before": "No one knows why. Was it that he wanted to try to learn what further plans the whites had intended to take, or was it because he had no desire to leave the mountain, valleys and streams that were his home and loved so much?", "after": null, "start_char_pos": 3006, "end_char_pos": 3229}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3459, "end_char_pos": 3459}, {"type": "D", "before": "here", "after": null, "start_char_pos": 3511, "end_char_pos": 3515}, {"type": "R", "before": "foot steps", "after": "footsteps", "start_char_pos": 3558, "end_char_pos": 3568}, {"type": "R", "before": "which is still pointed out to those who are curious enough to look and ponder a moment as they drive along Route 31 a short distance south of the Old Forks Inn (This Inn was located west of Bedford, Pennsylvania at the junction of U. S. 30 and PA 31, Napier Township, Pennsylvania).", "after": ".", "start_char_pos": 3909, "end_char_pos": 4191}, {"type": "D", "before": ",", "after": null, "start_char_pos": 4285, "end_char_pos": 4286}, {"type": "R", "before": "our", "after": "Bedford's", "start_char_pos": 4297, "end_char_pos": 4300}, {"type": "D", "before": ",", "after": null, "start_char_pos": 4398, "end_char_pos": 4399}, {"type": "R", "before": "we", "after": "it was", "start_char_pos": 4816, "end_char_pos": 4818}], "sents_char_pos": [0, 169, 342, 482, 902, 988, 1051, 1094, 1137, 1204, 1271, 1418, 1516, 1646, 1747, 1893, 1955, 2139, 2361, 2448, 2502, 2627, 2722, 2839, 2917, 2972, 3005, 3023, 3229, 3314, 3408, 3429, 3528, 3615, 3691, 3755, 3790, 3841, 4191, 4523, 4588, 4672, 4749, 4926, 5049]}
+{"doc_id": "832188", "revision_depth": "2", "before_revision": "Structural violence is a term commonly ascribed to Johan Galtung, which he introduced in the article \"Violence, Peace, and Peace Research\" (1969) .Galtung, Johan. \"Violence, Peace, and Peace Research \" Journal of Peace Research , Vol. 6 , No. 3 (1969), pp. 167\u2013 191 It refers to a form of violence wherein some social structure or social institution may harm people by preventing them from meeting their basic needs. Institutionalized adultism, ageism, classism, elitism, ethnocentrism, nationalism, speciesism, racism, and sexism are some examples of structural violenceas proposed by Galtung.Johan Galtung\"Seeking Peace from Resolving Conflict between Buddhists and Muslims in Myanmar and Sri Lanka\" by Prof. Dr. Johan Galtung According to Galtung, rather than conveying a physical image, structural violence is an \"avoidable impairment of fundamental human needs \".Johan Galtung, \"Kulturelle Gewalt \" (1993) Vol.43 Der Burger im Staat p. 106 in Ho, Kathleen \"Structural Violence as a Human Rights Violation \" (2007). Essex Human Rights Review Vol. 4 No. 2 September 2007 As itis avoidable, structural violence is a high cause of premature death and unnecessary disability. Because structural violence affects people differently in various social structures, it is very closely linked to social injustice. Structural violence and direct violence are said to be highly interdependent, including family violence, gender violence, hate crimes, racial violence, police violence, state violence, terrorism, and war. In his book Violence: Reflections on a National Epidemic, James Gilligan defines structural violence as \"the increased rates of death and disability suffered by those who occupy the bottom rungs of society, as contrasted with the relatively lower death rates experienced by those who are above them \". Gilligan largely describes these \"excess deaths\" as \"non-natural\" and attributes them to the stress, shame, discrimination, and denigration that results from lower status. He draws on Sennett and Cobb, who examine the \"contest for dignity\" in a context of dramatic inequality. Bandy X. Lee wrote in her textbook Violence: An Interdisciplinary Approach to Causes, Consequences, and Cures, \"Structural violence refers to the avoidable limitations that society places on groups of people that constrain them from meeting their basic needs and achieving the quality of life that would otherwise be possible. These limitations, which can be political, economic, religious, cultural, or legal in nature, usually originate in institutions that exercise power over particular subjects.\" She goes on to say that it \" [ is therefore an illustration of a power system wherein social structures or institutions cause harm to people in a way that results in maldevelopment and other deprivations.\" Rather than the term being called social injustice or oppression, there is an advocacy for it to be called violence because this phenomenon comes from, and can be corrected by human decisions, rather than just natural causes. Cause and effects In The Sources of Social Power , Michael Mann makes the argument that within state formation, \"increased organizational power is a trade-off, whereby the individual obtains more security and food in exchange for his or her freedom.\" Sini\u0161a Male\u0161evi\u0107 elaborates on Mann's argument by saying, \"Mann's point needs extending to cover all social organizations, not just the state. The early chiefdoms were not states, obviously; still, they were established on a similar basis\u2014an inversely proportional relationship between security and resources, on the one hand, and liberty, on the other.\" This means that although those who live in organized, centralized social systems are not likely subject to hunger or to die in an animal attack, they are likely to engage in organized violence, which could include war. These structures make for opportunities and advances that humans could not create for themselves, including the development of agriculture, technology, philosophy, science, and art; however, these structures take tolls elsewhere, meaning that these structures are both productive and detrimental. In our early history, hunter-gatherer groups used organizational power to acquire more resources and produce more food , but at the same time, this power was also used to dominate, kill, and enslave other groups in order to expand territory and supplies. Although structural violence is said to be invisible, it has a number of influences which shape it. These include identifiable institutions, relationships, force fields, and ideologies, including discriminatory laws, gender inequality, and racism. Moreover, this does not only exist for those of the lower class, although the effects are much heavier on them, including the highest rate of disease and death, unemployment, homelessness, lack of education, powerlessness, and shared fate of miseries. The whole social order is affected by social power , but these othergroups have much more indirect effects on them, with the acts generally being less violent. Due to the social and economic structure in place today , specifically the division into rich and poor, powerful and weak, and superior and inferior , the excess premature death rate is between 10 and 20 million per year, which is over ten times the death rates from suicide, homicide, and warfare combined. Cultural violence \"Cultural violence\" refers to aspects of a culture that can be used to justify or legitimize direct or structural violence, and may be exemplified by religion and ideology, language and art, empirical science and formal science.Galtung, Johan. \"Cultural Violence,\" Journal of Peace Research, Vol. 27, No. 3 (Aug., 1990), pp. 291\u2013305 Cultural violence makes direct and structural violence look or feel \"right\", or at least not wrong, according to Galtung.Galtung 1990, p. 291 The study of cultural violence highlights the ways the act of direct violence and the fact of structural violence are legitimized and thus made acceptable in society. One mechanism of cultural violence is to change the \"moral color\" of an act from \"red/wrong\" to \"green/right\", or at least to \"yellow/acceptable\".Galtung 1990, p. 292 International scope%DIFDELCMD < %DIFDELCMD < %%% Petra Kelly wrote in her first book, Fighting for Hope (1984): The violence in structural violence is attributed to the specific organizations of society that injure or harm individuals or masses of individuals. In explaining his point of view on how structural violence affects the health of subaltern or marginalized people, medical anthropologist Paul Farmer writes:%DIFDELCMD < %DIFDELCMD < %%% This perspective has been continually discussed by Paul Farmer, as well as by Philippe Bourgois and Nancy Scheper-Hughes. Theorists argue that structural violence is embedded in the current world system; this form of violence, which is centered on apparently inequitable social arrangements, is not inevitable. Ending the global problem of structural violence will require actions that may seem unfeasible in the short term. To some, this indicates that it may be easier to devote resources to minimizing the harmful impacts of structural violence. Others, such as futurist Wendell Bell, see a need for long-term vision to guide projects for social justice. Many structural violences, such as racism and sexism, have become such a common occurrence in society that they appear almost invisible. Despite this fact, sexism and racism have been the focus of intense cultural and political resistance for many decades. Significant reform has been accomplished, though the project remains incomplete.%DIFDELCMD < %DIFDELCMD < %%% Paul Farmer notes that there are three reasons why structural violence is hard to see: Anthropologist Seth Holmes studies suffering through the lens of structural violence in his ethnography Fresh Fruit Broken Bodies: Migrant Farmworkers in the United States. He analyzes naturalization physical and mental suffering, violence continuum, and structural vulnerability that the Mexican migrants experience in their everyday lives. Dr. Holmes uses examples such as governmental influences of structural violence such as US subsidizing corn industries which force Mexican farmers out of business, how this forces them to make the very dangerous trip across the border, US border patrol being hindering these immigrants chances of finding work in America, and the impact it has on the migrants\u2019 bodies. Access to health care Structural violence affects the availability of health care in the sense that physicians often need to pay attention to broad social forces (racism, gender inequality, classism, etc.) to determine who falls ill and who will be given access to care. It is more likely for structural violence to occur in areas where biosocial methods are neglected in a country's health care system. Since structurally violent situations are viewed primarily as biological consequences, it neglects environmentally stimulated problems , such as negative social behaviours or inequality prominence . If biosocial understandings are forsaken when considering communicable diseases such as HIV, for example, prevention methods and treatment practices become inadequate and unsustainable for populations. However, the challenge is obvious: many countries cannot afford to stop the harmful cycle of structural violence. Paul Farmer argues that the major flaw in the dominant model of medical care is that medical services are sold as a commodity, remaining only available to those who can afford them. The concept of structural violence is used to show how medical professionals are not trained to understand the social forces behind disease, nor are they trained to deal with or alter them . Medical professionals have to ignore the social determinants that alter access to care , and as a result, medical interventions are significantly less effective in low-income countries. Structural violence is an issue not only in developing countries, but also in North America. For example, it has had a significant impact on diagnosis and treatment of AIDS in the United States. A 1990 study by Moore et al. found that blacks had a significantly lesser chance of receiving treatment than whites . Findings from another study suggest that the increased rate of workplace injury among undocumented Latino immigrants in the United States can be understood as an example of structural violence. Structural violence is the result of policy and social structures, and change can only be a product of altering the processes that encourage structural violence in the first place. Paul Farmer claims that \"structural interventions\" are one possible solution . Countries such as Haiti and Rwanda have implemented these interventions with positive outcomes. Examples include prohibiting the commodification of the citizen needs, such as health care, ensuring equitable access to effective therapies, and developing social safety nets. These initiatives increase citizen's social and economic rights, thus decreasing structural violence. However, for these structural interventions to be successful, medical professionals need to be capable of executing such tasks . Unfortunately, many of these professionals are not trained to perform structural interventions. Moreover, medical professionals continue to operate under conventional clinical intervention because physicians can rightly note that structural interventions are not their job. Therefore, the onus falls more on political and other experts to implement such structural changes. As noted, structural forces account for most if not all epidemic diseases (e.g., HIV). Medical professionals still continue to operate under the downstream phenomenon, with a focus is on individual lifestyle factors rather than general socio-economic, cultural, and environmental conditions. This paradigm obscures the structural impediments to changes because it tends to avoid the root causes that should be focused on . One response is to incorporate medical professionals and to acknowledge that such active structural interventions are necessary to address real public health issues. The lessons that have been learned from successful examples of structural interventions in these countries are fundamental. Although health disparities resulting from social inequalities are possible to reduce, as long as health care is exchanged as a commodity, those without the power to purchase it will have less access to it. Biosocial research should be the main focus . Sociology can better explain the origin and spread of infectious diseases, such as HIV or AIDS. Research shows that the risk of HIV is highly affected by one's behavior and habits. Although some structural interventions can decrease premature morbidity and mortality, the social and historical determinants of the structural violence cannot be omitted. Although the interventions have enormous influence on economical and political aspects of international bodies, more interventions are needed to improve access. Structural violence also exists in the area of mental health , where systems are designed to ignore the lived experiences of people with mental illnesses when making decisions about services and funding without consulting with the ill, including those who are illiterate, cannot access computers, do not speak the dominant language, are homeless, are too unwell to fill out long formal surveys, or are in locked psychiatric and forensic wards. Online-only consultation may be inappropriate for people with a lived experience of mental illness. Structural violence is also apparent when consumers in developed countries die from preventable diseases 15 & \u2013 25 years earlier than do people without a lived experience of mental health. Connection with poverty For one major resource on the connection between structural violence & poverty, see the work of Yale-based German philosopher, Thomas Pogge, especially his book World Poverty and Human Rights (2002) & . References Johan Galtung, \"Violence, Peace, and Peace Research , \" Journal of Peace Research , Vol. 6 , No. 3. (1969), pp. 167\u2013 191. External links Robert Gilman: \"Structural violence . Can we find genuine peace in a world with inequitable distribution of wealth among nations?\" ( 1983) Kathleen Ho: \" Structural Violence as a Human Rights Violation\", Essex Human Rights Review, Vol. 4 No. 2, September 2007 (ISSN 1756-1957) SophieHenderson: \" State-Sanctioned Structural Violence: Women Migrant Domestic Workers in the Philippines and Sri Lanka \" Violence Against Women , November 2019", "after_revision": "Structural violence is a concept for a form of violence wherein some social structure or social institution may harm people by preventing them from meeting their basic needs. The term was coined by Norwegian sociologist Johan Galtung, who introduced it in his 1969 article \"Violence, Peace, and Peace Research\" .Galtung, Johan. 1969. \"Violence, Peace, and Peace Research . \" Journal of Peace Research 6 (3): 167\u2013 91. Some examples of structural violence as proposed by Galtung include institutionalized racism, sexism, and classism, among others. Structural violence and direct violence are said to be highly interdependent, including family violence, gender violence, hate crimes, racial violence, police violence, state violence, terrorism, and war. It is very closely linked to social injustice insofar as it affects people differently in various social structures. Definitions Galtung According to Johan Galtung, rather than conveying a physical image, structural violence is an \"avoidable impairment of fundamental human needs .\"Galtung, Johan. 1993. \"Kulturelle Gewalt . \" Der Burger im Staat vol. 43. p. 106 , as cited in Ho, Kathleen . 2007. \"Structural Violence as a Human Rights Violation . \" Essex Human Rights Review 4 ( 2 ). Galtung contrasts structural violence with \"classical violence:\" violence that is \"direct,\" characterized by rudimentary, impermanent \"bodily destruction\" committed by some actor. Galtung places this as the first category of violence. In this sense, the purest form of structural violence can be understood as violence that endures with no particular beginning, and that lacks an 'actor' to have committed it.Galtung, Johan. 1975. \"The Specific Contribution of Peace Research to the Study of the Causes of Violence: Typologies,\" UNESCO Interdisciplinary Expert Meeting on the Study of the Causes of Violence. Following this, by excluding the requirement of an identifiable actor from the classical definition of violence, Galtung lists poverty (i.e., the \"deprival of basic human needs\") as the second category of violence and \"structurally conditioned poverty\" as the first category of structural violence. Asking why violence necessarily needs to be done to the human body for it to be considered violence\u2014\"why not also include violence done to the human mind, psyche or how one wants to express it\"\u2014Galtung proceeds to repression (i.e., the \"deprival of human rights\") as the third category of violence, and \"structurally conditioned repression\" (or, \"repressive intolerance\") as the second type of structural violence. Lastly, Galtung notes that repression need not be violence associated with repressive regimes or declared on particular documents to be human-rights infractions, as \"there are other types of damage done to the human mind not included in that particular tradition.\" From this sense, he categorizes alienation (i.e., \"deprival of higher needs\") as the fourth type of violence, leading to the third kind of structural violence, \"structurally conditioned alienation\"\u2014or, \"repressive tolerance,\" in that it is repressive but also compatible with repression, a lower level of structural violence. Since structural violence is avoidable, he argues, structural violence is a high cause of premature death and unnecessary disability. Some examples of structural violence as proposed by Galtung include institutionalized adultism, ageism, classism, elitism, ethnocentrism, nationalism, speciesism, racism, and sexism.Johan Galtung\"Seeking Peace from Resolving Conflict between Buddhists and Muslims in Myanmar and Sri Lanka\" by Prof. Dr. Johan Galtung Structural violence and direct violence are said to be highly interdependent, including family violence, gender violence, hate crimes, racial violence, police violence, state violence, terrorism, and war. Others In his book Violence: Reflections on a National Epidemic, James Gilligan defines structural violence as \"the increased rates of death and disability suffered by those who occupy the bottom rungs of society, as contrasted with the relatively lower death rates experienced by those who are above them .\" Gilligan largely describes these \"excess deaths\" as \"non-natural\" and attributes them to the stress, shame, discrimination, and denigration that results from lower status. He draws on Richard Sennett and Jonathan Cobb (i.e., The Hidden Injuries of Class, 1973), who examine the \"contest for dignity\" in a context of dramatic inequality. In her interdisciplinary textbook on violence, Bandy X. Lee wrote \"Structural violence refers to the avoidable limitations that society places on groups of people that constrain them from meeting their basic needs and achieving the quality of life that would otherwise be possible. These limitations, which can be political, economic, religious, cultural, or legal in nature, usually originate in institutions that exercise power over particular subjects.\" She goes on to say that \" [it is therefore an illustration of a power system wherein social structures or institutions cause harm to people in a way that results in maldevelopment and other deprivations.\" Rather than the term being called social injustice or oppression, there is an advocacy for it to be called violence because this phenomenon comes from, and can be corrected by , human decisions, rather than just natural causes. Cause and effects In The Sources of Social Power (1986),Mann, Michael. 1986. The Sources of Social Power, Vol. 1. Cambridge: Cambridge University Press. . Michael Mann makes the argument that within state formation, \"increased organizational power is a trade-off, whereby the individual obtains more security and food in exchange for his or her freedom.\" Sini\u0161a Male\u0161evi\u0107 elaborates on Mann's argument : \"Mann's point needs extending to cover all social organizations, not just the state. The early chiefdoms were not states, obviously; still, they were established on a similar basis\u2014an inversely proportional relationship between security and resources, on the one hand, and liberty, on the other.\" This means that , although those who live in organized, centralized social systems are not likely subject to hunger or to die in an animal attack, they are likely to engage in organized violence, which could include war. These structures make for opportunities and advances that humans could not create for themselves, including the development of agriculture, technology, philosophy, science, and art; however, these structures take tolls elsewhere, making them both productive and detrimental. In early human history, hunter-gatherer groups used organizational power to acquire more resources and produce more food ; yet, at the same time, this power was also used to dominate, kill, and enslave other groups in order to expand territory and supplies. Although structural violence is said to be invisible, it has a number of influences that shape it. These include identifiable institutions, relationships, force fields, and ideologies, including discriminatory laws, gender inequality, and racism. Moreover, this does not solely exist for those of lower classes, though the effects are much heavier on them, including higher rates of disease and death, unemployment, homelessness, lack of education, powerlessness, and shared fate of miseries. The whole social order is affected by social power ; other, higher-class groups, however have much more indirect effects on them, with the acts generally being less violent. Due to social and economic structures in place today \u2014specifically divisions into rich and poor, powerful and weak, and superior and inferior \u2014 the excess premature death rate is between 10 and 20 million per year, which is over ten times the death rates from suicide, homicide, and warfare combined. The work of Yale-based German philosopher, Thomas Pogge, is one major resource on the connection between structural violence and poverty, especially his book World Poverty and Human Rights (2002). %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% Access to health care Structural violence affects the availability of health care insofar as paying attention to broad social forces (racism, gender inequality, classism, etc.) can determine who falls ill and who will be given access to care. It is therefore considered more likely for structural violence to occur in areas where biosocial methods are neglected in a country's health care system. Since situations of structural violence are viewed primarily as biological consequences, it neglects problems stimulated by people's environment , such as negative social behaviours or the prominence of inequality, therefore ineffectively addressing the issue. Medical anthropologist Paul Farmer argues that the major flaw in the dominant model of medical care in the US is that medical services are sold as a commodity, remaining only available to those who can afford them. As medical professionals are not trained to understand the social forces behind disease, nor are they trained to deal with or alter them , they consequently have to ignore the social determinants that alter access to care . As a result, medical interventions are significantly less effective in low-income areas. Similarly, many areas and even countries cannot afford to stop the harmful cycle of structural violence. The lack of training has, for example, had a significant impact on diagnosis and treatment of AIDS in the United States. A 1990 study by Moore et al. found that black Americans had a significantly lesser chance of receiving treatment than white Americans . Findings from another study suggest that the increased rate of workplace injury among undocumented Latino immigrants in the United States can also be understood as an example of structural violence. If biosocial understandings are forsaken when considering communicable diseases such as HIV, for example, prevention methods and treatment practices become inadequate and unsustainable for populations. Farmer therefore also states that structural forces account for most if not all epidemic diseases. Structural violence also exists in the area of mental health, where systems ignore the lived experiences of patients when making decisions about services and funding without consulting with the ill, including those who are illiterate, cannot access computers, do not speak the dominant language, are homeless, are too unwell to fill out long formal surveys, or are in locked psychiatric and forensic wards. Structural violence is also apparent when consumers in developed countries die from preventable diseases 15\u201325 years earlier than those without a lived experience of mental health. Solutions Farmer ultimately claims that \"structural interventions\" are one possible solution to such violence. However, for structural interventions to be successful, medical professionals need to be capable of executing such tasks ; as stated above, though, many of professionals are not trained to do so. Medical professionals still continue to operate with a focus on individual lifestyle factors rather than general socio-economic, cultural, and environmental conditions. This paradigm is considered by Farmer to obscure the structural impediments to changes because it tends to avoid the root causes that should be focused on instead. Moreover, medical professionals can rightly note that structural interventions are not their job, and as result, continue to operate under conventional clinical intervention. Therefore, the onus falls more on political and other experts to implement such structural changes. One response is to incorporate medical professionals and to acknowledge that such active structural interventions are necessary to address real public health issues. Countries such as Haiti and Rwanda, however, have implemented (with positive outcomes) structural interventions, including prohibiting the commodification of the citizen needs (such as health care); ensuring equitable access to effective therapies; and developing social safety nets. Such initiatives increase the social and economic rights of citizens, thus decreasing structural violence. The successful examples of structural interventions in these countries have shown to be fundamental. Although the interventions have enormous influence on economical and political aspects of international bodies, more interventions are needed to improve access. Although health disparities resulting from social inequalities are possible to reduce, as long as health care is exchanged as a commodity, those without the power to purchase it will have less access to it. Biosocial research should therefore be the main focus , while sociology can better explain the origin and spread of infectious diseases, such as HIV or AIDS. For instance, research shows that the risk of HIV is highly affected by one's behavior and habits. As such, despite some structural interventions being able to decrease premature morbidity and mortality, the social and historical determinants of the structural violence cannot be omitted. Cultural violence Cultural violence refers to aspects of a culture that can be used to justify or legitimize direct or structural violence, and may be exemplified by religion ideology, language& art, and empirical science formal science.Galtung, Johan. 1990. \"Cultural Violence.\" Journal of Peace Research 27(3):291 \u2013 305. Cultural violence makes both direct and structural violence look or feel 'right', or at least not wrong, according to Galtung. The study of cultural violence highlights the ways the act of direct violence and the fact of structural violence are legitimized and thus made acceptable in society. Galtung explains that one mechanism of cultural violence is to change the \"moral color\" of an act from \"red/wrong\" to \"green/right,\" or at least to \"yellow/acceptable.\" International scope Petra Kelly wrote in her first book, Fighting for Hope (1984): The violence in structural violence is attributed to the specific organizations of society that injure or harm individuals or masses of individuals. In explaining his point of view on how structural violence affects the health of subaltern or marginalized people, medical anthropologist Paul Farmer writes:Farmer, Paul, and Margaret Connors. 1996. Women, Poverty & AIDS: Sex, Drugs and Structural Violence (reprint ed.), Series in Health and Social Justice. Common Courage Press. This perspective has been continually discussed by Farmer, as well as by Philippe Bourgois and Nancy Scheper-Hughes. Farmer ultimately claims that \"structural interventions\" are one possible solution to such violence; structural violence is the result of policy and social structures, and change can only be a product of altering the processes that encourage structural violence in the first place. Theorists argue that structural violence is embedded in the current world system; this form of violence, which is centered on apparently inequitable social arrangements, is not inevitable. Ending the global problem of structural violence will require actions that may seem unfeasible in the short term. To some, this indicates that it may be easier to devote resources to minimizing the harmful impacts of structural violence. Others, such as futurist Wendell Bell, see a need for long-term vision to guide projects for social justice. Many structural violences, such as racism and sexism, have become such a common occurrence in society that they appear almost invisible. Despite this fact, sexism and racism have been the focus of intense cultural and political resistance for many decades. Significant reform has been accomplished, though the project remains incomplete. Farmer notes that there are three reasons why structural violence is hard to see: Suffering is exoticized\u2014that is, when something/someone is distant or far away, individuals tend to not be affected by it. When suffering lacks proximity, it's easy to exoticise. The weight of suffering is also impossible to comprehend. There is simply no way that many individuals are able to comprehend what suffering is like. Lastly, the dynamics and distribution of suffering are still poorly understood.Farmer, Paul, and Margaret Connors. 1996. Women, Poverty& AIDS: Sex, Drugs and Structural Violence (reprint ed.), Series in Health and Social Justice. Common Courage Press. Anthropologist Seth Holmes studied suffering through the lens of structural violence in his 2013 ethnography Fresh Fruit Broken Bodies: Migrant Farmworkers in the United States. He analyzed the naturalization of physical and mental suffering, violence continuum, and structural vulnerability experienced by Mexican migrants in the U.S. in their everyday lives. Holmes used examples like governmental influences of structural violence\u2014such as how American subsidization of corn industries force Mexican farmers out of business, thereby forcing them to make the very dangerous trip across the border, where the U.S. Border Patrol hinder these migrants' chances of finding work in America, and the impact this all has on the migrants\u2019 bodies . Further reading Galtung, Johan. 1969. \"Violence, Peace, and Peace Research . \" Journal of Peace Research 6 (3): 167\u2013 91. Gilman, Robert. 1983. \"Structural violence : Can we find genuine peace in a world with inequitable distribution of wealth among nations?\" In Context 4(Autumn 1983) :8\u20138. Henderson, Sophie. 2019. \" State-Sanctioned Structural Violence: Women Migrant Domestic Workers in the Philippines and Sri Lanka . \" Violence Against Women 26(12-13):1598\u2013615. . Ho, Kathleen. 2007. \"Structural Violence as a Human Rights Violation.\" Essex Human Rights Review 4(2). .", "edit_actions": [{"type": "R", "before": "term commonly ascribed to", "after": "concept for a form of violence wherein some social structure or social institution may harm people by preventing them from meeting their basic needs.", "start_char_pos": 25, "end_char_pos": 50}, {"type": "A", "before": null, "after": "The term was coined by Norwegian sociologist", "start_char_pos": 51, "end_char_pos": 51}, {"type": "R", "before": "which he introduced in the", "after": "who introduced it in his 1969", "start_char_pos": 67, "end_char_pos": 93}, {"type": "D", "before": "(1969)", "after": null, "start_char_pos": 140, "end_char_pos": 146}, {"type": "A", "before": null, "after": "1969.", "start_char_pos": 164, "end_char_pos": 164}, {"type": "A", "before": null, "after": ".", "start_char_pos": 202, "end_char_pos": 202}, {"type": "D", "before": ", Vol.", "after": null, "start_char_pos": 231, "end_char_pos": 237}, {"type": "R", "before": ", No. 3 (1969), pp.", "after": "(3):", "start_char_pos": 240, "end_char_pos": 259}, {"type": "R", "before": "191 It refers to a form of violence wherein some social structure or social institution may harm people by preventing them from meeting their basic needs. Institutionalized adultism, ageism, classism, elitism, ethnocentrism, nationalism, speciesism, racism, and sexism are some examples of structural violenceas proposed by Galtung.Johan Galtung\"Seeking Peace from Resolving Conflict between Buddhists and Muslims in Myanmar and Sri Lanka\" by Prof. Dr. Johan", "after": "91. Some examples of structural violence as proposed by Galtung include institutionalized racism, sexism, and classism, among others. Structural violence and direct violence are said to be highly interdependent, including family violence, gender violence, hate crimes, racial violence, police violence, state violence, terrorism, and war. It is very closely linked to social injustice insofar as it affects people differently in various social structures.", "start_char_pos": 265, "end_char_pos": 723}, {"type": "A", "before": null, "after": "Definitions", "start_char_pos": 724, "end_char_pos": 724}, {"type": "A", "before": null, "after": "Johan", "start_char_pos": 746, "end_char_pos": 746}, {"type": "R", "before": "\".Johan Galtung,", "after": ".\"Galtung, Johan. 1993.", "start_char_pos": 871, "end_char_pos": 887}, {"type": "A", "before": null, "after": ".", "start_char_pos": 907, "end_char_pos": 907}, {"type": "D", "before": "(1993) Vol.43", "after": null, "start_char_pos": 910, "end_char_pos": 923}, {"type": "A", "before": null, "after": "vol. 43.", "start_char_pos": 944, "end_char_pos": 944}, {"type": "A", "before": null, "after": ", as cited", "start_char_pos": 952, "end_char_pos": 952}, {"type": "A", "before": null, "after": ". 2007.", "start_char_pos": 969, "end_char_pos": 969}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1019, "end_char_pos": 1019}, {"type": "D", "before": "(2007).", "after": null, "start_char_pos": 1022, "end_char_pos": 1029}, {"type": "D", "before": "Vol.", "after": null, "start_char_pos": 1056, "end_char_pos": 1060}, {"type": "R", "before": "No.", "after": "(", "start_char_pos": 1063, "end_char_pos": 1066}, {"type": "R", "before": "September 2007 As itis avoidable,", "after": ").", "start_char_pos": 1069, "end_char_pos": 1102}, {"type": "A", "before": null, "after": "Galtung contrasts structural violence with \"classical violence:\" violence that is \"direct,\" characterized by rudimentary, impermanent \"bodily destruction\" committed by some actor. Galtung places this as the first category of violence. In this sense, the purest form of structural violence can be understood as violence that endures with no particular beginning, and that lacks an 'actor' to have committed it.Galtung, Johan. 1975. \"The Specific Contribution of Peace Research to the Study of the Causes of Violence: Typologies,\" UNESCO Interdisciplinary Expert Meeting on the Study of the Causes of Violence.", "start_char_pos": 1103, "end_char_pos": 1103}, {"type": "A", "before": null, "after": "Following this, by excluding the requirement of an identifiable actor from the classical definition of violence, Galtung lists poverty (i.e., the \"deprival of basic human needs\") as the second category of violence and \"structurally conditioned poverty\" as the first category of structural violence.", "start_char_pos": 1104, "end_char_pos": 1104}, {"type": "A", "before": null, "after": "Asking why violence necessarily needs to be done to the human body for it to be considered violence\u2014\"why not also include violence done to the human mind, psyche or how one wants to express it\"\u2014Galtung proceeds to repression (i.e., the \"deprival of human rights\") as the third category of violence, and \"structurally conditioned repression\" (or, \"repressive intolerance\") as the second type of structural violence.", "start_char_pos": 1105, "end_char_pos": 1105}, {"type": "A", "before": null, "after": "Lastly, Galtung notes that repression need not be violence associated with repressive regimes or declared on particular documents to be human-rights infractions, as \"there are other types of damage done to the human mind not included in that particular tradition.\" From this sense, he categorizes alienation (i.e., \"deprival of higher needs\") as the fourth type of violence, leading to the third kind of structural violence, \"structurally conditioned alienation\"\u2014or, \"repressive tolerance,\" in that it is repressive but also compatible with repression, a lower level of structural violence.", "start_char_pos": 1106, "end_char_pos": 1106}, {"type": "A", "before": null, "after": "Since structural violence is avoidable, he argues,", "start_char_pos": 1107, "end_char_pos": 1107}, {"type": "R", "before": "Because structural violence affects people differently in various social structures, it is very closely linked to social injustice.", "after": "Some examples of structural violence as proposed by Galtung include institutionalized adultism, ageism, classism, elitism, ethnocentrism, nationalism, speciesism, racism, and sexism.Johan Galtung\"Seeking Peace from Resolving Conflict between Buddhists and Muslims in Myanmar and Sri Lanka\" by Prof. Dr. Johan Galtung", "start_char_pos": 1191, "end_char_pos": 1322}, {"type": "A", "before": null, "after": "Others", "start_char_pos": 1528, "end_char_pos": 1528}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 1828, "end_char_pos": 1830}, {"type": "R", "before": "Sennett and Cobb,", "after": "Richard Sennett and Jonathan Cobb (i.e., The Hidden Injuries of Class, 1973),", "start_char_pos": 2015, "end_char_pos": 2032}, {"type": "A", "before": null, "after": "In her interdisciplinary textbook on violence,", "start_char_pos": 2108, "end_char_pos": 2108}, {"type": "D", "before": "in her textbook Violence: An Interdisciplinary Approach to Causes, Consequences, and Cures,", "after": null, "start_char_pos": 2128, "end_char_pos": 2219}, {"type": "D", "before": "it", "after": null, "start_char_pos": 2635, "end_char_pos": 2637}, {"type": "A", "before": null, "after": "it", "start_char_pos": 2641, "end_char_pos": 2641}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2993, "end_char_pos": 2993}, {"type": "R", "before": ", Michael", "after": "(1986),Mann, Michael. 1986. The Sources of Social Power, Vol. 1. Cambridge: Cambridge University Press. . Michael", "start_char_pos": 3093, "end_char_pos": 3102}, {"type": "R", "before": "by saying,", "after": ":", "start_char_pos": 3342, "end_char_pos": 3352}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3666, "end_char_pos": 3666}, {"type": "R", "before": "meaning that these structures are", "after": "making them", "start_char_pos": 4100, "end_char_pos": 4133}, {"type": "R", "before": "our early", "after": "early human", "start_char_pos": 4170, "end_char_pos": 4179}, {"type": "R", "before": ", but", "after": "; yet,", "start_char_pos": 4286, "end_char_pos": 4291}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 4506, "end_char_pos": 4511}, {"type": "R", "before": "only", "after": "solely", "start_char_pos": 4694, "end_char_pos": 4698}, {"type": "R", "before": "the lower class, although", "after": "lower classes, though", "start_char_pos": 4718, "end_char_pos": 4743}, {"type": "R", "before": "the highest rate", "after": "higher rates", "start_char_pos": 4792, "end_char_pos": 4808}, {"type": "R", "before": ", but these othergroups", "after": "; other, higher-class groups, however", "start_char_pos": 4973, "end_char_pos": 4996}, {"type": "D", "before": "the", "after": null, "start_char_pos": 5089, "end_char_pos": 5092}, {"type": "R", "before": "structure", "after": "structures", "start_char_pos": 5113, "end_char_pos": 5122}, {"type": "R", "before": ", specifically the division", "after": "\u2014specifically divisions", "start_char_pos": 5138, "end_char_pos": 5165}, {"type": "R", "before": ",", "after": "\u2014", "start_char_pos": 5231, "end_char_pos": 5232}, {"type": "R", "before": "Cultural violence \"Cultural violence\" refers to aspects of a culture that can be used to justify or legitimize direct or structural violence, and may be exemplified by religion and ideology, language and art, empirical science and formal science.Galtung, Johan. \"Cultural Violence,\" Journal of Peace Research, Vol. 27, No. 3 (Aug., 1990), pp. 291\u2013305", "after": "The work of Yale-based German philosopher, Thomas Pogge, is one major resource on the connection between structural violence and poverty, especially his book World Poverty and Human Rights (2002).", "start_char_pos": 5390, "end_char_pos": 5740}, {"type": "D", "before": "Cultural violence makes direct and structural violence look or feel \"right\", or at least not wrong, according to Galtung.Galtung 1990, p. 291 The study of cultural violence highlights the ways the act of direct violence and the fact of structural violence are legitimized and thus made acceptable in society. One mechanism of cultural violence is to change the \"moral color\" of an act from \"red/wrong\" to \"green/right\", or at least to \"yellow/acceptable\".Galtung 1990, p. 292", "after": null, "start_char_pos": 5741, "end_char_pos": 6216}, {"type": "D", "before": "International scope", "after": null, "start_char_pos": 6217, "end_char_pos": 6236}, {"type": "D", "before": "Petra Kelly wrote in her first book, Fighting for Hope (1984):", "after": null, "start_char_pos": 6266, "end_char_pos": 6328}, {"type": "D", "before": "The violence in structural violence is attributed to the specific organizations of society that injure or harm individuals or masses of individuals. In explaining his point of view on how structural violence affects the health of subaltern or marginalized people, medical anthropologist Paul Farmer writes:", "after": null, "start_char_pos": 6329, "end_char_pos": 6635}, {"type": "D", "before": "This perspective has been continually discussed by Paul Farmer, as well as by Philippe Bourgois and Nancy Scheper-Hughes.", "after": null, "start_char_pos": 6665, "end_char_pos": 6786}, {"type": "D", "before": "Theorists argue that structural violence is embedded in the current world system; this form of violence, which is centered on apparently inequitable social arrangements, is not inevitable. Ending the global problem of structural violence will require actions that may seem unfeasible in the short term. To some, this indicates that it may be easier to devote resources to minimizing the harmful impacts of structural violence. Others, such as futurist Wendell Bell, see a need for long-term vision to guide projects for social justice. Many structural violences, such as racism and sexism, have become such a common occurrence in society that they appear almost invisible. Despite this fact, sexism and racism have been the focus of intense cultural and political resistance for many decades. Significant reform has been accomplished, though the project remains incomplete.", "after": null, "start_char_pos": 6787, "end_char_pos": 7660}, {"type": "D", "before": "Paul Farmer notes that there are three reasons why structural violence is hard to see:", "after": null, "start_char_pos": 7690, "end_char_pos": 7776}, {"type": "D", "before": "Anthropologist Seth Holmes studies suffering through the lens of structural violence in his ethnography Fresh Fruit Broken Bodies: Migrant Farmworkers in the United States. He analyzes naturalization physical and mental suffering, violence continuum, and structural vulnerability that the Mexican migrants experience in their everyday lives. Dr. Holmes uses examples such as governmental influences of structural violence such as US subsidizing corn industries which force Mexican farmers out of business, how this forces them to make the very dangerous trip across the border, US border patrol being hindering these immigrants chances of finding work in America, and the impact it has on the migrants\u2019 bodies.", "after": null, "start_char_pos": 7777, "end_char_pos": 8487}, {"type": "R", "before": "in the sense that physicians often need to pay", "after": "insofar as paying", "start_char_pos": 8570, "end_char_pos": 8616}, {"type": "R", "before": "to", "after": "can", "start_char_pos": 8694, "end_char_pos": 8696}, {"type": "A", "before": null, "after": "therefore considered", "start_char_pos": 8765, "end_char_pos": 8765}, {"type": "R", "before": "structurally violent situations", "after": "situations of structural violence", "start_char_pos": 8899, "end_char_pos": 8930}, {"type": "R", "before": "environmentally stimulated problems", "after": "problems stimulated by people's environment", "start_char_pos": 8992, "end_char_pos": 9027}, {"type": "R", "before": "inequality prominence . If biosocial understandings are forsaken when considering communicable diseases such as HIV, for example, prevention methods and treatment practices become inadequate and unsustainable for populations. However, the challenge is obvious: many countries cannot afford to stop the harmful cycle of structural violence.", "after": "the prominence of inequality, therefore ineffectively addressing the issue.", "start_char_pos": 9068, "end_char_pos": 9407}, {"type": "A", "before": null, "after": "Medical anthropologist", "start_char_pos": 9408, "end_char_pos": 9408}, {"type": "A", "before": null, "after": "in the US", "start_char_pos": 9486, "end_char_pos": 9486}, {"type": "R", "before": "The concept of structural violence is used to show how", "after": "As", "start_char_pos": 9592, "end_char_pos": 9646}, {"type": "R", "before": ". Medical professionals", "after": ", they consequently", "start_char_pos": 9781, "end_char_pos": 9804}, {"type": "R", "before": ", and as", "after": ". As", "start_char_pos": 9870, "end_char_pos": 9878}, {"type": "R", "before": "countries. Structural violence is an issue not only in developing countries, but also in North America. For example, it has", "after": "areas. Similarly, many areas and even countries cannot afford to stop the harmful cycle of structural violence.", "start_char_pos": 9958, "end_char_pos": 10081}, {"type": "A", "before": null, "after": "The lack of training has, for example,", "start_char_pos": 10082, "end_char_pos": 10082}, {"type": "R", "before": "blacks", "after": "black Americans", "start_char_pos": 10205, "end_char_pos": 10211}, {"type": "R", "before": "whites", "after": "white Americans", "start_char_pos": 10274, "end_char_pos": 10280}, {"type": "A", "before": null, "after": "also", "start_char_pos": 10425, "end_char_pos": 10425}, {"type": "D", "before": "Structural violence is the result of policy and social structures, and change can only be a product of altering the processes that encourage structural violence in the first place. Paul Farmer", "after": null, "start_char_pos": 10478, "end_char_pos": 10670}, {"type": "A", "before": null, "after": "If biosocial understandings are forsaken when considering communicable diseases such as HIV, for example, prevention methods and treatment practices become inadequate and unsustainable for populations. Farmer therefore also states that structural forces account for most if not all epidemic diseases.", "start_char_pos": 10671, "end_char_pos": 10671}, {"type": "A", "before": null, "after": "Structural violence also exists in the area of mental health, where systems ignore the lived experiences of patients when making decisions about services and funding without consulting with the ill, including those who are illiterate, cannot access computers, do not speak the dominant language, are homeless, are too unwell to fill out long formal surveys, or are in locked psychiatric and forensic wards. Structural violence is also apparent when consumers in developed countries die from preventable diseases 15\u201325 years earlier than those without a lived experience of mental health.", "start_char_pos": 10672, "end_char_pos": 10672}, {"type": "A", "before": null, "after": "Solutions Farmer ultimately", "start_char_pos": 10673, "end_char_pos": 10673}, {"type": "D", "before": ".", "after": null, "start_char_pos": 10739, "end_char_pos": 10740}, {"type": "R", "before": "Countries such as Haiti and Rwanda have implemented these interventions with positive outcomes. Examples include prohibiting the commodification of the citizen needs, such as health care, ensuring equitable access to effective therapies, and developing social safety nets. These initiatives increase citizen's social and economic rights, thus decreasing structural", "after": "to such", "start_char_pos": 10741, "end_char_pos": 11105}, {"type": "D", "before": "these", "after": null, "start_char_pos": 11129, "end_char_pos": 11134}, {"type": "R", "before": ". Unfortunately, many of these", "after": "; as stated above, though, many of", "start_char_pos": 11243, "end_char_pos": 11273}, {"type": "R", "before": "perform structural interventions. Moreover, medical professionals continue to operate under conventional clinical intervention because physicians can rightly note that structural interventions are not their job. Therefore, the onus falls more on political and other experts to implement such structural changes. As noted, structural forces account for most if not all epidemic diseases (e.g., HIV).", "after": "do so.", "start_char_pos": 11307, "end_char_pos": 11705}, {"type": "D", "before": "under the downstream phenomenon,", "after": null, "start_char_pos": 11754, "end_char_pos": 11786}, {"type": "D", "before": "is", "after": null, "start_char_pos": 11800, "end_char_pos": 11802}, {"type": "R", "before": "obscures", "after": "is considered by Farmer to obscure", "start_char_pos": 11925, "end_char_pos": 11933}, {"type": "R", "before": ".", "after": "instead.", "start_char_pos": 12040, "end_char_pos": 12041}, {"type": "A", "before": null, "after": "Moreover, medical professionals can rightly note that structural interventions are not their job, and as result, continue to operate under conventional clinical intervention. Therefore, the onus falls more on political and other experts to implement such structural changes.", "start_char_pos": 12042, "end_char_pos": 12042}, {"type": "R", "before": "The lessons that have been learned from", "after": "Countries such as Haiti and Rwanda, however, have implemented (with positive outcomes) structural interventions, including prohibiting the commodification of the citizen needs (such as health care); ensuring equitable access to effective therapies; and developing social safety nets. Such initiatives increase the social and economic rights of citizens, thus decreasing structural violence.", "start_char_pos": 12209, "end_char_pos": 12248}, {"type": "A", "before": null, "after": "The", "start_char_pos": 12249, "end_char_pos": 12249}, {"type": "R", "before": "are fundamental.", "after": "have shown to be fundamental.", "start_char_pos": 12317, "end_char_pos": 12333}, {"type": "A", "before": null, "after": "Although the interventions have enormous influence on economical and political aspects of international bodies, more interventions are needed to improve access.", "start_char_pos": 12334, "end_char_pos": 12334}, {"type": "A", "before": null, "after": "therefore", "start_char_pos": 12568, "end_char_pos": 12568}, {"type": "R", "before": ". Sociology", "after": ", while sociology", "start_char_pos": 12587, "end_char_pos": 12598}, {"type": "R", "before": "Research", "after": "For instance, research", "start_char_pos": 12685, "end_char_pos": 12693}, {"type": "R", "before": "Although", "after": "As such, despite", "start_char_pos": 12770, "end_char_pos": 12778}, {"type": "R", "before": "can", "after": "being able to", "start_char_pos": 12809, "end_char_pos": 12812}, {"type": "D", "before": "Although the interventions have enormous influence on economical and political aspects of international bodies, more interventions are needed to improve access.", "after": null, "start_char_pos": 12942, "end_char_pos": 13102}, {"type": "R", "before": "Structural violence also exists in the area of mental health , where systems are designed to ignore the lived experiences of people with mental illnesses when making decisions about services and funding without consulting with the ill, including those who are illiterate, cannot access computers, do not speak the dominant language, are homeless, are too unwell to fill out long formal surveys, or are in locked psychiatric and forensic wards. Online-only consultation may be inappropriate for people with a lived experience of mental illness. Structural violence is also apparent when consumers in developed countries die from preventable diseases 15", "after": "Cultural violence Cultural violence refers to aspects of a culture that can be used to justify or legitimize direct or structural violence, and may be exemplified by religion", "start_char_pos": 13103, "end_char_pos": 13754}, {"type": "A", "before": null, "after": "ideology, language", "start_char_pos": 13755, "end_char_pos": 13755}, {"type": "A", "before": null, "after": "art, and empirical science", "start_char_pos": 13757, "end_char_pos": 13757}, {"type": "A", "before": null, "after": "formal science.Galtung, Johan. 1990. \"Cultural Violence.\" Journal of Peace Research 27(3):291", "start_char_pos": 13758, "end_char_pos": 13758}, {"type": "R", "before": "25 years earlier than do people without a lived experience of mental health.", "after": "305.", "start_char_pos": 13761, "end_char_pos": 13837}, {"type": "R", "before": "Connection with poverty For one major resource on the connection between structural violence", "after": "Cultural violence makes both direct and structural violence look or feel 'right', or at least not wrong, according to Galtung. The study of cultural violence highlights the ways the act of direct violence and the fact of structural violence are legitimized and thus made acceptable in society. Galtung explains that one mechanism of cultural violence is to change the \"moral color\" of an act from \"red/wrong\" to \"green/right,\" or at least to \"yellow/acceptable.\"", "start_char_pos": 13838, "end_char_pos": 13930}, {"type": "A", "before": null, "after": "International scope", "start_char_pos": 13931, "end_char_pos": 13931}, {"type": "A", "before": null, "after": "Petra Kelly wrote in her first book, Fighting for Hope (1984):", "start_char_pos": 13932, "end_char_pos": 13932}, {"type": "A", "before": null, "after": "The violence in structural violence is attributed to the specific organizations of society that injure or harm individuals or masses of individuals. In explaining his point of view on how structural violence affects the health of subaltern or marginalized people, medical anthropologist Paul Farmer writes:Farmer, Paul, and Margaret Connors. 1996. Women, Poverty", "start_char_pos": 13933, "end_char_pos": 13933}, {"type": "R", "before": "poverty, see the work of Yale-based German philosopher, Thomas Pogge, especially his book World Poverty and Human Rights (2002)", "after": "AIDS: Sex, Drugs and Structural Violence (reprint ed.), Series in Health and Social Justice. Common Courage Press.", "start_char_pos": 13936, "end_char_pos": 14063}, {"type": "A", "before": null, "after": "This perspective has been continually discussed by Farmer, as well as by Philippe Bourgois and Nancy Scheper-Hughes. Farmer ultimately claims that \"structural interventions\" are one possible solution to such violence; structural violence is the result of policy and social structures, and change can only be a product of altering the processes that encourage structural violence in the first place.", "start_char_pos": 14064, "end_char_pos": 14064}, {"type": "A", "before": null, "after": "Theorists argue that structural violence is embedded in the current world system; this form of violence, which is centered on apparently inequitable social arrangements, is not inevitable. Ending the global problem of structural violence will require actions that may seem unfeasible in the short term. To some, this indicates that it may be easier to devote resources to minimizing the harmful impacts of structural violence. Others, such as futurist Wendell Bell, see a need for long-term vision to guide projects for social justice. Many structural violences, such as racism and sexism, have become such a common occurrence in society that they appear almost invisible. Despite this fact, sexism and racism have been the focus of intense cultural and political resistance for many decades. Significant reform has been accomplished, though the project remains incomplete.", "start_char_pos": 14065, "end_char_pos": 14065}, {"type": "A", "before": null, "after": "Farmer notes that there are three reasons why structural violence is hard to see:", "start_char_pos": 14066, "end_char_pos": 14066}, {"type": "A", "before": null, "after": "Suffering is exoticized\u2014that is, when something/someone is distant or far away, individuals tend to not be affected by it. When suffering lacks proximity, it's easy to exoticise. The weight of suffering is also impossible to comprehend. There is simply no way that many individuals are able to comprehend what suffering is like. Lastly, the dynamics and distribution of suffering are still poorly understood.Farmer, Paul, and Margaret Connors. 1996. Women, Poverty", "start_char_pos": 14067, "end_char_pos": 14067}, {"type": "A", "before": null, "after": "AIDS: Sex, Drugs and Structural Violence (reprint ed.), Series in Health and Social Justice. Common Courage Press.", "start_char_pos": 14069, "end_char_pos": 14069}, {"type": "A", "before": null, "after": "Anthropologist Seth Holmes studied suffering through the lens of structural violence in his 2013 ethnography Fresh Fruit Broken Bodies: Migrant Farmworkers in the United States. He analyzed the naturalization of physical and mental suffering, violence continuum, and structural vulnerability experienced by Mexican migrants in the U.S. in their everyday lives. Holmes used examples like governmental influences of structural violence\u2014such as how American subsidization of corn industries force Mexican farmers out of business, thereby forcing them to make the very dangerous trip across the border, where the U.S. Border Patrol hinder these migrants' chances of finding work in America, and the impact this all has on the migrants\u2019 bodies", "start_char_pos": 14070, "end_char_pos": 14070}, {"type": "R", "before": "References Johan Galtung,", "after": "Further reading Galtung, Johan. 1969.", "start_char_pos": 14073, "end_char_pos": 14098}, {"type": "R", "before": ",", "after": ".", "start_char_pos": 14136, "end_char_pos": 14137}, {"type": "D", "before": ", Vol.", "after": null, "start_char_pos": 14166, "end_char_pos": 14172}, {"type": "R", "before": ", No. 3. (1969), pp.", "after": "(3):", "start_char_pos": 14175, "end_char_pos": 14195}, {"type": "D", "before": "191.", "after": null, "start_char_pos": 14201, "end_char_pos": 14205}, {"type": "R", "before": "External links Robert Gilman:", "after": "91. Gilman, Robert. 1983.", "start_char_pos": 14206, "end_char_pos": 14235}, {"type": "R", "before": ".", "after": ":", "start_char_pos": 14257, "end_char_pos": 14258}, {"type": "R", "before": "(", "after": "In Context 4(Autumn", "start_char_pos": 14352, "end_char_pos": 14353}, {"type": "R", "before": "Kathleen Ho:", "after": ":8\u20138. Henderson, Sophie. 2019.", "start_char_pos": 14360, "end_char_pos": 14372}, {"type": "D", "before": "Structural Violence as a Human Rights Violation\", Essex Human Rights Review, Vol. 4 No. 2, September 2007 (ISSN 1756-1957) SophieHenderson: \"", "after": null, "start_char_pos": 14375, "end_char_pos": 14516}, {"type": "A", "before": null, "after": ".", "start_char_pos": 14619, "end_char_pos": 14619}, {"type": "R", "before": ", November 2019", "after": "26(12-13):1598\u2013615. . Ho, Kathleen. 2007. \"Structural Violence as a Human Rights Violation.\" Essex Human Rights Review 4(2). .", "start_char_pos": 14645, "end_char_pos": 14660}], "sents_char_pos": [0, 163, 419, 597, 713, 873, 1029, 1190, 1322, 1527, 2002, 2107, 2435, 2610, 2816, 3043, 3294, 3437, 3485, 3649, 3869, 4051, 4166, 4421, 4521, 4669, 4921, 5081, 5389, 5636, 5651, 5862, 6049, 6196, 6477, 6786, 6868, 6975, 7089, 7213, 7322, 7459, 7579, 7660, 7949, 8118, 8487, 8758, 8892, 9091, 9293, 9407, 9591, 9782, 9968, 10061, 10164, 10282, 10477, 10658, 10836, 11013, 11115, 11244, 11340, 11518, 11618, 11705, 11910, 12041, 12208, 12333, 12541, 12588, 12684, 12769, 12941, 13102, 13546, 13646, 13837, 14205]}
+{"doc_id": "8485040", "revision_depth": "2", "before_revision": "Important scientific contributions using balancer chromosomes Balancer chromosomes already give geneticists a reliable method for genetically screening organisms for a mutation and keeping that line constant . A new technique using balancer chromosomes is explored in the paper \"The Autosomal Flp-Dfs Technique for Generating Germline Mosaics in Drosophila Melanogaster . \" This paper showed for the first time that it is possible to screen for a recessive mutation that only shows phenotype when homozygous. Using old balancer chromosome methods, genetic screening only allowed the picking out of heterozygous dominant mutations. This experiment uses clonal screening to detect homozygous individuals and keep them in a constant line. They achieved this by using a gene isolated from yeast . This gene is called FLP recombinase and causes large chromosomal inversions. Through trial and error they found that the chromosomes could be recombined such that each had the recessive mutation while the other half contained half of a balancer chromosome with a physical marker and a lethal recessive. The other homolog did not contain the lethal recessive in the lines that survived. Figure one in the paper illustrates the screen. This new technique allowed recessive screening in 95\\% of the Drosophila genome. It also greatly improved yields in germ line mutations. Another published paper that employed the use of balancer chromosomes is \"Inhibition of RNA Interference and Modulation of Transposable Element Expression by Cell Death in Drosophila . \" This paper demonstrates the power of balancer chromosomes and what can be accomplished with genetically stable lines. A line was established that exhibited low levels of cell death and was named EGFPir hs-hid. The RNAi levels were analyzed and they found interesting results in the cells undergoing low levels of cell death and the surrounding cells in the tissue. They found that these cells would shut down their RNAi mechanism via maintaining RNA in a double stranded state. If RNA remains in a double stranded state then the RNAi mechanism of gene silencing is shut down . The authors speculated that this response was an evolutionary trend toward redundant immune response against RNA viruses. If one cell is already undergoing cell death to attempt to stop spread of a virus, then the RNAi immune response has been ineffective. This causes another immune response that attempts to stop the virus which is binding double stranded RNA and keeping double stranded so that it cannot be transcribed into virus proteins. The mechanism of maintaining double stranded RNA is not known.", "after_revision": "Important scientific contributions using balancer chromosomes Balancer chromosomes give geneticists a reliable method for genetically screening organisms for a specific mutation and maintaining that mutation consistently in subsequent generations . A new technique using balancer chromosomes is explored in the paper \"The Autosomal Flp-Dfs Technique for Generating Germline Mosaics in Drosophila Melanogaster \" , which showed for the first time that it is possible to screen for a recessive mutation that only shows a phenotype when homozygous. Using old balancer chromosome methods, genetic screening only allowed for the selection of heterozygous dominant mutations. This experiment uses clonal screening to detect homozygous individuals and keep them in a constant line. They achieved this by using the FLP recombinase gene, isolated from yeast , which causes large chromosomal inversions. Through trial and error they found that the chromosomes could be recombined such that each had the recessive mutation while the other half contained half of a balancer chromosome with a physical marker and a lethal recessive. The other homolog did not contain the lethal recessive in the lines that survived. Figure one in the paper illustrates the screen. This new technique allowed recessive screening in 95\\% of the Drosophila genome. It also greatly improved yields in germ-line mutations. Another published paper that employed the use of balancer chromosomes is \"Inhibition of RNA Interference and Modulation of Transposable Element Expression by Cell Death in Drosophila \" . This paper demonstrates the power of balancer chromosomes and what can be accomplished with genetically stable lines. A line was established that exhibited low levels of cell death and was named EGFPir hs-hid. When the RNAi levels were analyzed , the authors found interesting results in the cells undergoing low levels of cell death and the surrounding cells in the tissue. They found that these cells would shut down their RNAi mechanism via maintaining RNA in a double-stranded state; i.e. if RNA remains in a double-stranded state, then the RNAi mechanism of gene silencing is effectively disabled . The authors speculated that this response was an evolutionary trend toward a redundant immune response against RNA viruses. If one cell is already undergoing cell death to attempt to stop the spread of a virus, then the RNAi immune response has been ineffective. This causes another immune response that attempts to stop the virus , which is binding double-stranded RNA and keeping it double-stranded so that it cannot be transcribed into viral proteins. The precise mechanism by which double-stranded RNA is maintained is not known.", "edit_actions": [{"type": "R", "before": "Balancer chromosomes already", "after": "Balancer chromosomes", "start_char_pos": 62, "end_char_pos": 90}, {"type": "R", "before": "mutation and keeping that line constant", "after": "specific mutation and maintaining that mutation consistently in subsequent generations", "start_char_pos": 168, "end_char_pos": 207}, {"type": "D", "before": ".", "after": null, "start_char_pos": 370, "end_char_pos": 371}, {"type": "R", "before": "This paper", "after": ", which", "start_char_pos": 374, "end_char_pos": 384}, {"type": "A", "before": null, "after": "a", "start_char_pos": 482, "end_char_pos": 482}, {"type": "R", "before": "the picking out", "after": "for the selection", "start_char_pos": 580, "end_char_pos": 595}, {"type": "R", "before": "a gene", "after": "the FLP recombinase gene,", "start_char_pos": 765, "end_char_pos": 771}, {"type": "R", "before": ". This gene is called FLP recombinase and", "after": ", which", "start_char_pos": 792, "end_char_pos": 833}, {"type": "R", "before": "germ line", "after": "germ-line", "start_char_pos": 1344, "end_char_pos": 1353}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1548, "end_char_pos": 1549}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1552, "end_char_pos": 1552}, {"type": "R", "before": "The", "after": "When the", "start_char_pos": 1763, "end_char_pos": 1766}, {"type": "R", "before": "and they", "after": ", the authors", "start_char_pos": 1793, "end_char_pos": 1801}, {"type": "R", "before": "double stranded state. If", "after": "double-stranded state; i.e. if", "start_char_pos": 2008, "end_char_pos": 2033}, {"type": "R", "before": "double stranded state", "after": "double-stranded state,", "start_char_pos": 2051, "end_char_pos": 2072}, {"type": "R", "before": "shut down", "after": "effectively disabled", "start_char_pos": 2118, "end_char_pos": 2127}, {"type": "A", "before": null, "after": "a", "start_char_pos": 2205, "end_char_pos": 2205}, {"type": "A", "before": null, "after": "the", "start_char_pos": 2317, "end_char_pos": 2317}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2457, "end_char_pos": 2457}, {"type": "R", "before": "double stranded", "after": "double-stranded", "start_char_pos": 2475, "end_char_pos": 2490}, {"type": "R", "before": "double stranded", "after": "it double-stranded", "start_char_pos": 2507, "end_char_pos": 2522}, {"type": "R", "before": "virus", "after": "viral", "start_char_pos": 2561, "end_char_pos": 2566}, {"type": "R", "before": "mechanism of maintaining double stranded RNA", "after": "precise mechanism by which double-stranded RNA is maintained", "start_char_pos": 2581, "end_char_pos": 2625}], "sents_char_pos": [0, 209, 509, 631, 736, 793, 870, 1096, 1179, 1227, 1308, 1364, 1670, 1762, 1917, 2030, 2129, 2252, 2388, 2576]}
+{"doc_id": "8618", "revision_depth": "2", "before_revision": "Club + Appearances and goals by club, season and competitionClubSeasonLeagueLeagueCupLeague CupContinentalOtherIncludes other competitive competitions, including the FA Charity Shield, UEFA Super Cup, Intercontinental Cup, FIFA Club World Championship, Supercopa de Espa\u00f1a, SuperLiga and the MLS Cup PlayoffsTotalAppsGoalsAppsGoalsAppsGoalsAppsGoalsAppsGoalsAppsGoalsManchester United1992\u201393FA Premier League00001000\u2013101993\u2013 940000000000001994 \u2013 9540203011001011995 \u2013 96337312020 \u20134081996\u2013 9736821001021149121997 \u2013 983794200801050111998 \u2013 993467110122105591999 \u2013 00316 \u201300122504882000\u2013 013192000120104692001 \u2013 02281110001351043162002 \u2013 033163151133 \u20135211Total26562246121831510139485Preston North End (loan)1994\u201395Third Division520000\u20130052Real Madrid2003\u201304La Liga32342\u201371214572004\u2013 0530400 \u201380003842005\u2013 0631331 \u201371004152006\u2013 0723321 \u20136000314Total1161394\u20132822115520LA Galaxy2007MLS5000\u2013\u2013 2171200825500 \u2013\u2013 00255200911200 \u2013\u2013 4015220107200 \u2013\u2013 30102201126200 \u2013\u2013 40302201224700 \u20131160318Total981800\u20131119111820AC Milan (loan)2008\u201309Serie A18200\u2013 20002022009 \u2013 1011000 \u2013 2000130Total29200\u20134000332Paris Saint-Germain2012\u201313Ligue 110020\u20132000140Career total52397351012111818313719129", "after_revision": "Club + Appearances and goals by club, season and competitionClubSeasonLeagueLeagueCupLeague CupContinentalOtherIncludes other competitive competitions, including the FA Charity Shield, UEFA Super Cup, Intercontinental Cup, FIFA Club World Championship, Supercopa de Espa\u00f1a, SuperLiga and the MLS Cup PlayoffsTotalAppsGoalsAppsGoalsAppsGoalsAppsGoalsAppsGoalsAppsGoalsManchester United1992\u201393FA Premier League00001000\u2013101993\u2013 94FA Premier League0000000000001994 \u2013 95FA Premier League40203011001011995 \u2013 96FA Premier League337312020 \u20134081996\u2013 97FA Premier League36821001021149121997 \u2013 98FA Premier League3794200801050111998 \u2013 99FA Premier League3467110122105591999 \u2013 2000FA Premier League316 \u201300122504882000\u2013 01FA Premier League3192000120104692001 \u2013 02FA Premier League281110001351043162002 \u2013 03FA Premier League3163151133 \u20135211Total26562246121831510139485Preston North End (loan)1994\u201395Third Division520000\u20130052Real Madrid2003\u201304La Liga32342\u201371214572004\u2013 05La Liga30400 \u201380003842005\u2013 06La Liga31331 \u201371004152006\u2013 07La Liga23321 \u20136000314Total1161394\u20132822115520LA Galaxy2007MLS5000\u2013\u2013 21712008MLS25500 \u2013\u2013 002552009MLS11200 \u2013\u2013 401522010MLS7200 \u2013\u2013 301022011MLS26200 \u2013\u2013 403022012MLS24700 \u20131160318Total981800\u20131119111820AC Milan (loan)2008\u201309Serie A18200\u2013 2000202AC Milan (loan)2009 \u2013 10Serie A11000 \u2013 2000130Paris Saint-Germain2012\u201313Ligue 110020\u20132000140Career total52397351012111818313719129", "edit_actions": [{"type": "R", "before": "940000000000001994", "after": "94FA Premier League0000000000001994", "start_char_pos": 425, "end_char_pos": 443}, {"type": "R", "before": "9540203011001011995", "after": "95FA Premier League40203011001011995", "start_char_pos": 446, "end_char_pos": 465}, {"type": "R", "before": "96337312020", "after": "96FA Premier League337312020", "start_char_pos": 468, "end_char_pos": 479}, {"type": "R", "before": "9736821001021149121997", "after": "97FA Premier League36821001021149121997", "start_char_pos": 490, "end_char_pos": 512}, {"type": "R", "before": "983794200801050111998", "after": "98FA Premier League3794200801050111998", "start_char_pos": 515, "end_char_pos": 536}, {"type": "R", "before": "993467110122105591999", "after": "99FA Premier League3467110122105591999", "start_char_pos": 539, "end_char_pos": 560}, {"type": "R", "before": "00316", "after": "2000FA Premier League316", "start_char_pos": 563, "end_char_pos": 568}, {"type": "R", "before": "013192000120104692001", "after": "01FA Premier League3192000120104692001", "start_char_pos": 586, "end_char_pos": 607}, {"type": "R", "before": "02281110001351043162002", "after": "02FA Premier League281110001351043162002", "start_char_pos": 610, "end_char_pos": 633}, {"type": "R", "before": "033163151133", "after": "03FA Premier League3163151133", "start_char_pos": 636, "end_char_pos": 648}, {"type": "R", "before": "0530400", "after": "05La Liga30400", "start_char_pos": 782, "end_char_pos": 789}, {"type": "R", "before": "0631331", "after": "06La Liga31331", "start_char_pos": 804, "end_char_pos": 811}, {"type": "R", "before": "0723321", "after": "07La Liga23321", "start_char_pos": 826, "end_char_pos": 833}, {"type": "R", "before": "2171200825500", "after": "21712008MLS25500", "start_char_pos": 888, "end_char_pos": 901}, {"type": "R", "before": "00255200911200", "after": "002552009MLS11200", "start_char_pos": 905, "end_char_pos": 919}, {"type": "R", "before": "4015220107200", "after": "401522010MLS7200", "start_char_pos": 923, "end_char_pos": 936}, {"type": "R", "before": "30102201126200", "after": "301022011MLS26200", "start_char_pos": 940, "end_char_pos": 954}, {"type": "R", "before": "40302201224700", "after": "403022012MLS24700", "start_char_pos": 958, "end_char_pos": 972}, {"type": "R", "before": "20002022009", "after": "2000202AC Milan (loan)2009", "start_char_pos": 1039, "end_char_pos": 1050}, {"type": "R", "before": "1011000", "after": "10Serie A11000", "start_char_pos": 1053, "end_char_pos": 1060}, {"type": "R", "before": "2000130Total29200\u20134000332Paris", "after": "2000130Paris", "start_char_pos": 1063, "end_char_pos": 1093}], "sents_char_pos": [0, 445, 467, 481, 514, 538, 562, 609, 635, 650, 791]}
+{"doc_id": "8637258", "revision_depth": "1", "before_revision": "Early life and education Barcott's mother, Donna Schwartz-Barcott, is a nurse and anthropologist who teaches at the University of Rhode Island. His father, T.P. Schwartz-Barcott, attended Miami University on a Reserve Officers' Training Corps scholarship and went on to serve in the Marines' 3rd Reconnaissance Battalion during the Vietnam War. His father left the Marines as a captain after receiving a Bronze Star Medal with a valor device and a Purple Heart. His parents met as graduate students at the University of North Carolina at Chapel URL Barcott attended East Greenwich High School. He graduated in 2001 Phi Beta Kappa from the University of North Carolina at Chapel URL He attended UNC on a four-year U.S. Marine Corps NROTC URL Barcott graduated in 2009 with an MPA and MBA from Harvard University, where he was a Center for Public Leadership Social Entrepreneurship Fellow and George Leadership URL Harvard University President Drew Faust appointed him to a two-year term on the Harvard Endowment's Advisory Committee on Shareholder Responsibility, and he served as a founding member of the movement to create an MBA Oath. He was elected as a member of the Harvard University Alumni Association Board of Directors in 2016. Military service Barcott served five years on active duty in the Marine Corps, where he attained the rank of captain and deployed to Bosnia, the Horn of Africa, and Iraq. Barcott on It Happened on the Way to War at the Pritzker Military Museum Library In 2006, he provided written testimony to the Iraq Study Group and authored an article about the Iraqi Military Intelligence Academy in Proceedings, the professional journal of the U.S. Navy. ABC World News with Charles Gibson covered his work in Kibera and his military service in Iraq and named him a Person of the Week and a 2006 Person of the Year. The ABC World News story quoted him encouraging young Americans to expose themselves \"to how the majority of the world lives \u2026 and I think it'll make you a lot more appreciative of what you've got \u2026 make you a better American and a better global URL Social enterprises While an undergraduate at the UNC in 2001, Barcott founded Carolina for Kibera (CFK) in Kenya with Salim Mohamed and Tabitha Atieno Festo. CFK started as a small inter-ethnic soccer program and medical clinic run out of Festo's ten-by-ten foot shack. Today it is an affiliated entity of the University of North Carolina at Chapel URL Barcott is the Chair of the Board of URL CFK 's Advisory Council includes former U.S. Secretary of State Madeleine Albright, former CDC Director Dr. William Roper and the former CEO of the Kenya Medical Association Stellah URL Investing Barcott and Dan McCready co-founded Double Time Capital in 2013 as an impact investment firm focused on clean energy and sustainability. As of February 2017, \"Double Time has financed 36 solar energy projects, which collectively produce roughly 10\\% of North Carolina's solar power and power around 30,000 homes in the state.\" At that time, North Carolina was the second ranked state in the United States based on the cumulative amount of solar electric capacity installed. Double Time Capital also invested in growth-oriented companies with sustainable products and URL Public speaking Barcott delivered the 2007 commencement address to the University of North Carolina at Chapel Hill School of Public Health. He was the 2018 commencement speaker for the University of North Carolina at Chapel URL As an inaugural TED Fellow, he gave a TED speech on \"The Power of Participatory Development.\" He is an annual speaker at the U.S. Marine Corps Battles Won Academy for Semper Fidelis high school student URL He is represented by the American Program Bureau and frequently speaks at colleges and high URL Boards Barcott serves on the Boards of the National Veterans Memorial and URL National Democratic URL Veterans Bridge URL The U.S. Institute for URL and the Global War on Terrorism Memorial URL He previously served on the board of the international development organization World Learning and its accredited institution the School for International Training, and returned to that board in October URL President Barack Obama appointed Barcott to the J. William Fulbright Foreign Scholarship Board as a representative of the veteran URL Published work Barcott is the author of the memoir It Happened on the Way to War (Bloomsbury Publishing). The book's dedication to Carolina For Kibera cofounders Salim Mohamed and Tabitha Atieno Festo includes a phrase that captures the central theme of the book: \"Talent is universal; opportunity is URL In 2001, Barcott co-edited with Dr. Carolyn Pumphrey Armed Conflict in Africa, a book that analyzed the sources of violence in URL His post-9/11 letters with Salim Mohamed were published in Andrew Carroll's War Letters: Extraordinary Correspondence from American Wars (Scribner, 2001). He contributed to Passion and Purpose, 27 Views of Charlotte, and 65 Successful Harvard Business School Application Essays. His writing has appeared in The Washington URL The New York URL and URL It Happened on the Way to War was one of four books selected for the TED 2011 Book Club, and was named best nonfiction title in 2011 by the North Carolina Literary and Historical Association. In 2011, Reader's Digest named the book as one of four top nonfiction titles of the URL The World Economic Forum named him a Young Global URL Harvard Business School presented Barcott and his classmates Alex Ellis, Neil Wagle, and Kate Wattson with the Dean\u2019s Award for Service to the School and URL Dartmouth College awarded him a Doctorate of Humane Letters in URL", "after_revision": "Early life and education Barcott's mother, Donna Schwartz-Barcott, is a nurse and anthropologist who teaches at the University of Rhode Island. His father, T.P. Schwartz-Barcott, attended Miami University on a Reserve Officers' Training Corps scholarship and went on to serve in the Marines' 3rd Reconnaissance Battalion during the Vietnam War. His father left the Marines as a captain after receiving a Bronze Star Medal with a valor device and a Purple Heart. His parents met as graduate students at the University of North Carolina at Chapel Hill. Barcott attended East Greenwich High School. He graduated in 2001 Phi Beta Kappa from the University of North Carolina at Chapel Hill. He attended UNC on a four-year U.S. Marine Corps NROTC Scholarship. Barcott graduated in 2009 with an MPA and MBA from Harvard University, where he was a Center for Public Leadership Social Entrepreneurship Fellow and George Leadership Fellow. Harvard University President Drew Faust appointed him to a two-year term on the Harvard Endowment's Advisory Committee on Shareholder Responsibility, and he served as a founding member of the movement to create an MBA Oath. He was elected as a member of the Harvard University Alumni Association Board of Directors in 2016. Military service Barcott served five years on active duty in the Marine Corps, where he attained the rank of captain and deployed to Bosnia, the Horn of Africa, and Iraq. In 2006, he provided written testimony to the Iraq Study Group and authored an article about the Iraqi Military Intelligence Academy in Proceedings, the professional journal of the U.S. Navy. ABC World News with Charles Gibson covered his work in Kibera and his military service in Iraq and named him a Person of the Week and a 2006 Person of the Year. The ABC World News story quoted him encouraging young Americans to expose themselves \"to how the majority of the world lives \u2026 and I think it'll make you a lot more appreciative of what you've got \u2026 make you a better American and a better global citizen.\" Social enterprises While an undergraduate at the UNC in 2001, Barcott founded Carolina for Kibera (CFK) in Kenya with Salim Mohamed and Tabitha Atieno Festo. CFK started as a small inter-ethnic soccer program and medical clinic run out of Festo's ten-by-ten foot shack. Today it is an affiliated entity of the University of North Carolina at Chapel Hill. Barcott is the Chair of the Board of CFK. CFK 's Advisory Council includes former U.S. Secretary of State Madeleine Albright, former CDC Director Dr. William Roper and the former CEO of the Kenya Medical Association Stellah Bosire. Investing Barcott and Dan McCready co-founded Double Time Capital in 2013 as an impact investment firm focused on clean energy and sustainability. As of February 2017, \"Double Time has financed 36 solar energy projects, which collectively produce roughly 10\\% of North Carolina's solar power and power around 30,000 homes in the state.\" At that time, North Carolina was the second ranked state in the United States based on the cumulative amount of solar electric capacity installed. Double Time Capital also invested in growth-oriented companies with sustainable products and services. Public speaking Barcott delivered the 2007 commencement address to the University of North Carolina at Chapel Hill School of Public Health. He was the 2018 commencement speaker for the University of North Carolina at Chapel Hill. As an inaugural TED Fellow, he gave a TED speech on \"The Power of Participatory Development.\" He is an annual speaker at the U.S. Marine Corps Battles Won Academy for Semper Fidelis high school student URL He is represented by the American Program Bureau and frequently speaks at colleges and high schools. Boards Barcott serves on the Boards of the National Veterans Memorial and URL National Democratic Institute, Veterans Bridge Home, The U.S. Institute for Peace, and the Global War on Terrorism Memorial Foundation. He previously served on the board of the international development organization World Learning and its accredited institution the School for International Training, and returned to that board in October 2020. President Barack Obama appointed Barcott to the J. William Fulbright Foreign Scholarship Board as a representative of the veteran community. Published work Barcott is the author of the memoir It Happened on the Way to War (Bloomsbury Publishing). The book's dedication to Carolina For Kibera cofounders Salim Mohamed and Tabitha Atieno Festo includes a phrase that captures the central theme of the book: \"Talent is universal; opportunity is not.\" In 2001, Barcott co-edited with Dr. Carolyn Pumphrey Armed Conflict in Africa, a book that analyzed the sources of violence in URL His post-9/11 letters with Salim Mohamed were published in Andrew Carroll's War Letters: Extraordinary Correspondence from American Wars (Scribner, 2001). He contributed to Passion and Purpose, 27 Views of Charlotte, and 65 Successful Harvard Business School Application Essays. His writing has appeared in The Washington URL The New York Times, and TIME. It Happened on the Way to War was one of four books selected for the TED 2011 Book Club, and was named best nonfiction title in 2011 by the North Carolina Literary and Historical Association. In 2011, Reader's Digest named the book as one of four top nonfiction titles of the year. The World Economic Forum named him a Young Global Leader. Harvard Business School presented Barcott and his classmates Alex Ellis, Neil Wagle, and Kate Wattson with the Dean\u2019s Award for Service to the School and Society. Dartmouth College awarded him a Doctorate of Humane Letters in 2016.", "edit_actions": [{"type": "R", "before": "URL", "after": "Hill.", "start_char_pos": 545, "end_char_pos": 548}, {"type": "R", "before": "URL", "after": "Hill.", "start_char_pos": 678, "end_char_pos": 681}, {"type": "R", "before": "URL", "after": "Scholarship.", "start_char_pos": 737, "end_char_pos": 740}, {"type": "R", "before": "URL", "after": "Fellow.", "start_char_pos": 909, "end_char_pos": 912}, {"type": "D", "before": "Barcott on It Happened on the Way to War at the Pritzker Military Museum", "after": null, "start_char_pos": 1408, "end_char_pos": 1480}, {"type": "D", "before": "Library", "after": null, "start_char_pos": 1481, "end_char_pos": 1488}, {"type": "R", "before": "URL", "after": "citizen.\"", "start_char_pos": 2088, "end_char_pos": 2091}, {"type": "R", "before": "URL", "after": "Hill.", "start_char_pos": 2441, "end_char_pos": 2444}, {"type": "R", "before": "URL CFK", "after": "CFK. CFK", "start_char_pos": 2482, "end_char_pos": 2489}, {"type": "R", "before": "URL", "after": "Bosire.", "start_char_pos": 2668, "end_char_pos": 2671}, {"type": "R", "before": "URL", "after": "services.", "start_char_pos": 3249, "end_char_pos": 3252}, {"type": "R", "before": "URL", "after": "Hill.", "start_char_pos": 3477, "end_char_pos": 3480}, {"type": "R", "before": "URL", "after": "schools.", "start_char_pos": 3779, "end_char_pos": 3782}, {"type": "R", "before": "URL Veterans Bridge URL", "after": "Institute, Veterans Bridge Home,", "start_char_pos": 3881, "end_char_pos": 3904}, {"type": "R", "before": "URL", "after": "Peace,", "start_char_pos": 3928, "end_char_pos": 3931}, {"type": "R", "before": "URL", "after": "Foundation.", "start_char_pos": 3973, "end_char_pos": 3976}, {"type": "R", "before": "URL", "after": "2020.", "start_char_pos": 4180, "end_char_pos": 4183}, {"type": "R", "before": "URL", "after": "community.", "start_char_pos": 4314, "end_char_pos": 4317}, {"type": "R", "before": "URL", "after": "not.\"", "start_char_pos": 4619, "end_char_pos": 4622}, {"type": "R", "before": "URL and URL", "after": "Times, and TIME.", "start_char_pos": 5093, "end_char_pos": 5104}, {"type": "R", "before": "URL", "after": "year.", "start_char_pos": 5381, "end_char_pos": 5384}, {"type": "R", "before": "URL", "after": "Leader.", "start_char_pos": 5435, "end_char_pos": 5438}, {"type": "R", "before": "URL", "after": "Society.", "start_char_pos": 5593, "end_char_pos": 5596}, {"type": "R", "before": "URL", "after": "2016.", "start_char_pos": 5660, "end_char_pos": 5663}], "sents_char_pos": [0, 143, 344, 461, 593, 811, 1136, 1236, 1407, 1680, 1841, 1968, 2040, 2249, 2361, 2593, 2818, 3008, 3155, 3392, 3574, 3591, 3602, 3618, 3632, 3644, 3655, 4141, 4423, 4603, 4908, 5032, 5296]}
+{"doc_id": "8813018", "revision_depth": "1", "before_revision": "The chain of survival refers to a series of actions that, properly executed, reduce the mortality associated with sudden cardiac arrest. Like any chain, the chain of survival is only as strong as its weakest link. The four interdependent links in the chain of survival are early access , early CPR, early defibrillation, and early advanced cardiac life support .that Background The \"chain of survival\" was first published in the March 1983 newsletter of CPR for Citizens, an American Heart Association Training Center in Orlando, Florida. Jim Page, founder of JEMS magazine, received a copy of the newsletter and asked permission to use the metaphor. Mary M. Newman, an associate of Mr Page, used as a slogan for the 1988 Conference on Citizen CPR, described in an article she wrote for the Journal of Emergency Medical Services in 1989, and promoted in an editorial she wrote for the first issue of Currents in Emergency Cardiac Care in 1990. The American Heart Association later adopted the concept and elaborated on it in its 1992 guidelines for cardiopulmonary resuscitation and emergency cardiac care, The International Liaison Committee on Resuscitation (ILCOR) echoed the concept in 1997.\"Part 12: From Science to Survival - Strengthening the Chain of Survival in Every Community,\" Circulation 2000;102:I-358 The links of the Chain of survival are described below. Early access Ideally, someone must recognize an impending cardiac arrest or otherwise witness the cardiac arrest and activate the EMS system as early as possible with an immediate call to the emergency services. Unfortunately, many persons experiencing symptoms (for example, angina) that may lead to a cardiac arrest ignore these warning symptoms or, recognizing these warning symptoms correctly, fail to activate the EMS system, preferring to contact relatives instead (e.g., the elderly often contact their adult offspring rather than contact emergency services). Early CPR To be most effective, bystanders should provide CPR immediately after a patient collapses. Properly performed CPR can keep the heart in a shockable rhythm for 10\u201312 minutes longer. Early defibrillation Most adults who can be saved from cardiac arrest are in ventricular fibrillation or pulseless ventricular tachycardia . Early defibrillation is the link in the chain most likely to improve survival . Public access defibrillation may be the key to improving survival rates in out-of-hospital cardiac arrest, but is of the greatest value when the other links in the chain do not fail. Early advanced care Early advanced cardiac life support by paramedics is another critical link in the chain of survival. In communities with survival rates > 20\\%, a minimum of two of the rescuers are trained to the advanced level .", "after_revision": "The chain of survival refers to a series of actions that, properly executed, reduce the mortality associated with sudden cardiac arrest. Like any chain, the chain of survival is only as strong as its weakest link. The six interdependent links in the chain of survival are early recognition of sudden cardiac arrest and access to emergency medical care , early CPR, early defibrillation, early advanced cardiac life support , and physical and emotional recovery. The first three links in the chain can be performed by lay bystanders, while the second three links are designated to medical professionals. Currently, between 70-90\\% of cardiac arrest victims die before they reach the hospital. However, a cardiac arrest does not have to be lethal if bystanders can take the right steps immediately. Background According to the American Heart Association, out-of-hospital cardiac arrest can affect more than 300,000 people in the United States each year. Three minutes after the onset of cardiac arrest, a lack of blood flow starts to damage the brain, and 10 minutes after, the chances of survival are low. Therefore, bystanders have only a few minutes to act to optimize a victim\u2019s chances of survival and recovery. To improve survival outcomes for people who have experienced out-of-hospital cardiac arrest, the American Heart Association\u2013International Liaison Committee on Resuscitation recommended the chain of survival concept in the early 2000\u2019s. Originally, the chain consisted of four steps: early access to emergency medical care was the first link, the second link was early CPR, early defibrillation was the third link, and the final link was early advanced cardiac life support. Over the years, the American Heart Association has added two new links to the chain: post-resuscitation care in 2010, and physical and emotional recovery in 2020. Also in 2020, the American Heart Association issued a new pediatric chain of survival for infants, children, and adolescents. However, the \"chain of survival\" was first published in the March 1983 newsletter of CPR for Citizens, an American Heart Association Training Center in Orlando, Florida. Jim Page, founder of JEMS magazine, received a copy of the newsletter and asked permission to use the metaphor. Mary M. Newman, co-founder and President/CEO of the Sudden Cardiac Arrest (SCA) Foundation and previous Executive Director of the National Center for Early Defibrillation at the University of Pittsburgh, used the chain of survival as a slogan for the 1988 Conference on Citizen CPR, which she described in an article she wrote for the Journal of Emergency Medical Services in 1989, and promoted in an editorial she wrote for the first issue of Currents in Emergency Cardiac Care in 1990. The American Heart Association later adopted the concept and elaborated on it in its 1992 guidelines for cardiopulmonary resuscitation and emergency cardiac care, The International Liaison Committee on Resuscitation (ILCOR) echoed the concept in 1997.\"Part 12: From Science to Survival - Strengthening the Chain of Survival in Every Community,\" Circulation 2000;102:I-358 The links of the Chain of survival are described below. Early access to emergency medical care Ideally, someone must recognize an impending cardiac arrest or otherwise witness the cardiac arrest and activate the EMS system as early as possible with an immediate call to the emergency services. Unfortunately, many persons experiencing symptoms (for example, angina) that may lead to a cardiac arrest ignore these warning symptoms or, recognizing these warning symptoms correctly, fail to activate the EMS system, preferring to contact relatives instead (e.g., the elderly often contact their adult offspring rather than contact emergency services). Early CPR To be most effective, bystanders should provide CPR immediately after a patient collapses. In their 2015 guidelines, the American Heart Association re-emphasized the importance of more bystanders performing hands-only CPR until EMS personnel arrive because, at present, fewer than 40\\% of people who have an out-of-hospital cardiac arrest receive CPR from a bystander. The guidelines recommend lay rescuers start CPR on a person with presumed cardiac arrest because the overall risk of harm to patients from CPR is low, even if their heart hasn't stopped beating. Properly performed CPR can keep the heart in a shockable rhythm for 10\u201312 minutes longer. Early defibrillation Most adults who can be saved from cardiac arrest are in ventricular fibrillation or pulseless ventricular tachycardia , which means their heart has fallen out of rhythm . Early defibrillation is the link in the chain most likely to improve survival since defibrillation can help shock the heart back into a regular beat. Early, rapid defibrillation is considered the most important link in the chain of survival. Rapid defibrillation outside of the hospital improves the chances of survival by as much as 30\\%, and involves using an automated external defibrillator (AED) to shock the victim\u2019s heart. While CPR keeps blood flowing artificially, rapid defibrillation is the only way to restart the heart and reset it to a healthy rhythm. And while only 40\\% of adults experiencing cardiac arrest receive CPR, fewer than 12\\% receive shocks from an AED before EMS arrival. Whatsmore, the chances of the victim\u2019s survival decrease by as much as 10\\% with every minute that they do not receive rapid defibrillation. AEDs are becoming more common in businesses, schools, and even the home as the public becomes more aware of the importance of rapid defibrillation. AEDs come with pre-recorded instructions and are easy to use. If an AED is not available, bystanders will need to continue CPR until emergency responders arrive with a defibrillator, which is why it is important to recognize cardiac arrest and call for help quickly. Public access defibrillation may be the key to improving survival rates in out-of-hospital cardiac arrest, but is of the greatest value when the other links in the chain do not fail. Early advanced care Early advanced cardiac life support by paramedics is another critical link in the chain of survival. In communities with survival rates > 20\\%, a minimum of two of the rescuers are trained to the advanced level . Some ACLS ambulance providers will administer medications to manage pain, arrhythmias, shock, and pulmonary congestion; monitor the heart rhythm to identify any potentially lethal cardiac arrhythmias; or initiate transcutaneous pacing. ACLS ambulance providers use the mnemonic \u201cMONA\u201d (morphine, oxygen, nitroglycerin, and aspirin) to reflect the out-of-hospital therapies they will use for cardiac arrest. Often, ACLS ambulance providers will attach an electrocardiogram to the victim and transmit its findings to the receiving hospital or care facility, which leads to earlier diagnosis of a heart attack, and significantly reduces time to treatment at the hospital. This prearrival ECG and notification has been shown to improve patient outcomes. In the event of a complication at the scene of the event or on the way to the hospital, ACLS ambulance providers can administer life saving therapies, including CPR, rapid defibrillation, airway management, and intravenous medications. Recovery In October 2020, the American Heart Association added the recovery phase as the sixth link in the chain of survival. Recovery consists of cardiac arrest survivors receiving treatment, surveillance, and rehabilitation at a hospital. It also includes an assessment for anxiety, depression, and post-traumatic stress, which can all lead to future repeated events. Before being discharged from the hospital, the American Heart Association recommends that cardiac arrest survivors receive rehabilitation assessment and treatment for physical, neurologic, cardiopulmonary, and cognitive impairments. They also recommend that cardiac arrest survivors and their caregivers receive comprehensive, multidisciplinary discharge planning to include medical and rehabilitative treatment recommendations and return to activity and work expectations. A patient\u2019s recovery from cardiac arrest continues long after their initial hospitalization following the event, so the American Heart Association recommended in their 2020 guidelines that patients have formal assessment and support for their physical, cognitive, and psychosocial needs .", "edit_actions": [{"type": "R", "before": "four", "after": "six", "start_char_pos": 218, "end_char_pos": 222}, {"type": "R", "before": "access", "after": "recognition of sudden cardiac arrest and access to emergency medical care", "start_char_pos": 279, "end_char_pos": 285}, {"type": "D", "before": "and", "after": null, "start_char_pos": 321, "end_char_pos": 324}, {"type": "R", "before": ".that", "after": ", and physical and emotional recovery. The first three links in the chain can be performed by lay bystanders, while the second three links are designated to medical professionals. Currently, between 70-90\\% of cardiac arrest victims die before they reach the hospital. However, a cardiac arrest does not have to be lethal if bystanders can take the right steps immediately.", "start_char_pos": 361, "end_char_pos": 366}, {"type": "R", "before": "The", "after": "According to the American Heart Association, out-of-hospital cardiac arrest can affect more than 300,000 people in the United States each year. Three minutes after the onset of cardiac arrest, a lack of blood flow starts to damage the brain, and 10 minutes after, the chances of survival are low. Therefore, bystanders have only a few minutes to act to optimize a victim\u2019s chances of survival and recovery.", "start_char_pos": 378, "end_char_pos": 381}, {"type": "A", "before": null, "after": "To improve survival outcomes for people who have experienced out-of-hospital cardiac arrest, the American Heart Association\u2013International Liaison Committee on Resuscitation recommended the chain of survival concept in the early 2000\u2019s. Originally, the chain consisted of four steps: early access to emergency medical care was the first link, the second link was early CPR, early defibrillation was the third link, and the final link was early advanced cardiac life support. Over the years, the American Heart Association has added two new links to the chain: post-resuscitation care in 2010, and physical and emotional recovery in 2020. Also in 2020, the American Heart Association issued a new pediatric chain of survival for infants, children, and adolescents.", "start_char_pos": 382, "end_char_pos": 382}, {"type": "A", "before": null, "after": "However, the", "start_char_pos": 383, "end_char_pos": 383}, {"type": "R", "before": "an associate of Mr Page, used", "after": "co-founder and President/CEO of the Sudden Cardiac Arrest (SCA) Foundation and previous Executive Director of the National Center for Early Defibrillation at the University of Pittsburgh, used the chain of survival", "start_char_pos": 669, "end_char_pos": 698}, {"type": "A", "before": null, "after": "which she", "start_char_pos": 751, "end_char_pos": 751}, {"type": "A", "before": null, "after": "to emergency medical care", "start_char_pos": 1388, "end_char_pos": 1388}, {"type": "A", "before": null, "after": "In their 2015 guidelines, the American Heart Association re-emphasized the importance of more bystanders performing hands-only CPR until EMS personnel arrive because, at present, fewer than 40\\% of people who have an out-of-hospital cardiac arrest receive CPR from a bystander. The guidelines recommend lay rescuers start CPR on a person with presumed cardiac arrest because the overall risk of harm to patients from CPR is low, even if their heart hasn't stopped beating.", "start_char_pos": 2044, "end_char_pos": 2044}, {"type": "A", "before": null, "after": ", which means their heart has fallen out of rhythm", "start_char_pos": 2274, "end_char_pos": 2274}, {"type": "R", "before": ".", "after": "since defibrillation can help shock the heart back into a regular beat. Early, rapid defibrillation is considered the most important link in the chain of survival. Rapid defibrillation outside of the hospital improves the chances of survival by as much as 30\\%, and involves using an automated external defibrillator (AED) to shock the victim\u2019s heart.", "start_char_pos": 2355, "end_char_pos": 2356}, {"type": "A", "before": null, "after": "While CPR keeps blood flowing artificially, rapid defibrillation is the only way to restart the heart and reset it to a healthy rhythm. And while only 40\\% of adults experiencing cardiac arrest receive CPR, fewer than 12\\% receive shocks from an AED before EMS arrival. Whatsmore, the chances of the victim\u2019s survival decrease by as much as 10\\% with every minute that they do not receive rapid defibrillation.", "start_char_pos": 2357, "end_char_pos": 2357}, {"type": "A", "before": null, "after": "AEDs are becoming more common in businesses, schools, and even the home as the public becomes more aware of the importance of rapid defibrillation. AEDs come with pre-recorded instructions and are easy to use. If an AED is not available, bystanders will need to continue CPR until emergency responders arrive with a defibrillator, which is why it is important to recognize cardiac arrest and call for help quickly.", "start_char_pos": 2358, "end_char_pos": 2358}, {"type": "A", "before": null, "after": ".", "start_char_pos": 2773, "end_char_pos": 2773}, {"type": "A", "before": null, "after": "Some ACLS ambulance providers will administer medications to manage pain, arrhythmias, shock, and pulmonary congestion; monitor the heart rhythm to identify any potentially lethal cardiac arrhythmias; or initiate transcutaneous pacing. ACLS ambulance providers use the mnemonic \u201cMONA\u201d (morphine, oxygen, nitroglycerin, and aspirin) to reflect the out-of-hospital therapies they will use for cardiac arrest.", "start_char_pos": 2774, "end_char_pos": 2774}, {"type": "A", "before": null, "after": "Often, ACLS ambulance providers will attach an electrocardiogram to the victim and transmit its findings to the receiving hospital or care facility, which leads to earlier diagnosis of a heart attack, and significantly reduces time to treatment at the hospital. This prearrival ECG and notification has been shown to improve patient outcomes. In the event of a complication at the scene of the event or on the way to the hospital, ACLS ambulance providers can administer life saving therapies, including CPR, rapid defibrillation, airway management, and intravenous medications.", "start_char_pos": 2775, "end_char_pos": 2775}, {"type": "A", "before": null, "after": "Recovery In October 2020, the American Heart Association added the recovery phase as the sixth link in the chain of survival. Recovery consists of cardiac arrest survivors receiving treatment, surveillance, and rehabilitation at a hospital. It also includes an assessment for anxiety, depression, and post-traumatic stress, which can all lead to future repeated events. Before being discharged from the hospital, the American Heart Association recommends that cardiac arrest survivors receive rehabilitation assessment and treatment for physical, neurologic, cardiopulmonary, and cognitive impairments. They also recommend that cardiac arrest survivors and their caregivers receive comprehensive, multidisciplinary discharge planning to include medical and rehabilitative treatment recommendations and return to activity and work expectations.", "start_char_pos": 2776, "end_char_pos": 2776}, {"type": "A", "before": null, "after": "A patient\u2019s recovery from cardiac arrest continues long after their initial hospitalization following the event, so the American Heart Association recommended in their 2020 guidelines that patients have formal assessment and support for their physical, cognitive, and psychosocial needs", "start_char_pos": 2777, "end_char_pos": 2777}], "sents_char_pos": [0, 136, 213, 540, 652, 946, 1374, 1587, 1942, 2043, 2134, 2541, 2662]}
+{"doc_id": "999909", "revision_depth": "1", "before_revision": "History The origin of civil vital statistics begins as early as 1854 with James Stark in Register House in Edinburgh in reaction to the Scottish Registration ActScottish Registration Act 1854 and death by social class was recorded in England beginning in 1921.Caselli G. Health Transition and Cause-specific Mortality. In: Schofield R, Reher D, Bideau A, editors. The Decline of Mortality in Europe.Oxford: Clarendon Press; 1991. Prior to the civil systems of recording vital statistics, many churches recorded births, deaths, and marriages among their members, as early as the 16th century. The term church members is meant to include common people, not just the nobility, who kept their birth and death records since Roman times.In the US, counties in the various states began in different years over the 19th century to keep the civil records regularly .", "after_revision": "History Prior to the creation of the General Register Office (GRO) in 1837, there was no national system of civil registration in England and Wales. Baptisms, marriages and burials were recorded in parish registers maintained by Church of England (Anglican) clergy. However, with the great increase in nonconformity and the gradual relaxation of the laws against Catholics and other dissenters from the late 17th century, more and more baptisms, marriages and burials were going unrecorded in the registers of the Anglican Church. The increasingly poor state of English parish registration led to numerous attempts to shore up the system in the 18th and early 19th centuries. The Marriage Act of 1753 attempted to prevent 'clandestine' marriages by imposing a standard form of entry for marriages, which had to be signed by both parties to the marriage and by witnesses. Additionally, except in the case of Jews and Quakers, legal marriages had to be carried out according to the rites of the Church of England. Sir George Rose's Parochial Registers Act of 1812 laid down that all events had to be entered on standard entries in bound volumes. It also declared that the church registers of Nonconformists were not admissible in court as evidence of births, marriages and deaths. Only those maintained by the clergy of the Church of England could be presented in court as legal documents, and this caused considerable hardship for Nonconformists. A number of proposals were presented to Parliament to set up centralised registries for recording vital events in the 1820s but none came to fruition.Higgs, E. Registration before civil registration at URL Retrieved 18 August 2013 Eventually, increasing concern that the poor registration of baptisms, marriages and burials undermined property rights, by making it difficult to establish lines of descent, coupled with the complaints of Nonconformists, led to the establishment in 1833 of a parliamentary Select Committee on Parochial Registration. This took evidence on the state of the parochial system of registration, and made proposals that were eventually incorporated into the 1836 Registration and Marriage Acts. In addition, the government wanted to survey matters such as infant mortality, fertility and literacy to bring about improvements in health and social welfare. The medical establishment advocated this because a rapidly growing population in the northern industrial towns \u2013 caused by the Industrial Revolution \u2013 had created severe overcrowding, and the links between poor living conditions and short life expectancy were now known. The answer was the establishment of a civil registration system. It was hoped that improved registration of vital events would protect property rights through the more accurate recording of lines of descent. Civil registration would also remove the need for Nonconformists to rely upon the Church of England for registration, and provide medical data for research.Higgs, E. The early development of the General Register Office at URL Retrieved 18 August 2013 As a result, in 1836, legislation was passed that ordered the civil registration of births, marriages and deaths in England and Wales. This took effect from 1 July 1837. A General Register Office was set up in London and the office of Registrar General was established. England and Wales were divided into 619 registration districts (623 from 1851), each under the supervision of a superintendent registrar. The districts were based on the recently introduced poor law unions. The registration districts were further divided into sub-districts (there could be two or more), each under the charge of registrars who were appointed locally. The General Register Office for Scotland was created in 1854. The General Register Office (Northern Ireland) holds records from 1864 onward for what is now Northern Ireland .", "edit_actions": [{"type": "R", "before": "The origin of civil vital statistics begins as early as 1854 with James Stark in Register House in Edinburgh in reaction to", "after": "Prior to the creation of the General Register Office (GRO) in 1837, there was no national system of civil registration in England and Wales. Baptisms, marriages and burials were recorded in parish registers maintained by Church of England (Anglican) clergy. However, with the great increase in nonconformity and the gradual relaxation of the laws against Catholics and other dissenters from the late 17th century, more and more baptisms, marriages and burials were going unrecorded in the registers of the Anglican Church.", "start_char_pos": 8, "end_char_pos": 131}, {"type": "A", "before": null, "after": "The increasingly poor state of English parish registration led to numerous attempts to shore up the system in the 18th and early 19th centuries. The Marriage Act of 1753 attempted to prevent 'clandestine' marriages by imposing a standard form of entry for marriages, which had to be signed by both parties to the marriage and by witnesses. Additionally, except in the case of Jews and Quakers, legal marriages had to be carried out according to the rites of the Church of England. Sir George Rose's Parochial Registers Act of 1812 laid down that all events had to be entered on standard entries in bound volumes. It also declared that the church registers of Nonconformists were not admissible in court as evidence of births, marriages and deaths. Only those maintained by the clergy of the Church of England could be presented in court as legal documents, and this caused considerable hardship for Nonconformists. A number of proposals were presented to Parliament to set up centralised registries for recording vital events in", "start_char_pos": 132, "end_char_pos": 132}, {"type": "R", "before": "Scottish Registration ActScottish Registration Act 1854 and death by social class was recorded in England beginning in 1921.Caselli G. Health Transition and Cause-specific Mortality. In: Schofield R, Reher D, Bideau A, editors. The Decline of Mortality in Europe.Oxford: Clarendon Press; 1991.", "after": "1820s but none came to fruition.Higgs, E. Registration before civil registration at URL Retrieved 18 August 2013", "start_char_pos": 137, "end_char_pos": 430}, {"type": "R", "before": "Prior to the civil systems of recording vital statistics, many churches recorded births, deaths,", "after": "Eventually, increasing concern that the poor registration of baptisms, marriages and burials undermined property rights, by making it difficult to establish lines of descent, coupled with the complaints of Nonconformists, led to the establishment in 1833 of a parliamentary Select Committee on Parochial Registration. This took evidence on the state of the parochial system of registration, and made proposals that were eventually incorporated into the 1836 Registration and Marriage Acts. In addition, the government wanted to survey matters such as infant mortality, fertility and literacy to bring about improvements in health and social welfare. The medical establishment advocated this because a rapidly growing population in the northern industrial towns \u2013 caused by the Industrial Revolution \u2013 had created severe overcrowding, and the links between poor living conditions and short life expectancy were now known.", "start_char_pos": 431, "end_char_pos": 527}, {"type": "A", "before": null, "after": "The answer was the establishment of a civil registration system. It was hoped that improved registration of vital events would protect property rights through the more accurate recording of lines of descent. Civil registration would also remove the need for Nonconformists to rely upon the Church of England for registration,", "start_char_pos": 528, "end_char_pos": 528}, {"type": "R", "before": "marriages among their members, as early as the 16th century. The term church members is meant to include common people, not just the nobility, who kept their birth and death records since Roman times.In the US, counties in the various states began in different years over the 19th century to keep the civil records regularly", "after": "provide medical data for research.Higgs, E. The early development of the General Register Office at URL Retrieved 18 August 2013 As a result, in 1836, legislation was passed that ordered the civil registration of births, marriages and deaths in England and Wales. This took effect from 1 July 1837. A General Register Office was set up in London and the office of Registrar General was established.", "start_char_pos": 533, "end_char_pos": 857}, {"type": "A", "before": null, "after": "England and Wales were divided into 619 registration districts (623 from 1851), each under the supervision of a superintendent registrar. The districts were based on the recently introduced poor law unions. The registration districts were further divided into sub-districts (there could be two or more), each under the charge of registrars who were appointed locally.", "start_char_pos": 858, "end_char_pos": 858}, {"type": "A", "before": null, "after": "The General Register Office for Scotland was created in 1854. The General Register Office (Northern Ireland) holds records from 1864 onward for what is now Northern Ireland", "start_char_pos": 859, "end_char_pos": 859}], "sents_char_pos": [0, 261, 319, 364, 400, 424, 593, 733]}